First published: Tue Nov 29 2022(Updated: )
GPAC v2.1-DEV-rev478-g696e6f868-master was discovered to contain a heap use-after-free via the Q_IsTypeOn function at /gpac/src/bifs/unquantize.c.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/gpac | <=0.5.2-426-gc5ad4e4+dfsg5-5<=2.2.1+dfsg1-3 | 1.0.1+dfsg1-4+deb11u3 |
GPAC MP4Box | <2.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-45343 is classified as a high severity vulnerability due to its potential for exploitation leading to arbitrary code execution.
To fix CVE-2022-45343, upgrade GPAC to version 2.2.1 or later, or apply patches as available for affected versions.
CVE-2022-45343 affects GPAC versions up to and including 2.2.0.
CVE-2022-45343 is a heap use-after-free vulnerability found in the Q_IsTypeOn function of GPAC.
As of now, there are no publicly disclosed exploits specifically targeting CVE-2022-45343.