Security update for gstreamer-0_10-plugins-good
Announcement ID: | SUSE-SU-2017:0210-1 |
---|---|
Rating: | important |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves six vulnerabilities can now be installed.
Description:
This update for gstreamer-0_10-plugins-good fixes the following issues:
- CVE-2016-9634: Invalid FLIC files could have caused and an out-of-bounds write (bsc#1012102)
- CVE-2016-9635: Invalid FLIC files could have caused and an out-of-bounds write (bsc#1012103)
- CVE-2016-9636: Prevent maliciously crafted flic files from causing invalid memory writes (bsc#1012104)
- CVE-2016-9807: Prevent the reading of invalid memory in flx_decode_chunks, leading to DoS (bsc#1013655)
- CVE-2016-9808: Prevent maliciously crafted flic files from causing invalid memory accesses (bsc#1013653)
- CVE-2016-9810: Invalid files can be used to extraneous unreferences, leading to invalid memory access and DoS (bsc#1013663)
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Desktop 12 SP2
zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2017-104=1
-
SUSE Linux Enterprise Workstation Extension 12 SP2
zypper in -t patch SUSE-SLE-WE-12-SP2-2017-104=1
Package List:
-
SUSE Linux Enterprise Desktop 12 SP2 (x86_64)
- gstreamer-0_10-plugins-good-debugsource-0.10.31-16.1
- gstreamer-0_10-plugins-good-0.10.31-16.1
- gstreamer-0_10-plugins-good-debuginfo-0.10.31-16.1
-
SUSE Linux Enterprise Desktop 12 SP2 (noarch)
- gstreamer-0_10-plugins-good-lang-0.10.31-16.1
-
SUSE Linux Enterprise Workstation Extension 12 SP2 (x86_64)
- gstreamer-0_10-plugins-good-debugsource-0.10.31-16.1
- gstreamer-0_10-plugins-good-0.10.31-16.1
- gstreamer-0_10-plugins-good-debuginfo-0.10.31-16.1
-
SUSE Linux Enterprise Workstation Extension 12 SP2 (noarch)
- gstreamer-0_10-plugins-good-lang-0.10.31-16.1
References:
- https://www.suse.com/security/cve/CVE-2016-9634.html
- https://www.suse.com/security/cve/CVE-2016-9635.html
- https://www.suse.com/security/cve/CVE-2016-9636.html
- https://www.suse.com/security/cve/CVE-2016-9807.html
- https://www.suse.com/security/cve/CVE-2016-9808.html
- https://www.suse.com/security/cve/CVE-2016-9810.html
- https://bugzilla.suse.com/show_bug.cgi?id=1012102
- https://bugzilla.suse.com/show_bug.cgi?id=1012103
- https://bugzilla.suse.com/show_bug.cgi?id=1012104
- https://bugzilla.suse.com/show_bug.cgi?id=1013653
- https://bugzilla.suse.com/show_bug.cgi?id=1013655
- https://bugzilla.suse.com/show_bug.cgi?id=1013663