GStreamer
open source multimedia framework
Home
Features
News
Annual Conference
Planet (Blogs)
Download
Applications
Security Center
GitLab
Developers
Documentation
Forum
File a Bug
Artwork
@gstreamer on Twitter
@gstreamer on Mastodon
#gstreamer on Matrix

Security Advisory 2024-0005 (GHSL-2024-094, GHSL-2024-237, GHSL-2024-241, CVE-2024-47537)

Summary Integer overflow in MP4/MOV sample table parser leading to out-of-bounds writes
Date 2024-12-03 20:00
Affected Versions GStreamer gst-plugins-good < 1.24.10
IDs GStreamer-SA-2024-0005
GHSL-2024-094, GHSL-2024-237, GHSL-2024-241
CVE-2024-47537

Details

Integer overflow in the MP4/MOV demuxer's sample table parser that can lead to out-of-bounds writes and NULL-pointer dereferences for certain input files.

Impact

It is possible for a malicious third party to trigger an out-of-bounds write or NULL-pointer dereferences that result in a crash of the application, and, in case of out-of-bounds writes, possibly also allow code execution through heap manipulation.

Solution

The gst-plugins-good 1.24.10 release addresses the issue. People using older branches of GStreamer should apply the patch and recompile.

References

The GStreamer project

CVE Database Entries

GStreamer releases

1.24 (current stable)

Patches


Report a problem on this page.