instance_id
string
description
string
exploit(poc)_url
string
patch_url
string
weakness_enumeration
string
github_repo
string
base_commit
string
developers_patch
string
bug_report
string
sanitizer_report
string
sanitizer
string
github_issue
string
nvd_url
string
njs.cve-2022-32414
Nginx NJS v0.7.2 was discovered to contain a segmentation violation in the function njs_vmcode_interpreter at src/njs_vmcode.c.
https://github.com/nginx/njs/issues/483
https://github.com/nginx/njs/commit/31ed93a5623f24ca94e6d47e895ba735d9d97d46
CWE-416
nginx/njs
31ed93a5623f24ca94e6d47e895ba735d9d97d46~1
diff --git a/src/njs_promise.c b/src/njs_promise.c index 52ae5b570..ea162d533 100644 --- a/src/njs_promise.c +++ b/src/njs_promise.c @@ -1369,6 +1369,10 @@ njs_promise_perform_all_handler(njs_vm_t *vm, njs_iterator_args_t *args, njs_promise_all_context_t *context; njs_promise_iterator_args_t *pargs; + ...
https://github.com/nginx/njs/issues/483
AddressSanitizer:DEADLYSIGNAL ================================================================= ==732128==ERROR: AddressSanitizer: SEGV on unknown address (pc 0x0000004e3e53 bp 0x7ffe6e1f76b0 sp 0x7ffe6e1f6e80 T0) ==732128==The signal is caused by a READ memory access. ==732128==Hint: this fault was caused by a derefer...
=== https://github.com/nginx/njs/issues/483 === Title: SEGV njs_vmcode.c:802:27 in njs_vmcode_interpreter --- Body: ### Environment ``` OS : Linux ubuntu 5.13.0-27-generic #29~20.04.1-Ubuntu SMP Fri Jan 14 00:32:30 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux Commit : f65981b0b8fcf02d69a40bc934803c25c9f607ab V...
https://nvd.nist.gov/vuln/detail/CVE-2022-32414
gpac.cve-2023-5586
NULL Pointer Dereference in GitHub repository gpac/gpac prior to 2.3.0-DEV.
https://huntr.dev/bounties/d2a6ea71-3555-47a6-9b18-35455d103740
https://github.com/gpac/gpac/commit/ca1b48f0abe71bf81a58995d7d75dc27f5a17ddc, https://huntr.dev/bounties/d2a6ea71-3555-47a6-9b18-35455d103740
CWE-476
gpac/gpac
5692dc729491805e0e5f55c21d50ba1e6b19e88e
diff --git a/src/filters/reframe_rawpcm.c b/src/filters/reframe_rawpcm.c index 37decc00e6..406c6638de 100644 --- a/src/filters/reframe_rawpcm.c +++ b/src/filters/reframe_rawpcm.c @@ -360,6 +360,14 @@ GF_Err pcmreframe_process(GF_Filter *filter) } wav_ok = GF_FALSE; } + if (!ctx->ch) { + GF_LOG(GF_LOG_ERRO...
https://nvd.nist.gov/vuln/detail/CVE-2023-5586
mruby.cve-2022-0240
mruby is vulnerable to NULL Pointer Dereference
https://huntr.dev/bounties/5857eced-aad9-417d-864e-0bdf17226cbb
https://github.com/mruby/mruby/commit/31fa3304049fc406a201a72293cce140f0557dca
CWE-476
mruby/mruby
171d32c0071d776207174a40a8fa26def3dbb931
diff --git a/src/class.c b/src/class.c index ec9c648e5d..8751dcaf05 100644 --- a/src/class.c +++ b/src/class.c @@ -357,6 +357,7 @@ prepare_singleton_class(mrb_state *mrb, struct RBasic *o) { struct RClass *sc, *c; + mrb_assert(o->c); if (o->c->tt == MRB_TT_SCLASS) return; sc = MRB_OBJ_ALLOC(mrb, MRB_TT_SCL...
https://nvd.nist.gov/vuln/detail/CVE-2022-0240
njs.cve-2022-28049
NGINX NJS 0.7.2 was discovered to contain a NULL pointer dereference via the component njs_vmcode_array at /src/njs_vmcode.c.
https://github.com/nginx/njs/issues/473
https://github.com/nginx/njs/commit/f65981b0b8fcf02d69a40bc934803c25c9f607ab
CWE-476
nginx/njs
f65981b0b8fcf02d69a40bc934803c25c9f607ab~1
diff --git a/src/njs_vmcode.c b/src/njs_vmcode.c index ef0beb5e0..ec478659c 100644 --- a/src/njs_vmcode.c +++ b/src/njs_vmcode.c @@ -1055,14 +1055,16 @@ njs_vmcode_array(njs_vm_t *vm, u_char *pc) if (code->ctor) { /* Array of the form [,,,], [1,,]. */ - value = array->start; - ...
https://github.com/nginx/njs/issues/473
INFO: Seed: 2125423890 INFO: Loaded 1 modules (53334 inline 8-bit counters): 53334 [0x95f010, 0x96c066), INFO: Loaded 1 PC tables (53334 PCs): 53334 [0x96c068,0xa3c5c8), /out/njs_process_script_fuzzer: Running 1 inputs 1 time(s) each. Running: crashes/njs_njs_process_script_fuzzer/id:000002,sig:06,src:001260+005121...
=== https://github.com/nginx/njs/issues/473 === Title: Null pointer dereference in src/njs_vmcode.c:1049:17 --- Body: Hi, this bug was found by fuzzing the current master branch, to reproduce build the OSS-Fuzz harness with ASan and UBSan. The bug is a write to a NULL pointer, this is the sanitizer report: ```...
https://nvd.nist.gov/vuln/detail/CVE-2022-28049
njs.cve-2022-38890
Nginx NJS v0.7.7 was discovered to contain a segmentation violation via njs_utf8_next at src/njs_utf8.h
https://github.com/nginx/njs/issues/569
https://github.com/nginx/njs/commit/b9aea5854bcf6f2de8f7a7f1550874e392b94be2
CWE-125
nginx/njs
b9aea5854bcf6f2de8f7a7f1550874e392b94be2~1
diff --git a/src/njs_string.c b/src/njs_string.c index 83cede548..62bece0de 100644 --- a/src/njs_string.c +++ b/src/njs_string.c @@ -2849,6 +2849,7 @@ njs_string_trim(const njs_value_t *value, njs_string_prop_t *string, for ( ;; ) { if (start == prev) { + end = prev; ...
https://github.com/nginx/njs/issues/569
AddressSanitizer:DEADLYSIGNAL ================================================================= ==1550478==ERROR: AddressSanitizer: SEGV on unknown address 0x6170bebedece (pc 0x000000505f0e bp 0x7fff88dc8f70 sp 0x7fff88dc8e40 T0) ==1550478==The signal is caused by a READ memory access. #0 0x505f0e in njs_utf8_next ...
=== https://github.com/nginx/njs/issues/569 === Title: Another way to trigger SEGV in njs_utf8_next cause oob read --- Body: the call stack is different with https://github.com/nginx/njs/issues/522 ``` Environment commit: 569292e0a74f2b1ec09566f3329f82bdd0d58e87 version: 0.7.7 Build : ./configure --cc=c...
https://nvd.nist.gov/vuln/detail/CVE-2022-38890
libredwg.cve-2020-21816
A heab based buffer overflow issue exists in GNU LibreDWG 0.10.2641 via htmlescape ../../programs/escape.c:46.
https://github.com/LibreDWG/libredwg/issues/182#issuecomment-572890865
https://github.com/LibreDWG/libredwg/commit/7e4c59b63d9c5b4b513cba1d0f33612042524563
CWE-787
LibreDWG/libredwg
7b9cb829f93d1c1f67584345ed65ea830de8bdda
diff --git a/programs/escape.c b/programs/escape.c index 8a907414e0..4d409ea43f 100644 --- a/programs/escape.c +++ b/programs/escape.c @@ -27,42 +27,74 @@ char * ATTRIBUTE_MALLOC htmlescape (const char *restrict src, const int cp) { int len; - char *dest, *d; + char *dest, *d, *end; unsigned char *s; if (!...
https://github.com/LibreDWG/libredwg/issues/182#issuecomment-572890865
=== https://github.com/LibreDWG/libredwg/issues/182#issuecomment-572890865 === Title: Several bugs found by fuzzing --- Body: Hi, After fuzzing libredwg, I found the following bugs on the latest commit on master. Command: ./dwg2SVG $PoC **1.NULL pointer dereference in htmlescape ../../programs/escape.c:29** POC: ...
https://nvd.nist.gov/vuln/detail/CVE-2020-21816
gpac.cve-2023-46929
An issue discovered in GPAC 2.3-DEV-rev605-gfc9e29089-master in MP4Box in gf_avc_change_vui /afltest/gpac/src/media_tools/av_parsers.c:6872:55 allows attackers to crash the application.
https://github.com/gpac/gpac/issues/2662
https://github.com/gpac/gpac/commit/4248def5d24325aeb0e35cacde3d56c9411816a6
CWE-20
gpac/gpac
4248def5d24325aeb0e35cacde3d56c9411816a6~1
diff --git a/src/media_tools/av_parsers.c b/src/media_tools/av_parsers.c index 43c3200b90..84e6601b64 100644 --- a/src/media_tools/av_parsers.c +++ b/src/media_tools/av_parsers.c @@ -6865,6 +6865,9 @@ GF_Err gf_avc_change_vui(GF_AVCConfig *avcc, GF_VUIInfo *vui_info) GF_AVCConfigSlot *slc; orig = NULL; + if (!avc...
https://github.com/gpac/gpac/issues/2662
AddressSanitizer:DEADLYSIGNAL ================================================================= ==3037856==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000008 (pc 0x7ffff67d35c7 bp 0x7ffffffec090 sp 0x7ffffffe29c0 T0) ==3037856==The signal is caused by a READ memory access. ==3037856==Hint: address points t...
=== https://github.com/gpac/gpac/issues/2662 === Title: SEGV in MP4Box in gf_avc_change_vui /afltest/gpac/src/media_tools/av_parsers.c:6872:55 --- Body: # SEGV in MP4Box ### Description SEGV in gpac/MP4Box. #0 0x7ffff67d35c7 in gf_avc_change_vui /afltest/gpac/src/media_tools/av_parsers.c:6872:55 ### Versi...
https://nvd.nist.gov/vuln/detail/CVE-2023-46929
gpac.cve-2024-0321
Stack-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.3-DEV.
https://huntr.com/bounties/4c027b94-8e9c-4c31-a169-893b25047769
https://github.com/gpac/gpac/commit/d0ced41651b279bb054eb6390751e2d4eb84819a
CWE-121, CWE-787
gpac/gpac
d0ced41651b279bb054eb6390751e2d4eb84819a~1
diff --git a/src/filters/load_text.c b/src/filters/load_text.c index 6373398228..877b285a80 100644 --- a/src/filters/load_text.c +++ b/src/filters/load_text.c @@ -377,6 +377,10 @@ char *gf_text_get_utf8_line(char *szLine, u32 lineSize, FILE *txt_in, s32 unicod GF_LOG(GF_LOG_DEBUG, GF_LOG_PARSER, ("[TXTIn] Line too ...
https://nvd.nist.gov/vuln/detail/CVE-2024-0321
libarchive.cve-2017-14503
libarchive 3.3.2 suffers from an out-of-bounds read within lha_read_data_none() in archive_read_support_format_lha.c when extracting a specially crafted lha archive, related to lha_crc16.
https://github.com/libarchive/libarchive/commit/2c8c83b9731ff822fad6cc8c670ea5519c366a14
CWE-125
libarchive/libarchive
2c8c83b9731ff822fad6cc8c670ea5519c366a14~1
diff --git a/libarchive/archive_read_support_format_lha.c b/libarchive/archive_read_support_format_lha.c index b8ef4ae10e..95c99bb1f3 100644 --- a/libarchive/archive_read_support_format_lha.c +++ b/libarchive/archive_read_support_format_lha.c @@ -701,6 +701,12 @@ archive_read_format_lha_read_header(struct archive_read ...
https://bugs.debian.org/875960, https://github.com/libarchive/libarchive/issues/948
==21722==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x631000024800 at pc 0x56536be61878 bp 0x7fffa2254ec0 sp 0x7fffa2254eb8 READ of size 2 at 0x631000024800 thread T0 #0 0x56536be61877 in lha_crc16 libarchive/archive_read_support_format_lha.c:1740 #1 0x56536be5f791 in lha_read_data_none libarchive...
ASan (inferred)
=== https://github.com/libarchive/libarchive/issues/948 === Title: out-of-bounds read in lha_read_data_none() --- Body: Hi The following was reported downstream in Debian at https://bugs.debian.org/875960 The `oob.lha` base64 encoded is: ```` YQAtbGgwLQwAAAAMAAAAADs9SyACeJdNBwBh5AQAAAwAAWhlbGxvLnR4dBMAQv9zd...
https://nvd.nist.gov/vuln/detail/CVE-2017-14503
gpac.cve-2023-0760
Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to V2.1.0-DEV.
https://github.com/gpac/gpac/commit/ea7395f39f601a7750d48d606e9d10ea0b7beefe, https://huntr.dev/bounties/d06223df-a473-4c82-96d0-23726b844b21
https://github.com/gpac/gpac/commit/ea7395f39f601a7750d48d606e9d10ea0b7beefe, https://huntr.dev/bounties/d06223df-a473-4c82-96d0-23726b844b21
CWE-122, CWE-787
gpac/gpac
ea7395f39f601a7750d48d606e9d10ea0b7beefe~1
diff --git a/src/isomedia/box_code_base.c b/src/isomedia/box_code_base.c index baf07ff352..9a9ad09b45 100644 --- a/src/isomedia/box_code_base.c +++ b/src/isomedia/box_code_base.c @@ -4429,7 +4429,7 @@ GF_Err video_sample_entry_box_size(GF_Box *s) /*VVC*/ gf_isom_check_position(s, (GF_Box *)ptr->vvc_config, &pos);...
https://huntr.dev/bounties/d06223df-a473-4c82-96d0-23726b844b21
https://nvd.nist.gov/vuln/detail/CVE-2023-0760
njs.cve-2022-31307
Nginx NJS v0.7.2 was discovered to contain a segmentation violation in the function njs_string_offset at src/njs_string.c.
https://github.com/nginx/njs/issues/482
https://github.com/nginx/njs/commit/eafe4c7a326b163612f10861392622b5da5b1792
CWE-416
nginx/njs
eafe4c7a326b163612f10861392622b5da5b1792~1
diff --git a/src/njs_iterator.c b/src/njs_iterator.c index 90c3046fb..043e4483c 100644 --- a/src/njs_iterator.c +++ b/src/njs_iterator.c @@ -560,11 +560,14 @@ njs_object_iterate_reverse(njs_vm_t *vm, njs_iterator_args_t *args, } else { /* UTF-8 string. */ - p = njs_string_offset(strin...
https://github.com/nginx/njs/issues/482
AddressSanitizer:DEADLYSIGNAL ================================================================= ==732134==ERROR: AddressSanitizer: SEGV on unknown address (pc 0x0000004f44ab bp 0x7ffee1c1f9b0 sp 0x7ffee1c1f9b0 T0) ==732134==The signal is caused by a READ memory access. ==732134==Hint: this fault was caused by a derefer...
=== https://github.com/nginx/njs/issues/482 === Title: SEGV njs_string.c:2535:18 in njs_string_offset --- Body: ### Environment ``` OS : Linux ubuntu 5.13.0-27-generic #29~20.04.1-Ubuntu SMP Fri Jan 14 00:32:30 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux Commit : f65981b0b8fcf02d69a40bc934803c25c9f607ab Versi...
https://nvd.nist.gov/vuln/detail/CVE-2022-31307
njs.cve-2021-46462
njs through 0.7.1, used in NGINX, was discovered to contain a segmentation violation via njs_object_set_prototype in /src/njs_object.c.
https://github.com/nginx/njs/issues/449
https://github.com/nginx/njs/commit/39e8fa1b7db1680654527f8fa0e9ee93b334ecba, https://github.com/nginx/njs/issues/449
nginx/njs
39e8fa1b7db1680654527f8fa0e9ee93b334ecba~1
diff --git a/src/njs_function.c b/src/njs_function.c index 0c23ca05c..ae0fa11ff 100644 --- a/src/njs_function.c +++ b/src/njs_function.c @@ -1385,18 +1385,10 @@ njs_function_prototype_apply(njs_vm_t *vm, njs_value_t *args, njs_uint_t nargs, if (njs_is_null_or_undefined(arr_like)) { length = 0; - - ...
https://github.com/nginx/njs/issues/449
AddressSanitizer:DEADLYSIGNAL ================================================================= ==466519==ERROR: AddressSanitizer: SEGV on unknown address (pc 0x00000050d6d4 bp 0x7ffc8e2432f0 sp 0x7ffc8e2432e0 T0) ==466519==The signal is caused by a READ memory access. ==466519==Hint: this fault was caused by a derefer...
=== https://github.com/nginx/njs/issues/449 === Title: SEGV /njs/src/njs_object.c:2136:24 in njs_object_set_prototype --- Body: ## Env ``` Version : 0.7.0 Git Commit : 2da5d8b246b806bee6f74b575217ec3b61a25548 OS : Ubuntu 20.04 Configure : ./configure --address-sanitizer=YES ``` ## POC ``` functio...
https://nvd.nist.gov/vuln/detail/CVE-2021-46462
njs.cve-2022-29779
Nginx NJS v0.7.2 was discovered to contain a segmentation violation in the function njs_value_own_enumerate at src/njs_value.c.
https://github.com/nginx/njs/issues/485
https://github.com/nginx/njs/commit/2e00e95473861846aa8538be87db07699d9f676d
nginx/njs
2e00e95473861846aa8538be87db07699d9f676d~1
diff --git a/src/njs_array.c b/src/njs_array.c index 0b8c7b919..2ceb6be7e 100644 --- a/src/njs_array.c +++ b/src/njs_array.c @@ -1284,6 +1284,11 @@ njs_array_prototype_splice(njs_vm_t *vm, njs_value_t *args, njs_uint_t nargs, if (njs_slow_path(ret == NJS_ERROR)) { return ret; ...
https://github.com/nginx/njs/issues/485
AddressSanitizer:DEADLYSIGNAL ================================================================= ==2523460==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x555b64452f1c bp 0x7ffdcdd97650 sp 0x7ffdcdd97520 T0) ==2523460==The signal is caused by a READ memory access. ==2523460==Hint: address points t...
