Описание
GStreamer is a library for constructing graphs of media-handling components. A stack-buffer overflow has been detected in the vorbis_handle_identification_packet
function within gstvorbisdec.c
. The position array is a stack-allocated buffer of size 64. If vd->vi.channels exceeds 64, the for loop will write beyond the boundaries of the position array. The value written will always be GST_AUDIO_CHANNEL_POSITION_NONE
. This vulnerability allows someone to overwrite the EIP address allocated in the stack. Additionally, this bug can overwrite the GstAudioInfo
info structure. This vulnerability is fixed in 1.24.10.
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-apps/xenial | needs-triage | |
esm-infra/focal | DNE | |
focal | DNE | |
jammy | DNE | |
noble | DNE | |
oracular | DNE | |
plucky | DNE | |
upstream | needs-triage |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | 1.24.10-1 |
esm-infra/bionic | needs-triage | |
esm-infra/focal | not-affected | 1.16.3-0ubuntu1.4 |
esm-infra/xenial | needs-triage | |
focal | released | 1.16.3-0ubuntu1.4 |
jammy | released | 1.20.1-1ubuntu0.4 |
noble | released | 1.24.2-1ubuntu0.2 |
oracular | released | 1.24.8-1ubuntu0.1 |
plucky | not-affected | 1.24.10-1 |
upstream | released | 1.24.10-1 |
Показывать по
EPSS
9.8 Critical
CVSS3
Связанные уязвимости
GStreamer is a library for constructing graphs of media-handling components. A stack-buffer overflow has been detected in the `vorbis_handle_identification_packet` function within `gstvorbisdec.c`. The position array is a stack-allocated buffer of size 64. If vd->vi.channels exceeds 64, the for loop will write beyond the boundaries of the position array. The value written will always be `GST_AUDIO_CHANNEL_POSITION_NONE`. This vulnerability allows someone to overwrite the EIP address allocated in the stack. Additionally, this bug can overwrite the `GstAudioInfo` info structure. This vulnerability is fixed in 1.24.10.
GStreamer is a library for constructing graphs of media-handling components. A stack-buffer overflow has been detected in the `vorbis_handle_identification_packet` function within `gstvorbisdec.c`. The position array is a stack-allocated buffer of size 64. If vd->vi.channels exceeds 64, the for loop will write beyond the boundaries of the position array. The value written will always be `GST_AUDIO_CHANNEL_POSITION_NONE`. This vulnerability allows someone to overwrite the EIP address allocated in the stack. Additionally, this bug can overwrite the `GstAudioInfo` info structure. This vulnerability is fixed in 1.24.10.
GStreamer is a library for constructing graphs of media-handling compo ...
Уязвимость мультимедийного фреймворка Gstreamer, связанная с переполнением буфера на стеке, позволяющая нарушителю вызвать отказ в обслуживании
EPSS
9.8 Critical
CVSS3