<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for gstreamer-plugins-base</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2025:20134-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2025-03-05T16:07:27Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2025-03-05T16:07:27Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-03-05T16:07:27Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for gstreamer-plugins-base</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for gstreamer-plugins-base fixes the following issues:

- CVE-2024-47538: Fixed stack-buffer overflow in vorbis_handle_identification_packet (bsc#1234415).
- CVE-2024-47835: Fixed NULL-pointer dereference in LRC subtitle parser (bsc#1234450).
- CVE-2024-47600: Fixed Out-of-bounds read in gst-discoverer-1.0 commandline tool (bsc#1234453).
- CVE-2024-47607: Fixed Stack buffer-overflow in Opus decoder (bsc#1234455).
- CVE-2024-47615: Fixed Out-of-bounds write in Ogg demuxer (bsc#1234456).
- CVE-2024-47541: Fixed out-of-bounds write in SSA subtitle parser (bsc#1234459).
- CVE-2024-47542: Fixed ID3v2 parser out-of-bounds read and NULL-pointer dereference (bsc#1234460).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-SLE-Micro-6.0-223</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202520134-1/</URL>
      <Description>Link for SUSE-SU-2025:20134-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2025-June/021197.html</URL>
      <Description>E-Mail link for SUSE-SU-2025:20134-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234415</URL>
      <Description>SUSE Bug 1234415</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234450</URL>
      <Description>SUSE Bug 1234450</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234453</URL>
      <Description>SUSE Bug 1234453</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234455</URL>
      <Description>SUSE Bug 1234455</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234456</URL>
      <Description>SUSE Bug 1234456</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234459</URL>
      <Description>SUSE Bug 1234459</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234460</URL>
      <Description>SUSE Bug 1234460</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-47538/</URL>
      <Description>SUSE CVE CVE-2024-47538 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-47541/</URL>
      <Description>SUSE CVE CVE-2024-47541 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-47542/</URL>
      <Description>SUSE CVE CVE-2024-47542 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-47600/</URL>
      <Description>SUSE CVE CVE-2024-47600 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-47607/</URL>
      <Description>SUSE CVE CVE-2024-47607 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-47615/</URL>
      <Description>SUSE CVE CVE-2024-47615 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-47835/</URL>
      <Description>SUSE CVE CVE-2024-47835 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Micro 6.0">
      <Branch Type="Product Name" Name="SUSE Linux Micro 6.0">
        <FullProductName ProductID="SUSE Linux Micro 6.0" CPE="cpe:/o:suse:sl-micro:6.0">SUSE Linux Micro 6.0</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="gstreamer-plugins-base-1.22.9-2.1">
      <FullProductName ProductID="gstreamer-plugins-base-1.22.9-2.1">gstreamer-plugins-base-1.22.9-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgstallocators-1_0-0-1.22.9-2.1">
      <FullProductName ProductID="libgstallocators-1_0-0-1.22.9-2.1">libgstallocators-1_0-0-1.22.9-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgstapp-1_0-0-1.22.9-2.1">
      <FullProductName ProductID="libgstapp-1_0-0-1.22.9-2.1">libgstapp-1_0-0-1.22.9-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgstaudio-1_0-0-1.22.9-2.1">
      <FullProductName ProductID="libgstaudio-1_0-0-1.22.9-2.1">libgstaudio-1_0-0-1.22.9-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgstgl-1_0-0-1.22.9-2.1">
      <FullProductName ProductID="libgstgl-1_0-0-1.22.9-2.1">libgstgl-1_0-0-1.22.9-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgstpbutils-1_0-0-1.22.9-2.1">
      <FullProductName ProductID="libgstpbutils-1_0-0-1.22.9-2.1">libgstpbutils-1_0-0-1.22.9-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgstriff-1_0-0-1.22.9-2.1">
      <FullProductName ProductID="libgstriff-1_0-0-1.22.9-2.1">libgstriff-1_0-0-1.22.9-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgsttag-1_0-0-1.22.9-2.1">
      <FullProductName ProductID="libgsttag-1_0-0-1.22.9-2.1">libgsttag-1_0-0-1.22.9-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libgstvideo-1_0-0-1.22.9-2.1">
      <FullProductName ProductID="libgstvideo-1_0-0-1.22.9-2.1">libgstvideo-1_0-0-1.22.9-2.1</FullProductName>
    </Branch>
    <Relationship ProductReference="gstreamer-plugins-base-1.22.9-2.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Micro 6.0">
