Mageia 2020-0137: gpac security update
Summary
The updated packages fix security vulnerabilities:
AVC_DuplicateConfig() at isomedia/avc_ext.c in GPAC 0.7.1 allows remote
attackers to cause a denial of service (NULL pointer dereference and
application crash) via a crafted file.
There is "cfg_new->AVCLevelIndication = cfg->AVCLevelIndication;" but
cfg could be NULL. (CVE-2018-21015)
audio_sample_entry_AddBox() at isomedia/box_code_base.c in GPAC 0.7.1
allows remote attackers to cause a denial of service (heap-based buffer
over-read and application crash) via a crafted file. (CVE-2018-21016)
In GPAC before 0.8.0, isomedia/isom_read.c in libgpac.a has a heap-based
buffer over-read, as demonstrated by a crash in gf_m2ts_sync in
media_tools/mpegts.c. (CVE-2019-13618)
An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-
20191109. There is heap-based buffer overflow in the function
ReadGF_IPMPX_WatermarkingInit() in odf/ipmpx_code.c. (CVE-2019-20161)
An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-
20...
References
- https://bugs.mageia.org/show_bug.cgi?id=26131
- https://www.debian.org/lts/security/2020/dla-2072
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21015
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21016
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13618
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20161
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20162
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20163
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20165
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20170
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20171
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20208
Resolution
MGASA-2020-0137 - Updated gpac packages fix security vulnerabilities
SRPMS
- 7/tainted/gpac-0.7.1-6.1.mga7.tainted