GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerability has been discovered in the qtdemux_merge_sample_table function within qtdemux.c. The problem is that the size of the stts buffer isn’t properly checked before reading stts_duration, allowing the program to read 4 bytes beyond the boundaries of stts->data. This vulnerability reads up to 4 bytes past the allocated bounds of the stts array. This vulnerability is fixed in 1.24.10.
The product reads data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://securitylab.github.com/advisories/GHSL-2024-246_Gstreamer/ | third party advisory |
https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8059.patch | patch |
https://gstreamer.freedesktop.org/security/sa-2024-0006.html | release notes |