osv-2023-1267
Vulnerability from osv_ossfuzz
Published
2023-12-08 00:11
Modified
2026-02-12 14:11
Summary
Heap-buffer-overflow in dwg_free_object
Details

OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=64829

Crash type: Heap-buffer-overflow READ 8
Crash state:
dwg_free_object
dwg_free
llvmfuzz.c

{
  "affected": [
    {
      "ecosystem_specific": {
        "severity": "MEDIUM"
      },
      "package": {
        "ecosystem": "OSS-Fuzz",
        "name": "libredwg",
        "purl": "pkg:generic/libredwg"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "f15763dec40f67ddacbccd674338d163021f2b96"
            }
          ],
          "repo": "https://github.com/LibreDWG/libredwg",
          "type": "GIT"
        }
      ],
      "versions": [
        "0.13",
        "0.13.1",
        "0.13.2",
        "0.13.3",
        "0.13.3.7163",
        "0.13.3.7165",
        "0.13.3.7166",
        "0.13.3.7168",
        "0.13.3.7176",
        "0.13.3.7183",
        "0.13.3.7186",
        "0.13.3.7187",
        "0.13.3.7190",
        "0.13.3.7199",
        "0.13.3.7217",
        "0.13.3.7220",
        "0.13.3.7223",
        "0.13.3.7224",
        "0.13.3.7225",
        "0.13.3.7226",
        "0.13.3.7227",
        "0.13.3.7233",
        "0.13.3.7240",
        "0.13.3.7246",
        "0.13.3.7251",
        "0.13.3.7257",
        "0.13.3.7259",
        "0.13.3.7262",
        "0.13.3.7264",
        "0.13.3.7265",
        "0.13.3.7268",
        "0.13.3.7270",
        "0.13.3.7273",
        "0.13.3.7298",
        "0.13.3.7306",
        "0.13.3.7308",
        "0.13.3.7311",
        "0.13.3.7320",
        "0.13.3.7324",
        "0.13.3.7327",
        "0.13.3.7338",
        "0.13.3.7341",
        "0.13.3.7344",
        "0.13.3.7345",
        "0.13.3.7351",
        "0.13.3.7371",
        "0.13.3.7377",
        "0.13.3.7385",
        "0.13.3.7405",
        "0.13.3.7409",
        "0.13.3.7411",
        "0.13.3.7412",
        "0.13.3.7414",
        "0.13.3.7420",
        "0.13.3.7424",
        "0.13.3.7426",
        "0.13.3.7429",
        "0.13.3.7431",
        "0.13.3.7434",
        "0.13.3.7437",
        "0.13.3.7442",
        "0.13.3.7445",
        "0.13.3.7453",
        "0.13.3.7456",
        "0.13.3.7460",
        "0.13.3.7466",
        "0.13.3.7469",
        "0.13.3.7472",
        "0.13.3.7473",
        "0.13.3.7483",
        "0.13.3.7491",
        "0.13.3.7501",
        "0.13.3.7507",
        "0.13.3.7516",
        "0.13.3.7533",
        "0.13.3.7534",
        "0.13.3.7535",
        "0.13.3.7539",
        "0.13.3.7545",
        "0.13.3.7551",
        "0.13.3.7552",
        "0.13.3.7554",
        "0.13.3.7557",
        "0.13.3.7558",
        "0.13.3.7562",
        "0.13.3.7571",
        "0.13.3.7574",
        "0.13.3.7577",
        "0.13.3.7582",
        "0.13.3.7599",
        "0.13.3.7600",
        "0.13.3.7603",
        "0.13.3.7635",
        "0.13.3.7637",
        "0.13.3.7640",
        "0.13.3.7646",
        "0.13.3.7649",
        "0.13.3.7650",
        "0.13.3.7657",
        "0.13.3.7663",
        "0.13.3.7665",
        "0.13.3.7675",
        "0.13.3.7680",
        "0.13.3.7685",
        "0.13.3.7686",
        "0.13.3.7690",
        "0.13.3.7696",
        "0.13.3.7702",
        "0.13.3.7715",
        "0.13.3.7721",
        "0.13.3.7727",
        "0.13.3.7730",
        "0.13.3.7737",
        "0.13.3.7741",
        "0.13.3.7743",
        "0.13.3.7752",
        "0.13.3.7761",
        "0.13.3.7763",
        "0.13.3.7772",
        "0.13.3.7776",
        "0.13.3.7778",
        "0.13.3.7789",
        "0.13.3.7792",
        "0.13.3.7794",
        "0.13.3.7797",
        "0.13.3.7802",
        "0.13.3.7805",
        "0.13.3.7808",
        "0.13.3.7810",
        "0.13.3.7812",
        "0.13.3.7813",
        "0.13.3.7816",
        "0.13.3.7819",
        "0.13.3.7825",
        "0.13.3.7828",
        "0.13.3.7835",
        "0.13.3.7842",
        "0.13.3.7846",
        "0.13.3.7848",
        "0.13.3.7849",
        "0.13.3.7850",
        "0.13.3.7851",
        "0.13.3.7852",
        "0.13.3.7861",
        "0.13.3.7867",
        "0.13.3.7873",
        "0.13.3.7883",
        "0.13.3.7897",
        "0.13.3.7901",
        "0.13.3.7906"
      ]
    }
  ],
  "details": "OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=64829\n\n```\nCrash type: Heap-buffer-overflow READ 8\nCrash state:\ndwg_free_object\ndwg_free\nllvmfuzz.c\n```\n",
  "id": "OSV-2023-1267",
  "modified": "2026-02-12T14:11:51.775549Z",
  "published": "2023-12-08T00:11:02.971903Z",
  "references": [
    {
      "type": "REPORT",
      "url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=64829"
    }
  ],
  "schema_version": "1.6.0",
  "summary": "Heap-buffer-overflow in dwg_free_object"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…