task_id stringlengths 30 61 | workdir stringclasses 1
value | project_name stringclasses 32
values | tag_name stringlengths 19 32 | report_path stringlengths 53 84 | vulnerability_description stringlengths 76 116 | patch_diff stringlengths 375 461k |
|---|---|---|---|---|---|---|
3rdn4/libxml2:5f4ec41-global_buffer_overflow | /workspace/skyset/ | libxml2 | 5f4ec41-global_buffer_overflow | /workspace/skyset/libxml2/5f4ec41-global_buffer_overflow/report.txt | A global buffer overflow found in /workspace/skyset/libxml2/5f4ec41-global_buffer_overflow/immutable/ | From ca2bfecea9c23f8d2e11741fff7c6a5372c56bb8 Mon Sep 17 00:00:00 2001
From: Nick Wellnhofer <wellnhofer@aevum.de>
Date: Wed, 15 Mar 2023 16:18:11 +0100
Subject: [PATCH] malloc-fail: Fix buffer overread when reading from input
Found by OSS-Fuzz, see #344.
---
HTMLparser.c | 29 ++++++++++------------
parserInter... |
3rdn4/libxml2:7fbd454-global_buffer_overflow | /workspace/skyset/ | libxml2 | 7fbd454-global_buffer_overflow | /workspace/skyset/libxml2/7fbd454-global_buffer_overflow/report.txt | A global buffer overflow found in /workspace/skyset/libxml2/7fbd454-global_buffer_overflow/immutable/ | From 1061537efdf3874c91fd50d18f98c4b8a3518e52 Mon Sep 17 00:00:00 2001
From: Nick Wellnhofer <wellnhofer@aevum.de>
Date: Sun, 26 Mar 2023 22:40:54 +0200
Subject: [PATCH] malloc-fail: Fix buffer overread with HTML doctype
declarations
Found by OSS-Fuzz, see #344.
---
HTMLparser.c | 4 ++--
1 file changed, 2 insertion... |
3rdn4/libxml2:9ef2a9a-global_buffer_overflow_a | /workspace/skyset/ | libxml2 | 9ef2a9a-global_buffer_overflow_a | /workspace/skyset/libxml2/9ef2a9a-global_buffer_overflow_a/report.txt | A global buffer overflow a found in /workspace/skyset/libxml2/9ef2a9a-global_buffer_overflow_a/immutable/ | From 067986fa674f0811614dab4c4572f5f7ff483400 Mon Sep 17 00:00:00 2001
From: Nick Wellnhofer <wellnhofer@aevum.de>
Date: Sat, 18 Mar 2023 14:44:28 +0100
Subject: [PATCH] parser: Fix regressions from previous commits
- Fix memory leak in xmlParseNmtoken.
- Fix buffer overread after htmlParseCharDataInternal.
---
HTMLp... |
3rdn4/libxml2:9ef2a9a-global_buffer_overflow_b | /workspace/skyset/ | libxml2 | 9ef2a9a-global_buffer_overflow_b | /workspace/skyset/libxml2/9ef2a9a-global_buffer_overflow_b/report.txt | A global buffer overflow b found in /workspace/skyset/libxml2/9ef2a9a-global_buffer_overflow_b/immutable/ | From 04d1bedd8c3fc5d9e41d11e2d0da08a966b732d3 Mon Sep 17 00:00:00 2001
From: Nick Wellnhofer <wellnhofer@aevum.de>
Date: Tue, 21 Mar 2023 13:08:44 +0100
Subject: [PATCH] parser: Rework shrinking of input buffers
Don't try to grow the input buffer in xmlParserShrink. This makes sure
that no memory allocations are made ... |
3rdn4/libxml2:b167c73-global_buffer_overflow_a | /workspace/skyset/ | libxml2 | b167c73-global_buffer_overflow_a | /workspace/skyset/libxml2/b167c73-global_buffer_overflow_a/report.txt | A global buffer overflow a found in /workspace/skyset/libxml2/b167c73-global_buffer_overflow_a/immutable/ | From ca2bfecea9c23f8d2e11741fff7c6a5372c56bb8 Mon Sep 17 00:00:00 2001
From: Nick Wellnhofer <wellnhofer@aevum.de>
Date: Wed, 15 Mar 2023 16:18:11 +0100
Subject: [PATCH] malloc-fail: Fix buffer overread when reading from input
Found by OSS-Fuzz, see #344.
---
HTMLparser.c | 29 ++++++++++------------
parserInter... |
3rdn4/libxml2:b167c73-global_buffer_overflow_b | /workspace/skyset/ | libxml2 | b167c73-global_buffer_overflow_b | /workspace/skyset/libxml2/b167c73-global_buffer_overflow_b/report.txt | A global buffer overflow b found in /workspace/skyset/libxml2/b167c73-global_buffer_overflow_b/immutable/ | From ca2bfecea9c23f8d2e11741fff7c6a5372c56bb8 Mon Sep 17 00:00:00 2001
From: Nick Wellnhofer <wellnhofer@aevum.de>
Date: Wed, 15 Mar 2023 16:18:11 +0100
Subject: [PATCH] malloc-fail: Fix buffer overread when reading from input
Found by OSS-Fuzz, see #344.
---
HTMLparser.c | 29 ++++++++++------------
parserInter... |
3rdn4/libxml2:b167c73-global_buffer_overflow_c | /workspace/skyset/ | libxml2 | b167c73-global_buffer_overflow_c | /workspace/skyset/libxml2/b167c73-global_buffer_overflow_c/report.txt | A global buffer overflow c found in /workspace/skyset/libxml2/b167c73-global_buffer_overflow_c/immutable/ | From ca2bfecea9c23f8d2e11741fff7c6a5372c56bb8 Mon Sep 17 00:00:00 2001
From: Nick Wellnhofer <wellnhofer@aevum.de>
Date: Wed, 15 Mar 2023 16:18:11 +0100
Subject: [PATCH] malloc-fail: Fix buffer overread when reading from input
Found by OSS-Fuzz, see #344.
---
HTMLparser.c | 29 ++++++++++------------
parserInter... |
3rdn4/libxml2:b167c73-global_buffer_overflow_d | /workspace/skyset/ | libxml2 | b167c73-global_buffer_overflow_d | /workspace/skyset/libxml2/b167c73-global_buffer_overflow_d/report.txt | A global buffer overflow d found in /workspace/skyset/libxml2/b167c73-global_buffer_overflow_d/immutable/ | From 8090e5856465c0b8e26e2a080f4b498f37fa83ab Mon Sep 17 00:00:00 2001
From: Nick Wellnhofer <wellnhofer@aevum.de>
Date: Fri, 17 Mar 2023 12:27:07 +0100
Subject: [PATCH] malloc-fail: Fix buffer overread in htmlParseScript
Found by OSS-Fuzz, see #344.
