SUSE: 2022:3906-1 moderate: gstreamer-0_10-plugins-good
Summary
This update for gstreamer-0_10-plugins-good fixes the following issues: - CVE-2022-1920: Fixed an integer overflow while parsing matroska files (bsc#1201688). - CVE-2022-1921: Fixed an integer overflow while parsing avi files (bsc#1201693). - CVE-2022-1922: Fixed an integer overflow during mkv demuxing using zlib decompression (bsc#1201702). - CVE-2022-1923: Fixed an integer overflow during mkv demuxing using bzip decompression (bsc#1201704). - CVE-2022-1924: Fixed an integer overflow during mkv demuxing using lzo decompression (bsc#1201706). - CVE-2022-1925: Fixed an integer overflow during mkv demuxing using HEADERSTRIP decompression (bsc#1201707). - CVE-2022-2122: Fixed an integer overflow in qtdemux using zlib decompression (bsc#1201708). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Workstation Extension 12-SP5: zypper in -t patch SUSE-SLE-WE-12-SP5-2022-3906=1 Package List: - SUSE Linux Enterprise Workstation Extension 12-SP5 (x86_64): gstreamer-0_10-plugins-good-0.10.31-17.7.1 gstreamer-0_10-plugins-good-debuginfo-0.10.31-17.7.1 gstreamer-0_10-plugins-good-debugsource-0.10.31-17.7.1 - SUSE Linux Enterprise Workstation Extension 12-SP5 (noarch): gstreamer-0_10-plugins-good-lang-0.10.31-17.7.1
References
#1201688 #1201693 #1201702 #1201704 #1201706
#1201707 #1201708
Cross- CVE-2022-1920 CVE-2022-1921 CVE-2022-1922
CVE-2022-1923 CVE-2022-1924 CVE-2022-1925
CVE-2022-2122
CVSS scores:
CVE-2022-1920 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-1920 (SUSE): 6.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
CVE-2022-1921 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-1921 (SUSE): 6.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
CVE-2022-1922 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-1922 (SUSE): 6.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H
CVE-2022-1923 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-1923 (SUSE): 6.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H
CVE-2022-1924 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-1924 (SUSE): 6.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H
CVE-2022-1925 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-1925 (SUSE): 6.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H
CVE-2022-2122 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-2122 (SUSE): 6.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H
Affected Products:
SUSE Linux Enterprise Desktop 12-SP5
SUSE Linux Enterprise Server 12-SP5
SUSE Linux Enterprise Server for SAP Applications 12-SP5
SUSE Linux Enterprise Workstation Extension 12-SP5
https://www.suse.com/security/cve/CVE-2022-1920.html
https://www.suse.com/security/cve/CVE-2022-1921.html
https://www.suse.com/security/cve/CVE-2022-1922.html
https://www.suse.com/security/cve/CVE-2022-1923.html
https://www.suse.com/security/cve/CVE-2022-1924.html
https://www.suse.com/security/cve/CVE-2022-1925.html
https://www.suse.com/security/cve/CVE-2022-2122.html
https://bugzilla.suse.com/1201688
https://bugzilla.suse.com/1201693
https://bugzilla.suse.com/1201702
https://bugzilla.suse.com/1201704
https://bugzilla.suse.com/1201706
https://bugzilla.suse.com/1201707
https://bugzilla.suse.com/1201708