Import Source
https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-42958.json
JSON Data
https://api.test.osv.dev/v1/vulns/AZL-42958
Upstream
Published
2024-06-03T14:15:09Z
Modified
2026-04-01T05:14:55.771684Z
Summary
CVE-2024-5197 affecting package libvpx 1.13.1-1
Details

There exists interger overflows in libvpx in versions prior to 1.14.1. Calling vpximgalloc() with a large value of the dw, dh, or align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpximaget struct may be invalid. Calling vpximgwrap() with a large value of the dw, dh, or stridealign parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpximage_t struct may be invalid. We recommend upgrading to version 1.14.1 or beyond

References

Affected packages

Azure Linux:2 / libvpx

Package

Name
libvpx
Purl
pkg:rpm/azure-linux/libvpx

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Last affected
1.13.1-1

Database specific

source
"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-42958.json"