Page 5 of 73 results (0.011 seconds)

CVSS: 6.9EPSS: 0%CPEs: 1EXPL: 0

GStreamer is a library for constructing graphs of media-handling components. An integer underflow has been detected in qtdemux_parse_trak function within qtdemux.c. During the strf parsing case, the subtraction size -= 40 can lead to a negative integer overflow if it is less than 40. If this happens, the subsequent call to gst_buffer_fill will invoke memcpy with a large tocopy size, resulting in an OOB-read. This vulnerability is fixed in 1.24.10. • https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8059.patch https://gstreamer.freedesktop.org/security/sa-2024-0010.html https://securitylab.github.com/advisories/GHSL-2024-242_Gstreamer • CWE-191: Integer Underflow (Wrap or Wraparound) •

CVSS: 6.8EPSS: 0%CPEs: 1EXPL: 0

GStreamer is a library for constructing graphs of media-handling components. The function qtdemux_parse_sbgp in qtdemux.c is affected by a null dereference vulnerability. This vulnerability is fixed in 1.24.10. • https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8059.patch https://gstreamer.freedesktop.org/security/sa-2024-0011.html https://securitylab.github.com/advisories/GHSL-2024-238_Gstreamer • CWE-476: NULL Pointer Dereference •

CVSS: 5.1EPSS: 0%CPEs: 1EXPL: 0

GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerability has been discovered in qtdemux_parse_container function within qtdemux.c. In the parent function qtdemux_parse_node, the value of length is not well checked. So, if length is big enough, it causes the pointer end to point beyond the boundaries of buffer. Subsequently, in the qtdemux_parse_container function, the while loop can trigger an OOB-read, accessing memory beyond the bounds of buf. • https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8059.patch https://gstreamer.freedesktop.org/security/sa-2024-0009.html https://securitylab.github.com/advisories/GHSL-2024-236_Gstreamer • CWE-125: Out-of-bounds Read •

CVSS: 6.8EPSS: 0%CPEs: 1EXPL: 0

GStreamer is a library for constructing graphs of media-handling components. A null pointer dereference has been discovered in the id3v2_read_synch_uint function, located in id3v2.c. If id3v2_read_synch_uint is called with a null work->hdr.frame_data, the pointer guint8 *data is accessed without validation, resulting in a null pointer dereference. This vulnerability can result in a Denial of Service (DoS) by triggering a segmentation fault (SEGV). This vulnerability is fixed in 1.24.10. • https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8033.patch https://gstreamer.freedesktop.org/security/sa-2024-0008.html https://securitylab.github.com/advisories/GHSL-2024-235_Gstreamer • CWE-125: Out-of-bounds Read CWE-476: NULL Pointer Dereference •

CVSS: 6.9EPSS: 0%CPEs: 1EXPL: 0

GStreamer is a library for constructing graphs of media-handling components. An OOB-write vulnerability has been identified in the gst_ssa_parse_remove_override_codes function of the gstssaparse.c file. This function is responsible for parsing and removing SSA (SubStation Alpha) style override codes, which are enclosed in curly brackets ({}). The issue arises when a closing curly bracket "}" appears before an opening curly bracket "{" in the input string. In this case, memmove() incorrectly duplicates a substring. • https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8036.patch https://gstreamer.freedesktop.org/security/sa-2024-0023.html https://securitylab.github.com/advisories/GHSL-2024-228_GStreamer • CWE-787: Out-of-bounds Write •