instance_id stringlengths 17 28 | repo stringclasses 85
values | base_commit stringlengths 40 40 | date timestamp[ns]date 2011-05-04 02:41:45 2025-11-08 00:00:00 | project_name stringclasses 85
values | lang stringclasses 3
values | dockerfile stringlengths 178 1.15k | build_sh stringclasses 102
values | work_dir stringclasses 85
values | sanitizer stringclasses 4
values | bug_description stringlengths 905 163k | additional_files listlengths 0 6 | candidate_fixes listlengths 0 321 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|
libass.cve-2020-24994 | libass/libass | 691b422247552a86e9d3310c4f1ea096dc52a3f2 | 2018-01-05T14:31:41 | libass | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y make autoconf automake libtool pkg-config libfreetype6-dev libfontconfig1-dev
RUN git clone https://github.com/libass/libass libass
RUN git -C libass checkout 691b422247552a86e9d3310c4f1ea096dc52a3f2
WORKDIR $SRC/libass
COPY build.sh $SRC/ | #!/bin/bash -eux
# Minimized build script with only core build commands
set -eu
cd $SRC/fribidi
./bootstrap
./configure --enable-static=yes --enable-shared=no --with-pic=yes --prefix=/work/
make install -j$(nproc)
cd $SRC/libass
export PKG_CONFIG_PATH=/work/lib/pkgconfig
./autogen.sh
./configure --disable-asm
make -j$(... | /src/libass | address | ================= Bug Report (1/3) ==================
## Source: GitHub Issue
## URL: https://github.com/libass/libass/issues/422
## Description:
Issue: libass/libass#422
Title: stack-overflow on ass_parse.c:234 *parse_tag
State: closed
Created by: Fstark-prog
Created at: 2020-08-27 02:18:39+00:00
Issue Body:
**Descri... | [
{
"content": "\"0x\"\n\"\\\\1a\"\n\"\\\\2a\"\n\"\\\\2c\"\n\"\\\\3a\"\n\"\\\\3c\"\n\"\\\\4a\"\n\"\\\\4c\"\n\"\\\\a\"\n\"\\\\alpha\"\n\"\\\\an\"\n\"Arial\"\n\"\\\\b\"\n\"Banner;\"\n\"\\\\be\"\n\"\\\\blur\"\n\"\\\\bord\"\n\"\\\\c\"\n\"CFF\"\n\"CID Type 1\"\n\"\\\\clip\"\n\"clip\"\n\"Courier\"\n\"Courier New\"\n\"D... | [
{
"sha": "6835731c2fe4164a0c50bc91d12c43b2a2b4e799",
"url": "https://github.com/libass/libass/commit/6835731c2fe4164a0c50bc91d12c43b2a2b4e799"
},
{
"sha": "b3f9022b04ddf8872b99c28dd358d89e94dea12d",
"url": "https://github.com/libass/libass/commit/b3f9022b04ddf8872b99c28dd358d89e94dea12d"
},
... |
openjpeg.cve-2016-3182 | uclouvain/openjpeg | 788dff0a3650f8897eaafe951512a4bae63808dd | 2016-05-15T12:19:15 | openjpeg | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y make cmake g++
RUN git clone https://github.com/uclouvain/openjpeg openjpeg
RUN git -C openjpeg checkout 788dff0a3650f8897eaafe951512a4bae63808dd
WORKDIR $SRC/openjpeg
COPY build.sh $SRC/ | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
mkdir -p build
cd build
cmake ..
make clean -s -j$(nproc)
make -j$(nproc) -s | /src/openjpeg | address | ================= Bug Report (1/2) ==================
## Source: Red Hat Bugzilla
## URL: https://bugzilla.redhat.com/show_bug.cgi?id=1317826
## Description:
Bugzilla ID: 1317826
Title: CVE-2016-3182 openjpeg: Heap corruption in opj_free function
Description
Adam Mariš 2016-03-15 10:17:38 UTC
Double free or heap corru... | [] | [
{
"sha": "ad593c9e0622e0d8d87228e67e4dbd36243ffd22",
"url": "https://github.com/uclouvain/openjpeg/commit/ad593c9e0622e0d8d87228e67e4dbd36243ffd22"
},
{
"sha": "105892033756b9bd30c7ef90704b75618697e54f",
"url": "https://github.com/mayeut/openjpeg/commit/105892033756b9bd30c7ef90704b75618697e54f"
... |
freerdp.cve-2023-40569 | freerdp/freerdp | 16047bd16f159ee4aea581854170e83c36862793 | 2023-08-28T07:33:09 | freerdp | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y build-essential git-core cmake ninja-build pkg-config zlib1g-dev ccache libx11-dev libxext-dev libxinerama-dev libxcursor-dev libxkbfile-dev libxv-dev libxi-dev libxdamage-dev libxrender-dev libxrandr-dev libssl-dev libasound2-dev libcups2-dev lib... | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
-DCMAKE_C_FLAGS="${CFLAGS}"
-DCMAKE_CXX_FLAGS="${CXXFLAGS}"
-DCMAKE_EXE_LINKER_FLAGS="${LDFLAGS}"
-DCMAKE_MODULE_LINKER_FLAGS="${LDFLAGS}"
-DCMAKE_SHARED_LINKER_FLAGS="${LDFLAGS}"
cmake "${cmake_args[@]}" -S . -B build -G... | /src/freerdp | address | ================= Bug Report (1/1) ==================
## Source: GitHub Advisory
## URL: https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-hm8c-rcjg-c8qp
## Description:
Advisory ID: GHSA-hm8c-rcjg-c8qp
Title: Out-Of-Bounds Write in progressive_decompress
Description:
Summary
Out-Of-Bounds Write in progressi... | [] | [
{
"sha": "5be5553e0da72178a4b94cc1ffbdace9ceb153e5",
"url": "https://github.com/FreeRDP/FreeRDP/commit/5be5553e0da72178a4b94cc1ffbdace9ceb153e5"
}
] |
gpac.cve-2022-43042 | gpac/gpac | 65430e30593bb04579445e77df0a1207adfad357 | 2022-12-19T09:13:04 | gpac | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y build-essential pkg-config libz-dev
RUN git clone https://github.com/gpac/gpac gpac
RUN git -C gpac checkout 65430e30593bb04579445e77df0a1207adfad357
WORKDIR $SRC/gpac
COPY build.sh $SRC/ | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
./configure --static-build --extra-cflags="${CFLAGS}" --extra-ldflags="${CFLAGS}"
make -j$(nproc) | /src/gpac | address | ================= Bug Report (1/1) ==================
## Source: GitHub Issue
## URL: https://github.com/gpac/gpac/issues/2278
## Description:
Issue: gpac/gpac#2278
Title: heap-buffer-overflow isomedia/isom_intern.c:227 in FixSDTPInTRAF
State: closed
Created by: 17ssDP
Created at: 2022-10-09 08:21:31+00:00
Issue Body:... | [] | [
{
"sha": "3661da280b3eba75490e75ff20ad440c66e24de9",
"url": "https://github.com/gpac/gpac/commit/3661da280b3eba75490e75ff20ad440c66e24de9"
}
] |
gpac.cve-2022-46489 | gpac/gpac | 65430e30593bb04579445e77df0a1207adfad357 | 2022-12-19T09:13:04 | gpac | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y build-essential pkg-config libz-dev
RUN git clone https://github.com/gpac/gpac gpac
RUN git -C gpac checkout 65430e30593bb04579445e77df0a1207adfad357
WORKDIR $SRC/gpac
COPY build.sh $SRC/ | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
./configure --static-build --extra-cflags="${CFLAGS}" --extra-ldflags="${CFLAGS}"
make -j$(nproc) | /src/gpac | address | ================= Bug Report (1/1) ==================
## Source: GitHub Issue
## URL: https://github.com/gpac/gpac/issues/2328
## Description:
Issue: gpac/gpac#2328
Title: Memory leak in gf_isom_box_parse_ex function of box_funcs.c:166:13
State: closed
Created by: HotSpurzzZ
Created at: 2022-11-28 06:47:39+00:00
Issue... | [] | [
{
"sha": "b9577e6ad91ef96decbcd369227ab02b2842c77f",
"url": "https://github.com/gpac/gpac/commit/b9577e6ad91ef96decbcd369227ab02b2842c77f"
},
{
"sha": "44e8616ec6d0c37498cdacb81375b09249fa9daa",
"url": "https://github.com/gpac/gpac/commit/44e8616ec6d0c37498cdacb81375b09249fa9daa"
}
] |
gpac.cve-2019-20171 | gpac/gpac | ed4ec31ea84a1a94abb17669db33f5c4e7a679cf | 2020-06-15T05:33:03 | gpac | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y build-essential pkg-config libz-dev
RUN git clone https://github.com/gpac/gpac gpac
RUN git -C gpac checkout ed4ec31ea84a1a94abb17669db33f5c4e7a679cf
WORKDIR $SRC/gpac
COPY build.sh $SRC/ | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
./configure --static-build --extra-cflags="${CFLAGS}" --extra-ldflags="${CFLAGS}"
make -j$(nproc) | /src/gpac | address | ================= Bug Report (1/1) ==================
## Source: GitHub Issue
## URL: https://github.com/gpac/gpac/issues/1337
## Description:
Issue: gpac/gpac#1337
Title: AddressSanitizer: 2 memory leaks of metx_New(), abst_Read()
State: closed
Created by: Clingto
Created at: 2019-11-09 12:00:28+00:00
Issue Body:
Sys... | [
{
"content": "/* Copyright 2021 Google LLC\nLicensed under the Apache License, Version 2.0 (the \"License\");\nyou may not use this file except in compliance with the License.\nYou may obtain a copy of the License at\n http://www.apache.org/licenses/LICENSE-2.0\nUnless required by applicable law or agreed ... | [
{
"sha": "72cdc5048dead86bb1df7d21e0b9975e49cf2d97",
"url": "https://github.com/gpac/gpac/commit/72cdc5048dead86bb1df7d21e0b9975e49cf2d97"
}
] |
md4c.cve-2018-11546 | mity/md4c | 00ca0604f6ed8893d24eb8b227a6ef8445cd87c0 | 2018-05-28T15:06:15 | md4c | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y make cmake
RUN git clone https://github.com/mity/md4c md4c
RUN git -C md4c checkout 00ca0604f6ed8893d24eb8b227a6ef8445cd87c0
WORKDIR $SRC/md4c
COPY build.sh $SRC/ | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
mkdir -p build && cd build
cmake ../ -DBUILD_SHARED_LIBS=OFF
make -j$(nproc) | /src/md4c | address | ================= Bug Report (1/1) ==================
## Source: GitHub Issue
## URL: https://github.com/mity/md4c/issues/38
## Description:
Issue: mity/md4c#38
Title: Heap buffer overflow in md_is_named_entity_contents()
State: closed
Created by: ChijinZ
Created at: 2018-05-29 15:41:25+00:00
Labels: bug
Issue Body:
c... | [] | [
{
"sha": "e5feaf2c96a08390f89a72972b5f8b808ca34e79",
"url": "https://github.com/mity/md4c/commit/e5feaf2c96a08390f89a72972b5f8b808ca34e79"
}
] |
md4c.cve-2018-11545 | mity/md4c | 00ca0604f6ed8893d24eb8b227a6ef8445cd87c0 | 2018-05-28T15:06:15 | md4c | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y make cmake
RUN git clone https://github.com/mity/md4c md4c
RUN git -C md4c checkout 00ca0604f6ed8893d24eb8b227a6ef8445cd87c0
WORKDIR $SRC/md4c
COPY build.sh $SRC/ | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
mkdir -p build && cd build
cmake ../ -DBUILD_SHARED_LIBS=OFF
make -j$(nproc) | /src/md4c | address | ================= Bug Report (1/1) ==================
## Source: GitHub Issue
## URL: https://github.com/mity/md4c/issues/39
## Description:
Issue: mity/md4c#39
Title: Heap buffer overflow in md_merge_lines()
State: closed
Created by: ChijinZ
Created at: 2018-05-29 15:41:50+00:00
Labels: bug
Issue Body:
command: ./md2... | [] | [
{
"sha": "7deaccf65d01d5bde104efb3b6fd18aab8ae8392",
"url": "https://github.com/mity/md4c/commit/7deaccf65d01d5bde104efb3b6fd18aab8ae8392"
}
] |
gpac.cve-2020-22677 | gpac/gpac | 6b4ab401297be43b57f9eddd675971a8a5feab44 | 2019-06-27T05:20:45 | gpac | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y build-essential pkg-config libz-dev
RUN git clone https://github.com/gpac/gpac gpac
RUN git -C gpac checkout 6b4ab401297be43b57f9eddd675971a8a5feab44
WORKDIR $SRC/gpac
COPY build.sh $SRC/ | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
./configure --static-build --extra-cflags="${CFLAGS}" --extra-ldflags="${CFLAGS}"
make -j$(nproc) | /src/gpac | address | ================= Bug Report (1/1) ==================
## Source: GitHub Issue
## URL: https://github.com/gpac/gpac/issues/1341
## Description:
Issue: gpac/gpac#1341
Title: There is a heap-buffer-overflow in the dump_data_hex function of box_dump.c:51
State: closed
Created by: gutiniao
Created at: 2019-11-13 03:49:59+00... | [
{
"content": "/* Copyright 2021 Google LLC\nLicensed under the Apache License, Version 2.0 (the \"License\");\nyou may not use this file except in compliance with the License.\nYou may obtain a copy of the License at\n http://www.apache.org/licenses/LICENSE-2.0\nUnless required by applicable law or agreed ... | [
{
"sha": "eec9e058a9486fe4e99c33021481d9e1826ca9db",
"url": "https://github.com/gpac/gpac/commit/eec9e058a9486fe4e99c33021481d9e1826ca9db"
}
] |
mruby.cve-2018-14337 | mruby/mruby | 023070a6396233974785a8fd5735b9380a884f27 | 2018-04-26T21:30:30 | mruby | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y make autoconf automake libtool ruby bison
RUN git clone https://github.com/mruby/mruby mruby
RUN git -C mruby checkout 023070a6396233974785a8fd5735b9380a884f27
WORKDIR $SRC/mruby
COPY build.sh $SRC/ | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
export LD=clang
export LDFLAGS="$CFLAGS"
./minirake clean && ./minirake -j$(nproc) all | /src/mruby | undefined | ================= Bug Report (1/1) ==================
## Source: GitHub Issue
## URL: https://github.com/mruby/mruby/issues/4062
## Description:
Issue: mruby/mruby#4062
Title: Signed integer overflow in mrb_str_format
State: closed
Created by: clayton-shopify
Created at: 2018-06-25 15:27:56+00:00
Issue Body:
The check... | [] | [
{
"sha": "351614bbddb5f612ecf9572e975e78e058d2bf11",
"url": "https://github.com/mruby/mruby/commit/351614bbddb5f612ecf9572e975e78e058d2bf11"
},
{
"sha": "695f29cd604787f43be1af16e38d13610bf8312b",
"url": "https://github.com/mruby/mruby/commit/695f29cd604787f43be1af16e38d13610bf8312b"
},
{
... |
libsass.cve-2018-11698 | sass/libsass | 1e52b74306b7d73a617396c912ca436dc55fd4d8 | 2018-04-25T00:47:16 | libsass | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y make autoconf automake libtool
RUN git clone https://github.com/sass/libsass libsass
RUN git -C libsass checkout 1e52b74306b7d73a617396c912ca436dc55fd4d8
WORKDIR $SRC/libsass
COPY build.sh $SRC/ | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
export BUILD='static'
make -j$(nproc) | /src/libsass | address | ================= Bug Report (1/1) ==================
## Source: GitHub Issue
## URL: https://github.com/sass/libsass/issues/2662
## Description:
Issue: sass/libsass#2662
Title: AddressSanitizer: heap-buffer-overflow (OOB read) in Sass::handle_error (libsass/src/sass_context.cpp:85:28)
State: closed
Created by: glen-ma... | [
{
"content": "#include \"sass.h\"\n\nextern \"C\" int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) {\n char* sass_data = (char*) malloc(sizeof(char) * size + 1);\n if (sass_data == NULL) return 0;\n\n memcpy(sass_data, data, size);\n sass_data[size] = '\\0';\n\n struct Sass_Data_Context* ctx = ... | [
{
"sha": "aa6d5c635ea8faf44d542a23aaf85d27e5777d48",
"url": "https://github.com/sass/sassc/commit/aa6d5c635ea8faf44d542a23aaf85d27e5777d48"
},
{
"sha": "60f839158eff1f1bb84cb44f0f0c4bce3ed86a6d",
"url": "https://github.com/sass/libsass/commit/60f839158eff1f1bb84cb44f0f0c4bce3ed86a6d"
},
{
... |
openjpeg.cve-2016-9115 | uclouvain/openjpeg | 1f1e968269bbd7eaade7955892a6d8c281b91df2 | 2016-09-28T13:18:16 | openjpeg | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y make cmake g++
RUN git clone https://github.com/uclouvain/openjpeg openjpeg
RUN git -C openjpeg checkout 1f1e968269bbd7eaade7955892a6d8c281b91df2
WORKDIR $SRC/openjpeg
COPY build.sh $SRC/ | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
mkdir -p build
cd build
cmake ..
make clean -s -j$(nproc)
make -j$(nproc) -s | /src/openjpeg | address | ================= Bug Report (1/1) ==================
## Source: GitHub Issue
## URL: https://github.com/uclouvain/openjpeg/issues/858
## Description:
Issue: uclouvain/openjpeg#858
Title: Heap Buffer Overflow in function imagetotga of convert.c(jp2):942
State: closed
Created by: YangY-Xiao
Created at: 2016-10-29 08:45:... | [] | [] |
w3m.cve-2016-9431 | tats/w3m | ce6fffae3d2b82eeef1cbec23a6f4849169f1211 | 2016-10-15T05:34:56 | w3m | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y libgc-dev
RUN git clone https://github.com/tats/w3m w3m
RUN git -C w3m checkout ce6fffae3d2b82eeef1cbec23a6f4849169f1211
WORKDIR $SRC/w3m
COPY build.sh $SRC/ | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
./configure
make myctype.o -j$(nproc)
make Str.o -j$(nproc)
make libwc -j$(nproc) | /src/w3m | address | ================= Bug Report (1/1) ==================
## Source: GitHub Issue
## URL: https://github.com/tats/w3m/issues/10
## Description:
Issue: tats/w3m#10
Title: stackoverflow in deleteFrameSet() on malform input
State: closed
Created by: kcwu
Created at: 2016-08-14 13:38:48+00:00
Issue Body:
How to reproduce:
``... | [] | [
{
"sha": "9f0bdcfdf061db3520bd1f112bdc5e83acdec4be",
"url": "https://github.com/tats/w3m/commit/9f0bdcfdf061db3520bd1f112bdc5e83acdec4be"
},
{
"sha": "f065a49616b8104973e30a2b031102d6b6e11080",
"url": "https://github.com/tats/w3m/commit/f065a49616b8104973e30a2b031102d6b6e11080"
},
{
"sha... |
imagemagick.cve-2017-14139 | imagemagick/imagemagick | bbd2d43ed43631c37c0301ecc82479190cae611b | 2017-07-21T20:11:36 | imagemagick | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y make autoconf automake libtool
RUN git clone https://github.com/imagemagick/imagemagick imagemagick
RUN git -C imagemagick checkout bbd2d43ed43631c37c0301ecc82479190cae611b
WORKDIR $SRC/imagemagick
COPY build.sh $SRC/ | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
./configure --prefix="$WORK" --disable-shared --disable-docs
make "-j$(nproc)"
make install -j$(nproc) | /src/imagemagick | address | ================= Bug Report (1/1) ==================
## Source: GitHub Issue
## URL: https://github.com/ImageMagick/ImageMagick/issues/578
## Description:
Issue: ImageMagick/ImageMagick#578
Title: memory leak in WriteMSLImage
State: closed
Created by: jgj212
Created at: 2017-07-17 04:58:46+00:00
Labels: bug
Issue Bod... | [
{
"content": "#include <cstdint>\n\n#include <Magick++/Blob.h>\n#include <Magick++/Image.h>\n\nextern \"C\" int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) {\n uint16_t Width;\n uint16_t Height;\n if (Size < (sizeof(Width) + sizeof(Height))) {\n return 0;\n }\n Width = *reinterpret_cast<con... | [
{
"sha": "6ce596ba2c05cce1ad5ffabdeceb7f06ba0ae736",
"url": "https://github.com/ImageMagick/ImageMagick/commit/6ce596ba2c05cce1ad5ffabdeceb7f06ba0ae736"
},
{
"sha": "13ee1160f9b2c2dc6945317bfbe8412be5999047",
"url": "https://github.com/ImageMagick/ImageMagick/commit/13ee1160f9b2c2dc6945317bfbe84... |
espeak-ng.cve-2023-49990 | espeak-ng/espeak-ng | 4870adfa25b1a32b4361592f1be8a40337c58d6c | 2024-12-12T07:28:01 | espeak-ng | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt install -y automake autoconf libtool pkg-config
RUN git clone https://github.com/espeak-ng/espeak-ng espeak-ng
RUN git -C espeak-ng checkout 4870adfa25b1a32b4361592f1be8a40337c58d6c
WORKDIR $SRC/espeak-ng
COPY build.sh $SRC/ | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
export ASAN_OPTIONS=detect_leaks=0
./autogen.sh
./configure --with-libfuzzer=yes --disable-shared --with-speechplayer=no
make check || true -j$(nproc) | /src/espeak-ng | address | ================= Bug Report (1/1) ==================
## Source: GitHub Issue
## URL: https://github.com/espeak-ng/espeak-ng/issues/1824
## Description:
Issue: espeak-ng/espeak-ng#1824
Title: global-buffer-overflow exists in the function SetUpPhonemeTable in synthdata.c
State: closed
Created by: SEU-SSL
Created at: 202... | [] | [
{
"sha": "58f1e0b6a4e6aa55621c6f01118994d01fd6f68c",
"url": "https://github.com/espeak-ng/espeak-ng/commit/58f1e0b6a4e6aa55621c6f01118994d01fd6f68c"
},
{
"sha": "c4c05820c4a47369d5a81e4a506fe7abb2fa7ed6",
"url": "https://github.com/espeak-ng/espeak-ng/commit/c4c05820c4a47369d5a81e4a506fe7abb2fa7... |
exiv2.cve-2021-29458 | exiv2/exiv2 | 9ac01692487e1fd5e5240ea95bf9c43bf281775a | 2021-06-15T03:46:50 | exiv2 | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y cmake make ccache python3 libexpat1-dev zlib1g-dev libssh-dev libcurl4-openssl-dev libxml2-utils
RUN git clone https://github.com/exiv2/exiv2 exiv2
RUN git -C exiv2 checkout 9ac01692487e1fd5e5240ea95bf9c43bf281775a
WORKDIR $SRC/exiv2
COPY build.sh... | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
mkdir -p build
cd build
cmake -DEXIV2_ENABLE_PNG=ON -DEXIV2_ENABLE_WEBREADY=ON -DEXIV2_ENABLE_CURL=OFF -DEXIV2_ENABLE_BMFF=ON -DEXIV2_TEAM_WARNINGS_AS_ERRORS=ON -DBUILD_SHARED_LIBS=OFF -DCMAKE_CXX_COMPILER="${CXX}" -DCMAKE_CXX_FLAGS="${CXXFL... | /src/exiv2 | address | ================= Bug Report (1/2) ==================
## Source: GitHub Advisory
## URL: https://github.com/Exiv2/exiv2/security/advisories/GHSA-57jj-75fm-9rq5
## Description:
Advisory ID: GHSA-57jj-75fm-9rq5
Title: Out-of-bounds read in Exiv2::Internal::CrwMap::encode
Description:
Impact
An out-of-bounds read was fou... | [] | [
{
"sha": "05ec05342e17dc94670db1818447c06d0da8f41a",
"url": "https://github.com/Exiv2/exiv2/commit/05ec05342e17dc94670db1818447c06d0da8f41a"
},
{
"sha": "0230620e6ea5e2da0911318e07ce6e66d1ebdf22",
"url": "https://github.com/exiv2/exiv2/commit/0230620e6ea5e2da0911318e07ce6e66d1ebdf22"
},
{
... |
gpac.cve-2019-20628 | gpac/gpac | 1ab4860609f2e7a35634930571e7d0531297e090 | 2019-07-07T10:56:28 | gpac | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y build-essential pkg-config libz-dev
RUN git clone https://github.com/gpac/gpac gpac
RUN git -C gpac checkout 1ab4860609f2e7a35634930571e7d0531297e090
WORKDIR $SRC/gpac
COPY build.sh $SRC/ | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
./configure --static-build --extra-cflags="${CFLAGS}" --extra-ldflags="${CFLAGS}"
make -j$(nproc) | /src/gpac | address | ================= Bug Report (1/1) ==================
## Source: GitHub Issue
## URL: https://github.com/gpac/gpac/issues/1269
## Description:
Issue: gpac/gpac#1269
Title: Use After Free (mpegts.c:2183)
State: closed
Created by: strongcourage
Created at: 2019-07-06 00:10:37+00:00
Issue Body:
Hi,
Our fuzzer found an UA... | [
{
"content": "/* Copyright 2021 Google LLC\nLicensed under the Apache License, Version 2.0 (the \"License\");\nyou may not use this file except in compliance with the License.\nYou may obtain a copy of the License at\n http://www.apache.org/licenses/LICENSE-2.0\nUnless required by applicable law or agreed ... | [
{
"sha": "1ab4860609f2e7a35634930571e7d0531297e090",
"url": "https://github.com/gpac/gpac/commit/1ab4860609f2e7a35634930571e7d0531297e090"
},
{
"sha": "98b727637e32d1d4824101d8947e2dbd573d4fc8",
"url": "https://github.com/gpac/gpac/commit/98b727637e32d1d4824101d8947e2dbd573d4fc8"
}
] |
imagemagick.cve-2022-48541 | imagemagick/imagemagick | 4660af18c654f36f0b054eb3c2d72d1f9928507d | 2020-11-30T07:24:17 | imagemagick | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y make autoconf automake groff libtool pkg-config cmake nasm autopoint po4a libc6:i386 libc6-dev:i386
RUN apt-get install -y make autoconf automake groff libtool pkg-config cmake nasm autopoint po4a libc6:i386 libc6-dev:i386
RUN git clone https://gi... | #!/bin/bash
# Default build script template for C/C++ projects
set -eu
# Define configuration options
CONFIG_OPTS="--disable-shared"
CMAKE_OPTS="-DCMAKE_BUILD_TYPE=Debug"
MAKE_OPTS="-j$(nproc)"
BUILD_DIR="build"
# 1. Run build preparation scripts if they exist
for prep_script in buildconf autogen.sh bootstrap; do
i... | /src/imagemagick | address | ================= Bug Report (1/1) ==================
## Source: GitHub Issue
## URL: https://github.com/ImageMagick/ImageMagick/issues/2889
## Description:
Issue: ImageMagick/ImageMagick#2889
Title: Memory leak in identify -help
State: closed
Created by: luisfrod
Created at: 2020-11-30 15:25:48+00:00
Issue Body:
### ... | [] | [] |
imagemagick.cve-2017-12662 | imagemagick/imagemagick | 2ba8f335fa06daf1165e0878462686028e633a74 | 2017-07-17T18:09:14 | imagemagick | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y make autoconf automake libtool
RUN git clone https://github.com/imagemagick/imagemagick imagemagick
RUN git -C imagemagick checkout 2ba8f335fa06daf1165e0878462686028e633a74
WORKDIR $SRC/imagemagick
COPY build.sh $SRC/ | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
./configure --prefix="$WORK" --disable-shared --disable-docs
make "-j$(nproc)"
make install -j$(nproc) | /src/imagemagick | ================= Bug Report (1/1) ==================
## Source: GitHub Issue
## URL: https://github.com/ImageMagick/ImageMagick/issues/576
## Description:
Issue: ImageMagick/ImageMagick#576
Title: memory leak in WritePDFImage
State: closed
Created by: jgj212
Created at: 2017-07-17 01:34:17+00:00
Labels: bug
Issue Bod... | [
{
"content": "#include <cstdint>\n\n#include <Magick++/Blob.h>\n#include <Magick++/Image.h>\n\nextern \"C\" int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) {\n uint16_t Width;\n uint16_t Height;\n if (Size < (sizeof(Width) + sizeof(Height))) {\n return 0;\n }\n Width = *reinterpret_cast<con... | [
{
"sha": "bd40cc5f53067322861b881485cbd70f509f3829",
"url": "https://github.com/ImageMagick/ImageMagick/commit/bd40cc5f53067322861b881485cbd70f509f3829"
},
{
"sha": "73a2bad43d157acfe360595feee739b4cc4406cb",
"url": "https://github.com/ImageMagick/ImageMagick/commit/73a2bad43d157acfe360595feee73... | |
njs.cve-2022-34027 | nginx/njs | d493f891f8f80a5474932ab14f6e397ef5463092 | 2022-05-24T11:07:58 | njs | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y make autoconf automake libtool mercurial git libpcre2-dev
RUN git clone https://github.com/nginx/njs njs
RUN git -C njs checkout d493f891f8f80a5474932ab14f6e397ef5463092
WORKDIR $SRC/njs
COPY build.sh $SRC/ | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
./autogen.sh
CFLAGS="$CFLAGS -fno-use-cxa-atexit" CXXFLAGS="$CXXFLAGS -fno-use-cxa-atexit" ./configure
make -j$(nproc) clean
make -j$(nproc) all
make install -j$(nproc)
sed -i "s/\$libS\$libR \(-lpcre2-8$\)/\$libS\$libR -Wl,-Bstatic \1 -Wl,-... | /src/njs | address | ================= Bug Report (1/1) ==================
## Source: GitHub Issue
## URL: https://github.com/nginx/njs/issues/504
## Description:
Issue: nginx/njs#504
Title: SEGV njs_value.c:1083:19 in njs_value_property
State: closed
Created by: dramthy
Created at: 2022-05-19 08:33:21+00:00
Labels: bug, fuzzer
Issue Body... | [] | [
{
"sha": "6cef7f5055ec24275f0ae121c7f8709ff3e0c454",
"url": "https://github.com/nginx/njs/commit/6cef7f5055ec24275f0ae121c7f8709ff3e0c454"
},
{
"sha": "1878e6b475720c7c51969e69ab2d276fae6d1dee",
"url": "https://github.com/nginx/njs/commit/1878e6b475720c7c51969e69ab2d276fae6d1dee"
},
{
"s... |
libredwg.cve-2019-20911 | libredwg/libredwg | 784829b23deead8f62fe49cf7d8dd082698a33a9 | 2019-12-31T11:30:48 | libredwg | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y autoconf libtool texinfo
RUN git clone https://github.com/libredwg/libredwg libredwg
RUN git -C libredwg checkout 784829b23deead8f62fe49cf7d8dd082698a33a9
WORKDIR $SRC/libredwg
COPY build.sh $SRC/ | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
sh ./autogen.sh
./configure --disable-shared
make -j$(nproc) | /src/libredwg | address | ================= Bug Report (1/1) ==================
## Source: GitHub Issue
## URL: https://github.com/LibreDWG/libredwg/issues/178
## Description:
Issue: LibreDWG/libredwg#178
Title: Several bugs need to be fixed.
State: closed
Created by: skyvast404
Created at: 2019-12-31 06:04:23+00:00
Labels: bug, fuzzing
Issue ... | [
{
"content": "[libfuzzer]\ndetect_leaks=0\n",
"filename": "fuzz_dwg_decode.options"
}
] | [
{
"sha": "c6f6668b82bfe595899cc820279ac37bb9ef16f5",
"url": "https://github.com/LibreDWG/libredwg/commit/c6f6668b82bfe595899cc820279ac37bb9ef16f5"
},
{
"sha": "3f503dd294efc63a59608d8a16058c41d44ba13a",
"url": "https://github.com/LibreDWG/libredwg/commit/3f503dd294efc63a59608d8a16058c41d44ba13a"... |
gpac.cve-2021-40608 | gpac/gpac | 62bbb9f3977e358631ef395625471bbcf284785e | 2022-02-22T07:38:45 | gpac | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y build-essential pkg-config libz-dev
RUN git clone https://github.com/gpac/gpac gpac
RUN git -C gpac checkout 62bbb9f3977e358631ef395625471bbcf284785e
WORKDIR $SRC/gpac
COPY build.sh $SRC/ | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
./configure --static-build --extra-cflags="${CFLAGS}" --extra-ldflags="${CFLAGS}"
make -j$(nproc) | /src/gpac | address | ================= Bug Report (1/1) ==================
## Source: GitHub Issue
## URL: https://github.com/gpac/gpac/issues/1883
## Description:
Issue: gpac/gpac#1883
Title: BUG : free on unknown addrees in MP4BOX at gf_hinter_track_finalize media_tools/isom_hinter.c:956
State: closed
Created by: AntsKnows
Created at: 2... | [] | [
{
"sha": "b09c75dc2d4bf68ac447daa71e72365aa30231a9",
"url": "https://github.com/gpac/gpac/commit/b09c75dc2d4bf68ac447daa71e72365aa30231a9"
}
] |
imagemagick.cve-2017-11540 | imagemagick/imagemagick | 9871b4ad7400606bbecf7f979b198080f4b107c3 | 2017-07-15T12:32:46 | imagemagick | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y make autoconf automake libtool
RUN git clone https://github.com/imagemagick/imagemagick imagemagick
RUN git -C imagemagick checkout 9871b4ad7400606bbecf7f979b198080f4b107c3
WORKDIR $SRC/imagemagick
COPY build.sh $SRC/ | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
./configure --prefix="$WORK" --disable-shared --disable-docs
make "-j$(nproc)"
make install -j$(nproc) | /src/imagemagick | address | ================= Bug Report (1/1) ==================
## Source: GitHub Issue
## URL: https://github.com/ImageMagick/ImageMagick/issues/581
## Description:
Issue: ImageMagick/ImageMagick#581
Title: Heap-Overflow in GetPixelIndex() MagickCore/pixel-accessor.h
State: closed
Created by: lcatro
Created at: 2017-07-18 04:41... | [
{
"content": "#include <cstdint>\n\n#include <Magick++/Blob.h>\n#include <Magick++/Image.h>\n\nextern \"C\" int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) {\n uint16_t Width;\n uint16_t Height;\n if (Size < (sizeof(Width) + sizeof(Height))) {\n return 0;\n }\n Width = *reinterpret_cast<con... | [
{
"sha": "20635b9b859fc649f7682ab08a4c58c644a94bf5",
"url": "https://github.com/ImageMagick/ImageMagick/commit/20635b9b859fc649f7682ab08a4c58c644a94bf5"
}
] |
libredwg.cve-2019-9776 | libredwg/libredwg | 3406d1e5b611cdb898e14d5a47e30fdc4d59c9a5 | 2018-12-05T17:15:15 | libredwg | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y autoconf libtool texinfo
RUN git clone https://github.com/libredwg/libredwg libredwg
RUN git -C libredwg checkout 3406d1e5b611cdb898e14d5a47e30fdc4d59c9a5
WORKDIR $SRC/libredwg
COPY build.sh $SRC/ | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
sh ./autogen.sh
./configure --disable-shared
make -j$(nproc) | /src/libredwg | address | ================= Bug Report (1/1) ==================
## Source: GitHub Issue
## URL: https://github.com/LibreDWG/libredwg/issues/99
## Description:
Issue: LibreDWG/libredwg#99
Title: fuzzing results LibreDWG
State: closed
Created by: YourButterfly
Created at: 2019-03-12 10:51:26+00:00
Labels: bug
Issue Body:
# libred... | [
{
"content": "[libfuzzer]\ndetect_leaks=0\n",
"filename": "fuzz_dwg_decode.options"
}
] | [
{
"sha": "c948548e175a9e5e4ed45623013ed20df62a920a",
"url": "https://github.com/libredwg/libredwg/commit/c948548e175a9e5e4ed45623013ed20df62a920a"
},
{
"sha": "0c6a267ca01b811e837d5cec17a30061b4081dd2",
"url": "https://github.com/libredwg/libredwg/commit/0c6a267ca01b811e837d5cec17a30061b4081dd2"... |
libredwg.cve-2021-39525 | libredwg/libredwg | aee0ea1f52ef9603b981362c83b3fec324ebb199 | 2020-07-30T12:58:51 | libredwg | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y autoconf libtool texinfo
RUN git clone https://github.com/libredwg/libredwg libredwg
RUN git -C libredwg checkout aee0ea1f52ef9603b981362c83b3fec324ebb199
WORKDIR $SRC/libredwg
COPY build.sh $SRC/ | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
sh ./autogen.sh
./configure --disable-shared
make -j$(nproc) | /src/libredwg | address | ================= Bug Report (1/1) ==================
## Source: GitHub Issue
## URL: https://github.com/LibreDWG/libredwg/issues/261
## Description:
Issue: LibreDWG/libredwg#261
Title: A heap overflow in bits.c:1424
State: closed
Created by: seviezhou
Created at: 2020-08-02 04:51:37+00:00
Labels: bug, fuzzing
Issue B... | [
{
"content": "[libfuzzer]\ndetect_leaks=0\n",
"filename": "fuzz_dwg_decode.options"
}
] | [
{
"sha": "39ef9439f35111170258cf57cc0c58eabc4748c7",
"url": "https://github.com/LibreDWG/libredwg/commit/39ef9439f35111170258cf57cc0c58eabc4748c7"
}
] |
exiv2.cve-2017-9953 | exiv2/exiv2 | fa449a4d2c58d63f0d75ff259f25683a98a44630 | 2017-04-26T14:16:21 | exiv2 | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y cmake make ccache python3 libexpat1-dev zlib1g-dev libssh-dev libcurl4-openssl-dev libxml2-utils
RUN git clone https://github.com/exiv2/exiv2 exiv2
RUN git -C exiv2 checkout fa449a4d2c58d63f0d75ff259f25683a98a44630
WORKDIR $SRC/exiv2
COPY build.sh... | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
mkdir -p build
cd build
cmake -DEXIV2_ENABLE_PNG=ON -DEXIV2_ENABLE_WEBREADY=ON -DEXIV2_ENABLE_CURL=OFF -DEXIV2_ENABLE_BMFF=ON -DEXIV2_TEAM_WARNINGS_AS_ERRORS=ON -DBUILD_SHARED_LIBS=OFF -DCMAKE_CXX_COMPILER="${CXX}" -DCMAKE_CXX_FLAGS="${CXXFL... | /src/exiv2 | address | ================= Bug Report (1/1) ==================
## Source: Red Hat Bugzilla
## URL: https://bugzilla.redhat.com/show_bug.cgi?id=1465061
## Description:
Bugzilla ID: 1465061
Title: There is an invalid free in Image::printIFDStructure that leads to a Segmentation fault at exiv2. A crafted input will lead to remote ... | [] | [
{
"sha": "74cb5bab132ed76adf15df172c5e8b58cddaa96c",
"url": null
},
{
"sha": "6e3855aed7ba8bb4731fc4087ca7f9078b2f3d97",
"url": null
},
{
"sha": "8a8f60a4e7089fe7bb597770a2daab24a3941d3e",
"url": null
},
{
"sha": "ec4dbb28c48de7713a628913d1e8f1fddaa94a60",
"url": "https:/... |
libsass.cve-2018-11693 | sass/libsass | 1e52b74306b7d73a617396c912ca436dc55fd4d8 | 2018-04-25T00:47:16 | libsass | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y make autoconf automake libtool
RUN git clone https://github.com/sass/libsass libsass
RUN git -C libsass checkout 1e52b74306b7d73a617396c912ca436dc55fd4d8
WORKDIR $SRC/libsass
COPY build.sh $SRC/ | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
export BUILD='static'
make -j$(nproc) | /src/libsass | address | ================= Bug Report (1/1) ==================
## Source: GitHub Issue
## URL: https://github.com/sass/libsass/issues/2661
## Description:
Issue: sass/libsass#2661
Title: AddressSanitizer: heap-buffer-overflow (OOB read) in Sass::Prelexer::skip_over_scopes (libsass/src/prelexer.hpp:69:14)
State: closed
Created b... | [
{
"content": "#include \"sass.h\"\n\nextern \"C\" int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) {\n char* sass_data = (char*) malloc(sizeof(char) * size + 1);\n if (sass_data == NULL) return 0;\n\n memcpy(sass_data, data, size);\n sass_data[size] = '\\0';\n\n struct Sass_Data_Context* ctx = ... | [
{
"sha": "aa6d5c635ea8faf44d542a23aaf85d27e5777d48",
"url": "https://github.com/sass/sassc/commit/aa6d5c635ea8faf44d542a23aaf85d27e5777d48"
},
{
"sha": "60f839158eff1f1bb84cb44f0f0c4bce3ed86a6d",
"url": "https://github.com/sass/libsass/commit/60f839158eff1f1bb84cb44f0f0c4bce3ed86a6d"
},
{
... |
openjpeg.cve-2016-10504 | uclouvain/openjpeg | 11445eddad7e7fa5b273d1c83c91011c44e5d586 | 2017-07-29T12:03:13 | openjpeg | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y make cmake g++
RUN git clone https://github.com/uclouvain/openjpeg openjpeg
RUN git -C openjpeg checkout 11445eddad7e7fa5b273d1c83c91011c44e5d586
WORKDIR $SRC/openjpeg
COPY build.sh $SRC/ | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
mkdir -p build
cd build
cmake ..
make clean -s -j$(nproc)
make -j$(nproc) -s | /src/openjpeg | address | ================= Bug Report (1/1) ==================
## Source: GitHub Issue
## URL: https://github.com/uclouvain/openjpeg/issues/835
## Description:
Issue: uclouvain/openjpeg#835
Title: [CVE-2016-10504] Out-of-Bounds Write in opj_mqc_byteout of mqc.c
State: closed
Created by: trylab
Created at: 2016-09-13 10:13:45+00... | [] | [
{
"sha": "397f62c0a838e15d667ef50e27d5d011d2c79c04",
"url": "https://github.com/uclouvain/openjpeg/commit/397f62c0a838e15d667ef50e27d5d011d2c79c04"
}
] |
imagemagick.cve-2017-12666 | imagemagick/imagemagick | 73b6c35cede48ccb2e29dbe62c2d77488e5e70b7 | 2017-07-16T19:33:35 | imagemagick | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y make autoconf automake libtool
RUN git clone https://github.com/imagemagick/imagemagick imagemagick
RUN git -C imagemagick checkout 73b6c35cede48ccb2e29dbe62c2d77488e5e70b7
WORKDIR $SRC/imagemagick
COPY build.sh $SRC/ | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
./configure --prefix="$WORK" --disable-shared --disable-docs
make "-j$(nproc)"
make install -j$(nproc) | /src/imagemagick | ================= Bug Report (1/1) ==================
## Source: GitHub Issue
## URL: https://github.com/ImageMagick/ImageMagick/issues/572
## Description:
Issue: ImageMagick/ImageMagick#572
Title: memory leak in WriteINLINEImage
State: closed
Created by: jgj212
Created at: 2017-07-17 00:39:44+00:00
Labels: bug
Issue ... | [
{
"content": "#include <cstdint>\n\n#include <Magick++/Blob.h>\n#include <Magick++/Image.h>\n\nextern \"C\" int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) {\n uint16_t Width;\n uint16_t Height;\n if (Size < (sizeof(Width) + sizeof(Height))) {\n return 0;\n }\n Width = *reinterpret_cast<con... | [
{
"sha": "d5559407ce29f4371e5df9c1cbde65455fe5854c",
"url": "https://github.com/ImageMagick/ImageMagick/commit/d5559407ce29f4371e5df9c1cbde65455fe5854c"
},
{
"sha": "45aeda5da9eb328689afc221fa3b7dfa5cdea54d",
"url": "https://github.com/ImageMagick/ImageMagick/commit/45aeda5da9eb328689afc221fa3b7... | |
w3m.cve-2022-38223 | tats/w3m | 5397d09e585a1938fb64bc9c5cd5daed1959eb90 | 2011-05-04T02:41:45 | w3m | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y libgc-dev
RUN git clone https://github.com/tats/w3m w3m
RUN git -C w3m checkout 5397d09e585a1938fb64bc9c5cd5daed1959eb90
WORKDIR $SRC/w3m
COPY build.sh $SRC/ | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
./configure
make myctype.o -j$(nproc)
make Str.o -j$(nproc)
make libwc -j$(nproc) | /src/w3m | address | ================= Bug Report (1/1) ==================
## Source: GitHub Issue
## URL: https://github.com/tats/w3m/issues/242
## Description:
Issue: tats/w3m#242
Title: [BUG] out of bound write in checkType, etc.c:441
State: closed
Created by: kdsjZh
Created at: 2022-08-07 11:27:28+00:00
Issue Body:
Hello, I found a ou... | [] | [
{
"sha": "c515ea8a47b62408943390f579b2f377464f6658",
"url": "https://github.com/tats/w3m/commit/c515ea8a47b62408943390f579b2f377464f6658"
},
{
"sha": "419ca82d57c72242817b55e2eaa4cdbf6916e7fa",
"url": "https://github.com/tats/w3m/commit/419ca82d57c72242817b55e2eaa4cdbf6916e7fa"
},
{
"sha... |
libjpeg-turbo.cve-2020-13790 | libjpeg-turbo/libjpeg-turbo | a2291b252de1413a13db61b21863ae7aea0946f3 | 2020-05-05T00:38:39 | libjpeg-turbo | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y make autoconf automake libtool nasm curl cmake
RUN git clone https://github.com/libjpeg-turbo/libjpeg-turbo libjpeg-turbo
RUN git -C libjpeg-turbo checkout a2291b252de1413a13db61b21863ae7aea0946f3
WORKDIR $SRC/libjpeg-turbo
COPY build.sh $SRC/ | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
cmake . -DCMAKE_INSTALL_PREFIX=$WORK -DENABLE_STATIC:bool=on
make "-j$(nproc)"
make install -j$(nproc) | /src/libjpeg-turbo | address | ================= Bug Report (1/1) ==================
## Source: GitHub Issue
## URL: https://github.com/libjpeg-turbo/libjpeg-turbo/issues/433
## Description:
Issue: libjpeg-turbo/libjpeg-turbo#433
Title: Heap-based buffer over-read in get_rgb_row() in rdppm.c
State: closed
Created by: sanjeevk001
Created at: 2020-05-... | [
{
"content": "/*\n# Copyright 2016 Google Inc.\n#\n# Licensed under the Apache License, Version 2.0 (the \"License\");\n# you may not use this file except in compliance with the License.\n# You may obtain a copy of the License at\n#\n# http://www.apache.org/licenses/LICENSE-2.0\n#\n# Unless required by app... | [
{
"sha": "3de15e0c344d11d4b90f4a47136467053eb2d09a",
"url": "https://github.com/libjpeg-turbo/libjpeg-turbo/commit/3de15e0c344d11d4b90f4a47136467053eb2d09a"
},
{
"sha": "5fad352f09d22b5ae3e553f32f8cf3ee570c72c1",
"url": "https://github.com/libjpeg-turbo/libjpeg-turbo/commit/5fad352f09d22b5ae3e55... |
gpac.cve-2019-20161 | gpac/gpac | ed4ec31ea84a1a94abb17669db33f5c4e7a679cf | 2020-06-15T05:33:03 | gpac | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y build-essential pkg-config libz-dev
RUN git clone https://github.com/gpac/gpac gpac
RUN git -C gpac checkout ed4ec31ea84a1a94abb17669db33f5c4e7a679cf
WORKDIR $SRC/gpac
COPY build.sh $SRC/ | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
./configure --static-build --extra-cflags="${CFLAGS}" --extra-ldflags="${CFLAGS}"
make -j$(nproc) | /src/gpac | address | ================= Bug Report (1/1) ==================
## Source: GitHub Issue
## URL: https://github.com/gpac/gpac/issues/1320
## Description:
Issue: gpac/gpac#1320
Title: AddressSanitizer: heap-buffer-overflow in ReadGF_IPMPX_WatermarkingInit at ipmpx_code.c:1517
State: closed
Created by: Clingto
Created at: 2019-10-2... | [
{
"content": "/* Copyright 2021 Google LLC\nLicensed under the Apache License, Version 2.0 (the \"License\");\nyou may not use this file except in compliance with the License.\nYou may obtain a copy of the License at\n http://www.apache.org/licenses/LICENSE-2.0\nUnless required by applicable law or agreed ... | [
{
"sha": "7a09732d4978586e6284e84caa9c301b2fa5e956",
"url": "https://github.com/gpac/gpac/commit/7a09732d4978586e6284e84caa9c301b2fa5e956"
}
] |
wabt.cve-2022-43280 | webassembly/wabt | c32fa597218dbe2c25b43a9837a8475b493ddb71 | 2022-05-04T09:41:06 | wabt | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y cmake libtool make python
RUN git clone https://github.com/webassembly/wabt wabt
RUN git -C wabt checkout c32fa597218dbe2c25b43a9837a8475b493ddb71
WORKDIR $SRC/wabt
COPY build.sh $SRC/ | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
mkdir -p build
cd build
cmake ..
cmake --build . | /src/wabt | address | ================= Bug Report (1/1) ==================
## Source: GitHub Issue
## URL: https://github.com/WebAssembly/wabt/issues/1982
## Description:
Issue: WebAssembly/wabt#1982
Title: Out-of-bound read in OnReturnCallExpr->GetReturnCallDropKeepCount
State: closed
Created by: Q1IQ
Created at: 2022-09-05 12:50:49+00:00... | [
{
"content": "// Copyright 2019 Google LLC\n//\n// Licensed under the Apache License, Version 2.0 (the \"License\");\n// you may not use this file except in compliance with the License.\n// You may obtain a copy of the License at\n//\n// http://www.apache.org/licenses/LICENSE-2.0\n//\n// Unless required by... | [
{
"sha": "3054d61f703d609995798f872fc86b462617c294",
"url": "https://github.com/webassembly/wabt/commit/3054d61f703d609995798f872fc86b462617c294"
},
{
"sha": "424f1fec10749568b15ca598b01e7259eec50af7",
"url": "https://github.com/WebAssembly/wabt/commit/424f1fec10749568b15ca598b01e7259eec50af7"
... |
exiv2.cve-2017-14863 | exiv2/exiv2 | fa449a4d2c58d63f0d75ff259f25683a98a44630 | 2017-04-26T14:16:21 | exiv2 | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y cmake make ccache python3 libexpat1-dev zlib1g-dev libssh-dev libcurl4-openssl-dev libxml2-utils
RUN git clone https://github.com/exiv2/exiv2 exiv2
RUN git -C exiv2 checkout fa449a4d2c58d63f0d75ff259f25683a98a44630
WORKDIR $SRC/exiv2
COPY build.sh... | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
mkdir -p build
cd build
cmake -DEXIV2_ENABLE_PNG=ON -DEXIV2_ENABLE_WEBREADY=ON -DEXIV2_ENABLE_CURL=OFF -DEXIV2_ENABLE_BMFF=ON -DEXIV2_TEAM_WARNINGS_AS_ERRORS=ON -DBUILD_SHARED_LIBS=OFF -DCMAKE_CXX_COMPILER="${CXX}" -DCMAKE_CXX_FLAGS="${CXXFL... | /src/exiv2 | address | ================= Bug Report (1/1) ==================
## Source: Red Hat Bugzilla
## URL: https://bugzilla.redhat.com/show_bug.cgi?id=1494443
## Description:
Bugzilla ID: 1494443
Title: Null pointer dereference vulnerability in Exiv2::Image::printIFDStructure (image.cpp:408)
Description
Liu Zhu 2017-09-22 09:31:08 UTC... | [] | [
{
"sha": "74cb5bab132ed76adf15df172c5e8b58cddaa96c",
"url": null
},
{
"sha": "6e3855aed7ba8bb4731fc4087ca7f9078b2f3d97",
"url": null
},
{
"sha": "8a8f60a4e7089fe7bb597770a2daab24a3941d3e",
"url": null
},
{
"sha": "269f73090256617e2b9f07ccdbd0843b7f8051f1",
"url": "https:/... |
openjpeg.cve-2020-27814 | uclouvain/openjpeg | a335b4d008359a32656026fa6780ef185b35cf0a | 2020-12-28T14:49:48 | openjpeg | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y make cmake g++
RUN git clone https://github.com/uclouvain/openjpeg openjpeg
RUN git -C openjpeg checkout a335b4d008359a32656026fa6780ef185b35cf0a
WORKDIR $SRC/openjpeg
COPY build.sh $SRC/ | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
mkdir -p build
cd build
cmake ..
make clean -s -j$(nproc)
make -j$(nproc) -s | /src/openjpeg | address | ================= Bug Report (1/2) ==================
## Source: GitHub Issue
## URL: https://github.com/uclouvain/openjpeg/issues/1283
## Description:
Issue: uclouvain/openjpeg#1283
Title: Heap-buffer-overflow in lib/openjp2/mqc.c:499
State: closed
Created by: zodf0055980
Created at: 2020-11-23 10:08:15+00:00
Issue B... | [] | [
{
"sha": "491299eb073c80602ca8ee333303a31a581d3fa8",
"url": "https://github.com/uclouvain/openjpeg/commit/491299eb073c80602ca8ee333303a31a581d3fa8"
},
{
"sha": "eaa098b59b346cb88e4d10d505061f669d7134fc",
"url": "https://github.com/uclouvain/openjpeg/commit/eaa098b59b346cb88e4d10d505061f669d7134f... |
libgd.cve-2016-6214 | libgd/libgd | e6399f5a470f50285cef173e438638ae5bc741e0 | 2016-07-12T09:33:12 | libgd | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y make autoconf automake libtool pkg-config libz-dev
RUN apt-get install -y make autoconf automake libtool pkg-config libz-dev
RUN git clone https://github.com/libgd/libgd libgd
RUN git -C libgd checkout e6399f5a470f50285cef173e438638ae5bc741e0
WORK... | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
./bootstrap.sh
./configure --prefix="$WORK" --disable-shared
make -j$(nproc) install | /src/libgd | address | ================= Bug Report (1/1) ==================
## Source: GitHub Issue
## URL: https://github.com/libgd/libgd/issues/247#issuecomment-232084241
## Description:
Issue: libgd/libgd#247
Title: [CVE-2016-6132]: A read out-of-bands was found in the parsing of TGA files
Referenced comment by gaa-cifasis on 2016-07-12 ... | [
{
"content": "// Copyright 2018 Google Inc.\n//\n// Licensed under the Apache License, Version 2.0 (the \"License\");\n// you may not use this file except in compliance with the License.\n// You may obtain a copy of the License at\n//\n// http://www.apache.org/licenses/LICENSE-2.0\n//\n// Unless required b... | [
{
"sha": "10ef1dca63d62433fda13309b4a228782db823f7",
"url": "https://github.com/libgd/libgd/commit/10ef1dca63d62433fda13309b4a228782db823f7"
},
{
"sha": "a6a0e7feabb2a9738086a5dc96348f233c87fa79",
"url": "https://github.com/libgd/libgd/commit/a6a0e7feabb2a9738086a5dc96348f233c87fa79"
},
{
... |
yara.cve-2017-8294 | virustotal/yara | f12262c21f0c98fec0647de0c3e76c0c55961d78 | 2017-04-27T02:34:34 | yara | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y automake autoconf make libtool pkg-config bison flex
RUN git clone https://github.com/virustotal/yara yara
RUN git -C yara checkout f12262c21f0c98fec0647de0c3e76c0c55961d78
WORKDIR $SRC/yara
COPY build.sh $SRC/ | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
./bootstrap.sh
./configure --enable-macho --enable-debug --enable-dex --enable-dotnet --without-crypto
make clean -j$(nproc)
make -j$(nproc) all
make install -j$(nproc) | /src/yara | address | ================= Bug Report (1/1) ==================
## Source: GitHub Issue
## URL: https://github.com/VirusTotal/yara/issues/646
## Description:
Issue: VirusTotal/yara#646
Title: Out of bounds read in yr_re_exec()
State: closed
Created by: fumfel
Created at: 2017-04-26 05:33:55+00:00
Issue Body:
**Out of bounds rea... | [] | [
{
"sha": "83d799804648c2a0895d40a19835d9b757c6fa4e",
"url": "https://github.com/VirusTotal/yara/commit/83d799804648c2a0895d40a19835d9b757c6fa4e"
},
{
"sha": "dac45955053e3650f9407e4bc50482bf025fb15e",
"url": "https://github.com/virustotal/yara/commit/dac45955053e3650f9407e4bc50482bf025fb15e"
}... |
imagemagick.cve-2018-5246 | imagemagick/imagemagick | c9d4c4ecd1f7fb5168e512a0ba183b4bf8b47ce3 | 2017-12-27T09:12:40 | imagemagick | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y make autoconf automake libtool
RUN git clone https://github.com/imagemagick/imagemagick imagemagick
RUN git -C imagemagick checkout c9d4c4ecd1f7fb5168e512a0ba183b4bf8b47ce3
WORKDIR $SRC/imagemagick
COPY build.sh $SRC/ | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
./configure --prefix="$WORK" --disable-shared --disable-docs
make "-j$(nproc)"
make install -j$(nproc) | /src/imagemagick | address | ================= Bug Report (1/1) ==================
## Source: GitHub Issue
## URL: https://github.com/ImageMagick/ImageMagick/issues/929
## Description:
Issue: ImageMagick/ImageMagick#929
Title: memory leaks
State: closed
Created by: littleputa
Created at: 2018-01-04 01:33:05+00:00
Labels: bug
Issue Body:
ubuntu@ub... | [
{
"content": "#include <cstdint>\n\n#include <Magick++/Blob.h>\n#include <Magick++/Image.h>\n\nextern \"C\" int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) {\n uint16_t Width;\n uint16_t Height;\n if (Size < (sizeof(Width) + sizeof(Height))) {\n return 0;\n }\n Width = *reinterpret_cast<con... | [
{
"sha": "1c3dd700bbb17837ee6f540aff3eafc76262accf",
"url": "https://github.com/ImageMagick/ImageMagick/commit/1c3dd700bbb17837ee6f540aff3eafc76262accf"
},
{
"sha": "e59dc85e6ce58fd7618c3680b2a8def62050582f",
"url": "https://github.com/ImageMagick/ImageMagick/commit/e59dc85e6ce58fd7618c3680b2a8d... |
libredwg.cve-2021-39522 | libredwg/libredwg | aee0ea1f52ef9603b981362c83b3fec324ebb199 | 2020-07-30T12:58:51 | libredwg | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y autoconf libtool texinfo
RUN git clone https://github.com/libredwg/libredwg libredwg
RUN git -C libredwg checkout aee0ea1f52ef9603b981362c83b3fec324ebb199
WORKDIR $SRC/libredwg
COPY build.sh $SRC/ | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
sh ./autogen.sh
./configure --disable-shared
make -j$(nproc) | /src/libredwg | address | ================= Bug Report (1/1) ==================
## Source: GitHub Issue
## URL: https://github.com/LibreDWG/libredwg/issues/255
## Description:
Issue: LibreDWG/libredwg#255
Title: A heap buffer overflow in bit_wcs2len at bits.c:1634
State: closed
Created by: seviezhou
Created at: 2020-07-31 12:13:06+00:00
Labels:... | [
{
"content": "[libfuzzer]\ndetect_leaks=0\n",
"filename": "fuzz_dwg_decode.options"
}
] | [
{
"sha": "aee0ea1f52ef9603b981362c83b3fec324ebb199",
"url": "https://github.com/LibreDWG/libredwg/commit/aee0ea1f52ef9603b981362c83b3fec324ebb199"
},
{
"sha": "4b99edb0ea26e99ef65c5fe68670e6b1f9382d44",
"url": "https://github.com/LibreDWG/libredwg/commit/4b99edb0ea26e99ef65c5fe68670e6b1f9382d44"... |
libgd.cve-2016-6905 | libgd/libgd | 2ea5232bfd021f85933385a1ad5a88e114fdcf80 | 2016-07-14T03:51:02 | libgd | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y make autoconf automake libtool pkg-config libz-dev
RUN apt-get install -y make autoconf automake libtool pkg-config libz-dev
RUN git clone https://github.com/libgd/libgd libgd
RUN git -C libgd checkout 2ea5232bfd021f85933385a1ad5a88e114fdcf80
WORK... | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
./bootstrap.sh
./configure --prefix="$WORK" --disable-shared
make -j$(nproc) install | /src/libgd | address | ================= Bug Report (1/1) ==================
## Source: GitHub Issue
## URL: https://github.com/libgd/libgd/issues/248
## Description:
Issue: libgd/libgd#248
Title: Out-Of-Bounds Read in function read_image_tga of gd_tga.c (CVE-2016-6905)
State: closed
Created by: trylab
Created at: 2016-07-05 04:45:01+00:00
L... | [
{
"content": "// Copyright 2018 Google Inc.\n//\n// Licensed under the Apache License, Version 2.0 (the \"License\");\n// you may not use this file except in compliance with the License.\n// You may obtain a copy of the License at\n//\n// http://www.apache.org/licenses/LICENSE-2.0\n//\n// Unless required b... | [
{
"sha": "01c61f8ab110a77ae64b5ca67c244c728c506f03",
"url": "https://github.com/libgd/libgd/commit/01c61f8ab110a77ae64b5ca67c244c728c506f03"
},
{
"sha": "3c2b605d72e8b080dace1d98a6e50b46c1d12186",
"url": "https://github.com/libgd/libgd/commit/3c2b605d72e8b080dace1d98a6e50b46c1d12186"
},
{
... |
faad2.cve-2023-38857 | knik0/faad2 | 3918dee56063500d0aa23d6c3c94b211ac471a8c | 2022-10-20T14:59:26 | faad2 | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y make autoconf automake libtool
RUN git clone https://github.com/knik0/faad2 faad2
RUN git -C faad2 checkout 3918dee56063500d0aa23d6c3c94b211ac471a8c
WORKDIR $SRC/faad2
COPY build.sh $SRC/ | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
./bootstrap
./configure
make -j$(nproc) | /src/faad2 | address | ================= Bug Report (1/1) ==================
## Source: GitHub Issue
## URL: https://github.com/knik0/faad2/issues/171
## Description:
Issue: knik0/faad2#171
Title: A heap-buffer-overflow vulnerability found in mp4read.c:449:63
State: closed
Created by: mondaylord
Created at: 2023-07-18 04:19:21+00:00
Issue B... | [] | [
{
"sha": "1d539788397713968d9660fe9f4e68af526bab73",
"url": "https://github.com/knik0/faad2/commit/1d539788397713968d9660fe9f4e68af526bab73"
},
{
"sha": "c8f36e7d779d6ac34a902873975163c1c7793382",
"url": "https://github.com/knik0/faad2/commit/c8f36e7d779d6ac34a902873975163c1c7793382"
},
{
... |
libxls.cve-2023-38851 | libxls/libxls | 448240067919707eb95fb009f76f3fdb439b1427 | 2021-01-03T22:31:47 | libxls | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y make autoconf autoconf-archive automake gettext libtool
RUN git clone https://github.com/libxls/libxls libxls
RUN git -C libxls checkout 448240067919707eb95fb009f76f3fdb439b1427
WORKDIR $SRC/libxls
COPY build.sh $SRC/ | # Minimized build script with only core build commands
set -eu
./bootstrap
./configure --enable-static
make clean -j$(nproc)
make -j$(nproc)
make fuzz_xls -j$(nproc) | /src/libxls | address | ================= Bug Report (1/1) ==================
## Source: GitHub Issue
## URL: https://github.com/libxls/libxls/issues/124
## Description:
Issue: libxls/libxls#124
Title: There are multiple heap-buffer-overflow vulnerability found in libxls
State: closed
Created by: mondaylord
Created at: 2023-07-13 06:31:34+00:... | [] | [
{
"sha": "8b025da4c5073b3038257e1c5d2dd3c704bb1e00",
"url": "https://github.com/gaborcsardi/libxls/commit/8b025da4c5073b3038257e1c5d2dd3c704bb1e00"
},
{
"sha": "c009fa87fc775f8cc63e85d2018223143cb200e6",
"url": "https://github.com/libxls/libxls/commit/c009fa87fc775f8cc63e85d2018223143cb200e6"
... |
openjpeg.cve-2019-6988 | uclouvain/openjpeg | 081de4b15f54cb4482035b7bf5e3fb443e4bc84b | 2017-10-04T17:23:14 | openjpeg | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y make cmake g++
RUN git clone https://github.com/uclouvain/openjpeg openjpeg
RUN git -C openjpeg checkout 081de4b15f54cb4482035b7bf5e3fb443e4bc84b
WORKDIR $SRC/openjpeg
COPY build.sh $SRC/ | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
mkdir -p build
cd build
cmake ..
make clean -s -j$(nproc)
make -j$(nproc) -s | /src/openjpeg | address | ================= Bug Report (1/1) ==================
## Source: GitHub Issue
## URL: https://github.com/uclouvain/openjpeg/issues/1178
## Description:
Issue: uclouvain/openjpeg#1178
Title: memory exhauted and hangs long time when use 64bit opj_decompress (CVE-2019-6988)
State: open
Created by: yanxxd
Created at: 2019-... | [] | [
{
"sha": "51f097e6d5754ddae93e716276fe8176b44ec548",
"url": "https://github.com/uclouvain/openjpeg/commit/51f097e6d5754ddae93e716276fe8176b44ec548"
},
{
"sha": "563ecfb55ca77c0fc5ea19e4885e00f55ec82ca9",
"url": "https://github.com/uclouvain/openjpeg/commit/563ecfb55ca77c0fc5ea19e4885e00f55ec82ca... |
gpac.cve-2022-43254 | gpac/gpac | 65430e30593bb04579445e77df0a1207adfad357 | 2022-12-19T09:13:04 | gpac | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y build-essential pkg-config libz-dev
RUN git clone https://github.com/gpac/gpac gpac
RUN git -C gpac checkout 65430e30593bb04579445e77df0a1207adfad357
WORKDIR $SRC/gpac
COPY build.sh $SRC/ | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
./configure --static-build --extra-cflags="${CFLAGS}" --extra-ldflags="${CFLAGS}"
make -j$(nproc) | /src/gpac | address | ================= Bug Report (1/1) ==================
## Source: GitHub Issue
## URL: https://github.com/gpac/gpac/issues/2284
## Description:
Issue: gpac/gpac#2284
Title: Memory Leak in gf_list_new utils/list.c:601
State: closed
Created by: fdu-sec
Created at: 2022-10-11 07:44:42+00:00
Issue Body:
### Description
Mem... | [] | [
{
"sha": "4520e38aa030f059264c69b426bd8133206fbfe6",
"url": "https://github.com/gpac/gpac/commit/4520e38aa030f059264c69b426bd8133206fbfe6"
}
] |
gpac.cve-2019-20168 | gpac/gpac | ed4ec31ea84a1a94abb17669db33f5c4e7a679cf | 2020-06-15T05:33:03 | gpac | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y build-essential pkg-config libz-dev
RUN git clone https://github.com/gpac/gpac gpac
RUN git -C gpac checkout ed4ec31ea84a1a94abb17669db33f5c4e7a679cf
WORKDIR $SRC/gpac
COPY build.sh $SRC/ | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
./configure --static-build --extra-cflags="${CFLAGS}" --extra-ldflags="${CFLAGS}"
make -j$(nproc) | /src/gpac | address | ================= Bug Report (1/1) ==================
## Source: GitHub Issue
## URL: https://github.com/gpac/gpac/issues/1333
## Description:
Issue: gpac/gpac#1333
Title: AddressSanitizer: heap-use-after-free in gf_isom_box_dump_ex isomedia/box_funcs.c:1734
State: closed
Created by: Clingto
Created at: 2019-11-09 11:2... | [
{
"content": "/* Copyright 2021 Google LLC\nLicensed under the Apache License, Version 2.0 (the \"License\");\nyou may not use this file except in compliance with the License.\nYou may obtain a copy of the License at\n http://www.apache.org/licenses/LICENSE-2.0\nUnless required by applicable law or agreed ... | [
{
"sha": "00dfc93369329f1f549567d1b157566217bbfae0",
"url": "https://github.com/gpac/gpac/commit/00dfc93369329f1f549567d1b157566217bbfae0"
},
{
"sha": "5250afecbc770c8f26829e9566d5b226a3c5fa80",
"url": "https://github.com/gpac/gpac/commit/5250afecbc770c8f26829e9566d5b226a3c5fa80"
}
] |
imagemagick.cve-2019-13300 | imagemagick/imagemagick | 93b0af34ba1e43886018225d07f78170ecb192ea | 2019-06-16T12:40:35 | imagemagick | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y make autoconf automake libtool pkg-config cmake nasm autopoint
RUN git clone https://github.com/imagemagick/imagemagick imagemagick
RUN git -C imagemagick checkout 93b0af34ba1e43886018225d07f78170ecb192ea
WORKDIR $SRC/imagemagick
COPY build.sh $SR... | #!/bin/bash
# Default build script template for C/C++ projects
set -eu
# Define configuration options
CONFIG_OPTS="--disable-shared"
CMAKE_OPTS="-DCMAKE_BUILD_TYPE=Debug"
MAKE_OPTS="-j$(nproc)"
BUILD_DIR="build"
# 1. Run build preparation scripts if they exist
for prep_script in buildconf autogen.sh bootstrap; do
i... | /src/imagemagick | address | ================= Bug Report (1/1) ==================
## Source: GitHub Issue
## URL: https://github.com/ImageMagick/ImageMagick/issues/1586
## Description:
Issue: ImageMagick/ImageMagick#1586
Title: heap-buffer-overflow in MagickCore/statistic.c
State: closed
Created by: SuhwanSong
Created at: 2019-06-10 15:57:48+00:0... | [] | [
{
"sha": "a906fe9298bf89e01d5272023db687935068849a",
"url": "https://github.com/ImageMagick/ImageMagick/commit/a906fe9298bf89e01d5272023db687935068849a"
},
{
"sha": "5e409ae7a389cdf2ed17469303be3f3f21cec450",
"url": "https://github.com/ImageMagick/ImageMagick6/commit/5e409ae7a389cdf2ed17469303be... |
upx.cve-2023-23456 | upx/upx | 741cb3a136cc5158f2d8d7fa87fe238c315b9e0d | 2022-11-26T12:12:26 | upx | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y make autoconf automake libtool cmake
RUN git clone https://github.com/upx/upx upx
RUN git -C upx checkout 741cb3a136cc5158f2d8d7fa87fe238c315b9e0d
WORKDIR $SRC/upx
COPY build.sh $SRC/ | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
sed -i 's/ \&\& __clang_major__ < 15//m' /src/upx/src/util/util.cpp
mkdir -p build/debug
cd build/debug
cmake ../..
cmake --build . --target $fuzz_basename -v | /src/upx | address | ================= Bug Report (1/2) ==================
## Source: GitHub Issue
## URL: https://github.com/upx/upx/issues/632
## Description:
Issue: upx/upx#632
Title: heap-buffer-overflow in PackTmt::pack
State: closed
Created by: MaggieCwj
Created at: 2022-11-24 06:26:03+00:00
Issue Body:
<!---
IF YOU REMOVE THIS TEM... | [] | [
{
"sha": "510505a85cbe45e51fbd470f1aa8b02157c429d4",
"url": "https://github.com/upx/upx/commit/510505a85cbe45e51fbd470f1aa8b02157c429d4"
},
{
"sha": "3e6e17980af856f71ab213cdefeb8ba8fd487eea",
"url": "https://github.com/upx/upx/commit/3e6e17980af856f71ab213cdefeb8ba8fd487eea"
}
] |
wolfssl.cve-2019-16748 | wolfssl/wolfssl | 50fbdb961fd8c2d8123064e567ae8ec44167732d | 2019-07-23T13:03:29 | wolfssl | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y make autoconf automake libtool zip
RUN git clone https://github.com/wolfssl/wolfssl wolfssl
RUN git -C wolfssl checkout 50fbdb961fd8c2d8123064e567ae8ec44167732d
WORKDIR $SRC/wolfssl
COPY build.sh $SRC/ | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
./autogen.sh
./configure --enable-static --disable-shared --prefix=/usr CC="clang"
make -j "$(nproc)" all -j$(nproc)
make install -j$(nproc)
export LDFLAGS="${LDFLAGS-""}"
make -e all -j$(nproc)
make -e export prefix="$OUT" -j$(nproc) | /src/wolfssl | address | ================= Bug Report (1/1) ==================
## Source: GitHub Issue
## URL: https://github.com/wolfSSL/wolfssl/issues/2459
## Description:
Issue: wolfSSL/wolfssl#2459
Title: Heap-overread bug in checking cert signature
State: closed
Created by: flyroom
Created at: 2019-09-10 10:29:02+00:00
Labels: bug, Resolv... | [] | [
{
"sha": "326f02d76db7d4317688556e8bb51c72c5cbe00c",
"url": "https://github.com/wolfSSL/wolfssl/commit/326f02d76db7d4317688556e8bb51c72c5cbe00c"
}
] |
libredwg.cve-2020-21827 | libredwg/libredwg | d5a51c01023d5585ddf3dd17c83dbb3c81efc97e | 2020-01-08T08:16:22 | libredwg | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y autoconf libtool texinfo
RUN git clone https://github.com/libredwg/libredwg libredwg
RUN git -C libredwg checkout d5a51c01023d5585ddf3dd17c83dbb3c81efc97e
WORKDIR $SRC/libredwg
COPY build.sh $SRC/ | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
sh ./autogen.sh
./configure --disable-shared
make -j$(nproc) | /src/libredwg | address | ================= Bug Report (1/1) ==================
## Source: GitHub Issue
## URL: https://github.com/LibreDWG/libredwg/issues/183
## Description:
Issue: LibreDWG/libredwg#183
Title: Heap over flow
State: closed
Created by: linhlhq
Created at: 2020-01-13 02:49:42+00:00
Labels: bug, fuzzing
Issue Body:
I found a bug... | [
{
"content": "[libfuzzer]\ndetect_leaks=0\n",
"filename": "fuzz_dwg_decode.options"
}
] | [
{
"sha": "bcec483e73819af29787d5ed87fc515e1dfd0411",
"url": "https://github.com/libredwg/libredwg/commit/bcec483e73819af29787d5ed87fc515e1dfd0411"
}
] |
mruby.cve-2022-1212 | mruby/mruby | 8aec568fc50c23f4062153fbc75b423ba22219e9 | 2022-04-03T04:39:40 | mruby | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y build-essential ruby bison ninja-build cmake zlib1g-dev libbz2-dev liblzma-dev
RUN git clone https://github.com/mruby/mruby mruby
RUN git -C mruby checkout 8aec568fc50c23f4062153fbc75b423ba22219e9
WORKDIR $SRC/mruby
COPY build.sh $SRC/ | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
cd $SRC/mruby
export LD=$CC
export LDFLAGS="$CFLAGS"
rake -m | /src/mruby | address | ================= Bug Report (1/1) ==================
## Source: Huntr
## URL: https://huntr.dev/bounties/9fcc06d0-08e4-49c8-afda-2cae40946abe
## Description:
Affected commit:
60cf382ff9765e36b21143d79688a3e758b66fd4
Proof of Concept
v11 = '1111111111111111111111111111'
v17 = {1=>1, 2 => 'b' , '3' => 1}
v20 = []
[1,2,... | [] | [
{
"sha": "9fcc06d0",
"url": null
},
{
"sha": "3cf291f72224715942beaf8553e42ba8891ab3c6",
"url": "https://github.com/mruby/mruby/commit/3cf291f72224715942beaf8553e42ba8891ab3c6"
},
{
"sha": "60cf382ff9765e36b21143d79688a3e758b66fd4",
"url": "https://github.com/mruby/mruby/commit/60cf3... |
upx.cve-2020-27797 | upx/upx | 69ca635c4c0ba474e9ca583dbb42e3d028c4533a | 2022-10-28T03:38:03 | upx | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y make autoconf automake libtool cmake
RUN git clone https://github.com/upx/upx upx
RUN git -C upx checkout 69ca635c4c0ba474e9ca583dbb42e3d028c4533a
WORKDIR $SRC/upx
COPY build.sh $SRC/ | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
sed -i 's/ \&\& __clang_major__ < 15//m' /src/upx/src/util/util.cpp
mkdir -p build/debug
cd build/debug
cmake ../..
