First published: Mon May 03 2021(Updated: )
A heap memory corruption problem (use after free) can be triggered in libgetdata v0.10.0 when processing maliciously crafted dirfile databases. This degrades the confidentiality, integrity and availability of third-party software that uses libgetdata as a library. This vulnerability may lead to arbitrary code execution or privilege escalation depending on input/skills of attacker.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
getdata | =0.10.0 | |
Debian | =9.0 | |
Fedora | =33 | |
Fedora | =34 | |
Fedora | =35 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-20204 is classified with high severity due to its potential to cause heap memory corruption and lead to remote code execution.
To fix CVE-2021-20204, update libgetdata to version 0.10.1 or later that addresses the vulnerability.
CVE-2021-20204 affects libgetdata version 0.10.0 and certain versions of Debian and Fedora Linux.
The consequences of CVE-2021-20204 include a significant degradation in confidentiality, integrity, and availability of applications using libgetdata.
As of now, specific details about an exploit for CVE-2021-20204 have not been publicly disclosed.