Login
Newsletter
Werbung

Sicherheit: Ausführen beliebiger Kommandos in libvpx
Aktuelle Meldungen Distributionen
Name: Ausführen beliebiger Kommandos in libvpx
ID: USN-7249-1
Distribution: Ubuntu
Plattformen: Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS
Datum: Di, 4. Februar 2025, 22:28
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5197
Applikationen: libvpx

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============1552144118843438884==
Content-Language: en-US
Content-Type: multipart/signed; micalg=pgp-sha256;
protocol="application/pgp-signature";
boundary="------------ryD9S5OKQQl4dmuNMMNg0rgE"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--------------ryD9S5OKQQl4dmuNMMNg0rgE
Content-Type: multipart/mixed;
boundary="------------af3Osk0DxfhTJiqyi8VjC1xv";
protected-headers="v1"
From: John Breton <john.breton@canonical.com>
Reply-To: Ubuntu Security <security@ubuntu.com>
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID: <18a33d57-771c-4990-8595-b52ff529144e@canonical.com>
Subject: [USN-7249-1] libvpx vulnerability

--------------af3Osk0DxfhTJiqyi8VjC1xv
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: base64

==========================================================================
Ubuntu Security Notice USN-7249-1
February 03, 2025

libvpx vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

libvpx could be made to crash or run programs as your login if it
opened a specially crafted image file.

Software Description:
- libvpx: VP8 and VP9 video codec

Details:

Xiantong Hou discovered that libvpx would overflow when attempting to
allocate memory for very large images. If an application using libvpx
opened a specially crafted file, a remote attacker could possibly use
this issue to cause the application to crash, resulting in a denial
of service, or the execution of arbitrary code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS
  libvpx5                         1.7.0-3ubuntu0.18.04.1+esm2
                                  Available with Ubuntu Pro
  vpx-tools                       1.7.0-3ubuntu0.18.04.1+esm2
                                  Available with Ubuntu Pro

Ubuntu 16.04 LTS
  libvpx3                         1.5.0-2ubuntu1.1+esm3
                                  Available with Ubuntu Pro
  vpx-tools                       1.5.0-2ubuntu1.1+esm3
                                  Available with Ubuntu Pro

Ubuntu 14.04 LTS
  libvpx1                         1.3.0-2ubuntu0.1+esm3
                                  Available with Ubuntu Pro
  vpx-tools                       1.3.0-2ubuntu0.1+esm3
                                  Available with Ubuntu Pro

In general, a standard system update will make all the
necessary changes.

References:
  https://ubuntu.com/security/notices/USN-7249-1
  CVE-2024-5197

--------------af3Osk0DxfhTJiqyi8VjC1xv--

--------------ryD9S5OKQQl4dmuNMMNg0rgE
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature.asc"

-----BEGIN PGP SIGNATURE-----
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=CYav
-----END PGP SIGNATURE-----

--------------ryD9S5OKQQl4dmuNMMNg0rgE--


--===============1552144118843438884==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

Cg==

--===============1552144118843438884==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung