Bugzilla – Bug 1186406
VUL-0: CVE-2020-21041: ffmpeg: Buffer Overflow vulnerability via apng_do_inverse_blend in libavcodec/pngenc.c
Last modified: 2022-06-10 12:58:37 UTC
CVE-2020-21041 Buffer Overflow vulnerability exists in FFmpeg 4.1 via apng_do_inverse_blend in libavcodec/pngenc.c, which could let a remote malicious user cause a Denial of Service References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-21041 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21041 https://trac.ffmpeg.org/ticket/7989 http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=5d9f44da460f781a1604d537d0555b78e29438ba
based on upstream discussions, this can be addressed in: - SUSE:SLE-15:Update/ffmpeg - SUSE:SLE-15-SP2:Update/ffmpeg
ffmpeg 3.4.2 asan: ==122==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x62c00000fa1f at pc 0x7f3ee26264c9 bp 0x7ffd9756ffa0 sp 0x7ffd9756f750 READ of size 1 at 0x62c00000fa1f thread T0 #0 0x7f3ee26264c8 (/usr/lib64/libasan.so.4+0xae4c8) #1 0x15a7e71 in apng_do_inverse_blend libavcodec/pngenc.c:588 #2 0x15a7e71 in apng_encode_frame libavcodec/pngenc.c:796 #3 0x15a7e71 in encode_apng libavcodec/pngenc.c:910 #4 0xf03c57 in avcodec_encode_video2 libavcodec/encode.c:307 #5 0xf03c57 in do_encode libavcodec/encode.c:378 #6 0xf05a11 in avcodec_send_frame libavcodec/encode.c:427 #7 0x5bdc08 in do_video_out fftools/ffmpeg.c:1288 #8 0x5c06bb in reap_filters fftools/ffmpeg.c:1506 #9 0x557c58 in transcode_step fftools/ffmpeg.c:4580 #10 0x557c58 in transcode fftools/ffmpeg.c:4624 #11 0x557c58 in main fftools/ffmpeg.c:4830 #12 0x7f3ee186f349 in __libc_start_main (/lib64/libc.so.6+0x24349) #13 0x5703d9 in _start (/build/ffmpeg-3.4.2/ffmpeg_g+0x5703d9) 0x62c00000fa1f is located 0 bytes to the right of 30751-byte region [0x62c000008200,0x62c00000fa1f) allocated by thread T0 here: #0 0x7f3ee2655038 in posix_memalign (/usr/lib64/libasan.so.4+0xdd038) #1 0x263a8bc in av_malloc libavutil/mem.c:87 SUMMARY: AddressSanitizer: heap-buffer-overflow (/usr/lib64/libasan.so.4+0xae4c8)
https://build.suse.de/request/show/243003
openSUSE-SU-2021:2322-1: An update that fixes 23 vulnerabilities is now available. Category: security (important) Bug References: 1172640,1186406,1186583,1186586,1186587,1186596,1186597,1186598,1186600,1186603,1186604,1186605,1186613,1186614,1186615,1186616,1186658,1186660,1186757,1186758,1186762,1186763 CVE References: CVE-2019-17539,CVE-2020-13904,CVE-2020-20448,CVE-2020-20451,CVE-2020-21041,CVE-2020-22015,CVE-2020-22016,CVE-2020-22017,CVE-2020-22019,CVE-2020-22020,CVE-2020-22021,CVE-2020-22022,CVE-2020-22023,CVE-2020-22025,CVE-2020-22026,CVE-2020-22031,CVE-2020-22032,CVE-2020-22033,CVE-2020-22034,CVE-2020-22038,CVE-2020-22039,CVE-2020-22043,CVE-2020-22044 JIRA References: Sources used: openSUSE Leap 15.3 (src): ffmpeg-3.4.2-11.3.1
