Buffer Overflow Affecting cbor2 package, versions <5.6.2-1


Severity

Recommended
0.0
high
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.11% (45th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN13-CBOR2-6254964
  • published21 Feb 2024
  • disclosed19 Feb 2024

Introduced: 19 Feb 2024

CVE-2024-26134  (opens in a new tab)
CWE-120  (opens in a new tab)

How to fix?

Upgrade Debian:13 cbor2 to version 5.6.2-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream cbor2 package and not the cbor2 package as distributed by Debian. See How to fix? for Debian:13 relevant fixed versions and status.

cbor2 provides encoding and decoding for the Concise Binary Object Representation (CBOR) (RFC 8949) serialization format. Starting in version 5.5.1 and prior to version 5.6.2, an attacker can crash a service using cbor2 to parse a CBOR binary by sending a long enough object. Version 5.6.2 contains a patch for this issue.

CVSS Scores

version 3.1