First published: Thu Sep 16 2021(Updated: )
fig2dev 3.2.7b contains a global buffer overflow in the get_line function in read.c.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
fig2dev | =3.2.7-b | |
Debian GNU/Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-21534 is a vulnerability in fig2dev 3.2.7b that allows for a global buffer overflow in the get_line function in read.c.
The severity of CVE-2020-21534 is medium with a CVSS score of 5.5.
CVE-2020-21534 affects fig2dev 3.2.7b and Debian Linux 9.0.
Yes, a fix is available. It is recommended to update fig2dev to a version that addresses the vulnerability.
More information about CVE-2020-21534 can be found at the provided references: https://lists.debian.org/debian-lts-announce/2021/10/msg00002.html and https://sourceforge.net/p/mcj/tickets/58/