Bug#890086: ufraw-batch: stack buffer overflow while running ufraw-batch

2018-02-10 Thread Joonun Jang
Package: ufraw-batch Version: 0.22-2 Severity: important Tags: security stack buffer overflow running ufraw-batch with "--overwrite poc" option Running 'ufraw-batch --overwrite poc' with the attached file raises stack buffer overflow which may allow a remote attacker to cause unspecified impact

Bug#890016: fig2dev: null dereference while running fig2dev

2018-02-09 Thread Joonun Jang
Package: fig2dev Version: 1:3.2.6a-6 Severity: important Tags: security null dereference running fig2dev with "-L pdf poc" option Running 'fig2dev -L pdf poc' with the attached file raises null dereference which may allow a remote attacker to cause denial-of-service attack I expected the program

Bug#890015: fig2dev: global buffer overflow while running fig2dev

2018-02-09 Thread Joonun Jang
Package: fig2dev Version: 1:3.2.6a-6 Severity: important Tags: security global buffer overflow running fig2dev with "-L pdf poc" option Running 'fig2dev -L pdf poc' with the attached file raises global buffer overflow which may allow a remote attacker to cause unspecified impact including

Bug#889272: jhead: heap buffer overflow while running jhead

2018-02-02 Thread Joonun Jang
Package: jhead Version: 1:3.00-5 Severity: important Tags: security heap buffer overflow running jhead with "poc" option Running 'jhead poc' with the attached file raises heap buffer overflow which may allow a remote attacker to cause unspecified impact including denial-of-service attack I

Bug#889270: advancecomp: heap buffer overflow while running advzip

2018-02-02 Thread Joonun Jang
Package: advancecomp Version: 2.0-1 Severity: important Tags: security heap buffer overflow running advzip with "-l poc" option Running 'advzip -l poc' with the attached file raises heap buffer overflow which may allow a remote attacker to cause unspecified impact including denial-of-service

Bug#889224: gocr: heap buffer overflow while running gocr

2018-02-02 Thread Joonun Jang
Package: gocr Version: 0.49-2+b1 Severity: important Tags: security heap buffer overflow running gocr with "poc" option Running 'gocr poc' with the attached file raises heap buffer overflow which may allow a remote attacker to cause unspecified impact including denial-of-service attack I

Bug#883200: ffmpeg2theora: null pointer dereference while running ffmpege2theora

2017-11-30 Thread Joonun Jang
Package: ffmpeg2theora Version: 0.30-1+b2 Severity: normal Tags: security null pointer dereference while running ffmpeg2theora Running 'ffmpeg2theora poc' with the attached file raises null pointer dereference which may allow a remote attack to cause a denial-of-service attack I expected the

Bug#883198: bs1770gain: use after free while running bs1770gain with "poc output" option

2017-11-30 Thread Joonun Jang
Package: bs1770gain Version: 0.4.12-2+b1 Severity: important Tags: security use after free while running bs1770gain with "poc output" option Running 'bs1770gain poc output' with the attached file raises use after free which may allow a remote attack to cause a denial-of-service attack or other

Bug#881145: sox: null pointer dereference while running play

2017-11-07 Thread Joonun Jang
Package: sox Version: 14.4.1-5+b2 Severity: normal Tags: security null pointer dereference while running play with "poc bass +3" option Running 'play poc bass +3' with the attached file raises null pointer dereference which may allow a remote attack to cause a denial-of-service attack I

Bug#881144: fig2dev: out of bound read while running fig2dev with -L pic option

2017-11-07 Thread Joonun Jang
Package: fig2dev Version: 1:3.2.6a-4 Severity: important Tags: security out of bound read while running fig2dev with -L pic option Running 'fig2dev -L pic poc' with the attached file raises out of bound read bug which may allow a remote attack to cause a denial-of-service attack or information

Bug#881143: fig2dev: out of bound read while running fig2dev with -L tikz

2017-11-07 Thread Joonun Jang
Package: fig2dev Version: 1:3.2.6a-4 Severity: important Tags: security out of bound read while running fig2dev with -L tikz option Running 'fig2dev -L tikz poc' with the attached file raises out of bound read bug which may allow a remote attack to cause a denial-of-service attack or

Bug#881141: gifsicle: out of bound read while running gifsicle

2017-11-07 Thread Joonun Jang
Package: gifsicle Version: 1.90-1 Severity: important Tags: security out of bound read while running gifsicle with "gifsicle --dither --use-col=bw poc -o output" option Running 'gifsicle --dither --use-col=bw poc -o output' with the attached file raises out of bound read which may allow a

Bug#881139: ffmpeg2theora: heap buffer overflow while running ffmpeg2theora

2017-11-07 Thread Joonun Jang
Package: ffmpeg2theora Version: 0.30-1+b2 Severity: important Tags: security heap buffer overflow running ffmpeg2theora with "poc" option Running 'ffmpeg2theora poc' with the attached file raises null pointer dereference which may allow a remote attacker to cause unspecified impact including

Bug#881138: ffmpeg2theora: use uninitialized stack value as a pointer while running ffmpeg2theora

2017-11-07 Thread Joonun Jang
Package: ffmpeg2theora Version: 0.30-1+b2 Severity: important Tags: security use uninitialized stack value as a pointer while running ffmpeg2theora with "poc" option Running 'ffmpeg2theora poc' with the attached file uses uninitialized stack value as a pointer which may allow a remote attacker

Bug#881133: x264: out of bound read while running x264

2017-11-07 Thread Joonun Jang
Package: x264 Version: 2:0.148.2795+gitaaa9aa8-1 Severity: important Tags: security out of bound read while running x264 with "--crf 24 -o output.264 poc" option Running 'x264 --crf 24 -o output.264 poc' with the attached file raises out of bound read which may allow a remote attack to cause a

Bug#881132: bs1770gain: stack buffer overflow while running bs1770gain

2017-11-07 Thread Joonun Jang
Package: bs1770gain Version: 0.4.12-2 Severity: important Tags: security stack buffer overflow while running bs1770gain with "poc -o output" option Running 'bs1770gain poc -o output' with the attached file raises stack buffer overflow which may allow a remote attack to cause a denial-of-service

Bug#881131: bs1770gain: divide by zero while running bs1770gain

2017-11-07 Thread Joonun Jang
Package: bs1770gain Version: 0.4.12-2 Severity: normal Tags: security divide by zero while running bs1770gain with "poc -o output" option Running 'bs1770gain poc -o output' with the attached file raises divide by zero exception which may allow a remote attack to cause a denial-of-service

Bug#881130: vorbis-tools: use uninitialized local value as a pointer running oggenc

2017-11-07 Thread Joonun Jang
Package: vorbis-tools Version: 1.4.0-10+b1 Severity: important Tags: security bad free while running oggenc with "poc -o output" option Running 'oggenc poc -o output' with the attached file raises bad free(use uninitalized local value as a pointer) which may allow a remote attacker to cause

Bug#881123: ffmpeg2theora: null pointer dereference while running ffmpeg2theora

2017-11-07 Thread Joonun Jang
Package: ffmpeg2theora Version: 0.30-1+b2 Severity: normal Tags: security null pointer dereference while running ffmpeg2theora with "poc" option Running 'ffmpeg2theora poc' with the attached file raises null pointer dereference which may allow a remote attack to cause a denial-of-service attack

Bug#881122: ffmpeg2theora: null pointer dereference while running ffmpeg2theora

2017-11-07 Thread Joonun Jang
Package: ffmpeg2theora Version: 0.30-1+b2 Severity: normal Tags: security null pointer dereference while running ffmpeg2theora with "poc" option Running 'ffmpeg2theora poc' with the attached file raises null pointer dereference which may allow a remote attack to cause a denial-of-service attack

Bug#881121: sox: null pointer dereference while running sox

2017-11-07 Thread Joonun Jang
Package: sox Version: 14.4.1-5+b2 Severity: normal Tags: security null pointer dereference while running sox with "poc.aiff output.aiff speed 1.027" option Running 'sox poc.aiff output.aiff speed 1.027' with the attached file raises null pointer dereference which may allow a remote attack to

Bug#881120: gifsicle: use after free while running gifsicle

2017-11-07 Thread Joonun Jang
Package: gifsicle Version: 1.90-1 Severity: important Tags: security use after free while running gifsicle with "poc poc -o output" option Running 'gifsicle poc poc -o output' with the attached file raises use after free which may allow a remote attack to cause a denial-of-service attack or

Bug#881119: gifsicle: double free while running gifsicle

2017-11-07 Thread Joonun Jang
Package: gifsicle Version: 1.90-1 Severity: important Tags: security double free while running 'gifsicle with --delay 50 poc poc -o output' option Running 'gifsicle --delay 50 poc poc -o output' with the attached file raises double free which may allow a remote attacker to cause a

Bug#881019: ffmpeg2theora: null pointer dereference while running ffmpeg2theora with "poc" option

2017-11-06 Thread Joonun Jang
Package: ffmpeg2theora Version: 0.30-1+b2 Severity: normal Tags: security null pointer dereference while running ffmpeg2theora with "poc" option Running 'ffmpeg2theora poc' with the attached file raises null pointer dereference which may allow a remote attack to cause a denial-of-service attack

Bug#878839: optipng: global-buffer-overflow bug while parsing GIF file

2017-10-16 Thread Joonun Jang
Package: optipng Version: 0.7.6-1 Severity: normal Dear Maintainer, global-buffer-overflow bug while parsing GIF file Running 'optipng' with the attached file raises global-buffer-overflow bug, which may allow a remote attacker to cause a denial-of-service attack or other unspecified impact

Bug#878745: ufraw-batch: NULL pointer dereference when running with --conf option

2017-10-16 Thread Joonun Jang
Package: ufraw-batch Version: 0.22-1.1 Severity: normal Dear Maintainer, Running 'ufraw-batch --conf' with the attached file raises a NULL pointer dereference, which may allow a denial-of-service attack of a malicious attacker. I expected the program to terminate without segfault, but the

Bug#878739: gifsicle: double-free bug when running gifdiff

2017-10-16 Thread Joonun Jang
Package: gifsicle Version: 1.90-1 Severity: normal Dear Maintainer, Running 'gifdiff poc poc' with the attached file raises double-free bug, which may allow a remote attacker to cause a denial-of-service attack or other unspecified impact with a crafted file. I expected the program to terminate

Bug#878736: gifsicle: NULL pointer dereference when running gifdiff with attached poc(gifdiff poc poc)

2017-10-16 Thread Joonun Jang
Package: gifsicle Version: 1.90-1 Severity: normal Dear Maintainer, Running 'gifdiff' with the attached file raises a NULL pointer dereference, which may allow a denial-of-service attack of a malicious attacker. I expected the program to terminate without segfault, but the program crashes as

Bug#878734: advancecomp: NULL pointer dereference when running advmng with -l option

2017-10-16 Thread Joonun Jang
Package: advancecomp Version: 2.0-1 Severity: normal Dear Maintainer, Running 'advmng -l' with the attached file raises a NULL pointer dereference, which may allow a denial-of-service attack of a malicious attacker. I expected the program to terminate without segfault, but the program crashes

Bug#878733: ufraw-batch: NULL pointer dereference when running with --conf option

2017-10-16 Thread Joonun Jang
Package: ufraw-batch Version: 0.22-1.1 Severity: normal Dear Maintainer, Running 'ufraw-batch --conf' with the attached file raises a NULL pointer dereference, which may allow a denial-of-service attack of a malicious attacker. I expected the program to terminate without segfault, but the

Bug#878732: ufraw-batch: NULL pointer dereference when running with --conf option

2017-10-16 Thread Joonun Jang
Package: ufraw-batch Version: 0.22-1.1 Severity: normal Dear Maintainer, Running 'ufraw-batch --conf' with the attached file raises a NULL pointer dereference, which may allow a denial-of-service attack of a malicious attacker. I expected the program to terminate without segfault, but the

Bug#878731: gif2png: NULL pointer dereference when running with -r option

2017-10-16 Thread Joonun Jang
Package: gif2png Version: 2.5.8-1+b2 Severity: normal Dear Maintainer, Running 'gif2png -r' with the attached file raises a NULL pointer dereference, which may allow a denial-of-service attack of a malicious attacker. I expected the program to terminate without segfault, but the program crashes