| Name | CVE-2021-44847 |
| Description | A stack-based buffer overflow in handle_request function in DHT.c in t ... |
| Source | CVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
| Debian Bugs | 1001711 |
Vulnerable and fixed packages
The table below lists information on source packages.
| Source Package | Release | Version | Status |
|---|
| libtoxcore (PTS) | bullseye | 0.2.12-1 | vulnerable |
| bookworm | 0.2.18-1 | fixed |
| trixie | 0.2.20-1 | fixed |
| forky, sid | 0.2.22-1 | fixed |
The information below is based on the following data on fixed versions.
| Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
|---|
| libtoxcore | source | (unstable) | 0.2.13-1 | | | 1001711 |
Notes
[bullseye] - libtoxcore <no-dsa> (Minor issue)
[buster] - libtoxcore <no-dsa> (Minor issue)
https://github.com/TokTok/c-toxcore/pull/1718
https://blog.tox.chat/2021/12/stack-based-buffer-overflow-vulnerability-in-udp-packet-handling-in-toxcore-cve-2021-44847/
Introduced by: https://github.com/TokTok/c-toxcore/commit/71260e38e8d12547b0e55916daf6cadd72f52e19 (v0.1.9)
Fixed by: https://github.com/TokTok/c-toxcore/commit/1b02bad36864fdfc36694e3f96d2dc6c58a891e4 (v0.2.13)