Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-36430

Опубликовано: 20 июл. 2021
Источник: debian
EPSS Низкий

Описание

libass 0.15.x before 0.15.1 has a heap-based buffer overflow in decode_chars (called from decode_font and process_text) because the wrong integer data type is used for subtraction.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libassfixed1:0.15.0-2package
libassnot-affectedbusterpackage
libassnot-affectedstretchpackage

Примечания

  • https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26674

  • https://github.com/google/oss-fuzz-vulns/blob/main/vulns/libass/OSV-2020-2099.yaml

  • Introduced by: https://github.com/libass/libass/commit/910211f1c0078e37546f73e95306724358b89be2 (0.15.0)

  • Fixed by: https://github.com/libass/libass/commit/017137471d0043e0321e377ed8da48e45a3ec632 (0.15.1)

EPSS

Процентиль: 54%
0.00311
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 4 лет назад

libass 0.15.x before 0.15.1 has a heap-based buffer overflow in decode_chars (called from decode_font and process_text) because the wrong integer data type is used for subtraction.

CVSS3: 7.8
nvd
больше 4 лет назад

libass 0.15.x before 0.15.1 has a heap-based buffer overflow in decode_chars (called from decode_font and process_text) because the wrong integer data type is used for subtraction.

suse-cvrf
больше 4 лет назад

Security update for libass

suse-cvrf
больше 4 лет назад

Security update for libass

suse-cvrf
больше 4 лет назад

Security update for libass

EPSS

Процентиль: 54%
0.00311
Низкий