Use After Free Affecting agl/jbig2enc package, versions [0,]


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.08% (25th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Use After Free vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-UNMANAGED-AGLJBIG2ENC-6053760
  • published9 Nov 2023
  • disclosed8 Nov 2023
  • creditZeng Yunxiang

Introduced: 8 Nov 2023

CVE-2023-46362  (opens in a new tab)
CWE-416  (opens in a new tab)

How to fix?

There is no fixed version for agl/jbig2enc.

Overview

Affected versions of this package are vulnerable to Use After Free via the jbig2enc_auto_threshold_using_hash function in src/jbig2enc.cc. An attacker can manipulate the heap memory after it has been freed, leading to potential unauthorized access or control over the system by exploiting the use-after-free condition.

References

CVSS Base Scores

version 3.1