mirror of
https://gitlab.freedesktop.org/gstreamer/gstreamer.git
synced 2025-02-07 06:52:41 +00:00
1.6 KiB
1.6 KiB
Security Advisory 2024-0005 (GHSL-2024-094, GHSL-2024-237, GHSL-2024-241, CVE-2024-47537)
Summary | Integer overflow in MP4/MOV sample table parser leading to out-of-bounds writes |
Date | 2024-12-03 20:00 |
Affected Versions | GStreamer gst-plugins-good < 1.24.10 |
IDs | GStreamer-SA-2024-0005 GHSL-2024-094, GHSL-2024-237, GHSL-2024-241 CVE-2024-47537 |
Details
Integer overflow in the MP4/MOV demuxer's sample table parser that can lead to out-of-bounds writes and NULL-pointer dereferences for certain input files.
Impact
It is possible for a malicious third party to trigger an out-of-bounds write or NULL-pointer dereferences that result in a crash of the application, and, in case of out-of-bounds writes, possibly also allow code execution through heap manipulation.
Solution
The gst-plugins-good 1.24.10 release addresses the issue. People using older branches of GStreamer should apply the patch and recompile.