{"id":"CVE-2016-7969","details":"The wrap_lines_smart function in ass_render.c in libass before 0.13.4 allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors, related to \"0/3 line wrapping equalization.\"","modified":"2026-04-16T06:21:25.424952477Z","published":"2017-03-03T16:59:00.560Z","related":["SUSE-SU-2016:3107-1","openSUSE-SU-2024:10508-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KW6DNERYHPI5Y6SQYU3XKTVSCOWMIHUC/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R7JJ2SGVOX6UQQIRMVC3QACJLKHE2PYN/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VUOUOK3VULMMZTNSCRFCNPDAPDWAVK7X/"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/93358"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-updates/2016-12/msg00068.html"},{"type":"FIX","url":"http://www.openwall.com/lists/oss-security/2016/10/05/2"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1381960"},{"type":"FIX","url":"https://github.com/libass/libass/commit/f4f48950788b91c6a30029cc28a240b834713ea7"},{"type":"FIX","url":"https://github.com/libass/libass/releases/tag/0.13.4"},{"type":"FIX","url":"https://security.gentoo.org/glsa/201702-25"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/libass/libass","events":[{"introduced":"0"},{"last_affected":"27b0232b0d9259bc009389a019eb6b47103f484a"},{"fixed":"f4f48950788b91c6a30029cc28a240b834713ea7"},{"fixed":"8551555c86f50f978f9ddd55a8d20bceb80d92fc"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"0.13.3"}]}}],"versions":["0.10.0","0.10.1","0.10.2","0.11.0","0.11.1","0.11.2","0.12.0","0.12.1","0.12.2","0.12.3","0.13.0","0.13.1","0.13.2","0.13.3","0.9.10","0.9.11","0.9.12","0.9.7","0.9.8","0.9.9"],"database_specific":{"vanir_signatures_modified":"2026-04-11T05:00:57Z","source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-7969.json","vanir_signatures":[{"deprecated":false,"source":"https://github.com/libass/libass/commit/f4f48950788b91c6a30029cc28a240b834713ea7","target":{"function":"wrap_lines_smart","file":"libass/ass_render.c"},"id":"CVE-2016-7969-4e1985b9","signature_version":"v1","digest":{"length":3562,"function_hash":"51762142420342031960033178136166488581"},"signature_type":"Function"},{"deprecated":false,"source":"https://github.com/libass/libass/commit/f4f48950788b91c6a30029cc28a240b834713ea7","target":{"file":"libass/ass_render.c"},"id":"CVE-2016-7969-6cbe8aa7","signature_version":"v1","digest":{"threshold":0.9,"line_hashes":["71668818312444884182579424001384264623","153709568892301489054239187538722912346","249660998431858653011787501624001113437","267991441071277646004286811666452386671"]},"signature_type":"Line"}],"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"42.1"}]},{"events":[{"introduced":"0"},{"last_affected":"13.2"}]},{"events":[{"introduced":"0"},{"last_affected":"23"}]},{"events":[{"introduced":"0"},{"last_affected":"24"}]},{"events":[{"introduced":"0"},{"last_affected":"25"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}