Source: libvpx
Version: 1.16.0-2
Severity: grave
Tags: security upstream
Justification: user security hole
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for libvpx.

CVE-2026-2447[0]:
| Heap buffer overflow in libvpx. This vulnerability affects Firefox <
| 147.0.4, Firefox ESR < 140.7.1, Firefox ESR < 115.32.1, Thunderbird
| < 140.7.2, and Thunderbird < 147.0.2.

This corresponds to [1] and [2] and Google Chrome covered it in
CVE-2026-1861.

Probably libvpx should get a CVE on it's own, but I'm not 100% certain
about the ruling here, as Mozilla and Google used a separate CVE for
their use of libvpx in their products.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-2447
    https://www.cve.org/CVERecord?id=CVE-2026-2447
[1] https://issues.oss-fuzz.com/issues/476466137
[2] 
https://chromium.googlesource.com/webm/libvpx/+/d5f35ac8d93cba7f7a3f7ddb8f9dc8bd28f785e1

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to