GPAC v1.1.0 was discovered to contain an invalid call in the function gf_node_changed(). This vulnerability can lead to a Denial of Service (DoS).
Name | Vendor | Start Version | End Version |
---|---|---|---|
Gpac | Gpac | 1.1.0 (including) | 1.1.0 (including) |
Gpac | Ubuntu | bionic | * |
Gpac | Ubuntu | impish | * |
Gpac | Ubuntu | kinetic | * |
Gpac | Ubuntu | lunar | * |
Gpac | Ubuntu | trusty | * |
Gpac | Ubuntu | trusty/esm | * |
Gpac | Ubuntu | xenial | * |