Bug 1223263 (CVE-2023-50186) - VUL-0: CVE-2023-50186: gstreamer-plugins-bad: buffer overflow vulnerability
Summary: VUL-0: CVE-2023-50186: gstreamer-plugins-bad: buffer overflow vulnerability
Status: RESOLVED FIXED
Alias: CVE-2023-50186
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Major
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/402774/
Whiteboard: CVSSv3.1:SUSE:CVE-2023-50186:7.5:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2024-04-22 14:12 UTC by SMASH SMASH
Modified: 2024-06-10 12:44 UTC (History)
2 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description SMASH SMASH 2024-04-22 14:12:44 UTC
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-5583-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
December 21, 2023                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : gst-plugins-bad1.0
CVE ID         : not yet available

A buffer overflow was discovered in the AV1 video plugin for the
GStreamer media framework, which may result in denial of service or
potentially the execution of arbitrary code if a malformed media file
is opened.

The oldstable distribution (bullseye) is not affected.

For the stable distribution (bookworm), this problem has been fixed in
version 1.22.0-4+deb12u4.

We recommend that you upgrade your gst-plugins-bad1.0 packages.

For the detailed security status of gst-plugins-bad1.0 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/gst-plugins-bad1.0

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
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-----END PGP SIGNATURE-----

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-50186
https://bugzilla.redhat.com/show_bug.cgi?id=2255639
https://www.zerodayinitiative.com/advisories/ZDI-24-368/
Comment 1 Gianluca Gabrielli 2024-04-22 14:16:37 UTC
Affected packages are:
 - SUSE:SLE-15-SP4:Update/gstreamer-plugins-bad
 - SUSE:SLE-15-SP5:Update/gstreamer-plugins-bad

and Cliff already submitted the patch back in December via gstreamer-plugins-bad-ZDI-CAN-22300.patch. Hence, nothing needs to be fixed.

Nevertheless, we need the CVE ID and this BZ bug ID to be mentioned in the changes file. @Cliff can you please adjust the changes file of both above mentioned packages?

Thanks.
Comment 6 Gabriele Sonnu 2024-06-10 12:44:18 UTC
All done, closing.