Name | CVE-2023-6602 |
Description | A flaw was found in FFmpeg's TTY Demuxer. This vulnerability allows possible data exfiltration via improper parsing of non-TTY-compliant input files in HLS playlists. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-4241-1 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
ffmpeg (PTS) | bullseye | 7:4.3.7-0+deb11u1 | vulnerable |
| bullseye (security) | 7:4.3.9-0+deb11u1 | fixed |
| bookworm, bookworm (security) | 7:5.1.6-0+deb12u1 | vulnerable |
| sid, trixie | 7:7.1.1-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
ffmpeg | source | bullseye | 7:4.3.9-0+deb11u1 | | DLA-4241-1 | |
ffmpeg | source | (unstable) | 7:7.1.1-1 | | | |
Notes
[bookworm] - ffmpeg <postponed> (Minor issue, wait until it's fixed in the 5.1 branch)
https://bugzilla.redhat.com/show_bug.cgi?id=2334338
Fixed by: https://github.com/FFmpeg/FFmpeg/commit/91d96dc8ddaebe0b6cb393f672085e6bfaf15a31 (master)
Fixed by: https://github.com/FFmpeg/FFmpeg/commit/b753bac08f6881b2d3dea8f1ab84c81550f35897 (n7.1.1)