Bug 4701 - libvpx new security issue CVE-2012-0823
Summary: libvpx new security issue CVE-2012-0823
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 1
Hardware: i586 Linux
Priority: Normal normal
Target Milestone: ---
Assignee: QA Team
QA Contact:
URL: http://cve.mitre.org/cgi-bin/cvename....
Whiteboard:
Keywords: validated_update
Depends on:
Blocks: 4405
  Show dependency treegraph
 
Reported: 2012-02-26 02:17 CET by David Walser
Modified: 2012-04-08 13:56 CEST (History)
4 users (show)

See Also:
Source RPM: libvpx-0.9.6-4.mga1.src.rpm
CVE:
Status comment:


Attachments

Description David Walser 2012-02-26 02:17:14 CET
This denial of service vulnerability affects versions before 1.0.0.  An update to this version is needed in Cauldron as well.

To go along with this update, firefox, xulrunner, ffmpeg, and mplayer will need to be rebuilt.
David Walser 2012-02-26 02:17:27 CET

Blocks: (none) => 4405

Comment 1 David Walser 2012-02-27 13:53:24 CET
Mandriva issued an advisory for this today (February 27):
http://www.mandriva.com/en/support/security/advisories/?dis=2010.1&name=MDVSA-2012:023
Comment 2 David Walser 2012-03-03 18:59:11 CET
Funda Wang has updated this for Cauldron, so now only Mageia 1 needs to be taken care of.  The Mandriva update patched for this, so we could use the patch instead of updating the version, which will hopefully allow it to be updated without requiring anything to be rebuilt (MDV didn't have to rebuild anything).

CC: (none) => fundawang

Comment 3 David Walser 2012-03-04 18:31:49 CET
Patched packages uploaded.  I don't know if this will be pushed on its own or with the Firefox 10 update, but here's an advisory for this package.

Advisory:
========================

Updated libvpx packages fix security vulnerability:

VP8 Codec SDK (libvpx) before 1.0.0 Duclair allows remote attackers
to cause a denial of service (application crash) via (1) unspecified
corrupt input or (2) by starting decoding from a P-frame, which
triggers an out-of-bounds read, related to the clamping of motion
vectors in SPLITMV blocks (CVE-2012-0823).

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0823
http://www.mandriva.com/en/support/security/advisories/?dis=2010.1&name=MDVSA-2012:023
========================

Updated packages in core/updates_testing:
========================
libvpx0-0.9.7-1.2.mga1
libvpx-devel-0.9.7-1.2.mga1
libvpx-utils-0.9.7-1.2.mga1

from libvpx-0.9.7-1.2.mga1.src.rpm

Assignee: bugsquad => qa-bugs

Comment 4 claire robinson 2012-03-22 16:13:32 CET
Testing x86_64

No PoC so checking webm video in Firefox plays Ok.

Confirmed with strace that Firefox is using lib64vpx0

$ strace -o strace.out firefox

$ grep vpx strace.out
open("/usr/lib64/libvpx.so.0", O_RDONLY) = 4


Testing complete x86_64
Comment 5 Dave Hodgins 2012-04-04 21:45:24 CEST
Validating the update.

Confirmed firefox http://devfiles.myopera.com/articles/1891/sunflower-webm.html shows the video.

Could someone from the sysadmin team push the srpm
libvpx-0.9.7-1.2.mga1.src.rpm
from Core Updates Testing to Core Updates.

Updated libvpx packages fix security vulnerability:

VP8 Codec SDK (libvpx) before 1.0.0 Duclair allows remote attackers
to cause a denial of service (application crash) via (1) unspecified
corrupt input or (2) by starting decoding from a P-frame, which
triggers an out-of-bounds read, related to the clamping of motion
vectors in SPLITMV blocks (CVE-2012-0823).

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0823
http://www.mandriva.com/en/support/security/advisories/?dis=2010.1&name=MDVSA-2012:023

https://bugs.mageia.org/show_bug.cgi?id=4701

Keywords: (none) => validated_update
CC: (none) => davidwhodgins, sysadmin-bugs

Comment 6 Thomas Backlund 2012-04-08 13:56:44 CEST
Update pushed.

Status: NEW => RESOLVED
CC: (none) => tmb
Resolution: (none) => FIXED


Note You need to log in before you can comment on or make changes to this bug.