There exists interger overflows in libvpx in versions prior to 1.14.1. Calling vpx_img_alloc() with a large value of the d_w, d_h, or align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. Calling vpx_img_wrap() with a large value of the d_w, d_h, or stride_align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. We recommend upgrading to version 1.14.1 or beyond
References
| Link | Resource |
|---|---|
| https://g-issues.chromium.org/issues/332382766 | Exploit Issue Tracking |
| https://lists.debian.org/debian-lts-announce/2024/06/msg00005.html | Mailing List Third Party Advisory |
| https://g-issues.chromium.org/issues/332382766 | Exploit Issue Tracking |
| https://lists.debian.org/debian-lts-announce/2024/06/msg00005.html | Mailing List Third Party Advisory |
Configurations
History
No history.
Information
Published : 2024-06-03 14:15
Updated : 2025-07-22 18:17
NVD link : CVE-2024-5197
Mitre link : CVE-2024-5197
CVE.ORG link : CVE-2024-5197
JSON object : View
Products Affected
debian
- debian_linux
webmproject
- libvpx
CWE
CWE-190
Integer Overflow or Wraparound
