CVE-2023-6349

NameCVE-2023-6349
DescriptionA heap overflow vulnerability exists in libvpx - Encoding a frame that has larger dimensions than the originally configured size with VP9 may result in a heap overflow in libvpx. We recommend upgrading to version 1.13.1 or above
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libvpx (PTS)buster1.7.0-3+deb10u1vulnerable
buster (security)1.7.0-3+deb10u3fixed
bullseye1.9.0-1+deb11u2fixed
bullseye (security)1.9.0-1+deb11u3fixed
bookworm1.12.0-1+deb12u2fixed
bookworm (security)1.12.0-1+deb12u3fixed
sid, trixie1.14.1-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libvpxsourcebuster1.7.0-3+deb10u2
libvpxsourcebullseye1.9.0-1+deb11u2
libvpxsourcebookworm1.12.0-1+deb12u2
libvpxsource(unstable)1.13.1-2

Notes

https://bugs.chromium.org/p/webm/issues/detail?id=1642
Fixed by: https://github.com/webmproject/libvpx/commit/df9fd9d5b7325060b2b921558a1eb20ca7880937 (v1.13.1)
Same upstream commit as CVE-2023-44488

Search for package or bug name: Reporting problems