idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
468,399 | exim | 4e6ae6235c68de243b1c2419027472d7659aa2b4 | https://github.com/Exim/exim | https://git.exim.org/exim.git/commitdiff/4e6ae6235c68de243b1c2419027472d7659aa2b4 | Avoid release of store if there have been later allocations. Bug 2199 | 0 | receive_msg(BOOL extract_recip)
{
int i;
int rc = FAIL;
int msg_size = 0;
int process_info_len = Ustrlen(process_info);
int error_rc = (error_handling == ERRORS_SENDER)?
errors_sender_rc : EXIT_FAILURE;
int header_size = 256;
int start, end, domain;
int id_resolution;
int had_zero = 0;
int prevlines_le... | 221,787,206,098,620,120,000,000,000,000,000,000,000 | receive.c | 260,622,324,770,754,400,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2017-16943 | The receive_msg function in receive.c in the SMTP daemon in Exim 4.88 and 4.89 allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via vectors involving BDAT commands. | https://nvd.nist.gov/vuln/detail/CVE-2017-16943 |
213,463 | claws | ac286a71ed78429e16c612161251b9ea90ccd431 | http://git.claws-mail.org/?p=claws | https://git.claws-mail.org/?p=claws.git;a=commit;h=ac286a71ed78429e16c612161251b9ea90ccd431 | harden link checker before accepting click | 1 | gboolean textview_uri_security_check(TextView *textview, ClickableText *uri)
{
gchar *visible_str;
gboolean retval = TRUE;
if (is_uri_string(uri->uri) == FALSE)
return TRUE;
visible_str = textview_get_visible_uri(textview, uri);
if (visible_str == NULL)
return TRUE;
g_strstrip(visible_str);
if (strcmp(vi... | 52,474,765,865,925,310,000,000,000,000,000,000,000 | textview.c | 155,997,749,370,061,420,000,000,000,000,000,000,000 | [
"CWE-601"
] | CVE-2021-37746 | textview_uri_security_check in textview.c in Claws Mail before 3.18.0, and Sylpheed through 3.7.0, does not have sufficient link checks before accepting a click. | https://nvd.nist.gov/vuln/detail/CVE-2021-37746 |
468,844 | claws | ac286a71ed78429e16c612161251b9ea90ccd431 | http://git.claws-mail.org/?p=claws | https://git.claws-mail.org/?p=claws.git;a=commit;h=ac286a71ed78429e16c612161251b9ea90ccd431 | harden link checker before accepting click | 0 | gboolean textview_uri_security_check(TextView *textview, ClickableText *uri)
{
gchar *visible_str;
gboolean retval = TRUE;
if (is_uri_string(uri->uri) == FALSE)
return FALSE;
visible_str = textview_get_visible_uri(textview, uri);
if (visible_str == NULL)
return TRUE;
g_strstrip(visible_str);
if (strcmp(v... | 332,202,147,029,445,420,000,000,000,000,000,000,000 | textview.c | 16,047,768,559,720,670,000,000,000,000,000,000,000 | [
"CWE-601"
] | CVE-2021-37746 | textview_uri_security_check in textview.c in Claws Mail before 3.18.0, and Sylpheed through 3.7.0, does not have sufficient link checks before accepting a click. | https://nvd.nist.gov/vuln/detail/CVE-2021-37746 |
213,484 | gimp | 48ec15890e1751dede061f6d1f469b6508c13439 | https://github.com/GNOME/gimp | http://git.gnome.org/browse/gimp/commit/?id=48ec15890e1751dede061f6d1f469b6508c13439 | file-psp: fix for bogus input data. Fixes bug #639203 | 1 | read_channel_data (FILE *f,
PSPimage *ia,
guchar **pixels,
guint bytespp,
guint offset,
GimpDrawable *drawable,
guint32 compressed_len)
{
gint i, y, width = drawable->width, he... | 297,650,408,490,753,520,000,000,000,000,000,000,000 | file-psp.c | 220,891,884,149,582,260,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2011-1782 | Heap-based buffer overflow in the read_channel_data function in file-psp.c in the Paint Shop Pro (PSP) plugin in GIMP 2.6.11 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a PSP_COMP_RLE (aka RLE compression) image file that begins a long run count at the... | https://nvd.nist.gov/vuln/detail/CVE-2011-1782 |
469,073 | gimp | 48ec15890e1751dede061f6d1f469b6508c13439 | https://github.com/GNOME/gimp | http://git.gnome.org/browse/gimp/commit/?id=48ec15890e1751dede061f6d1f469b6508c13439 | file-psp: fix for bogus input data. Fixes bug #639203 | 0 | read_channel_data (FILE *f,
PSPimage *ia,
guchar **pixels,
guint bytespp,
guint offset,
GimpDrawable *drawable,
guint32 compressed_len)
{
gint i, y, width = drawable->width, he... | 69,505,419,645,543,400,000,000,000,000,000,000,000 | file-psp.c | 75,479,100,107,507,160,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2011-1782 | Heap-based buffer overflow in the read_channel_data function in file-psp.c in the Paint Shop Pro (PSP) plugin in GIMP 2.6.11 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a PSP_COMP_RLE (aka RLE compression) image file that begins a long run count at the... | https://nvd.nist.gov/vuln/detail/CVE-2011-1782 |
213,488 | weechat | efb795c74fe954b9544074aafcebb1be4452b03a | https://github.com/weechat/weechat | http://git.savannah.gnu.org/gitweb/?p=weechat.git;a=commitdiff_plain;h=efb795c74fe954b9544074aafcebb1be4452b03a | core: do not call shell to execute command in hook_process (fix security problem when a plugin/script gives untrusted command) (bug #37764) | 1 | hook_process_child (struct t_hook *hook_process)
{
char *exec_args[4] = { "sh", "-c", NULL, NULL };
const char *ptr_url;
int rc;
/*
* close stdin, so that process will fail to read stdin (process reading
* stdin should not be run inside WeeChat!)
*/
close (STDIN_FILENO);
/* redi... | 280,923,024,449,057,000,000,000,000,000,000,000,000 | wee-hook.c | 276,147,935,021,672,700,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2012-5534 | The hook_process function in the plugin API for WeeChat 0.3.0 through 0.3.9.1 allows remote attackers to execute arbitrary commands via shell metacharacters in a command from a plugin, related to "shell expansion." | https://nvd.nist.gov/vuln/detail/CVE-2012-5534 |
471,361 | weechat | efb795c74fe954b9544074aafcebb1be4452b03a | https://github.com/weechat/weechat | http://git.savannah.gnu.org/gitweb/?p=weechat.git;a=commitdiff_plain;h=efb795c74fe954b9544074aafcebb1be4452b03a | core: do not call shell to execute command in hook_process (fix security problem when a plugin/script gives untrusted command) (bug #37764) | 0 | hook_process_child (struct t_hook *hook_process)
{
char **exec_args;
const char *ptr_url;
int rc, i;
/*
* close stdin, so that process will fail to read stdin (process reading
* stdin should not be run inside WeeChat!)
*/
close (STDIN_FILENO);
/* redirect stdout/stderr to pipe (... | 332,420,425,535,788,540,000,000,000,000,000,000,000 | wee-hook.c | 178,766,994,315,960,500,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2012-5534 | The hook_process function in the plugin API for WeeChat 0.3.0 through 0.3.9.1 allows remote attackers to execute arbitrary commands via shell metacharacters in a command from a plugin, related to "shell expansion." | https://nvd.nist.gov/vuln/detail/CVE-2012-5534 |
213,490 | ImageMagick6 | 6ce6d25b47caf9b6b2979a510b6202ce0f3dd2d4 | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/6ce6d25b47caf9b6b2979a510b6202ce0f3dd2d4 | https://github.com/ImageMagick/ImageMagick/issues/1195 | 1 | static Image *XMagickCommand(Display *display,XResourceInfo *resource_info,
XWindows *windows,const CommandType command_type,Image **image,
MagickStatusType *state)
{
Image
*nexus;
MagickBooleanType
proceed;
MagickStatusType
status;
XTextProperty
window_name;
/*
Process user comman... | 231,625,559,286,305,350,000,000,000,000,000,000,000 | animate.c | 178,078,632,815,084,070,000,000,000,000,000,000,000 | [
"CWE-772"
] | CVE-2018-13153 | In ImageMagick 7.0.8-4, there is a memory leak in the XMagickCommand function in MagickCore/animate.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-13153 |
471,587 | ImageMagick6 | 6ce6d25b47caf9b6b2979a510b6202ce0f3dd2d4 | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/6ce6d25b47caf9b6b2979a510b6202ce0f3dd2d4 | https://github.com/ImageMagick/ImageMagick/issues/1195 | 0 | static Image *XMagickCommand(Display *display,XResourceInfo *resource_info,
XWindows *windows,const CommandType command_type,Image **image,
MagickStatusType *state)
{
Image
*nexus;
MagickBooleanType
proceed;
MagickStatusType
status;
XTextProperty
window_name;
/*
Process user comman... | 275,405,940,642,860,300,000,000,000,000,000,000,000 | animate.c | 195,559,166,946,166,660,000,000,000,000,000,000,000 | [
"CWE-772"
] | CVE-2018-13153 | In ImageMagick 7.0.8-4, there is a memory leak in the XMagickCommand function in MagickCore/animate.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-13153 |
213,494 | php-src | 8d3dfabef459fe7815e8ea2fd68753fd17859d7b | https://github.com/php/php-src | http://git.php.net/?p=php-src.git;a=commit;h=8d3dfabef459fe7815e8ea2fd68753fd17859d7b | Fix #77369 - memcpy with negative length via crafted DNS response | 1 | static u_char *php_parserr(u_char *cp, u_char *end, querybuf *answer, int type_to_fetch, int store, int raw, zval *subarray)
{
u_short type, class, dlen;
u_long ttl;
long n, i;
u_short s;
u_char *tp, *p;
char name[MAXHOSTNAMELEN];
int have_v6_break = 0, in_v6_break = 0;
ZVAL_UNDEF(subarray);
n = dn_expand(an... | 3,293,586,128,173,186,600,000,000,000,000,000,000 | dns.c | 79,767,520,775,608,475,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-9022 | An issue was discovered in PHP 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.2. dns_get_record misparses a DNS response, which can allow a hostile DNS server to cause PHP to misuse memcpy, leading to read operations going past the buffer allocated for DNS data. This affects php_parserr in ext/standard/dn... | https://nvd.nist.gov/vuln/detail/CVE-2019-9022 |
471,594 | php-src | 8d3dfabef459fe7815e8ea2fd68753fd17859d7b | https://github.com/php/php-src | http://git.php.net/?p=php-src.git;a=commit;h=8d3dfabef459fe7815e8ea2fd68753fd17859d7b | Fix #77369 - memcpy with negative length via crafted DNS response | 0 | static u_char *php_parserr(u_char *cp, u_char *end, querybuf *answer, int type_to_fetch, int store, int raw, zval *subarray)
{
u_short type, class, dlen;
u_long ttl;
long n, i;
u_short s;
u_char *tp, *p;
char name[MAXHOSTNAMELEN];
int have_v6_break = 0, in_v6_break = 0;
ZVAL_UNDEF(subarray);
n = dn_expand(an... | 122,246,461,383,970,770,000,000,000,000,000,000,000 | dns.c | 95,404,559,781,527,680,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-9022 | An issue was discovered in PHP 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.2. dns_get_record misparses a DNS response, which can allow a hostile DNS server to cause PHP to misuse memcpy, leading to read operations going past the buffer allocated for DNS data. This affects php_parserr in ext/standard/dn... | https://nvd.nist.gov/vuln/detail/CVE-2019-9022 |
213,497 | ImageMagick6 | 3b28c8d93aa469f6d90c8b3c05fe3d88c2584e32 | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/3b28c8d93aa469f6d90c8b3c05fe3d88c2584e32 | https://github.com/ImageMagick/ImageMagick/issues/1454 | 1 | static MagickBooleanType WritePDFImage(const ImageInfo *image_info,Image *image)
{
#define CFormat "/Filter [ /%s ]\n"
#define ObjectsPerImage 14
#define ThrowPDFException(exception,message) \
{ \
if (xref != (MagickOffsetType *) NULL) \
xref=(MagickOffsetType *) RelinquishMagickMemory(xref); \
ThrowWriterExc... | 88,025,508,075,805,540,000,000,000,000,000,000,000 | pdf.c | 141,426,464,685,344,450,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2019-7397 | In ImageMagick before 7.0.8-25 and GraphicsMagick through 1.3.31, several memory leaks exist in WritePDFImage in coders/pdf.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-7397 |
471,613 | ImageMagick6 | 3b28c8d93aa469f6d90c8b3c05fe3d88c2584e32 | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/3b28c8d93aa469f6d90c8b3c05fe3d88c2584e32 | https://github.com/ImageMagick/ImageMagick/issues/1454 | 0 | static MagickBooleanType WritePDFImage(const ImageInfo *image_info,Image *image)
{
#define CFormat "/Filter [ /%s ]\n"
#define ObjectsPerImage 14
#define ThrowPDFException(exception,message) \
{ \
if (xref != (MagickOffsetType *) NULL) \
xref=(MagickOffsetType *) RelinquishMagickMemory(xref); \
ThrowWriterExc... | 180,808,065,955,658,600,000,000,000,000,000,000,000 | pdf.c | 210,889,938,189,627,700,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2019-7397 | In ImageMagick before 7.0.8-25 and GraphicsMagick through 1.3.31, several memory leaks exist in WritePDFImage in coders/pdf.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-7397 |
213,501 | OpenSC | 6903aebfddc466d966c7b865fae34572bf3ed23e | https://github.com/OpenSC/OpenSC | https://github.com/OpenSC/OpenSC/commit/6903aebfddc466d966c7b865fae34572bf3ed23e | Heap-buffer-overflow WRITE
fixes https://oss-fuzz.com/testcase-detail/5088104168554496 | 1 | sc_oberthur_read_file(struct sc_pkcs15_card *p15card, const char *in_path,
unsigned char **out, size_t *out_len,
int verify_pin)
{
struct sc_context *ctx = p15card->card->ctx;
struct sc_card *card = p15card->card;
struct sc_file *file = NULL;
struct sc_path path;
size_t sz;
int rv;
LOG_FUNC_CALLED(ctx);
if... | 284,226,323,771,564,550,000,000,000,000,000,000,000 | pkcs15-oberthur.c | 215,493,386,958,330,340,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2020-26570 | The Oberthur smart card software driver in OpenSC before 0.21.0-rc1 has a heap-based buffer overflow in sc_oberthur_read_file. | https://nvd.nist.gov/vuln/detail/CVE-2020-26570 |
471,690 | OpenSC | 6903aebfddc466d966c7b865fae34572bf3ed23e | https://github.com/OpenSC/OpenSC | https://github.com/OpenSC/OpenSC/commit/6903aebfddc466d966c7b865fae34572bf3ed23e | Heap-buffer-overflow WRITE
fixes https://oss-fuzz.com/testcase-detail/5088104168554496 | 0 | sc_oberthur_read_file(struct sc_pkcs15_card *p15card, const char *in_path,
unsigned char **out, size_t *out_len,
int verify_pin)
{
struct sc_context *ctx = p15card->card->ctx;
struct sc_card *card = p15card->card;
struct sc_file *file = NULL;
struct sc_path path;
size_t sz;
int rv;
LOG_FUNC_CALLED(ctx);
if... | 13,652,587,171,142,750,000,000,000,000,000,000,000 | pkcs15-oberthur.c | 284,191,403,346,903,100,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2020-26570 | The Oberthur smart card software driver in OpenSC before 0.21.0-rc1 has a heap-based buffer overflow in sc_oberthur_read_file. | https://nvd.nist.gov/vuln/detail/CVE-2020-26570 |
213,504 | ImageMagick | b4dd4d266f2d450a2996abf5294671d888991132 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/b4dd4d266f2d450a2996abf5294671d888991132 | https://github.com/ImageMagick/ImageMagick/issues/1515 | 1 | static Image *ReadPANGOImage(const ImageInfo *image_info,
ExceptionInfo *exception)
{
cairo_font_options_t
*font_options;
cairo_surface_t
*surface;
char
*caption,
*property;
cairo_t
*cairo_image;
const char
*option;
DrawInfo
*draw_info;
Image
*image;
MagickBoolea... | 157,574,486,678,839,000,000,000,000,000,000,000,000 | pango.c | 20,337,442,773,612,117,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2019-12974 | A NULL pointer dereference in the function ReadPANGOImage in coders/pango.c and the function ReadVIDImage in coders/vid.c in ImageMagick 7.0.8-34 allows remote attackers to cause a denial of service via a crafted image. | https://nvd.nist.gov/vuln/detail/CVE-2019-12974 |
471,751 | ImageMagick | b4dd4d266f2d450a2996abf5294671d888991132 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/b4dd4d266f2d450a2996abf5294671d888991132 | https://github.com/ImageMagick/ImageMagick/issues/1515 | 0 | static Image *ReadPANGOImage(const ImageInfo *image_info,
ExceptionInfo *exception)
{
cairo_font_options_t
*font_options;
cairo_surface_t
*surface;
char
*caption,
*property;
cairo_t
*cairo_image;
const char
*option;
DrawInfo
*draw_info;
Image
*image;
MagickBoolea... | 259,439,766,290,244,150,000,000,000,000,000,000,000 | pango.c | 214,869,999,186,747,640,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2019-12974 | A NULL pointer dereference in the function ReadPANGOImage in coders/pango.c and the function ReadVIDImage in coders/vid.c in ImageMagick 7.0.8-34 allows remote attackers to cause a denial of service via a crafted image. | https://nvd.nist.gov/vuln/detail/CVE-2019-12974 |
213,505 | ImageMagick | b4dd4d266f2d450a2996abf5294671d888991132 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/b4dd4d266f2d450a2996abf5294671d888991132 | https://github.com/ImageMagick/ImageMagick/issues/1515 | 1 | static Image *ReadVIDImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
#define ClientName "montage"
char
**filelist,
*label,
**list;
Image
*image,
*images,
*montage_image,
*next_image,
*thumbnail_image;
ImageInfo
*read_info;
int
number_files;
MagickBoo... | 68,895,088,797,636,250,000,000,000,000,000,000,000 | vid.c | 245,904,898,213,529,720,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2019-12974 | A NULL pointer dereference in the function ReadPANGOImage in coders/pango.c and the function ReadVIDImage in coders/vid.c in ImageMagick 7.0.8-34 allows remote attackers to cause a denial of service via a crafted image. | https://nvd.nist.gov/vuln/detail/CVE-2019-12974 |
471,750 | ImageMagick | b4dd4d266f2d450a2996abf5294671d888991132 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/b4dd4d266f2d450a2996abf5294671d888991132 | https://github.com/ImageMagick/ImageMagick/issues/1515 | 0 | static Image *ReadVIDImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
#define ClientName "montage"
char
**filelist,
*label,
**list;
Image
*image,
*images,
*montage_image,
*next_image,
*thumbnail_image;
ImageInfo
*read_info;
int
number_files;
MagickBoo... | 134,928,637,765,032,500,000,000,000,000,000,000,000 | vid.c | 216,721,314,985,940,500,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2019-12974 | A NULL pointer dereference in the function ReadPANGOImage in coders/pango.c and the function ReadVIDImage in coders/vid.c in ImageMagick 7.0.8-34 allows remote attackers to cause a denial of service via a crafted image. | https://nvd.nist.gov/vuln/detail/CVE-2019-12974 |
213,512 | qemu | 5311fb805a4403bba024e83886fa0e7572265de4 | https://github.com/bonzini/qemu | https://git.qemu.org/?p=qemu.git;a=commit;h=5311fb805a4403bba024e83886fa0e7572265de4 | rtl8139: switch to use qemu_receive_packet() for loopback
This patch switches to use qemu_receive_packet() which can detect
reentrancy and return early.
This is intended to address CVE-2021-3416.
Cc: Prasad J Pandit <ppandit@redhat.com>
Cc: qemu-stable@nongnu.org
Buglink: https://bugs.launchpad.net/qemu/+bug/1910826... | 1 | static void rtl8139_transfer_frame(RTL8139State *s, uint8_t *buf, int size,
int do_interrupt, const uint8_t *dot1q_buf)
{
struct iovec *iov = NULL;
struct iovec vlan_iov[3];
if (!size)
{
DPRINTF("+++ empty ethernet frame\n");
return;
}
if (dot1q_buf && size >= ETH_ALEN * 2)... | 72,207,073,610,620,290,000,000,000,000,000,000,000 | rtl8139.c | 32,305,688,755,596,744,000,000,000,000,000,000,000 | [
"CWE-835"
] | CVE-2021-3416 | A potential stack overflow via infinite loop issue was found in various NIC emulators of QEMU in versions up to and including 5.2.0. The issue occurs in loopback mode of a NIC wherein reentrant DMA checks get bypassed. A guest user/process may use this flaw to consume CPU cycles or crash the QEMU process on the host re... | https://nvd.nist.gov/vuln/detail/CVE-2021-3416 |
471,854 | qemu | 5311fb805a4403bba024e83886fa0e7572265de4 | https://github.com/bonzini/qemu | https://git.qemu.org/?p=qemu.git;a=commit;h=5311fb805a4403bba024e83886fa0e7572265de4 | rtl8139: switch to use qemu_receive_packet() for loopback
This patch switches to use qemu_receive_packet() which can detect
reentrancy and return early.
This is intended to address CVE-2021-3416.
Cc: Prasad J Pandit <ppandit@redhat.com>
Cc: qemu-stable@nongnu.org
Buglink: https://bugs.launchpad.net/qemu/+bug/1910826... | 0 | static void rtl8139_transfer_frame(RTL8139State *s, uint8_t *buf, int size,
int do_interrupt, const uint8_t *dot1q_buf)
{
struct iovec *iov = NULL;
struct iovec vlan_iov[3];
if (!size)
{
DPRINTF("+++ empty ethernet frame\n");
return;
}
if (dot1q_buf && size >= ETH_ALEN * 2)... | 67,590,111,060,286,450,000,000,000,000,000,000,000 | rtl8139.c | 334,777,128,529,716,000,000,000,000,000,000,000,000 | [
"CWE-835"
] | CVE-2021-3416 | A potential stack overflow via infinite loop issue was found in various NIC emulators of QEMU in versions up to and including 5.2.0. The issue occurs in loopback mode of a NIC wherein reentrant DMA checks get bypassed. A guest user/process may use this flaw to consume CPU cycles or crash the QEMU process on the host re... | https://nvd.nist.gov/vuln/detail/CVE-2021-3416 |
213,543 | ImageMagick | cdafbc753cf794160eb53b320d4bc0b36ba6ed1d | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/cdafbc753cf794160eb53b320d4bc0b36ba6ed1d | Fix moment when quantum info is acquired to fix issue reported in #469. | 1 | static Image *ReadMATImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
Image *image, *image2=NULL,
*rotated_image;
register Quantum *q;
unsigned int status;
MATHeader MATLAB_HDR;
size_t size;
size_t CellType;
QuantumInfo *quantum_info;
ImageInfo *clone_info;
int i;
ssize_t ldblk;
u... | 322,785,602,229,547,300,000,000,000,000,000,000,000 | mat.c | 322,862,768,624,585,500,000,000,000,000,000,000,000 | [
"CWE-772"
] | CVE-2017-11141 | The ReadMATImage function in coders\mat.c in ImageMagick 7.0.5-6 has a memory leak vulnerability that can cause memory exhaustion via a crafted MAT file, related to incorrect ordering of a SetImageExtent call. | https://nvd.nist.gov/vuln/detail/CVE-2017-11141 |
472,351 | ImageMagick | cdafbc753cf794160eb53b320d4bc0b36ba6ed1d | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/cdafbc753cf794160eb53b320d4bc0b36ba6ed1d | Fix moment when quantum info is acquired to fix issue reported in #469. | 0 | static Image *ReadMATImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
Image *image, *image2=NULL,
*rotated_image;
register Quantum *q;
unsigned int status;
MATHeader MATLAB_HDR;
size_t size;
size_t CellType;
QuantumInfo *quantum_info;
ImageInfo *clone_info;
int i;
ssize_t ldblk;
u... | 154,792,796,937,169,150,000,000,000,000,000,000,000 | mat.c | 57,178,113,443,917,655,000,000,000,000,000,000,000 | [
"CWE-772"
] | CVE-2017-11141 | The ReadMATImage function in coders\mat.c in ImageMagick 7.0.5-6 has a memory leak vulnerability that can cause memory exhaustion via a crafted MAT file, related to incorrect ordering of a SetImageExtent call. | https://nvd.nist.gov/vuln/detail/CVE-2017-11141 |
213,549 | ImageMagick | 82775af03bbb10a0a1d0e15c0156c75673b4525e | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/82775af03bbb10a0a1d0e15c0156c75673b4525e | Moved the free to the correct position to fix #4446. | 1 | static Image *ReadDCMImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
#define ThrowDCMException(exception,message) \
{ \
RelinquishDCMMemory(&info,&map,stream_info,stack,data); \
ThrowReaderException((exception),(message)); \
}
char
explicit_vr[MagickPathExtent],
implicit_vr[MagickPathExtent... | 152,411,006,144,091,710,000,000,000,000,000,000,000 | dcm.c | 64,543,759,851,391,670,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2021-3962 | A flaw was found in ImageMagick where it did not properly sanitize certain input before using it to invoke convert processes. This flaw allows an attacker to create a specially crafted image that leads to a use-after-free vulnerability when processed by ImageMagick. The highest threat from this vulnerability is to conf... | https://nvd.nist.gov/vuln/detail/CVE-2021-3962 |
472,380 | ImageMagick | 82775af03bbb10a0a1d0e15c0156c75673b4525e | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/82775af03bbb10a0a1d0e15c0156c75673b4525e | Moved the free to the correct position to fix #4446. | 0 | static Image *ReadDCMImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
#define ThrowDCMException(exception,message) \
{ \
RelinquishDCMMemory(&info,&map,stream_info,stack,data); \
ThrowReaderException((exception),(message)); \
}
char
explicit_vr[MagickPathExtent],
implicit_vr[MagickPathExtent... | 238,512,405,059,643,860,000,000,000,000,000,000,000 | dcm.c | 129,507,672,840,650,240,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2021-3962 | A flaw was found in ImageMagick where it did not properly sanitize certain input before using it to invoke convert processes. This flaw allows an attacker to create a specially crafted image that leads to a use-after-free vulnerability when processed by ImageMagick. The highest threat from this vulnerability is to conf... | https://nvd.nist.gov/vuln/detail/CVE-2021-3962 |
213,554 | exim | 57aa14b216432be381b6295c312065b2fd034f86 | https://github.com/Exim/exim | https://git.exim.org/exim.git/commit/57aa14b216432be381b6295c312065b2fd034f86 | Fix SPA authenticator, checking client-supplied data before using it. Bug 2571 | 1 | spa_base64_to_bits (char *out, int outlength, const char *in)
/* base 64 to raw bytes in quasi-big-endian order, returning count of bytes */
{
int len = 0;
register uschar digit1, digit2, digit3, digit4;
if (in[0] == '+' && in[1] == ' ')
in += 2;
if (*in == '\r')
return (0);
do
{
if (len >... | 237,185,534,796,488,830,000,000,000,000,000,000,000 | auth-spa.c | 300,505,394,568,130,620,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2020-12783 | Exim through 4.93 has an out-of-bounds read in the SPA authenticator that could result in SPA/NTLM authentication bypass in auths/spa.c and auths/auth-spa.c. | https://nvd.nist.gov/vuln/detail/CVE-2020-12783 |
472,432 | exim | 57aa14b216432be381b6295c312065b2fd034f86 | https://github.com/Exim/exim | https://git.exim.org/exim.git/commit/57aa14b216432be381b6295c312065b2fd034f86 | Fix SPA authenticator, checking client-supplied data before using it. Bug 2571 | 0 | spa_base64_to_bits (char *out, int outlength, const char *in)
/* base 64 to raw bytes in quasi-big-endian order, returning count of bytes */
{
int len = 0;
uschar digit1, digit2, digit3, digit4;
if (in[0] == '+' && in[1] == ' ')
in += 2;
if (*in == '\r')
return (0);
do
{
if (len >= outlength) ... | 195,963,974,858,701,400,000,000,000,000,000,000,000 | auth-spa.c | 305,015,162,195,146,430,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2020-12783 | Exim through 4.93 has an out-of-bounds read in the SPA authenticator that could result in SPA/NTLM authentication bypass in auths/spa.c and auths/auth-spa.c. | https://nvd.nist.gov/vuln/detail/CVE-2020-12783 |
213,555 | poppler | 6912e06d9ab19ba28991b5cab3319d61d856bd6d | https://github.com/freedesktop/poppler | https://gitlab.freedesktop.org/poppler/poppler/commit/6912e06d9ab19ba28991b5cab3319d61d856bd6d | Check for stream before calling stream methods when saving an embedded file.
