Source: intel-mediasdk
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerabilities were published for intel-mediasdk.

CVE-2023-22656[0]:
| Out-of-bounds read in Intel(R) Media SDK and some Intel(R) oneVPL
| software before version 23.3.5 may allow an authenticated user to
| potentially enable escalation of privilege via local access.

CVE-2023-45221[1]:
| Improper buffer restrictions in Intel(R) Media SDK all versions may
| allow an authenticated user to potentially enable escalation of
| privilege via local access.

CVE-2023-47169[2]:
| Improper buffer restrictions in Intel(R) Media SDK software all
| versions may allow an authenticated user to potentially enable
| denial of service via local access.

CVE-2023-47282[3]:
| Out-of-bounds write in Intel(R) Media SDK all versions and some
| Intel(R) oneVPL software before version 23.3.5 may allow an
| authenticated user to potentially enable escalation of privilege via
| local access.

CVE-2023-48368[4]:
| Improper input validation in Intel(R) Media SDK software all
| versions may allow an authenticated user to potentially enable
| denial of service via local access.

CVE-2023-48727[5]:
| NULL pointer dereference in some Intel(R) oneVPL software before
| version 23.3.5 may allow an authenticated user to potentially enable
| information disclosure via local access.

Sadly there's no specific information, just the very high level advisory
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00935.html


If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-22656
    https://www.cve.org/CVERecord?id=CVE-2023-22656
[1] https://security-tracker.debian.org/tracker/CVE-2023-45221
    https://www.cve.org/CVERecord?id=CVE-2023-45221
[2] https://security-tracker.debian.org/tracker/CVE-2023-47169
    https://www.cve.org/CVERecord?id=CVE-2023-47169
[3] https://security-tracker.debian.org/tracker/CVE-2023-47282
    https://www.cve.org/CVERecord?id=CVE-2023-47282
[4] https://security-tracker.debian.org/tracker/CVE-2023-48368
    https://www.cve.org/CVERecord?id=CVE-2023-48368
[5] https://security-tracker.debian.org/tracker/CVE-2023-48727
    https://www.cve.org/CVERecord?id=CVE-2023-48727

Please adjust the affected versions in the BTS as needed.

Reply via email to