Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-47778

Опубликовано: 12 дек. 2024
Источник: debian
EPSS Низкий

Описание

GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerability has been discovered in gst_wavparse_adtl_chunk within gstwavparse.c. This vulnerability arises due to insufficient validation of the size parameter, which can exceed the bounds of the data buffer. As a result, an OOB read occurs in the following while loop. This vulnerability can result in reading up to 4GB of process memory or potentially causing a segmentation fault (SEGV) when accessing invalid memory. This vulnerability is fixed in 1.24.10.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
gst-plugins-good1.0fixed1.24.10-1package
gst-plugins-good0.10removedpackage

Примечания

  • https://securitylab.github.com/advisories/GHSL-2024-258_Gstreamer/

  • https://gstreamer.freedesktop.org/security/sa-2024-0027.html

  • https://gitlab.freedesktop.org/gstreamer/gstreamer/-/issues/3886

  • https://gitlab.freedesktop.org/gstreamer/gstreamer/-/issues/3888

  • Fixed by: https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8042

  • Fixed by: https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8054 (1.24.10)

EPSS

Процентиль: 38%
0.00164
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
8 месяцев назад

GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerability has been discovered in gst_wavparse_adtl_chunk within gstwavparse.c. This vulnerability arises due to insufficient validation of the size parameter, which can exceed the bounds of the data buffer. As a result, an OOB read occurs in the following while loop. This vulnerability can result in reading up to 4GB of process memory or potentially causing a segmentation fault (SEGV) when accessing invalid memory. This vulnerability is fixed in 1.24.10.

CVSS3: 5.1
redhat
8 месяцев назад

GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerability has been discovered in gst_wavparse_adtl_chunk within gstwavparse.c. This vulnerability arises due to insufficient validation of the size parameter, which can exceed the bounds of the data buffer. As a result, an OOB read occurs in the following while loop. This vulnerability can result in reading up to 4GB of process memory or potentially causing a segmentation fault (SEGV) when accessing invalid memory. This vulnerability is fixed in 1.24.10.

CVSS3: 7.5
nvd
8 месяцев назад

GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerability has been discovered in gst_wavparse_adtl_chunk within gstwavparse.c. This vulnerability arises due to insufficient validation of the size parameter, which can exceed the bounds of the data buffer. As a result, an OOB read occurs in the following while loop. This vulnerability can result in reading up to 4GB of process memory or potentially causing a segmentation fault (SEGV) when accessing invalid memory. This vulnerability is fixed in 1.24.10.

CVSS3: 7.5
fstec
10 месяцев назад

Уязвимость функции gst_wavparse_adtl_chunkмультимедийного фреймворка Gstreamer, позволяющая нарушителю вызвать отказ в обслуживании

oracle-oval
3 месяца назад

ELSA-2025-7242: gstreamer1-plugins-good security update (MODERATE)

EPSS

Процентиль: 38%
0.00164
Низкий