There exists interger overflows in libvpx in versions prior to 1.14.1. Calling vpx_img_alloc() with a large value of the d_w, d_h, or align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. Calling vpx_img_wrap() with a large value of the d_w, d_h, or stride_align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. We recommend upgrading to version 1.14.1 or beyond
Metrics
Affected Vendors & Products
References
History
Fri, 22 Nov 2024 15:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/a:redhat:enterprise_linux:9 |
Wed, 28 Aug 2024 23:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat
Redhat enterprise Linux |
|
CPEs | cpe:/a:redhat:enterprise_linux:8 | |
Vendors & Products |
Redhat
Redhat enterprise Linux |
MITRE
Status: PUBLISHED
Assigner: Google
Published: 2024-06-03T13:30:26.925Z
Updated: 2024-08-01T21:03:11.058Z
Reserved: 2024-05-22T09:42:54.906Z
Link: CVE-2024-5197
Vulnrichment
Updated: 2024-08-01T21:03:11.058Z
NVD
Status : Awaiting Analysis
Published: 2024-06-03T14:15:09.520
Modified: 2024-11-21T09:47:10.363
Link: CVE-2024-5197
Redhat