CVE-2025-15536

NameCVE-2025-15536
DescriptionA weakness has been identified in BYVoid OpenCC up to 1.1.9. This vulnerability affects the function opencc::MaxMatchSegmentation of the file src/MaxMatchSegmentation.cpp. This manipulation causes heap-based buffer overflow. The attack is restricted to local execution. The exploit has been made available to the public and could be used for attacks. Patch name: 345c9a50ab07018f1b4439776bad78a0d40778ec. To fix this issue, it is recommended to deploy a patch.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1126286

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
opencc (PTS)bullseye1.1.1+git20200624+ds2-10vulnerable
bookworm1.1.6+ds1-1vulnerable
trixie1.1.9+ds1-1vulnerable
forky, sid1.1.9+ds1-4fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
openccsource(unstable)1.1.9+ds1-41126286

Notes

[trixie] - opencc <no-dsa> (Minor issue)
[bookworm] - opencc <no-dsa> (Minor issue)
[bullseye] - opencc <postponed> (Minor issue)
https://github.com/BYVoid/OpenCC/issues/997
https://github.com/BYVoid/OpenCC/pull/1005
Fixed by: https://github.com/BYVoid/OpenCC/commit/345c9a50ab07018f1b4439776bad78a0d40778ec (ver.1.2.0)

Search for package or bug name: Reporting problems