CVE-2024-47597
Publication date 12 December 2024
Last updated 3 July 2025
Ubuntu priority
Cvss 3 Severity Score
Description
GStreamer is a library for constructing graphs of media-handling components. An OOB-read has been detected in the function qtdemux_parse_samples within qtdemux.c. This issue arises when the function qtdemux_parse_samples reads data beyond the boundaries of the stream->stco buffer. The following code snippet shows the call to qt_atom_parser_get_offset_unchecked, which leads to the OOB-read when parsing the provided GHSL-2024-245_crash1.mp4 file. This issue may lead to read up to 8 bytes out-of-bounds. This vulnerability is fixed in 1.24.10.
Status
| Package | Ubuntu Release | Status |
|---|---|---|
| gst-plugins-good0.10 | 25.10 questing | Not in release |
| 25.04 plucky | Not in release | |
| 24.04 LTS noble | Not in release | |
| 22.04 LTS jammy | Not in release | |
| 20.04 LTS focal | Not in release | |
| 16.04 LTS xenial |
Needs evaluation
|
|
| gst-plugins-good1.0 | 25.10 questing |
Not affected
|
| 25.04 plucky |
Not affected
|
|
| 24.04 LTS noble |
Fixed 1.24.2-1ubuntu1.1
|
|
| 22.04 LTS jammy |
Fixed 1.20.3-0ubuntu1.3
|
|
| 20.04 LTS focal |
Fixed 1.16.3-0ubuntu1.3
|
|
| 18.04 LTS bionic |
Needs evaluation
|
|
| 16.04 LTS xenial |
Needs evaluation
|
Notes
Patch details
| Package | Patch details |
|---|---|
| gst-plugins-good1.0 |
|
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score |
|
| Attack vector | Network |
| Attack complexity | Low |
| Privileges required | None |
| User interaction | None |
| Scope | Unchanged |
| Confidentiality | High |
| Integrity impact | None |
| Availability impact | High |
| Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-7176-1
- GStreamer Good Plugins vulnerabilities
- 18 December 2024