vulnerability
Debian: CVE-2021-37232: atomicparsley -- security update
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
8 | (AV:N/AC:L/Au:N/C:P/I:P/A:P) | 2021-08-04 | 2024-07-30 | 2025-05-22 |
Severity
8
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
2021-08-04
Added
2024-07-30
Modified
2025-05-22
Description
A stack overflow vulnerability occurs in Atomicparsley 20210124.204813.840499f through APar_read64() in src/util.cpp due to the lack of buffer size of uint32_buffer while reading more bytes in APar_read64.
Solution(s)
debian-upgrade-atomicparsleyno-fix-debian-deb-package

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.