CVE-2023-48368

NameCVE-2023-48368
DescriptionImproper input validation in Intel(R) Media SDK software all versions may allow an authenticated user to potentially enable denial of service via local access.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1082866, 1082867

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
intel-mediasdk (PTS)bullseye21.1.0-1vulnerable
sid, trixie, bookworm22.5.4-1vulnerable
onevpl (PTS)bookworm2023.1.1-1vulnerable
sid, trixie1:2.13.0-1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
intel-mediasdksource(unstable)(unfixed)1082866
onevplsource(unstable)(unfixed)1082867

Notes

[bookworm] - intel-mediasdk <ignored> (No specific details published, development stalled and scheduled for removal from Debian)
[bookworm] - onevpl <no-dsa> (Minor issue)
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00935.html

Search for package or bug name: Reporting problems