Control: fixed -1 1.1.9+ds1-4

在 2026/1/23 11:51, Salvatore Bonaccorso 写道:
Source: opencc
Version: 1.1.9+ds1-1
Severity: important
Tags: security upstream
Forwarded: https://github.com/BYVoid/OpenCC/issues/997
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for opencc.

CVE-2025-15536[0]:
| A weakness has been identified in BYVoid OpenCC up to 1.1.9. This
| vulnerability affects the function opencc::MaxMatchSegmentation of
| the file src/MaxMatchSegmentation.cpp. This manipulation causes
| heap-based buffer overflow. The attack is restricted to local
| execution. The exploit has been made available to the public and
| could be used for attacks. Patch name:
| 345c9a50ab07018f1b4439776bad78a0d40778ec. To fix this issue, it is
| recommended to deploy a patch.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2025-15536
     https://www.cve.org/CVERecord?id=CVE-2025-15536
[1] https://github.com/BYVoid/OpenCC/issues/997
[2] https://github.com/BYVoid/OpenCC/pull/1005
[3] 
https://github.com/BYVoid/OpenCC/commit/345c9a50ab07018f1b4439776bad78a0d40778ec

The targeted fix was accidentally cherry-picked in the 1.1.9+ds1-4 upload.
Updating the affecting version accordingly.

The fix in stable/oldstable may need to be handled separately later.

Thanks,
Boyuan Yang

Attachment: OpenPGP_0xC293E7B461825ACE.asc
Description: OpenPGP public key

Attachment: OpenPGP_signature.asc
Description: OpenPGP digital signature

Reply via email to