A segmentation fault (SEGV) was detected in the...
Moderate severity
Unreviewed
Published
Oct 24, 2024
to the GitHub Advisory Database
•
Updated Oct 29, 2024
Description
Published by the National Vulnerability Database
Oct 24, 2024
Published to the GitHub Advisory Database
Oct 24, 2024
Last updated
Oct 29, 2024
A segmentation fault (SEGV) was detected in the SortByPTypeProcess::Execute function in the Assimp library during fuzz testing with AddressSanitizer. The crash occurred due to a read access to an invalid memory address (0x1000c9714971).
References