New Debian fig2dev 1:3.2.8b-3+deb12u2 fixes: This update addresses the following issues: * In xfig diagramming tool, a stack-overflow while running fig2dev allows memory corruption via local input manipulation at the bezier_spline function. (CVE-2025-46397) * In xfig diagramming tool, a stack-overflow while running fig2dev allows memory corruption via local input manipulation via read_objects function. (CVE-2025-46398) * A flaw was found in fig2dev. This vulnerability allows availability via local input manipulation via genge_itp_spline function. (CVE-2025-46399) * In xfig diagramming tool, a segmentation fault while running fig2dev allows an attacker to availability via local input manipulation via read_arcobject function. (CVE-2025-46400)
--- mirror/ftp/pool/main/f/fig2dev/fig2dev_3.2.8b-3+deb12u1.dsc +++ apt/ucs_5.2-0-errata5.2-3/source/fig2dev_3.2.8b-3+deb12u2.dsc @@ -1,3 +1,10 @@ +1:3.2.8b-3+deb12u2 [Fri, 25 Apr 2025 09:55:59 +0200] Roland Rosenfeld <roland@debian.org>: + + * 41_CVE-2025-46397: Detect nan in spline control values. + * 42_CVE-2025-46398: Permit \0 in 2nd line in fig file. + * 43_CVE-2025-46399: ge output: correct spline computation. + * 44_CVE-2025-46400: Reject arcs with a radius smaller than 3. + 1:3.2.8b-3+deb12u1 [Fri, 28 Mar 2025 22:51:19 +0100] Roland Rosenfeld <roland@debian.org>: * 38_CVE-2025-31162: Reject huge pattern lengths. <http://piuparts.knut.univention.de/5.2-3/#724370315785103065>
OK: bug OK: yaml OK: announce_errata OK: patch OK: piuparts [5.2-3] 877bf603fb Bug #58710: fig2dev 1:3.2.8b-3+deb12u2 doc/errata/staging/fig2dev.yaml | 16 ++++++++++++++++ 1 file changed, 16 insertions(+)
<https://errata.software-univention.de/#/?erratum=5.2x252>