Headline
Debian Security Advisory 5452-1
Debian Linux Security Advisory 5452-1 - Multiple security issues were discovered in the GPAC multimedia framework which could result in denial of service or the execution of arbitrary code.
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Debian Security Advisory DSA-5452-1 [email protected]
https://www.debian.org/security/ Moritz Muehlenhoff
July 14, 2023 https://www.debian.org/security/faq
Package : gpac
CVE ID : CVE-2023-0760 CVE-2023-3012 CVE-2023-3291
Multiple security issues were discovered in the GPAC multimedia
framework which could result in denial of service or the execution of
arbitrary code.
For the oldstable distribution (bullseye), these problems have been fixed
in version 1.0.1+dfsg1-4+deb11u3.
We recommend that you upgrade your gpac packages.
For the detailed security status of gpac please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/gpac
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: [email protected]
-----BEGIN PGP SIGNATURE-----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=EqN0
-----END PGP SIGNATURE-----
Related news
Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.2.2.
NULL Pointer Dereference in GitHub repository gpac/gpac prior to 2.2.2.
Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to V2.1.0-DEV.