idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
422,467 | php-src | 0e097f2c96ce31b16fa371981045f224e5a37160 | https://github.com/php/php-src | https://github.com/php/php-src/commit/0e097f2c96ce31b16fa371981045f224e5a37160 | Fixed bug #75535
The sizeof()s for Content-Length and Transfer-Encoding were missing
the trailing ":". Apart from being generally wrong, this no longer
verified that the header actually contains a colon, leading to the
null http_header_value being used.
Additionally, in the interest of being defensive, also make sure... | 0 | php_stream *php_stream_url_wrap_http_ex(php_stream_wrapper *wrapper,
const char *path, const char *mode, int options, zend_string **opened_path,
php_stream_context *context, int redirect_max, int flags STREAMS_DC) /* {{{ */
{
php_stream *stream = NULL;
php_url *resource = NULL;
int use_ssl;
int use_proxy = 0;
... | 195,212,755,583,817,380,000,000,000,000,000,000,000 | http_fopen_wrapper.c | 109,969,581,101,881,980,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2018-14884 | An issue was discovered in PHP 7.0.x before 7.0.27, 7.1.x before 7.1.13, and 7.2.x before 7.2.1. Inappropriately parsing an HTTP response leads to a segmentation fault because http_header_value in ext/standard/http_fopen_wrapper.c can be a NULL value that is mishandled in an atoi call. | https://nvd.nist.gov/vuln/detail/CVE-2018-14884 |
209,842 | collectd | f6be4f9b49b949b379326c3d7002476e6ce4f211 | https://github.com/collectd/collectd | https://github.com/collectd/collectd/commit/f6be4f9b49b949b379326c3d7002476e6ce4f211 | network plugin: Fix endless loop DOS in parse_packet()
When correct 'Signature part' is received by Collectd, configured without
AuthFile option, condition for endless loop occurs due to missing increase
of pointer to next unprocessed part.
This is a forward-port of #2233.
Fixes: CVE-2017-7401
Closes: #2174
Signed-o... | 1 | static int parse_part_sign_sha256(sockent_t *se, /* {{{ */
void **ret_buffer, size_t *ret_buffer_len,
int flags) {
static c_complain_t complain_no_users = C_COMPLAIN_INIT_STATIC;
char *buffer;
size_t buffer_len;
size_t buffer_offset;
size_t... | 172,566,737,842,384,700,000,000,000,000,000,000,000 | network.c | 72,658,777,427,980,930,000,000,000,000,000,000,000 | [
"CWE-835"
] | CVE-2017-7401 | Incorrect interaction of the parse_packet() and parse_part_sign_sha256() functions in network.c in collectd 5.7.1 and earlier allows remote attackers to cause a denial of service (infinite loop) of a collectd instance (configured with "SecurityLevel None" and with empty "AuthFile" options) via a crafted UDP packet. | https://nvd.nist.gov/vuln/detail/CVE-2017-7401 |
422,481 | collectd | f6be4f9b49b949b379326c3d7002476e6ce4f211 | https://github.com/collectd/collectd | https://github.com/collectd/collectd/commit/f6be4f9b49b949b379326c3d7002476e6ce4f211 | network plugin: Fix endless loop DOS in parse_packet()
When correct 'Signature part' is received by Collectd, configured without
AuthFile option, condition for endless loop occurs due to missing increase
of pointer to next unprocessed part.
This is a forward-port of #2233.
Fixes: CVE-2017-7401
Closes: #2174
Signed-o... | 0 | static int parse_part_sign_sha256(sockent_t *se, /* {{{ */
void **ret_buffer, size_t *ret_buffer_len,
int flags) {
static c_complain_t complain_no_users = C_COMPLAIN_INIT_STATIC;
char *buffer;
size_t buffer_len;
size_t buffer_offset;
size_t... | 26,885,811,817,121,940,000,000,000,000,000,000,000 | network.c | 323,039,824,554,894,080,000,000,000,000,000,000,000 | [
"CWE-835"
] | CVE-2017-7401 | Incorrect interaction of the parse_packet() and parse_part_sign_sha256() functions in network.c in collectd 5.7.1 and earlier allows remote attackers to cause a denial of service (infinite loop) of a collectd instance (configured with "SecurityLevel None" and with empty "AuthFile" options) via a crafted UDP packet. | https://nvd.nist.gov/vuln/detail/CVE-2017-7401 |
209,851 | linux | 27ae357fa82be5ab73b2ef8d39dcb8ca2563483a | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=27ae357fa82be5ab73b2ef8d39dcb8ca2563483a | mm, oom: fix concurrent munlock and oom reaper unmap, v3
Since exit_mmap() is done without the protection of mm->mmap_sem, it is
possible for the oom reaper to concurrently operate on an mm until
MMF_OOM_SKIP is set.
This allows munlock_vma_pages_all() to concurrently run while the oom
reaper is operating on a vma. ... | 1 | void exit_mmap(struct mm_struct *mm)
{
struct mmu_gather tlb;
struct vm_area_struct *vma;
unsigned long nr_accounted = 0;
/* mm's last user has gone, and its about to be pulled down */
mmu_notifier_release(mm);
if (mm->locked_vm) {
vma = mm->mmap;
while (vma) {
if (vma->vm_flags & VM_LOCKED)
munlock_... | 177,202,878,318,483,350,000,000,000,000,000,000,000 | mmap.c | 63,206,378,993,348,060,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2018-1000200 | The Linux Kernel versions 4.14, 4.15, and 4.16 has a null pointer dereference which can result in an out of memory (OOM) killing of large mlocked processes. The issue arises from an oom killed process's final thread calling exit_mmap(), which calls munlock_vma_pages_all() for mlocked vmas.This can happen synchronously ... | https://nvd.nist.gov/vuln/detail/CVE-2018-1000200 |
422,870 | linux | 27ae357fa82be5ab73b2ef8d39dcb8ca2563483a | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=27ae357fa82be5ab73b2ef8d39dcb8ca2563483a | mm, oom: fix concurrent munlock and oom reaper unmap, v3
Since exit_mmap() is done without the protection of mm->mmap_sem, it is
possible for the oom reaper to concurrently operate on an mm until
MMF_OOM_SKIP is set.
This allows munlock_vma_pages_all() to concurrently run while the oom
reaper is operating on a vma. ... | 0 | void exit_mmap(struct mm_struct *mm)
{
struct mmu_gather tlb;
struct vm_area_struct *vma;
unsigned long nr_accounted = 0;
/* mm's last user has gone, and its about to be pulled down */
mmu_notifier_release(mm);
if (unlikely(mm_is_oom_victim(mm))) {
/*
* Manually reap the mm to free as much memory as possib... | 249,457,738,206,957,370,000,000,000,000,000,000,000 | mmap.c | 266,814,544,061,220,000,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2018-1000200 | The Linux Kernel versions 4.14, 4.15, and 4.16 has a null pointer dereference which can result in an out of memory (OOM) killing of large mlocked processes. The issue arises from an oom killed process's final thread calling exit_mmap(), which calls munlock_vma_pages_all() for mlocked vmas.This can happen synchronously ... | https://nvd.nist.gov/vuln/detail/CVE-2018-1000200 |
209,854 | linux | 67f93df79aeefc3add4e4b31a752600f834236e2 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=67f93df79aeefc3add4e4b31a752600f834236e2 | dccp: check sk for closed state in dccp_sendmsg()
dccp_disconnect() sets 'dp->dccps_hc_tx_ccid' tx handler to NULL,
therefore if DCCP socket is disconnected and dccp_sendmsg() is
called after it, it will cause a NULL pointer dereference in
dccp_write_xmit().
This crash and the reproducer was reported by syzbot. Looks... | 1 | int dccp_sendmsg(struct sock *sk, struct msghdr *msg, size_t len)
{
const struct dccp_sock *dp = dccp_sk(sk);
const int flags = msg->msg_flags;
const int noblock = flags & MSG_DONTWAIT;
struct sk_buff *skb;
int rc, size;
long timeo;
trace_dccp_probe(sk, len);
if (len > dp->dccps_mss_cache)
return -EMSGSIZE;... | 193,288,749,399,592,100,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2018-1130 | Linux kernel before version 4.16-rc7 is vulnerable to a null pointer dereference in dccp_write_xmit() function in net/dccp/output.c in that allows a local user to cause a denial of service by a number of certain crafted system calls. | https://nvd.nist.gov/vuln/detail/CVE-2018-1130 |
422,899 | linux | 67f93df79aeefc3add4e4b31a752600f834236e2 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=67f93df79aeefc3add4e4b31a752600f834236e2 | dccp: check sk for closed state in dccp_sendmsg()
dccp_disconnect() sets 'dp->dccps_hc_tx_ccid' tx handler to NULL,
therefore if DCCP socket is disconnected and dccp_sendmsg() is
called after it, it will cause a NULL pointer dereference in
dccp_write_xmit().
This crash and the reproducer was reported by syzbot. Looks... | 0 | int dccp_sendmsg(struct sock *sk, struct msghdr *msg, size_t len)
{
const struct dccp_sock *dp = dccp_sk(sk);
const int flags = msg->msg_flags;
const int noblock = flags & MSG_DONTWAIT;
struct sk_buff *skb;
int rc, size;
long timeo;
trace_dccp_probe(sk, len);
if (len > dp->dccps_mss_cache)
return -EMSGSIZE;... | 270,723,652,976,414,430,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2018-1130 | Linux kernel before version 4.16-rc7 is vulnerable to a null pointer dereference in dccp_write_xmit() function in net/dccp/output.c in that allows a local user to cause a denial of service by a number of certain crafted system calls. | https://nvd.nist.gov/vuln/detail/CVE-2018-1130 |
209,855 | ruby | bcc2421b4938fc1d9f5f3fb6ef2320571b27af42 | https://github.com/ruby/ruby | https://github.com/ruby/ruby/commit/bcc2421b4938fc1d9f5f3fb6ef2320571b27af42 | function.c: check arguments
* ext/fiddle/function.c (initialize): check all arguments first.
reported by Marcin 'Icewall' Noga of Cisco Talos.
git-svn-id: svn+ssh://ci.ruby-lang.org/ruby/trunk@53082 b2dd03c8-39d4-4d8f-98ff-823fe69b080e | 1 | initialize(int argc, VALUE argv[], VALUE self)
{
ffi_cif * cif;
ffi_type **arg_types;
ffi_status result;
VALUE ptr, args, ret_type, abi, kwds;
long i;
rb_scan_args(argc, argv, "31:", &ptr, &args, &ret_type, &abi, &kwds);
if(NIL_P(abi)) abi = INT2NUM(FFI_DEFAULT_ABI);
Check_Type(args, T... | 239,802,879,057,867,750,000,000,000,000,000,000,000 | function.c | 133,362,304,003,608,210,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2016-2339 | An exploitable heap overflow vulnerability exists in the Fiddle::Function.new "initialize" function functionality of Ruby. In Fiddle::Function.new "initialize" heap buffer "arg_types" allocation is made based on args array length. Specially constructed object passed as element of args array can increase this array size... | https://nvd.nist.gov/vuln/detail/CVE-2016-2339 |
422,916 | ruby | bcc2421b4938fc1d9f5f3fb6ef2320571b27af42 | https://github.com/ruby/ruby | https://github.com/ruby/ruby/commit/bcc2421b4938fc1d9f5f3fb6ef2320571b27af42 | function.c: check arguments
* ext/fiddle/function.c (initialize): check all arguments first.
reported by Marcin 'Icewall' Noga of Cisco Talos.
git-svn-id: svn+ssh://ci.ruby-lang.org/ruby/trunk@53082 b2dd03c8-39d4-4d8f-98ff-823fe69b080e | 0 | initialize(int argc, VALUE argv[], VALUE self)
{
ffi_cif * cif;
ffi_type **arg_types, *rtype;
ffi_status result;
VALUE ptr, args, ret_type, abi, kwds;
long i, len;
int nabi;
void *cfunc;
rb_scan_args(argc, argv, "31:", &ptr, &args, &ret_type, &abi, &kwds);
ptr = rb_Integer(ptr);
... | 68,781,768,134,703,340,000,000,000,000,000,000,000 | function.c | 5,824,290,337,001,788,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2016-2339 | An exploitable heap overflow vulnerability exists in the Fiddle::Function.new "initialize" function functionality of Ruby. In Fiddle::Function.new "initialize" heap buffer "arg_types" allocation is made based on args array length. Specially constructed object passed as element of args array can increase this array size... | https://nvd.nist.gov/vuln/detail/CVE-2016-2339 |
209,901 | linux | 40413955ee265a5e42f710940ec78f5450d49149 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=40413955ee265a5e42f710940ec78f5450d49149 | Cipso: cipso_v4_optptr enter infinite loop
in for(),if((optlen > 0) && (optptr[1] == 0)), enter infinite loop.
Test: receive a packet which the ip length > 20 and the first byte of ip option is 0, produce this issue
Signed-off-by: yujuan.qi <yujuan.qi@mediatek.com>
Acked-by: Paul Moore <paul@paul-moore.com>
Signed-o... | 1 | unsigned char *cipso_v4_optptr(const struct sk_buff *skb)
{
const struct iphdr *iph = ip_hdr(skb);
unsigned char *optptr = (unsigned char *)&(ip_hdr(skb)[1]);
int optlen;
int taglen;
for (optlen = iph->ihl*4 - sizeof(struct iphdr); optlen > 0; ) {
if (optptr[0] == IPOPT_CIPSO)
return optptr;
taglen = optpt... | 284,653,662,784,044,800,000,000,000,000,000,000,000 | None | null | [
"CWE-835"
] | CVE-2018-10938 | A flaw was found in the Linux kernel present since v4.0-rc1 and through v4.13-rc4. A crafted network packet sent remotely by an attacker may force the kernel to enter an infinite loop in the cipso_v4_optptr() function in net/ipv4/cipso_ipv4.c leading to a denial-of-service. A certain non-default configuration of LSM (L... | https://nvd.nist.gov/vuln/detail/CVE-2018-10938 |
423,532 | linux | 40413955ee265a5e42f710940ec78f5450d49149 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=40413955ee265a5e42f710940ec78f5450d49149 | Cipso: cipso_v4_optptr enter infinite loop
in for(),if((optlen > 0) && (optptr[1] == 0)), enter infinite loop.
Test: receive a packet which the ip length > 20 and the first byte of ip option is 0, produce this issue
Signed-off-by: yujuan.qi <yujuan.qi@mediatek.com>
Acked-by: Paul Moore <paul@paul-moore.com>
Signed-o... | 0 | unsigned char *cipso_v4_optptr(const struct sk_buff *skb)
{
const struct iphdr *iph = ip_hdr(skb);
unsigned char *optptr = (unsigned char *)&(ip_hdr(skb)[1]);
int optlen;
int taglen;
for (optlen = iph->ihl*4 - sizeof(struct iphdr); optlen > 0; ) {
switch (optptr[0]) {
case IPOPT_CIPSO:
return optptr;
cas... | 282,880,649,645,293,870,000,000,000,000,000,000,000 | None | null | [
"CWE-835"
] | CVE-2018-10938 | A flaw was found in the Linux kernel present since v4.0-rc1 and through v4.13-rc4. A crafted network packet sent remotely by an attacker may force the kernel to enter an infinite loop in the cipso_v4_optptr() function in net/ipv4/cipso_ipv4.c leading to a denial-of-service. A certain non-default configuration of LSM (L... | https://nvd.nist.gov/vuln/detail/CVE-2018-10938 |
209,905 | quagga | 3f872fe60463a931c5c766dbf8c36870c0023e88 | https://github.com/Quagga/quagga | http://git.savannah.gnu.org/gitweb/?p=quagga.git;a=commitdiff;h=3f872fe60463a931c5c766dbf8c36870c0023e88 | ospfd: CVE-2013-2236, stack overrun in apiserver
the OSPF API-server (exporting the LSDB and allowing announcement of
Opaque-LSAs) writes past the end of fixed on-stack buffers. This leads
to an exploitable stack overflow.
For this condition to occur, the following two conditions must be true:
- Quagga is configured... | 1 | new_msg_lsa_change_notify (u_char msgtype,
u_int32_t seqnum,
struct in_addr ifaddr,
struct in_addr area_id,
u_char is_self_originated, struct lsa_header *data)
{
u_char buf[OSPF_API_MAX_MSG_SIZE];
struct msg_lsa_change_notify *nmsg;
int len;
assert (data);
nmsg = (struct msg_lsa_chan... | 296,598,229,109,011,120,000,000,000,000,000,000,000 | ospf_api.c | 292,116,959,237,006,000,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-2236 | Stack-based buffer overflow in the new_msg_lsa_change_notify function in the OSPFD API (ospf_api.c) in Quagga before 0.99.22.2, when --enable-opaque-lsa and the -a command line option are used, allows remote attackers to cause a denial of service (crash) via a large LSA. | https://nvd.nist.gov/vuln/detail/CVE-2013-2236 |
423,550 | quagga | 3f872fe60463a931c5c766dbf8c36870c0023e88 | https://github.com/Quagga/quagga | http://git.savannah.gnu.org/gitweb/?p=quagga.git;a=commitdiff;h=3f872fe60463a931c5c766dbf8c36870c0023e88 | ospfd: CVE-2013-2236, stack overrun in apiserver
the OSPF API-server (exporting the LSDB and allowing announcement of
Opaque-LSAs) writes past the end of fixed on-stack buffers. This leads
to an exploitable stack overflow.
For this condition to occur, the following two conditions must be true:
- Quagga is configured... | 0 | new_msg_lsa_change_notify (u_char msgtype,
u_int32_t seqnum,
struct in_addr ifaddr,
struct in_addr area_id,
u_char is_self_originated, struct lsa_header *data)
{
u_char buf[OSPF_API_MAX_MSG_SIZE];
struct msg_lsa_change_notify *nmsg;
int len;
assert (data);
nmsg = (struct msg_lsa_chan... | 199,158,163,153,130,500,000,000,000,000,000,000,000 | ospf_api.c | 14,936,573,712,231,030,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-2236 | Stack-based buffer overflow in the new_msg_lsa_change_notify function in the OSPFD API (ospf_api.c) in Quagga before 0.99.22.2, when --enable-opaque-lsa and the -a command line option are used, allows remote attackers to cause a denial of service (crash) via a large LSA. | https://nvd.nist.gov/vuln/detail/CVE-2013-2236 |
209,918 | linux | 362bca57f5d78220f8b5907b875961af9436e229 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=362bca57f5d78220f8b5907b875961af9436e229 | ALSA: pcm: prevent UAF in snd_pcm_info
When the device descriptor is closed, the `substream->runtime` pointer
is freed. But another thread may be in the ioctl handler, case
SNDRV_CTL_IOCTL_PCM_INFO. This case calls snd_pcm_info_user() which
calls snd_pcm_info() which accesses the now freed `substream->runtime`.
Note:... | 1 | static int snd_pcm_control_ioctl(struct snd_card *card,
struct snd_ctl_file *control,
unsigned int cmd, unsigned long arg)
{
switch (cmd) {
case SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE:
{
int device;
if (get_user(device, (int __user *)arg))
return -EFAULT;
mutex_lock(®ister_mutex);
device = sn... | 213,992,713,440,203,670,000,000,000,000,000,000,000 | pcm.c | 141,434,022,465,371,350,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2017-0861 | Use-after-free vulnerability in the snd_pcm_info function in the ALSA subsystem in the Linux kernel allows attackers to gain privileges via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2017-0861 |
424,189 | linux | 362bca57f5d78220f8b5907b875961af9436e229 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=362bca57f5d78220f8b5907b875961af9436e229 | ALSA: pcm: prevent UAF in snd_pcm_info
When the device descriptor is closed, the `substream->runtime` pointer
is freed. But another thread may be in the ioctl handler, case
SNDRV_CTL_IOCTL_PCM_INFO. This case calls snd_pcm_info_user() which
calls snd_pcm_info() which accesses the now freed `substream->runtime`.
Note:... | 0 | static int snd_pcm_control_ioctl(struct snd_card *card,
struct snd_ctl_file *control,
unsigned int cmd, unsigned long arg)
{
switch (cmd) {
case SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE:
{
int device;
if (get_user(device, (int __user *)arg))
return -EFAULT;
mutex_lock(®ister_mutex);
device = sn... | 25,446,867,703,928,335,000,000,000,000,000,000,000 | pcm.c | 27,394,811,321,313,830,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2017-0861 | Use-after-free vulnerability in the snd_pcm_info function in the ALSA subsystem in the Linux kernel allows attackers to gain privileges via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2017-0861 |
209,923 | vim | 143367256836b0f69881dc0c65ff165ae091dbc5 | https://github.com/vim/vim | https://github.com/vim/vim/commit/143367256836b0f69881dc0c65ff165ae091dbc5 | patch 8.2.4042: Vim9: build error
Problem: Vim9: build error.
Solution: Use grow array instead of character pointer. | 1 | exec_instructions(ectx_T *ectx)
{
int ret = FAIL;
int save_trylevel_at_start = ectx->ec_trylevel_at_start;
int dict_stack_len_at_start = dict_stack.ga_len;
// Start execution at the first instruction.
ectx->ec_iidx = 0;
// Only catch exceptions in this instruction list.
ectx->ec_tryleve... | 170,785,015,866,798,960,000,000,000,000,000,000,000 | vim9execute.c | 276,451,646,520,435,980,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2022-0156 | vim is vulnerable to Use After Free | https://nvd.nist.gov/vuln/detail/CVE-2022-0156 |
424,307 | vim | 143367256836b0f69881dc0c65ff165ae091dbc5 | https://github.com/vim/vim | https://github.com/vim/vim/commit/143367256836b0f69881dc0c65ff165ae091dbc5 | patch 8.2.4042: Vim9: build error
Problem: Vim9: build error.
Solution: Use grow array instead of character pointer. | 0 | exec_instructions(ectx_T *ectx)
{
int ret = FAIL;
int save_trylevel_at_start = ectx->ec_trylevel_at_start;
int dict_stack_len_at_start = dict_stack.ga_len;
// Start execution at the first instruction.
ectx->ec_iidx = 0;
// Only catch exceptions in this instruction list.
ectx->ec_tryleve... | 259,954,459,626,822,550,000,000,000,000,000,000,000 | vim9execute.c | 176,513,784,089,982,730,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2022-0156 | vim is vulnerable to Use After Free | https://nvd.nist.gov/vuln/detail/CVE-2022-0156 |
209,924 | linux | 5d6751eaff672ea77642e74e92e6c0ac7f9709ab | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5d6751eaff672ea77642e74e92e6c0ac7f9709ab | ath6kl: add some bounds checking
The "ev->traffic_class" and "reply->ac" variables come from the network
and they're used as an offset into the wmi->stream_exist_for_ac[] array.
Those variables are u8 so they can be 0-255 but the stream_exist_for_ac[]
array only has WMM_NUM_AC (4) elements. We need to add a couple bo... | 1 | static int ath6kl_wmi_pstream_timeout_event_rx(struct wmi *wmi, u8 *datap,
int len)
{
struct wmi_pstream_timeout_event *ev;
if (len < sizeof(struct wmi_pstream_timeout_event))
return -EINVAL;
ev = (struct wmi_pstream_timeout_event *) datap;
/*
* When the pstream (fat pipe == AC) timesout, it mean... | 255,312,127,974,884,330,000,000,000,000,000,000,000 | wmi.c | 260,882,522,128,854,800,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-15926 | An issue was discovered in the Linux kernel before 5.2.3. Out of bounds access exists in the functions ath6kl_wmi_pstream_timeout_event_rx and ath6kl_wmi_cac_event_rx in the file drivers/net/wireless/ath/ath6kl/wmi.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-15926 |
424,409 | linux | 5d6751eaff672ea77642e74e92e6c0ac7f9709ab | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5d6751eaff672ea77642e74e92e6c0ac7f9709ab | ath6kl: add some bounds checking
The "ev->traffic_class" and "reply->ac" variables come from the network
and they're used as an offset into the wmi->stream_exist_for_ac[] array.
Those variables are u8 so they can be 0-255 but the stream_exist_for_ac[]
array only has WMM_NUM_AC (4) elements. We need to add a couple bo... | 0 | static int ath6kl_wmi_pstream_timeout_event_rx(struct wmi *wmi, u8 *datap,
int len)
{
struct wmi_pstream_timeout_event *ev;
if (len < sizeof(struct wmi_pstream_timeout_event))
return -EINVAL;
ev = (struct wmi_pstream_timeout_event *) datap;
if (ev->traffic_class >= WMM_NUM_AC) {
ath6kl_err("invali... | 324,189,157,098,818,840,000,000,000,000,000,000,000 | wmi.c | 271,638,234,349,830,970,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-15926 | An issue was discovered in the Linux kernel before 5.2.3. Out of bounds access exists in the functions ath6kl_wmi_pstream_timeout_event_rx and ath6kl_wmi_cac_event_rx in the file drivers/net/wireless/ath/ath6kl/wmi.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-15926 |
209,925 | linux | 5d6751eaff672ea77642e74e92e6c0ac7f9709ab | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5d6751eaff672ea77642e74e92e6c0ac7f9709ab | ath6kl: add some bounds checking
The "ev->traffic_class" and "reply->ac" variables come from the network
and they're used as an offset into the wmi->stream_exist_for_ac[] array.
Those variables are u8 so they can be 0-255 but the stream_exist_for_ac[]
array only has WMM_NUM_AC (4) elements. We need to add a couple bo... | 1 | static int ath6kl_wmi_cac_event_rx(struct wmi *wmi, u8 *datap, int len,
struct ath6kl_vif *vif)
{
struct wmi_cac_event *reply;
struct ieee80211_tspec_ie *ts;
u16 active_tsids, tsinfo;
u8 tsid, index;
u8 ts_id;
if (len < sizeof(struct wmi_cac_event))
return -EINVAL;
reply = (struct wmi_cac_event *) dat... | 247,523,727,174,579,900,000,000,000,000,000,000,000 | wmi.c | 260,882,522,128,854,800,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-15926 | An issue was discovered in the Linux kernel before 5.2.3. Out of bounds access exists in the functions ath6kl_wmi_pstream_timeout_event_rx and ath6kl_wmi_cac_event_rx in the file drivers/net/wireless/ath/ath6kl/wmi.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-15926 |
424,391 | linux | 5d6751eaff672ea77642e74e92e6c0ac7f9709ab | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5d6751eaff672ea77642e74e92e6c0ac7f9709ab | ath6kl: add some bounds checking
The "ev->traffic_class" and "reply->ac" variables come from the network
and they're used as an offset into the wmi->stream_exist_for_ac[] array.
Those variables are u8 so they can be 0-255 but the stream_exist_for_ac[]
array only has WMM_NUM_AC (4) elements. We need to add a couple bo... | 0 | static int ath6kl_wmi_cac_event_rx(struct wmi *wmi, u8 *datap, int len,
struct ath6kl_vif *vif)
{
struct wmi_cac_event *reply;
struct ieee80211_tspec_ie *ts;
u16 active_tsids, tsinfo;
u8 tsid, index;
u8 ts_id;
if (len < sizeof(struct wmi_cac_event))
return -EINVAL;
reply = (struct wmi_cac_event *) dat... | 118,777,259,687,429,640,000,000,000,000,000,000,000 | wmi.c | 271,638,234,349,830,970,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-15926 | An issue was discovered in the Linux kernel before 5.2.3. Out of bounds access exists in the functions ath6kl_wmi_pstream_timeout_event_rx and ath6kl_wmi_cac_event_rx in the file drivers/net/wireless/ath/ath6kl/wmi.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-15926 |
209,934 | libjpeg-turbo | c30b1e72dac76343ef9029833d1561de07d29bad | https://github.com/libjpeg-turbo/libjpeg-turbo | https://github.com/libjpeg-turbo/libjpeg-turbo/commit/c30b1e72dac76343ef9029833d1561de07d29bad | 64-bit tjbench: Fix signed int overflow/segfault
... that occurred when attempting to decompress images with more than
715827882 (2048*1024*1024 / 3) pixels.
Fixes #388 | 1 | static int decomp(unsigned char *srcBuf, unsigned char **jpegBuf,
unsigned long *jpegSize, unsigned char *dstBuf, int w, int h,
int subsamp, int jpegQual, char *fileName, int tilew,
int tileh)
{
char tempStr[1024], sizeStr[24] = "\0", qualStr[13] = "\0", *ptr;
F... | 37,264,389,053,365,870,000,000,000,000,000,000,000 | tjbench.c | 77,803,310,055,110,570,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2019-2201 | In generate_jsimd_ycc_rgb_convert_neon of jsimd_arm64_neon.S, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution in an unprivileged process with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: A... | https://nvd.nist.gov/vuln/detail/CVE-2019-2201 |
424,544 | libjpeg-turbo | c30b1e72dac76343ef9029833d1561de07d29bad | https://github.com/libjpeg-turbo/libjpeg-turbo | https://github.com/libjpeg-turbo/libjpeg-turbo/commit/c30b1e72dac76343ef9029833d1561de07d29bad | 64-bit tjbench: Fix signed int overflow/segfault
... that occurred when attempting to decompress images with more than
715827882 (2048*1024*1024 / 3) pixels.
