GStreamer
open source multimedia framework
Home
Features
News
Annual Conference
Planet (Blogs)
Download
Applications
Security Center
GitLab
Developers
Documentation
Forum
File a Bug
Artwork
@gstreamer on Twitter
@gstreamer on Mastodon
#gstreamer on Matrix

Security Advisory 2024-0027 (GHSL-2024-261, GHSL-2024-260, GHSL-2024-259, GHSL-2024-258, CVE-2024-47778, CVE-2024-47777, CVE-2024-47776, CVE-2024-47775)

Summary Various out-of-bounds reads in WAV parser
Date 2024-12-03 20:00
Affected Versions GStreamer gst-plugins-good < 1.24.10
IDs GStreamer-SA-2024-0027
GHSL-2024-261, GHSL-2024-260, GHSL-2024-259, GHSL-2024-258
CVE-2024-47778, CVE-2024-47777, CVE-2024-47776, CVE-2024-47775

Details

Various out-of-bounds reads in the WAV parser that can cause crashes for certain input files.

Impact

It is possible for a malicious third party to trigger out-of-bounds reads that can result in a crash of the application.

Solution

The gst-plugins-good 1.24.10 release addresses the issue. People using older branches of GStreamer should apply the patch and recompile.

References

The GStreamer project

CVE Database Entries

GStreamer releases

1.24 (current stable)

Patches


Report a problem on this page.