Vulnerability Description
GStreamer is a library for constructing graphs of media-handling components. A null pointer dereference vulnerability has been detected in the parse_lrc function within gstsubparse.c. The parse_lrc function calls strchr() to find the character ']' in the string line. The pointer returned by this call is then passed to g_strdup(). However, if the string line does not contain the character ']', strchr() returns NULL, and a call to g_strdup(start + 1) leads to a null pointer dereference. This vulnerability is fixed in 1.24.10.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gstreamer | Gstreamer | < 1.24.10 |
Related Weaknesses (CWE)
References
- https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8039.patchPatch
- https://gstreamer.freedesktop.org/security/sa-2024-0029.htmlRelease Notes
- https://securitylab.github.com/advisories/GHSL-2024-263_Gstreamer/Third Party Advisory
- https://lists.debian.org/debian-lts-announce/2024/12/msg00021.html
FAQ
What is CVE-2024-47835?
CVE-2024-47835 is a vulnerability with a CVSS score of 7.5 (HIGH). GStreamer is a library for constructing graphs of media-handling components. A null pointer dereference vulnerability has been detected in the parse_lrc function within gstsubparse.c. The parse_lrc fu...
How severe is CVE-2024-47835?
CVE-2024-47835 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-47835?
Check the references section above for vendor advisories and patch information. Affected products include: Gstreamer Gstreamer.