Multiple stack-based buffer overflow vulnerabilities exist in the readOFF functionality of libigl v2.5.0. A specially crafted .off file can lead to stack-based buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.This vulnerability concerns the parsing of comments within the faces section of an `.off` file processed via the `readOFF` function. https://talosintelligence.com/vulnerability_reports/TALOS-2024-1929
Created meshlab tracking bugs for this issue: Affects: fedora-all [bug 2283909]