=== https://github.com/nginx/njs/issues/485 === Title: SEGV src/njs_value.c:240 in njs_value_own_enumerate --- Body: # Environment OS : Linux leanderwang-LC2 5.13.0-30-generic https://github.com/nginx/njs/issues/33 SMP Mon Feb 7 14:25:10 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux Commit : https://github.com/nginx/njs/...
https://nvd.nist.gov/vuln/detail/CVE-2022-29779
njs.cve-2022-29369
Nginx NJS v0.7.2 was discovered to contain a segmentation violation via njs_lvlhsh_bucket_find at njs_lvlhsh.c.
https://github.com/nginx/njs/commit/222d6fdcf0c6485ec8e175f3a7b70d650c234b4e
CWE-754
nginx/njs
222d6fdcf0c6485ec8e175f3a7b70d650c234b4e~1
diff --git a/src/njs_vmcode.c b/src/njs_vmcode.c index 0b07ec67e..6b10200ee 100644 --- a/src/njs_vmcode.c +++ b/src/njs_vmcode.c @@ -700,7 +700,7 @@ njs_vmcode_interpreter(njs_vm_t *vm, u_char *pc, void *promise_cap, ret = njs_object_prop_define(vm, value1, &name, function, ...
https://github.com/nginx/njs/issues/467
AddressSanitizer:DEADLYSIGNAL ================================================================= ==2064577==ERROR: AddressSanitizer: SEGV on unknown address (pc 0x0000004cac48 bp 0x7ffcc1edfbf0 sp 0x7ffcc1edfbb0 T0) ==2064577==The signal is caused by a READ memory access. ==2064577==Hint: this fault was caused by a dere...
=== https://github.com/nginx/njs/issues/467 === Title: SEGV njs_lvlhsh.c:231:17 in njs_lvlhsh_bucket_find --- Body: ### Environment ``` OS : Linux ubuntu 5.13.0-27-generic #29~20.04.1-Ubuntu SMP Fri Jan 14 00:32:30 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux Commit : 7bd570b39297d3d91902c93a624c89b08be7a6fe V...
https://nvd.nist.gov/vuln/detail/CVE-2022-29369
mruby.cve-2022-1201
NULL Pointer Dereference in mrb_vm_exec with super in GitHub repository mruby/mruby prior to 3.2. This vulnerability is capable of making the mruby interpreter crash, thus affecting the availability of the system.
https://huntr.dev/bounties/6f930add-c9d8-4870-ae56-d4bd8354703b
https://github.com/mruby/mruby/commit/00acae117da1b45b318dc36531a7b0021b8097ae
CWE-476
mruby/mruby
00acae117da1b45b318dc36531a7b0021b8097ae~1
diff --git a/src/vm.c b/src/vm.c index 77edbb38fc..3bb9510ec1 100644 --- a/src/vm.c +++ b/src/vm.c @@ -1749,7 +1749,7 @@ mrb_vm_exec(mrb_state *mrb, const struct RProc *proc, const mrb_code *pc) } else if (target_class->tt == MRB_TT_MODULE) { target_class = mrb_vm_ci_target_class(ci); - if...
https://nvd.nist.gov/vuln/detail/CVE-2022-1201
faad2.cve-2018-20198
A NULL pointer dereference was discovered in ifilter_bank of libfaad/filtbank.c in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.8. The vulnerability causes a segmentation fault and application crash, which leads to denial of service because adding to windowed output is mishandled in the LONG_START_SEQUENCE case.
https://github.com/fantasy7082/image_test/blob/master/002-null-point-filtbank_246
https://github.com/knik0/faad2/commit/466b01d504d7e45f1e9169ac90b3e34ab94aed14
CWE-476
knik0/faad2
466b01d504d7e45f1e9169ac90b3e34ab94aed14~1
diff --git a/libfaad/syntax.c b/libfaad/syntax.c index f8e808c2..e7fb1138 100644 --- a/libfaad/syntax.c +++ b/libfaad/syntax.c @@ -344,6 +344,12 @@ static void decode_sce_lfe(NeAACDecStruct *hDecoder, can become 2 when some form of Parametric Stereo coding is used */ + if (hDecoder->frame && hDecoder-...
https://github.com/knik0/faad2/issues/23, https://seclists.org/bugtraq/2019/Sep/28
./faad faad_res/002-null-point-filtbank_246 -o out.wav *********** Ahead Software MPEG-4 AAC Decoder V2.8.8 ****************** Build: Dec 13 2018 Copyright 2002-2004: Ahead Software AG http://www.audiocoding.com bug tracking: https://sourceforge.net/p/faac/bugs/ Floating point version This program is free soft...
=== https://github.com/knik0/faad2/issues/23 === Title: Null pointer dereference vulnerability in ifilter_bank(libfaad/filtbank.c:246) --- Body: Hi, i found a null pointer dereference bug in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.8. It crashed in function ifilter_bank.the details are below(ASAN): ``` ./faa...
https://nvd.nist.gov/vuln/detail/CVE-2018-20198
mruby.cve-2022-1427
Out-of-bounds Read in mrb_obj_is_kind_of in in GitHub repository mruby/mruby prior to 3.2. # Impact: Possible arbitrary code execution if being exploited.
https://huntr.dev/bounties/23b6f0a9-64f5-421e-a55f-b5b7a671f301
https://github.com/mruby/mruby/commit/a4d97934d51cb88954cc49161dc1d151f64afb6b
CWE-125
mruby/mruby
a4d97934d51cb88954cc49161dc1d151f64afb6b~1
diff --git a/src/vm.c b/src/vm.c index 5013c877d4..aa043b06ae 100644 --- a/src/vm.c +++ b/src/vm.c @@ -1750,10 +1750,7 @@ mrb_vm_exec(mrb_state *mrb, const struct RProc *proc, const mrb_code *pc) mrb_exc_set(mrb, exc); goto L_RAISE; } - if (target_class->flags & MRB_FL_CLASS_IS_PREPENDED) ...
ASan (inferred)
https://nvd.nist.gov/vuln/detail/CVE-2022-1427
gpac.cve-2023-48013
GPAC v2.3-DEV-rev566-g50c2ab06f-master was discovered to contain a double free via the gf_filterpacket_del function at /gpac/src/filter_core/filter.c.
https://github.com/gpac/gpac/issues/2612
https://github.com/gpac/gpac/commit/cd8a95c1efb8f5bfc950b86c2ef77b4c76f6b893
CWE-415
gpac/gpac
cd8a95c1efb8f5bfc950b86c2ef77b4c76f6b893~1
diff --git a/src/filters/isoffin_read_ch.c b/src/filters/isoffin_read_ch.c index bd96400689..6e74ce8e3f 100644 --- a/src/filters/isoffin_read_ch.c +++ b/src/filters/isoffin_read_ch.c @@ -395,6 +395,8 @@ void isor_reader_get_sample(ISOMChannel *ch) if (ch->edit_sync_frame) { ch->edit_sync_frame++; if (ch->...
https://github.com/gpac/gpac/issues/2612
==827317==ERROR: AddressSanitizer: attempting double-free on 0x619000015980 in thread T0: #0 0x55e7797a5972 in free (/home/user/fuzzing_gpac/gpac/bin/gcc/MP4Box+0x105972) (BuildId: 53333ca7bff59dd9a3d1b2821e7c5f3a9aac76b9) #1 0x7f525cd97945 in gf_filterpacket_del /home/user/fuzzing_gpac/gpac/src/filter_core/fil...
=== https://github.com/gpac/gpac/issues/2612 === Title: double-free in gf_filterpacket_del /home/user/fuzzing_gpac/gpac/src/filter_core/filter.c:38:17 --- Body: # Version ``` $ ./MP4Box -version MP4Box - GPAC version 2.3-DEV-rev566-g50c2ab06f-master ``` # Platform ``` $ uname -a Linux user-GE40-2PC-Dragon-E...
https://nvd.nist.gov/vuln/detail/CVE-2023-48013
gpac.cve-2023-48011
GPAC v2.3-DEV-rev566-g50c2ab06f-master was discovered to contain a heap-use-after-free via the flush_ref_samples function at /gpac/src/isomedia/movie_fragments.c.
https://github.com/gpac/gpac/issues/2611
https://github.com/gpac/gpac/commit/c70f49dda4946d6db6aa55588f6a756b76bd84ea
CWE-416
gpac/gpac
c70f49dda4946d6db6aa55588f6a756b76bd84ea~1
diff --git a/src/isomedia/movie_fragments.c b/src/isomedia/movie_fragments.c index b7f7ade327..d665eeb9d0 100644 --- a/src/isomedia/movie_fragments.c +++ b/src/isomedia/movie_fragments.c @@ -591,6 +591,7 @@ u32 UpdateRuns(GF_ISOFile *movie, GF_TrackFragmentBox *traf) while (gf_list_count(traf->TrackRuns)) { trun...
https://github.com/gpac/gpac/issues/2611
==836900==ERROR: AddressSanitizer: heap-use-after-free on address 0x60b000001d88 at pc 0x7f57c0120bf1 bp 0x7ffeac405a70 sp 0x7ffeac405a68 READ of size 8 at 0x60b000001d88 thread T0 #0 0x7f57c0120bf0 in flush_ref_samples /home/user/fuzzing_gpac/gpac/src/isomedia/movie_fragments.c:936:37 #1 0x7f57c0128df2 in gf_i...
ASan (inferred)
=== https://github.com/gpac/gpac/issues/2611 === Title: heap-use-after-free in ./gpac/src/isomedia/movie_fragments.c:936:37 in flush_ref_samples --- Body: # Version ``` $ ./MP4Box -version MP4Box - GPAC version 2.3-DEV-rev566-g50c2ab06f-master ``` # Platform ``` $ uname -a Linux user-GE40-2PC-Dragon-Eyes 6....
https://nvd.nist.gov/vuln/detail/CVE-2023-48011
libredwg.cve-2021-28237
LibreDWG v0.12.3 was discovered to contain a heap-buffer overflow via decode_preR13.
https://github.com/LibreDWG/libredwg/issues/325
https://github.com/LibreDWG/libredwg/commit/ea0b9522f63d049ded2c3cff8d9a8c360119951c
CWE-787
LibreDWG/libredwg
ea0b9522f63d049ded2c3cff8d9a8c360119951c~1
diff --git a/src/decode.c b/src/decode.c index 444775afd1..79134db0b3 100644 --- a/src/decode.c +++ b/src/decode.c @@ -329,19 +329,20 @@ decode_preR13_section (Dwg_Section_Type_r11 id, Bit_Chain *restrict dat, // TODO: move to a spec dwg_r11.spec, and dwg_decode_r11_NAME #define PREP_TABLE(token) ...
https://github.com/LibreDWG/libredwg/issues/325
➜ ./dwgread ./poc ERROR: This version of LibreDWG is only capable of decoding version r13-r2018 (code: AC1012-AC1032) DWG files. We don't decode many entities and no blocks yet. ERROR: offset -39 ERROR: offset -85 ================================================================= ==12538==ERROR: AddressSanitizer: heap-...
=== https://github.com/LibreDWG/libredwg/issues/325 === Title: Heap-buffer-overflow in decode_preR13 line 470 --- Body: I found a heap buffer overflow in the current master (8072563). # Configure CFLAGS="-g -fsanitize=address" LDFLAGS="-fsanitize=address" ./configure # Command `./dwgread ./poc` # ASAN repo...
https://nvd.nist.gov/vuln/detail/CVE-2021-28237
mruby.cve-2022-0631
Heap-based Buffer Overflow in Homebrew mruby prior to 3.2.
https://huntr.dev/bounties/9bdc49ca-6697-4adc-a785-081e1961bf40
https://github.com/mruby/mruby/commit/47068ae07a5fa3aa9a1879cdfe98a9ce0f339299, https://huntr.dev/bounties/9bdc49ca-6697-4adc-a785-081e1961bf40
CWE-122
mruby/mruby
47068ae07a5fa3aa9a1879cdfe98a9ce0f339299~1
diff --git a/src/vm.c b/src/vm.c index 9cb50847f2..aa5569503e 100644 --- a/src/vm.c +++ b/src/vm.c @@ -689,9 +689,11 @@ mrb_f_send(mrb_state *mrb, mrb_value self) regs = mrb->c->ci->stack+1; if (n == 0) { + argnum_error: mrb_argnum_error(mrb, 0, 1, -1); } else if (n == 15) { + if (RARRAY_LEN(regs...
https://nvd.nist.gov/vuln/detail/CVE-2022-0631
mruby.cve-2022-1934
Use After Free in GitHub repository mruby/mruby prior to 3.2.
https://huntr.dev/bounties/99e6df06-b9f7-4c53-a722-6bb89fbfb51f
https://github.com/mruby/mruby/commit/aa7f98dedb68d735a1665d3a289036c88b0c47ce, https://huntr.dev/bounties/99e6df06-b9f7-4c53-a722-6bb89fbfb51f
CWE-416
mruby/mruby
aa7f98dedb68d735a1665d3a289036c88b0c47ce~1
diff --git a/src/vm.c b/src/vm.c index b04c9d7e58..09e557dc8e 100644 --- a/src/vm.c +++ b/src/vm.c @@ -1159,18 +1159,20 @@ check_target_class(mrb_state *mrb) return target; } +#define regs (mrb->c->ci->stack) + static mrb_value -hash_new_from_values(mrb_state *mrb, mrb_int argc, mrb_value *regs) +hash_new_from_r...
https://nvd.nist.gov/vuln/detail/CVE-2022-1934
njs.cve-2022-34029
Nginx NJS v0.7.4 was discovered to contain an out-of-bounds read via njs_scope_value at njs_scope.h.
https://github.com/nginx/njs/issues/506
https://github.com/nginx/njs/commit/d09868bc71f9a990445959329ad8c1b10d3898f5
CWE-125
nginx/njs
d09868bc71f9a990445959329ad8c1b10d3898f5~1
diff --git a/src/njs_vmcode.c b/src/njs_vmcode.c index 9833ada03..cc33d20b2 100644 --- a/src/njs_vmcode.c +++ b/src/njs_vmcode.c @@ -856,9 +856,15 @@ njs_vmcode_interpreter(njs_vm_t *vm, u_char *pc, void *promise_cap, case NJS_VMCODE_AWAIT: await = (njs_vmcode_await_t *) pc; + ...
https://github.com/nginx/njs/issues/506
AddressSanitizer:DEADLYSIGNAL ================================================================= ==815==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000040 (pc 0x0000004ff20b bp 0x7ffc7abf6030 sp 0x7ffc7abf5880 T0) ==815==The signal is caused by a READ memory access. ==815==Hint: address points to the zero p...
ASan (inferred)
=== https://github.com/nginx/njs/issues/506 === Title: SEGV njs_scope.h:74:12 Out-of-bounds Read in njs_scope_value --- Body: Environment ```OS : Linux ubuntu 5.13.0-27-generic #29~20.04.1-Ubuntu SMP Fri Jan 14 00:32:30 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux Commit : 9f4ebc96148308a8ce12f2b54432c87e6d78b881 ...
https://nvd.nist.gov/vuln/detail/CVE-2022-34029
libarchive.cve-2019-11463
A memory leak in archive_read_format_zip_cleanup in archive_read_support_format_zip.c in libarchive 3.3.4-dev allows remote attackers to cause a denial of service via a crafted ZIP file because of a HAVE_LZMA_H typo. NOTE: this only affects users who downloaded the development code from GitHub. Users of the product's o...
https://github.com/libarchive/libarchive/issues/1165
https://github.com/libarchive/libarchive/commit/ba641f73f3d758d9032b3f0e5597a9c6e593a505
CWE-401
libarchive/libarchive
ba641f73f3d758d9032b3f0e5597a9c6e593a505~1
diff --git a/libarchive/archive_read_support_format_zip.c b/libarchive/archive_read_support_format_zip.c index 677c437095..6937969c16 100644 --- a/libarchive/archive_read_support_format_zip.c +++ b/libarchive/archive_read_support_format_zip.c @@ -2751,7 +2751,7 @@ archive_read_format_zip_cleanup(struct archive_read *a)...
https://github.com/libarchive/libarchive/issues/1165
==15753==ERROR: LeakSanitizer: detected memory leaks Direct leak of 96 byte(s) in 1 object(s) allocated from: #0 0x7f4c0b1dfb50 in __interceptor_malloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xdeb50) #1 0x7f4c0a85dced (/lib/x86_64-linux-gnu/liblzma.so.5+0x2ced) Indirect leak of 224 byte(s) in 1 object(s) al...
=== https://github.com/libarchive/libarchive/issues/1165 === Title: Memory leak when decoding LZMA --- Body: I've encountered a memory leak while fuzzing libarchive. A 32-byte reproducer input is attached: [input.zip](https://github.com/libarchive/libarchive/files/3019394/input.zip). Do not extract this zip file -- ...
https://nvd.nist.gov/vuln/detail/CVE-2019-11463
mruby.cve-2022-0614
Use of Out-of-range Pointer Offset in Homebrew mruby prior to 3.2.
https://huntr.dev/bounties/a980ce4d-c359-4425-92c4-e844c0055879
https://github.com/mruby/mruby/commit/ff3a5ebed6ffbe3e70481531cfb969b497aa73ad, https://huntr.dev/bounties/a980ce4d-c359-4425-92c4-e844c0055879
CWE-119, CWE-823
mruby/mruby
ff3a5ebed6ffbe3e70481531cfb969b497aa73ad~1
diff --git a/src/vm.c b/src/vm.c index 6133cbccac..9cb50847f2 100644 --- a/src/vm.c +++ b/src/vm.c @@ -2766,7 +2766,7 @@ mrb_vm_exec(mrb_state *mrb, const struct RProc *proc, const mrb_code *pc) int lim = a+b*2+1; hash = regs[a]; - mrb_assert(mrb_hash_p(hash)); + mrb_ensure_hash_type(mrb, hash...
https://nvd.nist.gov/vuln/detail/CVE-2022-0614
faad2.cve-2018-20194
There is a stack-based buffer underflow in the third instance of the calculate_gain function in libfaad/sbr_hfadj.c in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.8. A crafted input will lead to a denial of service or possibly unspecified other impact because limiting the additional noise energy level is mishandled f...
https://github.com/knik0/faad2/issues/21
https://github.com/hlef/faad2/commit/6b4a7cde30f2e2cb03e78ef476cc73179cfffda3
CWE-787
hlef/faad2
5d380279cb00ea7a8b24f647f3790a1fc5342731
diff --git a/libfaad/sbr_hfadj.c b/libfaad/sbr_hfadj.c index 3f310b81..dda1ce8e 100644 --- a/libfaad/sbr_hfadj.c +++ b/libfaad/sbr_hfadj.c @@ -485,6 +485,12 @@ static void calculate_gain(sbr_info *sbr, sbr_hfadj_info *adj, uint8_t ch) ml1 = sbr->f_table_lim[sbr->bs_limiter_bands][k]; ml2 = sbr...
https://github.com/knik0/faad2/issues/21, https://seclists.org/bugtraq/2019/Sep/28
./faad faad_res/015-stack-buffer-underflow-sbr_hfadj_1314 -o out.wav *********** Ahead Software MPEG-4 AAC Decoder V2.8.8 ****************** Build: Dec 13 2018 Copyright 2002-2004: Ahead Software AG http://www.audiocoding.com bug tracking: https://sourceforge.net/p/faac/bugs/ Floating point version This progra...
=== https://github.com/knik0/faad2/issues/21 === Title: stack-buffer-underflow in function calculate_gain(libfaad/sbr_hfadj.c:1314) --- Body: Hi, i found a stack-buffer-overflow bug in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.8, the details are below(ASAN): ``` ./faad faad_res/015-stack-buffer-underflow-sb...
https://nvd.nist.gov/vuln/detail/CVE-2018-20194
gpac.cve-2023-4721
Out-of-bounds Read in GitHub repository gpac/gpac prior to 2.3-DEV.
https://huntr.dev/bounties/f457dc62-3cff-47bd-8fd2-1cb2b4a832fc
https://github.com/gpac/gpac/commit/3ec93d73d048ed7b46fe6e9f307cc7a0cc13db63, https://huntr.dev/bounties/f457dc62-3cff-47bd-8fd2-1cb2b4a832fc
CWE-125
gpac/gpac
3ec93d73d048ed7b46fe6e9f307cc7a0cc13db63~1
diff --git a/src/media_tools/mpeg2_ps.c b/src/media_tools/mpeg2_ps.c index 0af7a31f32..b0182f2249 100644 --- a/src/media_tools/mpeg2_ps.c +++ b/src/media_tools/mpeg2_ps.c @@ -266,6 +266,8 @@ int MPEG12_ParseSeqHdr(unsigned char *pbuffer, u32 buflen, s32 *have_mpeg2, u32 u32 scode, ix; s32 found = -1; *have_mpeg2 ...
ASan (inferred)
https://nvd.nist.gov/vuln/detail/CVE-2023-4721
gpac.cve-2022-3178
Buffer Over-read in GitHub repository gpac/gpac prior to 2.1.0-DEV.
https://huntr.dev/bounties/f022fc50-3dfd-450a-ab47-3d75d2bf44c0
https://github.com/gpac/gpac/commit/77510778516803b7f7402d7423c6d6bef50254c3, https://huntr.dev/bounties/f022fc50-3dfd-450a-ab47-3d75d2bf44c0
CWE-125, CWE-126
gpac/gpac
77510778516803b7f7402d7423c6d6bef50254c3~1
diff --git a/src/isomedia/box_code_base.c b/src/isomedia/box_code_base.c index 3cf6b3bd38..b7ee3e356e 100644 --- a/src/isomedia/box_code_base.c +++ b/src/isomedia/box_code_base.c @@ -12886,11 +12886,12 @@ GF_Err xtra_box_read(GF_Box *s, GF_BitStream *bs) prop_type = gf_bs_read_u16(bs); prop_size -= 6; ISOM_...
https://nvd.nist.gov/vuln/detail/CVE-2022-3178
exiv2.cve-2018-19607
Exiv2::isoSpeed in easyaccess.cpp in Exiv2 v0.27-RC2 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted file.
https://github.com/Exiv2/exiv2/issues/561
https://github.com/Exiv2/exiv2/commit/6e42c1b55e0fc4f360cc56010b0ffe19aa6062d9
CWE-476
Exiv2/exiv2
6e42c1b55e0fc4f360cc56010b0ffe19aa6062d9~1
diff --git a/src/easyaccess.cpp b/src/easyaccess.cpp index 1eed30c47e..9302d6cc91 100644 --- a/src/easyaccess.cpp +++ b/src/easyaccess.cpp @@ -154,7 +154,7 @@ namespace Exiv2 { std::ostringstream os; md_st->write(os, &ed); bool ok = false; - long st_val = parseLong(os.s...
https://github.com/Exiv2/exiv2/issues/561
==91500==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x7f186e2da05a bp 0x7fff4e8fe260 sp 0x7fff4e8fd9f0 T0) #0 0x7f186e2da059 (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x47059) #1 0x7f186db38b0c in Exiv2::isoSpeed(Exiv2::ExifData const&) /home/marsman/Desktop/crashana/exiv2/exiv2-3f2e0de/...
=== https://github.com/Exiv2/exiv2/issues/561 === Title: CVE-2018-19607: SEGV in Exiv2::isoSpeed at easyaccess.cpp:178 --- Body: Tested in ubuntu 16.04 64bit, exiv2 (master 3f2e0de && 0.27-RC2) `$ exiv2 $POC` [POC file](https://github.com/Marsman1996/pocs/blob/master/exiv2/CVE-2018-19607/poc9-isoSpeed) gdb inf...
https://nvd.nist.gov/vuln/detail/CVE-2018-19607
gpac.cve-2023-3012
NULL Pointer Dereference in GitHub repository gpac/gpac prior to 2.2.2.
https://huntr.dev/bounties/916b787a-c603-409d-afc6-25bb02070e69
https://github.com/gpac/gpac/commit/53387aa86c1af1228d0fa57c67f9c7330716d5a7, https://huntr.dev/bounties/916b787a-c603-409d-afc6-25bb02070e69
CWE-476
gpac/gpac
53387aa86c1af1228d0fa57c67f9c7330716d5a7~1
diff --git a/src/utils/xml_parser.c b/src/utils/xml_parser.c index 49df338164..11f6f2f5ca 100644 --- a/src/utils/xml_parser.c +++ b/src/utils/xml_parser.c @@ -704,6 +704,8 @@ static void xml_sax_parse_entity(GF_SAXParser *parser) } } if (ent_name) gf_free(ent_name); + if (ent && !ent->value) + parser->sax_state...
https://nvd.nist.gov/vuln/detail/CVE-2023-3012
imagemagick.cve-2019-13309
ImageMagick 7.0.8-50 Q16 has memory leaks at AcquireMagickMemory because of mishandling the NoSuchImage error in CLIListOperatorImages in MagickWand/operation.c.
https://github.com/ImageMagick/ImageMagick/issues/1616
https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d, https://github.com/ImageMagick/ImageMagick/issues/1616, https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51
CWE-401
ImageMagick/ImageMagick
5f21230b657ccd65452dd3d94c5b5401ba691a2d~1
diff --git a/MagickWand/mogrify.c b/MagickWand/mogrify.c index 82b3c0c1c4a..150b6792304 100644 --- a/MagickWand/mogrify.c +++ b/MagickWand/mogrify.c @@ -7908,6 +7908,8 @@ WandExport MagickBooleanType MogrifyImageList(ImageInfo *image_info, &distortion,exception); if (difference_image == (Ima...
https://github.com/ImageMagick/ImageMagick/issues/1616
==22113==ERROR: LeakSanitizer: detected memory leaks Direct leak of 13504 byte(s) in 1 object(s) allocated from: #0 0x4e5397 in __interceptor_malloc (install/bin/magick+0x4e5397) #1 0x7f9c4c438106 in AcquireMagickMemory MagickCore/memory.c:478:10 #2 0x7f9c4c3e5114 in AcquireCriticalMemory ./MagickCore/memo...
=== https://github.com/ImageMagick/ImageMagick/issues/1616 === Title: memory leaks is detected at AcquireMagickMemory --- Body: ### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/...
https://nvd.nist.gov/vuln/detail/CVE-2019-13309
faad2.cve-2018-20196
There is a stack-based buffer overflow in the third instance of the calculate_gain function in libfaad/sbr_hfadj.c in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.8. A crafted input will lead to a denial of service or possibly unspecified other impact because the S_M array is mishandled.
https://github.com/knik0/faad2/issues/19
https://github.com/hlef/faad2/commit/6aeeaa1af0caf986daf22852a97f7c13c5edd879
CWE-787
hlef/faad2
6aeeaa1af0caf986daf22852a97f7c13c5edd879~1
diff --git a/libfaad/sbr_fbt.c b/libfaad/sbr_fbt.c index 5919c7b5..ee770589 100644 --- a/libfaad/sbr_fbt.c +++ b/libfaad/sbr_fbt.c @@ -526,6 +526,8 @@ uint8_t derived_frequency_table(sbr_info *sbr, uint8_t bs_xover_band, } sbr->M = sbr->f_table_res[HI_RES][sbr->N_high] - sbr->f_table_res[HI_RES][0]; + if...
https://github.com/knik0/faad2/issues/19
==7025==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7ffc1ba22024 at pc 0x7ffabd7b4a49 bp 0x7ffc1ba21cd0 sp 0x7ffc1ba21cc0 WRITE of size 4 at 0x7ffc1ba22024 thread T0 #0 0x7ffabd7b4a48 in calculate_gain /root/faad2_asan/libfaad/sbr_hfadj.c:1287 #1 0x7ffabd7b2392 in hf_adjustment /root/faad2_asan/...
=== https://github.com/knik0/faad2/issues/19 === Title: stack-buffer-overflow in function calculate_gain(libfaad/sbr_hfadj.c:1287) --- Body: Hi, i found a stack-buffer-overflow bug in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.8, the details are below(ASAN): ``` ./faad faad_res/013-stack-buffer-overflow-sbr_hf...
https://nvd.nist.gov/vuln/detail/CVE-2018-20196
gpac.cve-2022-2453
Use After Free in GitHub repository gpac/gpac prior to 2.1-DEV.
https://huntr.dev/bounties/c8c964de-046a-41b2-9ff5-e25cfdb36b5a
https://github.com/gpac/gpac/commit/dc7de8d3d604426c7a6e628d90cb9fb88e7b4c2c, https://huntr.dev/bounties/c8c964de-046a-41b2-9ff5-e25cfdb36b5a
CWE-416
gpac/gpac
dc7de8d3d604426c7a6e628d90cb9fb88e7b4c2c~1
diff --git a/src/bifs/field_decode.c b/src/bifs/field_decode.c index 5537da7d3d..65d045b02a 100644 --- a/src/bifs/field_decode.c +++ b/src/bifs/field_decode.c @@ -427,64 +427,71 @@ GF_Err BD_DecMFFieldVec(GF_BifsDecoder * codec, GF_BitStream *bs, GF_Node *node, e = gf_bifs_dec_sf_field(codec, bs, node, &sffield, GF...
https://huntr.dev/bounties/c8c964de-046a-41b2-9ff5-e25cfdb36b5a
https://nvd.nist.gov/vuln/detail/CVE-2022-2453
gpac.cve-2021-40566
A Segmentation fault casued by heap use after free vulnerability exists in Gpac through 1.0.1 via the mpgviddmx_process function in reframe_mpgvid.c when using mp4box, which causes a denial of service.
https://github.com/gpac/gpac/commit/96047e0e6166407c40cc19f4e94fb35cd7624391
CWE-416
gpac/gpac
96047e0e6166407c40cc19f4e94fb35cd7624391~1
diff --git a/src/filters/dec_xvid.c b/src/filters/dec_xvid.c index dff56bf10d..ab86d85b13 100644 --- a/src/filters/dec_xvid.c +++ b/src/filters/dec_xvid.c @@ -181,7 +181,7 @@ static GF_Err xviddec_configure_pid(GF_Filter *filter, GF_FilterPid *pid, Bool i /*decode DSI*/ e = gf_m4v_get_config(p->value.data.ptr, p->v...
https://github.com/gpac/gpac/issues/1887
==9071==ERROR: AddressSanitizer: heap-use-after-free on address 0x62600001b100 at pc 0x7ff1a2599733 bp 0x7ffe1e68b1f0 sp 0x7ffe1e68a998 READ of size 10000 at 0x62600001b100 thread T0 #0 0x7ff1a2599732 (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x79732) #1 0x7ff1a0b32e8e in memcpy /usr/include/x86_64-linux-gnu/...
=== https://github.com/gpac/gpac/issues/1887 === Title: Segmentation fault casued by heap use after free using mp4box in mpgviddmx_process, reframe_mpgvid.c:851 --- Body: - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/do...
https://nvd.nist.gov/vuln/detail/CVE-2021-40566
libredwg.cve-2020-6615
GNU LibreDWG 0.9.3.2564 has an invalid pointer dereference in dwg_dynapi_entity_value in dynapi.c (dynapi.c is generated by gen-dynapi.pl).
https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447223
https://github.com/LibreDWG/libredwg/commit/757b87f2d01127df1fa890f7a6c8608ffe9cd23e
CWE-476
LibreDWG/libredwg
3f515d52954e2ec009a2508d3d5be04e3bcc094b
diff --git a/examples/dwg2svg2.c b/examples/dwg2svg2.c index 60e388887f..8d39e60635 100644 --- a/examples/dwg2svg2.c +++ b/examples/dwg2svg2.c @@ -322,16 +322,12 @@ output_BLOCK_HEADER (dwg_object_ref *ref) return; } hdr = dwg_ref_get_object (ref, &error); - log_if_error ("reference_get_object"); + if ...
https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447223
==4335==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x611000000258 at pc 0x55f9e1e04e05 bp 0x7ffc92f94a40 sp 0x7ffc92f94a30 READ of size 8 at 0x611000000258 thread T0 #0 0x55f9e1e04e04 in read_pages_map ../../src/decode_r2007.c:1007 #1 0x55f9e1e04e04 in read_r2007_meta_data ../../src/decode_r2007.c...
=== https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447223 === Title: Several bugs found by fuzzing --- Body: Hi, After fuzzing libredwg, I found the following bugs on the latest commit on master. Command: ./dwg2svg2 $PoC **1.heap-buffer-overflow in read_pages_map ../../src/decode_r2007.c:1007** P...
https://nvd.nist.gov/vuln/detail/CVE-2020-6615
gpac.cve-2023-46930
GPAC 2.3-DEV-rev605-gfc9e29089-master contains a SEGV in gpac/MP4Box in gf_isom_find_od_id_for_track /afltest/gpac/src/isomedia/media_odf.c:522:14.
https://github.com/gpac/gpac/commit/3809955065afa3da1ad580012ec43deadbb0f2c8
CWE-787
gpac/gpac
3809955065afa3da1ad580012ec43deadbb0f2c8~1
diff --git a/src/isomedia/media_odf.c b/src/isomedia/media_odf.c index 76ecf9d135..5d842028ca 100644 --- a/src/isomedia/media_odf.c +++ b/src/isomedia/media_odf.c @@ -517,6 +517,13 @@ u32 gf_isom_find_od_id_for_track(GF_ISOFile *file, u32 track) i=0; while ( (od_tk = (GF_TrackBox*)gf_list_enum(file->moov->trackLi...
https://github.com/gpac/gpac/issues/2666
AddressSanitizer:DEADLYSIGNAL ================================================================= ==3351432==ERROR: AddressSanitizer: SEGV on unknown address 0x00000000002c (pc 0x7ffff6697edd bp 0x7ffffffe65f0 sp 0x7ffffffe6420 T0) ==3351432==The signal is caused by a READ memory access. ==3351432==Hint: address points t...
=== https://github.com/gpac/gpac/issues/2666 === Title: SEGV in gpac/MP4Box in gf_isom_find_od_id_for_track /afltest/gpac/src/isomedia/media_odf.c:522:14 --- Body: # SEGV in MP4Box ### Description SEGV in gpac/MP4Box. #0 0x7ffff6697edd in gf_isom_find_od_id_for_track /afltest/gpac/src/isomedia/media_odf.c:52...
https://nvd.nist.gov/vuln/detail/CVE-2023-46930
gpac.cve-2023-3291
Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.2.2.
https://huntr.dev/bounties/526954e6-8683-4697-bfa2-886c3204a1d5
https://github.com/gpac/gpac/commit/6a748ccc3f76ff10e3ae43014967ea4b0c088aaf
CWE-122, CWE-787
gpac/gpac
6a748ccc3f76ff10e3ae43014967ea4b0c088aaf~1
diff --git a/src/filters/reframe_mp3.c b/src/filters/reframe_mp3.c index e81dd174a6..6ed5608b86 100644 --- a/src/filters/reframe_mp3.c +++ b/src/filters/reframe_mp3.c @@ -265,7 +265,7 @@ void id3dmx_flush(GF_Filter *filter, u8 *id3_buf, u32 id3_buf_size, GF_FilterPid break; } - if (buf_alloc<=fsize) { + if (...
https://nvd.nist.gov/vuln/detail/CVE-2023-3291
njs.cve-2023-27727
Nginx NJS v0.7.10 was discovered to contain a segmentation violation via the function njs_function_frame at src/njs_function.h.
https://github.com/nginx/njs/issues/617
https://github.com/nginx/njs/commit/484411868bf9351ae7513008f6efd28caa72574f
CWE-125
nginx/njs
484411868bf9351ae7513008f6efd28caa72574f~1
diff --git a/src/njs_object_prop.c b/src/njs_object_prop.c index 6bf1c280c..005c2eac5 100644 --- a/src/njs_object_prop.c +++ b/src/njs_object_prop.c @@ -102,7 +102,11 @@ njs_object_property(njs_vm_t *vm, njs_object_t *object, njs_lvlhsh_query_t *lhq, ret = njs_lvlhsh_find(&object->hash, lhq); if (nj...
https://github.com/nginx/njs/issues/617
==31577==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000030 (pc 0x00000053ee4e bp 0x7ffc9539f0f0 sp 0x7ffc9539f0d0 T0) ==31577==The signal is caused by a READ memory access. ==31577==Hint: address points to the zero page. #0 0x53ee4e in njs_function_frame /root/njs/src/njs_function.h:155:9 #1 0x53e...
=== https://github.com/nginx/njs/issues/617 === Title: SEGV src/njs_function.h:155:9 in njs_function_frame --- Body: Environment ``` commit: 4c1e23326e1c30e4e051bf588bfc1aaa63954976 version: 0.7.10 Build : ./configure --cc=clang --address-sanitizer=YES make ``` Poc ```js const v1 = EvalErr...
https://nvd.nist.gov/vuln/detail/CVE-2023-27727
mruby.cve-2022-0717
Out-of-bounds Read in GitHub repository mruby/mruby prior to 3.2.
https://huntr.dev/bounties/27a851a5-7ebf-409b-854f-b2614771e8f9
https://github.com/mruby/mruby/commit/f72315575f78a9a773adbce0ee7d3ec33434cb76
CWE-125
mruby/mruby
f72315575f78a9a773adbce0ee7d3ec33434cb76~1
diff --git a/mrbgems/mruby-compiler/core/codegen.c b/mrbgems/mruby-compiler/core/codegen.c index 729f575661..37b1307e65 100644 --- a/mrbgems/mruby-compiler/core/codegen.c +++ b/mrbgems/mruby-compiler/core/codegen.c @@ -1904,8 +1904,12 @@ gen_assignment(codegen_scope *s, node *tree, node *rhs, int sp, int val) if...
ASan (inferred)
https://nvd.nist.gov/vuln/detail/CVE-2022-0717
libredwg.cve-2020-6614
GNU LibreDWG 0.9.3.2564 has a heap-based buffer over-read in bfr_read in decode.c.
https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447068
https://github.com/LibreDWG/libredwg/commit/25228ca37c7489bce0255dd0cfc5e1507a6c1eea
CWE-125
LibreDWG/libredwg
3f515d52954e2ec009a2508d3d5be04e3bcc094b
diff --git a/src/decode.c b/src/decode.c index 205056abe1..f62dbed3e7 100644 --- a/src/decode.c +++ b/src/decode.c @@ -2050,7 +2050,7 @@ read_R2004_section_info (Bit_Chain *restrict dat, Dwg_Data *restrict dwg, uint64_t sum_decomp = 0; uint64_t prev_address = 0; - if (ptr + 64 >= decomp_end) + ...
https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447068
=== https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447068 === Title: Several bugs found by fuzzing --- Body: Hi, After fuzzing libredwg, I found the following bugs on the latest commit on master. Command: ./dwg2svg2 $PoC **1.heap-buffer-overflow in read_pages_map ../../src/decode_r2007.c:1007** P...
https://nvd.nist.gov/vuln/detail/CVE-2020-6614
faad2.cve-2018-20195
A NULL pointer dereference was discovered in ic_predict of libfaad/ic_predict.c in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.8. The vulnerability causes a segmentation fault and application crash, which leads to denial of service.
https://github.com/knik0/faad2/issues/25
https://github.com/knik0/faad2/commit/466b01d504d7e45f1e9169ac90b3e34ab94aed14
CWE-476
knik0/faad2
334e7647a5f31903aca33dde39bb8683e9d8cccd
diff --git a/libfaad/syntax.c b/libfaad/syntax.c index f8e808c2..e7fb1138 100644 --- a/libfaad/syntax.c +++ b/libfaad/syntax.c @@ -344,6 +344,12 @@ static void decode_sce_lfe(NeAACDecStruct *hDecoder, can become 2 when some form of Parametric Stereo coding is used */ + if (hDecoder->frame && hDecoder-...
https://github.com/knik0/faad2/issues/25, https://seclists.org/bugtraq/2019/Sep/28
==7073==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x7f440069b99e bp 0x7ffe0d2d4b70 sp 0x7ffe0d2d49f0 T0) #0 0x7f440069b99d in ic_predict /root/faad2_asan/libfaad/ic_predict.c:96 #1 0x7f440069cbc0 in ic_prediction /root/faad2_asan/libfaad/ic_predict.c:252 #2 0x7f44006d0a14 in recons...
=== https://github.com/knik0/faad2/issues/25 === Title: Null pointer dereference vulnerability in ic_predict (libfaad/ic_predict.c:96) --- Body: Hi, i found a null pointer dereference bug in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.8. It crashed in function ic_predict .the details are below(ASAN): ``` ./faad...
https://nvd.nist.gov/vuln/detail/CVE-2018-20195
gpac.cve-2024-0322
Out-of-bounds Read in GitHub repository gpac/gpac prior to 2.3-DEV.
https://huntr.com/bounties/87611fc9-ed7c-43e9-8e52-d83cd270bbec
https://github.com/gpac/gpac/commit/092904b80edbc4dce315684a59cc3184c45c1b70
CWE-125
gpac/gpac
092904b80edbc4dce315684a59cc3184c45c1b70~1
diff --git a/src/filters/reframe_ac3.c b/src/filters/reframe_ac3.c index 7b6452ed76..a73455978d 100644 --- a/src/filters/reframe_ac3.c +++ b/src/filters/reframe_ac3.c @@ -480,12 +480,11 @@ GF_Err ac3dmx_process(GF_Filter *filter) cts = GF_FILTER_NO_TS; } - if (!ctx->in_seek && remain >= ctx->hdr.framesize) { ...
ASan (inferred)
https://nvd.nist.gov/vuln/detail/CVE-2024-0322
njs.cve-2023-27728
Nginx NJS v0.7.10 was discovered to contain a segmentation violation via the function njs_dump_is_recursive at src/njs_vmcode.c.
https://github.com/nginx/njs/issues/618
https://github.com/nginx/njs/commit/1f54b79cabd1d112624ebba4d0a5f07cb3f70e95
CWE-125
nginx/njs
1f54b79cabd1d112624ebba4d0a5f07cb3f70e95~1
diff --git a/src/njs_json.c b/src/njs_json.c index 6e53286cc..6a37f76de 100644 --- a/src/njs_json.c +++ b/src/njs_json.c @@ -2085,32 +2085,30 @@ njs_vm_value_dump(njs_vm_t *vm, njs_str_t *retval, njs_value_t *value, val = njs_prop_value(prop); - if (!state->fast_array) { - if (prop->type ...
https://github.com/nginx/njs/issues/618
==31165==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000022 (pc 0x00000053426f bp 0x7ffef5d7b170 sp 0x7ffef5d7a3e0 T0) ==31165==The signal is caused by a READ memory access. ==31165==Hint: address points to the zero page. #0 0x53426f in njs_dump_is_recursive /root/njs/src/njs_json.c #1 0x53426f in ...
=== https://github.com/nginx/njs/issues/618 === Title: SEGV src/njs_json.c in njs_dump_is_recursive --- Body: Environment ``` commit: 4c1e23326e1c30e4e051bf588bfc1aaa63954976 version: 0.7.10 Build : ./configure --cc=clang --address-sanitizer=YES make ``` Poc ```js Object.defineProperty([],...
https://nvd.nist.gov/vuln/detail/CVE-2023-27728
openjpeg.cve-2016-7445
convert.c in OpenJPEG before 2.1.2 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via vectors involving the variable s.
http://www.openwall.com/lists/oss-security/2016/09/18/4
https://github.com/uclouvain/openjpeg/commit/fac916f72a162483a4d6d804fd070fdf32f402ed
CWE-476
uclouvain/openjpeg
53f25200ed696cf5dc71d5fe12faad2570861b20
diff --git a/src/bin/jp2/convert.c b/src/bin/jp2/convert.c index c130b3bfb..deee4f6e0 100644 --- a/src/bin/jp2/convert.c +++ b/src/bin/jp2/convert.c @@ -1328,11 +1328,14 @@ struct pnm_header static char *skip_white(char *s) { - while(*s) + if (s != NULL) { - if(*s == '\n' || *s == '\r') return NUL...
https://github.com/uclouvain/openjpeg/issues/843
==7358==ERROR: AddressSanitizer: SEGV on unknown address 0x00000000 (pc 0x0815d204 bp 0xff846938 sp 0xff846380 T0) #0 0x815d203 in skip_white /home/starlab/fuzzing/openjpeg/src/bin/jp2/convert.c:1331 #1 0x8135d81 in main /home/starlab/fuzzing/openjpeg/src/bin/jp2/opj_compress.c:1723 #2 0xf7343636 in __libc_...
=== https://github.com/uclouvain/openjpeg/issues/843 === Title: null ptr dereference in convert.c:1331 --- Body: # Vulnerability openjpeg null ptr dereference in convert.c:1331 # Version git head version ( https://github.com/uclouvain/openjpeg/ ) # Address Sanitizer Output # ASAN:SIGSEGV ==7358==ERROR: AddressSan...
https://nvd.nist.gov/vuln/detail/CVE-2016-7445
faad2.cve-2021-32272
An issue was discovered in faad2 before 2.10.0. A heap-buffer-overflow exists in the function stszin located in mp4read.c. It allows an attacker to cause Code Execution.
https://github.com/knik0/faad2/issues/57
https://github.com/knik0/faad2/commit/1b71a6ba963d131375f5e489b3b25e36f19f3f24
CWE-787
knik0/faad2
1b71a6ba963d131375f5e489b3b25e36f19f3f24~1
diff --git a/frontend/mp4read.c b/frontend/mp4read.c index 14146843..6a618d33 100644 --- a/frontend/mp4read.c +++ b/frontend/mp4read.c @@ -344,7 +344,10 @@ static int stszin(int size) u32in(); // Number of entries mp4config.frame.ents = u32in(); - // fixme: check atom size + + if (!(mp4config.frame...
https://github.com/knik0/faad2/issues/57
*********** Ahead Software MPEG-4 AAC Decoder V2.9.2 ****************** Build: Aug 30 2020 Copyright 2002-2004: Ahead Software AG http://www.audiocoding.com bug tracking: https://sourceforge.net/p/faac/bugs/ Floating point version This program is free software; you can redistribute it and/or modify it under th...
ASan (inferred)
=== https://github.com/knik0/faad2/issues/57 === Title: A heap-buffer-overflow in mp4read.c:355:29 --- Body: ## System info Ubuntu x86_64, clang 6.0, faad (latest master [1073ae](https://github.com/knik0/faad2/commit/1073aeef823cafd844704389e9a497c257768e2f)) ## Configure CFLAGS="-g -fsanitize=address" LDFLA...
https://nvd.nist.gov/vuln/detail/CVE-2021-32272
njs.cve-2022-31306
Nginx NJS v0.7.2 was discovered to contain a segmentation violation in the function njs_array_convert_to_slow_array at src/njs_array.c.
https://github.com/nginx/njs/issues/481
https://github.com/nginx/njs/commit/81af26364c21c196dd21fb5e14c7fa9ce7debd17
CWE-416
nginx/njs
81af26364c21c196dd21fb5e14c7fa9ce7debd17~1
diff --git a/src/njs_array.c b/src/njs_array.c index ec3a5da93..2367420dc 100644 --- a/src/njs_array.c +++ b/src/njs_array.c @@ -142,6 +142,10 @@ njs_array_convert_to_slow_array(njs_vm_t *vm, njs_array_t *array) njs_value_t index, value; njs_object_prop_t *prop; + if (njs_slow_path(!array->object...
https://github.com/nginx/njs/issues/481
AddressSanitizer:DEADLYSIGNAL ================================================================= ==732125==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x00000051dc3a bp 0x7ffde9d83b90 sp 0x7ffde9d83a80 T0) ==732125==The signal is caused by a READ memory access. ==732125==Hint: address points to t...
=== https://github.com/nginx/njs/issues/481 === Title: SEGV njs_array.c:151:13 in njs_array_convert_to_slow_array --- Body: ### Environment ``` OS : Linux ubuntu 5.13.0-27-generic #29~20.04.1-Ubuntu SMP Fri Jan 14 00:32:30 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux Commit : f65981b0b8fcf02d69a40bc934803c25c9f...
https://nvd.nist.gov/vuln/detail/CVE-2022-31306
gpac.cve-2023-0770
Stack-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.2.
https://huntr.dev/bounties/e0fdeee5-7909-446e-9bd0-db80fd80e8dd
https://github.com/gpac/gpac/commit/c31941822ee275a35bc148382bafef1c53ec1c26, https://huntr.dev/bounties/e0fdeee5-7909-446e-9bd0-db80fd80e8dd
CWE-121, CWE-787
gpac/gpac
c31941822ee275a35bc148382bafef1c53ec1c26~1
diff --git a/src/scenegraph/vrml_proto.c b/src/scenegraph/vrml_proto.c index df30ed0dfa..02b92b5769 100644 --- a/src/scenegraph/vrml_proto.c +++ b/src/scenegraph/vrml_proto.c @@ -1292,7 +1292,10 @@ Bool gf_sg_proto_field_is_sftime_offset(GF_Node *node, GF_FieldInfo *field) gf_node_get_field(r->ToNode, r->ToField.f...
https://huntr.dev/bounties/e0fdeee5-7909-446e-9bd0-db80fd80e8dd
https://nvd.nist.gov/vuln/detail/CVE-2023-0770
faad2.cve-2018-20361
An invalid memory address dereference was discovered in the hf_assembly function of libfaad/sbr_hfadj.c in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.8. The vulnerability causes a segmentation fault and application crash, which leads to denial of service.
https://github.com/knik0/faad2/issues/30
https://github.com/knik0/faad2/commit/6b4a7cde30f2e2cb03e78ef476cc73179cfffda3
CWE-119
knik0/faad2
6b4a7cde30f2e2cb03e78ef476cc73179cfffda3~1
diff --git a/libfaad/sbr_hfadj.c b/libfaad/sbr_hfadj.c index 3f310b81..dda1ce8e 100644 --- a/libfaad/sbr_hfadj.c +++ b/libfaad/sbr_hfadj.c @@ -485,6 +485,12 @@ static void calculate_gain(sbr_info *sbr, sbr_hfadj_info *adj, uint8_t ch) ml1 = sbr->f_table_lim[sbr->bs_limiter_bands][k]; ml2 = sbr...
https://github.com/knik0/faad2/issues/30, https://seclists.org/bugtraq/2019/Sep/28
==7089==ERROR: AddressSanitizer: SEGV on unknown address 0x0000000030da (pc 0x7f2a44f66a79 bp 0x7ffc06965b70 sp 0x7ffc06965ab0 T0) #0 0x7f2a44f66a78 in hf_assembly /root/faad2_asan/libfaad/sbr_hfadj.c:1536 #1 0x7f2a44f633b6 in hf_adjustment /root/faad2_asan/libfaad/sbr_hfadj.c:90 #2 0x7f2a44f81725 in sbr_pr...
=== https://github.com/knik0/faad2/issues/30 === Title: Invalid memory address dereference in hf_assembly (in libfaad/sbr_hfadj.c:1536) --- Body: Hi, i found a issue in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.8. It crashed in function hf_assembly .the details are below(ASAN): ``` ./faad faad_res/009-invalid...
https://nvd.nist.gov/vuln/detail/CVE-2018-20361
wabt.cve-2022-43282
wasm-interp v1.0.29 was discovered to contain an out-of-bounds read via the component OnReturnCallIndirectExpr->GetReturnCallDropKeepCount.
https://github.com/WebAssembly/wabt/issues/1983
https://github.com/matthias-blume/wabt/commit/fd730433e05de72fae064f9f404e1bc922285971
CWE-125
matthias-blume/wabt
fd730433e05de72fae064f9f404e1bc922285971~1
diff --git a/src/decompiler-ast.h b/src/decompiler-ast.h index 584a837301..e5dd358e9c 100644 --- a/src/decompiler-ast.h +++ b/src/decompiler-ast.h @@ -226,6 +226,11 @@ struct AST { mc.GetLabel(cast<BrIfExpr>(&e)->var)->label_type; return; } + case ExprType::BrTable: { + InsertNo...
https://github.com/WebAssembly/wabt/issues/1983
/wabt/out/clang/Debug/asan/wasm-interp --enable-all ./poc-interp-3.wasm AddressSanitizer:DEADLYSIGNAL ================================================================= ==1491197==ERROR: AddressSanitizer: SEGV on unknown address 0x60600008bb58 (pc 0x000000509b3e bp 0x7ffe9a810b70 sp 0x7ffe9a810b40 T0) ==1491197==The si...
