CVE-2023-23145
https://notcve.org/view.php?id=CVE-2023-23145
GPAC version 2.2-rev0-gab012bbfb-master was discovered to contain a memory leak in lsr_read_rare_full function. • https://github.com/gpac/gpac/commit/4ade98128cbc41d5115b97a41ca2e59529c8dd5f https://www.debian.org/security/2023/dsa-5411 • CWE-401: Missing Release of Memory after Effective Lifetime •
CVE-2023-0358 – Use After Free in gpac/gpac
https://notcve.org/view.php?id=CVE-2023-0358
Use After Free in GitHub repository gpac/gpac prior to 2.3.0-DEV. Use After Free en el repositorio de GitHub gpac/gpac anterior a 2.3.0-DEV. • https://github.com/gpac/gpac/commit/9971fb125cf91cefd081a080c417b90bbe4a467b https://huntr.dev/bounties/93e128ed-253f-4c42-81ff-fbac7fd8f355 • CWE-416: Use After Free •
CVE-2022-47653
https://notcve.org/view.php?id=CVE-2022-47653
GPAC MP4box 2.1-DEV-rev593-g007bf61a0 is vulnerable to Buffer Overflow in eac3_update_channels function of media_tools/av_parsers.c:9113 • https://github.com/gpac/gpac/issues/2349 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •
CVE-2022-47657
https://notcve.org/view.php?id=CVE-2022-47657
GPAC MP4Box 2.1-DEV-rev644-g5c4df2a67 is vulnerable to buffer overflow in function hevc_parse_vps_extension of media_tools/av_parsers.c:7662 • https://github.com/gpac/gpac/issues/2355 https://www.debian.org/security/2023/dsa-5411 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •
CVE-2022-47659
https://notcve.org/view.php?id=CVE-2022-47659
GPAC MP4box 2.1-DEV-rev644-g5c4df2a67 is vulnerable to Buffer Overflow in gf_bs_read_data • https://github.com/gpac/gpac/issues/2354 https://www.debian.org/security/2023/dsa-5411 • CWE-787: Out-of-bounds Write •