CVE-2021-33390
NixOS vulnerability analysis and mitigation

Overview

dpic 2021.04.10 contains a use-after-free vulnerability in the deletestringbox() function in dpic.y. This is a different vulnerability than CVE-2021-32421 (GitLab Issue).

Technical details

The vulnerability exists in the cmpstring() function at line 5724 in dpic.y. When processing certain input files, the application performs a heap use-after-free read operation on a previously freed memory region located 32 bytes inside a 136-byte block. The issue occurs during the execution of the deletestringbox() function (GitLab Issue).

Impact

This vulnerability could lead to program crashes and potential information disclosure through the reading of freed memory locations (GitLab Issue).

Mitigation and workarounds

The issue has been fixed in version 2023.02.01-1 and later releases. Users should upgrade to the latest version to receive the security fix (Debian Tracker).

Additional resources


SourceThis report was generated using AI

Related NixOS vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-12819HIGH8.1
  • NixOSNixOS
  • pgbouncer
NoYesDec 03, 2025
CVE-2025-20777MEDIUM6.7
  • NixOSNixOS
  • android
NoNoDec 02, 2025
CVE-2025-65105MEDIUM5.3
  • NixOSNixOS
  • apptainer
NoYesDec 02, 2025
CVE-2025-20789MEDIUM4.4
  • NixOSNixOS
  • android
NoNoDec 02, 2025
CVE-2025-20788MEDIUM4.4
  • NixOSNixOS
  • android
NoNoDec 02, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management