CVE-2022-1795Use After Free in Gpac

CWE-416Use After Free4 documents4 sources
Severity
9.8CRITICALNVD
EPSS
0.2%
top 53.45%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMay 18
Latest updateMay 19

Description

Use After Free in GitHub repository gpac/gpac prior to v2.1.0-DEV.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages4 packages

NVDgpac/gpac< 2.1.0
debiandebian/gpac< gpac 1.0.1+dfsg1-4+deb11u2 (bullseye)
CVEListV5gpac/gpac_gpacunspecifiedv2.1.0-DEV
Debiangpac/gpac< 1.0.1+dfsg1-4+deb11u2

Patches

🔴Vulnerability Details

2
GHSA
GHSA-2mc2-q5q3-gf79: Use After Free in GitHub repository gpac/gpac prior to v22022-05-19
OSV
CVE-2022-1795: Use After Free in GitHub repository gpac/gpac prior to v22022-05-18

📋Vendor Advisories

1
Debian
CVE-2022-1795: gpac - Use After Free in GitHub repository gpac/gpac prior to v2.1.0-DEV.2022