Can you apply for cve for me
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926673
Title:
Null pointer of fig2dev of gensvg.c in function svg_arrows
To manage notifications about this bug go to:
*** This bug is a security vulnerability ***
Public security bug reported:
Hello Ubuntu Security Team
I used aflfuzzer to test jhead and found a overflow vulnerabilities.I
mentioned issues
- https://github.com/Matthias-Wandel/jhead/issues/36
info:
ubuntu 20.04 TLS
```
$ sudo apt search jhead
*** This bug is a security vulnerability ***
Public security bug reported:
Hi
I found an crash error.
issues: https://sourceforge.net/p/mcj/tickets/116/
commit:https://sourceforge.net/p/mcj/fig2dev/ci/6827c09d2d6491cb2ae3ac7196439ff3aa791fd9/
System info:
Ubuntu 20.04 : clang 10.0.0 , gcc
*** This bug is a security vulnerability ***
Public security bug reported:
Hi
I found an overflow error.
issues: https://sourceforge.net/p/mcj/tickets/115/
commit:
https://sourceforge.net/p/mcj/fig2dev/ci/8c0917994e49110004a6632d0a66ea19501ad39d/
System info:
Ubuntu 20.04 : clang 10.0.0 , gcc
*** This bug is a security vulnerability ***
Public security bug reported:
Hi
I found an overflow error.
issues: https://sourceforge.net/p/mcj/tickets/113/
commit:https://sourceforge.net/p/mcj/fig2dev/ci/f8ce1ff8837056b12c046f56e3b5248b2c8eeaa1/
System info:
Ubuntu 20.04 : clang 10.0.0 , gcc
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV
/home/hh/Downloads/fig2dev-3.2.8a/fig2dev/dev/gensvg.c:1141:24 in svg_arrows
==3255219==ABORTING
** Affects: xfig (Ubuntu)
Importance: Undecided
Assignee: xiao huang (shanzhuli)
Status: New
** Tags: security
*
*** This bug is a security vulnerability ***
Public security bug reported:
Hello ubuntu security team
System info:
Ubuntu 20.04 : clang 10.0.0 , gcc 9.3.0
Fedora 33: clang 11.0.0 , gcc 10.2.1
libcaca version e4968ba
Verification steps:
1.Get the source code of libcaca
2.Compile the libcaca.so
*** This bug is a security vulnerability ***
Public security bug reported:
Hello ubuntu security team
System info:
Ubuntu 20.04 : clang 10.0.0 , gcc 9.3.0
Fedora 33: clang 11.0.0 , gcc 10.2.1
libcaca version e4968ba
Verification steps:
1.Get the source code of libcaca
2.Compile the libcaca.so
Thanks for you
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1919305
Title:
gpac application crashes on read
To manage notifications about this bug go to:
** Summary changed:
- libcaca buffer-overflow
+ buffer-overflow on libcaca-0.99.beta20/export.c export_tga, export_troff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1923273
Title:
source code
## Affected Product Code Base
libcaca, 0.99.beta20
Ubuntu 20.04
libcaca 0.99.beta19
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1923273
Title:
libcaca buffer-overflow
To
Debian 10
libcaca0/now 0.9.beta19-2.1
Fedora 33
Name: libcaca
version : 0.99
Release :0.51.beta19.fc33
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1923273
Title:
libcaca
Issues have been assigned numbers CVE-2021-3496
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-3496
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to
Issues have been assigned numbers CVE-2021-30498、CVE-2021-30499
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-30498
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-30499
--
You received this bug notification because you are a member of Ubuntu
Bugs, which
** Description changed:
Hello ubuntu security team
+
+ issues: https://github.com/cacalabs/libcaca/issues/55
+
System info:
Ubuntu 20.04 : clang 10.0.0 , gcc 9.3.0
Fedora 33: clang 11.0.0 , gcc 10.2.1
libcaca version e4968ba
Verification steps:
1.Get the source code of
** Description changed:
Hello ubuntu security team
+
+ issues:https://github.com/cacalabs/libcaca/issues/56
+
System info:
Ubuntu 20.04 : clang 10.0.0 , gcc 9.3.0
Fedora 33: clang 11.0.0 , gcc 10.2.1
+
libcaca version e4968ba
Verification steps:
1.Get the source code of
16 matches
Mail list logo