CVE-2024-5197

There exists interger overflows in libvpx in versions prior to 1.14.1.Calling vpx_img_alloc()with a large value of the d_w, d_h, or alignparameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_tstruct may be invalid.Calling vpx_img_wrap()with a large value of the d_w, d_h, or stride_alignparameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_tstruct may be invalid. We recommend upgrading to version 1.14.1 or beyond
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
UNKNOWN
---
GoogleCNA
---
---
CISA-ADPADP
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 36%
VendorProductVersion
chromiumlibvpx
𝑥
< 1.14.1
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
libvpx
bullseye (security)
1.9.0-1+deb11u3
fixed
bullseye
1.9.0-1+deb11u3
fixed
bookworm
1.12.0-1+deb12u3
fixed
bookworm (security)
1.12.0-1+deb12u4
fixed
trixie
1.15.0-2
fixed
sid
1.15.0-2.1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
libvpx
oracular
not-affected
noble
Fixed 1.14.0-1ubuntu2.1
released
mantic
Fixed 1.12.0-1ubuntu2.1
released
jammy
Fixed 1.11.0-2ubuntu2.3
released
focal
Fixed 1.8.2-1ubuntu0.3
released
bionic
Fixed 1.7.0-3ubuntu0.18.04.1+esm2
released
xenial
Fixed 1.5.0-2ubuntu1.1+esm3
released
trusty
ignored