There is an illegal READ memory access at caca/dither.c (function get_rgba_default) in libcaca 0.99.beta19 for 24bpp data.
References
| Link | Resource |
|---|---|
| https://bugzilla.redhat.com/show_bug.cgi?id=1652624 | Issue Tracking Exploit Patch Third Party Advisory |
| https://lists.debian.org/debian-lts-announce/2019/01/msg00007.html | Mailing List Third Party Advisory |
| https://usn.ubuntu.com/3860-2/ | Third Party Advisory |
| https://usn.ubuntu.com/3860-1/ | Third Party Advisory |
| http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00033.html |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2018-12-28 16:29
Updated : 2019-04-05 00:29
NVD link : CVE-2018-20547
Mitre link : CVE-2018-20547
JSON object : View
Products Affected
canonical
- ubuntu_linux
libcaca_project
- libcaca
debian
- debian_linux
CWE
CWE-190
Integer Overflow or Wraparound
