{"id":"RLSA-2025:7242","summary":"Moderate: gstreamer1-plugins-good security update","details":"GStreamer is a streaming media framework based on graphs of filters which operate on media data. The gstreamer1-plugins-good packages contain a collection of well-supported plug-ins of good quality and under the LGPL license.\n\nSecurity Fix(es):\n\n* gstreamer1-plugins-good: OOB-read in qtdemux_parse_container (CVE-2024-47543)\n\n* gstreamer1-plugins-good: GStreamer has an OOB-read in gst_avi_subtitle_parse_gab2_chunk (CVE-2024-47774)\n\n* gstreamer1-plugins-good: OOB-read in gst_wavparse_smpl_chunk (CVE-2024-47777)\n\n* gstreamer1-plugins-good: OOB-read in gst_wavparse_adtl_chunk (CVE-2024-47778)\n\n* gstreamer1-plugins-good: OOB-read in parse_ds64 (CVE-2024-47775)\n\n* gstreamer1-plugins-good: OOB-read in FOURCC_SMI_ parsing (CVE-2024-47596)\n\n* gstreamer1-plugins-good: insufficient error handling in JPEG decoder that can lead to NULL-pointer dereferences (CVE-2024-47599)\n\n* gstreamer1-plugins-good: Use-After-Free read in Matroska CodecPrivate (CVE-2024-47834)\n\n* gstreamer1-plugins-good: OOB-read in gst_wavparse_cue_chunk (CVE-2024-47776)\n\n* gstreamer1-plugins-good: NULL-pointer dereferences in MP4/MOV demuxer CENC handling (CVE-2024-47544)\n\n* gstreamer1-plugins-good: NULL-pointer dereference in Matroska/WebM demuxer (CVE-2024-47601)\n\n* gstreamer1-plugins-good: OOB-read in qtdemux_parse_samples (CVE-2024-47597)\n\n* gstreamer1-plugins-good: integer underflow in extract_cc_from_data leading to OOB-read (CVE-2024-47546)\n\n* gstreamer1-plugins-good: NULL-pointer dereferences and out-of-bounds reads in Matroska/WebM demuxer (CVE-2024-47602)\n\n* gstreamer1-plugins-good: OOB-read in qtdemux_merge_sample_table (CVE-2024-47598)\n\n* gstreamer1-plugins-good: NULL-pointer dereference in Matroska/WebM demuxer (CVE-2024-47603)\n\n* gstreamer1-plugins-good: integer underflow in FOURCC_strf parsing leading to OOB-read (CVE-2024-47545)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Rocky Linux 9 Release Notes linked from the References section.","modified":"2025-10-07T17:39:26.667701Z","published":"2025-10-04T00:11:30.916420Z","upstream":["CVE-2024-47543","CVE-2024-47544","CVE-2024-47545","CVE-2024-47546","CVE-2024-47596","CVE-2024-47597","CVE-2024-47598","CVE-2024-47599","CVE-2024-47601","CVE-2024-47602","CVE-2024-47603","CVE-2024-47774","CVE-2024-47775","CVE-2024-47776","CVE-2024-47777","CVE-2024-47778","CVE-2024-47834"],"references":[{"type":"ADVISORY","url":"https://errata.rockylinux.org/RLSA-2025:7242"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2331723"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2331739"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2331741"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2331743"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2331744"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2331747"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2331748"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2331749"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2331750"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2331751"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2331752"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2331755"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2331756"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2331759"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2331761"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2331762"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2331763"}],"affected":[{"package":{"name":"gstreamer1-plugins-good","ecosystem":"Rocky Linux:9","purl":"pkg:rpm/rocky-linux/gstreamer1-plugins-good?distro=rocky-linux-9-6&epoch=0"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.22.12-4.el9"}],"database_specific":{"yum_repository":"AppStream"}}],"database_specific":{"source":"https://storage.googleapis.com/resf-osv-data/RLSA-2025:7242.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"credits":[{"name":"Rocky Enterprise Software Foundation"},{"name":"Red Hat"}]}