SUSE SLES15 Security Update : ffmpeg (SUSE-SU-2023:0005-1)

high Nessus Plugin ID 169467

Language:

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLES15 / SLES_SAP15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2023:0005-1 advisory.

- Buffer Overflow vulnerability in function config_input in libavfilter/vf_gblur.c in Ffmpeg 4.2.1, allows attackers to cause a Denial of Service or other unspecified impacts. (CVE-2020-20891)

- An issue was discovered in function filter_frame in libavfilter/vf_lenscorrection.c in Ffmpeg 4.2.1, allows attackers to cause a Denial of Service or other unspecified impacts due to a division by zero.
(CVE-2020-20892)

- An issue was discovered in function latm_write_packet in libavformat/latmenc.c in Ffmpeg 4.2.1, allows attackers to cause a Denial of Service or other unspecified impacts due to a Null pointer dereference.
(CVE-2020-20896)

- A CWE-125: Out-of-bounds read vulnerability exists in long_term_filter function in g729postfilter.c in FFmpeg 4.2.1 during computation of the denominator of pseudo-normalized correlation R'(0), that could result in disclosure of information. (CVE-2020-20902)

- A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory leak in avcodec_alloc_context3 at options.c. (CVE-2020-22037)

- A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory leak is affected by: memory leak in the link_filter_inouts function in libavfilter/graphparser.c. (CVE-2020-22042)

- decode_frame in libavcodec/exr.c in FFmpeg 4.3.1 has an out-of-bounds write because of errors in calculations of when to perform memset zero operations. (CVE-2020-35965)

- Prior to ffmpeg version 4.3, the tty demuxer did not have a 'read_probe' function assigned to it. By crafting a legitimate ffconcat file that references an image, followed by a file the triggers the tty demuxer, the contents of the second file will be copied into the output file verbatim (as long as the `-vcodec copy` option is passed to ffmpeg). (CVE-2021-3566)

- Integer Overflow vulnerability in function filter_prewitt in libavfilter/vf_convolution.c in Ffmpeg 4.2.1, allows attackers to cause a Denial of Service or other unspecified impacts. (CVE-2021-38092)

- Integer Overflow vulnerability in function filter_robert in libavfilter/vf_convolution.c in Ffmpeg 4.2.1, allows attackers to cause a Denial of Service or other unspecified impacts. (CVE-2021-38093)

- Integer Overflow vulnerability in function filter_sobel in libavfilter/vf_convolution.c in Ffmpeg 4.2.1, allows attackers to cause a Denial of Service or other unspecified impacts. (CVE-2021-38094)

- An issue was discovered in the FFmpeg package, where vp3_decode_frame in libavcodec/vp3.c lacks check of the return value of av_malloc() and will cause a null pointer dereference, impacting availability.
(CVE-2022-3109)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://bugzilla.suse.com/1186756

https://bugzilla.suse.com/1186761

https://bugzilla.suse.com/1187852

https://bugzilla.suse.com/1189166

https://bugzilla.suse.com/1190718

https://bugzilla.suse.com/1190719

https://bugzilla.suse.com/1190722

https://bugzilla.suse.com/1190723

https://bugzilla.suse.com/1190726

https://bugzilla.suse.com/1190729

https://bugzilla.suse.com/1190733

https://bugzilla.suse.com/1190734

https://bugzilla.suse.com/1190735

https://bugzilla.suse.com/1206442

https://www.suse.com/security/cve/CVE-2020-20891

https://www.suse.com/security/cve/CVE-2020-20892

https://www.suse.com/security/cve/CVE-2020-20895

https://www.suse.com/security/cve/CVE-2020-20896

https://www.suse.com/security/cve/CVE-2020-20899

https://www.suse.com/security/cve/CVE-2020-20902

https://www.suse.com/security/cve/CVE-2020-22037

https://www.suse.com/security/cve/CVE-2020-22042

https://www.suse.com/security/cve/CVE-2020-35965

https://www.suse.com/security/cve/CVE-2021-3566

https://www.suse.com/security/cve/CVE-2021-38092

https://www.suse.com/security/cve/CVE-2021-38093

https://www.suse.com/security/cve/CVE-2021-38094

https://www.suse.com/security/cve/CVE-2022-3109

http://www.nessus.org/u?c554c13c

Plugin Details

Severity: High

ID: 169467

File Name: suse_SU-2023-0005-1.nasl

Version: 1.3

Type: local

Agent: unix

Published: 1/3/2023

Updated: 7/14/2023

Supported Sensors: Agentless Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2021-38094

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 7.9

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:libavcodec-devel, p-cpe:/a:novell:suse_linux:libavcodec57, p-cpe:/a:novell:suse_linux:libavcodec57-32bit, p-cpe:/a:novell:suse_linux:libavdevice-devel, p-cpe:/a:novell:suse_linux:libavdevice57, p-cpe:/a:novell:suse_linux:libavdevice57-32bit, p-cpe:/a:novell:suse_linux:libavfilter-devel, p-cpe:/a:novell:suse_linux:libavfilter6, p-cpe:/a:novell:suse_linux:libavfilter6-32bit, p-cpe:/a:novell:suse_linux:libavformat-devel, p-cpe:/a:novell:suse_linux:libavformat57, p-cpe:/a:novell:suse_linux:libavformat57-32bit, p-cpe:/a:novell:suse_linux:libavresample-devel, p-cpe:/a:novell:suse_linux:libavresample3, p-cpe:/a:novell:suse_linux:libavresample3-32bit, p-cpe:/a:novell:suse_linux:libavutil-devel, p-cpe:/a:novell:suse_linux:libavutil55, p-cpe:/a:novell:suse_linux:libavutil55-32bit, p-cpe:/a:novell:suse_linux:libpostproc-devel, p-cpe:/a:novell:suse_linux:libpostproc54, p-cpe:/a:novell:suse_linux:libpostproc54-32bit, p-cpe:/a:novell:suse_linux:libswresample-devel, p-cpe:/a:novell:suse_linux:libswresample2, p-cpe:/a:novell:suse_linux:libswresample2-32bit, p-cpe:/a:novell:suse_linux:libswscale-devel, p-cpe:/a:novell:suse_linux:libswscale4, p-cpe:/a:novell:suse_linux:libswscale4-32bit, cpe:/o:novell:suse_linux:15

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 1/2/2023

Vulnerability Publication Date: 1/4/2021

Reference Information

CVE: CVE-2020-20891, CVE-2020-20892, CVE-2020-20895, CVE-2020-20896, CVE-2020-20899, CVE-2020-20902, CVE-2020-22037, CVE-2020-22042, CVE-2020-35965, CVE-2021-3566, CVE-2021-38092, CVE-2021-38093, CVE-2021-38094, CVE-2022-3109

SuSE: SUSE-SU-2023:0005-1