vulnerability
SUSE: CVE-2025-59728: SUSE Linux Security Advisory
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 9 | (AV:N/AC:L/Au:N/C:C/I:N/A:C) | Oct 22, 2025 | Dec 5, 2025 | Dec 10, 2025 |
Severity
9
CVSS
(AV:N/AC:L/Au:N/C:C/I:N/A:C)
Published
Oct 22, 2025
Added
Dec 5, 2025
Modified
Dec 10, 2025
Description
When calculating the content path in handling of MPEG-DASH manifests, there's an out-of-bounds NUL-byte write one byte past the end of the buffer.When we call xmlNodeGetContent below [0], it returns a buffer precisely allocated to match the string length, using strdup internally. If this buffer is not an empty string, it is assigned to root_url at [1].If the last (non-NUL) byte in this buffer is not '/' then we append '/' in-place at [2]. This will write two bytes into the buffer, starting at the last valid byte in the buffer, writing the NUL byte beyond the end of the allocated buffer.
Solutions
suse-upgrade-ffmpeg-4suse-upgrade-ffmpeg-4-libavcodec-develsuse-upgrade-ffmpeg-4-libavdevice-develsuse-upgrade-ffmpeg-4-libavfilter-develsuse-upgrade-ffmpeg-4-libavformat-develsuse-upgrade-ffmpeg-4-libavresample-develsuse-upgrade-ffmpeg-4-libavutil-develsuse-upgrade-ffmpeg-4-libpostproc-develsuse-upgrade-ffmpeg-4-libswresample-develsuse-upgrade-ffmpeg-4-libswscale-develsuse-upgrade-ffmpeg-4-private-develsuse-upgrade-libavcodec58_134suse-upgrade-libavcodec58_134-32bitsuse-upgrade-libavdevice58_13suse-upgrade-libavdevice58_13-32bitsuse-upgrade-libavfilter7_110suse-upgrade-libavfilter7_110-32bitsuse-upgrade-libavformat58_76suse-upgrade-libavformat58_76-32bitsuse-upgrade-libavresample4_0suse-upgrade-libavresample4_0-32bitsuse-upgrade-libavutil56_70suse-upgrade-libavutil56_70-32bitsuse-upgrade-libpostproc55_9suse-upgrade-libpostproc55_9-32bitsuse-upgrade-libswresample3_9suse-upgrade-libswresample3_9-32bitsuse-upgrade-libswscale5_9suse-upgrade-libswscale5_9-32bit
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.