In xfig diagramming tool, a stack-overflow while running fig2dev allows memory corruption via local input manipulation via read_objects function.
References
| Link | Resource |
|---|---|
| https://access.redhat.com/security/cve/CVE-2025-46398 | Vendor Advisory |
| https://bugzilla.redhat.com/show_bug.cgi?id=2362055 | Vendor Advisory |
| https://sourceforge.net/p/mcj/tickets/191/ | Exploit Issue Tracking |
| https://lists.debian.org/debian-lts-announce/2025/04/msg00043.html |
Configurations
History
No history.
Information
Published : 2025-04-23 21:15
Updated : 2026-01-08 04:15
NVD link : CVE-2025-46398
Mitre link : CVE-2025-46398
CVE.ORG link : CVE-2025-46398
JSON object : View
Products Affected
redhat
- enterprise_linux
fig2dev_project
- fig2dev
CWE
CWE-121
Stack-based Buffer Overflow
