Your message dated Sat, 06 Sep 2025 12:14:50 +0100
with message-id
<ee4c0876608d99eb3f8b333b556fbd92e7a652eb.ca...@adam-barratt.org.uk>
and subject line Closing p-u requests for fixes included in 12.12
has caused the Debian Bug report #1112070,
regarding bookworm-pu: package gst-plugins-good1.0/1.22.0-5+deb12u3
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
1112070: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1112070
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
Tags: bookworm
X-Debbugs-Cc: [email protected]
Control: affects -1 + src:gst-plugins-good1.0
User: [email protected]
Usertags: pu
Fixes a low impact security issues. Tests with various test files
were fine and autopkgtests via debusine also look good. debdiff
below.
Cheers,
Moritz
diff -Nru gst-plugins-good1.0-1.22.0/debian/changelog
gst-plugins-good1.0-1.22.0/debian/changelog
--- gst-plugins-good1.0-1.22.0/debian/changelog 2024-12-21 14:32:49.000000000
+0100
+++ gst-plugins-good1.0-1.22.0/debian/changelog 2025-08-20 20:44:45.000000000
+0200
@@ -1,3 +1,9 @@
+gst-plugins-good1.0 (1.22.0-5+deb12u3) bookworm; urgency=medium
+
+ * CVE-2025-47219
+
+ -- Moritz Mühlenhoff <[email protected]> Wed, 20 Aug 2025 20:44:45 +0200
+
gst-plugins-good1.0 (1.22.0-5+deb12u2) bookworm-security; urgency=high
* Non-maintainer upload by the Security Team.
diff -Nru gst-plugins-good1.0-1.22.0/debian/patches/CVE-2025-47219.patch
gst-plugins-good1.0-1.22.0/debian/patches/CVE-2025-47219.patch
--- gst-plugins-good1.0-1.22.0/debian/patches/CVE-2025-47219.patch
1970-01-01 01:00:00.000000000 +0100
+++ gst-plugins-good1.0-1.22.0/debian/patches/CVE-2025-47219.patch
2025-08-20 20:44:38.000000000 +0200
@@ -0,0 +1,26 @@
+From b80803943388050cb870c95934fc52feeffb94ac Mon Sep 17 00:00:00 2001
+From: =?UTF-8?q?Sebastian=20Dr=C3=B6ge?= <[email protected]>
+Date: Sat, 3 May 2025 09:43:32 +0300
+Subject: [PATCH] qtdemux: Check if enough bytes are available for each stsd
+ entry
+
+There must be at least 8 bytes for the length / fourcc of each entry. After
+reading those, the length is already validated against the remaining available
+bytes.
+
+Fixes https://gitlab.freedesktop.org/gstreamer/gstreamer/-/issues/4407
+Fixes CVE-2025-47219
+
+--- gst-plugins-good1.0-1.22.0.orig/gst/isomp4/qtdemux.c
++++ gst-plugins-good1.0-1.22.0/gst/isomp4/qtdemux.c
+@@ -11315,6 +11315,10 @@ qtdemux_parse_trak (GstQTDemux * qtdemux
+ gchar *codec = NULL;
+ QtDemuxStreamStsdEntry *entry = &stream->stsd_entries[stsd_index];
+
++ /* needs at least length and fourcc */
++ if (remaining_stsd_len < 8)
++ goto corrupt_file;
++
+ /* and that entry should fit within stsd */
+ len = QT_UINT32 (stsd_entry_data);
+ if (len > remaining_stsd_len)
diff -Nru gst-plugins-good1.0-1.22.0/debian/patches/series
gst-plugins-good1.0-1.22.0/debian/patches/series
--- gst-plugins-good1.0-1.22.0/debian/patches/series 2024-12-21
14:32:49.000000000 +0100
+++ gst-plugins-good1.0-1.22.0/debian/patches/series 2025-08-20
20:44:13.000000000 +0200
@@ -30,3 +30,4 @@
qtdemux-Actually-handle-errors-returns-from-various-.patch
qtdemux-Check-for-invalid-atom-length-when-extractin.patch
qtdemux-Add-size-check-for-parsing-SMI-SEQH-atom.patch
+CVE-2025-47219.patch
--- End Message ---
--- Begin Message ---
Package: release.debian.org
Version: 12.12
Hi,
Each of the updates referenced by these requests was included in
today's 12.12 point release for bookworm.
Regards,
Adam
--- End Message ---