mirror of
https://gitlab.freedesktop.org/gstreamer/gstreamer.git
synced 2024-12-18 14:26:43 +00:00
95ca7014c8
Ship these also as part of the monorepo, so we can prepare new advisories as part of the relevant merge requests in the private gstreamer-security repository. Part-of: <https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/7610>
48 lines
1.5 KiB
Markdown
48 lines
1.5 KiB
Markdown
# Security Advisory 2023-0002 (ZDI-CAN-20968, CVE-2023-37328)
|
|
|
|
<div class="vertical-table">
|
|
|
|
| | |
|
|
| ----------------- | --- |
|
|
| Summary | Heap overwrite in subtitle parsing |
|
|
| Date | 2023-06-20 18:00 |
|
|
| Affected Versions | GStreamer gst-plugins-base 1.x < 1.22.4, 1.x < 1.20.7, 0.10.x |
|
|
| IDs | GStreamer-SA-2023-0002<br/>ZDI-CAN-20968<br/>CVE-2023-37328 |
|
|
|
|
</div>
|
|
|
|
## Details
|
|
|
|
Heap-based buffer overflow in the subparse subtitle parser when handling certain SRT subtitle files in GStreamer versions before 1.22.4 / 1.20.7.
|
|
|
|
## Impact
|
|
|
|
It is possible for a malicious third party to trigger a crash in the application, and possibly also effect code execution through heap manipulation.
|
|
|
|
## Solution
|
|
|
|
The gst-plugins-base 1.22.4 / 1.20.7 releases address the issue. People using older branches of GStreamer should apply the patch and recompile.
|
|
|
|
## References
|
|
|
|
### The GStreamer project
|
|
|
|
- [https://gstreamer.freedesktop.org](https://gstreamer.freedesktop.org)
|
|
|
|
### CVE Database Entries
|
|
|
|
- [CVE-2023-37328](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37328)
|
|
|
|
### GStreamer 1.22.4 release
|
|
|
|
- [Release Notes](/releases/1.22/#1.22.4)
|
|
- [GStreamer Plugins Base 1.22.4](/src/gst-plugins-base/gst-plugins-base-1.22.4.tar.xz)
|
|
|
|
### GStreamer 1.20.7 release
|
|
|
|
- [Release Notes](/releases/1.20/#1.20.7)
|
|
- [GStreamer Plugins Base 1.20.7](/src/gst-plugins-base/gst-plugins-base-1.20.7.tar.xz)
|
|
|
|
### Patches
|
|
|
|
- [Patches](https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/4895.patch)
|