First published: Wed Dec 11 2024(Updated: )
GStreamer is a library for constructing graphs of media-handling components. A null pointer dereference vulnerability has been discovered in the gst_matroska_demux_update_tracks function within matroska-demux.c. The vulnerability occurs when the gst_caps_is_equal function is called with invalid caps values. If this happen, then in the function gst_buffer_get_size the call to GST_BUFFER_MEM_PTR can return a null pointer. Attempting to dereference the size field of this null pointer results in a null pointer dereference. This vulnerability is fixed in 1.24.10.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
GStreamer | <1.24.10 | |
debian/gst-plugins-good1.0 | <=1.18.4-2+deb11u2 | 1.22.0-5+deb12u2 1.24.12-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-47603 is classified with a severity rating that indicates a moderate risk due to the potential for denial of service through a null pointer dereference.
To address CVE-2024-47603, upgrade to GStreamer version 1.22.0-5+deb12u2 or 1.24.11-5 or later.
CVE-2024-47603 affects GStreamer versions up to 1.24.10 and the specific Debian package gst-plugins-good1.0 versions up to 1.18.4-2+deb11u2.
CVE-2024-47603 is identified as a null pointer dereference vulnerability found in the gst_matroska_demux_update_tracks function.
As of now, there are no publicly reported exploits specifically targeting CVE-2024-47603.