task_id stringlengths 30 61 | workdir stringclasses 1
value | project_name stringclasses 32
values | tag_name stringlengths 19 32 | report_path stringlengths 53 84 | vulnerability_description stringlengths 76 116 | patch_diff stringlengths 375 461k |
|---|---|---|---|---|---|---|
3rdn4/assimp:0422dff-heap_buffer_overflow | /workspace/skyset/ | assimp | 0422dff-heap_buffer_overflow | /workspace/skyset/assimp/0422dff-heap_buffer_overflow/report.txt | A heap buffer overflow found in /workspace/skyset/assimp/0422dff-heap_buffer_overflow/immutable/ | From d5294be00b0f89486b3459d5835045dbf26444b5 Mon Sep 17 00:00:00 2001
From: Alex <aleksandrosansan@gmail.com>
Date: Sat, 10 Dec 2022 01:22:00 +0000
Subject: [PATCH] Fixes Heap-buffer-overflow READ 4 in
Assimp::ScenePreprocessor::ProcessMesh
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=49797
---
code/AssetL... |
3rdn4/assimp:2d44861-unknown_write | /workspace/skyset/ | assimp | 2d44861-unknown_write | /workspace/skyset/assimp/2d44861-unknown_write/report.txt | A unknown write found in /workspace/skyset/assimp/2d44861-unknown_write/immutable/ | From 36dfa3bed31fe220a15648083a78c925fbec0792 Mon Sep 17 00:00:00 2001
From: Alex <aleksandrosansan@gmail.com>
Date: Wed, 14 Jun 2023 15:50:50 +0000
Subject: [PATCH] Fix UNKNOWN WRITE in Assimp::SortByPTypeProcess::Execute
---
code/AssetLib/OFF/OFFLoader.cpp | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff... |
3rdn4/c-blosc:01df770-heap_buffer_overflow | /workspace/skyset/ | c-blosc | 01df770-heap_buffer_overflow | /workspace/skyset/c-blosc/01df770-heap_buffer_overflow/report.txt | A heap buffer overflow found in /workspace/skyset/c-blosc/01df770-heap_buffer_overflow/immutable/ | From e3fdd3e506a23ec66d9f3fe2fe346e4a03b1787a Mon Sep 17 00:00:00 2001
From: Francesc Alted <faltet@gmail.com>
Date: Fri, 3 Jul 2020 11:03:31 +0200
Subject: [PATCH] blosclz updated to 2.3.0 (backport from c-blosc2)
---
blosc/blosc.h | 8 +-
blosc/blosclz.c | 467 ++++++++++++++++++++++++++++++++++--------------
2... |
3rdn4/c-blosc:41f3a2e-heap_buffer_overflow | /workspace/skyset/ | c-blosc | 41f3a2e-heap_buffer_overflow | /workspace/skyset/c-blosc/41f3a2e-heap_buffer_overflow/report.txt | A heap buffer overflow found in /workspace/skyset/c-blosc/41f3a2e-heap_buffer_overflow/immutable/ | From 8f702156e8c9ecc8bbcbabfc0d8ee38bc294dddd Mon Sep 17 00:00:00 2001
From: Francesc Alted <francesc@blosc.org>
Date: Tue, 28 Sep 2021 18:19:59 +0200
Subject: [PATCH] BloscLZ version bumped to 2.5.1
---
blosc/blosc.h | 2 +-
blosc/blosclz.c | 2 +-
2 files changed, 2 insertions(+), 2 deletions(-)
diff --git a/blo... |
3rdn4/c-blosc2:38b23d5-negative_size_param | /workspace/skyset/ | c-blosc2 | 38b23d5-negative_size_param | /workspace/skyset/c-blosc2/38b23d5-negative_size_param/report.txt | A negative size param found in /workspace/skyset/c-blosc2/38b23d5-negative_size_param/immutable/ | From ac7b9359e84d796bfb1ff1fd3f7c9eaf9a506799 Mon Sep 17 00:00:00 2001
From: Nathan Moinvaziri <nathan@nathanm.com>
Date: Mon, 10 May 2021 07:41:00 -0700
Subject: [PATCH] Added typesize check when reading frame header info.
https://oss-fuzz.com/testcase-detail/6103287616110592
---
blosc/frame.c | 17 ++++++++++++----... |
3rdn4/c-blosc2:4f6d42a-invalid_free | /workspace/skyset/ | c-blosc2 | 4f6d42a-invalid_free | /workspace/skyset/c-blosc2/4f6d42a-invalid_free/report.txt | A invalid free found in /workspace/skyset/c-blosc2/4f6d42a-invalid_free/immutable/ | From 1a79d783cc791faf12fa9f6f6f92c26fb8be4967 Mon Sep 17 00:00:00 2001
From: Nathan Moinvaziri <nathan@nathanm.com>
Date: Fri, 12 Mar 2021 17:48:39 -0800
Subject: [PATCH] Fixed ASAN null-deference read trying to free chunk that has
already been free. https://oss-fuzz.com/testcase-detail/5107303620673536
---
blosc/fr... |
3rdn4/c-blosc2:6fc4790-heap_buffer_overflow_b | /workspace/skyset/ | c-blosc2 | 6fc4790-heap_buffer_overflow_b | /workspace/skyset/c-blosc2/6fc4790-heap_buffer_overflow_b/report.txt | A heap buffer overflow b found in /workspace/skyset/c-blosc2/6fc4790-heap_buffer_overflow_b/immutable/ | From 4f6d42ab4b25e781dad94c5324dab8a4dbb702ad Mon Sep 17 00:00:00 2001
From: Nathan Moinvaziri <nathan@nathanm.com>
Date: Mon, 1 Mar 2021 20:06:43 -0800
Subject: [PATCH] Fixed ASAN heap-buffer-overflow when reading chunk offset in
frame. https://oss-fuzz.com/testcase-detail/4753813014708224
---
blosc/frame.c | 2 +-
... |
3rdn4/c-blosc2:81c2fcd-heap_buffer_overflow_b | /workspace/skyset/ | c-blosc2 | 81c2fcd-heap_buffer_overflow_b | /workspace/skyset/c-blosc2/81c2fcd-heap_buffer_overflow_b/report.txt | A heap buffer overflow b found in /workspace/skyset/c-blosc2/81c2fcd-heap_buffer_overflow_b/immutable/ | From ce9aa2247006ed182dabb922bd3536b13375c4cf Mon Sep 17 00:00:00 2001
From: Nathan Moinvaziri <nathan@nathanm.com>
Date: Mon, 12 Apr 2021 19:12:00 -0700
Subject: [PATCH] Fixed ASAN heap-buffer-overflow when reading frame
vlmetalayers. When reading content we should not be using trailer_pos to
check bounds as it is o... |
3rdn4/c-blosc2:81c2fcd-heap_buffer_overflow_c | /workspace/skyset/ | c-blosc2 | 81c2fcd-heap_buffer_overflow_c | /workspace/skyset/c-blosc2/81c2fcd-heap_buffer_overflow_c/report.txt | A heap buffer overflow c found in /workspace/skyset/c-blosc2/81c2fcd-heap_buffer_overflow_c/immutable/ | From 8a058b7a6be4d7e47a9af5831c454fca8c725dd4 Mon Sep 17 00:00:00 2001
From: Nathan Moinvaziri <nathan@nathanm.com>
Date: Sat, 8 May 2021 11:38:00 -0700
Subject: [PATCH] Fixed ASAN heap-buffer-overflow when reading frame
metalayers. Similar to #279. Variable header_pos is used for checking
boundaries when reading nam... |
3rdn4/c-blosc2:aebf2b9-heap_buffer_overflow | /workspace/skyset/ | c-blosc2 | aebf2b9-heap_buffer_overflow | /workspace/skyset/c-blosc2/aebf2b9-heap_buffer_overflow/report.txt | A heap buffer overflow found in /workspace/skyset/c-blosc2/aebf2b9-heap_buffer_overflow/immutable/ | From f00f545b17cbb9958e9da054d137dbf0edd60331 Mon Sep 17 00:00:00 2001
From: Nathan Moinvaziri <nathan@nathanm.com>
Date: Sat, 23 Jan 2021 18:41:11 -0800
Subject: [PATCH] Fixed ASAN error due to invalid header length.
