Debian Package Tracker
Register | Log in
Subscribe

biosig

Choose email to subscribe with

general
  • source: biosig (main)
  • version: 3.9.0-1
  • maintainer: Debian Med Packaging Team (archive) (DMD) (LowNMU)
  • uploaders: Alois Schlögl [DMD] – Yaroslav Halchenko [DMD] – Michael Hanke [DMD]
  • arch: any
  • std-ver: 4.7.2
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • oldstable: 2.1.2-4
  • stable: 2.5.0-1
  • testing: 3.9.0-1
  • unstable: 3.9.0-1
versioned links
  • 2.1.2-4: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.5.0-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3.9.0-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • biosig-tools
  • libbiosig-dev
  • libbiosig3
  • octave-biosig
  • python3-biosig
action needed
lintian reports 1 warning normal
Lintian reports 1 warning about this package. You should make the package lintian clean getting rid of them.
Created: 2025-04-10 Last update: 2025-04-10 00:30
8 low-priority security issues in bookworm low

There are 8 open security issues in bookworm.

8 issues left for the package maintainer to handle:
  • CVE-2024-21795: (needs triaging) A heap-based buffer overflow vulnerability exists in the .egi parsing functionality of The Biosig Project libbiosig 2.5.0 and Master Branch (ab0ee111). A specially crafted .egi file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.
  • CVE-2024-21812: (needs triaging) An integer overflow vulnerability exists in the sopen_FAMOS_read functionality of The Biosig Project libbiosig 2.5.0 and Master Branch (ab0ee111). A specially crafted .famos file can lead to an out-of-bounds write which in turn can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.
  • CVE-2024-22097: (needs triaging) A double-free vulnerability exists in the BrainVision Header Parsing functionality of The Biosig Project libbiosig Master Branch (ab0ee111) and 2.5.0. A specially crafted .vdhr file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.
  • CVE-2024-23305: (needs triaging) An out-of-bounds write vulnerability exists in the BrainVisionMarker Parsing functionality of The Biosig Project libbiosig 2.5.0 and Master Branch (ab0ee111). A specially crafted .vmrk file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.
  • CVE-2024-23310: (needs triaging) A use-after-free vulnerability exists in the sopen_FAMOS_read functionality of The Biosig Project libbiosig 2.5.0 and Master Branch (ab0ee111). A specially crafted .famos file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.
  • CVE-2024-23313: (needs triaging) An integer underflow vulnerability exists in the sopen_FAMOS_read functionality of The Biosig Project libbiosig 2.5.0 and Master Branch (ab0ee111). A specially crafted .famos file can lead to an out-of-bounds write which in turn can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.
  • CVE-2024-23606: (needs triaging) An out-of-bounds write vulnerability exists in the sopen_FAMOS_read functionality of The Biosig Project libbiosig 2.5.0 and Master Branch (ab0ee111). A specially crafted .famos file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.
  • CVE-2024-23809: (needs triaging) A double-free vulnerability exists in the BrainVision ASCII Header Parsing functionality of The Biosig Project libbiosig 2.5.0 and Master Branch (ab0ee111). A specially crafted .vdhr file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.

You can find information about how to handle these issues in the security team's documentation.

Created: 2024-02-21 Last update: 2025-04-08 06:32
news
[rss feed]
  • [2025-04-08] biosig 3.9.0-1 MIGRATED to testing (Debian testing watch)
  • [2025-04-02] Accepted biosig 3.9.0-1 (source) into unstable (Étienne Mollier)
  • [2024-08-10] biosig 2.6.1-1 MIGRATED to testing (Debian testing watch)
  • [2024-08-05] Accepted biosig 2.6.1-1 (source) into unstable (Étienne Mollier)
  • [2024-02-24] biosig 2.6.0-1 MIGRATED to testing (Debian testing watch)
  • [2024-02-24] biosig 2.6.0-1 MIGRATED to testing (Debian testing watch)
  • [2024-02-19] Accepted biosig 2.6.0-1 (source) into unstable (Andreas Tille)
  • [2024-02-11] biosig 2.5.2-2 MIGRATED to testing (Debian testing watch)
  • [2024-02-06] Accepted biosig 2.5.2-2 (source) into unstable (Andreas Tille)
  • [2023-10-24] biosig 2.5.2-1 MIGRATED to testing (Debian testing watch)
  • [2023-10-19] Accepted biosig 2.5.2-1 (source) into unstable (Andreas Tille)
  • [2023-01-17] biosig 2.5.0-1 MIGRATED to testing (Debian testing watch)
  • [2023-01-12] Accepted biosig 2.5.0-1 (source) into unstable (Andreas Tille)
  • [2022-06-12] biosig 2.4.0-2 MIGRATED to testing (Debian testing watch)
  • [2022-06-06] Accepted biosig 2.4.0-2 (source) into unstable (Étienne Mollier)
  • [2022-05-12] Accepted biosig 2.4.0-1 (source) into unstable (Andreas Tille)
  • [2022-01-05] biosig 2.3.3-1 MIGRATED to testing (Debian testing watch)
  • [2021-12-30] Accepted biosig 2.3.3-1 (source) into unstable (Alois Schlögl) (signed by: Andreas Tille)
  • [2021-04-26] biosig 2.1.2-4 MIGRATED to testing (Debian testing watch)
  • [2021-04-15] Accepted biosig 2.1.2-4 (source) into unstable (Alois Schlögl) (signed by: Andreas Tille)
  • [2021-02-04] biosig 2.1.2-3 MIGRATED to testing (Debian testing watch)
  • [2021-02-04] biosig 2.1.2-3 MIGRATED to testing (Debian testing watch)
  • [2021-01-30] Accepted biosig 2.1.2-3 (source) into unstable (Alois Schlögl) (signed by: Andreas Tille)
  • [2021-01-22] biosig 2.1.2-2 MIGRATED to testing (Debian testing watch)
  • [2021-01-16] Accepted biosig 2.1.2-2 (source) into unstable (Juhani Numminen) (signed by: Andreas Tille)
  • [2021-01-14] Accepted biosig 2.1.2-1 (source) into unstable (Juhani Numminen) (signed by: Andreas Tille)
  • [2020-12-06] biosig 2.1.0-1 MIGRATED to testing (Debian testing watch)
  • [2020-12-04] Accepted biosig 2.1.0-1 (source) into unstable (Alois Schlögl) (signed by: Andreas Tille)
  • [2020-10-22] biosig 2.0.6-1 MIGRATED to testing (Debian testing watch)
  • [2020-10-16] Accepted biosig 2.0.6-1 (source amd64) into unstable, unstable (Debian FTP Masters) (signed by: Andreas Tille)
  • 1
  • 2
bugs [bug history graph]
  • all: 0
links
  • homepage
  • lintian (0, 1)
  • buildd: logs, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 3.9.0-1
  • 1 bug (1 patch)

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing