• CVE-2024-47543

发布时间: 2024年12月27日

修改时间: 2024年12月27日

概要

GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerability has been discovered in qtdemux_parse_container function within qtdemux.c. In the parent function qtdemux_parse_node, the value of length is not well checked. So, if length is big enough, it causes the pointer end to point beyond the boundaries of buffer. Subsequently, in the qtdemux_parse_container function, the while loop can trigger an OOB-read, accessing memory beyond the bounds of buf. This vulnerability can result in reading up to 4GB of process memory or potentially causing a segmentation fault (SEGV) when accessing invalid memory. This vulnerability is fixed in 1.24.10.

CVSS v3 指标

NVD openEuler
Confidentiality None
Attack Vector Network
CVSS评分 N/A 7.5
Attack Complexity Low
Privileges Required None
Scope Unchanged
Integrity None
User Interaction None
Availability High

安全公告

公告名 概要 发布时间
KylinSec-SA-2024-4574 gstreamer1-plugins-good security update 2025年1月15日
KylinSec-SA-2024-4580 gstreamer1-plugins-good security update 2025年1月15日

影响产品

产品 状态
KY3.4-5A gstreamer1-plugins-good Fixed
KY3.5.2 gstreamer1-plugins-good Fixed
KY3.5.3 gstreamer1-plugins-good Fixed
V6 gstreamer1-plugins-good Fixed