openSUSE Security Update : ffmpeg2 (openSUSE-2017-631)

critical Nessus Plugin ID 100504

Language:

Synopsis

The remote openSUSE host is missing a security update.

Description

This update for ffmpeg2 fixes security issues, bugs, and enables AC3 and MP3 decoding.

The following vulnerabilities were fixed :

- CVE-2017-7863: heap-based buffer overflow (bsc#1034179)

- CVE-2017-7865: heap-based buffer overflow (bsc#1034177)

- CVE-2017-7866: stack-based buffer overflow (bsc#1034176)

- CVE-2016-10191: remote code execution (bsc#1022921)

- CVE-2016-10190: remote code execution (bsc#1022920)

- CVE-2016-10192: remote code execution (bsc#1022922)

- CVE-2016-9561: Huge amount memory allocated, resulting in DoS of ffmpeg (bsc#1015120)

The following functionality was added :

- Enable AC3 and MP3 decoding

ffmpeg was updated to 2.8.11, containing a number of upstream improvements and fixes.

Solution

Update the affected ffmpeg2 packages.

See Also

https://bugzilla.opensuse.org/show_bug.cgi?id=1015120

https://bugzilla.opensuse.org/show_bug.cgi?id=1022920

https://bugzilla.opensuse.org/show_bug.cgi?id=1022921

https://bugzilla.opensuse.org/show_bug.cgi?id=1022922

https://bugzilla.opensuse.org/show_bug.cgi?id=1034176

https://bugzilla.opensuse.org/show_bug.cgi?id=1034177

https://bugzilla.opensuse.org/show_bug.cgi?id=1034179

Plugin Details

Severity: Critical

ID: 100504

File Name: openSUSE-2017-631.nasl

Version: 3.4

Type: local

Agent: unix

Published: 5/30/2017

Updated: 1/19/2021

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:ffmpeg2-debugsource, p-cpe:/a:novell:opensuse:ffmpeg2-devel, p-cpe:/a:novell:opensuse:libavcodec56, p-cpe:/a:novell:opensuse:libavcodec56-32bit, p-cpe:/a:novell:opensuse:libavcodec56-debuginfo, p-cpe:/a:novell:opensuse:libavcodec56-debuginfo-32bit, p-cpe:/a:novell:opensuse:libavdevice56, p-cpe:/a:novell:opensuse:libavdevice56-32bit, p-cpe:/a:novell:opensuse:libavdevice56-debuginfo, p-cpe:/a:novell:opensuse:libavdevice56-debuginfo-32bit, p-cpe:/a:novell:opensuse:libavutil54, p-cpe:/a:novell:opensuse:libavutil54-32bit, p-cpe:/a:novell:opensuse:libavutil54-debuginfo, p-cpe:/a:novell:opensuse:libavutil54-debuginfo-32bit, p-cpe:/a:novell:opensuse:libpostproc53, p-cpe:/a:novell:opensuse:libpostproc53-32bit, p-cpe:/a:novell:opensuse:libpostproc53-debuginfo, p-cpe:/a:novell:opensuse:libpostproc53-debuginfo-32bit, p-cpe:/a:novell:opensuse:libswresample1, p-cpe:/a:novell:opensuse:libavfilter5, p-cpe:/a:novell:opensuse:libavfilter5-32bit, p-cpe:/a:novell:opensuse:libavfilter5-debuginfo, p-cpe:/a:novell:opensuse:libavfilter5-debuginfo-32bit, p-cpe:/a:novell:opensuse:libavformat56, p-cpe:/a:novell:opensuse:libavformat56-32bit, p-cpe:/a:novell:opensuse:libavformat56-debuginfo, p-cpe:/a:novell:opensuse:libavformat56-debuginfo-32bit, p-cpe:/a:novell:opensuse:libavresample2, p-cpe:/a:novell:opensuse:libavresample2-32bit, p-cpe:/a:novell:opensuse:libavresample2-debuginfo, p-cpe:/a:novell:opensuse:libavresample2-debuginfo-32bit, p-cpe:/a:novell:opensuse:libswresample1-32bit, p-cpe:/a:novell:opensuse:libswresample1-debuginfo, p-cpe:/a:novell:opensuse:libswresample1-debuginfo-32bit, p-cpe:/a:novell:opensuse:libswscale3, p-cpe:/a:novell:opensuse:libswscale3-32bit, p-cpe:/a:novell:opensuse:libswscale3-debuginfo, p-cpe:/a:novell:opensuse:libswscale3-debuginfo-32bit, cpe:/o:novell:opensuse:42.2

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Patch Publication Date: 5/29/2017

Reference Information

CVE: CVE-2016-10190, CVE-2016-10191, CVE-2016-10192, CVE-2016-9561, CVE-2017-7863, CVE-2017-7865, CVE-2017-7866