First published: Wed Nov 22 2023(Updated: )
Libde265 v1.0.12 was discovered to contain multiple buffer overflows via the num_tile_columns and num_tile_row parameters in the function pic_parameter_set::dump.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Struktur Libde265 | =1.0.12 | |
ubuntu/libde265 | <1.0.2-2ubuntu0.18.04.1~ | 1.0.2-2ubuntu0.18.04.1~ |
ubuntu/libde265 | <1.0.13-1 | 1.0.13-1 |
ubuntu/libde265 | <1.0.4-1ubuntu0.4 | 1.0.4-1ubuntu0.4 |
ubuntu/libde265 | <1.0.8-1ubuntu0.3 | 1.0.8-1ubuntu0.3 |
ubuntu/libde265 | <1.0.12-2ubuntu0.1 | 1.0.12-2ubuntu0.1 |
ubuntu/libde265 | <1.0.2-2ubuntu0.16.04.1~ | 1.0.2-2ubuntu0.16.04.1~ |
debian/libde265 | <=1.0.3-1<=1.0.11-0+deb11u1 | 1.0.11-0+deb10u6 1.0.11-0+deb11u3 1.0.11-1+deb12u2 1.0.15-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-43887 is high.
CVE-2023-43887 affects Libde265 version 1.0.12.
The vulnerability in Libde265 described in CVE-2023-43887 is a buffer overflow via the num_tile_columns and num_tile_row parameters.
To fix the vulnerability in Libde265 (CVE-2023-43887), update to a version that includes the fix mentioned in the reference links.
Yes, you can find additional resources and references for CVE-2023-43887 in the following links: [link1](https://github.com/strukturag/libde265/commit/63b596c915977f038eafd7647d1db25488a8c133), [link2](https://github.com/strukturag/libde265/issues/418), [link3](https://lists.debian.org/debian-lts-announce/2023/11/msg00032.html).