oss-sec mailing list archives

CVE Request -- gstreamer-plugins-good


From: Jan Lieskovsky <jlieskov () redhat com>
Date: Fri, 23 Jan 2009 12:06:37 +0100

Hello Steve,

  recently the following gstreamer-plugins-good 
related multiple heap-based buffer overflows and
one an array index out of bounds vulnerability
has been reported in the GStreamers demuxer
responsible for demuxing QuickTime *.mov files
into raw or compressed audio/video files.

References:
http://trapkit.de/advisories/TKADV2009-003.txt [1]
http://cgit.freedesktop.org/gstreamer/gst-plugins-good/commit/?id=bdc20b9baf13564d9a061343416395f8f9a92b53
https://bugzilla.redhat.com/show_bug.cgi?id=481267


Affected gstreamer-plugins-good versions:
=========================================
   all prior to latest upstream 0.10.12 version  (all three issues -- "qtdemux_parse_samples", "duration" and 
"mark_keyframes")

Affected gstreamer-plugins versions:
====================================
  gstreamer-plugins-0.8.5-1.EL.1.i386 (only the "duration" heap based buffer overflow vulnerability -- (vuln #3) in [1].

Steve, could you please allocate a new CVE id/ids for this issue/issues?

Thanks, Jan.
--
Jan iankko Lieskovsky / Red Hat Security Response Team




Current thread: