An improper array index validation vulnerability exists in the stl_fix_normal_directions functionality of ADMesh Master Commit 767a105 and v0.98.4. A specially-crafted stl file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability. https://talosintelligence.com/vulnerability_reports/TALOS-2022-1594 https://github.com/admesh/admesh/commit/5fab257268a0ee6f832c18d72af89810a29fbd5f
Created admesh tracking bugs for this issue: Affects: epel-7 [bug 2184170] Affects: fedora-all [bug 2184169]
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.