Search CVE reports
1 – 10 of 32 results
In xfig diagramming tool, a segmentation fault while running fig2dev allows an attacker to availability via local input manipulation via read_arcobject function.
1 affected package
fig2dev
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
fig2dev | Not affected | Not affected | Not affected | Not affected |
A flaw was found in fig2dev. This vulnerability allows availability via local input manipulation via genge_itp_spline function.
1 affected package
fig2dev
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
fig2dev | Not affected | Not affected | Not affected | Not affected |
In xfig diagramming tool, a stack-overflow while running fig2dev allows memory corruption via local input manipulation via read_objects function.
1 affected package
fig2dev
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
fig2dev | Not affected | Not affected | Not affected | Not affected |
In xfig diagramming tool, a stack-overflow while running fig2dev allows memory corruption via local input manipulation at the bezier_spline function.
1 affected package
fig2dev
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
fig2dev | Not affected | Not affected | Not affected | Not affected |
heap-buffer overflow in fig2dev in version 3.2.9a allows an attacker to availability via local input manipulation via create_line_with_spline.
1 affected package
fig2dev
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
fig2dev | Fixed | Not affected | Not affected | Not affected |
Segmentation fault in fig2dev in version 3.2.9a allows an attacker to availability via local input manipulation via put_patternarc function.
1 affected package
fig2dev
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
fig2dev | Fixed | Fixed | Fixed | Fixed |
Floating point exception in fig2dev in version 3.2.9a allows an attacker to availability via local input manipulation via get_slope function.
1 affected package
fig2dev
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
fig2dev | Fixed | Fixed | Fixed | Fixed |
A denial of service vulnerabiity exists in fig2dev through 3.28a due to a segfault in the open_stream function in readpics.c.
1 affected package
fig2dev
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
fig2dev | Not affected | Not affected | Not affected | Not affected |
A double-free vulnerability exists in fig2dev through 3.28a is affected by: via the free_stream function in readpics.c, which could cause a denial of service (context-dependent).
1 affected package
fig2dev
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
fig2dev | Not affected | Not affected | Not affected | Not affected |
Some fixes available 2 of 4
An issue was discovered in fig2dev before 3.2.8.. A NULL pointer dereference exists in the function compute_closed_spline() located in trans_spline.c. It allows an attacker to cause Denial of Service. The fixed version of fig2dev is 3.2.8.
3 affected packages
fig2dev, transfig, xfig
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
fig2dev | Not affected | Not affected | Fixed | Fixed |
transfig | Not in release | Not in release | Not in release | Not in release |
xfig | Not affected | Not affected | Not affected | Not affected |