Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

openSUSE-SU-2017:2501-1

Опубликовано: 15 сент. 2017
Источник: suse-cvrf

Описание

Security update for ffmpeg, ffmpeg2

This update introduces lame and twolame.

For ffmpeg2 it updates to version 2.8.13 and fixes several issues.

These security issues were fixed:

  • CVE-2017-14058: The read_data function in libavformat/hls.c did not restrict reload attempts for an insufficient list, which allowed remote attackers to cause a denial of service (infinite loop) (bsc#1056762)
  • CVE-2017-14057: In asf_read_marker() due to lack of an EOF (End of File) check might have caused huge CPU and memory consumption. When a crafted ASF file, which claims a large 'name_len' or 'count' field in the header but did not contain sufficient backing data, was provided, the loops over the name and markers would consume huge CPU and memory resources, since there is no EOF check inside these loops (bsc#1056761)
  • CVE-2017-14059: A DoS in cine_read_header() due to lack of an EOF check might have caused huge CPU and memory consumption. When a crafted CINE file, which claims a large 'duration' field in the header but did not contain sufficient backing data, was provided, the image-offset parsing loop would consume huge CPU and memory resources, since there is no EOF check inside the loop (bsc#1056763)
  • CVE-2017-14056: A DoS in rl2_read_header() due to lack of an EOF (End of File) check might have caused huge CPU and memory consumption. When a crafted RL2 file, which claims a large 'frame_count' field in the header but did not contain sufficient backing data, was provided, the loops (for offset and size tables) would consume huge CPU and memory resources, since there is no EOF check inside these loops (bsc#1056760)
  • CVE-2017-14055: a DoS in mv_read_header() due to lack of an EOF (End of File) check might have caused huge CPU and memory consumption. When a crafted MV file, which claims a large 'nb_frames' field in the header but did not contain sufficient backing data, was provided, the loop over the frames would consume huge CPU and memory resources, since there is no EOF check inside the loop (bsc#1056766)
  • boo#1046211: Lots of integer overflow fixes
  • CVE-2017-14169: In the mxf_read_primer_pack function an integer signedness error have might occured when a crafted file, which claims a large 'item_num' field such as 0xffffffff, was provided. As a result, the variable 'item_num' turns negative, bypassing the check for a large value (bsc#1057536)
  • CVE-2017-14170: Prevent DoS in mxf_read_index_entry_array() due to lack of an EOF (End of File) check that might have caused huge CPU consumption. When a crafted MXF file, which claims a large 'nb_index_entries' field in the header but did not contain sufficient backing data, was provided, the loop would consume huge CPU resources, since there was no EOF check inside the loop. Moreover, this big loop can be invoked multiple times if there is more than one applicable data segment in the crafted MXF file (bsc#1057537)
  • CVE-2017-14171: Prevent DoS in nsv_parse_NSVf_header() due to lack of an EOF (End of File) check taht might have caused huge CPU consumption. When a crafted NSV file, which claims a large 'table_entries_used' field in the header but did not contain sufficient backing data, was provided, the loop over 'table_entries_used' would consume huge CPU resources, since there was no EOF check inside the loop (bsc#1057539)
  • !: CVE-2017-14223: Prevent DoS in asf_build_simple_index() due to lack of an EOF (End of File) check that might have caused huge CPU consumption. When a crafted ASF file, which claims a large 'ict' field in the header but did not contain sufficient backing data, was provided, the for loop would consume huge CPU and memory resources, since there was no EOF check inside the loop (bsc#1058019)
  • !: CVE-2017-14222: Prevent DoS in read_tfra() due to lack of an EOF (End of File) check that might have caused huge CPU and memory consumption. When a crafted MOV file, which claims a large 'item_count' field in the header but did not contain sufficient backing data, was provided, the loop would consume huge CPU and memory resources, since there was no EOF check inside the loop (bsc#1058020)

These non-security issues were fixed:

  • Unconditionalize celt, ass, openjpeg, webp, libva, vdpau.
  • Build unconditionally with lame and twolame

For ffmpeg it updates to version 3.3.4 and fixes several issues.

These security issues were fixed:

  • CVE-2017-14058: The read_data function in libavformat/hls.c did not restrict reload attempts for an insufficient list, which allowed remote attackers to cause a denial of service (infinite loop) (bsc#1056762)
  • CVE-2017-14057: In asf_read_marker() due to lack of an EOF (End of File) check might have caused huge CPU and memory consumption. When a crafted ASF file, which claims a large 'name_len' or 'count' field in the header but did not contain sufficient backing data, was provided, the loops over the name and markers would consume huge CPU and memory resources, since there is no EOF check inside these loops (bsc#1056761)
  • CVE-2017-14059: A DoS in cine_read_header() due to lack of an EOF check might have caused huge CPU and memory consumption. When a crafted CINE file, which claims a large 'duration' field in the header but did not contain sufficient backing data, was provided, the image-offset parsing loop would consume huge CPU and memory resources, since there is no EOF check inside the loop (bsc#1056763)
  • CVE-2017-14054: A DoS in ivr_read_header() due to lack of an EOF (End of File) check might have caused huge CPU consumption. When a crafted IVR file, which claims a large 'len' field in the header but did not contain sufficient backing data, was provided, the first type==4 loop would consume huge CPU resources, since there is no EOF check inside the loop (bsc#1056765)
  • CVE-2017-14056: A DoS in rl2_read_header() due to lack of an EOF (End of File) check might have caused huge CPU and memory consumption. When a crafted RL2 file, which claims a large 'frame_count' field in the header but did not contain sufficient backing data, was provided, the loops (for offset and size tables) would consume huge CPU and memory resources, since there is no EOF check inside these loops (bsc#1056760)
  • CVE-2017-14055: a DoS in mv_read_header() due to lack of an EOF (End of File) check might have caused huge CPU and memory consumption. When a crafted MV file, which claims a large 'nb_frames' field in the header but did not contain sufficient backing data, was provided, the loop over the frames would consume huge CPU and memory resources, since there is no EOF check inside the loop (bsc#1056766)
  • CVE-2017-11399: Integer overflow in the ape_decode_frame function allowed remote attackers to cause a denial of service (out-of-array access and application crash) or possibly have unspecified other impact via a crafted APE file (bsc#1049095)
  • CVE-2017-14171: Prevent DoS in nsv_parse_NSVf_header() due to lack of an EOF (End of File) check taht might have caused huge CPU consumption. When a crafted NSV file, which claims a large 'table_entries_used' field in the header but did not contain sufficient backing data, was provided, the loop over 'table_entries_used' would consume huge CPU resources, since there was no EOF check inside the loop (bsc#1057539)
  • CVE-2017-14170: Prevent DoS in mxf_read_index_entry_array() due to lack of an EOF (End of File) check that might have caused huge CPU consumption. When a crafted MXF file, which claims a large 'nb_index_entries' field in the header but did not contain sufficient backing data, was provided, the loop would consume huge CPU resources, since there was no EOF check inside the loop. Moreover, this big loop can be invoked multiple times if there is more than one applicable data segment in the crafted MXF file (bsc#1057537)
  • CVE-2017-14169: In the mxf_read_primer_pack function an integer signedness error have might occured when a crafted file, which claims a large 'item_num' field such as 0xffffffff, was provided. As a result, the variable 'item_num' turns negative, bypassing the check for a large value (bsc#1057536)
  • CVE-2017-14225: The av_color_primaries_name function may have returned a NULL pointer depending on a value contained in a file, but callers did not anticipate this, leading to a NULL pointer dereference (bsc#1058018)
  • CVE-2017-14223: Prevent DoS in asf_build_simple_index() due to lack of an EOF (End of File) check that might have caused huge CPU consumption. When a crafted ASF file, which claims a large 'ict' field in the header but did not contain sufficient backing data, was provided, the for loop would consume huge CPU and memory resources, since there was no EOF check inside the loop (bsc#1058019)
  • CVE-2017-14222: Prevent DoS in read_tfra() due to lack of an EOF (End of File) check that might have caused huge CPU and memory consumption. When a crafted MOV file, which claims a large 'item_count' field in the header but did not contain sufficient backing data, was provided, the loop would consume huge CPU and memory resources, since there was no EOF check inside the loop (bsc#1058020)

It also includes various fixes for integer overflows and too-large bit shifts that didn't receive a CVE.

These non-security issues were fixed:

  • Unconditionalize celt, ass, openjpeg, webp, netcdf, libva, vdpau.
  • Build unconditionally with lame and twolame
  • boo#1041794: Disable cuda extensions
  • Add additional checks to ensure MPEG is off

Список пакетов

openSUSE Leap 42.2
ffmpeg-3.3.4-6.16.1
ffmpeg2-2.8.13-25.10.1
ffmpeg2-devel-2.8.13-25.10.1
lame-3.99.5-2.1
lame-doc-3.99.5-2.1
lame-mp3rtp-3.99.5-2.1
libavcodec-devel-3.3.4-6.16.1
libavcodec56-2.8.13-25.10.1
libavcodec56-32bit-2.8.13-25.10.1
libavcodec57-3.3.4-6.16.1
libavcodec57-32bit-3.3.4-6.16.1
libavdevice-devel-3.3.4-6.16.1
libavdevice56-2.8.13-25.10.1
libavdevice56-32bit-2.8.13-25.10.1
libavdevice57-3.3.4-6.16.1
libavdevice57-32bit-3.3.4-6.16.1
libavfilter-devel-3.3.4-6.16.1
libavfilter5-2.8.13-25.10.1
libavfilter5-32bit-2.8.13-25.10.1
libavfilter6-3.3.4-6.16.1
libavfilter6-32bit-3.3.4-6.16.1
libavformat-devel-3.3.4-6.16.1
libavformat56-2.8.13-25.10.1
libavformat56-32bit-2.8.13-25.10.1
libavformat57-3.3.4-6.16.1
libavformat57-32bit-3.3.4-6.16.1
libavresample-devel-3.3.4-6.16.1
libavresample2-2.8.13-25.10.1
libavresample2-32bit-2.8.13-25.10.1
libavresample3-3.3.4-6.16.1
libavresample3-32bit-3.3.4-6.16.1
libavutil-devel-3.3.4-6.16.1
libavutil54-2.8.13-25.10.1
libavutil54-32bit-2.8.13-25.10.1
libavutil55-3.3.4-6.16.1
libavutil55-32bit-3.3.4-6.16.1
libmp3lame-devel-3.99.5-2.1
libmp3lame0-3.99.5-2.1
libmp3lame0-32bit-3.99.5-2.1
libpostproc-devel-3.3.4-6.16.1
libpostproc53-2.8.13-25.10.1
libpostproc53-32bit-2.8.13-25.10.1
libpostproc54-3.3.4-6.16.1
libpostproc54-32bit-3.3.4-6.16.1
libswresample-devel-3.3.4-6.16.1
libswresample1-2.8.13-25.10.1
libswresample1-32bit-2.8.13-25.10.1
libswresample2-3.3.4-6.16.1
libswresample2-32bit-3.3.4-6.16.1
libswscale-devel-3.3.4-6.16.1
libswscale3-2.8.13-25.10.1
libswscale3-32bit-2.8.13-25.10.1
libswscale4-3.3.4-6.16.1
libswscale4-32bit-3.3.4-6.16.1
libtwolame-devel-0.3.13-2.1
libtwolame0-0.3.13-2.1
libtwolame0-32bit-0.3.13-2.1
twolame-0.3.13-2.1

Описание

Integer overflow in the ape_decode_frame function in libavcodec/apedec.c in FFmpeg 2.4 through 3.3.2 allows remote attackers to cause a denial of service (out-of-array access and application crash) or possibly have unspecified other impact via a crafted APE file.


Затронутые продукты
openSUSE Leap 42.2:ffmpeg-3.3.4-6.16.1
openSUSE Leap 42.2:ffmpeg2-2.8.13-25.10.1
openSUSE Leap 42.2:ffmpeg2-devel-2.8.13-25.10.1
openSUSE Leap 42.2:lame-3.99.5-2.1

Ссылки

Описание

In libavformat/rmdec.c in FFmpeg 3.3.3, a DoS in ivr_read_header() due to lack of an EOF (End of File) check might cause huge CPU consumption. When a crafted IVR file, which claims a large "len" field in the header but does not contain sufficient backing data, is provided, the first type==4 loop would consume huge CPU resources, since there is no EOF check inside the loop.


