CVE-2024-41881

NameCVE-2024-41881
DescriptionSDoP versions prior to 1.11 fails to handle appropriately some parameters inside the input data, resulting in a stack-based buffer overflow vulnerability. When a user of the affected product is tricked to process a specially crafted XML file, arbitrary code may be executed on the user's environment.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
sdop (PTS)jessie, stretch0.80-2vulnerable
buster0.81-1vulnerable
bullseye0.90-1vulnerable
bookworm0.90-2vulnerable
sid, trixie1.10-3vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
sdopsource(unstable)(unfixed)unimportant

Notes

Crash in CLI tool, no security impact
https://github.com/PhilipHazel/SDoP/commit/ff83d851b4b39ff2fd37ab2ab14365649515b023

Search for package or bug name: Reporting problems