First published: Mon May 22 2023(Updated: )
Out-of-bounds Read in GitHub repository gpac/gpac prior to 2.2.2.
Credit: security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
debian/gpac | <=0.5.2-426-gc5ad4e4+dfsg5-5<=2.2.1+dfsg1-3 | 1.0.1+dfsg1-4+deb11u3 |
GPAC GPAC | <2.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-2838 is critical with a CVSS score of 9.1.
To fix the vulnerability CVE-2023-2838, you should update the affected software to version 2.2.2 or higher.
The software versions affected by CVE-2023-2838 are up to and including version 2.2.1 of the GitHub repository gpac/gpac and up to but excluding version 2.2.2 of GPAC GPAC.
The Common Weakness Enumeration (CWE) ID of CVE-2023-2838 is 125.
You can find more information about CVE-2023-2838 at the following references: [1] [2] [3]