First published: Tue Jan 02 2024(Updated: )
Important: gstreamer1-plugins-bad-free security update
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/gstreamer1-plugins-bad-free | <1.10.4-4.el7_9 | 1.10.4-4.el7_9 |
redhat/gstreamer1-plugins-bad-free | <1.10.4-4.el7_9 | 1.10.4-4.el7_9 |
redhat/gstreamer1-plugins-bad-free-debuginfo | <1.10.4-4.el7_9 | 1.10.4-4.el7_9 |
redhat/gstreamer1-plugins-bad-free-debuginfo | <1.10.4-4.el7_9 | 1.10.4-4.el7_9 |
redhat/gstreamer1-plugins-bad-free-devel | <1.10.4-4.el7_9 | 1.10.4-4.el7_9 |
redhat/gstreamer1-plugins-bad-free-devel | <1.10.4-4.el7_9 | 1.10.4-4.el7_9 |
redhat/gstreamer1-plugins-bad-free-gtk | <1.10.4-4.el7_9 | 1.10.4-4.el7_9 |
redhat/gstreamer1-plugins-bad-free-gtk | <1.10.4-4.el7_9 | 1.10.4-4.el7_9 |
redhat/gstreamer1-plugins-bad-free | <1.10.4-4.el7_9 | 1.10.4-4.el7_9 |
redhat/gstreamer1-plugins-bad-free-debuginfo | <1.10.4-4.el7_9 | 1.10.4-4.el7_9 |
redhat/gstreamer1-plugins-bad-free-devel | <1.10.4-4.el7_9 | 1.10.4-4.el7_9 |
redhat/gstreamer1-plugins-bad-free-gtk | <1.10.4-4.el7_9 | 1.10.4-4.el7_9 |
Red Hat Enterprise Linux for Power, little endian - Extended Update Support | ||
Red Hat Enterprise Linux 8 | ||
Red Hat Enterprise Linux Server for IBM z Systems | ||
Red Hat Enterprise Linux for Scientific Computing | ||
Red Hat Enterprise Linux for Power, big endian | ||
Red Hat Enterprise Linux | ||
Red Hat Enterprise Linux Workstation Supplementary |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2024:0013 is classified as important.
To fix RHSA-2024:0013, update the package gstreamer1-plugins-bad-free to version 1.10.4-4.el7_9.
RHSA-2024:0013 affects various versions of Red Hat Enterprise Linux, including Server, Desktop, and Scientific Computing.
Yes, RHSA-2024:0013 also affects the gstreamer1-plugins-bad-free-debuginfo, gstreamer1-plugins-bad-free-devel, and gstreamer1-plugins-bad-free-gtk packages.
For more information about RHSA-2024:0013, you can check the Red Hat advisory.