DescriptionAn exploitable incorrect return value vulnerability exists in the mp_check function of Tarantool's Msgpuck library 1.0.3. A specially crafted packet can cause the mp_check function to incorrectly return success when trying to check if decoding a map16 packet will read outside the bounds of a buffer, resulting in a denial of service vulnerability.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium
Debian Bugs849212

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
msgpuck (PTS)buster, bullseye, stretch, sid1.0.3-1.1fixed
tarantool (PTS)jessie1.5.2.20.g5f5d924-2fixed
buster, bullseye, sid1.9.1.26.g63eb81e3c-1.1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
tarantoolsourcejessie(not affected)
tarantoolsourcewheezy(not affected)

[jessie] - tarantool <not-affected> (Vulnerable code not present)
[wheezy] - tarantool <not-affected> (Not vulnerable)

Search for package or bug name: Reporting problems