First published: Fri Jan 14 2022(Updated: )
An Use-After-Free vulnerability in rec_mset_elem_destroy() at rec-mset.c of GNU Recutils v1.8.90 can lead to a segmentation fault or application crash.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/recutils | <=1.8-1<=1.9-2<=1.9-3 | |
GNU Recutils | =1.8.90 | |
Fedora | =35 | |
Fedora | =36 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-46022 is considered a high severity vulnerability as it may lead to an application crash due to a use-after-free condition.
To fix CVE-2021-46022, upgrade to a patched version of GNU Recutils or install the recommended updates for your operating system.
CVE-2021-46022 affects GNU Recutils versions up to and including 1.8.90 and certain versions of Fedora and Debian packages.
CVE-2021-46022 can lead to segmentation faults or crashes in applications using the affected function in GNU Recutils.
As of now, there is no public information indicating that CVE-2021-46022 is being actively exploited in the wild.