MGASA-2020-0116

Source
https://advisories.mageia.org/MGASA-2020-0116.html
Import Source
https://advisories.mageia.org/MGASA-2020-0116.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2020-0116
Related
Published
2020-03-06T16:13:58Z
Modified
2020-03-06T15:42:21Z
Summary
Updated transfig packages fix security vulnerability
Details

The updated package fixes security vulnerabilities:

Xfig fig2dev 3.2.7a has a stack-based buffer overflow in the calc_arrow function in bound.c. (CVE-2019-14275)

read_textobject in read.c in Xfig fig2dev 3.2.7b has a stack-based buffer overflow because of an incorrect sscanf. (CVE-2019-19555)

make_arrow in arrow.c in Xfig fig2dev 3.2.7b allows a segmentation fault and out-of-bounds write because of an integer overflow via a large arrow type. (CVE-2019-19746)

read_colordef in read.c in Xfig fig2dev 3.2.7b has an out-of-bounds write. (CVE-2019-19797)

References
Credits

Affected packages

Mageia:7 / transfig

Package

Name
transfig
Purl
pkg:rpm/mageia/transfig?distro=mageia-7

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.2.7a-3.1.mga7

Ecosystem specific

{
    "section": "core"
}