First published: Wed Jan 08 2020(Updated: )
GNU LibreDWG 0.9.3.2564 has a heap-based buffer over-read in bit_search_sentinel in bits.c.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU LibreDWG | =0.9.3.2564 | |
openSUSE Backports | =15.0-sp1 | |
openSUSE | =15.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-6613 has been classified as a high severity vulnerability due to its heap-based buffer over-read which can potentially lead to information disclosure.
To fix CVE-2020-6613, update GNU LibreDWG to version 0.9.3.2565 or later, which addresses the buffer over-read issue.
CVE-2020-6613 affects GNU LibreDWG version 0.9.3.2564, openSUSE Backports version 15.0-sp1, and openSUSE Leap version 15.1.
Yes, CVE-2020-6613 is publicly known and was announced in January 2020 as a security vulnerability in the LibreDWG library.
CVE-2020-6613 is a heap-based buffer over-read vulnerability found in the bit_search_sentinel function in bits.c.