Security
Headlines
HeadlinesLatestCVEs

Headline

Debian Security Advisory 5452-1

Debian Linux Security Advisory 5452-1 - Multiple security issues were discovered in the GPAC multimedia framework which could result in denial of service or the execution of arbitrary code.

Packet Storm
#linux#debian#dos#js

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512


Debian Security Advisory DSA-5452-1 [email protected]
https://www.debian.org/security/ Moritz Muehlenhoff
July 14, 2023 https://www.debian.org/security/faq


Package : gpac
CVE ID : CVE-2023-0760 CVE-2023-3012 CVE-2023-3291

Multiple security issues were discovered in the GPAC multimedia
framework which could result in denial of service or the execution of
arbitrary code.

For the oldstable distribution (bullseye), these problems have been fixed
in version 1.0.1+dfsg1-4+deb11u3.

We recommend that you upgrade your gpac packages.

For the detailed security status of gpac please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/gpac

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: [email protected]
-----BEGIN PGP SIGNATURE-----
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=EqN0
-----END PGP SIGNATURE-----

Related news

CVE-2023-3291

Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.2.2.

CVE-2023-3012: fixed #2480 · gpac/gpac@53387aa

NULL Pointer Dereference in GitHub repository gpac/gpac prior to 2.2.2.

Packet Storm: Latest News

Ubuntu Security Notice USN-7121-3