A code execution vulnerability exists in the Nef polygon-parsing functionality of CGAL libcgal CGAL-5.1.1. An oob read vulnerability exists in NefS2/SNCioparser.h SNCioparser::readsloop() slh->twin() An attacker can provide malicious input to trigger this vulnerability.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "5.2-3", "binary_name": "libcgal-demo" }, { "binary_version": "5.2-3", "binary_name": "libcgal-dev" }, { "binary_version": "5.2-3", "binary_name": "libcgal-ipelets" }, { "binary_version": "5.2-3", "binary_name": "libcgal-ipelets-dbgsym" }, { "binary_version": "5.2-3", "binary_name": "libcgal-qt5-dev" } ] }