Debian Package Tracker
Register | Log in
Subscribe

libsixel

Choose email to subscribe with

general
  • source: libsixel (main)
  • version: 1.8.6-2
  • maintainer: NOKUBI Takatsugu (DMD)
  • arch: all any
  • std-ver: 4.1.5
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 1.1.2-1
  • oldstable: 1.5.2-2+deb9u1
  • stable: 1.8.2-1+deb10u1
  • testing: 1.8.6-2
  • unstable: 1.8.6-2
versioned links
  • 1.1.2-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.5.2-2+deb9u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.8.2-1+deb10u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.8.6-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • libsixel-bin
  • libsixel-dev
  • libsixel-examples
  • libsixel1
action needed
2 security issues in sid high

There are 2 open security issues in sid.

2 important issues:
  • CVE-2020-11721: load_png in loader.c in libsixel.a in libsixel 1.8.6 has an uninitialized pointer leading to an invalid call to free, which can cause a denial of service.
  • CVE-2020-19668: Unverified indexs into the array lead to out of bound access in the gif_out_code function in fromgif.c in libsixel 1.8.6.
Created: 2021-02-19 Last update: 2021-02-25 09:13
3 new commits since last upload, is it time to release? normal
vcswatch reports that this package seems to have new commits in its VCS but has not yet updated debian/changelog. You should consider updating the Debian changelog and uploading this new version into the archive.

Here are the relevant commit logs:
commit 40e4c839a19858c36347c509fc45feb11eb595d4
Author: NOKUBI Takatsugu <knok@daionet.gr.jp>
Date:   Thu May 7 13:20:49 2020 +0900

    new debian version -2

commit fcf9ac6c31c78bdb6a6dc0b930d0b2a5e723a4e4
Merge: 24edf16 a5b5942
Author: Takatsugu Nokubi <knok@debian.org>
Date:   Thu May 7 04:09:58 2020 +0000

    Merge branch 'master' into 'master'
    
    Add DEP-8 tests
    
    See merge request debian/libsixel!1

commit a5b5942575a448211784e3f73004d125d0f4c6fe
Author: Dylan Aïssi <daissi@debian.org>
Date:   Sat May 2 16:20:46 2020 +0200

    Add DEP-8 tests
Created: 2020-05-07 Last update: 2021-02-20 23:37
lintian reports 3 warnings normal
Lintian reports 3 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2020-08-22 Last update: 2021-01-27 03:03
Multiarch hinter reports 1 issue(s) low
There are issues with the multiarch metadata for this package.
  • libsixel-examples could be marked Multi-Arch: foreign
Created: 2017-08-28 Last update: 2021-02-25 13:00
15 low-priority security issues in stretch low

There are 15 open security issues in stretch.

15 issues left for the package maintainer to handle:
  • CVE-2019-19635: (needs triaging) An issue was discovered in libsixel 1.8.2. There is a heap-based buffer overflow in the function sixel_decode_raw_impl at fromsixel.c.
  • CVE-2019-19636: (needs triaging) An issue was discovered in libsixel 1.8.2. There is an integer overflow in the function sixel_encode_body at tosixel.c.
  • CVE-2019-19637: (needs triaging) An issue was discovered in libsixel 1.8.2. There is an integer overflow in the function sixel_decode_raw_impl at fromsixel.c.
  • CVE-2019-19638: (needs triaging) An issue was discovered in libsixel 1.8.2. There is a heap-based buffer overflow in the function load_pnm at frompnm.c, due to an integer overflow.
  • CVE-2019-19777: (needs triaging) stb_image.h (aka the stb image loader) 2.23, as used in libsixel and other products, has a heap-based buffer over-read in stbi__load_main.
  • CVE-2019-19778: (needs triaging) An issue was discovered in libsixel 1.8.2. There is a heap-based buffer over-read in the function load_sixel at loader.c.
  • CVE-2019-20022: (needs triaging) An invalid memory address dereference was discovered in load_pnm in frompnm.c in libsixel before 1.8.3.
  • CVE-2019-20023: (needs triaging) A memory leak was discovered in image_buffer_resize in fromsixel.c in libsixel 1.8.4.
  • CVE-2019-20024: (needs triaging) A heap-based buffer overflow was discovered in image_buffer_resize in fromsixel.c in libsixel before 1.8.4.
  • CVE-2019-20056: (needs triaging) stb_image.h (aka the stb image loader) 2.23, as used in libsixel and other products, has an assertion failure in stbi__shiftsigned.
  • CVE-2019-20094: (needs triaging) An issue was discovered in libsixel 1.8.4. There is a heap-based buffer overflow in the function gif_init_frame at fromgif.c.
  • CVE-2019-20140: (needs triaging) An issue was discovered in libsixel 1.8.4. There is a heap-based buffer overflow in the function gif_out_code at fromgif.c.
  • CVE-2019-20205: (needs triaging) libsixel 1.8.4 has an integer overflow in sixel_frame_resize in frame.c.
  • CVE-2020-11721: (needs triaging) load_png in loader.c in libsixel.a in libsixel 1.8.6 has an uninitialized pointer leading to an invalid call to free, which can cause a denial of service.
  • CVE-2020-19668: (needs triaging) Unverified indexs into the array lead to out of bound access in the gif_out_code function in fromgif.c in libsixel 1.8.6.

