In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade Debian:unstable
fig2dev
to version 1:3.2.9a-2 or higher.
Note: Versions mentioned in the description apply only to the upstream fig2dev
package and not the fig2dev
package as distributed by Debian
.
See How to fix?
for Debian:unstable
relevant fixed versions and status.
heap-buffer overflow in fig2dev in version 3.2.9a allows an attacker to availability via local input manipulation via create_line_with_spline.