First published: Mon Feb 05 2024(Updated: )
gpac v2.2.1 was discovered to contain a memory leak via the dst_props variable in the gf_filter_pid_merge_properties_internal function.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GPAC | =2.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-24265 is classified as a medium risk due to the potential for memory leaks that may lead to increased resource consumption.
To fix CVE-2024-24265, upgrade to a later version of GPAC that addresses the memory leak in the gf_filter_pid_merge_properties_internal function.
GPAC version 2.2.1 is affected by CVE-2024-24265, which contains the memory leak vulnerability.
Yes, CVE-2024-24265 can potentially lead to further issues such as denial of service if the memory leak is exploited.
The main impact of CVE-2024-24265 on GPAC users is the risk of increased memory usage, which can degrade system performance.