{"schema_version":"1.7.2","id":"OESA-2024-1716","modified":"2024-06-14T11:08:15Z","published":"2024-06-14T11:08:15Z","upstream":["CVE-2024-5197"],"summary":"libvpx security update","details":"libvpx provides the VP8/VP9 SDK, which allows you to integrate your applications with the VP8 and VP9 video codecs, high quality, royalty free, open source codecs deployed on millions of computers and devices worldwide.\r\n\r\nSecurity Fix(es):\r\n\r\nThere exists interger overflows in libvpx in versions prior to 1.14.1. Calling vpx_img_alloc() with a large value of the d_w, d_h, or align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. Calling vpx_img_wrap() with a large value of the d_w, d_h, or stride_align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. We recommend upgrading to version 1.14.1 or beyond(CVE-2024-5197)","affected":[{"package":{"ecosystem":"openEuler:20.03-LTS-SP4","name":"libvpx","purl":"pkg:rpm/openEuler/libvpx\u0026distro=openEuler-20.03-LTS-SP4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.7.0-11.oe2003sp4"}]}],"ecosystem_specific":{"aarch64":["libvpx-1.7.0-11.oe2003sp4.aarch64.rpm","libvpx-debugsource-1.7.0-11.oe2003sp4.aarch64.rpm","libvpx-devel-1.7.0-11.oe2003sp4.aarch64.rpm","libvpx-debuginfo-1.7.0-11.oe2003sp4.aarch64.rpm"],"src":["libvpx-1.7.0-11.oe2003sp4.src.rpm"],"x86_64":["libvpx-debugsource-1.7.0-11.oe2003sp4.x86_64.rpm","libvpx-1.7.0-11.oe2003sp4.x86_64.rpm","libvpx-debuginfo-1.7.0-11.oe2003sp4.x86_64.rpm","libvpx-devel-1.7.0-11.oe2003sp4.x86_64.rpm"]}},{"package":{"ecosystem":"openEuler:22.03-LTS-SP1","name":"libvpx","purl":"pkg:rpm/openEuler/libvpx\u0026distro=openEuler-22.03-LTS-SP1"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.7.0-12.oe2203sp1"}]}],"ecosystem_specific":{"aarch64":["libvpx-debuginfo-1.7.0-12.oe2203sp1.aarch64.rpm","libvpx-debugsource-1.7.0-12.oe2203sp1.aarch64.rpm","libvpx-1.7.0-12.oe2203sp1.aarch64.rpm","libvpx-devel-1.7.0-12.oe2203sp1.aarch64.rpm"],"src":["libvpx-1.7.0-12.oe2203sp1.src.rpm"],"x86_64":["libvpx-debugsource-1.7.0-12.oe2203sp1.x86_64.rpm","libvpx-debuginfo-1.7.0-12.oe2203sp1.x86_64.rpm","libvpx-1.7.0-12.oe2203sp1.x86_64.rpm","libvpx-devel-1.7.0-12.oe2203sp1.x86_64.rpm"]}},{"package":{"ecosystem":"openEuler:22.03-LTS-SP3","name":"libvpx","purl":"pkg:rpm/openEuler/libvpx\u0026distro=openEuler-22.03-LTS-SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.7.0-12.oe2203sp3"}]}],"ecosystem_specific":{"aarch64":["libvpx-devel-1.7.0-12.oe2203sp3.aarch64.rpm","libvpx-1.7.0-12.oe2203sp3.aarch64.rpm","libvpx-debugsource-1.7.0-12.oe2203sp3.aarch64.rpm","libvpx-debuginfo-1.7.0-12.oe2203sp3.aarch64.rpm"],"src":["libvpx-1.7.0-12.oe2203sp3.src.rpm"],"x86_64":["libvpx-devel-1.7.0-12.oe2203sp3.x86_64.rpm","libvpx-debugsource-1.7.0-12.oe2203sp3.x86_64.rpm","libvpx-1.7.0-12.oe2203sp3.x86_64.rpm","libvpx-debuginfo-1.7.0-12.oe2203sp3.x86_64.rpm"]}},{"package":{"ecosystem":"openEuler:24.03-LTS","name":"libvpx","purl":"pkg:rpm/openEuler/libvpx\u0026distro=openEuler-24.03-LTS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.13.1-2.oe2403"}]}],"ecosystem_specific":{"aarch64":["libvpx-devel-1.13.1-2.oe2403.aarch64.rpm","libvpx-debuginfo-1.13.1-2.oe2403.aarch64.rpm","libvpx-debugsource-1.13.1-2.oe2403.aarch64.rpm","libvpx-1.13.1-2.oe2403.aarch64.rpm"],"src":["libvpx-1.13.1-2.oe2403.src.rpm"],"x86_64":["libvpx-debugsource-1.13.1-2.oe2403.x86_64.rpm","libvpx-1.13.1-2.oe2403.x86_64.rpm","libvpx-debuginfo-1.13.1-2.oe2403.x86_64.rpm","libvpx-devel-1.13.1-2.oe2403.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2024-1716"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-5197"}],"database_specific":{"severity":"High"}}