mirror of
https://gitlab.freedesktop.org/gstreamer/gstreamer.git
synced 2024-11-29 21:21:12 +00:00
47 lines
1.7 KiB
Markdown
47 lines
1.7 KiB
Markdown
|
# Security Advisory 2022-0002 (CVE-2022-1922, CVE-2022-1923, CVE-2022-1924, CVE-2022-1925)
|
||
|
|
||
|
<div class="vertical-table">
|
||
|
|
||
|
| | |
|
||
|
| ----------------- | --- |
|
||
|
| Summary | Potential heap overwrite in mkv demuxing using zlib/bz2/lzo decompression |
|
||
|
| Date | 2022-06-15 23:00 |
|
||
|
| Affected Versions | GStreamer gst-plugins-good 1.x < 1.20.3, 0.10.x |
|
||
|
| IDs | GStreamer-SA-2022-0002<br/>CVE-2022-1922<br/>CVE-2022-1923<br/>CVE-2022-1924<br/>CVE-2022-1925 |
|
||
|
|
||
|
</div>
|
||
|
|
||
|
## Details
|
||
|
|
||
|
Potential heap overwrite in the mkv demuxer when handling certain Matroska/WebM files in GStreamer versions before 1.20.3.
|
||
|
|
||
|
## Impact
|
||
|
|
||
|
It is possible for a malicious third party to trigger a crash in the application, and possibly also overwrite data on the heap.
|
||
|
|
||
|
## Solution
|
||
|
|
||
|
The gst-plugins-good 1.20.3 release addresses the issue. People using older branches of GStreamer should apply the patch and recompile.
|
||
|
|
||
|
## References
|
||
|
|
||
|
### The GStreamer project
|
||
|
|
||
|
- [https://gstreamer.freedesktop.org](https://gstreamer.freedesktop.org)
|
||
|
|
||
|
### CVE Database Entries
|
||
|
|
||
|
- [CVE-2022-1922](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1922)
|
||
|
- [CVE-2022-1923](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1923)
|
||
|
- [CVE-2022-1924](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1924)
|
||
|
- [CVE-2022-1925](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1925)
|
||
|
|
||
|
### GStreamer 1.20.3 release
|
||
|
|
||
|
- [Release Notes](/releases/1.20/#1.20.3)
|
||
|
- [GStreamer Plugins Good 1.20.3](/src/gst-plugins-good/gst-plugins-good-1.20.3.tar.xz)
|
||
|
|
||
|
### Patches
|
||
|
|
||
|
- [Patch](https://gitlab.freedesktop.org/gstreamer/gstreamer/-/commit/ad6012159acf18c6b5c0f4edf037e8c9a2dbc966.patch)
|