Source: mplayer X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security
Hi, The following vulnerabilities were published for mplayer. CVE-2022-38600[0]: | Mplayer SVN-r38374-13.0.1 is vulnerable to Memory Leak via vf.c and | vf_vo.c. https://trac.mplayerhq.hu/ticket/2390#comment:2 https://git.ffmpeg.org/gitweb/mplayer.git/commit/59792bad144c11b21b27171a93a36e3fbd21eb5e (r38380) Followup: https://git.ffmpeg.org/gitweb/mplayer.git/commit/48ca1226397974bb2bc53de878411f88a80fe1f8 (r38392) CVE-2022-38856[1]: | Certain The MPlayer Project products are vulnerable to Buffer Overflow | via function mov_build_index() of libmpdemux/demux_mov.c. This affects | mplayer SVN-r38374-13.0.1 and mencoder SVN-r38374-13.0.1. https://trac.mplayerhq.hu/ticket/2395 CVE-2022-38861[2]: | The MPlayer Project mplayer SVN-r38374-13.0.1 is vulnerable to memory | corruption via function free_mp_image() of libmpcodecs/mp_image.c. https://trac.mplayerhq.hu/ticket/2407 https://git.ffmpeg.org/gitweb/mplayer.git/commit/2622e7fbe3605a2f3b4f74900197fefeedc0d2e1 (r38402) CVE-2022-38862[3]: | Certain The MPlayer Project products are vulnerable to Buffer Overflow | via function play() of libaf/af.c:639. This affects mplayer | SVN-r38374-13.0.1 and mencoder SVN-r38374-13.0.1. https://trac.mplayerhq.hu/ticket/2400 https://trac.mplayerhq.hu/ticket/2404 CVE-2022-38864[4]: | Certain The MPlayer Project products are vulnerable to Buffer Overflow | via the function mp_unescape03() of libmpdemux/mpeg_hdr.c. This | affects mencoder SVN-r38374-13.0.1 and mplayer SVN-r38374-13.0.1. https://trac.mplayerhq.hu/ticket/2406 https://git.ffmpeg.org/gitweb/mplayer.git/commit/36546389ef9fb6b0e0540c5c3f212534c34b0e94 (r38391) If you fix the vulnerabilities please also make sure to include the CVE (Common Vulnerabilities & Exposures) ids in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2022-38600 https://www.cve.org/CVERecord?id=CVE-2022-38600 [1] https://security-tracker.debian.org/tracker/CVE-2022-38856 https://www.cve.org/CVERecord?id=CVE-2022-38856 [2] https://security-tracker.debian.org/tracker/CVE-2022-38861 https://www.cve.org/CVERecord?id=CVE-2022-38861 [3] https://security-tracker.debian.org/tracker/CVE-2022-38862 https://www.cve.org/CVERecord?id=CVE-2022-38862 [4] https://security-tracker.debian.org/tracker/CVE-2022-38864 https://www.cve.org/CVERecord?id=CVE-2022-38864 Please adjust the affected versions in the BTS as needed.