An update for libvpx is now available for openEuler-20.03-LTS-SP4,openEuler-22.03-LTS-SP1,openEuler-22.03-LTS-SP3 and openEuler-24.03-LTS
Security Advisory
openeuler-security@openeuler.org
openEuler security committee
openEuler-SA-2024-1716
Final
1.0
1.0
2024-06-14
Initial
2024-06-14
2024-06-14
openEuler SA Tool V1.0
2024-06-14
libvpx security update
An update for libvpx is now available for openEuler-20.03-LTS-SP4,openEuler-22.03-LTS-SP1,openEuler-22.03-LTS-SP3 and openEuler-24.03-LTS.
libvpx provides the VP8/VP9 SDK, which allows you to integrate your applications with the VP8 and VP9 video codecs, high quality, royalty free, open source codecs deployed on millions of computers and devices worldwide.
Security Fix(es):
There exists interger overflows in libvpx in versions prior to 1.14.1. Calling vpx_img_alloc() with a large value of the d_w, d_h, or align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. Calling vpx_img_wrap() with a large value of the d_w, d_h, or stride_align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. We recommend upgrading to version 1.14.1 or beyond(CVE-2024-5197)
An update for libvpx is now available for openEuler-20.03-LTS-SP4,openEuler-22.03-LTS-SP1,openEuler-22.03-LTS-SP3 and openEuler-24.03-LTS.
openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.
High
libvpx
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2024-1716
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2024-5197
https://nvd.nist.gov/vuln/detail/CVE-2024-5197
openEuler-20.03-LTS-SP4
openEuler-22.03-LTS-SP1
openEuler-22.03-LTS-SP3
openEuler-24.03-LTS
libvpx-1.7.0-11.oe2003sp4.aarch64.rpm
libvpx-debugsource-1.7.0-11.oe2003sp4.aarch64.rpm
libvpx-devel-1.7.0-11.oe2003sp4.aarch64.rpm
libvpx-debuginfo-1.7.0-11.oe2003sp4.aarch64.rpm
libvpx-debuginfo-1.7.0-12.oe2203sp1.aarch64.rpm
libvpx-debugsource-1.7.0-12.oe2203sp1.aarch64.rpm
libvpx-1.7.0-12.oe2203sp1.aarch64.rpm
libvpx-devel-1.7.0-12.oe2203sp1.aarch64.rpm
libvpx-devel-1.7.0-12.oe2203sp3.aarch64.rpm
libvpx-1.7.0-12.oe2203sp3.aarch64.rpm
libvpx-debugsource-1.7.0-12.oe2203sp3.aarch64.rpm
libvpx-debuginfo-1.7.0-12.oe2203sp3.aarch64.rpm
libvpx-devel-1.13.1-2.oe2403.aarch64.rpm
libvpx-debuginfo-1.13.1-2.oe2403.aarch64.rpm
libvpx-debugsource-1.13.1-2.oe2403.aarch64.rpm
libvpx-1.13.1-2.oe2403.aarch64.rpm
libvpx-1.7.0-11.oe2003sp4.src.rpm
libvpx-1.7.0-12.oe2203sp1.src.rpm
libvpx-1.7.0-12.oe2203sp3.src.rpm
libvpx-1.13.1-2.oe2403.src.rpm
libvpx-debugsource-1.7.0-11.oe2003sp4.x86_64.rpm
libvpx-1.7.0-11.oe2003sp4.x86_64.rpm
libvpx-debuginfo-1.7.0-11.oe2003sp4.x86_64.rpm
libvpx-devel-1.7.0-11.oe2003sp4.x86_64.rpm
libvpx-debugsource-1.7.0-12.oe2203sp1.x86_64.rpm
libvpx-debuginfo-1.7.0-12.oe2203sp1.x86_64.rpm
libvpx-1.7.0-12.oe2203sp1.x86_64.rpm
libvpx-devel-1.7.0-12.oe2203sp1.x86_64.rpm
libvpx-devel-1.7.0-12.oe2203sp3.x86_64.rpm
libvpx-debugsource-1.7.0-12.oe2203sp3.x86_64.rpm
libvpx-1.7.0-12.oe2203sp3.x86_64.rpm
libvpx-debuginfo-1.7.0-12.oe2203sp3.x86_64.rpm
libvpx-debugsource-1.13.1-2.oe2403.x86_64.rpm
libvpx-1.13.1-2.oe2403.x86_64.rpm
libvpx-debuginfo-1.13.1-2.oe2403.x86_64.rpm
libvpx-devel-1.13.1-2.oe2403.x86_64.rpm
There exists interger overflows in libvpx in versions prior to 1.14.1. Calling vpx_img_alloc() with a large value of the d_w, d_h, or align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. Calling vpx_img_wrap() with a large value of the d_w, d_h, or stride_align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. We recommend upgrading to version 1.14.1 or beyond
2024-06-14
CVE-2024-5197
openEuler-20.03-LTS-SP4
openEuler-22.03-LTS-SP1
openEuler-22.03-LTS-SP3
openEuler-24.03-LTS
High
7.8
AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
libvpx security update
2024-06-14
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2024-1716