Vulnerability Database
Blog
FAQ
Docs
arrow_forward
search
DEBIAN-CVE-2019-20205
See a problem?
Please try reporting it
to the source
first.
Source
https://security-tracker.debian.org/tracker/DEBIAN-CVE-2019-20205
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2019-20205.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2019-20205
Upstream
CVE-2019-20205
Published
2020-01-02T14:16:36Z
Modified
2025-09-18T05:19:06Z
Summary
[none]
Details
libsixel 1.8.4 has an integer overflow in sixel
frame
resize in frame.c.
References
https://security-tracker.debian.org/tracker/CVE-2019-20205
Affected packages
Debian:11
/
libsixel
Package
Name
libsixel
Purl
pkg:deb/debian/libsixel?arch=source
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
1.8.6-1
Ecosystem specific
{ "urgency": "low" }
Debian:12
/
libsixel
Package
Name
libsixel
Purl
pkg:deb/debian/libsixel?arch=source
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
1.8.6-1
Ecosystem specific
{ "urgency": "low" }
Debian:13
/
libsixel
Package
Name
libsixel
Purl
pkg:deb/debian/libsixel?arch=source
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
1.8.6-1
Ecosystem specific
{ "urgency": "low" }
Debian:14
/
libsixel
Package
Name
libsixel
Purl
pkg:deb/debian/libsixel?arch=source
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
1.8.6-1
Ecosystem specific
{ "urgency": "low" }
DEBIAN-CVE-2019-20205 - OSV