Headline
CVE-2021-3561: Xfig / fig2dev
An Out of Bounds flaw was found fig2dev version 3.2.8a. A flawed bounds check in read_objects() could allow an attacker to provide a crafted malicious input causing the application to either crash or in some cases cause memory corruption. The highest threat from this vulnerability is to integrity as well as system availability.
Commit [6827c0] Maximize Restore History
Sanitize color definitions, ticket #116
Authored by: Thomas Loimer 2021-04-24
Browse code at this revision
Parent: [8c0917]
Child: [54a2f9]
changed
fig2dev/read.c
fig2dev/read.c Diff Switch to side-by-side view
Related news
Ubuntu Security Notice 5864-1 - Frederic Cambus discovered that Fig2dev incorrectly handled certain image files. If a user or an automated system were tricked into opening a certain specially crafted input file, a remote attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 18.04 LTS. It was discovered that Fig2dev incorrectly handled certain image files. If a user or an automated system were tricked into opening a certain specially crafted input file, a remote attacker could possibly use this issue to cause a denial of service.