First published: Thu May 27 2021(Updated: )
A Heap-based Buffer Overflow vulnerability exists in FFmpeg 4.2 at libavfilter/vf_w3fdif.c in filter16_complex_low, which might lead to memory corruption and other potential consequences.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/ffmpeg | 7:4.3.7-0+deb11u1 7:4.3.8-0+deb11u1 7:5.1.6-0+deb12u1 7:7.0.2-3 7:7.1-3 | |
FFmpeg | =4.2 | |
Debian GNU/Linux | =9.0 | |
Debian GNU/Linux | =10.0 |
https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=0e68e8c93f9068596484ec8ba725586860e06fc8
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-22031.
The vulnerability exists in FFmpeg 4.2 at libavfilter/vf_w3fdif.c in filter16_complex_low.
The potential consequences of this vulnerability include memory corruption and other potential issues.
The affected software versions include FFmpeg 3.4.11-0ubuntu0.1, FFmpeg 4.2.7-0ubuntu0.1, FFmpeg 4.3, FFmpeg 2.8.17-0ubuntu0.1+, and FFmpeg 4.1.9-0+deb10u1, 4.1.11-0+deb10u1, 4.3.6-0+deb11u1, 5.1.3-1, and 6.0-7.
To fix this vulnerability, update to the appropriate version of FFmpeg as mentioned in the affected software section.