[Bug 1533451] Re: heap-buffer-overflow in MagickCore/pixel-accessor.h:778 SetPixelViaPixelInfo

2016-01-12 Thread Moshe Kaplan
** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1533451 Title: out-of-bounds read in MagickCore/pixel-accessor.h:778 SetPixelViaP

[Bug 1533445] Re: heap-buffer-overflow in coders/rle.c:590 ReadRLEImage

2016-01-12 Thread Moshe Kaplan
** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1533445 Title: out-of-bounds read in coders/rle.c:590 ReadRLEImage To manage notif

[Bug 1533449] Re: heap-buffer-overflow in coders/pict.c:633 EncodeImage

2016-01-12 Thread Moshe Kaplan
** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1533449 Title: out-of-bounds read in coders/pict.c:633 EncodeImage To manage notif

[Bug 1533452] [NEW] out-of-bounds read in coders/psd.c:797 ReadPSDChannelPixels

2016-01-12 Thread Moshe Kaplan
*** This bug is a security vulnerability *** Public security bug reported: This bug was found while fuzzing ImageMagick with afl-fuzz Tested on ImageMagick version d8382f9c0ffa52057271a6a323e7e062f0fe4ff6 Command: magick infile /dev/null Build info: #Configure command: CC=afl-clang-fast CXX=a

[Bug 1533447] Re: heap-buffer-overflow in coders/sun.c:499 ReadSUNImage

2016-01-12 Thread Moshe Kaplan
** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1533447 Title: out-of-bounds read in coders/sun.c:499 ReadSUNImage To manage notif

[Bug 1533449] Re: out-of-bounds read in coders/pict.c:633 EncodeImage

2016-01-12 Thread Moshe Kaplan
** Summary changed: - heap-buffer-overflow in coders/pict.c:633 EncodeImage + out-of-bounds read in coders/pict.c:633 EncodeImage -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1533449 Title: out-of

[Bug 1533445] Re: out-of-bounds read in coders/rle.c:590 ReadRLEImage

2016-01-12 Thread Moshe Kaplan
** Summary changed: - heap-buffer-overflow in coders/rle.c:590 ReadRLEImage + out-of-bounds read in coders/rle.c:590 ReadRLEImage -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1533445 Title: out-of

[Bug 1533442] Re: out-of-bounds read in coders/psd.c:797 ReadPSDChannelPixels

2016-01-12 Thread Moshe Kaplan
*** This bug is a duplicate of bug 1533452 *** https://bugs.launchpad.net/bugs/1533452 ** Summary changed: - heap-buffer-overflow in coders/psd.c:797 ReadPSDChannelPixels + out-of-bounds read in coders/psd.c:797 ReadPSDChannelPixels ** Information type changed from Public to Public Security

[Bug 1533451] Re: out-of-bounds read in MagickCore/pixel-accessor.h:778 SetPixelViaPixelInfo

2016-01-12 Thread Moshe Kaplan
** Summary changed: - heap-buffer-overflow in MagickCore/pixel-accessor.h:778 SetPixelViaPixelInfo + out-of-bounds read in MagickCore/pixel-accessor.h:778 SetPixelViaPixelInfo -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bu

[Bug 1533447] Re: out-of-bounds read in coders/sun.c:499 ReadSUNImage

2016-01-12 Thread Moshe Kaplan
** Summary changed: - heap-buffer-overflow in coders/sun.c:499 ReadSUNImage + out-of-bounds read in coders/sun.c:499 ReadSUNImage -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1533447 Title: out-of

[Bug 1533452] Re: out-of-bounds read in coders/coders/viff.c:445 ReadVIFFImage

2016-01-13 Thread Moshe Kaplan
** Summary changed: - out-of-bounds read in coders/psd.c:797 ReadPSDChannelPixels + out-of-bounds read in coders/coders/viff.c:445 ReadVIFFImage ** Summary changed: - out-of-bounds read in coders/coders/viff.c:445 ReadVIFFImage + out-of-bounds read in coders/viff.c:445 ReadVIFFImage -- You rec

[Bug 1533442] Re: out-of-bounds read in coders/psd.c:797 ReadPSDChannelPixels

2016-01-13 Thread Moshe Kaplan
** This bug is no longer a duplicate of bug 1533452 out-of-bounds read in coders/viff.c:445 ReadVIFFImage -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1533442 Title: out-of-bounds read in coders

[Bug 1533451] Re: out-of-bounds read in MagickCore/pixel-accessor.h:778 SetPixelViaPixelInfo

2016-01-13 Thread Moshe Kaplan
https://github.com/ImageMagick/ImageMagick/issues/78 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1533451 Title: out-of-bounds read in MagickCore/pixel-accessor.h:778 SetPixelViaPixelInfo To man

[Bug 1533449] Re: out-of-bounds read in coders/pict.c:633 EncodeImage

2016-01-13 Thread Moshe Kaplan
https://github.com/ImageMagick/ImageMagick/issues/80 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1533449 Title: out-of-bounds read in coders/pict.c:633 EncodeImage To manage notifications about t

[Bug 1533450] Re: heap-buffer-overflow in coders/psd.c:2240 PSDPackbitsEncodeImage

2016-01-13 Thread Moshe Kaplan
https://github.com/ImageMagick/ImageMagick/issues/79 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1533450 Title: heap-buffer-overflow in coders/psd.c:2240 PSDPackbitsEncodeImage To manage notifica

[Bug 1533452] Re: out-of-bounds read in coders/viff.c:445 ReadVIFFImage

2016-01-13 Thread Moshe Kaplan
https://github.com/ImageMagick/ImageMagick/issues/77 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1533452 Title: out-of-bounds read in coders/viff.c:445 ReadVIFFImage To manage notifications about

[Bug 1533447] Re: out-of-bounds read in coders/sun.c:499 ReadSUNImage

2016-01-13 Thread Moshe Kaplan
https://github.com/ImageMagick/ImageMagick/issues/81 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1533447 Title: out-of-bounds read in coders/sun.c:499 ReadSUNImage To manage notifications about t

[Bug 1533445] Re: out-of-bounds read in coders/rle.c:590 ReadRLEImage

2016-01-13 Thread Moshe Kaplan
https://github.com/ImageMagick/ImageMagick/issues/82 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1533445 Title: out-of-bounds read in coders/rle.c:590 ReadRLEImage To manage notifications about t

[Bug 1533442] Re: out-of-bounds read in coders/psd.c:797 ReadPSDChannelPixels

2016-01-13 Thread Moshe Kaplan
https://github.com/ImageMagick/ImageMagick/issues/83 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1533442 Title: out-of-bounds read in coders/psd.c:797 ReadPSDChannelPixels To manage notifications

[Bug 1533447] Re: out-of-bounds read in coders/sun.c:499 ReadSUNImage

2016-01-14 Thread Moshe Kaplan
** Attachment added: "poc2_sun.c_501" https://bugs.launchpad.net/ubuntu/+source/imagemagick/+bug/1533447/+attachment/4550177/+files/id%3A31%2Csig%3A06%2Csrc%3A001500%2Cop%3Aflip1%2Cpos%3A15 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed

[Bug 1533442] Re: out-of-bounds read in coders/psd.c:797 ReadPSDChannelPixels

2016-01-14 Thread Moshe Kaplan
** Attachment added: "poc2_psd.c_797" https://bugs.launchpad.net/ubuntu/+source/imagemagick/+bug/1533442/+attachment/4550176/+files/id%3A17%2Csig%3A06%2Csrc%3A000431%2Cop%3Aarith8%2Cpos%3A23%2Cval%3A-7 -- You received this bug notification because you are a member of Ubuntu Bugs, which is

[Bug 1533452] Re: out-of-bounds read in coders/viff.c:445 ReadVIFFImage

2016-01-14 Thread Moshe Kaplan
** Attachment added: "poc2" https://bugs.launchpad.net/ubuntu/+source/imagemagick/+bug/1533452/+attachment/4550180/+files/id%3A71%2Csig%3A06%2Csrc%3A002008%2Cop%3Aflip1%2Cpos%3A580 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu

[Bug 1533442] Re: out-of-bounds read in coders/psd.c:797 ReadPSDChannelPixels

2016-01-15 Thread Moshe Kaplan
** Attachment added: "poc4_psd.c_797" https://bugs.launchpad.net/ubuntu/+source/imagemagick/+bug/1533442/+attachment/4550515/+files/id%3A55%2Csig%3A06%2Csrc%3A001837%2Cop%3Aarith8%2Cpos%3A23%2Cval%3A-15 -- You received this bug notification because you are a member of Ubuntu Bugs, which i

[Bug 1533442] Re: out-of-bounds read in coders/psd.c:797 ReadPSDChannelPixels

2016-01-15 Thread Moshe Kaplan
** Attachment added: "poc3_psd.c_797" https://bugs.launchpad.net/ubuntu/+source/imagemagick/+bug/1533442/+attachment/4550514/+files/id%3A18%2Csig%3A06%2Csrc%3A000431%2Cop%3Aint32%2Cpos%3A22%2Cval%3A+256 -- You received this bug notification because you are a member of Ubuntu Bugs, which i

[Bug 1553360] [NEW] out-of-bounds read in MagickCore/memory.c:719

2016-03-04 Thread Moshe Kaplan
*** This bug is a security vulnerability *** Public security bug reported: This bug was found while fuzzing ImageMagick with afl-fuzz Tested on ImageMagick git commit 26ac8585e46188a648abf5fa3a1a7d264d8b3cb9 Command: magick id:000362,sig:06,src:008726,op:havoc,rep:4 /dev/null =

[Bug 1553360] Re: out-of-bounds read in MagickCore/memory.c:719

2016-03-04 Thread Moshe Kaplan
input file to trigger crash ** Attachment added: "id:000362,sig:06,src:008726,op:havoc,rep:4" https://bugs.launchpad.net/bugs/1553360/+attachment/4588675/+files/id%3A000362%2Csig%3A06%2Csrc%3A008726%2Cop%3Ahavoc%2Crep%3A4 -- You received this bug notification because you are a member of Ubun

[Bug 1553366] [NEW] out-of-bounds read in MagickCore/memory.c:708

2016-03-04 Thread Moshe Kaplan
*** This bug is a security vulnerability *** Public security bug reported: This bug was found while fuzzing ImageMagick with afl-fuzz Tested on ImageMagick git commit 26ac8585e46188a648abf5fa3a1a7d264d8b3cb9 Command: magick id:000419,sig:06,src:001803+004110,op:splice,rep:2 /dev/null =

[Bug 1553366] Re: out-of-bounds read in MagickCore/memory.c:708

2016-03-04 Thread Moshe Kaplan
input file to trigger crash ** Attachment added: "id:000419,sig:06,src:001803+004110,op:splice,rep:2" https://bugs.launchpad.net/bugs/1553366/+attachment/4588703/+files/id%3A000419%2Csig%3A06%2Csrc%3A001803+004110%2Cop%3Asplice%2Crep%3A2 -- You received this bug notification because you are

[Bug 1553366] Re: out-of-bounds read in MagickCore/memory.c:708

2016-03-04 Thread Moshe Kaplan
https://github.com/ImageMagick/ImageMagick/issues/143 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1553366 Title: out-of-bounds read in MagickCore/memory.c:708 To manage notifications about this b

[Bug 1553360] Re: out-of-bounds read in MagickCore/memory.c:719

2016-03-04 Thread Moshe Kaplan
https://github.com/ImageMagick/ImageMagick/issues/144 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1553360 Title: out-of-bounds read in MagickCore/memory.c:719 To manage notifications about this b

[Bug 1545180] Re: out-of-bounds write in fuzz_results_2016_02_12/fuzzer01/crashes/id:000043, sig:06, src:000224, op:flip1, pos:15' @ error/psd.c/ReadPSDChannelRLE/1002.

2016-02-12 Thread Moshe Kaplan
input file to trigger crash ** Attachment added: "id:43,sig:06,src:000224,op:flip1,pos:15" https://bugs.launchpad.net/bugs/1545180/+attachment/4570514/+files/id%3A43%2Csig%3A06%2Csrc%3A000224%2Cop%3Aflip1%2Cpos%3A15 -- You received this bug notification because you are a member of Ub

[Bug 1545180] [NEW] out-of-bounds write in coders/psd.c:2225

2016-02-12 Thread Moshe Kaplan
*** This bug is a security vulnerability *** Public security bug reported: This bug was found while fuzzing ImageMagick with afl-fuzz Tested on ImageMagick git commit Command: magick id:43,sig:06,src:000224,op:flip1,pos:15 /dev/null magick: InvalidLength `/home/user/Desktop/FuzzImageMagi

[Bug 1545183] Re: out-of-bounds read in ImageMagick/coders/viff.c:692:35

2016-02-12 Thread Moshe Kaplan
input file to trigger crash ** Attachment added: "id:97,sig:06,src:000777,op:flip4,pos:520" https://bugs.launchpad.net/bugs/1545183/+attachment/4570516/+files/id%3A97%2Csig%3A06%2Csrc%3A000777%2Cop%3Aflip4%2Cpos%3A520 -- You received this bug notification because you are a member of

[Bug 1545183] [NEW] out-of-bounds read in ImageMagick/coders/viff.c:692:35

2016-02-12 Thread Moshe Kaplan
*** This bug is a security vulnerability *** Public security bug reported: This bug was found while fuzzing ImageMagick with afl-fuzz Tested on ImageMagick git commit Command: magick id:97,sig:06,src:000777,op:flip4,pos:520 /dev/null ===

[Bug 1545180] Re: out-of-bounds write in coders/psd.c:2225

2016-02-12 Thread Moshe Kaplan
https://github.com/ImageMagick/ImageMagick/issues/128 ** Summary changed: - out-of-bounds write in fuzz_results_2016_02_12/fuzzer01/crashes/id:43,sig:06,src:000224,op:flip1,pos:15' @ error/psd.c/ReadPSDChannelRLE/1002. + out-of-bounds write in coders/psd.c:2225 -- You received this bug no

[Bug 1545183] Re: out-of-bounds read in ImageMagick/coders/viff.c:692:35

2016-02-12 Thread Moshe Kaplan
https://github.com/ImageMagick/ImageMagick/issues/129 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1545183 Title: out-of-bounds read in ImageMagick/coders/viff.c:692:35 To manage notifications abo

[Bug 1545366] Re: out-of-bounds read in ImageMagick/coders/mat.c:406

2016-02-13 Thread Moshe Kaplan
input file to trigger crash ** Attachment added: "id:000224,sig:06,src:004192+004496,op:splice,rep:128" https://bugs.launchpad.net/bugs/1545366/+attachment/4571281/+files/id%3A000224%2Csig%3A06%2Csrc%3A004192+004496%2Cop%3Asplice%2Crep%3A128 -- You received this bug notification because you

[Bug 1545366] [NEW] out-of-bounds read in ImageMagick/coders/mat.c:406

2016-02-13 Thread Moshe Kaplan
*** This bug is a security vulnerability *** Public security bug reported: This bug was found while fuzzing ImageMagick with afl-fuzz Tested on ImageMagick git commit Command: magick id:000224,sig:06,src:004192+004496,op:splice,rep:128 /dev/null ===

[Bug 1545367] [NEW] SEGV in ImageMagick/MagickCore/locale.c:1517

2016-02-13 Thread Moshe Kaplan
*** This bug is a security vulnerability *** Public security bug reported: This bug was found while fuzzing ImageMagick with afl-fuzz Tested on ImageMagick git commit Command: magick id:000359,sig:06,src:006660,op:havoc,rep:2 /dev/null ASAN:SIGSEGV

[Bug 1545367] Re: SEGV in ImageMagick/MagickCore/locale.c:1517

2016-02-13 Thread Moshe Kaplan
input file to trigger crash ** Attachment added: "id:000359,sig:06,src:006660,op:havoc,rep:2" https://bugs.launchpad.net/bugs/1545367/+attachment/4571282/+files/id%3A000359%2Csig%3A06%2Csrc%3A006660%2Cop%3Ahavoc%2Crep%3A2 -- You received this bug notification because you are a member of Ubun

[Bug 1545367] Re: SEGV in ImageMagick/MagickCore/locale.c:1517

2016-02-13 Thread Moshe Kaplan
https://github.com/ImageMagick/ImageMagick/issues/130 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1545367 Title: SEGV in ImageMagick/MagickCore/locale.c:1517 To manage notifications about this bu

[Bug 1542107] Re: out-of-bounds write in coders/pdb.c:691

2016-02-14 Thread Moshe Kaplan
** Attachment added: "id:00,sig:06,src:00,op:flip1,pos:118" https://bugs.launchpad.net/ubuntu/+source/imagemagick/+bug/1542107/+attachment/4571526/+files/id%3A00%2Csig%3A06%2Csrc%3A00%2Cop%3Aflip1%2Cpos%3A118 -- You received this bug notification because you are a member of Ub

[Bug 1547287] [NEW] out-of-bounds read in MagickCore/xml-tree.c:1394

2016-02-18 Thread Moshe Kaplan
*** This bug is a security vulnerability *** Public security bug reported: This bug was found while fuzzing ImageMagick with afl-fuzz Tested on ImageMagick git commit 07b9f5ed90ce1e2d723837979446713b2159f78e Command: magick id:000323,sig:06,src:007647,op:havoc,rep:64 /dev/null

[Bug 1547287] Re: out-of-bounds read in MagickCore/xml-tree.c:1394

2016-02-18 Thread Moshe Kaplan
input file to trigger crash ** Attachment added: "id:000323,sig:06,src:007647,op:havoc,rep:64" https://bugs.launchpad.net/bugs/1547287/+attachment/4575117/+files/id%3A000323%2Csig%3A06%2Csrc%3A007647%2Cop%3Ahavoc%2Crep%3A64 -- You received this bug notification because you are a member of Ub

[Bug 1547287] Re: out-of-bounds read in MagickCore/xml-tree.c:1394

2016-02-18 Thread Moshe Kaplan
https://github.com/ImageMagick/ImageMagick/issues/135 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1547287 Title: out-of-bounds read in MagickCore/xml-tree.c:1394 To manage notifications about thi

[Bug 1537213] Re: heap-buffer-overflow in coders/hdr.c:622

2016-01-22 Thread Moshe Kaplan
input file to trigger crash ** Attachment added: "not_kitty.hdr" https://bugs.launchpad.net/bugs/1537213/+attachment/4555014/+files/not_kitty.hdr -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1537

[Bug 1537213] [NEW] heap-buffer-overflow in coders/hdr.c:622

2016-01-22 Thread Moshe Kaplan
*** This bug is a security vulnerability *** Public security bug reported: = ==29740==ERROR: AddressSanitizer: heap-buffer-overflow on address 0xb3302f40 at pc 0x85250f7 bp 0xbfa013a8 sp 0xbfa013a0 READ of size 1 at 0xb3302f40 threa

[Bug 1537213] Re: heap-buffer-overflow in coders/hdr.c:622

2016-01-22 Thread Moshe Kaplan
This bug was found while fuzzing ImageMagick with afl-fuzz Tested on ImageMagick version Tested on git commit b5af2acfbf05cc6af1fc4a69d1fda2f497ca9719 Command: magick not_kiddy.hdr /dev/null -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ub

[Bug 1537417] Re: heap-buffer-overflow in coders/sun.c:173

2016-01-23 Thread Moshe Kaplan
input file to trigger crash ** Attachment added: "id:49,sig:06,src:002323,op:havoc,rep:32" https://bugs.launchpad.net/bugs/1537417/+attachment/4555476/+files/id%3A49%2Csig%3A06%2Csrc%3A002323%2Cop%3Ahavoc%2Crep%3A32 -- You received this bug notification because you are a member of Ub

[Bug 1537417] [NEW] heap-buffer-overflow in coders/sun.c:173

2016-01-23 Thread Moshe Kaplan
*** This bug is a security vulnerability *** Public security bug reported: = ==9817==ERROR: AddressSanitizer: heap-buffer-overflow on address 0xb4303bcc at pc 0x8801f3a bp 0xbfadb6c8 sp 0xbfadb6c0 READ of size 1 at 0xb4303bcc thread

[Bug 1537418] Re: heap-buffer-overflow in coders/psd.c:524

2016-01-23 Thread Moshe Kaplan
input file to trigger crash ** Attachment added: "id:54,sig:06,src:002451,op:havoc,rep:128" https://bugs.launchpad.net/bugs/1537418/+attachment/4555477/+files/id%3A54%2Csig%3A06%2Csrc%3A002451%2Cop%3Ahavoc%2Crep%3A128 -- You received this bug notification because you are a member of

[Bug 1537418] [NEW] heap-buffer-overflow in coders/psd.c:524

2016-01-23 Thread Moshe Kaplan
*** This bug is a security vulnerability *** Public security bug reported: = ==14781==ERROR: AddressSanitizer: heap-buffer-overflow on address 0xb4804860 at pc 0x87748af bp 0xbfc4b818 sp 0xbfc4b810 READ of size 1 at 0xb4804860 threa

[Bug 1537419] Re: heap-buffer-overflow in MagickCore/locale.c:1517

2016-01-23 Thread Moshe Kaplan
input file to trigger crash ** Attachment added: "id:000125,sig:06,src:003820,op:havoc,rep:2" https://bugs.launchpad.net/bugs/1537419/+attachment/4555478/+files/id%3A000125%2Csig%3A06%2Csrc%3A003820%2Cop%3Ahavoc%2Crep%3A2 -- You received this bug notification because you are a member of Ubun

[Bug 1537422] [NEW] heap-buffer-overflow in coders/meta.c:465

2016-01-23 Thread Moshe Kaplan
*** This bug is a security vulnerability *** Public security bug reported: = ==19799==ERROR: AddressSanitizer: heap-buffer-overflow on address 0xb480485d at pc 0x85b324e bp 0xbfcaa3a8 sp 0xbfcaa3a0 READ of size 1 at 0xb480485d threa

[Bug 1537421] Re: heap-buffer-overflow in coders/sun.c:175

2016-01-23 Thread Moshe Kaplan
input file to trigger crash ** Attachment added: "id:000130,sig:06,src:004284,op:havoc,rep:4" https://bugs.launchpad.net/bugs/1537421/+attachment/4555480/+files/id%3A000130%2Csig%3A06%2Csrc%3A004284%2Cop%3Ahavoc%2Crep%3A4 -- You received this bug notification because you are a member of Ubun

[Bug 1537421] [NEW] heap-buffer-overflow in coders/sun.c:175

2016-01-23 Thread Moshe Kaplan
*** This bug is a security vulnerability *** Public security bug reported: = ==19729==ERROR: AddressSanitizer: heap-buffer-overflow on address 0xb600aecc at pc 0x8801fba bp 0xbfdb50b8 sp 0xbfdb50b0 READ of size 1 at 0xb600aecc threa

[Bug 1537420] [NEW] heap-buffer-overflow in coders/meta.c:496

2016-01-23 Thread Moshe Kaplan
*** This bug is a security vulnerability *** Public security bug reported: = ==19714==ERROR: AddressSanitizer: heap-buffer-overflow on address 0xb2f02be0 at pc 0x85b330e bp 0xbfa4eb88 sp 0xbfa4eb80 READ of size 1 at 0xb2f02be0 threa

[Bug 1537422] Re: heap-buffer-overflow in coders/meta.c:465

2016-01-23 Thread Moshe Kaplan
input file to trigger crash ** Attachment added: "id:000147,sig:06,src:004628,op:havoc,rep:128" https://bugs.launchpad.net/bugs/1537422/+attachment/4555481/+files/id%3A000147%2Csig%3A06%2Csrc%3A004628%2Cop%3Ahavoc%2Crep%3A128 -- You received this bug notification because you are a member of

[Bug 1537419] [NEW] heap-buffer-overflow in MagickCore/locale.c:1517

2016-01-23 Thread Moshe Kaplan
*** This bug is a security vulnerability *** Public security bug reported: = ==19704==ERROR: AddressSanitizer: heap-buffer-overflow on address 0xb5b071f1 at pc 0x808ca48 bp 0xbfd95848 sp 0xbfd95838 READ of size 2 at 0xb5b071f1 threa

[Bug 1537420] Re: heap-buffer-overflow in coders/meta.c:496

2016-01-23 Thread Moshe Kaplan
input file to trigger crash ** Attachment added: "id:000127,sig:06,src:004192,op:havoc,rep:16" https://bugs.launchpad.net/bugs/1537420/+attachment/4555479/+files/id%3A000127%2Csig%3A06%2Csrc%3A004192%2Cop%3Ahavoc%2Crep%3A16 -- You received this bug notification because you are a member of Ub

[Bug 1537425] [NEW] SEGV in coders/viff.c:692:35

2016-01-23 Thread Moshe Kaplan
*** This bug is a security vulnerability *** Public security bug reported: ASAN:SIGSEGV = ==20118==ERROR: AddressSanitizer: SEGV on unknown address 0x03897358 (pc 0x08865e90 sp 0xbfb87650 bp 0xbfb889f8 T0) #0 0x8865e8f in ReadVI

[Bug 1537424] [NEW] heap-buffer-overflow in ./MagickCore/quantum-private.h:266

2016-01-23 Thread Moshe Kaplan
*** This bug is a security vulnerability *** Public security bug reported: = ==20060==ERROR: AddressSanitizer: heap-buffer-overflow on address 0xb5c071f1 at pc 0x8776e2c bp 0xbfd5ed18 sp 0xbfd5ed10 READ of size 1 at 0xb5c071f1 threa

[Bug 1537423] Re: heap-buffer-overflow in ./MagickCore/pixel-accessor.h:234

2016-01-23 Thread Moshe Kaplan
input file to trigger crash ** Attachment added: "id:000206,sig:06,src:006064,op:havoc,rep:2" https://bugs.launchpad.net/bugs/1537423/+attachment/4555483/+files/id%3A000206%2Csig%3A06%2Csrc%3A006064%2Cop%3Ahavoc%2Crep%3A2 -- You received this bug notification because you are a member of Ubun

[Bug 1537424] Re: heap-buffer-overflow in ./MagickCore/quantum-private.h:266

2016-01-23 Thread Moshe Kaplan
input file to trigger crash ** Attachment added: "id:000211,sig:06,src:004423+004248,op:splice,rep:32" https://bugs.launchpad.net/bugs/1537424/+attachment/4555484/+files/id%3A000211%2Csig%3A06%2Csrc%3A004423+004248%2Cop%3Asplice%2Crep%3A32 -- You received this bug notification because you ar

[Bug 1537423] [NEW] heap-buffer-overflow in ./MagickCore/pixel-accessor.h:234

2016-01-23 Thread Moshe Kaplan
*** This bug is a security vulnerability *** Public security bug reported: = ==20038==ERROR: AddressSanitizer: heap-buffer-overflow on address 0xb470485c at pc 0x8dd722a bp 0xbf92c668 sp 0xbf92c660 READ of size 4 at 0xb470485c threa

[Bug 1537425] Re: SEGV in coders/viff.c:692:35

2016-01-23 Thread Moshe Kaplan
input file to trigger crash ** Attachment added: "id:000225,sig:06,src:000141+002191,op:splice,rep:64" https://bugs.launchpad.net/bugs/1537425/+attachment/4555485/+files/id%3A000225%2Csig%3A06%2Csrc%3A000141+002191%2Cop%3Asplice%2Crep%3A64 -- You received this bug notification because you ar

[Bug 1537422] Re: heap-buffer-overflow in coders/meta.c:465

2016-01-24 Thread Moshe Kaplan
This bug was found while fuzzing ImageMagick with afl-fuzz Tested on git commit 87b213f9e2578611654a74ea0c6014367f4dc2fa Command: magick $infile /dev/null -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bug

[Bug 1537418] Re: heap-buffer-overflow in coders/psd.c:524

2016-01-24 Thread Moshe Kaplan
This bug was found while fuzzing ImageMagick with afl-fuzz Tested on git commit 87b213f9e2578611654a74ea0c6014367f4dc2fa Command: magick $infile /dev/null -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bug

[Bug 1537425] Re: SEGV in coders/viff.c:692:35

2016-01-24 Thread Moshe Kaplan
This bug was found while fuzzing ImageMagick with afl-fuzz Tested on git commit 87b213f9e2578611654a74ea0c6014367f4dc2fa Command: magick $infile /dev/null -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bug

[Bug 1537420] Re: heap-buffer-overflow in coders/meta.c:496

2016-01-24 Thread Moshe Kaplan
This bug was found while fuzzing ImageMagick with afl-fuzz Tested on git commit 87b213f9e2578611654a74ea0c6014367f4dc2fa Command: magick $infile /dev/null -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bug

[Bug 1537419] Re: heap-buffer-overflow in MagickCore/locale.c:1517

2016-01-24 Thread Moshe Kaplan
This bug was found while fuzzing ImageMagick with afl-fuzz Tested on git commit 87b213f9e2578611654a74ea0c6014367f4dc2fa Command: magick $infile /dev/null -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bug

[Bug 1537421] Re: heap-buffer-overflow in coders/sun.c:175

2016-01-24 Thread Moshe Kaplan
This bug was found while fuzzing ImageMagick with afl-fuzz Tested on git commit 87b213f9e2578611654a74ea0c6014367f4dc2fa Command: magick $infile /dev/null -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bug

[Bug 1537423] Re: heap-buffer-overflow in ./MagickCore/pixel-accessor.h:234

2016-01-24 Thread Moshe Kaplan
This bug was found while fuzzing ImageMagick with afl-fuzz Tested on git commit 87b213f9e2578611654a74ea0c6014367f4dc2fa Command: magick $infile /dev/null -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bug

[Bug 1537424] Re: heap-buffer-overflow in ./MagickCore/quantum-private.h:266

2016-01-24 Thread Moshe Kaplan
This bug was found while fuzzing ImageMagick with afl-fuzz Tested on git commit 87b213f9e2578611654a74ea0c6014367f4dc2fa Command: magick $infile /dev/null -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bug

[Bug 1537417] Re: heap-buffer-overflow in coders/sun.c:173

2016-01-24 Thread Moshe Kaplan
This bug was found while fuzzing ImageMagick with afl-fuzz Tested on ImageMagick version Tested on git commit 87b213f9e2578611654a74ea0c6014367f4dc2fa Command: magick $infile /dev/null -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1537597] Re: heap-buffer-overflow in coders/xcf.c:372

2016-01-24 Thread Moshe Kaplan
input file to trigger crash ** Attachment added: "id:00,sig:06,src:01,op:flip1,pos:26" https://bugs.launchpad.net/bugs/1537597/+attachment/4556004/+files/id%3A00%2Csig%3A06%2Csrc%3A01%2Cop%3Aflip1%2Cpos%3A26 -- You received this bug notification because you are a member of Ub

[Bug 1537597] [NEW] heap-buffer-overflow in coders/xcf.c:372

2016-01-24 Thread Moshe Kaplan
*** This bug is a security vulnerability *** Public security bug reported: This bug was found while fuzzing graphicsmagick with afl-fuzz Tested on hg changeset 14720:3b1f1e0c1098 Command: gm convert %s /dev/null = ==12121==ERROR:

[Bug 1537604] [NEW] heap-buffer-overflow in coders/xpm.c:409

2016-01-24 Thread Moshe Kaplan
*** This bug is a security vulnerability *** Public security bug reported: This bug was found while fuzzing graphicsmagick with afl-fuzz Tested on hg changeset 14720:3b1f1e0c1098 Command: gm convert %s /dev/null = ==11480==ERROR:

[Bug 1537601] [NEW] heap-buffer-overflow in coders/xpm.c:154

2016-01-24 Thread Moshe Kaplan
*** This bug is a security vulnerability *** Public security bug reported: This bug was found while fuzzing graphicsmagick with afl-fuzz Tested on hg changeset 14720:3b1f1e0c1098 Command: gm convert %s /dev/null = ==23869==ERROR:

[Bug 1537602] Re: heap-buffer-overflow in coders/xpm.c:150

2016-01-24 Thread Moshe Kaplan
input file to trigger crash ** Attachment added: "id:25,sig:06,src:17,op:flip1,pos:74" https://bugs.launchpad.net/bugs/1537602/+attachment/4556009/+files/id%3A25%2Csig%3A06%2Csrc%3A17%2Cop%3Aflip1%2Cpos%3A74 -- You received this bug notification because you are a member of Ub

[Bug 1537599] Re: heap-buffer-overflow in coders/xcf.c:373

2016-01-24 Thread Moshe Kaplan
input file to trigger crash ** Attachment added: "id:11,sig:06,src:01,op:havoc,rep:16" https://bugs.launchpad.net/bugs/1537599/+attachment/4556006/+files/id%3A11%2Csig%3A06%2Csrc%3A01%2Cop%3Ahavoc%2Crep%3A16 -- You received this bug notification because you are a member of Ub

[Bug 1537600] Re: SEGV in utilities/gm+0x807a361)

2016-01-24 Thread Moshe Kaplan
input file to trigger crash ** Attachment added: "id:23,sig:06,src:17,op:flip1,pos:69" https://bugs.launchpad.net/bugs/1537600/+attachment/4556007/+files/id%3A23%2Csig%3A06%2Csrc%3A17%2Cop%3Aflip1%2Cpos%3A69 -- You received this bug notification because you are a member of Ub

[Bug 1537602] [NEW] heap-buffer-overflow in coders/xpm.c:150

2016-01-24 Thread Moshe Kaplan
*** This bug is a security vulnerability *** Public security bug reported: This bug was found while fuzzing graphicsmagick with afl-fuzz Tested on hg changeset 14720:3b1f1e0c1098 Command: gm convert %s /dev/null = ==24621==ERROR:

[Bug 1537600] [NEW] SEGV in utilities/gm+0x807a361)

2016-01-24 Thread Moshe Kaplan
*** This bug is a security vulnerability *** Public security bug reported: This bug was found while fuzzing graphicsmagick with afl-fuzz Tested on hg changeset 14720:3b1f1e0c1098 Command: gm convert %s /dev/null ASAN:SIGSEGV = ==2

[Bug 1537604] Re: heap-buffer-overflow in coders/xpm.c:409

2016-01-24 Thread Moshe Kaplan
input file to trigger crash ** Attachment added: "id:50,sig:06,src:17,op:havoc,rep:128" https://bugs.launchpad.net/bugs/1537604/+attachment/4556017/+files/id%3A50%2Csig%3A06%2Csrc%3A17%2Cop%3Ahavoc%2Crep%3A128 -- You received this bug notification because you are a member of

[Bug 1537601] Re: heap-buffer-overflow in coders/xpm.c:154

2016-01-24 Thread Moshe Kaplan
input file to trigger crash ** Attachment added: "id:24,sig:06,src:17,op:flip1,pos:73" https://bugs.launchpad.net/bugs/1537601/+attachment/4556008/+files/id%3A24%2Csig%3A06%2Csrc%3A17%2Cop%3Aflip1%2Cpos%3A73 -- You received this bug notification because you are a member of Ub

[Bug 1537599] [NEW] heap-buffer-overflow in coders/xcf.c:373

2016-01-24 Thread Moshe Kaplan
*** This bug is a security vulnerability *** Public security bug reported: This bug was found while fuzzing graphicsmagick with afl-fuzz Tested on hg changeset 14720:3b1f1e0c1098 Command: gm convert %s /dev/null = ==15344==ERROR:

