First published: Fri Jun 16 2023(Updated: )
Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.2.2.
Credit: security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
debian/gpac | <=0.5.2-426-gc5ad4e4+dfsg5-5<=2.2.1+dfsg1-3 | 1.0.1+dfsg1-4+deb11u3 |
GPAC GPAC | <2.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-3291 is medium with a severity value of 3.3.
CVE-2023-3291 is a heap-based buffer overflow vulnerability in GitHub repository gpac/gpac prior to version 2.2.2.
The affected software includes gpac package with versions up to and inclusive of 2.2.2.
To fix CVE-2023-3291, update the gpac package to version 2.2.2 or higher.
Yes, here are some references for CVE-2023-3291: [Reference 1](https://huntr.dev/bounties/526954e6-8683-4697-bfa2-886c3204a1d5/), [Reference 2](https://github.com/gpac/gpac/commit/6a748ccc3f76ff10e3ae43014967ea4b0c088aaf), [Reference 3](https://security-tracker.debian.org/tracker/CVE-2023-3291).