{"id":"CVE-2023-4679","details":"A use after free vulnerability exists in GPAC version 2.3-DEV-revrelease, specifically in the gf_filterpacket_del function in filter_core/filter.c at line 38. This vulnerability can lead to a double-free condition, which may cause the application to crash.","modified":"2026-04-12T06:44:45.459853Z","published":"2024-11-15T11:15:08.917Z","references":[{"type":"FIX","url":"https://github.com/gpac/gpac/commit/b68b3f0bf5c366e003221d78fd663a1d5514a876"},{"type":"EVIDENCE","url":"https://huntr.com/bounties/6f721ee7-8785-4c26-801e-f40fed3faaac"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/gpac/gpac","events":[{"introduced":"0"},{"fixed":"b68b3f0bf5c366e003221d78fd663a1d5514a876"}]}],"versions":["v0.5.2","v0.6.0","v0.9.0","v0.9.0-preview","v1.0.0","v2.0.0","v2.2.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-4679.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"2.3.0-dev"}]}],"vanir_signatures":[{"source":"https://github.com/gpac/gpac/commit/b68b3f0bf5c366e003221d78fd663a1d5514a876","id":"CVE-2023-4679-4ed87a2e","digest":{"function_hash":"278738720105099425166968269713049248817","length":10384},"signature_version":"v1","deprecated":false,"signature_type":"Function","target":{"function":"isor_reader_get_sample","file":"src/filters/isoffin_read_ch.c"}}],"vanir_signatures_modified":"2026-04-12T06:44:45Z"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}