
Cloud Vulnerability DB
A community-led vulnerabilities database
GPAC v2.1-DEV-rev232-gfcaa01ebb-master was discovered to contain a stack overflow vulnerability when processing ISOM_IOD. The vulnerability was assigned CVE-2022-38530 and was later addressed in version 1.0.1+dfsg1-4+deb11u2 for Debian's stable distribution (bullseye) (Debian Security).
The vulnerability manifests as a stack overflow condition during the processing of ISOMIOD (Initial Object Descriptor) in the GPAC multimedia framework. The issue occurs in a recursive call pattern involving multiple functions including gfodfreadisomiod, gfodfreaddescriptor, and gfodfparse_descriptor, leading to excessive stack consumption (GitHub Issue).
When exploited, this vulnerability could lead to a stack overflow condition, potentially resulting in application crashes and denial of service. In some cases, it might also lead to arbitrary code execution (NVD).
The vulnerability has been fixed in GPAC version 1.0.1+dfsg1-4+deb11u2 for Debian's stable distribution (bullseye). Users are recommended to upgrade their GPAC packages to the patched version (Debian Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."