It was discovered that FFmpeg incorrectly managed memory resulting in a memory leak. An attacker could possibly use this issue to cause a denial of service via application crash. This issue only affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2020-22038)
It was discovered that FFmpeg incorrectly handled certain input files, leading to an integer overflow. An attacker could possibly use this issue to cause a denial of service via application crash. This issue only affected Ubuntu 20.04 LTS. (CVE-2020-20898, CVE-2021-38090, CVE-2021-38091, CVE-2021-38092, CVE-2021-38093, CVE-2021-38094)
It was discovered that FFmpeg incorrectly managed memory, resulting in a memory leak. If a user or automated system were tricked into processing a specially crafted input file, a remote attacker could possibly use this issue to cause a denial of service, or execute arbitrary code. (CVE-2022-48434)
{
"binaries": [
{
"binary_version": "7:3.4.11-0ubuntu0.1+esm3",
"binary_name": "ffmpeg"
},
{
"binary_version": "7:3.4.11-0ubuntu0.1+esm3",
"binary_name": "libavcodec-dev"
},
{
"binary_version": "7:3.4.11-0ubuntu0.1+esm3",
"binary_name": "libavcodec-extra"
},
{
"binary_version": "7:3.4.11-0ubuntu0.1+esm3",
"binary_name": "libavcodec-extra57"
},
{
"binary_version": "7:3.4.11-0ubuntu0.1+esm3",
"binary_name": "libavcodec57"
},
{
"binary_version": "7:3.4.11-0ubuntu0.1+esm3",
"binary_name": "libavdevice-dev"
},
{
"binary_version": "7:3.4.11-0ubuntu0.1+esm3",
"binary_name": "libavdevice57"
},
{
"binary_version": "7:3.4.11-0ubuntu0.1+esm3",
"binary_name": "libavfilter-dev"
},
{
"binary_version": "7:3.4.11-0ubuntu0.1+esm3",
"binary_name": "libavfilter-extra"
},
{
"binary_version": "7:3.4.11-0ubuntu0.1+esm3",
"binary_name": "libavfilter-extra6"
},
{
"binary_version": "7:3.4.11-0ubuntu0.1+esm3",
"binary_name": "libavfilter6"
},
{
"binary_version": "7:3.4.11-0ubuntu0.1+esm3",
"binary_name": "libavformat-dev"
},
{
"binary_version": "7:3.4.11-0ubuntu0.1+esm3",
"binary_name": "libavformat57"
},
{
"binary_version": "7:3.4.11-0ubuntu0.1+esm3",
"binary_name": "libavresample-dev"
},
{
"binary_version": "7:3.4.11-0ubuntu0.1+esm3",
"binary_name": "libavresample3"
},
{
"binary_version": "7:3.4.11-0ubuntu0.1+esm3",
"binary_name": "libavutil-dev"
},
{
"binary_version": "7:3.4.11-0ubuntu0.1+esm3",
"binary_name": "libavutil55"
},
{
"binary_version": "7:3.4.11-0ubuntu0.1+esm3",
"binary_name": "libpostproc-dev"
},
{
"binary_version": "7:3.4.11-0ubuntu0.1+esm3",
"binary_name": "libpostproc54"
},
{
"binary_version": "7:3.4.11-0ubuntu0.1+esm3",
"binary_name": "libswresample-dev"
},
{
"binary_version": "7:3.4.11-0ubuntu0.1+esm3",
"binary_name": "libswresample2"
},
{
"binary_version": "7:3.4.11-0ubuntu0.1+esm3",
"binary_name": "libswscale-dev"
},
{
"binary_version": "7:3.4.11-0ubuntu0.1+esm3",
"binary_name": "libswscale4"
}
],
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6449-1.json"
{
"cves": [
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2020-22038"
},
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2022-48434"
}
],
"ecosystem": "Ubuntu:Pro:18.04:LTS"
}
{
"binaries": [
{
"binary_version": "7:4.2.7-0ubuntu0.1+esm3",
"binary_name": "ffmpeg"
},
{
"binary_version": "7:4.2.7-0ubuntu0.1+esm3",
"binary_name": "libavcodec-dev"
},
{
"binary_version": "7:4.2.7-0ubuntu0.1+esm3",
"binary_name": "libavcodec-extra"
},
{
"binary_version": "7:4.2.7-0ubuntu0.1+esm3",
"binary_name": "libavcodec-extra58"
},
{
"binary_version": "7:4.2.7-0ubuntu0.1+esm3",
"binary_name": "libavcodec58"
},
{
"binary_version": "7:4.2.7-0ubuntu0.1+esm3",
"binary_name": "libavdevice-dev"
},
{
"binary_version": "7:4.2.7-0ubuntu0.1+esm3",
"binary_name": "libavdevice58"
},
{
"binary_version": "7:4.2.7-0ubuntu0.1+esm3",
"binary_name": "libavfilter-dev"
},
{
"binary_version": "7:4.2.7-0ubuntu0.1+esm3",
"binary_name": "libavfilter-extra"
},
{
"binary_version": "7:4.2.7-0ubuntu0.1+esm3",
"binary_name": "libavfilter-extra7"
},
{
