Security
Headlines
HeadlinesLatestCVEs

Headline

Gentoo Linux Security Advisory 202208-13

Gentoo Linux Security Advisory 202208-13 - A vulnerability in libass could result in denial of service. Versions less than 0.15.1 are affected.

Packet Storm
#vulnerability#web#mac#linux#dos

Gentoo Linux Security Advisory GLSA 202208-13


                                       https://security.gentoo.org/  

Severity: Low
Title: libass: Denial of service
Date: August 10, 2022
Bugs: #803119
ID: 202208-13


Synopsis

A vulnerability in libass could result in denial of service.

Background

libass is a portable subtitle renderer for the ASS/SSA (Advanced
Substation Alpha/Substation Alpha) subtitle format.

Affected packages

-------------------------------------------------------------------  
 Package              /     Vulnerable     /            Unaffected  
-------------------------------------------------------------------  

1 media-libs/libass < 0.15.1 >= 0.15.1

Description

A one-byte buffer overwrite in ASS font decoding could trigger an
assertion failure resulting in denial of service.

Impact

An attacker with control over the ASS track input to libass via an application using it could trigger a denial of service.

Workaround

There is no known workaround at this time.

Resolution

All libass users should upgrade to the latest version:

emerge --sync

emerge --ask --oneshot --verbose “>=media-libs/libass-0.15.1”

References

[ 1 ] CVE-2020-36430
https://nvd.nist.gov/vuln/detail/CVE-2020-36430

Availability

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

https://security.gentoo.org/glsa/202208-13

Concerns?

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users’ machines is of utmost
importance to us. Any security concerns should be addressed to
[email protected] or alternatively, you may file a bug at
https://bugs.gentoo.org.

License

Copyright 2022 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

https://creativecommons.org/licenses/by-sa/2.5

Related news

CVE-2020-36430: decode_font: fix subtraction broken by change to unsigned type · libass/libass@0171374

libass 0.15.x before 0.15.1 has a heap-based buffer overflow in decode_chars (called from decode_font and process_text) because the wrong integer data type is used for subtraction.

Packet Storm: Latest News

Acronis Cyber Protect/Backup Remote Code Execution