[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 4516-1] gst-plugins-ugly1.0 security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- -----------------------------------------------------------------------
Debian LTS Advisory DLA-4516-1              debian-lts@lists.debian.org
https://www.debian.org/lts/security/                      Utkarsh Gupta
March 30, 2026                              https://wiki.debian.org/LTS
- -----------------------------------------------------------------------

Package        : gst-plugins-ugly1.0
Version        : 1.18.4-2+deb11u2
CVE ID         : CVE-2026-2920 CVE-2026-2922

Two vulnerabilities were discovered in gst-plugins-ugly1.0, a set of
GStreamer plugins from the "ugly" set.

CVE-2026-2920

    The ASF demuxer did not validate the number of streams against
    the size of its static streams array. A crafted ASF file with
    more than 32 streams could cause a heap-based buffer overflow
    and potentially allow code execution.

CVE-2026-2922

    The RealMedia demuxer checked for too many video fragments after
    writing to the fragment storage, allowing an out-of-bounds write.
    Additionally, an integer overflow in the fragment size check could
    bypass the available data validation.

For Debian 11 bullseye, these problems have been fixed in version
1.18.4-2+deb11u2.

We recommend that you upgrade your gst-plugins-ugly1.0 packages.

For the detailed security status of gst-plugins-ugly1.0 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/gst-plugins-ugly1.0

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-----BEGIN PGP SIGNATURE-----
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=QCxI
-----END PGP SIGNATURE-----


Reply to: