Lucene search

K
ubuntuUbuntuUSN-6449-1
HistoryOct 24, 2023 - 12:00 a.m.

FFmpeg vulnerabilities

2023-10-2400:00:00
ubuntu.com
78
ubuntu
ffmpeg
memory leak
denial of service
integer overflow
cve-2020-22038
cve-2020-20898
cve-2021-38090
cve-2021-38091
cve-2021-38092
cve-2021-38093
cve-2021-38094
cve-2022-48434
multimedia files
streaming

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.2 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

65.1%

Releases

  • Ubuntu 22.04 LTS
  • Ubuntu 20.04 LTS
  • Ubuntu 18.04 ESM

Packages

  • ffmpeg - Tools for transcoding, streaming and playing of multimedia files

Details

It was discovered that FFmpeg incorrectly managed memory resulting
in a memory leak. An attacker could possibly use this issue to cause
a denial of service via application crash. This issue only
affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2020-22038)

It was discovered that FFmpeg incorrectly handled certain input files,
leading to an integer overflow. An attacker could possibly use this issue
to cause a denial of service via application crash. This issue only
affected Ubuntu 20.04 LTS. (CVE-2020-20898, CVE-2021-38090,
CVE-2021-38091, CVE-2021-38092, CVE-2021-38093, CVE-2021-38094)

It was discovered that FFmpeg incorrectly managed memory, resulting in
a memory leak. If a user or automated system were tricked into
processing a specially crafted input file, a remote attacker could
possibly use this issue to cause a denial of service, or execute
arbitrary code. (CVE-2022-48434)

OSVersionArchitecturePackageVersionFilename
Ubuntu22.04noarchffmpeg< 7:4.4.2-0ubuntu0.22.04.1+esm2UNKNOWN
Ubuntu22.04noarchffmpeg< 7:4.4.2-0ubuntu0.22.04.1UNKNOWN
Ubuntu22.04noarchffmpeg-dbgsym< 7:4.4.2-0ubuntu0.22.04.1UNKNOWN
Ubuntu22.04noarchffmpeg-doc< 7:4.4.2-0ubuntu0.22.04.1UNKNOWN
Ubuntu22.04noarchlibavcodec-dev< 7:4.4.2-0ubuntu0.22.04.1UNKNOWN
Ubuntu22.04noarchlibavcodec-extra< 7:4.4.2-0ubuntu0.22.04.1UNKNOWN
Ubuntu22.04noarchlibavcodec-extra58< 7:4.4.2-0ubuntu0.22.04.1UNKNOWN
Ubuntu22.04noarchlibavcodec-extra58-dbgsym< 7:4.4.2-0ubuntu0.22.04.1UNKNOWN
Ubuntu22.04noarchlibavcodec58< 7:4.4.2-0ubuntu0.22.04.1UNKNOWN
Ubuntu22.04noarchlibavcodec58-dbgsym< 7:4.4.2-0ubuntu0.22.04.1UNKNOWN
Rows per page:
1-10 of 1521

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.2 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

65.1%