First published: Mon Apr 12 2021(Updated: )
A flaw was found in libcaca. A heap buffer overflow in export.c in function export_tga might lead to memory corruption and other potential consequences.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
libcaca project libcaca | =0.99-beta14 | |
libcaca project libcaca | =0.99-beta15 | |
libcaca project libcaca | =0.99-beta16 | |
libcaca project libcaca | =0.99-beta17 | |
libcaca project libcaca | =0.99-beta18 | |
libcaca project libcaca | =0.99-beta19 | |
Fedora | =34 | |
Fedora | =35 | |
Fedora | =36 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-30498 has been classified as having a high severity due to the potential for memory corruption.
To fix CVE-2021-30498, update libcaca to version 0.99-beta20 or later.
CVE-2021-30498 affects libcaca versions 0.99-beta14 through 0.99-beta19.
The impact of CVE-2021-30498 can include memory corruption and potential application crashes.
Yes, CVE-2021-30498 affects Fedora systems running vulnerable versions of libcaca, specifically Fedora 34, 35, and 36.