GStreamer
open source multimedia framework

GStreamer Spring Hackfest 2026

29-31 May 2026 ยท Nice, France

Join us!
Home
Features
News
Annual Conference
Planet (Blogs)
Download
Applications
Security Center
GitLab
Developers
Documentation
Forum
File a Bug
Artwork
Follow us on Bluesky
Follow us on Mastodon
Chat with us on Matrix

Security Advisory 2026-0029

Summary Bounds check errors in MXF VANC packet handling
Date 2026-05-11
Affected Versions GStreamer gst-plugins-bad < 1.28.3
IDs GStreamer-SA-2026-0029

Details

Bounds check errors in the MXF demuxer and muxer when handling VANC (Vertical Ancillary Data) packets. The demuxer had insufficient and incorrect bounds checks when parsing multiple VANC packets per edit unit, including unchecked accesses to bit and byte readers, and missing validation of array sizes. The muxer had incorrect size calculations when writing VANC packets, computing wrong packet and wrapper sizes.

Impact

A malicious third party could trigger out-of-bounds reads or incorrect buffer operations by providing a crafted MXF file with invalid VANC packet configuration, potentially resulting in a crash, data corruption, or denial of service.

Solution

The gst-plugins-bad 1.28.3 release addresses the issue. People using older versions of GStreamer should apply the patch and recompile.

References

The GStreamer project

CVE Database Entries

  • No CVE number assigned or pending

GStreamer 1.28.3 release

Patches


Report a problem on this page.