vulnerability
Debian: CVE-2021-37232: atomicparsley, gtkpod -- security update
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
8 | (AV:N/AC:L/Au:N/C:P/I:P/A:P) | 08/04/2021 | 07/30/2024 | 07/30/2024 |
Severity
8
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
08/04/2021
Added
07/30/2024
Modified
07/30/2024
Description
A stack overflow vulnerability occurs in Atomicparsley 20210124.204813.840499f through APar_read64() in src/util.cpp due to the lack of buffer size of uint32_buffer while reading more bytes in APar_read64.
Solution(s)
debian-upgrade-atomicparsleydebian-upgrade-gtkpod

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.