instance_id string | description string | exploit(poc)_url string | patch_url string | weakness_enumeration string | github_repo string | base_commit string | developers_patch string | bug_report string | sanitizer_report string | sanitizer string | github_issue string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|
njs.cve-2022-32414 | Nginx NJS v0.7.2 was discovered to contain a segmentation violation in the function njs_vmcode_interpreter at src/njs_vmcode.c. | https://github.com/nginx/njs/issues/483 | https://github.com/nginx/njs/commit/31ed93a5623f24ca94e6d47e895ba735d9d97d46 | CWE-416 | nginx/njs | 31ed93a5623f24ca94e6d47e895ba735d9d97d46~1 | diff --git a/src/njs_promise.c b/src/njs_promise.c
index 52ae5b570..ea162d533 100644
--- a/src/njs_promise.c
+++ b/src/njs_promise.c
@@ -1369,6 +1369,10 @@ njs_promise_perform_all_handler(njs_vm_t *vm, njs_iterator_args_t *args,
njs_promise_all_context_t *context;
njs_promise_iterator_args_t *pargs;
+ ... | https://github.com/nginx/njs/issues/483 | AddressSanitizer:DEADLYSIGNAL
=================================================================
==732128==ERROR: AddressSanitizer: SEGV on unknown address (pc 0x0000004e3e53 bp 0x7ffe6e1f76b0 sp 0x7ffe6e1f6e80 T0)
==732128==The signal is caused by a READ memory access.
==732128==Hint: this fault was caused by a derefer... | === https://github.com/nginx/njs/issues/483 ===
Title: SEGV njs_vmcode.c:802:27 in njs_vmcode_interpreter
---
Body:
### Environment
```
OS : Linux ubuntu 5.13.0-27-generic #29~20.04.1-Ubuntu SMP Fri Jan 14 00:32:30 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux
Commit : f65981b0b8fcf02d69a40bc934803c25c9f607ab
V... | https://nvd.nist.gov/vuln/detail/CVE-2022-32414 | |
gpac.cve-2023-5586 | NULL Pointer Dereference in GitHub repository gpac/gpac prior to 2.3.0-DEV. | https://huntr.dev/bounties/d2a6ea71-3555-47a6-9b18-35455d103740 | https://github.com/gpac/gpac/commit/ca1b48f0abe71bf81a58995d7d75dc27f5a17ddc, https://huntr.dev/bounties/d2a6ea71-3555-47a6-9b18-35455d103740 | CWE-476 | gpac/gpac | 5692dc729491805e0e5f55c21d50ba1e6b19e88e | diff --git a/src/filters/reframe_rawpcm.c b/src/filters/reframe_rawpcm.c
index 37decc00e6..406c6638de 100644
--- a/src/filters/reframe_rawpcm.c
+++ b/src/filters/reframe_rawpcm.c
@@ -360,6 +360,14 @@ GF_Err pcmreframe_process(GF_Filter *filter)
}
wav_ok = GF_FALSE;
}
+ if (!ctx->ch) {
+ GF_LOG(GF_LOG_ERRO... | https://nvd.nist.gov/vuln/detail/CVE-2023-5586 | ||||
mruby.cve-2022-0240 | mruby is vulnerable to NULL Pointer Dereference | https://huntr.dev/bounties/5857eced-aad9-417d-864e-0bdf17226cbb | https://github.com/mruby/mruby/commit/31fa3304049fc406a201a72293cce140f0557dca | CWE-476 | mruby/mruby | 171d32c0071d776207174a40a8fa26def3dbb931 | diff --git a/src/class.c b/src/class.c
index ec9c648e5d..8751dcaf05 100644
--- a/src/class.c
+++ b/src/class.c
@@ -357,6 +357,7 @@ prepare_singleton_class(mrb_state *mrb, struct RBasic *o)
{
struct RClass *sc, *c;
+ mrb_assert(o->c);
if (o->c->tt == MRB_TT_SCLASS) return;
sc = MRB_OBJ_ALLOC(mrb, MRB_TT_SCL... | https://nvd.nist.gov/vuln/detail/CVE-2022-0240 | ||||
njs.cve-2022-28049 | NGINX NJS 0.7.2 was discovered to contain a NULL pointer dereference via the component njs_vmcode_array at /src/njs_vmcode.c. | https://github.com/nginx/njs/issues/473 | https://github.com/nginx/njs/commit/f65981b0b8fcf02d69a40bc934803c25c9f607ab | CWE-476 | nginx/njs | f65981b0b8fcf02d69a40bc934803c25c9f607ab~1 | diff --git a/src/njs_vmcode.c b/src/njs_vmcode.c
index ef0beb5e0..ec478659c 100644
--- a/src/njs_vmcode.c
+++ b/src/njs_vmcode.c
@@ -1055,14 +1055,16 @@ njs_vmcode_array(njs_vm_t *vm, u_char *pc)
if (code->ctor) {
/* Array of the form [,,,], [1,,]. */
- value = array->start;
- ... | https://github.com/nginx/njs/issues/473 | INFO: Seed: 2125423890
INFO: Loaded 1 modules (53334 inline 8-bit counters): 53334 [0x95f010, 0x96c066),
INFO: Loaded 1 PC tables (53334 PCs): 53334 [0x96c068,0xa3c5c8),
/out/njs_process_script_fuzzer: Running 1 inputs 1 time(s) each.
Running: crashes/njs_njs_process_script_fuzzer/id:000002,sig:06,src:001260+005121... | === https://github.com/nginx/njs/issues/473 ===
Title: Null pointer dereference in src/njs_vmcode.c:1049:17
---
Body:
Hi,
this bug was found by fuzzing the current master branch, to reproduce build the OSS-Fuzz harness with ASan and UBSan.
The bug is a write to a NULL pointer, this is the sanitizer report:
```... | https://nvd.nist.gov/vuln/detail/CVE-2022-28049 | |
njs.cve-2022-38890 | Nginx NJS v0.7.7 was discovered to contain a segmentation violation via njs_utf8_next at src/njs_utf8.h | https://github.com/nginx/njs/issues/569 | https://github.com/nginx/njs/commit/b9aea5854bcf6f2de8f7a7f1550874e392b94be2 | CWE-125 | nginx/njs | b9aea5854bcf6f2de8f7a7f1550874e392b94be2~1 | diff --git a/src/njs_string.c b/src/njs_string.c
index 83cede548..62bece0de 100644
--- a/src/njs_string.c
+++ b/src/njs_string.c
@@ -2849,6 +2849,7 @@ njs_string_trim(const njs_value_t *value, njs_string_prop_t *string,
for ( ;; ) {
if (start == prev) {
+ end = prev;
... | https://github.com/nginx/njs/issues/569 | AddressSanitizer:DEADLYSIGNAL
=================================================================
==1550478==ERROR: AddressSanitizer: SEGV on unknown address 0x6170bebedece (pc 0x000000505f0e bp 0x7fff88dc8f70 sp 0x7fff88dc8e40 T0)
==1550478==The signal is caused by a READ memory access.
#0 0x505f0e in njs_utf8_next ... | === https://github.com/nginx/njs/issues/569 ===
Title: Another way to trigger SEGV in njs_utf8_next cause oob read
---
Body:
the call stack is different with https://github.com/nginx/njs/issues/522
```
Environment
commit: 569292e0a74f2b1ec09566f3329f82bdd0d58e87
version: 0.7.7
Build :
./configure --cc=c... | https://nvd.nist.gov/vuln/detail/CVE-2022-38890 | |
libredwg.cve-2020-21816 | A heab based buffer overflow issue exists in GNU LibreDWG 0.10.2641 via htmlescape ../../programs/escape.c:46. | https://github.com/LibreDWG/libredwg/issues/182#issuecomment-572890865 | https://github.com/LibreDWG/libredwg/commit/7e4c59b63d9c5b4b513cba1d0f33612042524563 | CWE-787 | LibreDWG/libredwg | 7b9cb829f93d1c1f67584345ed65ea830de8bdda | diff --git a/programs/escape.c b/programs/escape.c
index 8a907414e0..4d409ea43f 100644
--- a/programs/escape.c
+++ b/programs/escape.c
@@ -27,42 +27,74 @@ char * ATTRIBUTE_MALLOC
htmlescape (const char *restrict src, const int cp)
{
int len;
- char *dest, *d;
+ char *dest, *d, *end;
unsigned char *s;
if (!... | https://github.com/LibreDWG/libredwg/issues/182#issuecomment-572890865 | === https://github.com/LibreDWG/libredwg/issues/182#issuecomment-572890865 ===
Title: Several bugs found by fuzzing
---
Body:
Hi,
After fuzzing libredwg, I found the following bugs on the latest commit on master.
Command: ./dwg2SVG $PoC
**1.NULL pointer dereference in htmlescape ../../programs/escape.c:29**
POC: ... | https://nvd.nist.gov/vuln/detail/CVE-2020-21816 | ||
gpac.cve-2023-46929 | An issue discovered in GPAC 2.3-DEV-rev605-gfc9e29089-master in MP4Box in gf_avc_change_vui /afltest/gpac/src/media_tools/av_parsers.c:6872:55 allows attackers to crash the application. | https://github.com/gpac/gpac/issues/2662 | https://github.com/gpac/gpac/commit/4248def5d24325aeb0e35cacde3d56c9411816a6 | CWE-20 | gpac/gpac | 4248def5d24325aeb0e35cacde3d56c9411816a6~1 | diff --git a/src/media_tools/av_parsers.c b/src/media_tools/av_parsers.c
index 43c3200b90..84e6601b64 100644
--- a/src/media_tools/av_parsers.c
+++ b/src/media_tools/av_parsers.c
@@ -6865,6 +6865,9 @@ GF_Err gf_avc_change_vui(GF_AVCConfig *avcc, GF_VUIInfo *vui_info)
GF_AVCConfigSlot *slc;
orig = NULL;
+ if (!avc... | https://github.com/gpac/gpac/issues/2662 | AddressSanitizer:DEADLYSIGNAL
=================================================================
==3037856==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000008 (pc 0x7ffff67d35c7 bp 0x7ffffffec090 sp 0x7ffffffe29c0 T0)
==3037856==The signal is caused by a READ memory access.
==3037856==Hint: address points t... | === https://github.com/gpac/gpac/issues/2662 ===
Title: SEGV in MP4Box in gf_avc_change_vui /afltest/gpac/src/media_tools/av_parsers.c:6872:55
---
Body:
# SEGV in MP4Box
### Description
SEGV in gpac/MP4Box.
#0 0x7ffff67d35c7 in gf_avc_change_vui /afltest/gpac/src/media_tools/av_parsers.c:6872:55
### Versi... | https://nvd.nist.gov/vuln/detail/CVE-2023-46929 | |
gpac.cve-2024-0321 | Stack-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.3-DEV. | https://huntr.com/bounties/4c027b94-8e9c-4c31-a169-893b25047769 | https://github.com/gpac/gpac/commit/d0ced41651b279bb054eb6390751e2d4eb84819a | CWE-121, CWE-787 | gpac/gpac | d0ced41651b279bb054eb6390751e2d4eb84819a~1 | diff --git a/src/filters/load_text.c b/src/filters/load_text.c
index 6373398228..877b285a80 100644
--- a/src/filters/load_text.c
+++ b/src/filters/load_text.c
@@ -377,6 +377,10 @@ char *gf_text_get_utf8_line(char *szLine, u32 lineSize, FILE *txt_in, s32 unicod
GF_LOG(GF_LOG_DEBUG, GF_LOG_PARSER, ("[TXTIn] Line too ... | https://nvd.nist.gov/vuln/detail/CVE-2024-0321 | ||||
libarchive.cve-2017-14503 | libarchive 3.3.2 suffers from an out-of-bounds read within lha_read_data_none() in archive_read_support_format_lha.c when extracting a specially crafted lha archive, related to lha_crc16. | https://github.com/libarchive/libarchive/commit/2c8c83b9731ff822fad6cc8c670ea5519c366a14 | CWE-125 | libarchive/libarchive | 2c8c83b9731ff822fad6cc8c670ea5519c366a14~1 | diff --git a/libarchive/archive_read_support_format_lha.c b/libarchive/archive_read_support_format_lha.c
index b8ef4ae10e..95c99bb1f3 100644
--- a/libarchive/archive_read_support_format_lha.c
+++ b/libarchive/archive_read_support_format_lha.c
@@ -701,6 +701,12 @@ archive_read_format_lha_read_header(struct archive_read ... | https://bugs.debian.org/875960, https://github.com/libarchive/libarchive/issues/948 | ==21722==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x631000024800 at pc 0x56536be61878 bp 0x7fffa2254ec0 sp 0x7fffa2254eb8
READ of size 2 at 0x631000024800 thread T0
#0 0x56536be61877 in lha_crc16 libarchive/archive_read_support_format_lha.c:1740
#1 0x56536be5f791 in lha_read_data_none libarchive... | ASan (inferred) | === https://github.com/libarchive/libarchive/issues/948 ===
Title: out-of-bounds read in lha_read_data_none()
---
Body:
Hi
The following was reported downstream in Debian at https://bugs.debian.org/875960
The `oob.lha` base64 encoded is:
````
YQAtbGgwLQwAAAAMAAAAADs9SyACeJdNBwBh5AQAAAwAAWhlbGxvLnR4dBMAQv9zd... | https://nvd.nist.gov/vuln/detail/CVE-2017-14503 | |
gpac.cve-2023-0760 | Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to V2.1.0-DEV. | https://github.com/gpac/gpac/commit/ea7395f39f601a7750d48d606e9d10ea0b7beefe, https://huntr.dev/bounties/d06223df-a473-4c82-96d0-23726b844b21 | https://github.com/gpac/gpac/commit/ea7395f39f601a7750d48d606e9d10ea0b7beefe, https://huntr.dev/bounties/d06223df-a473-4c82-96d0-23726b844b21 | CWE-122, CWE-787 | gpac/gpac | ea7395f39f601a7750d48d606e9d10ea0b7beefe~1 | diff --git a/src/isomedia/box_code_base.c b/src/isomedia/box_code_base.c
index baf07ff352..9a9ad09b45 100644
--- a/src/isomedia/box_code_base.c
+++ b/src/isomedia/box_code_base.c
@@ -4429,7 +4429,7 @@ GF_Err video_sample_entry_box_size(GF_Box *s)
/*VVC*/
gf_isom_check_position(s, (GF_Box *)ptr->vvc_config, &pos);... | https://huntr.dev/bounties/d06223df-a473-4c82-96d0-23726b844b21 | https://nvd.nist.gov/vuln/detail/CVE-2023-0760 | |||
njs.cve-2022-31307 | Nginx NJS v0.7.2 was discovered to contain a segmentation violation in the function njs_string_offset at src/njs_string.c. | https://github.com/nginx/njs/issues/482 | https://github.com/nginx/njs/commit/eafe4c7a326b163612f10861392622b5da5b1792 | CWE-416 | nginx/njs | eafe4c7a326b163612f10861392622b5da5b1792~1 | diff --git a/src/njs_iterator.c b/src/njs_iterator.c
index 90c3046fb..043e4483c 100644
--- a/src/njs_iterator.c
+++ b/src/njs_iterator.c
@@ -560,11 +560,14 @@ njs_object_iterate_reverse(njs_vm_t *vm, njs_iterator_args_t *args,
} else {
/* UTF-8 string. */
- p = njs_string_offset(strin... | https://github.com/nginx/njs/issues/482 | AddressSanitizer:DEADLYSIGNAL
=================================================================
==732134==ERROR: AddressSanitizer: SEGV on unknown address (pc 0x0000004f44ab bp 0x7ffee1c1f9b0 sp 0x7ffee1c1f9b0 T0)
==732134==The signal is caused by a READ memory access.
==732134==Hint: this fault was caused by a derefer... | === https://github.com/nginx/njs/issues/482 ===
Title: SEGV njs_string.c:2535:18 in njs_string_offset
---
Body:
### Environment
```
OS : Linux ubuntu 5.13.0-27-generic #29~20.04.1-Ubuntu SMP Fri Jan 14 00:32:30 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux
Commit : f65981b0b8fcf02d69a40bc934803c25c9f607ab
Versi... | https://nvd.nist.gov/vuln/detail/CVE-2022-31307 | |
njs.cve-2021-46462 | njs through 0.7.1, used in NGINX, was discovered to contain a segmentation violation via njs_object_set_prototype in /src/njs_object.c. | https://github.com/nginx/njs/issues/449 | https://github.com/nginx/njs/commit/39e8fa1b7db1680654527f8fa0e9ee93b334ecba, https://github.com/nginx/njs/issues/449 | nginx/njs | 39e8fa1b7db1680654527f8fa0e9ee93b334ecba~1 | diff --git a/src/njs_function.c b/src/njs_function.c
index 0c23ca05c..ae0fa11ff 100644
--- a/src/njs_function.c
+++ b/src/njs_function.c
@@ -1385,18 +1385,10 @@ njs_function_prototype_apply(njs_vm_t *vm, njs_value_t *args, njs_uint_t nargs,
if (njs_is_null_or_undefined(arr_like)) {
length = 0;
-
- ... | https://github.com/nginx/njs/issues/449 | AddressSanitizer:DEADLYSIGNAL
=================================================================
==466519==ERROR: AddressSanitizer: SEGV on unknown address (pc 0x00000050d6d4 bp 0x7ffc8e2432f0 sp 0x7ffc8e2432e0 T0)
==466519==The signal is caused by a READ memory access.
==466519==Hint: this fault was caused by a derefer... | === https://github.com/nginx/njs/issues/449 ===
Title: SEGV /njs/src/njs_object.c:2136:24 in njs_object_set_prototype
---
Body:
## Env
```
Version : 0.7.0
Git Commit : 2da5d8b246b806bee6f74b575217ec3b61a25548
OS : Ubuntu 20.04
Configure : ./configure --address-sanitizer=YES
```
## POC
```
functio... | https://nvd.nist.gov/vuln/detail/CVE-2021-46462 | ||
njs.cve-2022-29779 | Nginx NJS v0.7.2 was discovered to contain a segmentation violation in the function njs_value_own_enumerate at src/njs_value.c. | https://github.com/nginx/njs/issues/485 | https://github.com/nginx/njs/commit/2e00e95473861846aa8538be87db07699d9f676d | nginx/njs | 2e00e95473861846aa8538be87db07699d9f676d~1 | diff --git a/src/njs_array.c b/src/njs_array.c
index 0b8c7b919..2ceb6be7e 100644
--- a/src/njs_array.c
+++ b/src/njs_array.c
@@ -1284,6 +1284,11 @@ njs_array_prototype_splice(njs_vm_t *vm, njs_value_t *args, njs_uint_t nargs,
if (njs_slow_path(ret == NJS_ERROR)) {
return ret;
... | https://github.com/nginx/njs/issues/485 | AddressSanitizer:DEADLYSIGNAL
=================================================================
==2523460==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x555b64452f1c bp 0x7ffdcdd97650 sp 0x7ffdcdd97520 T0)
==2523460==The signal is caused by a READ memory access.
