CVE-2023-1449

EUVD-2023-23699
A vulnerability has been found in GPAC 2.3-DEV-rev35-gbbca86917-master and classified as problematic. This vulnerability affects the function gf_av1_reset_state of the file media_tools/av_parsers.c. The manipulation leads to double free. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. VDB-223294 is the identifier assigned to this vulnerability.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
5.3 MEDIUM
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
VulDBCNA
5.3 MEDIUM
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
Base Score
CVSS 3.x
EPSS Score
Percentile: 10%
Affected Products (NVD)
VendorProductVersion
gpacgpac
2.3:dev
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
gpac
bullseye
1.0.1+dfsg1-4+deb11u3
fixed
bullseye (security)
1.0.1+dfsg1-4+deb11u3
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
gpac
bionic
needs-triage
focal
needs-triage
jammy
needs-triage
kinetic
ignored
lunar
ignored
mantic
dne
noble
needs-triage
oracular
dne
trusty
ignored
xenial
needs-triage