Improper Resource Shutdown or Release Affecting gpac package, versions <1.0.1+dfsg1-4+deb11u2
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN11-GPAC-3113409
- published 12 Nov 2022
- disclosed 11 Nov 2022
Introduced: 11 Nov 2022
CVE-2022-3957 Open this link in a new tabHow to fix?
Upgrade Debian:11
gpac
to version 1.0.1+dfsg1-4+deb11u2 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream gpac
package and not the gpac
package as distributed by Debian
.
See How to fix?
for Debian:11
relevant fixed versions and status.
A vulnerability classified as problematic was found in GPAC. Affected by this vulnerability is the function svg_parse_preserveaspectratio of the file scenegraph/svg_attributes.c of the component SVG Parser. The manipulation leads to memory leak. The attack can be launched remotely. The name of the patch is 2191e66aa7df750e8ef01781b1930bea87b713bb. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-213463.