ASA-201702-4 generated external raw

[ASA-201702-4] gst-plugins-base-libs: multiple issues
Arch Linux Security Advisory ASA-201702-4 ========================================= Severity: Critical Date : 2017-02-03 CVE-ID : CVE-2017-5837 CVE-2017-5839 CVE-2017-5842 CVE-2017-5844 Package : gst-plugins-base-libs Type : multiple issues Remote : Yes Link : https://security.archlinux.org/AVG-164 Summary ======= The package gst-plugins-base-libs before version 1.10.3-1 is vulnerable to multiple issues including arbitrary code execution and denial of service. Resolution ========== Upgrade to 1.10.3-1. # pacman -Syu "gst-plugins-base-libs>=1.10.3-1" The problems have been fixed upstream in version 1.10.3. Workaround ========== None. Description =========== - CVE-2017-5837 (denial of service) A floating point exception issue has been found in gstreamer before 1.10.3, in gst_riff_create_audio_caps. - CVE-2017-5839 (denial of service) An endless recursion issue leading to stack overflow has been found in gstreamer before 1.10.3, in gst_riff_create_audio_caps. - CVE-2017-5842 (arbitrary code execution) An off-by-one write has been found in gstreamer before 1.10.3, in html_context_handle_element. - CVE-2017-5844 (denial of service) A floating point exception issue has been found in gstreamer before 1.10.3, in gst_riff_create_audio_caps. Impact ====== A remote attacker can crash gstreamer or execute arbitrary code on the affected host via a crafted file. References ========== http://seclists.org/oss-sec/2017/q1/284 https://bugzilla.gnome.org/show_bug.cgi?id=777262 https://bugzilla.gnome.org/show_bug.cgi?id=777265 https://bugzilla.gnome.org/show_bug.cgi?id=777502 https://bugzilla.gnome.org/show_bug.cgi?id=777525 https://security.archlinux.org/CVE-2017-5837 https://security.archlinux.org/CVE-2017-5839 https://security.archlinux.org/CVE-2017-5842 https://security.archlinux.org/CVE-2017-5844