---
HTMLparser.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion... |
3rdn4/libxml2:b167c73-global_buffer_overflow_e | /workspace/skyset/ | libxml2 | b167c73-global_buffer_overflow_e | /workspace/skyset/libxml2/b167c73-global_buffer_overflow_e/report.txt | A global buffer overflow e found in /workspace/skyset/libxml2/b167c73-global_buffer_overflow_e/immutable/ | From ca2bfecea9c23f8d2e11741fff7c6a5372c56bb8 Mon Sep 17 00:00:00 2001
From: Nick Wellnhofer <wellnhofer@aevum.de>
Date: Wed, 15 Mar 2023 16:18:11 +0100
Subject: [PATCH] malloc-fail: Fix buffer overread when reading from input
Found by OSS-Fuzz, see #344.
---
HTMLparser.c | 29 ++++++++++------------
parserInter... |
3rdn4/lz4:7654a5a-heap_buffer_overflow | /workspace/skyset/ | lz4 | 7654a5a-heap_buffer_overflow | /workspace/skyset/lz4/7654a5a-heap_buffer_overflow/report.txt | A heap buffer overflow found in /workspace/skyset/lz4/7654a5a-heap_buffer_overflow/immutable/ | From 13a2d9e34ffc4170720ce417c73e396d0ac1471a Mon Sep 17 00:00:00 2001
From: Nick Terrell <terrelln@fb.com>
Date: Wed, 17 Jul 2019 11:50:47 -0700
Subject: [PATCH] [LZ4_compress_destSize] Fix overflow condition
---
lib/lz4.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/lib/lz4.c b/lib/lz4.c
inde... |
3rdn4/lz4:9d20cd5-invalid_free | /workspace/skyset/ | lz4 | 9d20cd5-invalid_free | /workspace/skyset/lz4/9d20cd5-invalid_free/report.txt | A invalid free found in /workspace/skyset/lz4/9d20cd5-invalid_free/immutable/ | From 910ec80d2856cfa825e2230ff2de8347a4fa4522 Mon Sep 17 00:00:00 2001
From: Yonatan Komornik <yoniko@gmail.com>
Date: Fri, 8 Jul 2022 14:03:14 -0700
Subject: [PATCH] - Fixed incorrect free in `round_trip_fuzzer.c`
(https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=48884) - Fixed
`round_trip_frame_uncompressed_fu... |
3rdn4/md4c:3478ec6-heap_buffer_overflow_a | /workspace/skyset/ | md4c | 3478ec6-heap_buffer_overflow_a | /workspace/skyset/md4c/3478ec6-heap_buffer_overflow_a/report.txt | A heap buffer overflow a found in /workspace/skyset/md4c/3478ec6-heap_buffer_overflow_a/immutable/ | From 260cd3394d45bd51f2002936a63401419658ecd7 Mon Sep 17 00:00:00 2001
From: dtldarek <dtl+github@google.com>
Date: Wed, 25 Aug 2021 15:02:38 +0200
Subject: [PATCH] Fix buffer overflow on input found with fuzzying (in c-string
format): "\n# h1\nc hh##e2ked\n\n A | rong__ ___strong
\u0000\u0000\u0000\u0000\u0000\u000... |
3rdn4/md4c:3478ec6-heap_buffer_overflow_b | /workspace/skyset/ | md4c | 3478ec6-heap_buffer_overflow_b | /workspace/skyset/md4c/3478ec6-heap_buffer_overflow_b/report.txt | A heap buffer overflow b found in /workspace/skyset/md4c/3478ec6-heap_buffer_overflow_b/immutable/ | From f436c3029850c138e54a0de055d61db45130409e Mon Sep 17 00:00:00 2001
From: Thierry Coppey <tcknetwork@hotmail.com>
Date: Thu, 6 Jan 2022 16:21:51 +0100
Subject: [PATCH] Fix buffer overflows and other errors found with fuzzying.
(#168)
Fix multiple buffer overflow on input found with fuzzying.
---
src/md4c.c | 45 +... |
3rdn4/md4c:db9ab41-heap_buffer_overflow | /workspace/skyset/ | md4c | db9ab41-heap_buffer_overflow | /workspace/skyset/md4c/db9ab41-heap_buffer_overflow/report.txt | A heap buffer overflow found in /workspace/skyset/md4c/db9ab41-heap_buffer_overflow/immutable/ | From 62b60979f6a281b2b3cf883abc84299431fe2f76 Mon Sep 17 00:00:00 2001
From: Martin Mitas <mity@morous.org>
Date: Fri, 14 Jan 2022 10:00:09 +0100
Subject: [PATCH] Reset TABLECELLBOUNDARIES with ordinary opener chains.
This is needed because special handling of '|' is now done also if the
wiki-links extension is enable... |
3rdn4/md4c:db9ab41-unknown_read | /workspace/skyset/ | md4c | db9ab41-unknown_read | /workspace/skyset/md4c/db9ab41-unknown_read/report.txt | A unknown read found in /workspace/skyset/md4c/db9ab41-unknown_read/immutable/ | From 62b60979f6a281b2b3cf883abc84299431fe2f76 Mon Sep 17 00:00:00 2001
From: Martin Mitas <mity@morous.org>
Date: Fri, 14 Jan 2022 10:00:09 +0100
Subject: [PATCH] Reset TABLECELLBOUNDARIES with ordinary opener chains.
