CVE-2020-26682 — Integer Overflow or Wraparound in Libass
Severity
8.8HIGHNVD
EPSS
0.4%
top 36.50%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedOct 16
Latest updateMay 24
Description
In libass 0.14.0, the `ass_outline_construct`'s call to `outline_stroke` causes a signed integer overflow.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9
Affected Packages3 packages
🔴Vulnerability Details
2📋Vendor Advisories
1Debian▶
CVE-2020-26682: libass - In libass 0.14.0, the `ass_outline_construct`'s call to `outline_stroke` causes ...↗2020
💬Community
3Bugzilla▶
CVE-2020-26682 libass: in`ass_outline_construct`'s call to `outline_stroke` a signed integer overflow could result in undefined behaviour↗2020-10-01
Bugzilla▶
CVE-2020-26682 libass: in`ass_outline_construct`'s call to `outline_stroke` a signed integer overflow could result in undefined behaviour [epel-all]↗2020-10-01
Bugzilla▶
CVE-2020-26682 libass: in`ass_outline_construct`'s call to `outline_stroke` a signed integer overflow could result in undefined behaviour [fedora-all]↗2020-10-01