instance_id
string
description
string
exploit(poc)_url
string
patch_url
string
weakness_enumeration
string
github_repo
string
base_commit
string
developers_patch
string
bug_report
string
sanitizer_report
string
sanitizer
string
github_issue
string
nvd_url
string
imagemagick.cve-2017-14400
In ImageMagick 7.0.7-1 Q16, the PersistPixelCache function in magick/cache.c mishandles the pixel cache nexus, which allows remote attackers to cause a denial of service (NULL pointer dereference in the function GetVirtualPixels in MagickCore/cache.c) via a crafted file.
https://github.com/ImageMagick/ImageMagick/issues/746
https://github.com/ImageMagick/ImageMagick/commit/2c2206bcd4ff98dd097dd0acb5e92dd464465231, https://github.com/ImageMagick/ImageMagick/commit/76f94fa2d9ae5d96e15929b6b6ce0c866fc44c69
CWE-476
ImageMagick/ImageMagick
2c2206bcd4ff98dd097dd0acb5e92dd464465231~1
diff --git a/MagickCore/cache.c b/MagickCore/cache.c index 8b5a91fb4c8..bf60ae8cdb1 100644 --- a/MagickCore/cache.c +++ b/MagickCore/cache.c @@ -3852,8 +3852,6 @@ MagickExport MagickBooleanType PersistPixelCache(Image *image, MagickPathExtent); cache_info->type=DiskCache; cache_info->offset=(*off...
https://github.com/ImageMagick/ImageMagick/issues/746
ASAN:SIGSEGV ================================================================= ==49786==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x7f9150edb72b bp 0x7ffd830679e0 sp 0x7ffd83067980 T0) #0 0x7f9150edb72a in GetVirtualPixels MagickCore/cache.c:3185 #1 0x7f9151203e88 in WriteAAIImage code...
null
=== https://github.com/ImageMagick/ImageMagick/issues/746 === Title: Null Pointer Dereference in GetVirtualPixels MagickCore/cache.c:3185 --- Body: poc1 version: ImageMagick 7.0.7-1 Q16 x86_64 gcc 7.1 crash link : https://raw.githubusercontent.com/jerryl3e/poc/master/im_poc_1505120100 trigger command : ...
https://nvd.nist.gov/vuln/detail/CVE-2017-14400
imagemagick.cve-2022-1115
A heap-buffer-overflow flaw was found in ImageMagick’s PushShortPixel() function of quantum-private.h file. This vulnerability is triggered when an attacker passes a specially crafted TIFF image file to ImageMagick for conversion, potentially leading to a denial of service.
https://github.com/ImageMagick/ImageMagick/issues/4974
https://github.com/ImageMagick/ImageMagick/commit/c8718305f120293d8bf13724f12eed885d830b09, https://github.com/ImageMagick/ImageMagick6/commit/1f860f52bd8d58737ad883072203391096b30b51
CWE-119, CWE-787
ImageMagick/ImageMagick
c8718305f120293d8bf13724f12eed885d830b09~1
diff --git a/coders/tiff.c b/coders/tiff.c index 31839f67e29..32ae00ab812 100644 --- a/coders/tiff.c +++ b/coders/tiff.c @@ -1987,7 +1987,7 @@ static Image *ReadTIFFImage(const ImageInfo *image_info, number_pixels=(MagickSizeType) columns*rows; if (HeapOverflowSanityCheck(rows,sizeof(*tile_pixels)) !=...
https://access.redhat.com/security/cve/CVE-2022-1115, https://bugzilla.redhat.com/show_bug.cgi?id=2067022, https://github.com/ImageMagick/ImageMagick/issues/4974
==1195823==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x61900000181c at pc 0x000000cd5328 bp 0x7ffdacd61fa0 sp 0x7ffdacd61f98 READ of size 1 at 0x61900000181c thread T0 #0 0xcd5327 in PushShortPixel /root/fuzz/target/image_magick/ImageMagick/./MagickCore/quantum-private.h #1 0xcd5327 in ImportRGBA...
ASan (inferred)
=== https://github.com/ImageMagick/ImageMagick/issues/4974 === Title: heap-buffer-overflow in magick at quantum-private.h PushShortPixel --- Body: ### ImageMagick version 7.1.0-28 ### Operating system Linux ### Operating system, version and so on OS: Ubuntu 20.04.3 LTS Version: ImageMagick 7.1.0-28 Q...
https://nvd.nist.gov/vuln/detail/CVE-2022-1115
exiv2.cve-2020-18899
An uncontrolled memory allocation in DataBufdata(subBox.length-sizeof(box)) function of Exiv2 0.27 allows attackers to cause a denial of service (DOS) via a crafted input.
https://github.com/Exiv2/exiv2/issues/742
https://github.com/Exiv2/exiv2/commit/051b5d9df1f4669117937b7a40104404cc252993
CWE-770
Exiv2/exiv2
fd0f29bd1e91bd05c855b88794209179a9e27761
diff --git a/src/jp2image.cpp b/src/jp2image.cpp index 39a6f5814d..a4b2d901f8 100644 --- a/src/jp2image.cpp +++ b/src/jp2image.cpp @@ -501,8 +501,8 @@ namespace Exiv2 subBox.length = getLong((byte*)&subBox.length, bigEndian); subBox.type = getLong((byte*)&subB...
https://github.com/Exiv2/exiv2/issues/742
==9819==WARNING: AddressSanitizer failed to allocate 0xffffffffffffffff bytes ================================================================= ==9819==ERROR: AddressSanitizer: unknown-crash on address 0xffffffffffffffff at pc 0x0000004a9325 bp 0x7fffe470cec0 sp 0x7fffe470c670 WRITE of size 18446744073709551615 at 0xff...
null
=== https://github.com/Exiv2/exiv2/issues/742 === Title: [bug report] Program crash due to uncontrolled memory allocation on function DataBuf data(subBox.length-sizeof(box)) --- Body: Hi there, An issue was discovered in DataBuf data(subBox.length-sizeof(box)) function in image.cpp, as distributed in master and ve...
https://nvd.nist.gov/vuln/detail/CVE-2020-18899
njs.cve-2022-29780
Nginx NJS v0.7.2 was discovered to contain a segmentation violation in the function njs_array_prototype_sort at src/njs_array.c.
https://github.com/nginx/njs/issues/486
https://github.com/nginx/njs/commit/8b39afdad9a0761e0a5d4af1a762bd9a6daef572
null
nginx/njs
8b39afdad9a0761e0a5d4af1a762bd9a6daef572~1
diff --git a/src/njs_array.c b/src/njs_array.c index 81a7c1555..0b8c7b919 100644 --- a/src/njs_array.c +++ b/src/njs_array.c @@ -2696,7 +2696,7 @@ njs_array_prototype_sort(njs_vm_t *vm, njs_value_t *args, njs_uint_t nargs, goto exception; } - if (njs_fast_path(fast_path)) { + if (njs_fast_path(fas...
https://github.com/nginx/njs/issues/486
AddressSanitizer:DEADLYSIGNAL ================================================================= ==610159==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x7ffff6f91b13 bp 0x7fffffffb3d0 sp 0x7fffffffab48 T0) ==610159==The signal is caused by a WRITE memory access. ==610159==Hint: address points to ...
null
=== https://github.com/nginx/njs/issues/486 === Title: SEGV in njs_array_prototype_sort --- Body: # Environment OS : Linux leanderwang-LC2 5.13.0-30-generic https://github.com/nginx/njs/issues/33 SMP Mon Feb 7 14:25:10 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux Commit : https://github.com/nginx/njs/commit/f65981b0b...
https://nvd.nist.gov/vuln/detail/CVE-2022-29780
libredwg.cve-2020-21814
A heap based buffer overflow issue exists in GNU LibreDWG 0.10.2641 via htmlwescape ../../programs/escape.c:97.
https://github.com/LibreDWG/libredwg/issues/182#issuecomment-572891083
https://github.com/LibreDWG/libredwg/commit/e8c3edb987ce5602c2daca8e1593d7d1c95befdb
CWE-787
LibreDWG/libredwg
7b9cb829f93d1c1f67584345ed65ea830de8bdda
diff --git a/programs/escape.c b/programs/escape.c index 4d409ea43f..0bf9656c16 100644 --- a/programs/escape.c +++ b/programs/escape.c @@ -113,9 +113,9 @@ htmlwescape (BITCODE_TU wstr) while ((c = *tmp++)) len++; len += 16; - d = dest = malloc (len); + d = dest = calloc (len, 1); - while (*wstr++) + wh...
https://github.com/LibreDWG/libredwg/issues/182#issuecomment-572891083
null
null
=== https://github.com/LibreDWG/libredwg/issues/182#issuecomment-572891083 === Title: Several bugs found by fuzzing --- Body: Hi, After fuzzing libredwg, I found the following bugs on the latest commit on master. Command: ./dwg2SVG $PoC **1.NULL pointer dereference in htmlescape ../../programs/escape.c:29** POC: ...
https://nvd.nist.gov/vuln/detail/CVE-2020-21814
imagemagick.cve-2019-13295
ImageMagick 7.0.8-50 Q16 has a heap-based buffer over-read at MagickCore/threshold.c in AdaptiveThresholdImage because a width of zero is mishandled.
https://github.com/ImageMagick/ImageMagick/issues/1608
https://github.com/ImageMagick/ImageMagick/commit/a7759f410b773a1dd57b0e1fb28112e1cd8b97bc, https://github.com/ImageMagick/ImageMagick/issues/1608, https://github.com/ImageMagick/ImageMagick6/commit/55e6dc49f1a381d9d511ee2f888fdc3e3c3e3953
CWE-125
ImageMagick/ImageMagick
a7759f410b773a1dd57b0e1fb28112e1cd8b97bc~1
diff --git a/MagickCore/threshold.c b/MagickCore/threshold.c index a3bb96a2147..f9412bb52e5 100644 --- a/MagickCore/threshold.c +++ b/MagickCore/threshold.c @@ -212,6 +212,8 @@ MagickExport Image *AdaptiveThresholdImage(const Image *image, threshold_image=CloneImage(image,0,0,MagickTrue,exception); if (threshold_...
https://github.com/ImageMagick/ImageMagick/issues/1608
==10393==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x7f8ba61737f0 at pc 0x7f8bb5c0f9fa bp 0x7ffc04d5fad0 sp 0x7ffc04d5fac8 READ of size 4 at 0x7f8ba61737f0 thread T0 #0 0x7f8bb5c0f9f9 in AdaptiveThresholdImage MagickCore/threshold.c:323:33 #1 0x7f8bb51c1cb6 in CLISimpleOperatorImage MagickWand/op...
null
=== https://github.com/ImageMagick/ImageMagick/issues/1608 === Title: heap-buffer-overflow at MagickCore/threshold.c:323:33 in AdaptiveThresholdImage --- Body: ### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have sea...
https://nvd.nist.gov/vuln/detail/CVE-2019-13295
exiv2.cve-2017-14859
An Invalid memory address dereference was discovered in Exiv2::StringValueBase::read in value.cpp in Exiv2 0.26. The vulnerability causes a segmentation fault and application crash, which leads to denial of service.
https://bugzilla.redhat.com/show_bug.cgi?id=1494780
https://github.com/Exiv2/exiv2/commit/8a586c74bbe3fbca64e86e42a42282c73f427607, https://github.com/Exiv2/exiv2/commit/c686843e205e06abb9f30ccb15a191749e2ec01f, https://github.com/Exiv2/exiv2/commit/75940da0a61a8821a0d42a2c0358b9036b6c1a45
CWE-119
Exiv2/exiv2
8a586c74bbe3fbca64e86e42a42282c73f427607~1
diff --git a/src/tiffvisitor.cpp b/src/tiffvisitor.cpp index 4ab733d475..ef13542e7c 100644 --- a/src/tiffvisitor.cpp +++ b/src/tiffvisitor.cpp @@ -47,6 +47,7 @@ EXIV2_RCSID("@(#) $Id$") #include <iostream> #include <iomanip> #include <cassert> +#include <limits> // ************************************************...
https://bugzilla.redhat.com/show_bug.cgi?id=1494780
null
null
null
https://nvd.nist.gov/vuln/detail/CVE-2017-14859
jq.cve-2023-50246
jq is a command-line JSON processor. Version 1.7 is vulnerable to heap-based buffer overflow. Version 1.7.1 contains a patch for this issue.
https://github.com/jqlang/jq/security/advisories/GHSA-686w-5m7m-54vc
http://www.openwall.com/lists/oss-security/2023/12/15/10, https://github.com/jqlang/jq/commit/71c2ab509a8628dbbad4bc7b3f98a64aa90d3297
CWE-120, CWE-122, CWE-787
jqlang/jq
71c2ab509a8628dbbad4bc7b3f98a64aa90d3297~1
diff --git a/NEWS.md b/NEWS.md index 913be89879..14a594ba70 100644 --- a/NEWS.md +++ b/NEWS.md @@ -2,7 +2,7 @@ ## Security -- CVE-2023-50246: .... +- CVE-2023-50246: Fix heap buffer overflow in jvp\_literal\_number\_literal - CVE-2023-50268: fix stack-buffer-overflow if comparing nan with payload ## CLI change...
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=64574
null
null
null
https://nvd.nist.gov/vuln/detail/CVE-2023-50246
njs.cve-2020-24348
njs through 0.4.3, used in NGINX, has an out-of-bounds read in njs_json_stringify_iterator in njs_json.c.
https://github.com/nginx/njs/issues/322
https://github.com/nginx/njs/commit/63aa001ebd7a386939851cf8b2c0332d718f5c23
CWE-125
nginx/njs
63aa001ebd7a386939851cf8b2c0332d718f5c23~1
diff --git a/src/njs_json.c b/src/njs_json.c index 6bbf13b1f..2a2e4dd87 100644 --- a/src/njs_json.c +++ b/src/njs_json.c @@ -1296,7 +1296,18 @@ njs_json_stringify_iterator(njs_vm_t *vm, njs_json_stringify_t *stringify, njs_json_stringify_indent(stringify, &chain, 0); } - strin...
https://github.com/nginx/njs/issues/322
AddressSanitizer:DEADLYSIGNAL ================================================================= ==181398==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000040 (pc 0x7f2cbf620477 bp 0x7fff1a082ad0 sp 0x7fff1a082288 T0) ==181398==The signal is caused by a READ memory access. ==181398==Hint: address points to t...
ASan (inferred)
=== https://github.com/nginx/njs/issues/322 === Title: Segfault in njs_json_stringify_iterator --- Body: Version:`0.4.2`, git commit `32a70c899c1f136fbc3f97fcc050d59e0bd8c6a5` POC: ```javascript var array = []; var funky; funky = { get value() { array[10000000] = 12; } }; for (var i = 0; i < 10; i++) ...
https://nvd.nist.gov/vuln/detail/CVE-2020-24348
libdwarf.cve-2022-34299
There is a heap-based buffer over-read in libdwarf 0.4.0. This issue is related to dwarf_global_formref_b.
https://github.com/davea42/libdwarf-code/issues/119
https://github.com/davea42/libdwarf-code/commit/7ef09e1fc9ba07653dd078edb2408631c7969162
CWE-125
davea42/libdwarf-code
7ef09e1fc9ba07653dd078edb2408631c7969162~1
diff --git a/src/lib/libdwarf/dwarf_form.c b/src/lib/libdwarf/dwarf_form.c index 8e8e23090..fe4b013ef 100644 --- a/src/lib/libdwarf/dwarf_form.c +++ b/src/lib/libdwarf/dwarf_form.c @@ -605,7 +605,6 @@ find_sig8_target_as_global_offset(Dwarf_Attribute attr, Dwarf_Bool targ_is_info = 0; Dwarf_Off localoff = 0;...
https://github.com/davea42/libdwarf-code/issues/119
================================================================= ==3946410==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x61b000000697 at pc 0x0000005d9f2d bp 0x7fffffff94f0 sp 0x7fffffff94e8 READ of size 8 at 0x61b000000697 thread T0 #0 0x5d9f2c in dwarf_global_formref_b /libdwarf/SRC/src/lib/libdwar...
null
=== https://github.com/davea42/libdwarf-code/issues/119 === Title: heap overflow in dwarf_global_formref_b --- Body: asan output: ``` ================================================================= ==3946410==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x61b000000697 at pc 0x0000005d9f2d bp 0x7fff...
https://nvd.nist.gov/vuln/detail/CVE-2022-34299
gpac.cve-2023-46927
GPAC 2.3-DEV-rev605-gfc9e29089-master contains a heap-buffer-overflow in gf_isom_use_compact_size gpac/src/isomedia/isom_write.c:3403:3 in gpac/MP4Box.
null
https://github.com/gpac/gpac/commit/a7b467b151d9b54badbc4dd71e7a366b7c391817
CWE-787
gpac/gpac
a7b467b151d9b54badbc4dd71e7a366b7c391817~1
diff --git a/src/isomedia/isom_write.c b/src/isomedia/isom_write.c index 11e3f1c37d..8ed3043a9b 100644 --- a/src/isomedia/isom_write.c +++ b/src/isomedia/isom_write.c @@ -359,7 +359,7 @@ static GF_Err gf_isom_set_root_iod(GF_ISOFile *movie) GF_IsomInitialObjectDescriptor *iod; GF_IsomObjectDescriptor *od; GF_Err ...
https://github.com/gpac/gpac/issues/2657
================================================================= ==3459603==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000006b71 at pc 0x0000004a2c4f bp 0x7ffffffec1a0 sp 0x7ffffffeb968 WRITE of size 4 at 0x602000006b71 thread T0 #0 0x4a2c4e in __asan_memset (/afltest/gpac/bin/gcc/MP4Box+0x4a2c4...
