You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa transfig

Sigurnosni nedostaci programskog paketa transfig

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LFE

——————————————————————————–
Fedora Update Notification
FEDORA-2020-5d0f0593ae
2020-01-25 06:33:58.982369
——————————————————————————–

Name : transfig
Product : Fedora 31
Version : 3.2.7b
Release : 1.fc31
URL : https://sourceforge.net/projects/mcj/
Summary : Utility for converting FIG files (made by xfig) to other formats
Description :
The transfig utility creates a makefile which translates FIG (created
by xfig) or PIC figures into a specified LaTeX graphics language (for
example, PostScript(TM)). Transfig is used to create TeX documents
which are portable (i.e., they can be printed in a wide variety of
environments).

Install transfig if you need a utility for translating FIG or PIC
figures into certain graphics languages.

——————————————————————————–
Update Information:

– Security fix for CVE-2019-19746, CVE-2019-19797 – New upstream release 3.2.7b
– Add patch fixing CVE-2019-19746 (rhbz#1787040) – Add patch fixing
CVE-2019-19797 (rhbz#1786726)
——————————————————————————–
ChangeLog:

* Wed Jan 15 2020 Hans de Goede <hdegoede@redhat.com> – 1:3.2.7b-1
– New upstream release 3.2.7b
– Add patch fixing CVE-2019-19746 (rhbz#1787040)
– Add patch fixing CVE-2019-19797 (rhbz#1786726)
——————————————————————————–
References:

[ 1 ] Bug #1786726 – CVE-2019-19797 transfig: out-of-bounds write in read_colordef in read.c
https://bugzilla.redhat.com/show_bug.cgi?id=1786726
[ 2 ] Bug #1787040 – CVE-2019-19746 transfig: integer overflow leads to out-of-bounds write in make_arrow in arrow.c
https://bugzilla.redhat.com/show_bug.cgi?id=1787040
——————————————————————————–

This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade –advisory FEDORA-2020-5d0f0593ae’ at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org

AutorToni Vugdelija
Cert idNCERT-REF-2020-01-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostatak programskog paketa fontforge

Otkriven je sigurnosni nedostatak u programskom paketu fontforge za operacijski sustav Fedora. Otkriveni nedostatak potencijalnim napadačima omogućuje izazivanje DoS stanja....

Close