Discover Security Vulnerabilities News
GPAC DoS, Code Execution Flaws Fixed
Multiple severe security issues were discovered in the GPAC multimedia framework, including a heap-based Buffer Overflow in the GitHub repository gpac/gpac before V2.1.0-DEV (CVE-2023-0760) and a NULL Pointer Dereference in the GitHub repository gpac/gpac before 2.2.2 (CVE-2023-3012). These vulnerabilities have received a National Vulnerability Database base score of 7.8 out of 10 (“High” severity).
These bugs could result in denial of service (DoS) or the execution of arbitrary code.
A GPAC security update has been released that addresses these flaws. We strongly recommend that all impacted users apply the GPAC updates issued by their distro(s) as soon as possible to protect the security and availability of their systems.
To stay on top of essential updates released by the open-source programs and applications you use, register as a LinuxSecurity user, subscribe to our Linux Advisory Watch newsletter, and customize your advisories for your distro(s). This will enable you to stay up-to-date on the latest, most significant issues impacting the security of your systems.
Follow @LS_Advisories on Twitter for real-time updates on advisories for your distro(s).