idx
int64
project
string
commit_id
string
project_url
string
commit_url
string
commit_message
string
target
int64
func
string
func_hash
float64
file_name
string
file_hash
float64
cwe
list
cve
string
cve_desc
string
nvd_url
string
422,467
php-src
0e097f2c96ce31b16fa371981045f224e5a37160
https://github.com/php/php-src
https://github.com/php/php-src/commit/0e097f2c96ce31b16fa371981045f224e5a37160
Fixed bug #75535 The sizeof()s for Content-Length and Transfer-Encoding were missing the trailing ":". Apart from being generally wrong, this no longer verified that the header actually contains a colon, leading to the null http_header_value being used. Additionally, in the interest of being defensive, also make sure...
0
php_stream *php_stream_url_wrap_http_ex(php_stream_wrapper *wrapper, const char *path, const char *mode, int options, zend_string **opened_path, php_stream_context *context, int redirect_max, int flags STREAMS_DC) /* {{{ */ { php_stream *stream = NULL; php_url *resource = NULL; int use_ssl; int use_proxy = 0; ...
195,212,755,583,817,380,000,000,000,000,000,000,000
http_fopen_wrapper.c
109,969,581,101,881,980,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2018-14884
An issue was discovered in PHP 7.0.x before 7.0.27, 7.1.x before 7.1.13, and 7.2.x before 7.2.1. Inappropriately parsing an HTTP response leads to a segmentation fault because http_header_value in ext/standard/http_fopen_wrapper.c can be a NULL value that is mishandled in an atoi call.
https://nvd.nist.gov/vuln/detail/CVE-2018-14884
209,842
collectd
f6be4f9b49b949b379326c3d7002476e6ce4f211
https://github.com/collectd/collectd
https://github.com/collectd/collectd/commit/f6be4f9b49b949b379326c3d7002476e6ce4f211
network plugin: Fix endless loop DOS in parse_packet() When correct 'Signature part' is received by Collectd, configured without AuthFile option, condition for endless loop occurs due to missing increase of pointer to next unprocessed part. This is a forward-port of #2233. Fixes: CVE-2017-7401 Closes: #2174 Signed-o...
1
static int parse_part_sign_sha256(sockent_t *se, /* {{{ */ void **ret_buffer, size_t *ret_buffer_len, int flags) { static c_complain_t complain_no_users = C_COMPLAIN_INIT_STATIC; char *buffer; size_t buffer_len; size_t buffer_offset; size_t...
172,566,737,842,384,700,000,000,000,000,000,000,000
network.c
72,658,777,427,980,930,000,000,000,000,000,000,000
[ "CWE-835" ]
CVE-2017-7401
Incorrect interaction of the parse_packet() and parse_part_sign_sha256() functions in network.c in collectd 5.7.1 and earlier allows remote attackers to cause a denial of service (infinite loop) of a collectd instance (configured with "SecurityLevel None" and with empty "AuthFile" options) via a crafted UDP packet.
https://nvd.nist.gov/vuln/detail/CVE-2017-7401
422,481
collectd
f6be4f9b49b949b379326c3d7002476e6ce4f211
https://github.com/collectd/collectd
https://github.com/collectd/collectd/commit/f6be4f9b49b949b379326c3d7002476e6ce4f211
network plugin: Fix endless loop DOS in parse_packet() When correct 'Signature part' is received by Collectd, configured without AuthFile option, condition for endless loop occurs due to missing increase of pointer to next unprocessed part. This is a forward-port of #2233. Fixes: CVE-2017-7401 Closes: #2174 Signed-o...
0
static int parse_part_sign_sha256(sockent_t *se, /* {{{ */ void **ret_buffer, size_t *ret_buffer_len, int flags) { static c_complain_t complain_no_users = C_COMPLAIN_INIT_STATIC; char *buffer; size_t buffer_len; size_t buffer_offset; size_t...
26,885,811,817,121,940,000,000,000,000,000,000,000
network.c
323,039,824,554,894,080,000,000,000,000,000,000,000
[ "CWE-835" ]
CVE-2017-7401
Incorrect interaction of the parse_packet() and parse_part_sign_sha256() functions in network.c in collectd 5.7.1 and earlier allows remote attackers to cause a denial of service (infinite loop) of a collectd instance (configured with "SecurityLevel None" and with empty "AuthFile" options) via a crafted UDP packet.
https://nvd.nist.gov/vuln/detail/CVE-2017-7401
209,851
linux
27ae357fa82be5ab73b2ef8d39dcb8ca2563483a
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=27ae357fa82be5ab73b2ef8d39dcb8ca2563483a
mm, oom: fix concurrent munlock and oom reaper unmap, v3 Since exit_mmap() is done without the protection of mm->mmap_sem, it is possible for the oom reaper to concurrently operate on an mm until MMF_OOM_SKIP is set. This allows munlock_vma_pages_all() to concurrently run while the oom reaper is operating on a vma. ...
1
void exit_mmap(struct mm_struct *mm) { struct mmu_gather tlb; struct vm_area_struct *vma; unsigned long nr_accounted = 0; /* mm's last user has gone, and its about to be pulled down */ mmu_notifier_release(mm); if (mm->locked_vm) { vma = mm->mmap; while (vma) { if (vma->vm_flags & VM_LOCKED) munlock_...
177,202,878,318,483,350,000,000,000,000,000,000,000
mmap.c
63,206,378,993,348,060,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2018-1000200
The Linux Kernel versions 4.14, 4.15, and 4.16 has a null pointer dereference which can result in an out of memory (OOM) killing of large mlocked processes. The issue arises from an oom killed process's final thread calling exit_mmap(), which calls munlock_vma_pages_all() for mlocked vmas.This can happen synchronously ...
https://nvd.nist.gov/vuln/detail/CVE-2018-1000200
422,870
linux
27ae357fa82be5ab73b2ef8d39dcb8ca2563483a
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=27ae357fa82be5ab73b2ef8d39dcb8ca2563483a
mm, oom: fix concurrent munlock and oom reaper unmap, v3 Since exit_mmap() is done without the protection of mm->mmap_sem, it is possible for the oom reaper to concurrently operate on an mm until MMF_OOM_SKIP is set. This allows munlock_vma_pages_all() to concurrently run while the oom reaper is operating on a vma. ...
0
void exit_mmap(struct mm_struct *mm) { struct mmu_gather tlb; struct vm_area_struct *vma; unsigned long nr_accounted = 0; /* mm's last user has gone, and its about to be pulled down */ mmu_notifier_release(mm); if (unlikely(mm_is_oom_victim(mm))) { /* * Manually reap the mm to free as much memory as possib...
249,457,738,206,957,370,000,000,000,000,000,000,000
mmap.c
266,814,544,061,220,000,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2018-1000200
The Linux Kernel versions 4.14, 4.15, and 4.16 has a null pointer dereference which can result in an out of memory (OOM) killing of large mlocked processes. The issue arises from an oom killed process's final thread calling exit_mmap(), which calls munlock_vma_pages_all() for mlocked vmas.This can happen synchronously ...
https://nvd.nist.gov/vuln/detail/CVE-2018-1000200
209,854
linux
67f93df79aeefc3add4e4b31a752600f834236e2
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=67f93df79aeefc3add4e4b31a752600f834236e2
dccp: check sk for closed state in dccp_sendmsg() dccp_disconnect() sets 'dp->dccps_hc_tx_ccid' tx handler to NULL, therefore if DCCP socket is disconnected and dccp_sendmsg() is called after it, it will cause a NULL pointer dereference in dccp_write_xmit(). This crash and the reproducer was reported by syzbot. Looks...
1
int dccp_sendmsg(struct sock *sk, struct msghdr *msg, size_t len) { const struct dccp_sock *dp = dccp_sk(sk); const int flags = msg->msg_flags; const int noblock = flags & MSG_DONTWAIT; struct sk_buff *skb; int rc, size; long timeo; trace_dccp_probe(sk, len); if (len > dp->dccps_mss_cache) return -EMSGSIZE;...
193,288,749,399,592,100,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2018-1130
Linux kernel before version 4.16-rc7 is vulnerable to a null pointer dereference in dccp_write_xmit() function in net/dccp/output.c in that allows a local user to cause a denial of service by a number of certain crafted system calls.
https://nvd.nist.gov/vuln/detail/CVE-2018-1130
422,899
linux
67f93df79aeefc3add4e4b31a752600f834236e2
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=67f93df79aeefc3add4e4b31a752600f834236e2
dccp: check sk for closed state in dccp_sendmsg() dccp_disconnect() sets 'dp->dccps_hc_tx_ccid' tx handler to NULL, therefore if DCCP socket is disconnected and dccp_sendmsg() is called after it, it will cause a NULL pointer dereference in dccp_write_xmit(). This crash and the reproducer was reported by syzbot. Looks...
0
int dccp_sendmsg(struct sock *sk, struct msghdr *msg, size_t len) { const struct dccp_sock *dp = dccp_sk(sk); const int flags = msg->msg_flags; const int noblock = flags & MSG_DONTWAIT; struct sk_buff *skb; int rc, size; long timeo; trace_dccp_probe(sk, len); if (len > dp->dccps_mss_cache) return -EMSGSIZE;...
270,723,652,976,414,430,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2018-1130
Linux kernel before version 4.16-rc7 is vulnerable to a null pointer dereference in dccp_write_xmit() function in net/dccp/output.c in that allows a local user to cause a denial of service by a number of certain crafted system calls.
https://nvd.nist.gov/vuln/detail/CVE-2018-1130
209,855
ruby
bcc2421b4938fc1d9f5f3fb6ef2320571b27af42
https://github.com/ruby/ruby
https://github.com/ruby/ruby/commit/bcc2421b4938fc1d9f5f3fb6ef2320571b27af42
function.c: check arguments * ext/fiddle/function.c (initialize): check all arguments first. reported by Marcin 'Icewall' Noga of Cisco Talos. git-svn-id: svn+ssh://ci.ruby-lang.org/ruby/trunk@53082 b2dd03c8-39d4-4d8f-98ff-823fe69b080e
1
initialize(int argc, VALUE argv[], VALUE self) { ffi_cif * cif; ffi_type **arg_types; ffi_status result; VALUE ptr, args, ret_type, abi, kwds; long i; rb_scan_args(argc, argv, "31:", &ptr, &args, &ret_type, &abi, &kwds); if(NIL_P(abi)) abi = INT2NUM(FFI_DEFAULT_ABI); Check_Type(args, T...
239,802,879,057,867,750,000,000,000,000,000,000,000
function.c
133,362,304,003,608,210,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-2339
An exploitable heap overflow vulnerability exists in the Fiddle::Function.new "initialize" function functionality of Ruby. In Fiddle::Function.new "initialize" heap buffer "arg_types" allocation is made based on args array length. Specially constructed object passed as element of args array can increase this array size...
https://nvd.nist.gov/vuln/detail/CVE-2016-2339
422,916
ruby
bcc2421b4938fc1d9f5f3fb6ef2320571b27af42
https://github.com/ruby/ruby
https://github.com/ruby/ruby/commit/bcc2421b4938fc1d9f5f3fb6ef2320571b27af42
function.c: check arguments * ext/fiddle/function.c (initialize): check all arguments first. reported by Marcin 'Icewall' Noga of Cisco Talos. git-svn-id: svn+ssh://ci.ruby-lang.org/ruby/trunk@53082 b2dd03c8-39d4-4d8f-98ff-823fe69b080e
0
initialize(int argc, VALUE argv[], VALUE self) { ffi_cif * cif; ffi_type **arg_types, *rtype; ffi_status result; VALUE ptr, args, ret_type, abi, kwds; long i, len; int nabi; void *cfunc; rb_scan_args(argc, argv, "31:", &ptr, &args, &ret_type, &abi, &kwds); ptr = rb_Integer(ptr); ...
68,781,768,134,703,340,000,000,000,000,000,000,000
function.c
5,824,290,337,001,788,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-2339
An exploitable heap overflow vulnerability exists in the Fiddle::Function.new "initialize" function functionality of Ruby. In Fiddle::Function.new "initialize" heap buffer "arg_types" allocation is made based on args array length. Specially constructed object passed as element of args array can increase this array size...
https://nvd.nist.gov/vuln/detail/CVE-2016-2339
209,901
linux
40413955ee265a5e42f710940ec78f5450d49149
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=40413955ee265a5e42f710940ec78f5450d49149
Cipso: cipso_v4_optptr enter infinite loop in for(),if((optlen > 0) && (optptr[1] == 0)), enter infinite loop. Test: receive a packet which the ip length > 20 and the first byte of ip option is 0, produce this issue Signed-off-by: yujuan.qi <yujuan.qi@mediatek.com> Acked-by: Paul Moore <paul@paul-moore.com> Signed-o...
1
unsigned char *cipso_v4_optptr(const struct sk_buff *skb) { const struct iphdr *iph = ip_hdr(skb); unsigned char *optptr = (unsigned char *)&(ip_hdr(skb)[1]); int optlen; int taglen; for (optlen = iph->ihl*4 - sizeof(struct iphdr); optlen > 0; ) { if (optptr[0] == IPOPT_CIPSO) return optptr; taglen = optpt...
284,653,662,784,044,800,000,000,000,000,000,000,000
None
null
[ "CWE-835" ]
CVE-2018-10938
A flaw was found in the Linux kernel present since v4.0-rc1 and through v4.13-rc4. A crafted network packet sent remotely by an attacker may force the kernel to enter an infinite loop in the cipso_v4_optptr() function in net/ipv4/cipso_ipv4.c leading to a denial-of-service. A certain non-default configuration of LSM (L...
https://nvd.nist.gov/vuln/detail/CVE-2018-10938
423,532
linux
40413955ee265a5e42f710940ec78f5450d49149
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=40413955ee265a5e42f710940ec78f5450d49149
Cipso: cipso_v4_optptr enter infinite loop in for(),if((optlen > 0) && (optptr[1] == 0)), enter infinite loop. Test: receive a packet which the ip length > 20 and the first byte of ip option is 0, produce this issue Signed-off-by: yujuan.qi <yujuan.qi@mediatek.com> Acked-by: Paul Moore <paul@paul-moore.com> Signed-o...
0
unsigned char *cipso_v4_optptr(const struct sk_buff *skb) { const struct iphdr *iph = ip_hdr(skb); unsigned char *optptr = (unsigned char *)&(ip_hdr(skb)[1]); int optlen; int taglen; for (optlen = iph->ihl*4 - sizeof(struct iphdr); optlen > 0; ) { switch (optptr[0]) { case IPOPT_CIPSO: return optptr; cas...
282,880,649,645,293,870,000,000,000,000,000,000,000
None
null
[ "CWE-835" ]
CVE-2018-10938
A flaw was found in the Linux kernel present since v4.0-rc1 and through v4.13-rc4. A crafted network packet sent remotely by an attacker may force the kernel to enter an infinite loop in the cipso_v4_optptr() function in net/ipv4/cipso_ipv4.c leading to a denial-of-service. A certain non-default configuration of LSM (L...
https://nvd.nist.gov/vuln/detail/CVE-2018-10938
209,905
quagga
3f872fe60463a931c5c766dbf8c36870c0023e88
https://github.com/Quagga/quagga
http://git.savannah.gnu.org/gitweb/?p=quagga.git;a=commitdiff;h=3f872fe60463a931c5c766dbf8c36870c0023e88
ospfd: CVE-2013-2236, stack overrun in apiserver the OSPF API-server (exporting the LSDB and allowing announcement of Opaque-LSAs) writes past the end of fixed on-stack buffers. This leads to an exploitable stack overflow. For this condition to occur, the following two conditions must be true: - Quagga is configured...
1
new_msg_lsa_change_notify (u_char msgtype, u_int32_t seqnum, struct in_addr ifaddr, struct in_addr area_id, u_char is_self_originated, struct lsa_header *data) { u_char buf[OSPF_API_MAX_MSG_SIZE]; struct msg_lsa_change_notify *nmsg; int len; assert (data); nmsg = (struct msg_lsa_chan...
296,598,229,109,011,120,000,000,000,000,000,000,000
ospf_api.c
292,116,959,237,006,000,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-2236
Stack-based buffer overflow in the new_msg_lsa_change_notify function in the OSPFD API (ospf_api.c) in Quagga before 0.99.22.2, when --enable-opaque-lsa and the -a command line option are used, allows remote attackers to cause a denial of service (crash) via a large LSA.
https://nvd.nist.gov/vuln/detail/CVE-2013-2236
423,550
quagga
3f872fe60463a931c5c766dbf8c36870c0023e88
https://github.com/Quagga/quagga
http://git.savannah.gnu.org/gitweb/?p=quagga.git;a=commitdiff;h=3f872fe60463a931c5c766dbf8c36870c0023e88
ospfd: CVE-2013-2236, stack overrun in apiserver the OSPF API-server (exporting the LSDB and allowing announcement of Opaque-LSAs) writes past the end of fixed on-stack buffers. This leads to an exploitable stack overflow. For this condition to occur, the following two conditions must be true: - Quagga is configured...
0
new_msg_lsa_change_notify (u_char msgtype, u_int32_t seqnum, struct in_addr ifaddr, struct in_addr area_id, u_char is_self_originated, struct lsa_header *data) { u_char buf[OSPF_API_MAX_MSG_SIZE]; struct msg_lsa_change_notify *nmsg; int len; assert (data); nmsg = (struct msg_lsa_chan...
199,158,163,153,130,500,000,000,000,000,000,000,000
ospf_api.c
14,936,573,712,231,030,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-2236
Stack-based buffer overflow in the new_msg_lsa_change_notify function in the OSPFD API (ospf_api.c) in Quagga before 0.99.22.2, when --enable-opaque-lsa and the -a command line option are used, allows remote attackers to cause a denial of service (crash) via a large LSA.
https://nvd.nist.gov/vuln/detail/CVE-2013-2236
209,918
linux
362bca57f5d78220f8b5907b875961af9436e229
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=362bca57f5d78220f8b5907b875961af9436e229
ALSA: pcm: prevent UAF in snd_pcm_info When the device descriptor is closed, the `substream->runtime` pointer is freed. But another thread may be in the ioctl handler, case SNDRV_CTL_IOCTL_PCM_INFO. This case calls snd_pcm_info_user() which calls snd_pcm_info() which accesses the now freed `substream->runtime`. Note:...
1
static int snd_pcm_control_ioctl(struct snd_card *card, struct snd_ctl_file *control, unsigned int cmd, unsigned long arg) { switch (cmd) { case SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE: { int device; if (get_user(device, (int __user *)arg)) return -EFAULT; mutex_lock(&register_mutex); device = sn...
213,992,713,440,203,670,000,000,000,000,000,000,000
pcm.c
141,434,022,465,371,350,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2017-0861
Use-after-free vulnerability in the snd_pcm_info function in the ALSA subsystem in the Linux kernel allows attackers to gain privileges via unspecified vectors.
https://nvd.nist.gov/vuln/detail/CVE-2017-0861
424,189
linux
362bca57f5d78220f8b5907b875961af9436e229
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=362bca57f5d78220f8b5907b875961af9436e229
ALSA: pcm: prevent UAF in snd_pcm_info When the device descriptor is closed, the `substream->runtime` pointer is freed. But another thread may be in the ioctl handler, case SNDRV_CTL_IOCTL_PCM_INFO. This case calls snd_pcm_info_user() which calls snd_pcm_info() which accesses the now freed `substream->runtime`. Note:...
0
static int snd_pcm_control_ioctl(struct snd_card *card, struct snd_ctl_file *control, unsigned int cmd, unsigned long arg) { switch (cmd) { case SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE: { int device; if (get_user(device, (int __user *)arg)) return -EFAULT; mutex_lock(&register_mutex); device = sn...
25,446,867,703,928,335,000,000,000,000,000,000,000
pcm.c
27,394,811,321,313,830,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2017-0861
Use-after-free vulnerability in the snd_pcm_info function in the ALSA subsystem in the Linux kernel allows attackers to gain privileges via unspecified vectors.
https://nvd.nist.gov/vuln/detail/CVE-2017-0861
209,923
vim
143367256836b0f69881dc0c65ff165ae091dbc5
https://github.com/vim/vim
https://github.com/vim/vim/commit/143367256836b0f69881dc0c65ff165ae091dbc5
patch 8.2.4042: Vim9: build error Problem: Vim9: build error. Solution: Use grow array instead of character pointer.
1
exec_instructions(ectx_T *ectx) { int ret = FAIL; int save_trylevel_at_start = ectx->ec_trylevel_at_start; int dict_stack_len_at_start = dict_stack.ga_len; // Start execution at the first instruction. ectx->ec_iidx = 0; // Only catch exceptions in this instruction list. ectx->ec_tryleve...
170,785,015,866,798,960,000,000,000,000,000,000,000
vim9execute.c
276,451,646,520,435,980,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2022-0156
vim is vulnerable to Use After Free
https://nvd.nist.gov/vuln/detail/CVE-2022-0156
424,307
vim
143367256836b0f69881dc0c65ff165ae091dbc5
https://github.com/vim/vim
https://github.com/vim/vim/commit/143367256836b0f69881dc0c65ff165ae091dbc5
patch 8.2.4042: Vim9: build error Problem: Vim9: build error. Solution: Use grow array instead of character pointer.
0
exec_instructions(ectx_T *ectx) { int ret = FAIL; int save_trylevel_at_start = ectx->ec_trylevel_at_start; int dict_stack_len_at_start = dict_stack.ga_len; // Start execution at the first instruction. ectx->ec_iidx = 0; // Only catch exceptions in this instruction list. ectx->ec_tryleve...
259,954,459,626,822,550,000,000,000,000,000,000,000
vim9execute.c
176,513,784,089,982,730,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2022-0156
vim is vulnerable to Use After Free
https://nvd.nist.gov/vuln/detail/CVE-2022-0156
209,924
linux
5d6751eaff672ea77642e74e92e6c0ac7f9709ab
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5d6751eaff672ea77642e74e92e6c0ac7f9709ab
ath6kl: add some bounds checking The "ev->traffic_class" and "reply->ac" variables come from the network and they're used as an offset into the wmi->stream_exist_for_ac[] array. Those variables are u8 so they can be 0-255 but the stream_exist_for_ac[] array only has WMM_NUM_AC (4) elements. We need to add a couple bo...
1
static int ath6kl_wmi_pstream_timeout_event_rx(struct wmi *wmi, u8 *datap, int len) { struct wmi_pstream_timeout_event *ev; if (len < sizeof(struct wmi_pstream_timeout_event)) return -EINVAL; ev = (struct wmi_pstream_timeout_event *) datap; /* * When the pstream (fat pipe == AC) timesout, it mean...
255,312,127,974,884,330,000,000,000,000,000,000,000
wmi.c
260,882,522,128,854,800,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-15926
An issue was discovered in the Linux kernel before 5.2.3. Out of bounds access exists in the functions ath6kl_wmi_pstream_timeout_event_rx and ath6kl_wmi_cac_event_rx in the file drivers/net/wireless/ath/ath6kl/wmi.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-15926
424,409
linux
5d6751eaff672ea77642e74e92e6c0ac7f9709ab
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5d6751eaff672ea77642e74e92e6c0ac7f9709ab
ath6kl: add some bounds checking The "ev->traffic_class" and "reply->ac" variables come from the network and they're used as an offset into the wmi->stream_exist_for_ac[] array. Those variables are u8 so they can be 0-255 but the stream_exist_for_ac[] array only has WMM_NUM_AC (4) elements. We need to add a couple bo...
0
static int ath6kl_wmi_pstream_timeout_event_rx(struct wmi *wmi, u8 *datap, int len) { struct wmi_pstream_timeout_event *ev; if (len < sizeof(struct wmi_pstream_timeout_event)) return -EINVAL; ev = (struct wmi_pstream_timeout_event *) datap; if (ev->traffic_class >= WMM_NUM_AC) { ath6kl_err("invali...
324,189,157,098,818,840,000,000,000,000,000,000,000
wmi.c
271,638,234,349,830,970,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-15926
An issue was discovered in the Linux kernel before 5.2.3. Out of bounds access exists in the functions ath6kl_wmi_pstream_timeout_event_rx and ath6kl_wmi_cac_event_rx in the file drivers/net/wireless/ath/ath6kl/wmi.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-15926
209,925
linux
5d6751eaff672ea77642e74e92e6c0ac7f9709ab
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5d6751eaff672ea77642e74e92e6c0ac7f9709ab
ath6kl: add some bounds checking The "ev->traffic_class" and "reply->ac" variables come from the network and they're used as an offset into the wmi->stream_exist_for_ac[] array. Those variables are u8 so they can be 0-255 but the stream_exist_for_ac[] array only has WMM_NUM_AC (4) elements. We need to add a couple bo...
1
static int ath6kl_wmi_cac_event_rx(struct wmi *wmi, u8 *datap, int len, struct ath6kl_vif *vif) { struct wmi_cac_event *reply; struct ieee80211_tspec_ie *ts; u16 active_tsids, tsinfo; u8 tsid, index; u8 ts_id; if (len < sizeof(struct wmi_cac_event)) return -EINVAL; reply = (struct wmi_cac_event *) dat...
247,523,727,174,579,900,000,000,000,000,000,000,000
wmi.c
260,882,522,128,854,800,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-15926
An issue was discovered in the Linux kernel before 5.2.3. Out of bounds access exists in the functions ath6kl_wmi_pstream_timeout_event_rx and ath6kl_wmi_cac_event_rx in the file drivers/net/wireless/ath/ath6kl/wmi.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-15926
424,391
linux
5d6751eaff672ea77642e74e92e6c0ac7f9709ab
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5d6751eaff672ea77642e74e92e6c0ac7f9709ab
ath6kl: add some bounds checking The "ev->traffic_class" and "reply->ac" variables come from the network and they're used as an offset into the wmi->stream_exist_for_ac[] array. Those variables are u8 so they can be 0-255 but the stream_exist_for_ac[] array only has WMM_NUM_AC (4) elements. We need to add a couple bo...
0
static int ath6kl_wmi_cac_event_rx(struct wmi *wmi, u8 *datap, int len, struct ath6kl_vif *vif) { struct wmi_cac_event *reply; struct ieee80211_tspec_ie *ts; u16 active_tsids, tsinfo; u8 tsid, index; u8 ts_id; if (len < sizeof(struct wmi_cac_event)) return -EINVAL; reply = (struct wmi_cac_event *) dat...
118,777,259,687,429,640,000,000,000,000,000,000,000
wmi.c
271,638,234,349,830,970,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-15926
An issue was discovered in the Linux kernel before 5.2.3. Out of bounds access exists in the functions ath6kl_wmi_pstream_timeout_event_rx and ath6kl_wmi_cac_event_rx in the file drivers/net/wireless/ath/ath6kl/wmi.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-15926
209,934
libjpeg-turbo
c30b1e72dac76343ef9029833d1561de07d29bad
https://github.com/libjpeg-turbo/libjpeg-turbo
https://github.com/libjpeg-turbo/libjpeg-turbo/commit/c30b1e72dac76343ef9029833d1561de07d29bad
64-bit tjbench: Fix signed int overflow/segfault ... that occurred when attempting to decompress images with more than 715827882 (2048*1024*1024 / 3) pixels. Fixes #388
1
static int decomp(unsigned char *srcBuf, unsigned char **jpegBuf, unsigned long *jpegSize, unsigned char *dstBuf, int w, int h, int subsamp, int jpegQual, char *fileName, int tilew, int tileh) { char tempStr[1024], sizeStr[24] = "\0", qualStr[13] = "\0", *ptr; F...
37,264,389,053,365,870,000,000,000,000,000,000,000
tjbench.c
77,803,310,055,110,570,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2019-2201
In generate_jsimd_ycc_rgb_convert_neon of jsimd_arm64_neon.S, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution in an unprivileged process with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: A...
https://nvd.nist.gov/vuln/detail/CVE-2019-2201
424,544
libjpeg-turbo
c30b1e72dac76343ef9029833d1561de07d29bad
https://github.com/libjpeg-turbo/libjpeg-turbo
https://github.com/libjpeg-turbo/libjpeg-turbo/commit/c30b1e72dac76343ef9029833d1561de07d29bad
64-bit tjbench: Fix signed int overflow/segfault ... that occurred when attempting to decompress images with more than 715827882 (2048*1024*1024 / 3) pixels. Fixes #388
0
static int decomp(unsigned char *srcBuf, unsigned char **jpegBuf, unsigned long *jpegSize, unsigned char *dstBuf, int w, int h, int subsamp, int jpegQual, char *fileName, int tilew, int tileh) { char tempStr[1024], sizeStr[24] = "\0", qualStr[13] = "\0", *ptr; F...
106,072,224,607,742,170,000,000,000,000,000,000,000
tjbench.c
63,243,249,166,194,320,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2019-2201
In generate_jsimd_ycc_rgb_convert_neon of jsimd_arm64_neon.S, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution in an unprivileged process with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: A...
https://nvd.nist.gov/vuln/detail/CVE-2019-2201
209,940
util-linux
1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
sys-utils/ipcutils: be careful when call calloc() for uint64 nmembs Fix: https://github.com/karelzak/util-linux/issues/1395 Signed-off-by: Karel Zak <kzak@redhat.com>
1
static void get_sem_elements(struct sem_data *p) { size_t i; if (!p || !p->sem_nsems || p->sem_perm.id < 0) return; p->elements = xcalloc(p->sem_nsems, sizeof(struct sem_elem)); for (i = 0; i < p->sem_nsems; i++) { struct sem_elem *e = &p->elements[i]; union semun arg = { .val = 0 }; e->semval = semctl(...
170,441,631,111,588,500,000,000,000,000,000,000,000
ipcutils.c
71,522,051,511,659,700,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2021-37600
An integer overflow in util-linux through 2.37.1 can potentially cause a buffer overflow if an attacker were able to use system resources in a way that leads to a large number in the /proc/sysvipc/sem file. NOTE: this is unexploitable in GNU C Library environments, and possibly in all realistic environments
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
424,556
util-linux
1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
sys-utils/ipcutils: be careful when call calloc() for uint64 nmembs Fix: https://github.com/karelzak/util-linux/issues/1395 Signed-off-by: Karel Zak <kzak@redhat.com>
0
static void get_sem_elements(struct sem_data *p) { size_t i; if (!p || !p->sem_nsems || p->sem_nsems > SIZE_MAX || p->sem_perm.id < 0) return; p->elements = xcalloc(p->sem_nsems, sizeof(struct sem_elem)); for (i = 0; i < p->sem_nsems; i++) { struct sem_elem *e = &p->elements[i]; union semun arg = { .val = ...
304,086,453,175,303,660,000,000,000,000,000,000,000
ipcutils.c
296,284,701,655,201,040,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2021-37600
An integer overflow in util-linux through 2.37.1 can potentially cause a buffer overflow if an attacker were able to use system resources in a way that leads to a large number in the /proc/sysvipc/sem file. NOTE: this is unexploitable in GNU C Library environments, and possibly in all realistic environments
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
209,948
linux
9d47964bfd471f0dd4c89f28556aec68bffa0020
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9d47964bfd471f0dd4c89f28556aec68bffa0020
iio: ad5755: fix off-by-one on devnr limit check The comparison for devnr limits is off-by-one, the current check allows 0 to AD5755_NUM_CHANNELS and the limit should be in fact 0 to AD5755_NUM_CHANNELS - 1. This can lead to an out of bounds write to pdata->dac[devnr]. Fix this by replacing > with >= on the compariso...
1
static struct ad5755_platform_data *ad5755_parse_dt(struct device *dev) { struct device_node *np = dev->of_node; struct device_node *pp; struct ad5755_platform_data *pdata; unsigned int tmp; unsigned int tmparray[3]; int devnr, i; pdata = devm_kzalloc(dev, sizeof(*pdata), GFP_KERNEL); if (!pdata) return NULL...
56,250,680,520,601,260,000,000,000,000,000,000,000
ad5755.c
136,682,195,847,664,540,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2016-10907
An issue was discovered in drivers/iio/dac/ad5755.c in the Linux kernel before 4.8.6. There is an out of bounds write in the function ad5755_parse_dt.
https://nvd.nist.gov/vuln/detail/CVE-2016-10907
424,716
linux
9d47964bfd471f0dd4c89f28556aec68bffa0020
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9d47964bfd471f0dd4c89f28556aec68bffa0020
iio: ad5755: fix off-by-one on devnr limit check The comparison for devnr limits is off-by-one, the current check allows 0 to AD5755_NUM_CHANNELS and the limit should be in fact 0 to AD5755_NUM_CHANNELS - 1. This can lead to an out of bounds write to pdata->dac[devnr]. Fix this by replacing > with >= on the compariso...
0
static struct ad5755_platform_data *ad5755_parse_dt(struct device *dev) { struct device_node *np = dev->of_node; struct device_node *pp; struct ad5755_platform_data *pdata; unsigned int tmp; unsigned int tmparray[3]; int devnr, i; pdata = devm_kzalloc(dev, sizeof(*pdata), GFP_KERNEL); if (!pdata) return NULL...
64,352,422,978,470,810,000,000,000,000,000,000,000
ad5755.c
81,975,837,985,455,370,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2016-10907
An issue was discovered in drivers/iio/dac/ad5755.c in the Linux kernel before 4.8.6. There is an out of bounds write in the function ad5755_parse_dt.
https://nvd.nist.gov/vuln/detail/CVE-2016-10907
209,952
php-src
fe13566c93f118a15a96320a546c7878fd0cfc5e
https://github.com/php/php-src
https://git.php.net/?p=php-src.git;a=commit;h=fe13566c93f118a15a96320a546c7878fd0cfc5e
Fixed bug #71527 Buffer over-write in finfo_open with malformed magic file The actual fix is applying the upstream patch from https://github.com/file/file/commit/6713ca45e7757297381f4b4cdb9cf5e624a9ad36
1
file_check_mem(struct magic_set *ms, unsigned int level) { size_t len; if (level >= ms->c.len) { len = (ms->c.len += 20) * sizeof(*ms->c.li); ms->c.li = CAST(struct level_info *, (ms->c.li == NULL) ? emalloc(len) : erealloc(ms->c.li, len)); if (ms->c.li == NULL) { file_oomem(ms, len); return ...
266,010,842,088,610,330,000,000,000,000,000,000,000
funcs.c
157,823,946,646,046,020,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2015-8865
The file_check_mem function in funcs.c in file before 5.23, as used in the Fileinfo component in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5, mishandles continuation-level jumps, which allows context-dependent attackers to cause a denial of service (buffer overflow and application crash) or possibly ex...
https://nvd.nist.gov/vuln/detail/CVE-2015-8865
424,879
php-src
fe13566c93f118a15a96320a546c7878fd0cfc5e
https://github.com/php/php-src
https://git.php.net/?p=php-src.git;a=commit;h=fe13566c93f118a15a96320a546c7878fd0cfc5e
Fixed bug #71527 Buffer over-write in finfo_open with malformed magic file The actual fix is applying the upstream patch from https://github.com/file/file/commit/6713ca45e7757297381f4b4cdb9cf5e624a9ad36
0
file_check_mem(struct magic_set *ms, unsigned int level) { size_t len; if (level >= ms->c.len) { len = (ms->c.len += 20 + level) * sizeof(*ms->c.li); ms->c.li = CAST(struct level_info *, (ms->c.li == NULL) ? emalloc(len) : erealloc(ms->c.li, len)); if (ms->c.li == NULL) { file_oomem(ms, len); ...
145,272,772,843,137,940,000,000,000,000,000,000,000
funcs.c
336,168,117,303,982,360,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2015-8865
The file_check_mem function in funcs.c in file before 5.23, as used in the Fileinfo component in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5, mishandles continuation-level jumps, which allows context-dependent attackers to cause a denial of service (buffer overflow and application crash) or possibly ex...
https://nvd.nist.gov/vuln/detail/CVE-2015-8865
209,953
qemu
66fed30c9cd11854fc878a4eceb507e915d7c9cd
https://github.com/bonzini/qemu
https://gitlab.com/qemu-project/qemu/-/commit/66fed30c9cd11854fc878a4eceb507e915d7c9cd
block/mirror: fix NULL pointer dereference in mirror_wait_on_conflicts() In mirror_iteration() we call mirror_wait_on_conflicts() with `self` parameter set to NULL. Starting from commit d44dae1a7c we dereference `self` pointer in mirror_wait_on_conflicts() without checks if it is not NULL. Backtrace: Program termi...
1
static void coroutine_fn mirror_wait_on_conflicts(MirrorOp *self, MirrorBlockJob *s, uint64_t offset, uint64_t bytes) { uint64_t self_start_chunk = offset / s->granul...
152,620,353,773,762,620,000,000,000,000,000,000,000
mirror.c
32,597,853,944,157,900,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2021-4145
A NULL pointer dereference issue was found in the block mirror layer of QEMU in versions prior to 6.2.0. The `self` pointer is dereferenced in mirror_wait_on_conflicts() without ensuring that it's not NULL. A malicious unprivileged user within the guest could use this flaw to crash the QEMU process on the host when wri...
https://nvd.nist.gov/vuln/detail/CVE-2021-4145
424,885
qemu
66fed30c9cd11854fc878a4eceb507e915d7c9cd
https://github.com/bonzini/qemu
https://gitlab.com/qemu-project/qemu/-/commit/66fed30c9cd11854fc878a4eceb507e915d7c9cd
block/mirror: fix NULL pointer dereference in mirror_wait_on_conflicts() In mirror_iteration() we call mirror_wait_on_conflicts() with `self` parameter set to NULL. Starting from commit d44dae1a7c we dereference `self` pointer in mirror_wait_on_conflicts() without checks if it is not NULL. Backtrace: Program termi...
0
static void coroutine_fn mirror_wait_on_conflicts(MirrorOp *self, MirrorBlockJob *s, uint64_t offset, uint64_t bytes) { uint64_t self_start_chunk = offset / s->granul...
297,176,504,112,059,100,000,000,000,000,000,000,000
mirror.c
265,966,095,624,000,800,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2021-4145
A NULL pointer dereference issue was found in the block mirror layer of QEMU in versions prior to 6.2.0. The `self` pointer is dereferenced in mirror_wait_on_conflicts() without ensuring that it's not NULL. A malicious unprivileged user within the guest could use this flaw to crash the QEMU process on the host when wri...
https://nvd.nist.gov/vuln/detail/CVE-2021-4145
209,956
file
6bf45271eb8e0e6577b92042ce2003ba998d1686
https://github.com/file/file
https://github.com/file/file/commit/6bf45271eb8e0e6577b92042ce2003ba998d1686
Don't bail if there was no error, buf could have been NULL on entry.
1
private int mget(struct magic_set *ms, const unsigned char *s, struct magic *m, size_t nbytes, size_t o, unsigned int cont_level, int mode, int text, int flip, uint16_t indir_level, uint16_t *name_count, int *printed_something, int *need_separator, int *returnval) { uint32_t offset = ms->offset; uint32_t...
144,725,179,800,442,630,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2014-8116
The ELF parser (readelf.c) in file before 5.21 allows remote attackers to cause a denial of service (CPU consumption or crash) via a large number of (1) program or (2) section headers or (3) invalid capabilities.
https://nvd.nist.gov/vuln/detail/CVE-2014-8116
424,985
file
6bf45271eb8e0e6577b92042ce2003ba998d1686
https://github.com/file/file
https://github.com/file/file/commit/6bf45271eb8e0e6577b92042ce2003ba998d1686
Don't bail if there was no error, buf could have been NULL on entry.
0
private int mget(struct magic_set *ms, const unsigned char *s, struct magic *m, size_t nbytes, size_t o, unsigned int cont_level, int mode, int text, int flip, uint16_t indir_level, uint16_t *name_count, int *printed_something, int *need_separator, int *returnval) { uint32_t offset = ms->offset; uint32_t...
156,487,328,448,359,160,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2014-8116
The ELF parser (readelf.c) in file before 5.21 allows remote attackers to cause a denial of service (CPU consumption or crash) via a large number of (1) program or (2) section headers or (3) invalid capabilities.
https://nvd.nist.gov/vuln/detail/CVE-2014-8116
209,960
cryptopp
07dbcc3d9644b18e05c1776db2a57fe04d780965
https://github.com/weidai11/cryptopp
https://github.com/weidai11/cryptopp/commit/07dbcc3d9644b18e05c1776db2a57fe04d780965
Add Inflator::BadDistanceErr exception (Issue 414) The improved validation and excpetion clears the Address Sanitizer and Undefined Behavior Sanitizer findings
1
bool Inflator::DecodeBody() { bool blockEnd = false; switch (m_blockType) { case 0: // stored CRYPTOPP_ASSERT(m_reader.BitsBuffered() == 0); while (!m_inQueue.IsEmpty() && !blockEnd) { size_t size; const byte *block = m_inQueue.Spy(size); size = UnsignedMin(m_storedLen, size); CRYPTOPP...
94,232,605,521,517,100,000,000,000,000,000,000,000
zinflate.cpp
209,525,460,366,186,800,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2017-9434
Crypto++ (aka cryptopp) through 5.6.5 contains an out-of-bounds read vulnerability in zinflate.cpp in the Inflator filter.
https://nvd.nist.gov/vuln/detail/CVE-2017-9434
425,103
cryptopp
07dbcc3d9644b18e05c1776db2a57fe04d780965
https://github.com/weidai11/cryptopp
https://github.com/weidai11/cryptopp/commit/07dbcc3d9644b18e05c1776db2a57fe04d780965
Add Inflator::BadDistanceErr exception (Issue 414) The improved validation and excpetion clears the Address Sanitizer and Undefined Behavior Sanitizer findings
0
bool Inflator::DecodeBody() { bool blockEnd = false; switch (m_blockType) { case 0: // stored CRYPTOPP_ASSERT(m_reader.BitsBuffered() == 0); while (!m_inQueue.IsEmpty() && !blockEnd) { size_t size; const byte *block = m_inQueue.Spy(size); size = UnsignedMin(m_storedLen, size); CRYPTOPP...
76,412,772,858,822,270,000,000,000,000,000,000,000
zinflate.cpp
291,771,027,182,274,000,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2017-9434
Crypto++ (aka cryptopp) through 5.6.5 contains an out-of-bounds read vulnerability in zinflate.cpp in the Inflator filter.
https://nvd.nist.gov/vuln/detail/CVE-2017-9434
209,963
ImageMagick
4e8c2ed53fcb54a34b3a6185b2584f26cf6874a3
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/4e8c2ed53fcb54a34b3a6185b2584f26cf6874a3
https://github.com/ImageMagick/ImageMagick/issues/312
1
MagickExport Image *ReadStream(const ImageInfo *image_info,StreamHandler stream, ExceptionInfo *exception) { CacheMethods cache_methods; Image *image; ImageInfo *read_info; /* Stream image pixels. */ assert(image_info != (ImageInfo *) NULL); assert(image_info->signature == MagickCoreS...
45,772,750,779,497,700,000,000,000,000,000,000,000
stream.c
109,589,651,424,425,170,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-9773
Heap-based buffer overflow in the IsPixelGray function in MagickCore/pixel-accessor.h in ImageMagick 7.0.3.8 allows remote attackers to cause a denial of service (out-of-bounds heap read) via a crafted image file. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9556.
https://nvd.nist.gov/vuln/detail/CVE-2016-9773
425,232
ImageMagick
4e8c2ed53fcb54a34b3a6185b2584f26cf6874a3
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/4e8c2ed53fcb54a34b3a6185b2584f26cf6874a3
https://github.com/ImageMagick/ImageMagick/issues/312
0
MagickExport Image *ReadStream(const ImageInfo *image_info,StreamHandler stream, ExceptionInfo *exception) { CacheMethods cache_methods; Image *image; ImageInfo *read_info; /* Stream image pixels. */ assert(image_info != (ImageInfo *) NULL); assert(image_info->signature == MagickCoreS...
