[SECURITY] [DLA 4516-1] gst-plugins-ugly1.0 security update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
- -----------------------------------------------------------------------
Debian LTS Advisory DLA-4516-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Utkarsh Gupta
March 30, 2026 https://wiki.debian.org/LTS
- -----------------------------------------------------------------------
Package : gst-plugins-ugly1.0
Version : 1.18.4-2+deb11u2
CVE ID : CVE-2026-2920 CVE-2026-2922
Two vulnerabilities were discovered in gst-plugins-ugly1.0, a set of
GStreamer plugins from the "ugly" set.
CVE-2026-2920
The ASF demuxer did not validate the number of streams against
the size of its static streams array. A crafted ASF file with
more than 32 streams could cause a heap-based buffer overflow
and potentially allow code execution.
CVE-2026-2922
The RealMedia demuxer checked for too many video fragments after
writing to the fragment storage, allowing an out-of-bounds write.
Additionally, an integer overflow in the fragment size check could
bypass the available data validation.
For Debian 11 bullseye, these problems have been fixed in version
1.18.4-2+deb11u2.
We recommend that you upgrade your gst-plugins-ugly1.0 packages.
For the detailed security status of gst-plugins-ugly1.0 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/gst-plugins-ugly1.0
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-----BEGIN PGP SIGNATURE-----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=QCxI
-----END PGP SIGNATURE-----
Reply to: