CVE Vulnerabilities

CVE-2021-32773

Externally Controlled Reference to a Resource in Another Sphere

Published: Jul 20, 2021 | Modified: Jul 29, 2021
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:P/A:N
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM

Racket is a general-purpose programming language and an ecosystem for language-oriented programming. In versions prior to 8.2, code evaluated using the Racket sandbox could cause system modules to incorrectly use attacker-created modules instead of their intended dependencies. This could allow system functions to be controlled by the attacker, giving access to facilities intended to be restricted. This problem is fixed in Racket version 8.2. A workaround is available, depending on system settings. For systems that provide arbitrary Racket evaluation, external sandboxing such as containers limit the impact of the problem. For multi-user evaluation systems, such as the handin-server system, it is not possible to work around this problem and upgrading is required.

Weakness

The product uses an externally controlled name or reference that resolves to a resource that is outside of the intended control sphere.

Affected Software

Name Vendor Start Version End Version
Racket Racket-lang * 8.2 (excluding)
Racket Ubuntu bionic *
Racket Ubuntu esm-apps/bionic *
Racket Ubuntu esm-apps/focal *
Racket Ubuntu focal *
Racket Ubuntu groovy *
Racket Ubuntu hirsute *
Racket Ubuntu impish *
Racket Ubuntu kinetic *
Racket Ubuntu lunar *
Racket Ubuntu mantic *
Racket Ubuntu trusty *
Racket Ubuntu xenial *

References