Vulnerability Description
Buffer overflow vulnerability in libsolv 2020-12-13 via the Solver * testcase_read(Pool *pool, FILE *fp, const char *testcase, Queue *job, char **resultp, int *resultflagsp function at src/testcase.c: line 2334, which could cause a denial of service
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Opensuse | Libsolv | < 0.7.17 |
| Oracle | Communications Cloud Native Core Policy | 1.15.0 |
Related Weaknesses (CWE)
References
- https://github.com/openSUSE/libsolv/issues/416ExploitIssue TrackingThird Party Advisory
- https://github.com/yangjiageng/PoC/blob/master/libsolv-PoCs/PoC-testcase_read-23ExploitThird Party Advisory
- https://www.oracle.com/security-alerts/cpuapr2022.htmlPatchThird Party Advisory
- https://github.com/openSUSE/libsolv/issues/416ExploitIssue TrackingThird Party Advisory
- https://github.com/yangjiageng/PoC/blob/master/libsolv-PoCs/PoC-testcase_read-23ExploitThird Party Advisory
- https://www.oracle.com/security-alerts/cpuapr2022.htmlPatchThird Party Advisory
FAQ
What is CVE-2021-3200?
CVE-2021-3200 is a vulnerability with a CVSS score of 3.3 (LOW). Buffer overflow vulnerability in libsolv 2020-12-13 via the Solver * testcase_read(Pool *pool, FILE *fp, const char *testcase, Queue *job, char **resultp, int *resultflagsp function at src/testcase.c:...
How severe is CVE-2021-3200?
CVE-2021-3200 has been rated LOW with a CVSS base score of 3.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-3200?
Check the references section above for vendor advisories and patch information. Affected products include: Opensuse Libsolv, Oracle Communications Cloud Native Core Policy.