CVE-2023-4679

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-4679
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-4679.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-4679
Downstream
Published
2024-11-15T11:15:08.917Z
Modified
2025-11-15T06:57:53.272070Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

A use after free vulnerability exists in GPAC version 2.3-DEV-revrelease, specifically in the gffilterpacketdel function in filter_core/filter.c at line 38. This vulnerability can lead to a double-free condition, which may cause the application to crash.

References

Affected packages

Git / github.com/gpac/gpac

Affected ranges

Type
GIT
Repo
https://github.com/gpac/gpac
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v0.*

v0.5.2
v0.6.0
v0.6.1
v0.7.0
v0.7.1
v0.8.0
v0.9.0
v0.9.0-preview

v1.*

v1.0.0
v1.0.1

v2.*

v2.0.0
v2.2.0

Database specific

vanir_signatures

[
    {
        "digest": {
            "length": 10384.0,
            "function_hash": "278738720105099425166968269713049248817"
        },
        "target": {
            "file": "src/filters/isoffin_read_ch.c",
            "function": "isor_reader_get_sample"
        },
        "deprecated": false,
        "signature_type": "Function",
        "id": "CVE-2023-4679-4ed87a2e",
        "source": "https://github.com/gpac/gpac/commit/b68b3f0bf5c366e003221d78fd663a1d5514a876",
        "signature_version": "v1"
    }
]