Package: fig2dev / 1:3.2.6a-2+deb9u3
Metadata
Package | Version | Patches format |
---|---|---|
fig2dev | 1:3.2.6a-2+deb9u3 | 3.0 (quilt) |
Patch series
view the series filePatch | File delta | Description |
---|---|---|
14_fig2mpdf.patch | (download) |
fig2dev/dev/genpstex.c |
331 331 + 0 - 0 ! |
creating multilayered or singlelayer pdf or eps figures for including into LaTeX documents. |
15_fig2mpdf doc.patch | (download) |
fig2mpdf/doc/Makefile |
11 11 + 0 - 0 ! |
fig2mpdf 1.2 documentation |
28_fix_fig2dev_chmod.patch | (download) |
fig2dev/dev/genpstex.c |
1 1 + 0 - 0 ! |
the missing sys/stat.h prototype leads to an implicit declaration of fchmod(), which uses signed int while kFreeBSD expects unsigned int, which results in a wrong bitmap, which leads to a build failure. This is only required for the fig2mpdf patch. Bug-Debian: http://bugs.debian.org/654767 |
29_RGBFILE.patch | (download) |
fig2dev/colors.c |
10 8 + 2 - 0 ! |
rgb.txt can not be located via fig2dev_rgbfile environment variable. This allows to run the test suite without the package being installed before. |
31_input_sanitizing.patch | (download) |
fig2dev/read.c |
8 7 + 1 - 0 ! |
cve-2017-16899 some input sanitizing when reading fig files. Bug-Debian: https://bugs.debian.org/881143 Bug-Debian: https://bugs.debian.org/881144 |
32_fill style overflow.patch | (download) |
fig2dev/read.c |
6 6 + 0 - 0 ! |
sanitize input of fill patterns. Bug-Debian: https://bugs.debian.org/881396 |
40_circle_arrowhead.patch | (download) |
fig2dev/bound.c |
6 3 + 3 - 0 ! |
allow circle arrowheads when mag >= 42, ticket #52 Circle and half-circle arrowheads would be drawn with 40 + mag/4 points by calc_arrow() in bound.c. However, the point arrays passed to calc_arrow() would only contain 50 points. With a magnification >= 42, a buffer overrun would occur. Simply use 40 points, independent of magnification. . This fixes CVE-2019-14275 |
41_CVE 2019 19555.patch | (download) |
fig2dev/read.c |
3 2 + 1 - 0 ! |
allow fig v2 text strings ending with multiple ^a. This fixes CVE-2019-19555 |