libvpx is vulnerable to arbitrary code execution. An integer overflow flaw, leading to arbitrary memory writes, was found in libvpx. An attacker could create a specially-crafted video encoded using the VP8 codec that, when played by a victim with an application using libvpx (such as Totem), would cause the application to crash or, potentially, execute arbitrary code.
code.google.com/p/chromium/issues/detail?id=60055
googlechromereleases.blogspot.com/2010/11/stable-channel-update.html
review.webmproject.org/gitweb?p=libvpx.git;a=blob;f=CHANGELOG
review.webmproject.org/gitweb?p=libvpx.git;a=commit;h=09bcc1f710ea65dc158639479288fb1908ff0c53
secunia.com/advisories/42109
secunia.com/advisories/42118
secunia.com/advisories/42690
secunia.com/advisories/42908
security.gentoo.org/glsa/glsa-201101-03.xml
www.vupen.com/english/advisories/2011/0115
access.redhat.com/errata/RHSA-2010:0999
access.redhat.com/security/updates/classification/#moderate
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12198
rhn.redhat.com/errata/RHSA-2010-0999.html