Coordinated Disclosure Timeline

Project

Gstreamer

Tested Version

Details

Null pointer dereference in qtdemux_parse_sbgp (GHSL-2024-238)

The function qtdemux_parse_sbgp in qtdemux.c is affected by a null dereference vulnerability.

When the pointer tack_properties_array is NULL, dereferencing it will result in a null pointer dereference.

Crash 1:

static gboolean qtdemux_parse_sbgp(..., GPtrArray * tack_properties_array, ...){
...
      if (index < tack_properties_array->len)
        properties = g_ptr_array_index (tack_properties_array, index);
      else
        GST_ERROR_OBJECT (qtdemux, "invalid group index %u", index);
...
}

Another null dereference happens in the following code.

Crash 2:

    if (info->track_group_properties) {
      g_ptr_array_free (info->fragment_group_properties, TRUE);
      info->fragment_group_properties = NULL;
    }

Impact

This vulnerability can result in a Denial of Service (DoS) by triggering a segmentation fault (SEGV).

CVE

Credit

This issue was discovered and reported by GHSL team member @antonio-morales (Antonio Morales).

Contact

You can contact the GHSL team at securitylab@github.com, please include a reference to GHSL-2024-238 in any communication regarding this issue.