CVE-2024-47615

Publication date 12 December 2024

Last updated 20 December 2024


Ubuntu priority

Cvss 3 Severity Score

9.8 · Critical

Score breakdown

GStreamer is a library for constructing graphs of media-handling components. An OOB-Write has been detected in the function gst_parse_vorbis_setup_packet within vorbis_parse.c. The integer size is read from the input file without proper validation. As a result, size can exceed the fixed size of the pad->vorbis_mode_sizes array (which size is 256). When this happens, the for loop overwrites the entire pad structure with 0s and 1s, affecting adjacent memory as well. This OOB-write can overwrite up to 380 bytes of memory beyond the boundaries of the pad->vorbis_mode_sizes array. This vulnerability is fixed in 1.24.10.

Status

Package Ubuntu Release Status
gst-plugins-base0.10 25.04 plucky Not in release
24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal Not in release
16.04 LTS xenial
Needs evaluation
gst-plugins-base1.0 25.04 plucky
Not affected
24.10 oracular
Fixed 1.24.8-1ubuntu0.1
24.04 LTS noble
Fixed 1.24.2-1ubuntu0.2
22.04 LTS jammy
Fixed 1.20.1-1ubuntu0.4
20.04 LTS focal
Fixed 1.16.3-0ubuntu1.4
18.04 LTS bionic
Needs evaluation
16.04 LTS xenial
Needs evaluation

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
gst-plugins-base1.0

Severity score breakdown

Parameter Value
Base score 9.8 · Critical
Attack vector Network
Attack complexity Low
Privileges required None
User interaction None
Scope Unchanged
Confidentiality High
Integrity impact High
Availability impact High
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H