Use After Free Affecting gpac/gpac package, versions [,2.2.0)
Threat Intelligence
Exploit Maturity
Proof of concept
EPSS
0.08% (36th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-UNMANAGED-GPACGPAC-3226760
- published 6 Jan 2023
- disclosed 6 Jan 2023
- credit Xdchase
Introduced: 6 Jan 2023
CVE-2022-47093 Open this link in a new tabHow to fix?
Upgrade gpac/gpac
to version 2.2.0 or higher.
Overview
Affected versions of this package are vulnerable to Use After Free via the m2tsdmx_declare_pid
function of the filters/dmx_m2ts.c:470
file, due to memory corruption issues.
References
CVSS Scores
version 3.1