Vulnerability Details : CVE-2023-6879
Potential exploit
Increasing the resolution of video frames, while performing a multi-threaded encode, can result in a heap overflow in av1_loop_restoration_dealloc().
Products affected by CVE-2023-6879
- cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*
- cpe:2.3:a:aomedia:aomedia:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-6879
0.75%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 71 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-6879
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.0
|
CRITICAL | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H |
2.2
|
6.0
|
Google Inc. | |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST | 2024-01-05 |
6.8
|
MEDIUM | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H |
N/A
|
N/A
|
RedHat-CVE-2023-6879 |
CWE ids for CVE-2023-6879
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: cve-coordination@google.com (Secondary)
-
The product writes data past the end, or before the beginning, of the intended buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2023-6879
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D6C2HN4T2S6GYNTAUXLH45LQZHK7QPHP/
[SECURITY] Fedora 39 Update: chromium-120.0.6099.199-1.fc39 - package-announce - Fedora Mailing-ListsMailing List;Third Party Advisory
-
https://crbug.com/aomedia/3491
3491 - heap-buffer-overflow encoding frames of size 256x256, 512x512 in good quality usage mode using 4 threads. - aomediaExploit;Issue Tracking;Mailing List;Patch;Third Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYONA2XSNFMXLAW4IHLFI5UVV3QRNG5K/
[SECURITY] Fedora 38 Update: chromium-120.0.6099.199-1.fc38 - package-announce - Fedora Mailing-ListsMailing List;Third Party Advisory
-
https://aomedia.googlesource.com/aom/+/refs/tags/v3.7.1
refs/tags/v3.7.1 - aom - Git at GooglePatch
Jump to