GPAC 1.1.0 exists to contain an invalid memory address dereference via the function lsr_read_id(). This vulnerability can lead to a Denial of Service (DoS).
Multiple issues were found in GPAC multimedia framework, which could result
in denial of service or potentially the execution of arbitrary code
For the stable distribution (bullseye), these problems have been fixed in
version 101+dfsg1-4+deb11u2
We recommend that you upgrade your gpac packages
For the detailed security status of gpac please re ...