exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Red Hat Security Advisory 2020-4629-01

Red Hat Security Advisory 2020-4629-01
Posted Nov 4, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-4629-01 - The libvpx packages provide the VP8 SDK, which allows the encoding and decoding of the VP8 video codec, commonly used with the WebM multimedia container file format. Issues addressed include double free, memory leak, out of bounds read, resource exhaustion, and use-after-free vulnerabilities.

tags | advisory, vulnerability, memory leak
systems | linux, redhat
advisories | CVE-2019-2126, CVE-2019-9232, CVE-2019-9371, CVE-2019-9433
SHA-256 | 4273e14cc2eaa830517e68fd284d63acebcbfdd5d149932289b436b1044cdd77

Red Hat Security Advisory 2020-4629-01

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================
Red Hat Security Advisory

Synopsis: Moderate: libvpx security update
Advisory ID: RHSA-2020:4629-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2020:4629
Issue date: 2020-11-03
CVE Names: CVE-2019-2126 CVE-2019-9232 CVE-2019-9371
CVE-2019-9433
====================================================================
1. Summary:

An update for libvpx is now available for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat CodeReady Linux Builder (v. 8) - aarch64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux AppStream (v. 8) - aarch64, ppc64le, s390x, x86_64

3. Description:

The libvpx packages provide the VP8 SDK, which allows the encoding and
decoding of the VP8 video codec, commonly used with the WebM multimedia
container file format.

Security Fix(es):

* libvpx: Double free in ParseContentEncodingEntry() in mkvparser.cc
(CVE-2019-2126)

* libvpx: Out of bounds read in vp8_norm table (CVE-2019-9232)

* libvpx: Resource exhaustion after memory leak in mkvparser.cc
(CVE-2019-9371)

* libvpx: Use-after-free in vp8_deblock() in vp8/common/postproc.c
(CVE-2019-9433)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat
Enterprise Linux 8.3 Release Notes linked from the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

After installing the update, all applications using libvpx must be
restarted for the changes to take effect.

5. Bugs fixed (https://bugzilla.redhat.com/):

1788966 - CVE-2019-9232 libvpx: Out of bounds read in vp8_norm table
1788994 - CVE-2019-9433 libvpx: Use-after-free in vp8_deblock() in vp8/common/postproc.c
1789004 - CVE-2019-9371 libvpx: Resource exhaustion after memory leak in mkvparser.cc
1789008 - CVE-2019-2126 libvpx: Double free in ParseContentEncodingEntry() in mkvparser.cc

6. Package List:

Red Hat Enterprise Linux AppStream (v. 8):

Source:
libvpx-1.7.0-8.el8.src.rpm

aarch64:
libvpx-1.7.0-8.el8.aarch64.rpm
libvpx-debuginfo-1.7.0-8.el8.aarch64.rpm
libvpx-debugsource-1.7.0-8.el8.aarch64.rpm
libvpx-utils-debuginfo-1.7.0-8.el8.aarch64.rpm

ppc64le:
libvpx-1.7.0-8.el8.ppc64le.rpm
libvpx-debuginfo-1.7.0-8.el8.ppc64le.rpm
libvpx-debugsource-1.7.0-8.el8.ppc64le.rpm
libvpx-utils-debuginfo-1.7.0-8.el8.ppc64le.rpm

s390x:
libvpx-1.7.0-8.el8.s390x.rpm
libvpx-debuginfo-1.7.0-8.el8.s390x.rpm
libvpx-debugsource-1.7.0-8.el8.s390x.rpm
libvpx-utils-debuginfo-1.7.0-8.el8.s390x.rpm

x86_64:
libvpx-1.7.0-8.el8.i686.rpm
libvpx-1.7.0-8.el8.x86_64.rpm
libvpx-debuginfo-1.7.0-8.el8.i686.rpm
libvpx-debuginfo-1.7.0-8.el8.x86_64.rpm
libvpx-debugsource-1.7.0-8.el8.i686.rpm
libvpx-debugsource-1.7.0-8.el8.x86_64.rpm
libvpx-utils-debuginfo-1.7.0-8.el8.i686.rpm
libvpx-utils-debuginfo-1.7.0-8.el8.x86_64.rpm

Red Hat CodeReady Linux Builder (v. 8):

aarch64:
libvpx-debuginfo-1.7.0-8.el8.aarch64.rpm
libvpx-debugsource-1.7.0-8.el8.aarch64.rpm
libvpx-devel-1.7.0-8.el8.aarch64.rpm
libvpx-utils-debuginfo-1.7.0-8.el8.aarch64.rpm

ppc64le:
libvpx-debuginfo-1.7.0-8.el8.ppc64le.rpm
libvpx-debugsource-1.7.0-8.el8.ppc64le.rpm
libvpx-devel-1.7.0-8.el8.ppc64le.rpm
libvpx-utils-debuginfo-1.7.0-8.el8.ppc64le.rpm

s390x:
libvpx-debuginfo-1.7.0-8.el8.s390x.rpm
libvpx-debugsource-1.7.0-8.el8.s390x.rpm
libvpx-devel-1.7.0-8.el8.s390x.rpm
libvpx-utils-debuginfo-1.7.0-8.el8.s390x.rpm

x86_64:
libvpx-debuginfo-1.7.0-8.el8.i686.rpm
libvpx-debuginfo-1.7.0-8.el8.x86_64.rpm
libvpx-debugsource-1.7.0-8.el8.i686.rpm
libvpx-debugsource-1.7.0-8.el8.x86_64.rpm
libvpx-devel-1.7.0-8.el8.i686.rpm
libvpx-devel-1.7.0-8.el8.x86_64.rpm
libvpx-utils-debuginfo-1.7.0-8.el8.i686.rpm
libvpx-utils-debuginfo-1.7.0-8.el8.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2019-2126
https://access.redhat.com/security/cve/CVE-2019-9232
https://access.redhat.com/security/cve/CVE-2019-9371
https://access.redhat.com/security/cve/CVE-2019-9433
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.3_release_notes/

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2020 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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4P9l
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close