Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2023-3012: fixed #2480 · gpac/gpac@53387aa

NULL Pointer Dereference in GitHub repository gpac/gpac prior to 2.2.2.

CVE
#git

Expand Up

@@ -704,6 +704,8 @@ static void xml_sax_parse_entity(GF_SAXParser *parser)

}

}

if (ent_name) gf_free(ent_name);

if (ent && !ent->value)

parser->sax_state = SAX_STATE_SYNTAX_ERROR;

xml_sax_store_text(parser, i);

}

Expand Down Expand Up

@@ -968,7 +970,7 @@ static GF_Err xml_sax_parse(GF_SAXParser *parser, Bool force_parse)

static GF_Err xml_sax_append_string(GF_SAXParser *parser, char *string)

{

u32 size = parser->line_size;

u32 nl_size = (u32) strlen(string);

u32 nl_size = string ? (u32) strlen(string) : 0;

if (!nl_size) return GF_OK;

Expand Down

Related news

Debian Security Advisory 5452-1

Debian Linux Security Advisory 5452-1 - Multiple security issues were discovered in the GPAC multimedia framework which could result in denial of service or the execution of arbitrary code.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907