idx
int64
project
string
commit_id
string
project_url
string
commit_url
string
commit_message
string
target
int64
func
string
func_hash
float64
file_name
string
file_hash
float64
cwe
list
cve
string
cve_desc
string
nvd_url
string
430,520
libxml2
bdd66182ef53fe1f7209ab6535fda56366bd7ac9
https://github.com/GNOME/libxml2
https://git.gnome.org/browse/libxml2/commit/?id=bdd66182ef53fe1f7209ab6535fda56366bd7ac9
Avoid building recursive entities For https://bugzilla.gnome.org/show_bug.cgi?id=762100 When we detect a recusive entity we should really not build the associated data, moreover if someone bypass libxml2 fatal errors and still tries to serialize a broken entity make sure we don't risk to get ito a recursion * parser...
0
xmlStringGetNodeList(const xmlDoc *doc, const xmlChar *value) { xmlNodePtr ret = NULL, last = NULL; xmlNodePtr node; xmlChar *val; const xmlChar *cur = value; const xmlChar *q; xmlEntityPtr ent; xmlBufPtr buf; if (value == NULL) return(NULL); buf = xmlBufCreateSize(0); if (buf ...
234,163,977,565,962,560,000,000,000,000,000,000,000
tree.c
278,896,596,068,111,170,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2016-3627
The xmlStringGetNodeList function in tree.c in libxml2 2.9.3 and earlier, when used in recovery mode, allows context-dependent attackers to cause a denial of service (infinite recursion, stack consumption, and application crash) via a crafted XML document.
https://nvd.nist.gov/vuln/detail/CVE-2016-3627
210,236
linux
6af3aa57a0984e061f61308fe181a9a12359fecc
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6af3aa57a0984e061f61308fe181a9a12359fecc
NFC: pn533: fix use-after-free and memleaks The driver would fail to deregister and its class device and free related resources on late probe errors. Reported-by: syzbot+cb035c75c03dbe34b796@syzkaller.appspotmail.com Fixes: 32ecc75ded72 ("NFC: pn533: change order operations in dev registation") Signed-off-by: Johan H...
1
static int pn533_usb_probe(struct usb_interface *interface, const struct usb_device_id *id) { struct pn533 *priv; struct pn533_usb_phy *phy; struct usb_host_interface *iface_desc; struct usb_endpoint_descriptor *endpoint; int in_endpoint = 0; int out_endpoint = 0; int rc = -ENOMEM; int i; u32 protocols; en...
48,632,546,726,964,600,000,000,000,000,000,000,000
usb.c
337,690,472,400,082,660,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2019-19526
In the Linux kernel before 5.3.9, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/nfc/pn533/usb.c driver, aka CID-6af3aa57a098.
https://nvd.nist.gov/vuln/detail/CVE-2019-19526
430,716
linux
6af3aa57a0984e061f61308fe181a9a12359fecc
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6af3aa57a0984e061f61308fe181a9a12359fecc
NFC: pn533: fix use-after-free and memleaks The driver would fail to deregister and its class device and free related resources on late probe errors. Reported-by: syzbot+cb035c75c03dbe34b796@syzkaller.appspotmail.com Fixes: 32ecc75ded72 ("NFC: pn533: change order operations in dev registation") Signed-off-by: Johan H...
0
static int pn533_usb_probe(struct usb_interface *interface, const struct usb_device_id *id) { struct pn533 *priv; struct pn533_usb_phy *phy; struct usb_host_interface *iface_desc; struct usb_endpoint_descriptor *endpoint; int in_endpoint = 0; int out_endpoint = 0; int rc = -ENOMEM; int i; u32 protocols; en...
313,938,757,684,937,700,000,000,000,000,000,000,000
usb.c
71,704,665,606,932,790,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2019-19526
In the Linux kernel before 5.3.9, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/nfc/pn533/usb.c driver, aka CID-6af3aa57a098.
https://nvd.nist.gov/vuln/detail/CVE-2019-19526
210,239
krb5
fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
Fix KDC null deref on bad encrypted challenge The function ec_verify() in src/kdc/kdc_preauth_ec.c contains a check to avoid further processing if the armor key is NULL. However, this check is bypassed by a call to k5memdup0() which overwrites retval with 0 if the allocation succeeds. If the armor key is NULL, a cal...
1
ec_verify(krb5_context context, krb5_data *req_pkt, krb5_kdc_req *request, krb5_enc_tkt_part *enc_tkt_reply, krb5_pa_data *data, krb5_kdcpreauth_callbacks cb, krb5_kdcpreauth_rock rock, krb5_kdcpreauth_moddata moddata, krb5_kdcpreauth_verify_respond_fn respond, void *arg) { k...
3,652,389,509,266,629,000,000,000,000,000,000,000
kdc_preauth_ec.c
52,553,352,575,276,740,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2021-36222
ec_verify in kdc/kdc_preauth_ec.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.4 and 1.19.x before 1.19.2 allows remote attackers to cause a NULL pointer dereference and daemon crash. This occurs because a return value is not properly managed in a certain situation.
https://nvd.nist.gov/vuln/detail/CVE-2021-36222
430,872
krb5
fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
Fix KDC null deref on bad encrypted challenge The function ec_verify() in src/kdc/kdc_preauth_ec.c contains a check to avoid further processing if the armor key is NULL. However, this check is bypassed by a call to k5memdup0() which overwrites retval with 0 if the allocation succeeds. If the armor key is NULL, a cal...
0
ec_verify(krb5_context context, krb5_data *req_pkt, krb5_kdc_req *request, krb5_enc_tkt_part *enc_tkt_reply, krb5_pa_data *data, krb5_kdcpreauth_callbacks cb, krb5_kdcpreauth_rock rock, krb5_kdcpreauth_moddata moddata, krb5_kdcpreauth_verify_respond_fn respond, void *arg) { k...
268,297,582,588,655,900,000,000,000,000,000,000,000
kdc_preauth_ec.c
316,907,641,964,075,900,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2021-36222
ec_verify in kdc/kdc_preauth_ec.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.4 and 1.19.x before 1.19.2 allows remote attackers to cause a NULL pointer dereference and daemon crash. This occurs because a return value is not properly managed in a certain situation.
https://nvd.nist.gov/vuln/detail/CVE-2021-36222
210,243
libxml2
11ed4a7a90d5ce156a18980a4ad4e53e77384852
https://github.com/GNOME/libxml2
https://git.gnome.org/browse/libxml2/commit/?id=11ed4a7a90d5ce156a18980a4ad4e53e77384852
Heap use-after-free in htmlParsePubidLiteral and htmlParseSystemiteral For https://bugzilla.gnome.org/show_bug.cgi?id=760263 * HTMLparser.c: Add BASE_PTR convenience macro. (htmlParseSystemLiteral): Store length and start position instead of a pointer while iterating through the public identifier since the underlying...
1
htmlParsePubidLiteral(htmlParserCtxtPtr ctxt) { const xmlChar *q; xmlChar *ret = NULL; /* * Name ::= (Letter | '_') (NameChar)* */ if (CUR == '"') { NEXT; q = CUR_PTR; while (IS_PUBIDCHAR_CH(CUR)) NEXT; if (CUR != '"') { htmlParseErr(ctxt, XML_ERR_LITERAL_NOT_FINISHED, ...
306,600,101,426,135,900,000,000,000,000,000,000,000
HTMLparser.c
9,346,300,951,361,166,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2016-1837
Multiple use-after-free vulnerabilities in the (1) htmlPArsePubidLiteral and (2) htmlParseSystemiteral functions in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allow remote attackers to cause a denial of service via a crafted XML document.
https://nvd.nist.gov/vuln/detail/CVE-2016-1837
430,909
libxml2
11ed4a7a90d5ce156a18980a4ad4e53e77384852
https://github.com/GNOME/libxml2
https://git.gnome.org/browse/libxml2/commit/?id=11ed4a7a90d5ce156a18980a4ad4e53e77384852
Heap use-after-free in htmlParsePubidLiteral and htmlParseSystemiteral For https://bugzilla.gnome.org/show_bug.cgi?id=760263 * HTMLparser.c: Add BASE_PTR convenience macro. (htmlParseSystemLiteral): Store length and start position instead of a pointer while iterating through the public identifier since the underlying...
0
htmlParsePubidLiteral(htmlParserCtxtPtr ctxt) { size_t len = 0, startPosition = 0; xmlChar *ret = NULL; /* * Name ::= (Letter | '_') (NameChar)* */ if (CUR == '"') { NEXT; if (CUR_PTR < BASE_PTR) return(ret); startPosition = CUR_PTR - BASE_PTR; whi...
141,533,378,026,275,370,000,000,000,000,000,000,000
HTMLparser.c
218,614,938,984,508,400,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2016-1837
Multiple use-after-free vulnerabilities in the (1) htmlPArsePubidLiteral and (2) htmlParseSystemiteral functions in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allow remote attackers to cause a denial of service via a crafted XML document.
https://nvd.nist.gov/vuln/detail/CVE-2016-1837
210,260
bluez
8514068150759c1d6a46d4605d2351babfde1601
https://github.com/bluez/bluez
http://git.kernel.org/cgit/bluetooth/bluez.git/commit/?id=8514068150759c1d6a46d4605d2351babfde1601
tools/csr: Fix possible buffer overflow Make sure we don't write past the end of the array.
1
static int parse_line(char *str) { uint8_t array[256]; uint16_t value, pskey, length = 0; char *off, *end; pskey = strtol(str + 1, NULL, 16); off = strstr(str, "="); if (!off) return -EIO; off++; while (1) { value = strtol(off, &end, 16); if (value == 0 && off == end) break; array[length++] = val...
323,502,363,689,074,860,000,000,000,000,000,000,000
csr.c
89,956,407,438,766,370,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-7837
Buffer overflow in BlueZ 5.41 and earlier allows an attacker to execute arbitrary code via the parse_line function used in some userland utilities.
https://nvd.nist.gov/vuln/detail/CVE-2016-7837
431,785
bluez
8514068150759c1d6a46d4605d2351babfde1601
https://github.com/bluez/bluez
http://git.kernel.org/cgit/bluetooth/bluez.git/commit/?id=8514068150759c1d6a46d4605d2351babfde1601
tools/csr: Fix possible buffer overflow Make sure we don't write past the end of the array.
0
static int parse_line(char *str) { uint8_t array[256]; uint16_t value, pskey, length = 0; char *off, *end; pskey = strtol(str + 1, NULL, 16); off = strstr(str, "="); if (!off) return -EIO; off++; while (length <= sizeof(array) - 2) { value = strtol(off, &end, 16); if (value == 0 && off == end) break...
30,795,347,432,154,585,000,000,000,000,000,000,000
csr.c
334,065,365,613,460,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-7837
Buffer overflow in BlueZ 5.41 and earlier allows an attacker to execute arbitrary code via the parse_line function used in some userland utilities.
https://nvd.nist.gov/vuln/detail/CVE-2016-7837
210,272
libgphoto2
e25b3983489cd290edef693e78c0af694d3cd010
https://github.com/gphoto/libgphoto2
https://github.com/gphoto/libgphoto2/commit/e25b3983489cd290edef693e78c0af694d3cd010
Added some more size checks to ptp_unpack_OPL to avoid crashes on too short data (AFL)
1
ptp_unpack_OPL (PTPParams *params, unsigned char* data, MTPProperties **pprops, unsigned int len) { uint32_t prop_count = dtoh32a(data); MTPProperties *props = NULL; unsigned int offset = 0, i; *pprops = NULL; if (prop_count == 0) return 0; if (prop_count >= INT_MAX/sizeof(MTPProperties)) { ptp_debug (param...
250,621,290,750,879,480,000,000,000,000,000,000,000
ptp-pack.c
261,662,175,742,955,870,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2017-9831
An integer overflow vulnerability in the ptp_unpack_EOS_CustomFuncEx function of the ptp-pack.c file of libmtp (version 1.1.12 and below) allows attackers to cause a denial of service (out-of-bounds memory access) or maybe remote code execution by inserting a mobile device into a personal computer through a USB cable.
https://nvd.nist.gov/vuln/detail/CVE-2017-9831
432,141
libgphoto2
e25b3983489cd290edef693e78c0af694d3cd010
https://github.com/gphoto/libgphoto2
https://github.com/gphoto/libgphoto2/commit/e25b3983489cd290edef693e78c0af694d3cd010
Added some more size checks to ptp_unpack_OPL to avoid crashes on too short data (AFL)
0
ptp_unpack_OPL (PTPParams *params, unsigned char* data, MTPProperties **pprops, unsigned int len) { uint32_t prop_count; MTPProperties *props = NULL; unsigned int offset = 0, i; if (len < sizeof(uint32_t)) { ptp_debug (params ,"must have at least 4 bytes data, not %d", len); return 0; } prop_count = dtoh32...
308,499,607,267,159,470,000,000,000,000,000,000,000
ptp-pack.c
135,341,668,985,176,580,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2017-9831
An integer overflow vulnerability in the ptp_unpack_EOS_CustomFuncEx function of the ptp-pack.c file of libmtp (version 1.1.12 and below) allows attackers to cause a denial of service (out-of-bounds memory access) or maybe remote code execution by inserting a mobile device into a personal computer through a USB cable.
https://nvd.nist.gov/vuln/detail/CVE-2017-9831
210,280
systemd
d973d94dec349fb676fdd844f6fe2ada3538f27c
https://github.com/systemd/systemd
https://github.com/systemd/systemd/commit/d973d94dec349fb676fdd844f6fe2ada3538f27c
resolved: pin stream while calling callbacks for it These callbacks might unref the stream, but we still have to access it, let's hence ref it explicitly. Maybe fixes: #10725
1
static int dns_stream_complete(DnsStream *s, int error) { assert(s); #if ENABLE_DNS_OVER_TLS if (s->encrypted) { int r; r = dnstls_stream_shutdown(s, error); if (r != -EAGAIN) dns_stream_stop(s); } else #endif ...
95,883,649,578,032,730,000,000,000,000,000,000,000
resolved-dns-stream.c
39,966,380,965,475,856,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2022-2526
A use-after-free vulnerability was found in systemd. This issue occurs due to the on_stream_io() function and dns_stream_complete() function in 'resolved-dns-stream.c' not incrementing the reference counting for the DnsStream object. Therefore, other functions and callbacks called can dereference the DNSStream object, ...
https://nvd.nist.gov/vuln/detail/CVE-2022-2526
432,332
systemd
d973d94dec349fb676fdd844f6fe2ada3538f27c
https://github.com/systemd/systemd
https://github.com/systemd/systemd/commit/d973d94dec349fb676fdd844f6fe2ada3538f27c
resolved: pin stream while calling callbacks for it These callbacks might unref the stream, but we still have to access it, let's hence ref it explicitly. Maybe fixes: #10725
0
static int dns_stream_complete(DnsStream *s, int error) { _cleanup_(dns_stream_unrefp) _unused_ DnsStream *ref = dns_stream_ref(s); /* Protect stream while we process it */ assert(s); #if ENABLE_DNS_OVER_TLS if (s->encrypted) { int r; r = dnstls_stream_shutdown...
