CVE-2022-38072
https://notcve.org/view.php?id=CVE-2022-38072
An improper array index validation vulnerability exists in the stl_fix_normal_directions functionality of ADMesh Master Commit 767a105 and v0.98.4. A specially-crafted stl file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability. • https://github.com/admesh/admesh/commit/5fab257268a0ee6f832c18d72af89810a29fbd5f https://talosintelligence.com/vulnerability_reports/TALOS-2022-1594 • CWE-118: Incorrect Access of Indexable Resource ('Range Error') CWE-129: Improper Validation of Array Index •
CVE-2018-25033
https://notcve.org/view.php?id=CVE-2018-25033
ADMesh through 0.98.4 has a heap-based buffer over-read in stl_update_connects_remove_1 (called from stl_remove_degenerate) in connect.c in libadmesh.a. ADMesh versiones hasta 0.98.4, presenta una lectura excesiva de búfer en la región heap de la memoria en stl_update_connects_remove_1 (llamado desde stl_remove_degenerate) en el archivo connect.c en libadmesh.a • https://github.com/admesh/admesh/issues/28 https://lists.debian.org/debian-lts-announce/2022/05/msg00029.html • CWE-125: Out-of-bounds Read •