Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-37232

Опубликовано: 04 авг. 2021
Источник: debian

Описание

A stack overflow vulnerability occurs in Atomicparsley 20210124.204813.840499f through APar_read64() in src/util.cpp due to the lack of buffer size of uint32_buffer while reading more bytes in APar_read64.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
atomicparsleyfixed20210715.151551.e7ad03a-1package
atomicparsleyno-dsabullseyepackage
atomicparsleyno-dsabusterpackage
atomicparsleyno-dsastretchpackage
gtkpodnot-affectedpackage

Примечания

  • https://github.com/wez/atomicparsley/commit/d72ccf06c98259d7261e0f3ac4fd8717778782c1

  • https://github.com/wez/atomicparsley/issues/32

  • gtkpod does not contain the code supporting tkhd version 1

  • that overflows with 64-bit creation/modified times

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 4 лет назад

A stack overflow vulnerability occurs in Atomicparsley 20210124.204813.840499f through APar_read64() in src/util.cpp due to the lack of buffer size of uint32_buffer while reading more bytes in APar_read64.

CVSS3: 9.8
nvd
больше 4 лет назад

A stack overflow vulnerability occurs in Atomicparsley 20210124.204813.840499f through APar_read64() in src/util.cpp due to the lack of buffer size of uint32_buffer while reading more bytes in APar_read64.

CVSS3: 9.8
github
больше 3 лет назад

A stack overflow vulnerability occurs in Atomicparsley 20210124.204813.840499f through APar_read64() in src/util.cpp due to the lack of buffer size of uint32_buffer while reading more bytes in APar_read64.