{"affected":[{"ecosystem_specific":{"binaries":[{"gstreamer-plugins-good":"1.8.3-16.12.1","gstreamer-plugins-good-lang":"1.8.3-16.12.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5-LTSS","name":"gstreamer-plugins-good","purl":"pkg:rpm/suse/gstreamer-plugins-good&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.8.3-16.12.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"gstreamer-plugins-good":"1.8.3-16.12.1","gstreamer-plugins-good-lang":"1.8.3-16.12.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server LTSS Extended Security 12 SP5","name":"gstreamer-plugins-good","purl":"pkg:rpm/suse/gstreamer-plugins-good&distro=SUSE%20Linux%20Enterprise%20Server%20LTSS%20Extended%20Security%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.8.3-16.12.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for gstreamer-plugins-good fixes the following issues:\n\n- CVE-2024-47540: Fixed an uninitialized stack memory in Matroska/WebM demuxer. (boo#1234421)\n- CVE-2024-47537: Fixed an out-of-bounds write in isomp4/qtdemux.c. (boo#1234414)\n- CVE-2024-47543: Fixed an out-of-bounds write in qtdemux_parse_container. (boo#1234462)\n- CVE-2024-47544: Fixed a NULL-pointer dereferences in MP4/MOV demuxer CENC handling. (boo#1234473)\n- CVE-2024-47545: Fixed an integer underflow in FOURCC_strf parsing leading to out-of-bounds read. (boo#1234476)\n- CVE-2024-47596: Fixed an integer underflow in MP4/MOV demuxer that can lead to out-of-bounds reads. (boo#1234424)\n- CVE-2024-47597: Fixed an out-of-bounds reads in MP4/MOV demuxer sample table parser (boo#1234425)\n- CVE-2024-47599: Fixed insufficient error handling in JPEG decoder that can lead to NULL-pointer dereferences. (boo#1234427)\n- CVE-2024-47601: Fixed a NULL-pointer dereference in Matroska/WebM demuxer. (boo#1234428)\n- CVE-2024-47602: Fixed a NULL-pointer dereferences and out-of-bounds reads in Matroska/WebM demuxer. (boo#1234432)\n- CVE-2024-47603: Fixed a NULL-pointer dereference in Matroska/WebM demuxer. (boo#1234433)\n- CVE-2024-47606: Avoid integer overflow when allocating sysmem. (bsc#1234449)\n- CVE-2024-47606: Fixed an integer overflows in MP4/MOV demuxer and memory allocator that can lead to out-of-bounds writes. (boo#1234449)\n- CVE-2024-47613: Fixed a NULL-pointer dereference in gdk-pixbuf decoder. (boo#1234447)\n- CVE-2024-47774: Fixed an integer overflow in AVI subtitle parser that leads to out-of-bounds reads. (boo#1234446)\n- CVE-2024-47775: Fixed various out-of-bounds reads in WAV parser. (boo#1234434)\n- CVE-2024-47776: Fixed various out-of-bounds reads in WAV parser. (boo#1234435)\n- CVE-2024-47777: Fixed various out-of-bounds reads in WAV parser. (boo#1234436)\n- CVE-2024-47778: Fixed various out-of-bounds reads in WAV parser. (boo#1234439)\n- CVE-2024-47834: Fixed a use-after-free in the Matroska demuxer that can cause crashes for certain input files. (boo#1234440)\n","id":"SUSE-SU-2025:00063-1","modified":"2025-06-24T12:03:30Z","published":"2025-06-24T12:03:30Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2025/suse-su-202500063-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234414"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234421"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234424"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234425"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234427"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234428"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234432"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234433"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234434"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234435"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234436"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234439"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234440"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234446"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234447"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234449"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234462"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234473"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234476"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47537"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47540"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47543"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47544"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47545"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47596"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47597"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47599"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47601"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47602"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47603"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47606"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47613"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47774"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47775"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47776"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47777"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47778"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47834"}],"related":["CVE-2024-47537","CVE-2024-47540","CVE-2024-47543","CVE-2024-47544","CVE-2024-47545","CVE-2024-47596","CVE-2024-47597","CVE-2024-47599","CVE-2024-47601","CVE-2024-47602","CVE-2024-47603","CVE-2024-47606","CVE-2024-47613","CVE-2024-47774","CVE-2024-47775","CVE-2024-47776","CVE-2024-47777","CVE-2024-47778","CVE-2024-47834"],"summary":"Security update for gstreamer-plugins-good","upstream":["CVE-2024-47537","CVE-2024-47540","CVE-2024-47543","CVE-2024-47544","CVE-2024-47545","CVE-2024-47596","CVE-2024-47597","CVE-2024-47599","CVE-2024-47601","CVE-2024-47602","CVE-2024-47603","CVE-2024-47606","CVE-2024-47613","CVE-2024-47774","CVE-2024-47775","CVE-2024-47776","CVE-2024-47777","CVE-2024-47778","CVE-2024-47834"]}