Ship these also as part of the monorepo, so we can prepare new advisories as part of the relevant merge requests in the private gstreamer-security repository. Part-of: <https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/7610>
		
			
				
	
	
		
			44 lines
		
	
	
		
			1.2 KiB
		
	
	
	
		
			Markdown
		
	
	
	
	
	
			
		
		
	
	
			44 lines
		
	
	
		
			1.2 KiB
		
	
	
	
		
			Markdown
		
	
	
	
	
	
| # Security Advisory 2023-0010 (ZDI-CAN-22299, CVE-2023-44446)
 | |
| 
 | |
| <div class="vertical-table">
 | |
| 
 | |
| |                   |     |
 | |
| | ----------------- | --- |
 | |
| | Summary           | MXF demuxer use-after-free |
 | |
| | Date              | 2023-11-13 12:00 |
 | |
| | Affected Versions | GStreamer gst-plugins-bad < 1.22.7 |
 | |
| | IDs               | GStreamer-SA-2023-0010<br/>ZDI-CAN-22299<br/>CVE-2023-44446 |
 | |
| 
 | |
| </div>
 | |
| 
 | |
| ## Details
 | |
| 
 | |
| Use-after-free (read) in the MXF demuxer when handling certain files before GStreamer 1.22.7
 | |
| 
 | |
| ## Impact
 | |
| 
 | |
| It is possible for a malicious third party to trigger a crash in the application.
 | |
| 
 | |
| ## Solution
 | |
| 
 | |
| The gst-plugins-bad 1.22.7 releases address the issue. People using older branches of GStreamer should apply the patch and recompile.
 | |
| 
 | |
| ## References
 | |
| 
 | |
| ### The GStreamer project
 | |
| 
 | |
| - [https://gstreamer.freedesktop.org](https://gstreamer.freedesktop.org)
 | |
| 
 | |
| ### CVE Database Entries
 | |
| 
 | |
| - [CVE-2023-44446](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44446)
 | |
| 
 | |
| ### GStreamer 1.22.7 release
 | |
| 
 | |
| - [Release Notes](/releases/1.22/#1.22.7)  
 | |
| - [GStreamer Plugins Bad 1.22.7](/src/gst-plugins-bad/gst-plugins-bad-1.22.7.tar.xz)
 | |
| 
 | |
| ### Patches
 | |
| 
 | |
| - [Patch](https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/5635.patch)
 |