Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-26826

Опубликовано: 08 фев. 2021
Источник: debian
EPSS Низкий

Описание

A stack overflow issue exists in Godot Engine up to v3.2 and is caused by improper boundary checks when loading .TGA image files. Depending on the context of the application, attack vector can be local or remote, and can lead to code execution and/or system crash.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
godotfixed3.5.1-stable-1package
godotno-dsabookwormpackage
godotno-dsabullseyepackage
godotno-dsabusterpackage

Примечания

  • https://github.com/godotengine/godot/pull/45701

  • https://github.com/godotengine/godot/commit/403e4fd08b0b212e96f53d926e6273e0745eaa5a (master)

  • https://github.com/godotengine/godot/commit/113b5ab1c45c01b8e6d54d13ac8876d091f883a8 (3.3-stable)

EPSS

Процентиль: 70%
0.00648
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
почти 5 лет назад

A stack overflow issue exists in Godot Engine up to v3.2 and is caused by improper boundary checks when loading .TGA image files. Depending on the context of the application, attack vector can be local or remote, and can lead to code execution and/or system crash.

CVSS3: 7.8
nvd
почти 5 лет назад

A stack overflow issue exists in Godot Engine up to v3.2 and is caused by improper boundary checks when loading .TGA image files. Depending on the context of the application, attack vector can be local or remote, and can lead to code execution and/or system crash.

github
больше 3 лет назад

A stack overflow issue exists in Godot Engine up to v3.2 and is caused by improper boundary checks when loading .TGA image files. Depending on the context of the application, attack vector can be local or remote, and can lead to code execution and/or system crash.

EPSS

Процентиль: 70%
0.00648
Низкий