Coordinated Disclosure Timeline

Project

Gstreamer

Tested Version

Details

OOB-read in gst_wavparse_smpl_chunk (GHSL-2024-259)

An OOB-read vulnerability has been identified in the gst_wavparse_smpl_chunk function within gstwavparse.c.

This function attempts to read 4 bytes from the data + 12 offset without checking if the size of the data buffer is sufficient. If the buffer is too small, the function reads beyond its bounds:

static gboolean gst_wavparse_smpl_chunk (GstWavParse * wav, const guint8 * data, guint32 size){
...
  note_number = GST_READ_UINT32_LE (data + 12);
...
}

As a result, an OOB-read can happen.

Impact

This vulnerability may result in reading 4 bytes out of the boundaries of the data buffer.

CVE

Credit

This issue was discovered and reported by GHSL team member @antonio-morales (Antonio Morales).

Contact

You can contact the GHSL team at securitylab@github.com, please include a reference to GHSL-2024-259 in any communication regarding this issue.