==2523460==Hint: address points t... | === https://github.com/nginx/njs/issues/485 ===
Title: SEGV src/njs_value.c:240 in njs_value_own_enumerate
---
Body:
# Environment
OS : Linux leanderwang-LC2 5.13.0-30-generic https://github.com/nginx/njs/issues/33 SMP Mon Feb 7 14:25:10 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux
Commit : https://github.com/nginx/njs/... | https://nvd.nist.gov/vuln/detail/CVE-2022-29779 | ||
njs.cve-2022-29369 | Nginx NJS v0.7.2 was discovered to contain a segmentation violation via njs_lvlhsh_bucket_find at njs_lvlhsh.c. | https://github.com/nginx/njs/commit/222d6fdcf0c6485ec8e175f3a7b70d650c234b4e | CWE-754 | nginx/njs | 222d6fdcf0c6485ec8e175f3a7b70d650c234b4e~1 | diff --git a/src/njs_vmcode.c b/src/njs_vmcode.c
index 0b07ec67e..6b10200ee 100644
--- a/src/njs_vmcode.c
+++ b/src/njs_vmcode.c
@@ -700,7 +700,7 @@ njs_vmcode_interpreter(njs_vm_t *vm, u_char *pc, void *promise_cap,
ret = njs_object_prop_define(vm, value1, &name, function,
... | https://github.com/nginx/njs/issues/467 | AddressSanitizer:DEADLYSIGNAL
=================================================================
==2064577==ERROR: AddressSanitizer: SEGV on unknown address (pc 0x0000004cac48 bp 0x7ffcc1edfbf0 sp 0x7ffcc1edfbb0 T0)
==2064577==The signal is caused by a READ memory access.
==2064577==Hint: this fault was caused by a dere... | === https://github.com/nginx/njs/issues/467 ===
Title: SEGV njs_lvlhsh.c:231:17 in njs_lvlhsh_bucket_find
---
Body:
### Environment
```
OS : Linux ubuntu 5.13.0-27-generic #29~20.04.1-Ubuntu SMP Fri Jan 14 00:32:30 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux
Commit : 7bd570b39297d3d91902c93a624c89b08be7a6fe
V... | https://nvd.nist.gov/vuln/detail/CVE-2022-29369 | ||
mruby.cve-2022-1201 | NULL Pointer Dereference in mrb_vm_exec with super in GitHub repository mruby/mruby prior to 3.2. This vulnerability is capable of making the mruby interpreter crash, thus affecting the availability of the system. | https://huntr.dev/bounties/6f930add-c9d8-4870-ae56-d4bd8354703b | https://github.com/mruby/mruby/commit/00acae117da1b45b318dc36531a7b0021b8097ae | CWE-476 | mruby/mruby | 00acae117da1b45b318dc36531a7b0021b8097ae~1 | diff --git a/src/vm.c b/src/vm.c
index 77edbb38fc..3bb9510ec1 100644
--- a/src/vm.c
+++ b/src/vm.c
@@ -1749,7 +1749,7 @@ mrb_vm_exec(mrb_state *mrb, const struct RProc *proc, const mrb_code *pc)
}
else if (target_class->tt == MRB_TT_MODULE) {
target_class = mrb_vm_ci_target_class(ci);
- if... | https://nvd.nist.gov/vuln/detail/CVE-2022-1201 | ||||
faad2.cve-2018-20198 | A NULL pointer dereference was discovered in ifilter_bank of libfaad/filtbank.c in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.8. The vulnerability causes a segmentation fault and application crash, which leads to denial of service because adding to windowed output is mishandled in the LONG_START_SEQUENCE case. | https://github.com/fantasy7082/image_test/blob/master/002-null-point-filtbank_246 | https://github.com/knik0/faad2/commit/466b01d504d7e45f1e9169ac90b3e34ab94aed14 | CWE-476 | knik0/faad2 | 466b01d504d7e45f1e9169ac90b3e34ab94aed14~1 | diff --git a/libfaad/syntax.c b/libfaad/syntax.c
index f8e808c2..e7fb1138 100644
--- a/libfaad/syntax.c
+++ b/libfaad/syntax.c
@@ -344,6 +344,12 @@ static void decode_sce_lfe(NeAACDecStruct *hDecoder,
can become 2 when some form of Parametric Stereo coding is used
*/
+ if (hDecoder->frame && hDecoder-... | https://github.com/knik0/faad2/issues/23, https://seclists.org/bugtraq/2019/Sep/28 | ./faad faad_res/002-null-point-filtbank_246 -o out.wav
*********** Ahead Software MPEG-4 AAC Decoder V2.8.8 ******************
Build: Dec 13 2018
Copyright 2002-2004: Ahead Software AG
http://www.audiocoding.com
bug tracking: https://sourceforge.net/p/faac/bugs/
Floating point version
This program is free soft... | === https://github.com/knik0/faad2/issues/23 ===
Title: Null pointer dereference vulnerability in ifilter_bank(libfaad/filtbank.c:246)
---
Body:
Hi, i found a null pointer dereference bug in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.8. It crashed in function ifilter_bank.the details are below(ASAN):
```
./faa... | https://nvd.nist.gov/vuln/detail/CVE-2018-20198 | |
mruby.cve-2022-1427 | Out-of-bounds Read in mrb_obj_is_kind_of in in GitHub repository mruby/mruby prior to 3.2. # Impact: Possible arbitrary code execution if being exploited. | https://huntr.dev/bounties/23b6f0a9-64f5-421e-a55f-b5b7a671f301 | https://github.com/mruby/mruby/commit/a4d97934d51cb88954cc49161dc1d151f64afb6b | CWE-125 | mruby/mruby | a4d97934d51cb88954cc49161dc1d151f64afb6b~1 | diff --git a/src/vm.c b/src/vm.c
index 5013c877d4..aa043b06ae 100644
--- a/src/vm.c
+++ b/src/vm.c
@@ -1750,10 +1750,7 @@ mrb_vm_exec(mrb_state *mrb, const struct RProc *proc, const mrb_code *pc)
mrb_exc_set(mrb, exc);
goto L_RAISE;
}
- if (target_class->flags & MRB_FL_CLASS_IS_PREPENDED) ... | ASan (inferred) | https://nvd.nist.gov/vuln/detail/CVE-2022-1427 | |||
gpac.cve-2023-48013 | GPAC v2.3-DEV-rev566-g50c2ab06f-master was discovered to contain a double free via the gf_filterpacket_del function at /gpac/src/filter_core/filter.c. | https://github.com/gpac/gpac/issues/2612 | https://github.com/gpac/gpac/commit/cd8a95c1efb8f5bfc950b86c2ef77b4c76f6b893 | CWE-415 | gpac/gpac | cd8a95c1efb8f5bfc950b86c2ef77b4c76f6b893~1 | diff --git a/src/filters/isoffin_read_ch.c b/src/filters/isoffin_read_ch.c
index bd96400689..6e74ce8e3f 100644
--- a/src/filters/isoffin_read_ch.c
+++ b/src/filters/isoffin_read_ch.c
@@ -395,6 +395,8 @@ void isor_reader_get_sample(ISOMChannel *ch)
if (ch->edit_sync_frame) {
ch->edit_sync_frame++;
if (ch->... | https://github.com/gpac/gpac/issues/2612 | ==827317==ERROR: AddressSanitizer: attempting double-free on 0x619000015980 in thread T0:
#0 0x55e7797a5972 in free (/home/user/fuzzing_gpac/gpac/bin/gcc/MP4Box+0x105972) (BuildId: 53333ca7bff59dd9a3d1b2821e7c5f3a9aac76b9)
#1 0x7f525cd97945 in gf_filterpacket_del /home/user/fuzzing_gpac/gpac/src/filter_core/fil... | === https://github.com/gpac/gpac/issues/2612 ===
Title: double-free in gf_filterpacket_del /home/user/fuzzing_gpac/gpac/src/filter_core/filter.c:38:17
---
Body:
# Version
```
$ ./MP4Box -version
MP4Box - GPAC version 2.3-DEV-rev566-g50c2ab06f-master
```
# Platform
```
$ uname -a
Linux user-GE40-2PC-Dragon-E... | https://nvd.nist.gov/vuln/detail/CVE-2023-48013 | |
gpac.cve-2023-48011 | GPAC v2.3-DEV-rev566-g50c2ab06f-master was discovered to contain a heap-use-after-free via the flush_ref_samples function at /gpac/src/isomedia/movie_fragments.c. | https://github.com/gpac/gpac/issues/2611 | https://github.com/gpac/gpac/commit/c70f49dda4946d6db6aa55588f6a756b76bd84ea | CWE-416 | gpac/gpac | c70f49dda4946d6db6aa55588f6a756b76bd84ea~1 | diff --git a/src/isomedia/movie_fragments.c b/src/isomedia/movie_fragments.c
index b7f7ade327..d665eeb9d0 100644
--- a/src/isomedia/movie_fragments.c
+++ b/src/isomedia/movie_fragments.c
@@ -591,6 +591,7 @@ u32 UpdateRuns(GF_ISOFile *movie, GF_TrackFragmentBox *traf)
while (gf_list_count(traf->TrackRuns)) {
trun... | https://github.com/gpac/gpac/issues/2611 | ==836900==ERROR: AddressSanitizer: heap-use-after-free on address 0x60b000001d88 at pc 0x7f57c0120bf1 bp 0x7ffeac405a70 sp 0x7ffeac405a68
READ of size 8 at 0x60b000001d88 thread T0
#0 0x7f57c0120bf0 in flush_ref_samples /home/user/fuzzing_gpac/gpac/src/isomedia/movie_fragments.c:936:37
#1 0x7f57c0128df2 in gf_i... | ASan (inferred) | === https://github.com/gpac/gpac/issues/2611 ===
Title: heap-use-after-free in ./gpac/src/isomedia/movie_fragments.c:936:37 in flush_ref_samples
---
Body:
# Version
```
$ ./MP4Box -version
MP4Box - GPAC version 2.3-DEV-rev566-g50c2ab06f-master
```
# Platform
```
$ uname -a
Linux user-GE40-2PC-Dragon-Eyes 6.... | https://nvd.nist.gov/vuln/detail/CVE-2023-48011 |
libredwg.cve-2021-28237 | LibreDWG v0.12.3 was discovered to contain a heap-buffer overflow via decode_preR13. | https://github.com/LibreDWG/libredwg/issues/325 | https://github.com/LibreDWG/libredwg/commit/ea0b9522f63d049ded2c3cff8d9a8c360119951c | CWE-787 | LibreDWG/libredwg | ea0b9522f63d049ded2c3cff8d9a8c360119951c~1 | diff --git a/src/decode.c b/src/decode.c
index 444775afd1..79134db0b3 100644
--- a/src/decode.c
+++ b/src/decode.c
@@ -329,19 +329,20 @@ decode_preR13_section (Dwg_Section_Type_r11 id, Bit_Chain *restrict dat,
// TODO: move to a spec dwg_r11.spec, and dwg_decode_r11_NAME
#define PREP_TABLE(token) ... | https://github.com/LibreDWG/libredwg/issues/325 | ➜ ./dwgread ./poc
ERROR: This version of LibreDWG is only capable of decoding version r13-r2018 (code: AC1012-AC1032) DWG files.
We don't decode many entities and no blocks yet.
ERROR: offset -39
ERROR: offset -85
=================================================================
==12538==ERROR: AddressSanitizer: heap-... | === https://github.com/LibreDWG/libredwg/issues/325 ===
Title: Heap-buffer-overflow in decode_preR13 line 470
---
Body:
I found a heap buffer overflow in the current master (8072563).
# Configure
CFLAGS="-g -fsanitize=address" LDFLAGS="-fsanitize=address" ./configure
# Command
`./dwgread ./poc`
# ASAN repo... | https://nvd.nist.gov/vuln/detail/CVE-2021-28237 | |
mruby.cve-2022-0631 | Heap-based Buffer Overflow in Homebrew mruby prior to 3.2. | https://huntr.dev/bounties/9bdc49ca-6697-4adc-a785-081e1961bf40 | https://github.com/mruby/mruby/commit/47068ae07a5fa3aa9a1879cdfe98a9ce0f339299, https://huntr.dev/bounties/9bdc49ca-6697-4adc-a785-081e1961bf40 | CWE-122 | mruby/mruby | 47068ae07a5fa3aa9a1879cdfe98a9ce0f339299~1 | diff --git a/src/vm.c b/src/vm.c
index 9cb50847f2..aa5569503e 100644
--- a/src/vm.c
+++ b/src/vm.c
@@ -689,9 +689,11 @@ mrb_f_send(mrb_state *mrb, mrb_value self)
regs = mrb->c->ci->stack+1;
if (n == 0) {
+ argnum_error:
mrb_argnum_error(mrb, 0, 1, -1);
}
else if (n == 15) {
+ if (RARRAY_LEN(regs... | https://nvd.nist.gov/vuln/detail/CVE-2022-0631 | ||||
mruby.cve-2022-1934 | Use After Free in GitHub repository mruby/mruby prior to 3.2. | https://huntr.dev/bounties/99e6df06-b9f7-4c53-a722-6bb89fbfb51f | https://github.com/mruby/mruby/commit/aa7f98dedb68d735a1665d3a289036c88b0c47ce, https://huntr.dev/bounties/99e6df06-b9f7-4c53-a722-6bb89fbfb51f | CWE-416 | mruby/mruby | aa7f98dedb68d735a1665d3a289036c88b0c47ce~1 | diff --git a/src/vm.c b/src/vm.c
index b04c9d7e58..09e557dc8e 100644
--- a/src/vm.c
+++ b/src/vm.c
@@ -1159,18 +1159,20 @@ check_target_class(mrb_state *mrb)
return target;
}
+#define regs (mrb->c->ci->stack)
+
static mrb_value
-hash_new_from_values(mrb_state *mrb, mrb_int argc, mrb_value *regs)
+hash_new_from_r... | https://nvd.nist.gov/vuln/detail/CVE-2022-1934 | ||||
njs.cve-2022-34029 | Nginx NJS v0.7.4 was discovered to contain an out-of-bounds read via njs_scope_value at njs_scope.h. | https://github.com/nginx/njs/issues/506 | https://github.com/nginx/njs/commit/d09868bc71f9a990445959329ad8c1b10d3898f5 | CWE-125 | nginx/njs | d09868bc71f9a990445959329ad8c1b10d3898f5~1 | diff --git a/src/njs_vmcode.c b/src/njs_vmcode.c
index 9833ada03..cc33d20b2 100644
--- a/src/njs_vmcode.c
+++ b/src/njs_vmcode.c
@@ -856,9 +856,15 @@ njs_vmcode_interpreter(njs_vm_t *vm, u_char *pc, void *promise_cap,
case NJS_VMCODE_AWAIT:
await = (njs_vmcode_await_t *) pc;
+ ... | https://github.com/nginx/njs/issues/506 | AddressSanitizer:DEADLYSIGNAL
=================================================================
==815==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000040 (pc 0x0000004ff20b bp 0x7ffc7abf6030 sp 0x7ffc7abf5880 T0)
==815==The signal is caused by a READ memory access.
