Name | CVE-2024-35369 |
Description | In FFmpeg version n6.1.1, specifically within the avcodec/speexdec.c module, a potential security vulnerability exists due to insufficient validation of certain parameters when parsing Speex codec extradata. This vulnerability could lead to integer overflow conditions, potentially resulting in undefined behavior or crashes during the decoding process. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
ffmpeg (PTS) | stretch (security) | 7:3.2.18-0+deb9u1 | vulnerable |
stretch (lts), stretch | 7:3.2.19-0+deb9u5 | vulnerable | |
buster, buster (lts) | 7:4.1.11-0+deb10u2 | vulnerable | |
buster (security) | 7:4.1.11-0+deb10u1 | vulnerable | |
bullseye | 7:4.3.7-0+deb11u1 | vulnerable | |
bullseye (security) | 7:4.3.8-0+deb11u1 | vulnerable | |
bookworm (security), bookworm | 7:5.1.6-0+deb12u1 | vulnerable | |
sid, trixie | 7:7.1-3 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
ffmpeg | source | (unstable) | 7:7.0.1-3 |
[bookworm] - ffmpeg <postponed> (Pick up when fixed in 5.1.x)
https://github.com/ffmpeg/ffmpeg/commit/0895ef0d6d6406ee6cd158fc4d47d80f201b8e9c (n7.0)