Затронутые продукты
openSUSE Leap 42.2:ffmpeg-3.3.4-6.16.1
openSUSE Leap 42.2:ffmpeg2-2.8.13-25.10.1
openSUSE Leap 42.2:ffmpeg2-devel-2.8.13-25.10.1
openSUSE Leap 42.2:lame-3.99.5-2.1

Ссылки

Описание

In libavformat/mvdec.c in FFmpeg 3.3.3, a DoS in mv_read_header() due to lack of an EOF (End of File) check might cause huge CPU and memory consumption. When a crafted MV file, which claims a large "nb_frames" field in the header but does not contain sufficient backing data, is provided, the loop over the frames would consume huge CPU and memory resources, since there is no EOF check inside the loop.


Затронутые продукты
openSUSE Leap 42.2:ffmpeg-3.3.4-6.16.1
openSUSE Leap 42.2:ffmpeg2-2.8.13-25.10.1
openSUSE Leap 42.2:ffmpeg2-devel-2.8.13-25.10.1
openSUSE Leap 42.2:lame-3.99.5-2.1

Ссылки

Описание

In libavformat/rl2.c in FFmpeg 3.3.3, a DoS in rl2_read_header() due to lack of an EOF (End of File) check might cause huge CPU and memory consumption. When a crafted RL2 file, which claims a large "frame_count" field in the header but does not contain sufficient backing data, is provided, the loops (for offset and size tables) would consume huge CPU and memory resources, since there is no EOF check inside these loops.


Затронутые продукты
openSUSE Leap 42.2:ffmpeg-3.3.4-6.16.1
openSUSE Leap 42.2:ffmpeg2-2.8.13-25.10.1
openSUSE Leap 42.2:ffmpeg2-devel-2.8.13-25.10.1
openSUSE Leap 42.2:lame-3.99.5-2.1

Ссылки

Описание

In FFmpeg 3.3.3, a DoS in asf_read_marker() due to lack of an EOF (End of File) check might cause huge CPU and memory consumption. When a crafted ASF file, which claims a large "name_len" or "count" field in the header but does not contain sufficient backing data, is provided, the loops over the name and markers would consume huge CPU and memory resources, since there is no EOF check inside these loops.


Затронутые продукты
openSUSE Leap 42.2:ffmpeg-3.3.4-6.16.1
openSUSE Leap 42.2:ffmpeg2-2.8.13-25.10.1
openSUSE Leap 42.2:ffmpeg2-devel-2.8.13-25.10.1
openSUSE Leap 42.2:lame-3.99.5-2.1

Ссылки

Описание

In FFmpeg 2.4 and 3.3.3, the read_data function in libavformat/hls.c does not restrict reload attempts for an insufficient list, which allows remote attackers to cause a denial of service (infinite loop).


Затронутые продукты
openSUSE Leap 42.2:ffmpeg-3.3.4-6.16.1
openSUSE Leap 42.2:ffmpeg2-2.8.13-25.10.1
openSUSE Leap 42.2:ffmpeg2-devel-2.8.13-25.10.1
openSUSE Leap 42.2:lame-3.99.5-2.1

Ссылки

Описание

In FFmpeg 3.3.3, a DoS in cine_read_header() due to lack of an EOF check might cause huge CPU and memory consumption. When a crafted CINE file, which claims a large "duration" field in the header but does not contain sufficient backing data, is provided, the image-offset parsing loop would consume huge CPU and memory resources, since there is no EOF check inside the loop.


Затронутые продукты
openSUSE Leap 42.2:ffmpeg-3.3.4-6.16.1
openSUSE Leap 42.2:ffmpeg2-2.8.13-25.10.1
openSUSE Leap 42.2:ffmpeg2-devel-2.8.13-25.10.1
openSUSE Leap 42.2:lame-3.99.5-2.1

Ссылки

Описание

In the mxf_read_primer_pack function in libavformat/mxfdec.c in FFmpeg 3.3.3 -> 2.4, an integer signedness error might occur when a crafted file, which claims a large "item_num" field such as 0xffffffff, is provided. As a result, the variable "item_num" turns negative, bypassing the check for a large value.