ASan (inferred)
=== https://github.com/WebAssembly/wabt/issues/1983 === Title: Out-of-bound read in OnReturnCallIndirectExpr->GetReturnCallDropKeepCount --- Body: ### Environment ``` OS : Linux ubuntu 5.15.0-46-generic #49~20.04.1-Ubuntu SMP Thu Aug 4 19:15:44 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux Commit : 3054d61f703d609...
https://nvd.nist.gov/vuln/detail/CVE-2022-43282
faad2.cve-2018-20357
A NULL pointer dereference was discovered in sbr_process_channel of libfaad/sbr_dec.c in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.8. The vulnerability causes a segmentation fault and application crash.
https://github.com/knik0/faad2/issues/28
https://github.com/knik0/faad2/commit/6b4a7cde30f2e2cb03e78ef476cc73179cfffda3
CWE-476
knik0/faad2
6b4a7cde30f2e2cb03e78ef476cc73179cfffda3~1
diff --git a/libfaad/sbr_hfadj.c b/libfaad/sbr_hfadj.c index 3f310b81..dda1ce8e 100644 --- a/libfaad/sbr_hfadj.c +++ b/libfaad/sbr_hfadj.c @@ -485,6 +485,12 @@ static void calculate_gain(sbr_info *sbr, sbr_hfadj_info *adj, uint8_t ch) ml1 = sbr->f_table_lim[sbr->bs_limiter_bands][k]; ml2 = sbr...
https://github.com/knik0/faad2/issues/28, https://seclists.org/bugtraq/2019/Sep/28
ASAN:SIGSEGVfaad_res/014-null-point-sbr_dec_413. ================================================================= ==7082==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x7f1bfe18af07 bp 0x7ffcee38c300 sp 0x7ffcee38c2c0 T0) #0 0x7f1bfe18af06 in sbr_process_channel /root/faad2_asan/libfaad/sbr_...
=== https://github.com/knik0/faad2/issues/28 === Title: Null pointer dereference vulnerability in sbr_process_channel(libfaad/sbr_dec.c:413) --- Body: Hi, i found a null pointer dereference bug in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.8. It crashed in function sbr_process_channel.the details are below(ASAN): ...
https://nvd.nist.gov/vuln/detail/CVE-2018-20357
gpac.cve-2023-0866
Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.3.0-DEV.
https://huntr.dev/bounties/7d3c5792-d20b-4cb6-9c6d-bb14f3430d7f
https://github.com/gpac/gpac/commit/b964fe4226f1424cf676d5822ef898b6b01f5937, https://huntr.dev/bounties/7d3c5792-d20b-4cb6-9c6d-bb14f3430d7f
CWE-122
gpac/gpac
b964fe4226f1424cf676d5822ef898b6b01f5937~1
diff --git a/src/filters/reframe_adts.c b/src/filters/reframe_adts.c index 80c98e522e..818273e58e 100644 --- a/src/filters/reframe_adts.c +++ b/src/filters/reframe_adts.c @@ -300,7 +300,7 @@ static void adts_dmx_check_dur(GF_Filter *filter, GF_ADTSDmxCtx *ctx) } } } - + p = gf_filter_pid_get_property(ctx->i...
https://nvd.nist.gov/vuln/detail/CVE-2023-0866
libredwg.cve-2022-45332
LibreDWG v0.12.4.4643 was discovered to contain a heap buffer overflow via the function decode_preR13_section_hdr at decode_r11.c.
https://github.com/LibreDWG/libredwg/issues/524
https://github.com/LibreDWG/libredwg/commit/84d938b1d28d514eead8fdc21e7eec4fdfe053f5
CWE-787
LibreDWG/libredwg
84d938b1d28d514eead8fdc21e7eec4fdfe053f5~1
diff --git a/src/decode_r11.c b/src/decode_r11.c index 7db9052ce0..6d14edc7bd 100644 --- a/src/decode_r11.c +++ b/src/decode_r11.c @@ -263,8 +263,8 @@ decode_preR13_section (Dwg_Section_Type_r11 id, Bit_Chain *restrict dat, Dwg_Object_##token *_obj; \ Dwg_Object *...
https://github.com/LibreDWG/libredwg/issues/524
==4080011==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x618000000428 at pc 0x000000480860 bp 0x7ffddb1de850 sp 0x7ffddb1de008 WRITE of size 63 at 0x618000000428 thread T0 #0 0x48085f in strncpy /home/brian/src/final/llvm-project/compiler-rt/lib/asan/asan_interceptors.cpp:483:5 #1 0x1123350 in deco...
=== https://github.com/LibreDWG/libredwg/issues/524 === Title: heap-buffer-overflow exists in the function decode_preR13_section_hdr in decode_r11.c --- Body: **System info** Ubuntu x86_64, clang 10.0 version: 0.12.4.4643, last commit [93c2512](https://github.com/LibreDWG/libredwg/commit/93c25124c191987af168ace9fe4...
https://nvd.nist.gov/vuln/detail/CVE-2022-45332
gpac.cve-2023-0358
Use After Free in GitHub repository gpac/gpac prior to 2.3.0-DEV.
https://huntr.dev/bounties/93e128ed-253f-4c42-81ff-fbac7fd8f355
https://github.com/gpac/gpac/commit/9971fb125cf91cefd081a080c417b90bbe4a467b, https://huntr.dev/bounties/93e128ed-253f-4c42-81ff-fbac7fd8f355
CWE-416
gpac/gpac
9971fb125cf91cefd081a080c417b90bbe4a467b~1
diff --git a/src/odf/descriptors.c b/src/odf/descriptors.c index 0d42ff2df2..913d8e27af 100644 --- a/src/odf/descriptors.c +++ b/src/odf/descriptors.c @@ -1395,12 +1395,12 @@ GF_VVCConfig *gf_odf_vvc_cfg_read_bs(GF_BitStream *bs) gf_list_add(cfg->param_array, ar); break; default: - GF_LOG(GF_LOG_WARNING, G...
https://nvd.nist.gov/vuln/detail/CVE-2023-0358
mruby.cve-2022-0623
Out-of-bounds Read in Homebrew mruby prior to 3.2.
https://huntr.dev/bounties/5b908ac7-d8f1-4fcd-9355-85df565f7580
https://github.com/mruby/mruby/commit/ff3a5ebed6ffbe3e70481531cfb969b497aa73ad, https://huntr.dev/bounties/5b908ac7-d8f1-4fcd-9355-85df565f7580
CWE-125
mruby/mruby
ff3a5ebed6ffbe3e70481531cfb969b497aa73ad~1
diff --git a/src/vm.c b/src/vm.c index 6133cbccac..9cb50847f2 100644 --- a/src/vm.c +++ b/src/vm.c @@ -2766,7 +2766,7 @@ mrb_vm_exec(mrb_state *mrb, const struct RProc *proc, const mrb_code *pc) int lim = a+b*2+1; hash = regs[a]; - mrb_assert(mrb_hash_p(hash)); + mrb_ensure_hash_type(mrb, hash...
ASan (inferred)
https://nvd.nist.gov/vuln/detail/CVE-2022-0623
imagemagick.cve-2018-5248
In ImageMagick 7.0.7-17 Q16, there is a heap-based buffer over-read in coders/sixel.c in the ReadSIXELImage function, related to the sixel_decode function.
https://github.com/ImageMagick/ImageMagick/issues/927
https://github.com/ImageMagick/ImageMagick/commit/0272305f91763b5ce119a2c7a0e0084d8241a58d
CWE-125
ImageMagick/ImageMagick
c9d4c4ecd1f7fb5168e512a0ba183b4bf8b47ce3
diff --git a/coders/sixel.c b/coders/sixel.c index ee146fb1e2f..c54074ae2fd 100644 --- a/coders/sixel.c +++ b/coders/sixel.c @@ -999,7 +999,7 @@ static Image *ReadSIXELImage(const ImageInfo *image_info,ExceptionInfo *exceptio Read SIXEL file. */ length=MagickPathExtent; - sixel_buffer=(char *) AcquireQuantu...
https://github.com/ImageMagick/ImageMagick/issues/927
==108451==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x621000007500 at pc 0x7fcb10a33585 bp 0x7ffde25a2fd0 sp 0x7ffde25a2fc8 READ of size 1 at 0x621000007500 thread T0 #0 0x7fcb10a33584 in sixel_decode /home/ubuntu/ImageMagick/coders/sixel.c:289:12 #1 0x7fcb10a3455e in ReadSIXELImage /home/ubuntu/...
=== https://github.com/ImageMagick/ImageMagick/issues/927 === Title: heap-buffer-overflow in sixel_decode --- Body: ubuntu@ubuntu:~/fuzz_py$ magick -version Version: ImageMagick 7.0.7-17 Q16 x86_64 2017-12-26 http://www.imagemagick.org Copyright: © 1999-2018 ImageMagick Studio LLC License: http://www.imagemagick.o...
https://nvd.nist.gov/vuln/detail/CVE-2018-5248
openjpeg.cve-2024-56827
A flaw was found in the OpenJPEG project. A heap buffer overflow condition may be triggered when certain options are specified while using the opj_decompress utility. This can lead to an application crash or other undefined behavior.
CWE-122
uclouvain/openjpeg
https://bugzilla.redhat.com/show_bug.cgi?id=2335174, https://github.com/uclouvain/openjpeg/issues/1564
================================================================= ==4004218==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6030000016a8 at pc 0x7f8a2d0491f6 bp 0x7fff212eadd0 sp 0x7fff212eadc8 WRITE of size 8 at 0x6030000016a8 thread T0 #0 0x7f8a2d0491f5 in opj_j2k_add_tlmarker /openjpeg/src/lib/openjp...
=== https://github.com/uclouvain/openjpeg/issues/1564 === Title: heap-buffer-overflow at lib/openjp2/j2k.c:8460:84 in opj_j2k_add_tlmarker in openjpeg/opj_decompress --- Body: ### Description Dear developers, We found the following heap buffer overflow bug on openjpeg, please confirm. This bug is triggered ...
https://nvd.nist.gov/vuln/detail/CVE-2024-56827
mruby.cve-2018-11743
The init_copy function in kernel.c in mruby 1.4.1 makes initialize_copy calls for TT_ICLASS objects, which allows attackers to cause a denial of service (mrb_hash_keys uninitialized pointer and application crash) or possibly have unspecified other impact.
https://github.com/mruby/mruby/issues/4027
https://github.com/mruby/mruby/commit/b64ce17852b180dfeea81cf458660be41a78974d, https://github.com/mruby/mruby/issues/4027
CWE-824
mruby/mruby
b64ce17852b180dfeea81cf458660be41a78974d~1
diff --git a/src/kernel.c b/src/kernel.c index 8551b50eab..2a50d31263 100644 --- a/src/kernel.c +++ b/src/kernel.c @@ -279,6 +279,9 @@ static void init_copy(mrb_state *mrb, mrb_value dest, mrb_value obj) { switch (mrb_type(obj)) { + case MRB_TT_ICLASS: + copy_class(mrb, dest, obj); + return; case...
https://github.com/mruby/mruby/issues/4027
ASAN:DEADLYSIGNAL ================================================================= ==37239==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x000106e6eca0 bp 0x7ffee9eb6080 sp 0x7ffee9eb6080 T0) ==37239==The signal is caused by a READ memory access. ==37239==Hint: address points to the zero page. ...
=== https://github.com/mruby/mruby/issues/4027 === Title: Use of uninitialized pointer in mrb_hash_keys --- Body: The following input demonstrates a crash: ```ruby (Hash::prepend Enumerable).dup() ``` ASAN report: ``` ASAN:DEADLYSIGNAL ================================================================= ==37239=...
https://nvd.nist.gov/vuln/detail/CVE-2018-11743
mruby.cve-2018-10199
In versions of mruby up to and including 1.4.0, a use-after-free vulnerability exists in src/io.c::File#initilialize_copy(). An attacker that can cause Ruby code to be run can possibly use this to execute arbitrary code.
https://github.com/mruby/mruby/commit/b51b21fc63c9805862322551387d9036f2b63433
CWE-416
mruby/mruby
b51b21fc63c9805862322551387d9036f2b63433~1
diff --git a/mrbgems/mruby-io/src/io.c b/mrbgems/mruby-io/src/io.c index 58bcdd1ee1..6ace9e1673 100644 --- a/mrbgems/mruby-io/src/io.c +++ b/mrbgems/mruby-io/src/io.c @@ -561,13 +561,13 @@ mrb_io_initialize_copy(mrb_state *mrb, mrb_value copy) mrb_bool failed = TRUE; mrb_get_args(mrb, "o", &orig); + fptr_orig ...
https://github.com/mruby/mruby/issues/4001
==9006==ERROR: AddressSanitizer: heap-use-after-free on address 0x602000019890 at pc 0x0000006ed5ce bp 0x7ffd43f26b10 sp 0x7ffd43f26b08 READ of size 4 at 0x602000019890 thread T0 #0 0x6ed5cd in fptr_finalize /home/me/grammarfuzz/mruby/mrbgems/mruby-io/src/io.c:650 SUMMARY: AddressSanitizer: heap-use-after-free /ho...
ASan (inferred)
=== https://github.com/mruby/mruby/issues/4001 === Title: Use after free in File#initilialize_copy --- Body: The following was reported by https://hackerone.com/pnoltof: ----- Root Cause: ========== calling `File#initilialize_copy` with an invalid argument, causes the function to terminate early, leaving a ...
https://nvd.nist.gov/vuln/detail/CVE-2018-10199
gpac.cve-2023-4679
A use after free vulnerability exists in GPAC version 2.3-DEV-revrelease, specifically in the gf_filterpacket_del function in filter_core/filter.c at line 38. This vulnerability can lead to a double-free condition, which may cause the application to crash.
https://huntr.com/bounties/6f721ee7-8785-4c26-801e-f40fed3faaac
https://github.com/gpac/gpac/commit/b68b3f0bf5c366e003221d78fd663a1d5514a876
CWE-416
gpac/gpac
b68b3f0bf5c366e003221d78fd663a1d5514a876~1
diff --git a/src/filters/isoffin_read_ch.c b/src/filters/isoffin_read_ch.c index 257f5c603a..bd96400689 100644 --- a/src/filters/isoffin_read_ch.c +++ b/src/filters/isoffin_read_ch.c @@ -495,6 +495,7 @@ void isor_reader_get_sample(ISOMChannel *ch) if (ch->pck) { gf_filter_pck_discard(ch->pck); ch->pck ...
ASan (inferred)
https://nvd.nist.gov/vuln/detail/CVE-2023-4679
faad2.cve-2018-20362
A NULL pointer dereference was discovered in ifilter_bank of libfaad/filtbank.c in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.8. The vulnerability causes a segmentation fault and application crash because adding to windowed output is mishandled in the EIGHT_SHORT_SEQUENCE case.
https://github.com/knik0/faad2/issues/26
https://github.com/knik0/faad2/pull/33/changes/466b01d504d7e45f1e9169ac90b3e34ab94aed14
CWE-476
knik0/faad2
5d380279cb00ea7a8b24f647f3790a1fc5342731
diff --git a/libfaad/sbr_hfadj.c b/libfaad/sbr_hfadj.c index 3f310b81..dda1ce8e 100644 --- a/libfaad/sbr_hfadj.c +++ b/libfaad/sbr_hfadj.c @@ -485,6 +485,12 @@ static void calculate_gain(sbr_info *sbr, sbr_hfadj_info *adj, uint8_t ch) ml1 = sbr->f_table_lim[sbr->bs_limiter_bands][k]; ml2 = sbr...
https://github.com/knik0/faad2/issues/26, https://seclists.org/bugtraq/2019/Sep/28
ASAN:SIGSEGV faad_res/008-null-point-filtbank_275. ================================================================= ==7076==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x7f5946ec66b1 bp 0x7fff7f757780 sp 0x7fff7f755690 T0) #0 0x7f5946ec66b0 in ifilter_bank /root/faad2_asan/libfaad/filtbank....
=== https://github.com/knik0/faad2/issues/26 === Title: Null pointer dereference vulnerability in ifilter_bank (libfaad/filtbank.c:275) --- Body: Hi, i found a null pointer dereference bug in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.8. It crashed in function ifilter_bank.the details are below(ASAN): ``` ./fa...
https://nvd.nist.gov/vuln/detail/CVE-2018-20362
gpac.cve-2023-4682
Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.3-DEV.
https://huntr.dev/bounties/15232a74-e3b8-43f0-ae8a-4e89d56c474c
https://github.com/gpac/gpac/commit/b1042c3eefca87c4bc32afb404ed6518d693e5be, https://huntr.dev/bounties/15232a74-e3b8-43f0-ae8a-4e89d56c474c
CWE-122
gpac/gpac
b1042c3eefca87c4bc32afb404ed6518d693e5be~1
diff --git a/src/media_tools/avilib.c b/src/media_tools/avilib.c index 459ff80438..27cd81133d 100644 --- a/src/media_tools/avilib.c +++ b/src/media_tools/avilib.c @@ -2941,6 +2941,7 @@ int AVI_read_frame(avi_t *AVI, u8 *vidbuf, int *keyframe) } gf_fseek(AVI->fdes, AVI->video_index[AVI->video_pos].pos, SEEK_SET); ...
https://nvd.nist.gov/vuln/detail/CVE-2023-4682
gpac.cve-2023-48014
GPAC v2.3-DEV-rev566-g50c2ab06f-master was discovered to contain a stack overflow via the hevc_parse_vps_extension function at /media_tools/av_parsers.c.
https://github.com/gpac/gpac/issues/2613
https://github.com/gpac/gpac/commit/66abf0887c89c29a484d9e65e70882794e9e3a1b
CWE-787
gpac/gpac
66abf0887c89c29a484d9e65e70882794e9e3a1b~1
diff --git a/src/media_tools/av_parsers.c b/src/media_tools/av_parsers.c index 8a37040cf6..6e2915d40d 100644 --- a/src/media_tools/av_parsers.c +++ b/src/media_tools/av_parsers.c @@ -7726,13 +7726,19 @@ static Bool hevc_parse_vps_extension(HEVC_VPS *vps, GF_BitStream *bs) } if (splitting_flag) { - for (i = 0;...
https://github.com/gpac/gpac/issues/2613
==833362==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7ffdcf3828d0 at pc 0x7f6e8e6ab0c1 bp 0x7ffdcf382870 sp 0x7ffdcf382868 WRITE of size 1 at 0x7ffdcf3828d0 thread T0 #0 0x7f6e8e6ab0c0 in hevc_parse_vps_extension /home/user/fuzzing_gpac/gpac/src/media_tools/av_parsers.c:7735:42 #1 0x7f6e8e66492...
