Debian Package Tracker
Register | Log in
Subscribe

intel-mediasdk

Choose email to subscribe with

general
  • source: intel-mediasdk (main)
  • version: 22.5.4-1
  • maintainer: Timo Aaltonen (DMD)
  • arch: amd64
  • std-ver: 4.5.0
  • VCS: Git (Browse)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • oldstable: 21.1.0-1
  • stable: 22.5.4-1
versioned links
  • 21.1.0-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 22.5.4-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • libmfx-dev
  • libmfx-tools
  • libmfx1
package is gone
This package is not in any development repository. This probably means that the package has been removed (or has been renamed). Thus the information here is of little interest ... the package is going to disappear unless someone takes it over and reintroduces it.
action needed
6 security issues in sid high

There are 6 open security issues in sid.

6 important issues:
  • CVE-2023-22656: Out-of-bounds read in Intel(R) Media SDK and some Intel(R) oneVPL software before version 23.3.5 may allow an authenticated user to potentially enable escalation of privilege via local access.
  • CVE-2023-45221: Improper buffer restrictions in Intel(R) Media SDK all versions may allow an authenticated user to potentially enable escalation of privilege via local access.
  • CVE-2023-47169: Improper buffer restrictions in Intel(R) Media SDK software all versions may allow an authenticated user to potentially enable denial of service via local access.
  • CVE-2023-47282: Out-of-bounds write in Intel(R) Media SDK all versions and some Intel(R) oneVPL software before version 23.3.5 may allow an authenticated user to potentially enable escalation of privilege via local access.
  • CVE-2023-48368: Improper input validation in Intel(R) Media SDK software all versions may allow an authenticated user to potentially enable denial of service via local access.
  • CVE-2023-48727: NULL pointer dereference in some Intel(R) oneVPL software before version 23.3.5 may allow an authenticated user to potentially enable information disclosure via local access.
Created: 2024-09-19 Last update: 2024-10-28 22:00
6 security issues in trixie high

There are 6 open security issues in trixie.

6 important issues:
  • CVE-2023-22656: Out-of-bounds read in Intel(R) Media SDK and some Intel(R) oneVPL software before version 23.3.5 may allow an authenticated user to potentially enable escalation of privilege via local access.
  • CVE-2023-45221: Improper buffer restrictions in Intel(R) Media SDK all versions may allow an authenticated user to potentially enable escalation of privilege via local access.
  • CVE-2023-47169: Improper buffer restrictions in Intel(R) Media SDK software all versions may allow an authenticated user to potentially enable denial of service via local access.
  • CVE-2023-47282: Out-of-bounds write in Intel(R) Media SDK all versions and some Intel(R) oneVPL software before version 23.3.5 may allow an authenticated user to potentially enable escalation of privilege via local access.
  • CVE-2023-48368: Improper input validation in Intel(R) Media SDK software all versions may allow an authenticated user to potentially enable denial of service via local access.
  • CVE-2023-48727: NULL pointer dereference in some Intel(R) oneVPL software before version 23.3.5 may allow an authenticated user to potentially enable information disclosure via local access.
Created: 2024-09-19 Last update: 2024-10-09 12:01
No known security issue in bookworm wishlist

There are 10 open security issues in bookworm.

10 ignored issues:
  • CVE-2023-22656: Out-of-bounds read in Intel(R) Media SDK and some Intel(R) oneVPL software before version 23.3.5 may allow an authenticated user to potentially enable escalation of privilege via local access.
  • CVE-2023-45221: Improper buffer restrictions in Intel(R) Media SDK all versions may allow an authenticated user to potentially enable escalation of privilege via local access.
  • CVE-2023-47169: Improper buffer restrictions in Intel(R) Media SDK software all versions may allow an authenticated user to potentially enable denial of service via local access.
  • CVE-2023-47282: Out-of-bounds write in Intel(R) Media SDK all versions and some Intel(R) oneVPL software before version 23.3.5 may allow an authenticated user to potentially enable escalation of privilege via local access.
  • CVE-2023-48368: Improper input validation in Intel(R) Media SDK software all versions may allow an authenticated user to potentially enable denial of service via local access.
  • CVE-2023-48727: NULL pointer dereference in some Intel(R) oneVPL software before version 23.3.5 may allow an authenticated user to potentially enable information disclosure via local access.
  • CVE-2024-21783: Integer overflow for some Intel(R) VPL software before version 24.1.4 may allow an authenticated user to potentially enable escalation of privilege via local access.
  • CVE-2024-21808: Improper buffer restrictions in some Intel(R) VPL software before version 24.1.4 may allow an authenticated user to potentially enable escalation of privilege via local access.
  • CVE-2024-28030: NULL pointer dereference in some Intel(R) VPL software before version 24.1.4 may allow an authenticated user to potentially enable denial of service via local access.
  • CVE-2024-28051: Out-of-bounds read in some Intel(R) VPL software before version 24.1.4 may allow an authenticated user to potentially enable information disclosure via local access.
Created: 2024-09-19 Last update: 2025-02-27 05:02
news
[rss feed]
  • [2024-10-28] Removed 22.5.4-1 from unstable (Debian FTP Masters)
  • [2024-10-18] intel-mediasdk REMOVED from testing (Debian testing watch)
  • [2022-10-23] intel-mediasdk 22.5.4-1 MIGRATED to testing (Debian testing watch)
  • [2022-10-18] Accepted intel-mediasdk 22.5.4-1 (source) into unstable (Timo Aaltonen)
  • [2022-04-09] intel-mediasdk 22.3.0-1 MIGRATED to testing (Debian testing watch)
  • [2022-04-09] intel-mediasdk 22.3.0-1 MIGRATED to testing (Debian testing watch)
  • [2022-04-04] Accepted intel-mediasdk 22.3.0-1 (source) into unstable (Timo Aaltonen)
  • [2022-01-12] intel-mediasdk 22.1.0-1 MIGRATED to testing (Debian testing watch)
  • [2022-01-07] Accepted intel-mediasdk 22.1.0-1 (source) into unstable (Timo Aaltonen)
  • [2021-10-03] intel-mediasdk 21.3.4-1 MIGRATED to testing (Debian testing watch)
  • [2021-09-28] Accepted intel-mediasdk 21.3.4-1 (source) into unstable (Timo Aaltonen)
  • [2021-09-04] intel-mediasdk 21.3.2-1 MIGRATED to testing (Debian testing watch)
  • [2021-08-30] Accepted intel-mediasdk 21.3.2-1 (source) into unstable (Timo Aaltonen)
  • [2021-02-02] intel-mediasdk 21.1.0-1 MIGRATED to testing (Debian testing watch)
  • [2021-01-28] Accepted intel-mediasdk 21.1.0-1 (source) into unstable (Timo Aaltonen)
  • [2020-10-21] intel-mediasdk 20.3.0-1 MIGRATED to testing (Debian testing watch)
  • [2020-10-16] Accepted intel-mediasdk 20.3.0-1 (source) into unstable (Timo Aaltonen)
  • [2020-01-28] intel-mediasdk 19.4.0-1 MIGRATED to testing (Debian testing watch)
  • [2020-01-22] Accepted intel-mediasdk 19.4.0-1 (source) into unstable (Timo Aaltonen)
  • [2019-09-05] Accepted intel-mediasdk 19.2.1-1 (source amd64) into unstable, unstable (Timo Aaltonen)
  • [2019-09-05] Accepted intel-mediasdk 18.4.1-1 (source amd64) into unstable, unstable (Timo Aaltonen)
bugs [bug history graph]
  • all: 0
links
  • homepage
  • buildd: logs, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing