Your submission was sent successfully! Close

CVE-2020-36430

Published: 20 July 2021

libass 0.15.x before 0.15.1 has a heap-based buffer overflow in decode_chars (called from decode_font and process_text) because the wrong integer data type is used for subtraction.

Priority

Medium

CVSS 3 base score: 7.8

Status

Package Release Status
libass
Launchpad, Ubuntu, Debian
bionic Not vulnerable
(code not present)
focal Not vulnerable
(code not present)
groovy Ignored
(reached end-of-life)
hirsute Ignored
(reached end-of-life)
impish Not vulnerable
(1:0.15.0-2)
jammy Not vulnerable
(1:0.15.2-1)
trusty Not vulnerable
(code not present)
upstream
Released (0.15.1, 1:0.15.0-2)
xenial Ignored
(out of standard support, xenial was not-affected)
Patches:
upstream: https://github.com/libass/libass/commit/017137471d0043e0321e377ed8da48e45a3ec632