Name | CVE-2013-2019 |
Description | Stack-based buffer overflow in BOINC 6.10.58 and 6.12.34 allows remote attackers to have unspecified impact via multiple file_signature elements. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
boinc (PTS) | bullseye | 7.16.16+dfsg-1 | fixed |
| bookworm | 7.20.5+dfsg-1.1 | fixed |
| sid, trixie | 8.0.4+dfsg-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
boinc | source | (unstable) | 6.13.6+dfsg-1 | low | | |
Notes
[squeeze] - boinc <no-dsa> (Minor issue)
http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git;a=commitdiff;h=9a4140ae30a72e5175f3f31646d91f2d58df7156