CVE-2022-48434
Publication date 29 March 2023
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
libavcodec/pthread_frame.c in FFmpeg before 5.1.2, as used in VLC and other products, leaves stale hwaccel state in worker threads, which allows attackers to trigger a use-after-free and execute arbitrary code in some circumstances (e.g., hardware re-initialization upon a mid-video SPS change when Direct3D11 is used).
Status
Package | Ubuntu Release | Status |
---|---|---|
ffmpeg | 24.10 oracular |
Not affected
|
24.04 LTS noble |
Not affected
|
|
22.04 LTS jammy |
Fixed 7:4.4.2-0ubuntu0.22.04.1+esm2
|
|
20.04 LTS focal |
Fixed 7:4.2.7-0ubuntu0.1+esm3
|
|
18.04 LTS bionic |
Fixed 7:3.4.11-0ubuntu0.1+esm3
|
|
16.04 LTS xenial | Ignored see notes | |
14.04 LTS trusty | Ignored end of standard support |
Get expanded security coverage with Ubuntu Pro
Reduce your average CVE exposure time from 98 days to 1 day with expanded CVE patching, ten-years security maintenance and optional support for the full stack of open-source applications. Free for personal use.
Get Ubuntu ProNotes
ccdm94
As of 2023-04-26 there is no public reproducer available for this issue, so there is no way to confirm through vulnerability testing that Xenial and Bionic are vulnerable to this issue. Xenial's version of FFmpeg is 2.8. Upstream has only provided patches for versions 4.4.x, 5.0.x and 5.1.x. Considering that the code for pthread_frame.c (file altered by the patch) and for FFmpeg has changed significantly from version 2.8 to version 4.4.3, applying the 4.4.3 patch is very likely to introduce security issues and regressions. Because of the very intrusive nature of the backport, Xenial and Bionic (at version 3.4) will not be patched for this issue, and will therefore be marked as ignored.
Patch details
Package | Patch details |
---|---|
ffmpeg |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 8.1 · High |
Attack vector | Network |
Attack complexity | High |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-6449-1
- FFmpeg vulnerabilities
- 24 October 2023
Other references
- https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/cc867f2c09d2b69cee8a0eccd62aff002cbbfe11 (n6.1-dev)
- https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/35aa7e70e7ec350319e7634a30d8d8aa1e6ecdda (n5.1.2)
- https://wrv.github.io/h26forge.pdf
- https://news.ycombinator.com/item?id=35356201
- https://www.cve.org/CVERecord?id=CVE-2022-48434