An issue was discovered in GNU LibreDWG before 0.93. Crafted input will lead to an attempted excessive memory allocation in decode_3dsolid in dwg.spec.
The product allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.
Link | Tags |
---|---|
https://github.com/LibreDWG/libredwg/compare/0.9.2...0.9.3 | release notes third party advisory patch |
https://github.com/LibreDWG/libredwg/issues/176 | issue tracking exploit third party advisory |
https://github.com/LibreDWG/libredwg/issues/176#issuecomment-568643060 | issue tracking exploit third party advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00033.html | mailing list third party advisory vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00045.html | mailing list third party advisory vendor advisory |