libgpac.so is vulnerable to denial of service. The vulnerability exists due to the integer overflow in the lsr_translate_coords
function of lsr_dec.c
, allowing an attacker to cause an application crash by providing a maliciously crafted input.
CPE | Name | Operator | Version |
---|---|---|---|
libgpac.so | le | 10.1.0 | |
libgpac.so | le | 10.1.0 | |
gpac:bullseye | eq | 0.7.1+dfsg1-4 |
drive.google.com/file/d/1HVWa6IpAbvsMS5rx091RfjUB4GfXrMLE/view
github.com/advisories/GHSA-9c76-9w8w-mhgx
github.com/gpac/gpac/commit/b3d821c4ae9ba62b3a194d9dcb5e99f17bd56908
github.com/gpac/gpac/commit/faa75edde3dfeba1e2cf6ffa48e45a50f1042096
github.com/gpac/gpac/issues/2213
github.com/gpac/gpac/issues/2333
vuldb.com/?id.214518
www.debian.org/security/2023/dsa-5411