CVE-2024-5197
CVSS V2 None
CVSS V3 None
Description
There exists interger overflows in libvpx in versions prior to 1.14.1. Calling vpx_img_alloc() with a large value of the d_w, d_h, or align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. Calling vpx_img_wrap() with a large value of the d_w, d_h, or stride_align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. We recommend upgrading to version 1.14.1 or beyond
Overview
- CVE ID
- CVE-2024-5197
- Assigner
- Vulnerability Status
- PUBLISHED
- Published Version
- 2024-06-03T13:30:26.925Z
- Last Modified Date
- 2024-06-03T13:30:26.925Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://g-issues.chromium.org/issues/332382766 | |
https://lists.debian.org/debian-lts-announce/2024/06/msg00005.html |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2024-5197 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5197 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-06-26 03:15:22 | Added to TrackCVE |