CVE-2022-4202

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-4202
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-4202.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-4202
Related
Published
2022-11-29T09:15:09Z
Modified
2024-09-18T03:22:22.889683Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

A vulnerability, which was classified as problematic, was found in GPAC 2.1-DEV-rev490-g68064e101-master. Affected is the function lsrtranslatecoords of the file laser/lsr_dec.c. The manipulation leads to integer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The name of the patch is b3d821c4ae9ba62b3a194d9dcb5e99f17bd56908. It is recommended to apply a patch to fix this issue. VDB-214518 is the identifier assigned to this vulnerability.

References

Affected packages

Debian:11 / gpac

Package

Name
gpac
Purl
pkg:deb/debian/gpac?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.0.1+dfsg1-4+deb11u2

Affected versions

1.*

1.0.1+dfsg1-4
1.0.1+dfsg1-4+deb11u1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Git / github.com/gpac/gpac

Affected ranges

Type
GIT
Repo
https://github.com/gpac/gpac
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v0.*

v0.5.2
v0.6.0
v0.6.1
v0.7.0
v0.7.1
v0.8.0
v0.9.0
v0.9.0-preview

v1.*

v1.0.0
v1.0.1

v2.*

v2.0.0