
Cloud Vulnerability DB
A community-led vulnerabilities database
Libde265 v1.0.14 was discovered to contain a global buffer overflow vulnerability in the read_coding_unit function at slice.cc. The vulnerability was identified in November 2023 and affects the open H.265 video codec implementation. The issue has been assigned a CVSS v3.1 base score of 8.8 (High) (NVD).
The vulnerability is classified as an Out-of-bounds Write (CWE-787) and Buffer Copy without Checking Size of Input (CWE-120). The issue specifically occurs in the read_coding_unit function within the slice.cc file, where a global buffer overflow was detected at address 0x7f6e8318665e, located 14 bytes to the right of the global variable 'ctxIdxMap' (GitHub Issue).
If a user or automated system were tricked into opening a specially crafted file, an attacker could potentially exploit this vulnerability to cause a denial of service or execute arbitrary code (Ubuntu Security).
The vulnerability has been fixed in various distributions including Ubuntu 23.10 (1.0.12-2ubuntu0.1), Ubuntu 22.04 LTS (1.0.8-1ubuntu0.3), Ubuntu 20.04 LTS (1.0.4-1ubuntu0.4), and other versions. Users are advised to update their systems to the latest package versions (Ubuntu Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."