CVE-2022-26967: GPAC 2.0 allows a heap-based buffer overflow in gf_base64_encode. It can be triggered via MP4Box.
CVE-2022-1035 (https://github.com/gpac/gpac/commit/3718d583c6ade191dc7979c64f48c001ca6f0243): Segmentation Fault caused by MP4Box -lsr in GitHub repository gpac/gpac prior to 2.1.0-DEV.
CVE-2022-1172 (https://github.com/gpac/gpac/commit/55a183e6b8602369c04ea3836e05436a79fbc7f8): Null Pointer Dereference Caused Segmentation Fault in GitHub repository gpac/gpac prior to 2.1.0-DEV.
CVE-2022-1222 (https://github.com/gpac/gpac/commit/7f060bbb72966cae80d6fee338d0b07fa3fc06e1): Inf loop in GitHub repository gpac/gpac prior to 2.1.0-DEV.
CVE-2022-29537 (https://github.com/gpac/gpac/issues/2173): gp_rtp_builder_do_hevc in ietf/rtp_pck_mpeg4.c in GPAC 2.0.0 has a heap-based buffer over-read, as demonstrated by MP4Box.
CVE-2022-1441 (https://github.com/gpac/gpac/commit/3dbe11b37d65c8472faf0654410068e5500b3adb): MP4Box is a component of GPAC-2.0.0, which is a widely-used third-party package on RPM Fusion. When MP4Box tries to parse a MP4 file, it calls the function `diST_box_read()` to read from video. In this function, it allocates a buffer `str` with fixed length. However, content read from `bs` is controllable by user, so is the length, which causes a buffer overflow.
CVE-2022-29339 (https://github.com/gpac/gpac/issues/2165): https://github.com/gpac/gpac/commit/9ea93a2ec8f555ceed1ee27294cf94822f14f10f In GPAC 2.1-DEV-rev87-g053aae8-master, function BS_ReadByte() in utils/bitstream.c has a failed assertion, which causes a Denial of Service. This vulnerability was fixed in commit 9ea93a2. CVE-2022-29340 (https://github.com/gpac/gpac/issues/2163): https://github.com/gpac/gpac/commit/37592ad86c6ca934d34740012213e467acc4a3b0 GPAC 2.1-DEV-rev87-g053aae8-master. has a Null Pointer Dereference vulnerability in gf_isom_parse_movie_boxes_internal due to improper return value handling of GF_SKIP_BOX, which causes a Denial of Service. This vulnerability was fixed in commit 37592ad.
CVE-2022-1795 (https://huntr.dev/bounties/9c312763-41a6-4fc7-827b-269eb86efcbc): Use After Free in GitHub repository gpac/gpac prior to v2.1.0-DEV. Patch: https://github.com/gpac/gpac/commit/c535bad50d5812d27ee5b22b54371bddec411514 CVE-2022-30976 (https://github.com/gpac/gpac/issues/2179): GPAC 2.0.0 misuses a certain Unicode utf8_wcslen (renamed gf_utf8_wcslen) function in utils/utf.c, resulting in a heap-based buffer over-read, as demonstrated by MP4Box. Patch: https://github.com/gpac/gpac/commit/915e2cba715f36b7cc29e28888117831ca143d78
CVE-2022-2453 (https://huntr.dev/bounties/c8c964de-046a-41b2-9ff5-e25cfdb36b5a): https://github.com/gpac/gpac/commit/dc7de8d3d604426c7a6e628d90cb9fb88e7b4c2c Use After Free in GitHub repository gpac/gpac prior to 2.1-DEV.
CVE-2022-2454 (https://github.com/gpac/gpac/commit/faa75edde3dfeba1e2cf6ffa48e45a50f1042096): https://huntr.dev/bounties/105d40d0-46d7-461e-9f8e-20c4cdea925f Integer Overflow or Wraparound in GitHub repository gpac/gpac prior to 2.1-DEV.
CVE-2022-2549 (https://github.com/gpac/gpac/commit/0102c5d4db7fdbf08b5b591b2a6264de33867a07): https://huntr.dev/bounties/c93083dc-177c-4ba0-ba83-9d7fb29a5537 NULL Pointer Dereference in GitHub repository gpac/gpac prior to v2.1.0-DEV.