Debian Package Tracker
Register | Log in
Subscribe

catdoc

text extractor for MS-Office files

Choose email to subscribe with

general
  • source: catdoc (main)
  • version: 1:0.95-6
  • maintainer: Martina Ferrari (DMD)
  • arch: any
  • std-ver: 4.6.0
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 1:0.95-4.1
  • oldstable: 1:0.95-4.1
  • stable: 1:0.95-5
  • testing: 1:0.95-5
  • unstable: 1:0.95-6
versioned links
  • 1:0.95-4.1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:0.95-5: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1:0.95-6: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • catdoc (18 bugs: 0, 9, 9, 0)
action needed
Marked for autoremoval on 06 July: #1107168 high
Version 1:0.95-5 of catdoc is marked for autoremoval from testing on Sun 06 Jul 2025. It is affected by #1107168. You should try to prevent the removal by fixing these RC bugs.
Created: 2025-06-09 Last update: 2025-06-21 04:33
3 security issues in trixie high

There are 3 open security issues in trixie.

3 important issues:
  • CVE-2024-48877: A memory corruption vulnerability exists in the Shared String Table Record Parser implementation in xls2csv utility version 0.95. A specially crafted malformed file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.
  • CVE-2024-52035: An integer overflow vulnerability exists in the OLE Document File Allocation Table Parser functionality of catdoc 0.95. A specially crafted malformed file can lead to heap-based memory corruption. An attacker can provide a malicious file to trigger this vulnerability.
  • CVE-2024-54028: An integer underflow vulnerability exists in the OLE Document DIFAT Parser functionality of catdoc 0.95. A specially crafted malformed file can lead to heap-based memory corruption. An attacker can provide a malicious file to trigger this vulnerability.
Created: 2025-06-02 Last update: 2025-06-17 01:24
3 security issues in bullseye high

There are 3 open security issues in bullseye.

3 important issues:
  • CVE-2024-48877: A memory corruption vulnerability exists in the Shared String Table Record Parser implementation in xls2csv utility version 0.95. A specially crafted malformed file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.
  • CVE-2024-52035: An integer overflow vulnerability exists in the OLE Document File Allocation Table Parser functionality of catdoc 0.95. A specially crafted malformed file can lead to heap-based memory corruption. An attacker can provide a malicious file to trigger this vulnerability.
  • CVE-2024-54028: An integer underflow vulnerability exists in the OLE Document DIFAT Parser functionality of catdoc 0.95. A specially crafted malformed file can lead to heap-based memory corruption. An attacker can provide a malicious file to trigger this vulnerability.
Created: 2025-06-02 Last update: 2025-06-17 01:24
3 security issues in bookworm high

There are 3 open security issues in bookworm.

3 important issues:
  • CVE-2024-48877: A memory corruption vulnerability exists in the Shared String Table Record Parser implementation in xls2csv utility version 0.95. A specially crafted malformed file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.
  • CVE-2024-52035: An integer overflow vulnerability exists in the OLE Document File Allocation Table Parser functionality of catdoc 0.95. A specially crafted malformed file can lead to heap-based memory corruption. An attacker can provide a malicious file to trigger this vulnerability.
  • CVE-2024-54028: An integer underflow vulnerability exists in the OLE Document DIFAT Parser functionality of catdoc 0.95. A specially crafted malformed file can lead to heap-based memory corruption. An attacker can provide a malicious file to trigger this vulnerability.
Created: 2025-06-02 Last update: 2025-06-17 01:24
7 bugs tagged patch in the BTS normal
The BTS contains patches fixing 7 bugs, consider including or untagging them.
Created: 2025-01-06 Last update: 2025-06-21 05:30
lintian reports 3 warnings normal
Lintian reports 3 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2025-06-17 Last update: 2025-06-17 06:30
version in VCS is newer than in repository, is it time to upload? normal
vcswatch reports that this package seems to have a new changelog entry (version 1:0.95-7, distribution UNRELEASED) and new commits in its VCS. You should consider whether it's time to make an upload.

