First published: Tue Nov 29 2022(Updated: )
A vulnerability, which was classified as problematic, was found in GPAC 2.1-DEV-rev490-g68064e101-master. Affected is the function lsr_translate_coords of the file laser/lsr_dec.c. The manipulation leads to integer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The name of the patch is b3d821c4ae9ba62b3a194d9dcb5e99f17bd56908. It is recommended to apply a patch to fix this issue. VDB-214518 is the identifier assigned to this vulnerability.
Credit: cna@vuldb.com cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/gpac | <=0.5.2-426-gc5ad4e4+dfsg5-5<=2.2.1+dfsg1-3 | 1.0.1+dfsg1-4+deb11u3 |
GPAC GPAC | =2.1-dev-rev490-g68064e101-master | |
=2.1-dev-rev490-g68064e101-master |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-4202 is high with a severity value of 8.8.
CVE-2022-4202 affects GPAC 2.1-DEV-rev490-g68064e101-master.
CVE-2022-4202 is an integer overflow vulnerability found in GPAC 2.1-DEV-rev490-g68064e101-master, specifically in the function lsr_translate_coords of the file laser/lsr_dec.c. The vulnerability can be exploited remotely.
To fix CVE-2022-4202, update GPAC to version 1.0.1+dfsg1-4+deb11u3 or apply the appropriate patches from the GPAC GitHub repository.
You can find more information about CVE-2022-4202 in the provided references: [link 1](https://drive.google.com/file/d/1HVWa6IpAbvsMS5rx091RfjUB4GfXrMLE/view), [link 2](https://github.com/gpac/gpac/commit/b3d821c4ae9ba62b3a194d9dcb5e99f17bd56908), [link 3](https://github.com/gpac/gpac/issues/2333).