CVE-2024-6062

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2024-6062
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-6062.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-6062
Published
2024-06-17T20:15:15Z
Modified
2024-06-20T18:04:41.332938Z
Summary
[none]
Details

A vulnerability was found in GPAC 2.5-DEV-rev228-g11067ea92-master and classified as problematic. Affected by this issue is the function swfsvgaddisosample of the file src/filters/load_text.c of the component MP4Box. The manipulation leads to null pointer dereference. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The patch is identified as 31e499d310a48bd17c8b055a0bfe0fe35887a7cd. It is recommended to apply a patch to fix this issue. VDB-268790 is the identifier assigned to this vulnerability.

References

Affected packages

Debian:10 / gpac

Package

Name
gpac
Purl
pkg:deb/debian/gpac?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.5.2-426-gc5ad4e4+dfsg5-5
0.7.1+dfsg1-2
0.7.1+dfsg1-3
0.7.1+dfsg1-4

1.*

1.0.1+dfsg1-1
1.0.1+dfsg1-2
1.0.1+dfsg1-3
1.0.1+dfsg1-4
1.0.1+dfsg1-5

2.*

2.0.0+dfsg1-1
2.0.0+dfsg1-2
2.0.0+dfsg1-4
2.2.1+dfsg1-1
2.2.1+dfsg1-2
2.2.1+dfsg1-3
2.2.1+dfsg1-3.1~exp1
2.2.1+dfsg1-3.1

Ecosystem specific

{
    "urgency": "end-of-life"
}

Git / github.com/gpac/gpac

Affected ranges

Type
GIT
Repo
https://github.com/gpac/gpac
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v0.*

v0.5.2
v0.6.0
v0.6.1
v0.7.0
v0.7.1
v0.8.0
v0.9.0
v0.9.0-preview

v1.*

v1.0.0
v1.0.1

v2.*

v2.0.0
v2.2.0
v2.4.0