vulnerability

Red Hat: CVE-2024-47539: gstreamer1-plugins-good: OOB-write in convert_to_s334_1a (Multiple Advisories)

Severity
10
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
Dec 12, 2024
Added
Feb 10, 2025
Modified
Sep 26, 2025

Description

GStreamer is a library for constructing graphs of media-handling components. An out-of-bounds write vulnerability was identified in the convert_to_s334_1a function in isomp4/qtdemux.c. The vulnerability arises due to a discrepancy between the size of memory allocated to the storage array and the loop condition i * 2 < ccpair_size. Specifically, when ccpair_size is even, the allocated size in storage does not match the loop's expected bounds, resulting in an out-of-bounds write. This bug allows for the overwriting of up to 3 bytes beyond the allocated bounds of the storage array. This vulnerability is fixed in 1.24.10.

Solutions

redhat-upgrade-gstreamer1-plugins-goodredhat-upgrade-gstreamer1-plugins-good-debuginforedhat-upgrade-gstreamer1-plugins-good-debugsourceredhat-upgrade-gstreamer1-plugins-good-gtkredhat-upgrade-gstreamer1-plugins-good-gtk-debuginforedhat-upgrade-gstreamer1-plugins-good-qt-debuginfo
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.