CVE-2024-35366

NameCVE-2024-35366
DescriptionFFmpeg n6.1.1 is Integer Overflow. The vulnerability exists in the parse_options function of sbgdec.c within the libavformat module. When parsing certain options, the software does not adequately validate the input. This allows for negative duration values to be accepted without proper bounds checking.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-5712-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
ffmpeg (PTS)stretch (security)7:3.2.18-0+deb9u1vulnerable
stretch (lts), stretch7:3.2.19-0+deb9u5vulnerable
buster, buster (lts)7:4.1.11-0+deb10u2vulnerable
buster (security)7:4.1.11-0+deb10u1vulnerable
bullseye7:4.3.7-0+deb11u1vulnerable
bullseye (security)7:4.3.8-0+deb11u1vulnerable
bookworm (security), bookworm7:5.1.6-0+deb12u1fixed
sid, trixie7:7.1-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
ffmpegsourcebookworm7:5.1.5-0+deb12u1DSA-5712-1
ffmpegsource(unstable)7:7.0.1-3

Notes

https://github.com/ffmpeg/ffmpeg/commit/0bed22d597b78999151e3bde0768b7fe763fc2a6 (n7.0)
https://github.com/ffmpeg/ffmpeg/commit/4db0eb4653efad967ddcf71f564fd2f1169bafcb (n5.1.5)

Search for package or bug name: Reporting problems