{"schema_version":"1.7.2","id":"OESA-2024-2576","modified":"2024-12-20T13:07:58Z","published":"2024-12-20T13:07:58Z","upstream":["CVE-2024-35368","CVE-2024-36616","CVE-2024-36617","CVE-2024-36618"],"summary":"ffmpeg security update","details":"FFmpeg is a complete and free Internet live audio and video broadcasting solution for Linux/Unix. It also includes a digital VCR. It can encode in real time in many formats including MPEG1 audio and video, MPEG4, h263, ac3, asf, avi, real, mjpeg, and flash.\r\n\r\nSecurity Fix(es):\r\n\r\nFFmpeg n7.0 is affected by a Double Free via the rkmpp_retrieve_frame function within libavcodec/rkmppdec.c.(CVE-2024-35368)\r\n\r\nAn integer overflow in the component /libavformat/westwood_vqa.c of FFmpeg n6.1.1 allows attackers to cause a denial of service in the application via a crafted VQA file.(CVE-2024-36616)\r\n\r\nFFmpeg n6.1.1 has an integer overflow vulnerability in the FFmpeg CAF decoder.(CVE-2024-36617)\r\n\r\nFFmpeg n6.1.1 has a vulnerability in the AVI demuxer of the libavformat library which allows for an integer overflow, potentially resulting in a denial-of-service (DoS) condition.(CVE-2024-36618)","affected":[{"package":{"ecosystem":"openEuler:22.03-LTS-SP1","name":"ffmpeg","purl":"pkg:rpm/openEuler/ffmpeg\u0026distro=openEuler-22.03-LTS-SP1"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.2.4-21.oe2203sp1"}]}],"ecosystem_specific":{"aarch64":["ffmpeg-4.2.4-21.oe2203sp1.aarch64.rpm","ffmpeg-debuginfo-4.2.4-21.oe2203sp1.aarch64.rpm","ffmpeg-debugsource-4.2.4-21.oe2203sp1.aarch64.rpm","ffmpeg-devel-4.2.4-21.oe2203sp1.aarch64.rpm","ffmpeg-libs-4.2.4-21.oe2203sp1.aarch64.rpm","libavdevice-4.2.4-21.oe2203sp1.aarch64.rpm"],"src":["ffmpeg-4.2.4-21.oe2203sp1.src.rpm"],"x86_64":["ffmpeg-4.2.4-21.oe2203sp1.x86_64.rpm","ffmpeg-debuginfo-4.2.4-21.oe2203sp1.x86_64.rpm","ffmpeg-debugsource-4.2.4-21.oe2203sp1.x86_64.rpm","ffmpeg-devel-4.2.4-21.oe2203sp1.x86_64.rpm","ffmpeg-libs-4.2.4-21.oe2203sp1.x86_64.rpm","libavdevice-4.2.4-21.oe2203sp1.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2576"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-35368"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-36616"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-36617"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-36618"}],"database_specific":{"severity":"Critical"}}