CVE-2024-47613

GStreamer is a library for constructing graphs of media-handling components. A null pointer dereference vulnerability has been identified in `gst_gdk_pixbuf_dec_flush` within `gstgdkpixbufdec.c`. This function invokes `memcpy`, using `out_pix` as the destination address. `out_pix` is expected to point to the frame 0 from the frame structure, which is read from the input file. However, in certain situations, it can points to a NULL frame, causing the subsequent call to `memcpy` to attempt writing to the null address (0x00), leading to a null pointer dereference. This vulnerability can result in a Denial of Service (DoS) by triggering a segmentation fault (SEGV). This vulnerability is fixed in 1.24.10.
Configurations

Configuration 1 (hide)

cpe:2.3:a:gstreamer_project:gstreamer:*:*:*:*:*:*:*:*

History

19 Dec 2024, 22:15

Type Values Removed Values Added
Summary GStreamer is a library for constructing graphs of media-handling components. A stack-buffer overflow has been detected in the vorbis_handle_identification_packet function within gstvorbisdec.c. The position array is a stack-allocated buffer of size 64. If vd->vi.channels exceeds 64, the for loop will write beyond the boundaries of the position array. The value written will always be GST_AUDIO_CHANNEL_POSITION_NONE. This vulnerability allows to overwrite the EIP address allocated in the stack. Additionally, this bug can overwrite the GstAudioInfo info structure. This vulnerability is fixed in 1.24.10. GStreamer is a library for constructing graphs of media-handling components. A null pointer dereference vulnerability has been identified in `gst_gdk_pixbuf_dec_flush` within `gstgdkpixbufdec.c`. This function invokes `memcpy`, using `out_pix` as the destination address. `out_pix` is expected to point to the frame 0 from the frame structure, which is read from the input file. However, in certain situations, it can points to a NULL frame, causing the subsequent call to `memcpy` to attempt writing to the null address (0x00), leading to a null pointer dereference. This vulnerability can result in a Denial of Service (DoS) by triggering a segmentation fault (SEGV). This vulnerability is fixed in 1.24.10.

18 Dec 2024, 19:55

Type Values Removed Values Added
CPE cpe:2.3:a:gstreamer_project:gstreamer:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
References () https://gstreamer.freedesktop.org/security/sa-2024-0025.html - () https://gstreamer.freedesktop.org/security/sa-2024-0025.html - Release Notes
References () https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8041.patch - () https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8041.patch - Patch
References () https://securitylab.github.com/advisories/GHSL-2024-115_GHSL-2024-118_Gstreamer/ - () https://securitylab.github.com/advisories/GHSL-2024-115_GHSL-2024-118_Gstreamer/ - Third Party Advisory
First Time Gstreamer Project gstreamer
Gstreamer Project
CWE CWE-476 CWE-787

12 Dec 2024, 02:03

Type Values Removed Values Added
New CVE

Information

Published : 2024-12-12 02:03

Updated : 2024-12-19 22:15


NVD link : CVE-2024-47613

Mitre link : CVE-2024-47613


JSON object : View

Products Affected

gstreamer_project

  • gstreamer
CWE
CWE-787

Out-of-bounds Write