Search CVE reports


Toggle filters

21 – 30 of 32 results


CVE-2020-21681

Medium priority
Ignored

A global buffer overflow in the set_color component in genge.c of fig2dev 3.2.7b allows attackers to cause a denial of service (DOS) via converting a xfig file into ge format.

1 affected package

fig2dev

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
fig2dev Not affected Not affected Not affected Not affected
Show less packages

CVE-2020-21680

Medium priority

Some fixes available 2 of 7

A stack-based buffer overflow in the put_arrow() component in genpict2e.c of fig2dev 3.2.7b allows attackers to cause a denial of service (DOS) via converting a xfig file into pict2e format.

1 affected package

fig2dev

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
fig2dev Not affected Not affected Fixed Fixed
Show less packages

CVE-2020-21678

Medium priority
Ignored

A global buffer overflow in the genmp_writefontmacro_latex component in genmp.c of fig2dev 3.2.7b allows attackers to cause a denial of service (DOS) via converting a xfig file into mp format.

1 affected package

fig2dev

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
fig2dev Not affected Not affected Not affected Not affected
Show less packages

CVE-2020-21676

Medium priority

Some fixes available 2 of 6

A stack-based buffer overflow in the genpstrx_text() component in genpstricks.c of fig2dev 3.2.7b allows attackers to cause a denial of service (DOS) via converting a xfig file into pstricks format.

1 affected package

fig2dev

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
fig2dev Not affected Not affected Fixed Fixed
Show less packages

CVE-2020-21675

Medium priority

Some fixes available 2 of 6

A stack-based buffer overflow in the genptk_text component in genptk.c of fig2dev 3.2.7b allows attackers to cause a denial of service (DOS) via converting a xfig file into ptk format.

1 affected package

fig2dev

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
fig2dev Not affected Not affected Fixed Fixed
Show less packages

CVE-2021-3561

Low priority

Some fixes available 2 of 4

An Out of Bounds flaw was found fig2dev version 3.2.8a. A flawed bounds check in read_objects() could allow an attacker to provide a crafted malicious input causing the application to either crash or in some cases cause memory...

2 affected packages

fig2dev, transfig

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
fig2dev Not affected Not affected Fixed Fixed
transfig Not in release Not in release Not in release Not in release
Show less packages

CVE-2019-19797

Low priority

Some fixes available 2 of 4

read_colordef in read.c in Xfig fig2dev 3.2.7b has an out-of-bounds write.

2 affected packages

fig2dev, transfig

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
fig2dev Not affected Fixed Fixed
transfig Not in release Not in release Not in release
Show less packages

CVE-2019-19746

Medium priority
Vulnerable

make_arrow in arrow.c in Xfig fig2dev 3.2.7b allows a segmentation fault and out-of-bounds write because of an integer overflow via a large arrow type.

2 affected packages

fig2dev, transfig

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
fig2dev Not affected Not affected Vulnerable Needs evaluation
transfig Not in release Not in release Not in release Not in release
Show less packages

CVE-2019-19555

Negligible priority

Some fixes available 2 of 5

read_textobject in read.c in Xfig fig2dev 3.2.7b has a stack-based buffer overflow because of an incorrect sscanf.

2 affected packages

fig2dev, transfig

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
fig2dev Not affected Not affected Fixed Fixed
transfig Not in release Not in release Not in release Not in release
Show less packages

CVE-2019-14275

Negligible priority

Some fixes available 1 of 3

Xfig fig2dev 3.2.7a has a stack-based buffer overflow in the calc_arrow function in bound.c.

2 affected packages

fig2dev, transfig

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
fig2dev Not affected Not affected Not affected Fixed
transfig Not in release Not in release Not in release Not in release
Show less packages