First published: Tue Jul 19 2022(Updated: )
DOS / potential heap overwrite in mkv demuxing using zlib decompression. Integer overflow in matroskademux element in gst_matroska_decompress_data function which causes a segfault, or could cause a heap overwrite, depending on libc and OS. Depending on the libc used, and the underlying OS capabilities, it could be just a segfault or a heap overwrite. If the libc uses mmap for large chunks, and the OS supports mmap, then it is just a segfault (because the realloc before the integer overflow will use mremap to reduce the size of the chunk, and it will start to write to unmapped memory). However, if using a libc implementation that does not use mmap, or if the OS does not support mmap while using libc, then this could result in a heap overwrite.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Gstreamer Project Gstreamer | <1.20.3 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
debian/gst-plugins-good1.0 | <=1.14.4-1+deb10u1 | 1.14.4-1+deb10u3 1.18.4-2+deb11u2 1.22.0-5+deb12u1 1.22.6-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-1922.
The severity level of CVE-2022-1922 is high (7.8).
Gstreamer Project Gstreamer (up to version 1.20.3) and Debian Debian Linux (versions 10.0 and 11.0) are affected by CVE-2022-1922.
The vulnerability can be exploited through DOS attacks or potential heap overwrites in mkv demuxing using zlib decompression.
You can fix CVE-2022-1922 by updating the affected software to the specified versions: Gstreamer (1.22.6-1) and Debian Debian Linux (10.0, 11.0, and the specified versions of gst-plugins-good1.0).