First published: Mon Mar 14 2022(Updated: )
GPAC 1.0.1 is affected by a NULL pointer dereference in gf_utf8_wcslen. (gf_utf8_wcslen is a renamed Unicode utf8_wcslen function.)
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/gpac | <=0.5.2-426-gc5ad4e4+dfsg5-5 | 1.0.1+dfsg1-4+deb11u3 2.2.1+dfsg1-3 |
GPAC MP4Box | =1.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-24577 is classified as a medium severity vulnerability due to the potential for a NULL pointer dereference.
To fix CVE-2022-24577, upgrade GPAC to version 1.0.1+dfsg1-4+deb11u3 or 2.2.1+dfsg1-3.
CVE-2022-24577 affects GPAC version 1.0.1 and all versions prior to 0.5.2-426-gc5ad4e4+dfsg5-5.
CVE-2022-24577 is a NULL pointer dereference vulnerability.
CVE-2022-24577 is found in the gf_utf8_wcslen function within GPAC's source code.