{"affected":[{"ecosystem_specific":{"binaries":[{"gstreamer-plugins-good":"1.24.0-150600.3.3.1","gstreamer-plugins-good-lang":"1.24.0-150600.3.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Basesystem 15 SP6","name":"gstreamer-plugins-good","purl":"pkg:rpm/suse/gstreamer-plugins-good&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.24.0-150600.3.3.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"gstreamer-plugins-good-gtk":"1.24.0-150600.3.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Workstation Extension 15 SP6","name":"gstreamer-plugins-good","purl":"pkg:rpm/suse/gstreamer-plugins-good&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2015%20SP6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.24.0-150600.3.3.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"gstreamer-plugins-good":"1.24.0-150600.3.3.1","gstreamer-plugins-good-32bit":"1.24.0-150600.3.3.1","gstreamer-plugins-good-extra":"1.24.0-150600.3.3.1","gstreamer-plugins-good-extra-32bit":"1.24.0-150600.3.3.1","gstreamer-plugins-good-gtk":"1.24.0-150600.3.3.1","gstreamer-plugins-good-jack":"1.24.0-150600.3.3.1","gstreamer-plugins-good-jack-32bit":"1.24.0-150600.3.3.1","gstreamer-plugins-good-lang":"1.24.0-150600.3.3.1","gstreamer-plugins-good-qtqml":"1.24.0-150600.3.3.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.6","name":"gstreamer-plugins-good","purl":"pkg:rpm/opensuse/gstreamer-plugins-good&distro=openSUSE%20Leap%2015.6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.24.0-150600.3.3.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for gstreamer-plugins-good fixes the following issues:\n\n- CVE-2024-47606: Fixed an integer overflows in MP4/MOV demuxer and memory allocator that can lead to out-of-bounds writes. (boo#1234449)\n- CVE-2024-47537: Fixed an out-of-bounds write in isomp4/qtdemux.c. (boo#1234414)\n- CVE-2024-47539: Fixed an out-of-bounds write in convert_to_s334_1a. (boo#1234417)\n- CVE-2024-47530: Fixed an uninitialized stack memory in Matroska/WebM demuxer. (boo#1234421)\n- CVE-2024-47596: Fixed an integer underflow in MP4/MOV demuxer that can lead to out-of-bounds reads. (boo#1234424)\n- CVE-2024-47597: Fixed an out-of-bounds reads in MP4/MOV demuxer sample table parser (boo#1234425)\n- CVE-2024-47598: Fixed MP4/MOV sample table parser out-of-bounds read. (boo#1234426)\n- CVE-2024-47599: Fixed insufficient error handling in JPEG decoder that can lead to NULL-pointer dereferences. (boo#1234427)\n- CVE-2024-47601: Fixed a NULL-pointer dereference in Matroska/WebM demuxer. (boo#1234428)\n- CVE-2024-47602: Fixed a NULL-pointer dereferences and out-of-bounds reads in Matroska/WebM demuxer. (boo#1234432)\n- CVE-2024-47603: Fixed a NULL-pointer dereference in Matroska/WebM demuxer. (boo#1234433)\n- CVE-2024-47775: Fixed various out-of-bounds reads in WAV parser. (boo#1234434)\n- CVE-2024-47776: Fixed various out-of-bounds reads in WAV parser. (boo#1234435)\n- CVE-2024-47777: Fixed various out-of-bounds reads in WAV parser. (boo#1234436)\n- CVE-2024-47778: Fixed various out-of-bounds reads in WAV parser. (boo#1234439)\n- CVE-2024-47834: Fixed a use-after-free in the Matroska demuxer that can cause crashes for certain input files. (boo#1234440)\n- CVE-2024-47774: Fixed an integer overflow in AVI subtitle parser that leads to out-of-bounds reads. (boo#1234446)\n- CVE-2024-47613: Fixed a NULL-pointer dereference in gdk-pixbuf decoder. (boo#1234447)\n- CVE-2024-47543: Fixed an out-of-bounds write in qtdemux_parse_container. (boo#1234462)\n- CVE-2024-47544: Fixed a NULL-pointer dereferences in MP4/MOV demuxer CENC handling. (boo#1234473)\n- CVE-2024-47545: Fixed an integer underflow in FOURCC_strf parsing leading to out-of-bounds read. (boo#1234476)\n- CVE-2024-47546: Fixed an integer underflow in extract_cc_from_data leading to out-of-bounds read. (boo#1234477)\n","id":"SUSE-SU-2025:0055-1","modified":"2025-01-09T16:36:54Z","published":"2025-01-09T16:36:54Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2025/suse-su-20250055-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234414"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234417"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234421"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234424"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234425"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234426"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234427"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234428"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234432"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234433"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234434"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234435"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234436"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234439"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234440"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234446"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234447"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234449"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234462"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234473"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234476"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234477"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47537"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47539"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47540"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47543"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47544"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47545"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47546"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47596"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47597"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47598"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47599"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47601"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47602"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47603"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47606"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47613"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47774"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47775"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47776"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47777"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47778"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47834"}],"related":["CVE-2024-47537","CVE-2024-47539","CVE-2024-47540","CVE-2024-47543","CVE-2024-47544","CVE-2024-47545","CVE-2024-47546","CVE-2024-47596","CVE-2024-47597","CVE-2024-47598","CVE-2024-47599","CVE-2024-47601","CVE-2024-47602","CVE-2024-47603","CVE-2024-47606","CVE-2024-47613","CVE-2024-47774","CVE-2024-47775","CVE-2024-47776","CVE-2024-47777","CVE-2024-47778","CVE-2024-47834"],"summary":"Security update for gstreamer-plugins-good","upstream":["CVE-2024-47537","CVE-2024-47539","CVE-2024-47540","CVE-2024-47543","CVE-2024-47544","CVE-2024-47545","CVE-2024-47546","CVE-2024-47596","CVE-2024-47597","CVE-2024-47598","CVE-2024-47599","CVE-2024-47601","CVE-2024-47602","CVE-2024-47603","CVE-2024-47606","CVE-2024-47613","CVE-2024-47774","CVE-2024-47775","CVE-2024-47776","CVE-2024-47777","CVE-2024-47778","CVE-2024-47834"]}