UBUNTU-CVE-2023-48727

Source
https://ubuntu.com/security/CVE-2023-48727
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-48727.json
JSON Data
https://api.test.osv.dev/v1/vulns/UBUNTU-CVE-2023-48727
Related
Published
2024-05-16T21:16:00Z
Modified
2024-11-20T12:28:39Z
Summary
[none]
Details

NULL pointer dereference in some Intel(R) oneVPL software before version 23.3.5 may allow an authenticated user to potentially enable information disclosure via local access.

References

Affected packages

Ubuntu:22.04:LTS / onevpl

Package

Name
onevpl
Purl
pkg:deb/ubuntu/onevpl?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2022.*

2022.0.4-1
2022.1.0-2

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "This is rated low severity by Intel"
}

Ubuntu:24.10 / onevpl

Package

Name
onevpl
Purl
pkg:deb/ubuntu/onevpl?arch=src?distro=oracular

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2023.*

2023.3.0-1build1

1:2.*

1:2.13.0-1

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "This is rated low severity by Intel"
}

Ubuntu:24.04:LTS / onevpl

Package

Name
onevpl
Purl
pkg:deb/ubuntu/onevpl?arch=src?distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2023.*

2023.3.0-1
2023.3.0-1build1

Ecosystem specific

{
    "ubuntu_priority": "low",
    "priority_reason": "This is rated low severity by Intel"
}