High Severity Vulnerability
This vulnerability has been rated as High severity. Immediate action is recommended.
CVE-2025-47219
HighVulnerability Description
In GStreamer through 1.26.1, the isomp4 plugin's qtdemux_parse_trak function may read past the end of a heap buffer while parsing an MP4 file, possibly leading to information disclosure.
CVSS Metrics
Common Vulnerability Scoring System
Vector String:
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Known Affected Software
42 configuration(s) from 1 vendor(s)
cpe:2.3:a:gstreamer:gstreamer:0.10.34:*:*:*:*:*:*:*
cpe:2.3:a:gstreamer:gstreamer:0.10.9:*:*:*:*:*:*:*
cpe:2.3:a:gstreamer:gstreamer:0.10.27:*:*:*:*:*:*:*
cpe:2.3:a:gstreamer:gstreamer:0.10.13:*:*:*:*:*:*:*
cpe:2.3:a:gstreamer:gstreamer:0.10.3:*:*:*:*:*:*:*
cpe:2.3:a:gstreamer:gstreamer:0.10.11:*:*:*:*:*:*:*
cpe:2.3:a:gstreamer:gstreamer:0.10.26:*:*:*:*:*:*:*
cpe:2.3:a:gstreamer:gstreamer:0.10.28:*:*:*:*:*:*:*
cpe:2.3:a:gstreamer:gstreamer:1.10.0:*:*:*:*:*:*:*
cpe:2.3:a:gstreamer:gstreamer:0.10.6:*:*:*:*:*:*:*
cpe:2.3:a:gstreamer:gstreamer:0.10.24:*:*:*:*:*:*:*
cpe:2.3:a:gstreamer:gstreamer:0.10.29:*:*:*:*:*:*:*
cpe:2.3:a:gstreamer:gstreamer:0.10.31:*:*:*:*:*:*:*
cpe:2.3:a:gstreamer:gstreamer:0.10.12:*:*:*:*:*:*:*
cpe:2.3:a:gstreamer:gstreamer:0.10.16:*:*:*:*:*:*:*
cpe:2.3:a:gstreamer:gstreamer:0.10.18:*:*:*:*:*:*:*
cpe:2.3:a:gstreamer:gstreamer:1.24.0:*:*:*:*:*:*:*
cpe:2.3:a:gstreamer:gstreamer:1.24.1:*:*:*:*:*:*:*
cpe:2.3:a:gstreamer:gstreamer:0.10.35:*:*:*:*:*:*:*
cpe:2.3:a:gstreamer:gstreamer:0.10.4:*:*:*:*:*:*:*
cpe:2.3:a:gstreamer:gstreamer:0.10.25:*:*:*:*:*:*:*
cpe:2.3:a:gstreamer:gstreamer:0.10.1:*:*:*:*:*:*:*
cpe:2.3:a:gstreamer:gstreamer:0.10.8:*:*:*:*:*:*:*
cpe:2.3:a:gstreamer:gstreamer:0.10.22:*:*:*:*:*:*:*
cpe:2.3:a:gstreamer:gstreamer:1.22.3:*:*:*:*:*:*:*
cpe:2.3:a:gstreamer:gstreamer:0.10.5:*:*:*:*:*:*:*
cpe:2.3:a:gstreamer:gstreamer:0.10.30:*:*:*:*:*:*:*
cpe:2.3:a:gstreamer:gstreamer:0.10.19:*:*:*:*:*:*:*
cpe:2.3:a:gstreamer:gstreamer:0.10.10:*:*:*:*:*:*:*
cpe:2.3:a:gstreamer:gstreamer:0.10.20:*:*:*:*:*:*:*
cpe:2.3:a:gstreamer:gstreamer:0.10.14:*:*:*:*:*:*:*
cpe:2.3:a:gstreamer:gstreamer:0.10.0:*:*:*:*:*:*:*
cpe:2.3:a:gstreamer:gstreamer:0.10.15:*:*:*:*:*:*:*
cpe:2.3:a:gstreamer:gstreamer:0.10.36:*:*:*:*:*:*:*
cpe:2.3:a:gstreamer:gstreamer:0.10.23:*:*:*:*:*:*:*
cpe:2.3:a:gstreamer:gstreamer:0.10.33:*:*:*:*:*:*:*
cpe:2.3:a:gstreamer:gstreamer:0.10.32:*:*:*:*:*:*:*
cpe:2.3:a:gstreamer:gstreamer:0.10.2:*:*:*:*:*:*:*
cpe:2.3:a:gstreamer:gstreamer:0.10.7:*:*:*:*:*:*:*
cpe:2.3:a:gstreamer:gstreamer:0.10.17:*:*:*:*:*:*:*
cpe:2.3:a:gstreamer:gstreamer:0.10.21:*:*:*:*:*:*:*
cpe:2.3:a:gstreamer:gstreamer:1.10.1:*:*:*:*:*:*:*
CPUAPR2026
Oracle Critical Patch Update Advisory - April 2026
CPUJAN2026
Oracle Critical Patch Update Advisory - January 2026
CVE-2025-47219
CVE-2025-47219
Severity Details
Weakness Type (CWE)
Out-of-bounds Read
- Description
- The product reads data past the end, or before the beginning, of the intended buffer.
- Typical Severity
- High
- Abstraction Level
- Base
Key Information
- Published Date
- August 07, 2025