SUSE-SU-2021:2322-1: An update that fixes 23 vulnerabilities is now available. Category: security (important) Bug References: 1172640,1186406,1186583,1186586,1186587,1186596,1186597,1186598,1186600,1186603,1186604,1186605,1186613,1186614,1186615,1186616,1186658,1186660,1186757,1186758,1186762,1186763 CVE References: CVE-2019-17539,CVE-2020-13904,CVE-2020-20448,CVE-2020-20451,CVE-2020-21041,CVE-2020-22015,CVE-2020-22016,CVE-2020-22017,CVE-2020-22019,CVE-2020-22020,CVE-2020-22021,CVE-2020-22022,CVE-2020-22023,CVE-2020-22025,CVE-2020-22026,CVE-2020-22031,CVE-2020-22032,CVE-2020-22033,CVE-2020-22034,CVE-2020-22038,CVE-2020-22039,CVE-2020-22043,CVE-2020-22044 JIRA References: Sources used: SUSE Linux Enterprise Workstation Extension 15-SP3 (src): ffmpeg-3.4.2-11.3.1 SUSE Linux Enterprise Workstation Extension 15-SP2 (src): ffmpeg-3.4.2-11.3.1 SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP3 (src): ffmpeg-3.4.2-11.3.1 SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP2 (src): ffmpeg-3.4.2-11.3.1 SUSE Linux Enterprise Module for Desktop Applications 15-SP3 (src): ffmpeg-3.4.2-11.3.1 SUSE Linux Enterprise Module for Desktop Applications 15-SP2 (src): ffmpeg-3.4.2-11.3.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
# maintenance_jira_update_notice SUSE-SU-2021:2929-1: An update that fixes 31 vulnerabilities is now available. Category: security (important) Bug References: 1129714,1172640,1186406,1186583,1186586,1186587,1186596,1186597,1186598,1186600,1186603,1186604,1186605,1186613,1186614,1186615,1186616,1186658,1186660,1186757,1186758,1186762,1186763,1186849,1186859,1186861,1186863,1189142,1189348,1189350 CVE References: CVE-2019-17539,CVE-2019-9721,CVE-2020-13904,CVE-2020-20448,CVE-2020-20451,CVE-2020-21041,CVE-2020-21688,CVE-2020-21697,CVE-2020-22015,CVE-2020-22016,CVE-2020-22017,CVE-2020-22019,CVE-2020-22020,CVE-2020-22021,CVE-2020-22022,CVE-2020-22023,CVE-2020-22025,CVE-2020-22026,CVE-2020-22031,CVE-2020-22032,CVE-2020-22033,CVE-2020-22034,CVE-2020-22038,CVE-2020-22039,CVE-2020-22043,CVE-2020-22044,CVE-2020-22046,CVE-2020-22048,CVE-2020-22049,CVE-2020-22054,CVE-2021-38114 JIRA References: Sources used: SUSE Manager Server 4.0 (src): ffmpeg-3.4.2-4.34.2 SUSE Manager Retail Branch Server 4.0 (src): ffmpeg-3.4.2-4.34.2 SUSE Manager Proxy 4.0 (src): ffmpeg-3.4.2-4.34.2 SUSE Linux Enterprise Server for SAP 15-SP1 (src): ffmpeg-3.4.2-4.34.2 SUSE Linux Enterprise Server for SAP 15 (src): ffmpeg-3.4.2-4.34.2 SUSE Linux Enterprise Server 15-SP1-LTSS (src): ffmpeg-3.4.2-4.34.2 SUSE Linux Enterprise Server 15-SP1-BCL (src): ffmpeg-3.4.2-4.34.2 SUSE Linux Enterprise Server 15-LTSS (src): ffmpeg-3.4.2-4.34.2 SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (src): ffmpeg-3.4.2-4.34.2 SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (src): ffmpeg-3.4.2-4.34.2 SUSE Linux Enterprise High Performance Computing 15-LTSS (src): ffmpeg-3.4.2-4.34.2 SUSE Linux Enterprise High Performance Computing 15-ESPOS (src): ffmpeg-3.4.2-4.34.2 SUSE Enterprise Storage 6 (src): ffmpeg-3.4.2-4.34.2 SUSE CaaS Platform 4.0 (src): ffmpeg-3.4.2-4.34.2 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Done, closing.