Hi,

On Wed, Mar 10, 2021 at 04:45:40PM +0100, Salvatore Bonaccorso wrote:
> Control: tags -1 + patch
> 
> Hi,
> 
> On Sun, Feb 28, 2021 at 01:54:37PM +0100, Salvatore Bonaccorso wrote:
> > Source: libcaca
> > Version: 0.99.beta19-2.1
> > Severity: important
> > Tags: security upstream
> > Forwarded: https://github.com/cacalabs/libcaca/issues/52
> > X-Debbugs-Cc: car...@debian.org, Debian Security Team 
> > <t...@security.debian.org>
> > 
> > Hi,
> > 
> > The following vulnerability was published for libcaca.
> > 
> > CVE-2021-3410[0]:
> > | A flaw was found in libcaca v0.99.beta19. A buffer overflow issue in
> > | caca_resize function in libcaca/caca/canvas.c may lead to local
> > | execution of arbitrary code in the user context.
> > 
> > 
> > If you fix the vulnerability please also make sure to include the
> > CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
> > 
> > For further information see:
> > 
> > [0] https://security-tracker.debian.org/tracker/CVE-2021-3410
> >     https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3410
> > [1] https://github.com/cacalabs/libcaca/issues/52
> 
> Attached is debdiff prepared (not yet uploaded).

Uploaded that debdiff now for unstable (but without using the delayed
queue, hope this is okay for you as maintainer).

Regards,
Salvatore

Reply via email to