Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2021:14823-1

Опубликовано: 06 окт. 2021
Источник: suse-cvrf

Описание

Security update for transfig

This update for transfig fixes the following issues:

  • CVE-2021-3561: Fixed global buffer overflow in fig2dev/read.c in function read_colordef() (bsc#1186329).

  • CVE-2019-19797: Fixed out-of-bounds write in read_colordef in read.c (bsc#1159293).

  • CVE-2019-19746: Fixed segmentation fault and out-of-bounds write because of an integer overflow via a large arrow type (bsc#1159130).

  • CVE-2019-19555: Fixed stack-based buffer overflow because of an incorrect sscanf (bsc#1161698).

  • CVE-2019-14275: Fixed stack-based buffer overflow in the calc_arrow function in bound.c (bsc#1143650).

  • CVE-2020-21680: Fixed a stack-based buffer overflow in the put_arrow() component in genpict2e.c (bsc#1189343).

  • CVE-2020-21681: Fixed a global buffer overflow in the set_color component in genge.c (bsc#1189345).

  • CVE-2020-21682: Fixed a global buffer overflow in the set_fill component in genge.c (bsc#1189346).

  • CVE-2020-21683: Fixed a global buffer overflow in the shade_or_tint_name_after_declare_color in genpstricks.c (bsc#1189325).

  • Do hardening via compile and linker flags

  • Fixed last added upstream commit (boo#1136882)

Список пакетов

SUSE Linux Enterprise Point of Sale 11 SP3
transfig-3.2.8a-1.160.13.1
SUSE Linux Enterprise Server 11 SP4-LTSS
transfig-3.2.8a-1.160.13.1

Описание

Xfig fig2dev 3.2.7a has a stack-based buffer overflow in the calc_arrow function in bound.c.


Затронутые продукты
SUSE Linux Enterprise Point of Sale 11 SP3:transfig-3.2.8a-1.160.13.1
SUSE Linux Enterprise Server 11 SP4-LTSS:transfig-3.2.8a-1.160.13.1

Ссылки

Описание

read_textobject in read.c in Xfig fig2dev 3.2.7b has a stack-based buffer overflow because of an incorrect sscanf.


Затронутые продукты
SUSE Linux Enterprise Point of Sale 11 SP3:transfig-3.2.8a-1.160.13.1
SUSE Linux Enterprise Server 11 SP4-LTSS:transfig-3.2.8a-1.160.13.1

Ссылки

Описание

make_arrow in arrow.c in Xfig fig2dev 3.2.7b allows a segmentation fault and out-of-bounds write because of an integer overflow via a large arrow type.


Затронутые продукты
SUSE Linux Enterprise Point of Sale 11 SP3:transfig-3.2.8a-1.160.13.1
SUSE Linux Enterprise Server 11 SP4-LTSS:transfig-3.2.8a-1.160.13.1

Ссылки

Описание

read_colordef in read.c in Xfig fig2dev 3.2.7b has an out-of-bounds write.


Затронутые продукты
SUSE Linux Enterprise Point of Sale 11 SP3:transfig-3.2.8a-1.160.13.1
SUSE Linux Enterprise Server 11 SP4-LTSS:transfig-3.2.8a-1.160.13.1

Ссылки

Описание

A stack-based buffer overflow in the put_arrow() component in genpict2e.c of fig2dev 3.2.7b allows attackers to cause a denial of service (DOS) via converting a xfig file into pict2e format.


Затронутые продукты
SUSE Linux Enterprise Point of Sale 11 SP3:transfig-3.2.8a-1.160.13.1
SUSE Linux Enterprise Server 11 SP4-LTSS:transfig-3.2.8a-1.160.13.1

Ссылки

Описание

A global buffer overflow in the set_color component in genge.c of fig2dev 3.2.7b allows attackers to cause a denial of service (DOS) via converting a xfig file into ge format.


Затронутые продукты
SUSE Linux Enterprise Point of Sale 11 SP3:transfig-3.2.8a-1.160.13.1
SUSE Linux Enterprise Server 11 SP4-LTSS:transfig-3.2.8a-1.160.13.1

Ссылки

Описание

A global buffer overflow in the set_fill component in genge.c of fig2dev 3.2.7b allows attackers to cause a denial of service (DOS) via converting a xfig file into ge format.


Затронутые продукты
SUSE Linux Enterprise Point of Sale 11 SP3:transfig-3.2.8a-1.160.13.1
SUSE Linux Enterprise Server 11 SP4-LTSS:transfig-3.2.8a-1.160.13.1

Ссылки

Описание

A global buffer overflow in the shade_or_tint_name_after_declare_color in genpstricks.c of fig2dev 3.2.7b allows attackers to cause a denial of service (DOS) via converting a xfig file into pstricks format.


Затронутые продукты
SUSE Linux Enterprise Point of Sale 11 SP3:transfig-3.2.8a-1.160.13.1
SUSE Linux Enterprise Server 11 SP4-LTSS:transfig-3.2.8a-1.160.13.1

Ссылки

Описание

An Out of Bounds flaw was found fig2dev version 3.2.8a. A flawed bounds check in read_objects() could allow an attacker to provide a crafted malicious input causing the application to either crash or in some cases cause memory corruption. The highest threat from this vulnerability is to integrity as well as system availability.


Затронутые продукты
SUSE Linux Enterprise Point of Sale 11 SP3:transfig-3.2.8a-1.160.13.1
SUSE Linux Enterprise Server 11 SP4-LTSS:transfig-3.2.8a-1.160.13.1

Ссылки
Уязвимость SUSE-SU-2021:14823-1