Generated remediation guidance and an executive summary. No account required.
There exists interger overflows in libvpx in versions prior to 1.14.1. Calling vpx_img_alloc() with a large value of the d_w, d_h, or align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. Calling vpx_img_wrap() with a large value of the d_w, d_h, or stride_align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. We recommend upgrading to version 1.14.1 or beyond
Use CWE-190, Webmproject vendor hub and Libvpx product page to widen CVE-2024-5197 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2023-5217, CVE-2010-4203 and CVE-2023-44488 for nearby disclosures in the same product family.