Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-47835— GHSL-2024-263: Gstreamer NULL-pointer dereference in LRC subtitle parser

EPSS 0.08% · P23
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-47835

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
GHSL-2024-263: Gstreamer NULL-pointer dereference in LRC subtitle parser
Source: NVD (National Vulnerability Database)
Vulnerability Description
GStreamer is a library for constructing graphs of media-handling components. A null pointer dereference vulnerability has been detected in the parse_lrc function within gstsubparse.c. The parse_lrc function calls strchr() to find the character ']' in the string line. The pointer returned by this call is then passed to g_strdup(). However, if the string line does not contain the character ']', strchr() returns NULL, and a call to g_strdup(start + 1) leads to a null pointer dereference. This vulnerability is fixed in 1.24.10.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
空指针解引用
Source: NVD (National Vulnerability Database)
Vulnerability Title
GStreamer 代码问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
GStreamer是GStreamer开源的一套用于处理流媒体的框架。 GStreamer存在代码问题漏洞,该漏洞源于在gstsubparse.c中的parse_lrc函数中检测到空指针取消引用漏洞。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
gstreamergstreamer < 1.24.10 -

II. Public POCs for CVE-2024-47835

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-47835

登录查看更多情报信息。

Same Patch Batch · gstreamer · 2024-12-11 · 29 CVEs total

CVE-2024-47540GHSL-2024-197: GStreamer uses uninitialized stack memory in Matroska/WebM demuxer
CVE-2024-47776GHSL-2024-260: GStreamer has a OOB-read in gst_wavparse_cue_chunk
CVE-2024-47601GHSL-2024-249: GStreamer has a NULL-pointer dereference in Matroska/WebM demuxer
CVE-2024-47537GHSL-2024-094: GStreamer has an OOB-write in isomp4/qtdemux.c
CVE-2024-47600GHSL-2024-248: GStreamer has an OOB-read in format_channel_mask
CVE-2024-47538GHSL-2024-115: GStreamer has a stack-buffer overflow in vorbis_handle_identification_packe
CVE-2024-47615GHSL-2024-117: GStreamer has an out-of-bounds write in Ogg demuxer
CVE-2024-47834GHSL-2024-280: Gstreamer Use-After-Free read in Matroska CodecPrivate
CVE-2024-47541GHSL-2024-228: GStreamer has an out-of-bounds write in SSA subtitle parser
CVE-2024-47539GHSL-2024-195: GStreamer has an OOB-write in convert_to_s334_1a
CVE-2024-47607GHSL-2024-116: Stack-buffer overflow in gst_opus_dec_parse_header
CVE-2024-47775GHSL-2024-261: GStreamer has an OOB-read in parse_ds64
CVE-2024-47596GHSL-2024-244: GStreamer has an OOB-read in FOURCC_SMI_ parsing
CVE-2024-47606GHSL-2024-166: GStreamer Integer overflows in MP4/MOV demuxer and memory allocator that ca
CVE-2024-47599GHSL-2024-247: GStreamer Insufficient error handling in JPEG decoder that can lead to NULL
CVE-2024-47597GHSL-2024-245: GStreamer has an OOB-read in qtdemux_parse_samples
CVE-2024-47778GHSL-2024-258: GStreamer has an OOB-read in gst_wavparse_adtl_chunk
CVE-2024-47598GHSL-2024-246: GStreamer has an OOB-read in qtdemux_merge_sample_table
CVE-2024-47603GHSL-2024-251: GStreamer NULL-pointer dereference in Matroska/WebM demuxer
CVE-2024-47774GHSL-2024-262: GStreamer has an OOB-read in gst_avi_subtitle_parse_gab2_chunk

Showing top 20 of 29 CVEs. View all on vendor page &rarr; →

IV. Related Vulnerabilities

V. Comments for CVE-2024-47835

No comments yet


Leave a comment