idx
int64
project
string
commit_id
string
project_url
string
commit_url
string
commit_message
string
target
int64
func
string
func_hash
float64
file_name
string
file_hash
float64
cwe
list
cve
string
cve_desc
string
nvd_url
string
438,984
openldap
d169e7958a3e0dc70f59c8374bf8a59833b7bdd8
https://github.com/openldap/openldap
https://git.openldap.org/openldap/openldap/-/commit/d169e7958a3e0dc70f59c8374bf8a59833b7bdd8
ITS#9413 fix slap_parse_user
0
int slap_parse_user( struct berval *id, struct berval *user, struct berval *realm, struct berval *mech ) { char u; assert( id != NULL ); assert( !BER_BVISNULL( id ) ); assert( user != NULL ); assert( realm != NULL ); assert( mech != NULL ); u = id->bv_val[ 0 ]; if ( u != 'u' && u != 'U' ) { /* called w...
272,952,872,819,236,860,000,000,000,000,000,000,000
saslauthz.c
313,836,664,500,347,340,000,000,000,000,000,000,000
[ "CWE-763" ]
CVE-2020-36224
A flaw was discovered in OpenLDAP before 2.4.57 leading to an invalid pointer free and slapd crash in the saslAuthzTo processing, resulting in denial of service.
https://nvd.nist.gov/vuln/detail/CVE-2020-36224
210,647
linux
3a9b153c5591548612c3955c9600a98150c81875
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/3a9b153c5591548612c3955c9600a98150c81875
mwifiex: Fix possible buffer overflows in mwifiex_ret_wmm_get_status() mwifiex_ret_wmm_get_status() calls memcpy() without checking the destination size.Since the source is given from remote AP which contains illegal wmm elements , this may trigger a heap buffer overflow. Fix it by putting the length check before call...
1
int mwifiex_ret_wmm_get_status(struct mwifiex_private *priv, const struct host_cmd_ds_command *resp) { u8 *curr = (u8 *) &resp->params.get_wmm_status; uint16_t resp_len = le16_to_cpu(resp->size), tlv_len; int mask = IEEE80211_WMM_IE_AP_QOSINFO_PARAM_SET_CNT_MASK; bool valid = true; struct mwifiex_ie_typ...
155,821,006,638,101,020,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2020-12654
An issue was found in Linux kernel before 5.5.4. mwifiex_ret_wmm_get_status() in drivers/net/wireless/marvell/mwifiex/wmm.c allows a remote AP to trigger a heap-based buffer overflow because of an incorrect memcpy, aka CID-3a9b153c5591.
https://nvd.nist.gov/vuln/detail/CVE-2020-12654
439,001
linux
3a9b153c5591548612c3955c9600a98150c81875
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/3a9b153c5591548612c3955c9600a98150c81875
mwifiex: Fix possible buffer overflows in mwifiex_ret_wmm_get_status() mwifiex_ret_wmm_get_status() calls memcpy() without checking the destination size.Since the source is given from remote AP which contains illegal wmm elements , this may trigger a heap buffer overflow. Fix it by putting the length check before call...
0
int mwifiex_ret_wmm_get_status(struct mwifiex_private *priv, const struct host_cmd_ds_command *resp) { u8 *curr = (u8 *) &resp->params.get_wmm_status; uint16_t resp_len = le16_to_cpu(resp->size), tlv_len; int mask = IEEE80211_WMM_IE_AP_QOSINFO_PARAM_SET_CNT_MASK; bool valid = true; struct mwifiex_ie_typ...
42,803,343,887,989,735,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2020-12654
An issue was found in Linux kernel before 5.5.4. mwifiex_ret_wmm_get_status() in drivers/net/wireless/marvell/mwifiex/wmm.c allows a remote AP to trigger a heap-based buffer overflow because of an incorrect memcpy, aka CID-3a9b153c5591.
https://nvd.nist.gov/vuln/detail/CVE-2020-12654
210,648
libsoup
db2b0d5809d5f8226d47312b40992cadbcde439f
https://git.gnome.org/browse/libsoup
https://gitlab.gnome.org/GNOME/libsoup/commit/db2b0d5809d5f8226d47312b40992cadbcde439f
cookie-jar: bail if hostname is an empty string There are several other ways to fix the problem with this function, but skipping over all of the code is probably the simplest. Fixes #3
1
get_cookies (SoupCookieJar *jar, SoupURI *uri, gboolean for_http, gboolean copy_cookies) { SoupCookieJarPrivate *priv; GSList *cookies, *domain_cookies; char *domain, *cur, *next_domain; GSList *new_head, *cookies_to_remove = NULL, *p; priv = soup_cookie_jar_get_instance_private (jar); if (!uri->host) return ...
18,108,858,413,069,931,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2018-12910
The get_cookies function in soup-cookie-jar.c in libsoup 2.63.2 allows attackers to have unspecified impact via an empty hostname.
https://nvd.nist.gov/vuln/detail/CVE-2018-12910
439,036
libsoup
db2b0d5809d5f8226d47312b40992cadbcde439f
https://git.gnome.org/browse/libsoup
https://gitlab.gnome.org/GNOME/libsoup/commit/db2b0d5809d5f8226d47312b40992cadbcde439f
cookie-jar: bail if hostname is an empty string There are several other ways to fix the problem with this function, but skipping over all of the code is probably the simplest. Fixes #3
0
get_cookies (SoupCookieJar *jar, SoupURI *uri, gboolean for_http, gboolean copy_cookies) { SoupCookieJarPrivate *priv; GSList *cookies, *domain_cookies; char *domain, *cur, *next_domain; GSList *new_head, *cookies_to_remove = NULL, *p; priv = soup_cookie_jar_get_instance_private (jar); if (!uri->host || !uri->h...
42,318,093,975,771,455,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2018-12910
The get_cookies function in soup-cookie-jar.c in libsoup 2.63.2 allows attackers to have unspecified impact via an empty hostname.
https://nvd.nist.gov/vuln/detail/CVE-2018-12910
210,680
harfbuzz
63ef0b41dc48d6112d1918c1b1de9de8ea90adb5
https://github.com/behdad/harfbuzz
https://github.com/behdad/harfbuzz/commit/63ef0b41dc48d6112d1918c1b1de9de8ea90adb5
[ot-font] Fix hmtx wrong table length check Discovered by libFuzzer. Ouch! https://github.com/behdad/harfbuzz/issues/139#issuecomment-148289957
1
inline void init (hb_face_t *face, hb_tag_t _hea_tag, hb_tag_t _mtx_tag, unsigned int default_advance_) { this->default_advance = default_advance_; this->num_metrics = face->get_num_glyphs (); hb_blob_t *_hea_blob = OT::Sanitizer<OT::_hea>::sanitize (face->reference_table (_hea_tag)); c...
98,048,749,689,347,620,000,000,000,000,000,000,000
hb-ot-font.cc
75,698,621,442,136,280,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2016-2052
Multiple unspecified vulnerabilities in HarfBuzz before 1.0.6, as used in Google Chrome before 48.0.2564.82, allow attackers to cause a denial of service or possibly have other impact via crafted data, as demonstrated by a buffer over-read resulting from an inverted length check in hb-ot-font.cc, a different issue than...
https://nvd.nist.gov/vuln/detail/CVE-2016-2052
439,198
harfbuzz
63ef0b41dc48d6112d1918c1b1de9de8ea90adb5
https://github.com/behdad/harfbuzz
https://github.com/behdad/harfbuzz/commit/63ef0b41dc48d6112d1918c1b1de9de8ea90adb5
[ot-font] Fix hmtx wrong table length check Discovered by libFuzzer. Ouch! https://github.com/behdad/harfbuzz/issues/139#issuecomment-148289957
0
inline void init (hb_face_t *face, hb_tag_t _hea_tag, hb_tag_t _mtx_tag, unsigned int default_advance_) { this->default_advance = default_advance_; this->num_metrics = face->get_num_glyphs (); hb_blob_t *_hea_blob = OT::Sanitizer<OT::_hea>::sanitize (face->reference_table (_hea_tag)); c...
309,123,526,330,801,140,000,000,000,000,000,000,000
hb-ot-font.cc
107,832,708,563,582,020,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2016-2052
Multiple unspecified vulnerabilities in HarfBuzz before 1.0.6, as used in Google Chrome before 48.0.2564.82, allow attackers to cause a denial of service or possibly have other impact via crafted data, as demonstrated by a buffer over-read resulting from an inverted length check in hb-ot-font.cc, a different issue than...
https://nvd.nist.gov/vuln/detail/CVE-2016-2052
210,684
linux
7dc40713618c884bf07c030d1ab1f47a9dc1f310
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7dc40713618c884bf07c030d1ab1f47a9dc1f310
drm/i915: Introduce a mutex for file_priv->context_idr Define a mutex for the exclusive use of interacting with the per-file context-idr, that was previously guarded by struct_mutex. This allows us to reduce the coverage of struct_mutex, with a view to removing the last bits coordinating GEM context later. (In the sho...
1
int i915_gem_context_destroy_ioctl(struct drm_device *dev, void *data, struct drm_file *file) { struct drm_i915_gem_context_destroy *args = data; struct drm_i915_file_private *file_priv = file->driver_priv; struct i915_gem_context *ctx; int ret; if (args->pad != 0) return -EINVAL; if (args->ctx_id == D...
75,674,238,157,396,410,000,000,000,000,000,000,000
i915_gem_context.c
317,728,118,973,556,350,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2020-7053
In the Linux kernel 4.14 longterm through 4.14.165 and 4.19 longterm through 4.19.96 (and 5.x before 5.2), there is a use-after-free (write) in the i915_ppgtt_close function in drivers/gpu/drm/i915/i915_gem_gtt.c, aka CID-7dc40713618c. This is related to i915_gem_context_destroy_ioctl in drivers/gpu/drm/i915/i915_gem_c...
https://nvd.nist.gov/vuln/detail/CVE-2020-7053
439,211
linux
7dc40713618c884bf07c030d1ab1f47a9dc1f310
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7dc40713618c884bf07c030d1ab1f47a9dc1f310
drm/i915: Introduce a mutex for file_priv->context_idr Define a mutex for the exclusive use of interacting with the per-file context-idr, that was previously guarded by struct_mutex. This allows us to reduce the coverage of struct_mutex, with a view to removing the last bits coordinating GEM context later. (In the sho...
0
int i915_gem_context_destroy_ioctl(struct drm_device *dev, void *data, struct drm_file *file) { struct drm_i915_gem_context_destroy *args = data; struct drm_i915_file_private *file_priv = file->driver_priv; struct i915_gem_context *ctx; if (args->pad != 0) return -EINVAL; if (args->ctx_id == DEFAULT_CON...
103,386,436,299,816,360,000,000,000,000,000,000,000
i915_gem_context.c
195,496,235,253,545,530,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2020-7053
In the Linux kernel 4.14 longterm through 4.14.165 and 4.19 longterm through 4.19.96 (and 5.x before 5.2), there is a use-after-free (write) in the i915_ppgtt_close function in drivers/gpu/drm/i915/i915_gem_gtt.c, aka CID-7dc40713618c. This is related to i915_gem_context_destroy_ioctl in drivers/gpu/drm/i915/i915_gem_c...
https://nvd.nist.gov/vuln/detail/CVE-2020-7053
210,691
gnutls
328ee22c1b3951e060c7124c7cb1cee592c59bc0
http://git.savannah.gnu.org/cgit/gnutls
https://gitorious.org/gnutls/gnutls/commit/328ee22c1b3951e060c7124c7cb1cee592c59bc0
Fixes to avoid a timing attack in TLS CBC record parsing.
1
ciphertext_to_compressed (gnutls_session_t session, gnutls_datum_t *ciphertext, gnutls_datum_t * compressed, uint8_t type, record_parameters_st * params, uint64* sequence) { uint8_t tag[MAX_HASH_SIZE]; unsigned...
262,270,997,439,757,080,000,000,000,000,000,000,000
gnutls_cipher.c
330,738,802,630,868,640,000,000,000,000,000,000,000
[ "CWE-310" ]
CVE-2013-0169
The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and p...
https://nvd.nist.gov/vuln/detail/CVE-2013-0169
439,260
gnutls
328ee22c1b3951e060c7124c7cb1cee592c59bc0
http://git.savannah.gnu.org/cgit/gnutls
https://gitorious.org/gnutls/gnutls/commit/328ee22c1b3951e060c7124c7cb1cee592c59bc0
Fixes to avoid a timing attack in TLS CBC record parsing.
0
ciphertext_to_compressed (gnutls_session_t session, gnutls_datum_t *ciphertext, gnutls_datum_t * compressed, uint8_t type, record_parameters_st * params, uint64* sequence) { uint8_t tag[MAX_HASH_SIZE]; unsigned...
15,881,144,915,942,368,000,000,000,000,000,000,000
gnutls_cipher.c
28,246,248,741,942,423,000,000,000,000,000,000,000
[ "CWE-310" ]
CVE-2013-0169
The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and p...
https://nvd.nist.gov/vuln/detail/CVE-2013-0169
210,695
FreeRDP
3a06ce058f690b7fc1edad2f352c453376c2ebfe
https://github.com/FreeRDP/FreeRDP
https://github.com/FreeRDP/FreeRDP/commit/3a06ce058f690b7fc1edad2f352c453376c2ebfe
Fixed oob read in rfx_process_message_tileset Check input data length Thanks to hac425 CVE-2020-11043
1
static BOOL rfx_process_message_tileset(RFX_CONTEXT* context, RFX_MESSAGE* message, wStream* s, UINT16* pExpectedBlockType) { BOOL rc; int i, close_cnt; size_t pos; BYTE quant; RFX_TILE* tile; RFX_TILE** tmpTiles; UINT32* quants; UINT16 subtype, numTiles; UINT32 blockLen...
9,307,873,399,250,861,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2020-11043
In FreeRDP less than or equal to 2.0.0, there is an out-of-bounds read in rfx_process_message_tileset. Invalid data fed to RFX decoder results in garbage on screen (as colors). This has been patched in 2.1.0.
https://nvd.nist.gov/vuln/detail/CVE-2020-11043
439,285
FreeRDP
3a06ce058f690b7fc1edad2f352c453376c2ebfe
https://github.com/FreeRDP/FreeRDP
https://github.com/FreeRDP/FreeRDP/commit/3a06ce058f690b7fc1edad2f352c453376c2ebfe
Fixed oob read in rfx_process_message_tileset Check input data length Thanks to hac425 CVE-2020-11043
0
static BOOL rfx_process_message_tileset(RFX_CONTEXT* context, RFX_MESSAGE* message, wStream* s, UINT16* pExpectedBlockType) { BOOL rc; int i, close_cnt; BYTE quant; RFX_TILE* tile; RFX_TILE** tmpTiles; UINT32* quants; UINT16 subtype, numTiles; UINT32 blockLen; UINT32 blo...
327,472,799,383,194,870,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2020-11043
In FreeRDP less than or equal to 2.0.0, there is an out-of-bounds read in rfx_process_message_tileset. Invalid data fed to RFX decoder results in garbage on screen (as colors). This has been patched in 2.1.0.
https://nvd.nist.gov/vuln/detail/CVE-2020-11043
210,710
gimp
702c4227e8b6169f781e4bb5ae4b5733f51ab126
https://github.com/GNOME/gimp
https://git.gnome.org/browse/gimp/commit/?id=702c4227e8b6169f781e4bb5ae4b5733f51ab126
790783 - buffer overread in XCF parser if version field... ...has no null terminator Check for the presence of '\0' before using atoi() on the version string. Patch slightly modified (mitch).
1
xcf_load_stream (Gimp *gimp, GInputStream *input, GFile *input_file, GimpProgress *progress, GError **error) { XcfInfo info = { 0, }; const gchar *filename; GimpImage *image = NULL; gchar id[14]; gboole...
61,451,131,735,134,185,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2017-17788
In GIMP 2.8.22, there is a stack-based buffer over-read in xcf_load_stream in app/xcf/xcf.c when there is no '\0' character after the version string.
https://nvd.nist.gov/vuln/detail/CVE-2017-17788
439,544
gimp
702c4227e8b6169f781e4bb5ae4b5733f51ab126
https://github.com/GNOME/gimp
https://git.gnome.org/browse/gimp/commit/?id=702c4227e8b6169f781e4bb5ae4b5733f51ab126
790783 - buffer overread in XCF parser if version field... ...has no null terminator Check for the presence of '\0' before using atoi() on the version string. Patch slightly modified (mitch).
0
xcf_load_stream (Gimp *gimp, GInputStream *input, GFile *input_file, GimpProgress *progress, GError **error) { XcfInfo info = { 0, }; const gchar *filename; GimpImage *image = NULL; gchar id[14]; gboole...
79,866,368,478,830,490,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2017-17788
In GIMP 2.8.22, there is a stack-based buffer over-read in xcf_load_stream in app/xcf/xcf.c when there is no '\0' character after the version string.
https://nvd.nist.gov/vuln/detail/CVE-2017-17788
210,711
ImageMagick
31b842a218225cd7feddf65cbccf9d783c6cb526
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/31b842a218225cd7feddf65cbccf9d783c6cb526
https://github.com/ImageMagick/ImageMagick/issues/471
1
static Image *ReadXWDImage(const ImageInfo *image_info,ExceptionInfo *exception) { #define CheckOverflowException(length,width,height) \ (((height) != 0) && ((length)/((size_t) height) != ((size_t) width))) char *comment; Image *image; int x_status; MagickBooleanType authentic_colormap; ...
81,611,277,424,520,220,000,000,000,000,000,000,000
xwd.c
273,579,332,340,926,070,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2017-11166
The ReadXWDImage function in coders\xwd.c in ImageMagick 7.0.5-6 has a memory leak vulnerability that can cause memory exhaustion via a crafted length (number of color-map entries) field in the header of an XWD file.
https://nvd.nist.gov/vuln/detail/CVE-2017-11166
439,550
ImageMagick
31b842a218225cd7feddf65cbccf9d783c6cb526
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/31b842a218225cd7feddf65cbccf9d783c6cb526
https://github.com/ImageMagick/ImageMagick/issues/471
0
static Image *ReadXWDImage(const ImageInfo *image_info,ExceptionInfo *exception) { #define CheckOverflowException(length,width,height) \ (((height) != 0) && ((length)/((size_t) height) != ((size_t) width))) char *comment; Image *image; int x_status; MagickBooleanType authentic_colormap; ...
135,645,574,828,240,580,000,000,000,000,000,000,000
xwd.c
162,001,017,113,673,350,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2017-11166
The ReadXWDImage function in coders\xwd.c in ImageMagick 7.0.5-6 has a memory leak vulnerability that can cause memory exhaustion via a crafted length (number of color-map entries) field in the header of an XWD file.
https://nvd.nist.gov/vuln/detail/CVE-2017-11166
210,734
linux
9c0530e898f384c5d279bfcebd8bb17af1105873
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/9c0530e898f384c5d279bfcebd8bb17af1105873
iio: imu: adis16400: fix memory leak In adis_update_scan_mode_burst, if adis->buffer allocation fails release the adis->xfer. Signed-off-by: Navid Emamdoost <navid.emamdoost@gmail.com> Reviewed-by: Alexandru Ardelean <alexandru.ardelean@analog.com> Signed-off-by: Jonathan Cameron <Jonathan.Cameron@huawei.com>
1
static int adis_update_scan_mode_burst(struct iio_dev *indio_dev, const unsigned long *scan_mask) { struct adis *adis = iio_device_get_drvdata(indio_dev); unsigned int burst_length; u8 *tx; /* All but the timestamp channel */ burst_length = (indio_dev->num_channels - 1) * sizeof(u16); burst_length += adis->burs...
305,075,040,204,417,800,000,000,000,000,000,000,000
adis_buffer.c
162,105,516,053,392,100,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2019-19061
A memory leak in the adis_update_scan_mode_burst() function in drivers/iio/imu/adis_buffer.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-9c0530e898f3.
https://nvd.nist.gov/vuln/detail/CVE-2019-19061
439,820
linux
9c0530e898f384c5d279bfcebd8bb17af1105873
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/9c0530e898f384c5d279bfcebd8bb17af1105873
iio: imu: adis16400: fix memory leak In adis_update_scan_mode_burst, if adis->buffer allocation fails release the adis->xfer. Signed-off-by: Navid Emamdoost <navid.emamdoost@gmail.com> Reviewed-by: Alexandru Ardelean <alexandru.ardelean@analog.com> Signed-off-by: Jonathan Cameron <Jonathan.Cameron@huawei.com>
0
static int adis_update_scan_mode_burst(struct iio_dev *indio_dev, const unsigned long *scan_mask) { struct adis *adis = iio_device_get_drvdata(indio_dev); unsigned int burst_length; u8 *tx; /* All but the timestamp channel */ burst_length = (indio_dev->num_channels - 1) * sizeof(u16); burst_length += adis->burs...
256,927,841,529,125,500,000,000,000,000,000,000,000
adis_buffer.c
227,617,683,451,096,400,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2019-19061
A memory leak in the adis_update_scan_mode_burst() function in drivers/iio/imu/adis_buffer.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-9c0530e898f3.
https://nvd.nist.gov/vuln/detail/CVE-2019-19061
210,736
linux-stable
9d289715eb5c252ae15bd547cb252ca547a3c4f2
https://git.kernel.org/cgit/linux/kernel/git/stable/linux-stable
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git/commit/?id=9d289715eb5c252ae15bd547cb252ca547a3c4f2
ipv6: stop sending PTB packets for MTU < 1280 Reduce the attack vector and stop generating IPv6 Fragment Header for paths with an MTU smaller than the minimum required IPv6 MTU size (1280 byte) - called atomic fragments. See IETF I-D "Deprecating the Generation of IPv6 Atomic Fragments" [1] for more information and h...
1
static void ip6_rt_update_pmtu(struct dst_entry *dst, struct sock *sk, struct sk_buff *skb, u32 mtu) { struct rt6_info *rt6 = (struct rt6_info *)dst; dst_confirm(dst); if (mtu < dst_mtu(dst) && rt6->rt6i_dst.plen == 128) { struct net *net = dev_net(dst->dev); rt6->rt6i_flags |= RTF_MODIFIED; if (mt...
174,414,360,646,351,160,000,000,000,000,000,000,000
route.c
193,709,601,889,154,940,000,000,000,000,000,000,000
[ "CWE-17" ]
CVE-2016-10142
An issue was discovered in the IPv6 protocol specification, related to ICMP Packet Too Big (PTB) messages. (The scope of this CVE is all affected IPv6 implementations from all vendors.) The security implications of IP fragmentation have been discussed at length in [RFC6274] and [RFC7739]. An attacker can leverage the g...
https://nvd.nist.gov/vuln/detail/CVE-2016-10142
439,854
linux-stable
9d289715eb5c252ae15bd547cb252ca547a3c4f2
https://git.kernel.org/cgit/linux/kernel/git/stable/linux-stable
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git/commit/?id=9d289715eb5c252ae15bd547cb252ca547a3c4f2
ipv6: stop sending PTB packets for MTU < 1280 Reduce the attack vector and stop generating IPv6 Fragment Header for paths with an MTU smaller than the minimum required IPv6 MTU size (1280 byte) - called atomic fragments. See IETF I-D "Deprecating the Generation of IPv6 Atomic Fragments" [1] for more information and h...
0
static void ip6_rt_update_pmtu(struct dst_entry *dst, struct sock *sk, struct sk_buff *skb, u32 mtu) { struct rt6_info *rt6 = (struct rt6_info *)dst; dst_confirm(dst); if (mtu < dst_mtu(dst) && rt6->rt6i_dst.plen == 128) { struct net *net = dev_net(dst->dev); rt6->rt6i_flags |= RTF_MODIFIED; if (mt...
13,257,191,664,507,054,000,000,000,000,000,000,000
route.c
194,583,449,862,827,950,000,000,000,000,000,000,000
[ "CWE-17" ]
CVE-2016-10142
An issue was discovered in the IPv6 protocol specification, related to ICMP Packet Too Big (PTB) messages. (The scope of this CVE is all affected IPv6 implementations from all vendors.) The security implications of IP fragmentation have been discussed at length in [RFC6274] and [RFC7739]. An attacker can leverage the g...
https://nvd.nist.gov/vuln/detail/CVE-2016-10142
210,755
exiv2
35b3e596edacd2437c2c5d3dd2b5c9502626163d
https://github.com/Exiv2/exiv2
https://github.com/Exiv2/exiv2/commit/35b3e596edacd2437c2c5d3dd2b5c9502626163d
Add overflow & overread checks to PngChunk::parseTXTChunk() This function was creating a lot of new pointers and strings without properly checking the array bounds. This commit adds several calls to enforce(), making sure that the pointers stay within bounds. Strings are now created using the helper function string_fr...
1
DataBuf PngChunk::parseTXTChunk(const DataBuf& data, int keysize, TxtChunkType type) { DataBuf arr; if(type == zTXt_Chunk) { // Extract a deflate compressed Latin-1 text chunk /...
102,693,778,395,105,860,000,000,000,000,000,000,000
pngchunk_int.cpp
185,042,341,799,745,980,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-16336
Exiv2::Internal::PngChunk::parseTXTChunk in Exiv2 v0.26 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted image file, a different vulnerability than CVE-2018-10999.
https://nvd.nist.gov/vuln/detail/CVE-2018-16336
440,002
exiv2
35b3e596edacd2437c2c5d3dd2b5c9502626163d
https://github.com/Exiv2/exiv2
https://github.com/Exiv2/exiv2/commit/35b3e596edacd2437c2c5d3dd2b5c9502626163d
Add overflow & overread checks to PngChunk::parseTXTChunk() This function was creating a lot of new pointers and strings without properly checking the array bounds. This commit adds several calls to enforce(), making sure that the pointers stay within bounds. Strings are now created using the helper function string_fr...
0
DataBuf PngChunk::parseTXTChunk(const DataBuf& data, int keysize, TxtChunkType type) { DataBuf arr; if(type == zTXt_Chunk) { enforce(data.size_ >= Safe::add(keysize, 2), Exiv2::kerCorruptedM...
268,638,566,292,517,940,000,000,000,000,000,000,000
pngchunk_int.cpp
328,514,617,009,318,900,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-16336
Exiv2::Internal::PngChunk::parseTXTChunk in Exiv2 v0.26 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted image file, a different vulnerability than CVE-2018-10999.
https://nvd.nist.gov/vuln/detail/CVE-2018-16336
210,775
Pillow
f0436a4ddc954541fa10a531e2d9ea0c5ae2065d
https://github.com/python-pillow/Pillow
https://github.com/python-pillow/Pillow/commit/f0436a4ddc954541fa10a531e2d9ea0c5ae2065d
Adding support to reading tiled and YcbCr jpegs tiffs through libtiff
1
int ImagingLibTiffDecode(Imaging im, ImagingCodecState state, UINT8* buffer, int bytes) { TIFFSTATE *clientstate = (TIFFSTATE *)state->context; char *filename = "tempfile.tif"; char *mode = "r"; TIFF *tiff; tsize_t size; /* buffer is the encoded file, bytes is the length of the encoded file */ /* it all ends ...
223,926,933,369,589,500,000,000,000,000,000,000,000
TiffDecode.c
278,196,019,400,459,100,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2020-5310
libImaging/TiffDecode.c in Pillow before 6.2.2 has a TIFF decoding integer overflow, related to realloc.
https://nvd.nist.gov/vuln/detail/CVE-2020-5310
440,187
Pillow
f0436a4ddc954541fa10a531e2d9ea0c5ae2065d
https://github.com/python-pillow/Pillow
https://github.com/python-pillow/Pillow/commit/f0436a4ddc954541fa10a531e2d9ea0c5ae2065d
Adding support to reading tiled and YcbCr jpegs tiffs through libtiff
0
int ImagingLibTiffDecode(Imaging im, ImagingCodecState state, UINT8* buffer, int bytes) { TIFFSTATE *clientstate = (TIFFSTATE *)state->context; char *filename = "tempfile.tif"; char *mode = "r"; TIFF *tiff; /* buffer is the encoded file, bytes is the length of the encoded file */ /* it all ends up in state->bu...
275,742,772,401,580,630,000,000,000,000,000,000,000
TiffDecode.c
299,031,833,652,379,450,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2020-5310
libImaging/TiffDecode.c in Pillow before 6.2.2 has a TIFF decoding integer overflow, related to realloc.
https://nvd.nist.gov/vuln/detail/CVE-2020-5310
210,786
php-src
88412772d295ebf7dd34409534507dc9bcac726e
https://github.com/php/php-src
http://git.php.net/?p=php-src.git;a=commit;h=88412772d295ebf7dd34409534507dc9bcac726e
Fix bug #68027 - fix date parsing in XMLRPC lib
1
static int date_from_ISO8601 (const char *text, time_t * value) { struct tm tm; int n; int i; char buf[30]; if (strchr (text, '-')) { char *p = (char *) text, *p2 = buf; while (p && *p) { if (*p != '-') { *p2 = *p; p2++; if (p2-buf >= sizeof(buf)) { return -1; } } p++; ...
163,983,675,021,987,240,000,000,000,000,000,000,000
xmlrpc.c
234,677,002,503,400,700,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2014-3668
Buffer overflow in the date_from_ISO8601 function in the mkgmtime implementation in libxmlrpc/xmlrpc.c in the XMLRPC extension in PHP before 5.4.34, 5.5.x before 5.5.18, and 5.6.x before 5.6.2 allows remote attackers to cause a denial of service (application crash) via (1) a crafted first argument to the xmlrpc_set_typ...
https://nvd.nist.gov/vuln/detail/CVE-2014-3668
440,366
php-src
88412772d295ebf7dd34409534507dc9bcac726e
https://github.com/php/php-src
http://git.php.net/?p=php-src.git;a=commit;h=88412772d295ebf7dd34409534507dc9bcac726e
Fix bug #68027 - fix date parsing in XMLRPC lib
0
static int date_from_ISO8601 (const char *text, time_t * value) { struct tm tm; int n; int i; char buf[30]; if (strchr (text, '-')) { char *p = (char *) text, *p2 = buf; while (p && *p) { if (*p != '-') { *p2 = *p; p2++; if (p2-buf >= sizeof(buf)) { return -1; } } p++; ...
192,242,807,021,190,460,000,000,000,000,000,000,000
xmlrpc.c
138,148,577,125,016,510,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2014-3668
Buffer overflow in the date_from_ISO8601 function in the mkgmtime implementation in libxmlrpc/xmlrpc.c in the XMLRPC extension in PHP before 5.4.34, 5.5.x before 5.5.18, and 5.6.x before 5.6.2 allows remote attackers to cause a denial of service (application crash) via (1) a crafted first argument to the xmlrpc_set_typ...
https://nvd.nist.gov/vuln/detail/CVE-2014-3668
210,790
linux
24b9bf43e93e0edd89072da51cf1fab95fc69dec
https://github.com/torvalds/linux
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=24b9bf43e93e0edd89072da51cf1fab95fc69dec
net: fix for a race condition in the inet frag code I stumbled upon this very serious bug while hunting for another one, it's a very subtle race condition between inet_frag_evictor, inet_frag_intern and the IPv4/6 frag_queue and expire functions (basically the users of inet_frag_kill/inet_frag_put). What happens is t...
1
static struct inet_frag_queue *inet_frag_intern(struct netns_frags *nf, struct inet_frag_queue *qp_in, struct inet_frags *f, void *arg) { struct inet_frag_bucket *hb; struct inet_frag_queue *qp; unsigned int hash; read_lock(&f->lock); /* Protects against hash rebuild */ /* * While we stayed w/o the lock oth...
271,749,817,754,328,170,000,000,000,000,000,000,000
inet_fragment.c
113,115,817,609,544,710,000,000,000,000,000,000,000
[ "CWE-362" ]
CVE-2014-0100
Race condition in the inet_frag_intern function in net/ipv4/inet_fragment.c in the Linux kernel through 3.13.6 allows remote attackers to cause a denial of service (use-after-free error) or possibly have unspecified other impact via a large series of fragmented ICMP Echo Request packets to a system with a heavy CPU loa...
https://nvd.nist.gov/vuln/detail/CVE-2014-0100
440,472
linux
24b9bf43e93e0edd89072da51cf1fab95fc69dec
https://github.com/torvalds/linux
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=24b9bf43e93e0edd89072da51cf1fab95fc69dec
net: fix for a race condition in the inet frag code I stumbled upon this very serious bug while hunting for another one, it's a very subtle race condition between inet_frag_evictor, inet_frag_intern and the IPv4/6 frag_queue and expire functions (basically the users of inet_frag_kill/inet_frag_put). What happens is t...
0
static struct inet_frag_queue *inet_frag_intern(struct netns_frags *nf, struct inet_frag_queue *qp_in, struct inet_frags *f, void *arg) { struct inet_frag_bucket *hb; struct inet_frag_queue *qp; unsigned int hash; read_lock(&f->lock); /* Protects against hash rebuild */ /* * While we stayed w/o the lock oth...
131,167,594,820,248,600,000,000,000,000,000,000,000
inet_fragment.c
158,531,526,244,457,740,000,000,000,000,000,000,000
[ "CWE-362" ]
CVE-2014-0100
Race condition in the inet_frag_intern function in net/ipv4/inet_fragment.c in the Linux kernel through 3.13.6 allows remote attackers to cause a denial of service (use-after-free error) or possibly have unspecified other impact via a large series of fragmented ICMP Echo Request packets to a system with a heavy CPU loa...
https://nvd.nist.gov/vuln/detail/CVE-2014-0100
210,795
ImageMagick
ab3e2be9b387919ef5c25977c4c054fb9dc089a6
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/ab3e2be9b387919ef5c25977c4c054fb9dc089a6
https://github.com/ImageMagick/ImageMagick/issues/1546
1
static Image *ReadXWDImage(const ImageInfo *image_info,ExceptionInfo *exception) { #define CheckOverflowException(length,width,height) \ (((height) != 0) && ((length)/((size_t) height) != ((size_t) width))) char *comment; Image *image; int x_status; MagickBooleanType authentic_colormap; ...
306,751,056,718,789,700,000,000,000,000,000,000,000
xwd.c
99,375,994,807,052,150,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2019-11472
ReadXWDImage in coders/xwd.c in the XWD image parsing component of ImageMagick 7.0.8-41 Q16 allows attackers to cause a denial-of-service (divide-by-zero error) by crafting an XWD image file in which the header indicates neither LSB first nor MSB first.
https://nvd.nist.gov/vuln/detail/CVE-2019-11472
440,494
ImageMagick
ab3e2be9b387919ef5c25977c4c054fb9dc089a6
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/ab3e2be9b387919ef5c25977c4c054fb9dc089a6
https://github.com/ImageMagick/ImageMagick/issues/1546
0
static Image *ReadXWDImage(const ImageInfo *image_info,ExceptionInfo *exception) { #define CheckOverflowException(length,width,height) \ (((height) != 0) && ((length)/((size_t) height) != ((size_t) width))) char *comment; Image *image; int x_status; MagickBooleanType authentic_colormap; ...
202,562,342,284,838,550,000,000,000,000,000,000,000
xwd.c
281,143,060,114,832,480,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2019-11472
ReadXWDImage in coders/xwd.c in the XWD image parsing component of ImageMagick 7.0.8-41 Q16 allows attackers to cause a denial-of-service (divide-by-zero error) by crafting an XWD image file in which the header indicates neither LSB first nor MSB first.
https://nvd.nist.gov/vuln/detail/CVE-2019-11472
210,798
linux
e13de8fe0d6a51341671bbe384826d527afe8d44
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/e13de8fe0d6a51341671bbe384826d527afe8d44
of: unittest: fix memory leak in unittest_data_add In unittest_data_add, a copy buffer is created via kmemdup. This buffer is leaked if of_fdt_unflatten_tree fails. The release for the unittest_data buffer is added. Fixes: b951f9dc7f25 ("Enabling OF selftest to run without machine's devicetree") Signed-off-by: Navid ...
1
static int __init unittest_data_add(void) { void *unittest_data; struct device_node *unittest_data_node, *np; /* * __dtb_testcases_begin[] and __dtb_testcases_end[] are magically * created by cmd_dt_S_dtb in scripts/Makefile.lib */ extern uint8_t __dtb_testcases_begin[]; extern uint8_t __dtb_testcases_end[];...
119,259,683,763,872,250,000,000,000,000,000,000,000
unittest.c
101,925,025,252,480,640,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2019-19049
A memory leak in the unittest_data_add() function in drivers/of/unittest.c in the Linux kernel before 5.3.10 allows attackers to cause a denial of service (memory consumption) by triggering of_fdt_unflatten_tree() failures, aka CID-e13de8fe0d6a. NOTE: third parties dispute the relevance of this because unittest.c can o...
https://nvd.nist.gov/vuln/detail/CVE-2019-19049
440,617
linux
e13de8fe0d6a51341671bbe384826d527afe8d44
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/e13de8fe0d6a51341671bbe384826d527afe8d44
of: unittest: fix memory leak in unittest_data_add In unittest_data_add, a copy buffer is created via kmemdup. This buffer is leaked if of_fdt_unflatten_tree fails. The release for the unittest_data buffer is added. Fixes: b951f9dc7f25 ("Enabling OF selftest to run without machine's devicetree") Signed-off-by: Navid ...
0
static int __init unittest_data_add(void) { void *unittest_data; struct device_node *unittest_data_node, *np; /* * __dtb_testcases_begin[] and __dtb_testcases_end[] are magically * created by cmd_dt_S_dtb in scripts/Makefile.lib */ extern uint8_t __dtb_testcases_begin[]; extern uint8_t __dtb_testcases_end[];...
292,278,991,063,645,270,000,000,000,000,000,000,000
unittest.c
126,623,730,067,408,290,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2019-19049
A memory leak in the unittest_data_add() function in drivers/of/unittest.c in the Linux kernel before 5.3.10 allows attackers to cause a denial of service (memory consumption) by triggering of_fdt_unflatten_tree() failures, aka CID-e13de8fe0d6a. NOTE: third parties dispute the relevance of this because unittest.c can o...
https://nvd.nist.gov/vuln/detail/CVE-2019-19049
210,817
taglib
ab8a0ee8937256311e649a88e8ddd7c7f870ad59
https://github.com/taglib/taglib
https://github.com/taglib/taglib/commit/ab8a0ee8937256311e649a88e8ddd7c7f870ad59
Don't store the output of ByteVector::toUInt() in int, use uint instead
1
void Ogg::XiphComment::parse(const ByteVector &data) { // The first thing in the comment data is the vendor ID length, followed by a // UTF8 string with the vendor ID. uint pos = 0; int vendorLength = data.mid(0, 4).toUInt(false); pos += 4; d->vendorID = String(data.mid(pos, vendorLength), String::UTF8);...
103,310,908,099,698,940,000,000,000,000,000,000,000
xiphcomment.cpp
175,555,585,226,551,760,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2012-1108
The parse function in ogg/xiphcomment.cpp in TagLib 1.7 and earlier allows remote attackers to cause a denial of service (crash) via a crafted vendorLength field in an ogg file.
https://nvd.nist.gov/vuln/detail/CVE-2012-1108
440,753
taglib
ab8a0ee8937256311e649a88e8ddd7c7f870ad59
https://github.com/taglib/taglib
https://github.com/taglib/taglib/commit/ab8a0ee8937256311e649a88e8ddd7c7f870ad59
Don't store the output of ByteVector::toUInt() in int, use uint instead
0
void Ogg::XiphComment::parse(const ByteVector &data) { // The first thing in the comment data is the vendor ID length, followed by a // UTF8 string with the vendor ID. uint pos = 0; uint vendorLength = data.mid(0, 4).toUInt(false); pos += 4; d->vendorID = String(data.mid(pos, vendorLength), String::UTF8)...
66,709,239,108,320,420,000,000,000,000,000,000,000
xiphcomment.cpp
96,674,207,243,244,690,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2012-1108
The parse function in ogg/xiphcomment.cpp in TagLib 1.7 and earlier allows remote attackers to cause a denial of service (crash) via a crafted vendorLength field in an ogg file.
https://nvd.nist.gov/vuln/detail/CVE-2012-1108
210,837
memcached
6695ccbc525c36d693aaa3e8337b36aa0c784424
https://github.com/memcached/memcached
https://github.com/memcached/memcached/commit/6695ccbc525c36d693aaa3e8337b36aa0c784424
Fix segfault on specially crafted packet.
1
static void drive_machine(conn *c) { bool stop = false; int sfd, flags = 1; socklen_t addrlen; struct sockaddr_storage addr; int nreqs = settings.reqs_per_event; int res; const char *str; assert(c != NULL); while (!stop) { switch(c->state) { case conn_listening: ...
321,165,773,961,905,800,000,000,000,000,000,000,000
memcached.c
150,717,320,307,135,370,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2011-4971
Multiple integer signedness errors in the (1) process_bin_sasl_auth, (2) process_bin_complete_sasl_auth, (3) process_bin_update, and (4) process_bin_append_prepend functions in Memcached 1.4.5 and earlier allow remote attackers to cause a denial of service (crash) via a large body length value in a packet.
https://nvd.nist.gov/vuln/detail/CVE-2011-4971
440,918
memcached
6695ccbc525c36d693aaa3e8337b36aa0c784424
https://github.com/memcached/memcached
https://github.com/memcached/memcached/commit/6695ccbc525c36d693aaa3e8337b36aa0c784424
Fix segfault on specially crafted packet.
0
static void drive_machine(conn *c) { bool stop = false; int sfd, flags = 1; socklen_t addrlen; struct sockaddr_storage addr; int nreqs = settings.reqs_per_event; int res; const char *str; assert(c != NULL); while (!stop) { switch(c->state) { case conn_listening: ...
201,249,003,786,663,500,000,000,000,000,000,000,000
memcached.c
170,424,502,075,153,780,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2011-4971
Multiple integer signedness errors in the (1) process_bin_sasl_auth, (2) process_bin_complete_sasl_auth, (3) process_bin_update, and (4) process_bin_append_prepend functions in Memcached 1.4.5 and earlier allow remote attackers to cause a denial of service (crash) via a large body length value in a packet.
https://nvd.nist.gov/vuln/detail/CVE-2011-4971
210,843
php-src
d76f7c6c636b8240e06a1fa29eebb98ad005008a
https://github.com/php/php-src
http://git.php.net/?p=php-src.git;a=commit;h=d76f7c6c636b8240e06a1fa29eebb98ad005008a
Fix bug #79221 - Null Pointer Dereference in PHP Session Upload Progress
1
static int php_session_rfc1867_callback(unsigned int event, void *event_data, void **extra) /* {{{ */ { php_session_rfc1867_progress *progress; int retval = SUCCESS; if (php_session_rfc1867_orig_callback) { retval = php_session_rfc1867_orig_callback(event, event_data, extra); } if (!PS(rfc1867_enabled)) { ret...
336,668,611,640,423,740,000,000,000,000,000,000,000
session.c
144,655,391,082,337,300,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2020-7062
In PHP versions 7.2.x below 7.2.28, 7.3.x below 7.3.15 and 7.4.x below 7.4.3, when using file upload functionality, if upload progress tracking is enabled, but session.upload_progress.cleanup is set to 0 (disabled), and the file upload fails, the upload procedure would try to clean up data that does not exist and encou...
https://nvd.nist.gov/vuln/detail/CVE-2020-7062
441,214
php-src
d76f7c6c636b8240e06a1fa29eebb98ad005008a
https://github.com/php/php-src
http://git.php.net/?p=php-src.git;a=commit;h=d76f7c6c636b8240e06a1fa29eebb98ad005008a
Fix bug #79221 - Null Pointer Dereference in PHP Session Upload Progress
0
static int php_session_rfc1867_callback(unsigned int event, void *event_data, void **extra) /* {{{ */ { php_session_rfc1867_progress *progress; int retval = SUCCESS; if (php_session_rfc1867_orig_callback) { retval = php_session_rfc1867_orig_callback(event, event_data, extra); } if (!PS(rfc1867_enabled)) { ret...
261,624,549,986,786,930,000,000,000,000,000,000,000
session.c
68,001,579,320,414,150,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2020-7062
In PHP versions 7.2.x below 7.2.28, 7.3.x below 7.3.15 and 7.4.x below 7.4.3, when using file upload functionality, if upload progress tracking is enabled, but session.upload_progress.cleanup is set to 0 (disabled), and the file upload fails, the upload procedure would try to clean up data that does not exist and encou...
https://nvd.nist.gov/vuln/detail/CVE-2020-7062
210,862
radare2
c40a4f9862104ede15d0ba05ccbf805923070778
https://github.com/radare/radare2
https://github.com/radareorg/radare2/commit/c40a4f9862104ede15d0ba05ccbf805923070778
Fix another oobread segfault in the NE bin parser ##crash * Reported by @han0nly via huntr.dev * Reproducers: sample1 sample2 sample3 * BountyID: 47422cdf-aad2-4405-a6a1-6f63a3a93200
1
RList *r_bin_ne_get_entrypoints(r_bin_ne_obj_t *bin) { RList *entries = r_list_newf (free); if (!entries) { return NULL; } RBinAddr *entry; RList *segments = r_bin_ne_get_segments (bin); if (!segments) { r_list_free (entries); return NULL; } if (bin->ne_header->csEntryPoint) { entry = R_NEW0 (RBinAddr);...
299,097,879,741,683,160,000,000,000,000,000,000,000
ne.c
69,651,508,651,046,840,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2022-1238
Out-of-bounds Write in libr/bin/format/ne/ne.c in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is heap overflow and may be exploitable. For more general description of heap buffer overflow, see [CWE](https://cwe.mitre.org/data/definitions/122.html).
https://nvd.nist.gov/vuln/detail/CVE-2022-1238
441,781
radare2
c40a4f9862104ede15d0ba05ccbf805923070778
https://github.com/radare/radare2
https://github.com/radareorg/radare2/commit/c40a4f9862104ede15d0ba05ccbf805923070778
Fix another oobread segfault in the NE bin parser ##crash * Reported by @han0nly via huntr.dev * Reproducers: sample1 sample2 sample3 * BountyID: 47422cdf-aad2-4405-a6a1-6f63a3a93200
0
RList *r_bin_ne_get_entrypoints(r_bin_ne_obj_t *bin) { RList *entries = r_list_newf (free); if (!entries) { return NULL; } RBinAddr *entry; RList *segments = r_bin_ne_get_segments (bin); if (!segments) { r_list_free (entries); return NULL; } if (bin->ne_header->csEntryPoint) { entry = R_NEW0 (RBinAddr);...
250,771,717,589,117,250,000,000,000,000,000,000,000
ne.c
158,187,364,999,589,480,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2022-1238
Out-of-bounds Write in libr/bin/format/ne/ne.c in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is heap overflow and may be exploitable. For more general description of heap buffer overflow, see [CWE](https://cwe.mitre.org/data/definitions/122.html).
https://nvd.nist.gov/vuln/detail/CVE-2022-1238
210,865
libxml2
6360a31a84efe69d155ed96306b9a931a40beab9
https://github.com/GNOME/libxml2
https://git.gnome.org/browse/libxml2/commit/?id=6360a31a84efe69d155ed96306b9a931a40beab9
CVE-2015-7497 Avoid an heap buffer overflow in xmlDictComputeFastQKey For https://bugzilla.gnome.org/show_bug.cgi?id=756528 It was possible to hit a negative offset in the name indexing used to randomize the dictionary key generation Reported and fix provided by David Drysdale @ Google
1
xmlDictComputeFastQKey(const xmlChar *prefix, int plen, const xmlChar *name, int len, int seed) { unsigned long value = (unsigned long) seed; if (plen == 0) value += 30 * (unsigned long) ':'; else value += 30 * (*prefix); if (len > 10) { value += name[len - (plen + 1 +...
301,486,319,191,144,100,000,000,000,000,000,000,000
dict.c
229,899,891,921,134,500,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2015-7497
Heap-based buffer overflow in the xmlDictComputeFastQKey function in dict.c in libxml2 before 2.9.3 allows context-dependent attackers to cause a denial of service via unspecified vectors.
https://nvd.nist.gov/vuln/detail/CVE-2015-7497
441,791
libxml2
6360a31a84efe69d155ed96306b9a931a40beab9
https://github.com/GNOME/libxml2
https://git.gnome.org/browse/libxml2/commit/?id=6360a31a84efe69d155ed96306b9a931a40beab9
CVE-2015-7497 Avoid an heap buffer overflow in xmlDictComputeFastQKey For https://bugzilla.gnome.org/show_bug.cgi?id=756528 It was possible to hit a negative offset in the name indexing used to randomize the dictionary key generation Reported and fix provided by David Drysdale @ Google
0
xmlDictComputeFastQKey(const xmlChar *prefix, int plen, const xmlChar *name, int len, int seed) { unsigned long value = (unsigned long) seed; if (plen == 0) value += 30 * (unsigned long) ':'; else value += 30 * (*prefix); if (len > 10) { int offset = len - (plen + 1 + ...
207,409,270,744,243,040,000,000,000,000,000,000,000
dict.c
104,223,076,783,507,610,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2015-7497
Heap-based buffer overflow in the xmlDictComputeFastQKey function in dict.c in libxml2 before 2.9.3 allows context-dependent attackers to cause a denial of service via unspecified vectors.
https://nvd.nist.gov/vuln/detail/CVE-2015-7497
210,867
libyaml
e6aa721cc0e5a48f408c52355559fd36780ba32a
https://github.com/yaml/libyaml
https://github.com/yaml/libyaml/commit/e6aa721cc0e5a48f408c52355559fd36780ba32a
Fix for https://bitbucket.org/xi/libyaml/issue/10/ https://bitbucket.org/xi/libyaml/issue/10/wrapped-strings-cause-assert-failure Commenting out the assert makes the scanner do the right thing and results in just a simple parse failure.
1
yaml_parser_save_simple_key(yaml_parser_t *parser) { /* * A simple key is required at the current position if the scanner is in * the block context and the current column coincides with the indentation * level. */ int required = (!parser->flow_level && parser->indent == (ptrdiff...
144,012,318,429,435,890,000,000,000,000,000,000,000
scanner.c
55,831,560,450,102,560,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2014-9130
scanner.c in LibYAML 0.1.5 and 0.1.6, as used in the YAML-LibYAML (aka YAML-XS) module for Perl, allows context-dependent attackers to cause a denial of service (assertion failure and crash) via vectors involving line-wrapping.
https://nvd.nist.gov/vuln/detail/CVE-2014-9130
441,862
libyaml
e6aa721cc0e5a48f408c52355559fd36780ba32a
https://github.com/yaml/libyaml
https://github.com/yaml/libyaml/commit/e6aa721cc0e5a48f408c52355559fd36780ba32a
Fix for https://bitbucket.org/xi/libyaml/issue/10/ https://bitbucket.org/xi/libyaml/issue/10/wrapped-strings-cause-assert-failure Commenting out the assert makes the scanner do the right thing and results in just a simple parse failure.
0
yaml_parser_save_simple_key(yaml_parser_t *parser) { /* * A simple key is required at the current position if the scanner is in * the block context and the current column coincides with the indentation * level. */ int required = (!parser->flow_level && parser->indent == (ptrdiff...
81,628,959,881,270,205,000,000,000,000,000,000,000
scanner.c
74,630,725,060,205,840,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2014-9130
scanner.c in LibYAML 0.1.5 and 0.1.6, as used in the YAML-LibYAML (aka YAML-XS) module for Perl, allows context-dependent attackers to cause a denial of service (assertion failure and crash) via vectors involving line-wrapping.
https://nvd.nist.gov/vuln/detail/CVE-2014-9130
210,876
soundtouch
7f594f8b7d10bbc16a4a31de8ec5a279af9c7378
https://gitlab.com/soundtouch/soundtouch
https://gitlab.com/soundtouch/soundtouch/commit/7f594f8b7d10bbc16a4a31de8ec5a279af9c7378
New take on CVE-2018-17097 i.e. avoiding writing beyond end of buffer in case of 24-bit samples
1
void WavOutFile::write(const float *buffer, int numElems) { int numBytes; int bytesPerSample; if (numElems == 0) return; bytesPerSample = header.format.bits_per_sample / 8; numBytes = numElems * bytesPerSample; int confBufBytes = (numBytes + 3) & -4; // round up to nearest multiple of...
164,120,031,578,096,860,000,000,000,000,000,000,000
WavFile.cpp
53,671,190,571,791,450,000,000,000,000,000,000,000
[ "CWE-415" ]
CVE-2018-17097
The WavFileBase class in WavFile.cpp in Olli Parviainen SoundTouch 2.0 allows remote attackers to cause a denial of service (double free) or possibly have unspecified other impact, as demonstrated by SoundStretch.
https://nvd.nist.gov/vuln/detail/CVE-2018-17097
441,992
soundtouch
7f594f8b7d10bbc16a4a31de8ec5a279af9c7378
https://gitlab.com/soundtouch/soundtouch
https://gitlab.com/soundtouch/soundtouch/commit/7f594f8b7d10bbc16a4a31de8ec5a279af9c7378
New take on CVE-2018-17097 i.e. avoiding writing beyond end of buffer in case of 24-bit samples
0
void WavOutFile::write(const float *buffer, int numElems) { int numBytes; int bytesPerSample; if (numElems == 0) return; bytesPerSample = header.format.bits_per_sample / 8; numBytes = numElems * bytesPerSample; void *temp = getConvBuffer(numBytes + 7); // round bit up to avoid buffe...
293,451,393,538,209,840,000,000,000,000,000,000,000
WavFile.cpp
60,052,747,961,810,000,000,000,000,000,000,000,000
[ "CWE-415" ]
CVE-2018-17097
The WavFileBase class in WavFile.cpp in Olli Parviainen SoundTouch 2.0 allows remote attackers to cause a denial of service (double free) or possibly have unspecified other impact, as demonstrated by SoundStretch.
https://nvd.nist.gov/vuln/detail/CVE-2018-17097
210,883
ImageMagick6
bb77f9e905597c7ab1e92042c7de418d999b00bf
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/bb77f9e905597c7ab1e92042c7de418d999b00bf
Fixed leaking of the image when writing an MSL image.
1
static MagickBooleanType WriteMSLImage(const ImageInfo *image_info,Image *image) { Image *msl_image; assert(image_info != (const ImageInfo *) NULL); assert(image_info->signature == MagickCoreSignature); assert(image != (Image *) NULL); assert(image->signature == MagickCoreSignature); if (image->debug !...
218,367,735,223,390,030,000,000,000,000,000,000,000
msl.c
10,705,016,281,398,830,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2018-18544
There is a memory leak in the function WriteMSLImage of coders/msl.c in ImageMagick 7.0.8-13 Q16, and the function ProcessMSLScript of coders/msl.c in GraphicsMagick before 1.3.31.
https://nvd.nist.gov/vuln/detail/CVE-2018-18544
442,083
ImageMagick6
bb77f9e905597c7ab1e92042c7de418d999b00bf
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/bb77f9e905597c7ab1e92042c7de418d999b00bf
Fixed leaking of the image when writing an MSL image.
0
static MagickBooleanType WriteMSLImage(const ImageInfo *image_info,Image *image) { Image *msl_image; MagickBooleanType status; assert(image_info != (const ImageInfo *) NULL); assert(image_info->signature == MagickCoreSignature); assert(image != (Image *) NULL); assert(image->signature == MagickCor...
138,058,158,013,778,250,000,000,000,000,000,000,000
msl.c
259,451,433,662,288,430,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2018-18544
There is a memory leak in the function WriteMSLImage of coders/msl.c in ImageMagick 7.0.8-13 Q16, and the function ProcessMSLScript of coders/msl.c in GraphicsMagick before 1.3.31.
https://nvd.nist.gov/vuln/detail/CVE-2018-18544
210,886
libsass
8f40dc03e5ab5a8b2ebeb72b31f8d1adbb2fd6ae
https://github.com/sass/libsass
https://github.com/sass/libsass/commit/8f40dc03e5ab5a8b2ebeb72b31f8d1adbb2fd6ae
Optimize line_begin/end search in `handle_error` There is no need to advance by UTF-8 code points when searching for an ASCII character, because UTF-8 is a prefix-free encoding.
1
static int handle_error(Sass_Context* c_ctx) { try { throw; } catch (Exception::Base& e) { std::stringstream msg_stream; std::string cwd(Sass::File::get_cwd()); std::string msg_prefix(e.errtype()); bool got_newline = false; msg_stream << msg_prefix << ": "; const ...
205,027,800,598,608,400,000,000,000,000,000,000,000
sass_context.cpp
257,032,591,333,935,930,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-11698
An issue was discovered in LibSass through 3.5.4. An out-of-bounds read of a memory region was found in the function Sass::handle_error which could be leveraged by an attacker to disclose information or manipulated to read from unmapped memory causing a denial of service.
https://nvd.nist.gov/vuln/detail/CVE-2018-11698
442,153
libsass
8f40dc03e5ab5a8b2ebeb72b31f8d1adbb2fd6ae
https://github.com/sass/libsass
https://github.com/sass/libsass/commit/8f40dc03e5ab5a8b2ebeb72b31f8d1adbb2fd6ae
Optimize line_begin/end search in `handle_error` There is no need to advance by UTF-8 code points when searching for an ASCII character, because UTF-8 is a prefix-free encoding.
0
static int handle_error(Sass_Context* c_ctx) { try { throw; } catch (Exception::Base& e) { std::stringstream msg_stream; std::string cwd(Sass::File::get_cwd()); std::string msg_prefix(e.errtype()); bool got_newline = false; msg_stream << msg_prefix << ": "; const ...
3,988,636,591,326,191,000,000,000,000,000,000,000
sass_context.cpp
10,973,330,936,984,438,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-11698
An issue was discovered in LibSass through 3.5.4. An out-of-bounds read of a memory region was found in the function Sass::handle_error which could be leveraged by an attacker to disclose information or manipulated to read from unmapped memory causing a denial of service.
https://nvd.nist.gov/vuln/detail/CVE-2018-11698
210,895
vim
2f074f4685897ab7212e25931eeeb0212292829f
https://github.com/vim/vim
https://github.com/vim/vim/commit/2f074f4685897ab7212e25931eeeb0212292829f
patch 8.2.5120: searching for quotes may go over the end of the line Problem: Searching for quotes may go over the end of the line. Solution: Check for running into the NUL.
1
current_quote( oparg_T *oap, long count, int include, // TRUE == include quote char int quotechar) // Quote character { char_u *line = ml_get_curline(); int col_end; int col_start = curwin->w_cursor.col; int inclusive = FALSE; int vis_empty = TRUE; // Visual selection <= 1 char...
275,873,851,930,808,000,000,000,000,000,000,000,000
textobject.c
102,117,221,252,840,910,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2022-2124
Buffer Over-read in GitHub repository vim/vim prior to 8.2.
https://nvd.nist.gov/vuln/detail/CVE-2022-2124
442,549
vim
2f074f4685897ab7212e25931eeeb0212292829f
https://github.com/vim/vim
https://github.com/vim/vim/commit/2f074f4685897ab7212e25931eeeb0212292829f
patch 8.2.5120: searching for quotes may go over the end of the line Problem: Searching for quotes may go over the end of the line. Solution: Check for running into the NUL.
0
current_quote( oparg_T *oap, long count, int include, // TRUE == include quote char int quotechar) // Quote character { char_u *line = ml_get_curline(); int col_end; int col_start = curwin->w_cursor.col; int inclusive = FALSE; int vis_empty = TRUE; // Visual selection <= 1 char...
298,371,919,073,407,100,000,000,000,000,000,000,000
textobject.c
107,939,516,960,165,800,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2022-2124
Buffer Over-read in GitHub repository vim/vim prior to 8.2.
https://nvd.nist.gov/vuln/detail/CVE-2022-2124
210,898
dbus
872b085f12f56da25a2dbd9bd0b2dff31d5aea63
http://gitweb.freedesktop.org/?p=dbus/dbus
https://gitlab.freedesktop.org/dbus/dbus/-/commit/872b085f12f56da25a2dbd9bd0b2dff31d5aea63
sysdeps-unix: On MSG_CTRUNC, close the fds we did receive MSG_CTRUNC indicates that we have received fewer fds that we should have done because the buffer was too small, but we were treating it as though it indicated that we received *no* fds. If we received any, we still have to make sure we close them, otherwise the...
1
_dbus_read_socket_with_unix_fds (DBusSocket fd, DBusString *buffer, int count, int *fds, unsigned int *n_fds) { #ifndef HAVE_UNIX_FD_PASSING i...
271,713,557,430,258,780,000,000,000,000,000,000,000
dbus-sysdeps-unix.c
311,464,204,683,168,040,000,000,000,000,000,000,000
[ "CWE-404" ]
CVE-2020-12049
An issue was discovered in dbus >= 1.3.0 before 1.12.18. The DBusServer in libdbus, as used in dbus-daemon, leaks file descriptors when a message exceeds the per-message file descriptor limit. A local attacker with access to the D-Bus system bus or another system service's private AF_UNIX socket could use this to make ...
https://nvd.nist.gov/vuln/detail/CVE-2020-12049
442,633
dbus
872b085f12f56da25a2dbd9bd0b2dff31d5aea63
http://gitweb.freedesktop.org/?p=dbus/dbus
https://gitlab.freedesktop.org/dbus/dbus/-/commit/872b085f12f56da25a2dbd9bd0b2dff31d5aea63
sysdeps-unix: On MSG_CTRUNC, close the fds we did receive MSG_CTRUNC indicates that we have received fewer fds that we should have done because the buffer was too small, but we were treating it as though it indicated that we received *no* fds. If we received any, we still have to make sure we close them, otherwise the...
0
_dbus_read_socket_with_unix_fds (DBusSocket fd, DBusString *buffer, int count, int *fds, unsigned int *n_fds) { #ifndef HAVE_UNIX_FD_PASSING i...
223,239,985,597,135,700,000,000,000,000,000,000,000
dbus-sysdeps-unix.c
182,558,334,604,585,100,000,000,000,000,000,000,000
[ "CWE-404" ]
CVE-2020-12049
An issue was discovered in dbus >= 1.3.0 before 1.12.18. The DBusServer in libdbus, as used in dbus-daemon, leaks file descriptors when a message exceeds the per-message file descriptor limit. A local attacker with access to the D-Bus system bus or another system service's private AF_UNIX socket could use this to make ...
https://nvd.nist.gov/vuln/detail/CVE-2020-12049
210,903
clamav-devel
d21fb8d975f8c9688894a8cef4d50d977022e09f
https://github.com/vrtadmin/clamav-devel
http://git.clamav.net/gitweb?p=clamav-devel.git;a=commit;h=d21fb8d975f8c9688894a8cef4d50d977022e09f
libclamav/vba_extract.c: fix error path double free (bb#2486)
1
vba_read_project_strings(int fd, int big_endian) { unsigned char *buf = NULL; uint16_t buflen = 0; int ret = 0; for(;;) { off_t offset; uint16_t length; char *name; if(!read_uint16(fd, &length, big_endian)) break; if (length < 6) { lseek(fd, -2, SEEK_CUR); break; } if(length > buflen) { ...
181,192,634,917,841,130,000,000,000,000,000,000,000
vba_extract.c
122,146,051,808,833,540,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2011-1003
Double free vulnerability in the vba_read_project_strings function in vba_extract.c in libclamav in ClamAV before 0.97 might allow remote attackers to execute arbitrary code via crafted Visual Basic for Applications (VBA) data in a Microsoft Office document. NOTE: some of these details are obtained from third party in...
https://nvd.nist.gov/vuln/detail/CVE-2011-1003
442,756
clamav-devel
d21fb8d975f8c9688894a8cef4d50d977022e09f
https://github.com/vrtadmin/clamav-devel
http://git.clamav.net/gitweb?p=clamav-devel.git;a=commit;h=d21fb8d975f8c9688894a8cef4d50d977022e09f
libclamav/vba_extract.c: fix error path double free (bb#2486)
0
vba_read_project_strings(int fd, int big_endian) { unsigned char *buf = NULL; uint16_t buflen = 0; int ret = 0; for(;;) { off_t offset; uint16_t length; char *name; if(!read_uint16(fd, &length, big_endian)) break; if (length < 6) { lseek(fd, -2, SEEK_CUR); break; } if(length > buflen) { ...
198,264,988,238,665,420,000,000,000,000,000,000,000
vba_extract.c
117,844,446,442,562,330,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2011-1003
Double free vulnerability in the vba_read_project_strings function in vba_extract.c in libclamav in ClamAV before 0.97 might allow remote attackers to execute arbitrary code via crafted Visual Basic for Applications (VBA) data in a Microsoft Office document. NOTE: some of these details are obtained from third party in...
https://nvd.nist.gov/vuln/detail/CVE-2011-1003
210,916
ImageMagick
ae04fa4be910255e5d363edebd77adeee99a525d
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/ae04fa4be910255e5d363edebd77adeee99a525d
https://github.com/ImageMagick/ImageMagick/issues/1177
1
static MagickBooleanType WriteBMPImage(const ImageInfo *image_info,Image *image, ExceptionInfo *exception) { BMPInfo bmp_info; BMPSubtype bmp_subtype; const char *option; const StringInfo *profile; MagickBooleanType have_color_info, status; MagickOffsetType scene; Memor...
268,486,899,968,306,020,000,000,000,000,000,000,000
bmp.c
336,052,619,317,572,980,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2018-12599
In ImageMagick 7.0.8-3 Q16, ReadBMPImage and WriteBMPImage in coders/bmp.c allow attackers to cause an out of bounds write via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2018-12599
69,666
ImageMagick
db0add932fb850d762b02604ca3053b7d7ab6deb
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/db0add932fb850d762b02604ca3053b7d7ab6deb
Prevent infinite loop
0
static MagickBooleanType WriteBMPImage(const ImageInfo *image_info,Image *image, ExceptionInfo *exception) { BMPInfo bmp_info; BMPSubtype bmp_subtype; const char *option; const StringInfo *profile; MagickBooleanType have_color_info, status; MagickOffsetType scene; Memor...
238,458,474,873,785,470,000,000,000,000,000,000,000
bmp.c
303,093,137,720,368,650,000,000,000,000,000,000,000
[ "CWE-835" ]
CVE-2018-20467
In coders/bmp.c in ImageMagick before 7.0.8-16, an input file can result in an infinite loop and hang, with high CPU and memory consumption. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2018-20467
210,917
ImageMagick
ae04fa4be910255e5d363edebd77adeee99a525d
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/ae04fa4be910255e5d363edebd77adeee99a525d
https://github.com/ImageMagick/ImageMagick/issues/1177
1
static Image *ReadBMPImage(const ImageInfo *image_info,ExceptionInfo *exception) { BMPInfo bmp_info; Image *image; MagickBooleanType status; MagickOffsetType offset, start_position; MemoryInfo *pixel_info; Quantum index; register Quantum *q; register ssize_t i,...
296,213,103,419,022,850,000,000,000,000,000,000,000
bmp.c
336,052,619,317,572,980,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2018-12599
In ImageMagick 7.0.8-3 Q16, ReadBMPImage and WriteBMPImage in coders/bmp.c allow attackers to cause an out of bounds write via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2018-12599
443,064
ImageMagick
ae04fa4be910255e5d363edebd77adeee99a525d
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/ae04fa4be910255e5d363edebd77adeee99a525d
https://github.com/ImageMagick/ImageMagick/issues/1177
0
static Image *ReadBMPImage(const ImageInfo *image_info,ExceptionInfo *exception) { BMPInfo bmp_info; Image *image; MagickBooleanType status; MagickOffsetType offset, start_position; MemoryInfo *pixel_info; Quantum index; register Quantum *q; register ssize_t i,...
111,280,021,809,982,000,000,000,000,000,000,000,000
bmp.c
275,444,024,646,200,200,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2018-12599
In ImageMagick 7.0.8-3 Q16, ReadBMPImage and WriteBMPImage in coders/bmp.c allow attackers to cause an out of bounds write via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2018-12599
210,921
sssd
191d7f7ce3de10d9e19eaa0a6ab3319bcd4ca95d
http://git.fedorahosted.org/git/?p=sssd
https://git.fedorahosted.org/cgit/sssd.git/commit/?id=191d7f7ce3de10d9e19eaa0a6ab3319bcd4ca95d
AD: process non-posix nested groups using tokenGroups When initgr is performed for AD supporting tokenGroups, do not skip non-posix groups. Resolves: https://fedorahosted.org/sssd/ticket/2343 Reviewed-by: Michal Židek <mzidek@redhat.com> (cherry picked from commit 4932db6258ccfb612a3a28eb6a618c2f042b9d58)
1
sdap_ad_tokengroups_get_posix_members(TALLOC_CTX *mem_ctx, struct sdap_ad_tokengroups_initgr_posix_state *state, size_t num_sids, char **sids, size_t *_num_missing, char ***_missing, ...
301,856,733,418,330,940,000,000,000,000,000,000,000
sdap_async_initgroups_ad.c
283,742,922,743,110,250,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2014-0249
The System Security Services Daemon (SSSD) 1.11.6 does not properly identify group membership when a non-POSIX group is in a group membership chain, which allows local users to bypass access restrictions via unspecified vectors.
https://nvd.nist.gov/vuln/detail/CVE-2014-0249
443,074
sssd
191d7f7ce3de10d9e19eaa0a6ab3319bcd4ca95d
http://git.fedorahosted.org/git/?p=sssd
https://git.fedorahosted.org/cgit/sssd.git/commit/?id=191d7f7ce3de10d9e19eaa0a6ab3319bcd4ca95d
AD: process non-posix nested groups using tokenGroups When initgr is performed for AD supporting tokenGroups, do not skip non-posix groups. Resolves: https://fedorahosted.org/sssd/ticket/2343 Reviewed-by: Michal Židek <mzidek@redhat.com> (cherry picked from commit 4932db6258ccfb612a3a28eb6a618c2f042b9d58)
0
sdap_ad_tokengroups_get_posix_members(TALLOC_CTX *mem_ctx, struct sdap_ad_tokengroups_initgr_posix_state *state, size_t num_sids, char **sids, size_t *_num_missing, char ***_missing, ...
31,959,748,179,189,960,000,000,000,000,000,000,000
sdap_async_initgroups_ad.c
320,466,917,434,821,570,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2014-0249
The System Security Services Daemon (SSSD) 1.11.6 does not properly identify group membership when a non-POSIX group is in a group membership chain, which allows local users to bypass access restrictions via unspecified vectors.
https://nvd.nist.gov/vuln/detail/CVE-2014-0249
210,923
sssd
fffdae81651b460f3d2c119c56d5caa09b4de42a
http://git.fedorahosted.org/git/?p=sssd
http://git.fedorahosted.org/git/?p=sssd.git;a=commitdiff;h=fffdae81651b460f3d2c119c56d5caa09b4de42a
Fix bad password caching when using automatic TGT renewal Fixes CVE-2011-1758, https://fedorahosted.org/sssd/ticket/856
1
static void krb5_save_ccname_done(struct tevent_req *req) { struct krb5_auth_state *state = tevent_req_data(req, struct krb5_auth_state); struct krb5child_req *kr = state->kr; struct pam_data *pd = state->pd; int ret; char *password = NULL; if (kr->is_offline) { if (dp_opt_get_bool(kr->...
297,354,155,764,998,360,000,000,000,000,000,000,000
krb5_auth.c
263,025,695,453,576,370,000,000,000,000,000,000,000
[ "CWE-287" ]
CVE-2011-1758
The krb5_save_ccname_done function in providers/krb5/krb5_auth.c in System Security Services Daemon (SSSD) 1.5.x before 1.5.7, when automatic ticket renewal and offline authentication are configured, uses a pathname string as a password, which allows local users to bypass Kerberos authentication by listing the /tmp dir...
https://nvd.nist.gov/vuln/detail/CVE-2011-1758
443,094
sssd
fffdae81651b460f3d2c119c56d5caa09b4de42a
http://git.fedorahosted.org/git/?p=sssd
http://git.fedorahosted.org/git/?p=sssd.git;a=commitdiff;h=fffdae81651b460f3d2c119c56d5caa09b4de42a
Fix bad password caching when using automatic TGT renewal Fixes CVE-2011-1758, https://fedorahosted.org/sssd/ticket/856
0
static void krb5_save_ccname_done(struct tevent_req *req) { struct krb5_auth_state *state = tevent_req_data(req, struct krb5_auth_state); struct krb5child_req *kr = state->kr; struct pam_data *pd = state->pd; int ret; char *password = NULL; if (kr->is_offline) { if (dp_opt_get_bool(kr->...
324,448,733,660,798,400,000,000,000,000,000,000,000
krb5_auth.c
21,935,662,557,328,280,000,000,000,000,000,000,000
[ "CWE-287" ]
CVE-2011-1758
The krb5_save_ccname_done function in providers/krb5/krb5_auth.c in System Security Services Daemon (SSSD) 1.5.x before 1.5.7, when automatic ticket renewal and offline authentication are configured, uses a pathname string as a password, which allows local users to bypass Kerberos authentication by listing the /tmp dir...
https://nvd.nist.gov/vuln/detail/CVE-2011-1758
210,929
libx11
acdaaadcb3d85c61fd43669fc5dddf0f8c3f911d
https://gitlab.freedesktop.org/xorg/lib/libx11
https://gitlab.freedesktop.org/xorg/lib/libx11/-/commit/acdaaadcb3d85c61fd43669fc5dddf0f8c3f911d
Fix an integer overflow in init_om() CVE-2020-14363 This can lead to a double free later, as reported by Jayden Rivers. Signed-off-by: Matthieu Herrb <matthieu@herrb.eu>
1
init_om( XOM om) { XLCd lcd = om->core.lcd; XOMGenericPart *gen = XOM_GENERIC(om); OMData data; XlcCharSet *charset_list; FontData font_data; char **required_list; XOrientation *orientation; char **value, buf[BUFSIZ], *bufptr; int count = 0, num = 0, length = 0; _XlcGetResou...
314,915,380,665,580,400,000,000,000,000,000,000,000
omGeneric.c
323,875,861,228,041,870,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2020-14363
An integer overflow vulnerability leading to a double-free was found in libX11. This flaw allows a local privileged attacker to cause an application compiled with libX11 to crash, or in some cases, result in arbitrary code execution. The highest threat from this flaw is to confidentiality, integrity as well as system a...
https://nvd.nist.gov/vuln/detail/CVE-2020-14363
443,181
libx11
acdaaadcb3d85c61fd43669fc5dddf0f8c3f911d
https://gitlab.freedesktop.org/xorg/lib/libx11
https://gitlab.freedesktop.org/xorg/lib/libx11/-/commit/acdaaadcb3d85c61fd43669fc5dddf0f8c3f911d
Fix an integer overflow in init_om() CVE-2020-14363 This can lead to a double free later, as reported by Jayden Rivers. Signed-off-by: Matthieu Herrb <matthieu@herrb.eu>
0
init_om( XOM om) { XLCd lcd = om->core.lcd; XOMGenericPart *gen = XOM_GENERIC(om); OMData data; XlcCharSet *charset_list; FontData font_data; char **required_list; XOrientation *orientation; char **value, buf[BUFSIZ], *bufptr; int count = 0, num = 0; unsigned int length = 0; ...
129,643,953,049,361,700,000,000,000,000,000,000,000
omGeneric.c
185,237,983,628,013,100,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2020-14363
An integer overflow vulnerability leading to a double-free was found in libX11. This flaw allows a local privileged attacker to cause an application compiled with libX11 to crash, or in some cases, result in arbitrary code execution. The highest threat from this flaw is to confidentiality, integrity as well as system a...
https://nvd.nist.gov/vuln/detail/CVE-2020-14363
210,930
libexpat
d4f735b88d9932bd5039df2335eefdd0723dbe20
https://github.com/libexpat/libexpat
https://github.com/libexpat/libexpat/commit/d4f735b88d9932bd5039df2335eefdd0723dbe20
Detect integer overflow (CVE-2016-9063) Needs XML_CONTEXT_BYTES to be _undefined_ to trigger, default is defined and set to 1024. Previously patched downstream, e.g. https://sources.debian.net/src/expat/2.2.0-2/debian/patches/CVE-2016-9063.patch/ https://bug1274777.bmoattachments.org/attachment.cgi?id=8755538 This v...
1
XML_Parse(XML_Parser parser, const char *s, int len, int isFinal) { switch (ps_parsing) { case XML_SUSPENDED: errorCode = XML_ERROR_SUSPENDED; return XML_STATUS_ERROR; case XML_FINISHED: errorCode = XML_ERROR_FINISHED; return XML_STATUS_ERROR; case XML_INITIALIZED: if (parentParser == NULL &...
46,580,687,600,667,180,000,000,000,000,000,000,000
xmlparse.c
161,699,158,063,407,620,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2016-9063
An integer overflow during the parsing of XML using the Expat library. This vulnerability affects Firefox < 50.
https://nvd.nist.gov/vuln/detail/CVE-2016-9063
443,205
libexpat
d4f735b88d9932bd5039df2335eefdd0723dbe20
https://github.com/libexpat/libexpat
https://github.com/libexpat/libexpat/commit/d4f735b88d9932bd5039df2335eefdd0723dbe20
Detect integer overflow (CVE-2016-9063) Needs XML_CONTEXT_BYTES to be _undefined_ to trigger, default is defined and set to 1024. Previously patched downstream, e.g. https://sources.debian.net/src/expat/2.2.0-2/debian/patches/CVE-2016-9063.patch/ https://bug1274777.bmoattachments.org/attachment.cgi?id=8755538 This v...
0
XML_Parse(XML_Parser parser, const char *s, int len, int isFinal) { switch (ps_parsing) { case XML_SUSPENDED: errorCode = XML_ERROR_SUSPENDED; return XML_STATUS_ERROR; case XML_FINISHED: errorCode = XML_ERROR_FINISHED; return XML_STATUS_ERROR; case XML_INITIALIZED: if (parentParser == NULL &...
338,705,712,418,043,220,000,000,000,000,000,000,000
xmlparse.c
291,065,993,215,108,500,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2016-9063
An integer overflow during the parsing of XML using the Expat library. This vulnerability affects Firefox < 50.
https://nvd.nist.gov/vuln/detail/CVE-2016-9063
210,943
ImageMagick6
e8f4f5e776002aa6ed490d7c6f65e10fa67359dd
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/e8f4f5e776002aa6ed490d7c6f65e10fa67359dd
https://github.com/ImageMagick/ImageMagick/issues/1193
1
static MagickBooleanType DecodeImage(Image *image,unsigned char *luma, unsigned char *chroma1,unsigned char *chroma2) { #define IsSync(sum) ((sum & 0xffffff00UL) == 0xfffffe00UL) #define PCDGetBits(n) \ { \ sum=(sum << n) & 0xffffffff; \ bits-=n; \ while (bits <= 24) \ { \ if (p >= (buffer+0x800)) \ ...
219,626,744,251,550,800,000,000,000,000,000,000,000
pcd.c
314,457,061,793,507,300,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2018-14435
ImageMagick 7.0.8-4 has a memory leak in DecodeImage in coders/pcd.c.
https://nvd.nist.gov/vuln/detail/CVE-2018-14435
443,291
ImageMagick6
e8f4f5e776002aa6ed490d7c6f65e10fa67359dd
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/e8f4f5e776002aa6ed490d7c6f65e10fa67359dd
https://github.com/ImageMagick/ImageMagick/issues/1193
0
static MagickBooleanType DecodeImage(Image *image,unsigned char *luma, unsigned char *chroma1,unsigned char *chroma2) { #define IsSync(sum) ((sum & 0xffffff00UL) == 0xfffffe00UL) #define PCDGetBits(n) \ { \ sum=(sum << n) & 0xffffffff; \ bits-=n; \ while (bits <= 24) \ { \ if (p >= (buffer+0x800)) \ ...
224,059,984,250,429,600,000,000,000,000,000,000,000
pcd.c
70,611,075,451,290,810,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2018-14435
ImageMagick 7.0.8-4 has a memory leak in DecodeImage in coders/pcd.c.
https://nvd.nist.gov/vuln/detail/CVE-2018-14435
210,945
qBittorrent
f5ad04766f4abaa78374ff03704316f8ce04627d
https://github.com/qbittorrent/qBittorrent
https://github.com/qbittorrent/qBittorrent/commit/f5ad04766f4abaa78374ff03704316f8ce04627d
[WebUI] Avoid clickjacking attacks
1
Http::Response AbstractWebApplication::processRequest(const Http::Request &request, const Http::Environment &env) { session_ = 0; request_ = request; env_ = env; clear(); // clear response sessionInitialize(); if (!sessionActive() && !isAuthNeeded()) sessionStart(); if (isBanned()...
118,045,132,013,428,230,000,000,000,000,000,000,000
abstractwebapplication.cpp
279,271,168,180,139,160,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2017-6504
WebUI in qBittorrent before 3.3.11 did not set the X-Frame-Options header, which could potentially lead to clickjacking.
https://nvd.nist.gov/vuln/detail/CVE-2017-6504
443,315
qBittorrent
f5ad04766f4abaa78374ff03704316f8ce04627d
https://github.com/qbittorrent/qBittorrent
https://github.com/qbittorrent/qBittorrent/commit/f5ad04766f4abaa78374ff03704316f8ce04627d
[WebUI] Avoid clickjacking attacks
0
Http::Response AbstractWebApplication::processRequest(const Http::Request &request, const Http::Environment &env) { session_ = 0; request_ = request; env_ = env; // clear response clear(); // avoid clickjacking attacks header(Http::HEADER_X_FRAME_OPTIONS, "SAMEORIGIN"); sessionInitial...
200,303,066,432,823,600,000,000,000,000,000,000,000
abstractwebapplication.cpp
289,134,446,044,914,140,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2017-6504
WebUI in qBittorrent before 3.3.11 did not set the X-Frame-Options header, which could potentially lead to clickjacking.
https://nvd.nist.gov/vuln/detail/CVE-2017-6504
210,954
DBD-mysql
3619c170461a3107a258d1fd2d00ed4832adb1b1
https://github.com/perl5-dbi/DBD-mysql
https://github.com/perl5-dbi/DBD-mysql/commit/3619c170461a3107a258d1fd2d00ed4832adb1b1
Fix use-after-free for repeated fetchrow_arrayref calls when mysql_server_prepare=1 Function dbd_st_fetch() via Renew() can reallocate output buffer for mysql_stmt_fetch() call. But it does not update pointer to that buffer in imp_sth->stmt structure initialized by mysql_stmt_bind_result() function. That leads to use-...
1
dbd_st_fetch(SV *sth, imp_sth_t* imp_sth) { dTHX; int num_fields, ChopBlanks, i, rc; unsigned long *lengths; AV *av; int av_length, av_readonly; MYSQL_ROW cols; D_imp_dbh_from_sth; MYSQL* svsock= imp_dbh->pmysql; imp_sth_fbh_t *fbh; D_imp_xxh(sth); #if MYSQL_VERSION_ID >=SERVER_PREPARE_VERSION MYS...
76,393,277,174,958,170,000,000,000,000,000,000,000
dbdimp.c
325,450,484,231,949,500,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2016-1251
There is a vulnerability of type use-after-free affecting DBD::mysql (aka DBD-mysql or the Database Interface (DBI) MySQL driver for Perl) 3.x and 4.x before 4.041 when used with mysql_server_prepare=1.
https://nvd.nist.gov/vuln/detail/CVE-2016-1251
443,634
DBD-mysql
3619c170461a3107a258d1fd2d00ed4832adb1b1
https://github.com/perl5-dbi/DBD-mysql
https://github.com/perl5-dbi/DBD-mysql/commit/3619c170461a3107a258d1fd2d00ed4832adb1b1
Fix use-after-free for repeated fetchrow_arrayref calls when mysql_server_prepare=1 Function dbd_st_fetch() via Renew() can reallocate output buffer for mysql_stmt_fetch() call. But it does not update pointer to that buffer in imp_sth->stmt structure initialized by mysql_stmt_bind_result() function. That leads to use-...
0
dbd_st_fetch(SV *sth, imp_sth_t* imp_sth) { dTHX; int num_fields, ChopBlanks, i, rc; unsigned long *lengths; AV *av; int av_length, av_readonly; MYSQL_ROW cols; D_imp_dbh_from_sth; MYSQL* svsock= imp_dbh->pmysql; imp_sth_fbh_t *fbh; D_imp_xxh(sth); #if MYSQL_VERSION_ID >=SERVER_PREPARE_VERSION MYS...
47,343,037,964,939,020,000,000,000,000,000,000,000
dbdimp.c
301,096,543,290,610,350,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2016-1251
There is a vulnerability of type use-after-free affecting DBD::mysql (aka DBD-mysql or the Database Interface (DBI) MySQL driver for Perl) 3.x and 4.x before 4.041 when used with mysql_server_prepare=1.
https://nvd.nist.gov/vuln/detail/CVE-2016-1251
210,959
taglib
b3646a07348ffa276ea41a9dae03ddc63ea6c532
https://github.com/taglib/taglib
https://github.com/taglib/taglib/commit/b3646a07348ffa276ea41a9dae03ddc63ea6c532
Be more careful when parsing Vorbis Comments
1
void Ogg::XiphComment::parse(const ByteVector &data) { // The first thing in the comment data is the vendor ID length, followed by a // UTF8 string with the vendor ID. int pos = 0; int vendorLength = data.mid(0, 4).toUInt(false); pos += 4; d->vendorID = String(data.mid(pos, vendorLength), String::UTF8); ...
243,138,406,465,612,470,000,000,000,000,000,000,000
xiphcomment.cpp
44,740,779,656,801,720,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2012-1108
The parse function in ogg/xiphcomment.cpp in TagLib 1.7 and earlier allows remote attackers to cause a denial of service (crash) via a crafted vendorLength field in an ogg file.
https://nvd.nist.gov/vuln/detail/CVE-2012-1108
443,680
taglib
b3646a07348ffa276ea41a9dae03ddc63ea6c532
https://github.com/taglib/taglib
https://github.com/taglib/taglib/commit/b3646a07348ffa276ea41a9dae03ddc63ea6c532
Be more careful when parsing Vorbis Comments
0
void Ogg::XiphComment::parse(const ByteVector &data) { // The first thing in the comment data is the vendor ID length, followed by a // UTF8 string with the vendor ID. int pos = 0; int vendorLength = data.mid(0, 4).toUInt(false); pos += 4; d->vendorID = String(data.mid(pos, vendorLength), String::UTF8); ...
185,190,809,881,338,170,000,000,000,000,000,000,000
xiphcomment.cpp
221,394,001,845,324,100,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2012-1108
The parse function in ogg/xiphcomment.cpp in TagLib 1.7 and earlier allows remote attackers to cause a denial of service (crash) via a crafted vendorLength field in an ogg file.
https://nvd.nist.gov/vuln/detail/CVE-2012-1108
210,962
ImageMagick
24d5699753170c141b46816284430516c2d48fed
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/24d5699753170c141b46816284430516c2d48fed
https://github.com/ImageMagick/ImageMagick/issues/808
1
static MagickBooleanType WriteGIFImage(const ImageInfo *image_info,Image *image, ExceptionInfo *exception) { int c; ImageInfo *write_info; MagickBooleanType status; MagickOffsetType scene; RectangleInfo page; register ssize_t i; register unsigned char *q; size_t ...
202,806,060,520,526,900,000,000,000,000,000,000,000
gif.c
323,724,646,826,273,850,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2017-18254
An issue was discovered in ImageMagick 7.0.7. A memory leak vulnerability was found in the function WriteGIFImage in coders/gif.c, which allow remote attackers to cause a denial of service via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2017-18254
443,682
ImageMagick
24d5699753170c141b46816284430516c2d48fed
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/24d5699753170c141b46816284430516c2d48fed
https://github.com/ImageMagick/ImageMagick/issues/808
0
static MagickBooleanType WriteGIFImage(const ImageInfo *image_info,Image *image, ExceptionInfo *exception) { int c; ImageInfo *write_info; MagickBooleanType status; MagickOffsetType scene; RectangleInfo page; register ssize_t i; register unsigned char *q; size_t ...
238,695,514,644,997,120,000,000,000,000,000,000,000
gif.c
237,172,763,069,531,260,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2017-18254
An issue was discovered in ImageMagick 7.0.7. A memory leak vulnerability was found in the function WriteGIFImage in coders/gif.c, which allow remote attackers to cause a denial of service via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2017-18254
210,968
fribidi
034c6e9a1d296286305f4cfd1e0072b879f52568
https://github.com/fribidi/fribidi
https://github.com/fribidi/fribidi/commit/034c6e9a1d296286305f4cfd1e0072b879f52568
Truncate isolate_level to FRIBIDI_BIDI_MAX_EXPLICIT_LEVEL
1
fribidi_get_par_embedding_levels_ex ( /* input */ const FriBidiCharType *bidi_types, const FriBidiBracketType *bracket_types, const FriBidiStrIndex len, /* input and output */ FriBidiParType *pbase_dir, /* output */ FriBidiLevel *embedding_levels ) { FriBidiLevel base_level_per_iso_level[FRIBIDI_BIDI_...
311,749,024,103,547,070,000,000,000,000,000,000,000
fribidi-bidi.c
192,221,391,530,386,000,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2019-18397
A buffer overflow in the fribidi_get_par_embedding_levels_ex() function in lib/fribidi-bidi.c of GNU FriBidi through 1.0.7 allows an attacker to cause a denial of service or possibly execute arbitrary code by delivering crafted text content to a user, when this content is then rendered by an application that uses FriBi...
https://nvd.nist.gov/vuln/detail/CVE-2019-18397
443,712
fribidi
034c6e9a1d296286305f4cfd1e0072b879f52568
https://github.com/fribidi/fribidi
https://github.com/fribidi/fribidi/commit/034c6e9a1d296286305f4cfd1e0072b879f52568
Truncate isolate_level to FRIBIDI_BIDI_MAX_EXPLICIT_LEVEL
0
fribidi_get_par_embedding_levels_ex ( /* input */ const FriBidiCharType *bidi_types, const FriBidiBracketType *bracket_types, const FriBidiStrIndex len, /* input and output */ FriBidiParType *pbase_dir, /* output */ FriBidiLevel *embedding_levels ) { FriBidiLevel base_level_per_iso_level[FRIBIDI_BIDI_...
187,522,115,909,983,900,000,000,000,000,000,000,000
fribidi-bidi.c
41,017,487,873,236,146,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2019-18397
A buffer overflow in the fribidi_get_par_embedding_levels_ex() function in lib/fribidi-bidi.c of GNU FriBidi through 1.0.7 allows an attacker to cause a denial of service or possibly execute arbitrary code by delivering crafted text content to a user, when this content is then rendered by an application that uses FriBi...
https://nvd.nist.gov/vuln/detail/CVE-2019-18397
210,991
ImageMagick6
b4391bdd60df0a77e97a6ef1674f2ffef0e19e24
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/b4391bdd60df0a77e97a6ef1674f2ffef0e19e24
https://github.com/ImageMagick/ImageMagick/issues/1515
1
static Image *ReadPANGOImage(const ImageInfo *image_info, ExceptionInfo *exception) { cairo_font_options_t *font_options; cairo_surface_t *surface; char *caption, *property; cairo_t *cairo_image; const char *option; DrawInfo *draw_info; Image *image; MagickBoolea...
169,714,653,011,089,490,000,000,000,000,000,000,000
pango.c
278,613,088,155,537,930,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2019-12974
A NULL pointer dereference in the function ReadPANGOImage in coders/pango.c and the function ReadVIDImage in coders/vid.c in ImageMagick 7.0.8-34 allows remote attackers to cause a denial of service via a crafted image.
https://nvd.nist.gov/vuln/detail/CVE-2019-12974
443,923
ImageMagick6
b4391bdd60df0a77e97a6ef1674f2ffef0e19e24
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/b4391bdd60df0a77e97a6ef1674f2ffef0e19e24
https://github.com/ImageMagick/ImageMagick/issues/1515
0
static Image *ReadPANGOImage(const ImageInfo *image_info, ExceptionInfo *exception) { cairo_font_options_t *font_options; cairo_surface_t *surface; char *caption, *property; cairo_t *cairo_image; const char *option; DrawInfo *draw_info; Image *image; MagickBoolea...
218,376,584,200,018,270,000,000,000,000,000,000,000
pango.c
97,580,875,846,636,000,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2019-12974
A NULL pointer dereference in the function ReadPANGOImage in coders/pango.c and the function ReadVIDImage in coders/vid.c in ImageMagick 7.0.8-34 allows remote attackers to cause a denial of service via a crafted image.
https://nvd.nist.gov/vuln/detail/CVE-2019-12974
210,992
ImageMagick6
b4391bdd60df0a77e97a6ef1674f2ffef0e19e24
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/b4391bdd60df0a77e97a6ef1674f2ffef0e19e24
https://github.com/ImageMagick/ImageMagick/issues/1515
1
static Image *ReadVIDImage(const ImageInfo *image_info,ExceptionInfo *exception) { #define ClientName "montage" char **filelist, *label, **list; Image *image, *images, *montage_image, *next_image, *thumbnail_image; ImageInfo *read_info; int number_files; MagickBoo...
325,551,276,257,697,240,000,000,000,000,000,000,000
vid.c
202,870,442,311,579,850,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2019-12974
A NULL pointer dereference in the function ReadPANGOImage in coders/pango.c and the function ReadVIDImage in coders/vid.c in ImageMagick 7.0.8-34 allows remote attackers to cause a denial of service via a crafted image.
https://nvd.nist.gov/vuln/detail/CVE-2019-12974
443,921
ImageMagick6
b4391bdd60df0a77e97a6ef1674f2ffef0e19e24
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/b4391bdd60df0a77e97a6ef1674f2ffef0e19e24
https://github.com/ImageMagick/ImageMagick/issues/1515
0
static Image *ReadVIDImage(const ImageInfo *image_info,ExceptionInfo *exception) { #define ClientName "montage" char **filelist, *label, **list; Image *image, *images, *montage_image, *next_image, *thumbnail_image; ImageInfo *read_info; int number_files; MagickBoo...
139,499,724,195,983,950,000,000,000,000,000,000,000
vid.c
53,158,342,806,075,180,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2019-12974
A NULL pointer dereference in the function ReadPANGOImage in coders/pango.c and the function ReadVIDImage in coders/vid.c in ImageMagick 7.0.8-34 allows remote attackers to cause a denial of service via a crafted image.
https://nvd.nist.gov/vuln/detail/CVE-2019-12974
211,031
DBD-mysql
7c164a0c86cec6ee95df1d141e67b0e85dfdefd2
https://github.com/perl5-dbi/DBD-mysql
https://github.com/perl5-dbi/DBD-mysql/commit/7c164a0c86cec6ee95df1d141e67b0e85dfdefd2
Do not use unsafe sprintf w/variable length input This can cause a buffer overflow to occur when reporting error message about validation of (untrusted) user input parameters.
1
int dbd_bind_ph(SV *sth, imp_sth_t *imp_sth, SV *param, SV *value, IV sql_type, SV *attribs, int is_inout, IV maxlen) { dTHX; int rc; int param_num= SvIV(param); int idx= param_num - 1; char err_msg[64]; D_imp_xxh(sth); #if MYSQL_VERSION_ID >= SERVER_PREPARE_VERSION STRLEN slen; char *buffer= NULL; ...
276,628,553,119,414,900,000,000,000,000,000,000,000
dbdimp.c
259,970,653,639,265,650,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-1246
Buffer overflow in the DBD::mysql module before 4.037 for Perl allows context-dependent attackers to cause a denial of service (crash) via vectors related to an error message.
https://nvd.nist.gov/vuln/detail/CVE-2016-1246
444,831
DBD-mysql
7c164a0c86cec6ee95df1d141e67b0e85dfdefd2
https://github.com/perl5-dbi/DBD-mysql
https://github.com/perl5-dbi/DBD-mysql/commit/7c164a0c86cec6ee95df1d141e67b0e85dfdefd2
Do not use unsafe sprintf w/variable length input This can cause a buffer overflow to occur when reporting error message about validation of (untrusted) user input parameters.
0
int dbd_bind_ph(SV *sth, imp_sth_t *imp_sth, SV *param, SV *value, IV sql_type, SV *attribs, int is_inout, IV maxlen) { dTHX; int rc; int param_num= SvIV(param); int idx= param_num - 1; char *err_msg; D_imp_xxh(sth); #if MYSQL_VERSION_ID >= SERVER_PREPARE_VERSION STRLEN slen; char *buffer= NULL; i...
24,339,835,626,884,312,000,000,000,000,000,000,000
dbdimp.c
328,368,710,463,227,580,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-1246
Buffer overflow in the DBD::mysql module before 4.037 for Perl allows context-dependent attackers to cause a denial of service (crash) via vectors related to an error message.
https://nvd.nist.gov/vuln/detail/CVE-2016-1246
211,104
ImageMagick6
d5df600d43c8706df513a3273d09aee6f54a9233
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/d5df600d43c8706df513a3273d09aee6f54a9233
https://github.com/ImageMagick/ImageMagick/issues/1754
1
static int IntensityCompare(const void *x,const void *y) { PixelPacket *color_1, *color_2; ssize_t intensity; color_1=(PixelPacket *) x; color_2=(PixelPacket *) y; intensity=(ssize_t) PixelPacketIntensity(color_1)- (ssize_t) PixelPacketIntensity(color_2); return((int) intensity); }
55,735,061,968,911,560,000,000,000,000,000,000,000
quantize.c
266,695,720,896,154,260,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2020-27754
In IntensityCompare() of /magick/quantize.c, there are calls to PixelPacketIntensity() which could return overflowed values to the caller when ImageMagick processes a crafted input file. To mitigate this, the patch introduces and uses the ConstrainPixelIntensity() function, which forces the pixel intensities to be with...
https://nvd.nist.gov/vuln/detail/CVE-2020-27754
446,020
ImageMagick6
d5df600d43c8706df513a3273d09aee6f54a9233
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/d5df600d43c8706df513a3273d09aee6f54a9233
https://github.com/ImageMagick/ImageMagick/issues/1754
0
static int IntensityCompare(const void *x,const void *y) { PixelPacket *color_1, *color_2; ssize_t intensity; color_1=(PixelPacket *) x; color_2=(PixelPacket *) y; intensity=(ssize_t) ConstrainPixelIntensity(PixelPacketIntensity(color_1))- (ssize_t) ConstrainPixelIntensity(PixelPacketIntensi...
144,489,784,766,711,070,000,000,000,000,000,000,000
quantize.c
46,007,150,497,717,485,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2020-27754
In IntensityCompare() of /magick/quantize.c, there are calls to PixelPacketIntensity() which could return overflowed values to the caller when ImageMagick processes a crafted input file. To mitigate this, the patch introduces and uses the ConstrainPixelIntensity() function, which forces the pixel intensities to be with...
https://nvd.nist.gov/vuln/detail/CVE-2020-27754
211,123
ImageMagick6
b9c3aa197020ca091a21145cf46855afd4ddcb07
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/b9c3aa197020ca091a21145cf46855afd4ddcb07
https://github.com/ImageMagick/ImageMagick/issues/1517
1
static MagickBooleanType WriteDPXImage(const ImageInfo *image_info, Image *image) { const char *value; const StringInfo *profile; DPXInfo dpx; MagickBooleanType status; MagickOffsetType offset; MagickStatusType flags; GeometryInfo geometry_info; QuantumInfo *quan...
59,958,399,033,322,270,000,000,000,000,000,000,000
dpx.c
180,998,177,479,375,340,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2019-12975
ImageMagick 7.0.8-34 has a memory leak vulnerability in the WriteDPXImage function in coders/dpx.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-12975
446,189
ImageMagick6
b9c3aa197020ca091a21145cf46855afd4ddcb07
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/b9c3aa197020ca091a21145cf46855afd4ddcb07
https://github.com/ImageMagick/ImageMagick/issues/1517
0
static MagickBooleanType WriteDPXImage(const ImageInfo *image_info, Image *image) { const char *value; const StringInfo *profile; DPXInfo dpx; MagickBooleanType status; MagickOffsetType offset; MagickStatusType flags; GeometryInfo geometry_info; QuantumInfo *quan...
150,895,854,198,537,660,000,000,000,000,000,000,000
dpx.c
124,594,548,989,713,760,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2019-12975
ImageMagick 7.0.8-34 has a memory leak vulnerability in the WriteDPXImage function in coders/dpx.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-12975
211,124
sparc
80caf43549e7e41a695c6d1e11066286538b336f
https://git.kernel.org/pub/scm/linux/kernel/git/davem/sparc
https://git.kernel.org/pub/scm/linux/kernel/git/davem/sparc.git/commit/?id=80caf43549e7e41a695c6d1e11066286538b336f
mdesc: fix a missing-check bug in get_vdev_port_node_info() In get_vdev_port_node_info(), 'node_info->vdev_port.name' is allcoated by kstrdup_const(), and it returns NULL when fails. So 'node_info->vdev_port.name' should be checked. Signed-off-by: Gen Zhang <blackgod016574@gmail.com> Signed-off-by: David S. Miller <d...
1
static int get_vdev_port_node_info(struct mdesc_handle *md, u64 node, union md_node_info *node_info) { const u64 *parent_cfg_hdlp; const char *name; const u64 *idp; /* * Virtual device nodes are distinguished by: * 1. "id" property * 2. "name" property * 3. parent node "cfg-handle" property */ id...
224,331,832,849,071,840,000,000,000,000,000,000,000
mdesc.c
4,126,304,536,054,423,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2019-12615
An issue was discovered in get_vdev_port_node_info in arch/sparc/kernel/mdesc.c in the Linux kernel through 5.1.6. There is an unchecked kstrdup_const of node_info->vdev_port.name, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash).
https://nvd.nist.gov/vuln/detail/CVE-2019-12615
446,219
sparc
80caf43549e7e41a695c6d1e11066286538b336f
https://git.kernel.org/pub/scm/linux/kernel/git/davem/sparc
https://git.kernel.org/pub/scm/linux/kernel/git/davem/sparc.git/commit/?id=80caf43549e7e41a695c6d1e11066286538b336f
mdesc: fix a missing-check bug in get_vdev_port_node_info() In get_vdev_port_node_info(), 'node_info->vdev_port.name' is allcoated by kstrdup_const(), and it returns NULL when fails. So 'node_info->vdev_port.name' should be checked. Signed-off-by: Gen Zhang <blackgod016574@gmail.com> Signed-off-by: David S. Miller <d...
0
static int get_vdev_port_node_info(struct mdesc_handle *md, u64 node, union md_node_info *node_info) { const u64 *parent_cfg_hdlp; const char *name; const u64 *idp; /* * Virtual device nodes are distinguished by: * 1. "id" property * 2. "name" property * 3. parent node "cfg-handle" property */ id...
48,327,159,297,697,690,000,000,000,000,000,000,000
mdesc.c
100,890,858,007,712,890,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2019-12615
An issue was discovered in get_vdev_port_node_info in arch/sparc/kernel/mdesc.c in the Linux kernel through 5.1.6. There is an unchecked kstrdup_const of node_info->vdev_port.name, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash).
https://nvd.nist.gov/vuln/detail/CVE-2019-12615
211,125
vim
78d52883e10d71f23ab72a3d8b9733b00da8c9ad
https://github.com/vim/vim
https://github.com/vim/vim/commit/78d52883e10d71f23ab72a3d8b9733b00da8c9ad
patch 8.2.5013: after text formatting cursor may be in an invalid position Problem: After text formatting the cursor may be in an invalid position. Solution: Correct the cursor position after formatting.
1
op_format( oparg_T *oap, int keep_cursor) // keep cursor on same text char { long old_line_count = curbuf->b_ml.ml_line_count; // Place the cursor where the "gq" or "gw" command was given, so that "u" // can put it back there. curwin->w_cursor = oap->cursor_start; if (u_save((linenr_T)(o...
94,494,779,186,259,740,000,000,000,000,000,000,000
textformat.c
155,532,383,318,269,900,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2022-1851
Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.
https://nvd.nist.gov/vuln/detail/CVE-2022-1851
446,268
vim
78d52883e10d71f23ab72a3d8b9733b00da8c9ad
https://github.com/vim/vim
https://github.com/vim/vim/commit/78d52883e10d71f23ab72a3d8b9733b00da8c9ad
patch 8.2.5013: after text formatting cursor may be in an invalid position Problem: After text formatting the cursor may be in an invalid position. Solution: Correct the cursor position after formatting.
0
op_format( oparg_T *oap, int keep_cursor) // keep cursor on same text char { long old_line_count = curbuf->b_ml.ml_line_count; // Place the cursor where the "gq" or "gw" command was given, so that "u" // can put it back there. curwin->w_cursor = oap->cursor_start; if (u_save((linenr_T)(o...
91,853,943,991,981,200,000,000,000,000,000,000,000
textformat.c
186,902,274,703,795,840,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2022-1851
Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.
https://nvd.nist.gov/vuln/detail/CVE-2022-1851
211,137
linux
3b0541791453fbe7f42867e310e0c9eb6295364d
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3b0541791453fbe7f42867e310e0c9eb6295364d
scsi: libsas: delete sas port if expander discover failed The sas_port(phy->port) allocated in sas_ex_discover_expander() will not be deleted when the expander failed to discover. This will cause resource leak and a further issue of kernel BUG like below: [159785.843156] port-2:17:29: trying to add phy phy-2:17:29 f...
1
static struct domain_device *sas_ex_discover_expander( struct domain_device *parent, int phy_id) { struct sas_expander_device *parent_ex = rphy_to_expander_device(parent->rphy); struct ex_phy *phy = &parent->ex_dev.ex_phy[phy_id]; struct domain_device *child = NULL; struct sas_rphy *rphy; struct sas_expander_devi...
256,839,627,417,889,600,000,000,000,000,000,000,000
None
null
[ "CWE-401" ]
CVE-2019-15807
In the Linux kernel before 5.1.13, there is a memory leak in drivers/scsi/libsas/sas_expander.c when SAS expander discovery fails. This will cause a BUG and denial of service.
https://nvd.nist.gov/vuln/detail/CVE-2019-15807
446,457
linux
3b0541791453fbe7f42867e310e0c9eb6295364d
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3b0541791453fbe7f42867e310e0c9eb6295364d
scsi: libsas: delete sas port if expander discover failed The sas_port(phy->port) allocated in sas_ex_discover_expander() will not be deleted when the expander failed to discover. This will cause resource leak and a further issue of kernel BUG like below: [159785.843156] port-2:17:29: trying to add phy phy-2:17:29 f...
0
static struct domain_device *sas_ex_discover_expander( struct domain_device *parent, int phy_id) { struct sas_expander_device *parent_ex = rphy_to_expander_device(parent->rphy); struct ex_phy *phy = &parent->ex_dev.ex_phy[phy_id]; struct domain_device *child = NULL; struct sas_rphy *rphy; struct sas_expander_devi...
244,789,976,616,774,380,000,000,000,000,000,000,000
None
null
[ "CWE-401" ]
CVE-2019-15807
In the Linux kernel before 5.1.13, there is a memory leak in drivers/scsi/libsas/sas_expander.c when SAS expander discovery fails. This will cause a BUG and denial of service.
https://nvd.nist.gov/vuln/detail/CVE-2019-15807
211,153
ImageMagick6
e2a21735e3a3f3930bd431585ec36334c4c2eb77
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/e2a21735e3a3f3930bd431585ec36334c4c2eb77
https://github.com/ImageMagick/ImageMagick/issues/1540
1
static MagickBooleanType SetGrayscaleImage(Image *image) { CacheView *image_view; ExceptionInfo *exception; MagickBooleanType status; PixelPacket *colormap; register ssize_t i; ssize_t *colormap_index, j, y; assert(image != (Image *) NULL); assert(image->signature =...
133,847,642,611,919,600,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2019-11598
In ImageMagick 7.0.8-40 Q16, there is a heap-based buffer over-read in the function WritePNMImage of coders/pnm.c, which allows an attacker to cause a denial of service or possibly information disclosure via a crafted image file. This is related to SetGrayscaleImage in MagickCore/quantize.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-11598
446,817
ImageMagick6
e2a21735e3a3f3930bd431585ec36334c4c2eb77
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/e2a21735e3a3f3930bd431585ec36334c4c2eb77
https://github.com/ImageMagick/ImageMagick/issues/1540
0
static MagickBooleanType SetGrayscaleImage(Image *image) { CacheView *image_view; ExceptionInfo *exception; MagickBooleanType status; PixelPacket *colormap; register ssize_t i; ssize_t *colormap_index, j, y; assert(image != (Image *) NULL); assert(image->signature =...
199,970,286,491,542,160,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2019-11598
In ImageMagick 7.0.8-40 Q16, there is a heap-based buffer over-read in the function WritePNMImage of coders/pnm.c, which allows an attacker to cause a denial of service or possibly information disclosure via a crafted image file. This is related to SetGrayscaleImage in MagickCore/quantize.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-11598
211,154
linux
29eb31542787e1019208a2e1047bb7c76c069536
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=29eb31542787e1019208a2e1047bb7c76c069536
yam: fix a memory leak in yam_siocdevprivate() ym needs to be free when ym->cmd != SIOCYAMSMCS. Fixes: 0781168e23a2 ("yam: fix a missing-check bug") Signed-off-by: Hangyu Hua <hbh25y@gmail.com> Signed-off-by: David S. Miller <davem@davemloft.net>
1
static int yam_siocdevprivate(struct net_device *dev, struct ifreq *ifr, void __user *data, int cmd) { struct yam_port *yp = netdev_priv(dev); struct yamdrv_ioctl_cfg yi; struct yamdrv_ioctl_mcs *ym; int ioctl_cmd; if (copy_from_user(&ioctl_cmd, data, sizeof(int))) return -EFAULT; if (yp->magic != YAM_MAGIC) ...
297,353,328,281,095,560,000,000,000,000,000,000,000
yam.c
187,741,710,050,303,130,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2022-24959
An issue was discovered in the Linux kernel before 5.16.5. There is a memory leak in yam_siocdevprivate in drivers/net/hamradio/yam.c.
https://nvd.nist.gov/vuln/detail/CVE-2022-24959