First published: Wed Apr 23 2025(Updated: )
Rejected reason: Red Hat Product Security has come to the conclusion that this CVE is not needed.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
fig2dev |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-46399 is classified as a high severity vulnerability due to its impact on system availability.
To fix CVE-2025-46399, update fig2dev to the latest version where the vulnerability has been patched.
CVE-2025-46399 can be exploited through local input manipulation, specifically via the genge_itp_spline function.
CVE-2025-46399 affects users of fig2dev version 3.2.9a.
The potential consequences of CVE-2025-46399 include a segmentation fault that may lead to an application crash and loss of availability.