Fixes #388 | 0 | static int decomp(unsigned char *srcBuf, unsigned char **jpegBuf,
unsigned long *jpegSize, unsigned char *dstBuf, int w, int h,
int subsamp, int jpegQual, char *fileName, int tilew,
int tileh)
{
char tempStr[1024], sizeStr[24] = "\0", qualStr[13] = "\0", *ptr;
F... | 106,072,224,607,742,170,000,000,000,000,000,000,000 | tjbench.c | 63,243,249,166,194,320,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2019-2201 | In generate_jsimd_ycc_rgb_convert_neon of jsimd_arm64_neon.S, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution in an unprivileged process with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: A... | https://nvd.nist.gov/vuln/detail/CVE-2019-2201 |
209,940 | util-linux | 1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c | https://github.com/karelzak/util-linux | https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c | sys-utils/ipcutils: be careful when call calloc() for uint64 nmembs
Fix: https://github.com/karelzak/util-linux/issues/1395
Signed-off-by: Karel Zak <kzak@redhat.com> | 1 | static void get_sem_elements(struct sem_data *p)
{
size_t i;
if (!p || !p->sem_nsems || p->sem_perm.id < 0)
return;
p->elements = xcalloc(p->sem_nsems, sizeof(struct sem_elem));
for (i = 0; i < p->sem_nsems; i++) {
struct sem_elem *e = &p->elements[i];
union semun arg = { .val = 0 };
e->semval = semctl(... | 170,441,631,111,588,500,000,000,000,000,000,000,000 | ipcutils.c | 71,522,051,511,659,700,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2021-37600 | An integer overflow in util-linux through 2.37.1 can potentially cause a buffer overflow if an attacker were able to use system resources in a way that leads to a large number in the /proc/sysvipc/sem file. NOTE: this is unexploitable in GNU C Library environments, and possibly in all realistic environments | https://nvd.nist.gov/vuln/detail/CVE-2021-37600 |
424,556 | util-linux | 1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c | https://github.com/karelzak/util-linux | https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c | sys-utils/ipcutils: be careful when call calloc() for uint64 nmembs
Fix: https://github.com/karelzak/util-linux/issues/1395
Signed-off-by: Karel Zak <kzak@redhat.com> | 0 | static void get_sem_elements(struct sem_data *p)
{
size_t i;
if (!p || !p->sem_nsems || p->sem_nsems > SIZE_MAX || p->sem_perm.id < 0)
return;
p->elements = xcalloc(p->sem_nsems, sizeof(struct sem_elem));
for (i = 0; i < p->sem_nsems; i++) {
struct sem_elem *e = &p->elements[i];
union semun arg = { .val = ... | 304,086,453,175,303,660,000,000,000,000,000,000,000 | ipcutils.c | 296,284,701,655,201,040,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2021-37600 | An integer overflow in util-linux through 2.37.1 can potentially cause a buffer overflow if an attacker were able to use system resources in a way that leads to a large number in the /proc/sysvipc/sem file. NOTE: this is unexploitable in GNU C Library environments, and possibly in all realistic environments | https://nvd.nist.gov/vuln/detail/CVE-2021-37600 |
209,948 | linux | 9d47964bfd471f0dd4c89f28556aec68bffa0020 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9d47964bfd471f0dd4c89f28556aec68bffa0020 | iio: ad5755: fix off-by-one on devnr limit check
The comparison for devnr limits is off-by-one, the current check
allows 0 to AD5755_NUM_CHANNELS and the limit should be in fact
0 to AD5755_NUM_CHANNELS - 1. This can lead to an out of bounds
write to pdata->dac[devnr]. Fix this by replacing > with >= on the
compariso... | 1 | static struct ad5755_platform_data *ad5755_parse_dt(struct device *dev)
{
struct device_node *np = dev->of_node;
struct device_node *pp;
struct ad5755_platform_data *pdata;
unsigned int tmp;
unsigned int tmparray[3];
int devnr, i;
pdata = devm_kzalloc(dev, sizeof(*pdata), GFP_KERNEL);
if (!pdata)
return NULL... | 56,250,680,520,601,260,000,000,000,000,000,000,000 | ad5755.c | 136,682,195,847,664,540,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2016-10907 | An issue was discovered in drivers/iio/dac/ad5755.c in the Linux kernel before 4.8.6. There is an out of bounds write in the function ad5755_parse_dt. | https://nvd.nist.gov/vuln/detail/CVE-2016-10907 |
424,716 | linux | 9d47964bfd471f0dd4c89f28556aec68bffa0020 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9d47964bfd471f0dd4c89f28556aec68bffa0020 | iio: ad5755: fix off-by-one on devnr limit check
The comparison for devnr limits is off-by-one, the current check
allows 0 to AD5755_NUM_CHANNELS and the limit should be in fact
0 to AD5755_NUM_CHANNELS - 1. This can lead to an out of bounds
write to pdata->dac[devnr]. Fix this by replacing > with >= on the
compariso... | 0 | static struct ad5755_platform_data *ad5755_parse_dt(struct device *dev)
{
struct device_node *np = dev->of_node;
struct device_node *pp;
struct ad5755_platform_data *pdata;
unsigned int tmp;
unsigned int tmparray[3];
int devnr, i;
pdata = devm_kzalloc(dev, sizeof(*pdata), GFP_KERNEL);
if (!pdata)
return NULL... | 64,352,422,978,470,810,000,000,000,000,000,000,000 | ad5755.c | 81,975,837,985,455,370,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2016-10907 | An issue was discovered in drivers/iio/dac/ad5755.c in the Linux kernel before 4.8.6. There is an out of bounds write in the function ad5755_parse_dt. | https://nvd.nist.gov/vuln/detail/CVE-2016-10907 |
209,952 | php-src | fe13566c93f118a15a96320a546c7878fd0cfc5e | https://github.com/php/php-src | https://git.php.net/?p=php-src.git;a=commit;h=fe13566c93f118a15a96320a546c7878fd0cfc5e | Fixed bug #71527 Buffer over-write in finfo_open with malformed magic file
The actual fix is applying the upstream patch from
https://github.com/file/file/commit/6713ca45e7757297381f4b4cdb9cf5e624a9ad36 | 1 | file_check_mem(struct magic_set *ms, unsigned int level)
{
size_t len;
if (level >= ms->c.len) {
len = (ms->c.len += 20) * sizeof(*ms->c.li);
ms->c.li = CAST(struct level_info *, (ms->c.li == NULL) ?
emalloc(len) :
erealloc(ms->c.li, len));
if (ms->c.li == NULL) {
file_oomem(ms, len);
return ... | 266,010,842,088,610,330,000,000,000,000,000,000,000 | funcs.c | 157,823,946,646,046,020,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2015-8865 | The file_check_mem function in funcs.c in file before 5.23, as used in the Fileinfo component in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5, mishandles continuation-level jumps, which allows context-dependent attackers to cause a denial of service (buffer overflow and application crash) or possibly ex... | https://nvd.nist.gov/vuln/detail/CVE-2015-8865 |
424,879 | php-src | fe13566c93f118a15a96320a546c7878fd0cfc5e | https://github.com/php/php-src | https://git.php.net/?p=php-src.git;a=commit;h=fe13566c93f118a15a96320a546c7878fd0cfc5e | Fixed bug #71527 Buffer over-write in finfo_open with malformed magic file
The actual fix is applying the upstream patch from
https://github.com/file/file/commit/6713ca45e7757297381f4b4cdb9cf5e624a9ad36 | 0 | file_check_mem(struct magic_set *ms, unsigned int level)
{
size_t len;
if (level >= ms->c.len) {
len = (ms->c.len += 20 + level) * sizeof(*ms->c.li);
ms->c.li = CAST(struct level_info *, (ms->c.li == NULL) ?
emalloc(len) :
erealloc(ms->c.li, len));
if (ms->c.li == NULL) {
file_oomem(ms, len);
... | 145,272,772,843,137,940,000,000,000,000,000,000,000 | funcs.c | 336,168,117,303,982,360,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2015-8865 | The file_check_mem function in funcs.c in file before 5.23, as used in the Fileinfo component in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5, mishandles continuation-level jumps, which allows context-dependent attackers to cause a denial of service (buffer overflow and application crash) or possibly ex... | https://nvd.nist.gov/vuln/detail/CVE-2015-8865 |
209,953 | qemu | 66fed30c9cd11854fc878a4eceb507e915d7c9cd | https://github.com/bonzini/qemu | https://gitlab.com/qemu-project/qemu/-/commit/66fed30c9cd11854fc878a4eceb507e915d7c9cd | block/mirror: fix NULL pointer dereference in mirror_wait_on_conflicts()
In mirror_iteration() we call mirror_wait_on_conflicts() with
`self` parameter set to NULL.
Starting from commit d44dae1a7c we dereference `self` pointer in
mirror_wait_on_conflicts() without checks if it is not NULL.
Backtrace:
Program termi... | 1 | static void coroutine_fn mirror_wait_on_conflicts(MirrorOp *self,
MirrorBlockJob *s,
uint64_t offset,
uint64_t bytes)
{
uint64_t self_start_chunk = offset / s->granul... | 152,620,353,773,762,620,000,000,000,000,000,000,000 | mirror.c | 32,597,853,944,157,900,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2021-4145 | A NULL pointer dereference issue was found in the block mirror layer of QEMU in versions prior to 6.2.0. The `self` pointer is dereferenced in mirror_wait_on_conflicts() without ensuring that it's not NULL. A malicious unprivileged user within the guest could use this flaw to crash the QEMU process on the host when wri... | https://nvd.nist.gov/vuln/detail/CVE-2021-4145 |
424,885 | qemu | 66fed30c9cd11854fc878a4eceb507e915d7c9cd | https://github.com/bonzini/qemu | https://gitlab.com/qemu-project/qemu/-/commit/66fed30c9cd11854fc878a4eceb507e915d7c9cd | block/mirror: fix NULL pointer dereference in mirror_wait_on_conflicts()
In mirror_iteration() we call mirror_wait_on_conflicts() with
`self` parameter set to NULL.
Starting from commit d44dae1a7c we dereference `self` pointer in
mirror_wait_on_conflicts() without checks if it is not NULL.
Backtrace:
Program termi... | 0 | static void coroutine_fn mirror_wait_on_conflicts(MirrorOp *self,
MirrorBlockJob *s,
uint64_t offset,
uint64_t bytes)
{
uint64_t self_start_chunk = offset / s->granul... | 297,176,504,112,059,100,000,000,000,000,000,000,000 | mirror.c | 265,966,095,624,000,800,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2021-4145 | A NULL pointer dereference issue was found in the block mirror layer of QEMU in versions prior to 6.2.0. The `self` pointer is dereferenced in mirror_wait_on_conflicts() without ensuring that it's not NULL. A malicious unprivileged user within the guest could use this flaw to crash the QEMU process on the host when wri... | https://nvd.nist.gov/vuln/detail/CVE-2021-4145 |
209,956 | file | 6bf45271eb8e0e6577b92042ce2003ba998d1686 | https://github.com/file/file | https://github.com/file/file/commit/6bf45271eb8e0e6577b92042ce2003ba998d1686 | Don't bail if there was no error, buf could have been NULL on entry. | 1 |
private int
mget(struct magic_set *ms, const unsigned char *s, struct magic *m,
size_t nbytes, size_t o, unsigned int cont_level, int mode, int text,
int flip, uint16_t indir_level, uint16_t *name_count,
int *printed_something, int *need_separator, int *returnval)
{
uint32_t offset = ms->offset;
uint32_t... | 144,725,179,800,442,630,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2014-8116 | The ELF parser (readelf.c) in file before 5.21 allows remote attackers to cause a denial of service (CPU consumption or crash) via a large number of (1) program or (2) section headers or (3) invalid capabilities. | https://nvd.nist.gov/vuln/detail/CVE-2014-8116 |
424,985 | file | 6bf45271eb8e0e6577b92042ce2003ba998d1686 | https://github.com/file/file | https://github.com/file/file/commit/6bf45271eb8e0e6577b92042ce2003ba998d1686 | Don't bail if there was no error, buf could have been NULL on entry. | 0 |
private int
mget(struct magic_set *ms, const unsigned char *s, struct magic *m,
size_t nbytes, size_t o, unsigned int cont_level, int mode, int text,
int flip, uint16_t indir_level, uint16_t *name_count,
int *printed_something, int *need_separator, int *returnval)
{
uint32_t offset = ms->offset;
uint32_t... | 156,487,328,448,359,160,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2014-8116 | The ELF parser (readelf.c) in file before 5.21 allows remote attackers to cause a denial of service (CPU consumption or crash) via a large number of (1) program or (2) section headers or (3) invalid capabilities. | https://nvd.nist.gov/vuln/detail/CVE-2014-8116 |
209,960 | cryptopp | 07dbcc3d9644b18e05c1776db2a57fe04d780965 | https://github.com/weidai11/cryptopp | https://github.com/weidai11/cryptopp/commit/07dbcc3d9644b18e05c1776db2a57fe04d780965 | Add Inflator::BadDistanceErr exception (Issue 414)
The improved validation and excpetion clears the Address Sanitizer and Undefined Behavior Sanitizer findings | 1 | bool Inflator::DecodeBody()
{
bool blockEnd = false;
switch (m_blockType)
{
case 0: // stored
CRYPTOPP_ASSERT(m_reader.BitsBuffered() == 0);
while (!m_inQueue.IsEmpty() && !blockEnd)
{
size_t size;
const byte *block = m_inQueue.Spy(size);
size = UnsignedMin(m_storedLen, size);
CRYPTOPP... | 94,232,605,521,517,100,000,000,000,000,000,000,000 | zinflate.cpp | 209,525,460,366,186,800,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2017-9434 | Crypto++ (aka cryptopp) through 5.6.5 contains an out-of-bounds read vulnerability in zinflate.cpp in the Inflator filter. | https://nvd.nist.gov/vuln/detail/CVE-2017-9434 |
425,103 | cryptopp | 07dbcc3d9644b18e05c1776db2a57fe04d780965 | https://github.com/weidai11/cryptopp | https://github.com/weidai11/cryptopp/commit/07dbcc3d9644b18e05c1776db2a57fe04d780965 | Add Inflator::BadDistanceErr exception (Issue 414)
The improved validation and excpetion clears the Address Sanitizer and Undefined Behavior Sanitizer findings | 0 | bool Inflator::DecodeBody()
{
bool blockEnd = false;
switch (m_blockType)
{
case 0: // stored
CRYPTOPP_ASSERT(m_reader.BitsBuffered() == 0);
while (!m_inQueue.IsEmpty() && !blockEnd)
{
size_t size;
const byte *block = m_inQueue.Spy(size);
size = UnsignedMin(m_storedLen, size);
CRYPTOPP... | 76,412,772,858,822,270,000,000,000,000,000,000,000 | zinflate.cpp | 291,771,027,182,274,000,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2017-9434 | Crypto++ (aka cryptopp) through 5.6.5 contains an out-of-bounds read vulnerability in zinflate.cpp in the Inflator filter. | https://nvd.nist.gov/vuln/detail/CVE-2017-9434 |
209,963 | ImageMagick | 4e8c2ed53fcb54a34b3a6185b2584f26cf6874a3 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/4e8c2ed53fcb54a34b3a6185b2584f26cf6874a3 | https://github.com/ImageMagick/ImageMagick/issues/312 | 1 | MagickExport Image *ReadStream(const ImageInfo *image_info,StreamHandler stream,
ExceptionInfo *exception)
{
CacheMethods
cache_methods;
Image
*image;
ImageInfo
*read_info;
/*
Stream image pixels.
*/
assert(image_info != (ImageInfo *) NULL);
assert(image_info->signature == MagickCoreS... | 45,772,750,779,497,700,000,000,000,000,000,000,000 | stream.c | 109,589,651,424,425,170,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2016-9773 | Heap-based buffer overflow in the IsPixelGray function in MagickCore/pixel-accessor.h in ImageMagick 7.0.3.8 allows remote attackers to cause a denial of service (out-of-bounds heap read) via a crafted image file. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9556. | https://nvd.nist.gov/vuln/detail/CVE-2016-9773 |
425,232 | ImageMagick | 4e8c2ed53fcb54a34b3a6185b2584f26cf6874a3 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/4e8c2ed53fcb54a34b3a6185b2584f26cf6874a3 | https://github.com/ImageMagick/ImageMagick/issues/312 | 0 | MagickExport Image *ReadStream(const ImageInfo *image_info,StreamHandler stream,
ExceptionInfo *exception)
{
CacheMethods
cache_methods;
Image
*image;
ImageInfo
*read_info;
/*
Stream image pixels.
*/
assert(image_info != (ImageInfo *) NULL);
assert(image_info->signature == MagickCoreS... | 145,678,503,538,518,900,000,000,000,000,000,000,000 | stream.c | 201,159,244,824,274,160,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2016-9773 | Heap-based buffer overflow in the IsPixelGray function in MagickCore/pixel-accessor.h in ImageMagick 7.0.3.8 allows remote attackers to cause a denial of service (out-of-bounds heap read) via a crafted image file. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9556. | https://nvd.nist.gov/vuln/detail/CVE-2016-9773 |
209,966 | libguestfs | fa6a76050d82894365dfe32916903ef7fee3ffcd | https://github.com/libguestfs/libguestfs | https://github.com/libguestfs/libguestfs/commit/fa6a76050d82894365dfe32916903ef7fee3ffcd | inspection: Fix double-free when certain guest files are empty.
The following commit:
commit 5a3da366268825b26b470cde35658b67c1d11cd4
Author: Richard W.M. Jones <rjones@redhat.com>
Date: Thu Jan 24 17:07:38 2013 +0000
inspect: Use CLEANUP_* macros in inspection code.
can cause a double-free along an e... | 1 | guestfs___first_line_of_file (guestfs_h *g, const char *filename)
{
CLEANUP_FREE char **lines = NULL; /* sic: not CLEANUP_FREE_STRING_LIST */
int64_t size;
char *ret;
/* Don't trust guestfs_head_n not to break with very large files.
* Check the file size is something reasonable first.
*/
size = guestfs... | 98,819,971,629,326,500,000,000,000,000,000,000,000 | inspect-fs.c | 19,876,737,490,696,600,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2013-2124 | Double free vulnerability in inspect-fs.c in LibguestFS 1.20.x before 1.20.7, 1.21.x, 1.22.0, and 1.23.0 allows remote attackers to cause a denial of service (crash) via empty guest files. | https://nvd.nist.gov/vuln/detail/CVE-2013-2124 |
425,254 | libguestfs | fa6a76050d82894365dfe32916903ef7fee3ffcd | https://github.com/libguestfs/libguestfs | https://github.com/libguestfs/libguestfs/commit/fa6a76050d82894365dfe32916903ef7fee3ffcd | inspection: Fix double-free when certain guest files are empty.
The following commit:
commit 5a3da366268825b26b470cde35658b67c1d11cd4
Author: Richard W.M. Jones <rjones@redhat.com>
Date: Thu Jan 24 17:07:38 2013 +0000
inspect: Use CLEANUP_* macros in inspection code.
can cause a double-free along an e... | 0 | guestfs___first_line_of_file (guestfs_h *g, const char *filename)
{
char **lines = NULL; /* sic: not CLEANUP_FREE_STRING_LIST */
int64_t size;
char *ret;
/* Don't trust guestfs_head_n not to break with very large files.
* Check the file size is something reasonable first.
*/
size = guestfs_filesize (g,... | 175,185,998,241,587,300,000,000,000,000,000,000,000 | inspect-fs.c | 198,438,182,971,958,030,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2013-2124 | Double free vulnerability in inspect-fs.c in LibguestFS 1.20.x before 1.20.7, 1.21.x, 1.22.0, and 1.23.0 allows remote attackers to cause a denial of service (crash) via empty guest files. | https://nvd.nist.gov/vuln/detail/CVE-2013-2124 |
209,988 | abrt | 7a47f57975be0d285a2f20758e4572dca6d9cdd3 | https://github.com/abrt/abrt | https://github.com/abrt/abrt/commit/7a47f57975be0d285a2f20758e4572dca6d9cdd3 | dbus: validate parameters of all calls
SetElement and DeleteElement were missing check for valid dump directory
path.
FindProblemByElementInTimeRange was not reporting invalid element names.
Related: #1214451
Signed-off-by: Jakub Filak <jfilak@redhat.com> | 1 | static void handle_method_call(GDBusConnection *connection,
const gchar *caller,
const gchar *object_path,
const gchar *interface_name,
const gchar *method_name,
GVariant *parameters,
... | 100,351,926,321,358,460,000,000,000,000,000,000,000 | abrt-dbus.c | 315,752,460,944,822,100,000,000,000,000,000,000,000 | [
"CWE-22"
] | CVE-2015-3151 | Directory traversal vulnerability in abrt-dbus in Automatic Bug Reporting Tool (ABRT) allows local users to read, write to, or change ownership of arbitrary files via unspecified vectors to the (1) NewProblem, (2) GetInfo, (3) SetElement, or (4) DeleteElement method. | https://nvd.nist.gov/vuln/detail/CVE-2015-3151 |
425,886 | abrt | 7a47f57975be0d285a2f20758e4572dca6d9cdd3 | https://github.com/abrt/abrt | https://github.com/abrt/abrt/commit/7a47f57975be0d285a2f20758e4572dca6d9cdd3 | dbus: validate parameters of all calls
SetElement and DeleteElement were missing check for valid dump directory
path.
FindProblemByElementInTimeRange was not reporting invalid element names.
Related: #1214451
Signed-off-by: Jakub Filak <jfilak@redhat.com> | 0 | static void handle_method_call(GDBusConnection *connection,
const gchar *caller,
const gchar *object_path,
const gchar *interface_name,
const gchar *method_name,
GVariant *parameters,
... | 59,492,872,686,855,410,000,000,000,000,000,000,000 | None | null | [
"CWE-22"
] | CVE-2015-3151 | Directory traversal vulnerability in abrt-dbus in Automatic Bug Reporting Tool (ABRT) allows local users to read, write to, or change ownership of arbitrary files via unspecified vectors to the (1) NewProblem, (2) GetInfo, (3) SetElement, or (4) DeleteElement method. | https://nvd.nist.gov/vuln/detail/CVE-2015-3151 |
210,027 | vim | 1540d334a04d874c2aa9d26b82dbbcd4bc5a78de | https://github.com/vim/vim | https://github.com/vim/vim/commit/1540d334a04d874c2aa9d26b82dbbcd4bc5a78de | patch 9.0.0404: crash when passing invalid arguments to assert_fails()
Problem: Crash when passing invalid arguments to assert_fails().
Solution: Check for NULL string. | 1 | f_assert_fails(typval_T *argvars, typval_T *rettv)
{
char_u *cmd;
garray_T ga;
int save_trylevel = trylevel;
int called_emsg_before = called_emsg;
char *wrong_arg_msg = NULL;
char_u *tofree = NULL;
if (check_for_string_or_number_arg(argvars, 0) == FAIL
|| check_for_opt_string_or_list... | 69,810,070,614,522,880,000,000,000,000,000,000,000 | testing.c | 167,589,814,257,940,900,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2022-3153 | NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0404. | https://nvd.nist.gov/vuln/detail/CVE-2022-3153 |
426,757 | vim | 1540d334a04d874c2aa9d26b82dbbcd4bc5a78de | https://github.com/vim/vim | https://github.com/vim/vim/commit/1540d334a04d874c2aa9d26b82dbbcd4bc5a78de | patch 9.0.0404: crash when passing invalid arguments to assert_fails()
Problem: Crash when passing invalid arguments to assert_fails().
Solution: Check for NULL string. | 0 | f_assert_fails(typval_T *argvars, typval_T *rettv)
{
char_u *cmd;
garray_T ga;
int save_trylevel = trylevel;
int called_emsg_before = called_emsg;
char *wrong_arg_msg = NULL;
char_u *tofree = NULL;
if (check_for_string_or_number_arg(argvars, 0) == FAIL
|| check_for_opt_string_or_list... | 306,153,550,251,838,800,000,000,000,000,000,000,000 | testing.c | 163,762,640,026,672,990,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2022-3153 | NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0404. | https://nvd.nist.gov/vuln/detail/CVE-2022-3153 |
210,031 | libmatroska | 0a2d3e3644a7453b6513db2f9bc270f77943573f | https://github.com/Matroska-Org/libmatroska | https://github.com/Matroska-Org/libmatroska/commit/0a2d3e3644a7453b6513db2f9bc270f77943573f | KaxBlockInternal: check EBML lace sizes against available buffer space | 1 | filepos_t KaxInternalBlock::ReadData(IOCallback & input, ScopeMode ReadFully)
{
filepos_t Result;
FirstFrameLocation = input.getFilePointer(); // will be updated accordingly below
SetValueIsSet(false);
try {
if (ReadFully == SCOPE_ALL_DATA) {
Result = EbmlBinary::ReadData(input, ReadFully);
i... | 328,185,357,815,949,970,000,000,000,000,000,000,000 | KaxBlock.cpp | 205,483,175,938,590,400,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2015-8792 | The KaxInternalBlock::ReadData function in libMatroska before 1.4.4 allows context-dependent attackers to obtain sensitive information from process heap memory via crafted EBML lacing, which triggers an invalid memory access. | https://nvd.nist.gov/vuln/detail/CVE-2015-8792 |
426,787 | libmatroska | 0a2d3e3644a7453b6513db2f9bc270f77943573f | https://github.com/Matroska-Org/libmatroska | https://github.com/Matroska-Org/libmatroska/commit/0a2d3e3644a7453b6513db2f9bc270f77943573f | KaxBlockInternal: check EBML lace sizes against available buffer space | 0 | filepos_t KaxInternalBlock::ReadData(IOCallback & input, ScopeMode ReadFully)
{
filepos_t Result;
FirstFrameLocation = input.getFilePointer(); // will be updated accordingly below
SetValueIsSet(false);
try {
if (ReadFully == SCOPE_ALL_DATA) {
Result = EbmlBinary::ReadData(input, ReadFully);
i... | 278,440,178,592,032,700,000,000,000,000,000,000,000 | KaxBlock.cpp | 232,676,353,705,417,100,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2015-8792 | The KaxInternalBlock::ReadData function in libMatroska before 1.4.4 allows context-dependent attackers to obtain sensitive information from process heap memory via crafted EBML lacing, which triggers an invalid memory access. | https://nvd.nist.gov/vuln/detail/CVE-2015-8792 |
210,032 | curl | 57d299a499155d4b327e341c6024e293b0418243 | https://github.com/curl/curl | https://github.com/curl/curl/commit/57d299a499155d4b327e341c6024e293b0418243 | Curl_ntlm_core_mk_nt_hash: return error on too long password
... since it would cause an integer overflow if longer than (max size_t
/ 2).
This is CVE-2018-14618
Bug: https://curl.haxx.se/docs/CVE-2018-14618.html
Closes #2756
Reported-by: Zhaoyang Wu | 1 | CURLcode Curl_ntlm_core_mk_nt_hash(struct Curl_easy *data,
const char *password,
unsigned char *ntbuffer /* 21 bytes */)
{
size_t len = strlen(password);
unsigned char *pw = len ? malloc(len * 2) : strdup("");
CURLcode result;
if(!pw)
ret... | 246,028,622,315,980,050,000,000,000,000,000,000,000 | curl_ntlm_core.c | 52,159,382,053,127,950,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2018-14618 | curl before version 7.61.1 is vulnerable to a buffer overrun in the NTLM authentication code. The internal function Curl_ntlm_core_mk_nt_hash multiplies the length of the password by two (SUM) to figure out how large temporary storage area to allocate from the heap. The length value is then subsequently used to iterate... | https://nvd.nist.gov/vuln/detail/CVE-2018-14618 |
426,834 | curl | 57d299a499155d4b327e341c6024e293b0418243 | https://github.com/curl/curl | https://github.com/curl/curl/commit/57d299a499155d4b327e341c6024e293b0418243 | Curl_ntlm_core_mk_nt_hash: return error on too long password
... since it would cause an integer overflow if longer than (max size_t
/ 2).
This is CVE-2018-14618
Bug: https://curl.haxx.se/docs/CVE-2018-14618.html
Closes #2756
Reported-by: Zhaoyang Wu | 0 | CURLcode Curl_ntlm_core_mk_nt_hash(struct Curl_easy *data,
const char *password,
unsigned char *ntbuffer /* 21 bytes */)
{
size_t len = strlen(password);
unsigned char *pw;
CURLcode result;
if(len > SIZE_T_MAX/2) /* avoid integer overflow */
... | 34,167,254,624,175,040,000,000,000,000,000,000,000 | curl_ntlm_core.c | 278,846,732,746,566,240,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2018-14618 | curl before version 7.61.1 is vulnerable to a buffer overrun in the NTLM authentication code. The internal function Curl_ntlm_core_mk_nt_hash multiplies the length of the password by two (SUM) to figure out how large temporary storage area to allocate from the heap. The length value is then subsequently used to iterate... | https://nvd.nist.gov/vuln/detail/CVE-2018-14618 |
210,045 | gnutls | 422214868061370aeeb0ac9cd0f021a5c350a57d | http://git.savannah.gnu.org/cgit/gnutls | http://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commitdiff;h=422214868061370aeeb0ac9cd0f021a5c350a57d | better check decrypted data. | 1 | _gnutls_ciphertext2compressed (gnutls_session_t session,
opaque * compress_data,
int compress_size,
gnutls_datum_t ciphertext, uint8_t type,
record_parameters_st * params)
{
uint8_t MAC[MAX_HASH... | 330,753,552,687,931,640,000,000,000,000,000,000,000 | gnutls_cipher.c | 257,844,051,454,448,900,000,000,000,000,000,000,000 | [
"CWE-310"
] | CVE-2012-1573 | gnutls_cipher.c in libgnutls in GnuTLS before 2.12.17 and 3.x before 3.0.15 does not properly handle data encrypted with a block cipher, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) via a crafted record, as demonstrated by a crafted GenericBlockCipher structu... | https://nvd.nist.gov/vuln/detail/CVE-2012-1573 |
427,138 | gnutls | 422214868061370aeeb0ac9cd0f021a5c350a57d | http://git.savannah.gnu.org/cgit/gnutls | http://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commitdiff;h=422214868061370aeeb0ac9cd0f021a5c350a57d | better check decrypted data. | 0 | _gnutls_ciphertext2compressed (gnutls_session_t session,
opaque * compress_data,
int compress_size,
gnutls_datum_t ciphertext, uint8_t type,
record_parameters_st * params)
{
uint8_t MAC[MAX_HASH... | 239,939,678,531,995,060,000,000,000,000,000,000,000 | gnutls_cipher.c | 19,252,326,960,755,906,000,000,000,000,000,000,000 | [
"CWE-310"
] | CVE-2012-1573 | gnutls_cipher.c in libgnutls in GnuTLS before 2.12.17 and 3.x before 3.0.15 does not properly handle data encrypted with a block cipher, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) via a crafted record, as demonstrated by a crafted GenericBlockCipher structu... | https://nvd.nist.gov/vuln/detail/CVE-2012-1573 |
210,052 | php-src | aab49e934de1fff046e659cbec46e3d053b41c34 | https://github.com/php/php-src | http://git.php.net/?p=php-src.git;a=commitdiff;h=aab49e934de1fff046e659cbec46e3d053b41c34 | fix CVE-2012-2143 | 1 | _crypt_extended_r(const char *key, const char *setting,
struct php_crypt_extended_data *data)
{
int i;
uint32_t count, salt, l, r0, r1, keybuf[2];
u_char *p, *q;
if (!data->initialized)
des_init_local(data);
/*
* Copy the key, shifting each character up by one bit
* and padding with zeros.
