Source: rtl-433
Version: 21.12-1
Severity: important
Tags: security upstream
Forwarded: https://github.com/merbanan/rtl_433/issues/1960
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>

Hi,

The following vulnerabilities were published for rtl-433.

CVE-2022-25050[0]:
| rtl_433 21.12 was discovered to contain a stack overflow in the
| function somfy_iohc_decode(). This vulnerability allows attackers to
| cause a Denial of Service (DoS) via a crafted file.


CVE-2022-25051[1]:
| An Off-by-one Error occurs in cmr113_decode of rtl_433 21.12 when
| decoding a crafted file.


If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2022-25050
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25050
[1] https://security-tracker.debian.org/tracker/CVE-2022-25051
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25051
[2] https://github.com/merbanan/rtl_433/issues/1960
[3] 
https://github.com/merbanan/rtl_433/commit/2dad7b9fc67a1d0bfbe520fbd821678b8f8cc7a8

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to