libde265 v1.0.10 was discovered to contain a NULL pointer dereference in the put_unweighted_pred_16_fallback function at fallback-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input file.
References
Link | Resource |
---|---|
https://github.com/strukturag/libde265/issues/385 | Exploit Issue Tracking Patch |
https://lists.debian.org/debian-lts-announce/2023/03/msg00004.html | Mailing List Third Party Advisory |
https://github.com/strukturag/libde265/issues/385 | Exploit Issue Tracking Patch |
https://lists.debian.org/debian-lts-announce/2023/03/msg00004.html | Mailing List Third Party Advisory |
Configurations
History
21 Nov 2024, 07:48
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/strukturag/libde265/issues/385 - Exploit, Issue Tracking, Patch | |
References | () https://lists.debian.org/debian-lts-announce/2023/03/msg00004.html - Mailing List, Third Party Advisory |
Information
Published : 2023-03-01 15:15
Updated : 2024-11-21 07:48
NVD link : CVE-2023-24757
Mitre link : CVE-2023-24757
CVE.ORG link : CVE-2023-24757
JSON object : View
Products Affected
debian
- debian_linux
struktur
- libde265
CWE
CWE-476
NULL Pointer Dereference