Here are the relevant commit messages:
commit 0fbbf2961667e673ffb6e19725fc172a8fb1ace9
Merge: 0563ba0 e586c56
Author: Martina Ferrari <tina@tina.pm>
Date:   Mon Jun 16 17:19:20 2025 +0100

    Merge branch 'security_fixes' into debian/sid

commit 0563ba0214f8cb73bf2c61c43271da273f8392c4
Author: Martina Ferrari <tina@tina.pm>
Date:   Fri May 16 13:51:51 2025 +0000

    d/copyright: replace FSF physical address with URL

commit c4a8fa939b8e05aa0a174fd066ff13777a6ad3fa
Author: Martina Ferrari <tina@tina.pm>
Date:   Mon May 12 14:39:21 2025 +0000

    d/control: bump Standards-Version with no changes

commit d70b512bdb102fa56d397e4dccbf28ba62e903f7
Author: Martina Ferrari <tina@tina.pm>
Date:   Mon May 12 14:27:38 2025 +0000

    Renumber patches

commit 93a7d6d739a6d46d4caed3a73f8fa328a59c17ee
Merge: a1b8c86 54dd73a
Author: Jelmer Vernooij <jelmer@debian.org>
Date:   Tue Nov 1 12:40:09 2022 +0000

    Merge branch 'lintian-fixes' into 'debian/sid'
    
    Fix some issues reported by lintian
    
    See merge request debian/catdoc!1

commit 54dd73ae5fd84875f8a79e6e8735dae53fe3aef9
Author: Debian Janitor <janitor@jelmer.uk>
Date:   Wed Oct 12 14:19:11 2022 +0000

    Update standards version to 4.6.1, no changes needed.
    
    Changes-By: lintian-brush
    Fixes: lintian: out-of-date-standards-version
    See-also: https://lintian.debian.org/tags/out-of-date-standards-version.html

commit 8dddf7f721a68a297fe33a971c3f655a127c183c
Author: Debian Janitor <janitor@jelmer.uk>
Date:   Wed Oct 12 14:18:58 2022 +0000

    Use secure URI in Homepage field.
    
    Changes-By: lintian-brush
    Fixes: lintian: homepage-field-uses-insecure-uri
    See-also: https://lintian.debian.org/tags/homepage-field-uses-insecure-uri.html

commit dd1335d263e538938d9ca4a2479305bf30566202
Author: Debian Janitor <janitor@jelmer.uk>
Date:   Wed Oct 12 14:18:52 2022 +0000

    Update lintian override info to new format on line 1.
    
    Changes-By: lintian-brush
    Fixes: lintian: mismatched-override
    See-also: https://lintian.debian.org/tags/mismatched-override.html
Created: 2022-11-01 Last update: 2025-06-16 21:34
debian/patches: 9 patches to forward upstream low

Among the 9 debian patches available in version 1:0.95-6 of the package, we noticed the following issues:

  • 9 patches where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-02-26 Last update: 2025-06-17 10:33
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.2 instead of 4.6.0).
Created: 2022-05-11 Last update: 2025-06-17 02:02
testing migrations
  • excuses:
    • Migration status for catdoc (1:0.95-5 to 1:0.95-6): Waiting for test results or another package, or too young (no action required now - check later)
    • Issues preventing migration:
    • ∙ ∙ Too young, only 4 of 5 days old
    • Additional info:
    • ∙ ∙ Updating catdoc will fix bugs in testing: #1107168
    • ∙ ∙ Piuparts tested OK - https://piuparts.debian.org/sid/source/c/catdoc.html
    • ∙ ∙ Reproducible on amd64 - info ♻
    • ∙ ∙ Reproducible on arm64 - info ♻
    • ∙ ∙ Waiting for reproducibility test results on armhf - info ♻
    • ∙ ∙ Overriding age needed from 5 days to 5 by ivodd
    • ∙ ∙ Ignoring block request by freeze, due to unblock request by ivodd
    • Not considered
news
[rss feed]
  • [2025-06-16] Accepted catdoc 1:0.95-6 (source) into unstable (Martina Ferrari)
  • [2022-01-16] catdoc 1:0.95-5 MIGRATED to testing (Debian testing watch)
  • [2022-01-11] Accepted catdoc 1:0.95-5 (source) into unstable (Martina Ferrari)
  • [2021-10-15] catdoc 1:0.95-4.2 MIGRATED to testing (Debian testing watch)
  • [2021-10-09] Accepted catdoc 1:0.95-4.2 (source) into unstable (Pino Toscano)
  • [2017-11-24] Accepted catdoc 1:0.94.3~git20160113.dbc9ec6+dfsg-1+deb9u1~bpo8+1 (source amd64) into jessie-backports->backports-policy, jessie-backports (Olly Betts)
  • [2017-11-11] catdoc 1:0.95-4.1 MIGRATED to testing (Debian testing watch)
  • [2017-11-05] Accepted catdoc 1:0.95-4.1 (source) into unstable (Olly Betts)
  • [2017-09-13] Accepted catdoc 1:0.95-4 (source amd64) into unstable (Martín Ferrari)
  • [2017-08-05] Accepted catdoc 0.94.4-1.1+deb8u1 (source) into oldstable-proposed-updates->oldstable-new, oldstable-proposed-updates (Salvatore Bonaccorso)
  • [2017-08-05] Accepted catdoc 1:0.94.3~git20160113.dbc9ec6+dfsg-1+deb9u1 (source) into proposed-updates->stable-new, proposed-updates (Salvatore Bonaccorso)
  • [2017-07-24] Accepted catdoc 0.94.4-1.1+deb7u1 (source amd64) into oldoldstable (Markus Koschany)
  • [2017-07-24] catdoc 1:0.95-3 MIGRATED to testing (Debian testing watch)
  • [2017-07-23] Accepted catdoc 1:0.95-3 (source amd64) into unstable (Martín Ferrari)
  • [2017-06-20] catdoc 1:0.95-2 MIGRATED to testing (Debian testing watch)
  • [2017-05-19] Accepted catdoc 1:0.95-2 (source amd64) into unstable (Martín Ferrari)
  • [2017-03-29] Accepted catdoc 1:0.95-1 (source amd64) into unstable (Martín Ferrari)
  • [2016-01-19] catdoc 1:0.94.3~git20160113.dbc9ec6+dfsg-1 MIGRATED to testing (Debian testing watch)
  • [2016-01-13] Accepted catdoc 1:0.94.3~git20160113.dbc9ec6+dfsg-1 (source amd64) into unstable (Martín Ferrari)
  • [2016-01-04] catdoc 1:0.94.3~git20151007.fd634c2+dfsg-3 MIGRATED to testing (Debian testing watch)
  • [2015-12-29] Accepted catdoc 1:0.94.3~git20151007.fd634c2+dfsg-3 (source amd64) into unstable (Martín Ferrari)
  • [2015-12-29] catdoc 1:0.94.3~git20151007.fd634c2+dfsg-2 MIGRATED to testing (Debian testing watch)
  • [2015-12-23] Accepted catdoc 1:0.94.3~git20151007.fd634c2+dfsg-2 (source amd64) into unstable (Martín Ferrari)
  • [2015-12-23] Accepted catdoc 1:0.94.3~git20151007.fd634c2+dfsg-1 (source amd64) into unstable (Martín Ferrari)
  • [2012-12-14] catdoc 0.94.4-1.1 MIGRATED to testing (Debian testing watch)
  • [2012-12-03] Accepted catdoc 0.94.4-1.1 (source amd64) (Neil Williams)
  • [2012-06-21] catdoc 0.94.3-1 MIGRATED to testing (Debian testing watch)
  • [2012-06-10] Accepted catdoc 0.94.3-1 (source amd64) (Nick Bane) (signed by: Neil Williams)
  • [2011-08-10] catdoc 0.94.2-2 MIGRATED to testing (Debian testing watch)
  • [2011-07-30] Accepted catdoc 0.94.2-2 (source amd64) (Nick Bane) (signed by: Hector Oron Martinez)
  • 1
  • 2
bugs [bug history graph]
  • all: 18
  • RC: 0
  • I&N: 9
  • M&W: 9
  • F&P: 0
  • patch: 7
links
  • homepage
  • lintian (0, 3)
  • buildd: logs, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
  • debian patches
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 1:0.95-6
  • 1 bug

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing