{ "id": "CVE-2024-5197", "sourceIdentifier": "cve-coordination@google.com", "published": "2024-06-03T14:15:09.520", "lastModified": "2024-06-03T14:46:24.250", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "There exists interger overflows in libvpx in versions prior to 1.14.1.\u00a0Calling vpx_img_alloc()\u00a0with a large value of the d_w, d_h, or align\u00a0parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t\u00a0struct may be invalid.\u00a0Calling vpx_img_wrap()\u00a0with a large value of the d_w, d_h, or stride_align\u00a0parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t\u00a0struct may be invalid. We recommend upgrading to version 1.14.1 or beyond" } ], "metrics": {}, "weaknesses": [ { "source": "cve-coordination@google.com", "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-190" } ] } ], "references": [ { "url": "https://g-issues.chromium.org/issues/332382766", "source": "cve-coordination@google.com" } ] }