Back to bug 2005467
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Guilherme de Almeida Suckevicz | 2021-09-17 18:25:31 UTC | Blocks | 2005482 | |
| Garrett Tucker | 2021-09-17 21:00:44 UTC | Depends On | 2005518, 2005517 | |
| Garrett Tucker | 2021-09-23 16:30:58 UTC | Doc Text | In fig2dev 3.2.7b it is possible for an attacker to create a specially crafted file that causes a stack buffer overflow due to improper range checks. This leads to a denial of service, impacting availability of the program. | |
| Eric Christensen | 2021-09-23 19:31:49 UTC | Doc Text | In fig2dev 3.2.7b it is possible for an attacker to create a specially crafted file that causes a stack buffer overflow due to improper range checks. This leads to a denial of service, impacting availability of the program. | In transfig's fig2dev 3.2.7b it is possible for an attacker to create a specially crafted file that causes a stack buffer overflow due to improper range checks. This leads to a denial of service, impacting availability of the program. |
| Red Hat Bugzilla | 2021-10-31 23:29:21 UTC | CC | odubaj | |
| Tomas Hoger | 2022-05-17 09:23:57 UTC | CC | zmiklank | |
| Red Hat Bugzilla | 2023-07-07 08:30:29 UTC | Assignee | security-response-team | nobody |
| Red Hat Bugzilla | 2023-07-24 22:54:59 UTC | CC | panovotn |
Back to bug 2005467