Name | CVE-2020-36148 |
Description | Incorrect handling of input data in verifyAttribute function in the libmysofa library 0.5 - 1.1 will lead to NULL pointer dereference and segmentation fault error in case of restrictive memory protection or near NULL pointer overwrite in case of no memory restrictions (e.g. in embedded environments). |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
libmysofa (PTS) | bullseye | 1.2~dfsg0-1 | fixed |
| bookworm | 1.3.1~dfsg0-1 | fixed |
| sid, trixie | 1.3.3+dfsg-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
libmysofa | source | (unstable) | 1.2~dfsg0-1 | | | |
Notes
[buster] - libmysofa <no-dsa> (Minor issue)
https://github.com/hoene/libmysofa/issues/138
https://github.com/hoene/libmysofa/pull/145