idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
461,307 | openjpeg | c535531f03369623b9b833ef41952c62257b507e | https://github.com/uclouvain/openjpeg | https://github.com/uclouvain/openjpeg/commit/c535531f03369623b9b833ef41952c62257b507e | opj_t2_encode_packet(): fix potential write heap buffer overflow (#992) | 0 | static OPJ_BOOL opj_t2_encode_packet(OPJ_UINT32 tileno,
opj_tcd_tile_t * tile,
opj_tcp_t * tcp,
opj_pi_iterator_t *pi,
OPJ_BYTE *dest,
... | 288,012,275,612,213,640,000,000,000,000,000,000,000 | t2.c | 36,465,046,070,092,400,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2017-14039 | A heap-based buffer overflow was discovered in the opj_t2_encode_packet function in lib/openjp2/t2.c in OpenJPEG 2.2.0. The vulnerability causes an out-of-bounds write, which may lead to remote denial of service or possibly unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2017-14039 |
212,754 | ImageMagick | 2001aabeab8a921a4fa0b1932f565aef6ae69f84 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/2001aabeab8a921a4fa0b1932f565aef6ae69f84 | https://github.com/ImageMagick/ImageMagick/issues/674 | 1 | static MagickBooleanType WritePDFImage(const ImageInfo *image_info,Image *image,
ExceptionInfo *exception)
{
#define CFormat "/Filter [ /%s ]\n"
#define ObjectsPerImage 14
DisableMSCWarning(4310)
static const char
XMPProfile[]=
{
"<?xpacket begin=\"%s\" id=\"W5M0MpCehiHzreSzNTczkc9d\"?>\n"
"<... | 180,122,171,249,911,850,000,000,000,000,000,000,000 | pdf.c | 199,471,492,643,696,240,000,000,000,000,000,000,000 | [
"CWE-617"
] | CVE-2017-13132 | In ImageMagick 7.0.6-8, the WritePDFImage function in coders/pdf.c operates on an incorrect data structure in the "dump uncompressed PseudoColor packets" step, which allows attackers to cause a denial of service (assertion failure in WriteBlobStream in MagickCore/blob.c) via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2017-13132 |
461,335 | ImageMagick | 2001aabeab8a921a4fa0b1932f565aef6ae69f84 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/2001aabeab8a921a4fa0b1932f565aef6ae69f84 | https://github.com/ImageMagick/ImageMagick/issues/674 | 0 | static MagickBooleanType WritePDFImage(const ImageInfo *image_info,Image *image,
ExceptionInfo *exception)
{
#define CFormat "/Filter [ /%s ]\n"
#define ObjectsPerImage 14
DisableMSCWarning(4310)
static const char
XMPProfile[]=
{
"<?xpacket begin=\"%s\" id=\"W5M0MpCehiHzreSzNTczkc9d\"?>\n"
"<... | 107,072,958,023,321,240,000,000,000,000,000,000,000 | pdf.c | 319,437,701,144,051,200,000,000,000,000,000,000,000 | [
"CWE-617"
] | CVE-2017-13132 | In ImageMagick 7.0.6-8, the WritePDFImage function in coders/pdf.c operates on an incorrect data structure in the "dump uncompressed PseudoColor packets" step, which allows attackers to cause a denial of service (assertion failure in WriteBlobStream in MagickCore/blob.c) via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2017-13132 |
212,768 | libvncserver | 3fd03977c9b35800d73a865f167338cb4d05b0c1 | https://github.com/LibVNC/libvncserver | https://github.com/LibVNC/libvncserver/commit/3fd03977c9b35800d73a865f167338cb4d05b0c1 | libvncclient: bail out if unix socket name would overflow
Closes #291 | 1 | ConnectClientToUnixSock(const char *sockFile)
{
#ifdef WIN32
rfbClientErr("Windows doesn't support UNIX sockets\n");
return -1;
#else
int sock;
struct sockaddr_un addr;
addr.sun_family = AF_UNIX;
strcpy(addr.sun_path, sockFile);
sock = socket(AF_UNIX, SOCK_STREAM, 0);
if (sock < 0) {
rfbClientErr("... | 114,092,604,641,597,960,000,000,000,000,000,000,000 | sockets.c | 248,941,569,372,547,900,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2019-20839 | libvncclient/sockets.c in LibVNCServer before 0.9.13 has a buffer overflow via a long socket filename. | https://nvd.nist.gov/vuln/detail/CVE-2019-20839 |
461,607 | libvncserver | 3fd03977c9b35800d73a865f167338cb4d05b0c1 | https://github.com/LibVNC/libvncserver | https://github.com/LibVNC/libvncserver/commit/3fd03977c9b35800d73a865f167338cb4d05b0c1 | libvncclient: bail out if unix socket name would overflow
Closes #291 | 0 | ConnectClientToUnixSock(const char *sockFile)
{
#ifdef WIN32
rfbClientErr("Windows doesn't support UNIX sockets\n");
return -1;
#else
int sock;
struct sockaddr_un addr;
addr.sun_family = AF_UNIX;
if(strlen(sockFile) + 1 > sizeof(addr.sun_path)) {
rfbClientErr("ConnectToUnixSock: socket file name too l... | 58,902,372,311,085,440,000,000,000,000,000,000,000 | sockets.c | 148,387,272,730,163,620,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2019-20839 | libvncclient/sockets.c in LibVNCServer before 0.9.13 has a buffer overflow via a long socket filename. | https://nvd.nist.gov/vuln/detail/CVE-2019-20839 |
212,769 | openexr | 51a92d67f53c08230734e74564c807043cbfe41e | https://github.com/AcademySoftwareFoundation/openexr | https://github.com/AcademySoftwareFoundation/openexr/commit/51a92d67f53c08230734e74564c807043cbfe41e | check for valid Huf code lengths (#849)
* check for valid Huf code lengths
* test non-fast huf decoder in testHuf
Signed-off-by: Peter Hillman <peterh@wetafx.co.nz> | 1 | hufDecode
(const Int64 * hcode, // i : encoding table
const HufDec * hdecod, // i : decoding table
const char* in, // i : compressed input buffer
int ni, // i : input size (in bits)
int rlc, // i : run-length code
int no, // i : expected output size (in bytes)
unsigned short* out... | 135,013,956,665,797,370,000,000,000,000,000,000,000 | ImfHuf.cpp | 83,666,658,604,202,860,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2021-20304 | A flaw was found in OpenEXR's hufDecode functionality. This flaw allows an attacker who can pass a crafted file to be processed by OpenEXR, to trigger an undefined right shift error. The highest threat from this vulnerability is to system availability. | https://nvd.nist.gov/vuln/detail/CVE-2021-20304 |
461,620 | openexr | 51a92d67f53c08230734e74564c807043cbfe41e | https://github.com/AcademySoftwareFoundation/openexr | https://github.com/AcademySoftwareFoundation/openexr/commit/51a92d67f53c08230734e74564c807043cbfe41e | check for valid Huf code lengths (#849)
* check for valid Huf code lengths
* test non-fast huf decoder in testHuf
Signed-off-by: Peter Hillman <peterh@wetafx.co.nz> | 0 | hufDecode
(const Int64 * hcode, // i : encoding table
const HufDec * hdecod, // i : decoding table
const char* in, // i : compressed input buffer
int ni, // i : input size (in bits)
int rlc, // i : run-length code
int no, // i : expected output size (in bytes)
unsigned short* out... | 151,701,382,254,237,850,000,000,000,000,000,000,000 | ImfHuf.cpp | 189,779,669,336,749,730,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2021-20304 | A flaw was found in OpenEXR's hufDecode functionality. This flaw allows an attacker who can pass a crafted file to be processed by OpenEXR, to trigger an undefined right shift error. The highest threat from this vulnerability is to system availability. | https://nvd.nist.gov/vuln/detail/CVE-2021-20304 |
212,777 | dcmtk | beaf5a5c24101daeeafa48c375120b16197c9e95 | https://github.com/DCMTK/dcmtk | http://git.dcmtk.org/web?p=dcmtk.git;a=commitdiff;h=beaf5a5c24101daeeafa48c375120b16197c9e95;hp=5349794c4c458c76609b7aeb53d0ca28cf9fe9f0 | Make sure to handle setuid() return code properly.
In some tools the return value of setuid() is not checked. In the worst
case this could lead to privilege escalation since the process does not
give up its root privileges and continue as root. | 1 | int main(int argc, char *argv[])
{
#ifdef HAVE_GUSI_H
GUSISetup(GUSIwithSIOUXSockets);
GUSISetup(GUSIwithInternetSockets);
#endif
#ifdef WITH_TCPWRAPPER
// this code makes sure that the linker cannot optimize away
// the DUL part of the network module where the external flags
// for libwrap are de... | 89,272,490,427,650,530,000,000,000,000,000,000,000 | msgserv.cc | 64,051,372,405,406,250,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2013-6825 | (1) movescu.cc and (2) storescp.cc in dcmnet/apps/, (3) dcmnet/libsrc/scp.cc, (4) dcmwlm/libsrc/wlmactmg.cc, (5) dcmprscp.cc and (6) dcmpsrcv.cc in dcmpstat/apps/, (7) dcmpstat/tests/msgserv.cc, and (8) dcmqrdb/apps/dcmqrscp.cc in DCMTK 3.6.1 and earlier does not check the return value of the setuid system call, which ... | https://nvd.nist.gov/vuln/detail/CVE-2013-6825 |
461,777 | dcmtk | beaf5a5c24101daeeafa48c375120b16197c9e95 | https://github.com/DCMTK/dcmtk | http://git.dcmtk.org/web?p=dcmtk.git;a=commitdiff;h=beaf5a5c24101daeeafa48c375120b16197c9e95;hp=5349794c4c458c76609b7aeb53d0ca28cf9fe9f0 | Make sure to handle setuid() return code properly.
In some tools the return value of setuid() is not checked. In the worst
case this could lead to privilege escalation since the process does not
give up its root privileges and continue as root. | 0 | int main(int argc, char *argv[])
{
#ifdef HAVE_GUSI_H
GUSISetup(GUSIwithSIOUXSockets);
GUSISetup(GUSIwithInternetSockets);
#endif
#ifdef WITH_TCPWRAPPER
// this code makes sure that the linker cannot optimize away
// the DUL part of the network module where the external flags
// for libwrap are de... | 326,630,950,291,790,700,000,000,000,000,000,000,000 | msgserv.cc | 10,324,162,321,453,011,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2013-6825 | (1) movescu.cc and (2) storescp.cc in dcmnet/apps/, (3) dcmnet/libsrc/scp.cc, (4) dcmwlm/libsrc/wlmactmg.cc, (5) dcmprscp.cc and (6) dcmpsrcv.cc in dcmpstat/apps/, (7) dcmpstat/tests/msgserv.cc, and (8) dcmqrdb/apps/dcmqrscp.cc in DCMTK 3.6.1 and earlier does not check the return value of the setuid system call, which ... | https://nvd.nist.gov/vuln/detail/CVE-2013-6825 |
212,778 | dcmtk | beaf5a5c24101daeeafa48c375120b16197c9e95 | https://github.com/DCMTK/dcmtk | http://git.dcmtk.org/web?p=dcmtk.git;a=commitdiff;h=beaf5a5c24101daeeafa48c375120b16197c9e95;hp=5349794c4c458c76609b7aeb53d0ca28cf9fe9f0 | Make sure to handle setuid() return code properly.
In some tools the return value of setuid() is not checked. In the worst
case this could lead to privilege escalation since the process does not
give up its root privileges and continue as root. | 1 | main(int argc, char *argv[])
{
OFCondition cond = EC_Normal;
OFCmdUnsignedInt overridePort = 0;
OFCmdUnsignedInt overrideMaxPDU = 0;
DcmQueryRetrieveOptions options;
#ifdef HAVE_GUSI_H
/* needed for Macintosh */
GUSISetup(GUSIwithSIOUXSockets);
GUSISetup(GUSIwithInternetSockets);
#endif
#ifdef HAVE_WINS... | 309,036,142,818,267,500,000,000,000,000,000,000,000 | dcmqrscp.cc | 309,042,252,130,188,400,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2013-6825 | (1) movescu.cc and (2) storescp.cc in dcmnet/apps/, (3) dcmnet/libsrc/scp.cc, (4) dcmwlm/libsrc/wlmactmg.cc, (5) dcmprscp.cc and (6) dcmpsrcv.cc in dcmpstat/apps/, (7) dcmpstat/tests/msgserv.cc, and (8) dcmqrdb/apps/dcmqrscp.cc in DCMTK 3.6.1 and earlier does not check the return value of the setuid system call, which ... | https://nvd.nist.gov/vuln/detail/CVE-2013-6825 |
461,738 | dcmtk | beaf5a5c24101daeeafa48c375120b16197c9e95 | https://github.com/DCMTK/dcmtk | http://git.dcmtk.org/web?p=dcmtk.git;a=commitdiff;h=beaf5a5c24101daeeafa48c375120b16197c9e95;hp=5349794c4c458c76609b7aeb53d0ca28cf9fe9f0 | Make sure to handle setuid() return code properly.
In some tools the return value of setuid() is not checked. In the worst
case this could lead to privilege escalation since the process does not
give up its root privileges and continue as root. | 0 | main(int argc, char *argv[])
{
OFCondition cond = EC_Normal;
OFCmdUnsignedInt overridePort = 0;
OFCmdUnsignedInt overrideMaxPDU = 0;
DcmQueryRetrieveOptions options;
#ifdef HAVE_GUSI_H
/* needed for Macintosh */
GUSISetup(GUSIwithSIOUXSockets);
GUSISetup(GUSIwithInternetSockets);
#endif
#ifdef HAVE_WINS... | 113,232,657,295,468,900,000,000,000,000,000,000,000 | dcmqrscp.cc | 190,527,431,947,042,300,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2013-6825 | (1) movescu.cc and (2) storescp.cc in dcmnet/apps/, (3) dcmnet/libsrc/scp.cc, (4) dcmwlm/libsrc/wlmactmg.cc, (5) dcmprscp.cc and (6) dcmpsrcv.cc in dcmpstat/apps/, (7) dcmpstat/tests/msgserv.cc, and (8) dcmqrdb/apps/dcmqrscp.cc in DCMTK 3.6.1 and earlier does not check the return value of the setuid system call, which ... | https://nvd.nist.gov/vuln/detail/CVE-2013-6825 |
212,779 | dcmtk | beaf5a5c24101daeeafa48c375120b16197c9e95 | https://github.com/DCMTK/dcmtk | http://git.dcmtk.org/web?p=dcmtk.git;a=commitdiff;h=beaf5a5c24101daeeafa48c375120b16197c9e95;hp=5349794c4c458c76609b7aeb53d0ca28cf9fe9f0 | Make sure to handle setuid() return code properly.
In some tools the return value of setuid() is not checked. In the worst
case this could lead to privilege escalation since the process does not
give up its root privileges and continue as root. | 1 | int main(int argc, char *argv[])
{
T_ASC_Network *net;
DcmAssociationConfiguration asccfg;
#ifdef HAVE_GUSI_H
/* needed for Macintosh */
GUSISetup(GUSIwithSIOUXSockets);
GUSISetup(GUSIwithInternetSockets);
#endif
#ifdef HAVE_WINSOCK_H
WSAData winSockData;
/* we need at least version 1.1 */
WORD winSoc... | 136,224,616,518,968,400,000,000,000,000,000,000,000 | storescp.cc | 197,572,318,530,186,870,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2013-6825 | (1) movescu.cc and (2) storescp.cc in dcmnet/apps/, (3) dcmnet/libsrc/scp.cc, (4) dcmwlm/libsrc/wlmactmg.cc, (5) dcmprscp.cc and (6) dcmpsrcv.cc in dcmpstat/apps/, (7) dcmpstat/tests/msgserv.cc, and (8) dcmqrdb/apps/dcmqrscp.cc in DCMTK 3.6.1 and earlier does not check the return value of the setuid system call, which ... | https://nvd.nist.gov/vuln/detail/CVE-2013-6825 |
461,818 | dcmtk | beaf5a5c24101daeeafa48c375120b16197c9e95 | https://github.com/DCMTK/dcmtk | http://git.dcmtk.org/web?p=dcmtk.git;a=commitdiff;h=beaf5a5c24101daeeafa48c375120b16197c9e95;hp=5349794c4c458c76609b7aeb53d0ca28cf9fe9f0 | Make sure to handle setuid() return code properly.
In some tools the return value of setuid() is not checked. In the worst
case this could lead to privilege escalation since the process does not
give up its root privileges and continue as root. | 0 | int main(int argc, char *argv[])
{
T_ASC_Network *net;
DcmAssociationConfiguration asccfg;
#ifdef HAVE_GUSI_H
/* needed for Macintosh */
GUSISetup(GUSIwithSIOUXSockets);
GUSISetup(GUSIwithInternetSockets);
#endif
#ifdef HAVE_WINSOCK_H
WSAData winSockData;
/* we need at least version 1.1 */
WORD winSoc... | 175,687,164,923,627,500,000,000,000,000,000,000,000 | storescp.cc | 47,991,792,040,003,300,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2013-6825 | (1) movescu.cc and (2) storescp.cc in dcmnet/apps/, (3) dcmnet/libsrc/scp.cc, (4) dcmwlm/libsrc/wlmactmg.cc, (5) dcmprscp.cc and (6) dcmpsrcv.cc in dcmpstat/apps/, (7) dcmpstat/tests/msgserv.cc, and (8) dcmqrdb/apps/dcmqrscp.cc in DCMTK 3.6.1 and earlier does not check the return value of the setuid system call, which ... | https://nvd.nist.gov/vuln/detail/CVE-2013-6825 |
212,780 | dcmtk | beaf5a5c24101daeeafa48c375120b16197c9e95 | https://github.com/DCMTK/dcmtk | http://git.dcmtk.org/web?p=dcmtk.git;a=commitdiff;h=beaf5a5c24101daeeafa48c375120b16197c9e95;hp=5349794c4c458c76609b7aeb53d0ca28cf9fe9f0 | Make sure to handle setuid() return code properly.
In some tools the return value of setuid() is not checked. In the worst
case this could lead to privilege escalation since the process does not
give up its root privileges and continue as root. | 1 | OFCondition WlmActivityManager::StartProvidingService()
// Date : December 10, 2001
// Author : Thomas Wilkens
// Task : Starts providing the implemented service for calling SCUs.
// After having created an instance of this class, this function
// shall be called from... | 132,887,439,509,033,620,000,000,000,000,000,000,000 | wlmactmg.cc | 29,629,881,142,441,970,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2013-6825 | (1) movescu.cc and (2) storescp.cc in dcmnet/apps/, (3) dcmnet/libsrc/scp.cc, (4) dcmwlm/libsrc/wlmactmg.cc, (5) dcmprscp.cc and (6) dcmpsrcv.cc in dcmpstat/apps/, (7) dcmpstat/tests/msgserv.cc, and (8) dcmqrdb/apps/dcmqrscp.cc in DCMTK 3.6.1 and earlier does not check the return value of the setuid system call, which ... | https://nvd.nist.gov/vuln/detail/CVE-2013-6825 |
461,759 | dcmtk | beaf5a5c24101daeeafa48c375120b16197c9e95 | https://github.com/DCMTK/dcmtk | http://git.dcmtk.org/web?p=dcmtk.git;a=commitdiff;h=beaf5a5c24101daeeafa48c375120b16197c9e95;hp=5349794c4c458c76609b7aeb53d0ca28cf9fe9f0 | Make sure to handle setuid() return code properly.
In some tools the return value of setuid() is not checked. In the worst
case this could lead to privilege escalation since the process does not
give up its root privileges and continue as root. | 0 | OFCondition WlmActivityManager::StartProvidingService()
// Date : December 10, 2001
// Author : Thomas Wilkens
// Task : Starts providing the implemented service for calling SCUs.
// After having created an instance of this class, this function
// shall be called from... | 34,397,149,061,632,614,000,000,000,000,000,000,000 | wlmactmg.cc | 301,095,470,508,302,620,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2013-6825 | (1) movescu.cc and (2) storescp.cc in dcmnet/apps/, (3) dcmnet/libsrc/scp.cc, (4) dcmwlm/libsrc/wlmactmg.cc, (5) dcmprscp.cc and (6) dcmpsrcv.cc in dcmpstat/apps/, (7) dcmpstat/tests/msgserv.cc, and (8) dcmqrdb/apps/dcmqrscp.cc in DCMTK 3.6.1 and earlier does not check the return value of the setuid system call, which ... | https://nvd.nist.gov/vuln/detail/CVE-2013-6825 |
212,781 | dcmtk | beaf5a5c24101daeeafa48c375120b16197c9e95 | https://github.com/DCMTK/dcmtk | http://git.dcmtk.org/web?p=dcmtk.git;a=commitdiff;h=beaf5a5c24101daeeafa48c375120b16197c9e95;hp=5349794c4c458c76609b7aeb53d0ca28cf9fe9f0 | Make sure to handle setuid() return code properly.
In some tools the return value of setuid() is not checked. In the worst
case this could lead to privilege escalation since the process does not
give up its root privileges and continue as root. | 1 | OFCondition DcmSCP::listen()
{
// make sure not to let dcmdata remove trailing blank padding or perform other
// manipulations. We want to see the real data.
dcmEnableAutomaticInputDataCorrection.set( OFFalse );
OFCondition cond = EC_Normal;
// Make sure data dictionary is loaded.
if( !dcmDataDict.isDicti... | 235,864,230,702,860,270,000,000,000,000,000,000,000 | scp.cc | 285,413,361,506,887,470,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2013-6825 | (1) movescu.cc and (2) storescp.cc in dcmnet/apps/, (3) dcmnet/libsrc/scp.cc, (4) dcmwlm/libsrc/wlmactmg.cc, (5) dcmprscp.cc and (6) dcmpsrcv.cc in dcmpstat/apps/, (7) dcmpstat/tests/msgserv.cc, and (8) dcmqrdb/apps/dcmqrscp.cc in DCMTK 3.6.1 and earlier does not check the return value of the setuid system call, which ... | https://nvd.nist.gov/vuln/detail/CVE-2013-6825 |
461,857 | dcmtk | beaf5a5c24101daeeafa48c375120b16197c9e95 | https://github.com/DCMTK/dcmtk | http://git.dcmtk.org/web?p=dcmtk.git;a=commitdiff;h=beaf5a5c24101daeeafa48c375120b16197c9e95;hp=5349794c4c458c76609b7aeb53d0ca28cf9fe9f0 | Make sure to handle setuid() return code properly.
In some tools the return value of setuid() is not checked. In the worst
case this could lead to privilege escalation since the process does not
give up its root privileges and continue as root. | 0 | OFCondition DcmSCP::listen()
{
// make sure not to let dcmdata remove trailing blank padding or perform other
// manipulations. We want to see the real data.
dcmEnableAutomaticInputDataCorrection.set( OFFalse );
OFCondition cond = EC_Normal;
// Make sure data dictionary is loaded.
if( !dcmDataDict.isDicti... | 119,135,973,460,562,500,000,000,000,000,000,000,000 | scp.cc | 275,325,448,714,774,400,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2013-6825 | (1) movescu.cc and (2) storescp.cc in dcmnet/apps/, (3) dcmnet/libsrc/scp.cc, (4) dcmwlm/libsrc/wlmactmg.cc, (5) dcmprscp.cc and (6) dcmpsrcv.cc in dcmpstat/apps/, (7) dcmpstat/tests/msgserv.cc, and (8) dcmqrdb/apps/dcmqrscp.cc in DCMTK 3.6.1 and earlier does not check the return value of the setuid system call, which ... | https://nvd.nist.gov/vuln/detail/CVE-2013-6825 |
212,782 | dcmtk | beaf5a5c24101daeeafa48c375120b16197c9e95 | https://github.com/DCMTK/dcmtk | http://git.dcmtk.org/web?p=dcmtk.git;a=commitdiff;h=beaf5a5c24101daeeafa48c375120b16197c9e95;hp=5349794c4c458c76609b7aeb53d0ca28cf9fe9f0 | Make sure to handle setuid() return code properly.
In some tools the return value of setuid() is not checked. In the worst
case this could lead to privilege escalation since the process does not
give up its root privileges and continue as root. | 1 | int main(int argc, char *argv[])
{
#ifdef HAVE_GUSI_H
GUSISetup(GUSIwithSIOUXSockets);
GUSISetup(GUSIwithInternetSockets);
#endif
#ifdef HAVE_WINSOCK_H
WSAData winSockData;
/* we need at least version 1.1 */
WORD winSockVersionNeeded = MAKEWORD( 1, 1 );
WSAStartup(winSockVersionNeeded, &winSoc... | 297,975,859,261,612,930,000,000,000,000,000,000,000 | dcmpsrcv.cc | 332,968,943,210,808,300,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2013-6825 | (1) movescu.cc and (2) storescp.cc in dcmnet/apps/, (3) dcmnet/libsrc/scp.cc, (4) dcmwlm/libsrc/wlmactmg.cc, (5) dcmprscp.cc and (6) dcmpsrcv.cc in dcmpstat/apps/, (7) dcmpstat/tests/msgserv.cc, and (8) dcmqrdb/apps/dcmqrscp.cc in DCMTK 3.6.1 and earlier does not check the return value of the setuid system call, which ... | https://nvd.nist.gov/vuln/detail/CVE-2013-6825 |
461,748 | dcmtk | beaf5a5c24101daeeafa48c375120b16197c9e95 | https://github.com/DCMTK/dcmtk | http://git.dcmtk.org/web?p=dcmtk.git;a=commitdiff;h=beaf5a5c24101daeeafa48c375120b16197c9e95;hp=5349794c4c458c76609b7aeb53d0ca28cf9fe9f0 | Make sure to handle setuid() return code properly.
In some tools the return value of setuid() is not checked. In the worst
case this could lead to privilege escalation since the process does not
give up its root privileges and continue as root. | 0 | int main(int argc, char *argv[])
{
#ifdef HAVE_GUSI_H
GUSISetup(GUSIwithSIOUXSockets);
GUSISetup(GUSIwithInternetSockets);
#endif
#ifdef HAVE_WINSOCK_H
WSAData winSockData;
/* we need at least version 1.1 */
WORD winSockVersionNeeded = MAKEWORD( 1, 1 );
WSAStartup(winSockVersionNeeded, &winSoc... | 105,564,390,650,709,940,000,000,000,000,000,000,000 | dcmpsrcv.cc | 170,258,021,695,887,550,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2013-6825 | (1) movescu.cc and (2) storescp.cc in dcmnet/apps/, (3) dcmnet/libsrc/scp.cc, (4) dcmwlm/libsrc/wlmactmg.cc, (5) dcmprscp.cc and (6) dcmpsrcv.cc in dcmpstat/apps/, (7) dcmpstat/tests/msgserv.cc, and (8) dcmqrdb/apps/dcmqrscp.cc in DCMTK 3.6.1 and earlier does not check the return value of the setuid system call, which ... | https://nvd.nist.gov/vuln/detail/CVE-2013-6825 |
212,783 | dcmtk | beaf5a5c24101daeeafa48c375120b16197c9e95 | https://github.com/DCMTK/dcmtk | http://git.dcmtk.org/web?p=dcmtk.git;a=commitdiff;h=beaf5a5c24101daeeafa48c375120b16197c9e95;hp=5349794c4c458c76609b7aeb53d0ca28cf9fe9f0 | Make sure to handle setuid() return code properly.
In some tools the return value of setuid() is not checked. In the worst
case this could lead to privilege escalation since the process does not
give up its root privileges and continue as root. | 1 | int main(int argc, char *argv[])
{
#ifdef HAVE_GUSI_H
GUSISetup(GUSIwithSIOUXSockets);
GUSISetup(GUSIwithInternetSockets);
#endif
#ifdef HAVE_WINSOCK_H
WSAData winSockData;
/* we need at least version 1.1 */
WORD winSockVersionNeeded = MAKEWORD( 1, 1 );
WSAStartup(winSockVersionNeeded, &winSoc... | 236,769,436,028,981,150,000,000,000,000,000,000,000 | dcmprscp.cc | 43,694,756,729,968,070,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2013-6825 | (1) movescu.cc and (2) storescp.cc in dcmnet/apps/, (3) dcmnet/libsrc/scp.cc, (4) dcmwlm/libsrc/wlmactmg.cc, (5) dcmprscp.cc and (6) dcmpsrcv.cc in dcmpstat/apps/, (7) dcmpstat/tests/msgserv.cc, and (8) dcmqrdb/apps/dcmqrscp.cc in DCMTK 3.6.1 and earlier does not check the return value of the setuid system call, which ... | https://nvd.nist.gov/vuln/detail/CVE-2013-6825 |
461,806 | dcmtk | beaf5a5c24101daeeafa48c375120b16197c9e95 | https://github.com/DCMTK/dcmtk | http://git.dcmtk.org/web?p=dcmtk.git;a=commitdiff;h=beaf5a5c24101daeeafa48c375120b16197c9e95;hp=5349794c4c458c76609b7aeb53d0ca28cf9fe9f0 | Make sure to handle setuid() return code properly.
In some tools the return value of setuid() is not checked. In the worst
case this could lead to privilege escalation since the process does not
give up its root privileges and continue as root. | 0 | int main(int argc, char *argv[])
{
#ifdef HAVE_GUSI_H
GUSISetup(GUSIwithSIOUXSockets);
GUSISetup(GUSIwithInternetSockets);
#endif
#ifdef HAVE_WINSOCK_H
WSAData winSockData;
/* we need at least version 1.1 */
WORD winSockVersionNeeded = MAKEWORD( 1, 1 );
WSAStartup(winSockVersionNeeded, &winSoc... | 235,182,521,171,542,440,000,000,000,000,000,000,000 | dcmprscp.cc | 299,137,787,502,351,900,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2013-6825 | (1) movescu.cc and (2) storescp.cc in dcmnet/apps/, (3) dcmnet/libsrc/scp.cc, (4) dcmwlm/libsrc/wlmactmg.cc, (5) dcmprscp.cc and (6) dcmpsrcv.cc in dcmpstat/apps/, (7) dcmpstat/tests/msgserv.cc, and (8) dcmqrdb/apps/dcmqrscp.cc in DCMTK 3.6.1 and earlier does not check the return value of the setuid system call, which ... | https://nvd.nist.gov/vuln/detail/CVE-2013-6825 |
212,784 | dcmtk | beaf5a5c24101daeeafa48c375120b16197c9e95 | https://github.com/DCMTK/dcmtk | http://git.dcmtk.org/web?p=dcmtk.git;a=commitdiff;h=beaf5a5c24101daeeafa48c375120b16197c9e95;hp=5349794c4c458c76609b7aeb53d0ca28cf9fe9f0 | Make sure to handle setuid() return code properly.