*/
q = (u_... | 104,022,331,130,536,540,000,000,000,000,000,000,000 | crypt_freesec.c | 97,216,296,302,259,500,000,000,000,000,000,000,000 | [
"CWE-310"
] | CVE-2012-2143 | The crypt_des (aka DES-based crypt) function in FreeBSD before 9.0-RELEASE-p2, as used in PHP, PostgreSQL, and other products, does not process the complete cleartext password if this password contains a 0x80 character, which makes it easier for context-dependent attackers to obtain access via an authentication attempt... | https://nvd.nist.gov/vuln/detail/CVE-2012-2143 |
427,252 | php-src | aab49e934de1fff046e659cbec46e3d053b41c34 | https://github.com/php/php-src | http://git.php.net/?p=php-src.git;a=commitdiff;h=aab49e934de1fff046e659cbec46e3d053b41c34 | fix CVE-2012-2143 | 0 | _crypt_extended_r(const char *key, const char *setting,
struct php_crypt_extended_data *data)
{
int i;
uint32_t count, salt, l, r0, r1, keybuf[2];
u_char *p, *q;
if (!data->initialized)
des_init_local(data);
/*
* Copy the key, shifting each character up by one bit
* and padding with zeros.
*/
q = (u_... | 10,650,738,626,815,683,000,000,000,000,000,000,000 | crypt_freesec.c | 266,794,742,008,726,920,000,000,000,000,000,000,000 | [
"CWE-310"
] | CVE-2012-2143 | The crypt_des (aka DES-based crypt) function in FreeBSD before 9.0-RELEASE-p2, as used in PHP, PostgreSQL, and other products, does not process the complete cleartext password if this password contains a 0x80 character, which makes it easier for context-dependent attackers to obtain access via an authentication attempt... | https://nvd.nist.gov/vuln/detail/CVE-2012-2143 |
210,062 | radare2 | 4d3811681a80f92a53e795f6a64c4b0fc2c8dd22 | https://github.com/radare/radare2 | https://github.com/radareorg/radare2/commit/4d3811681a80f92a53e795f6a64c4b0fc2c8dd22 | Fix segfault in adf (#16230) | 1 | static bool anal_fcn_data (RCore *core, const char *input) {
RAnalFunction *fcn = r_anal_get_fcn_in (core->anal, core->offset, -1);
ut32 fcn_size = r_anal_function_size_from_entry (fcn);
if (fcn) {
int i;
bool gap = false;
ut64 gap_addr = UT64_MAX;
char *bitmap = calloc (1, fcn_size);
if (bitmap) {
RAna... | 198,868,296,304,012,230,000,000,000,000,000,000,000 | cmd_anal.c | 59,878,308,147,460,040,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2020-27795 | A segmentation fault was discovered in radare2 with adf command. In libr/core/cmd_anal.c, when command "adf" has no or wrong argument, anal_fcn_data (core, input + 1) --> RAnalFunction *fcn = r_anal_get_fcn_in (core->anal, core->offset, -1); returns null pointer for fcn causing segmentation fault later in ensure_fcn_ra... | https://nvd.nist.gov/vuln/detail/CVE-2020-27795 |
427,348 | radare2 | 4d3811681a80f92a53e795f6a64c4b0fc2c8dd22 | https://github.com/radare/radare2 | https://github.com/radareorg/radare2/commit/4d3811681a80f92a53e795f6a64c4b0fc2c8dd22 | Fix segfault in adf (#16230) | 0 | static bool anal_fcn_data (RCore *core, const char *input) {
RAnalFunction *fcn = r_anal_get_fcn_in (core->anal, core->offset, R_ANAL_FCN_TYPE_ANY);
if (fcn) {
int i;
bool gap = false;
ut64 gap_addr = UT64_MAX;
ut32 fcn_size = r_anal_function_size_from_entry (fcn);
char *bitmap = calloc (1, fcn_size);
if ... | 279,171,755,589,418,830,000,000,000,000,000,000,000 | cmd_anal.c | 303,375,865,811,101,500,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2020-27795 | A segmentation fault was discovered in radare2 with adf command. In libr/core/cmd_anal.c, when command "adf" has no or wrong argument, anal_fcn_data (core, input + 1) --> RAnalFunction *fcn = r_anal_get_fcn_in (core->anal, core->offset, -1); returns null pointer for fcn causing segmentation fault later in ensure_fcn_ra... | https://nvd.nist.gov/vuln/detail/CVE-2020-27795 |
210,087 | libyang | 6980afae2ff9fcd6d67508b0a3f694d75fd059d6 | https://github.com/CESNET/libyang | https://github.com/CESNET/libyang/commit/6980afae2ff9fcd6d67508b0a3f694d75fd059d6 | parser BUGFIX long identityref default value buffer overflow
STRING_OVERFLOW (CWE-120) | 1 | make_canonical(struct ly_ctx *ctx, int type, const char **value, void *data1, void *data2)
{
const uint16_t buf_len = 511;
char buf[buf_len + 1];
struct lys_type_bit **bits = NULL;
struct lyxp_expr *exp;
const char *module_name, *cur_expr, *end;
int i, j, count;
int64_t num;
uint64_t unu... | 190,611,584,866,532,360,000,000,000,000,000,000,000 | parser.c | 146,096,111,228,431,560,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2019-19334 | In all versions of libyang before 1.0-r5, a stack-based buffer overflow was discovered in the way libyang parses YANG files with a leaf of type "identityref". An application that uses libyang to parse untrusted YANG files may be vulnerable to this flaw, which would allow an attacker to cause a denial of service or poss... | https://nvd.nist.gov/vuln/detail/CVE-2019-19334 |
427,616 | libyang | 6980afae2ff9fcd6d67508b0a3f694d75fd059d6 | https://github.com/CESNET/libyang | https://github.com/CESNET/libyang/commit/6980afae2ff9fcd6d67508b0a3f694d75fd059d6 | parser BUGFIX long identityref default value buffer overflow
STRING_OVERFLOW (CWE-120) | 0 | make_canonical(struct ly_ctx *ctx, int type, const char **value, void *data1, void *data2)
{
const uint16_t buf_len = 511;
char buf[buf_len + 1];
struct lys_type_bit **bits = NULL;
struct lyxp_expr *exp;
const char *module_name, *cur_expr, *end;
int i, j, count;
int64_t num;
uint64_t unu... | 220,741,050,350,140,300,000,000,000,000,000,000,000 | parser.c | 316,049,928,842,261,100,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2019-19334 | In all versions of libyang before 1.0-r5, a stack-based buffer overflow was discovered in the way libyang parses YANG files with a leaf of type "identityref". An application that uses libyang to parse untrusted YANG files may be vulnerable to this flaw, which would allow an attacker to cause a denial of service or poss... | https://nvd.nist.gov/vuln/detail/CVE-2019-19334 |
210,089 | gdk-pixbuf | bdd3acbd48a575d418ba6bf1b32d7bda2fae1c81 | http://git.gnome.org/browse/gdk-pixbuf | https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/commit/bdd3acbd48a575d418ba6bf1b32d7bda2fae1c81 | gif: Fix LZW decoder accepting invalid LZW code.
The code value after a reset wasn't being validated, which means we would
accept invalid codes. This could cause an infinite loop in the decoder.
Fixes CVE-2020-29385
Fixes https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/164 | 1 | lzw_decoder_feed (LZWDecoder *self,
guint8 *input,
gsize input_length,
guint8 *output,
gsize output_length)
{
gsize i, n_written = 0;
g_return_val_if_fail (LZW_IS_DECODER (self), 0);
/* Ignore data afte... | 200,249,104,033,746,970,000,000,000,000,000,000,000 | lzw.c | 108,366,932,368,102,480,000,000,000,000,000,000,000 | [
"CWE-835"
] | CVE-2020-29385 | GNOME gdk-pixbuf (aka GdkPixbuf) before 2.42.2 allows a denial of service (infinite loop) in lzw.c in the function write_indexes. if c->self_code equals 10, self->code_table[10].extends will assign the value 11 to c. The next execution in the loop will assign self->code_table[11].extends to c, which will give the value... | https://nvd.nist.gov/vuln/detail/CVE-2020-29385 |
427,672 | gdk-pixbuf | bdd3acbd48a575d418ba6bf1b32d7bda2fae1c81 | http://git.gnome.org/browse/gdk-pixbuf | https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/commit/bdd3acbd48a575d418ba6bf1b32d7bda2fae1c81 | gif: Fix LZW decoder accepting invalid LZW code.
The code value after a reset wasn't being validated, which means we would
accept invalid codes. This could cause an infinite loop in the decoder.
Fixes CVE-2020-29385
Fixes https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/164 | 0 | lzw_decoder_feed (LZWDecoder *self,
guint8 *input,
gsize input_length,
guint8 *output,
gsize output_length)
{
gsize i, n_written = 0;
g_return_val_if_fail (LZW_IS_DECODER (self), 0);
/* Ignore data afte... | 139,739,002,079,413,140,000,000,000,000,000,000,000 | lzw.c | 260,821,389,886,535,470,000,000,000,000,000,000,000 | [
"CWE-835"
] | CVE-2020-29385 | GNOME gdk-pixbuf (aka GdkPixbuf) before 2.42.2 allows a denial of service (infinite loop) in lzw.c in the function write_indexes. if c->self_code equals 10, self->code_table[10].extends will assign the value 11 to c. The next execution in the loop will assign self->code_table[11].extends to c, which will give the value... | https://nvd.nist.gov/vuln/detail/CVE-2020-29385 |
210,095 | linux | 1f3e2e97c003f80c4b087092b225c8787ff91e4d | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1f3e2e97c003f80c4b087092b225c8787ff91e4d | isdn: cpai: check ctr->cnr to avoid array index out of bound
The cmtp_add_connection() would add a cmtp session to a controller
and run a kernel thread to process cmtp.
__module_get(THIS_MODULE);
session->task = kthread_run(cmtp_session, session, "kcmtpd_ctr_%d",
session->num);
During this process, the ker... | 1 | int detach_capi_ctr(struct capi_ctr *ctr)
{
int err = 0;
mutex_lock(&capi_controller_lock);
ctr_down(ctr, CAPI_CTR_DETACHED);
if (capi_controller[ctr->cnr - 1] != ctr) {
err = -EINVAL;
goto unlock_out;
}
capi_controller[ctr->cnr - 1] = NULL;
ncontrollers--;
if (ctr->procent)
remove_proc_entry(ctr->pro... | 299,119,272,647,506,740,000,000,000,000,000,000,000 | kcapi.c | 141,080,357,949,042,700,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2021-43389 | An issue was discovered in the Linux kernel before 5.14.15. There is an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c. | https://nvd.nist.gov/vuln/detail/CVE-2021-43389 |
427,840 | linux | 1f3e2e97c003f80c4b087092b225c8787ff91e4d | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1f3e2e97c003f80c4b087092b225c8787ff91e4d | isdn: cpai: check ctr->cnr to avoid array index out of bound
The cmtp_add_connection() would add a cmtp session to a controller
and run a kernel thread to process cmtp.
__module_get(THIS_MODULE);
session->task = kthread_run(cmtp_session, session, "kcmtpd_ctr_%d",
session->num);
During this process, the ker... | 0 | int detach_capi_ctr(struct capi_ctr *ctr)
{
int err = 0;
mutex_lock(&capi_controller_lock);
ctr_down(ctr, CAPI_CTR_DETACHED);
if (ctr->cnr < 1 || ctr->cnr - 1 >= CAPI_MAXCONTR) {
err = -EINVAL;
goto unlock_out;
}
if (capi_controller[ctr->cnr - 1] != ctr) {
err = -EINVAL;
goto unlock_out;
}
capi_cont... | 116,237,873,023,770,400,000,000,000,000,000,000,000 | kcapi.c | 43,598,196,977,773,380,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2021-43389 | An issue was discovered in the Linux kernel before 5.14.15. There is an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c. | https://nvd.nist.gov/vuln/detail/CVE-2021-43389 |
210,099 | ImageMagick6 | 5caef6e97f3f575cf7bea497865a4c1e624b8010 | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/5caef6e97f3f575cf7bea497865a4c1e624b8010 | https://github.com/ImageMagick/ImageMagick/issues/1554 | 1 | static Image *ReadMATImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
Image *image, *image2=NULL,
*rotated_image;
PixelPacket *q;
unsigned int status;
MATHeader MATLAB_HDR;
size_t size;
size_t CellType;
QuantumInfo *quantum_info;
ImageInfo *clone_info;
int i;
ssize_t ldblk;
unsign... | 291,110,008,635,184,770,000,000,000,000,000,000,000 | mat.c | 200,489,479,282,962,100,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2019-15140 | coders/mat.c in ImageMagick 7.0.8-43 Q16 allows remote attackers to cause a denial of service (use-after-free and application crash) or possibly have unspecified other impact by crafting a Matlab image file that is mishandled in ReadImage in MagickCore/constitute.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-15140 |
427,934 | ImageMagick6 | 5caef6e97f3f575cf7bea497865a4c1e624b8010 | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/5caef6e97f3f575cf7bea497865a4c1e624b8010 | https://github.com/ImageMagick/ImageMagick/issues/1554 | 0 | static Image *ReadMATImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
Image *image, *image2=NULL,
*rotated_image;
PixelPacket *q;
unsigned int status;
MATHeader MATLAB_HDR;
size_t size;
size_t CellType;
QuantumInfo *quantum_info;
ImageInfo *clone_info;
int i;
ssize_t ldblk;
unsign... | 95,716,309,564,447,050,000,000,000,000,000,000,000 | mat.c | 196,259,138,446,610,300,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2019-15140 | coders/mat.c in ImageMagick 7.0.8-43 Q16 allows remote attackers to cause a denial of service (use-after-free and application crash) or possibly have unspecified other impact by crafting a Matlab image file that is mishandled in ReadImage in MagickCore/constitute.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-15140 |
210,100 | systemd | b2774a3ae692113e1f47a336a6c09bac9cfb49ad | https://github.com/systemd/systemd | https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad | bus_open leak sd_event_source when udevadm trigger。
On my host, when executing the udevadm trigger, I only receive the change event, which causes memleak | 1 | int button_open(Button *b) {
char *p, name[256];
int r;
assert(b);
b->fd = safe_close(b->fd);
p = strjoina("/dev/input/", b->name);
b->fd = open(p, O_RDWR|O_CLOEXEC|O_NOCTTY|O_NONBLOCK);
if (b->fd < 0)
return log_warning_errno(errno, "Failed to... | 18,683,998,661,555,380,000,000,000,000,000,000,000 | logind-button.c | 109,360,990,826,513,100,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2019-20386 | An issue was discovered in button_open in login/logind-button.c in systemd before 243. When executing the udevadm trigger command, a memory leak may occur. | https://nvd.nist.gov/vuln/detail/CVE-2019-20386 |
427,937 | systemd | b2774a3ae692113e1f47a336a6c09bac9cfb49ad | https://github.com/systemd/systemd | https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad | bus_open leak sd_event_source when udevadm trigger。
On my host, when executing the udevadm trigger, I only receive the change event, which causes memleak | 0 | int button_open(Button *b) {
char *p, name[256];
int r;
assert(b);
b->fd = safe_close(b->fd);
p = strjoina("/dev/input/", b->name);
b->fd = open(p, O_RDWR|O_CLOEXEC|O_NOCTTY|O_NONBLOCK);
if (b->fd < 0)
return log_warning_errno(errno, "Failed to... | 130,640,253,615,856,400,000,000,000,000,000,000,000 | logind-button.c | 115,161,158,915,741,410,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2019-20386 | An issue was discovered in button_open in login/logind-button.c in systemd before 243. When executing the udevadm trigger command, a memory leak may occur. | https://nvd.nist.gov/vuln/detail/CVE-2019-20386 |
210,105 | linux | 51bda2bca53b265715ca1852528f38dc67429d9a | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=51bda2bca53b265715ca1852528f38dc67429d9a | Bluetooth: hidp_connection_add() unsafe use of l2cap_pi()
it's OK after we'd verified the sockets, but not before that.
