It was discovered that libde265 could be made to allocate memory that
exceeds the maximum supported size. If a user or automated system were
tricked into opening a specially crafted file, an attacker could possibly
use this issue to cause a denial of service.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 23.10 | noarch | libde265-0 | < 1.0.12-2ubuntu0.2 | UNKNOWN |
Ubuntu | 23.10 | noarch | libde265-0-dbgsym | < 1.0.12-2ubuntu0.2 | UNKNOWN |
Ubuntu | 23.10 | noarch | libde265-dev | < 1.0.12-2ubuntu0.2 | UNKNOWN |
Ubuntu | 23.10 | noarch | libde265-examples | < 1.0.12-2ubuntu0.2 | UNKNOWN |
Ubuntu | 23.10 | noarch | libde265-examples-dbgsym | < 1.0.12-2ubuntu0.2 | UNKNOWN |
Ubuntu | 22.04 | noarch | libde265-0 | < 1.0.8-1ubuntu0.3+esm1 | UNKNOWN |
Ubuntu | 22.04 | noarch | libde265-0 | < 1.0.8-1ubuntu0.3 | UNKNOWN |
Ubuntu | 22.04 | noarch | libde265-0-dbgsym | < 1.0.8-1ubuntu0.3 | UNKNOWN |
Ubuntu | 22.04 | noarch | libde265-dev | < 1.0.8-1ubuntu0.3 | UNKNOWN |
Ubuntu | 22.04 | noarch | libde265-examples | < 1.0.8-1ubuntu0.3 | UNKNOWN |