In some tools the return value of setuid() is not checked. In the worst
case this could lead to privilege escalation since the process does not
give up its root privileges and continue as root. | 1 | main(int argc, char *argv[])
{
T_ASC_Parameters *params = NULL;
const char *opt_peer;
OFCmdUnsignedInt opt_port = 104;
DIC_NODENAME localHost;
DIC_NODENAME peerHost;
T_ASC_Association *assoc = NULL;
const char *opt_peerTitle = PEERAPPLICATIONTITLE;
const char *opt_ourTitle = APPLICATIONT... | 42,037,421,370,473,350,000,000,000,000,000,000,000 | movescu.cc | 18,540,912,223,589,369,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2013-6825 | (1) movescu.cc and (2) storescp.cc in dcmnet/apps/, (3) dcmnet/libsrc/scp.cc, (4) dcmwlm/libsrc/wlmactmg.cc, (5) dcmprscp.cc and (6) dcmpsrcv.cc in dcmpstat/apps/, (7) dcmpstat/tests/msgserv.cc, and (8) dcmqrdb/apps/dcmqrscp.cc in DCMTK 3.6.1 and earlier does not check the return value of the setuid system call, which ... | https://nvd.nist.gov/vuln/detail/CVE-2013-6825 |
461,877 | dcmtk | beaf5a5c24101daeeafa48c375120b16197c9e95 | https://github.com/DCMTK/dcmtk | http://git.dcmtk.org/web?p=dcmtk.git;a=commitdiff;h=beaf5a5c24101daeeafa48c375120b16197c9e95;hp=5349794c4c458c76609b7aeb53d0ca28cf9fe9f0 | Make sure to handle setuid() return code properly.
In some tools the return value of setuid() is not checked. In the worst
case this could lead to privilege escalation since the process does not
give up its root privileges and continue as root. | 0 | main(int argc, char *argv[])
{
T_ASC_Parameters *params = NULL;
const char *opt_peer;
OFCmdUnsignedInt opt_port = 104;
DIC_NODENAME localHost;
DIC_NODENAME peerHost;
T_ASC_Association *assoc = NULL;
const char *opt_peerTitle = PEERAPPLICATIONTITLE;
const char *opt_ourTitle = APPLICATIONT... | 69,425,334,444,412,660,000,000,000,000,000,000,000 | movescu.cc | 178,526,427,842,922,240,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2013-6825 | (1) movescu.cc and (2) storescp.cc in dcmnet/apps/, (3) dcmnet/libsrc/scp.cc, (4) dcmwlm/libsrc/wlmactmg.cc, (5) dcmprscp.cc and (6) dcmpsrcv.cc in dcmpstat/apps/, (7) dcmpstat/tests/msgserv.cc, and (8) dcmqrdb/apps/dcmqrscp.cc in DCMTK 3.6.1 and earlier does not check the return value of the setuid system call, which ... | https://nvd.nist.gov/vuln/detail/CVE-2013-6825 |
212,788 | gnutls | 35e26ca63c6da01db460d93e9c4bf86cd668534c | http://git.savannah.gnu.org/cgit/gnutls | http://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commitdiff;h=35e26ca63c6da01db460d93e9c4bf86cd668534c | provide less timing information when decoding packets. Patch by Nadhem Alfardan. | 1 | ciphertext_to_compressed (gnutls_session_t session,
gnutls_datum_t *ciphertext,
opaque * compress_data,
int compress_size,
uint8_t type, record_parameters_st * params,
uint64* sequence)
{
... | 99,716,543,947,855,970,000,000,000,000,000,000,000 | gnutls_cipher.c | 134,740,051,554,246,070,000,000,000,000,000,000,000 | [
"CWE-310"
] | CVE-2012-0390 | The DTLS implementation in GnuTLS 3.0.10 and earlier executes certain error-handling code only if there is a specific relationship between a padding length and the ciphertext size, which makes it easier for remote attackers to recover partial plaintext via a timing side-channel attack, a related issue to CVE-2011-4108. | https://nvd.nist.gov/vuln/detail/CVE-2012-0390 |
461,889 | gnutls | 35e26ca63c6da01db460d93e9c4bf86cd668534c | http://git.savannah.gnu.org/cgit/gnutls | http://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commitdiff;h=35e26ca63c6da01db460d93e9c4bf86cd668534c | provide less timing information when decoding packets. Patch by Nadhem Alfardan. | 0 | ciphertext_to_compressed (gnutls_session_t session,
gnutls_datum_t *ciphertext,
opaque * compress_data,
int compress_size,
uint8_t type, record_parameters_st * params,
uint64* sequence)
{
... | 210,077,129,361,569,830,000,000,000,000,000,000,000 | gnutls_cipher.c | 279,797,039,587,386,570,000,000,000,000,000,000,000 | [
"CWE-310"
] | CVE-2012-0390 | The DTLS implementation in GnuTLS 3.0.10 and earlier executes certain error-handling code only if there is a specific relationship between a padding length and the ciphertext size, which makes it easier for remote attackers to recover partial plaintext via a timing side-channel attack, a related issue to CVE-2011-4108. | https://nvd.nist.gov/vuln/detail/CVE-2012-0390 |
212,789 | mono | 722f9890f09aadfc37ae479e7d946d5fc5ef7b91 | https://github.com/mono/mono | https://github.com/mono/mono/commit/722f9890f09aadfc37ae479e7d946d5fc5ef7b91 | Fix access to freed members of a dead thread
* threads.c: Fix access to freed members of a dead thread. Found
and fixed by Rodrigo Kumpera <rkumpera@novell.com>
Ref: CVE-2011-0992 | 1 | void ves_icall_System_Threading_InternalThread_Thread_free_internal (MonoInternalThread *this, HANDLE thread)
{
MONO_ARCH_SAVE_REGS;
THREAD_DEBUG (g_message ("%s: Closing thread %p, handle %p", __func__, this, thread));
if (thread)
CloseHandle (thread);
if (this->synch_cs) {
DeleteCriticalSection (this->sync... | 49,085,657,583,212,260,000,000,000,000,000,000,000 | threads.c | 215,643,197,562,885,600,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2011-0989 | The RuntimeHelpers.InitializeArray method in metadata/icall.c in Mono, when Moonlight 2.x before 2.4.1 or 3.x before 3.99.3 is used, does not properly restrict data types, which allows remote attackers to modify internal read-only data structures, and cause a denial of service (plugin crash) or corrupt the internal sta... | https://nvd.nist.gov/vuln/detail/CVE-2011-0989 |
462,002 | mono | 722f9890f09aadfc37ae479e7d946d5fc5ef7b91 | https://github.com/mono/mono | https://github.com/mono/mono/commit/722f9890f09aadfc37ae479e7d946d5fc5ef7b91 | Fix access to freed members of a dead thread
* threads.c: Fix access to freed members of a dead thread. Found
and fixed by Rodrigo Kumpera <rkumpera@novell.com>
Ref: CVE-2011-0992 | 0 | void ves_icall_System_Threading_InternalThread_Thread_free_internal (MonoInternalThread *this, HANDLE thread)
{
MONO_ARCH_SAVE_REGS;
THREAD_DEBUG (g_message ("%s: Closing thread %p, handle %p", __func__, this, thread));
if (thread)
CloseHandle (thread);
if (this->synch_cs) {
CRITICAL_SECTION *synch_cs = this... | 328,318,888,253,505,200,000,000,000,000,000,000,000 | threads.c | 155,621,953,118,855,470,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2011-0989 | The RuntimeHelpers.InitializeArray method in metadata/icall.c in Mono, when Moonlight 2.x before 2.4.1 or 3.x before 3.99.3 is used, does not properly restrict data types, which allows remote attackers to modify internal read-only data structures, and cause a denial of service (plugin crash) or corrupt the internal sta... | https://nvd.nist.gov/vuln/detail/CVE-2011-0989 |
212,803 | libsoup | 03c91c76daf70ee227f38304c5e45a155f45073d | https://git.gnome.org/browse/libsoup | https://git.gnome.org/browse/libsoup/commit/?id=03c91c76daf70ee227f38304c5e45a155f45073d | Fix chunked decoding buffer overrun (CVE-2017-2885)
https://bugzilla.gnome.org/show_bug.cgi?id=785774 | 1 | soup_filter_input_stream_read_until (SoupFilterInputStream *fstream,
void *buffer,
gsize length,
const void *boundary,
gsize boundary_length,
gboolean blocking,
gboolean ... | 223,856,053,800,442,820,000,000,000,000,000,000,000 | soup-filter-input-stream.c | 152,379,515,170,284,980,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2017-2885 | An exploitable stack based buffer overflow vulnerability exists in the GNOME libsoup 2.58. A specially crafted HTTP request can cause a stack overflow resulting in remote code execution. An attacker can send a special HTTP request to the vulnerable server to trigger this vulnerability. | https://nvd.nist.gov/vuln/detail/CVE-2017-2885 |
462,113 | libsoup | 03c91c76daf70ee227f38304c5e45a155f45073d | https://git.gnome.org/browse/libsoup | https://git.gnome.org/browse/libsoup/commit/?id=03c91c76daf70ee227f38304c5e45a155f45073d | Fix chunked decoding buffer overrun (CVE-2017-2885)
https://bugzilla.gnome.org/show_bug.cgi?id=785774 | 0 | soup_filter_input_stream_read_until (SoupFilterInputStream *fstream,
void *buffer,
gsize length,
const void *boundary,
gsize boundary_length,
gboolean blocking,
gboolean ... | 298,831,297,658,989,550,000,000,000,000,000,000,000 | soup-filter-input-stream.c | 335,202,112,150,275,000,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2017-2885 | An exploitable stack based buffer overflow vulnerability exists in the GNOME libsoup 2.58. A specially crafted HTTP request can cause a stack overflow resulting in remote code execution. An attacker can send a special HTTP request to the vulnerable server to trigger this vulnerability. | https://nvd.nist.gov/vuln/detail/CVE-2017-2885 |
212,804 | polarssl | 43c3b28ca6d22f51951e2bd563df039a9f4289ab | https://github.com/polarssl/polarssl | https://github.com/polarssl/polarssl/commit/43c3b28ca6d22f51951e2bd563df039a9f4289ab | Fix memory leak with crafted ClientHello | 1 | static int ssl_parse_supported_elliptic_curves( ssl_context *ssl,
const unsigned char *buf,
size_t len )
{
size_t list_size, our_size;
const unsigned char *p;
const ecp_curve_info *curve_info, **curves;
list... | 19,281,647,697,153,342,000,000,000,000,000,000,000 | ssl_srv.c | 19,217,237,288,979,294,000,000,000,000,000,000,000 | [
"CWE-310"
] | CVE-2014-8627 | PolarSSL 1.3.8 does not properly negotiate the signature algorithm to use, which allows remote attackers to conduct downgrade attacks via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2014-8627 |
462,116 | polarssl | 43c3b28ca6d22f51951e2bd563df039a9f4289ab | https://github.com/polarssl/polarssl | https://github.com/polarssl/polarssl/commit/43c3b28ca6d22f51951e2bd563df039a9f4289ab | Fix memory leak with crafted ClientHello | 0 | static int ssl_parse_supported_elliptic_curves( ssl_context *ssl,
const unsigned char *buf,
size_t len )
{
size_t list_size, our_size;
const unsigned char *p;
const ecp_curve_info *curve_info, **curves;
list... | 27,082,270,316,658,830,000,000,000,000,000,000,000 | ssl_srv.c | 88,807,754,252,793,770,000,000,000,000,000,000,000 | [
"CWE-310"
] | CVE-2014-8627 | PolarSSL 1.3.8 does not properly negotiate the signature algorithm to use, which allows remote attackers to conduct downgrade attacks via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2014-8627 |
212,809 | ImageMagick6 | e3417aebe17cbe274b7361aa92c83226ca5b646b | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/e3417aebe17cbe274b7361aa92c83226ca5b646b | https://github.com/ImageMagick/ImageMagick/issues/1533 | 1 | static void SVGEndElement(void *context,const xmlChar *name)
{
SVGInfo
*svg_info;
/*
Called when the end of an element has been detected.
*/
(void) LogMagickEvent(CoderEvent,GetMagickModule(),
" SAX.endElement(%s)",name);
svg_info=(SVGInfo *) context;
if (strchr((char *) name,':') != (char *) ... | 305,655,169,467,543,600,000,000,000,000,000,000,000 | svg.c | 71,181,619,643,884,470,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2019-10649 | In ImageMagick 7.0.8-36 Q16, there is a memory leak in the function SVGKeyValuePairs of coders/svg.c, which allows an attacker to cause a denial of service via a crafted image file. | https://nvd.nist.gov/vuln/detail/CVE-2019-10649 |
462,162 | ImageMagick6 | e3417aebe17cbe274b7361aa92c83226ca5b646b | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/e3417aebe17cbe274b7361aa92c83226ca5b646b | https://github.com/ImageMagick/ImageMagick/issues/1533 | 0 | static void SVGEndElement(void *context,const xmlChar *name)
{
SVGInfo
*svg_info;
/*
Called when the end of an element has been detected.
*/
(void) LogMagickEvent(CoderEvent,GetMagickModule(),
" SAX.endElement(%s)",name);
svg_info=(SVGInfo *) context;
if (strchr((char *) name,':') != (char *) ... | 154,819,241,464,357,260,000,000,000,000,000,000,000 | svg.c | 90,153,729,459,103,800,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2019-10649 | In ImageMagick 7.0.8-36 Q16, there is a memory leak in the function SVGKeyValuePairs of coders/svg.c, which allows an attacker to cause a denial of service via a crafted image file. | https://nvd.nist.gov/vuln/detail/CVE-2019-10649 |
212,817 | libgadu | 23644f1fb8219031b3cac93289a588b05f90226b | https://github.com/wojtekka/libgadu | https://github.com/wojtekka/libgadu/commit/23644f1fb8219031b3cac93289a588b05f90226b | Poprawka ograniczania długości opisu. | 1 | int gg_change_status_descr(struct gg_session *sess, int status, const char *descr)
{
struct gg_new_status80 p;
char *gen_descr = NULL;
int descr_len = 0;
int res;
gg_debug_session(sess, GG_DEBUG_FUNCTION, "** gg_change_status_descr(%p, %d, \"%s\");\n", sess, status, descr);
if (!sess) {
errno = EFAULT;
retu... | 52,558,162,295,730,960,000,000,000,000,000,000,000 | libgadu.c | 81,201,636,615,844,880,000,000,000,000,000,000,000 | [
"CWE-310"
] | CVE-2013-4488 | libgadu before 1.12.0 does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers. | https://nvd.nist.gov/vuln/detail/CVE-2013-4488 |
462,182 | libgadu | 23644f1fb8219031b3cac93289a588b05f90226b | https://github.com/wojtekka/libgadu | https://github.com/wojtekka/libgadu/commit/23644f1fb8219031b3cac93289a588b05f90226b | Poprawka ograniczania długości opisu. | 0 | int gg_change_status_descr(struct gg_session *sess, int status, const char *descr)
{
struct gg_new_status80 p;
char *gen_descr = NULL;
int descr_len = 0;
int descr_null_len = 0;
int res;
gg_debug_session(sess, GG_DEBUG_FUNCTION, "** gg_change_status_descr(%p, %d, \"%s\");\n", sess, status, descr);
if (!sess) {... | 54,318,144,512,359,780,000,000,000,000,000,000,000 | libgadu.c | 7,036,706,736,689,006,000,000,000,000,000,000,000 | [
"CWE-310"
] | CVE-2013-4488 | libgadu before 1.12.0 does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers. | https://nvd.nist.gov/vuln/detail/CVE-2013-4488 |
212,827 | linux | ffdde5932042600c6807d46c1550b28b0db6a3bc | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/ffdde5932042600c6807d46c1550b28b0db6a3bc | crypto: user - fix memory leak in crypto_report
In crypto_report, a new skb is created via nlmsg_new(). This skb should
be released if crypto_report_alg() fails.
Fixes: a38f7907b926 ("crypto: Add userspace configuration API")
Cc: <stable@vger.kernel.org>
Signed-off-by: Navid Emamdoost <navid.emamdoost@gmail.com>
Sign... | 1 | static int crypto_report(struct sk_buff *in_skb, struct nlmsghdr *in_nlh,
struct nlattr **attrs)
{
struct net *net = sock_net(in_skb->sk);
struct crypto_user_alg *p = nlmsg_data(in_nlh);
struct crypto_alg *alg;
struct sk_buff *skb;
struct crypto_dump_info info;
int err;
if (!null_terminated(p->cru_name) || ... | 331,177,297,209,783,760,000,000,000,000,000,000,000 | crypto_user_base.c | 247,977,527,893,476,060,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2019-19062 | A memory leak in the crypto_report() function in crypto/crypto_user_base.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering crypto_report_alg() failures, aka CID-ffdde5932042. | https://nvd.nist.gov/vuln/detail/CVE-2019-19062 |
462,357 | linux | ffdde5932042600c6807d46c1550b28b0db6a3bc | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/ffdde5932042600c6807d46c1550b28b0db6a3bc | crypto: user - fix memory leak in crypto_report
In crypto_report, a new skb is created via nlmsg_new(). This skb should
be released if crypto_report_alg() fails.
Fixes: a38f7907b926 ("crypto: Add userspace configuration API")
Cc: <stable@vger.kernel.org>
Signed-off-by: Navid Emamdoost <navid.emamdoost@gmail.com>
Sign... | 0 | static int crypto_report(struct sk_buff *in_skb, struct nlmsghdr *in_nlh,
struct nlattr **attrs)
{
struct net *net = sock_net(in_skb->sk);
struct crypto_user_alg *p = nlmsg_data(in_nlh);
struct crypto_alg *alg;
struct sk_buff *skb;
struct crypto_dump_info info;
int err;
if (!null_terminated(p->cru_name) || ... | 96,555,276,455,737,560,000,000,000,000,000,000,000 | crypto_user_base.c | 260,285,007,421,737,100,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2019-19062 | A memory leak in the crypto_report() function in crypto/crypto_user_base.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering crypto_report_alg() failures, aka CID-ffdde5932042. | https://nvd.nist.gov/vuln/detail/CVE-2019-19062 |
212,828 | oniguruma | 410f5916429e7d2920e1d4867388514f605413b8 | https://github.com/kkos/oniguruma | https://github.com/kkos/oniguruma/commit/410f5916429e7d2920e1d4867388514f605413b8 | fix #87: Read unknown address in onig_error_code_to_str() | 1 | onig_compile(regex_t* reg, const UChar* pattern, const UChar* pattern_end,
OnigErrorInfo* einfo)
{
#define COMPILE_INIT_SIZE 20
int r, init_size;
Node* root;
ScanEnv scan_env;
#ifdef USE_CALL
UnsetAddrList uslist;
#endif
root = 0;
if (IS_NOT_NULL(einfo)) einfo->par = (UChar* )NULL;
#ifde... | 322,025,196,922,490,200,000,000,000,000,000,000,000 | regcomp.c | 56,836,080,177,363,560,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2019-16161 | Onigmo through 6.2.0 has a NULL pointer dereference in onig_error_code_to_str because of fetch_token in regparse.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-16161 |
462,359 | oniguruma | 410f5916429e7d2920e1d4867388514f605413b8 | https://github.com/kkos/oniguruma | https://github.com/kkos/oniguruma/commit/410f5916429e7d2920e1d4867388514f605413b8 | fix #87: Read unknown address in onig_error_code_to_str() | 0 | onig_compile(regex_t* reg, const UChar* pattern, const UChar* pattern_end,
OnigErrorInfo* einfo)
{
#define COMPILE_INIT_SIZE 20
int r, init_size;
Node* root;
ScanEnv scan_env;
#ifdef USE_CALL
UnsetAddrList uslist;
#endif
root = 0;
if (IS_NOT_NULL(einfo)) {
einfo->enc = reg->enc;
e... | 189,277,875,437,065,980,000,000,000,000,000,000,000 | regcomp.c | 30,592,731,921,158,280,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2019-16161 | Onigmo through 6.2.0 has a NULL pointer dereference in onig_error_code_to_str because of fetch_token in regparse.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-16161 |
212,858 | vim | bd228fd097b41a798f90944b5d1245eddd484142 | https://github.com/vim/vim | https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142 | patch 8.2.3669: buffer overflow with long help argument
Problem: Buffer overflow with long help argument.
Solution: Use snprintf(). | 1 | find_help_tags(
char_u *arg,
int *num_matches,
char_u ***matches,
int keep_lang)
{
char_u *s, *d;
int i;
// Specific tags that either have a specific replacement or won't go
// through the generic rules.
static char *(except_tbl[][2]) = {
{"*", "star"},
{"g*", "gstar"},
{"[*"... | 45,416,759,232,890,300,000,000,000,000,000,000,000 | help.c | 74,559,540,649,927,420,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2021-4019 | vim is vulnerable to Heap-based Buffer Overflow | https://nvd.nist.gov/vuln/detail/CVE-2021-4019 |
462,521 | vim | bd228fd097b41a798f90944b5d1245eddd484142 | https://github.com/vim/vim | https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142 | patch 8.2.3669: buffer overflow with long help argument
Problem: Buffer overflow with long help argument.
Solution: Use snprintf(). | 0 | find_help_tags(
char_u *arg,
int *num_matches,
char_u ***matches,
int keep_lang)
{
char_u *s, *d;
int i;
// Specific tags that either have a specific replacement or won't go
// through the generic rules.
static char *(except_tbl[][2]) = {
{"*", "star"},
{"g*", "gstar"},
{"[*"... | 234,928,037,318,688,400,000,000,000,000,000,000,000 | help.c | 176,062,616,311,754,780,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2021-4019 | vim is vulnerable to Heap-based Buffer Overflow | https://nvd.nist.gov/vuln/detail/CVE-2021-4019 |
212,874 | linux | 1165affd484889d4986cf3b724318935a0b120d8 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1165affd484889d4986cf3b724318935a0b120d8 | net: mac802154: Fix general protection fault
syzbot found general protection fault in crypto_destroy_tfm()[1].
It was caused by wrong clean up loop in llsec_key_alloc().
If one of the tfm array members is in IS_ERR() range it will
cause general protection fault in clean up function [1].
Call Trace:
crypto_free_aead ... | 1 | llsec_key_alloc(const struct ieee802154_llsec_key *template)
{
const int authsizes[3] = { 4, 8, 16 };
struct mac802154_llsec_key *key;
int i;
key = kzalloc(sizeof(*key), GFP_KERNEL);
if (!key)
return NULL;
kref_init(&key->ref);
key->key = *template;
BUILD_BUG_ON(ARRAY_SIZE(authsizes) != ARRAY_SIZE(key->tfm... | 61,223,531,701,870,330,000,000,000,000,000,000,000 | llsec.c | 119,290,437,240,260,140,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2021-33033 | The Linux kernel before 5.11.14 has a use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO refcounting for the DOI definitions is mishandled, aka CID-ad5d07f4a9cd. This leads to writing an arbitrary value. | https://nvd.nist.gov/vuln/detail/CVE-2021-33033 |
462,609 | linux | 1165affd484889d4986cf3b724318935a0b120d8 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1165affd484889d4986cf3b724318935a0b120d8 | net: mac802154: Fix general protection fault
syzbot found general protection fault in crypto_destroy_tfm()[1].
It was caused by wrong clean up loop in llsec_key_alloc().
If one of the tfm array members is in IS_ERR() range it will
cause general protection fault in clean up function [1].
Call Trace:
crypto_free_aead ... | 0 | llsec_key_alloc(const struct ieee802154_llsec_key *template)
{
const int authsizes[3] = { 4, 8, 16 };
struct mac802154_llsec_key *key;
int i;
key = kzalloc(sizeof(*key), GFP_KERNEL);
if (!key)
return NULL;
kref_init(&key->ref);
key->key = *template;
BUILD_BUG_ON(ARRAY_SIZE(authsizes) != ARRAY_SIZE(key->tfm... | 230,484,607,536,439,250,000,000,000,000,000,000,000 | llsec.c | 321,340,577,738,029,480,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2021-33033 | The Linux kernel before 5.11.14 has a use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO refcounting for the DOI definitions is mishandled, aka CID-ad5d07f4a9cd. This leads to writing an arbitrary value. | https://nvd.nist.gov/vuln/detail/CVE-2021-33033 |
212,879 | net | c88507fbad8055297c1d1e21e599f46960cbee39 | https://git.kernel.org/cgit/linux/kernel/git/davem/net | https://git.kernel.org/cgit/linux/kernel/git/davem/net.git/commit/?id=c88507fbad8055297c1d1e21e599f46960cbee39 | ipv6: don't set DST_NOCOUNT for remotely added routes
DST_NOCOUNT should only be used if an authorized user adds routes
locally. In case of routes which are added on behalf of router
advertisments this flag must not get used as it allows an unlimited
number of routes getting added remotely.
Signed-off-by: Sabrina Dub... | 1 | int ip6_route_add(struct fib6_config *cfg)
{
int err;
struct net *net = cfg->fc_nlinfo.nl_net;
struct rt6_info *rt = NULL;
struct net_device *dev = NULL;
struct inet6_dev *idev = NULL;
struct fib6_table *table;
int addr_type;
if (cfg->fc_dst_len > 128 || cfg->fc_src_len > 128)
return -EINVAL;
#ifndef CONFIG_... | 218,526,539,286,029,770,000,000,000,000,000,000,000 | route.c | 142,831,214,030,740,490,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2014-2309 | The ip6_route_add function in net/ipv6/route.c in the Linux kernel through 3.13.6 does not properly count the addition of routes, which allows remote attackers to cause a denial of service (memory consumption) via a flood of ICMPv6 Router Advertisement packets. | https://nvd.nist.gov/vuln/detail/CVE-2014-2309 |
462,645 | net | c88507fbad8055297c1d1e21e599f46960cbee39 | https://git.kernel.org/cgit/linux/kernel/git/davem/net | https://git.kernel.org/cgit/linux/kernel/git/davem/net.git/commit/?id=c88507fbad8055297c1d1e21e599f46960cbee39 | ipv6: don't set DST_NOCOUNT for remotely added routes
DST_NOCOUNT should only be used if an authorized user adds routes
locally. In case of routes which are added on behalf of router
advertisments this flag must not get used as it allows an unlimited
number of routes getting added remotely.
Signed-off-by: Sabrina Dub... | 0 | int ip6_route_add(struct fib6_config *cfg)
{
int err;
struct net *net = cfg->fc_nlinfo.nl_net;
struct rt6_info *rt = NULL;
struct net_device *dev = NULL;
struct inet6_dev *idev = NULL;
struct fib6_table *table;
int addr_type;
if (cfg->fc_dst_len > 128 || cfg->fc_src_len > 128)
return -EINVAL;
#ifndef CONFIG_... | 72,403,176,821,934,220,000,000,000,000,000,000,000 | route.c | 193,709,601,889,154,940,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2014-2309 | The ip6_route_add function in net/ipv6/route.c in the Linux kernel through 3.13.6 does not properly count the addition of routes, which allows remote attackers to cause a denial of service (memory consumption) via a flood of ICMPv6 Router Advertisement packets. | https://nvd.nist.gov/vuln/detail/CVE-2014-2309 |
212,885 | OpenSC | c3f23b836e5a1766c36617fe1da30d22f7b63de2 | https://github.com/OpenSC/OpenSC | https://github.com/OpenSC/OpenSC/commit/c3f23b836e5a1766c36617fe1da30d22f7b63de2 | fixed UNKNOWN READ
Reported by OSS-Fuzz
https://oss-fuzz.com/testcase-detail/5681169970757632 | 1 | static void parse_sec_attr_44(sc_file_t *file, const u8 *buf, size_t len)
{
/* OpenSc Operation values for each command operation-type */
const int df_idx[8] = { /* byte 1 = OpenSC type of AC Bit0, byte 2 = OpenSC type of AC Bit1 ...*/
SC_AC_OP_DELETE, SC_AC_OP_CREATE, SC_AC_OP_CREATE,
SC_AC_OP_INVALIDATE, SC_A... | 162,923,410,164,677,990,000,000,000,000,000,000,000 | card-setcos.c | 240,645,253,339,991,560,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-19479 | An issue was discovered in OpenSC through 0.19.0 and 0.20.x through 0.20.0-rc3. libopensc/card-setcos.c has an incorrect read operation during parsing of a SETCOS file attribute. | https://nvd.nist.gov/vuln/detail/CVE-2019-19479 |
462,735 | OpenSC | c3f23b836e5a1766c36617fe1da30d22f7b63de2 | https://github.com/OpenSC/OpenSC | https://github.com/OpenSC/OpenSC/commit/c3f23b836e5a1766c36617fe1da30d22f7b63de2 | fixed UNKNOWN READ
Reported by OSS-Fuzz
https://oss-fuzz.com/testcase-detail/5681169970757632 | 0 | static void parse_sec_attr_44(sc_file_t *file, const u8 *buf, size_t len)
{
/* OpenSc Operation values for each command operation-type */
const int df_idx[8] = { /* byte 1 = OpenSC type of AC Bit0, byte 2 = OpenSC type of AC Bit1 ...*/
SC_AC_OP_DELETE, SC_AC_OP_CREATE, SC_AC_OP_CREATE,
SC_AC_OP_INVALIDATE, SC_A... | 120,970,071,095,903,630,000,000,000,000,000,000,000 | card-setcos.c | 164,206,860,005,614,020,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-19479 | An issue was discovered in OpenSC through 0.19.0 and 0.20.x through 0.20.0-rc3. libopensc/card-setcos.c has an incorrect read operation during parsing of a SETCOS file attribute. | https://nvd.nist.gov/vuln/detail/CVE-2019-19479 |
212,887 | ghostpdl | 89f58f1aa95b3482cadf6977da49457194ee5358 | https://github.com/ArtifexSoftware/ghostpdl | https://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=89f58f1aa95b3482cadf6977da49457194ee5358 | Bug 701794: check for x_dpi out of range in epsc_print_page().
Avoids out-of-bounds of local arrays graphics_modes_9 and graphics_modes_24.
Larger diff than would like, because can't return error from within
declarations in old-style C.
Fixes:
./sanbin/gs -r680 -sOutputFile=tmp -sDEVICE=epsonc ../bug-701794.pdf | 1 | epsc_print_page(gx_device_printer * pdev, gp_file * prn_stream)
{
static int graphics_modes_9[5] = { -1, 0 /*60 */ , 1 /*120 */ , -1, DD + 3 /*240 */
};
static int graphics_modes_24[7] =
{ -1, 32 /*60 */ , 33 /*120 */ , 39 /*180 */ ,
-1, -1, DD + 40 /*360 */
};
int y_24pin =... | 256,349,240,224,754,140,000,000,000,000,000,000,000 | gdevepsc.c | 133,999,618,454,041,850,000,000,000,000,000,000,000 | [
"CWE-120"
] | CVE-2020-16294 | A buffer overflow vulnerability in epsc_print_page() in devices/gdevepsc.c of Artifex Software GhostScript v9.50 allows a remote attacker to cause a denial of service via a crafted PDF file. This is fixed in v9.51. | https://nvd.nist.gov/vuln/detail/CVE-2020-16294 |
462,763 | ghostpdl | 89f58f1aa95b3482cadf6977da49457194ee5358 | https://github.com/ArtifexSoftware/ghostpdl | https://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=89f58f1aa95b3482cadf6977da49457194ee5358 | Bug 701794: check for x_dpi out of range in epsc_print_page().
Avoids out-of-bounds of local arrays graphics_modes_9 and graphics_modes_24.
Larger diff than would like, because can't return error from within
declarations in old-style C.
Fixes:
./sanbin/gs -r680 -sOutputFile=tmp -sDEVICE=epsonc ../bug-701794.pdf | 0 | epsc_print_page(gx_device_printer * pdev, gp_file * prn_stream)
{
static int graphics_modes_9[5] = { -1, 0 /*60 */ , 1 /*120 */ , -1, DD + 3 /*240 */
};
static int graphics_modes_24[7] =
{ -1, 32 /*60 */ , 33 /*120 */ , 39 /*180 */ ,
-1, -1, DD + 40 /*360 */
};
int y_24pin =... | 26,451,443,670,338,345,000,000,000,000,000,000,000 | gdevepsc.c | 272,775,599,030,029,700,000,000,000,000,000,000,000 | [
"CWE-120"
] | CVE-2020-16294 | A buffer overflow vulnerability in epsc_print_page() in devices/gdevepsc.c of Artifex Software GhostScript v9.50 allows a remote attacker to cause a denial of service via a crafted PDF file. This is fixed in v9.51. | https://nvd.nist.gov/vuln/detail/CVE-2020-16294 |
212,911 | bro | 6c0f101a62489b1c5927b4ed63b0e1d37db40282 | https://github.com/bro/bro | https://github.com/bro/bro/commit/6c0f101a62489b1c5927b4ed63b0e1d37db40282 | Patch OOB write in content-line analyzer.
A combination of packets can trigger an out of bound write of '0' byte
in the content-line analyzer.
This bug was found by Frank Meier.
Addresses BIT-1856. | 1 | int ContentLine_Analyzer::DoDeliverOnce(int len, const u_char* data)
{
const u_char* data_start = data;
if ( len <= 0 )
return 0;
for ( ; len > 0; --len, ++data )
{
if ( offset >= buf_len )
InitBuffer(buf_len * 2);
int c = data[0];
#define EMIT_LINE \
{ \
buf[offset] = '\0'; \
int seq_len = data +... | 339,282,338,437,946,330,000,000,000,000,000,000,000 | ContentLine.cc | 23,429,505,821,233,743,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2017-1000458 | Bro before Bro v2.5.2 is vulnerable to an out of bounds write in the ContentLine analyzer allowing remote attackers to cause a denial of service (crash) and possibly other exploitation. | https://nvd.nist.gov/vuln/detail/CVE-2017-1000458 |
462,972 | bro | 6c0f101a62489b1c5927b4ed63b0e1d37db40282 | https://github.com/bro/bro | https://github.com/bro/bro/commit/6c0f101a62489b1c5927b4ed63b0e1d37db40282 | Patch OOB write in content-line analyzer.
A combination of packets can trigger an out of bound write of '0' byte
in the content-line analyzer.
This bug was found by Frank Meier.
Addresses BIT-1856. | 0 | int ContentLine_Analyzer::DoDeliverOnce(int len, const u_char* data)
{
const u_char* data_start = data;
if ( len <= 0 )
return 0;
for ( ; len > 0; --len, ++data )
{
if ( offset >= buf_len )
InitBuffer(buf_len * 2);
int c = data[0];
#define EMIT_LINE \
{ \
buf[offset] = '\0'; \
int seq_len = data +... | 10,976,774,434,765,438,000,000,000,000,000,000,000 | ContentLine.cc | 65,864,717,905,079,620,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2017-1000458 | Bro before Bro v2.5.2 is vulnerable to an out of bounds write in the ContentLine analyzer allowing remote attackers to cause a denial of service (crash) and possibly other exploitation. | https://nvd.nist.gov/vuln/detail/CVE-2017-1000458 |
212,912 | net | 967c05aee439e6e5d7d805e195b3a20ef5c433d6 | https://git.kernel.org/cgit/linux/kernel/git/davem/net | https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=967c05aee439e6e5d7d805e195b3a20ef5c433d6 | tcp: enforce tcp_min_snd_mss in tcp_mtu_probing()
If mtu probing is enabled tcp_mtu_probing() could very well end up
with a too small MSS.
Use the new sysctl tcp_min_snd_mss to make sure MSS search
is performed in an acceptable range.
CVE-2019-11479 -- tcp mss hardcoded to 48
Signed-off-by: Eric Dumazet <edumazet@g... | 1 | static void tcp_mtu_probing(struct inet_connection_sock *icsk, struct sock *sk)
{
const struct net *net = sock_net(sk);
int mss;
/* Black hole detection */
if (!net->ipv4.sysctl_tcp_mtu_probing)
return;
if (!icsk->icsk_mtup.enabled) {
icsk->icsk_mtup.enabled = 1;
icsk->icsk_mtup.probe_timestamp = tcp_jiffi... | 162,019,764,588,633,300,000,000,000,000,000,000,000 | tcp_timer.c | 48,792,755,777,145,840,000,000,000,000,000,000,000 | [
"CWE-770"
] | CVE-2019-11479 | Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9... | https://nvd.nist.gov/vuln/detail/CVE-2019-11479 |
462,989 | net | 967c05aee439e6e5d7d805e195b3a20ef5c433d6 | https://git.kernel.org/cgit/linux/kernel/git/davem/net | https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=967c05aee439e6e5d7d805e195b3a20ef5c433d6 | tcp: enforce tcp_min_snd_mss in tcp_mtu_probing()
If mtu probing is enabled tcp_mtu_probing() could very well end up
with a too small MSS.
Use the new sysctl tcp_min_snd_mss to make sure MSS search
is performed in an acceptable range.
CVE-2019-11479 -- tcp mss hardcoded to 48
Signed-off-by: Eric Dumazet <edumazet@g... | 0 | static void tcp_mtu_probing(struct inet_connection_sock *icsk, struct sock *sk)
{
const struct net *net = sock_net(sk);
int mss;
/* Black hole detection */
if (!net->ipv4.sysctl_tcp_mtu_probing)
return;
if (!icsk->icsk_mtup.enabled) {
icsk->icsk_mtup.enabled = 1;
icsk->icsk_mtup.probe_timestamp = tcp_jiffi... | 154,427,383,948,867,250,000,000,000,000,000,000,000 | tcp_timer.c | 279,387,289,703,828,880,000,000,000,000,000,000,000 | [
"CWE-770"
] | CVE-2019-11479 | Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9... | https://nvd.nist.gov/vuln/detail/CVE-2019-11479 |
212,913 | tpm2-tools | c069e4f179d5e6653a84fb236816c375dca82515 | https://github.com/tpm2-software/tpm2-tools | https://github.com/tpm2-software/tpm2-tools/commit/c069e4f179d5e6653a84fb236816c375dca82515 | tpm2_import: fix fixed AES key CVE-2021-3565
tpm2_import used a fixed AES key for the inner wrapper, which means that
a MITM attack would be able to unwrap the imported key. Even the
use of an encrypted session will not prevent this. The TPM only
encrypts the first parameter which is the fixed symmetric key.
To fix t... | 1 | static tool_rc key_import(ESYS_CONTEXT *ectx, TPM2B_PUBLIC *parent_pub,
TPM2B_SENSITIVE *privkey, TPM2B_PUBLIC *pubkey,
TPM2B_ENCRYPTED_SECRET *encrypted_seed,
TPM2B_PRIVATE **imported_private) {
TPMI_ALG_HASH name_alg = pubkey->publicArea.nameAlg;
TPM2B_DIGEST *seed = &privkey->sensit... | 297,484,634,456,560,360,000,000,000,000,000,000,000 | tpm2_import.c | 101,937,757,596,075,250,000,000,000,000,000,000,000 | [
"CWE-798"
] | CVE-2021-3565 | A flaw was found in tpm2-tools in versions before 5.1.1 and before 4.3.2. tpm2_import used a fixed AES key for the inner wrapper, potentially allowing a MITM attacker to unwrap the inner portion and reveal the key being imported. The highest threat from this vulnerability is to data confidentiality. | https://nvd.nist.gov/vuln/detail/CVE-2021-3565 |
463,005 | tpm2-tools | c069e4f179d5e6653a84fb236816c375dca82515 | https://github.com/tpm2-software/tpm2-tools | https://github.com/tpm2-software/tpm2-tools/commit/c069e4f179d5e6653a84fb236816c375dca82515 | tpm2_import: fix fixed AES key CVE-2021-3565
tpm2_import used a fixed AES key for the inner wrapper, which means that
a MITM attack would be able to unwrap the imported key. Even the
use of an encrypted session will not prevent this. The TPM only
encrypts the first parameter which is the fixed symmetric key.
To fix t... | 0 | static tool_rc key_import(ESYS_CONTEXT *ectx, TPM2B_PUBLIC *parent_pub,
TPM2B_SENSITIVE *privkey, TPM2B_PUBLIC *pubkey,
TPM2B_ENCRYPTED_SECRET *encrypted_seed,
TPM2B_PRIVATE **imported_private) {
TPMI_ALG_HASH name_alg = pubkey->publicArea.nameAlg;
TPM2B_DIGEST *seed = &privkey->sensit... | 130,260,837,979,574,550,000,000,000,000,000,000,000 | tpm2_import.c | 321,865,962,365,386,950,000,000,000,000,000,000,000 | [
"CWE-798"
] | CVE-2021-3565 | A flaw was found in tpm2-tools in versions before 5.1.1 and before 4.3.2. tpm2_import used a fixed AES key for the inner wrapper, potentially allowing a MITM attacker to unwrap the inner portion and reveal the key being imported. The highest threat from this vulnerability is to data confidentiality. | https://nvd.nist.gov/vuln/detail/CVE-2021-3565 |
212,933 | linux | 4ac2813cc867ae563a1ba5a9414bfb554e5796fa | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4ac2813cc867ae563a1ba5a9414bfb554e5796fa | cfg80211: wext: avoid copying malformed SSIDs
Ensure the SSID element is bounds-checked prior to invoking memcpy()
with its length field, when copying to userspace.
Cc: <stable@vger.kernel.org>
Cc: Kees Cook <keescook@chromium.org>
Reported-by: Nicolas Waisman <nico@semmle.com>
Signed-off-by: Will Deacon <will@kernel... | 1 | int cfg80211_mgd_wext_giwessid(struct net_device *dev,
struct iw_request_info *info,
struct iw_point *data, char *ssid)
{
struct wireless_dev *wdev = dev->ieee80211_ptr;
/* call only for station! */
if (WARN_ON(wdev->iftype != NL80211_IFTYPE_STATION))
return -EINVAL;
data->flags = 0;
wdev_... | 126,387,012,493,135,560,000,000,000,000,000,000,000 | None | null | [
"CWE-120"
] | CVE-2019-17133 | In the Linux kernel through 5.3.2, cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c does not reject a long SSID IE, leading to a Buffer Overflow. | https://nvd.nist.gov/vuln/detail/CVE-2019-17133 |
463,103 | linux | 4ac2813cc867ae563a1ba5a9414bfb554e5796fa | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4ac2813cc867ae563a1ba5a9414bfb554e5796fa | cfg80211: wext: avoid copying malformed SSIDs
Ensure the SSID element is bounds-checked prior to invoking memcpy()
with its length field, when copying to userspace.
Cc: <stable@vger.kernel.org>
Cc: Kees Cook <keescook@chromium.org>
Reported-by: Nicolas Waisman <nico@semmle.com>
Signed-off-by: Will Deacon <will@kernel... | 0 | int cfg80211_mgd_wext_giwessid(struct net_device *dev,
struct iw_request_info *info,
struct iw_point *data, char *ssid)
{
struct wireless_dev *wdev = dev->ieee80211_ptr;
int ret = 0;
/* call only for station! */
if (WARN_ON(wdev->iftype != NL80211_IFTYPE_STATION))
return -EINVAL;
data->flag... | 145,800,217,300,860,140,000,000,000,000,000,000,000 | None | null | [
"CWE-120"
] | CVE-2019-17133 | In the Linux kernel through 5.3.2, cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c does not reject a long SSID IE, leading to a Buffer Overflow. | https://nvd.nist.gov/vuln/detail/CVE-2019-17133 |
212,939 | linux | c3e2219216c92919a6bd1711f340f5faa98695e6 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c3e2219216c92919a6bd1711f340f5faa98695e6 | block: free sched's request pool in blk_cleanup_queue
In theory, IO scheduler belongs to request queue, and the request pool
of sched tags belongs to the request queue too.
However, the current tags allocation interfaces are re-used for both
driver tags and sched tags, and driver tags is definitely host wide,
and doe... | 1 | void blk_cleanup_queue(struct request_queue *q)
{
/* mark @q DYING, no new request or merges will be allowed afterwards */
mutex_lock(&q->sysfs_lock);
blk_set_queue_dying(q);
blk_queue_flag_set(QUEUE_FLAG_NOMERGES, q);
blk_queue_flag_set(QUEUE_FLAG_NOXMERGES, q);
blk_queue_flag_set(QUEUE_FLAG_DYING, q);
mutex_u... | 299,414,391,225,679,600,000,000,000,000,000,000,000 | blk-core.c | 307,759,575,717,776,740,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2019-25044 | The block subsystem in the Linux kernel before 5.2 has a use-after-free that can lead to arbitrary code execution in the kernel context and privilege escalation, aka CID-c3e2219216c9. This is related to blk_mq_free_rqs and blk_cleanup_queue. | https://nvd.nist.gov/vuln/detail/CVE-2019-25044 |
463,367 | linux | c3e2219216c92919a6bd1711f340f5faa98695e6 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c3e2219216c92919a6bd1711f340f5faa98695e6 | block: free sched's request pool in blk_cleanup_queue
In theory, IO scheduler belongs to request queue, and the request pool
of sched tags belongs to the request queue too.
However, the current tags allocation interfaces are re-used for both
driver tags and sched tags, and driver tags is definitely host wide,
and doe... | 0 | void blk_cleanup_queue(struct request_queue *q)
{
/* mark @q DYING, no new request or merges will be allowed afterwards */
mutex_lock(&q->sysfs_lock);
blk_set_queue_dying(q);
blk_queue_flag_set(QUEUE_FLAG_NOMERGES, q);
blk_queue_flag_set(QUEUE_FLAG_NOXMERGES, q);
blk_queue_flag_set(QUEUE_FLAG_DYING, q);
mutex_u... | 22,062,914,982,723,794,000,000,000,000,000,000,000 | blk-core.c | 229,285,566,276,992,670,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2019-25044 | The block subsystem in the Linux kernel before 5.2 has a use-after-free that can lead to arbitrary code execution in the kernel context and privilege escalation, aka CID-c3e2219216c9. This is related to blk_mq_free_rqs and blk_cleanup_queue. | https://nvd.nist.gov/vuln/detail/CVE-2019-25044 |
212,954 | clamav-devel | 270e368b99e93aa5447d46c797c92c3f9f39f375 | https://github.com/vrtadmin/clamav-devel | https://github.com/vrtadmin/clamav-devel/commit/270e368b99e93aa5447d46c797c92c3f9f39f375 | libclamav: bb #7055 | 1 |
int cli_scanpe(cli_ctx *ctx)
{
uint16_t e_magic; /* DOS signature ("MZ") */
uint16_t nsections;
uint32_t e_lfanew; /* address of new exe header */
uint32_t ep, vep; /* entry point (raw, virtual) */
uint8_t polipos = 0;
time_t timestamp;
struct pe_image_file_hdr file_hdr;
union {
struct pe_image_optional_h... | 242,768,206,591,221,150,000,000,000,000,000,000,000 | pe.c | 261,544,086,954,434,900,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2013-2020 | Integer underflow in the cli_scanpe function in pe.c in ClamAV before 0.97.8 allows remote attackers to cause a denial of service (crash) via a skewed offset larger than the size of the PE section in a UPX packed executable, which triggers an out-of-bounds read. | https://nvd.nist.gov/vuln/detail/CVE-2013-2020 |
463,473 | clamav-devel | 270e368b99e93aa5447d46c797c92c3f9f39f375 | https://github.com/vrtadmin/clamav-devel | https://github.com/vrtadmin/clamav-devel/commit/270e368b99e93aa5447d46c797c92c3f9f39f375 | libclamav: bb #7055 | 0 |
int cli_scanpe(cli_ctx *ctx)
{
uint16_t e_magic; /* DOS signature ("MZ") */
uint16_t nsections;
uint32_t e_lfanew; /* address of new exe header */
uint32_t ep, vep; /* entry point (raw, virtual) */
uint8_t polipos = 0;
time_t timestamp;
struct pe_image_file_hdr file_hdr;
union {
struct pe_image_optional_h... | 74,894,318,940,728,270,000,000,000,000,000,000,000 | pe.c | 67,995,944,480,765,990,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2013-2020 | Integer underflow in the cli_scanpe function in pe.c in ClamAV before 0.97.8 allows remote attackers to cause a denial of service (crash) via a skewed offset larger than the size of the PE section in a UPX packed executable, which triggers an out-of-bounds read. | https://nvd.nist.gov/vuln/detail/CVE-2013-2020 |
212,956 | FreeRDP | e7bffa64ef5ed70bac94f823e2b95262642f5296 | https://github.com/FreeRDP/FreeRDP | https://github.com/FreeRDP/FreeRDP/commit/e7bffa64ef5ed70bac94f823e2b95262642f5296 | Fixed OOB read in update_recv_secondary_order
CVE-2020-4032 thanks to @antonio-morales for finding this. | 1 | static BOOL update_recv_secondary_order(rdpUpdate* update, wStream* s, BYTE flags)
{
BOOL rc = FALSE;
size_t start, end, diff;
BYTE orderType;
UINT16 extraFlags;
UINT16 orderLength;
rdpContext* context = update->context;
rdpSettings* settings = context->settings;
rdpSecondaryUpdate* secondary = update->secondar... | 75,350,048,413,078,990,000,000,000,000,000,000,000 | orders.c | 321,418,006,169,494,230,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2020-4032 | In FreeRDP before version 2.1.2, there is an integer casting vulnerability in update_recv_secondary_order. All clients with +glyph-cache /relax-order-checks are affected. This is fixed in version 2.1.2. | https://nvd.nist.gov/vuln/detail/CVE-2020-4032 |
463,477 | FreeRDP | e7bffa64ef5ed70bac94f823e2b95262642f5296 | https://github.com/FreeRDP/FreeRDP | https://github.com/FreeRDP/FreeRDP/commit/e7bffa64ef5ed70bac94f823e2b95262642f5296 | Fixed OOB read in update_recv_secondary_order
CVE-2020-4032 thanks to @antonio-morales for finding this. | 0 | static BOOL update_recv_secondary_order(rdpUpdate* update, wStream* s, BYTE flags)
{
BOOL rc = FALSE;
size_t start, end, diff;
BYTE orderType;
UINT16 extraFlags;
UINT16 orderLength;
rdpContext* context = update->context;
rdpSettings* settings = context->settings;
rdpSecondaryUpdate* secondary = update->secondar... | 336,960,125,205,484,230,000,000,000,000,000,000,000 | orders.c | 258,210,390,610,585,420,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2020-4032 | In FreeRDP before version 2.1.2, there is an integer casting vulnerability in update_recv_secondary_order. All clients with +glyph-cache /relax-order-checks are affected. This is fixed in version 2.1.2. | https://nvd.nist.gov/vuln/detail/CVE-2020-4032 |
212,957 | rsyslog | 8083bd1433449fd2b1b79bf759f782e0f64c0cd2 | https://github.com/rsyslog/rsyslog | http://git.adiscon.com/?p=rsyslog.git;a=commitdiff;h=8083bd1433449fd2b1b79bf759f782e0f64c0cd2 | backporting abort condition fix from 5.7.7 | 1 | msg_t* MsgDup(msg_t* pOld)
{
msg_t* pNew;
rsRetVal localRet;
assert(pOld != NULL);
BEGINfunc
if(msgConstructWithTime(&pNew, &pOld->tTIMESTAMP, pOld->ttGenTime) != RS_RET_OK) {
return NULL;
}
/* now copy the message properties */
pNew->iRefCount = 1;
pNew->iSeverity = pOld->iSeverity;
pNew->iFacility = pO... | 38,447,447,355,937,923,000,000,000,000,000,000,000 | msg.c | 236,170,792,906,567,050,000,000,000,000,000,000,000 | [
"CWE-772"
] | CVE-2011-1488 | A memory leak in rsyslog before 5.7.6 was found in the way deamon processed log messages are logged when $RepeatedMsgReduction was enabled. A local attacker could use this flaw to cause a denial of the rsyslogd daemon service by crashing the service via a sequence of repeated log messages sent within short periods of t... | https://nvd.nist.gov/vuln/detail/CVE-2011-1488 |
463,505 | rsyslog | 8083bd1433449fd2b1b79bf759f782e0f64c0cd2 | https://github.com/rsyslog/rsyslog | http://git.adiscon.com/?p=rsyslog.git;a=commitdiff;h=8083bd1433449fd2b1b79bf759f782e0f64c0cd2 | backporting abort condition fix from 5.7.7 | 0 | msg_t* MsgDup(msg_t* pOld)
{
msg_t* pNew;
rsRetVal localRet;
assert(pOld != NULL);
BEGINfunc
if(msgConstructWithTime(&pNew, &pOld->tTIMESTAMP, pOld->ttGenTime) != RS_RET_OK) {
return NULL;
}
/* now copy the message properties */
pNew->iRefCount = 1;
pNew->iSeverity = pOld->iSeverity;
pNew->iFacility = pO... | 303,464,741,070,204,200,000,000,000,000,000,000,000 | msg.c | 214,809,094,490,159,400,000,000,000,000,000,000,000 | [
"CWE-772"
] | CVE-2011-1488 | A memory leak in rsyslog before 5.7.6 was found in the way deamon processed log messages are logged when $RepeatedMsgReduction was enabled. A local attacker could use this flaw to cause a denial of the rsyslogd daemon service by crashing the service via a sequence of repeated log messages sent within short periods of t... | https://nvd.nist.gov/vuln/detail/CVE-2011-1488 |
212,959 | jasper | a632c6b54bd4ffc3bebab420e00b7e7688aa3846 | https://github.com/mdadams/jasper | https://github.com/mdadams/jasper/commit/a632c6b54bd4ffc3bebab420e00b7e7688aa3846 | Fixed a problem in the JP2 encoder that caused a null pointer dereference
when no ICC profile data is available (e.g., in the case of an
unknown color space).
Reference:
https://github.com/mdadams/jasper/issues/109 | 1 | int jp2_encode(jas_image_t *image, jas_stream_t *out, const char *optstr)
{
jp2_box_t *box;
jp2_ftyp_t *ftyp;
jp2_ihdr_t *ihdr;
jas_stream_t *tmpstream;
int allcmptssame;
jp2_bpcc_t *bpcc;
long len;
uint_fast16_t cmptno;
jp2_colr_t *colr;
char buf[4096];
uint_fast32_t overhead;
jp2_cdefchan_t *cdefchanent;
... | 283,002,192,855,055,500,000,000,000,000,000,000,000 | jp2_enc.c | 277,327,681,804,300,000,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2016-9600 | JasPer before version 2.0.10 is vulnerable to a null pointer dereference was found in the decoded creation of JPEG 2000 image files. A specially crafted file could cause an application using JasPer to crash. | https://nvd.nist.gov/vuln/detail/CVE-2016-9600 |
463,596 | jasper | a632c6b54bd4ffc3bebab420e00b7e7688aa3846 | https://github.com/mdadams/jasper | https://github.com/mdadams/jasper/commit/a632c6b54bd4ffc3bebab420e00b7e7688aa3846 | Fixed a problem in the JP2 encoder that caused a null pointer dereference
when no ICC profile data is available (e.g., in the case of an
unknown color space).
Reference:
https://github.com/mdadams/jasper/issues/109 | 0 | int jp2_encode(jas_image_t *image, jas_stream_t *out, const char *optstr)
{
jp2_box_t *box;
jp2_ftyp_t *ftyp;
jp2_ihdr_t *ihdr;
jas_stream_t *tmpstream;
int allcmptssame;
jp2_bpcc_t *bpcc;
long len;
uint_fast16_t cmptno;
jp2_colr_t *colr;
char buf[4096];
uint_fast32_t overhead;
jp2_cdefchan_t *cdefchanent;
... | 73,625,620,877,222,120,000,000,000,000,000,000,000 | jp2_enc.c | 50,479,229,642,450,790,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2016-9600 | JasPer before version 2.0.10 is vulnerable to a null pointer dereference was found in the decoded creation of JPEG 2000 image files. A specially crafted file could cause an application using JasPer to crash. | https://nvd.nist.gov/vuln/detail/CVE-2016-9600 |
213,012 | linux | dea37a97265588da604c6ba80160a287b72c7bfd | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dea37a97265588da604c6ba80160a287b72c7bfd | media: cpia2: Fix use-after-free in cpia2_exit
Syzkaller report this:
BUG: KASAN: use-after-free in sysfs_remove_file_ns+0x5f/0x70 fs/sysfs/file.c:468
Read of size 8 at addr ffff8881f59a6b70 by task syz-executor.0/8363
CPU: 0 PID: 8363 Comm: syz-executor.0 Not tainted 5.0.0-rc8+ #3
Hardware name: QEMU Standard PC (i... | 1 | static int __init cpia2_init(void)
{
LOG("%s v%s\n",
ABOUT, CPIA_VERSION);
check_parameters();
cpia2_usb_init();
return 0;
} | 199,595,985,885,411,000,000,000,000,000,000,000,000 | cpia2_v4l.c | 30,625,613,206,588,183,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2019-19966 | In the Linux kernel before 5.1.6, there is a use-after-free in cpia2_exit() in drivers/media/usb/cpia2/cpia2_v4l.c that will cause denial of service, aka CID-dea37a972655. | https://nvd.nist.gov/vuln/detail/CVE-2019-19966 |
464,120 | linux | dea37a97265588da604c6ba80160a287b72c7bfd | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dea37a97265588da604c6ba80160a287b72c7bfd | media: cpia2: Fix use-after-free in cpia2_exit
Syzkaller report this:
BUG: KASAN: use-after-free in sysfs_remove_file_ns+0x5f/0x70 fs/sysfs/file.c:468
Read of size 8 at addr ffff8881f59a6b70 by task syz-executor.0/8363
CPU: 0 PID: 8363 Comm: syz-executor.0 Not tainted 5.0.0-rc8+ #3
Hardware name: QEMU Standard PC (i... | 0 | static int __init cpia2_init(void)
{
LOG("%s v%s\n",
ABOUT, CPIA_VERSION);
check_parameters();
return cpia2_usb_init();
} | 6,863,731,982,989,870,000,000,000,000,000,000,000 | cpia2_v4l.c | 13,659,005,257,946,398,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2019-19966 | In the Linux kernel before 5.1.6, there is a use-after-free in cpia2_exit() in drivers/media/usb/cpia2/cpia2_v4l.c that will cause denial of service, aka CID-dea37a972655. | https://nvd.nist.gov/vuln/detail/CVE-2019-19966 |
213,013 | libtasn1 | c593ae84cfcde8fea45787e53950e0ac71e9ca97 | http://git.savannah.gnu.org/cgit/libtasn1 | https://gitlab.com/gnutls/libtasn1/commit/c593ae84cfcde8fea45787e53950e0ac71e9ca97 | _asn1_decode_simple_ber: restrict the levels of recursion to 3
On indefinite string decoding, setting a maximum level of recursions
protects the BER decoder from a stack exhaustion due to large amounts
of recursion.
Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com> | 1 | _asn1_decode_simple_ber (unsigned int etype, const unsigned char *der,
unsigned int _der_len, unsigned char **str,
unsigned int *str_len, unsigned int *ber_len,
unsigned dflags)
{
int tag_len, len_len;
const unsigned char *p;
int der_len = _der_len;
uint8_t *total = NULL;
unsigned total_size = 0;
u... | 130,866,319,515,982,600,000,000,000,000,000,000,000 | decoding.c | 137,056,243,522,745,000,000,000,000,000,000,000,000 | [
"CWE-674"
] | CVE-2018-6003 | An issue was discovered in the _asn1_decode_simple_ber function in decoding.c in GNU Libtasn1 before 4.13. Unlimited recursion in the BER decoder leads to stack exhaustion and DoS. | https://nvd.nist.gov/vuln/detail/CVE-2018-6003 |
464,151 | libtasn1 | c593ae84cfcde8fea45787e53950e0ac71e9ca97 | http://git.savannah.gnu.org/cgit/libtasn1 | https://gitlab.com/gnutls/libtasn1/commit/c593ae84cfcde8fea45787e53950e0ac71e9ca97 | _asn1_decode_simple_ber: restrict the levels of recursion to 3
On indefinite string decoding, setting a maximum level of recursions
protects the BER decoder from a stack exhaustion due to large amounts
of recursion.
Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com> | 0 | _asn1_decode_simple_ber (unsigned int etype, const unsigned char *der,
unsigned int _der_len, unsigned char **str,
unsigned int *str_len, unsigned int *ber_len,
unsigned dflags)
{
int tag_len, len_len;
const unsigned char *p;
int der_len = _der_len;
uint8_t *total = NULL;
unsigned total_size = 0;
u... | 229,587,945,619,179,370,000,000,000,000,000,000,000 | decoding.c | 275,762,429,080,053,760,000,000,000,000,000,000,000 | [
"CWE-674"
] | CVE-2018-6003 | An issue was discovered in the _asn1_decode_simple_ber function in decoding.c in GNU Libtasn1 before 4.13. Unlimited recursion in the BER decoder leads to stack exhaustion and DoS. | https://nvd.nist.gov/vuln/detail/CVE-2018-6003 |
213,028 | ImageMagick | 32a3eeb9e0da083cbc05909e4935efdbf9846df9 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/32a3eeb9e0da083cbc05909e4935efdbf9846df9 | https://github.com/ImageMagick/ImageMagick/issues/736 | 1 | static Image *ReadTIFFImage(const ImageInfo *image_info,
ExceptionInfo *exception)
{
const char
*option;
float
*chromaticity,
x_position,
y_position,
x_resolution,
y_resolution;
Image
*image;
int
tiff_status;
MagickBooleanType
status;
MagickSizeType
number_pixe... | 225,269,407,862,563,560,000,000,000,000,000,000,000 | tiff.c | 38,609,615,407,073,626,000,000,000,000,000,000,000 | [
"CWE-770"
] | CVE-2017-18028 | In ImageMagick 7.0.7-1 Q16, a memory exhaustion vulnerability was found in the function ReadTIFFImage in coders/tiff.c, which allow remote attackers to cause a denial of service via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2017-18028 |
464,939 | ImageMagick | 32a3eeb9e0da083cbc05909e4935efdbf9846df9 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/32a3eeb9e0da083cbc05909e4935efdbf9846df9 | https://github.com/ImageMagick/ImageMagick/issues/736 | 0 | static Image *ReadTIFFImage(const ImageInfo *image_info,
ExceptionInfo *exception)
{
#define ThrowTIFFException(severity,message) \
{ \
if (tiff_pixels != (unsigned char *) NULL) \
tiff_pixels=(unsigned char *) RelinquishMagickMemory(tiff_pixels); \
if (quantum_info != (QuantumInfo *) NULL) \
quantum_info... | 11,985,471,224,312,960,000,000,000,000,000,000,000 | tiff.c | 288,512,354,266,271,200,000,000,000,000,000,000,000 | [
"CWE-770"
] | CVE-2017-18028 | In ImageMagick 7.0.7-1 Q16, a memory exhaustion vulnerability was found in the function ReadTIFFImage in coders/tiff.c, which allow remote attackers to cause a denial of service via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2017-18028 |
213,053 | rsyslog | 6bad782f154b7f838c7371bf99c13f6dc4ec4101 | https://github.com/rsyslog/rsyslog | http://git.adiscon.com/?p=rsyslog.git;a=commit;h=6bad782f154b7f838c7371bf99c13f6dc4ec4101 | bugfix: abort if imfile reads file line of more than 64KiB
Thanks to Peter Eisentraut for reporting and analysing this problem.
bug tracker: http://bugzilla.adiscon.com/show_bug.cgi?id=221 | 1 | rsCStrExtendBuf(cstr_t *pThis, size_t iMinNeeded)
{
uchar *pNewBuf;
unsigned short iNewSize;
DEFiRet;
/* first compute the new size needed */
if(iMinNeeded > RS_STRINGBUF_ALLOC_INCREMENT) {
/* we allocate "n" ALLOC_INCREMENTs. Usually, that should
* leave some room after the absolutely needed one. It also
... | 233,364,396,247,559,780,000,000,000,000,000,000,000 | stringbuf.c | 35,120,055,056,983,420,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2011-4623 | Integer overflow in the rsCStrExtendBuf function in runtime/stringbuf.c in the imfile module in rsyslog 4.x before 4.6.6, 5.x before 5.7.4, and 6.x before 6.1.4 allows local users to cause a denial of service (daemon hang) via a large file, which triggers a heap-based buffer overflow. | https://nvd.nist.gov/vuln/detail/CVE-2011-4623 |
465,228 | rsyslog | 6bad782f154b7f838c7371bf99c13f6dc4ec4101 | https://github.com/rsyslog/rsyslog | http://git.adiscon.com/?p=rsyslog.git;a=commit;h=6bad782f154b7f838c7371bf99c13f6dc4ec4101 | bugfix: abort if imfile reads file line of more than 64KiB
Thanks to Peter Eisentraut for reporting and analysing this problem.
bug tracker: http://bugzilla.adiscon.com/show_bug.cgi?id=221 | 0 | rsCStrExtendBuf(cstr_t *pThis, size_t iMinNeeded)
{
uchar *pNewBuf;
size_t iNewSize;
DEFiRet;
/* first compute the new size needed */
if(iMinNeeded > RS_STRINGBUF_ALLOC_INCREMENT) {
/* we allocate "n" ALLOC_INCREMENTs. Usually, that should
* leave some room after the absolutely needed one. It also
* reduc... | 333,899,734,012,577,020,000,000,000,000,000,000,000 | stringbuf.c | 315,661,862,512,957,940,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2011-4623 | Integer overflow in the rsCStrExtendBuf function in runtime/stringbuf.c in the imfile module in rsyslog 4.x before 4.6.6, 5.x before 5.7.4, and 6.x before 6.1.4 allows local users to cause a denial of service (daemon hang) via a large file, which triggers a heap-based buffer overflow. | https://nvd.nist.gov/vuln/detail/CVE-2011-4623 |
213,072 | ImageMagick | a5eeacb1bd5536f4f53f36e4ad6fa50b4b1261ca | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/a5eeacb1bd5536f4f53f36e4ad6fa50b4b1261ca | Added eps:fit-page to Phostscript reader. | 1 | static Image *ReadPSImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
#define BoundingBox "BoundingBox:"
#define BeginDocument "BeginDocument:"
#define BeginXMPPacket "<?xpacket begin="
#define EndXMPPacket "<?xpacket end="
#define ICCProfile "BeginICCProfile:"
#define CMYKCustomColor "CMYKCustomColor:... | 56,596,652,814,527,820,000,000,000,000,000,000,000 | ps.c | 48,457,353,668,802,160,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2019-13137 | ImageMagick before 7.0.8-50 has a memory leak vulnerability in the function ReadPSImage in coders/ps.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-13137 |
465,843 | ImageMagick | a5eeacb1bd5536f4f53f36e4ad6fa50b4b1261ca | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/a5eeacb1bd5536f4f53f36e4ad6fa50b4b1261ca | Added eps:fit-page to Phostscript reader. | 0 | static Image *ReadPSImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
#define BoundingBox "BoundingBox:"
#define BeginDocument "BeginDocument:"
#define BeginXMPPacket "<?xpacket begin="
#define EndXMPPacket "<?xpacket end="
#define ICCProfile "BeginICCProfile:"
#define CMYKCustomColor "CMYKCustomColor:... | 291,901,321,250,804,740,000,000,000,000,000,000,000 | ps.c | 18,863,238,558,082,112,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2019-13137 | ImageMagick before 7.0.8-50 has a memory leak vulnerability in the function ReadPSImage in coders/ps.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-13137 |
213,073 | ImageMagick6 | e6103897fae2ed47e24b9cf7de719eea877b0504 | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/e6103897fae2ed47e24b9cf7de719eea877b0504 | https://github.com/ImageMagick/ImageMagick/issues/1518 | 1 | static MagickBooleanType WriteJP2Image(const ImageInfo *image_info,Image *image)
{
const char
*option,
*property;
int
jp2_status;
MagickBooleanType
status;
opj_codec_t
*jp2_codec;
OPJ_COLOR_SPACE
jp2_colorspace;
opj_cparameters_t
parameters;
opj_image_cmptparm_t
jp2_i... | 157,916,719,549,129,800,000,000,000,000,000,000,000 | jp2.c | 35,765,222,927,424,644,000,000,000,000,000,000,000 | [
"CWE-665"
] | CVE-2019-12977 | ImageMagick 7.0.8-34 has a "use of uninitialized value" vulnerability in the WriteJP2Image function in coders/jp2.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-12977 |
465,844 | ImageMagick6 | e6103897fae2ed47e24b9cf7de719eea877b0504 | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/e6103897fae2ed47e24b9cf7de719eea877b0504 | https://github.com/ImageMagick/ImageMagick/issues/1518 | 0 | static MagickBooleanType WriteJP2Image(const ImageInfo *image_info,Image *image)
{
const char
*option,
*property;
int
jp2_status;
MagickBooleanType
status;
opj_codec_t
*jp2_codec;
OPJ_COLOR_SPACE
jp2_colorspace;
opj_cparameters_t
parameters;
opj_image_cmptparm_t
jp2_i... | 11,326,046,920,813,226,000,000,000,000,000,000,000 | jp2.c | 200,293,031,995,505,000,000,000,000,000,000,000,000 | [
"CWE-665"
] | CVE-2019-12977 | ImageMagick 7.0.8-34 has a "use of uninitialized value" vulnerability in the WriteJP2Image function in coders/jp2.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-12977 |
213,108 | libxslt | 93bb314768aafaffad1df15bbee10b7c5423e283 | http://git.gnome.org/browse/libxslt | https://gitlab.gnome.org/GNOME/libxslt/commit/93bb314768aafaffad1df15bbee10b7c5423e283 | Fix dyn:map with namespace nodes
exsltDynMapFunction didn't handle namespace nodes correctly. Namespace
nodes are actually an xmlNs, not an xmlNode and must be special-cased.
The old code initialized the doc pointer in the XPath context struct
with a value read from past the end of the xmlNs struct. Typically,
this r... | 1 | exsltDynMapFunction(xmlXPathParserContextPtr ctxt, int nargs)
{
xmlChar *str = NULL;
xmlNodeSetPtr nodeset = NULL;
xsltTransformContextPtr tctxt;
xmlXPathCompExprPtr comp = NULL;
xmlXPathObjectPtr ret = NULL;
xmlDocPtr oldDoc, container = NULL;
xmlNodePtr oldNode;
int oldContextSize;
... | 37,353,334,862,413,250,000,000,000,000,000,000,000 | dynamic.c | 74,547,985,951,933,110,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2016-4610 | libxslt in Apple iOS before 9.3.3, OS X before 10.11.6, iTunes before 12.4.2 on Windows, iCloud before 5.2.1 on Windows, tvOS before 9.2.2, and watchOS before 2.2.2 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors, a different vulnera... | https://nvd.nist.gov/vuln/detail/CVE-2016-4610 |
465,902 | libxslt | 93bb314768aafaffad1df15bbee10b7c5423e283 | http://git.gnome.org/browse/libxslt | https://gitlab.gnome.org/GNOME/libxslt/commit/93bb314768aafaffad1df15bbee10b7c5423e283 | Fix dyn:map with namespace nodes
exsltDynMapFunction didn't handle namespace nodes correctly. Namespace
nodes are actually an xmlNs, not an xmlNode and must be special-cased.
The old code initialized the doc pointer in the XPath context struct
with a value read from past the end of the xmlNs struct. Typically,
this r... | 0 | exsltDynMapFunction(xmlXPathParserContextPtr ctxt, int nargs)
{
xmlChar *str = NULL;
xmlNodeSetPtr nodeset = NULL;
xsltTransformContextPtr tctxt;
xmlXPathCompExprPtr comp = NULL;
xmlXPathObjectPtr ret = NULL;
xmlDocPtr oldDoc, container = NULL;
xmlNodePtr oldNode;
int oldContextSize;
... | 223,756,155,258,632,470,000,000,000,000,000,000,000 | dynamic.c | 63,755,527,805,678,780,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2016-4610 | libxslt in Apple iOS before 9.3.3, OS X before 10.11.6, iTunes before 12.4.2 on Windows, iCloud before 5.2.1 on Windows, tvOS before 9.2.2, and watchOS before 2.2.2 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors, a different vulnera... | https://nvd.nist.gov/vuln/detail/CVE-2016-4610 |
213,114 | linux | 59c4bd853abcea95eccc167a7d7fd5f1a5f47b98 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/59c4bd853abcea95eccc167a7d7fd5f1a5f47b98 | x86/fpu: Don't cache access to fpu_fpregs_owner_ctx
The state/owner of the FPU is saved to fpu_fpregs_owner_ctx by pointing
to the context that is currently loaded. It never changed during the
lifetime of a task - it remained stable/constant.
After deferred FPU registers loading until return to userland was
implement... | 1 | static inline int fpregs_state_valid(struct fpu *fpu, unsigned int cpu)
{
return fpu == this_cpu_read_stable(fpu_fpregs_owner_ctx) && cpu == fpu->last_cpu;
} | 99,225,061,379,756,730,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2019-19602 | fpregs_state_valid in arch/x86/include/asm/fpu/internal.h in the Linux kernel before 5.4.2, when GCC 9 is used, allows context-dependent attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact because of incorrect fpu_fpregs_owner_ctx caching, as demonstrated by mishandling ... | https://nvd.nist.gov/vuln/detail/CVE-2019-19602 |
465,994 | linux | 59c4bd853abcea95eccc167a7d7fd5f1a5f47b98 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/59c4bd853abcea95eccc167a7d7fd5f1a5f47b98 | x86/fpu: Don't cache access to fpu_fpregs_owner_ctx
The state/owner of the FPU is saved to fpu_fpregs_owner_ctx by pointing
to the context that is currently loaded. It never changed during the
lifetime of a task - it remained stable/constant.
After deferred FPU registers loading until return to userland was
implement... | 0 | static inline int fpregs_state_valid(struct fpu *fpu, unsigned int cpu)
{
return fpu == this_cpu_read(fpu_fpregs_owner_ctx) && cpu == fpu->last_cpu;
} | 143,004,928,851,986,950,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2019-19602 | fpregs_state_valid in arch/x86/include/asm/fpu/internal.h in the Linux kernel before 5.4.2, when GCC 9 is used, allows context-dependent attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact because of incorrect fpu_fpregs_owner_ctx caching, as demonstrated by mishandling ... | https://nvd.nist.gov/vuln/detail/CVE-2019-19602 |
213,115 | libgit2 | e1832eb20a7089f6383cfce474f213157f5300cb | https://github.com/libgit2/libgit2 | https://github.com/libgit2/libgit2/commit/e1832eb20a7089f6383cfce474f213157f5300cb | path: also guard `.gitmodules` against NTFS Alternate Data Streams
We just safe-guarded `.git` against NTFS Alternate Data Stream-related
attack vectors, and now it is time to do the same for `.gitmodules`.
Note: In the added regression test, we refrain from verifying all kinds
of variations between short names and N... | 1 | GIT_INLINE(bool) only_spaces_and_dots(const char *path)
{
const char *c = path;
for (;; c++) {
if (*c == '\0')
return true;
if (*c != ' ' && *c != '.')
return false;
}
return true;
} | 307,376,985,168,460,540,000,000,000,000,000,000,000 | path.c | 177,778,740,681,567,300,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2020-12278 | An issue was discovered in libgit2 before 0.28.4 and 0.9x before 0.99.0. path.c mishandles equivalent filenames that exist because of NTFS Alternate Data Streams. This may allow remote code execution when cloning a repository. This issue is similar to CVE-2019-1352. | https://nvd.nist.gov/vuln/detail/CVE-2020-12278 |
466,019 | libgit2 | e1832eb20a7089f6383cfce474f213157f5300cb | https://github.com/libgit2/libgit2 | https://github.com/libgit2/libgit2/commit/e1832eb20a7089f6383cfce474f213157f5300cb | path: also guard `.gitmodules` against NTFS Alternate Data Streams
We just safe-guarded `.git` against NTFS Alternate Data Stream-related
attack vectors, and now it is time to do the same for `.gitmodules`.
