GStreamer is a library for constructing graphs of media-handling components. An OOB-write vulnerability has been identified in the gst_ssa_parse_remove_override_codes function of the gstssaparse.c file. This function is responsible for parsing and removing SSA (SubStation Alpha) style override codes, which are enclosed in curly brackets ({}). The issue arises when a closing curly bracket "}" appears before an opening curly bracket "{" in the input string. In this case, memmove() incorrectly duplicates a substring. With each successive loop iteration, the size passed to memmove() becomes progressively larger (strlen(end+1)), leading to a write beyond the allocated memory bounds. This vulnerability is fixed in 1.24.10.
References
Link | Resource |
---|---|
https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8036.patch | Patch |
https://gstreamer.freedesktop.org/security/sa-2024-0023.html | Patch Release Notes |
https://securitylab.github.com/advisories/GHSL-2024-228_GStreamer/ | Exploit Third Party Advisory |
Configurations
History
13 Dec 2024, 19:21
Type | Values Removed | Values Added |
---|---|---|
First Time |
Gstreamer Project gstreamer
Gstreamer Project |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
Summary |
|
|
References | () https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8036.patch - Patch | |
References | () https://gstreamer.freedesktop.org/security/sa-2024-0023.html - Patch, Release Notes | |
References | () https://securitylab.github.com/advisories/GHSL-2024-228_GStreamer/ - Exploit, Third Party Advisory | |
CPE | cpe:2.3:a:gstreamer_project:gstreamer:*:*:*:*:*:*:*:* |
12 Dec 2024, 02:03
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-12-12 02:03
Updated : 2024-12-13 19:21
NVD link : CVE-2024-47541
Mitre link : CVE-2024-47541
CVE.ORG link : CVE-2024-47541
JSON object : View
Products Affected
gstreamer_project
- gstreamer
CWE
CWE-787
Out-of-bounds Write