File _patchinfo of Package patchinfo.20224
<patchinfo incident="20224">
<issue tracker="bnc" id="1159130">VUL-1: CVE-2019-19746: transfig,xfig: segmentation fault and out-of-bounds write because of an integer overflow via a large arrow type</issue>
<issue tracker="bnc" id="1161698">VUL-1: CVE-2019-19555: transfig,xfig: stack-based buffer overflow because of an incorrect sscanf</issue>
<issue tracker="bnc" id="1136882">xfig / fig2dev complains about page size not recognized when exporting fig -> pdf,png, etc</issue>
<issue tracker="bnc" id="1186329">VUL-0: CVE-2021-3561: transfig: Global buffer overflow in fig2dev/read.c in function read_objects</issue>
<issue tracker="bnc" id="1159293">VUL-1: CVE-2019-19797: transfig,xfig: out-of-bounds write in read_colordef in read.c</issue>
<issue tracker="bnc" id="1189325">VUL-0: CVE-2020-21683: transfig: A global buffer overflow in the shade_or_tint_name_after_declare_color in genpstricks.c allows attackers to cause a denial of service (DOS) via converting a xfig file into pstricks format</issue>
<issue tracker="bnc" id="1189346">VUL-0: CVE-2020-21682: transfig: A global buffer overflow in the set_fill component in genge.c of fig2dev 3.2.7b allows attackers to cause a denial of service (DOS) via converting a xfig file into ge format</issue>
<issue tracker="bnc" id="1189345">VUL-0: CVE-2020-21681: transfig: A global buffer overflow in the set_color component in genge.c of fig2dev 3.2.7b allows attackers to cause a denial of service (DOS) via converting a xfig file into ge format</issue>
<issue tracker="bnc" id="1189343">VUL-0: CVE-2020-21680: transfig: A stack-based buffer overflow in the put_arrow() component in genpict2e.c of fig2dev 3.2.7b allows attackers to cause a denial of service (DOS) via converting a xfig file into pict2e format</issue>
<issue tracker="cve" id="2019-19746"/>
<issue tracker="cve" id="2019-19797"/>
<issue tracker="cve" id="2019-19555"/>
<issue tracker="cve" id="2020-21680"/>
<issue tracker="cve" id="2020-21681"/>
<issue tracker="cve" id="2020-21682"/>
<issue tracker="cve" id="2020-21683"/>
<issue tracker="cve" id="2021-3561"/>
<packager>WernerFink</packager>
<rating>moderate</rating>
<category>security</category>
<summary>Security update for transfig</summary>
<description>This update for transfig fixes the following issues:
Update to version 3.2.8, including fixes for
- CVE-2021-3561: overflow in fig2dev/read.c in function read_colordef() (bsc#1186329).
- CVE-2020-21683: Fixed buffer overflow in the shade_or_tint_name_after_declare_color in genpstricks.c (bsc#1189325).
- CVE-2020-21682: Fixed buffer overflow in the set_fill component in genge.c (bsc#1189346).
- CVE-2020-21681: Fixed buffer overflow in the set_color component in genge.c (bsc#1189345).
- CVE-2020-21680: Fixed stack-based buffer overflow in the put_arrow() component in genpict2e.c (bsc#1189343).
- CVE-2019-19797: out-of-bounds write in read_colordef in read.c (bsc#1159293).
- CVE-2019-19555: stack-based buffer overflow because of an incorrect sscanf (bsc#1161698).
- CVE-2019-19746: segmentation fault and out-of-bounds write because of an integer overflow via a large arrow type (bsc#1159130).
</description>
</patchinfo>