-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Mon, 04 Oct 2021 09:30:34 +0200 Source: fig2dev Architecture: source Version: 1:3.2.6a-2+deb9u4 Distribution: stretch-security Urgency: high Maintainer: Roland Rosenfeld <roland@debian.org> Changed-By: Markus Koschany <apo@debian.org> Changes: fig2dev (1:3.2.6a-2+deb9u4) stretch-security; urgency=high . * Non-maintainer upload by the LTS team. * Drop 41_CVE-2019-19555.patch and 32_fill-style-overflow.patch. These issues are fixed by the patch for CVE-2020-21534 now. * Refresh 31_input_sanitizing.patch. * Fix CVE-2019-19797: read_colordef in read.c in fig2dev has an out-of-bounds write. * Fix CVE-2020-21529: fig2dev contains a stack buffer overflow in the bezier_spline function in genepic.c. * Fix CVE-2020-21530: fig2dev contains a segmentation fault in the read_objects function in read.c. * Fix CVE-2020-21531: fig2dev contains a global buffer overflow in the conv_pattern_index function in gencgm.c. * Fix CVE-2020-21532: fig2dev contains a global buffer overflow in the setfigfont function in genepic.c. * Fix CVE-2020-21533: fig2dev contains a stack buffer overflow in the read_textobject function in read.c. * Fix CVE-2020-21534: fig2dev contains a global buffer overflow in the get_line function in read.c. * Fix CVE-2020-21535: fig2dev contains a segmentation fault in the gencgm_start function in gencgm.c. * Fix CVE-2020-21675: A stack-based buffer overflow in the genptk_text component in genptk.c of fig2dev allows attackers to cause a denial of service (DOS) via converting a xfig file into ptk format. * Fix CVE-2021-3561: An Out of Bounds flaw was found in fig2dev. A flawed bounds check in read_objects() could allow an attacker to provide a crafted malicious input causing the application to either crash or in some cases cause memory corruption. The highest threat from this vulnerability is to integrity as well as system availability. * Fix CVE-2021-32280: An issue was discovered in fig2dev. A NULL pointer dereference exists in the function compute_closed_spline() located in trans_spline.c. It allows an attacker to cause a Denial of Service. Checksums-Sha1: ef1faf4782e6fc52637812d11cc896f55e48dfb4 2227 fig2dev_3.2.6a-2+deb9u4.dsc e09145435f3306010eb006f9d7e118fccf77cd2b 507820 fig2dev_3.2.6a.orig.tar.xz 007383ae17fa44f2e66d5048d1f2973a32dacd67 226664 fig2dev_3.2.6a-2+deb9u4.debian.tar.xz 92135339412cd6dcffa85ca7a17e24a00afadda0 6837 fig2dev_3.2.6a-2+deb9u4_source.buildinfo Checksums-Sha256: f784d4e0fce7fda2d0e6732fa74628ae599e0726930b25eb604bc230299f05cb 2227 fig2dev_3.2.6a-2+deb9u4.dsc 5e61a3d9a4f83db4b3199ee82dd54bb65b544369f1e8e38a2606c44cf71667a7 507820 fig2dev_3.2.6a.orig.tar.xz 4917c0996ffaecc2a2130011e61f90576a5d2e3acad51748a630ed213f67dbe3 226664 fig2dev_3.2.6a-2+deb9u4.debian.tar.xz e47f0e44cd2324f110b49613fcddb3d1d916f90848bce5d4a7616753714ce496 6837 fig2dev_3.2.6a-2+deb9u4_source.buildinfo Files: ee5550b607daf86112a421435143df27 2227 graphics optional fig2dev_3.2.6a-2+deb9u4.dsc f795a492cd9fa6d9abe0e11e581946f9 507820 graphics optional fig2dev_3.2.6a.orig.tar.xz a3c4cb56b38895133df1acdb2debaa19 226664 graphics optional fig2dev_3.2.6a-2+deb9u4.debian.tar.xz 237b927fed6b722b0b209b095ea367d8 6837 graphics optional fig2dev_3.2.6a-2+deb9u4_source.buildinfo -----BEGIN PGP SIGNATURE----- iQKjBAEBCgCNFiEErPPQiO8y7e9qGoNf2a0UuVE7UeQFAmFatWVfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEFD RjNEMDg4RUYzMkVERUY2QTFBODM1RkQ5QUQxNEI5NTEzQjUxRTQPHGFwb0BkZWJp YW4ub3JnAAoJENmtFLlRO1Hkou0P/09aheoJydFQXifwbVlzhXGBHxlK3udWWns3 7zTjsjwUtJOF24ppO5frt6Ba/kw8Ah9B/SpziGpn/fL09zWDuBOEUEGeNXyvbY3b LAujSmkbOBR0s+H60Ovg4oHUrxC9DPlOGeBBT1ElKuMj/iqvSOoMQvdtiGN+/e9Q O8fTRFnX3Eqq4wWUVNs9bauDoRmXvmxZ4udITaWJll3TH0sl59YD2Ry9gcAAGl/7 OvNQWZCCGZcLoM8qxxF9q9M8+d2E5Uk0bGIqMyOi5uZzW8M4CAOLZjz54TaVKZKC CKGZ1/NU9UgSpguZgP/8xS/+gfBVcAvGt8rLalGYrvxccepqZaW1VfzWTdrIGKdg IH5fTlvNxczJ2Zd6tcxl82d4g35yW+uLfT6bxW2wS2vfwWm9hef/uGeV2k2D0lkc YLTUPbB0VstRsTq2GRZOx4CWCHpUJCfbzu8QRGhPwWrR9CbWxXb+jHzwegWMHAFE WJHKcY6dHNCOshMuWU0l5V+mIxX78axn/bH2A9+60iaPvirBSm4mK1/ncgJjPA2S qqut0phape97nBsmxRanW0/aCR+n9i2T6Y1wYCFmxbJGL0VTPXCoZY0UpR1vSIUL FgE8tWjJB3daNT8qStlNCyNoYyjg0Lmv5xDbmEUcAX+uPPekWHopBTsvZ5R8pi6V meSXQb1N =sL7b -----END PGP SIGNATURE-----