Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
SUSE:SLE-12-SP1:GA
patchinfo.20224
_patchinfo
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo.20224
<patchinfo incident="20224"> <issue tracker="bnc" id="1159130">VUL-1: CVE-2019-19746: transfig,xfig: segmentation fault and out-of-bounds write because of an integer overflow via a large arrow type</issue> <issue tracker="bnc" id="1161698">VUL-1: CVE-2019-19555: transfig,xfig: stack-based buffer overflow because of an incorrect sscanf</issue> <issue tracker="bnc" id="1136882">xfig / fig2dev complains about page size not recognized when exporting fig -> pdf,png, etc</issue> <issue tracker="bnc" id="1186329">VUL-0: CVE-2021-3561: transfig: Global buffer overflow in fig2dev/read.c in function read_objects</issue> <issue tracker="bnc" id="1159293">VUL-1: CVE-2019-19797: transfig,xfig: out-of-bounds write in read_colordef in read.c</issue> <issue tracker="bnc" id="1189325">VUL-0: CVE-2020-21683: transfig: A global buffer overflow in the shade_or_tint_name_after_declare_color in genpstricks.c allows attackers to cause a denial of service (DOS) via converting a xfig file into pstricks format</issue> <issue tracker="bnc" id="1189346">VUL-0: CVE-2020-21682: transfig: A global buffer overflow in the set_fill component in genge.c of fig2dev 3.2.7b allows attackers to cause a denial of service (DOS) via converting a xfig file into ge format</issue> <issue tracker="bnc" id="1189345">VUL-0: CVE-2020-21681: transfig: A global buffer overflow in the set_color component in genge.c of fig2dev 3.2.7b allows attackers to cause a denial of service (DOS) via converting a xfig file into ge format</issue> <issue tracker="bnc" id="1189343">VUL-0: CVE-2020-21680: transfig: A stack-based buffer overflow in the put_arrow() component in genpict2e.c of fig2dev 3.2.7b allows attackers to cause a denial of service (DOS) via converting a xfig file into pict2e format</issue> <issue tracker="cve" id="2019-19746"/> <issue tracker="cve" id="2019-19797"/> <issue tracker="cve" id="2019-19555"/> <issue tracker="cve" id="2020-21680"/> <issue tracker="cve" id="2020-21681"/> <issue tracker="cve" id="2020-21682"/> <issue tracker="cve" id="2020-21683"/> <issue tracker="cve" id="2021-3561"/> <packager>WernerFink</packager> <rating>moderate</rating> <category>security</category> <summary>Security update for transfig</summary> <description>This update for transfig fixes the following issues: Update to version 3.2.8, including fixes for - CVE-2021-3561: overflow in fig2dev/read.c in function read_colordef() (bsc#1186329). - CVE-2020-21683: Fixed buffer overflow in the shade_or_tint_name_after_declare_color in genpstricks.c (bsc#1189325). - CVE-2020-21682: Fixed buffer overflow in the set_fill component in genge.c (bsc#1189346). - CVE-2020-21681: Fixed buffer overflow in the set_color component in genge.c (bsc#1189345). - CVE-2020-21680: Fixed stack-based buffer overflow in the put_arrow() component in genpict2e.c (bsc#1189343). - CVE-2019-19797: out-of-bounds write in read_colordef in read.c (bsc#1159293). - CVE-2019-19555: stack-based buffer overflow because of an incorrect sscanf (bsc#1161698). - CVE-2019-19746: segmentation fault and out-of-bounds write because of an integer overflow via a large arrow type (bsc#1159130). </description> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor