CVE-2024-47835
GHSL-2024-263: Gstreamer NULL-pointer dereference in LRC subtitle parser
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
GStreamer is a library for constructing graphs of media-handling components. A null pointer dereference vulnerability has been detected in the parse_lrc function within gstsubparse.c. The parse_lrc function calls strchr() to find the character ']' in the string line. The pointer returned by this call is then passed to g_strdup(). However, if the string line does not contain the character ']', strchr() returns NULL, and a call to g_strdup(start + 1) leads to a null pointer dereference. This vulnerability is fixed in 1.24.10.
Multiple multiple vulnerabilities were discovered in plugins for the GStreamer media framework and its codecs and demuxers, which may result in denial of service or potentially the execution of arbitrary code if a malformed media file is opened.
CVSS Scores
SSVC
- Decision:Track*
Timeline
- 2024-10-03 CVE Reserved
- 2024-12-11 CVE Published
- 2024-12-12 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-476: NULL Pointer Dereference
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8039.patch | X_refsource_misc | |
https://gstreamer.freedesktop.org/security/sa-2024-0029.html | X_refsource_misc | |
https://securitylab.github.com/advisories/GHSL-2024-263_Gstreamer | X_refsource_confirm |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Gstreamer Search vendor "Gstreamer" | Gstreamer Search vendor "Gstreamer" for product "Gstreamer" | < 1.24.10 Search vendor "Gstreamer" for product "Gstreamer" and version " < 1.24.10" | en |
Affected
|