https://oss-fuzz.com/testcase-detail/6021380745330688
---
blosc/frame.c | 4 ++--
1 file changed, 2... |
3rdn4/c-blosc2:cb15f1b-unknown_read | /workspace/skyset/ | c-blosc2 | cb15f1b-unknown_read | /workspace/skyset/c-blosc2/cb15f1b-unknown_read/report.txt | A unknown read found in /workspace/skyset/c-blosc2/cb15f1b-unknown_read/immutable/ | From 61aae4f319ac801ead90d789cbd7f7e3f2efd133 Mon Sep 17 00:00:00 2001
From: Nathan Moinvaziri <nathan@nathanm.com>
Date: Fri, 29 Jan 2021 17:47:36 -0800
Subject: [PATCH] Fixed ASAN unknown-read when reading stream if previous
stream cbytes < 0. https://oss-fuzz.com/testcase-detail/4727058852872192
---
blosc/blosc2.... |
3rdn4/extractfix-binutils:515f23e-divide_by_zero | /workspace/skyset/ | extractfix-binutils | 515f23e-divide_by_zero | /workspace/skyset/extractfix-binutils/515f23e-divide_by_zero/report.txt | A divide by zero found in /workspace/skyset/extractfix-binutils/515f23e-divide_by_zero/immutable/ | diff --git a/bfd/ChangeLog b/bfd/ChangeLog
index f63a8bb1694..e232764448d 100644
--- a/bfd/ChangeLog
+++ b/bfd/ChangeLog
@@ -1,3 +1,9 @@
+2017-09-24 Alan Modra <amodra@gmail.com>
+
+ PR 22186
+ * dwarf2.c (decode_line_info): Fail on lh.line_range of zero
+ rather than dividing by zero.
+
2017-09-24 Alan Modra <amo... |
3rdn4/extractfix-binutils:c48935d-heap_buffer_overflow | /workspace/skyset/ | extractfix-binutils | c48935d-heap_buffer_overflow | /workspace/skyset/extractfix-binutils/c48935d-heap_buffer_overflow/report.txt | A heap buffer overflow found in /workspace/skyset/extractfix-binutils/c48935d-heap_buffer_overflow/immutable/ | diff --git a/binutils/ChangeLog b/binutils/ChangeLog
index 1b63c7d0184..5219cb129e9 100644
--- a/binutils/ChangeLog
+++ b/binutils/ChangeLog
@@ -1,3 +1,9 @@
+2018-04-17 Nick Clifton <nickc@redhat.com>
+
+ PR 23064
+ * dwarf.c (process_cu_tu_index): Test for a potential buffer
+ overrun before copying signature pointe... |
3rdn4/extractfix-coreutils:658529a-heap_buffer_overflow | /workspace/skyset/ | extractfix-coreutils | 658529a-heap_buffer_overflow | /workspace/skyset/extractfix-coreutils/658529a-heap_buffer_overflow/report.txt | A heap buffer overflow found in /workspace/skyset/extractfix-coreutils/658529a-heap_buffer_overflow/immutable/ | diff --git a/src/make-prime-list.c b/src/make-prime-list.c
index 68c972a84..69b91e895 100644
--- a/src/make-prime-list.c
+++ b/src/make-prime-list.c
@@ -211,7 +211,7 @@ main (int argc, char **argv)
for (j = (p*p - 3)/2; j < size; j+= p)
sieve[j] = 0;
- while (i < size && sieve[++i] == 0)
+ w... |
3rdn4/extractfix-jasper:3c55b39-heap_buffer_overflow | /workspace/skyset/ | extractfix-jasper | 3c55b39-heap_buffer_overflow | /workspace/skyset/extractfix-jasper/3c55b39-heap_buffer_overflow/report.txt | A heap buffer overflow found in /workspace/skyset/extractfix-jasper/3c55b39-heap_buffer_overflow/immutable/ | diff --git a/src/libjasper/jpc/jpc_cs.c b/src/libjasper/jpc/jpc_cs.c
index 6da4872..55d34d6 100644
--- a/src/libjasper/jpc/jpc_cs.c
+++ b/src/libjasper/jpc/jpc_cs.c
@@ -512,6 +512,16 @@ static int jpc_siz_getparms(jpc_ms_t *ms, jpc_cstate_t *cstate,
jas_free(siz->comps);
return -1;
}
+ if (siz->comps[i].hsa... |
3rdn4/extractfix-jasper:b9be3d9-integer_overflow | /workspace/skyset/ | extractfix-jasper | b9be3d9-integer_overflow | /workspace/skyset/extractfix-jasper/b9be3d9-integer_overflow/report.txt | A integer overflow found in /workspace/skyset/extractfix-jasper/b9be3d9-integer_overflow/immutable/ | diff --git a/src/libjasper/jpc/jpc_dec.c b/src/libjasper/jpc/jpc_dec.c
index d2f258e..4f24660 100644
--- a/src/libjasper/jpc/jpc_dec.c
+++ b/src/libjasper/jpc/jpc_dec.c
@@ -1195,6 +1195,7 @@ static int jpc_dec_process_siz(jpc_dec_t *dec, jpc_ms_t *ms)
int htileno;
int vtileno;
jpc_dec_cmpt_t *cmpt;
+ size_t size;... |
3rdn4/extractfix-libjpeg-turbo:3212005-null_ptr_dereference | /workspace/skyset/ | extractfix-libjpeg-turbo | 3212005-null_ptr_dereference | /workspace/skyset/extractfix-libjpeg-turbo/3212005-null_ptr_dereference/report.txt | A null ptr dereference found in /workspace/skyset/extractfix-libjpeg-turbo/3212005-null_ptr_dereference/immutable/ | diff --git a/jquant1.c b/jquant1.c
index e7814815..34965ed0 100644
--- a/jquant1.c
+++ b/jquant1.c
@@ -531,6 +531,9 @@ quantize_ord_dither (j_decompress_ptr cinfo, JSAMPARRAY input_buf,
JDIMENSION col;
JDIMENSION width = cinfo->output_width;
+ if (output_buf == NULL) /* just want to update dither tables... |
3rdn4/extractfix-libjpeg-turbo:4f24016-stack_buffer_overflow | /workspace/skyset/ | extractfix-libjpeg-turbo | 4f24016-stack_buffer_overflow | /workspace/skyset/extractfix-libjpeg-turbo/4f24016-stack_buffer_overflow/report.txt | A stack buffer overflow found in /workspace/skyset/extractfix-libjpeg-turbo/4f24016-stack_buffer_overflow/immutable/ | diff --git a/ChangeLog.txt b/ChangeLog.txt
index 8a8a29b5..3775d543 100644
--- a/ChangeLog.txt
+++ b/ChangeLog.txt
@@ -15,6 +15,10 @@ correct behavior of the colorspace extensions when merged upsampling is used.
upper 64 bits of xmm6 and xmm7 on Win64 platforms, which violated the Win64
calling conventions.
+[4] Fi... |
3rdn4/extractfix-libjpeg-turbo:ae8cdf5-heap_buffer_overflow | /workspace/skyset/ | extractfix-libjpeg-turbo | ae8cdf5-heap_buffer_overflow | /workspace/skyset/extractfix-libjpeg-turbo/ae8cdf5-heap_buffer_overflow/report.txt | A heap buffer overflow found in /workspace/skyset/extractfix-libjpeg-turbo/ae8cdf5-heap_buffer_overflow/immutable/ | diff --git a/ChangeLog.md b/ChangeLog.md
index 0e95df4f..9300f3a8 100644
--- a/ChangeLog.md
+++ b/ChangeLog.md
@@ -47,6 +47,11 @@ subsampling (for instance, 4:2:0 or 4:4:0.)
a 4:2:2 or 4:2:0 JPEG image using the merged (non-fancy) upsampling algorithms
(that is, when setting `cinfo.do_fancy_upsampling` to `FALSE`.)
... |
3rdn4/extractfix-libtiff:0ba5d88-heap_buffer_overflow | /workspace/skyset/ | extractfix-libtiff | 0ba5d88-heap_buffer_overflow | /workspace/skyset/extractfix-libtiff/0ba5d88-heap_buffer_overflow/report.txt | A heap buffer overflow found in /workspace/skyset/extractfix-libtiff/0ba5d88-heap_buffer_overflow/immutable/ | diff --git a/ChangeLog b/ChangeLog
index e98d54d5..4e0302fb 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,3 +1,10 @@
+2016-07-11 Even Rouault <even.rouault at spatialys.com>
+
+ * tools/tiffcrop.c: Avoid access outside of stack allocated array
+ on a tiled separate TIFF with more than 8 samples per pixel.
