First published: Wed Dec 11 2024(Updated: )
GStreamer is a library for constructing graphs of media-handling components. An out-of-bounds write vulnerability was identified in the convert_to_s334_1a function in isomp4/qtdemux.c. The vulnerability arises due to a discrepancy between the size of memory allocated to the storage array and the loop condition i * 2 < ccpair_size. Specifically, when ccpair_size is even, the allocated size in storage does not match the loop's expected bounds, resulting in an out-of-bounds write. This bug allows for the overwriting of up to 3 bytes beyond the allocated bounds of the storage array. This vulnerability is fixed in 1.24.10.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
GStreamer | <1.24.10 | |
debian/gst-plugins-good1.0 | <=1.18.4-2+deb11u2 | 1.22.0-5+deb12u2 1.24.12-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-47539 has been rated as a high severity vulnerability due to its potential for exploitation via out-of-bounds writes.
To fix CVE-2024-47539, upgrade your GStreamer installation to versions 1.22.0-5+deb12u2 or 1.24.11-5.
CVE-2024-47539 affects GStreamer versions prior to 1.24.11 and those up to and including 1.18.4-2+deb11u2.
The vulnerable component in CVE-2024-47539 is the convert_to_s334_1a function found in isomp4/qtdemux.c.
Yes, CVE-2024-47539 is exploitable in production environments, posing a risk to applications relying on the affected GStreamer versions.