drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Ausführen beliebiger Kommandos in libvpx
Name: |
Ausführen beliebiger Kommandos in libvpx |
|
ID: |
USN-7249-1 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS |
|
Datum: |
Di, 4. Februar 2025, 22:28 |
|
Referenzen: |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5197 |
|
Applikationen: |
libvpx |
|
Originalnachricht |
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============1552144118843438884== Content-Language: en-US Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------ryD9S5OKQQl4dmuNMMNg0rgE"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --------------ryD9S5OKQQl4dmuNMMNg0rgE Content-Type: multipart/mixed; boundary="------------af3Osk0DxfhTJiqyi8VjC1xv"; protected-headers="v1" From: John Breton <john.breton@canonical.com> Reply-To: Ubuntu Security <security@ubuntu.com> To: ubuntu-security-announce@lists.ubuntu.com Message-ID: <18a33d57-771c-4990-8595-b52ff529144e@canonical.com> Subject: [USN-7249-1] libvpx vulnerability
--------------af3Osk0DxfhTJiqyi8VjC1xv Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: base64
========================================================================== Ubuntu Security Notice USN-7249-1 February 03, 2025
libvpx vulnerability ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 18.04 LTS - Ubuntu 16.04 LTS - Ubuntu 14.04 LTS
Summary:
libvpx could be made to crash or run programs as your login if it opened a specially crafted image file.
Software Description: - libvpx: VP8 and VP9 video codec
Details:
Xiantong Hou discovered that libvpx would overflow when attempting to allocate memory for very large images. If an application using libvpx opened a specially crafted file, a remote attacker could possibly use this issue to cause the application to crash, resulting in a denial of service, or the execution of arbitrary code.
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 18.04 LTS libvpx5 1.7.0-3ubuntu0.18.04.1+esm2 Available with Ubuntu Pro vpx-tools 1.7.0-3ubuntu0.18.04.1+esm2 Available with Ubuntu Pro
Ubuntu 16.04 LTS libvpx3 1.5.0-2ubuntu1.1+esm3 Available with Ubuntu Pro vpx-tools 1.5.0-2ubuntu1.1+esm3 Available with Ubuntu Pro
Ubuntu 14.04 LTS libvpx1 1.3.0-2ubuntu0.1+esm3 Available with Ubuntu Pro vpx-tools 1.3.0-2ubuntu0.1+esm3 Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References: https://ubuntu.com/security/notices/USN-7249-1 CVE-2024-5197
--------------af3Osk0DxfhTJiqyi8VjC1xv--
--------------ryD9S5OKQQl4dmuNMMNg0rgE Content-Type: application/pgp-signature; name="OpenPGP_signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="OpenPGP_signature.asc"
-----BEGIN PGP SIGNATURE-----
wsF5BAABCAAjFiEEyMDHOTG0YH5UsajI8pSCVQZYHygFAmeiIu0FAwAAAAAACgkQ8pSCVQZYHyjf PQ//fg/aniZsGSsfx9cppPtjqU3EfoE49qWTrTMScUz9a0pkVyWQkbWipfqxwT7ExpaXAjM+U+uW BlRSb4ymNKH1PDSphjDXkTdZ6U12emzAxcblu2XE4+sOijuBEXVKrnSLsZ43Oy9aDMCprflmQqre dd5VSJnJ8T+40IToZ/z0JjWdNZN/7QkxplBnjPBymPYC0RZQn6KrCT+1UfDqbX39xi4UTENlwmP6 YQJY7XbxfzcNSuYQJs2FgJDTbkFZgF2qIMGuXg2LzCbvJboqbaY4G7w/8JRaKjN7z8hieUE6hDwl rYf+6dL7VxFEoe2kVDI5gQ9tCxfFBOJnpo6kbQf0l3OTpcrDC0JrLMcWLvnUO3bWudXc1770sqcs ZNYqzDuVGr+XBDAePwyYbpN9Rqp2D0XDvpdp+mT7cKXt++yKktx9yoC/bm+4Bz8f67bJoPGQA6/w ijvSBoz+H2FNurg7KNUoUBWjf4hpV/KwKNGtIjk/OtkorLT1kEjWNuznCo//oyCg/SbY+8E40/f7 CRoZEmktNx41bbRC686LLOHudkZa3SRhArAMLVHuafoIy3kmikbmOHFcAqQzSXwZ19aDiEX/GoUa 0FIp/4EbsK/RBkvin7t/nscNA0UGqnmzE7l42ZkWu2jXw2q3nbwgv03geDixjxW02ar0UEqHuJTL My0= =CYav -----END PGP SIGNATURE-----
--------------ryD9S5OKQQl4dmuNMMNg0rgE--
--===============1552144118843438884== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline
Cg==
--===============1552144118843438884==--
|
|
|
|