[Bug 1537598] [NEW] heap-buffer-overflow in coders/xcf.c:362

2016-01-24 Thread Moshe Kaplan
*** This bug is a security vulnerability *** Public security bug reported: This bug was found while fuzzing graphicsmagick with afl-fuzz Tested on hg changeset 14720:3b1f1e0c1098 Command: gm convert %s /dev/null = ==11661==ERROR:

[Bug 1537598] Re: heap-buffer-overflow in coders/xcf.c:362

2016-01-24 Thread Moshe Kaplan
input file to trigger crash ** Attachment added: "id:03,sig:06,src:01,op:flip2,pos:25" https://bugs.launchpad.net/bugs/1537598/+attachment/4556005/+files/id%3A03%2Csig%3A06%2Csrc%3A01%2Cop%3Aflip2%2Cpos%3A25 -- You received this bug notification because you are a member of Ub

[Bug 1537601] Re: out-of-bounds read in coders/xpm.c:154

2016-01-25 Thread Moshe Kaplan
** Summary changed: - heap-buffer-overflow in coders/xpm.c:154 + out-of-bounds read in coders/xpm.c:154 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1537601 Title: out-of-bounds read in coders/xpm

[Bug 1537598] Re: out-of-bounds read in coders/xcf.c:362

2016-01-25 Thread Moshe Kaplan
** Summary changed: - heap-buffer-overflow in coders/xcf.c:362 + out-of-bounds read in coders/xcf.c:362 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1537598 Title: out-of-bounds read in coders/xcf

[Bug 1537599] Re: out-of-bounds read in coders/xcf.c:373

2016-01-25 Thread Moshe Kaplan
** Summary changed: - heap-buffer-overflow in coders/xcf.c:373 + out-of-bounds read in coders/xcf.c:373 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1537599 Title: out-of-bounds read in coders/xcf

[Bug 1537602] Re: out-of-bounds read in coders/xpm.c:150

2016-01-25 Thread Moshe Kaplan
** Summary changed: - heap-buffer-overflow in coders/xpm.c:150 + out-of-bounds read in coders/xpm.c:150 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1537602 Title: out-of-bounds read in coders/xpm

[Bug 1537597] Re: out-of-bounds read in coders/xcf.c:372

2016-01-25 Thread Moshe Kaplan
** Summary changed: - heap-buffer-overflow in coders/xcf.c:372 + out-of-bounds read in coders/xcf.c:372 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1537597 Title: out-of-bounds read in coders/xcf

[Bug 1537724] [NEW] out-of-bounds write in coders/pict.c:1929

2016-01-25 Thread Moshe Kaplan
*** This bug is a security vulnerability *** Public security bug reported: This bug was found while fuzzing graphicsmagick with afl-fuzz Tested on hg changeset 14720:3b1f1e0c1098 Command: gm convert id:55,sig:06,src:28,op:flip1,pos:562 /dev/null

[Bug 1537724] Re: heap-buffer-overflow in coders/pict.c:1929

2016-01-25 Thread Moshe Kaplan
input file to trigger crash ** Attachment added: "id:55,sig:06,src:28,op:flip1,pos:562" https://bugs.launchpad.net/bugs/1537724/+attachment/4556202/+files/id%3A55%2Csig%3A06%2Csrc%3A28%2Cop%3Aflip1%2Cpos%3A562 ** Summary changed: - heap-buffer-overflow in coders/pict.c:1929 +

[Bug 1537604] Re: out-of-bounds read in coders/xpm.c:409

2016-01-25 Thread Moshe Kaplan
** Summary changed: - heap-buffer-overflow in coders/xpm.c:409 + out-of-bounds read in coders/xpm.c:409 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1537604 Title: out-of-bounds read in coders/xpm

[Bug 1537804] Re: heap-buffer-overflow in coders/psd.c:892

2016-01-25 Thread Moshe Kaplan
input file to trigger crash ** Attachment added: "id:68,sig:06,src:84,op:havoc,rep:4" https://bugs.launchpad.net/bugs/1537804/+attachment/4556304/+files/id%3A68%2Csig%3A06%2Csrc%3A84%2Cop%3Ahavoc%2Crep%3A4 ** Summary changed: - heap-buffer-overflow in coders/psd.c:892 + out-o

[Bug 1537803] Re: heap-buffer-overflow in coders/psd.c:1435

2016-01-25 Thread Moshe Kaplan
input file to trigger crash ** Attachment added: "id:63,sig:06,src:84,op:flip1,pos:28" https://bugs.launchpad.net/bugs/1537803/+attachment/4556303/+files/id%3A63%2Csig%3A06%2Csrc%3A84%2Cop%3Aflip1%2Cpos%3A28 ** Summary changed: - heap-buffer-overflow in coders/psd.c:1435 + ou

[Bug 1537803] [NEW] out-of-bounds read in coders/psd.c:1435

2016-01-25 Thread Moshe Kaplan
*** This bug is a security vulnerability *** Public security bug reported: This bug was found while fuzzing graphicsmagick with afl-fuzz Tested on hg changeset 14720:3b1f1e0c1098 Command: gm convert id:63,sig:06,src:84,op:flip1,pos:28 /dev/null =

<    1   2   3   >