
Cloud Vulnerability DB
A community-led vulnerabilities database
GStreamer, a library for constructing graphs of media-handling components, was found to contain a vulnerability identified as CVE-2024-47615. The vulnerability was discovered in versions prior to 1.24.10 and was disclosed on December 3, 2024. The issue affects the Ogg demuxer component of the GStreamer library, specifically in the gstparsevorbissetuppacket function within vorbisparse.c ([GitHub Advisory](https://securitylab.github.com/advisories/GHSL-2024-115GHSL-2024-118_Gstreamer/), GStreamer Advisory).
The vulnerability is an out-of-bounds write issue in the gstparsevorbissetuppacket function. The integer size is read from the input file without proper validation, allowing it to exceed the fixed size of the pad->vorbismodesizes array (which has a size of 256). When this occurs, the for loop overwrites the entire pad structure with 0s and 1s, affecting adjacent memory. The vulnerability can overwrite up to 380 bytes of memory beyond the boundaries of the pad->vorbismodesizes array (GitHub Advisory).
The vulnerability can result in application crashes and potentially allow code execution through heap manipulation. The out-of-bounds write can trigger other memory issues, such as invalid frees, and disrupt the program's execution flow (GStreamer Advisory, GitHub Advisory).
The vulnerability has been fixed in GStreamer version 1.24.10. Users of older versions should update to this version or apply and recompile with the available patch. The fix includes proper validation of the size parameter and checks for writes to GstOggStream.vorbismodesizes (GStreamer Advisory, Patch).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."