MGASA-2017-0469

Source
https://advisories.mageia.org/MGASA-2017-0469.html
Import Source
https://advisories.mageia.org/MGASA-2017-0469.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2017-0469
Related
Published
2017-12-25T11:16:09Z
Modified
2017-12-25T10:50:23Z
Summary
Updated transfig package fix security vulnerability
Details

An out-of-bounds read flaw was found in the way fig2dev program in Xfig handled the processing of Fig format files. This flaw could potentially be used to crash the fig2dev program by tricking it into processing specially crafted Fig format files (CVE-2017-16899).

References
Credits

Affected packages

Mageia:6 / transfig

Package

Name
transfig
Purl
pkg:rpm/mageia/transfig?distro=mageia-6

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.2.5d-9.1.mga6

Ecosystem specific

{
    "section": "core"
}

Mageia:5 / transfig

Package

Name
transfig
Purl
pkg:rpm/mageia/transfig?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.2.5d-8.1.mga5

Ecosystem specific

{
    "section": "core"
}