diff options
author | security tracker role <sectracker@soriano.debian.org> | 2021-10-04 08:10:34 +0000 |
---|---|---|
committer | security tracker role <sectracker@soriano.debian.org> | 2021-10-04 08:10:34 +0000 |
commit | 997fd0dc344a453891aed9b38f092b6046e034d9 (patch) | |
tree | 3b484288c2e52133f8776ba83feb6694a21272ae /data/CVE/list.2020 | |
parent | 2b38656cc814cbda3197a2b293d42f7c692459df (diff) |
automatic update
Diffstat (limited to 'data/CVE/list.2020')
-rw-r--r-- | data/CVE/list.2020 | 9 |
1 files changed, 9 insertions, 0 deletions
diff --git a/data/CVE/list.2020 b/data/CVE/list.2020 index f81f54ffe5..1e5eb2c8ac 100644 --- a/data/CVE/list.2020 +++ b/data/CVE/list.2020 @@ -21912,6 +21912,7 @@ CVE-2020-21677 (A heap-based buffer overflow in the sixel_encoder_output_without NOTE: https://github.com/saitoha/libsixel/issues/123 NOTE: https://github.com/saitoha/libsixel/commit/0b1e0b3f7b44233f84e5c9f512f8c90d6bbbe33d CVE-2020-21676 (A stack-based buffer overflow in the genpstrx_text() component in genp ...) + {DLA-2778-1} - fig2dev 1:3.2.8-1 [buster] - fig2dev <no-dsa> (Minor issue) [stretch] - fig2dev <not-affected> (Vulnerable code introduced later) @@ -21920,6 +21921,7 @@ CVE-2020-21676 (A stack-based buffer overflow in the genpstrx_text() component i NOTE: https://sourceforge.net/p/mcj/fig2dev/ci/acccc89c20206a5db1f463438ba444e35bcb400e/ (3.2.8) NOTE: Introduced by https://sourceforge.net/p/mcj/fig2dev/ci/102f607eea49785d4a9c9c24af85f046c23674de (3.2.7) CVE-2020-21675 (A stack-based buffer overflow in the genptk_text component in genptk.c ...) + {DLA-2778-1} - fig2dev 1:3.2.7b-3 [buster] - fig2dev 1:3.2.7a-5+deb10u3 - transfig <removed> @@ -22267,24 +22269,28 @@ CVE-2020-21537 CVE-2020-21536 RESERVED CVE-2020-21535 (fig2dev 3.2.7b contains a segmentation fault in the gencgm_start funct ...) + {DLA-2778-1} - fig2dev 1:3.2.7b-3 [buster] - fig2dev 1:3.2.7a-5+deb10u2 - transfig <removed> NOTE: https://sourceforge.net/p/mcj/tickets/62/ NOTE: https://sourceforge.net/p/mcj/fig2dev/ci/41b9bb838a3d544539f6e68aa4f87d70ef7d45ce/ (3.2.8) CVE-2020-21534 (fig2dev 3.2.7b contains a global buffer overflow in the get_line funct ...) + {DLA-2778-1} - fig2dev 1:3.2.7b-3 [buster] - fig2dev 1:3.2.7a-5+deb10u2 - transfig <removed> NOTE: https://sourceforge.net/p/mcj/tickets/58/ NOTE: https://sourceforge.net/p/mcj/fig2dev/ci/41b9bb838a3d544539f6e68aa4f87d70ef7d45ce/ (3.2.8) CVE-2020-21533 (fig2dev 3.2.7b contains a stack buffer overflow in the read_textobject ...) + {DLA-2778-1} - fig2dev 1:3.2.7b-3 [buster] - fig2dev 1:3.2.7a-5+deb10u2 - transfig <removed> NOTE: https://sourceforge.net/p/mcj/tickets/59/ NOTE: https://sourceforge.net/p/mcj/fig2dev/ci/41b9bb838a3d544539f6e68aa4f87d70ef7d45ce/ (3.2.8) CVE-2020-21532 (fig2dev 3.2.7b contains a global buffer overflow in the setfigfont fun ...) + {DLA-2778-1} - fig2dev 1:3.2.8-1 [buster] - fig2dev <no-dsa> (Minor issue) - transfig <removed> @@ -22292,18 +22298,21 @@ CVE-2020-21532 (fig2dev 3.2.7b contains a global buffer overflow in the setfigfo NOTE: https://sourceforge.net/p/mcj/fig2dev/ci/421afa17d8cb8dafcaf3e6044a70790fa4fe307b/ (3.2.8) NOTE: https://sourceforge.net/p/mcj/fig2dev/ci/00cdedac7a0b029846dee891769a1e77df83a01b/ (3.2.8) CVE-2020-21531 (fig2dev 3.2.7b contains a global buffer overflow in the conv_pattern_i ...) + {DLA-2778-1} - fig2dev 1:3.2.8-1 [buster] - fig2dev <no-dsa> (Minor issue) - transfig <removed> NOTE: https://sourceforge.net/p/mcj/tickets/63/ NOTE: https://sourceforge.net/p/mcj/fig2dev/ci/2f8d1ae9763dcdc99b88a2b14849fe37174bcd69/ (3.2.8) CVE-2020-21530 (fig2dev 3.2.7b contains a segmentation fault in the read_objects funct ...) + {DLA-2778-1} - fig2dev 1:3.2.7b-3 [buster] - fig2dev 1:3.2.7a-5+deb10u2 - transfig <removed> NOTE: https://sourceforge.net/p/mcj/tickets/61/ NOTE: https://sourceforge.net/p/mcj/fig2dev/ci/41b9bb838a3d544539f6e68aa4f87d70ef7d45ce/ (3.2.8) CVE-2020-21529 (fig2dev 3.2.7b contains a stack buffer overflow in the bezier_spline f ...) + {DLA-2778-1} - fig2dev 1:3.2.8-1 [buster] - fig2dev <no-dsa> (Minor issue) - transfig <removed> |