Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
7.5
Vulnerability in Red Hat's libvpx Video Processing Library
RHSA-2026:3967
Summary
A security update is available for the libvpx video processing library, which is used by various applications to decode and encode video. The update fixes a weakness in the library that could allow an attacker to execute malicious code on a system. It's a good idea to apply this update to prevent potential security risks.
What to do
- Update redhat libvpx to version 0:1.7.0-13.el8_10.
- Update redhat libvpx-debuginfo to version 0:1.7.0-13.el8_10.
- Update redhat libvpx-debugsource to version 0:1.7.0-13.el8_10.
- Update redhat libvpx-devel to version 0:1.7.0-13.el8_10.
- Update redhat libvpx-utils-debuginfo to version 0:1.7.0-13.el8_10.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| redhat | libvpx | <= 0:1.7.0-13.el8_10 | 0:1.7.0-13.el8_10 |
| redhat | libvpx-debuginfo | <= 0:1.7.0-13.el8_10 | 0:1.7.0-13.el8_10 |
| redhat | libvpx-debugsource | <= 0:1.7.0-13.el8_10 | 0:1.7.0-13.el8_10 |
| redhat | libvpx-devel | <= 0:1.7.0-13.el8_10 | 0:1.7.0-13.el8_10 |
| redhat | libvpx-utils-debuginfo | <= 0:1.7.0-13.el8_10 | 0:1.7.0-13.el8_10 |
| redhat | libvpx | <= 0:1.7.0-13.el8_10 | 0:1.7.0-13.el8_10 |
| redhat | libvpx-debuginfo | <= 0:1.7.0-13.el8_10 | 0:1.7.0-13.el8_10 |
| redhat | libvpx-debugsource | <= 0:1.7.0-13.el8_10 | 0:1.7.0-13.el8_10 |
| redhat | libvpx-devel | <= 0:1.7.0-13.el8_10 | 0:1.7.0-13.el8_10 |
| redhat | libvpx-utils-debuginfo | <= 0:1.7.0-13.el8_10 | 0:1.7.0-13.el8_10 |
Original title
Red Hat Security Advisory: libvpx security update
osv CVSS3.1
7.5
- https://access.redhat.com/errata/RHSA-2026:3967 Vendor Advisory
- https://access.redhat.com/security/updates/classification/#important Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2440219 Third Party Advisory
- https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3967.j... Vendor Advisory
- https://access.redhat.com/security/cve/CVE-2026-2447 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2026-2447 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2026-2447 Vendor Advisory
- https://bugzilla.mozilla.org/show_bug.cgi?id=2014390 Third Party Advisory
- https://www.mozilla.org/security/advisories/mfsa2026-10/ Third Party Advisory
Published: 9 Mar 2026 · Updated: 13 Mar 2026 · First seen: 9 Mar 2026