{"id":58834,"date":"2024-08-12T20:49:41","date_gmt":"2024-08-12T17:49:41","guid":{"rendered":"https:\/\/packetstormsecurity.com\/files\/180046\/glsa-202408-20.txt"},"modified":"2024-08-12T20:49:41","modified_gmt":"2024-08-12T17:49:41","slug":"gentoo-linux-security-advisory-202408-20","status":"publish","type":"post","link":"https:\/\/afaghhosting.net\/blog\/gentoo-linux-security-advisory-202408-20\/","title":{"rendered":"Gentoo Linux Security Advisory 202408-20"},"content":{"rendered":"<p>&#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211;<br \/>Gentoo Linux Security Advisory GLSA 202408-20<br \/>&#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211;<br \/>https:\/\/security.gentoo.org\/<br \/>&#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211;<\/p>\n<p>Severity: Normal<br \/>Title: libde265: Multiple Vulnerabilities<br \/>Date: August 10, 2024<br \/>Bugs: #813486, #889876<br \/>ID: 202408-20<\/p>\n<p>&#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211;<\/p>\n<p>Synopsis<br \/>========<\/p>\n<p>Multiple vulnerabilities have been discovered in libde265, the worst of<br \/>which could lead to arbitrary code execution.<\/p>\n<p>Background<br \/>==========<\/p>\n<p>Open h.265 video codec implementation.<\/p>\n<p>Affected packages<br \/>=================<\/p>\n<p>Package Vulnerable Unaffected<br \/>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;- &#8212;&#8212;&#8212;&#8212; &#8212;&#8212;&#8212;&#8212;<br \/>media-libs\/libde265 &lt; 1.0.11 &gt;= 1.0.11<\/p>\n<p>Description<br \/>===========<\/p>\n<p>Multiple vulnerabilities have been discovered in libde265. Please review<br \/>the CVE identifiers referenced below for details.<\/p>\n<p>Impact<br \/>======<\/p>\n<p>Please review the referenced CVE identifiers for details.<\/p>\n<p>Workaround<br \/>==========<\/p>\n<p>There is no known workaround at this time.<\/p>\n<p>Resolution<br \/>==========<\/p>\n<p>All libde265 users should upgrade to the latest version:<\/p>\n<p># emerge &#8211;sync<br \/># emerge &#8211;ask &#8211;oneshot &#8211;verbose &#8220;&gt;=media-libs\/libde265-1.0.11&#8221;<\/p>\n<p>References<br \/>==========<\/p>\n<p>[ 1 ] CVE-2020-21594<br \/>https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-21594<br \/>[ 2 ] CVE-2020-21595<br \/>https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-21595<br \/>[ 3 ] CVE-2020-21596<br \/>https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-21596<br \/>[ 4 ] CVE-2020-21597<br \/>https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-21597<br \/>[ 5 ] CVE-2020-21598<br \/>https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-21598<br \/>[ 6 ] CVE-2020-21599<br \/>https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-21599<br \/>[ 7 ] CVE-2020-21600<br \/>https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-21600<br \/>[ 8 ] CVE-2020-21601<br \/>https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-21601<br \/>[ 9 ] CVE-2020-21602<br \/>https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-21602<br \/>[ 10 ] CVE-2020-21603<br \/>https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-21603<br \/>[ 11 ] CVE-2020-21604<br \/>https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-21604<br \/>[ 12 ] CVE-2020-21605<br \/>https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-21605<br \/>[ 13 ] CVE-2020-21606<br \/>https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-21606<br \/>[ 14 ] CVE-2021-35452<br \/>https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-35452<br \/>[ 15 ] CVE-2021-36408<br \/>https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-36408<br \/>[ 16 ] CVE-2021-36409<br \/>https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-36409<br \/>[ 17 ] CVE-2021-36410<br \/>https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-36410<br \/>[ 18 ] CVE-2021-36411<br \/>https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-36411<br \/>[ 19 ] CVE-2022-1253<br \/>https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-1253<br \/>[ 20 ] CVE-2022-43235<br \/>https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-43235<br \/>[ 21 ] CVE-2022-43236<br \/>https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-43236<br \/>[ 22 ] CVE-2022-43237<br \/>https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-43237<br \/>[ 23 ] CVE-2022-43238<br \/>https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-43238<br \/>[ 24 ] CVE-2022-43239<br \/>https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-43239<br \/>[ 25 ] CVE-2022-43240<br \/>https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-43240<br \/>[ 26 ] CVE-2022-43241<br \/>https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-43241<br \/>[ 27 ] CVE-2022-43242<br \/>https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-43242<br \/>[ 28 ] CVE-2022-43243<br \/>https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-43243<br \/>[ 29 ] CVE-2022-43244<br \/>https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-43244<br \/>[ 30 ] CVE-2022-43245<br \/>https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-43245<br \/>[ 31 ] CVE-2022-43248<br \/>https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-43248<br \/>[ 32 ] CVE-2022-43249<br \/>https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-43249<br \/>[ 33 ] CVE-2022-43250<br \/>https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-43250<br \/>[ 34 ] CVE-2022-43252<br \/>https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-43252<br \/>[ 35 ] CVE-2022-43253<br \/>https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-43253<br \/>[ 36 ] CVE-2022-47655<br \/>https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-47655<br \/>[ 37 ] CVE-2022-47664<br \/>https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-47664<br \/>[ 38 ] CVE-2022-47665<br \/>https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-47665<br \/>[ 39 ] CVE-2023-24751<br \/>https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-24751<br \/>[ 40 ] CVE-2023-24752<br \/>https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-24752<br \/>[ 41 ] CVE-2023-24754<br \/>https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-24754<br \/>[ 42 ] CVE-2023-24755<br \/>https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-24755<br \/>[ 43 ] CVE-2023-24756<br \/>https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-24756<br \/>[ 44 ] CVE-2023-24757<br \/>https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-24757<br \/>[ 45 ] CVE-2023-24758<br \/>https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-24758<br \/>[ 46 ] CVE-2023-25221<br \/>https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-25221<\/p>\n<p>Availability<br \/>============<\/p>\n<p>This GLSA and any updates to it are available for viewing at<br \/>the Gentoo Security Website:<\/p>\n<p>https:\/\/security.gentoo.org\/glsa\/202408-20<\/p>\n<p>Concerns?<br \/>=========<\/p>\n<p>Security is a primary focus of Gentoo Linux and ensuring the<br \/>confidentiality and security of our users&#8217; machines is of utmost<br \/>importance to us. Any security concerns should be addressed to<br \/>security@gentoo.org or alternatively, you may file a bug at<br \/>https:\/\/bugs.gentoo.org.<\/p>\n<p>License<br \/>=======<\/p>\n<p>Copyright 2024 Gentoo Foundation, Inc; referenced text<br \/>belongs to its owner(s).<\/p>\n<p>The contents of this document are licensed under the<br \/>Creative Commons &#8211; Attribution \/ Share Alike license.<\/p>\n<p>https:\/\/creativecommons.org\/licenses\/by-sa\/2.5<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211;Gentoo Linux Security Advisory GLSA 202408-20&#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &#8211; &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26],"tags":[],"class_list":["post-58834","post","type-post","status-publish","format-standard","hentry","category-vulnerability"],"_links":{"self":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/58834","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/comments?post=58834"}],"version-history":[{"count":0,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/58834\/revisions"}],"wp:attachment":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/media?parent=58834"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/categories?post=58834"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/tags?post=58834"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}