-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-4904-1 security@debian.org https://www.debian.org/security/ Moritz Muehlenhoff April 24, 2021 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : gst-plugins-ugly1.0 CVE ID : not yet available Multiple vulnerabilities were discovered in plugins for the GStreamer media framework, which may result in denial of service or potentially the execution of arbitrary code if a malformed media file is opened. For the stable distribution (buster), this problem has been fixed in version 1.14.4-1+deb10u1. We recommend that you upgrade your gst-plugins-ugly1.0 packages. For the detailed security status of gst-plugins-ugly1.0 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/gst-plugins-ugly1.0 Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmCEWI8ACgkQEMKTtsN8 TjZ+JBAArLyoBXnX0qMaEMwNNMQENqxQZQL1gfFW+RbUcMal4LQIRTqdwliqMHTO 9dGEV58hg1yH/4Xja/hKSCTieNvTRLVWGWxIgQ5y2HazBPhmKQdf6ERFGRCqHG3g SsN01jFgA5yS6/14rDDydO/DDTFR/R+YvS+RQySSJ69P/VqOpc8keb1pHpUxktwG LfnJ+09JyzZcw1r1VmioJt1UJVSy7e/OzN3hZ/AADiZfZxPJX8zE6rGzaMxk7nlk dCdh4THXa77ha/CSTIc+kZBoh4GM6BUYtFD2glpvYArNCB39ik/3mG7P8cho6sFg K0/VYI13tlpzuCU6rFwdJipw4PU3IWqXd3Rc+y8XvC0J/SFgHizyThMK7H8HwYCd rA71Y7uLElpu50TXoxNPPusYsFT9Ps6PEgn4IcmmDZR0dMRNNFHz16Qrz3FoAoEI oOZzwRqMoJVy2TqKpOYU9CuxLJ5UVs96yflNrMxpGvFB2AmyDNSkZ3/UqTVhiJcv hUS4fOleDu38/v3bpAMcpqEgsPSYwFWtoe3XpESB6BxzamkaO1KVqR0qQ0cIkRQW rSXAtz47YA3ykGSpHN9Al8PLFm80OuakGEhUS/2z0Fe8xoUI7csM4XanpIcQoX08 mHTsevGVrQyi9rHRXsxWAvtMUNTiEoizrHHmPeUu3dO/eZADKwo= =s9Jz -----END PGP SIGNATURE-----