USN-5167-1: FFmpeg vulnerabilities
13 June 2022
Several security issues were fixed in FFmpeg.
Releases
Packages
- ffmpeg - Tools for transcoding, streaming and playing of multimedia files
Details
It was discovered that FFmpeg did not properly verify certain input when
processing video and audio files. An attacker could possibly use this to send
specially crafted input to the application, force a division by zero, and
cause a denial of service (application crash). (CVE-2020-20445, CVE-2020-20446,
CVE-2020-20453, CVE-2020-20892)
It was discovered that FFmpeg did not properly perform certain bit shift and
memory operations. An attacker could possibly use this issue to expose
sensitive information. (CVE-2020-20902)
It was discovered that FFmpeg did not properly perform memory management
operations in various of its functions. An attacker could possibly use this
issue to send specially crafted input to the application and cause a denial of
service (application crash) or execute arbitrary code. (CVE-2020-21041,
CVE-2020-20451, CVE-2020-21688, CVE-2020-21697, CVE-2020-22020,
CVE-2020-22021, CVE-2020-22022, CVE-2020-22025, CVE-2020-22031,
CVE-2020-22032, CVE-2020-22037, CVE-2020-22040, CVE-2020-22041,
CVE-2020-22042, CVE-2020-22044)
It was discovered that FFmpeg did not properly perform memory management
operations in various of its functions. An attacker could possibly use this
issue to send specially crafted input to the application and cause a denial of
service (application crash) or execute arbitrary code. (CVE-2020-22016,
CVE-2020-22046, CVE-2020-22049, CVE-2020-22054)
It was discovered that FFmpeg did not properly perform memory management
operations in various of its functions. An attacker could possibly use this
issue to send specially crafted input to the application and cause a denial of
service (application crash) or execute arbitrary code. (CVE-2020-35965)
It was discovered that FFmpeg did not properly handle data assigned to the tty
demuxer. An attacker could possibly use this issue to send specially crafted
input to the application and expose sensitive information. (CVE-2021-3566)
It was discovered that FFmpeg did not perform checks on function return
values when encoding and formatting input video and audio files. An attacker
could possibly use this issue to cause a denial of service (application crash)
or execute arbitrary code. (CVE-2021-38114, CVE-2021-38171)
It was discovered that FFmpeg did not properly sanitize function returned data
when calculating frame duration values. An attacker could possibly use this
issue to cause an assertion failure and then cause a denial of service
(application crash). (CVE-2021-38291)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 16.04
-
libswresample-ffmpeg1
-
7:2.8.17-0ubuntu0.1+esm4
Available with Ubuntu Pro
-
libavresample-ffmpeg2
-
7:2.8.17-0ubuntu0.1+esm4
Available with Ubuntu Pro
-
libavcodec-extra
-
7:2.8.17-0ubuntu0.1+esm4
Available with Ubuntu Pro
-
libswscale-ffmpeg3
-
7:2.8.17-0ubuntu0.1+esm4
Available with Ubuntu Pro
-
libavfilter-ffmpeg5
-
7:2.8.17-0ubuntu0.1+esm4
Available with Ubuntu Pro
-
libpostproc-ffmpeg53
-
7:2.8.17-0ubuntu0.1+esm4
Available with Ubuntu Pro
-
libavcodec-ffmpeg56
-
7:2.8.17-0ubuntu0.1+esm4
Available with Ubuntu Pro
-
libavformat-ffmpeg56
-
7:2.8.17-0ubuntu0.1+esm4
Available with Ubuntu Pro
-
libavcodec-ffmpeg-extra56
-
7:2.8.17-0ubuntu0.1+esm4
Available with Ubuntu Pro
-
ffmpeg
-
7:2.8.17-0ubuntu0.1+esm4
Available with Ubuntu Pro
-
libavutil-ffmpeg54
-
7:2.8.17-0ubuntu0.1+esm4
Available with Ubuntu Pro
-
libavdevice-ffmpeg56
-
7:2.8.17-0ubuntu0.1+esm4
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References
- CVE-2020-35965
- CVE-2020-22031
- CVE-2021-38171
- CVE-2020-20902
- CVE-2020-20892
- CVE-2020-21697
- CVE-2021-3566
- CVE-2020-22049
- CVE-2020-22044
- CVE-2021-38114
- CVE-2020-22020
- CVE-2020-22021
- CVE-2020-22041
- CVE-2020-20453
- CVE-2020-22046
- CVE-2020-22025
- CVE-2020-22040
- CVE-2020-22032
- CVE-2020-20446
- CVE-2020-21041
- CVE-2020-22022
- CVE-2020-22016
- CVE-2020-21688
- CVE-2020-20451
- CVE-2020-22037
- CVE-2020-22054
- CVE-2020-22042
- CVE-2021-38291
- CVE-2020-20445
Related notices
- USN-5472-1: libswresample-dev, libavcodec-extra57, libavfilter-extra6, libpostproc-dev, libavfilter-extra7, libavutil56, ffmpeg-doc, libswscale5, libavdevice-dev, libavcodec-dev, libavdevice57, libavfilter7, libavutil-dev, libavformat-extra58, libavresample3, libavresample-dev, libavfilter-extra, libavformat-extra, libavcodec58, libavcodec57, libswscale-dev, libavfilter6, libswresample2, libavcodec-extra58, libswresample3, libavformat57, libpostproc54, libswscale4, libpostproc55, libavcodec-extra, libavutil55, ffmpeg, libavformat58, libavresample4, libavfilter-dev, libavdevice58, libavformat-dev
- USN-6430-1: libavfilter-ffmpeg5, libavcodec-ffmpeg-extra56, libswresample-dev, libavcodec-extra57, libavfilter-extra6, libpostproc-dev, libavfilter-extra7, libavutil56, ffmpeg-doc, libswscale5, libavdevice-dev, libavdevice-ffmpeg56, libavcodec-dev, libavdevice57, libavfilter7, libavformat-ffmpeg56, libavutil-dev, libavresample3, libavresample-dev, libav-tools, libavfilter-extra, libavcodec58, libavcodec57, libswscale-dev, libavfilter6, libswresample2, libavcodec-extra58, libswresample3, libavformat57, libpostproc54, libpostproc-ffmpeg53, libswscale4, libpostproc55, libavcodec-extra, libavutil55, ffmpeg, libavformat58, libavcodec-ffmpeg56, libswresample-ffmpeg1, libavresample4, libswscale-ffmpeg3, libavfilter-dev, libavresample-ffmpeg2, libavdevice58, libavutil-ffmpeg54, libavformat-dev