Debian Admesh vulnerabilities

3 known vulnerabilities affecting debian/admesh.

Total CVEs
3
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH1MEDIUM2

Vulnerabilities

Page 1 of 1
CVE-2026-2653MEDIUMCVSS 4.82026
CVE-2026-2653 [MEDIUM] CVE-2026-2653: admesh - A security flaw has been discovered in admesh up to 0.98.5. This issue affects t... A security flaw has been discovered in admesh up to 0.98.5. This issue affects the function stl_check_normal_vector of the file src/normals.c. Performing a manipulation results in heap-based buffer overflow. The attack must be initiated from a local position. The exploit has been released to the public and may be used for attacks. It looks like this product is not re
debian
CVE-2022-38072MEDIUMCVSS 6.5fixed in admesh 0.98.5-1 (forky)2022
CVE-2022-38072 [MEDIUM] CVE-2022-38072: admesh - An improper array index validation vulnerability exists in the stl_fix_normal_di... An improper array index validation vulnerability exists in the stl_fix_normal_directions functionality of ADMesh Master Commit 767a105 and v0.98.4. A specially-crafted stl file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability. Scope: local bookworm: open bullseye: open forky: resolved (fixed in 0.98.5-1) sid
debian
CVE-2018-25033HIGHCVSS 8.1fixed in admesh 0.98.4-2 (bookworm)2018
CVE-2018-25033 [HIGH] CVE-2018-25033: admesh - ADMesh through 0.98.4 has a heap-based buffer over-read in stl_update_connects_r... ADMesh through 0.98.4 has a heap-based buffer over-read in stl_update_connects_remove_1 (called from stl_remove_degenerate) in connect.c in libadmesh.a. Scope: local bookworm: resolved (fixed in 0.98.4-2) bullseye: open forky: resolved (fixed in 0.98.4-2) sid: resolved (fixed in 0.98.4-2) trixie: resolved (fixed in 0.98.4-2)
debian