CVE-2021-30123: FFmpeg <=4.3 contains a buffer overflow vulnerability in libavcodec through a crafted file that may lead to remote code execution. Patch at $URL but seems it's not part of any tag yet.
It is in just released 4.4 .
https://github.com/FFmpeg/FFmpeg/commit/d6f293353c94c7ce200f6e0975ae3de49787f91f
(In reply to jospezial from comment #1) > It is in just released 4.4 . Thanks! Maintainers, please bump.
https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=ddb6d10608a9396bb123add897b15fe01538ce68 media-video/ffmpeg: bump to 4.4
(In reply to jospezial from comment #4) > https://gitweb.gentoo.org/repo/gentoo.git/commit/ > ?id=ddb6d10608a9396bb123add897b15fe01538ce68 > media-video/ffmpeg: bump to 4.4 Thanks!
amd64 stable
x86 stable
ppc64 stable
arm64 done
arm done
sparc done
New GLSA request filed.
This issue was resolved and addressed in GLSA 202105-24 at https://security.gentoo.org/glsa/202105-24 by GLSA coordinator Thomas Deutschmann (whissi).
Re-opening for remaining architecture.
Ping ppc
ppc stable All arches done.
Please cleanup.
Unable to check for sanity: > no match for package: media-video/ffmpeg-4.4
A few more we can add that will be fixed by this cleanup. CVE-2020-20902: A CWE-125: Out-of-bounds read vulnerability exists in long_term_filter function in g729postfilter.c in FFmpeg 4.2.1 during computation of the denominator of pseudo-normalized correlation R'(0), that could result in disclosure of information. CVE-2020-20896: An issue was discovered in function latm_write_packet in libavformat/latmenc.c in Ffmpeg 4.2.1, allows attackers to cause a Denial of Service or other unspecified impacts due to a Null pointer dereference. CVE-2020-20898: Integer Overflow vulnerability in function filter16_prewitt in libavfilter/vf_convolution.c in Ffmpeg 4.2.1, allows attackers to cause a Denial of Service or other unspecified impacts. CVE-2020-20891: Buffer Overflow vulnerability in function config_input in libavfilter/vf_gblur.c in Ffmpeg 4.2.1, allows attackers to cause a Denial of Service or other unspecified impacts. CVE-2020-20892: An issue was discovered in function filter_frame in libavfilter/vf_lenscorrection.c in Ffmpeg 4.2.1, allows attackers to cause a Denial of Service or other unspecified impacts due to a division by zero.
CVE-2020-23906: FFmpeg N-98388-g76a3ee996b allows attackers to cause a denial of service (DoS) via a crafted audio file due to insufficient verification of data authenticity.
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=31baf58256ca04e305510ce86df9f6d83948f853 commit 31baf58256ca04e305510ce86df9f6d83948f853 Author: Sam James <sam@gentoo.org> AuthorDate: 2022-09-03 05:24:50 +0000 Commit: Sam James <sam@gentoo.org> CommitDate: 2022-09-03 05:25:22 +0000 media-video/ffmpeg: add 4.2.7 Fixes a bunch of CVEs that we've had fixed in newer versions for a while, but until we can clean up 4.2.x, we may as well bump to the latest in that series... Bug: https://bugs.gentoo.org/842267 Bug: https://bugs.gentoo.org/795696 Bug: https://bugs.gentoo.org/781146 Signed-off-by: Sam James <sam@gentoo.org> media-video/ffmpeg/Manifest | 1 + media-video/ffmpeg/ffmpeg-4.2.7.ebuild | 556 +++++++++++++++++++++ .../ffmpeg-4.2.7-libsdl2-new-version-scheme.patch | 26 + 3 files changed, 583 insertions(+)
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=fff3d30f49f081c89ab5d0154509d32550ae1a9c commit fff3d30f49f081c89ab5d0154509d32550ae1a9c Author: John Helmert III <ajak@gentoo.org> AuthorDate: 2022-10-10 15:26:17 +0000 Commit: John Helmert III <ajak@gentoo.org> CommitDate: 2022-10-10 15:31:58 +0000 media-video/ffmpeg: drop 4.2.4-r2 Bug: https://bugs.gentoo.org/847267 Bug: https://bugs.gentoo.org/795696 Bug: https://bugs.gentoo.org/781146 Signed-off-by: John Helmert III <ajak@gentoo.org> media-video/ffmpeg/Manifest | 1 - media-video/ffmpeg/ffmpeg-4.2.4-r2.ebuild | 555 ------------------------------ 2 files changed, 556 deletions(-)
I suppose we'll need to add this new version restriction to the GLSA somehow...
(In reply to John Helmert III from comment #23) > I suppose we'll need to add this new version restriction to the GLSA > somehow... Looks like that worked since 202105-24 has <4.4 for vulnerable versions.