8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
0.0005 Low
EPSS
Percentile
16.2%
Debian Security Advisory DSA-5533-1 [email protected]
https://www.debian.org/security/ Salvatore Bonaccorso
October 24, 2023 https://www.debian.org/security/faq
Package : gst-plugins-bad1.0
CVE ID : CVE-2023-40474 CVE-2023-40475 CVE-2023-40476
Debian Bug : 1053259 1053260 1053261
Multiple vulnerabilities were discovered in plugins for the GStreamer
media framework and its codecs and demuxers, which may result in denial
of service or potentially the execution of arbitrary code if a malformed
media file is opened.
For the oldstable distribution (bullseye), these problems have been fixed
in version 1.18.4-3+deb11u2.
For the stable distribution (bookworm), these problems have been fixed in
version 1.22.0-4+deb12u2.
We recommend that you upgrade your gst-plugins-bad1.0 packages.
For the detailed security status of gst-plugins-bad1.0 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/gst-plugins-bad1.0
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: [email protected]