Description
There exists interger overflows in libvpx in versions prior to 1.14.1. Calling vpx_img_alloc() with a large value of the d_w, d_h, or align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. Calling vpx_img_wrap() with a large value of the d_w, d_h, or stride_align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. We recommend upgrading to version 1.14.1 or beyond
References
https://g-issues.chromium.org/issues/332382766
https://lists.debian.org/debian-lts-announce/2024/06/msg00005.html
https://g-issues.chromium.org/issues/332382766
https://lists.debian.org/debian-lts-announce/2024/06/msg00005.html
CVSS impact metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
9.1 · Critical
CVSS V3.1
CVSS V3.0
CVSS V2.0
Information
Source identifier
Vulnerability status
Analyzed
Published
2024-06-03T14:15:09.520
1 year agoLast modified
2025-07-22T18:17:56.937
5 months ago