发布时间: 2024年11月8日
修改时间: 2024年11月8日
A segmentation fault (SEGV) was detected in the Assimp::SplitLargeMeshesProcess_Triangle::UpdateNode function within the Assimp library during fuzz testing using AddressSanitizer. The crash occurs due to a read access violation at address 0x000000000460, which points to the zero page, indicating a null or invalid pointer dereference.
NVD | openEuler | |
---|---|---|
Confidentiality | None | |
Attack Vector | Local | |
CVSS评分 | N/A | 5.5 |
Attack Complexity | Low | |
Privileges Required | Low | |
Scope | Unchanged | |
Integrity | None | |
User Interaction | None | |
Availability | High |
公告名 | 概要 | 发布时间 |
---|---|---|
KylinSec-SA-2024-4195 | assimp security update | 2025年2月8日 |
产品 | 包 | 状态 |
---|---|---|
KY3.4-5A | assimp | Fixed |
KY3.5.2 | assimp | Fixed |
KY3.5.3 | assimp | Fixed |
V6 | assimp | Fixed |