Name | CVE-2020-36619 |
Description | A vulnerability was found in multimon-ng. It has been rated as critical. This issue affects the function add_ch of the file demod_flex.c. The manipulation of the argument ch leads to format string. Upgrading to version 1.2.0 is able to address this issue. The name of the patch is e5a51c508ef952e81a6da25b43034dd1ed023c07. It is recommended to upgrade the affected component. The identifier VDB-216269 was assigned to this vulnerability. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
multimon-ng (PTS) | bullseye | 1.1.9+dfsg-1 | vulnerable |
| bookworm | 1.2.0+dfsg-1 | fixed |
| sid, trixie | 1.3.1+dfsg-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
multimon-ng | source | (unstable) | 1.2.0+dfsg-1 | | | |
Notes
[bullseye] - multimon-ng <no-dsa> (Minor issue)
[buster] - multimon-ng <no-dsa> (Minor issue)
https://github.com/EliasOenal/multimon-ng/commit/e5a51c508ef952e81a6da25b43034dd1ed023c07 (1.2.0)
https://github.com/EliasOenal/multimon-ng/pull/160