Buffer Overflow vulnerability in strukturag libde265 v1.10.12 allows a
local attacker to cause a denial of service via the slice_segment_header
function in the slice.cc component.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | libde265 | < 1.0.2-2ubuntu0.18.04.1~esm4 | UNKNOWN |
ubuntu | 20.04 | noarch | libde265 | < 1.0.4-1ubuntu0.4 | UNKNOWN |
ubuntu | 22.04 | noarch | libde265 | < 1.0.8-1ubuntu0.3 | UNKNOWN |
ubuntu | 23.10 | noarch | libde265 | < 1.0.12-2ubuntu0.1 | UNKNOWN |
ubuntu | 16.04 | noarch | libde265 | < 1.0.2-2ubuntu0.16.04.1~esm4 | UNKNOWN |
github.com/strukturag/libde265/commit/e36b4a1b0bafa53df47514c419d5be3e8916ebc7
github.com/strukturag/libde265/issues/426
launchpad.net/bugs/cve/CVE-2023-47471
nvd.nist.gov/vuln/detail/CVE-2023-47471
security-tracker.debian.org/tracker/CVE-2023-47471
ubuntu.com/security/notices/USN-6677-1
www.cve.org/CVERecord?id=CVE-2023-47471