Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3999-1 | gst-plugins-base1.0 security update |
Debian DSA |
DSA-5831-1 | gst-plugins-base1.0 security update |
EUVD |
EUVD-2024-42798 | GStreamer is a library for constructing graphs of media-handling components. A stack-buffer overflow has been detected in the `vorbis_handle_identification_packet` function within `gstvorbisdec.c`. The position array is a stack-allocated buffer of size 64. If vd->vi.channels exceeds 64, the for loop will write beyond the boundaries of the position array. The value written will always be `GST_AUDIO_CHANNEL_POSITION_NONE`. This vulnerability allows someone to overwrite the EIP address allocated in the stack. Additionally, this bug can overwrite the `GstAudioInfo` info structure. This vulnerability is fixed in 1.24.10. |
Ubuntu USN |
USN-7175-1 | GStreamer Base Plugins vulnerabilities |
Ubuntu USN |
USN-7807-1 | GStreamer Base Plugins vulnerabilities |
Tue, 17 Mar 2026 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Gstreamer
Gstreamer gstreamer |
|
| CPEs | cpe:2.3:a:gstreamer:gstreamer:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Gstreamer Project
Gstreamer Project gstreamer |
Gstreamer
Gstreamer gstreamer |
Mon, 03 Nov 2025 23:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 19 Dec 2024 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | GStreamer is a library for constructing graphs of media-handling components. A stack-buffer overflow has been detected in the vorbis_handle_identification_packet function within gstvorbisdec.c. The position array is a stack-allocated buffer of size 64. If vd->vi.channels exceeds 64, the for loop will write beyond the boundaries of the position array The value written will always be GST_AUDIO_CHANNEL_POSITION_NONE. This vulnerability allows to overwrite the EIP address allocated in the stack. Additionally, this bug can overwrite the GstAudioInfo info structure. This vulnerability is fixed in 1.24.10. | GStreamer is a library for constructing graphs of media-handling components. A stack-buffer overflow has been detected in the `vorbis_handle_identification_packet` function within `gstvorbisdec.c`. The position array is a stack-allocated buffer of size 64. If vd->vi.channels exceeds 64, the for loop will write beyond the boundaries of the position array. The value written will always be `GST_AUDIO_CHANNEL_POSITION_NONE`. This vulnerability allows someone to overwrite the EIP address allocated in the stack. Additionally, this bug can overwrite the `GstAudioInfo` info structure. This vulnerability is fixed in 1.24.10. |
Thu, 19 Dec 2024 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat rhel Els
|
|
| CPEs | cpe:/a:redhat:enterprise_linux:8 cpe:/o:redhat:rhel_els:7 |
|
| Vendors & Products |
Redhat rhel Els
|
Wed, 18 Dec 2024 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Gstreamer Project
Gstreamer Project gstreamer |
|
| Weaknesses | CWE-787 | |
| CPEs | cpe:2.3:a:gstreamer_project:gstreamer:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Gstreamer Project
Gstreamer Project gstreamer |
|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Tue, 17 Dec 2024 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/a:redhat:rhel_aus:8.2 cpe:/a:redhat:rhel_aus:8.6 cpe:/a:redhat:rhel_e4s:8.6 cpe:/a:redhat:rhel_eus:8.8 cpe:/a:redhat:rhel_eus:9.4 cpe:/a:redhat:rhel_tus:8.6 |
Tue, 17 Dec 2024 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat
Redhat enterprise Linux Redhat rhel Aus Redhat rhel E4s Redhat rhel Eus Redhat rhel Tus |
|
| CPEs | cpe:/a:redhat:enterprise_linux:9 cpe:/a:redhat:rhel_aus:8.4 cpe:/a:redhat:rhel_e4s:8.4 cpe:/a:redhat:rhel_e4s:9.0 cpe:/a:redhat:rhel_eus:9.2 cpe:/a:redhat:rhel_tus:8.4 |
|
| Vendors & Products |
Redhat
Redhat enterprise Linux Redhat rhel Aus Redhat rhel E4s Redhat rhel Eus Redhat rhel Tus |
Sat, 14 Dec 2024 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Thu, 12 Dec 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 12 Dec 2024 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Wed, 11 Dec 2024 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | GStreamer is a library for constructing graphs of media-handling components. A stack-buffer overflow has been detected in the vorbis_handle_identification_packet function within gstvorbisdec.c. The position array is a stack-allocated buffer of size 64. If vd->vi.channels exceeds 64, the for loop will write beyond the boundaries of the position array The value written will always be GST_AUDIO_CHANNEL_POSITION_NONE. This vulnerability allows to overwrite the EIP address allocated in the stack. Additionally, this bug can overwrite the GstAudioInfo info structure. This vulnerability is fixed in 1.24.10. | |
| Title | GHSL-2024-115: GStreamer has a stack-buffer overflow in vorbis_handle_identification_packet | |
| Weaknesses | CWE-121 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-11-03T22:20:14.196Z
Reserved: 2024-09-25T21:46:10.929Z
Link: CVE-2024-47538
Updated: 2024-12-12T14:36:39.963Z
Status : Modified
Published: 2024-12-12T02:03:28.070
Modified: 2026-03-17T15:52:33.870
Link: CVE-2024-47538
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN