ADMesh through 0.98.4 has a heap-based buffer over-read in stl_update_connects_remove_1 (called from stl_remove_degenerate) in connect.c in libadmesh.a.
References
Link | Resource |
---|---|
https://github.com/admesh/admesh/issues/28 | Exploit Issue Tracking Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2022/05/msg00029.html | Mailing List Third Party Advisory |
https://github.com/admesh/admesh/issues/28 | Exploit Issue Tracking Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2022/05/msg00029.html | Mailing List Third Party Advisory |
Configurations
History
21 Nov 2024, 04:03
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/admesh/admesh/issues/28 - Exploit, Issue Tracking, Patch, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2022/05/msg00029.html - Mailing List, Third Party Advisory |
Information
Published : 2022-05-08 06:15
Updated : 2024-11-21 04:03
NVD link : CVE-2018-25033
Mitre link : CVE-2018-25033
CVE.ORG link : CVE-2018-25033
JSON object : View
Products Affected
debian
- debian_linux
admesh_project
- admesh
CWE
CWE-125
Out-of-bounds Read