DEBIAN-CVE-2025-7797

Source
https://security-tracker.debian.org/tracker/CVE-2025-7797
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-7797.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2025-7797
Upstream
Published
2025-07-18T18:15:25.380Z
Modified
2025-12-14T10:13:25.597795Z
Severity
  • 5.5 (Medium) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X CVSS Calculator
Summary
[none]
Details

A vulnerability was found in GPAC up to 2.4. It has been rated as problematic. Affected by this issue is the function gfdashdownloadinitsegment of the file src/mediatools/dashclient.c. The manipulation of the argument baseiniturl leads to null pointer dereference. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The patch is identified as 153ea314b6b053db17164f8bc3c7e1e460938eaa. It is recommended to apply a patch to fix this issue.

References

Affected packages

Debian:11 / gpac

Package

Name
gpac
Purl
pkg:deb/debian/gpac?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*
1.0.1+dfsg1-4
1.0.1+dfsg1-4+deb11u1
1.0.1+dfsg1-4+deb11u2
1.0.1+dfsg1-4+deb11u3
1.0.1+dfsg1-5
2.*
2.0.0+dfsg1-1
2.0.0+dfsg1-2
2.0.0+dfsg1-4
2.2.1+dfsg1-1
2.2.1+dfsg1-2
2.2.1+dfsg1-3
2.2.1+dfsg1-3.1~exp1
2.2.1+dfsg1-3.1

Ecosystem specific

{
    "urgency": "end-of-life"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-7797.json"