CVE-2023-1449

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-1449
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-1449.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-1449
Related
Published
2023-03-17T07:15:12Z
Modified
2024-09-11T04:57:10.022693Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

A vulnerability has been found in GPAC 2.3-DEV-rev35-gbbca86917-master and classified as problematic. This vulnerability affects the function gfav1resetstate of the file mediatools/av_parsers.c. The manipulation leads to double free. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. VDB-223294 is the identifier assigned to this vulnerability.

References

Affected packages

Debian:11 / gpac

Package

Name
gpac
Purl
pkg:deb/debian/gpac?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.0.1+dfsg1-4+deb11u2

Affected versions

1.*

1.0.1+dfsg1-4
1.0.1+dfsg1-4+deb11u1

Ecosystem specific

{
    "urgency": "not yet assigned"
}