First published: Mon Jan 10 2022(Updated: )
An issue has been found in libde265 v1.0.8 due to incorrect access control. A SEGV caused by a READ memory access in function derive_boundaryStrength of deblock.cc has occurred. The vulnerability causes a segmentation fault and application crash, which leads to remote denial of service.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Struktur Libde265 | =1.0.8 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
debian/libde265 | 1.0.11-0+deb11u3 1.0.11-0+deb11u1 1.0.11-1+deb12u2 1.0.15-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-36411 is a vulnerability in libde265 v1.0.8 that allows incorrect access control, leading to a segmentation fault and application crash.
The severity of CVE-2021-36411 is medium, with a CVSS severity score of 5.5.
CVE-2021-36411 causes a segmentation fault and application crash, resulting in remote denial of service.
The vulnerability affects libde265 v1.0.8, as well as Struktur Libde265 1.0.8, Debian Debian Linux 10.0, and Debian Debian Linux 11.0.
To fix CVE-2021-36411, update the libde265 package to version 1.0.11-0+deb10u4, 1.0.11-0+deb11u1, 1.0.11-1, or 1.0.12-2.