145,678,503,538,518,900,000,000,000,000,000,000,000
stream.c
201,159,244,824,274,160,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-9773
Heap-based buffer overflow in the IsPixelGray function in MagickCore/pixel-accessor.h in ImageMagick 7.0.3.8 allows remote attackers to cause a denial of service (out-of-bounds heap read) via a crafted image file. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9556.
https://nvd.nist.gov/vuln/detail/CVE-2016-9773
209,966
libguestfs
fa6a76050d82894365dfe32916903ef7fee3ffcd
https://github.com/libguestfs/libguestfs
https://github.com/libguestfs/libguestfs/commit/fa6a76050d82894365dfe32916903ef7fee3ffcd
inspection: Fix double-free when certain guest files are empty. The following commit: commit 5a3da366268825b26b470cde35658b67c1d11cd4 Author: Richard W.M. Jones <rjones@redhat.com> Date: Thu Jan 24 17:07:38 2013 +0000 inspect: Use CLEANUP_* macros in inspection code. can cause a double-free along an e...
1
guestfs___first_line_of_file (guestfs_h *g, const char *filename) { CLEANUP_FREE char **lines = NULL; /* sic: not CLEANUP_FREE_STRING_LIST */ int64_t size; char *ret; /* Don't trust guestfs_head_n not to break with very large files. * Check the file size is something reasonable first. */ size = guestfs...
98,819,971,629,326,500,000,000,000,000,000,000,000
inspect-fs.c
19,876,737,490,696,600,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2013-2124
Double free vulnerability in inspect-fs.c in LibguestFS 1.20.x before 1.20.7, 1.21.x, 1.22.0, and 1.23.0 allows remote attackers to cause a denial of service (crash) via empty guest files.
https://nvd.nist.gov/vuln/detail/CVE-2013-2124
425,254
libguestfs
fa6a76050d82894365dfe32916903ef7fee3ffcd
https://github.com/libguestfs/libguestfs
https://github.com/libguestfs/libguestfs/commit/fa6a76050d82894365dfe32916903ef7fee3ffcd
inspection: Fix double-free when certain guest files are empty. The following commit: commit 5a3da366268825b26b470cde35658b67c1d11cd4 Author: Richard W.M. Jones <rjones@redhat.com> Date: Thu Jan 24 17:07:38 2013 +0000 inspect: Use CLEANUP_* macros in inspection code. can cause a double-free along an e...
0
guestfs___first_line_of_file (guestfs_h *g, const char *filename) { char **lines = NULL; /* sic: not CLEANUP_FREE_STRING_LIST */ int64_t size; char *ret; /* Don't trust guestfs_head_n not to break with very large files. * Check the file size is something reasonable first. */ size = guestfs_filesize (g,...
175,185,998,241,587,300,000,000,000,000,000,000,000
inspect-fs.c
198,438,182,971,958,030,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2013-2124
Double free vulnerability in inspect-fs.c in LibguestFS 1.20.x before 1.20.7, 1.21.x, 1.22.0, and 1.23.0 allows remote attackers to cause a denial of service (crash) via empty guest files.
https://nvd.nist.gov/vuln/detail/CVE-2013-2124
209,988
abrt
7a47f57975be0d285a2f20758e4572dca6d9cdd3
https://github.com/abrt/abrt
https://github.com/abrt/abrt/commit/7a47f57975be0d285a2f20758e4572dca6d9cdd3
dbus: validate parameters of all calls SetElement and DeleteElement were missing check for valid dump directory path. FindProblemByElementInTimeRange was not reporting invalid element names. Related: #1214451 Signed-off-by: Jakub Filak <jfilak@redhat.com>
1
static void handle_method_call(GDBusConnection *connection, const gchar *caller, const gchar *object_path, const gchar *interface_name, const gchar *method_name, GVariant *parameters, ...
100,351,926,321,358,460,000,000,000,000,000,000,000
abrt-dbus.c
315,752,460,944,822,100,000,000,000,000,000,000,000
[ "CWE-22" ]
CVE-2015-3151
Directory traversal vulnerability in abrt-dbus in Automatic Bug Reporting Tool (ABRT) allows local users to read, write to, or change ownership of arbitrary files via unspecified vectors to the (1) NewProblem, (2) GetInfo, (3) SetElement, or (4) DeleteElement method.
https://nvd.nist.gov/vuln/detail/CVE-2015-3151
425,886
abrt
7a47f57975be0d285a2f20758e4572dca6d9cdd3
https://github.com/abrt/abrt
https://github.com/abrt/abrt/commit/7a47f57975be0d285a2f20758e4572dca6d9cdd3
dbus: validate parameters of all calls SetElement and DeleteElement were missing check for valid dump directory path. FindProblemByElementInTimeRange was not reporting invalid element names. Related: #1214451 Signed-off-by: Jakub Filak <jfilak@redhat.com>
0
static void handle_method_call(GDBusConnection *connection, const gchar *caller, const gchar *object_path, const gchar *interface_name, const gchar *method_name, GVariant *parameters, ...
59,492,872,686,855,410,000,000,000,000,000,000,000
None
null
[ "CWE-22" ]
CVE-2015-3151
Directory traversal vulnerability in abrt-dbus in Automatic Bug Reporting Tool (ABRT) allows local users to read, write to, or change ownership of arbitrary files via unspecified vectors to the (1) NewProblem, (2) GetInfo, (3) SetElement, or (4) DeleteElement method.
https://nvd.nist.gov/vuln/detail/CVE-2015-3151
210,027
vim
1540d334a04d874c2aa9d26b82dbbcd4bc5a78de
https://github.com/vim/vim
https://github.com/vim/vim/commit/1540d334a04d874c2aa9d26b82dbbcd4bc5a78de
patch 9.0.0404: crash when passing invalid arguments to assert_fails() Problem: Crash when passing invalid arguments to assert_fails(). Solution: Check for NULL string.
1
f_assert_fails(typval_T *argvars, typval_T *rettv) { char_u *cmd; garray_T ga; int save_trylevel = trylevel; int called_emsg_before = called_emsg; char *wrong_arg_msg = NULL; char_u *tofree = NULL; if (check_for_string_or_number_arg(argvars, 0) == FAIL || check_for_opt_string_or_list...
69,810,070,614,522,880,000,000,000,000,000,000,000
testing.c
167,589,814,257,940,900,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2022-3153
NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0404.
https://nvd.nist.gov/vuln/detail/CVE-2022-3153
426,757
vim
1540d334a04d874c2aa9d26b82dbbcd4bc5a78de
https://github.com/vim/vim
https://github.com/vim/vim/commit/1540d334a04d874c2aa9d26b82dbbcd4bc5a78de
patch 9.0.0404: crash when passing invalid arguments to assert_fails() Problem: Crash when passing invalid arguments to assert_fails(). Solution: Check for NULL string.
0
f_assert_fails(typval_T *argvars, typval_T *rettv) { char_u *cmd; garray_T ga; int save_trylevel = trylevel; int called_emsg_before = called_emsg; char *wrong_arg_msg = NULL; char_u *tofree = NULL; if (check_for_string_or_number_arg(argvars, 0) == FAIL || check_for_opt_string_or_list...
306,153,550,251,838,800,000,000,000,000,000,000,000
testing.c
163,762,640,026,672,990,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2022-3153
NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0404.
https://nvd.nist.gov/vuln/detail/CVE-2022-3153
210,031
libmatroska
0a2d3e3644a7453b6513db2f9bc270f77943573f
https://github.com/Matroska-Org/libmatroska
https://github.com/Matroska-Org/libmatroska/commit/0a2d3e3644a7453b6513db2f9bc270f77943573f
KaxBlockInternal: check EBML lace sizes against available buffer space
1
filepos_t KaxInternalBlock::ReadData(IOCallback & input, ScopeMode ReadFully) { filepos_t Result; FirstFrameLocation = input.getFilePointer(); // will be updated accordingly below SetValueIsSet(false); try { if (ReadFully == SCOPE_ALL_DATA) { Result = EbmlBinary::ReadData(input, ReadFully); i...
328,185,357,815,949,970,000,000,000,000,000,000,000
KaxBlock.cpp
205,483,175,938,590,400,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2015-8792
The KaxInternalBlock::ReadData function in libMatroska before 1.4.4 allows context-dependent attackers to obtain sensitive information from process heap memory via crafted EBML lacing, which triggers an invalid memory access.
https://nvd.nist.gov/vuln/detail/CVE-2015-8792
426,787
libmatroska
0a2d3e3644a7453b6513db2f9bc270f77943573f
https://github.com/Matroska-Org/libmatroska
https://github.com/Matroska-Org/libmatroska/commit/0a2d3e3644a7453b6513db2f9bc270f77943573f
KaxBlockInternal: check EBML lace sizes against available buffer space
0
filepos_t KaxInternalBlock::ReadData(IOCallback & input, ScopeMode ReadFully) { filepos_t Result; FirstFrameLocation = input.getFilePointer(); // will be updated accordingly below SetValueIsSet(false); try { if (ReadFully == SCOPE_ALL_DATA) { Result = EbmlBinary::ReadData(input, ReadFully); i...
278,440,178,592,032,700,000,000,000,000,000,000,000
KaxBlock.cpp
232,676,353,705,417,100,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2015-8792
The KaxInternalBlock::ReadData function in libMatroska before 1.4.4 allows context-dependent attackers to obtain sensitive information from process heap memory via crafted EBML lacing, which triggers an invalid memory access.
https://nvd.nist.gov/vuln/detail/CVE-2015-8792
210,032
curl
57d299a499155d4b327e341c6024e293b0418243
https://github.com/curl/curl
https://github.com/curl/curl/commit/57d299a499155d4b327e341c6024e293b0418243
Curl_ntlm_core_mk_nt_hash: return error on too long password ... since it would cause an integer overflow if longer than (max size_t / 2). This is CVE-2018-14618 Bug: https://curl.haxx.se/docs/CVE-2018-14618.html Closes #2756 Reported-by: Zhaoyang Wu
1
CURLcode Curl_ntlm_core_mk_nt_hash(struct Curl_easy *data, const char *password, unsigned char *ntbuffer /* 21 bytes */) { size_t len = strlen(password); unsigned char *pw = len ? malloc(len * 2) : strdup(""); CURLcode result; if(!pw) ret...
246,028,622,315,980,050,000,000,000,000,000,000,000
curl_ntlm_core.c
52,159,382,053,127,950,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2018-14618
curl before version 7.61.1 is vulnerable to a buffer overrun in the NTLM authentication code. The internal function Curl_ntlm_core_mk_nt_hash multiplies the length of the password by two (SUM) to figure out how large temporary storage area to allocate from the heap. The length value is then subsequently used to iterate...
https://nvd.nist.gov/vuln/detail/CVE-2018-14618
426,834
curl
57d299a499155d4b327e341c6024e293b0418243
https://github.com/curl/curl
https://github.com/curl/curl/commit/57d299a499155d4b327e341c6024e293b0418243
Curl_ntlm_core_mk_nt_hash: return error on too long password ... since it would cause an integer overflow if longer than (max size_t / 2). This is CVE-2018-14618 Bug: https://curl.haxx.se/docs/CVE-2018-14618.html Closes #2756 Reported-by: Zhaoyang Wu
0
CURLcode Curl_ntlm_core_mk_nt_hash(struct Curl_easy *data, const char *password, unsigned char *ntbuffer /* 21 bytes */) { size_t len = strlen(password); unsigned char *pw; CURLcode result; if(len > SIZE_T_MAX/2) /* avoid integer overflow */ ...
34,167,254,624,175,040,000,000,000,000,000,000,000
curl_ntlm_core.c
278,846,732,746,566,240,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2018-14618
curl before version 7.61.1 is vulnerable to a buffer overrun in the NTLM authentication code. The internal function Curl_ntlm_core_mk_nt_hash multiplies the length of the password by two (SUM) to figure out how large temporary storage area to allocate from the heap. The length value is then subsequently used to iterate...
https://nvd.nist.gov/vuln/detail/CVE-2018-14618
210,045
gnutls
422214868061370aeeb0ac9cd0f021a5c350a57d
http://git.savannah.gnu.org/cgit/gnutls
http://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commitdiff;h=422214868061370aeeb0ac9cd0f021a5c350a57d
better check decrypted data.
1
_gnutls_ciphertext2compressed (gnutls_session_t session, opaque * compress_data, int compress_size, gnutls_datum_t ciphertext, uint8_t type, record_parameters_st * params) { uint8_t MAC[MAX_HASH...
330,753,552,687,931,640,000,000,000,000,000,000,000
gnutls_cipher.c
257,844,051,454,448,900,000,000,000,000,000,000,000
[ "CWE-310" ]
CVE-2012-1573
gnutls_cipher.c in libgnutls in GnuTLS before 2.12.17 and 3.x before 3.0.15 does not properly handle data encrypted with a block cipher, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) via a crafted record, as demonstrated by a crafted GenericBlockCipher structu...
https://nvd.nist.gov/vuln/detail/CVE-2012-1573
427,138
gnutls
422214868061370aeeb0ac9cd0f021a5c350a57d
http://git.savannah.gnu.org/cgit/gnutls
http://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commitdiff;h=422214868061370aeeb0ac9cd0f021a5c350a57d
better check decrypted data.
0
_gnutls_ciphertext2compressed (gnutls_session_t session, opaque * compress_data, int compress_size, gnutls_datum_t ciphertext, uint8_t type, record_parameters_st * params) { uint8_t MAC[MAX_HASH...
239,939,678,531,995,060,000,000,000,000,000,000,000
gnutls_cipher.c
19,252,326,960,755,906,000,000,000,000,000,000,000
[ "CWE-310" ]
CVE-2012-1573
gnutls_cipher.c in libgnutls in GnuTLS before 2.12.17 and 3.x before 3.0.15 does not properly handle data encrypted with a block cipher, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) via a crafted record, as demonstrated by a crafted GenericBlockCipher structu...
https://nvd.nist.gov/vuln/detail/CVE-2012-1573
210,052
php-src
aab49e934de1fff046e659cbec46e3d053b41c34
https://github.com/php/php-src
http://git.php.net/?p=php-src.git;a=commitdiff;h=aab49e934de1fff046e659cbec46e3d053b41c34
fix CVE-2012-2143
1
_crypt_extended_r(const char *key, const char *setting, struct php_crypt_extended_data *data) { int i; uint32_t count, salt, l, r0, r1, keybuf[2]; u_char *p, *q; if (!data->initialized) des_init_local(data); /* * Copy the key, shifting each character up by one bit * and padding with zeros. */ q = (u_...
104,022,331,130,536,540,000,000,000,000,000,000,000
crypt_freesec.c
97,216,296,302,259,500,000,000,000,000,000,000,000
[ "CWE-310" ]
CVE-2012-2143
The crypt_des (aka DES-based crypt) function in FreeBSD before 9.0-RELEASE-p2, as used in PHP, PostgreSQL, and other products, does not process the complete cleartext password if this password contains a 0x80 character, which makes it easier for context-dependent attackers to obtain access via an authentication attempt...
https://nvd.nist.gov/vuln/detail/CVE-2012-2143
427,252
php-src
aab49e934de1fff046e659cbec46e3d053b41c34
https://github.com/php/php-src
http://git.php.net/?p=php-src.git;a=commitdiff;h=aab49e934de1fff046e659cbec46e3d053b41c34
fix CVE-2012-2143
0
_crypt_extended_r(const char *key, const char *setting, struct php_crypt_extended_data *data) { int i; uint32_t count, salt, l, r0, r1, keybuf[2]; u_char *p, *q; if (!data->initialized) des_init_local(data); /* * Copy the key, shifting each character up by one bit * and padding with zeros. */ q = (u_...
10,650,738,626,815,683,000,000,000,000,000,000,000
crypt_freesec.c
266,794,742,008,726,920,000,000,000,000,000,000,000
[ "CWE-310" ]
CVE-2012-2143
The crypt_des (aka DES-based crypt) function in FreeBSD before 9.0-RELEASE-p2, as used in PHP, PostgreSQL, and other products, does not process the complete cleartext password if this password contains a 0x80 character, which makes it easier for context-dependent attackers to obtain access via an authentication attempt...
https://nvd.nist.gov/vuln/detail/CVE-2012-2143
210,062
radare2
4d3811681a80f92a53e795f6a64c4b0fc2c8dd22
https://github.com/radare/radare2
https://github.com/radareorg/radare2/commit/4d3811681a80f92a53e795f6a64c4b0fc2c8dd22
Fix segfault in adf (#16230)
1
static bool anal_fcn_data (RCore *core, const char *input) { RAnalFunction *fcn = r_anal_get_fcn_in (core->anal, core->offset, -1); ut32 fcn_size = r_anal_function_size_from_entry (fcn); if (fcn) { int i; bool gap = false; ut64 gap_addr = UT64_MAX; char *bitmap = calloc (1, fcn_size); if (bitmap) { RAna...
198,868,296,304,012,230,000,000,000,000,000,000,000
cmd_anal.c
59,878,308,147,460,040,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2020-27795
A segmentation fault was discovered in radare2 with adf command. In libr/core/cmd_anal.c, when command "adf" has no or wrong argument, anal_fcn_data (core, input + 1) --> RAnalFunction *fcn = r_anal_get_fcn_in (core->anal, core->offset, -1); returns null pointer for fcn causing segmentation fault later in ensure_fcn_ra...
https://nvd.nist.gov/vuln/detail/CVE-2020-27795
427,348
radare2
4d3811681a80f92a53e795f6a64c4b0fc2c8dd22
https://github.com/radare/radare2
https://github.com/radareorg/radare2/commit/4d3811681a80f92a53e795f6a64c4b0fc2c8dd22
Fix segfault in adf (#16230)
0
static bool anal_fcn_data (RCore *core, const char *input) { RAnalFunction *fcn = r_anal_get_fcn_in (core->anal, core->offset, R_ANAL_FCN_TYPE_ANY); if (fcn) { int i; bool gap = false; ut64 gap_addr = UT64_MAX; ut32 fcn_size = r_anal_function_size_from_entry (fcn); char *bitmap = calloc (1, fcn_size); if ...
279,171,755,589,418,830,000,000,000,000,000,000,000
cmd_anal.c
303,375,865,811,101,500,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2020-27795
A segmentation fault was discovered in radare2 with adf command. In libr/core/cmd_anal.c, when command "adf" has no or wrong argument, anal_fcn_data (core, input + 1) --> RAnalFunction *fcn = r_anal_get_fcn_in (core->anal, core->offset, -1); returns null pointer for fcn causing segmentation fault later in ensure_fcn_ra...
https://nvd.nist.gov/vuln/detail/CVE-2020-27795
210,087
libyang
6980afae2ff9fcd6d67508b0a3f694d75fd059d6
https://github.com/CESNET/libyang
https://github.com/CESNET/libyang/commit/6980afae2ff9fcd6d67508b0a3f694d75fd059d6
parser BUGFIX long identityref default value buffer overflow STRING_OVERFLOW (CWE-120)
1
make_canonical(struct ly_ctx *ctx, int type, const char **value, void *data1, void *data2) { const uint16_t buf_len = 511; char buf[buf_len + 1]; struct lys_type_bit **bits = NULL; struct lyxp_expr *exp; const char *module_name, *cur_expr, *end; int i, j, count; int64_t num; uint64_t unu...
190,611,584,866,532,360,000,000,000,000,000,000,000
parser.c
146,096,111,228,431,560,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2019-19334
In all versions of libyang before 1.0-r5, a stack-based buffer overflow was discovered in the way libyang parses YANG files with a leaf of type "identityref". An application that uses libyang to parse untrusted YANG files may be vulnerable to this flaw, which would allow an attacker to cause a denial of service or poss...
https://nvd.nist.gov/vuln/detail/CVE-2019-19334
427,616
libyang
6980afae2ff9fcd6d67508b0a3f694d75fd059d6
https://github.com/CESNET/libyang
https://github.com/CESNET/libyang/commit/6980afae2ff9fcd6d67508b0a3f694d75fd059d6
parser BUGFIX long identityref default value buffer overflow STRING_OVERFLOW (CWE-120)
0
make_canonical(struct ly_ctx *ctx, int type, const char **value, void *data1, void *data2) { const uint16_t buf_len = 511; char buf[buf_len + 1]; struct lys_type_bit **bits = NULL; struct lyxp_expr *exp; const char *module_name, *cur_expr, *end; int i, j, count; int64_t num; uint64_t unu...
220,741,050,350,140,300,000,000,000,000,000,000,000
parser.c
316,049,928,842,261,100,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2019-19334
In all versions of libyang before 1.0-r5, a stack-based buffer overflow was discovered in the way libyang parses YANG files with a leaf of type "identityref". An application that uses libyang to parse untrusted YANG files may be vulnerable to this flaw, which would allow an attacker to cause a denial of service or poss...
https://nvd.nist.gov/vuln/detail/CVE-2019-19334
210,089
gdk-pixbuf
bdd3acbd48a575d418ba6bf1b32d7bda2fae1c81
http://git.gnome.org/browse/gdk-pixbuf
https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/commit/bdd3acbd48a575d418ba6bf1b32d7bda2fae1c81
gif: Fix LZW decoder accepting invalid LZW code. The code value after a reset wasn't being validated, which means we would accept invalid codes. This could cause an infinite loop in the decoder. Fixes CVE-2020-29385 Fixes https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/164
1
lzw_decoder_feed (LZWDecoder *self, guint8 *input, gsize input_length, guint8 *output, gsize output_length) { gsize i, n_written = 0; g_return_val_if_fail (LZW_IS_DECODER (self), 0); /* Ignore data afte...
200,249,104,033,746,970,000,000,000,000,000,000,000
lzw.c
108,366,932,368,102,480,000,000,000,000,000,000,000
[ "CWE-835" ]
CVE-2020-29385
GNOME gdk-pixbuf (aka GdkPixbuf) before 2.42.2 allows a denial of service (infinite loop) in lzw.c in the function write_indexes. if c->self_code equals 10, self->code_table[10].extends will assign the value 11 to c. The next execution in the loop will assign self->code_table[11].extends to c, which will give the value...
https://nvd.nist.gov/vuln/detail/CVE-2020-29385
427,672
gdk-pixbuf
bdd3acbd48a575d418ba6bf1b32d7bda2fae1c81
http://git.gnome.org/browse/gdk-pixbuf
https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/commit/bdd3acbd48a575d418ba6bf1b32d7bda2fae1c81
gif: Fix LZW decoder accepting invalid LZW code. The code value after a reset wasn't being validated, which means we would accept invalid codes. This could cause an infinite loop in the decoder. Fixes CVE-2020-29385 Fixes https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/164
0
lzw_decoder_feed (LZWDecoder *self, guint8 *input, gsize input_length, guint8 *output, gsize output_length) { gsize i, n_written = 0; g_return_val_if_fail (LZW_IS_DECODER (self), 0); /* Ignore data afte...
139,739,002,079,413,140,000,000,000,000,000,000,000
lzw.c
260,821,389,886,535,470,000,000,000,000,000,000,000
[ "CWE-835" ]
CVE-2020-29385
GNOME gdk-pixbuf (aka GdkPixbuf) before 2.42.2 allows a denial of service (infinite loop) in lzw.c in the function write_indexes. if c->self_code equals 10, self->code_table[10].extends will assign the value 11 to c. The next execution in the loop will assign self->code_table[11].extends to c, which will give the value...
https://nvd.nist.gov/vuln/detail/CVE-2020-29385
210,095
linux
1f3e2e97c003f80c4b087092b225c8787ff91e4d
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1f3e2e97c003f80c4b087092b225c8787ff91e4d
isdn: cpai: check ctr->cnr to avoid array index out of bound The cmtp_add_connection() would add a cmtp session to a controller and run a kernel thread to process cmtp. __module_get(THIS_MODULE); session->task = kthread_run(cmtp_session, session, "kcmtpd_ctr_%d", session->num); During this process, the ker...
1
int detach_capi_ctr(struct capi_ctr *ctr) { int err = 0; mutex_lock(&capi_controller_lock); ctr_down(ctr, CAPI_CTR_DETACHED); if (capi_controller[ctr->cnr - 1] != ctr) { err = -EINVAL; goto unlock_out; } capi_controller[ctr->cnr - 1] = NULL; ncontrollers--; if (ctr->procent) remove_proc_entry(ctr->pro...
299,119,272,647,506,740,000,000,000,000,000,000,000
kcapi.c
141,080,357,949,042,700,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2021-43389
An issue was discovered in the Linux kernel before 5.14.15. There is an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c.
https://nvd.nist.gov/vuln/detail/CVE-2021-43389
427,840
linux
1f3e2e97c003f80c4b087092b225c8787ff91e4d
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1f3e2e97c003f80c4b087092b225c8787ff91e4d
isdn: cpai: check ctr->cnr to avoid array index out of bound The cmtp_add_connection() would add a cmtp session to a controller and run a kernel thread to process cmtp. __module_get(THIS_MODULE); session->task = kthread_run(cmtp_session, session, "kcmtpd_ctr_%d", session->num); During this process, the ker...
0
int detach_capi_ctr(struct capi_ctr *ctr) { int err = 0; mutex_lock(&capi_controller_lock); ctr_down(ctr, CAPI_CTR_DETACHED); if (ctr->cnr < 1 || ctr->cnr - 1 >= CAPI_MAXCONTR) { err = -EINVAL; goto unlock_out; } if (capi_controller[ctr->cnr - 1] != ctr) { err = -EINVAL; goto unlock_out; } capi_cont...
116,237,873,023,770,400,000,000,000,000,000,000,000
kcapi.c
43,598,196,977,773,380,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2021-43389
An issue was discovered in the Linux kernel before 5.14.15. There is an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c.
https://nvd.nist.gov/vuln/detail/CVE-2021-43389
210,099
ImageMagick6
5caef6e97f3f575cf7bea497865a4c1e624b8010
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/5caef6e97f3f575cf7bea497865a4c1e624b8010
https://github.com/ImageMagick/ImageMagick/issues/1554
1
static Image *ReadMATImage(const ImageInfo *image_info,ExceptionInfo *exception) { Image *image, *image2=NULL, *rotated_image; PixelPacket *q; unsigned int status; MATHeader MATLAB_HDR; size_t size; size_t CellType; QuantumInfo *quantum_info; ImageInfo *clone_info; int i; ssize_t ldblk; unsign...
291,110,008,635,184,770,000,000,000,000,000,000,000
mat.c
200,489,479,282,962,100,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2019-15140
coders/mat.c in ImageMagick 7.0.8-43 Q16 allows remote attackers to cause a denial of service (use-after-free and application crash) or possibly have unspecified other impact by crafting a Matlab image file that is mishandled in ReadImage in MagickCore/constitute.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-15140
427,934
ImageMagick6
5caef6e97f3f575cf7bea497865a4c1e624b8010
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/5caef6e97f3f575cf7bea497865a4c1e624b8010
https://github.com/ImageMagick/ImageMagick/issues/1554
0
static Image *ReadMATImage(const ImageInfo *image_info,ExceptionInfo *exception) { Image *image, *image2=NULL, *rotated_image; PixelPacket *q; unsigned int status; MATHeader MATLAB_HDR; size_t size; size_t CellType; QuantumInfo *quantum_info; ImageInfo *clone_info; int i; ssize_t ldblk; unsign...
95,716,309,564,447,050,000,000,000,000,000,000,000
mat.c
196,259,138,446,610,300,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2019-15140
coders/mat.c in ImageMagick 7.0.8-43 Q16 allows remote attackers to cause a denial of service (use-after-free and application crash) or possibly have unspecified other impact by crafting a Matlab image file that is mishandled in ReadImage in MagickCore/constitute.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-15140
210,100
systemd
b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://github.com/systemd/systemd
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
bus_open leak sd_event_source when udevadm trigger。 On my host, when executing the udevadm trigger, I only receive the change event, which causes memleak
1
int button_open(Button *b) { char *p, name[256]; int r; assert(b); b->fd = safe_close(b->fd); p = strjoina("/dev/input/", b->name); b->fd = open(p, O_RDWR|O_CLOEXEC|O_NOCTTY|O_NONBLOCK); if (b->fd < 0) return log_warning_errno(errno, "Failed to...
