In libvpx, there is a possible resource exhaustion due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed. User interaction is needed for exploitation. Upstream patch: https://chromium.googlesource.com/webm/libwebm/%2B/cb5a9477073cf7ae4a28356d6e3e5638aba78dc9 https://chromium.googlesource.com/webm/libwebm/%2B/027a472efe49ff3a24be619442d2150658dbaaa0 https://github.com/webmproject/libvpx/commit/34d54b04e98dd0bac32e9aab0fbda0bf501bc742 https://github.com/webmproject/libvpx/commit/f00890eecdf8365ea125ac16769a83aa6b68792d References: http://www.openwall.com/lists/oss-security/2019/10/25/17 http://www.openwall.com/lists/oss-security/2019/10/27/1 http://www.openwall.com/lists/oss-security/2019/11/07/1
rhel7 is not affected, libvpx 1.3.0 does not include the mkv parser (yet)
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2019-9371
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2020:4629 https://access.redhat.com/errata/RHSA-2020:4629