CVE-2021-3497

Summary

CVECVE-2021-3497
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2021-04-19 21:15:00 UTC
Updated2022-09-28 20:02:00 UTC
DescriptionGStreamer before 1.18.4 might access already-freed memory in error code paths when demuxing certain malformed Matroska files.

Risk And Classification

Problem Types: CWE-416

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Operating System Debian Debian Linux 10.0 All All All
Operating System Debian Debian Linux 9.0 All All All
Application Gstreamer Project Gstreamer All All All All
Operating System Redhat Enterprise Linux 7.0 All All All
Operating System Redhat Enterprise Linux 8.0 All All All

References

ReferenceSourceLinkTags
[SECURITY] [DLA 2640-1] gst-plugins-good1.0 security update MLIST lists.debian.org
Security Advisory 2021-0002 MISC gstreamer.freedesktop.org
GStreamer, GStreamer Plugins: Multiple Vulnerabilities (GLSA 202208-31) — Gentoo security GENTOO security.gentoo.org
1945339 – (CVE-2021-3497) CVE-2021-3497 gstreamer-plugins-good: Use-after-free in matroska demuxing MISC bugzilla.redhat.com
Debian -- Security Information -- DSA-4900-1 gst-plugins-good1.0 DEBIAN www.debian.org
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis

Legacy QID Mappings

  • 160226 Oracle Enterprise Linux Security Update for gstreamer1-plugins-good (ELSA-2022-7618)
  • 178564 Debian Security Update for gst-plugins-good1.0 (DSA 4900-1)
  • 178649 Debian Security Update for gst-plugins-good1.0 (DLA 2640-1)
  • 179761 Debian Security Update for gst-plugins-good1.0 (CVE-2021-3497)
  • 198347 Ubuntu Security Notification for GStreamer Good Plugins vulnerabilities (USN-4928-1)
  • 240830 Red Hat Update for gstreamer1-plugins-good (RHSA-2022:7618)
  • 296065 Oracle Solaris 11.4 Support Repository Update (SRU) 39.107.1 Missing (CPUOCT2021)
  • 354853 Amazon Linux Security Advisory for gstreamer-plugins-good : ALAS2-2023-2011
  • 501418 Alpine Linux Security Update for gstreamer
  • 501579 Alpine Linux Security Update for gst-plugins-good
  • 503987 Alpine Linux Security Update for gstreamer
  • 670360 EulerOS Security Update for gstreamer1-plugins-good (EulerOS-SA-2021-1796)
  • 670418 EulerOS Security Update for gstreamer-plugins-good (EulerOS-SA-2021-1981)
  • 670461 EulerOS Security Update for gstreamer1-plugins-good (EulerOS-SA-2021-2219)
  • 670573 EulerOS Security Update for gstreamer-plugins-good (EulerOS-SA-2021-2331)
  • 670619 EulerOS Security Update for gstreamer1-plugins-good (EulerOS-SA-2021-2377)
  • 670621 EulerOS Security Update for gstreamer-plugins-good (EulerOS-SA-2021-2379)
  • 671004 EulerOS Security Update for gstreamer-plugins-good (EulerOS-SA-2021-2584)
  • 710603 Gentoo Linux GStreamer, GStreamer Plugins Multiple Vulnerabilities (GLSA 202208-31)
  • 751077 SUSE Enterprise Linux Security Update for gstreamer-plugins-good (SUSE-SU-2021:2916-1)
  • 751090 OpenSUSE Security Update for gstreamer-plugins-good (openSUSE-SU-2021:1230-1)
  • 751101 OpenSUSE Security Update for gstreamer-plugins-good (openSUSE-SU-2021:2915-1)
  • 754864 SUSE Enterprise Linux Security Update for gstreamer-plugins-good (SUSE-SU-2023:3688-1)
  • 940759 AlmaLinux Security Update for gstreamer1-plugins-good (ALSA-2022:7618)
  • 960209 Rocky Linux Security Update for gstreamer1-plugins-good (RLSA-2022:7618)
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report