
Cloud Vulnerability DB
A community-led vulnerabilities database
An invalid free vulnerability exists in gpac 1.1.0 via the gfsgcommand_del function, which causes a segmentation fault and application crash. The vulnerability was discovered in December 2021 and affects the GPAC multimedia framework (NVD, Debian Security).
The vulnerability is classified as a Use After Free (CWE-416) issue. It has been assigned a CVSS v3.1 Base Score of 5.5 (Medium) with the vector string CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H. The issue specifically occurs in the gfsgcommand_del function where an invalid pointer is freed, leading to memory corruption (NVD).
When exploited, this vulnerability results in a segmentation fault and application crash, affecting the stability and availability of the GPAC application. The vulnerability primarily impacts the availability of the system, with no direct impact on confidentiality or integrity (NVD).
For Debian's stable distribution (bullseye), this vulnerability has been fixed in version 1.0.1+dfsg1-4+deb11u2. Users are recommended to upgrade their gpac packages to the latest version (Debian Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."