First published: Fri Feb 04 2022(Updated: )
Motion Spell GPAC contains a null pointer dereference vulnerability that could allow a local attacker to cause a denial-of-service (DoS) condition.
Credit: security@huntr.dev security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
debian/gpac | 0.5.2-426-gc5ad4e4+dfsg5-5 1.0.1+dfsg1-4+deb11u3 2.2.1+dfsg1-3 | |
GPAC GPAC | <1.1.0 | |
Motion Spell GPAC | ||
Debian Debian Linux | =11.0 |
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.