idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
430,520 | libxml2 | bdd66182ef53fe1f7209ab6535fda56366bd7ac9 | https://github.com/GNOME/libxml2 | https://git.gnome.org/browse/libxml2/commit/?id=bdd66182ef53fe1f7209ab6535fda56366bd7ac9 | Avoid building recursive entities
For https://bugzilla.gnome.org/show_bug.cgi?id=762100
When we detect a recusive entity we should really not
build the associated data, moreover if someone bypass
libxml2 fatal errors and still tries to serialize a broken
entity make sure we don't risk to get ito a recursion
* parser... | 0 | xmlStringGetNodeList(const xmlDoc *doc, const xmlChar *value) {
xmlNodePtr ret = NULL, last = NULL;
xmlNodePtr node;
xmlChar *val;
const xmlChar *cur = value;
const xmlChar *q;
xmlEntityPtr ent;
xmlBufPtr buf;
if (value == NULL) return(NULL);
buf = xmlBufCreateSize(0);
if (buf ... | 234,163,977,565,962,560,000,000,000,000,000,000,000 | tree.c | 278,896,596,068,111,170,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2016-3627 | The xmlStringGetNodeList function in tree.c in libxml2 2.9.3 and earlier, when used in recovery mode, allows context-dependent attackers to cause a denial of service (infinite recursion, stack consumption, and application crash) via a crafted XML document. | https://nvd.nist.gov/vuln/detail/CVE-2016-3627 |
210,236 | linux | 6af3aa57a0984e061f61308fe181a9a12359fecc | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6af3aa57a0984e061f61308fe181a9a12359fecc | NFC: pn533: fix use-after-free and memleaks
The driver would fail to deregister and its class device and free
related resources on late probe errors.
Reported-by: syzbot+cb035c75c03dbe34b796@syzkaller.appspotmail.com
Fixes: 32ecc75ded72 ("NFC: pn533: change order operations in dev registation")
Signed-off-by: Johan H... | 1 | static int pn533_usb_probe(struct usb_interface *interface,
const struct usb_device_id *id)
{
struct pn533 *priv;
struct pn533_usb_phy *phy;
struct usb_host_interface *iface_desc;
struct usb_endpoint_descriptor *endpoint;
int in_endpoint = 0;
int out_endpoint = 0;
int rc = -ENOMEM;
int i;
u32 protocols;
en... | 48,632,546,726,964,600,000,000,000,000,000,000,000 | usb.c | 337,690,472,400,082,660,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2019-19526 | In the Linux kernel before 5.3.9, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/nfc/pn533/usb.c driver, aka CID-6af3aa57a098. | https://nvd.nist.gov/vuln/detail/CVE-2019-19526 |
430,716 | linux | 6af3aa57a0984e061f61308fe181a9a12359fecc | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6af3aa57a0984e061f61308fe181a9a12359fecc | NFC: pn533: fix use-after-free and memleaks
The driver would fail to deregister and its class device and free
related resources on late probe errors.
Reported-by: syzbot+cb035c75c03dbe34b796@syzkaller.appspotmail.com
Fixes: 32ecc75ded72 ("NFC: pn533: change order operations in dev registation")
Signed-off-by: Johan H... | 0 | static int pn533_usb_probe(struct usb_interface *interface,
const struct usb_device_id *id)
{
struct pn533 *priv;
struct pn533_usb_phy *phy;
struct usb_host_interface *iface_desc;
struct usb_endpoint_descriptor *endpoint;
int in_endpoint = 0;
int out_endpoint = 0;
int rc = -ENOMEM;
int i;
u32 protocols;
en... | 313,938,757,684,937,700,000,000,000,000,000,000,000 | usb.c | 71,704,665,606,932,790,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2019-19526 | In the Linux kernel before 5.3.9, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/nfc/pn533/usb.c driver, aka CID-6af3aa57a098. | https://nvd.nist.gov/vuln/detail/CVE-2019-19526 |
210,239 | krb5 | fc98f520caefff2e5ee9a0026fdf5109944b3562 | https://github.com/krb5/krb5 | https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562 | Fix KDC null deref on bad encrypted challenge
The function ec_verify() in src/kdc/kdc_preauth_ec.c contains a check
to avoid further processing if the armor key is NULL. However, this
check is bypassed by a call to k5memdup0() which overwrites retval
with 0 if the allocation succeeds. If the armor key is NULL, a cal... | 1 | ec_verify(krb5_context context, krb5_data *req_pkt, krb5_kdc_req *request,
krb5_enc_tkt_part *enc_tkt_reply, krb5_pa_data *data,
krb5_kdcpreauth_callbacks cb, krb5_kdcpreauth_rock rock,
krb5_kdcpreauth_moddata moddata,
krb5_kdcpreauth_verify_respond_fn respond, void *arg)
{
k... | 3,652,389,509,266,629,000,000,000,000,000,000,000 | kdc_preauth_ec.c | 52,553,352,575,276,740,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2021-36222 | ec_verify in kdc/kdc_preauth_ec.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.4 and 1.19.x before 1.19.2 allows remote attackers to cause a NULL pointer dereference and daemon crash. This occurs because a return value is not properly managed in a certain situation. | https://nvd.nist.gov/vuln/detail/CVE-2021-36222 |
430,872 | krb5 | fc98f520caefff2e5ee9a0026fdf5109944b3562 | https://github.com/krb5/krb5 | https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562 | Fix KDC null deref on bad encrypted challenge
The function ec_verify() in src/kdc/kdc_preauth_ec.c contains a check
to avoid further processing if the armor key is NULL. However, this
check is bypassed by a call to k5memdup0() which overwrites retval
with 0 if the allocation succeeds. If the armor key is NULL, a cal... | 0 | ec_verify(krb5_context context, krb5_data *req_pkt, krb5_kdc_req *request,
krb5_enc_tkt_part *enc_tkt_reply, krb5_pa_data *data,
krb5_kdcpreauth_callbacks cb, krb5_kdcpreauth_rock rock,
krb5_kdcpreauth_moddata moddata,
krb5_kdcpreauth_verify_respond_fn respond, void *arg)
{
k... | 268,297,582,588,655,900,000,000,000,000,000,000,000 | kdc_preauth_ec.c | 316,907,641,964,075,900,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2021-36222 | ec_verify in kdc/kdc_preauth_ec.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.4 and 1.19.x before 1.19.2 allows remote attackers to cause a NULL pointer dereference and daemon crash. This occurs because a return value is not properly managed in a certain situation. | https://nvd.nist.gov/vuln/detail/CVE-2021-36222 |
210,243 | libxml2 | 11ed4a7a90d5ce156a18980a4ad4e53e77384852 | https://github.com/GNOME/libxml2 | https://git.gnome.org/browse/libxml2/commit/?id=11ed4a7a90d5ce156a18980a4ad4e53e77384852 | Heap use-after-free in htmlParsePubidLiteral and htmlParseSystemiteral
For https://bugzilla.gnome.org/show_bug.cgi?id=760263
* HTMLparser.c: Add BASE_PTR convenience macro.
(htmlParseSystemLiteral): Store length and start position instead
of a pointer while iterating through the public identifier since
the underlying... | 1 | htmlParsePubidLiteral(htmlParserCtxtPtr ctxt) {
const xmlChar *q;
xmlChar *ret = NULL;
/*
* Name ::= (Letter | '_') (NameChar)*
*/
if (CUR == '"') {
NEXT;
q = CUR_PTR;
while (IS_PUBIDCHAR_CH(CUR)) NEXT;
if (CUR != '"') {
htmlParseErr(ctxt, XML_ERR_LITERAL_NOT_FINISHED,
... | 306,600,101,426,135,900,000,000,000,000,000,000,000 | HTMLparser.c | 9,346,300,951,361,166,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2016-1837 | Multiple use-after-free vulnerabilities in the (1) htmlPArsePubidLiteral and (2) htmlParseSystemiteral functions in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allow remote attackers to cause a denial of service via a crafted XML document. | https://nvd.nist.gov/vuln/detail/CVE-2016-1837 |
430,909 | libxml2 | 11ed4a7a90d5ce156a18980a4ad4e53e77384852 | https://github.com/GNOME/libxml2 | https://git.gnome.org/browse/libxml2/commit/?id=11ed4a7a90d5ce156a18980a4ad4e53e77384852 | Heap use-after-free in htmlParsePubidLiteral and htmlParseSystemiteral
For https://bugzilla.gnome.org/show_bug.cgi?id=760263
* HTMLparser.c: Add BASE_PTR convenience macro.
(htmlParseSystemLiteral): Store length and start position instead
of a pointer while iterating through the public identifier since
the underlying... | 0 | htmlParsePubidLiteral(htmlParserCtxtPtr ctxt) {
size_t len = 0, startPosition = 0;
xmlChar *ret = NULL;
/*
* Name ::= (Letter | '_') (NameChar)*
*/
if (CUR == '"') {
NEXT;
if (CUR_PTR < BASE_PTR)
return(ret);
startPosition = CUR_PTR - BASE_PTR;
whi... | 141,533,378,026,275,370,000,000,000,000,000,000,000 | HTMLparser.c | 218,614,938,984,508,400,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2016-1837 | Multiple use-after-free vulnerabilities in the (1) htmlPArsePubidLiteral and (2) htmlParseSystemiteral functions in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allow remote attackers to cause a denial of service via a crafted XML document. | https://nvd.nist.gov/vuln/detail/CVE-2016-1837 |
210,260 | bluez | 8514068150759c1d6a46d4605d2351babfde1601 | https://github.com/bluez/bluez | http://git.kernel.org/cgit/bluetooth/bluez.git/commit/?id=8514068150759c1d6a46d4605d2351babfde1601 | tools/csr: Fix possible buffer overflow
Make sure we don't write past the end of the array. | 1 | static int parse_line(char *str)
{
uint8_t array[256];
uint16_t value, pskey, length = 0;
char *off, *end;
pskey = strtol(str + 1, NULL, 16);
off = strstr(str, "=");
if (!off)
return -EIO;
off++;
while (1) {
value = strtol(off, &end, 16);
if (value == 0 && off == end)
break;
array[length++] = val... | 323,502,363,689,074,860,000,000,000,000,000,000,000 | csr.c | 89,956,407,438,766,370,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2016-7837 | Buffer overflow in BlueZ 5.41 and earlier allows an attacker to execute arbitrary code via the parse_line function used in some userland utilities. | https://nvd.nist.gov/vuln/detail/CVE-2016-7837 |
431,785 | bluez | 8514068150759c1d6a46d4605d2351babfde1601 | https://github.com/bluez/bluez | http://git.kernel.org/cgit/bluetooth/bluez.git/commit/?id=8514068150759c1d6a46d4605d2351babfde1601 | tools/csr: Fix possible buffer overflow
Make sure we don't write past the end of the array. | 0 | static int parse_line(char *str)
{
uint8_t array[256];
uint16_t value, pskey, length = 0;
char *off, *end;
pskey = strtol(str + 1, NULL, 16);
off = strstr(str, "=");
if (!off)
return -EIO;
off++;
while (length <= sizeof(array) - 2) {
value = strtol(off, &end, 16);
if (value == 0 && off == end)
break... | 30,795,347,432,154,585,000,000,000,000,000,000,000 | csr.c | 334,065,365,613,460,900,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2016-7837 | Buffer overflow in BlueZ 5.41 and earlier allows an attacker to execute arbitrary code via the parse_line function used in some userland utilities. | https://nvd.nist.gov/vuln/detail/CVE-2016-7837 |
210,272 | libgphoto2 | e25b3983489cd290edef693e78c0af694d3cd010 | https://github.com/gphoto/libgphoto2 | https://github.com/gphoto/libgphoto2/commit/e25b3983489cd290edef693e78c0af694d3cd010 | Added some more size checks to ptp_unpack_OPL to avoid crashes on too short data (AFL) | 1 | ptp_unpack_OPL (PTPParams *params, unsigned char* data, MTPProperties **pprops, unsigned int len)
{
uint32_t prop_count = dtoh32a(data);
MTPProperties *props = NULL;
unsigned int offset = 0, i;
*pprops = NULL;
if (prop_count == 0)
return 0;
if (prop_count >= INT_MAX/sizeof(MTPProperties)) {
ptp_debug (param... | 250,621,290,750,879,480,000,000,000,000,000,000,000 | ptp-pack.c | 261,662,175,742,955,870,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2017-9831 | An integer overflow vulnerability in the ptp_unpack_EOS_CustomFuncEx function of the ptp-pack.c file of libmtp (version 1.1.12 and below) allows attackers to cause a denial of service (out-of-bounds memory access) or maybe remote code execution by inserting a mobile device into a personal computer through a USB cable. | https://nvd.nist.gov/vuln/detail/CVE-2017-9831 |
432,141 | libgphoto2 | e25b3983489cd290edef693e78c0af694d3cd010 | https://github.com/gphoto/libgphoto2 | https://github.com/gphoto/libgphoto2/commit/e25b3983489cd290edef693e78c0af694d3cd010 | Added some more size checks to ptp_unpack_OPL to avoid crashes on too short data (AFL) | 0 | ptp_unpack_OPL (PTPParams *params, unsigned char* data, MTPProperties **pprops, unsigned int len)
{
uint32_t prop_count;
MTPProperties *props = NULL;
unsigned int offset = 0, i;
if (len < sizeof(uint32_t)) {
ptp_debug (params ,"must have at least 4 bytes data, not %d", len);
return 0;
}
prop_count = dtoh32... | 308,499,607,267,159,470,000,000,000,000,000,000,000 | ptp-pack.c | 135,341,668,985,176,580,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2017-9831 | An integer overflow vulnerability in the ptp_unpack_EOS_CustomFuncEx function of the ptp-pack.c file of libmtp (version 1.1.12 and below) allows attackers to cause a denial of service (out-of-bounds memory access) or maybe remote code execution by inserting a mobile device into a personal computer through a USB cable. | https://nvd.nist.gov/vuln/detail/CVE-2017-9831 |
210,280 | systemd | d973d94dec349fb676fdd844f6fe2ada3538f27c | https://github.com/systemd/systemd | https://github.com/systemd/systemd/commit/d973d94dec349fb676fdd844f6fe2ada3538f27c | resolved: pin stream while calling callbacks for it
These callbacks might unref the stream, but we still have to access it,
let's hence ref it explicitly.
Maybe fixes: #10725 | 1 | static int dns_stream_complete(DnsStream *s, int error) {
assert(s);
#if ENABLE_DNS_OVER_TLS
if (s->encrypted) {
int r;
r = dnstls_stream_shutdown(s, error);
if (r != -EAGAIN)
dns_stream_stop(s);
} else
#endif
... | 95,883,649,578,032,730,000,000,000,000,000,000,000 | resolved-dns-stream.c | 39,966,380,965,475,856,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2022-2526 | A use-after-free vulnerability was found in systemd. This issue occurs due to the on_stream_io() function and dns_stream_complete() function in 'resolved-dns-stream.c' not incrementing the reference counting for the DnsStream object. Therefore, other functions and callbacks called can dereference the DNSStream object, ... | https://nvd.nist.gov/vuln/detail/CVE-2022-2526 |
432,332 | systemd | d973d94dec349fb676fdd844f6fe2ada3538f27c | https://github.com/systemd/systemd | https://github.com/systemd/systemd/commit/d973d94dec349fb676fdd844f6fe2ada3538f27c | resolved: pin stream while calling callbacks for it
These callbacks might unref the stream, but we still have to access it,
let's hence ref it explicitly.