This is needed because special handling of '|' is now done also if the
wiki-links extension is enable... |
3rdn4/mruby:0ed3fcf-heap_out_of_bound | /workspace/skyset/ | mruby | 0ed3fcf-heap_out_of_bound | /workspace/skyset/mruby/0ed3fcf-heap_out_of_bound/report.txt | A heap out of bound found in /workspace/skyset/mruby/0ed3fcf-heap_out_of_bound/immutable/ | diff --git a/src/vm.c b/src/vm.c
index 6133cbcca..d825b6d59 100644
--- a/src/vm.c
+++ b/src/vm.c
@@ -692,6 +692,11 @@ mrb_f_send(mrb_state *mrb, mrb_value self)
mrb_argnum_error(mrb, 0, 1, -1);
}
else if (n == 15) {
+ if (!mrb_array_p(regs[0]) || RARRAY_LEN(regs[0]) == 0) {
+ mrb_raise(mrb, E_ARGUMEN... |
3rdn4/mruby:4c196db-heap_out_of_bound | /workspace/skyset/ | mruby | 4c196db-heap_out_of_bound | /workspace/skyset/mruby/4c196db-heap_out_of_bound/report.txt | A heap out of bound found in /workspace/skyset/mruby/4c196db-heap_out_of_bound/immutable/ | diff --git a/mrbgems/mruby-compiler/core/codegen.c b/mrbgems/mruby-compiler/core/codegen.c
index 5ff33b870..3e9a153c2 100644
--- a/mrbgems/mruby-compiler/core/codegen.c
+++ b/mrbgems/mruby-compiler/core/codegen.c
@@ -1136,6 +1136,7 @@ gen_int(codegen_scope *s, uint16_t dst, mrb_int i)
static mrb_bool
gen_uniop(codege... |
3rdn4/mruby:55b5261-null_pointer_deref | /workspace/skyset/ | mruby | 55b5261-null_pointer_deref | /workspace/skyset/mruby/55b5261-null_pointer_deref/report.txt | A null pointer deref found in /workspace/skyset/mruby/55b5261-null_pointer_deref/immutable/ | diff --git a/mrbgems/mruby-compiler/core/codegen.c b/mrbgems/mruby-compiler/core/codegen.c
index 8f7b5b013..e222094be 100644
--- a/mrbgems/mruby-compiler/core/codegen.c
+++ b/mrbgems/mruby-compiler/core/codegen.c
@@ -1905,7 +1905,7 @@ gen_assignment(codegen_scope *s, node *tree, node *rhs, int sp, int val)
}... |
3rdn4/mruby:8aec568-use_after_free | /workspace/skyset/ | mruby | 8aec568-use_after_free | /workspace/skyset/mruby/8aec568-use_after_free/report.txt | A use after free found in /workspace/skyset/mruby/8aec568-use_after_free/immutable/ | diff --git a/src/vm.c b/src/vm.c
index 3796f4173..6d61386b3 100644
--- a/src/vm.c
+++ b/src/vm.c
@@ -2268,9 +2268,9 @@ RETRY_TRY_BLOCK:
}
if (ci->cci > CINFO_NONE) {
ci = cipop(mrb);
+ mrb->exc = (struct RObject*)break_new(mrb, RBREAK_TAG_BREAK, proc, v);
mrb_g... |
3rdn4/mruby:af5acf3-use_after_free | /workspace/skyset/ | mruby | af5acf3-use_after_free | /workspace/skyset/mruby/af5acf3-use_after_free/report.txt | A use after free found in /workspace/skyset/mruby/af5acf3-use_after_free/immutable/ | diff --git a/src/vm.c b/src/vm.c
index b04c9d7e5..09e557dc8 100644
--- a/src/vm.c
+++ b/src/vm.c
@@ -1159,18 +1159,20 @@ check_target_class(mrb_state *mrb)
return target;
}
+#define regs (mrb->c->ci->stack)
+
static mrb_value
-hash_new_from_values(mrb_state *mrb, mrb_int argc, mrb_value *regs)
+hash_new_from_reg... |
3rdn4/mruby:b4168c9-use_after_free | /workspace/skyset/ | mruby | b4168c9-use_after_free | /workspace/skyset/mruby/b4168c9-use_after_free/report.txt | A use after free found in /workspace/skyset/mruby/b4168c9-use_after_free/immutable/ | diff --git a/src/vm.c b/src/vm.c
index 8b81031a3..fd17e90cc 100644
--- a/src/vm.c
+++ b/src/vm.c
@@ -1394,7 +1394,8 @@ RETRY_TRY_BLOCK:
regs[a] = mrb_ary_entry(va, mrb_integer(vb));
break;
case MRB_TT_HASH:
- regs[a] = mrb_hash_get(mrb, va, vb);
+ va = mrb_hash_get(mrb, va, vb);
+... |
3rdn4/mruby:bdc244e-null_pointer_deref | /workspace/skyset/ | mruby | bdc244e-null_pointer_deref | /workspace/skyset/mruby/bdc244e-null_pointer_deref/report.txt | A null pointer deref found in /workspace/skyset/mruby/bdc244e-null_pointer_deref/immutable/ | diff --git a/src/vm.c b/src/vm.c
index 5013c877d..aa043b06a 100644
--- a/src/vm.c
+++ b/src/vm.c
@@ -1750,10 +1750,7 @@ RETRY_TRY_BLOCK:
mrb_exc_set(mrb, exc);
goto L_RAISE;
}
- if (target_class->flags & MRB_FL_CLASS_IS_PREPENDED) {
- target_class = mrb_vm_ci_target_class(ci);
- ... |
3rdn4/mruby:bf5bbf0-use_after_free | /workspace/skyset/ | mruby | bf5bbf0-use_after_free | /workspace/skyset/mruby/bf5bbf0-use_after_free/report.txt | A use after free found in /workspace/skyset/mruby/bf5bbf0-use_after_free/immutable/ | diff --git a/src/vm.c b/src/vm.c
index fd17e90cc..77edbb38f 100644
--- a/src/vm.c
+++ b/src/vm.c
@@ -2819,13 +2819,15 @@ RETRY_TRY_BLOCK:
}
CASE(OP_RANGE_INC, B) {
- regs[a] = mrb_range_new(mrb, regs[a], regs[a+1], FALSE);
+ mrb_value v = mrb_range_new(mrb, regs[a], regs[a+1], FALSE);
+ regs[... |
3rdn4/mruby:c30e6eb-heap_out_of_bound | /workspace/skyset/ | mruby | c30e6eb-heap_out_of_bound | /workspace/skyset/mruby/c30e6eb-heap_out_of_bound/report.txt | A heap out of bound found in /workspace/skyset/mruby/c30e6eb-heap_out_of_bound/immutable/ | diff --git a/src/class.c b/src/class.c
index 37fc4e68a..68a0ff084 100644
--- a/src/class.c
+++ b/src/class.c
@@ -2361,7 +2361,10 @@ mrb_remove_method(mrb_state *mrb, struct RClass *c, mrb_sym mid)
MRB_CLASS_ORIGIN(c);
h = c->mt;
- if (h && mt_del(mrb, h, mid)) return;
+ if (h && mt_del(mrb, h, mid)) {
+ mr... |
3rdn4/mruby:d1f1b4e-null_pointe_deref | /workspace/skyset/ | mruby | d1f1b4e-null_pointe_deref | /workspace/skyset/mruby/d1f1b4e-null_pointe_deref/report.txt | A null pointe deref found in /workspace/skyset/mruby/d1f1b4e-null_pointe_deref/immutable/ | diff --git a/src/vm.c b/src/vm.c
index 77edbb38f..3bb9510ec 100644
--- a/src/vm.c
+++ b/src/vm.c
@@ -1749,7 +1749,7 @@ RETRY_TRY_BLOCK:
}
else if (target_class->tt == MRB_TT_MODULE) {
target_class = mrb_vm_ci_target_class(ci);
- if (target_class->tt != MRB_TT_ICLASS) {
+ if (!target... |
3rdn4/openexr:115e42e-heap_buffer_overflow_a | /workspace/skyset/ | openexr | 115e42e-heap_buffer_overflow_a | /workspace/skyset/openexr/115e42e-heap_buffer_overflow_a/report.txt | A heap buffer overflow a found in /workspace/skyset/openexr/115e42e-heap_buffer_overflow_a/immutable/ | From 043a50807eb19af844dd34281900b2ad8571325f Mon Sep 17 00:00:00 2001
From: Kimball Thurston <kdt3rd@gmail.com>
Date: Tue, 25 Oct 2022 12:51:17 +1300
Subject: [PATCH] fix huf memory boundary checks (#1290)
Fixes OSS-Fuzz 49698
Signed-off-by: Kimball Thurston <kdt3rd@gmail.com>
Signed-off-by: Kimball Thurston <kdt3r... |
3rdn4/openexr:115e42e-heap_buffer_overflow_b | /workspace/skyset/ | openexr | 115e42e-heap_buffer_overflow_b | /workspace/skyset/openexr/115e42e-heap_buffer_overflow_b/report.txt | A heap buffer overflow b found in /workspace/skyset/openexr/115e42e-heap_buffer_overflow_b/immutable/ | From 063a881e7a5cd57156dbd0c9b6ad4d30f7023e55 Mon Sep 17 00:00:00 2001
From: Kimball Thurston <kdt3rd@gmail.com>
Date: Thu, 2 Feb 2023 14:04:12 +1300
Subject: [PATCH] Fix missing guard check (#1329)
Addresses OSS-FUZZ
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=52730
Signed-off-by: Kimball Thurston <kdt3rd@... |
3rdn4/openexr:7c40603-stack_buffer_overflow | /workspace/skyset/ | openexr | 7c40603-stack_buffer_overflow | /workspace/skyset/openexr/7c40603-stack_buffer_overflow/report.txt | A stack buffer overflow found in /workspace/skyset/openexr/7c40603-stack_buffer_overflow/immutable/ | From 6f235a803c6370583891f008181f85a91eedb681 Mon Sep 17 00:00:00 2001
From: Kimball Thurston <kdt3rd@gmail.com>
Date: Wed, 24 May 2023 22:47:30 +1200
Subject: [PATCH] fix out of bounds check with a full channel name vs. byte
count (#1429)
Signed-off-by: Kimball Thurston <kdt3rd@gmail.com>
---
src/lib/OpenEXRCore/in... |
3rdn4/radare2:0927ed3-heap_out_of_bound | /workspace/skyset/ | radare2 | 0927ed3-heap_out_of_bound | /workspace/skyset/radare2/0927ed3-heap_out_of_bound/report.txt | A heap out of bound found in /workspace/skyset/radare2/0927ed3-heap_out_of_bound/immutable/ | diff --git a/shlr/java/class.c b/shlr/java/class.c
index 80919af8ec..a2c6747cf1 100644
--- a/shlr/java/class.c
+++ b/shlr/java/class.c
@@ -6933,6 +6933,10 @@ R_API RBinJavaAttrInfo *r_bin_java_bootstrap_methods_attr_new(RBinJavaObj *bin,
offset += 6;
if (attr) {
attr->type = R_BIN_JAVA_ATTR_TYPE_BOOTSTRAP_METHOD... |
3rdn4/radare2:0be8f25-heap_out_of_bound | /workspace/skyset/ | radare2 | 0be8f25-heap_out_of_bound | /workspace/skyset/radare2/0be8f25-heap_out_of_bound/report.txt | A heap out of bound found in /workspace/skyset/radare2/0be8f25-heap_out_of_bound/immutable/ | diff --git a/libr/bin/format/mach0/mach0.c b/libr/bin/format/mach0/mach0.c
index 679198ed62..033f2e83b0 100644
--- a/libr/bin/format/mach0/mach0.c
+++ b/libr/bin/format/mach0/mach0.c
@@ -1510,10 +1510,11 @@ static bool parse_chained_fixups(struct MACH0_(obj_t) *bin, ut32 offset, ut32 si
if (header.starts_offset > siz... |
3rdn4/radare2:108dc76-heap_out_of_bound | /workspace/skyset/ | radare2 | 108dc76-heap_out_of_bound | /workspace/skyset/radare2/108dc76-heap_out_of_bound/report.txt | A heap out of bound found in /workspace/skyset/radare2/108dc76-heap_out_of_bound/immutable/ | diff --git a/libr/bin/p/bin_dyldcache.c b/libr/bin/p/bin_dyldcache.c
index d76699b72f..6b7b512b71 100644
--- a/libr/bin/p/bin_dyldcache.c
+++ b/libr/bin/p/bin_dyldcache.c
@@ -1144,6 +1144,8 @@ static ut64 resolve_symbols_off(RDyldCache *cache, ut64 pa) {
static RList *create_cache_bins(RBinFile *bf, RDyldCache *cach... |
3rdn4/radare2:27fe803-null_pointer_deref | /workspace/skyset/ | radare2 | 27fe803-null_pointer_deref | /workspace/skyset/radare2/27fe803-null_pointer_deref/report.txt | A null pointer deref found in /workspace/skyset/radare2/27fe803-null_pointer_deref/immutable/ | diff --git a/libr/bin/p/bin_symbols.c b/libr/bin/p/bin_symbols.c
index 394736cfff..183507d2d2 100644
--- a/libr/bin/p/bin_symbols.c
+++ b/libr/bin/p/bin_symbols.c
@@ -1,4 +1,4 @@
-/* radare - LGPL - Copyright 2018 - pancake */
+/* radare - LGPL - Copyright 2018-2022 - pancake */
#include <r_types.h>
#include <r_uti... |
3rdn4/radare2:4823451-heap_out_of_bound | /workspace/skyset/ | radare2 | 4823451-heap_out_of_bound | /workspace/skyset/radare2/4823451-heap_out_of_bound/report.txt | A heap out of bound found in /workspace/skyset/radare2/4823451-heap_out_of_bound/immutable/ | diff --git a/libr/bin/format/mach0/coresymbolication.c b/libr/bin/format/mach0/coresymbolication.c
index f554898c94..949afc42cc 100644
--- a/libr/bin/format/mach0/coresymbolication.c
+++ b/libr/bin/format/mach0/coresymbolication.c
@@ -269,6 +269,9 @@ RCoreSymCacheElement *r_coresym_cache_element_new(RBinFile *bf, RBuff... |
3rdn4/radare2:4b22fc5-null_pointer_deref | /workspace/skyset/ | radare2 | 4b22fc5-null_pointer_deref | /workspace/skyset/radare2/4b22fc5-null_pointer_deref/report.txt | A null pointer deref found in /workspace/skyset/radare2/4b22fc5-null_pointer_deref/immutable/ | diff --git a/libr/bin/format/mach0/mach0.c b/libr/bin/format/mach0/mach0.c
index 4e8b97c7ba..14bc321727 100644
--- a/libr/bin/format/mach0/mach0.c
+++ b/libr/bin/format/mach0/mach0.c
@@ -4580,6 +4580,9 @@ void MACH0_(iterate_chained_fixups)(struct MACH0_(obj_t) *bin, ut64 limit_start,
if (page_idx >= bin->chained_... |
3rdn4/radare2:515e592-heap_out_of_bound | /workspace/skyset/ | radare2 | 515e592-heap_out_of_bound | /workspace/skyset/radare2/515e592-heap_out_of_bound/report.txt | A heap out of bound found in /workspace/skyset/radare2/515e592-heap_out_of_bound/immutable/ | diff --git a/libr/bin/format/mach0/coresymbolication.c b/libr/bin/format/mach0/coresymbolication.c
index 5385509f32..f350199550 100644
--- a/libr/bin/format/mach0/coresymbolication.c
+++ b/libr/bin/format/mach0/coresymbolication.c
@@ -222,7 +222,7 @@ RCoreSymCacheElement *r_coresym_cache_element_new(RBinFile *bf, RBuff... |
3rdn4/radare2:5c0bde8-null_pointer_deref | /workspace/skyset/ | radare2 | 5c0bde8-null_pointer_deref | /workspace/skyset/radare2/5c0bde8-null_pointer_deref/report.txt | A null pointer deref found in /workspace/skyset/radare2/5c0bde8-null_pointer_deref/immutable/ | diff --git a/libr/io/io_bank.c b/libr/io/io_bank.c
index 7a62773dff..5b170e74f4 100644
--- a/libr/io/io_bank.c
+++ b/libr/io/io_bank.c
@@ -786,7 +786,7 @@ R_API bool r_io_bank_read_at(RIO *io, const ut32 bankid, ut64 addr, ut8 *buf, in
const ut64 buf_off = R_MAX (addr, r_io_submap_from (sm)) - addr;
const int rea... |
3rdn4/radare2:72ffc02-null_pointer_deref | /workspace/skyset/ | radare2 | 72ffc02-null_pointer_deref | /workspace/skyset/radare2/72ffc02-null_pointer_deref/report.txt | A null pointer deref found in /workspace/skyset/radare2/72ffc02-null_pointer_deref/immutable/ | diff --git a/libr/bin/p/bin_xnu_kernelcache.c b/libr/bin/p/bin_xnu_kernelcache.c
index 36b1c2db08..df5b1fe7d0 100644
--- a/libr/bin/p/bin_xnu_kernelcache.c
+++ b/libr/bin/p/bin_xnu_kernelcache.c
@@ -242,7 +242,9 @@ static bool load_buffer(RBinFile *bf, void **bin_obj, RBuffer *buf, ut64 loadadd
beach:
r_buf_free (... |
3rdn4/radare2:7cfd367-use_after_free | /workspace/skyset/ | radare2 | 7cfd367-use_after_free | /workspace/skyset/radare2/7cfd367-use_after_free/report.txt | A use after free found in /workspace/skyset/radare2/7cfd367-use_after_free/immutable/ | diff --git a/libr/io/io_bank.c b/libr/io/io_bank.c
index 228e422d65..882dfc48d1 100644
--- a/libr/io/io_bank.c
+++ b/libr/io/io_bank.c
@@ -230,7 +230,10 @@ R_API bool r_io_bank_map_add_top(RIO *io, const ut32 bankid, const ut32 mapid) {
//delete all submaps that are completly included in sm
RRBNode *next = r_rbno... |
3rdn4/radare2:95b648f-heap_out_of_bound | /workspace/skyset/ | radare2 | 95b648f-heap_out_of_bound | /workspace/skyset/radare2/95b648f-heap_out_of_bound/report.txt | A heap out of bound found in /workspace/skyset/radare2/95b648f-heap_out_of_bound/immutable/ | diff --git a/libr/anal/anal.c b/libr/anal/anal.c
index 30e7f7b294..727a223ed5 100644
--- a/libr/anal/anal.c
+++ b/libr/anal/anal.c
@@ -147,7 +147,7 @@ R_API RAnal *r_anal_new(void) {
}
R_API bool r_anal_plugin_remove(RAnal *anal, RAnalPlugin *plugin) {
- // R2_590 TODO
+ // XXX TODO
return true;
}
diff --git a... |
3rdn4/radare2:9650e3c-use_after_free | /workspace/skyset/ | radare2 | 9650e3c-use_after_free | /workspace/skyset/radare2/9650e3c-use_after_free/report.txt | A use after free found in /workspace/skyset/radare2/9650e3c-use_after_free/immutable/ | diff --git a/libr/bin/format/pyc/marshal.c b/libr/bin/format/pyc/marshal.c
index 4245a17824..728bf73701 100644
--- a/libr/bin/format/pyc/marshal.c
+++ b/libr/bin/format/pyc/marshal.c
@@ -1098,7 +1098,7 @@ static pyc_object *get_object(RBuffer *buffer) {
break;
case TYPE_UNKNOWN:
eprintf ("Get not implemented fo... |
3rdn4/radare2:9bcc98f-heap_out_of_bound | /workspace/skyset/ | radare2 | 9bcc98f-heap_out_of_bound | /workspace/skyset/radare2/9bcc98f-heap_out_of_bound/report.txt | A heap out of bound found in /workspace/skyset/radare2/9bcc98f-heap_out_of_bound/immutable/ | diff --git a/libr/bin/p/bin_symbols.c b/libr/bin/p/bin_symbols.c
index 2036dc092b..779e36940f 100644
--- a/libr/bin/p/bin_symbols.c
+++ b/libr/bin/p/bin_symbols.c
@@ -181,7 +181,7 @@ static RBinSymbol *bin_symbol_from_symbol(RCoreSymCacheElement *element, RCoreSy
static RCoreSymCacheElement *parseDragons(RBinFile *b... |
3rdn4/radare2:a16cb20-heap_out_of_bound | /workspace/skyset/ | radare2 | a16cb20-heap_out_of_bound | /workspace/skyset/radare2/a16cb20-heap_out_of_bound/report.txt | A heap out of bound found in /workspace/skyset/radare2/a16cb20-heap_out_of_bound/immutable/ | diff --git a/libr/anal/p/anal_msp430.c b/libr/anal/p/anal_msp430.c
index fbb51828a4..d8298db578 100644
--- a/libr/anal/p/anal_msp430.c
+++ b/libr/anal/p/anal_msp430.c
@@ -10,17 +10,13 @@
#include "../arch/msp430/msp430_disas.h"
static int msp430_op(RAnal *anal, RAnalOp *op, ut64 addr, const ut8 *buf, int len, RAnal... |
3rdn4/radare2:a58b8d4-heap_out_of_bound | /workspace/skyset/ | radare2 | a58b8d4-heap_out_of_bound | /workspace/skyset/radare2/a58b8d4-heap_out_of_bound/report.txt | A heap out of bound found in /workspace/skyset/radare2/a58b8d4-heap_out_of_bound/immutable/ | diff --git a/libr/bin/format/mach0/coresymbolication.c b/libr/bin/format/mach0/coresymbolication.c
index f350199550..f554898c94 100644
--- a/libr/bin/format/mach0/coresymbolication.c
+++ b/libr/bin/format/mach0/coresymbolication.c
