CVE-2024-47776
Błąd OOB-read w GStreamer umożliwia odczyt danych poza granicami bufora, co może prowadzić do awarii lub wycieku wrażliwych informacji.
GStreamer is a library for constructing graphs of media-handling components. An OOB-read has been discovered in gst_wavparse_cue_chunk within gstwavparse.c. The vulnerability happens due to a discrepancy between the size of the data buffer and the size value provided to the function. This mismatch causes the comparison if (size < 4 + ncues * 24) to fail in some cases, allowing the subsequent loop to access beyond the bounds of the data buffer. The root cause of this discrepancy stems from a miscalculation when clipping the chunk size based on upstream data size. This vulnerability allows reading beyond the bounds of the data buffer, potentially leading to a crash (denial of service) or the leak of sensitive data. This vulnerability is fixed in 1.24.10.
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 9.1 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 0.1% |
| Opublikowano (NVD) | 2024-12-12 02:03:40 UTC |
| Ostatnia modyfikacja (NVD) | 2026-03-17 15:52:33 UTC |
- https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8042.patch (security-advisories@github.com) [Patch]
- https://gstreamer.freedesktop.org/security/sa-2024-0027.html (security-advisories@github.com) [Release Notes]
- https://securitylab.github.com/advisories/GHSL-2024-260_Gstreamer/ (security-advisories@github.com) [Third Party Advisory]
- https://lists.debian.org/debian-lts-announce/2025/02/msg00035.html (af854a3a-2127-422b-91ae-364da2661108)