Heap buffer overflow in vp8 encoding in libvpx in Google Chrome prior to 117.0.5938.132 and libvpx 1.13.1 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
{ "binaries": [ { "binary_version": "118.0.1+build1-0ubuntu0.20.04.1", "binary_name": "firefox" }, { "binary_version": "118.0.1+build1-0ubuntu0.20.04.1", "binary_name": "firefox-dev" }, { "binary_version": "118.0.1+build1-0ubuntu0.20.04.1", "binary_name": "firefox-geckodriver" }, { "binary_version": "118.0.1+build1-0ubuntu0.20.04.1", "binary_name": "firefox-mozsymbols" } ], "availability": "No subscription required", "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog" }
{ "binaries": [ { "binary_version": "1.8.2-1ubuntu0.2", "binary_name": "libvpx-dev" }, { "binary_version": "1.8.2-1ubuntu0.2", "binary_name": "libvpx6" }, { "binary_version": "1.8.2-1ubuntu0.2", "binary_name": "vpx-tools" } ], "availability": "No subscription required", "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog" }
{ "binaries": [ { "binary_version": "1:115.3.1+build1-0ubuntu0.20.04.1", "binary_name": "thunderbird" }, { "binary_version": "1:115.3.1+build1-0ubuntu0.20.04.1", "binary_name": "thunderbird-dev" }, { "binary_version": "1:115.3.1+build1-0ubuntu0.20.04.1", "binary_name": "thunderbird-gnome-support" }, { "binary_version": "1:115.3.1+build1-0ubuntu0.20.04.1", "binary_name": "thunderbird-mozsymbols" }, { "binary_version": "1:115.3.1+build1-0ubuntu0.20.04.1", "binary_name": "xul-ext-calendar-timezones" }, { "binary_version": "1:115.3.1+build1-0ubuntu0.20.04.1", "binary_name": "xul-ext-gdata-provider" }, { "binary_version": "1:115.3.1+build1-0ubuntu0.20.04.1", "binary_name": "xul-ext-lightning" } ], "availability": "No subscription required", "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog" }
{ "binaries": [ { "binary_version": "1.11.0-2ubuntu2.2", "binary_name": "libvpx-dev" }, { "binary_version": "1.11.0-2ubuntu2.2", "binary_name": "libvpx7" }, { "binary_version": "1.11.0-2ubuntu2.2", "binary_name": "vpx-tools" } ], "availability": "No subscription required", "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog" }
{ "binaries": [ { "binary_version": "1:115.3.1+build1-0ubuntu0.22.04.2", "binary_name": "thunderbird" }, { "binary_version": "1:115.3.1+build1-0ubuntu0.22.04.2", "binary_name": "thunderbird-dev" }, { "binary_version": "1:115.3.1+build1-0ubuntu0.22.04.2", "binary_name": "thunderbird-gnome-support" }, { "binary_version": "1:115.3.1+build1-0ubuntu0.22.04.2", "binary_name": "thunderbird-mozsymbols" }, { "binary_version": "1:115.3.1+build1-0ubuntu0.22.04.2", "binary_name": "xul-ext-calendar-timezones" }, { "binary_version": "1:115.3.1+build1-0ubuntu0.22.04.2", "binary_name": "xul-ext-gdata-provider" }, { "binary_version": "1:115.3.1+build1-0ubuntu0.22.04.2", "binary_name": "xul-ext-lightning" } ], "availability": "No subscription required", "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog" }
{ "binaries": [ { "binary_version": "1:115.3.1+build1-0ubuntu1", "binary_name": "thunderbird" }, { "binary_version": "1:115.3.1+build1-0ubuntu1", "binary_name": "thunderbird-dev" }, { "binary_version": "1:115.3.1+build1-0ubuntu1", "binary_name": "thunderbird-gnome-support" }, { "binary_version": "1:115.3.1+build1-0ubuntu1", "binary_name": "thunderbird-mozsymbols" }, { "binary_version": "1:115.3.1+build1-0ubuntu1", "binary_name": "xul-ext-calendar-timezones" }, { "binary_version": "1:115.3.1+build1-0ubuntu1", "binary_name": "xul-ext-gdata-provider" }, { "binary_version": "1:115.3.1+build1-0ubuntu1", "binary_name": "xul-ext-lightning" } ], "availability": "No subscription required", "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog" }
{ "binaries": [ { "binary_version": "1.3.0-2ubuntu0.1~esm3", "binary_name": "libvpx-dev" }, { "binary_version": "1.3.0-2ubuntu0.1~esm3", "binary_name": "libvpx1" }, { "binary_version": "1.3.0-2ubuntu0.1~esm3", "binary_name": "vpx-tools" } ], "availability": "Available with Ubuntu Pro with Legacy support add-on: https://ubuntu.com/pro", "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog" }
{ "binaries": [ { "binary_version": "1.5.0-2ubuntu1.1+esm2", "binary_name": "libvpx-dev" }, { "binary_version": "1.5.0-2ubuntu1.1+esm2", "binary_name": "libvpx3" }, { "binary_version": "1.5.0-2ubuntu1.1+esm2", "binary_name": "vpx-tools" } ], "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog" }
{ "binaries": [ { "binary_version": "1.7.0-3ubuntu0.18.04.1+esm1", "binary_name": "libvpx-dev" }, { "binary_version": "1.7.0-3ubuntu0.18.04.1+esm1", "binary_name": "libvpx5" }, { "binary_version": "1.7.0-3ubuntu0.18.04.1+esm1", "binary_name": "vpx-tools" } ], "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog" }