[Bug 1194245] New: VUL-0: CVE-2021-45926: mdbtools: stack-based buffer overflow in mdb_numeric_to_string
http://bugzilla.opensuse.org/show_bug.cgi?id=1194245 Bug ID: 1194245 Summary: VUL-0: CVE-2021-45926: mdbtools: stack-based buffer overflow in mdb_numeric_to_string Classification: openSUSE Product: openSUSE Distribution Version: Leap 42.3 Hardware: Other URL: https://smash.suse.de/issue/319379/ OS: Other Status: NEW Severity: Normal Priority: P5 - None Component: Basesystem Assignee: screening-team-bugs@suse.de Reporter: abergmann@suse.com QA Contact: security-team@suse.de Found By: Security Response Team Blocker: --- CVE-2021-45926 MDB Tools (aka mdbtools) 0.9.2 has a stack-based buffer overflow (at 0x7ffd0c689be0) in mdb_numeric_to_string (called from mdb_xfer_bound_data and _mdb_attempt_bind). References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-45926 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=35972 https://github.com/mdbtools/mdbtools/commit/373b7ff4c4daf887269c078407cb1338... http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45926 https://github.com/google/oss-fuzz-vulns/blob/main/vulns/mdbtools/OSV-2021-9... http://www.cvedetails.com/cve/CVE-2021-45926/ -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.opensuse.org/show_bug.cgi?id=1194245 Alexander Bergmann <abergmann@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Priority|P3 - Medium |P5 - None CC| |abergmann@suse.com Summary|VUL-0: CVE-2021-45926: |VUL-1: CVE-2021-45926: |mdbtools: stack-based |mdbtools: stack-based |buffer overflow in |buffer overflow in |mdb_numeric_to_string |mdb_numeric_to_string -- You are receiving this mail because: You are on the CC list for the bug.
participants (1)
-
bugzilla_noreply@suse.com