First published: Thu Feb 09 2023(Updated: )
Stack-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.2.
Credit: security@huntr.dev security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
debian/gpac | <=0.5.2-426-gc5ad4e4+dfsg5-5<=2.2.1+dfsg1-3 | 1.0.1+dfsg1-4+deb11u3 |
GPAC | <2.2.0 | |
Debian Debian Linux | =11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this vulnerability is CVE-2023-0770.
The severity of CVE-2023-0770 is high with a CVSS score of 7.8.
The affected software for CVE-2023-0770 is GPAC prior to version 2.2.
To fix CVE-2023-0770, update GPAC to version 2.2 or later.
Yes, you can find references for CVE-2023-0770 at the following links: [Link 1](https://github.com/gpac/gpac/commit/c31941822ee275a35bc148382bafef1c53ec1c26), [Link 2](https://huntr.dev/bounties/e0fdeee5-7909-446e-9bd0-db80fd80e8dd), [Link 3](https://www.debian.org/security/2023/dsa-5411).