CVE-2022-2453 – Use After Free in gpac/gpac
https://notcve.org/view.php?id=CVE-2022-2453
Use After Free in GitHub repository gpac/gpac prior to 2.1-DEV. Un Uso de Memoria Previamente Liberada en el repositorio de GitHub gpac/gpac versiones anteriores a 2.1-DEV. • https://github.com/gpac/gpac/commit/dc7de8d3d604426c7a6e628d90cb9fb88e7b4c2c https://huntr.dev/bounties/c8c964de-046a-41b2-9ff5-e25cfdb36b5a • CWE-416: Use After Free •
CVE-2022-2454 – Integer Overflow or Wraparound in gpac/gpac
https://notcve.org/view.php?id=CVE-2022-2454
Integer Overflow or Wraparound in GitHub repository gpac/gpac prior to 2.1-DEV. Un Desbordamiento de Enteros o Wraparound en el repositorio de GitHub gpac/gpac versiones anteriores a 2.1-DEV. • https://github.com/gpac/gpac/commit/faa75edde3dfeba1e2cf6ffa48e45a50f1042096 https://huntr.dev/bounties/105d40d0-46d7-461e-9f8e-20c4cdea925f https://www.debian.org/security/2023/dsa-5411 • CWE-190: Integer Overflow or Wraparound •
CVE-2022-30976
https://notcve.org/view.php?id=CVE-2022-30976
GPAC 2.0.0 misuses a certain Unicode utf8_wcslen (renamed gf_utf8_wcslen) function in utils/utf.c, resulting in a heap-based buffer over-read, as demonstrated by MP4Box. GPAC 2.0.0, usa de forma incorrecta una función Unicode utf8_wcslen (renombrada gf_utf8_wcslen) en el archivo utils/utf.c, resultando en una lectura excesiva del búfer en la región heap de la memoria, como ha sido demostrado en MP4Box • https://github.com/gpac/gpac/blob/105d67985ff3c3f4b98a98f312e3d84ae77a4463/share/doc/man/gpac.1#L2226-L2229 https://github.com/gpac/gpac/blob/105d67985ff3c3f4b98a98f312e3d84ae77a4463/src/utils/utf.c#L35-L59 https://github.com/gpac/gpac/issues/2179 • CWE-125: Out-of-bounds Read •
CVE-2022-1795 – Use After Free in gpac/gpac
https://notcve.org/view.php?id=CVE-2022-1795
Use After Free in GitHub repository gpac/gpac prior to v2.1.0-DEV. Un Uso de Memoria Previamente Liberada en el repositorio de GitHub gpac/gpac versiones anteriores a v2.1.0-DEV • https://github.com/gpac/gpac/commit/c535bad50d5812d27ee5b22b54371bddec411514 https://huntr.dev/bounties/9c312763-41a6-4fc7-827b-269eb86efcbc https://www.debian.org/security/2023/dsa-5411 • CWE-416: Use After Free •
CVE-2022-29340
https://notcve.org/view.php?id=CVE-2022-29340
GPAC 2.1-DEV-rev87-g053aae8-master. has a Null Pointer Dereference vulnerability in gf_isom_parse_movie_boxes_internal due to improper return value handling of GF_SKIP_BOX, which causes a Denial of Service. This vulnerability was fixed in commit 37592ad. GPAC versión 2.1-DEV-rev87-g053aae8-master. presenta una vulnerabilidad de Desreferencia de Puntero Null en gf_isom_parse_movie_boxes_internal debido a un manejo inapropiado del valor de retorno de GF_SKIP_BOX, que causa una Denegación de Servicio. Esta vulnerabilidad fue corregida en el commit 37592ad • https://github.com/gpac/gpac/commit/37592ad86c6ca934d34740012213e467acc4a3b0 https://github.com/gpac/gpac/issues/2163 • CWE-476: NULL Pointer Dereference •