idx
int64
project
string
commit_id
string
project_url
string
commit_url
string
commit_message
string
target
int64
func
string
func_hash
float64
file_name
string
file_hash
float64
cwe
list
cve
string
cve_desc
string
nvd_url
string
461,307
openjpeg
c535531f03369623b9b833ef41952c62257b507e
https://github.com/uclouvain/openjpeg
https://github.com/uclouvain/openjpeg/commit/c535531f03369623b9b833ef41952c62257b507e
opj_t2_encode_packet(): fix potential write heap buffer overflow (#992)
0
static OPJ_BOOL opj_t2_encode_packet(OPJ_UINT32 tileno, opj_tcd_tile_t * tile, opj_tcp_t * tcp, opj_pi_iterator_t *pi, OPJ_BYTE *dest, ...
288,012,275,612,213,640,000,000,000,000,000,000,000
t2.c
36,465,046,070,092,400,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2017-14039
A heap-based buffer overflow was discovered in the opj_t2_encode_packet function in lib/openjp2/t2.c in OpenJPEG 2.2.0. The vulnerability causes an out-of-bounds write, which may lead to remote denial of service or possibly unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2017-14039
212,754
ImageMagick
2001aabeab8a921a4fa0b1932f565aef6ae69f84
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/2001aabeab8a921a4fa0b1932f565aef6ae69f84
https://github.com/ImageMagick/ImageMagick/issues/674
1
static MagickBooleanType WritePDFImage(const ImageInfo *image_info,Image *image, ExceptionInfo *exception) { #define CFormat "/Filter [ /%s ]\n" #define ObjectsPerImage 14 DisableMSCWarning(4310) static const char XMPProfile[]= { "<?xpacket begin=\"%s\" id=\"W5M0MpCehiHzreSzNTczkc9d\"?>\n" "<...
180,122,171,249,911,850,000,000,000,000,000,000,000
pdf.c
199,471,492,643,696,240,000,000,000,000,000,000,000
[ "CWE-617" ]
CVE-2017-13132
In ImageMagick 7.0.6-8, the WritePDFImage function in coders/pdf.c operates on an incorrect data structure in the "dump uncompressed PseudoColor packets" step, which allows attackers to cause a denial of service (assertion failure in WriteBlobStream in MagickCore/blob.c) via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2017-13132
461,335
ImageMagick
2001aabeab8a921a4fa0b1932f565aef6ae69f84
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/2001aabeab8a921a4fa0b1932f565aef6ae69f84
https://github.com/ImageMagick/ImageMagick/issues/674
0
static MagickBooleanType WritePDFImage(const ImageInfo *image_info,Image *image, ExceptionInfo *exception) { #define CFormat "/Filter [ /%s ]\n" #define ObjectsPerImage 14 DisableMSCWarning(4310) static const char XMPProfile[]= { "<?xpacket begin=\"%s\" id=\"W5M0MpCehiHzreSzNTczkc9d\"?>\n" "<...
107,072,958,023,321,240,000,000,000,000,000,000,000
pdf.c
319,437,701,144,051,200,000,000,000,000,000,000,000
[ "CWE-617" ]
CVE-2017-13132
In ImageMagick 7.0.6-8, the WritePDFImage function in coders/pdf.c operates on an incorrect data structure in the "dump uncompressed PseudoColor packets" step, which allows attackers to cause a denial of service (assertion failure in WriteBlobStream in MagickCore/blob.c) via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2017-13132
212,768
libvncserver
3fd03977c9b35800d73a865f167338cb4d05b0c1
https://github.com/LibVNC/libvncserver
https://github.com/LibVNC/libvncserver/commit/3fd03977c9b35800d73a865f167338cb4d05b0c1
libvncclient: bail out if unix socket name would overflow Closes #291
1
ConnectClientToUnixSock(const char *sockFile) { #ifdef WIN32 rfbClientErr("Windows doesn't support UNIX sockets\n"); return -1; #else int sock; struct sockaddr_un addr; addr.sun_family = AF_UNIX; strcpy(addr.sun_path, sockFile); sock = socket(AF_UNIX, SOCK_STREAM, 0); if (sock < 0) { rfbClientErr("...
114,092,604,641,597,960,000,000,000,000,000,000,000
sockets.c
248,941,569,372,547,900,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2019-20839
libvncclient/sockets.c in LibVNCServer before 0.9.13 has a buffer overflow via a long socket filename.
https://nvd.nist.gov/vuln/detail/CVE-2019-20839
461,607
libvncserver
3fd03977c9b35800d73a865f167338cb4d05b0c1
https://github.com/LibVNC/libvncserver
https://github.com/LibVNC/libvncserver/commit/3fd03977c9b35800d73a865f167338cb4d05b0c1
libvncclient: bail out if unix socket name would overflow Closes #291
0
ConnectClientToUnixSock(const char *sockFile) { #ifdef WIN32 rfbClientErr("Windows doesn't support UNIX sockets\n"); return -1; #else int sock; struct sockaddr_un addr; addr.sun_family = AF_UNIX; if(strlen(sockFile) + 1 > sizeof(addr.sun_path)) { rfbClientErr("ConnectToUnixSock: socket file name too l...
58,902,372,311,085,440,000,000,000,000,000,000,000
sockets.c
148,387,272,730,163,620,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2019-20839
libvncclient/sockets.c in LibVNCServer before 0.9.13 has a buffer overflow via a long socket filename.
https://nvd.nist.gov/vuln/detail/CVE-2019-20839
212,769
openexr
51a92d67f53c08230734e74564c807043cbfe41e
https://github.com/AcademySoftwareFoundation/openexr
https://github.com/AcademySoftwareFoundation/openexr/commit/51a92d67f53c08230734e74564c807043cbfe41e
check for valid Huf code lengths (#849) * check for valid Huf code lengths * test non-fast huf decoder in testHuf Signed-off-by: Peter Hillman <peterh@wetafx.co.nz>
1
hufDecode (const Int64 * hcode, // i : encoding table const HufDec * hdecod, // i : decoding table const char* in, // i : compressed input buffer int ni, // i : input size (in bits) int rlc, // i : run-length code int no, // i : expected output size (in bytes) unsigned short* out...
135,013,956,665,797,370,000,000,000,000,000,000,000
ImfHuf.cpp
83,666,658,604,202,860,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2021-20304
A flaw was found in OpenEXR's hufDecode functionality. This flaw allows an attacker who can pass a crafted file to be processed by OpenEXR, to trigger an undefined right shift error. The highest threat from this vulnerability is to system availability.
https://nvd.nist.gov/vuln/detail/CVE-2021-20304
461,620
openexr
51a92d67f53c08230734e74564c807043cbfe41e
https://github.com/AcademySoftwareFoundation/openexr
https://github.com/AcademySoftwareFoundation/openexr/commit/51a92d67f53c08230734e74564c807043cbfe41e
check for valid Huf code lengths (#849) * check for valid Huf code lengths * test non-fast huf decoder in testHuf Signed-off-by: Peter Hillman <peterh@wetafx.co.nz>
0
hufDecode (const Int64 * hcode, // i : encoding table const HufDec * hdecod, // i : decoding table const char* in, // i : compressed input buffer int ni, // i : input size (in bits) int rlc, // i : run-length code int no, // i : expected output size (in bytes) unsigned short* out...
151,701,382,254,237,850,000,000,000,000,000,000,000
ImfHuf.cpp
189,779,669,336,749,730,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2021-20304
A flaw was found in OpenEXR's hufDecode functionality. This flaw allows an attacker who can pass a crafted file to be processed by OpenEXR, to trigger an undefined right shift error. The highest threat from this vulnerability is to system availability.
https://nvd.nist.gov/vuln/detail/CVE-2021-20304
212,777
dcmtk
beaf5a5c24101daeeafa48c375120b16197c9e95
https://github.com/DCMTK/dcmtk
http://git.dcmtk.org/web?p=dcmtk.git;a=commitdiff;h=beaf5a5c24101daeeafa48c375120b16197c9e95;hp=5349794c4c458c76609b7aeb53d0ca28cf9fe9f0
Make sure to handle setuid() return code properly. In some tools the return value of setuid() is not checked. In the worst case this could lead to privilege escalation since the process does not give up its root privileges and continue as root.
1
int main(int argc, char *argv[]) { #ifdef HAVE_GUSI_H GUSISetup(GUSIwithSIOUXSockets); GUSISetup(GUSIwithInternetSockets); #endif #ifdef WITH_TCPWRAPPER // this code makes sure that the linker cannot optimize away // the DUL part of the network module where the external flags // for libwrap are de...
89,272,490,427,650,530,000,000,000,000,000,000,000
msgserv.cc
64,051,372,405,406,250,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-6825
(1) movescu.cc and (2) storescp.cc in dcmnet/apps/, (3) dcmnet/libsrc/scp.cc, (4) dcmwlm/libsrc/wlmactmg.cc, (5) dcmprscp.cc and (6) dcmpsrcv.cc in dcmpstat/apps/, (7) dcmpstat/tests/msgserv.cc, and (8) dcmqrdb/apps/dcmqrscp.cc in DCMTK 3.6.1 and earlier does not check the return value of the setuid system call, which ...
https://nvd.nist.gov/vuln/detail/CVE-2013-6825
461,777
dcmtk
beaf5a5c24101daeeafa48c375120b16197c9e95
https://github.com/DCMTK/dcmtk
http://git.dcmtk.org/web?p=dcmtk.git;a=commitdiff;h=beaf5a5c24101daeeafa48c375120b16197c9e95;hp=5349794c4c458c76609b7aeb53d0ca28cf9fe9f0
Make sure to handle setuid() return code properly. In some tools the return value of setuid() is not checked. In the worst case this could lead to privilege escalation since the process does not give up its root privileges and continue as root.
0
int main(int argc, char *argv[]) { #ifdef HAVE_GUSI_H GUSISetup(GUSIwithSIOUXSockets); GUSISetup(GUSIwithInternetSockets); #endif #ifdef WITH_TCPWRAPPER // this code makes sure that the linker cannot optimize away // the DUL part of the network module where the external flags // for libwrap are de...
326,630,950,291,790,700,000,000,000,000,000,000,000
msgserv.cc
10,324,162,321,453,011,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-6825
(1) movescu.cc and (2) storescp.cc in dcmnet/apps/, (3) dcmnet/libsrc/scp.cc, (4) dcmwlm/libsrc/wlmactmg.cc, (5) dcmprscp.cc and (6) dcmpsrcv.cc in dcmpstat/apps/, (7) dcmpstat/tests/msgserv.cc, and (8) dcmqrdb/apps/dcmqrscp.cc in DCMTK 3.6.1 and earlier does not check the return value of the setuid system call, which ...
https://nvd.nist.gov/vuln/detail/CVE-2013-6825
212,778
dcmtk
beaf5a5c24101daeeafa48c375120b16197c9e95
https://github.com/DCMTK/dcmtk
http://git.dcmtk.org/web?p=dcmtk.git;a=commitdiff;h=beaf5a5c24101daeeafa48c375120b16197c9e95;hp=5349794c4c458c76609b7aeb53d0ca28cf9fe9f0
Make sure to handle setuid() return code properly. In some tools the return value of setuid() is not checked. In the worst case this could lead to privilege escalation since the process does not give up its root privileges and continue as root.
1
main(int argc, char *argv[]) { OFCondition cond = EC_Normal; OFCmdUnsignedInt overridePort = 0; OFCmdUnsignedInt overrideMaxPDU = 0; DcmQueryRetrieveOptions options; #ifdef HAVE_GUSI_H /* needed for Macintosh */ GUSISetup(GUSIwithSIOUXSockets); GUSISetup(GUSIwithInternetSockets); #endif #ifdef HAVE_WINS...
309,036,142,818,267,500,000,000,000,000,000,000,000
dcmqrscp.cc
309,042,252,130,188,400,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-6825
(1) movescu.cc and (2) storescp.cc in dcmnet/apps/, (3) dcmnet/libsrc/scp.cc, (4) dcmwlm/libsrc/wlmactmg.cc, (5) dcmprscp.cc and (6) dcmpsrcv.cc in dcmpstat/apps/, (7) dcmpstat/tests/msgserv.cc, and (8) dcmqrdb/apps/dcmqrscp.cc in DCMTK 3.6.1 and earlier does not check the return value of the setuid system call, which ...
https://nvd.nist.gov/vuln/detail/CVE-2013-6825
461,738
dcmtk
beaf5a5c24101daeeafa48c375120b16197c9e95
https://github.com/DCMTK/dcmtk
http://git.dcmtk.org/web?p=dcmtk.git;a=commitdiff;h=beaf5a5c24101daeeafa48c375120b16197c9e95;hp=5349794c4c458c76609b7aeb53d0ca28cf9fe9f0
Make sure to handle setuid() return code properly. In some tools the return value of setuid() is not checked. In the worst case this could lead to privilege escalation since the process does not give up its root privileges and continue as root.
0
main(int argc, char *argv[]) { OFCondition cond = EC_Normal; OFCmdUnsignedInt overridePort = 0; OFCmdUnsignedInt overrideMaxPDU = 0; DcmQueryRetrieveOptions options; #ifdef HAVE_GUSI_H /* needed for Macintosh */ GUSISetup(GUSIwithSIOUXSockets); GUSISetup(GUSIwithInternetSockets); #endif #ifdef HAVE_WINS...
113,232,657,295,468,900,000,000,000,000,000,000,000
dcmqrscp.cc
190,527,431,947,042,300,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-6825
(1) movescu.cc and (2) storescp.cc in dcmnet/apps/, (3) dcmnet/libsrc/scp.cc, (4) dcmwlm/libsrc/wlmactmg.cc, (5) dcmprscp.cc and (6) dcmpsrcv.cc in dcmpstat/apps/, (7) dcmpstat/tests/msgserv.cc, and (8) dcmqrdb/apps/dcmqrscp.cc in DCMTK 3.6.1 and earlier does not check the return value of the setuid system call, which ...
https://nvd.nist.gov/vuln/detail/CVE-2013-6825
212,779
dcmtk
beaf5a5c24101daeeafa48c375120b16197c9e95
https://github.com/DCMTK/dcmtk
http://git.dcmtk.org/web?p=dcmtk.git;a=commitdiff;h=beaf5a5c24101daeeafa48c375120b16197c9e95;hp=5349794c4c458c76609b7aeb53d0ca28cf9fe9f0
Make sure to handle setuid() return code properly. In some tools the return value of setuid() is not checked. In the worst case this could lead to privilege escalation since the process does not give up its root privileges and continue as root.
1
int main(int argc, char *argv[]) { T_ASC_Network *net; DcmAssociationConfiguration asccfg; #ifdef HAVE_GUSI_H /* needed for Macintosh */ GUSISetup(GUSIwithSIOUXSockets); GUSISetup(GUSIwithInternetSockets); #endif #ifdef HAVE_WINSOCK_H WSAData winSockData; /* we need at least version 1.1 */ WORD winSoc...
136,224,616,518,968,400,000,000,000,000,000,000,000
storescp.cc
197,572,318,530,186,870,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-6825
(1) movescu.cc and (2) storescp.cc in dcmnet/apps/, (3) dcmnet/libsrc/scp.cc, (4) dcmwlm/libsrc/wlmactmg.cc, (5) dcmprscp.cc and (6) dcmpsrcv.cc in dcmpstat/apps/, (7) dcmpstat/tests/msgserv.cc, and (8) dcmqrdb/apps/dcmqrscp.cc in DCMTK 3.6.1 and earlier does not check the return value of the setuid system call, which ...
https://nvd.nist.gov/vuln/detail/CVE-2013-6825
461,818
dcmtk
beaf5a5c24101daeeafa48c375120b16197c9e95
https://github.com/DCMTK/dcmtk
http://git.dcmtk.org/web?p=dcmtk.git;a=commitdiff;h=beaf5a5c24101daeeafa48c375120b16197c9e95;hp=5349794c4c458c76609b7aeb53d0ca28cf9fe9f0
Make sure to handle setuid() return code properly. In some tools the return value of setuid() is not checked. In the worst case this could lead to privilege escalation since the process does not give up its root privileges and continue as root.
0
int main(int argc, char *argv[]) { T_ASC_Network *net; DcmAssociationConfiguration asccfg; #ifdef HAVE_GUSI_H /* needed for Macintosh */ GUSISetup(GUSIwithSIOUXSockets); GUSISetup(GUSIwithInternetSockets); #endif #ifdef HAVE_WINSOCK_H WSAData winSockData; /* we need at least version 1.1 */ WORD winSoc...
175,687,164,923,627,500,000,000,000,000,000,000,000
storescp.cc
47,991,792,040,003,300,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-6825
(1) movescu.cc and (2) storescp.cc in dcmnet/apps/, (3) dcmnet/libsrc/scp.cc, (4) dcmwlm/libsrc/wlmactmg.cc, (5) dcmprscp.cc and (6) dcmpsrcv.cc in dcmpstat/apps/, (7) dcmpstat/tests/msgserv.cc, and (8) dcmqrdb/apps/dcmqrscp.cc in DCMTK 3.6.1 and earlier does not check the return value of the setuid system call, which ...
https://nvd.nist.gov/vuln/detail/CVE-2013-6825
212,780
dcmtk
beaf5a5c24101daeeafa48c375120b16197c9e95
https://github.com/DCMTK/dcmtk
http://git.dcmtk.org/web?p=dcmtk.git;a=commitdiff;h=beaf5a5c24101daeeafa48c375120b16197c9e95;hp=5349794c4c458c76609b7aeb53d0ca28cf9fe9f0
Make sure to handle setuid() return code properly. In some tools the return value of setuid() is not checked. In the worst case this could lead to privilege escalation since the process does not give up its root privileges and continue as root.
1
OFCondition WlmActivityManager::StartProvidingService() // Date : December 10, 2001 // Author : Thomas Wilkens // Task : Starts providing the implemented service for calling SCUs. // After having created an instance of this class, this function // shall be called from...
132,887,439,509,033,620,000,000,000,000,000,000,000
wlmactmg.cc
29,629,881,142,441,970,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-6825
(1) movescu.cc and (2) storescp.cc in dcmnet/apps/, (3) dcmnet/libsrc/scp.cc, (4) dcmwlm/libsrc/wlmactmg.cc, (5) dcmprscp.cc and (6) dcmpsrcv.cc in dcmpstat/apps/, (7) dcmpstat/tests/msgserv.cc, and (8) dcmqrdb/apps/dcmqrscp.cc in DCMTK 3.6.1 and earlier does not check the return value of the setuid system call, which ...
https://nvd.nist.gov/vuln/detail/CVE-2013-6825
461,759
dcmtk
beaf5a5c24101daeeafa48c375120b16197c9e95
https://github.com/DCMTK/dcmtk
http://git.dcmtk.org/web?p=dcmtk.git;a=commitdiff;h=beaf5a5c24101daeeafa48c375120b16197c9e95;hp=5349794c4c458c76609b7aeb53d0ca28cf9fe9f0
Make sure to handle setuid() return code properly. In some tools the return value of setuid() is not checked. In the worst case this could lead to privilege escalation since the process does not give up its root privileges and continue as root.
0
OFCondition WlmActivityManager::StartProvidingService() // Date : December 10, 2001 // Author : Thomas Wilkens // Task : Starts providing the implemented service for calling SCUs. // After having created an instance of this class, this function // shall be called from...
34,397,149,061,632,614,000,000,000,000,000,000,000
wlmactmg.cc
301,095,470,508,302,620,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-6825
(1) movescu.cc and (2) storescp.cc in dcmnet/apps/, (3) dcmnet/libsrc/scp.cc, (4) dcmwlm/libsrc/wlmactmg.cc, (5) dcmprscp.cc and (6) dcmpsrcv.cc in dcmpstat/apps/, (7) dcmpstat/tests/msgserv.cc, and (8) dcmqrdb/apps/dcmqrscp.cc in DCMTK 3.6.1 and earlier does not check the return value of the setuid system call, which ...
https://nvd.nist.gov/vuln/detail/CVE-2013-6825
212,781
dcmtk
beaf5a5c24101daeeafa48c375120b16197c9e95
https://github.com/DCMTK/dcmtk
http://git.dcmtk.org/web?p=dcmtk.git;a=commitdiff;h=beaf5a5c24101daeeafa48c375120b16197c9e95;hp=5349794c4c458c76609b7aeb53d0ca28cf9fe9f0
Make sure to handle setuid() return code properly. In some tools the return value of setuid() is not checked. In the worst case this could lead to privilege escalation since the process does not give up its root privileges and continue as root.
1
OFCondition DcmSCP::listen() { // make sure not to let dcmdata remove trailing blank padding or perform other // manipulations. We want to see the real data. dcmEnableAutomaticInputDataCorrection.set( OFFalse ); OFCondition cond = EC_Normal; // Make sure data dictionary is loaded. if( !dcmDataDict.isDicti...
235,864,230,702,860,270,000,000,000,000,000,000,000
scp.cc
285,413,361,506,887,470,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-6825
(1) movescu.cc and (2) storescp.cc in dcmnet/apps/, (3) dcmnet/libsrc/scp.cc, (4) dcmwlm/libsrc/wlmactmg.cc, (5) dcmprscp.cc and (6) dcmpsrcv.cc in dcmpstat/apps/, (7) dcmpstat/tests/msgserv.cc, and (8) dcmqrdb/apps/dcmqrscp.cc in DCMTK 3.6.1 and earlier does not check the return value of the setuid system call, which ...
https://nvd.nist.gov/vuln/detail/CVE-2013-6825
461,857
dcmtk
beaf5a5c24101daeeafa48c375120b16197c9e95
https://github.com/DCMTK/dcmtk
http://git.dcmtk.org/web?p=dcmtk.git;a=commitdiff;h=beaf5a5c24101daeeafa48c375120b16197c9e95;hp=5349794c4c458c76609b7aeb53d0ca28cf9fe9f0
Make sure to handle setuid() return code properly. In some tools the return value of setuid() is not checked. In the worst case this could lead to privilege escalation since the process does not give up its root privileges and continue as root.
0
OFCondition DcmSCP::listen() { // make sure not to let dcmdata remove trailing blank padding or perform other // manipulations. We want to see the real data. dcmEnableAutomaticInputDataCorrection.set( OFFalse ); OFCondition cond = EC_Normal; // Make sure data dictionary is loaded. if( !dcmDataDict.isDicti...
119,135,973,460,562,500,000,000,000,000,000,000,000
scp.cc
275,325,448,714,774,400,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-6825
(1) movescu.cc and (2) storescp.cc in dcmnet/apps/, (3) dcmnet/libsrc/scp.cc, (4) dcmwlm/libsrc/wlmactmg.cc, (5) dcmprscp.cc and (6) dcmpsrcv.cc in dcmpstat/apps/, (7) dcmpstat/tests/msgserv.cc, and (8) dcmqrdb/apps/dcmqrscp.cc in DCMTK 3.6.1 and earlier does not check the return value of the setuid system call, which ...
https://nvd.nist.gov/vuln/detail/CVE-2013-6825
212,782
dcmtk
beaf5a5c24101daeeafa48c375120b16197c9e95
https://github.com/DCMTK/dcmtk
http://git.dcmtk.org/web?p=dcmtk.git;a=commitdiff;h=beaf5a5c24101daeeafa48c375120b16197c9e95;hp=5349794c4c458c76609b7aeb53d0ca28cf9fe9f0
Make sure to handle setuid() return code properly. In some tools the return value of setuid() is not checked. In the worst case this could lead to privilege escalation since the process does not give up its root privileges and continue as root.
1
int main(int argc, char *argv[]) { #ifdef HAVE_GUSI_H GUSISetup(GUSIwithSIOUXSockets); GUSISetup(GUSIwithInternetSockets); #endif #ifdef HAVE_WINSOCK_H WSAData winSockData; /* we need at least version 1.1 */ WORD winSockVersionNeeded = MAKEWORD( 1, 1 ); WSAStartup(winSockVersionNeeded, &winSoc...
297,975,859,261,612,930,000,000,000,000,000,000,000
dcmpsrcv.cc
332,968,943,210,808,300,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-6825
(1) movescu.cc and (2) storescp.cc in dcmnet/apps/, (3) dcmnet/libsrc/scp.cc, (4) dcmwlm/libsrc/wlmactmg.cc, (5) dcmprscp.cc and (6) dcmpsrcv.cc in dcmpstat/apps/, (7) dcmpstat/tests/msgserv.cc, and (8) dcmqrdb/apps/dcmqrscp.cc in DCMTK 3.6.1 and earlier does not check the return value of the setuid system call, which ...
https://nvd.nist.gov/vuln/detail/CVE-2013-6825
461,748
dcmtk
beaf5a5c24101daeeafa48c375120b16197c9e95
https://github.com/DCMTK/dcmtk
http://git.dcmtk.org/web?p=dcmtk.git;a=commitdiff;h=beaf5a5c24101daeeafa48c375120b16197c9e95;hp=5349794c4c458c76609b7aeb53d0ca28cf9fe9f0
Make sure to handle setuid() return code properly. In some tools the return value of setuid() is not checked. In the worst case this could lead to privilege escalation since the process does not give up its root privileges and continue as root.
0
int main(int argc, char *argv[]) { #ifdef HAVE_GUSI_H GUSISetup(GUSIwithSIOUXSockets); GUSISetup(GUSIwithInternetSockets); #endif #ifdef HAVE_WINSOCK_H WSAData winSockData; /* we need at least version 1.1 */ WORD winSockVersionNeeded = MAKEWORD( 1, 1 ); WSAStartup(winSockVersionNeeded, &winSoc...
105,564,390,650,709,940,000,000,000,000,000,000,000
dcmpsrcv.cc
170,258,021,695,887,550,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-6825
(1) movescu.cc and (2) storescp.cc in dcmnet/apps/, (3) dcmnet/libsrc/scp.cc, (4) dcmwlm/libsrc/wlmactmg.cc, (5) dcmprscp.cc and (6) dcmpsrcv.cc in dcmpstat/apps/, (7) dcmpstat/tests/msgserv.cc, and (8) dcmqrdb/apps/dcmqrscp.cc in DCMTK 3.6.1 and earlier does not check the return value of the setuid system call, which ...
https://nvd.nist.gov/vuln/detail/CVE-2013-6825
212,783
dcmtk
beaf5a5c24101daeeafa48c375120b16197c9e95
https://github.com/DCMTK/dcmtk
http://git.dcmtk.org/web?p=dcmtk.git;a=commitdiff;h=beaf5a5c24101daeeafa48c375120b16197c9e95;hp=5349794c4c458c76609b7aeb53d0ca28cf9fe9f0
Make sure to handle setuid() return code properly. In some tools the return value of setuid() is not checked. In the worst case this could lead to privilege escalation since the process does not give up its root privileges and continue as root.
1
int main(int argc, char *argv[]) { #ifdef HAVE_GUSI_H GUSISetup(GUSIwithSIOUXSockets); GUSISetup(GUSIwithInternetSockets); #endif #ifdef HAVE_WINSOCK_H WSAData winSockData; /* we need at least version 1.1 */ WORD winSockVersionNeeded = MAKEWORD( 1, 1 ); WSAStartup(winSockVersionNeeded, &winSoc...
236,769,436,028,981,150,000,000,000,000,000,000,000
dcmprscp.cc
43,694,756,729,968,070,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-6825
(1) movescu.cc and (2) storescp.cc in dcmnet/apps/, (3) dcmnet/libsrc/scp.cc, (4) dcmwlm/libsrc/wlmactmg.cc, (5) dcmprscp.cc and (6) dcmpsrcv.cc in dcmpstat/apps/, (7) dcmpstat/tests/msgserv.cc, and (8) dcmqrdb/apps/dcmqrscp.cc in DCMTK 3.6.1 and earlier does not check the return value of the setuid system call, which ...
https://nvd.nist.gov/vuln/detail/CVE-2013-6825
461,806
dcmtk
beaf5a5c24101daeeafa48c375120b16197c9e95
https://github.com/DCMTK/dcmtk
http://git.dcmtk.org/web?p=dcmtk.git;a=commitdiff;h=beaf5a5c24101daeeafa48c375120b16197c9e95;hp=5349794c4c458c76609b7aeb53d0ca28cf9fe9f0
Make sure to handle setuid() return code properly. In some tools the return value of setuid() is not checked. In the worst case this could lead to privilege escalation since the process does not give up its root privileges and continue as root.
0
int main(int argc, char *argv[]) { #ifdef HAVE_GUSI_H GUSISetup(GUSIwithSIOUXSockets); GUSISetup(GUSIwithInternetSockets); #endif #ifdef HAVE_WINSOCK_H WSAData winSockData; /* we need at least version 1.1 */ WORD winSockVersionNeeded = MAKEWORD( 1, 1 ); WSAStartup(winSockVersionNeeded, &winSoc...
235,182,521,171,542,440,000,000,000,000,000,000,000
dcmprscp.cc
299,137,787,502,351,900,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-6825
(1) movescu.cc and (2) storescp.cc in dcmnet/apps/, (3) dcmnet/libsrc/scp.cc, (4) dcmwlm/libsrc/wlmactmg.cc, (5) dcmprscp.cc and (6) dcmpsrcv.cc in dcmpstat/apps/, (7) dcmpstat/tests/msgserv.cc, and (8) dcmqrdb/apps/dcmqrscp.cc in DCMTK 3.6.1 and earlier does not check the return value of the setuid system call, which ...
https://nvd.nist.gov/vuln/detail/CVE-2013-6825
212,784
dcmtk
beaf5a5c24101daeeafa48c375120b16197c9e95
https://github.com/DCMTK/dcmtk
http://git.dcmtk.org/web?p=dcmtk.git;a=commitdiff;h=beaf5a5c24101daeeafa48c375120b16197c9e95;hp=5349794c4c458c76609b7aeb53d0ca28cf9fe9f0
Make sure to handle setuid() return code properly. In some tools the return value of setuid() is not checked. In the worst case this could lead to privilege escalation since the process does not give up its root privileges and continue as root.
1
main(int argc, char *argv[]) { T_ASC_Parameters *params = NULL; const char *opt_peer; OFCmdUnsignedInt opt_port = 104; DIC_NODENAME localHost; DIC_NODENAME peerHost; T_ASC_Association *assoc = NULL; const char *opt_peerTitle = PEERAPPLICATIONTITLE; const char *opt_ourTitle = APPLICATIONT...
42,037,421,370,473,350,000,000,000,000,000,000,000
movescu.cc
18,540,912,223,589,369,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-6825
(1) movescu.cc and (2) storescp.cc in dcmnet/apps/, (3) dcmnet/libsrc/scp.cc, (4) dcmwlm/libsrc/wlmactmg.cc, (5) dcmprscp.cc and (6) dcmpsrcv.cc in dcmpstat/apps/, (7) dcmpstat/tests/msgserv.cc, and (8) dcmqrdb/apps/dcmqrscp.cc in DCMTK 3.6.1 and earlier does not check the return value of the setuid system call, which ...
https://nvd.nist.gov/vuln/detail/CVE-2013-6825
461,877
dcmtk
beaf5a5c24101daeeafa48c375120b16197c9e95
https://github.com/DCMTK/dcmtk
http://git.dcmtk.org/web?p=dcmtk.git;a=commitdiff;h=beaf5a5c24101daeeafa48c375120b16197c9e95;hp=5349794c4c458c76609b7aeb53d0ca28cf9fe9f0
Make sure to handle setuid() return code properly. In some tools the return value of setuid() is not checked. In the worst case this could lead to privilege escalation since the process does not give up its root privileges and continue as root.
0
main(int argc, char *argv[]) { T_ASC_Parameters *params = NULL; const char *opt_peer; OFCmdUnsignedInt opt_port = 104; DIC_NODENAME localHost; DIC_NODENAME peerHost; T_ASC_Association *assoc = NULL; const char *opt_peerTitle = PEERAPPLICATIONTITLE; const char *opt_ourTitle = APPLICATIONT...
69,425,334,444,412,660,000,000,000,000,000,000,000
movescu.cc
178,526,427,842,922,240,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-6825
(1) movescu.cc and (2) storescp.cc in dcmnet/apps/, (3) dcmnet/libsrc/scp.cc, (4) dcmwlm/libsrc/wlmactmg.cc, (5) dcmprscp.cc and (6) dcmpsrcv.cc in dcmpstat/apps/, (7) dcmpstat/tests/msgserv.cc, and (8) dcmqrdb/apps/dcmqrscp.cc in DCMTK 3.6.1 and earlier does not check the return value of the setuid system call, which ...
https://nvd.nist.gov/vuln/detail/CVE-2013-6825
212,788
gnutls
35e26ca63c6da01db460d93e9c4bf86cd668534c
http://git.savannah.gnu.org/cgit/gnutls
http://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commitdiff;h=35e26ca63c6da01db460d93e9c4bf86cd668534c
provide less timing information when decoding packets. Patch by Nadhem Alfardan.
1
ciphertext_to_compressed (gnutls_session_t session, gnutls_datum_t *ciphertext, opaque * compress_data, int compress_size, uint8_t type, record_parameters_st * params, uint64* sequence) { ...
99,716,543,947,855,970,000,000,000,000,000,000,000
gnutls_cipher.c
134,740,051,554,246,070,000,000,000,000,000,000,000
[ "CWE-310" ]
CVE-2012-0390
The DTLS implementation in GnuTLS 3.0.10 and earlier executes certain error-handling code only if there is a specific relationship between a padding length and the ciphertext size, which makes it easier for remote attackers to recover partial plaintext via a timing side-channel attack, a related issue to CVE-2011-4108.
https://nvd.nist.gov/vuln/detail/CVE-2012-0390
461,889
gnutls
35e26ca63c6da01db460d93e9c4bf86cd668534c
http://git.savannah.gnu.org/cgit/gnutls
http://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commitdiff;h=35e26ca63c6da01db460d93e9c4bf86cd668534c
provide less timing information when decoding packets. Patch by Nadhem Alfardan.
0
ciphertext_to_compressed (gnutls_session_t session, gnutls_datum_t *ciphertext, opaque * compress_data, int compress_size, uint8_t type, record_parameters_st * params, uint64* sequence) { ...
210,077,129,361,569,830,000,000,000,000,000,000,000
gnutls_cipher.c
279,797,039,587,386,570,000,000,000,000,000,000,000
[ "CWE-310" ]
CVE-2012-0390
The DTLS implementation in GnuTLS 3.0.10 and earlier executes certain error-handling code only if there is a specific relationship between a padding length and the ciphertext size, which makes it easier for remote attackers to recover partial plaintext via a timing side-channel attack, a related issue to CVE-2011-4108.
https://nvd.nist.gov/vuln/detail/CVE-2012-0390
212,789
mono
722f9890f09aadfc37ae479e7d946d5fc5ef7b91
https://github.com/mono/mono
https://github.com/mono/mono/commit/722f9890f09aadfc37ae479e7d946d5fc5ef7b91
Fix access to freed members of a dead thread * threads.c: Fix access to freed members of a dead thread. Found and fixed by Rodrigo Kumpera <rkumpera@novell.com> Ref: CVE-2011-0992
1
void ves_icall_System_Threading_InternalThread_Thread_free_internal (MonoInternalThread *this, HANDLE thread) { MONO_ARCH_SAVE_REGS; THREAD_DEBUG (g_message ("%s: Closing thread %p, handle %p", __func__, this, thread)); if (thread) CloseHandle (thread); if (this->synch_cs) { DeleteCriticalSection (this->sync...
49,085,657,583,212,260,000,000,000,000,000,000,000
threads.c
215,643,197,562,885,600,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2011-0989
The RuntimeHelpers.InitializeArray method in metadata/icall.c in Mono, when Moonlight 2.x before 2.4.1 or 3.x before 3.99.3 is used, does not properly restrict data types, which allows remote attackers to modify internal read-only data structures, and cause a denial of service (plugin crash) or corrupt the internal sta...
https://nvd.nist.gov/vuln/detail/CVE-2011-0989
462,002
mono
722f9890f09aadfc37ae479e7d946d5fc5ef7b91
https://github.com/mono/mono
https://github.com/mono/mono/commit/722f9890f09aadfc37ae479e7d946d5fc5ef7b91
Fix access to freed members of a dead thread * threads.c: Fix access to freed members of a dead thread. Found and fixed by Rodrigo Kumpera <rkumpera@novell.com> Ref: CVE-2011-0992
0
void ves_icall_System_Threading_InternalThread_Thread_free_internal (MonoInternalThread *this, HANDLE thread) { MONO_ARCH_SAVE_REGS; THREAD_DEBUG (g_message ("%s: Closing thread %p, handle %p", __func__, this, thread)); if (thread) CloseHandle (thread); if (this->synch_cs) { CRITICAL_SECTION *synch_cs = this...
328,318,888,253,505,200,000,000,000,000,000,000,000
threads.c
155,621,953,118,855,470,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2011-0989
The RuntimeHelpers.InitializeArray method in metadata/icall.c in Mono, when Moonlight 2.x before 2.4.1 or 3.x before 3.99.3 is used, does not properly restrict data types, which allows remote attackers to modify internal read-only data structures, and cause a denial of service (plugin crash) or corrupt the internal sta...
https://nvd.nist.gov/vuln/detail/CVE-2011-0989
212,803
libsoup
03c91c76daf70ee227f38304c5e45a155f45073d
https://git.gnome.org/browse/libsoup
https://git.gnome.org/browse/libsoup/commit/?id=03c91c76daf70ee227f38304c5e45a155f45073d
Fix chunked decoding buffer overrun (CVE-2017-2885) https://bugzilla.gnome.org/show_bug.cgi?id=785774
1
soup_filter_input_stream_read_until (SoupFilterInputStream *fstream, void *buffer, gsize length, const void *boundary, gsize boundary_length, gboolean blocking, gboolean ...
223,856,053,800,442,820,000,000,000,000,000,000,000
soup-filter-input-stream.c
152,379,515,170,284,980,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2017-2885
An exploitable stack based buffer overflow vulnerability exists in the GNOME libsoup 2.58. A specially crafted HTTP request can cause a stack overflow resulting in remote code execution. An attacker can send a special HTTP request to the vulnerable server to trigger this vulnerability.
https://nvd.nist.gov/vuln/detail/CVE-2017-2885
462,113
libsoup
03c91c76daf70ee227f38304c5e45a155f45073d
https://git.gnome.org/browse/libsoup
https://git.gnome.org/browse/libsoup/commit/?id=03c91c76daf70ee227f38304c5e45a155f45073d
Fix chunked decoding buffer overrun (CVE-2017-2885) https://bugzilla.gnome.org/show_bug.cgi?id=785774
0
soup_filter_input_stream_read_until (SoupFilterInputStream *fstream, void *buffer, gsize length, const void *boundary, gsize boundary_length, gboolean blocking, gboolean ...
298,831,297,658,989,550,000,000,000,000,000,000,000
soup-filter-input-stream.c
335,202,112,150,275,000,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2017-2885
An exploitable stack based buffer overflow vulnerability exists in the GNOME libsoup 2.58. A specially crafted HTTP request can cause a stack overflow resulting in remote code execution. An attacker can send a special HTTP request to the vulnerable server to trigger this vulnerability.
https://nvd.nist.gov/vuln/detail/CVE-2017-2885
212,804
polarssl
43c3b28ca6d22f51951e2bd563df039a9f4289ab
https://github.com/polarssl/polarssl
https://github.com/polarssl/polarssl/commit/43c3b28ca6d22f51951e2bd563df039a9f4289ab
Fix memory leak with crafted ClientHello
1
static int ssl_parse_supported_elliptic_curves( ssl_context *ssl, const unsigned char *buf, size_t len ) { size_t list_size, our_size; const unsigned char *p; const ecp_curve_info *curve_info, **curves; list...
19,281,647,697,153,342,000,000,000,000,000,000,000
ssl_srv.c
19,217,237,288,979,294,000,000,000,000,000,000,000
[ "CWE-310" ]
CVE-2014-8627
PolarSSL 1.3.8 does not properly negotiate the signature algorithm to use, which allows remote attackers to conduct downgrade attacks via unspecified vectors.
https://nvd.nist.gov/vuln/detail/CVE-2014-8627
462,116
polarssl
43c3b28ca6d22f51951e2bd563df039a9f4289ab
https://github.com/polarssl/polarssl
https://github.com/polarssl/polarssl/commit/43c3b28ca6d22f51951e2bd563df039a9f4289ab
Fix memory leak with crafted ClientHello
0
static int ssl_parse_supported_elliptic_curves( ssl_context *ssl, const unsigned char *buf, size_t len ) { size_t list_size, our_size; const unsigned char *p; const ecp_curve_info *curve_info, **curves; list...
27,082,270,316,658,830,000,000,000,000,000,000,000
ssl_srv.c
88,807,754,252,793,770,000,000,000,000,000,000,000
[ "CWE-310" ]
CVE-2014-8627
PolarSSL 1.3.8 does not properly negotiate the signature algorithm to use, which allows remote attackers to conduct downgrade attacks via unspecified vectors.
https://nvd.nist.gov/vuln/detail/CVE-2014-8627
212,809
ImageMagick6
e3417aebe17cbe274b7361aa92c83226ca5b646b
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/e3417aebe17cbe274b7361aa92c83226ca5b646b
https://github.com/ImageMagick/ImageMagick/issues/1533
1
static void SVGEndElement(void *context,const xmlChar *name) { SVGInfo *svg_info; /* Called when the end of an element has been detected. */ (void) LogMagickEvent(CoderEvent,GetMagickModule(), " SAX.endElement(%s)",name); svg_info=(SVGInfo *) context; if (strchr((char *) name,':') != (char *) ...
305,655,169,467,543,600,000,000,000,000,000,000,000
svg.c
71,181,619,643,884,470,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2019-10649
In ImageMagick 7.0.8-36 Q16, there is a memory leak in the function SVGKeyValuePairs of coders/svg.c, which allows an attacker to cause a denial of service via a crafted image file.
https://nvd.nist.gov/vuln/detail/CVE-2019-10649
462,162
ImageMagick6
e3417aebe17cbe274b7361aa92c83226ca5b646b
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/e3417aebe17cbe274b7361aa92c83226ca5b646b
https://github.com/ImageMagick/ImageMagick/issues/1533
0
static void SVGEndElement(void *context,const xmlChar *name) { SVGInfo *svg_info; /* Called when the end of an element has been detected. */ (void) LogMagickEvent(CoderEvent,GetMagickModule(), " SAX.endElement(%s)",name); svg_info=(SVGInfo *) context; if (strchr((char *) name,':') != (char *) ...
154,819,241,464,357,260,000,000,000,000,000,000,000
svg.c
90,153,729,459,103,800,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2019-10649
In ImageMagick 7.0.8-36 Q16, there is a memory leak in the function SVGKeyValuePairs of coders/svg.c, which allows an attacker to cause a denial of service via a crafted image file.
https://nvd.nist.gov/vuln/detail/CVE-2019-10649
212,817
libgadu
23644f1fb8219031b3cac93289a588b05f90226b
https://github.com/wojtekka/libgadu
https://github.com/wojtekka/libgadu/commit/23644f1fb8219031b3cac93289a588b05f90226b
Poprawka ograniczania długości opisu.
1
int gg_change_status_descr(struct gg_session *sess, int status, const char *descr) { struct gg_new_status80 p; char *gen_descr = NULL; int descr_len = 0; int res; gg_debug_session(sess, GG_DEBUG_FUNCTION, "** gg_change_status_descr(%p, %d, \"%s\");\n", sess, status, descr); if (!sess) { errno = EFAULT; retu...
52,558,162,295,730,960,000,000,000,000,000,000,000
libgadu.c
81,201,636,615,844,880,000,000,000,000,000,000,000
[ "CWE-310" ]
CVE-2013-4488
libgadu before 1.12.0 does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers.
https://nvd.nist.gov/vuln/detail/CVE-2013-4488
462,182
libgadu
23644f1fb8219031b3cac93289a588b05f90226b
https://github.com/wojtekka/libgadu
https://github.com/wojtekka/libgadu/commit/23644f1fb8219031b3cac93289a588b05f90226b
Poprawka ograniczania długości opisu.
0
int gg_change_status_descr(struct gg_session *sess, int status, const char *descr) { struct gg_new_status80 p; char *gen_descr = NULL; int descr_len = 0; int descr_null_len = 0; int res; gg_debug_session(sess, GG_DEBUG_FUNCTION, "** gg_change_status_descr(%p, %d, \"%s\");\n", sess, status, descr); if (!sess) {...
54,318,144,512,359,780,000,000,000,000,000,000,000
libgadu.c
7,036,706,736,689,006,000,000,000,000,000,000,000
[ "CWE-310" ]
CVE-2013-4488
libgadu before 1.12.0 does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers.
https://nvd.nist.gov/vuln/detail/CVE-2013-4488
212,827
linux
ffdde5932042600c6807d46c1550b28b0db6a3bc
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ffdde5932042600c6807d46c1550b28b0db6a3bc
crypto: user - fix memory leak in crypto_report In crypto_report, a new skb is created via nlmsg_new(). This skb should be released if crypto_report_alg() fails. Fixes: a38f7907b926 ("crypto: Add userspace configuration API") Cc: <stable@vger.kernel.org> Signed-off-by: Navid Emamdoost <navid.emamdoost@gmail.com> Sign...
1
static int crypto_report(struct sk_buff *in_skb, struct nlmsghdr *in_nlh, struct nlattr **attrs) { struct net *net = sock_net(in_skb->sk); struct crypto_user_alg *p = nlmsg_data(in_nlh); struct crypto_alg *alg; struct sk_buff *skb; struct crypto_dump_info info; int err; if (!null_terminated(p->cru_name) || ...
331,177,297,209,783,760,000,000,000,000,000,000,000
crypto_user_base.c
247,977,527,893,476,060,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2019-19062
A memory leak in the crypto_report() function in crypto/crypto_user_base.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering crypto_report_alg() failures, aka CID-ffdde5932042.
https://nvd.nist.gov/vuln/detail/CVE-2019-19062
462,357
linux
ffdde5932042600c6807d46c1550b28b0db6a3bc
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ffdde5932042600c6807d46c1550b28b0db6a3bc
crypto: user - fix memory leak in crypto_report In crypto_report, a new skb is created via nlmsg_new(). This skb should be released if crypto_report_alg() fails. Fixes: a38f7907b926 ("crypto: Add userspace configuration API") Cc: <stable@vger.kernel.org> Signed-off-by: Navid Emamdoost <navid.emamdoost@gmail.com> Sign...
0
static int crypto_report(struct sk_buff *in_skb, struct nlmsghdr *in_nlh, struct nlattr **attrs) { struct net *net = sock_net(in_skb->sk); struct crypto_user_alg *p = nlmsg_data(in_nlh); struct crypto_alg *alg; struct sk_buff *skb; struct crypto_dump_info info; int err; if (!null_terminated(p->cru_name) || ...
96,555,276,455,737,560,000,000,000,000,000,000,000
crypto_user_base.c
260,285,007,421,737,100,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2019-19062
A memory leak in the crypto_report() function in crypto/crypto_user_base.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering crypto_report_alg() failures, aka CID-ffdde5932042.
https://nvd.nist.gov/vuln/detail/CVE-2019-19062
212,828
oniguruma
410f5916429e7d2920e1d4867388514f605413b8
https://github.com/kkos/oniguruma
https://github.com/kkos/oniguruma/commit/410f5916429e7d2920e1d4867388514f605413b8
fix #87: Read unknown address in onig_error_code_to_str()
1
onig_compile(regex_t* reg, const UChar* pattern, const UChar* pattern_end, OnigErrorInfo* einfo) { #define COMPILE_INIT_SIZE 20 int r, init_size; Node* root; ScanEnv scan_env; #ifdef USE_CALL UnsetAddrList uslist; #endif root = 0; if (IS_NOT_NULL(einfo)) einfo->par = (UChar* )NULL; #ifde...
322,025,196,922,490,200,000,000,000,000,000,000,000
regcomp.c
56,836,080,177,363,560,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2019-16161
Onigmo through 6.2.0 has a NULL pointer dereference in onig_error_code_to_str because of fetch_token in regparse.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-16161
462,359
oniguruma
410f5916429e7d2920e1d4867388514f605413b8
https://github.com/kkos/oniguruma
https://github.com/kkos/oniguruma/commit/410f5916429e7d2920e1d4867388514f605413b8
fix #87: Read unknown address in onig_error_code_to_str()
0
onig_compile(regex_t* reg, const UChar* pattern, const UChar* pattern_end, OnigErrorInfo* einfo) { #define COMPILE_INIT_SIZE 20 int r, init_size; Node* root; ScanEnv scan_env; #ifdef USE_CALL UnsetAddrList uslist; #endif root = 0; if (IS_NOT_NULL(einfo)) { einfo->enc = reg->enc; e...
189,277,875,437,065,980,000,000,000,000,000,000,000
regcomp.c
30,592,731,921,158,280,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2019-16161
Onigmo through 6.2.0 has a NULL pointer dereference in onig_error_code_to_str because of fetch_token in regparse.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-16161
212,858
vim
bd228fd097b41a798f90944b5d1245eddd484142
https://github.com/vim/vim
https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142
patch 8.2.3669: buffer overflow with long help argument Problem: Buffer overflow with long help argument. Solution: Use snprintf().
1
find_help_tags( char_u *arg, int *num_matches, char_u ***matches, int keep_lang) { char_u *s, *d; int i; // Specific tags that either have a specific replacement or won't go // through the generic rules. static char *(except_tbl[][2]) = { {"*", "star"}, {"g*", "gstar"}, {"[*"...
45,416,759,232,890,300,000,000,000,000,000,000,000
help.c
74,559,540,649,927,420,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2021-4019
vim is vulnerable to Heap-based Buffer Overflow
https://nvd.nist.gov/vuln/detail/CVE-2021-4019
462,521
vim
bd228fd097b41a798f90944b5d1245eddd484142
https://github.com/vim/vim
https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142
patch 8.2.3669: buffer overflow with long help argument Problem: Buffer overflow with long help argument. Solution: Use snprintf().
0
find_help_tags( char_u *arg, int *num_matches, char_u ***matches, int keep_lang) { char_u *s, *d; int i; // Specific tags that either have a specific replacement or won't go // through the generic rules. static char *(except_tbl[][2]) = { {"*", "star"}, {"g*", "gstar"}, {"[*"...
234,928,037,318,688,400,000,000,000,000,000,000,000
help.c
176,062,616,311,754,780,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2021-4019
vim is vulnerable to Heap-based Buffer Overflow
https://nvd.nist.gov/vuln/detail/CVE-2021-4019
212,874
linux
1165affd484889d4986cf3b724318935a0b120d8
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1165affd484889d4986cf3b724318935a0b120d8
net: mac802154: Fix general protection fault syzbot found general protection fault in crypto_destroy_tfm()[1]. It was caused by wrong clean up loop in llsec_key_alloc(). If one of the tfm array members is in IS_ERR() range it will cause general protection fault in clean up function [1]. Call Trace: crypto_free_aead ...
1
llsec_key_alloc(const struct ieee802154_llsec_key *template) { const int authsizes[3] = { 4, 8, 16 }; struct mac802154_llsec_key *key; int i; key = kzalloc(sizeof(*key), GFP_KERNEL); if (!key) return NULL; kref_init(&key->ref); key->key = *template; BUILD_BUG_ON(ARRAY_SIZE(authsizes) != ARRAY_SIZE(key->tfm...
61,223,531,701,870,330,000,000,000,000,000,000,000
llsec.c
119,290,437,240,260,140,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2021-33033
The Linux kernel before 5.11.14 has a use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO refcounting for the DOI definitions is mishandled, aka CID-ad5d07f4a9cd. This leads to writing an arbitrary value.
https://nvd.nist.gov/vuln/detail/CVE-2021-33033
462,609
linux
1165affd484889d4986cf3b724318935a0b120d8
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1165affd484889d4986cf3b724318935a0b120d8
net: mac802154: Fix general protection fault syzbot found general protection fault in crypto_destroy_tfm()[1]. It was caused by wrong clean up loop in llsec_key_alloc(). If one of the tfm array members is in IS_ERR() range it will cause general protection fault in clean up function [1]. Call Trace: crypto_free_aead ...
0
llsec_key_alloc(const struct ieee802154_llsec_key *template) { const int authsizes[3] = { 4, 8, 16 }; struct mac802154_llsec_key *key; int i; key = kzalloc(sizeof(*key), GFP_KERNEL); if (!key) return NULL; kref_init(&key->ref); key->key = *template; BUILD_BUG_ON(ARRAY_SIZE(authsizes) != ARRAY_SIZE(key->tfm...
230,484,607,536,439,250,000,000,000,000,000,000,000
llsec.c
321,340,577,738,029,480,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2021-33033
The Linux kernel before 5.11.14 has a use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO refcounting for the DOI definitions is mishandled, aka CID-ad5d07f4a9cd. This leads to writing an arbitrary value.
https://nvd.nist.gov/vuln/detail/CVE-2021-33033
212,879
net
c88507fbad8055297c1d1e21e599f46960cbee39
https://git.kernel.org/cgit/linux/kernel/git/davem/net
https://git.kernel.org/cgit/linux/kernel/git/davem/net.git/commit/?id=c88507fbad8055297c1d1e21e599f46960cbee39
ipv6: don't set DST_NOCOUNT for remotely added routes DST_NOCOUNT should only be used if an authorized user adds routes locally. In case of routes which are added on behalf of router advertisments this flag must not get used as it allows an unlimited number of routes getting added remotely. Signed-off-by: Sabrina Dub...
1
int ip6_route_add(struct fib6_config *cfg) { int err; struct net *net = cfg->fc_nlinfo.nl_net; struct rt6_info *rt = NULL; struct net_device *dev = NULL; struct inet6_dev *idev = NULL; struct fib6_table *table; int addr_type; if (cfg->fc_dst_len > 128 || cfg->fc_src_len > 128) return -EINVAL; #ifndef CONFIG_...
218,526,539,286,029,770,000,000,000,000,000,000,000
route.c
142,831,214,030,740,490,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2014-2309
The ip6_route_add function in net/ipv6/route.c in the Linux kernel through 3.13.6 does not properly count the addition of routes, which allows remote attackers to cause a denial of service (memory consumption) via a flood of ICMPv6 Router Advertisement packets.
https://nvd.nist.gov/vuln/detail/CVE-2014-2309
462,645
net
c88507fbad8055297c1d1e21e599f46960cbee39
https://git.kernel.org/cgit/linux/kernel/git/davem/net
https://git.kernel.org/cgit/linux/kernel/git/davem/net.git/commit/?id=c88507fbad8055297c1d1e21e599f46960cbee39
ipv6: don't set DST_NOCOUNT for remotely added routes DST_NOCOUNT should only be used if an authorized user adds routes locally. In case of routes which are added on behalf of router advertisments this flag must not get used as it allows an unlimited number of routes getting added remotely. Signed-off-by: Sabrina Dub...
0
int ip6_route_add(struct fib6_config *cfg) { int err; struct net *net = cfg->fc_nlinfo.nl_net; struct rt6_info *rt = NULL; struct net_device *dev = NULL; struct inet6_dev *idev = NULL; struct fib6_table *table; int addr_type; if (cfg->fc_dst_len > 128 || cfg->fc_src_len > 128) return -EINVAL; #ifndef CONFIG_...
72,403,176,821,934,220,000,000,000,000,000,000,000
route.c
193,709,601,889,154,940,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2014-2309
The ip6_route_add function in net/ipv6/route.c in the Linux kernel through 3.13.6 does not properly count the addition of routes, which allows remote attackers to cause a denial of service (memory consumption) via a flood of ICMPv6 Router Advertisement packets.
https://nvd.nist.gov/vuln/detail/CVE-2014-2309
212,885
OpenSC
c3f23b836e5a1766c36617fe1da30d22f7b63de2
https://github.com/OpenSC/OpenSC
https://github.com/OpenSC/OpenSC/commit/c3f23b836e5a1766c36617fe1da30d22f7b63de2
fixed UNKNOWN READ Reported by OSS-Fuzz https://oss-fuzz.com/testcase-detail/5681169970757632
1
static void parse_sec_attr_44(sc_file_t *file, const u8 *buf, size_t len) { /* OpenSc Operation values for each command operation-type */ const int df_idx[8] = { /* byte 1 = OpenSC type of AC Bit0, byte 2 = OpenSC type of AC Bit1 ...*/ SC_AC_OP_DELETE, SC_AC_OP_CREATE, SC_AC_OP_CREATE, SC_AC_OP_INVALIDATE, SC_A...
162,923,410,164,677,990,000,000,000,000,000,000,000
card-setcos.c
240,645,253,339,991,560,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-19479
An issue was discovered in OpenSC through 0.19.0 and 0.20.x through 0.20.0-rc3. libopensc/card-setcos.c has an incorrect read operation during parsing of a SETCOS file attribute.
https://nvd.nist.gov/vuln/detail/CVE-2019-19479
462,735
OpenSC
c3f23b836e5a1766c36617fe1da30d22f7b63de2
https://github.com/OpenSC/OpenSC
https://github.com/OpenSC/OpenSC/commit/c3f23b836e5a1766c36617fe1da30d22f7b63de2
fixed UNKNOWN READ Reported by OSS-Fuzz https://oss-fuzz.com/testcase-detail/5681169970757632
0
static void parse_sec_attr_44(sc_file_t *file, const u8 *buf, size_t len) { /* OpenSc Operation values for each command operation-type */ const int df_idx[8] = { /* byte 1 = OpenSC type of AC Bit0, byte 2 = OpenSC type of AC Bit1 ...*/ SC_AC_OP_DELETE, SC_AC_OP_CREATE, SC_AC_OP_CREATE, SC_AC_OP_INVALIDATE, SC_A...
120,970,071,095,903,630,000,000,000,000,000,000,000
card-setcos.c
164,206,860,005,614,020,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-19479
An issue was discovered in OpenSC through 0.19.0 and 0.20.x through 0.20.0-rc3. libopensc/card-setcos.c has an incorrect read operation during parsing of a SETCOS file attribute.
https://nvd.nist.gov/vuln/detail/CVE-2019-19479
212,887
ghostpdl
89f58f1aa95b3482cadf6977da49457194ee5358
https://github.com/ArtifexSoftware/ghostpdl
https://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=89f58f1aa95b3482cadf6977da49457194ee5358
Bug 701794: check for x_dpi out of range in epsc_print_page(). Avoids out-of-bounds of local arrays graphics_modes_9 and graphics_modes_24. Larger diff than would like, because can't return error from within declarations in old-style C. Fixes: ./sanbin/gs -r680 -sOutputFile=tmp -sDEVICE=epsonc ../bug-701794.pdf
1
epsc_print_page(gx_device_printer * pdev, gp_file * prn_stream) { static int graphics_modes_9[5] = { -1, 0 /*60 */ , 1 /*120 */ , -1, DD + 3 /*240 */ }; static int graphics_modes_24[7] = { -1, 32 /*60 */ , 33 /*120 */ , 39 /*180 */ , -1, -1, DD + 40 /*360 */ }; int y_24pin =...
256,349,240,224,754,140,000,000,000,000,000,000,000
gdevepsc.c
133,999,618,454,041,850,000,000,000,000,000,000,000
[ "CWE-120" ]
CVE-2020-16294
A buffer overflow vulnerability in epsc_print_page() in devices/gdevepsc.c of Artifex Software GhostScript v9.50 allows a remote attacker to cause a denial of service via a crafted PDF file. This is fixed in v9.51.
https://nvd.nist.gov/vuln/detail/CVE-2020-16294
462,763
ghostpdl
89f58f1aa95b3482cadf6977da49457194ee5358
https://github.com/ArtifexSoftware/ghostpdl
https://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=89f58f1aa95b3482cadf6977da49457194ee5358
Bug 701794: check for x_dpi out of range in epsc_print_page(). Avoids out-of-bounds of local arrays graphics_modes_9 and graphics_modes_24. Larger diff than would like, because can't return error from within declarations in old-style C. Fixes: ./sanbin/gs -r680 -sOutputFile=tmp -sDEVICE=epsonc ../bug-701794.pdf
0
epsc_print_page(gx_device_printer * pdev, gp_file * prn_stream) { static int graphics_modes_9[5] = { -1, 0 /*60 */ , 1 /*120 */ , -1, DD + 3 /*240 */ }; static int graphics_modes_24[7] = { -1, 32 /*60 */ , 33 /*120 */ , 39 /*180 */ , -1, -1, DD + 40 /*360 */ }; int y_24pin =...
26,451,443,670,338,345,000,000,000,000,000,000,000
gdevepsc.c
272,775,599,030,029,700,000,000,000,000,000,000,000
[ "CWE-120" ]
CVE-2020-16294
A buffer overflow vulnerability in epsc_print_page() in devices/gdevepsc.c of Artifex Software GhostScript v9.50 allows a remote attacker to cause a denial of service via a crafted PDF file. This is fixed in v9.51.
https://nvd.nist.gov/vuln/detail/CVE-2020-16294
212,911
bro
6c0f101a62489b1c5927b4ed63b0e1d37db40282
https://github.com/bro/bro
https://github.com/bro/bro/commit/6c0f101a62489b1c5927b4ed63b0e1d37db40282
Patch OOB write in content-line analyzer. A combination of packets can trigger an out of bound write of '0' byte in the content-line analyzer. This bug was found by Frank Meier. Addresses BIT-1856.
1
int ContentLine_Analyzer::DoDeliverOnce(int len, const u_char* data) { const u_char* data_start = data; if ( len <= 0 ) return 0; for ( ; len > 0; --len, ++data ) { if ( offset >= buf_len ) InitBuffer(buf_len * 2); int c = data[0]; #define EMIT_LINE \ { \ buf[offset] = '\0'; \ int seq_len = data +...
339,282,338,437,946,330,000,000,000,000,000,000,000
ContentLine.cc
23,429,505,821,233,743,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2017-1000458
Bro before Bro v2.5.2 is vulnerable to an out of bounds write in the ContentLine analyzer allowing remote attackers to cause a denial of service (crash) and possibly other exploitation.
https://nvd.nist.gov/vuln/detail/CVE-2017-1000458
462,972
bro
6c0f101a62489b1c5927b4ed63b0e1d37db40282
https://github.com/bro/bro
https://github.com/bro/bro/commit/6c0f101a62489b1c5927b4ed63b0e1d37db40282
Patch OOB write in content-line analyzer. A combination of packets can trigger an out of bound write of '0' byte in the content-line analyzer. This bug was found by Frank Meier. Addresses BIT-1856.
0
int ContentLine_Analyzer::DoDeliverOnce(int len, const u_char* data) { const u_char* data_start = data; if ( len <= 0 ) return 0; for ( ; len > 0; --len, ++data ) { if ( offset >= buf_len ) InitBuffer(buf_len * 2); int c = data[0]; #define EMIT_LINE \ { \ buf[offset] = '\0'; \ int seq_len = data +...
10,976,774,434,765,438,000,000,000,000,000,000,000
ContentLine.cc
65,864,717,905,079,620,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2017-1000458
Bro before Bro v2.5.2 is vulnerable to an out of bounds write in the ContentLine analyzer allowing remote attackers to cause a denial of service (crash) and possibly other exploitation.
https://nvd.nist.gov/vuln/detail/CVE-2017-1000458
212,912
net
967c05aee439e6e5d7d805e195b3a20ef5c433d6
https://git.kernel.org/cgit/linux/kernel/git/davem/net
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=967c05aee439e6e5d7d805e195b3a20ef5c433d6
tcp: enforce tcp_min_snd_mss in tcp_mtu_probing() If mtu probing is enabled tcp_mtu_probing() could very well end up with a too small MSS. Use the new sysctl tcp_min_snd_mss to make sure MSS search is performed in an acceptable range. CVE-2019-11479 -- tcp mss hardcoded to 48 Signed-off-by: Eric Dumazet <edumazet@g...
1
static void tcp_mtu_probing(struct inet_connection_sock *icsk, struct sock *sk) { const struct net *net = sock_net(sk); int mss; /* Black hole detection */ if (!net->ipv4.sysctl_tcp_mtu_probing) return; if (!icsk->icsk_mtup.enabled) { icsk->icsk_mtup.enabled = 1; icsk->icsk_mtup.probe_timestamp = tcp_jiffi...
162,019,764,588,633,300,000,000,000,000,000,000,000
tcp_timer.c
48,792,755,777,145,840,000,000,000,000,000,000,000
[ "CWE-770" ]
CVE-2019-11479
Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9...
https://nvd.nist.gov/vuln/detail/CVE-2019-11479
462,989
net
967c05aee439e6e5d7d805e195b3a20ef5c433d6
https://git.kernel.org/cgit/linux/kernel/git/davem/net
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=967c05aee439e6e5d7d805e195b3a20ef5c433d6
tcp: enforce tcp_min_snd_mss in tcp_mtu_probing() If mtu probing is enabled tcp_mtu_probing() could very well end up with a too small MSS. Use the new sysctl tcp_min_snd_mss to make sure MSS search is performed in an acceptable range. CVE-2019-11479 -- tcp mss hardcoded to 48 Signed-off-by: Eric Dumazet <edumazet@g...
0
static void tcp_mtu_probing(struct inet_connection_sock *icsk, struct sock *sk) { const struct net *net = sock_net(sk); int mss; /* Black hole detection */ if (!net->ipv4.sysctl_tcp_mtu_probing) return; if (!icsk->icsk_mtup.enabled) { icsk->icsk_mtup.enabled = 1; icsk->icsk_mtup.probe_timestamp = tcp_jiffi...
154,427,383,948,867,250,000,000,000,000,000,000,000
tcp_timer.c
279,387,289,703,828,880,000,000,000,000,000,000,000
[ "CWE-770" ]
CVE-2019-11479
Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9...
https://nvd.nist.gov/vuln/detail/CVE-2019-11479
212,913
tpm2-tools
c069e4f179d5e6653a84fb236816c375dca82515
https://github.com/tpm2-software/tpm2-tools
https://github.com/tpm2-software/tpm2-tools/commit/c069e4f179d5e6653a84fb236816c375dca82515
tpm2_import: fix fixed AES key CVE-2021-3565 tpm2_import used a fixed AES key for the inner wrapper, which means that a MITM attack would be able to unwrap the imported key. Even the use of an encrypted session will not prevent this. The TPM only encrypts the first parameter which is the fixed symmetric key. To fix t...
1
static tool_rc key_import(ESYS_CONTEXT *ectx, TPM2B_PUBLIC *parent_pub, TPM2B_SENSITIVE *privkey, TPM2B_PUBLIC *pubkey, TPM2B_ENCRYPTED_SECRET *encrypted_seed, TPM2B_PRIVATE **imported_private) { TPMI_ALG_HASH name_alg = pubkey->publicArea.nameAlg; TPM2B_DIGEST *seed = &privkey->sensit...
297,484,634,456,560,360,000,000,000,000,000,000,000
tpm2_import.c
101,937,757,596,075,250,000,000,000,000,000,000,000
[ "CWE-798" ]
CVE-2021-3565
A flaw was found in tpm2-tools in versions before 5.1.1 and before 4.3.2. tpm2_import used a fixed AES key for the inner wrapper, potentially allowing a MITM attacker to unwrap the inner portion and reveal the key being imported. The highest threat from this vulnerability is to data confidentiality.
https://nvd.nist.gov/vuln/detail/CVE-2021-3565
463,005
tpm2-tools
c069e4f179d5e6653a84fb236816c375dca82515
https://github.com/tpm2-software/tpm2-tools
https://github.com/tpm2-software/tpm2-tools/commit/c069e4f179d5e6653a84fb236816c375dca82515
tpm2_import: fix fixed AES key CVE-2021-3565 tpm2_import used a fixed AES key for the inner wrapper, which means that a MITM attack would be able to unwrap the imported key. Even the use of an encrypted session will not prevent this. The TPM only encrypts the first parameter which is the fixed symmetric key. To fix t...
0
static tool_rc key_import(ESYS_CONTEXT *ectx, TPM2B_PUBLIC *parent_pub, TPM2B_SENSITIVE *privkey, TPM2B_PUBLIC *pubkey, TPM2B_ENCRYPTED_SECRET *encrypted_seed, TPM2B_PRIVATE **imported_private) { TPMI_ALG_HASH name_alg = pubkey->publicArea.nameAlg; TPM2B_DIGEST *seed = &privkey->sensit...
130,260,837,979,574,550,000,000,000,000,000,000,000
tpm2_import.c
321,865,962,365,386,950,000,000,000,000,000,000,000
[ "CWE-798" ]
CVE-2021-3565
A flaw was found in tpm2-tools in versions before 5.1.1 and before 4.3.2. tpm2_import used a fixed AES key for the inner wrapper, potentially allowing a MITM attacker to unwrap the inner portion and reveal the key being imported. The highest threat from this vulnerability is to data confidentiality.
https://nvd.nist.gov/vuln/detail/CVE-2021-3565
212,933
linux
4ac2813cc867ae563a1ba5a9414bfb554e5796fa
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4ac2813cc867ae563a1ba5a9414bfb554e5796fa
cfg80211: wext: avoid copying malformed SSIDs Ensure the SSID element is bounds-checked prior to invoking memcpy() with its length field, when copying to userspace. Cc: <stable@vger.kernel.org> Cc: Kees Cook <keescook@chromium.org> Reported-by: Nicolas Waisman <nico@semmle.com> Signed-off-by: Will Deacon <will@kernel...
1
int cfg80211_mgd_wext_giwessid(struct net_device *dev, struct iw_request_info *info, struct iw_point *data, char *ssid) { struct wireless_dev *wdev = dev->ieee80211_ptr; /* call only for station! */ if (WARN_ON(wdev->iftype != NL80211_IFTYPE_STATION)) return -EINVAL; data->flags = 0; wdev_...
126,387,012,493,135,560,000,000,000,000,000,000,000
None
null
[ "CWE-120" ]
CVE-2019-17133
In the Linux kernel through 5.3.2, cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c does not reject a long SSID IE, leading to a Buffer Overflow.
https://nvd.nist.gov/vuln/detail/CVE-2019-17133
463,103
linux
4ac2813cc867ae563a1ba5a9414bfb554e5796fa
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4ac2813cc867ae563a1ba5a9414bfb554e5796fa
cfg80211: wext: avoid copying malformed SSIDs Ensure the SSID element is bounds-checked prior to invoking memcpy() with its length field, when copying to userspace. Cc: <stable@vger.kernel.org> Cc: Kees Cook <keescook@chromium.org> Reported-by: Nicolas Waisman <nico@semmle.com> Signed-off-by: Will Deacon <will@kernel...
0
int cfg80211_mgd_wext_giwessid(struct net_device *dev, struct iw_request_info *info, struct iw_point *data, char *ssid) { struct wireless_dev *wdev = dev->ieee80211_ptr; int ret = 0; /* call only for station! */ if (WARN_ON(wdev->iftype != NL80211_IFTYPE_STATION)) return -EINVAL; data->flag...
145,800,217,300,860,140,000,000,000,000,000,000,000
None
null
[ "CWE-120" ]
CVE-2019-17133
In the Linux kernel through 5.3.2, cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c does not reject a long SSID IE, leading to a Buffer Overflow.
https://nvd.nist.gov/vuln/detail/CVE-2019-17133
212,939
linux
c3e2219216c92919a6bd1711f340f5faa98695e6
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c3e2219216c92919a6bd1711f340f5faa98695e6
block: free sched's request pool in blk_cleanup_queue In theory, IO scheduler belongs to request queue, and the request pool of sched tags belongs to the request queue too. However, the current tags allocation interfaces are re-used for both driver tags and sched tags, and driver tags is definitely host wide, and doe...
1
void blk_cleanup_queue(struct request_queue *q) { /* mark @q DYING, no new request or merges will be allowed afterwards */ mutex_lock(&q->sysfs_lock); blk_set_queue_dying(q); blk_queue_flag_set(QUEUE_FLAG_NOMERGES, q); blk_queue_flag_set(QUEUE_FLAG_NOXMERGES, q); blk_queue_flag_set(QUEUE_FLAG_DYING, q); mutex_u...
299,414,391,225,679,600,000,000,000,000,000,000,000
blk-core.c
307,759,575,717,776,740,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2019-25044
The block subsystem in the Linux kernel before 5.2 has a use-after-free that can lead to arbitrary code execution in the kernel context and privilege escalation, aka CID-c3e2219216c9. This is related to blk_mq_free_rqs and blk_cleanup_queue.
https://nvd.nist.gov/vuln/detail/CVE-2019-25044
463,367
linux
c3e2219216c92919a6bd1711f340f5faa98695e6
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c3e2219216c92919a6bd1711f340f5faa98695e6
block: free sched's request pool in blk_cleanup_queue In theory, IO scheduler belongs to request queue, and the request pool of sched tags belongs to the request queue too. However, the current tags allocation interfaces are re-used for both driver tags and sched tags, and driver tags is definitely host wide, and doe...
0
void blk_cleanup_queue(struct request_queue *q) { /* mark @q DYING, no new request or merges will be allowed afterwards */ mutex_lock(&q->sysfs_lock); blk_set_queue_dying(q); blk_queue_flag_set(QUEUE_FLAG_NOMERGES, q); blk_queue_flag_set(QUEUE_FLAG_NOXMERGES, q); blk_queue_flag_set(QUEUE_FLAG_DYING, q); mutex_u...
22,062,914,982,723,794,000,000,000,000,000,000,000
blk-core.c
229,285,566,276,992,670,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2019-25044
The block subsystem in the Linux kernel before 5.2 has a use-after-free that can lead to arbitrary code execution in the kernel context and privilege escalation, aka CID-c3e2219216c9. This is related to blk_mq_free_rqs and blk_cleanup_queue.
https://nvd.nist.gov/vuln/detail/CVE-2019-25044
212,954
clamav-devel
270e368b99e93aa5447d46c797c92c3f9f39f375
https://github.com/vrtadmin/clamav-devel
https://github.com/vrtadmin/clamav-devel/commit/270e368b99e93aa5447d46c797c92c3f9f39f375
libclamav: bb #7055
1
int cli_scanpe(cli_ctx *ctx) { uint16_t e_magic; /* DOS signature ("MZ") */ uint16_t nsections; uint32_t e_lfanew; /* address of new exe header */ uint32_t ep, vep; /* entry point (raw, virtual) */ uint8_t polipos = 0; time_t timestamp; struct pe_image_file_hdr file_hdr; union { struct pe_image_optional_h...
242,768,206,591,221,150,000,000,000,000,000,000,000
pe.c
261,544,086,954,434,900,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2013-2020
Integer underflow in the cli_scanpe function in pe.c in ClamAV before 0.97.8 allows remote attackers to cause a denial of service (crash) via a skewed offset larger than the size of the PE section in a UPX packed executable, which triggers an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2013-2020
463,473
clamav-devel
270e368b99e93aa5447d46c797c92c3f9f39f375
https://github.com/vrtadmin/clamav-devel
https://github.com/vrtadmin/clamav-devel/commit/270e368b99e93aa5447d46c797c92c3f9f39f375
libclamav: bb #7055
0
int cli_scanpe(cli_ctx *ctx) { uint16_t e_magic; /* DOS signature ("MZ") */ uint16_t nsections; uint32_t e_lfanew; /* address of new exe header */ uint32_t ep, vep; /* entry point (raw, virtual) */ uint8_t polipos = 0; time_t timestamp; struct pe_image_file_hdr file_hdr; union { struct pe_image_optional_h...
74,894,318,940,728,270,000,000,000,000,000,000,000
pe.c
67,995,944,480,765,990,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2013-2020
Integer underflow in the cli_scanpe function in pe.c in ClamAV before 0.97.8 allows remote attackers to cause a denial of service (crash) via a skewed offset larger than the size of the PE section in a UPX packed executable, which triggers an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2013-2020
212,956
FreeRDP
e7bffa64ef5ed70bac94f823e2b95262642f5296
https://github.com/FreeRDP/FreeRDP
https://github.com/FreeRDP/FreeRDP/commit/e7bffa64ef5ed70bac94f823e2b95262642f5296
Fixed OOB read in update_recv_secondary_order CVE-2020-4032 thanks to @antonio-morales for finding this.
1
static BOOL update_recv_secondary_order(rdpUpdate* update, wStream* s, BYTE flags) { BOOL rc = FALSE; size_t start, end, diff; BYTE orderType; UINT16 extraFlags; UINT16 orderLength; rdpContext* context = update->context; rdpSettings* settings = context->settings; rdpSecondaryUpdate* secondary = update->secondar...
75,350,048,413,078,990,000,000,000,000,000,000,000
orders.c
321,418,006,169,494,230,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2020-4032
In FreeRDP before version 2.1.2, there is an integer casting vulnerability in update_recv_secondary_order. All clients with +glyph-cache /relax-order-checks are affected. This is fixed in version 2.1.2.
https://nvd.nist.gov/vuln/detail/CVE-2020-4032
463,477
FreeRDP
e7bffa64ef5ed70bac94f823e2b95262642f5296
https://github.com/FreeRDP/FreeRDP
https://github.com/FreeRDP/FreeRDP/commit/e7bffa64ef5ed70bac94f823e2b95262642f5296
Fixed OOB read in update_recv_secondary_order CVE-2020-4032 thanks to @antonio-morales for finding this.
0
static BOOL update_recv_secondary_order(rdpUpdate* update, wStream* s, BYTE flags) { BOOL rc = FALSE; size_t start, end, diff; BYTE orderType; UINT16 extraFlags; UINT16 orderLength; rdpContext* context = update->context; rdpSettings* settings = context->settings; rdpSecondaryUpdate* secondary = update->secondar...
336,960,125,205,484,230,000,000,000,000,000,000,000
orders.c
258,210,390,610,585,420,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2020-4032
In FreeRDP before version 2.1.2, there is an integer casting vulnerability in update_recv_secondary_order. All clients with +glyph-cache /relax-order-checks are affected. This is fixed in version 2.1.2.
https://nvd.nist.gov/vuln/detail/CVE-2020-4032
212,957
rsyslog
8083bd1433449fd2b1b79bf759f782e0f64c0cd2
https://github.com/rsyslog/rsyslog
http://git.adiscon.com/?p=rsyslog.git;a=commitdiff;h=8083bd1433449fd2b1b79bf759f782e0f64c0cd2
backporting abort condition fix from 5.7.7
1
msg_t* MsgDup(msg_t* pOld) { msg_t* pNew; rsRetVal localRet; assert(pOld != NULL); BEGINfunc if(msgConstructWithTime(&pNew, &pOld->tTIMESTAMP, pOld->ttGenTime) != RS_RET_OK) { return NULL; } /* now copy the message properties */ pNew->iRefCount = 1; pNew->iSeverity = pOld->iSeverity; pNew->iFacility = pO...
38,447,447,355,937,923,000,000,000,000,000,000,000
msg.c
236,170,792,906,567,050,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2011-1488
A memory leak in rsyslog before 5.7.6 was found in the way deamon processed log messages are logged when $RepeatedMsgReduction was enabled. A local attacker could use this flaw to cause a denial of the rsyslogd daemon service by crashing the service via a sequence of repeated log messages sent within short periods of t...
https://nvd.nist.gov/vuln/detail/CVE-2011-1488
463,505
rsyslog
8083bd1433449fd2b1b79bf759f782e0f64c0cd2
https://github.com/rsyslog/rsyslog
http://git.adiscon.com/?p=rsyslog.git;a=commitdiff;h=8083bd1433449fd2b1b79bf759f782e0f64c0cd2
backporting abort condition fix from 5.7.7
0
msg_t* MsgDup(msg_t* pOld) { msg_t* pNew; rsRetVal localRet; assert(pOld != NULL); BEGINfunc if(msgConstructWithTime(&pNew, &pOld->tTIMESTAMP, pOld->ttGenTime) != RS_RET_OK) { return NULL; } /* now copy the message properties */ pNew->iRefCount = 1; pNew->iSeverity = pOld->iSeverity; pNew->iFacility = pO...
303,464,741,070,204,200,000,000,000,000,000,000,000
msg.c
214,809,094,490,159,400,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2011-1488
A memory leak in rsyslog before 5.7.6 was found in the way deamon processed log messages are logged when $RepeatedMsgReduction was enabled. A local attacker could use this flaw to cause a denial of the rsyslogd daemon service by crashing the service via a sequence of repeated log messages sent within short periods of t...
https://nvd.nist.gov/vuln/detail/CVE-2011-1488
212,959
jasper
a632c6b54bd4ffc3bebab420e00b7e7688aa3846
https://github.com/mdadams/jasper
https://github.com/mdadams/jasper/commit/a632c6b54bd4ffc3bebab420e00b7e7688aa3846
Fixed a problem in the JP2 encoder that caused a null pointer dereference when no ICC profile data is available (e.g., in the case of an unknown color space). Reference: https://github.com/mdadams/jasper/issues/109
1
int jp2_encode(jas_image_t *image, jas_stream_t *out, const char *optstr) { jp2_box_t *box; jp2_ftyp_t *ftyp; jp2_ihdr_t *ihdr; jas_stream_t *tmpstream; int allcmptssame; jp2_bpcc_t *bpcc; long len; uint_fast16_t cmptno; jp2_colr_t *colr; char buf[4096]; uint_fast32_t overhead; jp2_cdefchan_t *cdefchanent; ...
283,002,192,855,055,500,000,000,000,000,000,000,000
jp2_enc.c
277,327,681,804,300,000,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2016-9600
JasPer before version 2.0.10 is vulnerable to a null pointer dereference was found in the decoded creation of JPEG 2000 image files. A specially crafted file could cause an application using JasPer to crash.
https://nvd.nist.gov/vuln/detail/CVE-2016-9600
463,596
jasper
a632c6b54bd4ffc3bebab420e00b7e7688aa3846
https://github.com/mdadams/jasper
https://github.com/mdadams/jasper/commit/a632c6b54bd4ffc3bebab420e00b7e7688aa3846
Fixed a problem in the JP2 encoder that caused a null pointer dereference when no ICC profile data is available (e.g., in the case of an unknown color space). Reference: https://github.com/mdadams/jasper/issues/109
0
int jp2_encode(jas_image_t *image, jas_stream_t *out, const char *optstr) { jp2_box_t *box; jp2_ftyp_t *ftyp; jp2_ihdr_t *ihdr; jas_stream_t *tmpstream; int allcmptssame; jp2_bpcc_t *bpcc; long len; uint_fast16_t cmptno; jp2_colr_t *colr; char buf[4096]; uint_fast32_t overhead; jp2_cdefchan_t *cdefchanent; ...
73,625,620,877,222,120,000,000,000,000,000,000,000
jp2_enc.c
50,479,229,642,450,790,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2016-9600
JasPer before version 2.0.10 is vulnerable to a null pointer dereference was found in the decoded creation of JPEG 2000 image files. A specially crafted file could cause an application using JasPer to crash.
https://nvd.nist.gov/vuln/detail/CVE-2016-9600
213,012
linux
dea37a97265588da604c6ba80160a287b72c7bfd
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dea37a97265588da604c6ba80160a287b72c7bfd
media: cpia2: Fix use-after-free in cpia2_exit Syzkaller report this: BUG: KASAN: use-after-free in sysfs_remove_file_ns+0x5f/0x70 fs/sysfs/file.c:468 Read of size 8 at addr ffff8881f59a6b70 by task syz-executor.0/8363 CPU: 0 PID: 8363 Comm: syz-executor.0 Not tainted 5.0.0-rc8+ #3 Hardware name: QEMU Standard PC (i...
1
static int __init cpia2_init(void) { LOG("%s v%s\n", ABOUT, CPIA_VERSION); check_parameters(); cpia2_usb_init(); return 0; }
199,595,985,885,411,000,000,000,000,000,000,000,000
cpia2_v4l.c
30,625,613,206,588,183,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2019-19966
In the Linux kernel before 5.1.6, there is a use-after-free in cpia2_exit() in drivers/media/usb/cpia2/cpia2_v4l.c that will cause denial of service, aka CID-dea37a972655.
https://nvd.nist.gov/vuln/detail/CVE-2019-19966
464,120
linux
dea37a97265588da604c6ba80160a287b72c7bfd
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dea37a97265588da604c6ba80160a287b72c7bfd
media: cpia2: Fix use-after-free in cpia2_exit Syzkaller report this: BUG: KASAN: use-after-free in sysfs_remove_file_ns+0x5f/0x70 fs/sysfs/file.c:468 Read of size 8 at addr ffff8881f59a6b70 by task syz-executor.0/8363 CPU: 0 PID: 8363 Comm: syz-executor.0 Not tainted 5.0.0-rc8+ #3 Hardware name: QEMU Standard PC (i...
0
static int __init cpia2_init(void) { LOG("%s v%s\n", ABOUT, CPIA_VERSION); check_parameters(); return cpia2_usb_init(); }
6,863,731,982,989,870,000,000,000,000,000,000,000
cpia2_v4l.c
13,659,005,257,946,398,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2019-19966
In the Linux kernel before 5.1.6, there is a use-after-free in cpia2_exit() in drivers/media/usb/cpia2/cpia2_v4l.c that will cause denial of service, aka CID-dea37a972655.
https://nvd.nist.gov/vuln/detail/CVE-2019-19966
213,013
libtasn1
c593ae84cfcde8fea45787e53950e0ac71e9ca97
http://git.savannah.gnu.org/cgit/libtasn1
https://gitlab.com/gnutls/libtasn1/commit/c593ae84cfcde8fea45787e53950e0ac71e9ca97
_asn1_decode_simple_ber: restrict the levels of recursion to 3 On indefinite string decoding, setting a maximum level of recursions protects the BER decoder from a stack exhaustion due to large amounts of recursion. Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
1
_asn1_decode_simple_ber (unsigned int etype, const unsigned char *der, unsigned int _der_len, unsigned char **str, unsigned int *str_len, unsigned int *ber_len, unsigned dflags) { int tag_len, len_len; const unsigned char *p; int der_len = _der_len; uint8_t *total = NULL; unsigned total_size = 0; u...
130,866,319,515,982,600,000,000,000,000,000,000,000
decoding.c
137,056,243,522,745,000,000,000,000,000,000,000,000
[ "CWE-674" ]
CVE-2018-6003
An issue was discovered in the _asn1_decode_simple_ber function in decoding.c in GNU Libtasn1 before 4.13. Unlimited recursion in the BER decoder leads to stack exhaustion and DoS.
https://nvd.nist.gov/vuln/detail/CVE-2018-6003
464,151
libtasn1
c593ae84cfcde8fea45787e53950e0ac71e9ca97
http://git.savannah.gnu.org/cgit/libtasn1
https://gitlab.com/gnutls/libtasn1/commit/c593ae84cfcde8fea45787e53950e0ac71e9ca97
_asn1_decode_simple_ber: restrict the levels of recursion to 3 On indefinite string decoding, setting a maximum level of recursions protects the BER decoder from a stack exhaustion due to large amounts of recursion. Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
0
_asn1_decode_simple_ber (unsigned int etype, const unsigned char *der, unsigned int _der_len, unsigned char **str, unsigned int *str_len, unsigned int *ber_len, unsigned dflags) { int tag_len, len_len; const unsigned char *p; int der_len = _der_len; uint8_t *total = NULL; unsigned total_size = 0; u...
229,587,945,619,179,370,000,000,000,000,000,000,000
decoding.c
275,762,429,080,053,760,000,000,000,000,000,000,000
[ "CWE-674" ]
CVE-2018-6003
An issue was discovered in the _asn1_decode_simple_ber function in decoding.c in GNU Libtasn1 before 4.13. Unlimited recursion in the BER decoder leads to stack exhaustion and DoS.
https://nvd.nist.gov/vuln/detail/CVE-2018-6003
213,028
ImageMagick
32a3eeb9e0da083cbc05909e4935efdbf9846df9
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/32a3eeb9e0da083cbc05909e4935efdbf9846df9
https://github.com/ImageMagick/ImageMagick/issues/736
1
static Image *ReadTIFFImage(const ImageInfo *image_info, ExceptionInfo *exception) { const char *option; float *chromaticity, x_position, y_position, x_resolution, y_resolution; Image *image; int tiff_status; MagickBooleanType status; MagickSizeType number_pixe...
225,269,407,862,563,560,000,000,000,000,000,000,000
tiff.c
38,609,615,407,073,626,000,000,000,000,000,000,000
[ "CWE-770" ]
CVE-2017-18028
In ImageMagick 7.0.7-1 Q16, a memory exhaustion vulnerability was found in the function ReadTIFFImage in coders/tiff.c, which allow remote attackers to cause a denial of service via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2017-18028
464,939
ImageMagick
32a3eeb9e0da083cbc05909e4935efdbf9846df9
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/32a3eeb9e0da083cbc05909e4935efdbf9846df9
https://github.com/ImageMagick/ImageMagick/issues/736
0
static Image *ReadTIFFImage(const ImageInfo *image_info, ExceptionInfo *exception) { #define ThrowTIFFException(severity,message) \ { \ if (tiff_pixels != (unsigned char *) NULL) \ tiff_pixels=(unsigned char *) RelinquishMagickMemory(tiff_pixels); \ if (quantum_info != (QuantumInfo *) NULL) \ quantum_info...
11,985,471,224,312,960,000,000,000,000,000,000,000
tiff.c
288,512,354,266,271,200,000,000,000,000,000,000,000
[ "CWE-770" ]
CVE-2017-18028
In ImageMagick 7.0.7-1 Q16, a memory exhaustion vulnerability was found in the function ReadTIFFImage in coders/tiff.c, which allow remote attackers to cause a denial of service via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2017-18028
213,053
rsyslog
6bad782f154b7f838c7371bf99c13f6dc4ec4101
https://github.com/rsyslog/rsyslog
http://git.adiscon.com/?p=rsyslog.git;a=commit;h=6bad782f154b7f838c7371bf99c13f6dc4ec4101
bugfix: abort if imfile reads file line of more than 64KiB Thanks to Peter Eisentraut for reporting and analysing this problem. bug tracker: http://bugzilla.adiscon.com/show_bug.cgi?id=221
1
rsCStrExtendBuf(cstr_t *pThis, size_t iMinNeeded) { uchar *pNewBuf; unsigned short iNewSize; DEFiRet; /* first compute the new size needed */ if(iMinNeeded > RS_STRINGBUF_ALLOC_INCREMENT) { /* we allocate "n" ALLOC_INCREMENTs. Usually, that should * leave some room after the absolutely needed one. It also ...
233,364,396,247,559,780,000,000,000,000,000,000,000
stringbuf.c
35,120,055,056,983,420,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2011-4623
Integer overflow in the rsCStrExtendBuf function in runtime/stringbuf.c in the imfile module in rsyslog 4.x before 4.6.6, 5.x before 5.7.4, and 6.x before 6.1.4 allows local users to cause a denial of service (daemon hang) via a large file, which triggers a heap-based buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2011-4623
465,228
rsyslog
6bad782f154b7f838c7371bf99c13f6dc4ec4101
https://github.com/rsyslog/rsyslog
http://git.adiscon.com/?p=rsyslog.git;a=commit;h=6bad782f154b7f838c7371bf99c13f6dc4ec4101
bugfix: abort if imfile reads file line of more than 64KiB Thanks to Peter Eisentraut for reporting and analysing this problem. bug tracker: http://bugzilla.adiscon.com/show_bug.cgi?id=221
0
rsCStrExtendBuf(cstr_t *pThis, size_t iMinNeeded) { uchar *pNewBuf; size_t iNewSize; DEFiRet; /* first compute the new size needed */ if(iMinNeeded > RS_STRINGBUF_ALLOC_INCREMENT) { /* we allocate "n" ALLOC_INCREMENTs. Usually, that should * leave some room after the absolutely needed one. It also * reduc...
333,899,734,012,577,020,000,000,000,000,000,000,000
stringbuf.c
315,661,862,512,957,940,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2011-4623
Integer overflow in the rsCStrExtendBuf function in runtime/stringbuf.c in the imfile module in rsyslog 4.x before 4.6.6, 5.x before 5.7.4, and 6.x before 6.1.4 allows local users to cause a denial of service (daemon hang) via a large file, which triggers a heap-based buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2011-4623
213,072
ImageMagick
a5eeacb1bd5536f4f53f36e4ad6fa50b4b1261ca
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/a5eeacb1bd5536f4f53f36e4ad6fa50b4b1261ca
Added eps:fit-page to Phostscript reader.
1
static Image *ReadPSImage(const ImageInfo *image_info,ExceptionInfo *exception) { #define BoundingBox "BoundingBox:" #define BeginDocument "BeginDocument:" #define BeginXMPPacket "<?xpacket begin=" #define EndXMPPacket "<?xpacket end=" #define ICCProfile "BeginICCProfile:" #define CMYKCustomColor "CMYKCustomColor:...
56,596,652,814,527,820,000,000,000,000,000,000,000
ps.c
48,457,353,668,802,160,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2019-13137
ImageMagick before 7.0.8-50 has a memory leak vulnerability in the function ReadPSImage in coders/ps.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-13137
465,843
ImageMagick
a5eeacb1bd5536f4f53f36e4ad6fa50b4b1261ca
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/a5eeacb1bd5536f4f53f36e4ad6fa50b4b1261ca
Added eps:fit-page to Phostscript reader.
0
static Image *ReadPSImage(const ImageInfo *image_info,ExceptionInfo *exception) { #define BoundingBox "BoundingBox:" #define BeginDocument "BeginDocument:" #define BeginXMPPacket "<?xpacket begin=" #define EndXMPPacket "<?xpacket end=" #define ICCProfile "BeginICCProfile:" #define CMYKCustomColor "CMYKCustomColor:...
291,901,321,250,804,740,000,000,000,000,000,000,000
ps.c
18,863,238,558,082,112,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2019-13137
ImageMagick before 7.0.8-50 has a memory leak vulnerability in the function ReadPSImage in coders/ps.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-13137
213,073
ImageMagick6
e6103897fae2ed47e24b9cf7de719eea877b0504
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/e6103897fae2ed47e24b9cf7de719eea877b0504
https://github.com/ImageMagick/ImageMagick/issues/1518
1
static MagickBooleanType WriteJP2Image(const ImageInfo *image_info,Image *image) { const char *option, *property; int jp2_status; MagickBooleanType status; opj_codec_t *jp2_codec; OPJ_COLOR_SPACE jp2_colorspace; opj_cparameters_t parameters; opj_image_cmptparm_t jp2_i...
157,916,719,549,129,800,000,000,000,000,000,000,000
jp2.c
35,765,222,927,424,644,000,000,000,000,000,000,000
[ "CWE-665" ]
CVE-2019-12977
ImageMagick 7.0.8-34 has a "use of uninitialized value" vulnerability in the WriteJP2Image function in coders/jp2.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-12977
465,844
ImageMagick6
e6103897fae2ed47e24b9cf7de719eea877b0504
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/e6103897fae2ed47e24b9cf7de719eea877b0504
https://github.com/ImageMagick/ImageMagick/issues/1518
0
static MagickBooleanType WriteJP2Image(const ImageInfo *image_info,Image *image) { const char *option, *property; int jp2_status; MagickBooleanType status; opj_codec_t *jp2_codec; OPJ_COLOR_SPACE jp2_colorspace; opj_cparameters_t parameters; opj_image_cmptparm_t jp2_i...
11,326,046,920,813,226,000,000,000,000,000,000,000
jp2.c
200,293,031,995,505,000,000,000,000,000,000,000,000
[ "CWE-665" ]
CVE-2019-12977
ImageMagick 7.0.8-34 has a "use of uninitialized value" vulnerability in the WriteJP2Image function in coders/jp2.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-12977
213,108
libxslt
93bb314768aafaffad1df15bbee10b7c5423e283
http://git.gnome.org/browse/libxslt
https://gitlab.gnome.org/GNOME/libxslt/commit/93bb314768aafaffad1df15bbee10b7c5423e283
Fix dyn:map with namespace nodes exsltDynMapFunction didn't handle namespace nodes correctly. Namespace nodes are actually an xmlNs, not an xmlNode and must be special-cased. The old code initialized the doc pointer in the XPath context struct with a value read from past the end of the xmlNs struct. Typically, this r...
1
exsltDynMapFunction(xmlXPathParserContextPtr ctxt, int nargs) { xmlChar *str = NULL; xmlNodeSetPtr nodeset = NULL; xsltTransformContextPtr tctxt; xmlXPathCompExprPtr comp = NULL; xmlXPathObjectPtr ret = NULL; xmlDocPtr oldDoc, container = NULL; xmlNodePtr oldNode; int oldContextSize; ...
37,353,334,862,413,250,000,000,000,000,000,000,000
dynamic.c
74,547,985,951,933,110,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-4610
libxslt in Apple iOS before 9.3.3, OS X before 10.11.6, iTunes before 12.4.2 on Windows, iCloud before 5.2.1 on Windows, tvOS before 9.2.2, and watchOS before 2.2.2 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors, a different vulnera...
https://nvd.nist.gov/vuln/detail/CVE-2016-4610
465,902
libxslt
93bb314768aafaffad1df15bbee10b7c5423e283
http://git.gnome.org/browse/libxslt
https://gitlab.gnome.org/GNOME/libxslt/commit/93bb314768aafaffad1df15bbee10b7c5423e283
Fix dyn:map with namespace nodes exsltDynMapFunction didn't handle namespace nodes correctly. Namespace nodes are actually an xmlNs, not an xmlNode and must be special-cased. The old code initialized the doc pointer in the XPath context struct with a value read from past the end of the xmlNs struct. Typically, this r...
0
exsltDynMapFunction(xmlXPathParserContextPtr ctxt, int nargs) { xmlChar *str = NULL; xmlNodeSetPtr nodeset = NULL; xsltTransformContextPtr tctxt; xmlXPathCompExprPtr comp = NULL; xmlXPathObjectPtr ret = NULL; xmlDocPtr oldDoc, container = NULL; xmlNodePtr oldNode; int oldContextSize; ...
223,756,155,258,632,470,000,000,000,000,000,000,000
dynamic.c
63,755,527,805,678,780,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-4610
libxslt in Apple iOS before 9.3.3, OS X before 10.11.6, iTunes before 12.4.2 on Windows, iCloud before 5.2.1 on Windows, tvOS before 9.2.2, and watchOS before 2.2.2 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors, a different vulnera...
https://nvd.nist.gov/vuln/detail/CVE-2016-4610
213,114
linux
59c4bd853abcea95eccc167a7d7fd5f1a5f47b98
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/59c4bd853abcea95eccc167a7d7fd5f1a5f47b98
x86/fpu: Don't cache access to fpu_fpregs_owner_ctx The state/owner of the FPU is saved to fpu_fpregs_owner_ctx by pointing to the context that is currently loaded. It never changed during the lifetime of a task - it remained stable/constant. After deferred FPU registers loading until return to userland was implement...
1
static inline int fpregs_state_valid(struct fpu *fpu, unsigned int cpu) { return fpu == this_cpu_read_stable(fpu_fpregs_owner_ctx) && cpu == fpu->last_cpu; }
99,225,061,379,756,730,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2019-19602
fpregs_state_valid in arch/x86/include/asm/fpu/internal.h in the Linux kernel before 5.4.2, when GCC 9 is used, allows context-dependent attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact because of incorrect fpu_fpregs_owner_ctx caching, as demonstrated by mishandling ...
https://nvd.nist.gov/vuln/detail/CVE-2019-19602
465,994
linux
59c4bd853abcea95eccc167a7d7fd5f1a5f47b98
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/59c4bd853abcea95eccc167a7d7fd5f1a5f47b98
x86/fpu: Don't cache access to fpu_fpregs_owner_ctx The state/owner of the FPU is saved to fpu_fpregs_owner_ctx by pointing to the context that is currently loaded. It never changed during the lifetime of a task - it remained stable/constant. After deferred FPU registers loading until return to userland was implement...
0
static inline int fpregs_state_valid(struct fpu *fpu, unsigned int cpu) { return fpu == this_cpu_read(fpu_fpregs_owner_ctx) && cpu == fpu->last_cpu; }
143,004,928,851,986,950,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2019-19602
fpregs_state_valid in arch/x86/include/asm/fpu/internal.h in the Linux kernel before 5.4.2, when GCC 9 is used, allows context-dependent attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact because of incorrect fpu_fpregs_owner_ctx caching, as demonstrated by mishandling ...
https://nvd.nist.gov/vuln/detail/CVE-2019-19602
213,115
libgit2
e1832eb20a7089f6383cfce474f213157f5300cb
https://github.com/libgit2/libgit2
https://github.com/libgit2/libgit2/commit/e1832eb20a7089f6383cfce474f213157f5300cb
path: also guard `.gitmodules` against NTFS Alternate Data Streams We just safe-guarded `.git` against NTFS Alternate Data Stream-related attack vectors, and now it is time to do the same for `.gitmodules`. Note: In the added regression test, we refrain from verifying all kinds of variations between short names and N...
1
GIT_INLINE(bool) only_spaces_and_dots(const char *path) { const char *c = path; for (;; c++) { if (*c == '\0') return true; if (*c != ' ' && *c != '.') return false; } return true; }
307,376,985,168,460,540,000,000,000,000,000,000,000
path.c
177,778,740,681,567,300,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2020-12278
An issue was discovered in libgit2 before 0.28.4 and 0.9x before 0.99.0. path.c mishandles equivalent filenames that exist because of NTFS Alternate Data Streams. This may allow remote code execution when cloning a repository. This issue is similar to CVE-2019-1352.
https://nvd.nist.gov/vuln/detail/CVE-2020-12278
466,019
libgit2
e1832eb20a7089f6383cfce474f213157f5300cb
https://github.com/libgit2/libgit2
https://github.com/libgit2/libgit2/commit/e1832eb20a7089f6383cfce474f213157f5300cb
path: also guard `.gitmodules` against NTFS Alternate Data Streams We just safe-guarded `.git` against NTFS Alternate Data Stream-related attack vectors, and now it is time to do the same for `.gitmodules`. Note: In the added regression test, we refrain from verifying all kinds of variations between short names and N...
0
GIT_INLINE(bool) only_spaces_and_dots(const char *path) { const char *c = path; for (;; c++) { if (*c == '\0' || *c == ':') return true; if (*c != ' ' && *c != '.') return false; } return true; }
234,559,898,949,979,100,000,000,000,000,000,000,000
path.c
135,494,464,199,321,380,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2020-12278
An issue was discovered in libgit2 before 0.28.4 and 0.9x before 0.99.0. path.c mishandles equivalent filenames that exist because of NTFS Alternate Data Streams. This may allow remote code execution when cloning a repository. This issue is similar to CVE-2019-1352.
https://nvd.nist.gov/vuln/detail/CVE-2020-12278
213,117
radvd
2591d0189257caeaae2057dfed0a260310497a61
https://github.com/reubenhwk/radvd
https://github.com/reubenhwk/radvd/commit/2591d0189257caeaae2057dfed0a260310497a61
removing mdelay in unicast only case
1
process_rs(struct Interface *iface, unsigned char *msg, int len, struct sockaddr_in6 *addr) { double delay; double next; struct timeval tv; uint8_t *opt_str; /* validation */ len -= sizeof(struct nd_router_solicit); opt_str = (uint8_t *)(msg + sizeof(struct nd_router_solicit)); while (len > 0) { int optl...
59,634,296,372,670,890,000,000,000,000,000,000,000
process.c
37,915,199,634,422,154,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-3605
The process_rs function in the router advertisement daemon (radvd) before 1.8.2, when UnicastOnly is enabled, allows remote attackers to cause a denial of service (temporary service hang) via a large number of ND_ROUTER_SOLICIT requests.
https://nvd.nist.gov/vuln/detail/CVE-2011-3605
466,021
radvd
2591d0189257caeaae2057dfed0a260310497a61
https://github.com/reubenhwk/radvd
https://github.com/reubenhwk/radvd/commit/2591d0189257caeaae2057dfed0a260310497a61
removing mdelay in unicast only case
0
process_rs(struct Interface *iface, unsigned char *msg, int len, struct sockaddr_in6 *addr) { double delay; double next; struct timeval tv; uint8_t *opt_str; /* validation */ len -= sizeof(struct nd_router_solicit); opt_str = (uint8_t *)(msg + sizeof(struct nd_router_solicit)); while (len > 0) { int optl...
160,083,913,912,599,160,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2011-3605
The process_rs function in the router advertisement daemon (radvd) before 1.8.2, when UnicastOnly is enabled, allows remote attackers to cause a denial of service (temporary service hang) via a large number of ND_ROUTER_SOLICIT requests.
https://nvd.nist.gov/vuln/detail/CVE-2011-3605
213,120
ImageMagick
107ce8577e818cf4801e5a59641cb769d645cc95
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/107ce8577e818cf4801e5a59641cb769d645cc95
https://github.com/ImageMagick/ImageMagick/issues/1224
1
static inline void CheckEventLogging() { /* Are we logging events? */ if (IsLinkedListEmpty(log_cache) != MagickFalse) event_logging=MagickFalse; else { LogInfo *p; ResetLinkedListIterator(log_cache); p=(LogInfo *) GetNextValueInLinkedList(log_cache); event_logging=p...
173,173,998,446,177,800,000,000,000,000,000,000,000
log.c
279,469,303,194,239,580,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2018-16328
In ImageMagick before 7.0.8-8, a NULL pointer dereference exists in the CheckEventLogging function in MagickCore/log.c.
https://nvd.nist.gov/vuln/detail/CVE-2018-16328
466,042
ImageMagick
107ce8577e818cf4801e5a59641cb769d645cc95
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/107ce8577e818cf4801e5a59641cb769d645cc95
https://github.com/ImageMagick/ImageMagick/issues/1224
0
static inline void CheckEventLogging() { /* Are we logging events? */ if (IsLinkedListEmpty(log_cache) != MagickFalse) event_logging=MagickFalse; else { LogInfo *p; ResetLinkedListIterator(log_cache); p=(LogInfo *) GetNextValueInLinkedList(log_cache); event_logging=(...
227,689,687,162,311,830,000,000,000,000,000,000,000
log.c
130,856,982,248,272,880,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2018-16328
In ImageMagick before 7.0.8-8, a NULL pointer dereference exists in the CheckEventLogging function in MagickCore/log.c.
https://nvd.nist.gov/vuln/detail/CVE-2018-16328
213,121
ox
e4565dbc167f0d38c3f93243d7a4fcfc391cbfc8
https://github.com/ohler55/ox
https://github.com/ohler55/ox/commit/e4565dbc167f0d38c3f93243d7a4fcfc391cbfc8
Avoid crash with invalid XML passed to Oj.parse_obj()
1
end_element(PInfo pi, const char *ename) { if (TRACE <= pi->options->trace) { char indent[128]; if (DEBUG <= pi->options->trace) { char buf[1024]; printf("===== end element stack(%d) =====\n", helper_stack_depth(&pi->helpers)); snprintf(buf, sizeof(buf) - 1, "</%s>", ename); debug_stack(...
241,076,032,274,456,960,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2017-15928
In the Ox gem 2.8.0 for Ruby, the process crashes with a segmentation fault when a crafted input is supplied to parse_obj. NOTE: the vendor has stated "Ox should handle the error more gracefully" but has not confirmed a security implication.
https://nvd.nist.gov/vuln/detail/CVE-2017-15928
466,083
ox
e4565dbc167f0d38c3f93243d7a4fcfc391cbfc8
https://github.com/ohler55/ox
https://github.com/ohler55/ox/commit/e4565dbc167f0d38c3f93243d7a4fcfc391cbfc8
Avoid crash with invalid XML passed to Oj.parse_obj()
0
end_element(PInfo pi, const char *ename) { if (TRACE <= pi->options->trace) { char indent[128]; if (DEBUG <= pi->options->trace) { char buf[1024]; printf("===== end element stack(%d) =====\n", helper_stack_depth(&pi->helpers)); snprintf(buf, sizeof(buf) - 1, "</%s>", ename); debug_stack(...
33,277,593,858,694,666,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2017-15928
In the Ox gem 2.8.0 for Ruby, the process crashes with a segmentation fault when a crafted input is supplied to parse_obj. NOTE: the vendor has stated "Ox should handle the error more gracefully" but has not confirmed a security implication.
https://nvd.nist.gov/vuln/detail/CVE-2017-15928
213,251
Pillow
3bf5eddb89afdf690eceaa52bc4d3546ba9a5f87
https://github.com/python-pillow/Pillow
https://github.com/python-pillow/Pillow/commit/3bf5eddb89afdf690eceaa52bc4d3546ba9a5f87
Fix OOB Read in Jpeg2KDecode CVE-2021-25287,CVE-2021-25288 * For J2k images with multiple bands, it's legal in to have different widths for each band, e.g. 1 byte for L, 4 bytes for A * This dates to Pillow 2.4.0
1
j2k_decode_entry(Imaging im, ImagingCodecState state) { JPEG2KDECODESTATE *context = (JPEG2KDECODESTATE *)state->context; opj_stream_t *stream = NULL; opj_image_t *image = NULL; opj_codec_t *codec = NULL; opj_dparameters_t params; OPJ_COLOR_SPACE color_space; j2k_unpacker_t unpack = NULL; ...
326,374,483,070,810,000,000,000,000,000,000,000,000
Jpeg2KDecode.c
37,742,598,330,296,190,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2021-25287
An issue was discovered in Pillow before 8.2.0. There is an out-of-bounds read in J2kDecode, in j2ku_graya_la.
https://nvd.nist.gov/vuln/detail/CVE-2021-25287
467,148
Pillow
3bf5eddb89afdf690eceaa52bc4d3546ba9a5f87
https://github.com/python-pillow/Pillow
https://github.com/python-pillow/Pillow/commit/3bf5eddb89afdf690eceaa52bc4d3546ba9a5f87
Fix OOB Read in Jpeg2KDecode CVE-2021-25287,CVE-2021-25288 * For J2k images with multiple bands, it's legal in to have different widths for each band, e.g. 1 byte for L, 4 bytes for A * This dates to Pillow 2.4.0
0
j2k_decode_entry(Imaging im, ImagingCodecState state) { JPEG2KDECODESTATE *context = (JPEG2KDECODESTATE *)state->context; opj_stream_t *stream = NULL; opj_image_t *image = NULL; opj_codec_t *codec = NULL; opj_dparameters_t params; OPJ_COLOR_SPACE color_space; j2k_unpacker_t unpack = NULL; ...
239,960,158,434,481,040,000,000,000,000,000,000,000
Jpeg2KDecode.c
52,048,967,627,038,580,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2021-25287
An issue was discovered in Pillow before 8.2.0. There is an out-of-bounds read in J2kDecode, in j2ku_graya_la.
https://nvd.nist.gov/vuln/detail/CVE-2021-25287
213,321
ImageMagick6
a0473b29add9521ffd4c74f6f623b418811762b0
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/a0473b29add9521ffd4c74f6f623b418811762b0
https://github.com/ImageMagick/ImageMagick/issues/1472
1
static Image *ReadCINImage(const ImageInfo *image_info,ExceptionInfo *exception) { #define MonoColorType 1 #define RGBColorType 3 char property[MaxTextExtent]; CINInfo cin; const unsigned char *pixels; Image *image; MagickBooleanType status; MagickOffsetType offset; Quantu...
29,262,457,991,335,857,000,000,000,000,000,000,000
cin.c
86,001,807,343,497,760,000,000,000,000,000,000,000
[ "CWE-400" ]
CVE-2019-11470
The cineon parsing component in ImageMagick 7.0.8-26 Q16 allows attackers to cause a denial-of-service (uncontrolled resource consumption) by crafting a Cineon image with an incorrect claimed image size. This occurs because ReadCINImage in coders/cin.c lacks a check for insufficient image data in a file.
https://nvd.nist.gov/vuln/detail/CVE-2019-11470
468,068
ImageMagick6
a0473b29add9521ffd4c74f6f623b418811762b0
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/a0473b29add9521ffd4c74f6f623b418811762b0
https://github.com/ImageMagick/ImageMagick/issues/1472
0
static Image *ReadCINImage(const ImageInfo *image_info,ExceptionInfo *exception) { #define MonoColorType 1 #define RGBColorType 3 char property[MaxTextExtent]; CINInfo cin; const unsigned char *pixels; Image *image; MagickBooleanType status; MagickOffsetType offset; Quantu...
295,229,629,294,908,100,000,000,000,000,000,000,000
cin.c
260,288,327,217,340,400,000,000,000,000,000,000,000
[ "CWE-400" ]
CVE-2019-11470
The cineon parsing component in ImageMagick 7.0.8-26 Q16 allows attackers to cause a denial-of-service (uncontrolled resource consumption) by crafting a Cineon image with an incorrect claimed image size. This occurs because ReadCINImage in coders/cin.c lacks a check for insufficient image data in a file.
https://nvd.nist.gov/vuln/detail/CVE-2019-11470
213,350
qemu
d52680fc932efb8a2f334cc6993e705ed1e31e99
https://github.com/bonzini/qemu
https://git.qemu.org/?p=qemu.git;a=commit;h=d52680fc932efb8a2f334cc6993e705ed1e31e99
qxl: check release info object When releasing spice resources in release_resource() routine, if release info object 'ext.info' is null, it leads to null pointer dereference. Add check to avoid it. Reported-by: Bugs SysSec <bugs-syssec@rub.de> Signed-off-by: Prasad J Pandit <pjp@fedoraproject.org> Message-id: 20190425...
1
static void interface_release_resource(QXLInstance *sin, QXLReleaseInfoExt ext) { PCIQXLDevice *qxl = container_of(sin, PCIQXLDevice, ssd.qxl); QXLReleaseRing *ring; uint64_t *item, id; if (ext.group_id == MEMSLOT_GROUP_HOST) { /* host group -> vga mode up...
170,634,884,135,728,660,000,000,000,000,000,000,000
qxl.c
251,840,542,728,123,260,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2019-12155
interface_release_resource in hw/display/qxl.c in QEMU 3.1.x through 4.0.0 has a NULL pointer dereference.
https://nvd.nist.gov/vuln/detail/CVE-2019-12155
468,287
qemu
d52680fc932efb8a2f334cc6993e705ed1e31e99
https://github.com/bonzini/qemu
https://git.qemu.org/?p=qemu.git;a=commit;h=d52680fc932efb8a2f334cc6993e705ed1e31e99
qxl: check release info object When releasing spice resources in release_resource() routine, if release info object 'ext.info' is null, it leads to null pointer dereference. Add check to avoid it. Reported-by: Bugs SysSec <bugs-syssec@rub.de> Signed-off-by: Prasad J Pandit <pjp@fedoraproject.org> Message-id: 20190425...
0
static void interface_release_resource(QXLInstance *sin, QXLReleaseInfoExt ext) { PCIQXLDevice *qxl = container_of(sin, PCIQXLDevice, ssd.qxl); QXLReleaseRing *ring; uint64_t *item, id; if (!ext.info) { return; } if (ext.group_id == MEMSLOT_GROUP_H...
309,083,717,809,523,970,000,000,000,000,000,000,000
qxl.c
168,131,111,261,631,240,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2019-12155
interface_release_resource in hw/display/qxl.c in QEMU 3.1.x through 4.0.0 has a NULL pointer dereference.
https://nvd.nist.gov/vuln/detail/CVE-2019-12155
213,360
ImageMagick
12f34b60564de1cbec08e23e2413dab5b64daeb7
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/12f34b60564de1cbec08e23e2413dab5b64daeb7
https://github.com/ImageMagick/ImageMagick/issues/802
1
WandExport MagickBooleanType MogrifyImageList(ImageInfo *image_info, const int argc,const char **argv,Image **images,ExceptionInfo *exception) { const char *option; ImageInfo *mogrify_info; MagickStatusType status; PixelInterpolateMethod interpolate_method; QuantizeInfo *quantize_info...
123,342,001,171,385,740,000,000,000,000,000,000,000
mogrify.c
5,819,085,527,974,756,000,000,000,000,000,000,000
[ "CWE-617" ]
CVE-2017-18252
An issue was discovered in ImageMagick 7.0.7. The MogrifyImageList function in MagickWand/mogrify.c allows attackers to cause a denial of service (assertion failure and application exit in ReplaceImageInList) via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2017-18252
468,319
ImageMagick
12f34b60564de1cbec08e23e2413dab5b64daeb7
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/12f34b60564de1cbec08e23e2413dab5b64daeb7
https://github.com/ImageMagick/ImageMagick/issues/802
0
WandExport MagickBooleanType MogrifyImageList(ImageInfo *image_info, const int argc,const char **argv,Image **images,ExceptionInfo *exception) { const char *option; ImageInfo *mogrify_info; MagickStatusType status; PixelInterpolateMethod interpolate_method; QuantizeInfo *quantize_info...
65,355,988,447,693,170,000,000,000,000,000,000,000
mogrify.c
21,523,564,167,502,063,000,000,000,000,000,000,000
[ "CWE-617" ]
CVE-2017-18252
An issue was discovered in ImageMagick 7.0.7. The MogrifyImageList function in MagickWand/mogrify.c allows attackers to cause a denial of service (assertion failure and application exit in ReplaceImageInList) via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2017-18252
213,374
exim
4e6ae6235c68de243b1c2419027472d7659aa2b4
https://github.com/Exim/exim
https://git.exim.org/exim.git/commitdiff/4e6ae6235c68de243b1c2419027472d7659aa2b4
Avoid release of store if there have been later allocations. Bug 2199
1
receive_msg(BOOL extract_recip) { int i; int rc = FAIL; int msg_size = 0; int process_info_len = Ustrlen(process_info); int error_rc = (error_handling == ERRORS_SENDER)? errors_sender_rc : EXIT_FAILURE; int header_size = 256; int start, end, domain; int id_resolution; int had_zero = 0; int prevlines_le...
42,096,218,011,087,833,000,000,000,000,000,000,000
receive.c
103,232,673,626,716,140,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2017-16943
The receive_msg function in receive.c in the SMTP daemon in Exim 4.88 and 4.89 allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via vectors involving BDAT commands.
https://nvd.nist.gov/vuln/detail/CVE-2017-16943