      <FullProductName ProductID="SUSE Linux Micro 6.0:gstreamer-plugins-base-1.22.9-2.1">gstreamer-plugins-base-1.22.9-2.1 as a component of SUSE Linux Micro 6.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libgstallocators-1_0-0-1.22.9-2.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Micro 6.0">
      <FullProductName ProductID="SUSE Linux Micro 6.0:libgstallocators-1_0-0-1.22.9-2.1">libgstallocators-1_0-0-1.22.9-2.1 as a component of SUSE Linux Micro 6.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libgstapp-1_0-0-1.22.9-2.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Micro 6.0">
      <FullProductName ProductID="SUSE Linux Micro 6.0:libgstapp-1_0-0-1.22.9-2.1">libgstapp-1_0-0-1.22.9-2.1 as a component of SUSE Linux Micro 6.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libgstaudio-1_0-0-1.22.9-2.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Micro 6.0">
      <FullProductName ProductID="SUSE Linux Micro 6.0:libgstaudio-1_0-0-1.22.9-2.1">libgstaudio-1_0-0-1.22.9-2.1 as a component of SUSE Linux Micro 6.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libgstgl-1_0-0-1.22.9-2.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Micro 6.0">
      <FullProductName ProductID="SUSE Linux Micro 6.0:libgstgl-1_0-0-1.22.9-2.1">libgstgl-1_0-0-1.22.9-2.1 as a component of SUSE Linux Micro 6.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libgstpbutils-1_0-0-1.22.9-2.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Micro 6.0">
      <FullProductName ProductID="SUSE Linux Micro 6.0:libgstpbutils-1_0-0-1.22.9-2.1">libgstpbutils-1_0-0-1.22.9-2.1 as a component of SUSE Linux Micro 6.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libgstriff-1_0-0-1.22.9-2.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Micro 6.0">
      <FullProductName ProductID="SUSE Linux Micro 6.0:libgstriff-1_0-0-1.22.9-2.1">libgstriff-1_0-0-1.22.9-2.1 as a component of SUSE Linux Micro 6.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libgsttag-1_0-0-1.22.9-2.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Micro 6.0">
      <FullProductName ProductID="SUSE Linux Micro 6.0:libgsttag-1_0-0-1.22.9-2.1">libgsttag-1_0-0-1.22.9-2.1 as a component of SUSE Linux Micro 6.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libgstvideo-1_0-0-1.22.9-2.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Micro 6.0">
      <FullProductName ProductID="SUSE Linux Micro 6.0:libgstvideo-1_0-0-1.22.9-2.1">libgstvideo-1_0-0-1.22.9-2.1 as a component of SUSE Linux Micro 6.0</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">GStreamer is a library for constructing graphs of media-handling components. A stack-buffer overflow has been detected in the `vorbis_handle_identification_packet` function within `gstvorbisdec.c`. The position array is a stack-allocated buffer of size 64. If vd-&gt;vi.channels exceeds 64, the for loop will write beyond the boundaries of the position array. The value written will always be `GST_AUDIO_CHANNEL_POSITION_NONE`. This vulnerability allows someone to overwrite the EIP address allocated in the stack. Additionally, this bug can overwrite the `GstAudioInfo` info structure. This vulnerability is fixed in 1.24.10.</Note>
    </Notes>
    <CVE>CVE-2024-47538</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Micro 6.0:gstreamer-plugins-base-1.22.9-2.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:libgstallocators-1_0-0-1.22.9-2.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:libgstapp-1_0-0-1.22.9-2.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:libgstaudio-1_0-0-1.22.9-2.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:libgstgl-1_0-0-1.22.9-2.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:libgstpbutils-1_0-0-1.22.9-2.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:libgstriff-1_0-0-1.22.9-2.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:libgsttag-1_0-0-1.22.9-2.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:libgstvideo-1_0-0-1.22.9-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202520134-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-47538.html</URL>
        <Description>CVE-2024-47538</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234415</URL>
        <Description>SUSE Bug 1234415</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">GStreamer is a library for constructing graphs of media-handling components. An OOB-write vulnerability has been identified in the gst_ssa_parse_remove_override_codes function of the gstssaparse.c file. This function is responsible for parsing and removing SSA (SubStation Alpha) style override codes, which are enclosed in curly brackets ({}). The issue arises when a closing curly bracket "}" appears before an opening curly bracket "{" in the input string. In this case, memmove() incorrectly duplicates a substring. With each successive loop iteration, the size passed to memmove() becomes progressively larger (strlen(end+1)), leading to a write beyond the allocated memory bounds. This vulnerability is fixed in 1.24.10.</Note>
