Mageia 2020-0116: transfig security update
Summary
The updated package fixes security vulnerabilities:
Xfig fig2dev 3.2.7a has a stack-based buffer overflow in the calc_arrow
function in bound.c. (CVE-2019-14275)
read_textobject in read.c in Xfig fig2dev 3.2.7b has a stack-based buffer
overflow because of an incorrect sscanf. (CVE-2019-19555)
make_arrow in arrow.c in Xfig fig2dev 3.2.7b allows a segmentation fault
and out-of-bounds write because of an integer overflow via a large arrow
type. (CVE-2019-19746)
read_colordef in read.c in Xfig fig2dev 3.2.7b has an out-of-bounds write.
(CVE-2019-19797)
References
- https://bugs.mageia.org/show_bug.cgi?id=26146
- https://www.debian.org/lts/security/2020/dla-2073
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/7DHT2H26YTJQC3SPYPFUPZZJG26MWGTL/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14275
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19555
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19746
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19797
Resolution
MGASA-2020-0116 - Updated transfig packages fix security vulnerability
SRPMS
- 7/core/transfig-3.2.7a-3.1.mga7