First published: Mon Feb 05 2024(Updated: )
gpac v2.2.1 was discovered to contain a Use-After-Free (UAF) vulnerability via the dasher_configure_pid function at /src/filters/dasher.c.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GPAC | =2.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-24266 has been classified with a high severity due to its potential to exploit use-after-free vulnerabilities.
To fix CVE-2024-24266, you need to update GPAC to a version that addresses this vulnerability.
CVE-2024-24266 specifically affects GPAC version 2.2.1.
A Use-After-Free vulnerability, like in CVE-2024-24266, occurs when a program continues to use a pointer after the memory it points to has been freed.
CVE-2024-24266 originates from the dasher_configure_pid function located in /src/filters/dasher.c.