A vulnerability classified as problematic was found in GPAC. Affected by this vulnerability is the function svg_parse_preserveaspectratio of the file scenegraph/svg_attributes.c of the component SVG Parser. The manipulation leads to memory leak. The attack can be launched remotely. The name of the patch is 2191e66aa7df750e8ef01781b1930bea87b713bb. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-213463.
The product does not release or incorrectly releases a resource before it is made available for re-use.
The product does not sufficiently track and release allocated memory after it has been used, making the memory unavailable for reallocation and reuse.
Link | Tags |
---|---|
https://github.com/gpac/gpac/commit/2191e66aa7df750e8ef01781b1930bea87b713bb | third party advisory patch |
https://vuldb.com/?id.213463 | third party advisory vdb entry permissions required |
https://www.debian.org/security/2023/dsa-5411 | vendor advisory |