{"id":"MGASA-2021-0495","summary":"Updated ffmpeg packages fix security vulnerability","details":"FFmpeg 4.2 is affected by a Divide By Zero issue via libavcodec/aacpsy.c,\nwhich allows a remote malicious user to cause a Denial of Service.\n(CVE-2020-20446)\n\nFFmpeg 4.2 is affected by null pointer dereference passed as argument to\nlibavformat/aviobuf.c, which could cause a Denial of Service.\n(CVE-2020-20450)\n\nFFmpeg 4.2 is affected by a Divide By Zero issue via libavcodec/aaccoder,\nwhich allows a remote malicious user to cause a Denial of Service.\n(CVE-2020-20453)\n\nBuffer Overflow vulnerability exists in FFmpeg 4.1 via apng_do_inverse_blend\nin libavcodec/pngenc.c, which could let a remote malicious user cause a\nDenial of Service. (CVE-2020-21041)\n\nBuffer Overflow vulnerability in FFmpeg 4.2 in mov_write_video_tag due to\nthe out of bounds in libavformat/movenc.c, which could let a remote\nmalicious user obtain sensitive information, cause a Denial of Service, or\nexecute arbitrary code. (CVE-2020-22015)\n\nBuffer Overflow vulnerability in FFmpeg 4.2 at convolution_y_10bit in\nlibavfilter/vf_vmafmotion.c, which could let a remote malicious user cause\na Denial of Service. (CVE-2020-22019)\n\nBuffer Overflow vulnerability in FFmpeg 4.2 at filter_edges function in\nlibavfilter/vf_yadif.c, which could let a remote malicious user cause a\nDenial of Service. (CVE-2020-22021)\n\nA heap-based Buffer Overflow Vulnerability exists FFmpeg 4.2 at\nlibavfilter/vf_vmafmotion.c in convolution_y_8bit, which could let a remote\nmalicious user cause a Denial of Service. (CVE-2020-22033)\n\nA Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory leak\nin avcodec_alloc_context3 at options.c. (CVE-2020-22037)\n\nA Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory leak\nin the ff_v4l2_m2m_create_context function in v4l2_m2m.c. (CVE-2020-22038)\n\nA Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory leak\nis affected by: memory leak in the link_filter_inouts function in\nlibavfilter/graphparser.c. (CVE-2020-22042)\n\nlibavcodec/dnxhddec.c in FFmpeg 4.4 does not check the return value of the\ninit_vlc function, a similar issue to CVE-2013-0868. (CVE-2021-38114)\n\nadts_decode_extradata in libavformat/adtsenc.c in FFmpeg 4.4 does not check\nthe init_get_bits return value, which is a necessary step because the second\nargument to init_get_bits can be crafted. (CVE-2021-38171)\n\nFFmpeg version (git commit de8e6e67e7523e48bb27ac224a0b446df05e1640) suffers\nfrom a an assertion failure at src/libavutil/mathematics.c. (CVE-2021-38291)\n","modified":"2026-02-04T03:51:54.403546Z","published":"2021-10-29T19:32:22Z","related":["CVE-2020-20446","CVE-2020-20450","CVE-2020-20453","CVE-2020-21041","CVE-2020-22015","CVE-2020-22019","CVE-2020-22021","CVE-2020-22033","CVE-2020-22037","CVE-2020-22038","CVE-2020-22042","CVE-2021-38114","CVE-2021-38171","CVE-2021-38291"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2021-0495.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=29256"},{"type":"REPORT","url":"http://ffmpeg.org/security.html"},{"type":"REPORT","url":"https://lists.suse.com/pipermail/sle-security-updates/2021-July/009140.html"},{"type":"REPORT","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MM55YS6XXAKFK3J35CDODMYMAZO6JX3S/"},{"type":"REPORT","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RHYNSW2TAJSSTZPOYXQXGZDI6LYBWIT4/"},{"type":"REPORT","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UQYGWX5BP3LA5ULPF6C7O7URBPXWRNFJ/"},{"type":"REPORT","url":"https://www.debian.org/security/2021/dsa-4990"}],"affected":[{"package":{"name":"ffmpeg","ecosystem":"Mageia:8","purl":"pkg:rpm/mageia/ffmpeg?arch=source&distro=mageia-8"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.3.3-3.mga8"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2021-0495.json"}},{"package":{"name":"ffmpeg","ecosystem":"Mageia:8","purl":"pkg:rpm/mageia/ffmpeg?arch=source&distro=mageia-8"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.3.3-3.mga8.tainted"}]}],"ecosystem_specific":{"section":"tainted"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2021-0495.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}