First published: Mon Feb 13 2023(Updated: )
Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to v2.3.0-DEV.
Credit: security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
GPAC GPAC | <2.3.0-dev | |
debian/gpac | <=0.5.2-426-gc5ad4e4+dfsg5-5 | 1.0.1+dfsg1-4+deb11u3 2.2.1+dfsg1-3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-0819 is a vulnerability in the GitHub repository gpac/gpac prior to v2.3.0-DEV, which allows for a heap-based buffer overflow.
CVE-2023-0819 has a severity level of 7.8 (high).
The Debian package gpac (versions 0.5.2-426-gc5ad4e4+dfsg5-5, 1.0.1+dfsg1-4+deb11u3, 2.2.1+dfsg1-3) and GPAC version up to exclusive 2.3.0-dev are affected by CVE-2023-0819.
To fix CVE-2023-0819, update the affected software to version v2.3.0-DEV or later.
You can find more information about CVE-2023-0819 in the following references: [GitHub Commit](https://github.com/gpac/gpac/commit/d067ab3ccdeaa340e8c045a0fd5bcfc22b809e8f), [Huntr Bounty](https://huntr.dev/bounties/35793610-dccc-46c8-9f55-6a24c621e4ef), [Debian Security Advisory](https://www.debian.org/security/2023/dsa-5411).