[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256610

 
 

909

 
 

199263

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

Heap buffer overflow vulnerability in Debian.

ID: oval:org.secpod.oval:def:10000683Date: (C)2024-06-10   (M)2024-06-10
Class: VULNERABILITYFamily: unix




Integer overflow in libaom internal function img_alloc_helper can lead to heap buffer overflow. This function can be reached via 3 callers: * Calling aom_img_alloc() with a large value of the d_w, d_h, or align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned aom_image_t struct may be invalid. * Calling aom_img_wrap() with a large value of the d_w, d_h, or align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned aom_image_t struct may be invalid. * Calling aom_img_alloc_with_border() with a large value of the d_w, d_h, align, size_align, or border parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned aom_image_t struct may be invalid.

Platform:
Debian 10.x
Debian 11.x
Debian 12.x
Product:
libaom-doc
libaom-dev
aom-tools
libaom0
Reference:
CVE-2024-5171
CVE    1
CVE-2024-5171

© SecPod Technologies