ALT-PU-2021-2147-1
Closed vulnerabilities
Published: 2021-03-23
Modified: 2024-11-21
Modified: 2024-11-21
CVE-2020-24994
Stack overflow in the parse_tag function in libass/ass_parse.c in libass before 0.15.0 allows remote attackers to cause a denial of service or remote code execution via a crafted file.
Severity: HIGH (8.8)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
References:
- https://github.com/libass/libass/commit/6835731c2fe4164a0c50bc91d12c43b2a2b4e
- https://github.com/libass/libass/commit/6835731c2fe4164a0c50bc91d12c43b2a2b4e
- https://github.com/libass/libass/issues/422
- https://github.com/libass/libass/issues/422
- https://github.com/libass/libass/issues/422#issuecomment-806002919
- https://github.com/libass/libass/issues/422#issuecomment-806002919
- https://github.com/libass/libass/issues/423
- https://github.com/libass/libass/issues/423
Published: 2020-10-16
Modified: 2024-11-21
Modified: 2024-11-21
CVE-2020-26682
In libass 0.14.0, the `ass_outline_construct`'s call to `outline_stroke` causes a signed integer overflow.
Severity: HIGH (8.8)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
References:
- [oss-security] 20201119 Re: libass ass_outline.c signed integer overflow
- [oss-security] 20201119 Re: libass ass_outline.c signed integer overflow
- https://github.com/libass/libass/issues/431
- https://github.com/libass/libass/issues/431
- https://github.com/libass/libass/pull/432
- https://github.com/libass/libass/pull/432
- GLSA-202012-12
- GLSA-202012-12