summaryrefslogtreecommitdiffstats
path: root/data/CVE/list.2020
diff options
context:
space:
mode:
authorsecurity tracker role <sectracker@soriano.debian.org>2021-10-04 08:10:34 +0000
committersecurity tracker role <sectracker@soriano.debian.org>2021-10-04 08:10:34 +0000
commit997fd0dc344a453891aed9b38f092b6046e034d9 (patch)
tree3b484288c2e52133f8776ba83feb6694a21272ae /data/CVE/list.2020
parent2b38656cc814cbda3197a2b293d42f7c692459df (diff)
automatic update
Diffstat (limited to 'data/CVE/list.2020')
-rw-r--r--data/CVE/list.20209
1 files changed, 9 insertions, 0 deletions
diff --git a/data/CVE/list.2020 b/data/CVE/list.2020
index f81f54ffe5..1e5eb2c8ac 100644
--- a/data/CVE/list.2020
+++ b/data/CVE/list.2020
@@ -21912,6 +21912,7 @@ CVE-2020-21677 (A heap-based buffer overflow in the sixel_encoder_output_without
NOTE: https://github.com/saitoha/libsixel/issues/123
NOTE: https://github.com/saitoha/libsixel/commit/0b1e0b3f7b44233f84e5c9f512f8c90d6bbbe33d
CVE-2020-21676 (A stack-based buffer overflow in the genpstrx_text() component in genp ...)
+ {DLA-2778-1}
- fig2dev 1:3.2.8-1
[buster] - fig2dev <no-dsa> (Minor issue)
[stretch] - fig2dev <not-affected> (Vulnerable code introduced later)
@@ -21920,6 +21921,7 @@ CVE-2020-21676 (A stack-based buffer overflow in the genpstrx_text() component i
NOTE: https://sourceforge.net/p/mcj/fig2dev/ci/acccc89c20206a5db1f463438ba444e35bcb400e/ (3.2.8)
NOTE: Introduced by https://sourceforge.net/p/mcj/fig2dev/ci/102f607eea49785d4a9c9c24af85f046c23674de (3.2.7)
CVE-2020-21675 (A stack-based buffer overflow in the genptk_text component in genptk.c ...)
+ {DLA-2778-1}
- fig2dev 1:3.2.7b-3
[buster] - fig2dev 1:3.2.7a-5+deb10u3
- transfig <removed>
@@ -22267,24 +22269,28 @@ CVE-2020-21537
CVE-2020-21536
RESERVED
CVE-2020-21535 (fig2dev 3.2.7b contains a segmentation fault in the gencgm_start funct ...)
+ {DLA-2778-1}
- fig2dev 1:3.2.7b-3
[buster] - fig2dev 1:3.2.7a-5+deb10u2
- transfig <removed>
NOTE: https://sourceforge.net/p/mcj/tickets/62/
NOTE: https://sourceforge.net/p/mcj/fig2dev/ci/41b9bb838a3d544539f6e68aa4f87d70ef7d45ce/ (3.2.8)
CVE-2020-21534 (fig2dev 3.2.7b contains a global buffer overflow in the get_line funct ...)
+ {DLA-2778-1}
- fig2dev 1:3.2.7b-3
[buster] - fig2dev 1:3.2.7a-5+deb10u2
- transfig <removed>
NOTE: https://sourceforge.net/p/mcj/tickets/58/
NOTE: https://sourceforge.net/p/mcj/fig2dev/ci/41b9bb838a3d544539f6e68aa4f87d70ef7d45ce/ (3.2.8)
CVE-2020-21533 (fig2dev 3.2.7b contains a stack buffer overflow in the read_textobject ...)
+ {DLA-2778-1}
- fig2dev 1:3.2.7b-3
[buster] - fig2dev 1:3.2.7a-5+deb10u2
- transfig <removed>
NOTE: https://sourceforge.net/p/mcj/tickets/59/
NOTE: https://sourceforge.net/p/mcj/fig2dev/ci/41b9bb838a3d544539f6e68aa4f87d70ef7d45ce/ (3.2.8)
CVE-2020-21532 (fig2dev 3.2.7b contains a global buffer overflow in the setfigfont fun ...)
+ {DLA-2778-1}
- fig2dev 1:3.2.8-1
[buster] - fig2dev <no-dsa> (Minor issue)
- transfig <removed>
@@ -22292,18 +22298,21 @@ CVE-2020-21532 (fig2dev 3.2.7b contains a global buffer overflow in the setfigfo
NOTE: https://sourceforge.net/p/mcj/fig2dev/ci/421afa17d8cb8dafcaf3e6044a70790fa4fe307b/ (3.2.8)
NOTE: https://sourceforge.net/p/mcj/fig2dev/ci/00cdedac7a0b029846dee891769a1e77df83a01b/ (3.2.8)
CVE-2020-21531 (fig2dev 3.2.7b contains a global buffer overflow in the conv_pattern_i ...)
+ {DLA-2778-1}
- fig2dev 1:3.2.8-1
[buster] - fig2dev <no-dsa> (Minor issue)
- transfig <removed>
NOTE: https://sourceforge.net/p/mcj/tickets/63/
NOTE: https://sourceforge.net/p/mcj/fig2dev/ci/2f8d1ae9763dcdc99b88a2b14849fe37174bcd69/ (3.2.8)
CVE-2020-21530 (fig2dev 3.2.7b contains a segmentation fault in the read_objects funct ...)
+ {DLA-2778-1}
- fig2dev 1:3.2.7b-3
[buster] - fig2dev 1:3.2.7a-5+deb10u2
- transfig <removed>
NOTE: https://sourceforge.net/p/mcj/tickets/61/
NOTE: https://sourceforge.net/p/mcj/fig2dev/ci/41b9bb838a3d544539f6e68aa4f87d70ef7d45ce/ (3.2.8)
CVE-2020-21529 (fig2dev 3.2.7b contains a stack buffer overflow in the bezier_spline f ...)
+ {DLA-2778-1}
- fig2dev 1:3.2.8-1
[buster] - fig2dev <no-dsa> (Minor issue)
- transfig <removed>

© 2014-2024 Faster IT GmbH | imprint | privacy policy