First published: Tue Jun 04 2024(Updated: )
Integer overflow in libaom internal function img_alloc_helper can lead to heap buffer overflow. This function can be reached via 3 callers: * Calling aom_img_alloc() with a large value of the d_w, d_h, or align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned aom_image_t struct may be invalid. * Calling aom_img_wrap() with a large value of the d_w, d_h, or align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned aom_image_t struct may be invalid. * Calling aom_img_alloc_with_border() with a large value of the d_w, d_h, align, size_align, or border parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned aom_image_t struct may be invalid.
Credit: cve-coordination@google.com cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
libaom | >=1.0.0<=3.9.0 | |
debian/aom | <=1.0.0.errata1-3+deb11u1 | 1.0.0.errata1-3+deb11u2 3.6.0-1+deb12u1 3.12.0-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-5171 is classified as a high severity vulnerability due to its potential for a heap buffer overflow.
To fix CVE-2024-5171, update the aom package to version 3.8.2-2ubuntu0.1 or 3.9.0 depending on your distribution.
CVE-2024-5171 affects aom package versions prior to 3.8.2-2ubuntu0.1 and any versions before 3.9.0 in the libaom library.
CVE-2024-5171 involves an integer overflow in the libaom internal function img_alloc_helper, which can lead to heap buffer overflow.
Check if your installed version of the aom package is lower than 3.8.2-2ubuntu0.1 for Ubuntu or lower than 3.9.0 for other distributions.