Source: admesh Version: 0.98.5-1 Severity: important Tags: security upstream Forwarded: https://github.com/admesh/admesh/issues/65 X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>
Hi, The following vulnerability was published for admesh. CVE-2026-2653[0]: | A security flaw has been discovered in admesh up to 0.98.5. This | issue affects the function stl_check_normal_vector of the file | src/normals.c. Performing a manipulation results in heap-based | buffer overflow. The attack must be initiated from a local position. | The exploit has been released to the public and may be used for | attacks. It looks like this product is not really maintained | anymore. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2026-2653 https://www.cve.org/CVERecord?id=CVE-2026-2653 [1] https://github.com/admesh/admesh/issues/65 Please adjust the affected versions in the BTS as needed. Regards, Salvatore

