Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2024-47606

Опубликовано: 12 дек. 2024
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 9.8

Описание

GStreamer is a library for constructing graphs of media-handling components. An integer underflow has been detected in the function qtdemux_parse_theora_extension within qtdemux.c. The vulnerability occurs due to an underflow of the gint size variable, which causes size to hold a large unintended value when cast to an unsigned integer. This 32-bit negative value is then cast to a 64-bit unsigned integer (0xfffffffffffffffa) in a subsequent call to gst_buffer_new_and_alloc. The function gst_buffer_new_allocate then attempts to allocate memory, eventually calling _sysmem_new_block. The function _sysmem_new_block adds alignment and header size to the (unsigned) size, causing the overflow of the 'slice_size' variable. As a result, only 0x89 bytes are allocated, despite the large input size. When the following memcpy call occurs in gst_buffer_fill, the data from the input file will overwrite the content of the GstMapInfo info structure. Finally, during the call to gst_memory_unmap, the o...

РелизСтатусПримечание
devel

DNE

esm-apps/xenial

needs-triage

esm-infra/focal

DNE

focal

DNE

jammy

DNE

noble

DNE

oracular

DNE

plucky

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

not-affected

1.24.10-1ubuntu1
esm-infra/bionic

needs-triage

esm-infra/focal

not-affected

1.16.3-0ubuntu1.3
esm-infra/xenial

needs-triage

focal

released

1.16.3-0ubuntu1.3
jammy

released

1.20.3-0ubuntu1.3
noble

released

1.24.2-1ubuntu1.1
oracular

released

1.24.8-1ubuntu1.1
plucky

not-affected

1.24.10-1ubuntu1
upstream

released

1.24.10-1

Показывать по

РелизСтатусПримечание
devel

DNE

esm-apps/xenial

needs-triage

esm-infra-legacy/trusty

needs-triage

esm-infra/focal

DNE

focal

DNE

jammy

DNE

noble

DNE

oracular

DNE

plucky

DNE

trusty/esm

ignored

end of ESM support, was needs-triage

Показывать по

РелизСтатусПримечание
devel

not-affected

1.24.10-2
esm-infra/bionic

needs-triage

esm-infra/focal

not-affected

1.16.3-0ubuntu1.2
esm-infra/xenial

needs-triage

focal

released

1.16.3-0ubuntu1.2
jammy

released

1.20.3-0ubuntu1.1
noble

released

1.24.2-1ubuntu0.1
oracular

released

1.24.8-1ubuntu0.1
plucky

not-affected

1.24.10-2
upstream

released

1.24.10-1

Показывать по

EPSS

Процентиль: 50%
0.00264
Низкий

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 8.8
redhat
6 месяцев назад

GStreamer is a library for constructing graphs of media-handling components. An integer underflow has been detected in the function qtdemux_parse_theora_extension within qtdemux.c. The vulnerability occurs due to an underflow of the gint size variable, which causes size to hold a large unintended value when cast to an unsigned integer. This 32-bit negative value is then cast to a 64-bit unsigned integer (0xfffffffffffffffa) in a subsequent call to gst_buffer_new_and_alloc. The function gst_buffer_new_allocate then attempts to allocate memory, eventually calling _sysmem_new_block. The function _sysmem_new_block adds alignment and header size to the (unsigned) size, causing the overflow of the 'slice_size' variable. As a result, only 0x89 bytes are allocated, despite the large input size. When the following memcpy call occurs in gst_buffer_fill, the data from the input file will overwrite the content of the GstMapInfo info structure. Finally, during the call to gst_memory_unmap, the o...

CVSS3: 9.8
nvd
6 месяцев назад

GStreamer is a library for constructing graphs of media-handling components. An integer underflow has been detected in the function qtdemux_parse_theora_extension within qtdemux.c. The vulnerability occurs due to an underflow of the gint size variable, which causes size to hold a large unintended value when cast to an unsigned integer. This 32-bit negative value is then cast to a 64-bit unsigned integer (0xfffffffffffffffa) in a subsequent call to gst_buffer_new_and_alloc. The function gst_buffer_new_allocate then attempts to allocate memory, eventually calling _sysmem_new_block. The function _sysmem_new_block adds alignment and header size to the (unsigned) size, causing the overflow of the 'slice_size' variable. As a result, only 0x89 bytes are allocated, despite the large input size. When the following memcpy call occurs in gst_buffer_fill, the data from the input file will overwrite the content of the GstMapInfo info structure. Finally, during the call to gst_memory_unmap, the over

CVSS3: 9.8
debian
6 месяцев назад

GStreamer is a library for constructing graphs of media-handling compo ...

suse-cvrf
5 месяцев назад

Security update for gstreamer

suse-cvrf
5 месяцев назад

Security update for gstreamer

EPSS

Процентиль: 50%
0.00264
Низкий

9.8 Critical

CVSS3

Уязвимость CVE-2024-47606