Lucene search

K
ubuntuUbuntuUSN-6449-2
HistoryNov 15, 2023 - 12:00 a.m.

FFmpeg regression

2023-11-1500:00:00
ubuntu.com
47
ffmpeg
ubuntu
lts
vulnerabilities
regression
memory leak
denial of service
integer overflow
arbitrary code
security advisory

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.5 High

AI Score

Confidence

High

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.002 Low

EPSS

Percentile

55.4%

Releases

  • Ubuntu 22.04 LTS
  • Ubuntu 20.04 LTS
  • Ubuntu 18.04 ESM

Packages

  • ffmpeg - Tools for transcoding, streaming and playing of multimedia files

Details

USN-6449-1 fixed vulnerabilities in FFmpeg. Unfortunately that update
could introduce a regression in tools using an FFmpeg library, like VLC.

This updated fixes the problem. We apologize for the inconvenience.

Original advisory details:

It was discovered that FFmpeg incorrectly managed memory resulting
in a memory leak. An attacker could possibly use this issue to cause
a denial of service via application crash. This issue only
affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2020-22038)

It was discovered that FFmpeg incorrectly handled certain input files,
leading to an integer overflow. An attacker could possibly use this issue
to cause a denial of service via application crash. This issue only
affected Ubuntu 20.04 LTS. (CVE-2020-20898, CVE-2021-38090,
CVE-2021-38091, CVE-2021-38092, CVE-2021-38093, CVE-2021-38094)

It was discovered that FFmpeg incorrectly managed memory, resulting in
a memory leak. If a user or automated system were tricked into
processing a specially crafted input file, a remote attacker could
possibly use this issue to cause a denial of service, or execute
arbitrary code. (CVE-2022-48434)

OSVersionArchitecturePackageVersionFilename
Ubuntu22.04noarchffmpeg< 7:4.4.2-0ubuntu0.22.04.1+esm3UNKNOWN
Ubuntu22.04noarchffmpeg< 7:4.4.2-0ubuntu0.22.04.1UNKNOWN
Ubuntu22.04noarchffmpeg-dbgsym< 7:4.4.2-0ubuntu0.22.04.1UNKNOWN
Ubuntu22.04noarchffmpeg-doc< 7:4.4.2-0ubuntu0.22.04.1UNKNOWN
Ubuntu22.04noarchlibavcodec-dev< 7:4.4.2-0ubuntu0.22.04.1UNKNOWN
Ubuntu22.04noarchlibavcodec-extra< 7:4.4.2-0ubuntu0.22.04.1UNKNOWN
Ubuntu22.04noarchlibavcodec-extra58< 7:4.4.2-0ubuntu0.22.04.1UNKNOWN
Ubuntu22.04noarchlibavcodec-extra58-dbgsym< 7:4.4.2-0ubuntu0.22.04.1UNKNOWN
Ubuntu22.04noarchlibavcodec58< 7:4.4.2-0ubuntu0.22.04.1UNKNOWN
Ubuntu22.04noarchlibavcodec58-dbgsym< 7:4.4.2-0ubuntu0.22.04.1UNKNOWN
Rows per page:
1-10 of 1551

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.5 High

AI Score

Confidence

High

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.002 Low

EPSS

Percentile

55.4%