<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for gstreamer-plugins-good</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2023:3688-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2023-09-19T15:40:17Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2023-09-19T15:40:17Z</InitialReleaseDate>
    <CurrentReleaseDate>2023-09-19T15:40:17Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for gstreamer-plugins-good</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for gstreamer-plugins-good fixes the following issues:

- CVE-2021-3497: Matroskademux: Fix extraction of multichannel WavPack (bsc#1184739).
- CVE-2022-1920: Fixed integer overflow in WavPack header handling code (bsc#1201688).
- CVE-2022-1921: Fixed integer overflow resulting in heap corruption in avidemux element (bsc#1201693).
- CVE-2022-1922: Fixed integer overflows in mkv demuxing (bsc#1201702).
- CVE-2022-1923: Fixed integer overflows in mkv demuxing using bzip (bsc#1201704).
- CVE-2022-1924: Fixed integer overflows in mkv demuxing using lzo (bsc#1201706).
- CVE-2022-1925: Fixed integer overflows in mkv demuxing using HEADERSTRIP (bsc#1201707).
- CVE-2022-2122: Fixed integer overflows in qtdemux using zlib (bsc#1201708).
- CVE-2023-37327: Fixed GStreamer FLAC File Parsing Integer Overflow (bsc#1213128).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2023-3688,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-3688,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-3688</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20233688-1/</URL>
      <Description>Link for SUSE-SU-2023:3688-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2023-September/016209.html</URL>
      <Description>E-Mail link for SUSE-SU-2023:3688-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1184739</URL>
      <Description>SUSE Bug 1184739</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1201688</URL>
      <Description>SUSE Bug 1201688</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1201693</URL>
      <Description>SUSE Bug 1201693</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1201702</URL>
      <Description>SUSE Bug 1201702</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1201704</URL>
      <Description>SUSE Bug 1201704</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1201706</URL>
      <Description>SUSE Bug 1201706</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1201707</URL>
      <Description>SUSE Bug 1201707</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1201708</URL>
      <Description>SUSE Bug 1201708</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1213128</URL>
      <Description>SUSE Bug 1213128</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-3497/</URL>
      <Description>SUSE CVE CVE-2021-3497 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-1920/</URL>
      <Description>SUSE CVE CVE-2022-1920 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-1921/</URL>
      <Description>SUSE CVE CVE-2022-1921 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-1922/</URL>
      <Description>SUSE CVE CVE-2022-1922 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-1923/</URL>
      <Description>SUSE CVE CVE-2022-1923 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-1924/</URL>
      <Description>SUSE CVE CVE-2022-1924 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-1925/</URL>
      <Description>SUSE CVE CVE-2022-1925 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-2122/</URL>
      <Description>SUSE CVE CVE-2022-2122 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-37327/</URL>
      <Description>SUSE CVE CVE-2023-37327 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 15 SP1-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 15 SP1-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP1-LTSS" CPE="cpe:/o:suse:sles-ltss:15:sp1">SUSE Linux Enterprise Server 15 SP1-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 15 SP1">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 15 SP1">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP1" CPE="cpe:/o:suse:sles_sap:15:sp1">SUSE Linux Enterprise Server for SAP Applications 15 SP1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="gstreamer-plugins-good-1.12.5-150000.3.7.2">
      <FullProductName ProductID="gstreamer-plugins-good-1.12.5-150000.3.7.2">gstreamer-plugins-good-1.12.5-150000.3.7.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="gstreamer-plugins-good-32bit-1.12.5-150000.3.7.2">
      <FullProductName ProductID="gstreamer-plugins-good-32bit-1.12.5-150000.3.7.2">gstreamer-plugins-good-32bit-1.12.5-150000.3.7.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="gstreamer-plugins-good-64bit-1.12.5-150000.3.7.2">
      <FullProductName ProductID="gstreamer-plugins-good-64bit-1.12.5-150000.3.7.2">gstreamer-plugins-good-64bit-1.12.5-150000.3.7.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="gstreamer-plugins-good-doc-1.12.5-150000.3.7.2">
      <FullProductName ProductID="gstreamer-plugins-good-doc-1.12.5-150000.3.7.2">gstreamer-plugins-good-doc-1.12.5-150000.3.7.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="gstreamer-plugins-good-extra-1.12.5-150000.3.7.2">
      <FullProductName ProductID="gstreamer-plugins-good-extra-1.12.5-150000.3.7.2">gstreamer-plugins-good-extra-1.12.5-150000.3.7.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="gstreamer-plugins-good-extra-32bit-1.12.5-150000.3.7.2">
      <FullProductName ProductID="gstreamer-plugins-good-extra-32bit-1.12.5-150000.3.7.2">gstreamer-plugins-good-extra-32bit-1.12.5-150000.3.7.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="gstreamer-plugins-good-extra-64bit-1.12.5-150000.3.7.2">
      <FullProductName ProductID="gstreamer-plugins-good-extra-64bit-1.12.5-150000.3.7.2">gstreamer-plugins-good-extra-64bit-1.12.5-150000.3.7.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="gstreamer-plugins-good-jack-1.12.5-150000.3.7.2">
      <FullProductName ProductID="gstreamer-plugins-good-jack-1.12.5-150000.3.7.2">gstreamer-plugins-good-jack-1.12.5-150000.3.7.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="gstreamer-plugins-good-jack-32bit-1.12.5-150000.3.7.2">
