A segmentation fault (SEGV) was detected in the SortByPTypeProcess::Execute function in the Assimp library during fuzz testing with AddressSanitizer. The crash occurred due to a read access to an invalid memory address (0x1000c9714971).
| Software | From | Fixed in |
|---|---|---|
| assimp / assimp | 5.4.3 | 5.4.3.x |