[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 2983-1] abcm2ps security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

From: Anton Gladky <gladk@debian.org>
To: debian-lts-announce@lists.debian.org
Subject: [SECURITY] [DLA 2983-1] abcm2ps security update

- -------------------------------------------------------------------------
Debian LTS Advisory DLA-2983-1                debian-lts@lists.debian.org
https://www.debian.org/lts/security/                         Anton Gladky
April 16, 2022                                https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package        : abcm2ps
Version        : 7.8.9-1+deb9u1
CVE ID         : CVE-2018-10753 CVE-2018-10771 CVE-2019-1010069 CVE-2021-32434
                 CVE-2021-32435 CVE-2021-32436:

Multiple vulnerabilities have been discovered in abcm2ps: program which
translates ABC music description files to PostScript.

CVE-2018-10753

    Stack-based buffer overflow in the delayed_output function in music.c
    allows remote attackers to cause a denial of service (application crash) or
    possibly have unspecified other impact.

CVE-2018-10771

    Stack-based buffer overflow in the get_key function in parse.c allows remote
    attackers to cause a denial of service (application crash) or possibly have
    unspecified other impact.

CVE-2019-1010069

    Incorrect access control allows attackers to cause a denial of service via a
    crafted file.

CVE-2021-32434

    Array overflow when wrong duration in voice overlay.

CVE-2021-32435

    Stack-based buffer overflow in the function get_key in parse.c allows remote
    attackers to cause a senial of service (DoS) via unspecified vectors.

CVE-2021-32436

    Out-of-bounds read in the function write_title() in subs.c allows remote
    attackers to cause a denial of service via unspecified vectors.

For Debian 9 stretch, these problems have been fixed in version
7.8.9-1+deb9u1.

We recommend that you upgrade your abcm2ps packages.

For the detailed security status of abcm2ps please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/abcm2ps

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-----BEGIN PGP SIGNATURE-----
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=JgCR
-----END PGP SIGNATURE-----


Reply to: