Source: binaryen
Version: 64-1
Severity: important
Tags: security upstream

Hi,

The following vulnerabilities were published for binaryen.

I was initially confused about the intersting versioning scheme, but
the issues are present in 64-1 and I think all of those fixed in 65
upstream (but please double-check the referenced upstream issues and
fixing commits as commited by upstream).

CVE-2019-7151[0]:
| A NULL pointer dereference was discovered in
| wasm::Module::getFunctionOrNull in wasm/wasm.cpp in Binaryen 1.38.22. A
| crafted input can cause segmentation faults, leading to
| denial-of-service, as demonstrated by wasm-opt.

CVE-2019-7152[1]:
| A heap-based buffer over-read was discovered in
| wasm::WasmBinaryBuilder::processFunctions() in wasm/wasm-binary.cpp
| (when calling wasm::WasmBinaryBuilder::getFunctionIndexName) in
| Binaryen 1.38.22. A crafted input can cause segmentation faults,
| leading to denial-of-service, as demonstrated by wasm-opt.

CVE-2019-7153[2]:
| A NULL pointer dereference was discovered in
| wasm::WasmBinaryBuilder::processFunctions() in wasm/wasm-binary.cpp
| (when calling wasm::WasmBinaryBuilder::getFunctionIndexName) in
| Binaryen 1.38.22. A crafted input can cause segmentation faults,
| leading to denial-of-service, as demonstrated by wasm-opt.

CVE-2019-7154[3]:
| The main function in tools/wasm2js.cpp in Binaryen 1.38.22 has a
| heap-based buffer overflow because Emscripten is misused, triggering an
| error in cashew::JSPrinter::printAst() in
| emscripten-optimizer/simple_ast.h. A crafted input can cause
| segmentation faults, leading to denial-of-service, as demonstrated by
| wasm2js.

If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2019-7151
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7151
[1] https://security-tracker.debian.org/tracker/CVE-2019-7152
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7152
[2] https://security-tracker.debian.org/tracker/CVE-2019-7153
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7153
[3] https://security-tracker.debian.org/tracker/CVE-2019-7154
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7154

Regards,
Salvatore

Reply via email to