ASan (inferred)
=== https://github.com/gpac/gpac/issues/2657 === Title: heap-buffer-overflow in gf_isom_use_compact_size gpac/src/isomedia/isom_write.c:3403:3 in gpac/gpac --- Body: # heap-buffer-overflow in gf_isom_use_compact_size gpac/src/isomedia/isom_write.c:3403:3 in gpac/gpac ### Description Heap-buffer-overflow in MP4B...
https://nvd.nist.gov/vuln/detail/CVE-2023-46927
php.cve-2017-12933
The finish_nested_data function in ext/standard/var_unserializer.re in PHP before 5.6.31, 7.0.x before 7.0.21, and 7.1.x before 7.1.7 is prone to a buffer over-read while unserializing untrusted data. Exploitation of this issue can have an unspecified impact on the integrity of PHP.
null
null
CWE-125
null
fb59213fc461f079bc218abf44cb5e2b4db2182c
null
https://bugs.php.net/bug.php?id=74111
null
null
null
https://nvd.nist.gov/vuln/detail/CVE-2017-12933
exiv2.cve-2017-18005
Exiv2 0.26 has a Null Pointer Dereference in the Exiv2::DataValue::toLong function in value.cpp, related to crafted metadata in a TIFF file.
https://github.com/Exiv2/exiv2/issues/168
https://github.com/Exiv2/exiv2/commit/1c76ecbd66263b2ed14c82e41917ab3d7e8b0ef9
CWE-476
Exiv2/exiv2, a17r/exiv2
a9f7e7c9b47ba59bca88be0d91ac0a7b1c03d89c~1
diff --git a/src/actions.cpp b/src/actions.cpp index 0ebe850..12f2c4a 100644 --- a/src/actions.cpp +++ b/src/actions.cpp @@ -702,8 +702,9 @@ namespace Action { << std::setfill(' ') << std::right << md.size(); } - if (Params::instance().printItems_ & Params::...
https://github.com/Exiv2/exiv2/issues/168
==4728==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x557dc0c47468 bp 0x7fff7558bbb0 sp 0x7fff7558bbb0 T0) ==4728==The signal is caused by a READ memory access. ==4728==Hint: address points to the zero page. #0 0x557dc0c47467 in Exiv2::DataValue::toLong(long) const /home/ksg/exiv2/src/value....
null
=== https://github.com/Exiv2/exiv2/issues/168 === Title: CVE-2017-18005: NULL Pointer Dereference while extracting metadata of a malformed tiff --- Body: There's a NULL Pointer Dereference occurring during the metadata extraction from a malformed tiff file. This can be triggered by running `./exiv2 -v pr -P EIXxgkln...
https://nvd.nist.gov/vuln/detail/CVE-2017-18005
matio.cve-2019-9037
An issue was discovered in libmatio.a in matio (aka MAT File I/O Library) 1.5.13. There is a buffer over-read in the function Mat_VarPrint() in mat.c.
https://github.com/TeamSeri0us/pocs/tree/master/matio
https://github.com/tbeu/matio/commit/2c20d2178017b3eb13ab160cef239648f9915bdb
CWE-125
tbeu/matio
a0539135c9b1ab7613aa7953279da9224da88775~1
diff --git a/src/mat.c b/src/mat.c index a0bc257..6380504 100644 --- a/src/mat.c +++ b/src/mat.c @@ -873,7 +873,7 @@ Mat_VarCreate(const char *name,enum matio_classes class_type, while ( fields[nfields] != NULL ) nfields++; if ( nmemb ) - nfields...
https://github.com/tbeu/matio/issues/103
$ tools/matdump ~/pocs/matio/ReadNextFunctionHandle@mat5.c_1837-26___heap-buffer-overflow ================================================================= ==29570==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60200000efd0 at pc 0x7f5b9c14f9fe bp...
null
=== https://github.com/tbeu/matio/issues/103 === Title: some memory corruption problems when the library parse the mat file --- Body: I found several memory corruption problem in the library. More details can be found at [here](https://github.com/TeamSeri0us/pocs/tree/master/matio). --- Comment #1 by PhilipMorris...
https://nvd.nist.gov/vuln/detail/CVE-2019-9037
imagemagick.cve-2019-13310
ImageMagick 7.0.8-50 Q16 has memory leaks at AcquireMagickMemory because of an error in MagickWand/mogrify.c.
https://github.com/ImageMagick/ImageMagick/issues/1616
https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d, https://github.com/ImageMagick/ImageMagick/issues/1616, https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51
CWE-401
ImageMagick/ImageMagick
5f21230b657ccd65452dd3d94c5b5401ba691a2d~1
diff --git a/MagickWand/mogrify.c b/MagickWand/mogrify.c index 82b3c0c1c4a..150b6792304 100644 --- a/MagickWand/mogrify.c +++ b/MagickWand/mogrify.c @@ -7908,6 +7908,8 @@ WandExport MagickBooleanType MogrifyImageList(ImageInfo *image_info, &distortion,exception); if (difference_image == (Ima...
https://github.com/ImageMagick/ImageMagick/issues/1616
null
null
=== https://github.com/ImageMagick/ImageMagick/issues/1616 === Title: memory leaks is detected at AcquireMagickMemory --- Body: ### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open](https://github.com/...
https://nvd.nist.gov/vuln/detail/CVE-2019-13310
qpdf.cve-2021-36978
QPDF 9.x through 9.1.1 and 10.x through 10.0.4 has a heap-based buffer overflow in Pl_ASCII85Decoder::write (called from Pl_AES_PDF::flush and Pl_AES_PDF::finish) when a certain downstream write fails.
null
https://github.com/qpdf/qpdf/commit/dc92574c10f3e2516ec6445b88c5d584f40df4e5
CWE-787
qpdf/qpdf
dc92574c10f3e2516ec6445b88c5d584f40df4e5~1
diff --git a/ChangeLog b/ChangeLog index 2db53cb8..1e31efb4 100644 --- a/ChangeLog +++ b/ChangeLog @@ -1,3 +1,9 @@ +2021-01-04 Jay Berkenbilt <ejb@ql.org> + + * Move getNext()->write() calls in some pipelines to ensure that + state gates properly reset even if the next pipeline's write + throws an exception (fuzz iss...
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=28262, https://github.com/qpdf/qpdf/issues/492
==28751==ERROR: AddressSanitizer: heap-use-after-free on address 0x6070000076c5 at pc 0x0000008799bc bp 0x7fffffff6a30 sp 0x7fffffff6a28 WRITE of size 1 at 0x6070000076c5 thread T0 #0 0x8799bb in Pl_ASCII85Decoder::write(unsigned char*, unsigned long) /src/qpdf/libqpdf/Pl_ASCII85Decoder.cc:85:32 #1 0x877725 in ...
null
=== https://github.com/qpdf/qpdf/issues/492 === Title: Heap-use-after-free in `Pl_ASCII85Decoder::write` --- Body: - version: 10.0.4 - commit: 78b9d6bfd4cbd3e947b1c5ffe73eb97b040e312a - How to reproduce: qpdf_afl_fuzzer ./poc The log from ASAN: ``` ==28751==ERROR: AddressSanitizer: heap-use-after-free on addre...
https://nvd.nist.gov/vuln/detail/CVE-2021-36978
imagemagick.cve-2019-13296
ImageMagick 7.0.8-50 Q16 has direct memory leaks in AcquireMagickMemory because of an error in CLIListOperatorImages in MagickWand/operation.c for a NULL value.
https://github.com/ImageMagick/ImageMagick/issues/1604
https://github.com/ImageMagick/ImageMagick/commit/ce08a3691a8ac29125e29fc41967b3737fa3f425, https://github.com/ImageMagick/ImageMagick/issues/1604
CWE-401
ImageMagick/ImageMagick
ce08a3691a8ac29125e29fc41967b3737fa3f425~1
diff --git a/MagickWand/operation.c b/MagickWand/operation.c index f53cf6dca7c..2edf8d4b873 100644 --- a/MagickWand/operation.c +++ b/MagickWand/operation.c @@ -3868,7 +3868,10 @@ WandPrivate MagickBooleanType CLIListOperatorImages(MagickCLI *cli_wand, reconstruct_image=RemoveFirstImageFromList(&_images); ...
https://github.com/ImageMagick/ImageMagick/issues/1604
==5674==ERROR: LeakSanitizer: detected memory leaks Direct leak of 13504 byte(s) in 1 object(s) allocated from: #0 0x4e5397 in __interceptor_malloc (install/bin/magick+0x4e5397) #1 0x7fdfed7f4146 in AcquireMagickMemory MagickCore/memory.c:478:10 #2 0x7fdfed7a1154 in AcquireCriticalMemory ./MagickCore/memor...
null
=== https://github.com/ImageMagick/ImageMagick/issues/1604 === Title: Direct memory leaks in AcquireMagickMemory and indirect memory leaks --- Body: ### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [ope...
https://nvd.nist.gov/vuln/detail/CVE-2019-13296
readstat.cve-2018-5698
libreadstat.a in WizardMac ReadStat 0.1.1 has a heap-based buffer over-read via an unterminated string.
https://github.com/WizardMac/ReadStat/issues/108
https://github.com/WizardMac/ReadStat/commit/79793dba3b665ff037ca60140441a6679a8971cf
CWE-125
WizardMac/ReadStat
79793dba3b665ff037ca60140441a6679a8971cf~1
diff --git a/src/bin/readstat.c b/src/bin/readstat.c index 032dce5e..4c088f92 100644 --- a/src/bin/readstat.c +++ b/src/bin/readstat.c @@ -85,7 +85,7 @@ int can_write(rs_module_t *modules, long modules_count, char *filename) { } static void handle_error(const char *msg, void *ctx) { - fprintf(stderr, "%s", msg);...
https://github.com/WizardMac/ReadStat/issues/108
================================================================= ==19976==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6030000000b2 at pc 0x000000448071 bp 0x7fff0960c110 sp 0x7fff0960b8c0 READ of size 19 at 0x6030000000b2 thread T0 #0 0x448070 (/home/test/libfuzz/new/ReadStat/build/bin/readstat+0x4...
null
=== https://github.com/WizardMac/ReadStat/issues/108 === Title: Heap overflow in ReadStat --- Body: ReadStat version 1.0-prerelease Ubuntu 16.04 x86_64 git log ``` commit 2330b36f536705a23a50e9cbd9f0f72b38b0be98 Author: Evan Miller <emmiller@gmail.com> Date: Wed Jan 10 20:26:31 2018 -0500 SAS7BDAT: F...
https://nvd.nist.gov/vuln/detail/CVE-2018-5698
njs.cve-2022-43284
Nginx NJS v0.7.2 to v0.7.4 was discovered to contain a segmentation violation via njs_scope_valid_value at njs_scope.h. NOTE: the vendor disputes the significance of this report because NJS does not operate on untrusted input.
https://github.com/nginx/njs/issues/470, https://github.com/nginx/njs/issues/529
https://github.com/nginx/njs/commit/04f59f9defeeb618260e620bb11466741c0e41e5
null
nginx/njs
04f59f9defeeb618260e620bb11466741c0e41e5~1
diff --git a/src/njs_vmcode.c b/src/njs_vmcode.c index ae1d1bb4f..9833ada03 100644 --- a/src/njs_vmcode.c +++ b/src/njs_vmcode.c @@ -1259,9 +1259,9 @@ njs_vmcode_function_copy(njs_vm_t *vm, njs_value_t *value, njs_index_t retidx) njs_value_t *retval; njs_function_t *function; - retval = njs_scope_va...
https://github.com/nginx/njs/issues/470, https://github.com/nginx/njs/issues/529
AddressSanitizer:DEADLYSIGNAL ================================================================= ==2064564==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x0000004e36b5 bp 0x7ffd26e5c130 sp 0x7ffd26e5b920 T0) ==2064564==The signal is caused by a READ memory access. ==2064564==Hint: address points t...
null
=== https://github.com/nginx/njs/issues/470 === Title: SEGV njs_scope.h:85:10 in njs_scope_valid_value --- Body: ### Environment ``` OS : Linux ubuntu 5.13.0-27-generic #29~20.04.1-Ubuntu SMP Fri Jan 14 00:32:30 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux Commit : 7bd570b39297d3d91902c93a624c89b08be7a6fe Vers...
https://nvd.nist.gov/vuln/detail/CVE-2022-43284
imagemagick.cve-2019-17541
ImageMagick before 7.0.8-55 has a use-after-free in DestroyStringInfo in MagickCore/string.c because the error manager is mishandled in coders/jpeg.c.
https://github.com/ImageMagick/ImageMagick/issues/1641
https://github.com/ImageMagick/ImageMagick/commit/39f226a9c137f547e12afde972eeba7551124493, https://github.com/ImageMagick/ImageMagick/compare/7.0.8-54...7.0.8-55, https://github.com/ImageMagick/ImageMagick/issues/1641
CWE-416
ImageMagick/ImageMagick
39f226a9c137f547e12afde972eeba7551124493~1
diff --git a/ChangeLog b/ChangeLog index cba66b8b7fe..52dcc9bc8ab 100644 --- a/ChangeLog +++ b/ChangeLog @@ -1,16 +1,23 @@ +2019-07-18 7.0.8-55 Cristy <quetzlzacatenango@image...> + * Release ImageMagick version 7.0.8-55, GIT revision 15... + +2019-07-18 7.0.8-55 Cristy <quetzlzacatenango@image...> + * Heap-buffe...
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15827, https://github.com/ImageMagick/ImageMagick/issues/1641
==29840==ERROR: AddressSanitizer: heap-use-after-free on address 0x60400000af68 at pc 0x7f9e79581fab bp 0x7fff303409f0 sp 0x7fff303409e0 READ of size 8 at 0x60400000af68 thread T0 #0 0x7f9e79581faa in DestroyStringInfo MagickCore/string.c:853 #1 0x7f9e7985ebaf in ReadJPEGImage coders/jpeg.c:1198 #2 0x7f9e79...
ASan (inferred)
=== https://github.com/ImageMagick/ImageMagick/issues/1641 === Title: heap-buffer-overflow at MagickCore/string.c:853 in DestroyStringInfo --- Body: ### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open...
https://nvd.nist.gov/vuln/detail/CVE-2019-17541
openjpeg.cve-2016-10507
Integer overflow vulnerability in the bmp24toimage function in convertbmp.c in OpenJPEG before 2.2.0 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted bmp file.
null
https://github.com/uclouvain/openjpeg/commit/da940424816e11d624362ce080bc026adffa26e8, https://github.com/uclouvain/openjpeg/issues/833
CWE-190
uclouvain/openjpeg
da940424816e11d624362ce080bc026adffa26e8~1
diff --git a/src/bin/jp2/convertbmp.c b/src/bin/jp2/convertbmp.c index d264823f0..ae83077ca 100644 --- a/src/bin/jp2/convertbmp.c +++ b/src/bin/jp2/convertbmp.c @@ -675,10 +675,28 @@ opj_image_t* bmptoimage(const char *filename, opj_cparameters_t *parameters) } } + if (Info_h.biWidth == 0 || Info_h.biHeight == ...
https://github.com/uclouvain/openjpeg/commit/da940424816e11d624362ce080bc026adffa26e8, https://github.com/uclouvain/openjpeg/issues/833
==3498==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60200000eff5 at pc 0x00000041ced5 bp 0x7ffddcd299b0 sp 0x7ffddcd299a0 READ of size 1 at 0x60200000eff5 thread T0 #0 0x41ced4 in bmp24toimage openjpeg/src/bin/jp2/convertbmp.c:150 #1 0x42273c in bmptoimage openjpeg/src/bin/jp2/convertbmp.c:747 ...
null
=== https://github.com/uclouvain/openjpeg/issues/833 === Title: [CVE-2016-10507] Out-of-Bounds Read in function bmp24toimage of convertbmp.c --- Body: # DESCRIPTION An Out-of-Bounds Read issue was found in function bmp24toimage of convertbmp.c. The root cause of this issue was an Integer Overflow issue. The opj_comp...
https://nvd.nist.gov/vuln/detail/CVE-2016-10507
openjpeg.cve-2021-3575
A heap-based buffer overflow was found in openjpeg in color.c:379:42 in sycc420_to_rgb when decompressing a crafted .j2k file. An attacker could use this to execute arbitrary code with the permissions of the application compiled against openjpeg.
https://github.com/uclouvain/openjpeg/issues/1347
https://github.com/uclouvain/openjpeg/commit/89bf51c782639d5799d1378d28470d8bef312eca
CWE-787
uclouvain/openjpeg
89bf51c782639d5799d1378d28470d8bef312eca~1
diff --git a/src/bin/common/color.c b/src/bin/common/color.c index 27f15f137..ae5d648da 100644 --- a/src/bin/common/color.c +++ b/src/bin/common/color.c @@ -358,7 +358,15 @@ static void sycc420_to_rgb(opj_image_t *img) if (i < loopmaxh) { size_t j; - for (j = 0U; j < (maxw & ~(size_t)1U); j += 2U...
https://bugzilla.redhat.com/show_bug.cgi?id=1957616, https://github.com/uclouvain/openjpeg/issues/1347
================================================================= ==2371124==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x612000000760 at pc 0x0000004f278c bp 0x7ffd11a3eca0 sp 0x7ffd11a3ec98 READ of size 4 at 0x612000000760 thread T0 #0 0x4f278b in sycc420_to_rgb /home/yuawn/fuzz-targets/openjpeg/rep...
null
=== https://github.com/uclouvain/openjpeg/issues/1347 === Title: Heap-buffer-overflow in color.c:379:42 in sycc420_to_rgb --- Body: Hi, I found a vulnerability in current master [0bda718](https://github.com/uclouvain/openjpeg/commit/0bda7188b7b545232a341f1d978b1e4feda46fc2), and I also reproduced it on latest releas...
https://nvd.nist.gov/vuln/detail/CVE-2021-3575
exiv2.cve-2017-14864
An Invalid memory address dereference was discovered in Exiv2::getULong in types.cpp in Exiv2 0.26. The vulnerability causes a segmentation fault and application crash, which leads to denial of service.
https://bugzilla.redhat.com/show_bug.cgi?id=1494467
https://github.com/Exiv2/exiv2/commit/8a586c74bbe3fbca64e86e42a42282c73f427607
CWE-119
Exiv2/exiv2
8a586c74bbe3fbca64e86e42a42282c73f427607~1
diff --git a/src/tiffvisitor.cpp b/src/tiffvisitor.cpp index 4ab733d475..ef13542e7c 100644 --- a/src/tiffvisitor.cpp +++ b/src/tiffvisitor.cpp @@ -47,6 +47,7 @@ EXIV2_RCSID("@(#) $Id$") #include <iostream> #include <iomanip> #include <cassert> +#include <limits> // ************************************************...
https://bugzilla.redhat.com/show_bug.cgi?id=1494467
null
null
null
https://nvd.nist.gov/vuln/detail/CVE-2017-14864
openjpeg.cve-2017-14041
A stack-based buffer overflow was discovered in the pgxtoimage function in bin/jp2/convert.c in OpenJPEG 2.2.0. The vulnerability causes an out-of-bounds write, which may lead to remote denial of service or possibly remote code execution.
null
https://blogs.gentoo.org/ago/2017/08/28/openjpeg-stack-based-buffer-overflow-write-in-pgxtoimage-convert-c/, https://github.com/uclouvain/openjpeg/commit/e5285319229a5d77bf316bb0d3a6cbd3cb8666d9, https://github.com/uclouvain/openjpeg/issues/997
CWE-787
uclouvain/openjpeg
e5285319229a5d77bf316bb0d3a6cbd3cb8666d9~1
diff --git a/src/bin/jp2/convert.c b/src/bin/jp2/convert.c index 5459f7d44..e606c9be7 100644 --- a/src/bin/jp2/convert.c +++ b/src/bin/jp2/convert.c @@ -1185,7 +1185,7 @@ opj_image_t* pgxtoimage(const char *filename, opj_cparameters_t *parameters) } fseek(f, 0, SEEK_SET); - if (fscanf(f, "PG%[ \t]%c%c%[ ...
https://github.com/uclouvain/openjpeg/commit/e5285319229a5d77bf316bb0d3a6cbd3cb8666d9, https://github.com/uclouvain/openjpeg/issues/997
==159529==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7fde59900160 at pc 0x000000450bef bp 0x7ffe7641f3c0 sp 0x7ffe7641eb70 WRITE of size 36 at 0x7fde59900160 thread T0 #0 0x450bee in scanf_common /var/tmp/portage/sys-libs/compiler-rt-sanitizers-4.0.1/work/compiler-rt-4.0.1.src/lib/asan/../sanitizer...
