FERRAMENTAS LINUX: Critical Security Update: libva 2.20.0 Patch for openSUSE & SUSE Linux (CVE-2023-39929 Fix)

segunda-feira, 5 de maio de 2025

Critical Security Update: libva 2.20.0 Patch for openSUSE & SUSE Linux (CVE-2023-39929 Fix)

 



Critical libva 2.20.0 update for openSUSE & SUSE Linux fixes CVE-2023-39929 (local privilege escalation). Includes Intel GPU optimizations, AV1 encode improvements, and security patches. Install now via zypper!


Why This Update Matters

The latest libva 2.20.0 update addresses a critical security vulnerability (CVE-2023-39929) that could allow local privilege escalation via an uncontrolled search path. This patch is essential for:
 Enhanced system security – Mitigates risks for authenticated users exploiting local access.

 Improved Intel GPU performance – Updates key components for hardware-accelerated video processing.

 Stability & optimization – Removes deprecated code, refines AV1 encoding, and fixes minor bugs.

Key Fixes & Enhancements

  • Security Patch: Resolves CVE-2023-39929 (bsc#1224413, jsc#PED-11066).

  • Intel GPU Support: Latest drivers for hardware video decoding/encoding (bsc#1217770).

  • New Features:

    • AV1 encode offset adjustments for better performance.

    • JPEG crop & partial decode support.

    • Trace logging for vaExportSurfaceHandle.

  • Deprecated Code Removal: Cleaner, more efficient backend.

How to Install the Update

Apply this patch immediately using:

For openSUSE Leap 15.3

bash
Copy
Download
zypper in -t patch SUSE-2025-1451=1  

For SUSE Enterprise Systems

  • SUSE Linux Enterprise Server 15 SP3 LTSS:

    bash
    Copy
    Download
    zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-1451=1  
  • SUSE Linux Enterprise High Performance Computing:

    bash
    Copy
    Download
    zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-1451=1  

(Full package list below)

Affected Packages & References

Supported Architectures

  • x86_64, aarch64, ppc64le, s390x

  • 32-bit & 64-bit variants

Critical References

Nenhum comentário:

Postar um comentário