CVE-2023-0760 – Heap-based Buffer Overflow in gpac/gpac
https://notcve.org/view.php?id=CVE-2023-0760
Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to V2.1.0-DEV. • https://github.com/gpac/gpac/commit/ea7395f39f601a7750d48d606e9d10ea0b7beefe https://huntr.dev/bounties/d06223df-a473-4c82-96d0-23726b844b21 https://www.debian.org/security/2023/dsa-5452 • CWE-122: Heap-based Buffer Overflow CWE-787: Out-of-bounds Write •
CVE-2023-0770 – Stack-based Buffer Overflow in gpac/gpac
https://notcve.org/view.php?id=CVE-2023-0770
Stack-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.2. • https://github.com/gpac/gpac/commit/c31941822ee275a35bc148382bafef1c53ec1c26 https://huntr.dev/bounties/e0fdeee5-7909-446e-9bd0-db80fd80e8dd https://www.debian.org/security/2023/dsa-5411 • CWE-121: Stack-based Buffer Overflow CWE-787: Out-of-bounds Write •
CVE-2023-23144
https://notcve.org/view.php?id=CVE-2023-23144
Integer overflow vulnerability in function Q_DecCoordOnUnitSphere file bifs/unquantize.c in GPAC version 2.2-rev0-gab012bbfb-master. • https://github.com/gpac/gpac/commit/3a2458a49b3e6399709d456d7b35e7a6f50cfb86 https://www.debian.org/security/2023/dsa-5411 • CWE-190: Integer Overflow or Wraparound •
CVE-2023-23145
https://notcve.org/view.php?id=CVE-2023-23145
GPAC version 2.2-rev0-gab012bbfb-master was discovered to contain a memory leak in lsr_read_rare_full function. • https://github.com/gpac/gpac/commit/4ade98128cbc41d5115b97a41ca2e59529c8dd5f https://www.debian.org/security/2023/dsa-5411 • CWE-401: Missing Release of Memory after Effective Lifetime •
CVE-2023-0358 – Use After Free in gpac/gpac
https://notcve.org/view.php?id=CVE-2023-0358
Use After Free in GitHub repository gpac/gpac prior to 2.3.0-DEV. Use After Free en el repositorio de GitHub gpac/gpac anterior a 2.3.0-DEV. • https://github.com/gpac/gpac/commit/9971fb125cf91cefd081a080c417b90bbe4a467b https://huntr.dev/bounties/93e128ed-253f-4c42-81ff-fbac7fd8f355 • CWE-416: Use After Free •