ASan (inferred)
=== https://github.com/uclouvain/openjpeg/issues/997 === Title: stack-based buffer overflow write in pgxtoimage (/convert.c) --- Body: On master, I didn't try on 2.2.0: ``` # opj_compress -n 1 -i $FILE -o null.j2k ==159529==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7fde59900160 at pc 0x00000045...
https://nvd.nist.gov/vuln/detail/CVE-2017-14041
upx.cve-2023-23457
A Segmentation fault was found in UPX in PackLinuxElf64::invert_pt_dynamic() in p_lx_elf.cpp. An attacker with a crafted input file allows invalid memory address access that could lead to a denial of service.
https://github.com/upx/upx/issues/631
https://bugzilla.redhat.com/show_bug.cgi?id=2160382, https://github.com/upx/upx/commit/779b648c5f6aa9b33f4728f79dd4d0efec0bf860, https://github.com/upx/upx/issues/631
CWE-119
upx/upx
779b648c5f6aa9b33f4728f79dd4d0efec0bf860~1
diff --git a/src/p_lx_elf.cpp b/src/p_lx_elf.cpp index fa55470f75..b698ee0a2c 100644 --- a/src/p_lx_elf.cpp +++ b/src/p_lx_elf.cpp @@ -256,7 +256,8 @@ PackLinuxElf32::PackLinuxElf32help1(InputFile *f) e_phnum = get_te16(&ehdri.e_phnum); e_shnum = get_te16(&ehdri.e_shnum); unsigned const e_phentsize = get...
https://bugzilla.redhat.com/show_bug.cgi?id=2160382, https://github.com/upx/upx/issues/631
Ultimate Packer for eXecutables Copyright (C) 1996 - 2022 UPX git-fdec47+ Markus Oberhumer, Laszlo Molnar & John Reiser Nov 16th 2022 File size Ratio Format Name -------------------- ------ ----------- ----------- ASAN:SIGSEGV =============================...
null
=== https://github.com/upx/upx/issues/631 === Title: SEGV on PackLinuxElf64::invert_pt_dynamic --- Body: This issue tracker is **ONLY** used for reporting bugs. Please use [stackoverflow](https://stackoverflow.com) for supporting issues. <!--- IF YOU REMOVE THIS TEMPLATE WE WILL CLOSE YOUR ISSUE WITHOUT RESPON...
https://nvd.nist.gov/vuln/detail/CVE-2023-23457
imagemagick.cve-2017-11540
When ImageMagick 7.0.6-1 processes a crafted file in convert, it can lead to a heap-based buffer over-read in the GetPixelIndex() function, called from the WritePICONImage function in coders/xpm.c.
https://github.com/ImageMagick/ImageMagick/issues/581
https://github.com/ImageMagick/ImageMagick/commit/20635b9b859fc649f7682ab08a4c58c644a94bf5
CWE-125
ImageMagick/ImageMagick
20635b9b859fc649f7682ab08a4c58c644a94bf5~1
diff --git a/coders/xpm.c b/coders/xpm.c index 1469fe445dd..26c71be1a74 100644 --- a/coders/xpm.c +++ b/coders/xpm.c @@ -826,7 +826,7 @@ static MagickBooleanType WritePICONImage(const ImageInfo *image_info, symbol[j]='\0'; (void) CopyMagickString(buffer,symbol,MagickPathExtent); (void) WriteBlobStr...
https://github.com/ImageMagick/ImageMagick/issues/581
================================================================= ==43957==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x61d000017a88 at pc 0x7f298fbefc28 bp 0x7fff46d63780 sp 0x7fff46d63770 READ of size 4 at 0x61d000017a88 thread T0 #0 0x7f298fbefc27 in GetPixelIndex MagickCore/pixel-accessor.h:191 ...
null
=== https://github.com/ImageMagick/ImageMagick/issues/581 === Title: Heap-Overflow in GetPixelIndex() MagickCore/pixel-accessor.h --- Body: Crash Link : https://raw.githubusercontent.com/lcatro/My_PoC/master/ImageMagick/heap-overflow_output_picon_READ_GetPixelIndex Trigger Command : ./magick convert heap-overflo...
https://nvd.nist.gov/vuln/detail/CVE-2017-11540
libjpeg-turbo.cve-2020-13790
libjpeg-turbo 2.0.4, and mozjpeg 4.0.0, has a heap-based buffer over-read in get_rgb_row() in rdppm.c via a malformed PPM input file.
https://github.com/libjpeg-turbo/libjpeg-turbo/issues/433
https://github.com/libjpeg-turbo/libjpeg-turbo/commit/3de15e0c344d11d4b90f4a47136467053eb2d09a
CWE-125
libjpeg-turbo/libjpeg-turbo
3de15e0c344d11d4b90f4a47136467053eb2d09a~1
diff --git a/ChangeLog.md b/ChangeLog.md index d63ad90f6..ab58b9bd0 100644 --- a/ChangeLog.md +++ b/ChangeLog.md @@ -13,6 +13,12 @@ TurboJPEG Java API that caused an error ("java.lang.IllegalStateException: No source image is associated with this instance") when attempting to use that method to compress a YUV image. ...
https://github.com/libjpeg-turbo/libjpeg-turbo/issues/433
==2127==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x62900000417f at pc 0x55f48a780991 bp 0x7ffccfe84010 sp 0x7ffccfe84000 READ of size 1 at 0x62900000417f thread T0 #0 0x55f48a780990 in get_rgb_row libjpeg-turbo/rdppm.c:434 #1 0x55f48a77cadd in main libjpeg-turbo/cjpeg.c:664 #2 0x7f9476b50b96...
null
=== https://github.com/libjpeg-turbo/libjpeg-turbo/issues/433 === Title: Heap-based buffer over-read in get_rgb_row() in rdppm.c --- Body: **Have you searched the existing issues (both open and closed) in the libjpeg-turbo issue tracker to ensure that this bug report is not a duplicate?** Yes **Does this bug repo...
https://nvd.nist.gov/vuln/detail/CVE-2020-13790
imagemagick.cve-2018-5246
In ImageMagick 7.0.7-17 Q16, there are memory leaks in ReadPATTERNImage in coders/pattern.c.
https://github.com/ImageMagick/ImageMagick/issues/929
https://github.com/ImageMagick/ImageMagick/commit/1c3dd700bbb17837ee6f540aff3eafc76262accf
CWE-772
ImageMagick/ImageMagick
1c3dd700bbb17837ee6f540aff3eafc76262accf~1
diff --git a/coders/pattern.c b/coders/pattern.c index bb22c1604f7..a5893c70e76 100644 --- a/coders/pattern.c +++ b/coders/pattern.c @@ -977,7 +977,10 @@ static Image *ReadPATTERNImage(const ImageInfo *image_info, break; } if (blob == (const void *) NULL) - ThrowReaderException(OptionError,"Unreco...
https://github.com/ImageMagick/ImageMagick/issues/929
==108470==ERROR: LeakSanitizer: detected memory leaks Direct leak of 13024 byte(s) in 1 object(s) allocated from: #0 0x4b9ad3 in malloc (/usr/local/bin/magick+0x4b9ad3) #1 0x7f1281f6b7dd in AcquireCriticalMemory /home/ubuntu/ImageMagick/./MagickCore/memory-private.h:57:10 #2 0x7f1281f74d29 in AcquireImageI...
null
=== https://github.com/ImageMagick/ImageMagick/issues/929 === Title: memory leaks --- Body: ubuntu@ubuntu:~/fuzz_py$ magick -version Version: ImageMagick 7.0.7-17 Q16 x86_64 2017-12-26 http://www.imagemagick.org Copyright: © 1999-2018 ImageMagick Studio LLC License: http://www.imagemagick.org/script/license.php F...
https://nvd.nist.gov/vuln/detail/CVE-2018-5246
mruby.cve-2022-1212
Use-After-Free in str_escape in mruby/mruby in GitHub repository mruby/mruby prior to 3.2. Possible arbitrary code execution if being exploited.
https://huntr.dev/bounties/9fcc06d0-08e4-49c8-afda-2cae40946abe
https://github.com/mruby/mruby/commit/3cf291f72224715942beaf8553e42ba8891ab3c6, https://huntr.dev/bounties/9fcc06d0-08e4-49c8-afda-2cae40946abe
CWE-416
mruby/mruby
3cf291f72224715942beaf8553e42ba8891ab3c6~1
diff --git a/src/vm.c b/src/vm.c index 3796f41738..6d61386b31 100644 --- a/src/vm.c +++ b/src/vm.c @@ -2268,9 +2268,9 @@ mrb_vm_exec(mrb_state *mrb, const struct RProc *proc, const mrb_code *pc) } if (ci->cci > CINFO_NONE) { ci = cipop(mrb); + mrb->exc = (struct RObject*)br...
https://huntr.dev/bounties/9fcc06d0-08e4-49c8-afda-2cae40946abe
null
ASan (inferred)
null
https://nvd.nist.gov/vuln/detail/CVE-2022-1212
upx.cve-2020-27787
A Segmentaation fault was found in UPX in invert_pt_dynamic() function in p_lx_elf.cpp. An attacker with a crafted input file allows invalid memory address access that could lead to a denial of service.
https://github.com/upx/upx/issues/333
https://github.com/upx/upx/commit/e2f60adc95334f47e286838dac33160819c5d74d, https://github.com/upx/upx/issues/333
CWE-119
upx/upx
e2f60adc95334f47e286838dac33160819c5d74d~1
diff --git a/src/p_lx_elf.cpp b/src/p_lx_elf.cpp index 96f5838d6f..7034948702 100644 --- a/src/p_lx_elf.cpp +++ b/src/p_lx_elf.cpp @@ -1639,8 +1639,8 @@ PackLinuxElf32::invert_pt_dynamic(Elf32_Dyn const *dynp) unsigned const *const buckets = &hashtab[2]; unsigned const *const chains = &buckets[nbucket...
https://github.com/upx/upx/issues/333
==11637==ERROR: AddressSanitizer: SEGV on unknown address 0x632000014810 (pc 0x00000087d00d bp 0x7ffedceeaf20 sp 0x7ffedceeaef0 T0) #0 0x87d00c in acc_ua_get_le64(void const*) /home/upx_tc/upx_debug_2/src/miniacc.h:6208 #1 0x45eace in get_le64(void const*) /home/upx_tc/upx_debug_2/src/bele.h:184 #2 0x883e8f...
null
=== https://github.com/upx/upx/issues/333 === Title: Segmentation fault in PackLinuxElf64::invert_pt_dynamic at p_lx_elf.cpp:5173 --- Body: ## Environment A crafted input will lead to crash in p_lx_elf.cpp at UPX 3.96(latest version,git clone from branch devel) upx 3.96-git-1bb93d4fce9f+ UCL data compression lib...
https://nvd.nist.gov/vuln/detail/CVE-2020-27787
gpac.cve-2024-50664
gpac 2.4 contains a heap-buffer-overflow at isomedia/sample_descs.c:1799 in gf_isom_new_mpha_description in gpac/MP4Box.
https://github.com/gpac/gpac/issues/2988
https://github.com/Mu-L/gpac/commit/56ce0b952a0a3cbd39ec1b41237df062f9648cb9
CWE-120, CWE-787
Mu-L/gpac
56ce0b952a0a3cbd39ec1b41237df062f9648cb9~1
diff --git a/src/isomedia/sample_descs.c b/src/isomedia/sample_descs.c index cc130141a3..b900e3b56f 100644 --- a/src/isomedia/sample_descs.c +++ b/src/isomedia/sample_descs.c @@ -1157,7 +1157,7 @@ GF_Err gf_isom_xml_subtitle_get_description(GF_ISOFile *the_file, u32 trackNumbe entry = (GF_MetaDataSampleEntryBox *)g...
https://github.com/gpac/gpac/issues/2988
================================================================= ==3389396==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000003751 at pc 0x7f740dee42c3 bp 0x7ffc60ecac00 sp 0x7ffc60eca3a8 WRITE of size 14 at 0x602000003751 thread T0 #0 0x7f740dee42c2 in __interceptor_memcpy ../../../../src/libsani...
ASan (inferred)
=== https://github.com/gpac/gpac/issues/2988 === Title: heap-buffer-overflow at isomedia/sample_descs.c:1799 in gf_isom_new_mpha_description in gpac/MP4Box --- Body: ### Description Dear developers, We found the following heap buffer overflow bug on gpac(version 2.4), please confirm. The latest master branc...
https://nvd.nist.gov/vuln/detail/CVE-2024-50664
libredwg.cve-2020-6612
GNU LibreDWG 0.9.3.2564 has a heap-based buffer over-read in copy_compressed_bytes in decode_r2007.c.
https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447169
null
CWE-125
LibreDWG/libredwg
null
null
https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447169
null
null
=== https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447169 === Title: Several bugs found by fuzzing --- Body: Hi, After fuzzing libredwg, I found the following bugs on the latest commit on master. Command: ./dwg2svg2 $PoC **1.heap-buffer-overflow in read_pages_map ../../src/decode_r2007.c:1007** P...
https://nvd.nist.gov/vuln/detail/CVE-2020-6612
libmodbus.cve-2022-0367
A heap-based buffer overflow flaw was found in libmodbus in function modbus_reply() in src/modbus.c.
https://github.com/stephane/libmodbus/issues/614
https://github.com/stephane/libmodbus/commit/b4ef4c17d618eba0adccc4c7d9e9a1ef809fc9b6, https://github.com/stephane/libmodbus/issues/614
CWE-119, CWE-787
stephane/libmodbus
b4ef4c17d618eba0adccc4c7d9e9a1ef809fc9b6~1
diff --git a/src/modbus.c b/src/modbus.c index 99f333b85..e13bd0df7 100644 --- a/src/modbus.c +++ b/src/modbus.c @@ -961,7 +961,7 @@ int modbus_reply(modbus_t *ctx, const uint8_t *req, nb_write, nb, MODBUS_MAX_WR_WRITE_REGISTERS, MODBUS_MAX_WR_READ_REGISTERS); } else if (mapping_address < 0 ||...
https://bugzilla.redhat.com/show_bug.cgi?id=2045571, https://github.com/stephane/libmodbus/issues/614
AddressSanitizer:DEADLYSIGNAL ================================================================= ==174549==ERROR: AddressSanitizer: SEGV on unknown address 0x605ffffffec8 (pc 0x7fd8514abc62 bp 0x7ffebf02e730 sp 0x7ffebf02dcc0 T0) ==174549==The signal is caused by a WRITE memory access. #0 0x7fd8514abc62 in modbus_re...
null
=== https://github.com/stephane/libmodbus/issues/614 === Title: Heap-based Buffer Overflow in modbus_reply --- Body: ## libmodbus version ebc4f4788678eda8d99e23be87c61a662a9d26b7 ## OS and/or distribution Ubuntu 20.04 focal ## Environment ,AMD EPYC 7742 64-Core @ 16x 2.25GHz ## Description Heap-b...
https://nvd.nist.gov/vuln/detail/CVE-2022-0367
faad2.cve-2021-32278
An issue was discovered in faad2 through 2.10.0. A heap-buffer-overflow exists in the function lt_prediction located in lt_predict.c. It allows an attacker to cause code Execution.
https://github.com/knik0/faad2/issues/62
https://github.com/awesie/faad2/commit/e19a5e491354e0e4664d02b796dacee28fb2521e
CWE-787
awesie/faad2
e19a5e491354e0e4664d02b796dacee28fb2521e~1
diff --git a/libfaad/syntax.c b/libfaad/syntax.c index 5df254ff..c71c67a2 100644 --- a/libfaad/syntax.c +++ b/libfaad/syntax.c @@ -884,7 +884,10 @@ static uint8_t ics_info(NeAACDecStruct *hDecoder, ic_stream *ics, bitfile *ld, if ((ics->ltp.data_present = faad_get1bit(ld DE...
https://github.com/knik0/faad2/issues/62
================================================================= ==13979==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x620000003006 at pc 0x0000005e1605 bp 0x7ffc00e45c30 sp 0x7ffc00e45c28 READ of size 2 at 0x620000003006 thread T0 #0 0x5e1604 in lt_prediction /home/seviezhou/faad2/libfaad/lt_predict...
ASan (inferred)
=== https://github.com/knik0/faad2/issues/62 === Title: A heap-buffer-overflow in lt_predict.c:108:36 --- Body: ## System info Ubuntu x86_64, clang 6.0, faad (latest master [f71b5e](https://github.com/knik0/faad2/commit/f71b5e81f563d94fa284977a326520d269d8353e)) ## Configure CFLAGS="-g -fsanitize=address" LD...
https://nvd.nist.gov/vuln/detail/CVE-2021-32278
matio.cve-2020-19497
Integer overflow vulnerability in Mat_VarReadNextInfo5 in mat5.c in tbeu matio (aka MAT File I/O Library) 1.5.17, allows attackers to cause a Denial of Service or possibly other unspecified impacts.
https://github.com/tbeu/matio/issues/121
https://github.com/tbeu/matio/commit/5fa49ef9fc4368fe3d19b5fdaa36d8fa5e7f4606, https://github.com/tbeu/matio/issues/121
CWE-190
tbeu/matio
5fa49ef9fc4368fe3d19b5fdaa36d8fa5e7f4606~1
diff --git a/src/mat5.c b/src/mat5.c index abdb351e..78e2f4fe 100644 --- a/src/mat5.c +++ b/src/mat5.c @@ -1009,9 +1009,16 @@ ReadNextCell( mat_t *mat, matvar_t *matvar ) if ( uncomp_buf[0] == MAT_T_INT8 ) { /* Name not in tag */ mat_uint32_t len = uncomp_buf[1]; - ...
https://github.com/tbeu/matio/issues/121
==17186==ERROR: AddressSanitizer: SEGV on unknown address 0x60210000efcf (pc 0x7ff5bd4a42ce bp 0x7ffd873b9460 sp 0x7ffd873b9230 T0) #0 0x7ff5bd4a42cd in Mat_VarReadNextInfo5 ../../src/mat5.c:4983 #1 0x7ff5bd4b8c57 in Mat_VarReadNextInfo ../../src/mat.c:2311 #2 0x408122 in main ../../tools/matdump.c:942 ...
null
=== https://github.com/tbeu/matio/issues/121 === Title: SEGV in mat5.c:4983 --- Body: Hi, I found a crash in mat5.c:4983 (the latest commit `bcf0447` on master). PoC: https://github.com/strongcourage/PoCs/blob/master/matio_bcf0447/PoC_segv_Mat_VarReadNextInfo5 Command: matdump $PoC ASAN says: ~~~ ==17186==ERROR...
https://nvd.nist.gov/vuln/detail/CVE-2020-19497
njs.cve-2023-27730
Nginx NJS v0.7.10 was discovered to contain a segmentation violation via the function njs_lvlhsh_find at src/njs_lvlhsh.c.
https://github.com/nginx/njs/issues/615
https://github.com/nginx/njs/commit/9cec874582b925e373adb0896b85a112702f6664
CWE-125
nginx/njs
9cec874582b925e373adb0896b85a112702f6664~1
diff --git a/src/njs_array.c b/src/njs_array.c index ec21e60c9..0eb3276f8 100644 --- a/src/njs_array.c +++ b/src/njs_array.c @@ -1404,10 +1404,11 @@ njs_array_prototype_to_string(njs_vm_t *vm, njs_value_t *args, njs_uint_t nargs, static const njs_value_t join_string = njs_string("join"); - if (njs_is_objec...
https://github.com/nginx/njs/issues/615
==21471==ERROR: AddressSanitizer: SEGV on unknown address 0x00000000726f (pc 0x0000004cde74 bp 0x7ffcd78018d0 sp 0x7ffcd78018d0 T0) ==21471==The signal is caused by a READ memory access. #0 0x4cde74 in njs_lvlhsh_find /root/njs/src/njs_lvlhsh.c:176:16 #1 0x51efff in njs_object_property /root/njs/src/njs_object_...
null
=== https://github.com/nginx/njs/issues/615 === Title: SEGV src/njs_lvlhsh.c:176:16 in njs_lvlhsh_find --- Body: Environment ``` commit: 4c1e23326e1c30e4e051bf588bfc1aaa63954976 version: 0.7.10 Build : ./configure --cc=clang --address-sanitizer=YES make ``` Poc ```js const v1 = URIError();...
https://nvd.nist.gov/vuln/detail/CVE-2023-27730
imagemagick.cve-2019-13302
ImageMagick 7.0.8-50 Q16 has a heap-based buffer over-read in MagickCore/fourier.c in ComplexImages.
https://github.com/ImageMagick/ImageMagick/issues/1597
https://github.com/ImageMagick/ImageMagick/commit/d5089971bd792311aaab5cb73460326d7ef7f32d, https://github.com/ImageMagick/ImageMagick/issues/1597
CWE-125
ImageMagick/ImageMagick
d5089971bd792311aaab5cb73460326d7ef7f32d~1
diff --git a/MagickCore/fourier.c b/MagickCore/fourier.c index 24b3824201f..47c3ccd2eaa 100644 --- a/MagickCore/fourier.c +++ b/MagickCore/fourier.c @@ -164,6 +164,9 @@ MagickExport Image *ComplexImages(const Image *images,const ComplexOperator op, MagickOffsetType progress; + size_t + number_channels; + ...
https://github.com/ImageMagick/ImageMagick/issues/1597
==16842==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x61e000000a80 at pc 0x7fea5bb0c52f bp 0x7fff5c11c590 sp 0x7fff5c11c588 READ of size 4 at 0x61e000000a80 thread T0 #0 0x7fea5bb0c52e in ComplexImages MagickCore/fourier.c:305:45 #1 0x7fea5b3328c1 in CLIListOperatorImages MagickWand/operation.c:38...
null
=== https://github.com/ImageMagick/ImageMagick/issues/1597 === Title: heap-buffer-overflow in MagickCore/fourier.c:305:45 in ComplexImages --- Body: ### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have searched [open...
https://nvd.nist.gov/vuln/detail/CVE-2019-13302
mruby.cve-2018-12249
An issue was discovered in mruby 1.4.1. There is a NULL pointer dereference in mrb_class_real because "class BasicObject" is not properly supported in class.c.
https://github.com/mruby/mruby/issues/4037
https://github.com/mruby/mruby/commit/faa4eaf6803bd11669bc324b4c34e7162286bfa3
CWE-476
mruby/mruby
faa4eaf6803bd11669bc324b4c34e7162286bfa3~1
diff --git a/src/class.c b/src/class.c index c761f46af1..a9439d7d7d 100644 --- a/src/class.c +++ b/src/class.c @@ -1763,10 +1763,10 @@ mrb_class_path(mrb_state *mrb, struct RClass *c) MRB_API struct RClass* mrb_class_real(struct RClass* cl) { - if (cl == 0) - return NULL; + if (cl == 0) return NULL; while ((...
https://github.com/mruby/mruby/issues/4037
ASAN:DEADLYSIGNAL ================================================================= ==26786==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x00010d1fdfbe bp 0x7ffee2a2e4f0 sp 0x7ffee2a2e4b0 T0) ==26786==The signal is caused by a READ memory access. ==26786==Hint: address points to the zero page. ...
null
=== https://github.com/mruby/mruby/issues/4037 === Title: Null pointer dereference in mrb_class_real --- Body: The following input demonstrates a crash: ```ruby BasicObject.prepend Enumerable class BasicObject < Class end ``` ASAN report: ``` ASAN:DEADLYSIGNAL ==============================================...
https://nvd.nist.gov/vuln/detail/CVE-2018-12249
md4c.cve-2020-26148
md_push_block_bytes in md4c.c in md4c 0.4.5 allows attackers to trigger use of uninitialized memory, and cause a denial of service (e.g., assertion failure) via a malformed Markdown document.
https://github.com/mity/md4c/issues/130
https://github.com/mity/md4c/commit/22ca89a3008966c4316d6b0a158b1a49f9038df0
CWE-908
mity/md4c
db7d1c92ec34cae9624be373726e36f22a7d7019
diff --git a/CHANGELOG.md b/CHANGELOG.md index 5176d975..d7967d27 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -2,6 +2,16 @@ # MD4C Change Log +## Next Version (Work in Progress) + +Fixes: + +* [#130](https://github.com/mity/md4c/issues/130): + Fix `ISANYOF` macro, which could provide unexpected results when e...
https://github.com/mity/md4c/issues/130
==257142==WARNING: MemorySanitizer: use-of-uninitialized-value #0 0x7f6d02f3e5ed in md_push_block_bytes /home/fcambus/md4c-release-0.4.5/src/md4c.c:4848:12 #1 0x7f6d02f3e5ed in md_start_new_block /home/fcambus/md4c-release-0.4.5/src/md4c.c:4868:25 #2 0x7f6d02f3e5ed in md_process_line /home/fcambus/md4c-rele...
null
=== https://github.com/mity/md4c/issues/130 === [error fetching issue: 403 Client Error: rate limit exceeded for url: https://api.github.com/repos/mity/md4c/issues/130]
https://nvd.nist.gov/vuln/detail/CVE-2020-26148
matio.cve-2019-20018
A stack-based buffer over-read was discovered in ReadNextCell in mat5.c in matio 1.5.17.
https://github.com/tbeu/matio/issues/129
https://github.com/tbeu/matio/commit/65831b7ec829b0ae0ac9d691a2f8fbc2b26af677
CWE-125
tbeu/matio
65831b7ec829b0ae0ac9d691a2f8fbc2b26af677~1
diff --git a/src/mat5.c b/src/mat5.c index b76a3316..5e3464e5 100644 --- a/src/mat5.c +++ b/src/mat5.c @@ -989,10 +989,26 @@ ReadNextCell( mat_t *mat, matvar_t *matvar ) /* Rank and Dimension */ if ( uncomp_buf[0] == MAT_T_INT32 ) { int j; + size...
https://github.com/tbeu/matio/issues/129
./matdump 003-stackoverflow-ReadNextCell-mat51001 InflateRankDims: inflate returned data error ================================================================= ==41935==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7ffdd5e70bb0 at pc 0x7f134197a587 bp 0x7ffdd5e70a20 sp 0x7ffdd5e70a10 READ of size 4 at 0...
null
=== https://github.com/tbeu/matio/issues/129 === [error fetching issue: 403 Client Error: rate limit exceeded for url: https://api.github.com/repos/tbeu/matio/issues/129]
https://nvd.nist.gov/vuln/detail/CVE-2019-20018
njs.cve-2019-13617
njs through 0.3.3, used in NGINX, has a heap-based buffer over-read in nxt_vsprintf in nxt/nxt_sprintf.c during error handling, as demonstrated by an njs_regexp_literal call that leads to an njs_parser_lexer_error call and then an njs_parser_scope_error call.
https://github.com/nginx/njs/issues/174
https://github.com/nginx/njs/commit/ee400ea880dc46bb02c4be2564b183c114d4cd42
CWE-125
nginx/njs
ee400ea880dc46bb02c4be2564b183c114d4cd42~1
diff --git a/src/njs_regexp.c b/src/njs_regexp.c index c488ce09f..038cbfef5 100644 --- a/src/njs_regexp.c +++ b/src/njs_regexp.c @@ -333,14 +333,22 @@ njs_regexp_literal(njs_vm_t *vm, njs_parser_t *parser, njs_value_t *value) goto failed; case '[': - while (++p < lexer->end && *p != '...
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15093, https://github.com/nginx/njs/issues/174
==16711==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x61100000039b at pc 0x0000004dc4e2 bp 0x7ffc117a8770 sp 0x7ffc117a7f20 READ of size 217 at 0x61100000039b thread T0 #0 0x4dc4e1 in __asan_memcpy (/home/fuzz/Desktop/fuzzproject/njs/build/njs+0x4dc4e1) #1 0x521ce2 in nxt_vsprintf /home/fuzz/Deskt...
null
=== https://github.com/nginx/njs/issues/174 === [error fetching issue: 403 Client Error: rate limit exceeded for url: https://api.github.com/repos/nginx/njs/issues/174]
https://nvd.nist.gov/vuln/detail/CVE-2019-13617
njs.cve-2022-27007
nginx njs 0.7.2 is affected suffers from Use-after-free in njs_function_frame_alloc() when it try to invoke from a restored frame saved with njs_function_frame_save().
https://github.com/nginx/njs/issues/469
https://github.com/nginx/njs/commit/ad48705bf1f04b4221a5f5b07715ac48b3160d53, https://github.com/nginx/njs/issues/469
CWE-416
nginx/njs
ad48705bf1f04b4221a5f5b07715ac48b3160d53~1
diff --git a/src/njs_function.c b/src/njs_function.c index c9d4d9732..78857e01e 100644 --- a/src/njs_function.c +++ b/src/njs_function.c @@ -811,9 +811,13 @@ njs_function_frame_save(njs_vm_t *vm, njs_frame_t *frame, u_char *pc) njs_native_frame_t *active, *native; *frame = *vm->active_frame; + frame->...
https://github.com/nginx/njs/issues/469
null
ASan (inferred)
=== https://github.com/nginx/njs/issues/469 === [error fetching issue: 403 Client Error: rate limit exceeded for url: https://api.github.com/repos/nginx/njs/issues/469]
https://nvd.nist.gov/vuln/detail/CVE-2022-27007
gpac.cve-2023-4754
Out-of-bounds Write in GitHub repository gpac/gpac prior to 2.3-DEV.
https://huntr.dev/bounties/b7ed24ad-7d0b-40b7-8f4d-3c18a906620c
https://github.com/gpac/gpac/commit/7e2e92feb1b30fac1d659f6620d743b5a188ffe0, https://huntr.dev/bounties/b7ed24ad-7d0b-40b7-8f4d-3c18a906620c
CWE-787
gpac/gpac
7e2e92feb1b30fac1d659f6620d743b5a188ffe0~1
diff --git a/src/scene_manager/swf_parse.c b/src/scene_manager/swf_parse.c index f4b974aab5..2afa80c3e8 100644 --- a/src/scene_manager/swf_parse.c +++ b/src/scene_manager/swf_parse.c @@ -1426,7 +1426,7 @@ static GF_Err swf_def_font(SWFReader *read, u32 revision) count = swf_get_16(read); ft->nbGlyphs = count / 2;...
https://huntr.dev/bounties/b7ed24ad-7d0b-40b7-8f4d-3c18a906620c
null
ASan (inferred)
null
https://nvd.nist.gov/vuln/detail/CVE-2023-4754
gpac.cve-2021-32437
The gf_hinter_finalize function in GPAC 1.0.1 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command.
https://github.com/gpac/gpac/issues/1770
https://github.com/gpac/gpac/commit/1653f31cf874eb6df964bea88d58d8e9b98b485e
CWE-476
gpac/gpac
1653f31cf874eb6df964bea88d58d8e9b98b485e~1
diff --git a/src/media_tools/isom_hinter.c b/src/media_tools/isom_hinter.c index c05d38ccca..9bff67767a 100644 --- a/src/media_tools/isom_hinter.c +++ b/src/media_tools/isom_hinter.c @@ -1233,7 +1233,7 @@ GF_Err gf_hinter_finalize(GF_ISOFile *file, GF_SDP_IODProfile IOD_Profile, u32 b esd = gf_isom_get_esd(file, sce...
https://github.com/gpac/gpac/issues/1770
AddressSanitizer:DEADLYSIGNAL ================================================================= ==1042==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x7fc3d4e76d0b bp 0x7ffd390b09a0 sp 0x7ffd390ae160 T0) ==1042==The signal is caused by a READ memory access. ==1042==Hint: address points to the zer...
null
=== https://github.com/gpac/gpac/issues/1770 === [error fetching issue: 403 Client Error: rate limit exceeded for url: https://api.github.com/repos/gpac/gpac/issues/1770]
https://nvd.nist.gov/vuln/detail/CVE-2021-32437
gpac.cve-2023-4755
Use After Free in GitHub repository gpac/gpac prior to 2.3-DEV.
https://huntr.dev/bounties/463474b7-a4e8-42b6-8b30-e648a77ee6b3
https://github.com/gpac/gpac/commit/895ac12da168435eb8db3f96978ffa4c69d66c3a, https://huntr.dev/bounties/463474b7-a4e8-42b6-8b30-e648a77ee6b3
CWE-416
gpac/gpac
895ac12da168435eb8db3f96978ffa4c69d66c3a~1
diff --git a/src/filters/mux_isom.c b/src/filters/mux_isom.c index 4044ef11fc..e9bc42231f 100644 --- a/src/filters/mux_isom.c +++ b/src/filters/mux_isom.c @@ -3991,6 +3991,7 @@ static GF_Err mp4_mux_configure_pid(GF_Filter *filter, GF_FilterPid *pid, Bool i TrackWriter *tkw = gf_filter_pid_get_udta(pid); if (tkw)...
https://huntr.dev/bounties/463474b7-a4e8-42b6-8b30-e648a77ee6b3
null
null
null
https://nvd.nist.gov/vuln/detail/CVE-2023-4755
gpac.cve-2021-32440
The Media_RewriteODFrame function in GPAC 1.0.1 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command.
https://github.com/gpac/gpac/issues/1772
https://github.com/gpac/gpac/commit/f0ba83717b6e4d7a15a1676d1fe06152e199b011
CWE-476
gpac/gpac
f0ba83717b6e4d7a15a1676d1fe06152e199b011~1
diff --git a/src/isomedia/media_odf.c b/src/isomedia/media_odf.c index 33c41a36f1..76ecf9d135 100644 --- a/src/isomedia/media_odf.c +++ b/src/isomedia/media_odf.c @@ -131,8 +131,9 @@ GF_Err Media_RewriteODFrame(GF_MediaBox *mdia, GF_ISOSample *sample) //then rewrite the ESDesc j=0; while ((ref = (GF_ES_I...
