6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
7.8 High
AI Score
Confidence
High
4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:N/A:P
0.001 Low
EPSS
Percentile
18.9%
Debian LTS Advisory DLA-3676-1 [email protected]
https://www.debian.org/lts/security/ Anton Gladky
November 30, 2023 https://wiki.debian.org/LTS
Package : libde265
Version : 1.0.11-0+deb10u5
CVE ID : CVE-2023-27102 CVE-2023-27103 CVE-2023-43887 CVE-2023-47471
Multiple issues were found in libde265, an open source implementation of the h.265 video codec.
CVE-2023-27102
NULL pointer dereference in function decoder_context::process_slice_segment_header
at decctx.cc.
CVE-2023-27103
Heap buffer overflow via the function derive_collocated_motion_vectors at motion.cc.
CVE-2023-43887
Multiple buffer overflows via the num_tile_columns and num_tile_row parameters in
the function pic_parameter_set::dump.
CVE-2023-47471
Buffer overflow vulnerability in strukturag may cause a denial of service via
the slice_segment_header function in the slice.cc component.
For Debian 10 buster, these problems have been fixed in version
1.0.11-0+deb10u5.
We recommend that you upgrade your libde265 packages.
For the detailed security status of libde265 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/libde265
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 11 | mips64el | libde265-0-dbgsym | < 1.0.11-0+deb11u2 | libde265-0-dbgsym_1.0.11-0+deb11u2_mips64el.deb |
Debian | 12 | amd64 | libde265-examples-dbgsym | < 1.0.11-1+deb12u1 | libde265-examples-dbgsym_1.0.11-1+deb12u1_amd64.deb |
Debian | 12 | mipsel | libde265-0 | < 1.0.11-1+deb12u1 | libde265-0_1.0.11-1+deb12u1_mipsel.deb |
Debian | 12 | mips64el | libde265-examples-dbgsym | < 1.0.11-1+deb12u1 | libde265-examples-dbgsym_1.0.11-1+deb12u1_mips64el.deb |
Debian | 11 | i386 | libde265-0-dbgsym | < 1.0.11-0+deb11u2 | libde265-0-dbgsym_1.0.11-0+deb11u2_i386.deb |
Debian | 11 | amd64 | libde265-0-dbgsym | < 1.0.11-0+deb11u2 | libde265-0-dbgsym_1.0.11-0+deb11u2_amd64.deb |
Debian | 11 | i386 | libde265-examples-dbgsym | < 1.0.11-0+deb11u2 | libde265-examples-dbgsym_1.0.11-0+deb11u2_i386.deb |
Debian | 12 | s390x | libde265-0 | < 1.0.11-1+deb12u1 | libde265-0_1.0.11-1+deb12u1_s390x.deb |
Debian | 11 | ppc64el | libde265-0-dbgsym | < 1.0.11-0+deb11u2 | libde265-0-dbgsym_1.0.11-0+deb11u2_ppc64el.deb |
Debian | 11 | ppc64el | libde265-dev | < 1.0.11-0+deb11u2 | libde265-dev_1.0.11-0+deb11u2_ppc64el.deb |
6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
7.8 High
AI Score
Confidence
High
4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:N/A:P
0.001 Low
EPSS
Percentile
18.9%