|
|
Message-ID: <6284ffe9-d228-46f0-be8c-c7f78a030523@oracle.com>
Date: Sat, 30 Sep 2023 13:38:27 -0700
From: Alan Coopersmith <alan.coopersmith@...cle.com>
To: oss-security@...ts.openwall.com
Subject: Re: CVE-2023-5217: Heap buffer overflow in vp8 encoding in libvpx
On 9/28/23 11:37, Alan Coopersmith wrote:
> It does not appear that libvpx 1.13.1 has been released yet,
It was released yesterday, with the note:
"This release contains two security related fixes. One each for VP8 and VP9."
https://github.com/webmproject/libvpx/releases/tag/v1.13.1
CVE-2023-44488 has been assigned to the VP9 bug:
"VP9 in libvpx before 1.13.1 mishandles widths, leading to a crash related
to encoding."
https://www.cve.org/CVERecord?id=CVE-2023-44488
It points to this commit for the fix:
https://github.com/webmproject/libvpx/commit/263682c9a29395055f3b3afe2d97be1828a6223f
--
-Alan Coopersmith- alan.coopersmith@...cle.com
Oracle Solaris Engineering - https://blogs.oracle.com/solaris
Download attachment "OpenPGP_0xA2FB9E081F2D130E.asc" of type "application/pgp-keys" (8713 bytes)
Download attachment "OpenPGP_signature.asc" of type "application/pgp-signature" (841 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.