Bug 1216879 (CVE-2023-44488) - VUL-0: CVE-2023-44488: MozillaFirefox,MozillaThunderbird,libvpx: Re: Heap buffer overflow in vp8 encoding in libvpx
Summary: VUL-0: CVE-2023-44488: MozillaFirefox,MozillaThunderbird,libvpx: Re: Heap buf...
Status: REOPENED
Alias: CVE-2023-44488
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Major
Target Milestone: ---
Assignee: Adrian Schröter
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/380452/
Whiteboard: CVSSv3.1:SUSE:CVE-2023-44488:7.5:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2023-11-04 09:00 UTC by SMASH SMASH
Modified: 2024-07-11 12:30 UTC (History)
2 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description SMASH SMASH 2023-11-04 09:00:55 UTC
VP9 in libvpx before 1.13.1 mishandles widths, leading to a crash related to encoding.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-44488
Comment 1 Marcus Meissner 2023-11-04 09:01:48 UTC
CVE-2023-44488 has been assigned to the VP9 bug:

    "VP9 in libvpx before 1.13.1 mishandles widths, leading to a crash related
     to encoding."

    https://www.cve.org/CVERecord?id=CVE-2023-44488

It points to this commit for the fix:

    https://github.com/webmproject/libvpx/commit/263682c9a29395055f3b3afe2d97be1828a6223f
Comment 2 Marcus Meissner 2024-01-24 15:29:52 UTC
done
Comment 3 Marcus Meissner 2024-03-08 16:12:49 UTC
checked libvpx currently, it seem not fixed yet.

SUSE:SLE-15-SP4:Update libvpx patch applies direct
SUSE:SLE-15:Update libvpx patch also seems apply

SUSE:SLE-12:Update libvpx   code looks different ... needs more looks

not sure why i closed this bug.
Comment 5 Maintenance Automation 2024-07-11 12:30:14 UTC
SUSE-SU-2024:2409-1: An update that solves three vulnerabilities can now be installed.

Category: security (important)
Bug References: 1216879, 1225403, 1225879
CVE References: CVE-2023-44488, CVE-2023-6349, CVE-2024-5197
Maintenance Incident: [SUSE:Maintenance:34567](https://smelt.suse.de/incident/34567/)
Sources used:
SUSE Manager Server 4.3 (src):
 libvpx-1.11.0-150400.3.7.1
openSUSE Leap 15.4 (src):
 libvpx-1.11.0-150400.3.7.1
openSUSE Leap 15.5 (src):
 libvpx-1.11.0-150400.3.7.1
openSUSE Leap 15.6 (src):
 libvpx-1.11.0-150400.3.7.1
Basesystem Module 15-SP5 (src):
 libvpx-1.11.0-150400.3.7.1
Basesystem Module 15-SP6 (src):
 libvpx-1.11.0-150400.3.7.1
SUSE Package Hub 15 15-SP5 (src):
 libvpx-1.11.0-150400.3.7.1
SUSE Package Hub 15 15-SP6 (src):
 libvpx-1.11.0-150400.3.7.1
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (src):
 libvpx-1.11.0-150400.3.7.1
SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (src):
 libvpx-1.11.0-150400.3.7.1
SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (src):
 libvpx-1.11.0-150400.3.7.1
SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (src):
 libvpx-1.11.0-150400.3.7.1
SUSE Linux Enterprise Server for SAP Applications 15 SP4 (src):
 libvpx-1.11.0-150400.3.7.1
SUSE Manager Proxy 4.3 (src):
 libvpx-1.11.0-150400.3.7.1
SUSE Manager Retail Branch Server 4.3 (src):
 libvpx-1.11.0-150400.3.7.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.