UbuntuUpdates.org

Package "libgstreamer-gl1.0-0"

Name: libgstreamer-gl1.0-0

Description:

GStreamer GL libraries

Latest version: 1.20.1-1ubuntu0.5
Release: jammy (22.04)
Level: updates
Repository: main
Head package: gst-plugins-base1.0
Homepage: https://gstreamer.freedesktop.org

Links


Download "libgstreamer-gl1.0-0"


Other versions of "libgstreamer-gl1.0-0" in Jammy

Repository Area Version
base main 1.20.1-1
security main 1.20.1-1ubuntu0.5

Changelog

Version: 1.20.1-1ubuntu0.5 2025-08-26 19:07:05 UTC

  gst-plugins-base1.0 (1.20.1-1ubuntu0.5) jammy-security; urgency=medium

  * SECURITY UPDATE: DoS via stack overflow in subparse plugin
    - debian/patches/CVE-2025-47806.patch: make sure that subrip time
      string is not too long before zero-padding in
      gst/subparse/gstsubparse.c.
    - CVE-2025-47806
  * SECURITY UPDATE: DoS via null-deref in subparse plugin
    - debian/patches/CVE-2025-47807.patch: check for valid UTF-8 before
      cleaning up lines and check for regex replace errors in
      gst/subparse/gstsubparse.c.
    - CVE-2025-47807
  * SECURITY UPDATE: DoS via null-deref in subparse plugin
    - debian/patches/CVE-2025-47808.patch: don't append NULL + 1 to the
      string buffer when parsing lines without text in
      gst/subparse/tmplayerparse.c.
    - CVE-2025-47808

 -- Marc Deslauriers <email address hidden> Mon, 25 Aug 2025 09:05:50 -0400

Source diff to previous version
CVE-2025-47806 In GStreamer through 1.26.1, the subparse plugin's parse_subrip_time function may write data past the bounds of a stack buffer, leading to a crash.
CVE-2025-47807 In GStreamer through 1.26.1, the subparse plugin's subrip_unescape_formatting function may dereference a NULL pointer while parsing a subtitle file,
CVE-2025-47808 In GStreamer through 1.26.1, the subparse plugin's tmplayer_parse_line function may dereference a NULL pointer while parsing a subtitle file, leading

Version: 1.20.1-1ubuntu0.4 2024-12-18 17:07:10 UTC

  gst-plugins-base1.0 (1.20.1-1ubuntu0.4) jammy-security; urgency=medium

  * SECURITY UPDATE: Multiple security issues
    - debian/patches/202412-sec*.patch: backport upstream security fix
      commits from 1.24.10.
    - CVE-2024-47538, CVE-2024-47541, CVE-2024-47542, CVE-2024-47600,
      CVE-2024-47607, CVE-2024-47615, CVE-2024-47835

 -- Marc Deslauriers <email address hidden> Tue, 17 Dec 2024 08:24:56 -0500

Source diff to previous version
CVE-2024-47538 GStreamer is a library for constructing graphs of media-handling components. A stack-buffer overflow has been detected in the vorbis_handle_identific
CVE-2024-47541 GStreamer is a library for constructing graphs of media-handling components. An OOB-write vulnerability has been identified in the gst_ssa_parse_remo
CVE-2024-47542 GStreamer is a library for constructing graphs of media-handling components. A null pointer dereference has been discovered in the id3v2_read_synch_u
CVE-2024-47600 GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerability has been detected in the format_channel_mask f
CVE-2024-47607 GStreamer is a library for constructing graphs of media-handling components. stack-buffer overflow has been detected in the gst_opus_dec_parse_heade
CVE-2024-47615 GStreamer is a library for constructing graphs of media-handling components. An OOB-Write has been detected in the function gst_parse_vorbis_setup_pa
CVE-2024-47835 GStreamer is a library for constructing graphs of media-handling components. A null pointer dereference vulnerability has been detected in the parse_

Version: 1.20.1-1ubuntu0.2 2024-05-29 18:08:19 UTC

  gst-plugins-base1.0 (1.20.1-1ubuntu0.2) jammy-security; urgency=medium

  * SECURITY UPDATE: Integer overflow
    - debian/patches/CVE-2024-4453.patch: Prevent integer overflows and out of bounds reads
      when handling undefined tags in gst-libs/gst/tag/gstexiftag.c.
    - CVE-2024-4453

 -- Leonidas Da Silva Barbosa <email address hidden> Mon, 27 May 2024 11:31:40 -0300

Source diff to previous version
CVE-2024-4453 GStreamer EXIF Metadata Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary

Version: 1.20.1-1ubuntu0.1 2023-08-02 19:07:16 UTC

  gst-plugins-base1.0 (1.20.1-1ubuntu0.1) jammy-security; urgency=medium

  * SECURITY UPDATE: Heap overwrite in subtitle parsing
    - debian/patches/CVE-2023-37328-1.patch: look for the closing > of a
      tag after the opening < in gst/subparse/gstsubparse.c.
    - debian/patches/CVE-2023-37328-2.patch: skip after the end of a valid
      closing tag in gst/subparse/gstsubparse.c.
    - CVE-2023-37328
  * SECURITY UPDATE: Integer overflow leading to heap overwrite in FLAC
    image tag handling
    - debian/patches/CVE-2023-37327-2.patch: don't allow image tags with
      G_MAXUINT32 length in gst-libs/gst/tag/tags.c.
    - CVE-2023-37327

 -- Marc Deslauriers <email address hidden> Tue, 01 Aug 2023 08:26:17 -0400

CVE-2023-37328 Heap overwrite in subtitle parsing
CVE-2023-37327 Integer overflow leading to heap overwrite in FLAC image tag handling



About   -   Send Feedback to @ubuntu_updates