Closes #659 | 1 | bool EmbFile::save2(FILE *f) {
int c;
m_objStr.streamReset();
while ((c = m_objStr.streamGetChar()) != EOF) {
fputc(c, f);
}
return true;
} | 37,480,662,750,013,023,000,000,000,000,000,000,000 | FileSpec.cc | 1,216,643,450,320,484,300,000,000,000,000,000,000 | [
"CWE-670"
] | CVE-2018-19058 | An issue was discovered in Poppler 0.71.0. There is a reachable abort in Object.h, will lead to denial of service because EmbFile::save2 in FileSpec.cc lacks a stream check before saving an embedded file. | https://nvd.nist.gov/vuln/detail/CVE-2018-19058 |
472,456 | poppler | 6912e06d9ab19ba28991b5cab3319d61d856bd6d | https://github.com/freedesktop/poppler | https://gitlab.freedesktop.org/poppler/poppler/commit/6912e06d9ab19ba28991b5cab3319d61d856bd6d | Check for stream before calling stream methods when saving an embedded file.
Closes #659 | 0 | bool EmbFile::save2(FILE *f) {
int c;
if (unlikely(!m_objStr.isStream()))
return false;
m_objStr.streamReset();
while ((c = m_objStr.streamGetChar()) != EOF) {
fputc(c, f);
}
return true;
} | 106,567,490,530,378,730,000,000,000,000,000,000,000 | FileSpec.cc | 252,608,428,506,705,800,000,000,000,000,000,000,000 | [
"CWE-670"
] | CVE-2018-19058 | An issue was discovered in Poppler 0.71.0. There is a reachable abort in Object.h, will lead to denial of service because EmbFile::save2 in FileSpec.cc lacks a stream check before saving an embedded file. | https://nvd.nist.gov/vuln/detail/CVE-2018-19058 |
213,565 | libxml2 | 1098c30a040e72a4654968547f415be4e4c40fe7 | https://github.com/GNOME/libxml2 | https://gitlab.gnome.org/GNOME/libxml2/-/commit/1098c30a040e72a4654968547f415be4e4c40fe7 | Fix user-after-free with `xmllint --xinclude --dropdtd`
The --dropdtd option can leave dangling pointers in entity reference
nodes. Make sure to skip these nodes when processing XIncludes.
This also avoids scanning entity declarations and even modifying
them inadvertently during XInclude processing.
Move from a bloc... | 1 | xmlXIncludeDoProcess(xmlXIncludeCtxtPtr ctxt, xmlDocPtr doc, xmlNodePtr tree,
int skipRoot) {
xmlNodePtr cur;
int ret = 0;
int i, start;
if ((doc == NULL) || (tree == NULL) || (tree->type == XML_NAMESPACE_DECL))
return(-1);
if ((skipRoot) && (tree->children == NULL))
r... | 60,088,334,142,086,320,000,000,000,000,000,000,000 | None | null | [
"CWE-416"
] | CVE-2021-3518 | There's a flaw in libxml2 in versions before 2.9.11. An attacker who is able to submit a crafted file to be processed by an application linked with libxml2 could trigger a use-after-free. The greatest impact from this flaw is to confidentiality, integrity, and availability. | https://nvd.nist.gov/vuln/detail/CVE-2021-3518 |
472,640 | libxml2 | 1098c30a040e72a4654968547f415be4e4c40fe7 | https://github.com/GNOME/libxml2 | https://gitlab.gnome.org/GNOME/libxml2/-/commit/1098c30a040e72a4654968547f415be4e4c40fe7 | Fix user-after-free with `xmllint --xinclude --dropdtd`
The --dropdtd option can leave dangling pointers in entity reference
nodes. Make sure to skip these nodes when processing XIncludes.
This also avoids scanning entity declarations and even modifying
them inadvertently during XInclude processing.
Move from a bloc... | 0 | xmlXIncludeDoProcess(xmlXIncludeCtxtPtr ctxt, xmlDocPtr doc, xmlNodePtr tree,
int skipRoot) {
xmlNodePtr cur;
int ret = 0;
int i, start;
if ((doc == NULL) || (tree == NULL) || (tree->type == XML_NAMESPACE_DECL))
return(-1);
if ((skipRoot) && (tree->children == NULL))
r... | 65,202,183,450,373,480,000,000,000,000,000,000,000 | None | null | [
"CWE-416"
] | CVE-2021-3518 | There's a flaw in libxml2 in versions before 2.9.11. An attacker who is able to submit a crafted file to be processed by an application linked with libxml2 could trigger a use-after-free. The greatest impact from this flaw is to confidentiality, integrity, and availability. | https://nvd.nist.gov/vuln/detail/CVE-2021-3518 |
213,575 | w3m | ec99f186380d26ebf791569fdbc56dae60632365 | https://github.com/tats/w3m | https://github.com/tats/w3m/commit/ec99f186380d26ebf791569fdbc56dae60632365 | Prevent deref null pointer in renderCoTable()
Bug-Debian: https://github.com/tats/w3m/issues/20#issuecomment-260649537 | 1 | renderCoTable(struct table *tbl, int maxlimit)
{
struct readbuffer obuf;
struct html_feed_environ h_env;
struct environment envs[MAX_ENV_LEVEL];
struct table *t;
int i, col, row;
int indent, maxwidth;
if (cotable_level >= MAX_COTABLE_LEVEL)
return; /* workaround to prevent infinite recursi... | 60,354,451,208,936,110,000,000,000,000,000,000,000 | table.c | 121,346,523,427,799,540,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2016-9439 | An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. Infinite recursion vulnerability in w3m allows remote attackers to cause a denial of service via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2016-9439 |
77,512 | w3m | 8354763b90490d4105695df52674d0fcef823e92 | https://github.com/tats/w3m | https://github.com/tats/w3m/commit/8354763b90490d4105695df52674d0fcef823e92 | Prevent negative indent value in feed_table_block_tag()
Bug-Debian: https://github.com/tats/w3m/issues/88 | 0 | renderCoTable(struct table *tbl, int maxlimit)
{
struct readbuffer obuf;
struct html_feed_environ h_env;
struct environment envs[MAX_ENV_LEVEL];
struct table *t;
int i, col, row;
int indent, maxwidth;
if (cotable_level >= MAX_COTABLE_LEVEL)
return; /* workaround to prevent infinite recursi... | 222,685,405,032,719,630,000,000,000,000,000,000,000 | table.c | 245,558,100,729,634,500,000,000,000,000,000,000,000 | [
"CWE-835"
] | CVE-2018-6196 | w3m through 0.5.3 is prone to an infinite recursion flaw in HTMLlineproc0 because the feed_table_block_tag function in table.c does not prevent a negative indent value. | https://nvd.nist.gov/vuln/detail/CVE-2018-6196 |
213,576 | linux | d88d05a9e0b6d9356e97129d4ff9942d765f46ea | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d88d05a9e0b6d9356e97129d4ff9942d765f46ea | perf/x86/intel: Fix a crash caused by zero PEBS status
A repeatable crash can be triggered by the perf_fuzzer on some Haswell
system.
https://lore.kernel.org/lkml/7170d3b-c17f-1ded-52aa-cc6d9ae999f4@maine.edu/
For some old CPUs (HSW and earlier), the PEBS status in a PEBS record
may be mistakenly set to 0. To minimiz... | 1 | static void intel_pmu_drain_pebs_nhm(struct pt_regs *iregs, struct perf_sample_data *data)
{
struct cpu_hw_events *cpuc = this_cpu_ptr(&cpu_hw_events);
struct debug_store *ds = cpuc->ds;
struct perf_event *event;
void *base, *at, *top;
short counts[INTEL_PMC_IDX_FIXED + MAX_FIXED_PEBS_EVENTS] = {};
short error[IN... | 230,068,121,129,011,770,000,000,000,000,000,000,000 | ds.c | 163,530,062,800,110,760,000,000,000,000,000,000,000 | [
"CWE-755"
] | CVE-2021-28971 | In intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c in the Linux kernel through 5.11.8 on some Haswell CPUs, userspace applications (such as perf-fuzzer) can cause a system crash because the PEBS status in a PEBS record is mishandled, aka CID-d88d05a9e0b6. | https://nvd.nist.gov/vuln/detail/CVE-2021-28971 |
472,730 | linux | d88d05a9e0b6d9356e97129d4ff9942d765f46ea | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d88d05a9e0b6d9356e97129d4ff9942d765f46ea | perf/x86/intel: Fix a crash caused by zero PEBS status
A repeatable crash can be triggered by the perf_fuzzer on some Haswell
system.
https://lore.kernel.org/lkml/7170d3b-c17f-1ded-52aa-cc6d9ae999f4@maine.edu/
For some old CPUs (HSW and earlier), the PEBS status in a PEBS record
may be mistakenly set to 0. To minimiz... | 0 | static void intel_pmu_drain_pebs_nhm(struct pt_regs *iregs, struct perf_sample_data *data)
{
struct cpu_hw_events *cpuc = this_cpu_ptr(&cpu_hw_events);
struct debug_store *ds = cpuc->ds;
struct perf_event *event;
void *base, *at, *top;
short counts[INTEL_PMC_IDX_FIXED + MAX_FIXED_PEBS_EVENTS] = {};
short error[IN... | 331,413,978,690,293,400,000,000,000,000,000,000,000 | ds.c | 148,274,065,210,325,240,000,000,000,000,000,000,000 | [
"CWE-755"
] | CVE-2021-28971 | In intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c in the Linux kernel through 5.11.8 on some Haswell CPUs, userspace applications (such as perf-fuzzer) can cause a system crash because the PEBS status in a PEBS record is mishandled, aka CID-d88d05a9e0b6. | https://nvd.nist.gov/vuln/detail/CVE-2021-28971 |
213,578 | matio | a47b7cd3aca70e9a0bddf8146eb4ab0cbd19c2c3 | https://github.com/tbeu/matio | https://github.com/tbeu/matio/commit/a47b7cd3aca70e9a0bddf8146eb4ab0cbd19c2c3 | Fix memory leak
As reported by https://github.com/tbeu/matio/issues/131 | 1 | int SafeMulDims(const matvar_t *matvar, size_t* nelems)
{
int i;
for ( i = 0; i < matvar->rank; i++ ) {
if ( !psnip_safe_size_mul(nelems, *nelems, matvar->dims[i]) ) {
*nelems = 0;
return 1;
}
}
return 0;
} | 34,560,980,269,596,383,000,000,000,000,000,000,000 | mat.c | 317,137,441,251,099,700,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2019-20052 | A memory leak was discovered in Mat_VarCalloc in mat.c in matio 1.5.17 because SafeMulDims does not consider the rank==0 case. | https://nvd.nist.gov/vuln/detail/CVE-2019-20052 |
472,751 | matio | a47b7cd3aca70e9a0bddf8146eb4ab0cbd19c2c3 | https://github.com/tbeu/matio | https://github.com/tbeu/matio/commit/a47b7cd3aca70e9a0bddf8146eb4ab0cbd19c2c3 | Fix memory leak
As reported by https://github.com/tbeu/matio/issues/131 | 0 | int SafeMulDims(const matvar_t *matvar, size_t* nelems)
{
int i;
if ( matvar->rank == 0 ) {
*nelems = 0;
return 0;
}
for ( i = 0; i < matvar->rank; i++ ) {
if ( !psnip_safe_size_mul(nelems, *nelems, matvar->dims[i]) ) {
*nelems = 0;
return 1;
}
... | 96,815,473,635,657,700,000,000,000,000,000,000,000 | mat.c | 247,905,794,402,579,100,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2019-20052 | A memory leak was discovered in Mat_VarCalloc in mat.c in matio 1.5.17 because SafeMulDims does not consider the rank==0 case. | https://nvd.nist.gov/vuln/detail/CVE-2019-20052 |
213,580 | ImageMagick | 29cee9152d1b5487cfd19443ca48935eea0cabe2 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/29cee9152d1b5487cfd19443ca48935eea0cabe2 | https://github.com/ImageMagick/ImageMagick/issues/1743 | 1 | static double ApplyEvaluateOperator(RandomInfo *random_info,const Quantum pixel,
const MagickEvaluateOperator op,const double value)
{
double
result;
result=0.0;
switch (op)
{
case UndefinedEvaluateOperator:
break;
case AbsEvaluateOperator:
{
result=(double) fabs((double) (pixel+v... | 286,455,759,219,391,500,000,000,000,000,000,000,000 | statistic.c | 318,583,235,116,667,640,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2020-27774 | A flaw was found in ImageMagick in MagickCore/statistic.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of a too large shift for 64-bit type `ssize_t`. This would most likely lead to an impact to application availability, but could potentially caus... | https://nvd.nist.gov/vuln/detail/CVE-2020-27774 |
472,798 | ImageMagick | 29cee9152d1b5487cfd19443ca48935eea0cabe2 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/29cee9152d1b5487cfd19443ca48935eea0cabe2 | https://github.com/ImageMagick/ImageMagick/issues/1743 | 0 | static double ApplyEvaluateOperator(RandomInfo *random_info,const Quantum pixel,
const MagickEvaluateOperator op,const double value)
{
double
result;
register ssize_t
i;
result=0.0;
switch (op)
{
case UndefinedEvaluateOperator:
break;
case AbsEvaluateOperator:
{
result=(dou... | 180,939,333,290,287,200,000,000,000,000,000,000,000 | statistic.c | 300,066,298,801,738,560,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2020-27774 | A flaw was found in ImageMagick in MagickCore/statistic.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of a too large shift for 64-bit type `ssize_t`. This would most likely lead to an impact to application availability, but could potentially caus... | https://nvd.nist.gov/vuln/detail/CVE-2020-27774 |
213,587 | linux | 342db04ae71273322f0011384a9ed414df8bdae4 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=342db04ae71273322f0011384a9ed414df8bdae4 | x86/dumpstack: Don't dump kernel memory based on usermode RIP
show_opcodes() is used both for dumping kernel instructions and for dumping
user instructions. If userspace causes #PF by jumping to a kernel address,
show_opcodes() can be reached with regs->ip controlled by the user,
pointing to kernel code. Make sure th... | 1 | void show_opcodes(u8 *rip, const char *loglvl)
{
#define PROLOGUE_SIZE 42
#define EPILOGUE_SIZE 21
#define OPCODE_BUFSIZE (PROLOGUE_SIZE + 1 + EPILOGUE_SIZE)
u8 opcodes[OPCODE_BUFSIZE];
if (probe_kernel_read(opcodes, rip - PROLOGUE_SIZE, OPCODE_BUFSIZE)) {
printk("%sCode: Bad RIP value.\n", loglvl);
} else {
pr... | 45,691,453,130,485,270,000,000,000,000,000,000,000 | dumpstack.c | 107,842,985,191,482,380,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2018-14656 | A missing address check in the callers of the show_opcodes() in the Linux kernel allows an attacker to dump the kernel memory at an arbitrary kernel address into the dmesg log. | https://nvd.nist.gov/vuln/detail/CVE-2018-14656 |
472,824 | linux | 342db04ae71273322f0011384a9ed414df8bdae4 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=342db04ae71273322f0011384a9ed414df8bdae4 | x86/dumpstack: Don't dump kernel memory based on usermode RIP
show_opcodes() is used both for dumping kernel instructions and for dumping
user instructions. If userspace causes #PF by jumping to a kernel address,
show_opcodes() can be reached with regs->ip controlled by the user,
pointing to kernel code. Make sure th... | 0 | void show_opcodes(struct pt_regs *regs, const char *loglvl)
{
#define PROLOGUE_SIZE 42
#define EPILOGUE_SIZE 21
#define OPCODE_BUFSIZE (PROLOGUE_SIZE + 1 + EPILOGUE_SIZE)
u8 opcodes[OPCODE_BUFSIZE];
unsigned long prologue = regs->ip - PROLOGUE_SIZE;
bool bad_ip;
/*
* Make sure userspace isn't trying to trick us ... | 285,790,535,610,754,430,000,000,000,000,000,000,000 | dumpstack.c | 183,194,423,419,429,720,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2018-14656 | A missing address check in the callers of the show_opcodes() in the Linux kernel allows an attacker to dump the kernel memory at an arbitrary kernel address into the dmesg log. | https://nvd.nist.gov/vuln/detail/CVE-2018-14656 |
213,602 | linux | 28d76df18f0ad5bcf5fa48510b225f0ed262a99b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/28d76df18f0ad5bcf5fa48510b225f0ed262a99b | scsi: mptfusion: Fix double fetch bug in ioctl
Tom Hatskevich reported that we look up "iocp" then, in the called
functions we do a second copy_from_user() and look it up again.
The problem that could cause is:
drivers/message/fusion/mptctl.c
674 /* All of these commands require an interrupt or
675 ... | 1 | __mptctl_ioctl(struct file *file, unsigned int cmd, unsigned long arg)
{
mpt_ioctl_header __user *uhdr = (void __user *) arg;
mpt_ioctl_header khdr;
int iocnum;
unsigned iocnumX;
int nonblock = (file->f_flags & O_NONBLOCK);
int ret;
MPT_ADAPTER *iocp = NULL;
if (copy_from_user(&khdr, uhdr, sizeof(khdr))) {
... | 134,132,948,041,821,770,000,000,000,000,000,000,000 | mptctl.c | 157,635,789,441,522,630,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2020-12652 | The __mptctl_ioctl function in drivers/message/fusion/mptctl.c in the Linux kernel before 5.4.14 allows local users to hold an incorrect lock during the ioctl operation and trigger a race condition, i.e., a "double fetch" vulnerability, aka CID-28d76df18f0a. NOTE: the vendor states "The security impact of this bug is n... | https://nvd.nist.gov/vuln/detail/CVE-2020-12652 |
472,870 | linux | 28d76df18f0ad5bcf5fa48510b225f0ed262a99b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/28d76df18f0ad5bcf5fa48510b225f0ed262a99b | scsi: mptfusion: Fix double fetch bug in ioctl
Tom Hatskevich reported that we look up "iocp" then, in the called
functions we do a second copy_from_user() and look it up again.
The problem that could cause is:
drivers/message/fusion/mptctl.c
674 /* All of these commands require an interrupt or
675 ... | 0 | __mptctl_ioctl(struct file *file, unsigned int cmd, unsigned long arg)
{
mpt_ioctl_header __user *uhdr = (void __user *) arg;
mpt_ioctl_header khdr;
int iocnum;
unsigned iocnumX;
int nonblock = (file->f_flags & O_NONBLOCK);
int ret;
MPT_ADAPTER *iocp = NULL;
if (copy_from_user(&khdr, uhdr, sizeof(khdr))) {
... | 252,742,897,056,713,730,000,000,000,000,000,000,000 | mptctl.c | 150,674,889,625,019,520,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2020-12652 | The __mptctl_ioctl function in drivers/message/fusion/mptctl.c in the Linux kernel before 5.4.14 allows local users to hold an incorrect lock during the ioctl operation and trigger a race condition, i.e., a "double fetch" vulnerability, aka CID-28d76df18f0a. NOTE: the vendor states "The security impact of this bug is n... | https://nvd.nist.gov/vuln/detail/CVE-2020-12652 |
213,609 | FreeRDP | 17f547ae11835bb11baa3d045245dc1694866845 | https://github.com/FreeRDP/FreeRDP | https://github.com/FreeRDP/FreeRDP/commit/17f547ae11835bb11baa3d045245dc1694866845 | Fixed CVE-2020-11521: Out of bounds write in planar codec.
Thanks to Sunglin and HuanGMz from Knownsec 404 | 1 | static INLINE INT32 planar_skip_plane_rle(const BYTE* pSrcData, UINT32 SrcSize, UINT32 nWidth,
UINT32 nHeight)
{
UINT32 x, y;
BYTE controlByte;
const BYTE* pRLE = pSrcData;
const BYTE* pEnd = &pSrcData[SrcSize];
for (y = 0; y < nHeight; y++)
{
for (x = 0; x < nWidth;)
... | 118,569,394,046,871,840,000,000,000,000,000,000,000 | planar.c | 242,810,828,278,976,070,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2020-11521 | libfreerdp/codec/planar.c in FreeRDP version > 1.0 through 2.0.0-rc4 has an Out-of-bounds Write. | https://nvd.nist.gov/vuln/detail/CVE-2020-11521 |
472,902 | FreeRDP | 17f547ae11835bb11baa3d045245dc1694866845 | https://github.com/FreeRDP/FreeRDP | https://github.com/FreeRDP/FreeRDP/commit/17f547ae11835bb11baa3d045245dc1694866845 | Fixed CVE-2020-11521: Out of bounds write in planar codec.
Thanks to Sunglin and HuanGMz from Knownsec 404 | 0 | static INLINE INT32 planar_skip_plane_rle(const BYTE* pSrcData, UINT32 SrcSize, UINT32 nWidth,
UINT32 nHeight)
{
UINT32 used = 0;
UINT32 x, y;
BYTE controlByte;
for (y = 0; y < nHeight; y++)
{
for (x = 0; x < nWidth;)
{
int cRawBytes;
int nRunLength;
if (use... | 175,320,694,156,370,000,000,000,000,000,000,000,000 | planar.c | 216,586,034,959,921,970,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2020-11521 | libfreerdp/codec/planar.c in FreeRDP version > 1.0 through 2.0.0-rc4 has an Out-of-bounds Write. | https://nvd.nist.gov/vuln/detail/CVE-2020-11521 |
213,621 | cpython | a4d78362397fc3bced6ea80fbc7b5f4827aec55e | https://github.com/python/cpython | https://github.com/python/cpython/commit/a4d78362397fc3bced6ea80fbc7b5f4827aec55e | bpo-36495: Fix two out-of-bounds array reads (GH-12641)
Research and fix by @bradlarsen. | 1 | ast_for_arguments(struct compiling *c, const node *n)
{
/* This function handles both typedargslist (function definition)
and varargslist (lambda definition).
parameters: '(' [typedargslist] ')'
typedargslist: (tfpdef ['=' test] (',' tfpdef ['=' test])* [',' [
'*' [tfpdef] (',' ... | 122,384,450,784,184,490,000,000,000,000,000,000,000 | ast.c | 224,732,895,062,039,840,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-19275 | typed_ast 1.3.0 and 1.3.1 has an ast_for_arguments out-of-bounds read. An attacker with the ability to cause a Python interpreter to parse Python source (but not necessarily execute it) may be able to crash the interpreter process. This could be a concern, for example, in a web-based service that parses (but does not e... | https://nvd.nist.gov/vuln/detail/CVE-2019-19275 |
473,025 | cpython | a4d78362397fc3bced6ea80fbc7b5f4827aec55e | https://github.com/python/cpython | https://github.com/python/cpython/commit/a4d78362397fc3bced6ea80fbc7b5f4827aec55e | bpo-36495: Fix two out-of-bounds array reads (GH-12641)
Research and fix by @bradlarsen. | 0 | ast_for_arguments(struct compiling *c, const node *n)
{
/* This function handles both typedargslist (function definition)
and varargslist (lambda definition).
parameters: '(' [typedargslist] ')'
typedargslist: (tfpdef ['=' test] (',' tfpdef ['=' test])* [',' [
'*' [tfpdef] (',' ... | 224,786,990,092,167,680,000,000,000,000,000,000,000 | ast.c | 210,937,012,208,519,400,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-19275 | typed_ast 1.3.0 and 1.3.1 has an ast_for_arguments out-of-bounds read. An attacker with the ability to cause a Python interpreter to parse Python source (but not necessarily execute it) may be able to crash the interpreter process. This could be a concern, for example, in a web-based service that parses (but does not e... | https://nvd.nist.gov/vuln/detail/CVE-2019-19275 |
213,622 | cpython | a4d78362397fc3bced6ea80fbc7b5f4827aec55e | https://github.com/python/cpython | https://github.com/python/cpython/commit/a4d78362397fc3bced6ea80fbc7b5f4827aec55e | bpo-36495: Fix two out-of-bounds array reads (GH-12641)
Research and fix by @bradlarsen. | 1 | handle_keywordonly_args(struct compiling *c, const node *n, int start,
asdl_seq *kwonlyargs, asdl_seq *kwdefaults)
{
PyObject *argname;
node *ch;
expr_ty expression, annotation;
arg_ty arg = NULL;
int i = start;
int j = 0; /* index for kwdefaults and kwonlyargs */
if... | 72,847,498,067,937,900,000,000,000,000,000,000,000 | ast.c | 224,732,895,062,039,840,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-19275 | typed_ast 1.3.0 and 1.3.1 has an ast_for_arguments out-of-bounds read. An attacker with the ability to cause a Python interpreter to parse Python source (but not necessarily execute it) may be able to crash the interpreter process. This could be a concern, for example, in a web-based service that parses (but does not e... | https://nvd.nist.gov/vuln/detail/CVE-2019-19275 |
473,024 | cpython | a4d78362397fc3bced6ea80fbc7b5f4827aec55e | https://github.com/python/cpython | https://github.com/python/cpython/commit/a4d78362397fc3bced6ea80fbc7b5f4827aec55e | bpo-36495: Fix two out-of-bounds array reads (GH-12641)
Research and fix by @bradlarsen. | 0 | handle_keywordonly_args(struct compiling *c, const node *n, int start,
asdl_seq *kwonlyargs, asdl_seq *kwdefaults)
{
PyObject *argname;
node *ch;
expr_ty expression, annotation;
arg_ty arg = NULL;
int i = start;
int j = 0; /* index for kwdefaults and kwonlyargs */
if... | 289,473,649,526,818,660,000,000,000,000,000,000,000 | ast.c | 210,937,012,208,519,400,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-19275 | typed_ast 1.3.0 and 1.3.1 has an ast_for_arguments out-of-bounds read. An attacker with the ability to cause a Python interpreter to parse Python source (but not necessarily execute it) may be able to crash the interpreter process. This could be a concern, for example, in a web-based service that parses (but does not e... | https://nvd.nist.gov/vuln/detail/CVE-2019-19275 |
213,665 | clamav-devel | 3d664817f6ef833a17414a4ecea42004c35cc42f | https://github.com/vrtadmin/clamav-devel | http://git.clamav.net/gitweb?p=clamav-devel.git;a=commit;h=3d664817f6ef833a17414a4ecea42004c35cc42f | fix recursion level crash (bb #3706).
Thanks to Stephane Chazelas for the analysis. | 1 | int32_t cli_bcapi_extract_new(struct cli_bc_ctx *ctx, int32_t id)
{
cli_ctx *cctx;
int res = -1;
cli_event_count(EV, BCEV_EXTRACTED);
cli_dbgmsg("previous tempfile had %u bytes\n", ctx->written);
if (!ctx->written)
return 0;
if (ctx->ctx && cli_updatelimits(ctx->ctx, ctx->written))
return -1;... | 3,715,372,323,113,428,500,000,000,000,000,000,000 | bytecode_api.c | 289,839,841,651,623,600,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2011-3627 | The bytecode engine in ClamAV before 0.97.3 allows remote attackers to cause a denial of service (crash) via vectors related to "recursion level" and (1) libclamav/bytecode.c and (2) libclamav/bytecode_api.c. | https://nvd.nist.gov/vuln/detail/CVE-2011-3627 |
473,573 | clamav-devel | 3d664817f6ef833a17414a4ecea42004c35cc42f | https://github.com/vrtadmin/clamav-devel | http://git.clamav.net/gitweb?p=clamav-devel.git;a=commit;h=3d664817f6ef833a17414a4ecea42004c35cc42f | fix recursion level crash (bb #3706).
Thanks to Stephane Chazelas for the analysis. | 0 | int32_t cli_bcapi_extract_new(struct cli_bc_ctx *ctx, int32_t id)
{
cli_ctx *cctx;
int res = -1;
cli_event_count(EV, BCEV_EXTRACTED);
cli_dbgmsg("previous tempfile had %u bytes\n", ctx->written);
if (!ctx->written)
return 0;
if (ctx->ctx && cli_updatelimits(ctx->ctx, ctx->written))
return -1;... | 238,878,768,657,451,500,000,000,000,000,000,000,000 | bytecode_api.c | 285,310,418,838,760,180,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2011-3627 | The bytecode engine in ClamAV before 0.97.3 allows remote attackers to cause a denial of service (crash) via vectors related to "recursion level" and (1) libclamav/bytecode.c and (2) libclamav/bytecode_api.c. | https://nvd.nist.gov/vuln/detail/CVE-2011-3627 |
213,666 | clamav-devel | 3d664817f6ef833a17414a4ecea42004c35cc42f | https://github.com/vrtadmin/clamav-devel | http://git.clamav.net/gitweb?p=clamav-devel.git;a=commit;h=3d664817f6ef833a17414a4ecea42004c35cc42f | fix recursion level crash (bb #3706).
Thanks to Stephane Chazelas for the analysis. | 1 | int cli_bytecode_runhook(cli_ctx *cctx, const struct cl_engine *engine, struct cli_bc_ctx *ctx,
unsigned id, fmap_t *map, const char **virname)
{
const unsigned *hooks = engine->hooks[id - _BC_START_HOOKS];
unsigned i, hooks_cnt = engine->hooks_cnt[id - _BC_START_HOOKS];
int ret;
unsigned executed =... | 149,656,620,365,878,090,000,000,000,000,000,000,000 | bytecode.c | 178,031,801,549,948,000,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2011-3627 | The bytecode engine in ClamAV before 0.97.3 allows remote attackers to cause a denial of service (crash) via vectors related to "recursion level" and (1) libclamav/bytecode.c and (2) libclamav/bytecode_api.c. | https://nvd.nist.gov/vuln/detail/CVE-2011-3627 |
473,543 | clamav-devel | 3d664817f6ef833a17414a4ecea42004c35cc42f | https://github.com/vrtadmin/clamav-devel | http://git.clamav.net/gitweb?p=clamav-devel.git;a=commit;h=3d664817f6ef833a17414a4ecea42004c35cc42f | fix recursion level crash (bb #3706).
Thanks to Stephane Chazelas for the analysis. | 0 | int cli_bytecode_runhook(cli_ctx *cctx, const struct cl_engine *engine, struct cli_bc_ctx *ctx,
unsigned id, fmap_t *map, const char **virname)
{
const unsigned *hooks = engine->hooks[id - _BC_START_HOOKS];
unsigned i, hooks_cnt = engine->hooks_cnt[id - _BC_START_HOOKS];
int ret;
unsigned executed =... | 75,328,879,276,527,280,000,000,000,000,000,000,000 | bytecode.c | 6,043,968,237,931,547,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2011-3627 | The bytecode engine in ClamAV before 0.97.3 allows remote attackers to cause a denial of service (crash) via vectors related to "recursion level" and (1) libclamav/bytecode.c and (2) libclamav/bytecode_api.c. | https://nvd.nist.gov/vuln/detail/CVE-2011-3627 |
213,993 | qemu | 705df5466c98f3efdd2b68d3b31dad86858acad7 | https://github.com/bonzini/qemu | https://git.qemu.org/?p=qemu.git;a=commit;h=705df5466c98f3efdd2b68d3b31dad86858acad7 | net: introduce qemu_receive_packet()
Some NIC supports loopback mode and this is done by calling
nc->info->receive() directly which in fact suppresses the effort of
reentrancy check that is done in qemu_net_queue_send().
Unfortunately we can't use qemu_net_queue_send() here since for
loopback there's no sender as pee... | 1 | int qemu_can_send_packet(NetClientState *sender)
{
int vm_running = runstate_is_running();
if (!vm_running) {
return 0;
}
if (!sender->peer) {
return 1;
}
if (sender->peer->receive_disabled) {
return 0;
} else if (sender->peer->info->can_receive &&
!... | 119,494,585,888,553,450,000,000,000,000,000,000,000 | net.c | 332,465,962,880,371,500,000,000,000,000,000,000,000 | [
"CWE-835"
] | CVE-2021-3416 | A potential stack overflow via infinite loop issue was found in various NIC emulators of QEMU in versions up to and including 5.2.0. The issue occurs in loopback mode of a NIC wherein reentrant DMA checks get bypassed. A guest user/process may use this flaw to consume CPU cycles or crash the QEMU process on the host re... | https://nvd.nist.gov/vuln/detail/CVE-2021-3416 |
474,305 | qemu | 705df5466c98f3efdd2b68d3b31dad86858acad7 | https://github.com/bonzini/qemu | https://git.qemu.org/?p=qemu.git;a=commit;h=705df5466c98f3efdd2b68d3b31dad86858acad7 | net: introduce qemu_receive_packet()
Some NIC supports loopback mode and this is done by calling
nc->info->receive() directly which in fact suppresses the effort of
reentrancy check that is done in qemu_net_queue_send().
Unfortunately we can't use qemu_net_queue_send() here since for
loopback there's no sender as pee... | 0 | int qemu_can_send_packet(NetClientState *sender)
{
int vm_running = runstate_is_running();
if (!vm_running) {
return 0;
}
if (!sender->peer) {
return 1;
}
return qemu_can_receive_packet(sender->peer);
} | 278,178,512,068,252,700,000,000,000,000,000,000,000 | net.c | 13,869,728,121,641,062,000,000,000,000,000,000,000 | [
"CWE-835"
] | CVE-2021-3416 | A potential stack overflow via infinite loop issue was found in various NIC emulators of QEMU in versions up to and including 5.2.0. The issue occurs in loopback mode of a NIC wherein reentrant DMA checks get bypassed. A guest user/process may use this flaw to consume CPU cycles or crash the QEMU process on the host re... | https://nvd.nist.gov/vuln/detail/CVE-2021-3416 |
214,001 | gimp | 23f685931e5f000dd033a45c60c1e60d7f78caf4 | https://github.com/GNOME/gimp | https://git.gnome.org/browse/gimp/commit/?id=23f685931e5f000dd033a45c60c1e60d7f78caf4 | file-xwd: sanity check # of colors and map entries (CVE-2013-1978)
The number of colors in an image shouldn't be higher than the number of
colormap entries. Additionally, consolidate post error cleanup in
load_image(). | 1 | load_image (const gchar *filename,
GError **error)
{
FILE *ifp;
gint depth, bpp;
gint32 image_ID;
L_XWDFILEHEADER xwdhdr;
L_XWDCOLOR *xwdcolmap = NULL;
ifp = g_fopen (filename, "rb");
if (!ifp)
{
g_set_error (error, G_FILE_ERROR, g_file_e... | 245,176,727,075,876,980,000,000,000,000,000,000,000 | file-xwd.c | 55,893,505,793,125,700,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2013-1978 | Heap-based buffer overflow in the read_xwd_cols function in file-xwd.c in the X Window Dump (XWD) plug-in in GIMP 2.6.9 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an X Window System (XWD) image dump with more colors than color map entries. | https://nvd.nist.gov/vuln/detail/CVE-2013-1978 |
474,461 | gimp | 23f685931e5f000dd033a45c60c1e60d7f78caf4 | https://github.com/GNOME/gimp | https://git.gnome.org/browse/gimp/commit/?id=23f685931e5f000dd033a45c60c1e60d7f78caf4 | file-xwd: sanity check # of colors and map entries (CVE-2013-1978)
The number of colors in an image shouldn't be higher than the number of
colormap entries. Additionally, consolidate post error cleanup in
load_image(). | 0 | load_image (const gchar *filename,
GError **error)
{
FILE *ifp = NULL;
gint depth, bpp;
gint32 image_ID = -1;
L_XWDFILEHEADER xwdhdr;
L_XWDCOLOR *xwdcolmap = NULL;
ifp = g_fopen (filename, "rb");
if (!ifp)
{
g_set_error (error, G_FILE_ERR... | 59,337,161,925,548,395,000,000,000,000,000,000,000 | file-xwd.c | 285,745,247,563,534,300,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2013-1978 | Heap-based buffer overflow in the read_xwd_cols function in file-xwd.c in the X Window Dump (XWD) plug-in in GIMP 2.6.9 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an X Window System (XWD) image dump with more colors than color map entries. | https://nvd.nist.gov/vuln/detail/CVE-2013-1978 |
214,024 | openldap | 5a2017d4e61a6ddc4dcb4415028e0d08eb6bca26 | https://github.com/openldap/openldap | https://git.openldap.org/openldap/openldap/-/commit/5a2017d4e61a6ddc4dcb4415028e0d08eb6bca26 | ITS#9412 fix AVA_Sort on invalid RDN | 1 | AVA_Sort( LDAPRDN rdn, int nAVAs )
{
LDAPAVA *ava_i;
int i;
assert( rdn != NULL );
for ( i = 1; i < nAVAs; i++ ) {
LDAPAVA *ava_j;
int j;
ava_i = rdn[ i ];
for ( j = i-1; j >=0; j-- ) {
int a;
ava_j = rdn[ j ];
a = strcmp( ava_i->la_attr.bv_val, ava_j->la_attr.bv_val );
/* RFC4512 does not... | 138,010,447,726,806,630,000,000,000,000,000,000,000 | dn.c | 195,623,694,737,214,060,000,000,000,000,000,000,000 | [
"CWE-763"
] | CVE-2020-36224 | A flaw was discovered in OpenLDAP before 2.4.57 leading to an invalid pointer free and slapd crash in the saslAuthzTo processing, resulting in denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2020-36224 |
474,519 | openldap | 5a2017d4e61a6ddc4dcb4415028e0d08eb6bca26 | https://github.com/openldap/openldap | https://git.openldap.org/openldap/openldap/-/commit/5a2017d4e61a6ddc4dcb4415028e0d08eb6bca26 | ITS#9412 fix AVA_Sort on invalid RDN | 0 | AVA_Sort( LDAPRDN rdn, int nAVAs )
{
LDAPAVA *ava_i;
int i;
int rc = LDAP_SUCCESS;
assert( rdn != NULL );
for ( i = 1; i < nAVAs; i++ ) {
LDAPAVA *ava_j;
int j;
ava_i = rdn[ i ];
for ( j = i-1; j >=0; j-- ) {
int a;
ava_j = rdn[ j ];
a = strcmp( ava_i->la_attr.bv_val, ava_j->la_attr.bv_val )... | 217,894,482,370,389,630,000,000,000,000,000,000,000 | dn.c | 167,379,138,843,184,400,000,000,000,000,000,000,000 | [
"CWE-763"
] | CVE-2020-36224 | A flaw was discovered in OpenLDAP before 2.4.57 leading to an invalid pointer free and slapd crash in the saslAuthzTo processing, resulting in denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2020-36224 |
214,026 | linux | 3864d33943b4a76c6e64616280e98d2410b1190f | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3864d33943b4a76c6e64616280e98d2410b1190f | USB: rio500: refuse more than one device at a time
This driver is using a global variable. It cannot handle more than
one device at a time. The issue has been existing since the dawn
of the driver.
Signed-off-by: Oliver Neukum <oneukum@suse.com>
Reported-by: syzbot+35f04d136fc975a70da4@syzkaller.appspotmail.com
Cc: s... | 1 | static int probe_rio(struct usb_interface *intf,
const struct usb_device_id *id)
{
struct usb_device *dev = interface_to_usbdev(intf);
struct rio_usb_data *rio = &rio_instance;
int retval;
dev_info(&intf->dev, "USB Rio found at address %d\n", dev->devnum);
retval = usb_register_dev(intf, &usb_rio_class);
... | 133,390,308,317,897,700,000,000,000,000,000,000,000 | rio500.c | 156,526,608,507,749,280,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2019-15212 | An issue was discovered in the Linux kernel before 5.1.8. There is a double-free caused by a malicious USB device in the drivers/usb/misc/rio500.c driver. | https://nvd.nist.gov/vuln/detail/CVE-2019-15212 |
474,565 | linux | 3864d33943b4a76c6e64616280e98d2410b1190f | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3864d33943b4a76c6e64616280e98d2410b1190f | USB: rio500: refuse more than one device at a time
This driver is using a global variable. It cannot handle more than
one device at a time. The issue has been existing since the dawn
of the driver.
Signed-off-by: Oliver Neukum <oneukum@suse.com>
Reported-by: syzbot+35f04d136fc975a70da4@syzkaller.appspotmail.com
Cc: s... | 0 | static int probe_rio(struct usb_interface *intf,
const struct usb_device_id *id)
{
struct usb_device *dev = interface_to_usbdev(intf);
struct rio_usb_data *rio = &rio_instance;
int retval = 0;
mutex_lock(&rio500_mutex);
if (rio->present) {
dev_info(&intf->dev, "Second USB Rio at address %d refused\n", de... | 278,351,636,851,528,760,000,000,000,000,000,000,000 | rio500.c | 219,021,309,140,535,570,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2019-15212 | An issue was discovered in the Linux kernel before 5.1.8. There is a double-free caused by a malicious USB device in the drivers/usb/misc/rio500.c driver. | https://nvd.nist.gov/vuln/detail/CVE-2019-15212 |
214,030 | exim | 7ea1237c783e380d7bdb86c90b13d8203c7ecf26 | https://github.com/Exim/exim | https://git.exim.org/exim.git/commitdiff/7ea1237c783e380d7bdb86c90b13d8203c7ecf26 | Events: raise msg:fail:internal & msg:complete for -Mrm. Bug 2310 | 1 | deliver_message(uschar *id, BOOL forced, BOOL give_up)
{
int i, rc;
int final_yield = DELIVER_ATTEMPTED_NORMAL;
time_t now = time(NULL);
address_item *addr_last = NULL;
uschar *filter_message = NULL;
int process_recipients = RECIP_ACCEPT;
open_db dbblock;
open_db *dbm_file;
extern int acl_where;
uschar *info = queue_r... | 294,601,626,881,840,300,000,000,000,000,000,000,000 | deliver.c | 286,670,229,561,929,100,000,000,000,000,000,000,000 | [
"CWE-78"
] | CVE-2019-10149 | A flaw was found in Exim versions 4.87 to 4.91 (inclusive). Improper validation of recipient address in deliver_message() function in /src/deliver.c may lead to remote command execution. | https://nvd.nist.gov/vuln/detail/CVE-2019-10149 |
474,596 | exim | 7ea1237c783e380d7bdb86c90b13d8203c7ecf26 | https://github.com/Exim/exim | https://git.exim.org/exim.git/commitdiff/7ea1237c783e380d7bdb86c90b13d8203c7ecf26 | Events: raise msg:fail:internal & msg:complete for -Mrm. Bug 2310 | 0 | deliver_message(uschar *id, BOOL forced, BOOL give_up)
{
int i, rc;
int final_yield = DELIVER_ATTEMPTED_NORMAL;
time_t now = time(NULL);
address_item *addr_last = NULL;
uschar *filter_message = NULL;
int process_recipients = RECIP_ACCEPT;
open_db dbblock;
open_db *dbm_file;
extern int acl_where;
uschar *info = queue_r... | 8,461,841,026,536,445,000,000,000,000,000,000,000 | deliver.c | 188,309,316,658,717,950,000,000,000,000,000,000,000 | [
"CWE-78"
] | CVE-2019-10149 | A flaw was found in Exim versions 4.87 to 4.91 (inclusive). Improper validation of recipient address in deliver_message() function in /src/deliver.c may lead to remote command execution. | https://nvd.nist.gov/vuln/detail/CVE-2019-10149 |
214,031 | ImageMagick | fbb14283450d3001403e7d9725566dd4fb2c3bb5 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/fbb14283450d3001403e7d9725566dd4fb2c3bb5 | Fixed memory leak reported in #457. | 1 | static Image *ReadICONImage(const ImageInfo *image_info,
ExceptionInfo *exception)
{
IconFile
icon_file;
IconInfo
icon_info;
Image
*image;
MagickBooleanType
status;
MagickSizeType
extent;
register ssize_t
i,
x;
register Quantum
*q;
register unsigned char
*p;
... | 289,488,900,470,996,870,000,000,000,000,000,000,000 | icon.c | 159,344,715,507,821,600,000,000,000,000,000,000,000 | [
"CWE-772"
] | CVE-2017-9405 | In ImageMagick 7.0.5-5, the ReadICONImage function in icon.c:452 allows attackers to cause a denial of service (memory leak) via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2017-9405 |
474,609 | ImageMagick | fbb14283450d3001403e7d9725566dd4fb2c3bb5 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/fbb14283450d3001403e7d9725566dd4fb2c3bb5 | Fixed memory leak reported in #457. | 0 | static Image *ReadICONImage(const ImageInfo *image_info,
ExceptionInfo *exception)
{
IconFile
icon_file;
IconInfo
icon_info;
Image
*image;
MagickBooleanType
status;
MagickSizeType
extent;
register ssize_t
i,
x;
register Quantum
*q;
register unsigned char
*p;
... | 114,409,283,514,782,180,000,000,000,000,000,000,000 | icon.c | 246,845,696,104,888,950,000,000,000,000,000,000,000 | [
"CWE-772"
] | CVE-2017-9405 | In ImageMagick 7.0.5-5, the ReadICONImage function in icon.c:452 allows attackers to cause a denial of service (memory leak) via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2017-9405 |
214,036 | icu | 53d8c8f3d181d87a6aa925b449b51c4a2c922a51 | https://github.com/unicode-org/icu | https://github.com/unicode-org/icu/commit/53d8c8f3d181d87a6aa925b449b51c4a2c922a51 | ICU-20246 Fixing another integer overflow in number parsing. | 1 | UnicodeString DecimalQuantity::toScientificString() const {
U_ASSERT(!isApproximate);
UnicodeString result;
if (isNegative()) {
result.append(u'-');
}
if (precision == 0) {
result.append(u"0E+0", -1);
return result;
}
// NOTE: It is not safe to add to lOptPos (aka max... | 133,057,663,444,405,350,000,000,000,000,000,000,000 | number_decimalquantity.cpp | 190,068,549,769,740,800,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2018-18928 | International Components for Unicode (ICU) for C/C++ 63.1 has an integer overflow in number::impl::DecimalQuantity::toScientificString() in i18n/number_decimalquantity.cpp. | https://nvd.nist.gov/vuln/detail/CVE-2018-18928 |
474,890 | icu | 53d8c8f3d181d87a6aa925b449b51c4a2c922a51 | https://github.com/unicode-org/icu | https://github.com/unicode-org/icu/commit/53d8c8f3d181d87a6aa925b449b51c4a2c922a51 | ICU-20246 Fixing another integer overflow in number parsing. | 0 | UnicodeString DecimalQuantity::toScientificString() const {
U_ASSERT(!isApproximate);
UnicodeString result;
if (isNegative()) {
result.append(u'-');
}
if (precision == 0) {
result.append(u"0E+0", -1);
return result;
}
// NOTE: It is not safe to add to lOptPos (aka max... | 88,580,937,834,026,290,000,000,000,000,000,000,000 | number_decimalquantity.cpp | 246,660,459,707,311,670,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2018-18928 | International Components for Unicode (ICU) for C/C++ 63.1 has an integer overflow in number::impl::DecimalQuantity::toScientificString() in i18n/number_decimalquantity.cpp. | https://nvd.nist.gov/vuln/detail/CVE-2018-18928 |
214,055 | libvirt | a4947e8f63c3e6b7b067b444f3d6cf674c0d7f36 | https://github.com/libvirt/libvirt | https://gitlab.com/libvirt/libvirt/-/commit/a4947e8f63c3e6b7b067b444f3d6cf674c0d7f36 | nwfilter: fix crash when counting number of network filters
The virNWFilterObjListNumOfNWFilters method iterates over the
driver->nwfilters, accessing virNWFilterObj instances. As such
it needs to be protected against concurrent modification of
the driver->nwfilters object.
This API allows unprivileged users to conne... | 1 | nwfilterConnectNumOfNWFilters(virConnectPtr conn)
{
if (virConnectNumOfNWFiltersEnsureACL(conn) < 0)
return -1;
return virNWFilterObjListNumOfNWFilters(driver->nwfilters, conn,
virConnectNumOfNWFiltersCheckACL);
} | 315,427,908,616,623,650,000,000,000,000,000,000,000 | nwfilter_driver.c | 9,475,946,123,683,950,000,000,000,000,000,000,000 | [
"CWE-667"
] | CVE-2022-0897 | A flaw was found in the libvirt nwfilter driver. The virNWFilterObjListNumOfNWFilters method failed to acquire the driver->nwfilters mutex before iterating over virNWFilterObj instances. There was no protection to stop another thread from concurrently modifying the driver->nwfilters object. This flaw allows a malicious... | https://nvd.nist.gov/vuln/detail/CVE-2022-0897 |
475,232 | libvirt | a4947e8f63c3e6b7b067b444f3d6cf674c0d7f36 | https://github.com/libvirt/libvirt | https://gitlab.com/libvirt/libvirt/-/commit/a4947e8f63c3e6b7b067b444f3d6cf674c0d7f36 | nwfilter: fix crash when counting number of network filters
The virNWFilterObjListNumOfNWFilters method iterates over the
driver->nwfilters, accessing virNWFilterObj instances. As such
it needs to be protected against concurrent modification of
the driver->nwfilters object.
This API allows unprivileged users to conne... | 0 | nwfilterConnectNumOfNWFilters(virConnectPtr conn)
{
int ret;
if (virConnectNumOfNWFiltersEnsureACL(conn) < 0)
return -1;
nwfilterDriverLock();
ret = virNWFilterObjListNumOfNWFilters(driver->nwfilters, conn,
virConnectNumOfNWFiltersCheckACL);
nwfilt... | 334,264,229,405,564,560,000,000,000,000,000,000,000 | nwfilter_driver.c | 218,481,510,436,941,640,000,000,000,000,000,000,000 | [
"CWE-667"
] | CVE-2022-0897 | A flaw was found in the libvirt nwfilter driver. The virNWFilterObjListNumOfNWFilters method failed to acquire the driver->nwfilters mutex before iterating over virNWFilterObj instances. There was no protection to stop another thread from concurrently modifying the driver->nwfilters object. This flaw allows a malicious... | https://nvd.nist.gov/vuln/detail/CVE-2022-0897 |
214,090 | file-roller | 21dfcdbfe258984db89fb65243a1a888924e45a0 | https://git.gnome.org/browse/file-roller | https://gitlab.gnome.org/GNOME/file-roller/-/commit/21dfcdbfe258984db89fb65243a1a888924e45a0 | libarchive: do not follow external links when extracting files
Do not extract a file if its parent is a symbolic link to a
directory external to the destination. | 1 | extract_archive_thread (GSimpleAsyncResult *result,
GObject *object,
GCancellable *cancellable)
{
ExtractData *extract_data;
LoadData *load_data;
GHashTable *checked_folders;
GHashTable *created_files;
GHashTable *folders_created_during_extr... | 148,301,815,287,678,100,000,000,000,000,000,000,000 | fr-archive-libarchive.c | 232,302,128,256,963,830,000,000,000,000,000,000,000 | [
"CWE-22"
] | CVE-2020-11736 | fr-archive-libarchive.c in GNOME file-roller through 3.36.1 allows Directory Traversal during extraction because it lacks a check of whether a file's parent is a symlink to a directory outside of the intended extraction location. | https://nvd.nist.gov/vuln/detail/CVE-2020-11736 |
475,823 | file-roller | 21dfcdbfe258984db89fb65243a1a888924e45a0 | https://git.gnome.org/browse/file-roller | https://gitlab.gnome.org/GNOME/file-roller/-/commit/21dfcdbfe258984db89fb65243a1a888924e45a0 | libarchive: do not follow external links when extracting files
Do not extract a file if its parent is a symbolic link to a
directory external to the destination. | 0 | extract_archive_thread (GSimpleAsyncResult *result,
GObject *object,
GCancellable *cancellable)
{
ExtractData *extract_data;
LoadData *load_data;
GHashTable *checked_folders;
GHashTable *created_files;
GHashTable *folders_created_during_extr... | 31,952,659,417,925,164,000,000,000,000,000,000,000 | fr-archive-libarchive.c | 179,942,474,539,335,500,000,000,000,000,000,000,000 | [
"CWE-22"
] | CVE-2020-11736 | fr-archive-libarchive.c in GNOME file-roller through 3.36.1 allows Directory Traversal during extraction because it lacks a check of whether a file's parent is a symlink to a directory outside of the intended extraction location. | https://nvd.nist.gov/vuln/detail/CVE-2020-11736 |
214,092 | zziplib | 1ba660b3300d67b8ce9f6b96bbae0b36fa2d6b06 | https://github.com/gdraheim/zziplib | https://github.com/gdraheim/zziplib/commit/1ba660b3300d67b8ce9f6b96bbae0b36fa2d6b06 | check zlib space to be within buffer #39 | 1 | zzip_disk_entry_fopen(ZZIP_DISK * disk, ZZIP_DISK_ENTRY * entry)
{
/* keep this in sync with zzip_mem_entry_fopen */
struct zzip_file_header *header =
zzip_disk_entry_to_file_header(disk, entry);
if (! header)
return 0; /* EBADMSG */
___ ZZIP_DISK_FILE *file = malloc(sizeof(ZZIP_DISK_FIL... | 179,854,955,415,689,360,000,000,000,000,000,000,000 | mmapped.c | 264,055,777,047,859,460,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-7725 | An issue was discovered in ZZIPlib 0.13.68. An invalid memory address dereference was discovered in zzip_disk_fread in mmapped.c. The vulnerability causes an application crash, which leads to denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2018-7725 |
475,827 | zziplib | 1ba660b3300d67b8ce9f6b96bbae0b36fa2d6b06 | https://github.com/gdraheim/zziplib | https://github.com/gdraheim/zziplib/commit/1ba660b3300d67b8ce9f6b96bbae0b36fa2d6b06 | check zlib space to be within buffer #39 | 0 | zzip_disk_entry_fopen(ZZIP_DISK * disk, ZZIP_DISK_ENTRY * entry)
{
/* keep this in sync with zzip_mem_entry_fopen */
struct zzip_file_header *header =
zzip_disk_entry_to_file_header(disk, entry);
if (! header)
return 0; /* EBADMSG */
___ ZZIP_DISK_FILE *file = malloc(sizeof(ZZIP_DISK_FIL... | 185,475,818,855,268,900,000,000,000,000,000,000,000 | mmapped.c | 53,688,132,654,170,735,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-7725 | An issue was discovered in ZZIPlib 0.13.68. An invalid memory address dereference was discovered in zzip_disk_fread in mmapped.c. The vulnerability causes an application crash, which leads to denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2018-7725 |
214,093 | curl | 79b9d5f1a42578f807a6c94914bc65cbaa304b6d | https://github.com/curl/curl | https://github.com/bagder/curl/commit/79b9d5f1a42578f807a6c94914bc65cbaa304b6d | http_done: close Negotiate connections when done
When doing HTTP requests Negotiate authenticated, the entire connnection
may become authenticated and not just the specific HTTP request which is
otherwise how HTTP works, as Negotiate can basically use NTLM under the
hood. curl was not adhering to this fact but would a... | 1 | CURLcode Curl_http_done(struct connectdata *conn,
CURLcode status, bool premature)
{
struct SessionHandle *data = conn->data;
struct HTTP *http =data->req.protop;
Curl_unencode_cleanup(conn);
#ifdef USE_SPNEGO
if(data->state.proxyneg.state == GSS_AUTHSENT ||
data->state.negotiate... | 124,227,102,062,282,920,000,000,000,000,000,000,000 | http.c | 193,220,677,218,317,700,000,000,000,000,000,000,000 | [
"CWE-284"
] | CVE-2015-3148 | cURL and libcurl 7.10.6 through 7.41.0 do not properly re-use authenticated Negotiate connections, which allows remote attackers to connect as other users via a request. | https://nvd.nist.gov/vuln/detail/CVE-2015-3148 |
475,843 | curl | 79b9d5f1a42578f807a6c94914bc65cbaa304b6d | https://github.com/curl/curl | https://github.com/bagder/curl/commit/79b9d5f1a42578f807a6c94914bc65cbaa304b6d | http_done: close Negotiate connections when done
When doing HTTP requests Negotiate authenticated, the entire connnection
may become authenticated and not just the specific HTTP request which is
otherwise how HTTP works, as Negotiate can basically use NTLM under the
hood. curl was not adhering to this fact but would a... | 0 | CURLcode Curl_http_done(struct connectdata *conn,
CURLcode status, bool premature)
{
struct SessionHandle *data = conn->data;
struct HTTP *http =data->req.protop;
Curl_unencode_cleanup(conn);
#ifdef USE_SPNEGO
if(data->state.proxyneg.state == GSS_AUTHSENT ||
data->state.negotiate.... | 136,040,060,556,006,140,000,000,000,000,000,000,000 | http.c | 210,646,243,203,154,300,000,000,000,000,000,000,000 | [
"CWE-284"
] | CVE-2015-3148 | cURL and libcurl 7.10.6 through 7.41.0 do not properly re-use authenticated Negotiate connections, which allows remote attackers to connect as other users via a request. | https://nvd.nist.gov/vuln/detail/CVE-2015-3148 |
214,096 | ImageMagick | 7a42f63927e7f2e26846b7ed4560e9cb4984af7b | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/7a42f63927e7f2e26846b7ed4560e9cb4984af7b | https://github.com/ImageMagick/ImageMagick/issues/903 | 1 | static Cache GetImagePixelCache(Image *image,const MagickBooleanType clone,
ExceptionInfo *exception)
{
CacheInfo
*magick_restrict cache_info;
MagickBooleanType
destroy,
status;
static MagickSizeType
cache_timelimit = MagickResourceInfinity,
cpu_throttle = MagickResourceInfinity,
cycle... | 93,340,072,696,756,780,000,000,000,000,000,000,000 | cache.c | 2,053,889,816,065,031,600,000,000,000,000,000,000 | [
"CWE-772"
] | CVE-2017-17887 | In ImageMagick 7.0.7-16 Q16, a memory leak vulnerability was found in the function GetImagePixelCache in magick/cache.c, which allows attackers to cause a denial of service via a crafted MNG image file that is processed by ReadOneMNGImage. | https://nvd.nist.gov/vuln/detail/CVE-2017-17887 |
475,849 | ImageMagick | 7a42f63927e7f2e26846b7ed4560e9cb4984af7b | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/7a42f63927e7f2e26846b7ed4560e9cb4984af7b | https://github.com/ImageMagick/ImageMagick/issues/903 | 0 | static Cache GetImagePixelCache(Image *image,const MagickBooleanType clone,
ExceptionInfo *exception)
{
CacheInfo
*magick_restrict cache_info;
MagickBooleanType
destroy,
status;
static MagickSizeType
cache_timelimit = MagickResourceInfinity,
cpu_throttle = MagickResourceInfinity,
cycle... | 294,902,518,685,254,530,000,000,000,000,000,000,000 | cache.c | 327,586,818,609,895,330,000,000,000,000,000,000,000 | [
"CWE-772"
] | CVE-2017-17887 | In ImageMagick 7.0.7-16 Q16, a memory leak vulnerability was found in the function GetImagePixelCache in magick/cache.c, which allows attackers to cause a denial of service via a crafted MNG image file that is processed by ReadOneMNGImage. | https://nvd.nist.gov/vuln/detail/CVE-2017-17887 |
214,098 | linux | bbe692e349e2a1edf3fe0a29a0e05899c9c94d51 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/bbe692e349e2a1edf3fe0a29a0e05899c9c94d51 | rpmsg: char: release allocated memory
In rpmsg_eptdev_write_iter, if copy_from_iter_full fails the allocated
buffer needs to be released.
