diff --git a/libvpx b/libvpx index 7ca5c81..a4a92bf 160000 --- a/libvpx +++ b/libvpx @@ -1 +1 @@ -Subproject commit 7ca5c81f60b0b0f36fb030c80b259cbd57961a74 +Subproject commit a4a92bf3f73f64c1c17f24cbb3e61ea6d4e290b4 diff --git a/patchinfo.20241204111214316538.255638743075857/_patchinfo b/patchinfo.20241204111214316538.255638743075857/_patchinfo new file mode 100644 index 0000000..e99f218 --- /dev/null +++ b/patchinfo.20241204111214316538.255638743075857/_patchinfo @@ -0,0 +1,15 @@ + + + VUL-0: CVE-2024-5197: libvpx: interger overflow when calling vpx_img_alloc() or vpx_img_wrap() with large parameters + + adrianSuSE + important + security + Security update for libvpx + This update for libvpx fixes the following issues: + +- CVE-2024-5197: Fixed Integer overflow (bsc#1225879) + + libvpx + +