Debian 10273 Published by

Debian GNU/Linux has been issued two security updates: ELA-1283-1 gst-plugins-base0.10 for Debian 8 (Jessie) ELTS and DSA 5838-1 gst-plugins-good1.0 for Debian 12 (Bookworm)

ELA-1283-1 gst-plugins-base0.10 security update
[DSA 5838-1] gst-plugins-good1.0 security update




ELA-1283-1 gst-plugins-base0.10 security update

Package : gst-plugins-base0.10
Version : 0.10.36-2+deb8u5 (jessie)

Related CVEs :
CVE-2024-47541
CVE-2024-47542
CVE-2024-47615

gstreamer a multimedia framework was affected by multiple vulnerabilities.

CVE-2024-47541
An Out of Bound write vulnerability has been
identified in the gst_ssa_parse_remove_override_codes
function of the gstssaparse.c file.

CVE-2024-47542
A null pointer dereference has been
discovered in the id3v2_read_synch_uint function, located
in id3v2.c

CVE-2024-47615
An Out Of Bound Write has been detected
in the function gst_parse_vorbis_setup_packet within
vorbis_parse.c.

ELA-1283-1 gst-plugins-base0.10 security update


[SECURITY] [DSA 5838-1] gst-plugins-good1.0 security update


- -------------------------------------------------------------------------
Debian Security Advisory DSA-5838-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
December 29, 2024 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : gst-plugins-good1.0
CVE ID : CVE-2024-47537 CVE-2024-47539 CVE-2024-47540 CVE-2024-47543
CVE-2024-47544 CVE-2024-47545 CVE-2024-47546 CVE-2024-47596
CVE-2024-47597 CVE-2024-47598 CVE-2024-47599 CVE-2024-47601
CVE-2024-47602 CVE-2024-47603 CVE-2024-47606 CVE-2024-47613
CVE-2024-47774 CVE-2024-47775 CVE-2024-47776 CVE-2024-47777
CVE-2024-47778 CVE-2024-47834

Multiple vulnerabilities were discovered in plugins for the GStreamer
media framework and its codecs and demuxers, which may result in denial
of service or potentially the execution of arbitrary code if a malformed
media file is opened.

For the stable distribution (bookworm), these problems have been fixed in
version 1.22.0-5+deb12u2.

We recommend that you upgrade your gst-plugins-good1.0 packages.

For the detailed security status of gst-plugins-good1.0 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/gst-plugins-good1.0

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/