[Hugin-devs] [Bug 1942836] Re: Potential Integer Overflow vulnerability in src/celeste/svm.cpp

2021-10-17 Thread tmodes
** Changed in: hugin
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Hugin
Developers, which is subscribed to Hugin.
https://bugs.launchpad.net/bugs/1942836

Title:
  Potential Integer Overflow vulnerability in src/celeste/svm.cpp

Status in Hugin:
  Fix Released

Bug description:
  In my fork of Hugin (Hugin++) someone reported the following potential
  vulnerability. Since I copied this code from Hugin, I forward the
  reporting here. I had a short look at the file svm.cpp and can confirm
  that an integer overflow may occure. On Windows variables of type
  'int' have only 32 bits. So a solution may be to test for
  model->nr_class <= 0x .

  This is the but report at Hugin++:

  There seems to be potential integer overflow vulnerability in 
src/celeste/svm.cpp.
  In line 2862, model->nr_class is read from external source.

  (2862) FSCANF(fp,"%d",&model->nr_class);
  ...
  (2867) int n = model->nr_class * (model->nr_class-1)/2;
  (2868) model->rho = Malloc(double,n);

  If model->nr_class is a large integer that can cause integer overflow in line 
2867,
  allocation of memory on 2868 may happen with unexpected value.

To manage notifications about this bug go to:
https://bugs.launchpad.net/hugin/+bug/1942836/+subscriptions


___
Mailing list: https://launchpad.net/~hugin-devs
Post to : hugin-devs@lists.launchpad.net
Unsubscribe : https://launchpad.net/~hugin-devs
More help   : https://help.launchpad.net/ListHelp


[Hugin-devs] [Bug 1942836] Re: Potential Integer Overflow vulnerability in src/celeste/svm.cpp

2021-10-16 Thread tmodes
Fixed in changeset eda0e338b594

** Changed in: hugin
   Status: New => Fix Committed

** Changed in: hugin
Milestone: None => 2021.0beta1

-- 
You received this bug notification because you are a member of Hugin
Developers, which is subscribed to Hugin.
https://bugs.launchpad.net/bugs/1942836

Title:
  Potential Integer Overflow vulnerability in src/celeste/svm.cpp

Status in Hugin:
  Fix Committed

Bug description:
  In my fork of Hugin (Hugin++) someone reported the following potential
  vulnerability. Since I copied this code from Hugin, I forward the
  reporting here. I had a short look at the file svm.cpp and can confirm
  that an integer overflow may occure. On Windows variables of type
  'int' have only 32 bits. So a solution may be to test for
  model->nr_class <= 0x .

  This is the but report at Hugin++:

  There seems to be potential integer overflow vulnerability in 
src/celeste/svm.cpp.
  In line 2862, model->nr_class is read from external source.

  (2862) FSCANF(fp,"%d",&model->nr_class);
  ...
  (2867) int n = model->nr_class * (model->nr_class-1)/2;
  (2868) model->rho = Malloc(double,n);

  If model->nr_class is a large integer that can cause integer overflow in line 
2867,
  allocation of memory on 2868 may happen with unexpected value.

To manage notifications about this bug go to:
https://bugs.launchpad.net/hugin/+bug/1942836/+subscriptions


___
Mailing list: https://launchpad.net/~hugin-devs
Post to : hugin-devs@lists.launchpad.net
Unsubscribe : https://launchpad.net/~hugin-devs
More help   : https://help.launchpad.net/ListHelp