First published: Thu May 27 2021(Updated: )
A heap-based Buffer Overflow vulnerability exits in FFmpeg 4.2 in deflate16 at libavfilter/vf_neighbor.c, which might lead to memory corruption and other potential consequences.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/ffmpeg | 7:4.3.7-0+deb11u1 7:4.3.8-0+deb11u1 7:5.1.6-0+deb12u1 7:7.0.2-3 7:7.1-3 | |
FFmpeg | =4.2 | |
Debian Debian Linux | =10.0 |
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=e787f8fd7ee99ba0c3e0f086ce2ce59eea7ed86c
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-22027 is a heap-based Buffer Overflow vulnerability that exists in FFmpeg 4.2 in deflate16 at libavfilter/vf_neighbor.c.
CVE-2020-22027 might lead to memory corruption and other potential consequences.
FFmpeg versions 4.2.7-0ubuntu0.1, 4.3, 4.1.9-0+deb10u1, 4.1.11-0+deb10u1, 4.3.6-0+deb11u1, 5.1.3-1, and 6.0-7 are affected by CVE-2020-22027.
To fix CVE-2020-22027, update FFmpeg to version 7:4.2.7-0ubuntu0.1 or apply the recommended fixes provided by Ubuntu or Debian.
You can find more information about CVE-2020-22027 on the MITRE CVE website and the FFmpeg Trac ticket.