FFmpeg <=4.3 contains a buffer overflow vulnerability in libavcodec through a crafted file that may lead to remote code execution.
Patch at $URL but seems it's not part of any tag yet.
It is in just released 4.4 .
(In reply to jospezial from comment #1)
> It is in just released 4.4 .
Thanks! Maintainers, please bump.
media-video/ffmpeg: bump to 4.4
(In reply to jospezial from comment #4)
> media-video/ffmpeg: bump to 4.4
New GLSA request filed.
This issue was resolved and addressed in
GLSA 202105-24 at https://security.gentoo.org/glsa/202105-24
by GLSA coordinator Thomas Deutschmann (whissi).
Re-opening for remaining architecture.
All arches done.
Unable to check for sanity:
> no match for package: media-video/ffmpeg-4.4
A few more we can add that will be fixed by this cleanup.
A CWE-125: Out-of-bounds read vulnerability exists in long_term_filter function in g729postfilter.c in FFmpeg 4.2.1 during computation of the denominator of
pseudo-normalized correlation R'(0), that could result in disclosure of information.
An issue was discovered in function latm_write_packet in libavformat/latmenc.c in Ffmpeg 4.2.1, allows attackers to cause a Denial of Service or other unspecified impacts due to a Null pointer dereference.
Integer Overflow vulnerability in function filter16_prewitt in libavfilter/vf_convolution.c in Ffmpeg 4.2.1, allows attackers to cause a Denial of Service or other unspecified impacts.
Buffer Overflow vulnerability in function config_input in libavfilter/vf_gblur.c in Ffmpeg 4.2.1, allows attackers to cause a Denial of Service or other unspecified impacts.
An issue was discovered in function filter_frame in libavfilter/vf_lenscorrection.c in Ffmpeg 4.2.1, allows attackers to cause a Denial of Service or other unspecified impacts due to a division by zero.
FFmpeg N-98388-g76a3ee996b allows attackers to cause a denial of service (DoS) via a crafted audio file due to insufficient verification of data authenticity.