Описание
A stack overflow vulnerability occurs in Atomicparsley 20210124.204813.840499f through APar_read64() in src/util.cpp due to the lack of buffer size of uint32_buffer while reading more bytes in APar_read64.
Пакеты
| Пакет | Статус | Версия исправления | Релиз | Тип |
|---|---|---|---|---|
| atomicparsley | fixed | 20210715.151551.e7ad03a-1 | package | |
| atomicparsley | no-dsa | bullseye | package | |
| atomicparsley | no-dsa | buster | package | |
| atomicparsley | no-dsa | stretch | package | |
| gtkpod | not-affected | package |
Примечания
https://github.com/wez/atomicparsley/commit/d72ccf06c98259d7261e0f3ac4fd8717778782c1
https://github.com/wez/atomicparsley/issues/32
gtkpod does not contain the code supporting tkhd version 1
that overflows with 64-bit creation/modified times
Связанные уязвимости
A stack overflow vulnerability occurs in Atomicparsley 20210124.204813.840499f through APar_read64() in src/util.cpp due to the lack of buffer size of uint32_buffer while reading more bytes in APar_read64.
A stack overflow vulnerability occurs in Atomicparsley 20210124.204813.840499f through APar_read64() in src/util.cpp due to the lack of buffer size of uint32_buffer while reading more bytes in APar_read64.
A stack overflow vulnerability occurs in Atomicparsley 20210124.204813.840499f through APar_read64() in src/util.cpp due to the lack of buffer size of uint32_buffer while reading more bytes in APar_read64.