{"id":"CVE-2017-5843","details":"Multiple use-after-free vulnerabilities in the (1) gst_mini_object_unref, (2) gst_tag_list_unref, and (3) gst_mxf_demux_update_essence_tracks functions in GStreamer before 1.10.3 allow remote attackers to cause a denial of service (crash) via vectors involving stream tags, as demonstrated by 02785736.mxf.","modified":"2026-04-02T00:12:44.673845Z","published":"2017-02-09T15:59:01.567Z","related":["MGASA-2018-0012","MGASA-2018-0013","SUSE-SU-2017:0962-1"],"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2020/03/msg00038.html"},{"type":"ADVISORY","url":"https://gstreamer.freedesktop.org/releases/1.10/#1.10.3"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201705-10"},{"type":"ADVISORY","url":"http://www.debian.org/security/2017/dsa-3818"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2017/02/01/7"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/96001"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:2060"},{"type":"REPORT","url":"https://bugzilla.gnome.org/show_bug.cgi?id=777503"},{"type":"FIX","url":"http://www.openwall.com/lists/oss-security/2017/02/02/9"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/gstreamer/gstreamer","events":[{"introduced":"0"},{"last_affected":"d16edfdc698310fe25079136140d347f6d4b3835"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"1.10.2"}]}}],"versions":["1.19.3","1.19.90","1.20.0","1.20.1","1.20.2","1.20.3","1.20.4","1.20.5","1.20.6","1.20.7","1.21.1","1.21.2","1.21.3","1.21.90","1.22.0","1.22.1","1.22.10","1.22.11","1.22.12","1.22.2","1.22.3","1.22.4","1.22.5","1.22.6","1.22.7","1.22.8","1.22.9","1.23.1","1.23.2","1.23.90","1.24.0","1.24.1","1.24.10","1.24.11","1.24.12","1.24.13","1.24.2","1.24.3","1.24.4","1.24.5","1.24.6","1.24.7","1.24.8","1.24.9","1.25.1","1.25.50","1.25.90","1.26.0","1.26.1","1.26.10","1.26.11","1.26.2","1.26.3","1.26.4","1.26.5","1.26.6","1.26.7","1.26.8","1.26.9","1.27.1","1.27.2","1.27.50","1.27.90","1.28.0","1.28.1","1.29.1","gstreamer-vaapi-0.5.10","gstreamer-vaapi-0.6.0","gstreamer-vaapi-0.7.0","gstreamer-vaapi-1.10.0","gstreamer-vaapi-1.10.1","gstreamer-vaapi-1.10.2","gstreamer-vaapi-1.11.0","gstreamer-vaapi-1.11.1","gstreamer-vaapi-1.11.2","gstreamer-vaapi-1.11.90","gstreamer-vaapi-1.11.91","gstreamer-vaapi-1.12.0","gstreamer-vaapi-1.12.1","gstreamer-vaapi-1.12.2","gstreamer-vaapi-1.12.3","gstreamer-vaapi-1.12.4","gstreamer-vaapi-1.12.5","gstreamer-vaapi-1.13.1","gstreamer-vaapi-1.13.90","gstreamer-vaapi-1.13.91","gstreamer-vaapi-1.14.0","gstreamer-vaapi-1.14.1","gstreamer-vaapi-1.14.2","gstreamer-vaapi-1.14.3","gstreamer-vaapi-1.14.4","gstreamer-vaapi-1.14.5","gstreamer-vaapi-1.15.1","gstreamer-vaapi-1.15.2","gstreamer-vaapi-1.15.90","gstreamer-vaapi-1.16.0","gstreamer-vaapi-1.16.1","gstreamer-vaapi-1.16.2","gstreamer-vaapi-1.16.3","gstreamer-vaapi-1.17.1","gstreamer-vaapi-1.17.2","gstreamer-vaapi-1.17.90","gstreamer-vaapi-1.18.0","gstreamer-vaapi-1.18.1","gstreamer-vaapi-1.18.2","gstreamer-vaapi-1.18.3","gstreamer-vaapi-1.18.4","gstreamer-vaapi-1.18.5","gstreamer-vaapi-1.19.1","gstreamer-vaapi-1.19.2","gstreamer-vaapi-1.6.0","gstreamer-vaapi-1.7.90","gstreamer-vaapi-1.7.91","gstreamer-vaapi-1.8.0","gstreamer-vaapi-1.8.1","gstreamer-vaapi-1.8.2","gstreamer-vaapi-1.8.3","gstreamer-vaapi-1.9.1","gstreamer-vaapi-1.9.2","gstreamer-vaapi-1.9.90","monorepo-start"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-5843.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}