First published: Fri Nov 11 2022(Updated: )
A vulnerability classified as problematic was found in GPAC. Affected by this vulnerability is the function svg_parse_preserveaspectratio of the file scenegraph/svg_attributes.c of the component SVG Parser. The manipulation leads to memory leak. The attack can be launched remotely. The name of the patch is 2191e66aa7df750e8ef01781b1930bea87b713bb. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-213463.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/gpac | <=0.5.2-426-gc5ad4e4+dfsg5-5<=2.2.1+dfsg1-3 | 1.0.1+dfsg1-4+deb11u3 |
GPAC GPAC | <2.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.