<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="sa-render.xsl"?>
  <update from="huaweicloud.com" type="security" status="stable" version="1">
    <id>HCE3-SA-2025-0030</id>
    <title>An update for ffmpeg is now available for HCE 3.0</title>
    <severity>Critical</severity>
    <release>HCE 3.0</release>
    <issued date="2025-10-09 06:38:12"/>
    <updated date="2025-10-09 06:38:12"/>
    <references>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2023-49502" id="CVE-2023-49502" title="CVE-2023-49502 Base Score: 8.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2023-50007" id="CVE-2023-50007" title="CVE-2023-50007 Base Score: 4.0 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2024-36613" id="CVE-2024-36613" title="CVE-2024-36613 Base Score: 6.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2024-36618" id="CVE-2024-36618" title="CVE-2024-36618 Base Score: 6.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2024-36617" id="CVE-2024-36617" title="CVE-2024-36617 Base Score: 6.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2024-36616" id="CVE-2024-36616" title="CVE-2024-36616 Base Score: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2024-32228" id="CVE-2024-32228" title="CVE-2024-32228 Base Score: 6.6 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2023-50008" id="CVE-2023-50008" title="CVE-2023-50008 Base Score: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2024-32230" id="CVE-2024-32230" title="CVE-2024-32230 Base Score: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2024-7055" id="CVE-2024-7055" title="CVE-2024-7055 Base Score: 5.3 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2023-49501" id="CVE-2023-49501" title="CVE-2023-49501 Base Score: 8.0 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2024-35368" id="CVE-2024-35368" title="CVE-2024-35368 Base Score: 9.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2024-36619" id="CVE-2024-36619" title="CVE-2024-36619 Base Score: 5.3 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2024-35365" id="CVE-2024-35365" title="CVE-2024-35365 Base Score: 8.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2024-35369" id="CVE-2024-35369" title="CVE-2024-35369 Base Score: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2023-49528" id="CVE-2023-49528" title="CVE-2023-49528 Base Score: 8.0 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2024-35367" id="CVE-2024-35367" title="CVE-2024-35367 Base Score: 9.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2024-35366" id="CVE-2024-35366" title="CVE-2024-35366 Base Score: 9.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" type="cve"/>
    </references>
    <description>Security Fix(es):

Buffer Overflow vulnerability in Ffmpeg v.n6.1-3-g466799d4f5 allows a local attacker to execute arbitrary code via the ff_bwdif_filter_intra_c function in the libavfilter/bwdifdsp.c:125:5 component. (CVE-2023-49502)

Buffer Overflow vulnerability in Ffmpeg v.n6.1-3-g466799d4f5 allows a local attacker to execute arbitrary code via theav_samples_set_silence function in thelibavutil/samplefmt.c:260:9 component. (CVE-2023-50007)

FFmpeg n6.1.1 has a vulnerability in the DXA demuxer of the libavformat library allowing for an integer overflow, potentially resulting in a denial-of-service (DoS) condition or other undefined behavior. (CVE-2024-36613)

FFmpeg n6.1.1 has a vulnerability in the AVI demuxer of the libavformat library which allows for an integer overflow, potentially resulting in a denial-of-service (DoS) condition. (CVE-2024-36618)

FFmpeg n6.1.1 has an integer overflow vulnerability in the FFmpeg CAF decoder. (CVE-2024-36617)

An integer overflow in the component /libavformat/westwood_vqa.c of FFmpeg n6.1.1 allows attackers to cause a denial of service in the application via a crafted VQA file. (CVE-2024-36616)

FFmpeg 7.0 is vulnerable to Buffer Overflow. There is a SEGV at libavcodec/hevcdec.c:2947:22 in hevc_frame_end. (CVE-2024-32228)

Buffer Overflow vulnerability in Ffmpeg v.n6.1-3-g466799d4f5 allows a local attacker to execute arbitrary code via the av_malloc function in libavutil/mem.c:105:9 component. (CVE-2023-50008)

FFmpeg 7.0 is vulnerable to Buffer Overflow. There is a negative-size-param bug at libavcodec/mpegvideo_enc.c:1216:21 in load_input_picture in FFmpeg7.0 (CVE-2024-32230)

A vulnerability was found in FFmpeg up to 7.0.1. It has been classified as critical. This affects the function pnm_decode_frame in the library /libavcodec/pnmdec.c. The manipulation leads to heap-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 7.0.2 is able to address this issue. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-273651. (CVE-2024-7055)

Buffer Overflow vulnerability in Ffmpeg v.n6.1-3-g466799d4f5 allows a local attacker to execute arbitrary code via the config_eq_output function in the libavfilter/asrc_afirsrc.c:495:30 component. (CVE-2023-49501)

FFmpeg n7.0 is affected by a Double Free via the rkmpp_retrieve_frame function within libavcodec/rkmppdec.c. (CVE-2024-35368)

FFmpeg n6.1.1 has a vulnerability in the WAVARC decoder of the libavcodec library which allows for an integer overflow when handling certain block types, leading to a denial-of-service (DoS) condition. (CVE-2024-36619)

FFmpeg version n6.1.1 has a double-free vulnerability in the fftools/ffmpeg_mux_init.c component of FFmpeg, specifically within the new_stream_audio function. (CVE-2024-35365)

In FFmpeg version n6.1.1, specifically within the avcodec/speexdec.c module, a potential security vulnerability exists due to insufficient validation of certain parameters when parsing Speex codec extradata. This vulnerability could lead to integer overflow conditions, potentially resulting in undefined behavior or crashes during the decoding process. (CVE-2024-35369)

Buffer Overflow vulnerability in FFmpeg version n6.1-3-g466799d4f5, allows a local attacker to execute arbitrary code and cause a denial of service (DoS) via the af_dialoguenhance.c:261:5 in the de_stereo component. (CVE-2023-49528)

FFmpeg n6.1.1 has an Out-of-bounds Read via libavcodec/ppc/vp8dsp_altivec.c, static const vec_s8 h_subpel_filters_outer (CVE-2024-35367)

FFmpeg n6.1.1 is Integer Overflow. The vulnerability exists in the parse_options function of sbgdec.c within the libavformat module. When parsing certain options, the software does not adequately validate the input. This allows for negative duration values to be accepted without proper bounds checking. (CVE-2024-35366)
</description>
    <pkglist>
      <collection short="HCE 3.0" package="ffmpeg">
        <name>HCE 3.0</name>
        <package arch="x86_64" name="ffmpeg" version="6.1.1" release="20.hce3">
          <filename>ffmpeg-6.1.1-20.hce3.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="ffmpeg-devel" version="6.1.1" release="20.hce3">
          <filename>ffmpeg-devel-6.1.1-20.hce3.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="ffmpeg-libs" version="6.1.1" release="20.hce3">
          <filename>ffmpeg-libs-6.1.1-20.hce3.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="libavdevice" version="6.1.1" release="20.hce3">
          <filename>libavdevice-6.1.1-20.hce3.x86_64.rpm</filename>
        </package>
        <package arch="aarch64" name="ffmpeg" version="6.1.1" release="20.hce3">
          <filename>ffmpeg-6.1.1-20.hce3.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="ffmpeg-devel" version="6.1.1" release="20.hce3">
          <filename>ffmpeg-devel-6.1.1-20.hce3.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="ffmpeg-libs" version="6.1.1" release="20.hce3">
          <filename>ffmpeg-libs-6.1.1-20.hce3.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="libavdevice" version="6.1.1" release="20.hce3">
          <filename>libavdevice-6.1.1-20.hce3.aarch64.rpm</filename>
        </package>
      </collection>
    </pkglist>
  </update>
