{ "id": "CVE-2024-5197", "sourceIdentifier": "cve-coordination@google.com", "published": "2024-06-03T14:15:09.520", "lastModified": "2024-06-16T21:15:50.820", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "There exists interger overflows in libvpx in versions prior to 1.14.1.\u00a0Calling vpx_img_alloc()\u00a0with a large value of the d_w, d_h, or align\u00a0parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t\u00a0struct may be invalid.\u00a0Calling vpx_img_wrap()\u00a0with a large value of the d_w, d_h, or stride_align\u00a0parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t\u00a0struct may be invalid. We recommend upgrading to version 1.14.1 or beyond" }, { "lang": "es", "value": "Existen desbordamientos de enteros en libvpx en versiones anteriores a la 1.14.1. Llamar a vpx_img_alloc() con un valor grande del par\u00e1metro d_w, d_h o align puede provocar desbordamientos de enteros en los c\u00e1lculos de tama\u00f1os y compensaciones del b\u00fafer y algunos campos de la estructura vpx_image_t devuelta pueden no ser v\u00e1lidos. Llamar a vpx_img_wrap() con un valor grande del par\u00e1metro d_w, d_h o stride_align puede provocar desbordamientos de enteros en los c\u00e1lculos de tama\u00f1os y compensaciones del b\u00fafer y algunos campos de la estructura vpx_image_t devuelta pueden no ser v\u00e1lidos. Recomendamos actualizar a la versi\u00f3n 1.14.1 o posterior" } ], "metrics": {}, "weaknesses": [ { "source": "cve-coordination@google.com", "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-190" } ] } ], "references": [ { "url": "https://g-issues.chromium.org/issues/332382766", "source": "cve-coordination@google.com" }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00005.html", "source": "cve-coordination@google.com" } ] }