Package: gst-plugins-base1.0 / 1.4.4-2+deb8u1

Metadata

Package Version Patches format
gst-plugins-base1.0 1.4.4-2+deb8u1 3.0 (quilt)

Patch series

view the series file
Patch File delta Description
0001 riff media Check for valid channels rate before usin.patch | (download)

gst-libs/gst/riff/riff-media.c | 6 4 + 2 - 0 !
1 file changed, 4 insertions(+), 2 deletions(-)

 [patch] riff-media: check for valid channels/rate before using the
 values

Otherwise we might divide by zero or otherwise create invalid caps.

https://bugzilla.gnome.org/show_bug.cgi?id=777262

0002 riff media Don t divide block align by zero channels.patch | (download)

gst-libs/gst/riff/riff-media.c | 34 20 + 14 - 0 !
1 file changed, 20 insertions(+), 14 deletions(-)

 [patch] riff-media: don't divide block align by zero channels

https://bugzilla.gnome.org/show_bug.cgi?id=777525

0003 riff media Don t recurse in for nested WAVEFORMATEX.patch | (download)

gst-libs/gst/riff/riff-media.c | 3 2 + 1 - 0 !
1 file changed, 2 insertions(+), 1 deletion(-)

 [patch] riff-media: don't recurse in for nested waveformatex

There was already a check for that, but it failed because
subformat_guid[0] is a guint32 and that is then casted implicitely to a
guint16 when recursing... just that we checked the uncasted value.

This caused an infinite recursion and thus stack overflow.

https://bugzilla.gnome.org/show_bug.cgi?id=777265

0004 samiparse Check that the string has a non zero lengt.patch | (download)

gst/subparse/samiparse.c | 3 2 + 1 - 0 !
1 file changed, 2 insertions(+), 1 deletion(-)

 [patch] samiparse: check that the string has a non-zero length before
 overwriting the last byte with '\0'

https://bugzilla.gnome.org/show_bug.cgi?id=777502

0005 typefind bounds check windows ico detection.patch | (download)

gst/typefind/gsttypefindfunctions.c | 2 2 + 0 - 0 !
1 file changed, 2 insertions(+)

 [patch] typefind: bounds check windows ico detection

Fixes out of bounds read

https://bugzilla.gnome.org/show_bug.cgi?id=774902