QID 751079

Date Published: 2021-09-15

QID 751079: SUSE Enterprise Linux Security Update for ffmpeg (SUSE-SU-2021:2929-1)

This update for ffmpeg fixes the following issues: - cve-2019-9721: fixed a denial of service in the subtitle decoder in handle_open_brace from libavcodec/htmlsubtitles.c (bsc#1129714).
- cve-2020-22046: fixed a denial of service vulnerability due to a memory leak in the avpriv_float_dsp_allocl function in libavutil/float_dsp.c (bsc#1186849).
- cve-2020-22048: fixed a denial of service vulnerability due to a memory leak in the ff_frame_pool_get function in framepool.c (bsc#1186859).
- cve-2020-22049: fixed a denial of service vulnerability caused by a memory leak in the wtvfile_open_sector function in wtvdec.c (bsc#1186861).
- cve-2020-22054: fixed a denial of service vulnerability due to a memory leak in the av_dict_set function in dict.c (bsc#1186863).
- cve-2020-13904: fixed use-after-free via a crafted extinf duration in an m3u8 file (bsc#1172640).
- cve-2020-21041: fixed buffer overflow vulnerability via apng_do_inverse_blend in libavcodec/pngenc.c (bsc#1186406).
- cve-2019-17539: fixed null pointer dereference in avcodec_open2 in libavcodec/utils.c (bsc# 1154065).
- cve-2020-22026: fixed buffer overflow vulnerability in config_input() at libavfilter/af_tremolo.c (bsc#1186583).
- cve-2020-22021: fixed buffer overflow vulnerability in filter_edges function in libavfilter/vf_yadif.c (bsc#1186586).
- cve-2020-22020: fixed buffer overflow vulnerability in build_diff_map() in libavfilter/vf_fieldmatch.c (bsc#1186587).
- cve-2020-22015: fixed buffer overflow vulnerability in mov_write_video_tag() due to the out of bounds in libavformat/movenc.c (bsc#1186596).
- cve-2020-22016: fixed a heap-based buffer overflow vulnerability at libavcodec/get_bits.h when writing .mov files (bsc#1186598).
- cve-2020-22017: fixed a heap-based buffer overflow vulnerability in ff_fill_rectangle() in libavfilter/drawutils.c (bsc#1186600).
- cve-2020-22022: fixed a heap-based buffer overflow vulnerability in filter_frame at libavfilter/vf_fieldorder.c (bsc#1186603).
- cve-2020-22023: fixed a heap-based buffer overflow vulnerability in filter_frame at libavfilter/vf_bitplanenoise.c (bsc#1186604) - cve-2020-22025: fixed a heap-based buffer overflow vulnerability in gaussian_blur at libavfilter/vf_edgedetect.c (bsc#1186605).
- cve-2020-22031: fixed a heap-based buffer overflow vulnerability at libavfilter/vf_w3fdif.c in filter16_complex_low() (bsc#1186613).
- cve-2020-22032: fixed a heap-based buffer overflow vulnerability at libavfilter/vf_edgedetect.c in gaussian_blur() (bsc#1186614).
- cve-2020-22034: fixed a heap-based buffer overflow vulnerability at libavfilter/vf_floodfill.c (bsc#1186616).
- cve-2020-20451: fixed denial of service issue due to resource management errors via fftools/cmdutils.c (bsc#1186658).
- cve-2020-20448: fixed divide by zero issue via libavcodec/ratecontrol.c (bsc#1186660).
- cve-2020-22038: fixed denial of service vulnerability due to a memory leak in the ff_v4l2_m2m_create_context function in v4l2_m2m.c (bsc#1186757).
- cve-2020-22039: fixed denial of service vulnerability due to a memory leak in the inavi_add_ientry function (bsc#1186758).
- cve-2020-22043: fixed denial of service vulnerability due to a memory leak at the fifo_alloc_common function in libavutil/fifo.c (bsc#1186762).
- cve-2020-22044: fixed denial of service vulnerability due to a memory leak in the url_open_dyn_buf_internal function in libavformat/aviobuf.c (bsc#1186763).
- cve-2020-21688: fixed a heap-use-after-free in the av_freep function in libavutil/mem.c (bsc#1189348).
- cve-2021-38114: fixed a not checked return value of the init_vlc function (bsc#1189142).

Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Successful exploitation allows attacker to compromise the system.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as High - 7.5 severity.
  • Solution
    Upgrade to the latest package which contains the patch. To install this SUSE Security, Update use YaST online_update. Alternatively you can run the command listed for your product. To install packages using the command line interface, use command "yum update". Refer to Suse security advisory: SUSE-SU-2021:2929-1 to address this issue and obtain further details.
    Software Advisories
    Advisory ID Software Component Link
    SUSE-SU-2021:2929-1 SUSE Enterprise Linux URL Logo lists.suse.com/pipermail/sle-security-updates/2021-September/009391.html