Improper Input Validation Affecting man2html package, versions *


Severity

Recommended
low

Based on Debian security rating.

Threat Intelligence

EPSS
0.05% (23rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN10-MAN2HTML-3022604
  • published14 Sept 2022
  • disclosed9 Sept 2022

Introduced: 9 Sep 2022

CVE-2021-40648  (opens in a new tab)
CWE-20  (opens in a new tab)

How to fix?

There is no fixed version for Debian:10 man2html.

NVD Description

Note: Versions mentioned in the description apply only to the upstream man2html package and not the man2html package as distributed by Debian. See How to fix? for Debian:10 relevant fixed versions and status.

In man2html 1.6g, a filename can be created to overwrite the previous size parameter of the next chunk and the fd, bk, fd_nextsize, bk_nextsize of the current chunk. The next chunk is then freed later on, causing a freeing of an arbitrary amount of memory.

CVSS Scores

version 3.1