CVE-2023-0358Use After Free in Gpac

CWE-416Use After Free6 documents5 sources
Severity
7.8HIGHNVD
EPSS
0.1%
top 78.26%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJan 18
Latest updateOct 22

Description

Use After Free in GitHub repository gpac/gpac prior to 2.3.0-DEV.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages3 packages

CVEListV5gpac/gpac_gpacunspecified2.3.0-DEV
NVDgpac/gpac2.2.0
debiandebian/gpac

Patches

🔴Vulnerability Details

2
OSV
CVE-2023-0358: Use After Free in GitHub repository gpac/gpac prior to 22023-01-18
GHSA
GHSA-2842-j9h8-mp66: Use After Free in GitHub repository gpac/gpac prior to 22023-01-18

📋Vendor Advisories

1
Debian
CVE-2023-0358: gpac - Use After Free in GitHub repository gpac/gpac prior to 2.3.0-DEV.2023

📄Research Papers

2
arXiv
SEC-bench: Automated Benchmarking of LLM Agents on Real-World Software Security Tasks2025-10-22
arXiv
Top of the Heap: Efficient Memory Error Protection of Safe Heap Objects2024-08-19
CVE-2023-0358 — Use After Free in Gpac Gpac | cvebase