rom: Thorsten Alteholz 
To: debian-lts-announce@lists.debian.org
Subject: [SECURITY] [DLA 1769-1] gst-plugins-base0.10 security update

Package        : gst-plugins-base0.10
Version        : 0.10.36-2+deb8u1
CVE ID         : CVE-2019-9928
Debian Bug     :


The RTSP connection parser in the base GStreamer packages version 0.10, 
which is a streaming media framework, was vulnerable against an 
heap-based buffer overflow by sending a longer than allowed session id in 
a response and including a semicolon to change the maximum length. This 
could result in a remote code execution.


For Debian 8 "Jessie", this problem has been fixed in version
0.10.36-2+deb8u1.

We recommend that you upgrade your gst-plugins-base0.10 packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

Debian LTS: DLA-1769-1: gst-plugins-base0.10 security update

April 28, 2019
The RTSP connection parser in the base GStreamer packages version 0.10, which is a streaming media framework, was vulnerable against an heap-based buffer overflow by sending a long...

Summary

The RTSP connection parser in the base GStreamer packages version 0.10,
which is a streaming media framework, was vulnerable against an
heap-based buffer overflow by sending a longer than allowed session id in
a response and including a semicolon to change the maximum length. This
could result in a remote code execution.


For Debian 8 "Jessie", this problem has been fixed in version
0.10.36-2+deb8u1.

We recommend that you upgrade your gst-plugins-base0.10 packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS



Severity
Package : gst-plugins-base0.10
Version : 0.10.36-2+deb8u1
CVE ID : CVE-2019-9928
Debian Bug :

Related News