If you’re reading the news lately, you might have stumbled on an article about an exploit code that could have been used by an attacker to bypass the security features of a GNU/Linux distribution, leaving the system vulnerable to drive-by attacks that can install backdoors, keyloggers, or another type of malware. The said exploit was known to target a memory corruption vulnerability in the widely-used GStreamer multimedia framework, but the issue was patched upstream by Matthew Waters, a few hours after several media outlets reported the incident, and Collabora’s Mark Filion was kind enough to inform us about the patch.