Maybe fixes: #10725 | 0 | static int dns_stream_complete(DnsStream *s, int error) {
_cleanup_(dns_stream_unrefp) _unused_ DnsStream *ref = dns_stream_ref(s); /* Protect stream while we process it */
assert(s);
#if ENABLE_DNS_OVER_TLS
if (s->encrypted) {
int r;
r = dnstls_stream_shutdown... | 178,520,464,058,803,300,000,000,000,000,000,000,000 | resolved-dns-stream.c | 29,951,284,784,693,966,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2022-2526 | A use-after-free vulnerability was found in systemd. This issue occurs due to the on_stream_io() function and dns_stream_complete() function in 'resolved-dns-stream.c' not incrementing the reference counting for the DnsStream object. Therefore, other functions and callbacks called can dereference the DNSStream object, ... | https://nvd.nist.gov/vuln/detail/CVE-2022-2526 |
210,281 | systemd | d973d94dec349fb676fdd844f6fe2ada3538f27c | https://github.com/systemd/systemd | https://github.com/systemd/systemd/commit/d973d94dec349fb676fdd844f6fe2ada3538f27c | resolved: pin stream while calling callbacks for it
These callbacks might unref the stream, but we still have to access it,
let's hence ref it explicitly.
Maybe fixes: #10725 | 1 | static int on_stream_io(sd_event_source *es, int fd, uint32_t revents, void *userdata) {
DnsStream *s = userdata;
int r;
assert(s);
#if ENABLE_DNS_OVER_TLS
if (s->encrypted) {
r = dnstls_stream_on_io(s, revents);
if (r == DNSTLS_STREAM_CLOSED)
... | 229,754,361,267,531,300,000,000,000,000,000,000,000 | resolved-dns-stream.c | 39,966,380,965,475,856,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2022-2526 | A use-after-free vulnerability was found in systemd. This issue occurs due to the on_stream_io() function and dns_stream_complete() function in 'resolved-dns-stream.c' not incrementing the reference counting for the DnsStream object. Therefore, other functions and callbacks called can dereference the DNSStream object, ... | https://nvd.nist.gov/vuln/detail/CVE-2022-2526 |
432,343 | systemd | d973d94dec349fb676fdd844f6fe2ada3538f27c | https://github.com/systemd/systemd | https://github.com/systemd/systemd/commit/d973d94dec349fb676fdd844f6fe2ada3538f27c | resolved: pin stream while calling callbacks for it
These callbacks might unref the stream, but we still have to access it,
let's hence ref it explicitly.
Maybe fixes: #10725 | 0 | static int on_stream_io(sd_event_source *es, int fd, uint32_t revents, void *userdata) {
_cleanup_(dns_stream_unrefp) DnsStream *s = dns_stream_ref(userdata); /* Protect stream while we process it */
int r;
assert(s);
#if ENABLE_DNS_OVER_TLS
if (s->encrypted) {
r = dnst... | 66,056,789,011,367,830,000,000,000,000,000,000,000 | resolved-dns-stream.c | 29,951,284,784,693,966,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2022-2526 | A use-after-free vulnerability was found in systemd. This issue occurs due to the on_stream_io() function and dns_stream_complete() function in 'resolved-dns-stream.c' not incrementing the reference counting for the DnsStream object. Therefore, other functions and callbacks called can dereference the DNSStream object, ... | https://nvd.nist.gov/vuln/detail/CVE-2022-2526 |
210,297 | clamav-devel | fcd8091474d12592d509adcfd0bdd0b0dc8835f5 | https://github.com/vrtadmin/clamav-devel | http://git.clamav.net/gitweb?p=clamav-devel.git;a=commitdiff;h=fcd8091474d12592d509adcfd0bdd0b0dc8835f5#patch4 | bb#2230-2231 | 1 | static Int32 BZ2_decompress ( DState* s )
{
UChar uc;
Int32 retVal;
Int32 minLen, maxLen;
nsis_bzstream* strm = s->strm;
/* stuff that needs to be saved/restored */
Int32 i;
Int32 j;
Int32 t;
Int32 alphaSize;
Int32 nGroups;
Int32 nSelectors;
Int32 EOB;
Int32... | 247,643,639,653,253,030,000,000,000,000,000,000,000 | bzlib.c | 238,825,142,069,149,800,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2010-0405 | Integer overflow in the BZ2_decompress function in decompress.c in bzip2 and libbzip2 before 1.0.6 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted compressed file. | https://nvd.nist.gov/vuln/detail/CVE-2010-0405 |
432,657 | clamav-devel | fcd8091474d12592d509adcfd0bdd0b0dc8835f5 | https://github.com/vrtadmin/clamav-devel | http://git.clamav.net/gitweb?p=clamav-devel.git;a=commitdiff;h=fcd8091474d12592d509adcfd0bdd0b0dc8835f5#patch4 | bb#2230-2231 | 0 | static Int32 BZ2_decompress ( DState* s )
{
UChar uc;
Int32 retVal;
Int32 minLen, maxLen;
nsis_bzstream* strm = s->strm;
/* stuff that needs to be saved/restored */
Int32 i;
Int32 j;
Int32 t;
Int32 alphaSize;
Int32 nGroups;
Int32 nSelectors;
Int32 EOB;
Int32... | 13,569,368,283,627,490,000,000,000,000,000,000,000 | bzlib.c | 145,549,544,391,853,910,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2010-0405 | Integer overflow in the BZ2_decompress function in decompress.c in bzip2 and libbzip2 before 1.0.6 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted compressed file. | https://nvd.nist.gov/vuln/detail/CVE-2010-0405 |
210,334 | rsyslog | 80f88242982c9c6ad6ce8628fc5b94ea74051cf4 | https://github.com/rsyslog/rsyslog | http://git.adiscon.com/?p=rsyslog.git;a=commitdiff;h=80f88242982c9c6ad6ce8628fc5b94ea74051cf4 | bugfix: double-free in omelasticsearch
closes: http://bugzilla.adiscon.com/show_bug.cgi?id=461
Thanks to Marius Ionescu for providing a detailled bug report | 1 | writeDataError(instanceData *pData, cJSON **pReplyRoot, uchar *reqmsg)
{
char *rendered = NULL;
cJSON *errRoot;
cJSON *req;
cJSON *replyRoot = *pReplyRoot;
size_t toWrite;
ssize_t wrRet;
char errStr[1024];
DEFiRet;
if(pData->errorFile == NULL) {
DBGPRINTF("omelasticsearch: no local error logger defined - "
... | 312,907,250,668,103,950,000,000,000,000,000,000,000 | omelasticsearch.c | 259,192,936,442,456,940,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2013-4758 | Double free vulnerability in the writeDataError function in the ElasticSearch plugin (omelasticsearch) in rsyslog before 7.4.2 and before 7.5.2 devel, when errorfile is set to local logging, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted JSON response. | https://nvd.nist.gov/vuln/detail/CVE-2013-4758 |
433,054 | rsyslog | 80f88242982c9c6ad6ce8628fc5b94ea74051cf4 | https://github.com/rsyslog/rsyslog | http://git.adiscon.com/?p=rsyslog.git;a=commitdiff;h=80f88242982c9c6ad6ce8628fc5b94ea74051cf4 | bugfix: double-free in omelasticsearch
closes: http://bugzilla.adiscon.com/show_bug.cgi?id=461
Thanks to Marius Ionescu for providing a detailled bug report | 0 | writeDataError(instanceData *pData, cJSON **pReplyRoot, uchar *reqmsg)
{
char *rendered = NULL;
cJSON *errRoot;
cJSON *req;
cJSON *replyRoot = *pReplyRoot;
size_t toWrite;
ssize_t wrRet;
char errStr[1024];
DEFiRet;
if(pData->errorFile == NULL) {
DBGPRINTF("omelasticsearch: no local error logger defined - "
... | 180,324,763,999,765,960,000,000,000,000,000,000,000 | omelasticsearch.c | 215,397,383,686,055,030,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2013-4758 | Double free vulnerability in the writeDataError function in the ElasticSearch plugin (omelasticsearch) in rsyslog before 7.4.2 and before 7.5.2 devel, when errorfile is set to local logging, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted JSON response. | https://nvd.nist.gov/vuln/detail/CVE-2013-4758 |
210,368 | gnutls | bc8102405fda11ea00ca3b42acc4f4bce9d6e97b | http://git.savannah.gnu.org/cgit/gnutls | http://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commitdiff;h=bc8102405fda11ea00ca3b42acc4f4bce9d6e97b | Fix GNUTLS-SA-2008-1 security vulnerabilities.
See http://www.gnu.org/software/gnutls/security.html for updates. | 1 | _gnutls_server_name_recv_params (gnutls_session_t session,
const opaque * data, size_t _data_size)
{
int i;
const unsigned char *p;
uint16_t len, type;
ssize_t data_size = _data_size;
int server_names = 0;
if (session->security_parameters.entity == GNUTLS_SERVER)
{
DECR_LENGTH_RET (data_size... | 7,103,062,791,706,934,000,000,000,000,000,000,000 | ext_server_name.c | 199,837,538,380,095,700,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2008-1948 | The _gnutls_server_name_recv_params function in lib/ext_server_name.c in libgnutls in gnutls-serv in GnuTLS before 2.2.4 does not properly calculate the number of Server Names in a TLS 1.0 Client Hello message during extension handling, which allows remote attackers to cause a denial of service (crash) or possibly exec... | https://nvd.nist.gov/vuln/detail/CVE-2008-1948 |
433,461 | gnutls | bc8102405fda11ea00ca3b42acc4f4bce9d6e97b | http://git.savannah.gnu.org/cgit/gnutls | http://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commitdiff;h=bc8102405fda11ea00ca3b42acc4f4bce9d6e97b | Fix GNUTLS-SA-2008-1 security vulnerabilities.
See http://www.gnu.org/software/gnutls/security.html for updates. | 0 | _gnutls_server_name_recv_params (gnutls_session_t session,
const opaque * data, size_t _data_size)
{
int i;
const unsigned char *p;
uint16_t len, type;
ssize_t data_size = _data_size;
int server_names = 0;
if (session->security_parameters.entity == GNUTLS_SERVER)
{
DECR_LENGTH_RET (data_size... | 127,866,324,964,512,300,000,000,000,000,000,000,000 | ext_server_name.c | 225,121,716,342,688,630,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2008-1948 | The _gnutls_server_name_recv_params function in lib/ext_server_name.c in libgnutls in gnutls-serv in GnuTLS before 2.2.4 does not properly calculate the number of Server Names in a TLS 1.0 Client Hello message during extension handling, which allows remote attackers to cause a denial of service (crash) or possibly exec... | https://nvd.nist.gov/vuln/detail/CVE-2008-1948 |
210,374 | libssh-mirror | 245ad744b5ab0582fef7cf3905a717b791d7e08b | https://gitlab.com/libssh/libssh-mirror | https://gitlab.com/libssh/libssh-mirror/-/commit/245ad744b5ab0582fef7cf3905a717b791d7e08b | buffer: Add NULL check for 'buffer' argument
Signed-off-by: Andreas Schneider <asn@cryptomilk.org>
Reviewed-by: Anderson Toshiyuki Sasaki <ansasaki@redhat.com>
Reviewed-by: Jakub Jelen <jjelen@redhat.com> | 1 | int ssh_buffer_add_data(struct ssh_buffer_struct *buffer, const void *data, uint32_t len)
{
buffer_verify(buffer);
if (data == NULL) {
return -1;
}
if (buffer->used + len < len) {
return -1;
}
if (buffer->allocated < (buffer->used + len)) {
if (buffer->pos > 0) {
... | 224,364,779,780,704,800,000,000,000,000,000,000,000 | buffer.c | 17,820,760,082,920,600,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2020-16135 | libssh 0.9.4 has a NULL pointer dereference in tftpserver.c if ssh_buffer_new returns NULL. | https://nvd.nist.gov/vuln/detail/CVE-2020-16135 |
433,533 | libssh-mirror | 245ad744b5ab0582fef7cf3905a717b791d7e08b | https://gitlab.com/libssh/libssh-mirror | https://gitlab.com/libssh/libssh-mirror/-/commit/245ad744b5ab0582fef7cf3905a717b791d7e08b | buffer: Add NULL check for 'buffer' argument
Signed-off-by: Andreas Schneider <asn@cryptomilk.org>
Reviewed-by: Anderson Toshiyuki Sasaki <ansasaki@redhat.com>
Reviewed-by: Jakub Jelen <jjelen@redhat.com> | 0 | int ssh_buffer_add_data(struct ssh_buffer_struct *buffer, const void *data, uint32_t len)
{
if (buffer == NULL) {
return -1;
}
buffer_verify(buffer);
if (data == NULL) {
return -1;
}
if (buffer->used + len < len) {
return -1;
}
if (buffer->allocated < (buffer-... | 315,539,471,049,403,700,000,000,000,000,000,000,000 | buffer.c | 281,754,696,881,245,530,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2020-16135 | libssh 0.9.4 has a NULL pointer dereference in tftpserver.c if ssh_buffer_new returns NULL. | https://nvd.nist.gov/vuln/detail/CVE-2020-16135 |
210,375 | samba | f62683956a3b182f6a61cc7a2b4ada2e74cde243 | https://github.com/samba-team/samba | http://git.samba.org/?p=samba.git;a=commitdiff;h=f62683956a3b182f6a61cc7a2b4ada2e74cde243 | fail authentication for single group name which cannot be converted to sid
furthermore if more than one name is supplied and no sid is converted
then also fail.
Bug: https://bugzilla.samba.org/show_bug.cgi?id=8598
Signed-off-by: Noel Power <noel.power@suse.com>
Reviewed-by: Andreas Schneider <asn@samba.org>
Reviewed... | 1 | static bool winbind_name_list_to_sid_string_list(struct pwb_context *ctx,
const char *user,
const char *name_list,
char *sid_list_buffer,
int sid_list_buffer_size)
{
bool result = false;
char *current_name = NULL;
const char *search_location;
const char *comma;
int len;
if (sid_list_b... | 194,401,397,677,055,900,000,000,000,000,000,000,000 | pam_winbind.c | 115,365,620,274,780,780,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2012-6150 | The winbind_name_list_to_sid_string_list function in nsswitch/pam_winbind.c in Samba through 4.1.2 handles invalid require_membership_of group names by accepting authentication by any user, which allows remote authenticated users to bypass intended access restrictions in opportunistic circumstances by leveraging an adm... | https://nvd.nist.gov/vuln/detail/CVE-2012-6150 |
433,558 | samba | f62683956a3b182f6a61cc7a2b4ada2e74cde243 | https://github.com/samba-team/samba | http://git.samba.org/?p=samba.git;a=commitdiff;h=f62683956a3b182f6a61cc7a2b4ada2e74cde243 | fail authentication for single group name which cannot be converted to sid
furthermore if more than one name is supplied and no sid is converted
then also fail.
Bug: https://bugzilla.samba.org/show_bug.cgi?id=8598
Signed-off-by: Noel Power <noel.power@suse.com>
Reviewed-by: Andreas Schneider <asn@samba.org>
Reviewed... | 0 | static bool winbind_name_list_to_sid_string_list(struct pwb_context *ctx,
const char *user,
const char *name_list,
char *sid_list_buffer,
int sid_list_buffer_size)
{
bool result = false;
char *current_name = NULL;
const char *search_location;
const char *comma;
int len;
if (sid_list_b... | 193,801,961,881,879,450,000,000,000,000,000,000,000 | pam_winbind.c | 127,006,025,234,399,500,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2012-6150 | The winbind_name_list_to_sid_string_list function in nsswitch/pam_winbind.c in Samba through 4.1.2 handles invalid require_membership_of group names by accepting authentication by any user, which allows remote authenticated users to bypass intended access restrictions in opportunistic circumstances by leveraging an adm... | https://nvd.nist.gov/vuln/detail/CVE-2012-6150 |
210,377 | libtpms | c1f7bf55099fcd427715aa65e130475c6e836a6b | https://github.com/stefanberger/libtpms | https://github.com/stefanberger/libtpms/commit/c1f7bf55099fcd427715aa65e130475c6e836a6b | tpm2: Activate SEED_COMPAT_LEVEL_RSA_PRIME_ADJUST_FIX
Signed-off-by: Stefan Berger <stefanb@linux.ibm.com> | 1 | RsaAdjustPrimeCandidate(
bigNum prime,
SEED_COMPAT_LEVEL seedCompatLevel // IN: compatibility level; libtpms added
)
{
switch (seedCompatLevel) {
case SEED_COMPAT_LEVEL_ORIGINAL:
RsaAdjustPrimeCandidate_PreRev155(prime);
break;
/* case SEED_COMPAT_LEVEL_LAST: */
case S... | 145,725,535,557,125,850,000,000,000,000,000,000,000 | None | null | [
"CWE-331"
] | CVE-2021-3505 | A flaw was found in libtpms in versions before 0.8.0. The TPM 2 implementation returns 2048 bit keys with ~1984 bit strength due to a bug in the TCG specification. The bug is in the key creation algorithm in RsaAdjustPrimeCandidate(), which is called before the prime number check. The highest threat from this vulnerabi... | https://nvd.nist.gov/vuln/detail/CVE-2021-3505 |
433,561 | libtpms | c1f7bf55099fcd427715aa65e130475c6e836a6b | https://github.com/stefanberger/libtpms | https://github.com/stefanberger/libtpms/commit/c1f7bf55099fcd427715aa65e130475c6e836a6b | tpm2: Activate SEED_COMPAT_LEVEL_RSA_PRIME_ADJUST_FIX
Signed-off-by: Stefan Berger <stefanb@linux.ibm.com> | 0 | RsaAdjustPrimeCandidate(
bigNum prime,
SEED_COMPAT_LEVEL seedCompatLevel // IN: compatibility level; libtpms added
)
{
switch (seedCompatLevel) {
case SEED_COMPAT_LEVEL_ORIGINAL:
RsaAdjustPrimeCandidate_PreRev155(prime);
break;
case SEED_COMPAT_LEVEL_LAST:
/* case SEED... | 140,183,703,376,076,690,000,000,000,000,000,000,000 | None | null | [
"CWE-331"
] | CVE-2021-3505 | A flaw was found in libtpms in versions before 0.8.0. The TPM 2 implementation returns 2048 bit keys with ~1984 bit strength due to a bug in the TCG specification. The bug is in the key creation algorithm in RsaAdjustPrimeCandidate(), which is called before the prime number check. The highest threat from this vulnerabi... | https://nvd.nist.gov/vuln/detail/CVE-2021-3505 |
210,379 | libgd | ac16bdf2d41724b5a65255d4c28fb0ec46bc42f5 | https://github.com/libgd/libgd | https://github.com/libgd/libgd/commit/ac16bdf2d41724b5a65255d4c28fb0ec46bc42f5 | bmp: check return value in gdImageBmpPtr
Closes #447. | 1 | BGD_DECLARE(void *) gdImageBmpPtr(gdImagePtr im, int *size, int compression)
{
void *rv;
gdIOCtx *out = gdNewDynamicCtx(2048, NULL);
if (out == NULL) return NULL;
gdImageBmpCtx(im, out, compression);
rv = gdDPExtractData(out, size);
out->gd_free(out);
return rv;
} | 176,054,552,566,368,460,000,000,000,000,000,000,000 | gd_bmp.c | 159,906,135,342,070,200,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2018-1000222 | Libgd version 2.2.5 contains a Double Free Vulnerability vulnerability in gdImageBmpPtr Function that can result in Remote Code Execution . This attack appear to be exploitable via Specially Crafted Jpeg Image can trigger double free. This vulnerability appears to have been fixed in after commit ac16bdf2d41724b5a65255d... | https://nvd.nist.gov/vuln/detail/CVE-2018-1000222 |
433,583 | libgd | ac16bdf2d41724b5a65255d4c28fb0ec46bc42f5 | https://github.com/libgd/libgd | https://github.com/libgd/libgd/commit/ac16bdf2d41724b5a65255d4c28fb0ec46bc42f5 | bmp: check return value in gdImageBmpPtr
Closes #447. | 0 | BGD_DECLARE(void *) gdImageBmpPtr(gdImagePtr im, int *size, int compression)
{
void *rv;
gdIOCtx *out = gdNewDynamicCtx(2048, NULL);
if (out == NULL) return NULL;
if (!_gdImageBmpCtx(im, out, compression))
rv = gdDPExtractData(out, size);
else
rv = NULL;
out->gd_free(out);
return rv;
} | 231,574,579,295,097,320,000,000,000,000,000,000,000 | gd_bmp.c | 186,300,283,611,210,000,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2018-1000222 | Libgd version 2.2.5 contains a Double Free Vulnerability vulnerability in gdImageBmpPtr Function that can result in Remote Code Execution . This attack appear to be exploitable via Specially Crafted Jpeg Image can trigger double free. This vulnerability appears to have been fixed in after commit ac16bdf2d41724b5a65255d... | https://nvd.nist.gov/vuln/detail/CVE-2018-1000222 |
210,381 | linux | 23d2b94043ca8835bd1e67749020e839f396a1c2 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv4/igmp.c?h=v5.19&id=23d2b94043ca8835bd1e67749020e839f396a1c2 | igmp: Add ip_mc_list lock in ip_check_mc_rcu
I got below panic when doing fuzz test:
Kernel panic - not syncing: panic_on_warn set ...
CPU: 0 PID: 4056 Comm: syz-executor.3 Tainted: G B 5.14.0-rc1-00195-gcff5c4254439-dirty #2
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.12.0-59-gc9... | 1 | int ip_check_mc_rcu(struct in_device *in_dev, __be32 mc_addr, __be32 src_addr, u8 proto)
{
struct ip_mc_list *im;
struct ip_mc_list __rcu **mc_hash;
struct ip_sf_list *psf;
int rv = 0;
mc_hash = rcu_dereference(in_dev->mc_hash);
if (mc_hash) {
u32 hash = hash_32((__force u32)mc_addr, MC_HASH_SZ_LOG);
for (i... | 8,125,078,758,207,636,000,000,000,000,000,000,000 | igmp.c | 336,096,351,549,836,330,000,000,000,000,000,000,000 | [
"CWE-362"
] | CVE-2022-20141 | In ip_check_mc_rcu of igmp.c, there is a possible use after free due to improper locking. This could lead to local escalation of privilege when opening and closing inet sockets with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid... | https://nvd.nist.gov/vuln/detail/CVE-2022-20141 |
433,624 | linux | 23d2b94043ca8835bd1e67749020e839f396a1c2 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv4/igmp.c?h=v5.19&id=23d2b94043ca8835bd1e67749020e839f396a1c2 | igmp: Add ip_mc_list lock in ip_check_mc_rcu
I got below panic when doing fuzz test:
Kernel panic - not syncing: panic_on_warn set ...
CPU: 0 PID: 4056 Comm: syz-executor.3 Tainted: G B 5.14.0-rc1-00195-gcff5c4254439-dirty #2
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.12.0-59-gc9... | 0 | int ip_check_mc_rcu(struct in_device *in_dev, __be32 mc_addr, __be32 src_addr, u8 proto)
{
struct ip_mc_list *im;
struct ip_mc_list __rcu **mc_hash;
struct ip_sf_list *psf;
int rv = 0;
mc_hash = rcu_dereference(in_dev->mc_hash);
if (mc_hash) {
u32 hash = hash_32((__force u32)mc_addr, MC_HASH_SZ_LOG);
for (i... | 175,846,473,989,489,040,000,000,000,000,000,000,000 | igmp.c | 1,975,544,036,563,075,700,000,000,000,000,000,000 | [
"CWE-362"
] | CVE-2022-20141 | In ip_check_mc_rcu of igmp.c, there is a possible use after free due to improper locking. This could lead to local escalation of privilege when opening and closing inet sockets with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid... | https://nvd.nist.gov/vuln/detail/CVE-2022-20141 |
210,388 | flac | e1575e4a7c5157cbf4e4a16dbd39b74f7174c7be | https://github.com/xiph/flac | https://github.com/xiph/flac/commit/e1575e4a7c5157cbf4e4a16dbd39b74f7174c7be | libFlac: Exit at EOS in verify mode
When verify mode is enabled, once decoder flags end of stream,
encode processing is considered complete.
CVE-2021-0561
Signed-off-by: Ralph Giles <giles@thaumas.net> | 1 | FLAC__bool write_bitbuffer_(FLAC__StreamEncoder *encoder, uint32_t samples, FLAC__bool is_last_block)
{
const FLAC__byte *buffer;
size_t bytes;
FLAC__ASSERT(FLAC__bitwriter_is_byte_aligned(encoder->private_->frame));
if(!FLAC__bitwriter_get_buffer(encoder->private_->frame, &buffer, &bytes)) {
encoder->protected... | 38,184,929,412,741,905,000,000,000,000,000,000,000 | stream_encoder.c | 87,163,747,574,547,130,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2021-0561 | In append_to_verify_fifo_interleaved_ of stream_encoder.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID... | https://nvd.nist.gov/vuln/detail/CVE-2021-0561 |
433,877 | flac | e1575e4a7c5157cbf4e4a16dbd39b74f7174c7be | https://github.com/xiph/flac | https://github.com/xiph/flac/commit/e1575e4a7c5157cbf4e4a16dbd39b74f7174c7be | libFlac: Exit at EOS in verify mode
When verify mode is enabled, once decoder flags end of stream,
encode processing is considered complete.
CVE-2021-0561
Signed-off-by: Ralph Giles <giles@thaumas.net> | 0 | FLAC__bool write_bitbuffer_(FLAC__StreamEncoder *encoder, uint32_t samples, FLAC__bool is_last_block)
{
const FLAC__byte *buffer;
size_t bytes;
FLAC__ASSERT(FLAC__bitwriter_is_byte_aligned(encoder->private_->frame));
if(!FLAC__bitwriter_get_buffer(encoder->private_->frame, &buffer, &bytes)) {
encoder->protected... | 205,405,976,886,747,350,000,000,000,000,000,000,000 | stream_encoder.c | 323,886,197,295,671,070,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2021-0561 | In append_to_verify_fifo_interleaved_ of stream_encoder.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID... | https://nvd.nist.gov/vuln/detail/CVE-2021-0561 |
210,398 | linux | c03b04dcdba1da39903e23cc4d072abf8f68f2dd | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c03b04dcdba1da39903e23cc4d072abf8f68f2dd | crypto: user - fix memory leak in crypto_reportstat
In crypto_reportstat, a new skb is created by nlmsg_new(). This skb is
leaked if crypto_reportstat_alg() fails. Required release for skb is
added.
Fixes: cac5818c25d0 ("crypto: user - Implement a generic crypto statistics")
Cc: <stable@vger.kernel.org>
Signed-off-by... | 1 | int crypto_reportstat(struct sk_buff *in_skb, struct nlmsghdr *in_nlh,
struct nlattr **attrs)
{
struct net *net = sock_net(in_skb->sk);
struct crypto_user_alg *p = nlmsg_data(in_nlh);
struct crypto_alg *alg;
struct sk_buff *skb;
struct crypto_dump_info info;
int err;
if (!null_terminated(p->cru_name) ||... | 274,511,395,655,843,200,000,000,000,000,000,000,000 | crypto_user_stat.c | 19,953,345,961,113,840,000,000,000,000,000,000,000 | [
"CWE-284"
] | CVE-2019-19050 | A memory leak in the crypto_reportstat() function in crypto/crypto_user_stat.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering crypto_reportstat_alg() failures, aka CID-c03b04dcdba1. | https://nvd.nist.gov/vuln/detail/CVE-2019-19050 |
434,123 | linux | c03b04dcdba1da39903e23cc4d072abf8f68f2dd | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c03b04dcdba1da39903e23cc4d072abf8f68f2dd | crypto: user - fix memory leak in crypto_reportstat
In crypto_reportstat, a new skb is created by nlmsg_new(). This skb is
leaked if crypto_reportstat_alg() fails. Required release for skb is
added.
Fixes: cac5818c25d0 ("crypto: user - Implement a generic crypto statistics")
Cc: <stable@vger.kernel.org>
Signed-off-by... | 0 | int crypto_reportstat(struct sk_buff *in_skb, struct nlmsghdr *in_nlh,
struct nlattr **attrs)
{
struct net *net = sock_net(in_skb->sk);
struct crypto_user_alg *p = nlmsg_data(in_nlh);
struct crypto_alg *alg;
struct sk_buff *skb;
struct crypto_dump_info info;
int err;
if (!null_terminated(p->cru_name) ||... | 84,998,426,387,554,500,000,000,000,000,000,000,000 | crypto_user_stat.c | 151,131,700,475,336,330,000,000,000,000,000,000,000 | [
"CWE-284"
] | CVE-2019-19050 | A memory leak in the crypto_reportstat() function in crypto/crypto_user_stat.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering crypto_reportstat_alg() failures, aka CID-c03b04dcdba1. | https://nvd.nist.gov/vuln/detail/CVE-2019-19050 |
210,419 | qemu | d3b0db6dfea6b3a9ee0d96aceb796bdcafa84314 | https://github.com/bonzini/qemu | https://github.com/qemu/qemu/commit/d3b0db6dfea6b3a9ee0d96aceb796bdcafa84314 | vnc: Set default kbd delay to 10ms
The current VNC default keyboard delay is 1ms. With that we're constantly
typing faster than the guest receives keyboard events from an XHCI attached
USB HID device.
The default keyboard delay time in the input layer however is 10ms. I don't know
how that number came to be, but empi... | 1 | void vnc_display_open(const char *id, Error **errp)
{
VncDisplay *vd = vnc_display_find(id);
QemuOpts *opts = qemu_opts_find(&qemu_vnc_opts, id);
SocketAddress **saddr = NULL, **wsaddr = NULL;
size_t nsaddr, nwsaddr;
const char *share, *device_id;
QemuConsole *con;
bool password = false;
... | 2,365,794,417,096,471,200,000,000,000,000,000,000 | vnc.c | 34,646,637,285,590,230,000,000,000,000,000,000,000 | [
"CWE-772"
] | CVE-2017-8379 | Memory leak in the keyboard input event handlers support in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption) by rapidly generating large keyboard events. | https://nvd.nist.gov/vuln/detail/CVE-2017-8379 |
434,879 | qemu | d3b0db6dfea6b3a9ee0d96aceb796bdcafa84314 | https://github.com/bonzini/qemu | https://github.com/qemu/qemu/commit/d3b0db6dfea6b3a9ee0d96aceb796bdcafa84314 | vnc: Set default kbd delay to 10ms
The current VNC default keyboard delay is 1ms. With that we're constantly
typing faster than the guest receives keyboard events from an XHCI attached
USB HID device.
The default keyboard delay time in the input layer however is 10ms. I don't know
how that number came to be, but empi... | 0 | void vnc_display_open(const char *id, Error **errp)
{
VncDisplay *vd = vnc_display_find(id);
QemuOpts *opts = qemu_opts_find(&qemu_vnc_opts, id);
SocketAddress **saddr = NULL, **wsaddr = NULL;
size_t nsaddr, nwsaddr;
const char *share, *device_id;
QemuConsole *con;
bool password = false;
... | 172,865,088,081,872,760,000,000,000,000,000,000,000 | vnc.c | 174,019,351,814,316,620,000,000,000,000,000,000,000 | [
"CWE-772"
] | CVE-2017-8379 | Memory leak in the keyboard input event handlers support in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption) by rapidly generating large keyboard events. | https://nvd.nist.gov/vuln/detail/CVE-2017-8379 |
210,445 | kvm | e42d9b8141d1f54ff72ad3850bb110c95a5f3b88 | http://git.kernel.org/?p=linux/kernel/git/avi/kvm | http://git.kernel.org/?p=linux/kernel/git/avi/kvm.git;a=commitdiff;h=e42d9b8141d1f54ff72ad3850bb110c95a5f3b88 | KVM: x86 emulator: limit instructions to 15 bytes
While we are never normally passed an instruction that exceeds 15 bytes,
smp games can cause us to attempt to interpret one, which will cause
large latencies in non-preempt hosts.
Cc: stable@kernel.org
Signed-off-by: Avi Kivity <avi@redhat.com> | 1 | static int do_insn_fetch(struct x86_emulate_ctxt *ctxt,
struct x86_emulate_ops *ops,
unsigned long eip, void *dest, unsigned size)
{
int rc = 0;
eip += ctxt->cs_base;
while (size--) {
rc = do_fetch_insn_byte(ctxt, ops, eip++, dest++);
if (rc)
return rc;
}
return 0;
} | 333,135,580,300,206,920,000,000,000,000,000,000,000 | emulate.c | 227,848,514,845,098,450,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2009-4031 | The do_insn_fetch function in arch/x86/kvm/emulate.c in the x86 emulator in the KVM subsystem in the Linux kernel before 2.6.32-rc8-next-20091125 tries to interpret instructions that contain too many bytes to be valid, which allows guest OS users to cause a denial of service (increased scheduling latency) on the host O... | https://nvd.nist.gov/vuln/detail/CVE-2009-4031 |
435,250 | kvm | e42d9b8141d1f54ff72ad3850bb110c95a5f3b88 | http://git.kernel.org/?p=linux/kernel/git/avi/kvm | http://git.kernel.org/?p=linux/kernel/git/avi/kvm.git;a=commitdiff;h=e42d9b8141d1f54ff72ad3850bb110c95a5f3b88 | KVM: x86 emulator: limit instructions to 15 bytes
While we are never normally passed an instruction that exceeds 15 bytes,
smp games can cause us to attempt to interpret one, which will cause
large latencies in non-preempt hosts.
Cc: stable@kernel.org
Signed-off-by: Avi Kivity <avi@redhat.com> | 0 | static int do_insn_fetch(struct x86_emulate_ctxt *ctxt,
struct x86_emulate_ops *ops,
unsigned long eip, void *dest, unsigned size)
{
int rc = 0;
/* x86 instructions are limited to 15 bytes. */
if (eip + size - ctxt->decode.eip_orig > 15)
return X86EMUL_UNHANDLEABLE;
eip += ctxt->cs_base;
while (size--) ... | 148,760,003,775,527,480,000,000,000,000,000,000,000 | emulate.c | 251,720,107,621,944,100,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2009-4031 | The do_insn_fetch function in arch/x86/kvm/emulate.c in the x86 emulator in the KVM subsystem in the Linux kernel before 2.6.32-rc8-next-20091125 tries to interpret instructions that contain too many bytes to be valid, which allows guest OS users to cause a denial of service (increased scheduling latency) on the host O... | https://nvd.nist.gov/vuln/detail/CVE-2009-4031 |
210,446 | src | 9dcfda045474d8903224d175907bfc29761dcb45 | https://github.com/openbsd/src | https://github.com/openbsd/src/commit/9dcfda045474d8903224d175907bfc29761dcb45 | Fix a security vulnerability discovered by Qualys which can lead to a
privileges escalation on mbox deliveries and unprivileged code execution
on lmtp deliveries, due to a logic issue causing a sanity check to be
missed.
ok eric@, millert@ | 1 | smtp_mailaddr(struct mailaddr *maddr, char *line, int mailfrom, char **args,
const char *domain)
{
char *p, *e;
if (line == NULL)
return (0);
if (*line != '<')
return (0);
e = strchr(line, '>');
if (e == NULL)
return (0);
*e++ = '\0';
while (*e == ' ')
e++;
*args = e;
if (!text_to_mailaddr(ma... | 141,304,062,574,206,820,000,000,000,000,000,000,000 | smtp_session.c | 153,033,644,424,510,980,000,000,000,000,000,000,000 | [
"CWE-252"
] | CVE-2020-7247 | smtp_mailaddr in smtp_session.c in OpenSMTPD 6.6, as used in OpenBSD 6.6 and other products, allows remote attackers to execute arbitrary commands as root via a crafted SMTP session, as demonstrated by shell metacharacters in a MAIL FROM field. This affects the "uncommented" default configuration. The issue exists beca... | https://nvd.nist.gov/vuln/detail/CVE-2020-7247 |
435,287 | src | 9dcfda045474d8903224d175907bfc29761dcb45 | https://github.com/openbsd/src | https://github.com/openbsd/src/commit/9dcfda045474d8903224d175907bfc29761dcb45 | Fix a security vulnerability discovered by Qualys which can lead to a
privileges escalation on mbox deliveries and unprivileged code execution
on lmtp deliveries, due to a logic issue causing a sanity check to be
missed.
ok eric@, millert@ | 0 | smtp_mailaddr(struct mailaddr *maddr, char *line, int mailfrom, char **args,
const char *domain)
{
char *p, *e;
if (line == NULL)
return (0);
if (*line != '<')
return (0);
e = strchr(line, '>');
if (e == NULL)
return (0);
*e++ = '\0';
while (*e == ' ')
e++;
*args = e;
if (!text_to_mailaddr(ma... | 151,455,707,077,943,840,000,000,000,000,000,000,000 | smtp_session.c | 105,590,835,558,967,300,000,000,000,000,000,000,000 | [
"CWE-252"
] | CVE-2020-7247 | smtp_mailaddr in smtp_session.c in OpenSMTPD 6.6, as used in OpenBSD 6.6 and other products, allows remote attackers to execute arbitrary commands as root via a crafted SMTP session, as demonstrated by shell metacharacters in a MAIL FROM field. This affects the "uncommented" default configuration. The issue exists beca... | https://nvd.nist.gov/vuln/detail/CVE-2020-7247 |
210,447 | poppler | 0868c499a9f5f37f8df5c9fef03c37496b40fc8a | https://github.com/freedesktop/poppler | https://gitlab.freedesktop.org/poppler/poppler/commit/0868c499a9f5f37f8df5c9fef03c37496b40fc8a | Parser::makeStream: Fix potential integer overflow | 1 | Stream *Parser::makeStream(Object &&dict, Guchar *fileKey,
CryptAlgorithm encAlgorithm, int keyLength,
int objNum, int objGen, int recursion,
GBool strict) {
BaseStream *baseStr;
Stream *str;
Goffset length;
Goffset pos, endPos;
// get stream start position
lexer->ski... | 59,012,839,208,300,890,000,000,000,000,000,000,000 | Parser.cc | 17,534,089,413,943,530,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2018-21009 | Poppler before 0.66.0 has an integer overflow in Parser::makeStream in Parser.cc. | https://nvd.nist.gov/vuln/detail/CVE-2018-21009 |
435,357 | poppler | 0868c499a9f5f37f8df5c9fef03c37496b40fc8a | https://github.com/freedesktop/poppler | https://gitlab.freedesktop.org/poppler/poppler/commit/0868c499a9f5f37f8df5c9fef03c37496b40fc8a | Parser::makeStream: Fix potential integer overflow | 0 | Stream *Parser::makeStream(Object &&dict, Guchar *fileKey,
CryptAlgorithm encAlgorithm, int keyLength,
int objNum, int objGen, int recursion,
GBool strict) {
BaseStream *baseStr;
Stream *str;
Goffset length;
Goffset pos, endPos;
// get stream start position
lexer->ski... | 204,168,588,058,748,100,000,000,000,000,000,000,000 | Parser.cc | 118,848,543,205,689,940,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2018-21009 | Poppler before 0.66.0 has an integer overflow in Parser::makeStream in Parser.cc. | https://nvd.nist.gov/vuln/detail/CVE-2018-21009 |
210,449 | ImageMagick | a9d563d3d73874312080d30dc4ba07cecad56192 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/a9d563d3d73874312080d30dc4ba07cecad56192 | https://github.com/ImageMagick/ImageMagick/issues/1752 | 1 | static MagickBooleanType WriteOnePNGImage(MngInfo *mng_info,
const ImageInfo *IMimage_info,Image *IMimage,ExceptionInfo *exception)
{
char
im_vers[32],
libpng_runv[32],
libpng_vers[32],
zlib_runv[32],
zlib_vers[32];
Image
*image;
ImageInfo
*image_info;
char
*name,
s[2];
... | 59,678,560,232,203,390,000,000,000,000,000,000,000 | png.c | 115,612,592,373,662,040,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2020-27752 | A flaw was found in ImageMagick in MagickCore/quantum-private.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger a heap buffer overflow. This would most likely lead to an impact to application availability, but could potentially lead to an impact to data integrity as well. This fla... | https://nvd.nist.gov/vuln/detail/CVE-2020-27752 |
435,362 | ImageMagick | a9d563d3d73874312080d30dc4ba07cecad56192 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/a9d563d3d73874312080d30dc4ba07cecad56192 | https://github.com/ImageMagick/ImageMagick/issues/1752 | 0 | static MagickBooleanType WriteOnePNGImage(MngInfo *mng_info,
const ImageInfo *IMimage_info,Image *IMimage,ExceptionInfo *exception)
{
char
im_vers[32],
libpng_runv[32],
libpng_vers[32],
zlib_runv[32],
zlib_vers[32];
Image
*image;
ImageInfo
*image_info;
char
*name,
s[2];
... | 331,885,673,858,119,470,000,000,000,000,000,000,000 | png.c | 134,642,615,377,817,760,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2020-27752 | A flaw was found in ImageMagick in MagickCore/quantum-private.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger a heap buffer overflow. This would most likely lead to an impact to application availability, but could potentially lead to an impact to data integrity as well. This fla... | https://nvd.nist.gov/vuln/detail/CVE-2020-27752 |
210,465 | qpdf | b4d6cf6836ce025ba1811b7bbec52680c7204223 | https://github.com/qpdf/qpdf | https://github.com/qpdf/qpdf/commit/b4d6cf6836ce025ba1811b7bbec52680c7204223 | Limit depth of nesting in direct objects (fixes #202)
This fixes CVE-2018-9918. | 1 | QPDFObjectHandle::parseInternal(PointerHolder<InputSource> input,
std::string const& object_description,
QPDFTokenizer& tokenizer, bool& empty,
StringDecrypter* decrypter, QPDF* context,
bool ... | 311,880,694,560,904,500,000,000,000,000,000,000,000 | QPDFObjectHandle.cc | 188,563,030,210,717,900,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2018-9918 | libqpdf.a in QPDF through 8.0.2 mishandles certain "expected dictionary key but found non-name object" cases, allowing remote attackers to cause a denial of service (stack exhaustion), related to the QPDFObjectHandle and QPDF_Dictionary classes, because nesting in direct objects is not restricted. | https://nvd.nist.gov/vuln/detail/CVE-2018-9918 |
435,578 | qpdf | b4d6cf6836ce025ba1811b7bbec52680c7204223 | https://github.com/qpdf/qpdf | https://github.com/qpdf/qpdf/commit/b4d6cf6836ce025ba1811b7bbec52680c7204223 | Limit depth of nesting in direct objects (fixes #202)
This fixes CVE-2018-9918. | 0 | QPDFObjectHandle::parseInternal(PointerHolder<InputSource> input,
std::string const& object_description,
QPDFTokenizer& tokenizer, bool& empty,
StringDecrypter* decrypter, QPDF* context,
bool ... | 153,639,417,923,925,860,000,000,000,000,000,000,000 | QPDFObjectHandle.cc | 102,088,937,051,815,770,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2018-9918 | libqpdf.a in QPDF through 8.0.2 mishandles certain "expected dictionary key but found non-name object" cases, allowing remote attackers to cause a denial of service (stack exhaustion), related to the QPDFObjectHandle and QPDF_Dictionary classes, because nesting in direct objects is not restricted. | https://nvd.nist.gov/vuln/detail/CVE-2018-9918 |
210,466 | jasper | f94e7499a8b1471a4905c4f9c9e12e60fe88264b | https://github.com/mdadams/jasper | https://github.com/jasper-software/jasper/commit/f94e7499a8b1471a4905c4f9c9e12e60fe88264b | Fixes #269.
Added a check for an invalid component reference in the JP2 decoder.
Added a related test case for the JP2 codec. | 1 | jas_image_t *jp2_decode(jas_stream_t *in, const char *optstr)
{
jp2_box_t *box;
int found;
jas_image_t *image;
jp2_dec_t *dec;
bool samedtype;
int dtype;
unsigned int i;
jp2_cmap_t *cmapd;
jp2_pclr_t *pclrd;
jp2_cdef_t *cdefd;
unsigned int channo;
int newcmptno;
int_fast32_t *lutents;
#if 0
jp2_cdefchan_t... | 166,016,342,481,735,730,000,000,000,000,000,000,000 | jp2_dec.c | 195,046,608,507,291,000,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2021-3443 | A NULL pointer dereference flaw was found in the way Jasper versions before 2.0.27 handled component references in the JP2 image format decoder. A specially crafted JP2 image file could cause an application using the Jasper library to crash when opened. | https://nvd.nist.gov/vuln/detail/CVE-2021-3443 |
435,581 | jasper | f94e7499a8b1471a4905c4f9c9e12e60fe88264b | https://github.com/mdadams/jasper | https://github.com/jasper-software/jasper/commit/f94e7499a8b1471a4905c4f9c9e12e60fe88264b | Fixes #269.
Added a check for an invalid component reference in the JP2 decoder.
Added a related test case for the JP2 codec. | 0 | jas_image_t *jp2_decode(jas_stream_t *in, const char *optstr)
{
jp2_box_t *box;
int found;
jas_image_t *image;
jp2_dec_t *dec;
bool samedtype;
int dtype;
unsigned int i;
jp2_cmap_t *cmapd;
jp2_pclr_t *pclrd;
jp2_cdef_t *cdefd;
unsigned int channo;
int newcmptno;
int_fast32_t *lutents;
#if 0
jp2_cdefchan_t... | 281,877,865,075,484,060,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2021-3443 | A NULL pointer dereference flaw was found in the way Jasper versions before 2.0.27 handled component references in the JP2 image format decoder. A specially crafted JP2 image file could cause an application using the Jasper library to crash when opened. | https://nvd.nist.gov/vuln/detail/CVE-2021-3443 |
210,469 | rsyslog | 1ca6cc236d1dabf1633238b873fb1c057e52f95e | https://github.com/rsyslog/rsyslog | http://git.adiscon.com/?p=rsyslog.git;a=commitdiff;h=1ca6cc236d1dabf1633238b873fb1c057e52f95e | bugfix: off-by-one(two) bug in legacy syslog parser | 1 | int parseLegacySyslogMsg(msg_t *pMsg, int flags)
{
uchar *p2parse;
int lenMsg;
int i; /* general index for parsing */
uchar bufParseTAG[CONF_TAG_MAXSIZE];
uchar bufParseHOSTNAME[CONF_HOSTNAME_MAXSIZE];
BEGINfunc
assert(pMsg != NULL);
assert(pMsg->pszRawMsg != NULL);
lenMsg = pMsg->iLenRawMsg - pMsg->offAfterP... | 231,219,526,524,723,720,000,000,000,000,000,000,000 | syslogd.c | 279,411,370,050,215,070,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3200 | Stack-based buffer overflow in the parseLegacySyslogMsg function in tools/syslogd.c in rsyslogd in rsyslog 4.6.x before 4.6.8 and 5.2.0 through 5.8.4 might allow remote attackers to cause a denial of service (application exit) via a long TAG in a legacy syslog message. | https://nvd.nist.gov/vuln/detail/CVE-2011-3200 |
435,667 | rsyslog | 1ca6cc236d1dabf1633238b873fb1c057e52f95e | https://github.com/rsyslog/rsyslog | http://git.adiscon.com/?p=rsyslog.git;a=commitdiff;h=1ca6cc236d1dabf1633238b873fb1c057e52f95e | bugfix: off-by-one(two) bug in legacy syslog parser | 0 | int parseLegacySyslogMsg(msg_t *pMsg, int flags)
{
uchar *p2parse;
int lenMsg;
int i; /* general index for parsing */
uchar bufParseTAG[CONF_TAG_MAXSIZE];
uchar bufParseHOSTNAME[CONF_HOSTNAME_MAXSIZE];
BEGINfunc
assert(pMsg != NULL);
assert(pMsg->pszRawMsg != NULL);
lenMsg = pMsg->iLenRawMsg - pMsg->offAfterP... | 199,423,884,654,316,000,000,000,000,000,000,000,000 | syslogd.c | 286,093,375,285,138,000,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3200 | Stack-based buffer overflow in the parseLegacySyslogMsg function in tools/syslogd.c in rsyslogd in rsyslog 4.6.x before 4.6.8 and 5.2.0 through 5.8.4 might allow remote attackers to cause a denial of service (application exit) via a long TAG in a legacy syslog message. | https://nvd.nist.gov/vuln/detail/CVE-2011-3200 |
210,478 | oniguruma | cbe9f8bd9cfc6c3c87a60fbae58fa1a85db59df0 | https://github.com/kkos/oniguruma | https://github.com/kkos/oniguruma/commit/cbe9f8bd9cfc6c3c87a60fbae58fa1a85db59df0 | #207: Out-of-bounds write | 1 | concat_opt_exact_str(OptStr* to, UChar* s, UChar* end, OnigEncoding enc)
{
int i, j, len;
UChar *p;
for (i = to->len, p = s; p < end && i < OPT_EXACT_MAXLEN; ) {
len = enclen(enc, p);
if (i + len > OPT_EXACT_MAXLEN) break;
for (j = 0; j < len && p < end; j++)
to->s[i++] = *p++;
}
to->len =... | 90,044,858,076,413,870,000,000,000,000,000,000,000 | regcomp.c | 336,112,231,426,326,300,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2020-26159 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Further investigation showed that it was not a security issue. Notes: none | https://nvd.nist.gov/vuln/detail/CVE-2020-26159 |
435,930 | oniguruma | cbe9f8bd9cfc6c3c87a60fbae58fa1a85db59df0 | https://github.com/kkos/oniguruma | https://github.com/kkos/oniguruma/commit/cbe9f8bd9cfc6c3c87a60fbae58fa1a85db59df0 | #207: Out-of-bounds write | 0 | concat_opt_exact_str(OptStr* to, UChar* s, UChar* end, OnigEncoding enc)
{
int i, j, len;
UChar *p;
for (i = to->len, p = s; p < end && i < OPT_EXACT_MAXLEN; ) {
len = enclen(enc, p);
if (i + len >= OPT_EXACT_MAXLEN) break;
for (j = 0; j < len && p < end; j++)
to->s[i++] = *p++;
}
to->len ... | 114,862,701,799,109,220,000,000,000,000,000,000,000 | regcomp.c | 37,703,116,989,668,010,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2020-26159 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Further investigation showed that it was not a security issue. Notes: none | https://nvd.nist.gov/vuln/detail/CVE-2020-26159 |
210,485 | ceph | 2927fd91d41e505237cc73f9700e5c6a63e5cb4f | https://github.com/ceph/ceph | https://github.com/ceph/ceph/commit/2927fd91d41e505237cc73f9700e5c6a63e5cb4f | mon/MonClient: bring back CEPHX_V2 authorizer challenges
Commit c58c5754dfd2 ("msg/async/ProtocolV1: use AuthServer and
AuthClient") introduced a backwards compatibility issue into msgr1.
To fix it, commit 321548010578 ("mon/MonClient: skip CEPHX_V2
challenge if client doesn't support it") set out to skip authorizer
c... | 1 | int MonClient::handle_auth_request(
Connection *con,
AuthConnectionMeta *auth_meta,
bool more,
uint32_t auth_method,
const bufferlist& payload,
bufferlist *reply)
{
auth_meta->auth_mode = payload[0];
if (auth_meta->auth_mode < AUTH_MODE_AUTHORIZER ||
auth_meta->auth_mode > AUTH_MODE_AUTHORIZER_MAX... | 229,776,914,550,876,840,000,000,000,000,000,000,000 | MonClient.cc | 16,293,631,706,046,081,000,000,000,000,000,000,000 | [
"CWE-294"
] | CVE-2020-25660 | A flaw was found in the Cephx authentication protocol in versions before 15.2.6 and before 14.2.14, where it does not verify Ceph clients correctly and is then vulnerable to replay attacks in Nautilus. This flaw allows an attacker with access to the Ceph cluster network to authenticate with the Ceph service via a packe... | https://nvd.nist.gov/vuln/detail/CVE-2020-25660 |
436,191 | ceph | 2927fd91d41e505237cc73f9700e5c6a63e5cb4f | https://github.com/ceph/ceph | https://github.com/ceph/ceph/commit/2927fd91d41e505237cc73f9700e5c6a63e5cb4f | mon/MonClient: bring back CEPHX_V2 authorizer challenges
Commit c58c5754dfd2 ("msg/async/ProtocolV1: use AuthServer and
AuthClient") introduced a backwards compatibility issue into msgr1.
To fix it, commit 321548010578 ("mon/MonClient: skip CEPHX_V2
challenge if client doesn't support it") set out to skip authorizer
c... | 0 | int MonClient::handle_auth_request(
Connection *con,
AuthConnectionMeta *auth_meta,
bool more,
uint32_t auth_method,
const bufferlist& payload,
bufferlist *reply)
{
auth_meta->auth_mode = payload[0];
if (auth_meta->auth_mode < AUTH_MODE_AUTHORIZER ||
auth_meta->auth_mode > AUTH_MODE_AUTHORIZER_MAX... | 74,886,319,007,070,260,000,000,000,000,000,000,000 | MonClient.cc | 317,482,202,946,940,500,000,000,000,000,000,000,000 | [
"CWE-294"
] | CVE-2020-25660 | A flaw was found in the Cephx authentication protocol in versions before 15.2.6 and before 14.2.14, where it does not verify Ceph clients correctly and is then vulnerable to replay attacks in Nautilus. This flaw allows an attacker with access to the Ceph cluster network to authenticate with the Ceph service via a packe... | https://nvd.nist.gov/vuln/detail/CVE-2020-25660 |
210,503 | WavPack | 25b4a2725d8568212e7cf89ca05ca29d128af7ac | https://github.com/dbry/WavPack | https://github.com/dbry/WavPack/commit/25b4a2725d8568212e7cf89ca05ca29d128af7ac | issue #121: NULL pointer dereference in wvunpack.c
* check for NULL pointer before dereferencing in wvunpack.c
* sanitize custom extensions to be alphanumeric only | 1 | int main(int argc, char **argv)
#endif
{
#ifdef __EMX__ /* OS/2 */
_wildcard (&argc, &argv);
#endif
int verify_only = 0, error_count = 0, add_extension = 0, output_spec = 0, c_count = 0, x_count = 0;
char outpath, **matches = NULL, *outfilename = NULL, **argv_fn = NULL, selfname [PATH_MAX];
int use_stdi... | 94,524,686,230,113,410,000,000,000,000,000,000,000 | wvunpack.c | 324,509,323,720,796,100,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2022-2476 | A null pointer dereference bug was found in wavpack-5.4.0 The results from the ASAN log: AddressSanitizer:DEADLYSIGNAL ===================================================================84257==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x561b47a970c6 bp 0x7fff13952fb0 sp 0x7fff1394fca0 T0) ==84... | https://nvd.nist.gov/vuln/detail/CVE-2022-2476 |
436,626 | WavPack | 25b4a2725d8568212e7cf89ca05ca29d128af7ac | https://github.com/dbry/WavPack | https://github.com/dbry/WavPack/commit/25b4a2725d8568212e7cf89ca05ca29d128af7ac | issue #121: NULL pointer dereference in wvunpack.c
* check for NULL pointer before dereferencing in wvunpack.c
* sanitize custom extensions to be alphanumeric only | 0 | int main(int argc, char **argv)
#endif
{
#ifdef __EMX__ /* OS/2 */
_wildcard (&argc, &argv);
#endif
int verify_only = 0, error_count = 0, add_extension = 0, output_spec = 0, c_count = 0, x_count = 0;
char outpath, **matches = NULL, *outfilename = NULL, **argv_fn = NULL, selfname [PATH_MAX];
int use_stdi... | 199,682,968,919,041,650,000,000,000,000,000,000,000 | wvunpack.c | 289,620,808,346,216,300,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2022-2476 | A null pointer dereference bug was found in wavpack-5.4.0 The results from the ASAN log: AddressSanitizer:DEADLYSIGNAL ===================================================================84257==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x561b47a970c6 bp 0x7fff13952fb0 sp 0x7fff1394fca0 T0) ==84... | https://nvd.nist.gov/vuln/detail/CVE-2022-2476 |
210,504 | gimp | 87ba505fff85989af795f4ab6a047713f4d9381d | https://github.com/GNOME/gimp | https://git.gnome.org/browse/gimp/commit/?id=87ba505fff85989af795f4ab6a047713f4d9381d | Bug 790853 - (CVE-2017-17787) heap overread in psp importer.
As any external data, we have to check that strings being read at fixed
length are properly nul-terminated.
(cherry picked from commit eb2980683e6472aff35a3117587c4f814515c74d) | 1 | read_creator_block (FILE *f,
gint image_ID,
guint total_len,
PSPimage *ia)
{
long data_start;
guchar buf[4];
guint16 keyword;
guint32 length;
gchar *string;
gchar *title = NULL, *artist = NULL,... | 156,726,249,229,910,040,000,000,000,000,000,000,000 | file-psp.c | 320,030,247,955,093,700,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-17787 | In GIMP 2.8.22, there is a heap-based buffer over-read in read_creator_block in plug-ins/common/file-psp.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-17787 |
436,639 | gimp | 87ba505fff85989af795f4ab6a047713f4d9381d | https://github.com/GNOME/gimp | https://git.gnome.org/browse/gimp/commit/?id=87ba505fff85989af795f4ab6a047713f4d9381d | Bug 790853 - (CVE-2017-17787) heap overread in psp importer.
As any external data, we have to check that strings being read at fixed
length are properly nul-terminated.
(cherry picked from commit eb2980683e6472aff35a3117587c4f814515c74d) | 0 | read_creator_block (FILE *f,
gint image_ID,
guint total_len,
PSPimage *ia)
{
long data_start;
guchar buf[4];
guint16 keyword;
guint32 length;
gchar *string;
gchar *title = NULL, *artist = NULL,... | 16,804,399,721,761,698,000,000,000,000,000,000,000 | file-psp.c | 146,718,606,004,038,300,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-17787 | In GIMP 2.8.22, there is a heap-based buffer over-read in read_creator_block in plug-ins/common/file-psp.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-17787 |
210,512 | openj9 | 0971f22d88f42cf7332364ad7430e9bd8681c970 | https://github.com/eclipse/openj9 | https://github.com/eclipse/openj9/commit/0971f22d88f42cf7332364ad7430e9bd8681c970 | Clean up jio_snprintf and jio_vfprintf
Fixes https://bugs.eclipse.org/bugs/show_bug.cgi?id=543659
Signed-off-by: Peter Bain <peter_bain@ca.ibm.com> | 1 | jio_snprintf(char * str, int n, const char * format, ...)
{
va_list args;
int result;
Trc_SC_snprintf_Entry();
va_start(args, format);
#if defined(WIN32) && !defined(WIN32_IBMC)
result = _vsnprintf( str, n, format, args );
#else
result = vsprintf( str, format, args );
#endif
va_end(args);
Trc_SC_snprintf_Exi... | 2,142,351,738,345,462,800,000,000,000,000,000,000 | jvm.c | 106,120,005,172,370,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-12547 | In Eclipse OpenJ9, prior to the 0.12.0 release, the jio_snprintf() and jio_vsnprintf() native methods ignored the length parameter. This affects existing APIs that called the functions to exceed the allocated buffer. This functions were not directly callable by non-native user code. | https://nvd.nist.gov/vuln/detail/CVE-2018-12547 |
436,679 | openj9 | 0971f22d88f42cf7332364ad7430e9bd8681c970 | https://github.com/eclipse/openj9 | https://github.com/eclipse/openj9/commit/0971f22d88f42cf7332364ad7430e9bd8681c970 | Clean up jio_snprintf and jio_vfprintf
Fixes https://bugs.eclipse.org/bugs/show_bug.cgi?id=543659
Signed-off-by: Peter Bain <peter_bain@ca.ibm.com> | 0 | jio_snprintf(char * str, int n, const char * format, ...)
{
va_list args;
int result;
Trc_SC_snprintf_Entry();
va_start(args, format);
result = vsnprintf( str, n, format, args );
va_end(args);
Trc_SC_snprintf_Exit(result);
return result;
} | 49,247,309,423,598,390,000,000,000,000,000,000,000 | jvm.c | 319,787,002,951,176,100,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-12547 | In Eclipse OpenJ9, prior to the 0.12.0 release, the jio_snprintf() and jio_vsnprintf() native methods ignored the length parameter. This affects existing APIs that called the functions to exceed the allocated buffer. This functions were not directly callable by non-native user code. | https://nvd.nist.gov/vuln/detail/CVE-2018-12547 |
210,513 | openj9 | 0971f22d88f42cf7332364ad7430e9bd8681c970 | https://github.com/eclipse/openj9 | https://github.com/eclipse/openj9/commit/0971f22d88f42cf7332364ad7430e9bd8681c970 | Clean up jio_snprintf and jio_vfprintf
Fixes https://bugs.eclipse.org/bugs/show_bug.cgi?id=543659
Signed-off-by: Peter Bain <peter_bain@ca.ibm.com> | 1 | jio_vsnprintf(char * str, int n, const char * format, va_list args)
{
int result;
Trc_SC_vsnprintf_Entry(str, n, format);
#if defined(WIN32) && !defined(WIN32_IBMC)
result = _vsnprintf( str, n, format, args );
#else
result = vsprintf( str, format, args );
#endif
Trc_SC_vsnprintf_Exit(result);
return result;
... | 262,540,366,311,018,440,000,000,000,000,000,000,000 | jvm.c | 106,120,005,172,370,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-12547 | In Eclipse OpenJ9, prior to the 0.12.0 release, the jio_snprintf() and jio_vsnprintf() native methods ignored the length parameter. This affects existing APIs that called the functions to exceed the allocated buffer. This functions were not directly callable by non-native user code. | https://nvd.nist.gov/vuln/detail/CVE-2018-12547 |
436,693 | openj9 | 0971f22d88f42cf7332364ad7430e9bd8681c970 | https://github.com/eclipse/openj9 | https://github.com/eclipse/openj9/commit/0971f22d88f42cf7332364ad7430e9bd8681c970 | Clean up jio_snprintf and jio_vfprintf
Fixes https://bugs.eclipse.org/bugs/show_bug.cgi?id=543659
Signed-off-by: Peter Bain <peter_bain@ca.ibm.com> | 0 | jio_vsnprintf(char * str, int n, const char * format, va_list args)
{
int result;
Trc_SC_vsnprintf_Entry(str, n, format);
result = vsnprintf( str, n, format, args );
Trc_SC_vsnprintf_Exit(result);
return result;
} | 64,072,443,466,751,425,000,000,000,000,000,000,000 | jvm.c | 319,787,002,951,176,100,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-12547 | In Eclipse OpenJ9, prior to the 0.12.0 release, the jio_snprintf() and jio_vsnprintf() native methods ignored the length parameter. This affects existing APIs that called the functions to exceed the allocated buffer. This functions were not directly callable by non-native user code. | https://nvd.nist.gov/vuln/detail/CVE-2018-12547 |
210,514 | php-src | e3133e4db70476fb7adfdedb738483e2255ce0e1 | https://github.com/php/php-src | http://git.php.net/?p=php-src.git;a=commit;h=e3133e4db70476fb7adfdedb738483e2255ce0e1 | Fix bug #77630 - safer rename() procedure
In order to rename safer, we do the following:
- set umask to 077 (unfortunately, not TS, so excluding ZTS)
- chown() first, to set proper group before allowing group access
- chmod() after, even if chown() fails | 1 | static int php_plain_files_rename(php_stream_wrapper *wrapper, const char *url_from, const char *url_to, int options, php_stream_context *context)
{
int ret;
if (!url_from || !url_to) {
return 0;
}
#ifdef PHP_WIN32
if (!php_win32_check_trailing_space(url_from, (int)strlen(url_from))) {
php_win32_docref2_from_... | 255,636,755,210,108,350,000,000,000,000,000,000,000 | plain_wrapper.c | 303,598,361,813,887,120,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2019-9637 | An issue was discovered in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. Due to the way rename() across filesystems is implemented, it is possible that file being renamed is briefly available with wrong permissions while the rename is ongoing, thus enabling unauthorized users to access the data. | https://nvd.nist.gov/vuln/detail/CVE-2019-9637 |
436,814 | php-src | e3133e4db70476fb7adfdedb738483e2255ce0e1 | https://github.com/php/php-src | http://git.php.net/?p=php-src.git;a=commit;h=e3133e4db70476fb7adfdedb738483e2255ce0e1 | Fix bug #77630 - safer rename() procedure
In order to rename safer, we do the following:
- set umask to 077 (unfortunately, not TS, so excluding ZTS)
- chown() first, to set proper group before allowing group access
- chmod() after, even if chown() fails | 0 | static int php_plain_files_rename(php_stream_wrapper *wrapper, const char *url_from, const char *url_to, int options, php_stream_context *context)
{
int ret;
if (!url_from || !url_to) {
return 0;
}
#ifdef PHP_WIN32
if (!php_win32_check_trailing_space(url_from, (int)strlen(url_from))) {
php_win32_docref2_from_... | 21,128,849,710,332,652,000,000,000,000,000,000,000 | plain_wrapper.c | 45,061,774,360,165,170,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2019-9637 | An issue was discovered in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. Due to the way rename() across filesystems is implemented, it is possible that file being renamed is briefly available with wrong permissions while the rename is ongoing, thus enabling unauthorized users to access the data. | https://nvd.nist.gov/vuln/detail/CVE-2019-9637 |
210,517 | linux | 78beef629fd95be4ed853b2d37b832f766bd96ca | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/78beef629fd95be4ed853b2d37b832f766bd96ca | nfp: abm: fix memory leak in nfp_abm_u32_knode_replace
In nfp_abm_u32_knode_replace if the allocation for match fails it should
go to the error handling instead of returning. Updated other gotos to
have correct errno returned, too.
Signed-off-by: Navid Emamdoost <navid.emamdoost@gmail.com>
Signed-off-by: David S. Mil... | 1 | nfp_abm_u32_knode_replace(struct nfp_abm_link *alink,
struct tc_cls_u32_knode *knode,
__be16 proto, struct netlink_ext_ack *extack)
{
struct nfp_abm_u32_match *match = NULL, *iter;
unsigned int tos_off;
u8 mask, val;
int err;
if (!nfp_abm_u32_check_knode(alink->abm, knode, proto, extack))
goto err_del... | 38,475,255,137,401,277,000,000,000,000,000,000,000 | None | null | [
"CWE-401"
] | CVE-2019-19076 | A memory leak in the nfp_abm_u32_knode_replace() function in drivers/net/ethernet/netronome/nfp/abm/cls.c in the Linux kernel before 5.3.6 allows attackers to cause a denial of service (memory consumption), aka CID-78beef629fd9. NOTE: This has been argued as not a valid vulnerability. The upstream commit 78beef629fd9 w... | https://nvd.nist.gov/vuln/detail/CVE-2019-19076 |
436,952 | linux | 78beef629fd95be4ed853b2d37b832f766bd96ca | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/78beef629fd95be4ed853b2d37b832f766bd96ca | nfp: abm: fix memory leak in nfp_abm_u32_knode_replace
In nfp_abm_u32_knode_replace if the allocation for match fails it should
go to the error handling instead of returning. Updated other gotos to
have correct errno returned, too.
Signed-off-by: Navid Emamdoost <navid.emamdoost@gmail.com>
Signed-off-by: David S. Mil... | 0 | nfp_abm_u32_knode_replace(struct nfp_abm_link *alink,
struct tc_cls_u32_knode *knode,
__be16 proto, struct netlink_ext_ack *extack)
{
struct nfp_abm_u32_match *match = NULL, *iter;
unsigned int tos_off;
u8 mask, val;
int err;
if (!nfp_abm_u32_check_knode(alink->abm, knode, proto, extack)) {
err = -EOP... | 99,795,705,605,736,840,000,000,000,000,000,000,000 | None | null | [
"CWE-401"
] | CVE-2019-19076 | A memory leak in the nfp_abm_u32_knode_replace() function in drivers/net/ethernet/netronome/nfp/abm/cls.c in the Linux kernel before 5.3.6 allows attackers to cause a denial of service (memory consumption), aka CID-78beef629fd9. NOTE: This has been argued as not a valid vulnerability. The upstream commit 78beef629fd9 w... | https://nvd.nist.gov/vuln/detail/CVE-2019-19076 |
210,519 | git | 11a9f4d807a0d71dc6eff51bb87baf4ca2cccf1d | https://github.com/git/git | https://github.com/git/git/commit/11a9f4d807a0d71dc6eff51bb87baf4ca2cccf1d | is_ntfs_dotgit: use a size_t for traversing string
We walk through the "name" string using an int, which can
wrap to a negative value and cause us to read random memory
before our array (e.g., by creating a tree with a name >2GB,
since "int" is still 32 bits even on most 64-bit platforms).
Worse, this is easy to trigg... | 1 | int is_ntfs_dotgit(const char *name)
{
int len;
for (len = 0; ; len++)
if (!name[len] || name[len] == '\\' || is_dir_sep(name[len])) {
if (only_spaces_and_periods(name, len, 4) &&
!strncasecmp(name, ".git", 4))
return 1;
if (only_spaces_and_periods(name, len, 5) &&
!strncasecmp(name, "git~1", 5... | 84,362,902,177,719,920,000,000,000,000,000,000,000 | path.c | 35,906,032,303,632,690,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-11233 | In Git before 2.13.7, 2.14.x before 2.14.4, 2.15.x before 2.15.2, 2.16.x before 2.16.4, and 2.17.x before 2.17.1, code to sanity-check pathnames on NTFS can result in reading out-of-bounds memory. | https://nvd.nist.gov/vuln/detail/CVE-2018-11233 |
436,976 | git | 11a9f4d807a0d71dc6eff51bb87baf4ca2cccf1d | https://github.com/git/git | https://github.com/git/git/commit/11a9f4d807a0d71dc6eff51bb87baf4ca2cccf1d | is_ntfs_dotgit: use a size_t for traversing string
We walk through the "name" string using an int, which can
wrap to a negative value and cause us to read random memory
before our array (e.g., by creating a tree with a name >2GB,
since "int" is still 32 bits even on most 64-bit platforms).
Worse, this is easy to trigg... | 0 | int is_ntfs_dotgit(const char *name)
{
size_t len;
for (len = 0; ; len++)
if (!name[len] || name[len] == '\\' || is_dir_sep(name[len])) {
if (only_spaces_and_periods(name, len, 4) &&
!strncasecmp(name, ".git", 4))
return 1;
if (only_spaces_and_periods(name, len, 5) &&
!strncasecmp(name, "git~1"... | 222,406,651,544,159,380,000,000,000,000,000,000,000 | path.c | 96,967,443,447,295,980,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-11233 | In Git before 2.13.7, 2.14.x before 2.14.4, 2.15.x before 2.15.2, 2.16.x before 2.16.4, and 2.17.x before 2.17.1, code to sanity-check pathnames on NTFS can result in reading out-of-bounds memory. | https://nvd.nist.gov/vuln/detail/CVE-2018-11233 |
210,526 | php-src | b4e4788c4461449b4587e19ef1f474ce938e4980 | https://github.com/php/php-src | https://git.php.net/?p=php-src.git;a=commit;h=b4e4788c4461449b4587e19ef1f474ce938e4980 | Fix #76130: Heap Buffer Overflow (READ: 1786) in exif_iif_add_value
The MakerNote is not necessarily null-terminated, so we must not use
`strlen()` to avoid OOB reads. Instead `php_strnlen()` is the proper
way to handle this. | 1 | static void exif_iif_add_value(image_info_type *image_info, int section_index, char *name, int tag, int format, int length, void* value, int motorola_intel TSRMLS_DC)
{
size_t idex;
void *vptr;
image_info_value *info_value;
image_info_data *info_data;
image_info_data *list;
if (length < 0) {
return;
}
lis... | 339,056,924,582,709,400,000,000,000,000,000,000,000 | exif.c | 17,387,303,069,229,191,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-10549 | An issue was discovered in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. exif_read_data in ext/exif/exif.c has an out-of-bounds read for crafted JPEG data because exif_iif_add_value mishandles the case of a MakerNote that lacks a final '\0' character. | https://nvd.nist.gov/vuln/detail/CVE-2018-10549 |
437,000 | php-src | b4e4788c4461449b4587e19ef1f474ce938e4980 | https://github.com/php/php-src | https://git.php.net/?p=php-src.git;a=commit;h=b4e4788c4461449b4587e19ef1f474ce938e4980 | Fix #76130: Heap Buffer Overflow (READ: 1786) in exif_iif_add_value
The MakerNote is not necessarily null-terminated, so we must not use
`strlen()` to avoid OOB reads. Instead `php_strnlen()` is the proper
way to handle this. | 0 | static void exif_iif_add_value(image_info_type *image_info, int section_index, char *name, int tag, int format, int length, void* value, int motorola_intel TSRMLS_DC)
{
size_t idex;
void *vptr;
image_info_value *info_value;
image_info_data *info_data;
image_info_data *list;
if (length < 0) {
return;
}
lis... | 176,269,232,931,620,300,000,000,000,000,000,000,000 | exif.c | 234,617,860,043,523,420,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-10549 | An issue was discovered in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. exif_read_data in ext/exif/exif.c has an out-of-bounds read for crafted JPEG data because exif_iif_add_value mishandles the case of a MakerNote that lacks a final '\0' character. | https://nvd.nist.gov/vuln/detail/CVE-2018-10549 |
210,529 | libidn2 | 16853b6973a1e72fee2b7cccda85472cb9951305 | https://github.com/libidn/libidn2 | http://git.savannah.gnu.org/cgit/libidn/libidn2.git/commit/?h=libidn2-2.0.4&id=16853b6973a1e72fee2b7cccda85472cb9951305 | lib/bidi: Fix integer overflow (found by fuzzing) | 1 | _isBidi (const uint32_t *label, size_t llen)
{
while (llen-- > 0) {
int bc = uc_bidi_category (*label++);
if (bc == UC_BIDI_R || bc == UC_BIDI_AL || bc == UC_BIDI_AN)
return 1;
}
return 0;
} | 313,537,167,996,863,270,000,000,000,000,000,000,000 | bidi.c | 293,039,989,310,345,320,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2017-14061 | Integer overflow in the _isBidi function in bidi.c in Libidn2 before 2.0.4 allows remote attackers to cause a denial of service or possibly have unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2017-14061 |
437,015 | libidn2 | 16853b6973a1e72fee2b7cccda85472cb9951305 | https://github.com/libidn/libidn2 | http://git.savannah.gnu.org/cgit/libidn/libidn2.git/commit/?h=libidn2-2.0.4&id=16853b6973a1e72fee2b7cccda85472cb9951305 | lib/bidi: Fix integer overflow (found by fuzzing) | 0 | _isBidi (const uint32_t *label, size_t llen)
{
for (; (ssize_t) llen > 0; llen--) {
int bc = uc_bidi_category (*label++);
if (bc == UC_BIDI_R || bc == UC_BIDI_AL || bc == UC_BIDI_AN)
return 1;
}
return 0;
} | 97,267,727,213,124,710,000,000,000,000,000,000,000 | bidi.c | 219,508,461,817,742,530,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2017-14061 | Integer overflow in the _isBidi function in bidi.c in Libidn2 before 2.0.4 allows remote attackers to cause a denial of service or possibly have unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2017-14061 |
210,532 | libgd | 56ce6ef068b954ad28379e83cca04feefc51320c | https://github.com/libgd/libgd | https://github.com/libgd/libgd/commit/56ce6ef068b954ad28379e83cca04feefc51320c | Fix #381: libgd double-free vulnerability
The issue is that `gdImagePngCtxEx` (which is called by `gdImagePngPtr`
and the other PNG output functions to do the real work) does not return
whether it succeeded or failed, so this is not checked in
`gdImagePngPtr` and the function wrongly assumes everything is okay,
which ... | 1 | BGD_DECLARE(void *) gdImagePngPtr (gdImagePtr im, int *size)
{
void *rv;
gdIOCtx *out = gdNewDynamicCtx (2048, NULL);
if (out == NULL) return NULL;
gdImagePngCtxEx (im, out, -1);
rv = gdDPExtractData (out, size);
out->gd_free (out);
return rv;
} | 155,791,331,739,666,960,000,000,000,000,000,000,000 | None | null | [
"CWE-415"
] | CVE-2017-6362 | Double free vulnerability in the gdImagePngPtr function in libgd2 before 2.2.5 allows remote attackers to cause a denial of service via vectors related to a palette with no colors. | https://nvd.nist.gov/vuln/detail/CVE-2017-6362 |
437,030 | libgd | 56ce6ef068b954ad28379e83cca04feefc51320c | https://github.com/libgd/libgd | https://github.com/libgd/libgd/commit/56ce6ef068b954ad28379e83cca04feefc51320c | Fix #381: libgd double-free vulnerability
The issue is that `gdImagePngCtxEx` (which is called by `gdImagePngPtr`
and the other PNG output functions to do the real work) does not return
whether it succeeded or failed, so this is not checked in
`gdImagePngPtr` and the function wrongly assumes everything is okay,
which ... | 0 | BGD_DECLARE(void *) gdImagePngPtr (gdImagePtr im, int *size)
{
void *rv;
gdIOCtx *out = gdNewDynamicCtx (2048, NULL);
if (out == NULL) return NULL;
if (!_gdImagePngCtxEx (im, out, -1)) {
rv = gdDPExtractData (out, size);
} else {
rv = NULL;
}
out->gd_free (out);
return rv;
} | 242,124,031,100,998,220,000,000,000,000,000,000,000 | None | null | [
"CWE-415"
] | CVE-2017-6362 | Double free vulnerability in the gdImagePngPtr function in libgd2 before 2.2.5 allows remote attackers to cause a denial of service via vectors related to a palette with no colors. | https://nvd.nist.gov/vuln/detail/CVE-2017-6362 |
210,539 | linux | 5d407b071dc369c26a38398326ee2be53651cfe4 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5d407b071dc369c26a38398326ee2be53651cfe4 | ip: frags: fix crash in ip_do_fragment()
A kernel crash occurrs when defragmented packet is fragmented
in ip_do_fragment().
In defragment routine, skb_orphan() is called and
skb->ip_defrag_offset is set. but skb->sk and
skb->ip_defrag_offset are same union member. so that
frag->sk is not NULL.
Hence crash occurrs in s... | 1 | static int ip_frag_reasm(struct ipq *qp, struct sk_buff *skb,
struct sk_buff *prev_tail, struct net_device *dev)
{
struct net *net = container_of(qp->q.net, struct net, ipv4.frags);
struct iphdr *iph;
struct sk_buff *fp, *head = skb_rb_first(&qp->q.rb_fragments);
struct sk_buff **nextp; /* To build frag_list. *... | 203,191,410,963,687,260,000,000,000,000,000,000,000 | ip_fragment.c | 337,380,662,207,335,100,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2018-14641 | A security flaw was found in the ip_frag_reasm() function in net/ipv4/ip_fragment.c in the Linux kernel from 4.19-rc1 to 4.19-rc3 inclusive, which can cause a later system crash in ip_do_fragment(). With certain non-default, but non-rare, configuration of a victim host, an attacker can trigger this crash remotely, thus... | https://nvd.nist.gov/vuln/detail/CVE-2018-14641 |
437,106 | linux | 5d407b071dc369c26a38398326ee2be53651cfe4 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5d407b071dc369c26a38398326ee2be53651cfe4 | ip: frags: fix crash in ip_do_fragment()
A kernel crash occurrs when defragmented packet is fragmented
in ip_do_fragment().
In defragment routine, skb_orphan() is called and
skb->ip_defrag_offset is set. but skb->sk and
skb->ip_defrag_offset are same union member. so that
frag->sk is not NULL.
Hence crash occurrs in s... | 0 | static int ip_frag_reasm(struct ipq *qp, struct sk_buff *skb,
struct sk_buff *prev_tail, struct net_device *dev)
{
struct net *net = container_of(qp->q.net, struct net, ipv4.frags);
struct iphdr *iph;
struct sk_buff *fp, *head = skb_rb_first(&qp->q.rb_fragments);
struct sk_buff **nextp; /* To build frag_list. *... | 335,002,027,368,061,530,000,000,000,000,000,000,000 | ip_fragment.c | 145,317,037,223,021,030,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2018-14641 | A security flaw was found in the ip_frag_reasm() function in net/ipv4/ip_fragment.c in the Linux kernel from 4.19-rc1 to 4.19-rc3 inclusive, which can cause a later system crash in ip_do_fragment(). With certain non-default, but non-rare, configuration of a victim host, an attacker can trigger this crash remotely, thus... | https://nvd.nist.gov/vuln/detail/CVE-2018-14641 |
210,542 | openldap | 554dff1927176579d652f2fe60c90e9abbad4c65 | https://github.com/openldap/openldap | https://git.openldap.org/openldap/openldap/-/commit/554dff1927176579d652f2fe60c90e9abbad4c65 | ITS#9409 saslauthz: use slap_sl_free in prev commit | 1 | authzPrettyNormal(
struct berval *val,
struct berval *normalized,
void *ctx,
int normalize )
{
struct berval bv;
int rc = LDAP_INVALID_SYNTAX;
LDAPURLDesc *ludp = NULL;
char *lud_dn = NULL,
*lud_filter = NULL;
int scope = -1;
/*
* 1) <DN>
* 2) dn[.{exact|children|subtree|onelevel}]:{*|<DN>}
* 3... | 94,224,949,346,804,370,000,000,000,000,000,000,000 | saslauthz.c | 87,037,599,050,773,140,000,000,000,000,000,000,000 | [
"CWE-763"
] | CVE-2020-36224 | A flaw was discovered in OpenLDAP before 2.4.57 leading to an invalid pointer free and slapd crash in the saslAuthzTo processing, resulting in denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2020-36224 |
437,135 | openldap | 554dff1927176579d652f2fe60c90e9abbad4c65 | https://github.com/openldap/openldap | https://git.openldap.org/openldap/openldap/-/commit/554dff1927176579d652f2fe60c90e9abbad4c65 | ITS#9409 saslauthz: use slap_sl_free in prev commit | 0 | authzPrettyNormal(
struct berval *val,
struct berval *normalized,
void *ctx,
int normalize )
{
struct berval bv;
int rc = LDAP_INVALID_SYNTAX;
LDAPURLDesc *ludp = NULL;
char *lud_dn = NULL,
*lud_filter = NULL;
int scope = -1;
/*
* 1) <DN>
* 2) dn[.{exact|children|subtree|onelevel}]:{*|<DN>}
* 3... | 20,516,819,605,904,742,000,000,000,000,000,000,000 | saslauthz.c | 313,836,664,500,347,340,000,000,000,000,000,000,000 | [
"CWE-763"
] | CVE-2020-36224 | A flaw was discovered in OpenLDAP before 2.4.57 leading to an invalid pointer free and slapd crash in the saslAuthzTo processing, resulting in denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2020-36224 |
210,552 | ImageMagick | 73d59a74e0b0a864c1a9581b8a4bdbee427125e2 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/73d59a74e0b0a864c1a9581b8a4bdbee427125e2 | Different fix for #869. | 1 | static MagickBooleanType ReadPSDChannelZip(Image *image,const size_t channels,
const ssize_t type,const PSDCompressionType compression,
const size_t compact_size,ExceptionInfo *exception)
{
MagickBooleanType
status;
register unsigned char
*p;
size_t
count,
length,
packet_size,
row_si... | 271,235,547,887,400,670,000,000,000,000,000,000,000 | psd.c | 2,120,230,863,086,307,500,000,000,000,000,000,000 | [
"CWE-835"
] | CVE-2017-17681 | In ImageMagick 7.0.7-12 Q16, an infinite loop vulnerability was found in the function ReadPSDChannelZip in coders/psd.c, which allows attackers to cause a denial of service (CPU exhaustion) via a crafted psd image file. | https://nvd.nist.gov/vuln/detail/CVE-2017-17681 |
437,397 | ImageMagick | 73d59a74e0b0a864c1a9581b8a4bdbee427125e2 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/73d59a74e0b0a864c1a9581b8a4bdbee427125e2 | Different fix for #869. | 0 | static MagickBooleanType ReadPSDChannelZip(Image *image,const size_t channels,
const ssize_t type,const PSDCompressionType compression,
const size_t compact_size,ExceptionInfo *exception)
{
MagickBooleanType
status;
register unsigned char
*p;
size_t
count,
length,
packet_size,
row_si... | 803,553,221,321,863,000,000,000,000,000,000,000 | psd.c | 292,054,884,481,913,300,000,000,000,000,000,000,000 | [
"CWE-835"
] | CVE-2017-17681 | In ImageMagick 7.0.7-12 Q16, an infinite loop vulnerability was found in the function ReadPSDChannelZip in coders/psd.c, which allows attackers to cause a denial of service (CPU exhaustion) via a crafted psd image file. | https://nvd.nist.gov/vuln/detail/CVE-2017-17681 |
210,556 | jasper | 243749e5a6384acdb9f0a59515c0b85dfd62bd5b | https://github.com/mdadams/jasper | https://github.com/jasper-software/jasper/commit/243749e5a6384acdb9f0a59515c0b85dfd62bd5b | Check data in jas_image
Regarding CVE-2018-19539.
Fix by Markus Koschany <apo@debian.org>.
From https://gist.github.com/apoleon/7c0f3a0c28437c18fee8a51b1aa16164. | 1 | int jas_image_readcmpt(jas_image_t *image, int cmptno, jas_image_coord_t x,
jas_image_coord_t y, jas_image_coord_t width, jas_image_coord_t height,
jas_matrix_t *data)
{
jas_image_cmpt_t *cmpt;
jas_image_coord_t i;
jas_image_coord_t j;
int k;
jas_seqent_t v;
int c;
jas_seqent_t *dr;
jas_seqent_t *d;
int dr... | 235,415,273,753,495,400,000,000,000,000,000,000,000 | jas_image.c | 66,008,448,582,537,430,000,000,000,000,000,000,000 | [
"CWE-617"
] | CVE-2018-19539 | An issue was discovered in JasPer 2.0.14. There is an access violation in the function jas_image_readcmpt in libjasper/base/jas_image.c, leading to a denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2018-19539 |
437,418 | jasper | 243749e5a6384acdb9f0a59515c0b85dfd62bd5b | https://github.com/mdadams/jasper | https://github.com/jasper-software/jasper/commit/243749e5a6384acdb9f0a59515c0b85dfd62bd5b | Check data in jas_image
Regarding CVE-2018-19539.
Fix by Markus Koschany <apo@debian.org>.
From https://gist.github.com/apoleon/7c0f3a0c28437c18fee8a51b1aa16164. | 0 | int jas_image_readcmpt(jas_image_t *image, int cmptno, jas_image_coord_t x,
jas_image_coord_t y, jas_image_coord_t width, jas_image_coord_t height,
jas_matrix_t *data)
{
jas_image_cmpt_t *cmpt;
jas_image_coord_t i;
jas_image_coord_t j;
int k;
jas_seqent_t v;
int c;
jas_seqent_t *dr;
jas_seqent_t *d;
int dr... | 156,720,645,929,615,700,000,000,000,000,000,000,000 | jas_image.c | 38,488,163,436,135,200,000,000,000,000,000,000,000 | [
"CWE-617"
] | CVE-2018-19539 | An issue was discovered in JasPer 2.0.14. There is an access violation in the function jas_image_readcmpt in libjasper/base/jas_image.c, leading to a denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2018-19539 |
210,557 | libgcrypt | 88e1358962e902ff1cbec8d53ba3eee46407851a | https://github.com/gpg/libgcrypt | http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=88e1358962e902ff1cbec8d53ba3eee46407851a | ecc: Constant-time multiplication for Weierstrass curve.
* mpi/ec.c (_gcry_mpi_ec_mul_point): Use simple left-to-right binary
method for Weierstrass curve when SCALAR is secure. | 1 | _gcry_mpi_ec_mul_point (mpi_point_t result,
gcry_mpi_t scalar, mpi_point_t point,
mpi_ec_t ctx)
{
gcry_mpi_t x1, y1, z1, k, h, yy;
unsigned int i, loops;
mpi_point_struct p1, p2, p1inv;
if (ctx->model == MPI_EC_EDWARDS)
{
/* Simple left to right binary ... | 96,484,665,098,900,770,000,000,000,000,000,000,000 | ec.c | 266,548,225,885,337,300,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2015-7511 | Libgcrypt before 1.6.5 does not properly perform elliptic-point curve multiplication during decryption, which makes it easier for physically proximate attackers to extract ECDH keys by measuring electromagnetic emanations. | https://nvd.nist.gov/vuln/detail/CVE-2015-7511 |
437,428 | libgcrypt | 88e1358962e902ff1cbec8d53ba3eee46407851a | https://github.com/gpg/libgcrypt | http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=88e1358962e902ff1cbec8d53ba3eee46407851a | ecc: Constant-time multiplication for Weierstrass curve.
* mpi/ec.c (_gcry_mpi_ec_mul_point): Use simple left-to-right binary
method for Weierstrass curve when SCALAR is secure. | 0 | _gcry_mpi_ec_mul_point (mpi_point_t result,
gcry_mpi_t scalar, mpi_point_t point,
mpi_ec_t ctx)
{
gcry_mpi_t x1, y1, z1, k, h, yy;
unsigned int i, loops;
mpi_point_struct p1, p2, p1inv;
if (ctx->model == MPI_EC_EDWARDS
|| (ctx->model == MPI_EC_WEIERSTRASS
... | 22,093,000,753,631,443,000,000,000,000,000,000,000 | ec.c | 274,122,731,010,458,620,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2015-7511 | Libgcrypt before 1.6.5 does not properly perform elliptic-point curve multiplication during decryption, which makes it easier for physically proximate attackers to extract ECDH keys by measuring electromagnetic emanations. | https://nvd.nist.gov/vuln/detail/CVE-2015-7511 |
210,558 | gnutls | c8dcbedd1fdc312f5b1a70fcfbc1afe235d800cd | http://git.savannah.gnu.org/cgit/gnutls | https://gitorious.org/gnutls/gnutls/commit/c8dcbedd1fdc312f5b1a70fcfbc1afe235d800cd | Corrected bit disable (was flipping instead).
Initialy reported by Daniel Kahn Gillmor on 9/1/2008. Many thanks to
moog@sysdev.oucs.ox.ac.uk for bringing this into my attention. | 1 | _gnutls_x509_verify_certificate (const gnutls_x509_crt_t * certificate_list,
int clist_size,
const gnutls_x509_crt_t * trusted_cas,
int tcas_size,
const gnutls_x509_crl_t * CRLs,
int crls_size, unsigned int flags)
{
int i = 0, ret;
unsigned int status = 0, output;
if (clist_size > 1)
... | 128,222,427,146,858,530,000,000,000,000,000,000,000 | verify.c | 336,171,173,434,451,300,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2009-5138 | GnuTLS before 2.7.6, when the GNUTLS_VERIFY_ALLOW_X509_V1_CA_CRT flag is not enabled, treats version 1 X.509 certificates as intermediate CAs, which allows remote attackers to bypass intended restrictions by leveraging a X.509 V1 certificate from a trusted CA to issue new certificates, a different vulnerability than CV... | https://nvd.nist.gov/vuln/detail/CVE-2009-5138 |
437,432 | gnutls | c8dcbedd1fdc312f5b1a70fcfbc1afe235d800cd | http://git.savannah.gnu.org/cgit/gnutls | https://gitorious.org/gnutls/gnutls/commit/c8dcbedd1fdc312f5b1a70fcfbc1afe235d800cd | Corrected bit disable (was flipping instead).
Initialy reported by Daniel Kahn Gillmor on 9/1/2008. Many thanks to
moog@sysdev.oucs.ox.ac.uk for bringing this into my attention. | 0 | _gnutls_x509_verify_certificate (const gnutls_x509_crt_t * certificate_list,
int clist_size,
const gnutls_x509_crt_t * trusted_cas,
int tcas_size,
const gnutls_x509_crl_t * CRLs,
int crls_size, unsigned int flags)
{
int i = 0, ret;
unsigned int status = 0, output;
if (clist_size > 1)
... | 304,340,924,600,166,530,000,000,000,000,000,000,000 | verify.c | 123,819,562,112,045,400,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2009-5138 | GnuTLS before 2.7.6, when the GNUTLS_VERIFY_ALLOW_X509_V1_CA_CRT flag is not enabled, treats version 1 X.509 certificates as intermediate CAs, which allows remote attackers to bypass intended restrictions by leveraging a X.509 V1 certificate from a trusted CA to issue new certificates, a different vulnerability than CV... | https://nvd.nist.gov/vuln/detail/CVE-2009-5138 |
210,572 | teeworlds | ff254722a2683867fcb3e67569ffd36226c4bc62 | https://github.com/teeworlds/teeworlds | https://github.com/teeworlds/teeworlds/commit/ff254722a2683867fcb3e67569ffd36226c4bc62 | added some checks to snap handling | 1 | void CClient::ProcessServerPacket(CNetChunk *pPacket)
{
CUnpacker Unpacker;
Unpacker.Reset(pPacket->m_pData, pPacket->m_DataSize);
// unpack msgid and system flag
int Msg = Unpacker.GetInt();
int Sys = Msg&1;
Msg >>= 1;
if(Unpacker.Error())
return;
if(Sys)
{
// system message
if((pPacket->m_Flags&NET_... | 84,789,398,647,869,310,000,000,000,000,000,000,000 | client.cpp | 10,156,922,904,982,835,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2016-9400 | The CClient::ProcessServerPacket method in engine/client/client.cpp in Teeworlds before 0.6.4 allows remote servers to write to arbitrary physical memory locations and possibly execute arbitrary code via vectors involving snap handling. | https://nvd.nist.gov/vuln/detail/CVE-2016-9400 |
437,795 | teeworlds | ff254722a2683867fcb3e67569ffd36226c4bc62 | https://github.com/teeworlds/teeworlds | https://github.com/teeworlds/teeworlds/commit/ff254722a2683867fcb3e67569ffd36226c4bc62 | added some checks to snap handling | 0 | void CClient::ProcessServerPacket(CNetChunk *pPacket)
{
CUnpacker Unpacker;
Unpacker.Reset(pPacket->m_pData, pPacket->m_DataSize);
// unpack msgid and system flag
int Msg = Unpacker.GetInt();
int Sys = Msg&1;
Msg >>= 1;
if(Unpacker.Error())
return;
if(Sys)
{
// system message
if((pPacket->m_Flags&NET_... | 5,213,412,140,418,965,000,000,000,000,000,000,000 | client.cpp | 307,550,565,014,092,100,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2016-9400 | The CClient::ProcessServerPacket method in engine/client/client.cpp in Teeworlds before 0.6.4 allows remote servers to write to arbitrary physical memory locations and possibly execute arbitrary code via vectors involving snap handling. | https://nvd.nist.gov/vuln/detail/CVE-2016-9400 |
210,611 | php-src | 2aae60461c2ff7b7fbcdd194c789ac841d0747d7 | https://github.com/php/php-src | https://git.php.net/?p=php-src.git;a=commit;h=2aae60461c2ff7b7fbcdd194c789ac841d0747d7 | Fix bug #74145 - wddx parsing empty boolean tag leads to SIGSEGV | 1 | */
static void php_wddx_push_element(void *user_data, const XML_Char *name, const XML_Char **atts)
{
st_entry ent;
wddx_stack *stack = (wddx_stack *)user_data;
if (!strcmp(name, EL_PACKET)) {
int i;
if (atts) for (i=0; atts[i]; i++) {
if (!strcmp(atts[i], EL_VERSION)) {
/* nothing for now */
}
}
... | 246,936,064,889,369,220,000,000,000,000,000,000,000 | wddx.c | 207,088,785,218,292,450,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2017-11143 | In PHP before 5.6.31, an invalid free in the WDDX deserialization of boolean parameters could be used by attackers able to inject XML for deserialization to crash the PHP interpreter, related to an invalid free for an empty boolean element in ext/wddx/wddx.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-11143 |
438,530 | php-src | 2aae60461c2ff7b7fbcdd194c789ac841d0747d7 | https://github.com/php/php-src | https://git.php.net/?p=php-src.git;a=commit;h=2aae60461c2ff7b7fbcdd194c789ac841d0747d7 | Fix bug #74145 - wddx parsing empty boolean tag leads to SIGSEGV | 0 | */
static void php_wddx_push_element(void *user_data, const XML_Char *name, const XML_Char **atts)
{
st_entry ent;
wddx_stack *stack = (wddx_stack *)user_data;
if (!strcmp(name, EL_PACKET)) {
int i;
if (atts) for (i=0; atts[i]; i++) {
if (!strcmp(atts[i], EL_VERSION)) {
/* nothing for now */
}
}
... | 42,913,730,582,672,100,000,000,000,000,000,000,000 | wddx.c | 170,530,475,169,369,420,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2017-11143 | In PHP before 5.6.31, an invalid free in the WDDX deserialization of boolean parameters could be used by attackers able to inject XML for deserialization to crash the PHP interpreter, related to an invalid free for an empty boolean element in ext/wddx/wddx.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-11143 |
210,616 | ImageMagick | 4d6accd355119d54429a86a1859b8329f0130f30 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/4d6accd355119d54429a86a1859b8329f0130f30 | https://github.com/ImageMagick/ImageMagick/issues/902 | 1 | static MagickBooleanType WriteOnePNGImage(MngInfo *mng_info,
const ImageInfo *IMimage_info,Image *IMimage,ExceptionInfo *exception)
{
char
im_vers[32],
libpng_runv[32],
libpng_vers[32],
zlib_runv[32],
zlib_vers[32];
Image
*image;
ImageInfo
*image_info;
char
s[2];
const ch... | 173,680,363,862,618,570,000,000,000,000,000,000,000 | png.c | 35,193,305,938,881,377,000,000,000,000,000,000,000 | [
"CWE-772"
] | CVE-2017-17884 | In ImageMagick 7.0.7-16 Q16, a memory leak vulnerability was found in the function WriteOnePNGImage in coders/png.c, which allows attackers to cause a denial of service via a crafted PNG image file. | https://nvd.nist.gov/vuln/detail/CVE-2017-17884 |
438,627 | ImageMagick | 4d6accd355119d54429a86a1859b8329f0130f30 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/4d6accd355119d54429a86a1859b8329f0130f30 | https://github.com/ImageMagick/ImageMagick/issues/902 | 0 | static MagickBooleanType WriteOnePNGImage(MngInfo *mng_info,
const ImageInfo *IMimage_info,Image *IMimage,ExceptionInfo *exception)
{
char
im_vers[32],
libpng_runv[32],
libpng_vers[32],
zlib_runv[32],
zlib_vers[32];
Image
*image;
ImageInfo
*image_info;
char
s[2];
const ch... | 306,447,761,126,449,850,000,000,000,000,000,000,000 | png.c | 220,403,404,042,436,000,000,000,000,000,000,000,000 | [
"CWE-772"
] | CVE-2017-17884 | In ImageMagick 7.0.7-16 Q16, a memory leak vulnerability was found in the function WriteOnePNGImage in coders/png.c, which allows attackers to cause a denial of service via a crafted PNG image file. | https://nvd.nist.gov/vuln/detail/CVE-2017-17884 |
210,617 | linux | 65d8fc777f6dcfee12785c057a6b57f679641c90 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=65d8fc777f6dcfee12785c057a6b57f679641c90 | futex: Remove requirement for lock_page() in get_futex_key()
When dealing with key handling for shared futexes, we can drastically reduce
the usage/need of the page lock. 1) For anonymous pages, the associated futex
object is the mm_struct which does not require the page lock. 2) For inode
based, keys, we can check un... | 1 | get_futex_key(u32 __user *uaddr, int fshared, union futex_key *key, int rw)
{
unsigned long address = (unsigned long)uaddr;
struct mm_struct *mm = current->mm;
struct page *page;
struct address_space *mapping;
int err, ro = 0;
/*
* The futex address must be "naturally" aligned.
*/
key->both.offset = address... | 19,642,140,176,019,460,000,000,000,000,000,000,000 | futex.c | 282,399,043,380,026,000,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2018-9422 | In get_futex_key of futex.c, there is a use-after-free due to improper locking. This could lead to local escalation of privilege with no additional privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-74250718 References: Upstream kernel. | https://nvd.nist.gov/vuln/detail/CVE-2018-9422 |
438,649 | linux | 65d8fc777f6dcfee12785c057a6b57f679641c90 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=65d8fc777f6dcfee12785c057a6b57f679641c90 | futex: Remove requirement for lock_page() in get_futex_key()
When dealing with key handling for shared futexes, we can drastically reduce
the usage/need of the page lock. 1) For anonymous pages, the associated futex
object is the mm_struct which does not require the page lock. 2) For inode
based, keys, we can check un... | 0 | get_futex_key(u32 __user *uaddr, int fshared, union futex_key *key, int rw)
{
unsigned long address = (unsigned long)uaddr;
struct mm_struct *mm = current->mm;
struct page *page;
struct address_space *mapping;
int err, ro = 0;
/*
* The futex address must be "naturally" aligned.
*/
key->both.offset = address... | 236,780,225,531,477,680,000,000,000,000,000,000,000 | futex.c | 133,577,935,360,128,750,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2018-9422 | In get_futex_key of futex.c, there is a use-after-free due to improper locking. This could lead to local escalation of privilege with no additional privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-74250718 References: Upstream kernel. | https://nvd.nist.gov/vuln/detail/CVE-2018-9422 |
210,643 | php-src | 7edc639b9ff1c3576773d79d016abbeed1f93846 | https://github.com/php/php-src | http://git.php.net/?p=php-src.git;a=commit;h=7edc639b9ff1c3576773d79d016abbeed1f93846 | Fix #77020: null pointer dereference in imap_mail
If an empty $message is passed to imap_mail(), we must not set message
to NULL, since _php_imap_mail() is not supposed to handle NULL pointers
(opposed to pointers to NUL). | 1 | Send an email message */
PHP_FUNCTION(imap_mail)
{
char *to=NULL, *message=NULL, *headers=NULL, *subject=NULL, *cc=NULL, *bcc=NULL, *rpath=NULL;
int to_len, message_len, headers_len, subject_len, cc_len, bcc_len, rpath_len, argc = ZEND_NUM_ARGS();
if (zend_parse_parameters(argc TSRMLS_CC, "sss|ssss", &to, &to_le... | 114,415,428,187,691,870,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2018-19935 | ext/imap/php_imap.c in PHP 5.x and 7.x before 7.3.0 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an empty string in the message argument to the imap_mail function. | https://nvd.nist.gov/vuln/detail/CVE-2018-19935 |
438,971 | php-src | 7edc639b9ff1c3576773d79d016abbeed1f93846 | https://github.com/php/php-src | http://git.php.net/?p=php-src.git;a=commit;h=7edc639b9ff1c3576773d79d016abbeed1f93846 | Fix #77020: null pointer dereference in imap_mail
If an empty $message is passed to imap_mail(), we must not set message
to NULL, since _php_imap_mail() is not supposed to handle NULL pointers
(opposed to pointers to NUL). | 0 | Send an email message */
PHP_FUNCTION(imap_mail)
{
char *to=NULL, *message=NULL, *headers=NULL, *subject=NULL, *cc=NULL, *bcc=NULL, *rpath=NULL;
int to_len, message_len, headers_len, subject_len, cc_len, bcc_len, rpath_len, argc = ZEND_NUM_ARGS();
if (zend_parse_parameters(argc TSRMLS_CC, "sss|ssss", &to, &to_le... | 240,264,664,733,404,480,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2018-19935 | ext/imap/php_imap.c in PHP 5.x and 7.x before 7.3.0 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an empty string in the message argument to the imap_mail function. | https://nvd.nist.gov/vuln/detail/CVE-2018-19935 |
210,644 | flatpak | 9a61d2c44f0a58cebcb9b2787ae88db07ca68bb0 | https://github.com/flatpak/flatpak | https://github.com/flatpak/flatpak/commit/9a61d2c44f0a58cebcb9b2787ae88db07ca68bb0 | build: Convert environment into a sequence of bwrap arguments
This means we can systematically pass the environment variables
through bwrap(1), even if it is setuid and thus is filtering out
security-sensitive environment variables. bwrap itself ends up being
run with an empty environment instead.
This fixes a regres... | 1 | flatpak_builtin_build (int argc, char **argv, GCancellable *cancellable, GError **error)
{
g_autoptr(GOptionContext) context = NULL;
g_autoptr(FlatpakDeploy) runtime_deploy = NULL;
g_autoptr(GBytes) runtime_deploy_data = NULL;
g_autoptr(FlatpakDeploy) extensionof_deploy = NULL;
g_autoptr(GFile) var = NULL;
... | 102,010,712,262,707,530,000,000,000,000,000,000,000 | flatpak-builtins-build.c | 67,383,206,621,898,680,000,000,000,000,000,000,000 | [
"CWE-74"
] | CVE-2021-21261 | Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. A bug was discovered in the `flatpak-portal` service that can allow sandboxed applications to execute arbitrary code on the host system (a sandbox escape). This sandbox-escape bug is present in versions from 0.11.4 and ... | https://nvd.nist.gov/vuln/detail/CVE-2021-21261 |
438,981 | flatpak | 9a61d2c44f0a58cebcb9b2787ae88db07ca68bb0 | https://github.com/flatpak/flatpak | https://github.com/flatpak/flatpak/commit/9a61d2c44f0a58cebcb9b2787ae88db07ca68bb0 | build: Convert environment into a sequence of bwrap arguments
This means we can systematically pass the environment variables
through bwrap(1), even if it is setuid and thus is filtering out
security-sensitive environment variables. bwrap itself ends up being
run with an empty environment instead.
This fixes a regres... | 0 | flatpak_builtin_build (int argc, char **argv, GCancellable *cancellable, GError **error)
{
g_autoptr(GOptionContext) context = NULL;
g_autoptr(FlatpakDeploy) runtime_deploy = NULL;
g_autoptr(GBytes) runtime_deploy_data = NULL;
g_autoptr(FlatpakDeploy) extensionof_deploy = NULL;
g_autoptr(GFile) var = NULL;
... | 243,896,220,312,269,960,000,000,000,000,000,000,000 | flatpak-builtins-build.c | 64,099,142,116,874,890,000,000,000,000,000,000,000 | [
"CWE-74"
] | CVE-2021-21261 | Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. A bug was discovered in the `flatpak-portal` service that can allow sandboxed applications to execute arbitrary code on the host system (a sandbox escape). This sandbox-escape bug is present in versions from 0.11.4 and ... | https://nvd.nist.gov/vuln/detail/CVE-2021-21261 |
210,646 | openldap | d169e7958a3e0dc70f59c8374bf8a59833b7bdd8 | https://github.com/openldap/openldap | https://git.openldap.org/openldap/openldap/-/commit/d169e7958a3e0dc70f59c8374bf8a59833b7bdd8 | ITS#9413 fix slap_parse_user | 1 | int slap_parse_user( struct berval *id, struct berval *user,
struct berval *realm, struct berval *mech )
{
char u;
assert( id != NULL );
assert( !BER_BVISNULL( id ) );
assert( user != NULL );
assert( realm != NULL );
assert( mech != NULL );
u = id->bv_val[ 0 ];
if ( u != 'u' && u != 'U' ) {
/* called w... | 193,293,532,509,230,940,000,000,000,000,000,000,000 | saslauthz.c | 178,768,179,422,287,400,000,000,000,000,000,000,000 | [
"CWE-763"
] | CVE-2020-36224 | A flaw was discovered in OpenLDAP before 2.4.57 leading to an invalid pointer free and slapd crash in the saslAuthzTo processing, resulting in denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2020-36224 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.