CVE-2024-47540

EUVD-2024-42800
GStreamer is a library for constructing graphs of media-handling components. An uninitialized stack variable vulnerability has been identified in the gst_matroska_demux_add_wvpk_header function within matroska-demux.c. When size < 4, the program calls gst_buffer_unmap with an uninitialized map variable. Then, in the gst_memory_unmap function, the program will attempt to unmap the buffer using the uninitialized map variable, causing a function pointer hijack, as it will jump to mem->allocator->mem_unmap_full or mem->allocator->mem_unmap. This vulnerability could allow an attacker to hijack the execution flow, potentially leading to code execution. This vulnerability is fixed in 1.24.10.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
9.8 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 61%
Affected Products (NVD)
VendorProductVersion
gstreamer_projectgstreamer
𝑥
< 1.24.10
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
gst-plugins-good1.0
bookworm
1.22.0-5+deb12u3
fixed
bookworm (security)
1.22.0-5+deb12u2
fixed
bullseye
vulnerable
bullseye (security)
1.18.4-2+deb11u4
fixed
forky
1.26.9-1
fixed
sid
1.26.10-1
fixed
trixie
1.26.2-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
gst-plugins-good0.10
focal
dne
jammy
dne
noble
dne
oracular
dne
plucky
dne
questing
dne
xenial
needs-triage
gst-plugins-good1.0
bionic
needs-triage
focal
Fixed 1.16.3-0ubuntu1.3
released
jammy
Fixed 1.20.3-0ubuntu1.3
released
noble
Fixed 1.24.2-1ubuntu1.1
released
oracular
Fixed 1.24.8-1ubuntu1.1
released
plucky
not-affected
questing
not-affected
xenial
needs-triage