You can find information about how to handle these issues in the security team's documentation.

Created: 2021-02-19 Last update: 2021-02-25 09:13
15 low-priority security issues in buster low

There are 15 open security issues in buster.

15 issues left for the package maintainer to handle:
  • CVE-2019-19635: (needs triaging) An issue was discovered in libsixel 1.8.2. There is a heap-based buffer overflow in the function sixel_decode_raw_impl at fromsixel.c.
  • CVE-2019-19636: (needs triaging) An issue was discovered in libsixel 1.8.2. There is an integer overflow in the function sixel_encode_body at tosixel.c.
  • CVE-2019-19637: (needs triaging) An issue was discovered in libsixel 1.8.2. There is an integer overflow in the function sixel_decode_raw_impl at fromsixel.c.
  • CVE-2019-19638: (needs triaging) An issue was discovered in libsixel 1.8.2. There is a heap-based buffer overflow in the function load_pnm at frompnm.c, due to an integer overflow.
  • CVE-2019-19777: (needs triaging) stb_image.h (aka the stb image loader) 2.23, as used in libsixel and other products, has a heap-based buffer over-read in stbi__load_main.
  • CVE-2019-19778: (needs triaging) An issue was discovered in libsixel 1.8.2. There is a heap-based buffer over-read in the function load_sixel at loader.c.
  • CVE-2019-20022: (needs triaging) An invalid memory address dereference was discovered in load_pnm in frompnm.c in libsixel before 1.8.3.
  • CVE-2019-20023: (needs triaging) A memory leak was discovered in image_buffer_resize in fromsixel.c in libsixel 1.8.4.
  • CVE-2019-20024: (needs triaging) A heap-based buffer overflow was discovered in image_buffer_resize in fromsixel.c in libsixel before 1.8.4.
  • CVE-2019-20056: (needs triaging) stb_image.h (aka the stb image loader) 2.23, as used in libsixel and other products, has an assertion failure in stbi__shiftsigned.
  • CVE-2019-20094: (needs triaging) An issue was discovered in libsixel 1.8.4. There is a heap-based buffer overflow in the function gif_init_frame at fromgif.c.
  • CVE-2019-20140: (needs triaging) An issue was discovered in libsixel 1.8.4. There is a heap-based buffer overflow in the function gif_out_code at fromgif.c.
  • CVE-2019-20205: (needs triaging) libsixel 1.8.4 has an integer overflow in sixel_frame_resize in frame.c.
  • CVE-2020-11721: (needs triaging) load_png in loader.c in libsixel.a in libsixel 1.8.6 has an uninitialized pointer leading to an invalid call to free, which can cause a denial of service.
  • CVE-2020-19668: (needs triaging) Unverified indexs into the array lead to out of bound access in the gif_out_code function in fromgif.c in libsixel 1.8.6.

You can find information about how to handle these issues in the security team's documentation.

Created: 2021-02-19 Last update: 2021-02-25 09:13
2 low-priority security issues in bullseye low

There are 2 open security issues in bullseye.

2 issues left for the package maintainer to handle:
  • CVE-2020-11721: (needs triaging) load_png in loader.c in libsixel.a in libsixel 1.8.6 has an uninitialized pointer leading to an invalid call to free, which can cause a denial of service.
  • CVE-2020-19668: (needs triaging) Unverified indexs into the array lead to out of bound access in the gif_out_code function in fromgif.c in libsixel 1.8.6.

You can find information about how to handle these issues in the security team's documentation.

Created: 2021-02-19 Last update: 2021-02-25 09:13
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.5.1 instead of 4.1.5).
Created: 2018-08-20 Last update: 2020-11-17 05:41
news
[rss feed]
  • [2020-05-09] libsixel 1.8.6-2 MIGRATED to testing (Debian testing watch)
  • [2020-05-07] Accepted libsixel 1.8.6-2 (source) into unstable (NOKUBI Takatsugu)
  • [2020-03-10] libsixel 1.8.6-1 MIGRATED to testing (Debian testing watch)
  • [2020-03-05] Accepted libsixel 1.8.6-1 (source) into unstable (NOKUBI Takatsugu)
  • [2019-12-03] Accepted libsixel 1.5.2-2+deb9u1 (source) into oldstable-proposed-updates->oldstable-new, oldstable-proposed-updates (NOKUBI Takatsugu)
  • [2019-11-09] Accepted libsixel 1.8.2-1+deb10u1 (source) into proposed-updates->stable-new, proposed-updates (NOKUBI Takatsugu)
  • [2019-09-23] libsixel 1.8.2-2.1 MIGRATED to testing (Debian testing watch)
  • [2019-09-20] Accepted libsixel 1.8.2-2.1 (source) into unstable (Boyuan Yang)
  • [2019-09-09] Accepted libsixel 1.8.2-2 (source amd64 all) into unstable (NOKUBI Takatsugu)
  • [2018-07-28] libsixel 1.8.2-1 MIGRATED to testing (Debian testing watch)
  • [2018-07-23] Accepted libsixel 1.8.2-1 (source amd64 all) into unstable (NOKUBI Takatsugu)
  • [2018-07-16] libsixel 1.8.1-1 MIGRATED to testing (Debian testing watch)
  • [2018-07-11] Accepted libsixel 1.8.1-1 (source amd64 all) into unstable (NOKUBI Takatsugu)
  • [2017-09-02] libsixel 1.7.3-1 MIGRATED to testing (Debian testing watch)
  • [2017-08-28] Accepted libsixel 1.7.3-1 (source amd64 all) into unstable, unstable (NOKUBI Takatsugu)
  • [2015-09-09] libsixel 1.5.2-2 MIGRATED to testing (Britney)
  • [2015-09-04] Accepted libsixel 1.5.2-2 (source i386) into unstable (NOKUBI Takatsugu)
  • [2015-09-01] Accepted libsixel 1.5.2-1 (source i386) into unstable (NOKUBI Takatsugu)
  • [2015-04-27] libsixel 1.4.2-1 MIGRATED to testing (Britney)
  • [2014-12-09] Accepted libsixel 1.4.2-1 (source i386) into unstable (NOKUBI Takatsugu)
  • [2014-12-09] Accepted libsixel 1.1.2-2 (source i386) into unstable (NOKUBI Takatsugu)
  • [2014-11-04] libsixel 1.1.2-1 MIGRATED to testing (Britney)
  • [2014-10-24] Accepted libsixel 1.1.2-1 (source i386) into unstable, unstable (NOKUBI Takatsugu)
bugs [bug history graph]
  • all: 3
  • RC: 0
  • I&N: 3
  • M&W: 0
  • F&P: 0
  • patch: 0
links
  • homepage
  • lintian (0, 3)
  • buildd: logs, clang, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 1.8.6-2

Debian Package Tracker — Copyright 2013-2018 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing