CVE-2021-37232

A stack overflow vulnerability occurs in Atomicparsley 20210124.204813.840499f through APar_read64() in src/util.cpp due to the lack of buffer size of uint32_buffer while reading more bytes in APar_read64.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
9.8 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 68%
VendorProductVersion
atomicparsley_projectatomicparsley
𝑥
≤ 20210124.204813.840499f
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
atomicparsley
bullseye
no-dsa
buster
no-dsa
stretch
no-dsa
bookworm
20210715.151551.e7ad03a-1
fixed
sid
20240608.083822.1ed9031-1
fixed
trixie
20240608.083822.1ed9031-1
fixed
gtkpod
bullseye
2.1.5-8
no-dsa
buster
no-dsa
stretch
no-dsa
bookworm
2.1.5-10
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
atomicparsley
noble
needs-triage
mantic
ignored
lunar
ignored
kinetic
ignored
jammy
needs-triage
impish
ignored
hirsute
ignored
focal
needs-triage
bionic
needs-triage
xenial
needs-triage
trusty
needs-triage