A Null Pointer dereference vulnerability exists in GPAC 2.1-DEV-revUNKNOWN-master via the function gf_filter_pid_set_property_full () at filter_core/filter_pid.c:5250,which causes a Denial of Service (DoS). This vulnerability was fixed in commit b43f9d1.
A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Gpac | Gpac | 2.1-dev (including) | 2.1-dev (including) |
Gpac | Ubuntu | bionic | * |
Gpac | Ubuntu | kinetic | * |
Gpac | Ubuntu | lunar | * |
Gpac | Ubuntu | trusty | * |
Gpac | Ubuntu | trusty/esm | * |
Gpac | Ubuntu | xenial | * |