==815==Hint: address points to the zero p... | ASan (inferred) | === https://github.com/nginx/njs/issues/506 ===
Title: SEGV njs_scope.h:74:12 Out-of-bounds Read in njs_scope_value
---
Body:
Environment
```OS : Linux ubuntu 5.13.0-27-generic #29~20.04.1-Ubuntu SMP Fri Jan 14 00:32:30 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux
Commit : 9f4ebc96148308a8ce12f2b54432c87e6d78b881
... | https://nvd.nist.gov/vuln/detail/CVE-2022-34029 |
libarchive.cve-2019-11463 | A memory leak in archive_read_format_zip_cleanup in archive_read_support_format_zip.c in libarchive 3.3.4-dev allows remote attackers to cause a denial of service via a crafted ZIP file because of a HAVE_LZMA_H typo. NOTE: this only affects users who downloaded the development code from GitHub. Users of the product's o... | https://github.com/libarchive/libarchive/issues/1165 | https://github.com/libarchive/libarchive/commit/ba641f73f3d758d9032b3f0e5597a9c6e593a505 | CWE-401 | libarchive/libarchive | ba641f73f3d758d9032b3f0e5597a9c6e593a505~1 | diff --git a/libarchive/archive_read_support_format_zip.c b/libarchive/archive_read_support_format_zip.c
index 677c437095..6937969c16 100644
--- a/libarchive/archive_read_support_format_zip.c
+++ b/libarchive/archive_read_support_format_zip.c
@@ -2751,7 +2751,7 @@ archive_read_format_zip_cleanup(struct archive_read *a)... | https://github.com/libarchive/libarchive/issues/1165 | ==15753==ERROR: LeakSanitizer: detected memory leaks
Direct leak of 96 byte(s) in 1 object(s) allocated from:
#0 0x7f4c0b1dfb50 in __interceptor_malloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xdeb50)
#1 0x7f4c0a85dced (/lib/x86_64-linux-gnu/liblzma.so.5+0x2ced)
Indirect leak of 224 byte(s) in 1 object(s) al... | === https://github.com/libarchive/libarchive/issues/1165 ===
Title: Memory leak when decoding LZMA
---
Body:
I've encountered a memory leak while fuzzing libarchive. A 32-byte reproducer input is attached:
[input.zip](https://github.com/libarchive/libarchive/files/3019394/input.zip). Do not extract this zip file -- ... | https://nvd.nist.gov/vuln/detail/CVE-2019-11463 | |
mruby.cve-2022-0614 | Use of Out-of-range Pointer Offset in Homebrew mruby prior to 3.2. | https://huntr.dev/bounties/a980ce4d-c359-4425-92c4-e844c0055879 | https://github.com/mruby/mruby/commit/ff3a5ebed6ffbe3e70481531cfb969b497aa73ad, https://huntr.dev/bounties/a980ce4d-c359-4425-92c4-e844c0055879 | CWE-119, CWE-823 | mruby/mruby | ff3a5ebed6ffbe3e70481531cfb969b497aa73ad~1 | diff --git a/src/vm.c b/src/vm.c
index 6133cbccac..9cb50847f2 100644
--- a/src/vm.c
+++ b/src/vm.c
@@ -2766,7 +2766,7 @@ mrb_vm_exec(mrb_state *mrb, const struct RProc *proc, const mrb_code *pc)
int lim = a+b*2+1;
hash = regs[a];
- mrb_assert(mrb_hash_p(hash));
+ mrb_ensure_hash_type(mrb, hash... | https://nvd.nist.gov/vuln/detail/CVE-2022-0614 | ||||
faad2.cve-2018-20194 | There is a stack-based buffer underflow in the third instance of the calculate_gain function in libfaad/sbr_hfadj.c in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.8. A crafted input will lead to a denial of service or possibly unspecified other impact because limiting the additional noise energy level is mishandled f... | https://github.com/knik0/faad2/issues/21 | https://github.com/hlef/faad2/commit/6b4a7cde30f2e2cb03e78ef476cc73179cfffda3 | CWE-787 | hlef/faad2 | 5d380279cb00ea7a8b24f647f3790a1fc5342731 | diff --git a/libfaad/sbr_hfadj.c b/libfaad/sbr_hfadj.c
index 3f310b81..dda1ce8e 100644
--- a/libfaad/sbr_hfadj.c
+++ b/libfaad/sbr_hfadj.c
@@ -485,6 +485,12 @@ static void calculate_gain(sbr_info *sbr, sbr_hfadj_info *adj, uint8_t ch)
ml1 = sbr->f_table_lim[sbr->bs_limiter_bands][k];
ml2 = sbr... | https://github.com/knik0/faad2/issues/21, https://seclists.org/bugtraq/2019/Sep/28 | ./faad faad_res/015-stack-buffer-underflow-sbr_hfadj_1314 -o out.wav
*********** Ahead Software MPEG-4 AAC Decoder V2.8.8 ******************
Build: Dec 13 2018
Copyright 2002-2004: Ahead Software AG
http://www.audiocoding.com
bug tracking: https://sourceforge.net/p/faac/bugs/
Floating point version
This progra... | === https://github.com/knik0/faad2/issues/21 ===
Title: stack-buffer-underflow in function calculate_gain(libfaad/sbr_hfadj.c:1314)
---
Body:
Hi, i found a stack-buffer-overflow bug in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.8, the details are below(ASAN):
```
./faad faad_res/015-stack-buffer-underflow-sb... | https://nvd.nist.gov/vuln/detail/CVE-2018-20194 | |
gpac.cve-2023-4721 | Out-of-bounds Read in GitHub repository gpac/gpac prior to 2.3-DEV. | https://huntr.dev/bounties/f457dc62-3cff-47bd-8fd2-1cb2b4a832fc | https://github.com/gpac/gpac/commit/3ec93d73d048ed7b46fe6e9f307cc7a0cc13db63, https://huntr.dev/bounties/f457dc62-3cff-47bd-8fd2-1cb2b4a832fc | CWE-125 | gpac/gpac | 3ec93d73d048ed7b46fe6e9f307cc7a0cc13db63~1 | diff --git a/src/media_tools/mpeg2_ps.c b/src/media_tools/mpeg2_ps.c
index 0af7a31f32..b0182f2249 100644
--- a/src/media_tools/mpeg2_ps.c
+++ b/src/media_tools/mpeg2_ps.c
@@ -266,6 +266,8 @@ int MPEG12_ParseSeqHdr(unsigned char *pbuffer, u32 buflen, s32 *have_mpeg2, u32
u32 scode, ix;
s32 found = -1;
*have_mpeg2 ... | ASan (inferred) | https://nvd.nist.gov/vuln/detail/CVE-2023-4721 | |||
gpac.cve-2022-3178 | Buffer Over-read in GitHub repository gpac/gpac prior to 2.1.0-DEV. | https://huntr.dev/bounties/f022fc50-3dfd-450a-ab47-3d75d2bf44c0 | https://github.com/gpac/gpac/commit/77510778516803b7f7402d7423c6d6bef50254c3, https://huntr.dev/bounties/f022fc50-3dfd-450a-ab47-3d75d2bf44c0 | CWE-125, CWE-126 | gpac/gpac | 77510778516803b7f7402d7423c6d6bef50254c3~1 | diff --git a/src/isomedia/box_code_base.c b/src/isomedia/box_code_base.c
index 3cf6b3bd38..b7ee3e356e 100644
--- a/src/isomedia/box_code_base.c
+++ b/src/isomedia/box_code_base.c
@@ -12886,11 +12886,12 @@ GF_Err xtra_box_read(GF_Box *s, GF_BitStream *bs)
prop_type = gf_bs_read_u16(bs);
prop_size -= 6;
ISOM_... | https://nvd.nist.gov/vuln/detail/CVE-2022-3178 | ||||
exiv2.cve-2018-19607 | Exiv2::isoSpeed in easyaccess.cpp in Exiv2 v0.27-RC2 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted file. | https://github.com/Exiv2/exiv2/issues/561 | https://github.com/Exiv2/exiv2/commit/6e42c1b55e0fc4f360cc56010b0ffe19aa6062d9 | CWE-476 | Exiv2/exiv2 | 6e42c1b55e0fc4f360cc56010b0ffe19aa6062d9~1 | diff --git a/src/easyaccess.cpp b/src/easyaccess.cpp
index 1eed30c47e..9302d6cc91 100644
--- a/src/easyaccess.cpp
+++ b/src/easyaccess.cpp
@@ -154,7 +154,7 @@ namespace Exiv2 {
std::ostringstream os;
md_st->write(os, &ed);
bool ok = false;
- long st_val = parseLong(os.s... | https://github.com/Exiv2/exiv2/issues/561 | ==91500==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x7f186e2da05a bp 0x7fff4e8fe260 sp 0x7fff4e8fd9f0 T0)
#0 0x7f186e2da059 (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x47059)
#1 0x7f186db38b0c in Exiv2::isoSpeed(Exiv2::ExifData const&) /home/marsman/Desktop/crashana/exiv2/exiv2-3f2e0de/... | === https://github.com/Exiv2/exiv2/issues/561 ===
Title: CVE-2018-19607: SEGV in Exiv2::isoSpeed at easyaccess.cpp:178
---
Body:
Tested in ubuntu 16.04 64bit, exiv2 (master 3f2e0de && 0.27-RC2)
`$ exiv2 $POC`
[POC file](https://github.com/Marsman1996/pocs/blob/master/exiv2/CVE-2018-19607/poc9-isoSpeed)
gdb inf... | https://nvd.nist.gov/vuln/detail/CVE-2018-19607 | |
gpac.cve-2023-3012 | NULL Pointer Dereference in GitHub repository gpac/gpac prior to 2.2.2. | https://huntr.dev/bounties/916b787a-c603-409d-afc6-25bb02070e69 | https://github.com/gpac/gpac/commit/53387aa86c1af1228d0fa57c67f9c7330716d5a7, https://huntr.dev/bounties/916b787a-c603-409d-afc6-25bb02070e69 | CWE-476 | gpac/gpac | 53387aa86c1af1228d0fa57c67f9c7330716d5a7~1 | diff --git a/src/utils/xml_parser.c b/src/utils/xml_parser.c
index 49df338164..11f6f2f5ca 100644
--- a/src/utils/xml_parser.c
+++ b/src/utils/xml_parser.c
@@ -704,6 +704,8 @@ static void xml_sax_parse_entity(GF_SAXParser *parser)
}
}
if (ent_name) gf_free(ent_name);
+ if (ent && !ent->value)
+ parser->sax_state... | https://nvd.nist.gov/vuln/detail/CVE-2023-3012 | ||||
imagemagick.cve-2019-13309 | ImageMagick 7.0.8-50 Q16 has memory leaks at AcquireMagickMemory because of mishandling the NoSuchImage error in CLIListOperatorImages in MagickWand/operation.c. | https://github.com/ImageMagick/ImageMagick/issues/1616 | https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d, https://github.com/ImageMagick/ImageMagick/issues/1616, https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51 | CWE-401 | ImageMagick/ImageMagick | 5f21230b657ccd65452dd3d94c5b5401ba691a2d~1 | diff --git a/MagickWand/mogrify.c b/MagickWand/mogrify.c
index 82b3c0c1c4a..150b6792304 100644
--- a/MagickWand/mogrify.c
+++ b/MagickWand/mogrify.c
@@ -7908,6 +7908,8 @@ WandExport MagickBooleanType MogrifyImageList(ImageInfo *image_info,
&distortion,exception);
if (difference_image == (Ima... | https://github.com/ImageMagick/ImageMagick/issues/1616 | ==22113==ERROR: LeakSanitizer: detected memory leaks
Direct leak of 13504 byte(s) in 1 object(s) allocated from:
#0 0x4e5397 in __interceptor_malloc (install/bin/magick+0x4e5397)
#1 0x7f9c4c438106 in AcquireMagickMemory MagickCore/memory.c:478:10
#2 0x7f9c4c3e5114 in AcquireCriticalMemory ./MagickCore/memo... | === https://github.com/ImageMagick/ImageMagick/issues/1616 ===
Title: memory leaks is detected at AcquireMagickMemory
---
Body:
### Prerequisites
- [x] I have written a descriptive issue title
- [x] I have verified that I am using the latest version of ImageMagick
- [x] I have searched [open](https://github.com/... | https://nvd.nist.gov/vuln/detail/CVE-2019-13309 | |
faad2.cve-2018-20196 | There is a stack-based buffer overflow in the third instance of the calculate_gain function in libfaad/sbr_hfadj.c in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.8. A crafted input will lead to a denial of service or possibly unspecified other impact because the S_M array is mishandled. | https://github.com/knik0/faad2/issues/19 | https://github.com/hlef/faad2/commit/6aeeaa1af0caf986daf22852a97f7c13c5edd879 | CWE-787 | hlef/faad2 | 6aeeaa1af0caf986daf22852a97f7c13c5edd879~1 | diff --git a/libfaad/sbr_fbt.c b/libfaad/sbr_fbt.c
index 5919c7b5..ee770589 100644
--- a/libfaad/sbr_fbt.c
+++ b/libfaad/sbr_fbt.c
@@ -526,6 +526,8 @@ uint8_t derived_frequency_table(sbr_info *sbr, uint8_t bs_xover_band,
}
sbr->M = sbr->f_table_res[HI_RES][sbr->N_high] - sbr->f_table_res[HI_RES][0];
+ if... | https://github.com/knik0/faad2/issues/19 | ==7025==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7ffc1ba22024 at pc 0x7ffabd7b4a49 bp 0x7ffc1ba21cd0 sp 0x7ffc1ba21cc0
WRITE of size 4 at 0x7ffc1ba22024 thread T0
#0 0x7ffabd7b4a48 in calculate_gain /root/faad2_asan/libfaad/sbr_hfadj.c:1287
#1 0x7ffabd7b2392 in hf_adjustment /root/faad2_asan/... | === https://github.com/knik0/faad2/issues/19 ===
Title: stack-buffer-overflow in function calculate_gain(libfaad/sbr_hfadj.c:1287)
---
Body:
Hi, i found a stack-buffer-overflow bug in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.8, the details are below(ASAN):
```
./faad faad_res/013-stack-buffer-overflow-sbr_hf... | https://nvd.nist.gov/vuln/detail/CVE-2018-20196 | |
gpac.cve-2022-2453 | Use After Free in GitHub repository gpac/gpac prior to 2.1-DEV. | https://huntr.dev/bounties/c8c964de-046a-41b2-9ff5-e25cfdb36b5a | https://github.com/gpac/gpac/commit/dc7de8d3d604426c7a6e628d90cb9fb88e7b4c2c, https://huntr.dev/bounties/c8c964de-046a-41b2-9ff5-e25cfdb36b5a | CWE-416 | gpac/gpac | dc7de8d3d604426c7a6e628d90cb9fb88e7b4c2c~1 | diff --git a/src/bifs/field_decode.c b/src/bifs/field_decode.c
index 5537da7d3d..65d045b02a 100644
--- a/src/bifs/field_decode.c
+++ b/src/bifs/field_decode.c
@@ -427,64 +427,71 @@ GF_Err BD_DecMFFieldVec(GF_BifsDecoder * codec, GF_BitStream *bs, GF_Node *node,
e = gf_bifs_dec_sf_field(codec, bs, node, &sffield, GF... | https://huntr.dev/bounties/c8c964de-046a-41b2-9ff5-e25cfdb36b5a | https://nvd.nist.gov/vuln/detail/CVE-2022-2453 | |||
gpac.cve-2021-40566 | A Segmentation fault casued by heap use after free vulnerability exists in Gpac through 1.0.1 via the mpgviddmx_process function in reframe_mpgvid.c when using mp4box, which causes a denial of service. | https://github.com/gpac/gpac/commit/96047e0e6166407c40cc19f4e94fb35cd7624391 | CWE-416 | gpac/gpac | 96047e0e6166407c40cc19f4e94fb35cd7624391~1 | diff --git a/src/filters/dec_xvid.c b/src/filters/dec_xvid.c
index dff56bf10d..ab86d85b13 100644
--- a/src/filters/dec_xvid.c
+++ b/src/filters/dec_xvid.c
@@ -181,7 +181,7 @@ static GF_Err xviddec_configure_pid(GF_Filter *filter, GF_FilterPid *pid, Bool i
/*decode DSI*/
e = gf_m4v_get_config(p->value.data.ptr, p->v... | https://github.com/gpac/gpac/issues/1887 | ==9071==ERROR: AddressSanitizer: heap-use-after-free on address 0x62600001b100 at pc 0x7ff1a2599733 bp 0x7ffe1e68b1f0 sp 0x7ffe1e68a998
READ of size 10000 at 0x62600001b100 thread T0
#0 0x7ff1a2599732 (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x79732)
#1 0x7ff1a0b32e8e in memcpy /usr/include/x86_64-linux-gnu/... | === https://github.com/gpac/gpac/issues/1887 ===
Title: Segmentation fault casued by heap use after free using mp4box in mpgviddmx_process, reframe_mpgvid.c:851
---
Body:
- [x] I looked for a similar issue and couldn't find any.
- [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/do... | https://nvd.nist.gov/vuln/detail/CVE-2021-40566 | ||
libredwg.cve-2020-6615 | GNU LibreDWG 0.9.3.2564 has an invalid pointer dereference in dwg_dynapi_entity_value in dynapi.c (dynapi.c is generated by gen-dynapi.pl). | https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447223 | https://github.com/LibreDWG/libredwg/commit/757b87f2d01127df1fa890f7a6c8608ffe9cd23e | CWE-476 | LibreDWG/libredwg | 3f515d52954e2ec009a2508d3d5be04e3bcc094b | diff --git a/examples/dwg2svg2.c b/examples/dwg2svg2.c
index 60e388887f..8d39e60635 100644
--- a/examples/dwg2svg2.c
+++ b/examples/dwg2svg2.c
@@ -322,16 +322,12 @@ output_BLOCK_HEADER (dwg_object_ref *ref)
return;
}
hdr = dwg_ref_get_object (ref, &error);
- log_if_error ("reference_get_object");
+ if ... | https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447223 | ==4335==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x611000000258 at pc 0x55f9e1e04e05 bp 0x7ffc92f94a40 sp 0x7ffc92f94a30
READ of size 8 at 0x611000000258 thread T0
#0 0x55f9e1e04e04 in read_pages_map ../../src/decode_r2007.c:1007
#1 0x55f9e1e04e04 in read_r2007_meta_data ../../src/decode_r2007.c... | === https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447223 ===
Title: Several bugs found by fuzzing
---
Body:
Hi,
After fuzzing libredwg, I found the following bugs on the latest commit on master.
Command: ./dwg2svg2 $PoC
**1.heap-buffer-overflow in read_pages_map ../../src/decode_r2007.c:1007**
P... | https://nvd.nist.gov/vuln/detail/CVE-2020-6615 | |
gpac.cve-2023-46930 | GPAC 2.3-DEV-rev605-gfc9e29089-master contains a SEGV in gpac/MP4Box in gf_isom_find_od_id_for_track /afltest/gpac/src/isomedia/media_odf.c:522:14. | https://github.com/gpac/gpac/commit/3809955065afa3da1ad580012ec43deadbb0f2c8 | CWE-787 | gpac/gpac | 3809955065afa3da1ad580012ec43deadbb0f2c8~1 | diff --git a/src/isomedia/media_odf.c b/src/isomedia/media_odf.c
index 76ecf9d135..5d842028ca 100644
--- a/src/isomedia/media_odf.c
+++ b/src/isomedia/media_odf.c
@@ -517,6 +517,13 @@ u32 gf_isom_find_od_id_for_track(GF_ISOFile *file, u32 track)
i=0;
while ( (od_tk = (GF_TrackBox*)gf_list_enum(file->moov->trackLi... | https://github.com/gpac/gpac/issues/2666 | AddressSanitizer:DEADLYSIGNAL
=================================================================
==3351432==ERROR: AddressSanitizer: SEGV on unknown address 0x00000000002c (pc 0x7ffff6697edd bp 0x7ffffffe65f0 sp 0x7ffffffe6420 T0)
==3351432==The signal is caused by a READ memory access.
==3351432==Hint: address points t... | === https://github.com/gpac/gpac/issues/2666 ===
Title: SEGV in gpac/MP4Box in gf_isom_find_od_id_for_track /afltest/gpac/src/isomedia/media_odf.c:522:14
---
Body:
# SEGV in MP4Box
### Description
SEGV in gpac/MP4Box.
#0 0x7ffff6697edd in gf_isom_find_od_id_for_track /afltest/gpac/src/isomedia/media_odf.c:52... | https://nvd.nist.gov/vuln/detail/CVE-2023-46930 | ||
gpac.cve-2023-3291 | Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.2.2. | https://huntr.dev/bounties/526954e6-8683-4697-bfa2-886c3204a1d5 | https://github.com/gpac/gpac/commit/6a748ccc3f76ff10e3ae43014967ea4b0c088aaf | CWE-122, CWE-787 | gpac/gpac | 6a748ccc3f76ff10e3ae43014967ea4b0c088aaf~1 | diff --git a/src/filters/reframe_mp3.c b/src/filters/reframe_mp3.c
index e81dd174a6..6ed5608b86 100644
--- a/src/filters/reframe_mp3.c
+++ b/src/filters/reframe_mp3.c
@@ -265,7 +265,7 @@ void id3dmx_flush(GF_Filter *filter, u8 *id3_buf, u32 id3_buf_size, GF_FilterPid
break;
}
- if (buf_alloc<=fsize) {
+ if (... | https://nvd.nist.gov/vuln/detail/CVE-2023-3291 | ||||
njs.cve-2023-27727 | Nginx NJS v0.7.10 was discovered to contain a segmentation violation via the function njs_function_frame at src/njs_function.h. | https://github.com/nginx/njs/issues/617 | https://github.com/nginx/njs/commit/484411868bf9351ae7513008f6efd28caa72574f | CWE-125 | nginx/njs | 484411868bf9351ae7513008f6efd28caa72574f~1 | diff --git a/src/njs_object_prop.c b/src/njs_object_prop.c
index 6bf1c280c..005c2eac5 100644
--- a/src/njs_object_prop.c
+++ b/src/njs_object_prop.c
@@ -102,7 +102,11 @@ njs_object_property(njs_vm_t *vm, njs_object_t *object, njs_lvlhsh_query_t *lhq,
ret = njs_lvlhsh_find(&object->hash, lhq);
if (nj... | https://github.com/nginx/njs/issues/617 | ==31577==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000030 (pc 0x00000053ee4e bp 0x7ffc9539f0f0 sp 0x7ffc9539f0d0 T0)
==31577==The signal is caused by a READ memory access.
