CVE-2023-6349

NameCVE-2023-6349
DescriptionA heap overflow vulnerability exists in libvpx - Encoding a frame that has larger dimensions than the originally configured size with VP9 may result in a heap overflow in libvpx. We recommend upgrading to version 1.13.1 or above
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libvpx (PTS)jessie, jessie (lts)1.3.0-3+deb8u5fixed
stretch (security)1.6.1-3+deb9u3vulnerable
stretch (lts), stretch1.6.1-3+deb9u6fixed
buster (security), buster, buster (lts)1.7.0-3+deb10u3fixed
bullseye (security), bullseye1.9.0-1+deb11u3fixed
bookworm (security), bookworm1.12.0-1+deb12u3fixed
sid, trixie1.15.0-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libvpxsourcejessie(not affected)
libvpxsourcestretch1.6.1-3+deb9u5
libvpxsourcebuster1.7.0-3+deb10u2
libvpxsourcebullseye1.9.0-1+deb11u2
libvpxsourcebookworm1.12.0-1+deb12u2
libvpxsource(unstable)1.13.1-2

Notes

https://bugs.chromium.org/p/webm/issues/detail?id=1642
Fixed by: https://github.com/webmproject/libvpx/commit/df9fd9d5b7325060b2b921558a1eb20ca7880937 (v1.13.1)
Same upstream commit as CVE-2023-44488
[jessie] - libvpx <not-affected> (Vulnerable code introduced later)

Search for package or bug name: Reporting problems