Количество 17
Количество 17

SUSE-SU-2024:2408-1
Security update for libvpx

RLSA-2024:5941
Moderate: libvpx security update
ELSA-2024-5941
ELSA-2024-5941: libvpx security update (MODERATE)

SUSE-SU-2024:2409-1
Security update for libvpx

ROS-20240718-04
Множественные уязвимости libvpx

CVE-2023-6349
A heap overflow vulnerability exists in libvpx - Encoding a frame that has larger dimensions than the originally configured size with VP9 may result in a heap overflow in libvpx. We recommend upgrading to version 1.13.1 or above

CVE-2023-6349
A heap overflow vulnerability exists in libvpx - Encoding a frame that has larger dimensions than the originally configured size with VP9 may result in a heap overflow in libvpx. We recommend upgrading to version 1.13.1 or above

CVE-2023-6349
A heap overflow vulnerability exists in libvpx - Encoding a frame that has larger dimensions than the originally configured size with VP9 may result in a heap overflow in libvpx. We recommend upgrading to version 1.13.1 or above
CVE-2023-6349
A heap overflow vulnerability exists in libvpx -Encoding a frame that ...

CVE-2024-5197
There exists interger overflows in libvpx in versions prior to 1.14.1. Calling vpx_img_alloc() with a large value of the d_w, d_h, or align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. Calling vpx_img_wrap() with a large value of the d_w, d_h, or stride_align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. We recommend upgrading to version 1.14.1 or beyond

CVE-2024-5197
There exists interger overflows in libvpx in versions prior to 1.14.1. Calling vpx_img_alloc() with a large value of the d_w, d_h, or align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. Calling vpx_img_wrap() with a large value of the d_w, d_h, or stride_align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. We recommend upgrading to version 1.14.1 or beyond

CVE-2024-5197
There exists interger overflows in libvpx in versions prior to 1.14.1. Calling vpx_img_alloc() with a large value of the d_w, d_h, or align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. Calling vpx_img_wrap() with a large value of the d_w, d_h, or stride_align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. We recommend upgrading to version 1.14.1 or beyond
CVE-2024-5197
There exists interger overflows in libvpx in versions prior to 1.14.1. ...

BDU:2024-05778
Уязвимость библиотеки кодирования/декодирования видео libvpx, связанная с переполнением буфера в куче, позволяющая нарушителю вызвать отказ в обслуживании или оказать иное воздействие
GHSA-4h58-f788-v8pw
There exists interger overflows in libvpx in versions prior to 1.14.1. Calling vpx_img_alloc() with a large value of the d_w, d_h, or align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. Calling vpx_img_wrap() with a large value of the d_w, d_h, or stride_align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. We recommend upgrading to version 1.14.1 or beyond
ELSA-2024-9827
ELSA-2024-9827: libvpx security update (MODERATE)

BDU:2024-04531
Уязвимость функции vpx_img_alloc() библиотеки кодирования/декодирования видео libvpx, позволяющая нарушителю выполнить произвольный код
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | SUSE-SU-2024:2408-1 Security update for libvpx | 11 месяцев назад | ||
![]() | RLSA-2024:5941 Moderate: libvpx security update | 9 месяцев назад | ||
ELSA-2024-5941 ELSA-2024-5941: libvpx security update (MODERATE) | 10 месяцев назад | |||
![]() | SUSE-SU-2024:2409-1 Security update for libvpx | 11 месяцев назад | ||
![]() | ROS-20240718-04 Множественные уязвимости libvpx | CVSS3: 8.8 | 11 месяцев назад | |
![]() | CVE-2023-6349 A heap overflow vulnerability exists in libvpx - Encoding a frame that has larger dimensions than the originally configured size with VP9 may result in a heap overflow in libvpx. We recommend upgrading to version 1.13.1 or above | 0% Низкий | около 1 года назад | |
![]() | CVE-2023-6349 A heap overflow vulnerability exists in libvpx - Encoding a frame that has larger dimensions than the originally configured size with VP9 may result in a heap overflow in libvpx. We recommend upgrading to version 1.13.1 or above | CVSS3: 6.5 | 0% Низкий | около 1 года назад |
![]() | CVE-2023-6349 A heap overflow vulnerability exists in libvpx - Encoding a frame that has larger dimensions than the originally configured size with VP9 may result in a heap overflow in libvpx. We recommend upgrading to version 1.13.1 or above | 0% Низкий | около 1 года назад | |
CVE-2023-6349 A heap overflow vulnerability exists in libvpx -Encoding a frame that ... | 0% Низкий | около 1 года назад | ||
![]() | CVE-2024-5197 There exists interger overflows in libvpx in versions prior to 1.14.1. Calling vpx_img_alloc() with a large value of the d_w, d_h, or align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. Calling vpx_img_wrap() with a large value of the d_w, d_h, or stride_align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. We recommend upgrading to version 1.14.1 or beyond | 0% Низкий | около 1 года назад | |
![]() | CVE-2024-5197 There exists interger overflows in libvpx in versions prior to 1.14.1. Calling vpx_img_alloc() with a large value of the d_w, d_h, or align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. Calling vpx_img_wrap() with a large value of the d_w, d_h, or stride_align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. We recommend upgrading to version 1.14.1 or beyond | CVSS3: 7.1 | 0% Низкий | около 1 года назад |
![]() | CVE-2024-5197 There exists interger overflows in libvpx in versions prior to 1.14.1. Calling vpx_img_alloc() with a large value of the d_w, d_h, or align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. Calling vpx_img_wrap() with a large value of the d_w, d_h, or stride_align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. We recommend upgrading to version 1.14.1 or beyond | 0% Низкий | около 1 года назад | |
CVE-2024-5197 There exists interger overflows in libvpx in versions prior to 1.14.1. ... | 0% Низкий | около 1 года назад | ||
![]() | BDU:2024-05778 Уязвимость библиотеки кодирования/декодирования видео libvpx, связанная с переполнением буфера в куче, позволяющая нарушителю вызвать отказ в обслуживании или оказать иное воздействие | CVSS3: 8.8 | 0% Низкий | около 1 года назад |
GHSA-4h58-f788-v8pw There exists interger overflows in libvpx in versions prior to 1.14.1. Calling vpx_img_alloc() with a large value of the d_w, d_h, or align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. Calling vpx_img_wrap() with a large value of the d_w, d_h, or stride_align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. We recommend upgrading to version 1.14.1 or beyond | 0% Низкий | около 1 года назад | ||
ELSA-2024-9827 ELSA-2024-9827: libvpx security update (MODERATE) | 7 месяцев назад | |||
![]() | BDU:2024-04531 Уязвимость функции vpx_img_alloc() библиотеки кодирования/декодирования видео libvpx, позволяющая нарушителю выполнить произвольный код | CVSS3: 7.1 | 0% Низкий | около 1 года назад |
Уязвимостей на страницу