cmake --build . --target $fuzz_basename -v | /src/upx | address | ================= Bug Report (1/1) ==================
## Source: GitHub Issue
## URL: https://github.com/upx/upx/issues/390
## Description:
Issue: upx/upx#390
Title: Segmentation fault in PackLinuxElf32::elf_lookup(char const*) of /src/p_lx_elf.cpp
State: closed
Created by: giantbranch
Created at: 2020-07-23 08:06:10+... | [] | [
{
"sha": "87b73e5cfdc12da94c251b2cd83bb01c7d9f616c",
"url": "https://github.com/upx/upx/commit/87b73e5cfdc12da94c251b2cd83bb01c7d9f616c"
},
{
"sha": "7d093174597483053e95f07d9f4614024c09890e",
"url": "https://github.com/upx/upx/commit/7d093174597483053e95f07d9f4614024c09890e"
},
{
"sha":... |
w3m.cve-2023-38252 | tats/w3m | c8223fed7cc631ad85d8e5665e509e7988bedbab | 2023-01-20T20:01:52 | w3m | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y libgc-dev
RUN git clone https://github.com/tats/w3m w3m
RUN git -C w3m checkout c8223fed7cc631ad85d8e5665e509e7988bedbab
WORKDIR $SRC/w3m
COPY build.sh $SRC/ | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
./configure
make myctype.o -j$(nproc)
make Str.o -j$(nproc)
make libwc -j$(nproc) | /src/w3m | address | ================= Bug Report (1/2) ==================
## Source: GitHub Issue
## URL: https://github.com/tats/w3m/issues/270
## Description:
Issue: tats/w3m#270
Title: [BUG] Out of bound read in Strnew_size , Str.c:61
State: closed
Created by: iskindar
Created at: 2023-06-29 11:40:21+00:00
Issue Body:
Hello, I found a... | [] | [
{
"sha": "93ad5ee7da3bb3b6848434f0940321f345b7369c",
"url": "https://github.com/tats/w3m/commit/93ad5ee7da3bb3b6848434f0940321f345b7369c"
},
{
"sha": "419ca82d57c72242817b55e2eaa4cdbf6916e7fa",
"url": "https://github.com/tats/w3m/commit/419ca82d57c72242817b55e2eaa4cdbf6916e7fa"
},
{
"sha... |
gpac.cve-2020-23931 | gpac/gpac | 348365dd176f4b03e607aaafce39674a4a0c8165 | 2020-09-01T08:47:25 | gpac | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y build-essential pkg-config libz-dev
RUN git clone https://github.com/gpac/gpac gpac
RUN git -C gpac checkout 348365dd176f4b03e607aaafce39674a4a0c8165
WORKDIR $SRC/gpac
COPY build.sh $SRC/ | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
./configure --static-build --extra-cflags="${CFLAGS}" --extra-ldflags="${CFLAGS}"
make -j$(nproc) | /src/gpac | address | ================= Bug Report (1/2) ==================
## Source: GitHub Issue
## URL: https://github.com/gpac/gpac/issues/1564
## Description:
Issue: gpac/gpac#1564
Title: A heap-buffer-overflow in box_code_adobe.c:109
State: closed
Created by: seviezhou
Created at: 2020-08-07 01:48:18+00:00
Issue Body:
## System info... | [
{
"content": "/* Copyright 2021 Google LLC\nLicensed under the Apache License, Version 2.0 (the \"License\");\nyou may not use this file except in compliance with the License.\nYou may obtain a copy of the License at\n http://www.apache.org/licenses/LICENSE-2.0\nUnless required by applicable law or agreed ... | [
{
"sha": "093283e727f396130651280609e687cd4778e0d1",
"url": "https://github.com/gpac/gpac/commit/093283e727f396130651280609e687cd4778e0d1"
},
{
"sha": "2aa266dfaab6aaad9f9f4f216ad7d1e62adc7fa0",
"url": "https://github.com/gpac/gpac/commit/2aa266dfaab6aaad9f9f4f216ad7d1e62adc7fa0"
}
] |
llamacpp.cve-2024-42477 | ggerganov/llama.cpp | 6afd1a99dc9792096d4567ab9fa1ad530c81c6cd | 2024-08-09T11:53:09 | llama.cpp | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y make autoconf automake xxd
RUN git clone https://github.com/ggerganov/llama.cpp llama.cpp
RUN git -C llama.cpp checkout 6afd1a99dc9792096d4567ab9fa1ad530c81c6cd
WORKDIR $SRC/llama.cpp
COPY build.sh $SRC/ | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
export GGML_NO_OPENMP=1
sed -i 's/:= c++/:= ${CXX}/g' ./Makefile
sed -i 's/:= cc/:= ${CC}/g' ./Makefile
sed -i 's/ggml_print_backtrace();//g' ./ggml/src/ggml.c
sed -i 's/static bool is_first_call/bool is_first_call/g' ./ggml/src/ggml.c
FLAGS... | /src/llama.cpp | address | ================= Bug Report (1/1) ==================
## Source: GitHub Advisory
## URL: https://github.com/ggerganov/llama.cpp/security/advisories/GHSA-mqp6-7pv6-fqjf
## Description:
Advisory ID: GHSA-mqp6-7pv6-fqjf
Title: global-buffer-overflow in ggml_type_size
Description:
global-buffer-overflow in ggml_type_size
... | [] | [
{
"sha": "b72942fac998672a79a1ae3c03b340f7e629980b",
"url": "https://github.com/ggerganov/llama.cpp/commit/b72942fac998672a79a1ae3c03b340f7e629980b"
}
] |
gpac.cve-2021-36417 | gpac/gpac | d8538e8ae946b32d99c6b2c57cbb327146e9cd9d | 2020-09-10T11:38:49 | gpac | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y build-essential pkg-config libz-dev
RUN git clone https://github.com/gpac/gpac gpac
RUN git -C gpac checkout d8538e8ae946b32d99c6b2c57cbb327146e9cd9d
WORKDIR $SRC/gpac
COPY build.sh $SRC/ | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
./configure --static-build --extra-cflags="${CFLAGS}" --extra-ldflags="${CFLAGS}"
make -j$(nproc) | /src/gpac | address | ================= Bug Report (1/1) ==================
## Source: GitHub Issue
## URL: https://github.com/gpac/gpac/issues/1846
## Description:
Issue: gpac/gpac#1846
Title: A heap-buffer-overflow has occurred in function gf_isom_dovi_config_get
State: closed
Created by: dhbbb
Created at: 2021-07-07 03:09:17+00:00
Issue... | [
{
"content": "/* Copyright 2021 Google LLC\nLicensed under the Apache License, Version 2.0 (the \"License\");\nyou may not use this file except in compliance with the License.\nYou may obtain a copy of the License at\n http://www.apache.org/licenses/LICENSE-2.0\nUnless required by applicable law or agreed ... | [
{
"sha": "737e1f39da80e02912953269966d89afd196ad30",
"url": "https://github.com/gpac/gpac/commit/737e1f39da80e02912953269966d89afd196ad30"
},
{
"sha": "fef6242c69be4f7ba22b32578e4b62648a3d4ed3",
"url": "https://github.com/gpac/gpac/commit/fef6242c69be4f7ba22b32578e4b62648a3d4ed3"
}
] |
upx.cve-2020-27787 | upx/upx | 1bb93d4fce9f1d764ba57bf5ac154af515b3fc83 | 2020-01-13T19:26:31 | upx | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y make autoconf automake libtool cmake
RUN git clone https://github.com/upx/upx upx
RUN git -C upx checkout 1bb93d4fce9f1d764ba57bf5ac154af515b3fc83
WORKDIR $SRC/upx
COPY build.sh $SRC/ | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
sed -i 's/ \&\& __clang_major__ < 15//m' /src/upx/src/util/util.cpp
mkdir -p build/debug
cd build/debug
cmake ../..
cmake --build . --target $fuzz_basename -v | /src/upx | address | ================= Bug Report (1/1) ==================
## Source: GitHub Issue
## URL: https://github.com/upx/upx/issues/333
## Description:
Issue: upx/upx#333
Title: Segmentation fault in PackLinuxElf64::invert_pt_dynamic at p_lx_elf.cpp:5173
State: closed
Created by: cxy20103657
Created at: 2020-01-14 07:02:22+00:00
... | [] | [
{
"sha": "e2f60adc95334f47e286838dac33160819c5d74d",
"url": "https://github.com/upx/upx/commit/e2f60adc95334f47e286838dac33160819c5d74d"
}
] |
gpac.cve-2023-5520 | gpac/gpac | 28c4eb149f133ac42e95ef69d82183a917e7dbad | 2023-10-11T05:51:42 | gpac | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y build-essential pkg-config libz-dev
RUN git clone https://github.com/gpac/gpac gpac
RUN git -C gpac checkout 28c4eb149f133ac42e95ef69d82183a917e7dbad
WORKDIR $SRC/gpac
COPY build.sh $SRC/ | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
./configure --static-build --extra-cflags="${CFLAGS}" --extra-ldflags="${CFLAGS}"
make -j$(nproc) | /src/gpac | address | ================= Bug Report (1/1) ==================
## Source: Huntr
## URL: https://huntr.dev/bounties/681e42d0-18d4-4ebc-aba0-c5b0f77ac74a
## Description:
Environment
Distributor ID: Debian
Description: Debian GNU/Linux bookworm/sid
Version
I checked against the latest release as of 10/08/23 the current master b... | [] | [
{
"sha": "681e42d0",
"url": null
},
{
"sha": "5692dc729491805e0e5f55c21d50ba1e6b19e88e",
"url": "https://github.com/gpac/gpac/commit/5692dc729491805e0e5f55c21d50ba1e6b19e88e"
},
{
"sha": "50c2ab06f45a3101d73d6f317e98f041809f4923",
"url": "https://github.com/gpac/gpac/commit/50c2ab06f... |
gpac.cve-2024-50664 | gpac/gpac | 5d70253ac94e5840be7b86054131dd753af63cc7 | 2024-04-17T12:18:21 | gpac | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y build-essential pkg-config libz-dev
RUN git clone https://github.com/gpac/gpac gpac
RUN git -C gpac checkout 5d70253ac94e5840be7b86054131dd753af63cc7
WORKDIR $SRC/gpac
COPY build.sh $SRC/ | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
./configure --static-build --extra-cflags="${CFLAGS}" --extra-ldflags="${CFLAGS}"
make -j$(nproc) | /src/gpac | address | ================= Bug Report (1/1) ==================
## Source: GitHub Issue
## URL: https://github.com/gpac/gpac/issues/2988
## Description:
Issue: gpac/gpac#2988
Title: heap-buffer-overflow at isomedia/sample_descs.c:1799 in gf_isom_new_mpha_description in gpac/MP4Box
State: closed
Created by: Frank-Z7
Created at: 2... | [] | [
{
"sha": "56ce0b952a0a3cbd39ec1b41237df062f9648cb9",
"url": "https://github.com/Mu-L/gpac/commit/56ce0b952a0a3cbd39ec1b41237df062f9648cb9"
}
] |
openexr.cve-2020-16587 | academysoftwarefoundation/openexr | d5800c14296527b3540da7aefd28b5937158d2cc | 2019-07-24T10:20:11 | openexr | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y make autoconf automake libtool zlib1g-dev
RUN git clone https://github.com/academysoftwarefoundation/openexr openexr
RUN git -C openexr checkout d5800c14296527b3540da7aefd28b5937158d2cc
WORKDIR $SRC/openexr
COPY build.sh $SRC/ | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
cmake $SRC/openexr ${CMAKE_SETTINGS[@]}
make -j$(nproc) | /src/openexr | address | ================= Bug Report (1/1) ==================
## Source: GitHub Issue
## URL: https://github.com/AcademySoftwareFoundation/openexr/issues/491
## Description:
Issue: AcademySoftwareFoundation/openexr#491
Title: SEGV exrheader in ImfMultiPartInputFile.cpp:579
State: closed
Created by: strongcourage
Created at: 20... | [
{
"content": "// Copyright 2020 Google LLC\n//\n// Licensed under the Apache License, Version 2.0 (the \"License\");\n// you may not use this file except in compliance with the License.\n// You may obtain a copy of the License at\n//\n// http://www.apache.org/licenses/LICENSE-2.0\n//\n// Unless required by... | [
{
"sha": "8b5370c688a7362673c3a5256d93695617a4cd9a",
"url": "https://github.com/fnordware/openexr/commit/8b5370c688a7362673c3a5256d93695617a4cd9a"
},
{
"sha": "ddc5ae0437c7b205de3215d4ce8fe16848045610",
"url": "https://github.com/peterhillman/openexr/commit/ddc5ae0437c7b205de3215d4ce8fe168480456... |
gpac.cve-2020-22678 | gpac/gpac | 6b4ab401297be43b57f9eddd675971a8a5feab44 | 2019-06-27T05:20:45 | gpac | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y build-essential pkg-config libz-dev
RUN git clone https://github.com/gpac/gpac gpac
RUN git -C gpac checkout 6b4ab401297be43b57f9eddd675971a8a5feab44
WORKDIR $SRC/gpac
COPY build.sh $SRC/ | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
./configure --static-build --extra-cflags="${CFLAGS}" --extra-ldflags="${CFLAGS}"
make -j$(nproc) | /src/gpac | address | ================= Bug Report (1/1) ==================
## Source: GitHub Issue
## URL: https://github.com/gpac/gpac/issues/1339
## Description:
Issue: gpac/gpac#1339
Title: There is a heap-buffer-overflow in the gf_media_nalu_remove_emulation_bytes function of av_parsers.c:4722
State: closed
Created by: gutiniao
Created... | [
{
"content": "/* Copyright 2021 Google LLC\nLicensed under the Apache License, Version 2.0 (the \"License\");\nyou may not use this file except in compliance with the License.\nYou may obtain a copy of the License at\n http://www.apache.org/licenses/LICENSE-2.0\nUnless required by applicable law or agreed ... | [
{
"sha": "eec9e058a9486fe4e99c33021481d9e1826ca9db",
"url": "https://github.com/gpac/gpac/commit/eec9e058a9486fe4e99c33021481d9e1826ca9db"
}
] |
gpac.cve-2020-35982 | gpac/gpac | dae9900580a8888969481cd72035408091edb11b | 2021-01-04T05:04:18 | gpac | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y build-essential pkg-config libz-dev
RUN git clone https://github.com/gpac/gpac gpac
RUN git -C gpac checkout dae9900580a8888969481cd72035408091edb11b
WORKDIR $SRC/gpac
COPY build.sh $SRC/ | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
./configure --static-build --extra-cflags="${CFLAGS}" --extra-ldflags="${CFLAGS}"
make -j$(nproc) | /src/gpac | address | ================= Bug Report (1/1) ==================
## Source: GitHub Issue
## URL: https://github.com/gpac/gpac/issues/1660
## Description:
Issue: gpac/gpac#1660
Title: A NULL pointer dereference in the function gf_hinter_track_finalize in media_tools/isom_hinter.c:970
State: closed
Created by: Clingto
Created at: ... | [
{
"content": "/* Copyright 2021 Google LLC\nLicensed under the Apache License, Version 2.0 (the \"License\");\nyou may not use this file except in compliance with the License.\nYou may obtain a copy of the License at\n http://www.apache.org/licenses/LICENSE-2.0\nUnless required by applicable law or agreed ... | [
{
"sha": "a4eb327049132359cae54b59faec9e2f14c5a619",
"url": "https://github.com/gpac/gpac/commit/a4eb327049132359cae54b59faec9e2f14c5a619"
}
] |
libredwg.cve-2020-6612 | libredwg/libredwg | 722bfe6f285e1d31d2a85968ad353d59443f4280 | 2020-01-02T16:01:44 | libredwg | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y autoconf libtool texinfo
RUN git clone https://github.com/libredwg/libredwg libredwg
RUN git -C libredwg checkout 722bfe6f285e1d31d2a85968ad353d59443f4280
WORKDIR $SRC/libredwg
COPY build.sh $SRC/ | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
sh ./autogen.sh
./configure --disable-shared
make -j$(nproc) | /src/libredwg | address | ================= Bug Report (1/1) ==================
## Source: GitHub Issue
## URL: https://github.com/LibreDWG/libredwg/issues/179#issuecomment-570447169
## Description:
Issue: LibreDWG/libredwg#179
Title: Several bugs found by fuzzing
Referenced comment by linhlhq on 2020-01-03 03:20:33+00:00:
**5.heap-buffer-over... | [
{
"content": "[libfuzzer]\ndetect_leaks=0\n",
"filename": "fuzz_dwg_decode.options"
}
] | [
{
"sha": "757b87f2d01127df1fa890f7a6c8608ffe9cd23e",
"url": "https://github.com/LibreDWG/libredwg/commit/757b87f2d01127df1fa890f7a6c8608ffe9cd23e"
},
{
"sha": "540e1e432f3a48e7c1048a87da32640a5ac15007",
"url": "https://github.com/LibreDWG/libredwg/commit/540e1e432f3a48e7c1048a87da32640a5ac15007"... |
libredwg.cve-2020-21835 | libredwg/libredwg | d5a51c01023d5585ddf3dd17c83dbb3c81efc97e | 2020-01-08T08:16:22 | libredwg | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y autoconf libtool texinfo
RUN git clone https://github.com/libredwg/libredwg libredwg
RUN git -C libredwg checkout d5a51c01023d5585ddf3dd17c83dbb3c81efc97e
WORKDIR $SRC/libredwg
COPY build.sh $SRC/ | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
sh ./autogen.sh
./configure --disable-shared
make -j$(nproc) | /src/libredwg | address | ================= Bug Report (1/1) ==================
## Source: GitHub Issue
## URL: https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574493046
## Description:
Issue: LibreDWG/libredwg#188
Title: Several bugs found by fuzzing
Referenced comment by linhlhq on 2020-01-15 04:41:13+00:00:
**7.NULL pointer der... | [
{
"content": "[libfuzzer]\ndetect_leaks=0\n",
"filename": "fuzz_dwg_decode.options"
}
] | [
{
"sha": "6757b07c65742277ae2ff5c9fe32157195726258",
"url": "https://github.com/LibreDWG/libredwg/commit/6757b07c65742277ae2ff5c9fe32157195726258"
},
{
"sha": "d447393a30df70531215e17baa609be5609c8614",
"url": "https://github.com/LibreDWG/libredwg/commit/d447393a30df70531215e17baa609be5609c8614"... |
libredwg.cve-2022-35164 | libredwg/libredwg | 89c4fa63a01e854eace1855c3d4e33f591df9d16 | 2022-05-14T14:35:09 | libredwg | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y autoconf libtool texinfo
RUN git clone https://github.com/libredwg/libredwg libredwg
RUN git -C libredwg checkout 89c4fa63a01e854eace1855c3d4e33f591df9d16
WORKDIR $SRC/libredwg
COPY build.sh $SRC/ | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
sh ./autogen.sh
./configure --disable-shared --disable-bindings --enable-release
make -j$(nproc) | /src/libredwg | address | ================= Bug Report (1/1) ==================
## Source: GitHub Issue
## URL: https://github.com/LibreDWG/libredwg/issues/497
## Description:
Issue: LibreDWG/libredwg#497
Title: Heap use-after-free still exists in the bit_copy_chain
State: closed
Created by: 0xdd96
Created at: 2022-06-17 12:04:26+00:00
Labels: ... | [
{
"content": "[libfuzzer]\ndetect_leaks=0\n",
"filename": "llvmfuzz.options"
}
] | [
{
"sha": "f2dea296a0a3bb16afdae8d2ca16749a617a4383",
"url": "https://github.com/LibreDWG/libredwg/commit/f2dea296a0a3bb16afdae8d2ca16749a617a4383"
},
{
"sha": "e95cc1eea8744c40e298208679eda14039b9b5d3",
"url": "https://github.com/LibreDWG/libredwg/commit/e95cc1eea8744c40e298208679eda14039b9b5d3"... |
libraw.cve-2017-14265 | libraw/libraw | 4d2aec21dc76bdf04e66b9dfce0a8442bb3fb375 | 2017-03-04T12:33:42 | libraw | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y make autoconf automake libtool pkg-config
RUN git clone https://github.com/libraw/libraw libraw
RUN git -C libraw checkout 4d2aec21dc76bdf04e66b9dfce0a8442bb3fb375
WORKDIR $SRC/libraw
COPY build.sh $SRC/ | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
./configure --disable-examples
make -j$(nproc) | /src/libraw | address | ================= Bug Report (1/1) ==================
## Source: GitHub Issue
## URL: https://github.com/LibRaw/LibRaw/issues/99
## Description:
Issue: LibRaw/LibRaw#99
Title: A Stack Buffer Overflow was discovered in internal/dcraw_common.cpp
State: closed
Created by: Twi1ight
Created at: 2017-09-08 09:02:39+00:00
I... | [
{
"content": "/* Copyright 2020 Google Inc.\n\nLicensed under the Apache License, Version 2.0 (the \"License\");\nyou may not use this file except in compliance with the License.\nYou may obtain a copy of the License at\n\n http://www.apache.org/licenses/LICENSE-2.0\n\nUnless required by applicable law or... | [
{
"sha": "82616eff4c7f7437e96bdeeed238c3ef3dc12d60",
"url": "https://github.com/LibRaw/LibRaw/commit/82616eff4c7f7437e96bdeeed238c3ef3dc12d60"
}
] |
openjpeg.cve-2020-8112 | uclouvain/openjpeg | 57096325457f96d8cd07bd3af04fe81d7a2ba788 | 2019-04-02T07:45:15 | openjpeg | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y make cmake g++
RUN git clone https://github.com/uclouvain/openjpeg openjpeg
RUN git -C openjpeg checkout 57096325457f96d8cd07bd3af04fe81d7a2ba788
WORKDIR $SRC/openjpeg
COPY build.sh $SRC/ | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
mkdir -p build
cd build
cmake ..
make clean -s -j$(nproc)
make -j$(nproc) -s | /src/openjpeg | address | ================= Bug Report (1/1) ==================
## Source: GitHub Issue
## URL: https://github.com/uclouvain/openjpeg/issues/1231
## Description:
Issue: uclouvain/openjpeg#1231
Title: Another heap buffer overflow in libopenjp2
State: closed
Created by: sebastianpoeplau
Created at: 2020-01-28 11:05:53+00:00
Issue... | [] | [
{
"sha": "b63a433ba168bad5fa10e83de04d6305e6a222e2",
"url": "https://github.com/uclouvain/openjpeg/commit/b63a433ba168bad5fa10e83de04d6305e6a222e2"
},
{
"sha": "05f9b91e60debda0e83977e5e63b2e66486f7074",
"url": "https://github.com/uclouvain/openjpeg/commit/05f9b91e60debda0e83977e5e63b2e66486f707... |
exiv2.cve-2018-19535 | exiv2/exiv2 | fa449a4d2c58d63f0d75ff259f25683a98a44630 | 2017-04-26T14:16:21 | exiv2 | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y cmake make ccache python3 libexpat1-dev zlib1g-dev libssh-dev libcurl4-openssl-dev libxml2-utils
RUN git clone https://github.com/exiv2/exiv2 exiv2
RUN git -C exiv2 checkout fa449a4d2c58d63f0d75ff259f25683a98a44630
WORKDIR $SRC/exiv2
COPY build.sh... | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
mkdir -p build
cd build
cmake -DEXIV2_ENABLE_PNG=ON -DEXIV2_ENABLE_WEBREADY=ON -DEXIV2_ENABLE_CURL=OFF -DEXIV2_ENABLE_BMFF=ON -DEXIV2_TEAM_WARNINGS_AS_ERRORS=ON -DBUILD_SHARED_LIBS=OFF -DCMAKE_CXX_COMPILER="${CXX}" -DCMAKE_CXX_FLAGS="${CXXFL... | /src/exiv2 | address | ================= Bug Report (1/1) ==================
## Source: GitHub Issue
## URL: https://github.com/Exiv2/exiv2/issues/428
## Description:
Issue: Exiv2/exiv2#428
Title: CVE-2018-19535: AddressSanitizer: heap-buffer-overflow at pngchunk_int.cpp:635
State: closed
Created by: hongxuchen
Created at: 2018-09-01 05:40:2... | [] | [
{
"sha": "763d86e2607e5787b1d1d6c53c688f2d2f8c9e3e",
"url": "https://github.com/Exiv2/exiv2/commit/763d86e2607e5787b1d1d6c53c688f2d2f8c9e3e"
},
{
"sha": "03173751b4d7053d6ddf52a15904e8f751f78f56",
"url": "https://github.com/Exiv2/exiv2/commit/03173751b4d7053d6ddf52a15904e8f751f78f56"
},
{
... |
mruby.cve-2020-6838 | mruby/mruby | 57a56ddaa26d1bb7d67c8dde435b2e08dc17290f | 2019-11-19T03:58:11 | mruby | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y build-essential ruby bison ninja-build cmake zlib1g-dev libbz2-dev
RUN git clone https://github.com/mruby/mruby mruby
RUN git -C mruby checkout 57a56ddaa26d1bb7d67c8dde435b2e08dc17290f
WORKDIR $SRC/mruby
COPY build.sh $SRC/ | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
cd $SRC/mruby
export LD=clang
export LDFLAGS="$CFLAGS"
./minirake clean && ./minirake -j$(nproc) all | /src/mruby | address | ================= Bug Report (1/1) ==================
## Source: GitHub Issue
## URL: https://github.com/mruby/mruby/issues/4926
## Description:
Issue: mruby/mruby#4926
Title: heap use after free in hash_values_at in mrbgems/mruby-hash-ext/src/hash-ext.c:33
State: closed
Created by: sleicasper
Created at: 2020-01-10 08... | [] | [
{
"sha": "694089fafe4eae36c379a3d918d540eb0c4b8661",
"url": "https://github.com/mruby/mruby/commit/694089fafe4eae36c379a3d918d540eb0c4b8661"
},
{
"sha": "70e574689664c10ed2c47581999cc2ce3e3c5afb",
"url": "https://github.com/mruby/mruby/commit/70e574689664c10ed2c47581999cc2ce3e3c5afb"
},
{
... |
gpac.cve-2019-12481 | gpac/gpac | 440d475f133038824dab08292b2e592ecd0e10b4 | 2017-04-26T06:33:17 | gpac | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y build-essential pkg-config libz-dev
RUN git clone https://github.com/gpac/gpac gpac
RUN git -C gpac checkout 440d475f133038824dab08292b2e592ecd0e10b4
WORKDIR $SRC/gpac
COPY build.sh $SRC/ | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
./configure --static-build --extra-cflags="${CFLAGS}" --extra-ldflags="${CFLAGS}"
make -j$(nproc) | /src/gpac | address | ================= Bug Report (1/1) ==================
## Source: GitHub Issue
## URL: https://github.com/gpac/gpac/issues/1249
## Description:
Issue: gpac/gpac#1249
Title: 4 bugs found in gpac v0.7.1 release
State: closed
Created by: YourButterfly
Created at: 2019-05-27 07:11:13+00:00
Issue Body:
Thanks for reporting ... | [
{
"content": "/* Copyright 2021 Google LLC\nLicensed under the Apache License, Version 2.0 (the \"License\");\nyou may not use this file except in compliance with the License.\nYou may obtain a copy of the License at\n http://www.apache.org/licenses/LICENSE-2.0\nUnless required by applicable law or agreed ... | [
{
"sha": "f40aaaf959d4d1f7fa0dcd04c0666592e615c8f1",
"url": "https://github.com/gpac/gpac/commit/f40aaaf959d4d1f7fa0dcd04c0666592e615c8f1"
},
{
"sha": "eec9e058a9486fe4e99c33021481d9e1826ca9db",
"url": "https://github.com/gpac/gpac/commit/eec9e058a9486fe4e99c33021481d9e1826ca9db"
}
] |
faad2.cve-2021-32278 | knik0/faad2 | f97f6e933a4ee3cf00b4e1ba4e3a1f05bc9de165 | 2020-10-20T01:24:05 | faad2 | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y make autoconf automake libtool
RUN git clone https://github.com/knik0/faad2 faad2
RUN git -C faad2 checkout f97f6e933a4ee3cf00b4e1ba4e3a1f05bc9de165
WORKDIR $SRC/faad2
COPY build.sh $SRC/ | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
./bootstrap
./configure
make -j$(nproc) | /src/faad2 | address | ================= Bug Report (1/1) ==================
## Source: GitHub Issue
## URL: https://github.com/knik0/faad2/issues/62
## Description:
Issue: knik0/faad2#62
Title: A heap-buffer-overflow in lt_predict.c:108:36
State: closed
Created by: seviezhou
Created at: 2020-09-04 14:47:28+00:00
Issue Body:
## System info
... | [] | [
{
"sha": "f71b5e81f563d94fa284977a326520d269d8353e",
"url": "https://github.com/knik0/faad2/commit/f71b5e81f563d94fa284977a326520d269d8353e"
},
{
"sha": "e19a5e491354e0e4664d02b796dacee28fb2521e",
"url": "https://github.com/knik0/faad2/commit/e19a5e491354e0e4664d02b796dacee28fb2521e"
}
] |
fribidi.cve-2022-25309 | fribidi/fribidi | cffa3047a0db9f4cd391d68bf98ce7b7425be245 | 2022-02-17T02:36:08 | fribidi | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y python3-pip pkg-config && pip3 install meson==0.53.0 ninja
RUN git clone https://github.com/fribidi/fribidi fribidi
RUN git -C fribidi checkout cffa3047a0db9f4cd391d68bf98ce7b7425be245
WORKDIR $SRC/fribidi
COPY build.sh $SRC/ | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
mkdir -p $build
meson --default-library=static --wrap-mode=nodownload -Ddocs=false \
-Dfuzzer_ldflags="$(echo $LIB_FUZZING_ENGINE)" \
$build \
|| (cat build/meson-logs/meson-log.txt && false)
ninja -v -j$(nproc) -C $build bin/f... | /src/fribidi | address | ================= Bug Report (1/2) ==================
## Source: Red Hat Bugzilla
## URL: https://bugzilla.redhat.com/show_bug.cgi?id=2047896
## Description:
Bugzilla ID: 2047896
Title: CVE-2022-25309 fribidi: Heap-buffer-overflow in fribidi_cap_rtl_to_unicode
Description
Pedro Sampaio 2022-01-28 19:57:29 UTC
A heap b... | [] | [
{
"sha": "f22593b82b5d1668d1997dbccd10a9c31ffea3b3",
"url": "https://github.com/fribidi/fribidi/commit/f22593b82b5d1668d1997dbccd10a9c31ffea3b3"
},
{
"sha": "a1ccd5ecf61110db0b1f4988842fab0df3a5de01",
"url": "https://github.com/fribidi/fribidi/commit/a1ccd5ecf61110db0b1f4988842fab0df3a5de01"
}... |
gpac.cve-2022-47663 | gpac/gpac | 65430e30593bb04579445e77df0a1207adfad357 | 2022-12-19T09:13:04 | gpac | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y build-essential pkg-config libz-dev
RUN git clone https://github.com/gpac/gpac gpac
RUN git -C gpac checkout 65430e30593bb04579445e77df0a1207adfad357
WORKDIR $SRC/gpac
COPY build.sh $SRC/ | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
./configure --static-build --extra-cflags="${CFLAGS}" --extra-ldflags="${CFLAGS}"
make -j$(nproc) | /src/gpac | address | ================= Bug Report (1/1) ==================
## Source: GitHub Issue
## URL: https://github.com/gpac/gpac/issues/2360
## Description:
Issue: gpac/gpac#2360
Title: buffer overflow in h263dmx_process filters/reframe_h263.c:609
State: closed
Created by: xidoo123
Created at: 2022-12-18 10:23:45+00:00
Issue Body:
... | [] | [
{
"sha": "e7e8745f677010a5cb3366d5cbf39df7cffaaa2d",
"url": "https://github.com/gpac/gpac/commit/e7e8745f677010a5cb3366d5cbf39df7cffaaa2d"
}
] |
gpac.cve-2023-42298 | gpac/gpac | b34e3851670f4398a4e2efcb86b30a8b07743212 | 2023-04-24T07:57:53 | gpac | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y build-essential pkg-config libz-dev
RUN git clone https://github.com/gpac/gpac gpac
RUN git -C gpac checkout b34e3851670f4398a4e2efcb86b30a8b07743212
WORKDIR $SRC/gpac
COPY build.sh $SRC/ | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
./configure --static-build --extra-cflags="${CFLAGS}" --extra-ldflags="${CFLAGS}"
make -j$(nproc) | /src/gpac | undefined | ================= Bug Report (1/1) ==================
## Source: GitHub Issue
## URL: https://github.com/gpac/gpac/issues/2567
## Description:
Issue: gpac/gpac#2567
Title: Integer overflow issue in bifs/unquantize.c:298
State: closed
Created by: xiaoxiaoafeifei
Created at: 2023-08-29 07:37:50+00:00
Issue Body:
Thanks ... | [] | [
{
"sha": "16c4fafc2881112eba7051cac48f922eb2b94e06",
"url": "https://github.com/gpac/gpac/commit/16c4fafc2881112eba7051cac48f922eb2b94e06"
}
] |
libical.cve-2016-5824 | libical/libical | 43858141030ba123a4959231cadc9951b983f0fd | 2014-06-28T16:45:24 | libical | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get install --yes cmake
RUN git clone https://github.com/libical/libical libical
RUN git -C libical checkout 43858141030ba123a4959231cadc9951b983f0fd
WORKDIR $SRC/libical
COPY build.sh $SRC/ | # Minimized build script with only core build commands
set -eu
cmake . -DBUILD_SHARED_LIBS=OFF -DICAL_GLIB=False
make install -j$(nproc) | /src/libical | address | ================= Bug Report (1/3) ==================
## Source: GitHub Issue
## URL: https://github.com/libical/libical/issues/235
## Description:
Issue: libical/libical#235
Title: Potentially security-sensitive crashes, best way to get them to you?
State: closed
Created by: brandonprry
Created at: 2016-05-22 19:42:45... | [
{
"content": "/*\n# Copyright 2019 Google Inc.\n#\n# Licensed under the Apache License, Version 2.0 (the \"License\");\n# you may not use this file except in compliance with the License.\n# You may obtain a copy of the License at\n#\n# http://www.apache.org/licenses/LICENSE-2.0\n#\n# Unless required by app... | [
{
"sha": "19acf43794ad4c99f7e6687cb39424a82b737828",
"url": "https://github.com/libical/libical/commit/19acf43794ad4c99f7e6687cb39424a82b737828"
},
{
"sha": "38757abb495ea6cb40faa5418052278bf75040f7",
"url": "https://github.com/libical/libical/commit/38757abb495ea6cb40faa5418052278bf75040f7"
}... |
freerdp.cve-2023-40187 | freerdp/freerdp | f468a06d88c55b9ed484757326a9528cf27d33f4 | 2023-07-21T09:04:42 | freerdp | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y build-essential git-core cmake ninja-build pkg-config zlib1g-dev libx11-dev libxext-dev libxinerama-dev libxcursor-dev libxkbfile-dev libxv-dev libxi-dev libxdamage-dev libxrender-dev libxrandr-dev libssl-dev libasound2-dev libcups2-dev libpulse-d... | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
-DCMAKE_C_FLAGS="${CFLAGS}"
-DCMAKE_CXX_FLAGS="${CXXFLAGS}"
-DCMAKE_EXE_LINKER_FLAGS="${LDFLAGS}"
-DCMAKE_MODULE_LINKER_FLAGS="${LDFLAGS}"
-DCMAKE_SHARED_LINKER_FLAGS="${LDFLAGS}"
cmake "${cmake_args[@]}" -S . -B build -G... | /src/freerdp | address | ================= Bug Report (1/1) ==================
## Source: GitHub Advisory
## URL: https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-pwf9-v5p9-ch4f
## Description:
Advisory ID: GHSA-pwf9-v5p9-ch4f
Title: Use-After-Free in avc420_ensure_buffer, avc444_ensure_buffer
Description:
Summary
Use-After-Free in... | [] | [
{
"sha": "5be5553e0da72178a4b94cc1ffbdace9ceb153e5",
"url": "https://github.com/FreeRDP/FreeRDP/commit/5be5553e0da72178a4b94cc1ffbdace9ceb153e5"
}
] |
exiv2.cve-2017-17723 | exiv2/exiv2 | fa449a4d2c58d63f0d75ff259f25683a98a44630 | 2017-04-26T14:16:21 | exiv2 | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y cmake make ccache python3 libexpat1-dev zlib1g-dev libssh-dev libcurl4-openssl-dev libxml2-utils
RUN git clone https://github.com/exiv2/exiv2 exiv2
RUN git -C exiv2 checkout fa449a4d2c58d63f0d75ff259f25683a98a44630
WORKDIR $SRC/exiv2
COPY build.sh... | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
mkdir -p build
cd build
cmake -DEXIV2_ENABLE_PNG=ON -DEXIV2_ENABLE_WEBREADY=ON -DEXIV2_ENABLE_CURL=OFF -DEXIV2_ENABLE_BMFF=ON -DEXIV2_TEAM_WARNINGS_AS_ERRORS=ON -DBUILD_SHARED_LIBS=OFF -DCMAKE_CXX_COMPILER="${CXX}" -DCMAKE_CXX_FLAGS="${CXXFL... | /src/exiv2 | address | ================= Bug Report (1/1) ==================
## Source: Red Hat Bugzilla
## URL: https://bugzilla.redhat.com/show_bug.cgi?id=1524104
## Description:
Bugzilla ID: 1524104
Title: exiv2 library: heap-based buffer over-read in Exiv2::Image::byteSwap4 (image.cpp)
Description
Wei You 2017-12-10 05:43:31 UTC
Created... | [] | [] |
imagemagick.cve-2020-19667 | imagemagick/imagemagick | 7aa934e39474da3433522dd3d55ad282142b71de | 2020-04-19T16:40:17 | imagemagick | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y make autoconf automake libtool pkg-config cmake nasm autopoint po4a libc6:i386 libc6-dev:i386
RUN apt-get install -y make autoconf automake libtool pkg-config cmake nasm autopoint po4a libc6:i386 libc6-dev:i386
RUN git clone https://github.com/ima... | #!/bin/bash
# Default build script template for C/C++ projects
set -eu
# Define configuration options
CONFIG_OPTS="--disable-shared"
CMAKE_OPTS="-DCMAKE_BUILD_TYPE=Debug"
MAKE_OPTS="-j$(nproc)"
BUILD_DIR="build"
# 1. Run build preparation scripts if they exist
for prep_script in buildconf autogen.sh bootstrap; do
i... | /src/imagemagick | address | ================= Bug Report (1/1) ==================
## Source: GitHub Issue
## URL: https://github.com/ImageMagick/ImageMagick/issues/1895
## Description:
Issue: ImageMagick/ImageMagick#1895
Title: stack-buffer-overflow at /coders/xpm.c:232 in ReadXPMImage
State: closed
Created by: peanuts62
Created at: 2020-04-14 10... | [] | [
{
"sha": "26538669546730c5b2dc36e7d48850f1f6928f94",
"url": "https://github.com/ImageMagick/ImageMagick6/commit/26538669546730c5b2dc36e7d48850f1f6928f94"
},
{
"sha": "5462fd4725018567764c8f66bed98b7ee3e23006",
"url": "https://github.com/ImageMagick/ImageMagick/commit/5462fd4725018567764c8f66bed9... |
libredwg.cve-2023-36271 | libredwg/libredwg | 24cea42a1a2e96d2a6028a4d9f9ea1e7574af77f | 2022-02-06T13:02:15 | libredwg | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y autoconf libtool texinfo
RUN git clone https://github.com/libredwg/libredwg libredwg
RUN git -C libredwg checkout 24cea42a1a2e96d2a6028a4d9f9ea1e7574af77f
WORKDIR $SRC/libredwg
COPY build.sh $SRC/ | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
sh ./autogen.sh
./configure --disable-shared --disable-bindings --enable-release
make -j$(nproc) | /src/libredwg | address | ================= Bug Report (1/1) ==================
## Source: GitHub Issue
## URL: https://github.com/LibreDWG/libredwg/issues/681#BUG2
## Description:
Issue: LibreDWG/libredwg#681
Title: [FUZZ] two bugs in dwg2SVG
State: closed
Created by: kdsjZh
Created at: 2023-03-31 04:10:48+00:00
Issue Body:
Hello, I was testi... | [
{
"content": "[libfuzzer]\ndetect_leaks=0\n",
"filename": "llvmfuzz.options"
}
] | [
{
"sha": "9df4ec3c524795a401acf371c8a953f5b1a6fadf",
"url": "https://github.com/libredwg/libredwg/commit/9df4ec3c524795a401acf371c8a953f5b1a6fadf"
},
{
"sha": "c1ed1d91e28a6ddc7a9b5479d4795d58fb6be0ca",
"url": "https://github.com/LibreDWG/libredwg/commit/c1ed1d91e28a6ddc7a9b5479d4795d58fb6be0ca"... |
imagemagick.cve-2016-8678 | imagemagick/imagemagick | faccddce0f6cb1e22df9d558b446a17f912e906d | 2016-09-05T09:21:09 | imagemagick | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y make autoconf automake libtool
RUN git clone https://github.com/imagemagick/imagemagick imagemagick
RUN git -C imagemagick checkout faccddce0f6cb1e22df9d558b446a17f912e906d
WORKDIR $SRC/imagemagick
COPY build.sh $SRC/ | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
./configure --prefix="$WORK" --disable-shared --disable-docs
make "-j$(nproc)"
make install -j$(nproc) | /src/imagemagick | address | ================= Bug Report (1/2) ==================
## Source: Red Hat Bugzilla
## URL: https://bugzilla.redhat.com/show_bug.cgi?id=1385694
## Description:
Bugzilla ID: 1385694
Title: CVE-2016-8678 ImageMagick: Heap-buffer overflow in IsPixelMonochrome
Description
Andrej Nemec 2016-10-17 14:01:34 UTC
A heap-buffer o... | [
{
"content": "#include <cstdint>\n\n#include <Magick++/Blob.h>\n#include <Magick++/Image.h>\n\nextern \"C\" int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) {\n uint16_t Width;\n uint16_t Height;\n if (Size < (sizeof(Width) + sizeof(Height))) {\n return 0;\n }\n Width = *reinterpret_cast<con... | [] |
libsndfile.cve-2022-33064 | libsndfile/libsndfile | ea3ac90e98c6a98cd52cae39010446fba368a2e3 | 2022-03-27T06:48:57 | libsndfile | c++ | FROM hwiwonlee/secb.base:latest
RUN git clone https://github.com/libsndfile/libsndfile libsndfile
RUN git -C libsndfile checkout ea3ac90e98c6a98cd52cae39010446fba368a2e3
WORKDIR $SRC/libsndfile
COPY build.sh $SRC/ | #!/bin/bash
# Default build script template for C/C++ projects
set -eu
# Define configuration options
CONFIG_OPTS="--disable-shared"
CMAKE_OPTS="-DCMAKE_BUILD_TYPE=Debug"
MAKE_OPTS="-j$(nproc)"
BUILD_DIR="build"
# 1. Run build preparation scripts if they exist
for prep_script in buildconf autogen.sh bootstrap; do
i... | /src/libsndfile | address | ================= Bug Report (1/1) ==================
## Source: GitHub Issue
## URL: https://github.com/libsndfile/libsndfile/issues/832
## Description:
Issue: libsndfile/libsndfile#832
Title: UndefinedBehaviorSanitizer: index 100 out of bounds for type 'SF_CUE_POINT [100]'
State: open
Created by: pietroborrello
Creat... | [] | [
{
"sha": "4b01368fd8a1e4541d7a5d125f70e99d30851718",
"url": "https://github.com/libsndfile/libsndfile/commit/4b01368fd8a1e4541d7a5d125f70e99d30851718"
},
{
"sha": "48535fc2ab7a08596474ad9104bb14e26518385e",
"url": "https://github.com/libsndfile/libsndfile/commit/48535fc2ab7a08596474ad9104bb14e26... |
libjpeg-turbo.cve-2018-14498 | libjpeg-turbo/libjpeg-turbo | 0fa7850aeb273204acd57be11f328b2be5d97dc6 | 2018-07-20T12:21:20 | libjpeg-turbo | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y make autoconf automake libtool nasm curl cmake
RUN git clone https://github.com/libjpeg-turbo/libjpeg-turbo libjpeg-turbo
RUN git -C libjpeg-turbo checkout 0fa7850aeb273204acd57be11f328b2be5d97dc6
WORKDIR $SRC/libjpeg-turbo
COPY build.sh $SRC/ | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
cmake . -DCMAKE_INSTALL_PREFIX=$WORK -DENABLE_STATIC:bool=on
make "-j$(nproc)"
make install -j$(nproc) | /src/libjpeg-turbo | address | ================= Bug Report (1/2) ==================
## Source: GitHub Issue
## URL: https://github.com/libjpeg-turbo/libjpeg-turbo/issues/258
## Description:
Issue: libjpeg-turbo/libjpeg-turbo#258
Title: AddressSanitizer: heap-buffer-overflow inside get_8bit_row (rdbmp.c)
State: closed
Created by: hongxuchen
Created ... | [
{
"content": "/*\n# Copyright 2016 Google Inc.\n#\n# Licensed under the Apache License, Version 2.0 (the \"License\");\n# you may not use this file except in compliance with the License.\n# You may obtain a copy of the License at\n#\n# http://www.apache.org/licenses/LICENSE-2.0\n#\n# Unless required by app... | [
{
"sha": "9c78a04df4e44ef6487eee99c4258397f4fdca55",
"url": "https://github.com/libjpeg-turbo/libjpeg-turbo/commit/9c78a04df4e44ef6487eee99c4258397f4fdca55"
},
{
"sha": "cbe01e0c6757c918a220a63ce614fe77260a7a03",
"url": "https://github.com/libjpeg-turbo/libjpeg-turbo/commit/cbe01e0c6757c918a220a... |
njs.cve-2020-19695 | nginx/njs | 5e0f4a75dc137c6cfc60cfb094356b9f24d6fbba | 2019-08-13T08:04:10 | njs | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y make autoconf automake libtool mercurial libpcre3-dev libreadline-dev subversion
RUN git clone https://github.com/nginx/njs njs
RUN git -C njs checkout 5e0f4a75dc137c6cfc60cfb094356b9f24d6fbba
WORKDIR $SRC/njs
COPY build.sh $SRC/ | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
./autogen.sh
CFLAGS="$CFLAGS -fno-use-cxa-atexit" CXXFLAGS="$CXXFLAGS -fno-use-cxa-atexit" ./configure
make -j$(nproc) clean
make -j$(nproc) all
./configure
make njs -j$(nproc)
mkdir -p $SEED_CORPUS_PATH | /src/njs | address | ================= Bug Report (1/1) ==================
## Source: GitHub Issue
## URL: https://github.com/nginx/njs/issues/188
## Description:
Issue: nginx/njs#188
Title: Array elements left uninitialized in Array.prototype.slice() for primitive this values.
State: closed
Created by: l0kihardt
Created at: 2019-07-03 02:... | [
{
"content": "// Copyright 2019 Google LLC\n//\n// Licensed under the Apache License, Version 2.0 (the \"License\");\n// you may not use this file except in compliance with the License.\n// You may obtain a copy of the License at\n//\n// http://www.apache.org/licenses/LICENSE-2.0\n//\n// Unless required by... | [
{
"sha": "e6263dd0086779138aa3ab5fbac9b6b012639b0c",
"url": "https://github.com/nginx/njs/commit/e6263dd0086779138aa3ab5fbac9b6b012639b0c"
},
{
"sha": "b0f62312e39d4cf35515838174f11c2f500c3c1f",
"url": "https://github.com/nginx/njs/commit/b0f62312e39d4cf35515838174f11c2f500c3c1f"
}
] |
w3m.cve-2016-9632 | tats/w3m | 8d2c4e9ec6ca3fb268dfe1e4eca72c45daeee2c7 | 2016-10-31T06:34:44 | w3m | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y libgc-dev
RUN git clone https://github.com/tats/w3m w3m
RUN git -C w3m checkout 8d2c4e9ec6ca3fb268dfe1e4eca72c45daeee2c7
WORKDIR $SRC/w3m
COPY build.sh $SRC/ | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
./configure
make myctype.o -j$(nproc)
make Str.o -j$(nproc)
make libwc -j$(nproc) | /src/w3m | address | ================= Bug Report (1/1) ==================
## Source: GitHub Issue
## URL: https://github.com/tats/w3m/issues/43
## Description:
Issue: tats/w3m#43
Title: global-buffer-overflow in wc_any_to_ucs()
State: closed
Created by: kcwu
Created at: 2016-11-18 01:53:54+00:00
Issue Body:
```
00000000: 3c6d 6574 6120 6... | [] | [
{
"sha": "716bc126638393c733399d11d3228edb82877faa",
"url": "https://github.com/tats/w3m/commit/716bc126638393c733399d11d3228edb82877faa"
},
{
"sha": "88110c2658ad9badd292430c75ebb0444c3312eb",
"url": "https://github.com/tats/w3m/commit/88110c2658ad9badd292430c75ebb0444c3312eb"
},
{
"sha... |
xs.cve-2019-16366 | moddable-opensource/moddable | c87b3326497f4bbdab7c3e3d8a2c9fd8d1fc0805 | 2018-03-29T16:52:15 | moddable | c++ | FROM hwiwonlee/secb.base:latest
RUN apt update && apt install -yqq npm libjpeg-dev zlib1g-dev libyaml-dev
RUN git clone https://github.com/moddable-opensource/moddable moddable
RUN git -C moddable checkout c87b3326497f4bbdab7c3e3d8a2c9fd8d1fc0805
WORKDIR $SRC/moddable
COPY build.sh $SRC/ | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
export MODDABLE=$PWD
make -f xst.mk clean -j$(nproc) | /src/moddable | address | ================= Bug Report (1/1) ==================
## Source: GitHub Issue
## URL: https://github.com/Moddable-OpenSource/moddable/issues/235
## Description:
Issue: Moddable-OpenSource/moddable#235
Title: XS: Heap-Buffer-Overflow
State: closed
Created by: sunlili
Created at: 2019-07-25 07:08:13+00:00
Issue Body:
H... | [] | [
{
"sha": "5639abb24b6d725554969dc0be5822edb54a4a08",
"url": "https://github.com/Moddable-OpenSource/moddable/commit/5639abb24b6d725554969dc0be5822edb54a4a08"
},
{
"sha": "100349c59c46fc67ffde33eebb8ccdffdd970679",
"url": "https://github.com/Moddable-OpenSource/moddable/commit/100349c59c46fc67ffd... |
llamacpp.cve-2024-42479 | ggerganov/llama.cpp | 6afd1a99dc9792096d4567ab9fa1ad530c81c6cd | 2024-08-09T11:53:09 | llama.cpp | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y make autoconf automake xxd
RUN git clone https://github.com/ggerganov/llama.cpp llama.cpp
RUN git -C llama.cpp checkout 6afd1a99dc9792096d4567ab9fa1ad530c81c6cd
WORKDIR $SRC/llama.cpp
COPY build.sh $SRC/ | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
export GGML_NO_OPENMP=1
sed -i 's/:= c++/:= ${CXX}/g' ./Makefile
sed -i 's/:= cc/:= ${CC}/g' ./Makefile
sed -i 's/ggml_print_backtrace();//g' ./ggml/src/ggml.c
sed -i 's/static bool is_first_call/bool is_first_call/g' ./ggml/src/ggml.c
FLAGS... | /src/llama.cpp | address | ================= Bug Report (1/1) ==================
## Source: GitHub Advisory
## URL: https://github.com/ggerganov/llama.cpp/security/advisories/GHSA-wcr5-566p-9cwj
## Description:
Advisory ID: GHSA-wcr5-566p-9cwj
Title: Write-what-where in rpc_server::set_tensor
Description:
Write-what-where in ggml_backend_cpu_bu... | [] | [
{
"sha": "b72942fac998672a79a1ae3c03b340f7e629980b",
"url": "https://github.com/ggerganov/llama.cpp/commit/b72942fac998672a79a1ae3c03b340f7e629980b"
},
{
"sha": "75af08c475e285888f66556d0f459c533b7deb95",
"url": "https://github.com/ggerganov/llama.cpp/commit/75af08c475e285888f66556d0f459c533b7de... |
exiv2.cve-2018-19107 | exiv2/exiv2 | fa449a4d2c58d63f0d75ff259f25683a98a44630 | 2017-04-26T14:16:21 | exiv2 | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y cmake make ccache python3 libexpat1-dev zlib1g-dev libssh-dev libcurl4-openssl-dev libxml2-utils
RUN git clone https://github.com/exiv2/exiv2 exiv2
RUN git -C exiv2 checkout fa449a4d2c58d63f0d75ff259f25683a98a44630
WORKDIR $SRC/exiv2
COPY build.sh... | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
mkdir -p build
cd build
cmake -DEXIV2_ENABLE_PNG=ON -DEXIV2_ENABLE_WEBREADY=ON -DEXIV2_ENABLE_CURL=OFF -DEXIV2_ENABLE_BMFF=ON -DEXIV2_TEAM_WARNINGS_AS_ERRORS=ON -DBUILD_SHARED_LIBS=OFF -DCMAKE_CXX_COMPILER="${CXX}" -DCMAKE_CXX_FLAGS="${CXXFL... | /src/exiv2 | address | ================= Bug Report (1/1) ==================
## Source: GitHub Issue
## URL: https://github.com/Exiv2/exiv2/issues/427
## Description:
Issue: Exiv2/exiv2#427
Title: AddressSanitizer: heap-buffer-overflow at iptc.cpp:464
State: closed
Created by: hongxuchen
Created at: 2018-09-01 05:37:20+00:00
Labels: bug
Iss... | [] | [
{
"sha": "b642b97fb9b08f188cfc7d461d60cd6bc971cbbf",
"url": "https://github.com/Exiv2/exiv2/commit/b642b97fb9b08f188cfc7d461d60cd6bc971cbbf"
}
] |
exiv2.cve-2017-11553 | exiv2/exiv2 | fa449a4d2c58d63f0d75ff259f25683a98a44630 | 2017-04-26T14:16:21 | exiv2 | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y cmake make ccache python3 libexpat1-dev zlib1g-dev libssh-dev libcurl4-openssl-dev libxml2-utils
RUN git clone https://github.com/exiv2/exiv2 exiv2
RUN git -C exiv2 checkout fa449a4d2c58d63f0d75ff259f25683a98a44630
WORKDIR $SRC/exiv2
COPY build.sh... | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
mkdir -p build
cd build
cmake -DEXIV2_ENABLE_PNG=ON -DEXIV2_ENABLE_WEBREADY=ON -DEXIV2_ENABLE_CURL=OFF -DEXIV2_ENABLE_BMFF=ON -DEXIV2_TEAM_WARNINGS_AS_ERRORS=ON -DBUILD_SHARED_LIBS=OFF -DCMAKE_CXX_COMPILER="${CXX}" -DCMAKE_CXX_FLAGS="${CXXFL... | /src/exiv2 | address | ================= Bug Report (1/1) ==================
## Source: Red Hat Bugzilla
## URL: https://bugzilla.redhat.com/show_bug.cgi?id=1471772
## Description:
Bugzilla ID: 1471772
Title: There is an illegal address access in basicio.cpp of exiv2.