178,520,464,058,803,300,000,000,000,000,000,000,000
resolved-dns-stream.c
29,951,284,784,693,966,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2022-2526
A use-after-free vulnerability was found in systemd. This issue occurs due to the on_stream_io() function and dns_stream_complete() function in 'resolved-dns-stream.c' not incrementing the reference counting for the DnsStream object. Therefore, other functions and callbacks called can dereference the DNSStream object, ...
https://nvd.nist.gov/vuln/detail/CVE-2022-2526
210,281
systemd
d973d94dec349fb676fdd844f6fe2ada3538f27c
https://github.com/systemd/systemd
https://github.com/systemd/systemd/commit/d973d94dec349fb676fdd844f6fe2ada3538f27c
resolved: pin stream while calling callbacks for it These callbacks might unref the stream, but we still have to access it, let's hence ref it explicitly. Maybe fixes: #10725
1
static int on_stream_io(sd_event_source *es, int fd, uint32_t revents, void *userdata) { DnsStream *s = userdata; int r; assert(s); #if ENABLE_DNS_OVER_TLS if (s->encrypted) { r = dnstls_stream_on_io(s, revents); if (r == DNSTLS_STREAM_CLOSED) ...
229,754,361,267,531,300,000,000,000,000,000,000,000
resolved-dns-stream.c
39,966,380,965,475,856,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2022-2526
A use-after-free vulnerability was found in systemd. This issue occurs due to the on_stream_io() function and dns_stream_complete() function in 'resolved-dns-stream.c' not incrementing the reference counting for the DnsStream object. Therefore, other functions and callbacks called can dereference the DNSStream object, ...
https://nvd.nist.gov/vuln/detail/CVE-2022-2526
432,343
systemd
d973d94dec349fb676fdd844f6fe2ada3538f27c
https://github.com/systemd/systemd
https://github.com/systemd/systemd/commit/d973d94dec349fb676fdd844f6fe2ada3538f27c
resolved: pin stream while calling callbacks for it These callbacks might unref the stream, but we still have to access it, let's hence ref it explicitly. Maybe fixes: #10725
0
static int on_stream_io(sd_event_source *es, int fd, uint32_t revents, void *userdata) { _cleanup_(dns_stream_unrefp) DnsStream *s = dns_stream_ref(userdata); /* Protect stream while we process it */ int r; assert(s); #if ENABLE_DNS_OVER_TLS if (s->encrypted) { r = dnst...
66,056,789,011,367,830,000,000,000,000,000,000,000
resolved-dns-stream.c
29,951,284,784,693,966,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2022-2526
A use-after-free vulnerability was found in systemd. This issue occurs due to the on_stream_io() function and dns_stream_complete() function in 'resolved-dns-stream.c' not incrementing the reference counting for the DnsStream object. Therefore, other functions and callbacks called can dereference the DNSStream object, ...
https://nvd.nist.gov/vuln/detail/CVE-2022-2526
210,297
clamav-devel
fcd8091474d12592d509adcfd0bdd0b0dc8835f5
https://github.com/vrtadmin/clamav-devel
http://git.clamav.net/gitweb?p=clamav-devel.git;a=commitdiff;h=fcd8091474d12592d509adcfd0bdd0b0dc8835f5#patch4
bb#2230-2231
1
static Int32 BZ2_decompress ( DState* s ) { UChar uc; Int32 retVal; Int32 minLen, maxLen; nsis_bzstream* strm = s->strm; /* stuff that needs to be saved/restored */ Int32 i; Int32 j; Int32 t; Int32 alphaSize; Int32 nGroups; Int32 nSelectors; Int32 EOB; Int32...
247,643,639,653,253,030,000,000,000,000,000,000,000
bzlib.c
238,825,142,069,149,800,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2010-0405
Integer overflow in the BZ2_decompress function in decompress.c in bzip2 and libbzip2 before 1.0.6 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted compressed file.
https://nvd.nist.gov/vuln/detail/CVE-2010-0405
432,657
clamav-devel
fcd8091474d12592d509adcfd0bdd0b0dc8835f5
https://github.com/vrtadmin/clamav-devel
http://git.clamav.net/gitweb?p=clamav-devel.git;a=commitdiff;h=fcd8091474d12592d509adcfd0bdd0b0dc8835f5#patch4
bb#2230-2231
0
static Int32 BZ2_decompress ( DState* s ) { UChar uc; Int32 retVal; Int32 minLen, maxLen; nsis_bzstream* strm = s->strm; /* stuff that needs to be saved/restored */ Int32 i; Int32 j; Int32 t; Int32 alphaSize; Int32 nGroups; Int32 nSelectors; Int32 EOB; Int32...
13,569,368,283,627,490,000,000,000,000,000,000,000
bzlib.c
145,549,544,391,853,910,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2010-0405
Integer overflow in the BZ2_decompress function in decompress.c in bzip2 and libbzip2 before 1.0.6 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted compressed file.
https://nvd.nist.gov/vuln/detail/CVE-2010-0405
210,334
rsyslog
80f88242982c9c6ad6ce8628fc5b94ea74051cf4
https://github.com/rsyslog/rsyslog
http://git.adiscon.com/?p=rsyslog.git;a=commitdiff;h=80f88242982c9c6ad6ce8628fc5b94ea74051cf4
bugfix: double-free in omelasticsearch closes: http://bugzilla.adiscon.com/show_bug.cgi?id=461 Thanks to Marius Ionescu for providing a detailled bug report
1
writeDataError(instanceData *pData, cJSON **pReplyRoot, uchar *reqmsg) { char *rendered = NULL; cJSON *errRoot; cJSON *req; cJSON *replyRoot = *pReplyRoot; size_t toWrite; ssize_t wrRet; char errStr[1024]; DEFiRet; if(pData->errorFile == NULL) { DBGPRINTF("omelasticsearch: no local error logger defined - " ...
312,907,250,668,103,950,000,000,000,000,000,000,000
omelasticsearch.c
259,192,936,442,456,940,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2013-4758
Double free vulnerability in the writeDataError function in the ElasticSearch plugin (omelasticsearch) in rsyslog before 7.4.2 and before 7.5.2 devel, when errorfile is set to local logging, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted JSON response.
https://nvd.nist.gov/vuln/detail/CVE-2013-4758
433,054
rsyslog
80f88242982c9c6ad6ce8628fc5b94ea74051cf4
https://github.com/rsyslog/rsyslog
http://git.adiscon.com/?p=rsyslog.git;a=commitdiff;h=80f88242982c9c6ad6ce8628fc5b94ea74051cf4
bugfix: double-free in omelasticsearch closes: http://bugzilla.adiscon.com/show_bug.cgi?id=461 Thanks to Marius Ionescu for providing a detailled bug report
0
writeDataError(instanceData *pData, cJSON **pReplyRoot, uchar *reqmsg) { char *rendered = NULL; cJSON *errRoot; cJSON *req; cJSON *replyRoot = *pReplyRoot; size_t toWrite; ssize_t wrRet; char errStr[1024]; DEFiRet; if(pData->errorFile == NULL) { DBGPRINTF("omelasticsearch: no local error logger defined - " ...
180,324,763,999,765,960,000,000,000,000,000,000,000
omelasticsearch.c
215,397,383,686,055,030,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2013-4758
Double free vulnerability in the writeDataError function in the ElasticSearch plugin (omelasticsearch) in rsyslog before 7.4.2 and before 7.5.2 devel, when errorfile is set to local logging, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted JSON response.
https://nvd.nist.gov/vuln/detail/CVE-2013-4758
210,368
gnutls
bc8102405fda11ea00ca3b42acc4f4bce9d6e97b
http://git.savannah.gnu.org/cgit/gnutls
http://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commitdiff;h=bc8102405fda11ea00ca3b42acc4f4bce9d6e97b
Fix GNUTLS-SA-2008-1 security vulnerabilities. See http://www.gnu.org/software/gnutls/security.html for updates.
1
_gnutls_server_name_recv_params (gnutls_session_t session, const opaque * data, size_t _data_size) { int i; const unsigned char *p; uint16_t len, type; ssize_t data_size = _data_size; int server_names = 0; if (session->security_parameters.entity == GNUTLS_SERVER) { DECR_LENGTH_RET (data_size...
7,103,062,791,706,934,000,000,000,000,000,000,000
ext_server_name.c
199,837,538,380,095,700,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2008-1948
The _gnutls_server_name_recv_params function in lib/ext_server_name.c in libgnutls in gnutls-serv in GnuTLS before 2.2.4 does not properly calculate the number of Server Names in a TLS 1.0 Client Hello message during extension handling, which allows remote attackers to cause a denial of service (crash) or possibly exec...
https://nvd.nist.gov/vuln/detail/CVE-2008-1948
433,461
gnutls
bc8102405fda11ea00ca3b42acc4f4bce9d6e97b
http://git.savannah.gnu.org/cgit/gnutls
http://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commitdiff;h=bc8102405fda11ea00ca3b42acc4f4bce9d6e97b
Fix GNUTLS-SA-2008-1 security vulnerabilities. See http://www.gnu.org/software/gnutls/security.html for updates.
0
_gnutls_server_name_recv_params (gnutls_session_t session, const opaque * data, size_t _data_size) { int i; const unsigned char *p; uint16_t len, type; ssize_t data_size = _data_size; int server_names = 0; if (session->security_parameters.entity == GNUTLS_SERVER) { DECR_LENGTH_RET (data_size...
127,866,324,964,512,300,000,000,000,000,000,000,000
ext_server_name.c
225,121,716,342,688,630,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2008-1948
The _gnutls_server_name_recv_params function in lib/ext_server_name.c in libgnutls in gnutls-serv in GnuTLS before 2.2.4 does not properly calculate the number of Server Names in a TLS 1.0 Client Hello message during extension handling, which allows remote attackers to cause a denial of service (crash) or possibly exec...
https://nvd.nist.gov/vuln/detail/CVE-2008-1948
210,374
libssh-mirror
245ad744b5ab0582fef7cf3905a717b791d7e08b
https://gitlab.com/libssh/libssh-mirror
https://gitlab.com/libssh/libssh-mirror/-/commit/245ad744b5ab0582fef7cf3905a717b791d7e08b
buffer: Add NULL check for 'buffer' argument Signed-off-by: Andreas Schneider <asn@cryptomilk.org> Reviewed-by: Anderson Toshiyuki Sasaki <ansasaki@redhat.com> Reviewed-by: Jakub Jelen <jjelen@redhat.com>
1
int ssh_buffer_add_data(struct ssh_buffer_struct *buffer, const void *data, uint32_t len) { buffer_verify(buffer); if (data == NULL) { return -1; } if (buffer->used + len < len) { return -1; } if (buffer->allocated < (buffer->used + len)) { if (buffer->pos > 0) { ...
224,364,779,780,704,800,000,000,000,000,000,000,000
buffer.c
17,820,760,082,920,600,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2020-16135
libssh 0.9.4 has a NULL pointer dereference in tftpserver.c if ssh_buffer_new returns NULL.
https://nvd.nist.gov/vuln/detail/CVE-2020-16135
433,533
libssh-mirror
245ad744b5ab0582fef7cf3905a717b791d7e08b
https://gitlab.com/libssh/libssh-mirror
https://gitlab.com/libssh/libssh-mirror/-/commit/245ad744b5ab0582fef7cf3905a717b791d7e08b
buffer: Add NULL check for 'buffer' argument Signed-off-by: Andreas Schneider <asn@cryptomilk.org> Reviewed-by: Anderson Toshiyuki Sasaki <ansasaki@redhat.com> Reviewed-by: Jakub Jelen <jjelen@redhat.com>
0
int ssh_buffer_add_data(struct ssh_buffer_struct *buffer, const void *data, uint32_t len) { if (buffer == NULL) { return -1; } buffer_verify(buffer); if (data == NULL) { return -1; } if (buffer->used + len < len) { return -1; } if (buffer->allocated < (buffer-...
315,539,471,049,403,700,000,000,000,000,000,000,000
buffer.c
281,754,696,881,245,530,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2020-16135
libssh 0.9.4 has a NULL pointer dereference in tftpserver.c if ssh_buffer_new returns NULL.
https://nvd.nist.gov/vuln/detail/CVE-2020-16135
210,375
samba
f62683956a3b182f6a61cc7a2b4ada2e74cde243
https://github.com/samba-team/samba
http://git.samba.org/?p=samba.git;a=commitdiff;h=f62683956a3b182f6a61cc7a2b4ada2e74cde243
fail authentication for single group name which cannot be converted to sid furthermore if more than one name is supplied and no sid is converted then also fail. Bug: https://bugzilla.samba.org/show_bug.cgi?id=8598 Signed-off-by: Noel Power <noel.power@suse.com> Reviewed-by: Andreas Schneider <asn@samba.org> Reviewed...
1
static bool winbind_name_list_to_sid_string_list(struct pwb_context *ctx, const char *user, const char *name_list, char *sid_list_buffer, int sid_list_buffer_size) { bool result = false; char *current_name = NULL; const char *search_location; const char *comma; int len; if (sid_list_b...
194,401,397,677,055,900,000,000,000,000,000,000,000
pam_winbind.c
115,365,620,274,780,780,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2012-6150
The winbind_name_list_to_sid_string_list function in nsswitch/pam_winbind.c in Samba through 4.1.2 handles invalid require_membership_of group names by accepting authentication by any user, which allows remote authenticated users to bypass intended access restrictions in opportunistic circumstances by leveraging an adm...
https://nvd.nist.gov/vuln/detail/CVE-2012-6150
433,558
samba
f62683956a3b182f6a61cc7a2b4ada2e74cde243
https://github.com/samba-team/samba
http://git.samba.org/?p=samba.git;a=commitdiff;h=f62683956a3b182f6a61cc7a2b4ada2e74cde243
fail authentication for single group name which cannot be converted to sid furthermore if more than one name is supplied and no sid is converted then also fail. Bug: https://bugzilla.samba.org/show_bug.cgi?id=8598 Signed-off-by: Noel Power <noel.power@suse.com> Reviewed-by: Andreas Schneider <asn@samba.org> Reviewed...
0
static bool winbind_name_list_to_sid_string_list(struct pwb_context *ctx, const char *user, const char *name_list, char *sid_list_buffer, int sid_list_buffer_size) { bool result = false; char *current_name = NULL; const char *search_location; const char *comma; int len; if (sid_list_b...
193,801,961,881,879,450,000,000,000,000,000,000,000
pam_winbind.c
127,006,025,234,399,500,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2012-6150
The winbind_name_list_to_sid_string_list function in nsswitch/pam_winbind.c in Samba through 4.1.2 handles invalid require_membership_of group names by accepting authentication by any user, which allows remote authenticated users to bypass intended access restrictions in opportunistic circumstances by leveraging an adm...
https://nvd.nist.gov/vuln/detail/CVE-2012-6150
210,377
libtpms
c1f7bf55099fcd427715aa65e130475c6e836a6b
https://github.com/stefanberger/libtpms
https://github.com/stefanberger/libtpms/commit/c1f7bf55099fcd427715aa65e130475c6e836a6b
tpm2: Activate SEED_COMPAT_LEVEL_RSA_PRIME_ADJUST_FIX Signed-off-by: Stefan Berger <stefanb@linux.ibm.com>
1
RsaAdjustPrimeCandidate( bigNum prime, SEED_COMPAT_LEVEL seedCompatLevel // IN: compatibility level; libtpms added ) { switch (seedCompatLevel) { case SEED_COMPAT_LEVEL_ORIGINAL: RsaAdjustPrimeCandidate_PreRev155(prime); break; /* case SEED_COMPAT_LEVEL_LAST: */ case S...
145,725,535,557,125,850,000,000,000,000,000,000,000
None
null
[ "CWE-331" ]
CVE-2021-3505
A flaw was found in libtpms in versions before 0.8.0. The TPM 2 implementation returns 2048 bit keys with ~1984 bit strength due to a bug in the TCG specification. The bug is in the key creation algorithm in RsaAdjustPrimeCandidate(), which is called before the prime number check. The highest threat from this vulnerabi...
https://nvd.nist.gov/vuln/detail/CVE-2021-3505
433,561
libtpms
c1f7bf55099fcd427715aa65e130475c6e836a6b
https://github.com/stefanberger/libtpms
https://github.com/stefanberger/libtpms/commit/c1f7bf55099fcd427715aa65e130475c6e836a6b
tpm2: Activate SEED_COMPAT_LEVEL_RSA_PRIME_ADJUST_FIX Signed-off-by: Stefan Berger <stefanb@linux.ibm.com>
0
RsaAdjustPrimeCandidate( bigNum prime, SEED_COMPAT_LEVEL seedCompatLevel // IN: compatibility level; libtpms added ) { switch (seedCompatLevel) { case SEED_COMPAT_LEVEL_ORIGINAL: RsaAdjustPrimeCandidate_PreRev155(prime); break; case SEED_COMPAT_LEVEL_LAST: /* case SEED...
140,183,703,376,076,690,000,000,000,000,000,000,000
None
null
[ "CWE-331" ]
CVE-2021-3505
A flaw was found in libtpms in versions before 0.8.0. The TPM 2 implementation returns 2048 bit keys with ~1984 bit strength due to a bug in the TCG specification. The bug is in the key creation algorithm in RsaAdjustPrimeCandidate(), which is called before the prime number check. The highest threat from this vulnerabi...
https://nvd.nist.gov/vuln/detail/CVE-2021-3505
210,379
libgd
ac16bdf2d41724b5a65255d4c28fb0ec46bc42f5
https://github.com/libgd/libgd
https://github.com/libgd/libgd/commit/ac16bdf2d41724b5a65255d4c28fb0ec46bc42f5
bmp: check return value in gdImageBmpPtr Closes #447.
1
BGD_DECLARE(void *) gdImageBmpPtr(gdImagePtr im, int *size, int compression) { void *rv; gdIOCtx *out = gdNewDynamicCtx(2048, NULL); if (out == NULL) return NULL; gdImageBmpCtx(im, out, compression); rv = gdDPExtractData(out, size); out->gd_free(out); return rv; }
176,054,552,566,368,460,000,000,000,000,000,000,000
gd_bmp.c
159,906,135,342,070,200,000,000,000,000,000,000,000
[ "CWE-415" ]
CVE-2018-1000222
Libgd version 2.2.5 contains a Double Free Vulnerability vulnerability in gdImageBmpPtr Function that can result in Remote Code Execution . This attack appear to be exploitable via Specially Crafted Jpeg Image can trigger double free. This vulnerability appears to have been fixed in after commit ac16bdf2d41724b5a65255d...
https://nvd.nist.gov/vuln/detail/CVE-2018-1000222
433,583
libgd
ac16bdf2d41724b5a65255d4c28fb0ec46bc42f5
https://github.com/libgd/libgd
https://github.com/libgd/libgd/commit/ac16bdf2d41724b5a65255d4c28fb0ec46bc42f5
bmp: check return value in gdImageBmpPtr Closes #447.
0
BGD_DECLARE(void *) gdImageBmpPtr(gdImagePtr im, int *size, int compression) { void *rv; gdIOCtx *out = gdNewDynamicCtx(2048, NULL); if (out == NULL) return NULL; if (!_gdImageBmpCtx(im, out, compression)) rv = gdDPExtractData(out, size); else rv = NULL; out->gd_free(out); return rv; }
231,574,579,295,097,320,000,000,000,000,000,000,000
gd_bmp.c
186,300,283,611,210,000,000,000,000,000,000,000,000
[ "CWE-415" ]
CVE-2018-1000222
Libgd version 2.2.5 contains a Double Free Vulnerability vulnerability in gdImageBmpPtr Function that can result in Remote Code Execution . This attack appear to be exploitable via Specially Crafted Jpeg Image can trigger double free. This vulnerability appears to have been fixed in after commit ac16bdf2d41724b5a65255d...
https://nvd.nist.gov/vuln/detail/CVE-2018-1000222
210,381
linux
23d2b94043ca8835bd1e67749020e839f396a1c2
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv4/igmp.c?h=v5.19&id=23d2b94043ca8835bd1e67749020e839f396a1c2
igmp: Add ip_mc_list lock in ip_check_mc_rcu I got below panic when doing fuzz test: Kernel panic - not syncing: panic_on_warn set ... CPU: 0 PID: 4056 Comm: syz-executor.3 Tainted: G B 5.14.0-rc1-00195-gcff5c4254439-dirty #2 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.12.0-59-gc9...
1
int ip_check_mc_rcu(struct in_device *in_dev, __be32 mc_addr, __be32 src_addr, u8 proto) { struct ip_mc_list *im; struct ip_mc_list __rcu **mc_hash; struct ip_sf_list *psf; int rv = 0; mc_hash = rcu_dereference(in_dev->mc_hash); if (mc_hash) { u32 hash = hash_32((__force u32)mc_addr, MC_HASH_SZ_LOG); for (i...
8,125,078,758,207,636,000,000,000,000,000,000,000
igmp.c
336,096,351,549,836,330,000,000,000,000,000,000,000
[ "CWE-362" ]
CVE-2022-20141
In ip_check_mc_rcu of igmp.c, there is a possible use after free due to improper locking. This could lead to local escalation of privilege when opening and closing inet sockets with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid...
https://nvd.nist.gov/vuln/detail/CVE-2022-20141
433,624
linux
23d2b94043ca8835bd1e67749020e839f396a1c2
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv4/igmp.c?h=v5.19&id=23d2b94043ca8835bd1e67749020e839f396a1c2
igmp: Add ip_mc_list lock in ip_check_mc_rcu I got below panic when doing fuzz test: Kernel panic - not syncing: panic_on_warn set ... CPU: 0 PID: 4056 Comm: syz-executor.3 Tainted: G B 5.14.0-rc1-00195-gcff5c4254439-dirty #2 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.12.0-59-gc9...
0
int ip_check_mc_rcu(struct in_device *in_dev, __be32 mc_addr, __be32 src_addr, u8 proto) { struct ip_mc_list *im; struct ip_mc_list __rcu **mc_hash; struct ip_sf_list *psf; int rv = 0; mc_hash = rcu_dereference(in_dev->mc_hash); if (mc_hash) { u32 hash = hash_32((__force u32)mc_addr, MC_HASH_SZ_LOG); for (i...
175,846,473,989,489,040,000,000,000,000,000,000,000
igmp.c
1,975,544,036,563,075,700,000,000,000,000,000,000
[ "CWE-362" ]
CVE-2022-20141
In ip_check_mc_rcu of igmp.c, there is a possible use after free due to improper locking. This could lead to local escalation of privilege when opening and closing inet sockets with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid...
https://nvd.nist.gov/vuln/detail/CVE-2022-20141
210,388
flac
e1575e4a7c5157cbf4e4a16dbd39b74f7174c7be
https://github.com/xiph/flac
https://github.com/xiph/flac/commit/e1575e4a7c5157cbf4e4a16dbd39b74f7174c7be
libFlac: Exit at EOS in verify mode When verify mode is enabled, once decoder flags end of stream, encode processing is considered complete. CVE-2021-0561 Signed-off-by: Ralph Giles <giles@thaumas.net>
1
FLAC__bool write_bitbuffer_(FLAC__StreamEncoder *encoder, uint32_t samples, FLAC__bool is_last_block) { const FLAC__byte *buffer; size_t bytes; FLAC__ASSERT(FLAC__bitwriter_is_byte_aligned(encoder->private_->frame)); if(!FLAC__bitwriter_get_buffer(encoder->private_->frame, &buffer, &bytes)) { encoder->protected...
38,184,929,412,741,905,000,000,000,000,000,000,000
stream_encoder.c
87,163,747,574,547,130,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2021-0561
In append_to_verify_fifo_interleaved_ of stream_encoder.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID...
https://nvd.nist.gov/vuln/detail/CVE-2021-0561
433,877
flac
e1575e4a7c5157cbf4e4a16dbd39b74f7174c7be
https://github.com/xiph/flac
https://github.com/xiph/flac/commit/e1575e4a7c5157cbf4e4a16dbd39b74f7174c7be
libFlac: Exit at EOS in verify mode When verify mode is enabled, once decoder flags end of stream, encode processing is considered complete. CVE-2021-0561 Signed-off-by: Ralph Giles <giles@thaumas.net>
0
FLAC__bool write_bitbuffer_(FLAC__StreamEncoder *encoder, uint32_t samples, FLAC__bool is_last_block) { const FLAC__byte *buffer; size_t bytes; FLAC__ASSERT(FLAC__bitwriter_is_byte_aligned(encoder->private_->frame)); if(!FLAC__bitwriter_get_buffer(encoder->private_->frame, &buffer, &bytes)) { encoder->protected...
205,405,976,886,747,350,000,000,000,000,000,000,000
stream_encoder.c
323,886,197,295,671,070,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2021-0561
In append_to_verify_fifo_interleaved_ of stream_encoder.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID...
https://nvd.nist.gov/vuln/detail/CVE-2021-0561
210,398
linux
c03b04dcdba1da39903e23cc4d072abf8f68f2dd
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c03b04dcdba1da39903e23cc4d072abf8f68f2dd
crypto: user - fix memory leak in crypto_reportstat In crypto_reportstat, a new skb is created by nlmsg_new(). This skb is leaked if crypto_reportstat_alg() fails. Required release for skb is added. Fixes: cac5818c25d0 ("crypto: user - Implement a generic crypto statistics") Cc: <stable@vger.kernel.org> Signed-off-by...
1
int crypto_reportstat(struct sk_buff *in_skb, struct nlmsghdr *in_nlh, struct nlattr **attrs) { struct net *net = sock_net(in_skb->sk); struct crypto_user_alg *p = nlmsg_data(in_nlh); struct crypto_alg *alg; struct sk_buff *skb; struct crypto_dump_info info; int err; if (!null_terminated(p->cru_name) ||...
274,511,395,655,843,200,000,000,000,000,000,000,000
crypto_user_stat.c
19,953,345,961,113,840,000,000,000,000,000,000,000
[ "CWE-284" ]
CVE-2019-19050
A memory leak in the crypto_reportstat() function in crypto/crypto_user_stat.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering crypto_reportstat_alg() failures, aka CID-c03b04dcdba1.
https://nvd.nist.gov/vuln/detail/CVE-2019-19050
434,123
linux
c03b04dcdba1da39903e23cc4d072abf8f68f2dd
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c03b04dcdba1da39903e23cc4d072abf8f68f2dd
crypto: user - fix memory leak in crypto_reportstat In crypto_reportstat, a new skb is created by nlmsg_new(). This skb is leaked if crypto_reportstat_alg() fails. Required release for skb is added. Fixes: cac5818c25d0 ("crypto: user - Implement a generic crypto statistics") Cc: <stable@vger.kernel.org> Signed-off-by...
0
int crypto_reportstat(struct sk_buff *in_skb, struct nlmsghdr *in_nlh, struct nlattr **attrs) { struct net *net = sock_net(in_skb->sk); struct crypto_user_alg *p = nlmsg_data(in_nlh); struct crypto_alg *alg; struct sk_buff *skb; struct crypto_dump_info info; int err; if (!null_terminated(p->cru_name) ||...
84,998,426,387,554,500,000,000,000,000,000,000,000
crypto_user_stat.c
151,131,700,475,336,330,000,000,000,000,000,000,000
[ "CWE-284" ]
CVE-2019-19050
A memory leak in the crypto_reportstat() function in crypto/crypto_user_stat.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering crypto_reportstat_alg() failures, aka CID-c03b04dcdba1.
https://nvd.nist.gov/vuln/detail/CVE-2019-19050
210,419
qemu
d3b0db6dfea6b3a9ee0d96aceb796bdcafa84314
https://github.com/bonzini/qemu
https://github.com/qemu/qemu/commit/d3b0db6dfea6b3a9ee0d96aceb796bdcafa84314
vnc: Set default kbd delay to 10ms The current VNC default keyboard delay is 1ms. With that we're constantly typing faster than the guest receives keyboard events from an XHCI attached USB HID device. The default keyboard delay time in the input layer however is 10ms. I don't know how that number came to be, but empi...
1
void vnc_display_open(const char *id, Error **errp) { VncDisplay *vd = vnc_display_find(id); QemuOpts *opts = qemu_opts_find(&qemu_vnc_opts, id); SocketAddress **saddr = NULL, **wsaddr = NULL; size_t nsaddr, nwsaddr; const char *share, *device_id; QemuConsole *con; bool password = false; ...
2,365,794,417,096,471,200,000,000,000,000,000,000
vnc.c
34,646,637,285,590,230,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2017-8379
Memory leak in the keyboard input event handlers support in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption) by rapidly generating large keyboard events.
https://nvd.nist.gov/vuln/detail/CVE-2017-8379
434,879
qemu
d3b0db6dfea6b3a9ee0d96aceb796bdcafa84314
https://github.com/bonzini/qemu
https://github.com/qemu/qemu/commit/d3b0db6dfea6b3a9ee0d96aceb796bdcafa84314
vnc: Set default kbd delay to 10ms The current VNC default keyboard delay is 1ms. With that we're constantly typing faster than the guest receives keyboard events from an XHCI attached USB HID device. The default keyboard delay time in the input layer however is 10ms. I don't know how that number came to be, but empi...
0
void vnc_display_open(const char *id, Error **errp) { VncDisplay *vd = vnc_display_find(id); QemuOpts *opts = qemu_opts_find(&qemu_vnc_opts, id); SocketAddress **saddr = NULL, **wsaddr = NULL; size_t nsaddr, nwsaddr; const char *share, *device_id; QemuConsole *con; bool password = false; ...
172,865,088,081,872,760,000,000,000,000,000,000,000
vnc.c
174,019,351,814,316,620,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2017-8379
Memory leak in the keyboard input event handlers support in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption) by rapidly generating large keyboard events.
https://nvd.nist.gov/vuln/detail/CVE-2017-8379
210,445
kvm
e42d9b8141d1f54ff72ad3850bb110c95a5f3b88
http://git.kernel.org/?p=linux/kernel/git/avi/kvm
http://git.kernel.org/?p=linux/kernel/git/avi/kvm.git;a=commitdiff;h=e42d9b8141d1f54ff72ad3850bb110c95a5f3b88
KVM: x86 emulator: limit instructions to 15 bytes While we are never normally passed an instruction that exceeds 15 bytes, smp games can cause us to attempt to interpret one, which will cause large latencies in non-preempt hosts. Cc: stable@kernel.org Signed-off-by: Avi Kivity <avi@redhat.com>
1
static int do_insn_fetch(struct x86_emulate_ctxt *ctxt, struct x86_emulate_ops *ops, unsigned long eip, void *dest, unsigned size) { int rc = 0; eip += ctxt->cs_base; while (size--) { rc = do_fetch_insn_byte(ctxt, ops, eip++, dest++); if (rc) return rc; } return 0; }
333,135,580,300,206,920,000,000,000,000,000,000,000
emulate.c
227,848,514,845,098,450,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2009-4031
The do_insn_fetch function in arch/x86/kvm/emulate.c in the x86 emulator in the KVM subsystem in the Linux kernel before 2.6.32-rc8-next-20091125 tries to interpret instructions that contain too many bytes to be valid, which allows guest OS users to cause a denial of service (increased scheduling latency) on the host O...
https://nvd.nist.gov/vuln/detail/CVE-2009-4031
435,250
kvm
e42d9b8141d1f54ff72ad3850bb110c95a5f3b88
http://git.kernel.org/?p=linux/kernel/git/avi/kvm
http://git.kernel.org/?p=linux/kernel/git/avi/kvm.git;a=commitdiff;h=e42d9b8141d1f54ff72ad3850bb110c95a5f3b88
KVM: x86 emulator: limit instructions to 15 bytes While we are never normally passed an instruction that exceeds 15 bytes, smp games can cause us to attempt to interpret one, which will cause large latencies in non-preempt hosts. Cc: stable@kernel.org Signed-off-by: Avi Kivity <avi@redhat.com>
0
static int do_insn_fetch(struct x86_emulate_ctxt *ctxt, struct x86_emulate_ops *ops, unsigned long eip, void *dest, unsigned size) { int rc = 0; /* x86 instructions are limited to 15 bytes. */ if (eip + size - ctxt->decode.eip_orig > 15) return X86EMUL_UNHANDLEABLE; eip += ctxt->cs_base; while (size--) ...
148,760,003,775,527,480,000,000,000,000,000,000,000
emulate.c
251,720,107,621,944,100,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2009-4031
The do_insn_fetch function in arch/x86/kvm/emulate.c in the x86 emulator in the KVM subsystem in the Linux kernel before 2.6.32-rc8-next-20091125 tries to interpret instructions that contain too many bytes to be valid, which allows guest OS users to cause a denial of service (increased scheduling latency) on the host O...
https://nvd.nist.gov/vuln/detail/CVE-2009-4031
210,446
src
9dcfda045474d8903224d175907bfc29761dcb45
https://github.com/openbsd/src
https://github.com/openbsd/src/commit/9dcfda045474d8903224d175907bfc29761dcb45
Fix a security vulnerability discovered by Qualys which can lead to a privileges escalation on mbox deliveries and unprivileged code execution on lmtp deliveries, due to a logic issue causing a sanity check to be missed. ok eric@, millert@
1
smtp_mailaddr(struct mailaddr *maddr, char *line, int mailfrom, char **args, const char *domain) { char *p, *e; if (line == NULL) return (0); if (*line != '<') return (0); e = strchr(line, '>'); if (e == NULL) return (0); *e++ = '\0'; while (*e == ' ') e++; *args = e; if (!text_to_mailaddr(ma...
141,304,062,574,206,820,000,000,000,000,000,000,000
smtp_session.c
153,033,644,424,510,980,000,000,000,000,000,000,000
[ "CWE-252" ]
CVE-2020-7247
smtp_mailaddr in smtp_session.c in OpenSMTPD 6.6, as used in OpenBSD 6.6 and other products, allows remote attackers to execute arbitrary commands as root via a crafted SMTP session, as demonstrated by shell metacharacters in a MAIL FROM field. This affects the "uncommented" default configuration. The issue exists beca...
https://nvd.nist.gov/vuln/detail/CVE-2020-7247
435,287
src
9dcfda045474d8903224d175907bfc29761dcb45
https://github.com/openbsd/src
https://github.com/openbsd/src/commit/9dcfda045474d8903224d175907bfc29761dcb45
Fix a security vulnerability discovered by Qualys which can lead to a privileges escalation on mbox deliveries and unprivileged code execution on lmtp deliveries, due to a logic issue causing a sanity check to be missed. ok eric@, millert@
0
smtp_mailaddr(struct mailaddr *maddr, char *line, int mailfrom, char **args, const char *domain) { char *p, *e; if (line == NULL) return (0); if (*line != '<') return (0); e = strchr(line, '>'); if (e == NULL) return (0); *e++ = '\0'; while (*e == ' ') e++; *args = e; if (!text_to_mailaddr(ma...
151,455,707,077,943,840,000,000,000,000,000,000,000
smtp_session.c
105,590,835,558,967,300,000,000,000,000,000,000,000
[ "CWE-252" ]
CVE-2020-7247
smtp_mailaddr in smtp_session.c in OpenSMTPD 6.6, as used in OpenBSD 6.6 and other products, allows remote attackers to execute arbitrary commands as root via a crafted SMTP session, as demonstrated by shell metacharacters in a MAIL FROM field. This affects the "uncommented" default configuration. The issue exists beca...
https://nvd.nist.gov/vuln/detail/CVE-2020-7247
210,447
poppler
0868c499a9f5f37f8df5c9fef03c37496b40fc8a
https://github.com/freedesktop/poppler
https://gitlab.freedesktop.org/poppler/poppler/commit/0868c499a9f5f37f8df5c9fef03c37496b40fc8a
Parser::makeStream: Fix potential integer overflow
1
Stream *Parser::makeStream(Object &&dict, Guchar *fileKey, CryptAlgorithm encAlgorithm, int keyLength, int objNum, int objGen, int recursion, GBool strict) { BaseStream *baseStr; Stream *str; Goffset length; Goffset pos, endPos; // get stream start position lexer->ski...
59,012,839,208,300,890,000,000,000,000,000,000,000
Parser.cc
17,534,089,413,943,530,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2018-21009
Poppler before 0.66.0 has an integer overflow in Parser::makeStream in Parser.cc.
https://nvd.nist.gov/vuln/detail/CVE-2018-21009
435,357
poppler
0868c499a9f5f37f8df5c9fef03c37496b40fc8a
https://github.com/freedesktop/poppler
https://gitlab.freedesktop.org/poppler/poppler/commit/0868c499a9f5f37f8df5c9fef03c37496b40fc8a
Parser::makeStream: Fix potential integer overflow
0
Stream *Parser::makeStream(Object &&dict, Guchar *fileKey, CryptAlgorithm encAlgorithm, int keyLength, int objNum, int objGen, int recursion, GBool strict) { BaseStream *baseStr; Stream *str; Goffset length; Goffset pos, endPos; // get stream start position lexer->ski...
204,168,588,058,748,100,000,000,000,000,000,000,000
Parser.cc
118,848,543,205,689,940,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2018-21009
Poppler before 0.66.0 has an integer overflow in Parser::makeStream in Parser.cc.
https://nvd.nist.gov/vuln/detail/CVE-2018-21009
210,449
ImageMagick
a9d563d3d73874312080d30dc4ba07cecad56192
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/a9d563d3d73874312080d30dc4ba07cecad56192
https://github.com/ImageMagick/ImageMagick/issues/1752
1
static MagickBooleanType WriteOnePNGImage(MngInfo *mng_info, const ImageInfo *IMimage_info,Image *IMimage,ExceptionInfo *exception) { char im_vers[32], libpng_runv[32], libpng_vers[32], zlib_runv[32], zlib_vers[32]; Image *image; ImageInfo *image_info; char *name, s[2]; ...
59,678,560,232,203,390,000,000,000,000,000,000,000
png.c
115,612,592,373,662,040,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2020-27752
A flaw was found in ImageMagick in MagickCore/quantum-private.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger a heap buffer overflow. This would most likely lead to an impact to application availability, but could potentially lead to an impact to data integrity as well. This fla...
https://nvd.nist.gov/vuln/detail/CVE-2020-27752
435,362
ImageMagick
a9d563d3d73874312080d30dc4ba07cecad56192
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/a9d563d3d73874312080d30dc4ba07cecad56192
https://github.com/ImageMagick/ImageMagick/issues/1752
0
static MagickBooleanType WriteOnePNGImage(MngInfo *mng_info, const ImageInfo *IMimage_info,Image *IMimage,ExceptionInfo *exception) { char im_vers[32], libpng_runv[32], libpng_vers[32], zlib_runv[32], zlib_vers[32]; Image *image; ImageInfo *image_info; char *name, s[2]; ...
331,885,673,858,119,470,000,000,000,000,000,000,000
png.c
134,642,615,377,817,760,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2020-27752
A flaw was found in ImageMagick in MagickCore/quantum-private.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger a heap buffer overflow. This would most likely lead to an impact to application availability, but could potentially lead to an impact to data integrity as well. This fla...
https://nvd.nist.gov/vuln/detail/CVE-2020-27752
210,465
qpdf
b4d6cf6836ce025ba1811b7bbec52680c7204223
https://github.com/qpdf/qpdf
https://github.com/qpdf/qpdf/commit/b4d6cf6836ce025ba1811b7bbec52680c7204223
Limit depth of nesting in direct objects (fixes #202) This fixes CVE-2018-9918.
1
QPDFObjectHandle::parseInternal(PointerHolder<InputSource> input, std::string const& object_description, QPDFTokenizer& tokenizer, bool& empty, StringDecrypter* decrypter, QPDF* context, bool ...
311,880,694,560,904,500,000,000,000,000,000,000,000
QPDFObjectHandle.cc
188,563,030,210,717,900,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2018-9918
libqpdf.a in QPDF through 8.0.2 mishandles certain "expected dictionary key but found non-name object" cases, allowing remote attackers to cause a denial of service (stack exhaustion), related to the QPDFObjectHandle and QPDF_Dictionary classes, because nesting in direct objects is not restricted.
https://nvd.nist.gov/vuln/detail/CVE-2018-9918
435,578
qpdf
b4d6cf6836ce025ba1811b7bbec52680c7204223
https://github.com/qpdf/qpdf
https://github.com/qpdf/qpdf/commit/b4d6cf6836ce025ba1811b7bbec52680c7204223
Limit depth of nesting in direct objects (fixes #202) This fixes CVE-2018-9918.
0
QPDFObjectHandle::parseInternal(PointerHolder<InputSource> input, std::string const& object_description, QPDFTokenizer& tokenizer, bool& empty, StringDecrypter* decrypter, QPDF* context, bool ...
153,639,417,923,925,860,000,000,000,000,000,000,000
QPDFObjectHandle.cc
102,088,937,051,815,770,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2018-9918
libqpdf.a in QPDF through 8.0.2 mishandles certain "expected dictionary key but found non-name object" cases, allowing remote attackers to cause a denial of service (stack exhaustion), related to the QPDFObjectHandle and QPDF_Dictionary classes, because nesting in direct objects is not restricted.
https://nvd.nist.gov/vuln/detail/CVE-2018-9918
210,466
jasper
f94e7499a8b1471a4905c4f9c9e12e60fe88264b
https://github.com/mdadams/jasper
https://github.com/jasper-software/jasper/commit/f94e7499a8b1471a4905c4f9c9e12e60fe88264b
Fixes #269. Added a check for an invalid component reference in the JP2 decoder. Added a related test case for the JP2 codec.
1
jas_image_t *jp2_decode(jas_stream_t *in, const char *optstr) { jp2_box_t *box; int found; jas_image_t *image; jp2_dec_t *dec; bool samedtype; int dtype; unsigned int i; jp2_cmap_t *cmapd; jp2_pclr_t *pclrd; jp2_cdef_t *cdefd; unsigned int channo; int newcmptno; int_fast32_t *lutents; #if 0 jp2_cdefchan_t...
166,016,342,481,735,730,000,000,000,000,000,000,000
jp2_dec.c
195,046,608,507,291,000,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2021-3443
A NULL pointer dereference flaw was found in the way Jasper versions before 2.0.27 handled component references in the JP2 image format decoder. A specially crafted JP2 image file could cause an application using the Jasper library to crash when opened.
https://nvd.nist.gov/vuln/detail/CVE-2021-3443
435,581
jasper
f94e7499a8b1471a4905c4f9c9e12e60fe88264b
https://github.com/mdadams/jasper
https://github.com/jasper-software/jasper/commit/f94e7499a8b1471a4905c4f9c9e12e60fe88264b
Fixes #269. Added a check for an invalid component reference in the JP2 decoder. Added a related test case for the JP2 codec.
0
jas_image_t *jp2_decode(jas_stream_t *in, const char *optstr) { jp2_box_t *box; int found; jas_image_t *image; jp2_dec_t *dec; bool samedtype; int dtype; unsigned int i; jp2_cmap_t *cmapd; jp2_pclr_t *pclrd; jp2_cdef_t *cdefd; unsigned int channo; int newcmptno; int_fast32_t *lutents; #if 0 jp2_cdefchan_t...
281,877,865,075,484,060,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2021-3443
A NULL pointer dereference flaw was found in the way Jasper versions before 2.0.27 handled component references in the JP2 image format decoder. A specially crafted JP2 image file could cause an application using the Jasper library to crash when opened.
https://nvd.nist.gov/vuln/detail/CVE-2021-3443
210,469
rsyslog
1ca6cc236d1dabf1633238b873fb1c057e52f95e
https://github.com/rsyslog/rsyslog
http://git.adiscon.com/?p=rsyslog.git;a=commitdiff;h=1ca6cc236d1dabf1633238b873fb1c057e52f95e
bugfix: off-by-one(two) bug in legacy syslog parser
1
int parseLegacySyslogMsg(msg_t *pMsg, int flags) { uchar *p2parse; int lenMsg; int i; /* general index for parsing */ uchar bufParseTAG[CONF_TAG_MAXSIZE]; uchar bufParseHOSTNAME[CONF_HOSTNAME_MAXSIZE]; BEGINfunc assert(pMsg != NULL); assert(pMsg->pszRawMsg != NULL); lenMsg = pMsg->iLenRawMsg - pMsg->offAfterP...