Затронутые продукты
openSUSE Leap 42.2:ffmpeg-3.3.4-6.16.1
openSUSE Leap 42.2:ffmpeg2-2.8.13-25.10.1
openSUSE Leap 42.2:ffmpeg2-devel-2.8.13-25.10.1
openSUSE Leap 42.2:lame-3.99.5-2.1

Ссылки

Описание

In libavformat/mxfdec.c in FFmpeg 3.3.3 -> 2.4, a DoS in mxf_read_index_entry_array() due to lack of an EOF (End of File) check might cause huge CPU consumption. When a crafted MXF file, which claims a large "nb_index_entries" field in the header but does not contain sufficient backing data, is provided, the loop would consume huge CPU resources, since there is no EOF check inside the loop. Moreover, this big loop can be invoked multiple times if there is more than one applicable data segment in the crafted MXF file.


Затронутые продукты
openSUSE Leap 42.2:ffmpeg-3.3.4-6.16.1
openSUSE Leap 42.2:ffmpeg2-2.8.13-25.10.1
openSUSE Leap 42.2:ffmpeg2-devel-2.8.13-25.10.1
openSUSE Leap 42.2:lame-3.99.5-2.1

Ссылки

Описание

In libavformat/nsvdec.c in FFmpeg 2.4 and 3.3.3, a DoS in nsv_parse_NSVf_header() due to lack of an EOF (End of File) check might cause huge CPU consumption. When a crafted NSV file, which claims a large "table_entries_used" field in the header but does not contain sufficient backing data, is provided, the loop over 'table_entries_used' would consume huge CPU resources, since there is no EOF check inside the loop.


Затронутые продукты
openSUSE Leap 42.2:ffmpeg-3.3.4-6.16.1
openSUSE Leap 42.2:ffmpeg2-2.8.13-25.10.1
openSUSE Leap 42.2:ffmpeg2-devel-2.8.13-25.10.1
openSUSE Leap 42.2:lame-3.99.5-2.1

Ссылки

Описание

In libavformat/mov.c in FFmpeg 3.3.3, a DoS in read_tfra() due to lack of an EOF (End of File) check might cause huge CPU and memory consumption. When a crafted MOV file, which claims a large "item_count" field in the header but does not contain sufficient backing data, is provided, the loop would consume huge CPU and memory resources, since there is no EOF check inside the loop.


Затронутые продукты
openSUSE Leap 42.2:ffmpeg-3.3.4-6.16.1
openSUSE Leap 42.2:ffmpeg2-2.8.13-25.10.1
openSUSE Leap 42.2:ffmpeg2-devel-2.8.13-25.10.1
openSUSE Leap 42.2:lame-3.99.5-2.1

Ссылки

Описание

In libavformat/asfdec_f.c in FFmpeg 3.3.3, a DoS in asf_build_simple_index() due to lack of an EOF (End of File) check might cause huge CPU consumption. When a crafted ASF file, which claims a large "ict" field in the header but does not contain sufficient backing data, is provided, the for loop would consume huge CPU and memory resources, since there is no EOF check inside the loop.


Затронутые продукты
openSUSE Leap 42.2:ffmpeg-3.3.4-6.16.1
openSUSE Leap 42.2:ffmpeg2-2.8.13-25.10.1
openSUSE Leap 42.2:ffmpeg2-devel-2.8.13-25.10.1
openSUSE Leap 42.2:lame-3.99.5-2.1

Ссылки

Описание

The av_color_primaries_name function in libavutil/pixdesc.c in FFmpeg 3.3.3 may return a NULL pointer depending on a value contained in a file, but callers do not anticipate this, as demonstrated by the avcodec_string function in libavcodec/utils.c, leading to a NULL pointer dereference. (It is also conceivable that there is security relevance for a NULL pointer dereference in av_color_primaries_name calls within the ffprobe command-line program.)


Затронутые продукты
openSUSE Leap 42.2:ffmpeg-3.3.4-6.16.1
openSUSE Leap 42.2:ffmpeg2-2.8.13-25.10.1
openSUSE Leap 42.2:ffmpeg2-devel-2.8.13-25.10.1
openSUSE Leap 42.2:lame-3.99.5-2.1

Ссылки