跳转到帖子

Ubuntu: (Multiple Advisories) (CVE-2024-5197): libvpx vulnerability

recommended_posts

发布于
  • Members

Ubuntu: (Multiple Advisories) (CVE-2024-5197): libvpx vulnerability

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
06/03/2024
Created
06/07/2024
Added
06/07/2024
Modified
02/04/2025

Description

There exists interger overflows in libvpx in versions prior to 1.14.1. Calling vpx_img_alloc() with a large value of the d_w, d_h, or align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. Calling vpx_img_wrap() with a large value of the d_w, d_h, or stride_align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. We recommend upgrading to version 1.14.1 or beyond

Solution(s)

  • ubuntu-pro-upgrade-libvpx1
  • ubuntu-pro-upgrade-libvpx3
  • ubuntu-pro-upgrade-libvpx5
  • ubuntu-pro-upgrade-libvpx6
  • ubuntu-pro-upgrade-libvpx7
  • ubuntu-pro-upgrade-libvpx9
  • ubuntu-pro-upgrade-vpx-tools

References

  • https://attackerkb.com/topics/cve-2024-5197
  • CVE - 2024-5197
  • USN-6814-1
  • USN-7249-1
  • 查看数 700
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。

游客
回帖…