An update for libvpx is now available for openEuler-20.03-LTS-SP4,openEuler-22.03-LTS-SP1,openEuler-22.03-LTS-SP3 and openEuler-24.03-LTS Security Advisory openeuler-security@openeuler.org openEuler security committee openEuler-SA-2024-1716 Final 1.0 1.0 2024-06-14 Initial 2024-06-14 2024-06-14 openEuler SA Tool V1.0 2024-06-14 libvpx security update An update for libvpx is now available for openEuler-20.03-LTS-SP4,openEuler-22.03-LTS-SP1,openEuler-22.03-LTS-SP3 and openEuler-24.03-LTS. libvpx provides the VP8/VP9 SDK, which allows you to integrate your applications with the VP8 and VP9 video codecs, high quality, royalty free, open source codecs deployed on millions of computers and devices worldwide. Security Fix(es): There exists interger overflows in libvpx in versions prior to 1.14.1. Calling vpx_img_alloc() with a large value of the d_w, d_h, or align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. Calling vpx_img_wrap() with a large value of the d_w, d_h, or stride_align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. We recommend upgrading to version 1.14.1 or beyond(CVE-2024-5197) An update for libvpx is now available for openEuler-20.03-LTS-SP4,openEuler-22.03-LTS-SP1,openEuler-22.03-LTS-SP3 and openEuler-24.03-LTS. openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section. High libvpx https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2024-1716 https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2024-5197 https://nvd.nist.gov/vuln/detail/CVE-2024-5197 openEuler-20.03-LTS-SP4 openEuler-22.03-LTS-SP1 openEuler-22.03-LTS-SP3 openEuler-24.03-LTS libvpx-1.7.0-11.oe2003sp4.aarch64.rpm libvpx-debugsource-1.7.0-11.oe2003sp4.aarch64.rpm libvpx-devel-1.7.0-11.oe2003sp4.aarch64.rpm libvpx-debuginfo-1.7.0-11.oe2003sp4.aarch64.rpm libvpx-debuginfo-1.7.0-12.oe2203sp1.aarch64.rpm libvpx-debugsource-1.7.0-12.oe2203sp1.aarch64.rpm libvpx-1.7.0-12.oe2203sp1.aarch64.rpm libvpx-devel-1.7.0-12.oe2203sp1.aarch64.rpm libvpx-devel-1.7.0-12.oe2203sp3.aarch64.rpm libvpx-1.7.0-12.oe2203sp3.aarch64.rpm libvpx-debugsource-1.7.0-12.oe2203sp3.aarch64.rpm libvpx-debuginfo-1.7.0-12.oe2203sp3.aarch64.rpm libvpx-devel-1.13.1-2.oe2403.aarch64.rpm libvpx-debuginfo-1.13.1-2.oe2403.aarch64.rpm libvpx-debugsource-1.13.1-2.oe2403.aarch64.rpm libvpx-1.13.1-2.oe2403.aarch64.rpm libvpx-1.7.0-11.oe2003sp4.src.rpm libvpx-1.7.0-12.oe2203sp1.src.rpm libvpx-1.7.0-12.oe2203sp3.src.rpm libvpx-1.13.1-2.oe2403.src.rpm libvpx-debugsource-1.7.0-11.oe2003sp4.x86_64.rpm libvpx-1.7.0-11.oe2003sp4.x86_64.rpm libvpx-debuginfo-1.7.0-11.oe2003sp4.x86_64.rpm libvpx-devel-1.7.0-11.oe2003sp4.x86_64.rpm libvpx-debugsource-1.7.0-12.oe2203sp1.x86_64.rpm libvpx-debuginfo-1.7.0-12.oe2203sp1.x86_64.rpm libvpx-1.7.0-12.oe2203sp1.x86_64.rpm libvpx-devel-1.7.0-12.oe2203sp1.x86_64.rpm libvpx-devel-1.7.0-12.oe2203sp3.x86_64.rpm libvpx-debugsource-1.7.0-12.oe2203sp3.x86_64.rpm libvpx-1.7.0-12.oe2203sp3.x86_64.rpm libvpx-debuginfo-1.7.0-12.oe2203sp3.x86_64.rpm libvpx-debugsource-1.13.1-2.oe2403.x86_64.rpm libvpx-1.13.1-2.oe2403.x86_64.rpm libvpx-debuginfo-1.13.1-2.oe2403.x86_64.rpm libvpx-devel-1.13.1-2.oe2403.x86_64.rpm There exists interger overflows in libvpx in versions prior to 1.14.1. Calling vpx_img_alloc() with a large value of the d_w, d_h, or align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. Calling vpx_img_wrap() with a large value of the d_w, d_h, or stride_align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. We recommend upgrading to version 1.14.1 or beyond 2024-06-14 CVE-2024-5197 openEuler-20.03-LTS-SP4 openEuler-22.03-LTS-SP1 openEuler-22.03-LTS-SP3 openEuler-24.03-LTS High 7.8 AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H libvpx security update 2024-06-14 https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2024-1716