{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2021-30498","assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","assignerShortName":"redhat","dateUpdated":"2025-11-03T19:25:45.270Z","dateReserved":"2021-04-12T00:00:00.000Z","datePublished":"2021-05-26T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat","dateUpdated":"2024-04-07T10:05:53.875Z"},"descriptions":[{"lang":"en","value":"A flaw was found in libcaca. A heap buffer overflow in export.c in function export_tga might lead to memory corruption and other potential consequences."}],"affected":[{"vendor":"n/a","product":"libcaca","versions":[{"version":"master","status":"affected"}]}],"references":[{"url":"https://github.com/cacalabs/libcaca/issues/53"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1948675"},{"name":"FEDORA-2022-fc6b53e7a2","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6WFGYICNTMNDNMDDUV4G2RYFB5HNJCOV/"},{"name":"FEDORA-2022-e3b9986722","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PC7EGOEQ5C4OD66ZUJJIIYEXBTZOCMZX/"},{"name":"FEDORA-2022-3d291845d8","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZSBCRN6EGQJUVOSD4OEEQ6XORHEM2CUL/"},{"url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00004.html"}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-787","cweId":"CWE-787"}]}]},"adp":[{"title":"CVE Program Container","references":[{"url":"https://github.com/cacalabs/libcaca/issues/53","tags":["x_transferred"]},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1948675","tags":["x_transferred"]},{"name":"FEDORA-2022-fc6b53e7a2","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6WFGYICNTMNDNMDDUV4G2RYFB5HNJCOV/"},{"name":"FEDORA-2022-e3b9986722","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PC7EGOEQ5C4OD66ZUJJIIYEXBTZOCMZX/"},{"name":"FEDORA-2022-3d291845d8","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZSBCRN6EGQJUVOSD4OEEQ6XORHEM2CUL/"},{"url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00004.html","tags":["x_transferred"]},{"url":"https://lists.debian.org/debian-lts-announce/2025/07/msg00019.html"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-03T19:25:45.270Z"}}]}}