Multiple vulnerabilities in multiple GStreamer plug-ins might allow for the execution of arbitrary code.
Package | media-libs/gst-plugins-good on all architectures |
---|---|
Affected versions | < 0.10.14 |
Unaffected versions | >= 0.10.14 |
Package | media-libs/gst-plugins-base on all architectures |
---|---|
Affected versions | < 0.10.22 |
Unaffected versions | >= 0.10.22 |
Package | media-plugins/gst-plugins-libpng on all architectures |
---|---|
Affected versions | < 0.10.14-r1 |
Unaffected versions | >= 0.10.14-r1 |
The GStreamer plug-ins provide decoders to the GStreamer open source media framework.
Multiple vulnerabilities have been reported in several GStreamer plug-ins:
A remote attacker could entice a user or automated system using a GStreamer plug-in to process a specially crafted file, resulting in the execution of arbitrary code or a Denial of Service.
There is no known workaround at this time.
All gst-plugins-good users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=media-libs/gst-plugins-good-0.10.14"
All gst-plugins-base users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=media-libs/gst-plugins-base-0.10.22"
All gst-plugins-libpng users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=media-plugins/gst-plugins-libpng-0.10.14-r1"