First published: Mon May 22 2023(Updated: )
Stack-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.2.2.
Credit: security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
debian/gpac | <=0.5.2-426-gc5ad4e4+dfsg5-5<=2.2.1+dfsg1-3 | 1.0.1+dfsg1-4+deb11u3 |
GPAC | <2.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-2837 is medium with a severity value of 5.5.
CVE-2023-2837 affects the GPAC software prior to version 2.2.2.
To fix CVE-2023-2837, update your GPAC software to version 2.2.2 or higher.
The Common Weakness Enumeration (CWE) for CVE-2023-2837 is CWE-119 and CWE-121.
You can find more information about CVE-2023-2837 at the following references: [link1](https://github.com/gpac/gpac/commit/6f28c4cd607d83ce381f9b4a9f8101ca1e79c611), [link2](https://huntr.dev/bounties/a6bfd1b2-aba8-4c6f-90c4-e95b1831cb17), [link3](https://www.debian.org/security/2023/dsa-5411).