CVE-2024-5197

Name
CVE-2024-5197
Description
There exists interger overflows in libvpx in versions prior to 1.14.1. Calling vpx_img_alloc() with a large value of the d_w, d_h, or align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. Calling vpx_img_wrap() with a large value of the d_w, d_h, or stride_align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. We recommend upgrading to version 1.14.1 or beyond
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
https://g-issues.chromium.org/issues/332382766
https://lists.debian.org/debian-lts-announce/2024/06/msg00005.html

Match rules

CPE URI Source package Min version Max version
libvpx >= 0 < 1.14.1

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
libvpx 3.20-community 1.14.1-r0 Natanael Copa <ncopa@alpinelinux.org> fixed