CVE-2024-38950

Publication date 26 June 2024

Last updated 28 July 2025


Ubuntu priority

Cvss 3 Severity Score

6.5 · Medium

Score breakdown

Heap Buffer Overflow vulnerability in Libde265 v1.0.15 allows attackers to crash the application via crafted payload to __interceptor_memcpy function.

Read the notes from the security team

Status

Package Ubuntu Release Status
libde265 25.04 plucky
Vulnerable, fix deferred
24.10 oracular Ignored end of life, was deferred [2025-07-28]
24.04 LTS noble
Vulnerable, fix deferred
23.10 mantic Ignored end of life, was deferred [2024-09-16]
22.04 LTS jammy
Vulnerable, fix deferred
20.04 LTS focal
Vulnerable, fix deferred
18.04 LTS bionic
Vulnerable, fix deferred
16.04 LTS xenial
Vulnerable, fix deferred

Notes


mdeslaur

as of 2025-07-28, there is no fix available from libde265 developers

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
libde265

Severity score breakdown

Parameter Value
Base score 6.5 · Medium
Attack vector Network
Attack complexity Low
Privileges required None
User interaction Required
Scope Unchanged
Confidentiality None
Integrity impact None
Availability impact High
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H