A heap-based buffer overflow in GStreamer Base Plugins might allow remote attackers to execute arbitrary code.
|Package||media-libs/gst-plugins-base on all architectures|
|Affected versions||< 1.14.5-r1|
|Unaffected versions||>= 1.14.5-r1|
A well-groomed and well-maintained collection of GStreamer plug-ins and elements, spanning the range of possible types of elements one would want to write for GStreamer.
It was discovered that GStreamer Base Plugins did not correctly handle certain malformed RTSP streams.
A remote attacker could entice a user to open a specially crafted RTSP stream with a GStreamer application, possibly resulting in the execution of arbitrary code or a Denial of Service condition.
There is no known workaround at this time.
All GStreamer Base Plugins users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=media-libs/gst-plugins-base-1.14.5-r1"
March 15, 2020
March 15, 2020: 1