=== https://github.com/gpac/gpac/issues/2613 === Title: stack-buffer-overflow in /gpac/src/media_tools/av_parsers.c:7735:42 in hevc_parse_vps_extension --- Body: # Version ``` $ ./MP4Box -version MP4Box - GPAC version 2.3-DEV-rev566-g50c2ab06f-master ``` # Platform ``` $ uname -a Linux user-GE40-2PC-Dragon-...
https://nvd.nist.gov/vuln/detail/CVE-2023-48014
libdwarf.cve-2022-32200
libdwarf 0.4.0 has a heap-based buffer over-read in _dwarf_check_string_valid in dwarf_util.c.
https://github.com/davea42/libdwarf-code/issues/116
https://github.com/davea42/libdwarf-code/commit/8151575a6ace77d005ca5bb5d71c1bfdba3f7069
CWE-125
davea42/libdwarf-code
8151575a6ace77d005ca5bb5d71c1bfdba3f7069~1
diff --git a/src/lib/libdwarf/dwarf_global.c b/src/lib/libdwarf/dwarf_global.c index 03ee0cd22..6cfe883f5 100644 --- a/src/lib/libdwarf/dwarf_global.c +++ b/src/lib/libdwarf/dwarf_global.c @@ -31,7 +31,6 @@ #include <config.h> #include <string.h> /* strlen() */ - #if defined(_WIN32) && defined(HAVE_STDAFX_H) #inc...
https://github.com/davea42/libdwarf-code/issues/116, https://www.prevanders.net/dwarfbug.html
================================================================= ==1464907==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6060000015bb at pc 0x00000083fa88 bp 0x7fff18213420 sp 0x7fff18213418 READ of size 1 at 0x6060000015bb thread T0 #0 0x83fa87 in _dwarf_check_string_valid /home/casper/targets/struc...
=== https://github.com/davea42/libdwarf-code/issues/116 === Title: heap overflow in _dwarf_check_string_valid in dwarf_util.c --- Body: There is a heap overflow in _dwarf_check_string_valid in dwarf_util.c. Depending on the usage of this library, this may cause code execution or deny of service. reproduce steps: ...
https://nvd.nist.gov/vuln/detail/CVE-2022-32200
libsndfile.cve-2018-19432
An issue was discovered in libsndfile 1.0.28. There is a NULL pointer dereference in the function sf_write_int in sndfile.c, which will lead to a denial of service.
https://github.com/erikd/libsndfile/issues/427
https://github.com/libsndfile/libsndfile/commit/aaea680337267bfb6d2544da878890ee7f1c5077
CWE-476
libsndfile/libsndfile
aaea680337267bfb6d2544da878890ee7f1c5077~1
diff --git a/programs/sndfile-deinterleave.c b/programs/sndfile-deinterleave.c index 536603107..225b4d541 100644 --- a/programs/sndfile-deinterleave.c +++ b/programs/sndfile-deinterleave.c @@ -89,6 +89,13 @@ main (int argc, char **argv) exit (1) ; } ; + if (sfinfo.channels > MAX_CHANNELS) + { printf ("\nError :...
https://github.com/erikd/libsndfile/issues/427
AddressSanitizer:DEADLYSIGNAL ================================================================= ==49998==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x7fb21f1413c6 bp 0x7ffe8d3042c0 sp 0x7ffe8d27ba80 T0) ==49998==The signal is caused by a READ memory access. ==49998==Hint: address points to the ...
=== https://github.com/erikd/libsndfile/issues/427 === Title: out of bounds read in sf_write_int --- Body: ## version libsndfile: Version released 1.0.28 ## description An issue was discovered in libsndfile 1.0.28. There is an out of bounds read at function sf_write_int, will lead to a denial of service or the ...
https://nvd.nist.gov/vuln/detail/CVE-2018-19432
faad2.cve-2018-20358
An invalid memory address dereference was discovered in the lt_prediction function of libfaad/lt_predict.c in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.8. The vulnerability causes a segmentation fault and application crash, which leads to denial of service.
https://github.com/knik0/faad2/issues/31
CWE-119
knik0/faad2
https://github.com/knik0/faad2/issues/31, https://seclists.org/bugtraq/2019/Sep/28
ASAN:SIGSEGV faad_res/010-invalid-def-lt_predict_108. ================================================================= ==7092==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000fd0 (pc 0x7f09d10c9532 bp 0x7ffea06b0460 sp 0x7ffea06ac370 T0) #0 0x7f09d10c9531 in lt_prediction /root/faad2_asan/libfaad/lt_pr...
=== https://github.com/knik0/faad2/issues/31 === Title: Invalid memory address dereference in lt_prediction(in libfaad/lt_predict.c:108) --- Body: Hi, i found a issue in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.8. It crashed in function lt_prediction .the details are below(ASAN): ``` ./faad faad_res/010-inva...
https://nvd.nist.gov/vuln/detail/CVE-2018-20358
faad2.cve-2018-20359
An invalid memory address dereference was discovered in the sbrDecodeSingleFramePS function of libfaad/sbr_dec.c in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.8. The vulnerability causes a segmentation fault and application crash, which leads to denial of service.
https://github.com/knik0/faad2/issues/29
CWE-119
knik0/faad2
https://github.com/knik0/faad2/issues/29, https://seclists.org/bugtraq/2019/Sep/28
ASAN:SIGSEGVfaad_res/007-invalid-def-sbr_hfadj_601. ================================================================= ==7085==ERROR: AddressSanitizer: SEGV on unknown address 0x0000f64f3bb0 (pc 0x7fa4348f6f2d bp 0x7ffff64fd450 sp 0x7ffff64f3b80 T0) #0 0x7fa4348f6f2c in sbrDecodeSingleFramePS /root/faad2_asan/libfaa...
=== https://github.com/knik0/faad2/issues/29 === Title: Invalid memory address dereference in sbrDecodeSingleFramePS(in libfaad/sbr_dec.c:601) --- Body: Hi, i found a issue in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.8. It crashed in function sbrDecodeSingleFramePS .the details are below(ASAN): ``` ./faad f...
https://nvd.nist.gov/vuln/detail/CVE-2018-20359
gpac.cve-2021-32438
The gf_media_export_filters function in GPAC 1.0.1 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command.
https://github.com/gpac/gpac/issues/1769
https://github.com/gpac/gpac/commit/00194f5fe462123f70b0bae7987317b52898b868
CWE-476
gpac/gpac
00194f5fe462123f70b0bae7987317b52898b868~1
diff --git a/src/media_tools/media_export.c b/src/media_tools/media_export.c index b89936f83c..968818da31 100644 --- a/src/media_tools/media_export.c +++ b/src/media_tools/media_export.c @@ -1108,7 +1108,7 @@ static GF_Err gf_media_export_filters(GF_MediaExporter *dumper) } esd = gf_media_map_esd(dumper->file, tr...
https://github.com/gpac/gpac/issues/1769
AddressSanitizer:DEADLYSIGNAL ================================================================= ==2590==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000004 (pc 0x7f10a4aef7e8 bp 0x7ffc623e3300 sp 0x7ffc623e2c20 T0) ==2590==The signal is caused by a READ memory access. ==2590==Hint: address points to the zer...
=== https://github.com/gpac/gpac/issues/1769 === Title: Null pointer dereference in gpac MP4Box gf_media_export_filters --- Body: A null pointer dereference issue was found in MP4Box, to reproduce, compile gpac as follows: ``` CC=gcc CXX=g++ CFLAGS="-fsanitize=address" CXXFLAGS="-fsanitize=address" LDFLAGS="-fsanit...
https://nvd.nist.gov/vuln/detail/CVE-2021-32438
libiec61850.cve-2021-45769
A NULL pointer dereference in AcseConnection_parseMessage at src/mms/iso_acse/acse.c of libiec61850 v1.5.0 can lead to a segmentation fault or application crash.
https://github.com/mz-automation/libiec61850/issues/368
https://github.com/mz-automation/libiec61850/issues/368
CWE-476
mz-automation/libiec61850
https://github.com/mz-automation/libiec61850/issues/368
AddressSanitizer:DEADLYSIGNAL ================================================================= ==4028537==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x55de6e46db68 bp 0x7fac36efcaa0 sp 0x7fac36efc9f0 T3) ==4028537==The signal is caused by a READ memory access. ==4028537==Hint: address points t...
=== https://github.com/mz-automation/libiec61850/issues/368 === Title: NULL Pointer Dereference in AcseConnection_parseMessage --- Body: # NULL Pointer Dereference in AcseConnection_parseMessage ## Description A NULL Pointer Dereference was discovered in AcseConnection_parseMessage at src/mms/iso_acse/acse.c:42...
https://nvd.nist.gov/vuln/detail/CVE-2021-45769
faad2.cve-2018-20197
There is a stack-based buffer underflow in the third instance of the calculate_gain function in libfaad/sbr_hfadj.c in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.8. A crafted input will lead to a denial of service or possibly unspecified other impact because limiting the additional noise energy level is mishandled f...
https://github.com/knik0/faad2/issues/20
CWE-787
knik0/faad2
https://github.com/knik0/faad2/issues/20, https://seclists.org/bugtraq/2019/Sep/28
==7026==ERROR: AddressSanitizer: stack-buffer-underflow on address 0x7fff630132fc at pc 0x7fedefda0e74 bp 0x7fff63012ef0 sp 0x7fff63012ee0 WRITE of size 4 at 0x7fff630132fc thread T0 #0 0x7fedefda0e73 in calculate_gain /root/faad2_asan/libfaad/sbr_hfadj.c:1311 #1 0x7fedefd9e392 in hf_adjustment /root/faad2_asan...
=== https://github.com/knik0/faad2/issues/20 === Title: stack-buffer-underflow in function calculate_gain(libfaad/sbr_hfadj.c:1311) --- Body: Hi, i found a stack-buffer-overflow bug in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.8, the details are below(ASAN): ``` ./faad faad_res/006-stack-buffer-underflow-sb...
https://nvd.nist.gov/vuln/detail/CVE-2018-20197
mruby.cve-2018-12248
An issue was discovered in mruby 1.4.1. There is a heap-based buffer over-read associated with OP_ENTER because mrbgems/mruby-fiber/src/fiber.c does not extend the stack in cases of many arguments to fiber.
https://github.com/mruby/mruby/commit/778500563a9f7ceba996937dc886bd8cde29b42b
CWE-125
mruby/mruby
778500563a9f7ceba996937dc886bd8cde29b42b~1
diff --git a/mrbgems/mruby-fiber/src/fiber.c b/mrbgems/mruby-fiber/src/fiber.c index 83153a9df1..b88fa49497 100644 --- a/mrbgems/mruby-fiber/src/fiber.c +++ b/mrbgems/mruby-fiber/src/fiber.c @@ -184,26 +184,27 @@ fiber_switch(mrb_state *mrb, mrb_value self, mrb_int len, const mrb_value *a, mr { struct mrb_context *...
https://github.com/mruby/mruby/issues/4038
==42706==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x619000000e80 at pc 0x00010d30e3fe bp 0x7ffee2dcd970 sp 0x7ffee2dcd120 READ of size 16 at 0x619000000e80 thread T0 #0 0x10d30e3fd in __asan_memcpy (libclang_rt.asan_osx_dynamic.dylib:x86_64h+0x4f3fd) #1 0x10cedd8a8 in mrb_vm_exec vm.c:1859 #...
=== https://github.com/mruby/mruby/issues/4038 === Title: Heap buffer overflow in OP_ENTER --- Body: The following input demonstrates a crash: ```ruby Fiber::new {|x|}.transfer(0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49...
https://nvd.nist.gov/vuln/detail/CVE-2018-12248
gpac.cve-2023-0841
A vulnerability, which was classified as critical, has been found in GPAC 2.3-DEV-rev40-g3602a5ded. This issue affects the function mp3_dmx_process of the file filters/reframe_mp3.c. The manipulation leads to heap-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public ...
https://github.com/qianshuidewajueji/poc/blob/main/gpac/mp3_dmx_process_poc3
https://github.com/gpac/gpac/commit/3602a5ded4e57b0044a949f985ee3792f94a9a36, https://github.com/gpac/gpac/commit/1b77837ca27a80c695363416077bcab1aa72dc0a
CWE-122, CWE-787
gpac/gpac
3602a5ded4e57b0044a949f985ee3792f94a9a36
diff --git a/src/filters/reframe_mp3.c b/src/filters/reframe_mp3.c index 7411acb27c..096e0ce0e5 100644 --- a/src/filters/reframe_mp3.c +++ b/src/filters/reframe_mp3.c @@ -668,6 +668,10 @@ GF_Err mp3_dmx_process(GF_Filter *filter) } if (!ctx->in_seek) { + if (size > remain) { + GF_LOG(GF_LOG_WARNING, GF_LOG...
https://github.com/gpac/gpac/issues/2396
[MP3Dmx] invalid frame, resyncing ================================================================= ==29937==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x61a00000e322 at pc 0x7fe02eb39490 bp 0x7ffdcd4a3c40 sp 0x7ffdcd4a33e8 READ of size 316 at 0x61a00000e322 thread T0 #0 0x7fe02eb3948f in __intercepto...
=== https://github.com/gpac/gpac/issues/2396 === Title: heap-buffer-overflow in function mp3_dmx_process filters/reframe_mp3.c:677 --- Body: Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. ...
https://nvd.nist.gov/vuln/detail/CVE-2023-0841
gpac.cve-2022-2454
Integer Overflow or Wraparound in GitHub repository gpac/gpac prior to 2.1-DEV.
https://huntr.dev/bounties/105d40d0-46d7-461e-9f8e-20c4cdea925f
https://github.com/gpac/gpac/commit/faa75edde3dfeba1e2cf6ffa48e45a50f1042096, https://huntr.dev/bounties/105d40d0-46d7-461e-9f8e-20c4cdea925f
CWE-190
gpac/gpac
faa75edde3dfeba1e2cf6ffa48e45a50f1042096~1
diff --git a/src/laser/lsr_dec.c b/src/laser/lsr_dec.c index 99d16aaa77..488babb104 100644 --- a/src/laser/lsr_dec.c +++ b/src/laser/lsr_dec.c @@ -838,6 +838,8 @@ static void lsr_read_id(GF_LASeRCodec *lsr, GF_Node *n) static Fixed lsr_translate_coords(GF_LASeRCodec *lsr, u32 val, u32 nb_bits) { + if (!nb_bits) ret...
https://huntr.dev/bounties/105d40d0-46d7-461e-9f8e-20c4cdea925f
https://nvd.nist.gov/vuln/detail/CVE-2022-2454
gpac.cve-2021-40575
The binary MP4Box in Gpac 1.0.1 has a null pointer dereference vulnerability in the mpgviddmx_process function in reframe_mpgvid.c, which allows attackers to cause a denial of service. This vulnerability is possibly due to an incomplete fix for CVE-2021-40566.
https://github.com/gpac/gpac/issues/1905
https://github.com/gpac/gpac/commit/5f2c2a16d30229b6241f02fa28e3d6b810d64858
CWE-476
gpac/gpac
5f2c2a16d30229b6241f02fa28e3d6b810d64858~1
diff --git a/src/filters/reframe_mpgvid.c b/src/filters/reframe_mpgvid.c index 328db28551..85d4faa4cb 100644 --- a/src/filters/reframe_mpgvid.c +++ b/src/filters/reframe_mpgvid.c @@ -784,8 +784,14 @@ GF_Err mpgviddmx_process(GF_Filter *filter) mpgviddmx_enqueue_or_dispatch(ctx, dst_pck, GF_FALSE, GF_FALSE); } ...
https://github.com/gpac/gpac/issues/1905
==29762==ERROR: AddressSanitizer: negative-size-param: (size=-1) #0 0x7fdaf42ff813 (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x79813) #1 0x7fdaf2897f1c in memcpy /usr/include/x86_64-linux-gnu/bits/string_fortified.h:34 #2 0x7fdaf2897f1c in mpgviddmx_process /playground/gpac/src/filters/reframe_mpgvid.c:64...
=== https://github.com/gpac/gpac/issues/1905 === Title: Segmentation fault casued by null pointer dereference using mp4box in mpgviddmx_process, reframe_mpgvid.c:643 --- Body: - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac....
https://nvd.nist.gov/vuln/detail/CVE-2021-40575
gpac.cve-2023-5998
Out-of-bounds Read in GitHub repository gpac/gpac prior to 2.3.0-DEV.
https://huntr.com/bounties/ea02a231-b688-422b-a881-ef415bcf6113
https://github.com/gpac/gpac/commit/db74835944548fc3bdf03121b0e012373bdebb3e
CWE-125
gpac/gpac
db74835944548fc3bdf03121b0e012373bdebb3e~1
diff --git a/src/filters/reframe_mpgvid.c b/src/filters/reframe_mpgvid.c index 8e092f973c..ecf2519555 100644 --- a/src/filters/reframe_mpgvid.c +++ b/src/filters/reframe_mpgvid.c @@ -1081,6 +1081,11 @@ GF_Err mpgviddmx_process(GF_Filter *filter) //needs adjustement if (bytes_from_store) { size += bytes_from_s...
ASan (inferred)
https://nvd.nist.gov/vuln/detail/CVE-2023-5998
mruby.cve-2018-12247
An issue was discovered in mruby 1.4.1. There is a NULL pointer dereference in mrb_class, related to certain .clone usage, because mrb_obj_clone in kernel.c copies flags other than the MRB_FLAG_IS_FROZEN flag (e.g., the embedded flag).
https://github.com/mruby/mruby/commit/55edae0226409de25e59922807cb09acb45731a2
CWE-476
mruby/mruby
55edae0226409de25e59922807cb09acb45731a2~1
diff --git a/src/kernel.c b/src/kernel.c index f378004cb5..bbe6e8bb75 100644 --- a/src/kernel.c +++ b/src/kernel.c @@ -348,7 +348,7 @@ mrb_obj_clone(mrb_state *mrb, mrb_value self) mrb_field_write_barrier(mrb, (struct RBasic*)p, (struct RBasic*)p->c); clone = mrb_obj_value(p); init_copy(mrb, clone, self); - p...
https://github.com/mruby/mruby/issues/4036
ASAN:DEADLYSIGNAL ================================================================= ==35404==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x000105bcca74 bp 0x7ffeea4d0dd0 sp 0x7ffeea4d0da0 T0) ==35404==The signal is caused by a READ memory access. ==35404==Hint: address points to the zero page. ...
=== https://github.com/mruby/mruby/issues/4036 === Title: Null pointer dereference in mrb_class --- Body: The following input demonstrates a crash: ```ruby h = {} a = [] 200.times do |n| a[0] = n h[a] = 0 puts h.to_a.clone end ``` Note that I was only able to reproduce this issue when building mruby on a 32...
https://nvd.nist.gov/vuln/detail/CVE-2018-12247
gpac.cve-2022-1795
Use After Free in GitHub repository gpac/gpac prior to v2.1.0-DEV.
https://huntr.dev/bounties/9c312763-41a6-4fc7-827b-269eb86efcbc
https://github.com/gpac/gpac/commit/c535bad50d5812d27ee5b22b54371bddec411514
CWE-416
gpac/gpac
c535bad50d5812d27ee5b22b54371bddec411514~1
diff --git a/src/bifs/memory_decoder.c b/src/bifs/memory_decoder.c index 74d635750d..1fc8c99638 100644 --- a/src/bifs/memory_decoder.c +++ b/src/bifs/memory_decoder.c @@ -178,7 +178,12 @@ static GF_Err BM_ParseGlobalQuantizer(GF_BifsDecoder *codec, GF_BitStream *bs, G codec->scenegraph->global_qp = NULL; if (gf_n...
https://nvd.nist.gov/vuln/detail/CVE-2022-1795
imagemagick.cve-2021-3962
A flaw was found in ImageMagick where it did not properly sanitize certain input before using it to invoke convert processes. This flaw allows an attacker to create a specially crafted image that leads to a use-after-free vulnerability when processed by ImageMagick. The highest threat from this vulnerability is to conf...
https://bugzilla.redhat.com/show_bug.cgi?id=2023196, https://github.com/ImageMagick/ImageMagick/commit/82775af03bbb10a0a1d0e15c0156c75673b4525e
CWE-416
ImageMagick/ImageMagick
82775af03bbb10a0a1d0e15c0156c75673b4525e~1
diff --git a/coders/dcm.c b/coders/dcm.c index edc09e9f433..c2de0b1eeb3 100644 --- a/coders/dcm.c +++ b/coders/dcm.c @@ -3996,10 +3996,11 @@ static Image *ReadDCMImage(const ImageInfo *image_info,ExceptionInfo *exception) (void) RelinquishUniqueFileResource(filename); } read_info=DestroyIma...
https://bugzilla.redhat.com/show_bug.cgi?id=2023196, https://github.com/ImageMagick/ImageMagick/issues/4446
==11927==ERROR: AddressSanitizer: heap-use-after-free on address 0x60f000000580 at pc 0x000000f0f98c bp 0x7ffe3d8a7fd0 sp 0x7ffe3d8a7fc8 READ of size 8 at 0x60f000000580 thread T0 #0 0xf0f98b in RelinquishDCMMemory /root/fuzz/target/imagemagick/ImageMagick/coders/dcm.c:3039:20 #1 0xf08eb8 in ReadDCMImage /root/...
ASan (inferred)
=== https://github.com/ImageMagick/ImageMagick/issues/4446 === Title: heap-use-after-free in magick at dcm.c RelinquishDCMMemory --- Body: ### ImageMagick version 7.1.0-14 ### Operating system Linux ### Operating system, version and so on OS: Ubuntu 18.04.6 LTS Version: ImageMagick 7.1.0-14 Q16-HDRI x86_64 2021-...
https://nvd.nist.gov/vuln/detail/CVE-2021-3962
imagemagick.cve-2018-5247
In ImageMagick 7.0.7-17 Q16, there are memory leaks in ReadRLAImage in coders/rla.c.
https://github.com/ImageMagick/ImageMagick/issues/928
CWE-772
ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/issues/928
==108460==ERROR: LeakSanitizer: detected memory leaks Direct leak of 8 byte(s) in 1 object(s) allocated from: #0 0x4b9ad3 in malloc (/usr/local/bin/magick+0x4b9ad3) #1 0x7f51b50cda5b in ReadRLAImage /home/ubuntu/ImageMagick/coders/rla.c:271:34 #2 0x7f51b4a5aaf1 in ReadImage /home/ubuntu/ImageMagick/MagickC...
=== https://github.com/ImageMagick/ImageMagick/issues/928 === Title: memory leaks --- Body: ubuntu@ubuntu:~/fuzz_py$ magick -version Version: ImageMagick 7.0.7-17 Q16 x86_64 2017-12-26 http://www.imagemagick.org Copyright: © 1999-2018 ImageMagick Studio LLC License: http://www.imagemagick.org/script/license.php F...
https://nvd.nist.gov/vuln/detail/CVE-2018-5247
libredwg.cve-2021-28236
LibreDWG v0.12.3 was discovered to contain a NULL pointer dereference via out_dxfb.c.
https://github.com/LibreDWG/libredwg/issues/324
CWE-476
LibreDWG/libredwg
https://github.com/LibreDWG/libredwg/issues/324
➜ ./dwg2dxf -o ./fuzz_out -b -y ./poc1 Reading DWG file ./poc1 Warning: checksum: 0x27c51243 (calculated) mismatch ERROR: Skip section AcDb:FileDepList with size 8 > 0 * 128 ERROR: obj_string_stream overflow, bitsize 96 => 96 ERROR: Invalid object handle 10.1.1 at pos @4.2 ERROR: bit_read_RC buffer overflow at 12 ERR...
=== https://github.com/LibreDWG/libredwg/issues/324 === Title: Four NULL dereference in out_dxfb.c --- Body: I found four NULL dereference bugs in the current master (5d2c75f). # Configure CFLAGS="-g -fsanitize=address" LDFLAGS="-fsanitize=address" ./configure # bug 1 in out_dxfb.c:1902 ## Command `./dwg2dxf...
https://nvd.nist.gov/vuln/detail/CVE-2021-28236
libredwg.cve-2020-21834
A null pointer deference issue exists in GNU LibreDWG 0.10 via get_bmp ../../programs/dwgbmp.c:164.
https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574492468
https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574492468
CWE-476
LibreDWG/libredwg
https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574492468
=== https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574492468 === Title: Several bugs found by fuzzing --- Body: Hi, After fuzzing libredwg, I found the following bugs on the latest commit on master. Command: ./dwgbmp $PoC **1.NULL pointer dereference in read_2004_compressed_section ../../src/decode...
https://nvd.nist.gov/vuln/detail/CVE-2020-21834
imagemagick.cve-2017-12644
ImageMagick 7.0.6-1 has a memory leak vulnerability in ReadDCMImage in coders\dcm.c.
https://github.com/ImageMagick/ImageMagick/commit/a33f7498f9052b50e8fe8c8422a11ba84474cb42, https://github.com/ImageMagick/ImageMagick/issues/551
CWE-772
ImageMagick/ImageMagick
a33f7498f9052b50e8fe8c8422a11ba84474cb42~1
diff --git a/coders/dcm.c b/coders/dcm.c index 08d497f002b..55377c4f9cc 100644 --- a/coders/dcm.c +++ b/coders/dcm.c @@ -3270,7 +3270,7 @@ static Image *ReadDCMImage(const ImageInfo *image_info,ExceptionInfo *exception) if ((quantum != 0) && (length != 0)) { if (length > GetBlobSi...
https://github.com/ImageMagick/ImageMagick/issues/551
==2953==ERROR: LeakSanitizer: detected memory leaks Direct leak of 168 byte(s) in 1 object(s) allocated from: #0 0x4def96 in __interceptor_malloc asan_malloc_linux.cc:66 #1 0x7f7ad266ef76 in AcquireMagickMemory memory.c:463:10 #2 0x7f7ad2982f84 in ReadDCMImage dcm.c:3073:33 #3 0x7f7ad245ef98 in ReadIma...
=== https://github.com/ImageMagick/ImageMagick/issues/551 === Title: memory leak in ReadDCMImage --- Body: Version: ImageMagick 7.0.6-1 Q16 x86_64 ``` #./magick identify $FILE ================================================================= ==2953==ERROR: LeakSanitizer: detected memory leaks Direct leak o...
https://nvd.nist.gov/vuln/detail/CVE-2017-12644
mruby.cve-2022-0890
NULL Pointer Dereference in GitHub repository mruby/mruby prior to 3.2.
https://huntr.dev/bounties/68e09ec1-6cc7-48b8-981d-30f478c70276
https://github.com/mruby/mruby/commit/da48e7dbb20024c198493b8724adae1b842083aa, https://huntr.dev/bounties/68e09ec1-6cc7-48b8-981d-30f478c70276
CWE-476
mruby/mruby
da48e7dbb20024c198493b8724adae1b842083aa~1
diff --git a/mrbgems/mruby-fiber/src/fiber.c b/mrbgems/mruby-fiber/src/fiber.c index 0d85bedadc..322ed36ea8 100644 --- a/mrbgems/mruby-fiber/src/fiber.c +++ b/mrbgems/mruby-fiber/src/fiber.c @@ -208,15 +208,22 @@ fiber_switch(mrb_state *mrb, mrb_value self, mrb_int len, const mrb_value *a, mr if (!c->ci->proc) { ...
https://nvd.nist.gov/vuln/detail/CVE-2022-0890
mruby.cve-2022-1276
Out-of-bounds Read in mrb_get_args in GitHub repository mruby/mruby prior to 3.2. Possible arbitrary code execution if being exploited.
https://huntr.dev/bounties/6ea041d1-e2aa-472c-bf3e-da5fa8726c25
https://github.com/mruby/mruby/commit/c8c083cb750606b2da81582cd8e43b442bb143e6
CWE-125
mruby/mruby
c8c083cb750606b2da81582cd8e43b442bb143e6~1
diff --git a/mrbgems/mruby-compiler/core/codegen.c b/mrbgems/mruby-compiler/core/codegen.c index 8f7b5b0133..e222094be3 100644 --- a/mrbgems/mruby-compiler/core/codegen.c +++ b/mrbgems/mruby-compiler/core/codegen.c @@ -1905,7 +1905,7 @@ gen_assignment(codegen_scope *s, node *tree, node *rhs, int sp, int val) ...
ASan (inferred)
https://nvd.nist.gov/vuln/detail/CVE-2022-1276
libredwg.cve-2021-39521
An issue was discovered in libredwg through v0.10.1.3751. A NULL pointer dereference exists in the function bit_read_BB() located in bits.c. It allows an attacker to cause Denial of Service.
https://github.com/LibreDWG/libredwg/issues/262
https://github.com/LibreDWG/libredwg/issues/262
CWE-476
LibreDWG/libredwg
https://github.com/LibreDWG/libredwg/issues/262
ASAN:SIGSEGV ================================================================= ==33413==ERROR: AddressSanitizer: SEGV on unknown address 0x63001eedeec1 (pc 0x56001ae1aa1c bp 0x7ffc0f008820 sp 0x7ffc0f008570 T0) #0 0x56001ae1aa1b in bit_read_BB /home/seviezhou/libredwg/src/bits.c:186 #1 0x56001ae3d11b in bit_rea...
=== https://github.com/LibreDWG/libredwg/issues/262 === Title: A Segmentation fault in bits.c:186 --- Body: ## System info Ubuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), dwg2dxf (latest master [bacd017](https://github.com/LibreDWG/libredwg/commit/bacd01778d20b7b79f28541ea7a60cafe25175aa)) ## Configure CFLAGS="-g -f...
https://nvd.nist.gov/vuln/detail/CVE-2021-39521
exiv2.cve-2017-17669
There is a heap-based buffer over-read in the Exiv2::Internal::PngChunk::keyTXTChunk function of pngchunk_int.cpp in Exiv2 0.26. A crafted PNG file will lead to a remote denial of service attack.
https://github.com/Exiv2/exiv2/issues/187
CWE-125
Exiv2/exiv2
https://github.com/Exiv2/exiv2/issues/187
==2826==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60300000edb9 at pc 0x7f7c43e7a77a bp 0x7ffe0d1d6df0 sp 0x7ffe0d1d6de8 READ of size 1 at 0x60300000edb9 thread T0 #0 0x7f7c43e7a779 in Exiv2::Internal::PngChunk::keyTXTChunk(Exiv2::DataBuf const&, bool) /home/rg/fuzz_project/exiv2/exiv2_test/exiv2_gi...
=== https://github.com/Exiv2/exiv2/issues/187 === Title: CVE-2017-17669: heap-buffer-overflow in Exiv2::Internal::PngChunk::keyTXTChunk --- Body: ## Description There is a heap-buffer-overflow vulnerability in Exiv2. The command is: ./exiv2 POC Stack trace with asan: ``` ==2826==ERROR: AddressSanitizer: heap...
https://nvd.nist.gov/vuln/detail/CVE-2017-17669
imagemagick.cve-2017-12641
ImageMagick 7.0.6-1 has a memory leak vulnerability in ReadOneJNGImage in coders\png.c.
https://github.com/ImageMagick/ImageMagick/commit/c9aa9f80828594eacbe3affe16c43d623562e5d8, https://github.com/ImageMagick/ImageMagick/issues/550
CWE-772
ImageMagick/ImageMagick
c9aa9f80828594eacbe3affe16c43d623562e5d8~1
diff --git a/coders/png.c b/coders/png.c index dc8be522074..080709c047c 100644 --- a/coders/png.c +++ b/coders/png.c @@ -4377,7 +4377,13 @@ static Image *ReadOneJNGImage(MngInfo *mng_info, type[0],type[1],type[2],type[3],(double) length); if (length > PNG_UINT_31_MAX || count == 0) - ThrowReaderExc...
https://github.com/ImageMagick/ImageMagick/issues/550
=== https://github.com/ImageMagick/ImageMagick/issues/550 === Title: memory leak in ReadOneJNGImage --- Body: Version: ImageMagick 7.0.6-1 Q16 x86_64 ``` #./magick identify $FILE ================================================================= ==32637==ERROR: LeakSanitizer: detected memory leaks Direct le...
https://nvd.nist.gov/vuln/detail/CVE-2017-12641
gpac.cve-2023-0819
Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to v2.3.0-DEV.
https://huntr.dev/bounties/35793610-dccc-46c8-9f55-6a24c621e4ef
https://github.com/gpac/gpac/commit/1b77837ca27a80c695363416077bcab1aa72dc0a, https://github.com/gpac/gpac/commit/c972a6eec5
CWE-122, CWE-787
gpac/gpac
1b77837ca27a80c695363416077bcab1aa72dc0a~1
diff --git a/src/filters/reframe_mp3.c b/src/filters/reframe_mp3.c index 096e0ce0e5..c112492dad 100644 --- a/src/filters/reframe_mp3.c +++ b/src/filters/reframe_mp3.c @@ -668,8 +668,8 @@ GF_Err mp3_dmx_process(GF_Filter *filter) } if (!ctx->in_seek) { - if (size > remain) { - GF_LOG(GF_LOG_WARNING, GF_LOG_...
https://nvd.nist.gov/vuln/detail/CVE-2023-0819
gpac.cve-2023-2840
NULL Pointer Dereference in GitHub repository gpac/gpac prior to 2.2.2.
https://huntr.dev/bounties/21926fc2-6eb1-4e24-8a36-e60f487d0257
https://github.com/gpac/gpac/commit/ba59206b3225f0e8e95a27eff41cb1c49ddf9a37, https://huntr.dev/bounties/21926fc2-6eb1-4e24-8a36-e60f487d0257
CWE-476
gpac/gpac
ba59206b3225f0e8e95a27eff41cb1c49ddf9a37~1
diff --git a/src/isomedia/movie_fragments.c b/src/isomedia/movie_fragments.c index b742078d15..41d0717a48 100644 --- a/src/isomedia/movie_fragments.c +++ b/src/isomedia/movie_fragments.c @@ -2876,7 +2876,8 @@ GF_Err gf_isom_fragment_add_sample_ex(GF_ISOFile *movie, GF_ISOTrackID TrackID, //rewrite OD frames if (tra...
https://nvd.nist.gov/vuln/detail/CVE-2023-2840
gpac.cve-2022-29537
gp_rtp_builder_do_hevc in ietf/rtp_pck_mpeg4.c in GPAC 2.0.0 has a heap-based buffer over-read, as demonstrated by MP4Box.
https://github.com/gpac/gpac/issues/2173
https://github.com/gpac/gpac/commit/1773b7a34bc08734aee7d3f5dfe65d06389fe15a
CWE-125
gpac/gpac
1773b7a34bc08734aee7d3f5dfe65d06389fe15a~1
diff --git a/src/ietf/rtp_pck_mpeg4.c b/src/ietf/rtp_pck_mpeg4.c index d8bec0d20c..462d2c99b3 100644 --- a/src/ietf/rtp_pck_mpeg4.c +++ b/src/ietf/rtp_pck_mpeg4.c @@ -421,6 +421,7 @@ GF_Err gp_rtp_builder_do_avc(GP_RTPPacketizer *builder, u8 *nalu, u32 nalu_size, } if (!nalu) return GF_OK; + if (nalu_size<1) retu...
https://github.com/gpac/gpac/issues/2173
================================================================= ==2628578==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000001f15 at pc 0x7f14c2411bf5 bp 0x7ffec49a0110 sp 0x7ffec49a0100 READ of size 1 at 0x602000001f15 thread T0 #0 0x7f14c2411bf4 in gp_rtp_builder_do_hevc ietf/rtp_pck_mpeg4.c:59...
