Bugzilla – Bug 1182177
VUL-0: CVE-2021-26825: godot: integer overflow when loading specially crafted .TGA image files
Last modified: 2021-03-01 17:01:47 UTC
CVE-2021-26825 An integer overflow issue exists in Godot Engine up to v3.2 that can be triggered when loading specially crafted.TGA image files. The vulnerability exists in ImageLoaderTGA::load_image() function at line: const size_t buffer_size = (tga_header.image_width * tga_header.image_height) * pixel_size; The bug leads to Dynamic stack buffer overflow. Depending on the context of the application, attack vector can be local or remote, and can lead to code execution and/or system crash. Reference: https://github.com/godotengine/godot/pull/45702 Upstream patch: https://github.com/godotengine/godot/pull/45702/commits/113b5ab1c45c01b8e6d54d13ac8876d091f883a8 References: https://bugzilla.redhat.com/show_bug.cgi?id=1926936 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-26825 https://github.com/godotengine/godot/pull/45702 https://github.com/godotengine/godot/pull/45702/files http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26825
Only in Factory.
(In reply to Alexandros Toptsoglou from comment #0) Thank you for the report. > Upstream patch: > https://github.com/godotengine/godot/pull/45702/commits/ > 113b5ab1c45c01b8e6d54d13ac8876d091f883a8 With this commit as patch an update is submitted: https://build.opensuse.org/request/show/872035
Request got accepted. Closing as fixed.