An Out of Bounds flaw was found fig2dev version 3.2.8a. A flawed bounds check in read_objects() could allow an attacker to provide a crafted malicious input causing the application to either crash or in some cases cause memory corruption. The highest threat from this vulnerability is to integrity as well as system availability.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1955675 | Issue Tracking Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2021/10/msg00002.html | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C44WSY5KAQXC3Y2NMSVXXZS3M5U5U2E6/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JKMOIQX6GULVSYXLYW5JQY6KJNTWV3E4/ | Mailing List Third Party Advisory |
https://sourceforge.net/p/mcj/fig2dev/ci/6827c09d2d6491cb2ae3ac7196439ff3aa791fd9/ | Patch Third Party Advisory |
https://sourceforge.net/p/mcj/tickets/116/ | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: redhat
Published: 2021-05-26T21:27:36
Updated: 2021-10-04T11:06:40
Reserved: 2021-05-20T00:00:00
Link: CVE-2021-3561
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-05-26T22:15:08.317
Modified: 2024-01-26T18:00:17.150
Link: CVE-2021-3561
JSON object: View
Redhat Information
No data.