{"id":"CVE-2021-46879","details":"An issue was discovered in Treasure Data Fluent Bit 1.7.1, a wrong variable is used to get the msgpack data resulting in a heap overflow in flb_msgpack_gelf_value_ext. An attacker can craft a malicious file and tick the victim to open the file with the software, triggering a heap overflow and execute arbitrary code on the target system.","aliases":["BIT-fluent-bit-2021-46879"],"modified":"2026-04-10T04:42:02.564458Z","published":"2023-04-11T18:15:58.387Z","references":[{"type":"FIX","url":"https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26851"},{"type":"FIX","url":"https://github.com/fluent/fluent-bit/pull/3100"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/fluent/fluent-bit","events":[{"introduced":"0"},{"last_affected":"7edd2235cd2da7fe76258b7faa59ee9b37f52f8b"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"1.7.1"}]}}],"versions":["0.13-dev-0.10","0.13-dev-0.11","0.13-dev-0.12","0.13-dev-0.13","0.13-dev-0.14","0.13-dev-0.15","0.13-dev-0.16","0.13-dev-0.17","0.13-dev-0.18","0.13-dev-0.4","0.13-dev-0.9","v0.10.0","v0.11.0","v0.12.0","v0.12.1","v0.12.2","v0.12.3","v0.12.4","v0.13.0","v0.14.0","v0.3","v0.4","v0.5","v0.5.1","v0.6.0","v0.7.0","v0.8.0","v0.8.1","v0.8.2","v0.9.0","v1.0.0","v1.1.0","v1.2.0","v1.3.0","v1.4.0","v1.5.0","v1.6.0","v1.7.0","v1.7.0-rc1","v1.7.0-rc2","v1.7.0-rc3","v1.7.0-rc4","v1.7.0-rc5","v1.7.0-rc6","v1.7.0-rc7","v1.7.0-rc8","v1.7.0-rc9","v1.7.1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-46879.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}