Risk | High |
Patch available | YES |
Number of vulnerabilities | 10 |
CVE-ID | CVE-2020-20891 CVE-2020-20892 CVE-2020-20896 CVE-2020-20902 CVE-2020-22037 CVE-2020-35965 CVE-2021-3566 CVE-2021-38092 CVE-2021-38093 CVE-2021-38094 |
CWE-ID | CWE-119 CWE-369 CWE-476 CWE-125 CWE-401 CWE-787 CWE-20 CWE-190 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
SUSE Linux Enterprise Workstation Extension Operating systems & Components / Operating system SUSE Linux Enterprise Module for Desktop Applications Operating systems & Components / Operating system SUSE Linux Enterprise Module for Packagehub Subpackages Operating systems & Components / Operating system package or component libavresample3-32bit-debuginfo Operating systems & Components / Operating system package or component libavresample3-32bit Operating systems & Components / Operating system package or component libavresample3-64bit-debuginfo Operating systems & Components / Operating system package or component libavresample3-64bit Operating systems & Components / Operating system package or component libswscale4-debuginfo Operating systems & Components / Operating system package or component libswscale4 Operating systems & Components / Operating system package or component libswscale-devel Operating systems & Components / Operating system package or component libswresample2-debuginfo Operating systems & Components / Operating system package or component libswresample2 Operating systems & Components / Operating system package or component libswresample-devel Operating systems & Components / Operating system package or component libpostproc54-debuginfo Operating systems & Components / Operating system package or component libpostproc54 Operating systems & Components / Operating system package or component libpostproc-devel Operating systems & Components / Operating system package or component libavutil55-debuginfo Operating systems & Components / Operating system package or component libavutil55 Operating systems & Components / Operating system package or component libavutil-devel Operating systems & Components / Operating system package or component libavformat57-debuginfo Operating systems & Components / Operating system package or component libavformat57 Operating systems & Components / Operating system package or component libavcodec57-debuginfo Operating systems & Components / Operating system package or component libavcodec57 Operating systems & Components / Operating system package or component libavfilter6-debuginfo Operating systems & Components / Operating system package or component libavfilter6 Operating systems & Components / Operating system package or component libavdevice57-debuginfo Operating systems & Components / Operating system package or component libavdevice57 Operating systems & Components / Operating system package or component ffmpeg Operating systems & Components / Operating system package or component libavresample3-debuginfo Operating systems & Components / Operating system package or component libavresample3 Operating systems & Components / Operating system package or component libavresample-devel Operating systems & Components / Operating system package or component libavformat-devel Operating systems & Components / Operating system package or component libavcodec-devel Operating systems & Components / Operating system package or component ffmpeg-debugsource Operating systems & Components / Operating system package or component ffmpeg-debuginfo Operating systems & Components / Operating system package or component |
Vendor | SUSE |
Security Bulletin
This security bulletin contains information about 10 vulnerabilities.
EUVDB-ID: #VU70606
Risk: High
CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2020-20891
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error within the config_input() function in libavfilter/vf_gblur.c in FFmpeg. A remote attacker can trigger memory corruption and execute arbitrary code on the target system.
Update the affected package ffmpeg to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Workstation Extension: 15-SP2 - 15-SP3
SUSE Linux Enterprise Module for Packagehub Subpackages: 15-SP2 - 15-SP3
SUSE Linux Enterprise Module for Desktop Applications: 15-SP2 - 15-SP3
libavresample3-32bit-debuginfo: before 3.4.2-11.17.1
libavresample3-32bit: before 3.4.2-11.17.1
libavresample3-64bit-debuginfo: before 3.4.2-11.17.1
libavresample3-64bit: before 3.4.2-11.17.1
libswscale4-debuginfo: before 3.4.2-11.17.1
libswscale4: before 3.4.2-11.17.1
libswscale-devel: before 3.4.2-11.17.1
libswresample2-debuginfo: before 3.4.2-11.17.1
libswresample2: before 3.4.2-11.17.1
libswresample-devel: before 3.4.2-11.17.1
libpostproc54-debuginfo: before 3.4.2-11.17.1
libpostproc54: before 3.4.2-11.17.1
libpostproc-devel: before 3.4.2-11.17.1
libavutil55-debuginfo: before 3.4.2-11.17.1
libavutil55: before 3.4.2-11.17.1
libavutil-devel: before 3.4.2-11.17.1
libavformat57-debuginfo: before 3.4.2-11.17.1
libavformat57: before 3.4.2-11.17.1
libavcodec57-debuginfo: before 3.4.2-11.17.1
libavcodec57: before 3.4.2-11.17.1
libavfilter6-debuginfo: before 3.4.2-11.17.1
libavfilter6: before 3.4.2-11.17.1
libavdevice57-debuginfo: before 3.4.2-11.17.1
libavdevice57: before 3.4.2-11.17.1
ffmpeg: before 3.4.2-11.17.1
libavresample3-debuginfo: before 3.4.2-11.17.1
libavresample3: before 3.4.2-11.17.1
libavresample-devel: before 3.4.2-11.17.1
libavformat-devel: before 3.4.2-11.17.1
libavcodec-devel: before 3.4.2-11.17.1
ffmpeg-debugsource: before 3.4.2-11.17.1
ffmpeg-debuginfo: before 3.4.2-11.17.1
CPE2.3https://www.suse.com/support/update/announcement/2021/suse-su-20213521-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU70605
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2020-20892
CWE-ID:
CWE-369 - Divide By Zero
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service attack.
The vulnerability exists due to a division by zero error within the filter_frame() function in libavfilter/vf_lenscorrection.c in FFmpeg. A remote attacker can pass specially crafted data to the application and crash it.
Update the affected package ffmpeg to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Workstation Extension: 15-SP2 - 15-SP3
SUSE Linux Enterprise Module for Packagehub Subpackages: 15-SP2 - 15-SP3
SUSE Linux Enterprise Module for Desktop Applications: 15-SP2 - 15-SP3
libavresample3-32bit-debuginfo: before 3.4.2-11.17.1
libavresample3-32bit: before 3.4.2-11.17.1
libavresample3-64bit-debuginfo: before 3.4.2-11.17.1
libavresample3-64bit: before 3.4.2-11.17.1
libswscale4-debuginfo: before 3.4.2-11.17.1
libswscale4: before 3.4.2-11.17.1
libswscale-devel: before 3.4.2-11.17.1
libswresample2-debuginfo: before 3.4.2-11.17.1
libswresample2: before 3.4.2-11.17.1
libswresample-devel: before 3.4.2-11.17.1
libpostproc54-debuginfo: before 3.4.2-11.17.1
libpostproc54: before 3.4.2-11.17.1
libpostproc-devel: before 3.4.2-11.17.1
libavutil55-debuginfo: before 3.4.2-11.17.1
libavutil55: before 3.4.2-11.17.1
libavutil-devel: before 3.4.2-11.17.1
libavformat57-debuginfo: before 3.4.2-11.17.1
libavformat57: before 3.4.2-11.17.1
libavcodec57-debuginfo: before 3.4.2-11.17.1
libavcodec57: before 3.4.2-11.17.1
libavfilter6-debuginfo: before 3.4.2-11.17.1
libavfilter6: before 3.4.2-11.17.1
libavdevice57-debuginfo: before 3.4.2-11.17.1
libavdevice57: before 3.4.2-11.17.1
ffmpeg: before 3.4.2-11.17.1
libavresample3-debuginfo: before 3.4.2-11.17.1
libavresample3: before 3.4.2-11.17.1
libavresample-devel: before 3.4.2-11.17.1
libavformat-devel: before 3.4.2-11.17.1
libavcodec-devel: before 3.4.2-11.17.1
ffmpeg-debugsource: before 3.4.2-11.17.1
ffmpeg-debuginfo: before 3.4.2-11.17.1
CPE2.3https://www.suse.com/support/update/announcement/2021/suse-su-20213521-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU70604
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2020-20896
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error in the latm_write_packet() function in libavformat/latmenc.c in FFmpeg. A remote attacker can perform a denial of service (DoS) attack.
MitigationUpdate the affected package ffmpeg to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Workstation Extension: 15-SP2 - 15-SP3
SUSE Linux Enterprise Module for Packagehub Subpackages: 15-SP2 - 15-SP3
SUSE Linux Enterprise Module for Desktop Applications: 15-SP2 - 15-SP3
libavresample3-32bit-debuginfo: before 3.4.2-11.17.1
libavresample3-32bit: before 3.4.2-11.17.1
libavresample3-64bit-debuginfo: before 3.4.2-11.17.1
libavresample3-64bit: before 3.4.2-11.17.1
libswscale4-debuginfo: before 3.4.2-11.17.1
libswscale4: before 3.4.2-11.17.1
libswscale-devel: before 3.4.2-11.17.1
libswresample2-debuginfo: before 3.4.2-11.17.1
libswresample2: before 3.4.2-11.17.1
libswresample-devel: before 3.4.2-11.17.1
libpostproc54-debuginfo: before 3.4.2-11.17.1
libpostproc54: before 3.4.2-11.17.1
libpostproc-devel: before 3.4.2-11.17.1
libavutil55-debuginfo: before 3.4.2-11.17.1
libavutil55: before 3.4.2-11.17.1
libavutil-devel: before 3.4.2-11.17.1
libavformat57-debuginfo: before 3.4.2-11.17.1
libavformat57: before 3.4.2-11.17.1
libavcodec57-debuginfo: before 3.4.2-11.17.1
libavcodec57: before 3.4.2-11.17.1
libavfilter6-debuginfo: before 3.4.2-11.17.1
libavfilter6: before 3.4.2-11.17.1
libavdevice57-debuginfo: before 3.4.2-11.17.1
libavdevice57: before 3.4.2-11.17.1
ffmpeg: before 3.4.2-11.17.1
libavresample3-debuginfo: before 3.4.2-11.17.1
libavresample3: before 3.4.2-11.17.1
libavresample-devel: before 3.4.2-11.17.1
libavformat-devel: before 3.4.2-11.17.1
libavcodec-devel: before 3.4.2-11.17.1
ffmpeg-debugsource: before 3.4.2-11.17.1
ffmpeg-debuginfo: before 3.4.2-11.17.1
CPE2.3https://www.suse.com/support/update/announcement/2021/suse-su-20213521-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU70603
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2020-20902
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition within the long_term_filter() function in g729postfilter.c in FFmpeg. A remote attacker can trigger an out-of-bounds read error and read contents of memory on the system.
MitigationUpdate the affected package ffmpeg to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Workstation Extension: 15-SP2 - 15-SP3
SUSE Linux Enterprise Module for Packagehub Subpackages: 15-SP2 - 15-SP3
SUSE Linux Enterprise Module for Desktop Applications: 15-SP2 - 15-SP3
libavresample3-32bit-debuginfo: before 3.4.2-11.17.1
libavresample3-32bit: before 3.4.2-11.17.1
libavresample3-64bit-debuginfo: before 3.4.2-11.17.1
libavresample3-64bit: before 3.4.2-11.17.1
libswscale4-debuginfo: before 3.4.2-11.17.1
libswscale4: before 3.4.2-11.17.1
libswscale-devel: before 3.4.2-11.17.1
libswresample2-debuginfo: before 3.4.2-11.17.1
libswresample2: before 3.4.2-11.17.1
libswresample-devel: before 3.4.2-11.17.1
libpostproc54-debuginfo: before 3.4.2-11.17.1
libpostproc54: before 3.4.2-11.17.1
libpostproc-devel: before 3.4.2-11.17.1
libavutil55-debuginfo: before 3.4.2-11.17.1
libavutil55: before 3.4.2-11.17.1
libavutil-devel: before 3.4.2-11.17.1
libavformat57-debuginfo: before 3.4.2-11.17.1
libavformat57: before 3.4.2-11.17.1
libavcodec57-debuginfo: before 3.4.2-11.17.1
libavcodec57: before 3.4.2-11.17.1
libavfilter6-debuginfo: before 3.4.2-11.17.1
libavfilter6: before 3.4.2-11.17.1
libavdevice57-debuginfo: before 3.4.2-11.17.1
libavdevice57: before 3.4.2-11.17.1
ffmpeg: before 3.4.2-11.17.1
libavresample3-debuginfo: before 3.4.2-11.17.1
libavresample3: before 3.4.2-11.17.1
libavresample-devel: before 3.4.2-11.17.1
libavformat-devel: before 3.4.2-11.17.1
libavcodec-devel: before 3.4.2-11.17.1
ffmpeg-debugsource: before 3.4.2-11.17.1
ffmpeg-debuginfo: before 3.4.2-11.17.1
CPE2.3https://www.suse.com/support/update/announcement/2021/suse-su-20213521-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU70610
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2020-22037
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within avcodec_alloc_context3() function in options.c in FFmpeg. A remote attacker can perform a denial of service attack.
MitigationUpdate the affected package ffmpeg to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Workstation Extension: 15-SP2 - 15-SP3
SUSE Linux Enterprise Module for Packagehub Subpackages: 15-SP2 - 15-SP3
SUSE Linux Enterprise Module for Desktop Applications: 15-SP2 - 15-SP3
libavresample3-32bit-debuginfo: before 3.4.2-11.17.1
libavresample3-32bit: before 3.4.2-11.17.1
libavresample3-64bit-debuginfo: before 3.4.2-11.17.1
libavresample3-64bit: before 3.4.2-11.17.1
libswscale4-debuginfo: before 3.4.2-11.17.1
libswscale4: before 3.4.2-11.17.1
libswscale-devel: before 3.4.2-11.17.1
libswresample2-debuginfo: before 3.4.2-11.17.1
libswresample2: before 3.4.2-11.17.1
libswresample-devel: before 3.4.2-11.17.1
libpostproc54-debuginfo: before 3.4.2-11.17.1
libpostproc54: before 3.4.2-11.17.1
libpostproc-devel: before 3.4.2-11.17.1
libavutil55-debuginfo: before 3.4.2-11.17.1
libavutil55: before 3.4.2-11.17.1
libavutil-devel: before 3.4.2-11.17.1
libavformat57-debuginfo: before 3.4.2-11.17.1
libavformat57: before 3.4.2-11.17.1
libavcodec57-debuginfo: before 3.4.2-11.17.1
libavcodec57: before 3.4.2-11.17.1
libavfilter6-debuginfo: before 3.4.2-11.17.1
libavfilter6: before 3.4.2-11.17.1
libavdevice57-debuginfo: before 3.4.2-11.17.1
libavdevice57: before 3.4.2-11.17.1
ffmpeg: before 3.4.2-11.17.1
libavresample3-debuginfo: before 3.4.2-11.17.1
libavresample3: before 3.4.2-11.17.1
libavresample-devel: before 3.4.2-11.17.1
libavformat-devel: before 3.4.2-11.17.1
libavcodec-devel: before 3.4.2-11.17.1
ffmpeg-debugsource: before 3.4.2-11.17.1
ffmpeg-debuginfo: before 3.4.2-11.17.1
CPE2.3https://www.suse.com/support/update/announcement/2021/suse-su-20213521-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU53601
Risk: High
CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2020-35965
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error when processing untrusted input within the decode_frame() function in libavcodec/exr.c. A remote attacker can create a specially crafted file, trick the victim into opening it using the affected software, trigger out-of-bounds write and execute arbitrary code on the target system.
MitigationUpdate the affected package ffmpeg to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Workstation Extension: 15-SP2 - 15-SP3
SUSE Linux Enterprise Module for Packagehub Subpackages: 15-SP2 - 15-SP3
SUSE Linux Enterprise Module for Desktop Applications: 15-SP2 - 15-SP3
libavresample3-32bit-debuginfo: before 3.4.2-11.17.1
libavresample3-32bit: before 3.4.2-11.17.1
libavresample3-64bit-debuginfo: before 3.4.2-11.17.1
libavresample3-64bit: before 3.4.2-11.17.1
libswscale4-debuginfo: before 3.4.2-11.17.1
libswscale4: before 3.4.2-11.17.1
libswscale-devel: before 3.4.2-11.17.1
libswresample2-debuginfo: before 3.4.2-11.17.1
libswresample2: before 3.4.2-11.17.1
libswresample-devel: before 3.4.2-11.17.1
libpostproc54-debuginfo: before 3.4.2-11.17.1
libpostproc54: before 3.4.2-11.17.1
libpostproc-devel: before 3.4.2-11.17.1
libavutil55-debuginfo: before 3.4.2-11.17.1
libavutil55: before 3.4.2-11.17.1
libavutil-devel: before 3.4.2-11.17.1
libavformat57-debuginfo: before 3.4.2-11.17.1
libavformat57: before 3.4.2-11.17.1
libavcodec57-debuginfo: before 3.4.2-11.17.1
libavcodec57: before 3.4.2-11.17.1
libavfilter6-debuginfo: before 3.4.2-11.17.1
libavfilter6: before 3.4.2-11.17.1
libavdevice57-debuginfo: before 3.4.2-11.17.1
libavdevice57: before 3.4.2-11.17.1
ffmpeg: before 3.4.2-11.17.1
libavresample3-debuginfo: before 3.4.2-11.17.1
libavresample3: before 3.4.2-11.17.1
libavresample-devel: before 3.4.2-11.17.1
libavformat-devel: before 3.4.2-11.17.1
libavcodec-devel: before 3.4.2-11.17.1
ffmpeg-debugsource: before 3.4.2-11.17.1
ffmpeg-debuginfo: before 3.4.2-11.17.1
CPE2.3https://www.suse.com/support/update/announcement/2021/suse-su-20213521-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU70611
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2021-3566
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to manipulate data.
The vulnerability exists due to tty demuxer does not have a 'read_probe' function assigned to it. A remote attacker can create a legitimate "ffconcat" file that references an image, followed by a file
the triggers the tty demuxer, the contents of the second file will be
copied into the output file verbatim.
Update the affected package ffmpeg to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Workstation Extension: 15-SP2 - 15-SP3
SUSE Linux Enterprise Module for Packagehub Subpackages: 15-SP2 - 15-SP3
SUSE Linux Enterprise Module for Desktop Applications: 15-SP2 - 15-SP3
libavresample3-32bit-debuginfo: before 3.4.2-11.17.1
libavresample3-32bit: before 3.4.2-11.17.1
libavresample3-64bit-debuginfo: before 3.4.2-11.17.1
libavresample3-64bit: before 3.4.2-11.17.1
libswscale4-debuginfo: before 3.4.2-11.17.1
libswscale4: before 3.4.2-11.17.1
libswscale-devel: before 3.4.2-11.17.1
libswresample2-debuginfo: before 3.4.2-11.17.1
libswresample2: before 3.4.2-11.17.1
libswresample-devel: before 3.4.2-11.17.1
libpostproc54-debuginfo: before 3.4.2-11.17.1
libpostproc54: before 3.4.2-11.17.1
libpostproc-devel: before 3.4.2-11.17.1
libavutil55-debuginfo: before 3.4.2-11.17.1
libavutil55: before 3.4.2-11.17.1
libavutil-devel: before 3.4.2-11.17.1
libavformat57-debuginfo: before 3.4.2-11.17.1
libavformat57: before 3.4.2-11.17.1
libavcodec57-debuginfo: before 3.4.2-11.17.1
libavcodec57: before 3.4.2-11.17.1
libavfilter6-debuginfo: before 3.4.2-11.17.1
libavfilter6: before 3.4.2-11.17.1
libavdevice57-debuginfo: before 3.4.2-11.17.1
libavdevice57: before 3.4.2-11.17.1
ffmpeg: before 3.4.2-11.17.1
libavresample3-debuginfo: before 3.4.2-11.17.1
libavresample3: before 3.4.2-11.17.1
libavresample-devel: before 3.4.2-11.17.1
libavformat-devel: before 3.4.2-11.17.1
libavcodec-devel: before 3.4.2-11.17.1
ffmpeg-debugsource: before 3.4.2-11.17.1
ffmpeg-debuginfo: before 3.4.2-11.17.1
CPE2.3https://www.suse.com/support/update/announcement/2021/suse-su-20213521-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU70602
Risk: High
CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2021-38092
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to integer overflow within the filter_prewitt() function in libavfilter/vf_convolution.c in FFmpeg . A remote attacker can pass specially crafted data to the application, trigger integer overflow and execute arbitrary code on the target system.
