In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade gstreamer/gstreamer
to version 1.24.10 or higher.
Affected versions of this package are vulnerable to Out-of-bounds Write due to a discrepancy between the size of memory allocated and the loop condition in the convert_to_s334_1a
function. An attacker can overwrite up to 3 bytes beyond the allocated bounds by manipulating the input to trigger the condition where ccpair_size
is even.