gstreamer1-1.10.4-2.0.1.el7.AXS7
エラータID: AXSA:2025-11534:07
GStreamer is a streaming media framework, based on graphs of filters which
operate on media data. Applications using this library can do anything
from real-time sound processing to playing videos, and just about anything
else media-related. Its plugin-based architecture means that new data
types or processing capabilities can be added simply by installing new
plugins.
Security Fix(es):
* CVE-2024-47606: allocator: avoid integer overflow when allocating sysmem
* Fix documentation build with the newer gtk-doc
CVE(s):
CVE-2024-47606
GStreamer is a library for constructing graphs of media-handling components. An integer underflow has been detected in the function qtdemux_parse_theora_extension within qtdemux.c. The vulnerability occurs due to an underflow of the gint size variable, which causes size to hold a large unintended value when cast to an unsigned integer. This 32-bit negative value is then cast to a 64-bit unsigned integer (0xfffffffffffffffa) in a subsequent call to gst_buffer_new_and_alloc. The function gst_buffer_new_allocate then attempts to allocate memory, eventually calling _sysmem_new_block. The function _sysmem_new_block adds alignment and header size to the (unsigned) size, causing the overflow of the 'slice_size' variable. As a result, only 0x89 bytes are allocated, despite the large input size. When the following memcpy call occurs in gst_buffer_fill, the data from the input file will overwrite the content of the GstMapInfo info structure. Finally, during the call to gst_memory_unmap, the overwritten memory may cause a function pointer hijack, as the mem->allocator->mem_unmap_full function is called with a corrupted pointer. This function pointer overwrite could allow an attacker to alter the execution flow of the program, leading to arbitrary code execution. This vulnerability is fixed in 1.24.10.
Update packages.
GStreamer is a library for constructing graphs of media-handling components. An integer underflow has been detected in the function qtdemux_parse_theora_extension within qtdemux.c. The vulnerability occurs due to an underflow of the gint size variable, which causes size to hold a large unintended value when cast to an unsigned integer. This 32-bit negative value is then cast to a 64-bit unsigned integer (0xfffffffffffffffa) in a subsequent call to gst_buffer_new_and_alloc. The function gst_buffer_new_allocate then attempts to allocate memory, eventually calling _sysmem_new_block. The function _sysmem_new_block adds alignment and header size to the (unsigned) size, causing the overflow of the 'slice_size' variable. As a result, only 0x89 bytes are allocated, despite the large input size. When the following memcpy call occurs in gst_buffer_fill, the data from the input file will overwrite the content of the GstMapInfo info structure. Finally, during the call to gst_memory_unmap, the overwritten memory may cause a function pointer hijack, as the mem->allocator->mem_unmap_full function is called with a corrupted pointer. This function pointer overwrite could allow an attacker to alter the execution flow of the program, leading to arbitrary code execution. This vulnerability is fixed in 1.24.10.
N/A
Asianux Server 7 for x86_64
- gstreamer1-1.10.4-2.0.1.el7.AXS7.i686.rpm
MD5: 4d5b94c08d07b242e2bd6e450726c838
SHA-256: 0517928595c71a3d6a34a5d88ffe9311138af2bde0780ebe40a7d581b17a2ba9
Size: 1.15 MB - gstreamer1-1.10.4-2.0.1.el7.AXS7.x86_64.rpm
MD5: 115538b8a8a5febad735b3f605eeb0a6
SHA-256: 830594cb781fffbf7087811b2944cf25522f567718840c257a69033d3399ce15
Size: 1.15 MB - gstreamer1-devel-1.10.4-2.0.1.el7.AXS7.i686.rpm
MD5: c6d365bb2e9321275943bee9b089ccc2
SHA-256: ccfc07e1fa27b629cadc726ffe622df44f02b1c4c96cbaf7fe25b38e200ace18
Size: 440.83 kB - gstreamer1-devel-1.10.4-2.0.1.el7.AXS7.x86_64.rpm
MD5: 7bdb9e774d020320a5f8a2ef44b3f31a
SHA-256: a2f90c613b9d78fc4e46bbd49911b0ebb5d2af39fb4fbb2d27538bd13b7815a0
Size: 440.84 kB