You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa gstreamer-0_10-plugins-good

Sigurnosni nedostaci programskog paketa gstreamer-0_10-plugins-good

SUSE Security Update: Security update for gstreamer-0_10-plugins-good
______________________________________________________________________________

Announcement ID: SUSE-SU-2017:0210-1
Rating: important
References: #1012102 #1012103 #1012104 #1013653 #1013655
#1013663
Cross-References: CVE-2016-9634 CVE-2016-9635 CVE-2016-9636
CVE-2016-9807 CVE-2016-9808 CVE-2016-9810

Affected Products:
SUSE Linux Enterprise Workstation Extension 12-SP2
SUSE Linux Enterprise Desktop 12-SP2
______________________________________________________________________________

An update that fixes 6 vulnerabilities is now available.

Description:

This update for gstreamer-0_10-plugins-good fixes the following issues:

– CVE-2016-9634: Invalid FLIC files could have caused and an out-of-bounds
write (bsc#1012102)
– CVE-2016-9635: Invalid FLIC files could have caused and an out-of-bounds
write (bsc#1012103)
– CVE-2016-9636: Prevent maliciously crafted flic files from causing
invalid memory writes (bsc#1012104)
– CVE-2016-9807: Prevent the reading of invalid memory in
flx_decode_chunks, leading to DoS (bsc#1013655)
– CVE-2016-9808: Prevent maliciously crafted flic files from causing
invalid memory accesses (bsc#1013653)
– CVE-2016-9810: Invalid files can be used to extraneous unreferences,
leading to invalid memory access and DoS (bsc#1013663)

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

– SUSE Linux Enterprise Workstation Extension 12-SP2:

zypper in -t patch SUSE-SLE-WE-12-SP2-2017-104=1

– SUSE Linux Enterprise Desktop 12-SP2:

zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2017-104=1

To bring your system up-to-date, use “zypper patch”.

Package List:

– SUSE Linux Enterprise Workstation Extension 12-SP2 (x86_64):

gstreamer-0_10-plugins-good-0.10.31-16.1
gstreamer-0_10-plugins-good-debuginfo-0.10.31-16.1
gstreamer-0_10-plugins-good-debugsource-0.10.31-16.1

– SUSE Linux Enterprise Workstation Extension 12-SP2 (noarch):

gstreamer-0_10-plugins-good-lang-0.10.31-16.1

– SUSE Linux Enterprise Desktop 12-SP2 (noarch):

gstreamer-0_10-plugins-good-lang-0.10.31-16.1

– SUSE Linux Enterprise Desktop 12-SP2 (x86_64):

gstreamer-0_10-plugins-good-0.10.31-16.1
gstreamer-0_10-plugins-good-debuginfo-0.10.31-16.1
gstreamer-0_10-plugins-good-debugsource-0.10.31-16.1

References:

https://www.suse.com/security/cve/CVE-2016-9634.html
https://www.suse.com/security/cve/CVE-2016-9635.html
https://www.suse.com/security/cve/CVE-2016-9636.html
https://www.suse.com/security/cve/CVE-2016-9807.html
https://www.suse.com/security/cve/CVE-2016-9808.html
https://www.suse.com/security/cve/CVE-2016-9810.html
https://bugzilla.suse.com/1012102
https://bugzilla.suse.com/1012103
https://bugzilla.suse.com/1012104
https://bugzilla.suse.com/1013653
https://bugzilla.suse.com/1013655
https://bugzilla.suse.com/1013663


To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

 

SUSE Security Update: Security update for gstreamer-0_10-plugins-good

______________________________________________________________________________

 

Announcement ID:    SUSE-SU-2017:0225-1

Rating:             important

References:         #1012102 #1012103 #1012104 #1013653 #1013655 

                    #1013663 

Cross-References:   CVE-2016-9634 CVE-2016-9635 CVE-2016-9636

                    CVE-2016-9807 CVE-2016-9808 CVE-2016-9810

                   

Affected Products:

                    SUSE Linux Enterprise Server 11-SP4

                    SUSE Linux Enterprise Debuginfo 11-SP4

______________________________________________________________________________

 

   An update that fixes 6 vulnerabilities is now available.

 

Description:

 

 

   gstreamer-0_10-plugins-good was updated to fix six security issues.

 

   These security issues were fixed:

 

   - CVE-2016-9634: Invalid FLIC files could have caused and an out-of-bounds

     write (bsc#1012102)

   - CVE-2016-9635: Invalid FLIC files could have caused and an out-of-bounds

     write (bsc#1012103)

   - CVE-2016-9636: Prevent maliciously crafted flic files from causing

     invalid memory writes (bsc#1012104).

   - CVE-2016-9807: Prevent the reading of invalid memory in

     flx_decode_chunks, leading to DoS (bsc#1013655)

   - CVE-2016-9808: Prevent maliciously crafted flic files from causing

     invalid memory accesses (bsc#1013653)

   - CVE-2016-9810: Invalid files can be used to extraneous unreferences,

     leading to invalid memory access and DoS (bsc#1013663)

 

 

Patch Instructions:

 

   To install this SUSE Security Update use YaST online_update.

   Alternatively you can run the command listed for your product:

 

   - SUSE Linux Enterprise Server 11-SP4:

 

      zypper in -t patch slessp4-gstreamer-0_10-plugins-good-12948=1

 

   - SUSE Linux Enterprise Debuginfo 11-SP4:

 

      zypper in -t patch dbgsp4-gstreamer-0_10-plugins-good-12948=1

 

   To bring your system up-to-date, use “zypper patch”.

 

 

Package List:

 

   - SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64):

 

      gstreamer-0_10-plugins-good-0.10.30-5.14.1

      gstreamer-0_10-plugins-good-doc-0.10.30-5.14.1

      gstreamer-0_10-plugins-good-lang-0.10.30-5.14.1

 

   - SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64):

 

      gstreamer-0_10-plugins-good-debuginfo-0.10.30-5.14.1

      gstreamer-0_10-plugins-good-debugsource-0.10.30-5.14.1

 

 

References:

 

   https://www.suse.com/security/cve/CVE-2016-9634.html

   https://www.suse.com/security/cve/CVE-2016-9635.html

   https://www.suse.com/security/cve/CVE-2016-9636.html

   https://www.suse.com/security/cve/CVE-2016-9807.html

   https://www.suse.com/security/cve/CVE-2016-9808.html

   https://www.suse.com/security/cve/CVE-2016-9810.html

   https://bugzilla.suse.com/1012102

   https://bugzilla.suse.com/1012103

   https://bugzilla.suse.com/1012104

   https://bugzilla.suse.com/1013653

   https://bugzilla.suse.com/1013655

   https://bugzilla.suse.com/1013663

 

– 

To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org

For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

 

 

 

   SUSE Security Update: Security update for gstreamer-0_10-plugins-good

______________________________________________________________________________

 

Announcement ID:    SUSE-SU-2017:0237-1

Rating:             important

References:         #1012102 #1012103 #1012104 #1013653 #1013655 

                    #1013663 

Cross-References:   CVE-2016-9634 CVE-2016-9635 CVE-2016-9636

                    CVE-2016-9807 CVE-2016-9808 CVE-2016-9810

                   

Affected Products:

                    SUSE Linux Enterprise Workstation Extension 12-SP1

                    SUSE Linux Enterprise Desktop 12-SP1

______________________________________________________________________________

 

   An update that fixes 6 vulnerabilities is now available.

 

Description:

 

 

   gstreamer-0_10-plugins-good was updated to fix five security issues.

 

   These security issues were fixed:

 

   - CVE-2016-9635: Invalid FLIC files could have caused and an out-of-bounds

     write (bsc#1012103).

   - CVE-2016-9634: Invalid FLIC files could have caused and an out-of-bounds

     write (bsc#1012102).

   - CVE-2016-9810: Invalid files can be used to extraneous unreferences,

     leading to invalid memory access and DoS (bsc#1013663).

   - CVE-2016-9807: Prevent the reading of invalid memory in

     flx_decode_chunks, leading to DoS (bsc#1013655).

   - CVE-2016-9808: Prevent maliciously crafted flic files from causing

     invalid memory accesses (bsc#1013653).

 

   To install this update libbz2-1 needs to be installed if it isn’t already

   present on the system.

 

 

Patch Instructions:

 

   To install this SUSE Security Update use YaST online_update.

   Alternatively you can run the command listed for your product:

 

   - SUSE Linux Enterprise Workstation Extension 12-SP1:

 

      zypper in -t patch SUSE-SLE-WE-12-SP1-2017-118=1

 

   - SUSE Linux Enterprise Desktop 12-SP1:

 

      zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2017-118=1

 

   To bring your system up-to-date, use “zypper patch”.

 

 

Package List:

 

   - SUSE Linux Enterprise Workstation Extension 12-SP1 (x86_64):

 

      gstreamer-0_10-plugins-good-0.10.31-13.3.3

      gstreamer-0_10-plugins-good-debuginfo-0.10.31-13.3.3

      gstreamer-0_10-plugins-good-debugsource-0.10.31-13.3.3

 

   - SUSE Linux Enterprise Workstation Extension 12-SP1 (noarch):

 

      gstreamer-0_10-plugins-good-lang-0.10.31-13.3.3

 

   - SUSE Linux Enterprise Desktop 12-SP1 (x86_64):

 

      gstreamer-0_10-plugins-good-0.10.31-13.3.3

      gstreamer-0_10-plugins-good-debuginfo-0.10.31-13.3.3

      gstreamer-0_10-plugins-good-debugsource-0.10.31-13.3.3

 

   - SUSE Linux Enterprise Desktop 12-SP1 (noarch):

 

      gstreamer-0_10-plugins-good-lang-0.10.31-13.3.3

 

 

References:

 

   https://www.suse.com/security/cve/CVE-2016-9634.html

   https://www.suse.com/security/cve/CVE-2016-9635.html

   https://www.suse.com/security/cve/CVE-2016-9636.html

   https://www.suse.com/security/cve/CVE-2016-9807.html

   https://www.suse.com/security/cve/CVE-2016-9808.html

   https://www.suse.com/security/cve/CVE-2016-9810.html

   https://bugzilla.suse.com/1012102

   https://bugzilla.suse.com/1012103

   https://bugzilla.suse.com/1012104

   https://bugzilla.suse.com/1013653

   https://bugzilla.suse.com/1013655

   https://bugzilla.suse.com/1013663

 

– 

To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org

For additional commands, e-mail: opensuse-security-announce+help@opensuse.org

Top
More in Preporuke
Sigurnosni nedostatak programskog paketa CVS

Otkriven je sigurnosni nedostatak u programskom paketu CVS za operacijski sustav Gentoo. Otkriveni nedostatak potencijalnim napadačima omogućuje izvođenje napada uskraćivanja...

Close