CVE-2026-1940

| EUVD-2026-14551 MEDIUM
2026-03-23 redhat GHSA-9wvw-r6fm-6wwv
5.1
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
Low
Availability
Low

Lifecycle Timeline

4
Patch Released
Mar 31, 2026 - 21:13 nvd
Patch available
EUVD ID Assigned
Mar 23, 2026 - 21:45 euvd
EUVD-2026-14551
Analysis Generated
Mar 23, 2026 - 21:45 vuln.today
CVE Published
Mar 23, 2026 - 21:26 nvd
MEDIUM 5.1

Description

An incomplete fix for CVE-2024-47778 allows an out-of-bounds read in gst_wavparse_adtl_chunk() function. The patch added a size validation check lsize + 8 > size, but it does not account for the GST_ROUND_UP_2(lsize) used in the actual offset calculation. When lsize is an odd number, the parser advances more bytes than validated, causing OOB read.

Analysis

A security vulnerability in An incomplete fix for CVE-2024-47778 (CVSS 5.1) that allows an out-of-bounds read. Remediation should follow standard vulnerability management procedures.

Sign in for full analysis, threat intelligence, and remediation guidance.

Remediation

Within 30 days: Identify affected systems and apply vendor patches as part of regular patch cycle. Monitor vendor channels for patch availability.

Sign in for detailed remediation steps.

Priority Score

26
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +26
POC: 0

Vendor Status

Ubuntu

Priority: Medium
gst-plugins-bad1.0
Release Status Version
trusty needs-triage -
xenial needs-triage -
bionic needs-triage -
focal needs-triage -
jammy needs-triage -
noble needs-triage -
questing needs-triage -
upstream released 1.28.1-1

Debian

gst-plugins-good1.0
Release Status Fixed Version Urgency
bullseye vulnerable 1.18.4-2+deb11u2 -
bullseye (security) vulnerable 1.18.4-2+deb11u4 -
bookworm vulnerable 1.22.0-5+deb12u3 -
bookworm (security) vulnerable 1.22.0-5+deb12u2 -
trixie vulnerable 1.26.2-1 -
forky, sid fixed 1.28.1-1 -
(unstable) fixed 1.28.1-1 -

Share

CVE-2026-1940 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy