First published: Tue Aug 24 2021(Updated: )
In Plib through 1.85, there is an integer overflow vulnerability that could result in arbitrary code execution. The vulnerability is found in ssgLoadTGA() function in src/ssg/ssgLoadTGA.cxx file.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Plib Project Plib | <=1.8.5 | |
Debian Debian Linux | =9.0 | |
Fedoraproject Extra Packages For Enterprise Linux | =7.0 | |
Fedoraproject Fedora | =34 | |
Fedoraproject Fedora | =35 | |
Fedoraproject Fedora | =36 | |
Fedoraproject Fedora | =37 | |
ubuntu/plib | <1.8.5-8ubuntu0.18.04.1~ | 1.8.5-8ubuntu0.18.04.1~ |
ubuntu/plib | <1.8.5-8ubuntu0.20.04.1 | 1.8.5-8ubuntu0.20.04.1 |
ubuntu/plib | <1.8.5-7ubuntu0.1~ | 1.8.5-7ubuntu0.1~ |
debian/plib | 1.8.5-8+deb10u1 1.8.5-8+deb11u1 1.8.5-14 | |
<=1.8.5 | ||
=9.0 | ||
=7.0 | ||
=34 | ||
=35 | ||
=36 | ||
=37 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-38714.
The severity of CVE-2021-38714 is not specified in the provided information.
CVE-2021-38714 occurs due to an integer overflow vulnerability in the ssgLoadTGA() function in the src/ssg/ssgLoadTGA.cxx file of Plib.
Versions 1.8.5-8ubuntu0.18.04.1~, 1.8.5-8ubuntu0.20.04.1, 1.8.5-7ubuntu0.1~, 1.8.5-8+deb10u1, 1.8.5-8+deb11u1, and 1.8.5-14 of Plib are affected by CVE-2021-38714.
To fix CVE-2021-38714, update Plib to versions 1.8.5-8ubuntu0.18.04.1~ (for Ubuntu 18.04), 1.8.5-8ubuntu0.20.04.1 (for Ubuntu 20.04), 1.8.5-7ubuntu0.1~ (for Ubuntu Xenial), 1.8.5-8+deb10u1 or 1.8.5-8+deb11u1 (for Debian), or 1.8.5-14 (for Debian).