Debian Admesh vulnerabilities
3 known vulnerabilities affecting debian/admesh.
Total CVEs
3
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH1MEDIUM2
Vulnerabilities
Page 1 of 1
CVE-2026-2653MEDIUMCVSS 4.82026
CVE-2026-2653 [MEDIUM] CVE-2026-2653: admesh - A security flaw has been discovered in admesh up to 0.98.5. This issue affects t...
A security flaw has been discovered in admesh up to 0.98.5. This issue affects the function stl_check_normal_vector of the file src/normals.c. Performing a manipulation results in heap-based buffer overflow. The attack must be initiated from a local position. The exploit has been released to the public and may be used for attacks. It looks like this product is not re
debian
CVE-2022-38072MEDIUMCVSS 6.5fixed in admesh 0.98.5-1 (forky)2022
CVE-2022-38072 [MEDIUM] CVE-2022-38072: admesh - An improper array index validation vulnerability exists in the stl_fix_normal_di...
An improper array index validation vulnerability exists in the stl_fix_normal_directions functionality of ADMesh Master Commit 767a105 and v0.98.4. A specially-crafted stl file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.
Scope: local
bookworm: open
bullseye: open
forky: resolved (fixed in 0.98.5-1)
sid
debian
CVE-2018-25033HIGHCVSS 8.1fixed in admesh 0.98.4-2 (bookworm)2018
CVE-2018-25033 [HIGH] CVE-2018-25033: admesh - ADMesh through 0.98.4 has a heap-based buffer over-read in stl_update_connects_r...
ADMesh through 0.98.4 has a heap-based buffer over-read in stl_update_connects_remove_1 (called from stl_remove_degenerate) in connect.c in libadmesh.a.
Scope: local
bookworm: resolved (fixed in 0.98.4-2)
bullseye: open
forky: resolved (fixed in 0.98.4-2)
sid: resolved (fixed in 0.98.4-2)
trixie: resolved (fixed in 0.98.4-2)
debian