+ Reported by ... |
3rdn4/extractfix-libtiff:2c00d31-divide_by_zero | /workspace/skyset/ | extractfix-libtiff | 2c00d31-divide_by_zero | /workspace/skyset/extractfix-libtiff/2c00d31-divide_by_zero/report.txt | A divide by zero found in /workspace/skyset/extractfix-libtiff/2c00d31-divide_by_zero/immutable/ | diff --git a/ChangeLog b/ChangeLog
index c82bc76e..a7208f5e 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,3 +1,9 @@
+2017-01-11 Even Rouault <even.rouault at spatialys.com>
+
+ * libtiff/tif_jpeg.c: avoid integer division by zero in
+ JPEGSetupEncode() when horizontal or vertical sampling is set to 0.
+ Fixes http://bug... |
3rdn4/extractfix-libtiff:3144e57-invalid_shift | /workspace/skyset/ | extractfix-libtiff | 3144e57-invalid_shift | /workspace/skyset/extractfix-libtiff/3144e57-invalid_shift/report.txt | A invalid shift found in /workspace/skyset/extractfix-libtiff/3144e57-invalid_shift/immutable/ | diff --git a/ChangeLog b/ChangeLog
index 65176404..8e202a2c 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,3 +1,9 @@
+2017-01-11 Even Rouault <even.rouault at spatialys.com>
+
+ * libtiff/tif_jpeg.c: validate BitsPerSample in JPEGSetupEncode() to avoid
+ undefined behaviour caused by invalid shift exponent.
+ Fixes http:... |
3rdn4/extractfix-libtiff:6a984bf-heap_buffer_overflow | /workspace/skyset/ | extractfix-libtiff | 6a984bf-heap_buffer_overflow | /workspace/skyset/extractfix-libtiff/6a984bf-heap_buffer_overflow/report.txt | A heap buffer overflow found in /workspace/skyset/extractfix-libtiff/6a984bf-heap_buffer_overflow/immutable/ | diff --git a/ChangeLog b/ChangeLog
index 48fb75d3..4ff52810 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,3 +1,11 @@
+2016-11-10 Even Rouault <even.rouault at spatialys.com>
+
+ * libtiff/tif_strip.c: make TIFFNumberOfStrips() return the td->td_nstrips
+ value when it is non-zero, instead of recomputing it. This is need... |
3rdn4/extractfix-libtiff:891b1b9-heap_buffer_overflow | /workspace/skyset/ | extractfix-libtiff | 891b1b9-heap_buffer_overflow | /workspace/skyset/extractfix-libtiff/891b1b9-heap_buffer_overflow/report.txt | A heap buffer overflow found in /workspace/skyset/extractfix-libtiff/891b1b9-heap_buffer_overflow/immutable/ | diff --git a/ChangeLog b/ChangeLog
index 6be36026..91ba4e6e 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,3 +1,9 @@
+2016-12-20 Even Rouault <even.rouault at spatialys.com>
+
+ * tools/tiff2pdf.c: avoid potential heap-based overflow in
+ t2p_readwrite_pdf_image_tile().
+ Fixes http://bugzilla.maptools.org/show_bug.cgi?i... |
3rdn4/extractfix-libtiff:8b6e80f-heap_buffer_overflow | /workspace/skyset/ | extractfix-libtiff | 8b6e80f-heap_buffer_overflow | /workspace/skyset/extractfix-libtiff/8b6e80f-heap_buffer_overflow/report.txt | A heap buffer overflow found in /workspace/skyset/extractfix-libtiff/8b6e80f-heap_buffer_overflow/immutable/ | diff --git a/ChangeLog b/ChangeLog
index ef91ab07..2dc5f4b5 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,3 +1,8 @@
+2014-12-21 Even Rouault <even.rouault@spatialys.com>
+
+ * tools/thumbnail.c: fix out-of-buffer write
+ http://bugzilla.maptools.org/show_bug.cgi?id=2489 (CVE-2014-8128)
+
2014-12-21 Even Rouault <ev... |
3rdn4/extractfix-libtiff:9a72a69-divide_by_zero | /workspace/skyset/ | extractfix-libtiff | 9a72a69-divide_by_zero | /workspace/skyset/extractfix-libtiff/9a72a69-divide_by_zero/report.txt | A divide by zero found in /workspace/skyset/extractfix-libtiff/9a72a69-divide_by_zero/immutable/ | diff --git a/ChangeLog b/ChangeLog
index 9dbc7a0c..5b23665b 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,3 +1,10 @@
+2016-12-03 Even Rouault <even.rouault at spatialys.com>
+
+ * libtiff/tif_ojpeg.c: make OJPEGDecode() early exit in case of failure in
+ OJPEGPreDecode(). This will avoid a divide by zero, and potential ... |
3rdn4/extractfix-libtiff:c421b99-heap_buffer_overflow | /workspace/skyset/ | extractfix-libtiff | c421b99-heap_buffer_overflow | /workspace/skyset/extractfix-libtiff/c421b99-heap_buffer_overflow/report.txt | A heap buffer overflow found in /workspace/skyset/extractfix-libtiff/c421b99-heap_buffer_overflow/immutable/ | diff --git a/ChangeLog b/ChangeLog
index 1b0e5996..dee18813 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,3 +1,8 @@
+2016-06-28 Even Rouault <even.rouault at spatialys.com>
+
+ * libtiff/tif_pixarlog.c: fix potential buffer write overrun in
+ PixarLogDecode() on corrupted/unexpected images (reported by Mathias Svensson... |
3rdn4/extractfix-libtiff:da5a19e-heap_buffer_overflow | /workspace/skyset/ | extractfix-libtiff | da5a19e-heap_buffer_overflow | /workspace/skyset/extractfix-libtiff/da5a19e-heap_buffer_overflow/report.txt | A heap buffer overflow found in /workspace/skyset/extractfix-libtiff/da5a19e-heap_buffer_overflow/immutable/ | diff --git a/tools/gif2tiff.c b/tools/gif2tiff.c
index e7ea1235..908c47f0 100644
--- a/tools/gif2tiff.c
+++ b/tools/gif2tiff.c
@@ -312,7 +312,7 @@ readextension(void)
char buf[255];
(void) getc(infile);
- while ((count = getc(infile))) {
+ while ((count = getc(infile)) && count > 0 && count < 255) {
... |
3rdn4/extractfix-libtiff:e596d4e-divide_by_zero | /workspace/skyset/ | extractfix-libtiff | e596d4e-divide_by_zero | /workspace/skyset/extractfix-libtiff/e596d4e-divide_by_zero/report.txt | A divide by zero found in /workspace/skyset/extractfix-libtiff/e596d4e-divide_by_zero/immutable/ | diff --git a/ChangeLog b/ChangeLog
index 5d606087..3e6642a3 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,3 +1,8 @@
+2016-08-15 Even Rouault <even.rouault at spatialys.com>
+
+ * tools/rgb2ycbcr.c: validate values of -v and -h parameters to
+ avoid potential divide by zero. Fixes CVE-2016-3623 (bugzilla #2569)
+
2016-0... |
3rdn4/extractfix-libtiff:f3069a5-heap_buffer_overflow | /workspace/skyset/ | extractfix-libtiff | f3069a5-heap_buffer_overflow | /workspace/skyset/extractfix-libtiff/f3069a5-heap_buffer_overflow/report.txt | A heap buffer overflow found in /workspace/skyset/extractfix-libtiff/f3069a5-heap_buffer_overflow/immutable/ | diff --git a/ChangeLog b/ChangeLog
index 5d13f3f4..82b2580e 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,3 +1,10 @@
+2016-12-17 Even Rouault <even.rouault at spatialys.com>
+
+ * tools/tiff2ps.c: fix 2 heap-based buffer overflows (in PSDataBW
+ and PSDataColorContig). Reported by Agostino Sarubbo.
+ Fixes http://bugzil... |
3rdn4/extractfix-libxml2:362b322-null_ptr_dereference | /workspace/skyset/ | extractfix-libxml2 | 362b322-null_ptr_dereference | /workspace/skyset/extractfix-libxml2/362b322-null_ptr_dereference/report.txt | A null ptr dereference found in /workspace/skyset/extractfix-libxml2/362b322-null_ptr_dereference/immutable/ | diff --git a/valid.c b/valid.c
index 9b2df56a..8075d3a0 100644
--- a/valid.c
+++ b/valid.c
@@ -1172,29 +1172,33 @@ xmlDumpElementContent(xmlBufferPtr buf, xmlElementContentPtr content, int glob)
xmlBufferWriteCHAR(buf, content->name);
break;
case XML_ELEMENT_CONTENT_SEQ:
- if ((content->c1->type == XM... |
3rdn4/extractfix-libxml2:4ea74a4-heap_buffer_overflow | /workspace/skyset/ | extractfix-libxml2 | 4ea74a4-heap_buffer_overflow | /workspace/skyset/extractfix-libxml2/4ea74a4-heap_buffer_overflow/report.txt | A heap buffer overflow found in /workspace/skyset/extractfix-libxml2/4ea74a4-heap_buffer_overflow/immutable/ | diff --git a/parser.c b/parser.c
index 0d8d7f2e..bd634e93 100644
--- a/parser.c
+++ b/parser.c
@@ -4076,7 +4076,7 @@ xmlParseAttValueComplex(xmlParserCtxtPtr ctxt, int *attlen, int normalize) {
goto error;
if ((in_space) && (normalize)) {
- while (buf[len - 1] == 0x20) len--;
+ while ((len... |
3rdn4/extractfix-libxml2:cbb2716-heap_buffer_overflow | /workspace/skyset/ | extractfix-libxml2 | cbb2716-heap_buffer_overflow | /workspace/skyset/extractfix-libxml2/cbb2716-heap_buffer_overflow/report.txt | A heap buffer overflow found in /workspace/skyset/extractfix-libxml2/cbb2716-heap_buffer_overflow/immutable/ | diff --git a/parser.c b/parser.c
index 68e1c90f..4464e2e8 100644
--- a/parser.c
+++ b/parser.c
@@ -9825,6 +9825,7 @@ static void
xmlParseEndTag2(xmlParserCtxtPtr ctxt, const xmlChar *prefix,
const xmlChar *URI, int line, int nsNr, int tlen) {
const xmlChar *name;
+ size_t curLength;
GRO... |
3rdn4/extractfix-libxml2:db07dd6-heap_buffer_overflow | /workspace/skyset/ | extractfix-libxml2 | db07dd6-heap_buffer_overflow | /workspace/skyset/extractfix-libxml2/db07dd6-heap_buffer_overflow/report.txt | A heap buffer overflow found in /workspace/skyset/extractfix-libxml2/db07dd6-heap_buffer_overflow/immutable/ | diff --git a/HTMLparser.c b/HTMLparser.c
index 69eed2bd..1c112cc9 100644
--- a/HTMLparser.c
+++ b/HTMLparser.c
@@ -2471,6 +2471,10 @@ htmlParseName(htmlParserCtxtPtr ctxt) {
(*in == '_') || (*in == '-') ||
(*in == ':') || (*in == '.'))
in++;
+
+ if (in == ctxt->input->end)
+ return(NULL);
+
... |
3rdn4/extractfix-libxml2-harness:8f30bdf-heap_buffer_overflow | /workspace/skyset/ | extractfix-libxml2-harness | 8f30bdf-heap_buffer_overflow | /workspace/skyset/extractfix-libxml2-harness/8f30bdf-heap_buffer_overflow/report.txt | A heap buffer overflow found in /workspace/skyset/extractfix-libxml2-harness/8f30bdf-heap_buffer_overflow/immutable/ | diff --git a/xmlstring.c b/xmlstring.c
index b89c9e9f..00287d4c 100644
--- a/xmlstring.c
+++ b/xmlstring.c
@@ -457,6 +457,8 @@ xmlStrncat(xmlChar *cur, const xmlChar *add, int len) {
return(xmlStrndup(add, len));
size = xmlStrlen(cur);
+ if (size < 0)
+ return(NULL);
ret = (xmlChar *) xml... |
3rdn4/gpac:0b29a41-use_after_free | /workspace/skyset/ | gpac | 0b29a41-use_after_free | /workspace/skyset/gpac/0b29a41-use_after_free/report.txt | A use after free found in /workspace/skyset/gpac/0b29a41-use_after_free/immutable/ | diff --git a/src/bifs/field_decode.c b/src/bifs/field_decode.c
index 5537da7d3..65d045b02 100644
--- a/src/bifs/field_decode.c
+++ b/src/bifs/field_decode.c
@@ -427,64 +427,71 @@ GF_Err BD_DecMFFieldVec(GF_BifsDecoder * codec, GF_BitStream *bs, GF_Node *node,
e = gf_bifs_dec_sf_field(codec, bs, node, &sffield, GF_F... |
3rdn4/gpac:112767e-heap_out_of_bound | /workspace/skyset/ | gpac | 112767e-heap_out_of_bound | /workspace/skyset/gpac/112767e-heap_out_of_bound/report.txt | A heap out of bound found in /workspace/skyset/gpac/112767e-heap_out_of_bound/immutable/ | diff --git a/src/media_tools/avilib.c b/src/media_tools/avilib.c
index 459ff8043..27cd81133 100644
--- a/src/media_tools/avilib.c
+++ b/src/media_tools/avilib.c
@@ -2941,6 +2941,7 @@ int AVI_read_frame(avi_t *AVI, u8 *vidbuf, int *keyframe)
}
gf_fseek(AVI->fdes, AVI->video_index[AVI->video_pos].pos, SEEK_SET);
+ ... |
3rdn4/gpac:1b77837-heap_out_of_bound | /workspace/skyset/ | gpac | 1b77837-heap_out_of_bound | /workspace/skyset/gpac/1b77837-heap_out_of_bound/report.txt | A heap out of bound found in /workspace/skyset/gpac/1b77837-heap_out_of_bound/immutable/ | diff --git a/src/media_tools/mpegts.c b/src/media_tools/mpegts.c
index 30fb2bb3f..7deabb630 100644
--- a/src/media_tools/mpegts.c
+++ b/src/media_tools/mpegts.c
@@ -946,6 +946,11 @@ static void gf_m2ts_process_tdt_tot(GF_M2TS_Demuxer *ts, GF_M2TS_SECTION_ES *tdt
return;
}
+ if (data_size < 5) {
+ GF_LOG(GF_LOG_... |
3rdn4/gpac:3ffe59c-heap_out_of_bound | /workspace/skyset/ | gpac | 3ffe59c-heap_out_of_bound | /workspace/skyset/gpac/3ffe59c-heap_out_of_bound/report.txt | A heap out of bound found in /workspace/skyset/gpac/3ffe59c-heap_out_of_bound/immutable/ | diff --git a/src/media_tools/av_parsers.c b/src/media_tools/av_parsers.c
index 83e939aba..5582d47a4 100644
--- a/src/media_tools/av_parsers.c
+++ b/src/media_tools/av_parsers.c
@@ -8500,7 +8500,15 @@ static s32 gf_hevc_read_pps_bs_internal(GF_BitStream *bs, HEVCState *hevc)
pps->entropy_coding_sync_enabled_flag = gf_... |
3rdn4/gpac:4607052-double_free | /workspace/skyset/ | gpac | 4607052-double_free | /workspace/skyset/gpac/4607052-double_free/report.txt | A double free found in /workspace/skyset/gpac/4607052-double_free/immutable/ | diff --git a/src/filters/isoffin_read_ch.c b/src/filters/isoffin_read_ch.c
index 257f5c603..bd9640068 100644
--- a/src/filters/isoffin_read_ch.c
+++ b/src/filters/isoffin_read_ch.c
@@ -495,6 +495,7 @@ void isor_reader_get_sample(ISOMChannel *ch)
if (ch->pck) {
gf_filter_pck_discard(ch->pck);
ch->pck = ... |
3rdn4/gpac:4925c40-use_after_free | /workspace/skyset/ | gpac | 4925c40-use_after_free | /workspace/skyset/gpac/4925c40-use_after_free/report.txt | A use after free found in /workspace/skyset/gpac/4925c40-use_after_free/immutable/ | diff --git a/src/utils/xml_parser.c b/src/utils/xml_parser.c
index 2373ea63f..e372b43fe 100644
--- a/src/utils/xml_parser.c
+++ b/src/utils/xml_parser.c
@@ -492,7 +492,8 @@ static Bool xml_sax_parse_attribute(GF_SAXParser *parser)
att->val_start = parser->current_pos + 2;
break;
default:
- break;
+... |
3rdn4/gpac:49cb88a-heap_out_of_bound | /workspace/skyset/ | gpac | 49cb88a-heap_out_of_bound | /workspace/skyset/gpac/49cb88a-heap_out_of_bound/report.txt | A heap out of bound found in /workspace/skyset/gpac/49cb88a-heap_out_of_bound/immutable/ | diff --git a/src/filters/reframe_mhas.c b/src/filters/reframe_mhas.c
index 1b920c717..9f6fa5994 100644
--- a/src/filters/reframe_mhas.c
+++ b/src/filters/reframe_mhas.c
@@ -542,7 +542,7 @@ GF_Err mhas_dmx_process(GF_Filter *filter)
remain=0;
break;
}
- if ((hdr_start[1]==0x01) && (hdr_start[2]==0xA5)) {
+ ... |
3rdn4/gpac:50a60b0-null_pointer_deref | /workspace/skyset/ | gpac | 50a60b0-null_pointer_deref | /workspace/skyset/gpac/50a60b0-null_pointer_deref/report.txt | A null pointer deref found in /workspace/skyset/gpac/50a60b0-null_pointer_deref/immutable/ | diff --git a/src/filters/reframe_rawpcm.c b/src/filters/reframe_rawpcm.c
index 37decc00e..406c6638d 100644
--- a/src/filters/reframe_rawpcm.c
+++ b/src/filters/reframe_rawpcm.c
@@ -360,6 +360,14 @@ GF_Err pcmreframe_process(GF_Filter *filter)
}
wav_ok = GF_FALSE;
}
+ if (!ctx->ch) {
+ GF_LOG(GF_LOG_ERROR,... |
3rdn4/gpac:514a3af-stack_out_of_bound | /workspace/skyset/ | gpac | 514a3af-stack_out_of_bound | /workspace/skyset/gpac/514a3af-stack_out_of_bound/report.txt | A stack out of bound found in /workspace/skyset/gpac/514a3af-stack_out_of_bound/immutable/ | diff --git a/src/scenegraph/vrml_proto.c b/src/scenegraph/vrml_proto.c
index df30ed0df..02b92b576 100644
--- a/src/scenegraph/vrml_proto.c
+++ b/src/scenegraph/vrml_proto.c
@@ -1292,7 +1292,10 @@ Bool gf_sg_proto_field_is_sftime_offset(GF_Node *node, GF_FieldInfo *field)
gf_node_get_field(r->ToNode, r->ToField.fie... |
3rdn4/gpac:6f28c4c-null_pointer_deref | /workspace/skyset/ | gpac | 6f28c4c-null_pointer_deref | /workspace/skyset/gpac/6f28c4c-null_pointer_deref/report.txt | A null pointer deref found in /workspace/skyset/gpac/6f28c4c-null_pointer_deref/immutable/ | diff --git a/src/isomedia/movie_fragments.c b/src/isomedia/movie_fragments.c
index b742078d1..41d0717a4 100644
--- a/src/isomedia/movie_fragments.c
+++ b/src/isomedia/movie_fragments.c
@@ -2876,7 +2876,8 @@ GF_Err gf_isom_fragment_add_sample_ex(GF_ISOFile *movie, GF_ISOTrackID TrackID,
//rewrite OD frames
if (traf-... |
3rdn4/gpac:78f5269-heap_out_of_bound | /workspace/skyset/ | gpac | 78f5269-heap_out_of_bound | /workspace/skyset/gpac/78f5269-heap_out_of_bound/report.txt | A heap out of bound found in /workspace/skyset/gpac/78f5269-heap_out_of_bound/immutable/ | diff --git a/src/isomedia/box_code_base.c b/src/isomedia/box_code_base.c
index 0048d9eab..9eee78da6 100644
--- a/src/isomedia/box_code_base.c
+++ b/src/isomedia/box_code_base.c
@@ -10663,6 +10668,7 @@ GF_Err trgt_box_write(GF_Box *s, GF_BitStream *bs)
GF_Err e;
GF_TrackGroupTypeBox *ptr = (GF_TrackGroupTypeBox *) s... |
3rdn4/gpac:7a6f636-stack_out_of_bound | /workspace/skyset/ | gpac | 7a6f636-stack_out_of_bound | /workspace/skyset/gpac/7a6f636-stack_out_of_bound/report.txt | A stack out of bound found in /workspace/skyset/gpac/7a6f636-stack_out_of_bound/immutable/ | diff --git a/src/media_tools/mpegts.c b/src/media_tools/mpegts.c
index b4fb08b44..a544d4d5a 100644
--- a/src/media_tools/mpegts.c
+++ b/src/media_tools/mpegts.c
@@ -2468,7 +2468,7 @@ static void gf_m2ts_get_adaptation_field(GF_M2TS_Demuxer *ts, GF_M2TS_Adaptation
break;
}
gf_bs_read_data(bs, _url,... |
3rdn4/gpac:7e2cb01-use_after_free | /workspace/skyset/ | gpac | 7e2cb01-use_after_free | /workspace/skyset/gpac/7e2cb01-use_after_free/report.txt | A use after free found in /workspace/skyset/gpac/7e2cb01-use_after_free/immutable/ | diff --git a/src/odf/descriptors.c b/src/odf/descriptors.c
index 0d42ff2df..913d8e27a 100644
--- a/src/odf/descriptors.c
+++ b/src/odf/descriptors.c
@@ -1395,12 +1395,12 @@ GF_VVCConfig *gf_odf_vvc_cfg_read_bs(GF_BitStream *bs)
gf_list_add(cfg->param_array, ar);
break;
default:
- GF_LOG(GF_LOG_WARNING, GF_... |
3rdn4/gpac:7e2e92f-use_after_free | /workspace/skyset/ | gpac | 7e2e92f-use_after_free | /workspace/skyset/gpac/7e2e92f-use_after_free/report.txt | A use after free found in /workspace/skyset/gpac/7e2e92f-use_after_free/immutable/ | diff --git a/src/filters/mux_isom.c b/src/filters/mux_isom.c
index 4044ef11f..e9bc42231 100644
--- a/src/filters/mux_isom.c
+++ b/src/filters/mux_isom.c
@@ -3991,6 +3991,7 @@ static GF_Err mp4_mux_configure_pid(GF_Filter *filter, GF_FilterPid *pid, Bool i
TrackWriter *tkw = gf_filter_pid_get_udta(pid);
if (tkw) {... |
3rdn4/gpac:7edc40f-null_pointer_deref | /workspace/skyset/ | gpac | 7edc40f-null_pointer_deref | /workspace/skyset/gpac/7edc40f-null_pointer_deref/report.txt | A null pointer deref found in /workspace/skyset/gpac/7edc40f-null_pointer_deref/immutable/ | diff --git a/src/filters/isoffin_load.c b/src/filters/isoffin_load.c
index 8a56b593f..1304e899a 100644
--- a/src/filters/isoffin_load.c
+++ b/src/filters/isoffin_load.c
@@ -89,7 +89,7 @@ static void isor_get_chapters(GF_ISOFile *file, GF_FilterPid *opid)
GF_TextSample *txt = gf_isom_parse_text_sample(bs);
if (txt... |
3rdn4/gpac:89a80ca-heap_out_of_bound | /workspace/skyset/ | gpac | 89a80ca-heap_out_of_bound | /workspace/skyset/gpac/89a80ca-heap_out_of_bound/report.txt | A heap out of bound found in /workspace/skyset/gpac/89a80ca-heap_out_of_bound/immutable/ | diff --git a/include/gpac/internal/media_dev.h b/include/gpac/internal/media_dev.h
index c2c2833db..f722dd99a 100644
--- a/include/gpac/internal/media_dev.h
+++ b/include/gpac/internal/media_dev.h
@@ -464,7 +464,7 @@ typedef struct RepFormat
typedef struct
{
u16 avg_bit_rate, max_bit_rate, avg_pic_rate;
- u8 consta... |
3rdn4/gpac:8db20cb-heap_out_of_bound | /workspace/skyset/ | gpac | 8db20cb-heap_out_of_bound | /workspace/skyset/gpac/8db20cb-heap_out_of_bound/report.txt | A heap out of bound found in /workspace/skyset/gpac/8db20cb-heap_out_of_bound/immutable/ | diff --git a/src/isomedia/box_code_base.c b/src/isomedia/box_code_base.c
index baf07ff35..9a9ad09b4 100644
--- a/src/isomedia/box_code_base.c
+++ b/src/isomedia/box_code_base.c
@@ -9983,6 +9983,9 @@ static void *sgpd_parse_entry(u32 grouping_type, GF_BitStream *bs, s32 bytes_in_
}
return ptr;
}
+ case 0:
+ GF_... |
3rdn4/gpac:8f3088b-null_pointer_deref | /workspace/skyset/ | gpac | 8f3088b-null_pointer_deref | /workspace/skyset/gpac/8f3088b-null_pointer_deref/report.txt | A null pointer deref found in /workspace/skyset/gpac/8f3088b-null_pointer_deref/immutable/ | diff --git a/src/utils/xml_parser.c b/src/utils/xml_parser.c
index 49df33816..11f6f2f5c 100644
--- a/src/utils/xml_parser.c
+++ b/src/utils/xml_parser.c
@@ -704,6 +704,8 @@ static void xml_sax_parse_entity(GF_SAXParser *parser)
}
}
if (ent_name) gf_free(ent_name);
+ if (ent && !ent->value)
+ parser->sax_state =... |
3rdn4/gpac:94cf5b1-stack_out_of_bound | /workspace/skyset/ | gpac | 94cf5b1-stack_out_of_bound | /workspace/skyset/gpac/94cf5b1-stack_out_of_bound/report.txt | A stack out of bound found in /workspace/skyset/gpac/94cf5b1-stack_out_of_bound/immutable/ | diff --git a/src/bifs/unquantize.c b/src/bifs/unquantize.c
index a4bfcbfbb..a43df12f0 100644
--- a/src/bifs/unquantize.c
+++ b/src/bifs/unquantize.c
@@ -292,6 +292,7 @@ GF_Err Q_DecCoordOnUnitSphere(GF_BifsDecoder *codec, GF_BitStream *bs, u32 NbBit
if(NbComp == 2) dir -= 2 * gf_bs_read_int(bs, 1);
orient = gf_bs... |
3rdn4/gpac:a6b6408-heap_out_of_bound | /workspace/skyset/ | gpac | a6b6408-heap_out_of_bound | /workspace/skyset/gpac/a6b6408-heap_out_of_bound/report.txt | A heap out of bound found in /workspace/skyset/gpac/a6b6408-heap_out_of_bound/immutable/ | diff --git a/include/gpac/bitstream.h b/include/gpac/bitstream.h
index a1d439a71..ee7436b4c 100644
--- a/include/gpac/bitstream.h
+++ b/include/gpac/bitstream.h
@@ -624,6 +624,26 @@ Gets the current cookie on the bitstream
*/
u64 gf_bs_get_cookie(GF_BitStream *bs);
+
+/*!
+\brief Marks overflow access
+
+Marks the... |
3rdn4/gpac:a8bc2c8-heap_out_of_bound | /workspace/skyset/ | gpac | a8bc2c8-heap_out_of_bound | /workspace/skyset/gpac/a8bc2c8-heap_out_of_bound/report.txt | A heap out of bound found in /workspace/skyset/gpac/a8bc2c8-heap_out_of_bound/immutable/ | diff --git a/src/scene_manager/swf_parse.c b/src/scene_manager/swf_parse.c
index f4b974aab..2afa80c3e 100644
--- a/src/scene_manager/swf_parse.c
+++ b/src/scene_manager/swf_parse.c
@@ -1426,7 +1426,7 @@ static GF_Err swf_def_font(SWFReader *read, u32 revision)
count = swf_get_16(read);
ft->nbGlyphs = count / 2;
... |
3rdn4/gpac:b1042c3-null_pointer_deref | /workspace/skyset/ | gpac | b1042c3-null_pointer_deref | /workspace/skyset/gpac/b1042c3-null_pointer_deref/report.txt | A null pointer deref found in /workspace/skyset/gpac/b1042c3-null_pointer_deref/immutable/ | diff --git a/src/filters/dasher.c b/src/filters/dasher.c
index 2619d2291..bc768804f 100644
--- a/src/filters/dasher.c
+++ b/src/filters/dasher.c
@@ -8387,6 +8387,9 @@ static GF_Err dasher_process(GF_Filter *filter)
u32 num_ready=0, num_blocked=0;
for (i=0; i<count; i++) {
GF_DashStream *ds = gf_list_get(ctx->... |
3rdn4/gpac:b6b6360-null_pointer_deref | /workspace/skyset/ | gpac | b6b6360-null_pointer_deref | /workspace/skyset/gpac/b6b6360-null_pointer_deref/report.txt | A null pointer deref found in /workspace/skyset/gpac/b6b6360-null_pointer_deref/immutable/ | diff --git a/applications/mp4box/filedump.c b/applications/mp4box/filedump.c
index 9eb463ab4..5974fca0d 100644
--- a/applications/mp4box/filedump.c
+++ b/applications/mp4box/filedump.c
@@ -3358,9 +3358,9 @@ void DumpTrackInfo(GF_ISOFile *file, GF_ISOTrackID trackID, Bool full_dump, Bool
fprintf(stderr, "\t3GPP DIMS ... |
3rdn4/gpac:bb9ee4c-heap_out_of_bound | /workspace/skyset/ | gpac | bb9ee4c-heap_out_of_bound | /workspace/skyset/gpac/bb9ee4c-heap_out_of_bound/report.txt | A heap out of bound found in /workspace/skyset/gpac/bb9ee4c-heap_out_of_bound/immutable/ | diff --git a/src/isomedia/box_code_base.c b/src/isomedia/box_code_base.c
index 8154002a8..fa9b85242 100644
--- a/src/isomedia/box_code_base.c
+++ b/src/isomedia/box_code_base.c
@@ -242,9 +242,10 @@ GF_Err cprt_box_read(GF_Box *s,GF_BitStream *bs)
}
if (ptr->size) {
u32 bytesToRead = (u32) ptr->size;
- ptr->noti... |
3rdn4/gpac:be23476-heap_out_of_bound | /workspace/skyset/ | gpac | be23476-heap_out_of_bound | /workspace/skyset/gpac/be23476-heap_out_of_bound/report.txt | A heap out of bound found in /workspace/skyset/gpac/be23476-heap_out_of_bound/immutable/ | diff --git a/src/filters/reframe_mp3.c b/src/filters/reframe_mp3.c
index e81dd174a..6ed5608b8 100644
--- a/src/filters/reframe_mp3.c
+++ b/src/filters/reframe_mp3.c
@@ -265,7 +265,7 @@ void id3dmx_flush(GF_Filter *filter, u8 *id3_buf, u32 id3_buf_size, GF_FilterPid
break;
}
- if (buf_alloc<=fsize) {
+ if (bu... |
3rdn4/gpac:ca1b48f-heap_out_of_bound | /workspace/skyset/ | gpac | ca1b48f-heap_out_of_bound | /workspace/skyset/gpac/ca1b48f-heap_out_of_bound/report.txt | A heap out of bound found in /workspace/skyset/gpac/ca1b48f-heap_out_of_bound/immutable/ | diff --git a/src/filters/reframe_mpgvid.c b/src/filters/reframe_mpgvid.c
index 576334f21..8e092f973 100644
--- a/src/filters/reframe_mpgvid.c
+++ b/src/filters/reframe_mpgvid.c
@@ -908,7 +908,7 @@ GF_Err mpgviddmx_process(GF_Filter *filter)
ctx->hdr_store_alloc = (u32) (ctx->hdr_store_size + pck_size - vosh_sta... |
3rdn4/gpac:cc95b16-heap_out_of_bound | /workspace/skyset/ | gpac | cc95b16-heap_out_of_bound | /workspace/skyset/gpac/cc95b16-heap_out_of_bound/report.txt | A heap out of bound found in /workspace/skyset/gpac/cc95b16-heap_out_of_bound/immutable/ | diff --git a/src/media_tools/avilib.c b/src/media_tools/avilib.c
index 7cdca7d87..459ff8043 100644
--- a/src/media_tools/avilib.c
+++ b/src/media_tools/avilib.c
@@ -2077,11 +2077,13 @@ int avi_parse_input_file(avi_t *AVI, int getIndex)
alBITMAPINFOHEADER bih;
memcpy(&bih, hdrl_data + i, sizeof(alBITMAPI... |
3rdn4/gpac:d2de8b5-stack_out_of_bound | /workspace/skyset/ | gpac | d2de8b5-stack_out_of_bound | /workspace/skyset/gpac/d2de8b5-stack_out_of_bound/report.txt | A stack out of bound found in /workspace/skyset/gpac/d2de8b5-stack_out_of_bound/immutable/ | diff --git a/src/filters/load_text.c b/src/filters/load_text.c
index 637339822..877b285a8 100644
--- a/src/filters/load_text.c
+++ b/src/filters/load_text.c
@@ -377,6 +377,10 @@ char *gf_text_get_utf8_line(char *szLine, u32 lineSize, FILE *txt_in, s32 unicod
GF_LOG(GF_LOG_DEBUG, GF_LOG_PARSER, ("[TXTIn] Line too lo... |
3rdn4/gpac:de7f3a8-heap_out_of_bound | /workspace/skyset/ | gpac | de7f3a8-heap_out_of_bound | /workspace/skyset/gpac/de7f3a8-heap_out_of_bound/report.txt | A heap out of bound found in /workspace/skyset/gpac/de7f3a8-heap_out_of_bound/immutable/ | diff --git a/src/media_tools/mpeg2_ps.c b/src/media_tools/mpeg2_ps.c
index 0af7a31f3..b0182f224 100644
--- a/src/media_tools/mpeg2_ps.c
+++ b/src/media_tools/mpeg2_ps.c
@@ -266,6 +266,8 @@ int MPEG12_ParseSeqHdr(unsigned char *pbuffer, u32 buflen, s32 *have_mpeg2, u32
u32 scode, ix;
s32 found = -1;
*have_mpeg2 = ... |
3rdn4/gpac:ebedc7a-use_after_free | /workspace/skyset/ | gpac | ebedc7a-use_after_free | /workspace/skyset/gpac/ebedc7a-use_after_free/report.txt | A use after free found in /workspace/skyset/gpac/ebedc7a-use_after_free/immutable/ | diff --git a/src/bifs/memory_decoder.c b/src/bifs/memory_decoder.c
index 540fe9ed2..74d635750 100644
--- a/src/bifs/memory_decoder.c
+++ b/src/bifs/memory_decoder.c
@@ -936,7 +936,12 @@ GF_Err gf_bifs_flush_command_list(GF_BifsDecoder *codec)
GF_Err e;
CommandBufferItem *cbi;
GF_SceneGraph *prev_root = codec->cur... |
3rdn4/gpac:fc9e290-heap_out_of_bound | /workspace/skyset/ | gpac | fc9e290-heap_out_of_bound | /workspace/skyset/gpac/fc9e290-heap_out_of_bound/report.txt | A heap out of bound found in /workspace/skyset/gpac/fc9e290-heap_out_of_bound/immutable/ | diff --git a/src/filters/reframe_mpgvid.c b/src/filters/reframe_mpgvid.c
index 8e092f973..ecf251955 100644
--- a/src/filters/reframe_mpgvid.c
+++ b/src/filters/reframe_mpgvid.c
@@ -1081,6 +1081,11 @@ GF_Err mpgviddmx_process(GF_Filter *filter)
//needs adjustement
if (bytes_from_store) {
size += bytes_from_sto... |
3rdn4/h3:f581626-global_buffer_overflow | /workspace/skyset/ | h3 | f581626-global_buffer_overflow | /workspace/skyset/h3/f581626-global_buffer_overflow/report.txt | A global buffer overflow found in /workspace/skyset/h3/f581626-global_buffer_overflow/immutable/ | From fce1c53844ca21dcc14f3acabeaf2e12d47e5568 Mon Sep 17 00:00:00 2001
From: Isaac Brodsky <isaac@isaacbrodsky.com>
Date: Mon, 12 Sep 2022 16:55:26 -0700
Subject: [PATCH] Fix potential OOB read in localIjToCell (#684)
---
src/apps/testapps/testCellToLocalIj.c | 8 ++++++++
src/h3lib/lib/coordijk.c | 9 ++... |
3rdn4/hoextdown:933f9da-heap_buffer_overflow | /workspace/skyset/ | hoextdown | 933f9da-heap_buffer_overflow | /workspace/skyset/hoextdown/933f9da-heap_buffer_overflow/report.txt | A heap buffer overflow found in /workspace/skyset/hoextdown/933f9da-heap_buffer_overflow/immutable/ | From 7c7dc6ac9adce5413ab54dcd604db95a9b935b05 Mon Sep 17 00:00:00 2001
From: Martin von Gagern <gagern@google.com>
Date: Mon, 29 Jun 2020 13:15:08 +0100
Subject: [PATCH] Avoid out-of-bounds read in code fence detection
---
src/document.c | 4 +++-
1 file changed, 3 insertions(+), 1 deletion(-)
diff --git a/src/docum... |
3rdn4/hostap:8112131-unknown_read | /workspace/skyset/ | hostap | 8112131-unknown_read | /workspace/skyset/hostap/8112131-unknown_read/report.txt | A unknown read found in /workspace/skyset/hostap/8112131-unknown_read/immutable/ | commit 947272febe24a8f0ea828b5b2f35f13c3821901e
Author: Jouni Malinen <jouni@codeaurora.org>
Date: Mon Nov 9 11:43:12 2020 +0200
P2P: Fix copying of secondary device types for P2P group client
Parsing and copying of WPS secondary device types list was verifying
that the contents is not too long for ... |
3rdn4/htslib:dd6f0b7-unknown_read | /workspace/skyset/ | htslib | dd6f0b7-unknown_read | /workspace/skyset/htslib/dd6f0b7-unknown_read/report.txt | A unknown read found in /workspace/skyset/htslib/dd6f0b7-unknown_read/immutable/ | From 92ea05adb2478c64be571aff6fe00130fd29c252 Mon Sep 17 00:00:00 2001
From: James Bonfield <jkb@sanger.ac.uk>
Date: Mon, 14 Oct 2019 11:23:28 +0100
Subject: [PATCH] Bug fix a read-beyond-buffer bug in VCF code.
The VCF write code only checked the upper range of z->key, not
noticing it's signed.
Credit to OSS-Fuzz
Fi... |
3rdn4/hunspell:1c1f34f-heap_buffer_overflow | /workspace/skyset/ | hunspell | 1c1f34f-heap_buffer_overflow | /workspace/skyset/hunspell/1c1f34f-heap_buffer_overflow/report.txt | A heap buffer overflow found in /workspace/skyset/hunspell/1c1f34f-heap_buffer_overflow/immutable/ | From bf229433b9ba7131bd80b52b8c71399230e0dc12 Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Caol=C3=A1n=20McNamara?= <caolanm@redhat.com>
Date: Mon, 5 Dec 2022 09:14:46 +0000
Subject: [PATCH] ofz#54030 ensure sane bounds
---
src/hunspell/affixmgr.cxx | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/src/... |
3rdn4/hunspell:473241e-heap_buffer_overflow | /workspace/skyset/ | hunspell | 473241e-heap_buffer_overflow | /workspace/skyset/hunspell/473241e-heap_buffer_overflow/report.txt | A heap buffer overflow found in /workspace/skyset/hunspell/473241e-heap_buffer_overflow/immutable/ | From cbaaf7fd814793c204398519821b4ef8139a23b4 Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Caol=C3=A1n=20McNamara?= <caolanm@redhat.com>
Date: Mon, 17 Oct 2022 20:11:08 +0100
Subject: [PATCH] ofz#52486 if we restore to oldi and orig str, surely len
needs to be reset
---
src/hunspell/affixmgr.cxx | 3 +++
1 file changed,... |
3rdn4/hunspell:6291cac-heap_buffer_overflow_a | /workspace/skyset/ | hunspell | 6291cac-heap_buffer_overflow_a | /workspace/skyset/hunspell/6291cac-heap_buffer_overflow_a/report.txt | A heap buffer overflow a found in /workspace/skyset/hunspell/6291cac-heap_buffer_overflow_a/immutable/ | From e7c38b0f85d65a6ad6af47753228f4b0df335c8e Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Caol=C3=A1n=20McNamara?= <caolanm@redhat.com>
Date: Fri, 16 Sep 2022 10:02:13 +0100
Subject: [PATCH] ofz#51430 use std::string::compare
---
src/hunspell/affixmgr.cxx | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git... |
3rdn4/hunspell:6291cac-heap_buffer_overflow_b | /workspace/skyset/ | hunspell | 6291cac-heap_buffer_overflow_b | /workspace/skyset/hunspell/6291cac-heap_buffer_overflow_b/report.txt | A heap buffer overflow b found in /workspace/skyset/hunspell/6291cac-heap_buffer_overflow_b/immutable/ | From ef41c16af9a7fe0df27f421bd90120363c60dbb9 Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Caol=C3=A1n=20McNamara?= <caolanm@redhat.com>
Date: Fri, 7 Oct 2022 09:11:34 +0100
Subject: [PATCH] ofz#52195 check bounds
it might be we wanted st here not word
---
src/hunspell/affixmgr.cxx | 2 +-
1 file changed, 1 insertion(+),... |
3rdn4/hunspell:6291cac-stack_buffer_overflow_a | /workspace/skyset/ | hunspell | 6291cac-stack_buffer_overflow_a | /workspace/skyset/hunspell/6291cac-stack_buffer_overflow_a/report.txt | A stack buffer overflow a found in /workspace/skyset/hunspell/6291cac-stack_buffer_overflow_a/immutable/ | From e7c38b0f85d65a6ad6af47753228f4b0df335c8e Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Caol=C3=A1n=20McNamara?= <caolanm@redhat.com>
Date: Fri, 16 Sep 2022 10:02:13 +0100
Subject: [PATCH] ofz#51430 use std::string::compare
---
src/hunspell/affixmgr.cxx | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git... |
3rdn4/hunspell:6291cac-stack_buffer_overflow_b | /workspace/skyset/ | hunspell | 6291cac-stack_buffer_overflow_b | /workspace/skyset/hunspell/6291cac-stack_buffer_overflow_b/report.txt | A stack buffer overflow b found in /workspace/skyset/hunspell/6291cac-stack_buffer_overflow_b/immutable/ | From 35c3cad4d70b222e7c1d73211a79a96ff7bf3651 Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Caol=C3=A1n=20McNamara?= <caolanm@redhat.com>
Date: Sat, 17 Sep 2022 20:59:39 +0100
Subject: [PATCH] ofz#51498 abandon early on dubious pattern replacement
outcome
---
