{"id":"MGASA-2021-0496","summary":"Updated libcaca packages fix security vulnerability","details":"A flaw was found in libcaca. A heap buffer overflow in export.c in function\nexport_tga might lead to memory corruption and other potential consequences.\n(CVE-2021-30498)\n\nA flaw was found in libcaca. A buffer overflow of export.c in function\nexport_troff might lead to memory corruption and other potential\nconsequences. (CVE-2021-30499)\n","modified":"2026-04-16T00:11:16.358035852Z","published":"2021-10-29T19:32:22Z","upstream":["CVE-2021-30498","CVE-2021-30499"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2021-0496.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=29575"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5119-1"}],"affected":[{"package":{"name":"libcaca","ecosystem":"Mageia:8","purl":"pkg:rpm/mageia/libcaca?arch=source&distro=mageia-8"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.99-0.beta19.5.2.mga8"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2021-0496.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}