Buffer Overflow vulnerability in FFmpeg 4.2 in the build_diff_map function in libavfilter/vf_fieldmatch.c, which could let a remote malicious user cause a Denial of Service.
References
| Link | Resource |
|---|---|
| http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=ce5274c1385d55892a692998923802023526b765 | |
| https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html | Mailing List Third Party Advisory |
| https://trac.ffmpeg.org/ticket/8239 | Exploit Issue Tracking Vendor Advisory |
| https://www.debian.org/security/2021/dsa-4990 | Third Party Advisory |
| http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=ce5274c1385d55892a692998923802023526b765 | |
| https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html | Mailing List Third Party Advisory |
| https://trac.ffmpeg.org/ticket/8239 | Exploit Issue Tracking Vendor Advisory |
| https://www.debian.org/security/2021/dsa-4990 | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2021-05-26 20:15
Updated : 2024-11-21 05:13
NVD link : CVE-2020-22020
Mitre link : CVE-2020-22020
CVE.ORG link : CVE-2020-22020
JSON object : View
Products Affected
ffmpeg
- ffmpeg
debian
- debian_linux
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
