Package        : gst-plugins-good0.10
Version        : 0.10.31-3+nmu4+deb8u3
CVE ID         : CVE-2016-10198 CVE-2017-5840


Two memory handling issues were found in gst-plugins-good0.10, a 
collection of GStreamer plugins from the "good" set:

CVE-2016-10198

     An invalid read can be triggered in the aacparse element via a
     maliciously crafted file.

CVE-2017-5840

     An out of bounds heap read can be triggered in the qtdemux element
     via a maliciously crafted file.


For Debian 8 "Jessie", these problems have been fixed in version
0.10.31-3+nmu4+deb8u3.

We recommend that you upgrade your gst-plugins-good0.10 packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

Debian LTS: DLA-2225-1: gst-plugins-good0.10 security update

May 30, 2020
Two memory handling issues were found in gst-plugins-good0.10, a collection of GStreamer plugins from the "good" set:

Summary

CVE-2016-10198

An invalid read can be triggered in the aacparse element via a
maliciously crafted file.

CVE-2017-5840

An out of bounds heap read can be triggered in the qtdemux element
via a maliciously crafted file.


For Debian 8 "Jessie", these problems have been fixed in version
0.10.31-3+nmu4+deb8u3.

We recommend that you upgrade your gst-plugins-good0.10 packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS



Severity
Package : gst-plugins-good0.10
Version : 0.10.31-3+nmu4+deb8u3
CVE ID : CVE-2016-10198 CVE-2017-5840

Related News