Package: ufraw-batch
Version: 0.22-2
Severity: important
Tags: security
stack buffer overflow running ufraw-batch with "--overwrite poc" option
Running 'ufraw-batch --overwrite poc' with the attached file raises stack
buffer overflow
which may allow a remote attacker to cause unspecified impact
Package: fig2dev
Version: 1:3.2.6a-6
Severity: important
Tags: security
null dereference running fig2dev with "-L pdf poc" option
Running 'fig2dev -L pdf poc' with the attached file raises null dereference
which may allow a remote attacker to cause denial-of-service attack
I expected the program
Package: fig2dev
Version: 1:3.2.6a-6
Severity: important
Tags: security
global buffer overflow running fig2dev with "-L pdf poc" option
Running 'fig2dev -L pdf poc' with the attached file raises global buffer
overflow
which may allow a remote attacker to cause unspecified impact including
denia
Package: jhead
Version: 1:3.00-5
Severity: important
Tags: security
heap buffer overflow running jhead with "poc" option
Running 'jhead poc' with the attached file raises heap buffer overflow
which may allow a remote attacker to cause unspecified impact including
denial-of-service attack
I expec
Package: advancecomp
Version: 2.0-1
Severity: important
Tags: security
heap buffer overflow running advzip with "-l poc" option
Running 'advzip -l poc' with the attached file raises heap buffer overflow
which may allow a remote attacker to cause unspecified impact including
denial-of-service att
Package: gocr
Version: 0.49-2+b1
Severity: important
Tags: security
heap buffer overflow running gocr with "poc" option
Running 'gocr poc' with the attached file raises heap buffer overflow
which may allow a remote attacker to cause unspecified impact including
denial-of-service attack
I expecte
Package: ffmpeg2theora
Version: 0.30-1+b2
Severity: normal
Tags: security
null pointer dereference while running ffmpeg2theora
Running 'ffmpeg2theora poc' with the attached file raises null pointer
dereference
which may allow a remote attack to cause a denial-of-service attack
I expected the pr
Package: bs1770gain
Version: 0.4.12-2+b1
Severity: important
Tags: security
use after free while running bs1770gain with "poc output" option
Running 'bs1770gain poc output' with the attached file raises use after free
which may allow a remote attack to cause a denial-of-service attack or other
u
Package: sox
Version: 14.4.1-5+b2
Severity: normal
Tags: security
null pointer dereference while running play with "poc bass +3" option
Running 'play poc bass +3' with the attached file raises null pointer
dereference
which may allow a remote attack to cause a denial-of-service attack
I expected
Package: fig2dev
Version: 1:3.2.6a-4
Severity: important
Tags: security
out of bound read while running fig2dev with -L pic option
Running 'fig2dev -L pic poc' with the attached file raises out of bound read bug
which may allow a remote attack to cause a denial-of-service attack or
information
d
Package: fig2dev
Version: 1:3.2.6a-4
Severity: important
Tags: security
out of bound read while running fig2dev with -L tikz option
Running 'fig2dev -L tikz poc' with the attached file raises out of bound read
bug
which may allow a remote attack to cause a denial-of-service attack or
informatio
Package: gifsicle
Version: 1.90-1
Severity: important
Tags: security
out of bound read while running gifsicle with "gifsicle --dither --use-col=bw
poc -o output" option
Running 'gifsicle --dither --use-col=bw poc -o output' with the attached file
raises out of bound read
which may allow a remot
Package: ffmpeg2theora
Version: 0.30-1+b2
Severity: important
Tags: security
heap buffer overflow running ffmpeg2theora with "poc" option
Running 'ffmpeg2theora poc' with the attached file raises null pointer
dereference
which may allow a remote attacker to cause unspecified impact including
de
Package: ffmpeg2theora
Version: 0.30-1+b2
Severity: important
Tags: security
use uninitialized stack value as a pointer while running ffmpeg2theora with
"poc" option
Running 'ffmpeg2theora poc' with the attached file uses uninitialized stack
value as a pointer
which may allow a remote attacker
Package: x264
Version: 2:0.148.2795+gitaaa9aa8-1
Severity: important
Tags: security
out of bound read while running x264 with "--crf 24 -o output.264 poc" option
Running 'x264 --crf 24 -o output.264 poc' with the attached file raises out of
bound read
which may allow a remote attack to cause a d
Package: bs1770gain
Version: 0.4.12-2
Severity: important
Tags: security
stack buffer overflow while running bs1770gain with "poc -o output" option
Running 'bs1770gain poc -o output' with the attached file raises stack buffer
overflow
which may allow a remote attack to cause a denial-of-service
Package: bs1770gain
Version: 0.4.12-2
Severity: normal
Tags: security
divide by zero while running bs1770gain with "poc -o output" option
Running 'bs1770gain poc -o output' with the attached file raises divide by zero
exception
which may allow a remote attack to cause a denial-of-service attack.
Package: vorbis-tools
Version: 1.4.0-10+b1
Severity: important
Tags: security
bad free while running oggenc with "poc -o output" option
Running 'oggenc poc -o output' with the attached file raises
bad free(use uninitalized local value as a pointer)
which may allow a remote attacker to cause unspe
Package: ffmpeg2theora
Version: 0.30-1+b2
Severity: normal
Tags: security
null pointer dereference while running ffmpeg2theora with "poc" option
Running 'ffmpeg2theora poc' with the attached file raises null pointer
dereference
which may allow a remote attack to cause a denial-of-service attack
Package: ffmpeg2theora
Version: 0.30-1+b2
Severity: normal
Tags: security
null pointer dereference while running ffmpeg2theora with "poc" option
Running 'ffmpeg2theora poc' with the attached file raises null pointer
dereference
which may allow a remote attack to cause a denial-of-service attack
Package: sox
Version: 14.4.1-5+b2
Severity: normal
Tags: security
null pointer dereference while running sox with "poc.aiff output.aiff speed
1.027" option
Running 'sox poc.aiff output.aiff speed 1.027' with the attached file raises
null pointer dereference
which may allow a remote attack to ca
Package: gifsicle
Version: 1.90-1
Severity: important
Tags: security
use after free while running gifsicle with "poc poc -o output" option
Running 'gifsicle poc poc -o output' with the attached file raises use after
free
which may allow a remote attack to cause a denial-of-service attack or othe
Package: gifsicle
Version: 1.90-1
Severity: important
Tags: security
double free while running 'gifsicle with --delay 50 poc poc -o output' option
Running 'gifsicle --delay 50 poc poc -o output' with the attached file raises
double free
which may allow a remote attacker to cause a denial-of-serv
Package: ffmpeg2theora
Version: 0.30-1+b2
Severity: normal
Tags: security
null pointer dereference while running ffmpeg2theora with "poc" option
Running 'ffmpeg2theora poc' with the attached file raises null pointer
dereference
which may allow a remote attack to cause a denial-of-service attack
Package: optipng
Version: 0.7.6-1
Severity: normal
Dear Maintainer,
global-buffer-overflow bug while parsing GIF file
Running 'optipng' with the attached file raises global-buffer-overflow
bug,
which may allow a remote attacker to cause a denial-of-service attack or
other unspecified impact with
Package: ufraw-batch
Version: 0.22-1.1
Severity: normal
Dear Maintainer,
Running 'ufraw-batch --conf' with the attached file raises a NULL
pointer
dereference, which may allow a denial-of-service attack of a malicious
attacker.
I expected the program to terminate without segfault, but the progra
Package: gifsicle
Version: 1.90-1
Severity: normal
Dear Maintainer,
Running 'gifdiff poc poc' with the attached file raises double-free bug,
which may allow a remote attacker to cause a denial-of-service attack or
other unspecified impact with a crafted file.
I expected the program to terminate
Package: gifsicle
Version: 1.90-1
Severity: normal
Dear Maintainer,
Running 'gifdiff' with the attached file raises a NULL pointer
dereference, which may allow a denial-of-service attack of a malicious
attacker.
I expected the program to terminate without segfault, but the program
crashes as fol
Package: advancecomp
Version: 2.0-1
Severity: normal
Dear Maintainer,
Running 'advmng -l' with the attached file raises a NULL pointer
dereference, which may allow a denial-of-service attack of a malicious
attacker.
I expected the program to terminate without segfault, but the program
crashes as
Package: ufraw-batch
Version: 0.22-1.1
Severity: normal
Dear Maintainer,
Running 'ufraw-batch --conf' with the attached file raises a NULL
pointer
dereference, which may allow a denial-of-service attack of a malicious
attacker.
I expected the program to terminate without segfault, but the progra
Package: ufraw-batch
Version: 0.22-1.1
Severity: normal
Dear Maintainer,
Running 'ufraw-batch --conf' with the attached file raises a NULL
pointer
dereference, which may allow a denial-of-service attack of a malicious
attacker.
I expected the program to terminate without segfault, but the progra
Package: gif2png
Version: 2.5.8-1+b2
Severity: normal
Dear Maintainer,
Running 'gif2png -r' with the attached file raises a NULL pointer
dereference, which may allow a denial-of-service attack of a malicious
attacker.
I expected the program to terminate without segfault, but the program
crashes
32 matches
Mail list logo