Follow @Openwall on Twitter for new release announcements and other news
[<prev] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20260430235948.GA31035@openwall.com>
Date: Fri, 1 May 2026 01:59:48 +0200
From: Solar Designer <solar@...nwall.com>
To: oss-security@...ts.openwall.com
Subject: Re: 10+ CVEs in GStreamer

Hi,

I brought a bunch of GStreamer CVEs in here in March.  In April, there
was a new release with more CVEs announced/fixed.  I'd really rather not
be the one to be taking care of this - I guess we have subscribers who
are involved with the project or its packaging?  Anyone, please?

The new release is "1.28.2 stable bug fix release" with website news
item dated "2026-04-07 23:00" and said to include "Various security
fixes" and a lot more (with specifics).  The security fixes are for:

> GStreamer-SA-2026-0023 	Denial of service in SRT/WebVTT parser 	2026-04-07 23:59
> 
> GStreamer-SA-2026-0022
> CVE-2026-pending 	Heap buffer overflow in Matroska demuxer 	2026-04-07 23:59
> 
> GStreamer-SA-2026-0021
> CVE-2026-pending 	Integer overflow in WAV parser cue handling 	2026-04-07 23:59
> 
> GStreamer-SA-2026-0020 	Assertion failures in FLV demuxer on corrupted streams 	2026-04-07 23:59
> 
> GStreamer-SA-2026-0019 	NULL-pointer dereferences in mDVDsub subtitle parser 	2026-04-07 23:59
> 
> GStreamer-SA-2026-0018
> CVE-2026-pending 	MOV/MP4 demuxer audio channel parsing vulnerabilities 	2026-04-07 23:59
> 
> GStreamer-SA-2026-0017 	Integer overflow in H.266/VVC parser leading to stack overflow 	2026-04-07 23:59
> 
> GStreamer-SA-2026-0016
> CVE-2026-5056
> ZDI-CAN-29392 	Integer overflows and out-of-bounds access in MOV/MP4 demuxer 	2026-04-07 23:59
> 
> GStreamer-SA-2026-0015
> CVE-2026-pending 	Integer overflows in JPEG 2000 decimator 	2026-04-07 23:59
> 
> GStreamer-SA-2026-0014 	Integer overflow in AV1 LEB128 parser 	2026-04-07 23:59
> 
> GStreamer-SA-2026-0013 	H.264 video parser NULL pointer dereference when freeing SPS/MVC data 	2026-04-07 23:59

as listed at https://gstreamer.freedesktop.org/security/ along with
links to "Details" for each (which I have no time to extract and process
into this posting).

On Mon, Mar 16, 2026 at 03:58:16AM +0100, Solar Designer wrote:
> The news story at:
> 
> https://www.opennet.me/opennews/art.shtml?num=64964
> 
> originally in Russian explains GStreamer usage as follows, translated to
> English here:
> 
> > The GStreamer library is used to parse multimedia files in Nautilus
> > (GNOME Files), GNOME Videos, and Rhythmbox, as well as in the
> > localsearch search engine (previously known as tracker-miners) developed
> > by the GNOME project. This engine is installed in many distributions as
> > a dependency of the tracker-extract package, which GNOME uses to
> > automatically parse metadata in new files. Among other things, this
> > service indexes all files in the user's home directory without any user
> > interaction. Therefore, to perform an attack, simply create a specially
> > crafted multimedia file in the user's home directory, and the
> > vulnerability will be exploited during its automatic indexing.
> > 
> > In most GNOME distributions, localsearch components (tracker-miners) are
> > enabled by default and loaded as a hard dependency of the Nautilus file
> > manager (GNOME Files). Starting with GNOME 46, the localsearch process
> > runs in sandbox isolation. To disable metadata extraction, you can
> > delete the rules files from the /usr/share/localsearch3/extract-rules/
> > or /usr/share/tracker3-miners/extract-rules/ directory.

I don't know how good or not the mentioned "sandbox isolation" is, I'd
welcome comments on the risks involved and potential further hardening.

Alexander

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.