Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-47834 (GCVE-0-2024-47834)
Vulnerability from cvelistv5 – Published: 2024-12-11 19:18 – Updated: 2025-11-03 20:40- CWE-416 - Use After Free
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-47834",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-12-11T21:15:13.370606Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-12-11T21:15:31.525Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2025-11-03T20:40:55.432Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"url": "https://lists.debian.org/debian-lts-announce/2025/02/msg00035.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "gstreamer",
"vendor": "gstreamer",
"versions": [
{
"status": "affected",
"version": "\u003c 1.24.10"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "GStreamer is a library for constructing graphs of media-handling components. An Use-After-Free read vulnerability has been discovered affecting the processing of CodecPrivate elements in Matroska streams. In the GST_MATROSKA_ID_CODECPRIVATE case within the gst_matroska_demux_parse_stream function, a data chunk is allocated using gst_ebml_read_binary. Later, the allocated memory is freed in the gst_matroska_track_free function, by the call to g_free (track-\u003ecodec_priv). Finally, the freed memory is accessed in the caps_serialize function through gst_value_serialize_buffer. The freed memory will be accessed in the gst_value_serialize_buffer function. This results in a UAF read vulnerability, as the function tries to process memory that has already been freed. This vulnerability is fixed in 1.24.10."
}
],
"metrics": [
{
"cvssV4_0": {
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "LOCAL",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"privilegesRequired": "NONE",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "NONE"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-416",
"description": "CWE-416: Use After Free",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-12-11T19:18:04.069Z",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"name": "https://securitylab.github.com/advisories/GHSL-2024-280_Gstreamer/",
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://securitylab.github.com/advisories/GHSL-2024-280_Gstreamer/"
},
{
"name": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8057.patch",
"tags": [
"x_refsource_MISC"
],
"url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8057.patch"
},
{
"name": "https://gstreamer.freedesktop.org/security/sa-2024-0030.html",
"tags": [
"x_refsource_MISC"
],
"url": "https://gstreamer.freedesktop.org/security/sa-2024-0030.html"
}
],
"source": {
"advisory": "GHSA-35x4-mx8h-fgm8",
"discovery": "UNKNOWN"
},
"title": "GHSL-2024-280: Gstreamer Use-After-Free read in Matroska CodecPrivate"
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2024-47834",
"datePublished": "2024-12-11T19:18:04.069Z",
"dateReserved": "2024-10-03T14:06:12.643Z",
"dateUpdated": "2025-11-03T20:40:55.432Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gstreamer_project:gstreamer:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.24.10\", \"matchCriteriaId\": \"82BF8403-8CE2-4AFC-865F-FD40A77D20E0\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"GStreamer is a library for constructing graphs of media-handling components. An Use-After-Free read vulnerability has been discovered affecting the processing of CodecPrivate elements in Matroska streams. In the GST_MATROSKA_ID_CODECPRIVATE case within the gst_matroska_demux_parse_stream function, a data chunk is allocated using gst_ebml_read_binary. Later, the allocated memory is freed in the gst_matroska_track_free function, by the call to g_free (track-\u003ecodec_priv). Finally, the freed memory is accessed in the caps_serialize function through gst_value_serialize_buffer. The freed memory will be accessed in the gst_value_serialize_buffer function. This results in a UAF read vulnerability, as the function tries to process memory that has already been freed. This vulnerability is fixed in 1.24.10.\"}, {\"lang\": \"es\", \"value\": \"GStreamer es una librer\\u00eda para construir gr\\u00e1ficos de componentes de manejo de medios. Se ha descubierto una vulnerabilidad de lectura de tipo Use-After-Free que afecta el procesamiento de elementos CodecPrivate en transmisiones Matroska. En el caso GST_MATROSKA_ID_CODECPRIVATE dentro de la funci\\u00f3n gst_matroska_demux_parse_stream, se asigna un fragmento de datos utilizando gst_ebml_read_binary. M\\u00e1s tarde, la memoria asignada se libera en la funci\\u00f3n gst_matroska_track_free, mediante la llamada a g_free (track-\u0026gt;codec_priv). Finalmente, se accede a la memoria liberada en la funci\\u00f3n caps_serialize a trav\\u00e9s de gst_value_serialize_buffer. Se acceder\\u00e1 a la memoria liberada en la funci\\u00f3n gst_value_serialize_buffer. Esto da como resultado una vulnerabilidad de lectura de UAF, ya que la funci\\u00f3n intenta procesar la memoria que ya se ha liberado. Esta vulnerabilidad se corrigi\\u00f3 en 1.24.10.\"}]",
"id": "CVE-2024-47834",
"lastModified": "2024-12-18T19:43:02.923",
"metrics": "{\"cvssMetricV40\": [{\"source\": \"security-advisories@github.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"4.0\", \"vectorString\": \"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\", \"baseScore\": 5.1, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"attackRequirements\": \"NONE\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"vulnerableSystemConfidentiality\": \"LOW\", \"vulnerableSystemIntegrity\": \"NONE\", \"vulnerableSystemAvailability\": \"LOW\", \"subsequentSystemConfidentiality\": \"NONE\", \"subsequentSystemIntegrity\": \"NONE\", \"subsequentSystemAvailability\": \"NONE\", \"exploitMaturity\": \"NOT_DEFINED\", \"confidentialityRequirements\": \"NOT_DEFINED\", \"integrityRequirements\": \"NOT_DEFINED\", \"availabilityRequirements\": \"NOT_DEFINED\", \"modifiedAttackVector\": \"NOT_DEFINED\", \"modifiedAttackComplexity\": \"NOT_DEFINED\", \"modifiedAttackRequirements\": \"NOT_DEFINED\", \"modifiedPrivilegesRequired\": \"NOT_DEFINED\", \"modifiedUserInteraction\": \"NOT_DEFINED\", \"modifiedVulnerableSystemConfidentiality\": \"NOT_DEFINED\", \"modifiedVulnerableSystemIntegrity\": \"NOT_DEFINED\", \"modifiedVulnerableSystemAvailability\": \"NOT_DEFINED\", \"modifiedSubsequentSystemConfidentiality\": \"NOT_DEFINED\", \"modifiedSubsequentSystemIntegrity\": \"NOT_DEFINED\", \"modifiedSubsequentSystemAvailability\": \"NOT_DEFINED\", \"safety\": \"NOT_DEFINED\", \"automatable\": \"NOT_DEFINED\", \"recovery\": \"NOT_DEFINED\", \"valueDensity\": \"NOT_DEFINED\", \"vulnerabilityResponseEffort\": \"NOT_DEFINED\", \"providerUrgency\": \"NOT_DEFINED\"}}], \"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H\", \"baseScore\": 9.1, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 5.2}]}",
"published": "2024-12-12T02:03:43.017",
"references": "[{\"url\": \"https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8057.patch\", \"source\": \"security-advisories@github.com\", \"tags\": [\"Patch\"]}, {\"url\": \"https://gstreamer.freedesktop.org/security/sa-2024-0030.html\", \"source\": \"security-advisories@github.com\", \"tags\": [\"Release Notes\"]}, {\"url\": \"https://securitylab.github.com/advisories/GHSL-2024-280_Gstreamer/\", \"source\": \"security-advisories@github.com\", \"tags\": [\"Third Party Advisory\"]}]",
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Analyzed",
"weaknesses": "[{\"source\": \"security-advisories@github.com\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-416\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2024-47834\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2024-12-12T02:03:43.017\",\"lastModified\":\"2025-11-03T21:16:30.680\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"GStreamer is a library for constructing graphs of media-handling components. An Use-After-Free read vulnerability has been discovered affecting the processing of CodecPrivate elements in Matroska streams. In the GST_MATROSKA_ID_CODECPRIVATE case within the gst_matroska_demux_parse_stream function, a data chunk is allocated using gst_ebml_read_binary. Later, the allocated memory is freed in the gst_matroska_track_free function, by the call to g_free (track-\u003ecodec_priv). Finally, the freed memory is accessed in the caps_serialize function through gst_value_serialize_buffer. The freed memory will be accessed in the gst_value_serialize_buffer function. This results in a UAF read vulnerability, as the function tries to process memory that has already been freed. This vulnerability is fixed in 1.24.10.\"},{\"lang\":\"es\",\"value\":\"GStreamer es una librer\u00eda para construir gr\u00e1ficos de componentes de manejo de medios. Se ha descubierto una vulnerabilidad de lectura de tipo Use-After-Free que afecta el procesamiento de elementos CodecPrivate en transmisiones Matroska. En el caso GST_MATROSKA_ID_CODECPRIVATE dentro de la funci\u00f3n gst_matroska_demux_parse_stream, se asigna un fragmento de datos utilizando gst_ebml_read_binary. M\u00e1s tarde, la memoria asignada se libera en la funci\u00f3n gst_matroska_track_free, mediante la llamada a g_free (track-\u0026gt;codec_priv). Finalmente, se accede a la memoria liberada en la funci\u00f3n caps_serialize a trav\u00e9s de gst_value_serialize_buffer. Se acceder\u00e1 a la memoria liberada en la funci\u00f3n gst_value_serialize_buffer. Esto da como resultado una vulnerabilidad de lectura de UAF, ya que la funci\u00f3n intenta procesar la memoria que ya se ha liberado. Esta vulnerabilidad se corrigi\u00f3 en 1.24.10.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\",\"baseScore\":5.1,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"attackRequirements\":\"NONE\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"vulnConfidentialityImpact\":\"LOW\",\"vulnIntegrityImpact\":\"NONE\",\"vulnAvailabilityImpact\":\"LOW\",\"subConfidentialityImpact\":\"NONE\",\"subIntegrityImpact\":\"NONE\",\"subAvailabilityImpact\":\"NONE\",\"exploitMaturity\":\"NOT_DEFINED\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"NOT_DEFINED\",\"Automatable\":\"NOT_DEFINED\",\"Recovery\":\"NOT_DEFINED\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"NOT_DEFINED\",\"providerUrgency\":\"NOT_DEFINED\"}}],\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H\",\"baseScore\":9.1,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.2}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gstreamer_project:gstreamer:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.24.10\",\"matchCriteriaId\":\"82BF8403-8CE2-4AFC-865F-FD40A77D20E0\"}]}]}],\"references\":[{\"url\":\"https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8057.patch\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://gstreamer.freedesktop.org/security/sa-2024-0030.html\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://securitylab.github.com/advisories/GHSL-2024-280_Gstreamer/\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2025/02/msg00035.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-47834\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-12-11T21:15:13.370606Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-12-11T21:15:24.260Z\"}}], \"cna\": {\"title\": \"GHSL-2024-280: Gstreamer Use-After-Free read in Matroska CodecPrivate\", \"source\": {\"advisory\": \"GHSA-35x4-mx8h-fgm8\", \"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"cvssV4_0\": {\"version\": \"4.0\", \"baseScore\": 5.1, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"attackRequirements\": \"NONE\", \"privilegesRequired\": \"NONE\", \"subIntegrityImpact\": \"NONE\", \"vulnIntegrityImpact\": \"NONE\", \"subAvailabilityImpact\": \"NONE\", \"vulnAvailabilityImpact\": \"LOW\", \"subConfidentialityImpact\": \"NONE\", \"vulnConfidentialityImpact\": \"LOW\"}}], \"affected\": [{\"vendor\": \"gstreamer\", \"product\": \"gstreamer\", \"versions\": [{\"status\": \"affected\", \"version\": \"\u003c 1.24.10\"}]}], \"references\": [{\"url\": \"https://securitylab.github.com/advisories/GHSL-2024-280_Gstreamer/\", \"name\": \"https://securitylab.github.com/advisories/GHSL-2024-280_Gstreamer/\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8057.patch\", \"name\": \"https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8057.patch\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://gstreamer.freedesktop.org/security/sa-2024-0030.html\", \"name\": \"https://gstreamer.freedesktop.org/security/sa-2024-0030.html\", \"tags\": [\"x_refsource_MISC\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"GStreamer is a library for constructing graphs of media-handling components. An Use-After-Free read vulnerability has been discovered affecting the processing of CodecPrivate elements in Matroska streams. In the GST_MATROSKA_ID_CODECPRIVATE case within the gst_matroska_demux_parse_stream function, a data chunk is allocated using gst_ebml_read_binary. Later, the allocated memory is freed in the gst_matroska_track_free function, by the call to g_free (track-\u003ecodec_priv). Finally, the freed memory is accessed in the caps_serialize function through gst_value_serialize_buffer. The freed memory will be accessed in the gst_value_serialize_buffer function. This results in a UAF read vulnerability, as the function tries to process memory that has already been freed. This vulnerability is fixed in 1.24.10.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-416\", \"description\": \"CWE-416: Use After Free\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2024-12-11T19:18:04.069Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-47834\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-12-11T21:15:31.525Z\", \"dateReserved\": \"2024-10-03T14:06:12.643Z\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"datePublished\": \"2024-12-11T19:18:04.069Z\", \"assignerShortName\": \"GitHub_M\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
SUSE-SU-2025:02055-1
Vulnerability from csaf_suse - Published: 2025-06-20 15:35 - Updated: 2025-06-20 15:35Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for gstreamer-plugins-good",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for gstreamer-plugins-good fixes the following issues:\n\n- CVE-2024-47537: Fixed OOB-write in isomp4/qtdemux.c (bsc#1234414)\n- CVE-2024-47539: Fixed OOB-write in convert_to_s334_1a (bsc#1234417)\n- CVE-2024-47540: Fixed uninitialized stack memory in Matroska/WebM demuxer (bsc#1234421)\n- CVE-2024-47543: Fixed OOB-read in qtdemux_parse_container (bsc#1234462)\n- CVE-2024-47544: Fixed NULL-pointer dereferences in MP4/MOV demuxer CENC handling (bsc#1234473)\n- CVE-2024-47545: Fixed integer underflow in FOURCC_strf parsing leading to OOB-read (bsc#1234476)\n- CVE-2024-47546: Fixed integer underflow in extract_cc_from_data leading to OOB-read (bsc#1234477)\n- CVE-2024-47596: Fixed integer underflow in MP4/MOV demuxer that can lead to out-of-bounds reads (bsc#1234424)\n- CVE-2024-47597: Fixed OOB-reads in MP4/MOV demuxer sample table parser (bsc#1234425)\n- CVE-2024-47599: Fixed insufficient error handling in JPEG decoder that can lead to NULL-pointer dereferences (bsc#1234427)\n- CVE-2024-47601: Fixed NULL-pointer dereference in Matroska/WebM demuxer (bsc#1234428)\n- CVE-2024-47602: Fixed NULL-pointer dereferences and out-of-bounds reads in Matroska/WebM demuxer (bsc#1234432)\n- CVE-2024-47603: Fixed NULL-pointer dereference in Matroska/WebM demuxer (bsc#1234433)\n- CVE-2024-47606: Fixed integer overflows in MP4/MOV demuxer and memory allocator that can lead to out-of-bounds writes (bsc#1234449)\n- CVE-2024-47613: Fixed NULL-pointer dereference in gdk-pixbuf decoder (bsc#1234447)\n- CVE-2024-47774: Fixed integer overflow in AVI subtitle parser that leads to out-of-bounds reads (bsc#1234446)\n- CVE-2024-47775: Fixed various out-of-bounds reads in WAV parser (bsc#1234434)\n- CVE-2024-47776: Fixed various out-of-bounds reads in WAV parser (bsc#1234435)\n- CVE-2024-47777: Fixed various out-of-bounds reads in WAV parser (bsc#1234436)\n- CVE-2024-47778: Fixed various out-of-bounds reads in WAV parser (bsc#1234439)\n- CVE-2024-47834: Fixed a use-after-free in the Matroska demuxer that can cause crashes for certain input files (bsc#1234440)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-2055,SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-2055,SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-2055,SUSE-SLE-Product-SLES_SAP-15-SP3-2025-2055,SUSE-Storage-7.1-2025-2055",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_02055-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:02055-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202502055-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:02055-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2025-June/040414.html"
},
{
"category": "self",
"summary": "SUSE Bug 1234414",
"url": "https://bugzilla.suse.com/1234414"
},
{
"category": "self",
"summary": "SUSE Bug 1234417",
"url": "https://bugzilla.suse.com/1234417"
},
{
"category": "self",
"summary": "SUSE Bug 1234421",
"url": "https://bugzilla.suse.com/1234421"
},
{
"category": "self",
"summary": "SUSE Bug 1234424",
"url": "https://bugzilla.suse.com/1234424"
},
{
"category": "self",
"summary": "SUSE Bug 1234425",
"url": "https://bugzilla.suse.com/1234425"
},
{
"category": "self",
"summary": "SUSE Bug 1234427",
"url": "https://bugzilla.suse.com/1234427"
},
{
"category": "self",
"summary": "SUSE Bug 1234428",
"url": "https://bugzilla.suse.com/1234428"
},
{
"category": "self",
"summary": "SUSE Bug 1234432",
"url": "https://bugzilla.suse.com/1234432"
},
{
"category": "self",
"summary": "SUSE Bug 1234433",
"url": "https://bugzilla.suse.com/1234433"
},
{
"category": "self",
"summary": "SUSE Bug 1234434",
"url": "https://bugzilla.suse.com/1234434"
},
{
"category": "self",
"summary": "SUSE Bug 1234435",
"url": "https://bugzilla.suse.com/1234435"
},
{
"category": "self",
"summary": "SUSE Bug 1234436",
"url": "https://bugzilla.suse.com/1234436"
},
{
"category": "self",
"summary": "SUSE Bug 1234439",
"url": "https://bugzilla.suse.com/1234439"
},
{
"category": "self",
"summary": "SUSE Bug 1234440",
"url": "https://bugzilla.suse.com/1234440"
},
{
"category": "self",
"summary": "SUSE Bug 1234446",
"url": "https://bugzilla.suse.com/1234446"
},
{
"category": "self",
"summary": "SUSE Bug 1234447",
"url": "https://bugzilla.suse.com/1234447"
},
{
"category": "self",
"summary": "SUSE Bug 1234449",
"url": "https://bugzilla.suse.com/1234449"
},
{
"category": "self",
"summary": "SUSE Bug 1234462",
"url": "https://bugzilla.suse.com/1234462"
},
{
"category": "self",
"summary": "SUSE Bug 1234473",
"url": "https://bugzilla.suse.com/1234473"
},
{
"category": "self",
"summary": "SUSE Bug 1234476",
"url": "https://bugzilla.suse.com/1234476"
},
{
"category": "self",
"summary": "SUSE Bug 1234477",
"url": "https://bugzilla.suse.com/1234477"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47537 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47537/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47539 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47539/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47540 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47540/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47543 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47543/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47544 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47544/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47545 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47545/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47546 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47546/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47596 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47596/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47597 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47597/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47599 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47599/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47601 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47601/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47602 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47602/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47603 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47603/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47606 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47606/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47613 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47613/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47774 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47774/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47775 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47775/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47776 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47776/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47777 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47777/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47778 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47778/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47834 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47834/"
}
],
"title": "Security update for gstreamer-plugins-good",
"tracking": {
"current_release_date": "2025-06-20T15:35:07Z",
"generator": {
"date": "2025-06-20T15:35:07Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:02055-1",
"initial_release_date": "2025-06-20T15:35:07Z",
"revision_history": [
{
"date": "2025-06-20T15:35:07Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"product": {
"name": "gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"product_id": "gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-doc-1.16.3-150200.3.17.1.aarch64",
"product": {
"name": "gstreamer-plugins-good-doc-1.16.3-150200.3.17.1.aarch64",
"product_id": "gstreamer-plugins-good-doc-1.16.3-150200.3.17.1.aarch64"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-extra-1.16.3-150200.3.17.1.aarch64",
"product": {
"name": "gstreamer-plugins-good-extra-1.16.3-150200.3.17.1.aarch64",
"product_id": "gstreamer-plugins-good-extra-1.16.3-150200.3.17.1.aarch64"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-gtk-1.16.3-150200.3.17.1.aarch64",
"product": {
"name": "gstreamer-plugins-good-gtk-1.16.3-150200.3.17.1.aarch64",
"product_id": "gstreamer-plugins-good-gtk-1.16.3-150200.3.17.1.aarch64"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-jack-1.16.3-150200.3.17.1.aarch64",
"product": {
"name": "gstreamer-plugins-good-jack-1.16.3-150200.3.17.1.aarch64",
"product_id": "gstreamer-plugins-good-jack-1.16.3-150200.3.17.1.aarch64"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-qtqml-1.16.3-150200.3.17.1.aarch64",
"product": {
"name": "gstreamer-plugins-good-qtqml-1.16.3-150200.3.17.1.aarch64",
"product_id": "gstreamer-plugins-good-qtqml-1.16.3-150200.3.17.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "gstreamer-plugins-good-64bit-1.16.3-150200.3.17.1.aarch64_ilp32",
"product": {
"name": "gstreamer-plugins-good-64bit-1.16.3-150200.3.17.1.aarch64_ilp32",
"product_id": "gstreamer-plugins-good-64bit-1.16.3-150200.3.17.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-extra-64bit-1.16.3-150200.3.17.1.aarch64_ilp32",
"product": {
"name": "gstreamer-plugins-good-extra-64bit-1.16.3-150200.3.17.1.aarch64_ilp32",
"product_id": "gstreamer-plugins-good-extra-64bit-1.16.3-150200.3.17.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-jack-64bit-1.16.3-150200.3.17.1.aarch64_ilp32",
"product": {
"name": "gstreamer-plugins-good-jack-64bit-1.16.3-150200.3.17.1.aarch64_ilp32",
"product_id": "gstreamer-plugins-good-jack-64bit-1.16.3-150200.3.17.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "gstreamer-plugins-good-1.16.3-150200.3.17.1.i586",
"product": {
"name": "gstreamer-plugins-good-1.16.3-150200.3.17.1.i586",
"product_id": "gstreamer-plugins-good-1.16.3-150200.3.17.1.i586"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-doc-1.16.3-150200.3.17.1.i586",
"product": {
"name": "gstreamer-plugins-good-doc-1.16.3-150200.3.17.1.i586",
"product_id": "gstreamer-plugins-good-doc-1.16.3-150200.3.17.1.i586"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-extra-1.16.3-150200.3.17.1.i586",
"product": {
"name": "gstreamer-plugins-good-extra-1.16.3-150200.3.17.1.i586",
"product_id": "gstreamer-plugins-good-extra-1.16.3-150200.3.17.1.i586"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-gtk-1.16.3-150200.3.17.1.i586",
"product": {
"name": "gstreamer-plugins-good-gtk-1.16.3-150200.3.17.1.i586",
"product_id": "gstreamer-plugins-good-gtk-1.16.3-150200.3.17.1.i586"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-jack-1.16.3-150200.3.17.1.i586",
"product": {
"name": "gstreamer-plugins-good-jack-1.16.3-150200.3.17.1.i586",
"product_id": "gstreamer-plugins-good-jack-1.16.3-150200.3.17.1.i586"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-qtqml-1.16.3-150200.3.17.1.i586",
"product": {
"name": "gstreamer-plugins-good-qtqml-1.16.3-150200.3.17.1.i586",
"product_id": "gstreamer-plugins-good-qtqml-1.16.3-150200.3.17.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"product": {
"name": "gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"product_id": "gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"product": {
"name": "gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"product_id": "gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-doc-1.16.3-150200.3.17.1.ppc64le",
"product": {
"name": "gstreamer-plugins-good-doc-1.16.3-150200.3.17.1.ppc64le",
"product_id": "gstreamer-plugins-good-doc-1.16.3-150200.3.17.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-extra-1.16.3-150200.3.17.1.ppc64le",
"product": {
"name": "gstreamer-plugins-good-extra-1.16.3-150200.3.17.1.ppc64le",
"product_id": "gstreamer-plugins-good-extra-1.16.3-150200.3.17.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-gtk-1.16.3-150200.3.17.1.ppc64le",
"product": {
"name": "gstreamer-plugins-good-gtk-1.16.3-150200.3.17.1.ppc64le",
"product_id": "gstreamer-plugins-good-gtk-1.16.3-150200.3.17.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-jack-1.16.3-150200.3.17.1.ppc64le",
"product": {
"name": "gstreamer-plugins-good-jack-1.16.3-150200.3.17.1.ppc64le",
"product_id": "gstreamer-plugins-good-jack-1.16.3-150200.3.17.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-qtqml-1.16.3-150200.3.17.1.ppc64le",
"product": {
"name": "gstreamer-plugins-good-qtqml-1.16.3-150200.3.17.1.ppc64le",
"product_id": "gstreamer-plugins-good-qtqml-1.16.3-150200.3.17.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "gstreamer-plugins-good-1.16.3-150200.3.17.1.s390x",
"product": {
"name": "gstreamer-plugins-good-1.16.3-150200.3.17.1.s390x",
"product_id": "gstreamer-plugins-good-1.16.3-150200.3.17.1.s390x"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-doc-1.16.3-150200.3.17.1.s390x",
"product": {
"name": "gstreamer-plugins-good-doc-1.16.3-150200.3.17.1.s390x",
"product_id": "gstreamer-plugins-good-doc-1.16.3-150200.3.17.1.s390x"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-extra-1.16.3-150200.3.17.1.s390x",
"product": {
"name": "gstreamer-plugins-good-extra-1.16.3-150200.3.17.1.s390x",
"product_id": "gstreamer-plugins-good-extra-1.16.3-150200.3.17.1.s390x"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-gtk-1.16.3-150200.3.17.1.s390x",
"product": {
"name": "gstreamer-plugins-good-gtk-1.16.3-150200.3.17.1.s390x",
"product_id": "gstreamer-plugins-good-gtk-1.16.3-150200.3.17.1.s390x"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-jack-1.16.3-150200.3.17.1.s390x",
"product": {
"name": "gstreamer-plugins-good-jack-1.16.3-150200.3.17.1.s390x",
"product_id": "gstreamer-plugins-good-jack-1.16.3-150200.3.17.1.s390x"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-qtqml-1.16.3-150200.3.17.1.s390x",
"product": {
"name": "gstreamer-plugins-good-qtqml-1.16.3-150200.3.17.1.s390x",
"product_id": "gstreamer-plugins-good-qtqml-1.16.3-150200.3.17.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"product": {
"name": "gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"product_id": "gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-32bit-1.16.3-150200.3.17.1.x86_64",
"product": {
"name": "gstreamer-plugins-good-32bit-1.16.3-150200.3.17.1.x86_64",
"product_id": "gstreamer-plugins-good-32bit-1.16.3-150200.3.17.1.x86_64"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-doc-1.16.3-150200.3.17.1.x86_64",
"product": {
"name": "gstreamer-plugins-good-doc-1.16.3-150200.3.17.1.x86_64",
"product_id": "gstreamer-plugins-good-doc-1.16.3-150200.3.17.1.x86_64"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-extra-1.16.3-150200.3.17.1.x86_64",
"product": {
"name": "gstreamer-plugins-good-extra-1.16.3-150200.3.17.1.x86_64",
"product_id": "gstreamer-plugins-good-extra-1.16.3-150200.3.17.1.x86_64"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-extra-32bit-1.16.3-150200.3.17.1.x86_64",
"product": {
"name": "gstreamer-plugins-good-extra-32bit-1.16.3-150200.3.17.1.x86_64",
"product_id": "gstreamer-plugins-good-extra-32bit-1.16.3-150200.3.17.1.x86_64"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-gtk-1.16.3-150200.3.17.1.x86_64",
"product": {
"name": "gstreamer-plugins-good-gtk-1.16.3-150200.3.17.1.x86_64",
"product_id": "gstreamer-plugins-good-gtk-1.16.3-150200.3.17.1.x86_64"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-jack-1.16.3-150200.3.17.1.x86_64",
"product": {
"name": "gstreamer-plugins-good-jack-1.16.3-150200.3.17.1.x86_64",
"product_id": "gstreamer-plugins-good-jack-1.16.3-150200.3.17.1.x86_64"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-jack-32bit-1.16.3-150200.3.17.1.x86_64",
"product": {
"name": "gstreamer-plugins-good-jack-32bit-1.16.3-150200.3.17.1.x86_64",
"product_id": "gstreamer-plugins-good-jack-32bit-1.16.3-150200.3.17.1.x86_64"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-qtqml-1.16.3-150200.3.17.1.x86_64",
"product": {
"name": "gstreamer-plugins-good-qtqml-1.16.3-150200.3.17.1.x86_64",
"product_id": "gstreamer-plugins-good-qtqml-1.16.3-150200.3.17.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Enterprise Storage 7.1",
"product": {
"name": "SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:ses:7.1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64"
},
"product_reference": "gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64"
},
"product_reference": "gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch"
},
"product_reference": "gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64"
},
"product_reference": "gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le"
},
"product_reference": "gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-1.16.3-150200.3.17.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.s390x"
},
"product_reference": "gstreamer-plugins-good-1.16.3-150200.3.17.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64"
},
"product_reference": "gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch"
},
"product_reference": "gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le"
},
"product_reference": "gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64"
},
"product_reference": "gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch"
},
"product_reference": "gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64"
},
"product_reference": "gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64"
},
"product_reference": "gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch"
},
"product_reference": "gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-47537",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47537"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. The program attempts to reallocate the memory pointed to by stream-\u003esamples to accommodate stream-\u003en_samples + samples_count elements of type QtDemuxSample. The problem is that samples_count is read from the input file. And if this value is big enough, this can lead to an integer overflow during the addition. As a consequence, g_try_renew might allocate memory for a significantly smaller number of elements than intended. Following this, the program iterates through samples_count elements and attempts to write samples_count number of elements, potentially exceeding the actual allocated memory size and causing an OOB-write. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47537",
"url": "https://www.suse.com/security/cve/CVE-2024-47537"
},
{
"category": "external",
"summary": "SUSE Bug 1234414 for CVE-2024-47537",
"url": "https://bugzilla.suse.com/1234414"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-20T15:35:07Z",
"details": "important"
}
],
"title": "CVE-2024-47537"
},
{
"cve": "CVE-2024-47539",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47539"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An out-of-bounds write vulnerability was identified in the convert_to_s334_1a function in isomp4/qtdemux.c. The vulnerability arises due to a discrepancy between the size of memory allocated to the storage array and the loop condition i * 2 \u003c ccpair_size. Specifically, when ccpair_size is even, the allocated size in storage does not match the loop\u0027s expected bounds, resulting in an out-of-bounds write. This bug allows for the overwriting of up to 3 bytes beyond the allocated bounds of the storage array. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47539",
"url": "https://www.suse.com/security/cve/CVE-2024-47539"
},
{
"category": "external",
"summary": "SUSE Bug 1234417 for CVE-2024-47539",
"url": "https://bugzilla.suse.com/1234417"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-20T15:35:07Z",
"details": "important"
}
],
"title": "CVE-2024-47539"
},
{
"cve": "CVE-2024-47540",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47540"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An uninitialized stack variable vulnerability has been identified in the gst_matroska_demux_add_wvpk_header function within matroska-demux.c. When size \u003c 4, the program calls gst_buffer_unmap with an uninitialized map variable. Then, in the gst_memory_unmap function, the program will attempt to unmap the buffer using the uninitialized map variable, causing a function pointer hijack, as it will jump to mem-\u003eallocator-\u003emem_unmap_full or mem-\u003eallocator-\u003emem_unmap. This vulnerability could allow an attacker to hijack the execution flow, potentially leading to code execution. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47540",
"url": "https://www.suse.com/security/cve/CVE-2024-47540"
},
{
"category": "external",
"summary": "SUSE Bug 1234421 for CVE-2024-47540",
"url": "https://bugzilla.suse.com/1234421"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-20T15:35:07Z",
"details": "important"
}
],
"title": "CVE-2024-47540"
},
{
"cve": "CVE-2024-47543",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47543"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerability has been discovered in qtdemux_parse_container function within qtdemux.c. In the parent function qtdemux_parse_node, the value of length is not well checked. So, if length is big enough, it causes the pointer end to point beyond the boundaries of buffer. Subsequently, in the qtdemux_parse_container function, the while loop can trigger an OOB-read, accessing memory beyond the bounds of buf. This vulnerability can result in reading up to 4GB of process memory or potentially causing a segmentation fault (SEGV) when accessing invalid memory. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47543",
"url": "https://www.suse.com/security/cve/CVE-2024-47543"
},
{
"category": "external",
"summary": "SUSE Bug 1234462 for CVE-2024-47543",
"url": "https://bugzilla.suse.com/1234462"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-20T15:35:07Z",
"details": "moderate"
}
],
"title": "CVE-2024-47543"
},
{
"cve": "CVE-2024-47544",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47544"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. The function qtdemux_parse_sbgp in qtdemux.c is affected by a null dereference vulnerability. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47544",
"url": "https://www.suse.com/security/cve/CVE-2024-47544"
},
{
"category": "external",
"summary": "SUSE Bug 1234473 for CVE-2024-47544",
"url": "https://bugzilla.suse.com/1234473"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-20T15:35:07Z",
"details": "moderate"
}
],
"title": "CVE-2024-47544"
},
{
"cve": "CVE-2024-47545",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47545"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An integer underflow has been detected in qtdemux_parse_trak function within qtdemux.c. During the strf parsing case, the subtraction size -= 40 can lead to a negative integer overflow if it is less than 40. If this happens, the subsequent call to gst_buffer_fill will invoke memcpy with a large tocopy size, resulting in an OOB-read. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47545",
"url": "https://www.suse.com/security/cve/CVE-2024-47545"
},
{
"category": "external",
"summary": "SUSE Bug 1234476 for CVE-2024-47545",
"url": "https://bugzilla.suse.com/1234476"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-20T15:35:07Z",
"details": "moderate"
}
],
"title": "CVE-2024-47545"
},
{
"cve": "CVE-2024-47546",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47546"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An integer underflow has been detected in extract_cc_from_data function within qtdemux.c. In the FOURCC_c708 case, the subtraction atom_length - 8 may result in an underflow if atom_length is less than 8. When that subtraction underflows, *cclen ends up being a large number, and then cclen is passed to g_memdup2 leading to an out-of-bounds (OOB) read. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47546",
"url": "https://www.suse.com/security/cve/CVE-2024-47546"
},
{
"category": "external",
"summary": "SUSE Bug 1234477 for CVE-2024-47546",
"url": "https://bugzilla.suse.com/1234477"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-20T15:35:07Z",
"details": "moderate"
}
],
"title": "CVE-2024-47546"
},
{
"cve": "CVE-2024-47596",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47596"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An OOB-read has been discovered in the qtdemux_parse_svq3_stsd_data function within qtdemux.c. In the FOURCC_SMI_ case, seqh_size is read from the input file without proper validation. If seqh_size is greater than the remaining size of the data buffer, it can lead to an OOB-read in the following call to gst_buffer_fill, which internally uses memcpy. This vulnerability can result in reading up to 4GB of process memory or potentially causing a segmentation fault (SEGV) when accessing invalid memory. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47596",
"url": "https://www.suse.com/security/cve/CVE-2024-47596"
},
{
"category": "external",
"summary": "SUSE Bug 1234424 for CVE-2024-47596",
"url": "https://bugzilla.suse.com/1234424"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-20T15:35:07Z",
"details": "moderate"
}
],
"title": "CVE-2024-47596"
},
{
"cve": "CVE-2024-47597",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47597"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An OOB-read has been detected in the function qtdemux_parse_samples within qtdemux.c. This issue arises when the function qtdemux_parse_samples reads data beyond the boundaries of the stream-\u003estco buffer. The following code snippet shows the call to qt_atom_parser_get_offset_unchecked, which leads to the OOB-read when parsing the provided GHSL-2024-245_crash1.mp4 file. This issue may lead to read up to 8 bytes out-of-bounds. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47597",
"url": "https://www.suse.com/security/cve/CVE-2024-47597"
},
{
"category": "external",
"summary": "SUSE Bug 1234425 for CVE-2024-47597",
"url": "https://bugzilla.suse.com/1234425"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-20T15:35:07Z",
"details": "moderate"
}
],
"title": "CVE-2024-47597"
},
{
"cve": "CVE-2024-47599",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47599"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. A null pointer dereference vulnerability has been discovered in the gst_jpeg_dec_negotiate function in gstjpegdec.c. This function does not check for a NULL return value from gst_video_decoder_set_output_state. When this happens, dereferences of the outstate pointer will lead to a null pointer dereference. This vulnerability can result in a Denial of Service (DoS) by triggering a segmentation fault (SEGV). This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47599",
"url": "https://www.suse.com/security/cve/CVE-2024-47599"
},
{
"category": "external",
"summary": "SUSE Bug 1234427 for CVE-2024-47599",
"url": "https://bugzilla.suse.com/1234427"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-20T15:35:07Z",
"details": "moderate"
}
],
"title": "CVE-2024-47599"
},
{
"cve": "CVE-2024-47601",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47601"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. A null pointer dereference vulnerability has been discovered in the gst_matroska_demux_parse_blockgroup_or_simpleblock function within matroska-demux.c. This function does not properly check the validity of the GstBuffer *sub pointer before performing dereferences. As a result, null pointer dereferences may occur. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47601",
"url": "https://www.suse.com/security/cve/CVE-2024-47601"
},
{
"category": "external",
"summary": "SUSE Bug 1234428 for CVE-2024-47601",
"url": "https://bugzilla.suse.com/1234428"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-20T15:35:07Z",
"details": "moderate"
}
],
"title": "CVE-2024-47601"
},
{
"cve": "CVE-2024-47602",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47602"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. A null pointer dereference vulnerability has been discovered in the gst_matroska_demux_add_wvpk_header function within matroska-demux.c. This function does not properly check the validity of the stream-\u003ecodec_priv pointer in the following code. If stream-\u003ecodec_priv is NULL, the call to GST_READ_UINT16_LE will attempt to dereference a null pointer, leading to a crash of the application. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47602",
"url": "https://www.suse.com/security/cve/CVE-2024-47602"
},
{
"category": "external",
"summary": "SUSE Bug 1234432 for CVE-2024-47602",
"url": "https://bugzilla.suse.com/1234432"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-20T15:35:07Z",
"details": "moderate"
}
],
"title": "CVE-2024-47602"
},
{
"cve": "CVE-2024-47603",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47603"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. A null pointer dereference vulnerability has been discovered in the gst_matroska_demux_update_tracks function within matroska-demux.c. The vulnerability occurs when the gst_caps_is_equal function is called with invalid caps values. If this happen, then in the function gst_buffer_get_size the call to GST_BUFFER_MEM_PTR can return a null pointer. Attempting to dereference the size field of this null pointer results in a null pointer dereference. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47603",
"url": "https://www.suse.com/security/cve/CVE-2024-47603"
},
{
"category": "external",
"summary": "SUSE Bug 1234433 for CVE-2024-47603",
"url": "https://bugzilla.suse.com/1234433"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-20T15:35:07Z",
"details": "moderate"
}
],
"title": "CVE-2024-47603"
},
{
"cve": "CVE-2024-47606",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47606"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An integer underflow has been detected in the function qtdemux_parse_theora_extension within qtdemux.c. The vulnerability occurs due to an underflow of the gint size variable, which causes size to hold a large unintended value when cast to an unsigned integer. This 32-bit negative value is then cast to a 64-bit unsigned integer (0xfffffffffffffffa) in a subsequent call to gst_buffer_new_and_alloc. The function gst_buffer_new_allocate then attempts to allocate memory, eventually calling _sysmem_new_block. The function _sysmem_new_block adds alignment and header size to the (unsigned) size, causing the overflow of the \u0027slice_size\u0027 variable. As a result, only 0x89 bytes are allocated, despite the large input size. When the following memcpy call occurs in gst_buffer_fill, the data from the input file will overwrite the content of the GstMapInfo info structure. Finally, during the call to gst_memory_unmap, the overwritten memory may cause a function pointer hijack, as the mem-\u003eallocator-\u003emem_unmap_full function is called with a corrupted pointer. This function pointer overwrite could allow an attacker to alter the execution flow of the program, leading to arbitrary code execution. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47606",
"url": "https://www.suse.com/security/cve/CVE-2024-47606"
},
{
"category": "external",
"summary": "SUSE Bug 1234449 for CVE-2024-47606",
"url": "https://bugzilla.suse.com/1234449"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-20T15:35:07Z",
"details": "important"
}
],
"title": "CVE-2024-47606"
},
{
"cve": "CVE-2024-47613",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47613"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. A null pointer dereference vulnerability has been identified in `gst_gdk_pixbuf_dec_flush` within `gstgdkpixbufdec.c`. This function invokes `memcpy`, using `out_pix` as the destination address. `out_pix` is expected to point to the frame 0 from the frame structure, which is read from the input file. However, in certain situations, it can points to a NULL frame, causing the subsequent call to `memcpy` to attempt writing to the null address (0x00), leading to a null pointer dereference. This vulnerability can result in a Denial of Service (DoS) by triggering a segmentation fault (SEGV). This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47613",
"url": "https://www.suse.com/security/cve/CVE-2024-47613"
},
{
"category": "external",
"summary": "SUSE Bug 1234447 for CVE-2024-47613",
"url": "https://bugzilla.suse.com/1234447"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-20T15:35:07Z",
"details": "moderate"
}
],
"title": "CVE-2024-47613"
},
{
"cve": "CVE-2024-47774",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47774"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerability has been identified in the gst_avi_subtitle_parse_gab2_chunk function within gstavisubtitle.c. The function reads the name_length value directly from the input file without checking it properly. Then, the a condition, does not properly handle cases where name_length is greater than 0xFFFFFFFF - 17, causing an integer overflow. In such scenario, the function attempts to access memory beyond the buffer leading to an OOB-read. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47774",
