Bug 2028904 (CVE-2020-36129) - CVE-2020-36129 aom: stack-based buffer overflow in src/aom_image.c
Summary: CVE-2020-36129 aom: stack-based buffer overflow in src/aom_image.c
Status: NEW
Alias: CVE-2020-36129
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
Depends On:
Blocks: Embargoed2028919
TreeView+ depends on / blocked
Reported: 2021-12-03 17:28 UTC by Guilherme de Almeida Suckevicz
Modified: 2022-12-15 15:31 UTC (History)
2 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
A stack buffer overflow flaw was found in AOM. This flaw allows an attacker to overflow the stack buffer in src/aom_image.c, resulting in a loss of confidentiality, availability, and integrity.
Clone Of:
Last Closed:

Attachments (Terms of Use)

Description Guilherme de Almeida Suckevicz 2021-12-03 17:28:28 UTC
AOM v2.0.1 was discovered to contain a stack buffer overflow via the component src/aom_image.c.


Note You need to log in before you can comment on or make changes to this bug.