** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1533451
Title:
out-of-bounds read in MagickCore/pixel-accessor.h:778
SetPixelViaP
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1533445
Title:
out-of-bounds read in coders/rle.c:590 ReadRLEImage
To manage notif
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1533449
Title:
out-of-bounds read in coders/pict.c:633 EncodeImage
To manage notif
*** This bug is a security vulnerability ***
Public security bug reported:
This bug was found while fuzzing ImageMagick with afl-fuzz
Tested on ImageMagick version d8382f9c0ffa52057271a6a323e7e062f0fe4ff6
Command: magick infile /dev/null
Build info:
#Configure command:
CC=afl-clang-fast CXX=a
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1533447
Title:
out-of-bounds read in coders/sun.c:499 ReadSUNImage
To manage notif
** Summary changed:
- heap-buffer-overflow in coders/pict.c:633 EncodeImage
+ out-of-bounds read in coders/pict.c:633 EncodeImage
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1533449
Title:
out-of
** Summary changed:
- heap-buffer-overflow in coders/rle.c:590 ReadRLEImage
+ out-of-bounds read in coders/rle.c:590 ReadRLEImage
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1533445
Title:
out-of
*** This bug is a duplicate of bug 1533452 ***
https://bugs.launchpad.net/bugs/1533452
** Summary changed:
- heap-buffer-overflow in coders/psd.c:797 ReadPSDChannelPixels
+ out-of-bounds read in coders/psd.c:797 ReadPSDChannelPixels
** Information type changed from Public to Public Security
** Summary changed:
- heap-buffer-overflow in MagickCore/pixel-accessor.h:778 SetPixelViaPixelInfo
+ out-of-bounds read in MagickCore/pixel-accessor.h:778 SetPixelViaPixelInfo
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bu
** Summary changed:
- heap-buffer-overflow in coders/sun.c:499 ReadSUNImage
+ out-of-bounds read in coders/sun.c:499 ReadSUNImage
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1533447
Title:
out-of
** Summary changed:
- out-of-bounds read in coders/psd.c:797 ReadPSDChannelPixels
+ out-of-bounds read in coders/coders/viff.c:445 ReadVIFFImage
** Summary changed:
- out-of-bounds read in coders/coders/viff.c:445 ReadVIFFImage
+ out-of-bounds read in coders/viff.c:445 ReadVIFFImage
--
You rec
** This bug is no longer a duplicate of bug 1533452
out-of-bounds read in coders/viff.c:445 ReadVIFFImage
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1533442
Title:
out-of-bounds read in coders
https://github.com/ImageMagick/ImageMagick/issues/78
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1533451
Title:
out-of-bounds read in MagickCore/pixel-accessor.h:778
SetPixelViaPixelInfo
To man
https://github.com/ImageMagick/ImageMagick/issues/80
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1533449
Title:
out-of-bounds read in coders/pict.c:633 EncodeImage
To manage notifications about t
https://github.com/ImageMagick/ImageMagick/issues/79
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1533450
Title:
heap-buffer-overflow in coders/psd.c:2240 PSDPackbitsEncodeImage
To manage notifica
https://github.com/ImageMagick/ImageMagick/issues/77
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1533452
Title:
out-of-bounds read in coders/viff.c:445 ReadVIFFImage
To manage notifications about
https://github.com/ImageMagick/ImageMagick/issues/81
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1533447
Title:
out-of-bounds read in coders/sun.c:499 ReadSUNImage
To manage notifications about t
https://github.com/ImageMagick/ImageMagick/issues/82
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1533445
Title:
out-of-bounds read in coders/rle.c:590 ReadRLEImage
To manage notifications about t
https://github.com/ImageMagick/ImageMagick/issues/83
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1533442
Title:
out-of-bounds read in coders/psd.c:797 ReadPSDChannelPixels
To manage notifications
** Attachment added: "poc2_sun.c_501"
https://bugs.launchpad.net/ubuntu/+source/imagemagick/+bug/1533447/+attachment/4550177/+files/id%3A31%2Csig%3A06%2Csrc%3A001500%2Cop%3Aflip1%2Cpos%3A15
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed
** Attachment added: "poc2_psd.c_797"
https://bugs.launchpad.net/ubuntu/+source/imagemagick/+bug/1533442/+attachment/4550176/+files/id%3A17%2Csig%3A06%2Csrc%3A000431%2Cop%3Aarith8%2Cpos%3A23%2Cval%3A-7
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is
** Attachment added: "poc2"
https://bugs.launchpad.net/ubuntu/+source/imagemagick/+bug/1533452/+attachment/4550180/+files/id%3A71%2Csig%3A06%2Csrc%3A002008%2Cop%3Aflip1%2Cpos%3A580
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu
** Attachment added: "poc4_psd.c_797"
https://bugs.launchpad.net/ubuntu/+source/imagemagick/+bug/1533442/+attachment/4550515/+files/id%3A55%2Csig%3A06%2Csrc%3A001837%2Cop%3Aarith8%2Cpos%3A23%2Cval%3A-15
--
You received this bug notification because you are a member of Ubuntu
Bugs, which i
** Attachment added: "poc3_psd.c_797"
https://bugs.launchpad.net/ubuntu/+source/imagemagick/+bug/1533442/+attachment/4550514/+files/id%3A18%2Csig%3A06%2Csrc%3A000431%2Cop%3Aint32%2Cpos%3A22%2Cval%3A+256
--
You received this bug notification because you are a member of Ubuntu
Bugs, which i
*** This bug is a security vulnerability ***
Public security bug reported:
This bug was found while fuzzing ImageMagick with afl-fuzz
Tested on ImageMagick git commit
26ac8585e46188a648abf5fa3a1a7d264d8b3cb9
Command: magick id:000362,sig:06,src:008726,op:havoc,rep:4 /dev/null
=
input file to trigger crash
** Attachment added: "id:000362,sig:06,src:008726,op:havoc,rep:4"
https://bugs.launchpad.net/bugs/1553360/+attachment/4588675/+files/id%3A000362%2Csig%3A06%2Csrc%3A008726%2Cop%3Ahavoc%2Crep%3A4
--
You received this bug notification because you are a member of Ubun
*** This bug is a security vulnerability ***
Public security bug reported:
This bug was found while fuzzing ImageMagick with afl-fuzz
Tested on ImageMagick git commit
26ac8585e46188a648abf5fa3a1a7d264d8b3cb9
Command: magick id:000419,sig:06,src:001803+004110,op:splice,rep:2
/dev/null
=
input file to trigger crash
** Attachment added: "id:000419,sig:06,src:001803+004110,op:splice,rep:2"
https://bugs.launchpad.net/bugs/1553366/+attachment/4588703/+files/id%3A000419%2Csig%3A06%2Csrc%3A001803+004110%2Cop%3Asplice%2Crep%3A2
--
You received this bug notification because you are
https://github.com/ImageMagick/ImageMagick/issues/143
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1553366
Title:
out-of-bounds read in MagickCore/memory.c:708
To manage notifications about this b
https://github.com/ImageMagick/ImageMagick/issues/144
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1553360
Title:
out-of-bounds read in MagickCore/memory.c:719
To manage notifications about this b
input file to trigger crash
** Attachment added: "id:43,sig:06,src:000224,op:flip1,pos:15"
https://bugs.launchpad.net/bugs/1545180/+attachment/4570514/+files/id%3A43%2Csig%3A06%2Csrc%3A000224%2Cop%3Aflip1%2Cpos%3A15
--
You received this bug notification because you are a member of Ub
*** This bug is a security vulnerability ***
Public security bug reported:
This bug was found while fuzzing ImageMagick with afl-fuzz
Tested on ImageMagick git commit
Command: magick id:43,sig:06,src:000224,op:flip1,pos:15 /dev/null
magick: InvalidLength
`/home/user/Desktop/FuzzImageMagi
input file to trigger crash
** Attachment added: "id:97,sig:06,src:000777,op:flip4,pos:520"
https://bugs.launchpad.net/bugs/1545183/+attachment/4570516/+files/id%3A97%2Csig%3A06%2Csrc%3A000777%2Cop%3Aflip4%2Cpos%3A520
--
You received this bug notification because you are a member of
*** This bug is a security vulnerability ***
Public security bug reported:
This bug was found while fuzzing ImageMagick with afl-fuzz
Tested on ImageMagick git commit
Command: magick id:97,sig:06,src:000777,op:flip4,pos:520 /dev/null
===
https://github.com/ImageMagick/ImageMagick/issues/128
** Summary changed:
- out-of-bounds write in
fuzz_results_2016_02_12/fuzzer01/crashes/id:43,sig:06,src:000224,op:flip1,pos:15'
@ error/psd.c/ReadPSDChannelRLE/1002.
+ out-of-bounds write in coders/psd.c:2225
--
You received this bug no
https://github.com/ImageMagick/ImageMagick/issues/129
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1545183
Title:
out-of-bounds read in ImageMagick/coders/viff.c:692:35
To manage notifications abo
input file to trigger crash
** Attachment added: "id:000224,sig:06,src:004192+004496,op:splice,rep:128"
https://bugs.launchpad.net/bugs/1545366/+attachment/4571281/+files/id%3A000224%2Csig%3A06%2Csrc%3A004192+004496%2Cop%3Asplice%2Crep%3A128
--
You received this bug notification because you
*** This bug is a security vulnerability ***
Public security bug reported:
This bug was found while fuzzing ImageMagick with afl-fuzz
Tested on ImageMagick git commit
Command: magick id:000224,sig:06,src:004192+004496,op:splice,rep:128
/dev/null
===
*** This bug is a security vulnerability ***
Public security bug reported:
This bug was found while fuzzing ImageMagick with afl-fuzz
Tested on ImageMagick git commit
Command: magick id:000359,sig:06,src:006660,op:havoc,rep:2 /dev/null
ASAN:SIGSEGV
input file to trigger crash
** Attachment added: "id:000359,sig:06,src:006660,op:havoc,rep:2"
https://bugs.launchpad.net/bugs/1545367/+attachment/4571282/+files/id%3A000359%2Csig%3A06%2Csrc%3A006660%2Cop%3Ahavoc%2Crep%3A2
--
You received this bug notification because you are a member of Ubun
https://github.com/ImageMagick/ImageMagick/issues/130
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1545367
Title:
SEGV in ImageMagick/MagickCore/locale.c:1517
To manage notifications about this bu
** Attachment added: "id:00,sig:06,src:00,op:flip1,pos:118"
https://bugs.launchpad.net/ubuntu/+source/imagemagick/+bug/1542107/+attachment/4571526/+files/id%3A00%2Csig%3A06%2Csrc%3A00%2Cop%3Aflip1%2Cpos%3A118
--
You received this bug notification because you are a member of Ub
*** This bug is a security vulnerability ***
Public security bug reported:
This bug was found while fuzzing ImageMagick with afl-fuzz
Tested on ImageMagick git commit
07b9f5ed90ce1e2d723837979446713b2159f78e
Command: magick id:000323,sig:06,src:007647,op:havoc,rep:64 /dev/null
input file to trigger crash
** Attachment added: "id:000323,sig:06,src:007647,op:havoc,rep:64"
https://bugs.launchpad.net/bugs/1547287/+attachment/4575117/+files/id%3A000323%2Csig%3A06%2Csrc%3A007647%2Cop%3Ahavoc%2Crep%3A64
--
You received this bug notification because you are a member of Ub
https://github.com/ImageMagick/ImageMagick/issues/135
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1547287
Title:
out-of-bounds read in MagickCore/xml-tree.c:1394
To manage notifications about thi
input file to trigger crash
** Attachment added: "not_kitty.hdr"
https://bugs.launchpad.net/bugs/1537213/+attachment/4555014/+files/not_kitty.hdr
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1537
*** This bug is a security vulnerability ***
Public security bug reported:
=
==29740==ERROR: AddressSanitizer: heap-buffer-overflow on address 0xb3302f40 at
pc 0x85250f7 bp 0xbfa013a8 sp 0xbfa013a0
READ of size 1 at 0xb3302f40 threa
This bug was found while fuzzing ImageMagick with afl-fuzz
Tested on ImageMagick version Tested on git commit
b5af2acfbf05cc6af1fc4a69d1fda2f497ca9719
Command: magick not_kiddy.hdr /dev/null
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ub
input file to trigger crash
** Attachment added: "id:49,sig:06,src:002323,op:havoc,rep:32"
https://bugs.launchpad.net/bugs/1537417/+attachment/4555476/+files/id%3A49%2Csig%3A06%2Csrc%3A002323%2Cop%3Ahavoc%2Crep%3A32
--
You received this bug notification because you are a member of Ub
*** This bug is a security vulnerability ***
Public security bug reported:
=
==9817==ERROR: AddressSanitizer: heap-buffer-overflow on address 0xb4303bcc at
pc 0x8801f3a bp 0xbfadb6c8 sp 0xbfadb6c0
READ of size 1 at 0xb4303bcc thread
input file to trigger crash
** Attachment added: "id:54,sig:06,src:002451,op:havoc,rep:128"
https://bugs.launchpad.net/bugs/1537418/+attachment/4555477/+files/id%3A54%2Csig%3A06%2Csrc%3A002451%2Cop%3Ahavoc%2Crep%3A128
--
You received this bug notification because you are a member of
*** This bug is a security vulnerability ***
Public security bug reported:
=
==14781==ERROR: AddressSanitizer: heap-buffer-overflow on address 0xb4804860 at
pc 0x87748af bp 0xbfc4b818 sp 0xbfc4b810
READ of size 1 at 0xb4804860 threa
input file to trigger crash
** Attachment added: "id:000125,sig:06,src:003820,op:havoc,rep:2"
https://bugs.launchpad.net/bugs/1537419/+attachment/4555478/+files/id%3A000125%2Csig%3A06%2Csrc%3A003820%2Cop%3Ahavoc%2Crep%3A2
--
You received this bug notification because you are a member of Ubun
*** This bug is a security vulnerability ***
Public security bug reported:
=
==19799==ERROR: AddressSanitizer: heap-buffer-overflow on address 0xb480485d at
pc 0x85b324e bp 0xbfcaa3a8 sp 0xbfcaa3a0
READ of size 1 at 0xb480485d threa
input file to trigger crash
** Attachment added: "id:000130,sig:06,src:004284,op:havoc,rep:4"
https://bugs.launchpad.net/bugs/1537421/+attachment/4555480/+files/id%3A000130%2Csig%3A06%2Csrc%3A004284%2Cop%3Ahavoc%2Crep%3A4
--
You received this bug notification because you are a member of Ubun
*** This bug is a security vulnerability ***
Public security bug reported:
=
==19729==ERROR: AddressSanitizer: heap-buffer-overflow on address 0xb600aecc at
pc 0x8801fba bp 0xbfdb50b8 sp 0xbfdb50b0
READ of size 1 at 0xb600aecc threa
*** This bug is a security vulnerability ***
Public security bug reported:
=
==19714==ERROR: AddressSanitizer: heap-buffer-overflow on address 0xb2f02be0 at
pc 0x85b330e bp 0xbfa4eb88 sp 0xbfa4eb80
READ of size 1 at 0xb2f02be0 threa
input file to trigger crash
** Attachment added: "id:000147,sig:06,src:004628,op:havoc,rep:128"
https://bugs.launchpad.net/bugs/1537422/+attachment/4555481/+files/id%3A000147%2Csig%3A06%2Csrc%3A004628%2Cop%3Ahavoc%2Crep%3A128
--
You received this bug notification because you are a member of
*** This bug is a security vulnerability ***
Public security bug reported:
=
==19704==ERROR: AddressSanitizer: heap-buffer-overflow on address 0xb5b071f1 at
pc 0x808ca48 bp 0xbfd95848 sp 0xbfd95838
READ of size 2 at 0xb5b071f1 threa
input file to trigger crash
** Attachment added: "id:000127,sig:06,src:004192,op:havoc,rep:16"
https://bugs.launchpad.net/bugs/1537420/+attachment/4555479/+files/id%3A000127%2Csig%3A06%2Csrc%3A004192%2Cop%3Ahavoc%2Crep%3A16
--
You received this bug notification because you are a member of Ub
*** This bug is a security vulnerability ***
Public security bug reported:
ASAN:SIGSEGV
=
==20118==ERROR: AddressSanitizer: SEGV on unknown address 0x03897358 (pc
0x08865e90 sp 0xbfb87650 bp 0xbfb889f8 T0)
#0 0x8865e8f in ReadVI
*** This bug is a security vulnerability ***
Public security bug reported:
=
==20060==ERROR: AddressSanitizer: heap-buffer-overflow on address 0xb5c071f1 at
pc 0x8776e2c bp 0xbfd5ed18 sp 0xbfd5ed10
READ of size 1 at 0xb5c071f1 threa
input file to trigger crash
** Attachment added: "id:000206,sig:06,src:006064,op:havoc,rep:2"
https://bugs.launchpad.net/bugs/1537423/+attachment/4555483/+files/id%3A000206%2Csig%3A06%2Csrc%3A006064%2Cop%3Ahavoc%2Crep%3A2
--
You received this bug notification because you are a member of Ubun
input file to trigger crash
** Attachment added: "id:000211,sig:06,src:004423+004248,op:splice,rep:32"
https://bugs.launchpad.net/bugs/1537424/+attachment/4555484/+files/id%3A000211%2Csig%3A06%2Csrc%3A004423+004248%2Cop%3Asplice%2Crep%3A32
--
You received this bug notification because you ar
*** This bug is a security vulnerability ***
Public security bug reported:
=
==20038==ERROR: AddressSanitizer: heap-buffer-overflow on address 0xb470485c at
pc 0x8dd722a bp 0xbf92c668 sp 0xbf92c660
READ of size 4 at 0xb470485c threa
input file to trigger crash
** Attachment added: "id:000225,sig:06,src:000141+002191,op:splice,rep:64"
https://bugs.launchpad.net/bugs/1537425/+attachment/4555485/+files/id%3A000225%2Csig%3A06%2Csrc%3A000141+002191%2Cop%3Asplice%2Crep%3A64
--
You received this bug notification because you ar
This bug was found while fuzzing ImageMagick with afl-fuzz
Tested on git commit 87b213f9e2578611654a74ea0c6014367f4dc2fa
Command: magick $infile /dev/null
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bug
This bug was found while fuzzing ImageMagick with afl-fuzz
Tested on git commit 87b213f9e2578611654a74ea0c6014367f4dc2fa
Command: magick $infile /dev/null
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bug
This bug was found while fuzzing ImageMagick with afl-fuzz
Tested on git commit 87b213f9e2578611654a74ea0c6014367f4dc2fa
Command: magick $infile /dev/null
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bug
This bug was found while fuzzing ImageMagick with afl-fuzz
Tested on git commit 87b213f9e2578611654a74ea0c6014367f4dc2fa
Command: magick $infile /dev/null
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bug
This bug was found while fuzzing ImageMagick with afl-fuzz
Tested on git commit 87b213f9e2578611654a74ea0c6014367f4dc2fa
Command: magick $infile /dev/null
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bug
This bug was found while fuzzing ImageMagick with afl-fuzz
Tested on git commit 87b213f9e2578611654a74ea0c6014367f4dc2fa
Command: magick $infile /dev/null
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bug
This bug was found while fuzzing ImageMagick with afl-fuzz
Tested on git commit 87b213f9e2578611654a74ea0c6014367f4dc2fa
Command: magick $infile /dev/null
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bug
This bug was found while fuzzing ImageMagick with afl-fuzz
Tested on git commit 87b213f9e2578611654a74ea0c6014367f4dc2fa
Command: magick $infile /dev/null
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bug
This bug was found while fuzzing ImageMagick with afl-fuzz
Tested on ImageMagick version Tested on git commit
87b213f9e2578611654a74ea0c6014367f4dc2fa
Command: magick $infile /dev/null
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
input file to trigger crash
** Attachment added: "id:00,sig:06,src:01,op:flip1,pos:26"
https://bugs.launchpad.net/bugs/1537597/+attachment/4556004/+files/id%3A00%2Csig%3A06%2Csrc%3A01%2Cop%3Aflip1%2Cpos%3A26
--
You received this bug notification because you are a member of Ub
*** This bug is a security vulnerability ***
Public security bug reported:
This bug was found while fuzzing graphicsmagick with afl-fuzz
Tested on hg changeset 14720:3b1f1e0c1098
Command: gm convert %s /dev/null
=
==12121==ERROR:
*** This bug is a security vulnerability ***
Public security bug reported:
This bug was found while fuzzing graphicsmagick with afl-fuzz
Tested on hg changeset 14720:3b1f1e0c1098
Command: gm convert %s /dev/null
=
==11480==ERROR:
*** This bug is a security vulnerability ***
Public security bug reported:
This bug was found while fuzzing graphicsmagick with afl-fuzz
Tested on hg changeset 14720:3b1f1e0c1098
Command: gm convert %s /dev/null
=
==23869==ERROR:
input file to trigger crash
** Attachment added: "id:25,sig:06,src:17,op:flip1,pos:74"
https://bugs.launchpad.net/bugs/1537602/+attachment/4556009/+files/id%3A25%2Csig%3A06%2Csrc%3A17%2Cop%3Aflip1%2Cpos%3A74
--
You received this bug notification because you are a member of Ub
input file to trigger crash
** Attachment added: "id:11,sig:06,src:01,op:havoc,rep:16"
https://bugs.launchpad.net/bugs/1537599/+attachment/4556006/+files/id%3A11%2Csig%3A06%2Csrc%3A01%2Cop%3Ahavoc%2Crep%3A16
--
You received this bug notification because you are a member of Ub
input file to trigger crash
** Attachment added: "id:23,sig:06,src:17,op:flip1,pos:69"
https://bugs.launchpad.net/bugs/1537600/+attachment/4556007/+files/id%3A23%2Csig%3A06%2Csrc%3A17%2Cop%3Aflip1%2Cpos%3A69
--
You received this bug notification because you are a member of Ub
*** This bug is a security vulnerability ***
Public security bug reported:
This bug was found while fuzzing graphicsmagick with afl-fuzz
Tested on hg changeset 14720:3b1f1e0c1098
Command: gm convert %s /dev/null
=
==24621==ERROR:
*** This bug is a security vulnerability ***
Public security bug reported:
This bug was found while fuzzing graphicsmagick with afl-fuzz
Tested on hg changeset 14720:3b1f1e0c1098
Command: gm convert %s /dev/null
ASAN:SIGSEGV
=
==2
input file to trigger crash
** Attachment added: "id:50,sig:06,src:17,op:havoc,rep:128"
https://bugs.launchpad.net/bugs/1537604/+attachment/4556017/+files/id%3A50%2Csig%3A06%2Csrc%3A17%2Cop%3Ahavoc%2Crep%3A128
--
You received this bug notification because you are a member of
input file to trigger crash
** Attachment added: "id:24,sig:06,src:17,op:flip1,pos:73"
https://bugs.launchpad.net/bugs/1537601/+attachment/4556008/+files/id%3A24%2Csig%3A06%2Csrc%3A17%2Cop%3Aflip1%2Cpos%3A73
--
You received this bug notification because you are a member of Ub
*** This bug is a security vulnerability ***
Public security bug reported:
This bug was found while fuzzing graphicsmagick with afl-fuzz
Tested on hg changeset 14720:3b1f1e0c1098
Command: gm convert %s /dev/null
=
==15344==ERROR:
*** This bug is a security vulnerability ***
Public security bug reported:
This bug was found while fuzzing graphicsmagick with afl-fuzz
Tested on hg changeset 14720:3b1f1e0c1098
Command: gm convert %s /dev/null
=
==11661==ERROR:
input file to trigger crash
** Attachment added: "id:03,sig:06,src:01,op:flip2,pos:25"
https://bugs.launchpad.net/bugs/1537598/+attachment/4556005/+files/id%3A03%2Csig%3A06%2Csrc%3A01%2Cop%3Aflip2%2Cpos%3A25
--
You received this bug notification because you are a member of Ub
** Summary changed:
- heap-buffer-overflow in coders/xpm.c:154
+ out-of-bounds read in coders/xpm.c:154
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1537601
Title:
out-of-bounds read in coders/xpm
** Summary changed:
- heap-buffer-overflow in coders/xcf.c:362
+ out-of-bounds read in coders/xcf.c:362
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1537598
Title:
out-of-bounds read in coders/xcf
** Summary changed:
- heap-buffer-overflow in coders/xcf.c:373
+ out-of-bounds read in coders/xcf.c:373
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1537599
Title:
out-of-bounds read in coders/xcf
** Summary changed:
- heap-buffer-overflow in coders/xpm.c:150
+ out-of-bounds read in coders/xpm.c:150
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1537602
Title:
out-of-bounds read in coders/xpm
** Summary changed:
- heap-buffer-overflow in coders/xcf.c:372
+ out-of-bounds read in coders/xcf.c:372
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1537597
Title:
out-of-bounds read in coders/xcf
*** This bug is a security vulnerability ***
Public security bug reported:
This bug was found while fuzzing graphicsmagick with afl-fuzz
Tested on hg changeset 14720:3b1f1e0c1098
Command: gm convert id:55,sig:06,src:28,op:flip1,pos:562
/dev/null
input file to trigger crash
** Attachment added: "id:55,sig:06,src:28,op:flip1,pos:562"
https://bugs.launchpad.net/bugs/1537724/+attachment/4556202/+files/id%3A55%2Csig%3A06%2Csrc%3A28%2Cop%3Aflip1%2Cpos%3A562
** Summary changed:
- heap-buffer-overflow in coders/pict.c:1929
+
** Summary changed:
- heap-buffer-overflow in coders/xpm.c:409
+ out-of-bounds read in coders/xpm.c:409
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1537604
Title:
out-of-bounds read in coders/xpm
input file to trigger crash
** Attachment added: "id:68,sig:06,src:84,op:havoc,rep:4"
https://bugs.launchpad.net/bugs/1537804/+attachment/4556304/+files/id%3A68%2Csig%3A06%2Csrc%3A84%2Cop%3Ahavoc%2Crep%3A4
** Summary changed:
- heap-buffer-overflow in coders/psd.c:892
+ out-o
input file to trigger crash
** Attachment added: "id:63,sig:06,src:84,op:flip1,pos:28"
https://bugs.launchpad.net/bugs/1537803/+attachment/4556303/+files/id%3A63%2Csig%3A06%2Csrc%3A84%2Cop%3Aflip1%2Cpos%3A28
** Summary changed:
- heap-buffer-overflow in coders/psd.c:1435
+ ou
*** This bug is a security vulnerability ***
Public security bug reported:
This bug was found while fuzzing graphicsmagick with afl-fuzz
Tested on hg changeset 14720:3b1f1e0c1098
Command: gm convert id:63,sig:06,src:84,op:flip1,pos:28
/dev/null
=
101 - 200 of 237 matches
Mail list logo