Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 835341 (CVE-2022-1035, CVE-2022-1172, CVE-2022-1222, CVE-2022-1441, CVE-2022-1795, CVE-2022-2453, CVE-2022-2454, CVE-2022-2549, CVE-2022-26967, CVE-2022-29339, CVE-2022-29340, CVE-2022-29537, CVE-2022-30976) - media-video/gpac: multiple vulnerabilities
Summary: media-video/gpac: multiple vulnerabilities
Status: CONFIRMED
Alias: CVE-2022-1035, CVE-2022-1172, CVE-2022-1222, CVE-2022-1441, CVE-2022-1795, CVE-2022-2453, CVE-2022-2454, CVE-2022-2549, CVE-2022-26967, CVE-2022-29339, CVE-2022-29340, CVE-2022-29537, CVE-2022-30976
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
URL: https://github.com/gpac/gpac/issues/2138
Whiteboard: B2 [upstream/ebuild]
Keywords:
Depends on:
Blocks:
 
Reported: 2022-03-15 15:59 UTC by John Helmert III
Modified: 2022-07-27 17:04 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-03-15 15:59:53 UTC
CVE-2022-26967:

GPAC 2.0 allows a heap-based buffer overflow in gf_base64_encode. It can be triggered via MP4Box.
Comment 1 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-03-21 15:41:12 UTC
CVE-2022-1035 (https://github.com/gpac/gpac/commit/3718d583c6ade191dc7979c64f48c001ca6f0243):

Segmentation Fault caused by MP4Box -lsr in GitHub repository gpac/gpac prior to 2.1.0-DEV.
Comment 2 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-03-30 14:29:37 UTC
CVE-2022-1172 (https://github.com/gpac/gpac/commit/55a183e6b8602369c04ea3836e05436a79fbc7f8):

Null Pointer Dereference Caused Segmentation Fault in GitHub repository gpac/gpac prior to 2.1.0-DEV.
Comment 3 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-04-04 18:00:29 UTC
CVE-2022-1222 (https://github.com/gpac/gpac/commit/7f060bbb72966cae80d6fee338d0b07fa3fc06e1):

Inf loop in GitHub repository gpac/gpac prior to 2.1.0-DEV.
Comment 4 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-04-21 22:40:13 UTC
CVE-2022-29537 (https://github.com/gpac/gpac/issues/2173):

gp_rtp_builder_do_hevc in ietf/rtp_pck_mpeg4.c in GPAC 2.0.0 has a heap-based buffer over-read, as demonstrated by MP4Box.
Comment 5 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-04-26 00:03:12 UTC
CVE-2022-1441 (https://github.com/gpac/gpac/commit/3dbe11b37d65c8472faf0654410068e5500b3adb):

MP4Box is a component of GPAC-2.0.0, which is a widely-used third-party package on RPM Fusion. When MP4Box tries to parse a MP4 file, it calls the function `diST_box_read()` to read from video. In this function, it allocates a buffer `str` with fixed length. However, content read from `bs` is controllable by user, so is the length, which causes a buffer overflow.
Comment 6 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-05-07 14:51:51 UTC
CVE-2022-29339 (https://github.com/gpac/gpac/issues/2165):
https://github.com/gpac/gpac/commit/9ea93a2ec8f555ceed1ee27294cf94822f14f10f

In GPAC 2.1-DEV-rev87-g053aae8-master, function BS_ReadByte() in utils/bitstream.c has a failed assertion, which causes a Denial of Service. This vulnerability was fixed in commit 9ea93a2.

CVE-2022-29340 (https://github.com/gpac/gpac/issues/2163):
https://github.com/gpac/gpac/commit/37592ad86c6ca934d34740012213e467acc4a3b0

GPAC 2.1-DEV-rev87-g053aae8-master. has a Null Pointer Dereference vulnerability in gf_isom_parse_movie_boxes_internal due to improper return value handling of GF_SKIP_BOX, which causes a Denial of Service. This vulnerability was fixed in commit 37592ad.
Comment 7 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-05-18 17:26:37 UTC
CVE-2022-1795 (https://huntr.dev/bounties/9c312763-41a6-4fc7-827b-269eb86efcbc):

Use After Free in GitHub repository gpac/gpac prior to v2.1.0-DEV.

Patch: https://github.com/gpac/gpac/commit/c535bad50d5812d27ee5b22b54371bddec411514

CVE-2022-30976 (https://github.com/gpac/gpac/issues/2179):

GPAC 2.0.0 misuses a certain Unicode utf8_wcslen (renamed gf_utf8_wcslen) function in utils/utf.c, resulting in a heap-based buffer over-read, as demonstrated by MP4Box.

Patch: https://github.com/gpac/gpac/commit/915e2cba715f36b7cc29e28888117831ca143d78
Comment 8 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-07-19 17:46:36 UTC
CVE-2022-2453 (https://huntr.dev/bounties/c8c964de-046a-41b2-9ff5-e25cfdb36b5a):
https://github.com/gpac/gpac/commit/dc7de8d3d604426c7a6e628d90cb9fb88e7b4c2c

Use After Free in GitHub repository gpac/gpac prior to 2.1-DEV.
Comment 9 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-07-19 17:47:10 UTC
CVE-2022-2454 (https://github.com/gpac/gpac/commit/faa75edde3dfeba1e2cf6ffa48e45a50f1042096):
https://huntr.dev/bounties/105d40d0-46d7-461e-9f8e-20c4cdea925f

Integer Overflow or Wraparound in GitHub repository gpac/gpac prior to 2.1-DEV.
Comment 10 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-07-27 17:04:24 UTC
CVE-2022-2549 (https://github.com/gpac/gpac/commit/0102c5d4db7fdbf08b5b591b2a6264de33867a07):
https://huntr.dev/bounties/c93083dc-177c-4ba0-ba83-9d7fb29a5537

NULL Pointer Dereference in GitHub repository gpac/gpac prior to v2.1.0-DEV.