In xfig diagramming tool, a stack-overflow while running fig2dev allows memory corruption via local input manipulation via read_objects function.
References
| Link | Resource |
|---|---|
| https://access.redhat.com/security/cve/CVE-2025-46398 | Vendor Advisory |
| https://bugzilla.redhat.com/show_bug.cgi?id=2362055 | Vendor Advisory |
| https://sourceforge.net/p/mcj/tickets/191/ | Exploit Issue Tracking |
| https://lists.debian.org/debian-lts-announce/2025/04/msg00043.html |
Configurations
History
03 Nov 2025, 20:19
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Information
Published : 2025-04-23 21:15
Updated : 2025-11-03 20:19
NVD link : CVE-2025-46398
Mitre link : CVE-2025-46398
CVE.ORG link : CVE-2025-46398
JSON object : View
Products Affected
redhat
- enterprise_linux
fig2dev_project
- fig2dev
CWE
CWE-121
Stack-based Buffer Overflow
