{"id":"CVE-2021-40570","details":"The binary MP4Box in Gpac 1.0.1 has a double-free vulnerability in the avc_compute_poc function in av_parsers.c, which allows attackers to cause a denial of service, even code execution and escalation of privileges.","modified":"2026-04-11T21:23:23.423420Z","published":"2022-01-13T18:15:08.063Z","references":[{"type":"ADVISORY","url":"https://www.debian.org/security/2023/dsa-5411"},{"type":"REPORT","url":"https://github.com/gpac/gpac/issues/1899"},{"type":"FIX","url":"https://github.com/gpac/gpac/commit/04dbf08bff4d61948bab80c3f9096ecc60c7f302"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/gpac/gpac","events":[{"introduced":"0"},{"last_affected":"d8538e8ae946b32d99c6b2c57cbb327146e9cd9d"},{"fixed":"04dbf08bff4d61948bab80c3f9096ecc60c7f302"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"1.0.1"}]}}],"versions":["v0.5.2","v0.6.0","v0.7.0","v0.7.1","v0.9.0","v0.9.0-preview","v1.0.0","v1.0.1"],"database_specific":{"vanir_signatures":[{"id":"CVE-2021-40570-02f95021","digest":{"function_hash":"39295482979318475893292998550012608033","length":10192},"source":"https://github.com/gpac/gpac/commit/04dbf08bff4d61948bab80c3f9096ecc60c7f302","target":{"function":"gf_avc_read_sps_bs_internal","file":"src/media_tools/av_parsers.c"},"signature_version":"v1","deprecated":false,"signature_type":"Function"},{"id":"CVE-2021-40570-e7a12def","digest":{"threshold":0.9,"line_hashes":["162301846487824417085976151097850441387","290865607641083795548660822562839751511","36877859478553293821283680965112273961","277556399151842539648333058950472107336"]},"source":"https://github.com/gpac/gpac/commit/04dbf08bff4d61948bab80c3f9096ecc60c7f302","target":{"file":"src/media_tools/av_parsers.c"},"signature_version":"v1","deprecated":false,"signature_type":"Line"}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-40570.json","vanir_signatures_modified":"2026-04-11T21:23:23Z"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}