New gstreamer version was released at 2016/11/01. Here are release comments. https://gstreamer.freedesktop.org/releases/1.10/
now there is 1.10.2 too
according to the changelog, it were multiple vulnerabilities fixed in this version: Major bugfixes in 1.10.2 Security-relevant bugfix in the FLI/FLX/FLC decoder (CVE-2016-9634, CVE-2016-9635, CVE-2016-9636) Various fixes for crashes, assertions and other failures on fuzzed input files. Among others, thanks to Hanno Böck for testing and reporting (CVE-2016-9807, CVE-2016-9808, CVE-2016-9809, CVE-2016-9810, CVE-2016-9811, CVE-2016-9812, CVE-2016-9813). SAVP/SAVPF profile in gst-rtsp-server works for live streams again, and the correct MIKEY policy message is generated Further OpenGL related bugfixes gst-libav was updated to ffmpeg 3.2.1 ... and many, many more! Please increase the priority for this bug.
Increasing a priority field doesn't affect when it's done, at least for gstreamer@ and probably many others. Well aware this is still pending. The security bugs need backports to 1.8, we can't just introduce a 1.10 bump and then same day or week stabilize it already imo. Much of the gst-plugins-bad ones were also already done in a 1.8 revbump. Also none of them have really been demonstrated to do more than cause a segfault really, to my knowledge. The stuff about "unrelated tracker crawler process crashing on hitting a link" was rather bogus - it was designed to be a separate process so that crashes don't hurt anything else. Sorry it takes time, but that's how it is, and feel free to help out.
(In reply to Mart Raudsepp from comment #3) > Also none of them have really been demonstrated to do more than cause a > segfault really, to my knowledge. The stuff about "unrelated tracker crawler <skip> > crashes don't hurt anything else This is not correct. Any crash can lead to a remote code execution potentially. The exploit has been demonstrated in this case, see the following URL: https://scarybeastsecurity.blogspot.sg/2016/11/0day-exploit-advancing-exploitation.html "This was a fairly ridiculous exploit. But it was worth doing because it’s proof that scriptless exploits are possible, even within the context of decent 64-bit ASLR. It was possible to commandeer memory reads, writes and even additions within the decoder loop to slowly but surely advance the exploit and gain control."
All done by now except for gst-omx that I need to look at separately, stabilization ongoing at bug 601354
Thank you Mart.