Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3999-1 | gst-plugins-base1.0 security update |
Debian DSA |
DSA-5831-1 | gst-plugins-base1.0 security update |
EUVD |
EUVD-2024-42819 | GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerability has been detected in the format_channel_mask function in gst-discoverer.c. The vulnerability affects the local array position, which is defined with a fixed size of 64 elements. However, the function gst_discoverer_audio_info_get_channels may return a guint channels value greater than 64. This causes the for loop to attempt access beyond the bounds of the position array, resulting in an OOB-read when an index greater than 63 is used. This vulnerability can result in reading unintended bytes from the stack. Additionally, the dereference of value->value_nick after the OOB-read can lead to further memory corruption or undefined behavior. This vulnerability is fixed in 1.24.10. |
Ubuntu USN |
USN-7175-1 | GStreamer Base Plugins vulnerabilities |
Ubuntu USN |
USN-7807-1 | GStreamer Base Plugins vulnerabilities |
Tue, 17 Mar 2026 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Gstreamer
Gstreamer gstreamer |
|
| CPEs | cpe:2.3:a:gstreamer:gstreamer:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Gstreamer Project
Gstreamer Project gstreamer |
Gstreamer
Gstreamer gstreamer |
Mon, 03 Nov 2025 23:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 14 May 2025 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat
Redhat enterprise Linux |
|
| CPEs | cpe:/a:redhat:enterprise_linux:9 | |
| Vendors & Products |
Redhat
Redhat enterprise Linux |
Wed, 18 Dec 2024 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Gstreamer Project
Gstreamer Project gstreamer |
|
| CPEs | cpe:2.3:a:gstreamer_project:gstreamer:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Gstreamer Project
Gstreamer Project gstreamer |
|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Thu, 12 Dec 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 12 Dec 2024 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Wed, 11 Dec 2024 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerability has been detected in the format_channel_mask function in gst-discoverer.c. The vulnerability affects the local array position, which is defined with a fixed size of 64 elements. However, the function gst_discoverer_audio_info_get_channels may return a guint channels value greater than 64. This causes the for loop to attempt access beyond the bounds of the position array, resulting in an OOB-read when an index greater than 63 is used. This vulnerability can result in reading unintended bytes from the stack. Additionally, the dereference of value->value_nick after the OOB-read can lead to further memory corruption or undefined behavior. This vulnerability is fixed in 1.24.10. | |
| Title | GHSL-2024-248: GStreamer has an OOB-read in format_channel_mask | |
| Weaknesses | CWE-125 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-11-03T22:20:18.566Z
Reserved: 2024-09-27T20:37:22.118Z
Link: CVE-2024-47600
Updated: 2024-12-12T14:27:49.698Z
Status : Modified
Published: 2024-12-12T02:03:31.577
Modified: 2026-03-17T15:52:33.870
Link: CVE-2024-47600
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN