CVE-2021-32280
Publication date 20 September 2021
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
An issue was discovered in fig2dev before 3.2.8.. A NULL pointer dereference exists in the function compute_closed_spline() located in trans_spline.c. It allows an attacker to cause Denial of Service. The fixed version of fig2dev is 3.2.8.
Status
Package | Ubuntu Release | Status |
---|---|---|
fig2dev | 24.10 oracular |
Not affected
|
24.04 LTS noble |
Not affected
|
|
22.04 LTS jammy |
Not affected
|
|
20.04 LTS focal |
Fixed 1:3.2.7a-7ubuntu0.1
|
|
18.04 LTS bionic |
Fixed 1:3.2.6a-6ubuntu1.1
|
|
16.04 LTS xenial | Ignored end of standard support | |
14.04 LTS trusty | Not in release | |
transfig | 24.10 oracular | Not in release |
24.04 LTS noble | Not in release | |
22.04 LTS jammy | Not in release | |
20.04 LTS focal | Not in release | |
18.04 LTS bionic | Not in release | |
16.04 LTS xenial |
Vulnerable
|
|
14.04 LTS trusty | Not in release | |
xfig | 24.10 oracular |
Not affected
|
24.04 LTS noble |
Not affected
|
|
22.04 LTS jammy |
Not affected
|
|
20.04 LTS focal |
Not affected
|
|
18.04 LTS bionic |
Not affected
|
|
16.04 LTS xenial |
Vulnerable
|
|
14.04 LTS trusty | Not in release |
Notes
leosilva
fig2dev is a dependency for xfig and this issue would only affected xfig it if fig2dev is installed. Marking all xfig as not affected as that issue should be fixed in fig2dev.
Severity score breakdown
Parameter | Value |
---|---|
Base score | 5.5 · Medium |
Attack vector | Local |
Attack complexity | Low |
Privileges required | None |
User interaction | Required |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | None |
Availability impact | High |
Vector | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-5864-1
- Fig2dev vulnerabilities
- 13 February 2023