Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <4F29B503.2080905@redhat.com>
Date: Wed, 01 Feb 2012 14:56:19 -0700
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
CC: "Steven M. Christey" <coley@...us.mitre.org>
Subject: Re: CVE Requests for FFmpeg 0.9.1

================================================
HEAP buffer overflows (10): (write)
ae21776207e8a2bbe268e7c9e203f7599dd87ddb lavfi: add missing check in
avfilter_filter_samples()
    Simple case of missing check, there wasnt much using the audio
filters so
    this probably is not practically exploitable

5257743aee0c3982f0079e6553aabc6aa39401d2 ws_snd1: Fix wrong samples
count and crash.
    Simple case of amount written and check mismatching

1f99939a6361e2e6d6788494dd7c682b051c6c34 j2kdec: Fix integer overflow
leading to a segfault

http://ffmpeg.org/trac/ffmpeg/ticket/776
    The check missed negative values, j2k is marked as experimental
though so
    depending on the user app this may require the user to enable it.

944f5b2779e4aa63f7624df6cd4de832a53db81b aacsbr: Fix memory corruption.

http://ffmpeg.org/trac/ffmpeg/ticket/760
    v_off becoming negative and writes based on this overwriting various
fields
    of the struct which valgrind didnt detect.

7fff64e00d886fde11d61958888c82b461cf99b9 h264: check chroma_format_idc
range.

http://ffmpeg.org/trac/ffmpeg/ticket/758

608708009f69ba4cecebf05120c696167494c897 adpcm: Fix crash

http://ffmpeg.org/trac/ffmpeg/ticket/794
    Allocation for X channels, write for 2, this adds a X!=2 check

9af6abdc17deb95c9b1f1d9242ba49b8b5e0b016 atrac3: Fix crash in tonal
component decoding.

http://ffmpeg.org/trac/ffmpeg/ticket/780
    Simple case of index becoming bigger than array without checks

6d8e6fe9dbc365f50521cf0c4a5ffee97c970cb5 CODEC_ID_SOL_DPCM: Fix used
write buffer.
    Wrong pointer being used to write after recent audio API change.

3eedf9f716733b3b4c5205726d2c1ca52b3d3d78 j2kdec: Check curtileno for
validity
    Simple missing check for index and array size. j2k is marked as
experimental though so
    depending on the user app this may require the user to enable it.

21270cffaeab2f67a613907516b2b0cd6c9eacf4 h263dec: Fix regression / crash
with lowres.

http://ffmpeg.org/trac/ffmpeg/ticket/757
    memset of the full size in a reduced size buffer, this requires the user
    to enable lowres

================================================
	
HEAP+possible STACK buffer overflow (1): (write)
282bb02839b1ce73963c8e3ee46804f1ade8b12a j2kdec: Fix crash in get_qcx
    Simple missing check for index and array size. j2k is marked as
experimental though so
    depending on the user app this may require the user to enable it.

================================================

Things that didnt fit in above (2):
18bcfc912e48bf77a5202a0e24a3b884b9b2ff2c shorten: Fix invalid free()
    Adding a offset after realloc() but not undoing that before a possible
    2nd realloc()


6fcf2bb8af0e7d6bb179e71e67e5fab8ef0d2ec2 vorbis: Fix last quarter of
CVE-2011-3893
    This fixes a apparently forgoten case in the original patchset from
google
    Ive reproduced this by setting multiplier to the maximal value that
it could
    reach

================================================
So for all the interesting vulns:

HEAP buffer overflows (10): (write)
HEAP+possible STACK buffer overflow (1): (write)
Things that didnt fit in above (4): (just the first two)

that's 15 CVE's, the rest like Steve said do not quality for CVEs.
Steve, ok if I go ahead with these 13?


-- 
Kurt Seifried Red Hat Security Response Team (SRT)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.