Debian Package Tracker
Register | Log in
Subscribe

opencascade

Choose email to subscribe with

general
  • source: opencascade (main)
  • version: 7.9.2+dfsg-4
  • maintainer: Debian Science Maintainers (archive) (DMD)
  • uploaders: Tobias Frost [DMD] – Kurt Kremitzki [DMD]
  • arch: all any
  • std-ver: 4.7.0
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 7.5.1+dfsg1-2
  • oldstable: 7.6.3+dfsg1-7
  • stable: 7.8.1+dfsg1-3
  • testing: 7.9.2+dfsg-4
  • unstable: 7.9.2+dfsg-4
versioned links
  • 7.5.1+dfsg1-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 7.6.3+dfsg1-7: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 7.8.1+dfsg1-3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 7.9.2+dfsg-4: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • libocct-data-exchange-7.9
  • libocct-data-exchange-dev
  • libocct-doc
  • libocct-draw-7.9
  • libocct-draw-dev
  • libocct-foundation-7.9
  • libocct-foundation-dev
  • libocct-ivtk-7.9
  • libocct-ivtk-dev
  • libocct-modeling-algorithms-7.9
  • libocct-modeling-algorithms-dev
  • libocct-modeling-data-7.9
  • libocct-modeling-data-dev
  • libocct-ocaf-7.9
  • libocct-ocaf-dev
  • libocct-visualization-7.9
  • libocct-visualization-dev
  • occt-draw
  • occt-misc
action needed
Problems while searching for a new upstream version high
uscan had problems while searching for a new upstream version:
In watchfile debian/watch, reading webpage
  https://git.dev.opencascade.org/gitweb/?p=occt.git;a=tags failed: 502 Bad Gateway
Created: 2025-12-20 Last update: 2026-05-07 05:01
6 security issues in trixie high

There are 6 open security issues in trixie.

6 important issues:
  • CVE-2026-42476: Two heap-based out-of-bounds read vulnerabilities in the STL ASCII file parser in Open CASCADE Technology (OCCT) V8_0_0_rc5 exist in RWStl_Reader::ReadAscii because buffers returned by Standard_ReadLineBuffer::ReadLine() are not properly length-validated before strncasecmp or direct byte access. User-assisted attackers can trigger these issues by persuading a victim to open a crafted STL file with extremely short lines, resulting in a denial of service or possible information disclosure.
  • CVE-2026-42477: A heap-based out-of-bounds read vulnerability in RWObj_Reader::read in the OBJ file parser in Open CASCADE Technology (OCCT) V8_0_0_rc5 allows user-assisted attackers to cause a denial of service or obtain sensitive information by persuading a victim to open a crafted OBJ file. The issue occurs because Standard_ReadLineBuffer::ReadLine() can return a 1-byte buffer for a minimal OBJ line, and RWObj_Reader::read() calls pushIndices(aLine + 2) without validating the buffer length.
  • CVE-2026-42478: An issue was discovered in VrmlData_IndexedFaceSet::TShape in the VRML V2.0 parser in Open CASCADE Technology (OCCT) V8_0_0_rc5 allows attackers to cause a denial of service via a crafted VRML file. The issue occurs because malformed VRML input can trigger dereference of a corrupt or unvalidated pointer during shape construction in libTKDEVRML.so.
  • CVE-2026-42479: An out-of-bounds read vulnerability in VrmlData_IndexedLineSet::TShape in the VRML parser in Open CASCADE Technology (OCCT) V8_0_0_rc5 allows attackers to cause a denial of service via a crafted VRML file. The issue occurs because coordIndex values from parsed input are used as direct array indices without validation against the size of the coordinate array during geometry processing.
  • CVE-2026-42480: A stack-based out-of-bounds read vulnerability in VrmlData_Scene::ReadLine in the VRML parser in Open CASCADE Technology (OCCT) V8_0_0_rc5 allows attackers to cause a denial of service via a crafted VRML file. The issue occurs because the quoted-string escape handler uses ptr[++anOffset] without proper bounds checking, which can read past the end of a fixed-size stack buffer.
  • CVE-2026-42481: Open CASCADE Technology (OCCT) V8_0_0_rc5 contains multiple vulnerabilities in its IGES and STEP file parsers that can be triggered by crafted IGES or STEP files. These issues include an out-of-bounds read in Geom2d_BSplineCurve::EvalD0 during IGES B-spline curve evaluation, an out-of-bounds read in MakeBSplineCurveCommon during STEP B-spline curve construction, and infinite recursion in StepShape_OrientedEdge::EdgeStart when processing a self-referential OrientedEdge entity. Successful exploitation may result in denial of service or unintended memory disclosure.
Created: 2026-05-02 Last update: 2026-05-02 10:30
6 security issues in sid high

There are 6 open security issues in sid.

