osv-2024-384
Vulnerability from osv_ossfuzz
Published
2024-04-30 00:12
Modified
2024-12-25 14:21
Summary
Heap-use-after-free in json_fixed_string
Details
OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=67528
Crash type: Heap-use-after-free WRITE 11
Crash state:
json_fixed_string
json_RNUMBER_Header
dwg_read_json
{
"affected": [
{
"database_specific": {
"fixed_range": "47a07e5fadfd335adf63cb3ff995edbda86565a3:56d392a7e5ae5f522004ff92396dabd468f8d810"
},
"ecosystem_specific": {
"severity": "HIGH"
},
"package": {
"ecosystem": "OSS-Fuzz",
"name": "libredwg",
"purl": "pkg:generic/libredwg"
},
"ranges": [
{
"events": [
{
"introduced": "6d082fd0b2c6c33914cbdc943370b9a0a5dd3ef0"
},
{
"fixed": "56d392a7e5ae5f522004ff92396dabd468f8d810"
}
],
"repo": "https://github.com/LibreDWG/libredwg",
"type": "GIT"
}
],
"versions": [
"0.13",
"0.13.1",
"0.13.2",
"0.13.3",
"0.13.3.7163",
"0.13.3.7165",
"0.13.3.7166",
"0.13.3.7168",
"0.13.3.7176",
"0.13.3.7183",
"0.13.3.7186",
"0.13.3.7187",
"0.13.3.7190",
"0.13.3.7199",
"0.13.3.7217",
"0.13.3.7220",
"0.13.3.7223",
"0.13.3.7224",
"0.13.3.7225",
"0.13.3.7226",
"0.13.3.7227",
"0.13.3.7233",
"0.13.3.7240",
"0.13.3.7246",
"0.13.3.7251",
"0.13.3.7257",
"0.13.3.7259",
"0.13.3.7262",
"0.13.3.7264",
"0.13.3.7265",
"0.13.3.7268",
"0.13.3.7270",
"0.13.3.7273",
"0.13.3.7298",
"0.13.3.7306",
"0.13.3.7308",
"0.13.3.7320",
"0.13.3.7324",
"0.13.3.7327",
"0.13.3.7338",
"0.13.3.7341",
"0.13.3.7344",
"0.13.3.7345",
"0.13.3.7351",
"0.13.3.7371",
"0.13.3.7377",
"0.13.3.7385",
"0.13.3.7405",
"0.13.3.7409",
"0.13.3.7411",
"0.13.3.7412",
"0.13.3.7414",
"0.13.3.7420",
"0.13.3.7424"
]
}
],
"details": "OSS-Fuzz report: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=67528\n\n```\nCrash type: Heap-use-after-free WRITE 11\nCrash state:\njson_fixed_string\njson_RNUMBER_Header\ndwg_read_json\n```\n",
"id": "OSV-2024-384",
"modified": "2024-12-25T14:21:22.172697Z",
"published": "2024-04-30T00:12:26.560732Z",
"references": [
{
"type": "REPORT",
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=67528"
}
],
"schema_version": "1.6.0",
"summary": "Heap-use-after-free in json_fixed_string"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…