Signed-off-by: Navid Emamdoost <navid.emamdoost@gmail.com>
Signed-off-by: Bjorn Andersson <bjorn.andersson@linaro.org> | 1 | static ssize_t rpmsg_eptdev_write_iter(struct kiocb *iocb,
struct iov_iter *from)
{
struct file *filp = iocb->ki_filp;
struct rpmsg_eptdev *eptdev = filp->private_data;
size_t len = iov_iter_count(from);
void *kbuf;
int ret;
kbuf = kzalloc(len, GFP_KERNEL);
if (!kbuf)
return -ENOMEM;
if (!copy_fr... | 43,680,864,153,068,520,000,000,000,000,000,000,000 | rpmsg_char.c | 17,836,138,227,971,876,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2019-19053 | A memory leak in the rpmsg_eptdev_write_iter() function in drivers/rpmsg/rpmsg_char.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering copy_from_iter_full() failures, aka CID-bbe692e349e2. | https://nvd.nist.gov/vuln/detail/CVE-2019-19053 |
475,863 | linux | bbe692e349e2a1edf3fe0a29a0e05899c9c94d51 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/bbe692e349e2a1edf3fe0a29a0e05899c9c94d51 | rpmsg: char: release allocated memory
In rpmsg_eptdev_write_iter, if copy_from_iter_full fails the allocated
buffer needs to be released.
Signed-off-by: Navid Emamdoost <navid.emamdoost@gmail.com>
Signed-off-by: Bjorn Andersson <bjorn.andersson@linaro.org> | 0 | static ssize_t rpmsg_eptdev_write_iter(struct kiocb *iocb,
struct iov_iter *from)
{
struct file *filp = iocb->ki_filp;
struct rpmsg_eptdev *eptdev = filp->private_data;
size_t len = iov_iter_count(from);
void *kbuf;
int ret;
kbuf = kzalloc(len, GFP_KERNEL);
if (!kbuf)
return -ENOMEM;
if (!copy_fr... | 251,541,183,689,801,760,000,000,000,000,000,000,000 | rpmsg_char.c | 154,773,002,679,875,260,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2019-19053 | A memory leak in the rpmsg_eptdev_write_iter() function in drivers/rpmsg/rpmsg_char.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering copy_from_iter_full() failures, aka CID-bbe692e349e2. | https://nvd.nist.gov/vuln/detail/CVE-2019-19053 |
214,116 | cxxtools | 142bb2589dc184709857c08c1e10570947c444e3 | https://github.com/maekitalo/cxxtools | https://github.com/maekitalo/cxxtools/commit/142bb2589dc184709857c08c1e10570947c444e3 | fix parsing double % in query parameters | 1 | void UrlParser::parse(char ch)
{
switch(_state)
{
case state_0:
if (ch == '=')
_state = state_value;
else if (ch == '&')
;
else if (ch == '%')
_state = state_keyesc;
else
{
_key = ch;
_state = state_key;
... | 146,998,449,035,886,400,000,000,000,000,000,000,000 | query_params.cpp | 331,576,263,354,728,950,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2013-7298 | query_params.cpp in cxxtools before 2.2.1 allows remote attackers to cause a denial of service (infinite recursion and crash) via an HTTP query that contains %% (double percent) characters. | https://nvd.nist.gov/vuln/detail/CVE-2013-7298 |
475,962 | cxxtools | 142bb2589dc184709857c08c1e10570947c444e3 | https://github.com/maekitalo/cxxtools | https://github.com/maekitalo/cxxtools/commit/142bb2589dc184709857c08c1e10570947c444e3 | fix parsing double % in query parameters | 0 | void UrlParser::parse(char ch)
{
switch(_state)
{
case state_0:
if (ch == '=')
_state = state_value;
else if (ch == '&')
;
else if (ch == '%')
_state = state_keyesc;
else
{
_key = ch;
_state = state_key;
... | 283,876,024,174,621,340,000,000,000,000,000,000,000 | query_params.cpp | 36,198,160,111,428,470,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2013-7298 | query_params.cpp in cxxtools before 2.2.1 allows remote attackers to cause a denial of service (infinite recursion and crash) via an HTTP query that contains %% (double percent) characters. | https://nvd.nist.gov/vuln/detail/CVE-2013-7298 |
214,153 | exiv2 | 43f154f44b838e6b232193ccbd48e5a2e94bdd35 | https://github.com/Exiv2/exiv2 | https://github.com/Exiv2/exiv2/commit/43f154f44b838e6b232193ccbd48e5a2e94bdd35 | Merge two enforces into one. | 1 | DataBuf PngChunk::readRawProfile(const DataBuf& text,bool iTXt)
{
DataBuf info;
unsigned char unhex[103]={0,0,0,0,0,0,0,0,0,0, 0,0,0,0,0,0,0,0,0,0,
0,0,0,0,0,0,0,0,0,0, 0,0,0,0,0,0,0,0,0,0,
0,0,0,0,0,0,0,0,0,1, 2,3,4,5,6,7,8,9,0,0,
0,... | 321,616,521,586,550,480,000,000,000,000,000,000,000 | pngchunk_int.cpp | 247,499,716,160,878,100,000,000,000,000,000,000,000 | [
"CWE-770"
] | CVE-2019-13112 | A PngChunk::parseChunkContent uncontrolled memory allocation in Exiv2 through 0.27.1 allows an attacker to cause a denial of service (crash due to an std::bad_alloc exception) via a crafted PNG image file. | https://nvd.nist.gov/vuln/detail/CVE-2019-13112 |
476,057 | exiv2 | 43f154f44b838e6b232193ccbd48e5a2e94bdd35 | https://github.com/Exiv2/exiv2 | https://github.com/Exiv2/exiv2/commit/43f154f44b838e6b232193ccbd48e5a2e94bdd35 | Merge two enforces into one. | 0 | DataBuf PngChunk::readRawProfile(const DataBuf& text,bool iTXt)
{
DataBuf info;
unsigned char unhex[103]={0,0,0,0,0,0,0,0,0,0, 0,0,0,0,0,0,0,0,0,0,
0,0,0,0,0,0,0,0,0,0, 0,0,0,0,0,0,0,0,0,0,
0,0,0,0,0,0,0,0,0,1, 2,3,4,5,6,7,8,9,0,0,
0,... | 132,265,467,662,308,290,000,000,000,000,000,000,000 | pngchunk_int.cpp | 23,411,566,232,110,930,000,000,000,000,000,000,000 | [
"CWE-770"
] | CVE-2019-13112 | A PngChunk::parseChunkContent uncontrolled memory allocation in Exiv2 through 0.27.1 allows an attacker to cause a denial of service (crash due to an std::bad_alloc exception) via a crafted PNG image file. | https://nvd.nist.gov/vuln/detail/CVE-2019-13112 |
214,161 | grub | 451d80e52d851432e109771bb8febafca7a5f1f2 | http://git.savannah.gnu.org/cgit/grub | http://git.savannah.gnu.org/cgit/grub.git/commit/?id=451d80e52d851432e109771bb8febafca7a5f1f2 | Fix security issue when reading username and password
This patch fixes two integer underflows at:
* grub-core/lib/crypto.c
* grub-core/normal/auth.c
CVE-2015-8370
Signed-off-by: Hector Marco-Gisbert <hecmargi@upv.es>
Signed-off-by: Ismael Ripoll-Ripoll <iripoll@disca.upv.es>
Also-By: Andrey Borzenkov <arvidjaar@... | 1 | grub_password_get (char buf[], unsigned buf_size)
{
unsigned cur_len = 0;
int key;
while (1)
{
key = grub_getkey ();
if (key == '\n' || key == '\r')
break;
if (key == '\e')
{
cur_len = 0;
break;
}
if (key == '\b')
{
cur_len--;
continue;
}
if (!grub_isprint (... | 225,895,683,657,818,140,000,000,000,000,000,000,000 | crypto.c | 163,139,052,227,021,200,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2015-8370 | Multiple integer underflows in Grub2 1.98 through 2.02 allow physically proximate attackers to bypass authentication, obtain sensitive information, or cause a denial of service (disk corruption) via backspace characters in the (1) grub_username_get function in grub-core/normal/auth.c or the (2) grub_password_get functi... | https://nvd.nist.gov/vuln/detail/CVE-2015-8370 |
476,158 | grub | 451d80e52d851432e109771bb8febafca7a5f1f2 | http://git.savannah.gnu.org/cgit/grub | http://git.savannah.gnu.org/cgit/grub.git/commit/?id=451d80e52d851432e109771bb8febafca7a5f1f2 | Fix security issue when reading username and password
This patch fixes two integer underflows at:
* grub-core/lib/crypto.c
* grub-core/normal/auth.c
CVE-2015-8370
Signed-off-by: Hector Marco-Gisbert <hecmargi@upv.es>
Signed-off-by: Ismael Ripoll-Ripoll <iripoll@disca.upv.es>
Also-By: Andrey Borzenkov <arvidjaar@... | 0 | grub_password_get (char buf[], unsigned buf_size)
{
unsigned cur_len = 0;
int key;
while (1)
{
key = grub_getkey ();
if (key == '\n' || key == '\r')
break;
if (key == '\e')
{
cur_len = 0;
break;
}
if (key == '\b')
{
if (cur_len)
cur_len--;
continue;
}
i... | 256,459,968,304,373,300,000,000,000,000,000,000,000 | crypto.c | 270,064,135,870,995,730,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2015-8370 | Multiple integer underflows in Grub2 1.98 through 2.02 allow physically proximate attackers to bypass authentication, obtain sensitive information, or cause a denial of service (disk corruption) via backspace characters in the (1) grub_username_get function in grub-core/normal/auth.c or the (2) grub_password_get functi... | https://nvd.nist.gov/vuln/detail/CVE-2015-8370 |
214,162 | grub | 451d80e52d851432e109771bb8febafca7a5f1f2 | http://git.savannah.gnu.org/cgit/grub | http://git.savannah.gnu.org/cgit/grub.git/commit/?id=451d80e52d851432e109771bb8febafca7a5f1f2 | Fix security issue when reading username and password
This patch fixes two integer underflows at:
* grub-core/lib/crypto.c
* grub-core/normal/auth.c
CVE-2015-8370
Signed-off-by: Hector Marco-Gisbert <hecmargi@upv.es>
Signed-off-by: Ismael Ripoll-Ripoll <iripoll@disca.upv.es>
Also-By: Andrey Borzenkov <arvidjaar@... | 1 | grub_username_get (char buf[], unsigned buf_size)
{
unsigned cur_len = 0;
int key;
while (1)
{
key = grub_getkey ();
if (key == '\n' || key == '\r')
break;
if (key == '\e')
{
cur_len = 0;
break;
}
if (key == '\b')
{
cur_len--;
grub_printf ("\b");
continue;
}
... | 226,833,632,574,004,480,000,000,000,000,000,000,000 | auth.c | 269,346,585,097,170,120,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2015-8370 | Multiple integer underflows in Grub2 1.98 through 2.02 allow physically proximate attackers to bypass authentication, obtain sensitive information, or cause a denial of service (disk corruption) via backspace characters in the (1) grub_username_get function in grub-core/normal/auth.c or the (2) grub_password_get functi... | https://nvd.nist.gov/vuln/detail/CVE-2015-8370 |
476,165 | grub | 451d80e52d851432e109771bb8febafca7a5f1f2 | http://git.savannah.gnu.org/cgit/grub | http://git.savannah.gnu.org/cgit/grub.git/commit/?id=451d80e52d851432e109771bb8febafca7a5f1f2 | Fix security issue when reading username and password
This patch fixes two integer underflows at:
* grub-core/lib/crypto.c
* grub-core/normal/auth.c
CVE-2015-8370
Signed-off-by: Hector Marco-Gisbert <hecmargi@upv.es>
Signed-off-by: Ismael Ripoll-Ripoll <iripoll@disca.upv.es>
Also-By: Andrey Borzenkov <arvidjaar@... | 0 | grub_username_get (char buf[], unsigned buf_size)
{
unsigned cur_len = 0;
int key;
while (1)
{
key = grub_getkey ();
if (key == '\n' || key == '\r')
break;
if (key == '\e')
{
cur_len = 0;
break;
}
if (key == '\b')
{
if (cur_len)
{
cur_len--;
grub_pri... | 158,853,056,239,619,920,000,000,000,000,000,000,000 | auth.c | 193,602,933,690,856,650,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2015-8370 | Multiple integer underflows in Grub2 1.98 through 2.02 allow physically proximate attackers to bypass authentication, obtain sensitive information, or cause a denial of service (disk corruption) via backspace characters in the (1) grub_username_get function in grub-core/normal/auth.c or the (2) grub_password_get functi... | https://nvd.nist.gov/vuln/detail/CVE-2015-8370 |
214,164 | passenger | 4e97fdb86d0a0141ec9a052c6e691fcd07bb45c8 | https://github.com/phusion/passenger | https://github.com/phusion/passenger/commit/4e97fdb86d0a0141ec9a052c6e691fcd07bb45c8 | ExecHelperMain: fix privilege lowering code | 1 | switchGroup(uid_t uid, const struct passwd *userInfo, gid_t gid) {
if (userInfo != NULL) {
bool setgroupsCalled = false;
#if defined(__linux__) || defined(__APPLE__) || defined(__FreeBSD__)
#ifdef __APPLE__
int groups[1024];
int ngroups = sizeof(groups) / sizeof(int);
#else
gid_t groups[1024];
... | 198,641,138,383,488,570,000,000,000,000,000,000,000 | ExecHelperMain.cpp | 127,561,795,438,167,370,000,000,000,000,000,000,000 | [
"CWE-284"
] | CVE-2018-12615 | An issue was discovered in switchGroup() in agent/ExecHelper/ExecHelperMain.cpp in Phusion Passenger before 5.3.2. The set of groups (gidset) is not set correctly, leaving it up to randomness (i.e., uninitialized memory) which supplementary groups are actually being set while lowering privileges. | https://nvd.nist.gov/vuln/detail/CVE-2018-12615 |
476,208 | passenger | 4e97fdb86d0a0141ec9a052c6e691fcd07bb45c8 | https://github.com/phusion/passenger | https://github.com/phusion/passenger/commit/4e97fdb86d0a0141ec9a052c6e691fcd07bb45c8 | ExecHelperMain: fix privilege lowering code | 0 | switchGroup(uid_t uid, const struct passwd *userInfo, gid_t gid) {
if (userInfo != NULL) {
bool setgroupsCalled = false;
#if defined(__linux__) || defined(__APPLE__) || defined(__FreeBSD__)
#ifdef __APPLE__
int groups[1024];
int ngroups = sizeof(groups) / sizeof(int);
#else
gid_t groups[1024];
