First published: Wed Nov 15 2023(Updated: )
GPAC v2.3-DEV-rev566-g50c2ab06f-master was discovered to contain a stack overflow via the hevc_parse_vps_extension function at /media_tools/av_parsers.c.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GPAC GPAC | =2.3-dev-rev566-g50c2ab06f-master |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-48014 is high.
The affected software of CVE-2023-48014 is GPAC v2.3-DEV-rev566-g50c2ab06f-master.
CVE-2023-48014 is a stack overflow vulnerability discovered in GPAC v2.3-DEV-rev566-g50c2ab06f-master.
To fix the CVE-2023-48014 vulnerability, update to a version of GPAC that does not contain the stack overflow vulnerability.
Yes, you can find references for CVE-2023-48014 at the following links: https://github.com/gpac/gpac/issues/2613 and https://github.com/gpac/gpac/commit/66abf0887c89c29a484d9e65e70882794e9e3a1b.