idx
int64
project
string
commit_id
string
project_url
string
commit_url
string
commit_message
string
target
int64
func
string
func_hash
float64
file_name
string
file_hash
float64
cwe
list
cve
string
cve_desc
string
nvd_url
string
453,272
net-next
bf39b4247b8799935ea91d90db250ab608a58e50
http://git.kernel.org/?p=linux/kernel/git/davem/net-next
http://git.kernel.org/cgit/linux/kernel/git/davem/net-next.git/commit/net/rds/iw.c?id=bf39b4247b8799935ea91d90db250ab608a58e50
rds: prevent dereference of a NULL device in rds_iw_laddr_check Binding might result in a NULL device which is later dereferenced without checking. Signed-off-by: Sasha Levin <sasha.levin@oracle.com> Signed-off-by: David S. Miller <davem@davemloft.net>
0
static int rds_iw_laddr_check(__be32 addr) { int ret; struct rdma_cm_id *cm_id; struct sockaddr_in sin; /* Create a CMA ID and try to bind it. This catches both * IB and iWARP capable NICs. */ cm_id = rdma_create_id(NULL, NULL, RDMA_PS_TCP, IB_QPT_RC); if (IS_ERR(cm_id)) return PTR_ERR(cm_id); memset(&si...
287,961,537,639,703,700,000,000,000,000,000,000,000
iw.c
88,290,903,270,754,830,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2014-2678
The rds_iw_laddr_check function in net/rds/iw.c in the Linux kernel through 3.14 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a bind system call for an RDS socket on a system that lacks RDS transports.
https://nvd.nist.gov/vuln/detail/CVE-2014-2678
211,921
curl
481e0de00a9003b9c5220b120e3fc302d9b0932d
https://github.com/curl/curl
https://github.com/curl/curl/commit/481e0de00a9003b9c5220b120e3fc302d9b0932d
curl: point out unnecessary uses of -X in verbose mode It uses 'Note:' as a prefix as opposed to the common 'Warning:' to take down the tone a bit. It adds a warning for using -XHEAD on other methods becasue that may lead to a hanging connection.
1
void warnf(struct GlobalConfig *config, const char *fmt, ...) { if(!config->mute) { va_list ap; int len; char *ptr; char print_buffer[256]; va_start(ap, fmt); len = vsnprintf(print_buffer, sizeof(print_buffer), fmt, ap); va_end(ap); ptr = print_buffer; while(len > 0) { fput...
207,486,993,573,896,750,000,000,000,000,000,000,000
tool_msgs.c
322,523,001,024,947,700,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-16842
Curl versions 7.14.1 through 7.61.1 are vulnerable to a heap-based buffer over-read in the tool_msgs.c:voutf() function that may result in information exposure and denial of service.
https://nvd.nist.gov/vuln/detail/CVE-2018-16842
453,414
curl
481e0de00a9003b9c5220b120e3fc302d9b0932d
https://github.com/curl/curl
https://github.com/curl/curl/commit/481e0de00a9003b9c5220b120e3fc302d9b0932d
curl: point out unnecessary uses of -X in verbose mode It uses 'Note:' as a prefix as opposed to the common 'Warning:' to take down the tone a bit. It adds a warning for using -XHEAD on other methods becasue that may lead to a hanging connection.
0
static void voutf(struct GlobalConfig *config, const char *prefix, const char *fmt, va_list ap) { size_t width = (79 - (int)strlen(prefix)); if(!config->mute) { size_t len; char *ptr; char print_buffer[256]; len = vsnprintf(print_buffer, sizeof(...
143,073,352,839,627,400,000,000,000,000,000,000,000
tool_msgs.c
156,262,683,538,130,330,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-16842
Curl versions 7.14.1 through 7.61.1 are vulnerable to a heap-based buffer over-read in the tool_msgs.c:voutf() function that may result in information exposure and denial of service.
https://nvd.nist.gov/vuln/detail/CVE-2018-16842
211,954
php-src
06d309fd7a917575d65c7a6f4f57b0e6bb0f9711
https://github.com/php/php-src
https://git.php.net/?p=php-src.git;a=commit;h=06d309fd7a917575d65c7a6f4f57b0e6bb0f9711
Fix bug #76249 - fail on invalid sequences
1
static int php_iconv_stream_filter_append_bucket( php_iconv_stream_filter *self, php_stream *stream, php_stream_filter *filter, php_stream_bucket_brigade *buckets_out, const char *ps, size_t buf_len, size_t *consumed, int persistent TSRMLS_DC) { php_stream_bucket *new_bucket; char *out_buf = NULL; size_t o...
329,699,120,429,741,300,000,000,000,000,000,000,000
iconv.c
3,704,234,198,316,652,000,000,000,000,000,000,000
[ "CWE-835" ]
CVE-2018-10546
An issue was discovered in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. An infinite loop exists in ext/iconv/iconv.c because the iconv stream filter does not reject invalid multibyte sequences.
https://nvd.nist.gov/vuln/detail/CVE-2018-10546
453,737
php-src
06d309fd7a917575d65c7a6f4f57b0e6bb0f9711
https://github.com/php/php-src
https://git.php.net/?p=php-src.git;a=commit;h=06d309fd7a917575d65c7a6f4f57b0e6bb0f9711
Fix bug #76249 - fail on invalid sequences
0
static int php_iconv_stream_filter_append_bucket( php_iconv_stream_filter *self, php_stream *stream, php_stream_filter *filter, php_stream_bucket_brigade *buckets_out, const char *ps, size_t buf_len, size_t *consumed, int persistent TSRMLS_DC) { php_stream_bucket *new_bucket; char *out_buf = NULL; size_t o...
104,862,186,841,462,740,000,000,000,000,000,000,000
iconv.c
240,903,210,300,560,100,000,000,000,000,000,000,000
[ "CWE-835" ]
CVE-2018-10546
An issue was discovered in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. An infinite loop exists in ext/iconv/iconv.c because the iconv stream filter does not reject invalid multibyte sequences.
https://nvd.nist.gov/vuln/detail/CVE-2018-10546
211,962
thrift
cfaadcc4adcfde2a8232c62ec89870b73ef40df1
https://github.com/apache/thrift
https://github.com/apache/thrift/commit/cfaadcc4adcfde2a8232c62ec89870b73ef40df1
THRIFT-3231 CPP: Limit recursion depth to 64 Client: cpp Patch: Ben Craig <bencraig@apache.org>
1
uint32_t skip(Protocol_& prot, TType type) { switch (type) { case T_BOOL: { bool boolv; return prot.readBool(boolv); } case T_BYTE: { int8_t bytev; return prot.readByte(bytev); } case T_I16: { int16_t i16; return prot.readI16(i16); } case T_I32: { int32_t i32; return prot...
66,980,084,554,028,480,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2015-3254
The client libraries in Apache Thrift before 0.9.3 might allow remote authenticated users to cause a denial of service (infinite recursion) via vectors involving the skip function.
https://nvd.nist.gov/vuln/detail/CVE-2015-3254
453,789
thrift
cfaadcc4adcfde2a8232c62ec89870b73ef40df1
https://github.com/apache/thrift
https://github.com/apache/thrift/commit/cfaadcc4adcfde2a8232c62ec89870b73ef40df1
THRIFT-3231 CPP: Limit recursion depth to 64 Client: cpp Patch: Ben Craig <bencraig@apache.org>
0
uint32_t skip(Protocol_& prot, TType type) { TRecursionTracker tracker(prot); switch (type) { case T_BOOL: { bool boolv; return prot.readBool(boolv); } case T_BYTE: { int8_t bytev; return prot.readByte(bytev); } case T_I16: { int16_t i16; return prot.readI16(i16); } case T_I32...
332,116,345,166,519,350,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2015-3254
The client libraries in Apache Thrift before 0.9.3 might allow remote authenticated users to cause a denial of service (infinite recursion) via vectors involving the skip function.
https://nvd.nist.gov/vuln/detail/CVE-2015-3254
211,973
linux
4969c06a0d83c9c3dc50b8efcdc8eeedfce896f6
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/4969c06a0d83c9c3dc50b8efcdc8eeedfce896f6#diff-41a7fa4590d2af87e82101f2b4dadb56
f2fs: support swap file w/ DIO Signed-off-by: Jaegeuk Kim <jaegeuk@kernel.org>
1
static inline struct f2fs_sb_info *F2FS_P_SB(struct page *page) { return F2FS_M_SB(page->mapping); }
261,652,219,491,624,200,000,000,000,000,000,000,000
f2fs.h
251,161,672,164,811,730,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2019-19815
In the Linux kernel 5.0.21, mounting a crafted f2fs filesystem image can cause a NULL pointer dereference in f2fs_recover_fsync_data in fs/f2fs/recovery.c. This is related to F2FS_P_SB in fs/f2fs/f2fs.h.
https://nvd.nist.gov/vuln/detail/CVE-2019-19815
454,156
linux
4969c06a0d83c9c3dc50b8efcdc8eeedfce896f6
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/4969c06a0d83c9c3dc50b8efcdc8eeedfce896f6#diff-41a7fa4590d2af87e82101f2b4dadb56
f2fs: support swap file w/ DIO Signed-off-by: Jaegeuk Kim <jaegeuk@kernel.org>
0
static inline struct f2fs_sb_info *F2FS_P_SB(struct page *page) { return F2FS_M_SB(page_file_mapping(page)); }
711,002,433,050,588,500,000,000,000,000,000,000
f2fs.h
309,266,967,342,095,100,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2019-19815
In the Linux kernel 5.0.21, mounting a crafted f2fs filesystem image can cause a NULL pointer dereference in f2fs_recover_fsync_data in fs/f2fs/recovery.c. This is related to F2FS_P_SB in fs/f2fs/f2fs.h.
https://nvd.nist.gov/vuln/detail/CVE-2019-19815
211,976
linux
ca72d88378b2f2444d3ec145dd442d449d3fefbc
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ca72d88378b2f2444d3ec145dd442d449d3fefbc
powerpc/mm/64s/hash: Reallocate context ids on fork When using the Hash Page Table (HPT) MMU, userspace memory mappings are managed at two levels. Firstly in the Linux page tables, much like other architectures, and secondly in the SLB (Segment Lookaside Buffer) and HPT. It's the SLB and HPT that are actually used by ...
1
static int hash__init_new_context(struct mm_struct *mm) { int index; index = hash__alloc_context_id(); if (index < 0) return index; /* * The old code would re-promote on fork, we don't do that when using * slices as it could cause problem promoting slices that have been * forced down to 4K. * * For bo...
146,457,499,930,958,410,000,000,000,000,000,000,000
mmu_context_book3s64.c
161,308,278,373,963,790,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2019-12817
arch/powerpc/mm/mmu_context_book3s64.c in the Linux kernel before 5.1.15 for powerpc has a bug where unrelated processes may be able to read/write to one another's virtual memory under certain conditions via an mmap above 512 TB. Only a subset of powerpc systems are affected.
https://nvd.nist.gov/vuln/detail/CVE-2019-12817
454,315
linux
ca72d88378b2f2444d3ec145dd442d449d3fefbc
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ca72d88378b2f2444d3ec145dd442d449d3fefbc
powerpc/mm/64s/hash: Reallocate context ids on fork When using the Hash Page Table (HPT) MMU, userspace memory mappings are managed at two levels. Firstly in the Linux page tables, much like other architectures, and secondly in the SLB (Segment Lookaside Buffer) and HPT. It's the SLB and HPT that are actually used by ...
0
static int hash__init_new_context(struct mm_struct *mm) { int index; /* * The old code would re-promote on fork, we don't do that when using * slices as it could cause problem promoting slices that have been * forced down to 4K. * * For book3s we have MMU_NO_CONTEXT set to be ~0. Hence check * explicitly...
40,652,592,758,920,230,000,000,000,000,000,000,000
mmu_context_book3s64.c
150,195,305,471,774,050,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2019-12817
arch/powerpc/mm/mmu_context_book3s64.c in the Linux kernel before 5.1.15 for powerpc has a bug where unrelated processes may be able to read/write to one another's virtual memory under certain conditions via an mmap above 512 TB. Only a subset of powerpc systems are affected.
https://nvd.nist.gov/vuln/detail/CVE-2019-12817
211,990
libvncserver
ca2a5ac02fbbadd0a21fabba779c1ea69173d10b
https://github.com/LibVNC/libvncserver
https://github.com/LibVNC/libvncserver/commit/ca2a5ac02fbbadd0a21fabba779c1ea69173d10b
tightvnc-filetransfer: fix heap use-after-free One can only guess what the intended semantics were here, but as every other rfbCloseClient() call in this file is followed by an immediate return, let's assume this was forgotton in this case. Anyway, don't forget to clean up to not leak memory. Closes #241
1
HandleFileDownloadCancelRequest(rfbClientPtr cl, rfbTightClientPtr rtcp) { int n = 0; char *reason = NULL; rfbClientToServerTightMsg msg; memset(&msg, 0, sizeof(rfbClientToServerTightMsg)); if((n = rfbReadExact(cl, ((char *)&msg)+1, sz_rfbFileDownloadCancelMsg-1)) <= 0) { if (n < 0) rfbLog("File [%s]: M...
66,719,896,014,773,490,000,000,000,000,000,000,000
None
null
[ "CWE-416" ]
CVE-2018-6307
LibVNC before commit ca2a5ac02fbbadd0a21fabba779c1ea69173d10b contains heap use-after-free vulnerability in server code of file transfer extension that can result remote code execution.
https://nvd.nist.gov/vuln/detail/CVE-2018-6307
454,430
libvncserver
ca2a5ac02fbbadd0a21fabba779c1ea69173d10b
https://github.com/LibVNC/libvncserver
https://github.com/LibVNC/libvncserver/commit/ca2a5ac02fbbadd0a21fabba779c1ea69173d10b
tightvnc-filetransfer: fix heap use-after-free One can only guess what the intended semantics were here, but as every other rfbCloseClient() call in this file is followed by an immediate return, let's assume this was forgotton in this case. Anyway, don't forget to clean up to not leak memory. Closes #241
0
HandleFileDownloadCancelRequest(rfbClientPtr cl, rfbTightClientPtr rtcp) { int n = 0; char *reason = NULL; rfbClientToServerTightMsg msg; memset(&msg, 0, sizeof(rfbClientToServerTightMsg)); if((n = rfbReadExact(cl, ((char *)&msg)+1, sz_rfbFileDownloadCancelMsg-1)) <= 0) { if (n < 0) rfbLog("File [%s]: M...
6,192,947,187,779,628,000,000,000,000,000,000,000
None
null
[ "CWE-416" ]
CVE-2018-6307
LibVNC before commit ca2a5ac02fbbadd0a21fabba779c1ea69173d10b contains heap use-after-free vulnerability in server code of file transfer extension that can result remote code execution.
https://nvd.nist.gov/vuln/detail/CVE-2018-6307
212,024
openexr
5db6f7aee79e3e75e8c3780b18b28699614dd08e
https://github.com/AcademySoftwareFoundation/openexr
https://github.com/AcademySoftwareFoundation/openexr/commit/5db6f7aee79e3e75e8c3780b18b28699614dd08e
prevent overflow in bytesPerDeepLineTable (#1152) * prevent overflow in bytesPerDeepLineTable Signed-off-by: Peter Hillman <peterh@wetafx.co.nz> * restore zapped 'const' from ImfMisc Signed-off-by: Peter Hillman <peterh@wetafx.co.nz>
1
bytesPerDeepLineTable (const Header &header, int minY, int maxY, const char* base, int xStride, int yStride, vector<size_t> &bytesPerLine) { const Box2i &dataWindow = header.dataWindow(); const Cha...
147,561,555,831,010,580,000,000,000,000,000,000,000
ImfMisc.cpp
34,497,147,120,240,250,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2021-3933
An integer overflow could occur when OpenEXR processes a crafted file on systems where size_t < 64 bits. This could cause an invalid bytesPerLine and maxBytesPerLine value, which could lead to problems with application stability or lead to other attack paths.
https://nvd.nist.gov/vuln/detail/CVE-2021-3933
454,504
openexr
5db6f7aee79e3e75e8c3780b18b28699614dd08e
https://github.com/AcademySoftwareFoundation/openexr
https://github.com/AcademySoftwareFoundation/openexr/commit/5db6f7aee79e3e75e8c3780b18b28699614dd08e
prevent overflow in bytesPerDeepLineTable (#1152) * prevent overflow in bytesPerDeepLineTable Signed-off-by: Peter Hillman <peterh@wetafx.co.nz> * restore zapped 'const' from ImfMisc Signed-off-by: Peter Hillman <peterh@wetafx.co.nz>
0
bytesPerDeepLineTable (const Header &header, int minY, int maxY, const char* base, int xStride, int yStride, vector<size_t> &bytesPerLine) { const Box2i &dataWindow = header.dataWindow(); const Cha...
219,344,335,996,282,560,000,000,000,000,000,000,000
ImfMisc.cpp
12,119,110,260,333,633,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2021-3933
An integer overflow could occur when OpenEXR processes a crafted file on systems where size_t < 64 bits. This could cause an invalid bytesPerLine and maxBytesPerLine value, which could lead to problems with application stability or lead to other attack paths.
https://nvd.nist.gov/vuln/detail/CVE-2021-3933
212,025
gst-plugins-good
87a2c140ca54c5128093377e9b25a5c24b346727
https://github.com/GStreamer/gst-plugins-good
https://github.com/GStreamer/gst-plugins-good/commit/87a2c140ca54c5128093377e9b25a5c24b346727
aacparse: Make sure we have enough data in the codec_data to be able to parse it Also error out cleanly if mapping the buffer failed. https://bugzilla.gnome.org/show_bug.cgi?id=775450
1
gst_aac_parse_sink_setcaps (GstBaseParse * parse, GstCaps * caps) { GstAacParse *aacparse; GstStructure *structure; gchar *caps_str; const GValue *value; aacparse = GST_AAC_PARSE (parse); structure = gst_caps_get_structure (caps, 0); caps_str = gst_caps_to_string (caps); GST_DEBUG_OBJECT (aacparse, "s...
86,609,398,393,185,370,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2016-10198
The gst_aac_parse_sink_setcaps function in gst/audioparsers/gstaacparse.c in gst-plugins-good in GStreamer before 1.10.3 allows remote attackers to cause a denial of service (invalid memory read and crash) via a crafted audio file.
https://nvd.nist.gov/vuln/detail/CVE-2016-10198
454,530
gst-plugins-good
87a2c140ca54c5128093377e9b25a5c24b346727
https://github.com/GStreamer/gst-plugins-good
https://github.com/GStreamer/gst-plugins-good/commit/87a2c140ca54c5128093377e9b25a5c24b346727
aacparse: Make sure we have enough data in the codec_data to be able to parse it Also error out cleanly if mapping the buffer failed. https://bugzilla.gnome.org/show_bug.cgi?id=775450
0
gst_aac_parse_sink_setcaps (GstBaseParse * parse, GstCaps * caps) { GstAacParse *aacparse; GstStructure *structure; gchar *caps_str; const GValue *value; aacparse = GST_AAC_PARSE (parse); structure = gst_caps_get_structure (caps, 0); caps_str = gst_caps_to_string (caps); GST_DEBUG_OBJECT (aacparse, "s...
327,447,690,003,773,460,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2016-10198
The gst_aac_parse_sink_setcaps function in gst/audioparsers/gstaacparse.c in gst-plugins-good in GStreamer before 1.10.3 allows remote attackers to cause a denial of service (invalid memory read and crash) via a crafted audio file.
https://nvd.nist.gov/vuln/detail/CVE-2016-10198
212,050
tigervnc
b4ada8d0c6dac98c8b91fc64d112569a8ae5fb95
https://github.com/CendioOssman/tigervnc
https://github.com/CendioOssman/tigervnc/commit/b4ada8d0c6dac98c8b91fc64d112569a8ae5fb95
Handle empty Tight gradient rects We always assumed there would be one pixel per row so a rect with a zero width would result in us writing to unknown memory. This could theoretically be used by a malicious server to inject code in to the viewer process. Issue found by Pavel Cheremushkin from Kaspersky Lab.
1
void TightDecoder::FilterGradient(const rdr::U8* inbuf, const PixelFormat& pf, PIXEL_T* outbuf, int stride, const Rect& r) { int x, y, c; static rdr::U8 prevRow[TIGHT_MAX_WIDTH*3]; static rdr::U8 thisRow[TIGHT_MAX_WIDTH*3]; rdr::U8 pix[3]; i...
74,343,083,088,390,250,000,000,000,000,000,000,000
tightDecode.h
169,340,406,796,421,610,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2019-15693
TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which occurs in TightDecoder::FilterGradient. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.
https://nvd.nist.gov/vuln/detail/CVE-2019-15693
454,634
tigervnc
b4ada8d0c6dac98c8b91fc64d112569a8ae5fb95
https://github.com/CendioOssman/tigervnc
https://github.com/CendioOssman/tigervnc/commit/b4ada8d0c6dac98c8b91fc64d112569a8ae5fb95
Handle empty Tight gradient rects We always assumed there would be one pixel per row so a rect with a zero width would result in us writing to unknown memory. This could theoretically be used by a malicious server to inject code in to the viewer process. Issue found by Pavel Cheremushkin from Kaspersky Lab.
0
void TightDecoder::FilterGradient(const rdr::U8* inbuf, const PixelFormat& pf, PIXEL_T* outbuf, int stride, const Rect& r) { int x, y, c; static rdr::U8 prevRow[TIGHT_MAX_WIDTH*3]; static rdr::U8 thisRow[TIGHT_MAX_WIDTH*3]; rdr::U8 pix[3]; i...
18,003,324,109,250,245,000,000,000,000,000,000,000
tightDecode.h
165,697,753,356,222,000,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2019-15693
TigerVNC version prior to 1.10.1 is vulnerable to heap buffer overflow, which occurs in TightDecoder::FilterGradient. Exploitation of this vulnerability could potentially result into remote code execution. This attack appear to be exploitable via network connectivity.
https://nvd.nist.gov/vuln/detail/CVE-2019-15693
212,052
Pillow
5d8a0be45aad78c5a22c8d099118ee26ef8144af
https://github.com/python-pillow/Pillow
https://github.com/python-pillow/Pillow/commit/5d8a0be45aad78c5a22c8d099118ee26ef8144af
Memory error in Storage.c when accepting negative image size arguments
1
ImagingNew(const char* mode, int xsize, int ysize) { int bytes; Imaging im; if (strlen(mode) == 1) { if (mode[0] == 'F' || mode[0] == 'I') bytes = 4; else bytes = 1; } else bytes = strlen(mode); /* close enough */ if ((int64_t) xsize * (int64_t) ysiz...
306,939,304,558,049,030,000,000,000,000,000,000,000
Storage.c
104,452,975,219,124,460,000,000,000,000,000,000,000
[ "CWE-284" ]
CVE-2016-9190
Pillow before 3.3.2 allows context-dependent attackers to execute arbitrary code by using the "crafted image file" approach, related to an "Insecure Sign Extension" issue affecting the ImagingNew in Storage.c component.
https://nvd.nist.gov/vuln/detail/CVE-2016-9190
454,640
Pillow
5d8a0be45aad78c5a22c8d099118ee26ef8144af
https://github.com/python-pillow/Pillow
https://github.com/python-pillow/Pillow/commit/5d8a0be45aad78c5a22c8d099118ee26ef8144af
Memory error in Storage.c when accepting negative image size arguments
0
ImagingNew(const char* mode, int xsize, int ysize) { int bytes; Imaging im; if (strlen(mode) == 1) { if (mode[0] == 'F' || mode[0] == 'I') bytes = 4; else bytes = 1; } else bytes = strlen(mode); /* close enough */ if (xsize < 0 || ysize < 0) { ...
186,364,476,514,899,160,000,000,000,000,000,000,000
Storage.c
14,631,962,724,874,062,000,000,000,000,000,000,000
[ "CWE-284" ]
CVE-2016-9190
Pillow before 3.3.2 allows context-dependent attackers to execute arbitrary code by using the "crafted image file" approach, related to an "Insecure Sign Extension" issue affecting the ImagingNew in Storage.c component.
https://nvd.nist.gov/vuln/detail/CVE-2016-9190
212,082
oniguruma
b6cb7580a7e0c56fc325fe9370b9d34044910aed
https://github.com/kkos/oniguruma
https://github.com/kkos/oniguruma/commit/b6cb7580a7e0c56fc325fe9370b9d34044910aed
fix #164: Integer overflow related to reg->dmax in search_in_range()
1
search_in_range(regex_t* reg, const UChar* str, const UChar* end, const UChar* start, const UChar* range, /* match start range */ const UChar* data_range, /* subject string range */ OnigRegion* region, OnigOptionType option, OnigMatchParam* mp) { int r; ...
307,056,432,621,240,840,000,000,000,000,000,000,000
regexec.c
313,950,996,615,508,470,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-19012
An integer overflow in the search_in_range function in regexec.c in Oniguruma 6.x before 6.9.4_rc2 leads to an out-of-bounds read, in which the offset of this read is under the control of an attacker. (This only affects the 32-bit compiled version). Remote attackers can cause a denial-of-service or information disclosu...
https://nvd.nist.gov/vuln/detail/CVE-2019-19012
454,743
oniguruma
b6cb7580a7e0c56fc325fe9370b9d34044910aed
https://github.com/kkos/oniguruma
https://github.com/kkos/oniguruma/commit/b6cb7580a7e0c56fc325fe9370b9d34044910aed
fix #164: Integer overflow related to reg->dmax in search_in_range()
0
search_in_range(regex_t* reg, const UChar* str, const UChar* end, const UChar* start, const UChar* range, /* match start range */ const UChar* data_range, /* subject string range */ OnigRegion* region, OnigOptionType option, OnigMatchParam* mp) { int r; ...
1,447,852,016,459,456,000,000,000,000,000,000,000
regexec.c
231,846,725,864,491,960,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-19012
An integer overflow in the search_in_range function in regexec.c in Oniguruma 6.x before 6.9.4_rc2 leads to an out-of-bounds read, in which the offset of this read is under the control of an attacker. (This only affects the 32-bit compiled version). Remote attackers can cause a denial-of-service or information disclosu...
https://nvd.nist.gov/vuln/detail/CVE-2019-19012
212,084
tntnet
9d1a859e28b78bfbf769689454b529ac7709dee4
https://github.com/maekitalo/tntnet
https://github.com/maekitalo/tntnet/commit/9d1a859e28b78bfbf769689454b529ac7709dee4
last fix did not do it - fix again
1
bool Messageheader::Parser::state_fieldbody_crlf(char ch) { if (ch == '\r') SET_STATE(state_end_cr); else if (ch == '\n') { log_debug("header " << fieldnamePtr << ": " << fieldbodyPtr); switch (header.onField(fieldnamePtr, fieldbodyPtr)) { case OK: case END: retu...
44,777,441,174,446,010,000,000,000,000,000,000,000
messageheaderparser.cpp
339,872,064,136,368,250,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2013-7299
framework/common/messageheaderparser.cpp in Tntnet before 2.2.1 allows remote attackers to obtain sensitive information via a header that ends in \n instead of \r\n, which prevents a null terminator from being added and causes Tntnet to include headers from other requests.
https://nvd.nist.gov/vuln/detail/CVE-2013-7299
454,761
tntnet
9d1a859e28b78bfbf769689454b529ac7709dee4
https://github.com/maekitalo/tntnet
https://github.com/maekitalo/tntnet/commit/9d1a859e28b78bfbf769689454b529ac7709dee4
last fix did not do it - fix again
0
bool Messageheader::Parser::state_fieldbody_crlf(char ch) { if (ch == '\r') SET_STATE(state_end_cr); else if (ch == '\n') { log_debug("header " << fieldnamePtr << ": " << fieldbodyPtr); if (header.onField(fieldnamePtr, fieldbodyPtr) == FAIL) { failedFlag = true; l...
159,270,690,884,132,670,000,000,000,000,000,000,000
messageheaderparser.cpp
105,984,354,171,789,560,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2013-7299
framework/common/messageheaderparser.cpp in Tntnet before 2.2.1 allows remote attackers to obtain sensitive information via a header that ends in \n instead of \r\n, which prevents a null terminator from being added and causes Tntnet to include headers from other requests.
https://nvd.nist.gov/vuln/detail/CVE-2013-7299
212,087
w3m
9cf6926c5d947371dc9e44f32bc7a2fbfca5d469
https://github.com/tats/w3m
https://github.com/tats/w3m/commit/9cf6926c5d947371dc9e44f32bc7a2fbfca5d469
Prevent segfault when iso2022 parsing Bug-Debian: https://github.com/tats/w3m/issues/14
1
wc_push_to_iso2022(Str os, wc_wchar_t cc, wc_status *st) { wc_uchar g = 0; wc_bool is_wide = WC_FALSE, retry = WC_FALSE; wc_wchar_t cc2; while (1) { switch (WC_CCS_TYPE(cc.ccs)) { case WC_CCS_A_CS94: if (cc.ccs == WC_CCS_US_ASCII) cc.ccs = st->g0_ccs; g = cs94_gmap[WC_CCS_INDEX(cc.ccs) - W...
160,900,940,612,887,880,000,000,000,000,000,000,000
iso2022.c
208,615,759,827,271,620,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2016-9433
An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. w3m allows remote attackers to cause a denial of service (out-of-bounds array access) via a crafted HTML page.
https://nvd.nist.gov/vuln/detail/CVE-2016-9433
454,774
w3m
9cf6926c5d947371dc9e44f32bc7a2fbfca5d469
https://github.com/tats/w3m
https://github.com/tats/w3m/commit/9cf6926c5d947371dc9e44f32bc7a2fbfca5d469
Prevent segfault when iso2022 parsing Bug-Debian: https://github.com/tats/w3m/issues/14
0
wc_push_to_iso2022(Str os, wc_wchar_t cc, wc_status *st) { wc_uchar g = 0; wc_bool is_wide = WC_FALSE, retry = WC_FALSE; wc_wchar_t cc2; while (1) { switch (WC_CCS_TYPE(cc.ccs)) { case WC_CCS_A_CS94: if (cc.ccs == WC_CCS_US_ASCII) cc.ccs = st->g0_ccs; if (WC_CCS_INDEX(cc.ccs) >= WC_F_ISO_B...
254,071,666,288,592,350,000,000,000,000,000,000,000
iso2022.c
308,885,229,445,023,700,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2016-9433
An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. w3m allows remote attackers to cause a denial of service (out-of-bounds array access) via a crafted HTML page.
https://nvd.nist.gov/vuln/detail/CVE-2016-9433
212,094
exiv2
b7c71f3ad0386cd7af3b73443c0615ada073f0d5
https://github.com/Exiv2/exiv2
https://github.com/Exiv2/exiv2/commit/b7c71f3ad0386cd7af3b73443c0615ada073f0d5
PSD: enforce Length of image resource section < file size
1
void PsdImage::readMetadata() { #ifdef DEBUG std::cerr << "Exiv2::PsdImage::readMetadata: Reading Photoshop file " << io_->path() << "\n"; #endif if (io_->open() != 0) { throw Error(kerDataSourceOpenFailed, io_->path(), strError()); } IoCloser closer(*io_); ...
185,184,033,672,169,370,000,000,000,000,000,000,000
psdimage.cpp
306,013,895,677,921,260,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-19107
In Exiv2 0.26, Exiv2::IptcParser::decode in iptc.cpp (called from psdimage.cpp in the PSD image reader) may suffer from a denial of service (heap-based buffer over-read) caused by an integer overflow via a crafted PSD image file.
https://nvd.nist.gov/vuln/detail/CVE-2018-19107
454,819
exiv2
b7c71f3ad0386cd7af3b73443c0615ada073f0d5
https://github.com/Exiv2/exiv2
https://github.com/Exiv2/exiv2/commit/b7c71f3ad0386cd7af3b73443c0615ada073f0d5
PSD: enforce Length of image resource section < file size
0
void PsdImage::readMetadata() { #ifdef DEBUG std::cerr << "Exiv2::PsdImage::readMetadata: Reading Photoshop file " << io_->path() << "\n"; #endif if (io_->open() != 0) { throw Error(kerDataSourceOpenFailed, io_->path(), strError()); } IoCloser closer(*io_); ...
131,799,542,688,721,550,000,000,000,000,000,000,000
psdimage.cpp
111,551,575,002,927,270,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-19107
In Exiv2 0.26, Exiv2::IptcParser::decode in iptc.cpp (called from psdimage.cpp in the PSD image reader) may suffer from a denial of service (heap-based buffer over-read) caused by an integer overflow via a crafted PSD image file.
https://nvd.nist.gov/vuln/detail/CVE-2018-19107
212,110
LibRaw
19ffddb0fe1a4ffdb459b797ffcf7f490d28b5a6
https://github.com/LibRaw/LibRaw
https://github.com/LibRaw/LibRaw/commit/19ffddb0fe1a4ffdb459b797ffcf7f490d28b5a6
prevent double-free() on broken full-color images error handling
1
int LibRaw::unpack(void) { CHECK_ORDER_HIGH(LIBRAW_PROGRESS_LOAD_RAW); CHECK_ORDER_LOW(LIBRAW_PROGRESS_IDENTIFY); try { if(!libraw_internal_data.internal_data.input) return LIBRAW_INPUT_CLOSED; RUN_CALLBACK(LIBRAW_PROGRESS_LOAD_RAW,0,2); if (O.shot_select >= P1.raw_count) ...
150,547,363,331,533,530,000,000,000,000,000,000,000
libraw_cxx.cpp
47,348,235,546,310,000,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2013-2126
Multiple double free vulnerabilities in the LibRaw::unpack function in libraw_cxx.cpp in LibRaw before 0.15.2 allow context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a malformed full-color (1) Foveon or (2) sRAW image file.
https://nvd.nist.gov/vuln/detail/CVE-2013-2126
454,931
LibRaw
19ffddb0fe1a4ffdb459b797ffcf7f490d28b5a6
https://github.com/LibRaw/LibRaw
https://github.com/LibRaw/LibRaw/commit/19ffddb0fe1a4ffdb459b797ffcf7f490d28b5a6
prevent double-free() on broken full-color images error handling
0
int LibRaw::unpack(void) { CHECK_ORDER_HIGH(LIBRAW_PROGRESS_LOAD_RAW); CHECK_ORDER_LOW(LIBRAW_PROGRESS_IDENTIFY); try { if(!libraw_internal_data.internal_data.input) return LIBRAW_INPUT_CLOSED; RUN_CALLBACK(LIBRAW_PROGRESS_LOAD_RAW,0,2); if (O.shot_select >= P1.raw_count) ...
153,152,982,580,620,560,000,000,000,000,000,000,000
libraw_cxx.cpp
1,322,803,326,789,167,600,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2013-2126
Multiple double free vulnerabilities in the LibRaw::unpack function in libraw_cxx.cpp in LibRaw before 0.15.2 allow context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a malformed full-color (1) Foveon or (2) sRAW image file.
https://nvd.nist.gov/vuln/detail/CVE-2013-2126
212,145
vim
605ec91e5a7330d61be313637e495fa02a6dc264
https://github.com/vim/vim
https://github.com/vim/vim/commit/605ec91e5a7330d61be313637e495fa02a6dc264
patch 8.2.3847: illegal memory access when using a lambda with an error Problem: Illegal memory access when using a lambda with an error. Solution: Avoid skipping over the NUL after a string.
1
eval_lambda( char_u **arg, typval_T *rettv, evalarg_T *evalarg, int verbose) // give error messages { int evaluate = evalarg != NULL && (evalarg->eval_flags & EVAL_EVALUATE); typval_T base = *rettv; int ret; rettv->v_type = VAR_UNKNOWN; if (**arg == '{') { // ->{l...
110,377,874,308,452,550,000,000,000,000,000,000,000
eval.c
51,602,621,228,494,730,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2021-4136
vim is vulnerable to Heap-based Buffer Overflow
https://nvd.nist.gov/vuln/detail/CVE-2021-4136
455,203
vim
605ec91e5a7330d61be313637e495fa02a6dc264
https://github.com/vim/vim
https://github.com/vim/vim/commit/605ec91e5a7330d61be313637e495fa02a6dc264
patch 8.2.3847: illegal memory access when using a lambda with an error Problem: Illegal memory access when using a lambda with an error. Solution: Avoid skipping over the NUL after a string.
0
eval_lambda( char_u **arg, typval_T *rettv, evalarg_T *evalarg, int verbose) // give error messages { int evaluate = evalarg != NULL && (evalarg->eval_flags & EVAL_EVALUATE); typval_T base = *rettv; int ret; rettv->v_type = VAR_UNKNOWN; if (**arg == '{') { // ->{l...
222,153,709,491,496,660,000,000,000,000,000,000,000
eval.c
275,325,627,467,799,540,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2021-4136
vim is vulnerable to Heap-based Buffer Overflow
https://nvd.nist.gov/vuln/detail/CVE-2021-4136
212,156
linux-pam
109823cb621c900c07c4b6cdc99070d354d19444
http://git.fedorahosted.org/git/?p=linux-pam
http://git.fedorahosted.org/git/?p=linux-pam.git;a=commitdiff;h=109823cb621c900c07c4b6cdc99070d354d19444
pam_env: abort when encountering an overflowed environment variable expansion * modules/pam_env/pam_env.c (_expand_arg): Abort when encountering an overflowed environment variable expansion. Fixes CVE-2011-3149. Bug-Ubuntu: https://bugs.launchpad.net/ubuntu/+source/pam/+bug/874565
1
static int _expand_arg(pam_handle_t *pamh, char **value) { const char *orig=*value, *tmpptr=NULL; char *ptr; /* * Sure would be nice to use tmpptr but it needs to be * a constant so that the compiler will shut up when I * call pam_getenv and _pam_get_item_byname -- sigh */ /* No une...
309,569,995,451,122,240,000,000,000,000,000,000,000
pam_env.c
176,475,250,228,658,800,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2011-3149
The _expand_arg function in the pam_env module (modules/pam_env/pam_env.c) in Linux-PAM (aka pam) before 1.1.5 does not properly handle when environment variable expansion can overflow, which allows local users to cause a denial of service (CPU consumption).
https://nvd.nist.gov/vuln/detail/CVE-2011-3149
455,380
linux-pam
109823cb621c900c07c4b6cdc99070d354d19444
http://git.fedorahosted.org/git/?p=linux-pam
http://git.fedorahosted.org/git/?p=linux-pam.git;a=commitdiff;h=109823cb621c900c07c4b6cdc99070d354d19444
pam_env: abort when encountering an overflowed environment variable expansion * modules/pam_env/pam_env.c (_expand_arg): Abort when encountering an overflowed environment variable expansion. Fixes CVE-2011-3149. Bug-Ubuntu: https://bugs.launchpad.net/ubuntu/+source/pam/+bug/874565
0
static int _expand_arg(pam_handle_t *pamh, char **value) { const char *orig=*value, *tmpptr=NULL; char *ptr; /* * Sure would be nice to use tmpptr but it needs to be * a constant so that the compiler will shut up when I * call pam_getenv and _pam_get_item_byname -- sigh */ /* No une...
267,204,234,704,780,700,000,000,000,000,000,000,000
pam_env.c
202,978,356,808,412,500,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2011-3149
The _expand_arg function in the pam_env module (modules/pam_env/pam_env.c) in Linux-PAM (aka pam) before 1.1.5 does not properly handle when environment variable expansion can overflow, which allows local users to cause a denial of service (CPU consumption).
https://nvd.nist.gov/vuln/detail/CVE-2011-3149
212,159
AFFLIBv3
435a2ca802358a3debb6d164d2c33049131df81c
https://github.com/sshock/AFFLIBv3
https://github.com/sshock/AFFLIBv3/commit/435a2ca802358a3debb6d164d2c33049131df81c
Sanity check size passed to malloc... Add sanity check before calling malloc in af_get_page() function to avoid undefined behavior (e.g., seg fault) when dealing with a corrupt AFF image with an invalid pagesize. Issue found by Luis Rocha (luiscrocha@gmail.com).
1
int af_get_page(AFFILE *af,int64_t pagenum,unsigned char *data,size_t *bytes) { uint32_t arg=0; size_t page_len=0; if (af_trace){ fprintf(af_trace,"af_get_page(%p,pagenum=%" I64d ",buf=%p,bytes=%u)\n",af,pagenum,data,(int)*bytes); } /* Find out the size of the segment and if it is compressed or n...
5,300,032,522,823,166,400,000,000,000,000,000,000
afflib_pages.cpp
241,903,155,513,436,000,000,000,000,000,000,000,000
[ "CWE-295" ]
CVE-2018-8050
The af_get_page() function in lib/afflib_pages.cpp in AFFLIB (aka AFFLIBv3) through 3.7.16 allows remote attackers to cause a denial of service (segmentation fault) via a corrupt AFF image that triggers an unexpected pagesize value.
https://nvd.nist.gov/vuln/detail/CVE-2018-8050
455,441
AFFLIBv3
435a2ca802358a3debb6d164d2c33049131df81c
https://github.com/sshock/AFFLIBv3
https://github.com/sshock/AFFLIBv3/commit/435a2ca802358a3debb6d164d2c33049131df81c
Sanity check size passed to malloc... Add sanity check before calling malloc in af_get_page() function to avoid undefined behavior (e.g., seg fault) when dealing with a corrupt AFF image with an invalid pagesize. Issue found by Luis Rocha (luiscrocha@gmail.com).
0
int af_get_page(AFFILE *af,int64_t pagenum,unsigned char *data,size_t *bytes) { uint32_t arg=0; size_t page_len=0; if (af_trace){ fprintf(af_trace,"af_get_page(%p,pagenum=%" I64d ",buf=%p,bytes=%u)\n",af,pagenum,data,(int)*bytes); } /* Find out the size of the segment and if it is compressed or n...
147,346,079,837,914,880,000,000,000,000,000,000,000
afflib_pages.cpp
85,121,225,403,256,700,000,000,000,000,000,000,000
[ "CWE-295" ]
CVE-2018-8050
The af_get_page() function in lib/afflib_pages.cpp in AFFLIB (aka AFFLIBv3) through 3.7.16 allows remote attackers to cause a denial of service (segmentation fault) via a corrupt AFF image that triggers an unexpected pagesize value.
https://nvd.nist.gov/vuln/detail/CVE-2018-8050
212,160
linux-stable
f53dc67c5e7babafe239b93a11678b0e05bead51
https://git.kernel.org/cgit/linux/kernel/git/stable/linux-stable
https://git.kernel.org/cgit/linux/kernel/git/stable/linux-stable.git/commit/?id=f53dc67c5e7babafe239b93a11678b0e05bead51
[DCCP]: Use AF-independent rebuild_header routine This fixes a nasty bug: dccp_send_reset() is called by both DCCPv4 and DCCPv6, but uses inet_sk_rebuild_header() in each case. This leads to unpredictable and weird behaviour: under some conditions, DCCPv6 Resets were sent, in other not. The fix is to use the AF-indep...
1
int dccp_send_reset(struct sock *sk, enum dccp_reset_codes code) { struct sk_buff *skb; /* * FIXME: what if rebuild_header fails? * Should we be doing a rebuild_header here? */ int err = inet_sk_rebuild_header(sk); if (err != 0) return err; skb = sock_wmalloc(sk, sk->sk_prot->max_header, 1, GFP_ATOMIC); ...
115,609,947,405,939,290,000,000,000,000,000,000,000
output.c
267,577,205,968,328,400,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2017-2634
It was found that the Linux kernel's Datagram Congestion Control Protocol (DCCP) implementation before 2.6.22.17 used the IPv4-only inet_sk_rebuild_header() function for both IPv4 and IPv6 DCCP connections, which could result in memory corruptions. A remote attacker could use this flaw to crash the system.
https://nvd.nist.gov/vuln/detail/CVE-2017-2634
455,451
linux-stable
f53dc67c5e7babafe239b93a11678b0e05bead51
https://git.kernel.org/cgit/linux/kernel/git/stable/linux-stable
https://git.kernel.org/cgit/linux/kernel/git/stable/linux-stable.git/commit/?id=f53dc67c5e7babafe239b93a11678b0e05bead51
[DCCP]: Use AF-independent rebuild_header routine This fixes a nasty bug: dccp_send_reset() is called by both DCCPv4 and DCCPv6, but uses inet_sk_rebuild_header() in each case. This leads to unpredictable and weird behaviour: under some conditions, DCCPv6 Resets were sent, in other not. The fix is to use the AF-indep...
0
int dccp_send_reset(struct sock *sk, enum dccp_reset_codes code) { struct sk_buff *skb; /* * FIXME: what if rebuild_header fails? * Should we be doing a rebuild_header here? */ int err = inet_csk(sk)->icsk_af_ops->rebuild_header(sk); if (err != 0) return err; skb = sock_wmalloc(sk, sk->sk_prot->max_heade...
31,505,798,934,268,500,000,000,000,000,000,000,000
output.c
237,352,107,144,630,460,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2017-2634
It was found that the Linux kernel's Datagram Congestion Control Protocol (DCCP) implementation before 2.6.22.17 used the IPv4-only inet_sk_rebuild_header() function for both IPv4 and IPv6 DCCP connections, which could result in memory corruptions. A remote attacker could use this flaw to crash the system.
https://nvd.nist.gov/vuln/detail/CVE-2017-2634
212,164
linux
e72436bc3a5206f95bb384e741154166ddb3202e
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e72436bc3a5206f95bb384e741154166ddb3202e
KVM: SVM: avoid infinite loop on NPF from bad address When a nested page fault is taken from an address that does not have a memslot associated to it, kvm_mmu_do_page_fault returns RET_PF_EMULATE (via mmu_set_spte) and kvm_mmu_page_fault then invokes svm_need_emulation_on_page_fault. The default answer there is to re...
1
static bool svm_need_emulation_on_page_fault(struct kvm_vcpu *vcpu) { unsigned long cr4 = kvm_read_cr4(vcpu); bool smep = cr4 & X86_CR4_SMEP; bool smap = cr4 & X86_CR4_SMAP; bool is_user = svm_get_cpl(vcpu) == 3; /* * Detect and workaround Errata 1096 Fam_17h_00_0Fh. * * Errata: * When CPU raise #NPF on g...
103,598,404,372,363,850,000,000,000,000,000,000,000
svm.c
155,100,405,692,651,900,000,000,000,000,000,000,000
[ "CWE-835" ]
CVE-2020-36310
An issue was discovered in the Linux kernel before 5.8. arch/x86/kvm/svm/svm.c allows a set_memory_region_test infinite loop for certain nested page faults, aka CID-e72436bc3a52.
https://nvd.nist.gov/vuln/detail/CVE-2020-36310
455,508
linux
e72436bc3a5206f95bb384e741154166ddb3202e
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e72436bc3a5206f95bb384e741154166ddb3202e
KVM: SVM: avoid infinite loop on NPF from bad address When a nested page fault is taken from an address that does not have a memslot associated to it, kvm_mmu_do_page_fault returns RET_PF_EMULATE (via mmu_set_spte) and kvm_mmu_page_fault then invokes svm_need_emulation_on_page_fault. The default answer there is to re...
0
static bool svm_need_emulation_on_page_fault(struct kvm_vcpu *vcpu) { unsigned long cr4 = kvm_read_cr4(vcpu); bool smep = cr4 & X86_CR4_SMEP; bool smap = cr4 & X86_CR4_SMAP; bool is_user = svm_get_cpl(vcpu) == 3; /* * If RIP is invalid, go ahead with emulation which will cause an * internal error exit. */ ...
56,328,152,259,175,880,000,000,000,000,000,000,000
svm.c
181,284,132,119,150,160,000,000,000,000,000,000,000
[ "CWE-835" ]
CVE-2020-36310
An issue was discovered in the Linux kernel before 5.8. arch/x86/kvm/svm/svm.c allows a set_memory_region_test infinite loop for certain nested page faults, aka CID-e72436bc3a52.
https://nvd.nist.gov/vuln/detail/CVE-2020-36310
212,166
ImageMagick
dd367e0c3c3f37fbf1c20fa107b67a668b22c6e2
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/dd367e0c3c3f37fbf1c20fa107b67a668b22c6e2
https://github.com/ImageMagick/ImageMagick/issues/770
1
static Image *ReadVIPSImage(const ImageInfo *image_info, ExceptionInfo *exception) { char buffer[MagickPathExtent], *metadata; Image *image; MagickBooleanType status; ssize_t n; unsigned int channels, marker; VIPSBandFormat format; VIPSCoding coding; VIPSType...
191,400,800,529,414,100,000,000,000,000,000,000,000
vips.c
167,759,785,077,341,820,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2017-14684
In ImageMagick 7.0.7-4 Q16, a memory leak vulnerability was found in the function ReadVIPSImage in coders/vips.c, which allows attackers to cause a denial of service (memory consumption in ResizeMagickMemory in MagickCore/memory.c) via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2017-14684
455,522
ImageMagick
dd367e0c3c3f37fbf1c20fa107b67a668b22c6e2
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/dd367e0c3c3f37fbf1c20fa107b67a668b22c6e2
https://github.com/ImageMagick/ImageMagick/issues/770
0
static Image *ReadVIPSImage(const ImageInfo *image_info, ExceptionInfo *exception) { char buffer[MagickPathExtent], *metadata; Image *image; MagickBooleanType status; ssize_t n; unsigned int channels, marker; VIPSBandFormat format; VIPSCoding coding; VIPSType...
129,364,756,385,376,360,000,000,000,000,000,000,000
vips.c
242,307,996,066,406,700,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2017-14684
In ImageMagick 7.0.7-4 Q16, a memory leak vulnerability was found in the function ReadVIPSImage in coders/vips.c, which allows attackers to cause a denial of service (memory consumption in ResizeMagickMemory in MagickCore/memory.c) via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2017-14684
212,171
libxml2
c1ba6f54d32b707ca6d91cb3257ce9de82876b6f
https://github.com/GNOME/libxml2
https://gitlab.gnome.org/GNOME/libxml2/-/commit/c1ba6f54d32b707ca6d91cb3257ce9de82876b6f
Revert "Do not URI escape in server side includes" This reverts commit 960f0e275616cadc29671a218d7fb9b69eb35588. This commit introduced - an infinite loop, found by OSS-Fuzz, which could be easily fixed. - an algorithm with quadratic runtime - a security issue, see https://bugzilla.gnome.org/show_bug.cgi?id=769760...
1
htmlAttrDumpOutput(xmlOutputBufferPtr buf, xmlDocPtr doc, xmlAttrPtr cur, const char *encoding ATTRIBUTE_UNUSED) { xmlChar *value; /* * The html output method should not escape a & character * occurring in an attribute value immediately followed by * a { character (see Section B.7.1 ...
310,631,381,541,731,050,000,000,000,000,000,000,000
HTMLtree.c
35,454,064,796,606,774,000,000,000,000,000,000,000
[ "CWE-79" ]
CVE-2016-3709
Possible cross-site scripting vulnerability in libxml after commit 960f0e2.
https://nvd.nist.gov/vuln/detail/CVE-2016-3709
455,593
libxml2
c1ba6f54d32b707ca6d91cb3257ce9de82876b6f
https://github.com/GNOME/libxml2
https://gitlab.gnome.org/GNOME/libxml2/-/commit/c1ba6f54d32b707ca6d91cb3257ce9de82876b6f
Revert "Do not URI escape in server side includes" This reverts commit 960f0e275616cadc29671a218d7fb9b69eb35588. This commit introduced - an infinite loop, found by OSS-Fuzz, which could be easily fixed. - an algorithm with quadratic runtime - a security issue, see https://bugzilla.gnome.org/show_bug.cgi?id=769760...
0
htmlAttrDumpOutput(xmlOutputBufferPtr buf, xmlDocPtr doc, xmlAttrPtr cur, const char *encoding ATTRIBUTE_UNUSED) { xmlChar *value; /* * The html output method should not escape a & character * occurring in an attribute value immediately followed by * a { character (see Section B.7.1 ...
108,554,873,030,519,460,000,000,000,000,000,000,000
HTMLtree.c
282,681,029,827,661,940,000,000,000,000,000,000,000
[ "CWE-79" ]
CVE-2016-3709
Possible cross-site scripting vulnerability in libxml after commit 960f0e2.
https://nvd.nist.gov/vuln/detail/CVE-2016-3709
212,216
gst-plugins-good
d0949baf3dadea6021d54abef6802fed5a06af75
https://github.com/GStreamer/gst-plugins-good
https://github.com/GStreamer/gst-plugins-good/commit/d0949baf3dadea6021d54abef6802fed5a06af75
qtdemux: Fix out of bounds read in tag parsing code We can't simply assume that the length of the tag value as given inside the stream is correct but should also check against the amount of data we have actually available. https://bugzilla.gnome.org/show_bug.cgi?id=775451
1
qtdemux_tag_add_str_full (GstQTDemux * qtdemux, GstTagList * taglist, const char *tag, const char *dummy, GNode * node) { const gchar *env_vars[] = { "GST_QT_TAG_ENCODING", "GST_TAG_ENCODING", NULL }; GNode *data; char *s; int len; guint32 type; int offset; gboolean ret = TRUE; const gchar *charset ...
223,787,621,992,472,100,000,000,000,000,000,000,000
qtdemux.c
145,316,827,963,230,000,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2016-10199
The qtdemux_tag_add_str_full function in gst/isomp4/qtdemux.c in gst-plugins-good in GStreamer before 1.10.3 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted tag value.
https://nvd.nist.gov/vuln/detail/CVE-2016-10199
456,562
gst-plugins-good
d0949baf3dadea6021d54abef6802fed5a06af75
https://github.com/GStreamer/gst-plugins-good
https://github.com/GStreamer/gst-plugins-good/commit/d0949baf3dadea6021d54abef6802fed5a06af75
qtdemux: Fix out of bounds read in tag parsing code We can't simply assume that the length of the tag value as given inside the stream is correct but should also check against the amount of data we have actually available. https://bugzilla.gnome.org/show_bug.cgi?id=775451
0
qtdemux_tag_add_str_full (GstQTDemux * qtdemux, GstTagList * taglist, const char *tag, const char *dummy, GNode * node) { const gchar *env_vars[] = { "GST_QT_TAG_ENCODING", "GST_TAG_ENCODING", NULL }; GNode *data; char *s; int len; guint32 type; int offset; gboolean ret = TRUE; const gchar *charset ...
26,534,524,133,529,547,000,000,000,000,000,000,000
qtdemux.c
332,649,003,709,864,200,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2016-10199
The qtdemux_tag_add_str_full function in gst/isomp4/qtdemux.c in gst-plugins-good in GStreamer before 1.10.3 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted tag value.
https://nvd.nist.gov/vuln/detail/CVE-2016-10199
212,260
ImageMagick6
0b7d3675438cbcde824e751895847a0794406e08
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/0b7d3675438cbcde824e751895847a0794406e08
https://github.com/ImageMagick/ImageMagick/issues/1589
1
MagickExport MagickBooleanType AnnotateImage(Image *image, const DrawInfo *draw_info) { char *p, primitive[MaxTextExtent], *text, **textlist; DrawInfo *annotate, *annotate_info; GeometryInfo geometry_info; MagickBooleanType status; PointInfo offset; RectangleInfo ...
329,684,858,661,340,930,000,000,000,000,000,000,000
annotate.c
239,841,593,791,646,050,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2019-13301
ImageMagick 7.0.8-50 Q16 has memory leaks in AcquireMagickMemory because of an AnnotateImage error.
https://nvd.nist.gov/vuln/detail/CVE-2019-13301
456,880
ImageMagick6
0b7d3675438cbcde824e751895847a0794406e08
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/0b7d3675438cbcde824e751895847a0794406e08
https://github.com/ImageMagick/ImageMagick/issues/1589
0
MagickExport MagickBooleanType AnnotateImage(Image *image, const DrawInfo *draw_info) { char *p, primitive[MaxTextExtent], *text, **textlist; DrawInfo *annotate, *annotate_info; GeometryInfo geometry_info; MagickBooleanType status; PointInfo offset; RectangleInfo ...
286,341,814,795,708,450,000,000,000,000,000,000,000
annotate.c
39,515,382,829,523,740,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2019-13301
ImageMagick 7.0.8-50 Q16 has memory leaks in AcquireMagickMemory because of an AnnotateImage error.
https://nvd.nist.gov/vuln/detail/CVE-2019-13301
212,278
openssh-portable
7d6a9fb660c808882d064e152d6070ffc3844c3f
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/7d6a9fb660c808882d064e152d6070ffc3844c3f
- djm@cvs.openbsd.org 2014/04/01 03:34:10 [sshconnect.c] When using VerifyHostKeyDNS with a DNSSEC resolver, down-convert any certificate keys to plain keys and attempt SSHFP resolution. Prevents a server from skipping SSHFP lookup and forcing a new-hostkey dialog by offering only certificate ...
1
verify_host_key(char *host, struct sockaddr *hostaddr, Key *host_key) { int flags = 0; char *fp; fp = key_fingerprint(host_key, SSH_FP_MD5, SSH_FP_HEX); debug("Server host key: %s %s", key_type(host_key), fp); free(fp); /* XXX certs are not yet supported for DNS */ if (!key_is_cert(host_key) && options.verify_...
321,978,474,217,064,820,000,000,000,000,000,000,000
sshconnect.c
276,493,572,968,331,740,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2014-2653
The verify_host_key function in sshconnect.c in the client in OpenSSH 6.6 and earlier allows remote servers to trigger the skipping of SSHFP DNS RR checking by presenting an unacceptable HostCertificate.
https://nvd.nist.gov/vuln/detail/CVE-2014-2653
456,989
openssh-portable
7d6a9fb660c808882d064e152d6070ffc3844c3f
https://github.com/openssh/openssh-portable
https://github.com/openssh/openssh-portable/commit/7d6a9fb660c808882d064e152d6070ffc3844c3f
- djm@cvs.openbsd.org 2014/04/01 03:34:10 [sshconnect.c] When using VerifyHostKeyDNS with a DNSSEC resolver, down-convert any certificate keys to plain keys and attempt SSHFP resolution. Prevents a server from skipping SSHFP lookup and forcing a new-hostkey dialog by offering only certificate ...
0
verify_host_key(char *host, struct sockaddr *hostaddr, Key *host_key) { int flags = 0; char *fp; Key *plain = NULL; fp = key_fingerprint(host_key, SSH_FP_MD5, SSH_FP_HEX); debug("Server host key: %s %s", key_type(host_key), fp); free(fp); if (options.verify_host_key_dns) { /* * XXX certs are not yet suppo...
60,558,527,399,482,550,000,000,000,000,000,000,000
sshconnect.c
207,734,701,851,013,670,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2014-2653
The verify_host_key function in sshconnect.c in the client in OpenSSH 6.6 and earlier allows remote servers to trigger the skipping of SSHFP DNS RR checking by presenting an unacceptable HostCertificate.
https://nvd.nist.gov/vuln/detail/CVE-2014-2653
212,286
ImageMagick
70aa86f5d5d8aa605a918ed51f7574f433a18482
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/70aa86f5d5d8aa605a918ed51f7574f433a18482
possible divide by zero + clear buffers
1
static MagickBooleanType sRGBTransformImage(Image *image, const ColorspaceType colorspace,ExceptionInfo *exception) { #define sRGBTransformImageTag "RGBTransform/Image" CacheView *image_view; MagickBooleanType status; MagickOffsetType progress; PrimaryInfo primary_info; ssize_t i; ...
202,726,451,456,944,140,000,000,000,000,000,000,000
colorspace.c
176,269,751,341,039,700,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2021-20311
A flaw was found in ImageMagick in versions before 7.0.11, where a division by zero in sRGBTransformImage() in the MagickCore/colorspace.c may trigger undefined behavior via a crafted image file that is submitted by an attacker processed by an application using ImageMagick. The highest threat from this vulnerability is...
https://nvd.nist.gov/vuln/detail/CVE-2021-20311
457,065
ImageMagick
70aa86f5d5d8aa605a918ed51f7574f433a18482
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/70aa86f5d5d8aa605a918ed51f7574f433a18482
possible divide by zero + clear buffers
0
static MagickBooleanType sRGBTransformImage(Image *image, const ColorspaceType colorspace,ExceptionInfo *exception) { #define sRGBTransformImageTag "RGBTransform/Image" CacheView *image_view; MagickBooleanType status; MagickOffsetType progress; PrimaryInfo primary_info; ssize_t i; ...
265,777,120,998,859,200,000,000,000,000,000,000,000
colorspace.c
75,893,868,458,002,670,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2021-20311
A flaw was found in ImageMagick in versions before 7.0.11, where a division by zero in sRGBTransformImage() in the MagickCore/colorspace.c may trigger undefined behavior via a crafted image file that is submitted by an attacker processed by an application using ImageMagick. The highest threat from this vulnerability is...
https://nvd.nist.gov/vuln/detail/CVE-2021-20311
212,289
shadow
954e3d2e7113e9ac06632aee3c69b8d818cc8952
https://github.com/shadow-maint/shadow
https://github.com/shadow-maint/shadow/commit/954e3d2e7113e9ac06632aee3c69b8d818cc8952
Fix buffer overflow if NULL line is present in db. If ptr->line == NULL for an entry, the first cycle will exit, but the second one will happily write past entries buffer. We actually do not want to exit the first cycle prematurely on ptr->line == NULL. Signed-off-by: Tomas Mraz <tmraz@fedoraproject.org>
1
commonio_sort (struct commonio_db *db, int (*cmp) (const void *, const void *)) { struct commonio_entry **entries, *ptr; size_t n = 0, i; #if KEEP_NIS_AT_END struct commonio_entry *nis = NULL; #endif for (ptr = db->head; (NULL != ptr) #if KEEP_NIS_AT_END && (NULL != ptr->line) && ( ('+' != p...
108,826,149,455,928,430,000,000,000,000,000,000,000
commonio.c
306,241,212,136,689,140,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2017-12424
In shadow before 4.5, the newusers tool could be made to manipulate internal data structures in ways unintended by the authors. Malformed input may lead to crashes (with a buffer overflow or other memory corruption) or other unspecified behaviors. This crosses a privilege boundary in, for example, certain web-hosting e...
https://nvd.nist.gov/vuln/detail/CVE-2017-12424
457,115
shadow
954e3d2e7113e9ac06632aee3c69b8d818cc8952
https://github.com/shadow-maint/shadow
https://github.com/shadow-maint/shadow/commit/954e3d2e7113e9ac06632aee3c69b8d818cc8952
Fix buffer overflow if NULL line is present in db. If ptr->line == NULL for an entry, the first cycle will exit, but the second one will happily write past entries buffer. We actually do not want to exit the first cycle prematurely on ptr->line == NULL. Signed-off-by: Tomas Mraz <tmraz@fedoraproject.org>
0
commonio_sort (struct commonio_db *db, int (*cmp) (const void *, const void *)) { struct commonio_entry **entries, *ptr; size_t n = 0, i; #if KEEP_NIS_AT_END struct commonio_entry *nis = NULL; #endif for (ptr = db->head; (NULL != ptr) #if KEEP_NIS_AT_END && ((NULL == ptr->line) || (('+' !=...
134,706,450,375,407,640,000,000,000,000,000,000,000
commonio.c
194,289,642,425,176,960,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2017-12424
In shadow before 4.5, the newusers tool could be made to manipulate internal data structures in ways unintended by the authors. Malformed input may lead to crashes (with a buffer overflow or other memory corruption) or other unspecified behaviors. This crosses a privilege boundary in, for example, certain web-hosting e...
https://nvd.nist.gov/vuln/detail/CVE-2017-12424
212,311
samba
d8b9bb274b7e7a390cf3bda9cd732cb2227bdbde
https://github.com/samba-team/samba
https://github.com/samba-team/samba/commit/d8b9bb274b7e7a390cf3bda9cd732cb2227bdbde
CVE-2020-10730: lib ldb: Check if ldb_lock_backend_callback called twice Prevent use after free issues if ldb_lock_backend_callback is called twice, usually due to ldb_module_done being called twice. This can happen if a module ignores the return value from function a function that calls ldb_module_done as part of it'...
1
static int ldb_lock_backend_callback(struct ldb_request *req, struct ldb_reply *ares) { struct ldb_db_lock_context *lock_context; int ret; lock_context = talloc_get_type(req->context, struct ldb_db_lock_context); if (!ares) { return ldb_module_done(lock_context->req, NULL, NULL, LDB_ERR...
152,414,462,578,776,700,000,000,000,000,000,000,000
ldb.c
138,141,463,128,411,420,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2020-10730
A NULL pointer dereference, or possible use-after-free flaw was found in Samba AD LDAP server in versions before 4.10.17, before 4.11.11 and before 4.12.4. Although some versions of Samba shipped with Red Hat Enterprise Linux do not support Samba in AD mode, the affected code is shipped with the libldb package. This fl...
https://nvd.nist.gov/vuln/detail/CVE-2020-10730
457,437
samba
d8b9bb274b7e7a390cf3bda9cd732cb2227bdbde
https://github.com/samba-team/samba
https://github.com/samba-team/samba/commit/d8b9bb274b7e7a390cf3bda9cd732cb2227bdbde
CVE-2020-10730: lib ldb: Check if ldb_lock_backend_callback called twice Prevent use after free issues if ldb_lock_backend_callback is called twice, usually due to ldb_module_done being called twice. This can happen if a module ignores the return value from function a function that calls ldb_module_done as part of it'...
0
static int ldb_lock_backend_callback(struct ldb_request *req, struct ldb_reply *ares) { struct ldb_db_lock_context *lock_context; int ret; if (req->context == NULL) { /* * The usual way to get here is to ignore the return codes * and continuing processing after an error. */ abort(); } lock_c...
220,253,259,650,093,100,000,000,000,000,000,000,000
ldb.c
244,989,131,871,231,300,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2020-10730
A NULL pointer dereference, or possible use-after-free flaw was found in Samba AD LDAP server in versions before 4.10.17, before 4.11.11 and before 4.12.4. Although some versions of Samba shipped with Red Hat Enterprise Linux do not support Samba in AD mode, the affected code is shipped with the libldb package. This fl...
https://nvd.nist.gov/vuln/detail/CVE-2020-10730
212,312
net
f070ef2ac66716357066b683fb0baf55f8191a2e
https://git.kernel.org/cgit/linux/kernel/git/davem/net
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=f070ef2ac66716357066b683fb0baf55f8191a2e
tcp: tcp_fragment() should apply sane memory limits Jonathan Looney reported that a malicious peer can force a sender to fragment its retransmit queue into tiny skbs, inflating memory usage and/or overflow 32bit counters. TCP allows an application to queue up to sk_sndbuf bytes, so we need to give some allowance for ...
1
int tcp_fragment(struct sock *sk, enum tcp_queue tcp_queue, struct sk_buff *skb, u32 len, unsigned int mss_now, gfp_t gfp) { struct tcp_sock *tp = tcp_sk(sk); struct sk_buff *buff; int nsize, old_factor; int nlen; u8 flags; if (WARN_ON(len > skb->len)) return -EINVAL; nsize = skb_headlen(skb) - len; i...
191,729,206,229,553,440,000,000,000,000,000,000,000
tcp_output.c
329,323,858,219,303,270,000,000,000,000,000,000,000
[ "CWE-400" ]
CVE-2019-11478
Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4...
https://nvd.nist.gov/vuln/detail/CVE-2019-11478
457,499
net
f070ef2ac66716357066b683fb0baf55f8191a2e
https://git.kernel.org/cgit/linux/kernel/git/davem/net
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=f070ef2ac66716357066b683fb0baf55f8191a2e
tcp: tcp_fragment() should apply sane memory limits Jonathan Looney reported that a malicious peer can force a sender to fragment its retransmit queue into tiny skbs, inflating memory usage and/or overflow 32bit counters. TCP allows an application to queue up to sk_sndbuf bytes, so we need to give some allowance for ...
0
int tcp_fragment(struct sock *sk, enum tcp_queue tcp_queue, struct sk_buff *skb, u32 len, unsigned int mss_now, gfp_t gfp) { struct tcp_sock *tp = tcp_sk(sk); struct sk_buff *buff; int nsize, old_factor; int nlen; u8 flags; if (WARN_ON(len > skb->len)) return -EINVAL; nsize = skb_headlen(skb) - len; i...
282,554,984,969,296,360,000,000,000,000,000,000,000
tcp_output.c
330,010,064,367,608,360,000,000,000,000,000,000,000
[ "CWE-400" ]
CVE-2019-11478
Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4...
https://nvd.nist.gov/vuln/detail/CVE-2019-11478
212,313
zziplib
0e1dadb05c1473b9df2d7b8f298dab801778ef99
https://github.com/gdraheim/zziplib
https://github.com/gdraheim/zziplib/commit/0e1dadb05c1473b9df2d7b8f298dab801778ef99
One more free() to avoid memory leak.
1
__zzip_parse_root_directory(int fd, struct _disk_trailer *trailer, struct zzip_dir_hdr **hdr_return, zzip_plugin_io_t io, zzip_off_t filesize) { auto struct zzip_disk_entry dirent; struct zzip_dir_hdr...
172,682,822,621,609,740,000,000,000,000,000,000,000
zip.c
173,563,122,281,288,800,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2018-16548
An issue was discovered in ZZIPlib through 0.13.69. There is a memory leak triggered in the function __zzip_parse_root_directory in zip.c, which will lead to a denial of service attack.
https://nvd.nist.gov/vuln/detail/CVE-2018-16548
457,500
zziplib
0e1dadb05c1473b9df2d7b8f298dab801778ef99
https://github.com/gdraheim/zziplib
https://github.com/gdraheim/zziplib/commit/0e1dadb05c1473b9df2d7b8f298dab801778ef99
One more free() to avoid memory leak.
0
__zzip_parse_root_directory(int fd, struct _disk_trailer *trailer, struct zzip_dir_hdr **hdr_return, zzip_plugin_io_t io, zzip_off_t filesize) { auto struct zzip_disk_entry dirent; struct zzip_dir_hdr...
302,414,034,566,486,450,000,000,000,000,000,000,000
zip.c
235,533,021,138,373,100,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2018-16548
An issue was discovered in ZZIPlib through 0.13.69. There is a memory leak triggered in the function __zzip_parse_root_directory in zip.c, which will lead to a denial of service attack.
https://nvd.nist.gov/vuln/detail/CVE-2018-16548
212,314
exim
d4bc023436e4cce7c23c5f8bb5199e178b4cc743
https://github.com/Exim/exim
https://github.com/Exim/exim/commit/d4bc023436e4cce7c23c5f8bb5199e178b4cc743
Fix host_name_lookup (Close 2747) Thanks to Nico R for providing a reproducing configuration. host_lookup = * message_size_limit = ${if def:sender_host_name {32M}{32M}} acl_smtp_connect = acl_smtp_connect acl_smtp_rcpt = acl_smtp_rcpt begin ac...
1
host_name_lookup(void) { int old_pool, rc; int sep = 0; uschar *save_hostname; uschar **aliases; uschar *ordername; const uschar *list = host_lookup_order; dns_answer * dnsa = store_get_dns_answer(); dns_scan dnss; sender_host_dnssec = host_lookup_deferred = host_lookup_failed = FALSE; HDEBUG(D_host_lookup) debug_p...
248,747,120,357,021,540,000,000,000,000,000,000,000
host.c
291,047,214,396,388,030,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2022-37452
Exim before 4.95 has a heap-based buffer overflow for the alias list in host_name_lookup in host.c when sender_host_name is set.
https://nvd.nist.gov/vuln/detail/CVE-2022-37452
457,518
exim
d4bc023436e4cce7c23c5f8bb5199e178b4cc743
https://github.com/Exim/exim
https://github.com/Exim/exim/commit/d4bc023436e4cce7c23c5f8bb5199e178b4cc743
Fix host_name_lookup (Close 2747) Thanks to Nico R for providing a reproducing configuration. host_lookup = * message_size_limit = ${if def:sender_host_name {32M}{32M}} acl_smtp_connect = acl_smtp_connect acl_smtp_rcpt = acl_smtp_rcpt begin ac...
0
host_name_lookup(void) { int old_pool, rc; int sep = 0; uschar *save_hostname; uschar **aliases; uschar *ordername; const uschar *list = host_lookup_order; dns_answer * dnsa = store_get_dns_answer(); dns_scan dnss; sender_host_dnssec = host_lookup_deferred = host_lookup_failed = FALSE; HDEBUG(D_host_lookup) debug_p...
276,426,271,037,243,550,000,000,000,000,000,000,000
host.c
149,394,606,566,349,210,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2022-37452
Exim before 4.95 has a heap-based buffer overflow for the alias list in host_name_lookup in host.c when sender_host_name is set.
https://nvd.nist.gov/vuln/detail/CVE-2022-37452
212,316
w3m
ff8510ab954ac5db478964351f6a78891c34f1d8
https://github.com/tats/w3m
https://github.com/tats/w3m/commit/ff8510ab954ac5db478964351f6a78891c34f1d8
Prevent infinite recursion in HTMLlineproc0 Bug-Debian: https://github.com/tats/w3m/issues/36
1
HTMLtagproc1(struct parsed_tag *tag, struct html_feed_environ *h_env) { char *p, *q, *r; int i, w, x, y, z, count, width; struct readbuffer *obuf = h_env->obuf; struct environment *envs = h_env->envs; Str tmp; int hseq; int cmd; #ifdef ID_EXT char *id = NULL; #endif /* ID_EXT */ ...
9,201,634,070,149,776,000,000,000,000,000,000,000
file.c
3,449,364,572,456,611,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-9625
An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. Infinite recursion vulnerability in w3m allows remote attackers to cause a denial of service via a crafted HTML page.
https://nvd.nist.gov/vuln/detail/CVE-2016-9625
457,523
w3m
ff8510ab954ac5db478964351f6a78891c34f1d8
https://github.com/tats/w3m
https://github.com/tats/w3m/commit/ff8510ab954ac5db478964351f6a78891c34f1d8
Prevent infinite recursion in HTMLlineproc0 Bug-Debian: https://github.com/tats/w3m/issues/36
0
HTMLtagproc1(struct parsed_tag *tag, struct html_feed_environ *h_env) { char *p, *q, *r; int i, w, x, y, z, count, width; struct readbuffer *obuf = h_env->obuf; struct environment *envs = h_env->envs; Str tmp; int hseq; int cmd; #ifdef ID_EXT char *id = NULL; #endif /* ID_EXT */ ...
192,864,436,424,087,720,000,000,000,000,000,000,000
file.c
304,690,265,544,439,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-9625
An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. Infinite recursion vulnerability in w3m allows remote attackers to cause a denial of service via a crafted HTML page.
https://nvd.nist.gov/vuln/detail/CVE-2016-9625
212,349
postgres
0150ab567bcf5e5913e2b62a1678f84cc272441f
https://github.com/postgres/postgres
https://github.com/postgres/postgres/commit/0150ab567bcf5e5913e2b62a1678f84cc272441f
to_char(): prevent accesses beyond the allocated buffer Previously very long field masks for floats could access memory beyond the existing buffer allocated to hold the result. Reported by Andres Freund and Peter Geoghegan. Backpatch to all supported versions. Security: CVE-2015-0241
1
NUM_numpart_to_char(NUMProc *Np, int id) { int end; if (IS_ROMAN(Np->Num)) return; /* Note: in this elog() output not set '\0' in 'inout' */ #ifdef DEBUG_TO_FROM_CHAR /* * Np->num_curr is number of current item in format-picture, it is not * current position in inout! */ elog(DEBUG_elog_output, "S...
80,338,776,961,991,260,000,000,000,000,000,000,000
formatting.c
73,974,733,094,975,640,000,000,000,000,000,000,000
[ "CWE-120" ]
CVE-2015-0241
The to_char function in PostgreSQL before 9.0.19, 9.1.x before 9.1.15, 9.2.x before 9.2.10, 9.3.x before 9.3.6, and 9.4.x before 9.4.1 allows remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a (1) large number of digits when processing a numeric formatting template,...
https://nvd.nist.gov/vuln/detail/CVE-2015-0241
457,956
postgres
0150ab567bcf5e5913e2b62a1678f84cc272441f
https://github.com/postgres/postgres
https://github.com/postgres/postgres/commit/0150ab567bcf5e5913e2b62a1678f84cc272441f
to_char(): prevent accesses beyond the allocated buffer Previously very long field masks for floats could access memory beyond the existing buffer allocated to hold the result. Reported by Andres Freund and Peter Geoghegan. Backpatch to all supported versions. Security: CVE-2015-0241
0
NUM_numpart_to_char(NUMProc *Np, int id) { int end; if (IS_ROMAN(Np->Num)) return; /* Note: in this elog() output not set '\0' in 'inout' */ #ifdef DEBUG_TO_FROM_CHAR /* * Np->num_curr is number of current item in format-picture, it is not * current position in inout! */ elog(DEBUG_elog_output, "S...
58,075,036,090,118,890,000,000,000,000,000,000,000
formatting.c
228,954,025,119,837,840,000,000,000,000,000,000,000
[ "CWE-120" ]
CVE-2015-0241
The to_char function in PostgreSQL before 9.0.19, 9.1.x before 9.1.15, 9.2.x before 9.2.10, 9.3.x before 9.3.6, and 9.4.x before 9.4.1 allows remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a (1) large number of digits when processing a numeric formatting template,...
https://nvd.nist.gov/vuln/detail/CVE-2015-0241
212,351
linux
a2cdd07488e666aa93a49a3fc9c9b1299e27ef3c
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a2cdd07488e666aa93a49a3fc9c9b1299e27ef3c
rtl8xxxu: prevent leaking urb In rtl8xxxu_submit_int_urb if usb_submit_urb fails the allocated urb should be released. Signed-off-by: Navid Emamdoost <navid.emamdoost@gmail.com> Reviewed-by: Chris Chiu <chiu@endlessm.com> Signed-off-by: Kalle Valo <kvalo@codeaurora.org>
1
static int rtl8xxxu_submit_int_urb(struct ieee80211_hw *hw) { struct rtl8xxxu_priv *priv = hw->priv; struct urb *urb; u32 val32; int ret; urb = usb_alloc_urb(0, GFP_KERNEL); if (!urb) return -ENOMEM; usb_fill_int_urb(urb, priv->udev, priv->pipe_interrupt, priv->int_buf, USB_INTR_CONTENT_LENGTH, rtl8x...
199,889,113,028,852,600,000,000,000,000,000,000,000
rtl8xxxu_core.c
263,449,611,325,453,430,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2019-19068
A memory leak in the rtl8xxxu_submit_int_urb() function in drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-a2cdd07488e6.
https://nvd.nist.gov/vuln/detail/CVE-2019-19068
458,121
linux
a2cdd07488e666aa93a49a3fc9c9b1299e27ef3c
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a2cdd07488e666aa93a49a3fc9c9b1299e27ef3c
rtl8xxxu: prevent leaking urb In rtl8xxxu_submit_int_urb if usb_submit_urb fails the allocated urb should be released. Signed-off-by: Navid Emamdoost <navid.emamdoost@gmail.com> Reviewed-by: Chris Chiu <chiu@endlessm.com> Signed-off-by: Kalle Valo <kvalo@codeaurora.org>
0
static int rtl8xxxu_submit_int_urb(struct ieee80211_hw *hw) { struct rtl8xxxu_priv *priv = hw->priv; struct urb *urb; u32 val32; int ret; urb = usb_alloc_urb(0, GFP_KERNEL); if (!urb) return -ENOMEM; usb_fill_int_urb(urb, priv->udev, priv->pipe_interrupt, priv->int_buf, USB_INTR_CONTENT_LENGTH, rtl8x...
145,264,167,783,368,580,000,000,000,000,000,000,000
rtl8xxxu_core.c
25,532,918,722,126,423,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2019-19068
A memory leak in the rtl8xxxu_submit_int_urb() function in drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-a2cdd07488e6.
https://nvd.nist.gov/vuln/detail/CVE-2019-19068
212,353
ImageMagick6
ff840181f631b1b7f29160cae24d792fcd176bae
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/ff840181f631b1b7f29160cae24d792fcd176bae
https://github.com/ImageMagick/ImageMagick/issues/1520
1
static Image *ReadPCLImage(const ImageInfo *image_info,ExceptionInfo *exception) { #define CropBox "CropBox" #define DeviceCMYK "DeviceCMYK" #define MediaBox "MediaBox" #define RenderPCLText " Rendering PCL... " char command[MaxTextExtent], *density, filename[MaxTextExtent], geometry[MaxTextExt...
318,084,760,486,878,160,000,000,000,000,000,000,000
pcl.c
295,802,686,264,046,250,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2019-12976
ImageMagick 7.0.8-34 has a memory leak in the ReadPCLImage function in coders/pcl.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-12976
458,139
ImageMagick6
ff840181f631b1b7f29160cae24d792fcd176bae
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/ff840181f631b1b7f29160cae24d792fcd176bae
https://github.com/ImageMagick/ImageMagick/issues/1520
0
static Image *ReadPCLImage(const ImageInfo *image_info,ExceptionInfo *exception) { #define CropBox "CropBox" #define DeviceCMYK "DeviceCMYK" #define MediaBox "MediaBox" #define RenderPCLText " Rendering PCL... " char command[MaxTextExtent], *density, filename[MaxTextExtent], geometry[MaxTextExt...
294,049,388,906,427,870,000,000,000,000,000,000,000
pcl.c
292,174,360,468,515,330,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2019-12976
ImageMagick 7.0.8-34 has a memory leak in the ReadPCLImage function in coders/pcl.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-12976
212,372
nasm
6ac6ac57e3d01ea8ed4ea47706eb724b59176461
https://github.com/netwide-assembler/nasm
https://github.com/netwide-assembler/nasm/commit/6ac6ac57e3d01ea8ed4ea47706eb724b59176461
parser: when flattening an eop, must preserve any data buffer An eop may have a data buffer associated with it as part of the same memory allocation. Therefore, we need to move "subexpr" up instead of merging it into "eop". This *partially* resolves BR 3392707, but that test case still triggers a violation when using...
1
static int parse_eops(extop **result, bool critical, int elem) { extop *eop = NULL, *prev = NULL; extop **tail = result; int sign; int i = tokval.t_type; int oper_num = 0; bool do_subexpr = false; *tail = NULL; /* End of string is obvious; ) ends a sub-expression list e.g. DUP */ f...
113,797,373,217,591,010,000,000,000,000,000,000,000
parser.c
65,937,969,798,375,270,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2020-24241
In Netwide Assembler (NASM) 2.15rc10, there is heap use-after-free in saa_wbytes in nasmlib/saa.c.
https://nvd.nist.gov/vuln/detail/CVE-2020-24241
458,302
nasm
6ac6ac57e3d01ea8ed4ea47706eb724b59176461
https://github.com/netwide-assembler/nasm
https://github.com/netwide-assembler/nasm/commit/6ac6ac57e3d01ea8ed4ea47706eb724b59176461
parser: when flattening an eop, must preserve any data buffer An eop may have a data buffer associated with it as part of the same memory allocation. Therefore, we need to move "subexpr" up instead of merging it into "eop". This *partially* resolves BR 3392707, but that test case still triggers a violation when using...
0
static int parse_eops(extop **result, bool critical, int elem) { extop *eop = NULL, *prev = NULL; extop **tail = result; int sign; int i = tokval.t_type; int oper_num = 0; bool do_subexpr = false; *tail = NULL; /* End of string is obvious; ) ends a sub-expression list e.g. DUP */ f...
105,001,447,397,635,290,000,000,000,000,000,000,000
parser.c
77,156,661,867,547,700,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2020-24241
In Netwide Assembler (NASM) 2.15rc10, there is heap use-after-free in saa_wbytes in nasmlib/saa.c.
https://nvd.nist.gov/vuln/detail/CVE-2020-24241
212,394
ImageMagick
078e9692a257e7a8aa36ccc750927f9617923061
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/078e9692a257e7a8aa36ccc750927f9617923061
https://github.com/ImageMagick/ImageMagick/issues/518
1
static Image *ReadRLEImage(const ImageInfo *image_info,ExceptionInfo *exception) { #define SkipLinesOp 0x01 #define SetColorOp 0x02 #define SkipPixelsOp 0x03 #define ByteDataOp 0x05 #define RunDataOp 0x06 #define EOFOp 0x07 #define ThrowRLEException(exception,message) \ { \ if (colormap != (unsigned char *) NUL...
35,074,465,114,885,213,000,000,000,000,000,000,000
rle.c
139,257,309,385,389,830,000,000,000,000,000,000,000
[ "CWE-834" ]
CVE-2017-11360
The ReadRLEImage function in coders\rle.c in ImageMagick 7.0.6-1 has a large loop vulnerability via a crafted rle file that triggers a huge number_pixels value.
https://nvd.nist.gov/vuln/detail/CVE-2017-11360
458,709
ImageMagick
078e9692a257e7a8aa36ccc750927f9617923061
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/078e9692a257e7a8aa36ccc750927f9617923061
https://github.com/ImageMagick/ImageMagick/issues/518
0
static Image *ReadRLEImage(const ImageInfo *image_info,ExceptionInfo *exception) { #define SkipLinesOp 0x01 #define SetColorOp 0x02 #define SkipPixelsOp 0x03 #define ByteDataOp 0x05 #define RunDataOp 0x06 #define EOFOp 0x07 #define ThrowRLEException(exception,message) \ { \ if (colormap != (unsigned char *) NUL...
190,263,973,195,192,000,000,000,000,000,000,000,000
rle.c
21,151,445,878,180,115,000,000,000,000,000,000,000
[ "CWE-834" ]
CVE-2017-11360
The ReadRLEImage function in coders\rle.c in ImageMagick 7.0.6-1 has a large loop vulnerability via a crafted rle file that triggers a huge number_pixels value.
https://nvd.nist.gov/vuln/detail/CVE-2017-11360
212,397
wesnoth
b2738ffb2fdd2550ececb74f76f75583c43c8b59
https://github.com/wesnoth/wesnoth
https://github.com/wesnoth/wesnoth/commit/b2738ffb2fdd2550ececb74f76f75583c43c8b59
Use looks_like_pbl() to disallow .pbl file inclusion (bug #23504) This function is implemented using case-insensitive pattern matching, unlike filesystem::ends_with(). I missed this when writing my original fix, so the vulnerability still applied to .pbl files on a case-insensitive filesystem (e.g. NTFS and FAT* on Wi...
1
static bool is_legal_file(const std::string &filename) { DBG_FS << "Looking for '" << filename << "'.\n"; if (filename.empty()) { LOG_FS << " invalid filename\n"; return false; } if (filename.find("..") != std::string::npos) { ERR_FS << "Illegal path '" << filename << "' (\"..\" not allowed).\n"; return ...
287,040,035,058,025,530,000,000,000,000,000,000,000
filesystem_boost.cpp
24,680,439,132,295,310,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2015-5070
The (1) filesystem::get_wml_location function in filesystem.cpp and (2) is_legal_file function in filesystem_boost.cpp in Battle for Wesnoth before 1.12.4 and 1.13.x before 1.13.1, when a case-insensitive filesystem is used, allow remote attackers to obtain sensitive information via vectors related to inclusion of .pbl...
https://nvd.nist.gov/vuln/detail/CVE-2015-5070
458,807
wesnoth
b2738ffb2fdd2550ececb74f76f75583c43c8b59
https://github.com/wesnoth/wesnoth
https://github.com/wesnoth/wesnoth/commit/b2738ffb2fdd2550ececb74f76f75583c43c8b59
Use looks_like_pbl() to disallow .pbl file inclusion (bug #23504) This function is implemented using case-insensitive pattern matching, unlike filesystem::ends_with(). I missed this when writing my original fix, so the vulnerability still applied to .pbl files on a case-insensitive filesystem (e.g. NTFS and FAT* on Wi...
0
static bool is_legal_file(const std::string &filename) { DBG_FS << "Looking for '" << filename << "'.\n"; if (filename.empty()) { LOG_FS << " invalid filename\n"; return false; } if (filename.find("..") != std::string::npos) { ERR_FS << "Illegal path '" << filename << "' (\"..\" not allowed).\n"; return ...
972,436,578,987,809,500,000,000,000,000,000,000
filesystem_boost.cpp
243,215,982,753,431,320,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2015-5070
The (1) filesystem::get_wml_location function in filesystem.cpp and (2) is_legal_file function in filesystem_boost.cpp in Battle for Wesnoth before 1.12.4 and 1.13.x before 1.13.1, when a case-insensitive filesystem is used, allow remote attackers to obtain sensitive information via vectors related to inclusion of .pbl...
https://nvd.nist.gov/vuln/detail/CVE-2015-5070
212,398
wesnoth
b2738ffb2fdd2550ececb74f76f75583c43c8b59
https://github.com/wesnoth/wesnoth
https://github.com/wesnoth/wesnoth/commit/b2738ffb2fdd2550ececb74f76f75583c43c8b59
Use looks_like_pbl() to disallow .pbl file inclusion (bug #23504) This function is implemented using case-insensitive pattern matching, unlike filesystem::ends_with(). I missed this when writing my original fix, so the vulnerability still applied to .pbl files on a case-insensitive filesystem (e.g. NTFS and FAT* on Wi...
1
std::string get_wml_location(const std::string &filename, const std::string &current_dir) { DBG_FS << "Looking for '" << filename << "'." << std::endl; assert(game_config::path.empty() == false); std::string result; if (filename.empty()) { LOG_FS << " invalid filename" << std::endl; return result; } if (...
169,339,149,622,190,310,000,000,000,000,000,000,000
filesystem.cpp
207,063,400,838,864,260,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2015-5070
The (1) filesystem::get_wml_location function in filesystem.cpp and (2) is_legal_file function in filesystem_boost.cpp in Battle for Wesnoth before 1.12.4 and 1.13.x before 1.13.1, when a case-insensitive filesystem is used, allow remote attackers to obtain sensitive information via vectors related to inclusion of .pbl...
https://nvd.nist.gov/vuln/detail/CVE-2015-5070
458,808
wesnoth
b2738ffb2fdd2550ececb74f76f75583c43c8b59
https://github.com/wesnoth/wesnoth
https://github.com/wesnoth/wesnoth/commit/b2738ffb2fdd2550ececb74f76f75583c43c8b59
Use looks_like_pbl() to disallow .pbl file inclusion (bug #23504) This function is implemented using case-insensitive pattern matching, unlike filesystem::ends_with(). I missed this when writing my original fix, so the vulnerability still applied to .pbl files on a case-insensitive filesystem (e.g. NTFS and FAT* on Wi...
0
std::string get_wml_location(const std::string &filename, const std::string &current_dir) { DBG_FS << "Looking for '" << filename << "'." << std::endl; assert(game_config::path.empty() == false); std::string result; if (filename.empty()) { LOG_FS << " invalid filename" << std::endl; return result; } if (...
17,275,522,571,906,600,000,000,000,000,000,000,000
filesystem.cpp
21,259,784,828,253,361,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2015-5070
The (1) filesystem::get_wml_location function in filesystem.cpp and (2) is_legal_file function in filesystem_boost.cpp in Battle for Wesnoth before 1.12.4 and 1.13.x before 1.13.1, when a case-insensitive filesystem is used, allow remote attackers to obtain sensitive information via vectors related to inclusion of .pbl...
https://nvd.nist.gov/vuln/detail/CVE-2015-5070
212,399
ruby
36e9ed7fef6eb2d14becf6c52452e4ab16e4bf01
https://github.com/ruby/ruby
https://github.com/ruby/ruby/commit/36e9ed7fef6eb2d14becf6c52452e4ab16e4bf01
backport 80b5a0ff2a7709367178f29d4ebe1c54122b1c27 partially as a securify fix for CVE-2020-10663. The patch was provided by Jeremy Evans. git-svn-id: svn+ssh://ci.ruby-lang.org/ruby/branches/ruby_2_6@67856 b2dd03c8-39d4-4d8f-98ff-823fe69b080e
1
static VALUE cParser_initialize(int argc, VALUE *argv, VALUE self) { VALUE source, opts; GET_PARSER_INIT; if (json->Vsource) { rb_raise(rb_eTypeError, "already initialized instance"); } #ifdef HAVE_RB_SCAN_ARGS_OPTIONAL_HASH rb_scan_args(argc, argv, "1:", &source, &opts); #else rb_scan_...
286,057,536,415,470,270,000,000,000,000,000,000,000
parser.c
188,365,769,419,331,900,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2020-10663
The JSON gem through 2.2.0 for Ruby, as used in Ruby 2.4 through 2.4.9, 2.5 through 2.5.7, and 2.6 through 2.6.5, has an Unsafe Object Creation Vulnerability. This is quite similar to CVE-2013-0269, but does not rely on poor garbage-collection behavior within Ruby. Specifically, use of JSON parsing methods can lead to ...
https://nvd.nist.gov/vuln/detail/CVE-2020-10663
458,827
ruby
36e9ed7fef6eb2d14becf6c52452e4ab16e4bf01
https://github.com/ruby/ruby
https://github.com/ruby/ruby/commit/36e9ed7fef6eb2d14becf6c52452e4ab16e4bf01
backport 80b5a0ff2a7709367178f29d4ebe1c54122b1c27 partially as a securify fix for CVE-2020-10663. The patch was provided by Jeremy Evans. git-svn-id: svn+ssh://ci.ruby-lang.org/ruby/branches/ruby_2_6@67856 b2dd03c8-39d4-4d8f-98ff-823fe69b080e
0
static VALUE cParser_initialize(int argc, VALUE *argv, VALUE self) { VALUE source, opts; GET_PARSER_INIT; if (json->Vsource) { rb_raise(rb_eTypeError, "already initialized instance"); } #ifdef HAVE_RB_SCAN_ARGS_OPTIONAL_HASH rb_scan_args(argc, argv, "1:", &source, &opts); #else rb_scan_...
307,877,354,429,253,400,000,000,000,000,000,000,000
parser.c
52,800,425,238,552,300,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2020-10663
The JSON gem through 2.2.0 for Ruby, as used in Ruby 2.4 through 2.4.9, 2.5 through 2.5.7, and 2.6 through 2.6.5, has an Unsafe Object Creation Vulnerability. This is quite similar to CVE-2013-0269, but does not rely on poor garbage-collection behavior within Ruby. Specifically, use of JSON parsing methods can lead to ...
https://nvd.nist.gov/vuln/detail/CVE-2020-10663
212,401
linux
057b8945f78f76d0b04eeb5c27cd9225e5e7ad86
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/057b8945f78f76d0b04eeb5c27cd9225e5e7ad86
spi: lpspi: fix memory leak in fsl_lpspi_probe In fsl_lpspi_probe an SPI controller is allocated either via spi_alloc_slave or spi_alloc_master. In all but one error cases this controller is put by going to error handling code. This commit fixes the case when pm_runtime_get_sync fails and it should go to the error han...
1
static int fsl_lpspi_probe(struct platform_device *pdev) { struct device_node *np = pdev->dev.of_node; struct fsl_lpspi_data *fsl_lpspi; struct spi_controller *controller; struct spi_imx_master *lpspi_platform_info = dev_get_platdata(&pdev->dev); struct resource *res; int i, ret, irq; u32 temp; bool is_slave;...
170,731,525,140,045,700,000,000,000,000,000,000,000
spi-fsl-lpspi.c
234,545,883,447,855,700,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2019-19064
A memory leak in the fsl_lpspi_probe() function in drivers/spi/spi-fsl-lpspi.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering pm_runtime_get_sync() failures, aka CID-057b8945f78f. NOTE: third parties dispute the relevance of this because an attacker c...
https://nvd.nist.gov/vuln/detail/CVE-2019-19064
458,875
linux
057b8945f78f76d0b04eeb5c27cd9225e5e7ad86
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/057b8945f78f76d0b04eeb5c27cd9225e5e7ad86
spi: lpspi: fix memory leak in fsl_lpspi_probe In fsl_lpspi_probe an SPI controller is allocated either via spi_alloc_slave or spi_alloc_master. In all but one error cases this controller is put by going to error handling code. This commit fixes the case when pm_runtime_get_sync fails and it should go to the error han...
0
static int fsl_lpspi_probe(struct platform_device *pdev) { struct device_node *np = pdev->dev.of_node; struct fsl_lpspi_data *fsl_lpspi; struct spi_controller *controller; struct spi_imx_master *lpspi_platform_info = dev_get_platdata(&pdev->dev); struct resource *res; int i, ret, irq; u32 temp; bool is_slave;...
315,564,283,170,940,360,000,000,000,000,000,000,000
spi-fsl-lpspi.c
251,531,448,899,965,370,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2019-19064
A memory leak in the fsl_lpspi_probe() function in drivers/spi/spi-fsl-lpspi.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering pm_runtime_get_sync() failures, aka CID-057b8945f78f. NOTE: third parties dispute the relevance of this because an attacker c...
https://nvd.nist.gov/vuln/detail/CVE-2019-19064
212,421
libvncserver
0cf1400c61850065de590d403f6d49e32882fd76
https://github.com/LibVNC/libvncserver
https://github.com/LibVNC/libvncserver/commit/0cf1400c61850065de590d403f6d49e32882fd76
fix crash because of unaligned accesses in hybiReadAndDecode()
1
hybiReadAndDecode(ws_ctx_t *wsctx, char *dst, int len, int *sockRet, int nInBuf) { int n; int i; int toReturn; /* number of data bytes to return */ int toDecode; /* number of bytes to decode starting at wsctx->writePos */ int bufsize; int nextRead; unsigned char *data; uint32_t *data32; /* if data wa...
303,425,552,261,171,250,000,000,000,000,000,000,000
ws_decode.c
283,353,540,129,449,640,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2019-20840
An issue was discovered in LibVNCServer before 0.9.13. libvncserver/ws_decode.c can lead to a crash because of unaligned accesses in hybiReadAndDecode.
https://nvd.nist.gov/vuln/detail/CVE-2019-20840
459,290
libvncserver
0cf1400c61850065de590d403f6d49e32882fd76
https://github.com/LibVNC/libvncserver
https://github.com/LibVNC/libvncserver/commit/0cf1400c61850065de590d403f6d49e32882fd76
fix crash because of unaligned accesses in hybiReadAndDecode()
0
hybiReadAndDecode(ws_ctx_t *wsctx, char *dst, int len, int *sockRet, int nInBuf) { int n; int i; int toReturn; /* number of data bytes to return */ int toDecode; /* number of bytes to decode starting at wsctx->writePos */ int bufsize; int nextRead; unsigned char *data; /* if data was carried over, copy...
107,490,375,107,606,550,000,000,000,000,000,000,000
ws_decode.c
157,238,741,179,085,860,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2019-20840
An issue was discovered in LibVNCServer before 0.9.13. libvncserver/ws_decode.c can lead to a crash because of unaligned accesses in hybiReadAndDecode.
https://nvd.nist.gov/vuln/detail/CVE-2019-20840
212,422
ImageMagick
5c0e1a31bc44829b1024ce599097f43285a05a42
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/5c0e1a31bc44829b1024ce599097f43285a05a42
https://github.com/ImageMagick/ImageMagick/issues/999
1
static Image *ReadTIFFImage(const ImageInfo *image_info, ExceptionInfo *exception) { #define ThrowTIFFException(severity,message) \ { \ if (tiff_pixels != (unsigned char *) NULL) \ tiff_pixels=(unsigned char *) RelinquishMagickMemory(tiff_pixels); \ if (quantum_info != (QuantumInfo *) NULL) \ quantum_info...
120,946,595,765,674,830,000,000,000,000,000,000,000
tiff.c
232,556,397,239,852,970,000,000,000,000,000,000,000
[ "CWE-770" ]
CVE-2018-7443
The ReadTIFFImage function in coders/tiff.c in ImageMagick 7.0.7-23 Q16 does not properly validate the amount of image data in a file, which allows remote attackers to cause a denial of service (memory allocation failure in the AcquireMagickMemory function in MagickCore/memory.c).
https://nvd.nist.gov/vuln/detail/CVE-2018-7443
459,302
ImageMagick
5c0e1a31bc44829b1024ce599097f43285a05a42
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/5c0e1a31bc44829b1024ce599097f43285a05a42
https://github.com/ImageMagick/ImageMagick/issues/999
0
static Image *ReadTIFFImage(const ImageInfo *image_info, ExceptionInfo *exception) { #define ThrowTIFFException(severity,message) \ { \ if (tiff_pixels != (unsigned char *) NULL) \ tiff_pixels=(unsigned char *) RelinquishMagickMemory(tiff_pixels); \ if (quantum_info != (QuantumInfo *) NULL) \ quantum_info...
109,374,377,112,639,150,000,000,000,000,000,000,000
tiff.c
316,057,833,404,137,560,000,000,000,000,000,000,000
[ "CWE-770" ]
CVE-2018-7443
The ReadTIFFImage function in coders/tiff.c in ImageMagick 7.0.7-23 Q16 does not properly validate the amount of image data in a file, which allows remote attackers to cause a denial of service (memory allocation failure in the AcquireMagickMemory function in MagickCore/memory.c).
https://nvd.nist.gov/vuln/detail/CVE-2018-7443
212,431
tor
4684ced1b3fced0543fa65bf01f75c5d81eaf464
https://github.com/torproject/tor
https://gitweb.torproject.org/tor.git/commitdiff/4684ced1b3fced0543fa65bf01f75c5d81eaf464
Add option to give guard flag to relays without the CVE-2011-2768 fix This way, all of the DA operators can upgrade immediately, without nuking every client's set of entry guards as soon as a majority of them upgrade. Until enough guards have upgraded, a majority of dirauths should set this config option so that ther...
1
set_routerstatus_from_routerinfo(routerstatus_t *rs, routerinfo_t *ri, time_t now, int naming, int listbadexits, int listbaddirs, int vote_on_hsdirs) { int unstable_version = !tor_version_as_new_as(ri->platform,"0.1...
299,537,638,512,825,730,000,000,000,000,000,000,000
dirserv.c
27,585,594,676,794,660,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2011-2768
Tor before 0.2.2.34, when configured as a client or bridge, sends a TLS certificate chain as part of an outgoing OR connection, which allows remote relays to bypass intended anonymity properties by reading this chain and then determining the set of entry guards that the client or bridge had selected.
https://nvd.nist.gov/vuln/detail/CVE-2011-2768
459,396
tor
4684ced1b3fced0543fa65bf01f75c5d81eaf464
https://github.com/torproject/tor
https://gitweb.torproject.org/tor.git/commitdiff/4684ced1b3fced0543fa65bf01f75c5d81eaf464
Add option to give guard flag to relays without the CVE-2011-2768 fix This way, all of the DA operators can upgrade immediately, without nuking every client's set of entry guards as soon as a majority of them upgrade. Until enough guards have upgraded, a majority of dirauths should set this config option so that ther...
0
set_routerstatus_from_routerinfo(routerstatus_t *rs, routerinfo_t *ri, time_t now, int naming, int listbadexits, int listbaddirs, int vote_on_hsdirs) { const or_options_t *options = get_options(); int unstable_version...
153,321,645,151,177,200,000,000,000,000,000,000,000
dirserv.c
335,400,208,334,694,830,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2011-2768
Tor before 0.2.2.34, when configured as a client or bridge, sends a TLS certificate chain as part of an outgoing OR connection, which allows remote relays to bypass intended anonymity properties by reading this chain and then determining the set of entry guards that the client or bridge had selected.
https://nvd.nist.gov/vuln/detail/CVE-2011-2768
212,434
perl5
43b2f4ef399e2fd7240b4eeb0658686ad95f8e62
https://github.com/perl/perl5
https://github.com/Perl/perl5/commit/43b2f4ef399e2fd7240b4eeb0658686ad95f8e62
regcomp.c: Convert some strchr to memchr This allows things to work properly in the face of embedded NULs. See the branch merge message for more information.
1
S_grok_bslash_N(pTHX_ RExC_state_t *pRExC_state, regnode ** node_p, UV * code_point_p, int * cp_count, I32 * flagp, const bool strict, const U32 depth ) { /* This routine teases apart the various meanings of \N and retu...
197,065,068,569,564,560,000,000,000,000,000,000,000
regcomp.c
171,307,497,171,438,250,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-18313
Perl before 5.26.3 has a buffer over-read via a crafted regular expression that triggers disclosure of sensitive information from process memory.
https://nvd.nist.gov/vuln/detail/CVE-2018-18313
459,471
perl5
43b2f4ef399e2fd7240b4eeb0658686ad95f8e62
https://github.com/perl/perl5
https://github.com/Perl/perl5/commit/43b2f4ef399e2fd7240b4eeb0658686ad95f8e62
regcomp.c: Convert some strchr to memchr This allows things to work properly in the face of embedded NULs. See the branch merge message for more information.
0
S_grok_bslash_N(pTHX_ RExC_state_t *pRExC_state, regnode ** node_p, UV * code_point_p, int * cp_count, I32 * flagp, const bool strict, const U32 depth ) { /* This routine teases apart the various meanings of \N and retu...
161,656,743,155,779,430,000,000,000,000,000,000,000
regcomp.c
270,632,658,845,359,080,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-18313
Perl before 5.26.3 has a buffer over-read via a crafted regular expression that triggers disclosure of sensitive information from process memory.
https://nvd.nist.gov/vuln/detail/CVE-2018-18313
212,691
linux
04f25edb48c441fc278ecc154c270f16966cbb90
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=04f25edb48c441fc278ecc154c270f16966cbb90
net: hns3: add some error checking in hclge_tm module When hdev->tx_sch_mode is HCLGE_FLAG_VNET_BASE_SCH_MODE, the hclge_tm_schd_mode_vnet_base_cfg calls hclge_tm_pri_schd_mode_cfg with vport->vport_id as pri_id, which is used as index for hdev->tm_info.tc_info, it will cause out of bound access issue if vport_id is e...
1
static int hclge_tm_schd_mode_vnet_base_cfg(struct hclge_vport *vport) { struct hnae3_knic_private_info *kinfo = &vport->nic.kinfo; struct hclge_dev *hdev = vport->back; int ret; u8 i; ret = hclge_tm_pri_schd_mode_cfg(hdev, vport->vport_id); if (ret) return ret; for (i = 0; i < kinfo->num_tc; i++) { u8 sch...
58,149,879,218,070,390,000,000,000,000,000,000,000
hclge_tm.c
63,262,872,488,367,200,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-15925
An issue was discovered in the Linux kernel before 5.2.3. An out of bounds access exists in the function hclge_tm_schd_mode_vnet_base_cfg in the file drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_tm.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-15925
460,583
linux
04f25edb48c441fc278ecc154c270f16966cbb90
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=04f25edb48c441fc278ecc154c270f16966cbb90
net: hns3: add some error checking in hclge_tm module When hdev->tx_sch_mode is HCLGE_FLAG_VNET_BASE_SCH_MODE, the hclge_tm_schd_mode_vnet_base_cfg calls hclge_tm_pri_schd_mode_cfg with vport->vport_id as pri_id, which is used as index for hdev->tm_info.tc_info, it will cause out of bound access issue if vport_id is e...
0
static int hclge_tm_schd_mode_vnet_base_cfg(struct hclge_vport *vport) { struct hnae3_knic_private_info *kinfo = &vport->nic.kinfo; struct hclge_dev *hdev = vport->back; int ret; u8 i; if (vport->vport_id >= HNAE3_MAX_TC) return -EINVAL; ret = hclge_tm_pri_schd_mode_cfg(hdev, vport->vport_id); if (ret) ret...
5,697,183,602,634,219,000,000,000,000,000,000,000
hclge_tm.c
217,461,857,470,958,100,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-15925
An issue was discovered in the Linux kernel before 5.2.3. An out of bounds access exists in the function hclge_tm_schd_mode_vnet_base_cfg in the file drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_tm.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-15925
212,694
libpng
812768d7a9c973452222d454634496b25ed415eb
https://github.com/glennrp/libpng
https://github.com/glennrp/libpng/commit/812768d7a9c973452222d454634496b25ed415eb
[libpng16] Fixed a potential null pointer dereference in png_set_text_2() (bug report and patch by Patrick Keshishian).
1
png_free_data(png_const_structrp png_ptr, png_inforp info_ptr, png_uint_32 mask, int num) { png_debug(1, "in png_free_data"); if (png_ptr == NULL || info_ptr == NULL) return; #ifdef PNG_TEXT_SUPPORTED /* Free text item num or (if num == -1) all text items */ if (info_ptr->text != NULL && ...
82,561,126,289,205,060,000,000,000,000,000,000,000
png.c
319,428,965,758,332,500,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2016-10087
The png_set_text_2 function in libpng 0.71 before 1.0.67, 1.2.x before 1.2.57, 1.4.x before 1.4.20, 1.5.x before 1.5.28, and 1.6.x before 1.6.27 allows context-dependent attackers to cause a NULL pointer dereference vectors involving loading a text chunk into a png structure, removing the text, and then adding another ...
https://nvd.nist.gov/vuln/detail/CVE-2016-10087
460,665
libpng
812768d7a9c973452222d454634496b25ed415eb
https://github.com/glennrp/libpng
https://github.com/glennrp/libpng/commit/812768d7a9c973452222d454634496b25ed415eb
[libpng16] Fixed a potential null pointer dereference in png_set_text_2() (bug report and patch by Patrick Keshishian).
0
png_free_data(png_const_structrp png_ptr, png_inforp info_ptr, png_uint_32 mask, int num) { png_debug(1, "in png_free_data"); if (png_ptr == NULL || info_ptr == NULL) return; #ifdef PNG_TEXT_SUPPORTED /* Free text item num or (if num == -1) all text items */ if (info_ptr->text != NULL && ...
58,746,198,998,192,630,000,000,000,000,000,000,000
png.c
143,585,258,967,993,460,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2016-10087
The png_set_text_2 function in libpng 0.71 before 1.0.67, 1.2.x before 1.2.57, 1.4.x before 1.4.20, 1.5.x before 1.5.28, and 1.6.x before 1.6.27 allows context-dependent attackers to cause a NULL pointer dereference vectors involving loading a text chunk into a png structure, removing the text, and then adding another ...
https://nvd.nist.gov/vuln/detail/CVE-2016-10087
212,696
flatpak
c4a58d5822e86f82bbf9e2e7702153a51cc6841b
https://github.com/flatpak/flatpak
https://github.com/flatpak/flatpak/commit/c4a58d5822e86f82bbf9e2e7702153a51cc6841b
portal: Add the ability to unset environment variables This is really just syntactic sugar for running `env -u VAR ... COMMAND`, but env(1) is inconvenient when the form of the COMMAND is not known: if the COMMAND might contain an equals sign, you end up having to run `env -u VAR sh -c 'exec "$@"' sh COMMAND`. Let's m...
1
handle_spawn (PortalFlatpak *object, GDBusMethodInvocation *invocation, GUnixFDList *fd_list, const gchar *arg_cwd_path, const gchar *const *arg_argv, GVariant *arg_fds, GVariant ...
156,556,328,680,407,970,000,000,000,000,000,000,000
flatpak-portal.c
333,543,788,875,738,250,000,000,000,000,000,000,000
[ "CWE-74" ]
CVE-2021-21261
Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. A bug was discovered in the `flatpak-portal` service that can allow sandboxed applications to execute arbitrary code on the host system (a sandbox escape). This sandbox-escape bug is present in versions from 0.11.4 and ...
https://nvd.nist.gov/vuln/detail/CVE-2021-21261
460,819
flatpak
c4a58d5822e86f82bbf9e2e7702153a51cc6841b
https://github.com/flatpak/flatpak
https://github.com/flatpak/flatpak/commit/c4a58d5822e86f82bbf9e2e7702153a51cc6841b
portal: Add the ability to unset environment variables This is really just syntactic sugar for running `env -u VAR ... COMMAND`, but env(1) is inconvenient when the form of the COMMAND is not known: if the COMMAND might contain an equals sign, you end up having to run `env -u VAR sh -c 'exec "$@"' sh COMMAND`. Let's m...
0
handle_spawn (PortalFlatpak *object, GDBusMethodInvocation *invocation, GUnixFDList *fd_list, const gchar *arg_cwd_path, const gchar *const *arg_argv, GVariant *arg_fds, GVariant ...
130,926,564,544,726,900,000,000,000,000,000,000,000
flatpak-portal.c
249,083,778,679,782,560,000,000,000,000,000,000,000
[ "CWE-74" ]
CVE-2021-21261
Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. A bug was discovered in the `flatpak-portal` service that can allow sandboxed applications to execute arbitrary code on the host system (a sandbox escape). This sandbox-escape bug is present in versions from 0.11.4 and ...
https://nvd.nist.gov/vuln/detail/CVE-2021-21261
212,699
vim
e031fe90cf2e375ce861ff5e5e281e4ad229ebb9
https://github.com/vim/vim
https://github.com/vim/vim/commit/e031fe90cf2e375ce861ff5e5e281e4ad229ebb9
patch 8.2.3741: using freed memory in open command Problem: Using freed memory in open command. Solution: Make a copy of the current line.
1
ex_open(exarg_T *eap) { regmatch_T regmatch; char_u *p; #ifdef FEAT_EVAL if (not_in_vim9(eap) == FAIL) return; #endif curwin->w_cursor.lnum = eap->line2; beginline(BL_SOL | BL_FIX); if (*eap->arg == '/') { // ":open /pattern/": put cursor in column found with pattern ++eap->arg; p = ski...
298,148,877,838,292,000,000,000,000,000,000,000,000
ex_docmd.c
14,419,689,002,096,338,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2021-4069
vim is vulnerable to Use After Free
https://nvd.nist.gov/vuln/detail/CVE-2021-4069
460,836
vim
e031fe90cf2e375ce861ff5e5e281e4ad229ebb9
https://github.com/vim/vim
https://github.com/vim/vim/commit/e031fe90cf2e375ce861ff5e5e281e4ad229ebb9
patch 8.2.3741: using freed memory in open command Problem: Using freed memory in open command. Solution: Make a copy of the current line.
0
ex_open(exarg_T *eap) { regmatch_T regmatch; char_u *p; #ifdef FEAT_EVAL if (not_in_vim9(eap) == FAIL) return; #endif curwin->w_cursor.lnum = eap->line2; beginline(BL_SOL | BL_FIX); if (*eap->arg == '/') { // ":open /pattern/": put cursor in column found with pattern ++eap->arg; p = ski...
45,679,936,274,385,625,000,000,000,000,000,000,000
ex_docmd.c
4,637,562,002,023,126,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2021-4069
vim is vulnerable to Use After Free
https://nvd.nist.gov/vuln/detail/CVE-2021-4069
212,749
openjpeg
c535531f03369623b9b833ef41952c62257b507e
https://github.com/uclouvain/openjpeg
https://github.com/uclouvain/openjpeg/commit/c535531f03369623b9b833ef41952c62257b507e
opj_t2_encode_packet(): fix potential write heap buffer overflow (#992)
1
static OPJ_BOOL opj_t2_encode_packet(OPJ_UINT32 tileno, opj_tcd_tile_t * tile, opj_tcp_t * tcp, opj_pi_iterator_t *pi, OPJ_BYTE *dest, ...
102,318,226,180,950,900,000,000,000,000,000,000,000
t2.c
89,059,163,605,915,700,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2017-14039
A heap-based buffer overflow was discovered in the opj_t2_encode_packet function in lib/openjp2/t2.c in OpenJPEG 2.2.0. The vulnerability causes an out-of-bounds write, which may lead to remote denial of service or possibly unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2017-14039