CWE
125
Advisory Published
Updated

CVE-2024-47600: GHSL-2024-248: GStreamer has an OOB-read in format_channel_mask

First published: Wed Dec 11 2024(Updated: )

GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerability has been detected in the format_channel_mask function in gst-discoverer.c. The vulnerability affects the local array position, which is defined with a fixed size of 64 elements. However, the function gst_discoverer_audio_info_get_channels may return a guint channels value greater than 64. This causes the for loop to attempt access beyond the bounds of the position array, resulting in an OOB-read when an index greater than 63 is used. This vulnerability can result in reading unintended bytes from the stack. Additionally, the dereference of value->value_nick after the OOB-read can lead to further memory corruption or undefined behavior. This vulnerability is fixed in 1.24.10.

Credit: security-advisories@github.com security-advisories@github.com

Affected SoftwareAffected VersionHow to fix
debian/gst-plugins-base1.0<=1.18.4-2+deb11u2<=1.22.0-3+deb12u2
1.18.4-2+deb11u3
1.22.0-3+deb12u3
1.24.10-1
GStreamer<1.24.10

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2024-47600?

    CVE-2024-47600 has been classified as a medium severity vulnerability due to its potential for out-of-bounds read exploitation.

  • How do I fix CVE-2024-47600?

    To fix CVE-2024-47600, update the GStreamer library to versions 1.18.4-2+deb11u3, 1.22.0-3+deb12u3 or later, or 1.24.10-1.

  • Which GStreamer versions are affected by CVE-2024-47600?

    CVE-2024-47600 affects GStreamer versions up to 1.24.10 but not including it.

  • What component is impacted in CVE-2024-47600?

    CVE-2024-47600 affects the format_channel_mask function in gst-discoverer.c, leading to an out-of-bounds read.

  • Is CVE-2024-47600 exploitative in nature?

    Yes, CVE-2024-47600 allows for potential exploitation through an out-of-bounds read, which can lead to information disclosure.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203