First published: Wed Jan 08 2020(Updated: )
GNU LibreDWG 0.9.3.2564 has an attempted excessive memory allocation in read_sections_map in decode_r2007.c.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU LibreDWG | =0.9.3.2564 | |
Opensuse Backports | =sle-15-sp1 | |
openSUSE Leap | =15.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-6610 is a vulnerability in GNU LibreDWG 0.9.3.2564 that involves an attempted excessive memory allocation in the read_sections_map function.
The severity of CVE-2020-6610 is medium with a CVSS score of 6.5.
GNU LibreDWG version 0.9.3.2564, openSUSE Leap 15.1, and openSUSE Backports sle-15-sp1 are affected by CVE-2020-6610.
To fix CVE-2020-6610, it is recommended to update to a patched version of GNU LibreDWG as provided by the vendor.
You can find more information about CVE-2020-6610 in the following references: [1] [2] [3].