Name | CVE-2021-37231 |
Description | A stack-buffer-overflow occurs in Atomicparsley 20210124.204813.840499f through APar_readX() in src/util.cpp while parsing a crafted mp4 file because of the missing boundary check. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 993372, 993375 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
atomicparsley (PTS) | bullseye | 0.9.6-2 | vulnerable |
| bookworm | 20210715.151551.e7ad03a-1 | fixed |
| sid, trixie | 20240608.083822.1ed9031-1 | fixed |
gtkpod (PTS) | bullseye | 2.1.5-8 | vulnerable |
| bookworm | 2.1.5-10 | vulnerable |
The information below is based on the following data on fixed versions.
Notes
[bullseye] - atomicparsley <no-dsa> (Minor issue)
[buster] - atomicparsley <no-dsa> (Minor issue)
[stretch] - atomicparsley <no-dsa> (Minor issue)
[bookworm] - gtkpod <ignored> (Minor issue)
[bullseye] - gtkpod <ignored> (Minor issue)
[buster] - gtkpod <ignored> (Minor issue)
[stretch] - gtkpod <ignored> (Minor issue)
https://github.com/wez/atomicparsley/issues/30
https://github.com/wez/atomicparsley/pull/31#issue-687280335