|
|
|||||||
Security Advisory 2026-0003 (ZDI-CAN-28840, CVE-2026-3082)
DetailsHeap-based Buffer Overflow when parsing Huffman tables in JPEG files, at copying the data to a storage variable. ImpactIt might be possible for a malicious third party to trigger a crash in the application, and possibly also effect code execution through heap manipulation. Threat mitigationThe code now does bound checking with the storage variables. The gst-plugins-bad 1.28.1 release address the issue. People using older branches of GStreamer should apply the patch and recompile. WorkaroundsThe user should refrain from opening files from untrusted third parties or
accessing untrusted remote sites, or not use VA JPEG decoder and encoder, or
SolutionThe gst-plugins-bad 1.28.1 release addresses the issue. People
using older branches of GStreamer should apply the patch and recompile, or
disable the VA plugin and remove the ReferencesThe GStreamer projectCVE Database EntriesGStreamer 1.28.1 releasePatches |
| Report a problem on this page. |