[SECURITY] [DLA 2983-1] abcm2ps security update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
From: Anton Gladky <gladk@debian.org>
To: debian-lts-announce@lists.debian.org
Subject: [SECURITY] [DLA 2983-1] abcm2ps security update
- -------------------------------------------------------------------------
Debian LTS Advisory DLA-2983-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Anton Gladky
April 16, 2022 https://wiki.debian.org/LTS
- -------------------------------------------------------------------------
Package : abcm2ps
Version : 7.8.9-1+deb9u1
CVE ID : CVE-2018-10753 CVE-2018-10771 CVE-2019-1010069 CVE-2021-32434
CVE-2021-32435 CVE-2021-32436:
Multiple vulnerabilities have been discovered in abcm2ps: program which
translates ABC music description files to PostScript.
CVE-2018-10753
Stack-based buffer overflow in the delayed_output function in music.c
allows remote attackers to cause a denial of service (application crash) or
possibly have unspecified other impact.
CVE-2018-10771
Stack-based buffer overflow in the get_key function in parse.c allows remote
attackers to cause a denial of service (application crash) or possibly have
unspecified other impact.
CVE-2019-1010069
Incorrect access control allows attackers to cause a denial of service via a
crafted file.
CVE-2021-32434
Array overflow when wrong duration in voice overlay.
CVE-2021-32435
Stack-based buffer overflow in the function get_key in parse.c allows remote
attackers to cause a senial of service (DoS) via unspecified vectors.
CVE-2021-32436
Out-of-bounds read in the function write_title() in subs.c allows remote
attackers to cause a denial of service via unspecified vectors.
For Debian 9 stretch, these problems have been fixed in version
7.8.9-1+deb9u1.
We recommend that you upgrade your abcm2ps packages.
For the detailed security status of abcm2ps please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/abcm2ps
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEu71F6oGKuG/2fnKF0+Fzg8+n/wYFAmJbpzsACgkQ0+Fzg8+n
/wb3FhAAkxX+SysYeZnpdq+bMS8MOSftBP1iRKBGrJ7c8rv1vT9MK2ZsxVDScl8q
tgt+UvraL5x46o9axFmDcWvQYe4Q82vZuRj2HqYqvqaJkjZYF/gPjqXiptLLPeZ+
IH3XAUhOofFt5iNqICINiy4lIHcyPyCMQItiXe0rR3k21MHnk6RIgAgi4dOWh/aD
6A53kzWIhXiTqkKX4m18Al+dpobhC870sTuvg8gW6QuwrETYBtfa7G1ZGsagR01p
KPXO5pVBYhUhw7QRpxprKbUriCNv44mX4ZZRumyh863jtcS7ZJJlcXa+pehYOSPs
aZw5iweKt5fu6S7KGvZa+1bHJXVEFyxuAu/kMzTsdTTDZk1FGA9zThPr17gzQ+b1
sEfrjKh7Ux3gsfFzhNKczAdvl8kIgkRV5FHbH9GD9FMihxFcgrE0j0yVC7BGK7rX
16Z/TYxgliC1aPRVx4WCYQfWwiiJvgDAkxjkHR5D8S8+/qZ+iAK26EEuR2Zk9k7O
XmlCZNuQP0clVLRmg2PtA/ao5/dSgFlHtwK4S7OjBAIiMZgojnQr8WcBvGynl/St
8bEg9v9yDArRwC6uymqpq3II8jzL35CBx5OsPAKetC3bAQ87ImNyk+K3JwMaHFs4
Ls1bzO7vVQc92sALs8KpJqc9KxA4eihczQl/j5YEivJN91NsgvE=
=JgCR
-----END PGP SIGNATURE-----
Reply to: