Source: gst-plugins-base1.0
Version: 1.14.4-1
Severity: grave
Tags: security upstream
Forwarded: 
https://gitlab.freedesktop.org/gstreamer/gst-plugins-base/merge_requests/157

Hi,

The following vulnerability was published for gst-plugins-base1.0.

CVE-2019-9928[0]:
| GStreamer before 1.16.0 has a heap-based buffer overflow in the RTSP
| connection parser via a crafted response from a server, potentially
| allowing remote code execution.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2019-9928
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9928
[1] https://gitlab.freedesktop.org/gstreamer/gst-plugins-base/merge_requests/157
[2] https://gstreamer.freedesktop.org/security/sa-2019-0001.html

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to