openSUSE 16 Security Update : ffmpeg-4 (openSUSE-SU-2026:20710-1)

high Nessus Plugin ID 313747

Synopsis

The remote openSUSE host is missing one or more security updates.

Description

The remote openSUSE 16 host has packages installed that are affected by multiple vulnerabilities as referenced in the openSUSE-SU-2026:20710-1 advisory.

Changes in ffmpeg-4:

- CVE-2025-59728: Fixed out-of-bounds NUL-byte write when calculating the content path in handling of MPEG-DASH manifests (bsc#1251137).
- CVE-2025-7700: Fixed a NULL Pointer Dereference in the ALS Decoder (bsc#1246790)
- CVE-2024-36618: Fixed a integer overflow in AVI demuxer (bsc#1234020)
- CVE-2023-6601: Fixed HLS Unsafe File Extension Bypass (bsc#1220545).

- Update to release 4.4.6
* lavc/libx265: unbreak build for X265_BUILD >= 210
* ARM: vp9mc: Load only 12 pixels in the 4 pixel wide horizontal filter
* rtmpproto: Avoid rare crashes in the `fail:` codepath in rtmp_open
* avcodec/snow: Fix off by 1 error in run_buffer
* avcodec/mpegvideo_enc: Check FLV1 resolution limits

Tenable has extracted the preceding description block directly from the SUSE security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://www.suse.com/security/cve/CVE-2023-49502

https://www.suse.com/security/cve/CVE-2023-50010

https://bugzilla.suse.com/1223304

https://www.suse.com/security/cve/CVE-2023-51798

https://bugzilla.suse.com/1226892

https://bugzilla.suse.com/1226897

https://bugzilla.suse.com/1226898

https://bugzilla.suse.com/1226899

https://bugzilla.suse.com/1226900

https://bugzilla.suse.com/1226901

https://www.suse.com/security/cve/CVE-2023-22656

https://www.suse.com/security/cve/CVE-2023-45221

https://www.suse.com/security/cve/CVE-2023-47169

https://www.suse.com/security/cve/CVE-2023-47282

https://www.suse.com/security/cve/CVE-2023-48368

https://www.suse.com/security/cve/CVE-2025-0518

https://www.suse.com/security/cve/CVE-2025-22919

https://bugzilla.suse.com/1230983

https://bugzilla.suse.com/1198898

https://bugzilla.suse.com/1234018

https://bugzilla.suse.com/1234019

https://bugzilla.suse.com/1234020

https://www.suse.com/security/cve/CVE-2022-1475

https://www.suse.com/security/cve/CVE-2024-36616

https://www.suse.com/security/cve/CVE-2024-36617

https://www.suse.com/security/cve/CVE-2024-36618

https://bugzilla.suse.com/1246790

https://www.suse.com/security/cve/CVE-2025-7700

https://bugzilla.suse.com/1226308

https://bugzilla.suse.com/1251137

https://www.suse.com/security/cve/CVE-2025-59728

https://bugzilla.suse.com/1220545

https://www.suse.com/security/cve/CVE-2023-6601

Plugin Details

Severity: High

ID: 313747

File Name: openSUSE-2026-20710-1.nasl

Version: 1.1

Type: Local

Agent: unix

Published: 5/11/2026

Updated: 5/11/2026

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.4

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P

CVSS Score Source: CVE-2022-1475

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 7

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

CVSS Score Source: CVE-2023-45221

CVSS v4

Risk Factor: High

Base Score: 8.7

Threat Score: 7.2

Threat Vector: CVSS:4.0/E:P

Vector: CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N

CVSS Score Source: CVE-2025-59728

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:ffmpeg-4-libavcodec-devel, p-cpe:/a:novell:opensuse:ffmpeg-4-libavdevice-devel, p-cpe:/a:novell:opensuse:ffmpeg-4-libavfilter-devel, p-cpe:/a:novell:opensuse:ffmpeg-4-libavformat-devel, p-cpe:/a:novell:opensuse:ffmpeg-4-libavresample-devel, p-cpe:/a:novell:opensuse:ffmpeg-4-libavutil-devel, p-cpe:/a:novell:opensuse:ffmpeg-4-libpostproc-devel, p-cpe:/a:novell:opensuse:ffmpeg-4-libswresample-devel, p-cpe:/a:novell:opensuse:ffmpeg-4-libswscale-devel, p-cpe:/a:novell:opensuse:ffmpeg-4-private-devel, p-cpe:/a:novell:opensuse:ffmpeg-4, p-cpe:/a:novell:opensuse:libavcodec58_134, p-cpe:/a:novell:opensuse:libavdevice58_13, p-cpe:/a:novell:opensuse:libavfilter7_110, p-cpe:/a:novell:opensuse:libavformat58_76, p-cpe:/a:novell:opensuse:libavresample4_0, p-cpe:/a:novell:opensuse:libavutil56_70, p-cpe:/a:novell:opensuse:libpostproc55_9, p-cpe:/a:novell:opensuse:libswresample3_9, p-cpe:/a:novell:opensuse:libswscale5_9, cpe:/o:novell:opensuse:16.0

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 5/9/2026

Vulnerability Publication Date: 5/2/2022

Reference Information

CVE: CVE-2022-1475, CVE-2023-22656, CVE-2023-45221, CVE-2023-47169, CVE-2023-47282, CVE-2023-48368, CVE-2023-49502, CVE-2023-50010, CVE-2023-51798, CVE-2023-6601, CVE-2024-36616, CVE-2024-36617, CVE-2024-36618, CVE-2025-0518, CVE-2025-22919, CVE-2025-59728, CVE-2025-7700