ID:

CVE-2018-20761 (NVD)

- Vulnerability Info (edit)
2019-02-06

GPAC version 0.7.1 and earlier has a Buffer Overflow vulnerability in the gf_sm_load_init function in scene_manager.c in libgpac_static.a.

Products Ubuntu_linux, Debian_linux, Gpac
Type Improper Restriction of Operations within the Bounds of a Memory Buffer (CWE-119)
First patch https://github.com/gpac/gpac/commit/35ab4475a7df9b2a4bcab235e379c0c3ec543658
Patches https://github.com/gpac/gpac/issues/1186
Relevant file/s • ./applications/mp4box/fileimport.c (modified, +20)
• ./applications/mp4client/main.c (modified, +29, -4)
• ./modules/ffmpeg_in/ffmpeg_demux.c (modified, +5, -2)
• ./src/scene_manager/scene_manager.c (modified, +4)
Links https://lists.debian.org/debian-lts-announce/2019/02/msg00040.html
https://usn.ubuntu.com/3926-1/
Annotation

Note:

This entry has not been annotated yet.

Please consider adding data:

gpac - Tree: 35ab4475a7

(? files)

Filter Settings
Files
Navigation
Patch data:

(on by default)


Patched area: