Source: advancecomp
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerabilities were published for advancecomp.

Multiple issues in advancement, I suppose none of these have actually
been forwarded upstream by the reporter:

CVE-2022-35020[0]:
| Advancecomp v2.3 was discovered to contain a heap buffer overflow via
| the component __interceptor_memcpy at
| /sanitizer_common/sanitizer_common_interceptors.inc.

https://github.com/Cvjark/Poc/blob/main/advancecomp/CVE-2022-35020.md

CVE-2022-35019[1]:
| Advancecomp v2.3 was discovered to contain a segmentation fault.

https://github.com/Cvjark/Poc/blob/main/advancecomp/CVE-2022-35019.md

CVE-2022-35018[2]:
| Advancecomp v2.3 was discovered to contain a segmentation fault.

https://github.com/Cvjark/Poc/blob/main/advancecomp/CVE-2022-35018.md

CVE-2022-35017[3]:
| Advancecomp v2.3 was discovered to contain a heap buffer overflow.

https://github.com/Cvjark/Poc/blob/main/advancecomp/CVE-2022-35017.md

CVE-2022-35016[4]:
| Advancecomp v2.3 was discovered to contain a heap buffer overflow.

https://github.com/Cvjark/Poc/blob/main/advancecomp/CVE-2022-35016.md

CVE-2022-35015[5]:
| Advancecomp v2.3 was discovered to contain a heap buffer overflow via
| le_uint32_read at /lib/endianrw.h.

https://github.com/Cvjark/Poc/blob/main/advancecomp/CVE-2022-35015.md

CVE-2022-35014[6]:
| Advancecomp v2.3 contains a segmentation fault.

https://github.com/Cvjark/Poc/blob/main/advancecomp/CVE-2022-35014.md

If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2022-35020
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35020
[1] https://security-tracker.debian.org/tracker/CVE-2022-35019
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35019
[2] https://security-tracker.debian.org/tracker/CVE-2022-35018
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35018
[3] https://security-tracker.debian.org/tracker/CVE-2022-35017
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35017
[4] https://security-tracker.debian.org/tracker/CVE-2022-35016
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35016
[5] https://security-tracker.debian.org/tracker/CVE-2022-35015
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35015
[6] https://security-tracker.debian.org/tracker/CVE-2022-35014
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35014

Please adjust the affected versions in the BTS as needed.

Reply via email to