QID 750153

QID 750153: SUSE Enterprise Linux Security Update for gstreamer-plugins-bad (SUSE-SU-2021:1944-1)

This update for gstreamer-plugins-bad fixes the following issues: - update to version 1.16.3: - cve-2021-3185: buffer overflow in gst_h264_slice_parse_dec_ref_pic_marking() (bsc#1181255) - amcvideodec: fix sync meta copying not taking a reference - audiobuffersplit: perform discont tracking on running time - audiobuffersplit: specify in the template caps that only interleaved audio is supported - audiobuffersplit: unset discont flag if not discontinuous - autoconvert: fix lock-less exchange or free condition - autoconvert: fix compiler warnings with g_atomic on recent glib versions - avfvideosrc: element requests camera permissions even with capture-screen property is true - codecparsers: h264parser: guard against ref_pic_markings overflow - dtlsconnection: avoid segmentation fault when no srtp capabilities are negotiated - dtls/connection: fix eof handling with openssl 1.1.1e - fdkaacdec: add support for mpegversion=2 - hls: check nettle version to ensure aes128 support - ipcpipeline: rework compiler checks - interlace: increment phase_index before checking if we're at the end of the phase - h264parser: do not allocate too large size of memory for registered user data sei - ladspa: fix unbounded integer properties - modplug: avoid division by zero - msdkdec: fix gstmsdkcontext leak - msdkenc: fix leaks on windows - musepackdec: don't fail all queries if no sample rate is known yet - openslessink: allow openslessink to handle 48khz streams.
- opencv: allow compilation against 4.2.x - proxysink: event_function needs to handle the event when it is disconnecetd from proxysrc - vulkan: drop use of vk_result_begin_range - wasapi: added missing lock release in case of error in gst_wasapi_xxx_reset - wasapi: fix possible deadlock while downwards state change - waylandsink: clear window when pipeline is stopped - webrtc: support non-trickle ice candidates in the sdp - webrtc: unmap all non-binary buffers received via the datachannel

Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Successful exploitation allows attacker to compromise the system.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as High - 7.5 severity.
  • Solution
    Upgrade to the latest package which contains the patch. To install this SUSE Security, Update use YaST online_update. Alternatively you can run the command listed for your product. To install packages using the command line interface, use command "yum update". Refer to Suse security advisory: SUSE-SU-2021:1944-1 to address this issue and obtain further details.

    CVEs related to QID 750153

    Software Advisories
    Advisory ID Software Component Link
    SUSE-SU-2021:1944-1 SUSE Enterprise Linux URL Logo lists.suse.com/pipermail/sle-security-updates/2021-June/008991.html