First published: Thu Sep 16 2021(Updated: )
fig2dev 3.2.7b contains a global buffer overflow in the conv_pattern_index function in gencgm.c.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
fig2dev | =3.2.7-b | |
Debian GNU/Linux | =9.0 | |
Debian GNU/Linux | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-21531 is a vulnerability in fig2dev 3.2.7b that allows for a global buffer overflow in the conv_pattern_index function in gencgm.c.
CVE-2020-21531 has a severity rating of 5.5 (medium).
The software affected by CVE-2020-21531 includes Xfig Project Fig2dev 3.2.7-b, Debian Debian Linux 9.0, and Debian Debian Linux 10.0.
To fix CVE-2020-21531, update to a version that does not contain the vulnerability.
Yes, you can find more information about CVE-2020-21531 at the following references: [1] [2] [3].