A flaw was found in libcaca v0.99.beta19. A buffer overflow issue in caca_resize function in libcaca/caca/canvas.c may lead to local execution of arbitrary code in the user context.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1928437 | Exploit Issue Tracking Third Party Advisory |
https://github.com/cacalabs/libcaca/issues/52 | Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2021/03/msg00006.html | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6WFGYICNTMNDNMDDUV4G2RYFB5HNJCOV/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PC7EGOEQ5C4OD66ZUJJIIYEXBTZOCMZX/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZSBCRN6EGQJUVOSD4OEEQ6XORHEM2CUL/ | Third Party Advisory |
Information
Published : 2021-02-23 15:15
Updated : 2022-10-24 10:03
NVD link : CVE-2021-3410
Mitre link : CVE-2021-3410
JSON object : View
CWE
CWE-190
Integer Overflow or Wraparound
Products Affected
debian
- debian_linux
libcaca_project
- libcaca
fedoraproject
- fedora