PT-2024-4082 · Libvpx+10 · Libvpx+10
Published
2024-06-03
·
Updated
2025-07-22
·
CVE-2024-5197
CVSS v3.1
9.1
Critical
| AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
libvpx versions prior to 1.14.1
Description
The issue is related to integer overflows in the libvpx library, which can occur when calling
vpx img alloc() or vpx img wrap() with large values of the d w, d h, or align parameters, or the stride align parameter, respectively. This may result in integer overflows in the calculations of buffer sizes and offsets, and some fields of the returned vpx image t struct may be invalid.Recommendations
For libvpx versions prior to 1.14.1, upgrade to version 1.14.1 or beyond to resolve the issue. As a temporary workaround, consider restricting the use of the
vpx img alloc() and vpx img wrap() functions with large parameter values until a patch is available. Avoid using large values for the d w, d h, align, and stride align parameters in the affected API endpoints until the issue is resolved.Exploit
Fix
Integer Overflow
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Alt Linux
Almalinux
Astra Linux
Centos
Linuxmint
Red Hat
Red Os
Rocky Linux
Suse
Ubuntu
Libvpx