{"affected":[{"ecosystem_specific":{"binaries":[{"transfig":"3.2.8a-1.160.13.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Point of Sale 11 SP3","name":"transfig","purl":"pkg:rpm/suse/transfig&distro=SUSE%20Linux%20Enterprise%20Point%20of%20Sale%2011%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.2.8a-1.160.13.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"transfig":"3.2.8a-1.160.13.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 11 SP4-LTSS","name":"transfig","purl":"pkg:rpm/suse/transfig&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.2.8a-1.160.13.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for transfig fixes the following issues:\n\n- CVE-2021-3561: Fixed global buffer overflow in fig2dev/read.c in function read_colordef() (bsc#1186329).\n- CVE-2019-19797: Fixed out-of-bounds write in read_colordef in read.c (bsc#1159293).\n- CVE-2019-19746: Fixed segmentation fault and out-of-bounds write because of an integer overflow via a large arrow type (bsc#1159130).\n- CVE-2019-19555: Fixed stack-based buffer overflow because of an incorrect sscanf (bsc#1161698).\n- CVE-2019-14275: Fixed stack-based buffer overflow in the calc_arrow function in bound.c (bsc#1143650).\n- CVE-2020-21680: Fixed a stack-based buffer overflow in the put_arrow() component in genpict2e.c (bsc#1189343).\n- CVE-2020-21681: Fixed a global buffer overflow in the set_color component in genge.c (bsc#1189345).\n- CVE-2020-21682: Fixed a global buffer overflow in the set_fill component in genge.c (bsc#1189346).\n- CVE-2020-21683: Fixed a global buffer overflow in the shade_or_tint_name_after_declare_color in genpstricks.c (bsc#1189325).\n\n- Do hardening via compile and linker flags \n- Fixed last added upstream commit (boo#1136882)\n","id":"SUSE-SU-2021:14823-1","modified":"2021-10-06T14:42:40Z","published":"2021-10-06T14:42:40Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2021/suse-su-202114823-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1136882"},{"type":"REPORT","url":"https://bugzilla.suse.com/1143650"},{"type":"REPORT","url":"https://bugzilla.suse.com/1159130"},{"type":"REPORT","url":"https://bugzilla.suse.com/1159293"},{"type":"REPORT","url":"https://bugzilla.suse.com/1161698"},{"type":"REPORT","url":"https://bugzilla.suse.com/1186329"},{"type":"REPORT","url":"https://bugzilla.suse.com/1189325"},{"type":"REPORT","url":"https://bugzilla.suse.com/1189343"},{"type":"REPORT","url":"https://bugzilla.suse.com/1189345"},{"type":"REPORT","url":"https://bugzilla.suse.com/1189346"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-14275"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-19555"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-19746"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-19797"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-21680"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-21681"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-21682"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-21683"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-3561"}],"related":["CVE-2019-14275","CVE-2019-19555","CVE-2019-19746","CVE-2019-19797","CVE-2020-21680","CVE-2020-21681","CVE-2020-21682","CVE-2020-21683","CVE-2021-3561"],"summary":"Security update for transfig","upstream":["CVE-2019-14275","CVE-2019-19555","CVE-2019-19746","CVE-2019-19797","CVE-2020-21680","CVE-2020-21681","CVE-2020-21682","CVE-2020-21683","CVE-2021-3561"]}