GLSA 200907-11: GStreamer plug-ins: User-assisted execution of arbitrary code

Title:GStreamer plug-ins: User-assisted execution of arbitrary code
Bugs: #256096, #261594, #272972


Multiple vulnerabilities in multiple GStreamer plug-ins might allow for the execution of arbitrary code.


The GStreamer plug-ins provide decoders to the GStreamer open source media framework.

Affected packages

Package Vulnerable Unaffected Architecture(s)
media-libs/gst-plugins-good < 0.10.14 >= 0.10.14 All supported architectures
media-libs/gst-plugins-base < 0.10.22 >= 0.10.22 All supported architectures
media-plugins/gst-plugins-libpng < 0.10.14-r1 >= 0.10.14-r1 All supported architectures


Multiple vulnerabilities have been reported in several GStreamer plug-ins:

  • Tobias Klein reported two heap-based buffer overflows and an array index error in the qtdemux_parse_samples() function in gst-plugins-good when processing a QuickTime media .mov file (CVE-2009-0386, CVE-2009-0387, CVE-2009-0397).
  • Thomas Hoger of the Red Hat Security Response Team reported an integer overflow that can lead to a heap-based buffer overflow in the gst_vorbis_tag_add_coverart() function in gst-plugins-base when processing COVERART tags (CVE-2009-0586).
  • Tielei Wang of ICST-ERCIS, Peking University reported multiple integer overflows leading to buffer overflows in gst-plugins-libpng when processing a PNG file (CVE-2009-1932).


A remote attacker could entice a user or automated system using a GStreamer plug-in to process a specially crafted file, resulting in the execution of arbitrary code or a Denial of Service.


There is no known workaround at this time.


All gst-plugins-good users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=media-libs/gst-plugins-good-0.10.14"

All gst-plugins-base users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=media-libs/gst-plugins-base-0.10.22"

All gst-plugins-libpng users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=media-plugins/gst-plugins-libpng-0.10.14-r1"



This GLSA and any updates to it are available for viewing at the Gentoo Security Website:


Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to or alternatively, you may file a bug at


Copyright 2010 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.

Thank you!