Back to bug 2006516
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Guilherme de Almeida Suckevicz | 2021-09-21 18:42:56 UTC | Depends On | 2006517 | |
| Guilherme de Almeida Suckevicz | 2021-09-21 18:43:09 UTC | Blocks | 2006518 | |
| Red Hat Bugzilla | 2021-10-31 23:29:22 UTC | Depends On | 2006831, 2006830 | |
| Doc Text | The transfig package is susceptible to a NULL pointer dereference on crafted input. While translating fig code, patterns which include incomplete closed splines lead to this software flaw. The highest threat from this vulnerability is availability. | |||
| Fixed In Version | transfig 3.2.8 | |||
| CC | odubaj | |||
| Tomas Hoger | 2022-05-17 09:24:50 UTC | CC | zmiklank | |
| Red Hat Bugzilla | 2023-07-07 08:33:07 UTC | Assignee | security-response-team | nobody |
| Red Hat Bugzilla | 2023-07-24 22:54:59 UTC | CC | panovotn |
Back to bug 2006516