Note: In the added regression test, we refrain from verifying all kinds
of variations between short names and N... | 0 | GIT_INLINE(bool) only_spaces_and_dots(const char *path)
{
const char *c = path;
for (;; c++) {
if (*c == '\0' || *c == ':')
return true;
if (*c != ' ' && *c != '.')
return false;
}
return true;
} | 234,559,898,949,979,100,000,000,000,000,000,000,000 | path.c | 135,494,464,199,321,380,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2020-12278 | An issue was discovered in libgit2 before 0.28.4 and 0.9x before 0.99.0. path.c mishandles equivalent filenames that exist because of NTFS Alternate Data Streams. This may allow remote code execution when cloning a repository. This issue is similar to CVE-2019-1352. | https://nvd.nist.gov/vuln/detail/CVE-2020-12278 |
213,117 | radvd | 2591d0189257caeaae2057dfed0a260310497a61 | https://github.com/reubenhwk/radvd | https://github.com/reubenhwk/radvd/commit/2591d0189257caeaae2057dfed0a260310497a61 | removing mdelay in unicast only case | 1 | process_rs(struct Interface *iface, unsigned char *msg, int len,
struct sockaddr_in6 *addr)
{
double delay;
double next;
struct timeval tv;
uint8_t *opt_str;
/* validation */
len -= sizeof(struct nd_router_solicit);
opt_str = (uint8_t *)(msg + sizeof(struct nd_router_solicit));
while (len > 0)
{
int optl... | 59,634,296,372,670,890,000,000,000,000,000,000,000 | process.c | 37,915,199,634,422,154,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-3605 | The process_rs function in the router advertisement daemon (radvd) before 1.8.2, when UnicastOnly is enabled, allows remote attackers to cause a denial of service (temporary service hang) via a large number of ND_ROUTER_SOLICIT requests. | https://nvd.nist.gov/vuln/detail/CVE-2011-3605 |
466,021 | radvd | 2591d0189257caeaae2057dfed0a260310497a61 | https://github.com/reubenhwk/radvd | https://github.com/reubenhwk/radvd/commit/2591d0189257caeaae2057dfed0a260310497a61 | removing mdelay in unicast only case | 0 | process_rs(struct Interface *iface, unsigned char *msg, int len,
struct sockaddr_in6 *addr)
{
double delay;
double next;
struct timeval tv;
uint8_t *opt_str;
/* validation */
len -= sizeof(struct nd_router_solicit);
opt_str = (uint8_t *)(msg + sizeof(struct nd_router_solicit));
while (len > 0)
{
int optl... | 160,083,913,912,599,160,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2011-3605 | The process_rs function in the router advertisement daemon (radvd) before 1.8.2, when UnicastOnly is enabled, allows remote attackers to cause a denial of service (temporary service hang) via a large number of ND_ROUTER_SOLICIT requests. | https://nvd.nist.gov/vuln/detail/CVE-2011-3605 |
213,120 | ImageMagick | 107ce8577e818cf4801e5a59641cb769d645cc95 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/107ce8577e818cf4801e5a59641cb769d645cc95 | https://github.com/ImageMagick/ImageMagick/issues/1224 | 1 | static inline void CheckEventLogging()
{
/*
Are we logging events?
*/
if (IsLinkedListEmpty(log_cache) != MagickFalse)
event_logging=MagickFalse;
else
{
LogInfo
*p;
ResetLinkedListIterator(log_cache);
p=(LogInfo *) GetNextValueInLinkedList(log_cache);
event_logging=p... | 173,173,998,446,177,800,000,000,000,000,000,000,000 | log.c | 279,469,303,194,239,580,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2018-16328 | In ImageMagick before 7.0.8-8, a NULL pointer dereference exists in the CheckEventLogging function in MagickCore/log.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-16328 |
466,042 | ImageMagick | 107ce8577e818cf4801e5a59641cb769d645cc95 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/107ce8577e818cf4801e5a59641cb769d645cc95 | https://github.com/ImageMagick/ImageMagick/issues/1224 | 0 | static inline void CheckEventLogging()
{
/*
Are we logging events?
*/
if (IsLinkedListEmpty(log_cache) != MagickFalse)
event_logging=MagickFalse;
else
{
LogInfo
*p;
ResetLinkedListIterator(log_cache);
p=(LogInfo *) GetNextValueInLinkedList(log_cache);
event_logging=(... | 227,689,687,162,311,830,000,000,000,000,000,000,000 | log.c | 130,856,982,248,272,880,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2018-16328 | In ImageMagick before 7.0.8-8, a NULL pointer dereference exists in the CheckEventLogging function in MagickCore/log.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-16328 |
213,121 | ox | e4565dbc167f0d38c3f93243d7a4fcfc391cbfc8 | https://github.com/ohler55/ox | https://github.com/ohler55/ox/commit/e4565dbc167f0d38c3f93243d7a4fcfc391cbfc8 | Avoid crash with invalid XML passed to Oj.parse_obj() | 1 | end_element(PInfo pi, const char *ename) {
if (TRACE <= pi->options->trace) {
char indent[128];
if (DEBUG <= pi->options->trace) {
char buf[1024];
printf("===== end element stack(%d) =====\n", helper_stack_depth(&pi->helpers));
snprintf(buf, sizeof(buf) - 1, "</%s>", ename);
debug_stack(... | 241,076,032,274,456,960,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-15928 | In the Ox gem 2.8.0 for Ruby, the process crashes with a segmentation fault when a crafted input is supplied to parse_obj. NOTE: the vendor has stated "Ox should handle the error more gracefully" but has not confirmed a security implication. | https://nvd.nist.gov/vuln/detail/CVE-2017-15928 |
466,083 | ox | e4565dbc167f0d38c3f93243d7a4fcfc391cbfc8 | https://github.com/ohler55/ox | https://github.com/ohler55/ox/commit/e4565dbc167f0d38c3f93243d7a4fcfc391cbfc8 | Avoid crash with invalid XML passed to Oj.parse_obj() | 0 | end_element(PInfo pi, const char *ename) {
if (TRACE <= pi->options->trace) {
char indent[128];
if (DEBUG <= pi->options->trace) {
char buf[1024];
printf("===== end element stack(%d) =====\n", helper_stack_depth(&pi->helpers));
snprintf(buf, sizeof(buf) - 1, "</%s>", ename);
debug_stack(... | 33,277,593,858,694,666,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-15928 | In the Ox gem 2.8.0 for Ruby, the process crashes with a segmentation fault when a crafted input is supplied to parse_obj. NOTE: the vendor has stated "Ox should handle the error more gracefully" but has not confirmed a security implication. | https://nvd.nist.gov/vuln/detail/CVE-2017-15928 |
213,251 | Pillow | 3bf5eddb89afdf690eceaa52bc4d3546ba9a5f87 | https://github.com/python-pillow/Pillow | https://github.com/python-pillow/Pillow/commit/3bf5eddb89afdf690eceaa52bc4d3546ba9a5f87 | Fix OOB Read in Jpeg2KDecode CVE-2021-25287,CVE-2021-25288
* For J2k images with multiple bands, it's legal in to have different
widths for each band, e.g. 1 byte for L, 4 bytes for A
* This dates to Pillow 2.4.0 | 1 | j2k_decode_entry(Imaging im, ImagingCodecState state) {
JPEG2KDECODESTATE *context = (JPEG2KDECODESTATE *)state->context;
opj_stream_t *stream = NULL;
opj_image_t *image = NULL;
opj_codec_t *codec = NULL;
opj_dparameters_t params;
OPJ_COLOR_SPACE color_space;
j2k_unpacker_t unpack = NULL;
... | 326,374,483,070,810,000,000,000,000,000,000,000,000 | Jpeg2KDecode.c | 37,742,598,330,296,190,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2021-25287 | An issue was discovered in Pillow before 8.2.0. There is an out-of-bounds read in J2kDecode, in j2ku_graya_la. | https://nvd.nist.gov/vuln/detail/CVE-2021-25287 |
467,148 | Pillow | 3bf5eddb89afdf690eceaa52bc4d3546ba9a5f87 | https://github.com/python-pillow/Pillow | https://github.com/python-pillow/Pillow/commit/3bf5eddb89afdf690eceaa52bc4d3546ba9a5f87 | Fix OOB Read in Jpeg2KDecode CVE-2021-25287,CVE-2021-25288
* For J2k images with multiple bands, it's legal in to have different
widths for each band, e.g. 1 byte for L, 4 bytes for A
* This dates to Pillow 2.4.0 | 0 | j2k_decode_entry(Imaging im, ImagingCodecState state) {
JPEG2KDECODESTATE *context = (JPEG2KDECODESTATE *)state->context;
opj_stream_t *stream = NULL;
opj_image_t *image = NULL;
opj_codec_t *codec = NULL;
opj_dparameters_t params;
OPJ_COLOR_SPACE color_space;
j2k_unpacker_t unpack = NULL;
... | 239,960,158,434,481,040,000,000,000,000,000,000,000 | Jpeg2KDecode.c | 52,048,967,627,038,580,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2021-25287 | An issue was discovered in Pillow before 8.2.0. There is an out-of-bounds read in J2kDecode, in j2ku_graya_la. | https://nvd.nist.gov/vuln/detail/CVE-2021-25287 |
213,321 | ImageMagick6 | a0473b29add9521ffd4c74f6f623b418811762b0 | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/a0473b29add9521ffd4c74f6f623b418811762b0 | https://github.com/ImageMagick/ImageMagick/issues/1472 | 1 | static Image *ReadCINImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
#define MonoColorType 1
#define RGBColorType 3
char
property[MaxTextExtent];
CINInfo
cin;
const unsigned char
*pixels;
Image
*image;
MagickBooleanType
status;
MagickOffsetType
offset;
Quantu... | 29,262,457,991,335,857,000,000,000,000,000,000,000 | cin.c | 86,001,807,343,497,760,000,000,000,000,000,000,000 | [
"CWE-400"
] | CVE-2019-11470 | The cineon parsing component in ImageMagick 7.0.8-26 Q16 allows attackers to cause a denial-of-service (uncontrolled resource consumption) by crafting a Cineon image with an incorrect claimed image size. This occurs because ReadCINImage in coders/cin.c lacks a check for insufficient image data in a file. | https://nvd.nist.gov/vuln/detail/CVE-2019-11470 |
468,068 | ImageMagick6 | a0473b29add9521ffd4c74f6f623b418811762b0 | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/a0473b29add9521ffd4c74f6f623b418811762b0 | https://github.com/ImageMagick/ImageMagick/issues/1472 | 0 | static Image *ReadCINImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
#define MonoColorType 1
#define RGBColorType 3
char
property[MaxTextExtent];
CINInfo
cin;
const unsigned char
*pixels;
Image
*image;
MagickBooleanType
status;
MagickOffsetType
offset;
Quantu... | 295,229,629,294,908,100,000,000,000,000,000,000,000 | cin.c | 260,288,327,217,340,400,000,000,000,000,000,000,000 | [
"CWE-400"
] | CVE-2019-11470 | The cineon parsing component in ImageMagick 7.0.8-26 Q16 allows attackers to cause a denial-of-service (uncontrolled resource consumption) by crafting a Cineon image with an incorrect claimed image size. This occurs because ReadCINImage in coders/cin.c lacks a check for insufficient image data in a file. | https://nvd.nist.gov/vuln/detail/CVE-2019-11470 |
213,350 | qemu | d52680fc932efb8a2f334cc6993e705ed1e31e99 | https://github.com/bonzini/qemu | https://git.qemu.org/?p=qemu.git;a=commit;h=d52680fc932efb8a2f334cc6993e705ed1e31e99 | qxl: check release info object
When releasing spice resources in release_resource() routine,
if release info object 'ext.info' is null, it leads to null
pointer dereference. Add check to avoid it.
Reported-by: Bugs SysSec <bugs-syssec@rub.de>
Signed-off-by: Prasad J Pandit <pjp@fedoraproject.org>
Message-id: 20190425... | 1 | static void interface_release_resource(QXLInstance *sin,
QXLReleaseInfoExt ext)
{
PCIQXLDevice *qxl = container_of(sin, PCIQXLDevice, ssd.qxl);
QXLReleaseRing *ring;
uint64_t *item, id;
if (ext.group_id == MEMSLOT_GROUP_HOST) {
/* host group -> vga mode up... | 170,634,884,135,728,660,000,000,000,000,000,000,000 | qxl.c | 251,840,542,728,123,260,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2019-12155 | interface_release_resource in hw/display/qxl.c in QEMU 3.1.x through 4.0.0 has a NULL pointer dereference. | https://nvd.nist.gov/vuln/detail/CVE-2019-12155 |
468,287 | qemu | d52680fc932efb8a2f334cc6993e705ed1e31e99 | https://github.com/bonzini/qemu | https://git.qemu.org/?p=qemu.git;a=commit;h=d52680fc932efb8a2f334cc6993e705ed1e31e99 | qxl: check release info object
When releasing spice resources in release_resource() routine,
if release info object 'ext.info' is null, it leads to null
pointer dereference. Add check to avoid it.
Reported-by: Bugs SysSec <bugs-syssec@rub.de>
Signed-off-by: Prasad J Pandit <pjp@fedoraproject.org>
Message-id: 20190425... | 0 | static void interface_release_resource(QXLInstance *sin,
QXLReleaseInfoExt ext)
{
PCIQXLDevice *qxl = container_of(sin, PCIQXLDevice, ssd.qxl);
QXLReleaseRing *ring;
uint64_t *item, id;
if (!ext.info) {
return;
}
if (ext.group_id == MEMSLOT_GROUP_H... | 309,083,717,809,523,970,000,000,000,000,000,000,000 | qxl.c | 168,131,111,261,631,240,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2019-12155 | interface_release_resource in hw/display/qxl.c in QEMU 3.1.x through 4.0.0 has a NULL pointer dereference. | https://nvd.nist.gov/vuln/detail/CVE-2019-12155 |
213,360 | ImageMagick | 12f34b60564de1cbec08e23e2413dab5b64daeb7 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/12f34b60564de1cbec08e23e2413dab5b64daeb7 | https://github.com/ImageMagick/ImageMagick/issues/802 | 1 | WandExport MagickBooleanType MogrifyImageList(ImageInfo *image_info,
const int argc,const char **argv,Image **images,ExceptionInfo *exception)
{
const char
*option;
ImageInfo
*mogrify_info;
MagickStatusType
status;
PixelInterpolateMethod
interpolate_method;
QuantizeInfo
*quantize_info... | 123,342,001,171,385,740,000,000,000,000,000,000,000 | mogrify.c | 5,819,085,527,974,756,000,000,000,000,000,000,000 | [
"CWE-617"
] | CVE-2017-18252 | An issue was discovered in ImageMagick 7.0.7. The MogrifyImageList function in MagickWand/mogrify.c allows attackers to cause a denial of service (assertion failure and application exit in ReplaceImageInList) via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2017-18252 |
468,319 | ImageMagick | 12f34b60564de1cbec08e23e2413dab5b64daeb7 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/12f34b60564de1cbec08e23e2413dab5b64daeb7 | https://github.com/ImageMagick/ImageMagick/issues/802 | 0 | WandExport MagickBooleanType MogrifyImageList(ImageInfo *image_info,
const int argc,const char **argv,Image **images,ExceptionInfo *exception)
{
const char
*option;
ImageInfo
*mogrify_info;
MagickStatusType
status;
PixelInterpolateMethod
interpolate_method;
QuantizeInfo
*quantize_info... | 65,355,988,447,693,170,000,000,000,000,000,000,000 | mogrify.c | 21,523,564,167,502,063,000,000,000,000,000,000,000 | [
"CWE-617"
] | CVE-2017-18252 | An issue was discovered in ImageMagick 7.0.7. The MogrifyImageList function in MagickWand/mogrify.c allows attackers to cause a denial of service (assertion failure and application exit in ReplaceImageInList) via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2017-18252 |
213,374 | exim | 4e6ae6235c68de243b1c2419027472d7659aa2b4 | https://github.com/Exim/exim | https://git.exim.org/exim.git/commitdiff/4e6ae6235c68de243b1c2419027472d7659aa2b4 | Avoid release of store if there have been later allocations. Bug 2199 | 1 | receive_msg(BOOL extract_recip)
{
int i;
int rc = FAIL;
int msg_size = 0;
int process_info_len = Ustrlen(process_info);
int error_rc = (error_handling == ERRORS_SENDER)?
errors_sender_rc : EXIT_FAILURE;
int header_size = 256;
int start, end, domain;
int id_resolution;
int had_zero = 0;
int prevlines_le... | 42,096,218,011,087,833,000,000,000,000,000,000,000 | receive.c | 103,232,673,626,716,140,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2017-16943 | The receive_msg function in receive.c in the SMTP daemon in Exim 4.88 and 4.89 allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via vectors involving BDAT commands. | https://nvd.nist.gov/vuln/detail/CVE-2017-16943 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.