      <FullProductName ProductID="gstreamer-plugins-good-jack-32bit-1.12.5-150000.3.7.2">gstreamer-plugins-good-jack-32bit-1.12.5-150000.3.7.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="gstreamer-plugins-good-jack-64bit-1.12.5-150000.3.7.2">
      <FullProductName ProductID="gstreamer-plugins-good-jack-64bit-1.12.5-150000.3.7.2">gstreamer-plugins-good-jack-64bit-1.12.5-150000.3.7.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="gstreamer-plugins-good-lang-1.12.5-150000.3.7.2">
      <FullProductName ProductID="gstreamer-plugins-good-lang-1.12.5-150000.3.7.2">gstreamer-plugins-good-lang-1.12.5-150000.3.7.2</FullProductName>
    </Branch>
    <Relationship ProductReference="gstreamer-plugins-good-1.12.5-150000.3.7.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 15 SP1-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP1-LTSS:gstreamer-plugins-good-1.12.5-150000.3.7.2">gstreamer-plugins-good-1.12.5-150000.3.7.2 as a component of SUSE Linux Enterprise Server 15 SP1-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="gstreamer-plugins-good-lang-1.12.5-150000.3.7.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 15 SP1-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP1-LTSS:gstreamer-plugins-good-lang-1.12.5-150000.3.7.2">gstreamer-plugins-good-lang-1.12.5-150000.3.7.2 as a component of SUSE Linux Enterprise Server 15 SP1-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="gstreamer-plugins-good-1.12.5-150000.3.7.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 15 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP1:gstreamer-plugins-good-1.12.5-150000.3.7.2">gstreamer-plugins-good-1.12.5-150000.3.7.2 as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="gstreamer-plugins-good-lang-1.12.5-150000.3.7.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 15 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP1:gstreamer-plugins-good-lang-1.12.5-150000.3.7.2">gstreamer-plugins-good-lang-1.12.5-150000.3.7.2 as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP1</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">GStreamer before 1.18.4 might access already-freed memory in error code paths when demuxing certain malformed Matroska files.</Note>
    </Notes>
    <CVE>CVE-2021-3497</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:gstreamer-plugins-good-1.12.5-150000.3.7.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:gstreamer-plugins-good-lang-1.12.5-150000.3.7.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:gstreamer-plugins-good-1.12.5-150000.3.7.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:gstreamer-plugins-good-lang-1.12.5-150000.3.7.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20233688-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-3497.html</URL>
        <Description>CVE-2021-3497</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1184739</URL>
        <Description>SUSE Bug 1184739</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer overflow in matroskademux element in gst_matroska_demux_add_wvpk_header function which allows a heap overwrite while parsing matroska files. Potential for arbitrary code execution through heap overwrite.</Note>
    </Notes>
    <CVE>CVE-2022-1920</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:gstreamer-plugins-good-1.12.5-150000.3.7.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:gstreamer-plugins-good-lang-1.12.5-150000.3.7.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:gstreamer-plugins-good-1.12.5-150000.3.7.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:gstreamer-plugins-good-lang-1.12.5-150000.3.7.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20233688-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-1920.html</URL>
        <Description>CVE-2022-1920</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1201688</URL>
        <Description>SUSE Bug 1201688</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer overflow in avidemux element in gst_avi_demux_invert function which allows a heap overwrite while parsing avi files. Potential for arbitrary code execution through heap overwrite.</Note>
    </Notes>
    <CVE>CVE-2022-1921</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:gstreamer-plugins-good-1.12.5-150000.3.7.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:gstreamer-plugins-good-lang-1.12.5-150000.3.7.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:gstreamer-plugins-good-1.12.5-150000.3.7.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:gstreamer-plugins-good-lang-1.12.5-150000.3.7.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20233688-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-1921.html</URL>
        <Description>CVE-2022-1921</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1201693</URL>
        <Description>SUSE Bug 1201693</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">DOS / potential heap overwrite in mkv demuxing using zlib decompression. Integer overflow in matroskademux element in gst_matroska_decompress_data function which causes a segfault, or could cause a heap overwrite, depending on libc and OS. Depending on the libc used, and the underlying OS capabilities, it could be just a segfault or a heap overwrite. If the libc uses mmap for large chunks, and the OS supports mmap, then it is just a segfault (because the realloc before the integer overflow will use mremap to reduce the size of the chunk, and it will start to write to unmapped memory). However, if using a libc implementation that does not use mmap, or if the OS does not support mmap while using libc, then this could result in a heap overwrite.</Note>
    </Notes>
    <CVE>CVE-2022-1922</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:gstreamer-plugins-good-1.12.5-150000.3.7.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:gstreamer-plugins-good-lang-1.12.5-150000.3.7.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:gstreamer-plugins-good-1.12.5-150000.3.7.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:gstreamer-plugins-good-lang-1.12.5-150000.3.7.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20233688-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-1922.html</URL>
        <Description>CVE-2022-1922</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1201702</URL>
