osv-2023-1267
Vulnerability from osv_ossfuzz
Published
2023-12-08 00:11
Modified
2026-02-12 14:11
Summary
Heap-buffer-overflow in dwg_free_object
Details
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=64829
Crash type: Heap-buffer-overflow READ 8
Crash state:
dwg_free_object
dwg_free
llvmfuzz.c
{
"affected": [
{
"ecosystem_specific": {
"severity": "MEDIUM"
},
"package": {
"ecosystem": "OSS-Fuzz",
"name": "libredwg",
"purl": "pkg:generic/libredwg"
},
"ranges": [
{
"events": [
{
"introduced": "f15763dec40f67ddacbccd674338d163021f2b96"
}
],
"repo": "https://github.com/LibreDWG/libredwg",
"type": "GIT"
}
],
"versions": [
"0.13",
"0.13.1",
"0.13.2",
"0.13.3",
"0.13.3.7163",
"0.13.3.7165",
"0.13.3.7166",
"0.13.3.7168",
"0.13.3.7176",
"0.13.3.7183",
"0.13.3.7186",
"0.13.3.7187",
"0.13.3.7190",
"0.13.3.7199",
"0.13.3.7217",
"0.13.3.7220",
"0.13.3.7223",
"0.13.3.7224",
"0.13.3.7225",
"0.13.3.7226",
"0.13.3.7227",
"0.13.3.7233",
"0.13.3.7240",
"0.13.3.7246",
"0.13.3.7251",
"0.13.3.7257",
"0.13.3.7259",
"0.13.3.7262",
"0.13.3.7264",
"0.13.3.7265",
"0.13.3.7268",
"0.13.3.7270",
"0.13.3.7273",
"0.13.3.7298",
"0.13.3.7306",
"0.13.3.7308",
"0.13.3.7311",
"0.13.3.7320",
"0.13.3.7324",
"0.13.3.7327",
"0.13.3.7338",
"0.13.3.7341",
"0.13.3.7344",
"0.13.3.7345",
"0.13.3.7351",
"0.13.3.7371",
"0.13.3.7377",
"0.13.3.7385",
"0.13.3.7405",
"0.13.3.7409",
"0.13.3.7411",
"0.13.3.7412",
"0.13.3.7414",
"0.13.3.7420",
"0.13.3.7424",
"0.13.3.7426",
"0.13.3.7429",
"0.13.3.7431",
"0.13.3.7434",
"0.13.3.7437",
"0.13.3.7442",
"0.13.3.7445",
"0.13.3.7453",
"0.13.3.7456",
"0.13.3.7460",
"0.13.3.7466",
"0.13.3.7469",
"0.13.3.7472",
"0.13.3.7473",
"0.13.3.7483",
"0.13.3.7491",
"0.13.3.7501",
"0.13.3.7507",
"0.13.3.7516",
"0.13.3.7533",
"0.13.3.7534",
"0.13.3.7535",
"0.13.3.7539",
"0.13.3.7545",
"0.13.3.7551",
"0.13.3.7552",
"0.13.3.7554",
"0.13.3.7557",
"0.13.3.7558",
"0.13.3.7562",
"0.13.3.7571",
"0.13.3.7574",
"0.13.3.7577",
"0.13.3.7582",
"0.13.3.7599",
"0.13.3.7600",
"0.13.3.7603",
"0.13.3.7635",
"0.13.3.7637",
"0.13.3.7640",
"0.13.3.7646",
"0.13.3.7649",
"0.13.3.7650",
"0.13.3.7657",
"0.13.3.7663",
"0.13.3.7665",
"0.13.3.7675",
"0.13.3.7680",
"0.13.3.7685",
"0.13.3.7686",
"0.13.3.7690",
"0.13.3.7696",
"0.13.3.7702",
"0.13.3.7715",
"0.13.3.7721",
"0.13.3.7727",
"0.13.3.7730",
"0.13.3.7737",
"0.13.3.7741",
"0.13.3.7743",
"0.13.3.7752",
"0.13.3.7761",
"0.13.3.7763",
"0.13.3.7772",
"0.13.3.7776",
"0.13.3.7778",
"0.13.3.7789",
"0.13.3.7792",
"0.13.3.7794",
"0.13.3.7797",
"0.13.3.7802",
"0.13.3.7805",
"0.13.3.7808",
"0.13.3.7810",
"0.13.3.7812",
"0.13.3.7813",
"0.13.3.7816",
"0.13.3.7819",
"0.13.3.7825",
"0.13.3.7828",
"0.13.3.7835",
"0.13.3.7842",
"0.13.3.7846",
"0.13.3.7848",
"0.13.3.7849",
"0.13.3.7850",
"0.13.3.7851",
"0.13.3.7852",
"0.13.3.7861",
"0.13.3.7867",
"0.13.3.7873",
"0.13.3.7883",
"0.13.3.7897",
"0.13.3.7901",
"0.13.3.7906"
]
}
],
"details": "OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=64829\n\n```\nCrash type: Heap-buffer-overflow READ 8\nCrash state:\ndwg_free_object\ndwg_free\nllvmfuzz.c\n```\n",
"id": "OSV-2023-1267",
"modified": "2026-02-12T14:11:51.775549Z",
"published": "2023-12-08T00:11:02.971903Z",
"references": [
{
"type": "REPORT",
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=64829"
}
],
"schema_version": "1.6.0",
"summary": "Heap-buffer-overflow in dwg_free_object"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…