Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.856910
Kategorie:openSUSE Local Security Checks
Titel:openSUSE Security Advisory (SUSE-SU-2025:0065-1)
Zusammenfassung:The remote host is missing an update for the 'gstreamer-plugins-base' package(s) announced via the SUSE-SU-2025:0065-1 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'gstreamer-plugins-base' package(s) announced via the SUSE-SU-2025:0065-1 advisory.

Vulnerability Insight:
This update for gstreamer-plugins-base fixes the following issues:

- CVE-2024-47538: Fixed a stack-buffer overflow in vorbis_handle_identification_packet. (bsc#1234415)
- CVE-2024-47835: Fixed a NULL-pointer dereference in LRC subtitle parser. (bsc#1234450)
- CVE-2024-47600: Fixed an out-of-bounds read in gst-discoverer-1.0 commandline tool. (bsc#1234453)
- CVE-2024-47615: Fixed an out-of-bounds write in Ogg demuxer. (bsc#1234456)
- CVE-2024-47541: Fixed an out-of-bounds write in SSA subtitle parser. (bsc#1234459)
- CVE-2024-47542: Fixed an ID3v2 parser out-of-bounds read and NULL-pointer dereference. (bsc#1234460)
- CVE-2024-47607: Fixed a stack buffer-overflow in Opus decoder. (bsc#1234455)

Affected Software/OS:
'gstreamer-plugins-base' package(s) on openSUSE Leap 15.6.

Solution:
Please install the updated package(s).

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2024-47538
Common Vulnerability Exposure (CVE) ID: CVE-2024-47541
Common Vulnerability Exposure (CVE) ID: CVE-2024-47542
Common Vulnerability Exposure (CVE) ID: CVE-2024-47600
Common Vulnerability Exposure (CVE) ID: CVE-2024-47607
Common Vulnerability Exposure (CVE) ID: CVE-2024-47615
Common Vulnerability Exposure (CVE) ID: CVE-2024-47835
CopyrightCopyright (C) 2025 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.