Summary: | <media-libs/gst-plugins-base-1.14.5: heap-based buffer overflow in RTSP connection parser | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | psp <gentoo-bugzilla> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | gstreamer, leio |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://gstreamer.freedesktop.org/security/sa-2019-0001.html | ||
Whiteboard: | B2 [glsa+ cve] | ||
Package list: |
=media-libs/gst-plugins-base-1.14.5-r1
|
Runtime testing required: | --- |
Description
psp
2019-11-27 06:56:57 UTC
gst-plugins-base-1.14.5-r1 has been stable on all architectures since 1st January 2020 already. *** Bug 684842 has been marked as a duplicate of this bug. *** New GLSA request filed. This issue was resolved and addressed in GLSA 202003-33 at https://security.gentoo.org/glsa/202003-33 by GLSA coordinator Thomas Deutschmann (whissi). Re-opening for cleanup. @ maintainer(s): Please cleanup and drop =media-libs/gst-plugins-base-1.14.5! Please drop vulnerable. There are no vulnerable versions for this bug in the tree since January 1st 2020. (In reply to Mart Raudsepp from comment #7) > There are no vulnerable versions for this bug in the tree since January 1st > 2020. Thanks! |