File _patchinfo of Package patchinfo.38630

<patchinfo incident="38630">
  <issue tracker="bnc" id="1240380">VUL-0: CVE-2025-31162: transfig: Floating point exception in fig2dev in version 3.2.9a&#160;allows an attacker to availability via local input manipulation via&#160;get_slope function.</issue>
  <issue tracker="bnc" id="1240379">VUL-0: CVE-2025-31164: transfig: heap-buffer overflow in fig2dev in version 3.2.9a&#160;allows an attacker to availability via local input manipulation via&#160; create_line_with_spline.</issue>
  <issue tracker="bnc" id="1240381">VUL-0: CVE-2025-31163: transfig: Segmentation fault in fig2dev in version 3.2.9a&#160;allows an attacker to availability via local input manipulation via&#160;put_patternarc function.</issue>
  <issue tracker="cve" id="2025-31162"/>
  <issue tracker="cve" id="2025-31163"/>
  <issue tracker="cve" id="2025-31164"/>
  <packager>WernerFink</packager>
  <rating>moderate</rating>
  <category>security</category>
  <summary>Security update for transfig</summary>
  <description>This update for transfig fixes the following issues:

- CVE-2025-31164: Fixed heap-buffer overflow in fig2dev create_line_with_spline() function (bsc#1240379)
- CVE-2025-31162: Fixed floating point exception in fig2dev get_slope() function (bsc#1240380)
- CVE-2025-31163: Fixed segmentation fault in fig2dev put_patternarc() function (bsc#1240381)
</description>
</patchinfo>
openSUSE Build Service is sponsored by