Your submission was sent successfully! Close

CVE-2019-14275

Published: 26 July 2019

Xfig fig2dev 3.2.7a has a stack-based buffer overflow in the calc_arrow function in bound.c.

Priority

Negligible

CVSS 3 base score: 5.5

Status

Package Release Status
fig2dev
Launchpad, Ubuntu, Debian
Upstream Needs triage

Ubuntu 21.10 (Impish Indri) Not vulnerable
(1:3.2.7a-7)
Ubuntu 21.04 (Hirsute Hippo) Not vulnerable
(1:3.2.7a-7)
Ubuntu 20.04 LTS (Focal Fossa) Not vulnerable
(1:3.2.7a-7)
Ubuntu 18.04 LTS (Bionic Beaver) Needed

Ubuntu 16.04 ESM (Xenial Xerus) Does not exist

Ubuntu 14.04 ESM (Trusty Tahr) Does not exist

Patches:
Upstream: https://sourceforge.net/p/mcj/fig2dev/ci/03ea4578258d2d9ca1ceb080e469ad261db39ef0/
This vulnerability is mitigated in part by the use of gcc's stack protector in Ubuntu.
transfig
Launchpad, Ubuntu, Debian
Upstream Needs triage

Ubuntu 21.10 (Impish Indri) Does not exist

Ubuntu 21.04 (Hirsute Hippo) Does not exist

Ubuntu 20.04 LTS (Focal Fossa) Does not exist

Ubuntu 18.04 LTS (Bionic Beaver) Does not exist

Ubuntu 16.04 ESM (Xenial Xerus) Needed

Ubuntu 14.04 ESM (Trusty Tahr) Does not exist

This vulnerability is mitigated in part by the use of gcc's stack protector in Ubuntu.