First published: Thu May 27 2021(Updated: )
A heap-based Buffer Overflow vulnerabililty exists in FFmpeg 4.2 in filter_frame at libavfilter/vf_bitplanenoise.c, which might lead to memory corruption and other potential consequences.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/ffmpeg | 7:4.3.7-0+deb11u1 7:4.3.8-0+deb11u1 7:5.1.6-0+deb12u1 7:7.0.2-3 7:7.1-3 | |
FFmpeg | =4.2 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 |
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=0b567238741854b41f84f7457686b044eadfe29c
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-22023.
The vulnerability exists in the filter_frame function at libavfilter/vf_bitplanenoise.c in FFmpeg 4.2.
The potential consequences include memory corruption and other issues.
FFmpeg versions 3.4.11-0ubuntu0.1, 4.2.7-0ubuntu0.1, 4.3, and various versions in the Debian repository are affected.
More information about this vulnerability can be found at the following references: [CVE-2020-22023](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22023), [FFmpeg Ticket #8244](https://trac.ffmpeg.org/ticket/8244), and [Ubuntu Security Notice USN-5472-1](https://ubuntu.com/security/notices/USN-5472-1).