Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2024-5171

Опубликовано: 05 июн. 2024
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 9.8

Описание

Integer overflow in libaom internal function img_alloc_helper can lead to heap buffer overflow. This function can be reached via 3 callers: * Calling aom_img_alloc() with a large value of the d_w, d_h, or align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned aom_image_t struct may be invalid. * Calling aom_img_wrap() with a large value of the d_w, d_h, or align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned aom_image_t struct may be invalid. * Calling aom_img_alloc_with_border() with a large value of the d_w, d_h, align, size_align, or border parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned aom_image_t struct may be invalid.

РелизСтатусПримечание
devel

released

3.8.2-2ubuntu1
esm-apps/focal

released

1.0.0.errata1-3+deb11u1ubuntu0.1
esm-apps/jammy

released

3.3.0-1ubuntu0.1
focal

released

1.0.0.errata1-3+deb11u1ubuntu0.1
jammy

released

3.3.0-1ubuntu0.1
mantic

ignored

end of life, was needs-triage
noble

released

3.8.2-2ubuntu0.1
oracular

released

3.8.2-2ubuntu1
upstream

released

3.9.0

Показывать по

EPSS

Процентиль: 64%
0.00485
Низкий

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 7.4
redhat
около 1 года назад

Integer overflow in libaom internal function img_alloc_helper can lead to heap buffer overflow. This function can be reached via 3 callers: * Calling aom_img_alloc() with a large value of the d_w, d_h, or align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned aom_image_t struct may be invalid. * Calling aom_img_wrap() with a large value of the d_w, d_h, or align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned aom_image_t struct may be invalid. * Calling aom_img_alloc_with_border() with a large value of the d_w, d_h, align, size_align, or border parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned aom_image_t struct may be invalid.

CVSS3: 9.8
nvd
около 1 года назад

Integer overflow in libaom internal function img_alloc_helper can lead to heap buffer overflow. This function can be reached via 3 callers: * Calling aom_img_alloc() with a large value of the d_w, d_h, or align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned aom_image_t struct may be invalid. * Calling aom_img_wrap() with a large value of the d_w, d_h, or align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned aom_image_t struct may be invalid. * Calling aom_img_alloc_with_border() with a large value of the d_w, d_h, align, size_align, or border parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned aom_image_t struct may be invalid.

CVSS3: 9.8
debian
около 1 года назад

Integer overflow in libaom internal functionimg_alloc_helper can lead ...

suse-cvrf
около 1 года назад

Security update for libaom

suse-cvrf
около 1 года назад

Security update for libaom

EPSS

Процентиль: 64%
0.00485
Низкий

9.8 Critical

CVSS3