CVE-2025-2337

NameCVE-2025-2337
DescriptionA vulnerability, which was classified as critical, has been found in tbeu matio 1.5.28. This issue affects the function Mat_VarPrint of the file src/mat.c. The manipulation leads to heap-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1100992

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libmatio (PTS)bullseye1.5.19-2fixed
bullseye (security)1.5.19-2+deb11u1fixed
bookworm1.5.23-2vulnerable
trixie1.5.28-2fixed
forky, sid1.5.30-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libmatiosourcebullseye(not affected)
libmatiosource(unstable)1.5.28-21100992

Notes

[bookworm] - libmatio <postponed> (Minor issue, revisit when fixed upstream)
[bullseye] - libmatio <not-affected> (Vulnerable code introduced in v1.5.20, commit 67a922f83467d694fa6e)
https://github.com/tbeu/matio/issues/267
Introduced with: https://github.com/tbeu/matio/commit/67a922f83467d694fa6e9759ac9a30b6ab82aec4 (v1.5.20)
Fixed by: https://github.com/tbeu/matio/commit/67000893b627205c42abc125d7917b6b2d18f84f (v1.5.29)

Search for package or bug name: Reporting problems