First published: Fri Jan 14 2022(Updated: )
GPAC v1.1.0 was discovered to contain an invalid call in the function gf_node_changed(). This vulnerability can lead to a Denial of Service (DoS).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/gpac | <=0.5.2-426-gc5ad4e4+dfsg5-5 | 1.0.1+dfsg1-4+deb11u3 2.2.1+dfsg1-3 |
GPAC MP4Box | =1.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-45763 has been classified as a Denial of Service (DoS) vulnerability.
To fix CVE-2021-45763, upgrade GPAC to version 1.1.0 or higher, or use the recommended versions specified by your distribution.
GPAC version 1.1.0 and versions prior to 1.0.1+dfsg1-4+deb11u3 or 2.2.1+dfsg1-3 are affected by CVE-2021-45763.
CVE-2021-45763 primarily impacts the GPAC libraries when using the vulnerable versions.
The potential consequence of CVE-2021-45763 is a Denial of Service (DoS), affecting the availability of applications using GPAC.