First published: Wed Apr 20 2022(Updated: )
gp_rtp_builder_do_hevc in ietf/rtp_pck_mpeg4.c in GPAC 2.0.0 has a heap-based buffer over-read, as demonstrated by MP4Box.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/gpac | <=0.5.2-426-gc5ad4e4+dfsg5-5 | 1.0.1+dfsg1-4+deb11u3 2.2.1+dfsg1-3 |
GPAC MP4Box | =2.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-29537 is classified as a medium-severity vulnerability due to the potential for a heap-based buffer over-read.
To fix CVE-2022-29537, upgrade to GPAC versions 1.0.1+dfsg1-4+deb11u3 or 2.2.1+dfsg1-3.
CVE-2022-29537 affects GPAC version 2.0.0 and earlier versions.
CVE-2022-29537 is identified as a heap-based buffer over-read in the GPAC library.
Yes, CVE-2022-29537 can potentially be exploited remotely through malicious MP4 files.