Back to bug 2005473

Who When What Removed Added
Guilherme de Almeida Suckevicz 2021-09-17 18:25:31 UTC Blocks 2005482
Garrett Tucker 2021-09-20 16:28:59 UTC Depends On 2006001, 2006002
Garrett Tucker 2021-09-23 16:37:10 UTC Doc Text In fig2dev 3.2.7b it is possible for an attacker to create a specially crafted file that causes a buffer overflow due to an off by one error during range checking. This leads to a denial of service, impacting availability of the program.
Eric Christensen 2021-09-23 19:36:34 UTC Doc Text In fig2dev 3.2.7b it is possible for an attacker to create a specially crafted file that causes a buffer overflow due to an off by one error during range checking. This leads to a denial of service, impacting availability of the program. In transfig's fig2dev 3.2.7b it is possible for an attacker to create a specially crafted file that causes a buffer overflow due to an off by one error during range checking. This leads to a denial of service, impacting availability of the program.
Red Hat Bugzilla 2021-10-31 23:29:29 UTC CC odubaj
Tomas Hoger 2022-05-17 09:23:59 UTC CC zmiklank
Red Hat Bugzilla 2023-07-07 08:34:21 UTC Assignee security-response-team nobody
Red Hat Bugzilla 2023-07-24 22:55:01 UTC CC panovotn

Back to bug 2005473