Description
owl337 2017-07-17 12:23:28 UTC
Created attachment 1299839 [de... | [] | [
{
"sha": "31fc5d2e30a84555d2974f32576f07e65b200b55",
"url": null
},
{
"sha": "74cb5bab132ed76adf15df172c5e8b58cddaa96c",
"url": "https://github.com/Exiv2/exiv2/commit/74cb5bab132ed76adf15df172c5e8b58cddaa96c"
},
{
"sha": "6e3855aed7ba8bb4731fc4087ca7f9078b2f3d97",
"url": "https://git... |
liblouis.cve-2017-13742 | liblouis/liblouis | d1998f27ca0ca37c13343c6d22baf075919f4a0d | 2017-06-06T07:46:08 | liblouis | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y make autoconf automake libtool pkg-config zlib1g-dev libpci-dev
RUN git clone https://github.com/liblouis/liblouis liblouis
RUN git -C liblouis checkout d1998f27ca0ca37c13343c6d22baf075919f4a0d
WORKDIR $SRC/liblouis
COPY build.sh $SRC/ | #!/bin/bash
# Default build script template for C/C++ projects
set -eu
# Define configuration options
CONFIG_OPTS="--disable-shared"
CMAKE_OPTS="-DCMAKE_BUILD_TYPE=Debug"
MAKE_OPTS="-j$(nproc)"
BUILD_DIR="build"
# 1. Run build preparation scripts if they exist
for prep_script in buildconf autogen.sh bootstrap; do
i... | /src/liblouis | address | ================= Bug Report (1/1) ==================
## Source: Red Hat Bugzilla
## URL: https://bugzilla.redhat.com/show_bug.cgi?id=1484334
## Description:
Bugzilla ID: 1484334
Title: There is a stack overflow in liblouis which is triggered at function includeFile().
Description
owl337 2017-08-23 09:39:52 UTC
Create... | [] | [] |
gpac.cve-2019-20162 | gpac/gpac | ed4ec31ea84a1a94abb17669db33f5c4e7a679cf | 2020-06-15T05:33:03 | gpac | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y build-essential pkg-config libz-dev
RUN git clone https://github.com/gpac/gpac gpac
RUN git -C gpac checkout ed4ec31ea84a1a94abb17669db33f5c4e7a679cf
WORKDIR $SRC/gpac
COPY build.sh $SRC/ | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
./configure --static-build --extra-cflags="${CFLAGS}" --extra-ldflags="${CFLAGS}"
make -j$(nproc) | /src/gpac | address | ================= Bug Report (1/1) ==================
## Source: GitHub Issue
## URL: https://github.com/gpac/gpac/issues/1327
## Description:
Issue: gpac/gpac#1327
Title: ERROR: AddressSanitizer: heap-buffer-overflow in gf_isom_box_parse_ex isomedia/box_funcs.c:189
State: closed
Created by: Clingto
Created at: 2019-11... | [
{
"content": "/* Copyright 2021 Google LLC\nLicensed under the Apache License, Version 2.0 (the \"License\");\nyou may not use this file except in compliance with the License.\nYou may obtain a copy of the License at\n http://www.apache.org/licenses/LICENSE-2.0\nUnless required by applicable law or agreed ... | [
{
"sha": "3c0ba42546c8148c51169c3908e845c308746c77",
"url": "https://github.com/gpac/gpac/commit/3c0ba42546c8148c51169c3908e845c308746c77"
}
] |
imagemagick.cve-2019-13301 | imagemagick/imagemagick | d08250ec50eef2fd279f6fed859f50d051e58b53 | 2019-06-15T18:46:59 | imagemagick | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y make autoconf automake libtool pkg-config cmake nasm autopoint
RUN git clone https://github.com/imagemagick/imagemagick imagemagick
RUN git -C imagemagick checkout d08250ec50eef2fd279f6fed859f50d051e58b53
WORKDIR $SRC/imagemagick
COPY build.sh $SR... | #!/bin/bash
# Default build script template for C/C++ projects
set -eu
# Define configuration options
CONFIG_OPTS="--disable-shared"
CMAKE_OPTS="-DCMAKE_BUILD_TYPE=Debug"
MAKE_OPTS="-j$(nproc)"
BUILD_DIR="build"
# 1. Run build preparation scripts if they exist
for prep_script in buildconf autogen.sh bootstrap; do
i... | /src/imagemagick | address | ================= Bug Report (1/2) ==================
## Source: GitHub Issue
## URL: https://github.com/ImageMagick/ImageMagick/issues/1585
## Description:
Issue: ImageMagick/ImageMagick#1585
Title: memory leaks in AcquireMagickMemory of MagickCore/memory.c
State: closed
Created by: SuhwanSong
Created at: 2019-06-10 1... | [] | [
{
"sha": "f595a1985233c399a05c0c37cc41de16a90dd025",
"url": "https://github.com/ImageMagick/ImageMagick/commit/f595a1985233c399a05c0c37cc41de16a90dd025"
},
{
"sha": "0b7d3675438cbcde824e751895847a0794406e08",
"url": "https://github.com/ImageMagick/ImageMagick6/commit/0b7d3675438cbcde824e75189584... |
exiv2.cve-2020-18898 | exiv2/exiv2 | 62826516778b96da5ddb38f5ec1499dc76994a6f | 2018-12-20T04:09:32 | exiv2 | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y cmake make ccache python3 libexpat1-dev zlib1g-dev libssh-dev libcurl4-openssl-dev libxml2-utils
RUN git clone https://github.com/exiv2/exiv2 exiv2
RUN git -C exiv2 checkout 62826516778b96da5ddb38f5ec1499dc76994a6f
WORKDIR $SRC/exiv2
COPY build.sh... | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
mkdir -p build
cd build
cmake -DEXIV2_ENABLE_PNG=ON -DEXIV2_ENABLE_WEBREADY=ON -DEXIV2_ENABLE_CURL=OFF -DEXIV2_ENABLE_BMFF=ON -DEXIV2_TEAM_WARNINGS_AS_ERRORS=ON -DBUILD_SHARED_LIBS=OFF -DCMAKE_CXX_COMPILER="${CXX}" -DCMAKE_CXX_FLAGS="${CXXFL... | /src/exiv2 | address | ================= Bug Report (1/1) ==================
## Source: GitHub Issue
## URL: https://github.com/Exiv2/exiv2/issues/741
## Description:
Issue: Exiv2/exiv2#741
Title: [bug report] Stack Exhaustion Caused By Exiv2::Image::printIFDStructure function in image.cpp, making Recursive Calls to Itself
State: closed
Crea... | [] | [] |
fast-dds.cve-2024-30259 | eprosima/fast-dds | cf40a06ebf36cb7b69facea0dec2d2915d96c1ea | 2024-04-25T08:14:40 | fast-dds | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt install -y autoconf automake pkg-config
RUN git clone https://github.com/eprosima/fast-dds fast-dds
RUN git -C fast-dds checkout cf40a06ebf36cb7b69facea0dec2d2915d96c1ea
WORKDIR $SRC/fast-dds
COPY build.sh $SRC/ | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
make clean -j$(nproc)
make -j$(nproc) all
./configure
make -j$(nproc) install
mkdir -p Fast-CDR/build && cd Fast-CDR/build
cmake .. -DBUILD_SHARED_LIBS=OFF
cmake --build . --target install
mkdir -p build && cd build
make -j $(nproc) | /src/fast-dds | address | ================= Bug Report (1/1) ==================
## Source: GitHub Advisory
## URL: https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-qcj9-939p-p662
## Description:
Advisory ID: GHSA-qcj9-939p-p662
Title: Heap buffer overflow when publisher send malformed packet
Description:
Summary
When publisher ser... | [] | [
{
"sha": "e94c4b1b0a51f6be0aa04ad44624b0edf741419d",
"url": "https://github.com/eProsima/Fast-DDS/commit/e94c4b1b0a51f6be0aa04ad44624b0edf741419d"
},
{
"sha": "3c6195aefd11d46395caf7d8b29019b5ef5aaefd",
"url": "https://github.com/eprosima/fast-dds/commit/3c6195aefd11d46395caf7d8b29019b5ef5aaefd"... |
imagemagick.cve-2017-18272 | imagemagick/imagemagick | a91afc45bd4db0094d54abff921419d65dea14ca | 2018-01-06T07:49:17 | imagemagick | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y make autoconf automake libtool
RUN git clone https://github.com/imagemagick/imagemagick imagemagick
RUN git -C imagemagick checkout a91afc45bd4db0094d54abff921419d65dea14ca
WORKDIR $SRC/imagemagick
COPY build.sh $SRC/ | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
./configure --prefix="$WORK" --disable-shared --disable-docs
make "-j$(nproc)"
make install -j$(nproc) | /src/imagemagick | address | ================= Bug Report (1/1) ==================
## Source: GitHub Issue
## URL: https://github.com/ImageMagick/ImageMagick/issues/918
## Description:
Issue: ImageMagick/ImageMagick#918
Title: heap-use-after-free in MngInfoDiscardObject
State: closed
Created by: henices
Created at: 2017-12-26 01:16:50+00:00
Labels... | [
{
"content": "#include <cstdint>\n\n#include <Magick++/Blob.h>\n#include <Magick++/Image.h>\n\nextern \"C\" int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) {\n uint16_t Width;\n uint16_t Height;\n if (Size < (sizeof(Width) + sizeof(Height))) {\n return 0;\n }\n Width = *reinterpret_cast<con... | [
{
"sha": "2460f71fcdb112dacbc14e3d9b9913dec66af820",
"url": "https://github.com/ImageMagick/ImageMagick/commit/2460f71fcdb112dacbc14e3d9b9913dec66af820"
},
{
"sha": "f8a4240c17f3c2e72be30f4857265275bfb13a86",
"url": "https://github.com/ImageMagick/ImageMagick/commit/f8a4240c17f3c2e72be30f4857265... |
libredwg.cve-2019-9770 | libredwg/libredwg | 3406d1e5b611cdb898e14d5a47e30fdc4d59c9a5 | 2018-12-05T17:15:15 | libredwg | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y autoconf libtool texinfo
RUN git clone https://github.com/libredwg/libredwg libredwg
RUN git -C libredwg checkout 3406d1e5b611cdb898e14d5a47e30fdc4d59c9a5
WORKDIR $SRC/libredwg
COPY build.sh $SRC/ | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
sh ./autogen.sh
./configure --disable-shared
make -j$(nproc) | /src/libredwg | address | ================= Bug Report (1/1) ==================
## Source: GitHub Issue
## URL: https://github.com/LibreDWG/libredwg/issues/99
## Description:
Issue: LibreDWG/libredwg#99
Title: fuzzing results LibreDWG
State: closed
Created by: YourButterfly
Created at: 2019-03-12 10:51:26+00:00
Labels: bug
Issue Body:
# libred... | [
{
"content": "[libfuzzer]\ndetect_leaks=0\n",
"filename": "fuzz_dwg_decode.options"
}
] | [
{
"sha": "c948548e175a9e5e4ed45623013ed20df62a920a",
"url": "https://github.com/libredwg/libredwg/commit/c948548e175a9e5e4ed45623013ed20df62a920a"
},
{
"sha": "0c6a267ca01b811e837d5cec17a30061b4081dd2",
"url": "https://github.com/libredwg/libredwg/commit/0c6a267ca01b811e837d5cec17a30061b4081dd2"... |
libsass.cve-2017-11554 | sass/libsass | 31573210c0d120ae56aaea543a0dbab5255cdfb7 | 2017-05-22T14:06:38 | libsass | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y make autoconf automake libtool
RUN git clone https://github.com/sass/libsass libsass
RUN git -C libsass checkout 31573210c0d120ae56aaea543a0dbab5255cdfb7
WORKDIR $SRC/libsass
COPY build.sh $SRC/ | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
export BUILD='static'
make -j$(nproc) | /src/libsass | address | ================= Bug Report (1/2) ==================
## Source: Red Hat Bugzilla
## URL: https://bugzilla.redhat.com/show_bug.cgi?id=1471780
## Description:
Bugzilla ID: 1471780
Title: There is a stack-overflow in the sassc of libsass library.
Description
owl337 2017-07-17 12:29:15 UTC
Created attachment 1299840 [det... | [
{
"content": "#include \"sass.h\"\n\nextern \"C\" int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size) {\n char* sass_data = (char*) malloc(sizeof(char) * size + 1);\n if (sass_data == NULL) return 0;\n\n memcpy(sass_data, data, size);\n sass_data[size] = '\\0';\n\n struct Sass_Data_Context* ctx = ... | [
{
"sha": "7664114543757e932f5b1a2ff5295aa9b34f8623",
"url": "https://github.com/sass/libsass/commit/7664114543757e932f5b1a2ff5295aa9b34f8623"
}
] |
liblouis.cve-2018-11440 | liblouis/liblouis | 0dee1fcc102678e8a57f59ba53f0a9784b93b4ae | 2018-03-05T10:09:58 | liblouis | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y make autoconf automake libtool pkg-config zlib1g-dev libpci-dev
RUN git clone https://github.com/liblouis/liblouis liblouis
RUN git -C liblouis checkout 0dee1fcc102678e8a57f59ba53f0a9784b93b4ae
WORKDIR $SRC/liblouis
COPY build.sh $SRC/ | #!/bin/bash
# Default build script template for C/C++ projects
set -eu
# Define configuration options
CONFIG_OPTS="--disable-shared"
CMAKE_OPTS="-DCMAKE_BUILD_TYPE=Debug"
MAKE_OPTS="-j$(nproc)"
BUILD_DIR="build"
# 1. Run build preparation scripts if they exist
for prep_script in buildconf autogen.sh bootstrap; do
i... | /src/liblouis | address | ================= Bug Report (1/1) ==================
## Source: GitHub Issue
## URL: https://github.com/liblouis/liblouis/issues/575
## Description:
Issue: liblouis/liblouis#575
Title: CVE-2018-11440: ASAn stack-based buffer overflow in compileTranslationTable.c parseChars
State: closed
Created by: fgeek
Created at: 2... | [] | [
{
"sha": "5ce93fef85b68c5ecb4561bf1aedb52d1b1f368e",
"url": "https://github.com/liblouis/liblouis/commit/5ce93fef85b68c5ecb4561bf1aedb52d1b1f368e"
},
{
"sha": "ed6b00aea08005945c9ae8a4a4503acc43f3a844",
"url": "https://github.com/liblouis/liblouis/commit/ed6b00aea08005945c9ae8a4a4503acc43f3a844"... |
libjpeg-turbo.cve-2018-19664 | libjpeg-turbo/libjpeg-turbo | bb3d325624526c91646bb9af9578d7198c082d51 | 2018-11-12T13:20:28 | libjpeg-turbo | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y make autoconf automake libtool nasm curl cmake
RUN git clone https://github.com/libjpeg-turbo/libjpeg-turbo libjpeg-turbo
RUN git -C libjpeg-turbo checkout bb3d325624526c91646bb9af9578d7198c082d51
WORKDIR $SRC/libjpeg-turbo
COPY build.sh $SRC/ | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
cmake . -DCMAKE_INSTALL_PREFIX=$WORK -DENABLE_STATIC:bool=on
make "-j$(nproc)"
make install -j$(nproc) | /src/libjpeg-turbo | address | ================= Bug Report (1/1) ==================
## Source: GitHub Issue
## URL: https://github.com/libjpeg-turbo/libjpeg-turbo/issues/305
## Description:
Issue: libjpeg-turbo/libjpeg-turbo#305
Title: heap-buffer-overflow in function put_pixel_rows in wrbmp.c:145
State: closed
Created by: cool-tomato
Created at: 2... | [
{
"content": "/*\n# Copyright 2016 Google Inc.\n#\n# Licensed under the Apache License, Version 2.0 (the \"License\");\n# you may not use this file except in compliance with the License.\n# You may obtain a copy of the License at\n#\n# http://www.apache.org/licenses/LICENSE-2.0\n#\n# Unless required by app... | [
{
"sha": "f8cca819a4fb42aafa5f70df43c45e8c416d716f",
"url": "https://github.com/libjpeg-turbo/libjpeg-turbo/commit/f8cca819a4fb42aafa5f70df43c45e8c416d716f"
},
{
"sha": "11c98abd417c98cf05974c55c9f483e278950529",
"url": "https://github.com/libjpeg-turbo/libjpeg-turbo/commit/11c98abd417c98cf05974... |
njs.cve-2022-43286 | nginx/njs | 9d68e0e7f516f3d614931399f37becf673250d01 | 2022-05-04T18:23:46 | njs | c++ | FROM hwiwonlee/secb.base:latest
RUN apt-get update && apt-get install -y make autoconf automake libtool mercurial git libpcre2-dev
RUN git clone https://github.com/nginx/njs njs
RUN git -C njs checkout 9d68e0e7f516f3d614931399f37becf673250d01
WORKDIR $SRC/njs
COPY build.sh $SRC/ | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
./autogen.sh
CFLAGS="$CFLAGS -fno-use-cxa-atexit" CXXFLAGS="$CXXFLAGS -fno-use-cxa-atexit" ./configure
make -j$(nproc) clean
make -j$(nproc) all
make install -j$(nproc)
sed -i "s/\$libS\$libR \(-lpcre2-8$\)/\$libS\$libR -Wl,-Bstatic \1 -Wl,-... | /src/njs | address | ================= Bug Report (1/1) ==================
## Source: GitHub Issue
## URL: https://github.com/nginx/njs/issues/480
## Description:
Issue: nginx/njs#480
Title: illegal memory copy in njs_json_parse_iterator_call of njs_json.c:1008
State: closed
Created by: Q1IQ
Created at: 2022-03-02 11:45:19+00:00
Labels: bu... | [] | [
{
"sha": "2ad0ea24a58d570634e09c2e58c3b314505eaa6a",
"url": "https://github.com/nginx/njs/commit/2ad0ea24a58d570634e09c2e58c3b314505eaa6a"
},
{
"sha": "f65981b0b8fcf02d69a40bc934803c25c9f607ab",
"url": "https://github.com/nginx/njs/commit/f65981b0b8fcf02d69a40bc934803c25c9f607ab"
}
] |
gpac.cve-2025-7797 | gpac/gpac | 153ea314b6b053db17164f8bc3c7e1e460938eaa | 2025-11-08T00:00:00 | gpac | c | FROM hwiwonlee/secb.base:latest
RUN apt-get update
RUN apt-get install -y pkg-config wget
RUN git clone https://github.com/gpac/gpac gpac
RUN git -C gpac checkout 153ea314b6b053db17164f8bc3c7e1e460938eaa
WORKDIR $SRC/gpac
COPY build.sh $SRC/ | #!/bin/bash -eu
# Minimized build script with only core build commands
set -eu
./configure --enable-debug
make -j$(nproc) | /src/gpac | address | ================= Bug Report ==================
## Source: NVD CVE-2025-7797
## CVE ID: CVE-2025-7797
## Title: Null Pointer Dereference in GPAC
## Description:
A vulnerability was found in GPAC up to 2.4. It has been rated as problematic. Affected by this issue is the function gf_dash_download_init_segment of the file... | [
{
"content": "[libfuzzer]\ndetect_leaks=0\n",
"filename": "default.options"
}
] | [
{
"sha": "153ea314b6b053db17164f8bc3c7e1e460938eaa",
"url": "https://github.com/gpac/gpac/commit/153ea314b6b053db17164f8bc3c7e1e460938eaa"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.