GStreamer plug-ins: User-assisted execution of arbitrary code Multiple vulnerabilities in multiple GStreamer plug-ins might allow for the execution of arbitrary code. gst-plugins-good gst-plugins-base gst-plugins-libpng 2009-07-12 2009-07-12 256096 261594 272972 remote 0.10.14 0.10.14 0.10.22 0.10.22 0.10.14-r1 0.10.14-r1

The GStreamer plug-ins provide decoders to the GStreamer open source media framework.

Multiple vulnerabilities have been reported in several GStreamer plug-ins:

A remote attacker could entice a user or automated system using a GStreamer plug-in to process a specially crafted file, resulting in the execution of arbitrary code or a Denial of Service.

There is no known workaround at this time.

All gst-plugins-good users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=media-libs/gst-plugins-good-0.10.14"

All gst-plugins-base users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=media-libs/gst-plugins-base-0.10.22"

All gst-plugins-libpng users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=media-plugins/gst-plugins-libpng-0.10.14-r1"
CVE-2009-0386 CVE-2009-0387 CVE-2009-0397 CVE-2009-0586 CVE-2009-1932 rbu rbu rbu