First published: Thu Mar 04 2021(Updated: )
A code execution vulnerability exists in the Nef polygon-parsing functionality of CGAL libcgal CGAL-5.1.1. An oob read vulnerability exists in Nef_2/PM_io_parser.h PM_io_parser::read_vertex() Face_of[] OOB read. An attacker can provide malicious input to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cgal Computational Geometry Algorithms Library | =5.1.1 | |
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this code execution vulnerability is CVE-2020-28601.
CVE-2020-28601 has a severity level of critical (9.8).
CGAL libcgal CGAL-5.1.1, Fedoraproject Fedora 33 and 34, Debian Debian Linux 9.0 and 10.0 are affected by CVE-2020-28601.
CVE-2020-28601 is associated with CWE-129 and CWE-125.
To fix the code execution vulnerability CVE-2020-28601, it is recommended to update to the latest version of the affected software.