First published: Fri Jan 20 2023(Updated: )
GPAC version 2.2-rev0-gab012bbfb-master was discovered to contain a memory leak in lsr_read_rare_full function.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GPAC GPAC | =2.2-rev0-gab012bbfb-master | |
debian/gpac | <=0.5.2-426-gc5ad4e4+dfsg5-5<=2.2.1+dfsg1-3 | 1.0.1+dfsg1-4+deb11u3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-23145 is high with a score of 7.8.
GPAC version 2.2-rev0-gab012bbfb-master is affected by CVE-2023-23145.
To fix CVE-2023-23145, update to GPAC version 1.0.1+dfsg1-4+deb11u3 or GPAC version 2.2.1+dfsg1-3.
The CWE ID for CVE-2023-23145 is 401.
More information about CVE-2023-23145 can be found at the following references: [GitHub commit](https://github.com/gpac/gpac/commit/4ade98128cbc41d5115b97a41ca2e59529c8dd5f), [Debian Security Advisory](https://www.debian.org/security/2023/dsa-5411), [Debian Security Tracker](https://security-tracker.debian.org/tracker/CVE-2023-23145).