libass 0.15.x before 0.15.1 has a heap-based buffer overflow in decode_chars (called from decode_font and process_text) because the wrong integer data type is used for subtraction.
References
Configurations
History
21 Nov 2024, 05:29
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26674 - Issue Tracking, Patch, Third Party Advisory | |
References | () https://github.com/google/oss-fuzz-vulns/blob/main/vulns/libass/OSV-2020-2099.yaml - Third Party Advisory | |
References | () https://github.com/libass/libass/commit/017137471d0043e0321e377ed8da48e45a3ec632 - Patch, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6JUXFQUJ32GWG5E46A63DFDCYJAF3VU6/ - | |
References | () https://security.gentoo.org/glsa/202208-13 - Third Party Advisory |
07 Nov 2023, 03:22
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2021-07-20 07:15
Updated : 2024-11-21 05:29
NVD link : CVE-2020-36430
Mitre link : CVE-2020-36430
CVE.ORG link : CVE-2020-36430
JSON object : View
Products Affected
fedoraproject
- fedora
libass_project
- libass
CWE
CWE-787
Out-of-bounds Write