Source: libgetdata Version: 0.10.0-9 Severity: important Tags: security upstream Forwarded: https://bugs.launchpad.net/ubuntu/+source/libgetdata/+bug/1912050 X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org> Control: found -1 0.10.0-5
Hi, The following vulnerability was published for libgetdata. CVE-2021-20204[0]: | A heap memory corruption problem (use after free) can be triggered in | libgetdata v0.10.0 when processing maliciously crafted dirfile | databases. This degrades the confidentiality, integrity and | availability of third-party software that uses libgetdata as a | library. This vulnerability may lead to arbitrary code execution or | privilege escalation depending on input/skills of attacker. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2021-20204 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20204 [1] https://bugs.launchpad.net/ubuntu/+source/libgetdata/+bug/1912050 [2] https://bugzilla.redhat.com/show_bug.cgi?id=1956348 Regards, Salvatore