231,219,526,524,723,720,000,000,000,000,000,000,000
syslogd.c
279,411,370,050,215,070,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2011-3200
Stack-based buffer overflow in the parseLegacySyslogMsg function in tools/syslogd.c in rsyslogd in rsyslog 4.6.x before 4.6.8 and 5.2.0 through 5.8.4 might allow remote attackers to cause a denial of service (application exit) via a long TAG in a legacy syslog message.
https://nvd.nist.gov/vuln/detail/CVE-2011-3200
435,667
rsyslog
1ca6cc236d1dabf1633238b873fb1c057e52f95e
https://github.com/rsyslog/rsyslog
http://git.adiscon.com/?p=rsyslog.git;a=commitdiff;h=1ca6cc236d1dabf1633238b873fb1c057e52f95e
bugfix: off-by-one(two) bug in legacy syslog parser
0
int parseLegacySyslogMsg(msg_t *pMsg, int flags) { uchar *p2parse; int lenMsg; int i; /* general index for parsing */ uchar bufParseTAG[CONF_TAG_MAXSIZE]; uchar bufParseHOSTNAME[CONF_HOSTNAME_MAXSIZE]; BEGINfunc assert(pMsg != NULL); assert(pMsg->pszRawMsg != NULL); lenMsg = pMsg->iLenRawMsg - pMsg->offAfterP...
199,423,884,654,316,000,000,000,000,000,000,000,000
syslogd.c
286,093,375,285,138,000,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2011-3200
Stack-based buffer overflow in the parseLegacySyslogMsg function in tools/syslogd.c in rsyslogd in rsyslog 4.6.x before 4.6.8 and 5.2.0 through 5.8.4 might allow remote attackers to cause a denial of service (application exit) via a long TAG in a legacy syslog message.
https://nvd.nist.gov/vuln/detail/CVE-2011-3200
210,478
oniguruma
cbe9f8bd9cfc6c3c87a60fbae58fa1a85db59df0
https://github.com/kkos/oniguruma
https://github.com/kkos/oniguruma/commit/cbe9f8bd9cfc6c3c87a60fbae58fa1a85db59df0
#207: Out-of-bounds write
1
concat_opt_exact_str(OptStr* to, UChar* s, UChar* end, OnigEncoding enc) { int i, j, len; UChar *p; for (i = to->len, p = s; p < end && i < OPT_EXACT_MAXLEN; ) { len = enclen(enc, p); if (i + len > OPT_EXACT_MAXLEN) break; for (j = 0; j < len && p < end; j++) to->s[i++] = *p++; } to->len =...
90,044,858,076,413,870,000,000,000,000,000,000,000
regcomp.c
336,112,231,426,326,300,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2020-26159
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Further investigation showed that it was not a security issue. Notes: none
https://nvd.nist.gov/vuln/detail/CVE-2020-26159
435,930
oniguruma
cbe9f8bd9cfc6c3c87a60fbae58fa1a85db59df0
https://github.com/kkos/oniguruma
https://github.com/kkos/oniguruma/commit/cbe9f8bd9cfc6c3c87a60fbae58fa1a85db59df0
#207: Out-of-bounds write
0
concat_opt_exact_str(OptStr* to, UChar* s, UChar* end, OnigEncoding enc) { int i, j, len; UChar *p; for (i = to->len, p = s; p < end && i < OPT_EXACT_MAXLEN; ) { len = enclen(enc, p); if (i + len >= OPT_EXACT_MAXLEN) break; for (j = 0; j < len && p < end; j++) to->s[i++] = *p++; } to->len ...
114,862,701,799,109,220,000,000,000,000,000,000,000
regcomp.c
37,703,116,989,668,010,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2020-26159
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Further investigation showed that it was not a security issue. Notes: none
https://nvd.nist.gov/vuln/detail/CVE-2020-26159
210,485
ceph
2927fd91d41e505237cc73f9700e5c6a63e5cb4f
https://github.com/ceph/ceph
https://github.com/ceph/ceph/commit/2927fd91d41e505237cc73f9700e5c6a63e5cb4f
mon/MonClient: bring back CEPHX_V2 authorizer challenges Commit c58c5754dfd2 ("msg/async/ProtocolV1: use AuthServer and AuthClient") introduced a backwards compatibility issue into msgr1. To fix it, commit 321548010578 ("mon/MonClient: skip CEPHX_V2 challenge if client doesn't support it") set out to skip authorizer c...
1
int MonClient::handle_auth_request( Connection *con, AuthConnectionMeta *auth_meta, bool more, uint32_t auth_method, const bufferlist& payload, bufferlist *reply) { auth_meta->auth_mode = payload[0]; if (auth_meta->auth_mode < AUTH_MODE_AUTHORIZER || auth_meta->auth_mode > AUTH_MODE_AUTHORIZER_MAX...
229,776,914,550,876,840,000,000,000,000,000,000,000
MonClient.cc
16,293,631,706,046,081,000,000,000,000,000,000,000
[ "CWE-294" ]
CVE-2020-25660
A flaw was found in the Cephx authentication protocol in versions before 15.2.6 and before 14.2.14, where it does not verify Ceph clients correctly and is then vulnerable to replay attacks in Nautilus. This flaw allows an attacker with access to the Ceph cluster network to authenticate with the Ceph service via a packe...
https://nvd.nist.gov/vuln/detail/CVE-2020-25660
436,191
ceph
2927fd91d41e505237cc73f9700e5c6a63e5cb4f
https://github.com/ceph/ceph
https://github.com/ceph/ceph/commit/2927fd91d41e505237cc73f9700e5c6a63e5cb4f
mon/MonClient: bring back CEPHX_V2 authorizer challenges Commit c58c5754dfd2 ("msg/async/ProtocolV1: use AuthServer and AuthClient") introduced a backwards compatibility issue into msgr1. To fix it, commit 321548010578 ("mon/MonClient: skip CEPHX_V2 challenge if client doesn't support it") set out to skip authorizer c...
0
int MonClient::handle_auth_request( Connection *con, AuthConnectionMeta *auth_meta, bool more, uint32_t auth_method, const bufferlist& payload, bufferlist *reply) { auth_meta->auth_mode = payload[0]; if (auth_meta->auth_mode < AUTH_MODE_AUTHORIZER || auth_meta->auth_mode > AUTH_MODE_AUTHORIZER_MAX...
74,886,319,007,070,260,000,000,000,000,000,000,000
MonClient.cc
317,482,202,946,940,500,000,000,000,000,000,000,000
[ "CWE-294" ]
CVE-2020-25660
A flaw was found in the Cephx authentication protocol in versions before 15.2.6 and before 14.2.14, where it does not verify Ceph clients correctly and is then vulnerable to replay attacks in Nautilus. This flaw allows an attacker with access to the Ceph cluster network to authenticate with the Ceph service via a packe...
https://nvd.nist.gov/vuln/detail/CVE-2020-25660
210,503
WavPack
25b4a2725d8568212e7cf89ca05ca29d128af7ac
https://github.com/dbry/WavPack
https://github.com/dbry/WavPack/commit/25b4a2725d8568212e7cf89ca05ca29d128af7ac
issue #121: NULL pointer dereference in wvunpack.c * check for NULL pointer before dereferencing in wvunpack.c * sanitize custom extensions to be alphanumeric only
1
int main(int argc, char **argv) #endif { #ifdef __EMX__ /* OS/2 */ _wildcard (&argc, &argv); #endif int verify_only = 0, error_count = 0, add_extension = 0, output_spec = 0, c_count = 0, x_count = 0; char outpath, **matches = NULL, *outfilename = NULL, **argv_fn = NULL, selfname [PATH_MAX]; int use_stdi...
94,524,686,230,113,410,000,000,000,000,000,000,000
wvunpack.c
324,509,323,720,796,100,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2022-2476
A null pointer dereference bug was found in wavpack-5.4.0 The results from the ASAN log: AddressSanitizer:DEADLYSIGNAL ===================================================================84257==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x561b47a970c6 bp 0x7fff13952fb0 sp 0x7fff1394fca0 T0) ==84...
https://nvd.nist.gov/vuln/detail/CVE-2022-2476
436,626
WavPack
25b4a2725d8568212e7cf89ca05ca29d128af7ac
https://github.com/dbry/WavPack
https://github.com/dbry/WavPack/commit/25b4a2725d8568212e7cf89ca05ca29d128af7ac
issue #121: NULL pointer dereference in wvunpack.c * check for NULL pointer before dereferencing in wvunpack.c * sanitize custom extensions to be alphanumeric only
0
int main(int argc, char **argv) #endif { #ifdef __EMX__ /* OS/2 */ _wildcard (&argc, &argv); #endif int verify_only = 0, error_count = 0, add_extension = 0, output_spec = 0, c_count = 0, x_count = 0; char outpath, **matches = NULL, *outfilename = NULL, **argv_fn = NULL, selfname [PATH_MAX]; int use_stdi...
199,682,968,919,041,650,000,000,000,000,000,000,000
wvunpack.c
289,620,808,346,216,300,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2022-2476
A null pointer dereference bug was found in wavpack-5.4.0 The results from the ASAN log: AddressSanitizer:DEADLYSIGNAL ===================================================================84257==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x561b47a970c6 bp 0x7fff13952fb0 sp 0x7fff1394fca0 T0) ==84...
https://nvd.nist.gov/vuln/detail/CVE-2022-2476
210,504
gimp
87ba505fff85989af795f4ab6a047713f4d9381d
https://github.com/GNOME/gimp
https://git.gnome.org/browse/gimp/commit/?id=87ba505fff85989af795f4ab6a047713f4d9381d
Bug 790853 - (CVE-2017-17787) heap overread in psp importer. As any external data, we have to check that strings being read at fixed length are properly nul-terminated. (cherry picked from commit eb2980683e6472aff35a3117587c4f814515c74d)
1
read_creator_block (FILE *f, gint image_ID, guint total_len, PSPimage *ia) { long data_start; guchar buf[4]; guint16 keyword; guint32 length; gchar *string; gchar *title = NULL, *artist = NULL,...
156,726,249,229,910,040,000,000,000,000,000,000,000
file-psp.c
320,030,247,955,093,700,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-17787
In GIMP 2.8.22, there is a heap-based buffer over-read in read_creator_block in plug-ins/common/file-psp.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-17787
436,639
gimp
87ba505fff85989af795f4ab6a047713f4d9381d
https://github.com/GNOME/gimp
https://git.gnome.org/browse/gimp/commit/?id=87ba505fff85989af795f4ab6a047713f4d9381d
Bug 790853 - (CVE-2017-17787) heap overread in psp importer. As any external data, we have to check that strings being read at fixed length are properly nul-terminated. (cherry picked from commit eb2980683e6472aff35a3117587c4f814515c74d)
0
read_creator_block (FILE *f, gint image_ID, guint total_len, PSPimage *ia) { long data_start; guchar buf[4]; guint16 keyword; guint32 length; gchar *string; gchar *title = NULL, *artist = NULL,...
16,804,399,721,761,698,000,000,000,000,000,000,000
file-psp.c
146,718,606,004,038,300,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-17787
In GIMP 2.8.22, there is a heap-based buffer over-read in read_creator_block in plug-ins/common/file-psp.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-17787
210,512
openj9
0971f22d88f42cf7332364ad7430e9bd8681c970
https://github.com/eclipse/openj9
https://github.com/eclipse/openj9/commit/0971f22d88f42cf7332364ad7430e9bd8681c970
Clean up jio_snprintf and jio_vfprintf Fixes https://bugs.eclipse.org/bugs/show_bug.cgi?id=543659 Signed-off-by: Peter Bain <peter_bain@ca.ibm.com>
1
jio_snprintf(char * str, int n, const char * format, ...) { va_list args; int result; Trc_SC_snprintf_Entry(); va_start(args, format); #if defined(WIN32) && !defined(WIN32_IBMC) result = _vsnprintf( str, n, format, args ); #else result = vsprintf( str, format, args ); #endif va_end(args); Trc_SC_snprintf_Exi...
2,142,351,738,345,462,800,000,000,000,000,000,000
jvm.c
106,120,005,172,370,500,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-12547
In Eclipse OpenJ9, prior to the 0.12.0 release, the jio_snprintf() and jio_vsnprintf() native methods ignored the length parameter. This affects existing APIs that called the functions to exceed the allocated buffer. This functions were not directly callable by non-native user code.
https://nvd.nist.gov/vuln/detail/CVE-2018-12547
436,679
openj9
0971f22d88f42cf7332364ad7430e9bd8681c970
https://github.com/eclipse/openj9
https://github.com/eclipse/openj9/commit/0971f22d88f42cf7332364ad7430e9bd8681c970
Clean up jio_snprintf and jio_vfprintf Fixes https://bugs.eclipse.org/bugs/show_bug.cgi?id=543659 Signed-off-by: Peter Bain <peter_bain@ca.ibm.com>
0
jio_snprintf(char * str, int n, const char * format, ...) { va_list args; int result; Trc_SC_snprintf_Entry(); va_start(args, format); result = vsnprintf( str, n, format, args ); va_end(args); Trc_SC_snprintf_Exit(result); return result; }
49,247,309,423,598,390,000,000,000,000,000,000,000
jvm.c
319,787,002,951,176,100,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-12547
In Eclipse OpenJ9, prior to the 0.12.0 release, the jio_snprintf() and jio_vsnprintf() native methods ignored the length parameter. This affects existing APIs that called the functions to exceed the allocated buffer. This functions were not directly callable by non-native user code.
https://nvd.nist.gov/vuln/detail/CVE-2018-12547
210,513
openj9
0971f22d88f42cf7332364ad7430e9bd8681c970
https://github.com/eclipse/openj9
https://github.com/eclipse/openj9/commit/0971f22d88f42cf7332364ad7430e9bd8681c970
Clean up jio_snprintf and jio_vfprintf Fixes https://bugs.eclipse.org/bugs/show_bug.cgi?id=543659 Signed-off-by: Peter Bain <peter_bain@ca.ibm.com>
1
jio_vsnprintf(char * str, int n, const char * format, va_list args) { int result; Trc_SC_vsnprintf_Entry(str, n, format); #if defined(WIN32) && !defined(WIN32_IBMC) result = _vsnprintf( str, n, format, args ); #else result = vsprintf( str, format, args ); #endif Trc_SC_vsnprintf_Exit(result); return result; ...
262,540,366,311,018,440,000,000,000,000,000,000,000
jvm.c
106,120,005,172,370,500,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-12547
In Eclipse OpenJ9, prior to the 0.12.0 release, the jio_snprintf() and jio_vsnprintf() native methods ignored the length parameter. This affects existing APIs that called the functions to exceed the allocated buffer. This functions were not directly callable by non-native user code.
https://nvd.nist.gov/vuln/detail/CVE-2018-12547
436,693
openj9
0971f22d88f42cf7332364ad7430e9bd8681c970
https://github.com/eclipse/openj9
https://github.com/eclipse/openj9/commit/0971f22d88f42cf7332364ad7430e9bd8681c970
Clean up jio_snprintf and jio_vfprintf Fixes https://bugs.eclipse.org/bugs/show_bug.cgi?id=543659 Signed-off-by: Peter Bain <peter_bain@ca.ibm.com>
0
jio_vsnprintf(char * str, int n, const char * format, va_list args) { int result; Trc_SC_vsnprintf_Entry(str, n, format); result = vsnprintf( str, n, format, args ); Trc_SC_vsnprintf_Exit(result); return result; }
64,072,443,466,751,425,000,000,000,000,000,000,000
jvm.c
319,787,002,951,176,100,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-12547
In Eclipse OpenJ9, prior to the 0.12.0 release, the jio_snprintf() and jio_vsnprintf() native methods ignored the length parameter. This affects existing APIs that called the functions to exceed the allocated buffer. This functions were not directly callable by non-native user code.
https://nvd.nist.gov/vuln/detail/CVE-2018-12547
210,514
php-src
e3133e4db70476fb7adfdedb738483e2255ce0e1
https://github.com/php/php-src
http://git.php.net/?p=php-src.git;a=commit;h=e3133e4db70476fb7adfdedb738483e2255ce0e1
Fix bug #77630 - safer rename() procedure In order to rename safer, we do the following: - set umask to 077 (unfortunately, not TS, so excluding ZTS) - chown() first, to set proper group before allowing group access - chmod() after, even if chown() fails
1
static int php_plain_files_rename(php_stream_wrapper *wrapper, const char *url_from, const char *url_to, int options, php_stream_context *context) { int ret; if (!url_from || !url_to) { return 0; } #ifdef PHP_WIN32 if (!php_win32_check_trailing_space(url_from, (int)strlen(url_from))) { php_win32_docref2_from_...
255,636,755,210,108,350,000,000,000,000,000,000,000
plain_wrapper.c
303,598,361,813,887,120,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2019-9637
An issue was discovered in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. Due to the way rename() across filesystems is implemented, it is possible that file being renamed is briefly available with wrong permissions while the rename is ongoing, thus enabling unauthorized users to access the data.
https://nvd.nist.gov/vuln/detail/CVE-2019-9637
436,814
php-src
e3133e4db70476fb7adfdedb738483e2255ce0e1
https://github.com/php/php-src
http://git.php.net/?p=php-src.git;a=commit;h=e3133e4db70476fb7adfdedb738483e2255ce0e1
Fix bug #77630 - safer rename() procedure In order to rename safer, we do the following: - set umask to 077 (unfortunately, not TS, so excluding ZTS) - chown() first, to set proper group before allowing group access - chmod() after, even if chown() fails
0
static int php_plain_files_rename(php_stream_wrapper *wrapper, const char *url_from, const char *url_to, int options, php_stream_context *context) { int ret; if (!url_from || !url_to) { return 0; } #ifdef PHP_WIN32 if (!php_win32_check_trailing_space(url_from, (int)strlen(url_from))) { php_win32_docref2_from_...
21,128,849,710,332,652,000,000,000,000,000,000,000
plain_wrapper.c
45,061,774,360,165,170,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2019-9637
An issue was discovered in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. Due to the way rename() across filesystems is implemented, it is possible that file being renamed is briefly available with wrong permissions while the rename is ongoing, thus enabling unauthorized users to access the data.
https://nvd.nist.gov/vuln/detail/CVE-2019-9637
210,517
linux
78beef629fd95be4ed853b2d37b832f766bd96ca
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/78beef629fd95be4ed853b2d37b832f766bd96ca
nfp: abm: fix memory leak in nfp_abm_u32_knode_replace In nfp_abm_u32_knode_replace if the allocation for match fails it should go to the error handling instead of returning. Updated other gotos to have correct errno returned, too. Signed-off-by: Navid Emamdoost <navid.emamdoost@gmail.com> Signed-off-by: David S. Mil...
1
nfp_abm_u32_knode_replace(struct nfp_abm_link *alink, struct tc_cls_u32_knode *knode, __be16 proto, struct netlink_ext_ack *extack) { struct nfp_abm_u32_match *match = NULL, *iter; unsigned int tos_off; u8 mask, val; int err; if (!nfp_abm_u32_check_knode(alink->abm, knode, proto, extack)) goto err_del...
38,475,255,137,401,277,000,000,000,000,000,000,000
None
null
[ "CWE-401" ]
CVE-2019-19076
A memory leak in the nfp_abm_u32_knode_replace() function in drivers/net/ethernet/netronome/nfp/abm/cls.c in the Linux kernel before 5.3.6 allows attackers to cause a denial of service (memory consumption), aka CID-78beef629fd9. NOTE: This has been argued as not a valid vulnerability. The upstream commit 78beef629fd9 w...
https://nvd.nist.gov/vuln/detail/CVE-2019-19076
436,952
linux
78beef629fd95be4ed853b2d37b832f766bd96ca
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/78beef629fd95be4ed853b2d37b832f766bd96ca
nfp: abm: fix memory leak in nfp_abm_u32_knode_replace In nfp_abm_u32_knode_replace if the allocation for match fails it should go to the error handling instead of returning. Updated other gotos to have correct errno returned, too. Signed-off-by: Navid Emamdoost <navid.emamdoost@gmail.com> Signed-off-by: David S. Mil...
0
nfp_abm_u32_knode_replace(struct nfp_abm_link *alink, struct tc_cls_u32_knode *knode, __be16 proto, struct netlink_ext_ack *extack) { struct nfp_abm_u32_match *match = NULL, *iter; unsigned int tos_off; u8 mask, val; int err; if (!nfp_abm_u32_check_knode(alink->abm, knode, proto, extack)) { err = -EOP...
99,795,705,605,736,840,000,000,000,000,000,000,000
None
null
[ "CWE-401" ]
CVE-2019-19076
A memory leak in the nfp_abm_u32_knode_replace() function in drivers/net/ethernet/netronome/nfp/abm/cls.c in the Linux kernel before 5.3.6 allows attackers to cause a denial of service (memory consumption), aka CID-78beef629fd9. NOTE: This has been argued as not a valid vulnerability. The upstream commit 78beef629fd9 w...
https://nvd.nist.gov/vuln/detail/CVE-2019-19076
210,519
git
11a9f4d807a0d71dc6eff51bb87baf4ca2cccf1d
https://github.com/git/git
https://github.com/git/git/commit/11a9f4d807a0d71dc6eff51bb87baf4ca2cccf1d
is_ntfs_dotgit: use a size_t for traversing string We walk through the "name" string using an int, which can wrap to a negative value and cause us to read random memory before our array (e.g., by creating a tree with a name >2GB, since "int" is still 32 bits even on most 64-bit platforms). Worse, this is easy to trigg...
1
int is_ntfs_dotgit(const char *name) { int len; for (len = 0; ; len++) if (!name[len] || name[len] == '\\' || is_dir_sep(name[len])) { if (only_spaces_and_periods(name, len, 4) && !strncasecmp(name, ".git", 4)) return 1; if (only_spaces_and_periods(name, len, 5) && !strncasecmp(name, "git~1", 5...
84,362,902,177,719,920,000,000,000,000,000,000,000
path.c
35,906,032,303,632,690,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-11233
In Git before 2.13.7, 2.14.x before 2.14.4, 2.15.x before 2.15.2, 2.16.x before 2.16.4, and 2.17.x before 2.17.1, code to sanity-check pathnames on NTFS can result in reading out-of-bounds memory.
https://nvd.nist.gov/vuln/detail/CVE-2018-11233
436,976
git
11a9f4d807a0d71dc6eff51bb87baf4ca2cccf1d
https://github.com/git/git
https://github.com/git/git/commit/11a9f4d807a0d71dc6eff51bb87baf4ca2cccf1d
is_ntfs_dotgit: use a size_t for traversing string We walk through the "name" string using an int, which can wrap to a negative value and cause us to read random memory before our array (e.g., by creating a tree with a name >2GB, since "int" is still 32 bits even on most 64-bit platforms). Worse, this is easy to trigg...
0
int is_ntfs_dotgit(const char *name) { size_t len; for (len = 0; ; len++) if (!name[len] || name[len] == '\\' || is_dir_sep(name[len])) { if (only_spaces_and_periods(name, len, 4) && !strncasecmp(name, ".git", 4)) return 1; if (only_spaces_and_periods(name, len, 5) && !strncasecmp(name, "git~1"...
222,406,651,544,159,380,000,000,000,000,000,000,000
path.c
96,967,443,447,295,980,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-11233
In Git before 2.13.7, 2.14.x before 2.14.4, 2.15.x before 2.15.2, 2.16.x before 2.16.4, and 2.17.x before 2.17.1, code to sanity-check pathnames on NTFS can result in reading out-of-bounds memory.
https://nvd.nist.gov/vuln/detail/CVE-2018-11233
210,526
php-src
b4e4788c4461449b4587e19ef1f474ce938e4980
https://github.com/php/php-src
https://git.php.net/?p=php-src.git;a=commit;h=b4e4788c4461449b4587e19ef1f474ce938e4980
Fix #76130: Heap Buffer Overflow (READ: 1786) in exif_iif_add_value The MakerNote is not necessarily null-terminated, so we must not use `strlen()` to avoid OOB reads. Instead `php_strnlen()` is the proper way to handle this.
1
static void exif_iif_add_value(image_info_type *image_info, int section_index, char *name, int tag, int format, int length, void* value, int motorola_intel TSRMLS_DC) { size_t idex; void *vptr; image_info_value *info_value; image_info_data *info_data; image_info_data *list; if (length < 0) { return; } lis...
339,056,924,582,709,400,000,000,000,000,000,000,000
exif.c
17,387,303,069,229,191,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-10549
An issue was discovered in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. exif_read_data in ext/exif/exif.c has an out-of-bounds read for crafted JPEG data because exif_iif_add_value mishandles the case of a MakerNote that lacks a final '\0' character.
https://nvd.nist.gov/vuln/detail/CVE-2018-10549
437,000
php-src
b4e4788c4461449b4587e19ef1f474ce938e4980
https://github.com/php/php-src
https://git.php.net/?p=php-src.git;a=commit;h=b4e4788c4461449b4587e19ef1f474ce938e4980
Fix #76130: Heap Buffer Overflow (READ: 1786) in exif_iif_add_value The MakerNote is not necessarily null-terminated, so we must not use `strlen()` to avoid OOB reads. Instead `php_strnlen()` is the proper way to handle this.
0
static void exif_iif_add_value(image_info_type *image_info, int section_index, char *name, int tag, int format, int length, void* value, int motorola_intel TSRMLS_DC) { size_t idex; void *vptr; image_info_value *info_value; image_info_data *info_data; image_info_data *list; if (length < 0) { return; } lis...
176,269,232,931,620,300,000,000,000,000,000,000,000
exif.c
234,617,860,043,523,420,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-10549
An issue was discovered in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. exif_read_data in ext/exif/exif.c has an out-of-bounds read for crafted JPEG data because exif_iif_add_value mishandles the case of a MakerNote that lacks a final '\0' character.
https://nvd.nist.gov/vuln/detail/CVE-2018-10549
210,529
libidn2
16853b6973a1e72fee2b7cccda85472cb9951305
https://github.com/libidn/libidn2
http://git.savannah.gnu.org/cgit/libidn/libidn2.git/commit/?h=libidn2-2.0.4&id=16853b6973a1e72fee2b7cccda85472cb9951305
lib/bidi: Fix integer overflow (found by fuzzing)
1
_isBidi (const uint32_t *label, size_t llen) { while (llen-- > 0) { int bc = uc_bidi_category (*label++); if (bc == UC_BIDI_R || bc == UC_BIDI_AL || bc == UC_BIDI_AN) return 1; } return 0; }
313,537,167,996,863,270,000,000,000,000,000,000,000
bidi.c
293,039,989,310,345,320,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2017-14061
Integer overflow in the _isBidi function in bidi.c in Libidn2 before 2.0.4 allows remote attackers to cause a denial of service or possibly have unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2017-14061
437,015
libidn2
16853b6973a1e72fee2b7cccda85472cb9951305
https://github.com/libidn/libidn2
http://git.savannah.gnu.org/cgit/libidn/libidn2.git/commit/?h=libidn2-2.0.4&id=16853b6973a1e72fee2b7cccda85472cb9951305
lib/bidi: Fix integer overflow (found by fuzzing)
0
_isBidi (const uint32_t *label, size_t llen) { for (; (ssize_t) llen > 0; llen--) { int bc = uc_bidi_category (*label++); if (bc == UC_BIDI_R || bc == UC_BIDI_AL || bc == UC_BIDI_AN) return 1; } return 0; }
97,267,727,213,124,710,000,000,000,000,000,000,000
bidi.c
219,508,461,817,742,530,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2017-14061
Integer overflow in the _isBidi function in bidi.c in Libidn2 before 2.0.4 allows remote attackers to cause a denial of service or possibly have unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2017-14061
210,532
libgd
56ce6ef068b954ad28379e83cca04feefc51320c
https://github.com/libgd/libgd
https://github.com/libgd/libgd/commit/56ce6ef068b954ad28379e83cca04feefc51320c
Fix #381: libgd double-free vulnerability The issue is that `gdImagePngCtxEx` (which is called by `gdImagePngPtr` and the other PNG output functions to do the real work) does not return whether it succeeded or failed, so this is not checked in `gdImagePngPtr` and the function wrongly assumes everything is okay, which ...
1
BGD_DECLARE(void *) gdImagePngPtr (gdImagePtr im, int *size) { void *rv; gdIOCtx *out = gdNewDynamicCtx (2048, NULL); if (out == NULL) return NULL; gdImagePngCtxEx (im, out, -1); rv = gdDPExtractData (out, size); out->gd_free (out); return rv; }
155,791,331,739,666,960,000,000,000,000,000,000,000
None
null
[ "CWE-415" ]
CVE-2017-6362
Double free vulnerability in the gdImagePngPtr function in libgd2 before 2.2.5 allows remote attackers to cause a denial of service via vectors related to a palette with no colors.
https://nvd.nist.gov/vuln/detail/CVE-2017-6362
437,030
libgd
56ce6ef068b954ad28379e83cca04feefc51320c
https://github.com/libgd/libgd
https://github.com/libgd/libgd/commit/56ce6ef068b954ad28379e83cca04feefc51320c
Fix #381: libgd double-free vulnerability The issue is that `gdImagePngCtxEx` (which is called by `gdImagePngPtr` and the other PNG output functions to do the real work) does not return whether it succeeded or failed, so this is not checked in `gdImagePngPtr` and the function wrongly assumes everything is okay, which ...
0
BGD_DECLARE(void *) gdImagePngPtr (gdImagePtr im, int *size) { void *rv; gdIOCtx *out = gdNewDynamicCtx (2048, NULL); if (out == NULL) return NULL; if (!_gdImagePngCtxEx (im, out, -1)) { rv = gdDPExtractData (out, size); } else { rv = NULL; } out->gd_free (out); return rv; }
242,124,031,100,998,220,000,000,000,000,000,000,000
None
null
[ "CWE-415" ]
CVE-2017-6362
Double free vulnerability in the gdImagePngPtr function in libgd2 before 2.2.5 allows remote attackers to cause a denial of service via vectors related to a palette with no colors.
https://nvd.nist.gov/vuln/detail/CVE-2017-6362
210,539
linux
5d407b071dc369c26a38398326ee2be53651cfe4
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5d407b071dc369c26a38398326ee2be53651cfe4
ip: frags: fix crash in ip_do_fragment() A kernel crash occurrs when defragmented packet is fragmented in ip_do_fragment(). In defragment routine, skb_orphan() is called and skb->ip_defrag_offset is set. but skb->sk and skb->ip_defrag_offset are same union member. so that frag->sk is not NULL. Hence crash occurrs in s...
1
static int ip_frag_reasm(struct ipq *qp, struct sk_buff *skb, struct sk_buff *prev_tail, struct net_device *dev) { struct net *net = container_of(qp->q.net, struct net, ipv4.frags); struct iphdr *iph; struct sk_buff *fp, *head = skb_rb_first(&qp->q.rb_fragments); struct sk_buff **nextp; /* To build frag_list. *...
203,191,410,963,687,260,000,000,000,000,000,000,000
ip_fragment.c
337,380,662,207,335,100,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2018-14641
A security flaw was found in the ip_frag_reasm() function in net/ipv4/ip_fragment.c in the Linux kernel from 4.19-rc1 to 4.19-rc3 inclusive, which can cause a later system crash in ip_do_fragment(). With certain non-default, but non-rare, configuration of a victim host, an attacker can trigger this crash remotely, thus...
https://nvd.nist.gov/vuln/detail/CVE-2018-14641
437,106
linux
5d407b071dc369c26a38398326ee2be53651cfe4
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5d407b071dc369c26a38398326ee2be53651cfe4
ip: frags: fix crash in ip_do_fragment() A kernel crash occurrs when defragmented packet is fragmented in ip_do_fragment(). In defragment routine, skb_orphan() is called and skb->ip_defrag_offset is set. but skb->sk and skb->ip_defrag_offset are same union member. so that frag->sk is not NULL. Hence crash occurrs in s...
0
static int ip_frag_reasm(struct ipq *qp, struct sk_buff *skb, struct sk_buff *prev_tail, struct net_device *dev) { struct net *net = container_of(qp->q.net, struct net, ipv4.frags); struct iphdr *iph; struct sk_buff *fp, *head = skb_rb_first(&qp->q.rb_fragments); struct sk_buff **nextp; /* To build frag_list. *...
335,002,027,368,061,530,000,000,000,000,000,000,000
ip_fragment.c
145,317,037,223,021,030,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2018-14641
A security flaw was found in the ip_frag_reasm() function in net/ipv4/ip_fragment.c in the Linux kernel from 4.19-rc1 to 4.19-rc3 inclusive, which can cause a later system crash in ip_do_fragment(). With certain non-default, but non-rare, configuration of a victim host, an attacker can trigger this crash remotely, thus...
https://nvd.nist.gov/vuln/detail/CVE-2018-14641
210,542
openldap
554dff1927176579d652f2fe60c90e9abbad4c65
https://github.com/openldap/openldap
https://git.openldap.org/openldap/openldap/-/commit/554dff1927176579d652f2fe60c90e9abbad4c65
ITS#9409 saslauthz: use slap_sl_free in prev commit
1
authzPrettyNormal( struct berval *val, struct berval *normalized, void *ctx, int normalize ) { struct berval bv; int rc = LDAP_INVALID_SYNTAX; LDAPURLDesc *ludp = NULL; char *lud_dn = NULL, *lud_filter = NULL; int scope = -1; /* * 1) <DN> * 2) dn[.{exact|children|subtree|onelevel}]:{*|<DN>} * 3...
94,224,949,346,804,370,000,000,000,000,000,000,000
saslauthz.c
87,037,599,050,773,140,000,000,000,000,000,000,000
[ "CWE-763" ]
CVE-2020-36224
A flaw was discovered in OpenLDAP before 2.4.57 leading to an invalid pointer free and slapd crash in the saslAuthzTo processing, resulting in denial of service.
https://nvd.nist.gov/vuln/detail/CVE-2020-36224
437,135
openldap
554dff1927176579d652f2fe60c90e9abbad4c65
https://github.com/openldap/openldap
https://git.openldap.org/openldap/openldap/-/commit/554dff1927176579d652f2fe60c90e9abbad4c65
ITS#9409 saslauthz: use slap_sl_free in prev commit
0
authzPrettyNormal( struct berval *val, struct berval *normalized, void *ctx, int normalize ) { struct berval bv; int rc = LDAP_INVALID_SYNTAX; LDAPURLDesc *ludp = NULL; char *lud_dn = NULL, *lud_filter = NULL; int scope = -1; /* * 1) <DN> * 2) dn[.{exact|children|subtree|onelevel}]:{*|<DN>} * 3...
20,516,819,605,904,742,000,000,000,000,000,000,000
saslauthz.c
313,836,664,500,347,340,000,000,000,000,000,000,000
[ "CWE-763" ]
CVE-2020-36224
A flaw was discovered in OpenLDAP before 2.4.57 leading to an invalid pointer free and slapd crash in the saslAuthzTo processing, resulting in denial of service.
https://nvd.nist.gov/vuln/detail/CVE-2020-36224
210,552
ImageMagick
73d59a74e0b0a864c1a9581b8a4bdbee427125e2
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/73d59a74e0b0a864c1a9581b8a4bdbee427125e2
Different fix for #869.
1
static MagickBooleanType ReadPSDChannelZip(Image *image,const size_t channels, const ssize_t type,const PSDCompressionType compression, const size_t compact_size,ExceptionInfo *exception) { MagickBooleanType status; register unsigned char *p; size_t count, length, packet_size, row_si...
271,235,547,887,400,670,000,000,000,000,000,000,000
psd.c
2,120,230,863,086,307,500,000,000,000,000,000,000
[ "CWE-835" ]
CVE-2017-17681
In ImageMagick 7.0.7-12 Q16, an infinite loop vulnerability was found in the function ReadPSDChannelZip in coders/psd.c, which allows attackers to cause a denial of service (CPU exhaustion) via a crafted psd image file.
https://nvd.nist.gov/vuln/detail/CVE-2017-17681
437,397
ImageMagick
73d59a74e0b0a864c1a9581b8a4bdbee427125e2
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/73d59a74e0b0a864c1a9581b8a4bdbee427125e2
Different fix for #869.
0
static MagickBooleanType ReadPSDChannelZip(Image *image,const size_t channels, const ssize_t type,const PSDCompressionType compression, const size_t compact_size,ExceptionInfo *exception) { MagickBooleanType status; register unsigned char *p; size_t count, length, packet_size, row_si...
803,553,221,321,863,000,000,000,000,000,000,000
psd.c
292,054,884,481,913,300,000,000,000,000,000,000,000
[ "CWE-835" ]
CVE-2017-17681
In ImageMagick 7.0.7-12 Q16, an infinite loop vulnerability was found in the function ReadPSDChannelZip in coders/psd.c, which allows attackers to cause a denial of service (CPU exhaustion) via a crafted psd image file.
https://nvd.nist.gov/vuln/detail/CVE-2017-17681
210,556
jasper
243749e5a6384acdb9f0a59515c0b85dfd62bd5b
https://github.com/mdadams/jasper
https://github.com/jasper-software/jasper/commit/243749e5a6384acdb9f0a59515c0b85dfd62bd5b
Check data in jas_image Regarding CVE-2018-19539. Fix by Markus Koschany <apo@debian.org>. From https://gist.github.com/apoleon/7c0f3a0c28437c18fee8a51b1aa16164.
1
int jas_image_readcmpt(jas_image_t *image, int cmptno, jas_image_coord_t x, jas_image_coord_t y, jas_image_coord_t width, jas_image_coord_t height, jas_matrix_t *data) { jas_image_cmpt_t *cmpt; jas_image_coord_t i; jas_image_coord_t j; int k; jas_seqent_t v; int c; jas_seqent_t *dr; jas_seqent_t *d; int dr...
235,415,273,753,495,400,000,000,000,000,000,000,000
jas_image.c
66,008,448,582,537,430,000,000,000,000,000,000,000
[ "CWE-617" ]
CVE-2018-19539
An issue was discovered in JasPer 2.0.14. There is an access violation in the function jas_image_readcmpt in libjasper/base/jas_image.c, leading to a denial of service.
https://nvd.nist.gov/vuln/detail/CVE-2018-19539
437,418
jasper
243749e5a6384acdb9f0a59515c0b85dfd62bd5b
https://github.com/mdadams/jasper
https://github.com/jasper-software/jasper/commit/243749e5a6384acdb9f0a59515c0b85dfd62bd5b
Check data in jas_image Regarding CVE-2018-19539. Fix by Markus Koschany <apo@debian.org>. From https://gist.github.com/apoleon/7c0f3a0c28437c18fee8a51b1aa16164.
0
int jas_image_readcmpt(jas_image_t *image, int cmptno, jas_image_coord_t x, jas_image_coord_t y, jas_image_coord_t width, jas_image_coord_t height, jas_matrix_t *data) { jas_image_cmpt_t *cmpt; jas_image_coord_t i; jas_image_coord_t j; int k; jas_seqent_t v; int c; jas_seqent_t *dr; jas_seqent_t *d; int dr...
156,720,645,929,615,700,000,000,000,000,000,000,000
jas_image.c
38,488,163,436,135,200,000,000,000,000,000,000,000
[ "CWE-617" ]
CVE-2018-19539
An issue was discovered in JasPer 2.0.14. There is an access violation in the function jas_image_readcmpt in libjasper/base/jas_image.c, leading to a denial of service.
https://nvd.nist.gov/vuln/detail/CVE-2018-19539
210,557
libgcrypt
88e1358962e902ff1cbec8d53ba3eee46407851a
https://github.com/gpg/libgcrypt
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=88e1358962e902ff1cbec8d53ba3eee46407851a
ecc: Constant-time multiplication for Weierstrass curve. * mpi/ec.c (_gcry_mpi_ec_mul_point): Use simple left-to-right binary method for Weierstrass curve when SCALAR is secure.
1
_gcry_mpi_ec_mul_point (mpi_point_t result, gcry_mpi_t scalar, mpi_point_t point, mpi_ec_t ctx) { gcry_mpi_t x1, y1, z1, k, h, yy; unsigned int i, loops; mpi_point_struct p1, p2, p1inv; if (ctx->model == MPI_EC_EDWARDS) { /* Simple left to right binary ...
96,484,665,098,900,770,000,000,000,000,000,000,000
ec.c
266,548,225,885,337,300,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2015-7511
Libgcrypt before 1.6.5 does not properly perform elliptic-point curve multiplication during decryption, which makes it easier for physically proximate attackers to extract ECDH keys by measuring electromagnetic emanations.
https://nvd.nist.gov/vuln/detail/CVE-2015-7511
437,428
libgcrypt
88e1358962e902ff1cbec8d53ba3eee46407851a
https://github.com/gpg/libgcrypt
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=88e1358962e902ff1cbec8d53ba3eee46407851a
ecc: Constant-time multiplication for Weierstrass curve. * mpi/ec.c (_gcry_mpi_ec_mul_point): Use simple left-to-right binary method for Weierstrass curve when SCALAR is secure.
0
_gcry_mpi_ec_mul_point (mpi_point_t result, gcry_mpi_t scalar, mpi_point_t point, mpi_ec_t ctx) { gcry_mpi_t x1, y1, z1, k, h, yy; unsigned int i, loops; mpi_point_struct p1, p2, p1inv; if (ctx->model == MPI_EC_EDWARDS || (ctx->model == MPI_EC_WEIERSTRASS ...
22,093,000,753,631,443,000,000,000,000,000,000,000
ec.c
274,122,731,010,458,620,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2015-7511
Libgcrypt before 1.6.5 does not properly perform elliptic-point curve multiplication during decryption, which makes it easier for physically proximate attackers to extract ECDH keys by measuring electromagnetic emanations.
https://nvd.nist.gov/vuln/detail/CVE-2015-7511
210,558
gnutls
c8dcbedd1fdc312f5b1a70fcfbc1afe235d800cd
http://git.savannah.gnu.org/cgit/gnutls
https://gitorious.org/gnutls/gnutls/commit/c8dcbedd1fdc312f5b1a70fcfbc1afe235d800cd
Corrected bit disable (was flipping instead). Initialy reported by Daniel Kahn Gillmor on 9/1/2008. Many thanks to moog@sysdev.oucs.ox.ac.uk for bringing this into my attention.
1
_gnutls_x509_verify_certificate (const gnutls_x509_crt_t * certificate_list, int clist_size, const gnutls_x509_crt_t * trusted_cas, int tcas_size, const gnutls_x509_crl_t * CRLs, int crls_size, unsigned int flags) { int i = 0, ret; unsigned int status = 0, output; if (clist_size > 1) ...
128,222,427,146,858,530,000,000,000,000,000,000,000
verify.c
336,171,173,434,451,300,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2009-5138
GnuTLS before 2.7.6, when the GNUTLS_VERIFY_ALLOW_X509_V1_CA_CRT flag is not enabled, treats version 1 X.509 certificates as intermediate CAs, which allows remote attackers to bypass intended restrictions by leveraging a X.509 V1 certificate from a trusted CA to issue new certificates, a different vulnerability than CV...
https://nvd.nist.gov/vuln/detail/CVE-2009-5138
437,432
gnutls
c8dcbedd1fdc312f5b1a70fcfbc1afe235d800cd
http://git.savannah.gnu.org/cgit/gnutls
https://gitorious.org/gnutls/gnutls/commit/c8dcbedd1fdc312f5b1a70fcfbc1afe235d800cd
Corrected bit disable (was flipping instead). Initialy reported by Daniel Kahn Gillmor on 9/1/2008. Many thanks to moog@sysdev.oucs.ox.ac.uk for bringing this into my attention.
0
_gnutls_x509_verify_certificate (const gnutls_x509_crt_t * certificate_list, int clist_size, const gnutls_x509_crt_t * trusted_cas, int tcas_size, const gnutls_x509_crl_t * CRLs, int crls_size, unsigned int flags) { int i = 0, ret; unsigned int status = 0, output; if (clist_size > 1) ...
304,340,924,600,166,530,000,000,000,000,000,000,000
verify.c
123,819,562,112,045,400,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2009-5138
GnuTLS before 2.7.6, when the GNUTLS_VERIFY_ALLOW_X509_V1_CA_CRT flag is not enabled, treats version 1 X.509 certificates as intermediate CAs, which allows remote attackers to bypass intended restrictions by leveraging a X.509 V1 certificate from a trusted CA to issue new certificates, a different vulnerability than CV...
https://nvd.nist.gov/vuln/detail/CVE-2009-5138
210,572
teeworlds
ff254722a2683867fcb3e67569ffd36226c4bc62
https://github.com/teeworlds/teeworlds
https://github.com/teeworlds/teeworlds/commit/ff254722a2683867fcb3e67569ffd36226c4bc62
added some checks to snap handling
1
void CClient::ProcessServerPacket(CNetChunk *pPacket) { CUnpacker Unpacker; Unpacker.Reset(pPacket->m_pData, pPacket->m_DataSize); // unpack msgid and system flag int Msg = Unpacker.GetInt(); int Sys = Msg&1; Msg >>= 1; if(Unpacker.Error()) return; if(Sys) { // system message if((pPacket->m_Flags&NET_...
84,789,398,647,869,310,000,000,000,000,000,000,000
client.cpp
10,156,922,904,982,835,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2016-9400
The CClient::ProcessServerPacket method in engine/client/client.cpp in Teeworlds before 0.6.4 allows remote servers to write to arbitrary physical memory locations and possibly execute arbitrary code via vectors involving snap handling.
https://nvd.nist.gov/vuln/detail/CVE-2016-9400
437,795
teeworlds
ff254722a2683867fcb3e67569ffd36226c4bc62
https://github.com/teeworlds/teeworlds
https://github.com/teeworlds/teeworlds/commit/ff254722a2683867fcb3e67569ffd36226c4bc62
added some checks to snap handling
0
void CClient::ProcessServerPacket(CNetChunk *pPacket) { CUnpacker Unpacker; Unpacker.Reset(pPacket->m_pData, pPacket->m_DataSize); // unpack msgid and system flag int Msg = Unpacker.GetInt(); int Sys = Msg&1; Msg >>= 1; if(Unpacker.Error()) return; if(Sys) { // system message if((pPacket->m_Flags&NET_...
5,213,412,140,418,965,000,000,000,000,000,000,000
client.cpp
307,550,565,014,092,100,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2016-9400
The CClient::ProcessServerPacket method in engine/client/client.cpp in Teeworlds before 0.6.4 allows remote servers to write to arbitrary physical memory locations and possibly execute arbitrary code via vectors involving snap handling.
https://nvd.nist.gov/vuln/detail/CVE-2016-9400
210,611
php-src
2aae60461c2ff7b7fbcdd194c789ac841d0747d7
https://github.com/php/php-src
https://git.php.net/?p=php-src.git;a=commit;h=2aae60461c2ff7b7fbcdd194c789ac841d0747d7
Fix bug #74145 - wddx parsing empty boolean tag leads to SIGSEGV
1
*/ static void php_wddx_push_element(void *user_data, const XML_Char *name, const XML_Char **atts) { st_entry ent; wddx_stack *stack = (wddx_stack *)user_data; if (!strcmp(name, EL_PACKET)) { int i; if (atts) for (i=0; atts[i]; i++) { if (!strcmp(atts[i], EL_VERSION)) { /* nothing for now */ } } ...
246,936,064,889,369,220,000,000,000,000,000,000,000
wddx.c
207,088,785,218,292,450,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2017-11143
In PHP before 5.6.31, an invalid free in the WDDX deserialization of boolean parameters could be used by attackers able to inject XML for deserialization to crash the PHP interpreter, related to an invalid free for an empty boolean element in ext/wddx/wddx.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-11143
438,530
php-src
2aae60461c2ff7b7fbcdd194c789ac841d0747d7
https://github.com/php/php-src
https://git.php.net/?p=php-src.git;a=commit;h=2aae60461c2ff7b7fbcdd194c789ac841d0747d7
Fix bug #74145 - wddx parsing empty boolean tag leads to SIGSEGV
0
*/ static void php_wddx_push_element(void *user_data, const XML_Char *name, const XML_Char **atts) { st_entry ent; wddx_stack *stack = (wddx_stack *)user_data; if (!strcmp(name, EL_PACKET)) { int i; if (atts) for (i=0; atts[i]; i++) { if (!strcmp(atts[i], EL_VERSION)) { /* nothing for now */ } } ...
42,913,730,582,672,100,000,000,000,000,000,000,000
wddx.c
170,530,475,169,369,420,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2017-11143
In PHP before 5.6.31, an invalid free in the WDDX deserialization of boolean parameters could be used by attackers able to inject XML for deserialization to crash the PHP interpreter, related to an invalid free for an empty boolean element in ext/wddx/wddx.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-11143
210,616
ImageMagick
4d6accd355119d54429a86a1859b8329f0130f30
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/4d6accd355119d54429a86a1859b8329f0130f30
https://github.com/ImageMagick/ImageMagick/issues/902
1
static MagickBooleanType WriteOnePNGImage(MngInfo *mng_info, const ImageInfo *IMimage_info,Image *IMimage,ExceptionInfo *exception) { char im_vers[32], libpng_runv[32], libpng_vers[32], zlib_runv[32], zlib_vers[32]; Image *image; ImageInfo *image_info; char s[2]; const ch...
173,680,363,862,618,570,000,000,000,000,000,000,000
png.c
35,193,305,938,881,377,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2017-17884
In ImageMagick 7.0.7-16 Q16, a memory leak vulnerability was found in the function WriteOnePNGImage in coders/png.c, which allows attackers to cause a denial of service via a crafted PNG image file.
https://nvd.nist.gov/vuln/detail/CVE-2017-17884
438,627
ImageMagick
4d6accd355119d54429a86a1859b8329f0130f30
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/4d6accd355119d54429a86a1859b8329f0130f30
https://github.com/ImageMagick/ImageMagick/issues/902
0
static MagickBooleanType WriteOnePNGImage(MngInfo *mng_info, const ImageInfo *IMimage_info,Image *IMimage,ExceptionInfo *exception) { char im_vers[32], libpng_runv[32], libpng_vers[32], zlib_runv[32], zlib_vers[32]; Image *image; ImageInfo *image_info; char s[2]; const ch...
306,447,761,126,449,850,000,000,000,000,000,000,000
png.c
220,403,404,042,436,000,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2017-17884
In ImageMagick 7.0.7-16 Q16, a memory leak vulnerability was found in the function WriteOnePNGImage in coders/png.c, which allows attackers to cause a denial of service via a crafted PNG image file.
https://nvd.nist.gov/vuln/detail/CVE-2017-17884
210,617
linux
65d8fc777f6dcfee12785c057a6b57f679641c90
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=65d8fc777f6dcfee12785c057a6b57f679641c90
futex: Remove requirement for lock_page() in get_futex_key() When dealing with key handling for shared futexes, we can drastically reduce the usage/need of the page lock. 1) For anonymous pages, the associated futex object is the mm_struct which does not require the page lock. 2) For inode based, keys, we can check un...
1
get_futex_key(u32 __user *uaddr, int fshared, union futex_key *key, int rw) { unsigned long address = (unsigned long)uaddr; struct mm_struct *mm = current->mm; struct page *page; struct address_space *mapping; int err, ro = 0; /* * The futex address must be "naturally" aligned. */ key->both.offset = address...
19,642,140,176,019,460,000,000,000,000,000,000,000
futex.c
282,399,043,380,026,000,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2018-9422
In get_futex_key of futex.c, there is a use-after-free due to improper locking. This could lead to local escalation of privilege with no additional privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-74250718 References: Upstream kernel.
https://nvd.nist.gov/vuln/detail/CVE-2018-9422
438,649
linux
65d8fc777f6dcfee12785c057a6b57f679641c90
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=65d8fc777f6dcfee12785c057a6b57f679641c90
futex: Remove requirement for lock_page() in get_futex_key() When dealing with key handling for shared futexes, we can drastically reduce the usage/need of the page lock. 1) For anonymous pages, the associated futex object is the mm_struct which does not require the page lock. 2) For inode based, keys, we can check un...
0
get_futex_key(u32 __user *uaddr, int fshared, union futex_key *key, int rw) { unsigned long address = (unsigned long)uaddr; struct mm_struct *mm = current->mm; struct page *page; struct address_space *mapping; int err, ro = 0; /* * The futex address must be "naturally" aligned. */ key->both.offset = address...
236,780,225,531,477,680,000,000,000,000,000,000,000
futex.c
133,577,935,360,128,750,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2018-9422
In get_futex_key of futex.c, there is a use-after-free due to improper locking. This could lead to local escalation of privilege with no additional privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-74250718 References: Upstream kernel.
https://nvd.nist.gov/vuln/detail/CVE-2018-9422
210,643
php-src
7edc639b9ff1c3576773d79d016abbeed1f93846
https://github.com/php/php-src
http://git.php.net/?p=php-src.git;a=commit;h=7edc639b9ff1c3576773d79d016abbeed1f93846
Fix #77020: null pointer dereference in imap_mail If an empty $message is passed to imap_mail(), we must not set message to NULL, since _php_imap_mail() is not supposed to handle NULL pointers (opposed to pointers to NUL).
1
Send an email message */ PHP_FUNCTION(imap_mail) { char *to=NULL, *message=NULL, *headers=NULL, *subject=NULL, *cc=NULL, *bcc=NULL, *rpath=NULL; int to_len, message_len, headers_len, subject_len, cc_len, bcc_len, rpath_len, argc = ZEND_NUM_ARGS(); if (zend_parse_parameters(argc TSRMLS_CC, "sss|ssss", &to, &to_le...
114,415,428,187,691,870,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2018-19935
ext/imap/php_imap.c in PHP 5.x and 7.x before 7.3.0 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an empty string in the message argument to the imap_mail function.
https://nvd.nist.gov/vuln/detail/CVE-2018-19935
438,971
php-src
7edc639b9ff1c3576773d79d016abbeed1f93846
https://github.com/php/php-src
http://git.php.net/?p=php-src.git;a=commit;h=7edc639b9ff1c3576773d79d016abbeed1f93846
Fix #77020: null pointer dereference in imap_mail If an empty $message is passed to imap_mail(), we must not set message to NULL, since _php_imap_mail() is not supposed to handle NULL pointers (opposed to pointers to NUL).
0
Send an email message */ PHP_FUNCTION(imap_mail) { char *to=NULL, *message=NULL, *headers=NULL, *subject=NULL, *cc=NULL, *bcc=NULL, *rpath=NULL; int to_len, message_len, headers_len, subject_len, cc_len, bcc_len, rpath_len, argc = ZEND_NUM_ARGS(); if (zend_parse_parameters(argc TSRMLS_CC, "sss|ssss", &to, &to_le...
240,264,664,733,404,480,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2018-19935
ext/imap/php_imap.c in PHP 5.x and 7.x before 7.3.0 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an empty string in the message argument to the imap_mail function.
https://nvd.nist.gov/vuln/detail/CVE-2018-19935
210,644
flatpak
9a61d2c44f0a58cebcb9b2787ae88db07ca68bb0
https://github.com/flatpak/flatpak
https://github.com/flatpak/flatpak/commit/9a61d2c44f0a58cebcb9b2787ae88db07ca68bb0
build: Convert environment into a sequence of bwrap arguments This means we can systematically pass the environment variables through bwrap(1), even if it is setuid and thus is filtering out security-sensitive environment variables. bwrap itself ends up being run with an empty environment instead. This fixes a regres...
1
flatpak_builtin_build (int argc, char **argv, GCancellable *cancellable, GError **error) { g_autoptr(GOptionContext) context = NULL; g_autoptr(FlatpakDeploy) runtime_deploy = NULL; g_autoptr(GBytes) runtime_deploy_data = NULL; g_autoptr(FlatpakDeploy) extensionof_deploy = NULL; g_autoptr(GFile) var = NULL; ...
102,010,712,262,707,530,000,000,000,000,000,000,000
flatpak-builtins-build.c
67,383,206,621,898,680,000,000,000,000,000,000,000
[ "CWE-74" ]
CVE-2021-21261
Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. A bug was discovered in the `flatpak-portal` service that can allow sandboxed applications to execute arbitrary code on the host system (a sandbox escape). This sandbox-escape bug is present in versions from 0.11.4 and ...
https://nvd.nist.gov/vuln/detail/CVE-2021-21261
438,981
flatpak
9a61d2c44f0a58cebcb9b2787ae88db07ca68bb0
https://github.com/flatpak/flatpak
https://github.com/flatpak/flatpak/commit/9a61d2c44f0a58cebcb9b2787ae88db07ca68bb0
build: Convert environment into a sequence of bwrap arguments This means we can systematically pass the environment variables through bwrap(1), even if it is setuid and thus is filtering out security-sensitive environment variables. bwrap itself ends up being run with an empty environment instead. This fixes a regres...
0
flatpak_builtin_build (int argc, char **argv, GCancellable *cancellable, GError **error) { g_autoptr(GOptionContext) context = NULL; g_autoptr(FlatpakDeploy) runtime_deploy = NULL; g_autoptr(GBytes) runtime_deploy_data = NULL; g_autoptr(FlatpakDeploy) extensionof_deploy = NULL; g_autoptr(GFile) var = NULL; ...
243,896,220,312,269,960,000,000,000,000,000,000,000
flatpak-builtins-build.c
64,099,142,116,874,890,000,000,000,000,000,000,000
[ "CWE-74" ]
CVE-2021-21261
Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. A bug was discovered in the `flatpak-portal` service that can allow sandboxed applications to execute arbitrary code on the host system (a sandbox escape). This sandbox-escape bug is present in versions from 0.11.4 and ...
https://nvd.nist.gov/vuln/detail/CVE-2021-21261
210,646
openldap
d169e7958a3e0dc70f59c8374bf8a59833b7bdd8
https://github.com/openldap/openldap
https://git.openldap.org/openldap/openldap/-/commit/d169e7958a3e0dc70f59c8374bf8a59833b7bdd8
ITS#9413 fix slap_parse_user
1
int slap_parse_user( struct berval *id, struct berval *user, struct berval *realm, struct berval *mech ) { char u; assert( id != NULL ); assert( !BER_BVISNULL( id ) ); assert( user != NULL ); assert( realm != NULL ); assert( mech != NULL ); u = id->bv_val[ 0 ]; if ( u != 'u' && u != 'U' ) { /* called w...
193,293,532,509,230,940,000,000,000,000,000,000,000
saslauthz.c
178,768,179,422,287,400,000,000,000,000,000,000,000
[ "CWE-763" ]
CVE-2020-36224
A flaw was discovered in OpenLDAP before 2.4.57 leading to an invalid pointer free and slapd crash in the saslAuthzTo processing, resulting in denial of service.
https://nvd.nist.gov/vuln/detail/CVE-2020-36224