More information about this CVE will likely be available in a few days
Description
There exists interger overflows in libvpx in versions prior to 1.14.1. Calling vpx_img_alloc() with a large value of the d_w, d_h, or align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. Calling vpx_img_wrap() with a large value of the d_w, d_h, or stride_align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. We recommend upgrading to version 1.14.1 or beyond
Related CPE's
Could not find any relations
References
CVSS impact metrics
Could not find any metrics
Information
Source identifier
Vulnerability status
Awaiting analysis
Published
2024-06-03T14:15:09.520
10 months agoLast modified
2024-06-16T21:15:50.820
10 months ago