{"schema_version":"1.7.2","id":"OESA-2024-1689","modified":"2024-06-07T11:08:12Z","published":"2024-06-07T11:08:12Z","upstream":["CVE-2023-39929"],"summary":"libva security update","details":"Libva is an implementation for VA-API, which is an open-source library and API specification, provides access to graphics hardware acceleration capabilities for video processing. It consists of a main library and driver-specific acceleration backends for each supported hardware vendor.\r\n\r\nSecurity Fix(es):\r\n\r\nUncontrolled search path in some Libva software maintained by Intel(R) before version 2.20.0 may allow an authenticated user to potentially enable escalation of privilege via local access.(CVE-2023-39929)","affected":[{"package":{"ecosystem":"openEuler:20.03-LTS-SP4","name":"libva","purl":"pkg:rpm/openEuler/libva\u0026distro=openEuler-20.03-LTS-SP4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.20.0-1.oe2003sp4"}]}],"ecosystem_specific":{"aarch64":["libva-debugsource-2.20.0-1.oe2003sp4.aarch64.rpm","libva-devel-2.20.0-1.oe2003sp4.aarch64.rpm","libva-2.20.0-1.oe2003sp4.aarch64.rpm","libva-debuginfo-2.20.0-1.oe2003sp4.aarch64.rpm"],"src":["libva-2.20.0-1.oe2003sp4.src.rpm"],"x86_64":["libva-debugsource-2.20.0-1.oe2003sp4.x86_64.rpm","libva-devel-2.20.0-1.oe2003sp4.x86_64.rpm","libva-2.20.0-1.oe2003sp4.x86_64.rpm","libva-debuginfo-2.20.0-1.oe2003sp4.x86_64.rpm"]}},{"package":{"ecosystem":"openEuler:22.03-LTS-SP1","name":"libva","purl":"pkg:rpm/openEuler/libva\u0026distro=openEuler-22.03-LTS-SP1"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.20.0-1.oe2203sp1"}]}],"ecosystem_specific":{"aarch64":["libva-debuginfo-2.20.0-1.oe2203sp1.aarch64.rpm","libva-2.20.0-1.oe2203sp1.aarch64.rpm","libva-devel-2.20.0-1.oe2203sp1.aarch64.rpm","libva-debugsource-2.20.0-1.oe2203sp1.aarch64.rpm"],"src":["libva-2.20.0-1.oe2203sp1.src.rpm"],"x86_64":["libva-debuginfo-2.20.0-1.oe2203sp1.x86_64.rpm","libva-debugsource-2.20.0-1.oe2203sp1.x86_64.rpm","libva-devel-2.20.0-1.oe2203sp1.x86_64.rpm","libva-2.20.0-1.oe2203sp1.x86_64.rpm"]}},{"package":{"ecosystem":"openEuler:22.03-LTS-SP3","name":"libva","purl":"pkg:rpm/openEuler/libva\u0026distro=openEuler-22.03-LTS-SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.20.0-1.oe2203sp3"}]}],"ecosystem_specific":{"aarch64":["libva-devel-2.20.0-1.oe2203sp3.aarch64.rpm","libva-debugsource-2.20.0-1.oe2203sp3.aarch64.rpm","libva-debuginfo-2.20.0-1.oe2203sp3.aarch64.rpm","libva-2.20.0-1.oe2203sp3.aarch64.rpm"],"src":["libva-2.20.0-1.oe2203sp3.src.rpm"],"x86_64":["libva-2.20.0-1.oe2203sp3.x86_64.rpm","libva-debugsource-2.20.0-1.oe2203sp3.x86_64.rpm","libva-debuginfo-2.20.0-1.oe2203sp3.x86_64.rpm","libva-devel-2.20.0-1.oe2203sp3.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2024-1689"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-39929"}],"database_specific":{"severity":"Medium"}}