Search CVE reports
1 – 10 of 32 results
In xfig diagramming tool, a segmentation fault while running fig2dev allows an attacker to availability via local input manipulation via read_arcobject function.
1 affected package
fig2dev
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
fig2dev | Not affected | Not affected | Not affected | Not affected |
A flaw was found in fig2dev. This vulnerability allows availability via local input manipulation via genge_itp_spline function.
1 affected package
fig2dev
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
fig2dev | Not affected | Not affected | Not affected | Not affected |
In xfig diagramming tool, a stack-overflow while running fig2dev allows memory corruption via local input manipulation via read_objects function.
1 affected package
fig2dev
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
fig2dev | Not affected | Not affected | Not affected | Not affected |
In xfig diagramming tool, a stack-overflow while running fig2dev allows memory corruption via local input manipulation at the bezier_spline function.
1 affected package
fig2dev
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
fig2dev | Not affected | Not affected | Not affected | Not affected |
heap-buffer overflow in fig2dev in version 3.2.9a allows an attacker to availability via local input manipulation via create_line_with_spline.
1 affected package
fig2dev
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
fig2dev | Fixed | Not affected | Not affected | Not affected |
Segmentation fault in fig2dev in version 3.2.9a allows an attacker to availability via local input manipulation via put_patternarc function.
1 affected package
fig2dev
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
fig2dev | Fixed | Fixed | Fixed | Fixed |
Floating point exception in fig2dev in version 3.2.9a allows an attacker to availability via local input manipulation via get_slope function.
1 affected package
fig2dev
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
fig2dev | Fixed | Fixed | Fixed | Fixed |
A denial of service vulnerabiity exists in fig2dev through 3.28a due to a segfault in the open_stream function in readpics.c.
1 affected package
fig2dev
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
fig2dev | Not affected | Not affected | Not affected | Not affected |
A double-free vulnerability exists in fig2dev through 3.28a is affected by: via the free_stream function in readpics.c, which could cause a denial of service (context-dependent).
1 affected package
fig2dev
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
fig2dev | Not affected | Not affected | Not affected | Not affected |
Some fixes available 2 of 4
An Out of Bounds flaw was found fig2dev version 3.2.8a. A flawed bounds check in read_objects() could allow an attacker to provide a crafted malicious input causing the application to either crash or in some cases cause memory...
2 affected packages
fig2dev, transfig
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
fig2dev | Not affected | Not affected | Fixed | Fixed |
transfig | Not in release | Not in release | Not in release | Not in release |