Source: xfpt
Version: 1.00-2
Severity: important
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>

Hi,

The following vulnerability was published for xfpt.

CVE-2024-43700[0]:
| xfpt versions prior to 1.01 fails to handle appropriately some
| parameters inside the input data, resulting in a stack-based buffer
| overflow vulnerability. When a user of the affected product is
| tricked to process a specially crafted file, arbitrary code may be
| executed on the user's environment.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2024-43700
    https://www.cve.org/CVERecord?id=CVE-2024-43700
[1] 
https://github.com/PhilipHazel/xfpt/commit/a690304bbd3fd19e9dfdad50dcc87ad829f744e4

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to