Headline
CVE-2021-30475
aom_dsp/noise_model.c in libaom in AOMedia before 2021-03-24 has a buffer overflow.
)]}’ { "commit": "12adc723acf02633595a4d8da8345742729f46c0", "tree": "c34488c0d1841ce9c70ad15e0fedf54c87c9f338", "parents": [ “4efe20e99dcd9b6f8eadc8de8acc825be7416578” ], "author": { "name": "Wan-Teh Chang", "email": "[email protected]", "time": “Fri Apr 30 14:45:52 2021 -0700” }, "committer": { "name": "Wan-Teh Chang", "email": "[email protected]", "time": “Sat May 01 00:32:00 2021 +0000” }, "message": "aom_dsp: Fix aom_noise_strength_lut_init with zero size\n\nReturn 0 when lut size is zero. aom_noise_strength_lut_eval() assumes\nlut size is nonzero. For example, it accesses lut-\u003epoints[0] and\nlut-\u003epoints[lut-\u003enum_points - 1] without checking lut-\u003enum_points.\n\nAlso handle the failure of aom_noise_strength_solver_fit_piecewise().\n\nBUG\u003daomedia:2999\n\nChange-Id: I19858c8bd097f523f6316effedb5e3b9acd2e4b7\n", "tree_diff": [ { "type": "modify", "old_id": "0b74009818c7b96d370d04a95d335716ad10386d", "old_mode": 33188, "old_path": "aom_dsp/noise_model.c", "new_id": "19c660e911885526648d884bec3596a6e718fc4c", "new_mode": 33188, "new_path": “aom_dsp/noise_model.c” }, { "type": "modify", "old_id": "8584bd809d02b0022d90e3ce73d6356b67ebbf47", "old_mode": 33188, "old_path": "test/noise_model_test.cc", "new_id": "c12c080caca2532af03e83307b849f2f5d98c405", "new_mode": 33188, "new_path": “test/noise_model_test.cc” } ] }
Related news
Gentoo Linux Security Advisory 202401-32 - Multiple vulnerabilities have been discovered in libaom, the worst of which can lead to remote code execution. Versions greater than or equal to 3.2.0 are affected.
Ubuntu Security Notice 6447-1 - It was discovered that AOM incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to cause a denial of service.
Debian Linux Security Advisory 5490-1 - Multiple security vulnerabilities have been discovered in aom, the AV1 Video Codec Library. Buffer overflows, use-after-free and NULL pointer dereferences may cause a denial of service or other unspecified impact if a malformed multimedia file is processed.
Hello everyone! Great news for my open source Scanvus project! You can now perform vulnerability checks on Linux hosts and docker images not only using the Vulners.com API, but also with the Vulns.io VM API. It’s especially nice that all the code to support the new API was written and contributed by colleagues from Vulns.io. […]