MGASA-2024-0221

Source
https://advisories.mageia.org/MGASA-2024-0221.html
Import Source
https://advisories.mageia.org/MGASA-2024-0221.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2024-0221
Related
Published
2024-06-14T17:30:25Z
Modified
2024-06-14T17:11:55Z
Summary
Updated libvpx packages fix security vulnerabilities
Details

There exists integer overflows in libvpx in versions prior to 1.14.1. Calling vpximgalloc() with a large value of the dw, dh, or align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpximaget struct may be invalid. Calling vpximgwrap() with a large value of the dw, dh, or stridealign parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpximage_t struct may be invalid. (CVE-2024-5197)

References
Credits

Affected packages

Mageia:9 / libvpx

Package

Name
libvpx
Purl
pkg:rpm/mageia/libvpx?distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.12.0-1.3.mga9

Ecosystem specific

{
    "section": "core"
}