Bug 2331724 (CVE-2024-47541) - CVE-2024-47541 gstreamer1-plugins-base: GStreamer has an out-of-bounds write in SSA subtitle parser
Summary: CVE-2024-47541 gstreamer1-plugins-base: GStreamer has an out-of-bounds write ...
Keywords:
Status: NEW
Alias: CVE-2024-47541
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2331898 2331896 2331897 2331899
Blocks:
TreeView+ depends on / blocked
 
Reported: 2024-12-11 19:01 UTC by OSIDB Bzimport
Modified: 2025-05-13 10:25 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2025:7243 0 None None None 2025-05-13 10:25:39 UTC

Description OSIDB Bzimport 2024-12-11 19:01:35 UTC
GStreamer is a library for constructing graphs of media-handling components. An OOB-write vulnerability has been identified in the gst_ssa_parse_remove_override_codes function of the gstssaparse.c file. This function is responsible for parsing and removing SSA (SubStation Alpha) style override codes, which are enclosed in curly brackets ({}). The issue arises when a closing curly bracket "}" appears before an opening curly bracket "{" in the input string. In this case, memmove() incorrectly duplicates a substring. With each successive loop iteration, the size passed to memmove() becomes progressively larger (strlen(end+1)), leading to a write beyond the allocated memory bounds. This vulnerability is fixed in 1.24.10.

Comment 3 errata-xmlrpc 2025-05-13 10:25:38 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2025:7243 https://access.redhat.com/errata/RHSA-2025:7243


Note You need to log in before you can comment on or make changes to this bug.