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
Signed-off-by: Marcel Holtmann <marcel@holtmann.org> | 1 | int hidp_connection_add(struct hidp_connadd_req *req,
struct socket *ctrl_sock,
struct socket *intr_sock)
{
struct hidp_session *session;
struct l2cap_conn *conn;
struct l2cap_chan *chan = l2cap_pi(ctrl_sock->sk)->chan;
int ret;
ret = hidp_verify_sockets(ctrl_sock, intr_sock);
if (ret)
return ret;
conn... | 73,013,783,311,787,160,000,000,000,000,000,000,000 | core.c | 184,915,314,948,637,900,000,000,000,000,000,000,000 | [
"CWE-843"
] | CVE-2017-13220 | An elevation of privilege vulnerability in the Upstream kernel bluez. Product: Android. Versions: Android kernel. Android ID: A-63527053. | https://nvd.nist.gov/vuln/detail/CVE-2017-13220 |
428,128 | linux | 51bda2bca53b265715ca1852528f38dc67429d9a | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=51bda2bca53b265715ca1852528f38dc67429d9a | Bluetooth: hidp_connection_add() unsafe use of l2cap_pi()
it's OK after we'd verified the sockets, but not before that.
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
Signed-off-by: Marcel Holtmann <marcel@holtmann.org> | 0 | int hidp_connection_add(struct hidp_connadd_req *req,
struct socket *ctrl_sock,
struct socket *intr_sock)
{
struct hidp_session *session;
struct l2cap_conn *conn;
struct l2cap_chan *chan;
int ret;
ret = hidp_verify_sockets(ctrl_sock, intr_sock);
if (ret)
return ret;
chan = l2cap_pi(ctrl_sock->sk)->chan... | 151,536,197,239,529,830,000,000,000,000,000,000,000 | core.c | 126,263,500,513,654,820,000,000,000,000,000,000,000 | [
"CWE-843"
] | CVE-2017-13220 | An elevation of privilege vulnerability in the Upstream kernel bluez. Product: Android. Versions: Android kernel. Android ID: A-63527053. | https://nvd.nist.gov/vuln/detail/CVE-2017-13220 |
210,106 | lua | 6298903e35217ab69c279056f925fb72900ce0b7 | https://github.com/lua/lua | https://github.com/lua/lua/commit/6298903e35217ab69c279056f925fb72900ce0b7 | Keep minimum size when shrinking a stack
When shrinking a stack (during GC), do not make it smaller than the
initial stack size. | 1 | void luaD_shrinkstack (lua_State *L) {
int inuse = stackinuse(L);
int goodsize = inuse + (inuse / 8) + 2*EXTRA_STACK;
if (goodsize > LUAI_MAXSTACK)
goodsize = LUAI_MAXSTACK; /* respect stack limit */
/* if thread is currently not handling a stack overflow and its
good size is smaller than current size... | 329,100,240,463,973,600,000,000,000,000,000,000,000 | ldo.c | 147,213,108,156,486,430,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2020-15888 | Lua through 5.4.0 mishandles the interaction between stack resizes and garbage collection, leading to a heap-based buffer overflow, heap-based buffer over-read, or use-after-free. | https://nvd.nist.gov/vuln/detail/CVE-2020-15888 |
428,149 | lua | 6298903e35217ab69c279056f925fb72900ce0b7 | https://github.com/lua/lua | https://github.com/lua/lua/commit/6298903e35217ab69c279056f925fb72900ce0b7 | Keep minimum size when shrinking a stack
When shrinking a stack (during GC), do not make it smaller than the
initial stack size. | 0 | void luaD_shrinkstack (lua_State *L) {
int inuse = stackinuse(L);
int goodsize = inuse + BASIC_STACK_SIZE;
if (goodsize > LUAI_MAXSTACK)
goodsize = LUAI_MAXSTACK; /* respect stack limit */
/* if thread is currently not handling a stack overflow and its
good size is smaller than current size, shrink it... | 33,887,331,595,757,200,000,000,000,000,000,000,000 | ldo.c | 68,361,696,883,923,545,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2020-15888 | Lua through 5.4.0 mishandles the interaction between stack resizes and garbage collection, leading to a heap-based buffer overflow, heap-based buffer over-read, or use-after-free. | https://nvd.nist.gov/vuln/detail/CVE-2020-15888 |
210,110 | poppler | bf4aae25a244b1033a2479b9a8f633224f7d5de5 | https://github.com/freedesktop/poppler | https://gitlab.freedesktop.org/poppler/poppler/commit/bf4aae25a244b1033a2479b9a8f633224f7d5de5 | Off by one fix to the previous crash fix | 1 | void FoFiTrueType::cvtSfnts(FoFiOutputFunc outputFunc,
void *outputStream, GooString *name,
GBool needVerticalMetrics,
int *maxUsedGlyph) {
Guchar headData[54];
TrueTypeLoca *locaTable;
Guchar *locaData;
TrueTypeTable newTables[nT42Tables];
Guchar tableDir[12 + nT42Ta... | 250,151,506,466,525,900,000,000,000,000,000,000,000 | FoFiTrueType.cc | 178,218,444,603,250,600,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-12360 | A stack-based buffer over-read exists in FoFiTrueType::dumpString in fofi/FoFiTrueType.cc in Xpdf 4.01.01. It can, for example, be triggered by sending crafted TrueType data in a PDF document to the pdftops tool. It might allow an attacker to cause Denial of Service or leak memory data into dump content. | https://nvd.nist.gov/vuln/detail/CVE-2019-12360 |
428,222 | poppler | bf4aae25a244b1033a2479b9a8f633224f7d5de5 | https://github.com/freedesktop/poppler | https://gitlab.freedesktop.org/poppler/poppler/commit/bf4aae25a244b1033a2479b9a8f633224f7d5de5 | Off by one fix to the previous crash fix | 0 | void FoFiTrueType::cvtSfnts(FoFiOutputFunc outputFunc,
void *outputStream, GooString *name,
GBool needVerticalMetrics,
int *maxUsedGlyph) {
Guchar headData[54];
TrueTypeLoca *locaTable;
Guchar *locaData;
TrueTypeTable newTables[nT42Tables];
Guchar tableDir[12 + nT42Ta... | 202,653,870,735,281,900,000,000,000,000,000,000,000 | FoFiTrueType.cc | 334,717,419,725,962,800,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-12360 | A stack-based buffer over-read exists in FoFiTrueType::dumpString in fofi/FoFiTrueType.cc in Xpdf 4.01.01. It can, for example, be triggered by sending crafted TrueType data in a PDF document to the pdftops tool. It might allow an attacker to cause Denial of Service or leak memory data into dump content. | https://nvd.nist.gov/vuln/detail/CVE-2019-12360 |
210,122 | ImageMagick6 | 13801f5d0bd7a6fdb119682d34946636afdb2629 | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/13801f5d0bd7a6fdb119682d34946636afdb2629 | https://github.com/ImageMagick/ImageMagick/issues/1531 | 1 | MagickExport void DestroyXResources(void)
{
register int
i;
unsigned int
number_windows;
XWindowInfo
*magick_windows[MaxXWindows];
XWindows
*windows;
DestroyXWidget();
windows=XSetWindows((XWindows *) ~0);
if ((windows == (XWindows *) NULL) || (windows->display == (Display *) NULL))
... | 236,687,483,166,222,370,000,000,000,000,000,000,000 | xwindow.c | 264,508,317,241,275,660,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2019-16708 | ImageMagick 7.0.8-35 has a memory leak in magick/xwindow.c, related to XCreateImage. | https://nvd.nist.gov/vuln/detail/CVE-2019-16708 |
428,333 | ImageMagick6 | 13801f5d0bd7a6fdb119682d34946636afdb2629 | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/13801f5d0bd7a6fdb119682d34946636afdb2629 | https://github.com/ImageMagick/ImageMagick/issues/1531 | 0 | MagickExport void DestroyXResources(void)
{
register int
i;
unsigned int
number_windows;
XWindowInfo
*magick_windows[MaxXWindows];
XWindows
*windows;
DestroyXWidget();
windows=XSetWindows((XWindows *) ~0);
if ((windows == (XWindows *) NULL) || (windows->display == (Display *) NULL))
... | 30,126,709,932,963,700,000,000,000,000,000,000,000 | xwindow.c | 8,311,745,199,387,426,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2019-16708 | ImageMagick 7.0.8-35 has a memory leak in magick/xwindow.c, related to XCreateImage. | https://nvd.nist.gov/vuln/detail/CVE-2019-16708 |
210,126 | qemu | f56b9bc3ae20fc93815b34aa022be919941406ce | https://github.com/bonzini/qemu | http://git.qemu.org/?p=qemu.git;a=commit;h=f56b9bc3ae20fc93815b34aa022be919941406ce | block/cloop: refuse images with bogus offsets (CVE-2014-0144)
The offsets[] array allows efficient seeking and tells us the maximum
compressed data size. If the offsets are bogus the maximum compressed
data size will be unrealistic.
This could cause g_malloc() to abort and bogus offsets mean the image is
broken anyw... | 1 | static int cloop_open(BlockDriverState *bs, QDict *options, int flags,
Error **errp)
{
BDRVCloopState *s = bs->opaque;
uint32_t offsets_size, max_compressed_block_size = 1, i;
int ret;
bs->read_only = 1;
/* read header */
ret = bdrv_pread(bs->file, 128, &s->block_size, 4)... | 155,217,521,664,998,850,000,000,000,000,000,000,000 | cloop.c | 163,275,065,424,570,210,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2014-0144 | QEMU before 2.0.0 block drivers for CLOOP, QCOW2 version 2 and various other image formats are vulnerable to potential memory corruptions, integer/buffer overflows or crash caused by missing input validations which could allow a remote user to execute arbitrary code on the host with the privileges of the QEMU process. | https://nvd.nist.gov/vuln/detail/CVE-2014-0144 |
428,439 | qemu | f56b9bc3ae20fc93815b34aa022be919941406ce | https://github.com/bonzini/qemu | http://git.qemu.org/?p=qemu.git;a=commit;h=f56b9bc3ae20fc93815b34aa022be919941406ce | block/cloop: refuse images with bogus offsets (CVE-2014-0144)
The offsets[] array allows efficient seeking and tells us the maximum
compressed data size. If the offsets are bogus the maximum compressed
data size will be unrealistic.
