Source: gpac X-Debbugs-CC: t...@security.debian.org Severity: important Tags: security
Hi, The following vulnerabilities were published for gpac. CVE-2024-6061[0]: | A vulnerability has been found in GPAC 2.5-DEV- | rev228-g11067ea92-master and classified as problematic. Affected by | this vulnerability is the function isoffin_process of the file | src/filters/isoffin_read.c of the component MP4Box. The manipulation | leads to infinite loop. It is possible to launch the attack on the | local host. The exploit has been disclosed to the public and may be | used. The identifier of the patch is | 20c0f29139a82779b86453ce7f68d0681ec7624c. It is recommended to apply | a patch to fix this issue. The identifier VDB-268789 was assigned to | this vulnerability. https://github.com/gpac/gpac/issues/2871 https://github.com/gpac/gpac/commit/20c0f29139a82779b86453ce7f68d0681ec7624c CVE-2024-6062[1]: | A vulnerability was found in GPAC 2.5-DEV-rev228-g11067ea92-master | and classified as problematic. Affected by this issue is the | function swf_svg_add_iso_sample of the file src/filters/load_text.c | of the component MP4Box. The manipulation leads to null pointer | dereference. The attack needs to be approached locally. The exploit | has been disclosed to the public and may be used. The patch is | identified as 31e499d310a48bd17c8b055a0bfe0fe35887a7cd. It is | recommended to apply a patch to fix this issue. VDB-268790 is the | identifier assigned to this vulnerability. https://github.com/gpac/gpac/issues/2872 https://github.com/gpac/gpac/commit/31e499d310a48bd17c8b055a0bfe0fe35887a7cd CVE-2024-6063[2]: | A vulnerability was found in GPAC 2.5-DEV-rev228-g11067ea92-master. | It has been classified as problematic. This affects the function | m2tsdmx_on_event of the file src/filters/dmx_m2ts.c of the component | MP4Box. The manipulation leads to null pointer dereference. An | attack has to be approached locally. The exploit has been disclosed | to the public and may be used. The patch is named | 8767ed0a77c4b02287db3723e92c2169f67c85d5. It is recommended to apply | a patch to fix this issue. The associated identifier of this | vulnerability is VDB-268791. https://github.com/gpac/gpac/issues/2873 https://github.com/gpac/gpac/commit/8767ed0a77c4b02287db3723e92c2169f67c85d5 CVE-2024-6064[3]: | A vulnerability was found in GPAC 2.5-DEV-rev228-g11067ea92-master. | It has been declared as problematic. This vulnerability affects the | function xmt_node_end of the file src/scene_manager/loader_xmt.c of | the component MP4Box. The manipulation leads to use after free. | Local access is required to approach this attack. The exploit has | been disclosed to the public and may be used. The name of the patch | is f4b3e4d2f91bc1749e7a924a8ab171af03a355a8/c1b9c794bad8f262c56f3cf6 | 90567980d96662f5. It is recommended to apply a patch to fix this | issue. The identifier of this vulnerability is VDB-268792. https://github.com/gpac/gpac/issues/2874 https://github.com/gpac/gpac/commit/c1b9c794bad8f262c56f3cf690567980d96662f5 If you fix the vulnerabilities please also make sure to include the CVE (Common Vulnerabilities & Exposures) ids in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2024-6061 https://www.cve.org/CVERecord?id=CVE-2024-6061 [1] https://security-tracker.debian.org/tracker/CVE-2024-6062 https://www.cve.org/CVERecord?id=CVE-2024-6062 [2] https://security-tracker.debian.org/tracker/CVE-2024-6063 https://www.cve.org/CVERecord?id=CVE-2024-6063 [3] https://security-tracker.debian.org/tracker/CVE-2024-6064 https://www.cve.org/CVERecord?id=CVE-2024-6064 Please adjust the affected versions in the BTS as needed.