CVE-2020-22027

NameCVE-2020-22027
DescriptionA heap-based Buffer Overflow vulnerability exits in FFmpeg 4.2 in deflate16 at libavfilter/vf_neighbor.c, which might lead to memory corruption and other potential consequences.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-4990-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
ffmpeg (PTS)stretch (security)7:3.2.18-0+deb9u1vulnerable
stretch (lts), stretch7:3.2.19-0+deb9u5vulnerable
buster, buster (lts)7:4.1.11-0+deb10u2fixed
buster (security)7:4.1.11-0+deb10u1fixed
bullseye7:4.3.7-0+deb11u1fixed
bullseye (security)7:4.3.8-0+deb11u1fixed
bookworm (security), bookworm7:5.1.6-0+deb12u1fixed
sid, trixie7:7.1-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
ffmpegsourcebuster7:4.1.8-0+deb10u1DSA-4990-1
ffmpegsource(unstable)7:4.3-2

Notes

https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=e787f8fd7ee99ba0c3e0f086ce2ce59eea7ed86c
https://trac.ffmpeg.org/ticket/8242
[stretch] - ffmpeg <postponed> (Possibly not-affected because the code changed, recheck the PoC with ASAN build)

Search for package or bug name: Reporting problems