[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#1106689: marked as done (libvpx: double-free in vpx_codec_enc_init_multi)



Your message dated Fri, 30 May 2025 19:48:29 +0000
with message-id <E1uL5iP-00B78S-UD@fasolo.debian.org>
and subject line Bug#1106689: fixed in libvpx 1.12.0-1+deb12u4
has caused the Debian Bug report #1106689,
regarding libvpx: double-free in vpx_codec_enc_init_multi
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
1106689: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1106689
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Source: libvpx
Version: 1.12.0-1
Severity: grave
Tags: security upstream
Justification: user security hole
X-Debbugs-Cc: carnil@debian.org, Debian Security Team <team@security.debian.org>
Control: found -1 1.15.0-2

Hi

The recent MFSA's for firefox mention the following issue as critical:

| A double-free could have occurred in vpx_codec_enc_init_multi after a
| failed allocation when initializing the encoder for WebRTC. This could
| have caused memory corruption and a potentially exploitable crash.

Cf. https://www.mozilla.org/en-US/security/advisories/mfsa2025-44/

Fix is at:
https://chromium.googlesource.com/webm/libvpx/+/1c758781c428c0e895645b95b8ff1512b6bdcecb

Regards,
Salvatore

--- End Message ---
--- Begin Message ---
Source: libvpx
Source-Version: 1.12.0-1+deb12u4
Done: Salvatore Bonaccorso <carnil@debian.org>

We believe that the bug you reported is fixed in the latest version of
libvpx, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1106689@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Salvatore Bonaccorso <carnil@debian.org> (supplier of updated libvpx package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Tue, 27 May 2025 23:16:51 +0200
Source: libvpx
Architecture: source
Version: 1.12.0-1+deb12u4
Distribution: bookworm-security
Urgency: high
Maintainer: Debian Multimedia Maintainers <debian-multimedia@lists.debian.org>
Changed-By: Salvatore Bonaccorso <carnil@debian.org>
Closes: 1106689
Changes:
 libvpx (1.12.0-1+deb12u4) bookworm-security; urgency=high
 .
   * Non-maintainer upload by the Security Team.
   * vpx_codec_enc_init_multi: fix double free on init failure
     (Closes: #1106689)
Checksums-Sha1: 
 be5301ad2dfb1db4f84e930182190195c0cbab88 2432 libvpx_1.12.0-1+deb12u4.dsc
 111f5f819fab5ec41cccc3990e0263c33f3a83b8 19752 libvpx_1.12.0-1+deb12u4.debian.tar.xz
Checksums-Sha256: 
 bc1abf37bd85c2ef316537bb85c27fd11e7c4cb115259b22d2ca5371392165bf 2432 libvpx_1.12.0-1+deb12u4.dsc
 f6266cb01ac5fc2af437858cd3f6aa85cc6fdedb5ea5ccedfa1b38cea335d619 19752 libvpx_1.12.0-1+deb12u4.debian.tar.xz
Files: 
 9514dc00b56f0c9f1257fc18ed1e62f3 2432 video optional libvpx_1.12.0-1+deb12u4.dsc
 31ab3386276960ee0ea8f01435a424fc 19752 video optional libvpx_1.12.0-1+deb12u4.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
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=PNx8
-----END PGP SIGNATURE-----

Attachment: pgp_YuPjR3XQV.pgp
Description: PGP signature


--- End Message ---

Reply to: