Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-47777

Опубликовано: 12 дек. 2024
Источник: debian
EPSS Низкий

Описание

GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerability has been identified in the gst_wavparse_smpl_chunk function within gstwavparse.c. This function attempts to read 4 bytes from the data + 12 offset without checking if the size of the data buffer is sufficient. If the buffer is too small, the function reads beyond its bounds. This vulnerability may result in reading 4 bytes out of the boundaries of the data buffer. This vulnerability is fixed in 1.24.10.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
gst-plugins-good1.0fixed1.24.10-1package
gst-plugins-good0.10removedpackage

Примечания

  • https://securitylab.github.com/advisories/GHSL-2024-259_Gstreamer/

  • https://gstreamer.freedesktop.org/security/sa-2024-0027.html

  • https://gitlab.freedesktop.org/gstreamer/gstreamer/-/issues/3886

  • https://gitlab.freedesktop.org/gstreamer/gstreamer/-/issues/3888

  • Fixed by: https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8042

  • Fixed by: https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8054 (1.24.10)

EPSS

Процентиль: 34%
0.0013
Низкий

Связанные уязвимости

CVSS3: 9.1
ubuntu
6 месяцев назад

GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerability has been identified in the gst_wavparse_smpl_chunk function within gstwavparse.c. This function attempts to read 4 bytes from the data + 12 offset without checking if the size of the data buffer is sufficient. If the buffer is too small, the function reads beyond its bounds. This vulnerability may result in reading 4 bytes out of the boundaries of the data buffer. This vulnerability is fixed in 1.24.10.

CVSS3: 5.1
redhat
6 месяцев назад

GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerability has been identified in the gst_wavparse_smpl_chunk function within gstwavparse.c. This function attempts to read 4 bytes from the data + 12 offset without checking if the size of the data buffer is sufficient. If the buffer is too small, the function reads beyond its bounds. This vulnerability may result in reading 4 bytes out of the boundaries of the data buffer. This vulnerability is fixed in 1.24.10.

CVSS3: 9.1
nvd
6 месяцев назад

GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerability has been identified in the gst_wavparse_smpl_chunk function within gstwavparse.c. This function attempts to read 4 bytes from the data + 12 offset without checking if the size of the data buffer is sufficient. If the buffer is too small, the function reads beyond its bounds. This vulnerability may result in reading 4 bytes out of the boundaries of the data buffer. This vulnerability is fixed in 1.24.10.

CVSS3: 9.1
fstec
9 месяцев назад

Уязвимость функции gst_wavparse_smpl_chunk мультимедийного фреймворка Gstreamer, позволяющая нарушителю вызвать отказ в обслуживании

oracle-oval
около 1 месяца назад

ELSA-2025-7242: gstreamer1-plugins-good security update (MODERATE)

EPSS

Процентиль: 34%
0.0013
Низкий