csaf2cusa/cvrfs/2023/cvrf-openEuler-SA-2023-1740.xml
Jia Chao 0b84f3c661 增加测试用的配置和目录
Signed-off-by: Jia Chao <jiac13@chinaunicom.cn>
2024-07-02 15:51:55 +08:00

186 lines
14 KiB
XML

<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
<DocumentTitle xml:lang="en">An update for libvpx is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3,openEuler-22.03-LTS,openEuler-22.03-LTS-SP1 and openEuler-22.03-LTS-SP2</DocumentTitle>
<DocumentType>Security Advisory</DocumentType>
<DocumentPublisher Type="Vendor">
<ContactDetails>openeuler-security@openeuler.org</ContactDetails>
<IssuingAuthority>openEuler security committee</IssuingAuthority>
</DocumentPublisher>
<DocumentTracking>
<Identification>
<ID>openEuler-SA-2023-1740</ID>
</Identification>
<Status>Final</Status>
<Version>1.0</Version>
<RevisionHistory>
<Revision>
<Number>1.0</Number>
<Date>2023-10-13</Date>
<Description>Initial</Description>
</Revision>
</RevisionHistory>
<InitialReleaseDate>2023-10-13</InitialReleaseDate>
<CurrentReleaseDate>2023-10-13</CurrentReleaseDate>
<Generator>
<Engine>openEuler SA Tool V1.0</Engine>
<Date>2023-10-13</Date>
</Generator>
</DocumentTracking>
<DocumentNotes>
<Note Title="Synopsis" Type="General" Ordinal="1" xml:lang="en">libvpx security update</Note>
<Note Title="Summary" Type="General" Ordinal="2" xml:lang="en">An update for libvpx is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3,openEuler-22.03-LTS,openEuler-22.03-LTS-SP1 and openEuler-22.03-LTS-SP2.</Note>
<Note Title="Description" Type="General" Ordinal="3" xml:lang="en">libvpx provides the VP8/VP9 SDK, which allows you to integrate your applications with the VP8 and VP9 video codecs, high quality, royalty free, open source codecs deployed on millions of computers and devices worldwide.
Security Fix(es):
VP9 in libvpx before 1.13.1 mishandles widths, leading to a crash related to encoding.(CVE-2023-44488)
Heap buffer overflow in vp8 encoding in libvpx in Google Chrome prior to 117.0.5938.132 and libvpx 1.13.1 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)(CVE-2023-5217)</Note>
<Note Title="Topic" Type="General" Ordinal="4" xml:lang="en">An update for libvpx is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3,openEuler-22.03-LTS,openEuler-22.03-LTS-SP1 and openEuler-22.03-LTS-SP2.
openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.</Note>
<Note Title="Severity" Type="General" Ordinal="5" xml:lang="en">High</Note>
<Note Title="Affected Component" Type="General" Ordinal="6" xml:lang="en">libvpx</Note>
</DocumentNotes>
<DocumentReferences>
<Reference Type="Self">
<URL>https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1740</URL>
</Reference>
<Reference Type="openEuler CVE">
<URL>https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2023-44488</URL>
<URL>https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2023-5217</URL>
</Reference>
<Reference Type="Other">
<URL>https://nvd.nist.gov/vuln/detail/CVE-2023-44488</URL>
<URL>https://nvd.nist.gov/vuln/detail/CVE-2023-5217</URL>
</Reference>
</DocumentReferences>
<ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
<Branch Type="Product Name" Name="openEuler">
<FullProductName ProductID="openEuler-20.03-LTS-SP1" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">openEuler-20.03-LTS-SP1</FullProductName>
<FullProductName ProductID="openEuler-20.03-LTS-SP3" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">openEuler-20.03-LTS-SP3</FullProductName>
<FullProductName ProductID="openEuler-22.03-LTS" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">openEuler-22.03-LTS</FullProductName>
<FullProductName ProductID="openEuler-22.03-LTS-SP1" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">openEuler-22.03-LTS-SP1</FullProductName>
<FullProductName ProductID="openEuler-22.03-LTS-SP2" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP2">openEuler-22.03-LTS-SP2</FullProductName>
</Branch>
<Branch Type="Package Arch" Name="aarch64">
<FullProductName ProductID="libvpx-devel-1.7.0-10" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">libvpx-devel-1.7.0-10.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="libvpx-debugsource-1.7.0-10" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">libvpx-debugsource-1.7.0-10.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="libvpx-debuginfo-1.7.0-10" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">libvpx-debuginfo-1.7.0-10.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="libvpx-1.7.0-10" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">libvpx-1.7.0-10.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="libvpx-debuginfo-1.7.0-10" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">libvpx-debuginfo-1.7.0-10.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="libvpx-devel-1.7.0-10" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">libvpx-devel-1.7.0-10.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="libvpx-debugsource-1.7.0-10" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">libvpx-debugsource-1.7.0-10.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="libvpx-1.7.0-10" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">libvpx-1.7.0-10.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="libvpx-1.7.0-10" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">libvpx-1.7.0-10.oe2203.aarch64.rpm</FullProductName>
<FullProductName ProductID="libvpx-debugsource-1.7.0-10" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">libvpx-debugsource-1.7.0-10.oe2203.aarch64.rpm</FullProductName>
<FullProductName ProductID="libvpx-debuginfo-1.7.0-10" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">libvpx-debuginfo-1.7.0-10.oe2203.aarch64.rpm</FullProductName>
<FullProductName ProductID="libvpx-devel-1.7.0-10" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">libvpx-devel-1.7.0-10.oe2203.aarch64.rpm</FullProductName>
<FullProductName ProductID="libvpx-1.7.0-10" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">libvpx-1.7.0-10.oe2203sp1.aarch64.rpm</FullProductName>
<FullProductName ProductID="libvpx-debugsource-1.7.0-10" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">libvpx-debugsource-1.7.0-10.oe2203sp1.aarch64.rpm</FullProductName>
<FullProductName ProductID="libvpx-debuginfo-1.7.0-10" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">libvpx-debuginfo-1.7.0-10.oe2203sp1.aarch64.rpm</FullProductName>
<FullProductName ProductID="libvpx-devel-1.7.0-10" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">libvpx-devel-1.7.0-10.oe2203sp1.aarch64.rpm</FullProductName>
<FullProductName ProductID="libvpx-devel-1.7.0-10" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP2">libvpx-devel-1.7.0-10.oe2203sp2.aarch64.rpm</FullProductName>
<FullProductName ProductID="libvpx-debuginfo-1.7.0-10" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP2">libvpx-debuginfo-1.7.0-10.oe2203sp2.aarch64.rpm</FullProductName>
<FullProductName ProductID="libvpx-debugsource-1.7.0-10" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP2">libvpx-debugsource-1.7.0-10.oe2203sp2.aarch64.rpm</FullProductName>
<FullProductName ProductID="libvpx-1.7.0-10" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP2">libvpx-1.7.0-10.oe2203sp2.aarch64.rpm</FullProductName>
</Branch>
<Branch Type="Package Arch" Name="src">
<FullProductName ProductID="libvpx-1.7.0-10" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">libvpx-1.7.0-10.oe1.src.rpm</FullProductName>
<FullProductName ProductID="libvpx-1.7.0-10" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">libvpx-1.7.0-10.oe1.src.rpm</FullProductName>
<FullProductName ProductID="libvpx-1.7.0-10" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">libvpx-1.7.0-10.oe2203.src.rpm</FullProductName>
<FullProductName ProductID="libvpx-1.7.0-10" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">libvpx-1.7.0-10.oe2203sp1.src.rpm</FullProductName>
<FullProductName ProductID="libvpx-1.7.0-10" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP2">libvpx-1.7.0-10.oe2203sp2.src.rpm</FullProductName>
</Branch>
<Branch Type="Package Arch" Name="x86_64">
<FullProductName ProductID="libvpx-debugsource-1.7.0-10" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">libvpx-debugsource-1.7.0-10.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="libvpx-1.7.0-10" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">libvpx-1.7.0-10.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="libvpx-debuginfo-1.7.0-10" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">libvpx-debuginfo-1.7.0-10.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="libvpx-devel-1.7.0-10" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">libvpx-devel-1.7.0-10.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="libvpx-devel-1.7.0-10" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">libvpx-devel-1.7.0-10.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="libvpx-1.7.0-10" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">libvpx-1.7.0-10.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="libvpx-debuginfo-1.7.0-10" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">libvpx-debuginfo-1.7.0-10.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="libvpx-debugsource-1.7.0-10" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">libvpx-debugsource-1.7.0-10.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="libvpx-devel-1.7.0-10" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">libvpx-devel-1.7.0-10.oe2203.x86_64.rpm</FullProductName>
<FullProductName ProductID="libvpx-1.7.0-10" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">libvpx-1.7.0-10.oe2203.x86_64.rpm</FullProductName>
<FullProductName ProductID="libvpx-debuginfo-1.7.0-10" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">libvpx-debuginfo-1.7.0-10.oe2203.x86_64.rpm</FullProductName>
<FullProductName ProductID="libvpx-debugsource-1.7.0-10" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">libvpx-debugsource-1.7.0-10.oe2203.x86_64.rpm</FullProductName>
<FullProductName ProductID="libvpx-debuginfo-1.7.0-10" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">libvpx-debuginfo-1.7.0-10.oe2203sp1.x86_64.rpm</FullProductName>
<FullProductName ProductID="libvpx-devel-1.7.0-10" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">libvpx-devel-1.7.0-10.oe2203sp1.x86_64.rpm</FullProductName>
<FullProductName ProductID="libvpx-debugsource-1.7.0-10" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">libvpx-debugsource-1.7.0-10.oe2203sp1.x86_64.rpm</FullProductName>
<FullProductName ProductID="libvpx-1.7.0-10" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP1">libvpx-1.7.0-10.oe2203sp1.x86_64.rpm</FullProductName>
<FullProductName ProductID="libvpx-debuginfo-1.7.0-10" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP2">libvpx-debuginfo-1.7.0-10.oe2203sp2.x86_64.rpm</FullProductName>
<FullProductName ProductID="libvpx-devel-1.7.0-10" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP2">libvpx-devel-1.7.0-10.oe2203sp2.x86_64.rpm</FullProductName>
<FullProductName ProductID="libvpx-debugsource-1.7.0-10" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP2">libvpx-debugsource-1.7.0-10.oe2203sp2.x86_64.rpm</FullProductName>
<FullProductName ProductID="libvpx-1.7.0-10" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP2">libvpx-1.7.0-10.oe2203sp2.x86_64.rpm</FullProductName>
</Branch>
</ProductTree>
<Vulnerability Ordinal="1" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
<Notes>
<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">VP9 in libvpx before 1.13.1 mishandles widths, leading to a crash related to encoding.</Note>
</Notes>
<ReleaseDate>2023-10-13</ReleaseDate>
<CVE>CVE-2023-44488</CVE>
<ProductStatuses>
<Status Type="Fixed">
<ProductID>openEuler-20.03-LTS-SP1</ProductID>
<ProductID>openEuler-20.03-LTS-SP3</ProductID>
<ProductID>openEuler-22.03-LTS</ProductID>
<ProductID>openEuler-22.03-LTS-SP1</ProductID>
<ProductID>openEuler-22.03-LTS-SP2</ProductID>
</Status>
</ProductStatuses>
<Threats>
<Threat Type="Impact">
<Description>High</Description>
</Threat>
</Threats>
<CVSSScoreSets>
<ScoreSet>
<BaseScore>7.5</BaseScore>
<Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
</ScoreSet>
</CVSSScoreSets>
<Remediations>
<Remediation Type="Vendor Fix">
<Description>libvpx security update</Description>
<DATE>2023-10-13</DATE>
<URL>https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1740</URL>
</Remediation>
</Remediations>
</Vulnerability>
<Vulnerability Ordinal="2" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
<Notes>
<Note Title="Vulnerability Description" Type="General" Ordinal="2" xml:lang="en">Heap buffer overflow in vp8 encoding in libvpx in Google Chrome prior to 117.0.5938.132 and libvpx 1.13.1 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)</Note>
</Notes>
<ReleaseDate>2023-10-13</ReleaseDate>
<CVE>CVE-2023-5217</CVE>
<ProductStatuses>
<Status Type="Fixed">
<ProductID>openEuler-20.03-LTS-SP1</ProductID>
<ProductID>openEuler-20.03-LTS-SP3</ProductID>
<ProductID>openEuler-22.03-LTS</ProductID>
<ProductID>openEuler-22.03-LTS-SP1</ProductID>
<ProductID>openEuler-22.03-LTS-SP2</ProductID>
</Status>
</ProductStatuses>
<Threats>
<Threat Type="Impact">
<Description>High</Description>
</Threat>
</Threats>
<CVSSScoreSets>
<ScoreSet>
<BaseScore>8.8</BaseScore>
<Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</Vector>
</ScoreSet>
</CVSSScoreSets>
<Remediations>
<Remediation Type="Vendor Fix">
<Description>libvpx security update</Description>
<DATE>2023-10-13</DATE>
<URL>https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1740</URL>
</Remediation>
</Remediations>
</Vulnerability>
</cvrfdoc>