idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
438,984 | openldap | d169e7958a3e0dc70f59c8374bf8a59833b7bdd8 | https://github.com/openldap/openldap | https://git.openldap.org/openldap/openldap/-/commit/d169e7958a3e0dc70f59c8374bf8a59833b7bdd8 | ITS#9413 fix slap_parse_user | 0 | int slap_parse_user( struct berval *id, struct berval *user,
struct berval *realm, struct berval *mech )
{
char u;
assert( id != NULL );
assert( !BER_BVISNULL( id ) );
assert( user != NULL );
assert( realm != NULL );
assert( mech != NULL );
u = id->bv_val[ 0 ];
if ( u != 'u' && u != 'U' ) {
/* called w... | 272,952,872,819,236,860,000,000,000,000,000,000,000 | saslauthz.c | 313,836,664,500,347,340,000,000,000,000,000,000,000 | [
"CWE-763"
] | CVE-2020-36224 | A flaw was discovered in OpenLDAP before 2.4.57 leading to an invalid pointer free and slapd crash in the saslAuthzTo processing, resulting in denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2020-36224 |
210,647 | linux | 3a9b153c5591548612c3955c9600a98150c81875 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/3a9b153c5591548612c3955c9600a98150c81875 | mwifiex: Fix possible buffer overflows in mwifiex_ret_wmm_get_status()
mwifiex_ret_wmm_get_status() calls memcpy() without checking the
destination size.Since the source is given from remote AP which
contains illegal wmm elements , this may trigger a heap buffer
overflow.
Fix it by putting the length check before call... | 1 | int mwifiex_ret_wmm_get_status(struct mwifiex_private *priv,
const struct host_cmd_ds_command *resp)
{
u8 *curr = (u8 *) &resp->params.get_wmm_status;
uint16_t resp_len = le16_to_cpu(resp->size), tlv_len;
int mask = IEEE80211_WMM_IE_AP_QOSINFO_PARAM_SET_CNT_MASK;
bool valid = true;
struct mwifiex_ie_typ... | 155,821,006,638,101,020,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2020-12654 | An issue was found in Linux kernel before 5.5.4. mwifiex_ret_wmm_get_status() in drivers/net/wireless/marvell/mwifiex/wmm.c allows a remote AP to trigger a heap-based buffer overflow because of an incorrect memcpy, aka CID-3a9b153c5591. | https://nvd.nist.gov/vuln/detail/CVE-2020-12654 |
439,001 | linux | 3a9b153c5591548612c3955c9600a98150c81875 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/3a9b153c5591548612c3955c9600a98150c81875 | mwifiex: Fix possible buffer overflows in mwifiex_ret_wmm_get_status()
mwifiex_ret_wmm_get_status() calls memcpy() without checking the
destination size.Since the source is given from remote AP which
contains illegal wmm elements , this may trigger a heap buffer
overflow.
Fix it by putting the length check before call... | 0 | int mwifiex_ret_wmm_get_status(struct mwifiex_private *priv,
const struct host_cmd_ds_command *resp)
{
u8 *curr = (u8 *) &resp->params.get_wmm_status;
uint16_t resp_len = le16_to_cpu(resp->size), tlv_len;
int mask = IEEE80211_WMM_IE_AP_QOSINFO_PARAM_SET_CNT_MASK;
bool valid = true;
struct mwifiex_ie_typ... | 42,803,343,887,989,735,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2020-12654 | An issue was found in Linux kernel before 5.5.4. mwifiex_ret_wmm_get_status() in drivers/net/wireless/marvell/mwifiex/wmm.c allows a remote AP to trigger a heap-based buffer overflow because of an incorrect memcpy, aka CID-3a9b153c5591. | https://nvd.nist.gov/vuln/detail/CVE-2020-12654 |
210,648 | libsoup | db2b0d5809d5f8226d47312b40992cadbcde439f | https://git.gnome.org/browse/libsoup | https://gitlab.gnome.org/GNOME/libsoup/commit/db2b0d5809d5f8226d47312b40992cadbcde439f | cookie-jar: bail if hostname is an empty string
There are several other ways to fix the problem with this function, but
skipping over all of the code is probably the simplest.
Fixes #3 | 1 | get_cookies (SoupCookieJar *jar, SoupURI *uri, gboolean for_http, gboolean copy_cookies)
{
SoupCookieJarPrivate *priv;
GSList *cookies, *domain_cookies;
char *domain, *cur, *next_domain;
GSList *new_head, *cookies_to_remove = NULL, *p;
priv = soup_cookie_jar_get_instance_private (jar);
if (!uri->host)
return ... | 18,108,858,413,069,931,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2018-12910 | The get_cookies function in soup-cookie-jar.c in libsoup 2.63.2 allows attackers to have unspecified impact via an empty hostname. | https://nvd.nist.gov/vuln/detail/CVE-2018-12910 |
439,036 | libsoup | db2b0d5809d5f8226d47312b40992cadbcde439f | https://git.gnome.org/browse/libsoup | https://gitlab.gnome.org/GNOME/libsoup/commit/db2b0d5809d5f8226d47312b40992cadbcde439f | cookie-jar: bail if hostname is an empty string
There are several other ways to fix the problem with this function, but
skipping over all of the code is probably the simplest.
Fixes #3 | 0 | get_cookies (SoupCookieJar *jar, SoupURI *uri, gboolean for_http, gboolean copy_cookies)
{
SoupCookieJarPrivate *priv;
GSList *cookies, *domain_cookies;
char *domain, *cur, *next_domain;
GSList *new_head, *cookies_to_remove = NULL, *p;
priv = soup_cookie_jar_get_instance_private (jar);
if (!uri->host || !uri->h... | 42,318,093,975,771,455,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2018-12910 | The get_cookies function in soup-cookie-jar.c in libsoup 2.63.2 allows attackers to have unspecified impact via an empty hostname. | https://nvd.nist.gov/vuln/detail/CVE-2018-12910 |
210,680 | harfbuzz | 63ef0b41dc48d6112d1918c1b1de9de8ea90adb5 | https://github.com/behdad/harfbuzz | https://github.com/behdad/harfbuzz/commit/63ef0b41dc48d6112d1918c1b1de9de8ea90adb5 | [ot-font] Fix hmtx wrong table length check
Discovered by libFuzzer. Ouch!
https://github.com/behdad/harfbuzz/issues/139#issuecomment-148289957 | 1 | inline void init (hb_face_t *face,
hb_tag_t _hea_tag, hb_tag_t _mtx_tag,
unsigned int default_advance_)
{
this->default_advance = default_advance_;
this->num_metrics = face->get_num_glyphs ();
hb_blob_t *_hea_blob = OT::Sanitizer<OT::_hea>::sanitize (face->reference_table (_hea_tag));
c... | 98,048,749,689,347,620,000,000,000,000,000,000,000 | hb-ot-font.cc | 75,698,621,442,136,280,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2016-2052 | Multiple unspecified vulnerabilities in HarfBuzz before 1.0.6, as used in Google Chrome before 48.0.2564.82, allow attackers to cause a denial of service or possibly have other impact via crafted data, as demonstrated by a buffer over-read resulting from an inverted length check in hb-ot-font.cc, a different issue than... | https://nvd.nist.gov/vuln/detail/CVE-2016-2052 |
439,198 | harfbuzz | 63ef0b41dc48d6112d1918c1b1de9de8ea90adb5 | https://github.com/behdad/harfbuzz | https://github.com/behdad/harfbuzz/commit/63ef0b41dc48d6112d1918c1b1de9de8ea90adb5 | [ot-font] Fix hmtx wrong table length check
Discovered by libFuzzer. Ouch!
https://github.com/behdad/harfbuzz/issues/139#issuecomment-148289957 | 0 | inline void init (hb_face_t *face,
hb_tag_t _hea_tag, hb_tag_t _mtx_tag,
unsigned int default_advance_)
{
this->default_advance = default_advance_;
this->num_metrics = face->get_num_glyphs ();
hb_blob_t *_hea_blob = OT::Sanitizer<OT::_hea>::sanitize (face->reference_table (_hea_tag));
c... | 309,123,526,330,801,140,000,000,000,000,000,000,000 | hb-ot-font.cc | 107,832,708,563,582,020,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2016-2052 | Multiple unspecified vulnerabilities in HarfBuzz before 1.0.6, as used in Google Chrome before 48.0.2564.82, allow attackers to cause a denial of service or possibly have other impact via crafted data, as demonstrated by a buffer over-read resulting from an inverted length check in hb-ot-font.cc, a different issue than... | https://nvd.nist.gov/vuln/detail/CVE-2016-2052 |
210,684 | linux | 7dc40713618c884bf07c030d1ab1f47a9dc1f310 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7dc40713618c884bf07c030d1ab1f47a9dc1f310 | drm/i915: Introduce a mutex for file_priv->context_idr
Define a mutex for the exclusive use of interacting with the per-file
context-idr, that was previously guarded by struct_mutex. This allows us
to reduce the coverage of struct_mutex, with a view to removing the last
bits coordinating GEM context later. (In the sho... | 1 | int i915_gem_context_destroy_ioctl(struct drm_device *dev, void *data,
struct drm_file *file)
{
struct drm_i915_gem_context_destroy *args = data;
struct drm_i915_file_private *file_priv = file->driver_priv;
struct i915_gem_context *ctx;
int ret;
if (args->pad != 0)
return -EINVAL;
if (args->ctx_id == D... | 75,674,238,157,396,410,000,000,000,000,000,000,000 | i915_gem_context.c | 317,728,118,973,556,350,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2020-7053 | In the Linux kernel 4.14 longterm through 4.14.165 and 4.19 longterm through 4.19.96 (and 5.x before 5.2), there is a use-after-free (write) in the i915_ppgtt_close function in drivers/gpu/drm/i915/i915_gem_gtt.c, aka CID-7dc40713618c. This is related to i915_gem_context_destroy_ioctl in drivers/gpu/drm/i915/i915_gem_c... | https://nvd.nist.gov/vuln/detail/CVE-2020-7053 |
439,211 | linux | 7dc40713618c884bf07c030d1ab1f47a9dc1f310 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7dc40713618c884bf07c030d1ab1f47a9dc1f310 | drm/i915: Introduce a mutex for file_priv->context_idr
Define a mutex for the exclusive use of interacting with the per-file
context-idr, that was previously guarded by struct_mutex. This allows us
to reduce the coverage of struct_mutex, with a view to removing the last
bits coordinating GEM context later. (In the sho... | 0 | int i915_gem_context_destroy_ioctl(struct drm_device *dev, void *data,
struct drm_file *file)
{
struct drm_i915_gem_context_destroy *args = data;
struct drm_i915_file_private *file_priv = file->driver_priv;
struct i915_gem_context *ctx;
if (args->pad != 0)
return -EINVAL;
if (args->ctx_id == DEFAULT_CON... | 103,386,436,299,816,360,000,000,000,000,000,000,000 | i915_gem_context.c | 195,496,235,253,545,530,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2020-7053 | In the Linux kernel 4.14 longterm through 4.14.165 and 4.19 longterm through 4.19.96 (and 5.x before 5.2), there is a use-after-free (write) in the i915_ppgtt_close function in drivers/gpu/drm/i915/i915_gem_gtt.c, aka CID-7dc40713618c. This is related to i915_gem_context_destroy_ioctl in drivers/gpu/drm/i915/i915_gem_c... | https://nvd.nist.gov/vuln/detail/CVE-2020-7053 |
210,691 | gnutls | 328ee22c1b3951e060c7124c7cb1cee592c59bc0 | http://git.savannah.gnu.org/cgit/gnutls | https://gitorious.org/gnutls/gnutls/commit/328ee22c1b3951e060c7124c7cb1cee592c59bc0 | Fixes to avoid a timing attack in TLS CBC record parsing. | 1 | ciphertext_to_compressed (gnutls_session_t session,
gnutls_datum_t *ciphertext,
gnutls_datum_t * compressed,
uint8_t type, record_parameters_st * params,
uint64* sequence)
{
uint8_t tag[MAX_HASH_SIZE];
unsigned... | 262,270,997,439,757,080,000,000,000,000,000,000,000 | gnutls_cipher.c | 330,738,802,630,868,640,000,000,000,000,000,000,000 | [
"CWE-310"
] | CVE-2013-0169 | The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and p... | https://nvd.nist.gov/vuln/detail/CVE-2013-0169 |
439,260 | gnutls | 328ee22c1b3951e060c7124c7cb1cee592c59bc0 | http://git.savannah.gnu.org/cgit/gnutls | https://gitorious.org/gnutls/gnutls/commit/328ee22c1b3951e060c7124c7cb1cee592c59bc0 | Fixes to avoid a timing attack in TLS CBC record parsing. | 0 | ciphertext_to_compressed (gnutls_session_t session,
gnutls_datum_t *ciphertext,
gnutls_datum_t * compressed,
uint8_t type, record_parameters_st * params,
uint64* sequence)
{
uint8_t tag[MAX_HASH_SIZE];
unsigned... | 15,881,144,915,942,368,000,000,000,000,000,000,000 | gnutls_cipher.c | 28,246,248,741,942,423,000,000,000,000,000,000,000 | [
"CWE-310"
] | CVE-2013-0169 | The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and p... | https://nvd.nist.gov/vuln/detail/CVE-2013-0169 |
210,695 | FreeRDP | 3a06ce058f690b7fc1edad2f352c453376c2ebfe | https://github.com/FreeRDP/FreeRDP | https://github.com/FreeRDP/FreeRDP/commit/3a06ce058f690b7fc1edad2f352c453376c2ebfe | Fixed oob read in rfx_process_message_tileset
Check input data length
Thanks to hac425 CVE-2020-11043 | 1 | static BOOL rfx_process_message_tileset(RFX_CONTEXT* context, RFX_MESSAGE* message, wStream* s,
UINT16* pExpectedBlockType)
{
BOOL rc;
int i, close_cnt;
size_t pos;
BYTE quant;
RFX_TILE* tile;
RFX_TILE** tmpTiles;
UINT32* quants;
UINT16 subtype, numTiles;
UINT32 blockLen... | 9,307,873,399,250,861,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2020-11043 | In FreeRDP less than or equal to 2.0.0, there is an out-of-bounds read in rfx_process_message_tileset. Invalid data fed to RFX decoder results in garbage on screen (as colors). This has been patched in 2.1.0. | https://nvd.nist.gov/vuln/detail/CVE-2020-11043 |
439,285 | FreeRDP | 3a06ce058f690b7fc1edad2f352c453376c2ebfe | https://github.com/FreeRDP/FreeRDP | https://github.com/FreeRDP/FreeRDP/commit/3a06ce058f690b7fc1edad2f352c453376c2ebfe | Fixed oob read in rfx_process_message_tileset
Check input data length
Thanks to hac425 CVE-2020-11043 | 0 | static BOOL rfx_process_message_tileset(RFX_CONTEXT* context, RFX_MESSAGE* message, wStream* s,
UINT16* pExpectedBlockType)
{
BOOL rc;
int i, close_cnt;
BYTE quant;
RFX_TILE* tile;
RFX_TILE** tmpTiles;
UINT32* quants;
UINT16 subtype, numTiles;
UINT32 blockLen;
UINT32 blo... | 327,472,799,383,194,870,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2020-11043 | In FreeRDP less than or equal to 2.0.0, there is an out-of-bounds read in rfx_process_message_tileset. Invalid data fed to RFX decoder results in garbage on screen (as colors). This has been patched in 2.1.0. | https://nvd.nist.gov/vuln/detail/CVE-2020-11043 |
210,710 | gimp | 702c4227e8b6169f781e4bb5ae4b5733f51ab126 | https://github.com/GNOME/gimp | https://git.gnome.org/browse/gimp/commit/?id=702c4227e8b6169f781e4bb5ae4b5733f51ab126 | 790783 - buffer overread in XCF parser if version field...
...has no null terminator
Check for the presence of '\0' before using atoi() on the version
string. Patch slightly modified (mitch). | 1 | xcf_load_stream (Gimp *gimp,
GInputStream *input,
GFile *input_file,
GimpProgress *progress,
GError **error)
{
XcfInfo info = { 0, };
const gchar *filename;
GimpImage *image = NULL;
gchar id[14];
gboole... | 61,451,131,735,134,185,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2017-17788 | In GIMP 2.8.22, there is a stack-based buffer over-read in xcf_load_stream in app/xcf/xcf.c when there is no '\0' character after the version string. | https://nvd.nist.gov/vuln/detail/CVE-2017-17788 |
439,544 | gimp | 702c4227e8b6169f781e4bb5ae4b5733f51ab126 | https://github.com/GNOME/gimp | https://git.gnome.org/browse/gimp/commit/?id=702c4227e8b6169f781e4bb5ae4b5733f51ab126 | 790783 - buffer overread in XCF parser if version field...
...has no null terminator
Check for the presence of '\0' before using atoi() on the version
string. Patch slightly modified (mitch). | 0 | xcf_load_stream (Gimp *gimp,
GInputStream *input,
GFile *input_file,
GimpProgress *progress,
GError **error)
{
XcfInfo info = { 0, };
const gchar *filename;
GimpImage *image = NULL;
gchar id[14];
gboole... | 79,866,368,478,830,490,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2017-17788 | In GIMP 2.8.22, there is a stack-based buffer over-read in xcf_load_stream in app/xcf/xcf.c when there is no '\0' character after the version string. | https://nvd.nist.gov/vuln/detail/CVE-2017-17788 |
210,711 | ImageMagick | 31b842a218225cd7feddf65cbccf9d783c6cb526 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/31b842a218225cd7feddf65cbccf9d783c6cb526 | https://github.com/ImageMagick/ImageMagick/issues/471 | 1 | static Image *ReadXWDImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
#define CheckOverflowException(length,width,height) \
(((height) != 0) && ((length)/((size_t) height) != ((size_t) width)))
char
*comment;
Image
*image;
int
x_status;
MagickBooleanType
authentic_colormap;
... | 81,611,277,424,520,220,000,000,000,000,000,000,000 | xwd.c | 273,579,332,340,926,070,000,000,000,000,000,000,000 | [
"CWE-772"
] | CVE-2017-11166 | The ReadXWDImage function in coders\xwd.c in ImageMagick 7.0.5-6 has a memory leak vulnerability that can cause memory exhaustion via a crafted length (number of color-map entries) field in the header of an XWD file. | https://nvd.nist.gov/vuln/detail/CVE-2017-11166 |
439,550 | ImageMagick | 31b842a218225cd7feddf65cbccf9d783c6cb526 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/31b842a218225cd7feddf65cbccf9d783c6cb526 | https://github.com/ImageMagick/ImageMagick/issues/471 | 0 | static Image *ReadXWDImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
#define CheckOverflowException(length,width,height) \
(((height) != 0) && ((length)/((size_t) height) != ((size_t) width)))
char
*comment;
Image
*image;
int
x_status;
MagickBooleanType
authentic_colormap;
... | 135,645,574,828,240,580,000,000,000,000,000,000,000 | xwd.c | 162,001,017,113,673,350,000,000,000,000,000,000,000 | [
"CWE-772"
] | CVE-2017-11166 | The ReadXWDImage function in coders\xwd.c in ImageMagick 7.0.5-6 has a memory leak vulnerability that can cause memory exhaustion via a crafted length (number of color-map entries) field in the header of an XWD file. | https://nvd.nist.gov/vuln/detail/CVE-2017-11166 |
210,734 | linux | 9c0530e898f384c5d279bfcebd8bb17af1105873 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/9c0530e898f384c5d279bfcebd8bb17af1105873 | iio: imu: adis16400: fix memory leak
In adis_update_scan_mode_burst, if adis->buffer allocation fails release
the adis->xfer.
Signed-off-by: Navid Emamdoost <navid.emamdoost@gmail.com>
Reviewed-by: Alexandru Ardelean <alexandru.ardelean@analog.com>
Signed-off-by: Jonathan Cameron <Jonathan.Cameron@huawei.com> | 1 | static int adis_update_scan_mode_burst(struct iio_dev *indio_dev,
const unsigned long *scan_mask)
{
struct adis *adis = iio_device_get_drvdata(indio_dev);
unsigned int burst_length;
u8 *tx;
/* All but the timestamp channel */
burst_length = (indio_dev->num_channels - 1) * sizeof(u16);
burst_length += adis->burs... | 305,075,040,204,417,800,000,000,000,000,000,000,000 | adis_buffer.c | 162,105,516,053,392,100,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2019-19061 | A memory leak in the adis_update_scan_mode_burst() function in drivers/iio/imu/adis_buffer.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-9c0530e898f3. | https://nvd.nist.gov/vuln/detail/CVE-2019-19061 |
439,820 | linux | 9c0530e898f384c5d279bfcebd8bb17af1105873 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/9c0530e898f384c5d279bfcebd8bb17af1105873 | iio: imu: adis16400: fix memory leak
In adis_update_scan_mode_burst, if adis->buffer allocation fails release
the adis->xfer.
Signed-off-by: Navid Emamdoost <navid.emamdoost@gmail.com>
Reviewed-by: Alexandru Ardelean <alexandru.ardelean@analog.com>
Signed-off-by: Jonathan Cameron <Jonathan.Cameron@huawei.com> | 0 | static int adis_update_scan_mode_burst(struct iio_dev *indio_dev,
const unsigned long *scan_mask)
{
struct adis *adis = iio_device_get_drvdata(indio_dev);
unsigned int burst_length;
u8 *tx;
/* All but the timestamp channel */
burst_length = (indio_dev->num_channels - 1) * sizeof(u16);
burst_length += adis->burs... | 256,927,841,529,125,500,000,000,000,000,000,000,000 | adis_buffer.c | 227,617,683,451,096,400,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2019-19061 | A memory leak in the adis_update_scan_mode_burst() function in drivers/iio/imu/adis_buffer.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-9c0530e898f3. | https://nvd.nist.gov/vuln/detail/CVE-2019-19061 |
210,736 | linux-stable | 9d289715eb5c252ae15bd547cb252ca547a3c4f2 | https://git.kernel.org/cgit/linux/kernel/git/stable/linux-stable | https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git/commit/?id=9d289715eb5c252ae15bd547cb252ca547a3c4f2 | ipv6: stop sending PTB packets for MTU < 1280
Reduce the attack vector and stop generating IPv6 Fragment Header for
paths with an MTU smaller than the minimum required IPv6 MTU
size (1280 byte) - called atomic fragments.
See IETF I-D "Deprecating the Generation of IPv6 Atomic Fragments" [1]
for more information and h... | 1 | static void ip6_rt_update_pmtu(struct dst_entry *dst, struct sock *sk,
struct sk_buff *skb, u32 mtu)
{
struct rt6_info *rt6 = (struct rt6_info *)dst;
dst_confirm(dst);
if (mtu < dst_mtu(dst) && rt6->rt6i_dst.plen == 128) {
struct net *net = dev_net(dst->dev);
rt6->rt6i_flags |= RTF_MODIFIED;
if (mt... | 174,414,360,646,351,160,000,000,000,000,000,000,000 | route.c | 193,709,601,889,154,940,000,000,000,000,000,000,000 | [
"CWE-17"
] | CVE-2016-10142 | An issue was discovered in the IPv6 protocol specification, related to ICMP Packet Too Big (PTB) messages. (The scope of this CVE is all affected IPv6 implementations from all vendors.) The security implications of IP fragmentation have been discussed at length in [RFC6274] and [RFC7739]. An attacker can leverage the g... | https://nvd.nist.gov/vuln/detail/CVE-2016-10142 |
439,854 | linux-stable | 9d289715eb5c252ae15bd547cb252ca547a3c4f2 | https://git.kernel.org/cgit/linux/kernel/git/stable/linux-stable | https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git/commit/?id=9d289715eb5c252ae15bd547cb252ca547a3c4f2 | ipv6: stop sending PTB packets for MTU < 1280
Reduce the attack vector and stop generating IPv6 Fragment Header for
paths with an MTU smaller than the minimum required IPv6 MTU
size (1280 byte) - called atomic fragments.
See IETF I-D "Deprecating the Generation of IPv6 Atomic Fragments" [1]
for more information and h... | 0 | static void ip6_rt_update_pmtu(struct dst_entry *dst, struct sock *sk,
struct sk_buff *skb, u32 mtu)
{
struct rt6_info *rt6 = (struct rt6_info *)dst;
dst_confirm(dst);
if (mtu < dst_mtu(dst) && rt6->rt6i_dst.plen == 128) {
struct net *net = dev_net(dst->dev);
rt6->rt6i_flags |= RTF_MODIFIED;
if (mt... | 13,257,191,664,507,054,000,000,000,000,000,000,000 | route.c | 194,583,449,862,827,950,000,000,000,000,000,000,000 | [
"CWE-17"
] | CVE-2016-10142 | An issue was discovered in the IPv6 protocol specification, related to ICMP Packet Too Big (PTB) messages. (The scope of this CVE is all affected IPv6 implementations from all vendors.) The security implications of IP fragmentation have been discussed at length in [RFC6274] and [RFC7739]. An attacker can leverage the g... | https://nvd.nist.gov/vuln/detail/CVE-2016-10142 |
210,755 | exiv2 | 35b3e596edacd2437c2c5d3dd2b5c9502626163d | https://github.com/Exiv2/exiv2 | https://github.com/Exiv2/exiv2/commit/35b3e596edacd2437c2c5d3dd2b5c9502626163d | Add overflow & overread checks to PngChunk::parseTXTChunk()
This function was creating a lot of new pointers and strings without
properly checking the array bounds. This commit adds several calls
to enforce(), making sure that the pointers stay within bounds.
Strings are now created using the helper function
string_fr... | 1 | DataBuf PngChunk::parseTXTChunk(const DataBuf& data,
int keysize,
TxtChunkType type)
{
DataBuf arr;
if(type == zTXt_Chunk)
{
// Extract a deflate compressed Latin-1 text chunk
/... | 102,693,778,395,105,860,000,000,000,000,000,000,000 | pngchunk_int.cpp | 185,042,341,799,745,980,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-16336 | Exiv2::Internal::PngChunk::parseTXTChunk in Exiv2 v0.26 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted image file, a different vulnerability than CVE-2018-10999. | https://nvd.nist.gov/vuln/detail/CVE-2018-16336 |
440,002 | exiv2 | 35b3e596edacd2437c2c5d3dd2b5c9502626163d | https://github.com/Exiv2/exiv2 | https://github.com/Exiv2/exiv2/commit/35b3e596edacd2437c2c5d3dd2b5c9502626163d | Add overflow & overread checks to PngChunk::parseTXTChunk()
This function was creating a lot of new pointers and strings without
properly checking the array bounds. This commit adds several calls
to enforce(), making sure that the pointers stay within bounds.
Strings are now created using the helper function
string_fr... | 0 | DataBuf PngChunk::parseTXTChunk(const DataBuf& data,
int keysize,
TxtChunkType type)
{
DataBuf arr;
if(type == zTXt_Chunk)
{
enforce(data.size_ >= Safe::add(keysize, 2), Exiv2::kerCorruptedM... | 268,638,566,292,517,940,000,000,000,000,000,000,000 | pngchunk_int.cpp | 328,514,617,009,318,900,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-16336 | Exiv2::Internal::PngChunk::parseTXTChunk in Exiv2 v0.26 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted image file, a different vulnerability than CVE-2018-10999. | https://nvd.nist.gov/vuln/detail/CVE-2018-16336 |
210,775 | Pillow | f0436a4ddc954541fa10a531e2d9ea0c5ae2065d | https://github.com/python-pillow/Pillow | https://github.com/python-pillow/Pillow/commit/f0436a4ddc954541fa10a531e2d9ea0c5ae2065d | Adding support to reading tiled and YcbCr jpegs tiffs through libtiff | 1 | int ImagingLibTiffDecode(Imaging im, ImagingCodecState state, UINT8* buffer, int bytes) {
TIFFSTATE *clientstate = (TIFFSTATE *)state->context;
char *filename = "tempfile.tif";
char *mode = "r";
TIFF *tiff;
tsize_t size;
/* buffer is the encoded file, bytes is the length of the encoded file */
/* it all ends ... | 223,926,933,369,589,500,000,000,000,000,000,000,000 | TiffDecode.c | 278,196,019,400,459,100,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2020-5310 | libImaging/TiffDecode.c in Pillow before 6.2.2 has a TIFF decoding integer overflow, related to realloc. | https://nvd.nist.gov/vuln/detail/CVE-2020-5310 |
440,187 | Pillow | f0436a4ddc954541fa10a531e2d9ea0c5ae2065d | https://github.com/python-pillow/Pillow | https://github.com/python-pillow/Pillow/commit/f0436a4ddc954541fa10a531e2d9ea0c5ae2065d | Adding support to reading tiled and YcbCr jpegs tiffs through libtiff | 0 | int ImagingLibTiffDecode(Imaging im, ImagingCodecState state, UINT8* buffer, int bytes) {
TIFFSTATE *clientstate = (TIFFSTATE *)state->context;
char *filename = "tempfile.tif";
char *mode = "r";
TIFF *tiff;
/* buffer is the encoded file, bytes is the length of the encoded file */
/* it all ends up in state->bu... | 275,742,772,401,580,630,000,000,000,000,000,000,000 | TiffDecode.c | 299,031,833,652,379,450,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2020-5310 | libImaging/TiffDecode.c in Pillow before 6.2.2 has a TIFF decoding integer overflow, related to realloc. | https://nvd.nist.gov/vuln/detail/CVE-2020-5310 |
210,786 | php-src | 88412772d295ebf7dd34409534507dc9bcac726e | https://github.com/php/php-src | http://git.php.net/?p=php-src.git;a=commit;h=88412772d295ebf7dd34409534507dc9bcac726e | Fix bug #68027 - fix date parsing in XMLRPC lib | 1 | static int date_from_ISO8601 (const char *text, time_t * value) {
struct tm tm;
int n;
int i;
char buf[30];
if (strchr (text, '-')) {
char *p = (char *) text, *p2 = buf;
while (p && *p) {
if (*p != '-') {
*p2 = *p;
p2++;
if (p2-buf >= sizeof(buf)) {
return -1;
}
}
p++;
... | 163,983,675,021,987,240,000,000,000,000,000,000,000 | xmlrpc.c | 234,677,002,503,400,700,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2014-3668 | Buffer overflow in the date_from_ISO8601 function in the mkgmtime implementation in libxmlrpc/xmlrpc.c in the XMLRPC extension in PHP before 5.4.34, 5.5.x before 5.5.18, and 5.6.x before 5.6.2 allows remote attackers to cause a denial of service (application crash) via (1) a crafted first argument to the xmlrpc_set_typ... | https://nvd.nist.gov/vuln/detail/CVE-2014-3668 |
440,366 | php-src | 88412772d295ebf7dd34409534507dc9bcac726e | https://github.com/php/php-src | http://git.php.net/?p=php-src.git;a=commit;h=88412772d295ebf7dd34409534507dc9bcac726e | Fix bug #68027 - fix date parsing in XMLRPC lib | 0 | static int date_from_ISO8601 (const char *text, time_t * value) {
struct tm tm;
int n;
int i;
char buf[30];
if (strchr (text, '-')) {
char *p = (char *) text, *p2 = buf;
while (p && *p) {
if (*p != '-') {
*p2 = *p;
p2++;
if (p2-buf >= sizeof(buf)) {
return -1;
}
}
p++;
... | 192,242,807,021,190,460,000,000,000,000,000,000,000 | xmlrpc.c | 138,148,577,125,016,510,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2014-3668 | Buffer overflow in the date_from_ISO8601 function in the mkgmtime implementation in libxmlrpc/xmlrpc.c in the XMLRPC extension in PHP before 5.4.34, 5.5.x before 5.5.18, and 5.6.x before 5.6.2 allows remote attackers to cause a denial of service (application crash) via (1) a crafted first argument to the xmlrpc_set_typ... | https://nvd.nist.gov/vuln/detail/CVE-2014-3668 |
210,790 | linux | 24b9bf43e93e0edd89072da51cf1fab95fc69dec | https://github.com/torvalds/linux | http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=24b9bf43e93e0edd89072da51cf1fab95fc69dec | net: fix for a race condition in the inet frag code
I stumbled upon this very serious bug while hunting for another one,
it's a very subtle race condition between inet_frag_evictor,
inet_frag_intern and the IPv4/6 frag_queue and expire functions
(basically the users of inet_frag_kill/inet_frag_put).
What happens is t... | 1 | static struct inet_frag_queue *inet_frag_intern(struct netns_frags *nf,
struct inet_frag_queue *qp_in, struct inet_frags *f,
void *arg)
{
struct inet_frag_bucket *hb;
struct inet_frag_queue *qp;
unsigned int hash;
read_lock(&f->lock); /* Protects against hash rebuild */
/*
* While we stayed w/o the lock oth... | 271,749,817,754,328,170,000,000,000,000,000,000,000 | inet_fragment.c | 113,115,817,609,544,710,000,000,000,000,000,000,000 | [
"CWE-362"
] | CVE-2014-0100 | Race condition in the inet_frag_intern function in net/ipv4/inet_fragment.c in the Linux kernel through 3.13.6 allows remote attackers to cause a denial of service (use-after-free error) or possibly have unspecified other impact via a large series of fragmented ICMP Echo Request packets to a system with a heavy CPU loa... | https://nvd.nist.gov/vuln/detail/CVE-2014-0100 |
440,472 | linux | 24b9bf43e93e0edd89072da51cf1fab95fc69dec | https://github.com/torvalds/linux | http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=24b9bf43e93e0edd89072da51cf1fab95fc69dec | net: fix for a race condition in the inet frag code
I stumbled upon this very serious bug while hunting for another one,
it's a very subtle race condition between inet_frag_evictor,
inet_frag_intern and the IPv4/6 frag_queue and expire functions
(basically the users of inet_frag_kill/inet_frag_put).
What happens is t... | 0 | static struct inet_frag_queue *inet_frag_intern(struct netns_frags *nf,
struct inet_frag_queue *qp_in, struct inet_frags *f,
void *arg)
{
struct inet_frag_bucket *hb;
struct inet_frag_queue *qp;
unsigned int hash;
read_lock(&f->lock); /* Protects against hash rebuild */
/*
* While we stayed w/o the lock oth... | 131,167,594,820,248,600,000,000,000,000,000,000,000 | inet_fragment.c | 158,531,526,244,457,740,000,000,000,000,000,000,000 | [
"CWE-362"
] | CVE-2014-0100 | Race condition in the inet_frag_intern function in net/ipv4/inet_fragment.c in the Linux kernel through 3.13.6 allows remote attackers to cause a denial of service (use-after-free error) or possibly have unspecified other impact via a large series of fragmented ICMP Echo Request packets to a system with a heavy CPU loa... | https://nvd.nist.gov/vuln/detail/CVE-2014-0100 |
210,795 | ImageMagick | ab3e2be9b387919ef5c25977c4c054fb9dc089a6 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/ab3e2be9b387919ef5c25977c4c054fb9dc089a6 | https://github.com/ImageMagick/ImageMagick/issues/1546 | 1 | static Image *ReadXWDImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
#define CheckOverflowException(length,width,height) \
(((height) != 0) && ((length)/((size_t) height) != ((size_t) width)))
char
*comment;
Image
*image;
int
x_status;
MagickBooleanType
authentic_colormap;
... | 306,751,056,718,789,700,000,000,000,000,000,000,000 | xwd.c | 99,375,994,807,052,150,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2019-11472 | ReadXWDImage in coders/xwd.c in the XWD image parsing component of ImageMagick 7.0.8-41 Q16 allows attackers to cause a denial-of-service (divide-by-zero error) by crafting an XWD image file in which the header indicates neither LSB first nor MSB first. | https://nvd.nist.gov/vuln/detail/CVE-2019-11472 |
440,494 | ImageMagick | ab3e2be9b387919ef5c25977c4c054fb9dc089a6 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/ab3e2be9b387919ef5c25977c4c054fb9dc089a6 | https://github.com/ImageMagick/ImageMagick/issues/1546 | 0 | static Image *ReadXWDImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
#define CheckOverflowException(length,width,height) \
(((height) != 0) && ((length)/((size_t) height) != ((size_t) width)))
char
*comment;
Image
*image;
int
x_status;
MagickBooleanType
authentic_colormap;
... | 202,562,342,284,838,550,000,000,000,000,000,000,000 | xwd.c | 281,143,060,114,832,480,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2019-11472 | ReadXWDImage in coders/xwd.c in the XWD image parsing component of ImageMagick 7.0.8-41 Q16 allows attackers to cause a denial-of-service (divide-by-zero error) by crafting an XWD image file in which the header indicates neither LSB first nor MSB first. | https://nvd.nist.gov/vuln/detail/CVE-2019-11472 |
210,798 | linux | e13de8fe0d6a51341671bbe384826d527afe8d44 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/e13de8fe0d6a51341671bbe384826d527afe8d44 | of: unittest: fix memory leak in unittest_data_add
In unittest_data_add, a copy buffer is created via kmemdup. This buffer
is leaked if of_fdt_unflatten_tree fails. The release for the
unittest_data buffer is added.
Fixes: b951f9dc7f25 ("Enabling OF selftest to run without machine's devicetree")
Signed-off-by: Navid ... | 1 | static int __init unittest_data_add(void)
{
void *unittest_data;
struct device_node *unittest_data_node, *np;
/*
* __dtb_testcases_begin[] and __dtb_testcases_end[] are magically
* created by cmd_dt_S_dtb in scripts/Makefile.lib
*/
extern uint8_t __dtb_testcases_begin[];
extern uint8_t __dtb_testcases_end[];... | 119,259,683,763,872,250,000,000,000,000,000,000,000 | unittest.c | 101,925,025,252,480,640,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2019-19049 | A memory leak in the unittest_data_add() function in drivers/of/unittest.c in the Linux kernel before 5.3.10 allows attackers to cause a denial of service (memory consumption) by triggering of_fdt_unflatten_tree() failures, aka CID-e13de8fe0d6a. NOTE: third parties dispute the relevance of this because unittest.c can o... | https://nvd.nist.gov/vuln/detail/CVE-2019-19049 |
440,617 | linux | e13de8fe0d6a51341671bbe384826d527afe8d44 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/e13de8fe0d6a51341671bbe384826d527afe8d44 | of: unittest: fix memory leak in unittest_data_add
In unittest_data_add, a copy buffer is created via kmemdup. This buffer
is leaked if of_fdt_unflatten_tree fails. The release for the
unittest_data buffer is added.
Fixes: b951f9dc7f25 ("Enabling OF selftest to run without machine's devicetree")
Signed-off-by: Navid ... | 0 | static int __init unittest_data_add(void)
{
void *unittest_data;
struct device_node *unittest_data_node, *np;
/*
* __dtb_testcases_begin[] and __dtb_testcases_end[] are magically
* created by cmd_dt_S_dtb in scripts/Makefile.lib
*/
extern uint8_t __dtb_testcases_begin[];
extern uint8_t __dtb_testcases_end[];... | 292,278,991,063,645,270,000,000,000,000,000,000,000 | unittest.c | 126,623,730,067,408,290,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2019-19049 | A memory leak in the unittest_data_add() function in drivers/of/unittest.c in the Linux kernel before 5.3.10 allows attackers to cause a denial of service (memory consumption) by triggering of_fdt_unflatten_tree() failures, aka CID-e13de8fe0d6a. NOTE: third parties dispute the relevance of this because unittest.c can o... | https://nvd.nist.gov/vuln/detail/CVE-2019-19049 |
210,817 | taglib | ab8a0ee8937256311e649a88e8ddd7c7f870ad59 | https://github.com/taglib/taglib | https://github.com/taglib/taglib/commit/ab8a0ee8937256311e649a88e8ddd7c7f870ad59 | Don't store the output of ByteVector::toUInt() in int, use uint instead | 1 | void Ogg::XiphComment::parse(const ByteVector &data)
{
// The first thing in the comment data is the vendor ID length, followed by a
// UTF8 string with the vendor ID.
uint pos = 0;
int vendorLength = data.mid(0, 4).toUInt(false);
pos += 4;
d->vendorID = String(data.mid(pos, vendorLength), String::UTF8);... | 103,310,908,099,698,940,000,000,000,000,000,000,000 | xiphcomment.cpp | 175,555,585,226,551,760,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2012-1108 | The parse function in ogg/xiphcomment.cpp in TagLib 1.7 and earlier allows remote attackers to cause a denial of service (crash) via a crafted vendorLength field in an ogg file. | https://nvd.nist.gov/vuln/detail/CVE-2012-1108 |
440,753 | taglib | ab8a0ee8937256311e649a88e8ddd7c7f870ad59 | https://github.com/taglib/taglib | https://github.com/taglib/taglib/commit/ab8a0ee8937256311e649a88e8ddd7c7f870ad59 | Don't store the output of ByteVector::toUInt() in int, use uint instead | 0 | void Ogg::XiphComment::parse(const ByteVector &data)
{
// The first thing in the comment data is the vendor ID length, followed by a
// UTF8 string with the vendor ID.
uint pos = 0;
uint vendorLength = data.mid(0, 4).toUInt(false);
pos += 4;
d->vendorID = String(data.mid(pos, vendorLength), String::UTF8)... | 66,709,239,108,320,420,000,000,000,000,000,000,000 | xiphcomment.cpp | 96,674,207,243,244,690,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2012-1108 | The parse function in ogg/xiphcomment.cpp in TagLib 1.7 and earlier allows remote attackers to cause a denial of service (crash) via a crafted vendorLength field in an ogg file. | https://nvd.nist.gov/vuln/detail/CVE-2012-1108 |
210,837 | memcached | 6695ccbc525c36d693aaa3e8337b36aa0c784424 | https://github.com/memcached/memcached | https://github.com/memcached/memcached/commit/6695ccbc525c36d693aaa3e8337b36aa0c784424 | Fix segfault on specially crafted packet. | 1 | static void drive_machine(conn *c) {
bool stop = false;
int sfd, flags = 1;
socklen_t addrlen;
struct sockaddr_storage addr;
int nreqs = settings.reqs_per_event;
int res;
const char *str;
assert(c != NULL);
while (!stop) {
switch(c->state) {
case conn_listening:
... | 321,165,773,961,905,800,000,000,000,000,000,000,000 | memcached.c | 150,717,320,307,135,370,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2011-4971 | Multiple integer signedness errors in the (1) process_bin_sasl_auth, (2) process_bin_complete_sasl_auth, (3) process_bin_update, and (4) process_bin_append_prepend functions in Memcached 1.4.5 and earlier allow remote attackers to cause a denial of service (crash) via a large body length value in a packet. | https://nvd.nist.gov/vuln/detail/CVE-2011-4971 |
440,918 | memcached | 6695ccbc525c36d693aaa3e8337b36aa0c784424 | https://github.com/memcached/memcached | https://github.com/memcached/memcached/commit/6695ccbc525c36d693aaa3e8337b36aa0c784424 | Fix segfault on specially crafted packet. | 0 | static void drive_machine(conn *c) {
bool stop = false;
int sfd, flags = 1;
socklen_t addrlen;
struct sockaddr_storage addr;
int nreqs = settings.reqs_per_event;
int res;
const char *str;
assert(c != NULL);
while (!stop) {
switch(c->state) {
case conn_listening:
... | 201,249,003,786,663,500,000,000,000,000,000,000,000 | memcached.c | 170,424,502,075,153,780,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2011-4971 | Multiple integer signedness errors in the (1) process_bin_sasl_auth, (2) process_bin_complete_sasl_auth, (3) process_bin_update, and (4) process_bin_append_prepend functions in Memcached 1.4.5 and earlier allow remote attackers to cause a denial of service (crash) via a large body length value in a packet. | https://nvd.nist.gov/vuln/detail/CVE-2011-4971 |
210,843 | php-src | d76f7c6c636b8240e06a1fa29eebb98ad005008a | https://github.com/php/php-src | http://git.php.net/?p=php-src.git;a=commit;h=d76f7c6c636b8240e06a1fa29eebb98ad005008a | Fix bug #79221 - Null Pointer Dereference in PHP Session Upload Progress | 1 | static int php_session_rfc1867_callback(unsigned int event, void *event_data, void **extra) /* {{{ */
{
php_session_rfc1867_progress *progress;
int retval = SUCCESS;
if (php_session_rfc1867_orig_callback) {
retval = php_session_rfc1867_orig_callback(event, event_data, extra);
}
if (!PS(rfc1867_enabled)) {
ret... | 336,668,611,640,423,740,000,000,000,000,000,000,000 | session.c | 144,655,391,082,337,300,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2020-7062 | In PHP versions 7.2.x below 7.2.28, 7.3.x below 7.3.15 and 7.4.x below 7.4.3, when using file upload functionality, if upload progress tracking is enabled, but session.upload_progress.cleanup is set to 0 (disabled), and the file upload fails, the upload procedure would try to clean up data that does not exist and encou... | https://nvd.nist.gov/vuln/detail/CVE-2020-7062 |
441,214 | php-src | d76f7c6c636b8240e06a1fa29eebb98ad005008a | https://github.com/php/php-src | http://git.php.net/?p=php-src.git;a=commit;h=d76f7c6c636b8240e06a1fa29eebb98ad005008a | Fix bug #79221 - Null Pointer Dereference in PHP Session Upload Progress | 0 | static int php_session_rfc1867_callback(unsigned int event, void *event_data, void **extra) /* {{{ */
{
php_session_rfc1867_progress *progress;
int retval = SUCCESS;
if (php_session_rfc1867_orig_callback) {
retval = php_session_rfc1867_orig_callback(event, event_data, extra);
}
if (!PS(rfc1867_enabled)) {
ret... | 261,624,549,986,786,930,000,000,000,000,000,000,000 | session.c | 68,001,579,320,414,150,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2020-7062 | In PHP versions 7.2.x below 7.2.28, 7.3.x below 7.3.15 and 7.4.x below 7.4.3, when using file upload functionality, if upload progress tracking is enabled, but session.upload_progress.cleanup is set to 0 (disabled), and the file upload fails, the upload procedure would try to clean up data that does not exist and encou... | https://nvd.nist.gov/vuln/detail/CVE-2020-7062 |
210,862 | radare2 | c40a4f9862104ede15d0ba05ccbf805923070778 | https://github.com/radare/radare2 | https://github.com/radareorg/radare2/commit/c40a4f9862104ede15d0ba05ccbf805923070778 | Fix another oobread segfault in the NE bin parser ##crash
* Reported by @han0nly via huntr.dev
* Reproducers: sample1 sample2 sample3
* BountyID: 47422cdf-aad2-4405-a6a1-6f63a3a93200 | 1 | RList *r_bin_ne_get_entrypoints(r_bin_ne_obj_t *bin) {
RList *entries = r_list_newf (free);
if (!entries) {
return NULL;
}
RBinAddr *entry;
RList *segments = r_bin_ne_get_segments (bin);
if (!segments) {
r_list_free (entries);
return NULL;
}
if (bin->ne_header->csEntryPoint) {
entry = R_NEW0 (RBinAddr);... | 299,097,879,741,683,160,000,000,000,000,000,000,000 | ne.c | 69,651,508,651,046,840,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2022-1238 | Out-of-bounds Write in libr/bin/format/ne/ne.c in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is heap overflow and may be exploitable. For more general description of heap buffer overflow, see [CWE](https://cwe.mitre.org/data/definitions/122.html). | https://nvd.nist.gov/vuln/detail/CVE-2022-1238 |
441,781 | radare2 | c40a4f9862104ede15d0ba05ccbf805923070778 | https://github.com/radare/radare2 | https://github.com/radareorg/radare2/commit/c40a4f9862104ede15d0ba05ccbf805923070778 | Fix another oobread segfault in the NE bin parser ##crash
* Reported by @han0nly via huntr.dev
* Reproducers: sample1 sample2 sample3
* BountyID: 47422cdf-aad2-4405-a6a1-6f63a3a93200 | 0 | RList *r_bin_ne_get_entrypoints(r_bin_ne_obj_t *bin) {
RList *entries = r_list_newf (free);
if (!entries) {
return NULL;
}
RBinAddr *entry;
RList *segments = r_bin_ne_get_segments (bin);
if (!segments) {
r_list_free (entries);
return NULL;
}
if (bin->ne_header->csEntryPoint) {
entry = R_NEW0 (RBinAddr);... | 250,771,717,589,117,250,000,000,000,000,000,000,000 | ne.c | 158,187,364,999,589,480,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2022-1238 | Out-of-bounds Write in libr/bin/format/ne/ne.c in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is heap overflow and may be exploitable. For more general description of heap buffer overflow, see [CWE](https://cwe.mitre.org/data/definitions/122.html). | https://nvd.nist.gov/vuln/detail/CVE-2022-1238 |
210,865 | libxml2 | 6360a31a84efe69d155ed96306b9a931a40beab9 | https://github.com/GNOME/libxml2 | https://git.gnome.org/browse/libxml2/commit/?id=6360a31a84efe69d155ed96306b9a931a40beab9 | CVE-2015-7497 Avoid an heap buffer overflow in xmlDictComputeFastQKey
For https://bugzilla.gnome.org/show_bug.cgi?id=756528
It was possible to hit a negative offset in the name indexing
used to randomize the dictionary key generation
Reported and fix provided by David Drysdale @ Google | 1 | xmlDictComputeFastQKey(const xmlChar *prefix, int plen,
const xmlChar *name, int len, int seed)
{
unsigned long value = (unsigned long) seed;
if (plen == 0)
value += 30 * (unsigned long) ':';
else
value += 30 * (*prefix);
if (len > 10) {
value += name[len - (plen + 1 +... | 301,486,319,191,144,100,000,000,000,000,000,000,000 | dict.c | 229,899,891,921,134,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2015-7497 | Heap-based buffer overflow in the xmlDictComputeFastQKey function in dict.c in libxml2 before 2.9.3 allows context-dependent attackers to cause a denial of service via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2015-7497 |
441,791 | libxml2 | 6360a31a84efe69d155ed96306b9a931a40beab9 | https://github.com/GNOME/libxml2 | https://git.gnome.org/browse/libxml2/commit/?id=6360a31a84efe69d155ed96306b9a931a40beab9 | CVE-2015-7497 Avoid an heap buffer overflow in xmlDictComputeFastQKey
For https://bugzilla.gnome.org/show_bug.cgi?id=756528
It was possible to hit a negative offset in the name indexing
used to randomize the dictionary key generation
Reported and fix provided by David Drysdale @ Google | 0 | xmlDictComputeFastQKey(const xmlChar *prefix, int plen,
const xmlChar *name, int len, int seed)
{
unsigned long value = (unsigned long) seed;
if (plen == 0)
value += 30 * (unsigned long) ':';
else
value += 30 * (*prefix);
if (len > 10) {
int offset = len - (plen + 1 + ... | 207,409,270,744,243,040,000,000,000,000,000,000,000 | dict.c | 104,223,076,783,507,610,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2015-7497 | Heap-based buffer overflow in the xmlDictComputeFastQKey function in dict.c in libxml2 before 2.9.3 allows context-dependent attackers to cause a denial of service via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2015-7497 |
210,867 | libyaml | e6aa721cc0e5a48f408c52355559fd36780ba32a | https://github.com/yaml/libyaml | https://github.com/yaml/libyaml/commit/e6aa721cc0e5a48f408c52355559fd36780ba32a | Fix for https://bitbucket.org/xi/libyaml/issue/10/
https://bitbucket.org/xi/libyaml/issue/10/wrapped-strings-cause-assert-failure
Commenting out the assert makes the scanner do the right thing and
results in just a simple parse failure. | 1 | yaml_parser_save_simple_key(yaml_parser_t *parser)
{
/*
* A simple key is required at the current position if the scanner is in
* the block context and the current column coincides with the indentation
* level.
*/
int required = (!parser->flow_level
&& parser->indent == (ptrdiff... | 144,012,318,429,435,890,000,000,000,000,000,000,000 | scanner.c | 55,831,560,450,102,560,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2014-9130 | scanner.c in LibYAML 0.1.5 and 0.1.6, as used in the YAML-LibYAML (aka YAML-XS) module for Perl, allows context-dependent attackers to cause a denial of service (assertion failure and crash) via vectors involving line-wrapping. | https://nvd.nist.gov/vuln/detail/CVE-2014-9130 |
441,862 | libyaml | e6aa721cc0e5a48f408c52355559fd36780ba32a | https://github.com/yaml/libyaml | https://github.com/yaml/libyaml/commit/e6aa721cc0e5a48f408c52355559fd36780ba32a | Fix for https://bitbucket.org/xi/libyaml/issue/10/
https://bitbucket.org/xi/libyaml/issue/10/wrapped-strings-cause-assert-failure
Commenting out the assert makes the scanner do the right thing and
results in just a simple parse failure. | 0 | yaml_parser_save_simple_key(yaml_parser_t *parser)
{
/*
* A simple key is required at the current position if the scanner is in
* the block context and the current column coincides with the indentation
* level.
*/
int required = (!parser->flow_level
&& parser->indent == (ptrdiff... | 81,628,959,881,270,205,000,000,000,000,000,000,000 | scanner.c | 74,630,725,060,205,840,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2014-9130 | scanner.c in LibYAML 0.1.5 and 0.1.6, as used in the YAML-LibYAML (aka YAML-XS) module for Perl, allows context-dependent attackers to cause a denial of service (assertion failure and crash) via vectors involving line-wrapping. | https://nvd.nist.gov/vuln/detail/CVE-2014-9130 |
210,876 | soundtouch | 7f594f8b7d10bbc16a4a31de8ec5a279af9c7378 | https://gitlab.com/soundtouch/soundtouch | https://gitlab.com/soundtouch/soundtouch/commit/7f594f8b7d10bbc16a4a31de8ec5a279af9c7378 | New take on CVE-2018-17097 i.e. avoiding writing beyond end of buffer in case of 24-bit samples | 1 | void WavOutFile::write(const float *buffer, int numElems)
{
int numBytes;
int bytesPerSample;
if (numElems == 0) return;
bytesPerSample = header.format.bits_per_sample / 8;
numBytes = numElems * bytesPerSample;
int confBufBytes = (numBytes + 3) & -4; // round up to nearest multiple of... | 164,120,031,578,096,860,000,000,000,000,000,000,000 | WavFile.cpp | 53,671,190,571,791,450,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2018-17097 | The WavFileBase class in WavFile.cpp in Olli Parviainen SoundTouch 2.0 allows remote attackers to cause a denial of service (double free) or possibly have unspecified other impact, as demonstrated by SoundStretch. | https://nvd.nist.gov/vuln/detail/CVE-2018-17097 |
441,992 | soundtouch | 7f594f8b7d10bbc16a4a31de8ec5a279af9c7378 | https://gitlab.com/soundtouch/soundtouch | https://gitlab.com/soundtouch/soundtouch/commit/7f594f8b7d10bbc16a4a31de8ec5a279af9c7378 | New take on CVE-2018-17097 i.e. avoiding writing beyond end of buffer in case of 24-bit samples | 0 | void WavOutFile::write(const float *buffer, int numElems)
{
int numBytes;
int bytesPerSample;
if (numElems == 0) return;
bytesPerSample = header.format.bits_per_sample / 8;
numBytes = numElems * bytesPerSample;
void *temp = getConvBuffer(numBytes + 7); // round bit up to avoid buffe... | 293,451,393,538,209,840,000,000,000,000,000,000,000 | WavFile.cpp | 60,052,747,961,810,000,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2018-17097 | The WavFileBase class in WavFile.cpp in Olli Parviainen SoundTouch 2.0 allows remote attackers to cause a denial of service (double free) or possibly have unspecified other impact, as demonstrated by SoundStretch. | https://nvd.nist.gov/vuln/detail/CVE-2018-17097 |
210,883 | ImageMagick6 | bb77f9e905597c7ab1e92042c7de418d999b00bf | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/bb77f9e905597c7ab1e92042c7de418d999b00bf | Fixed leaking of the image when writing an MSL image. | 1 | static MagickBooleanType WriteMSLImage(const ImageInfo *image_info,Image *image)
{
Image
*msl_image;
assert(image_info != (const ImageInfo *) NULL);
assert(image_info->signature == MagickCoreSignature);
assert(image != (Image *) NULL);
assert(image->signature == MagickCoreSignature);
if (image->debug !... | 218,367,735,223,390,030,000,000,000,000,000,000,000 | msl.c | 10,705,016,281,398,830,000,000,000,000,000,000,000 | [
"CWE-772"
] | CVE-2018-18544 | There is a memory leak in the function WriteMSLImage of coders/msl.c in ImageMagick 7.0.8-13 Q16, and the function ProcessMSLScript of coders/msl.c in GraphicsMagick before 1.3.31. | https://nvd.nist.gov/vuln/detail/CVE-2018-18544 |
442,083 | ImageMagick6 | bb77f9e905597c7ab1e92042c7de418d999b00bf | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/bb77f9e905597c7ab1e92042c7de418d999b00bf | Fixed leaking of the image when writing an MSL image. | 0 | static MagickBooleanType WriteMSLImage(const ImageInfo *image_info,Image *image)
{
Image
*msl_image;
MagickBooleanType
status;
assert(image_info != (const ImageInfo *) NULL);
assert(image_info->signature == MagickCoreSignature);
assert(image != (Image *) NULL);
assert(image->signature == MagickCor... | 138,058,158,013,778,250,000,000,000,000,000,000,000 | msl.c | 259,451,433,662,288,430,000,000,000,000,000,000,000 | [
"CWE-772"
] | CVE-2018-18544 | There is a memory leak in the function WriteMSLImage of coders/msl.c in ImageMagick 7.0.8-13 Q16, and the function ProcessMSLScript of coders/msl.c in GraphicsMagick before 1.3.31. | https://nvd.nist.gov/vuln/detail/CVE-2018-18544 |
210,886 | libsass | 8f40dc03e5ab5a8b2ebeb72b31f8d1adbb2fd6ae | https://github.com/sass/libsass | https://github.com/sass/libsass/commit/8f40dc03e5ab5a8b2ebeb72b31f8d1adbb2fd6ae | Optimize line_begin/end search in `handle_error`
There is no need to advance by UTF-8 code points when searching for an
ASCII character, because UTF-8 is a prefix-free encoding. | 1 | static int handle_error(Sass_Context* c_ctx) {
try {
throw;
}
catch (Exception::Base& e) {
std::stringstream msg_stream;
std::string cwd(Sass::File::get_cwd());
std::string msg_prefix(e.errtype());
bool got_newline = false;
msg_stream << msg_prefix << ": ";
const ... | 205,027,800,598,608,400,000,000,000,000,000,000,000 | sass_context.cpp | 257,032,591,333,935,930,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-11698 | An issue was discovered in LibSass through 3.5.4. An out-of-bounds read of a memory region was found in the function Sass::handle_error which could be leveraged by an attacker to disclose information or manipulated to read from unmapped memory causing a denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2018-11698 |
442,153 | libsass | 8f40dc03e5ab5a8b2ebeb72b31f8d1adbb2fd6ae | https://github.com/sass/libsass | https://github.com/sass/libsass/commit/8f40dc03e5ab5a8b2ebeb72b31f8d1adbb2fd6ae | Optimize line_begin/end search in `handle_error`
There is no need to advance by UTF-8 code points when searching for an
ASCII character, because UTF-8 is a prefix-free encoding. | 0 | static int handle_error(Sass_Context* c_ctx) {
try {
throw;
}
catch (Exception::Base& e) {
std::stringstream msg_stream;
std::string cwd(Sass::File::get_cwd());
std::string msg_prefix(e.errtype());
bool got_newline = false;
msg_stream << msg_prefix << ": ";
const ... | 3,988,636,591,326,191,000,000,000,000,000,000,000 | sass_context.cpp | 10,973,330,936,984,438,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-11698 | An issue was discovered in LibSass through 3.5.4. An out-of-bounds read of a memory region was found in the function Sass::handle_error which could be leveraged by an attacker to disclose information or manipulated to read from unmapped memory causing a denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2018-11698 |
210,895 | vim | 2f074f4685897ab7212e25931eeeb0212292829f | https://github.com/vim/vim | https://github.com/vim/vim/commit/2f074f4685897ab7212e25931eeeb0212292829f | patch 8.2.5120: searching for quotes may go over the end of the line
Problem: Searching for quotes may go over the end of the line.
Solution: Check for running into the NUL. | 1 | current_quote(
oparg_T *oap,
long count,
int include, // TRUE == include quote char
int quotechar) // Quote character
{
char_u *line = ml_get_curline();
int col_end;
int col_start = curwin->w_cursor.col;
int inclusive = FALSE;
int vis_empty = TRUE; // Visual selection <= 1 char... | 275,873,851,930,808,000,000,000,000,000,000,000,000 | textobject.c | 102,117,221,252,840,910,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2022-2124 | Buffer Over-read in GitHub repository vim/vim prior to 8.2. | https://nvd.nist.gov/vuln/detail/CVE-2022-2124 |
442,549 | vim | 2f074f4685897ab7212e25931eeeb0212292829f | https://github.com/vim/vim | https://github.com/vim/vim/commit/2f074f4685897ab7212e25931eeeb0212292829f | patch 8.2.5120: searching for quotes may go over the end of the line
Problem: Searching for quotes may go over the end of the line.
Solution: Check for running into the NUL. | 0 | current_quote(
oparg_T *oap,
long count,
int include, // TRUE == include quote char
int quotechar) // Quote character
{
char_u *line = ml_get_curline();
int col_end;
int col_start = curwin->w_cursor.col;
int inclusive = FALSE;
int vis_empty = TRUE; // Visual selection <= 1 char... | 298,371,919,073,407,100,000,000,000,000,000,000,000 | textobject.c | 107,939,516,960,165,800,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2022-2124 | Buffer Over-read in GitHub repository vim/vim prior to 8.2. | https://nvd.nist.gov/vuln/detail/CVE-2022-2124 |
210,898 | dbus | 872b085f12f56da25a2dbd9bd0b2dff31d5aea63 | http://gitweb.freedesktop.org/?p=dbus/dbus | https://gitlab.freedesktop.org/dbus/dbus/-/commit/872b085f12f56da25a2dbd9bd0b2dff31d5aea63 | sysdeps-unix: On MSG_CTRUNC, close the fds we did receive
MSG_CTRUNC indicates that we have received fewer fds that we should
have done because the buffer was too small, but we were treating it
as though it indicated that we received *no* fds. If we received any,
we still have to make sure we close them, otherwise the... | 1 | _dbus_read_socket_with_unix_fds (DBusSocket fd,
DBusString *buffer,
int count,
int *fds,
unsigned int *n_fds) {
#ifndef HAVE_UNIX_FD_PASSING
i... | 271,713,557,430,258,780,000,000,000,000,000,000,000 | dbus-sysdeps-unix.c | 311,464,204,683,168,040,000,000,000,000,000,000,000 | [
"CWE-404"
] | CVE-2020-12049 | An issue was discovered in dbus >= 1.3.0 before 1.12.18. The DBusServer in libdbus, as used in dbus-daemon, leaks file descriptors when a message exceeds the per-message file descriptor limit. A local attacker with access to the D-Bus system bus or another system service's private AF_UNIX socket could use this to make ... | https://nvd.nist.gov/vuln/detail/CVE-2020-12049 |
442,633 | dbus | 872b085f12f56da25a2dbd9bd0b2dff31d5aea63 | http://gitweb.freedesktop.org/?p=dbus/dbus | https://gitlab.freedesktop.org/dbus/dbus/-/commit/872b085f12f56da25a2dbd9bd0b2dff31d5aea63 | sysdeps-unix: On MSG_CTRUNC, close the fds we did receive
MSG_CTRUNC indicates that we have received fewer fds that we should
have done because the buffer was too small, but we were treating it
as though it indicated that we received *no* fds. If we received any,
we still have to make sure we close them, otherwise the... | 0 | _dbus_read_socket_with_unix_fds (DBusSocket fd,
DBusString *buffer,
int count,
int *fds,
unsigned int *n_fds) {
#ifndef HAVE_UNIX_FD_PASSING
i... | 223,239,985,597,135,700,000,000,000,000,000,000,000 | dbus-sysdeps-unix.c | 182,558,334,604,585,100,000,000,000,000,000,000,000 | [
"CWE-404"
] | CVE-2020-12049 | An issue was discovered in dbus >= 1.3.0 before 1.12.18. The DBusServer in libdbus, as used in dbus-daemon, leaks file descriptors when a message exceeds the per-message file descriptor limit. A local attacker with access to the D-Bus system bus or another system service's private AF_UNIX socket could use this to make ... | https://nvd.nist.gov/vuln/detail/CVE-2020-12049 |
210,903 | clamav-devel | d21fb8d975f8c9688894a8cef4d50d977022e09f | https://github.com/vrtadmin/clamav-devel | http://git.clamav.net/gitweb?p=clamav-devel.git;a=commit;h=d21fb8d975f8c9688894a8cef4d50d977022e09f | libclamav/vba_extract.c: fix error path double free (bb#2486) | 1 | vba_read_project_strings(int fd, int big_endian)
{
unsigned char *buf = NULL;
uint16_t buflen = 0;
int ret = 0;
for(;;) {
off_t offset;
uint16_t length;
char *name;
if(!read_uint16(fd, &length, big_endian))
break;
if (length < 6) {
lseek(fd, -2, SEEK_CUR);
break;
}
if(length > buflen) {
... | 181,192,634,917,841,130,000,000,000,000,000,000,000 | vba_extract.c | 122,146,051,808,833,540,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-1003 | Double free vulnerability in the vba_read_project_strings function in vba_extract.c in libclamav in ClamAV before 0.97 might allow remote attackers to execute arbitrary code via crafted Visual Basic for Applications (VBA) data in a Microsoft Office document. NOTE: some of these details are obtained from third party in... | https://nvd.nist.gov/vuln/detail/CVE-2011-1003 |
442,756 | clamav-devel | d21fb8d975f8c9688894a8cef4d50d977022e09f | https://github.com/vrtadmin/clamav-devel | http://git.clamav.net/gitweb?p=clamav-devel.git;a=commit;h=d21fb8d975f8c9688894a8cef4d50d977022e09f | libclamav/vba_extract.c: fix error path double free (bb#2486) | 0 | vba_read_project_strings(int fd, int big_endian)
{
unsigned char *buf = NULL;
uint16_t buflen = 0;
int ret = 0;
for(;;) {
off_t offset;
uint16_t length;
char *name;
if(!read_uint16(fd, &length, big_endian))
break;
if (length < 6) {
lseek(fd, -2, SEEK_CUR);
break;
}
if(length > buflen) {
... | 198,264,988,238,665,420,000,000,000,000,000,000,000 | vba_extract.c | 117,844,446,442,562,330,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-1003 | Double free vulnerability in the vba_read_project_strings function in vba_extract.c in libclamav in ClamAV before 0.97 might allow remote attackers to execute arbitrary code via crafted Visual Basic for Applications (VBA) data in a Microsoft Office document. NOTE: some of these details are obtained from third party in... | https://nvd.nist.gov/vuln/detail/CVE-2011-1003 |
210,916 | ImageMagick | ae04fa4be910255e5d363edebd77adeee99a525d | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/ae04fa4be910255e5d363edebd77adeee99a525d | https://github.com/ImageMagick/ImageMagick/issues/1177 | 1 | static MagickBooleanType WriteBMPImage(const ImageInfo *image_info,Image *image,
ExceptionInfo *exception)
{
BMPInfo
bmp_info;
BMPSubtype
bmp_subtype;
const char
*option;
const StringInfo
*profile;
MagickBooleanType
have_color_info,
status;
MagickOffsetType
scene;
Memor... | 268,486,899,968,306,020,000,000,000,000,000,000,000 | bmp.c | 336,052,619,317,572,980,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2018-12599 | In ImageMagick 7.0.8-3 Q16, ReadBMPImage and WriteBMPImage in coders/bmp.c allow attackers to cause an out of bounds write via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2018-12599 |
69,666 | ImageMagick | db0add932fb850d762b02604ca3053b7d7ab6deb | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/db0add932fb850d762b02604ca3053b7d7ab6deb | Prevent infinite loop | 0 | static MagickBooleanType WriteBMPImage(const ImageInfo *image_info,Image *image,
ExceptionInfo *exception)
{
BMPInfo
bmp_info;
BMPSubtype
bmp_subtype;
const char
*option;
const StringInfo
*profile;
MagickBooleanType
have_color_info,
status;
MagickOffsetType
scene;
Memor... | 238,458,474,873,785,470,000,000,000,000,000,000,000 | bmp.c | 303,093,137,720,368,650,000,000,000,000,000,000,000 | [
"CWE-835"
] | CVE-2018-20467 | In coders/bmp.c in ImageMagick before 7.0.8-16, an input file can result in an infinite loop and hang, with high CPU and memory consumption. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2018-20467 |
210,917 | ImageMagick | ae04fa4be910255e5d363edebd77adeee99a525d | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/ae04fa4be910255e5d363edebd77adeee99a525d | https://github.com/ImageMagick/ImageMagick/issues/1177 | 1 | static Image *ReadBMPImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
BMPInfo
bmp_info;
Image
*image;
MagickBooleanType
status;
MagickOffsetType
offset,
start_position;
MemoryInfo
*pixel_info;
Quantum
index;
register Quantum
*q;
register ssize_t
i,... | 296,213,103,419,022,850,000,000,000,000,000,000,000 | bmp.c | 336,052,619,317,572,980,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2018-12599 | In ImageMagick 7.0.8-3 Q16, ReadBMPImage and WriteBMPImage in coders/bmp.c allow attackers to cause an out of bounds write via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2018-12599 |
443,064 | ImageMagick | ae04fa4be910255e5d363edebd77adeee99a525d | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/ae04fa4be910255e5d363edebd77adeee99a525d | https://github.com/ImageMagick/ImageMagick/issues/1177 | 0 | static Image *ReadBMPImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
BMPInfo
bmp_info;
Image
*image;
MagickBooleanType
status;
MagickOffsetType
offset,
start_position;
MemoryInfo
*pixel_info;
Quantum
index;
register Quantum
*q;
register ssize_t
i,... | 111,280,021,809,982,000,000,000,000,000,000,000,000 | bmp.c | 275,444,024,646,200,200,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2018-12599 | In ImageMagick 7.0.8-3 Q16, ReadBMPImage and WriteBMPImage in coders/bmp.c allow attackers to cause an out of bounds write via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2018-12599 |
210,921 | sssd | 191d7f7ce3de10d9e19eaa0a6ab3319bcd4ca95d | http://git.fedorahosted.org/git/?p=sssd | https://git.fedorahosted.org/cgit/sssd.git/commit/?id=191d7f7ce3de10d9e19eaa0a6ab3319bcd4ca95d | AD: process non-posix nested groups using tokenGroups
When initgr is performed for AD supporting tokenGroups, do not skip
non-posix groups.
Resolves:
https://fedorahosted.org/sssd/ticket/2343
Reviewed-by: Michal Židek <mzidek@redhat.com>
(cherry picked from commit 4932db6258ccfb612a3a28eb6a618c2f042b9d58) | 1 | sdap_ad_tokengroups_get_posix_members(TALLOC_CTX *mem_ctx,
struct sdap_ad_tokengroups_initgr_posix_state *state,
size_t num_sids,
char **sids,
size_t *_num_missing,
char ***_missing,
... | 301,856,733,418,330,940,000,000,000,000,000,000,000 | sdap_async_initgroups_ad.c | 283,742,922,743,110,250,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2014-0249 | The System Security Services Daemon (SSSD) 1.11.6 does not properly identify group membership when a non-POSIX group is in a group membership chain, which allows local users to bypass access restrictions via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2014-0249 |
443,074 | sssd | 191d7f7ce3de10d9e19eaa0a6ab3319bcd4ca95d | http://git.fedorahosted.org/git/?p=sssd | https://git.fedorahosted.org/cgit/sssd.git/commit/?id=191d7f7ce3de10d9e19eaa0a6ab3319bcd4ca95d | AD: process non-posix nested groups using tokenGroups
When initgr is performed for AD supporting tokenGroups, do not skip
non-posix groups.
Resolves:
https://fedorahosted.org/sssd/ticket/2343
Reviewed-by: Michal Židek <mzidek@redhat.com>
(cherry picked from commit 4932db6258ccfb612a3a28eb6a618c2f042b9d58) | 0 | sdap_ad_tokengroups_get_posix_members(TALLOC_CTX *mem_ctx,
struct sdap_ad_tokengroups_initgr_posix_state *state,
size_t num_sids,
char **sids,
size_t *_num_missing,
char ***_missing,
... | 31,959,748,179,189,960,000,000,000,000,000,000,000 | sdap_async_initgroups_ad.c | 320,466,917,434,821,570,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2014-0249 | The System Security Services Daemon (SSSD) 1.11.6 does not properly identify group membership when a non-POSIX group is in a group membership chain, which allows local users to bypass access restrictions via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2014-0249 |
210,923 | sssd | fffdae81651b460f3d2c119c56d5caa09b4de42a | http://git.fedorahosted.org/git/?p=sssd | http://git.fedorahosted.org/git/?p=sssd.git;a=commitdiff;h=fffdae81651b460f3d2c119c56d5caa09b4de42a | Fix bad password caching when using automatic TGT renewal
Fixes CVE-2011-1758, https://fedorahosted.org/sssd/ticket/856 | 1 | static void krb5_save_ccname_done(struct tevent_req *req)
{
struct krb5_auth_state *state = tevent_req_data(req, struct krb5_auth_state);
struct krb5child_req *kr = state->kr;
struct pam_data *pd = state->pd;
int ret;
char *password = NULL;
if (kr->is_offline) {
if (dp_opt_get_bool(kr->... | 297,354,155,764,998,360,000,000,000,000,000,000,000 | krb5_auth.c | 263,025,695,453,576,370,000,000,000,000,000,000,000 | [
"CWE-287"
] | CVE-2011-1758 | The krb5_save_ccname_done function in providers/krb5/krb5_auth.c in System Security Services Daemon (SSSD) 1.5.x before 1.5.7, when automatic ticket renewal and offline authentication are configured, uses a pathname string as a password, which allows local users to bypass Kerberos authentication by listing the /tmp dir... | https://nvd.nist.gov/vuln/detail/CVE-2011-1758 |
443,094 | sssd | fffdae81651b460f3d2c119c56d5caa09b4de42a | http://git.fedorahosted.org/git/?p=sssd | http://git.fedorahosted.org/git/?p=sssd.git;a=commitdiff;h=fffdae81651b460f3d2c119c56d5caa09b4de42a | Fix bad password caching when using automatic TGT renewal
Fixes CVE-2011-1758, https://fedorahosted.org/sssd/ticket/856 | 0 | static void krb5_save_ccname_done(struct tevent_req *req)
{
struct krb5_auth_state *state = tevent_req_data(req, struct krb5_auth_state);
struct krb5child_req *kr = state->kr;
struct pam_data *pd = state->pd;
int ret;
char *password = NULL;
if (kr->is_offline) {
if (dp_opt_get_bool(kr->... | 324,448,733,660,798,400,000,000,000,000,000,000,000 | krb5_auth.c | 21,935,662,557,328,280,000,000,000,000,000,000,000 | [
"CWE-287"
] | CVE-2011-1758 | The krb5_save_ccname_done function in providers/krb5/krb5_auth.c in System Security Services Daemon (SSSD) 1.5.x before 1.5.7, when automatic ticket renewal and offline authentication are configured, uses a pathname string as a password, which allows local users to bypass Kerberos authentication by listing the /tmp dir... | https://nvd.nist.gov/vuln/detail/CVE-2011-1758 |
210,929 | libx11 | acdaaadcb3d85c61fd43669fc5dddf0f8c3f911d | https://gitlab.freedesktop.org/xorg/lib/libx11 | https://gitlab.freedesktop.org/xorg/lib/libx11/-/commit/acdaaadcb3d85c61fd43669fc5dddf0f8c3f911d | Fix an integer overflow in init_om()
CVE-2020-14363
This can lead to a double free later, as reported by Jayden Rivers.
Signed-off-by: Matthieu Herrb <matthieu@herrb.eu> | 1 | init_om(
XOM om)
{
XLCd lcd = om->core.lcd;
XOMGenericPart *gen = XOM_GENERIC(om);
OMData data;
XlcCharSet *charset_list;
FontData font_data;
char **required_list;
XOrientation *orientation;
char **value, buf[BUFSIZ], *bufptr;
int count = 0, num = 0, length = 0;
_XlcGetResou... | 314,915,380,665,580,400,000,000,000,000,000,000,000 | omGeneric.c | 323,875,861,228,041,870,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2020-14363 | An integer overflow vulnerability leading to a double-free was found in libX11. This flaw allows a local privileged attacker to cause an application compiled with libX11 to crash, or in some cases, result in arbitrary code execution. The highest threat from this flaw is to confidentiality, integrity as well as system a... | https://nvd.nist.gov/vuln/detail/CVE-2020-14363 |
443,181 | libx11 | acdaaadcb3d85c61fd43669fc5dddf0f8c3f911d | https://gitlab.freedesktop.org/xorg/lib/libx11 | https://gitlab.freedesktop.org/xorg/lib/libx11/-/commit/acdaaadcb3d85c61fd43669fc5dddf0f8c3f911d | Fix an integer overflow in init_om()
CVE-2020-14363
This can lead to a double free later, as reported by Jayden Rivers.
Signed-off-by: Matthieu Herrb <matthieu@herrb.eu> | 0 | init_om(
XOM om)
{
XLCd lcd = om->core.lcd;
XOMGenericPart *gen = XOM_GENERIC(om);
OMData data;
XlcCharSet *charset_list;
FontData font_data;
char **required_list;
XOrientation *orientation;
char **value, buf[BUFSIZ], *bufptr;
int count = 0, num = 0;
unsigned int length = 0;
... | 129,643,953,049,361,700,000,000,000,000,000,000,000 | omGeneric.c | 185,237,983,628,013,100,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2020-14363 | An integer overflow vulnerability leading to a double-free was found in libX11. This flaw allows a local privileged attacker to cause an application compiled with libX11 to crash, or in some cases, result in arbitrary code execution. The highest threat from this flaw is to confidentiality, integrity as well as system a... | https://nvd.nist.gov/vuln/detail/CVE-2020-14363 |
210,930 | libexpat | d4f735b88d9932bd5039df2335eefdd0723dbe20 | https://github.com/libexpat/libexpat | https://github.com/libexpat/libexpat/commit/d4f735b88d9932bd5039df2335eefdd0723dbe20 | Detect integer overflow (CVE-2016-9063)
Needs XML_CONTEXT_BYTES to be _undefined_ to trigger,
default is defined and set to 1024.
Previously patched downstream, e.g.
https://sources.debian.net/src/expat/2.2.0-2/debian/patches/CVE-2016-9063.patch/
https://bug1274777.bmoattachments.org/attachment.cgi?id=8755538
This v... | 1 | XML_Parse(XML_Parser parser, const char *s, int len, int isFinal)
{
switch (ps_parsing) {
case XML_SUSPENDED:
errorCode = XML_ERROR_SUSPENDED;
return XML_STATUS_ERROR;
case XML_FINISHED:
errorCode = XML_ERROR_FINISHED;
return XML_STATUS_ERROR;
case XML_INITIALIZED:
if (parentParser == NULL &... | 46,580,687,600,667,180,000,000,000,000,000,000,000 | xmlparse.c | 161,699,158,063,407,620,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2016-9063 | An integer overflow during the parsing of XML using the Expat library. This vulnerability affects Firefox < 50. | https://nvd.nist.gov/vuln/detail/CVE-2016-9063 |
443,205 | libexpat | d4f735b88d9932bd5039df2335eefdd0723dbe20 | https://github.com/libexpat/libexpat | https://github.com/libexpat/libexpat/commit/d4f735b88d9932bd5039df2335eefdd0723dbe20 | Detect integer overflow (CVE-2016-9063)
Needs XML_CONTEXT_BYTES to be _undefined_ to trigger,
default is defined and set to 1024.
Previously patched downstream, e.g.
https://sources.debian.net/src/expat/2.2.0-2/debian/patches/CVE-2016-9063.patch/
https://bug1274777.bmoattachments.org/attachment.cgi?id=8755538
This v... | 0 | XML_Parse(XML_Parser parser, const char *s, int len, int isFinal)
{
switch (ps_parsing) {
case XML_SUSPENDED:
errorCode = XML_ERROR_SUSPENDED;
return XML_STATUS_ERROR;
case XML_FINISHED:
errorCode = XML_ERROR_FINISHED;
return XML_STATUS_ERROR;
case XML_INITIALIZED:
if (parentParser == NULL &... | 338,705,712,418,043,220,000,000,000,000,000,000,000 | xmlparse.c | 291,065,993,215,108,500,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2016-9063 | An integer overflow during the parsing of XML using the Expat library. This vulnerability affects Firefox < 50. | https://nvd.nist.gov/vuln/detail/CVE-2016-9063 |
210,943 | ImageMagick6 | e8f4f5e776002aa6ed490d7c6f65e10fa67359dd | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/e8f4f5e776002aa6ed490d7c6f65e10fa67359dd | https://github.com/ImageMagick/ImageMagick/issues/1193 | 1 | static MagickBooleanType DecodeImage(Image *image,unsigned char *luma,
unsigned char *chroma1,unsigned char *chroma2)
{
#define IsSync(sum) ((sum & 0xffffff00UL) == 0xfffffe00UL)
#define PCDGetBits(n) \
{ \
sum=(sum << n) & 0xffffffff; \
bits-=n; \
while (bits <= 24) \
{ \
if (p >= (buffer+0x800)) \
... | 219,626,744,251,550,800,000,000,000,000,000,000,000 | pcd.c | 314,457,061,793,507,300,000,000,000,000,000,000,000 | [
"CWE-772"
] | CVE-2018-14435 | ImageMagick 7.0.8-4 has a memory leak in DecodeImage in coders/pcd.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-14435 |
443,291 | ImageMagick6 | e8f4f5e776002aa6ed490d7c6f65e10fa67359dd | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/e8f4f5e776002aa6ed490d7c6f65e10fa67359dd | https://github.com/ImageMagick/ImageMagick/issues/1193 | 0 | static MagickBooleanType DecodeImage(Image *image,unsigned char *luma,
unsigned char *chroma1,unsigned char *chroma2)
{
#define IsSync(sum) ((sum & 0xffffff00UL) == 0xfffffe00UL)
#define PCDGetBits(n) \
{ \
sum=(sum << n) & 0xffffffff; \
bits-=n; \
while (bits <= 24) \
{ \
if (p >= (buffer+0x800)) \
... | 224,059,984,250,429,600,000,000,000,000,000,000,000 | pcd.c | 70,611,075,451,290,810,000,000,000,000,000,000,000 | [
"CWE-772"
] | CVE-2018-14435 | ImageMagick 7.0.8-4 has a memory leak in DecodeImage in coders/pcd.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-14435 |
210,945 | qBittorrent | f5ad04766f4abaa78374ff03704316f8ce04627d | https://github.com/qbittorrent/qBittorrent | https://github.com/qbittorrent/qBittorrent/commit/f5ad04766f4abaa78374ff03704316f8ce04627d | [WebUI] Avoid clickjacking attacks | 1 | Http::Response AbstractWebApplication::processRequest(const Http::Request &request, const Http::Environment &env)
{
session_ = 0;
request_ = request;
env_ = env;
clear(); // clear response
sessionInitialize();
if (!sessionActive() && !isAuthNeeded())
sessionStart();
if (isBanned()... | 118,045,132,013,428,230,000,000,000,000,000,000,000 | abstractwebapplication.cpp | 279,271,168,180,139,160,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2017-6504 | WebUI in qBittorrent before 3.3.11 did not set the X-Frame-Options header, which could potentially lead to clickjacking. | https://nvd.nist.gov/vuln/detail/CVE-2017-6504 |
443,315 | qBittorrent | f5ad04766f4abaa78374ff03704316f8ce04627d | https://github.com/qbittorrent/qBittorrent | https://github.com/qbittorrent/qBittorrent/commit/f5ad04766f4abaa78374ff03704316f8ce04627d | [WebUI] Avoid clickjacking attacks | 0 | Http::Response AbstractWebApplication::processRequest(const Http::Request &request, const Http::Environment &env)
{
session_ = 0;
request_ = request;
env_ = env;
// clear response
clear();
// avoid clickjacking attacks
header(Http::HEADER_X_FRAME_OPTIONS, "SAMEORIGIN");
sessionInitial... | 200,303,066,432,823,600,000,000,000,000,000,000,000 | abstractwebapplication.cpp | 289,134,446,044,914,140,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2017-6504 | WebUI in qBittorrent before 3.3.11 did not set the X-Frame-Options header, which could potentially lead to clickjacking. | https://nvd.nist.gov/vuln/detail/CVE-2017-6504 |
210,954 | DBD-mysql | 3619c170461a3107a258d1fd2d00ed4832adb1b1 | https://github.com/perl5-dbi/DBD-mysql | https://github.com/perl5-dbi/DBD-mysql/commit/3619c170461a3107a258d1fd2d00ed4832adb1b1 | Fix use-after-free for repeated fetchrow_arrayref calls when mysql_server_prepare=1
Function dbd_st_fetch() via Renew() can reallocate output buffer for
mysql_stmt_fetch() call. But it does not update pointer to that buffer in
imp_sth->stmt structure initialized by mysql_stmt_bind_result() function.
That leads to use-... | 1 | dbd_st_fetch(SV *sth, imp_sth_t* imp_sth)
{
dTHX;
int num_fields, ChopBlanks, i, rc;
unsigned long *lengths;
AV *av;
int av_length, av_readonly;
MYSQL_ROW cols;
D_imp_dbh_from_sth;
MYSQL* svsock= imp_dbh->pmysql;
imp_sth_fbh_t *fbh;
D_imp_xxh(sth);
#if MYSQL_VERSION_ID >=SERVER_PREPARE_VERSION
MYS... | 76,393,277,174,958,170,000,000,000,000,000,000,000 | dbdimp.c | 325,450,484,231,949,500,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2016-1251 | There is a vulnerability of type use-after-free affecting DBD::mysql (aka DBD-mysql or the Database Interface (DBI) MySQL driver for Perl) 3.x and 4.x before 4.041 when used with mysql_server_prepare=1. | https://nvd.nist.gov/vuln/detail/CVE-2016-1251 |
443,634 | DBD-mysql | 3619c170461a3107a258d1fd2d00ed4832adb1b1 | https://github.com/perl5-dbi/DBD-mysql | https://github.com/perl5-dbi/DBD-mysql/commit/3619c170461a3107a258d1fd2d00ed4832adb1b1 | Fix use-after-free for repeated fetchrow_arrayref calls when mysql_server_prepare=1
Function dbd_st_fetch() via Renew() can reallocate output buffer for
mysql_stmt_fetch() call. But it does not update pointer to that buffer in
imp_sth->stmt structure initialized by mysql_stmt_bind_result() function.
That leads to use-... | 0 | dbd_st_fetch(SV *sth, imp_sth_t* imp_sth)
{
dTHX;
int num_fields, ChopBlanks, i, rc;
unsigned long *lengths;
AV *av;
int av_length, av_readonly;
MYSQL_ROW cols;
D_imp_dbh_from_sth;
MYSQL* svsock= imp_dbh->pmysql;
imp_sth_fbh_t *fbh;
D_imp_xxh(sth);
#if MYSQL_VERSION_ID >=SERVER_PREPARE_VERSION
MYS... | 47,343,037,964,939,020,000,000,000,000,000,000,000 | dbdimp.c | 301,096,543,290,610,350,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2016-1251 | There is a vulnerability of type use-after-free affecting DBD::mysql (aka DBD-mysql or the Database Interface (DBI) MySQL driver for Perl) 3.x and 4.x before 4.041 when used with mysql_server_prepare=1. | https://nvd.nist.gov/vuln/detail/CVE-2016-1251 |
210,959 | taglib | b3646a07348ffa276ea41a9dae03ddc63ea6c532 | https://github.com/taglib/taglib | https://github.com/taglib/taglib/commit/b3646a07348ffa276ea41a9dae03ddc63ea6c532 | Be more careful when parsing Vorbis Comments | 1 | void Ogg::XiphComment::parse(const ByteVector &data)
{
// The first thing in the comment data is the vendor ID length, followed by a
// UTF8 string with the vendor ID.
int pos = 0;
int vendorLength = data.mid(0, 4).toUInt(false);
pos += 4;
d->vendorID = String(data.mid(pos, vendorLength), String::UTF8);
... | 243,138,406,465,612,470,000,000,000,000,000,000,000 | xiphcomment.cpp | 44,740,779,656,801,720,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2012-1108 | The parse function in ogg/xiphcomment.cpp in TagLib 1.7 and earlier allows remote attackers to cause a denial of service (crash) via a crafted vendorLength field in an ogg file. | https://nvd.nist.gov/vuln/detail/CVE-2012-1108 |
443,680 | taglib | b3646a07348ffa276ea41a9dae03ddc63ea6c532 | https://github.com/taglib/taglib | https://github.com/taglib/taglib/commit/b3646a07348ffa276ea41a9dae03ddc63ea6c532 | Be more careful when parsing Vorbis Comments | 0 | void Ogg::XiphComment::parse(const ByteVector &data)
{
// The first thing in the comment data is the vendor ID length, followed by a
// UTF8 string with the vendor ID.
int pos = 0;
int vendorLength = data.mid(0, 4).toUInt(false);
pos += 4;
d->vendorID = String(data.mid(pos, vendorLength), String::UTF8);
... | 185,190,809,881,338,170,000,000,000,000,000,000,000 | xiphcomment.cpp | 221,394,001,845,324,100,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2012-1108 | The parse function in ogg/xiphcomment.cpp in TagLib 1.7 and earlier allows remote attackers to cause a denial of service (crash) via a crafted vendorLength field in an ogg file. | https://nvd.nist.gov/vuln/detail/CVE-2012-1108 |
210,962 | ImageMagick | 24d5699753170c141b46816284430516c2d48fed | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/24d5699753170c141b46816284430516c2d48fed | https://github.com/ImageMagick/ImageMagick/issues/808 | 1 | static MagickBooleanType WriteGIFImage(const ImageInfo *image_info,Image *image,
ExceptionInfo *exception)
{
int
c;
ImageInfo
*write_info;
MagickBooleanType
status;
MagickOffsetType
scene;
RectangleInfo
page;
register ssize_t
i;
register unsigned char
*q;
size_t
... | 202,806,060,520,526,900,000,000,000,000,000,000,000 | gif.c | 323,724,646,826,273,850,000,000,000,000,000,000,000 | [
"CWE-772"
] | CVE-2017-18254 | An issue was discovered in ImageMagick 7.0.7. A memory leak vulnerability was found in the function WriteGIFImage in coders/gif.c, which allow remote attackers to cause a denial of service via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2017-18254 |
443,682 | ImageMagick | 24d5699753170c141b46816284430516c2d48fed | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/24d5699753170c141b46816284430516c2d48fed | https://github.com/ImageMagick/ImageMagick/issues/808 | 0 | static MagickBooleanType WriteGIFImage(const ImageInfo *image_info,Image *image,
ExceptionInfo *exception)
{
int
c;
ImageInfo
*write_info;
MagickBooleanType
status;
MagickOffsetType
scene;
RectangleInfo
page;
register ssize_t
i;
register unsigned char
*q;
size_t
... | 238,695,514,644,997,120,000,000,000,000,000,000,000 | gif.c | 237,172,763,069,531,260,000,000,000,000,000,000,000 | [
"CWE-772"
] | CVE-2017-18254 | An issue was discovered in ImageMagick 7.0.7. A memory leak vulnerability was found in the function WriteGIFImage in coders/gif.c, which allow remote attackers to cause a denial of service via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2017-18254 |
210,968 | fribidi | 034c6e9a1d296286305f4cfd1e0072b879f52568 | https://github.com/fribidi/fribidi | https://github.com/fribidi/fribidi/commit/034c6e9a1d296286305f4cfd1e0072b879f52568 | Truncate isolate_level to FRIBIDI_BIDI_MAX_EXPLICIT_LEVEL | 1 | fribidi_get_par_embedding_levels_ex (
/* input */
const FriBidiCharType *bidi_types,
const FriBidiBracketType *bracket_types,
const FriBidiStrIndex len,
/* input and output */
FriBidiParType *pbase_dir,
/* output */
FriBidiLevel *embedding_levels
)
{
FriBidiLevel base_level_per_iso_level[FRIBIDI_BIDI_... | 311,749,024,103,547,070,000,000,000,000,000,000,000 | fribidi-bidi.c | 192,221,391,530,386,000,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2019-18397 | A buffer overflow in the fribidi_get_par_embedding_levels_ex() function in lib/fribidi-bidi.c of GNU FriBidi through 1.0.7 allows an attacker to cause a denial of service or possibly execute arbitrary code by delivering crafted text content to a user, when this content is then rendered by an application that uses FriBi... | https://nvd.nist.gov/vuln/detail/CVE-2019-18397 |
443,712 | fribidi | 034c6e9a1d296286305f4cfd1e0072b879f52568 | https://github.com/fribidi/fribidi | https://github.com/fribidi/fribidi/commit/034c6e9a1d296286305f4cfd1e0072b879f52568 | Truncate isolate_level to FRIBIDI_BIDI_MAX_EXPLICIT_LEVEL | 0 | fribidi_get_par_embedding_levels_ex (
/* input */
const FriBidiCharType *bidi_types,
const FriBidiBracketType *bracket_types,
const FriBidiStrIndex len,
/* input and output */
FriBidiParType *pbase_dir,
/* output */
FriBidiLevel *embedding_levels
)
{
FriBidiLevel base_level_per_iso_level[FRIBIDI_BIDI_... | 187,522,115,909,983,900,000,000,000,000,000,000,000 | fribidi-bidi.c | 41,017,487,873,236,146,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2019-18397 | A buffer overflow in the fribidi_get_par_embedding_levels_ex() function in lib/fribidi-bidi.c of GNU FriBidi through 1.0.7 allows an attacker to cause a denial of service or possibly execute arbitrary code by delivering crafted text content to a user, when this content is then rendered by an application that uses FriBi... | https://nvd.nist.gov/vuln/detail/CVE-2019-18397 |
210,991 | ImageMagick6 | b4391bdd60df0a77e97a6ef1674f2ffef0e19e24 | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/b4391bdd60df0a77e97a6ef1674f2ffef0e19e24 | https://github.com/ImageMagick/ImageMagick/issues/1515 | 1 | static Image *ReadPANGOImage(const ImageInfo *image_info,
ExceptionInfo *exception)
{
cairo_font_options_t
*font_options;
cairo_surface_t
*surface;
char
*caption,
*property;
cairo_t
*cairo_image;
const char
*option;
DrawInfo
*draw_info;
Image
*image;
MagickBoolea... | 169,714,653,011,089,490,000,000,000,000,000,000,000 | pango.c | 278,613,088,155,537,930,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2019-12974 | A NULL pointer dereference in the function ReadPANGOImage in coders/pango.c and the function ReadVIDImage in coders/vid.c in ImageMagick 7.0.8-34 allows remote attackers to cause a denial of service via a crafted image. | https://nvd.nist.gov/vuln/detail/CVE-2019-12974 |
443,923 | ImageMagick6 | b4391bdd60df0a77e97a6ef1674f2ffef0e19e24 | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/b4391bdd60df0a77e97a6ef1674f2ffef0e19e24 | https://github.com/ImageMagick/ImageMagick/issues/1515 | 0 | static Image *ReadPANGOImage(const ImageInfo *image_info,
ExceptionInfo *exception)
{
cairo_font_options_t
*font_options;
cairo_surface_t
*surface;
char
*caption,
*property;
cairo_t
*cairo_image;
const char
*option;
DrawInfo
*draw_info;
Image
*image;
MagickBoolea... | 218,376,584,200,018,270,000,000,000,000,000,000,000 | pango.c | 97,580,875,846,636,000,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2019-12974 | A NULL pointer dereference in the function ReadPANGOImage in coders/pango.c and the function ReadVIDImage in coders/vid.c in ImageMagick 7.0.8-34 allows remote attackers to cause a denial of service via a crafted image. | https://nvd.nist.gov/vuln/detail/CVE-2019-12974 |
210,992 | ImageMagick6 | b4391bdd60df0a77e97a6ef1674f2ffef0e19e24 | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/b4391bdd60df0a77e97a6ef1674f2ffef0e19e24 | https://github.com/ImageMagick/ImageMagick/issues/1515 | 1 | static Image *ReadVIDImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
#define ClientName "montage"
char
**filelist,
*label,
**list;
Image
*image,
*images,
*montage_image,
*next_image,
*thumbnail_image;
ImageInfo
*read_info;
int
number_files;
MagickBoo... | 325,551,276,257,697,240,000,000,000,000,000,000,000 | vid.c | 202,870,442,311,579,850,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2019-12974 | A NULL pointer dereference in the function ReadPANGOImage in coders/pango.c and the function ReadVIDImage in coders/vid.c in ImageMagick 7.0.8-34 allows remote attackers to cause a denial of service via a crafted image. | https://nvd.nist.gov/vuln/detail/CVE-2019-12974 |
443,921 | ImageMagick6 | b4391bdd60df0a77e97a6ef1674f2ffef0e19e24 | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/b4391bdd60df0a77e97a6ef1674f2ffef0e19e24 | https://github.com/ImageMagick/ImageMagick/issues/1515 | 0 | static Image *ReadVIDImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
#define ClientName "montage"
char
**filelist,
*label,
**list;
Image
*image,
*images,
*montage_image,
*next_image,
*thumbnail_image;
ImageInfo
*read_info;
int
number_files;
MagickBoo... | 139,499,724,195,983,950,000,000,000,000,000,000,000 | vid.c | 53,158,342,806,075,180,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2019-12974 | A NULL pointer dereference in the function ReadPANGOImage in coders/pango.c and the function ReadVIDImage in coders/vid.c in ImageMagick 7.0.8-34 allows remote attackers to cause a denial of service via a crafted image. | https://nvd.nist.gov/vuln/detail/CVE-2019-12974 |
211,031 | DBD-mysql | 7c164a0c86cec6ee95df1d141e67b0e85dfdefd2 | https://github.com/perl5-dbi/DBD-mysql | https://github.com/perl5-dbi/DBD-mysql/commit/7c164a0c86cec6ee95df1d141e67b0e85dfdefd2 | Do not use unsafe sprintf w/variable length input
This can cause a buffer overflow to occur when reporting error
message about validation of (untrusted) user input parameters. | 1 | int dbd_bind_ph(SV *sth, imp_sth_t *imp_sth, SV *param, SV *value,
IV sql_type, SV *attribs, int is_inout, IV maxlen) {
dTHX;
int rc;
int param_num= SvIV(param);
int idx= param_num - 1;
char err_msg[64];
D_imp_xxh(sth);
#if MYSQL_VERSION_ID >= SERVER_PREPARE_VERSION
STRLEN slen;
char *buffer= NULL;
... | 276,628,553,119,414,900,000,000,000,000,000,000,000 | dbdimp.c | 259,970,653,639,265,650,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2016-1246 | Buffer overflow in the DBD::mysql module before 4.037 for Perl allows context-dependent attackers to cause a denial of service (crash) via vectors related to an error message. | https://nvd.nist.gov/vuln/detail/CVE-2016-1246 |
444,831 | DBD-mysql | 7c164a0c86cec6ee95df1d141e67b0e85dfdefd2 | https://github.com/perl5-dbi/DBD-mysql | https://github.com/perl5-dbi/DBD-mysql/commit/7c164a0c86cec6ee95df1d141e67b0e85dfdefd2 | Do not use unsafe sprintf w/variable length input
This can cause a buffer overflow to occur when reporting error
message about validation of (untrusted) user input parameters. | 0 | int dbd_bind_ph(SV *sth, imp_sth_t *imp_sth, SV *param, SV *value,
IV sql_type, SV *attribs, int is_inout, IV maxlen) {
dTHX;
int rc;
int param_num= SvIV(param);
int idx= param_num - 1;
char *err_msg;
D_imp_xxh(sth);
#if MYSQL_VERSION_ID >= SERVER_PREPARE_VERSION
STRLEN slen;
char *buffer= NULL;
i... | 24,339,835,626,884,312,000,000,000,000,000,000,000 | dbdimp.c | 328,368,710,463,227,580,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2016-1246 | Buffer overflow in the DBD::mysql module before 4.037 for Perl allows context-dependent attackers to cause a denial of service (crash) via vectors related to an error message. | https://nvd.nist.gov/vuln/detail/CVE-2016-1246 |
211,104 | ImageMagick6 | d5df600d43c8706df513a3273d09aee6f54a9233 | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/d5df600d43c8706df513a3273d09aee6f54a9233 | https://github.com/ImageMagick/ImageMagick/issues/1754 | 1 | static int IntensityCompare(const void *x,const void *y)
{
PixelPacket
*color_1,
*color_2;
ssize_t
intensity;
color_1=(PixelPacket *) x;
color_2=(PixelPacket *) y;
intensity=(ssize_t) PixelPacketIntensity(color_1)-
(ssize_t) PixelPacketIntensity(color_2);
return((int) intensity);
} | 55,735,061,968,911,560,000,000,000,000,000,000,000 | quantize.c | 266,695,720,896,154,260,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2020-27754 | In IntensityCompare() of /magick/quantize.c, there are calls to PixelPacketIntensity() which could return overflowed values to the caller when ImageMagick processes a crafted input file. To mitigate this, the patch introduces and uses the ConstrainPixelIntensity() function, which forces the pixel intensities to be with... | https://nvd.nist.gov/vuln/detail/CVE-2020-27754 |
446,020 | ImageMagick6 | d5df600d43c8706df513a3273d09aee6f54a9233 | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/d5df600d43c8706df513a3273d09aee6f54a9233 | https://github.com/ImageMagick/ImageMagick/issues/1754 | 0 | static int IntensityCompare(const void *x,const void *y)
{
PixelPacket
*color_1,
*color_2;
ssize_t
intensity;
color_1=(PixelPacket *) x;
color_2=(PixelPacket *) y;
intensity=(ssize_t) ConstrainPixelIntensity(PixelPacketIntensity(color_1))-
(ssize_t) ConstrainPixelIntensity(PixelPacketIntensi... | 144,489,784,766,711,070,000,000,000,000,000,000,000 | quantize.c | 46,007,150,497,717,485,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2020-27754 | In IntensityCompare() of /magick/quantize.c, there are calls to PixelPacketIntensity() which could return overflowed values to the caller when ImageMagick processes a crafted input file. To mitigate this, the patch introduces and uses the ConstrainPixelIntensity() function, which forces the pixel intensities to be with... | https://nvd.nist.gov/vuln/detail/CVE-2020-27754 |
211,123 | ImageMagick6 | b9c3aa197020ca091a21145cf46855afd4ddcb07 | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/b9c3aa197020ca091a21145cf46855afd4ddcb07 | https://github.com/ImageMagick/ImageMagick/issues/1517 | 1 | static MagickBooleanType WriteDPXImage(const ImageInfo *image_info,
Image *image)
{
const char
*value;
const StringInfo
*profile;
DPXInfo
dpx;
MagickBooleanType
status;
MagickOffsetType
offset;
MagickStatusType
flags;
GeometryInfo
geometry_info;
QuantumInfo
*quan... | 59,958,399,033,322,270,000,000,000,000,000,000,000 | dpx.c | 180,998,177,479,375,340,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2019-12975 | ImageMagick 7.0.8-34 has a memory leak vulnerability in the WriteDPXImage function in coders/dpx.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-12975 |
446,189 | ImageMagick6 | b9c3aa197020ca091a21145cf46855afd4ddcb07 | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/b9c3aa197020ca091a21145cf46855afd4ddcb07 | https://github.com/ImageMagick/ImageMagick/issues/1517 | 0 | static MagickBooleanType WriteDPXImage(const ImageInfo *image_info,
Image *image)
{
const char
*value;
const StringInfo
*profile;
DPXInfo
dpx;
MagickBooleanType
status;
MagickOffsetType
offset;
MagickStatusType
flags;
GeometryInfo
geometry_info;
QuantumInfo
*quan... | 150,895,854,198,537,660,000,000,000,000,000,000,000 | dpx.c | 124,594,548,989,713,760,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2019-12975 | ImageMagick 7.0.8-34 has a memory leak vulnerability in the WriteDPXImage function in coders/dpx.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-12975 |
211,124 | sparc | 80caf43549e7e41a695c6d1e11066286538b336f | https://git.kernel.org/pub/scm/linux/kernel/git/davem/sparc | https://git.kernel.org/pub/scm/linux/kernel/git/davem/sparc.git/commit/?id=80caf43549e7e41a695c6d1e11066286538b336f | mdesc: fix a missing-check bug in get_vdev_port_node_info()
In get_vdev_port_node_info(), 'node_info->vdev_port.name' is allcoated
by kstrdup_const(), and it returns NULL when fails. So
'node_info->vdev_port.name' should be checked.
Signed-off-by: Gen Zhang <blackgod016574@gmail.com>
Signed-off-by: David S. Miller <d... | 1 | static int get_vdev_port_node_info(struct mdesc_handle *md, u64 node,
union md_node_info *node_info)
{
const u64 *parent_cfg_hdlp;
const char *name;
const u64 *idp;
/*
* Virtual device nodes are distinguished by:
* 1. "id" property
* 2. "name" property
* 3. parent node "cfg-handle" property
*/
id... | 224,331,832,849,071,840,000,000,000,000,000,000,000 | mdesc.c | 4,126,304,536,054,423,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2019-12615 | An issue was discovered in get_vdev_port_node_info in arch/sparc/kernel/mdesc.c in the Linux kernel through 5.1.6. There is an unchecked kstrdup_const of node_info->vdev_port.name, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash). | https://nvd.nist.gov/vuln/detail/CVE-2019-12615 |
446,219 | sparc | 80caf43549e7e41a695c6d1e11066286538b336f | https://git.kernel.org/pub/scm/linux/kernel/git/davem/sparc | https://git.kernel.org/pub/scm/linux/kernel/git/davem/sparc.git/commit/?id=80caf43549e7e41a695c6d1e11066286538b336f | mdesc: fix a missing-check bug in get_vdev_port_node_info()
In get_vdev_port_node_info(), 'node_info->vdev_port.name' is allcoated
by kstrdup_const(), and it returns NULL when fails. So
'node_info->vdev_port.name' should be checked.
Signed-off-by: Gen Zhang <blackgod016574@gmail.com>
Signed-off-by: David S. Miller <d... | 0 | static int get_vdev_port_node_info(struct mdesc_handle *md, u64 node,
union md_node_info *node_info)
{
const u64 *parent_cfg_hdlp;
const char *name;
const u64 *idp;
/*
* Virtual device nodes are distinguished by:
* 1. "id" property
* 2. "name" property
* 3. parent node "cfg-handle" property
*/
id... | 48,327,159,297,697,690,000,000,000,000,000,000,000 | mdesc.c | 100,890,858,007,712,890,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2019-12615 | An issue was discovered in get_vdev_port_node_info in arch/sparc/kernel/mdesc.c in the Linux kernel through 5.1.6. There is an unchecked kstrdup_const of node_info->vdev_port.name, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash). | https://nvd.nist.gov/vuln/detail/CVE-2019-12615 |
211,125 | vim | 78d52883e10d71f23ab72a3d8b9733b00da8c9ad | https://github.com/vim/vim | https://github.com/vim/vim/commit/78d52883e10d71f23ab72a3d8b9733b00da8c9ad | patch 8.2.5013: after text formatting cursor may be in an invalid position
Problem: After text formatting the cursor may be in an invalid position.
Solution: Correct the cursor position after formatting. | 1 | op_format(
oparg_T *oap,
int keep_cursor) // keep cursor on same text char
{
long old_line_count = curbuf->b_ml.ml_line_count;
// Place the cursor where the "gq" or "gw" command was given, so that "u"
// can put it back there.
curwin->w_cursor = oap->cursor_start;
if (u_save((linenr_T)(o... | 94,494,779,186,259,740,000,000,000,000,000,000,000 | textformat.c | 155,532,383,318,269,900,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2022-1851 | Out-of-bounds Read in GitHub repository vim/vim prior to 8.2. | https://nvd.nist.gov/vuln/detail/CVE-2022-1851 |
446,268 | vim | 78d52883e10d71f23ab72a3d8b9733b00da8c9ad | https://github.com/vim/vim | https://github.com/vim/vim/commit/78d52883e10d71f23ab72a3d8b9733b00da8c9ad | patch 8.2.5013: after text formatting cursor may be in an invalid position
Problem: After text formatting the cursor may be in an invalid position.
Solution: Correct the cursor position after formatting. | 0 | op_format(
oparg_T *oap,
int keep_cursor) // keep cursor on same text char
{
long old_line_count = curbuf->b_ml.ml_line_count;
// Place the cursor where the "gq" or "gw" command was given, so that "u"
// can put it back there.
curwin->w_cursor = oap->cursor_start;
if (u_save((linenr_T)(o... | 91,853,943,991,981,200,000,000,000,000,000,000,000 | textformat.c | 186,902,274,703,795,840,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2022-1851 | Out-of-bounds Read in GitHub repository vim/vim prior to 8.2. | https://nvd.nist.gov/vuln/detail/CVE-2022-1851 |
211,137 | linux | 3b0541791453fbe7f42867e310e0c9eb6295364d | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3b0541791453fbe7f42867e310e0c9eb6295364d | scsi: libsas: delete sas port if expander discover failed
The sas_port(phy->port) allocated in sas_ex_discover_expander() will not be
deleted when the expander failed to discover. This will cause resource leak
and a further issue of kernel BUG like below:
[159785.843156] port-2:17:29: trying to add phy phy-2:17:29 f... | 1 | static struct domain_device *sas_ex_discover_expander(
struct domain_device *parent, int phy_id)
{
struct sas_expander_device *parent_ex = rphy_to_expander_device(parent->rphy);
struct ex_phy *phy = &parent->ex_dev.ex_phy[phy_id];
struct domain_device *child = NULL;
struct sas_rphy *rphy;
struct sas_expander_devi... | 256,839,627,417,889,600,000,000,000,000,000,000,000 | None | null | [
"CWE-401"
] | CVE-2019-15807 | In the Linux kernel before 5.1.13, there is a memory leak in drivers/scsi/libsas/sas_expander.c when SAS expander discovery fails. This will cause a BUG and denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2019-15807 |
446,457 | linux | 3b0541791453fbe7f42867e310e0c9eb6295364d | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3b0541791453fbe7f42867e310e0c9eb6295364d | scsi: libsas: delete sas port if expander discover failed
The sas_port(phy->port) allocated in sas_ex_discover_expander() will not be
deleted when the expander failed to discover. This will cause resource leak
and a further issue of kernel BUG like below:
[159785.843156] port-2:17:29: trying to add phy phy-2:17:29 f... | 0 | static struct domain_device *sas_ex_discover_expander(
struct domain_device *parent, int phy_id)
{
struct sas_expander_device *parent_ex = rphy_to_expander_device(parent->rphy);
struct ex_phy *phy = &parent->ex_dev.ex_phy[phy_id];
struct domain_device *child = NULL;
struct sas_rphy *rphy;
struct sas_expander_devi... | 244,789,976,616,774,380,000,000,000,000,000,000,000 | None | null | [
"CWE-401"
] | CVE-2019-15807 | In the Linux kernel before 5.1.13, there is a memory leak in drivers/scsi/libsas/sas_expander.c when SAS expander discovery fails. This will cause a BUG and denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2019-15807 |
211,153 | ImageMagick6 | e2a21735e3a3f3930bd431585ec36334c4c2eb77 | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/e2a21735e3a3f3930bd431585ec36334c4c2eb77 | https://github.com/ImageMagick/ImageMagick/issues/1540 | 1 | static MagickBooleanType SetGrayscaleImage(Image *image)
{
CacheView
*image_view;
ExceptionInfo
*exception;
MagickBooleanType
status;
PixelPacket
*colormap;
register ssize_t
i;
ssize_t
*colormap_index,
j,
y;
assert(image != (Image *) NULL);
assert(image->signature =... | 133,847,642,611,919,600,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2019-11598 | In ImageMagick 7.0.8-40 Q16, there is a heap-based buffer over-read in the function WritePNMImage of coders/pnm.c, which allows an attacker to cause a denial of service or possibly information disclosure via a crafted image file. This is related to SetGrayscaleImage in MagickCore/quantize.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-11598 |
446,817 | ImageMagick6 | e2a21735e3a3f3930bd431585ec36334c4c2eb77 | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/e2a21735e3a3f3930bd431585ec36334c4c2eb77 | https://github.com/ImageMagick/ImageMagick/issues/1540 | 0 | static MagickBooleanType SetGrayscaleImage(Image *image)
{
CacheView
*image_view;
ExceptionInfo
*exception;
MagickBooleanType
status;
PixelPacket
*colormap;
register ssize_t
i;
ssize_t
*colormap_index,
j,
y;
assert(image != (Image *) NULL);
assert(image->signature =... | 199,970,286,491,542,160,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2019-11598 | In ImageMagick 7.0.8-40 Q16, there is a heap-based buffer over-read in the function WritePNMImage of coders/pnm.c, which allows an attacker to cause a denial of service or possibly information disclosure via a crafted image file. This is related to SetGrayscaleImage in MagickCore/quantize.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-11598 |
211,154 | linux | 29eb31542787e1019208a2e1047bb7c76c069536 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=29eb31542787e1019208a2e1047bb7c76c069536 | yam: fix a memory leak in yam_siocdevprivate()
ym needs to be free when ym->cmd != SIOCYAMSMCS.
Fixes: 0781168e23a2 ("yam: fix a missing-check bug")
Signed-off-by: Hangyu Hua <hbh25y@gmail.com>
Signed-off-by: David S. Miller <davem@davemloft.net> | 1 | static int yam_siocdevprivate(struct net_device *dev, struct ifreq *ifr, void __user *data, int cmd)
{
struct yam_port *yp = netdev_priv(dev);
struct yamdrv_ioctl_cfg yi;
struct yamdrv_ioctl_mcs *ym;
int ioctl_cmd;
if (copy_from_user(&ioctl_cmd, data, sizeof(int)))
return -EFAULT;
if (yp->magic != YAM_MAGIC)
... | 297,353,328,281,095,560,000,000,000,000,000,000,000 | yam.c | 187,741,710,050,303,130,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2022-24959 | An issue was discovered in the Linux kernel before 5.16.5. There is a memory leak in yam_siocdevprivate in drivers/net/hamradio/yam.c. | https://nvd.nist.gov/vuln/detail/CVE-2022-24959 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.