Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2024-5197

Опубликовано: 03 июн. 2024
Источник: ubuntu
Приоритет: medium
EPSS Низкий

Описание

There exists interger overflows in libvpx in versions prior to 1.14.1. Calling vpx_img_alloc() with a large value of the d_w, d_h, or align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. Calling vpx_img_wrap() with a large value of the d_w, d_h, or stride_align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. We recommend upgrading to version 1.14.1 or beyond

РелизСтатусПримечание
devel

not-affected

1.14.1-1ubuntu1
esm-infra-legacy/trusty

released

1.3.0-2ubuntu0.1+esm3
esm-infra/bionic

released

1.7.0-3ubuntu0.18.04.1+esm2
esm-infra/focal

not-affected

1.8.2-1ubuntu0.3
esm-infra/xenial

released

1.5.0-2ubuntu1.1+esm3
focal

released

1.8.2-1ubuntu0.3
jammy

released

1.11.0-2ubuntu2.3
mantic

released

1.12.0-1ubuntu2.1
noble

released

1.14.0-1ubuntu2.1
oracular

not-affected

1.14.1-1ubuntu1

Показывать по

EPSS

Процентиль: 37%
0.00151
Низкий

Связанные уязвимости

CVSS3: 7.1
redhat
около 1 года назад

There exists interger overflows in libvpx in versions prior to 1.14.1. Calling vpx_img_alloc() with a large value of the d_w, d_h, or align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. Calling vpx_img_wrap() with a large value of the d_w, d_h, or stride_align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. We recommend upgrading to version 1.14.1 or beyond

nvd
около 1 года назад

There exists interger overflows in libvpx in versions prior to 1.14.1. Calling vpx_img_alloc() with a large value of the d_w, d_h, or align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. Calling vpx_img_wrap() with a large value of the d_w, d_h, or stride_align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. We recommend upgrading to version 1.14.1 or beyond

debian
около 1 года назад

There exists interger overflows in libvpx in versions prior to 1.14.1. ...

github
около 1 года назад

There exists interger overflows in libvpx in versions prior to 1.14.1. Calling vpx_img_alloc() with a large value of the d_w, d_h, or align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. Calling vpx_img_wrap() with a large value of the d_w, d_h, or stride_align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. We recommend upgrading to version 1.14.1 or beyond

oracle-oval
7 месяцев назад

ELSA-2024-9827: libvpx security update (MODERATE)

EPSS

Процентиль: 37%
0.00151
Низкий
Уязвимость CVE-2024-5197