{"id":"CVE-2018-20545","details":"There is an illegal WRITE memory access at common-image.c (function load_image) in libcaca 0.99.beta19 for 4bpp data.","modified":"2026-04-16T04:33:08.530398681Z","published":"2018-12-28T16:29:04.863Z","related":["SUSE-SU-2019:0770-1","SUSE-SU-2019:2745-1","SUSE-SU-2019:2745-2","openSUSE-SU-2019:1144-1","openSUSE-SU-2024:10927-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6WFGYICNTMNDNMDDUV4G2RYFB5HNJCOV/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PC7EGOEQ5C4OD66ZUJJIIYEXBTZOCMZX/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZSBCRN6EGQJUVOSD4OEEQ6XORHEM2CUL/"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00033.html"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3860-1/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3860-2/"},{"type":"FIX","url":"https://github.com/cacalabs/libcaca/commit/3e52dabe3e64dc50f4422effe364a1457a8a8592"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1652621"},{"type":"EVIDENCE","url":"https://github.com/cacalabs/libcaca/issues/37"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/cacalabs/libcaca","events":[{"introduced":"0"},{"last_affected":"caae67dce5d72ceceac79468bed47b58ea8e4a29"},{"fixed":"3e52dabe3e64dc50f4422effe364a1457a8a8592"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"0.99-beta19"}]}}],"versions":["v0.99.beta14","v0.99.beta15","v0.99.beta16","v0.99.beta17","v0.99.beta18","v0.99.beta19"],"database_specific":{"vanir_signatures":[{"id":"CVE-2018-20545-b9475fe9","source":"https://github.com/cacalabs/libcaca/commit/3e52dabe3e64dc50f4422effe364a1457a8a8592","signature_version":"v1","deprecated":false,"target":{"file":"src/common-image.h"},"signature_type":"Line","digest":{"line_hashes":["65049173859070475447983161954999718188","123100676000090882460975560846455828998","313372699964159779878161596005895505955","231352982855971752001088598579897489160"],"threshold":0.9}}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-20545.json","vanir_signatures_modified":"2026-04-11T11:39:48Z","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"12.04"}]},{"events":[{"introduced":"0"},{"last_affected":"14.04"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"18.04"}]},{"events":[{"introduced":"0"},{"last_affected":"18.10"}]},{"events":[{"introduced":"0"},{"last_affected":"34"}]},{"events":[{"introduced":"0"},{"last_affected":"35"}]},{"events":[{"introduced":"0"},{"last_affected":"36"}]},{"events":[{"introduced":"0"},{"last_affected":"15.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}