First published: Tue Jul 19 2022(Updated: )
Integer Overflow or Wraparound in GitHub repository gpac/gpac prior to 2.1-DEV.
Credit: security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
debian/gpac | <=0.5.2-426-gc5ad4e4+dfsg5-5 | 1.0.1+dfsg1-4+deb11u3 2.2.1+dfsg1-3 |
GPAC MP4Box | <=2.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-2454 is classified as a medium severity vulnerability due to the potential for integer overflow or wraparound.
To fix CVE-2022-2454, update to a version of GPAC greater than 2.1-DEV or install the recommended security patches from Debian.
Versions of GPAC prior to 2.1-DEV, including those up to version 2.0.0, are affected by CVE-2022-2454.
The impact of CVE-2022-2454 can lead to application crashes or unpredictable behavior due to integer overflow issues.
CVE-2022-2454 primarily affects the GPAC application across different operating systems, particularly those using Debian packages.