There are 3 open security issues in bookworm.
3 issues left for the package maintainer to handle:
- CVE-2023-33863:
(needs triaging)
SerialiseValue in RenderDoc before 1.27 allows an Integer Overflow with a resultant Buffer Overflow. 0xffffffff is sign-extended to 0xffffffffffffffff (SIZE_MAX) and then there is an attempt to add 1.
- CVE-2023-33864:
(needs triaging)
StreamReader::ReadFromExternal in RenderDoc before 1.27 allows an Integer Overflow with a resultant Buffer Overflow. It uses uint32_t(m_BufferSize-m_InputSize) even though m_InputSize can exceed m_BufferSize.
- CVE-2023-33865:
(needs triaging)
RenderDoc before 1.27 allows local privilege escalation via a symlink attack. It relies on the /tmp/RenderDoc directory regardless of ownership.
You can find information about how to handle these issues in the security team's documentation.