QID 750153
QID 750153: SUSE Enterprise Linux Security Update for gstreamer-plugins-bad (SUSE-SU-2021:1944-1)
This update for gstreamer-plugins-bad fixes the following issues: - update to version 1.16.3: - cve-2021-3185: buffer overflow in gst_h264_slice_parse_dec_ref_pic_marking() (bsc#1181255) - amcvideodec: fix sync meta copying not taking a reference - audiobuffersplit: perform discont tracking on running time - audiobuffersplit: specify in the template caps that only interleaved audio is supported - audiobuffersplit: unset discont flag if not discontinuous - autoconvert: fix lock-less exchange or free condition - autoconvert: fix compiler warnings with g_atomic on recent glib versions - avfvideosrc: element requests camera permissions even with capture-screen property is true - codecparsers: h264parser: guard against ref_pic_markings overflow - dtlsconnection: avoid segmentation fault when no srtp capabilities are negotiated - dtls/connection: fix eof handling with openssl 1.1.1e - fdkaacdec: add support for mpegversion=2 - hls: check nettle version to ensure aes128 support - ipcpipeline: rework compiler checks - interlace: increment phase_index before checking if we're at the end of the phase - h264parser: do not allocate too large size of memory for registered user data sei - ladspa: fix unbounded integer properties - modplug: avoid division by zero - msdkdec: fix gstmsdkcontext leak - msdkenc: fix leaks on windows - musepackdec: don't fail all queries if no sample rate is known yet - openslessink: allow openslessink to handle 48khz streams.
- opencv: allow compilation against 4.2.x - proxysink: event_function needs to handle the event when it is disconnecetd from proxysrc - vulkan: drop use of vk_result_begin_range - wasapi: added missing lock release in case of error in gst_wasapi_xxx_reset - wasapi: fix possible deadlock while downwards state change - waylandsink: clear window when pipeline is stopped - webrtc: support non-trickle ice candidates in the sdp - webrtc: unmap all non-binary buffers received via the datachannel
Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
Successful exploitation allows attacker to compromise the system.
- SUSE-SU-2021:1944-1 -
lists.suse.com/pipermail/sle-security-updates/2021-June/008991.html
CVEs related to QID 750153
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| SUSE-SU-2021:1944-1 | SUSE Enterprise Linux |
|