#libvpx

2024-08-29

#BSI WID-SEC-2024-1945: [NEU] [mittel] #Red #Hat #Enterprise #Linux (#libvpx): Mehrere Schwachstellen ermöglichen Denial of Service

Ein entfernter Angreifer kann mehrere Schwachstellen in Red Hat Enterprise Linux in der Komponente libvpx ausnutzen, um einen Denial of Service Angriff durchzuführen.

wid.cert-bund.de/portal/wid/se

FFmpeg libaom (libaom-av1) is the reference encoder for the AV1 format. It was also used for research during the development of AV1. libaom is based on libvpx and thus shares many of its characteristics in terms of features, performance, and usage.

To install FFmpeg with support for libaom-av1, look at the Compilation Guides and compile FFmpeg with the --enable-libaom option.

ffmpeg.org/ffmpeg-codecs.html#
trac.ffmpeg.org/wiki/Compilati

#ffmpeg #av1 #vp9 #libaom #libvpx #AOMedia

deltatux :donor:deltatux@infosec.town
2023-10-04

Apple releases iOS/iPad OS 17.0.3 as an emergency update to resolve an actively exploited zero day caused by a kernel vulnerability. If successful, a malicious actor can perform local privilege escalation as part of an attack chain.

Apple also notes that they have resolved CVE-2023-5217 by updating the libvpx to 1.13.1 in iOS/iPad OS 17.0.3

This marks the 17th zero day that Apple has addressed so far this year.

https://www.bleepingcomputer.com/news/apple/apple-emergency-update-fixes-new-zero-day-used-to-hack-iphones/

#infosec #cybersecurity #Apple #ios #ipados #kernel #vulnerability #CVE_2023_42824 #CVE_2023_5217 #libvpx #zeroday

2023-10-03

CISA warned that a vulnerability affecting open source tool libvpx is being exploited

Incident responders and experts at several companies said the WS_FTP Server vulnerabilities are being exploited as well

#libvpx #WSFTP

therecord.media/libvpx-ws-ftp-

Topher 🌱🐧💚topher@mastodon.online
2023-10-02

Just saw patched #libvpx packages hit #Ubuntu repositories

#libvpx6 on Focal (1.8.2-1ubuntu0.2)

#libvpx7 on Jammy (1.11.0-2ubuntu2.2), Lunar (1.12.0-1ubuntu1.2)

Nothing yet on the packaged Firefox in Focal repository

ubuntu.com/security/CVE-2023-5

cc @viking

Topher 🌱🐧💚topher@mastodon.online
2023-09-30

Looks like an updated #libvpx package is now in #Debian repositories for stable (Bookworm) and oldstable (Bullseye)!

Updated #Chromium packages are available as well;

however, Debian builds of #Firefox ESR are still at 118.0 so be cautious, noting as I mentioned here that the package that showed up yesterday was in fact for a new upstream build already underway before the security patch and is for 115.3.0 - NOT 115.3.1 that includes the patch for CVE-2023-5217

mastodon.online/@topher/111144

Gonçalo Valériodethos@s.ovalerio.net
2023-09-29
Michal :verified: :btw:michal@kottman.xyz
2023-09-29

Woohoo, another day, another #0day like the #libwebp one, this time in #libvpx: arstechnica.com/security/2023/

Let the purge / patch crunch begin!

:mastodon: deciodecio@infosec.exchange
2023-09-29

#CyberVeille #libwebp #libvpx

🗒️ petit résumé / annotations surs les deux vulnérabilités basés sur les denières information disponibles au 29.09

"CVE-2023-5217 [ ndr 𝐥𝐢𝐛𝐯𝐩𝐱 ] requires a targeted device to create media in the VP8 format.

CVE-2023-4863 [ndr 𝐖𝐞𝐛𝐏 / 𝐥𝐢𝐛𝐰𝐞𝐛𝐏 ] could be exploited when a targeted device simply displayed a booby-trapped image."
👇
arstechnica.com/security/2023/

CVE-2023-5129 ➡️ Retirée par Mitre Duplicata CVE-2023-4863
👇
cve.org/CVERecord?id=CVE-2023-

------------------------

liste utile pour (merci @mttaggart ) suivi CVE-2023-4863 dans apps Electron
👇
docs.google.com/spreadsheets/d

FAQ CVE-2023-4863 par Tenable
👇
tenable.com/blog/cve-2023-4106

------------------------

Annonce CVE-2023-5217
👇
chromereleases.googleblog.com/

Topher 🌱🐧💚topher@mastodon.online
2023-09-29

Firefox 118.0.1 now appears to be live in #archlinux extra repository, addressing CVE-2023-5217: Heap buffer overflow in libvpx

#Linux #security #cve20235217 #libvpx

Orca 🌻 | 🎀 | 🪁 | 🏴🏳️‍⚧️Orca@nya.one
2023-09-28

又爆零日漏洞了,影响Chrome和Firefox等浏览器,可能影响任何使用libvpx的软件😭

CVE-2023-5217
libvpx1.13.1/Chrome117.0.5938.132及之前版本中的堆溢出bug可允许远程攻击者通过提供特定的html网页利用漏洞执行任意代码。

请立即升级所有浏览器和使用了libvpx的软件(比如ffmpeg和视频播放器)。

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5217
#cve #0day #libvpx
@board@ovo.st

RE:
https://mastodon.social/users/arstechnica/statuses/111144897030011609

-> @haileys.questblake@infosec.town
2023-09-28

Maybe relying on one company's browser product for your entire computer is not a good idea.

#libWebP #libVPX #Electron

Topher 🌱🐧💚topher@mastodon.online
2023-09-28

#Firefox on both #Flatpak and #Snap is already updated to 118.0.1 addressing CVE-2023-5217: Heap buffer overflow in libvpx

Make sure you are running 118.0.1 or update ASAP.

Tracking of traditional distro packages will continue throughout this thread as they arrive in various repositories (both Firefox and libvpx, along with Chromium builds not linked dynamically to the system lib - e.g. #linuxmint)

flathub.org/apps/org.mozilla.f

snapcraft.io/firefox

#Linux #security #cve20235217 #libvpx

Topher 🌱🐧💚topher@mastodon.online
2023-09-28

Mozilla released #Firefox 118.0.1 and ESR 115.3.1 to address CVE-2023-5217: Heap buffer overflow in libvpx

mozilla.org/en-US/security/adv

I suppose I'll follow the Linux distro packages again for this one so I guess follow this thread or whatever 😂

#security #cve20235217 #libvpx

*Sigh*, another one of these:

"CVE-2023-5217: Heap buffer overflow in vp8 encoding in #libvpx."
"Google is aware that an exploit for CVE-2023-5217 exists in the wild."

Note that because it's in an underlying (video codec) library, it's probably going to be an issue in every browser and video player and electron app; just like the prior #libwebp #security bug.

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst