SUSE SLED15 / SLES15 Security Update : ffmpeg (SUSE-SU-2021:2322-1)

critical Nessus Plugin ID 151651

Language:

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLED15 / SLES15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2021:2322-1 advisory.

- In FFmpeg before 4.2, avcodec_open2 in libavcodec/utils.c allows a NULL pointer dereference and possibly unspecified other impact when there is no valid close function pointer. (CVE-2019-17539)

- FFmpeg 2.8 and 4.2.3 has a use-after-free via a crafted EXTINF duration in an m3u8 file because parse_playlist in libavformat/hls.c frees a pointer, and later that pointer is accessed in av_probe_input_format3 in libavformat/format.c. (CVE-2020-13904)

- FFmpeg 4.1.3 is affected by a Divide By Zero issue via libavcodec/ratecontrol.c, which allows a remote malicious user to cause a Denial of Service. (CVE-2020-20448)

- Denial of Service issue in FFmpeg 4.2 due to resource management errors via fftools/cmdutils.c.
(CVE-2020-20451)

- Buffer Overflow vulnerability exists in FFmpeg 4.1 via apng_do_inverse_blend in libavcodec/pngenc.c, which could let a remote malicious user cause a Denial of Service (CVE-2020-21041)

- Buffer Overflow vulnerability in FFmpeg 4.2 in mov_write_video_tag due to the out of bounds in libavformat/movenc.c, which could let a remote malicious user obtain sensitive information, cause a Denial of Service, or execute arbitrary code. (CVE-2020-22015)

- A heap-based Buffer Overflow vulnerability in FFmpeg 4.2 at libavcodec/get_bits.h when writing .mov files, which might lead to memory corruption and other potential consequences. (CVE-2020-22016)

- A heap-based Buffer Overflow vulnerability exists in FFmpeg 4.2 at ff_fill_rectangle in libavfilter/drawutils.c, which might lead to memory corruption and other potential consequences.
(CVE-2020-22017)

- Buffer Overflow vulnerability in FFmpeg 4.2 at convolution_y_10bit in libavfilter/vf_vmafmotion.c, which could let a remote malicious user cause a Denial of Service. (CVE-2020-22019)

- Buffer Overflow vulnerability in FFmpeg 4.2 in the build_diff_map function in libavfilter/vf_fieldmatch.c, which could let a remote malicious user cause a Denial of Service. (CVE-2020-22020)

- Buffer Overflow vulnerability in FFmpeg 4.2 at filter_edges function in libavfilter/vf_yadif.c, which could let a remote malicious user cause a Denial of Service. (CVE-2020-22021)

- A heap-based Buffer Overflow vulnerability exists in FFmpeg 4.2 in filter_frame at libavfilter/vf_fieldorder.c, which might lead to memory corruption and other potential consequences.
(CVE-2020-22022)

- A heap-based Buffer Overflow vulnerabililty exists in FFmpeg 4.2 in filter_frame at libavfilter/vf_bitplanenoise.c, which might lead to memory corruption and other potential consequences.
(CVE-2020-22023)

- A heap-based Buffer Overflow vulnerability exists in gaussian_blur at libavfilter/vf_edgedetect.c, which might lead to memory corruption and other potential consequences. (CVE-2020-22025)

- Buffer Overflow vulnerability exists in FFmpeg 4.2 in the config_input function at libavfilter/af_tremolo.c, which could let a remote malicious user cause a Denial of Service.
(CVE-2020-22026)

- A Heap-based Buffer Overflow vulnerability exists in FFmpeg 4.2 at libavfilter/vf_w3fdif.c in filter16_complex_low, which might lead to memory corruption and other potential consequences.
(CVE-2020-22031)

- A heap-based Buffer Overflow vulnerability exists FFmpeg 4.2 at libavfilter/vf_edgedetect.c in gaussian_blur, which might lead to memory corruption and other potential consequences. (CVE-2020-22032)

- A heap-based Buffer Overflow Vulnerability exists FFmpeg 4.2 at libavfilter/vf_vmafmotion.c in convolution_y_8bit, which could let a remote malicious user cause a Denial of Service. (CVE-2020-22033)

- A heap-based Buffer Overflow vulnerability exists FFmpeg 4.2 at libavfilter/vf_floodfill.c, which might lead to memory corruption and other potential consequences. (CVE-2020-22034)

- A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory leak in the ff_v4l2_m2m_create_context function in v4l2_m2m.c. (CVE-2020-22038)

- A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory leak in the inavi_add_ientry function. (CVE-2020-22039)

- A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory leak at the fifo_alloc_common function in libavutil/fifo.c. (CVE-2020-22043)

- A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory leak in the url_open_dyn_buf_internal function in libavformat/aviobuf.c. (CVE-2020-22044)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://bugzilla.suse.com/1172640

https://bugzilla.suse.com/1186406

https://bugzilla.suse.com/1186583

https://bugzilla.suse.com/1186586

https://bugzilla.suse.com/1186587

https://bugzilla.suse.com/1186596

https://bugzilla.suse.com/1186597

https://bugzilla.suse.com/1186598

https://bugzilla.suse.com/1186600

https://bugzilla.suse.com/1186603

https://bugzilla.suse.com/1186604

https://bugzilla.suse.com/1186605

https://bugzilla.suse.com/1186613

https://bugzilla.suse.com/1186614

https://bugzilla.suse.com/1186615

https://bugzilla.suse.com/1186616

https://bugzilla.suse.com/1186658

https://bugzilla.suse.com/1186660

https://bugzilla.suse.com/1186757

https://bugzilla.suse.com/1186758

https://bugzilla.suse.com/1186762

https://bugzilla.suse.com/1186763

https://www.suse.com/security/cve/CVE-2019-17539

https://www.suse.com/security/cve/CVE-2020-13904

https://www.suse.com/security/cve/CVE-2020-20448

https://www.suse.com/security/cve/CVE-2020-20451

https://www.suse.com/security/cve/CVE-2020-21041

https://www.suse.com/security/cve/CVE-2020-22015

https://www.suse.com/security/cve/CVE-2020-22016

https://www.suse.com/security/cve/CVE-2020-22017

https://www.suse.com/security/cve/CVE-2020-22019

https://www.suse.com/security/cve/CVE-2020-22020

https://www.suse.com/security/cve/CVE-2020-22021

https://www.suse.com/security/cve/CVE-2020-22022

https://www.suse.com/security/cve/CVE-2020-22023

https://www.suse.com/security/cve/CVE-2020-22025

https://www.suse.com/security/cve/CVE-2020-22026

https://www.suse.com/security/cve/CVE-2020-22031

https://www.suse.com/security/cve/CVE-2020-22032

https://www.suse.com/security/cve/CVE-2020-22033

https://www.suse.com/security/cve/CVE-2020-22034

https://www.suse.com/security/cve/CVE-2020-22038

https://www.suse.com/security/cve/CVE-2020-22039

https://www.suse.com/security/cve/CVE-2020-22043

https://www.suse.com/security/cve/CVE-2020-22044

http://www.nessus.org/u?7c19125e

Plugin Details

Severity: Critical

ID: 151651

File Name: suse_SU-2021-2322-1.nasl

Version: 1.5

Type: local

Agent: unix

Published: 7/15/2021

Updated: 7/13/2023

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2019-17539

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:libswscale-devel, p-cpe:/a:novell:suse_linux:libavutil55, p-cpe:/a:novell:suse_linux:libswresample-devel, p-cpe:/a:novell:suse_linux:libavformat-devel, p-cpe:/a:novell:suse_linux:libswresample2, p-cpe:/a:novell:suse_linux:libswscale4, p-cpe:/a:novell:suse_linux:ffmpeg, p-cpe:/a:novell:suse_linux:libavresample3, p-cpe:/a:novell:suse_linux:libavcodec-devel, p-cpe:/a:novell:suse_linux:libpostproc54, p-cpe:/a:novell:suse_linux:libavcodec57, p-cpe:/a:novell:suse_linux:libavutil-devel, p-cpe:/a:novell:suse_linux:libavdevice57, p-cpe:/a:novell:suse_linux:libavfilter6, p-cpe:/a:novell:suse_linux:libavresample-devel, p-cpe:/a:novell:suse_linux:libavformat57, p-cpe:/a:novell:suse_linux:libpostproc-devel, cpe:/o:novell:suse_linux:15

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 7/14/2021

Vulnerability Publication Date: 10/14/2019

Reference Information

CVE: CVE-2019-17539, CVE-2020-13904, CVE-2020-20448, CVE-2020-20451, CVE-2020-21041, CVE-2020-22015, CVE-2020-22016, CVE-2020-22017, CVE-2020-22019, CVE-2020-22020, CVE-2020-22021, CVE-2020-22022, CVE-2020-22023, CVE-2020-22025, CVE-2020-22026, CVE-2020-22031, CVE-2020-22032, CVE-2020-22033, CVE-2020-22034, CVE-2020-22038, CVE-2020-22039, CVE-2020-22043, CVE-2020-22044

SuSE: SUSE-SU-2021:2322-1