gstreamer1-plugins-base-1.22.12-4.el9

エラータID: AXSA:2025-10279:01

Release date: 
Tuesday, July 1, 2025 - 00:12
Subject: 
gstreamer1-plugins-base-1.22.12-4.el9
Affected Channels: 
MIRACLE LINUX 9 for x86_64
Severity: 
Moderate
Description: 

GStreamer is a streaming media framework based on graphs of filters which operate on media data. The gstreamer1-plugins-base packages contain a collection of well-maintained base plug-ins.

Security Fix(es):

* gstreamer1-plugins-base: ID3v2 parser out-of-bounds read and NULL-pointer dereference (CVE-2024-47542)
* gstreamer1-plugins-base: GStreamer has an out-of-bounds write in SSA subtitle parser (CVE-2024-47541)
* gstreamer1-plugins-base: GStreamer has an OOB-read in format_channel_mask (CVE-2024-47600)
* gstreamer1-plugins-base: NULL-pointer dereference in LRC subtitle parser (CVE-2024-47835)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the MIRACLE LINUX 9 Release Notes linked from the References section.

CVE-2024-47541
GStreamer is a library for constructing graphs of media-handling components. An OOB-write vulnerability has been identified in the gst_ssa_parse_remove_override_codes function of the gstssaparse.c file. This function is responsible for parsing and removing SSA (SubStation Alpha) style override codes, which are enclosed in curly brackets ({}). The issue arises when a closing curly bracket "}" appears before an opening curly bracket "{" in the input string. In this case, memmove() incorrectly duplicates a substring. With each successive loop iteration, the size passed to memmove() becomes progressively larger (strlen(end+1)), leading to a write beyond the allocated memory bounds. This vulnerability is fixed in 1.24.10.
CVE-2024-47542
GStreamer is a library for constructing graphs of media-handling components. A null pointer dereference has been discovered in the id3v2_read_synch_uint function, located in id3v2.c. If id3v2_read_synch_uint is called with a null work->hdr.frame_data, the pointer guint8 *data is accessed without validation, resulting in a null pointer dereference. This vulnerability can result in a Denial of Service (DoS) by triggering a segmentation fault (SEGV). This vulnerability is fixed in 1.24.10.
CVE-2024-47600
GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerability has been detected in the format_channel_mask function in gst-discoverer.c. The vulnerability affects the local array position, which is defined with a fixed size of 64 elements. However, the function gst_discoverer_audio_info_get_channels may return a guint channels value greater than 64. This causes the for loop to attempt access beyond the bounds of the position array, resulting in an OOB-read when an index greater than 63 is used. This vulnerability can result in reading unintended bytes from the stack. Additionally, the dereference of value->value_nick after the OOB-read can lead to further memory corruption or undefined behavior. This vulnerability is fixed in 1.24.10.
CVE-2024-47835
GStreamer is a library for constructing graphs of media-handling components. A null pointer dereference vulnerability has been detected in the parse_lrc function within gstsubparse.c. The parse_lrc function calls strchr() to find the character ']' in the string line. The pointer returned by this call is then passed to g_strdup(). However, if the string line does not contain the character ']', strchr() returns NULL, and a call to g_strdup(start + 1) leads to a null pointer dereference. This vulnerability is fixed in 1.24.10.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. gstreamer1-plugins-base-1.22.12-4.el9.src.rpm
    MD5: 04b3e5bdc2d8dadaafc8d454e93cabf0
    SHA-256: a11e99559af1a06afd2de0b6f8eaa7b06e67db69121a44d0618f281cfa205387
    Size: 2.30 MB

Asianux Server 9 for x86_64
  1. gstreamer1-plugins-base-1.22.12-4.el9.i686.rpm
    MD5: 0cd33b11ceffea43cd0b716f73bc9e3d
    SHA-256: 7b1526906ddb88f4630eb3a7acc0593fc1df56222091d78898fb89780cf8392c
    Size: 2.30 MB
  2. gstreamer1-plugins-base-1.22.12-4.el9.x86_64.rpm
    MD5: d57e9e1c88198f105b965a776d1594a4
    SHA-256: b7811c04055ed2fac7064728d52e8e44d45cafe9c48239824c759b0190365924
    Size: 2.23 MB
  3. gstreamer1-plugins-base-devel-1.22.12-4.el9.i686.rpm
    MD5: d54f6aed3ddf8203718faa547f792b78
    SHA-256: e2f209df39a7f1e362149979372ce95cd1cc10fafbaa73339a6d1f902690c463
    Size: 523.25 kB
  4. gstreamer1-plugins-base-devel-1.22.12-4.el9.x86_64.rpm
    MD5: 15530d87ae1f5ba34ef24f3a67ee36c5
    SHA-256: cba832a6b35eb5d278f0360f1165085fc6e7bd3e5718e372239ec0711c053fdd
    Size: 523.68 kB
  5. gstreamer1-plugins-base-tools-1.22.12-4.el9.x86_64.rpm
    MD5: c973678d6781fb18039a3fed3093e9ef
    SHA-256: c06b17b1fdc041956603dd35ba60601a9606c54aa7482e5415efbcff53a8c7f7
    Size: 45.55 kB