CVE-2020-28589

NameCVE-2020-28589
DescriptionAn improper array index validation vulnerability exists in the LoadObj functionality of tinyobjloader v2.0-rc1 and tinyobjloader development commit 79d4421. A specially crafted file could lead to code execution. An attacker can provide a malicious file to trigger this vulnerability.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub advisories/code/issues, web search, more)
Debian Bugs1014776

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
tinyobjloader (PTS)bullseye2.0.0~rc5+dfsg1-4vulnerable
bookworm, sid2.0.0~rc5+dfsg1-5vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
tinyobjloadersourceexperimental2.0.0~rc9+dfsg-1
tinyobjloadersource(unstable)(unfixed)1014776

Notes

[bullseye] - tinyobjloader <no-dsa> (Minor issue)
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1212
https://github.com/tinyobjloader/tinyobjloader/commit/7ba4b652ee0c5175ec8abf66199e84d88adf11f1 (v2.0.0rc9)

Search for package or bug name: Reporting problems