Buffer Overflow vulnerability in FFmpeg 4.2 in the build_diff_map function in libavfilter/vf_fieldmatch.c, which could let a remote malicious user cause a Denial of Service.
References
| Link | Resource |
|---|---|
| http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=ce5274c1385d55892a692998923802023526b765 | Patch Vendor Advisory |
| https://trac.ffmpeg.org/ticket/8239 | Exploit Issue Tracking Vendor Advisory |
| https://lists.debian.org/debian-lts-announce/2021/08/msg00018.html | Mailing List Third Party Advisory |
| https://www.debian.org/security/2021/dsa-4990 | Third Party Advisory |
Information
Published : 2021-05-26 13:15
Updated : 2021-11-05 14:57
NVD link : CVE-2020-22020
Mitre link : CVE-2020-22020
JSON object : View
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Products Affected
debian
- debian_linux
ffmpeg
- ffmpeg


