Your message dated Sat, 06 Sep 2025 12:14:50 +0100
with message-id 
<ee4c0876608d99eb3f8b333b556fbd92e7a652eb.ca...@adam-barratt.org.uk>
and subject line Closing p-u requests for fixes included in 12.12
has caused the Debian Bug report #1112070,
regarding bookworm-pu: package gst-plugins-good1.0/1.22.0-5+deb12u3
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
1112070: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1112070
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
Tags: bookworm
X-Debbugs-Cc: [email protected]
Control: affects -1 + src:gst-plugins-good1.0
User: [email protected]
Usertags: pu

Fixes a low impact security issues. Tests with various test files
were fine and autopkgtests via debusine also look good. debdiff
below.

Cheers,
        Moritz

diff -Nru gst-plugins-good1.0-1.22.0/debian/changelog 
gst-plugins-good1.0-1.22.0/debian/changelog
--- gst-plugins-good1.0-1.22.0/debian/changelog 2024-12-21 14:32:49.000000000 
+0100
+++ gst-plugins-good1.0-1.22.0/debian/changelog 2025-08-20 20:44:45.000000000 
+0200
@@ -1,3 +1,9 @@
+gst-plugins-good1.0 (1.22.0-5+deb12u3) bookworm; urgency=medium
+
+  * CVE-2025-47219
+
+ -- Moritz Mühlenhoff <[email protected]>  Wed, 20 Aug 2025 20:44:45 +0200
+
 gst-plugins-good1.0 (1.22.0-5+deb12u2) bookworm-security; urgency=high
 
   * Non-maintainer upload by the Security Team.
diff -Nru gst-plugins-good1.0-1.22.0/debian/patches/CVE-2025-47219.patch 
gst-plugins-good1.0-1.22.0/debian/patches/CVE-2025-47219.patch
--- gst-plugins-good1.0-1.22.0/debian/patches/CVE-2025-47219.patch      
1970-01-01 01:00:00.000000000 +0100
+++ gst-plugins-good1.0-1.22.0/debian/patches/CVE-2025-47219.patch      
2025-08-20 20:44:38.000000000 +0200
@@ -0,0 +1,26 @@
+From b80803943388050cb870c95934fc52feeffb94ac Mon Sep 17 00:00:00 2001
+From: =?UTF-8?q?Sebastian=20Dr=C3=B6ge?= <[email protected]>
+Date: Sat, 3 May 2025 09:43:32 +0300
+Subject: [PATCH] qtdemux: Check if enough bytes are available for each stsd
+ entry
+
+There must be at least 8 bytes for the length / fourcc of each entry. After
+reading those, the length is already validated against the remaining available
+bytes.
+
+Fixes https://gitlab.freedesktop.org/gstreamer/gstreamer/-/issues/4407
+Fixes CVE-2025-47219
+
+--- gst-plugins-good1.0-1.22.0.orig/gst/isomp4/qtdemux.c
++++ gst-plugins-good1.0-1.22.0/gst/isomp4/qtdemux.c
+@@ -11315,6 +11315,10 @@ qtdemux_parse_trak (GstQTDemux * qtdemux
+     gchar *codec = NULL;
+     QtDemuxStreamStsdEntry *entry = &stream->stsd_entries[stsd_index];
+ 
++    /* needs at least length and fourcc */
++    if (remaining_stsd_len < 8)
++      goto corrupt_file;
++
+     /* and that entry should fit within stsd */
+     len = QT_UINT32 (stsd_entry_data);
+     if (len > remaining_stsd_len)
diff -Nru gst-plugins-good1.0-1.22.0/debian/patches/series 
gst-plugins-good1.0-1.22.0/debian/patches/series
--- gst-plugins-good1.0-1.22.0/debian/patches/series    2024-12-21 
14:32:49.000000000 +0100
+++ gst-plugins-good1.0-1.22.0/debian/patches/series    2025-08-20 
20:44:13.000000000 +0200
@@ -30,3 +30,4 @@
 qtdemux-Actually-handle-errors-returns-from-various-.patch
 qtdemux-Check-for-invalid-atom-length-when-extractin.patch
 qtdemux-Add-size-check-for-parsing-SMI-SEQH-atom.patch
+CVE-2025-47219.patch

--- End Message ---
--- Begin Message ---
Package: release.debian.org
Version: 12.12

Hi,

Each of the updates referenced by these requests was included in
today's 12.12 point release for bookworm.

Regards,

Adam

--- End Message ---

Reply via email to