Update the affected package ffmpeg to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Workstation Extension: 15-SP2 - 15-SP3
SUSE Linux Enterprise Module for Packagehub Subpackages: 15-SP2 - 15-SP3
SUSE Linux Enterprise Module for Desktop Applications: 15-SP2 - 15-SP3
libavresample3-32bit-debuginfo: before 3.4.2-11.17.1
libavresample3-32bit: before 3.4.2-11.17.1
libavresample3-64bit-debuginfo: before 3.4.2-11.17.1
libavresample3-64bit: before 3.4.2-11.17.1
libswscale4-debuginfo: before 3.4.2-11.17.1
libswscale4: before 3.4.2-11.17.1
libswscale-devel: before 3.4.2-11.17.1
libswresample2-debuginfo: before 3.4.2-11.17.1
libswresample2: before 3.4.2-11.17.1
libswresample-devel: before 3.4.2-11.17.1
libpostproc54-debuginfo: before 3.4.2-11.17.1
libpostproc54: before 3.4.2-11.17.1
libpostproc-devel: before 3.4.2-11.17.1
libavutil55-debuginfo: before 3.4.2-11.17.1
libavutil55: before 3.4.2-11.17.1
libavutil-devel: before 3.4.2-11.17.1
libavformat57-debuginfo: before 3.4.2-11.17.1
libavformat57: before 3.4.2-11.17.1
libavcodec57-debuginfo: before 3.4.2-11.17.1
libavcodec57: before 3.4.2-11.17.1
libavfilter6-debuginfo: before 3.4.2-11.17.1
libavfilter6: before 3.4.2-11.17.1
libavdevice57-debuginfo: before 3.4.2-11.17.1
libavdevice57: before 3.4.2-11.17.1
ffmpeg: before 3.4.2-11.17.1
libavresample3-debuginfo: before 3.4.2-11.17.1
libavresample3: before 3.4.2-11.17.1
libavresample-devel: before 3.4.2-11.17.1
libavformat-devel: before 3.4.2-11.17.1
libavcodec-devel: before 3.4.2-11.17.1
ffmpeg-debugsource: before 3.4.2-11.17.1
ffmpeg-debuginfo: before 3.4.2-11.17.1
CPE2.3https://www.suse.com/support/update/announcement/2021/suse-su-20213521-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU70601
Risk: High
CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2021-38093
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to integer overflow within the filter_robert() function in libavfilter/vf_convolution.c in FFmpeg. A remote attacker can pass specially crafted data to the application, trigger integer overflow and execute arbitrary code on the target system.
MitigationUpdate the affected package ffmpeg to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Workstation Extension: 15-SP2 - 15-SP3
SUSE Linux Enterprise Module for Packagehub Subpackages: 15-SP2 - 15-SP3
SUSE Linux Enterprise Module for Desktop Applications: 15-SP2 - 15-SP3
libavresample3-32bit-debuginfo: before 3.4.2-11.17.1
libavresample3-32bit: before 3.4.2-11.17.1
libavresample3-64bit-debuginfo: before 3.4.2-11.17.1
libavresample3-64bit: before 3.4.2-11.17.1
libswscale4-debuginfo: before 3.4.2-11.17.1
libswscale4: before 3.4.2-11.17.1
libswscale-devel: before 3.4.2-11.17.1
libswresample2-debuginfo: before 3.4.2-11.17.1
libswresample2: before 3.4.2-11.17.1
libswresample-devel: before 3.4.2-11.17.1
libpostproc54-debuginfo: before 3.4.2-11.17.1
libpostproc54: before 3.4.2-11.17.1
libpostproc-devel: before 3.4.2-11.17.1
libavutil55-debuginfo: before 3.4.2-11.17.1
libavutil55: before 3.4.2-11.17.1
libavutil-devel: before 3.4.2-11.17.1
libavformat57-debuginfo: before 3.4.2-11.17.1
libavformat57: before 3.4.2-11.17.1
libavcodec57-debuginfo: before 3.4.2-11.17.1
libavcodec57: before 3.4.2-11.17.1
libavfilter6-debuginfo: before 3.4.2-11.17.1
libavfilter6: before 3.4.2-11.17.1
libavdevice57-debuginfo: before 3.4.2-11.17.1
libavdevice57: before 3.4.2-11.17.1
ffmpeg: before 3.4.2-11.17.1
libavresample3-debuginfo: before 3.4.2-11.17.1
libavresample3: before 3.4.2-11.17.1
libavresample-devel: before 3.4.2-11.17.1
libavformat-devel: before 3.4.2-11.17.1
libavcodec-devel: before 3.4.2-11.17.1
ffmpeg-debugsource: before 3.4.2-11.17.1
ffmpeg-debuginfo: before 3.4.2-11.17.1
CPE2.3https://www.suse.com/support/update/announcement/2021/suse-su-20213521-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU70600
Risk: High
CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2021-38094
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to integer overflow within the filter_sobel() function in libavfilter/vf_convolution.c in Ffmpeg. A remote attacker can pass specially crafted data to the application, trigger integer overflow and execute arbitrary code on the target system.
MitigationUpdate the affected package ffmpeg to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Workstation Extension: 15-SP2 - 15-SP3
SUSE Linux Enterprise Module for Packagehub Subpackages: 15-SP2 - 15-SP3
SUSE Linux Enterprise Module for Desktop Applications: 15-SP2 - 15-SP3
libavresample3-32bit-debuginfo: before 3.4.2-11.17.1
libavresample3-32bit: before 3.4.2-11.17.1
libavresample3-64bit-debuginfo: before 3.4.2-11.17.1
libavresample3-64bit: before 3.4.2-11.17.1
libswscale4-debuginfo: before 3.4.2-11.17.1
libswscale4: before 3.4.2-11.17.1
libswscale-devel: before 3.4.2-11.17.1
libswresample2-debuginfo: before 3.4.2-11.17.1
libswresample2: before 3.4.2-11.17.1
libswresample-devel: before 3.4.2-11.17.1
libpostproc54-debuginfo: before 3.4.2-11.17.1
libpostproc54: before 3.4.2-11.17.1
libpostproc-devel: before 3.4.2-11.17.1
libavutil55-debuginfo: before 3.4.2-11.17.1
libavutil55: before 3.4.2-11.17.1
libavutil-devel: before 3.4.2-11.17.1
libavformat57-debuginfo: before 3.4.2-11.17.1
libavformat57: before 3.4.2-11.17.1
libavcodec57-debuginfo: before 3.4.2-11.17.1
libavcodec57: before 3.4.2-11.17.1
libavfilter6-debuginfo: before 3.4.2-11.17.1
libavfilter6: before 3.4.2-11.17.1
libavdevice57-debuginfo: before 3.4.2-11.17.1
libavdevice57: before 3.4.2-11.17.1
ffmpeg: before 3.4.2-11.17.1
libavresample3-debuginfo: before 3.4.2-11.17.1
libavresample3: before 3.4.2-11.17.1
libavresample-devel: before 3.4.2-11.17.1
libavformat-devel: before 3.4.2-11.17.1
libavcodec-devel: before 3.4.2-11.17.1
ffmpeg-debugsource: before 3.4.2-11.17.1
ffmpeg-debuginfo: before 3.4.2-11.17.1
CPE2.3https://www.suse.com/support/update/announcement/2021/suse-su-20213521-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.