"url": "https://www.suse.com/security/cve/CVE-2024-47774"
},
{
"category": "external",
"summary": "SUSE Bug 1234446 for CVE-2024-47774",
"url": "https://bugzilla.suse.com/1234446"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-20T15:35:07Z",
"details": "moderate"
}
],
"title": "CVE-2024-47774"
},
{
"cve": "CVE-2024-47775",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47775"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerability has been found in the parse_ds64 function within gstwavparse.c. The parse_ds64 function does not check that the buffer buf contains sufficient data before attempting to read from it, doing multiple GST_READ_UINT32_LE operations without performing boundary checks. This can lead to an OOB-read when buf is smaller than expected. This vulnerability allows reading beyond the bounds of the data buffer, potentially leading to a crash (denial of service) or the leak of sensitive data. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47775",
"url": "https://www.suse.com/security/cve/CVE-2024-47775"
},
{
"category": "external",
"summary": "SUSE Bug 1234434 for CVE-2024-47775",
"url": "https://bugzilla.suse.com/1234434"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-20T15:35:07Z",
"details": "moderate"
}
],
"title": "CVE-2024-47775"
},
{
"cve": "CVE-2024-47776",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47776"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An OOB-read has been discovered in gst_wavparse_cue_chunk within gstwavparse.c. The vulnerability happens due to a discrepancy between the size of the data buffer and the size value provided to the function. This mismatch causes the comparison if (size \u003c 4 + ncues * 24) to fail in some cases, allowing the subsequent loop to access beyond the bounds of the data buffer. The root cause of this discrepancy stems from a miscalculation when clipping the chunk size based on upstream data size. This vulnerability allows reading beyond the bounds of the data buffer, potentially leading to a crash (denial of service) or the leak of sensitive data. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47776",
"url": "https://www.suse.com/security/cve/CVE-2024-47776"
},
{
"category": "external",
"summary": "SUSE Bug 1234435 for CVE-2024-47776",
"url": "https://bugzilla.suse.com/1234435"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-20T15:35:07Z",
"details": "moderate"
}
],
"title": "CVE-2024-47776"
},
{
"cve": "CVE-2024-47777",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47777"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerability has been identified in the gst_wavparse_smpl_chunk function within gstwavparse.c. This function attempts to read 4 bytes from the data + 12 offset without checking if the size of the data buffer is sufficient. If the buffer is too small, the function reads beyond its bounds. This vulnerability may result in reading 4 bytes out of the boundaries of the data buffer. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47777",
"url": "https://www.suse.com/security/cve/CVE-2024-47777"
},
{
"category": "external",
"summary": "SUSE Bug 1234436 for CVE-2024-47777",
"url": "https://bugzilla.suse.com/1234436"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-20T15:35:07Z",
"details": "moderate"
}
],
"title": "CVE-2024-47777"
},
{
"cve": "CVE-2024-47778",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47778"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerability has been discovered in gst_wavparse_adtl_chunk within gstwavparse.c. This vulnerability arises due to insufficient validation of the size parameter, which can exceed the bounds of the data buffer. As a result, an OOB read occurs in the following while loop. This vulnerability can result in reading up to 4GB of process memory or potentially causing a segmentation fault (SEGV) when accessing invalid memory. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47778",
"url": "https://www.suse.com/security/cve/CVE-2024-47778"
},
{
"category": "external",
"summary": "SUSE Bug 1234439 for CVE-2024-47778",
"url": "https://bugzilla.suse.com/1234439"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-20T15:35:07Z",
"details": "moderate"
}
],
"title": "CVE-2024-47778"
},
{
"cve": "CVE-2024-47834",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47834"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An Use-After-Free read vulnerability has been discovered affecting the processing of CodecPrivate elements in Matroska streams. In the GST_MATROSKA_ID_CODECPRIVATE case within the gst_matroska_demux_parse_stream function, a data chunk is allocated using gst_ebml_read_binary. Later, the allocated memory is freed in the gst_matroska_track_free function, by the call to g_free (track-\u003ecodec_priv). Finally, the freed memory is accessed in the caps_serialize function through gst_value_serialize_buffer. The freed memory will be accessed in the gst_value_serialize_buffer function. This results in a UAF read vulnerability, as the function tries to process memory that has already been freed. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47834",
"url": "https://www.suse.com/security/cve/CVE-2024-47834"
},
{
"category": "external",
"summary": "SUSE Bug 1234440 for CVE-2024-47834",
"url": "https://bugzilla.suse.com/1234440"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Enterprise Storage 7.1:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-1.16.3-150200.3.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:gstreamer-plugins-good-lang-1.16.3-150200.3.17.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-20T15:35:07Z",
"details": "moderate"
}
],
"title": "CVE-2024-47834"
}
]
}
SUSE-SU-2025:0055-1
Vulnerability from csaf_suse - Published: 2025-01-09 16:36 - Updated: 2025-01-09 16:36Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for gstreamer-plugins-good",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for gstreamer-plugins-good fixes the following issues:\n\n- CVE-2024-47606: Fixed an integer overflows in MP4/MOV demuxer and memory allocator that can lead to out-of-bounds writes. (boo#1234449)\n- CVE-2024-47537: Fixed an out-of-bounds write in isomp4/qtdemux.c. (boo#1234414)\n- CVE-2024-47539: Fixed an out-of-bounds write in convert_to_s334_1a. (boo#1234417)\n- CVE-2024-47530: Fixed an uninitialized stack memory in Matroska/WebM demuxer. (boo#1234421)\n- CVE-2024-47596: Fixed an integer underflow in MP4/MOV demuxer that can lead to out-of-bounds reads. (boo#1234424)\n- CVE-2024-47597: Fixed an out-of-bounds reads in MP4/MOV demuxer sample table parser (boo#1234425)\n- CVE-2024-47598: Fixed MP4/MOV sample table parser out-of-bounds read. (boo#1234426)\n- CVE-2024-47599: Fixed insufficient error handling in JPEG decoder that can lead to NULL-pointer dereferences. (boo#1234427)\n- CVE-2024-47601: Fixed a NULL-pointer dereference in Matroska/WebM demuxer. (boo#1234428)\n- CVE-2024-47602: Fixed a NULL-pointer dereferences and out-of-bounds reads in Matroska/WebM demuxer. (boo#1234432)\n- CVE-2024-47603: Fixed a NULL-pointer dereference in Matroska/WebM demuxer. (boo#1234433)\n- CVE-2024-47775: Fixed various out-of-bounds reads in WAV parser. (boo#1234434)\n- CVE-2024-47776: Fixed various out-of-bounds reads in WAV parser. (boo#1234435)\n- CVE-2024-47777: Fixed various out-of-bounds reads in WAV parser. (boo#1234436)\n- CVE-2024-47778: Fixed various out-of-bounds reads in WAV parser. (boo#1234439)\n- CVE-2024-47834: Fixed a use-after-free in the Matroska demuxer that can cause crashes for certain input files. (boo#1234440)\n- CVE-2024-47774: Fixed an integer overflow in AVI subtitle parser that leads to out-of-bounds reads. (boo#1234446)\n- CVE-2024-47613: Fixed a NULL-pointer dereference in gdk-pixbuf decoder. (boo#1234447)\n- CVE-2024-47543: Fixed an out-of-bounds write in qtdemux_parse_container. (boo#1234462)\n- CVE-2024-47544: Fixed a NULL-pointer dereferences in MP4/MOV demuxer CENC handling. (boo#1234473)\n- CVE-2024-47545: Fixed an integer underflow in FOURCC_strf parsing leading to out-of-bounds read. (boo#1234476)\n- CVE-2024-47546: Fixed an integer underflow in extract_cc_from_data leading to out-of-bounds read. (boo#1234477)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-55,SUSE-SLE-Module-Basesystem-15-SP6-2025-55,SUSE-SLE-Product-WE-15-SP6-2025-55,openSUSE-SLE-15.6-2025-55",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_0055-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:0055-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20250055-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:0055-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020079.html"
},
{
"category": "self",
"summary": "SUSE Bug 1234414",
"url": "https://bugzilla.suse.com/1234414"
},
{
"category": "self",
"summary": "SUSE Bug 1234417",
"url": "https://bugzilla.suse.com/1234417"
},
{
"category": "self",
"summary": "SUSE Bug 1234421",
"url": "https://bugzilla.suse.com/1234421"
},
{
"category": "self",
"summary": "SUSE Bug 1234424",
"url": "https://bugzilla.suse.com/1234424"
},
{
"category": "self",
"summary": "SUSE Bug 1234425",
"url": "https://bugzilla.suse.com/1234425"
},
{
"category": "self",
"summary": "SUSE Bug 1234426",
"url": "https://bugzilla.suse.com/1234426"
},
{
"category": "self",
"summary": "SUSE Bug 1234427",
"url": "https://bugzilla.suse.com/1234427"
},
{
"category": "self",
"summary": "SUSE Bug 1234428",
"url": "https://bugzilla.suse.com/1234428"
},
{
"category": "self",
"summary": "SUSE Bug 1234432",
"url": "https://bugzilla.suse.com/1234432"
},
{
"category": "self",
"summary": "SUSE Bug 1234433",
"url": "https://bugzilla.suse.com/1234433"
},
{
"category": "self",
"summary": "SUSE Bug 1234434",
"url": "https://bugzilla.suse.com/1234434"
},
{
"category": "self",
"summary": "SUSE Bug 1234435",
"url": "https://bugzilla.suse.com/1234435"
},
{
"category": "self",
"summary": "SUSE Bug 1234436",
"url": "https://bugzilla.suse.com/1234436"
},
{
"category": "self",
"summary": "SUSE Bug 1234439",
"url": "https://bugzilla.suse.com/1234439"
},
{
"category": "self",
"summary": "SUSE Bug 1234440",
"url": "https://bugzilla.suse.com/1234440"
},
{
"category": "self",
"summary": "SUSE Bug 1234446",
"url": "https://bugzilla.suse.com/1234446"
},
{
"category": "self",
"summary": "SUSE Bug 1234447",
"url": "https://bugzilla.suse.com/1234447"
},
{
"category": "self",
"summary": "SUSE Bug 1234449",
"url": "https://bugzilla.suse.com/1234449"
},
{
"category": "self",
"summary": "SUSE Bug 1234462",
"url": "https://bugzilla.suse.com/1234462"
},
{
"category": "self",
"summary": "SUSE Bug 1234473",
"url": "https://bugzilla.suse.com/1234473"
},
{
"category": "self",
"summary": "SUSE Bug 1234476",
"url": "https://bugzilla.suse.com/1234476"
},
{
"category": "self",
"summary": "SUSE Bug 1234477",
"url": "https://bugzilla.suse.com/1234477"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47537 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47537/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47539 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47539/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47540 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47540/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47543 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47543/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47544 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47544/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47545 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47545/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47546 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47546/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47596 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47596/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47597 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47597/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47598 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47598/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47599 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47599/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47601 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47601/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47602 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47602/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47603 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47603/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47606 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47606/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47613 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47613/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47774 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47774/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47775 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47775/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47776 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47776/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47777 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47777/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47778 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47778/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47834 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47834/"
}
],
"title": "Security update for gstreamer-plugins-good",
"tracking": {
"current_release_date": "2025-01-09T16:36:54Z",
"generator": {
"date": "2025-01-09T16:36:54Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:0055-1",
"initial_release_date": "2025-01-09T16:36:54Z",
"revision_history": [
{
"date": "2025-01-09T16:36:54Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"product": {
"name": "gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"product_id": "gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.aarch64",
"product": {
"name": "gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.aarch64",
"product_id": "gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.aarch64",
"product": {
"name": "gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.aarch64",
"product_id": "gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.aarch64",
"product": {
"name": "gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.aarch64",
"product_id": "gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.aarch64",
"product": {
"name": "gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.aarch64",
"product_id": "gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "gstreamer-plugins-good-64bit-1.24.0-150600.3.3.1.aarch64_ilp32",
"product": {
"name": "gstreamer-plugins-good-64bit-1.24.0-150600.3.3.1.aarch64_ilp32",
"product_id": "gstreamer-plugins-good-64bit-1.24.0-150600.3.3.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-extra-64bit-1.24.0-150600.3.3.1.aarch64_ilp32",
"product": {
"name": "gstreamer-plugins-good-extra-64bit-1.24.0-150600.3.3.1.aarch64_ilp32",
"product_id": "gstreamer-plugins-good-extra-64bit-1.24.0-150600.3.3.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-jack-64bit-1.24.0-150600.3.3.1.aarch64_ilp32",
"product": {
"name": "gstreamer-plugins-good-jack-64bit-1.24.0-150600.3.3.1.aarch64_ilp32",
"product_id": "gstreamer-plugins-good-jack-64bit-1.24.0-150600.3.3.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "gstreamer-plugins-good-1.24.0-150600.3.3.1.i586",
"product": {
"name": "gstreamer-plugins-good-1.24.0-150600.3.3.1.i586",
"product_id": "gstreamer-plugins-good-1.24.0-150600.3.3.1.i586"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.i586",
"product": {
"name": "gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.i586",
"product_id": "gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.i586"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.i586",
"product": {
"name": "gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.i586",
"product_id": "gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.i586"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.i586",
"product": {
"name": "gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.i586",
"product_id": "gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.i586"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.i586",
"product": {
"name": "gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.i586",
"product_id": "gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"product": {
"name": "gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"product_id": "gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"product": {
"name": "gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"product_id": "gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.ppc64le",
"product": {
"name": "gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.ppc64le",
"product_id": "gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.ppc64le",
"product": {
"name": "gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.ppc64le",
"product_id": "gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.ppc64le",
"product": {
"name": "gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.ppc64le",
"product_id": "gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.ppc64le",
"product": {
"name": "gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.ppc64le",
"product_id": "gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"product": {
"name": "gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"product_id": "gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.s390x",
"product": {
"name": "gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.s390x",
"product_id": "gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.s390x"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.s390x",
"product": {
"name": "gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.s390x",
"product_id": "gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.s390x"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.s390x",
"product": {
"name": "gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.s390x",
"product_id": "gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.s390x"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.s390x",
"product": {
"name": "gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.s390x",
"product_id": "gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"product": {
"name": "gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"product_id": "gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-32bit-1.24.0-150600.3.3.1.x86_64",
"product": {
"name": "gstreamer-plugins-good-32bit-1.24.0-150600.3.3.1.x86_64",
"product_id": "gstreamer-plugins-good-32bit-1.24.0-150600.3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.x86_64",
"product": {
"name": "gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.x86_64",
"product_id": "gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-extra-32bit-1.24.0-150600.3.3.1.x86_64",
"product": {
"name": "gstreamer-plugins-good-extra-32bit-1.24.0-150600.3.3.1.x86_64",
"product_id": "gstreamer-plugins-good-extra-32bit-1.24.0-150600.3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"product": {
"name": "gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"product_id": "gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.x86_64",
"product": {
"name": "gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.x86_64",
"product_id": "gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-jack-32bit-1.24.0-150600.3.3.1.x86_64",
"product": {
"name": "gstreamer-plugins-good-jack-32bit-1.24.0-150600.3.3.1.x86_64",
"product_id": "gstreamer-plugins-good-jack-32bit-1.24.0-150600.3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.x86_64",
"product": {
"name": "gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.x86_64",
"product_id": "gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 15 SP6",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:15:sp6"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64"
},
"product_reference": "gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le"
},
"product_reference": "gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x"
},
"product_reference": "gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64"
},
"product_reference": "gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch"
},
"product_reference": "gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP6",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64"
},
"product_reference": "gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64"
},
"product_reference": "gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le"
},
"product_reference": "gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x"
},
"product_reference": "gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64"
},
"product_reference": "gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-32bit-1.24.0-150600.3.3.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:gstreamer-plugins-good-32bit-1.24.0-150600.3.3.1.x86_64"
},
"product_reference": "gstreamer-plugins-good-32bit-1.24.0-150600.3.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.aarch64"
},
"product_reference": "gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.ppc64le"
},
"product_reference": "gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.s390x"
},
"product_reference": "gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.x86_64"
},
"product_reference": "gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-extra-32bit-1.24.0-150600.3.3.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:gstreamer-plugins-good-extra-32bit-1.24.0-150600.3.3.1.x86_64"
},
"product_reference": "gstreamer-plugins-good-extra-32bit-1.24.0-150600.3.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.aarch64"
},
"product_reference": "gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.ppc64le"
},
"product_reference": "gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.s390x"
},
"product_reference": "gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64"
},
"product_reference": "gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.aarch64"
},
"product_reference": "gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.ppc64le"
},
"product_reference": "gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.s390x"
},
"product_reference": "gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.x86_64"
},
"product_reference": "gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-jack-32bit-1.24.0-150600.3.3.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:gstreamer-plugins-good-jack-32bit-1.24.0-150600.3.3.1.x86_64"
},
"product_reference": "gstreamer-plugins-good-jack-32bit-1.24.0-150600.3.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch"
},
"product_reference": "gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.aarch64"
},
"product_reference": "gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.ppc64le"
},
"product_reference": "gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.s390x"
},
"product_reference": "gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.x86_64"
},
"product_reference": "gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-47537",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47537"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. The program attempts to reallocate the memory pointed to by stream-\u003esamples to accommodate stream-\u003en_samples + samples_count elements of type QtDemuxSample. The problem is that samples_count is read from the input file. And if this value is big enough, this can lead to an integer overflow during the addition. As a consequence, g_try_renew might allocate memory for a significantly smaller number of elements than intended. Following this, the program iterates through samples_count elements and attempts to write samples_count number of elements, potentially exceeding the actual allocated memory size and causing an OOB-write. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"SUSE Linux Enterprise Workstation Extension 15 SP6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47537",
"url": "https://www.suse.com/security/cve/CVE-2024-47537"
},
{
"category": "external",
"summary": "SUSE Bug 1234414 for CVE-2024-47537",
"url": "https://bugzilla.suse.com/1234414"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"SUSE Linux Enterprise Workstation Extension 15 SP6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"SUSE Linux Enterprise Workstation Extension 15 SP6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-09T16:36:54Z",
"details": "important"
}
],
"title": "CVE-2024-47537"
},
{
"cve": "CVE-2024-47539",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47539"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An out-of-bounds write vulnerability was identified in the convert_to_s334_1a function in isomp4/qtdemux.c. The vulnerability arises due to a discrepancy between the size of memory allocated to the storage array and the loop condition i * 2 \u003c ccpair_size. Specifically, when ccpair_size is even, the allocated size in storage does not match the loop\u0027s expected bounds, resulting in an out-of-bounds write. This bug allows for the overwriting of up to 3 bytes beyond the allocated bounds of the storage array. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"SUSE Linux Enterprise Workstation Extension 15 SP6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47539",
"url": "https://www.suse.com/security/cve/CVE-2024-47539"
},
{
"category": "external",
"summary": "SUSE Bug 1234417 for CVE-2024-47539",
"url": "https://bugzilla.suse.com/1234417"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"SUSE Linux Enterprise Workstation Extension 15 SP6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"SUSE Linux Enterprise Workstation Extension 15 SP6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-09T16:36:54Z",
"details": "important"
}
],
"title": "CVE-2024-47539"
},
{
"cve": "CVE-2024-47540",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47540"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An uninitialized stack variable vulnerability has been identified in the gst_matroska_demux_add_wvpk_header function within matroska-demux.c. When size \u003c 4, the program calls gst_buffer_unmap with an uninitialized map variable. Then, in the gst_memory_unmap function, the program will attempt to unmap the buffer using the uninitialized map variable, causing a function pointer hijack, as it will jump to mem-\u003eallocator-\u003emem_unmap_full or mem-\u003eallocator-\u003emem_unmap. This vulnerability could allow an attacker to hijack the execution flow, potentially leading to code execution. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"SUSE Linux Enterprise Workstation Extension 15 SP6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47540",
"url": "https://www.suse.com/security/cve/CVE-2024-47540"
},
{
"category": "external",
"summary": "SUSE Bug 1234421 for CVE-2024-47540",
"url": "https://bugzilla.suse.com/1234421"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"SUSE Linux Enterprise Workstation Extension 15 SP6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"SUSE Linux Enterprise Workstation Extension 15 SP6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-09T16:36:54Z",
"details": "important"
}
],
"title": "CVE-2024-47540"
},
{
"cve": "CVE-2024-47543",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47543"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerability has been discovered in qtdemux_parse_container function within qtdemux.c. In the parent function qtdemux_parse_node, the value of length is not well checked. So, if length is big enough, it causes the pointer end to point beyond the boundaries of buffer. Subsequently, in the qtdemux_parse_container function, the while loop can trigger an OOB-read, accessing memory beyond the bounds of buf. This vulnerability can result in reading up to 4GB of process memory or potentially causing a segmentation fault (SEGV) when accessing invalid memory. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"SUSE Linux Enterprise Workstation Extension 15 SP6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47543",
"url": "https://www.suse.com/security/cve/CVE-2024-47543"
},
{
"category": "external",
"summary": "SUSE Bug 1234462 for CVE-2024-47543",
"url": "https://bugzilla.suse.com/1234462"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"SUSE Linux Enterprise Workstation Extension 15 SP6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"SUSE Linux Enterprise Workstation Extension 15 SP6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-09T16:36:54Z",
"details": "moderate"
}
],
"title": "CVE-2024-47543"
},
{
"cve": "CVE-2024-47544",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47544"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. The function qtdemux_parse_sbgp in qtdemux.c is affected by a null dereference vulnerability. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"SUSE Linux Enterprise Workstation Extension 15 SP6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47544",
"url": "https://www.suse.com/security/cve/CVE-2024-47544"
},
{
"category": "external",
"summary": "SUSE Bug 1234473 for CVE-2024-47544",
"url": "https://bugzilla.suse.com/1234473"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"SUSE Linux Enterprise Workstation Extension 15 SP6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"SUSE Linux Enterprise Workstation Extension 15 SP6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-09T16:36:54Z",
"details": "moderate"
}
],
"title": "CVE-2024-47544"
},
{
"cve": "CVE-2024-47545",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47545"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An integer underflow has been detected in qtdemux_parse_trak function within qtdemux.c. During the strf parsing case, the subtraction size -= 40 can lead to a negative integer overflow if it is less than 40. If this happens, the subsequent call to gst_buffer_fill will invoke memcpy with a large tocopy size, resulting in an OOB-read. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"SUSE Linux Enterprise Workstation Extension 15 SP6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47545",
"url": "https://www.suse.com/security/cve/CVE-2024-47545"
},
{
"category": "external",
"summary": "SUSE Bug 1234476 for CVE-2024-47545",
"url": "https://bugzilla.suse.com/1234476"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"SUSE Linux Enterprise Workstation Extension 15 SP6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"SUSE Linux Enterprise Workstation Extension 15 SP6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-09T16:36:54Z",
"details": "moderate"
}
],
"title": "CVE-2024-47545"
},
{
"cve": "CVE-2024-47546",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47546"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An integer underflow has been detected in extract_cc_from_data function within qtdemux.c. In the FOURCC_c708 case, the subtraction atom_length - 8 may result in an underflow if atom_length is less than 8. When that subtraction underflows, *cclen ends up being a large number, and then cclen is passed to g_memdup2 leading to an out-of-bounds (OOB) read. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"SUSE Linux Enterprise Workstation Extension 15 SP6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47546",
"url": "https://www.suse.com/security/cve/CVE-2024-47546"
},
{
"category": "external",
"summary": "SUSE Bug 1234477 for CVE-2024-47546",
"url": "https://bugzilla.suse.com/1234477"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"SUSE Linux Enterprise Workstation Extension 15 SP6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"SUSE Linux Enterprise Workstation Extension 15 SP6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-09T16:36:54Z",
"details": "moderate"
}
],
"title": "CVE-2024-47546"
},
{
"cve": "CVE-2024-47596",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47596"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An OOB-read has been discovered in the qtdemux_parse_svq3_stsd_data function within qtdemux.c. In the FOURCC_SMI_ case, seqh_size is read from the input file without proper validation. If seqh_size is greater than the remaining size of the data buffer, it can lead to an OOB-read in the following call to gst_buffer_fill, which internally uses memcpy. This vulnerability can result in reading up to 4GB of process memory or potentially causing a segmentation fault (SEGV) when accessing invalid memory. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"SUSE Linux Enterprise Workstation Extension 15 SP6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47596",
"url": "https://www.suse.com/security/cve/CVE-2024-47596"
},
{
"category": "external",
"summary": "SUSE Bug 1234424 for CVE-2024-47596",
"url": "https://bugzilla.suse.com/1234424"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"SUSE Linux Enterprise Workstation Extension 15 SP6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"SUSE Linux Enterprise Workstation Extension 15 SP6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-09T16:36:54Z",
"details": "moderate"
}
],
"title": "CVE-2024-47596"
},
{
"cve": "CVE-2024-47597",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47597"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An OOB-read has been detected in the function qtdemux_parse_samples within qtdemux.c. This issue arises when the function qtdemux_parse_samples reads data beyond the boundaries of the stream-\u003estco buffer. The following code snippet shows the call to qt_atom_parser_get_offset_unchecked, which leads to the OOB-read when parsing the provided GHSL-2024-245_crash1.mp4 file. This issue may lead to read up to 8 bytes out-of-bounds. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"SUSE Linux Enterprise Workstation Extension 15 SP6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47597",
"url": "https://www.suse.com/security/cve/CVE-2024-47597"
},
{
"category": "external",
"summary": "SUSE Bug 1234425 for CVE-2024-47597",
"url": "https://bugzilla.suse.com/1234425"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"SUSE Linux Enterprise Workstation Extension 15 SP6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"SUSE Linux Enterprise Workstation Extension 15 SP6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-09T16:36:54Z",
"details": "moderate"
}
],
"title": "CVE-2024-47597"
},
{
"cve": "CVE-2024-47598",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47598"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerability has been discovered in the qtdemux_merge_sample_table function within qtdemux.c. The problem is that the size of the stts buffer isn\u0027t properly checked before reading stts_duration, allowing the program to read 4 bytes beyond the boundaries of stts-\u003edata. This vulnerability reads up to 4 bytes past the allocated bounds of the stts array. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"SUSE Linux Enterprise Workstation Extension 15 SP6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47598",
"url": "https://www.suse.com/security/cve/CVE-2024-47598"
},
{
"category": "external",
"summary": "SUSE Bug 1234426 for CVE-2024-47598",
"url": "https://bugzilla.suse.com/1234426"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"SUSE Linux Enterprise Workstation Extension 15 SP6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"SUSE Linux Enterprise Workstation Extension 15 SP6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-09T16:36:54Z",
"details": "moderate"
}
],
"title": "CVE-2024-47598"
},
{
"cve": "CVE-2024-47599",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47599"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. A null pointer dereference vulnerability has been discovered in the gst_jpeg_dec_negotiate function in gstjpegdec.c. This function does not check for a NULL return value from gst_video_decoder_set_output_state. When this happens, dereferences of the outstate pointer will lead to a null pointer dereference. This vulnerability can result in a Denial of Service (DoS) by triggering a segmentation fault (SEGV). This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"SUSE Linux Enterprise Workstation Extension 15 SP6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47599",
"url": "https://www.suse.com/security/cve/CVE-2024-47599"
},
{
"category": "external",
"summary": "SUSE Bug 1234427 for CVE-2024-47599",
"url": "https://bugzilla.suse.com/1234427"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"SUSE Linux Enterprise Workstation Extension 15 SP6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"SUSE Linux Enterprise Workstation Extension 15 SP6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-09T16:36:54Z",
"details": "moderate"
}
],
"title": "CVE-2024-47599"
},
{
"cve": "CVE-2024-47601",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47601"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. A null pointer dereference vulnerability has been discovered in the gst_matroska_demux_parse_blockgroup_or_simpleblock function within matroska-demux.c. This function does not properly check the validity of the GstBuffer *sub pointer before performing dereferences. As a result, null pointer dereferences may occur. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"SUSE Linux Enterprise Workstation Extension 15 SP6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47601",
"url": "https://www.suse.com/security/cve/CVE-2024-47601"
},
{
"category": "external",
"summary": "SUSE Bug 1234428 for CVE-2024-47601",
"url": "https://bugzilla.suse.com/1234428"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"SUSE Linux Enterprise Workstation Extension 15 SP6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"SUSE Linux Enterprise Workstation Extension 15 SP6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-09T16:36:54Z",
"details": "moderate"
}
],
"title": "CVE-2024-47601"
},
{
"cve": "CVE-2024-47602",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47602"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. A null pointer dereference vulnerability has been discovered in the gst_matroska_demux_add_wvpk_header function within matroska-demux.c. This function does not properly check the validity of the stream-\u003ecodec_priv pointer in the following code. If stream-\u003ecodec_priv is NULL, the call to GST_READ_UINT16_LE will attempt to dereference a null pointer, leading to a crash of the application. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"SUSE Linux Enterprise Workstation Extension 15 SP6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47602",
"url": "https://www.suse.com/security/cve/CVE-2024-47602"
},
{
"category": "external",
"summary": "SUSE Bug 1234432 for CVE-2024-47602",
"url": "https://bugzilla.suse.com/1234432"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"SUSE Linux Enterprise Workstation Extension 15 SP6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"SUSE Linux Enterprise Workstation Extension 15 SP6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-09T16:36:54Z",
"details": "moderate"
}
],
"title": "CVE-2024-47602"
},
{
"cve": "CVE-2024-47603",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47603"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. A null pointer dereference vulnerability has been discovered in the gst_matroska_demux_update_tracks function within matroska-demux.c. The vulnerability occurs when the gst_caps_is_equal function is called with invalid caps values. If this happen, then in the function gst_buffer_get_size the call to GST_BUFFER_MEM_PTR can return a null pointer. Attempting to dereference the size field of this null pointer results in a null pointer dereference. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"SUSE Linux Enterprise Workstation Extension 15 SP6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47603",
"url": "https://www.suse.com/security/cve/CVE-2024-47603"
},
{
"category": "external",
"summary": "SUSE Bug 1234433 for CVE-2024-47603",
"url": "https://bugzilla.suse.com/1234433"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"SUSE Linux Enterprise Workstation Extension 15 SP6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"SUSE Linux Enterprise Workstation Extension 15 SP6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-09T16:36:54Z",
"details": "moderate"
}
],
"title": "CVE-2024-47603"
},
{
"cve": "CVE-2024-47606",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47606"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An integer underflow has been detected in the function qtdemux_parse_theora_extension within qtdemux.c. The vulnerability occurs due to an underflow of the gint size variable, which causes size to hold a large unintended value when cast to an unsigned integer. This 32-bit negative value is then cast to a 64-bit unsigned integer (0xfffffffffffffffa) in a subsequent call to gst_buffer_new_and_alloc. The function gst_buffer_new_allocate then attempts to allocate memory, eventually calling _sysmem_new_block. The function _sysmem_new_block adds alignment and header size to the (unsigned) size, causing the overflow of the \u0027slice_size\u0027 variable. As a result, only 0x89 bytes are allocated, despite the large input size. When the following memcpy call occurs in gst_buffer_fill, the data from the input file will overwrite the content of the GstMapInfo info structure. Finally, during the call to gst_memory_unmap, the overwritten memory may cause a function pointer hijack, as the mem-\u003eallocator-\u003emem_unmap_full function is called with a corrupted pointer. This function pointer overwrite could allow an attacker to alter the execution flow of the program, leading to arbitrary code execution. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"SUSE Linux Enterprise Workstation Extension 15 SP6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47606",
"url": "https://www.suse.com/security/cve/CVE-2024-47606"
},
{
"category": "external",
"summary": "SUSE Bug 1234449 for CVE-2024-47606",
"url": "https://bugzilla.suse.com/1234449"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"SUSE Linux Enterprise Workstation Extension 15 SP6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"SUSE Linux Enterprise Workstation Extension 15 SP6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-09T16:36:54Z",
"details": "important"
}
],
"title": "CVE-2024-47606"
},
{
"cve": "CVE-2024-47613",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47613"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. A null pointer dereference vulnerability has been identified in `gst_gdk_pixbuf_dec_flush` within `gstgdkpixbufdec.c`. This function invokes `memcpy`, using `out_pix` as the destination address. `out_pix` is expected to point to the frame 0 from the frame structure, which is read from the input file. However, in certain situations, it can points to a NULL frame, causing the subsequent call to `memcpy` to attempt writing to the null address (0x00), leading to a null pointer dereference. This vulnerability can result in a Denial of Service (DoS) by triggering a segmentation fault (SEGV). This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"SUSE Linux Enterprise Workstation Extension 15 SP6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47613",
"url": "https://www.suse.com/security/cve/CVE-2024-47613"
},
{
"category": "external",
"summary": "SUSE Bug 1234447 for CVE-2024-47613",
"url": "https://bugzilla.suse.com/1234447"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"SUSE Linux Enterprise Workstation Extension 15 SP6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"SUSE Linux Enterprise Workstation Extension 15 SP6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-09T16:36:54Z",
"details": "moderate"
}
],
"title": "CVE-2024-47613"
},
{
"cve": "CVE-2024-47774",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47774"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerability has been identified in the gst_avi_subtitle_parse_gab2_chunk function within gstavisubtitle.c. The function reads the name_length value directly from the input file without checking it properly. Then, the a condition, does not properly handle cases where name_length is greater than 0xFFFFFFFF - 17, causing an integer overflow. In such scenario, the function attempts to access memory beyond the buffer leading to an OOB-read. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"SUSE Linux Enterprise Workstation Extension 15 SP6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47774",
"url": "https://www.suse.com/security/cve/CVE-2024-47774"
},
{
"category": "external",
"summary": "SUSE Bug 1234446 for CVE-2024-47774",
"url": "https://bugzilla.suse.com/1234446"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"SUSE Linux Enterprise Workstation Extension 15 SP6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"SUSE Linux Enterprise Workstation Extension 15 SP6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-09T16:36:54Z",
"details": "moderate"
}
],
"title": "CVE-2024-47774"
},
{
"cve": "CVE-2024-47775",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47775"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerability has been found in the parse_ds64 function within gstwavparse.c. The parse_ds64 function does not check that the buffer buf contains sufficient data before attempting to read from it, doing multiple GST_READ_UINT32_LE operations without performing boundary checks. This can lead to an OOB-read when buf is smaller than expected. This vulnerability allows reading beyond the bounds of the data buffer, potentially leading to a crash (denial of service) or the leak of sensitive data. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"SUSE Linux Enterprise Workstation Extension 15 SP6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47775",
"url": "https://www.suse.com/security/cve/CVE-2024-47775"
},
{
"category": "external",
"summary": "SUSE Bug 1234434 for CVE-2024-47775",
"url": "https://bugzilla.suse.com/1234434"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"SUSE Linux Enterprise Workstation Extension 15 SP6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"SUSE Linux Enterprise Workstation Extension 15 SP6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-09T16:36:54Z",
"details": "moderate"
}
],
"title": "CVE-2024-47775"
},
{
"cve": "CVE-2024-47776",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47776"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An OOB-read has been discovered in gst_wavparse_cue_chunk within gstwavparse.c. The vulnerability happens due to a discrepancy between the size of the data buffer and the size value provided to the function. This mismatch causes the comparison if (size \u003c 4 + ncues * 24) to fail in some cases, allowing the subsequent loop to access beyond the bounds of the data buffer. The root cause of this discrepancy stems from a miscalculation when clipping the chunk size based on upstream data size. This vulnerability allows reading beyond the bounds of the data buffer, potentially leading to a crash (denial of service) or the leak of sensitive data. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"SUSE Linux Enterprise Workstation Extension 15 SP6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47776",
"url": "https://www.suse.com/security/cve/CVE-2024-47776"
},
{
"category": "external",
"summary": "SUSE Bug 1234435 for CVE-2024-47776",
"url": "https://bugzilla.suse.com/1234435"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"SUSE Linux Enterprise Workstation Extension 15 SP6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"SUSE Linux Enterprise Workstation Extension 15 SP6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-09T16:36:54Z",
"details": "moderate"
}
],
"title": "CVE-2024-47776"
},
{
"cve": "CVE-2024-47777",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47777"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerability has been identified in the gst_wavparse_smpl_chunk function within gstwavparse.c. This function attempts to read 4 bytes from the data + 12 offset without checking if the size of the data buffer is sufficient. If the buffer is too small, the function reads beyond its bounds. This vulnerability may result in reading 4 bytes out of the boundaries of the data buffer. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"SUSE Linux Enterprise Workstation Extension 15 SP6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47777",
"url": "https://www.suse.com/security/cve/CVE-2024-47777"
},
{
"category": "external",
"summary": "SUSE Bug 1234436 for CVE-2024-47777",
"url": "https://bugzilla.suse.com/1234436"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"SUSE Linux Enterprise Workstation Extension 15 SP6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"SUSE Linux Enterprise Workstation Extension 15 SP6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-09T16:36:54Z",
"details": "moderate"
}
],
"title": "CVE-2024-47777"
},
{
"cve": "CVE-2024-47778",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47778"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerability has been discovered in gst_wavparse_adtl_chunk within gstwavparse.c. This vulnerability arises due to insufficient validation of the size parameter, which can exceed the bounds of the data buffer. As a result, an OOB read occurs in the following while loop. This vulnerability can result in reading up to 4GB of process memory or potentially causing a segmentation fault (SEGV) when accessing invalid memory. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"SUSE Linux Enterprise Workstation Extension 15 SP6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47778",
"url": "https://www.suse.com/security/cve/CVE-2024-47778"
},
{
"category": "external",
"summary": "SUSE Bug 1234439 for CVE-2024-47778",
"url": "https://bugzilla.suse.com/1234439"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"SUSE Linux Enterprise Workstation Extension 15 SP6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"SUSE Linux Enterprise Workstation Extension 15 SP6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-09T16:36:54Z",
"details": "moderate"
}
],
"title": "CVE-2024-47778"
},
{
"cve": "CVE-2024-47834",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47834"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An Use-After-Free read vulnerability has been discovered affecting the processing of CodecPrivate elements in Matroska streams. In the GST_MATROSKA_ID_CODECPRIVATE case within the gst_matroska_demux_parse_stream function, a data chunk is allocated using gst_ebml_read_binary. Later, the allocated memory is freed in the gst_matroska_track_free function, by the call to g_free (track-\u003ecodec_priv). Finally, the freed memory is accessed in the caps_serialize function through gst_value_serialize_buffer. The freed memory will be accessed in the gst_value_serialize_buffer function. This results in a UAF read vulnerability, as the function tries to process memory that has already been freed. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"SUSE Linux Enterprise Workstation Extension 15 SP6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47834",
"url": "https://www.suse.com/security/cve/CVE-2024-47834"
},
{
"category": "external",
"summary": "SUSE Bug 1234440 for CVE-2024-47834",
"url": "https://bugzilla.suse.com/1234440"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"SUSE Linux Enterprise Workstation Extension 15 SP6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"SUSE Linux Enterprise Workstation Extension 15 SP6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-extra-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-gtk-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-jack-32bit-1.24.0-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:gstreamer-plugins-good-lang-1.24.0-150600.3.3.1.noarch",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.s390x",
"openSUSE Leap 15.6:gstreamer-plugins-good-qtqml-1.24.0-150600.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-09T16:36:54Z",
"details": "moderate"
}
],
"title": "CVE-2024-47834"
}
]
}
SUSE-SU-2025:0063-1
Vulnerability from csaf_suse - Published: 2025-06-24 12:03 - Updated: 2025-06-24 12:03Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for gstreamer-plugins-good",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for gstreamer-plugins-good fixes the following issues:\n\n- CVE-2024-47540: Fixed an uninitialized stack memory in Matroska/WebM demuxer. (boo#1234421)\n- CVE-2024-47537: Fixed an out-of-bounds write in isomp4/qtdemux.c. (boo#1234414)\n- CVE-2024-47543: Fixed an out-of-bounds write in qtdemux_parse_container. (boo#1234462)\n- CVE-2024-47544: Fixed a NULL-pointer dereferences in MP4/MOV demuxer CENC handling. (boo#1234473)\n- CVE-2024-47545: Fixed an integer underflow in FOURCC_strf parsing leading to out-of-bounds read. (boo#1234476)\n- CVE-2024-47596: Fixed an integer underflow in MP4/MOV demuxer that can lead to out-of-bounds reads. (boo#1234424)\n- CVE-2024-47597: Fixed an out-of-bounds reads in MP4/MOV demuxer sample table parser (boo#1234425)\n- CVE-2024-47599: Fixed insufficient error handling in JPEG decoder that can lead to NULL-pointer dereferences. (boo#1234427)\n- CVE-2024-47601: Fixed a NULL-pointer dereference in Matroska/WebM demuxer. (boo#1234428)\n- CVE-2024-47602: Fixed a NULL-pointer dereferences and out-of-bounds reads in Matroska/WebM demuxer. (boo#1234432)\n- CVE-2024-47603: Fixed a NULL-pointer dereference in Matroska/WebM demuxer. (boo#1234433)\n- CVE-2024-47606: Avoid integer overflow when allocating sysmem. (bsc#1234449)\n- CVE-2024-47606: Fixed an integer overflows in MP4/MOV demuxer and memory allocator that can lead to out-of-bounds writes. (boo#1234449)\n- CVE-2024-47613: Fixed a NULL-pointer dereference in gdk-pixbuf decoder. (boo#1234447)\n- CVE-2024-47774: Fixed an integer overflow in AVI subtitle parser that leads to out-of-bounds reads. (boo#1234446)\n- CVE-2024-47775: Fixed various out-of-bounds reads in WAV parser. (boo#1234434)\n- CVE-2024-47776: Fixed various out-of-bounds reads in WAV parser. (boo#1234435)\n- CVE-2024-47777: Fixed various out-of-bounds reads in WAV parser. (boo#1234436)\n- CVE-2024-47778: Fixed various out-of-bounds reads in WAV parser. (boo#1234439)\n- CVE-2024-47834: Fixed a use-after-free in the Matroska demuxer that can cause crashes for certain input files. (boo#1234440)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-63,SUSE-SLE-SERVER-12-SP5-LTSS-2025-63,SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-63",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_0063-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:0063-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20250063-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:0063-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020091.html"
},
{
"category": "self",
"summary": "SUSE Bug 1234414",
"url": "https://bugzilla.suse.com/1234414"
},
{
"category": "self",
"summary": "SUSE Bug 1234421",
"url": "https://bugzilla.suse.com/1234421"
},
{
"category": "self",
"summary": "SUSE Bug 1234424",
"url": "https://bugzilla.suse.com/1234424"
},
{
"category": "self",
"summary": "SUSE Bug 1234425",
"url": "https://bugzilla.suse.com/1234425"
},
{
"category": "self",
"summary": "SUSE Bug 1234427",
"url": "https://bugzilla.suse.com/1234427"
},
{
"category": "self",
"summary": "SUSE Bug 1234428",
"url": "https://bugzilla.suse.com/1234428"
},
{
"category": "self",
"summary": "SUSE Bug 1234432",
"url": "https://bugzilla.suse.com/1234432"
},
{
"category": "self",
"summary": "SUSE Bug 1234433",
"url": "https://bugzilla.suse.com/1234433"
},
{
"category": "self",
"summary": "SUSE Bug 1234434",
"url": "https://bugzilla.suse.com/1234434"
},
{
"category": "self",
"summary": "SUSE Bug 1234435",
"url": "https://bugzilla.suse.com/1234435"
},
{
"category": "self",
"summary": "SUSE Bug 1234436",
"url": "https://bugzilla.suse.com/1234436"
},
{
"category": "self",
"summary": "SUSE Bug 1234439",
"url": "https://bugzilla.suse.com/1234439"
},
{
"category": "self",
"summary": "SUSE Bug 1234440",
"url": "https://bugzilla.suse.com/1234440"
},
{
"category": "self",
"summary": "SUSE Bug 1234446",
"url": "https://bugzilla.suse.com/1234446"
},
{
"category": "self",
"summary": "SUSE Bug 1234447",
"url": "https://bugzilla.suse.com/1234447"
},
{
"category": "self",
"summary": "SUSE Bug 1234449",
"url": "https://bugzilla.suse.com/1234449"
},
{
"category": "self",
"summary": "SUSE Bug 1234462",
"url": "https://bugzilla.suse.com/1234462"
},
{
"category": "self",
"summary": "SUSE Bug 1234473",
"url": "https://bugzilla.suse.com/1234473"
},
{
"category": "self",
"summary": "SUSE Bug 1234476",
"url": "https://bugzilla.suse.com/1234476"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47537 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47537/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47540 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47540/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47543 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47543/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47544 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47544/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47545 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47545/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47596 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47596/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47597 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47597/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47599 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47599/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47601 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47601/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47602 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47602/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47603 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47603/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47606 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47606/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47613 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47613/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47774 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47774/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47775 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47775/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47776 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47776/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47777 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47777/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47778 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47778/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47834 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47834/"
}
],
"title": "Security update for gstreamer-plugins-good",
"tracking": {
"current_release_date": "2025-06-24T12:03:30Z",
"generator": {
"date": "2025-06-24T12:03:30Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:0063-1",
"initial_release_date": "2025-06-24T12:03:30Z",
"revision_history": [
{
"date": "2025-06-24T12:03:30Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"product": {
"name": "gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"product_id": "gstreamer-plugins-good-1.8.3-16.12.1.aarch64"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-doc-1.8.3-16.12.1.aarch64",
"product": {
"name": "gstreamer-plugins-good-doc-1.8.3-16.12.1.aarch64",
"product_id": "gstreamer-plugins-good-doc-1.8.3-16.12.1.aarch64"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-extra-1.8.3-16.12.1.aarch64",
"product": {
"name": "gstreamer-plugins-good-extra-1.8.3-16.12.1.aarch64",
"product_id": "gstreamer-plugins-good-extra-1.8.3-16.12.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "gstreamer-plugins-good-64bit-1.8.3-16.12.1.aarch64_ilp32",
"product": {
"name": "gstreamer-plugins-good-64bit-1.8.3-16.12.1.aarch64_ilp32",
"product_id": "gstreamer-plugins-good-64bit-1.8.3-16.12.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-extra-64bit-1.8.3-16.12.1.aarch64_ilp32",
"product": {
"name": "gstreamer-plugins-good-extra-64bit-1.8.3-16.12.1.aarch64_ilp32",
"product_id": "gstreamer-plugins-good-extra-64bit-1.8.3-16.12.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "gstreamer-plugins-good-1.8.3-16.12.1.i586",
"product": {
"name": "gstreamer-plugins-good-1.8.3-16.12.1.i586",
"product_id": "gstreamer-plugins-good-1.8.3-16.12.1.i586"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-doc-1.8.3-16.12.1.i586",
"product": {
"name": "gstreamer-plugins-good-doc-1.8.3-16.12.1.i586",
"product_id": "gstreamer-plugins-good-doc-1.8.3-16.12.1.i586"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-extra-1.8.3-16.12.1.i586",
"product": {
"name": "gstreamer-plugins-good-extra-1.8.3-16.12.1.i586",
"product_id": "gstreamer-plugins-good-extra-1.8.3-16.12.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"product": {
"name": "gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"product_id": "gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"product": {
"name": "gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"product_id": "gstreamer-plugins-good-1.8.3-16.12.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-doc-1.8.3-16.12.1.ppc64le",
"product": {
"name": "gstreamer-plugins-good-doc-1.8.3-16.12.1.ppc64le",
"product_id": "gstreamer-plugins-good-doc-1.8.3-16.12.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-extra-1.8.3-16.12.1.ppc64le",
"product": {
"name": "gstreamer-plugins-good-extra-1.8.3-16.12.1.ppc64le",
"product_id": "gstreamer-plugins-good-extra-1.8.3-16.12.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "gstreamer-plugins-good-1.8.3-16.12.1.s390",
"product": {
"name": "gstreamer-plugins-good-1.8.3-16.12.1.s390",
"product_id": "gstreamer-plugins-good-1.8.3-16.12.1.s390"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-doc-1.8.3-16.12.1.s390",
"product": {
"name": "gstreamer-plugins-good-doc-1.8.3-16.12.1.s390",
"product_id": "gstreamer-plugins-good-doc-1.8.3-16.12.1.s390"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-extra-1.8.3-16.12.1.s390",
"product": {
"name": "gstreamer-plugins-good-extra-1.8.3-16.12.1.s390",
"product_id": "gstreamer-plugins-good-extra-1.8.3-16.12.1.s390"
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"product": {
"name": "gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"product_id": "gstreamer-plugins-good-1.8.3-16.12.1.s390x"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-32bit-1.8.3-16.12.1.s390x",
"product": {
"name": "gstreamer-plugins-good-32bit-1.8.3-16.12.1.s390x",
"product_id": "gstreamer-plugins-good-32bit-1.8.3-16.12.1.s390x"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-doc-1.8.3-16.12.1.s390x",
"product": {
"name": "gstreamer-plugins-good-doc-1.8.3-16.12.1.s390x",
"product_id": "gstreamer-plugins-good-doc-1.8.3-16.12.1.s390x"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-extra-1.8.3-16.12.1.s390x",
"product": {
"name": "gstreamer-plugins-good-extra-1.8.3-16.12.1.s390x",
"product_id": "gstreamer-plugins-good-extra-1.8.3-16.12.1.s390x"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-extra-32bit-1.8.3-16.12.1.s390x",
"product": {
"name": "gstreamer-plugins-good-extra-32bit-1.8.3-16.12.1.s390x",
"product_id": "gstreamer-plugins-good-extra-32bit-1.8.3-16.12.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"product": {
"name": "gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"product_id": "gstreamer-plugins-good-1.8.3-16.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-32bit-1.8.3-16.12.1.x86_64",
"product": {
"name": "gstreamer-plugins-good-32bit-1.8.3-16.12.1.x86_64",
"product_id": "gstreamer-plugins-good-32bit-1.8.3-16.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-doc-1.8.3-16.12.1.x86_64",
"product": {
"name": "gstreamer-plugins-good-doc-1.8.3-16.12.1.x86_64",
"product_id": "gstreamer-plugins-good-doc-1.8.3-16.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-extra-1.8.3-16.12.1.x86_64",
"product": {
"name": "gstreamer-plugins-good-extra-1.8.3-16.12.1.x86_64",
"product_id": "gstreamer-plugins-good-extra-1.8.3-16.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-extra-32bit-1.8.3-16.12.1.x86_64",
"product": {
"name": "gstreamer-plugins-good-extra-32bit-1.8.3-16.12.1.x86_64",
"product_id": "gstreamer-plugins-good-extra-32bit-1.8.3-16.12.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss-extended-security:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-1.8.3-16.12.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64"
},
"product_reference": "gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-1.8.3-16.12.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le"
},
"product_reference": "gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-1.8.3-16.12.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x"
},
"product_reference": "gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-1.8.3-16.12.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64"
},
"product_reference": "gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
},
"product_reference": "gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-1.8.3-16.12.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64"
},
"product_reference": "gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
},
"product_reference": "gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-47537",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47537"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. The program attempts to reallocate the memory pointed to by stream-\u003esamples to accommodate stream-\u003en_samples + samples_count elements of type QtDemuxSample. The problem is that samples_count is read from the input file. And if this value is big enough, this can lead to an integer overflow during the addition. As a consequence, g_try_renew might allocate memory for a significantly smaller number of elements than intended. Following this, the program iterates through samples_count elements and attempts to write samples_count number of elements, potentially exceeding the actual allocated memory size and causing an OOB-write. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47537",
"url": "https://www.suse.com/security/cve/CVE-2024-47537"
},
{
"category": "external",
"summary": "SUSE Bug 1234414 for CVE-2024-47537",
"url": "https://bugzilla.suse.com/1234414"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-24T12:03:30Z",
"details": "important"
}
],
"title": "CVE-2024-47537"
},
{
"cve": "CVE-2024-47540",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47540"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An uninitialized stack variable vulnerability has been identified in the gst_matroska_demux_add_wvpk_header function within matroska-demux.c. When size \u003c 4, the program calls gst_buffer_unmap with an uninitialized map variable. Then, in the gst_memory_unmap function, the program will attempt to unmap the buffer using the uninitialized map variable, causing a function pointer hijack, as it will jump to mem-\u003eallocator-\u003emem_unmap_full or mem-\u003eallocator-\u003emem_unmap. This vulnerability could allow an attacker to hijack the execution flow, potentially leading to code execution. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47540",
"url": "https://www.suse.com/security/cve/CVE-2024-47540"
},
{
"category": "external",
"summary": "SUSE Bug 1234421 for CVE-2024-47540",
"url": "https://bugzilla.suse.com/1234421"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-24T12:03:30Z",
"details": "important"
}
],
"title": "CVE-2024-47540"
},
{
"cve": "CVE-2024-47543",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47543"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerability has been discovered in qtdemux_parse_container function within qtdemux.c. In the parent function qtdemux_parse_node, the value of length is not well checked. So, if length is big enough, it causes the pointer end to point beyond the boundaries of buffer. Subsequently, in the qtdemux_parse_container function, the while loop can trigger an OOB-read, accessing memory beyond the bounds of buf. This vulnerability can result in reading up to 4GB of process memory or potentially causing a segmentation fault (SEGV) when accessing invalid memory. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47543",
"url": "https://www.suse.com/security/cve/CVE-2024-47543"
},
{
"category": "external",
"summary": "SUSE Bug 1234462 for CVE-2024-47543",
"url": "https://bugzilla.suse.com/1234462"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-24T12:03:30Z",
"details": "moderate"
}
],
"title": "CVE-2024-47543"
},
{
"cve": "CVE-2024-47544",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47544"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. The function qtdemux_parse_sbgp in qtdemux.c is affected by a null dereference vulnerability. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47544",
"url": "https://www.suse.com/security/cve/CVE-2024-47544"
},
{
"category": "external",
"summary": "SUSE Bug 1234473 for CVE-2024-47544",
"url": "https://bugzilla.suse.com/1234473"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-24T12:03:30Z",
"details": "moderate"
}
],
"title": "CVE-2024-47544"
},
{
"cve": "CVE-2024-47545",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47545"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An integer underflow has been detected in qtdemux_parse_trak function within qtdemux.c. During the strf parsing case, the subtraction size -= 40 can lead to a negative integer overflow if it is less than 40. If this happens, the subsequent call to gst_buffer_fill will invoke memcpy with a large tocopy size, resulting in an OOB-read. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47545",
"url": "https://www.suse.com/security/cve/CVE-2024-47545"
},
{
"category": "external",
"summary": "SUSE Bug 1234476 for CVE-2024-47545",
"url": "https://bugzilla.suse.com/1234476"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-24T12:03:30Z",
"details": "moderate"
}
],
"title": "CVE-2024-47545"
},
{
"cve": "CVE-2024-47596",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47596"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An OOB-read has been discovered in the qtdemux_parse_svq3_stsd_data function within qtdemux.c. In the FOURCC_SMI_ case, seqh_size is read from the input file without proper validation. If seqh_size is greater than the remaining size of the data buffer, it can lead to an OOB-read in the following call to gst_buffer_fill, which internally uses memcpy. This vulnerability can result in reading up to 4GB of process memory or potentially causing a segmentation fault (SEGV) when accessing invalid memory. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47596",
"url": "https://www.suse.com/security/cve/CVE-2024-47596"
},
{
"category": "external",
"summary": "SUSE Bug 1234424 for CVE-2024-47596",
"url": "https://bugzilla.suse.com/1234424"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-24T12:03:30Z",
"details": "moderate"
}
],
"title": "CVE-2024-47596"
},
{
"cve": "CVE-2024-47597",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47597"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An OOB-read has been detected in the function qtdemux_parse_samples within qtdemux.c. This issue arises when the function qtdemux_parse_samples reads data beyond the boundaries of the stream-\u003estco buffer. The following code snippet shows the call to qt_atom_parser_get_offset_unchecked, which leads to the OOB-read when parsing the provided GHSL-2024-245_crash1.mp4 file. This issue may lead to read up to 8 bytes out-of-bounds. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47597",
"url": "https://www.suse.com/security/cve/CVE-2024-47597"
},
{
"category": "external",
"summary": "SUSE Bug 1234425 for CVE-2024-47597",
"url": "https://bugzilla.suse.com/1234425"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-24T12:03:30Z",
"details": "moderate"
}
],
"title": "CVE-2024-47597"
},
{
"cve": "CVE-2024-47599",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47599"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. A null pointer dereference vulnerability has been discovered in the gst_jpeg_dec_negotiate function in gstjpegdec.c. This function does not check for a NULL return value from gst_video_decoder_set_output_state. When this happens, dereferences of the outstate pointer will lead to a null pointer dereference. This vulnerability can result in a Denial of Service (DoS) by triggering a segmentation fault (SEGV). This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47599",
"url": "https://www.suse.com/security/cve/CVE-2024-47599"
},
{
"category": "external",
"summary": "SUSE Bug 1234427 for CVE-2024-47599",
"url": "https://bugzilla.suse.com/1234427"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-24T12:03:30Z",
"details": "moderate"
}
],
"title": "CVE-2024-47599"
},
{
"cve": "CVE-2024-47601",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47601"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. A null pointer dereference vulnerability has been discovered in the gst_matroska_demux_parse_blockgroup_or_simpleblock function within matroska-demux.c. This function does not properly check the validity of the GstBuffer *sub pointer before performing dereferences. As a result, null pointer dereferences may occur. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47601",
"url": "https://www.suse.com/security/cve/CVE-2024-47601"
},
{
"category": "external",
"summary": "SUSE Bug 1234428 for CVE-2024-47601",
"url": "https://bugzilla.suse.com/1234428"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-24T12:03:30Z",
"details": "moderate"
}
],
"title": "CVE-2024-47601"
},
{
"cve": "CVE-2024-47602",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47602"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. A null pointer dereference vulnerability has been discovered in the gst_matroska_demux_add_wvpk_header function within matroska-demux.c. This function does not properly check the validity of the stream-\u003ecodec_priv pointer in the following code. If stream-\u003ecodec_priv is NULL, the call to GST_READ_UINT16_LE will attempt to dereference a null pointer, leading to a crash of the application. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47602",
"url": "https://www.suse.com/security/cve/CVE-2024-47602"
},
{
"category": "external",
"summary": "SUSE Bug 1234432 for CVE-2024-47602",
"url": "https://bugzilla.suse.com/1234432"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-24T12:03:30Z",
"details": "moderate"
}
],
"title": "CVE-2024-47602"
},
{
"cve": "CVE-2024-47603",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47603"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. A null pointer dereference vulnerability has been discovered in the gst_matroska_demux_update_tracks function within matroska-demux.c. The vulnerability occurs when the gst_caps_is_equal function is called with invalid caps values. If this happen, then in the function gst_buffer_get_size the call to GST_BUFFER_MEM_PTR can return a null pointer. Attempting to dereference the size field of this null pointer results in a null pointer dereference. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47603",
"url": "https://www.suse.com/security/cve/CVE-2024-47603"
},
{
"category": "external",
"summary": "SUSE Bug 1234433 for CVE-2024-47603",
"url": "https://bugzilla.suse.com/1234433"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-24T12:03:30Z",
"details": "moderate"
}
],
"title": "CVE-2024-47603"
},
{
"cve": "CVE-2024-47606",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47606"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An integer underflow has been detected in the function qtdemux_parse_theora_extension within qtdemux.c. The vulnerability occurs due to an underflow of the gint size variable, which causes size to hold a large unintended value when cast to an unsigned integer. This 32-bit negative value is then cast to a 64-bit unsigned integer (0xfffffffffffffffa) in a subsequent call to gst_buffer_new_and_alloc. The function gst_buffer_new_allocate then attempts to allocate memory, eventually calling _sysmem_new_block. The function _sysmem_new_block adds alignment and header size to the (unsigned) size, causing the overflow of the \u0027slice_size\u0027 variable. As a result, only 0x89 bytes are allocated, despite the large input size. When the following memcpy call occurs in gst_buffer_fill, the data from the input file will overwrite the content of the GstMapInfo info structure. Finally, during the call to gst_memory_unmap, the overwritten memory may cause a function pointer hijack, as the mem-\u003eallocator-\u003emem_unmap_full function is called with a corrupted pointer. This function pointer overwrite could allow an attacker to alter the execution flow of the program, leading to arbitrary code execution. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47606",
"url": "https://www.suse.com/security/cve/CVE-2024-47606"
},
{
"category": "external",
"summary": "SUSE Bug 1234449 for CVE-2024-47606",
"url": "https://bugzilla.suse.com/1234449"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-24T12:03:30Z",
"details": "important"
}
],
"title": "CVE-2024-47606"
},
{
"cve": "CVE-2024-47613",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47613"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. A null pointer dereference vulnerability has been identified in `gst_gdk_pixbuf_dec_flush` within `gstgdkpixbufdec.c`. This function invokes `memcpy`, using `out_pix` as the destination address. `out_pix` is expected to point to the frame 0 from the frame structure, which is read from the input file. However, in certain situations, it can points to a NULL frame, causing the subsequent call to `memcpy` to attempt writing to the null address (0x00), leading to a null pointer dereference. This vulnerability can result in a Denial of Service (DoS) by triggering a segmentation fault (SEGV). This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47613",
"url": "https://www.suse.com/security/cve/CVE-2024-47613"
},
{
"category": "external",
"summary": "SUSE Bug 1234447 for CVE-2024-47613",
"url": "https://bugzilla.suse.com/1234447"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-24T12:03:30Z",
"details": "moderate"
}
],
"title": "CVE-2024-47613"
},
{
"cve": "CVE-2024-47774",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47774"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerability has been identified in the gst_avi_subtitle_parse_gab2_chunk function within gstavisubtitle.c. The function reads the name_length value directly from the input file without checking it properly. Then, the a condition, does not properly handle cases where name_length is greater than 0xFFFFFFFF - 17, causing an integer overflow. In such scenario, the function attempts to access memory beyond the buffer leading to an OOB-read. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47774",
"url": "https://www.suse.com/security/cve/CVE-2024-47774"
},
{
"category": "external",
"summary": "SUSE Bug 1234446 for CVE-2024-47774",
"url": "https://bugzilla.suse.com/1234446"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-24T12:03:30Z",
"details": "moderate"
}
],
"title": "CVE-2024-47774"
},
{
"cve": "CVE-2024-47775",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47775"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerability has been found in the parse_ds64 function within gstwavparse.c. The parse_ds64 function does not check that the buffer buf contains sufficient data before attempting to read from it, doing multiple GST_READ_UINT32_LE operations without performing boundary checks. This can lead to an OOB-read when buf is smaller than expected. This vulnerability allows reading beyond the bounds of the data buffer, potentially leading to a crash (denial of service) or the leak of sensitive data. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47775",
"url": "https://www.suse.com/security/cve/CVE-2024-47775"
},
{
"category": "external",
"summary": "SUSE Bug 1234434 for CVE-2024-47775",
"url": "https://bugzilla.suse.com/1234434"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-24T12:03:30Z",
"details": "moderate"
}
],
"title": "CVE-2024-47775"
},
{
"cve": "CVE-2024-47776",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47776"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An OOB-read has been discovered in gst_wavparse_cue_chunk within gstwavparse.c. The vulnerability happens due to a discrepancy between the size of the data buffer and the size value provided to the function. This mismatch causes the comparison if (size \u003c 4 + ncues * 24) to fail in some cases, allowing the subsequent loop to access beyond the bounds of the data buffer. The root cause of this discrepancy stems from a miscalculation when clipping the chunk size based on upstream data size. This vulnerability allows reading beyond the bounds of the data buffer, potentially leading to a crash (denial of service) or the leak of sensitive data. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47776",
"url": "https://www.suse.com/security/cve/CVE-2024-47776"
},
{
"category": "external",
"summary": "SUSE Bug 1234435 for CVE-2024-47776",
"url": "https://bugzilla.suse.com/1234435"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-24T12:03:30Z",
"details": "moderate"
}
],
"title": "CVE-2024-47776"
},
{
"cve": "CVE-2024-47777",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47777"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerability has been identified in the gst_wavparse_smpl_chunk function within gstwavparse.c. This function attempts to read 4 bytes from the data + 12 offset without checking if the size of the data buffer is sufficient. If the buffer is too small, the function reads beyond its bounds. This vulnerability may result in reading 4 bytes out of the boundaries of the data buffer. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47777",
"url": "https://www.suse.com/security/cve/CVE-2024-47777"
},
{
"category": "external",
"summary": "SUSE Bug 1234436 for CVE-2024-47777",
"url": "https://bugzilla.suse.com/1234436"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-24T12:03:30Z",
"details": "moderate"
}
],
"title": "CVE-2024-47777"
},
{
"cve": "CVE-2024-47778",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47778"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerability has been discovered in gst_wavparse_adtl_chunk within gstwavparse.c. This vulnerability arises due to insufficient validation of the size parameter, which can exceed the bounds of the data buffer. As a result, an OOB read occurs in the following while loop. This vulnerability can result in reading up to 4GB of process memory or potentially causing a segmentation fault (SEGV) when accessing invalid memory. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47778",
"url": "https://www.suse.com/security/cve/CVE-2024-47778"
},
{
"category": "external",
"summary": "SUSE Bug 1234439 for CVE-2024-47778",
"url": "https://bugzilla.suse.com/1234439"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-24T12:03:30Z",
"details": "moderate"
}
],
"title": "CVE-2024-47778"
},
{
"cve": "CVE-2024-47834",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47834"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An Use-After-Free read vulnerability has been discovered affecting the processing of CodecPrivate elements in Matroska streams. In the GST_MATROSKA_ID_CODECPRIVATE case within the gst_matroska_demux_parse_stream function, a data chunk is allocated using gst_ebml_read_binary. Later, the allocated memory is freed in the gst_matroska_track_free function, by the call to g_free (track-\u003ecodec_priv). Finally, the freed memory is accessed in the caps_serialize function through gst_value_serialize_buffer. The freed memory will be accessed in the gst_value_serialize_buffer function. This results in a UAF read vulnerability, as the function tries to process memory that has already been freed. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47834",
"url": "https://www.suse.com/security/cve/CVE-2024-47834"
},
{
"category": "external",
"summary": "SUSE Bug 1234440 for CVE-2024-47834",
"url": "https://bugzilla.suse.com/1234440"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-24T12:03:30Z",
"details": "moderate"
}
],
"title": "CVE-2024-47834"
}
]
}
SUSE-SU-2025:0067-1
Vulnerability from csaf_suse - Published: 2025-01-10 16:48 - Updated: 2025-01-10 16:48Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for gstreamer-plugins-good",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for gstreamer-plugins-good fixes the following issues:\n\n- CVE-2024-47530: Fixed an uninitialized stack memory in Matroska/WebM demuxer. (boo#1234421)\n- CVE-2024-47537: Fixed an out-of-bounds write in isomp4/qtdemux.c. (boo#1234414)\n- CVE-2024-47539: Fixed an out-of-bounds write in convert_to_s334_1a. (boo#1234417)\n- CVE-2024-47543: Fixed an out-of-bounds write in qtdemux_parse_container. (boo#1234462)\n- CVE-2024-47544: Fixed a NULL-pointer dereferences in MP4/MOV demuxer CENC handling. (boo#1234473)\n- CVE-2024-47545: Fixed an integer underflow in FOURCC_strf parsing leading to out-of-bounds read. (boo#1234476)\n- CVE-2024-47546: Fixed an integer underflow in extract_cc_from_data leading to out-of-bounds read. (boo#1234477)\n- CVE-2024-47596: Fixed an integer underflow in MP4/MOV demuxer that can lead to out-of-bounds reads. (boo#1234424)\n- CVE-2024-47597: Fixed an out-of-bounds reads in MP4/MOV demuxer sample table parser (boo#1234425)\n- CVE-2024-47598: Fixed MP4/MOV sample table parser out-of-bounds read. (boo#1234426)\n- CVE-2024-47599: Fixed insufficient error handling in JPEG decoder that can lead to NULL-pointer dereferences. (boo#1234427)\n- CVE-2024-47601: Fixed a NULL-pointer dereference in Matroska/WebM demuxer. (boo#1234428)\n- CVE-2024-47602: Fixed a NULL-pointer dereferences and out-of-bounds reads in Matroska/WebM demuxer. (boo#1234432)\n- CVE-2024-47603: Fixed a NULL-pointer dereference in Matroska/WebM demuxer. (boo#1234433)\n- CVE-2024-47606: Avoid integer overflow when allocating sysmem. (bsc#1234449)\n- CVE-2024-47606: Fixed an integer overflows in MP4/MOV demuxer and memory allocator that can lead to out-of-bounds writes. (boo#1234449)\n- CVE-2024-47613: Fixed a NULL-pointer dereference in gdk-pixbuf decoder. (boo#1234447)\n- CVE-2024-47774: Fixed an integer overflow in AVI subtitle parser that leads to out-of-bounds reads. (boo#1234446)\n- CVE-2024-47775: Fixed various out-of-bounds reads in WAV parser. (boo#1234434)\n- CVE-2024-47776: Fixed various out-of-bounds reads in WAV parser. (boo#1234435)\n- CVE-2024-47777: Fixed various out-of-bounds reads in WAV parser. (boo#1234436)\n- CVE-2024-47778: Fixed various out-of-bounds reads in WAV parser. (boo#1234439)\n- CVE-2024-47834: Fixed a use-after-free in the Matroska demuxer that can cause crashes for certain input files. (boo#1234440)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-67,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-67,SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-67,SUSE-SLE-Product-SLED-15-SP4-LTSS-2025-67,SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-67,SUSE-SLE-Product-SLES_SAP-15-SP4-2025-67,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-67,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-67",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_0067-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:0067-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20250067-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:0067-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020097.html"
},
{
"category": "self",
"summary": "SUSE Bug 1234414",
"url": "https://bugzilla.suse.com/1234414"
},
{
"category": "self",
"summary": "SUSE Bug 1234417",
"url": "https://bugzilla.suse.com/1234417"
},
{
"category": "self",
"summary": "SUSE Bug 1234421",
"url": "https://bugzilla.suse.com/1234421"
},
{
"category": "self",
"summary": "SUSE Bug 1234424",
"url": "https://bugzilla.suse.com/1234424"
},
{
"category": "self",
"summary": "SUSE Bug 1234425",
"url": "https://bugzilla.suse.com/1234425"
},
{
"category": "self",
"summary": "SUSE Bug 1234426",
"url": "https://bugzilla.suse.com/1234426"
},
{
"category": "self",
"summary": "SUSE Bug 1234427",
"url": "https://bugzilla.suse.com/1234427"
},
{
"category": "self",
"summary": "SUSE Bug 1234428",
"url": "https://bugzilla.suse.com/1234428"
},
{
"category": "self",
"summary": "SUSE Bug 1234432",
"url": "https://bugzilla.suse.com/1234432"
},
{
"category": "self",
"summary": "SUSE Bug 1234433",
"url": "https://bugzilla.suse.com/1234433"
},
{
"category": "self",
"summary": "SUSE Bug 1234434",
"url": "https://bugzilla.suse.com/1234434"
},
{
"category": "self",
"summary": "SUSE Bug 1234435",
"url": "https://bugzilla.suse.com/1234435"
},
{
"category": "self",
"summary": "SUSE Bug 1234436",
"url": "https://bugzilla.suse.com/1234436"
},
{
"category": "self",
"summary": "SUSE Bug 1234439",
"url": "https://bugzilla.suse.com/1234439"
},
{
"category": "self",
"summary": "SUSE Bug 1234440",
"url": "https://bugzilla.suse.com/1234440"
},
{
"category": "self",
"summary": "SUSE Bug 1234446",
"url": "https://bugzilla.suse.com/1234446"
},
{
"category": "self",
"summary": "SUSE Bug 1234447",
"url": "https://bugzilla.suse.com/1234447"
},
{
"category": "self",
"summary": "SUSE Bug 1234449",
"url": "https://bugzilla.suse.com/1234449"
},
{
"category": "self",
"summary": "SUSE Bug 1234462",
"url": "https://bugzilla.suse.com/1234462"
},
{
"category": "self",
"summary": "SUSE Bug 1234473",
"url": "https://bugzilla.suse.com/1234473"
},
{
"category": "self",
"summary": "SUSE Bug 1234476",
"url": "https://bugzilla.suse.com/1234476"
},
{
"category": "self",
"summary": "SUSE Bug 1234477",
"url": "https://bugzilla.suse.com/1234477"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47537 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47537/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47539 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47539/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47540 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47540/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47543 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47543/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47544 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47544/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47545 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47545/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47546 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47546/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47596 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47596/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47597 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47597/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47598 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47598/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47599 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47599/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47601 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47601/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47602 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47602/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47603 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47603/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47606 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47606/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47613 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47613/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47774 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47774/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47775 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47775/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47776 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47776/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47777 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47777/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47778 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47778/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47834 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47834/"
}
],
"title": "Security update for gstreamer-plugins-good",
"tracking": {
"current_release_date": "2025-01-10T16:48:42Z",
"generator": {
"date": "2025-01-10T16:48:42Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:0067-1",
"initial_release_date": "2025-01-10T16:48:42Z",
"revision_history": [
{
"date": "2025-01-10T16:48:42Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"product": {
"name": "gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"product_id": "gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-extra-1.20.1-150400.3.9.1.aarch64",
"product": {
"name": "gstreamer-plugins-good-extra-1.20.1-150400.3.9.1.aarch64",
"product_id": "gstreamer-plugins-good-extra-1.20.1-150400.3.9.1.aarch64"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-gtk-1.20.1-150400.3.9.1.aarch64",
"product": {
"name": "gstreamer-plugins-good-gtk-1.20.1-150400.3.9.1.aarch64",
"product_id": "gstreamer-plugins-good-gtk-1.20.1-150400.3.9.1.aarch64"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-jack-1.20.1-150400.3.9.1.aarch64",
"product": {
"name": "gstreamer-plugins-good-jack-1.20.1-150400.3.9.1.aarch64",
"product_id": "gstreamer-plugins-good-jack-1.20.1-150400.3.9.1.aarch64"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-qtqml-1.20.1-150400.3.9.1.aarch64",
"product": {
"name": "gstreamer-plugins-good-qtqml-1.20.1-150400.3.9.1.aarch64",
"product_id": "gstreamer-plugins-good-qtqml-1.20.1-150400.3.9.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "gstreamer-plugins-good-64bit-1.20.1-150400.3.9.1.aarch64_ilp32",
"product": {
"name": "gstreamer-plugins-good-64bit-1.20.1-150400.3.9.1.aarch64_ilp32",
"product_id": "gstreamer-plugins-good-64bit-1.20.1-150400.3.9.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-extra-64bit-1.20.1-150400.3.9.1.aarch64_ilp32",
"product": {
"name": "gstreamer-plugins-good-extra-64bit-1.20.1-150400.3.9.1.aarch64_ilp32",
"product_id": "gstreamer-plugins-good-extra-64bit-1.20.1-150400.3.9.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-jack-64bit-1.20.1-150400.3.9.1.aarch64_ilp32",
"product": {
"name": "gstreamer-plugins-good-jack-64bit-1.20.1-150400.3.9.1.aarch64_ilp32",
"product_id": "gstreamer-plugins-good-jack-64bit-1.20.1-150400.3.9.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "gstreamer-plugins-good-1.20.1-150400.3.9.1.i586",
"product": {
"name": "gstreamer-plugins-good-1.20.1-150400.3.9.1.i586",
"product_id": "gstreamer-plugins-good-1.20.1-150400.3.9.1.i586"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-extra-1.20.1-150400.3.9.1.i586",
"product": {
"name": "gstreamer-plugins-good-extra-1.20.1-150400.3.9.1.i586",
"product_id": "gstreamer-plugins-good-extra-1.20.1-150400.3.9.1.i586"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-gtk-1.20.1-150400.3.9.1.i586",
"product": {
"name": "gstreamer-plugins-good-gtk-1.20.1-150400.3.9.1.i586",
"product_id": "gstreamer-plugins-good-gtk-1.20.1-150400.3.9.1.i586"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-jack-1.20.1-150400.3.9.1.i586",
"product": {
"name": "gstreamer-plugins-good-jack-1.20.1-150400.3.9.1.i586",
"product_id": "gstreamer-plugins-good-jack-1.20.1-150400.3.9.1.i586"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-qtqml-1.20.1-150400.3.9.1.i586",
"product": {
"name": "gstreamer-plugins-good-qtqml-1.20.1-150400.3.9.1.i586",
"product_id": "gstreamer-plugins-good-qtqml-1.20.1-150400.3.9.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"product": {
"name": "gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"product_id": "gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"product": {
"name": "gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"product_id": "gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-extra-1.20.1-150400.3.9.1.ppc64le",
"product": {
"name": "gstreamer-plugins-good-extra-1.20.1-150400.3.9.1.ppc64le",
"product_id": "gstreamer-plugins-good-extra-1.20.1-150400.3.9.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-gtk-1.20.1-150400.3.9.1.ppc64le",
"product": {
"name": "gstreamer-plugins-good-gtk-1.20.1-150400.3.9.1.ppc64le",
"product_id": "gstreamer-plugins-good-gtk-1.20.1-150400.3.9.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-jack-1.20.1-150400.3.9.1.ppc64le",
"product": {
"name": "gstreamer-plugins-good-jack-1.20.1-150400.3.9.1.ppc64le",
"product_id": "gstreamer-plugins-good-jack-1.20.1-150400.3.9.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-qtqml-1.20.1-150400.3.9.1.ppc64le",
"product": {
"name": "gstreamer-plugins-good-qtqml-1.20.1-150400.3.9.1.ppc64le",
"product_id": "gstreamer-plugins-good-qtqml-1.20.1-150400.3.9.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"product": {
"name": "gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"product_id": "gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-extra-1.20.1-150400.3.9.1.s390x",
"product": {
"name": "gstreamer-plugins-good-extra-1.20.1-150400.3.9.1.s390x",
"product_id": "gstreamer-plugins-good-extra-1.20.1-150400.3.9.1.s390x"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-gtk-1.20.1-150400.3.9.1.s390x",
"product": {
"name": "gstreamer-plugins-good-gtk-1.20.1-150400.3.9.1.s390x",
"product_id": "gstreamer-plugins-good-gtk-1.20.1-150400.3.9.1.s390x"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-jack-1.20.1-150400.3.9.1.s390x",
"product": {
"name": "gstreamer-plugins-good-jack-1.20.1-150400.3.9.1.s390x",
"product_id": "gstreamer-plugins-good-jack-1.20.1-150400.3.9.1.s390x"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-qtqml-1.20.1-150400.3.9.1.s390x",
"product": {
"name": "gstreamer-plugins-good-qtqml-1.20.1-150400.3.9.1.s390x",
"product_id": "gstreamer-plugins-good-qtqml-1.20.1-150400.3.9.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"product": {
"name": "gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"product_id": "gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-32bit-1.20.1-150400.3.9.1.x86_64",
"product": {
"name": "gstreamer-plugins-good-32bit-1.20.1-150400.3.9.1.x86_64",
"product_id": "gstreamer-plugins-good-32bit-1.20.1-150400.3.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-extra-1.20.1-150400.3.9.1.x86_64",
"product": {
"name": "gstreamer-plugins-good-extra-1.20.1-150400.3.9.1.x86_64",
"product_id": "gstreamer-plugins-good-extra-1.20.1-150400.3.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-extra-32bit-1.20.1-150400.3.9.1.x86_64",
"product": {
"name": "gstreamer-plugins-good-extra-32bit-1.20.1-150400.3.9.1.x86_64",
"product_id": "gstreamer-plugins-good-extra-32bit-1.20.1-150400.3.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-gtk-1.20.1-150400.3.9.1.x86_64",
"product": {
"name": "gstreamer-plugins-good-gtk-1.20.1-150400.3.9.1.x86_64",
"product_id": "gstreamer-plugins-good-gtk-1.20.1-150400.3.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-jack-1.20.1-150400.3.9.1.x86_64",
"product": {
"name": "gstreamer-plugins-good-jack-1.20.1-150400.3.9.1.x86_64",
"product_id": "gstreamer-plugins-good-jack-1.20.1-150400.3.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-jack-32bit-1.20.1-150400.3.9.1.x86_64",
"product": {
"name": "gstreamer-plugins-good-jack-32bit-1.20.1-150400.3.9.1.x86_64",
"product_id": "gstreamer-plugins-good-jack-32bit-1.20.1-150400.3.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-qtqml-1.20.1-150400.3.9.1.x86_64",
"product": {
"name": "gstreamer-plugins-good-qtqml-1.20.1-150400.3.9.1.x86_64",
"product_id": "gstreamer-plugins-good-qtqml-1.20.1-150400.3.9.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Proxy 4.3",
"product": {
"name": "SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-proxy:4.3"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Server 4.3",
"product": {
"name": "SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-server:4.3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64"
},
"product_reference": "gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64"
},
"product_reference": "gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch"
},
"product_reference": "gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64"
},
"product_reference": "gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64"
},
"product_reference": "gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch"
},
"product_reference": "gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64"
},
"product_reference": "gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le"
},
"product_reference": "gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x"
},
"product_reference": "gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64"
},
"product_reference": "gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch"
},
"product_reference": "gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le"
},
"product_reference": "gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64"
},
"product_reference": "gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch"
},
"product_reference": "gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64 as component of SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64"
},
"product_reference": "gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch as component of SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch"
},
"product_reference": "gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"relates_to_product_reference": "SUSE Manager Proxy 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le"
},
"product_reference": "gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x"
},
"product_reference": "gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64 as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64"
},
"product_reference": "gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch"
},
"product_reference": "gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"relates_to_product_reference": "SUSE Manager Server 4.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-47537",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47537"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. The program attempts to reallocate the memory pointed to by stream-\u003esamples to accommodate stream-\u003en_samples + samples_count elements of type QtDemuxSample. The problem is that samples_count is read from the input file. And if this value is big enough, this can lead to an integer overflow during the addition. As a consequence, g_try_renew might allocate memory for a significantly smaller number of elements than intended. Following this, the program iterates through samples_count elements and attempts to write samples_count number of elements, potentially exceeding the actual allocated memory size and causing an OOB-write. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Server 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47537",
"url": "https://www.suse.com/security/cve/CVE-2024-47537"
},
{
"category": "external",
"summary": "SUSE Bug 1234414 for CVE-2024-47537",
"url": "https://bugzilla.suse.com/1234414"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Server 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Server 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-10T16:48:42Z",
"details": "important"
}
],
"title": "CVE-2024-47537"
},
{
"cve": "CVE-2024-47539",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47539"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An out-of-bounds write vulnerability was identified in the convert_to_s334_1a function in isomp4/qtdemux.c. The vulnerability arises due to a discrepancy between the size of memory allocated to the storage array and the loop condition i * 2 \u003c ccpair_size. Specifically, when ccpair_size is even, the allocated size in storage does not match the loop\u0027s expected bounds, resulting in an out-of-bounds write. This bug allows for the overwriting of up to 3 bytes beyond the allocated bounds of the storage array. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Server 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47539",
"url": "https://www.suse.com/security/cve/CVE-2024-47539"
},
{
"category": "external",
"summary": "SUSE Bug 1234417 for CVE-2024-47539",
"url": "https://bugzilla.suse.com/1234417"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Server 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Server 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-10T16:48:42Z",
"details": "important"
}
],
"title": "CVE-2024-47539"
},
{
"cve": "CVE-2024-47540",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47540"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An uninitialized stack variable vulnerability has been identified in the gst_matroska_demux_add_wvpk_header function within matroska-demux.c. When size \u003c 4, the program calls gst_buffer_unmap with an uninitialized map variable. Then, in the gst_memory_unmap function, the program will attempt to unmap the buffer using the uninitialized map variable, causing a function pointer hijack, as it will jump to mem-\u003eallocator-\u003emem_unmap_full or mem-\u003eallocator-\u003emem_unmap. This vulnerability could allow an attacker to hijack the execution flow, potentially leading to code execution. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Server 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47540",
"url": "https://www.suse.com/security/cve/CVE-2024-47540"
},
{
"category": "external",
"summary": "SUSE Bug 1234421 for CVE-2024-47540",
"url": "https://bugzilla.suse.com/1234421"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Server 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Server 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-10T16:48:42Z",
"details": "important"
}
],
"title": "CVE-2024-47540"
},
{
"cve": "CVE-2024-47543",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47543"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerability has been discovered in qtdemux_parse_container function within qtdemux.c. In the parent function qtdemux_parse_node, the value of length is not well checked. So, if length is big enough, it causes the pointer end to point beyond the boundaries of buffer. Subsequently, in the qtdemux_parse_container function, the while loop can trigger an OOB-read, accessing memory beyond the bounds of buf. This vulnerability can result in reading up to 4GB of process memory or potentially causing a segmentation fault (SEGV) when accessing invalid memory. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Server 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47543",
"url": "https://www.suse.com/security/cve/CVE-2024-47543"
},
{
"category": "external",
"summary": "SUSE Bug 1234462 for CVE-2024-47543",
"url": "https://bugzilla.suse.com/1234462"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Server 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Server 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-10T16:48:42Z",
"details": "moderate"
}
],
"title": "CVE-2024-47543"
},
{
"cve": "CVE-2024-47544",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47544"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. The function qtdemux_parse_sbgp in qtdemux.c is affected by a null dereference vulnerability. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Server 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47544",
"url": "https://www.suse.com/security/cve/CVE-2024-47544"
},
{
"category": "external",
"summary": "SUSE Bug 1234473 for CVE-2024-47544",
"url": "https://bugzilla.suse.com/1234473"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Server 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Server 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-10T16:48:42Z",
"details": "moderate"
}
],
"title": "CVE-2024-47544"
},
{
"cve": "CVE-2024-47545",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47545"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An integer underflow has been detected in qtdemux_parse_trak function within qtdemux.c. During the strf parsing case, the subtraction size -= 40 can lead to a negative integer overflow if it is less than 40. If this happens, the subsequent call to gst_buffer_fill will invoke memcpy with a large tocopy size, resulting in an OOB-read. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Server 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47545",
"url": "https://www.suse.com/security/cve/CVE-2024-47545"
},
{
"category": "external",
"summary": "SUSE Bug 1234476 for CVE-2024-47545",
"url": "https://bugzilla.suse.com/1234476"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Server 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Server 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-10T16:48:42Z",
"details": "moderate"
}
],
"title": "CVE-2024-47545"
},
{
"cve": "CVE-2024-47546",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47546"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An integer underflow has been detected in extract_cc_from_data function within qtdemux.c. In the FOURCC_c708 case, the subtraction atom_length - 8 may result in an underflow if atom_length is less than 8. When that subtraction underflows, *cclen ends up being a large number, and then cclen is passed to g_memdup2 leading to an out-of-bounds (OOB) read. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Server 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47546",
"url": "https://www.suse.com/security/cve/CVE-2024-47546"
},
{
"category": "external",
"summary": "SUSE Bug 1234477 for CVE-2024-47546",
"url": "https://bugzilla.suse.com/1234477"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Server 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Server 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-10T16:48:42Z",
"details": "moderate"
}
],
"title": "CVE-2024-47546"
},
{
"cve": "CVE-2024-47596",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47596"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An OOB-read has been discovered in the qtdemux_parse_svq3_stsd_data function within qtdemux.c. In the FOURCC_SMI_ case, seqh_size is read from the input file without proper validation. If seqh_size is greater than the remaining size of the data buffer, it can lead to an OOB-read in the following call to gst_buffer_fill, which internally uses memcpy. This vulnerability can result in reading up to 4GB of process memory or potentially causing a segmentation fault (SEGV) when accessing invalid memory. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Server 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47596",
"url": "https://www.suse.com/security/cve/CVE-2024-47596"
},
{
"category": "external",
"summary": "SUSE Bug 1234424 for CVE-2024-47596",
"url": "https://bugzilla.suse.com/1234424"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Server 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Server 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-10T16:48:42Z",
"details": "moderate"
}
],
"title": "CVE-2024-47596"
},
{
"cve": "CVE-2024-47597",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47597"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An OOB-read has been detected in the function qtdemux_parse_samples within qtdemux.c. This issue arises when the function qtdemux_parse_samples reads data beyond the boundaries of the stream-\u003estco buffer. The following code snippet shows the call to qt_atom_parser_get_offset_unchecked, which leads to the OOB-read when parsing the provided GHSL-2024-245_crash1.mp4 file. This issue may lead to read up to 8 bytes out-of-bounds. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Server 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47597",
"url": "https://www.suse.com/security/cve/CVE-2024-47597"
},
{
"category": "external",
"summary": "SUSE Bug 1234425 for CVE-2024-47597",
"url": "https://bugzilla.suse.com/1234425"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Server 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Server 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-10T16:48:42Z",
"details": "moderate"
}
],
"title": "CVE-2024-47597"
},
{
"cve": "CVE-2024-47598",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47598"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerability has been discovered in the qtdemux_merge_sample_table function within qtdemux.c. The problem is that the size of the stts buffer isn\u0027t properly checked before reading stts_duration, allowing the program to read 4 bytes beyond the boundaries of stts-\u003edata. This vulnerability reads up to 4 bytes past the allocated bounds of the stts array. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Server 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47598",
"url": "https://www.suse.com/security/cve/CVE-2024-47598"
},
{
"category": "external",
"summary": "SUSE Bug 1234426 for CVE-2024-47598",
"url": "https://bugzilla.suse.com/1234426"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Server 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Server 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-10T16:48:42Z",
"details": "moderate"
}
],
"title": "CVE-2024-47598"
},
{
"cve": "CVE-2024-47599",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47599"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. A null pointer dereference vulnerability has been discovered in the gst_jpeg_dec_negotiate function in gstjpegdec.c. This function does not check for a NULL return value from gst_video_decoder_set_output_state. When this happens, dereferences of the outstate pointer will lead to a null pointer dereference. This vulnerability can result in a Denial of Service (DoS) by triggering a segmentation fault (SEGV). This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Server 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47599",
"url": "https://www.suse.com/security/cve/CVE-2024-47599"
},
{
"category": "external",
"summary": "SUSE Bug 1234427 for CVE-2024-47599",
"url": "https://bugzilla.suse.com/1234427"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Server 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Server 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-10T16:48:42Z",
"details": "moderate"
}
],
"title": "CVE-2024-47599"
},
{
"cve": "CVE-2024-47601",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47601"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. A null pointer dereference vulnerability has been discovered in the gst_matroska_demux_parse_blockgroup_or_simpleblock function within matroska-demux.c. This function does not properly check the validity of the GstBuffer *sub pointer before performing dereferences. As a result, null pointer dereferences may occur. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Server 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47601",
"url": "https://www.suse.com/security/cve/CVE-2024-47601"
},
{
"category": "external",
"summary": "SUSE Bug 1234428 for CVE-2024-47601",
"url": "https://bugzilla.suse.com/1234428"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Server 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Server 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-10T16:48:42Z",
"details": "moderate"
}
],
"title": "CVE-2024-47601"
},
{
"cve": "CVE-2024-47602",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47602"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. A null pointer dereference vulnerability has been discovered in the gst_matroska_demux_add_wvpk_header function within matroska-demux.c. This function does not properly check the validity of the stream-\u003ecodec_priv pointer in the following code. If stream-\u003ecodec_priv is NULL, the call to GST_READ_UINT16_LE will attempt to dereference a null pointer, leading to a crash of the application. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Server 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47602",
"url": "https://www.suse.com/security/cve/CVE-2024-47602"
},
{
"category": "external",
"summary": "SUSE Bug 1234432 for CVE-2024-47602",
"url": "https://bugzilla.suse.com/1234432"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Server 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Server 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-10T16:48:42Z",
"details": "moderate"
}
],
"title": "CVE-2024-47602"
},
{
"cve": "CVE-2024-47603",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47603"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. A null pointer dereference vulnerability has been discovered in the gst_matroska_demux_update_tracks function within matroska-demux.c. The vulnerability occurs when the gst_caps_is_equal function is called with invalid caps values. If this happen, then in the function gst_buffer_get_size the call to GST_BUFFER_MEM_PTR can return a null pointer. Attempting to dereference the size field of this null pointer results in a null pointer dereference. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Server 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47603",
"url": "https://www.suse.com/security/cve/CVE-2024-47603"
},
{
"category": "external",
"summary": "SUSE Bug 1234433 for CVE-2024-47603",
"url": "https://bugzilla.suse.com/1234433"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Server 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Server 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-10T16:48:42Z",
"details": "moderate"
}
],
"title": "CVE-2024-47603"
},
{
"cve": "CVE-2024-47606",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47606"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An integer underflow has been detected in the function qtdemux_parse_theora_extension within qtdemux.c. The vulnerability occurs due to an underflow of the gint size variable, which causes size to hold a large unintended value when cast to an unsigned integer. This 32-bit negative value is then cast to a 64-bit unsigned integer (0xfffffffffffffffa) in a subsequent call to gst_buffer_new_and_alloc. The function gst_buffer_new_allocate then attempts to allocate memory, eventually calling _sysmem_new_block. The function _sysmem_new_block adds alignment and header size to the (unsigned) size, causing the overflow of the \u0027slice_size\u0027 variable. As a result, only 0x89 bytes are allocated, despite the large input size. When the following memcpy call occurs in gst_buffer_fill, the data from the input file will overwrite the content of the GstMapInfo info structure. Finally, during the call to gst_memory_unmap, the overwritten memory may cause a function pointer hijack, as the mem-\u003eallocator-\u003emem_unmap_full function is called with a corrupted pointer. This function pointer overwrite could allow an attacker to alter the execution flow of the program, leading to arbitrary code execution. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Server 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47606",
"url": "https://www.suse.com/security/cve/CVE-2024-47606"
},
{
"category": "external",
"summary": "SUSE Bug 1234449 for CVE-2024-47606",
"url": "https://bugzilla.suse.com/1234449"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Server 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Server 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-10T16:48:42Z",
"details": "important"
}
],
"title": "CVE-2024-47606"
},
{
"cve": "CVE-2024-47613",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47613"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. A null pointer dereference vulnerability has been identified in `gst_gdk_pixbuf_dec_flush` within `gstgdkpixbufdec.c`. This function invokes `memcpy`, using `out_pix` as the destination address. `out_pix` is expected to point to the frame 0 from the frame structure, which is read from the input file. However, in certain situations, it can points to a NULL frame, causing the subsequent call to `memcpy` to attempt writing to the null address (0x00), leading to a null pointer dereference. This vulnerability can result in a Denial of Service (DoS) by triggering a segmentation fault (SEGV). This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Server 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47613",
"url": "https://www.suse.com/security/cve/CVE-2024-47613"
},
{
"category": "external",
"summary": "SUSE Bug 1234447 for CVE-2024-47613",
"url": "https://bugzilla.suse.com/1234447"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Server 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Server 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-10T16:48:42Z",
"details": "moderate"
}
],
"title": "CVE-2024-47613"
},
{
"cve": "CVE-2024-47774",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47774"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerability has been identified in the gst_avi_subtitle_parse_gab2_chunk function within gstavisubtitle.c. The function reads the name_length value directly from the input file without checking it properly. Then, the a condition, does not properly handle cases where name_length is greater than 0xFFFFFFFF - 17, causing an integer overflow. In such scenario, the function attempts to access memory beyond the buffer leading to an OOB-read. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Server 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47774",
"url": "https://www.suse.com/security/cve/CVE-2024-47774"
},
{
"category": "external",
"summary": "SUSE Bug 1234446 for CVE-2024-47774",
"url": "https://bugzilla.suse.com/1234446"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Server 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Server 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-10T16:48:42Z",
"details": "moderate"
}
],
"title": "CVE-2024-47774"
},
{
"cve": "CVE-2024-47775",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47775"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerability has been found in the parse_ds64 function within gstwavparse.c. The parse_ds64 function does not check that the buffer buf contains sufficient data before attempting to read from it, doing multiple GST_READ_UINT32_LE operations without performing boundary checks. This can lead to an OOB-read when buf is smaller than expected. This vulnerability allows reading beyond the bounds of the data buffer, potentially leading to a crash (denial of service) or the leak of sensitive data. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Server 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47775",
"url": "https://www.suse.com/security/cve/CVE-2024-47775"
},
{
"category": "external",
"summary": "SUSE Bug 1234434 for CVE-2024-47775",
"url": "https://bugzilla.suse.com/1234434"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Server 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Server 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-10T16:48:42Z",
"details": "moderate"
}
],
"title": "CVE-2024-47775"
},
{
"cve": "CVE-2024-47776",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47776"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An OOB-read has been discovered in gst_wavparse_cue_chunk within gstwavparse.c. The vulnerability happens due to a discrepancy between the size of the data buffer and the size value provided to the function. This mismatch causes the comparison if (size \u003c 4 + ncues * 24) to fail in some cases, allowing the subsequent loop to access beyond the bounds of the data buffer. The root cause of this discrepancy stems from a miscalculation when clipping the chunk size based on upstream data size. This vulnerability allows reading beyond the bounds of the data buffer, potentially leading to a crash (denial of service) or the leak of sensitive data. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Server 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47776",
"url": "https://www.suse.com/security/cve/CVE-2024-47776"
},
{
"category": "external",
"summary": "SUSE Bug 1234435 for CVE-2024-47776",
"url": "https://bugzilla.suse.com/1234435"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Server 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Server 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-10T16:48:42Z",
"details": "moderate"
}
],
"title": "CVE-2024-47776"
},
{
"cve": "CVE-2024-47777",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47777"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerability has been identified in the gst_wavparse_smpl_chunk function within gstwavparse.c. This function attempts to read 4 bytes from the data + 12 offset without checking if the size of the data buffer is sufficient. If the buffer is too small, the function reads beyond its bounds. This vulnerability may result in reading 4 bytes out of the boundaries of the data buffer. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Server 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47777",
"url": "https://www.suse.com/security/cve/CVE-2024-47777"
},
{
"category": "external",
"summary": "SUSE Bug 1234436 for CVE-2024-47777",
"url": "https://bugzilla.suse.com/1234436"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Server 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Server 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-10T16:48:42Z",
"details": "moderate"
}
],
"title": "CVE-2024-47777"
},
{
"cve": "CVE-2024-47778",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47778"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerability has been discovered in gst_wavparse_adtl_chunk within gstwavparse.c. This vulnerability arises due to insufficient validation of the size parameter, which can exceed the bounds of the data buffer. As a result, an OOB read occurs in the following while loop. This vulnerability can result in reading up to 4GB of process memory or potentially causing a segmentation fault (SEGV) when accessing invalid memory. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Server 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47778",
"url": "https://www.suse.com/security/cve/CVE-2024-47778"
},
{
"category": "external",
"summary": "SUSE Bug 1234439 for CVE-2024-47778",
"url": "https://bugzilla.suse.com/1234439"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Server 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Server 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-10T16:48:42Z",
"details": "moderate"
}
],
"title": "CVE-2024-47778"
},
{
"cve": "CVE-2024-47834",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47834"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An Use-After-Free read vulnerability has been discovered affecting the processing of CodecPrivate elements in Matroska streams. In the GST_MATROSKA_ID_CODECPRIVATE case within the gst_matroska_demux_parse_stream function, a data chunk is allocated using gst_ebml_read_binary. Later, the allocated memory is freed in the gst_matroska_track_free function, by the call to g_free (track-\u003ecodec_priv). Finally, the freed memory is accessed in the caps_serialize function through gst_value_serialize_buffer. The freed memory will be accessed in the gst_value_serialize_buffer function. This results in a UAF read vulnerability, as the function tries to process memory that has already been freed. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Server 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47834",
"url": "https://www.suse.com/security/cve/CVE-2024-47834"
},
{
"category": "external",
"summary": "SUSE Bug 1234440 for CVE-2024-47834",
"url": "https://bugzilla.suse.com/1234440"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Server 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Proxy 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.ppc64le",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.s390x",
"SUSE Manager Server 4.3:gstreamer-plugins-good-1.20.1-150400.3.9.1.x86_64",
"SUSE Manager Server 4.3:gstreamer-plugins-good-lang-1.20.1-150400.3.9.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-10T16:48:42Z",
"details": "moderate"
}
],
"title": "CVE-2024-47834"
}
]
}
SUSE-SU-2025:0064-1
Vulnerability from csaf_suse - Published: 2025-01-10 13:48 - Updated: 2025-01-10 13:48Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for gstreamer-plugins-good",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for gstreamer-plugins-good fixes the following issues:\n\n- CVE-2024-47530: Fixed an uninitialized stack memory in Matroska/WebM demuxer. (boo#1234421)\n- CVE-2024-47537: Fixed an out-of-bounds write in isomp4/qtdemux.c. (boo#1234414)\n- CVE-2024-47539: Fixed an out-of-bounds write in convert_to_s334_1a. (boo#1234417)\n- CVE-2024-47543: Fixed an out-of-bounds write in qtdemux_parse_container. (boo#1234462)\n- CVE-2024-47544: Fixed a NULL-pointer dereferences in MP4/MOV demuxer CENC handling. (boo#1234473)\n- CVE-2024-47545: Fixed an integer underflow in FOURCC_strf parsing leading to out-of-bounds read. (boo#1234476)\n- CVE-2024-47546: Fixed an integer underflow in extract_cc_from_data leading to out-of-bounds read. (boo#1234477)\n- CVE-2024-47596: Fixed an integer underflow in MP4/MOV demuxer that can lead to out-of-bounds reads. (boo#1234424)\n- CVE-2024-47597: Fixed an out-of-bounds reads in MP4/MOV demuxer sample table parser (boo#1234425)\n- CVE-2024-47598: Fixed MP4/MOV sample table parser out-of-bounds read. (boo#1234426)\n- CVE-2024-47599: Fixed insufficient error handling in JPEG decoder that can lead to NULL-pointer dereferences. (boo#1234427)\n- CVE-2024-47601: Fixed a NULL-pointer dereference in Matroska/WebM demuxer. (boo#1234428)\n- CVE-2024-47602: Fixed a NULL-pointer dereferences and out-of-bounds reads in Matroska/WebM demuxer. (boo#1234432)\n- CVE-2024-47603: Fixed a NULL-pointer dereference in Matroska/WebM demuxer. (boo#1234433)\n- CVE-2024-47606: Avoid integer overflow when allocating sysmem. (bsc#1234449)\n- CVE-2024-47606: Fixed an integer overflows in MP4/MOV demuxer and memory allocator that can lead to out-of-bounds writes. (boo#1234449)\n- CVE-2024-47613: Fixed a NULL-pointer dereference in gdk-pixbuf decoder. (boo#1234447)\n- CVE-2024-47774: Fixed an integer overflow in AVI subtitle parser that leads to out-of-bounds reads. (boo#1234446)\n- CVE-2024-47775: Fixed various out-of-bounds reads in WAV parser. (boo#1234434)\n- CVE-2024-47776: Fixed various out-of-bounds reads in WAV parser. (boo#1234435)\n- CVE-2024-47777: Fixed various out-of-bounds reads in WAV parser. (boo#1234436)\n- CVE-2024-47778: Fixed various out-of-bounds reads in WAV parser. (boo#1234439)\n- CVE-2024-47834: Fixed a use-after-free in the Matroska demuxer that can cause crashes for certain input files. (boo#1234440)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-64,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-64,SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-64,SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-64,SUSE-SLE-Product-SLES_SAP-15-SP5-2025-64",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_0064-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:0064-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20250064-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:0064-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020090.html"
},
{
"category": "self",
"summary": "SUSE Bug 1234414",
"url": "https://bugzilla.suse.com/1234414"
},
{
"category": "self",
"summary": "SUSE Bug 1234417",
"url": "https://bugzilla.suse.com/1234417"
},
{
"category": "self",
"summary": "SUSE Bug 1234421",
"url": "https://bugzilla.suse.com/1234421"
},
{
"category": "self",
"summary": "SUSE Bug 1234424",
"url": "https://bugzilla.suse.com/1234424"
},
{
"category": "self",
"summary": "SUSE Bug 1234425",
"url": "https://bugzilla.suse.com/1234425"
},
{
"category": "self",
"summary": "SUSE Bug 1234426",
"url": "https://bugzilla.suse.com/1234426"
},
{
"category": "self",
"summary": "SUSE Bug 1234427",
"url": "https://bugzilla.suse.com/1234427"
},
{
"category": "self",
"summary": "SUSE Bug 1234428",
"url": "https://bugzilla.suse.com/1234428"
},
{
"category": "self",
"summary": "SUSE Bug 1234432",
"url": "https://bugzilla.suse.com/1234432"
},
{
"category": "self",
"summary": "SUSE Bug 1234433",
"url": "https://bugzilla.suse.com/1234433"
},
{
"category": "self",
"summary": "SUSE Bug 1234434",
"url": "https://bugzilla.suse.com/1234434"
},
{
"category": "self",
"summary": "SUSE Bug 1234435",
"url": "https://bugzilla.suse.com/1234435"
},
{
"category": "self",
"summary": "SUSE Bug 1234436",
"url": "https://bugzilla.suse.com/1234436"
},
{
"category": "self",
"summary": "SUSE Bug 1234439",
"url": "https://bugzilla.suse.com/1234439"
},
{
"category": "self",
"summary": "SUSE Bug 1234440",
"url": "https://bugzilla.suse.com/1234440"
},
{
"category": "self",
"summary": "SUSE Bug 1234446",
"url": "https://bugzilla.suse.com/1234446"
},
{
"category": "self",
"summary": "SUSE Bug 1234447",
"url": "https://bugzilla.suse.com/1234447"
},
{
"category": "self",
"summary": "SUSE Bug 1234449",
"url": "https://bugzilla.suse.com/1234449"
},
{
"category": "self",
"summary": "SUSE Bug 1234462",
"url": "https://bugzilla.suse.com/1234462"
},
{
"category": "self",
"summary": "SUSE Bug 1234473",
"url": "https://bugzilla.suse.com/1234473"
},
{
"category": "self",
"summary": "SUSE Bug 1234476",
"url": "https://bugzilla.suse.com/1234476"
},
{
"category": "self",
"summary": "SUSE Bug 1234477",
"url": "https://bugzilla.suse.com/1234477"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47537 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47537/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47539 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47539/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47540 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47540/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47543 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47543/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47544 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47544/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47545 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47545/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47546 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47546/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47596 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47596/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47597 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47597/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47598 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47598/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47599 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47599/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47601 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47601/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47602 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47602/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47603 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47603/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47606 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47606/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47613 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47613/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47774 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47774/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47775 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47775/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47776 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47776/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47777 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47777/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47778 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47778/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47834 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47834/"
}
],
"title": "Security update for gstreamer-plugins-good",
"tracking": {
"current_release_date": "2025-01-10T13:48:33Z",
"generator": {
"date": "2025-01-10T13:48:33Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:0064-1",
"initial_release_date": "2025-01-10T13:48:33Z",
"revision_history": [
{
"date": "2025-01-10T13:48:33Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"product": {
"name": "gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"product_id": "gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-extra-1.22.0-150500.4.6.1.aarch64",
"product": {
"name": "gstreamer-plugins-good-extra-1.22.0-150500.4.6.1.aarch64",
"product_id": "gstreamer-plugins-good-extra-1.22.0-150500.4.6.1.aarch64"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-gtk-1.22.0-150500.4.6.1.aarch64",
"product": {
"name": "gstreamer-plugins-good-gtk-1.22.0-150500.4.6.1.aarch64",
"product_id": "gstreamer-plugins-good-gtk-1.22.0-150500.4.6.1.aarch64"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-jack-1.22.0-150500.4.6.1.aarch64",
"product": {
"name": "gstreamer-plugins-good-jack-1.22.0-150500.4.6.1.aarch64",
"product_id": "gstreamer-plugins-good-jack-1.22.0-150500.4.6.1.aarch64"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-qtqml-1.22.0-150500.4.6.1.aarch64",
"product": {
"name": "gstreamer-plugins-good-qtqml-1.22.0-150500.4.6.1.aarch64",
"product_id": "gstreamer-plugins-good-qtqml-1.22.0-150500.4.6.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "gstreamer-plugins-good-64bit-1.22.0-150500.4.6.1.aarch64_ilp32",
"product": {
"name": "gstreamer-plugins-good-64bit-1.22.0-150500.4.6.1.aarch64_ilp32",
"product_id": "gstreamer-plugins-good-64bit-1.22.0-150500.4.6.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-extra-64bit-1.22.0-150500.4.6.1.aarch64_ilp32",
"product": {
"name": "gstreamer-plugins-good-extra-64bit-1.22.0-150500.4.6.1.aarch64_ilp32",
"product_id": "gstreamer-plugins-good-extra-64bit-1.22.0-150500.4.6.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-jack-64bit-1.22.0-150500.4.6.1.aarch64_ilp32",
"product": {
"name": "gstreamer-plugins-good-jack-64bit-1.22.0-150500.4.6.1.aarch64_ilp32",
"product_id": "gstreamer-plugins-good-jack-64bit-1.22.0-150500.4.6.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "gstreamer-plugins-good-1.22.0-150500.4.6.1.i586",
"product": {
"name": "gstreamer-plugins-good-1.22.0-150500.4.6.1.i586",
"product_id": "gstreamer-plugins-good-1.22.0-150500.4.6.1.i586"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-extra-1.22.0-150500.4.6.1.i586",
"product": {
"name": "gstreamer-plugins-good-extra-1.22.0-150500.4.6.1.i586",
"product_id": "gstreamer-plugins-good-extra-1.22.0-150500.4.6.1.i586"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-gtk-1.22.0-150500.4.6.1.i586",
"product": {
"name": "gstreamer-plugins-good-gtk-1.22.0-150500.4.6.1.i586",
"product_id": "gstreamer-plugins-good-gtk-1.22.0-150500.4.6.1.i586"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-jack-1.22.0-150500.4.6.1.i586",
"product": {
"name": "gstreamer-plugins-good-jack-1.22.0-150500.4.6.1.i586",
"product_id": "gstreamer-plugins-good-jack-1.22.0-150500.4.6.1.i586"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-qtqml-1.22.0-150500.4.6.1.i586",
"product": {
"name": "gstreamer-plugins-good-qtqml-1.22.0-150500.4.6.1.i586",
"product_id": "gstreamer-plugins-good-qtqml-1.22.0-150500.4.6.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"product": {
"name": "gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"product_id": "gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"product": {
"name": "gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"product_id": "gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-extra-1.22.0-150500.4.6.1.ppc64le",
"product": {
"name": "gstreamer-plugins-good-extra-1.22.0-150500.4.6.1.ppc64le",
"product_id": "gstreamer-plugins-good-extra-1.22.0-150500.4.6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-gtk-1.22.0-150500.4.6.1.ppc64le",
"product": {
"name": "gstreamer-plugins-good-gtk-1.22.0-150500.4.6.1.ppc64le",
"product_id": "gstreamer-plugins-good-gtk-1.22.0-150500.4.6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-jack-1.22.0-150500.4.6.1.ppc64le",
"product": {
"name": "gstreamer-plugins-good-jack-1.22.0-150500.4.6.1.ppc64le",
"product_id": "gstreamer-plugins-good-jack-1.22.0-150500.4.6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-qtqml-1.22.0-150500.4.6.1.ppc64le",
"product": {
"name": "gstreamer-plugins-good-qtqml-1.22.0-150500.4.6.1.ppc64le",
"product_id": "gstreamer-plugins-good-qtqml-1.22.0-150500.4.6.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "gstreamer-plugins-good-1.22.0-150500.4.6.1.s390x",
"product": {
"name": "gstreamer-plugins-good-1.22.0-150500.4.6.1.s390x",
"product_id": "gstreamer-plugins-good-1.22.0-150500.4.6.1.s390x"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-extra-1.22.0-150500.4.6.1.s390x",
"product": {
"name": "gstreamer-plugins-good-extra-1.22.0-150500.4.6.1.s390x",
"product_id": "gstreamer-plugins-good-extra-1.22.0-150500.4.6.1.s390x"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-gtk-1.22.0-150500.4.6.1.s390x",
"product": {
"name": "gstreamer-plugins-good-gtk-1.22.0-150500.4.6.1.s390x",
"product_id": "gstreamer-plugins-good-gtk-1.22.0-150500.4.6.1.s390x"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-jack-1.22.0-150500.4.6.1.s390x",
"product": {
"name": "gstreamer-plugins-good-jack-1.22.0-150500.4.6.1.s390x",
"product_id": "gstreamer-plugins-good-jack-1.22.0-150500.4.6.1.s390x"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-qtqml-1.22.0-150500.4.6.1.s390x",
"product": {
"name": "gstreamer-plugins-good-qtqml-1.22.0-150500.4.6.1.s390x",
"product_id": "gstreamer-plugins-good-qtqml-1.22.0-150500.4.6.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"product": {
"name": "gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"product_id": "gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-32bit-1.22.0-150500.4.6.1.x86_64",
"product": {
"name": "gstreamer-plugins-good-32bit-1.22.0-150500.4.6.1.x86_64",
"product_id": "gstreamer-plugins-good-32bit-1.22.0-150500.4.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-extra-1.22.0-150500.4.6.1.x86_64",
"product": {
"name": "gstreamer-plugins-good-extra-1.22.0-150500.4.6.1.x86_64",
"product_id": "gstreamer-plugins-good-extra-1.22.0-150500.4.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-extra-32bit-1.22.0-150500.4.6.1.x86_64",
"product": {
"name": "gstreamer-plugins-good-extra-32bit-1.22.0-150500.4.6.1.x86_64",
"product_id": "gstreamer-plugins-good-extra-32bit-1.22.0-150500.4.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-gtk-1.22.0-150500.4.6.1.x86_64",
"product": {
"name": "gstreamer-plugins-good-gtk-1.22.0-150500.4.6.1.x86_64",
"product_id": "gstreamer-plugins-good-gtk-1.22.0-150500.4.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-jack-1.22.0-150500.4.6.1.x86_64",
"product": {
"name": "gstreamer-plugins-good-jack-1.22.0-150500.4.6.1.x86_64",
"product_id": "gstreamer-plugins-good-jack-1.22.0-150500.4.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-jack-32bit-1.22.0-150500.4.6.1.x86_64",
"product": {
"name": "gstreamer-plugins-good-jack-32bit-1.22.0-150500.4.6.1.x86_64",
"product_id": "gstreamer-plugins-good-jack-32bit-1.22.0-150500.4.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-qtqml-1.22.0-150500.4.6.1.x86_64",
"product": {
"name": "gstreamer-plugins-good-qtqml-1.22.0-150500.4.6.1.x86_64",
"product_id": "gstreamer-plugins-good-qtqml-1.22.0-150500.4.6.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64"
},
"product_reference": "gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64"
},
"product_reference": "gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch"
},
"product_reference": "gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64"
},
"product_reference": "gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64"
},
"product_reference": "gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch"
},
"product_reference": "gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64"
},
"product_reference": "gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le"
},
"product_reference": "gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-1.22.0-150500.4.6.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.s390x"
},
"product_reference": "gstreamer-plugins-good-1.22.0-150500.4.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64"
},
"product_reference": "gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch"
},
"product_reference": "gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le"
},
"product_reference": "gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64"
},
"product_reference": "gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch"
},
"product_reference": "gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-47537",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47537"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. The program attempts to reallocate the memory pointed to by stream-\u003esamples to accommodate stream-\u003en_samples + samples_count elements of type QtDemuxSample. The problem is that samples_count is read from the input file. And if this value is big enough, this can lead to an integer overflow during the addition. As a consequence, g_try_renew might allocate memory for a significantly smaller number of elements than intended. Following this, the program iterates through samples_count elements and attempts to write samples_count number of elements, potentially exceeding the actual allocated memory size and causing an OOB-write. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47537",
"url": "https://www.suse.com/security/cve/CVE-2024-47537"
},
{
"category": "external",
"summary": "SUSE Bug 1234414 for CVE-2024-47537",
"url": "https://bugzilla.suse.com/1234414"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-10T13:48:33Z",
"details": "important"
}
],
"title": "CVE-2024-47537"
},
{
"cve": "CVE-2024-47539",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47539"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An out-of-bounds write vulnerability was identified in the convert_to_s334_1a function in isomp4/qtdemux.c. The vulnerability arises due to a discrepancy between the size of memory allocated to the storage array and the loop condition i * 2 \u003c ccpair_size. Specifically, when ccpair_size is even, the allocated size in storage does not match the loop\u0027s expected bounds, resulting in an out-of-bounds write. This bug allows for the overwriting of up to 3 bytes beyond the allocated bounds of the storage array. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47539",
"url": "https://www.suse.com/security/cve/CVE-2024-47539"
},
{
"category": "external",
"summary": "SUSE Bug 1234417 for CVE-2024-47539",
"url": "https://bugzilla.suse.com/1234417"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-10T13:48:33Z",
"details": "important"
}
],
"title": "CVE-2024-47539"
},
{
"cve": "CVE-2024-47540",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47540"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An uninitialized stack variable vulnerability has been identified in the gst_matroska_demux_add_wvpk_header function within matroska-demux.c. When size \u003c 4, the program calls gst_buffer_unmap with an uninitialized map variable. Then, in the gst_memory_unmap function, the program will attempt to unmap the buffer using the uninitialized map variable, causing a function pointer hijack, as it will jump to mem-\u003eallocator-\u003emem_unmap_full or mem-\u003eallocator-\u003emem_unmap. This vulnerability could allow an attacker to hijack the execution flow, potentially leading to code execution. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47540",
"url": "https://www.suse.com/security/cve/CVE-2024-47540"
},
{
"category": "external",
"summary": "SUSE Bug 1234421 for CVE-2024-47540",
"url": "https://bugzilla.suse.com/1234421"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-10T13:48:33Z",
"details": "important"
}
],
"title": "CVE-2024-47540"
},
{
"cve": "CVE-2024-47543",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47543"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerability has been discovered in qtdemux_parse_container function within qtdemux.c. In the parent function qtdemux_parse_node, the value of length is not well checked. So, if length is big enough, it causes the pointer end to point beyond the boundaries of buffer. Subsequently, in the qtdemux_parse_container function, the while loop can trigger an OOB-read, accessing memory beyond the bounds of buf. This vulnerability can result in reading up to 4GB of process memory or potentially causing a segmentation fault (SEGV) when accessing invalid memory. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47543",
"url": "https://www.suse.com/security/cve/CVE-2024-47543"
},
{
"category": "external",
"summary": "SUSE Bug 1234462 for CVE-2024-47543",
"url": "https://bugzilla.suse.com/1234462"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-10T13:48:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-47543"
},
{
"cve": "CVE-2024-47544",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47544"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. The function qtdemux_parse_sbgp in qtdemux.c is affected by a null dereference vulnerability. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47544",
"url": "https://www.suse.com/security/cve/CVE-2024-47544"
},
{
"category": "external",
"summary": "SUSE Bug 1234473 for CVE-2024-47544",
"url": "https://bugzilla.suse.com/1234473"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-10T13:48:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-47544"
},
{
"cve": "CVE-2024-47545",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47545"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An integer underflow has been detected in qtdemux_parse_trak function within qtdemux.c. During the strf parsing case, the subtraction size -= 40 can lead to a negative integer overflow if it is less than 40. If this happens, the subsequent call to gst_buffer_fill will invoke memcpy with a large tocopy size, resulting in an OOB-read. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47545",
"url": "https://www.suse.com/security/cve/CVE-2024-47545"
},
{
"category": "external",
"summary": "SUSE Bug 1234476 for CVE-2024-47545",
"url": "https://bugzilla.suse.com/1234476"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-10T13:48:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-47545"
},
{
"cve": "CVE-2024-47546",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47546"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An integer underflow has been detected in extract_cc_from_data function within qtdemux.c. In the FOURCC_c708 case, the subtraction atom_length - 8 may result in an underflow if atom_length is less than 8. When that subtraction underflows, *cclen ends up being a large number, and then cclen is passed to g_memdup2 leading to an out-of-bounds (OOB) read. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47546",
"url": "https://www.suse.com/security/cve/CVE-2024-47546"
},
{
"category": "external",
"summary": "SUSE Bug 1234477 for CVE-2024-47546",
"url": "https://bugzilla.suse.com/1234477"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-10T13:48:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-47546"
},
{
"cve": "CVE-2024-47596",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47596"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An OOB-read has been discovered in the qtdemux_parse_svq3_stsd_data function within qtdemux.c. In the FOURCC_SMI_ case, seqh_size is read from the input file without proper validation. If seqh_size is greater than the remaining size of the data buffer, it can lead to an OOB-read in the following call to gst_buffer_fill, which internally uses memcpy. This vulnerability can result in reading up to 4GB of process memory or potentially causing a segmentation fault (SEGV) when accessing invalid memory. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47596",
"url": "https://www.suse.com/security/cve/CVE-2024-47596"
},
{
"category": "external",
"summary": "SUSE Bug 1234424 for CVE-2024-47596",
"url": "https://bugzilla.suse.com/1234424"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-10T13:48:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-47596"
},
{
"cve": "CVE-2024-47597",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47597"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An OOB-read has been detected in the function qtdemux_parse_samples within qtdemux.c. This issue arises when the function qtdemux_parse_samples reads data beyond the boundaries of the stream-\u003estco buffer. The following code snippet shows the call to qt_atom_parser_get_offset_unchecked, which leads to the OOB-read when parsing the provided GHSL-2024-245_crash1.mp4 file. This issue may lead to read up to 8 bytes out-of-bounds. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47597",
"url": "https://www.suse.com/security/cve/CVE-2024-47597"
},
{
"category": "external",
"summary": "SUSE Bug 1234425 for CVE-2024-47597",
"url": "https://bugzilla.suse.com/1234425"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-10T13:48:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-47597"
},
{
"cve": "CVE-2024-47598",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47598"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerability has been discovered in the qtdemux_merge_sample_table function within qtdemux.c. The problem is that the size of the stts buffer isn\u0027t properly checked before reading stts_duration, allowing the program to read 4 bytes beyond the boundaries of stts-\u003edata. This vulnerability reads up to 4 bytes past the allocated bounds of the stts array. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47598",
"url": "https://www.suse.com/security/cve/CVE-2024-47598"
},
{
"category": "external",
"summary": "SUSE Bug 1234426 for CVE-2024-47598",
"url": "https://bugzilla.suse.com/1234426"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-10T13:48:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-47598"
},
{
"cve": "CVE-2024-47599",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47599"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. A null pointer dereference vulnerability has been discovered in the gst_jpeg_dec_negotiate function in gstjpegdec.c. This function does not check for a NULL return value from gst_video_decoder_set_output_state. When this happens, dereferences of the outstate pointer will lead to a null pointer dereference. This vulnerability can result in a Denial of Service (DoS) by triggering a segmentation fault (SEGV). This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47599",
"url": "https://www.suse.com/security/cve/CVE-2024-47599"
},
{
"category": "external",
"summary": "SUSE Bug 1234427 for CVE-2024-47599",
"url": "https://bugzilla.suse.com/1234427"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-10T13:48:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-47599"
},
{
"cve": "CVE-2024-47601",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47601"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. A null pointer dereference vulnerability has been discovered in the gst_matroska_demux_parse_blockgroup_or_simpleblock function within matroska-demux.c. This function does not properly check the validity of the GstBuffer *sub pointer before performing dereferences. As a result, null pointer dereferences may occur. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47601",
"url": "https://www.suse.com/security/cve/CVE-2024-47601"
},
{
"category": "external",
"summary": "SUSE Bug 1234428 for CVE-2024-47601",
"url": "https://bugzilla.suse.com/1234428"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-10T13:48:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-47601"
},
{
"cve": "CVE-2024-47602",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47602"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. A null pointer dereference vulnerability has been discovered in the gst_matroska_demux_add_wvpk_header function within matroska-demux.c. This function does not properly check the validity of the stream-\u003ecodec_priv pointer in the following code. If stream-\u003ecodec_priv is NULL, the call to GST_READ_UINT16_LE will attempt to dereference a null pointer, leading to a crash of the application. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47602",
"url": "https://www.suse.com/security/cve/CVE-2024-47602"
},
{
"category": "external",
"summary": "SUSE Bug 1234432 for CVE-2024-47602",
"url": "https://bugzilla.suse.com/1234432"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-10T13:48:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-47602"
},
{
"cve": "CVE-2024-47603",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47603"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. A null pointer dereference vulnerability has been discovered in the gst_matroska_demux_update_tracks function within matroska-demux.c. The vulnerability occurs when the gst_caps_is_equal function is called with invalid caps values. If this happen, then in the function gst_buffer_get_size the call to GST_BUFFER_MEM_PTR can return a null pointer. Attempting to dereference the size field of this null pointer results in a null pointer dereference. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47603",
"url": "https://www.suse.com/security/cve/CVE-2024-47603"
},
{
"category": "external",
"summary": "SUSE Bug 1234433 for CVE-2024-47603",
"url": "https://bugzilla.suse.com/1234433"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-10T13:48:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-47603"
},
{
"cve": "CVE-2024-47606",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47606"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An integer underflow has been detected in the function qtdemux_parse_theora_extension within qtdemux.c. The vulnerability occurs due to an underflow of the gint size variable, which causes size to hold a large unintended value when cast to an unsigned integer. This 32-bit negative value is then cast to a 64-bit unsigned integer (0xfffffffffffffffa) in a subsequent call to gst_buffer_new_and_alloc. The function gst_buffer_new_allocate then attempts to allocate memory, eventually calling _sysmem_new_block. The function _sysmem_new_block adds alignment and header size to the (unsigned) size, causing the overflow of the \u0027slice_size\u0027 variable. As a result, only 0x89 bytes are allocated, despite the large input size. When the following memcpy call occurs in gst_buffer_fill, the data from the input file will overwrite the content of the GstMapInfo info structure. Finally, during the call to gst_memory_unmap, the overwritten memory may cause a function pointer hijack, as the mem-\u003eallocator-\u003emem_unmap_full function is called with a corrupted pointer. This function pointer overwrite could allow an attacker to alter the execution flow of the program, leading to arbitrary code execution. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47606",
"url": "https://www.suse.com/security/cve/CVE-2024-47606"
},
{
"category": "external",
"summary": "SUSE Bug 1234449 for CVE-2024-47606",
"url": "https://bugzilla.suse.com/1234449"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-10T13:48:33Z",
"details": "important"
}
],
"title": "CVE-2024-47606"
},
{
"cve": "CVE-2024-47613",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47613"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. A null pointer dereference vulnerability has been identified in `gst_gdk_pixbuf_dec_flush` within `gstgdkpixbufdec.c`. This function invokes `memcpy`, using `out_pix` as the destination address. `out_pix` is expected to point to the frame 0 from the frame structure, which is read from the input file. However, in certain situations, it can points to a NULL frame, causing the subsequent call to `memcpy` to attempt writing to the null address (0x00), leading to a null pointer dereference. This vulnerability can result in a Denial of Service (DoS) by triggering a segmentation fault (SEGV). This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47613",
"url": "https://www.suse.com/security/cve/CVE-2024-47613"
},
{
"category": "external",
"summary": "SUSE Bug 1234447 for CVE-2024-47613",
"url": "https://bugzilla.suse.com/1234447"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-10T13:48:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-47613"
},
{
"cve": "CVE-2024-47774",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47774"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerability has been identified in the gst_avi_subtitle_parse_gab2_chunk function within gstavisubtitle.c. The function reads the name_length value directly from the input file without checking it properly. Then, the a condition, does not properly handle cases where name_length is greater than 0xFFFFFFFF - 17, causing an integer overflow. In such scenario, the function attempts to access memory beyond the buffer leading to an OOB-read. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47774",
"url": "https://www.suse.com/security/cve/CVE-2024-47774"
},
{
"category": "external",
"summary": "SUSE Bug 1234446 for CVE-2024-47774",
"url": "https://bugzilla.suse.com/1234446"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-10T13:48:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-47774"
},
{
"cve": "CVE-2024-47775",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47775"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerability has been found in the parse_ds64 function within gstwavparse.c. The parse_ds64 function does not check that the buffer buf contains sufficient data before attempting to read from it, doing multiple GST_READ_UINT32_LE operations without performing boundary checks. This can lead to an OOB-read when buf is smaller than expected. This vulnerability allows reading beyond the bounds of the data buffer, potentially leading to a crash (denial of service) or the leak of sensitive data. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47775",
"url": "https://www.suse.com/security/cve/CVE-2024-47775"
},
{
"category": "external",
"summary": "SUSE Bug 1234434 for CVE-2024-47775",
"url": "https://bugzilla.suse.com/1234434"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-10T13:48:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-47775"
},
{
"cve": "CVE-2024-47776",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47776"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An OOB-read has been discovered in gst_wavparse_cue_chunk within gstwavparse.c. The vulnerability happens due to a discrepancy between the size of the data buffer and the size value provided to the function. This mismatch causes the comparison if (size \u003c 4 + ncues * 24) to fail in some cases, allowing the subsequent loop to access beyond the bounds of the data buffer. The root cause of this discrepancy stems from a miscalculation when clipping the chunk size based on upstream data size. This vulnerability allows reading beyond the bounds of the data buffer, potentially leading to a crash (denial of service) or the leak of sensitive data. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47776",
"url": "https://www.suse.com/security/cve/CVE-2024-47776"
},
{
"category": "external",
"summary": "SUSE Bug 1234435 for CVE-2024-47776",
"url": "https://bugzilla.suse.com/1234435"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-10T13:48:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-47776"
},
{
"cve": "CVE-2024-47777",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47777"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerability has been identified in the gst_wavparse_smpl_chunk function within gstwavparse.c. This function attempts to read 4 bytes from the data + 12 offset without checking if the size of the data buffer is sufficient. If the buffer is too small, the function reads beyond its bounds. This vulnerability may result in reading 4 bytes out of the boundaries of the data buffer. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47777",
"url": "https://www.suse.com/security/cve/CVE-2024-47777"
},
{
"category": "external",
"summary": "SUSE Bug 1234436 for CVE-2024-47777",
"url": "https://bugzilla.suse.com/1234436"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-10T13:48:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-47777"
},
{
"cve": "CVE-2024-47778",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47778"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerability has been discovered in gst_wavparse_adtl_chunk within gstwavparse.c. This vulnerability arises due to insufficient validation of the size parameter, which can exceed the bounds of the data buffer. As a result, an OOB read occurs in the following while loop. This vulnerability can result in reading up to 4GB of process memory or potentially causing a segmentation fault (SEGV) when accessing invalid memory. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47778",
"url": "https://www.suse.com/security/cve/CVE-2024-47778"
},
{
"category": "external",
"summary": "SUSE Bug 1234439 for CVE-2024-47778",
"url": "https://bugzilla.suse.com/1234439"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-10T13:48:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-47778"
},
{
"cve": "CVE-2024-47834",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47834"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An Use-After-Free read vulnerability has been discovered affecting the processing of CodecPrivate elements in Matroska streams. In the GST_MATROSKA_ID_CODECPRIVATE case within the gst_matroska_demux_parse_stream function, a data chunk is allocated using gst_ebml_read_binary. Later, the allocated memory is freed in the gst_matroska_track_free function, by the call to g_free (track-\u003ecodec_priv). Finally, the freed memory is accessed in the caps_serialize function through gst_value_serialize_buffer. The freed memory will be accessed in the gst_value_serialize_buffer function. This results in a UAF read vulnerability, as the function tries to process memory that has already been freed. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47834",
"url": "https://www.suse.com/security/cve/CVE-2024-47834"
},
{
"category": "external",
"summary": "SUSE Bug 1234440 for CVE-2024-47834",
"url": "https://bugzilla.suse.com/1234440"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-1.22.0-150500.4.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:gstreamer-plugins-good-lang-1.22.0-150500.4.6.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-01-10T13:48:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-47834"
}
]
}
SUSE-SU-2025:00063-1
Vulnerability from csaf_suse - Published: 2025-06-24 12:03 - Updated: 2025-06-24 12:03Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for gstreamer-plugins-good",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for gstreamer-plugins-good fixes the following issues:\n\n- CVE-2024-47540: Fixed an uninitialized stack memory in Matroska/WebM demuxer. (boo#1234421)\n- CVE-2024-47537: Fixed an out-of-bounds write in isomp4/qtdemux.c. (boo#1234414)\n- CVE-2024-47543: Fixed an out-of-bounds write in qtdemux_parse_container. (boo#1234462)\n- CVE-2024-47544: Fixed a NULL-pointer dereferences in MP4/MOV demuxer CENC handling. (boo#1234473)\n- CVE-2024-47545: Fixed an integer underflow in FOURCC_strf parsing leading to out-of-bounds read. (boo#1234476)\n- CVE-2024-47596: Fixed an integer underflow in MP4/MOV demuxer that can lead to out-of-bounds reads. (boo#1234424)\n- CVE-2024-47597: Fixed an out-of-bounds reads in MP4/MOV demuxer sample table parser (boo#1234425)\n- CVE-2024-47599: Fixed insufficient error handling in JPEG decoder that can lead to NULL-pointer dereferences. (boo#1234427)\n- CVE-2024-47601: Fixed a NULL-pointer dereference in Matroska/WebM demuxer. (boo#1234428)\n- CVE-2024-47602: Fixed a NULL-pointer dereferences and out-of-bounds reads in Matroska/WebM demuxer. (boo#1234432)\n- CVE-2024-47603: Fixed a NULL-pointer dereference in Matroska/WebM demuxer. (boo#1234433)\n- CVE-2024-47606: Avoid integer overflow when allocating sysmem. (bsc#1234449)\n- CVE-2024-47606: Fixed an integer overflows in MP4/MOV demuxer and memory allocator that can lead to out-of-bounds writes. (boo#1234449)\n- CVE-2024-47613: Fixed a NULL-pointer dereference in gdk-pixbuf decoder. (boo#1234447)\n- CVE-2024-47774: Fixed an integer overflow in AVI subtitle parser that leads to out-of-bounds reads. (boo#1234446)\n- CVE-2024-47775: Fixed various out-of-bounds reads in WAV parser. (boo#1234434)\n- CVE-2024-47776: Fixed various out-of-bounds reads in WAV parser. (boo#1234435)\n- CVE-2024-47777: Fixed various out-of-bounds reads in WAV parser. (boo#1234436)\n- CVE-2024-47778: Fixed various out-of-bounds reads in WAV parser. (boo#1234439)\n- CVE-2024-47834: Fixed a use-after-free in the Matroska demuxer that can cause crashes for certain input files. (boo#1234440)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-63,SUSE-SLE-SERVER-12-SP5-LTSS-2025-63,SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-63",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_00063-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:00063-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202500063-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:00063-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2025-June/040461.html"
},
{
"category": "self",
"summary": "SUSE Bug 1234414",
"url": "https://bugzilla.suse.com/1234414"
},
{
"category": "self",
"summary": "SUSE Bug 1234421",
"url": "https://bugzilla.suse.com/1234421"
},
{
"category": "self",
"summary": "SUSE Bug 1234424",
"url": "https://bugzilla.suse.com/1234424"
},
{
"category": "self",
"summary": "SUSE Bug 1234425",
"url": "https://bugzilla.suse.com/1234425"
},
{
"category": "self",
"summary": "SUSE Bug 1234427",
"url": "https://bugzilla.suse.com/1234427"
},
{
"category": "self",
"summary": "SUSE Bug 1234428",
"url": "https://bugzilla.suse.com/1234428"
},
{
"category": "self",
"summary": "SUSE Bug 1234432",
"url": "https://bugzilla.suse.com/1234432"
},
{
"category": "self",
"summary": "SUSE Bug 1234433",
"url": "https://bugzilla.suse.com/1234433"
},
{
"category": "self",
"summary": "SUSE Bug 1234434",
"url": "https://bugzilla.suse.com/1234434"
},
{
"category": "self",
"summary": "SUSE Bug 1234435",
"url": "https://bugzilla.suse.com/1234435"
},
{
"category": "self",
"summary": "SUSE Bug 1234436",
"url": "https://bugzilla.suse.com/1234436"
},
{
"category": "self",
"summary": "SUSE Bug 1234439",
"url": "https://bugzilla.suse.com/1234439"
},
{
"category": "self",
"summary": "SUSE Bug 1234440",
"url": "https://bugzilla.suse.com/1234440"
},
{
"category": "self",
"summary": "SUSE Bug 1234446",
"url": "https://bugzilla.suse.com/1234446"
},
{
"category": "self",
"summary": "SUSE Bug 1234447",
"url": "https://bugzilla.suse.com/1234447"
},
{
"category": "self",
"summary": "SUSE Bug 1234449",
"url": "https://bugzilla.suse.com/1234449"
},
{
"category": "self",
"summary": "SUSE Bug 1234462",
"url": "https://bugzilla.suse.com/1234462"
},
{
"category": "self",
"summary": "SUSE Bug 1234473",
"url": "https://bugzilla.suse.com/1234473"
},
{
"category": "self",
"summary": "SUSE Bug 1234476",
"url": "https://bugzilla.suse.com/1234476"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47537 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47537/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47540 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47540/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47543 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47543/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47544 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47544/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47545 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47545/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47596 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47596/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47597 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47597/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47599 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47599/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47601 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47601/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47602 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47602/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47603 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47603/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47606 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47606/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47613 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47613/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47774 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47774/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47775 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47775/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47776 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47776/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47777 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47777/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47778 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47778/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47834 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47834/"
}
],
"title": "Security update for gstreamer-plugins-good",
"tracking": {
"current_release_date": "2025-06-24T12:03:30Z",
"generator": {
"date": "2025-06-24T12:03:30Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:00063-1",
"initial_release_date": "2025-06-24T12:03:30Z",
"revision_history": [
{
"date": "2025-06-24T12:03:30Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"product": {
"name": "gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"product_id": "gstreamer-plugins-good-1.8.3-16.12.1.aarch64"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-doc-1.8.3-16.12.1.aarch64",
"product": {
"name": "gstreamer-plugins-good-doc-1.8.3-16.12.1.aarch64",
"product_id": "gstreamer-plugins-good-doc-1.8.3-16.12.1.aarch64"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-extra-1.8.3-16.12.1.aarch64",
"product": {
"name": "gstreamer-plugins-good-extra-1.8.3-16.12.1.aarch64",
"product_id": "gstreamer-plugins-good-extra-1.8.3-16.12.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "gstreamer-plugins-good-64bit-1.8.3-16.12.1.aarch64_ilp32",
"product": {
"name": "gstreamer-plugins-good-64bit-1.8.3-16.12.1.aarch64_ilp32",
"product_id": "gstreamer-plugins-good-64bit-1.8.3-16.12.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-extra-64bit-1.8.3-16.12.1.aarch64_ilp32",
"product": {
"name": "gstreamer-plugins-good-extra-64bit-1.8.3-16.12.1.aarch64_ilp32",
"product_id": "gstreamer-plugins-good-extra-64bit-1.8.3-16.12.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "gstreamer-plugins-good-1.8.3-16.12.1.i586",
"product": {
"name": "gstreamer-plugins-good-1.8.3-16.12.1.i586",
"product_id": "gstreamer-plugins-good-1.8.3-16.12.1.i586"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-doc-1.8.3-16.12.1.i586",
"product": {
"name": "gstreamer-plugins-good-doc-1.8.3-16.12.1.i586",
"product_id": "gstreamer-plugins-good-doc-1.8.3-16.12.1.i586"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-extra-1.8.3-16.12.1.i586",
"product": {
"name": "gstreamer-plugins-good-extra-1.8.3-16.12.1.i586",
"product_id": "gstreamer-plugins-good-extra-1.8.3-16.12.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"product": {
"name": "gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"product_id": "gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"product": {
"name": "gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"product_id": "gstreamer-plugins-good-1.8.3-16.12.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-doc-1.8.3-16.12.1.ppc64le",
"product": {
"name": "gstreamer-plugins-good-doc-1.8.3-16.12.1.ppc64le",
"product_id": "gstreamer-plugins-good-doc-1.8.3-16.12.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-extra-1.8.3-16.12.1.ppc64le",
"product": {
"name": "gstreamer-plugins-good-extra-1.8.3-16.12.1.ppc64le",
"product_id": "gstreamer-plugins-good-extra-1.8.3-16.12.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "gstreamer-plugins-good-1.8.3-16.12.1.s390",
"product": {
"name": "gstreamer-plugins-good-1.8.3-16.12.1.s390",
"product_id": "gstreamer-plugins-good-1.8.3-16.12.1.s390"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-doc-1.8.3-16.12.1.s390",
"product": {
"name": "gstreamer-plugins-good-doc-1.8.3-16.12.1.s390",
"product_id": "gstreamer-plugins-good-doc-1.8.3-16.12.1.s390"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-extra-1.8.3-16.12.1.s390",
"product": {
"name": "gstreamer-plugins-good-extra-1.8.3-16.12.1.s390",
"product_id": "gstreamer-plugins-good-extra-1.8.3-16.12.1.s390"
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"product": {
"name": "gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"product_id": "gstreamer-plugins-good-1.8.3-16.12.1.s390x"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-32bit-1.8.3-16.12.1.s390x",
"product": {
"name": "gstreamer-plugins-good-32bit-1.8.3-16.12.1.s390x",
"product_id": "gstreamer-plugins-good-32bit-1.8.3-16.12.1.s390x"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-doc-1.8.3-16.12.1.s390x",
"product": {
"name": "gstreamer-plugins-good-doc-1.8.3-16.12.1.s390x",
"product_id": "gstreamer-plugins-good-doc-1.8.3-16.12.1.s390x"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-extra-1.8.3-16.12.1.s390x",
"product": {
"name": "gstreamer-plugins-good-extra-1.8.3-16.12.1.s390x",
"product_id": "gstreamer-plugins-good-extra-1.8.3-16.12.1.s390x"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-extra-32bit-1.8.3-16.12.1.s390x",
"product": {
"name": "gstreamer-plugins-good-extra-32bit-1.8.3-16.12.1.s390x",
"product_id": "gstreamer-plugins-good-extra-32bit-1.8.3-16.12.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"product": {
"name": "gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"product_id": "gstreamer-plugins-good-1.8.3-16.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-32bit-1.8.3-16.12.1.x86_64",
"product": {
"name": "gstreamer-plugins-good-32bit-1.8.3-16.12.1.x86_64",
"product_id": "gstreamer-plugins-good-32bit-1.8.3-16.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-doc-1.8.3-16.12.1.x86_64",
"product": {
"name": "gstreamer-plugins-good-doc-1.8.3-16.12.1.x86_64",
"product_id": "gstreamer-plugins-good-doc-1.8.3-16.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-extra-1.8.3-16.12.1.x86_64",
"product": {
"name": "gstreamer-plugins-good-extra-1.8.3-16.12.1.x86_64",
"product_id": "gstreamer-plugins-good-extra-1.8.3-16.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-good-extra-32bit-1.8.3-16.12.1.x86_64",
"product": {
"name": "gstreamer-plugins-good-extra-32bit-1.8.3-16.12.1.x86_64",
"product_id": "gstreamer-plugins-good-extra-32bit-1.8.3-16.12.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss-extended-security:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-1.8.3-16.12.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64"
},
"product_reference": "gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-1.8.3-16.12.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le"
},
"product_reference": "gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-1.8.3-16.12.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x"
},
"product_reference": "gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-1.8.3-16.12.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64"
},
"product_reference": "gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
},
"product_reference": "gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-1.8.3-16.12.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64"
},
"product_reference": "gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
},
"product_reference": "gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-47537",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47537"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. The program attempts to reallocate the memory pointed to by stream-\u003esamples to accommodate stream-\u003en_samples + samples_count elements of type QtDemuxSample. The problem is that samples_count is read from the input file. And if this value is big enough, this can lead to an integer overflow during the addition. As a consequence, g_try_renew might allocate memory for a significantly smaller number of elements than intended. Following this, the program iterates through samples_count elements and attempts to write samples_count number of elements, potentially exceeding the actual allocated memory size and causing an OOB-write. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47537",
"url": "https://www.suse.com/security/cve/CVE-2024-47537"
},
{
"category": "external",
"summary": "SUSE Bug 1234414 for CVE-2024-47537",
"url": "https://bugzilla.suse.com/1234414"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-24T12:03:30Z",
"details": "important"
}
],
"title": "CVE-2024-47537"
},
{
"cve": "CVE-2024-47540",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47540"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An uninitialized stack variable vulnerability has been identified in the gst_matroska_demux_add_wvpk_header function within matroska-demux.c. When size \u003c 4, the program calls gst_buffer_unmap with an uninitialized map variable. Then, in the gst_memory_unmap function, the program will attempt to unmap the buffer using the uninitialized map variable, causing a function pointer hijack, as it will jump to mem-\u003eallocator-\u003emem_unmap_full or mem-\u003eallocator-\u003emem_unmap. This vulnerability could allow an attacker to hijack the execution flow, potentially leading to code execution. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47540",
"url": "https://www.suse.com/security/cve/CVE-2024-47540"
},
{
"category": "external",
"summary": "SUSE Bug 1234421 for CVE-2024-47540",
"url": "https://bugzilla.suse.com/1234421"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-24T12:03:30Z",
"details": "important"
}
],
"title": "CVE-2024-47540"
},
{
"cve": "CVE-2024-47543",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47543"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerability has been discovered in qtdemux_parse_container function within qtdemux.c. In the parent function qtdemux_parse_node, the value of length is not well checked. So, if length is big enough, it causes the pointer end to point beyond the boundaries of buffer. Subsequently, in the qtdemux_parse_container function, the while loop can trigger an OOB-read, accessing memory beyond the bounds of buf. This vulnerability can result in reading up to 4GB of process memory or potentially causing a segmentation fault (SEGV) when accessing invalid memory. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47543",
"url": "https://www.suse.com/security/cve/CVE-2024-47543"
},
{
"category": "external",
"summary": "SUSE Bug 1234462 for CVE-2024-47543",
"url": "https://bugzilla.suse.com/1234462"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-24T12:03:30Z",
"details": "moderate"
}
],
"title": "CVE-2024-47543"
},
{
"cve": "CVE-2024-47544",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47544"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. The function qtdemux_parse_sbgp in qtdemux.c is affected by a null dereference vulnerability. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47544",
"url": "https://www.suse.com/security/cve/CVE-2024-47544"
},
{
"category": "external",
"summary": "SUSE Bug 1234473 for CVE-2024-47544",
"url": "https://bugzilla.suse.com/1234473"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-24T12:03:30Z",
"details": "moderate"
}
],
"title": "CVE-2024-47544"
},
{
"cve": "CVE-2024-47545",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47545"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An integer underflow has been detected in qtdemux_parse_trak function within qtdemux.c. During the strf parsing case, the subtraction size -= 40 can lead to a negative integer overflow if it is less than 40. If this happens, the subsequent call to gst_buffer_fill will invoke memcpy with a large tocopy size, resulting in an OOB-read. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47545",
"url": "https://www.suse.com/security/cve/CVE-2024-47545"
},
{
"category": "external",
"summary": "SUSE Bug 1234476 for CVE-2024-47545",
"url": "https://bugzilla.suse.com/1234476"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-24T12:03:30Z",
"details": "moderate"
}
],
"title": "CVE-2024-47545"
},
{
"cve": "CVE-2024-47596",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47596"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An OOB-read has been discovered in the qtdemux_parse_svq3_stsd_data function within qtdemux.c. In the FOURCC_SMI_ case, seqh_size is read from the input file without proper validation. If seqh_size is greater than the remaining size of the data buffer, it can lead to an OOB-read in the following call to gst_buffer_fill, which internally uses memcpy. This vulnerability can result in reading up to 4GB of process memory or potentially causing a segmentation fault (SEGV) when accessing invalid memory. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47596",
"url": "https://www.suse.com/security/cve/CVE-2024-47596"
},
{
"category": "external",
"summary": "SUSE Bug 1234424 for CVE-2024-47596",
"url": "https://bugzilla.suse.com/1234424"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-24T12:03:30Z",
"details": "moderate"
}
],
"title": "CVE-2024-47596"
},
{
"cve": "CVE-2024-47597",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47597"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An OOB-read has been detected in the function qtdemux_parse_samples within qtdemux.c. This issue arises when the function qtdemux_parse_samples reads data beyond the boundaries of the stream-\u003estco buffer. The following code snippet shows the call to qt_atom_parser_get_offset_unchecked, which leads to the OOB-read when parsing the provided GHSL-2024-245_crash1.mp4 file. This issue may lead to read up to 8 bytes out-of-bounds. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47597",
"url": "https://www.suse.com/security/cve/CVE-2024-47597"
},
{
"category": "external",
"summary": "SUSE Bug 1234425 for CVE-2024-47597",
"url": "https://bugzilla.suse.com/1234425"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-24T12:03:30Z",
"details": "moderate"
}
],
"title": "CVE-2024-47597"
},
{
"cve": "CVE-2024-47599",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47599"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. A null pointer dereference vulnerability has been discovered in the gst_jpeg_dec_negotiate function in gstjpegdec.c. This function does not check for a NULL return value from gst_video_decoder_set_output_state. When this happens, dereferences of the outstate pointer will lead to a null pointer dereference. This vulnerability can result in a Denial of Service (DoS) by triggering a segmentation fault (SEGV). This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47599",
"url": "https://www.suse.com/security/cve/CVE-2024-47599"
},
{
"category": "external",
"summary": "SUSE Bug 1234427 for CVE-2024-47599",
"url": "https://bugzilla.suse.com/1234427"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-24T12:03:30Z",
"details": "moderate"
}
],
"title": "CVE-2024-47599"
},
{
"cve": "CVE-2024-47601",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47601"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. A null pointer dereference vulnerability has been discovered in the gst_matroska_demux_parse_blockgroup_or_simpleblock function within matroska-demux.c. This function does not properly check the validity of the GstBuffer *sub pointer before performing dereferences. As a result, null pointer dereferences may occur. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47601",
"url": "https://www.suse.com/security/cve/CVE-2024-47601"
},
{
"category": "external",
"summary": "SUSE Bug 1234428 for CVE-2024-47601",
"url": "https://bugzilla.suse.com/1234428"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-24T12:03:30Z",
"details": "moderate"
}
],
"title": "CVE-2024-47601"
},
{
"cve": "CVE-2024-47602",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47602"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. A null pointer dereference vulnerability has been discovered in the gst_matroska_demux_add_wvpk_header function within matroska-demux.c. This function does not properly check the validity of the stream-\u003ecodec_priv pointer in the following code. If stream-\u003ecodec_priv is NULL, the call to GST_READ_UINT16_LE will attempt to dereference a null pointer, leading to a crash of the application. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47602",
"url": "https://www.suse.com/security/cve/CVE-2024-47602"
},
{
"category": "external",
"summary": "SUSE Bug 1234432 for CVE-2024-47602",
"url": "https://bugzilla.suse.com/1234432"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-24T12:03:30Z",
"details": "moderate"
}
],
"title": "CVE-2024-47602"
},
{
"cve": "CVE-2024-47603",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47603"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. A null pointer dereference vulnerability has been discovered in the gst_matroska_demux_update_tracks function within matroska-demux.c. The vulnerability occurs when the gst_caps_is_equal function is called with invalid caps values. If this happen, then in the function gst_buffer_get_size the call to GST_BUFFER_MEM_PTR can return a null pointer. Attempting to dereference the size field of this null pointer results in a null pointer dereference. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47603",
"url": "https://www.suse.com/security/cve/CVE-2024-47603"
},
{
"category": "external",
"summary": "SUSE Bug 1234433 for CVE-2024-47603",
"url": "https://bugzilla.suse.com/1234433"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-24T12:03:30Z",
"details": "moderate"
}
],
"title": "CVE-2024-47603"
},
{
"cve": "CVE-2024-47606",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47606"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An integer underflow has been detected in the function qtdemux_parse_theora_extension within qtdemux.c. The vulnerability occurs due to an underflow of the gint size variable, which causes size to hold a large unintended value when cast to an unsigned integer. This 32-bit negative value is then cast to a 64-bit unsigned integer (0xfffffffffffffffa) in a subsequent call to gst_buffer_new_and_alloc. The function gst_buffer_new_allocate then attempts to allocate memory, eventually calling _sysmem_new_block. The function _sysmem_new_block adds alignment and header size to the (unsigned) size, causing the overflow of the \u0027slice_size\u0027 variable. As a result, only 0x89 bytes are allocated, despite the large input size. When the following memcpy call occurs in gst_buffer_fill, the data from the input file will overwrite the content of the GstMapInfo info structure. Finally, during the call to gst_memory_unmap, the overwritten memory may cause a function pointer hijack, as the mem-\u003eallocator-\u003emem_unmap_full function is called with a corrupted pointer. This function pointer overwrite could allow an attacker to alter the execution flow of the program, leading to arbitrary code execution. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47606",
"url": "https://www.suse.com/security/cve/CVE-2024-47606"
},
{
"category": "external",
"summary": "SUSE Bug 1234449 for CVE-2024-47606",
"url": "https://bugzilla.suse.com/1234449"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-24T12:03:30Z",
"details": "important"
}
],
"title": "CVE-2024-47606"
},
{
"cve": "CVE-2024-47613",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47613"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. A null pointer dereference vulnerability has been identified in `gst_gdk_pixbuf_dec_flush` within `gstgdkpixbufdec.c`. This function invokes `memcpy`, using `out_pix` as the destination address. `out_pix` is expected to point to the frame 0 from the frame structure, which is read from the input file. However, in certain situations, it can points to a NULL frame, causing the subsequent call to `memcpy` to attempt writing to the null address (0x00), leading to a null pointer dereference. This vulnerability can result in a Denial of Service (DoS) by triggering a segmentation fault (SEGV). This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47613",
"url": "https://www.suse.com/security/cve/CVE-2024-47613"
},
{
"category": "external",
"summary": "SUSE Bug 1234447 for CVE-2024-47613",
"url": "https://bugzilla.suse.com/1234447"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-24T12:03:30Z",
"details": "moderate"
}
],
"title": "CVE-2024-47613"
},
{
"cve": "CVE-2024-47774",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47774"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerability has been identified in the gst_avi_subtitle_parse_gab2_chunk function within gstavisubtitle.c. The function reads the name_length value directly from the input file without checking it properly. Then, the a condition, does not properly handle cases where name_length is greater than 0xFFFFFFFF - 17, causing an integer overflow. In such scenario, the function attempts to access memory beyond the buffer leading to an OOB-read. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47774",
"url": "https://www.suse.com/security/cve/CVE-2024-47774"
},
{
"category": "external",
"summary": "SUSE Bug 1234446 for CVE-2024-47774",
"url": "https://bugzilla.suse.com/1234446"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-24T12:03:30Z",
"details": "moderate"
}
],
"title": "CVE-2024-47774"
},
{
"cve": "CVE-2024-47775",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47775"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerability has been found in the parse_ds64 function within gstwavparse.c. The parse_ds64 function does not check that the buffer buf contains sufficient data before attempting to read from it, doing multiple GST_READ_UINT32_LE operations without performing boundary checks. This can lead to an OOB-read when buf is smaller than expected. This vulnerability allows reading beyond the bounds of the data buffer, potentially leading to a crash (denial of service) or the leak of sensitive data. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47775",
"url": "https://www.suse.com/security/cve/CVE-2024-47775"
},
{
"category": "external",
"summary": "SUSE Bug 1234434 for CVE-2024-47775",
"url": "https://bugzilla.suse.com/1234434"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-24T12:03:30Z",
"details": "moderate"
}
],
"title": "CVE-2024-47775"
},
{
"cve": "CVE-2024-47776",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47776"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An OOB-read has been discovered in gst_wavparse_cue_chunk within gstwavparse.c. The vulnerability happens due to a discrepancy between the size of the data buffer and the size value provided to the function. This mismatch causes the comparison if (size \u003c 4 + ncues * 24) to fail in some cases, allowing the subsequent loop to access beyond the bounds of the data buffer. The root cause of this discrepancy stems from a miscalculation when clipping the chunk size based on upstream data size. This vulnerability allows reading beyond the bounds of the data buffer, potentially leading to a crash (denial of service) or the leak of sensitive data. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47776",
"url": "https://www.suse.com/security/cve/CVE-2024-47776"
},
{
"category": "external",
"summary": "SUSE Bug 1234435 for CVE-2024-47776",
"url": "https://bugzilla.suse.com/1234435"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-24T12:03:30Z",
"details": "moderate"
}
],
"title": "CVE-2024-47776"
},
{
"cve": "CVE-2024-47777",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47777"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerability has been identified in the gst_wavparse_smpl_chunk function within gstwavparse.c. This function attempts to read 4 bytes from the data + 12 offset without checking if the size of the data buffer is sufficient. If the buffer is too small, the function reads beyond its bounds. This vulnerability may result in reading 4 bytes out of the boundaries of the data buffer. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47777",
"url": "https://www.suse.com/security/cve/CVE-2024-47777"
},
{
"category": "external",
"summary": "SUSE Bug 1234436 for CVE-2024-47777",
"url": "https://bugzilla.suse.com/1234436"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-24T12:03:30Z",
"details": "moderate"
}
],
"title": "CVE-2024-47777"
},
{
"cve": "CVE-2024-47778",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47778"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerability has been discovered in gst_wavparse_adtl_chunk within gstwavparse.c. This vulnerability arises due to insufficient validation of the size parameter, which can exceed the bounds of the data buffer. As a result, an OOB read occurs in the following while loop. This vulnerability can result in reading up to 4GB of process memory or potentially causing a segmentation fault (SEGV) when accessing invalid memory. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47778",
"url": "https://www.suse.com/security/cve/CVE-2024-47778"
},
{
"category": "external",
"summary": "SUSE Bug 1234439 for CVE-2024-47778",
"url": "https://bugzilla.suse.com/1234439"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-24T12:03:30Z",
"details": "moderate"
}
],
"title": "CVE-2024-47778"
},
{
"cve": "CVE-2024-47834",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47834"
}
],
"notes": [
{
"category": "general",
"text": "GStreamer is a library for constructing graphs of media-handling components. An Use-After-Free read vulnerability has been discovered affecting the processing of CodecPrivate elements in Matroska streams. In the GST_MATROSKA_ID_CODECPRIVATE case within the gst_matroska_demux_parse_stream function, a data chunk is allocated using gst_ebml_read_binary. Later, the allocated memory is freed in the gst_matroska_track_free function, by the call to g_free (track-\u003ecodec_priv). Finally, the freed memory is accessed in the caps_serialize function through gst_value_serialize_buffer. The freed memory will be accessed in the gst_value_serialize_buffer function. This results in a UAF read vulnerability, as the function tries to process memory that has already been freed. This vulnerability is fixed in 1.24.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47834",
"url": "https://www.suse.com/security/cve/CVE-2024-47834"
},
{
"category": "external",
"summary": "SUSE Bug 1234440 for CVE-2024-47834",
"url": "https://bugzilla.suse.com/1234440"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-1.8.3-16.12.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gstreamer-plugins-good-lang-1.8.3-16.12.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-24T12:03:30Z",
"details": "moderate"
}
],
"title": "CVE-2024-47834"
}
]
}
RHSA-2025:7242
Vulnerability from csaf_redhat - Published: 2025-05-13 08:36 - Updated: 2025-11-21 19:35Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for gstreamer1-plugins-good is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "GStreamer is a streaming media framework based on graphs of filters which operate on media data. The gstreamer1-plugins-good packages contain a collection of well-supported plug-ins of good quality and under the LGPL license.\n\nSecurity Fix(es):\n\n* gstreamer1-plugins-good: OOB-read in qtdemux_parse_container (CVE-2024-47543)\n\n* gstreamer1-plugins-good: GStreamer has an OOB-read in gst_avi_subtitle_parse_gab2_chunk (CVE-2024-47774)\n\n* gstreamer1-plugins-good: OOB-read in gst_wavparse_smpl_chunk (CVE-2024-47777)\n\n* gstreamer1-plugins-good: OOB-read in gst_wavparse_adtl_chunk (CVE-2024-47778)\n\n* gstreamer1-plugins-good: OOB-read in parse_ds64 (CVE-2024-47775)\n\n* gstreamer1-plugins-good: OOB-read in FOURCC_SMI_ parsing (CVE-2024-47596)\n\n* gstreamer1-plugins-good: insufficient error handling in JPEG decoder that can lead to NULL-pointer dereferences (CVE-2024-47599)\n\n* gstreamer1-plugins-good: Use-After-Free read in Matroska CodecPrivate (CVE-2024-47834)\n\n* gstreamer1-plugins-good: OOB-read in gst_wavparse_cue_chunk (CVE-2024-47776)\n\n* gstreamer1-plugins-good: NULL-pointer dereferences in MP4/MOV demuxer CENC handling (CVE-2024-47544)\n\n* gstreamer1-plugins-good: NULL-pointer dereference in Matroska/WebM demuxer (CVE-2024-47601)\n\n* gstreamer1-plugins-good: OOB-read in qtdemux_parse_samples (CVE-2024-47597)\n\n* gstreamer1-plugins-good: integer underflow in extract_cc_from_data leading to OOB-read (CVE-2024-47546)\n\n* gstreamer1-plugins-good: NULL-pointer dereferences and out-of-bounds reads in Matroska/WebM demuxer (CVE-2024-47602)\n\n* gstreamer1-plugins-good: OOB-read in qtdemux_merge_sample_table (CVE-2024-47598)\n\n* gstreamer1-plugins-good: NULL-pointer dereference in Matroska/WebM demuxer (CVE-2024-47603)\n\n* gstreamer1-plugins-good: integer underflow in FOURCC_strf parsing leading to OOB-read (CVE-2024-47545)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 9 Release Notes linked from the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:7242",
"url": "https://access.redhat.com/errata/RHSA-2025:7242"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/9/html/9.6_release_notes/index",
"url": "https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/9/html/9.6_release_notes/index"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2331723",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331723"
},
{
"category": "external",
"summary": "2331739",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331739"
},
{
"category": "external",
"summary": "2331741",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331741"
},
{
"category": "external",
"summary": "2331743",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331743"
},
{
"category": "external",
"summary": "2331744",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331744"
},
{
"category": "external",
"summary": "2331747",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331747"
},
{
"category": "external",
"summary": "2331748",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331748"
},
{
"category": "external",
"summary": "2331749",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331749"
},
{
"category": "external",
"summary": "2331750",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331750"
},
{
"category": "external",
"summary": "2331751",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331751"
},
{
"category": "external",
"summary": "2331752",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331752"
},
{
"category": "external",
"summary": "2331755",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331755"
},
{
"category": "external",
"summary": "2331756",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331756"
},
{
"category": "external",
"summary": "2331759",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331759"
},
{
"category": "external",
"summary": "2331761",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331761"
},
{
"category": "external",
"summary": "2331762",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331762"
},
{
"category": "external",
"summary": "2331763",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331763"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_7242.json"
}
],
"title": "Red Hat Security Advisory: gstreamer1-plugins-good security update",
"tracking": {
"current_release_date": "2025-11-21T19:35:05+00:00",
"generator": {
"date": "2025-11-21T19:35:05+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2025:7242",
"initial_release_date": "2025-05-13T08:36:31+00:00",
"revision_history": [
{
"date": "2025-05-13T08:36:31+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-05-13T08:36:31+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T19:35:05+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "gstreamer1-plugins-good-0:1.22.12-4.el9.src",
"product": {
"name": "gstreamer1-plugins-good-0:1.22.12-4.el9.src",
"product_id": "gstreamer1-plugins-good-0:1.22.12-4.el9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gstreamer1-plugins-good@1.22.12-4.el9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "gstreamer1-plugins-good-0:1.22.12-4.el9.aarch64",
"product": {
"name": "gstreamer1-plugins-good-0:1.22.12-4.el9.aarch64",
"product_id": "gstreamer1-plugins-good-0:1.22.12-4.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gstreamer1-plugins-good@1.22.12-4.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.aarch64",
"product": {
"name": "gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.aarch64",
"product_id": "gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gstreamer1-plugins-good-gtk@1.22.12-4.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.aarch64",
"product": {
"name": "gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.aarch64",
"product_id": "gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gstreamer1-plugins-good-debugsource@1.22.12-4.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.aarch64",
"product": {
"name": "gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.aarch64",
"product_id": "gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gstreamer1-plugins-good-debuginfo@1.22.12-4.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.aarch64",
"product": {
"name": "gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.aarch64",
"product_id": "gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gstreamer1-plugins-good-gtk-debuginfo@1.22.12-4.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.aarch64",
"product": {
"name": "gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.aarch64",
"product_id": "gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gstreamer1-plugins-good-qt-debuginfo@1.22.12-4.el9?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "gstreamer1-plugins-good-0:1.22.12-4.el9.ppc64le",
"product": {
"name": "gstreamer1-plugins-good-0:1.22.12-4.el9.ppc64le",
"product_id": "gstreamer1-plugins-good-0:1.22.12-4.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gstreamer1-plugins-good@1.22.12-4.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.ppc64le",
"product": {
"name": "gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.ppc64le",
"product_id": "gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gstreamer1-plugins-good-gtk@1.22.12-4.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.ppc64le",
"product": {
"name": "gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.ppc64le",
"product_id": "gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gstreamer1-plugins-good-debugsource@1.22.12-4.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.ppc64le",
"product": {
"name": "gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.ppc64le",
"product_id": "gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gstreamer1-plugins-good-debuginfo@1.22.12-4.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.ppc64le",
"product": {
"name": "gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.ppc64le",
"product_id": "gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gstreamer1-plugins-good-gtk-debuginfo@1.22.12-4.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.ppc64le",
"product": {
"name": "gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.ppc64le",
"product_id": "gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gstreamer1-plugins-good-qt-debuginfo@1.22.12-4.el9?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "gstreamer1-plugins-good-0:1.22.12-4.el9.i686",
"product": {
"name": "gstreamer1-plugins-good-0:1.22.12-4.el9.i686",
"product_id": "gstreamer1-plugins-good-0:1.22.12-4.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gstreamer1-plugins-good@1.22.12-4.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.i686",
"product": {
"name": "gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.i686",
"product_id": "gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gstreamer1-plugins-good-gtk@1.22.12-4.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.i686",
"product": {
"name": "gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.i686",
"product_id": "gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gstreamer1-plugins-good-debugsource@1.22.12-4.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.i686",
"product": {
"name": "gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.i686",
"product_id": "gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gstreamer1-plugins-good-debuginfo@1.22.12-4.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.i686",
"product": {
"name": "gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.i686",
"product_id": "gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gstreamer1-plugins-good-gtk-debuginfo@1.22.12-4.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.i686",
"product": {
"name": "gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.i686",
"product_id": "gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gstreamer1-plugins-good-qt-debuginfo@1.22.12-4.el9?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "gstreamer1-plugins-good-0:1.22.12-4.el9.x86_64",
"product": {
"name": "gstreamer1-plugins-good-0:1.22.12-4.el9.x86_64",
"product_id": "gstreamer1-plugins-good-0:1.22.12-4.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gstreamer1-plugins-good@1.22.12-4.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.x86_64",
"product": {
"name": "gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.x86_64",
"product_id": "gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gstreamer1-plugins-good-gtk@1.22.12-4.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.x86_64",
"product": {
"name": "gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.x86_64",
"product_id": "gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gstreamer1-plugins-good-debugsource@1.22.12-4.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.x86_64",
"product": {
"name": "gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.x86_64",
"product_id": "gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gstreamer1-plugins-good-debuginfo@1.22.12-4.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.x86_64",
"product": {
"name": "gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.x86_64",
"product_id": "gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gstreamer1-plugins-good-gtk-debuginfo@1.22.12-4.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.x86_64",
"product": {
"name": "gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.x86_64",
"product_id": "gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gstreamer1-plugins-good-qt-debuginfo@1.22.12-4.el9?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "gstreamer1-plugins-good-0:1.22.12-4.el9.s390x",
"product": {
"name": "gstreamer1-plugins-good-0:1.22.12-4.el9.s390x",
"product_id": "gstreamer1-plugins-good-0:1.22.12-4.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gstreamer1-plugins-good@1.22.12-4.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.s390x",
"product": {
"name": "gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.s390x",
"product_id": "gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gstreamer1-plugins-good-gtk@1.22.12-4.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.s390x",
"product": {
"name": "gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.s390x",
"product_id": "gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gstreamer1-plugins-good-debugsource@1.22.12-4.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.s390x",
"product": {
"name": "gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.s390x",
"product_id": "gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gstreamer1-plugins-good-debuginfo@1.22.12-4.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.s390x",
"product": {
"name": "gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.s390x",
"product_id": "gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gstreamer1-plugins-good-gtk-debuginfo@1.22.12-4.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.s390x",
"product": {
"name": "gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.s390x",
"product_id": "gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/gstreamer1-plugins-good-qt-debuginfo@1.22.12-4.el9?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer1-plugins-good-0:1.22.12-4.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.aarch64"
},
"product_reference": "gstreamer1-plugins-good-0:1.22.12-4.el9.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer1-plugins-good-0:1.22.12-4.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.i686"
},
"product_reference": "gstreamer1-plugins-good-0:1.22.12-4.el9.i686",
"relates_to_product_reference": "AppStream-9.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer1-plugins-good-0:1.22.12-4.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.ppc64le"
},
"product_reference": "gstreamer1-plugins-good-0:1.22.12-4.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer1-plugins-good-0:1.22.12-4.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.s390x"
},
"product_reference": "gstreamer1-plugins-good-0:1.22.12-4.el9.s390x",
"relates_to_product_reference": "AppStream-9.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer1-plugins-good-0:1.22.12-4.el9.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.src"
},
"product_reference": "gstreamer1-plugins-good-0:1.22.12-4.el9.src",
"relates_to_product_reference": "AppStream-9.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer1-plugins-good-0:1.22.12-4.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.x86_64"
},
"product_reference": "gstreamer1-plugins-good-0:1.22.12-4.el9.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.aarch64"
},
"product_reference": "gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.i686"
},
"product_reference": "gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.i686",
"relates_to_product_reference": "AppStream-9.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.ppc64le"
},
"product_reference": "gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.s390x"
},
"product_reference": "gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.s390x",
"relates_to_product_reference": "AppStream-9.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.x86_64"
},
"product_reference": "gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.aarch64"
},
"product_reference": "gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.i686"
},
"product_reference": "gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.i686",
"relates_to_product_reference": "AppStream-9.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.ppc64le"
},
"product_reference": "gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.s390x"
},
"product_reference": "gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.s390x",
"relates_to_product_reference": "AppStream-9.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.x86_64"
},
"product_reference": "gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.aarch64"
},
"product_reference": "gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.i686"
},
"product_reference": "gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.i686",
"relates_to_product_reference": "AppStream-9.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.ppc64le"
},
"product_reference": "gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.s390x"
},
"product_reference": "gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.s390x",
"relates_to_product_reference": "AppStream-9.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.x86_64"
},
"product_reference": "gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.aarch64"
},
"product_reference": "gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.i686"
},
"product_reference": "gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.i686",
"relates_to_product_reference": "AppStream-9.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.ppc64le"
},
"product_reference": "gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.s390x"
},
"product_reference": "gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.s390x",
"relates_to_product_reference": "AppStream-9.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.x86_64"
},
"product_reference": "gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.aarch64"
},
"product_reference": "gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.i686"
},
"product_reference": "gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.i686",
"relates_to_product_reference": "AppStream-9.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.ppc64le"
},
"product_reference": "gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.s390x"
},
"product_reference": "gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.s390x",
"relates_to_product_reference": "AppStream-9.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.x86_64"
},
"product_reference": "gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.GA"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-47543",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-12-11T19:01:06.518071+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2331723"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the GStreamer library. An out-of-bounds read in the MP4/MOV demuxer can lead to crashes for certain input files, potentially allowing a malicious third party to trigger an application crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "gstreamer1-plugins-good: OOB-read in qtdemux_parse_container",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.src",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-47543"
},
{
"category": "external",
"summary": "RHBZ#2331723",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331723"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-47543",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47543"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47543",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47543"
},
{
"category": "external",
"summary": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8059.patch",
"url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8059.patch"
},
{
"category": "external",
"summary": "https://gstreamer.freedesktop.org/security/sa-2024-0009.html",
"url": "https://gstreamer.freedesktop.org/security/sa-2024-0009.html"
},
{
"category": "external",
"summary": "https://securitylab.github.com/advisories/GHSL-2024-236_Gstreamer/",
"url": "https://securitylab.github.com/advisories/GHSL-2024-236_Gstreamer/"
}
],
"release_date": "2024-12-11T18:55:50.210000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-05-13T08:36:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.src",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:7242"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.src",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "gstreamer1-plugins-good: OOB-read in qtdemux_parse_container"
},
{
"cve": "CVE-2024-47544",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-12-11T20:01:47.895968+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2331751"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the GStreamer library. Multiple NULL pointer dereferences in the MP4/MOV demuxer\u0027s CENC handling can cause crashes for certain input files, potentially allowing a malicious actor to trigger an application crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "gstreamer1-plugins-good: NULL-pointer dereferences in MP4/MOV demuxer CENC handling",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.src",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-47544"
},
{
"category": "external",
"summary": "RHBZ#2331751",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331751"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-47544",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47544"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47544",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47544"
},
{
"category": "external",
"summary": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8059.patch",
"url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8059.patch"
},
{
"category": "external",
"summary": "https://gstreamer.freedesktop.org/security/sa-2024-0011.html",
"url": "https://gstreamer.freedesktop.org/security/sa-2024-0011.html"
},
{
"category": "external",
"summary": "https://securitylab.github.com/advisories/GHSL-2024-238_Gstreamer/",
"url": "https://securitylab.github.com/advisories/GHSL-2024-238_Gstreamer/"
}
],
"release_date": "2024-12-11T18:57:31.268000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-05-13T08:36:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.src",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:7242"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.src",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "gstreamer1-plugins-good: NULL-pointer dereferences in MP4/MOV demuxer CENC handling"
},
{
"cve": "CVE-2024-47545",
"cwe": {
"id": "CWE-191",
"name": "Integer Underflow (Wrap or Wraparound)"
},
"discovery_date": "2024-12-11T20:02:36.295237+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2331763"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the GStreamer library. An integer overflow in the MP4/MOV demuxer can lead to out-of-bounds reads that may cause crashes for certain input files, potentially allowing a malicious actor to trigger an application crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "gstreamer1-plugins-good: integer underflow in FOURCC_strf parsing leading to OOB-read",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.src",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-47545"
},
{
"category": "external",
"summary": "RHBZ#2331763",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331763"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-47545",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47545"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47545",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47545"
},
{
"category": "external",
"summary": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8059.patch",
"url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8059.patch"
},
{
"category": "external",
"summary": "https://gstreamer.freedesktop.org/security/sa-2024-0010.html",
"url": "https://gstreamer.freedesktop.org/security/sa-2024-0010.html"
},
{
"category": "external",
"summary": "https://securitylab.github.com/advisories/GHSL-2024-242_Gstreamer/",
"url": "https://securitylab.github.com/advisories/GHSL-2024-242_Gstreamer/"
}
],
"release_date": "2024-12-11T18:58:14.462000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-05-13T08:36:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.src",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:7242"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.src",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "gstreamer1-plugins-good: integer underflow in FOURCC_strf parsing leading to OOB-read"
},
{
"cve": "CVE-2024-47546",
"cwe": {
"id": "CWE-191",
"name": "Integer Underflow (Wrap or Wraparound)"
},
"discovery_date": "2024-12-11T20:02:09.371312+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2331756"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the GStreamer library. Integer underflow in the MP4/MOV demuxer can cause crashes for certain input files, potentially allowing a malicious actor to trigger an application crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "gstreamer1-plugins-good: integer underflow in extract_cc_from_data leading to OOB-read",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.src",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-47546"
},
{
"category": "external",
"summary": "RHBZ#2331756",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331756"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-47546",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47546"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47546",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47546"
},
{
"category": "external",
"summary": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8059.patch",
"url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8059.patch"
},
{
"category": "external",
"summary": "https://gstreamer.freedesktop.org/security/sa-2024-0013.html",
"url": "https://gstreamer.freedesktop.org/security/sa-2024-0013.html"
},
{
"category": "external",
"summary": "https://securitylab.github.com/advisories/GHSL-2024-243_Gstreamer/",
"url": "https://securitylab.github.com/advisories/GHSL-2024-243_Gstreamer/"
}
],
"release_date": "2024-12-11T19:01:05.831000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-05-13T08:36:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.src",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:7242"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.src",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "gstreamer1-plugins-good: integer underflow in extract_cc_from_data leading to OOB-read"
},
{
"cve": "CVE-2024-47596",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-12-11T20:01:30.387932+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2331747"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the GStreamer library. An integer underflow due to missing size checks in the MP4/MOV demuxer can lead to out-of-bounds reads and cause crashes for certain input files. This issue can allow a malicious actor to trigger a crash of the application.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "gstreamer1-plugins-good: OOB-read in FOURCC_SMI_ parsing",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.src",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-47596"
},
{
"category": "external",
"summary": "RHBZ#2331747",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331747"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-47596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47596"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47596",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47596"
},
{
"category": "external",
"summary": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8059.patch",
"url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8059.patch"
},
{
"category": "external",
"summary": "https://gstreamer.freedesktop.org/security/sa-2024-0015.html",
"url": "https://gstreamer.freedesktop.org/security/sa-2024-0015.html"
},
{
"category": "external",
"summary": "https://securitylab.github.com/advisories/GHSL-2024-244_Gstreamer/",
"url": "https://securitylab.github.com/advisories/GHSL-2024-244_Gstreamer/"
}
],
"release_date": "2024-12-11T19:01:23.353000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-05-13T08:36:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.src",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:7242"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.src",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "gstreamer1-plugins-good: OOB-read in FOURCC_SMI_ parsing"
},
{
"cve": "CVE-2024-47597",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-12-11T20:02:05.307914+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2331755"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the GStreamer library. Multiple out-of-bounds reads in the MP4/MOV demuxer\u0027s sample table parsing and a lack of error checking can cause crashes for certain input files, potentially allowing a malicious actor to trigger an application crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "gstreamer1-plugins-good: OOB-read in qtdemux_parse_samples",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.src",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-47597"
},
{
"category": "external",
"summary": "RHBZ#2331755",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331755"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-47597",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47597"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47597",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47597"
},
{
"category": "external",
"summary": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8059.patch",
"url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8059.patch"
},
{
"category": "external",
"summary": "https://gstreamer.freedesktop.org/security/sa-2024-0012.html",
"url": "https://gstreamer.freedesktop.org/security/sa-2024-0012.html"
},
{
"category": "external",
"summary": "https://securitylab.github.com/advisories/GHSL-2024-245_Gstreamer/",
"url": "https://securitylab.github.com/advisories/GHSL-2024-245_Gstreamer/"
}
],
"release_date": "2024-12-11T19:01:50.820000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-05-13T08:36:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.src",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:7242"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.src",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "gstreamer1-plugins-good: OOB-read in qtdemux_parse_samples"
},
{
"cve": "CVE-2024-47598",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-12-11T20:02:28.768219+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2331761"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the GStreamer library. When handling raw audio tracks, out-of-bounds reads in the MP4/MOV demuxer\u0027s sample table parser can cause crashes for certain input files, potentially allowing a malicious actor to trigger an application crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "gstreamer1-plugins-good: OOB-read in qtdemux_merge_sample_table",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.src",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-47598"
},
{
"category": "external",
"summary": "RHBZ#2331761",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331761"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-47598",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47598"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47598",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47598"
},
{
"category": "external",
"summary": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8059.patch",
"url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8059.patch"
},
{
"category": "external",
"summary": "https://gstreamer.freedesktop.org/security/sa-2024-0006.html",
"url": "https://gstreamer.freedesktop.org/security/sa-2024-0006.html"
},
{
"category": "external",
"summary": "https://securitylab.github.com/advisories/GHSL-2024-246_Gstreamer/",
"url": "https://securitylab.github.com/advisories/GHSL-2024-246_Gstreamer/"
}
],
"release_date": "2024-12-11T19:02:32.029000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-05-13T08:36:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.src",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:7242"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.src",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "gstreamer1-plugins-good: OOB-read in qtdemux_merge_sample_table"
},
{
"cve": "CVE-2024-47599",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-12-11T20:01:34.696203+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2331748"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the GStreamer library. Insufficient error handling in the JPEG decoder can lead to NULL-pointer dereferences and cause crashes for certain input files, making it possible for a malicious actor to trigger a crash of the application.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "gstreamer1-plugins-good: insufficient error handling in JPEG decoder that can lead to NULL-pointer dereferences",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.src",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-47599"
},
{
"category": "external",
"summary": "RHBZ#2331748",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331748"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-47599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47599"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47599",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47599"
},
{
"category": "external",
"summary": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8040.patch",
"url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8040.patch"
},
{
"category": "external",
"summary": "https://gstreamer.freedesktop.org/security/sa-2024-0016.html",
"url": "https://gstreamer.freedesktop.org/security/sa-2024-0016.html"
},
{
"category": "external",
"summary": "https://securitylab.github.com/advisories/GHSL-2024-247_Gstreamer/",
"url": "https://securitylab.github.com/advisories/GHSL-2024-247_Gstreamer/"
}
],
"release_date": "2024-12-11T19:02:52.412000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-05-13T08:36:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.src",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:7242"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.src",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "gstreamer1-plugins-good: insufficient error handling in JPEG decoder that can lead to NULL-pointer dereferences"
},
{
"cve": "CVE-2024-47601",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-12-11T20:01:52.496087+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2331752"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the GStreamer library. A NULL pointer dereference in the Matroska/WebM demuxer can cause crashes for certain input files, potentially allowing a malicious actor to trigger an application crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "gstreamer1-plugins-good: NULL-pointer dereference in Matroska/WebM demuxer",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.src",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-47601"
},
{
"category": "external",
"summary": "RHBZ#2331752",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331752"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-47601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47601"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47601",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47601"
},
{
"category": "external",
"summary": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8057.patch",
"url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8057.patch"
},
{
"category": "external",
"summary": "https://gstreamer.freedesktop.org/security/sa-2024-0020.html",
"url": "https://gstreamer.freedesktop.org/security/sa-2024-0020.html"
},
{
"category": "external",
"summary": "https://securitylab.github.com/advisories/GHSL-2024-249_Gstreamer/",
"url": "https://securitylab.github.com/advisories/GHSL-2024-249_Gstreamer/"
}
],
"release_date": "2024-12-11T19:03:36.650000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-05-13T08:36:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.src",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:7242"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.src",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "gstreamer1-plugins-good: NULL-pointer dereference in Matroska/WebM demuxer"
},
{
"cve": "CVE-2024-47602",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-12-11T20:02:21.573425+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2331759"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the GStreamer library. NULL pointer dereferences and out-of-bounds reads in the Matroska/WebM demuxer can cause crashes for certain input files, potentially allowing a malicious actor to trigger an application crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "gstreamer1-plugins-good: NULL-pointer dereferences and out-of-bounds reads in Matroska/WebM demuxer",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.src",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-47602"
},
{
"category": "external",
"summary": "RHBZ#2331759",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331759"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-47602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47602"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47602",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47602"
},
{
"category": "external",
"summary": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8057.patch",
"url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8057.patch"
},
{
"category": "external",
"summary": "https://gstreamer.freedesktop.org/security/sa-2024-0019.html",
"url": "https://gstreamer.freedesktop.org/security/sa-2024-0019.html"
},
{
"category": "external",
"summary": "https://securitylab.github.com/advisories/GHSL-2024-250_Gstreamer/",
"url": "https://securitylab.github.com/advisories/GHSL-2024-250_Gstreamer/"
}
],
"release_date": "2024-12-11T19:10:31.683000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-05-13T08:36:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.src",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:7242"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.src",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "gstreamer1-plugins-good: NULL-pointer dereferences and out-of-bounds reads in Matroska/WebM demuxer"
},
{
"cve": "CVE-2024-47603",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-12-11T20:02:32.664783+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2331762"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the GStreamer library. A NULL pointer dereference in the Matroska/WebM demuxer can cause crashes for certain input files, potentially allowing a malicious actor to trigger an application crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "gstreamer1-plugins-good: NULL-pointer dereference in Matroska/WebM demuxer",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.src",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-47603"
},
{
"category": "external",
"summary": "RHBZ#2331762",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331762"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-47603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47603"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47603",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47603"
},
{
"category": "external",
"summary": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8057.patch",
"url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8057.patch"
},
{
"category": "external",
"summary": "https://gstreamer.freedesktop.org/security/sa-2024-0021.html",
"url": "https://gstreamer.freedesktop.org/security/sa-2024-0021.html"
},
{
"category": "external",
"summary": "https://securitylab.github.com/advisories/GHSL-2024-251_Gstreamer/",
"url": "https://securitylab.github.com/advisories/GHSL-2024-251_Gstreamer/"
}
],
"release_date": "2024-12-11T19:11:51.382000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-05-13T08:36:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.src",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:7242"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.src",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "gstreamer1-plugins-good: NULL-pointer dereference in Matroska/WebM demuxer"
},
{
"cve": "CVE-2024-47774",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-12-11T20:00:59.225323+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2331739"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the GStreamer library. An out-of-bounds read in the gst_avi_subtitle_parse_gab2_chunk function can cause crashes for certain input files, potentially allowing a malicious third party to trigger an application crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "gstreamer1-plugins-good: GStreamer has an OOB-read in gst_avi_subtitle_parse_gab2_chunk",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.src",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-47774"
},
{
"category": "external",
"summary": "RHBZ#2331739",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331739"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-47774",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47774"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47774",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47774"
},
{
"category": "external",
"summary": "https://github.com/github/securitylab-vulnerabilities/issues/1826",
"url": "https://github.com/github/securitylab-vulnerabilities/issues/1826"
},
{
"category": "external",
"summary": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8043.patch",
"url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8043.patch"
},
{
"category": "external",
"summary": "https://securitylab.github.com/advisories/GHSL-2024-262_Gstreamer/",
"url": "https://securitylab.github.com/advisories/GHSL-2024-262_Gstreamer/"
}
],
"release_date": "2024-12-11T19:15:18.259000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-05-13T08:36:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.src",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:7242"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.src",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "gstreamer1-plugins-good: GStreamer has an OOB-read in gst_avi_subtitle_parse_gab2_chunk"
},
{
"cve": "CVE-2024-47775",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-12-11T20:01:18.849608+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2331744"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the GStreamer library. Various out-of-bounds reads in the WAV parser can cause crashes for certain input files, making it possible for a malicious actor to trigger a crash of the application.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "gstreamer1-plugins-good: OOB-read in parse_ds64",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.src",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-47775"
},
{
"category": "external",
"summary": "RHBZ#2331744",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331744"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-47775",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47775"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47775",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47775"
},
{
"category": "external",
"summary": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8042.patch",
"url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8042.patch"
},
{
"category": "external",
"summary": "https://gstreamer.freedesktop.org/security/sa-2024-0027.html",
"url": "https://gstreamer.freedesktop.org/security/sa-2024-0027.html"
},
{
"category": "external",
"summary": "https://securitylab.github.com/advisories/GHSL-2024-261_Gstreamer/",
"url": "https://securitylab.github.com/advisories/GHSL-2024-261_Gstreamer/"
}
],
"release_date": "2024-12-11T19:15:44.607000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-05-13T08:36:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.src",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:7242"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.src",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "gstreamer1-plugins-good: OOB-read in parse_ds64"
},
{
"cve": "CVE-2024-47776",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-12-11T20:01:43.508443+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2331750"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the GStreamer library. Various out-of-bounds reads in the WAV parser can cause crashes for certain input files, potentially allowing a malicious actor to trigger an application crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "gstreamer1-plugins-good: OOB-read in gst_wavparse_cue_chunk",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.src",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-47776"
},
{
"category": "external",
"summary": "RHBZ#2331750",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331750"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-47776",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47776"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47776",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47776"
},
{
"category": "external",
"summary": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8042.patch",
"url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8042.patch"
},
{
"category": "external",
"summary": "https://gstreamer.freedesktop.org/security/sa-2024-0027.html",
"url": "https://gstreamer.freedesktop.org/security/sa-2024-0027.html"
},
{
"category": "external",
"summary": "https://securitylab.github.com/advisories/GHSL-2024-260_Gstreamer/",
"url": "https://securitylab.github.com/advisories/GHSL-2024-260_Gstreamer/"
}
],
"release_date": "2024-12-11T19:16:04.573000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-05-13T08:36:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.src",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:7242"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.src",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "gstreamer1-plugins-good: OOB-read in gst_wavparse_cue_chunk"
},
{
"cve": "CVE-2024-47777",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-12-11T20:01:07.868488+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2331741"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the GStreamer library. Various out-of-bounds reads in the WAV parser can cause crashes for certain input files, potentially allowing a malicious actor to trigger an application crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "gstreamer1-plugins-good: OOB-read in gst_wavparse_smpl_chunk",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.src",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-47777"
},
{
"category": "external",
"summary": "RHBZ#2331741",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331741"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-47777",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47777"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47777",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47777"
},
{
"category": "external",
"summary": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8042.patch",
"url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8042.patch"
},
{
"category": "external",
"summary": "https://gstreamer.freedesktop.org/security/sa-2024-0027.html",
"url": "https://gstreamer.freedesktop.org/security/sa-2024-0027.html"
},
{
"category": "external",
"summary": "https://securitylab.github.com/advisories/GHSL-2024-259_Gstreamer/",
"url": "https://securitylab.github.com/advisories/GHSL-2024-259_Gstreamer/"
}
],
"release_date": "2024-12-11T19:16:33.169000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-05-13T08:36:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.src",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:7242"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.src",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "gstreamer1-plugins-good: OOB-read in gst_wavparse_smpl_chunk"
},
{
"cve": "CVE-2024-47778",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-12-11T20:01:15.497737+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2331743"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the GStreamer library. Various out-of-bounds reads in the WAV parser can cause crashes for certain input files, potentially allowing a malicious actor to trigger an application crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "gstreamer1-plugins-good: OOB-read in gst_wavparse_adtl_chunk",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.src",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-47778"
},
{
"category": "external",
"summary": "RHBZ#2331743",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331743"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-47778",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47778"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47778",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47778"
},
{
"category": "external",
"summary": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8042.patch",
"url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8042.patch"
},
{
"category": "external",
"summary": "https://gstreamer.freedesktop.org/security/sa-2024-0027.html",
"url": "https://gstreamer.freedesktop.org/security/sa-2024-0027.html"
},
{
"category": "external",
"summary": "https://securitylab.github.com/advisories/GHSL-2024-258_Gstreamer/",
"url": "https://securitylab.github.com/advisories/GHSL-2024-258_Gstreamer/"
}
],
"release_date": "2024-12-11T19:16:58.215000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-05-13T08:36:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.src",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:7242"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.src",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "gstreamer1-plugins-good: OOB-read in gst_wavparse_adtl_chunk"
},
{
"cve": "CVE-2024-47834",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-12-11T20:01:39.432741+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2331749"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the GStreamer library. A use-after-free in the Matroska demuxer can cause crashes for certain input files, potentially allowing a malicious actor to trigger an application crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "gstreamer1-plugins-good: Use-After-Free read in Matroska CodecPrivate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.src",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-47834"
},
{
"category": "external",
"summary": "RHBZ#2331749",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331749"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-47834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47834"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47834",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47834"
},
{
"category": "external",
"summary": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8057.patch",
"url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8057.patch"
},
{
"category": "external",
"summary": "https://gstreamer.freedesktop.org/security/sa-2024-0030.html",
"url": "https://gstreamer.freedesktop.org/security/sa-2024-0030.html"
},
{
"category": "external",
"summary": "https://securitylab.github.com/advisories/GHSL-2024-280_Gstreamer/",
"url": "https://securitylab.github.com/advisories/GHSL-2024-280_Gstreamer/"
}
],
"release_date": "2024-12-11T19:18:04.069000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-05-13T08:36:31+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.src",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:7242"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.src",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-debugsource-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-gtk-debuginfo-0:1.22.12-4.el9.x86_64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.aarch64",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.i686",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.ppc64le",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.s390x",
"AppStream-9.6.0.GA:gstreamer1-plugins-good-qt-debuginfo-0:1.22.12-4.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "gstreamer1-plugins-good: Use-After-Free read in Matroska CodecPrivate"
}
]
}
CVE-2024-47834
Vulnerability from fstec - Published: 07.10.2024{
"CVSS 2.0": "AV:L/AC:L/Au:N/C:P/I:N/A:P",
"CVSS 3.0": "AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"CVSS 4.0": "AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N",
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "\u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f, \u041e\u041e\u041e \u00ab\u0420\u0435\u0434 \u0421\u043e\u0444\u0442\u00bb, \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb, Red Hat Inc., \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e GStreamer, \u0410\u041e \"\u041d\u041f\u041f\u041a\u0422\", \u041e\u041e\u041e \u00ab\u041d\u0426\u041f\u0420\u00bb, \u041e\u041e\u041e \u00ab\u041e\u0442\u043a\u0440\u044b\u0442\u0430\u044f \u043c\u043e\u0431\u0438\u043b\u044c\u043d\u0430\u044f \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u0430\u00bb",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "11 (Debian GNU/Linux), 12 (Debian GNU/Linux), 7.3 (\u0420\u0415\u0414 \u041e\u0421), 1.7 (Astra Linux Special Edition), 4.7 (Astra Linux Special Edition), 9 (Red Hat Enterprise Linux), 1.8 (Astra Linux Special Edition), \u0434\u043e 1.24.10 (Gstreamer), \u0434\u043e 2.13 (\u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx), 9.5 (\u041c\u0421\u0412\u0421\u0444\u0435\u0440\u0430), \u0434\u043e 5.1.5 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (\u041e\u0421 \u0410\u0432\u0440\u043e\u0440\u0430)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0412 \u0443\u0441\u043b\u043e\u0432\u0438\u044f\u0445 \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u044f \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u043e\u0442 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043f\u0440\u0438\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u0442\u044c\u0441\u044f \"\u0420\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u043e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0439 \u043d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0435 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c LINUX\", \u0438\u0437\u043b\u043e\u0436\u0435\u043d\u043d\u044b\u0445 \u0432 \u043c\u0435\u0442\u043e\u0434\u0438\u0447\u0435\u0441\u043a\u043e\u043c \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u0435 \u0424\u0421\u0422\u042d\u041a \u0420\u043e\u0441\u0441\u0438\u0438, \u0443\u0442\u0432\u0435\u0440\u0436\u0434\u0451\u043d\u043d\u043e\u043c 25 \u0434\u0435\u043a\u0430\u0431\u0440\u044f 2022 \u0433\u043e\u0434\u0430.\n\n\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\u0414\u043b\u044f GStreamer:\nhttps://gstreamer.freedesktop.org/security/sa-2024-0030.html\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Red Hat Inc.:\nhttps://access.redhat.com/security/cve/cve-2024-47834\n\n\u0414\u043b\u044f Debian GNU/Linux:\nhttps://security-tracker.debian.org/tracker/CVE-2024-47834\n\n\u0414\u043b\u044f \u0420\u0415\u0414 \u041e\u0421:\nhttps://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-gstreamer1-plugins-good/?sphrase_id=641086\n\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f gst-plugins-good1.0 \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 1.18.4-2+deb11u3\n\n\u0414\u043b\u044f \u041e\u0421 Astra Linux:\n\u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u043f\u0430\u043a\u0435\u0442 gst-plugins-good1.0 \u0434\u043e 1.22.1-1ubuntu1.2astra2 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://wiki.astralinux.ru/astra-linux-se18-bulletin-2025-0811SE18\n\n\u0414\u043b\u044f \u041c\u0421\u0412\u0421\u0444\u0435\u0440\u0430: https://errata.msvsphere-os.ru/definition/9/INFCSA-2025:7242?lang=ru\n\n\u0414\u043b\u044f \u041e\u0421 Astra Linux:\n\u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u043f\u0430\u043a\u0435\u0442 gst-plugins-good1.0 \u0434\u043e 1.18.4-1astra4 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://wiki.astralinux.ru/astra-linux-se17-bulletin-2025-1202SE17\n\n\u0414\u043b\u044f \u041e\u0421 Astra Linux:\n\u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u043f\u0430\u043a\u0435\u0442 gst-plugins-good1.0 \u0434\u043e 1.18.4-1astra4 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://wiki.astralinux.ru/astra-linux-se47-bulletin-2025-1216SE47\n\n\u0414\u043b\u044f \u041e\u0421 \u0410\u0432\u0440\u043e\u0440\u0430: https://cve.omp.ru/bb30515",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "07.10.2024",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "20.01.2026",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "19.12.2024",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2024-11298",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2024-47834",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Debian GNU/Linux, \u0420\u0415\u0414 \u041e\u0421 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21163751), Astra Linux Special Edition (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), Red Hat Enterprise Linux, Gstreamer, \u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21165913), \u041c\u0421\u0412\u0421\u0444\u0435\u0440\u0430, \u041e\u0421 \u0410\u0432\u0440\u043e\u0440\u0430 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21161543)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "\u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 11 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 12 , \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 1.7 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 4.7 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), Red Hat Inc. Red Hat Enterprise Linux 9 , \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 1.8 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), \u0410\u041e \"\u041d\u041f\u041f\u041a\u0422\" \u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx \u0434\u043e 2.13 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21165913), \u041e\u041e\u041e \u00ab\u041d\u0426\u041f\u0420\u00bb \u041c\u0421\u0412\u0421\u0444\u0435\u0440\u0430 9.5 , \u041e\u041e\u041e \u00ab\u041e\u0442\u043a\u0440\u044b\u0442\u0430\u044f \u043c\u043e\u0431\u0438\u043b\u044c\u043d\u0430\u044f \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u0430\u00bb \u041e\u0421 \u0410\u0432\u0440\u043e\u0440\u0430 \u0434\u043e 5.1.5 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21161543)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043c\u0443\u043b\u044c\u0442\u0438\u043c\u0435\u0434\u0438\u0439\u043d\u043e\u0433\u043e \u0444\u0440\u0435\u0439\u043c\u0432\u043e\u0440\u043a\u0430 Gstreamer, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u043f\u0430\u043c\u044f\u0442\u0438 \u043f\u043e\u0441\u043b\u0435 \u0435\u0451 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u044f, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u043f\u043e\u0441\u043b\u0435 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u044f (CWE-416)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043c\u0443\u043b\u044c\u0442\u0438\u043c\u0435\u0434\u0438\u0439\u043d\u043e\u0433\u043e \u0444\u0440\u0435\u0439\u043c\u0432\u043e\u0440\u043a\u0430 Gstreamer \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u043f\u0430\u043c\u044f\u0442\u0438 \u043f\u043e\u0441\u043b\u0435 \u0435\u0451 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u044f. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://security-tracker.debian.org/tracker/CVE-2024-47834\nhttps://access.redhat.com/security/cve/cve-2024-47834\nhttps://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8057.patch\t\nhttps://gstreamer.freedesktop.org/security/sa-2024-0030.html\t\nhttps://securitylab.github.com/advisories/GHSL-2024-280_Gstreamer/\nhttps://redos.red-soft.ru/support/secure/uyazvimosti/mnozhestvennye-uyazvimosti-gstreamer1-plugins-good/?sphrase_id=641086\nhttps://\u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0430.\u043d\u043f\u043f\u043a\u0442.\u0440\u0444/bin/view/\u041e\u0421\u043d\u043e\u0432\u0430/\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f/2.13/\nhttps://wiki.astralinux.ru/astra-linux-se18-bulletin-2025-0811SE18\nhttps://errata.msvsphere-os.ru/definition/9/INFCSA-2025:7242?lang=ru\nhttps://wiki.astralinux.ru/astra-linux-se17-bulletin-2025-1202SE17\nhttps://wiki.astralinux.ru/astra-linux-se47-bulletin-2025-1216SE110\nhttps://cve.omp.ru/bb30515",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-416",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041d\u0438\u0437\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 3,6)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 5,1)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 4.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 5,1)"
}
WID-SEC-W-2024-3586
Vulnerability from csaf_certbund - Published: 2024-12-03 23:00 - Updated: 2025-09-17 22:00Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "GStreamer ist ein Multimedia-Framework mit einer Plugin-basierten Architektur f\u00fcr eine Vielzahl von Plattformen.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in GStreamer ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-3586 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3586.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-3586 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3586"
},
{
"category": "external",
"summary": "GStreamer Security Advisory vom 2024-12-03",
"url": "https://gstreamer.freedesktop.org/security/sa-2024-0005.html"
},
{
"category": "external",
"summary": "GStreamer Security Advisory vom 2024-12-03",
"url": "https://gstreamer.freedesktop.org/security/sa-2024-0006.html"
},
{
"category": "external",
"summary": "GStreamer Security Advisory vom 2024-12-03",
"url": "https://gstreamer.freedesktop.org/security/sa-2024-0007.html"
},
{
"category": "external",
"summary": "GStreamer Security Advisory vom 2024-12-03",
"url": "https://gstreamer.freedesktop.org/security/sa-2024-0008.html"
},
{
"category": "external",
"summary": "GStreamer Security Advisory vom 2024-12-03",
"url": "https://gstreamer.freedesktop.org/security/sa-2024-0009.html"
},
{
"category": "external",
"summary": "GStreamer Security Advisory vom 2024-12-03",
"url": "https://gstreamer.freedesktop.org/security/sa-2024-0010.html"
},
{
"category": "external",
"summary": "GStreamer Security Advisory vom 2024-12-03",
"url": "https://gstreamer.freedesktop.org/security/sa-2024-0011.html"
},
{
"category": "external",
"summary": "GStreamer Security Advisory vom 2024-12-03",
"url": "https://gstreamer.freedesktop.org/security/sa-2024-0012.html"
},
{
"category": "external",
"summary": "GStreamer Security Advisory vom 2024-12-03",
"url": "https://gstreamer.freedesktop.org/security/sa-2024-0013.html"
},
{
"category": "external",
"summary": "GStreamer Security Advisory vom 2024-12-03",
"url": "https://gstreamer.freedesktop.org/security/sa-2024-0014.html"
},
{
"category": "external",
"summary": "GStreamer Security Advisory vom 2024-12-03",
"url": "https://gstreamer.freedesktop.org/security/sa-2024-0015.html"
},
{
"category": "external",
"summary": "GStreamer Security Advisory vom 2024-12-03",
"url": "https://gstreamer.freedesktop.org/security/sa-2024-0016.html"
},
{
"category": "external",
"summary": "GStreamer Security Advisory vom 2024-12-03",
"url": "https://gstreamer.freedesktop.org/security/sa-2024-0017.html"
},
{
"category": "external",
"summary": "GStreamer Security Advisory vom 2024-12-03",
"url": "https://gstreamer.freedesktop.org/security/sa-2024-0018.html"
},
{
"category": "external",
"summary": "GStreamer Security Advisory vom 2024-12-03",
"url": "https://gstreamer.freedesktop.org/security/sa-2024-0019.html"
},
{
"category": "external",
"summary": "GStreamer Security Advisory vom 2024-12-03",
"url": "https://gstreamer.freedesktop.org/security/sa-2024-0020.html"
},
{
"category": "external",
"summary": "GStreamer Security Advisory vom 2024-12-03",
"url": "https://gstreamer.freedesktop.org/security/sa-2024-0021.html"
},
{
"category": "external",
"summary": "GStreamer Security Advisory vom 2024-12-03",
"url": "https://gstreamer.freedesktop.org/security/sa-2024-0022.html"
},
{
"category": "external",
"summary": "GStreamer Security Advisory vom 2024-12-03",
"url": "https://gstreamer.freedesktop.org/security/sa-2024-0023.html"
},
{
"category": "external",
"summary": "GStreamer Security Advisory vom 2024-12-03",
"url": "https://gstreamer.freedesktop.org/security/sa-2024-0024.html"
},
{
"category": "external",
"summary": "GStreamer Security Advisory vom 2024-12-03",
"url": "https://gstreamer.freedesktop.org/security/sa-2024-0025.html"
},
{
"category": "external",
"summary": "GStreamer Security Advisory vom 2024-12-03",
"url": "https://gstreamer.freedesktop.org/security/sa-2024-0026.html"
},
{
"category": "external",
"summary": "GStreamer Security Advisory vom 2024-12-03",
"url": "https://gstreamer.freedesktop.org/security/sa-2024-0027.html"
},
{
"category": "external",
"summary": "GStreamer Security Advisory vom 2024-12-03",
"url": "https://gstreamer.freedesktop.org/security/sa-2024-0028.html"
},
{
"category": "external",
"summary": "GStreamer Security Advisory vom 2024-12-03",
"url": "https://gstreamer.freedesktop.org/security/sa-2024-0029.html"
},
{
"category": "external",
"summary": "GStreamer Security Advisory vom 2024-12-03",
"url": "https://gstreamer.freedesktop.org/security/sa-2024-0030.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2024:14576-1 vom 2024-12-14",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/WXI5GJB5BPV65JTOGBHL6STLB5HKYOIT/"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2024-0A5722A980 vom 2024-12-13",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-0a5722a980"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2024-2284729772 vom 2024-12-13",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-2284729772"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-3994 vom 2024-12-15",
"url": "https://lists.debian.org/debian-lts-announce/2024/12/msg00016.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5831 vom 2024-12-14",
"url": "https://lists.debian.org/debian-security-announce/2024/msg00247.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2024:14577-1 vom 2024-12-14",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/M64SNUMTNONUECANIAVBUNBV6RTL5TDY/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2024:14578-1 vom 2024-12-14",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/GZDF3P2GSSY47IWYHI5OBEEMZAKWSY3E/"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:11142 vom 2024-12-16",
"url": "https://access.redhat.com/errata/RHSA-2024:11142"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:11143 vom 2024-12-16",
"url": "https://access.redhat.com/errata/RHSA-2024:11143"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-11122 vom 2024-12-16",
"url": "https://linux.oracle.com/errata/ELSA-2024-11122.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:11121 vom 2024-12-16",
"url": "https://access.redhat.com/errata/RHSA-2024:11121"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:11122 vom 2024-12-16",
"url": "https://access.redhat.com/errata/RHSA-2024:11122"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-11123 vom 2024-12-16",
"url": "https://linux.oracle.com/errata/ELSA-2024-11123.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:11123 vom 2024-12-17",
"url": "https://access.redhat.com/errata/RHSA-2024:11123"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:11148 vom 2024-12-16",
"url": "https://access.redhat.com/errata/RHSA-2024:11148"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:11149 vom 2024-12-16",
"url": "https://access.redhat.com/errata/RHSA-2024:11149"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:11119 vom 2024-12-17",
"url": "https://access.redhat.com/errata/RHSA-2024:11119"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:11117 vom 2024-12-16",
"url": "https://access.redhat.com/errata/RHSA-2024:11117"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:11118 vom 2024-12-16",
"url": "https://access.redhat.com/errata/RHSA-2024:11118"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:11120 vom 2024-12-16",
"url": "https://access.redhat.com/errata/RHSA-2024:11120"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:11130 vom 2024-12-16",
"url": "https://access.redhat.com/errata/RHSA-2024:11130"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:11141 vom 2024-12-16",
"url": "https://access.redhat.com/errata/RHSA-2024:11141"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5832 vom 2024-12-16",
"url": "https://lists.debian.org/debian-security-announce/2024/msg00248.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:11344 vom 2024-12-18",
"url": "https://access.redhat.com/errata/RHSA-2024:11344"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:11298 vom 2024-12-17",
"url": "https://access.redhat.com/errata/RHSA-2024:11298"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:11299 vom 2024-12-17",
"url": "https://access.redhat.com/errata/RHSA-2024:11299"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2024:14586-1 vom 2024-12-17",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/VA7KHMN2HFQR3FAIRY63QCQKG6UT7ERD/"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:11345 vom 2024-12-18",
"url": "https://access.redhat.com/errata/RHSA-2024:11345"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:11346 vom 2024-12-18",
"url": "https://access.redhat.com/errata/RHSA-2024:11346"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:11348 vom 2024-12-18",
"url": "https://access.redhat.com/errata/RHSA-2024:11348"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-11299 vom 2024-12-18",
"url": "https://linux.oracle.com/errata/ELSA-2024-11299.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7175-1 vom 2024-12-18",
"url": "https://ubuntu.com/security/notices/USN-7175-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7174-1 vom 2024-12-18",
"url": "https://ubuntu.com/security/notices/USN-7174-1"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2024:11345 vom 2024-12-19",
"url": "https://errata.build.resf.org/RLSA-2024:11345"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2024:11299 vom 2024-12-19",
"url": "https://errata.build.resf.org/RLSA-2024:11299"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7176-1 vom 2024-12-18",
"url": "https://ubuntu.com/security/notices/USN-7176-1"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-11345 vom 2024-12-19",
"url": "https://oss.oracle.com/pipermail/el-errata/2024-December/016901.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-3999 vom 2024-12-21",
"url": "https://lists.debian.org/debian-lts-announce/2024/12/msg00021.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5838 vom 2024-12-29",
"url": "https://lists.debian.org/debian-security-announce/2024/msg00254.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0054-1 vom 2025-01-09",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/MNQ2GHGDH27EWFX2SJ2D6LN572NZSBBA/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0052-1 vom 2025-01-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020082.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0051-1 vom 2025-01-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020083.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0055-1 vom 2025-01-09",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZR4JWLTM5UGIYENGQ4DPVYNAVYUZGQ2S/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0053-1 vom 2025-01-09",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/UWQ66UIR5WRSR2SWK4O4RDXEV5TAXHWR/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0055-1 vom 2025-01-09",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/ZR4JWLTM5UGIYENGQ4DPVYNAVYUZGQ2S/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0064-1 vom 2025-01-10",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/7W7QOMEYC4R74XEEEPFRHKF4KPKXOAZK/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0063-1 vom 2025-01-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020091.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0070-1 vom 2025-01-10",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/RSNXDG7USAA66J56ZNWCMGBNR7PL7CWA/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0062-1 vom 2025-01-10",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/L6PQD7WSYFKEV4MOXFK4RF3JE52NNZGT/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0065-1 vom 2025-01-10",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/TYNVPA6D3WYFGX2GQTXNS26KWPXVLGJC/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0069-1 vom 2025-01-10",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/BUKXU7D73HX7CQRDDBFEG7DOYTL345VF/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0067-1 vom 2025-01-10",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/AFLFHXQBE5DG5JSEMYSZ3UCUIGVNZUPJ/"
},
{
"category": "external",
"summary": "IGEL Security Notice ISN-2025-03 vom 2025-01-16",
"url": "https://kb.igel.com/security-safety/current/isn-2025-03-gstreamer-vulnerabilities"
},
{
"category": "external",
"summary": "ExtremeNetworks Vulnerability Notice SA-2025-006 vom 2025-01-23",
"url": "https://extreme-networks.my.site.com/ExtrArticleDetail?an=000122668"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-11344 vom 2025-01-31",
"url": "https://linux.oracle.com/errata/ELSA-2024-11344.html"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7182192 vom 2025-01-31",
"url": "https://www.ibm.com/support/pages/node/7182192"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2025-2746 vom 2025-02-04",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2025-2746.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2025-2748 vom 2025-02-04",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2025-2748.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4071 vom 2025-02-28",
"url": "https://lists.debian.org/debian-lts-announce/2025/02/msg00035.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2025-2776 vom 2025-03-07",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2025-2776.html"
},
{
"category": "external",
"summary": "Azul Zulu builds of OpenJDK vom 2025-04-15",
"url": "https://docs.azul.com/core/pdfs/april-2025/azul-zulu-ca-release-notes-april-2025-rev1.0.pdf"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:7243 vom 2025-05-13",
"url": "https://access.redhat.com/errata/RHSA-2025:7243"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:7242 vom 2025-05-13",
"url": "https://access.redhat.com/errata/RHSA-2025:7242"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20241-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021081.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20240-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021082.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20134-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021197.html"
},
{
"category": "external",
"summary": "Gentoo Linux Security Advisory GLSA-202506-02 vom 2025-06-12",
"url": "https://security.gentoo.org/glsa/202506-02"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02020-1 vom 2025-06-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021581.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02034-1 vom 2025-06-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021606.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02055-1 vom 2025-06-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021608.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02053-1 vom 2025-06-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021609.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02058-1 vom 2025-06-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021619.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:00063-1 vom 2025-06-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021641.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02347-1 vom 2025-07-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021838.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2025-2971 vom 2025-08-19",
"url": "https://alas.aws.amazon.com/AL2/ALAS2-2025-2971.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2025-2964 vom 2025-08-19",
"url": "https://alas.aws.amazon.com/AL2/ALAS2-2025-2964.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2025-3003 vom 2025-09-16",
"url": "https://alas.aws.amazon.com/AL2/ALAS2-2025-3003.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20693-1 vom 2025-09-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022578.html"
}
],
"source_lang": "en-US",
"title": "GStreamer: Mehrere Schwachstellen erm\u00f6glichen Denial of Service",
"tracking": {
"current_release_date": "2025-09-17T22:00:00.000+00:00",
"generator": {
"date": "2025-09-18T07:17:06.004+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2024-3586",
"initial_release_date": "2024-12-03T23:00:00.000+00:00",
"revision_history": [
{
"date": "2024-12-03T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-12-15T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von openSUSE, Fedora und Debian aufgenommen"
},
{
"date": "2024-12-16T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Red Hat, Oracle Linux und Debian aufgenommen"
},
{
"date": "2024-12-17T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Red Hat und openSUSE aufgenommen"
},
{
"date": "2024-12-18T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Ubuntu und Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2024-12-19T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-12-22T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2024-12-29T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-01-09T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-01-12T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-01-15T23:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von IGEL aufgenommen"
},
{
"date": "2025-01-23T23:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von ExtremeNetworks aufgenommen"
},
{
"date": "2025-01-30T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Oracle Linux und IBM aufgenommen"
},
{
"date": "2025-02-04T23:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-02-27T23:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-03-09T23:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-04-15T22:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates aufgenommen"
},
{
"date": "2025-05-12T22:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-06-03T22:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-12T22:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von Gentoo aufgenommen"
},
{
"date": "2025-06-19T22:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-22T22:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-24T22:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-07-17T22:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-07-31T22:00:00.000+00:00",
"number": "25",
"summary": "Referenz(en) aufgenommen:"
},
{
"date": "2025-08-19T22:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-09-16T22:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-09-17T22:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von SUSE aufgenommen"
}
],
"status": "final",
"version": "28"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Azul Zulu",
"product": {
"name": "Azul Zulu",
"product_id": "T034269",
"product_identification_helper": {
"cpe": "cpe:/a:azul:zulu:-"
}
}
}
],
"category": "vendor",
"name": "Azul"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Fedora Linux",
"product": {
"name": "Fedora Linux",
"product_id": "74185",
"product_identification_helper": {
"cpe": "cpe:/o:fedoraproject:fedora:-"
}
}
}
],
"category": "vendor",
"name": "Fedora"
},
{
"branches": [
{
"category": "product_name",
"name": "Gentoo Linux",
"product": {
"name": "Gentoo Linux",
"product_id": "T012167",
"product_identification_helper": {
"cpe": "cpe:/o:gentoo:linux:-"
}
}
}
],
"category": "vendor",
"name": "Gentoo"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "Certified Container",
"product": {
"name": "IBM App Connect Enterprise Certified Container",
"product_id": "T037907",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:app_connect_enterprise:certified_container"
}
}
}
],
"category": "product_name",
"name": "App Connect Enterprise"
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c12.6.1",
"product": {
"name": "IGEL OS \u003c12.6.1",
"product_id": "T040362"
}
},
{
"category": "product_version",
"name": "12.6.1",
"product": {
"name": "IGEL OS 12.6.1",
"product_id": "T040362-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:igel:os:12.6.1"
}
}
},
{
"category": "product_version_range",
"name": "\u003c11.10.250",
"product": {
"name": "IGEL OS \u003c11.10.250",
"product_id": "T040363"
}
},
{
"category": "product_version",
"name": "11.10.250",
"product": {
"name": "IGEL OS 11.10.250",
"product_id": "T040363-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:igel:os:11.10.250"
}
}
}
],
"category": "product_name",
"name": "OS"
}
],
"category": "vendor",
"name": "IGEL"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "gst-plugins-good \u003c1.24.10",
"product": {
"name": "Open Source GStreamer gst-plugins-good \u003c1.24.10",
"product_id": "T039548"
}
},
{
"category": "product_version",
"name": "gst-plugins-good 1.24.10",
"product": {
"name": "Open Source GStreamer gst-plugins-good 1.24.10",
"product_id": "T039548-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:open_source:gstreamer:gst-plugins-good__1.24.10"
}
}
},
{
"category": "product_version_range",
"name": "ExtremeCloud IQ SE \u003c24.10.13",
"product": {
"name": "Open Source GStreamer ExtremeCloud IQ SE \u003c24.10.13",
"product_id": "T040600"
}
},
{
"category": "product_version",
"name": "ExtremeCloud IQ SE 24.10.13",
"product": {
"name": "Open Source GStreamer ExtremeCloud IQ SE 24.10.13",
"product_id": "T040600-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:open_source:gstreamer:extremecloud_iq_se__24.10.13"
}
}
},
{
"category": "product_version_range",
"name": "ExtremeAnalytics SE \u003c24.10.13",
"product": {
"name": "Open Source GStreamer ExtremeAnalytics SE \u003c24.10.13",
"product_id": "T040601"
}
},
{
"category": "product_version",
"name": "ExtremeAnalytics SE 24.10.13",
"product": {
"name": "Open Source GStreamer ExtremeAnalytics SE 24.10.13",
"product_id": "T040601-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:open_source:gstreamer:extremeanalytics_se__24.10.13"
}
}
},
{
"category": "product_version_range",
"name": "ExtremeControl SE \u003c24.10.13",
"product": {
"name": "Open Source GStreamer ExtremeControl SE \u003c24.10.13",
"product_id": "T040602"
}
},
{
"category": "product_version",
"name": "ExtremeControl SE 24.10.13",
"product": {
"name": "Open Source GStreamer ExtremeControl SE 24.10.13",
"product_id": "T040602-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:open_source:gstreamer:extremecontrol_se__24.10.13"
}
}
}
],
"category": "product_name",
"name": "GStreamer"
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
},
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-47537",
"product_status": {
"known_affected": [
"T034269",
"67646",
"T040602",
"T039548",
"T012167",
"T004914",
"T032255",
"74185",
"T040362",
"2951",
"T002207",
"T000126",
"T027843",
"T040601",
"T040600",
"398363",
"T037907",
"T040363"
]
},
"release_date": "2024-12-03T23:00:00.000+00:00",
"title": "CVE-2024-47537"
},
{
"cve": "CVE-2024-47538",
"product_status": {
"known_affected": [
"T034269",
"67646",
"T040602",
"T039548",
"T012167",
"T004914",
"T032255",
"74185",
"T040362",
"2951",
"T002207",
"T000126",
"T027843",
"T040601",
"T040600",
"398363",
"T037907",
"T040363"
]
},
"release_date": "2024-12-03T23:00:00.000+00:00",
"title": "CVE-2024-47538"
},
{
"cve": "CVE-2024-47539",
"product_status": {
"known_affected": [
"T034269",
"67646",
"T040602",
"T039548",
"T012167",
"T004914",
"T032255",
"74185",
"T040362",
"2951",
"T002207",
"T000126",
"T027843",
"T040601",
"T040600",
"398363",
"T037907",
"T040363"
]
},
"release_date": "2024-12-03T23:00:00.000+00:00",
"title": "CVE-2024-47539"
},
{
"cve": "CVE-2024-47540",
"product_status": {
"known_affected": [
"T034269",
"67646",
"T040602",
"T039548",
"T012167",
"T004914",
"T032255",
"74185",
"T040362",
"2951",
"T002207",
"T000126",
"T027843",
"T040601",
"T040600",
"398363",
"T037907",
"T040363"
]
},
"release_date": "2024-12-03T23:00:00.000+00:00",
"title": "CVE-2024-47540"
},
{
"cve": "CVE-2024-47541",
"product_status": {
"known_affected": [
"T034269",
"67646",
"T040602",
"T039548",
"T012167",
"T004914",
"T032255",
"74185",
"T040362",
"2951",
"T002207",
"T000126",
"T027843",
"T040601",
"T040600",
"398363",
"T037907",
"T040363"
]
},
"release_date": "2024-12-03T23:00:00.000+00:00",
"title": "CVE-2024-47541"
},
{
"cve": "CVE-2024-47542",
"product_status": {
"known_affected": [
"T034269",
"67646",
"T040602",
"T039548",
"T012167",
"T004914",
"T032255",
"74185",
"T040362",
"2951",
"T002207",
"T000126",
"T027843",
"T040601",
"T040600",
"398363",
"T037907",
"T040363"
]
},
"release_date": "2024-12-03T23:00:00.000+00:00",
"title": "CVE-2024-47542"
},
{
"cve": "CVE-2024-47543",
"product_status": {
"known_affected": [
"T034269",
"67646",
"T040602",
"T039548",
"T012167",
"T004914",
"T032255",
"74185",
"T040362",
"2951",
"T002207",
"T000126",
"T027843",
"T040601",
"T040600",
"398363",
"T037907",
"T040363"
]
},
"release_date": "2024-12-03T23:00:00.000+00:00",
"title": "CVE-2024-47543"
},
{
"cve": "CVE-2024-47544",
"product_status": {
"known_affected": [
"T034269",
"67646",
"T040602",
"T039548",
"T012167",
"T004914",
"T032255",
"74185",
"T040362",
"2951",
"T002207",
"T000126",
"T027843",
"T040601",
"T040600",
"398363",
"T037907",
"T040363"
]
},
"release_date": "2024-12-03T23:00:00.000+00:00",
"title": "CVE-2024-47544"
},
{
"cve": "CVE-2024-47545",
"product_status": {
"known_affected": [
"T034269",
"67646",
"T040602",
"T039548",
"T012167",
"T004914",
"T032255",
"74185",
"T040362",
"2951",
"T002207",
"T000126",
"T027843",
"T040601",
"T040600",
"398363",
"T037907",
"T040363"
]
},
"release_date": "2024-12-03T23:00:00.000+00:00",
"title": "CVE-2024-47545"
},
{
"cve": "CVE-2024-47546",
"product_status": {
"known_affected": [
"T034269",
"67646",
"T040602",
"T039548",
"T012167",
"T004914",
"T032255",
"74185",
"T040362",
"2951",
"T002207",
"T000126",
"T027843",
"T040601",
"T040600",
"398363",
"T037907",
"T040363"
]
},
"release_date": "2024-12-03T23:00:00.000+00:00",
"title": "CVE-2024-47546"
},
{
"cve": "CVE-2024-47596",
"product_status": {
"known_affected": [
"T034269",
"67646",
"T040602",
"T039548",
"T012167",
"T004914",
"T032255",
"74185",
"T040362",
"2951",
"T002207",
"T000126",
"T027843",
"T040601",
"T040600",
"398363",
"T037907",
"T040363"
]
},
"release_date": "2024-12-03T23:00:00.000+00:00",
"title": "CVE-2024-47596"
},
{
"cve": "CVE-2024-47597",
"product_status": {
"known_affected": [
"T034269",
"67646",
"T040602",
"T039548",
"T012167",
"T004914",
"T032255",
"74185",
"T040362",
"2951",
"T002207",
"T000126",
"T027843",
"T040601",
"T040600",
"398363",
"T037907",
"T040363"
]
},
"release_date": "2024-12-03T23:00:00.000+00:00",
"title": "CVE-2024-47597"
},
{
"cve": "CVE-2024-47598",
"product_status": {
"known_affected": [
"T034269",
"67646",
"T040602",
"T039548",
"T012167",
"T004914",
"T032255",
"74185",
"T040362",
"2951",
"T002207",
"T000126",
"T027843",
"T040601",
"T040600",
"398363",
"T037907",
"T040363"
]
},
"release_date": "2024-12-03T23:00:00.000+00:00",
"title": "CVE-2024-47598"
},
{
"cve": "CVE-2024-47599",
"product_status": {
"known_affected": [
"T034269",
"67646",
"T040602",
"T039548",
"T012167",
"T004914",
"T032255",
"74185",
"T040362",
"2951",
"T002207",
"T000126",
"T027843",
"T040601",
"T040600",
"398363",
"T037907",
"T040363"
]
},
"release_date": "2024-12-03T23:00:00.000+00:00",
"title": "CVE-2024-47599"
},
{
"cve": "CVE-2024-47600",
"product_status": {
"known_affected": [
"T034269",
"67646",
"T040602",
"T039548",
"T012167",
"T004914",
"T032255",
"74185",
"T040362",
"2951",
"T002207",
"T000126",
"T027843",
"T040601",
"T040600",
"398363",
"T037907",
"T040363"
]
},
"release_date": "2024-12-03T23:00:00.000+00:00",
"title": "CVE-2024-47600"
},
{
"cve": "CVE-2024-47601",
"product_status": {
"known_affected": [
"T034269",
"67646",
"T040602",
"T039548",
"T012167",
"T004914",
"T032255",
"74185",
"T040362",
"2951",
"T002207",
"T000126",
"T027843",
"T040601",
"T040600",
"398363",
"T037907",
"T040363"
]
},
"release_date": "2024-12-03T23:00:00.000+00:00",
"title": "CVE-2024-47601"
},
{
"cve": "CVE-2024-47602",
"product_status": {
"known_affected": [
"T034269",
"67646",
"T040602",
"T039548",
"T012167",
"T004914",
"T032255",
"74185",
"T040362",
"2951",
"T002207",
"T000126",
"T027843",
"T040601",
"T040600",
"398363",
"T037907",
"T040363"
]
},
"release_date": "2024-12-03T23:00:00.000+00:00",
"title": "CVE-2024-47602"
},
{
"cve": "CVE-2024-47603",
"product_status": {
"known_affected": [
"T034269",
"67646",
"T040602",
"T039548",
"T012167",
"T004914",
"T032255",
"74185",
"T040362",
"2951",
"T002207",
"T000126",
"T027843",
"T040601",
"T040600",
"398363",
"T037907",
"T040363"
]
},
"release_date": "2024-12-03T23:00:00.000+00:00",
"title": "CVE-2024-47603"
},
{
"cve": "CVE-2024-47606",
"product_status": {
"known_affected": [
"T034269",
"67646",
"T040602",
"T039548",
"T012167",
"T004914",
"T032255",
"74185",
"T040362",
"2951",
"T002207",
"T000126",
"T027843",
"T040601",
"T040600",
"398363",
"T037907",
"T040363"
]
},
"release_date": "2024-12-03T23:00:00.000+00:00",
"title": "CVE-2024-47606"
},
{
"cve": "CVE-2024-47607",
"product_status": {
"known_affected": [
"T034269",
"67646",
"T040602",
"T039548",
"T012167",
"T004914",
"T032255",
"74185",
"T040362",
"2951",
"T002207",
"T000126",
"T027843",
"T040601",
"T040600",
"398363",
"T037907",
"T040363"
]
},
"release_date": "2024-12-03T23:00:00.000+00:00",
"title": "CVE-2024-47607"
},
{
"cve": "CVE-2024-47613",
"product_status": {
"known_affected": [
"T034269",
"67646",
"T040602",
"T039548",
"T012167",
"T004914",
"T032255",
"74185",
"T040362",
"2951",
"T002207",
"T000126",
"T027843",
"T040601",
"T040600",
"398363",
"T037907",
"T040363"
]
},
"release_date": "2024-12-03T23:00:00.000+00:00",
"title": "CVE-2024-47613"
},
{
"cve": "CVE-2024-47615",
"product_status": {
"known_affected": [
"T034269",
"67646",
"T040602",
"T039548",
"T012167",
"T004914",
"T032255",
"74185",
"T040362",
"2951",
"T002207",
"T000126",
"T027843",
"T040601",
"T040600",
"398363",
"T037907",
"T040363"
]
},
"release_date": "2024-12-03T23:00:00.000+00:00",
"title": "CVE-2024-47615"
},
{
"cve": "CVE-2024-47774",
"product_status": {
"known_affected": [
"T034269",
"67646",
"T040602",
"T039548",
"T012167",
"T004914",
"T032255",
"74185",
"T040362",
"2951",
"T002207",
"T000126",
"T027843",
"T040601",
"T040600",
"398363",
"T037907",
"T040363"
]
},
"release_date": "2024-12-03T23:00:00.000+00:00",
"title": "CVE-2024-47774"
},
{
"cve": "CVE-2024-47775",
"product_status": {
"known_affected": [
"T034269",
"67646",
"T040602",
"T039548",
"T012167",
"T004914",
"T032255",
"74185",
"T040362",
"2951",
"T002207",
"T000126",
"T027843",
"T040601",
"T040600",
"398363",
"T037907",
"T040363"
]
},
"release_date": "2024-12-03T23:00:00.000+00:00",
"title": "CVE-2024-47775"
},
{
"cve": "CVE-2024-47776",
"product_status": {
"known_affected": [
"T034269",
"67646",
"T040602",
"T039548",
"T012167",
"T004914",
"T032255",
"74185",
"T040362",
"2951",
"T002207",
"T000126",
"T027843",
"T040601",
"T040600",
"398363",
"T037907",
"T040363"
]
},
"release_date": "2024-12-03T23:00:00.000+00:00",
"title": "CVE-2024-47776"
},
{
"cve": "CVE-2024-47777",
"product_status": {
"known_affected": [
"T034269",
"67646",
"T040602",
"T039548",
"T012167",
"T004914",
"T032255",
"74185",
"T040362",
"2951",
"T002207",
"T000126",
"T027843",
"T040601",
"T040600",
"398363",
"T037907",
"T040363"
]
},
"release_date": "2024-12-03T23:00:00.000+00:00",
"title": "CVE-2024-47777"
},
{
"cve": "CVE-2024-47778",
"product_status": {
"known_affected": [
"T034269",
"67646",
"T040602",
"T039548",
"T012167",
"T004914",
"T032255",
"74185",
"T040362",
"2951",
"T002207",
"T000126",
"T027843",
"T040601",
"T040600",
"398363",
"T037907",
"T040363"
]
},
"release_date": "2024-12-03T23:00:00.000+00:00",
"title": "CVE-2024-47778"
},
{
"cve": "CVE-2024-47834",
"product_status": {
"known_affected": [
"T034269",
"67646",
"T040602",
"T039548",
"T012167",
"T004914",
"T032255",
"74185",
"T040362",
"2951",
"T002207",
"T000126",
"T027843",
"T040601",
"T040600",
"398363",
"T037907",
"T040363"
]
},
"release_date": "2024-12-03T23:00:00.000+00:00",
"title": "CVE-2024-47834"
},
{
"cve": "CVE-2024-47835",
"product_status": {
"known_affected": [
"T034269",
"67646",
"T040602",
"T039548",
"T012167",
"T004914",
"T032255",
"74185",
"T040362",
"2951",
"T002207",
"T000126",
"T027843",
"T040601",
"T040600",
"398363",
"T037907",
"T040363"
]
},
"release_date": "2024-12-03T23:00:00.000+00:00",
"title": "CVE-2024-47835"
}
]
}
cve-2024-47834
Vulnerability from osv_almalinux
GStreamer is a streaming media framework based on graphs of filters which operate on media data. The gstreamer1-plugins-good packages contain a collection of well-supported plug-ins of good quality and under the LGPL license.
Security Fix(es):
- gstreamer1-plugins-good: OOB-read in qtdemux_parse_container (CVE-2024-47543)
- gstreamer1-plugins-good: GStreamer has an OOB-read in gst_avi_subtitle_parse_gab2_chunk (CVE-2024-47774)
- gstreamer1-plugins-good: OOB-read in gst_wavparse_smpl_chunk (CVE-2024-47777)
- gstreamer1-plugins-good: OOB-read in gst_wavparse_adtl_chunk (CVE-2024-47778)
- gstreamer1-plugins-good: OOB-read in parse_ds64 (CVE-2024-47775)
- gstreamer1-plugins-good: OOB-read in FOURCC_SMI_ parsing (CVE-2024-47596)
- gstreamer1-plugins-good: insufficient error handling in JPEG decoder that can lead to NULL-pointer dereferences (CVE-2024-47599)
- gstreamer1-plugins-good: Use-After-Free read in Matroska CodecPrivate (CVE-2024-47834)
- gstreamer1-plugins-good: OOB-read in gst_wavparse_cue_chunk (CVE-2024-47776)
- gstreamer1-plugins-good: NULL-pointer dereferences in MP4/MOV demuxer CENC handling (CVE-2024-47544)
- gstreamer1-plugins-good: NULL-pointer dereference in Matroska/WebM demuxer (CVE-2024-47601)
- gstreamer1-plugins-good: OOB-read in qtdemux_parse_samples (CVE-2024-47597)
- gstreamer1-plugins-good: integer underflow in extract_cc_from_data leading to OOB-read (CVE-2024-47546)
- gstreamer1-plugins-good: NULL-pointer dereferences and out-of-bounds reads in Matroska/WebM demuxer (CVE-2024-47602)
- gstreamer1-plugins-good: OOB-read in qtdemux_merge_sample_table (CVE-2024-47598)
- gstreamer1-plugins-good: NULL-pointer dereference in Matroska/WebM demuxer (CVE-2024-47603)
- gstreamer1-plugins-good: integer underflow in FOURCC_strf parsing leading to OOB-read (CVE-2024-47545)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the AlmaLinuxRelease Notes linked from the References section.
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "gstreamer1-plugins-good"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.22.12-4.el9"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "gstreamer1-plugins-good-gtk"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.22.12-4.el9"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "GStreamer is a streaming media framework based on graphs of filters which operate on media data. The gstreamer1-plugins-good packages contain a collection of well-supported plug-ins of good quality and under the LGPL license. \n\nSecurity Fix(es): \n\n * gstreamer1-plugins-good: OOB-read in qtdemux_parse_container (CVE-2024-47543)\n * gstreamer1-plugins-good: GStreamer has an OOB-read in gst_avi_subtitle_parse_gab2_chunk (CVE-2024-47774)\n * gstreamer1-plugins-good: OOB-read in gst_wavparse_smpl_chunk (CVE-2024-47777)\n * gstreamer1-plugins-good: OOB-read in gst_wavparse_adtl_chunk (CVE-2024-47778)\n * gstreamer1-plugins-good: OOB-read in parse_ds64 (CVE-2024-47775)\n * gstreamer1-plugins-good: OOB-read in FOURCC_SMI_ parsing (CVE-2024-47596)\n * gstreamer1-plugins-good: insufficient error handling in JPEG decoder that can lead to NULL-pointer dereferences (CVE-2024-47599)\n * gstreamer1-plugins-good: Use-After-Free read in Matroska CodecPrivate (CVE-2024-47834)\n * gstreamer1-plugins-good: OOB-read in gst_wavparse_cue_chunk (CVE-2024-47776)\n * gstreamer1-plugins-good: NULL-pointer dereferences in MP4/MOV demuxer CENC handling (CVE-2024-47544)\n * gstreamer1-plugins-good: NULL-pointer dereference in Matroska/WebM demuxer (CVE-2024-47601)\n * gstreamer1-plugins-good: OOB-read in qtdemux_parse_samples (CVE-2024-47597)\n * gstreamer1-plugins-good: integer underflow in extract_cc_from_data leading to OOB-read (CVE-2024-47546)\n * gstreamer1-plugins-good: NULL-pointer dereferences and out-of-bounds reads in Matroska/WebM demuxer (CVE-2024-47602)\n * gstreamer1-plugins-good: OOB-read in qtdemux_merge_sample_table (CVE-2024-47598)\n * gstreamer1-plugins-good: NULL-pointer dereference in Matroska/WebM demuxer (CVE-2024-47603)\n * gstreamer1-plugins-good: integer underflow in FOURCC_strf parsing leading to OOB-read (CVE-2024-47545)\n\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. \n\nAdditional Changes: \n\nFor detailed information on changes in this release, see the AlmaLinuxRelease Notes linked from the References section.\n",
"id": "ALSA-2025:7242",
"modified": "2025-07-02T13:13:21Z",
"published": "2025-05-13T00:00:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2025:7242"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-47543"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-47544"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-47545"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-47546"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-47596"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-47597"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-47598"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-47599"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-47601"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-47602"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-47603"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-47774"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-47775"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-47776"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-47777"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-47778"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-47834"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2331723"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2331739"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2331741"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2331743"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2331744"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2331747"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2331748"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2331749"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2331750"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2331751"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2331752"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2331755"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2331756"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2331759"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2331761"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2331762"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2331763"
},
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/9/ALSA-2025-7242.html"
}
],
"related": [
"CVE-2024-47543",
"CVE-2024-47774",
"CVE-2024-47777",
"CVE-2024-47778",
"CVE-2024-47775",
"CVE-2024-47596",
"CVE-2024-47599",
"CVE-2024-47834",
"CVE-2024-47776",
"CVE-2024-47544",
"CVE-2024-47601",
"CVE-2024-47597",
"CVE-2024-47546",
"CVE-2024-47602",
"CVE-2024-47598",
"CVE-2024-47603",
"CVE-2024-47545"
],
"summary": "Moderate: gstreamer1-plugins-good security update"
}
CERTFR-2025-AVI-0661
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Splunk. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "AppDynamics Cluster Agent versions ant\u00e9rieures \u00e0 25.6.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": " AppDynamics On-Premise Enterprise Console versions ant\u00e9rieures \u00e0 25.4.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Splunk",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-30681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30681"
},
{
"name": "CVE-2019-17267",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17267"
},
{
"name": "CVE-2022-48564",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48564"
},
{
"name": "CVE-2021-21409",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21409"
},
{
"name": "CVE-2025-30689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30689"
},
{
"name": "CVE-2025-30715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30715"
},
{
"name": "CVE-2025-30682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30682"
},
{
"name": "CVE-2025-21500",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21500"
},
{
"name": "CVE-2023-1370",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1370"
},
{
"name": "CVE-2025-21503",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21503"
},
{
"name": "CVE-2025-21543",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21543"
},
{
"name": "CVE-2024-23944",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23944"
},
{
"name": "CVE-2024-47601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47601"
},
{
"name": "CVE-2025-21519",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21519"
},
{
"name": "CVE-2024-47544",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47544"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2024-47538",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47538"
},
{
"name": "CVE-2024-47545",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47545"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2022-38398",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38398"
},
{
"name": "CVE-2025-30703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30703"
},
{
"name": "CVE-2025-21505",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21505"
},
{
"name": "CVE-2022-45061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45061"
},
{
"name": "CVE-2024-4761",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4761"
},
{
"name": "CVE-2025-21501",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21501"
},
{
"name": "CVE-2024-47596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47596"
},
{
"name": "CVE-2022-48285",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48285"
},
{
"name": "CVE-2019-9674",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9674"
},
{
"name": "CVE-2025-30696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30696"
},
{
"name": "CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"name": "CVE-2020-10650",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10650"
},
{
"name": "CVE-2025-21584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21584"
},
{
"name": "CVE-2022-0391",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0391"
},
{
"name": "CVE-2020-36189",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36189"
},
{
"name": "CVE-2019-20444",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20444"
},
{
"name": "CVE-2023-34462",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34462"
},
{
"name": "CVE-2018-3824",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3824"
},
{
"name": "CVE-2024-7246",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7246"
},
{
"name": "CVE-2024-47602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47602"
},
{
"name": "CVE-2021-20190",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20190"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2024-47541",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47541"
},
{
"name": "CVE-2024-47774",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47774"
},
{
"name": "CVE-2023-50186",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50186"
},
{
"name": "CVE-2024-47599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47599"
},
{
"name": "CVE-2024-47606",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47606"
},
{
"name": "CVE-2019-16335",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16335"
},
{
"name": "CVE-2024-47540",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47540"
},
{
"name": "CVE-2023-3635",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3635"
},
{
"name": "CVE-2023-0833",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0833"
},
{
"name": "CVE-2024-47542",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47542"
},
{
"name": "CVE-2024-45590",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45590"
},
{
"name": "CVE-2018-7489",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7489"
},
{
"name": "CVE-2025-30683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30683"
},
{
"name": "CVE-2025-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30699"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2025-21531",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21531"
},
{
"name": "CVE-2023-35116",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35116"
},
{
"name": "CVE-2025-21555",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21555"
},
{
"name": "CVE-2024-47546",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47546"
},
{
"name": "CVE-2024-47607",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47607"
},
{
"name": "CVE-2021-37137",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37137"
},
{
"name": "CVE-2019-14439",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14439"
},
{
"name": "CVE-2025-21574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21574"
},
{
"name": "CVE-2025-27888",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27888"
},
{
"name": "CVE-2024-47537",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47537"
},
{
"name": "CVE-2025-21580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21580"
},
{
"name": "CVE-2024-52979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52979"
},
{
"name": "CVE-2025-21575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21575"
},
{
"name": "CVE-2023-6992",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6992"
},
{
"name": "CVE-2025-21540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21540"
},
{
"name": "CVE-2025-21577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21577"
},
{
"name": "CVE-2024-47778",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47778"
},
{
"name": "CVE-2022-24823",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24823"
},
{
"name": "CVE-2024-5642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5642"
},
{
"name": "CVE-2021-37136",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37136"
},
{
"name": "CVE-2018-12022",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12022"
},
{
"name": "CVE-2018-5968",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5968"
},
{
"name": "CVE-2024-47777",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47777"
},
{
"name": "CVE-2025-30705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30705"
},
{
"name": "CVE-2021-21295",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21295"
},
{
"name": "CVE-2021-4189",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4189"
},
{
"name": "CVE-2024-47543",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47543"
},
{
"name": "CVE-2019-16943",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16943"
},
{
"name": "CVE-2024-47600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47600"
},
{
"name": "CVE-2025-4802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
},
{
"name": "CVE-2021-43797",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43797"
},
{
"name": "CVE-2025-30684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30684"
},
{
"name": "CVE-2017-7525",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7525"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2025-21579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21579"
},
{
"name": "CVE-2019-17531",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17531"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2023-52428",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52428"
},
{
"name": "CVE-2025-21490",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21490"
},
{
"name": "CVE-2024-47835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47835"
},
{
"name": "CVE-2022-42004",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42004"
},
{
"name": "CVE-2024-47597",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47597"
},
{
"name": "CVE-2025-21520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21520"
},
{
"name": "CVE-2024-47539",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47539"
},
{
"name": "CVE-2021-23413",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23413"
},
{
"name": "CVE-2023-6378",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6378"
},
{
"name": "CVE-2022-4899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2022-40146",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40146"
},
{
"name": "CVE-2025-30721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30721"
},
{
"name": "CVE-2022-42890",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42890"
},
{
"name": "CVE-2019-10172",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10172"
},
{
"name": "CVE-2025-21491",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21491"
},
{
"name": "CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"name": "CVE-2020-36518",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36518"
},
{
"name": "CVE-2021-42550",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42550"
},
{
"name": "CVE-2025-30687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30687"
},
{
"name": "CVE-2024-47598",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47598"
},
{
"name": "CVE-2024-47603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47603"
},
{
"name": "CVE-2022-38648",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38648"
},
{
"name": "CVE-2025-21529",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21529"
},
{
"name": "CVE-2025-21559",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21559"
},
{
"name": "CVE-2019-14540",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14540"
},
{
"name": "CVE-2025-21523",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21523"
},
{
"name": "CVE-2025-21518",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21518"
},
{
"name": "CVE-2025-30704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30704"
},
{
"name": "CVE-2021-21290",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21290"
},
{
"name": "CVE-2024-47615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47615"
},
{
"name": "CVE-2025-30693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30693"
},
{
"name": "CVE-2025-21585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21585"
},
{
"name": "CVE-2017-17485",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17485"
},
{
"name": "CVE-2025-21497",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21497"
},
{
"name": "CVE-2019-14379",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14379"
},
{
"name": "CVE-2024-47776",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47776"
},
{
"name": "CVE-2024-47834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47834"
},
{
"name": "CVE-2024-47775",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47775"
},
{
"name": "CVE-2025-21581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21581"
},
{
"name": "CVE-2025-30685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30685"
},
{
"name": "CVE-2025-30695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30695"
},
{
"name": "CVE-2025-30688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30688"
},
{
"name": "CVE-2025-21522",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21522"
},
{
"name": "CVE-2019-16869",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16869"
},
{
"name": "CVE-2025-21546",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21546"
},
{
"name": "CVE-2024-51504",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51504"
},
{
"name": "CVE-2022-41881",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41881"
},
{
"name": "CVE-2022-41704",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41704"
},
{
"name": "CVE-2019-14892",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14892"
},
{
"name": "CVE-2019-20445",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20445"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0661",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-08-07T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Splunk. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Splunk",
"vendor_advisories": [
{
"published_at": "2025-08-06",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0802",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0802"
},
{
"published_at": "2025-08-06",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0801",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0801"
}
]
}
CERTFR-2025-AVI-0661
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Splunk. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "AppDynamics Cluster Agent versions ant\u00e9rieures \u00e0 25.6.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": " AppDynamics On-Premise Enterprise Console versions ant\u00e9rieures \u00e0 25.4.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Splunk",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-30681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30681"
},
{
"name": "CVE-2019-17267",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17267"
},
{
"name": "CVE-2022-48564",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48564"
},
{
"name": "CVE-2021-21409",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21409"
},
{
"name": "CVE-2025-30689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30689"
},
{
"name": "CVE-2025-30715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30715"
},
{
"name": "CVE-2025-30682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30682"
},
{
"name": "CVE-2025-21500",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21500"
},
{
"name": "CVE-2023-1370",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1370"
},
{
"name": "CVE-2025-21503",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21503"
},
{
"name": "CVE-2025-21543",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21543"
},
{
"name": "CVE-2024-23944",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23944"
},
{
"name": "CVE-2024-47601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47601"
},
{
"name": "CVE-2025-21519",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21519"
},
{
"name": "CVE-2024-47544",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47544"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2024-47538",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47538"
},
{
"name": "CVE-2024-47545",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47545"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2022-38398",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38398"
},
{
"name": "CVE-2025-30703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30703"
},
{
"name": "CVE-2025-21505",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21505"
},
{
"name": "CVE-2022-45061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45061"
},
{
"name": "CVE-2024-4761",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4761"
},
{
"name": "CVE-2025-21501",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21501"
},
{
"name": "CVE-2024-47596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47596"
},
{
"name": "CVE-2022-48285",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48285"
},
{
"name": "CVE-2019-9674",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9674"
},
{
"name": "CVE-2025-30696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30696"
},
{
"name": "CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"name": "CVE-2020-10650",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10650"
},
{
"name": "CVE-2025-21584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21584"
},
{
"name": "CVE-2022-0391",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0391"
},
{
"name": "CVE-2020-36189",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36189"
},
{
"name": "CVE-2019-20444",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20444"
},
{
"name": "CVE-2023-34462",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34462"
},
{
"name": "CVE-2018-3824",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3824"
},
{
"name": "CVE-2024-7246",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7246"
},
{
"name": "CVE-2024-47602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47602"
},
{
"name": "CVE-2021-20190",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20190"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2024-47541",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47541"
},
{
"name": "CVE-2024-47774",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47774"
},
{
"name": "CVE-2023-50186",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50186"
},
{
"name": "CVE-2024-47599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47599"
},
{
"name": "CVE-2024-47606",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47606"
},
{
"name": "CVE-2019-16335",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16335"
},
{
"name": "CVE-2024-47540",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47540"
},
{
"name": "CVE-2023-3635",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3635"
},
{
"name": "CVE-2023-0833",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0833"
},
{
"name": "CVE-2024-47542",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47542"
},
{
"name": "CVE-2024-45590",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45590"
},
{
"name": "CVE-2018-7489",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7489"
},
{
"name": "CVE-2025-30683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30683"
},
{
"name": "CVE-2025-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30699"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2025-21531",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21531"
},
{
"name": "CVE-2023-35116",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35116"
},
{
"name": "CVE-2025-21555",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21555"
},
{
"name": "CVE-2024-47546",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47546"
},
{
"name": "CVE-2024-47607",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47607"
},
{
"name": "CVE-2021-37137",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37137"
},
{
"name": "CVE-2019-14439",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14439"
},
{
"name": "CVE-2025-21574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21574"
},
{
"name": "CVE-2025-27888",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27888"
},
{
"name": "CVE-2024-47537",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47537"
},
{
"name": "CVE-2025-21580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21580"
},
{
"name": "CVE-2024-52979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52979"
},
{
"name": "CVE-2025-21575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21575"
},
{
"name": "CVE-2023-6992",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6992"
},
{
"name": "CVE-2025-21540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21540"
},
{
"name": "CVE-2025-21577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21577"
},
{
"name": "CVE-2024-47778",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47778"
},
{
"name": "CVE-2022-24823",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24823"
},
{
"name": "CVE-2024-5642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5642"
},
{
"name": "CVE-2021-37136",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37136"
},
{
"name": "CVE-2018-12022",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12022"
},
{
"name": "CVE-2018-5968",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5968"
},
{
"name": "CVE-2024-47777",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47777"
},
{
"name": "CVE-2025-30705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30705"
},
{
"name": "CVE-2021-21295",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21295"
},
{
"name": "CVE-2021-4189",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4189"
},
{
"name": "CVE-2024-47543",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47543"
},
{
"name": "CVE-2019-16943",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16943"
},
{
"name": "CVE-2024-47600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47600"
},
{
"name": "CVE-2025-4802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
},
{
"name": "CVE-2021-43797",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43797"
},
{
"name": "CVE-2025-30684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30684"
},
{
"name": "CVE-2017-7525",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7525"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2025-21579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21579"
},
{
"name": "CVE-2019-17531",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17531"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2023-52428",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52428"
},
{
"name": "CVE-2025-21490",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21490"
},
{
"name": "CVE-2024-47835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47835"
},
{
"name": "CVE-2022-42004",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42004"
},
{
"name": "CVE-2024-47597",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47597"
},
{
"name": "CVE-2025-21520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21520"
},
{
"name": "CVE-2024-47539",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47539"
},
{
"name": "CVE-2021-23413",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23413"
},
{
"name": "CVE-2023-6378",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6378"
},
{
"name": "CVE-2022-4899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2022-40146",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40146"
},
{
"name": "CVE-2025-30721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30721"
},
{
"name": "CVE-2022-42890",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42890"
},
{
"name": "CVE-2019-10172",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10172"
},
{
"name": "CVE-2025-21491",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21491"
},
{
"name": "CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"name": "CVE-2020-36518",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36518"
},
{
"name": "CVE-2021-42550",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42550"
},
{
"name": "CVE-2025-30687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30687"
},
{
"name": "CVE-2024-47598",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47598"
},
{
"name": "CVE-2024-47603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47603"
},
{
"name": "CVE-2022-38648",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38648"
},
{
"name": "CVE-2025-21529",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21529"
},
{
"name": "CVE-2025-21559",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21559"
},
{
"name": "CVE-2019-14540",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14540"
},
{
"name": "CVE-2025-21523",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21523"
},
{
"name": "CVE-2025-21518",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21518"
},
{
"name": "CVE-2025-30704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30704"
},
{
"name": "CVE-2021-21290",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21290"
},
{
"name": "CVE-2024-47615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47615"
},
{
"name": "CVE-2025-30693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30693"
},
{
"name": "CVE-2025-21585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21585"
},
{
"name": "CVE-2017-17485",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17485"
},
{
"name": "CVE-2025-21497",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21497"
},
{
"name": "CVE-2019-14379",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14379"
},
{
"name": "CVE-2024-47776",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47776"
},
{
"name": "CVE-2024-47834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47834"
},
{
"name": "CVE-2024-47775",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47775"
},
{
"name": "CVE-2025-21581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21581"
},
{
"name": "CVE-2025-30685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30685"
},
{
"name": "CVE-2025-30695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30695"
},
{
"name": "CVE-2025-30688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30688"
},
{
"name": "CVE-2025-21522",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21522"
},
{
"name": "CVE-2019-16869",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16869"
},
{
"name": "CVE-2025-21546",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21546"
},
{
"name": "CVE-2024-51504",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51504"
},
{
"name": "CVE-2022-41881",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41881"
},
{
"name": "CVE-2022-41704",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41704"
},
{
"name": "CVE-2019-14892",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14892"
},
{
"name": "CVE-2019-20445",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20445"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0661",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-08-07T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Splunk. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Splunk",
"vendor_advisories": [
{
"published_at": "2025-08-06",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0802",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0802"
},
{
"published_at": "2025-08-06",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0801",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0801"
}
]
}
FKIE_CVE-2024-47834
Vulnerability from fkie_nvd - Published: 2024-12-12 02:03 - Updated: 2025-11-03 21:16| Vendor | Product | Version | |
|---|---|---|---|
| gstreamer_project | gstreamer | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gstreamer_project:gstreamer:*:*:*:*:*:*:*:*",
"matchCriteriaId": "82BF8403-8CE2-4AFC-865F-FD40A77D20E0",
"versionEndExcluding": "1.24.10",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "GStreamer is a library for constructing graphs of media-handling components. An Use-After-Free read vulnerability has been discovered affecting the processing of CodecPrivate elements in Matroska streams. In the GST_MATROSKA_ID_CODECPRIVATE case within the gst_matroska_demux_parse_stream function, a data chunk is allocated using gst_ebml_read_binary. Later, the allocated memory is freed in the gst_matroska_track_free function, by the call to g_free (track-\u003ecodec_priv). Finally, the freed memory is accessed in the caps_serialize function through gst_value_serialize_buffer. The freed memory will be accessed in the gst_value_serialize_buffer function. This results in a UAF read vulnerability, as the function tries to process memory that has already been freed. This vulnerability is fixed in 1.24.10."
},
{
"lang": "es",
"value": "GStreamer es una librer\u00eda para construir gr\u00e1ficos de componentes de manejo de medios. Se ha descubierto una vulnerabilidad de lectura de tipo Use-After-Free que afecta el procesamiento de elementos CodecPrivate en transmisiones Matroska. En el caso GST_MATROSKA_ID_CODECPRIVATE dentro de la funci\u00f3n gst_matroska_demux_parse_stream, se asigna un fragmento de datos utilizando gst_ebml_read_binary. M\u00e1s tarde, la memoria asignada se libera en la funci\u00f3n gst_matroska_track_free, mediante la llamada a g_free (track-\u0026gt;codec_priv). Finalmente, se accede a la memoria liberada en la funci\u00f3n caps_serialize a trav\u00e9s de gst_value_serialize_buffer. Se acceder\u00e1 a la memoria liberada en la funci\u00f3n gst_value_serialize_buffer. Esto da como resultado una vulnerabilidad de lectura de UAF, ya que la funci\u00f3n intenta procesar la memoria que ya se ha liberado. Esta vulnerabilidad se corrigi\u00f3 en 1.24.10."
}
],
"id": "CVE-2024-47834",
"lastModified": "2025-11-03T21:16:30.680",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "LOCAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
},
"published": "2024-12-12T02:03:43.017",
"references": [
{
"source": "security-advisories@github.com",
"tags": [
"Patch"
],
"url": "https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8057.patch"
},
{
"source": "security-advisories@github.com",
"tags": [
"Release Notes"
],
"url": "https://gstreamer.freedesktop.org/security/sa-2024-0030.html"
},
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
],
"url": "https://securitylab.github.com/advisories/GHSL-2024-280_Gstreamer/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.debian.org/debian-lts-announce/2025/02/msg00035.html"
}
],
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-416"
}
],
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.