You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Affected versions of this package are vulnerable to Integer Overflow or Wraparound via the function compress(char[] input) in Snappy.java due to improper validation of the array length.
Exploiting this vulnerability is possible when the “buf” array compiled by the maxCompressedLength function is successfully allocated but its size might be too small to use for the compression, causing a fatal Access Violation error.
Note:
The issue most likely won’t occur when using a byte array since creating a byte array of size 0x80000000 (or any other negative value) is impossible in the first place.
Overview
Affected versions of this package are vulnerable to Integer Overflow or Wraparound via the function
compress(char[] input)
inSnappy.java
due to improper validation of the array length.Exploiting this vulnerability is possible when the “buf” array compiled by the
maxCompressedLength
function is successfully allocated but its size might be too small to use for the compression, causing a fatal Access Violation error.Note:
The issue most likely won’t occur when using a byte array since creating a byte array of size 0x80000000 (or any other negative value) is impossible in the first place.
PoC
Remediation
Upgrade
org.xerial.snappy:snappy-java
to version 1.1.10.1 or higher.References
The text was updated successfully, but these errors were encountered: