aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorTobias Frost <tobi@debian.org>2022-12-15 19:30:14 +0100
committerBoyuan Yang <byang@debian.org>2022-12-15 19:15:42 +0000
commitbe8d801ea8c13810562f629890e94d1ceac2467a (patch)
tree8730e03377bca70754d10c03ca5210c757dba540
parent2b7ba7e5ee0d864ef9f02c5e32ce4f8f29ec2dff (diff)
DLA-3240-1
-rw-r--r--english/lts/security/2022/dla-3240.data10
-rw-r--r--english/lts/security/2022/dla-3240.wml64
2 files changed, 74 insertions, 0 deletions
diff --git a/english/lts/security/2022/dla-3240.data b/english/lts/security/2022/dla-3240.data
new file mode 100644
index 00000000000..93dc55d1d48
--- /dev/null
+++ b/english/lts/security/2022/dla-3240.data
@@ -0,0 +1,10 @@
+<define-tag pagetitle>DLA-3240-1 libde265</define-tag>
+<define-tag report_date>2022-12-15</define-tag>
+<define-tag secrefs>CVE-2020-21599 CVE-2021-35452 CVE-2021-36408 CVE-2021-36409 CVE-2021-36410 CVE-2021-36411 Bug#1014977</define-tag>
+<define-tag packages>libde265</define-tag>
+<define-tag isvulnerable>yes</define-tag>
+<define-tag fixed>yes</define-tag>
+<define-tag fixed-section>no</define-tag>
+
+#use wml::debian::security
+
diff --git a/english/lts/security/2022/dla-3240.wml b/english/lts/security/2022/dla-3240.wml
new file mode 100644
index 00000000000..58f21624ca2
--- /dev/null
+++ b/english/lts/security/2022/dla-3240.wml
@@ -0,0 +1,64 @@
+<define-tag description>LTS security update</define-tag>
+<define-tag moreinfo>
+<p>Multiple issues were found in libde265, an open source implementation of the
+h.265 video codec, which may result in denial of or have unspecified other
+impact.</p>
+
+<p></p>
+
+<ul>
+
+<li><a href="https://security-tracker.debian.org/tracker/CVE-2020-21599">CVE-2020-21599</a>
+
+ <p>libde265 v1.0.4 contains a heap buffer overflow in the
+ de265_image::available_zscan function, which can be exploited via a crafted
+ a file.</p></li>
+
+<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-35452">CVE-2021-35452</a>
+
+ <p>An Incorrect Access Control vulnerability exists in libde265 v1.0.8 due to
+ a SEGV in slice.cc.</p></li>
+
+<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-36408">CVE-2021-36408</a>
+
+ <p>libde265 v1.0.8 contains a Heap-use-after-free in intrapred.h when decoding
+ file using dec265.</p></li>
+
+<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-36409">CVE-2021-36409</a>
+
+ <p>There is an Assertion `scaling_list_pred_matrix_id_delta==1' failed at
+ sps.cc:925 in libde265 v1.0.8 when decoding file, which allows attackers to
+ cause a Denial of Service (DoS) by running the application with a crafted
+ file or possibly have unspecified other impact.</p></li>
+
+<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-36410">CVE-2021-36410</a>
+
+ <p>A stack-buffer-overflow exists in libde265 v1.0.8 via fallback-motion.cc in
+ function put_epel_hv_fallback when running program dec265.</p></li>
+
+<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-36411">CVE-2021-36411</a>
+
+ <p>An issue has been found in libde265 v1.0.8 due to incorrect access control.
+ A SEGV caused by a READ memory access in function derive_boundaryStrength of
+ deblock.cc has occurred. The vulnerability causes a segmentation fault and
+ application crash, which leads to remote denial of service.</p></li>
+
+</ul>
+
+<p>For Debian 10 buster, these problems have been fixed in version
+1.0.3-1+deb10u1.</p>
+
+<p>We recommend that you upgrade your libde265 packages.</p>
+
+<p>For the detailed security status of libde265 please refer to
+its security tracker page at:
+<a href="https://security-tracker.debian.org/tracker/libde265">https://security-tracker.debian.org/tracker/libde265</a></p>
+
+<p>Further information about Debian LTS security advisories, how to apply
+these updates to your system and frequently asked questions can be
+found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
+</define-tag>
+
+# do not modify the following line
+#include "$(ENGLISHDIR)/lts/security/2022/dla-3240.data"
+# $Id: $

© 2014-2024 Faster IT GmbH | imprint | privacy policy