First published: Wed May 18 2022(Updated: )
Use After Free in GitHub repository gpac/gpac prior to v2.1.0-DEV.
Credit: security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
debian/gpac | <=0.5.2-426-gc5ad4e4+dfsg5-5 | 1.0.1+dfsg1-4+deb11u3 2.2.1+dfsg1-3 |
GPAC MP4Box | <2.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-1795 is classified as a high severity vulnerability due to the potential for exploitation through use after free issues.
To fix CVE-2022-1795, upgrade the gpac software to version 2.1.0 or later.
CVE-2022-1795 affects gpac versions prior to 2.1.0, including versions up to 2.1.0-DEV.
CVE-2022-1795 is a use after free vulnerability that can lead to potential memory corruption.
More information about CVE-2022-1795 can be found in the security tracking databases and GitHub repository.