[ALSA-2023:7791] Important: gstreamer1-plugins-bad-free security update
Type:
security
Severity:
important
Release date:
2023-12-14
Description:
GStreamer is a streaming media framework based on graphs of filters which operate on media data. The gstreamer1-plugins-bad-free package contains a collection of plug-ins for GStreamer. Security Fix(es): * gstreamer: AV1 codec parser heap-based buffer overflow (CVE-2023-44429) * gstreamer: MXF demuxer use-after-free vulnerability (CVE-2023-44446) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Updated packages listed below:
Architecture Package Checksum
aarch64 gstreamer1-plugins-bad-free-devel-1.22.1-2.el9_3.aarch64.rpm 06187b97d895156c30b4e678035dee5438f5f8957858aa277a609867955fdb19
aarch64 gstreamer1-plugins-bad-free-1.22.1-2.el9_3.aarch64.rpm 5e6f7ddbcd10385a4445f0049cc5cca2469ac7b508cc434809689976b396e4ff
i686 gstreamer1-plugins-bad-free-1.22.1-2.el9_3.i686.rpm 12d3e7338628430eccb2e6ecd6b5d2600dcaf79936cfeb7dce2ff62ba9180753
i686 gstreamer1-plugins-bad-free-devel-1.22.1-2.el9_3.i686.rpm 5c58e5c39390bd6e8cf2e604533df3a148ce0a9f47716cb244888b3be6115f0f
ppc64le gstreamer1-plugins-bad-free-devel-1.22.1-2.el9_3.ppc64le.rpm ab68e0f475726046633da5aed638d7135dc35e1f18b494baa755bb18e2fb0e9d
ppc64le gstreamer1-plugins-bad-free-1.22.1-2.el9_3.ppc64le.rpm b7931757bd43e0b64a676d9297c60a127cee18394d6eda1807cf6a4c0820245a
s390x gstreamer1-plugins-bad-free-devel-1.22.1-2.el9_3.s390x.rpm e1472557ce59794b671d66409200705c26c2d54eb8fe6ea23265f85e73e20893
s390x gstreamer1-plugins-bad-free-1.22.1-2.el9_3.s390x.rpm fe35fca090b17447e3f46fe5cc6bdebf083dfb275945ead106a42e5c7bc388b0
x86_64 gstreamer1-plugins-bad-free-devel-1.22.1-2.el9_3.x86_64.rpm 17ca22d84b6ddd9a2b2eb879db9a848c56645a3931f6ed220791eec3e3df514b
x86_64 gstreamer1-plugins-bad-free-1.22.1-2.el9_3.x86_64.rpm deb3ccf43c33c60bd43b203d7c0b41888f7b375db010edf5bbaeb72b2eb123c6
Notes:
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.