src/hunspell/affixmgr.cxx | 3 +++
1 file changed, 3 insertion... |
3rdn4/hunspell:74b08bf-heap_buffer_overflow_a | /workspace/skyset/ | hunspell | 74b08bf-heap_buffer_overflow_a | /workspace/skyset/hunspell/74b08bf-heap_buffer_overflow_a/report.txt | A heap buffer overflow a found in /workspace/skyset/hunspell/74b08bf-heap_buffer_overflow_a/immutable/ | From ebf0e2ce8d903815a6e8d828286394b6f8830860 Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Caol=C3=A1n=20McNamara?= <caolanm@redhat.com>
Date: Thu, 8 Sep 2022 15:53:42 +0100
Subject: [PATCH] ofz#51124 negative array index with malformed .aff
---
src/hunspell/affixmgr.cxx | 2 +-
1 file changed, 1 insertion(+), 1 deletion... |
3rdn4/hunspell:74b08bf-heap_buffer_overflow_b | /workspace/skyset/ | hunspell | 74b08bf-heap_buffer_overflow_b | /workspace/skyset/hunspell/74b08bf-heap_buffer_overflow_b/report.txt | A heap buffer overflow b found in /workspace/skyset/hunspell/74b08bf-heap_buffer_overflow_b/immutable/ | From 7357713ba5d529f3ff70c654b703429fc9cb55a4 Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Caol=C3=A1n=20McNamara?= <caolanm@redhat.com>
Date: Mon, 3 Oct 2022 21:02:13 +0100
Subject: [PATCH] ofz#51988 avoid going past start of invalid utf-8 sequence
---
src/hunspell/affixmgr.cxx | 2 +-
1 file changed, 1 insertion(+), 1 ... |
3rdn4/hunspell:74b08bf-heap_double_free | /workspace/skyset/ | hunspell | 74b08bf-heap_double_free | /workspace/skyset/hunspell/74b08bf-heap_double_free/report.txt | A heap double free found in /workspace/skyset/hunspell/74b08bf-heap_double_free/immutable/ | From 7d1c7d46c7a7fcd9987fc2691712b0696ab6646c Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Caol=C3=A1n=20McNamara?= <caolanm@redhat.com>
Date: Fri, 16 Sep 2022 09:41:39 +0100
Subject: [PATCH] ofz#51432 double-free with bad .aff
---
src/hunspell/hashmgr.cxx | 33 ++++++++++++++++++++++++++-------
1 file changed, 26 insert... |
3rdn4/hunspell:82b9212-heap_use_after_free | /workspace/skyset/ | hunspell | 82b9212-heap_use_after_free | /workspace/skyset/hunspell/82b9212-heap_use_after_free/report.txt | A heap use after free found in /workspace/skyset/hunspell/82b9212-heap_use_after_free/immutable/ | commit c6d900cfd5d10c428008dc40f804b9d9319cec87
Author: Caolán McNamara <caolanm@redhat.com>
Date: Tue Mar 7 12:44:07 2023 +0000
ofz#56737 use int instead of short in free_flag
diff --git a/src/hunspell/hashmgr.cxx b/src/hunspell/hashmgr.cxx
index 1818da5..ca4a71a 100644
--- a/src/hunspell/hashmgr.cxx
+++ b/src... |
3rdn4/hunspell:ddec95b-heap_buffer_overflow | /workspace/skyset/ | hunspell | ddec95b-heap_buffer_overflow | /workspace/skyset/hunspell/ddec95b-heap_buffer_overflow/report.txt | A heap buffer overflow found in /workspace/skyset/hunspell/ddec95b-heap_buffer_overflow/immutable/ | From ab3825969d2a78f9871242c9ce89fcd34a3ddafe Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Caol=C3=A1n=20McNamara?= <caolan.mcnamara@collabora.com>
Date: Sat, 24 Jun 2023 21:01:01 +0100
Subject: [PATCH] ofz#60034 restore cmin/cmax before continue
---
src/hunspell/affixmgr.cxx | 15 ++++++++++++---
1 file changed, 12 inse... |
3rdn4/irssi:afcb483-heap_use_after_free | /workspace/skyset/ | irssi | afcb483-heap_use_after_free | /workspace/skyset/irssi/afcb483-heap_use_after_free/report.txt | A heap use after free found in /workspace/skyset/irssi/afcb483-heap_use_after_free/immutable/ | From 3dbfac5699c6887b7149a0b1c805c4730f63d0f4 Mon Sep 17 00:00:00 2001
From: Ailin Nemui <ailin@d5401s.localdomain>
Date: Tue, 20 Apr 2021 09:11:06 +0200
Subject: [PATCH] fuzz test
---
.github/workflows/cifuzz.yml | 1 +
src/fe-fuzz/server.c | 4 +++-
2 files changed, 4 insertions(+), 1 deletion(-)
diff --gi... |
3rdn4/irssi:b472570-heap_buffer_overflow_a | /workspace/skyset/ | irssi | b472570-heap_buffer_overflow_a | /workspace/skyset/irssi/b472570-heap_buffer_overflow_a/report.txt | A heap buffer overflow a found in /workspace/skyset/irssi/b472570-heap_buffer_overflow_a/immutable/ | From a8144cd98fdb08c1d942195f65fbc604f7bd3055 Mon Sep 17 00:00:00 2001
From: Ailin Nemui <ailin@d5401s.localdomain>
Date: Fri, 26 Feb 2021 20:25:48 +0100
Subject: [PATCH] skip parsing empty tags
Credit to OSS-Fuzz
---
src/irc/core/irc.c | 2 ++
1 file changed, 2 insertions(+)
diff --git a/src/irc/core/irc.c b/src/ir... |
3rdn4/irssi:b472570-heap_buffer_overflow_b | /workspace/skyset/ | irssi | b472570-heap_buffer_overflow_b | /workspace/skyset/irssi/b472570-heap_buffer_overflow_b/report.txt | A heap buffer overflow b found in /workspace/skyset/irssi/b472570-heap_buffer_overflow_b/immutable/ | From 4c069f5c8f3b63d8ba8556ba8292e1f5972508d6 Mon Sep 17 00:00:00 2001
From: Ailin Nemui <ailin@d5401s.localdomain>
Date: Sat, 27 Feb 2021 18:31:00 +0100
Subject: [PATCH] stop parsing on lone tag escape
It's C
Credit to OSS-Fuzz
---
src/irc/core/irc.c | 2 ++
1 file changed, 2 insertions(+)
diff --git a/src/irc/cor... |
3rdn4/krb5:d864d74-heap_buffer_overflow | /workspace/skyset/ | krb5 | d864d74-heap_buffer_overflow | /workspace/skyset/krb5/d864d74-heap_buffer_overflow/report.txt | A heap buffer overflow found in /workspace/skyset/krb5/d864d74-heap_buffer_overflow/immutable/ | From c5507dff5f5b2936937442b43f6c021b4f8a493d Mon Sep 17 00:00:00 2001
From: Greg Hudson <ghudson@mit.edu>
Date: Sat, 10 Dec 2022 00:40:44 -0500
Subject: [PATCH] Simplify krb5_chpw_message() UTF-8 processing
Only validate the message as a UTF-8 string, rather than normalizing
it.
---
src/include/k5-unicode.h | 2... |
3rdn4/libmobi:1297ee0-heap_out_of_bound | /workspace/skyset/ | libmobi | 1297ee0-heap_out_of_bound | /workspace/skyset/libmobi/1297ee0-heap_out_of_bound/report.txt | A heap out of bound found in /workspace/skyset/libmobi/1297ee0-heap_out_of_bound/immutable/ | diff --git a/src/parse_rawml.c b/src/parse_rawml.c
index 6b6c9d7..41ba9a3 100644
--- a/src/parse_rawml.c
+++ b/src/parse_rawml.c
@@ -107,7 +107,7 @@ MOBI_RET mobi_search_links_kf7(MOBIResult *result, const unsigned char *data_sta
result->value[i++] = (char) *data++;
}
... |
End of preview. Expand in Data Studio
README.md exists but content is empty.
- Downloads last month
- 9