The process_file function in reader.c in libdoc through 2017-10-23 has a heap-based buffer over-read that allows attackers to cause a denial of service (application crash) via a crafted file.
{ "binaries": [ { "binary_version": "1:0.94.3~git20160113.dbc9ec6+dfsg-1+deb9u1build0.16.04.1", "binary_name": "catdoc" } ] }
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-20451.json"
{ "binaries": [ { "binary_version": "1:0.95-4.1", "binary_name": "catdoc" } ] }
{ "binaries": [ { "binary_version": "1:0.95-5", "binary_name": "catdoc" } ] }
{ "binaries": [ { "binary_version": "1:0.95-5build1", "binary_name": "catdoc" } ] }
{ "binaries": [ { "binary_version": "1:0.95-6", "binary_name": "catdoc" } ] }