First published: Mon Feb 05 2024(Updated: )
gpac v2.2.1 was discovered to contain a Use-After-Free (UAF) vulnerability via the dasher_configure_pid function at /src/filters/dasher.c.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GPAC GPAC | =2.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.