CVE-2024-47597

Publication date 12 December 2024

Last updated 20 December 2024


Ubuntu priority

Cvss 3 Severity Score

9.1 · Critical

Score breakdown

GStreamer is a library for constructing graphs of media-handling components. An OOB-read has been detected in the function qtdemux_parse_samples within qtdemux.c. This issue arises when the function qtdemux_parse_samples reads data beyond the boundaries of the stream->stco buffer. The following code snippet shows the call to qt_atom_parser_get_offset_unchecked, which leads to the OOB-read when parsing the provided GHSL-2024-245_crash1.mp4 file. This issue may lead to read up to 8 bytes out-of-bounds. This vulnerability is fixed in 1.24.10.

Read the notes from the security team

Status

Package Ubuntu Release Status
gst-plugins-good0.10 25.04 plucky Not in release
24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal Not in release
16.04 LTS xenial
Needs evaluation
gst-plugins-good1.0 25.04 plucky
Not affected
24.10 oracular
Fixed 1.24.8-1ubuntu1.1
24.04 LTS noble
Fixed 1.24.2-1ubuntu1.1
22.04 LTS jammy
Fixed 1.20.3-0ubuntu1.3
20.04 LTS focal
Fixed 1.16.3-0ubuntu1.3
18.04 LTS bionic
Needs evaluation
16.04 LTS xenial
Needs evaluation

Notes


mdeslaur

same commits as listed in CVE-2024-47537

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
gst-plugins-good1.0

Severity score breakdown

Parameter Value
Base score 9.1 · Critical
Attack vector Network
Attack complexity Low
Privileges required None
User interaction None
Scope Unchanged
Confidentiality High
Integrity impact None
Availability impact High
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H