ALT-PU-2021-2147-1
Closed vulnerabilities
Published: 2021-03-23
Modified: 2024-11-21
Modified: 2024-11-21
CVE-2020-24994
Stack overflow in the parse_tag function in libass/ass_parse.c in libass before 0.15.0 allows remote attackers to cause a denial of service or remote code execution via a crafted file.
Severity: MEDIUM (6.8)
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Severity: HIGH (8.8)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
References:
- https://github.com/libass/libass/commit/6835731c2fe4164a0c50bc91d12c43b2a2b4e
- https://github.com/libass/libass/issues/422
- https://github.com/libass/libass/issues/422#issuecomment-806002919
- https://github.com/libass/libass/issues/423
- https://github.com/libass/libass/commit/6835731c2fe4164a0c50bc91d12c43b2a2b4e
- https://github.com/libass/libass/issues/422
- https://github.com/libass/libass/issues/422#issuecomment-806002919
- https://github.com/libass/libass/issues/423
Published: 2020-10-16
Modified: 2024-11-21
Modified: 2024-11-21
CVE-2020-26682
In libass 0.14.0, the `ass_outline_construct`'s call to `outline_stroke` causes a signed integer overflow.
Severity: MEDIUM (6.8)
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Severity: HIGH (8.8)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
References:
- http://www.openwall.com/lists/oss-security/2020/11/19/7
- https://github.com/libass/libass/issues/431
- https://github.com/libass/libass/pull/432
- https://security.gentoo.org/glsa/202012-12
- http://www.openwall.com/lists/oss-security/2020/11/19/7
- https://github.com/libass/libass/issues/431
- https://github.com/libass/libass/pull/432
- https://security.gentoo.org/glsa/202012-12