SUSE: 2022:3906-1 moderate: gstreamer-0_10-plugins-good | LinuxSecu...

   SUSE Security Update: Security update for gstreamer-0_10-plugins-good
______________________________________________________________________________

Announcement ID:    SUSE-SU-2022:3906-1
Rating:             moderate
References:         #1201688 #1201693 #1201702 #1201704 #1201706 
                    #1201707 #1201708 
Cross-References:   CVE-2022-1920 CVE-2022-1921 CVE-2022-1922
                    CVE-2022-1923 CVE-2022-1924 CVE-2022-1925
                    CVE-2022-2122
CVSS scores:
                    CVE-2022-1920 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-1920 (SUSE): 6.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
                    CVE-2022-1921 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-1921 (SUSE): 6.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
                    CVE-2022-1922 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-1922 (SUSE): 6.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H
                    CVE-2022-1923 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-1923 (SUSE): 6.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H
                    CVE-2022-1924 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-1924 (SUSE): 6.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H
                    CVE-2022-1925 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-1925 (SUSE): 6.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H
                    CVE-2022-2122 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-2122 (SUSE): 6.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H

Affected Products:
                    SUSE Linux Enterprise Desktop 12-SP5
                    SUSE Linux Enterprise Server 12-SP5
                    SUSE Linux Enterprise Server for SAP Applications 12-SP5
                    SUSE Linux Enterprise Workstation Extension 12-SP5
______________________________________________________________________________

   An update that fixes 7 vulnerabilities is now available.

Description:

   This update for gstreamer-0_10-plugins-good fixes the following issues:

   - CVE-2022-1920: Fixed an integer overflow while parsing matroska files
     (bsc#1201688).
   - CVE-2022-1921: Fixed an integer overflow while parsing avi files
     (bsc#1201693).
   - CVE-2022-1922: Fixed an integer overflow during mkv demuxing using zlib
     decompression (bsc#1201702).
   - CVE-2022-1923: Fixed an integer overflow during mkv demuxing using bzip
     decompression (bsc#1201704).
   - CVE-2022-1924: Fixed an integer overflow during mkv demuxing using lzo
     decompression (bsc#1201706).
   - CVE-2022-1925: Fixed an integer overflow during mkv demuxing using
     HEADERSTRIP decompression (bsc#1201707).
   - CVE-2022-2122: Fixed an integer overflow in qtdemux using zlib
     decompression (bsc#1201708).


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Workstation Extension 12-SP5:

      zypper in -t patch SUSE-SLE-WE-12-SP5-2022-3906=1



Package List:

   - SUSE Linux Enterprise Workstation Extension 12-SP5 (x86_64):

      gstreamer-0_10-plugins-good-0.10.31-17.7.1
      gstreamer-0_10-plugins-good-debuginfo-0.10.31-17.7.1
      gstreamer-0_10-plugins-good-debugsource-0.10.31-17.7.1

   - SUSE Linux Enterprise Workstation Extension 12-SP5 (noarch):

      gstreamer-0_10-plugins-good-lang-0.10.31-17.7.1


References:

   https://www.suse.com/security/cve/CVE-2022-1920.html
   https://www.suse.com/security/cve/CVE-2022-1921.html
   https://www.suse.com/security/cve/CVE-2022-1922.html
   https://www.suse.com/security/cve/CVE-2022-1923.html
   https://www.suse.com/security/cve/CVE-2022-1924.html
   https://www.suse.com/security/cve/CVE-2022-1925.html
   https://www.suse.com/security/cve/CVE-2022-2122.html
   https://bugzilla.suse.com/1201688
   https://bugzilla.suse.com/1201693
   https://bugzilla.suse.com/1201702
   https://bugzilla.suse.com/1201704
   https://bugzilla.suse.com/1201706
   https://bugzilla.suse.com/1201707
   https://bugzilla.suse.com/1201708

SUSE: 2022:3906-1 moderate: gstreamer-0_10-plugins-good

November 8, 2022
An update that fixes 7 vulnerabilities is now available

Summary

This update for gstreamer-0_10-plugins-good fixes the following issues: - CVE-2022-1920: Fixed an integer overflow while parsing matroska files (bsc#1201688). - CVE-2022-1921: Fixed an integer overflow while parsing avi files (bsc#1201693). - CVE-2022-1922: Fixed an integer overflow during mkv demuxing using zlib decompression (bsc#1201702). - CVE-2022-1923: Fixed an integer overflow during mkv demuxing using bzip decompression (bsc#1201704). - CVE-2022-1924: Fixed an integer overflow during mkv demuxing using lzo decompression (bsc#1201706). - CVE-2022-1925: Fixed an integer overflow during mkv demuxing using HEADERSTRIP decompression (bsc#1201707). - CVE-2022-2122: Fixed an integer overflow in qtdemux using zlib decompression (bsc#1201708). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Workstation Extension 12-SP5: zypper in -t patch SUSE-SLE-WE-12-SP5-2022-3906=1 Package List: - SUSE Linux Enterprise Workstation Extension 12-SP5 (x86_64): gstreamer-0_10-plugins-good-0.10.31-17.7.1 gstreamer-0_10-plugins-good-debuginfo-0.10.31-17.7.1 gstreamer-0_10-plugins-good-debugsource-0.10.31-17.7.1 - SUSE Linux Enterprise Workstation Extension 12-SP5 (noarch): gstreamer-0_10-plugins-good-lang-0.10.31-17.7.1

References

#1201688 #1201693 #1201702 #1201704 #1201706

#1201707 #1201708

Cross- CVE-2022-1920 CVE-2022-1921 CVE-2022-1922

CVE-2022-1923 CVE-2022-1924 CVE-2022-1925

CVE-2022-2122

CVSS scores:

CVE-2022-1920 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-1920 (SUSE): 6.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H

CVE-2022-1921 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-1921 (SUSE): 6.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H

CVE-2022-1922 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-1922 (SUSE): 6.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H

CVE-2022-1923 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-1923 (SUSE): 6.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H

CVE-2022-1924 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-1924 (SUSE): 6.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H

CVE-2022-1925 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-1925 (SUSE): 6.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H

CVE-2022-2122 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2022-2122 (SUSE): 6.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H

Affected Products:

SUSE Linux Enterprise Desktop 12-SP5

SUSE Linux Enterprise Server 12-SP5

SUSE Linux Enterprise Server for SAP Applications 12-SP5

SUSE Linux Enterprise Workstation Extension 12-SP5

https://www.suse.com/security/cve/CVE-2022-1920.html

https://www.suse.com/security/cve/CVE-2022-1921.html

https://www.suse.com/security/cve/CVE-2022-1922.html

https://www.suse.com/security/cve/CVE-2022-1923.html

https://www.suse.com/security/cve/CVE-2022-1924.html

https://www.suse.com/security/cve/CVE-2022-1925.html

https://www.suse.com/security/cve/CVE-2022-2122.html

https://bugzilla.suse.com/1201688

https://bugzilla.suse.com/1201693

https://bugzilla.suse.com/1201702

https://bugzilla.suse.com/1201704

https://bugzilla.suse.com/1201706

https://bugzilla.suse.com/1201707

https://bugzilla.suse.com/1201708

Severity
Announcement ID: SUSE-SU-2022:3906-1
Rating: moderate

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.