CVE-2024-6061

NameCVE-2024-6061
DescriptionA vulnerability has been found in GPAC 2.5-DEV-rev228-g11067ea92-master and classified as problematic. Affected by this vulnerability is the function isoffin_process of the file src/filters/isoffin_read.c of the component MP4Box. The manipulation leads to infinite loop. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The identifier of the patch is 20c0f29139a82779b86453ce7f68d0681ec7624c. It is recommended to apply a patch to fix this issue. The identifier VDB-268789 was assigned to this vulnerability.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1074414

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
gpac (PTS)jessie, jessie (lts)0.5.0+svn5324~dfsg1-1+deb8u5vulnerable
stretch0.5.2-426-gc5ad4e4+dfsg5-3+deb9u1vulnerable
buster0.5.2-426-gc5ad4e4+dfsg5-5vulnerable
bullseye (security), bullseye1.0.1+dfsg1-4+deb11u3vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
gpacsourcejessie(unfixed)end-of-life
gpacsourcestretch(unfixed)end-of-life
gpacsourcebuster(unfixed)end-of-life
gpacsourcebullseye(unfixed)end-of-life
gpacsource(unstable)(unfixed)1074414

Notes

[bullseye] - gpac <end-of-life> (EOL in bullseye LTS)
[buster] - gpac <end-of-life> (EOL in buster LTS)
https://github.com/gpac/gpac/issues/2871
https://github.com/gpac/gpac/commit/20c0f29139a82779b86453ce7f68d0681ec7624c

Search for package or bug name: Reporting problems