From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from lists.gentoo.org (pigeon.gentoo.org [208.92.234.80]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by finch.gentoo.org (Postfix) with ESMTPS id 1C6C1158094 for ; Sun, 14 Aug 2022 21:53:43 +0000 (UTC) Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id EBA20E0D7B; Sun, 14 Aug 2022 21:51:54 +0000 (UTC) Received: from smtp.gentoo.org (mail.gentoo.org [IPv6:2001:470:ea4a:1:5054:ff:fec7:86e4]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits)) (No client certificate requested) by pigeon.gentoo.org (Postfix) with ESMTPS id 926E2E0D0E for ; Sun, 14 Aug 2022 21:47:54 +0000 (UTC) Received: from glsamakerdev.dev.gentoo.org (unknown [140.211.166.165]) by smtp.gentoo.org (Postfix) with ESMTP id 052E13415ED for ; Sun, 14 Aug 2022 21:47:54 +0000 (UTC) Received: from [172.24.0.3] (unknown [172.24.0.3]) by glsamakerdev.dev.gentoo.org (Postfix) with ESMTP id E4C62C3B7E for ; Sun, 14 Aug 2022 21:47:53 +0000 (-00) Subject: [gentoo-announce] [ GLSA 202208-31 ] GStreamer, GStreamer Plugins: Multiple Vulnerabilities Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-announce@lists.gentoo.org X-Auto-Response-Suppress: DR, RN, NRN, OOF, AutoReply MIME-Version: 1.0 Content-Type: multipart/signed; protocol="application/pgp-signature"; micalg="pgp-sha512"; boundary="===============6957170566253276521==" From: glsamaker@gentoo.org To: gentoo-announce@lists.gentoo.org Reply-To: security@gentoo.org Date: Sun, 14 Aug 2022 21:47:53 -0000 Message-ID: <166051367393.12.3139408283666350092@7b72ab9f548d> X-Archives-Salt: e4b6f9c3-6f79-4bdd-80b4-29282570ab66 X-Archives-Hash: 783003536172f6ec9d3999c8f724d9b4 --===============6957170566253276521== Content-Type: text/plain; charset="utf-8" - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 202208-31 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: High Title: GStreamer, GStreamer Plugins: Multiple Vulnerabilities Date: August 14, 2022 Bugs: #766336, #785652, #785655, #785658, #785661, #835368, #843770, #765163 ID: 202208-31 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been found in GStreamer and its plugins, the worst of which could result in arbitrary code execution. Background ========== GStreamer is an open source multimedia framework. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 media-libs/gst-plugins-bad < 1.16.3 >= 1.16.3 2 media-libs/gst-plugins-base< 1.18.4 >= 1.18.4 3 media-libs/gst-plugins-good< 1.18.4 >= 1.18.4 4 media-libs/gst-plugins-ugly< 1.18.4 >= 1.18.4 5 media-libs/gstreamer < 1.20.2 >= 1.20.2 6 media-plugins/gst-plugins-libav< 1.18.4 >= 1.18.4 Description =========== Multiple vulnerabilities have been found in GStreamer and its plugins. Please review the CVE and GStreamer-SA identifiers referenced below for details. Impact ====== Please review the referenced CVE identifiers for details. Workaround ========== There is no known workaround at this time. Resolution ========== All GStreamer users should update to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=media-libs/gstreamer-1.20.2" All gst-plugins-bad users should update to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=media-libs/gst-plugins-bad-1.20.2" All gst-plugins-good users should update to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=media-libs/gst-plugins-good-1.20.2" All gst-plugins-ugly users should update to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=media-libs/gst-plugins-ugly-1.20.2" All gst-plugins-base users should update to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=media-libs/gst-plugins-base-1.20.2" All gst-plugins-libav users should update to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=media-plugins/gst-plugins-libav-1.20.2" References ========== [ 1 ] CVE-2021-3185 https://nvd.nist.gov/vuln/detail/CVE-2021-3185 [ 2 ] CVE-2021-3497 https://nvd.nist.gov/vuln/detail/CVE-2021-3497 [ 3 ] CVE-2021-3498 https://nvd.nist.gov/vuln/detail/CVE-2021-3498 [ 4 ] CVE-2021-3522 https://nvd.nist.gov/vuln/detail/CVE-2021-3522 [ 5 ] GStreamer-SA-2021-0001 [ 6 ] GStreamer-SA-2021-0002 [ 7 ] GStreamer-SA-2021-0004 [ 8 ] GStreamer-SA-2021-0005 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/202208-31 Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2022 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. https://creativecommons.org/licenses/by-sa/2.5 --===============6957170566253276521== Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEpqTA6ABLMxh/aChGFMQkOaVy+9kFAmL5bYkACgkQFMQkOaVy +9lxKw/8DDU1D7oK0/wiAqCUGIlF6RY6R9td+xuUB/iZbsum8DVpFAnVm+mvEGYo qzyvGEQSpepb3tlsa5fZoL/N0tcjdSBnsarYWz3wDQs4Pb737s2HAWkwVL+sSPIw 4XQmLG9COZKTTPouEGcuLHDiG2BNqISwDyuoylDyp1tmnA1Wls/Qsurf6+CPtSh3 EIAtMMOWXyYie3fKeUkiKsG+dXcJnRMQ7ZmGmAMZ1k6VQw8kqBUTlXVfSfgrgJQV 4ib6nL/7UjrAx892+/Rx0AKQS1FQh5prvIxKepcXL/2p1MDAtE4LjVwT9Ans1WmB dX+kiGlPuZ8FUIbklsDoTwCRgDxm9Wumu6yLuJYFtjs6hbsinMW2/UF37DYeGzCm AKXUXG1RvUTd3PDS5jUKWwCebUYH7DUUIz7iNq8y6H2PukjwvfdfYP/bo9BG1RnP gSWTQTnJzGqlsltd3N+zOcc4zxJz/3p/IYAQch0QZL1f8NBwxy/8KmPzkPZv0P1A q+mwBkbzCArcGtg9wjUG1b/C5LDpAMpv7g/xiG0DBeCCzxDyliu+VgUtat13Facc HwkPmF0807lBpOMbqB/LTG2GsFJR62ryjrHSydS8jywPm+u4vom68YFKE2+hrnSg BrjyXQNUNkXj0jfxqEgtkavX770p7RnpEEqvnZHf4wBH4lJ0i54= =5aNZ -----END PGP SIGNATURE----- --===============6957170566253276521==--