CWE
190
Advisory Published
Updated

CVE-2023-23144: Integer Overflow

First published: Fri Jan 20 2023(Updated: )

Integer overflow vulnerability in function Q_DecCoordOnUnitSphere file bifs/unquantize.c in GPAC version 2.2-rev0-gab012bbfb-master.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
debian/gpac<=0.5.2-426-gc5ad4e4+dfsg5-5<=2.2.1+dfsg1-3
1.0.1+dfsg1-4+deb11u3
GPAC GPAC=2.2-rev0-gab012bbfb-master

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2023-23144?

    CVE-2023-23144 is an integer overflow vulnerability in the GPAC software.

  • How does CVE-2023-23144 affect GPAC?

    CVE-2023-23144 affects GPAC version 2.2-rev0-gab012bbfb-master.

  • What is the severity of CVE-2023-23144?

    The severity of CVE-2023-23144 is medium with a CVSS score of 5.5.

  • How can I fix CVE-2023-23144?

    To fix CVE-2023-23144, it is recommended to update GPAC to version 2.2-rev0-gab012bbfb-master or apply the provided patches.

  • Where can I find more information about CVE-2023-23144?

    You can find more information about CVE-2023-23144 in the references provided, including the GitHub commit and Debian security advisories.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203