DSA-4437-1 gst-plugins-base1.0 -- security update

Related Vulnerabilities: CVE-2019-9928  

It was discovered that a buffer overflow in the RTSP parser of the GStreamer media framework may result in the execution of arbitrary code if a malformed RSTP stream is opened. For the stable distribution (stretch), this problem has been fixed in version 1.10.4-1+deb9u1. We recommend that you upgrade your gst-plugins-base1.0 packages. For the detailed security status of gst-plugins-base1.0 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/gst-plugins-base1.0

Debian Security Advisory

DSA-4437-1 gst-plugins-base1.0 -- security update

Date Reported:
29 Apr 2019
Affected Packages:
gst-plugins-base1.0
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2019-9928.
More information:

It was discovered that a buffer overflow in the RTSP parser of the GStreamer media framework may result in the execution of arbitrary code if a malformed RSTP stream is opened.

For the stable distribution (stretch), this problem has been fixed in version 1.10.4-1+deb9u1.

We recommend that you upgrade your gst-plugins-base1.0 packages.

For the detailed security status of gst-plugins-base1.0 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/gst-plugins-base1.0