{"id":"CVE-2020-21596","details":"libde265 v1.0.4 contains a global buffer overflow in the decode_CABAC_bit function, which can be exploited via a crafted a file.","modified":"2026-04-09T06:59:52.423079Z","published":"2021-09-16T22:15:07.743Z","related":["MGASA-2023-0093"],"references":[{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2023/01/msg00020.html"},{"type":"ADVISORY","url":"https://www.debian.org/security/2023/dsa-5346"},{"type":"REPORT","url":"https://github.com/strukturag/libde265/issues/236"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/strukturag/libde265","events":[{"introduced":"0"},{"last_affected":"d065715fb8792f1559787bdd79c3a5b5a5f9e9a9"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"1.0.4"}]}}],"versions":["v0.1","v0.2","v0.3","v0.4","v0.5","v1.0.0","v1.0.3","v1.0.4"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-21596.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"10.0"}]},{"events":[{"introduced":"0"},{"last_affected":"11.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}