Ubuntu update for libde265



Published: 2024-02-27
Risk High
Patch available YES
Number of vulnerabilities 18
CVE-ID CVE-2021-35452
CVE-2021-36411
CVE-2022-43238
CVE-2022-43241
CVE-2022-43242
CVE-2021-36408
CVE-2021-36409
CVE-2021-36410
CVE-2022-43235
CVE-2022-43236
CVE-2022-43237
CVE-2022-43239
CVE-2022-43240
CVE-2022-43243
CVE-2022-43248
CVE-2022-43252
CVE-2022-43253
CVE-2022-1253
CWE-ID CWE-125
CWE-20
CWE-787
CWE-416
CWE-617
CWE-121
CWE-122
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Ubuntu
Operating systems & Components / Operating system

libde265-0 (Ubuntu package)
Operating systems & Components / Operating system package or component

Vendor Canonical Ltd.

Security Bulletin

This security bulletin contains information about 18 vulnerabilities.

1) Out-of-bounds read

EUVDB-ID: #VU86827

Risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-35452

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary condition in slice.cc. A remote attacker can pass a specially crafted file to the application, trigger an out-of-bounds read error and perform a denial of service (DoS) attack.

Mitigation

Update the affected package libde265 to the latest version.

Vulnerable software versions

Ubuntu: 16.04 - 22.04

libde265-0 (Ubuntu package): before Ubuntu Pro

External links

http://ubuntu.com/security/notices/USN-6627-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Out-of-bounds read

EUVDB-ID: #VU86828

Risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-36411

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary condition within the derive_boundaryStrength() function in deblock.cc. A remote attacker can pass a specially crafted file to the application, trigger an out-of-bounds read error and perform a denial of service (DoS) attack.

Mitigation

Update the affected package libde265 to the latest version.

Vulnerable software versions

Ubuntu: 16.04 - 22.04

libde265-0 (Ubuntu package): before Ubuntu Pro

External links

http://ubuntu.com/security/notices/USN-6627-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Input validation error

EUVDB-ID: #VU86830

Risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-43238

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input within the ff_hevc_put_hevc_qpel_h_3_v_3_sse() function in sse-motion.cc. A remote attacker can pass specially crafted video input to the application and perform a denial of service (DoS) attack.

Mitigation

Update the affected package libde265 to the latest version.

Vulnerable software versions

Ubuntu: 16.04 - 22.04

libde265-0 (Ubuntu package): before Ubuntu Pro

External links

http://ubuntu.com/security/notices/USN-6627-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Input validation error

EUVDB-ID: #VU86831

Risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-43241

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input within the ff_hevc_put_hevc_qpel_v_3_8_sse() function in sse-motion.cc. A remote attacker can pass specially crafted video file to the application and perform a denial of service (DoS) attack.

Mitigation

Update the affected package libde265 to the latest version.

Vulnerable software versions

Ubuntu: 16.04 - 22.04

libde265-0 (Ubuntu package): before Ubuntu Pro

External links

http://ubuntu.com/security/notices/USN-6627-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Out-of-bounds write

EUVDB-ID: #VU86837

Risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-43242

CWE-ID: CWE-787 - Out-of-bounds write

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error within the mc_luma() function in motion.cc. A remote attacker pass a specially crafted video file to the application, trigger an out-of-bounds write and perform a denial of service (DoS) attack.

Mitigation

Update the affected package libde265 to the latest version.

Vulnerable software versions

Ubuntu: 16.04 - 22.04

libde265-0 (Ubuntu package): before Ubuntu Pro

External links

http://ubuntu.com/security/notices/USN-6627-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Use-after-free

EUVDB-ID: #VU86491

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-36408

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a use-after-free error in intrapred.h when decoding file using dec265. A remote attacker can pass a specially crafted file to the application and perform a denial of service (DoS) attack.


Mitigation

Update the affected package libde265 to the latest version.

Vulnerable software versions

Ubuntu: 16.04 - 22.04

libde265-0 (Ubuntu package): before Ubuntu Pro

External links

http://ubuntu.com/security/notices/USN-6627-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Reachable Assertion

EUVDB-ID: #VU86838

Risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-36409

CWE-ID: CWE-617 - Reachable Assertion

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a reachable assertion in sps.cc. A remote attacker can pass a specially crafted file to the application and crash it.

Mitigation

Update the affected package libde265 to the latest version.

Vulnerable software versions

Ubuntu: 16.04 - 22.04

libde265-0 (Ubuntu package): before Ubuntu Pro

External links

http://ubuntu.com/security/notices/USN-6627-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) Stack-based buffer overflow

EUVDB-ID: #VU86839

Risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-36410

CWE-ID: CWE-121 - Stack-based buffer overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error within the put_epel_hv_fallback() function in fallback-motion.cc. A remote attacker can pass a specially crafted file to the application, trigger a stack-based buffer overflow and perform a denial of service (DoS) attack.

Mitigation

Update the affected package libde265 to the latest version.

Vulnerable software versions

Ubuntu: 16.04 - 22.04

libde265-0 (Ubuntu package): before Ubuntu Pro

External links

http://ubuntu.com/security/notices/USN-6627-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

9) Out-of-bounds write

EUVDB-ID: #VU86840

Risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-43235

CWE-ID: CWE-787 - Out-of-bounds write

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error within the ff_hevc_put_hevc_epel_pixels_8_sse() function in sse-motion.cc. A remote attacker pass a specially crafted video file to the application, trigger an out-of-bounds write and perform a denial of service (DoS) attack.

Mitigation

Update the affected package libde265 to the latest version.

Vulnerable software versions

Ubuntu: 16.04 - 22.04

libde265-0 (Ubuntu package): before Ubuntu Pro

External links

http://ubuntu.com/security/notices/USN-6627-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

10) Out-of-bounds write

EUVDB-ID: #VU86841

Risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-43236

CWE-ID: CWE-787 - Out-of-bounds write

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error within the put_qpel_fallback(0 function in fallback-motion.cc. A remote attacker pass a specially crafted video file to the application, trigger an out-of-bounds write and perform a denial of service (DoS) attack.

Mitigation

Update the affected package libde265 to the latest version.

Vulnerable software versions

Ubuntu: 16.04 - 22.04

libde265-0 (Ubuntu package): before Ubuntu Pro

External links

http://ubuntu.com/security/notices/USN-6627-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

11) Out-of-bounds write

EUVDB-ID: #VU86842

Risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-43237

CWE-ID: CWE-787 - Out-of-bounds write

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error within the put_epel_hv_fallback() function in fallback-motion.cc. A remote attacker pass a specially crafted video file to the application, trigger an out-of-bounds write and perform a denial of service (DoS) attack.

Mitigation

Update the affected package libde265 to the latest version.

Vulnerable software versions

Ubuntu: 16.04 - 22.04

libde265-0 (Ubuntu package): before Ubuntu Pro

External links

http://ubuntu.com/security/notices/USN-6627-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

12) Out-of-bounds write

EUVDB-ID: #VU86843

Risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-43239

CWE-ID: CWE-787 - Out-of-bounds write

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error within the mc_chroma() function in motion.cc. A remote attacker pass a specially crafted video file to the application, trigger an out-of-bounds write and perform a denial of service (DoS) attack.

Mitigation

Update the affected package libde265 to the latest version.

Vulnerable software versions

Ubuntu: 16.04 - 22.04

libde265-0 (Ubuntu package): before Ubuntu Pro

External links

http://ubuntu.com/security/notices/USN-6627-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

13) Out-of-bounds write

EUVDB-ID: #VU86845

Risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-43240

CWE-ID: CWE-787 - Out-of-bounds write

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error within the ff_hevc_put_hevc_qpel_h_2_v_1_sse() function in sse-motion.cc. A remote attacker pass a specially crafted video file to the application, trigger an out-of-bounds write and perform a denial of service (DoS) attack.

Mitigation

Update the affected package libde265 to the latest version.

Vulnerable software versions

Ubuntu: 16.04 - 22.04

libde265-0 (Ubuntu package): before Ubuntu Pro

External links

http://ubuntu.com/security/notices/USN-6627-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

14) Out-of-bounds write

EUVDB-ID: #VU86846

Risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-43243

CWE-ID: CWE-787 - Out-of-bounds write

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error within the ff_hevc_put_weighted_pred_avg_8_sse() function in sse-motion.cc. A remote attacker pass a specially crafted video file to the application, trigger an out-of-bounds write and perform a denial of service (DoS) attack.

Mitigation

Update the affected package libde265 to the latest version.

Vulnerable software versions

Ubuntu: 16.04 - 22.04

libde265-0 (Ubuntu package): before Ubuntu Pro

External links

http://ubuntu.com/security/notices/USN-6627-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

15) Out-of-bounds write

EUVDB-ID: #VU86847

Risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-43248

CWE-ID: CWE-787 - Out-of-bounds write

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error within the put_weighted_pred_avg_16_fallback() function in fallback-motion.cc. A remote attacker pass a specially crafted video file to the application, trigger an out-of-bounds write and perform a denial of service (DoS) attack.

Mitigation

Update the affected package libde265 to the latest version.

Vulnerable software versions

Ubuntu: 16.04 - 22.04

libde265-0 (Ubuntu package): before Ubuntu Pro

External links

http://ubuntu.com/security/notices/USN-6627-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

16) Out-of-bounds write

EUVDB-ID: #VU86848

Risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-43252

CWE-ID: CWE-787 - Out-of-bounds write

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error within the put_epel_16_fallback() function in fallback-motion.cc. A remote attacker pass a specially crafted video file to the application, trigger an out-of-bounds write and perform a denial of service (DoS) attack.

Mitigation

Update the affected package libde265 to the latest version.

Vulnerable software versions

Ubuntu: 16.04 - 22.04

libde265-0 (Ubuntu package): before Ubuntu Pro

External links

http://ubuntu.com/security/notices/USN-6627-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

17) Out-of-bounds write

EUVDB-ID: #VU86850

Risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-43253

CWE-ID: CWE-787 - Out-of-bounds write

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error within the put_unweighted_pred_16_fallback() function in fallback-motion.cc. A remote attacker pass a specially crafted video file to the application, trigger an out-of-bounds write and perform a denial of service (DoS) attack.

Mitigation

Update the affected package libde265 to the latest version.

Vulnerable software versions

Ubuntu: 16.04 - 22.04

libde265-0 (Ubuntu package): before Ubuntu Pro

External links

http://ubuntu.com/security/notices/USN-6627-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

18) Heap-based buffer overflow

EUVDB-ID: #VU86851

Risk: High

CVSSv3.1: 7.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-1253

CWE-ID: CWE-122 - Heap-based Buffer Overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error within the read_sps_NAL() function in decctx.cc. A remote attacker can pass specially crafted video file to the application, trigger a heap-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Update the affected package libde265 to the latest version.

Vulnerable software versions

Ubuntu: 16.04 - 22.04

libde265-0 (Ubuntu package): before Ubuntu Pro

External links

http://ubuntu.com/security/notices/USN-6627-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###