CVE-2021-37232

NameCVE-2021-37232
DescriptionA stack overflow vulnerability occurs in Atomicparsley 20210124.204813.840499f through APar_read64() in src/util.cpp due to the lack of buffer size of uint32_buffer while reading more bytes in APar_read64.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs993366

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
atomicparsley (PTS)buster, bullseye0.9.6-2vulnerable
sid, trixie, bookworm20210715.151551.e7ad03a-1fixed
gtkpod (PTS)buster2.1.5-6fixed
bullseye2.1.5-8fixed
bookworm2.1.5-10fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
atomicparsleysource(unstable)20210715.151551.e7ad03a-1993366
gtkpodsource(unstable)(not affected)

Notes

[bullseye] - atomicparsley <no-dsa> (Minor issue)
[buster] - atomicparsley <no-dsa> (Minor issue)
[stretch] - atomicparsley <no-dsa> (Minor issue)
- gtkpod <not-affected> (Vulnerable code not present, cf #993376)
https://github.com/wez/atomicparsley/commit/d72ccf06c98259d7261e0f3ac4fd8717778782c1
https://github.com/wez/atomicparsley/issues/32
gtkpod does not contain the code supporting tkhd version 1
that overflows with 64-bit creation/modified times

Search for package or bug name: Reporting problems