Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-48426

Опубликовано: 24 окт. 2024
Источник: debian
EPSS Низкий

Описание

A segmentation fault (SEGV) was detected in the SortByPTypeProcess::Execute function in the Assimp library during fuzz testing with AddressSanitizer. The crash occurred due to a read access to an invalid memory address (0x1000c9714971).

Пакеты

ПакетСтатусВерсия исправленияРелизТип
assimpunfixedpackage
assimppostponedtrixiepackage
assimppostponedbookwormpackage
assimppostponedbullseyepackage

Примечания

  • https://github.com/assimp/assimp/issues/5789

EPSS

Процентиль: 11%
0.00038
Низкий

Связанные уязвимости

CVSS3: 6.2
ubuntu
около 1 года назад

A segmentation fault (SEGV) was detected in the SortByPTypeProcess::Execute function in the Assimp library during fuzz testing with AddressSanitizer. The crash occurred due to a read access to an invalid memory address (0x1000c9714971).

CVSS3: 6.2
redhat
около 1 года назад

A segmentation fault (SEGV) was detected in the SortByPTypeProcess::Execute function in the Assimp library during fuzz testing with AddressSanitizer. The crash occurred due to a read access to an invalid memory address (0x1000c9714971).

CVSS3: 6.2
nvd
около 1 года назад

A segmentation fault (SEGV) was detected in the SortByPTypeProcess::Execute function in the Assimp library during fuzz testing with AddressSanitizer. The crash occurred due to a read access to an invalid memory address (0x1000c9714971).

CVSS3: 6.2
github
около 1 года назад

A segmentation fault (SEGV) was detected in the SortByPTypeProcess::Execute function in the Assimp library during fuzz testing with AddressSanitizer. The crash occurred due to a read access to an invalid memory address (0x1000c9714971).

EPSS

Процентиль: 11%
0.00038
Низкий