[ubuntu/focal-security] libde265 1.0.4-1ubuntu0.4 (Accepted)
Fabian Toepfer
fabian.toepfer at canonical.com
Tue Mar 5 18:33:35 UTC 2024
libde265 (1.0.4-1ubuntu0.4) focal-security; urgency=medium
* SECURITY UPDATE: denial-of-service
- debian/patches/CVE-2023-27102.patch: check whether referenced
PPS exists.
- CVE-2023-27102
* SECURITY UPDATE: heap-buffer-overflow
- debian/patches/CVE-2023-27103.patch: check for valid slice
header index access.
- CVE-2023-27103
* SECURITY UPDATE: buffer overflow
- debian/patches/CVE-2023-43887.patch: fix buffer overflow via the
num_tile_columns and num_tile_row parameters in the function
pic_parameter_set::dump.
- CVE-2023-43887
* SECURITY UPDATE: buffer overflow
- debian/patches/CVE-2023-47471.patch: check for null-pointer in
functon slice_segment_header::dump_slice_segment_header.
- CVE-2023-47471
* SECURITY UPDATE: heap-buffer-overflow
- debian/patches/CVE-2023-49465.patch: fix buffer overflow via the
derive_spatial_luma_vector_prediction function.
- CVE-2023-49465
* SECURITY UPDATE: heap-buffer-overflow
- debian/patches/CVE-2023-49467.patch: prevent endless loop in
decode_ref_idx_lX function when numRefIdxLXActive is invalid.
- CVE-2023-49467
* SECURITY UPDATE: buffer overflow
- debian/patches/CVE-2023-49468.patch: sanitize values if IPM is
uninitialized in get_IntraPredMode function.
- CVE-2023-49468
Date: 2024-03-01 13:23:13.149619+00:00
Changed-By: Fabian Toepfer <fabian.toepfer at canonical.com>
https://launchpad.net/ubuntu/+source/libde265/1.0.4-1ubuntu0.4
-------------- next part --------------
Sorry, changesfile not available.
More information about the Focal-changes
mailing list