# Security Advisory 2024-0027 (GHSL-2024-261, GHSL-2024-260, GHSL-2024-259, GHSL-2024-258, CVE-2024-47778, CVE-2024-47777, CVE-2024-47776, CVE-2024-47775)
| | | | ----------------- | --- | | Summary | Various out-of-bounds reads in WAV parser | | Date | 2024-12-03 20:00 | | Affected Versions | GStreamer gst-plugins-good < 1.24.10 | | IDs | GStreamer-SA-2024-0027
GHSL-2024-261, GHSL-2024-260, GHSL-2024-259, GHSL-2024-258
CVE-2024-47778, CVE-2024-47777, CVE-2024-47776, CVE-2024-47775 |
## Details Various out-of-bounds reads in the WAV parser that can cause crashes for certain input files. ## Impact It is possible for a malicious third party to trigger out-of-bounds reads that can result in a crash of the application. ## Solution The gst-plugins-good 1.24.10 release addresses the issue. People using older branches of GStreamer should apply the patch and recompile. ## References ### The GStreamer project - [https://gstreamer.freedesktop.org](https://gstreamer.freedesktop.org) ### CVE Database Entries - [CVE-2024-47778](https://www.cve.org/CVERecord?id=CVE-2024-47778) - [CVE-2024-47777](https://www.cve.org/CVERecord?id=CVE-2024-47777) - [CVE-2024-47776](https://www.cve.org/CVERecord?id=CVE-2024-47776) - [CVE-2024-47775](https://www.cve.org/CVERecord?id=CVE-2024-47775) ### GStreamer releases #### 1.24 (current stable) - [GStreamer 1.24.10 release notes](/releases/1.24/#1.24.10) - [GStreamer Plugins Good 1.24.10](/src/gst-plugins-good/gst-plugins-good-1.24.10.tar.xz) ### Patches - [Patch](https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8042.patch)