Bug#872517: ffmpeg: CVE-2017-7206: heap-based buffer over-read in embed libav

James Cowgill jcowgill at debian.org
Fri Aug 18 10:41:31 UTC 2017


Hi,

On 18/08/17 03:46, Luciano Bello wrote:
> Package: ffmpeg
> X-Debbugs-CC: team at security.debian.org secure-testing-
> team at lists.alioth.debian.org
> Severity: grave
> Tags: security
> 
> Hi,
> 
> the following vulnerability was published for libav (which is embed in 
> ffmpeg).
> 
> CVE-2017-7206[0]:
> | The ff_h2645_extract_rbsp function in libavcodec in libav 9.21 allows
> | remote attackers to cause a denial of service (heap-based buffer
> | over-read) or obtain sensitive information from process memory via a
> | crafted h264 video file.
> 
> If you fix the vulnerability please also make sure to include the
> CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
> 
> For further information see:
> 
> [0] https://security-tracker.debian.org/tracker/CVE-2017-7206
>     https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7206

The testcases from the libav bugreport don't seem to cause ffmpeg 3.3.3
or 3.2.5 to crash. However, the ffmpeg code looks very similar to the
code in libav before the fix, so ffmpeg might be affected but require a
slightly different testcase?

Thanks,
James

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <http://lists.alioth.debian.org/pipermail/pkg-multimedia-maintainers/attachments/20170818/266d5030/attachment.sig>


More information about the pkg-multimedia-maintainers mailing list