Описание
In xfig diagramming tool, a stack-overflow while running fig2dev allows memory corruption via local input manipulation via read_objects function.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | |
| esm-apps/bionic | not-affected | |
| esm-apps/focal | not-affected | |
| esm-apps/jammy | not-affected | |
| esm-apps/noble | not-affected | |
| focal | not-affected | |
| jammy | not-affected | |
| noble | not-affected | |
| oracular | not-affected | |
| plucky | not-affected |
Показывать по
EPSS
4.7 Medium
CVSS3
Связанные уязвимости
In xfig diagramming tool, a stack-overflow while running fig2dev allows memory corruption via local input manipulation via read_objects function.
In xfig diagramming tool, a stack-overflow while running fig2dev allows memory corruption via local input manipulation via read_objects function.
In xfig diagramming tool, a stack-overflow while running fig2dev allow ...
Stack-overflow in fig2dev in version 3.2.9a allows an attacker possible code execution via local input manipulation via read_objects function.
Уязвимость функции read_objects() компонента read.c утилиты для преобразования файлов с расширением .fig Fig2dev, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность
EPSS
4.7 Medium
CVSS3