|
|
Message-ID: <7f2a8960-dec5-4cb8-b4f2-d2366c4d9a21@oracle.com>
Date: Fri, 29 Sep 2023 14:52:17 -0700
From: Alan Coopersmith <alan.coopersmith@...cle.com>
To: oss-security@...ts.openwall.com
Subject: 3 buffer overflows in gstreamer's gst-plugins-bad before 1.22.6
https://gstreamer.freedesktop.org/security/sa-2023-0006.html reports:
Security Advisory 2023-0006 (ZDI-CAN-21660) (CVE-2023-40474)
Details:
Heap-based buffer overflow in the MXF file demuxer when handling malformed
files with uncompressed video in GStreamer versions before 1.22.6.
Impact:
It is possible for a malicious third party to trigger a crash in the
application, and possibly also effect code execution through heap
manipulation.
Solution:
The gst-plugins-bad 1.22.6 releases address the issue. People using older
branches of GStreamer should apply the patch and recompile.
Patches:
https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/5362.patch
(includes patch for SA-2023-0007 / ZDI-CAN-21661 / CVE-2023-40475)
https://gstreamer.freedesktop.org/security/sa-2023-0007.html reports:
Security Advisory 2023-0007 (ZDI-CAN-21661) (CVE-2023-40475)
Details:
Heap-based buffer overflow in the MXF file demuxer when handling malformed
files with AES3 audio in GStreamer versions before 1.22.6.
Impact:
It is possible for a malicious third party to trigger a crash in the
application, and possibly also effect code execution through heap
manipulation.
Solution:
The gst-plugins-bad 1.22.6 releases address the issue. People using older
branches of GStreamer should apply the patch and recompile.
Patches:
https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/5362.patch
(includes patch for SA-2023-0006 / ZDI-CAN-21660 / CVE-2023-40474)
https://gstreamer.freedesktop.org/security/sa-2023-0008.html reports:
Security Advisory 2023-0008 (ZDI-CAN-21768) (CVE-2023-40476)
Details:
Stack-based buffer overflow in the H.265 video parser when handling malformed
H.265 video streams in GStreamer versions before 1.22.6.
Impact:
It is possible for a malicious third party to trigger a crash in the
application, and possibly also effect code execution through stack
manipulation.
Solution:
The gst-plugins-bad 1.22.6 releases address the issue. People using older
branches of GStreamer should apply the patch and recompile.
Patches:
https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/5364.patch
--
-Alan Coopersmith- alan.coopersmith@...cle.com
Oracle Solaris Engineering - https://blogs.oracle.com/solaris
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.