==31577==Hint: address points to the zero page.
#0 0x53ee4e in njs_function_frame /root/njs/src/njs_function.h:155:9
#1 0x53e... | === https://github.com/nginx/njs/issues/617 ===
Title: SEGV src/njs_function.h:155:9 in njs_function_frame
---
Body:
Environment
```
commit: 4c1e23326e1c30e4e051bf588bfc1aaa63954976
version: 0.7.10
Build :
./configure --cc=clang --address-sanitizer=YES
make
```
Poc
```js
const v1 = EvalErr... | https://nvd.nist.gov/vuln/detail/CVE-2023-27727 | |
mruby.cve-2022-0717 | Out-of-bounds Read in GitHub repository mruby/mruby prior to 3.2. | https://huntr.dev/bounties/27a851a5-7ebf-409b-854f-b2614771e8f9 | https://github.com/mruby/mruby/commit/f72315575f78a9a773adbce0ee7d3ec33434cb76 | CWE-125 | mruby/mruby | f72315575f78a9a773adbce0ee7d3ec33434cb76~1 | diff --git a/mrbgems/mruby-compiler/core/codegen.c b/mrbgems/mruby-compiler/core/codegen.c
index 729f575661..37b1307e65 100644
--- a/mrbgems/mruby-compiler/core/codegen.c
+++ b/mrbgems/mruby-compiler/core/codegen.c
@@ -1904,8 +1904,12 @@ gen_assignment(codegen_scope *s, node *tree, node *rhs, int sp, int val)
if... | ASan (inferred) | https://nvd.nist.gov/vuln/detail/CVE-2022-0717 | |||
libredwg.cve-2020-6614 | GNU LibreDWG 0.9.3.2564 has a heap-based buffer over-read in bfr_read in decode.c. | https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447068 | https://github.com/LibreDWG/libredwg/commit/25228ca37c7489bce0255dd0cfc5e1507a6c1eea | CWE-125 | LibreDWG/libredwg | 3f515d52954e2ec009a2508d3d5be04e3bcc094b | diff --git a/src/decode.c b/src/decode.c
index 205056abe1..f62dbed3e7 100644
--- a/src/decode.c
+++ b/src/decode.c
@@ -2050,7 +2050,7 @@ read_R2004_section_info (Bit_Chain *restrict dat, Dwg_Data *restrict dwg,
uint64_t sum_decomp = 0;
uint64_t prev_address = 0;
- if (ptr + 64 >= decomp_end)
+ ... | https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447068 | === https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447068 ===
Title: Several bugs found by fuzzing
---
Body:
Hi,
After fuzzing libredwg, I found the following bugs on the latest commit on master.
Command: ./dwg2svg2 $PoC
**1.heap-buffer-overflow in read_pages_map ../../src/decode_r2007.c:1007**
P... | https://nvd.nist.gov/vuln/detail/CVE-2020-6614 | ||
faad2.cve-2018-20195 | A NULL pointer dereference was discovered in ic_predict of libfaad/ic_predict.c in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.8. The vulnerability causes a segmentation fault and application crash, which leads to denial of service. | https://github.com/knik0/faad2/issues/25 | https://github.com/knik0/faad2/commit/466b01d504d7e45f1e9169ac90b3e34ab94aed14 | CWE-476 | knik0/faad2 | 334e7647a5f31903aca33dde39bb8683e9d8cccd | diff --git a/libfaad/syntax.c b/libfaad/syntax.c
index f8e808c2..e7fb1138 100644
--- a/libfaad/syntax.c
+++ b/libfaad/syntax.c
@@ -344,6 +344,12 @@ static void decode_sce_lfe(NeAACDecStruct *hDecoder,
can become 2 when some form of Parametric Stereo coding is used
*/
+ if (hDecoder->frame && hDecoder-... | https://github.com/knik0/faad2/issues/25, https://seclists.org/bugtraq/2019/Sep/28 | ==7073==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x7f440069b99e bp 0x7ffe0d2d4b70 sp 0x7ffe0d2d49f0 T0)
#0 0x7f440069b99d in ic_predict /root/faad2_asan/libfaad/ic_predict.c:96
#1 0x7f440069cbc0 in ic_prediction /root/faad2_asan/libfaad/ic_predict.c:252
#2 0x7f44006d0a14 in recons... | === https://github.com/knik0/faad2/issues/25 ===
Title: Null pointer dereference vulnerability in ic_predict (libfaad/ic_predict.c:96)
---
Body:
Hi, i found a null pointer dereference bug in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.8. It crashed in function ic_predict .the details are below(ASAN):
```
./faad... | https://nvd.nist.gov/vuln/detail/CVE-2018-20195 | |
gpac.cve-2024-0322 | Out-of-bounds Read in GitHub repository gpac/gpac prior to 2.3-DEV. | https://huntr.com/bounties/87611fc9-ed7c-43e9-8e52-d83cd270bbec | https://github.com/gpac/gpac/commit/092904b80edbc4dce315684a59cc3184c45c1b70 | CWE-125 | gpac/gpac | 092904b80edbc4dce315684a59cc3184c45c1b70~1 | diff --git a/src/filters/reframe_ac3.c b/src/filters/reframe_ac3.c
index 7b6452ed76..a73455978d 100644
--- a/src/filters/reframe_ac3.c
+++ b/src/filters/reframe_ac3.c
@@ -480,12 +480,11 @@ GF_Err ac3dmx_process(GF_Filter *filter)
cts = GF_FILTER_NO_TS;
}
- if (!ctx->in_seek && remain >= ctx->hdr.framesize) {
... | ASan (inferred) | https://nvd.nist.gov/vuln/detail/CVE-2024-0322 | |||
njs.cve-2023-27728 | Nginx NJS v0.7.10 was discovered to contain a segmentation violation via the function njs_dump_is_recursive at src/njs_vmcode.c. | https://github.com/nginx/njs/issues/618 | https://github.com/nginx/njs/commit/1f54b79cabd1d112624ebba4d0a5f07cb3f70e95 | CWE-125 | nginx/njs | 1f54b79cabd1d112624ebba4d0a5f07cb3f70e95~1 | diff --git a/src/njs_json.c b/src/njs_json.c
index 6e53286cc..6a37f76de 100644
--- a/src/njs_json.c
+++ b/src/njs_json.c
@@ -2085,32 +2085,30 @@ njs_vm_value_dump(njs_vm_t *vm, njs_str_t *retval, njs_value_t *value,
val = njs_prop_value(prop);
- if (!state->fast_array) {
- if (prop->type ... | https://github.com/nginx/njs/issues/618 | ==31165==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000022 (pc 0x00000053426f bp 0x7ffef5d7b170 sp 0x7ffef5d7a3e0 T0)
==31165==The signal is caused by a READ memory access.
==31165==Hint: address points to the zero page.
#0 0x53426f in njs_dump_is_recursive /root/njs/src/njs_json.c
#1 0x53426f in ... | === https://github.com/nginx/njs/issues/618 ===
Title: SEGV src/njs_json.c in njs_dump_is_recursive
---
Body:
Environment
```
commit: 4c1e23326e1c30e4e051bf588bfc1aaa63954976
version: 0.7.10
Build :
./configure --cc=clang --address-sanitizer=YES
make
```
Poc
```js
Object.defineProperty([],... | https://nvd.nist.gov/vuln/detail/CVE-2023-27728 | |
openjpeg.cve-2016-7445 | convert.c in OpenJPEG before 2.1.2 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via vectors involving the variable s. | http://www.openwall.com/lists/oss-security/2016/09/18/4 | https://github.com/uclouvain/openjpeg/commit/fac916f72a162483a4d6d804fd070fdf32f402ed | CWE-476 | uclouvain/openjpeg | 53f25200ed696cf5dc71d5fe12faad2570861b20 | diff --git a/src/bin/jp2/convert.c b/src/bin/jp2/convert.c
index c130b3bfb..deee4f6e0 100644
--- a/src/bin/jp2/convert.c
+++ b/src/bin/jp2/convert.c
@@ -1328,11 +1328,14 @@ struct pnm_header
static char *skip_white(char *s)
{
- while(*s)
+ if (s != NULL)
{
- if(*s == '\n' || *s == '\r') return NUL... | https://github.com/uclouvain/openjpeg/issues/843 | ==7358==ERROR: AddressSanitizer: SEGV on unknown address 0x00000000 (pc 0x0815d204 bp 0xff846938 sp 0xff846380 T0)
#0 0x815d203 in skip_white /home/starlab/fuzzing/openjpeg/src/bin/jp2/convert.c:1331
#1 0x8135d81 in main /home/starlab/fuzzing/openjpeg/src/bin/jp2/opj_compress.c:1723
#2 0xf7343636 in __libc_... | === https://github.com/uclouvain/openjpeg/issues/843 ===
Title: null ptr dereference in convert.c:1331
---
Body:
# Vulnerability
openjpeg null ptr dereference in convert.c:1331
# Version
git head version ( https://github.com/uclouvain/openjpeg/ )
# Address Sanitizer Output
# ASAN:SIGSEGV
==7358==ERROR: AddressSan... | https://nvd.nist.gov/vuln/detail/CVE-2016-7445 | |
faad2.cve-2021-32272 | An issue was discovered in faad2 before 2.10.0. A heap-buffer-overflow exists in the function stszin located in mp4read.c. It allows an attacker to cause Code Execution. | https://github.com/knik0/faad2/issues/57 | https://github.com/knik0/faad2/commit/1b71a6ba963d131375f5e489b3b25e36f19f3f24 | CWE-787 | knik0/faad2 | 1b71a6ba963d131375f5e489b3b25e36f19f3f24~1 | diff --git a/frontend/mp4read.c b/frontend/mp4read.c
index 14146843..6a618d33 100644
--- a/frontend/mp4read.c
+++ b/frontend/mp4read.c
@@ -344,7 +344,10 @@ static int stszin(int size)
u32in();
// Number of entries
mp4config.frame.ents = u32in();
- // fixme: check atom size
+
+ if (!(mp4config.frame... | https://github.com/knik0/faad2/issues/57 | *********** Ahead Software MPEG-4 AAC Decoder V2.9.2 ******************
Build: Aug 30 2020
Copyright 2002-2004: Ahead Software AG
http://www.audiocoding.com
bug tracking: https://sourceforge.net/p/faac/bugs/
Floating point version
This program is free software; you can redistribute it and/or modify
it under th... | ASan (inferred) | === https://github.com/knik0/faad2/issues/57 ===
Title: A heap-buffer-overflow in mp4read.c:355:29
---
Body:
## System info
Ubuntu x86_64, clang 6.0, faad (latest master [1073ae](https://github.com/knik0/faad2/commit/1073aeef823cafd844704389e9a497c257768e2f))
## Configure
CFLAGS="-g -fsanitize=address" LDFLA... | https://nvd.nist.gov/vuln/detail/CVE-2021-32272 |
njs.cve-2022-31306 | Nginx NJS v0.7.2 was discovered to contain a segmentation violation in the function njs_array_convert_to_slow_array at src/njs_array.c. | https://github.com/nginx/njs/issues/481 | https://github.com/nginx/njs/commit/81af26364c21c196dd21fb5e14c7fa9ce7debd17 | CWE-416 | nginx/njs | 81af26364c21c196dd21fb5e14c7fa9ce7debd17~1 | diff --git a/src/njs_array.c b/src/njs_array.c
index ec3a5da93..2367420dc 100644
--- a/src/njs_array.c
+++ b/src/njs_array.c
@@ -142,6 +142,10 @@ njs_array_convert_to_slow_array(njs_vm_t *vm, njs_array_t *array)
njs_value_t index, value;
njs_object_prop_t *prop;
+ if (njs_slow_path(!array->object... | https://github.com/nginx/njs/issues/481 | AddressSanitizer:DEADLYSIGNAL
=================================================================
==732125==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x00000051dc3a bp 0x7ffde9d83b90 sp 0x7ffde9d83a80 T0)
==732125==The signal is caused by a READ memory access.
==732125==Hint: address points to t... | === https://github.com/nginx/njs/issues/481 ===
Title: SEGV njs_array.c:151:13 in njs_array_convert_to_slow_array
---
Body:
### Environment
```
OS : Linux ubuntu 5.13.0-27-generic #29~20.04.1-Ubuntu SMP Fri Jan 14 00:32:30 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux
Commit : f65981b0b8fcf02d69a40bc934803c25c9f... | https://nvd.nist.gov/vuln/detail/CVE-2022-31306 | |
gpac.cve-2023-0770 | Stack-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.2. | https://huntr.dev/bounties/e0fdeee5-7909-446e-9bd0-db80fd80e8dd | https://github.com/gpac/gpac/commit/c31941822ee275a35bc148382bafef1c53ec1c26, https://huntr.dev/bounties/e0fdeee5-7909-446e-9bd0-db80fd80e8dd | CWE-121, CWE-787 | gpac/gpac | c31941822ee275a35bc148382bafef1c53ec1c26~1 | diff --git a/src/scenegraph/vrml_proto.c b/src/scenegraph/vrml_proto.c
index df30ed0dfa..02b92b5769 100644
--- a/src/scenegraph/vrml_proto.c
+++ b/src/scenegraph/vrml_proto.c
@@ -1292,7 +1292,10 @@ Bool gf_sg_proto_field_is_sftime_offset(GF_Node *node, GF_FieldInfo *field)
gf_node_get_field(r->ToNode, r->ToField.f... | https://huntr.dev/bounties/e0fdeee5-7909-446e-9bd0-db80fd80e8dd | https://nvd.nist.gov/vuln/detail/CVE-2023-0770 | |||
faad2.cve-2018-20361 | An invalid memory address dereference was discovered in the hf_assembly function of libfaad/sbr_hfadj.c in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.8. The vulnerability causes a segmentation fault and application crash, which leads to denial of service. | https://github.com/knik0/faad2/issues/30 | https://github.com/knik0/faad2/commit/6b4a7cde30f2e2cb03e78ef476cc73179cfffda3 | CWE-119 | knik0/faad2 | 6b4a7cde30f2e2cb03e78ef476cc73179cfffda3~1 | diff --git a/libfaad/sbr_hfadj.c b/libfaad/sbr_hfadj.c
index 3f310b81..dda1ce8e 100644
--- a/libfaad/sbr_hfadj.c
+++ b/libfaad/sbr_hfadj.c
@@ -485,6 +485,12 @@ static void calculate_gain(sbr_info *sbr, sbr_hfadj_info *adj, uint8_t ch)
ml1 = sbr->f_table_lim[sbr->bs_limiter_bands][k];
ml2 = sbr... | https://github.com/knik0/faad2/issues/30, https://seclists.org/bugtraq/2019/Sep/28 | ==7089==ERROR: AddressSanitizer: SEGV on unknown address 0x0000000030da (pc 0x7f2a44f66a79 bp 0x7ffc06965b70 sp 0x7ffc06965ab0 T0)
#0 0x7f2a44f66a78 in hf_assembly /root/faad2_asan/libfaad/sbr_hfadj.c:1536
#1 0x7f2a44f633b6 in hf_adjustment /root/faad2_asan/libfaad/sbr_hfadj.c:90
#2 0x7f2a44f81725 in sbr_pr... | === https://github.com/knik0/faad2/issues/30 ===
Title: Invalid memory address dereference in hf_assembly (in libfaad/sbr_hfadj.c:1536)
---
Body:
Hi, i found a issue in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.8. It crashed in function hf_assembly .the details are below(ASAN):
```
./faad faad_res/009-invalid... | https://nvd.nist.gov/vuln/detail/CVE-2018-20361 | |
wabt.cve-2022-43282 | wasm-interp v1.0.29 was discovered to contain an out-of-bounds read via the component OnReturnCallIndirectExpr->GetReturnCallDropKeepCount. | https://github.com/WebAssembly/wabt/issues/1983 | https://github.com/matthias-blume/wabt/commit/fd730433e05de72fae064f9f404e1bc922285971 | CWE-125 | matthias-blume/wabt | fd730433e05de72fae064f9f404e1bc922285971~1 | diff --git a/src/decompiler-ast.h b/src/decompiler-ast.h
index 584a837301..e5dd358e9c 100644
--- a/src/decompiler-ast.h
+++ b/src/decompiler-ast.h
@@ -226,6 +226,11 @@ struct AST {
mc.GetLabel(cast<BrIfExpr>(&e)->var)->label_type;
return;
}
+ case ExprType::BrTable: {
+ InsertNo... | https://github.com/WebAssembly/wabt/issues/1983 | /wabt/out/clang/Debug/asan/wasm-interp --enable-all ./poc-interp-3.wasm
AddressSanitizer:DEADLYSIGNAL
=================================================================
==1491197==ERROR: AddressSanitizer: SEGV on unknown address 0x60600008bb58 (pc 0x000000509b3e bp 0x7ffe9a810b70 sp 0x7ffe9a810b40 T0)
==1491197==The si... | ASan (inferred) | === https://github.com/WebAssembly/wabt/issues/1983 ===
Title: Out-of-bound read in OnReturnCallIndirectExpr->GetReturnCallDropKeepCount
---
Body:
### Environment
```
OS : Linux ubuntu 5.15.0-46-generic #49~20.04.1-Ubuntu SMP Thu Aug 4 19:15:44 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux
Commit : 3054d61f703d609... | https://nvd.nist.gov/vuln/detail/CVE-2022-43282 |
faad2.cve-2018-20357 | A NULL pointer dereference was discovered in sbr_process_channel of libfaad/sbr_dec.c in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.8. The vulnerability causes a segmentation fault and application crash. | https://github.com/knik0/faad2/issues/28 | https://github.com/knik0/faad2/commit/6b4a7cde30f2e2cb03e78ef476cc73179cfffda3 | CWE-476 | knik0/faad2 | 6b4a7cde30f2e2cb03e78ef476cc73179cfffda3~1 | diff --git a/libfaad/sbr_hfadj.c b/libfaad/sbr_hfadj.c
index 3f310b81..dda1ce8e 100644
--- a/libfaad/sbr_hfadj.c
+++ b/libfaad/sbr_hfadj.c
@@ -485,6 +485,12 @@ static void calculate_gain(sbr_info *sbr, sbr_hfadj_info *adj, uint8_t ch)
ml1 = sbr->f_table_lim[sbr->bs_limiter_bands][k];
ml2 = sbr... | https://github.com/knik0/faad2/issues/28, https://seclists.org/bugtraq/2019/Sep/28 | ASAN:SIGSEGVfaad_res/014-null-point-sbr_dec_413.
=================================================================
==7082==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x7f1bfe18af07 bp 0x7ffcee38c300 sp 0x7ffcee38c2c0 T0)
#0 0x7f1bfe18af06 in sbr_process_channel /root/faad2_asan/libfaad/sbr_... | === https://github.com/knik0/faad2/issues/28 ===
Title: Null pointer dereference vulnerability in sbr_process_channel(libfaad/sbr_dec.c:413)
---
Body:
Hi, i found a null pointer dereference bug in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.8. It crashed in function sbr_process_channel.the details are below(ASAN):
... | https://nvd.nist.gov/vuln/detail/CVE-2018-20357 | |
gpac.cve-2023-0866 | Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.3.0-DEV. | https://huntr.dev/bounties/7d3c5792-d20b-4cb6-9c6d-bb14f3430d7f | https://github.com/gpac/gpac/commit/b964fe4226f1424cf676d5822ef898b6b01f5937, https://huntr.dev/bounties/7d3c5792-d20b-4cb6-9c6d-bb14f3430d7f | CWE-122 | gpac/gpac | b964fe4226f1424cf676d5822ef898b6b01f5937~1 | diff --git a/src/filters/reframe_adts.c b/src/filters/reframe_adts.c
index 80c98e522e..818273e58e 100644
--- a/src/filters/reframe_adts.c
+++ b/src/filters/reframe_adts.c
@@ -300,7 +300,7 @@ static void adts_dmx_check_dur(GF_Filter *filter, GF_ADTSDmxCtx *ctx)
}
}
}
-
+
p = gf_filter_pid_get_property(ctx->i... | https://nvd.nist.gov/vuln/detail/CVE-2023-0866 | ||||
libredwg.cve-2022-45332 | LibreDWG v0.12.4.4643 was discovered to contain a heap buffer overflow via the function decode_preR13_section_hdr at decode_r11.c. | https://github.com/LibreDWG/libredwg/issues/524 | https://github.com/LibreDWG/libredwg/commit/84d938b1d28d514eead8fdc21e7eec4fdfe053f5 | CWE-787 | LibreDWG/libredwg | 84d938b1d28d514eead8fdc21e7eec4fdfe053f5~1 | diff --git a/src/decode_r11.c b/src/decode_r11.c
index 7db9052ce0..6d14edc7bd 100644
--- a/src/decode_r11.c
+++ b/src/decode_r11.c
@@ -263,8 +263,8 @@ decode_preR13_section (Dwg_Section_Type_r11 id, Bit_Chain *restrict dat,
Dwg_Object_##token *_obj; \
Dwg_Object *... | https://github.com/LibreDWG/libredwg/issues/524 | ==4080011==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x618000000428 at pc 0x000000480860 bp 0x7ffddb1de850 sp 0x7ffddb1de008
WRITE of size 63 at 0x618000000428 thread T0
#0 0x48085f in strncpy /home/brian/src/final/llvm-project/compiler-rt/lib/asan/asan_interceptors.cpp:483:5
#1 0x1123350 in deco... | === https://github.com/LibreDWG/libredwg/issues/524 ===
Title: heap-buffer-overflow exists in the function decode_preR13_section_hdr in decode_r11.c
---
Body:
**System info**
Ubuntu x86_64, clang 10.0
version: 0.12.4.4643, last commit [93c2512](https://github.com/LibreDWG/libredwg/commit/93c25124c191987af168ace9fe4... | https://nvd.nist.gov/vuln/detail/CVE-2022-45332 | |
gpac.cve-2023-0358 | Use After Free in GitHub repository gpac/gpac prior to 2.3.0-DEV. | https://huntr.dev/bounties/93e128ed-253f-4c42-81ff-fbac7fd8f355 | https://github.com/gpac/gpac/commit/9971fb125cf91cefd081a080c417b90bbe4a467b, https://huntr.dev/bounties/93e128ed-253f-4c42-81ff-fbac7fd8f355 | CWE-416 | gpac/gpac | 9971fb125cf91cefd081a080c417b90bbe4a467b~1 | diff --git a/src/odf/descriptors.c b/src/odf/descriptors.c
index 0d42ff2df2..913d8e27af 100644
--- a/src/odf/descriptors.c
+++ b/src/odf/descriptors.c
@@ -1395,12 +1395,12 @@ GF_VVCConfig *gf_odf_vvc_cfg_read_bs(GF_BitStream *bs)
gf_list_add(cfg->param_array, ar);
break;
default:
- GF_LOG(GF_LOG_WARNING, G... | https://nvd.nist.gov/vuln/detail/CVE-2023-0358 | ||||
mruby.cve-2022-0623 | Out-of-bounds Read in Homebrew mruby prior to 3.2. | https://huntr.dev/bounties/5b908ac7-d8f1-4fcd-9355-85df565f7580 | https://github.com/mruby/mruby/commit/ff3a5ebed6ffbe3e70481531cfb969b497aa73ad, https://huntr.dev/bounties/5b908ac7-d8f1-4fcd-9355-85df565f7580 | CWE-125 | mruby/mruby | ff3a5ebed6ffbe3e70481531cfb969b497aa73ad~1 | diff --git a/src/vm.c b/src/vm.c
index 6133cbccac..9cb50847f2 100644
--- a/src/vm.c
+++ b/src/vm.c
@@ -2766,7 +2766,7 @@ mrb_vm_exec(mrb_state *mrb, const struct RProc *proc, const mrb_code *pc)
int lim = a+b*2+1;
hash = regs[a];
- mrb_assert(mrb_hash_p(hash));
+ mrb_ensure_hash_type(mrb, hash... | ASan (inferred) | https://nvd.nist.gov/vuln/detail/CVE-2022-0623 | |||
imagemagick.cve-2018-5248 | In ImageMagick 7.0.7-17 Q16, there is a heap-based buffer over-read in coders/sixel.c in the ReadSIXELImage function, related to the sixel_decode function. | https://github.com/ImageMagick/ImageMagick/issues/927 | https://github.com/ImageMagick/ImageMagick/commit/0272305f91763b5ce119a2c7a0e0084d8241a58d | CWE-125 | ImageMagick/ImageMagick | c9d4c4ecd1f7fb5168e512a0ba183b4bf8b47ce3 | diff --git a/coders/sixel.c b/coders/sixel.c
index ee146fb1e2f..c54074ae2fd 100644
--- a/coders/sixel.c
+++ b/coders/sixel.c
@@ -999,7 +999,7 @@ static Image *ReadSIXELImage(const ImageInfo *image_info,ExceptionInfo *exceptio
Read SIXEL file.
*/
length=MagickPathExtent;
- sixel_buffer=(char *) AcquireQuantu... | https://github.com/ImageMagick/ImageMagick/issues/927 | ==108451==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x621000007500 at pc 0x7fcb10a33585 bp 0x7ffde25a2fd0 sp 0x7ffde25a2fc8
READ of size 1 at 0x621000007500 thread T0
#0 0x7fcb10a33584 in sixel_decode /home/ubuntu/ImageMagick/coders/sixel.c:289:12
#1 0x7fcb10a3455e in ReadSIXELImage /home/ubuntu/... | === https://github.com/ImageMagick/ImageMagick/issues/927 ===
Title: heap-buffer-overflow in sixel_decode
---
Body:
ubuntu@ubuntu:~/fuzz_py$ magick -version
Version: ImageMagick 7.0.7-17 Q16 x86_64 2017-12-26 http://www.imagemagick.org
Copyright: © 1999-2018 ImageMagick Studio LLC
License: http://www.imagemagick.o... | https://nvd.nist.gov/vuln/detail/CVE-2018-5248 | |
openjpeg.cve-2024-56827 | A flaw was found in the OpenJPEG project. A heap buffer overflow condition may be triggered when certain options are specified while using the opj_decompress utility. This can lead to an application crash or other undefined behavior. | CWE-122 | uclouvain/openjpeg | https://bugzilla.redhat.com/show_bug.cgi?id=2335174, https://github.com/uclouvain/openjpeg/issues/1564 | =================================================================
==4004218==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6030000016a8 at pc 0x7f8a2d0491f6 bp 0x7fff212eadd0 sp 0x7fff212eadc8
WRITE of size 8 at 0x6030000016a8 thread T0
#0 0x7f8a2d0491f5 in opj_j2k_add_tlmarker /openjpeg/src/lib/openjp... | === https://github.com/uclouvain/openjpeg/issues/1564 ===
Title: heap-buffer-overflow at lib/openjp2/j2k.c:8460:84 in opj_j2k_add_tlmarker in openjpeg/opj_decompress
---
Body:
### Description
Dear developers,
We found the following heap buffer overflow bug on openjpeg, please confirm.
This bug is triggered ... | https://nvd.nist.gov/vuln/detail/CVE-2024-56827 | |||||
mruby.cve-2018-11743 | The init_copy function in kernel.c in mruby 1.4.1 makes initialize_copy calls for TT_ICLASS objects, which allows attackers to cause a denial of service (mrb_hash_keys uninitialized pointer and application crash) or possibly have unspecified other impact. | https://github.com/mruby/mruby/issues/4027 | https://github.com/mruby/mruby/commit/b64ce17852b180dfeea81cf458660be41a78974d, https://github.com/mruby/mruby/issues/4027 | CWE-824 | mruby/mruby | b64ce17852b180dfeea81cf458660be41a78974d~1 | diff --git a/src/kernel.c b/src/kernel.c
index 8551b50eab..2a50d31263 100644
--- a/src/kernel.c
+++ b/src/kernel.c
@@ -279,6 +279,9 @@ static void
init_copy(mrb_state *mrb, mrb_value dest, mrb_value obj)
{
switch (mrb_type(obj)) {
+ case MRB_TT_ICLASS:
+ copy_class(mrb, dest, obj);
+ return;
case... | https://github.com/mruby/mruby/issues/4027 | ASAN:DEADLYSIGNAL
=================================================================
==37239==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x000106e6eca0 bp 0x7ffee9eb6080 sp 0x7ffee9eb6080 T0)
==37239==The signal is caused by a READ memory access.
==37239==Hint: address points to the zero page.
... | === https://github.com/mruby/mruby/issues/4027 ===
Title: Use of uninitialized pointer in mrb_hash_keys
---
Body:
The following input demonstrates a crash:
```ruby
(Hash::prepend Enumerable).dup()
```
ASAN report:
```
ASAN:DEADLYSIGNAL
=================================================================
==37239=... | https://nvd.nist.gov/vuln/detail/CVE-2018-11743 | |
mruby.cve-2018-10199 | In versions of mruby up to and including 1.4.0, a use-after-free vulnerability exists in src/io.c::File#initilialize_copy(). An attacker that can cause Ruby code to be run can possibly use this to execute arbitrary code. | https://github.com/mruby/mruby/commit/b51b21fc63c9805862322551387d9036f2b63433 | CWE-416 | mruby/mruby | b51b21fc63c9805862322551387d9036f2b63433~1 | diff --git a/mrbgems/mruby-io/src/io.c b/mrbgems/mruby-io/src/io.c
index 58bcdd1ee1..6ace9e1673 100644
--- a/mrbgems/mruby-io/src/io.c
+++ b/mrbgems/mruby-io/src/io.c
@@ -561,13 +561,13 @@ mrb_io_initialize_copy(mrb_state *mrb, mrb_value copy)
mrb_bool failed = TRUE;
mrb_get_args(mrb, "o", &orig);
+ fptr_orig ... | https://github.com/mruby/mruby/issues/4001 | ==9006==ERROR: AddressSanitizer: heap-use-after-free on address 0x602000019890 at pc 0x0000006ed5ce bp 0x7ffd43f26b10 sp 0x7ffd43f26b08
READ of size 4 at 0x602000019890 thread T0
#0 0x6ed5cd in fptr_finalize /home/me/grammarfuzz/mruby/mrbgems/mruby-io/src/io.c:650
SUMMARY: AddressSanitizer: heap-use-after-free /ho... | ASan (inferred) | === https://github.com/mruby/mruby/issues/4001 ===
Title: Use after free in File#initilialize_copy
---
Body:
The following was reported by https://hackerone.com/pnoltof:
-----
Root Cause:
==========
calling `File#initilialize_copy` with an invalid argument, causes the function to terminate early, leaving a ... | https://nvd.nist.gov/vuln/detail/CVE-2018-10199 | |
gpac.cve-2023-4679 | A use after free vulnerability exists in GPAC version 2.3-DEV-revrelease, specifically in the gf_filterpacket_del function in filter_core/filter.c at line 38. This vulnerability can lead to a double-free condition, which may cause the application to crash. | https://huntr.com/bounties/6f721ee7-8785-4c26-801e-f40fed3faaac | https://github.com/gpac/gpac/commit/b68b3f0bf5c366e003221d78fd663a1d5514a876 | CWE-416 | gpac/gpac | b68b3f0bf5c366e003221d78fd663a1d5514a876~1 | diff --git a/src/filters/isoffin_read_ch.c b/src/filters/isoffin_read_ch.c
index 257f5c603a..bd96400689 100644
--- a/src/filters/isoffin_read_ch.c
+++ b/src/filters/isoffin_read_ch.c
@@ -495,6 +495,7 @@ void isor_reader_get_sample(ISOMChannel *ch)
if (ch->pck) {
gf_filter_pck_discard(ch->pck);
ch->pck ... | ASan (inferred) | https://nvd.nist.gov/vuln/detail/CVE-2023-4679 | |||
faad2.cve-2018-20362 | A NULL pointer dereference was discovered in ifilter_bank of libfaad/filtbank.c in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.8. The vulnerability causes a segmentation fault and application crash because adding to windowed output is mishandled in the EIGHT_SHORT_SEQUENCE case. | https://github.com/knik0/faad2/issues/26 | https://github.com/knik0/faad2/pull/33/changes/466b01d504d7e45f1e9169ac90b3e34ab94aed14 | CWE-476 | knik0/faad2 | 5d380279cb00ea7a8b24f647f3790a1fc5342731 | diff --git a/libfaad/sbr_hfadj.c b/libfaad/sbr_hfadj.c
index 3f310b81..dda1ce8e 100644
--- a/libfaad/sbr_hfadj.c
+++ b/libfaad/sbr_hfadj.c
@@ -485,6 +485,12 @@ static void calculate_gain(sbr_info *sbr, sbr_hfadj_info *adj, uint8_t ch)
ml1 = sbr->f_table_lim[sbr->bs_limiter_bands][k];
ml2 = sbr... | https://github.com/knik0/faad2/issues/26, https://seclists.org/bugtraq/2019/Sep/28 | ASAN:SIGSEGV faad_res/008-null-point-filtbank_275.
=================================================================
==7076==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x7f5946ec66b1 bp 0x7fff7f757780 sp 0x7fff7f755690 T0)
#0 0x7f5946ec66b0 in ifilter_bank /root/faad2_asan/libfaad/filtbank.... | === https://github.com/knik0/faad2/issues/26 ===
Title: Null pointer dereference vulnerability in ifilter_bank (libfaad/filtbank.c:275)
---
Body:
Hi, i found a null pointer dereference bug in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.8. It crashed in function ifilter_bank.the details are below(ASAN):
```
./fa... | https://nvd.nist.gov/vuln/detail/CVE-2018-20362 | |
gpac.cve-2023-4682 | Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.3-DEV. | https://huntr.dev/bounties/15232a74-e3b8-43f0-ae8a-4e89d56c474c | https://github.com/gpac/gpac/commit/b1042c3eefca87c4bc32afb404ed6518d693e5be, https://huntr.dev/bounties/15232a74-e3b8-43f0-ae8a-4e89d56c474c | CWE-122 | gpac/gpac | b1042c3eefca87c4bc32afb404ed6518d693e5be~1 | diff --git a/src/media_tools/avilib.c b/src/media_tools/avilib.c
index 459ff80438..27cd81133d 100644
--- a/src/media_tools/avilib.c
+++ b/src/media_tools/avilib.c
@@ -2941,6 +2941,7 @@ int AVI_read_frame(avi_t *AVI, u8 *vidbuf, int *keyframe)
}
gf_fseek(AVI->fdes, AVI->video_index[AVI->video_pos].pos, SEEK_SET);
... | https://nvd.nist.gov/vuln/detail/CVE-2023-4682 | ||||
gpac.cve-2023-48014 | GPAC v2.3-DEV-rev566-g50c2ab06f-master was discovered to contain a stack overflow via the hevc_parse_vps_extension function at /media_tools/av_parsers.c. | https://github.com/gpac/gpac/issues/2613 | https://github.com/gpac/gpac/commit/66abf0887c89c29a484d9e65e70882794e9e3a1b | CWE-787 | gpac/gpac | 66abf0887c89c29a484d9e65e70882794e9e3a1b~1 | diff --git a/src/media_tools/av_parsers.c b/src/media_tools/av_parsers.c
index 8a37040cf6..6e2915d40d 100644
--- a/src/media_tools/av_parsers.c
+++ b/src/media_tools/av_parsers.c
@@ -7726,13 +7726,19 @@ static Bool hevc_parse_vps_extension(HEVC_VPS *vps, GF_BitStream *bs)
}
if (splitting_flag) {
- for (i = 0;... | https://github.com/gpac/gpac/issues/2613 | ==833362==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7ffdcf3828d0 at pc 0x7f6e8e6ab0c1 bp 0x7ffdcf382870 sp 0x7ffdcf382868
WRITE of size 1 at 0x7ffdcf3828d0 thread T0
#0 0x7f6e8e6ab0c0 in hevc_parse_vps_extension /home/user/fuzzing_gpac/gpac/src/media_tools/av_parsers.c:7735:42
#1 0x7f6e8e66492... | === https://github.com/gpac/gpac/issues/2613 ===
Title: stack-buffer-overflow in /gpac/src/media_tools/av_parsers.c:7735:42 in hevc_parse_vps_extension
---
Body:
# Version
```
$ ./MP4Box -version
MP4Box - GPAC version 2.3-DEV-rev566-g50c2ab06f-master
```
# Platform
```
$ uname -a
Linux user-GE40-2PC-Dragon-... | https://nvd.nist.gov/vuln/detail/CVE-2023-48014 | |
libdwarf.cve-2022-32200 | libdwarf 0.4.0 has a heap-based buffer over-read in _dwarf_check_string_valid in dwarf_util.c. | https://github.com/davea42/libdwarf-code/issues/116 | https://github.com/davea42/libdwarf-code/commit/8151575a6ace77d005ca5bb5d71c1bfdba3f7069 | CWE-125 | davea42/libdwarf-code | 8151575a6ace77d005ca5bb5d71c1bfdba3f7069~1 | diff --git a/src/lib/libdwarf/dwarf_global.c b/src/lib/libdwarf/dwarf_global.c
index 03ee0cd22..6cfe883f5 100644
--- a/src/lib/libdwarf/dwarf_global.c
+++ b/src/lib/libdwarf/dwarf_global.c
@@ -31,7 +31,6 @@
#include <config.h>
#include <string.h> /* strlen() */
-
#if defined(_WIN32) && defined(HAVE_STDAFX_H)
#inc... | https://github.com/davea42/libdwarf-code/issues/116, https://www.prevanders.net/dwarfbug.html | =================================================================
==1464907==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6060000015bb at pc 0x00000083fa88 bp 0x7fff18213420 sp 0x7fff18213418
READ of size 1 at 0x6060000015bb thread T0
#0 0x83fa87 in _dwarf_check_string_valid /home/casper/targets/struc... | === https://github.com/davea42/libdwarf-code/issues/116 ===
Title: heap overflow in _dwarf_check_string_valid in dwarf_util.c
---
Body:
There is a heap overflow in _dwarf_check_string_valid in dwarf_util.c. Depending on the usage of this library, this may cause code execution or deny of service.
reproduce steps:
... | https://nvd.nist.gov/vuln/detail/CVE-2022-32200 | |
libsndfile.cve-2018-19432 | An issue was discovered in libsndfile 1.0.28. There is a NULL pointer dereference in the function sf_write_int in sndfile.c, which will lead to a denial of service. | https://github.com/erikd/libsndfile/issues/427 | https://github.com/libsndfile/libsndfile/commit/aaea680337267bfb6d2544da878890ee7f1c5077 | CWE-476 | libsndfile/libsndfile | aaea680337267bfb6d2544da878890ee7f1c5077~1 | diff --git a/programs/sndfile-deinterleave.c b/programs/sndfile-deinterleave.c
index 536603107..225b4d541 100644
--- a/programs/sndfile-deinterleave.c
+++ b/programs/sndfile-deinterleave.c
@@ -89,6 +89,13 @@ main (int argc, char **argv)
exit (1) ;
} ;
+ if (sfinfo.channels > MAX_CHANNELS)
+ { printf ("\nError :... | https://github.com/erikd/libsndfile/issues/427 | AddressSanitizer:DEADLYSIGNAL
=================================================================
==49998==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x7fb21f1413c6 bp 0x7ffe8d3042c0 sp 0x7ffe8d27ba80 T0)
==49998==The signal is caused by a READ memory access.
==49998==Hint: address points to the ... | === https://github.com/erikd/libsndfile/issues/427 ===
Title: out of bounds read in sf_write_int
---
Body:
## version
libsndfile: Version released 1.0.28
## description
An issue was discovered in libsndfile 1.0.28. There is an out of bounds read at function sf_write_int, will lead to a denial of service or the ... | https://nvd.nist.gov/vuln/detail/CVE-2018-19432 | |
faad2.cve-2018-20358 | An invalid memory address dereference was discovered in the lt_prediction function of libfaad/lt_predict.c in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.8. The vulnerability causes a segmentation fault and application crash, which leads to denial of service. | https://github.com/knik0/faad2/issues/31 | CWE-119 | knik0/faad2 | https://github.com/knik0/faad2/issues/31, https://seclists.org/bugtraq/2019/Sep/28 | ASAN:SIGSEGV faad_res/010-invalid-def-lt_predict_108.
=================================================================
==7092==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000fd0 (pc 0x7f09d10c9532 bp 0x7ffea06b0460 sp 0x7ffea06ac370 T0)
#0 0x7f09d10c9531 in lt_prediction /root/faad2_asan/libfaad/lt_pr... | === https://github.com/knik0/faad2/issues/31 ===
Title: Invalid memory address dereference in lt_prediction(in libfaad/lt_predict.c:108)
---
Body:
Hi, i found a issue in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.8. It crashed in function lt_prediction .the details are below(ASAN):
```
./faad faad_res/010-inva... | https://nvd.nist.gov/vuln/detail/CVE-2018-20358 | ||||
faad2.cve-2018-20359 | An invalid memory address dereference was discovered in the sbrDecodeSingleFramePS function of libfaad/sbr_dec.c in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.8. The vulnerability causes a segmentation fault and application crash, which leads to denial of service. | https://github.com/knik0/faad2/issues/29 | CWE-119 | knik0/faad2 | https://github.com/knik0/faad2/issues/29, https://seclists.org/bugtraq/2019/Sep/28 | ASAN:SIGSEGVfaad_res/007-invalid-def-sbr_hfadj_601.
=================================================================
==7085==ERROR: AddressSanitizer: SEGV on unknown address 0x0000f64f3bb0 (pc 0x7fa4348f6f2d bp 0x7ffff64fd450 sp 0x7ffff64f3b80 T0)
#0 0x7fa4348f6f2c in sbrDecodeSingleFramePS /root/faad2_asan/libfaa... | === https://github.com/knik0/faad2/issues/29 ===
Title: Invalid memory address dereference in sbrDecodeSingleFramePS(in libfaad/sbr_dec.c:601)
---
Body:
Hi, i found a issue in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.8. It crashed in function sbrDecodeSingleFramePS .the details are below(ASAN):
```
./faad f... | https://nvd.nist.gov/vuln/detail/CVE-2018-20359 | ||||
gpac.cve-2021-32438 | The gf_media_export_filters function in GPAC 1.0.1 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command. | https://github.com/gpac/gpac/issues/1769 | https://github.com/gpac/gpac/commit/00194f5fe462123f70b0bae7987317b52898b868 | CWE-476 | gpac/gpac | 00194f5fe462123f70b0bae7987317b52898b868~1 | diff --git a/src/media_tools/media_export.c b/src/media_tools/media_export.c
index b89936f83c..968818da31 100644
--- a/src/media_tools/media_export.c
+++ b/src/media_tools/media_export.c
@@ -1108,7 +1108,7 @@ static GF_Err gf_media_export_filters(GF_MediaExporter *dumper)
}
esd = gf_media_map_esd(dumper->file, tr... | https://github.com/gpac/gpac/issues/1769 | AddressSanitizer:DEADLYSIGNAL
=================================================================
==2590==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000004 (pc 0x7f10a4aef7e8 bp 0x7ffc623e3300 sp 0x7ffc623e2c20 T0)
==2590==The signal is caused by a READ memory access.
==2590==Hint: address points to the zer... | === https://github.com/gpac/gpac/issues/1769 ===
Title: Null pointer dereference in gpac MP4Box gf_media_export_filters
---
Body:
A null pointer dereference issue was found in MP4Box, to reproduce, compile gpac as follows:
```
CC=gcc CXX=g++ CFLAGS="-fsanitize=address" CXXFLAGS="-fsanitize=address" LDFLAGS="-fsanit... | https://nvd.nist.gov/vuln/detail/CVE-2021-32438 | |
libiec61850.cve-2021-45769 | A NULL pointer dereference in AcseConnection_parseMessage at src/mms/iso_acse/acse.c of libiec61850 v1.5.0 can lead to a segmentation fault or application crash. | https://github.com/mz-automation/libiec61850/issues/368 | https://github.com/mz-automation/libiec61850/issues/368 | CWE-476 | mz-automation/libiec61850 | https://github.com/mz-automation/libiec61850/issues/368 | AddressSanitizer:DEADLYSIGNAL
=================================================================
==4028537==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x55de6e46db68 bp 0x7fac36efcaa0 sp 0x7fac36efc9f0 T3)
==4028537==The signal is caused by a READ memory access.
==4028537==Hint: address points t... | === https://github.com/mz-automation/libiec61850/issues/368 ===
Title: NULL Pointer Dereference in AcseConnection_parseMessage
---
Body:
# NULL Pointer Dereference in AcseConnection_parseMessage
## Description
A NULL Pointer Dereference was discovered in AcseConnection_parseMessage at src/mms/iso_acse/acse.c:42... | https://nvd.nist.gov/vuln/detail/CVE-2021-45769 | |||
faad2.cve-2018-20197 | There is a stack-based buffer underflow in the third instance of the calculate_gain function in libfaad/sbr_hfadj.c in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.8. A crafted input will lead to a denial of service or possibly unspecified other impact because limiting the additional noise energy level is mishandled f... | https://github.com/knik0/faad2/issues/20 | CWE-787 | knik0/faad2 | https://github.com/knik0/faad2/issues/20, https://seclists.org/bugtraq/2019/Sep/28 | ==7026==ERROR: AddressSanitizer: stack-buffer-underflow on address 0x7fff630132fc at pc 0x7fedefda0e74 bp 0x7fff63012ef0 sp 0x7fff63012ee0
WRITE of size 4 at 0x7fff630132fc thread T0
#0 0x7fedefda0e73 in calculate_gain /root/faad2_asan/libfaad/sbr_hfadj.c:1311
#1 0x7fedefd9e392 in hf_adjustment /root/faad2_asan... | === https://github.com/knik0/faad2/issues/20 ===
Title: stack-buffer-underflow in function calculate_gain(libfaad/sbr_hfadj.c:1311)
---
Body:
Hi, i found a stack-buffer-overflow bug in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.8, the details are below(ASAN):
```
./faad faad_res/006-stack-buffer-underflow-sb... | https://nvd.nist.gov/vuln/detail/CVE-2018-20197 | ||||
mruby.cve-2018-12248 | An issue was discovered in mruby 1.4.1. There is a heap-based buffer over-read associated with OP_ENTER because mrbgems/mruby-fiber/src/fiber.c does not extend the stack in cases of many arguments to fiber. | https://github.com/mruby/mruby/commit/778500563a9f7ceba996937dc886bd8cde29b42b | CWE-125 | mruby/mruby | 778500563a9f7ceba996937dc886bd8cde29b42b~1 | diff --git a/mrbgems/mruby-fiber/src/fiber.c b/mrbgems/mruby-fiber/src/fiber.c
index 83153a9df1..b88fa49497 100644
--- a/mrbgems/mruby-fiber/src/fiber.c
+++ b/mrbgems/mruby-fiber/src/fiber.c
@@ -184,26 +184,27 @@ fiber_switch(mrb_state *mrb, mrb_value self, mrb_int len, const mrb_value *a, mr
{
struct mrb_context *... | https://github.com/mruby/mruby/issues/4038 | ==42706==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x619000000e80 at pc 0x00010d30e3fe bp 0x7ffee2dcd970 sp 0x7ffee2dcd120
READ of size 16 at 0x619000000e80 thread T0
#0 0x10d30e3fd in __asan_memcpy (libclang_rt.asan_osx_dynamic.dylib:x86_64h+0x4f3fd)
#1 0x10cedd8a8 in mrb_vm_exec vm.c:1859
#... | === https://github.com/mruby/mruby/issues/4038 ===
Title: Heap buffer overflow in OP_ENTER
---
Body:
The following input demonstrates a crash:
```ruby
Fiber::new {|x|}.transfer(0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49... | https://nvd.nist.gov/vuln/detail/CVE-2018-12248 | ||
gpac.cve-2023-0841 | A vulnerability, which was classified as critical, has been found in GPAC 2.3-DEV-rev40-g3602a5ded. This issue affects the function mp3_dmx_process of the file filters/reframe_mp3.c. The manipulation leads to heap-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public ... | https://github.com/qianshuidewajueji/poc/blob/main/gpac/mp3_dmx_process_poc3 | https://github.com/gpac/gpac/commit/3602a5ded4e57b0044a949f985ee3792f94a9a36, https://github.com/gpac/gpac/commit/1b77837ca27a80c695363416077bcab1aa72dc0a | CWE-122, CWE-787 | gpac/gpac | 3602a5ded4e57b0044a949f985ee3792f94a9a36 | diff --git a/src/filters/reframe_mp3.c b/src/filters/reframe_mp3.c
index 7411acb27c..096e0ce0e5 100644
--- a/src/filters/reframe_mp3.c
+++ b/src/filters/reframe_mp3.c
@@ -668,6 +668,10 @@ GF_Err mp3_dmx_process(GF_Filter *filter)
}
if (!ctx->in_seek) {
+ if (size > remain) {
+ GF_LOG(GF_LOG_WARNING, GF_LOG... | https://github.com/gpac/gpac/issues/2396 | [MP3Dmx] invalid frame, resyncing
=================================================================
==29937==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x61a00000e322 at pc 0x7fe02eb39490 bp 0x7ffdcd4a3c40 sp 0x7ffdcd4a33e8
READ of size 316 at 0x61a00000e322 thread T0
#0 0x7fe02eb3948f in __intercepto... | === https://github.com/gpac/gpac/issues/2396 ===
Title: heap-buffer-overflow in function mp3_dmx_process filters/reframe_mp3.c:677
---
Body:
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [x] I looked for a similar issue and couldn't find any.
... | https://nvd.nist.gov/vuln/detail/CVE-2023-0841 | |
gpac.cve-2022-2454 | Integer Overflow or Wraparound in GitHub repository gpac/gpac prior to 2.1-DEV. | https://huntr.dev/bounties/105d40d0-46d7-461e-9f8e-20c4cdea925f | https://github.com/gpac/gpac/commit/faa75edde3dfeba1e2cf6ffa48e45a50f1042096, https://huntr.dev/bounties/105d40d0-46d7-461e-9f8e-20c4cdea925f | CWE-190 | gpac/gpac | faa75edde3dfeba1e2cf6ffa48e45a50f1042096~1 | diff --git a/src/laser/lsr_dec.c b/src/laser/lsr_dec.c
index 99d16aaa77..488babb104 100644
--- a/src/laser/lsr_dec.c
+++ b/src/laser/lsr_dec.c
@@ -838,6 +838,8 @@ static void lsr_read_id(GF_LASeRCodec *lsr, GF_Node *n)
static Fixed lsr_translate_coords(GF_LASeRCodec *lsr, u32 val, u32 nb_bits)
{
+ if (!nb_bits) ret... | https://huntr.dev/bounties/105d40d0-46d7-461e-9f8e-20c4cdea925f | https://nvd.nist.gov/vuln/detail/CVE-2022-2454 | |||
gpac.cve-2021-40575 | The binary MP4Box in Gpac 1.0.1 has a null pointer dereference vulnerability in the mpgviddmx_process function in reframe_mpgvid.c, which allows attackers to cause a denial of service. This vulnerability is possibly due to an incomplete fix for CVE-2021-40566. | https://github.com/gpac/gpac/issues/1905 | https://github.com/gpac/gpac/commit/5f2c2a16d30229b6241f02fa28e3d6b810d64858 | CWE-476 | gpac/gpac | 5f2c2a16d30229b6241f02fa28e3d6b810d64858~1 | diff --git a/src/filters/reframe_mpgvid.c b/src/filters/reframe_mpgvid.c
index 328db28551..85d4faa4cb 100644
--- a/src/filters/reframe_mpgvid.c
+++ b/src/filters/reframe_mpgvid.c
@@ -784,8 +784,14 @@ GF_Err mpgviddmx_process(GF_Filter *filter)
mpgviddmx_enqueue_or_dispatch(ctx, dst_pck, GF_FALSE, GF_FALSE);
}
... | https://github.com/gpac/gpac/issues/1905 | ==29762==ERROR: AddressSanitizer: negative-size-param: (size=-1)
#0 0x7fdaf42ff813 (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x79813)
#1 0x7fdaf2897f1c in memcpy /usr/include/x86_64-linux-gnu/bits/string_fortified.h:34
#2 0x7fdaf2897f1c in mpgviddmx_process /playground/gpac/src/filters/reframe_mpgvid.c:64... | === https://github.com/gpac/gpac/issues/1905 ===
Title: Segmentation fault casued by null pointer dereference using mp4box in mpgviddmx_process, reframe_mpgvid.c:643
---
Body:
- [x] I looked for a similar issue and couldn't find any.
- [x] I tried with the latest version of GPAC. Installers available at http://gpac.... | https://nvd.nist.gov/vuln/detail/CVE-2021-40575 | |
gpac.cve-2023-5998 | Out-of-bounds Read in GitHub repository gpac/gpac prior to 2.3.0-DEV. | https://huntr.com/bounties/ea02a231-b688-422b-a881-ef415bcf6113 | https://github.com/gpac/gpac/commit/db74835944548fc3bdf03121b0e012373bdebb3e | CWE-125 | gpac/gpac | db74835944548fc3bdf03121b0e012373bdebb3e~1 | diff --git a/src/filters/reframe_mpgvid.c b/src/filters/reframe_mpgvid.c
index 8e092f973c..ecf2519555 100644
--- a/src/filters/reframe_mpgvid.c
+++ b/src/filters/reframe_mpgvid.c
@@ -1081,6 +1081,11 @@ GF_Err mpgviddmx_process(GF_Filter *filter)
//needs adjustement
if (bytes_from_store) {
size += bytes_from_s... | ASan (inferred) | https://nvd.nist.gov/vuln/detail/CVE-2023-5998 | |||
mruby.cve-2018-12247 | An issue was discovered in mruby 1.4.1. There is a NULL pointer dereference in mrb_class, related to certain .clone usage, because mrb_obj_clone in kernel.c copies flags other than the MRB_FLAG_IS_FROZEN flag (e.g., the embedded flag). | https://github.com/mruby/mruby/commit/55edae0226409de25e59922807cb09acb45731a2 | CWE-476 | mruby/mruby | 55edae0226409de25e59922807cb09acb45731a2~1 | diff --git a/src/kernel.c b/src/kernel.c
index f378004cb5..bbe6e8bb75 100644
--- a/src/kernel.c
+++ b/src/kernel.c
@@ -348,7 +348,7 @@ mrb_obj_clone(mrb_state *mrb, mrb_value self)
mrb_field_write_barrier(mrb, (struct RBasic*)p, (struct RBasic*)p->c);
clone = mrb_obj_value(p);
init_copy(mrb, clone, self);
- p... | https://github.com/mruby/mruby/issues/4036 | ASAN:DEADLYSIGNAL
=================================================================
==35404==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x000105bcca74 bp 0x7ffeea4d0dd0 sp 0x7ffeea4d0da0 T0)
==35404==The signal is caused by a READ memory access.
==35404==Hint: address points to the zero page.
... | === https://github.com/mruby/mruby/issues/4036 ===
Title: Null pointer dereference in mrb_class
---
Body:
The following input demonstrates a crash:
```ruby
h = {}
a = []
200.times do |n|
a[0] = n
h[a] = 0
puts h.to_a.clone
end
```
Note that I was only able to reproduce this issue when building mruby on a 32... | https://nvd.nist.gov/vuln/detail/CVE-2018-12247 | ||
gpac.cve-2022-1795 | Use After Free in GitHub repository gpac/gpac prior to v2.1.0-DEV. | https://huntr.dev/bounties/9c312763-41a6-4fc7-827b-269eb86efcbc | https://github.com/gpac/gpac/commit/c535bad50d5812d27ee5b22b54371bddec411514 | CWE-416 | gpac/gpac | c535bad50d5812d27ee5b22b54371bddec411514~1 | diff --git a/src/bifs/memory_decoder.c b/src/bifs/memory_decoder.c
index 74d635750d..1fc8c99638 100644
--- a/src/bifs/memory_decoder.c
+++ b/src/bifs/memory_decoder.c
@@ -178,7 +178,12 @@ static GF_Err BM_ParseGlobalQuantizer(GF_BifsDecoder *codec, GF_BitStream *bs, G
codec->scenegraph->global_qp = NULL;
if (gf_n... | https://nvd.nist.gov/vuln/detail/CVE-2022-1795 | ||||
imagemagick.cve-2021-3962 | A flaw was found in ImageMagick where it did not properly sanitize certain input before using it to invoke convert processes. This flaw allows an attacker to create a specially crafted image that leads to a use-after-free vulnerability when processed by ImageMagick. The highest threat from this vulnerability is to conf... | https://bugzilla.redhat.com/show_bug.cgi?id=2023196, https://github.com/ImageMagick/ImageMagick/commit/82775af03bbb10a0a1d0e15c0156c75673b4525e | CWE-416 | ImageMagick/ImageMagick | 82775af03bbb10a0a1d0e15c0156c75673b4525e~1 | diff --git a/coders/dcm.c b/coders/dcm.c
index edc09e9f433..c2de0b1eeb3 100644
--- a/coders/dcm.c
+++ b/coders/dcm.c
@@ -3996,10 +3996,11 @@ static Image *ReadDCMImage(const ImageInfo *image_info,ExceptionInfo *exception)
(void) RelinquishUniqueFileResource(filename);
}
read_info=DestroyIma... | https://bugzilla.redhat.com/show_bug.cgi?id=2023196, https://github.com/ImageMagick/ImageMagick/issues/4446 | ==11927==ERROR: AddressSanitizer: heap-use-after-free on address 0x60f000000580 at pc 0x000000f0f98c bp 0x7ffe3d8a7fd0 sp 0x7ffe3d8a7fc8
READ of size 8 at 0x60f000000580 thread T0
#0 0xf0f98b in RelinquishDCMMemory /root/fuzz/target/imagemagick/ImageMagick/coders/dcm.c:3039:20
#1 0xf08eb8 in ReadDCMImage /root/... | ASan (inferred) | === https://github.com/ImageMagick/ImageMagick/issues/4446 ===
Title: heap-use-after-free in magick at dcm.c RelinquishDCMMemory
---
Body:
### ImageMagick version
7.1.0-14
### Operating system
Linux
### Operating system, version and so on
OS: Ubuntu 18.04.6 LTS Version: ImageMagick 7.1.0-14 Q16-HDRI x86_64 2021-... | https://nvd.nist.gov/vuln/detail/CVE-2021-3962 | |
imagemagick.cve-2018-5247 | In ImageMagick 7.0.7-17 Q16, there are memory leaks in ReadRLAImage in coders/rla.c. | https://github.com/ImageMagick/ImageMagick/issues/928 | CWE-772 | ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/issues/928 | ==108460==ERROR: LeakSanitizer: detected memory leaks
Direct leak of 8 byte(s) in 1 object(s) allocated from:
#0 0x4b9ad3 in malloc (/usr/local/bin/magick+0x4b9ad3)
#1 0x7f51b50cda5b in ReadRLAImage /home/ubuntu/ImageMagick/coders/rla.c:271:34
#2 0x7f51b4a5aaf1 in ReadImage /home/ubuntu/ImageMagick/MagickC... | === https://github.com/ImageMagick/ImageMagick/issues/928 ===
Title: memory leaks
---
Body:
ubuntu@ubuntu:~/fuzz_py$ magick -version
Version: ImageMagick 7.0.7-17 Q16 x86_64 2017-12-26 http://www.imagemagick.org
Copyright: © 1999-2018 ImageMagick Studio LLC
License: http://www.imagemagick.org/script/license.php
F... | https://nvd.nist.gov/vuln/detail/CVE-2018-5247 | ||||
libredwg.cve-2021-28236 | LibreDWG v0.12.3 was discovered to contain a NULL pointer dereference via out_dxfb.c. | https://github.com/LibreDWG/libredwg/issues/324 | CWE-476 | LibreDWG/libredwg | https://github.com/LibreDWG/libredwg/issues/324 | ➜ ./dwg2dxf -o ./fuzz_out -b -y ./poc1
Reading DWG file ./poc1
Warning: checksum: 0x27c51243 (calculated) mismatch
ERROR: Skip section AcDb:FileDepList with size 8 > 0 * 128
ERROR: obj_string_stream overflow, bitsize 96 => 96
ERROR: Invalid object handle 10.1.1 at pos @4.2
ERROR: bit_read_RC buffer overflow at 12
ERR... | === https://github.com/LibreDWG/libredwg/issues/324 ===
Title: Four NULL dereference in out_dxfb.c
---
Body:
I found four NULL dereference bugs in the current master (5d2c75f).
# Configure
CFLAGS="-g -fsanitize=address" LDFLAGS="-fsanitize=address" ./configure
# bug 1 in out_dxfb.c:1902
## Command
`./dwg2dxf... | https://nvd.nist.gov/vuln/detail/CVE-2021-28236 | ||||
libredwg.cve-2020-21834 | A null pointer deference issue exists in GNU LibreDWG 0.10 via get_bmp ../../programs/dwgbmp.c:164. | https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574492468 | https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574492468 | CWE-476 | LibreDWG/libredwg | https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574492468 | === https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574492468 ===
Title: Several bugs found by fuzzing
---
Body:
Hi,
After fuzzing libredwg, I found the following bugs on the latest commit on master.
Command: ./dwgbmp $PoC
**1.NULL pointer dereference in read_2004_compressed_section ../../src/decode... | https://nvd.nist.gov/vuln/detail/CVE-2020-21834 | ||||
imagemagick.cve-2017-12644 | ImageMagick 7.0.6-1 has a memory leak vulnerability in ReadDCMImage in coders\dcm.c. | https://github.com/ImageMagick/ImageMagick/commit/a33f7498f9052b50e8fe8c8422a11ba84474cb42, https://github.com/ImageMagick/ImageMagick/issues/551 | CWE-772 | ImageMagick/ImageMagick | a33f7498f9052b50e8fe8c8422a11ba84474cb42~1 | diff --git a/coders/dcm.c b/coders/dcm.c
index 08d497f002b..55377c4f9cc 100644
--- a/coders/dcm.c
+++ b/coders/dcm.c
@@ -3270,7 +3270,7 @@ static Image *ReadDCMImage(const ImageInfo *image_info,ExceptionInfo *exception)
if ((quantum != 0) && (length != 0))
{
if (length > GetBlobSi... | https://github.com/ImageMagick/ImageMagick/issues/551 | ==2953==ERROR: LeakSanitizer: detected memory leaks
Direct leak of 168 byte(s) in 1 object(s) allocated from:
#0 0x4def96 in __interceptor_malloc asan_malloc_linux.cc:66
#1 0x7f7ad266ef76 in AcquireMagickMemory memory.c:463:10
#2 0x7f7ad2982f84 in ReadDCMImage dcm.c:3073:33
#3 0x7f7ad245ef98 in ReadIma... | === https://github.com/ImageMagick/ImageMagick/issues/551 ===
Title: memory leak in ReadDCMImage
---
Body:
Version: ImageMagick 7.0.6-1 Q16 x86_64
```
#./magick identify $FILE
=================================================================
==2953==ERROR: LeakSanitizer: detected memory leaks
Direct leak o... | https://nvd.nist.gov/vuln/detail/CVE-2017-12644 | ||
mruby.cve-2022-0890 | NULL Pointer Dereference in GitHub repository mruby/mruby prior to 3.2. | https://huntr.dev/bounties/68e09ec1-6cc7-48b8-981d-30f478c70276 | https://github.com/mruby/mruby/commit/da48e7dbb20024c198493b8724adae1b842083aa, https://huntr.dev/bounties/68e09ec1-6cc7-48b8-981d-30f478c70276 | CWE-476 | mruby/mruby | da48e7dbb20024c198493b8724adae1b842083aa~1 | diff --git a/mrbgems/mruby-fiber/src/fiber.c b/mrbgems/mruby-fiber/src/fiber.c
index 0d85bedadc..322ed36ea8 100644
--- a/mrbgems/mruby-fiber/src/fiber.c
+++ b/mrbgems/mruby-fiber/src/fiber.c
@@ -208,15 +208,22 @@ fiber_switch(mrb_state *mrb, mrb_value self, mrb_int len, const mrb_value *a, mr
if (!c->ci->proc) {
... | https://nvd.nist.gov/vuln/detail/CVE-2022-0890 | ||||
mruby.cve-2022-1276 | Out-of-bounds Read in mrb_get_args in GitHub repository mruby/mruby prior to 3.2. Possible arbitrary code execution if being exploited. | https://huntr.dev/bounties/6ea041d1-e2aa-472c-bf3e-da5fa8726c25 | https://github.com/mruby/mruby/commit/c8c083cb750606b2da81582cd8e43b442bb143e6 | CWE-125 | mruby/mruby | c8c083cb750606b2da81582cd8e43b442bb143e6~1 | diff --git a/mrbgems/mruby-compiler/core/codegen.c b/mrbgems/mruby-compiler/core/codegen.c
index 8f7b5b0133..e222094be3 100644
--- a/mrbgems/mruby-compiler/core/codegen.c
+++ b/mrbgems/mruby-compiler/core/codegen.c
@@ -1905,7 +1905,7 @@ gen_assignment(codegen_scope *s, node *tree, node *rhs, int sp, int val)
... | ASan (inferred) | https://nvd.nist.gov/vuln/detail/CVE-2022-1276 | |||
libredwg.cve-2021-39521 | An issue was discovered in libredwg through v0.10.1.3751. A NULL pointer dereference exists in the function bit_read_BB() located in bits.c. It allows an attacker to cause Denial of Service. | https://github.com/LibreDWG/libredwg/issues/262 | https://github.com/LibreDWG/libredwg/issues/262 | CWE-476 | LibreDWG/libredwg | https://github.com/LibreDWG/libredwg/issues/262 | ASAN:SIGSEGV
=================================================================
==33413==ERROR: AddressSanitizer: SEGV on unknown address 0x63001eedeec1 (pc 0x56001ae1aa1c bp 0x7ffc0f008820 sp 0x7ffc0f008570 T0)
#0 0x56001ae1aa1b in bit_read_BB /home/seviezhou/libredwg/src/bits.c:186
#1 0x56001ae3d11b in bit_rea... | === https://github.com/LibreDWG/libredwg/issues/262 ===
Title: A Segmentation fault in bits.c:186
---
Body:
## System info
Ubuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), dwg2dxf (latest master [bacd017](https://github.com/LibreDWG/libredwg/commit/bacd01778d20b7b79f28541ea7a60cafe25175aa))
## Configure
CFLAGS="-g -f... | https://nvd.nist.gov/vuln/detail/CVE-2021-39521 | |||
exiv2.cve-2017-17669 | There is a heap-based buffer over-read in the Exiv2::Internal::PngChunk::keyTXTChunk function of pngchunk_int.cpp in Exiv2 0.26. A crafted PNG file will lead to a remote denial of service attack. | https://github.com/Exiv2/exiv2/issues/187 | CWE-125 | Exiv2/exiv2 | https://github.com/Exiv2/exiv2/issues/187 | ==2826==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60300000edb9 at pc 0x7f7c43e7a77a bp 0x7ffe0d1d6df0 sp 0x7ffe0d1d6de8
READ of size 1 at 0x60300000edb9 thread T0
#0 0x7f7c43e7a779 in Exiv2::Internal::PngChunk::keyTXTChunk(Exiv2::DataBuf const&, bool) /home/rg/fuzz_project/exiv2/exiv2_test/exiv2_gi... | === https://github.com/Exiv2/exiv2/issues/187 ===
Title: CVE-2017-17669: heap-buffer-overflow in Exiv2::Internal::PngChunk::keyTXTChunk
---
Body:
## Description
There is a heap-buffer-overflow vulnerability in Exiv2.
The command is: ./exiv2 POC
Stack trace with asan:
```
==2826==ERROR: AddressSanitizer: heap... | https://nvd.nist.gov/vuln/detail/CVE-2017-17669 | ||||
imagemagick.cve-2017-12641 | ImageMagick 7.0.6-1 has a memory leak vulnerability in ReadOneJNGImage in coders\png.c. | https://github.com/ImageMagick/ImageMagick/commit/c9aa9f80828594eacbe3affe16c43d623562e5d8, https://github.com/ImageMagick/ImageMagick/issues/550 | CWE-772 | ImageMagick/ImageMagick | c9aa9f80828594eacbe3affe16c43d623562e5d8~1 | diff --git a/coders/png.c b/coders/png.c
index dc8be522074..080709c047c 100644
--- a/coders/png.c
+++ b/coders/png.c
@@ -4377,7 +4377,13 @@ static Image *ReadOneJNGImage(MngInfo *mng_info,
type[0],type[1],type[2],type[3],(double) length);
if (length > PNG_UINT_31_MAX || count == 0)
- ThrowReaderExc... | https://github.com/ImageMagick/ImageMagick/issues/550 | === https://github.com/ImageMagick/ImageMagick/issues/550 ===
Title: memory leak in ReadOneJNGImage
---
Body:
Version: ImageMagick 7.0.6-1 Q16 x86_64
```
#./magick identify $FILE
=================================================================
==32637==ERROR: LeakSanitizer: detected memory leaks
Direct le... | https://nvd.nist.gov/vuln/detail/CVE-2017-12641 | |||
gpac.cve-2023-0819 | Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to v2.3.0-DEV. | https://huntr.dev/bounties/35793610-dccc-46c8-9f55-6a24c621e4ef | https://github.com/gpac/gpac/commit/1b77837ca27a80c695363416077bcab1aa72dc0a, https://github.com/gpac/gpac/commit/c972a6eec5 | CWE-122, CWE-787 | gpac/gpac | 1b77837ca27a80c695363416077bcab1aa72dc0a~1 | diff --git a/src/filters/reframe_mp3.c b/src/filters/reframe_mp3.c
index 096e0ce0e5..c112492dad 100644
--- a/src/filters/reframe_mp3.c
+++ b/src/filters/reframe_mp3.c
@@ -668,8 +668,8 @@ GF_Err mp3_dmx_process(GF_Filter *filter)
}
if (!ctx->in_seek) {
- if (size > remain) {
- GF_LOG(GF_LOG_WARNING, GF_LOG_... | https://nvd.nist.gov/vuln/detail/CVE-2023-0819 | ||||
gpac.cve-2023-2840 | NULL Pointer Dereference in GitHub repository gpac/gpac prior to 2.2.2. | https://huntr.dev/bounties/21926fc2-6eb1-4e24-8a36-e60f487d0257 | https://github.com/gpac/gpac/commit/ba59206b3225f0e8e95a27eff41cb1c49ddf9a37, https://huntr.dev/bounties/21926fc2-6eb1-4e24-8a36-e60f487d0257 | CWE-476 | gpac/gpac | ba59206b3225f0e8e95a27eff41cb1c49ddf9a37~1 | diff --git a/src/isomedia/movie_fragments.c b/src/isomedia/movie_fragments.c
index b742078d15..41d0717a48 100644
--- a/src/isomedia/movie_fragments.c
+++ b/src/isomedia/movie_fragments.c
@@ -2876,7 +2876,8 @@ GF_Err gf_isom_fragment_add_sample_ex(GF_ISOFile *movie, GF_ISOTrackID TrackID,
//rewrite OD frames
if (tra... | https://nvd.nist.gov/vuln/detail/CVE-2023-2840 | ||||
gpac.cve-2022-29537 | gp_rtp_builder_do_hevc in ietf/rtp_pck_mpeg4.c in GPAC 2.0.0 has a heap-based buffer over-read, as demonstrated by MP4Box. | https://github.com/gpac/gpac/issues/2173 | https://github.com/gpac/gpac/commit/1773b7a34bc08734aee7d3f5dfe65d06389fe15a | CWE-125 | gpac/gpac | 1773b7a34bc08734aee7d3f5dfe65d06389fe15a~1 | diff --git a/src/ietf/rtp_pck_mpeg4.c b/src/ietf/rtp_pck_mpeg4.c
index d8bec0d20c..462d2c99b3 100644
--- a/src/ietf/rtp_pck_mpeg4.c
+++ b/src/ietf/rtp_pck_mpeg4.c
@@ -421,6 +421,7 @@ GF_Err gp_rtp_builder_do_avc(GP_RTPPacketizer *builder, u8 *nalu, u32 nalu_size,
}
if (!nalu) return GF_OK;
+ if (nalu_size<1) retu... | https://github.com/gpac/gpac/issues/2173 | =================================================================
==2628578==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000001f15 at pc 0x7f14c2411bf5 bp 0x7ffec49a0110 sp 0x7ffec49a0100
READ of size 1 at 0x602000001f15 thread T0
#0 0x7f14c2411bf4 in gp_rtp_builder_do_hevc ietf/rtp_pck_mpeg4.c:59... | === https://github.com/gpac/gpac/issues/2173 ===
Title: [BUG] heap buffer overflow in gp_rtp_builder_do_hevc
---
Body:
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [x] I looked for a similar issue and couldn't find any.
- [x] I tried with th... | https://nvd.nist.gov/vuln/detail/CVE-2022-29537 | |
imagemagick.cve-2019-13304 | ImageMagick 7.0.8-50 Q16 has a stack-based buffer overflow at coders/pnm.c in WritePNMImage because of a misplaced assignment. | https://github.com/ImageMagick/ImageMagick/issues/1614 | https://github.com/ImageMagick/ImageMagick/commit/7689875ef64f34141e7292f6945efdf0530b4a5e, https://github.com/ImageMagick/ImageMagick/issues/1614, https://github.com/ImageMagick/ImageMagick6/commit/bfa3b9610c83227894c92b0d312ad327fceb6241 | CWE-787 | ImageMagick/ImageMagick | 7689875ef64f34141e7292f6945efdf0530b4a5e~1 | diff --git a/coders/pnm.c b/coders/pnm.c
index afaea309d56..5849388dc9f 100644
--- a/coders/pnm.c
+++ b/coders/pnm.c
@@ -1756,13 +1756,13 @@ static MagickBooleanType WritePNMImage(const ImageInfo *image_info,Image *image,
{
*q++=(unsigned char) (GetPixelLuma(image,p) >= (QuantumRange/2.0) ?
