Skip to main content
Version: latest

CVE-2021-36159

CVE Details

Visit the official vulnerability details page for CVE-2021-36159 to learn more.

Initial Publication

01/20/2025

Last Update

02/14/2025

Third Party Dependency

apk-tools

NIST CVE Summary

libfetch before 2021-07-26, as used in apk-tools, xbps, and other products, mishandles numeric strings for the FTP and HTTP protocols. The FTP passive mode implementation allows an out-of-bounds read because strtol is used to parse the relevant numbers into address bytes. It does not check if the line ends prematurely. If it does, the for-loop condition checks for the '\0' terminator one byte too late.

CVE Severity

9.1

Our Official Summary

The out-of-bounds write vulnerability in the FTP implementation can be exploited by a malicious bzip2 payload, potentially resulting in a denial of service or remote code execution. The risk for our products is low for the following reasons: a) There are no known reports of exploitation from the 3rd party vendors. b) These images are not accessible directly for an attacker to send crafted input.

Status

Ongoing

Affected Products & Versions

VersionPalette EnterprisePalette Enterprise AirgapVerteXVerteX Airgap
4.5.22⚠️ Impacted✅ No Impact✅ No Impact✅ No Impact
4.5.21⚠️ Impacted✅ No Impact✅ No Impact✅ No Impact
4.5.20⚠️ Impacted✅ No Impact✅ No Impact✅ No Impact

Revision History

DateRevision
02/14/2025Impacted versions changed from 4.5.20, 4.5.21 to 4.5.20, 4.5.21, 4.5.22
02/12/2025Status changed from Open to Ongoing
02/12/2025Official summary added
02/05/2025Impacted versions changed from 4.5.20 to 4.5.20, 4.5.21