Search CVE reports
21 – 30 of 32 results
A global buffer overflow in the set_color component in genge.c of fig2dev 3.2.7b allows attackers to cause a denial of service (DOS) via converting a xfig file into ge format.
1 affected package
fig2dev
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
fig2dev | Not affected | Not affected | Not affected | Not affected |
Some fixes available 2 of 7
A stack-based buffer overflow in the put_arrow() component in genpict2e.c of fig2dev 3.2.7b allows attackers to cause a denial of service (DOS) via converting a xfig file into pict2e format.
1 affected package
fig2dev
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
fig2dev | Not affected | Not affected | Fixed | Fixed |
A global buffer overflow in the genmp_writefontmacro_latex component in genmp.c of fig2dev 3.2.7b allows attackers to cause a denial of service (DOS) via converting a xfig file into mp format.
1 affected package
fig2dev
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
fig2dev | Not affected | Not affected | Not affected | Not affected |
Some fixes available 2 of 6
A stack-based buffer overflow in the genpstrx_text() component in genpstricks.c of fig2dev 3.2.7b allows attackers to cause a denial of service (DOS) via converting a xfig file into pstricks format.
1 affected package
fig2dev
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
fig2dev | Not affected | Not affected | Fixed | Fixed |
Some fixes available 2 of 6
A stack-based buffer overflow in the genptk_text component in genptk.c of fig2dev 3.2.7b allows attackers to cause a denial of service (DOS) via converting a xfig file into ptk format.
1 affected package
fig2dev
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
fig2dev | Not affected | Not affected | Fixed | Fixed |
Some fixes available 2 of 4
An Out of Bounds flaw was found fig2dev version 3.2.8a. A flawed bounds check in read_objects() could allow an attacker to provide a crafted malicious input causing the application to either crash or in some cases cause memory...
2 affected packages
fig2dev, transfig
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
fig2dev | Not affected | Not affected | Fixed | Fixed |
transfig | Not in release | Not in release | Not in release | Not in release |
Some fixes available 2 of 4
read_colordef in read.c in Xfig fig2dev 3.2.7b has an out-of-bounds write.
2 affected packages
fig2dev, transfig
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
fig2dev | — | Not affected | Fixed | Fixed |
transfig | — | Not in release | Not in release | Not in release |
make_arrow in arrow.c in Xfig fig2dev 3.2.7b allows a segmentation fault and out-of-bounds write because of an integer overflow via a large arrow type.
2 affected packages
fig2dev, transfig
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
fig2dev | Not affected | Not affected | Vulnerable | Needs evaluation |
transfig | Not in release | Not in release | Not in release | Not in release |
Some fixes available 2 of 5
read_textobject in read.c in Xfig fig2dev 3.2.7b has a stack-based buffer overflow because of an incorrect sscanf.
2 affected packages
fig2dev, transfig
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
fig2dev | Not affected | Not affected | Fixed | Fixed |
transfig | Not in release | Not in release | Not in release | Not in release |
Some fixes available 1 of 3
Xfig fig2dev 3.2.7a has a stack-based buffer overflow in the calc_arrow function in bound.c.
2 affected packages
fig2dev, transfig
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
fig2dev | Not affected | Not affected | Not affected | Fixed |
transfig | Not in release | Not in release | Not in release | Not in release |