This could cause g_malloc() to abort and bogus offsets mean the image is
broken anyw... | 0 | static int cloop_open(BlockDriverState *bs, QDict *options, int flags,
Error **errp)
{
BDRVCloopState *s = bs->opaque;
uint32_t offsets_size, max_compressed_block_size = 1, i;
int ret;
bs->read_only = 1;
/* read header */
ret = bdrv_pread(bs->file, 128, &s->block_size, 4)... | 284,905,421,415,334,150,000,000,000,000,000,000,000 | cloop.c | 279,521,671,755,063,200,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2014-0144 | QEMU before 2.0.0 block drivers for CLOOP, QCOW2 version 2 and various other image formats are vulnerable to potential memory corruptions, integer/buffer overflows or crash caused by missing input validations which could allow a remote user to execute arbitrary code on the host with the privileges of the QEMU process. | https://nvd.nist.gov/vuln/detail/CVE-2014-0144 |
210,135 | OpenSC | 6ce6152284c47ba9b1d4fe8ff9d2e6a3f5ee02c7 | https://github.com/OpenSC/OpenSC | https://github.com/OpenSC/OpenSC/commit/6ce6152284c47ba9b1d4fe8ff9d2e6a3f5ee02c7 | pkcs15-prkey: Simplify cleaning memory after failure
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18478 | 1 | int sc_pkcs15_decode_prkdf_entry(struct sc_pkcs15_card *p15card,
struct sc_pkcs15_object *obj,
const u8 ** buf, size_t *buflen)
{
sc_context_t *ctx = p15card->card->ctx;
struct sc_pkcs15_prkey_info info;
int r, i, gostr3410_params[3];
struct sc_pkcs15_keyinfo_gostparams *keyinfo_gostparams;
size_t usage_... | 329,186,534,744,666,330,000,000,000,000,000,000,000 | pkcs15-prkey.c | 176,823,107,840,642,180,000,000,000,000,000,000,000 | [
"CWE-672"
] | CVE-2019-19480 | An issue was discovered in OpenSC through 0.19.0 and 0.20.x through 0.20.0-rc3. libopensc/pkcs15-prkey.c has an incorrect free operation in sc_pkcs15_decode_prkdf_entry. | https://nvd.nist.gov/vuln/detail/CVE-2019-19480 |
428,453 | OpenSC | 6ce6152284c47ba9b1d4fe8ff9d2e6a3f5ee02c7 | https://github.com/OpenSC/OpenSC | https://github.com/OpenSC/OpenSC/commit/6ce6152284c47ba9b1d4fe8ff9d2e6a3f5ee02c7 | pkcs15-prkey: Simplify cleaning memory after failure
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18478 | 0 | int sc_pkcs15_decode_prkdf_entry(struct sc_pkcs15_card *p15card,
struct sc_pkcs15_object *obj,
const u8 ** buf, size_t *buflen)
{
sc_context_t *ctx = p15card->card->ctx;
struct sc_pkcs15_prkey_info info;
int r, i, gostr3410_params[3];
struct sc_pkcs15_keyinfo_gostparams *keyinfo_gostparams;
size_t usage_... | 105,344,681,932,941,660,000,000,000,000,000,000,000 | pkcs15-prkey.c | 59,210,802,356,925,420,000,000,000,000,000,000,000 | [
"CWE-672"
] | CVE-2019-19480 | An issue was discovered in OpenSC through 0.19.0 and 0.20.x through 0.20.0-rc3. libopensc/pkcs15-prkey.c has an incorrect free operation in sc_pkcs15_decode_prkdf_entry. | https://nvd.nist.gov/vuln/detail/CVE-2019-19480 |
210,150 | quassel | da215fcb9cd3096a3e223c87577d5d4ab8f8518b | https://github.com/quassel/quassel | http://git.quassel-irc.org/?p=quassel.git;a=commit;h=da215fcb9cd3096a3e223c87577d5d4ab8f8518b | Fix core crash
Some CTCP requests triggered a bug in the parser; this fixes the issue. | 1 | void CtcpParser::packedReply(CoreNetwork *net, const QString &bufname, const QList<QByteArray> &replies) {
QList<QByteArray> params;
int answerSize = 0;
for(int i = 0; i < replies.count(); i++) {
answerSize += replies.at(i).size();
}
QByteArray quotedReply(answerSize, 0);
int nextPos = 0;
QByteArray... | 87,534,697,093,027,220,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2011-3354 | The CtcpParser::packedReply method in core/ctcpparser.cpp in Quassel before 0.7.3 allows remote attackers to cause a denial of service (crash) via a crafted Client-To-Client Protocol (CTCP) request, as demonstrated in the wild in September 2011. | https://nvd.nist.gov/vuln/detail/CVE-2011-3354 |
428,903 | quassel | da215fcb9cd3096a3e223c87577d5d4ab8f8518b | https://github.com/quassel/quassel | http://git.quassel-irc.org/?p=quassel.git;a=commit;h=da215fcb9cd3096a3e223c87577d5d4ab8f8518b | Fix core crash
Some CTCP requests triggered a bug in the parser; this fixes the issue. | 0 | void CtcpParser::packedReply(CoreNetwork *net, const QString &bufname, const QList<QByteArray> &replies) {
QList<QByteArray> params;
int answerSize = 0;
for(int i = 0; i < replies.count(); i++) {
answerSize += replies.at(i).size();
}
QByteArray quotedReply;
quotedReply.reserve(answerSize);
for(int i... | 302,248,419,576,398,700,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2011-3354 | The CtcpParser::packedReply method in core/ctcpparser.cpp in Quassel before 0.7.3 allows remote attackers to cause a denial of service (crash) via a crafted Client-To-Client Protocol (CTCP) request, as demonstrated in the wild in September 2011. | https://nvd.nist.gov/vuln/detail/CVE-2011-3354 |
210,153 | ImageMagick6 | 553054c1cb1e4e05ec86237afef76a32cd7c464d | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/553054c1cb1e4e05ec86237afef76a32cd7c464d | https://github.com/ImageMagick/ImageMagick/pull/3083 | 1 | static void ExportIndexQuantum(const Image *image,QuantumInfo *quantum_info,
const MagickSizeType number_pixels,const PixelPacket *magick_restrict p,
const IndexPacket *magick_restrict indexes,unsigned char *magick_restrict q,
ExceptionInfo *exception)
{
ssize_t
x;
ssize_t
bit;
if (image->storage_... | 80,551,222,445,389,500,000,000,000,000,000,000,000 | quantum-export.c | 284,721,757,388,059,100,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2021-20224 | An integer overflow issue was discovered in ImageMagick's ExportIndexQuantum() function in MagickCore/quantum-export.c. Function calls to GetPixelIndex() could result in values outside the range of representable for the 'unsigned char'. When ImageMagick processes a crafted pdf file, this could lead to an undefined beha... | https://nvd.nist.gov/vuln/detail/CVE-2021-20224 |
429,102 | ImageMagick6 | 553054c1cb1e4e05ec86237afef76a32cd7c464d | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/553054c1cb1e4e05ec86237afef76a32cd7c464d | https://github.com/ImageMagick/ImageMagick/pull/3083 | 0 | static void ExportIndexQuantum(const Image *image,QuantumInfo *quantum_info,
const MagickSizeType number_pixels,const PixelPacket *magick_restrict p,
const IndexPacket *magick_restrict indexes,unsigned char *magick_restrict q,
ExceptionInfo *exception)
{
ssize_t
x;
ssize_t
bit;
if (image->storage_... | 102,741,928,238,998,780,000,000,000,000,000,000,000 | quantum-export.c | 333,541,005,680,227,880,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2021-20224 | An integer overflow issue was discovered in ImageMagick's ExportIndexQuantum() function in MagickCore/quantum-export.c. Function calls to GetPixelIndex() could result in values outside the range of representable for the 'unsigned char'. When ImageMagick processes a crafted pdf file, this could lead to an undefined beha... | https://nvd.nist.gov/vuln/detail/CVE-2021-20224 |
210,157 | gimp | ace45631595e8781a1420842582d67160097163c | https://github.com/GNOME/gimp | http://git.gnome.org/browse/gimp/commit/plug-ins/file-fits/fits-io.c?id=ace45631595e8781a1420842582d67160097163c | Bug 676804 - file handling DoS for fit file format
Apply patch from joe@reactionis.co.uk which fixes a buffer overflow on
broken/malicious fits files. | 1 | static FITS_HDU_LIST *fits_decode_header (FITS_RECORD_LIST *hdr,
long hdr_offset, long dat_offset)
{FITS_HDU_LIST *hdulist;
FITS_DATA *fdat;
char errmsg[80], key[9];
int k, bpp, random_groups;
long mul_axis, data_size, bitpix_supported;
#define FITS_DECODE_CARD(mhdr,mkey,mfdat,mtyp) \
{st... | 89,898,800,749,669,370,000,000,000,000,000,000,000 | fits-io.c | 183,670,284,454,913,350,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2012-3236 | fits-io.c in GIMP before 2.8.1 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a malformed XTENSION header of a .fit file, as demonstrated using a long string. | https://nvd.nist.gov/vuln/detail/CVE-2012-3236 |
429,109 | gimp | ace45631595e8781a1420842582d67160097163c | https://github.com/GNOME/gimp | http://git.gnome.org/browse/gimp/commit/plug-ins/file-fits/fits-io.c?id=ace45631595e8781a1420842582d67160097163c | Bug 676804 - file handling DoS for fit file format
Apply patch from joe@reactionis.co.uk which fixes a buffer overflow on
broken/malicious fits files. | 0 | static FITS_HDU_LIST *fits_decode_header (FITS_RECORD_LIST *hdr,
long hdr_offset, long dat_offset)
{FITS_HDU_LIST *hdulist;
FITS_DATA *fdat;
char errmsg[80], key[9];
int k, bpp, random_groups;
long mul_axis, data_size, bitpix_supported;
#define FITS_DECODE_CARD(mhdr,mkey,mfdat,mtyp) \
{st... | 18,273,001,141,931,360,000,000,000,000,000,000,000 | fits-io.c | 217,716,246,697,550,270,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2012-3236 | fits-io.c in GIMP before 2.8.1 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a malformed XTENSION header of a .fit file, as demonstrated using a long string. | https://nvd.nist.gov/vuln/detail/CVE-2012-3236 |
210,168 | php-src | 0218acb7e756a469099c4ccfb22bce6c2bd1ef87 | https://github.com/php/php-src | http://git.php.net/?p=php-src.git;a=commit;h=0218acb7e756a469099c4ccfb22bce6c2bd1ef87 | Fix for bug #72513 | 1 | CWD_API int virtual_file_ex(cwd_state *state, const char *path, verify_path_func verify_path, int use_realpath TSRMLS_DC) /* {{{ */
{
int path_length = strlen(path);
char resolved_path[MAXPATHLEN];
int start = 1;
int ll = 0;
time_t t;
int ret;
int add_slash;
void *tmp;
if (path_length == 0 || path_length >= M... | 78,835,046,925,777,380,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2016-6289 | Integer overflow in the virtual_file_ex function in TSRM/tsrm_virtual_cwd.c in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9 allows remote attackers to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a crafted extract operation on a ZIP archive. | https://nvd.nist.gov/vuln/detail/CVE-2016-6289 |
429,343 | php-src | 0218acb7e756a469099c4ccfb22bce6c2bd1ef87 | https://github.com/php/php-src | http://git.php.net/?p=php-src.git;a=commit;h=0218acb7e756a469099c4ccfb22bce6c2bd1ef87 | Fix for bug #72513 | 0 | CWD_API int virtual_file_ex(cwd_state *state, const char *path, verify_path_func verify_path, int use_realpath TSRMLS_DC) /* {{{ */
{
int path_length = strlen(path);
char resolved_path[MAXPATHLEN];
int start = 1;
int ll = 0;
time_t t;
int ret;
int add_slash;
void *tmp;
if (path_length <= 0 || path_length >= M... | 279,529,816,160,771,700,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2016-6289 | Integer overflow in the virtual_file_ex function in TSRM/tsrm_virtual_cwd.c in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9 allows remote attackers to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a crafted extract operation on a ZIP archive. | https://nvd.nist.gov/vuln/detail/CVE-2016-6289 |
210,185 | spice-vd_agent | b7db1c20c9f80154fb54392eb44add3486d3e427 | https://github.com/freedesktop/spice-vd_agent | https://github.com/freedesktop/spice-vd_agent/commit/b7db1c20c9f80154fb54392eb44add3486d3e427 | vdagentd: do not allow to use an already used file-xfer id
Signed-off-by: Uri Lublin <uril@redhat.com>
Acked-by: Frediano Ziglio <fziglio@redhat.com> | 1 | static void do_client_file_xfer(VirtioPort *vport,
VDAgentMessage *message_header,
uint8_t *data)
{
uint32_t msg_type, id;
UdscsConnection *conn;
switch (message_header->type) {
case VD_AGENT_FILE_XFER_START: {
VDAgentFileXferStart... | 222,790,491,158,173,450,000,000,000,000,000,000,000 | vdagentd.c | 134,875,536,789,113,300,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2020-25651 | A flaw was found in the SPICE file transfer protocol. File data from the host system can end up in full or in parts in the client connection of an illegitimate local user in the VM system. Active file transfers from other users could also be interrupted, resulting in a denial of service. The highest threat from this vu... | https://nvd.nist.gov/vuln/detail/CVE-2020-25651 |
429,583 | spice-vd_agent | b7db1c20c9f80154fb54392eb44add3486d3e427 | https://github.com/freedesktop/spice-vd_agent | https://github.com/freedesktop/spice-vd_agent/commit/b7db1c20c9f80154fb54392eb44add3486d3e427 | vdagentd: do not allow to use an already used file-xfer id
Signed-off-by: Uri Lublin <uril@redhat.com>
Acked-by: Frediano Ziglio <fziglio@redhat.com> | 0 | static void do_client_file_xfer(VirtioPort *vport,
VDAgentMessage *message_header,
uint8_t *data)
{
uint32_t msg_type, id;
UdscsConnection *conn;
switch (message_header->type) {
case VD_AGENT_FILE_XFER_START: {
VDAgentFileXferStart... | 58,646,848,942,148,380,000,000,000,000,000,000,000 | vdagentd.c | 67,833,859,549,917,040,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2020-25651 | A flaw was found in the SPICE file transfer protocol. File data from the host system can end up in full or in parts in the client connection of an illegitimate local user in the VM system. Active file transfers from other users could also be interrupted, resulting in a denial of service. The highest threat from this vu... | https://nvd.nist.gov/vuln/detail/CVE-2020-25651 |
210,190 | libgxps | b458226e162fe1ffe7acb4230c114a52ada5131b | https://github.com/GNOME/libgxps | https://git.gnome.org/browse/libgxps/commit/?id=b458226e162fe1ffe7acb4230c114a52ada5131b | gxps-archive: Ensure gxps_archive_read_entry() fills the GError in case of failure
And fix the callers to not overwrite the GError. | 1 | gxps_fonts_new_font_face (GXPSArchive *zip,
const gchar *font_uri,
GError **error)
{
GHashTable *ft_cache;
FtFontFace ft_face;
FtFontFace *ft_font_face;
FT_Face face;
cairo_font_face_t *font_face;
guchar *font_data;
gsize font_data_len;
gboo... | 326,949,886,729,376,600,000,000,000,000,000,000,000 | gxps-fonts.c | 198,009,145,170,871,620,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-10733 | There is a heap-based buffer over-read in the function ft_font_face_hash of gxps-fonts.c in libgxps through 0.3.0. A crafted input will lead to a remote denial of service attack. | https://nvd.nist.gov/vuln/detail/CVE-2018-10733 |
429,591 | libgxps | b458226e162fe1ffe7acb4230c114a52ada5131b | https://github.com/GNOME/libgxps | https://git.gnome.org/browse/libgxps/commit/?id=b458226e162fe1ffe7acb4230c114a52ada5131b | gxps-archive: Ensure gxps_archive_read_entry() fills the GError in case of failure
And fix the callers to not overwrite the GError. | 0 | gxps_fonts_new_font_face (GXPSArchive *zip,
const gchar *font_uri,
GError **error)
{
GHashTable *ft_cache;
FtFontFace ft_face;
FtFontFace *ft_font_face;
FT_Face face;
cairo_font_face_t *font_face;
guchar *font_data;
gsize font_data_len;
... | 2,373,199,272,118,685,500,000,000,000,000,000,000 | gxps-fonts.c | 138,081,043,403,436,360,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-10733 | There is a heap-based buffer over-read in the function ft_font_face_hash of gxps-fonts.c in libgxps through 0.3.0. A crafted input will lead to a remote denial of service attack. | https://nvd.nist.gov/vuln/detail/CVE-2018-10733 |
210,194 | freeradius-server | 1b1ec5ce75e224bd1755650c18ccdaa6dc53e605 | https://github.com/alandekok/freeradius-server | https://github.com/alandekok/freeradius-server/commit/1b1ec5ce75e224bd1755650c18ccdaa6dc53e605 | heck for account and password expiration | 1 | static int unix_getpw(UNUSED void *instance, REQUEST *request,
VALUE_PAIR **vp_list)
{
const char *name;
const char *encrypted_pass;
#ifdef HAVE_GETSPNAM
struct spwd *spwd = NULL;
#endif
#ifdef OSFC2
struct pr_passwd *pr_pw;
#else
struct passwd *pwd;
#endif
#ifdef HAVE_GETUSERSHELL
char *shell;
#endif
V... | 222,041,015,006,357,660,000,000,000,000,000,000,000 | rlm_unix.c | 134,623,500,908,668,500,000,000,000,000,000,000,000 | [
"CWE-522"
] | CVE-2011-4966 | modules/rlm_unix/rlm_unix.c in FreeRADIUS before 2.2.0, when unix mode is enabled for user authentication, does not properly check the password expiration in /etc/shadow, which allows remote authenticated users to authenticate using an expired password. | https://nvd.nist.gov/vuln/detail/CVE-2011-4966 |
429,753 | freeradius-server | 1b1ec5ce75e224bd1755650c18ccdaa6dc53e605 | https://github.com/alandekok/freeradius-server | https://github.com/alandekok/freeradius-server/commit/1b1ec5ce75e224bd1755650c18ccdaa6dc53e605 | heck for account and password expiration | 0 | static int unix_getpw(UNUSED void *instance, REQUEST *request,
VALUE_PAIR **vp_list)
{
const char *name;
const char *encrypted_pass;
#ifdef HAVE_GETSPNAM
struct spwd *spwd = NULL;
#endif
#ifdef OSFC2
struct pr_passwd *pr_pw;
#else
struct passwd *pwd;
#endif
#ifdef HAVE_GETUSERSHELL
char *shell;
#endif
V... | 63,257,407,504,939,800,000,000,000,000,000,000,000 | rlm_unix.c | 195,897,549,485,145,440,000,000,000,000,000,000,000 | [
"CWE-522"
] | CVE-2011-4966 | modules/rlm_unix/rlm_unix.c in FreeRADIUS before 2.2.0, when unix mode is enabled for user authentication, does not properly check the password expiration in /etc/shadow, which allows remote authenticated users to authenticate using an expired password. | https://nvd.nist.gov/vuln/detail/CVE-2011-4966 |
210,195 | bind9 | f09352d20a9d360e50683cd1d2fc52ccedcd77a0 | https://github.com/isc-projects/bind9 | https://gitlab.isc.org/isc-projects/bind9/commit/f09352d20a9d360e50683cd1d2fc52ccedcd77a0 | Update keyfetch_done compute_tag check
If in keyfetch_done the compute_tag fails (because for example the
algorithm is not supported), don't crash, but instead ignore the
key. | 1 | keyfetch_done(isc_task_t *task, isc_event_t *event) {
isc_result_t result, eresult;
dns_fetchevent_t *devent;
dns_keyfetch_t *kfetch;
dns_zone_t *zone;
isc_mem_t *mctx = NULL;
dns_keytable_t *secroots = NULL;
dns_dbversion_t *ver = NULL;
dns_diff_t diff;
bool alldone = false;
bool commit = false;
dns_name_t ... | 236,992,101,270,270,440,000,000,000,000,000,000,000 | zone.c | 154,660,532,303,670,460,000,000,000,000,000,000,000 | [
"CWE-327"
] | CVE-2018-5745 | "managed-keys" is a feature which allows a BIND resolver to automatically maintain the keys used by trust anchors which operators configure for use in DNSSEC validation. Due to an error in the managed-keys feature it is possible for a BIND server which uses managed-keys to exit due to an assertion failure if, during ke... | https://nvd.nist.gov/vuln/detail/CVE-2018-5745 |
429,855 | bind9 | f09352d20a9d360e50683cd1d2fc52ccedcd77a0 | https://github.com/isc-projects/bind9 | https://gitlab.isc.org/isc-projects/bind9/commit/f09352d20a9d360e50683cd1d2fc52ccedcd77a0 | Update keyfetch_done compute_tag check
If in keyfetch_done the compute_tag fails (because for example the
algorithm is not supported), don't crash, but instead ignore the
key. | 0 | keyfetch_done(isc_task_t *task, isc_event_t *event) {
isc_result_t result, eresult;
dns_fetchevent_t *devent;
dns_keyfetch_t *kfetch;
dns_zone_t *zone;
isc_mem_t *mctx = NULL;
dns_keytable_t *secroots = NULL;
dns_dbversion_t *ver = NULL;
dns_diff_t diff;
bool alldone = false;
bool commit = false;
dns_name_t ... | 210,652,342,307,875,430,000,000,000,000,000,000,000 | zone.c | 112,636,719,919,640,790,000,000,000,000,000,000,000 | [
"CWE-327"
] | CVE-2018-5745 | "managed-keys" is a feature which allows a BIND resolver to automatically maintain the keys used by trust anchors which operators configure for use in DNSSEC validation. Due to an error in the managed-keys feature it is possible for a BIND server which uses managed-keys to exit due to an assertion failure if, during ke... | https://nvd.nist.gov/vuln/detail/CVE-2018-5745 |
210,200 | libsndfile | 85c877d5072866aadbe8ed0c3e0590fbb5e16788 | https://github.com/erikd/libsndfile | https://github.com/erikd/libsndfile/commit/85c877d5072866aadbe8ed0c3e0590fbb5e16788 | double64_init: Check psf->sf.channels against upper bound
This prevents division by zero later in the code.
While the trivial case to catch this (i.e. sf.channels < 1) has already
been covered, a crafted file may report a number of channels that is
so high (i.e. > INT_MAX/sizeof(double)) that it "somehow" gets
miscal... | 1 | double64_init (SF_PRIVATE *psf)
{ static int double64_caps ;
if (psf->sf.channels < 1)
{ psf_log_printf (psf, "double64_init : internal error : channels = %d\n", psf->sf.channels) ;
return SFE_INTERNAL ;
} ;
double64_caps = double64_get_capability (psf) ;
psf->blockwidth = sizeof (double) * psf->sf.channels ... | 335,100,933,214,536,800,000,000,000,000,000,000,000 | None | null | [
"CWE-369"
] | CVE-2017-14634 | In libsndfile 1.0.28, a divide-by-zero error exists in the function double64_init() in double64.c, which may lead to DoS when playing a crafted audio file. | https://nvd.nist.gov/vuln/detail/CVE-2017-14634 |
430,203 | libsndfile | 85c877d5072866aadbe8ed0c3e0590fbb5e16788 | https://github.com/erikd/libsndfile | https://github.com/erikd/libsndfile/commit/85c877d5072866aadbe8ed0c3e0590fbb5e16788 | double64_init: Check psf->sf.channels against upper bound
This prevents division by zero later in the code.
While the trivial case to catch this (i.e. sf.channels < 1) has already
been covered, a crafted file may report a number of channels that is
so high (i.e. > INT_MAX/sizeof(double)) that it "somehow" gets
miscal... | 0 | double64_init (SF_PRIVATE *psf)
{ static int double64_caps ;
if (psf->sf.channels < 1 || psf->sf.channels > SF_MAX_CHANNELS)
{ psf_log_printf (psf, "double64_init : internal error : channels = %d\n", psf->sf.channels) ;
return SFE_INTERNAL ;
} ;
double64_caps = double64_get_capability (psf) ;
psf->blockwidth... | 30,630,304,705,818,692,000,000,000,000,000,000,000 | None | null | [
"CWE-369"
] | CVE-2017-14634 | In libsndfile 1.0.28, a divide-by-zero error exists in the function double64_init() in double64.c, which may lead to DoS when playing a crafted audio file. | https://nvd.nist.gov/vuln/detail/CVE-2017-14634 |
210,207 | chafa | 56fabfa18a6880b4cb66047fa6557920078048d9 | https://github.com/hpjansson/chafa | https://github.com/hpjansson/chafa/commit/56fabfa18a6880b4cb66047fa6557920078048d9 | XwdLoader: Fix buffer over-read and improve general robustness
This commit fixes a buffer over-read that could occur due to g_ntohl()
evaluating its argument more than once if at least one of the following
is true:
* Build target is not x86.
* __OPTIMIZE__ is not set during compilation (e.g. -O0 was used).
It also i... | 1 | load_header (XwdLoader *loader) // gconstpointer in, gsize in_max_len, XwdHeader *header_out)
{
XwdHeader *h = &loader->header;
XwdHeader in;
const guint32 *p = (const guint32 *) ∈
if (!file_mapping_taste (loader->mapping, &in, 0, sizeof (in)))
return FALSE;
h->header_size = g_ntohl (*(... | 249,808,330,917,895,170,000,000,000,000,000,000,000 | xwd-loader.c | 237,760,179,666,021,740,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2022-2301 | Buffer Over-read in GitHub repository hpjansson/chafa prior to 1.10.3. | https://nvd.nist.gov/vuln/detail/CVE-2022-2301 |
430,478 | chafa | 56fabfa18a6880b4cb66047fa6557920078048d9 | https://github.com/hpjansson/chafa | https://github.com/hpjansson/chafa/commit/56fabfa18a6880b4cb66047fa6557920078048d9 | XwdLoader: Fix buffer over-read and improve general robustness
This commit fixes a buffer over-read that could occur due to g_ntohl()
evaluating its argument more than once if at least one of the following
is true:
* Build target is not x86.
* __OPTIMIZE__ is not set during compilation (e.g. -O0 was used).
It also i... | 0 | load_header (XwdLoader *loader)
{
XwdHeader *h = &loader->header;
XwdHeader in;
const XwdHeader *inp;
if (!file_mapping_taste (loader->mapping, &in, 0, sizeof (in)))
return FALSE;
inp = ∈
UNPACK_FIELD_U32 (h, inp, header_size);
UNPACK_FIELD_U32 (h, inp, file_version);
UNPAC... | 35,000,722,847,955,614,000,000,000,000,000,000,000 | xwd-loader.c | 9,211,984,097,836,637,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2022-2301 | Buffer Over-read in GitHub repository hpjansson/chafa prior to 1.10.3. | https://nvd.nist.gov/vuln/detail/CVE-2022-2301 |
210,212 | libvips | 2ab5aa7bf515135c2b02d42e9a72e4c98e17031a | https://github.com/libvips/libvips | https://github.com/libvips/libvips/commit/2ab5aa7bf515135c2b02d42e9a72e4c98e17031a | fix a used-before-set error in im_vips2dz
we were reading an uninited string in a vips7 compatibility wrapper, thanks
yifengchen-cc
see https://github.com/libvips/libvips/issues/1419 | 1 | im_vips2dz( IMAGE *in, const char *filename )
{
char *p, *q;
char name[FILENAME_MAX];
char mode[FILENAME_MAX];
char buf[FILENAME_MAX];
int i;
VipsForeignDzLayout layout = VIPS_FOREIGN_DZ_LAYOUT_DZ;
char *suffix = ".jpeg";
int overlap = 0;
int tile_size = 256;
VipsForeignDzDepth depth = VIPS_FOREIGN_DZ_DEPTH... | 139,851,357,086,429,170,000,000,000,000,000,000,000 | im_vips2dz.c | 232,657,374,181,925,500,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2020-20739 | im_vips2dz in /libvips/libvips/deprecated/im_vips2dz.c in libvips before 8.8.2 has an uninitialized variable which may cause the leakage of remote server path or stack address. | https://nvd.nist.gov/vuln/detail/CVE-2020-20739 |
430,482 | libvips | 2ab5aa7bf515135c2b02d42e9a72e4c98e17031a | https://github.com/libvips/libvips | https://github.com/libvips/libvips/commit/2ab5aa7bf515135c2b02d42e9a72e4c98e17031a | fix a used-before-set error in im_vips2dz
we were reading an uninited string in a vips7 compatibility wrapper, thanks
yifengchen-cc
see https://github.com/libvips/libvips/issues/1419 | 0 | im_vips2dz( IMAGE *in, const char *filename )
{
char *p, *q;
char name[FILENAME_MAX];
char mode[FILENAME_MAX];
char buf[FILENAME_MAX];
int i;
VipsForeignDzLayout layout = VIPS_FOREIGN_DZ_LAYOUT_DZ;
char *suffix = ".jpeg";
int overlap = 0;
int tile_size = 256;
VipsForeignDzDepth depth = VIPS_FOREIGN_DZ_DEPTH... | 117,560,909,108,549,230,000,000,000,000,000,000,000 | im_vips2dz.c | 16,179,909,142,491,178,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2020-20739 | im_vips2dz in /libvips/libvips/deprecated/im_vips2dz.c in libvips before 8.8.2 has an uninitialized variable which may cause the leakage of remote server path or stack address. | https://nvd.nist.gov/vuln/detail/CVE-2020-20739 |
210,213 | qemu | cc45995294b92d95319b4782750a3580cabdbc0c | https://github.com/bonzini/qemu | http://git.qemu.org/?p=qemu.git;a=commit;h=cc45995294b92d95319b4782750a3580cabdbc0c | virtio: out-of-bounds buffer write on invalid state load
CVE-2013-4151 QEMU 1.0 out-of-bounds buffer write in
virtio_load@hw/virtio/virtio.c
So we have this code since way back when:
num = qemu_get_be32(f);
for (i = 0; i < num; i++) {
vdev->vq[i].vring.num = qemu_get_be32(f);
array of vqs has size ... | 1 | int virtio_load(VirtIODevice *vdev, QEMUFile *f)
{
int num, i, ret;
uint32_t features;
uint32_t supported_features;
BusState *qbus = qdev_get_parent_bus(DEVICE(vdev));
VirtioBusClass *k = VIRTIO_BUS_GET_CLASS(qbus);
if (k->load_config) {
ret = k->load_config(qbus->parent, f);
if... | 83,154,094,430,606,850,000,000,000,000,000,000,000 | virtio.c | 245,768,543,431,827,900,000,000,000,000,000,000,000 | [
"CWE-94"
] | CVE-2013-4151 | The virtio_load function in virtio/virtio.c in QEMU 1.x before 1.7.2 allows remote attackers to execute arbitrary code via a crafted savevm image, which triggers an out-of-bounds write. | https://nvd.nist.gov/vuln/detail/CVE-2013-4151 |
430,483 | qemu | cc45995294b92d95319b4782750a3580cabdbc0c | https://github.com/bonzini/qemu | http://git.qemu.org/?p=qemu.git;a=commit;h=cc45995294b92d95319b4782750a3580cabdbc0c | virtio: out-of-bounds buffer write on invalid state load
CVE-2013-4151 QEMU 1.0 out-of-bounds buffer write in
virtio_load@hw/virtio/virtio.c
So we have this code since way back when:
num = qemu_get_be32(f);
for (i = 0; i < num; i++) {
vdev->vq[i].vring.num = qemu_get_be32(f);
array of vqs has size ... | 0 | int virtio_load(VirtIODevice *vdev, QEMUFile *f)
{
int i, ret;
uint32_t num;
uint32_t features;
uint32_t supported_features;
BusState *qbus = qdev_get_parent_bus(DEVICE(vdev));
VirtioBusClass *k = VIRTIO_BUS_GET_CLASS(qbus);
if (k->load_config) {
ret = k->load_config(qbus->parent, f... | 239,681,496,701,794,370,000,000,000,000,000,000,000 | virtio.c | 183,883,880,964,604,100,000,000,000,000,000,000,000 | [
"CWE-94"
] | CVE-2013-4151 | The virtio_load function in virtio/virtio.c in QEMU 1.x before 1.7.2 allows remote attackers to execute arbitrary code via a crafted savevm image, which triggers an out-of-bounds write. | https://nvd.nist.gov/vuln/detail/CVE-2013-4151 |
210,219 | libxml2 | bdd66182ef53fe1f7209ab6535fda56366bd7ac9 | https://github.com/GNOME/libxml2 | https://git.gnome.org/browse/libxml2/commit/?id=bdd66182ef53fe1f7209ab6535fda56366bd7ac9 | Avoid building recursive entities
For https://bugzilla.gnome.org/show_bug.cgi?id=762100
When we detect a recusive entity we should really not
build the associated data, moreover if someone bypass
libxml2 fatal errors and still tries to serialize a broken
entity make sure we don't risk to get ito a recursion
* parser... | 1 | xmlStringGetNodeList(const xmlDoc *doc, const xmlChar *value) {
xmlNodePtr ret = NULL, last = NULL;
xmlNodePtr node;
xmlChar *val;
const xmlChar *cur = value;
const xmlChar *q;
xmlEntityPtr ent;
xmlBufPtr buf;
if (value == NULL) return(NULL);
buf = xmlBufCreateSize(0);
if (buf ... | 267,903,642,859,318,300,000,000,000,000,000,000,000 | tree.c | 315,848,746,426,749,160,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2016-3627 | The xmlStringGetNodeList function in tree.c in libxml2 2.9.3 and earlier, when used in recovery mode, allows context-dependent attackers to cause a denial of service (infinite recursion, stack consumption, and application crash) via a crafted XML document. | https://nvd.nist.gov/vuln/detail/CVE-2016-3627 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.