Integer Overflow or Wraparound Affecting gst-plugins-good1.0 package, versions <1.18.4-2+deb11u1
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN11-GSTPLUGINSGOOD10-2959363
- published 23 Jul 2022
- disclosed 19 Jul 2022
Introduced: 19 Jul 2022
CVE-2022-1922 Open this link in a new tabHow to fix?
Upgrade Debian:11 gst-plugins-good1.0 to version 1.18.4-2+deb11u1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream gst-plugins-good1.0 package and not the gst-plugins-good1.0 package as distributed by Debian.
See How to fix? for Debian:11 relevant fixed versions and status.
DOS / potential heap overwrite in mkv demuxing using zlib decompression. Integer overflow in matroskademux element in gst_matroska_decompress_data function which causes a segfault, or could cause a heap overwrite, depending on libc and OS. Depending on the libc used, and the underlying OS capabilities, it could be just a segfault or a heap overwrite. If the libc uses mmap for large chunks, and the OS supports mmap, then it is just a segfault (because the realloc before the integer overflow will use mremap to reduce the size of the chunk, and it will start to write to unmapped memory). However, if using a libc implementation that does not use mmap, or if the OS does not support mmap while using libc, then this could result in a heap overwrite.