        <Description>SUSE Bug 1201702</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">DOS / potential heap overwrite in mkv demuxing using bzip decompression. Integer overflow in matroskademux element in bzip decompression function which causes a segfault, or could cause a heap overwrite, depending on libc and OS. Depending on the libc used, and the underlying OS capabilities, it could be just a segfault or a heap overwrite. If the libc uses mmap for large chunks, and the OS supports mmap, then it is just a segfault (because the realloc before the integer overflow will use mremap to reduce the size of the chunk, and it will start to write to unmapped memory). However, if using a libc implementation that does not use mmap, or if the OS does not support mmap while using libc, then this could result in a heap overwrite.</Note>
    </Notes>
    <CVE>CVE-2022-1923</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:gstreamer-plugins-good-1.12.5-150000.3.7.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:gstreamer-plugins-good-lang-1.12.5-150000.3.7.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:gstreamer-plugins-good-1.12.5-150000.3.7.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:gstreamer-plugins-good-lang-1.12.5-150000.3.7.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20233688-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-1923.html</URL>
        <Description>CVE-2022-1923</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1201704</URL>
        <Description>SUSE Bug 1201704</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">DOS / potential heap overwrite in mkv demuxing using lzo decompression. Integer overflow in matroskademux element in lzo decompression function which causes a segfault, or could cause a heap overwrite, depending on libc and OS. Depending on the libc used, and the underlying OS capabilities, it could be just a segfault or a heap overwrite. If the libc uses mmap for large chunks, and the OS supports mmap, then it is just a segfault (because the realloc before the integer overflow will use mremap to reduce the size of the chunk, and it will start to write to unmapped memory). However, if using a libc implementation that does not use mmap, or if the OS does not support mmap while using libc, then this could result in a heap overwrite.</Note>
    </Notes>
    <CVE>CVE-2022-1924</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:gstreamer-plugins-good-1.12.5-150000.3.7.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:gstreamer-plugins-good-lang-1.12.5-150000.3.7.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:gstreamer-plugins-good-1.12.5-150000.3.7.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:gstreamer-plugins-good-lang-1.12.5-150000.3.7.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20233688-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-1924.html</URL>
        <Description>CVE-2022-1924</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1201706</URL>
        <Description>SUSE Bug 1201706</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">DOS / potential heap overwrite in mkv demuxing using HEADERSTRIP decompression. Integer overflow in matroskaparse element in gst_matroska_decompress_data function which causes a heap overflow. Due to restrictions on chunk sizes in the matroskademux element, the overflow can't be triggered, however the matroskaparse element has no size checks.</Note>
    </Notes>
    <CVE>CVE-2022-1925</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:gstreamer-plugins-good-1.12.5-150000.3.7.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:gstreamer-plugins-good-lang-1.12.5-150000.3.7.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:gstreamer-plugins-good-1.12.5-150000.3.7.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:gstreamer-plugins-good-lang-1.12.5-150000.3.7.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20233688-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-1925.html</URL>
        <Description>CVE-2022-1925</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1201707</URL>
        <Description>SUSE Bug 1201707</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">DOS / potential heap overwrite in qtdemux using zlib decompression. Integer overflow in qtdemux element in qtdemux_inflate function which causes a segfault, or could cause a heap overwrite, depending on libc and OS. Depending on the libc used, and the underlying OS capabilities, it could be just a segfault or a heap overwrite.</Note>
    </Notes>
    <CVE>CVE-2022-2122</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:gstreamer-plugins-good-1.12.5-150000.3.7.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:gstreamer-plugins-good-lang-1.12.5-150000.3.7.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:gstreamer-plugins-good-1.12.5-150000.3.7.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:gstreamer-plugins-good-lang-1.12.5-150000.3.7.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20233688-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-2122.html</URL>
        <Description>CVE-2022-2122</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1201708</URL>
        <Description>SUSE Bug 1201708</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">GStreamer FLAC File Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation.

The specific flaw exists within the parsing of FLAC audio files. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-20775.</Note>
    </Notes>
    <CVE>CVE-2023-37327</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:gstreamer-plugins-good-1.12.5-150000.3.7.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:gstreamer-plugins-good-lang-1.12.5-150000.3.7.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:gstreamer-plugins-good-1.12.5-150000.3.7.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:gstreamer-plugins-good-lang-1.12.5-150000.3.7.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20233688-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-37327.html</URL>
        <Description>CVE-2023-37327</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1213128</URL>
        <Description>SUSE Bug 1213128</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
