Bug 1217211 (CVE-2023-44429)

Summary: VUL-0: CVE-2023-44429: gstreamer-plugins-bad: GStreamer AV1 Codec Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability
Product: [Novell Products] SUSE Security Incidents Reporter: SMASH SMASH <smash_bz>
Component: IncidentsAssignee: Security Team bot <security-team>
Status: RESOLVED FIXED QA Contact: Security Team bot <security-team>
Severity: Major    
Priority: P3 - Medium CC: gianluca.gabrielli, qzhao, stoyan.manolov, yfjiang
Version: unspecified   
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/385408/
Whiteboard: CVSSv3.1:SUSE:CVE-2023-44429:8.8:(AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
Found By: Security Response Team Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---

Description SMASH SMASH 2023-11-16 08:13:30 UTC
This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation.

The specific flaw exists within the parsing of AV1 encoded video files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-44429
https://gstreamer.freedesktop.org/security/sa-2023-0009.html
Comment 1 Gianluca Gabrielli 2023-11-16 08:14:23 UTC
Affected packages:
 - SUSE:ALP:Source:Standard:1.0/gstreamer-plugins-bad
 - SUSE:SLE-15-SP4:Update/gstreamer-plugins-bad
 - SUSE:SLE-15-SP5:Update/gstreamer-plugins-bad
 - openSUSE:Factory/gstreamer-plugins-bad

Upstream patch: https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/5634.patch
Comment 6 Maintenance Automation 2023-12-14 20:30:09 UTC
SUSE-SU-2023:4875-1: An update that solves one vulnerability can now be installed.

Category: security (important)
Bug References: 1217211
CVE References: CVE-2023-44429
Sources used:
SUSE Package Hub 15 15-SP4 (src): gstreamer-plugins-bad-1.20.1-150400.3.12.1
openSUSE Leap 15.4 (src): gstreamer-plugins-bad-1.20.1-150400.3.12.1
Basesystem Module 15-SP4 (src): gstreamer-plugins-bad-1.20.1-150400.3.12.1
Desktop Applications Module 15-SP4 (src): gstreamer-plugins-bad-1.20.1-150400.3.12.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 7 Maintenance Automation 2023-12-14 20:30:12 UTC
SUSE-SU-2023:4874-1: An update that solves one vulnerability can now be installed.

Category: security (important)
Bug References: 1217211
CVE References: CVE-2023-44429
Sources used:
openSUSE Leap 15.5 (src): gstreamer-plugins-bad-1.22.0-150500.3.12.1
Basesystem Module 15-SP5 (src): gstreamer-plugins-bad-1.22.0-150500.3.12.1
Desktop Applications Module 15-SP5 (src): gstreamer-plugins-bad-1.22.0-150500.3.12.1
SUSE Package Hub 15 15-SP5 (src): gstreamer-plugins-bad-1.22.0-150500.3.12.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 9 OBSbugzilla Bot 2024-01-05 13:35:03 UTC
This is an autogenerated message for OBS integration:
This bug (1217211) was mentioned in
https://build.opensuse.org/request/show/1137044 Factory / gstreamer-plugins-bad