Debian Package Tracker
Register | Log in
Subscribe

libmatio

Choose email to subscribe with

general
  • source: libmatio (main)
  • version: 1.5.29-1
  • maintainer: Debian Science Maintainers (archive) (DMD)
  • uploaders: Sébastien Villemot [DMD]
  • arch: all any
  • std-ver: 4.7.2
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 1.5.19-2
  • oldstable: 1.5.23-2
  • stable: 1.5.28-2
  • testing: 1.5.29-1
  • unstable: 1.5.29-1
versioned links
  • 1.5.19-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.5.23-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.5.28-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.5.29-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • libmatio-dev
  • libmatio-doc
  • libmatio13
  • matio-tools
action needed
1 security issue in sid high

There is 1 open security issue in sid.

1 important issue:
  • CVE-2025-50343: An issue was discovered in matio 1.5.28. A heap-based memory corruption can occur in Mat_VarCreateStruct() when the nfields value does not match the actual number of strings in the fields array. This leads to out-of-bounds reads and invalid memory frees during cleanup, potentially causing a segmentation fault or heap corruption.
Created: 2025-12-31 Last update: 2026-01-07 01:32
1 security issue in forky high

There is 1 open security issue in forky.

1 important issue:
  • CVE-2025-50343: An issue was discovered in matio 1.5.28. A heap-based memory corruption can occur in Mat_VarCreateStruct() when the nfields value does not match the actual number of strings in the fields array. This leads to out-of-bounds reads and invalid memory frees during cleanup, potentially causing a segmentation fault or heap corruption.
Created: 2025-12-31 Last update: 2026-01-07 01:32
5 security issues in bullseye high

There are 5 open security issues in bullseye.

1 important issue:
  • CVE-2025-50343: An issue was discovered in matio 1.5.28. A heap-based memory corruption can occur in Mat_VarCreateStruct() when the nfields value does not match the actual number of strings in the fields array. This leads to out-of-bounds reads and invalid memory frees during cleanup, potentially causing a segmentation fault or heap corruption.
4 issues postponed or untriaged:
  • CVE-2022-1515: (needs triaging) A memory leak was discovered in matio 1.5.21 and earlier in Mat_VarReadNextInfo5() in mat5.c via a crafted file. This issue can potentially result in DoS.
  • CVE-2025-2337: (postponed; to be fixed through a stable update) A vulnerability, which was classified as critical, has been found in tbeu matio 1.5.28. This issue affects the function Mat_VarPrint of the file src/mat.c. The manipulation leads to heap-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
  • CVE-2025-2338: (postponed; to be fixed through a stable update) A vulnerability, which was classified as critical, was found in tbeu matio 1.5.28. Affected is the function strdup_vprintf of the file src/io.c. The manipulation leads to heap-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
  • CVE-2020-36428: (needs triaging) matio (aka MAT File I/O Library) 1.5.18 through 1.5.21 has a heap-based buffer overflow in ReadInt32DataDouble (called from ReadInt32Data and Mat_VarRead4).
Created: 2025-12-31 Last update: 2026-01-07 01:32
lintian reports 3 warnings normal
Lintian reports 3 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2021-09-06 Last update: 2024-07-30 18:04
2 low-priority security issues in trixie low

There are 2 open security issues in trixie.

2 issues left for the package maintainer to handle:
  • CVE-2025-2338: (needs triaging) A vulnerability, which was classified as critical, was found in tbeu matio 1.5.28. Affected is the function strdup_vprintf of the file src/io.c. The manipulation leads to heap-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
  • CVE-2025-50343: (needs triaging) An issue was discovered in matio 1.5.28. A heap-based memory corruption can occur in Mat_VarCreateStruct() when the nfields value does not match the actual number of strings in the fields array. This leads to out-of-bounds reads and invalid memory frees during cleanup, potentially causing a segmentation fault or heap corruption.

You can find information about how to handle these issues in the security team's documentation.

Created: 2025-08-09 Last update: 2026-01-07 01:32
3 low-priority security issues in bookworm low

There are 3 open security issues in bookworm.

3 issues left for the package maintainer to handle:
  • CVE-2025-2337: (postponed; to be fixed through a stable update) A vulnerability, which was classified as critical, has been found in tbeu matio 1.5.28. This issue affects the function Mat_VarPrint of the file src/mat.c. The manipulation leads to heap-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
  • CVE-2025-2338: (needs triaging) A vulnerability, which was classified as critical, was found in tbeu matio 1.5.28. Affected is the function strdup_vprintf of the file src/io.c. The manipulation leads to heap-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
  • CVE-2025-50343: (needs triaging) An issue was discovered in matio 1.5.28. A heap-based memory corruption can occur in Mat_VarCreateStruct() when the nfields value does not match the actual number of strings in the fields array. This leads to out-of-bounds reads and invalid memory frees during cleanup, potentially causing a segmentation fault or heap corruption.

You can find information about how to handle these issues in the security team's documentation.

Created: 2025-03-17 Last update: 2026-01-07 01:32
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.3 instead of 4.7.2).
Created: 2025-12-23 Last update: 2025-12-23 20:00
news
[rss feed]
  • [2025-11-20] libmatio 1.5.29-1 MIGRATED to testing (Debian testing watch)
  • [2025-11-14] Accepted libmatio 1.5.29-1 (source) into unstable (Sébastien Villemot)
  • [2025-05-09] libmatio 1.5.28-2 MIGRATED to testing (Debian testing watch)
  • [2025-04-29] Accepted libmatio 1.5.28-2 (source) into unstable (Sébastien Villemot)
  • [2024-11-10] libmatio 1.5.28-1 MIGRATED to testing (Debian testing watch)
  • [2024-11-04] Accepted libmatio 1.5.28-1 (source) into unstable (Sébastien Villemot)
  • [2024-06-05] libmatio 1.5.27-2 MIGRATED to testing (Debian testing watch)
  • [2024-05-31] Accepted libmatio 1.5.27-2 (source) into unstable (Sébastien Villemot)
  • [2024-04-26] Accepted libmatio 1.5.27-1 (source amd64 all) into experimental (Debian FTP Masters) (signed by: Sébastien Villemot)
  • [2023-11-20] libmatio 1.5.26-1 MIGRATED to testing (Debian testing watch)
  • [2023-11-15] Accepted libmatio 1.5.26-1 (source) into unstable (Sébastien Villemot)
  • [2023-11-05] libmatio 1.5.24-1 MIGRATED to testing (Debian testing watch)
  • [2023-11-05] libmatio 1.5.24-1 MIGRATED to testing (Debian testing watch)
  • [2023-10-30] Accepted libmatio 1.5.24-1 (source) into unstable (Sébastien Villemot)
  • [2022-06-06] libmatio 1.5.23-2 MIGRATED to testing (Debian testing watch)
  • [2022-06-01] Accepted libmatio 1.5.23-2 (source) into unstable (Sébastien Villemot)
  • [2022-04-16] libmatio 1.5.23-1 MIGRATED to testing (Debian testing watch)
  • [2022-04-16] libmatio 1.5.23-1 MIGRATED to testing (Debian testing watch)
  • [2022-04-11] Accepted libmatio 1.5.23-1 (source) into unstable (Sébastien Villemot)
  • [2022-04-03] libmatio 1.5.22-1 MIGRATED to testing (Debian testing watch)
  • [2022-03-29] Accepted libmatio 1.5.22-1 (source) into unstable (Sébastien Villemot)
  • [2021-08-28] libmatio 1.5.21-1 MIGRATED to testing (Debian testing watch)
  • [2021-08-22] Accepted libmatio 1.5.21-1 (source) into unstable (Sébastien Villemot)
  • [2020-11-25] libmatio 1.5.19-2 MIGRATED to testing (Debian testing watch)
  • [2020-11-25] libmatio 1.5.19-2 MIGRATED to testing (Debian testing watch)
  • [2020-11-19] Accepted libmatio 1.5.19-2 (source) into unstable (Sébastien Villemot)
  • [2020-11-14] Accepted libmatio 1.5.19-1 (source) into experimental (Sébastien Villemot)
  • [2020-09-25] Accepted libmatio 1.5.18-1 (source amd64 all) into experimental, experimental (Debian FTP Masters) (signed by: Sébastien Villemot)
  • [2020-07-19] libmatio 1.5.17-5 MIGRATED to testing (Debian testing watch)
  • [2020-07-13] Accepted libmatio 1.5.17-5 (source) into unstable (Sébastien Villemot)
  • 1
  • 2
bugs [bug history graph]
  • all: 1
  • RC: 0
  • I&N: 1
  • M&W: 0
  • F&P: 0
  • patch: 0
links
  • homepage
  • lintian (0, 3)
  • buildd: logs, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 1.5.29-1
  • 4 bugs

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing