Heap buffer overflow in vp8 encoding in libvpx in Google Chrome prior to 117.0.5938.132 and libvpx 1.13.1 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
{
"availability": "No subscription required",
"priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog",
"binaries": [
{
"binary_name": "firefox",
"binary_version": "118.0.1+build1-0ubuntu0.20.04.1"
},
{
"binary_name": "firefox-dev",
"binary_version": "118.0.1+build1-0ubuntu0.20.04.1"
},
{
"binary_name": "firefox-geckodriver",
"binary_version": "118.0.1+build1-0ubuntu0.20.04.1"
},
{
"binary_name": "firefox-mozsymbols",
"binary_version": "118.0.1+build1-0ubuntu0.20.04.1"
}
]
}{
"availability": "No subscription required",
"priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog",
"binaries": [
{
"binary_name": "libvpx-dev",
"binary_version": "1.8.2-1ubuntu0.2"
},
{
"binary_name": "libvpx6",
"binary_version": "1.8.2-1ubuntu0.2"
},
{
"binary_name": "vpx-tools",
"binary_version": "1.8.2-1ubuntu0.2"
}
]
}{
"availability": "No subscription required",
"priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog",
"binaries": [
{
"binary_name": "thunderbird",
"binary_version": "1:115.3.1+build1-0ubuntu0.20.04.1"
},
{
"binary_name": "thunderbird-dev",
"binary_version": "1:115.3.1+build1-0ubuntu0.20.04.1"
},
{
"binary_name": "thunderbird-gnome-support",
"binary_version": "1:115.3.1+build1-0ubuntu0.20.04.1"
},
{
"binary_name": "thunderbird-mozsymbols",
"binary_version": "1:115.3.1+build1-0ubuntu0.20.04.1"
},
{
"binary_name": "xul-ext-calendar-timezones",
"binary_version": "1:115.3.1+build1-0ubuntu0.20.04.1"
},
{
"binary_name": "xul-ext-gdata-provider",
"binary_version": "1:115.3.1+build1-0ubuntu0.20.04.1"
},
{
"binary_name": "xul-ext-lightning",
"binary_version": "1:115.3.1+build1-0ubuntu0.20.04.1"
}
]
}{
"availability": "No subscription required",
"priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog",
"binaries": [
{
"binary_name": "libvpx-dev",
"binary_version": "1.11.0-2ubuntu2.2"
},
{
"binary_name": "libvpx7",
"binary_version": "1.11.0-2ubuntu2.2"
},
{
"binary_name": "vpx-tools",
"binary_version": "1.11.0-2ubuntu2.2"
}
]
}{
"availability": "No subscription required",
"priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog",
"binaries": [
{
"binary_name": "thunderbird",
"binary_version": "1:115.3.1+build1-0ubuntu0.22.04.2"
},
{
"binary_name": "thunderbird-dev",
"binary_version": "1:115.3.1+build1-0ubuntu0.22.04.2"
},
{
"binary_name": "thunderbird-gnome-support",
"binary_version": "1:115.3.1+build1-0ubuntu0.22.04.2"
},
{
"binary_name": "thunderbird-mozsymbols",
"binary_version": "1:115.3.1+build1-0ubuntu0.22.04.2"
},
{
"binary_name": "xul-ext-calendar-timezones",
"binary_version": "1:115.3.1+build1-0ubuntu0.22.04.2"
},
{
"binary_name": "xul-ext-gdata-provider",
"binary_version": "1:115.3.1+build1-0ubuntu0.22.04.2"
},
{
"binary_name": "xul-ext-lightning",
"binary_version": "1:115.3.1+build1-0ubuntu0.22.04.2"
}
]
}{
"availability": "No subscription required",
"priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog",
"binaries": [
{
"binary_name": "thunderbird",
"binary_version": "1:115.3.1+build1-0ubuntu1"
},
{
"binary_name": "thunderbird-dev",
"binary_version": "1:115.3.1+build1-0ubuntu1"
},
{
"binary_name": "thunderbird-gnome-support",
"binary_version": "1:115.3.1+build1-0ubuntu1"
},
{
"binary_name": "thunderbird-mozsymbols",
"binary_version": "1:115.3.1+build1-0ubuntu1"
},
{
"binary_name": "xul-ext-calendar-timezones",
"binary_version": "1:115.3.1+build1-0ubuntu1"
},
{
"binary_name": "xul-ext-gdata-provider",
"binary_version": "1:115.3.1+build1-0ubuntu1"
},
{
"binary_name": "xul-ext-lightning",
"binary_version": "1:115.3.1+build1-0ubuntu1"
}
]
}{
"availability": "Available with Ubuntu Pro with Legacy support add-on: https://ubuntu.com/pro",
"priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog",
"binaries": [
{
"binary_name": "libvpx-dev",
"binary_version": "1.3.0-2ubuntu0.1~esm3"
},
{
"binary_name": "libvpx1",
"binary_version": "1.3.0-2ubuntu0.1~esm3"
},
{
"binary_name": "vpx-tools",
"binary_version": "1.3.0-2ubuntu0.1~esm3"
}
]
}{
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
"priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog",
"binaries": [
{
"binary_name": "libvpx-dev",
"binary_version": "1.5.0-2ubuntu1.1+esm2"
},
{
"binary_name": "libvpx3",
"binary_version": "1.5.0-2ubuntu1.1+esm2"
},
{
"binary_name": "vpx-tools",
"binary_version": "1.5.0-2ubuntu1.1+esm2"
}
]
}{
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
"priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog",
"binaries": [
{
"binary_name": "libvpx-dev",
"binary_version": "1.7.0-3ubuntu0.18.04.1+esm1"
},
{
"binary_name": "libvpx5",
"binary_version": "1.7.0-3ubuntu0.18.04.1+esm1"
},
{
"binary_name": "vpx-tools",
"binary_version": "1.7.0-3ubuntu0.18.04.1+esm1"
}
]
}