Unrated severityNVD Advisory· Published Sep 27, 2019· Updated Aug 4, 2024
CVE-2019-9371
CVE-2019-9371
Description
In libvpx, there is a possible resource exhaustion due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-132783254
Affected products
14- Android/Androiddescription
- osv-coords13 versionspkg:rpm/almalinux/libvpxpkg:rpm/almalinux/libvpx-develpkg:rpm/opensuse/libvpx&distro=openSUSE%20Leap%2015.1pkg:rpm/opensuse/libvpx&distro=openSUSE%20Tumbleweedpkg:rpm/suse/libvpx&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-ESPOSpkg:rpm/suse/libvpx&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-LTSSpkg:rpm/suse/libvpx&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015pkg:rpm/suse/libvpx&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP1pkg:rpm/suse/libvpx&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Desktop%20Applications%2015pkg:rpm/suse/libvpx&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Desktop%20Applications%2015%20SP1pkg:rpm/suse/libvpx&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Package%20Hub%2015pkg:rpm/suse/libvpx&distro=SUSE%20Linux%20Enterprise%20Server%2015-LTSSpkg:rpm/suse/libvpx&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015
< 1.7.0-8.el8+ 12 more
- (no CPE)range: < 1.7.0-8.el8
- (no CPE)range: < 1.7.0-8.el8
- (no CPE)range: < 1.6.1-lp151.5.3.1
- (no CPE)range: < 1.10.0-1.3
- (no CPE)range: < 1.6.1-6.3.1
- (no CPE)range: < 1.6.1-6.3.1
- (no CPE)range: < 1.6.1-6.3.1
- (no CPE)range: < 1.6.1-6.3.1
- (no CPE)range: < 1.6.1-6.3.1
- (no CPE)range: < 1.6.1-6.3.1
- (no CPE)range: < 1.6.1-6.3.1
- (no CPE)range: < 1.6.1-6.3.1
- (no CPE)range: < 1.6.1-6.3.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
11- lists.opensuse.org/opensuse-security-announce/2020-01/msg00049.htmlmitrevendor-advisoryx_refsource_SUSE
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DQSTK442ATWJOR4TU3MR6C3N5A6NDFFN/mitrevendor-advisoryx_refsource_FEDORA
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U2IIA3RSYABBUCFIHXIRVUT5CTJVWWZ6/mitrevendor-advisoryx_refsource_FEDORA
- security.gentoo.org/glsa/202003-59mitrevendor-advisoryx_refsource_GENTOO
- usn.ubuntu.com/4199-1/mitrevendor-advisoryx_refsource_UBUNTU
- www.debian.org/security/2019/dsa-4578mitrevendor-advisoryx_refsource_DEBIAN
- www.openwall.com/lists/oss-security/2019/10/25/17mitremailing-listx_refsource_MLIST
- www.openwall.com/lists/oss-security/2019/10/27/1mitremailing-listx_refsource_MLIST
- www.openwall.com/lists/oss-security/2019/11/07/1mitremailing-listx_refsource_MLIST
- seclists.org/bugtraq/2019/Nov/43mitremailing-listx_refsource_BUGTRAQ
- source.android.com/security/bulletin/android-10mitrex_refsource_MISC
News mentions
0No linked articles in our index yet.