Wednesday, December 18, 2024

[USN-7172-1] libvpx vulnerability

-----BEGIN PGP SIGNATURE-----
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=BXj+
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-7172-1
December 18, 2024

libvpx vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 14.04 LTS

Summary:

libvpx could be made to crash or run programs if it received specially
crafted input.

Software Description:
- libvpx: VP8 and VP9 video codec

Details:

It was discovered that libvpx did not properly handle certain malformed
media files. If an application using libvpx opened a specially crafted
file, a remote attacker could cause a denial of service, or possibly
execute arbitrary code. Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04
LTS, and Ubuntu 16.04 LTS were previously addressed in USN-6403-1,
USN-6403-2, and USN-6403-3. This update addresses the issue in Ubuntu 14.04
LTS.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.04 LTS
  libvpx1                         1.3.0-2ubuntu0.1~esm3
                                  Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-7172-1
  CVE-2023-5217

No comments:

Post a Comment