First published: Fri Jan 07 2022(Updated: )
GPAC 1.0.1 is affected by: Abort failed. The impact is: cause a denial of service (context-dependent).
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/gpac | <=0.5.2-426-gc5ad4e4+dfsg5-5 | 1.0.1+dfsg1-4+deb11u3 2.2.1+dfsg1-3 |
GPAC MP4Box | =1.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-46045 has a severity rating that indicates it can cause a denial of service situation.
To mitigate CVE-2021-46045, upgrade GPAC to version 1.0.1 or later.
GPAC version 1.0.1 and certain previous versions are vulnerable to CVE-2021-46045.
CVE-2021-46045 may cause service interruptions, but it does not directly lead to data loss.
The recommended approach is to update GPAC to a patched version, as no specific workaround is provided.