First published: Wed Nov 15 2023(Updated: )
GPAC v2.3-DEV-rev566-g50c2ab06f-master was discovered to contain a double free via the gf_filterpacket_del function at /gpac/src/filter_core/filter.c.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GPAC GPAC | =2.3-dev-rev566-g50c2ab06f-master |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2023-48013.
The severity of CVE-2023-48013 is high with a CVSS score of 7.8.
GPAC v2.3-DEV-rev566-g50c2ab06f-master is affected if the gf_filterpacket_del function in filter.c is used.
The Common Weakness Enumeration (CWE) ID associated with this vulnerability is CWE-415.
To fix the double free vulnerability in GPAC v2.3-DEV-rev566-g50c2ab06f-master, apply the appropriate patch provided by GPAC or update to a fixed version.