Bug 1193365 (CVE-2020-36131) - VUL-0: CVE-2020-36131: libaom: AOM v2.0.1 was discovered to contain a stack buffer overflow via the component stats/rate_hist.c.
Summary: VUL-0: CVE-2020-36131: libaom: AOM v2.0.1 was discovered to contain a stack b...
Status: RESOLVED FIXED
Alias: CVE-2020-36131
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Minor
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/316195/
Whiteboard: CVSSv3.1:SUSE:CVE-2020-36131:5.5:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2021-12-03 11:01 UTC by Carlos López
Modified: 2022-03-25 09:16 UTC (History)
3 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Carlos López 2021-12-03 11:01:37 UTC
CVE-2020-36131

AOM v2.0.1 was discovered to contain a stack buffer overflow via the component
stats/rate_hist.c.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-36131
https://bugs.chromium.org/p/aomedia/issues/detail?id=2911&q=&can=1
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36131
http://www.cvedetails.com/cve/CVE-2020-36131/
Comment 1 Carlos López 2021-12-03 11:05:14 UTC
SUSE:SLE-15-SP2:Update is affected. The patch was already introduced in openSUSE:Factory.

I could not reproduce the vulnerability, probably due to us having an older version of the package - the CLI options are different and I'm not too familiar with this utility - but the vulnerable code is present.

Upstream patch:
https://aomedia.googlesource.com/aom/+/94bcbfe76b0fd5b8ac03645082dc23a88730c949%5E%21/
Comment 2 Petr Gajdos 2021-12-06 09:51:54 UTC
I'll try to take over.
Comment 3 Petr Gajdos 2021-12-07 14:13:38 UTC
Yes, no segfault reproduced for 15sp2/libaom:

:/193356 # aomenc --pass=2 --usage=1 -o /dev/null ./poc3
Warning: Assuming --pass=2 implies --passes=2

Fatal: Failed to get config: Invalid parameter

:/193356 # 

Nor valgrind had shown any issue to me. I had not tried ASAN.
Comment 4 Petr Gajdos 2021-12-07 14:32:08 UTC
Package 15sp2/libaom submitted.
Comment 6 Swamp Workflow Management 2021-12-23 14:50:00 UTC
SUSE-SU-2021:4170-1: An update that fixes four vulnerabilities is now available.

Category: security (moderate)
Bug References: 1193356,1193365,1193366,1193369
CVE References: CVE-2020-36129,CVE-2020-36130,CVE-2020-36131,CVE-2020-36135
JIRA References: 
Sources used:
SUSE Linux Enterprise Module for Desktop Applications 15-SP3 (src):    libaom-1.0.0-3.9.1
SUSE Linux Enterprise Module for Desktop Applications 15-SP2 (src):    libaom-1.0.0-3.9.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 7 Swamp Workflow Management 2021-12-23 14:59:15 UTC
openSUSE-SU-2021:4170-1: An update that fixes four vulnerabilities is now available.

Category: security (moderate)
Bug References: 1193356,1193365,1193366,1193369
CVE References: CVE-2020-36129,CVE-2020-36130,CVE-2020-36131,CVE-2020-36135
JIRA References: 
Sources used:
openSUSE Leap 15.3 (src):    libaom-1.0.0-3.9.1
Comment 8 Swamp Workflow Management 2021-12-26 17:17:01 UTC
openSUSE-SU-2021:1624-1: An update that fixes four vulnerabilities is now available.

Category: security (moderate)
Bug References: 1193356,1193365,1193366,1193369
CVE References: CVE-2020-36129,CVE-2020-36130,CVE-2020-36131,CVE-2020-36135
JIRA References: 
Sources used:
openSUSE Leap 15.2 (src):    libaom-1.0.0-lp152.3.9.1
Comment 9 Marcus Meissner 2022-03-25 09:16:04 UTC
done