... | https://github.com/ImageMagick/ImageMagick/issues/1614 | =================================================================
==9828==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7ffcc293daa0 at pc 0x7f71ad7e3477 bp 0x7ffcc293a0f0 sp 0x7ffcc293a0e8
WRITE of size 1 at 0x7ffcc293daa0 thread T0
#0 0x7f71ad7e3476 in WritePNMImage coders/pnm.c:1762:21
#1 0x7f7... | === https://github.com/ImageMagick/ImageMagick/issues/1614 ===
Title: stack-buffer-overflow at coders/pnm.c:1762 in WritePNMImage
---
Body:
### Prerequisites
- [x] I have written a descriptive issue title
- [x] I have verified that I am using the latest version of ImageMagick
- [x] I have searched [open](https:/... | https://nvd.nist.gov/vuln/detail/CVE-2019-13304 | |
liblouis.cve-2023-26768 | Buffer Overflow vulnerability found in Liblouis v.3.24.0 allows a remote attacker to cause a denial of service via the compileTranslationTable.c and lou_setDataPath functions. | https://github.com/liblouis/liblouis/issues/1301 | https://github.com/liblouis/liblouis/pull/1302 | CWE-120 | liblouis/liblouis | diff --git a/liblouis/logging.c b/liblouis/logging.c
index 9f470b45e5..2849cf26d4 100644
--- a/liblouis/logging.c
+++ b/liblouis/logging.c
@@ -117,8 +117,10 @@ _lou_logMessage(logLevels level, const char *format, ...) {
}
}
+#define FILENAMESIZE 256
+
static FILE *logFile = NULL;
-static char initialLogFileName[2... | https://github.com/liblouis/liblouis/issues/1301, https://github.com/liblouis/liblouis/pull/1302 | $ ./driver-API-6223f21-lou_logFile-BO poc-API-6223f21-lou_logFile-BO
Minimum size is 0
INFO: Running with entropic power schedule (0xFF, 100).
INFO: Seed: 2700932249
INFO: Loaded 1 modules (57 inline 8-bit counters): 57 [0x7b0360, 0x7b0399),
INFO: Loaded 1 PC tables (57 PCs): 57 [0x5705c0,0x570950),
./driver-API-62... | === https://github.com/liblouis/liblouis/issues/1301 ===
Title: global-buffer-overflow in lou_logFile() when long filename is given
---
Body:
## Summary
When long filename (larger than 256) is given to API `lou_logFile()`, there will be a global-buffer-overflow.
https://github.com/liblouis/liblouis/blob/517f6f1f3... | https://nvd.nist.gov/vuln/detail/CVE-2023-26768 | ||
imagemagick.cve-2019-13305 | ImageMagick 7.0.8-50 Q16 has a stack-based buffer overflow at coders/pnm.c in WritePNMImage because of a misplaced strncpy and an off-by-one error. | https://github.com/ImageMagick/ImageMagick/issues/1613 | https://github.com/ImageMagick/ImageMagick/commit/29efd648f38b73a64d73f14cd2019d869a585888, https://github.com/ImageMagick/ImageMagick/issues/1613, https://github.com/ImageMagick/ImageMagick6/commit/5c7fbf9a14fb83c9685ad69d48899f490a37609d | CWE-193, CWE-787 | ImageMagick/ImageMagick | 29efd648f38b73a64d73f14cd2019d869a585888~1 | diff --git a/coders/pnm.c b/coders/pnm.c
index a54bc60c33d..afaea309d56 100644
--- a/coders/pnm.c
+++ b/coders/pnm.c
@@ -1824,14 +1824,14 @@ static MagickBooleanType WritePNMImage(const ImageInfo *image_info,Image *image,
count=(ssize_t) FormatLocaleString(buffer,MagickPathExtent,
"%... | https://github.com/ImageMagick/ImageMagick/issues/1613 | =================================================================
==25473==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7ffe4120cba0 at pc 0x7f1d07f024d8 bp 0x7ffe412080f0 sp 0x7ffe412080e8
WRITE of size 1 at 0x7ffe4120cba0 thread T0
#0 0x7f1d07f024d7 in WritePNMImage coders/pnm.c:1906:21
#1 0x7f... | === https://github.com/ImageMagick/ImageMagick/issues/1613 ===
Title: stack-buffer-overflow at coders/pnm.c:1906 in WritePNMImage
---
Body:
### Prerequisites
- [x] I have written a descriptive issue title
- [x] I have verified that I am using the latest version of ImageMagick
- [x] I have searched [open](https... | https://nvd.nist.gov/vuln/detail/CVE-2019-13305 | |
imagemagick.cve-2017-11533 | When ImageMagick 7.0.6-1 processes a crafted file in convert, it can lead to a heap-based buffer over-read in the WriteUILImage() function in coders/uil.c. | https://github.com/ImageMagick/ImageMagick/issues/562 | https://github.com/ImageMagick/ImageMagick/issues/562 | CWE-125 | ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/issues/562 | ==3160==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x62d00001cbdc at pc 0x7f505478c77d bp 0x7fff1b1513b0 sp 0x7fff1b1513a0
READ of size 1 at 0x62d00001cbdc thread T0
#0 0x7f505478c77c in WriteUILImage coders/uil.c:273
#1 0x7f50542471c6 in WriteImage MagickCore/constitute.c:1114
#2 0x7f5054247e... | === https://github.com/ImageMagick/ImageMagick/issues/562 ===
Title: heap-overflow in WriteUILImage()
---
Body:
Crash Link : https://raw.githubusercontent.com/lcatro/My_PoC/master/ImageMagick/heap-buffer-overflow-READ-0x7fd806e82db2_output_uil_1500210468.72
Trigger Command : ./magick convert heap-buffer-overflow... | https://nvd.nist.gov/vuln/detail/CVE-2017-11533 | |||
libiec61850.cve-2023-27772 | libiec61850 v1.5.1 was discovered to contain a segmentation violation via the function ControlObjectClient_setOrigin() at /client/client_control.c. | https://github.com/mz-automation/libiec61850/issues/442 | https://github.com/mz-automation/libiec61850/commit/79a8eaf26070e02044afc4b2ffbfe777dfdf3e0b | CWE-754 | mz-automation/libiec61850 | 79a8eaf26070e02044afc4b2ffbfe777dfdf3e0b~1 | diff --git a/examples/iec61850_client_example_control/client_example_control.c b/examples/iec61850_client_example_control/client_example_control.c
index 33da635a3..37d6b6bca 100644
--- a/examples/iec61850_client_example_control/client_example_control.c
+++ b/examples/iec61850_client_example_control/client_example_contr... | https://github.com/mz-automation/libiec61850/issues/442 | $ sudo ./client_example_control
AddressSanitizer:DEADLYSIGNAL
=================================================================
==12824==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000078 (pc 0x5638e2e178dc bp 0x7ffe9101eb20 sp 0x7ffe9101eb00 T0)
==12824==The signal is caused by a READ memory access.
==128... | === https://github.com/mz-automation/libiec61850/issues/442 ===
Title: SEGV in function ControlObjectClient_setOrigin()
---
Body:
Hi, team
There is a SEGV in function `ControlObjectClient_setOrigin` in `src/iec61850/client/client_control.c:328` when called from libiec61850/examples/iec61850_client_example_control/cl... | https://nvd.nist.gov/vuln/detail/CVE-2023-27772 | |
matio.cve-2019-9036 | An issue was discovered in libmatio.a in matio (aka MAT File I/O Library) 1.5.13. There is a heap-based buffer overflow in the function ReadNextFunctionHandle() in mat5.c. | https://github.com/TeamSeri0us/pocs/tree/master/matio | https://github.com/tbeu/matio/commit/a0539135c9b1ab7613aa7953279da9224da88775, https://github.com/tbeu/matio/commit/2c20d2178017b3eb13ab160cef239648f9915bdb, https://github.com/tbeu/matio/commit/df23944bc8f16dc7270fa39c772e14958aadc283, https://github.com/tbeu/matio/commit/ce33bf0ef196794790ed20c6d4c8232f7eb45590, http... | CWE-787 | tbeu/matio | a0539135c9b1ab7613aa7953279da9224da88775~1 | diff --git a/src/inflate.c b/src/inflate.c
index f8b1e114..3d085684 100644
--- a/src/inflate.c
+++ b/src/inflate.c
@@ -241,7 +241,7 @@ InflateVarTag(mat_t *mat, matvar_t *matvar, void *buf)
{
mat_uint8_t comp_buf[32];
int err;
- size_t bytesread = 0;
+ size_t bytesread = 0, readresult = 1;
if... | https://github.com/tbeu/matio/issues/103 | ==29570==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60200000efd0 at pc 0x7f5b9c14f9fe bp 0x7ffca66d34a0 sp 0x7ffca66d34
WRITE of size 8 at 0x60200000efd0 thread T0
#0 0x7f5b9c14f9fd in Mat_VarReadNextInfo5 (/home/sebastien/debian/upstream/matio/src/.libs/libmatio.so.9+0xbf9fd)
#1 0x562dd8c1c9b9 ... | === https://github.com/tbeu/matio/issues/103 ===
Title: some memory corruption problems when the library parse the mat file
---
Body:
I found several memory corruption problem in the library.
More details can be found at [here](https://github.com/TeamSeri0us/pocs/tree/master/matio).
---
Comment #1 by PhilipMorris... | https://nvd.nist.gov/vuln/detail/CVE-2019-9036 | |
imagemagick.cve-2019-13299 | ImageMagick 7.0.8-50 Q16 has a heap-based buffer over-read at MagickCore/pixel-accessor.h in GetPixelChannel. | https://github.com/ImageMagick/ImageMagick/issues/1610 | https://github.com/ImageMagick/ImageMagick/commit/933bf025119f0de25ee589b706c09c8bb46d5a48, https://github.com/ImageMagick/ImageMagick/commit/d4fc44b58a14f76b1ac997517d742ee12c9dc5d3 | CWE-125 | ImageMagick/ImageMagick | 933bf025119f0de25ee589b706c09c8bb46d5a48~1 | diff --git a/MagickCore/statistic.c b/MagickCore/statistic.c
index 6bf4409f097..dae4b489c88 100644
--- a/MagickCore/statistic.c
+++ b/MagickCore/statistic.c
@@ -582,15 +582,15 @@ MagickExport Image *EvaluateImages(const Image *images,
for (i=0; i < (ssize_t) GetPixelChannels(image); i++)
{
... | https://github.com/ImageMagick/ImageMagick/issues/1610 | ==30168==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x7febb7ba1400 at pc 0x7febc5808632 bp 0x7ffd269baff0 sp 0x7ffd269bafe8
READ of size 4 at 0x7febb7ba1400 thread T0
#0 0x7febc5808631 in GetPixelChannel ./MagickCore/pixel-accessor.h:116:10
#1 0x7febc5805ff6 in EvaluateImages MagickCore/statistic.... | === https://github.com/ImageMagick/ImageMagick/issues/1610 ===
Title: heap-buffer-overflow at MagickCore/pixel-accessor.h:116:10 in GetPixelChannel
---
Body:
### Prerequisites
- [x] I have written a descriptive issue title
- [x] I have verified that I am using the latest version of ImageMagick
- [x] I have searc... | https://nvd.nist.gov/vuln/detail/CVE-2019-13299 | |
imagemagick.cve-2018-6405 | In the ReadDCMImage function in coders/dcm.c in ImageMagick before 7.0.7-23, each redmap, greenmap, and bluemap variable can be overwritten by a new pointer. The previous pointer is lost, which leads to a memory leak. This allows remote attackers to cause a denial of service. | https://github.com/ImageMagick/ImageMagick/issues/964 | https://github.com/ImageMagick/ImageMagick/commit/1fbed78912c830ccd82eecdb8a1db4882abb8276 | CWE-772 | ImageMagick/ImageMagick | 1fbed78912c830ccd82eecdb8a1db4882abb8276~1 | diff --git a/coders/dcm.c b/coders/dcm.c
index 5f9cb02c71c..2e339fc9b8a 100644
--- a/coders/dcm.c
+++ b/coders/dcm.c
@@ -3580,6 +3580,8 @@ static Image *ReadDCMImage(const ImageInfo *image_info,ExceptionInfo *exception)
break;
colors=(size_t) (length/2);
datum=(int) colors;
+ ... | https://github.com/ImageMagick/ImageMagick/issues/964 | ==62826==ERROR: LeakSanitizer: detected memory leaks
Direct leak of 20 byte(s) in 1 object(s) allocated from:
#0 0x4bd753 in __interceptor_malloc /home/brian/final/llvm.src/projects/compiler-rt/lib/asan/asan_malloc_linux.cc:67:3
#1 0x537d1d in AcquireMagickMemory (/imagemagick.latest/utilities/magick+0x537d1d)... | === https://github.com/ImageMagick/ImageMagick/issues/964 ===
Title: coders/dcm.c Memory Leak
---
Body:
### System Configuration
- ImageMagick version: ImageMagick 7.0.7-23
- Environment (Operating system, version and so on): Ubuntu 14.04 64bit
- Additional information: compilation with asan
### Descripti... | https://nvd.nist.gov/vuln/detail/CVE-2018-6405 | |
imagemagick.cve-2019-13303 | ImageMagick 7.0.8-50 Q16 has a heap-based buffer over-read in MagickCore/composite.c in CompositeImage. | https://github.com/ImageMagick/ImageMagick/issues/1603 | https://github.com/ImageMagick/ImageMagick/commit/d29148fae06c01ef215940e084cf41853c117bab, https://github.com/ImageMagick/ImageMagick/issues/1603 | CWE-125 | ImageMagick/ImageMagick | d29148fae06c01ef215940e084cf41853c117bab~1 | diff --git a/MagickCore/composite.c b/MagickCore/composite.c
index 78d6dff9217..99e91d14704 100644
--- a/MagickCore/composite.c
+++ b/MagickCore/composite.c
@@ -654,18 +654,19 @@ MagickExport MagickBooleanType CompositeImage(Image *image,
q+=GetPixelChannels(image);
continue;
... | https://github.com/ImageMagick/ImageMagick/issues/1603 | ==5479==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x626000008900 at pc 0x7f9c528f0e7d bp 0x7ffd8cc41710 sp 0x7ffd8cc41708
READ of size 4 at 0x626000008900 thread T0
#0 0x7f9c528f0e7c in CompositeImage MagickCore/composite.c:666:45
#1 0x7f9c52b23aa0 in CompareImagesLayers MagickCore/layer.c:792:10... | === https://github.com/ImageMagick/ImageMagick/issues/1603 ===
Title: heap-buffer-overflow in MagickCore/composite.c:666:45 in CompositeImage
---
Body:
### Prerequisites
- [x] I have written a descriptive issue title
- [x] I have verified that I am using the latest version of ImageMagick
- [x] I have searched [o... | https://nvd.nist.gov/vuln/detail/CVE-2019-13303 | |
gpac.cve-2023-46928 | GPAC 2.3-DEV-rev605-gfc9e29089-master contains a SEGV in gpac/MP4Box in gf_media_change_pl /afltest/gpac/src/media_tools/isom_tools.c:3293:42. | https://github.com/gpac/gpac/commit/0753bf6d867343a80a044bf47a27d0b7accc8bf1 | CWE-787 | gpac/gpac | 0753bf6d867343a80a044bf47a27d0b7accc8bf1~1 | diff --git a/src/media_tools/isom_tools.c b/src/media_tools/isom_tools.c
index 21f8905cf8..a41e51a0d5 100644
--- a/src/media_tools/isom_tools.c
+++ b/src/media_tools/isom_tools.c
@@ -635,7 +635,7 @@ GF_Err gf_media_make_isma(GF_ISOFile *mp4file, Bool keepESIDs, Bool keepImage, B
_esd = gf_odf_desc_esd_new(SLPredef_... | https://github.com/gpac/gpac/issues/2661 | AddressSanitizer:DEADLYSIGNAL
=================================================================
==3037861==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000002 (pc 0x7ffff6798224 bp 0x00000000000f sp 0x7ffffffec1c0 T0)
==3037861==The signal is caused by a WRITE memory access.
==3037861==Hint: address points ... | === https://github.com/gpac/gpac/issues/2661 ===
Title: SEGV in gpac/MP4Box in gf_media_change_pl /afltest/gpac/src/media_tools/isom_tools.c:3293:42
---
Body:
# SEGV in MP4Box
### Description
SEGV in gpac/MP4Box.
#0 0x7ffff6798224 in gf_media_change_pl /afltest/gpac/src/media_tools/isom_tools.c:3293:42
##... | https://nvd.nist.gov/vuln/detail/CVE-2023-46928 | ||
libheif.cve-2023-49460 | libheif v1.17.5 was discovered to contain a segmentation violation via the function UncompressedImageCodec::decode_uncompressed_image. | https://github.com/strukturag/libheif/issues/1046 | https://github.com/strukturag/libheif/commit/fd5b02aca3e29088bf0a1fc400bd661be4a6ed76 | strukturag/libheif | fd5b02aca3e29088bf0a1fc400bd661be4a6ed76~1 | diff --git a/libheif/uncompressed_image.cc b/libheif/uncompressed_image.cc
index c91e5dba4f..487d4cedbe 100644
--- a/libheif/uncompressed_image.cc
+++ b/libheif/uncompressed_image.cc
@@ -616,6 +616,13 @@ Error UncompressedImageCodec::decode_uncompressed_image(const std::shared_ptr<co
if (error) {
return error;
... | https://github.com/strukturag/libheif/issues/1046 | ==89344==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x7f955d086aeb bp 0x7ffdd923ebb0 sp 0x7ffdd923e318 T0)
==89344==The signal is caused by a READ memory access.
==89344==Hint: address points to the zero page.
#0 0x7f955d086aea in memcpy (/lib/x86_64-linux-gnu/libc.so.6+0xbbaea)
#1 0x7f... | === https://github.com/strukturag/libheif/issues/1046 ===
Title: AddressSanitizer: SEGV in `decode_uncompressed_image`
---
Body:
### Description
AddressSanitizer: SEGV in `decode_uncompressed_image`
### Version
```
commit: 64ece913266609789f5dc70fe7de9eb759badd7f
heif-convert libheif version: 1.17.5
--... | https://nvd.nist.gov/vuln/detail/CVE-2023-49460 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.