CVE-2024-47613

GStreamer is a library for constructing graphs of media-handling components. A null pointer dereference vulnerability has been identified in `gst_gdk_pixbuf_dec_flush` within `gstgdkpixbufdec.c`. This function invokes `memcpy`, using `out_pix` as the destination address. `out_pix` is expected to point to the frame 0 from the frame structure, which is read from the input file. However, in certain situations, it can points to a NULL frame, causing the subsequent call to `memcpy` to attempt writing to the null address (0x00), leading to a null pointer dereference. This vulnerability can result in a Denial of Service (DoS) by triggering a segmentation fault (SEGV). This vulnerability is fixed in 1.24.10.
Configurations

Configuration 1 (hide)

cpe:2.3:a:gstreamer_project:gstreamer:*:*:*:*:*:*:*:*

History

19 Dec 2024, 22:15

Type Values Removed Values Added
Summary (en) GStreamer is a library for constructing graphs of media-handling components. A stack-buffer overflow has been detected in the vorbis_handle_identification_packet function within gstvorbisdec.c. The position array is a stack-allocated buffer of size 64. If vd->vi.channels exceeds 64, the for loop will write beyond the boundaries of the position array. The value written will always be GST_AUDIO_CHANNEL_POSITION_NONE. This vulnerability allows to overwrite the EIP address allocated in the stack. Additionally, this bug can overwrite the GstAudioInfo info structure. This vulnerability is fixed in 1.24.10. (en) GStreamer is a library for constructing graphs of media-handling components. A null pointer dereference vulnerability has been identified in `gst_gdk_pixbuf_dec_flush` within `gstgdkpixbufdec.c`. This function invokes `memcpy`, using `out_pix` as the destination address. `out_pix` is expected to point to the frame 0 from the frame structure, which is read from the input file. However, in certain situations, it can points to a NULL frame, causing the subsequent call to `memcpy` to attempt writing to the null address (0x00), leading to a null pointer dereference. This vulnerability can result in a Denial of Service (DoS) by triggering a segmentation fault (SEGV). This vulnerability is fixed in 1.24.10.

18 Dec 2024, 19:55

Type Values Removed Values Added
First Time Gstreamer Project gstreamer
Gstreamer Project
CPE cpe:2.3:a:gstreamer_project:gstreamer:*:*:*:*:*:*:*:*
CWE CWE-787
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
References () https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8041.patch - () https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8041.patch - Patch
References () https://gstreamer.freedesktop.org/security/sa-2024-0025.html - () https://gstreamer.freedesktop.org/security/sa-2024-0025.html - Release Notes
References () https://securitylab.github.com/advisories/GHSL-2024-115_GHSL-2024-118_Gstreamer/ - () https://securitylab.github.com/advisories/GHSL-2024-115_GHSL-2024-118_Gstreamer/ - Third Party Advisory
Summary
  • (es) GStreamer es una librería para construir gráficos de componentes de manejo de medios. Se ha detectado un desbordamiento del búfer de pila en la función vorbis_handle_identification_packet dentro de gstvorbisdec.c. La matriz de posición es un búfer asignado a la pila de tamaño 64. Si vd->vi.channels supera los 64, el bucle for escribirá más allá de los límites de la matriz de posición. El valor escrito siempre será GST_AUDIO_CHANNEL_POSITION_NONE. Esta vulnerabilidad permite sobrescribir la dirección EIP asignada en la pila. Además, este error puede sobrescribir la estructura de información GstAudioInfo. Esta vulnerabilidad se corrigió en 1.24.10.

12 Dec 2024, 02:03

Type Values Removed Values Added
New CVE

Information

Published : 2024-12-12 02:03

Updated : 2024-12-19 22:15


NVD link : CVE-2024-47613

Mitre link : CVE-2024-47613

CVE.ORG link : CVE-2024-47613


JSON object : View

Products Affected

gstreamer_project

  • gstreamer
CWE
CWE-476

NULL Pointer Dereference

CWE-787

Out-of-bounds Write