vulnerability
Red Hat: CVE-2024-47545: gstreamer1-plugins-good: integer underflow in FOURCC_strf parsing leading to OOB-read (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
5 | (AV:L/AC:L/Au:N/C:N/I:N/A:C) | Dec 12, 2024 | May 14, 2025 | May 14, 2025 |
Severity
5
CVSS
(AV:L/AC:L/Au:N/C:N/I:N/A:C)
Published
Dec 12, 2024
Added
May 14, 2025
Modified
May 14, 2025
Description
GStreamer is a library for constructing graphs of media-handling components. An integer underflow has been detected in qtdemux_parse_trak function within qtdemux.c. During the strf parsing case, the subtraction size -= 40 can lead to a negative integer overflow if it is less than 40. If this happens, the subsequent call to gst_buffer_fill will invoke memcpy with a large tocopy size, resulting in an OOB-read. This vulnerability is fixed in 1.24.10.
Solution(s)
redhat-upgrade-gstreamer1-plugins-goodredhat-upgrade-gstreamer1-plugins-good-debuginforedhat-upgrade-gstreamer1-plugins-good-debugsourceredhat-upgrade-gstreamer1-plugins-good-gtkredhat-upgrade-gstreamer1-plugins-good-gtk-debuginforedhat-upgrade-gstreamer1-plugins-good-qt-debuginfo
References

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.