Gentoo Linux Security Advisory GLSA 200907-11 - Multiple vulnerabilities in multiple GStreamer plug-ins might allow for the execution of arbitrary code. Versions less than 0.10.14 are affected.
65f2ad848313d3757203dc621dcf67f90a500f586c6f01936864f1b497f45c65
Ubuntu Security Notice USN-736-1 - It was discovered that GStreamer Good Plugins did not correctly handle malformed Composition Time To Sample (ctts) atom data in Quicktime (mov) movie files. If a user were tricked into opening a crafted mov file, an attacker could execute arbitrary code with the privileges of the user invoking the program. It was discovered that GStreamer Good Plugins did not correctly handle malformed Sync Sample (aka stss) atom data in Quicktime (mov) movie files. If a user were tricked into opening a crafted mov file, an attacker could cause a denial of service via application crash, or possibly execute arbitrary code with the privileges of the user invoking the program. It was discovered that GStreamer Good Plugins did not correctly handle malformed Time-to-sample (aka stts) atom data in Quicktime (mov) movie files. If a user were tricked into opening a crafted mov file, an attacker could execute arbitrary code with the privileges of the user invoking the program.
e96fd857e4e7e1dc33b464d15c6b61d1bc385283c3b430689d54b60a852623f3
Debian Security Advisory 1729-1 - Several vulnerabilities have been found in gst-plugins-bad0.10, a collection of various GStreamer plugins.
bd7632e5aeca4ad66f55586ac401d00d1c0fccd151a6fab63225619d970fb44f
Mandriva Linux Security Advisory 2009-035 - Security vulnerabilities have been discovered and corrected in gstreamer0.10-plugins-good, might allow remote attackers to execute arbitrary code via a malformed QuickTime media file. The updated packages have been patched to prevent this.
172994b9d9ea19facad0b14db1988ec0a0bcd56dc7e5e711bae7204b1e51c582