CVE-2022-1253

NameCVE-2022-1253
DescriptionHeap-based Buffer Overflow in GitHub repository strukturag/libde265 prior to and including 1.0.8. The fix is established in commit 8e89fe0e175d2870c39486fdd09250b230ec10b8 but does not yet belong to an official release.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-5346-1
Debian Bugs1014977

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libde265 (PTS)jessie0.9-1vulnerable
stretch (lts), stretch1.0.11-0+deb9u6fixed
buster (security), buster, buster (lts)1.0.11-0+deb10u6fixed
bullseye1.0.11-0+deb11u3fixed
bullseye (security)1.0.11-0+deb11u1fixed
bookworm1.0.11-1+deb12u2fixed
sid, trixie1.0.15-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libde265sourcejessie(unfixed)end-of-life
libde265sourcestretch(not affected)
libde265sourcebuster(not affected)
libde265sourcebullseye1.0.11-0+deb11u1DSA-5346-1
libde265source(unstable)1.0.8-1.11014977

Notes

[buster] - libde265 <not-affected> (Vulnerable code introduced later)
[stretch] - libde265 <not-affected> (Vulnerable code introduced later)
https://huntr.dev/bounties/1-other-strukturag/libde265/
https://github.com/strukturag/libde265/commit/8e89fe0e175d2870c39486fdd09250b230ec10b8

Search for package or bug name: Reporting problems