Bugzilla – Bug 1186596
VUL-1: CVE-2020-22015: ffmpeg: Buffer Overflow vulnerability in mov_write_video_tag() due to the out of bounds in libavformat/movenc.c
Last modified: 2024-05-16 14:39:01 UTC
CVE-2020-22015 Buffer Overflow vulnerability in FFmpeg 4.2 in mov_write_video_tag due to the out of bounds in libavformat/movenc.c, which could let a remote malicious user obtain sensitive information, cause a Denial of Service, or execute arbitrary code. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-22015 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22015 https://trac.ffmpeg.org/ticket/8190
tracking as affected: - SUSE:SLE-15:Update/ffmpeg - SUSE:SLE-15-SP2:Update/ffmpeg
ffmpeg 3.4.2 asan: ==28777==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x621000004e10 at pc 0x000000aab2df bp 0x7ffe6e8cc800 sp 0x7ffe6e8cc7f8 READ of size 4 at 0x621000004e10 thread T0 #0 0xaab2de in mov_write_video_tag libavformat/movenc.c:1877 #1 0xaacac5 in mov_write_stsd_tag libavformat/movenc.c:2090 #2 0xaacac5 in mov_write_stbl_tag libavformat/movenc.c:2307 #3 0xab1368 in mov_write_minf_tag libavformat/movenc.c:2566 #4 0xab1368 in mov_write_mdia_tag libavformat/movenc.c:2620 #5 0xab1368 in mov_write_trak_tag libavformat/movenc.c:2996 #6 0xab1368 in mov_write_moov_tag libavformat/movenc.c:3793 #7 0xac041c in mov_write_trailer libavformat/movenc.c:6453 #8 0xb1823e in av_write_trailer libavformat/mux.c:1336 #9 0x558b5c in transcode fftools/ffmpeg.c:4661 #10 0x558b5c in main fftools/ffmpeg.c:4830 #11 0x7f54b4d6c349 in __libc_start_main (/lib64/libc.so.6+0x24349) #12 0x5703d9 in _start (/build/ffmpeg-3.4.2/ffmpeg_g+0x5703d9) 0x621000004e10 is located 0 bytes to the right of 4368-byte region [0x621000003d00,0x621000004e10) allocated by thread T0 here: #0 0x7f54b5b52038 in posix_memalign (/usr/lib64/libasan.so.4+0xdd038) #1 0x263b094 in av_malloc libavutil/mem.c:87 #2 0x263b094 in av_mallocz libavutil/mem.c:224
https://build.suse.de/request/show/243003
openSUSE-SU-2021:2322-1: An update that fixes 23 vulnerabilities is now available. Category: security (important) Bug References: 1172640,1186406,1186583,1186586,1186587,1186596,1186597,1186598,1186600,1186603,1186604,1186605,1186613,1186614,1186615,1186616,1186658,1186660,1186757,1186758,1186762,1186763 CVE References: CVE-2019-17539,CVE-2020-13904,CVE-2020-20448,CVE-2020-20451,CVE-2020-21041,CVE-2020-22015,CVE-2020-22016,CVE-2020-22017,CVE-2020-22019,CVE-2020-22020,CVE-2020-22021,CVE-2020-22022,CVE-2020-22023,CVE-2020-22025,CVE-2020-22026,CVE-2020-22031,CVE-2020-22032,CVE-2020-22033,CVE-2020-22034,CVE-2020-22038,CVE-2020-22039,CVE-2020-22043,CVE-2020-22044 JIRA References: Sources used: openSUSE Leap 15.3 (src): ffmpeg-3.4.2-11.3.1
