An Out of Bounds flaw was found fig2dev version 3.2.8a. A flawed bounds check in read_objects() could allow an attacker to provide a crafted malicious input causing the application to either crash or in some cases cause memory corruption. The highest threat from this vulnerability is to integrity as well as system availability.
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "1:3.2.6a-6ubuntu1.1", "binary_name": "fig2dev" }, { "binary_version": "1:3.2.6a-6ubuntu1.1", "binary_name": "fig2dev-dbgsym" }, { "binary_version": "1:3.2.6a-6ubuntu1.1", "binary_name": "transfig" } ] }