Debian Package Tracker
Register | Log in
Subscribe

onevpl-intel-gpu

Choose email to subscribe with

general
  • source: onevpl-intel-gpu (main)
  • version: 25.3.1-1
  • maintainer: Timo Aaltonen (DMD)
  • arch: amd64
  • std-ver: 4.6.0
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • oldstable: 22.6.4-1
  • stable: 25.1.4-1
  • testing: 25.3.1-1
  • unstable: 25.3.1-1
versioned links
  • 22.6.4-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 25.1.4-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 25.3.1-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • libmfx-gen-dev
  • libmfx-gen1.2
action needed
A new upstream version is available: 25.3.3 high
A new upstream version 25.3.3 is available, you should consider packaging it.
Created: 2025-04-09 Last update: 2025-09-09 11:30
1 bug tagged patch in the BTS normal
The BTS contains patches fixing 1 bug, consider including or untagging them.
Created: 2025-02-18 Last update: 2025-09-09 10:31
No known security issue in bookworm wishlist

There are 10 open security issues in bookworm.

10 ignored issues:
  • CVE-2023-22656: Out-of-bounds read in Intel(R) Media SDK and some Intel(R) oneVPL software before version 23.3.5 may allow an authenticated user to potentially enable escalation of privilege via local access.
  • CVE-2023-45221: Improper buffer restrictions in Intel(R) Media SDK all versions may allow an authenticated user to potentially enable escalation of privilege via local access.
  • CVE-2023-47169: Improper buffer restrictions in Intel(R) Media SDK software all versions may allow an authenticated user to potentially enable denial of service via local access.
  • CVE-2023-47282: Out-of-bounds write in Intel(R) Media SDK all versions and some Intel(R) oneVPL software before version 23.3.5 may allow an authenticated user to potentially enable escalation of privilege via local access.
  • CVE-2023-48368: Improper input validation in Intel(R) Media SDK software all versions may allow an authenticated user to potentially enable denial of service via local access.
  • CVE-2023-48727: NULL pointer dereference in some Intel(R) oneVPL software before version 23.3.5 may allow an authenticated user to potentially enable information disclosure via local access.
  • CVE-2024-21783: Integer overflow for some Intel(R) VPL software before version 24.1.4 may allow an authenticated user to potentially enable escalation of privilege via local access.
  • CVE-2024-21808: Improper buffer restrictions in some Intel(R) VPL software before version 24.1.4 may allow an authenticated user to potentially enable escalation of privilege via local access.
  • CVE-2024-28030: NULL pointer dereference in some Intel(R) VPL software before version 24.1.4 may allow an authenticated user to potentially enable denial of service via local access.
  • CVE-2024-28051: Out-of-bounds read in some Intel(R) VPL software before version 24.1.4 may allow an authenticated user to potentially enable information disclosure via local access.
Created: 2024-11-05 Last update: 2025-08-17 05:59
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.2 instead of 4.6.0).
Created: 2022-05-11 Last update: 2025-08-12 13:32
news
[rss feed]
  • [2025-08-17] onevpl-intel-gpu 25.3.1-1 MIGRATED to testing (Debian testing watch)
  • [2025-08-12] Accepted onevpl-intel-gpu 25.3.1-1 (source) into unstable (Timo Aaltonen)
  • [2025-03-30] onevpl-intel-gpu 25.1.4-1 MIGRATED to testing (Debian testing watch)
  • [2025-03-24] Accepted onevpl-intel-gpu 25.1.4-1 (source) into unstable (Timo Aaltonen)
  • [2025-03-04] onevpl-intel-gpu 25.1.2-1 MIGRATED to testing (Debian testing watch)
  • [2025-02-27] Accepted onevpl-intel-gpu 25.1.2-1 (source) into unstable (Timo Aaltonen)
  • [2024-09-30] onevpl-intel-gpu 24.3.4-1 MIGRATED to testing (Debian testing watch)
  • [2024-09-25] Accepted onevpl-intel-gpu 24.3.4-1 (source) into unstable (Timo Aaltonen)
  • [2024-09-18] onevpl-intel-gpu 24.3.3-1 MIGRATED to testing (Debian testing watch)
  • [2024-09-13] Accepted onevpl-intel-gpu 24.3.3-1 (source) into unstable (Timo Aaltonen)
  • [2023-06-25] onevpl-intel-gpu 23.2.3-1 MIGRATED to testing (Debian testing watch)
  • [2023-06-19] Accepted onevpl-intel-gpu 23.2.3-1 (source) into unstable (Timo Aaltonen)
  • [2022-12-13] onevpl-intel-gpu 22.6.4-1 MIGRATED to testing (Debian testing watch)
  • [2022-12-08] Accepted onevpl-intel-gpu 22.6.4-1 (source) into unstable (Timo Aaltonen)
  • [2022-10-23] onevpl-intel-gpu 22.5.4-1 MIGRATED to testing (Debian testing watch)
  • [2022-10-18] Accepted onevpl-intel-gpu 22.5.4-1 (source) into unstable (Timo Aaltonen)
  • [2022-09-04] onevpl-intel-gpu 22.5.3-1 MIGRATED to testing (Debian testing watch)
  • [2022-08-26] Accepted onevpl-intel-gpu 22.5.3-1 (source) into unstable (Timo Aaltonen)
  • [2022-04-09] onevpl-intel-gpu 22.3.2-1 MIGRATED to testing (Debian testing watch)
  • [2022-04-04] Accepted onevpl-intel-gpu 22.3.2-1 (source) into unstable (Timo Aaltonen)
  • [2022-02-24] onevpl-intel-gpu 22.2.0-1 MIGRATED to testing (Debian testing watch)
  • [2022-02-19] Accepted onevpl-intel-gpu 22.2.0-1 (source amd64) into unstable, unstable (Debian FTP Masters) (signed by: Timo Aaltonen)
bugs [bug history graph]
  • all: 1
  • RC: 0
  • I&N: 0
  • M&W: 1
  • F&P: 0
  • patch: 1
links
  • homepage
  • lintian
  • buildd: logs, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 25.3.1-1

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing