exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Red Hat Security Advisory 2020-4629-01

Red Hat Security Advisory 2020-4629-01
Posted Nov 4, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-4629-01 - The libvpx packages provide the VP8 SDK, which allows the encoding and decoding of the VP8 video codec, commonly used with the WebM multimedia container file format. Issues addressed include double free, memory leak, out of bounds read, resource exhaustion, and use-after-free vulnerabilities.

tags | advisory, vulnerability, memory leak
systems | linux, redhat
advisories | CVE-2019-2126, CVE-2019-9232, CVE-2019-9371, CVE-2019-9433
SHA-256 | 4273e14cc2eaa830517e68fd284d63acebcbfdd5d149932289b436b1044cdd77

Red Hat Security Advisory 2020-4629-01

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================
Red Hat Security Advisory

Synopsis: Moderate: libvpx security update
Advisory ID: RHSA-2020:4629-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2020:4629
Issue date: 2020-11-03
CVE Names: CVE-2019-2126 CVE-2019-9232 CVE-2019-9371
CVE-2019-9433
====================================================================
1. Summary:

An update for libvpx is now available for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat CodeReady Linux Builder (v. 8) - aarch64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux AppStream (v. 8) - aarch64, ppc64le, s390x, x86_64

3. Description:

The libvpx packages provide the VP8 SDK, which allows the encoding and
decoding of the VP8 video codec, commonly used with the WebM multimedia
container file format.

Security Fix(es):

* libvpx: Double free in ParseContentEncodingEntry() in mkvparser.cc
(CVE-2019-2126)

* libvpx: Out of bounds read in vp8_norm table (CVE-2019-9232)

* libvpx: Resource exhaustion after memory leak in mkvparser.cc
(CVE-2019-9371)

* libvpx: Use-after-free in vp8_deblock() in vp8/common/postproc.c
(CVE-2019-9433)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat
Enterprise Linux 8.3 Release Notes linked from the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

After installing the update, all applications using libvpx must be
restarted for the changes to take effect.

5. Bugs fixed (https://bugzilla.redhat.com/):

1788966 - CVE-2019-9232 libvpx: Out of bounds read in vp8_norm table
1788994 - CVE-2019-9433 libvpx: Use-after-free in vp8_deblock() in vp8/common/postproc.c
1789004 - CVE-2019-9371 libvpx: Resource exhaustion after memory leak in mkvparser.cc
1789008 - CVE-2019-2126 libvpx: Double free in ParseContentEncodingEntry() in mkvparser.cc

6. Package List:

Red Hat Enterprise Linux AppStream (v. 8):

Source:
libvpx-1.7.0-8.el8.src.rpm

aarch64:
libvpx-1.7.0-8.el8.aarch64.rpm
libvpx-debuginfo-1.7.0-8.el8.aarch64.rpm
libvpx-debugsource-1.7.0-8.el8.aarch64.rpm
libvpx-utils-debuginfo-1.7.0-8.el8.aarch64.rpm

ppc64le:
libvpx-1.7.0-8.el8.ppc64le.rpm
libvpx-debuginfo-1.7.0-8.el8.ppc64le.rpm
libvpx-debugsource-1.7.0-8.el8.ppc64le.rpm
libvpx-utils-debuginfo-1.7.0-8.el8.ppc64le.rpm

s390x:
libvpx-1.7.0-8.el8.s390x.rpm
libvpx-debuginfo-1.7.0-8.el8.s390x.rpm
libvpx-debugsource-1.7.0-8.el8.s390x.rpm
libvpx-utils-debuginfo-1.7.0-8.el8.s390x.rpm

x86_64:
libvpx-1.7.0-8.el8.i686.rpm
libvpx-1.7.0-8.el8.x86_64.rpm
libvpx-debuginfo-1.7.0-8.el8.i686.rpm
libvpx-debuginfo-1.7.0-8.el8.x86_64.rpm
libvpx-debugsource-1.7.0-8.el8.i686.rpm
libvpx-debugsource-1.7.0-8.el8.x86_64.rpm
libvpx-utils-debuginfo-1.7.0-8.el8.i686.rpm
libvpx-utils-debuginfo-1.7.0-8.el8.x86_64.rpm

Red Hat CodeReady Linux Builder (v. 8):

aarch64:
libvpx-debuginfo-1.7.0-8.el8.aarch64.rpm
libvpx-debugsource-1.7.0-8.el8.aarch64.rpm
libvpx-devel-1.7.0-8.el8.aarch64.rpm
libvpx-utils-debuginfo-1.7.0-8.el8.aarch64.rpm

ppc64le:
libvpx-debuginfo-1.7.0-8.el8.ppc64le.rpm
libvpx-debugsource-1.7.0-8.el8.ppc64le.rpm
libvpx-devel-1.7.0-8.el8.ppc64le.rpm
libvpx-utils-debuginfo-1.7.0-8.el8.ppc64le.rpm

s390x:
libvpx-debuginfo-1.7.0-8.el8.s390x.rpm
libvpx-debugsource-1.7.0-8.el8.s390x.rpm
libvpx-devel-1.7.0-8.el8.s390x.rpm
libvpx-utils-debuginfo-1.7.0-8.el8.s390x.rpm

x86_64:
libvpx-debuginfo-1.7.0-8.el8.i686.rpm
libvpx-debuginfo-1.7.0-8.el8.x86_64.rpm
libvpx-debugsource-1.7.0-8.el8.i686.rpm
libvpx-debugsource-1.7.0-8.el8.x86_64.rpm
libvpx-devel-1.7.0-8.el8.i686.rpm
libvpx-devel-1.7.0-8.el8.x86_64.rpm
libvpx-utils-debuginfo-1.7.0-8.el8.i686.rpm
libvpx-utils-debuginfo-1.7.0-8.el8.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2019-2126
https://access.redhat.com/security/cve/CVE-2019-9232
https://access.redhat.com/security/cve/CVE-2019-9371
https://access.redhat.com/security/cve/CVE-2019-9433
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.3_release_notes/

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2020 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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4P9l
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    0 Files
  • 6
    Sep 6th
    0 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    0 Files
  • 9
    Sep 9th
    0 Files
  • 10
    Sep 10th
    0 Files
  • 11
    Sep 11th
    0 Files
  • 12
    Sep 12th
    0 Files
  • 13
    Sep 13th
    0 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close