https://github.com/gpac/gpac/issues/1772
AddressSanitizer:DEADLYSIGNAL ================================================================= ==29303==ERROR: AddressSanitizer: SEGV on unknown address 0x602000021b70 (pc 0x7fc90a84caa9 bp 0x7ffee2653e40 sp 0x7ffee2653da0 T0) ==29303==The signal is caused by a READ memory access. #0 0x7fc90a84caa8 in Media_Rewrit...
null
=== https://github.com/gpac/gpac/issues/1772 === [error fetching issue: 403 Client Error: rate limit exceeded for url: https://api.github.com/repos/gpac/gpac/issues/1772]
https://nvd.nist.gov/vuln/detail/CVE-2021-32440
gpac.cve-2023-42298
An issue in GPAC GPAC v.2.2.1 and before allows a local attacker to cause a denial of service via the Q_DecCoordOnUnitSphere function of file src/bifs/unquantize.c.
null
https://github.com/gpac/gpac/pull/2568/changes/16c4fafc2881112eba7051cac48f922eb2b94e06
CWE-190
gpac/gpac
941a0891b989f5ad86b739cfb12c84b7e62e8ee4
diff --git a/src/bifs/unquantize.c b/src/bifs/unquantize.c index 008a830982..f0a124cb55 100644 --- a/src/bifs/unquantize.c +++ b/src/bifs/unquantize.c @@ -284,7 +284,7 @@ GF_Err Q_DecCoordOnUnitSphere(GF_BifsDecoder *codec, GF_BitStream *bs, u32 NbBit s32 value; Fixed tang[4], delta; s32 dir; - if (NbBits>32) ret...
https://github.com/gpac/gpac/issues/2567
bifs/unquantize.c:298:43: runtime error: shift exponent 4294967295 is too large for 32-bit type 'int' SUMMARY: UndefinedBehaviorSanitizer: undefined-behavior bifs/unquantize.c:298:43 in
null
=== https://github.com/gpac/gpac/issues/2567 === [error fetching issue: 403 Client Error: rate limit exceeded for url: https://api.github.com/repos/gpac/gpac/issues/2567]
https://nvd.nist.gov/vuln/detail/CVE-2023-42298
libredwg.cve-2020-21817
A null pointer dereference issue exists in GNU LibreDWG 0.10.2641 via htmlescape ../../programs/escape.c:29. which causes a denial of service (application crash).
https://github.com/LibreDWG/libredwg/issues/182#issue-547887727
https://github.com/LibreDWG/libredwg/issues/182#issue-547887727
CWE-476
LibreDWG/libredwg
null
null
https://github.com/LibreDWG/libredwg/issues/182#issue-547887727
null
null
=== https://github.com/LibreDWG/libredwg/issues/182#issue-547887727 === [error fetching issue: 403 Client Error: rate limit exceeded for url: https://api.github.com/repos/LibreDWG/libredwg/issues/182]
https://nvd.nist.gov/vuln/detail/CVE-2020-21817
gpac.cve-2023-41000
GPAC through 2.2.1 has a use-after-free vulnerability in the function gf_bifs_flush_command_list in bifs/memory_decoder.c.
https://github.com/gpac/gpac/issues/2550
https://github.com/gpac/gpac/commit/0018b5e4e07a1465287e7dff69b387929f5a75fa
CWE-416
gpac/gpac
0018b5e4e07a1465287e7dff69b387929f5a75fa~1
diff --git a/src/bifs/memory_decoder.c b/src/bifs/memory_decoder.c index faf35c16d9..eed7e3fd12 100644 --- a/src/bifs/memory_decoder.c +++ b/src/bifs/memory_decoder.c @@ -902,6 +902,8 @@ GF_Err BM_ParseCommand(GF_BifsDecoder *codec, GF_BitStream *bs, GF_List *com_lis GF_SceneGraph *cur_graph = codec->current_graph; ...
https://github.com/gpac/gpac/issues/2550
AddressSanitizer:DEADLYSIGNAL ================================================================= ==841115==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x7fae75bd843e bp 0x7ffc7386e7a0 sp 0x7ffc7386e770 T0) ==841115==The signal is caused by a READ memory access. ==841115==Hint: address points to t...
ASan (inferred)
=== https://github.com/gpac/gpac/issues/2550 === [error fetching issue: 403 Client Error: rate limit exceeded for url: https://api.github.com/repos/gpac/gpac/issues/2550]
https://nvd.nist.gov/vuln/detail/CVE-2023-41000
php.cve-2018-12882
exif_read_from_impl in ext/exif/exif.c in PHP 7.2.x through 7.2.7 allows attackers to trigger a use-after-free (in exif_read_from_file) because it closes a stream that it is not responsible for closing. The vulnerable code is reachable through the PHP exif_read_data function.
null
https://bugs.php.net/bug.php?id=76409
CWE-416
null
null
null
https://bugs.php.net/bug.php?id=76409
null
ASan (inferred)
null
https://nvd.nist.gov/vuln/detail/CVE-2018-12882
exiv2.cve-2018-17229
Exiv2::d2Data in types.cpp in Exiv2 v0.26 allows remote attackers to cause a denial of service (heap-based buffer overflow) via a crafted image file.
https://github.com/Exiv2/exiv2/issues/453
https://github.com/Exiv2/exiv2/commit/afb98cbc6e288dc8ea75f3394a347fb9b37abc55
CWE-787
Exiv2/exiv2
afb98cbc6e288dc8ea75f3394a347fb9b37abc55~1
diff --git a/src/tiffimage.cpp b/src/tiffimage.cpp index 8731449cd3..a69c7afd5b 100644 --- a/src/tiffimage.cpp +++ b/src/tiffimage.cpp @@ -191,7 +191,7 @@ namespace Exiv2 { Exiv2::ExifKey key("Exif.Image.InterColorProfile"); Exiv2::ExifData::iterator pos = exifData_.findKey(key); ...
https://github.com/Exiv2/exiv2/issues/453
==29719==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60200000edda at pc 0x7f380fbee411 bp 0x7ffe90b43600 sp 0x7ffe90b435f0 WRITE of size 1 at 0x60200000edda thread T0 #0 0x7f380fbee410 in Exiv2::d2Data(unsigned char*, double, Exiv2::ByteOrder) /home/marsman/Desktop/crashana/exiv2/exiv2-b6a8d39613a286...
null
=== https://github.com/Exiv2/exiv2/issues/453 === [error fetching issue: 403 Client Error: rate limit exceeded for url: https://api.github.com/repos/Exiv2/exiv2/issues/453]
https://nvd.nist.gov/vuln/detail/CVE-2018-17229
libredwg.cve-2021-42585
A heap buffer overflow was discovered in copy_compressed_bytes in decode_r2007.c in dwgread before 0.12.4 via a crafted dwg file.
https://github.com/LibreDWG/libredwg/issues/351
https://github.com/LibreDWG/libredwg/commit/ecf5183d8b3b286afe2a30021353b7116e0208dd
CWE-787
LibreDWG/libredwg
ecf5183d8b3b286afe2a30021353b7116e0208dd~1
diff --git a/src/decode_r2007.c b/src/decode_r2007.c index 3b5af4c4b2..c1e270fc4b 100644 --- a/src/decode_r2007.c +++ b/src/decode_r2007.c @@ -923,7 +923,8 @@ read_sections_map (Bit_Chain *dat, int64_t size_comp, int64_t size_uncomp, #if 1 /* compressed */ if (section->data_size > 10 * dat->size - ...
https://github.com/LibreDWG/libredwg/issues/351
================================================================= ==9485==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6020000002e3 at pc 0x000000ca5f2b bp 0x7ffdbc6926d0 sp 0x7ffdbc6926c8 WRITE of size 8 at 0x6020000002e3 thread T0 #0 0xca5f2a in memcpy /usr/include/x86_64-linux-gnu/bits/string3.h:53...
null
=== https://github.com/LibreDWG/libredwg/issues/351 === [error fetching issue: 403 Client Error: rate limit exceeded for url: https://api.github.com/repos/LibreDWG/libredwg/issues/351]
https://nvd.nist.gov/vuln/detail/CVE-2021-42585
gpac.cve-2023-4681
NULL Pointer Dereference in GitHub repository gpac/gpac prior to 2.3-DEV.
https://huntr.dev/bounties/d67c5619-ab36-41cc-93b7-04828e25f60e
https://github.com/gpac/gpac/commit/4bac19ad854159b21ba70d8ab7c4e1cd1db8ea1c, https://huntr.dev/bounties/d67c5619-ab36-41cc-93b7-04828e25f60e
CWE-476
gpac/gpac
4bac19ad854159b21ba70d8ab7c4e1cd1db8ea1c~1
diff --git a/src/filters/dasher.c b/src/filters/dasher.c index 2619d2291c..bc768804fd 100644 --- a/src/filters/dasher.c +++ b/src/filters/dasher.c @@ -8387,6 +8387,9 @@ static GF_Err dasher_process(GF_Filter *filter) u32 num_ready=0, num_blocked=0; for (i=0; i<count; i++) { GF_DashStream *ds = gf_list_get(ctx...
null
null
null
null
https://nvd.nist.gov/vuln/detail/CVE-2023-4681
exiv2.cve-2018-17230
Exiv2::ul2Data in types.cpp in Exiv2 v0.26 allows remote attackers to cause a denial of service (heap-based buffer overflow) via a crafted image file.
https://github.com/Exiv2/exiv2/issues/455
https://github.com/Exiv2/exiv2/commit/afb98cbc6e288dc8ea75f3394a347fb9b37abc55
CWE-787
Exiv2/exiv2
afb98cbc6e288dc8ea75f3394a347fb9b37abc55~1
diff --git a/src/tiffimage.cpp b/src/tiffimage.cpp index 8731449cd3..a69c7afd5b 100644 --- a/src/tiffimage.cpp +++ b/src/tiffimage.cpp @@ -191,7 +191,7 @@ namespace Exiv2 { Exiv2::ExifKey key("Exif.Image.InterColorProfile"); Exiv2::ExifData::iterator pos = exifData_.findKey(key); ...
https://github.com/Exiv2/exiv2/issues/455
==29742==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60300000cf59 at pc 0x7f79f092888f bp 0x7ffe74e0c920 sp 0x7ffe74e0c910 WRITE of size 1 at 0x60300000cf59 thread T0 #0 0x7f79f092888e in Exiv2::ul2Data(unsigned char*, unsigned int, Exiv2::ByteOrder) /home/marsman/Desktop/crashana/exiv2/exiv2-b6a8d39...
null
=== https://github.com/Exiv2/exiv2/issues/455 === [error fetching issue: 403 Client Error: rate limit exceeded for url: https://api.github.com/repos/Exiv2/exiv2/issues/455]
https://nvd.nist.gov/vuln/detail/CVE-2018-17230
libredwg.cve-2023-36273
LibreDWG v0.12.5 was discovered to contain a heap buffer overflow via the function bit_calc_CRC at bits.c.
https://github.com/LibreDWG/libredwg/issues/677#BUG1
null
CWE-787
LibreDWG/libredwg
null
null
https://github.com/LibreDWG/libredwg/issues/677#BUG1
AddressSanitizer:DEADLYSIGNAL ================================================================= ==78==ERROR: AddressSanitizer: SEGV on unknown address 0x62100a3d71b3 (pc 0x563f38494cff bp 0x7ffd51ea1fa8 sp 0x7ffd51ea09e0 T0) ==78==The signal is caused by a READ memory access. #0 0x563f38494cfe in bit_calc_CRC /libr...
null
=== https://github.com/LibreDWG/libredwg/issues/677#BUG1 === [error fetching issue: 403 Client Error: rate limit exceeded for url: https://api.github.com/repos/LibreDWG/libredwg/issues/677]
https://nvd.nist.gov/vuln/detail/CVE-2023-36273
gpac.cve-2024-50665
gpac 2.4 contains a SEGV at src/isomedia/drm_sample.c:1562:96 in isom_cenc_get_sai_by_saiz_saio in MP4Box.
https://github.com/gpac/gpac/issues/2987
https://github.com/Mu-L/gpac/commit/ba8778cec7bdf5dbb722b4f0fec68e00b796d68e
CWE-476
Mu-L/gpac
ba8778cec7bdf5dbb722b4f0fec68e00b796d68e~1
diff --git a/src/isomedia/drm_sample.c b/src/isomedia/drm_sample.c index a2f69d7627..d9580d3094 100644 --- a/src/isomedia/drm_sample.c +++ b/src/isomedia/drm_sample.c @@ -1559,7 +1559,7 @@ static GF_Err isom_cenc_get_sai_by_saiz_saio(GF_MediaBox *mdia, u32 sampleNumber } if ((nb_saio==1) && !saio_cenc->total_size...
https://github.com/gpac/gpac/issues/2987
AddressSanitizer:DEADLYSIGNAL ================================================================= ==1963314==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x7f4f7ad3f484 bp 0x7ffd649eed20 sp 0x7ffd649eebc0 T0) ==1963314==The signal is caused by a READ memory access. ==1963314==Hint: address points t...
null
=== https://github.com/gpac/gpac/issues/2987 === [error fetching issue: 403 Client Error: rate limit exceeded for url: https://api.github.com/repos/gpac/gpac/issues/2987]
https://nvd.nist.gov/vuln/detail/CVE-2024-50665
gpac.cve-2023-46001
Buffer Overflow vulnerability in gpac MP4Box v.2.3-DEV-rev573-g201320819-master allows a local attacker to cause a denial of service via the gpac/src/isomedia/isom_read.c:2807:51 function in gf_isom_get_user_data.
https://github.com/gpac/gpac/issues/2629
https://github.com/gpac/gpac/commit/e79b0cf7e72404750630bc01340e999f3940dbc4, https://github.com/gpac/gpac/issues/2629
CWE-120
gpac/gpac
e79b0cf7e72404750630bc01340e999f3940dbc4~1
diff --git a/src/isomedia/isom_read.c b/src/isomedia/isom_read.c index 5a8109e2de..60bded7e77 100644 --- a/src/isomedia/isom_read.c +++ b/src/isomedia/isom_read.c @@ -2804,7 +2804,7 @@ GF_Err gf_isom_get_user_data(GF_ISOFile *movie, u32 trackNumber, u32 UserDataTyp i=0; while ((map = (GF_UserDataMap*)gf_list_enum...
https://github.com/gpac/gpac/issues/2629
AddressSanitizer:DEADLYSIGNAL ================================================================= ==4066570==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x7ffff5cc2ed0 bp 0x7ffffffeaf40 sp 0x7ffffffea6d8 T0) ==4066570==The signal is caused by a READ memory access. ==4066570==Hint: address points t...
null
=== https://github.com/gpac/gpac/issues/2629 === [error fetching issue: 403 Client Error: rate limit exceeded for url: https://api.github.com/repos/gpac/gpac/issues/2629]
https://nvd.nist.gov/vuln/detail/CVE-2023-46001
upx.cve-2017-15056
p_lx_elf.cpp in UPX 3.94 mishandles ELF headers, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by an Invalid Pointer Read in PackLinuxElf64::unpack().
null
https://github.com/upx/upx/commit/ef336dbcc6dc8344482f8cf6c909ae96c3286317
CWE-476
upx/upx
ef336dbcc6dc8344482f8cf6c909ae96c3286317~1
diff --git a/src/p_lx_elf.cpp b/src/p_lx_elf.cpp index e6336425c4..9272cf9bac 100644 --- a/src/p_lx_elf.cpp +++ b/src/p_lx_elf.cpp @@ -245,8 +245,15 @@ PackLinuxElf32::PackLinuxElf32help1(InputFile *f) sz_phdrs = 0; return; } + if (0==e_phnum) throwCantUnpack("0==e_phnum"); e_phoff = get_...
https://github.com/upx/upx/issues/128
==18371==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x61a00000bf10 at pc 0x00000068ab40 bp 0x7ffcdf76a020 sp 0x7ffcdf76a018 READ of size 4 at 0x61a00000bf10 thread T0 #0 0x68ab3f in get_le32(void const*) /home/bm/Desktop/Origin/upx/src/./bele.h:164:12 #1 0x68ab3f in N_BELE_RTP::LEPolicy::get32(voi...
null
=== https://github.com/upx/upx/issues/128 === [error fetching issue: 403 Client Error: rate limit exceeded for url: https://api.github.com/repos/upx/upx/issues/128]
https://nvd.nist.gov/vuln/detail/CVE-2017-15056
imagemagick.cve-2019-13311
ImageMagick 7.0.8-50 Q16 has memory leaks at AcquireMagickMemory because of a wand/mogrify.c error.
https://github.com/ImageMagick/ImageMagick/issues/1623
https://github.com/ImageMagick/ImageMagick/commit/4a334bbf5584de37c6f5a47c380a531c8c4b140a, https://github.com/ImageMagick/ImageMagick/issues/1623, https://github.com/ImageMagick/ImageMagick6/commit/bb812022d0bc12107db215c981cab0b1ccd73d91
CWE-401
ImageMagick/ImageMagick
4a334bbf5584de37c6f5a47c380a531c8c4b140a~1
diff --git a/MagickWand/mogrify.c b/MagickWand/mogrify.c index 150b6792304..9f7eb6b551d 100644 --- a/MagickWand/mogrify.c +++ b/MagickWand/mogrify.c @@ -7824,6 +7824,9 @@ WandExport MagickBooleanType MogrifyImageList(ImageInfo *image_info, clut_image=RemoveFirstImageFromList(images); if (clut_...
https://github.com/ImageMagick/ImageMagick/issues/1623
==26664==ERROR: LeakSanitizer: detected memory leaks Direct leak of 13504 byte(s) in 1 object(s) allocated from: #0 0x4e5397 in malloc (install/bin/magick+0x4e5397) #1 0x7f121156ec16 in AcquireMagickMemory MagickCore/memory.c:478:10 #2 0x7f121151bb54 in AcquireCriticalMemory ./MagickCore/memory-private.h:6...
null
=== https://github.com/ImageMagick/ImageMagick/issues/1623 === [error fetching issue: 403 Client Error: rate limit exceeded for url: https://api.github.com/repos/ImageMagick/ImageMagick/issues/1623]
https://nvd.nist.gov/vuln/detail/CVE-2019-13311
md4c.cve-2018-11545
md4c 0.2.5 has a heap-based buffer overflow in md_merge_lines because md_is_link_label mishandles the case of a link label composed solely of backslash escapes.
null
null
CWE-787
mity/md4c
null
null
https://github.com/mity/md4c/issues/39
================================================================= ==21464==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6040000000b1 at pc 0x00000054ff84 bp 0x7fff500be8d0 sp 0x7fff500be8c8 WRITE of size 1 at 0x6040000000b1 thread T0 #0 0x54ff83 in md_merge_lines /home/ubuntu/fuzz/test/md4...
null
=== https://github.com/mity/md4c/issues/39 === [error fetching issue: 403 Client Error: rate limit exceeded for url: https://api.github.com/repos/mity/md4c/issues/39]
https://nvd.nist.gov/vuln/detail/CVE-2018-11545
imagemagick.cve-2019-13297
ImageMagick 7.0.8-50 Q16 has a heap-based buffer over-read at MagickCore/threshold.c in AdaptiveThresholdImage because a height of zero is mishandled.
https://github.com/ImageMagick/ImageMagick/issues/1609
https://github.com/ImageMagick/ImageMagick/commit/604588fc35c7585abb7a9e71f69bb82e4389fefc, https://github.com/ImageMagick/ImageMagick/issues/1609, https://github.com/ImageMagick/ImageMagick6/commit/35c7032723d85eee7318ff6c82f031fa2666b773
CWE-125
ImageMagick/ImageMagick
604588fc35c7585abb7a9e71f69bb82e4389fefc~1
diff --git a/MagickCore/threshold.c b/MagickCore/threshold.c index f9412bb52e5..0c3a488d7e3 100644 --- a/MagickCore/threshold.c +++ b/MagickCore/threshold.c @@ -212,7 +212,7 @@ MagickExport Image *AdaptiveThresholdImage(const Image *image, threshold_image=CloneImage(image,0,0,MagickTrue,exception); if (threshold_...
https://github.com/ImageMagick/ImageMagick/issues/1609
==22189==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x620000001090 at pc 0x7fd7e5dd4be2 bp 0x7ffd816c3a30 sp 0x7ffd816c3a28 READ of size 4 at 0x620000001090 thread T0 #0 0x7fd7e5dd4be1 in AdaptiveThresholdImage MagickCore/threshold.c:328:11 #1 0x7fd7e5386cb6 in CLISimpleOperatorImage MagickWand/op...
null
=== https://github.com/ImageMagick/ImageMagick/issues/1609 === [error fetching issue: 403 Client Error: rate limit exceeded for url: https://api.github.com/repos/ImageMagick/ImageMagick/issues/1609]
https://nvd.nist.gov/vuln/detail/CVE-2019-13297
md4c.cve-2021-30027
md_analyze_line in md4c.c in md4c 0.4.7 allows attackers to trigger use of uninitialized memory, and cause a denial of service via a malformed Markdown document.
https://github.com/mity/md4c/issues/155
https://github.com/mity/md4c/commit/4fc808d8fe8d8904f8525bb4231d854f45e23a19
CWE-908
mity/md4c
4fc808d8fe8d8904f8525bb4231d854f45e23a19~1
diff --git a/CHANGELOG.md b/CHANGELOG.md index 649cf1b1..1067a675 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -21,6 +21,9 @@ Fixes: correctly, even when the blocks are nested at the same line in a complicated ways. + * [#155](https://github.com/mity/md4c/issues/155): + Avoid reading 1 character beyond t...
https://github.com/mity/md4c/issues/155
==2793660==WARNING: MemorySanitizer: use-of-uninitialized-value #0 0x7f021124c622 in md_analyze_line /home/bsdboy/md/md4c-release-0.4.7/src/md4c.c:5985:12 #1 0x7f021122ee27 in md_process_doc /home/bsdboy/md/md4c-release-0.4.7/src/md4c.c:6254:9 #2 0x7f021122dca5 in md_parse /home/bsdboy/md/md4c-release-0.4.7...
null
=== https://github.com/mity/md4c/issues/155 === [error fetching issue: 403 Client Error: rate limit exceeded for url: https://api.github.com/repos/mity/md4c/issues/155]
https://nvd.nist.gov/vuln/detail/CVE-2021-30027
libredwg.cve-2020-23861
A heap-based buffer overflow vulnerability exists in LibreDWG 0.10.1 via the read_system_page function at libredwg-0.10.1/src/decode_r2007.c:666:5, which causes a denial of service by submitting a dwg file.
https://github.com/LibreDWG/libredwg/issues/248
https://github.com/LibreDWG/libredwg/issues/248
CWE-787
LibreDWG/libredwg
null
null
https://github.com/LibreDWG/libredwg/issues/248
==2593==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000000031 at pc 0x0000004e7e12 bp 0x7ffd91a390c0 sp 0x7ffd91a38870 READ of size 96 at 0x602000000031 thread T0 #0 0x4e7e11 in __asan_memcpy /root/Download/llvm-8.0.0.src/projects/compiler-rt-8.0.0.src/lib/asan/asan_interceptors_memintrinsics.cc:2...
null
=== https://github.com/LibreDWG/libredwg/issues/248 === [error fetching issue: 403 Client Error: rate limit exceeded for url: https://api.github.com/repos/LibreDWG/libredwg/issues/248]
https://nvd.nist.gov/vuln/detail/CVE-2020-23861
imagemagick.cve-2022-0284
A heap-based-buffer-over-read flaw was found in ImageMagick's GetPixelAlpha() function of 'pixel-accessor.h'. This vulnerability is triggered when an attacker passes a specially crafted Tagged Image File Format (TIFF) image to convert it into a PICON file format. This issue can potentially lead to a denial of service a...
https://github.com/ImageMagick/ImageMagick/issues/4729
https://bugzilla.redhat.com/show_bug.cgi?id=2045943, https://github.com/ImageMagick/ImageMagick/commit/e50f19fd73c792ebe912df8ab83aa51a243a3da7
CWE-125
ImageMagick/ImageMagick
e50f19fd73c792ebe912df8ab83aa51a243a3da7~1
diff --git a/coders/xpm.c b/coders/xpm.c index 782ed732544..5f73df8bca4 100644 --- a/coders/xpm.c +++ b/coders/xpm.c @@ -773,7 +773,7 @@ static MagickBooleanType WritePICONImage(const ImageInfo *image_info, break; for (x=0; x < (ssize_t) picon->columns; x++) { - if ...
https://access.redhat.com/security/cve/CVE-2022-0284, https://bugzilla.redhat.com/show_bug.cgi?id=2045943, https://github.com/ImageMagick/ImageMagick/issues/4729
==46632==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x62a00000b540 at pc 0x7f7e88ca3257 bp 0x7fffdb9f7370 sp 0x7fffdb9f7360 READ of size 4 at 0x62a00000b540 thread T0 #0 0x7f7e88ca3256 in GetPixelAlpha MagickCore/pixel-accessor.h:59 #1 0x7f7e88ca763e in WritePICONImage coders/xpm.c:807 #2 0x7f...
null
=== https://github.com/ImageMagick/ImageMagick/issues/4729 === [error fetching issue: 403 Client Error: rate limit exceeded for url: https://api.github.com/repos/ImageMagick/ImageMagick/issues/4729]
https://nvd.nist.gov/vuln/detail/CVE-2022-0284
gpac.cve-2023-4758
Buffer Over-read in GitHub repository gpac/gpac prior to 2.3-DEV.
https://huntr.dev/bounties/2f496261-1090-45ac-bc89-cc93c82090d6
https://github.com/gpac/gpac/commit/193633b1648582444fc99776cd741d7ba0125e86, https://github.com/gpac/gpac/commit/3eeaead5369c167c6de9952396ffc398ba659b45
CWE-125, CWE-126
gpac/gpac
cc95b16
diff --git a/src/media_tools/avilib.c b/src/media_tools/avilib.c index 7cdca7d..66e9d0c 100644 --- a/src/media_tools/avilib.c +++ b/src/media_tools/avilib.c @@ -1804,6 +1804,7 @@ int AVI_close(avi_t *AVI) #define ERR_EXIT(x) \ { \ + if (hdrl_data) { gf_free(hdrl_data); hdrl_data=NULL; }\ AVI_close(AVI); \ ...
https://huntr.dev/bounties/2f496261-1090-45ac-bc89-cc93c82090d6
null
null
null
https://nvd.nist.gov/vuln/detail/CVE-2023-4758
libplist.cve-2017-5545
The main function in plistutil.c in libimobiledevice libplist through 1.12 allows attackers to obtain sensitive information from process memory or cause a denial of service (buffer over-read) via Apple Property List data that is too short.
null
https://github.com/libimobiledevice/libplist/commit/eb929319388cb7f48141b3fde062a8392fe4c00d
CWE-125
libimobiledevice/libplist
7a28a14
printf("ERROR: Input file is too small to contain valid plist data.\n"); diff --git a/tools/plistutil.c b/tools/plistutil.c index 6451604..49d05aa 100644 --- a/tools/plistutil.c +++ b/tools/plistutil.c @@ -129,6 +129,12 @@ int main(int argc, char *argv[]) } stat(options->in_file, &filestats); + i...
https://github.com/libimobiledevice/libplist/commit/7391a506352c009fe044dead7baad9e22dd279ee, https://github.com/libimobiledevice/libplist/issues/87
==21852== ERROR: AddressSanitizer: heap-buffer-overflow on address 0xb5e007d7 at pc 0x804a78c bp 0xbf815888 sp 0xbf81587c READ of size 1 at 0xb5e007d7 thread T0 #0 0x804a78b in main /home/b/asan/libplist/tools/plistutil.c:137 #1 0xb5f7fa82 (/lib/i386-linux-gnu/libc.so.6+0x19a82) #2 0x804ad45 in _start (/hom...
null
=== https://github.com/libimobiledevice/libplist/issues/87 === [error fetching issue: 403 Client Error: rate limit exceeded for url: https://api.github.com/repos/libimobiledevice/libplist/issues/87]
https://nvd.nist.gov/vuln/detail/CVE-2017-5545
libredwg.cve-2020-21818
A heap based buffer overflow vulnerability exists in GNU LibreDWG 0.10.2641 via htmlescape ../../programs/escape.c:48.
https://github.com/LibreDWG/libredwg/issues/182#issuecomment-572891053
null
CWE-787
LibreDWG/libredwg
null
null
https://github.com/LibreDWG/libredwg/issues/182#issuecomment-572891053
null
null
=== https://github.com/LibreDWG/libredwg/issues/182#issuecomment-572891053 === [error fetching issue: 403 Client Error: rate limit exceeded for url: https://api.github.com/repos/LibreDWG/libredwg/issues/182]
https://nvd.nist.gov/vuln/detail/CVE-2020-21818
libredwg.cve-2022-33034
LibreDWG v0.12.4.4608 was discovered to contain a stack overflow via the function copy_bytes at decode_r2007.c.
https://github.com/LibreDWG/libredwg/issues/494
null
CWE-787
LibreDWG/libredwg
null
null
https://github.com/LibreDWG/libredwg/issues/494
==9543==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7fffffffc8f0 at pc 0x0000007257bb bp 0x7fffffffbc90 sp 0x7fffffffbc88 WRITE of size 1 at 0x7fffffffc8f0 thread T0 #0 0x7257ba in copy_bytes /testcase/libredwg/src/decode_r2007.c:228:12 #1 0x7257ba in decompress_r2007 /testcase/libredwg/src/deco...
null
=== https://github.com/LibreDWG/libredwg/issues/494 === Title: stack-buffer-overflow exists in the function copy_bytes in decode_r2007.c --- Body: ### system info Ubuntu x86_64, clang 6.0, dwg2dxf([0.12.4.4608](https://github.com/LibreDWG/libredwg/releases/tag/0.12.4.4608)) ### Command line ./programs/dwg2dxf -b...
https://nvd.nist.gov/vuln/detail/CVE-2022-33034
imagemagick.cve-2019-13298
ImageMagick 7.0.8-50 Q16 has a heap-based buffer overflow at MagickCore/pixel-accessor.h in SetPixelViaPixelInfo because of a MagickCore/enhance.c error.
https://github.com/ImageMagick/ImageMagick/issues/1611
https://github.com/ImageMagick/ImageMagick/commit/d4fc44b58a14f76b1ac997517d742ee12c9dc5d3, https://github.com/ImageMagick/ImageMagick/issues/1611
CWE-787
ImageMagick/ImageMagick
d4fc44b58a14f76b1ac997517d742ee12c9dc5d3~1
diff --git a/MagickCore/enhance.c b/MagickCore/enhance.c index ed3202757e2..35346890a40 100644 --- a/MagickCore/enhance.c +++ b/MagickCore/enhance.c @@ -1973,7 +1973,7 @@ MagickExport Image *EnhanceImage(const Image *image,ExceptionInfo *exception) pixel.black=((aggregate.black+total_weight/2.0)/total_weight...
https://github.com/ImageMagick/ImageMagick/issues/1611
================================================================= ==6928==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x7faaff40fa80 at pc 0x7fab0dddcb45 bp 0x7fff3e3ee2b0 sp 0x7fff3e3ee2a8 WRITE of size 4 at 0x7faaff40fa80 thread T0 #0 0x7fab0dddcb44 in SetPixelViaPixelInfo ./MagickCore/pixel-accessor...
null
=== https://github.com/ImageMagick/ImageMagick/issues/1611 === Title: heap-buffer-overflow at MagickCore/pixel-accessor.h:804:56 in SetPixelViaPixelInfo --- Body: ### Prerequisites - [x] I have written a descriptive issue title - [x] I have verified that I am using the latest version of ImageMagick - [x] I have ...
https://nvd.nist.gov/vuln/detail/CVE-2019-13298
imagemagick.cve-2017-18022
In ImageMagick 7.0.7-12 Q16, there are memory leaks in MontageImageCommand in MagickWand/montage.c.
https://github.com/ImageMagick/ImageMagick/issues/904
null
CWE-772
ImageMagick/ImageMagick
null
null
https://github.com/ImageMagick/ImageMagick/issues/904
==116829==ERROR: LeakSanitizer: detected memory leaks Direct leak of 4712 byte(s) in 1 object(s) allocated from: #0 0x4b9ad3 in malloc (/usr/local/bin/magick+0x4b9ad3) #1 0x7ff9bd11fb76 in AcquireCriticalMemory /home/ubuntu/ImageMagick/./MagickCore/memory-private.h:57:10 #2 0x7ff9bd11fb76 in CloneMontageIn...
null
=== https://github.com/ImageMagick/ImageMagick/issues/904 === Title: memory leaks --- Body: system:ubuntu 14.04 64 ubuntu@ubuntu:~/fuzz_py$ magick -version Version: ImageMagick 7.0.7-12 Q16 x86_64 2017-12-19 http://www.imagemagick.org Copyright: © 1999-2017 ImageMagick Studio LLC License: http://www.imagemagick...
https://nvd.nist.gov/vuln/detail/CVE-2017-18022
yara.cve-2016-10211
libyara/grammar.y in YARA 3.5.0 allows remote attackers to cause a denial of service (use-after-free and application crash) via a crafted rule that is mishandled in the yr_parser_lookup_loop_variable function.
https://github.com/VirusTotal/yara/issues/575
https://github.com/VirusTotal/yara/commit/890c3f850293176c0e996a602ffa88b315f4e98f, https://github.com/VirusTotal/yara/issues/575
CWE-416
VirusTotal/yara
890c3f850293176c0e996a602ffa88b315f4e98f~1
diff --git a/libyara/grammar.c b/libyara/grammar.c index 9ab6dfe78e..6e5c46e5e1 100644 --- a/libyara/grammar.c +++ b/libyara/grammar.c @@ -546,16 +546,16 @@ union yyalloc /* YYFINAL -- State number of the termination state. */ #define YYFINAL 2 /* YYLAST -- Last index in YYTABLE. */ -#define YYLAST 408 +#define...
https://github.com/VirusTotal/yara/issues/575
==17551==ERROR: AddressSanitizer: heap-use-after-free on address 0x60200000ed50 at pc 0x000000425ff6 bp 0x7fff57ebe190 sp 0x7fff57ebd920 READ of size 1 at 0x60200000ed50 thread T0 #0 0x425ff5 in __interceptor_strcmp /home/development/llvm/3.9.0/final/llvm.src/projects/compiler-rt/lib/asan/../sanitizer_common/saniti...
ASan (inferred)
=== https://github.com/VirusTotal/yara/issues/575 === Title: Use After Free in yr_parser_lookup_loop_variable() --- Body: **Use After Free in yr_parser_lookup_loop_variable()** Tested on latest Git HEAD: 779b9a77aa4377152a5cba031255029afb0c19a5 [Payload](https://github.com/VirusTotal/yara/files/633374/yara_uaf....
https://nvd.nist.gov/vuln/detail/CVE-2016-10211
mruby.cve-2022-0570
Heap-based Buffer Overflow in Homebrew mruby prior to 3.2.
https://huntr.dev/bounties/65a7632e-f95b-4836-b1a7-9cb95e5124f1
https://github.com/mruby/mruby/commit/47068ae07a5fa3aa9a1879cdfe98a9ce0f339299
CWE-122
mruby/mruby
0ed3fcf
diff --git a/src/vm.c b/src/vm.c index 9cb50847f2..aa5569503e 100644 --- a/src/vm.c +++ b/src/vm.c @@ -689,9 +689,11 @@ mrb_f_send(mrb_state *mrb, mrb_value self) regs = mrb->c->ci->stack+1; if (n == 0) { + argnum_error: mrb_argnum_error(mrb, 0, 1, -1); } else if (n == 15) { + if (RARRAY_LEN(regs...
null
null
null
null
https://nvd.nist.gov/vuln/detail/CVE-2022-0570
matio.cve-2019-20017
A stack-based buffer over-read was discovered in Mat_VarReadNextInfo5 in mat5.c in matio 1.5.17.
https://github.com/tbeu/matio/issues/127
null
CWE-125
tbeu/matio
null
null
https://github.com/tbeu/matio/issues/127
./matdump 001-stackover-Mat_VarReadNextInfo5_mat54915 InflateRankDims: inflate returned data error ================================================================= ==31427==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7ffcc32c92d0 at pc 0x7fcd463809a6 bp 0x7ffcc32c90c0 sp 0x7ffcc32c90b0 READ of size 4 ...
null
=== https://github.com/tbeu/matio/issues/127 === Title: There is a stack-based buffer overflow in the Mat_VarReadNextInfo5 function of mat5.c(at 4915) --- Body: A crafted input will lead to crash in mat5.c at matio 1.5.17. Triggered by ./matdump POC Poc [001-stackover-Mat_VarReadNextInfo5_mat54915](https://gith...
https://nvd.nist.gov/vuln/detail/CVE-2019-20017
matio.cve-2019-9035
An issue was discovered in libmatio.a in matio (aka MAT File I/O Library) 1.5.13. There is a stack-based buffer over-read in the function ReadNextStructField() in mat5.c.
https://github.com/TeamSeri0us/pocs/tree/master/matio
null
CWE-125
TeamSeri0us/pocs
null
null
https://github.com/tbeu/matio/issues/103
$ tools/matdump ~/pocs/matio/ReadNextFunctionHandle@mat5.c_1837-26___heap-buffer-overflow ================================================================= ==29570==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60200000efd0 at pc 0x7f5b9c14f9fe bp...
null
=== https://github.com/tbeu/matio/issues/103 === Title: some memory corruption problems when the library parse the mat file --- Body: I found several memory corruption problem in the library. More details can be found at [here](https://github.com/TeamSeri0us/pocs/tree/master/matio). --- Comment #1 by PhilipMorris...
https://nvd.nist.gov/vuln/detail/CVE-2019-9035
libxls.cve-2023-38855
Buffer Overflow vulnerability in libxlsv.1.6.2 allows a remote attacker to execute arbitrary code and cause a denial of service via a crafted XLS file to the get_string function in xlstool.c:395.
https://github.com/libxls/libxls/issues/124
null
CWE-787
libxls/libxls
null
null
https://github.com/libxls/libxls/issues/124
==54038==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000001070 at pc 0x0000004cf305 bp 0x7fff55151350 sp 0x7fff55151348 READ of size 2 at 0x602000001070 thread T0 #0 0x4cf304 in xls_parseWorkBook /libxls/src/xls.c:1015:37 #1 0x4d7ee5 in xls_open_ole /libxls/src/xls.c:1480:14 #2 0x4c5b4d in...
null
=== https://github.com/libxls/libxls/issues/124 === [error fetching issue: 403 Client Error: rate limit exceeded for url: https://api.github.com/repos/libxls/libxls/issues/124]
https://nvd.nist.gov/vuln/detail/CVE-2023-38855
mruby.cve-2022-0630
Out-of-bounds Read in Homebrew mruby prior to 3.2.
https://huntr.dev/bounties/f7cdd680-1a7f-4992-b4b8-44b5e4ba3e32
https://github.com/mruby/mruby/commit/ee06bbb4177a0c65aab9b3006f0f15fe9f3503fd
CWE-125
mruby/mruby
ecb28f4
diff --git a/src/vm.c b/src/vm.c index 6133cbc..52c6405 100644 --- a/src/vm.c +++ b/src/vm.c @@ -2776,7 +2776,7 @@ RETRY_TRY_BLOCK: CASE(OP_HASHCAT, B) { mrb_value hash = regs[a]; - mrb_assert(mrb_hash_p(hash)); + mrb_ensure_hash_type(mrb, hash); mrb_hash_merge(mrb, hash, regs[a+1]); ...
null
null
ASan (inferred)
null
https://nvd.nist.gov/vuln/detail/CVE-2022-0630
libredwg.cve-2020-21819
A heap based buffer overflow vulnerability exists in GNU LibreDWG 0.10.2641via htmlescape ../../programs/escape.c:51.
https://github.com/LibreDWG/libredwg/issues/182#issuecomment-572890901
https://github.com/LibreDWG/libredwg/issues/182#issuecomment-572890901
CWE-787
LibreDWG/libredwg
null
null
https://github.com/LibreDWG/libredwg/issues/182#issuecomment-572890901
================================================================= ==19607==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x7f433bb56646 bp 0x7ffed1176670 sp 0x7ffed1175de8 T0) ==19607==The signal is caused by a READ memory access. ==19607==Hint: address points to the zero page. #0 0x7f433bb566...
null
=== https://github.com/LibreDWG/libredwg/issues/182#issuecomment-572890901 === [error fetching issue: 403 Client Error: rate limit exceeded for url: https://api.github.com/repos/LibreDWG/libredwg/issues/182]
https://nvd.nist.gov/vuln/detail/CVE-2020-21819
gpac.cve-2021-32439
Buffer overflow in the stbl_AppendSize function in MP4Box in GPAC 1.0.1 allows attackers to cause a denial of service or execute arbitrary code via a crafted file.
https://github.com/gpac/gpac/issues/1774
https://github.com/gpac/gpac/commit/77ed81c069e10b3861d88f72e1c6be1277ee7eae
CWE-120
gpac/gpac
77ed81c069e10b3861d88f72e1c6be1277ee7eae~1
diff --git a/src/isomedia/stbl_write.c b/src/isomedia/stbl_write.c index 843a30857a..1e4780d657 100644 --- a/src/isomedia/stbl_write.c +++ b/src/isomedia/stbl_write.c @@ -37,11 +37,20 @@ gf_realloc low, which greatly impacts performances for large files*/ #ifndef GPAC_DISABLE_ISOM_WRITE + +#define CHECK_PACK(_e) \...
https://github.com/gpac/gpac/issues/1774
15305==ERROR: AddressSanitizer: SEGV on unknown address 0x616000010000 (pc 0x7ff3a3276461 bp 0x7ffc231be4c0 sp 0x7ffc231be490 T0) ==15305==The signal is caused by a WRITE memory access. #0 0x7ff3a3276460 in stbl_AppendSize isomedia/stbl_write.c:1650 #1 0x7ff3a3279df4 in MergeTrack isomedia/track.c:703 #2 0x...
null
=== https://github.com/gpac/gpac/issues/1774 === [error fetching issue: 403 Client Error: rate limit exceeded for url: https://api.github.com/repos/gpac/gpac/issues/1774]
https://nvd.nist.gov/vuln/detail/CVE-2021-32439
libredwg.cve-2020-6609
GNU LibreDWG 0.9.3.2564 has a heap-based buffer over-read in read_pages_map in decode_r2007.c.
https://github.com/LibreDWG/libredwg/issues/179#issue-544834443
https://github.com/LibreDWG/libredwg/issues/179#issue-544834443
CWE-125
LibreDWG/libredwg
null
null
https://github.com/LibreDWG/libredwg/issues/179#issue-544834443
null
null
=== https://github.com/LibreDWG/libredwg/issues/179#issue-544834443 === [error fetching issue: 403 Client Error: rate limit exceeded for url: https://api.github.com/repos/LibreDWG/libredwg/issues/179]
https://nvd.nist.gov/vuln/detail/CVE-2020-6609
imagemagick.cve-2019-13306
ImageMagick 7.0.8-50 Q16 has a stack-based buffer overflow at coders/pnm.c in WritePNMImage because of off-by-one errors.
https://github.com/ImageMagick/ImageMagick/issues/1612
https://github.com/ImageMagick/ImageMagick/commit/e92040ea6ee2a844ebfd2344174076795a4787bd, https://github.com/ImageMagick/ImageMagick/issues/1612, https://github.com/ImageMagick/ImageMagick6/commit/cb5ec7d98195aa74d5ed299b38eff2a68122f3fa
CWE-193, CWE-787
ImageMagick/ImageMagick
e92040ea6ee2a844ebfd2344174076795a4787bd~1
diff --git a/coders/pnm.c b/coders/pnm.c index f6f69bf83c2..a54bc60c33d 100644 --- a/coders/pnm.c +++ b/coders/pnm.c @@ -1826,7 +1826,7 @@ static MagickBooleanType WritePNMImage(const ImageInfo *image_info,Image *image, extent=(size_t) count; (void) strncpy((char *) q,buffer,extent); ...
https://github.com/ImageMagick/ImageMagick/issues/1612
==12131==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7ffc7100b060 at pc 0x0000004477c4 bp 0x7ffc710065b0 sp 0x7ffc71005d60 WRITE of size 10 at 0x7ffc7100b060 thread T0 #0 0x4477c3 in strncpy (install/bin/magick+0x4477c3) #1 0x7f1cca22b433 in WritePNMImage coders/pnm.c:1902:20 #2 0x7f1cc9ac30...
null
=== https://github.com/ImageMagick/ImageMagick/issues/1612 === [error fetching issue: 403 Client Error: rate limit exceeded for url: https://api.github.com/repos/ImageMagick/ImageMagick/issues/1612]
https://nvd.nist.gov/vuln/detail/CVE-2019-13306
imagemagick.cve-2017-11539
When ImageMagick 7.0.6-1 processes a crafted file in convert, it can lead to a Memory Leak in the ReadOnePNGImage() function in coders/png.c.
https://github.com/ImageMagick/ImageMagick/issues/582
https://github.com/ImageMagick/ImageMagick/issues/582
CWE-772
ImageMagick/ImageMagick
null
null
https://github.com/ImageMagick/ImageMagick/issues/582
==53617==ERROR: LeakSanitizer: detected memory leaks Direct leak of 152 byte(s) in 1 object(s) allocated from: #0 0x7f4833557602 in malloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x98602) #1 0x7f4832a55dba in AcquireMagickMemory MagickCore/memory.c:464 #2 0x7f4832adf331 in AcquireQuantumInfo MagickCore/qua...
null
=== https://github.com/ImageMagick/ImageMagick/issues/582 === [error fetching issue: 403 Client Error: rate limit exceeded for url: https://api.github.com/repos/ImageMagick/ImageMagick/issues/582]
https://nvd.nist.gov/vuln/detail/CVE-2017-11539
libheif.cve-2023-49464
libheif v1.17.5 was discovered to contain a segmentation violation via the function UncompressedImageCodec::get_luma_bits_per_pixel_from_configuration_unci.
https://github.com/strukturag/libheif/issues/1044
https://github.com/strukturag/libheif/pull/1048/changes/440c2a505dbfa00faf48da9c71f9b4bc57af9a8d
null
strukturag/libheif
64ece913266609789f5dc70fe7de9eb759badd7f
diff --git a/libheif/uncompressed_image.cc b/libheif/uncompressed_image.cc index a0387b6c80..cda5dc3dc2 100644 --- a/libheif/uncompressed_image.cc +++ b/libheif/uncompressed_image.cc @@ -531,6 +531,9 @@ int UncompressedImageCodec::get_luma_bits_per_pixel_from_configuration_unci(cons int alternate_channel_bits = 0; ...
https://github.com/strukturag/libheif/issues/1044
==88148==ERROR: AddressSanitizer: heap-use-after-free on address 0x60e000000910 at pc 0x7f7a88d9ab47 bp 0x7ffef17996e0 sp 0x7ffef17996d0 READ of size 2 at 0x60e000000910 thread T0 #0 0x7f7a88d9ab46 in UncompressedImageCodec::get_luma_bits_per_pixel_from_configuration_unci(HeifFile const&, unsigned int) libheif/libh...
null
=== https://github.com/strukturag/libheif/issues/1044 === [error fetching issue: 403 Client Error: rate limit exceeded for url: https://api.github.com/repos/strukturag/libheif/issues/1044]
https://nvd.nist.gov/vuln/detail/CVE-2023-49464
yara.cve-2017-5924
libyara/grammar.y in YARA 3.5.0 allows remote attackers to cause a denial of service (use-after-free and application crash) via a crafted rule that is mishandled in the yr_compiler_destroy function.
https://github.com/VirusTotal/yara/issues/593
https://github.com/VirusTotal/yara/commit/c2ed7a46618f93a0dfe011dc608f2b604f365251
CWE-416
VirusTotal/yara
890c3f8
Done - patched grammar.c, exec.h, exec.c diff --git a/libyara/exec.c b/libyara/exec.c index 59072a4..31cb6e8 100644 --- a/libyara/exec.c +++ b/libyara/exec.c @@ -205,6 +205,9 @@ int yr_execute_code( { switch(*ip) { + case OP_NOP: + break; + case OP_HALT: assert(sp == 0); // When...
https://github.com/VirusTotal/yara/issues/593
==10220==ERROR: AddressSanitizer: heap-use-after-free on address 0x63100003c862 at pc 0x0000004ef7f5 bp 0x7ffc9082a5d0 sp 0x7ffc9082a5c8 READ of size 8 at 0x63100003c862 thread T0 #0 0x4ef7f4 in yr_compiler_destroy XYZ/yara/libyara/compiler.c:165:35 #1 0x4ede04 in main XYZ/yara/yara.c:1242:5 #2 0x7f05302fa8...
ASan (inferred)
=== https://github.com/VirusTotal/yara/issues/593 === [error fetching issue: 403 Client Error: rate limit exceeded for url: https://api.github.com/repos/VirusTotal/yara/issues/593]
https://nvd.nist.gov/vuln/detail/CVE-2017-5924
mruby.cve-2018-14337
The CHECK macro in mrbgems/mruby-sprintf/src/sprintf.c in mruby 1.4.1 contains a signed integer overflow, possibly leading to out-of-bounds memory access because the mrb_str_resize function in string.c does not check for a negative length.
https://github.com/mruby/mruby/issues/4062
null
CWE-190
mruby/mruby
null
null
https://github.com/mruby/mruby/issues/4062
$ echo "' %8646911284551352320d'%1" | bin/mruby /Users/clayton/git/mruby/mrbgems/mruby-sprintf/src/sprintf.c:966:11: runtime error: signed integer overflow: 8646911284551352320 * 2 cannot be represented in type 'long long' SUMMARY: UndefinedBehaviorSanitizer: undefined-behavior /Users/clayton/git/mruby/mrbgems/mruby-sp...
ASan (inferred)
=== https://github.com/mruby/mruby/issues/4062 === [error fetching issue: 403 Client Error: rate limit exceeded for url: https://api.github.com/repos/mruby/mruby/issues/4062]
https://nvd.nist.gov/vuln/detail/CVE-2018-14337
imagemagick.cve-2022-48541
A memory leak in ImageMagick 7.0.10-45 and 6.9.11-22 allows remote attackers to perform a denial of service via the "identify -help" command.
https://github.com/ImageMagick/ImageMagick/issues/2889
null
CWE-401
ImageMagick/ImageMagick
null
null
https://github.com/ImageMagick/ImageMagick/issues/2889
==15438==ERROR: LeakSanitizer: detected memory leaks Direct leak of 13024 byte(s) in 1 object(s) allocated from: #0 0x494bad in malloc (/usr/local/bin/magick+0x494bad) #1 0x7f5ee70c0a35 in AcquireMagickMemory MagickCore/memory.c:531:10 #2 0x7f5ee70c0a4b in AcquireCriticalMemory MagickCore/memory.c:607:10 ...
null
=== https://github.com/ImageMagick/ImageMagick/issues/2889 === [error fetching issue: 403 Client Error: rate limit exceeded for url: https://api.github.com/repos/ImageMagick/ImageMagick/issues/2889]
https://nvd.nist.gov/vuln/detail/CVE-2022-48541
imagemagick.cve-2019-13300
ImageMagick 7.0.8-50 Q16 has a heap-based buffer overflow at MagickCore/statistic.c in EvaluateImages because of mishandling columns.
https://github.com/ImageMagick/ImageMagick/issues/1586
https://github.com/ImageMagick/ImageMagick/commit/a906fe9298bf89e01d5272023db687935068849a, https://github.com/ImageMagick/ImageMagick/issues/1586, https://github.com/ImageMagick/ImageMagick6/commit/5e409ae7a389cdf2ed17469303be3f3f21cec450
CWE-787
ImageMagick/ImageMagick
a906fe9298bf89e01d5272023db687935068849a~1
diff --git a/MagickCore/statistic.c b/MagickCore/statistic.c index a649880f440..50d56fcf77a 100644 --- a/MagickCore/statistic.c +++ b/MagickCore/statistic.c @@ -150,8 +150,11 @@ static PixelChannels **DestroyPixelThreadSet(PixelChannels **pixels) return(pixels); } -static PixelChannels **AcquirePixelThreadSet(con...
https://github.com/ImageMagick/ImageMagick/issues/1586
==27479==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x629000018800 at pc 0x0000006205ab bp 0x7ffd7a503310 sp 0x7ffd7a503308 WRITE of size 8 at 0x629000018800 thread T0 #0 0x6205aa in .omp_outlined._debug__.10 MagickCore/statistic.c:654:41 #1 0x621c5e in .omp_outlined..11 MagickCore/statistic.c:618...
null
=== https://github.com/ImageMagick/ImageMagick/issues/1586 === [error fetching issue: 403 Client Error: rate limit exceeded for url: https://api.github.com/repos/ImageMagick/ImageMagick/issues/1586]
https://nvd.nist.gov/vuln/detail/CVE-2019-13300
libredwg.cve-2020-21827
A heap based buffer overflow vulnerability exists in GNU LibreDWG 0.10 via read_2004_compressed_section ../../src/decode.c:2379.
https://github.com/LibreDWG/libredwg/issues/183
https://github.com/LibreDWG/libredwg/commit/bcec483e73819af29787d5ed87fc515e1dfd0411
CWE-787
LibreDWG/libredwg
bcec483e73819af29787d5ed87fc515e1dfd0411~1
diff --git a/src/decode.c b/src/decode.c index 96b48ef4ca..b40bfa7a64 100644 --- a/src/decode.c +++ b/src/decode.c @@ -2319,11 +2319,12 @@ read_2004_compressed_section (Bit_Chain *dat, Dwg_Data *restrict dwg, sec_dat->from_version = dat->from_version; sec_dat->chain = decomp; - for (i = 0; i < info->num_sectio...
https://github.com/LibreDWG/libredwg/issues/183
==29243==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6140000005b2 at pc 0x7ffafa9dc77a bp 0x7ffcc19b07e0 sp 0x7ffcc19aff88 WRITE of size 126 at 0x6140000005b2 thread T0 #0 0x7ffafa9dc779 (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x79779) #1 0x561777b62e9c in memcpy /usr/include/x86_64-linux-gnu/bi...
null
=== https://github.com/LibreDWG/libredwg/issues/183 === Title: Heap over flow --- Body: I found a bug in dwg2dxf. POC: https://github.com/linhlhq/research/blob/master/PoCs/libreDWG_69b5609/id:000000%2Csig:06%2Csrc:000001%2Cop:flip4%2Cpos:27167 ``` ==29243==ERROR: AddressSanitizer: heap-buffer-overflow on address 0...
https://nvd.nist.gov/vuln/detail/CVE-2020-21827
exiv2.cve-2017-17723
In Exiv2 0.26, there is a heap-based buffer over-read in the Exiv2::Image::byteSwap4 function in image.cpp. Remote attackers can exploit this vulnerability to disclose memory data or cause a denial of service via a crafted TIFF file.
https://bugzilla.redhat.com/show_bug.cgi?id=1524104
null
CWE-125
null
null
null
https://bugzilla.redhat.com/show_bug.cgi?id=1524104
null
null
null
https://nvd.nist.gov/vuln/detail/CVE-2017-17723
imagemagick.cve-2019-13301
ImageMagick 7.0.8-50 Q16 has memory leaks in AcquireMagickMemory because of an AnnotateImage error.
https://github.com/ImageMagick/ImageMagick/issues/1585, https://github.com/ImageMagick/ImageMagick/issues/1589
https://github.com/ImageMagick/ImageMagick/commit/7c2c5ba5b8, https://github.com/ImageMagick/ImageMagick/commit/f595a1985233c399a05c0c37cc41de16a90dd025
CWE-401
ImageMagick/ImageMagick
7c2c5ba5b8~1
diff --git a/MagickCore/annotate.c b/MagickCore/annotate.c index 494720211e4..3f3ac7fa09d 100644 --- a/MagickCore/annotate.c +++ b/MagickCore/annotate.c @@ -277,6 +277,7 @@ MagickExport MagickBooleanType AnnotateImage(Image *image, { annotate_info=DestroyDrawInfo(annotate_info); annotate=DestroyDrawI...
https://github.com/ImageMagick/ImageMagick/issues/1585, https://github.com/ImageMagick/ImageMagick/issues/1589
null
null
=== https://github.com/ImageMagick/ImageMagick/issues/1585 === [error fetching issue: 403 Client Error: rate limit exceeded for url: https://api.github.com/repos/ImageMagick/ImageMagick/issues/1585] === https://github.com/ImageMagick/ImageMagick/issues/1589 === [error fetching issue: 403 Client Error: rate limit excee...
https://nvd.nist.gov/vuln/detail/CVE-2019-13301
libarchive.cve-2020-21674
Heap-based buffer overflow in archive_string_append_from_wcs() (archive_string.c) in libarchive-3.4.1dev allows remote attackers to cause a denial of service (out-of-bounds write in heap memory resulting into a crash) via a crafted archive file. NOTE: this only affects users who downloaded the development code from Git...
null
https://github.com/libarchive/libarchive/commit/4f085eea879e2be745f4d9bf57e8513ae48157f4
CWE-787
libarchive/libarchive
4f085eea879e2be745f4d9bf57e8513ae48157f4~1
diff --git a/libarchive/archive_string.c b/libarchive/archive_string.c index bd39c96f10..399299ea63 100644 --- a/libarchive/archive_string.c +++ b/libarchive/archive_string.c @@ -75,6 +75,9 @@ __FBSDID("$FreeBSD: head/lib/libarchive/archive_string.c 201095 2009-12-28 02:33 #define wmemmove(a,b,i) (wchar_t *)memmove((...
https://github.com/libarchive/libarchive/issues/1298
==2650==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x607000000298 at pc 0x5586b16c5082 bp 0x7ffc3d24a950 sp 0x7ffc3d24a940 WRITE of size 1 at 0x607000000298 thread T0 #0 0x5586b16c5081 in archive_string_append_from_wcs libarchive/archive_string.c:831 #1 0x5586b16c5fd7 in archive_mstring_get_mbs li...
ASan (inferred)
=== https://github.com/libarchive/libarchive/issues/1298 === [error fetching issue: 403 Client Error: rate limit exceeded for url: https://api.github.com/repos/libarchive/libarchive/issues/1298]
https://nvd.nist.gov/vuln/detail/CVE-2020-21674
exiv2.cve-2017-14857
In Exiv2 0.26, there is an invalid free in the Image class in image.cpp that leads to a Segmentation fault. A crafted input will lead to a denial of service attack.
https://bugzilla.redhat.com/show_bug.cgi?id=1495043
null
CWE-416
null
null
null
https://bugzilla.redhat.com/show_bug.cgi?id=1495043
null
null
null
https://nvd.nist.gov/vuln/detail/CVE-2017-14857
yara.cve-2023-40857
Buffer Overflow vulnerability in VirusTotal yara v.4.3.2 allows a remote attacker to execute arbtirary code via the yr_execute_cod function in the exe.c component.
https://github.com/VirusTotal/yara/issues/1945
null
CWE-787
VirusTotal/yara
d1ff3ecc465d7ed882943fd1278dd8981b704f02
null
https://github.com/VirusTotal/yara/issues/1945
================================================================= ==1855158==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x604000000248 at pc 0x7f168933dfaf bp 0x7ffd229d5530 sp 0x7ffd229d5520 READ of size 8 at 0x604000000248 thread T0 #0 0x7f168933dfae in yr_execute_code libyara/exec.c:1426 #1 0x7...
null
=== https://github.com/VirusTotal/yara/issues/1945 === [error fetching issue: 403 Client Error: rate limit exceeded for url: https://api.github.com/repos/VirusTotal/yara/issues/1945]
https://nvd.nist.gov/vuln/detail/CVE-2023-40857
matio.cve-2019-9032
An issue was discovered in libmatio.a in matio (aka MAT File I/O Library) 1.5.13. There is an out-of-bounds write problem causing a SEGV in the function Mat_VarFree() in mat.c.
https://github.com/TeamSeri0us/pocs/tree/master/matio
null
CWE-787
TeamSeri0us/pocs
null
null
https://github.com/tbeu/matio/issues/103
================================================================= ==29570==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60200000efd0 at pc 0x7f5b9c14f9fe bp 0x7ffca66d34a0 sp 0x7ffca66d3498 WRITE of size 8 at 0x60200000efd0 thread T0 #0 0x7f5b9c14f9fd in Mat_VarReadNextInfo5 (/home/sebastien/debian/up...
ASan (inferred)
=== https://github.com/tbeu/matio/issues/103 === [error fetching issue: 403 Client Error: rate limit exceeded for url: https://api.github.com/repos/tbeu/matio/issues/103]
https://nvd.nist.gov/vuln/detail/CVE-2019-9032
mruby.cve-2022-1286
heap-buffer-overflow in mrb_vm_exec in mruby/mruby in GitHub repository mruby/mruby prior to 3.2. Possible arbitrary code execution if being exploited.
https://huntr.dev/bounties/f918376e-b488-4113-963d-ffe8716e4189
https://github.com/mruby/mruby/commit/b1d0296a937fe278239bdfac840a3fd0e93b3ee9
CWE-122, CWE-787
mruby/mruby
b1d0296a937fe278239bdfac840a3fd0e93b3ee9~1
diff --git a/src/class.c b/src/class.c index 37fc4e68a4..68a0ff0843 100644 --- a/src/class.c +++ b/src/class.c @@ -2361,7 +2361,10 @@ mrb_remove_method(mrb_state *mrb, struct RClass *c, mrb_sym mid) MRB_CLASS_ORIGIN(c); h = c->mt; - if (h && mt_del(mrb, h, mid)) return; + if (h && mt_del(mrb, h, mid)) { + ...
null
null
ASan (inferred)
null
https://nvd.nist.gov/vuln/detail/CVE-2022-1286
yaml-cpp.cve-2018-20574
The SingleDocParser::HandleFlowMap function in yaml-cpp (aka LibYaml-C++) 0.6.2 allows remote attackers to cause a denial of service (stack consumption and application crash) via a crafted YAML file.
https://github.com/jbeder/yaml-cpp/issues/654
https://github.com/mongodb-forks/yaml-cpp/commit/9bbdfd07814f3c1ae457643224fdfd1d8aa971b9
CWE-119
mongodb-forks/yaml-cpp
9bbdfd07814f3c1ae457643224fdfd1d8aa971b9~1
diff --git a/include/yaml-cpp/depthguard.h b/include/yaml-cpp/depthguard.h new file mode 100644 index 000000000..8ca61ac6c --- /dev/null +++ b/include/yaml-cpp/depthguard.h @@ -0,0 +1,77 @@ +#ifndef DEPTH_GUARD_H_00000000000000000000000000000000000000000000000000000000 +#define DEPTH_GUARD_H_000000000000000000000000000...
https://github.com/jbeder/yaml-cpp/issues/654
ASAN:DEADLYSIGNAL ================================================================= ==6596==ERROR: AddressSanitizer: stack-overflow on address 0xbf09dee0 (pc 0x0814e423 bp 0xbf09e308 sp 0xbf09ded0 T0) #0 0x814e422 (/home/user/yaml-cpp/build/util/parse+0x814e422) #1 0x816fd48 (/home/user/yaml-cpp/build/util/pa...
null
=== https://github.com/jbeder/yaml-cpp/issues/654 === [error fetching issue: 403 Client Error: rate limit exceeded for url: https://api.github.com/repos/jbeder/yaml-cpp/issues/654]
https://nvd.nist.gov/vuln/detail/CVE-2018-20574
libredwg.cve-2021-42586
A heap buffer overflow was discovered in copy_bytes in decode_r2007.c in dwgread before 0.12.4 via a crafted dwg file.
https://github.com/LibreDWG/libredwg/issues/350
https://github.com/LibreDWG/libredwg/commit/45d2a290c65ed691be0901ba2b2ef51044e07a16
CWE-787
LibreDWG/libredwg
45d2a290c65ed691be0901ba2b2ef51044e07a16~1
diff --git a/src/decode_r2007.c b/src/decode_r2007.c index c1e270fc4b..0fb506a624 100644 --- a/src/decode_r2007.c +++ b/src/decode_r2007.c @@ -655,6 +655,8 @@ read_system_page (Bit_Chain *dat, int64_t size_comp, int64_t size_uncomp, LOG_ERROR ("Invalid r2007 system page: page_size: %" PRId64, page_size); ...
https://github.com/LibreDWG/libredwg/issues/350
./dwgread ./tests_64199 ================================================================= ==9330==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x62a000005f55 at pc 0x000000ca93c3 bp 0x7ffe5a6134c0 sp 0x7ffe5a6134b8 WRITE of size 1 at 0x62a000005f55 thread T0 #0 0xca93c2 in copy_bytes /root/fuzz/libredwg...
null
=== https://github.com/LibreDWG/libredwg/issues/350 === [error fetching issue: 403 Client Error: rate limit exceeded for url: https://api.github.com/repos/LibreDWG/libredwg/issues/350]
https://nvd.nist.gov/vuln/detail/CVE-2021-42586
openexr.cve-2020-16589
A head-based buffer overflow exists in Academy Software Foundation OpenEXR 2.3.0 in writeTileData in ImfTiledOutputFile.cpp that can cause a denial of service via a crafted EXR file.
https://github.com/AcademySoftwareFoundation/openexr/commit/6bb36714528a9563dd3b92720c5063a1284b86f8
https://github.com/AcademySoftwareFoundation/openexr/commit/6bb36714528a9563dd3b92720c5063a1284b86f8
CWE-787
AcademySoftwareFoundation/openexr
6bb36714528a9563dd3b92720c5063a1284b86f8~1
diff --git a/OpenEXR/IlmImf/ImfTiledInputFile.cpp b/OpenEXR/IlmImf/ImfTiledInputFile.cpp index 15c51c50af..bda7bad50a 100644 --- a/OpenEXR/IlmImf/ImfTiledInputFile.cpp +++ b/OpenEXR/IlmImf/ImfTiledInputFile.cpp @@ -1313,6 +1313,13 @@ TiledInputFile::rawTileData (int &dx, int &dy, throw IEX_NAMESPACE::A...
https://github.com/AcademySoftwareFoundation/openexr/issues/494
==22567==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60400000e178 at pc 0x7f2f375c522a bp 0x7ffe478e5550 sp 0x7ffe478e5540 READ of size 8 at 0x60400000e178 thread T0 #0 0x7f2f375c5229 in Imf_2_3::TileOffsets::operator()(int, int, int, int) (/home/dungnguyen/gueb-testing/openexr/obj-asan/OpenEXR/IlmIm...
null
=== https://github.com/AcademySoftwareFoundation/openexr/issues/494 === [error fetching issue: 403 Client Error: rate limit exceeded for url: https://api.github.com/repos/AcademySoftwareFoundation/openexr/issues/494]
https://nvd.nist.gov/vuln/detail/CVE-2020-16589
openexr.cve-2020-16587
A heap-based buffer overflow vulnerability exists in Academy Software Foundation OpenEXR 2.3.0 in chunkOffsetReconstruction in ImfMultiPartInputFile.cpp that can cause a denial of service via a crafted EXR file.
https://github.com/AcademySoftwareFoundation/openexr/issues/491
https://github.com/AcademySoftwareFoundation/openexr/commit/8b5370c688a7362673c3a5256d93695617a4cd9a
CWE-787
AcademySoftwareFoundation/openexr
8b5370c688a7362673c3a5256d93695617a4cd9a~1
diff --git a/OpenEXR/IlmImf/ImfMultiPartInputFile.cpp b/OpenEXR/IlmImf/ImfMultiPartInputFile.cpp index 6a1fbfdd3b..da061bdbd3 100644 --- a/OpenEXR/IlmImf/ImfMultiPartInputFile.cpp +++ b/OpenEXR/IlmImf/ImfMultiPartInputFile.cpp @@ -571,7 +571,7 @@ MultiPartInputFile::Data::chunkOffsetReconstruction(OPENEXR_IMF_INTERNAL_...
https://github.com/AcademySoftwareFoundation/openexr/issues/491
==976==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60200000ec98 at pc 0x7f12af53f92f bp 0x7ffc0b8eb5e0 sp 0x7ffc0b8eb5d0 READ of size 8 at 0x60200000ec98 thread T0 #0 0x7f12af53f92e in Imf_2_3::MultiPartInputFile::Data::chunkOffsetReconstruction(Imf_2_3::IStream&, std::vector<Imf_2_3::InputPartData*,...
null
=== https://github.com/AcademySoftwareFoundation/openexr/issues/491 === [error fetching issue: 403 Client Error: rate limit exceeded for url: https://api.github.com/repos/AcademySoftwareFoundation/openexr/issues/491]
https://nvd.nist.gov/vuln/detail/CVE-2020-16587
openexr.cve-2020-16588
A Null Pointer Deference issue exists in Academy Software Foundation OpenEXR 2.3.0 in generatePreview in makePreview.cpp that can cause a denial of service via a crafted EXR file.
https://github.com/AcademySoftwareFoundation/openexr/issues/493
https://github.com/AcademySoftwareFoundation/openexr/commit/74504503cff86e986bac441213c403b0ba28d58f
CWE-476
AcademySoftwareFoundation/openexr
74504503cff86e986bac441213c403b0ba28d58f~1
diff --git a/OpenEXR/exrmakepreview/makePreview.cpp b/OpenEXR/exrmakepreview/makePreview.cpp index ae0e99dfa1..e2d0879847 100644 --- a/OpenEXR/exrmakepreview/makePreview.cpp +++ b/OpenEXR/exrmakepreview/makePreview.cpp @@ -120,8 +120,8 @@ generatePreview (const char inFileName[], previewHeight = max (int (h / (w *...
https://github.com/AcademySoftwareFoundation/openexr/issues/493
==5549==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x000000402db3 bp 0x7fbf849cd800 sp 0x7ffe12fc8050 T0) #0 0x402db2 in generatePreview /home/dungnguyen/gueb-testing/openexr/OpenEXR/exrmakepreview/makePreview.cpp:132 #1 0x402db2 in makePreview(char const*, char const*, int, float, bool...
null
=== https://github.com/AcademySoftwareFoundation/openexr/issues/493 === [error fetching issue: 403 Client Error: rate limit exceeded for url: https://api.github.com/repos/AcademySoftwareFoundation/openexr/issues/493]
https://nvd.nist.gov/vuln/detail/CVE-2020-16588
mruby.cve-2022-0326
NULL Pointer Dereference in Homebrew mruby prior to 3.2.
https://huntr.dev/bounties/795dcbd9-1695-44bb-8c59-ad327c97c976
https://github.com/mruby/mruby/commit/b611c43a5de061ec21b343967e1b64c45c373d7e, https://huntr.dev/bounties/795dcbd9-1695-44bb-8c59-ad327c97c976
CWE-476
mruby/mruby
b611c43a5de061ec21b343967e1b64c45c373d7e~1
diff --git a/mrbgems/mruby-compiler/core/codegen.c b/mrbgems/mruby-compiler/core/codegen.c index c36178c8b0..3996824a2f 100644 --- a/mrbgems/mruby-compiler/core/codegen.c +++ b/mrbgems/mruby-compiler/core/codegen.c @@ -1644,14 +1644,13 @@ gen_hash(codegen_scope *s, node *tree, int val, int limit) } } if (upd...
null
null
null
null
https://nvd.nist.gov/vuln/detail/CVE-2022-0326