CVE-2021-37231

NameCVE-2021-37231
DescriptionA stack-buffer-overflow occurs in Atomicparsley 20210124.204813.840499 ...
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
Debian Bugs993372, 993375

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
atomicparsley (PTS)jessie0.9.2~svn110-4vulnerable
stretch0.9.6-1vulnerable
buster, bullseye0.9.6-2vulnerable
sid, bookworm20210715.151551.e7ad03a-1fixed
gtkpod (PTS)jessie2.1.4-5vulnerable
stretch2.1.5-4vulnerable
buster2.1.5-6vulnerable
bullseye2.1.5-8vulnerable
sid, bookworm2.1.5-9vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
atomicparsleysourcejessie(unfixed)end-of-life
atomicparsleysource(unstable)20210715.151551.e7ad03a-1993372
gtkpodsourcejessie(unfixed)end-of-life
gtkpodsource(unstable)(unfixed)993375

Notes

[stretch] - atomicparsley <no-dsa> (Minor issue)
[bullseye] - gtkpod <ignored> (Minor issue)
[buster] - gtkpod <ignored> (Minor issue)
[stretch] - gtkpod <ignored> (Minor issue)
https://github.com/wez/atomicparsley/issues/30
https://github.com/wez/atomicparsley/pull/31#issue-687280335

Search for package or bug name: Reporting problems