First published: Wed Mar 15 2023(Updated: )
Libde265 v1.0.11 was discovered to contain a segmentation violation via the function decoder_context::process_slice_segment_header at decctx.cc.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Struktur Libde265 | =1.0.11 | |
ubuntu/libde265 | <1.0.2-2ubuntu0.18.04.1~ | 1.0.2-2ubuntu0.18.04.1~ |
ubuntu/libde265 | <1.0.4-1ubuntu0.4 | 1.0.4-1ubuntu0.4 |
ubuntu/libde265 | <1.0.8-1ubuntu0.3 | 1.0.8-1ubuntu0.3 |
ubuntu/libde265 | <1.0.2-2ubuntu0.16.04.1~ | 1.0.2-2ubuntu0.16.04.1~ |
debian/libde265 | <=1.0.3-1<=1.0.11-0+deb11u1 | 1.0.11-0+deb10u6 1.0.11-0+deb11u3 1.0.11-1+deb12u2 1.0.15-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-27102 is a vulnerability in Libde265 v1.0.11 that allows for a segmentation violation via the function decoder_context::process_slice_segment_header at decctx.cc.
The severity of CVE-2023-27102 is medium with a CVSS score of 6.5.
The Libde265 version 1.0.11 is affected by CVE-2023-27102.
To fix CVE-2023-27102, it is recommended to update Libde265 to a patched version provided by the vendor.
More information about CVE-2023-27102 can be found at the following reference: [GitHub Issue](https://github.com/strukturag/libde265/issues/393).