aboutsummaryrefslogtreecommitdiffstats
path: root/english/lts
diff options
context:
space:
mode:
authorAnton Gladky <gladk@debian.org>2023-11-30 18:47:08 +0100
committerAnton Gladky <gladk@debian.org>2023-11-30 18:47:08 +0100
commit2f390b6fdd6002373b4d61abf3dbd035aea227bc (patch)
treef044d78bbe3facf4cbdc7e014c4db31f855dba16 /english/lts
parentab1d5976a5268ec683564a20c0f9424f8e1dbc47 (diff)
DLA-3676-1
Diffstat (limited to 'english/lts')
-rw-r--r--english/lts/security/2023/dla-3676.data10
-rw-r--r--english/lts/security/2023/dla-3676.wml44
2 files changed, 54 insertions, 0 deletions
diff --git a/english/lts/security/2023/dla-3676.data b/english/lts/security/2023/dla-3676.data
new file mode 100644
index 00000000000..e147fb7840e
--- /dev/null
+++ b/english/lts/security/2023/dla-3676.data
@@ -0,0 +1,10 @@
+<define-tag pagetitle>DLA-3676-1 libde265</define-tag>
+<define-tag report_date>2023-11-30</define-tag>
+<define-tag secrefs>CVE-2023-27102 CVE-2023-27103 CVE-2023-43887 CVE-2023-47471</define-tag>
+<define-tag packages>libde265</define-tag>
+<define-tag isvulnerable>yes</define-tag>
+<define-tag fixed>yes</define-tag>
+<define-tag fixed-section>no</define-tag>
+
+#use wml::debian::security
+
diff --git a/english/lts/security/2023/dla-3676.wml b/english/lts/security/2023/dla-3676.wml
new file mode 100644
index 00000000000..909b3d93d8c
--- /dev/null
+++ b/english/lts/security/2023/dla-3676.wml
@@ -0,0 +1,44 @@
+<define-tag description>LTS security update</define-tag>
+<define-tag moreinfo>
+<p>Multiple issues were found in libde265, an open source implementation of the h.265 video codec.</p>
+
+<ul>
+
+<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-27102">CVE-2023-27102</a>
+
+ <p>NULL pointer dereference in function decoder_context::process_slice_segment_header
+ at decctx.cc.</p></li>
+
+<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-27103">CVE-2023-27103</a>
+
+ <p>Heap buffer overflow via the function derive_collocated_motion_vectors at motion.cc.</p></li>
+
+<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-43887">CVE-2023-43887</a>
+
+ <p>Multiple buffer overflows via the num_tile_columns and num_tile_row parameters in
+ the function pic_parameter_set::dump.</p></li>
+
+<li><a href="https://security-tracker.debian.org/tracker/CVE-2023-47471">CVE-2023-47471</a>
+
+ <p>Buffer overflow vulnerability in strukturag may cause a denial of service via
+ the slice_segment_header function in the slice.cc component.</p></li>
+
+</ul>
+
+<p>For Debian 10 buster, these problems have been fixed in version
+1.0.11-0+deb10u5.</p>
+
+<p>We recommend that you upgrade your libde265 packages.</p>
+
+<p>For the detailed security status of libde265 please refer to
+its security tracker page at:
+<a href="https://security-tracker.debian.org/tracker/libde265">https://security-tracker.debian.org/tracker/libde265</a></p>
+
+<p>Further information about Debian LTS security advisories, how to apply
+these updates to your system and frequently asked questions can be
+found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
+</define-tag>
+
+# do not modify the following line
+#include "$(ENGLISHDIR)/lts/security/2023/dla-3676.data"
+# $Id: $

© 2014-2024 Faster IT GmbH | imprint | privacy policy