DSA-3723-1 gst-plugins-good1.0 -- security update

Related Vulnerabilities: CVE-2016-9634   CVE-2016-9635   CVE-2016-9636  

Chris Evans discovered that the GStreamer 1.0 plugin used to decode files in the FLIC format allowed execution of arbitrary code. Further details can be found in his advisory at https://scarybeastsecurity.blogspot.de/2016/11/0day-exploit-advancing-exploitation.html For the stable distribution (jessie), these problems have been fixed in version 1.4.4-2+deb8u2. For the unstable distribution (sid), these problems have been fixed in version 1.10.1-2. We recommend that you upgrade your gst-plugins-good1.0 packages.

Debian Security Advisory

DSA-3723-1 gst-plugins-good1.0 -- security update

Date Reported:
24 Nov 2016
Affected Packages:
gst-plugins-good1.0
Vulnerable:
Yes
Security database references:
In the Debian bugtracking system: Bug 845375.
In Mitre's CVE dictionary: CVE-2016-9634, CVE-2016-9635, CVE-2016-9636.
More information:

Chris Evans discovered that the GStreamer 1.0 plugin used to decode files in the FLIC format allowed execution of arbitrary code. Further details can be found in his advisory at https://scarybeastsecurity.blogspot.de/2016/11/0day-exploit-advancing-exploitation.html

For the stable distribution (jessie), these problems have been fixed in version 1.4.4-2+deb8u2.

For the unstable distribution (sid), these problems have been fixed in version 1.10.1-2.

We recommend that you upgrade your gst-plugins-good1.0 packages.