Security update for gstreamer-plugins-good
Announcement ID: | SUSE-SU-2025:0063-1 |
---|---|
Release Date: | 2025-01-10T13:25:22Z |
Rating: | important |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves 19 vulnerabilities can now be installed.
Description:
This update for gstreamer-plugins-good fixes the following issues:
- CVE-2024-47530: Fixed an uninitialized stack memory in Matroska/WebM demuxer. (boo#1234421)
- CVE-2024-47537: Fixed an out-of-bounds write in isomp4/qtdemux.c. (boo#1234414)
- CVE-2024-47543: Fixed an out-of-bounds write in qtdemux_parse_container. (boo#1234462)
- CVE-2024-47544: Fixed a NULL-pointer dereferences in MP4/MOV demuxer CENC handling. (boo#1234473)
- CVE-2024-47545: Fixed an integer underflow in FOURCC_strf parsing leading to out-of-bounds read. (boo#1234476)
- CVE-2024-47596: Fixed an integer underflow in MP4/MOV demuxer that can lead to out-of-bounds reads. (boo#1234424)
- CVE-2024-47597: Fixed an out-of-bounds reads in MP4/MOV demuxer sample table parser (boo#1234425)
- CVE-2024-47599: Fixed insufficient error handling in JPEG decoder that can lead to NULL-pointer dereferences. (boo#1234427)
- CVE-2024-47601: Fixed a NULL-pointer dereference in Matroska/WebM demuxer. (boo#1234428)
- CVE-2024-47602: Fixed a NULL-pointer dereferences and out-of-bounds reads in Matroska/WebM demuxer. (boo#1234432)
- CVE-2024-47603: Fixed a NULL-pointer dereference in Matroska/WebM demuxer. (boo#1234433)
- CVE-2024-47606: Avoid integer overflow when allocating sysmem. (bsc#1234449)
- CVE-2024-47606: Fixed an integer overflows in MP4/MOV demuxer and memory allocator that can lead to out-of-bounds writes. (boo#1234449)
- CVE-2024-47613: Fixed a NULL-pointer dereference in gdk-pixbuf decoder. (boo#1234447)
- CVE-2024-47774: Fixed an integer overflow in AVI subtitle parser that leads to out-of-bounds reads. (boo#1234446)
- CVE-2024-47775: Fixed various out-of-bounds reads in WAV parser. (boo#1234434)
- CVE-2024-47776: Fixed various out-of-bounds reads in WAV parser. (boo#1234435)
- CVE-2024-47777: Fixed various out-of-bounds reads in WAV parser. (boo#1234436)
- CVE-2024-47778: Fixed various out-of-bounds reads in WAV parser. (boo#1234439)
- CVE-2024-47834: Fixed a use-after-free in the Matroska demuxer that can cause crashes for certain input files. (boo#1234440)
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Server 12 SP5 LTSS
zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-63=1
-
SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security
zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-63=1
Package List:
-
SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64)
- gstreamer-plugins-good-debugsource-1.8.3-16.12.1
- gstreamer-plugins-good-debuginfo-1.8.3-16.12.1
- gstreamer-plugins-good-1.8.3-16.12.1
-
SUSE Linux Enterprise Server 12 SP5 LTSS (noarch)
- gstreamer-plugins-good-lang-1.8.3-16.12.1
-
SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64)
- gstreamer-plugins-good-debugsource-1.8.3-16.12.1
- gstreamer-plugins-good-debuginfo-1.8.3-16.12.1
- gstreamer-plugins-good-1.8.3-16.12.1
-
SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch)
- gstreamer-plugins-good-lang-1.8.3-16.12.1
References:
- https://www.suse.com/security/cve/CVE-2024-47530.html
- https://www.suse.com/security/cve/CVE-2024-47537.html
- https://www.suse.com/security/cve/CVE-2024-47543.html
- https://www.suse.com/security/cve/CVE-2024-47544.html
- https://www.suse.com/security/cve/CVE-2024-47545.html
- https://www.suse.com/security/cve/CVE-2024-47596.html
- https://www.suse.com/security/cve/CVE-2024-47597.html
- https://www.suse.com/security/cve/CVE-2024-47599.html
- https://www.suse.com/security/cve/CVE-2024-47601.html
- https://www.suse.com/security/cve/CVE-2024-47602.html
- https://www.suse.com/security/cve/CVE-2024-47603.html
- https://www.suse.com/security/cve/CVE-2024-47606.html
- https://www.suse.com/security/cve/CVE-2024-47613.html
- https://www.suse.com/security/cve/CVE-2024-47774.html
- https://www.suse.com/security/cve/CVE-2024-47775.html
- https://www.suse.com/security/cve/CVE-2024-47776.html
- https://www.suse.com/security/cve/CVE-2024-47777.html
- https://www.suse.com/security/cve/CVE-2024-47778.html
- https://www.suse.com/security/cve/CVE-2024-47834.html
- https://bugzilla.suse.com/show_bug.cgi?id=1234414
- https://bugzilla.suse.com/show_bug.cgi?id=1234421
- https://bugzilla.suse.com/show_bug.cgi?id=1234424
- https://bugzilla.suse.com/show_bug.cgi?id=1234425
- https://bugzilla.suse.com/show_bug.cgi?id=1234427
- https://bugzilla.suse.com/show_bug.cgi?id=1234428
- https://bugzilla.suse.com/show_bug.cgi?id=1234432
- https://bugzilla.suse.com/show_bug.cgi?id=1234433
- https://bugzilla.suse.com/show_bug.cgi?id=1234434
- https://bugzilla.suse.com/show_bug.cgi?id=1234435
- https://bugzilla.suse.com/show_bug.cgi?id=1234436
- https://bugzilla.suse.com/show_bug.cgi?id=1234439
- https://bugzilla.suse.com/show_bug.cgi?id=1234440
- https://bugzilla.suse.com/show_bug.cgi?id=1234446
- https://bugzilla.suse.com/show_bug.cgi?id=1234447
- https://bugzilla.suse.com/show_bug.cgi?id=1234449
- https://bugzilla.suse.com/show_bug.cgi?id=1234462
- https://bugzilla.suse.com/show_bug.cgi?id=1234473
- https://bugzilla.suse.com/show_bug.cgi?id=1234476