Name | CVE-2024-6061 |
Description | A vulnerability has been found in GPAC 2.5-DEV-rev228-g11067ea92-master and classified as problematic. Affected by this vulnerability is the function isoffin_process of the file src/filters/isoffin_read.c of the component MP4Box. The manipulation leads to infinite loop. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The identifier of the patch is 20c0f29139a82779b86453ce7f68d0681ec7624c. It is recommended to apply a patch to fix this issue. The identifier VDB-268789 was assigned to this vulnerability. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 1074414 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
gpac (PTS) | jessie, jessie (lts) | 0.5.0+svn5324~dfsg1-1+deb8u5 | vulnerable |
| stretch | 0.5.2-426-gc5ad4e4+dfsg5-3+deb9u1 | vulnerable |
| buster | 0.5.2-426-gc5ad4e4+dfsg5-5 | vulnerable |
| bullseye (security), bullseye | 1.0.1+dfsg1-4+deb11u3 | vulnerable |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
gpac | source | jessie | (unfixed) | end-of-life | | |
gpac | source | stretch | (unfixed) | end-of-life | | |
gpac | source | buster | (unfixed) | end-of-life | | |
gpac | source | bullseye | (unfixed) | end-of-life | | |
gpac | source | (unstable) | (unfixed) | | | 1074414 |
Notes
[bullseye] - gpac <end-of-life> (EOL in bullseye LTS)
[buster] - gpac <end-of-life> (EOL in buster LTS)
https://github.com/gpac/gpac/issues/2871
https://github.com/gpac/gpac/commit/20c0f29139a82779b86453ce7f68d0681ec7624c