SUSE-SU-2021:2322-1: An update that fixes 23 vulnerabilities is now available. Category: security (important) Bug References: 1172640,1186406,1186583,1186586,1186587,1186596,1186597,1186598,1186600,1186603,1186604,1186605,1186613,1186614,1186615,1186616,1186658,1186660,1186757,1186758,1186762,1186763 CVE References: CVE-2019-17539,CVE-2020-13904,CVE-2020-20448,CVE-2020-20451,CVE-2020-21041,CVE-2020-22015,CVE-2020-22016,CVE-2020-22017,CVE-2020-22019,CVE-2020-22020,CVE-2020-22021,CVE-2020-22022,CVE-2020-22023,CVE-2020-22025,CVE-2020-22026,CVE-2020-22031,CVE-2020-22032,CVE-2020-22033,CVE-2020-22034,CVE-2020-22038,CVE-2020-22039,CVE-2020-22043,CVE-2020-22044 JIRA References: Sources used: SUSE Linux Enterprise Workstation Extension 15-SP3 (src): ffmpeg-3.4.2-11.3.1 SUSE Linux Enterprise Workstation Extension 15-SP2 (src): ffmpeg-3.4.2-11.3.1 SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP3 (src): ffmpeg-3.4.2-11.3.1 SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP2 (src): ffmpeg-3.4.2-11.3.1 SUSE Linux Enterprise Module for Desktop Applications 15-SP3 (src): ffmpeg-3.4.2-11.3.1 SUSE Linux Enterprise Module for Desktop Applications 15-SP2 (src): ffmpeg-3.4.2-11.3.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
# maintenance_jira_update_notice SUSE-SU-2021:2929-1: An update that fixes 31 vulnerabilities is now available. Category: security (important) Bug References: 1129714,1172640,1186406,1186583,1186586,1186587,1186596,1186597,1186598,1186600,1186603,1186604,1186605,1186613,1186614,1186615,1186616,1186658,1186660,1186757,1186758,1186762,1186763,1186849,1186859,1186861,1186863,1189142,1189348,1189350 CVE References: CVE-2019-17539,CVE-2019-9721,CVE-2020-13904,CVE-2020-20448,CVE-2020-20451,CVE-2020-21041,CVE-2020-21688,CVE-2020-21697,CVE-2020-22015,CVE-2020-22016,CVE-2020-22017,CVE-2020-22019,CVE-2020-22020,CVE-2020-22021,CVE-2020-22022,CVE-2020-22023,CVE-2020-22025,CVE-2020-22026,CVE-2020-22031,CVE-2020-22032,CVE-2020-22033,CVE-2020-22034,CVE-2020-22038,CVE-2020-22039,CVE-2020-22043,CVE-2020-22044,CVE-2020-22046,CVE-2020-22048,CVE-2020-22049,CVE-2020-22054,CVE-2021-38114 JIRA References: Sources used: SUSE Manager Server 4.0 (src): ffmpeg-3.4.2-4.34.2 SUSE Manager Retail Branch Server 4.0 (src): ffmpeg-3.4.2-4.34.2 SUSE Manager Proxy 4.0 (src): ffmpeg-3.4.2-4.34.2 SUSE Linux Enterprise Server for SAP 15-SP1 (src): ffmpeg-3.4.2-4.34.2 SUSE Linux Enterprise Server for SAP 15 (src): ffmpeg-3.4.2-4.34.2 SUSE Linux Enterprise Server 15-SP1-LTSS (src): ffmpeg-3.4.2-4.34.2 SUSE Linux Enterprise Server 15-SP1-BCL (src): ffmpeg-3.4.2-4.34.2 SUSE Linux Enterprise Server 15-LTSS (src): ffmpeg-3.4.2-4.34.2 SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (src): ffmpeg-3.4.2-4.34.2 SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (src): ffmpeg-3.4.2-4.34.2 SUSE Linux Enterprise High Performance Computing 15-LTSS (src): ffmpeg-3.4.2-4.34.2 SUSE Linux Enterprise High Performance Computing 15-ESPOS (src): ffmpeg-3.4.2-4.34.2 SUSE Enterprise Storage 6 (src): ffmpeg-3.4.2-4.34.2 SUSE CaaS Platform 4.0 (src): ffmpeg-3.4.2-4.34.2 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.