[ubuntu/plucky-security] gst-plugins-base1.0 1.26.0-1ubuntu0.1 (Accepted)
Marc Deslauriers
marc.deslauriers at canonical.com
Tue Aug 26 13:07:06 UTC 2025
gst-plugins-base1.0 (1.26.0-1ubuntu0.1) plucky-security; urgency=medium
* SECURITY UPDATE: DoS via stack overflow in subparse plugin
- debian/patches/CVE-2025-47806.patch: make sure that subrip time
string is not too long before zero-padding in
gst/subparse/gstsubparse.c.
- CVE-2025-47806
* SECURITY UPDATE: DoS via null-deref in subparse plugin
- debian/patches/CVE-2025-47807.patch: check for valid UTF-8 before
cleaning up lines and check for regex replace errors in
gst/subparse/gstsubparse.c.
- CVE-2025-47807
* SECURITY UPDATE: DoS via null-deref in subparse plugin
- debian/patches/CVE-2025-47808.patch: don't append NULL + 1 to the
string buffer when parsing lines without text in
gst/subparse/tmplayerparse.c.
- CVE-2025-47808
Date: 2025-08-25 13:48:12.348166+00:00
Changed-By: Marc Deslauriers <marc.deslauriers at canonical.com>
https://launchpad.net/ubuntu/+source/gst-plugins-base1.0/1.26.0-1ubuntu0.1
-------------- next part --------------
Sorry, changesfile not available.
More information about the plucky-changes
mailing list