First published: Tue Jul 19 2022(Updated: )
DOS / potential heap overwrite in qtdemux using zlib decompression. Integer overflow in qtdemux element in qtdemux_inflate function which causes a segfault, or could cause a heap overwrite, depending on libc and OS. Depending on the libc used, and the underlying OS capabilities, it could be just a segfault or a heap overwrite.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Gstreamer Project Gstreamer | <1.20.3 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
debian/gst-plugins-good1.0 | <=1.14.4-1+deb10u1 | 1.14.4-1+deb10u3 1.18.4-2+deb11u2 1.22.0-5+deb12u1 1.22.6-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-2122 is a vulnerability in the qtdemux element of Gstreamer that could cause a denial-of-service (DoS) or potential heap overwrite.
The severity of CVE-2022-2122 is high, with a CVSS score of 7.8.
CVE-2022-2122 affects Gstreamer versions up to and excluding 1.20.3.
To fix CVE-2022-2122, it is recommended to update to Gstreamer version 1.20.3 or later.
Yes, you can refer to the following links for more information: [GitLab Issue](https://gitlab.freedesktop.org/gstreamer/gstreamer/-/issues/1225), [Debian LTS Announcement](https://lists.debian.org/debian-lts-announce/2022/08/msg00001.html), [Debian Security Advisory](https://www.debian.org/security/2022/dsa-5204).