git: d1aaee3f16d3 - main - security/vuxml: Document gstreamer1-plugins* < 1.24.10

From: Jason E. Hale <jhale_at_FreeBSD.org>
Date: Fri, 06 Dec 2024 16:57:01 UTC
The branch main has been updated by jhale:

URL: https://cgit.FreeBSD.org/ports/commit/?id=d1aaee3f16d38da210b3f2cba880804386ce32b4

commit d1aaee3f16d38da210b3f2cba880804386ce32b4
Author:     Jason E. Hale <jhale@FreeBSD.org>
AuthorDate: 2024-12-06 16:49:34 +0000
Commit:     Jason E. Hale <jhale@FreeBSD.org>
CommitDate: 2024-12-06 16:56:56 +0000

    security/vuxml: Document gstreamer1-plugins* < 1.24.10
---
 security/vuxml/vuln/2024.xml | 257 +++++++++++++++++++++++++++++++++++++++++++
 1 file changed, 257 insertions(+)

diff --git a/security/vuxml/vuln/2024.xml b/security/vuxml/vuln/2024.xml
index 64143e0bf797..8114c8efcc33 100644
--- a/security/vuxml/vuln/2024.xml
+++ b/security/vuxml/vuln/2024.xml
@@ -1,3 +1,260 @@
+  <vuln vid="7f3a302b-b3e8-11ef-b680-4ccc6adda413">
+    <topic>gstreamer1-plugins-vorbis -- Stack buffer-overflow in Vorbis decoder</topic>
+    <affects>
+      <package>
+	<name>gstreamer1-plugins-vorbis</name>
+	<range><lt>1.24.10</lt></range>
+      </package>
+    </affects>
+    <description>
+	<body xmlns="http://www.w3.org/1999/xhtml">
+	<p>The GStreamer Security Center reports:</p>
+	<blockquote cite="https://gstreamer.freedesktop.org/security/">
+	  <p>Stack buffer-overflow in Vorbis decoder that can cause crashes for
+	    certain input files.</p>
+	</blockquote>
+	</body>
+    </description>
+    <references>
+      <cvename>CVE-2024-47538</cvename>
+      <url>https://gstreamer.freedesktop.org/security/sa-2024-0022.html</url>
+    </references>
+    <dates>
+      <discovery>2024-12-03</discovery>
+      <entry>2024-12-06</entry>
+    </dates>
+  </vuln>
+
+  <vuln vid="7d1b4e5d-b3e8-11ef-b680-4ccc6adda413">
+    <topic>gstreamer1-plugins-opus -- Stack buffer-overflow in Opus decoder</topic>
+    <affects>
+      <package>
+	<name>gstreamer1-plugins-opus</name>
+	<range><lt>1.24.10</lt></range>
+      </package>
+    </affects>
+    <description>
+	<body xmlns="http://www.w3.org/1999/xhtml">
+	<p>The GStreamer Security Center reports:</p>
+	<blockquote cite="https://gstreamer.freedesktop.org/security/">
+	  <p>Stack buffer-overflow in Opus decoder that can cause crashes for
+	    certain input files.</p>
+	</blockquote>
+	</body>
+    </description>
+    <references>
+      <cvename>CVE-2024-47607</cvename>
+      <url>https://gstreamer.freedesktop.org/security/sa-2024-0024.html</url>
+    </references>
+    <dates>
+      <discovery>2024-12-03</discovery>
+      <entry>2024-12-06</entry>
+    </dates>
+  </vuln>
+
+  <vuln vid="7b34ddf7-b3e8-11ef-b680-4ccc6adda413">
+    <topic>gstreamer1-plugins-ogg -- Out-of-bounds write in Ogg demuxer</topic>
+    <affects>
+      <package>
+	<name>gstreamer1-plugins-ogg</name>
+	<range><lt>1.24.10</lt></range>
+      </package>
+    </affects>
+    <description>
+	<body xmlns="http://www.w3.org/1999/xhtml">
+	<p>The GStreamer Security Center reports:</p>
+	<blockquote cite="https://gstreamer.freedesktop.org/security/">
+	  <p>An out-of-bounds write in the Ogg demuxer that can cause crashes
+	    for certain input files.</p>
+	</blockquote>
+	</body>
+    </description>
+    <references>
+      <cvename>CVE-2024-47615</cvename>
+      <url>https://gstreamer.freedesktop.org/security/sa-2024-0026.html</url>
+    </references>
+    <dates>
+      <discovery>2024-12-03</discovery>
+      <entry>2024-12-06</entry>
+    </dates>
+  </vuln>
+
+  <vuln vid="7945c543-b3e8-11ef-b680-4ccc6adda413">
+    <topic>gstreamer1-plugins-jpeg -- NULL-pointer dereferences in JPEG decoder</topic>
+    <affects>
+      <package>
+	<name>gstreamer1-plugins-jpeg</name>
+	<range><lt>1.24.10</lt></range>
+      </package>
+    </affects>
+    <description>
+	<body xmlns="http://www.w3.org/1999/xhtml">
+	<p>The GStreamer Security Center reports:</p>
+	<blockquote cite="https://gstreamer.freedesktop.org/security/">
+	  <p>Insufficient error handling in the JPEG decoder that can lead to
+	    NULL-pointer dereferences, and that can cause crashes for certain
+	    input files.</p>
+	</blockquote>
+	</body>
+    </description>
+    <references>
+      <cvename>CVE-2024-47599</cvename>
+      <url>https://gstreamer.freedesktop.org/security/sa-2024-0016.html</url>
+    </references>
+    <dates>
+      <discovery>2024-12-03</discovery>
+      <entry>2024-12-06</entry>
+    </dates>
+  </vuln>
+
+  <vuln vid="772d8625-b3e8-11ef-b680-4ccc6adda413">
+    <topic>gstreamer1-plugins-gdkpixbuf -- NULL-pointer dereference</topic>
+    <affects>
+      <package>
+	<name>gstreamer1-plugins-gdkpixbuf</name>
+	<range><lt>1.24.10</lt></range>
+      </package>
+    </affects>
+    <description>
+	<body xmlns="http://www.w3.org/1999/xhtml">
+	<p>The GStreamer Security Center reports:</p>
+	<blockquote cite="https://gstreamer.freedesktop.org/security/">
+	  <p>A NULL-pointer dereference in the gdk-pixbuf decoder that can
+	    cause crashes for certain input files.</p>
+	</blockquote>
+	</body>
+    </description>
+    <references>
+      <cvename>CVE-2024-47613</cvename>
+      <url>https://gstreamer.freedesktop.org/security/sa-2024-0025.html</url>
+    </references>
+    <dates>
+      <discovery>2024-12-03</discovery>
+      <entry>2024-12-06</entry>
+    </dates>
+  </vuln>
+
+  <vuln vid="750ab972-b3e8-11ef-b680-4ccc6adda413">
+    <topic>gstreamer1-plugins-good -- multiple vulnerabilities</topic>
+    <affects>
+      <package>
+	<name>gstreamer1-plugins-good</name>
+	<range><lt>1.24.10</lt></range>
+      </package>
+    </affects>
+    <description>
+	<body xmlns="http://www.w3.org/1999/xhtml">
+	<p>The GStreamer Security Center reports:</p>
+	<blockquote cite="https://gstreamer.freedesktop.org/security/">
+	  <p>20 security bugs.</p>
+	  <ul>
+	    <li>CVE-2024-47537: Integer overflow in MP4/MOV sample table parser leading to out-of-bounds writes</li>
+	    <li>CVE-2024-47598: MP4/MOV sample table parser out-of-bounds read</li>
+	    <li>CVE-2024-47539: MP4/MOV Closed Caption handling out-of-bounds write</li>
+	    <li>CVE-2024-47543: MP4/MOV demuxer out-of-bounds read</li>
+	    <li>CVE-2024-47545: Integer overflow in MP4/MOV demuxer that can result in out-of-bounds read</li>
+	    <li>CVE-2024-47544: NULL-pointer dereferences in MP4/MOV demuxer CENC handling</li>
+	    <li>CVE-2024-47597: Out-of-bounds reads in MP4/MOV demuxer sample table parser</li>
+	    <li>CVE-2024-47546: Integer underflow in MP4/MOV demuxer that can lead to out-of-bounds reads</li>
+	    <li>CVE-2024-47606: Integer overflows in MP4/MOV demuxer and memory allocator that can lead to out-of-bounds writes</li>
+	    <li>CVE-2024-47596: Integer underflow in MP4/MOV demuxer that can lead to out-of-bounds reads</li>
+	    <li>CVE-2024-47540: Usage of uninitialized stack memory in Matroska/WebM demuxer</li>
+	    <li>CVE-2024-47602: NULL-pointer dereferences and out-of-bounds reads in Matroska/WebM demuxer</li>
+	    <li>CVE-2024-47601: NULL-pointer dereference in Matroska/WebM demuxer</li>
+	    <li>CVE-2024-47603: NULL-pointer dereference in Matroska/WebM demuxer</li>
+	    <li>CVE-2024-47775: Out-of-bounds read in WAV parser</li>
+	    <li>CVE-2024-47776: Out-of-bounds read in WAV parser</li>
+	    <li>CVE-2024-47777: Out-of-bounds read in WAV parser</li>
+	    <li>CVE-2024-47778: Out-of-bounds read in WAV parser</li>
+	    <li>CVE-2024-47774: Integer overflow in AVI subtitle parser that leads to out-of-bounds reads</li>
+	    <li>CVE-2024-47834: Use-after-free in Matroska demuxer</li>
+	  </ul>
+	</blockquote>
+	</body>
+    </description>
+    <references>
+      <cvename>CVE-2024-47537</cvename>
+      <url>https://gstreamer.freedesktop.org/security/sa-2024-0005.html</url>
+      <cvename>CVE-2024-47598</cvename>
+      <url>https://gstreamer.freedesktop.org/security/sa-2024-0006.html</url>
+      <cvename>CVE-2024-47539</cvename>
+      <url>https://gstreamer.freedesktop.org/security/sa-2024-0007.html</url>
+      <cvename>CVE-2024-47543</cvename>
+      <url>https://gstreamer.freedesktop.org/security/sa-2024-0009.html</url>
+      <cvename>CVE-2024-47545</cvename>
+      <url>https://gstreamer.freedesktop.org/security/sa-2024-0010.html</url>
+      <cvename>CVE-2024-47544</cvename>
+      <url>https://gstreamer.freedesktop.org/security/sa-2024-0011.html</url>
+      <cvename>CVE-2024-47597</cvename>
+      <url>https://gstreamer.freedesktop.org/security/sa-2024-0012.html</url>
+      <cvename>CVE-2024-47546</cvename>
+      <url>https://gstreamer.freedesktop.org/security/sa-2024-0013.html</url>
+      <cvename>CVE-2024-47606</cvename>
+      <url>https://gstreamer.freedesktop.org/security/sa-2024-0014.html</url>
+      <cvename>CVE-2024-47596</cvename>
+      <url>https://gstreamer.freedesktop.org/security/sa-2024-0015.html</url>
+      <cvename>CVE-2024-47540</cvename>
+      <url>https://gstreamer.freedesktop.org/security/sa-2024-0017.html</url>
+      <cvename>CVE-2024-47602</cvename>
+      <url>https://gstreamer.freedesktop.org/security/sa-2024-0019.html</url>
+      <cvename>CVE-2024-47601</cvename>
+      <url>https://gstreamer.freedesktop.org/security/sa-2024-0020.html</url>
+      <cvename>CVE-2024-47603</cvename>
+      <url>https://gstreamer.freedesktop.org/security/sa-2024-0021.html</url>
+      <cvename>CVE-2024-47775</cvename>
+      <url>https://gstreamer.freedesktop.org/security/sa-2024-0027.html</url>
+      <cvename>CVE-2024-47776</cvename>
+      <url>https://gstreamer.freedesktop.org/security/sa-2024-0027.html</url>
+      <cvename>CVE-2024-47777</cvename>
+      <url>https://gstreamer.freedesktop.org/security/sa-2024-0027.html</url>
+      <cvename>CVE-2024-47778</cvename>
+      <url>https://gstreamer.freedesktop.org/security/sa-2024-0027.html</url>
+      <cvename>CVE-2024-47835</cvename>
+      <url>https://gstreamer.freedesktop.org/security/sa-2024-0028.html</url>
+      <cvename>CVE-2024-47834</cvename>
+      <url>https://gstreamer.freedesktop.org/security/sa-2024-0030.html</url>
+    </references>
+    <dates>
+      <discovery>2024-12-03</discovery>
+      <entry>2024-12-06</entry>
+    </dates>
+  </vuln>
+
+  <vuln vid="7256fae8-b3e8-11ef-b680-4ccc6adda413">
+    <topic>gstreamer1-plugins -- multiple vulnerabilities</topic>
+    <affects>
+      <package>
+	<name>gstreamer1-plugins</name>
+	<range><lt>1.24.10</lt></range>
+      </package>
+    </affects>
+    <description>
+	<body xmlns="http://www.w3.org/1999/xhtml">
+	<p>The GStreamer Security Center reports:</p>
+	<blockquote cite="https://gstreamer.freedesktop.org/security/">
+	  <p>3 security bugs.</p>
+	  <ul>
+	    <li>CVE-2024-47542: ID3v2 parser out-of-bounds read and NULL-pointer dereference</li>
+	    <li>CVE-2024-47600: Out-of-bounds read in gst-discoverer-1.0 commandline tool</li>
+	    <li>CVE-2024-47541: Out-of-bounds write in SSA subtitle parser</li>
+	  </ul>
+	</blockquote>
+	</body>
+    </description>
+    <references>
+      <cvename>CVE-2024-47542</cvename>
+      <url>https://gstreamer.freedesktop.org/security/sa-2024-0008.html</url>
+      <cvename>CVE-2024-47600</cvename>
+      <url>https://gstreamer.freedesktop.org/security/sa-2024-0018.html</url>
+      <cvename>CVE-2024-47541</cvename>
+      <url>https://gstreamer.freedesktop.org/security/sa-2024-0023.html</url>
+    </references>
+    <dates>
+      <discovery>2024-12-03</discovery>
+      <entry>2024-12-06</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="f0d33375-b0e0-11ef-a724-b42e991fc52e">
     <topic>zabbix -- SQL injection in user.get API</topic>
     <affects>