Bug 1217211 (CVE-2023-44429) - VUL-0: CVE-2023-44429: gstreamer-plugins-bad: GStreamer AV1 Codec Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability
Summary: VUL-0: CVE-2023-44429: gstreamer-plugins-bad: GStreamer AV1 Codec Parsing Hea...
Status: RESOLVED FIXED
Alias: CVE-2023-44429
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Major
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/385408/
Whiteboard: CVSSv3.1:SUSE:CVE-2023-44429:8.8:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2023-11-16 08:13 UTC by SMASH SMASH
Modified: 2024-05-30 14:31 UTC (History)
4 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description SMASH SMASH 2023-11-16 08:13:30 UTC
This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation.

The specific flaw exists within the parsing of AV1 encoded video files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-44429
https://gstreamer.freedesktop.org/security/sa-2023-0009.html
Comment 1 Gianluca Gabrielli 2023-11-16 08:14:23 UTC
Affected packages:
 - SUSE:ALP:Source:Standard:1.0/gstreamer-plugins-bad
 - SUSE:SLE-15-SP4:Update/gstreamer-plugins-bad
 - SUSE:SLE-15-SP5:Update/gstreamer-plugins-bad
 - openSUSE:Factory/gstreamer-plugins-bad

Upstream patch: https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/5634.patch
Comment 6 Maintenance Automation 2023-12-14 20:30:09 UTC
SUSE-SU-2023:4875-1: An update that solves one vulnerability can now be installed.

Category: security (important)
Bug References: 1217211
CVE References: CVE-2023-44429
Sources used:
SUSE Package Hub 15 15-SP4 (src): gstreamer-plugins-bad-1.20.1-150400.3.12.1
openSUSE Leap 15.4 (src): gstreamer-plugins-bad-1.20.1-150400.3.12.1
Basesystem Module 15-SP4 (src): gstreamer-plugins-bad-1.20.1-150400.3.12.1
Desktop Applications Module 15-SP4 (src): gstreamer-plugins-bad-1.20.1-150400.3.12.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 7 Maintenance Automation 2023-12-14 20:30:12 UTC
SUSE-SU-2023:4874-1: An update that solves one vulnerability can now be installed.

Category: security (important)
Bug References: 1217211
CVE References: CVE-2023-44429
Sources used:
openSUSE Leap 15.5 (src): gstreamer-plugins-bad-1.22.0-150500.3.12.1
Basesystem Module 15-SP5 (src): gstreamer-plugins-bad-1.22.0-150500.3.12.1
Desktop Applications Module 15-SP5 (src): gstreamer-plugins-bad-1.22.0-150500.3.12.1
SUSE Package Hub 15 15-SP5 (src): gstreamer-plugins-bad-1.22.0-150500.3.12.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 9 OBSbugzilla Bot 2024-01-05 13:35:03 UTC
This is an autogenerated message for OBS integration:
This bug (1217211) was mentioned in
https://build.opensuse.org/request/show/1137044 Factory / gstreamer-plugins-bad