A stack-based buffer overflow in the genptk_text component in genptk.c of fig2dev 3.2.7b allows attackers to cause a denial of service (DOS) via converting a xfig file into ptk format. References: https://sourceforge.net/p/mcj/tickets/78/
Hi, can you please create a tracking issues for a specific versions of RHEL/Fedora, which are affected by the newly created CVEs? I see multiple CVE trackers created recently and for the process of backporting the fixes to continue correctly, we need tracker for every affected version for every CVE. Can you please handle this ? From the first sight, I assume rhel-9 and Fedora should be affected. Thanks.
In reply to comment #1: > Hi, > > can you please create a tracking issues for a specific versions of > RHEL/Fedora, which are affected by the newly created CVEs? I see multiple > CVE trackers created recently and for the process of backporting the fixes > to continue correctly, we need tracker for every affected version for every > CVE. Can you please handle this ? From the first sight, I assume rhel-9 and > Fedora should be affected. > > Thanks. Hey, Based on our Manifest and version Fedora doesn't seem affected. This is shipped in Fedora(fedora:34/transfig-3.2.8a-2.fc34) rhel-9 is probably affected, Other rhel versions need to be checked over by analysts first I can create rhel-9 trackers, wondering if it's fine for you to have all the cves linked into one tracker bug or do prefer separate trackers?
Hi, One tracker should be enough, thank you.