A stack overflow vulnerability occurs in Atomicparsley 20210124.204813.840499f through APar_read64() in src/util.cpp due to the lack of buffer size of uint32_buffer while reading more bytes in APar_read64.
References
Link | Resource |
---|---|
https://github.com/wez/atomicparsley/commit/d72ccf06c98259d7261e0f3ac4fd8717778782c1 | Patch Third Party Advisory |
https://github.com/wez/atomicparsley/issues/32 | Exploit Patch Third Party Advisory |
https://security.gentoo.org/glsa/202305-01 |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2021-08-04T00:00:00
Updated: 2023-05-03T00:00:00
Reserved: 2021-07-21T00:00:00
Link: CVE-2021-37232
JSON object: View
NVD Information
Status : Modified
Published: 2021-08-04T10:15:07.983
Modified: 2023-05-03T11:15:10.707
Link: CVE-2021-37232
JSON object: View
Redhat Information
No data.
CWE