
Cloud Vulnerability DB
A community-led vulnerabilities database
Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulnerability via mc_chroma
The vulnerability is a heap-buffer-overflow that occurs in the mc_chroma function within the motion.cc file. The issue manifests as a READ operation of size 2 at a memory location outside the allocated buffer bounds. The vulnerability was discovered through testing with Address Sanitizer (ASAN), which detected the buffer overflow during video file processing (GitHub Issue).
When exploited, this vulnerability allows attackers to cause a Denial of Service (DoS) by processing a specially crafted video file. The heap-buffer-overflow could potentially lead to system crashes or unpredictable behavior (Debian LTS).
Multiple distributions have released patches to address this vulnerability. Ubuntu users can update to libde265-0 version 1.0.4-1ubuntu0.2 for Ubuntu 20.04 and version 1.0.8-1ubuntu0.1 for Ubuntu 22.04. Debian users should upgrade to version 1.0.11-0+deb11u1 for the bullseye distribution (Ubuntu Notice, Debian Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."