{"id":"CVE-2019-20015","details":"An issue was discovered in GNU LibreDWG 0.92. Crafted input will lead to an attempted excessive memory allocation in dwg_decode_LWPOLYLINE_private in dwg.spec.","modified":"2026-04-11T12:20:06.245100Z","published":"2019-12-27T01:15:13.647Z","related":["openSUSE-SU-2020:0068-1","openSUSE-SU-2020:0095-1"],"database_specific":{"unresolved_ranges":[{"cpe":"cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*","extracted_events":[{"last_affected":"15.0-sp1"}],"source":"CPE_FIELD"},{"cpe":"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"15.1"}],"source":"CPE_FIELD"}]},"references":[{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00033.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00045.html"},{"type":"REPORT","url":"https://github.com/LibreDWG/libredwg/issues/176"},{"type":"REPORT","url":"https://github.com/LibreDWG/libredwg/issues/176#issuecomment-568643028"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/libredwg/libredwg","events":[{"introduced":"0"},{"last_affected":"261d13c6f91e9526fb4a4c26dd1586faf8f70f1e"}],"database_specific":{"cpe":"cpe:2.3:a:gnu:libredwg:0.9.2:*:*:*:*:*:*:*","extracted_events":[{"introduced":"0"},{"last_affected":"0.9.2"}],"source":"CPE_FIELD"}}],"versions":["0.3","0.4-dev","0.4.900","0.4.924","0.4.938","0.5","0.6","0.6.1","0.6.2","0.7","0.8","0.9","0.9.1","0.9.2"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-20015.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}