what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Debian Security Advisory 5204-1

Debian Security Advisory 5204-1
Posted Aug 28, 2022
Authored by Debian | Site debian.org

Debian Linux Security Advisory 5204-1 - Adam Doupe discovered multiple vulnerabilities in the Gstreamer plugins to demux Mastroska and AVI files which could result in denial of service or the execution of arbitrary code.

tags | advisory, denial of service, arbitrary, vulnerability
systems | linux, debian
advisories | CVE-2022-1920, CVE-2022-1921, CVE-2022-1922, CVE-2022-1923, CVE-2022-1924, CVE-2022-1925, CVE-2022-2122
SHA-256 | b555cdccfe1de5cbb4b4bbecdeba81f5ea861bdfa4844dfb17d59142aedddaab

Debian Security Advisory 5204-1

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-5204-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
August 09, 2022 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : gst-plugins-good1.0
CVE ID : CVE-2022-1920 CVE-2022-1921 CVE-2022-1922 CVE-2022-1923
CVE-2022-1924 CVE-2022-1925 CVE-2022-2122

Adam Doupe discovered multiple vulnerabilities in the Gstreamer plugins
to demux Mastroska and AVI files which could result in denial of service
or the execution of arbitrary code.

For the stable distribution (bullseye), these problems have been fixed in
version 1.18.4-2+deb11u1.

We recommend that you upgrade your gst-plugins-good1.0 packages.

For the detailed security status of gst-plugins-good1.0 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/gst-plugins-good1.0

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
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=nLED
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

January 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    0 Files
  • 2
    Jan 2nd
    13 Files
  • 3
    Jan 3rd
    5 Files
  • 4
    Jan 4th
    5 Files
  • 5
    Jan 5th
    9 Files
  • 6
    Jan 6th
    5 Files
  • 7
    Jan 7th
    0 Files
  • 8
    Jan 8th
    0 Files
  • 9
    Jan 9th
    18 Files
  • 10
    Jan 10th
    31 Files
  • 11
    Jan 11th
    30 Files
  • 12
    Jan 12th
    33 Files
  • 13
    Jan 13th
    25 Files
  • 14
    Jan 14th
    0 Files
  • 15
    Jan 15th
    0 Files
  • 16
    Jan 16th
    7 Files
  • 17
    Jan 17th
    25 Files
  • 18
    Jan 18th
    38 Files
  • 19
    Jan 19th
    6 Files
  • 20
    Jan 20th
    21 Files
  • 21
    Jan 21st
    0 Files
  • 22
    Jan 22nd
    0 Files
  • 23
    Jan 23rd
    24 Files
  • 24
    Jan 24th
    68 Files
  • 25
    Jan 25th
    22 Files
  • 26
    Jan 26th
    20 Files
  • 27
    Jan 27th
    17 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    20 Files
  • 31
    Jan 31st
    31 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close