First published: Wed Apr 17 2024(Updated: )
FFmpeg version n6.1 was discovered to contain a heap buffer overflow vulnerability in the draw_block_rectangle function of libavfilter/vf_codecview.c. This vulnerability allows attackers to cause undefined behavior or a Denial of Service (DoS) via crafted input.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/ffmpeg | <7:6.0-6ubuntu1.1 | 7:6.0-6ubuntu1.1 |
ubuntu/ffmpeg | <7:6.1.1-3ubuntu5+ | 7:6.1.1-3ubuntu5+ |
debian/ffmpeg | <=7:5.1.5-0+deb12u1<=7:6.1.1-4<=7:6.1.1-5 | 7:4.3.6-0+deb11u1 7:4.3.7-0+deb11u1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-31582 has been classified as a high severity vulnerability due to its potential to cause undefined behavior and Denial of Service.
To mitigate CVE-2024-31582, update FFmpeg to version 7:6.1.1-3ubuntu5+ or a later version, or use 7:6.0-6ubuntu1.1 for Ubuntu.
CVE-2024-31582 affects FFmpeg version n6.1 and earlier.
CVE-2024-31582 can lead to undefined behavior or Denial of Service when processing specially crafted inputs.
There are no known workarounds for CVE-2024-31582; updating to a patched version is recommended.