There exists interger overflows in libvpx in versions prior to 1.14.1. Calling vpx_img_alloc() with a large value of the d_w, d_h, or align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. Calling vpx_img_wrap() with a large value of the d_w, d_h, or stride_align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. We recommend upgrading to version 1.14.1 or beyond
CVSS
No CVSS.
References
Configurations
No configuration.
History
21 Nov 2024, 09:47
Type | Values Removed | Values Added |
---|---|---|
References | () https://g-issues.chromium.org/issues/332382766 - | |
References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00005.html - |
16 Jun 2024, 21:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary |
|
03 Jun 2024, 14:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-06-03 14:15
Updated : 2024-11-21 09:47
NVD link : CVE-2024-5197
Mitre link : CVE-2024-5197
CVE.ORG link : CVE-2024-5197
JSON object : View
Products Affected
No product.
CWE
CWE-190
Integer Overflow or Wraparound