File _patchinfo of Package patchinfo.20226

<patchinfo incident="20226">
  <issue tracker="bnc" id="1159293">VUL-1: CVE-2019-19797: transfig,xfig: out-of-bounds write in read_colordef in read.c</issue>
  <issue tracker="bnc" id="1161698">VUL-1: CVE-2019-19555: transfig,xfig: stack-based buffer overflow because of an incorrect sscanf</issue>
  <issue tracker="bnc" id="1143650">VUL-1: CVE-2019-14275: transfig,xfig: stack-based buffer overflow in the calc_arrow function in bound.c</issue>
  <issue tracker="bnc" id="1159130">VUL-1: CVE-2019-19746: transfig,xfig: segmentation fault and out-of-bounds write because of an integer overflow via a large arrow type</issue>
  <issue tracker="bnc" id="1186329">VUL-0: CVE-2021-3561: transfig: Global buffer overflow in fig2dev/read.c in function read_objects</issue>
  <issue tracker="cve" id="2019-14275"/>
  <issue tracker="cve" id="2021-3561"/>
  <issue tracker="cve" id="2019-19797"/>
  <issue tracker="cve" id="2019-19555"/>
  <issue tracker="cve" id="2019-19746"/>
  <packager>WernerFink</packager>
  <rating>moderate</rating>
  <category>security</category>
  <summary>Security update for transfig</summary>
  <description>This update for transfig fixes the following issues:

Update to version 3.2.8, including fixes for

- CVE-2021-3561: overflow in fig2dev/read.c in function read_colordef() (bsc#1186329).
- CVE-2019-19797: out-of-bounds write in read_colordef in read.c (bsc#1159293).
- CVE-2019-19555: stack-based buffer overflow because of an incorrect sscanf (bsc#1161698).
- CVE-2019-19746: segmentation fault and out-of-bounds write because of an integer overflow via a large arrow type (bsc#1159130).
- CVE-2019-14275: stack-based buffer overflow in the calc_arrow function in bound.c (bsc#1143650).
</description>
</patchinfo>
openSUSE Build Service is sponsored by