First published: Wed Dec 22 2021(Updated: )
An invalid free vulnerability exists in gpac 1.1.0 via the gf_sg_command_del function, which causes a segmentation fault and application crash.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/gpac | <=0.5.2-426-gc5ad4e4+dfsg5-5 | 1.0.1+dfsg1-4+deb11u3 2.2.1+dfsg1-3 |
GPAC GPAC | =1.1.0-dev | |
=1.1.0-dev |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-45262 is an invalid free vulnerability in gpac 1.1.0 that can cause a segmentation fault and application crash.
The severity of CVE-2021-45262 is medium with a CVSS score of 5.5.
CVE-2021-45262 affects gpac versions 1.1.0-dev, 0.5.2-426-gc5ad4e4+dfsg5-5, 1.0.1+dfsg1-4+deb11u3, and 2.2.1+dfsg1-3.
To fix CVE-2021-45262, update gpac to a version that includes the fix, such as 1.0.1+dfsg1-4+deb11u3 or 2.2.1+dfsg1-3.
You can find more information about CVE-2021-45262 on the GitHub issue page (https://github.com/gpac/gpac/issues/1980), the Debian security advisory (https://www.debian.org/security/2023/dsa-5411), and the GitHub commit (https://github.com/gpac/gpac/commit/ef86a8eba3b166b885dec219066dd3a47501e03a).