ALT-PU-2025-15084-1
Package libmatio updated to version 1.5.29-alt1 for branch sisyphus_riscv64.
Closed vulnerabilities
BDU:2022-01836
Уязвимость функции ReadInt32DataDouble библиотеки для чтения и записи файлов MATLAB MATIO, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-13107
Multiple integer overflows exist in MATIO before 1.5.16, related to mat.c, mat4.c, mat5.c, mat73.c, and matvar_struct.c
- https://github.com/tbeu/matio/compare/f8cd397...fabac6c
- https://github.com/tbeu/matio/pull/118
- https://github.com/tbeu/matio/releases/tag/v1.5.16
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N7AE25FWDBPC7KLVMPLHT4G64O4GISQQ/
- https://github.com/tbeu/matio/compare/f8cd397...fabac6c
- https://github.com/tbeu/matio/pull/118
- https://github.com/tbeu/matio/releases/tag/v1.5.16
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N7AE25FWDBPC7KLVMPLHT4G64O4GISQQ/
Modified: 2024-11-21
CVE-2020-36428
matio (aka MAT File I/O Library) 1.5.18 through 1.5.21 has a heap-based buffer overflow in ReadInt32DataDouble (called from ReadInt32Data and Mat_VarRead4).
Modified: 2024-11-21
CVE-2022-1515
A memory leak was discovered in matio 1.5.21 and earlier in Mat_VarReadNextInfo5() in mat5.c via a crafted file. This issue can potentially result in DoS.
Modified: 2025-08-26
CVE-2025-2337
A vulnerability, which was classified as critical, has been found in tbeu matio 1.5.28. This issue affects the function Mat_VarPrint of the file src/mat.c. The manipulation leads to heap-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
Modified: 2025-08-27
CVE-2025-2338
A vulnerability, which was classified as critical, was found in tbeu matio 1.5.28. Affected is the function strdup_vprintf of the file src/io.c. The manipulation leads to heap-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.