GStreamer
open source multimedia framework

GStreamer Spring Hackfest 2026

29-31 May 2026 ยท Nice, France

Join us!
Home
Features
News
Annual Conference
Planet (Blogs)
Download
Applications
Security Center
GitLab
Developers
Documentation
Forum
File a Bug
Artwork
Follow us on Bluesky
Follow us on Mastodon
Chat with us on Matrix

Security Advisory 2026-0003 (ZDI-CAN-28840, CVE-2026-3082)

Summary Heap-based Buffer Overflow on Huffman tables reading in JPEG parser
Date 2026-02-25
Affected Versions GStreamer gst-plugins-bad
IDs GStreamer-SA-2026-0003
CVE-2026-3082
ZDI-CAN-28840

Details

Heap-based Buffer Overflow when parsing Huffman tables in JPEG files, at copying the data to a storage variable.

Impact

It might be possible for a malicious third party to trigger a crash in the application, and possibly also effect code execution through heap manipulation.

Threat mitigation

The code now does bound checking with the storage variables.

The gst-plugins-bad 1.28.1 release address the issue. People using older branches of GStreamer should apply the patch and recompile.

Workarounds

The user should refrain from opening files from untrusted third parties or accessing untrusted remote sites, or not use VA JPEG decoder and encoder, or parse-jpeg example.

Solution

The gst-plugins-bad 1.28.1 release addresses the issue. People using older branches of GStreamer should apply the patch and recompile, or disable the VA plugin and remove the parse-jpep example.

References

The GStreamer project

CVE Database Entries

GStreamer 1.28.1 release

Patches


Report a problem on this page.