CVE-2016-7972

The check_allocations function in libass/ass_shaper.c in libass before 0.13.4 allows remote attackers to cause a denial of service (memory allocation failure) via unspecified vectors.
References
Link Resource
http://lists.opensuse.org/opensuse-updates/2016-12/msg00068.html Third Party Advisory
http://www.openwall.com/lists/oss-security/2016/10/05/2 Mailing List Patch Third Party Advisory
http://www.securityfocus.com/bid/93358 Third Party Advisory VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=1381960 Issue Tracking Patch
https://github.com/libass/libass/pull/240/commits/aa54e0b59200a994d50a346b5d7ac818ebcf2d4b Issue Tracking Patch Third Party Advisory
https://github.com/libass/libass/releases/tag/0.13.4 Patch Release Notes Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KW6DNERYHPI5Y6SQYU3XKTVSCOWMIHUC/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R7JJ2SGVOX6UQQIRMVC3QACJLKHE2PYN/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VUOUOK3VULMMZTNSCRFCNPDAPDWAVK7X/
https://security.gentoo.org/glsa/201702-25 Patch Third Party Advisory VDB Entry
http://lists.opensuse.org/opensuse-updates/2016-12/msg00068.html Third Party Advisory
http://www.openwall.com/lists/oss-security/2016/10/05/2 Mailing List Patch Third Party Advisory
http://www.securityfocus.com/bid/93358 Third Party Advisory VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=1381960 Issue Tracking Patch
https://github.com/libass/libass/pull/240/commits/aa54e0b59200a994d50a346b5d7ac818ebcf2d4b Issue Tracking Patch Third Party Advisory
https://github.com/libass/libass/releases/tag/0.13.4 Patch Release Notes Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KW6DNERYHPI5Y6SQYU3XKTVSCOWMIHUC/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R7JJ2SGVOX6UQQIRMVC3QACJLKHE2PYN/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VUOUOK3VULMMZTNSCRFCNPDAPDWAVK7X/
https://security.gentoo.org/glsa/201702-25 Patch Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:25:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:a:libass_project:libass:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2017-03-03 16:59

Updated : 2025-04-20 01:37


NVD link : CVE-2016-7972

Mitre link : CVE-2016-7972

CVE.ORG link : CVE-2016-7972


JSON object : View

Products Affected

opensuse

  • opensuse
  • leap

fedoraproject

  • fedora

libass_project

  • libass
CWE
CWE-399

Resource Management Errors