First published: Wed Dec 11 2024(Updated: )
GStreamer is a library for constructing graphs of media-handling components. A null pointer dereference has been discovered in the id3v2_read_synch_uint function, located in id3v2.c. If id3v2_read_synch_uint is called with a null work->hdr.frame_data, the pointer guint8 *data is accessed without validation, resulting in a null pointer dereference. This vulnerability can result in a Denial of Service (DoS) by triggering a segmentation fault (SEGV). This vulnerability is fixed in 1.24.10.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/gst-plugins-base1.0 | <=1.18.4-2+deb11u2<=1.22.0-3+deb12u2<=1.22.0-3+deb12u3 | 1.18.4-2+deb11u3 1.24.10-1 |
GStreamer | <1.24.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-47542 is classified as a medium severity vulnerability due to its potential to cause application crashes.
To fix CVE-2024-47542, upgrade to the provided patched versions of gst-plugins-base1.0, which include 1.18.4-2+deb11u3 and 1.24.10-1.
CVE-2024-47542 affects GStreamer versions below 1.24.10 and specific versions of gst-plugins-base1.0.
The vulnerability in CVE-2024-47542 is a null pointer dereference in the id3v2_read_synch_uint function.
Exploitation of CVE-2024-47542 can lead to application crashes, impacting the stability of media handling applications.