A code execution vulnerability exists in the Nef polygon-parsing functionality of CGAL libcgal CGAL-5.1.1 in NefS2/SNCioparser.h SNCioparser::readsface() storesmboundaryitem() Sloopof OOB read. A specially crafted malformed file can lead to an out-of-bounds read and type confusion, which could lead to code execution. An attacker can provide malicious input to trigger this vulnerability.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "5.2-3", "binary_name": "libcgal-demo" }, { "binary_version": "5.2-3", "binary_name": "libcgal-dev" }, { "binary_version": "5.2-3", "binary_name": "libcgal-ipelets" }, { "binary_version": "5.2-3", "binary_name": "libcgal-ipelets-dbgsym" }, { "binary_version": "5.2-3", "binary_name": "libcgal-qt5-dev" } ] }