{"id":"ALPINE-CVE-2022-43245","details":"Libde265 v1.0.8 was discovered to contain a segmentation violation via apply_sao_internal\u003cunsigned short\u003e in sao.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file.","modified":"2025-12-03T22:50:52.140809Z","published":"2022-11-02T14:15:14.123Z","upstream":["CVE-2022-43245"],"references":[{"type":"ADVISORY","url":"https://security.alpinelinux.org/vuln/CVE-2022-43245"}],"affected":[{"package":{"name":"libde265","ecosystem":"Alpine:v3.14","purl":"pkg:apk/alpine/libde265?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.0.11-r0"}]}],"versions":["1.0.3-r0","1.0.4-r0","1.0.8-r0","1.0.8-r1","1.0.8-r2"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/alpine/ALPINE-CVE-2022-43245.json"}},{"package":{"name":"libde265","ecosystem":"Alpine:v3.15","purl":"pkg:apk/alpine/libde265?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.0.11-r0"}]}],"versions":["1.0.3-r0","1.0.4-r0","1.0.8-r0","1.0.8-r1","1.0.8-r2"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/alpine/ALPINE-CVE-2022-43245.json"}},{"package":{"name":"libde265","ecosystem":"Alpine:v3.16","purl":"pkg:apk/alpine/libde265?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.0.11-r0"}]}],"versions":["1.0.3-r0","1.0.4-r0","1.0.8-r0","1.0.8-r1","1.0.8-r2"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/alpine/ALPINE-CVE-2022-43245.json"}},{"package":{"name":"libde265","ecosystem":"Alpine:v3.17","purl":"pkg:apk/alpine/libde265?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.0.11-r0"}]}],"versions":["1.0.3-r0","1.0.4-r0","1.0.8-r0","1.0.8-r1","1.0.8-r2","1.0.9-r0"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/alpine/ALPINE-CVE-2022-43245.json"}},{"package":{"name":"libde265","ecosystem":"Alpine:v3.18","purl":"pkg:apk/alpine/libde265?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.0.11-r0"}]}],"versions":["1.0.3-r0","1.0.4-r0","1.0.8-r0","1.0.8-r1","1.0.8-r2","1.0.9-r0"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/alpine/ALPINE-CVE-2022-43245.json"}},{"package":{"name":"libde265","ecosystem":"Alpine:v3.19","purl":"pkg:apk/alpine/libde265?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.0.11-r0"}]}],"versions":["1.0.3-r0","1.0.4-r0","1.0.8-r0","1.0.8-r1","1.0.8-r2","1.0.9-r0"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/alpine/ALPINE-CVE-2022-43245.json"}},{"package":{"name":"libde265","ecosystem":"Alpine:v3.20","purl":"pkg:apk/alpine/libde265?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.0.11-r0"}]}],"versions":["1.0.3-r0","1.0.4-r0","1.0.8-r0","1.0.8-r1","1.0.8-r2","1.0.9-r0"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/alpine/ALPINE-CVE-2022-43245.json"}},{"package":{"name":"libde265","ecosystem":"Alpine:v3.21","purl":"pkg:apk/alpine/libde265?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.0.11-r0"}]}],"versions":["1.0.3-r0","1.0.4-r0","1.0.8-r0","1.0.8-r1","1.0.8-r2","1.0.9-r0"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/alpine/ALPINE-CVE-2022-43245.json"}},{"package":{"name":"libde265","ecosystem":"Alpine:v3.22","purl":"pkg:apk/alpine/libde265?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.0.11-r0"}]}],"versions":["1.0.3-r0","1.0.4-r0","1.0.8-r0","1.0.8-r1","1.0.8-r2","1.0.9-r0"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/alpine/ALPINE-CVE-2022-43245.json"}},{"package":{"name":"libde265","ecosystem":"Alpine:v3.23","purl":"pkg:apk/alpine/libde265?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.0.11-r0"}]}],"versions":["1.0.3-r0","1.0.4-r0","1.0.8-r0","1.0.8-r1","1.0.8-r2","1.0.9-r0"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/alpine/ALPINE-CVE-2022-43245.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}