18,683,998,661,555,380,000,000,000,000,000,000,000
logind-button.c
109,360,990,826,513,100,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2019-20386
An issue was discovered in button_open in login/logind-button.c in systemd before 243. When executing the udevadm trigger command, a memory leak may occur.
https://nvd.nist.gov/vuln/detail/CVE-2019-20386
427,937
systemd
b2774a3ae692113e1f47a336a6c09bac9cfb49ad
https://github.com/systemd/systemd
https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad
bus_open leak sd_event_source when udevadm trigger。 On my host, when executing the udevadm trigger, I only receive the change event, which causes memleak
0
int button_open(Button *b) { char *p, name[256]; int r; assert(b); b->fd = safe_close(b->fd); p = strjoina("/dev/input/", b->name); b->fd = open(p, O_RDWR|O_CLOEXEC|O_NOCTTY|O_NONBLOCK); if (b->fd < 0) return log_warning_errno(errno, "Failed to...
130,640,253,615,856,400,000,000,000,000,000,000,000
logind-button.c
115,161,158,915,741,410,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2019-20386
An issue was discovered in button_open in login/logind-button.c in systemd before 243. When executing the udevadm trigger command, a memory leak may occur.
https://nvd.nist.gov/vuln/detail/CVE-2019-20386
210,105
linux
51bda2bca53b265715ca1852528f38dc67429d9a
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=51bda2bca53b265715ca1852528f38dc67429d9a
Bluetooth: hidp_connection_add() unsafe use of l2cap_pi() it's OK after we'd verified the sockets, but not before that. Signed-off-by: Al Viro <viro@zeniv.linux.org.uk> Signed-off-by: Marcel Holtmann <marcel@holtmann.org>
1
int hidp_connection_add(struct hidp_connadd_req *req, struct socket *ctrl_sock, struct socket *intr_sock) { struct hidp_session *session; struct l2cap_conn *conn; struct l2cap_chan *chan = l2cap_pi(ctrl_sock->sk)->chan; int ret; ret = hidp_verify_sockets(ctrl_sock, intr_sock); if (ret) return ret; conn...
73,013,783,311,787,160,000,000,000,000,000,000,000
core.c
184,915,314,948,637,900,000,000,000,000,000,000,000
[ "CWE-843" ]
CVE-2017-13220
An elevation of privilege vulnerability in the Upstream kernel bluez. Product: Android. Versions: Android kernel. Android ID: A-63527053.
https://nvd.nist.gov/vuln/detail/CVE-2017-13220
428,128
linux
51bda2bca53b265715ca1852528f38dc67429d9a
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=51bda2bca53b265715ca1852528f38dc67429d9a
Bluetooth: hidp_connection_add() unsafe use of l2cap_pi() it's OK after we'd verified the sockets, but not before that. Signed-off-by: Al Viro <viro@zeniv.linux.org.uk> Signed-off-by: Marcel Holtmann <marcel@holtmann.org>
0
int hidp_connection_add(struct hidp_connadd_req *req, struct socket *ctrl_sock, struct socket *intr_sock) { struct hidp_session *session; struct l2cap_conn *conn; struct l2cap_chan *chan; int ret; ret = hidp_verify_sockets(ctrl_sock, intr_sock); if (ret) return ret; chan = l2cap_pi(ctrl_sock->sk)->chan...
151,536,197,239,529,830,000,000,000,000,000,000,000
core.c
126,263,500,513,654,820,000,000,000,000,000,000,000
[ "CWE-843" ]
CVE-2017-13220
An elevation of privilege vulnerability in the Upstream kernel bluez. Product: Android. Versions: Android kernel. Android ID: A-63527053.
https://nvd.nist.gov/vuln/detail/CVE-2017-13220
210,106
lua
6298903e35217ab69c279056f925fb72900ce0b7
https://github.com/lua/lua
https://github.com/lua/lua/commit/6298903e35217ab69c279056f925fb72900ce0b7
Keep minimum size when shrinking a stack When shrinking a stack (during GC), do not make it smaller than the initial stack size.
1
void luaD_shrinkstack (lua_State *L) { int inuse = stackinuse(L); int goodsize = inuse + (inuse / 8) + 2*EXTRA_STACK; if (goodsize > LUAI_MAXSTACK) goodsize = LUAI_MAXSTACK; /* respect stack limit */ /* if thread is currently not handling a stack overflow and its good size is smaller than current size...
329,100,240,463,973,600,000,000,000,000,000,000,000
ldo.c
147,213,108,156,486,430,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2020-15888
Lua through 5.4.0 mishandles the interaction between stack resizes and garbage collection, leading to a heap-based buffer overflow, heap-based buffer over-read, or use-after-free.
https://nvd.nist.gov/vuln/detail/CVE-2020-15888
428,149
lua
6298903e35217ab69c279056f925fb72900ce0b7
https://github.com/lua/lua
https://github.com/lua/lua/commit/6298903e35217ab69c279056f925fb72900ce0b7
Keep minimum size when shrinking a stack When shrinking a stack (during GC), do not make it smaller than the initial stack size.
0
void luaD_shrinkstack (lua_State *L) { int inuse = stackinuse(L); int goodsize = inuse + BASIC_STACK_SIZE; if (goodsize > LUAI_MAXSTACK) goodsize = LUAI_MAXSTACK; /* respect stack limit */ /* if thread is currently not handling a stack overflow and its good size is smaller than current size, shrink it...
33,887,331,595,757,200,000,000,000,000,000,000,000
ldo.c
68,361,696,883,923,545,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2020-15888
Lua through 5.4.0 mishandles the interaction between stack resizes and garbage collection, leading to a heap-based buffer overflow, heap-based buffer over-read, or use-after-free.
https://nvd.nist.gov/vuln/detail/CVE-2020-15888
210,110
poppler
bf4aae25a244b1033a2479b9a8f633224f7d5de5
https://github.com/freedesktop/poppler
https://gitlab.freedesktop.org/poppler/poppler/commit/bf4aae25a244b1033a2479b9a8f633224f7d5de5
Off by one fix to the previous crash fix
1
void FoFiTrueType::cvtSfnts(FoFiOutputFunc outputFunc, void *outputStream, GooString *name, GBool needVerticalMetrics, int *maxUsedGlyph) { Guchar headData[54]; TrueTypeLoca *locaTable; Guchar *locaData; TrueTypeTable newTables[nT42Tables]; Guchar tableDir[12 + nT42Ta...
250,151,506,466,525,900,000,000,000,000,000,000,000
FoFiTrueType.cc
178,218,444,603,250,600,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-12360
A stack-based buffer over-read exists in FoFiTrueType::dumpString in fofi/FoFiTrueType.cc in Xpdf 4.01.01. It can, for example, be triggered by sending crafted TrueType data in a PDF document to the pdftops tool. It might allow an attacker to cause Denial of Service or leak memory data into dump content.
https://nvd.nist.gov/vuln/detail/CVE-2019-12360
428,222
poppler
bf4aae25a244b1033a2479b9a8f633224f7d5de5
https://github.com/freedesktop/poppler
https://gitlab.freedesktop.org/poppler/poppler/commit/bf4aae25a244b1033a2479b9a8f633224f7d5de5
Off by one fix to the previous crash fix
0
void FoFiTrueType::cvtSfnts(FoFiOutputFunc outputFunc, void *outputStream, GooString *name, GBool needVerticalMetrics, int *maxUsedGlyph) { Guchar headData[54]; TrueTypeLoca *locaTable; Guchar *locaData; TrueTypeTable newTables[nT42Tables]; Guchar tableDir[12 + nT42Ta...
202,653,870,735,281,900,000,000,000,000,000,000,000
FoFiTrueType.cc
334,717,419,725,962,800,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-12360
A stack-based buffer over-read exists in FoFiTrueType::dumpString in fofi/FoFiTrueType.cc in Xpdf 4.01.01. It can, for example, be triggered by sending crafted TrueType data in a PDF document to the pdftops tool. It might allow an attacker to cause Denial of Service or leak memory data into dump content.
https://nvd.nist.gov/vuln/detail/CVE-2019-12360
210,122
ImageMagick6
13801f5d0bd7a6fdb119682d34946636afdb2629
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/13801f5d0bd7a6fdb119682d34946636afdb2629
https://github.com/ImageMagick/ImageMagick/issues/1531
1
MagickExport void DestroyXResources(void) { register int i; unsigned int number_windows; XWindowInfo *magick_windows[MaxXWindows]; XWindows *windows; DestroyXWidget(); windows=XSetWindows((XWindows *) ~0); if ((windows == (XWindows *) NULL) || (windows->display == (Display *) NULL)) ...
236,687,483,166,222,370,000,000,000,000,000,000,000
xwindow.c
264,508,317,241,275,660,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2019-16708
ImageMagick 7.0.8-35 has a memory leak in magick/xwindow.c, related to XCreateImage.
https://nvd.nist.gov/vuln/detail/CVE-2019-16708
428,333
ImageMagick6
13801f5d0bd7a6fdb119682d34946636afdb2629
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/13801f5d0bd7a6fdb119682d34946636afdb2629
https://github.com/ImageMagick/ImageMagick/issues/1531
0
MagickExport void DestroyXResources(void) { register int i; unsigned int number_windows; XWindowInfo *magick_windows[MaxXWindows]; XWindows *windows; DestroyXWidget(); windows=XSetWindows((XWindows *) ~0); if ((windows == (XWindows *) NULL) || (windows->display == (Display *) NULL)) ...
30,126,709,932,963,700,000,000,000,000,000,000,000
xwindow.c
8,311,745,199,387,426,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2019-16708
ImageMagick 7.0.8-35 has a memory leak in magick/xwindow.c, related to XCreateImage.
https://nvd.nist.gov/vuln/detail/CVE-2019-16708
210,126
qemu
f56b9bc3ae20fc93815b34aa022be919941406ce
https://github.com/bonzini/qemu
http://git.qemu.org/?p=qemu.git;a=commit;h=f56b9bc3ae20fc93815b34aa022be919941406ce
block/cloop: refuse images with bogus offsets (CVE-2014-0144) The offsets[] array allows efficient seeking and tells us the maximum compressed data size. If the offsets are bogus the maximum compressed data size will be unrealistic. This could cause g_malloc() to abort and bogus offsets mean the image is broken anyw...
1
static int cloop_open(BlockDriverState *bs, QDict *options, int flags, Error **errp) { BDRVCloopState *s = bs->opaque; uint32_t offsets_size, max_compressed_block_size = 1, i; int ret; bs->read_only = 1; /* read header */ ret = bdrv_pread(bs->file, 128, &s->block_size, 4)...
155,217,521,664,998,850,000,000,000,000,000,000,000
cloop.c
163,275,065,424,570,210,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2014-0144
QEMU before 2.0.0 block drivers for CLOOP, QCOW2 version 2 and various other image formats are vulnerable to potential memory corruptions, integer/buffer overflows or crash caused by missing input validations which could allow a remote user to execute arbitrary code on the host with the privileges of the QEMU process.
https://nvd.nist.gov/vuln/detail/CVE-2014-0144
428,439
qemu
f56b9bc3ae20fc93815b34aa022be919941406ce
https://github.com/bonzini/qemu
http://git.qemu.org/?p=qemu.git;a=commit;h=f56b9bc3ae20fc93815b34aa022be919941406ce
block/cloop: refuse images with bogus offsets (CVE-2014-0144) The offsets[] array allows efficient seeking and tells us the maximum compressed data size. If the offsets are bogus the maximum compressed data size will be unrealistic. This could cause g_malloc() to abort and bogus offsets mean the image is broken anyw...
0
static int cloop_open(BlockDriverState *bs, QDict *options, int flags, Error **errp) { BDRVCloopState *s = bs->opaque; uint32_t offsets_size, max_compressed_block_size = 1, i; int ret; bs->read_only = 1; /* read header */ ret = bdrv_pread(bs->file, 128, &s->block_size, 4)...
284,905,421,415,334,150,000,000,000,000,000,000,000
cloop.c
279,521,671,755,063,200,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2014-0144
QEMU before 2.0.0 block drivers for CLOOP, QCOW2 version 2 and various other image formats are vulnerable to potential memory corruptions, integer/buffer overflows or crash caused by missing input validations which could allow a remote user to execute arbitrary code on the host with the privileges of the QEMU process.
https://nvd.nist.gov/vuln/detail/CVE-2014-0144
210,135
OpenSC
6ce6152284c47ba9b1d4fe8ff9d2e6a3f5ee02c7
https://github.com/OpenSC/OpenSC
https://github.com/OpenSC/OpenSC/commit/6ce6152284c47ba9b1d4fe8ff9d2e6a3f5ee02c7
pkcs15-prkey: Simplify cleaning memory after failure https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18478
1
int sc_pkcs15_decode_prkdf_entry(struct sc_pkcs15_card *p15card, struct sc_pkcs15_object *obj, const u8 ** buf, size_t *buflen) { sc_context_t *ctx = p15card->card->ctx; struct sc_pkcs15_prkey_info info; int r, i, gostr3410_params[3]; struct sc_pkcs15_keyinfo_gostparams *keyinfo_gostparams; size_t usage_...
329,186,534,744,666,330,000,000,000,000,000,000,000
pkcs15-prkey.c
176,823,107,840,642,180,000,000,000,000,000,000,000
[ "CWE-672" ]
CVE-2019-19480
An issue was discovered in OpenSC through 0.19.0 and 0.20.x through 0.20.0-rc3. libopensc/pkcs15-prkey.c has an incorrect free operation in sc_pkcs15_decode_prkdf_entry.
https://nvd.nist.gov/vuln/detail/CVE-2019-19480
428,453
OpenSC
6ce6152284c47ba9b1d4fe8ff9d2e6a3f5ee02c7
https://github.com/OpenSC/OpenSC
https://github.com/OpenSC/OpenSC/commit/6ce6152284c47ba9b1d4fe8ff9d2e6a3f5ee02c7
pkcs15-prkey: Simplify cleaning memory after failure https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18478
0
int sc_pkcs15_decode_prkdf_entry(struct sc_pkcs15_card *p15card, struct sc_pkcs15_object *obj, const u8 ** buf, size_t *buflen) { sc_context_t *ctx = p15card->card->ctx; struct sc_pkcs15_prkey_info info; int r, i, gostr3410_params[3]; struct sc_pkcs15_keyinfo_gostparams *keyinfo_gostparams; size_t usage_...
105,344,681,932,941,660,000,000,000,000,000,000,000
pkcs15-prkey.c
59,210,802,356,925,420,000,000,000,000,000,000,000
[ "CWE-672" ]
CVE-2019-19480
An issue was discovered in OpenSC through 0.19.0 and 0.20.x through 0.20.0-rc3. libopensc/pkcs15-prkey.c has an incorrect free operation in sc_pkcs15_decode_prkdf_entry.
https://nvd.nist.gov/vuln/detail/CVE-2019-19480
210,150
quassel
da215fcb9cd3096a3e223c87577d5d4ab8f8518b
https://github.com/quassel/quassel
http://git.quassel-irc.org/?p=quassel.git;a=commit;h=da215fcb9cd3096a3e223c87577d5d4ab8f8518b
Fix core crash Some CTCP requests triggered a bug in the parser; this fixes the issue.
1
void CtcpParser::packedReply(CoreNetwork *net, const QString &bufname, const QList<QByteArray> &replies) { QList<QByteArray> params; int answerSize = 0; for(int i = 0; i < replies.count(); i++) { answerSize += replies.at(i).size(); } QByteArray quotedReply(answerSize, 0); int nextPos = 0; QByteArray...
87,534,697,093,027,220,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2011-3354
The CtcpParser::packedReply method in core/ctcpparser.cpp in Quassel before 0.7.3 allows remote attackers to cause a denial of service (crash) via a crafted Client-To-Client Protocol (CTCP) request, as demonstrated in the wild in September 2011.
https://nvd.nist.gov/vuln/detail/CVE-2011-3354
428,903
quassel
da215fcb9cd3096a3e223c87577d5d4ab8f8518b
https://github.com/quassel/quassel
http://git.quassel-irc.org/?p=quassel.git;a=commit;h=da215fcb9cd3096a3e223c87577d5d4ab8f8518b
Fix core crash Some CTCP requests triggered a bug in the parser; this fixes the issue.
0
void CtcpParser::packedReply(CoreNetwork *net, const QString &bufname, const QList<QByteArray> &replies) { QList<QByteArray> params; int answerSize = 0; for(int i = 0; i < replies.count(); i++) { answerSize += replies.at(i).size(); } QByteArray quotedReply; quotedReply.reserve(answerSize); for(int i...
302,248,419,576,398,700,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2011-3354
The CtcpParser::packedReply method in core/ctcpparser.cpp in Quassel before 0.7.3 allows remote attackers to cause a denial of service (crash) via a crafted Client-To-Client Protocol (CTCP) request, as demonstrated in the wild in September 2011.
https://nvd.nist.gov/vuln/detail/CVE-2011-3354
210,153
ImageMagick6
553054c1cb1e4e05ec86237afef76a32cd7c464d
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/553054c1cb1e4e05ec86237afef76a32cd7c464d
https://github.com/ImageMagick/ImageMagick/pull/3083
1
static void ExportIndexQuantum(const Image *image,QuantumInfo *quantum_info, const MagickSizeType number_pixels,const PixelPacket *magick_restrict p, const IndexPacket *magick_restrict indexes,unsigned char *magick_restrict q, ExceptionInfo *exception) { ssize_t x; ssize_t bit; if (image->storage_...
80,551,222,445,389,500,000,000,000,000,000,000,000
quantum-export.c
284,721,757,388,059,100,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2021-20224
An integer overflow issue was discovered in ImageMagick's ExportIndexQuantum() function in MagickCore/quantum-export.c. Function calls to GetPixelIndex() could result in values outside the range of representable for the 'unsigned char'. When ImageMagick processes a crafted pdf file, this could lead to an undefined beha...
https://nvd.nist.gov/vuln/detail/CVE-2021-20224
429,102
ImageMagick6
553054c1cb1e4e05ec86237afef76a32cd7c464d
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/553054c1cb1e4e05ec86237afef76a32cd7c464d
https://github.com/ImageMagick/ImageMagick/pull/3083
0
static void ExportIndexQuantum(const Image *image,QuantumInfo *quantum_info, const MagickSizeType number_pixels,const PixelPacket *magick_restrict p, const IndexPacket *magick_restrict indexes,unsigned char *magick_restrict q, ExceptionInfo *exception) { ssize_t x; ssize_t bit; if (image->storage_...
102,741,928,238,998,780,000,000,000,000,000,000,000
quantum-export.c
333,541,005,680,227,880,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2021-20224
An integer overflow issue was discovered in ImageMagick's ExportIndexQuantum() function in MagickCore/quantum-export.c. Function calls to GetPixelIndex() could result in values outside the range of representable for the 'unsigned char'. When ImageMagick processes a crafted pdf file, this could lead to an undefined beha...
https://nvd.nist.gov/vuln/detail/CVE-2021-20224
210,157
gimp
ace45631595e8781a1420842582d67160097163c
https://github.com/GNOME/gimp
http://git.gnome.org/browse/gimp/commit/plug-ins/file-fits/fits-io.c?id=ace45631595e8781a1420842582d67160097163c
Bug 676804 - file handling DoS for fit file format Apply patch from joe@reactionis.co.uk which fixes a buffer overflow on broken/malicious fits files.
1
static FITS_HDU_LIST *fits_decode_header (FITS_RECORD_LIST *hdr, long hdr_offset, long dat_offset) {FITS_HDU_LIST *hdulist; FITS_DATA *fdat; char errmsg[80], key[9]; int k, bpp, random_groups; long mul_axis, data_size, bitpix_supported; #define FITS_DECODE_CARD(mhdr,mkey,mfdat,mtyp) \ {st...
89,898,800,749,669,370,000,000,000,000,000,000,000
fits-io.c
183,670,284,454,913,350,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2012-3236
fits-io.c in GIMP before 2.8.1 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a malformed XTENSION header of a .fit file, as demonstrated using a long string.
https://nvd.nist.gov/vuln/detail/CVE-2012-3236
429,109
gimp
ace45631595e8781a1420842582d67160097163c
https://github.com/GNOME/gimp
http://git.gnome.org/browse/gimp/commit/plug-ins/file-fits/fits-io.c?id=ace45631595e8781a1420842582d67160097163c
Bug 676804 - file handling DoS for fit file format Apply patch from joe@reactionis.co.uk which fixes a buffer overflow on broken/malicious fits files.
0
static FITS_HDU_LIST *fits_decode_header (FITS_RECORD_LIST *hdr, long hdr_offset, long dat_offset) {FITS_HDU_LIST *hdulist; FITS_DATA *fdat; char errmsg[80], key[9]; int k, bpp, random_groups; long mul_axis, data_size, bitpix_supported; #define FITS_DECODE_CARD(mhdr,mkey,mfdat,mtyp) \ {st...
18,273,001,141,931,360,000,000,000,000,000,000,000
fits-io.c
217,716,246,697,550,270,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2012-3236
fits-io.c in GIMP before 2.8.1 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a malformed XTENSION header of a .fit file, as demonstrated using a long string.
https://nvd.nist.gov/vuln/detail/CVE-2012-3236
210,168
php-src
0218acb7e756a469099c4ccfb22bce6c2bd1ef87
https://github.com/php/php-src
http://git.php.net/?p=php-src.git;a=commit;h=0218acb7e756a469099c4ccfb22bce6c2bd1ef87
Fix for bug #72513
1
CWD_API int virtual_file_ex(cwd_state *state, const char *path, verify_path_func verify_path, int use_realpath TSRMLS_DC) /* {{{ */ { int path_length = strlen(path); char resolved_path[MAXPATHLEN]; int start = 1; int ll = 0; time_t t; int ret; int add_slash; void *tmp; if (path_length == 0 || path_length >= M...
78,835,046,925,777,380,000,000,000,000,000,000,000
None
null
[ "CWE-190" ]
CVE-2016-6289
Integer overflow in the virtual_file_ex function in TSRM/tsrm_virtual_cwd.c in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9 allows remote attackers to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a crafted extract operation on a ZIP archive.
https://nvd.nist.gov/vuln/detail/CVE-2016-6289
429,343
php-src
0218acb7e756a469099c4ccfb22bce6c2bd1ef87
https://github.com/php/php-src
http://git.php.net/?p=php-src.git;a=commit;h=0218acb7e756a469099c4ccfb22bce6c2bd1ef87
Fix for bug #72513
0
CWD_API int virtual_file_ex(cwd_state *state, const char *path, verify_path_func verify_path, int use_realpath TSRMLS_DC) /* {{{ */ { int path_length = strlen(path); char resolved_path[MAXPATHLEN]; int start = 1; int ll = 0; time_t t; int ret; int add_slash; void *tmp; if (path_length <= 0 || path_length >= M...
279,529,816,160,771,700,000,000,000,000,000,000,000
None
null
[ "CWE-190" ]
CVE-2016-6289
Integer overflow in the virtual_file_ex function in TSRM/tsrm_virtual_cwd.c in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9 allows remote attackers to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a crafted extract operation on a ZIP archive.
https://nvd.nist.gov/vuln/detail/CVE-2016-6289
210,185
spice-vd_agent
b7db1c20c9f80154fb54392eb44add3486d3e427
https://github.com/freedesktop/spice-vd_agent
https://github.com/freedesktop/spice-vd_agent/commit/b7db1c20c9f80154fb54392eb44add3486d3e427
vdagentd: do not allow to use an already used file-xfer id Signed-off-by: Uri Lublin <uril@redhat.com> Acked-by: Frediano Ziglio <fziglio@redhat.com>
1
static void do_client_file_xfer(VirtioPort *vport, VDAgentMessage *message_header, uint8_t *data) { uint32_t msg_type, id; UdscsConnection *conn; switch (message_header->type) { case VD_AGENT_FILE_XFER_START: { VDAgentFileXferStart...
222,790,491,158,173,450,000,000,000,000,000,000,000
vdagentd.c
134,875,536,789,113,300,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2020-25651
A flaw was found in the SPICE file transfer protocol. File data from the host system can end up in full or in parts in the client connection of an illegitimate local user in the VM system. Active file transfers from other users could also be interrupted, resulting in a denial of service. The highest threat from this vu...
https://nvd.nist.gov/vuln/detail/CVE-2020-25651
429,583
spice-vd_agent
b7db1c20c9f80154fb54392eb44add3486d3e427
https://github.com/freedesktop/spice-vd_agent
https://github.com/freedesktop/spice-vd_agent/commit/b7db1c20c9f80154fb54392eb44add3486d3e427
vdagentd: do not allow to use an already used file-xfer id Signed-off-by: Uri Lublin <uril@redhat.com> Acked-by: Frediano Ziglio <fziglio@redhat.com>
0
static void do_client_file_xfer(VirtioPort *vport, VDAgentMessage *message_header, uint8_t *data) { uint32_t msg_type, id; UdscsConnection *conn; switch (message_header->type) { case VD_AGENT_FILE_XFER_START: { VDAgentFileXferStart...
58,646,848,942,148,380,000,000,000,000,000,000,000
vdagentd.c
67,833,859,549,917,040,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2020-25651
A flaw was found in the SPICE file transfer protocol. File data from the host system can end up in full or in parts in the client connection of an illegitimate local user in the VM system. Active file transfers from other users could also be interrupted, resulting in a denial of service. The highest threat from this vu...
https://nvd.nist.gov/vuln/detail/CVE-2020-25651
210,190
libgxps
b458226e162fe1ffe7acb4230c114a52ada5131b
https://github.com/GNOME/libgxps
https://git.gnome.org/browse/libgxps/commit/?id=b458226e162fe1ffe7acb4230c114a52ada5131b
gxps-archive: Ensure gxps_archive_read_entry() fills the GError in case of failure And fix the callers to not overwrite the GError.
1
gxps_fonts_new_font_face (GXPSArchive *zip, const gchar *font_uri, GError **error) { GHashTable *ft_cache; FtFontFace ft_face; FtFontFace *ft_font_face; FT_Face face; cairo_font_face_t *font_face; guchar *font_data; gsize font_data_len; gboo...
326,949,886,729,376,600,000,000,000,000,000,000,000
gxps-fonts.c
198,009,145,170,871,620,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-10733
There is a heap-based buffer over-read in the function ft_font_face_hash of gxps-fonts.c in libgxps through 0.3.0. A crafted input will lead to a remote denial of service attack.
https://nvd.nist.gov/vuln/detail/CVE-2018-10733
429,591
libgxps
b458226e162fe1ffe7acb4230c114a52ada5131b
https://github.com/GNOME/libgxps
https://git.gnome.org/browse/libgxps/commit/?id=b458226e162fe1ffe7acb4230c114a52ada5131b
gxps-archive: Ensure gxps_archive_read_entry() fills the GError in case of failure And fix the callers to not overwrite the GError.
0
gxps_fonts_new_font_face (GXPSArchive *zip, const gchar *font_uri, GError **error) { GHashTable *ft_cache; FtFontFace ft_face; FtFontFace *ft_font_face; FT_Face face; cairo_font_face_t *font_face; guchar *font_data; gsize font_data_len; ...
2,373,199,272,118,685,500,000,000,000,000,000,000
gxps-fonts.c
138,081,043,403,436,360,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-10733
There is a heap-based buffer over-read in the function ft_font_face_hash of gxps-fonts.c in libgxps through 0.3.0. A crafted input will lead to a remote denial of service attack.
https://nvd.nist.gov/vuln/detail/CVE-2018-10733
210,194
freeradius-server
1b1ec5ce75e224bd1755650c18ccdaa6dc53e605
https://github.com/alandekok/freeradius-server
https://github.com/alandekok/freeradius-server/commit/1b1ec5ce75e224bd1755650c18ccdaa6dc53e605
heck for account and password expiration
1
static int unix_getpw(UNUSED void *instance, REQUEST *request, VALUE_PAIR **vp_list) { const char *name; const char *encrypted_pass; #ifdef HAVE_GETSPNAM struct spwd *spwd = NULL; #endif #ifdef OSFC2 struct pr_passwd *pr_pw; #else struct passwd *pwd; #endif #ifdef HAVE_GETUSERSHELL char *shell; #endif V...
222,041,015,006,357,660,000,000,000,000,000,000,000
rlm_unix.c
134,623,500,908,668,500,000,000,000,000,000,000,000
[ "CWE-522" ]
CVE-2011-4966
modules/rlm_unix/rlm_unix.c in FreeRADIUS before 2.2.0, when unix mode is enabled for user authentication, does not properly check the password expiration in /etc/shadow, which allows remote authenticated users to authenticate using an expired password.
https://nvd.nist.gov/vuln/detail/CVE-2011-4966
429,753
freeradius-server
1b1ec5ce75e224bd1755650c18ccdaa6dc53e605
https://github.com/alandekok/freeradius-server
https://github.com/alandekok/freeradius-server/commit/1b1ec5ce75e224bd1755650c18ccdaa6dc53e605
heck for account and password expiration
0
static int unix_getpw(UNUSED void *instance, REQUEST *request, VALUE_PAIR **vp_list) { const char *name; const char *encrypted_pass; #ifdef HAVE_GETSPNAM struct spwd *spwd = NULL; #endif #ifdef OSFC2 struct pr_passwd *pr_pw; #else struct passwd *pwd; #endif #ifdef HAVE_GETUSERSHELL char *shell; #endif V...
63,257,407,504,939,800,000,000,000,000,000,000,000
rlm_unix.c
195,897,549,485,145,440,000,000,000,000,000,000,000
[ "CWE-522" ]
CVE-2011-4966
modules/rlm_unix/rlm_unix.c in FreeRADIUS before 2.2.0, when unix mode is enabled for user authentication, does not properly check the password expiration in /etc/shadow, which allows remote authenticated users to authenticate using an expired password.
https://nvd.nist.gov/vuln/detail/CVE-2011-4966
210,195
bind9
f09352d20a9d360e50683cd1d2fc52ccedcd77a0
https://github.com/isc-projects/bind9
https://gitlab.isc.org/isc-projects/bind9/commit/f09352d20a9d360e50683cd1d2fc52ccedcd77a0
Update keyfetch_done compute_tag check If in keyfetch_done the compute_tag fails (because for example the algorithm is not supported), don't crash, but instead ignore the key.
1
keyfetch_done(isc_task_t *task, isc_event_t *event) { isc_result_t result, eresult; dns_fetchevent_t *devent; dns_keyfetch_t *kfetch; dns_zone_t *zone; isc_mem_t *mctx = NULL; dns_keytable_t *secroots = NULL; dns_dbversion_t *ver = NULL; dns_diff_t diff; bool alldone = false; bool commit = false; dns_name_t ...
236,992,101,270,270,440,000,000,000,000,000,000,000
zone.c
154,660,532,303,670,460,000,000,000,000,000,000,000
[ "CWE-327" ]
CVE-2018-5745
"managed-keys" is a feature which allows a BIND resolver to automatically maintain the keys used by trust anchors which operators configure for use in DNSSEC validation. Due to an error in the managed-keys feature it is possible for a BIND server which uses managed-keys to exit due to an assertion failure if, during ke...
https://nvd.nist.gov/vuln/detail/CVE-2018-5745
429,855
bind9
f09352d20a9d360e50683cd1d2fc52ccedcd77a0
https://github.com/isc-projects/bind9
https://gitlab.isc.org/isc-projects/bind9/commit/f09352d20a9d360e50683cd1d2fc52ccedcd77a0
Update keyfetch_done compute_tag check If in keyfetch_done the compute_tag fails (because for example the algorithm is not supported), don't crash, but instead ignore the key.
0
keyfetch_done(isc_task_t *task, isc_event_t *event) { isc_result_t result, eresult; dns_fetchevent_t *devent; dns_keyfetch_t *kfetch; dns_zone_t *zone; isc_mem_t *mctx = NULL; dns_keytable_t *secroots = NULL; dns_dbversion_t *ver = NULL; dns_diff_t diff; bool alldone = false; bool commit = false; dns_name_t ...
210,652,342,307,875,430,000,000,000,000,000,000,000
zone.c
112,636,719,919,640,790,000,000,000,000,000,000,000
[ "CWE-327" ]
CVE-2018-5745
"managed-keys" is a feature which allows a BIND resolver to automatically maintain the keys used by trust anchors which operators configure for use in DNSSEC validation. Due to an error in the managed-keys feature it is possible for a BIND server which uses managed-keys to exit due to an assertion failure if, during ke...
https://nvd.nist.gov/vuln/detail/CVE-2018-5745
210,200
libsndfile
85c877d5072866aadbe8ed0c3e0590fbb5e16788
https://github.com/erikd/libsndfile
https://github.com/erikd/libsndfile/commit/85c877d5072866aadbe8ed0c3e0590fbb5e16788
double64_init: Check psf->sf.channels against upper bound This prevents division by zero later in the code. While the trivial case to catch this (i.e. sf.channels < 1) has already been covered, a crafted file may report a number of channels that is so high (i.e. > INT_MAX/sizeof(double)) that it "somehow" gets miscal...
1
double64_init (SF_PRIVATE *psf) { static int double64_caps ; if (psf->sf.channels < 1) { psf_log_printf (psf, "double64_init : internal error : channels = %d\n", psf->sf.channels) ; return SFE_INTERNAL ; } ; double64_caps = double64_get_capability (psf) ; psf->blockwidth = sizeof (double) * psf->sf.channels ...
335,100,933,214,536,800,000,000,000,000,000,000,000
None
null
[ "CWE-369" ]
CVE-2017-14634
In libsndfile 1.0.28, a divide-by-zero error exists in the function double64_init() in double64.c, which may lead to DoS when playing a crafted audio file.
https://nvd.nist.gov/vuln/detail/CVE-2017-14634
430,203
libsndfile
85c877d5072866aadbe8ed0c3e0590fbb5e16788
https://github.com/erikd/libsndfile
https://github.com/erikd/libsndfile/commit/85c877d5072866aadbe8ed0c3e0590fbb5e16788
double64_init: Check psf->sf.channels against upper bound This prevents division by zero later in the code. While the trivial case to catch this (i.e. sf.channels < 1) has already been covered, a crafted file may report a number of channels that is so high (i.e. > INT_MAX/sizeof(double)) that it "somehow" gets miscal...
0
double64_init (SF_PRIVATE *psf) { static int double64_caps ; if (psf->sf.channels < 1 || psf->sf.channels > SF_MAX_CHANNELS) { psf_log_printf (psf, "double64_init : internal error : channels = %d\n", psf->sf.channels) ; return SFE_INTERNAL ; } ; double64_caps = double64_get_capability (psf) ; psf->blockwidth...
30,630,304,705,818,692,000,000,000,000,000,000,000
None
null
[ "CWE-369" ]
CVE-2017-14634
In libsndfile 1.0.28, a divide-by-zero error exists in the function double64_init() in double64.c, which may lead to DoS when playing a crafted audio file.
https://nvd.nist.gov/vuln/detail/CVE-2017-14634
210,207
chafa
56fabfa18a6880b4cb66047fa6557920078048d9
https://github.com/hpjansson/chafa
https://github.com/hpjansson/chafa/commit/56fabfa18a6880b4cb66047fa6557920078048d9
XwdLoader: Fix buffer over-read and improve general robustness This commit fixes a buffer over-read that could occur due to g_ntohl() evaluating its argument more than once if at least one of the following is true: * Build target is not x86. * __OPTIMIZE__ is not set during compilation (e.g. -O0 was used). It also i...
1
load_header (XwdLoader *loader) // gconstpointer in, gsize in_max_len, XwdHeader *header_out) { XwdHeader *h = &loader->header; XwdHeader in; const guint32 *p = (const guint32 *) &in; if (!file_mapping_taste (loader->mapping, &in, 0, sizeof (in))) return FALSE; h->header_size = g_ntohl (*(...
249,808,330,917,895,170,000,000,000,000,000,000,000
xwd-loader.c
237,760,179,666,021,740,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2022-2301
Buffer Over-read in GitHub repository hpjansson/chafa prior to 1.10.3.
https://nvd.nist.gov/vuln/detail/CVE-2022-2301
430,478
chafa
56fabfa18a6880b4cb66047fa6557920078048d9
https://github.com/hpjansson/chafa
https://github.com/hpjansson/chafa/commit/56fabfa18a6880b4cb66047fa6557920078048d9
XwdLoader: Fix buffer over-read and improve general robustness This commit fixes a buffer over-read that could occur due to g_ntohl() evaluating its argument more than once if at least one of the following is true: * Build target is not x86. * __OPTIMIZE__ is not set during compilation (e.g. -O0 was used). It also i...
0
load_header (XwdLoader *loader) { XwdHeader *h = &loader->header; XwdHeader in; const XwdHeader *inp; if (!file_mapping_taste (loader->mapping, &in, 0, sizeof (in))) return FALSE; inp = &in; UNPACK_FIELD_U32 (h, inp, header_size); UNPACK_FIELD_U32 (h, inp, file_version); UNPAC...
35,000,722,847,955,614,000,000,000,000,000,000,000
xwd-loader.c
9,211,984,097,836,637,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2022-2301
Buffer Over-read in GitHub repository hpjansson/chafa prior to 1.10.3.
https://nvd.nist.gov/vuln/detail/CVE-2022-2301
210,212
libvips
2ab5aa7bf515135c2b02d42e9a72e4c98e17031a
https://github.com/libvips/libvips
https://github.com/libvips/libvips/commit/2ab5aa7bf515135c2b02d42e9a72e4c98e17031a
fix a used-before-set error in im_vips2dz we were reading an uninited string in a vips7 compatibility wrapper, thanks yifengchen-cc see https://github.com/libvips/libvips/issues/1419
1
im_vips2dz( IMAGE *in, const char *filename ) { char *p, *q; char name[FILENAME_MAX]; char mode[FILENAME_MAX]; char buf[FILENAME_MAX]; int i; VipsForeignDzLayout layout = VIPS_FOREIGN_DZ_LAYOUT_DZ; char *suffix = ".jpeg"; int overlap = 0; int tile_size = 256; VipsForeignDzDepth depth = VIPS_FOREIGN_DZ_DEPTH...
139,851,357,086,429,170,000,000,000,000,000,000,000
im_vips2dz.c
232,657,374,181,925,500,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2020-20739
im_vips2dz in /libvips/libvips/deprecated/im_vips2dz.c in libvips before 8.8.2 has an uninitialized variable which may cause the leakage of remote server path or stack address.
https://nvd.nist.gov/vuln/detail/CVE-2020-20739
430,482
libvips
2ab5aa7bf515135c2b02d42e9a72e4c98e17031a
https://github.com/libvips/libvips
https://github.com/libvips/libvips/commit/2ab5aa7bf515135c2b02d42e9a72e4c98e17031a
fix a used-before-set error in im_vips2dz we were reading an uninited string in a vips7 compatibility wrapper, thanks yifengchen-cc see https://github.com/libvips/libvips/issues/1419
0
im_vips2dz( IMAGE *in, const char *filename ) { char *p, *q; char name[FILENAME_MAX]; char mode[FILENAME_MAX]; char buf[FILENAME_MAX]; int i; VipsForeignDzLayout layout = VIPS_FOREIGN_DZ_LAYOUT_DZ; char *suffix = ".jpeg"; int overlap = 0; int tile_size = 256; VipsForeignDzDepth depth = VIPS_FOREIGN_DZ_DEPTH...
117,560,909,108,549,230,000,000,000,000,000,000,000
im_vips2dz.c
16,179,909,142,491,178,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2020-20739
im_vips2dz in /libvips/libvips/deprecated/im_vips2dz.c in libvips before 8.8.2 has an uninitialized variable which may cause the leakage of remote server path or stack address.
https://nvd.nist.gov/vuln/detail/CVE-2020-20739
210,213
qemu
cc45995294b92d95319b4782750a3580cabdbc0c
https://github.com/bonzini/qemu
http://git.qemu.org/?p=qemu.git;a=commit;h=cc45995294b92d95319b4782750a3580cabdbc0c
virtio: out-of-bounds buffer write on invalid state load CVE-2013-4151 QEMU 1.0 out-of-bounds buffer write in virtio_load@hw/virtio/virtio.c So we have this code since way back when: num = qemu_get_be32(f); for (i = 0; i < num; i++) { vdev->vq[i].vring.num = qemu_get_be32(f); array of vqs has size ...
1
int virtio_load(VirtIODevice *vdev, QEMUFile *f) { int num, i, ret; uint32_t features; uint32_t supported_features; BusState *qbus = qdev_get_parent_bus(DEVICE(vdev)); VirtioBusClass *k = VIRTIO_BUS_GET_CLASS(qbus); if (k->load_config) { ret = k->load_config(qbus->parent, f); if...
83,154,094,430,606,850,000,000,000,000,000,000,000
virtio.c
245,768,543,431,827,900,000,000,000,000,000,000,000
[ "CWE-94" ]
CVE-2013-4151
The virtio_load function in virtio/virtio.c in QEMU 1.x before 1.7.2 allows remote attackers to execute arbitrary code via a crafted savevm image, which triggers an out-of-bounds write.
https://nvd.nist.gov/vuln/detail/CVE-2013-4151
430,483
qemu
cc45995294b92d95319b4782750a3580cabdbc0c
https://github.com/bonzini/qemu
http://git.qemu.org/?p=qemu.git;a=commit;h=cc45995294b92d95319b4782750a3580cabdbc0c
virtio: out-of-bounds buffer write on invalid state load CVE-2013-4151 QEMU 1.0 out-of-bounds buffer write in virtio_load@hw/virtio/virtio.c So we have this code since way back when: num = qemu_get_be32(f); for (i = 0; i < num; i++) { vdev->vq[i].vring.num = qemu_get_be32(f); array of vqs has size ...
0
int virtio_load(VirtIODevice *vdev, QEMUFile *f) { int i, ret; uint32_t num; uint32_t features; uint32_t supported_features; BusState *qbus = qdev_get_parent_bus(DEVICE(vdev)); VirtioBusClass *k = VIRTIO_BUS_GET_CLASS(qbus); if (k->load_config) { ret = k->load_config(qbus->parent, f...
239,681,496,701,794,370,000,000,000,000,000,000,000
virtio.c
183,883,880,964,604,100,000,000,000,000,000,000,000
[ "CWE-94" ]
CVE-2013-4151
The virtio_load function in virtio/virtio.c in QEMU 1.x before 1.7.2 allows remote attackers to execute arbitrary code via a crafted savevm image, which triggers an out-of-bounds write.
https://nvd.nist.gov/vuln/detail/CVE-2013-4151
210,219
libxml2
bdd66182ef53fe1f7209ab6535fda56366bd7ac9
https://github.com/GNOME/libxml2
https://git.gnome.org/browse/libxml2/commit/?id=bdd66182ef53fe1f7209ab6535fda56366bd7ac9
Avoid building recursive entities For https://bugzilla.gnome.org/show_bug.cgi?id=762100 When we detect a recusive entity we should really not build the associated data, moreover if someone bypass libxml2 fatal errors and still tries to serialize a broken entity make sure we don't risk to get ito a recursion * parser...
1
xmlStringGetNodeList(const xmlDoc *doc, const xmlChar *value) { xmlNodePtr ret = NULL, last = NULL; xmlNodePtr node; xmlChar *val; const xmlChar *cur = value; const xmlChar *q; xmlEntityPtr ent; xmlBufPtr buf; if (value == NULL) return(NULL); buf = xmlBufCreateSize(0); if (buf ...
267,903,642,859,318,300,000,000,000,000,000,000,000
tree.c
315,848,746,426,749,160,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2016-3627
The xmlStringGetNodeList function in tree.c in libxml2 2.9.3 and earlier, when used in recovery mode, allows context-dependent attackers to cause a denial of service (infinite recursion, stack consumption, and application crash) via a crafted XML document.
https://nvd.nist.gov/vuln/detail/CVE-2016-3627