Your submission was sent successfully! Close

CVE-2019-19555

Published: 04 December 2019

read_textobject in read.c in Xfig fig2dev 3.2.7b has a stack-based buffer overflow because of an incorrect sscanf.

Priority

Negligible

CVSS 3 base score: 5.5

Status

Package Release Status
fig2dev
Launchpad, Ubuntu, Debian
Upstream
Released (1:3.2.7b-2)
Ubuntu 21.10 (Impish Indri) Not vulnerable
(1:3.2.7b-3ubuntu1)
Ubuntu 21.04 (Hirsute Hippo) Not vulnerable
(1:3.2.7b-3ubuntu1)
Ubuntu 20.04 LTS (Focal Fossa) Pending
(1:3.2.7b-3)
Ubuntu 18.04 LTS (Bionic Beaver) Needs triage

Ubuntu 16.04 ESM (Xenial Xerus) Does not exist

Ubuntu 14.04 ESM (Trusty Tahr) Does not exist

Patches:
Upstream: https://sourceforge.net/p/mcj/fig2dev/ci/19db5fe6f77ebad91af4b4ef0defd61bd0bb358f/
This vulnerability is mitigated in part by the use of gcc's stack protector in Ubuntu.
transfig
Launchpad, Ubuntu, Debian
Upstream Needs triage

Ubuntu 21.10 (Impish Indri) Does not exist

Ubuntu 21.04 (Hirsute Hippo) Does not exist

Ubuntu 20.04 LTS (Focal Fossa) Does not exist

Ubuntu 18.04 LTS (Bionic Beaver) Does not exist

Ubuntu 16.04 ESM (Xenial Xerus) Needs triage

Ubuntu 14.04 ESM (Trusty Tahr) Does not exist

This vulnerability is mitigated in part by the use of gcc's stack protector in Ubuntu.