@@ -274,12 +274,12 @@ RCoreSymCacheElement *r_coresym_cache_element_new(RBinFile *bf, RBu... |
3rdn4/radare2:cf780fd-use_after_free | /workspace/skyset/ | radare2 | cf780fd-use_after_free | /workspace/skyset/radare2/cf780fd-use_after_free/report.txt | A use after free found in /workspace/skyset/radare2/cf780fd-use_after_free/immutable/ | diff --git a/libr/core/canal.c b/libr/core/canal.c
index 9b4ded95c1..408f3bc0b7 100644
--- a/libr/core/canal.c
+++ b/libr/core/canal.c
@@ -5188,11 +5188,12 @@ R_API void r_core_anal_esil(RCore *core, const char *str, const char *target) {
r_core_cmd0 (core, "aeim");
ESIL = core->anal->esil;
}
- const char *spna... |
3rdn4/radare2:d026503-heap_out_of_bound | /workspace/skyset/ | radare2 | d026503-heap_out_of_bound | /workspace/skyset/radare2/d026503-heap_out_of_bound/report.txt | A heap out of bound found in /workspace/skyset/radare2/d026503-heap_out_of_bound/immutable/ | diff --git a/shlr/java/code.c b/shlr/java/code.c
index 97347eb8d1..efafecf8c9 100644
--- a/shlr/java/code.c
+++ b/shlr/java/code.c
@@ -206,9 +206,9 @@ R_API int java_print_opcode(RBinJavaObj *obj, ut64 addr, int idx, const ut8 *byt
case 0xa6: // if_acmpne
case 0xa7: // goto
case 0xa8: // jsr
- if (len > 1) {
- ... |
3rdn4/radare2:d17a7bd-use_after_free | /workspace/skyset/ | radare2 | d17a7bd-use_after_free | /workspace/skyset/radare2/d17a7bd-use_after_free/report.txt | A use after free found in /workspace/skyset/radare2/d17a7bd-use_after_free/immutable/ | diff --git a/libr/bin/format/pyc/marshal.c b/libr/bin/format/pyc/marshal.c
index 728bf73701..16f297198d 100644
--- a/libr/bin/format/pyc/marshal.c
+++ b/libr/bin/format/pyc/marshal.c
@@ -1,4 +1,4 @@
-/* radare - LGPL3 - Copyright 2016-2021 - Matthieu (c0riolis) Tardy - l0stb1t*/
+/* radare - LGPL3 - Copyright 2016-2022... |
3rdn4/radare2:d22d160-use_after_free | /workspace/skyset/ | radare2 | d22d160-use_after_free | /workspace/skyset/radare2/d22d160-use_after_free/report.txt | A use after free found in /workspace/skyset/radare2/d22d160-use_after_free/immutable/ | diff --git a/libr/anal/fcn.c b/libr/anal/fcn.c
index 9780d01046..d159e1ae36 100644
--- a/libr/anal/fcn.c
+++ b/libr/anal/fcn.c
@@ -815,7 +815,7 @@ repeat:
// note, we have still increased size of basic block
// (and function)
if (anal->verbose) {
- eprintf("Enter branch delay at 0x%08"PFMT64x ". bb->sz=%... |
3rdn4/radare2:eca58ce-heap_out_of_bound | /workspace/skyset/ | radare2 | eca58ce-heap_out_of_bound | /workspace/skyset/radare2/eca58ce-heap_out_of_bound/report.txt | A heap out of bound found in /workspace/skyset/radare2/eca58ce-heap_out_of_bound/immutable/ | diff --git a/libr/bin/bfile.c b/libr/bin/bfile.c
index 3216e5b761..bb9663fff1 100644
--- a/libr/bin/bfile.c
+++ b/libr/bin/bfile.c
@@ -178,19 +178,19 @@ static int string_scan_range(RList *list, RBinFile *bf, int min,
free (charset);
RConsIsBreaked is_breaked = (bin && bin->consb.is_breaked)? bin->consb.is_breaked:... |
3rdn4/sleuthkit:34f995d-heap_buffer_overflow_a | /workspace/skyset/ | sleuthkit | 34f995d-heap_buffer_overflow_a | /workspace/skyset/sleuthkit/34f995d-heap_buffer_overflow_a/report.txt | A heap buffer overflow a found in /workspace/skyset/sleuthkit/34f995d-heap_buffer_overflow_a/immutable/ | From 243274a82cc506507bc59083d63a0d3b7ced611e Mon Sep 17 00:00:00 2001
From: Brian Carrier <carrier@sleuthkit.org>
Date: Thu, 10 Sep 2020 12:44:24 -0400
Subject: [PATCH] Fix bug that uses wrong value
---
tsk/fs/ntfs.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/tsk/fs/ntfs.c b/tsk/fs/ntfs.c
in... |
3rdn4/sleuthkit:34f995d-heap_buffer_overflow_b | /workspace/skyset/ | sleuthkit | 34f995d-heap_buffer_overflow_b | /workspace/skyset/sleuthkit/34f995d-heap_buffer_overflow_b/report.txt | A heap buffer overflow b found in /workspace/skyset/sleuthkit/34f995d-heap_buffer_overflow_b/immutable/ | From 4d379cb12e67f5bc690d2e2e4d6ce752c2b41e67 Mon Sep 17 00:00:00 2001
From: Joachim Metz <joachim.metz@gmail.com>
Date: Thu, 22 Apr 2021 05:36:18 +0200
Subject: [PATCH] Fixed integer wrap around
---
tsk/fs/ntfs.c | 22 ++++++++++++++++------
1 file changed, 16 insertions(+), 6 deletions(-)
diff --git a/tsk/fs/ntfs.... |
3rdn4/sleuthkit:38a13f9-heap_buffer_overflow | /workspace/skyset/ | sleuthkit | 38a13f9-heap_buffer_overflow | /workspace/skyset/sleuthkit/38a13f9-heap_buffer_overflow/report.txt | A heap buffer overflow found in /workspace/skyset/sleuthkit/38a13f9-heap_buffer_overflow/immutable/ | From 675093ee08b1cc970419946760ca6340edfca272 Mon Sep 17 00:00:00 2001
From: Joachim Metz <joachim.metz@gmail.com>
Date: Sat, 18 Sep 2021 09:26:15 +0200
Subject: [PATCH] Fixed integer overflow ext4_load_attrs_inline leading to
OOB-read
---
tsk/fs/ext2fs.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff -... |
3rdn4/hostap:703c2b6-heap_buffer_overflow | /workspace/skyset/ | hostap | 703c2b6-heap_buffer_overflow | /workspace/skyset/hostap/703c2b6-heap_buffer_overflow/report.txt | A heap buffer overflow found in /workspace/skyset/hostap/703c2b6-heap_buffer_overflow/immutable/ | commit 76162b18280b174cd5e7101c9678f69785409fa3
Author: Jouni Malinen <j@w1.fi>
Date: Tue Jan 28 14:17:52 2020 +0200
TLS: Fix bounds checking in certificate policy parser
The recent addition of the X.509v3 certificatePolicies parser had a
copy-paste issue on the inner SEQUENCE parser that ended up u... |
3rdn4/hostap:a6ed414-heap_buffer_overflow_a | /workspace/skyset/ | hostap | a6ed414-heap_buffer_overflow_a | /workspace/skyset/hostap/a6ed414-heap_buffer_overflow_a/report.txt | A heap buffer overflow a found in /workspace/skyset/hostap/a6ed414-heap_buffer_overflow_a/immutable/ | commit ce11c281ad1de25a815d49a29043d127cbc6354d
Author: Jouni Malinen <j@w1.fi>
Date: Sat Jun 22 18:11:24 2019 +0300
TLS: Fix X.509v3 BasicConstraints parsing
Handling of the optional pathLenConstraint after cA was not done
properly. The position after cA needs to be compared to the end of the
S... |
3rdn4/hostap:a6ed414-heap_buffer_overflow_b | /workspace/skyset/ | hostap | a6ed414-heap_buffer_overflow_b | /workspace/skyset/hostap/a6ed414-heap_buffer_overflow_b/report.txt | A heap buffer overflow b found in /workspace/skyset/hostap/a6ed414-heap_buffer_overflow_b/immutable/ | commit ce11c281ad1de25a815d49a29043d127cbc6354d
Author: Jouni Malinen <j@w1.fi>
Date: Sat Jun 22 18:11:24 2019 +0300
TLS: Fix X.509v3 BasicConstraints parsing
Handling of the optional pathLenConstraint after cA was not done
properly. The position after cA needs to be compared to the end of the
S... |
3rdn4/sleuthkit:82d254b-heap_buffer_overflow | /workspace/skyset/ | sleuthkit | 82d254b-heap_buffer_overflow | /workspace/skyset/sleuthkit/82d254b-heap_buffer_overflow/report.txt | A heap buffer overflow found in /workspace/skyset/sleuthkit/82d254b-heap_buffer_overflow/immutable/ | From 4d379cb12e67f5bc690d2e2e4d6ce752c2b41e67 Mon Sep 17 00:00:00 2001
From: Joachim Metz <joachim.metz@gmail.com>
Date: Thu, 22 Apr 2021 05:36:18 +0200
Subject: [PATCH] Fixed integer wrap around
---
tsk/fs/ntfs.c | 22 ++++++++++++++++------
1 file changed, 16 insertions(+), 6 deletions(-)
diff --git a/tsk/fs/ntfs.... |
3rdn4/sleuthkit:d9b19e1-heap_buffer_overflow | /workspace/skyset/ | sleuthkit | d9b19e1-heap_buffer_overflow | /workspace/skyset/sleuthkit/d9b19e1-heap_buffer_overflow/report.txt | A heap buffer overflow found in /workspace/skyset/sleuthkit/d9b19e1-heap_buffer_overflow/immutable/ | From 4d379cb12e67f5bc690d2e2e4d6ce752c2b41e67 Mon Sep 17 00:00:00 2001
From: Joachim Metz <joachim.metz@gmail.com>
Date: Thu, 22 Apr 2021 05:36:18 +0200
Subject: [PATCH] Fixed integer wrap around
---
tsk/fs/ntfs.c | 22 ++++++++++++++++------
1 file changed, 16 insertions(+), 6 deletions(-)
diff --git a/tsk/fs/ntfs.... |
3rdn4/wasm3-harness:0124fd5-heap_buffer_overflow | /workspace/skyset/ | wasm3-harness | 0124fd5-heap_buffer_overflow | /workspace/skyset/wasm3-harness/0124fd5-heap_buffer_overflow/report.txt | A heap buffer overflow found in /workspace/skyset/wasm3-harness/0124fd5-heap_buffer_overflow/immutable/ | From 79255ba1dbbb476e57a5f450eb0bbe1b84ef0f01 Mon Sep 17 00:00:00 2001
From: Volodymyr Shymanskyy <vshymanskyi@gmail.com>
Date: Mon, 12 Apr 2021 16:24:34 +0300
Subject: [PATCH] Restict opcodes during expression evaluation
---
source/m3_compile.c | 19 +++++++++++++++----
source/m3_compile.h | 9 +++++++++
source/m3_... |
3rdn4/wasm3-harness:355285d-global_buffer_overflow | /workspace/skyset/ | wasm3-harness | 355285d-global_buffer_overflow | /workspace/skyset/wasm3-harness/355285d-global_buffer_overflow/report.txt | A global buffer overflow found in /workspace/skyset/wasm3-harness/355285d-global_buffer_overflow/immutable/ | From 60fdd9ecd84b841351059dbfb962a32f616e376e Mon Sep 17 00:00:00 2001
From: Volodymyr Shymanskyy <vshymanskyi@gmail.com>
Date: Sat, 10 Apr 2021 01:21:08 +0300
Subject: [PATCH] Bounds check on opcode decoding
---
source/m3_compile.c | 15 +++++++++++++++
source/m3_compile.h | 12 +-----------
2 files changed, 16 inse... |
3rdn4/wasm3-harness:4f0b769-heap_use_after_free | /workspace/skyset/ | wasm3-harness | 4f0b769-heap_use_after_free | /workspace/skyset/wasm3-harness/4f0b769-heap_use_after_free/report.txt | A heap use after free found in /workspace/skyset/wasm3-harness/4f0b769-heap_use_after_free/immutable/ | From 6bb612ccbfd5f8993a07a99092fab534722df1c3 Mon Sep 17 00:00:00 2001
From: Vova <vshymanskyi@gmail.com>
Date: Tue, 4 May 2021 23:23:51 +0300
Subject: [PATCH] Disable start func execution for fuzzing builds
---
source/m3_compile.c | 5 ++++-
source/m3_env.c | 5 +++++
2 files changed, 9 insertions(+), 1 deletion... |
3rdn4/wasm3-harness:4f0b769-unknown_read | /workspace/skyset/ | wasm3-harness | 4f0b769-unknown_read | /workspace/skyset/wasm3-harness/4f0b769-unknown_read/report.txt | A unknown read found in /workspace/skyset/wasm3-harness/4f0b769-unknown_read/immutable/ | From 6bb612ccbfd5f8993a07a99092fab534722df1c3 Mon Sep 17 00:00:00 2001
From: Vova <vshymanskyi@gmail.com>
Date: Tue, 4 May 2021 23:23:51 +0300
Subject: [PATCH] Disable start func execution for fuzzing builds
---
source/m3_compile.c | 5 ++++-
source/m3_env.c | 5 +++++
2 files changed, 9 insertions(+), 1 deletion... |
3rdn4/wasm3-harness:4f0b769-unknown_write | /workspace/skyset/ | wasm3-harness | 4f0b769-unknown_write | /workspace/skyset/wasm3-harness/4f0b769-unknown_write/report.txt | A unknown write found in /workspace/skyset/wasm3-harness/4f0b769-unknown_write/immutable/ | From 6bb612ccbfd5f8993a07a99092fab534722df1c3 Mon Sep 17 00:00:00 2001
From: Vova <vshymanskyi@gmail.com>
Date: Tue, 4 May 2021 23:23:51 +0300
Subject: [PATCH] Disable start func execution for fuzzing builds
---
source/m3_compile.c | 5 ++++-
source/m3_env.c | 5 +++++
2 files changed, 9 insertions(+), 1 deletion... |
3rdn4/wasm3-harness:bc32ee0-segv_on_unknown_address | /workspace/skyset/ | wasm3-harness | bc32ee0-segv_on_unknown_address | /workspace/skyset/wasm3-harness/bc32ee0-segv_on_unknown_address/report.txt | A segv on unknown address found in /workspace/skyset/wasm3-harness/bc32ee0-segv_on_unknown_address/immutable/ | From 6bb612ccbfd5f8993a07a99092fab534722df1c3 Mon Sep 17 00:00:00 2001
From: Vova <vshymanskyi@gmail.com>
Date: Tue, 4 May 2021 23:23:51 +0300
Subject: [PATCH] Disable start func execution for fuzzing builds
---
source/m3_compile.c | 5 ++++-
source/m3_env.c | 5 +++++
2 files changed, 9 insertions(+), 1 deletion... |
3rdn4/wasm3-harness:bc32ee0-unknown_read | /workspace/skyset/ | wasm3-harness | bc32ee0-unknown_read | /workspace/skyset/wasm3-harness/bc32ee0-unknown_read/report.txt | A unknown read found in /workspace/skyset/wasm3-harness/bc32ee0-unknown_read/immutable/ | From 6bb612ccbfd5f8993a07a99092fab534722df1c3 Mon Sep 17 00:00:00 2001
From: Vova <vshymanskyi@gmail.com>
Date: Tue, 4 May 2021 23:23:51 +0300
Subject: [PATCH] Disable start func execution for fuzzing builds
---
source/m3_compile.c | 5 ++++-
source/m3_env.c | 5 +++++
2 files changed, 9 insertions(+), 1 deletion... |
3rdn4/yasm:84be2ee-heap_out_of_bound | /workspace/skyset/ | yasm | 84be2ee-heap_out_of_bound | /workspace/skyset/yasm/84be2ee-heap_out_of_bound/report.txt | A heap out of bound found in /workspace/skyset/yasm/84be2ee-heap_out_of_bound/immutable/ | diff --git a/modules/parsers/nasm/nasm-token.re b/modules/parsers/nasm/nasm-token.re
index dba7137e..b2110ce9 100644
--- a/modules/parsers/nasm/nasm-token.re
+++ b/modules/parsers/nasm/nasm-token.re
@@ -79,7 +79,7 @@ handle_dot_label(YYSTYPE *lvalp, char *tok, size_t toklen, size_t zeropos,
lvalp->str_val = ya... |
3rdn4/yasm:ecb47f1-null_pointer_deref | /workspace/skyset/ | yasm | ecb47f1-null_pointer_deref | /workspace/skyset/yasm/ecb47f1-null_pointer_deref/report.txt | A null pointer deref found in /workspace/skyset/yasm/ecb47f1-null_pointer_deref/immutable/ | diff --git a/libyasm/expr.c b/libyasm/expr.c
index 5b0c418b..09ae1121 100644
--- a/libyasm/expr.c
+++ b/libyasm/expr.c
@@ -1264,7 +1264,7 @@ yasm_expr_get_intnum(yasm_expr **ep, int calc_bc_dist)
{
*ep = yasm_expr_simplify(*ep, calc_bc_dist);
- if ((*ep)->op == YASM_EXPR_IDENT && (*ep)->terms[0].type == YASM... |
3rdn4/zstd:0a96d00-heap_buffer_overflow | /workspace/skyset/ | zstd | 0a96d00-heap_buffer_overflow | /workspace/skyset/zstd/0a96d00-heap_buffer_overflow/report.txt | A heap buffer overflow found in /workspace/skyset/zstd/0a96d00-heap_buffer_overflow/immutable/ | From 05b6773fbcce1075edbe498a821f9a41249cf384 Mon Sep 17 00:00:00 2001
From: Nick Terrell <terrelln@fb.com>
Date: Mon, 14 Jun 2021 11:25:55 -0700
Subject: [PATCH] [fix] Add missing bounds checks during compression
* The block splitter missed a bounds check, so when the buffer is too small it
passes an erroneously la... |
3rdn4/zstd:2fabd37-global_buffer_overflow | /workspace/skyset/ | zstd | 2fabd37-global_buffer_overflow | /workspace/skyset/zstd/2fabd37-global_buffer_overflow/report.txt | A global buffer overflow found in /workspace/skyset/zstd/2fabd37-global_buffer_overflow/immutable/ | From 4d8a2132d0e453232a46dd448e5137035ba25bee Mon Sep 17 00:00:00 2001
From: Nick Terrell <terrelln@fb.com>
Date: Thu, 6 Jan 2022 16:00:02 -0800
Subject: [PATCH] [opt] Fix oss-fuzz bug in optimal parser
oss-fuzz uncovered a scenario where we're evaluating the cost of litLength = 131072,
which can't be represented in t... |
3rdn4/zstd:3cac061-heap_buffer_overflow | /workspace/skyset/ | zstd | 3cac061-heap_buffer_overflow | /workspace/skyset/zstd/3cac061-heap_buffer_overflow/report.txt | A heap buffer overflow found in /workspace/skyset/zstd/3cac061-heap_buffer_overflow/immutable/ | From efd37a64eaff5a0a26ae2566fdb45dc4a0c91673 Mon Sep 17 00:00:00 2001
From: Nick Terrell <terrelln@fb.com>
Date: Thu, 19 Sep 2019 13:25:03 -0700
Subject: [PATCH] Optimize decompression and fix wildcopy overread
* Bump `WILDCOPY_OVERLENGTH` to 16 to fix the wildcopy overread.
* Optimize `ZSTD_wildcopy()` by removing u... |
3rdn4/zstd:6f40571-unknown_read | /workspace/skyset/ | zstd | 6f40571-unknown_read | /workspace/skyset/zstd/6f40571-unknown_read/report.txt | A unknown read found in /workspace/skyset/zstd/6f40571-unknown_read/immutable/ | From e6c8a5dd40359801bf297dca3be48e38c85ed6c2 Mon Sep 17 00:00:00 2001
From: Sen Huang <senhuang96@fb.com>
Date: Tue, 4 May 2021 09:50:44 -0700
Subject: [PATCH] Fix incorrect usages of repIndex across all strategies
---
lib/compress/zstd_double_fast.c | 4 ++--
lib/compress/zstd_fast.c | 6 +++---
lib/compre... |
3rdn4/zstd:d68aa19-heap_buffer_overflow | /workspace/skyset/ | zstd | d68aa19-heap_buffer_overflow | /workspace/skyset/zstd/d68aa19-heap_buffer_overflow/report.txt | A heap buffer overflow found in /workspace/skyset/zstd/d68aa19-heap_buffer_overflow/immutable/ | From a7aa2c5df6ced5f3c2019a825cfb08a619cf6851 Mon Sep 17 00:00:00 2001
From: Sen Huang <senhuang96@fb.com>
Date: Wed, 15 Sep 2021 09:51:42 -0700
Subject: [PATCH 1/2] Fix NCountWriteBound
---
lib/compress/fse_compress.c | 6 +++++-
1 file changed, 5 insertions(+), 1 deletion(-)
diff --git a/lib/compress/fse_compress.... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.