{"id":"CVE-2023-51798","details":"Buffer Overflow vulnerability in Ffmpeg v.N113007-g8d24a28d06 allows a local attacker to execute arbitrary code via a floating point exception (FPE) error at libavfilter/vf_minterpolate.c:1078:60 in interpolate.","modified":"2026-04-09T09:50:30.755898Z","published":"2024-04-19T17:15:52.527Z","related":["CGA-jj7p-f5qg-3q4r","MGASA-2024-0248","SUSE-SU-2024:2803-1","SUSE-SU-2024:2864-1","SUSE-SU-2024:3114-1","SUSE-SU-2025:0862-1","openSUSE-SU-2024:13906-1","openSUSE-SU-2025:14974-1","openSUSE-SU-2025:15010-1"],"references":[{"type":"WEB","url":"https://ffmpeg.org/"},{"type":"REPORT","url":"https://trac.ffmpeg.org/ticket/10758"},{"type":"FIX","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/"},{"type":"FIX","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/"},{"type":"FIX","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/"},{"type":"ARTICLE","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/"},{"type":"ARTICLE","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/ffmpeg/ffmpeg","events":[{"introduced":"0"},{"last_affected":"083443d67cb159ce469e5d902346b8d0c2cd1c93"},{"introduced":"0"},{"last_affected":"af25a4bfd2503caf3ee485b27b99b620302f5718"},{"introduced":"0"},{"last_affected":"e3a61e91030696348b56361bdf80ea358aef4a19"},{"introduced":"0"},{"last_affected":"eaddd1d7140bab19e5a4403d3c0f61fe5f59cb75"},{"introduced":"0"},{"last_affected":"6b213175c90534e0ad1924bfeba2cf7e20db5bf2"},{"introduced":"0"},{"last_affected":"6b213175c90534e0ad1924bfeba2cf7e20db5bf2"},{"introduced":"0"},{"last_affected":"db69d06eeeab4f46da15030a80d539efb4503ca8"},{"introduced":"0"},{"last_affected":"f893221c8d89cb798b829bebe71d55e1a3f242fd"},{"introduced":"0"},{"last_affected":"f46e514491172d15bd74b4abb1814cd2f05a763e"},{"introduced":"0"},{"last_affected":"38e224c2ba0958d84453f81548d9b245eecd82a1"},{"introduced":"0"},{"last_affected":"140fd653aed8cad774f991ba083e2d01e86420c7"},{"introduced":"0"},{"last_affected":"894da5ca7d742e4429ffb2af534fcda0103ef593"},{"introduced":"0"},{"last_affected":"638b521c7b09e00514aa13ade43c389b4b40ddfd"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"7.0"},{"introduced":"0"},{"last_affected":"7.0.1"},{"introduced":"0"},{"last_affected":"7.0.2"},{"introduced":"0"},{"last_affected":"7.0.3"},{"introduced":"0"},{"last_affected":"7.1"},{"introduced":"0"},{"last_affected":"7.1-dev"},{"introduced":"0"},{"last_affected":"7.1.1"},{"introduced":"0"},{"last_affected":"7.1.2"},{"introduced":"0"},{"last_affected":"7.1.3"},{"introduced":"0"},{"last_affected":"7.2-dev"},{"introduced":"0"},{"last_affected":"8.0"},{"introduced":"0"},{"last_affected":"8.0.1"},{"introduced":"0"},{"last_affected":"8.1-dev"}]}}],"versions":["N","n0.11-dev","n0.12-dev","n0.8","n1.1-dev","n1.2-dev","n1.3-dev","n2.0","n2.1-dev","n2.2-dev","n2.3-dev","n2.4-dev","n2.5-dev","n2.6-dev","n2.7-dev","n2.8-dev","n2.9-dev","n3.1-dev","n3.2-dev","n3.3-dev","n3.4-dev","n3.5-dev","n4.1-dev","n4.2-dev","n4.3-dev","n4.4-dev","n4.5-dev","n5.1-dev","n5.2-dev","n6.1-dev","n6.2-dev","n7.0","n7.0.1","n7.0.2","n7.0.3","n7.1","n7.1-dev","n7.1.1","n7.1.2","n7.1.3","n7.2-dev","n8.0","n8.0.1","n8.1-dev"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"38"}]},{"events":[{"introduced":"0"},{"last_affected":"39"}]},{"events":[{"introduced":"0"},{"last_affected":"40"}]}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-51798.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}