A vulnerability classified as problematic was found in GPAC. Affected by this vulnerability is the function svg_parse_preserveaspectratio of the file scenegraph/svg_attributes.c of the component SVG Parser. The manipulation leads to memory leak. The attack can be launched remotely. The name of the patch is 2191e66aa7df750e8ef01781b1930bea87b713bb. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-213463.
References
Link | Resource |
---|---|
https://github.com/gpac/gpac/commit/2191e66aa7df750e8ef01781b1930bea87b713bb | Patch Third Party Advisory |
https://vuldb.com/?id.213463 | Permissions Required Third Party Advisory VDB Entry |
https://www.debian.org/security/2023/dsa-5411 | |
https://github.com/gpac/gpac/commit/2191e66aa7df750e8ef01781b1930bea87b713bb | Patch Third Party Advisory |
https://vuldb.com/?id.213463 | Permissions Required Third Party Advisory VDB Entry |
https://www.debian.org/security/2023/dsa-5411 |
Configurations
History
No history.
Information
Published : 2022-11-11 16:15
Updated : 2024-11-21 07:20
NVD link : CVE-2022-3957
Mitre link : CVE-2022-3957
CVE.ORG link : CVE-2022-3957
JSON object : View
Products Affected
gpac
- gpac