Логотип exploitDog
bind:"GHSA-4h58-f788-v8pw" OR bind:"CVE-2024-5197"
Консоль
Логотип exploitDog

exploitDog

bind:"GHSA-4h58-f788-v8pw" OR bind:"CVE-2024-5197"

Количество 12

Количество 12

github логотип

GHSA-4h58-f788-v8pw

около 1 года назад

There exists interger overflows in libvpx in versions prior to 1.14.1. Calling vpx_img_alloc() with a large value of the d_w, d_h, or align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. Calling vpx_img_wrap() with a large value of the d_w, d_h, or stride_align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. We recommend upgrading to version 1.14.1 or beyond

EPSS: Низкий
ubuntu логотип

CVE-2024-5197

около 1 года назад

There exists interger overflows in libvpx in versions prior to 1.14.1. Calling vpx_img_alloc() with a large value of the d_w, d_h, or align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. Calling vpx_img_wrap() with a large value of the d_w, d_h, or stride_align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. We recommend upgrading to version 1.14.1 or beyond

EPSS: Низкий
redhat логотип

CVE-2024-5197

около 1 года назад

There exists interger overflows in libvpx in versions prior to 1.14.1. Calling vpx_img_alloc() with a large value of the d_w, d_h, or align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. Calling vpx_img_wrap() with a large value of the d_w, d_h, or stride_align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. We recommend upgrading to version 1.14.1 or beyond

CVSS3: 7.1
EPSS: Низкий
nvd логотип

CVE-2024-5197

около 1 года назад

There exists interger overflows in libvpx in versions prior to 1.14.1. Calling vpx_img_alloc() with a large value of the d_w, d_h, or align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. Calling vpx_img_wrap() with a large value of the d_w, d_h, or stride_align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. We recommend upgrading to version 1.14.1 or beyond

EPSS: Низкий
debian логотип

CVE-2024-5197

около 1 года назад

There exists interger overflows in libvpx in versions prior to 1.14.1. ...

EPSS: Низкий
oracle-oval логотип

ELSA-2024-9827

7 месяцев назад

ELSA-2024-9827: libvpx security update (MODERATE)

EPSS: Низкий
fstec логотип

BDU:2024-04531

около 1 года назад

Уязвимость функции vpx_img_alloc() библиотеки кодирования/декодирования видео libvpx, позволяющая нарушителю выполнить произвольный код

CVSS3: 7.1
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:2408-1

11 месяцев назад

Security update for libvpx

EPSS: Низкий
rocky логотип

RLSA-2024:5941

9 месяцев назад

Moderate: libvpx security update

EPSS: Низкий
oracle-oval логотип

ELSA-2024-5941

10 месяцев назад

ELSA-2024-5941: libvpx security update (MODERATE)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:2409-1

11 месяцев назад

Security update for libvpx

EPSS: Низкий
redos логотип

ROS-20240718-04

11 месяцев назад

Множественные уязвимости libvpx

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-4h58-f788-v8pw

There exists interger overflows in libvpx in versions prior to 1.14.1. Calling vpx_img_alloc() with a large value of the d_w, d_h, or align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. Calling vpx_img_wrap() with a large value of the d_w, d_h, or stride_align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. We recommend upgrading to version 1.14.1 or beyond

0%
Низкий
около 1 года назад
ubuntu логотип
CVE-2024-5197

There exists interger overflows in libvpx in versions prior to 1.14.1. Calling vpx_img_alloc() with a large value of the d_w, d_h, or align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. Calling vpx_img_wrap() with a large value of the d_w, d_h, or stride_align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. We recommend upgrading to version 1.14.1 or beyond

0%
Низкий
около 1 года назад
redhat логотип
CVE-2024-5197

There exists interger overflows in libvpx in versions prior to 1.14.1. Calling vpx_img_alloc() with a large value of the d_w, d_h, or align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. Calling vpx_img_wrap() with a large value of the d_w, d_h, or stride_align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. We recommend upgrading to version 1.14.1 or beyond

CVSS3: 7.1
0%
Низкий
около 1 года назад
nvd логотип
CVE-2024-5197

There exists interger overflows in libvpx in versions prior to 1.14.1. Calling vpx_img_alloc() with a large value of the d_w, d_h, or align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. Calling vpx_img_wrap() with a large value of the d_w, d_h, or stride_align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. We recommend upgrading to version 1.14.1 or beyond

0%
Низкий
около 1 года назад
debian логотип
CVE-2024-5197

There exists interger overflows in libvpx in versions prior to 1.14.1. ...

0%
Низкий
около 1 года назад
oracle-oval логотип
ELSA-2024-9827

ELSA-2024-9827: libvpx security update (MODERATE)

7 месяцев назад
fstec логотип
BDU:2024-04531

Уязвимость функции vpx_img_alloc() библиотеки кодирования/декодирования видео libvpx, позволяющая нарушителю выполнить произвольный код

CVSS3: 7.1
0%
Низкий
около 1 года назад
suse-cvrf логотип
SUSE-SU-2024:2408-1

Security update for libvpx

11 месяцев назад
rocky логотип
RLSA-2024:5941

Moderate: libvpx security update

9 месяцев назад
oracle-oval логотип
ELSA-2024-5941

ELSA-2024-5941: libvpx security update (MODERATE)

10 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:2409-1

Security update for libvpx

11 месяцев назад
redos логотип
ROS-20240718-04

Множественные уязвимости libvpx

CVSS3: 8.8
11 месяцев назад

Уязвимостей на страницу