EPSS
Percentile
75.8%
libass.so is vulnerable to arbitrary code execution. An integer overflow occurs during a call to outline_stroke that is made by ass_outline_construct, potentially allowing an attacker to execute arbitrary code on the host OS.
outline_stroke
ass_outline_construct
www.openwall.com/lists/oss-security/2020/11/19/7
github.com/libass/libass/commit/676f9dc5b52ef406c5527bdadbcb947f11392929
github.com/libass/libass/issues/431
github.com/libass/libass/pull/432
security.gentoo.org/glsa/202012-12