Source: fig2dev
Version: 1:3.2.7b-1
Severity: normal
Tags: security upstream
Forwarded: https://sourceforge.net/p/mcj/tickets/55/

Hi,

The following vulnerability was published for fig2dev.

CVE-2019-19555[0]:
| read_textobject in read.c in Xfig fig2dev 3.2.7b has a stack-based
| buffer overflow because of an incorrect sscanf.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2019-19555
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19555
[1] https://sourceforge.net/p/mcj/tickets/55/
[2] 
https://sourceforge.net/p/mcj/fig2dev/ci/19db5fe6f77ebad91af4b4ef0defd61bd0bb358f/

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to