... | 232,743,474,220,257,650,000,000,000,000,000,000,000 | ExecHelperMain.cpp | 204,458,997,542,380,700,000,000,000,000,000,000,000 | [
"CWE-284"
] | CVE-2018-12615 | An issue was discovered in switchGroup() in agent/ExecHelper/ExecHelperMain.cpp in Phusion Passenger before 5.3.2. The set of groups (gidset) is not set correctly, leaving it up to randomness (i.e., uninitialized memory) which supplementary groups are actually being set while lowering privileges. | https://nvd.nist.gov/vuln/detail/CVE-2018-12615 |
214,166 | abrt | 7269a2cc88735aee0d1fa62491b9efe73ab5c6e8 | https://github.com/abrt/abrt | https://github.com/abrt/abrt/commit/7269a2cc88735aee0d1fa62491b9efe73ab5c6e8 | ccpp: revert the UID/GID changes if user core fails
Thanks Florian Weimer <fweimer@redhat.com>
Signed-off-by: Jakub Filak <jfilak@redhat.com> | 1 | static int open_user_core(uid_t uid, uid_t fsuid, pid_t pid, char **percent_values)
{
proc_cwd = open_cwd(pid);
if (proc_cwd == NULL)
return -1;
errno = 0;
/* http://article.gmane.org/gmane.comp.security.selinux/21842 */
security_context_t newcon;
if (compute_selinux_con_for_new_file(p... | 51,547,557,310,852,805,000,000,000,000,000,000,000 | abrt-hook-ccpp.c | 329,397,073,143,931,880,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2015-3142 | The kernel-invoked coredump processor in Automatic Bug Reporting Tool (ABRT) does not properly check the ownership of files before writing core dumps to them, which allows local users to obtain sensitive information by leveraging write permissions to the working directory of a crashed application. | https://nvd.nist.gov/vuln/detail/CVE-2015-3142 |
476,255 | abrt | 7269a2cc88735aee0d1fa62491b9efe73ab5c6e8 | https://github.com/abrt/abrt | https://github.com/abrt/abrt/commit/7269a2cc88735aee0d1fa62491b9efe73ab5c6e8 | ccpp: revert the UID/GID changes if user core fails
Thanks Florian Weimer <fweimer@redhat.com>
Signed-off-by: Jakub Filak <jfilak@redhat.com> | 0 | static int open_user_core(uid_t uid, uid_t fsuid, pid_t pid, char **percent_values)
{
proc_cwd = open_cwd(pid);
if (proc_cwd == NULL)
return -1;
errno = 0;
/* http://article.gmane.org/gmane.comp.security.selinux/21842 */
security_context_t newcon;
if (compute_selinux_con_for_new_file(p... | 90,358,687,385,810,820,000,000,000,000,000,000,000 | abrt-hook-ccpp.c | 276,899,952,972,904,500,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2015-3142 | The kernel-invoked coredump processor in Automatic Bug Reporting Tool (ABRT) does not properly check the ownership of files before writing core dumps to them, which allows local users to obtain sensitive information by leveraging write permissions to the working directory of a crashed application. | https://nvd.nist.gov/vuln/detail/CVE-2015-3142 |
214,172 | linux | d10dcb615c8e29d403a24d35f8310a7a53e3050c | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d10dcb615c8e29d403a24d35f8310a7a53e3050c | mwifiex: pcie: Fix memory leak in mwifiex_pcie_init_evt_ring
In mwifiex_pcie_init_evt_ring, a new skb is allocated which should be
released if mwifiex_map_pci_memory() fails. The release for skb and
card->evtbd_ring_vbase is added.
Fixes: 0732484b47b5 ("mwifiex: separate ring initialization and ring creation routines... | 1 | static int mwifiex_pcie_init_evt_ring(struct mwifiex_adapter *adapter)
{
struct pcie_service_card *card = adapter->card;
struct mwifiex_evt_buf_desc *desc;
struct sk_buff *skb;
dma_addr_t buf_pa;
int i;
for (i = 0; i < MWIFIEX_MAX_EVT_BD; i++) {
/* Allocate skb here so that firmware can DMA data from it */
s... | 59,433,706,910,968,040,000,000,000,000,000,000,000 | pcie.c | 65,655,637,588,017,340,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2019-19057 | Two memory leaks in the mwifiex_pcie_init_evt_ring() function in drivers/net/wireless/marvell/mwifiex/pcie.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures, aka CID-d10dcb615c8e. | https://nvd.nist.gov/vuln/detail/CVE-2019-19057 |
476,273 | linux | d10dcb615c8e29d403a24d35f8310a7a53e3050c | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d10dcb615c8e29d403a24d35f8310a7a53e3050c | mwifiex: pcie: Fix memory leak in mwifiex_pcie_init_evt_ring
In mwifiex_pcie_init_evt_ring, a new skb is allocated which should be
released if mwifiex_map_pci_memory() fails. The release for skb and
card->evtbd_ring_vbase is added.
Fixes: 0732484b47b5 ("mwifiex: separate ring initialization and ring creation routines... | 0 | static int mwifiex_pcie_init_evt_ring(struct mwifiex_adapter *adapter)
{
struct pcie_service_card *card = adapter->card;
struct mwifiex_evt_buf_desc *desc;
struct sk_buff *skb;
dma_addr_t buf_pa;
int i;
for (i = 0; i < MWIFIEX_MAX_EVT_BD; i++) {
/* Allocate skb here so that firmware can DMA data from it */
s... | 147,871,505,170,226,950,000,000,000,000,000,000,000 | pcie.c | 151,248,231,780,596,260,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2019-19057 | Two memory leaks in the mwifiex_pcie_init_evt_ring() function in drivers/net/wireless/marvell/mwifiex/pcie.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures, aka CID-d10dcb615c8e. | https://nvd.nist.gov/vuln/detail/CVE-2019-19057 |
214,185 | gst-plugins-bad | d58f668ece8795bddb3316832e1848c7b7cf38ac | https://github.com/GStreamer/gst-plugins-bad | https://github.com/GStreamer/gst-plugins-bad/commit/d58f668ece8795bddb3316832e1848c7b7cf38ac | mpegtssection: Add more section size checks
The smallest section ever needs to be at least 3 bytes (i.e. just the short
header).
Non-short headers need to be at least 11 bytes long (3 for the minimum header,
5 for the non-short header, and 4 for the CRC).
https://bugzilla.gnome.org/show_bug.cgi?id=775048 | 1 | gst_mpegts_section_new (guint16 pid, guint8 * data, gsize data_size)
{
GstMpegtsSection *res = NULL;
guint8 tmp;
guint8 table_id;
guint16 section_length;
/* Check for length */
section_length = GST_READ_UINT16_BE (data + 1) & 0x0FFF;
if (G_UNLIKELY (data_size < section_length + 3))
goto short_packet;... | 273,614,624,784,294,800,000,000,000,000,000,000,000 | gstmpegtssection.c | 224,299,742,673,468,840,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2016-9812 | The gst_mpegts_section_new function in the mpegts decoder in GStreamer before 1.10.2 allows remote attackers to cause a denial of service (out-of-bounds read) via a too small section. | https://nvd.nist.gov/vuln/detail/CVE-2016-9812 |
476,389 | gst-plugins-bad | d58f668ece8795bddb3316832e1848c7b7cf38ac | https://github.com/GStreamer/gst-plugins-bad | https://github.com/GStreamer/gst-plugins-bad/commit/d58f668ece8795bddb3316832e1848c7b7cf38ac | mpegtssection: Add more section size checks
The smallest section ever needs to be at least 3 bytes (i.e. just the short
header).
Non-short headers need to be at least 11 bytes long (3 for the minimum header,
5 for the non-short header, and 4 for the CRC).
https://bugzilla.gnome.org/show_bug.cgi?id=775048 | 0 | gst_mpegts_section_new (guint16 pid, guint8 * data, gsize data_size)
{
GstMpegtsSection *res = NULL;
guint8 tmp;
guint8 table_id;
guint16 section_length = 0;
/* The smallest section ever is 3 bytes */
if (G_UNLIKELY (data_size < 3))
goto short_packet;
/* Check for length */
section_length = GST_RE... | 205,096,893,977,488,900,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2016-9812 | The gst_mpegts_section_new function in the mpegts decoder in GStreamer before 1.10.2 allows remote attackers to cause a denial of service (out-of-bounds read) via a too small section. | https://nvd.nist.gov/vuln/detail/CVE-2016-9812 |
214,188 | linux | c9fbd7bbc23dbdd73364be4d045e5d3612cf6e82 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c9fbd7bbc23dbdd73364be4d045e5d3612cf6e82 | xfs: clear sb->s_fs_info on mount failure
We recently had an oops reported on a 4.14 kernel in
xfs_reclaim_inodes_count() where sb->s_fs_info pointed to garbage
and so the m_perag_tree lookup walked into lala land.
Essentially, the machine was under memory pressure when the mount
was being run, xfs_fs_fill_super() fa... | 1 | xfs_fs_fill_super(
struct super_block *sb,
void *data,
int silent)
{
struct inode *root;
struct xfs_mount *mp = NULL;
int flags = 0, error = -ENOMEM;
/*
* allocate mp and do all low-level struct initializations before we
* attach it to the super
*/
mp = xfs_mount_alloc(sb);
if (!mp)
goto out;
... | 277,860,177,226,170,220,000,000,000,000,000,000,000 | xfs_super.c | 14,981,166,057,471,163,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2018-20976 | An issue was discovered in fs/xfs/xfs_super.c in the Linux kernel before 4.18. A use after free exists, related to xfs_fs_fill_super failure. | https://nvd.nist.gov/vuln/detail/CVE-2018-20976 |
476,396 | linux | c9fbd7bbc23dbdd73364be4d045e5d3612cf6e82 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c9fbd7bbc23dbdd73364be4d045e5d3612cf6e82 | xfs: clear sb->s_fs_info on mount failure
We recently had an oops reported on a 4.14 kernel in
xfs_reclaim_inodes_count() where sb->s_fs_info pointed to garbage
and so the m_perag_tree lookup walked into lala land.
Essentially, the machine was under memory pressure when the mount
was being run, xfs_fs_fill_super() fa... | 0 | xfs_fs_fill_super(
struct super_block *sb,
void *data,
int silent)
{
struct inode *root;
struct xfs_mount *mp = NULL;
int flags = 0, error = -ENOMEM;
/*
* allocate mp and do all low-level struct initializations before we
* attach it to the super
*/
mp = xfs_mount_alloc(sb);
if (!mp)
goto out;
... | 150,778,296,756,657,730,000,000,000,000,000,000,000 | xfs_super.c | 131,887,113,801,046,140,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2018-20976 | An issue was discovered in fs/xfs/xfs_super.c in the Linux kernel before 4.18. A use after free exists, related to xfs_fs_fill_super failure. | https://nvd.nist.gov/vuln/detail/CVE-2018-20976 |
214,239 | ImageMagick | e92492afac23315358850e5e050144930049e9cb | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/e92492afac23315358850e5e050144930049e9cb | https://github.com/ImageMagick/ImageMagick/issues/1052 | 1 | static MagickBooleanType WriteSGIImage(const ImageInfo *image_info,Image *image,
ExceptionInfo *exception)
{
CompressionType
compression;
const char
*value;
MagickBooleanType
status;
MagickOffsetType
scene;
MagickSizeType
number_pixels;
MemoryInfo
*pixel_info;
SGIInfo
i... | 146,154,543,520,544,760,000,000,000,000,000,000,000 | sgi.c | 197,776,076,151,414,450,000,000,000,000,000,000,000 | [
"CWE-772"
] | CVE-2018-17965 | ImageMagick 7.0.7-28 has a memory leak vulnerability in WriteSGIImage in coders/sgi.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-17965 |
476,856 | ImageMagick | e92492afac23315358850e5e050144930049e9cb | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/e92492afac23315358850e5e050144930049e9cb | https://github.com/ImageMagick/ImageMagick/issues/1052 | 0 | static MagickBooleanType WriteSGIImage(const ImageInfo *image_info,Image *image,
ExceptionInfo *exception)
{
CompressionType
compression;
const char
*value;
MagickBooleanType
status;
MagickOffsetType
scene;
MagickSizeType
number_pixels;
MemoryInfo
*pixel_info;
SGIInfo
i... | 115,006,117,270,335,270,000,000,000,000,000,000,000 | sgi.c | 57,022,506,168,724,120,000,000,000,000,000,000,000 | [
"CWE-772"
] | CVE-2018-17965 | ImageMagick 7.0.7-28 has a memory leak vulnerability in WriteSGIImage in coders/sgi.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-17965 |
214,240 | vim | 5f25c3855071bd7e26255c68bf458b1b5cf92f39 | https://github.com/vim/vim | https://github.com/vim/vim/commit/5f25c3855071bd7e26255c68bf458b1b5cf92f39 | patch 8.2.4049: Vim9: reading before the start of the line with "$"
Problem: Vim9: reading before the start of the line with "$" by itself.
Solution: Do not subtract one when reporting the error. | 1 | compile_get_env(char_u **arg, cctx_T *cctx)
{
char_u *start = *arg;
int len;
int ret;
char_u *name;
++*arg;
len = get_env_len(arg);
if (len == 0)
{
semsg(_(e_syntax_error_at_str), start - 1);
return FAIL;
}
// include the '$' in the name, eval_env_var() expects it.
name... | 34,875,256,404,605,417,000,000,000,000,000,000,000 | vim9expr.c | 312,413,597,284,457,300,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2022-0158 | vim is vulnerable to Heap-based Buffer Overflow | https://nvd.nist.gov/vuln/detail/CVE-2022-0158 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.