SUSE Security Update: Security update for libaom
______________________________________________________________________________

Announcement ID:    SUSE-SU-2021:4170-1
Rating:             moderate
References:         #1193356 #1193365 #1193366 #1193369 
Cross-References:   CVE-2020-36129 CVE-2020-36130 CVE-2020-36131
                    CVE-2020-36135
CVSS scores:
                    CVE-2020-36129 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
                    CVE-2020-36130 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
                    CVE-2020-36131 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
                    CVE-2020-36135 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Affected Products:
                    SUSE Linux Enterprise Module for Desktop Applications 15-SP3
                    SUSE Linux Enterprise Module for Desktop Applications 15-SP2
______________________________________________________________________________

   An update that fixes four vulnerabilities is now available.

Description:

   This update for libaom fixes the following issues:

   - CVE-2020-36129: Fixed stack buffer overflow via the component
     src/aom_image.c (bsc#1193356).
   - CVE-2020-36131: Fixed stack buffer overflow via the component
     stats/rate_hist.c (bsc#1193365).
   - CVE-2020-36135: Fixed NULL pointer dereference via the component
     rate_hist.c (bsc#1193366).
   - CVE-2020-36130: Fixed NULL pointer dereference via the component
     av1/av1_dx_iface.c (bsc#1193369).


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Module for Desktop Applications 15-SP3:

      zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP3-2021-4170=1

   - SUSE Linux Enterprise Module for Desktop Applications 15-SP2:

      zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-4170=1



Package List:

   - SUSE Linux Enterprise Module for Desktop Applications 15-SP3 (aarch64 ppc64le s390x x86_64):

      libaom-debugsource-1.0.0-3.9.1
      libaom0-1.0.0-3.9.1
      libaom0-debuginfo-1.0.0-3.9.1

   - SUSE Linux Enterprise Module for Desktop Applications 15-SP2 (aarch64 ppc64le s390x x86_64):

      libaom-debugsource-1.0.0-3.9.1
      libaom0-1.0.0-3.9.1
      libaom0-debuginfo-1.0.0-3.9.1


References:

   https://www.suse.com/security/cve/CVE-2020-36129.html
   https://www.suse.com/security/cve/CVE-2020-36130.html
   https://www.suse.com/security/cve/CVE-2020-36131.html
   https://www.suse.com/security/cve/CVE-2020-36135.html
   https://bugzilla.suse.com/1193356
   https://bugzilla.suse.com/1193365
   https://bugzilla.suse.com/1193366
   https://bugzilla.suse.com/1193369

SUSE: 2021:4170-1 moderate: libaom

December 23, 2021
An update that fixes four vulnerabilities is now available

Summary

This update for libaom fixes the following issues: - CVE-2020-36129: Fixed stack buffer overflow via the component src/aom_image.c (bsc#1193356). - CVE-2020-36131: Fixed stack buffer overflow via the component stats/rate_hist.c (bsc#1193365). - CVE-2020-36135: Fixed NULL pointer dereference via the component rate_hist.c (bsc#1193366). - CVE-2020-36130: Fixed NULL pointer dereference via the component av1/av1_dx_iface.c (bsc#1193369). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Module for Desktop Applications 15-SP3: zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP3-2021-4170=1 - SUSE Linux Enterprise Module for Desktop Applications 15-SP2: zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP2-2021-4170=1 Package List: - SUSE Linux Enterprise Module for Desktop Applications 15-SP3 (aarch64 ppc64le s390x x86_64): libaom-debugsource-1.0.0-3.9.1 libaom0-1.0.0-3.9.1 libaom0-debuginfo-1.0.0-3.9.1 - SUSE Linux Enterprise Module for Desktop Applications 15-SP2 (aarch64 ppc64le s390x x86_64): libaom-debugsource-1.0.0-3.9.1 libaom0-1.0.0-3.9.1 libaom0-debuginfo-1.0.0-3.9.1

References

#1193356 #1193365 #1193366 #1193369

Cross- CVE-2020-36129 CVE-2020-36130 CVE-2020-36131

CVE-2020-36135

CVSS scores:

CVE-2020-36129 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

CVE-2020-36130 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

CVE-2020-36131 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

CVE-2020-36135 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Affected Products:

SUSE Linux Enterprise Module for Desktop Applications 15-SP3

SUSE Linux Enterprise Module for Desktop Applications 15-SP2

https://www.suse.com/security/cve/CVE-2020-36129.html

https://www.suse.com/security/cve/CVE-2020-36130.html

https://www.suse.com/security/cve/CVE-2020-36131.html

https://www.suse.com/security/cve/CVE-2020-36135.html

https://bugzilla.suse.com/1193356

https://bugzilla.suse.com/1193365

https://bugzilla.suse.com/1193366

https://bugzilla.suse.com/1193369

Severity
Announcement ID: SUSE-SU-2021:4170-1
Rating: moderate

Related News