First published: Fri Dec 20 2019(Updated: )
Lout 3.40 has a heap-based buffer overflow in the srcnext() function in z02.c.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Lout | =3.40 | |
openSUSE Backports | =15.0-sp1 | |
openSUSE Backports | =15.0-sp2 | |
Fedora | =31 | |
Fedora | =32 | |
Fedora | =33 | |
openSUSE | =15.1 | |
openSUSE | =15.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-19918 is classified as a high severity vulnerability due to the potential for a heap-based buffer overflow.
To fix CVE-2019-19918, you should update Lout to the latest version or apply the applicable patches provided by your Linux distribution.
CVE-2019-19918 affects Lout version 3.40 and certain versions in the openSUSE and Fedora distributions.
If exploited, CVE-2019-19918 could allow an attacker to execute arbitrary code, potentially leading to full system compromise.
As of the latest information, there are no confirmed active exploits of CVE-2019-19918 reported in the wild.