DEBIAN-CVE-2024-6063

Source
https://security-tracker.debian.org/tracker/CVE-2024-6063
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2024-6063.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2024-6063
Upstream
Published
2024-06-17T21:15:51Z
Modified
2025-09-18T05:20:04Z
Summary
[none]
Details

A vulnerability was found in GPAC 2.5-DEV-rev228-g11067ea92-master. It has been classified as problematic. This affects the function m2tsdmxonevent of the file src/filters/dmx_m2ts.c of the component MP4Box. The manipulation leads to null pointer dereference. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The patch is named 8767ed0a77c4b02287db3723e92c2169f67c85d5. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-268791.

References

Affected packages

Debian:11 / gpac

Package

Name
gpac
Purl
pkg:deb/debian/gpac?arch=source

Affected ranges

Ecosystem specific

{
    "urgency": "end-of-life"
}