Bug 1226020 (CVE-2024-5171) - VUL-0: CVE-2024-5171: libaom: heap buffer overflow in img_alloc_helper() caused by integer overflow
Summary: VUL-0: CVE-2024-5171: libaom: heap buffer overflow in img_alloc_helper() caus...
Status: NEW
Alias: CVE-2024-5171
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Daniel Molkentin
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/408840/
Whiteboard: CVSSv3.1:SUSE:CVE-2024-5171:8.4:(AV:L...
Keywords:
Depends on:
Blocks: 1226021
  Show dependency treegraph
 
Reported: 2024-06-06 06:16 UTC by SMASH SMASH
Modified: 2024-06-18 12:30 UTC (History)
2 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description SMASH SMASH 2024-06-06 06:16:16 UTC
Integer overflow in libaom internal function img_alloc_helper can lead to heap buffer overflow. This function can be reached via 3 callers:


  *  Calling aom_img_alloc() with a large value of the d_w, d_h, or align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned aom_image_t struct may be invalid.
  *  Calling aom_img_wrap() with a large value of the d_w, d_h, or align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned aom_image_t struct may be invalid.
  *  Calling aom_img_alloc_with_border() with a large value of the d_w, d_h, align, size_align, or border parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned aom_image_t struct may be invalid.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-5171
https://www.cve.org/CVERecord?id=CVE-2024-5171
https://issues.chromium.org/issues/332382766
Comment 1 Petr Gajdos 2024-06-10 12:36:58 UTC
Submitted for 15sp6,15sp4,15sp2/libaom.
Submitted also for ALP and SLFO.

Reassigning to openSUSE maintainer.
Comment 3 Maintenance Automation 2024-06-14 08:30:02 UTC
SUSE-SU-2024:2030-1: An update that solves one vulnerability can now be installed.

Category: security (important)
Bug References: 1226020
CVE References: CVE-2024-5171
Maintenance Incident: [SUSE:Maintenance:34234](https://smelt.suse.de/incident/34234/)
Sources used:
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src):
 libaom-1.0.0-150200.3.18.1
SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src):
 libaom-1.0.0-150200.3.18.1
SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src):
 libaom-1.0.0-150200.3.18.1
SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src):
 libaom-1.0.0-150200.3.18.1
SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src):
 libaom-1.0.0-150200.3.18.1
SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src):
 libaom-1.0.0-150200.3.18.1
SUSE Enterprise Storage 7.1 (src):
 libaom-1.0.0-150200.3.18.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 4 Maintenance Automation 2024-06-18 12:30:28 UTC
SUSE-SU-2024:2056-1: An update that solves one vulnerability can now be installed.

Category: security (important)
Bug References: 1226020
CVE References: CVE-2024-5171
Maintenance Incident: [SUSE:Maintenance:34233](https://smelt.suse.de/incident/34233/)
Sources used:
openSUSE Leap 15.6 (src):
 libaom-3.7.1-150600.3.3.1, libaom-devel-doc-3.7.1-150600.3.3.1
Desktop Applications Module 15-SP6 (src):
 libaom-3.7.1-150600.3.3.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.