Source: opencc Version: 1.1.9+ds1-1 Severity: important Tags: security upstream Forwarded: https://github.com/BYVoid/OpenCC/issues/997 X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>
Hi, The following vulnerability was published for opencc. CVE-2025-15536[0]: | A weakness has been identified in BYVoid OpenCC up to 1.1.9. This | vulnerability affects the function opencc::MaxMatchSegmentation of | the file src/MaxMatchSegmentation.cpp. This manipulation causes | heap-based buffer overflow. The attack is restricted to local | execution. The exploit has been made available to the public and | could be used for attacks. Patch name: | 345c9a50ab07018f1b4439776bad78a0d40778ec. To fix this issue, it is | recommended to deploy a patch. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2025-15536 https://www.cve.org/CVERecord?id=CVE-2025-15536 [1] https://github.com/BYVoid/OpenCC/issues/997 [2] https://github.com/BYVoid/OpenCC/pull/1005 [3] https://github.com/BYVoid/OpenCC/commit/345c9a50ab07018f1b4439776bad78a0d40778ec Please adjust the affected versions in the BTS as needed. Regards, Salvatore