6 important issues:
  • CVE-2026-42476: Two heap-based out-of-bounds read vulnerabilities in the STL ASCII file parser in Open CASCADE Technology (OCCT) V8_0_0_rc5 exist in RWStl_Reader::ReadAscii because buffers returned by Standard_ReadLineBuffer::ReadLine() are not properly length-validated before strncasecmp or direct byte access. User-assisted attackers can trigger these issues by persuading a victim to open a crafted STL file with extremely short lines, resulting in a denial of service or possible information disclosure.
  • CVE-2026-42477: A heap-based out-of-bounds read vulnerability in RWObj_Reader::read in the OBJ file parser in Open CASCADE Technology (OCCT) V8_0_0_rc5 allows user-assisted attackers to cause a denial of service or obtain sensitive information by persuading a victim to open a crafted OBJ file. The issue occurs because Standard_ReadLineBuffer::ReadLine() can return a 1-byte buffer for a minimal OBJ line, and RWObj_Reader::read() calls pushIndices(aLine + 2) without validating the buffer length.
  • CVE-2026-42478: An issue was discovered in VrmlData_IndexedFaceSet::TShape in the VRML V2.0 parser in Open CASCADE Technology (OCCT) V8_0_0_rc5 allows attackers to cause a denial of service via a crafted VRML file. The issue occurs because malformed VRML input can trigger dereference of a corrupt or unvalidated pointer during shape construction in libTKDEVRML.so.
  • CVE-2026-42479: An out-of-bounds read vulnerability in VrmlData_IndexedLineSet::TShape in the VRML parser in Open CASCADE Technology (OCCT) V8_0_0_rc5 allows attackers to cause a denial of service via a crafted VRML file. The issue occurs because coordIndex values from parsed input are used as direct array indices without validation against the size of the coordinate array during geometry processing.
  • CVE-2026-42480: A stack-based out-of-bounds read vulnerability in VrmlData_Scene::ReadLine in the VRML parser in Open CASCADE Technology (OCCT) V8_0_0_rc5 allows attackers to cause a denial of service via a crafted VRML file. The issue occurs because the quoted-string escape handler uses ptr[++anOffset] without proper bounds checking, which can read past the end of a fixed-size stack buffer.
  • CVE-2026-42481: Open CASCADE Technology (OCCT) V8_0_0_rc5 contains multiple vulnerabilities in its IGES and STEP file parsers that can be triggered by crafted IGES or STEP files. These issues include an out-of-bounds read in Geom2d_BSplineCurve::EvalD0 during IGES B-spline curve evaluation, an out-of-bounds read in MakeBSplineCurveCommon during STEP B-spline curve construction, and infinite recursion in StepShape_OrientedEdge::EdgeStart when processing a self-referential OrientedEdge entity. Successful exploitation may result in denial of service or unintended memory disclosure.
Created: 2026-05-02 Last update: 2026-05-02 10:30
6 security issues in forky high

There are 6 open security issues in forky.

6 important issues:
  • CVE-2026-42476: Two heap-based out-of-bounds read vulnerabilities in the STL ASCII file parser in Open CASCADE Technology (OCCT) V8_0_0_rc5 exist in RWStl_Reader::ReadAscii because buffers returned by Standard_ReadLineBuffer::ReadLine() are not properly length-validated before strncasecmp or direct byte access. User-assisted attackers can trigger these issues by persuading a victim to open a crafted STL file with extremely short lines, resulting in a denial of service or possible information disclosure.
  • CVE-2026-42477: A heap-based out-of-bounds read vulnerability in RWObj_Reader::read in the OBJ file parser in Open CASCADE Technology (OCCT) V8_0_0_rc5 allows user-assisted attackers to cause a denial of service or obtain sensitive information by persuading a victim to open a crafted OBJ file. The issue occurs because Standard_ReadLineBuffer::ReadLine() can return a 1-byte buffer for a minimal OBJ line, and RWObj_Reader::read() calls pushIndices(aLine + 2) without validating the buffer length.
  • CVE-2026-42478: An issue was discovered in VrmlData_IndexedFaceSet::TShape in the VRML V2.0 parser in Open CASCADE Technology (OCCT) V8_0_0_rc5 allows attackers to cause a denial of service via a crafted VRML file. The issue occurs because malformed VRML input can trigger dereference of a corrupt or unvalidated pointer during shape construction in libTKDEVRML.so.
  • CVE-2026-42479: An out-of-bounds read vulnerability in VrmlData_IndexedLineSet::TShape in the VRML parser in Open CASCADE Technology (OCCT) V8_0_0_rc5 allows attackers to cause a denial of service via a crafted VRML file. The issue occurs because coordIndex values from parsed input are used as direct array indices without validation against the size of the coordinate array during geometry processing.
  • CVE-2026-42480: A stack-based out-of-bounds read vulnerability in VrmlData_Scene::ReadLine in the VRML parser in Open CASCADE Technology (OCCT) V8_0_0_rc5 allows attackers to cause a denial of service via a crafted VRML file. The issue occurs because the quoted-string escape handler uses ptr[++anOffset] without proper bounds checking, which can read past the end of a fixed-size stack buffer.
  • CVE-2026-42481: Open CASCADE Technology (OCCT) V8_0_0_rc5 contains multiple vulnerabilities in its IGES and STEP file parsers that can be triggered by crafted IGES or STEP files. These issues include an out-of-bounds read in Geom2d_BSplineCurve::EvalD0 during IGES B-spline curve evaluation, an out-of-bounds read in MakeBSplineCurveCommon during STEP B-spline curve construction, and infinite recursion in StepShape_OrientedEdge::EdgeStart when processing a self-referential OrientedEdge entity. Successful exploitation may result in denial of service or unintended memory disclosure.
Created: 2026-05-02 Last update: 2026-05-02 10:30
6 security issues in bullseye high

There are 6 open security issues in bullseye.

6 important issues:
  • CVE-2026-42476: Two heap-based out-of-bounds read vulnerabilities in the STL ASCII file parser in Open CASCADE Technology (OCCT) V8_0_0_rc5 exist in RWStl_Reader::ReadAscii because buffers returned by Standard_ReadLineBuffer::ReadLine() are not properly length-validated before strncasecmp or direct byte access. User-assisted attackers can trigger these issues by persuading a victim to open a crafted STL file with extremely short lines, resulting in a denial of service or possible information disclosure.
  • CVE-2026-42477: A heap-based out-of-bounds read vulnerability in RWObj_Reader::read in the OBJ file parser in Open CASCADE Technology (OCCT) V8_0_0_rc5 allows user-assisted attackers to cause a denial of service or obtain sensitive information by persuading a victim to open a crafted OBJ file. The issue occurs because Standard_ReadLineBuffer::ReadLine() can return a 1-byte buffer for a minimal OBJ line, and RWObj_Reader::read() calls pushIndices(aLine + 2) without validating the buffer length.
  • CVE-2026-42478: An issue was discovered in VrmlData_IndexedFaceSet::TShape in the VRML V2.0 parser in Open CASCADE Technology (OCCT) V8_0_0_rc5 allows attackers to cause a denial of service via a crafted VRML file. The issue occurs because malformed VRML input can trigger dereference of a corrupt or unvalidated pointer during shape construction in libTKDEVRML.so.
  • CVE-2026-42479: An out-of-bounds read vulnerability in VrmlData_IndexedLineSet::TShape in the VRML parser in Open CASCADE Technology (OCCT) V8_0_0_rc5 allows attackers to cause a denial of service via a crafted VRML file. The issue occurs because coordIndex values from parsed input are used as direct array indices without validation against the size of the coordinate array during geometry processing.
  • CVE-2026-42480: A stack-based out-of-bounds read vulnerability in VrmlData_Scene::ReadLine in the VRML parser in Open CASCADE Technology (OCCT) V8_0_0_rc5 allows attackers to cause a denial of service via a crafted VRML file. The issue occurs because the quoted-string escape handler uses ptr[++anOffset] without proper bounds checking, which can read past the end of a fixed-size stack buffer.
  • CVE-2026-42481: Open CASCADE Technology (OCCT) V8_0_0_rc5 contains multiple vulnerabilities in its IGES and STEP file parsers that can be triggered by crafted IGES or STEP files. These issues include an out-of-bounds read in Geom2d_BSplineCurve::EvalD0 during IGES B-spline curve evaluation, an out-of-bounds read in MakeBSplineCurveCommon during STEP B-spline curve construction, and infinite recursion in StepShape_OrientedEdge::EdgeStart when processing a self-referential OrientedEdge entity. Successful exploitation may result in denial of service or unintended memory disclosure.
Created: 2026-05-02 Last update: 2026-05-02 10:30
6 security issues in bookworm high

There are 6 open security issues in bookworm.

6 important issues:
  • CVE-2026-42476: Two heap-based out-of-bounds read vulnerabilities in the STL ASCII file parser in Open CASCADE Technology (OCCT) V8_0_0_rc5 exist in RWStl_Reader::ReadAscii because buffers returned by Standard_ReadLineBuffer::ReadLine() are not properly length-validated before strncasecmp or direct byte access. User-assisted attackers can trigger these issues by persuading a victim to open a crafted STL file with extremely short lines, resulting in a denial of service or possible information disclosure.
  • CVE-2026-42477: A heap-based out-of-bounds read vulnerability in RWObj_Reader::read in the OBJ file parser in Open CASCADE Technology (OCCT) V8_0_0_rc5 allows user-assisted attackers to cause a denial of service or obtain sensitive information by persuading a victim to open a crafted OBJ file. The issue occurs because Standard_ReadLineBuffer::ReadLine() can return a 1-byte buffer for a minimal OBJ line, and RWObj_Reader::read() calls pushIndices(aLine + 2) without validating the buffer length.
  • CVE-2026-42478: An issue was discovered in VrmlData_IndexedFaceSet::TShape in the VRML V2.0 parser in Open CASCADE Technology (OCCT) V8_0_0_rc5 allows attackers to cause a denial of service via a crafted VRML file. The issue occurs because malformed VRML input can trigger dereference of a corrupt or unvalidated pointer during shape construction in libTKDEVRML.so.
  • CVE-2026-42479: An out-of-bounds read vulnerability in VrmlData_IndexedLineSet::TShape in the VRML parser in Open CASCADE Technology (OCCT) V8_0_0_rc5 allows attackers to cause a denial of service via a crafted VRML file. The issue occurs because coordIndex values from parsed input are used as direct array indices without validation against the size of the coordinate array during geometry processing.
  • CVE-2026-42480: A stack-based out-of-bounds read vulnerability in VrmlData_Scene::ReadLine in the VRML parser in Open CASCADE Technology (OCCT) V8_0_0_rc5 allows attackers to cause a denial of service via a crafted VRML file. The issue occurs because the quoted-string escape handler uses ptr[++anOffset] without proper bounds checking, which can read past the end of a fixed-size stack buffer.
  • CVE-2026-42481: Open CASCADE Technology (OCCT) V8_0_0_rc5 contains multiple vulnerabilities in its IGES and STEP file parsers that can be triggered by crafted IGES or STEP files. These issues include an out-of-bounds read in Geom2d_BSplineCurve::EvalD0 during IGES B-spline curve evaluation, an out-of-bounds read in MakeBSplineCurveCommon during STEP B-spline curve construction, and infinite recursion in StepShape_OrientedEdge::EdgeStart when processing a self-referential OrientedEdge entity. Successful exploitation may result in denial of service or unintended memory disclosure.
Created: 2026-05-02 Last update: 2026-05-02 10:30
debian/patches: 3 patches with invalid metadata, 3 patches to forward upstream high

Among the 7 debian patches available in version 7.9.2+dfsg-4 of the package, we noticed the following issues:

  • 3 patches with invalid metadata that ought to be fixed.
  • 3 patches where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-02-26 Last update: 2026-02-02 11:01
lintian reports 1 error and 2 warnings high
Lintian reports 1 error and 2 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2025-12-04 Last update: 2026-01-20 18:02
version in VCS is newer than in repository, is it time to upload? normal
vcswatch reports that this package seems to have a new changelog entry (version 7.9.2+dfsg-5, distribution UNRELEASED) and new commits in its VCS. You should consider whether it's time to make an upload.

