First published: Mon May 22 2023(Updated: )
NULL Pointer Dereference in GitHub repository gpac/gpac prior to 2.2.2.
Credit: security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
debian/gpac | <=0.5.2-426-gc5ad4e4+dfsg5-5<=2.2.1+dfsg1-3 | 1.0.1+dfsg1-4+deb11u3 |
GPAC GPAC | <2.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2023-2840.
The severity of CVE-2023-2840 is critical with a CVSS score of 9.8.
Versions up to and including 2.2.1 of the GitHub repository gpac/gpac and versions up to and including 1.0.1+dfsg1-4+deb11u3 of the Debian package gpac are affected by CVE-2023-2840.
To fix CVE-2023-2840, update to version 2.2.2 of the GitHub repository gpac/gpac or version 1.0.1+dfsg1-4+deb11u3 of the Debian package gpac.
More information about CVE-2023-2840 can be found at the following references: [1](https://github.com/gpac/gpac/commit/ba59206b3225f0e8e95a27eff41cb1c49ddf9a37), [2](https://huntr.dev/bounties/21926fc2-6eb1-4e24-8a36-e60f487d0257), [3](https://www.debian.org/security/2023/dsa-5411).