CVE-2019-8379

NameCVE-2019-8379
DescriptionAn issue was discovered in AdvanceCOMP through 2.1. A NULL pointer dereference exists in the function be_uint32_read() located in endianrw.h. It can be triggered by sending a crafted file to a binary. It allows an attacker to cause a Denial of Service (Segmentation fault) or possibly have unspecified other impact when a victim opens a specially crafted file.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-2868-1
Debian Bugs928729

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
advancecomp (PTS)jessie, jessie (lts)1.19-1+deb8u1vulnerable
stretch (security), stretch (lts), stretch1.20-1+deb9u1fixed
buster, bullseye2.1-2.1fixed
sid, trixie, bookworm2.5-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
advancecompsourcestretch1.20-1+deb9u1DLA-2868-1
advancecompsource(unstable)2.1-2.1928729

Notes

[jessie] - advancecomp <ignored> (Minor issue)
https://sourceforge.net/p/advancemame/bugs/271/
https://github.com/amadvance/advancecomp/commit/7894a6e684ce68ddff9f4f4919ab8e3911ac8040

Search for package or bug name: Reporting problems