CVE-2025-27091

Publication date 20 February 2025

Last updated 3 March 2025


Ubuntu priority

Cvss 3 Severity Score

7.5 · High

Score breakdown

OpenH264 is a free license codec library which supports H.264 encoding and decoding. A vulnerability in the decoding functions of OpenH264 codec library could allow a remote, unauthenticated attacker to trigger a heap overflow. This vulnerability is due to a race condition between a Sequence Parameter Set (SPS) memory allocation and a subsequent non Instantaneous Decoder Refresh (non-IDR) Network Abstraction Layer (NAL) unit memory usage. An attacker could exploit this vulnerability by crafting a malicious bitstream and tricking a victim user into processing an arbitrary video containing the malicious bistream. An exploit could allow the attacker to cause an unexpected crash in the victim’s user decoding client and, possibly, perform arbitrary commands on the victim’s host by abusing the heap overflow. This vulnerability affects OpenH264 2.5.0 and earlier releases. Both Scalable Video Coding (SVC) mode and Advanced Video Coding (AVC) mode are affected by this vulnerability. OpenH264 software releases 2.6.0 and later contained the fix for this vulnerability. Users are advised to upgrade. There are no known workarounds for this vulnerability. ### For more information If you have any questions or comments about this advisory: * [Open an issue in cisco/openh264](https://github.com/cisco/openh264/issues) * Email Cisco Open Source Security ([oss-security@cisco.com](mailto:oss-security@cisco.com)) and Cisco PSIRT ([psirt@cisco.com](mailto:psirt@cisco.com)) ### Credits: * **Research:** Octavian Guzu and Andrew Calvano of Meta * **Fix ideation:** Philipp Hancke and Shyam Sadhwani of Meta * **Fix implementation:** Benzheng Zhang (@BenzhengZhang) * **Release engineering:** Benzheng Zhang (@BenzhengZhang)

Read the notes from the security team

Status

Package Ubuntu Release Status
openh264 24.10 oracular
Vulnerable
24.04 LTS noble
Vulnerable
22.04 LTS jammy
Vulnerable
20.04 LTS focal Not in release

Notes


mdeslaur

This package provides two binary packages, a library that was built from source, which we can patch, and a binary package that has a script that downloads the matching binary library from cisco which comes with a patent license. To get a fixed matching binary library from Cisco, it is necessary to update the package to 2.6.0. But, in Ubuntu, nothing requires the Cisco library as Chromium is not shipped as a deb, it is shipped as a snap, so we do not need to actually fix the Cisco library, so the patch below can simply be backported to stable releases. Debian added a note to their package to clarify that the Cisco library in stable releases contains a security issue which we should also do if backporting the commit below. See Debian bug for more details.

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
openh264

Severity score breakdown

Parameter Value
Base score 7.5 · High
Attack vector Network
Attack complexity High
Privileges required None
User interaction Required
Scope Unchanged
Confidentiality High
Integrity impact High
Availability impact High
Vector CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H