"binary_version": "7:4.2.7-0ubuntu0.1+esm3",
"binary_name": "libavfilter7"
},
{
"binary_version": "7:4.2.7-0ubuntu0.1+esm3",
"binary_name": "libavformat-dev"
},
{
"binary_version": "7:4.2.7-0ubuntu0.1+esm3",
"binary_name": "libavformat58"
},
{
"binary_version": "7:4.2.7-0ubuntu0.1+esm3",
"binary_name": "libavresample-dev"
},
{
"binary_version": "7:4.2.7-0ubuntu0.1+esm3",
"binary_name": "libavresample4"
},
{
"binary_version": "7:4.2.7-0ubuntu0.1+esm3",
"binary_name": "libavutil-dev"
},
{
"binary_version": "7:4.2.7-0ubuntu0.1+esm3",
"binary_name": "libavutil56"
},
{
"binary_version": "7:4.2.7-0ubuntu0.1+esm3",
"binary_name": "libpostproc-dev"
},
{
"binary_version": "7:4.2.7-0ubuntu0.1+esm3",
"binary_name": "libpostproc55"
},
{
"binary_version": "7:4.2.7-0ubuntu0.1+esm3",
"binary_name": "libswresample-dev"
},
{
"binary_version": "7:4.2.7-0ubuntu0.1+esm3",
"binary_name": "libswresample3"
},
{
"binary_version": "7:4.2.7-0ubuntu0.1+esm3",
"binary_name": "libswscale-dev"
},
{
"binary_version": "7:4.2.7-0ubuntu0.1+esm3",
"binary_name": "libswscale5"
}
],
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6449-1.json"
{
"cves": [
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2020-20898"
},
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2020-22038"
},
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2021-38090"
},
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2021-38091"
},
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2021-38092"
},
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2021-38093"
},
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2021-38094"
},
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2022-48434"
}
],
"ecosystem": "Ubuntu:Pro:20.04:LTS"
}
{
"binaries": [
{
"binary_version": "7:4.4.2-0ubuntu0.22.04.1+esm2",
"binary_name": "ffmpeg"
},
{
"binary_version": "7:4.4.2-0ubuntu0.22.04.1+esm2",
"binary_name": "libavcodec-dev"
},
{
"binary_version": "7:4.4.2-0ubuntu0.22.04.1+esm2",
"binary_name": "libavcodec-extra"
},
{
"binary_version": "7:4.4.2-0ubuntu0.22.04.1+esm2",
"binary_name": "libavcodec-extra58"
},
{
"binary_version": "7:4.4.2-0ubuntu0.22.04.1+esm2",
"binary_name": "libavcodec58"
},
{
"binary_version": "7:4.4.2-0ubuntu0.22.04.1+esm2",
"binary_name": "libavdevice-dev"
},
{
"binary_version": "7:4.4.2-0ubuntu0.22.04.1+esm2",
"binary_name": "libavdevice58"
},
{
"binary_version": "7:4.4.2-0ubuntu0.22.04.1+esm2",
"binary_name": "libavfilter-dev"
},
{
"binary_version": "7:4.4.2-0ubuntu0.22.04.1+esm2",
"binary_name": "libavfilter-extra"
},
{
"binary_version": "7:4.4.2-0ubuntu0.22.04.1+esm2",
"binary_name": "libavfilter-extra7"
},
{
"binary_version": "7:4.4.2-0ubuntu0.22.04.1+esm2",
"binary_name": "libavfilter7"
},
{
"binary_version": "7:4.4.2-0ubuntu0.22.04.1+esm2",
"binary_name": "libavformat-dev"
},
{
"binary_version": "7:4.4.2-0ubuntu0.22.04.1+esm2",
"binary_name": "libavformat-extra"
},
{
"binary_version": "7:4.4.2-0ubuntu0.22.04.1+esm2",
"binary_name": "libavformat-extra58"
},
{
"binary_version": "7:4.4.2-0ubuntu0.22.04.1+esm2",
"binary_name": "libavformat58"
},
{
"binary_version": "7:4.4.2-0ubuntu0.22.04.1+esm2",
"binary_name": "libavutil-dev"
},
{
"binary_version": "7:4.4.2-0ubuntu0.22.04.1+esm2",
"binary_name": "libavutil56"
},
{
"binary_version": "7:4.4.2-0ubuntu0.22.04.1+esm2",
"binary_name": "libpostproc-dev"
},
{
"binary_version": "7:4.4.2-0ubuntu0.22.04.1+esm2",
"binary_name": "libpostproc55"
},
{
"binary_version": "7:4.4.2-0ubuntu0.22.04.1+esm2",
"binary_name": "libswresample-dev"
},
{
"binary_version": "7:4.4.2-0ubuntu0.22.04.1+esm2",
"binary_name": "libswresample3"
},
{
"binary_version": "7:4.4.2-0ubuntu0.22.04.1+esm2",
"binary_name": "libswscale-dev"
},
{
"binary_version": "7:4.4.2-0ubuntu0.22.04.1+esm2",
"binary_name": "libswscale5"
}
],
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6449-1.json"
{
"cves": [
{
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2022-48434"
}
],
"ecosystem": "Ubuntu:Pro:22.04:LTS"
}