[Bug 1926673] Re: Null pointer of fig2dev of gensvg.c in function svg_arrows

2021-05-10 Thread xiao huang
Can you apply for cve for me -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1926673 Title: Null pointer of fig2dev of gensvg.c in function svg_arrows To manage notifications about this bug go to:

[Bug 1929145] [NEW] heap-buffer-overflow of exif.c in function Put16u

2021-05-20 Thread xiao huang
*** This bug is a security vulnerability *** Public security bug reported: Hello Ubuntu Security Team I used aflfuzzer to test jhead and found a overflow vulnerabilities.I mentioned issues - https://github.com/Matthias-Wandel/jhead/issues/36 info: ubuntu 20.04 TLS ``` $ sudo apt search jhead

[Bug 1926677] [NEW] global-buffer-overflow of fix2dev of fig2dev/read.c in function read_objects

2021-04-29 Thread xiao huang
*** This bug is a security vulnerability *** Public security bug reported: Hi I found an crash error. issues: https://sourceforge.net/p/mcj/tickets/116/ commit:https://sourceforge.net/p/mcj/fig2dev/ci/6827c09d2d6491cb2ae3ac7196439ff3aa791fd9/ System info: Ubuntu 20.04 : clang 10.0.0 , gcc

[Bug 1926676] [NEW] global-buffer-overflow of fig2dev of gensvg.c in function arrow_path

2021-04-29 Thread xiao huang
*** This bug is a security vulnerability *** Public security bug reported: Hi I found an overflow error. issues: https://sourceforge.net/p/mcj/tickets/115/ commit: https://sourceforge.net/p/mcj/fig2dev/ci/8c0917994e49110004a6632d0a66ea19501ad39d/ System info: Ubuntu 20.04 : clang 10.0.0 , gcc

[Bug 1926674] [NEW] heap-buffer-overflow of fig2dev of gensvg.c in function gensvg_text

2021-04-29 Thread xiao huang
*** This bug is a security vulnerability *** Public security bug reported: Hi I found an overflow error. issues: https://sourceforge.net/p/mcj/tickets/113/ commit:https://sourceforge.net/p/mcj/fig2dev/ci/f8ce1ff8837056b12c046f56e3b5248b2c8eeaa1/ System info: Ubuntu 20.04 : clang 10.0.0 , gcc

[Bug 1926673] [NEW] Null pointer of fig2dev of gensvg.c in function svg_arrows

2021-04-29 Thread xiao huang
AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /home/hh/Downloads/fig2dev-3.2.8a/fig2dev/dev/gensvg.c:1141:24 in svg_arrows ==3255219==ABORTING ** Affects: xfig (Ubuntu) Importance: Undecided Assignee: xiao huang (shanzhuli) Status: New ** Tags: security *

[Bug 1925467] [NEW] stack-buffer-overflow of text.c in function _import_ansi

2021-04-22 Thread xiao huang
*** This bug is a security vulnerability *** Public security bug reported: Hello ubuntu security team System info: Ubuntu 20.04 : clang 10.0.0 , gcc 9.3.0 Fedora 33: clang 11.0.0 , gcc 10.2.1 libcaca version e4968ba Verification steps: 1.Get the source code of libcaca 2.Compile the libcaca.so

[Bug 1925468] [NEW] stack-buffer-overflow of import.c in function _import_bin

2021-04-22 Thread xiao huang
*** This bug is a security vulnerability *** Public security bug reported: Hello ubuntu security team System info: Ubuntu 20.04 : clang 10.0.0 , gcc 9.3.0 Fedora 33: clang 11.0.0 , gcc 10.2.1 libcaca version e4968ba Verification steps: 1.Get the source code of libcaca 2.Compile the libcaca.so

[Bug 1919305] Re: gpac application crashes on read

2021-04-09 Thread xiao huang
Thanks for you -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to the bug report. https://bugs.launchpad.net/bugs/1919305 Title: gpac application crashes on read To manage notifications about this bug go to:

[Bug 1923273] Re: buffer-overflow on libcaca-0.99.beta20/export.c export_tga, export_troff

2021-04-11 Thread xiao huang
** Summary changed: - libcaca buffer-overflow + buffer-overflow on libcaca-0.99.beta20/export.c export_tga, export_troff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to the bug report. https://bugs.launchpad.net/bugs/1923273 Title:

[Bug 1923273] Re: libcaca buffer-overflow

2021-04-10 Thread xiao huang
source code ## Affected Product Code Base libcaca, 0.99.beta20 Ubuntu 20.04 libcaca 0.99.beta19 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to the bug report. https://bugs.launchpad.net/bugs/1923273 Title: libcaca buffer-overflow To

[Bug 1923273] Re: libcaca buffer-overflow

2021-04-10 Thread xiao huang
Debian 10 libcaca0/now 0.9.beta19-2.1 Fedora 33 Name: libcaca version : 0.99 Release :0.51.beta19.fc33 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to the bug report. https://bugs.launchpad.net/bugs/1923273 Title: libcaca

[Bug 1923538] Re: jhead heap-buffer-overflow of exif.c in function Get16u

2021-04-13 Thread xiao huang
Issues have been assigned numbers CVE-2021-3496 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-3496 ** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to

[Bug 1923273] Re: buffer-overflow on libcaca-0.99.beta20/export.c export_tga, export_troff

2021-04-12 Thread xiao huang
Issues have been assigned numbers CVE-2021-30498、CVE-2021-30499 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-30498 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-30499 -- You received this bug notification because you are a member of Ubuntu Bugs, which

[Bug 1925467] Re: stack-buffer-overflow of text.c in function _import_ansi

2021-04-22 Thread xiao huang
** Description changed: Hello ubuntu security team + + issues: https://github.com/cacalabs/libcaca/issues/55 + System info: Ubuntu 20.04 : clang 10.0.0 , gcc 9.3.0 Fedora 33: clang 11.0.0 , gcc 10.2.1 libcaca version e4968ba Verification steps: 1.Get the source code of

[Bug 1925468] Re: stack-buffer-overflow of import.c in function _import_bin

2021-04-22 Thread xiao huang
** Description changed: Hello ubuntu security team + + issues:https://github.com/cacalabs/libcaca/issues/56 + System info: Ubuntu 20.04 : clang 10.0.0 , gcc 9.3.0 Fedora 33: clang 11.0.0 , gcc 10.2.1 + libcaca version e4968ba Verification steps: 1.Get the source code of