=== https://github.com/gpac/gpac/issues/2173 === Title: [BUG] heap buffer overflow in gp_rtp_builder_do_hevc --- Body: Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with th...
https://nvd.nist.gov/vuln/detail/CVE-2022-29537
imagemagick.cve-2019-13304
ImageMagick 7.0.8-50 Q16 has a stack-based buffer overflow at coders/pnm.c in WritePNMImage because of a misplaced assignment.
https://github.com/ImageMagick/ImageMagick/issues/1614
https://github.com/ImageMagick/ImageMagick/commit/7689875ef64f34141e7292f6945efdf0530b4a5e, https://github.com/ImageMagick/ImageMagick/issues/1614, https://github.com/ImageMagick/ImageMagick6/commit/bfa3b9610c83227894c92b0d312ad327fceb6241
CWE-787
ImageMagick/ImageMagick
7689875ef64f34141e7292f6945efdf0530b4a5e~1
diff --git a/coders/pnm.c b/coders/pnm.c index afaea309d56..5849388dc9f 100644 --- a/coders/pnm.c +++ b/coders/pnm.c @@ -1756,13 +1756,13 @@ static MagickBooleanType WritePNMImage(const ImageInfo *image_info,Image *image, { *q++=(unsigned char) (GetPixelLuma(image,p) >= (QuantumRange/2.0) ? ...
https://github.com/ImageMagick/ImageMagick/issues/1614
================================================================= ==9828==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7ffcc293daa0 at pc 0x7f71ad7e3477 bp 0x7ffcc293a0f0 sp 0x7ffcc293a0e8 WRITE of size 1 at 0x7ffcc293daa0 thread T0 #0 0x7f71ad7e3476 in WritePNMImage coders/pnm.c:1762:21 #1 0x7f7...
=== https://github.com/ImageMagick/ImageMagick/issues/1614 === Title: stack-buffer-overflow at coders/pnm.c:1762 in WritePNMImage --- Body: ### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https:/...
https://nvd.nist.gov/vuln/detail/CVE-2019-13304
liblouis.cve-2023-26768
Buffer Overflow vulnerability found in Liblouis v.3.24.0 allows a remote attacker to cause a denial of service via the compileTranslationTable.c and lou_setDataPath functions.
https://github.com/liblouis/liblouis/issues/1301
https://github.com/liblouis/liblouis/pull/1302
CWE-120
liblouis/liblouis
diff --git a/liblouis/logging.c b/liblouis/logging.c index 9f470b45e5..2849cf26d4 100644 --- a/liblouis/logging.c +++ b/liblouis/logging.c @@ -117,8 +117,10 @@ _lou_logMessage(logLevels level, const char *format, ...) { } } +#define FILENAMESIZE 256 + static FILE *logFile = NULL; -static char initialLogFileName[2...
https://github.com/liblouis/liblouis/issues/1301, https://github.com/liblouis/liblouis/pull/1302
$ ./driver-API-6223f21-lou_logFile-BO poc-API-6223f21-lou_logFile-BO Minimum size is 0 INFO: Running with entropic power schedule (0xFF, 100). INFO: Seed: 2700932249 INFO: Loaded 1 modules (57 inline 8-bit counters): 57 [0x7b0360, 0x7b0399), INFO: Loaded 1 PC tables (57 PCs): 57 [0x5705c0,0x570950), ./driver-API-62...
=== https://github.com/liblouis/liblouis/issues/1301 === Title: global-buffer-overflow in lou_logFile() when long filename is given --- Body: ## Summary When long filename (larger than 256) is given to API `lou_logFile()`, there will be a global-buffer-overflow. https://github.com/liblouis/liblouis/blob/517f6f1f3...
https://nvd.nist.gov/vuln/detail/CVE-2023-26768
imagemagick.cve-2019-13305
ImageMagick 7.0.8-50 Q16 has a stack-based buffer overflow at coders/pnm.c in WritePNMImage because of a misplaced strncpy and an off-by-one error.
https://github.com/ImageMagick/ImageMagick/issues/1613
https://github.com/ImageMagick/ImageMagick/commit/29efd648f38b73a64d73f14cd2019d869a585888, https://github.com/ImageMagick/ImageMagick/issues/1613, https://github.com/ImageMagick/ImageMagick6/commit/5c7fbf9a14fb83c9685ad69d48899f490a37609d
CWE-193, CWE-787
ImageMagick/ImageMagick
29efd648f38b73a64d73f14cd2019d869a585888~1
diff --git a/coders/pnm.c b/coders/pnm.c index a54bc60c33d..afaea309d56 100644 --- a/coders/pnm.c +++ b/coders/pnm.c @@ -1824,14 +1824,14 @@ static MagickBooleanType WritePNMImage(const ImageInfo *image_info,Image *image, count=(ssize_t) FormatLocaleString(buffer,MagickPathExtent, "%...
https://github.com/ImageMagick/ImageMagick/issues/1613
================================================================= ==25473==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7ffe4120cba0 at pc 0x7f1d07f024d8 bp 0x7ffe412080f0 sp 0x7ffe412080e8 WRITE of size 1 at 0x7ffe4120cba0 thread T0 #0 0x7f1d07f024d7 in WritePNMImage coders/pnm.c:1906:21 #1 0x7f...
=== https://github.com/ImageMagick/ImageMagick/issues/1613 === Title: stack-buffer-overflow at coders/pnm.c:1906 in WritePNMImage --- Body: ### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https...
https://nvd.nist.gov/vuln/detail/CVE-2019-13305
imagemagick.cve-2017-11533
When ImageMagick 7.0.6-1 processes a crafted file in convert, it can lead to a heap-based buffer over-read in the WriteUILImage() function in coders/uil.c.
https://github.com/ImageMagick/ImageMagick/issues/562
https://github.com/ImageMagick/ImageMagick/issues/562
CWE-125
ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/issues/562
==3160==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x62d00001cbdc at pc 0x7f505478c77d bp 0x7fff1b1513b0 sp 0x7fff1b1513a0 READ of size 1 at 0x62d00001cbdc thread T0 #0 0x7f505478c77c in WriteUILImage coders/uil.c:273 #1 0x7f50542471c6 in WriteImage MagickCore/constitute.c:1114 #2 0x7f5054247e...
=== https://github.com/ImageMagick/ImageMagick/issues/562 === Title: heap-overflow in WriteUILImage() --- Body: Crash Link : https://raw.githubusercontent.com/lcatro/My_PoC/master/ImageMagick/heap-buffer-overflow-READ-0x7fd806e82db2_output_uil_1500210468.72 Trigger Command : ./magick convert heap-buffer-overflow...
https://nvd.nist.gov/vuln/detail/CVE-2017-11533
libiec61850.cve-2023-27772
libiec61850 v1.5.1 was discovered to contain a segmentation violation via the function ControlObjectClient_setOrigin() at /client/client_control.c.
https://github.com/mz-automation/libiec61850/issues/442
https://github.com/mz-automation/libiec61850/commit/79a8eaf26070e02044afc4b2ffbfe777dfdf3e0b
CWE-754
mz-automation/libiec61850
79a8eaf26070e02044afc4b2ffbfe777dfdf3e0b~1
diff --git a/examples/iec61850_client_example_control/client_example_control.c b/examples/iec61850_client_example_control/client_example_control.c index 33da635a3..37d6b6bca 100644 --- a/examples/iec61850_client_example_control/client_example_control.c +++ b/examples/iec61850_client_example_control/client_example_contr...
https://github.com/mz-automation/libiec61850/issues/442
$ sudo ./client_example_control AddressSanitizer:DEADLYSIGNAL ================================================================= ==12824==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000078 (pc 0x5638e2e178dc bp 0x7ffe9101eb20 sp 0x7ffe9101eb00 T0) ==12824==The signal is caused by a READ memory access. ==128...
=== https://github.com/mz-automation/libiec61850/issues/442 === Title: SEGV in function ControlObjectClient_setOrigin() --- Body: Hi, team There is a SEGV in function `ControlObjectClient_setOrigin` in `src/iec61850/client/client_control.c:328` when called from libiec61850/examples/iec61850_client_example_control/cl...
https://nvd.nist.gov/vuln/detail/CVE-2023-27772
matio.cve-2019-9036
An issue was discovered in libmatio.a in matio (aka MAT File I/O Library) 1.5.13. There is a heap-based buffer overflow in the function ReadNextFunctionHandle() in mat5.c.
https://github.com/TeamSeri0us/pocs/tree/master/matio
https://github.com/tbeu/matio/commit/a0539135c9b1ab7613aa7953279da9224da88775, https://github.com/tbeu/matio/commit/2c20d2178017b3eb13ab160cef239648f9915bdb, https://github.com/tbeu/matio/commit/df23944bc8f16dc7270fa39c772e14958aadc283, https://github.com/tbeu/matio/commit/ce33bf0ef196794790ed20c6d4c8232f7eb45590, http...
CWE-787
tbeu/matio
a0539135c9b1ab7613aa7953279da9224da88775~1
diff --git a/src/inflate.c b/src/inflate.c index f8b1e114..3d085684 100644 --- a/src/inflate.c +++ b/src/inflate.c @@ -241,7 +241,7 @@ InflateVarTag(mat_t *mat, matvar_t *matvar, void *buf) { mat_uint8_t comp_buf[32]; int err; - size_t bytesread = 0; + size_t bytesread = 0, readresult = 1; if...
https://github.com/tbeu/matio/issues/103
==29570==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60200000efd0 at pc 0x7f5b9c14f9fe bp 0x7ffca66d34a0 sp 0x7ffca66d34 WRITE of size 8 at 0x60200000efd0 thread T0 #0 0x7f5b9c14f9fd in Mat_VarReadNextInfo5 (/home/sebastien/debian/upstream/matio/src/.libs/libmatio.so.9+0xbf9fd) #1 0x562dd8c1c9b9 ...
=== https://github.com/tbeu/matio/issues/103 === Title: some memory corruption problems when the library parse the mat file --- Body: I found several memory corruption problem in the library. More details can be found at [here](https://github.com/TeamSeri0us/pocs/tree/master/matio). --- Comment #1 by PhilipMorris...
https://nvd.nist.gov/vuln/detail/CVE-2019-9036
imagemagick.cve-2019-13299
ImageMagick 7.0.8-50 Q16 has a heap-based buffer over-read at MagickCore/pixel-accessor.h in GetPixelChannel.
https://github.com/ImageMagick/ImageMagick/issues/1610
https://github.com/ImageMagick/ImageMagick/commit/933bf025119f0de25ee589b706c09c8bb46d5a48, https://github.com/ImageMagick/ImageMagick/commit/d4fc44b58a14f76b1ac997517d742ee12c9dc5d3
CWE-125
ImageMagick/ImageMagick
933bf025119f0de25ee589b706c09c8bb46d5a48~1
diff --git a/MagickCore/statistic.c b/MagickCore/statistic.c index 6bf4409f097..dae4b489c88 100644 --- a/MagickCore/statistic.c +++ b/MagickCore/statistic.c @@ -582,15 +582,15 @@ MagickExport Image *EvaluateImages(const Image *images, for (i=0; i < (ssize_t) GetPixelChannels(image); i++) { ...
https://github.com/ImageMagick/ImageMagick/issues/1610
==30168==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x7febb7ba1400 at pc 0x7febc5808632 bp 0x7ffd269baff0 sp 0x7ffd269bafe8 READ of size 4 at 0x7febb7ba1400 thread T0 #0 0x7febc5808631 in GetPixelChannel ./MagickCore/pixel-accessor.h:116:10 #1 0x7febc5805ff6 in EvaluateImages MagickCore/statistic....
=== https://github.com/ImageMagick/ImageMagick/issues/1610 === Title: heap-buffer-overflow at MagickCore/pixel-accessor.h:116:10 in GetPixelChannel --- Body: ### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searc...
https://nvd.nist.gov/vuln/detail/CVE-2019-13299
imagemagick.cve-2018-6405
In the ReadDCMImage function in coders/dcm.c in ImageMagick before 7.0.7-23, each redmap, greenmap, and bluemap variable can be overwritten by a new pointer. The previous pointer is lost, which leads to a memory leak. This allows remote attackers to cause a denial of service.
https://github.com/ImageMagick/ImageMagick/issues/964
https://github.com/ImageMagick/ImageMagick/commit/1fbed78912c830ccd82eecdb8a1db4882abb8276
CWE-772
ImageMagick/ImageMagick
1fbed78912c830ccd82eecdb8a1db4882abb8276~1
diff --git a/coders/dcm.c b/coders/dcm.c index 5f9cb02c71c..2e339fc9b8a 100644 --- a/coders/dcm.c +++ b/coders/dcm.c @@ -3580,6 +3580,8 @@ static Image *ReadDCMImage(const ImageInfo *image_info,ExceptionInfo *exception) break; colors=(size_t) (length/2); datum=(int) colors; + ...
https://github.com/ImageMagick/ImageMagick/issues/964
==62826==ERROR: LeakSanitizer: detected memory leaks Direct leak of 20 byte(s) in 1 object(s) allocated from: #0 0x4bd753 in __interceptor_malloc /home/brian/final/llvm.src/projects/compiler-rt/lib/asan/asan_malloc_linux.cc:67:3 #1 0x537d1d in AcquireMagickMemory (/imagemagick.latest/utilities/magick+0x537d1d)...
=== https://github.com/ImageMagick/ImageMagick/issues/964 === Title: coders/dcm.c Memory Leak --- Body: ### System Configuration - ImageMagick version: ImageMagick 7.0.7-23 - Environment (Operating system, version and so on): Ubuntu 14.04 64bit - Additional information: compilation with asan ### Descripti...
https://nvd.nist.gov/vuln/detail/CVE-2018-6405
imagemagick.cve-2019-13303
ImageMagick 7.0.8-50 Q16 has a heap-based buffer over-read in MagickCore/composite.c in CompositeImage.
https://github.com/ImageMagick/ImageMagick/issues/1603
https://github.com/ImageMagick/ImageMagick/commit/d29148fae06c01ef215940e084cf41853c117bab, https://github.com/ImageMagick/ImageMagick/issues/1603
CWE-125
ImageMagick/ImageMagick
d29148fae06c01ef215940e084cf41853c117bab~1
diff --git a/MagickCore/composite.c b/MagickCore/composite.c index 78d6dff9217..99e91d14704 100644 --- a/MagickCore/composite.c +++ b/MagickCore/composite.c @@ -654,18 +654,19 @@ MagickExport MagickBooleanType CompositeImage(Image *image, q+=GetPixelChannels(image); continue; ...
https://github.com/ImageMagick/ImageMagick/issues/1603
==5479==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x626000008900 at pc 0x7f9c528f0e7d bp 0x7ffd8cc41710 sp 0x7ffd8cc41708 READ of size 4 at 0x626000008900 thread T0 #0 0x7f9c528f0e7c in CompositeImage MagickCore/composite.c:666:45 #1 0x7f9c52b23aa0 in CompareImagesLayers MagickCore/layer.c:792:10...
=== https://github.com/ImageMagick/ImageMagick/issues/1603 === Title: heap-buffer-overflow in MagickCore/composite.c:666:45 in CompositeImage --- Body: ### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [o...
https://nvd.nist.gov/vuln/detail/CVE-2019-13303
gpac.cve-2023-46928
GPAC 2.3-DEV-rev605-gfc9e29089-master contains a SEGV in gpac/MP4Box in gf_media_change_pl /afltest/gpac/src/media_tools/isom_tools.c:3293:42.
https://github.com/gpac/gpac/commit/0753bf6d867343a80a044bf47a27d0b7accc8bf1
CWE-787
gpac/gpac
0753bf6d867343a80a044bf47a27d0b7accc8bf1~1
diff --git a/src/media_tools/isom_tools.c b/src/media_tools/isom_tools.c index 21f8905cf8..a41e51a0d5 100644 --- a/src/media_tools/isom_tools.c +++ b/src/media_tools/isom_tools.c @@ -635,7 +635,7 @@ GF_Err gf_media_make_isma(GF_ISOFile *mp4file, Bool keepESIDs, Bool keepImage, B _esd = gf_odf_desc_esd_new(SLPredef_...
https://github.com/gpac/gpac/issues/2661
AddressSanitizer:DEADLYSIGNAL ================================================================= ==3037861==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000002 (pc 0x7ffff6798224 bp 0x00000000000f sp 0x7ffffffec1c0 T0) ==3037861==The signal is caused by a WRITE memory access. ==3037861==Hint: address points ...
=== https://github.com/gpac/gpac/issues/2661 === Title: SEGV in gpac/MP4Box in gf_media_change_pl /afltest/gpac/src/media_tools/isom_tools.c:3293:42 --- Body: # SEGV in MP4Box ### Description SEGV in gpac/MP4Box. #0 0x7ffff6798224 in gf_media_change_pl /afltest/gpac/src/media_tools/isom_tools.c:3293:42 ##...
https://nvd.nist.gov/vuln/detail/CVE-2023-46928
libheif.cve-2023-49460
libheif v1.17.5 was discovered to contain a segmentation violation via the function UncompressedImageCodec::decode_uncompressed_image.
https://github.com/strukturag/libheif/issues/1046
https://github.com/strukturag/libheif/commit/fd5b02aca3e29088bf0a1fc400bd661be4a6ed76
strukturag/libheif
fd5b02aca3e29088bf0a1fc400bd661be4a6ed76~1
diff --git a/libheif/uncompressed_image.cc b/libheif/uncompressed_image.cc index c91e5dba4f..487d4cedbe 100644 --- a/libheif/uncompressed_image.cc +++ b/libheif/uncompressed_image.cc @@ -616,6 +616,13 @@ Error UncompressedImageCodec::decode_uncompressed_image(const std::shared_ptr<co if (error) { return error; ...
https://github.com/strukturag/libheif/issues/1046
==89344==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x7f955d086aeb bp 0x7ffdd923ebb0 sp 0x7ffdd923e318 T0) ==89344==The signal is caused by a READ memory access. ==89344==Hint: address points to the zero page. #0 0x7f955d086aea in memcpy (/lib/x86_64-linux-gnu/libc.so.6+0xbbaea) #1 0x7f...
=== https://github.com/strukturag/libheif/issues/1046 === Title: AddressSanitizer: SEGV in `decode_uncompressed_image` --- Body: ### Description AddressSanitizer: SEGV in `decode_uncompressed_image` ### Version ``` commit: 64ece913266609789f5dc70fe7de9eb759badd7f heif-convert libheif version: 1.17.5 --...
https://nvd.nist.gov/vuln/detail/CVE-2023-49460