Gentoo: GLSA-202003-33: GStreamer Base Plugins: Heap-based buffer overflow
Summary
It was discovered that GStreamer Base Plugins did not correctly handle certain malformed RTSP streams.
Resolution
All GStreamer Base Plugins users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=media-libs/gst-plugins-base-1.14.5-r1"
References
[ 1 ] CVE-2019-9928 https://nvd.nist.gov/vuln/detail/CVE-2019-9928
Availability
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/202003-33
Concerns
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
Background
A well-groomed and well-maintained collection of GStreamer plug-ins and elements, spanning the range of possible types of elements one would want to write for GStreamer.
Affected Packages
------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 media-libs/gst-plugins-base < 1.14.5-r1 >= 1.14.5-r1
Impact
===== A remote attacker could entice a user to open a specially crafted RTSP stream with a GStreamer application, possibly resulting in the execution of arbitrary code or a Denial of Service condition.
Workaround
There is no known workaround at this time.