{"schema_version":"1.7.2","id":"OESA-2024-1875","modified":"2024-07-19T11:08:35Z","published":"2024-07-19T11:08:35Z","upstream":["CVE-2022-1475","CVE-2022-48434","CVE-2024-32230"],"summary":"ffmpeg security update","details":"FFmpeg is a complete and free Internet live audio and video broadcasting solution for Linux/Unix. It also includes a digital VCR. It can encode in real time in many formats including MPEG1 audio and video, MPEG4, h263, ac3, asf, avi, real, mjpeg, and flash.\r\n\r\nSecurity Fix(es):\r\n\r\nAn integer overflow vulnerability was found in FFmpeg versions before 4.4.2 and before 5.0.1 in g729_parse() in llibavcodec/g729_parser.c when processing a specially crafted file.(CVE-2022-1475)\r\n\r\nlibavcodec/pthread_frame.c in FFmpeg before 5.1.2, as used in VLC and other products, leaves stale hwaccel state in worker threads, which allows attackers to trigger a use-after-free and execute arbitrary code in some circumstances (e.g., hardware re-initialization upon a mid-video SPS change when Direct3D11 is used).(CVE-2022-48434)\r\n\r\nFFmpeg 7.0 is vulnerable to Buffer Overflow. There is a negative-size-param bug at libavcodec/mpegvideo_enc.c:1216:21 in load_input_picture in FFmpeg7.0(CVE-2024-32230)","affected":[{"package":{"ecosystem":"openEuler:22.03-LTS-SP4","name":"ffmpeg","purl":"pkg:rpm/openEuler/ffmpeg\u0026distro=openEuler-22.03-LTS-SP4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.2.4-17.oe2203sp4"}]}],"ecosystem_specific":{"aarch64":["ffmpeg-4.2.4-17.oe2203sp4.aarch64.rpm","ffmpeg-debuginfo-4.2.4-17.oe2203sp4.aarch64.rpm","ffmpeg-debugsource-4.2.4-17.oe2203sp4.aarch64.rpm","ffmpeg-devel-4.2.4-17.oe2203sp4.aarch64.rpm","ffmpeg-libs-4.2.4-17.oe2203sp4.aarch64.rpm","libavdevice-4.2.4-17.oe2203sp4.aarch64.rpm"],"src":["ffmpeg-4.2.4-17.oe2203sp4.src.rpm"],"x86_64":["ffmpeg-4.2.4-17.oe2203sp4.x86_64.rpm","ffmpeg-debuginfo-4.2.4-17.oe2203sp4.x86_64.rpm","ffmpeg-debugsource-4.2.4-17.oe2203sp4.x86_64.rpm","ffmpeg-devel-4.2.4-17.oe2203sp4.x86_64.rpm","ffmpeg-libs-4.2.4-17.oe2203sp4.x86_64.rpm","libavdevice-4.2.4-17.oe2203sp4.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1875"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-1475"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48434"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-32230"}],"database_specific":{"severity":"High"}}