First published: Mon Sep 05 2022(Updated: )
Last updated 27 November 2024
Credit: cve-coordination@google.com cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/tinygltf | <=2.5.0+dfsg-3<=2.5.0+dfsg-4 | 2.5.0+dfsg-5 2.5.0+dfsg-3+deb11u1 |
debian/tinygltf | 2.5.0+dfsg-3+deb11u1 2.7.0+dfsg-2 2.9.3+dfsg-2 | |
tinygltf | <2.6.0 | |
Debian Linux | =11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-3008 is classified as a high severity vulnerability due to its potential for command injection.
To mitigate CVE-2022-3008, upgrade the tinygltf library to versions 2.5.0+dfsg-5 or later.
CVE-2022-3008 affects users of the tinygltf library in Debian versions up to 2.5.0+dfsg-4.
CVE-2022-3008 is a command injection vulnerability that arises from unsafe file path handling.
Yes, CVE-2022-3008 can be exploited remotely if an attacker can provide untrusted input to the affected library.