In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade Ubuntu:20.04
gst-plugins-good1.0
to version 1.16.3-0ubuntu1.3 or higher.
Note: Versions mentioned in the description apply only to the upstream gst-plugins-good1.0
package and not the gst-plugins-good1.0
package as distributed by Ubuntu
.
See How to fix?
for Ubuntu:20.04
relevant fixed versions and status.
GStreamer is a library for constructing graphs of media-handling components. A null pointer dereference vulnerability has been identified in gst_gdk_pixbuf_dec_flush
within gstgdkpixbufdec.c
. This function invokes memcpy
, using out_pix
as the destination address. out_pix
is expected to point to the frame 0 from the frame structure, which is read from the input file. However, in certain situations, it can points to a NULL frame, causing the subsequent call to memcpy
to attempt writing to the null address (0x00), leading to a null pointer dereference. This vulnerability can result in a Denial of Service (DoS) by triggering a segmentation fault (SEGV). This vulnerability is fixed in 1.24.10.