    </Notes>
    <CVE>CVE-2024-47541</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Micro 6.0:gstreamer-plugins-base-1.22.9-2.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:libgstallocators-1_0-0-1.22.9-2.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:libgstapp-1_0-0-1.22.9-2.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:libgstaudio-1_0-0-1.22.9-2.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:libgstgl-1_0-0-1.22.9-2.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:libgstpbutils-1_0-0-1.22.9-2.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:libgstriff-1_0-0-1.22.9-2.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:libgsttag-1_0-0-1.22.9-2.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:libgstvideo-1_0-0-1.22.9-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202520134-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-47541.html</URL>
        <Description>CVE-2024-47541</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234459</URL>
        <Description>SUSE Bug 1234459</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">GStreamer is a library for constructing graphs of media-handling components. A null pointer dereference has been discovered in the id3v2_read_synch_uint function, located in id3v2.c. If id3v2_read_synch_uint is called with a null work-&gt;hdr.frame_data, the pointer guint8 *data is accessed without validation, resulting in a null pointer dereference. This vulnerability can result in a Denial of Service (DoS) by triggering a segmentation fault (SEGV). This vulnerability is fixed in 1.24.10.</Note>
    </Notes>
    <CVE>CVE-2024-47542</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Micro 6.0:gstreamer-plugins-base-1.22.9-2.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:libgstallocators-1_0-0-1.22.9-2.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:libgstapp-1_0-0-1.22.9-2.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:libgstaudio-1_0-0-1.22.9-2.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:libgstgl-1_0-0-1.22.9-2.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:libgstpbutils-1_0-0-1.22.9-2.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:libgstriff-1_0-0-1.22.9-2.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:libgsttag-1_0-0-1.22.9-2.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:libgstvideo-1_0-0-1.22.9-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202520134-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-47542.html</URL>
        <Description>CVE-2024-47542</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234460</URL>
        <Description>SUSE Bug 1234460</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerability has been detected in the format_channel_mask function in gst-discoverer.c. The vulnerability affects the local array position, which is defined with a fixed size of 64 elements. However, the function gst_discoverer_audio_info_get_channels may return a guint channels value greater than 64. This causes the for loop to attempt access beyond the bounds of the position array, resulting in an OOB-read when an index greater than 63 is used. This vulnerability can result in reading unintended bytes from the stack. Additionally, the dereference of value-&gt;value_nick after the OOB-read can lead to further memory corruption or undefined behavior. This vulnerability is fixed in 1.24.10.</Note>
    </Notes>
    <CVE>CVE-2024-47600</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Micro 6.0:gstreamer-plugins-base-1.22.9-2.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:libgstallocators-1_0-0-1.22.9-2.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:libgstapp-1_0-0-1.22.9-2.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:libgstaudio-1_0-0-1.22.9-2.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:libgstgl-1_0-0-1.22.9-2.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:libgstpbutils-1_0-0-1.22.9-2.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:libgstriff-1_0-0-1.22.9-2.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:libgsttag-1_0-0-1.22.9-2.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:libgstvideo-1_0-0-1.22.9-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202520134-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-47600.html</URL>
        <Description>CVE-2024-47600</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234453</URL>
        <Description>SUSE Bug 1234453</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">GStreamer is a library for constructing graphs of media-handling components.  stack-buffer overflow has been detected in the gst_opus_dec_parse_header function within `gstopusdec.c'. The pos array is a stack-allocated buffer of size 64. If n_channels exceeds 64, the for loop will write beyond the boundaries of the pos array. The value written will always be GST_AUDIO_CHANNEL_POSITION_NONE. This bug allows to overwrite the EIP address allocated in the stack. This vulnerability is fixed in 1.24.10.</Note>
    </Notes>
    <CVE>CVE-2024-47607</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Micro 6.0:gstreamer-plugins-base-1.22.9-2.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:libgstallocators-1_0-0-1.22.9-2.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:libgstapp-1_0-0-1.22.9-2.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:libgstaudio-1_0-0-1.22.9-2.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:libgstgl-1_0-0-1.22.9-2.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:libgstpbutils-1_0-0-1.22.9-2.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:libgstriff-1_0-0-1.22.9-2.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:libgsttag-1_0-0-1.22.9-2.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:libgstvideo-1_0-0-1.22.9-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202520134-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-47607.html</URL>
        <Description>CVE-2024-47607</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234455</URL>
        <Description>SUSE Bug 1234455</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">GStreamer is a library for constructing graphs of media-handling components. An OOB-Write has been detected in the function gst_parse_vorbis_setup_packet within vorbis_parse.c. The integer size is read from the input file without proper validation. As a result, size can exceed the fixed size of the pad-&gt;vorbis_mode_sizes array (which size is 256). When this happens, the for loop overwrites the entire pad structure with 0s and 1s, affecting adjacent memory as well. This OOB-write can overwrite up to 380 bytes of memory beyond the boundaries of the pad-&gt;vorbis_mode_sizes array. This vulnerability is fixed in 1.24.10.</Note>
    </Notes>
    <CVE>CVE-2024-47615</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Micro 6.0:gstreamer-plugins-base-1.22.9-2.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:libgstallocators-1_0-0-1.22.9-2.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:libgstapp-1_0-0-1.22.9-2.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:libgstaudio-1_0-0-1.22.9-2.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:libgstgl-1_0-0-1.22.9-2.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:libgstpbutils-1_0-0-1.22.9-2.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:libgstriff-1_0-0-1.22.9-2.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:libgsttag-1_0-0-1.22.9-2.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:libgstvideo-1_0-0-1.22.9-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202520134-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-47615.html</URL>
        <Description>CVE-2024-47615</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234456</URL>
        <Description>SUSE Bug 1234456</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">GStreamer is a library for constructing graphs of media-handling components. A null pointer dereference vulnerability has been detected in the parse_lrc function within gstsubparse.c. The parse_lrc function calls strchr() to find the character ']' in the string line. The pointer returned by this call is then passed to g_strdup(). However, if the string line does not contain the character ']', strchr() returns NULL, and a call to g_strdup(start + 1) leads to a null pointer dereference. This vulnerability is fixed in 1.24.10.</Note>
    </Notes>
    <CVE>CVE-2024-47835</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Micro 6.0:gstreamer-plugins-base-1.22.9-2.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:libgstallocators-1_0-0-1.22.9-2.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:libgstapp-1_0-0-1.22.9-2.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:libgstaudio-1_0-0-1.22.9-2.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:libgstgl-1_0-0-1.22.9-2.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:libgstpbutils-1_0-0-1.22.9-2.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:libgstriff-1_0-0-1.22.9-2.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:libgsttag-1_0-0-1.22.9-2.1</ProductID>
        <ProductID>SUSE Linux Micro 6.0:libgstvideo-1_0-0-1.22.9-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202520134-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-47835.html</URL>
        <Description>CVE-2024-47835</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234450</URL>
        <Description>SUSE Bug 1234450</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
