Name | CVE-2022-25050 |
Description | rtl_433 21.12 was discovered to contain a stack overflow in the function somfy_iohc_decode(). This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted file. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 1008000 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
rtl-433 (PTS) | bullseye | 20.11-1 | vulnerable |
| bookworm | 22.11-1 | fixed |
| trixie, sid | 24.10-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
rtl-433 | source | experimental | 21.12+git20220718+ds-1 | | | |
rtl-433 | source | (unstable) | 21.12+git20220718+ds-2 | | | 1008000 |
Notes
[bullseye] - rtl-433 <no-dsa> (Minor issue)
https://github.com/merbanan/rtl_433/commit/2dad7b9fc67a1d0bfbe520fbd821678b8f8cc7a8
https://github.com/merbanan/rtl_433/issues/1960
https://huntr.dev/bounties/6c9cd35f-a206-4fdf-b6d1-fcd50926c2d9/