CVE-2017-16899

NameCVE-2017-16899
DescriptionAn array index error in the fig2dev program in Xfig 3.2.6a allows remote attackers to cause a denial-of-service attack or information disclosure with a maliciously crafted Fig format file, related to a negative font value in dev/gentikz.c, and the read_textobject functions in read.c and read1_3.c.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs881143

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
fig2dev (PTS)stretch (security), stretch (lts), stretch1:3.2.6a-2+deb9u4fixed
buster (security), buster, buster (lts)1:3.2.7a-5+deb10u5fixed
bullseye1:3.2.8-3+deb11u1fixed
bookworm1:3.2.8b-3fixed
sid, trixie1:3.2.9-4fixed
transfig (PTS)jessie, jessie (lts)1:3.2.6a-2~deb8u1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
fig2devsourcestretch1:3.2.6a-2+deb9u1
fig2devsource(unstable)1:3.2.6a-5881143
transfigsourcejessie1:3.2.5.e-4+deb8u1
transfigsource(unstable)(unfixed)

Notes

[wheezy] - transfig <no-dsa> (Minor issue)

Search for package or bug name: Reporting problems