Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. salt
  4. ›
  5. CVE-2021-33226

CVE-2021-33226: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

February 17, 2023 (updated November 7, 2023)

Buffer Overflow vulnerability in Saltstack v.3003 and before allows attacker to execute arbitrary code via the func variable in salt/salt/modules/status.py file.

References

  • github.com/saltstack/salt/blob/master/salt/modules/status.py
  • nvd.nist.gov/vuln/detail/CVE-2021-33226

Code Behaviors & Features

Detect and mitigate CVE-2021-33226 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions up to 3003

Fixed versions

  • 3003.1

Solution

Upgrade to version 3003.1 or above.

Impact 9.8 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

Source file

pypi/salt/CVE-2021-33226.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:06 +0000.