Description
An issue has been found in libde265 v1.0.8 due to incorrect access control. A SEGV caused by a READ memory access in function derive_boundaryStrength of deblock.cc has occurred. The vulnerability causes a segmentation fault and application crash, which leads to remote denial of service.
References (3)
Core 3
Core References
Issue Tracking, Mailing List mailing-list
https://lists.debian.org/debian-lts-announce/2022/12/msg00027.html
Issue Tracking vendor-advisory
https://www.debian.org/security/2023/dsa-5346
Exploit, Issue Tracking
https://github.com/strukturag/libde265/issues/302
Scores
CVSS v3
5.5
EPSS
0.0016
EPSS Percentile
35.9%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Details
CWE
CWE-125
Status
published
Products (3)
debian/debian_linux
10.0
debian/debian_linux
11.0
struktur/libde265
1.0.8
Published
Jan 10, 2022
Tracked Since
Feb 18, 2026