Here are the relevant commit messages:
commit 7991d8e5e391d3a1ed0fca219f719a0f08c95f8a
Author: Drew Parsons <dparsons@debian.org>
Date:   Sat Feb 21 11:28:52 2026 +0100

    fix logic applying NO_TBB_ARCH_LIST to set USE_TBB

commit ada613b48b9ec733d97765bdb8ca3888b540cb31
Author: Drew Parsons <dparsons@debian.org>
Date:   Sat Feb 21 11:19:27 2026 +0100

    deactivate TBB support on arches which do not build libtbb-dev
    
    Hurd cannot build TBB
    and it fails to build on alpha hppa powerpc sh4
Created: 2026-02-21 Last update: 2026-05-02 13:00
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.4 instead of 4.7.0).
Created: 2025-02-21 Last update: 2026-03-31 15:01
news
[rss feed]
  • [2026-02-07] opencascade 7.9.2+dfsg-4 MIGRATED to testing (Debian testing watch)
  • [2026-02-01] Accepted opencascade 7.9.2+dfsg-4 (source) into unstable (Tobias Frost)
  • [2026-01-11] opencascade 7.9.2+dfsg-3 MIGRATED to testing (Debian testing watch)
  • [2026-01-06] Accepted opencascade 7.9.2+dfsg-3 (source) into unstable (Tobias Frost)
  • [2025-12-07] opencascade 7.9.2+dfsg-2 MIGRATED to testing (Debian testing watch)
  • [2025-12-04] Accepted opencascade 7.9.2+dfsg-2 (source) into unstable (Tobias Frost)
  • [2025-11-15] Accepted opencascade 7.9.2+dfsg-1 (source) into unstable (Tobias Frost)
  • [2025-10-23] opencascade 7.8.1+dfsg1-7 MIGRATED to testing (Debian testing watch)
  • [2025-10-17] Accepted opencascade 7.9.1+dfsg-1~exp2 (source) into experimental (Tobias Frost)
  • [2025-10-17] Accepted opencascade 7.8.1+dfsg1-7 (source) into unstable (Tobias Frost)
  • [2025-10-16] Accepted opencascade 7.8.1+dfsg1-6 (source) into unstable (Tobias Frost)
  • [2025-10-14] Accepted opencascade 7.9.1+dfsg-1~exp1 (source amd64 all) into experimental (Debian FTP Masters) (signed by: Tobias Frost)
  • [2025-09-29] opencascade 7.8.1+dfsg1-5 MIGRATED to testing (Debian testing watch)
  • [2025-09-23] Accepted opencascade 7.8.1+dfsg1-5 (source) into unstable (Tobias Frost)
  • [2025-06-20] Accepted opencascade 7.8.1+dfsg1-4~exp1 (source amd64 all) into experimental (Debian FTP Masters) (signed by: Tobias Frost)
  • [2024-10-08] opencascade 7.8.1+dfsg1-3 MIGRATED to testing (Debian testing watch)
  • [2024-10-02] Accepted opencascade 7.8.1+dfsg1-3 (source) into unstable (Santiago Vila)
  • [2024-05-31] opencascade 7.8.1+dfsg1-2 MIGRATED to testing (Debian testing watch)
  • [2024-05-24] Accepted opencascade 7.8.1+dfsg1-2 (source) into unstable (Tobias Frost)
  • [2024-05-24] Accepted opencascade 7.8.1+dfsg1-1 (source) into unstable (Tobias Frost)
  • [2024-05-16] Accepted opencascade 7.8.1+dfsg1-1~exp1 (source amd64 all) into experimental (Debian FTP Masters) (signed by: Tobias Frost)
  • [2024-05-02] opencascade 7.6.3+dfsg1-7.1 MIGRATED to testing (Debian testing watch)
  • [2024-03-02] Accepted opencascade 7.6.3+dfsg1-7.1 (source) into unstable (Steve Langasek)
  • [2023-06-22] Accepted opencascade 7.7.1+dfsg1-1~exp2 (source) into experimental (Tobias Frost)
  • [2023-06-02] Accepted opencascade 7.7.1+dfsg1-1~exp1 (source amd64 all) into experimental (Debian FTP Masters) (signed by: Tobias Frost)
  • [2023-05-26] opencascade 7.6.3+dfsg1-7 MIGRATED to testing (Debian testing watch)
  • [2023-05-23] Accepted opencascade 7.6.3+dfsg1-7 (source) into unstable (Tobias Frost)
  • [2023-05-21] opencascade 7.6.3+dfsg1-6 MIGRATED to testing (Debian testing watch)
  • [2023-05-14] Accepted opencascade 7.6.3+dfsg1-6 (source) into unstable (Tobias Frost)
  • [2022-10-26] opencascade 7.6.3+dfsg1-5 MIGRATED to testing (Debian testing watch)
  • 1
  • 2
bugs [bug history graph]
  • all: 0
links
  • homepage
  • lintian (1, 2)
  • buildd: logs, reproducibility, cross
  • popcon
  • browse source code
  • other distros
  • security tracker
  • debian patches
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 7.9.2+dfsg-4
  • 2 bugs

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing