Headline
Gentoo Linux Security Advisory 202208-13
Gentoo Linux Security Advisory 202208-13 - A vulnerability in libass could result in denial of service. Versions less than 0.15.1 are affected.
Gentoo Linux Security Advisory GLSA 202208-13
https://security.gentoo.org/
Severity: Low
Title: libass: Denial of service
Date: August 10, 2022
Bugs: #803119
ID: 202208-13
Synopsis
A vulnerability in libass could result in denial of service.
Background
libass is a portable subtitle renderer for the ASS/SSA (Advanced
Substation Alpha/Substation Alpha) subtitle format.
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 media-libs/libass < 0.15.1 >= 0.15.1
Description
A one-byte buffer overwrite in ASS font decoding could trigger an
assertion failure resulting in denial of service.
Impact
An attacker with control over the ASS track input to libass via an application using it could trigger a denial of service.
Workaround
There is no known workaround at this time.
Resolution
All libass users should upgrade to the latest version:
emerge --sync
emerge --ask --oneshot --verbose “>=media-libs/libass-0.15.1”
References
[ 1 ] CVE-2020-36430
https://nvd.nist.gov/vuln/detail/CVE-2020-36430
Availability
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/202208-13
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users’ machines is of utmost
importance to us. Any security concerns should be addressed to
[email protected] or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
Copyright 2022 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5
Related news
libass 0.15.x before 0.15.1 has a heap-based buffer overflow in decode_chars (called from decode_font and process_text) because the wrong integer data type is used for subtraction.