[Bug 1186227] New: VUL-1: CVE-2020-23861: libredwg: heap-based buffer overflow vulnerability exists via the read_system_page function at libredwg-0.10.1/src/decode_r2007.c:666:5, which causes a denial of service by submitting a dwg file.
http://bugzilla.opensuse.org/show_bug.cgi?id=1186227 Bug ID: 1186227 Summary: VUL-1: CVE-2020-23861: libredwg: heap-based buffer overflow vulnerability exists via the read_system_page function at libredwg-0.10.1/src/decode_r2007.c:666:5, which causes a denial of service by submitting a dwg file. Classification: openSUSE Product: openSUSE Distribution Version: Leap 15.2 Hardware: Other URL: https://smash.suse.de/issue/284561/ OS: Other Status: NEW Severity: Minor Priority: P5 - None Component: Security Assignee: security-team@suse.de Reporter: rfrohl@suse.com QA Contact: security-team@suse.de Found By: Security Response Team Blocker: --- CVE-2020-23861 A heap-based buffer overflow vulnerability exists in LibreDWG 0.10.1 via the read_system_page function at libredwg-0.10.1/src/decode_r2007.c:666:5, which causes a denial of service by submitting a dwg file. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-23861 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-23861 https://github.com/LibreDWG/libredwg/issues/248 -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.opensuse.org/show_bug.cgi?id=1186227 http://bugzilla.opensuse.org/show_bug.cgi?id=1186227#c1 Robert Frohl <rfrohl@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |RESOLVED Resolution|--- |INVALID --- Comment #1 from Robert Frohl <rfrohl@suse.com> --- already fixed in Factory and Leap, closing -- You are receiving this mail because: You are on the CC list for the bug.
participants (1)
-
bugzilla_noreply@suse.com