Gentoo: GLSA-202402-19: libcaca: Arbitary Code Execution
Summary
A vulnerability has been discovered in libcaca. Please review the CVE
identifier referenced below for details.
Resolution
All libcaca users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=media-libs/libcaca-0.99_beta19-r4"
References
[ 1 ] CVE-2021-3410
https://nvd.nist.gov/vuln/detail/CVE-2021-3410
Availability
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/202402-19
Concerns
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
Background
libcaca is a library that creates colored ASCII-art graphics.
Affected Packages
Package Vulnerable Unaffected
------------------ ---------------- -----------------
media-libs/libcaca < 0.99_beta19-r4 >= 0.99_beta19-r4
Impact
A buffer overflow issue in caca_resize function in libcaca/caca/canvas.c
may lead to local execution of arbitrary code in the user context.
Workaround
There is no known workaround at this time.