Integer Overflow or Wraparound Affecting gst-plugins-good1.0 package, versions <1.18.4-2+deb11u1
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN11-GSTPLUGINSGOOD10-2959384
- published 23 Jul 2022
- disclosed 19 Jul 2022
Introduced: 19 Jul 2022
CVE-2022-1925 Open this link in a new tabHow to fix?
Upgrade Debian:11 gst-plugins-good1.0 to version 1.18.4-2+deb11u1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream gst-plugins-good1.0 package and not the gst-plugins-good1.0 package as distributed by Debian.
See How to fix? for Debian:11 relevant fixed versions and status.
DOS / potential heap overwrite in mkv demuxing using HEADERSTRIP decompression. Integer overflow in matroskaparse element in gst_matroska_decompress_data function which causes a heap overflow. Due to restrictions on chunk sizes in the matroskademux element, the overflow can't be triggered, however the matroskaparse element has no size checks.