First published: Mon Sep 11 2023(Updated: )
GPAC through 2.2.1 has a use-after-free vulnerability in the function gf_bifs_flush_command_list in bifs/memory_decoder.c.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GPAC GPAC | <=2.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this GPAC vulnerability is CVE-2023-41000.
The title of this GPAC vulnerability is 'GPAC through 2.2.1 has a use-after-free vulnerability in the function gf_bifs_flush_command_list in bifs/memory_decoder.c.'
The severity rating of CVE-2023-41000 is medium.
GPAC software versions up to and including 2.2.1 are affected by this vulnerability.
At the moment, there is no fix available for CVE-2023-41000. It is recommended to follow the official GPAC website or GitHub repository for updates on fixes.