A flaw was found in fig2dev. This vulnerability allows availability via local input manipulation via genge_itp_spline function.
History

Wed, 18 Jun 2025 15:00:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Moderate


Tue, 17 Jun 2025 15:30:00 +0000

Type Values Removed Values Added
Description In xfig diagramming tool, a segmentation fault in fig2dev allows memory corruption via local input manipulation at genge_itp_spline function. A flaw was found in fig2dev. This vulnerability allows availability via local input manipulation via genge_itp_spline function.
Title Xfig: fig2dev segmentation fault in genge_itp_spline Xfig: fig2dev segmentation fault vulnerability
First Time appeared Redhat
Redhat enterprise Linux
CPEs cpe:/o:redhat:enterprise_linux:6
cpe:/o:redhat:enterprise_linux:7
cpe:/o:redhat:enterprise_linux:8
cpe:/o:redhat:enterprise_linux:9
Vendors & Products Redhat
Redhat enterprise Linux

Fri, 23 May 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 15 May 2025 17:00:00 +0000

Type Values Removed Values Added
Description Red Hat Product Security has come to the conclusion that this CVE is not needed. In xfig diagramming tool, a segmentation fault in fig2dev allows memory corruption via local input manipulation at genge_itp_spline function.
Title Xfig: fig2dev segmentation fault in genge_itp_spline
Weaknesses CWE-476
References
Metrics cvssV3_1

{'score': 4.7, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N'}


Wed, 30 Apr 2025 18:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-476
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}


Wed, 30 Apr 2025 18:15:00 +0000

Type Values Removed Values Added
Title fig2dev segmentation fault in genge_itp_spline
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 30 Apr 2025 17:30:00 +0000

Type Values Removed Values Added
Description Segmentation fault in fig2dev in version 3.2.9a allows an attacker to availability via local input manipulation via genge_itp_spline function. Red Hat Product Security has come to the conclusion that this CVE is not needed.

Thu, 24 Apr 2025 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 23 Apr 2025 21:15:00 +0000

Type Values Removed Values Added
Description Segmentation fault in fig2dev in version 3.2.9a allows an attacker to availability via local input manipulation via genge_itp_spline function.
Title fig2dev segmentation fault in genge_itp_spline
Weaknesses CWE-476
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published: 2025-04-23T20:55:15.407Z

Updated: 2025-06-17T15:20:02.924Z

Reserved: 2025-04-23T20:32:36.307Z

Link: CVE-2025-46399

cve-icon Vulnrichment

Updated: 2025-04-24T13:03:54.165Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-04-23T21:15:17.110

Modified: 2025-06-17T16:15:33.073

Link: CVE-2025-46399

cve-icon Redhat

Severity : Moderate

Publid Date: 2025-04-23T20:55:15Z

Links: CVE-2025-46399 - Bugzilla