An Out of Bounds flaw was found fig2dev version 3.2.8a. A flawed bounds check in read_objects() could allow an attacker to provide a crafted malicious input causing the application to either crash or in some cases cause memory corruption. The highest threat from this vulnerability is to integrity as well as system availability.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2778-1 | fig2dev security update |
Ubuntu USN |
USN-5864-1 | Fig2dev vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-03T17:01:08.146Z
Reserved: 2021-05-20T00:00:00
Link: CVE-2021-3561
No data.
Status : Modified
Published: 2021-05-26T22:15:08.317
Modified: 2024-11-21T06:21:51.130
Link: CVE-2021-3561
OpenCVE Enrichment
No data.
Debian DLA
Ubuntu USN