CVE-2021-36411

An issue has been found in libde265 v1.0.8 due to incorrect access control. A SEGV caused by a READ memory access in function derive_boundaryStrength of deblock.cc has occurred. The vulnerability causes a segmentation fault and application crash, which leads to remote denial of service.
Configurations

Configuration 1 (hide)

cpe:2.3:a:struktur:libde265:1.0.8:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

21 Nov 2024, 06:13

Type Values Removed Values Added
References () https://github.com/strukturag/libde265/issues/302 - Exploit, Issue Tracking () https://github.com/strukturag/libde265/issues/302 - Exploit, Issue Tracking
References () https://lists.debian.org/debian-lts-announce/2022/12/msg00027.html - Issue Tracking, Mailing List () https://lists.debian.org/debian-lts-announce/2022/12/msg00027.html - Issue Tracking, Mailing List
References () https://www.debian.org/security/2023/dsa-5346 - Issue Tracking () https://www.debian.org/security/2023/dsa-5346 - Issue Tracking

08 Aug 2023, 14:22

Type Values Removed Values Added
CWE NVD-CWE-noinfo CWE-125

Information

Published : 2022-01-10 23:15

Updated : 2024-11-21 06:13


NVD link : CVE-2021-36411

Mitre link : CVE-2021-36411

CVE.ORG link : CVE-2021-36411


JSON object : View

Products Affected

struktur

  • libde265

debian

  • debian_linux
CWE
CWE-125

Out-of-bounds Read