First published: Thu Feb 09 2023(Updated: )
Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to V2.1.0-DEV.
Credit: security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
GPAC GPAC | <2.2.0 | |
debian/gpac | <=0.5.2-426-gc5ad4e4+dfsg5-5<=2.2.1+dfsg1-3 | 1.0.1+dfsg1-4+deb11u3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-0760.
The severity of CVE-2023-0760 is high (7.8).
The affected software for CVE-2023-0760 is GPAC.
To fix CVE-2023-0760, update to version 2.1.0-DEV or later for gpac/gpac, or apply the recommended security patches for the Debian package.
You can find more information about CVE-2023-0760 on the GitHub repository for gpac/gpac and the Debian security advisory DSA-5452.