CVE-2024-47613

GStreamer is a library for constructing graphs of media-handling components. A null pointer dereference vulnerability has been identified in `gst_gdk_pixbuf_dec_flush` within `gstgdkpixbufdec.c`. This function invokes `memcpy`, using `out_pix` as the destination address. `out_pix` is expected to point to the frame 0 from the frame structure, which is read from the input file. However, in certain situations, it can points to a NULL frame, causing the subsequent call to `memcpy` to attempt writing to the null address (0x00), leading to a null pointer dereference. This vulnerability can result in a Denial of Service (DoS) by triggering a segmentation fault (SEGV). This vulnerability is fixed in 1.24.10.
Configurations

Configuration 1 (hide)

cpe:2.3:a:gstreamer_project:gstreamer:*:*:*:*:*:*:*:*

History

19 Dec 2024, 22:15

Type Values Removed Values Added
Summary (en) GStreamer is a library for constructing graphs of media-handling components. A stack-buffer overflow has been detected in the vorbis_handle_identification_packet function within gstvorbisdec.c. The position array is a stack-allocated buffer of size 64. If vd->vi.channels exceeds 64, the for loop will write beyond the boundaries of the position array. The value written will always be GST_AUDIO_CHANNEL_POSITION_NONE. This vulnerability allows to overwrite the EIP address allocated in the stack. Additionally, this bug can overwrite the GstAudioInfo info structure. This vulnerability is fixed in 1.24.10. (en) GStreamer is a library for constructing graphs of media-handling components. A null pointer dereference vulnerability has been identified in `gst_gdk_pixbuf_dec_flush` within `gstgdkpixbufdec.c`. This function invokes `memcpy`, using `out_pix` as the destination address. `out_pix` is expected to point to the frame 0 from the frame structure, which is read from the input file. However, in certain situations, it can points to a NULL frame, causing the subsequent call to `memcpy` to attempt writing to the null address (0x00), leading to a null pointer dereference. This vulnerability can result in a Denial of Service (DoS) by triggering a segmentation fault (SEGV). This vulnerability is fixed in 1.24.10.

18 Dec 2024, 19:55

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
Summary
  • (es) GStreamer es una librería para construir gráficos de componentes de manejo de medios. Se ha detectado un desbordamiento del búfer de pila en la función vorbis_handle_identification_packet dentro de gstvorbisdec.c. La matriz de posición es un búfer asignado a la pila de tamaño 64. Si vd->vi.channels supera los 64, el bucle for escribirá más allá de los límites de la matriz de posición. El valor escrito siempre será GST_AUDIO_CHANNEL_POSITION_NONE. Esta vulnerabilidad permite sobrescribir la dirección EIP asignada en la pila. Además, este error puede sobrescribir la estructura de información GstAudioInfo. Esta vulnerabilidad se corrigió en 1.24.10.
CWE CWE-787
First Time Gstreamer Project gstreamer
Gstreamer Project
CPE cpe:2.3:a:gstreamer_project:gstreamer:*:*:*:*:*:*:*:*
References () https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8041.patch - () https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8041.patch - Patch
References () https://gstreamer.freedesktop.org/security/sa-2024-0025.html - () https://gstreamer.freedesktop.org/security/sa-2024-0025.html - Release Notes
References () https://securitylab.github.com/advisories/GHSL-2024-115_GHSL-2024-118_Gstreamer/ - () https://securitylab.github.com/advisories/GHSL-2024-115_GHSL-2024-118_Gstreamer/ - Third Party Advisory

12 Dec 2024, 02:03

Type Values Removed Values Added
New CVE

Information

Published : 2024-12-12 02:03

Updated : 2024-12-19 22:15


NVD link : CVE-2024-47613

Mitre link : CVE-2024-47613

CVE.ORG link : CVE-2024-47613


JSON object : View

Products Affected

gstreamer_project

  • gstreamer
CWE
CWE-476

NULL Pointer Dereference

CWE-787

Out-of-bounds Write