Login
Newsletter
Werbung

Sicherheit: Zwei Probleme in gstreamer1, gstreamer1-plugins-bad-free, gstreamer1-plugins-ugly-free und gstreamer1-rtsp-server
Aktuelle Meldungen Distributionen
Name: Zwei Probleme in gstreamer1, gstreamer1-plugins-bad-free, gstreamer1-plugins-ugly-free und gstreamer1-rtsp-server
ID: RHSA-2025:7178
Distribution: Red Hat
Plattformen: Red Hat Enterprise Linux AppStream (v. 9), Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)
Datum: Di, 13. Mai 2025, 23:16
Referenzen: https://bugzilla.redhat.com/show_bug.cgi?id=2282999
https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/9/html/9.6_release_notes/index
https://access.redhat.com/errata/RHSA-2025:7178
https://access.redhat.com/security/cve/CVE-2024-4453
https://access.redhat.com/security/cve/CVE-2024-0444
https://bugzilla.redhat.com/show_bug.cgi?id=2292335
Applikationen: gstreamer1-plugins-bad-free, gstreamer1-plugins-ugly-free, gstreamer1-rtsp-server, GStreamer

Originalnachricht

An update for gstreamer1, gstreamer1-plugins-bad-free,
gstreamer1-plugins-ugly-free, and gstreamer1-rtsp-server is now available for Red Hat Enterprise Linux 9.

Red Hat Product Security has rated this update as having a security impact of
Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

The gstreamer1 packages contain a streaming media framework, based on graphs of
filters which operate on media data.

Security Fix(es):

* gstreamer: EXIF Metadata Parsing Integer Overflow (CVE-2024-4453)

* gstreamer: AV1 Video Parsing Stack-based Buffer Overflow (CVE-2024-0444)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat Enterprise
Linux 9 Release Notes linked from the References section.

This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

CVE-2024-0444: Stack-based Buffer Overflow (CWE-121)
CVE-2024-4453: Integer Overflow or Wraparound (CWE-190)
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung