A heap-based buffer overflow in GStreamer Base Plugins might allow remote attackers to execute arbitrary code.
| Package | media-libs/gst-plugins-base on all architectures | 
|---|---|
| Affected versions | < 1.14.5-r1 | 
| Unaffected versions | >= 1.14.5-r1 | 
A well-groomed and well-maintained collection of GStreamer plug-ins and elements, spanning the range of possible types of elements one would want to write for GStreamer.
It was discovered that GStreamer Base Plugins did not correctly handle certain malformed RTSP streams.
A remote attacker could entice a user to open a specially crafted RTSP stream with a GStreamer application, possibly resulting in the execution of arbitrary code or a Denial of Service condition.
There is no known workaround at this time.
All GStreamer Base Plugins users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=media-libs/gst-plugins-base-1.14.5-r1"
      Release date
      
      March 15, 2020
    
      Latest revision
      
      March 15, 2020: 1
    
      Severity
      
      normal
    
      Exploitable
      
      remote
    
Bugzilla entries