CVE-2020-26682Integer Overflow or Wraparound in Libass

Severity
8.8HIGHNVD
EPSS
0.4%
top 36.50%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 16
Latest updateMay 24

Description

In libass 0.14.0, the `ass_outline_construct`'s call to `outline_stroke` causes a signed integer overflow.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages3 packages

debiandebian/libass< libass 1:0.15.0-1 (bookworm)
Debianlibass_project/libass< 1:0.15.0-1+3

🔴Vulnerability Details

2
GHSA
GHSA-87rf-m79q-qqqf: In libass 02022-05-24
OSV
CVE-2020-26682: In libass 02020-10-16

📋Vendor Advisories

1
Debian
CVE-2020-26682: libass - In libass 0.14.0, the `ass_outline_construct`'s call to `outline_stroke` causes ...2020

💬Community

3
Bugzilla
CVE-2020-26682 libass: in`ass_outline_construct`'s call to `outline_stroke` a signed integer overflow could result in undefined behaviour2020-10-01
Bugzilla
CVE-2020-26682 libass: in`ass_outline_construct`'s call to `outline_stroke` a signed integer overflow could result in undefined behaviour [epel-all]2020-10-01
Bugzilla
CVE-2020-26682 libass: in`ass_outline_construct`'s call to `outline_stroke` a signed integer overflow could result in undefined behaviour [fedora-all]2020-10-01