SUSE-SU-2023:3688-1: important: Security update for gstreamer-plugins-good
sle-security-updates at lists.suse.com
sle-security-updates at lists.suse.com
Tue Sep 19 16:30:10 UTC 2023
# Security update for gstreamer-plugins-good
Announcement ID: SUSE-SU-2023:3688-1
Rating: important
References:
* #1184739
* #1201688
* #1201693
* #1201702
* #1201704
* #1201706
* #1201707
* #1201708
* #1213128
Cross-References:
* CVE-2021-3497
* CVE-2022-1920
* CVE-2022-1921
* CVE-2022-1922
* CVE-2022-1923
* CVE-2022-1924
* CVE-2022-1925
* CVE-2022-2122
* CVE-2023-37327
CVSS scores:
* CVE-2021-3497 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-3497 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2022-1920 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
* CVE-2022-1920 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2022-1921 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
* CVE-2022-1921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2022-1922 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H
* CVE-2022-1922 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2022-1923 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H
* CVE-2022-1923 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2022-1924 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H
* CVE-2022-1924 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2022-1925 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H
* CVE-2022-1925 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2022-2122 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H
* CVE-2022-2122 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2023-37327 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Affected Products:
* SUSE Linux Enterprise Server 15 SP1
* SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1
* SUSE Linux Enterprise Server for SAP Applications 15 SP1
An update that solves nine vulnerabilities can now be installed.
## Description:
This update for gstreamer-plugins-good fixes the following issues:
* CVE-2021-3497: Matroskademux: Fix extraction of multichannel WavPack
(bsc#1184739).
* CVE-2022-1920: Fixed integer overflow in WavPack header handling code
(bsc#1201688).
* CVE-2022-1921: Fixed integer overflow resulting in heap corruption in
avidemux element (bsc#1201693).
* CVE-2022-1922: Fixed integer overflows in mkv demuxing (bsc#1201702).
* CVE-2022-1923: Fixed integer overflows in mkv demuxing using bzip
(bsc#1201704).
* CVE-2022-1924: Fixed integer overflows in mkv demuxing using lzo
(bsc#1201706).
* CVE-2022-1925: Fixed integer overflows in mkv demuxing using HEADERSTRIP
(bsc#1201707).
* CVE-2022-2122: Fixed integer overflows in qtdemux using zlib (bsc#1201708).
* CVE-2023-37327: Fixed GStreamer FLAC File Parsing Integer Overflow
(bsc#1213128).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1
zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-3688=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP1
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2023-3688=1
## Package List:
* SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (s390x)
* gstreamer-plugins-good-1.12.5-150000.3.7.2
* gstreamer-plugins-good-debuginfo-1.12.5-150000.3.7.2
* gstreamer-plugins-good-debugsource-1.12.5-150000.3.7.2
* SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (noarch)
* gstreamer-plugins-good-lang-1.12.5-150000.3.7.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP1 (ppc64le)
* gstreamer-plugins-good-1.12.5-150000.3.7.2
* gstreamer-plugins-good-debuginfo-1.12.5-150000.3.7.2
* gstreamer-plugins-good-debugsource-1.12.5-150000.3.7.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP1 (noarch)
* gstreamer-plugins-good-lang-1.12.5-150000.3.7.2
## References:
* https://www.suse.com/security/cve/CVE-2021-3497.html
* https://www.suse.com/security/cve/CVE-2022-1920.html
* https://www.suse.com/security/cve/CVE-2022-1921.html
* https://www.suse.com/security/cve/CVE-2022-1922.html
* https://www.suse.com/security/cve/CVE-2022-1923.html
* https://www.suse.com/security/cve/CVE-2022-1924.html
* https://www.suse.com/security/cve/CVE-2022-1925.html
* https://www.suse.com/security/cve/CVE-2022-2122.html
* https://www.suse.com/security/cve/CVE-2023-37327.html
* https://bugzilla.suse.com/show_bug.cgi?id=1184739
* https://bugzilla.suse.com/show_bug.cgi?id=1201688
* https://bugzilla.suse.com/show_bug.cgi?id=1201693
* https://bugzilla.suse.com/show_bug.cgi?id=1201702
* https://bugzilla.suse.com/show_bug.cgi?id=1201704
* https://bugzilla.suse.com/show_bug.cgi?id=1201706
* https://bugzilla.suse.com/show_bug.cgi?id=1201707
* https://bugzilla.suse.com/show_bug.cgi?id=1201708
* https://bugzilla.suse.com/show_bug.cgi?id=1213128
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-security-updates/attachments/20230919/441b09c0/attachment.htm>
More information about the sle-security-updates
mailing list