The GStreamer plug-ins provide decoders to the GStreamer open source media framework.
Multiple vulnerabilities have been discovered in various GStreamer plug-ins. Please review the CVE identifiers referenced below for details.
A remote attacker could entice a user or automated system using a GStreamer plug-in to process a specially crafted file, resulting in the execution of arbitrary code or a Denial of Service.
There is no known workaround at this time.
All gst-plugins-bad users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose
">=media-libs/gst-plugins-bad-1.10.3:1.0"
All gst-plugins-good users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose
">=media-libs/gst-plugins-good-1.10.3:1.0"
All gst-plugins-base users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose
">=media-libs/gst-plugins-base-1.10.3:1.0"
All gst-plugins-ugly users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose
">=media-libs/gst-plugins-ugly-1.10.3:1.0"