<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="sa-render.xsl"?>
  <update from="huaweicloud.com" type="security" status="stable" version="1">
    <id>HCE2-SA-2025-0222</id>
    <title>An update for ffmpeg is now available for HCE 2.0</title>
    <severity>Important</severity>
    <release>HCE 2.0</release>
    <issued date="2025-09-23 11:51:48"/>
    <updated date="2025-09-23 11:51:48"/>
    <references>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2025-22919" id="CVE-2025-22919" title="CVE-2025-22919 Base Score: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2020-22039" id="CVE-2020-22039" title="CVE-2020-22039 Base Score: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2024-36613" id="CVE-2024-36613" title="CVE-2024-36613 Base Score: 6.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2020-22043" id="CVE-2020-22043" title="CVE-2020-22043 Base Score: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2020-22037" id="CVE-2020-22037" title="CVE-2020-22037 Base Score: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2020-21697" id="CVE-2020-21697" title="CVE-2020-21697 Base Score: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2020-22044" id="CVE-2020-22044" title="CVE-2020-22044 Base Score: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2020-22019" id="CVE-2020-22019" title="CVE-2020-22019 Base Score: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2021-38090" id="CVE-2021-38090" title="CVE-2021-38090 Base Score: 8.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2020-22020" id="CVE-2020-22020" title="CVE-2020-22020 Base Score: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2020-22021" id="CVE-2020-22021" title="CVE-2020-22021 Base Score: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2025-22921" id="CVE-2025-22921" title="CVE-2025-22921 Base Score: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2020-22026" id="CVE-2020-22026" title="CVE-2020-22026 Base Score: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2020-22051" id="CVE-2020-22051" title="CVE-2020-22051 Base Score: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2020-21688" id="CVE-2020-21688" title="CVE-2020-21688 Base Score: 8.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2020-22038" id="CVE-2020-22038" title="CVE-2020-22038 Base Score: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2020-22042" id="CVE-2020-22042" title="CVE-2020-22042 Base Score: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" type="cve"/>
    </references>
    <description>Security Fix(es):

A reachable assertion in FFmpeg git-master commit N-113007-g8d24a28d06 allows attackers to cause a Denial of Service (DoS) via opening a crafted AAC file. (CVE-2025-22919)

A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory leak in the inavi_add_ientry function. (CVE-2020-22039)

FFmpeg n6.1.1 has a vulnerability in the DXA demuxer of the libavformat library allowing for an integer overflow, potentially resulting in a denial-of-service (DoS) condition or other undefined behavior. (CVE-2024-36613)

A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory leak at the fifo_alloc_common function in libavutil/fifo.c. (CVE-2020-22043)

A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory leak in avcodec_alloc_context3 at options.c. (CVE-2020-22037)

A heap-use-after-free in the mpeg_mux_write_packet function in libavformat/mpegenc.c of FFmpeg 4.2 allows to cause a denial of service (DOS) via a crafted avi file. (CVE-2020-21697)

A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory leak in the url_open_dyn_buf_internal function in libavformat/aviobuf.c. (CVE-2020-22044)

Buffer Overflow vulnerability in FFmpeg 4.2 at convolution_y_10bit in libavfilter/vf_vmafmotion.c, which could let a remote malicious user cause a Denial of Service. (CVE-2020-22019)

Integer Overflow vulnerability in function filter16_roberts in libavfilter/vf_convolution.c in Ffmpeg 4.2.1, allows attackers to cause a Denial of Service or other unspecified impacts. (CVE-2021-38090)

Buffer Overflow vulnerability in FFmpeg 4.2 in the build_diff_map function in libavfilter/vf_fieldmatch.c, which could let a remote malicious user cause a Denial of Service. (CVE-2020-22020)

Buffer Overflow vulnerability in FFmpeg 4.2 at filter_edges function in libavfilter/vf_yadif.c, which could let a remote malicious user cause a Denial of Service. (CVE-2020-22021)

FFmpeg git-master,N-113007-g8d24a28d06 was discovered to contain a segmentation violation via the component /libavcodec/jpeg2000dec.c. (CVE-2025-22921)

Buffer Overflow vulnerability exists in FFmpeg 4.2 in the config_input function at libavfilter/af_tremolo.c, which could let a remote malicious user cause a Denial of Service. (CVE-2020-22026)

A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory leak in the filter_frame function in vf_tile.c. (CVE-2020-22051)

A heap-use-after-free in the av_freep function in libavutil/mem.c of FFmpeg 4.2 allows attackers to execute arbitrary code. (CVE-2020-21688)

A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory leak in the ff_v4l2_m2m_create_context function in v4l2_m2m.c. (CVE-2020-22038)

A Denial of Service vulnerability exists in FFmpeg 4.2 due to a memory leak is affected by: memory leak in the link_filter_inouts function in libavfilter/graphparser.c. (CVE-2020-22042)
</description>
    <pkglist>
      <collection short="HCE 2.0" package="ffmpeg">
        <name>HCE 2.0</name>
        <package arch="aarch64" name="ffmpeg" version="4.2.4" release="4.r21.hce2">
          <filename>ffmpeg-4.2.4-4.r21.hce2.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="ffmpeg-devel" version="4.2.4" release="4.r21.hce2">
          <filename>ffmpeg-devel-4.2.4-4.r21.hce2.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="ffmpeg-libs" version="4.2.4" release="4.r21.hce2">
          <filename>ffmpeg-libs-4.2.4-4.r21.hce2.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="libavdevice" version="4.2.4" release="4.r21.hce2">
          <filename>libavdevice-4.2.4-4.r21.hce2.aarch64.rpm</filename>
        </package>
        <package arch="x86_64" name="ffmpeg" version="4.2.4" release="4.r21.hce2">
          <filename>ffmpeg-4.2.4-4.r21.hce2.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="ffmpeg-devel" version="4.2.4" release="4.r21.hce2">
          <filename>ffmpeg-devel-4.2.4-4.r21.hce2.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="ffmpeg-libs" version="4.2.4" release="4.r21.hce2">
          <filename>ffmpeg-libs-4.2.4-4.r21.hce2.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="libavdevice" version="4.2.4" release="4.r21.hce2">
          <filename>libavdevice-4.2.4-4.r21.hce2.x86_64.rpm</filename>
        </package>
      </collection>
    </pkglist>
  </update>
