Lucene search

K
mageiaGentoo FoundationMGASA-2024-0220
HistoryJun 14, 2024 - 8:30 p.m.

Updated aom packages fix security vulnerability

2024-06-1420:30:25
Gentoo Foundation
advisories.mageia.org
5
integer overflow vulnerability
libaom packages
security fix
heap buffer overflow
integer overflows
buffer sizes
aom_img_alloc()
aom_img_wrap()
aom_img_alloc_with_border()
cve-2024-5171
unix

10 High

CVSS4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/SC:H/VI:H/SI:H/VA:H/SA:H

7.7 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

15.6%

Integer overflow in libaom internal function img_alloc_helper can lead to heap buffer overflow. This function can be reached via 3 callers: * Calling aom_img_alloc() with a large value of the d_w, d_h, or align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned aom_image_t struct may be invalid. * Calling aom_img_wrap() with a large value of the d_w, d_h, or align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned aom_image_t struct may be invalid. * Calling aom_img_alloc_with_border() with a large value of the d_w, d_h, align, size_align, or border parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned aom_image_t struct may be invalid. (CVE-2024-5171)

OSVersionArchitecturePackageVersionFilename
Mageia9noarchaom< 3.6.0-1.1aom-3.6.0-1.1.mga9

10 High

CVSS4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/SC:H/VI:H/SI:H/VA:H/SA:H

7.7 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

15.6%