A code execution vulnerability exists in the Nef polygon-parsing functionality of CGAL libcgal CGAL-5.1.1. An oob read vulnerability exists in Nef_S2/SNC_io_parser.h SNC_io_parser::read_sloop() slh->incident_sface. An attacker can provide malicious input to trigger this vulnerability.
The product uses untrusted input when calculating or using an array index, but the product does not validate or incorrectly validates the index to ensure the index references a valid position within the array.
The product reads data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1225 | third party advisory technical description |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E4J344OKKDLPRN422OYRR46HDEN6MM6P/ | vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NB5SF5OJR2DSV7CC6U7FVW5VJSJO5EKV/ | vendor advisory |
https://lists.debian.org/debian-lts-announce/2021/05/msg00002.html | third party advisory mailing list |
https://lists.debian.org/debian-lts-announce/2022/12/msg00011.html | third party advisory mailing list |
https://security.gentoo.org/glsa/202305-34 | vendor advisory |