Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-22678

Опубликовано: 12 окт. 2021
Источник: debian

Описание

An issue was discovered in gpac 0.8.0. The gf_media_nalu_remove_emulation_bytes function in av_parsers.c has a heap-based buffer overflow which can lead to a denial of service (DOS) via a crafted input.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
gpacfixed1.0.1+dfsg1-2package
gpacignoredbusterpackage
gpacend-of-lifestretchpackage

Примечания

  • https://github.com/gpac/gpac/issues/1339

  • https://github.com/gpac/gpac/commit/7644478ecfa25fd9505ee11ef12deb475cd97025

  • https://github.com/gpac/gpac/commit/524e2bbdb294d5aa4c84bf83db4d328a588b55f7

  • Commit 7644478ecf depends on part of 524e2bbdb2 (specifically, the second hunk of the change to src/isomedia/avc_ext.c)

Связанные уязвимости

CVSS3: 5.5
ubuntu
больше 4 лет назад

An issue was discovered in gpac 0.8.0. The gf_media_nalu_remove_emulation_bytes function in av_parsers.c has a heap-based buffer overflow which can lead to a denial of service (DOS) via a crafted input.

CVSS3: 5.5
nvd
больше 4 лет назад

An issue was discovered in gpac 0.8.0. The gf_media_nalu_remove_emulation_bytes function in av_parsers.c has a heap-based buffer overflow which can lead to a denial of service (DOS) via a crafted input.

github
больше 3 лет назад

An issue was discovered in gpac 0.8.0. The gf_media_nalu_remove_emulation_bytes function in av_parsers.c has a heap-based buffer overflow which can lead to a denial of service (DOS) via a crafted input.