A code execution vulnerability exists in the Nef polygon-parsing functionality of CGAL libcgal CGAL-5.1.1 in NefS2/SNCioparser.h SNCioparser::readsface() storesmboundaryitem() Sloopof OOB read. A specially crafted malformed file can lead to an out-of-bounds read and type confusion, which could lead to code execution. An attacker can provide malicious input to trigger this vulnerability.
{ "binaries": [ { "binary_name": "libcgal-demo", "binary_version": "5.2-3" }, { "binary_name": "libcgal-dev", "binary_version": "5.2-3" }, { "binary_name": "libcgal-ipelets", "binary_version": "5.2-3" }, { "binary_name": "libcgal-ipelets-dbgsym", "binary_version": "5.2-3" }, { "binary_name": "libcgal-qt5-dev", "binary_version": "5.2-3" } ], "availability": "No subscription required", "ubuntu_priority": "medium" }