Bug 1193356 (CVE-2020-36129) - VUL-0: CVE-2020-36129: libaom: AOM v2.0.1 was discovered to contain a stack buffer overflow via the component src/aom_image.c.
Summary: VUL-0: CVE-2020-36129: libaom: AOM v2.0.1 was discovered to contain a stack b...
Status: RESOLVED FIXED
Alias: CVE-2020-36129
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/316197/
Whiteboard: CVSSv3.1:SUSE:CVE-2020-36129:5.5:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2021-12-03 09:12 UTC by Thomas Leroy
Modified: 2022-03-25 09:15 UTC (History)
4 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Comment 1 Thomas Leroy 2021-12-03 09:16:17 UTC
Affected codestream:
- SUSE:SLE-15-SP2:Update
Comment 2 Petr Gajdos 2021-12-03 09:36:00 UTC
Why I am the assignee of this bug? I will probably take over, however the maintainer is different.
Comment 3 Thomas Leroy 2021-12-03 09:52:18 UTC
Thanks for handling this issue Petr. No bugowner is assigned in {I,O}BS, but I saw that you submitted patches in liboam in the past. That's why I assigned this bug to you. If you think someone else should be assigned instead, feel free to change. (a few more bugs will come soon)
Comment 4 Petr Gajdos 2021-12-03 10:09:15 UTC
$ isc maintainer libaom
Defined in package: SUSE:SLE-15-SP2:GA/libaom 
  bugowner of libaom : 
   group:coldpool

  maintainer of libaom : 
   -
$

Please get familiar with cold pool project.
Comment 5 Petr Gajdos 2021-12-06 09:49:24 UTC
Reassigning to appropriate assignee.
Comment 6 Petr Gajdos 2021-12-06 09:51:38 UTC
I'll try to take over.
Comment 7 Petr Gajdos 2021-12-07 14:09:50 UTC
No segfault reproduced for 15sp2/libaom:

:/193356 # aomenc --pass=2 --usage=1 -o /dev/null ./poc3
Warning: Assuming --pass=2 implies --passes=2

Fatal: Failed to get config: Invalid parameter

:/193356 # 

Had not tried ASAN.
Comment 8 Petr Gajdos 2021-12-07 14:31:13 UTC
Package 15sp2/libaom submitted.
Comment 9 Thomas Leroy 2021-12-07 14:43:38 UTC
Thanks for having submitted a fix even without clear reproducer.
Comment 11 Swamp Workflow Management 2021-12-23 14:49:54 UTC
SUSE-SU-2021:4170-1: An update that fixes four vulnerabilities is now available.

Category: security (moderate)
Bug References: 1193356,1193365,1193366,1193369
CVE References: CVE-2020-36129,CVE-2020-36130,CVE-2020-36131,CVE-2020-36135
JIRA References: 
Sources used:
SUSE Linux Enterprise Module for Desktop Applications 15-SP3 (src):    libaom-1.0.0-3.9.1
SUSE Linux Enterprise Module for Desktop Applications 15-SP2 (src):    libaom-1.0.0-3.9.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 12 Swamp Workflow Management 2021-12-23 14:59:09 UTC
openSUSE-SU-2021:4170-1: An update that fixes four vulnerabilities is now available.

Category: security (moderate)
Bug References: 1193356,1193365,1193366,1193369
CVE References: CVE-2020-36129,CVE-2020-36130,CVE-2020-36131,CVE-2020-36135
JIRA References: 
Sources used:
openSUSE Leap 15.3 (src):    libaom-1.0.0-3.9.1
Comment 13 Swamp Workflow Management 2021-12-26 17:16:55 UTC
openSUSE-SU-2021:1624-1: An update that fixes four vulnerabilities is now available.

Category: security (moderate)
Bug References: 1193356,1193365,1193366,1193369
CVE References: CVE-2020-36129,CVE-2020-36130,CVE-2020-36131,CVE-2020-36135
JIRA References: 
Sources used:
openSUSE Leap 15.2 (src):    libaom-1.0.0-lp152.3.9.1
Comment 14 Marcus Meissner 2022-03-25 09:15:43 UTC
done