idx
int64
project
string
commit_id
string
project_url
string
commit_url
string
commit_message
string
target
int64
func
string
func_hash
float64
file_name
string
file_hash
float64
cwe
list
cve
string
cve_desc
string
nvd_url
string
468,399
exim
4e6ae6235c68de243b1c2419027472d7659aa2b4
https://github.com/Exim/exim
https://git.exim.org/exim.git/commitdiff/4e6ae6235c68de243b1c2419027472d7659aa2b4
Avoid release of store if there have been later allocations. Bug 2199
0
receive_msg(BOOL extract_recip) { int i; int rc = FAIL; int msg_size = 0; int process_info_len = Ustrlen(process_info); int error_rc = (error_handling == ERRORS_SENDER)? errors_sender_rc : EXIT_FAILURE; int header_size = 256; int start, end, domain; int id_resolution; int had_zero = 0; int prevlines_le...
221,787,206,098,620,120,000,000,000,000,000,000,000
receive.c
260,622,324,770,754,400,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2017-16943
The receive_msg function in receive.c in the SMTP daemon in Exim 4.88 and 4.89 allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via vectors involving BDAT commands.
https://nvd.nist.gov/vuln/detail/CVE-2017-16943
213,463
claws
ac286a71ed78429e16c612161251b9ea90ccd431
http://git.claws-mail.org/?p=claws
https://git.claws-mail.org/?p=claws.git;a=commit;h=ac286a71ed78429e16c612161251b9ea90ccd431
harden link checker before accepting click
1
gboolean textview_uri_security_check(TextView *textview, ClickableText *uri) { gchar *visible_str; gboolean retval = TRUE; if (is_uri_string(uri->uri) == FALSE) return TRUE; visible_str = textview_get_visible_uri(textview, uri); if (visible_str == NULL) return TRUE; g_strstrip(visible_str); if (strcmp(vi...
52,474,765,865,925,310,000,000,000,000,000,000,000
textview.c
155,997,749,370,061,420,000,000,000,000,000,000,000
[ "CWE-601" ]
CVE-2021-37746
textview_uri_security_check in textview.c in Claws Mail before 3.18.0, and Sylpheed through 3.7.0, does not have sufficient link checks before accepting a click.
https://nvd.nist.gov/vuln/detail/CVE-2021-37746
468,844
claws
ac286a71ed78429e16c612161251b9ea90ccd431
http://git.claws-mail.org/?p=claws
https://git.claws-mail.org/?p=claws.git;a=commit;h=ac286a71ed78429e16c612161251b9ea90ccd431
harden link checker before accepting click
0
gboolean textview_uri_security_check(TextView *textview, ClickableText *uri) { gchar *visible_str; gboolean retval = TRUE; if (is_uri_string(uri->uri) == FALSE) return FALSE; visible_str = textview_get_visible_uri(textview, uri); if (visible_str == NULL) return TRUE; g_strstrip(visible_str); if (strcmp(v...
332,202,147,029,445,420,000,000,000,000,000,000,000
textview.c
16,047,768,559,720,670,000,000,000,000,000,000,000
[ "CWE-601" ]
CVE-2021-37746
textview_uri_security_check in textview.c in Claws Mail before 3.18.0, and Sylpheed through 3.7.0, does not have sufficient link checks before accepting a click.
https://nvd.nist.gov/vuln/detail/CVE-2021-37746
213,484
gimp
48ec15890e1751dede061f6d1f469b6508c13439
https://github.com/GNOME/gimp
http://git.gnome.org/browse/gimp/commit/?id=48ec15890e1751dede061f6d1f469b6508c13439
file-psp: fix for bogus input data. Fixes bug #639203
1
read_channel_data (FILE *f, PSPimage *ia, guchar **pixels, guint bytespp, guint offset, GimpDrawable *drawable, guint32 compressed_len) { gint i, y, width = drawable->width, he...
297,650,408,490,753,520,000,000,000,000,000,000,000
file-psp.c
220,891,884,149,582,260,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2011-1782
Heap-based buffer overflow in the read_channel_data function in file-psp.c in the Paint Shop Pro (PSP) plugin in GIMP 2.6.11 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a PSP_COMP_RLE (aka RLE compression) image file that begins a long run count at the...
https://nvd.nist.gov/vuln/detail/CVE-2011-1782
469,073
gimp
48ec15890e1751dede061f6d1f469b6508c13439
https://github.com/GNOME/gimp
http://git.gnome.org/browse/gimp/commit/?id=48ec15890e1751dede061f6d1f469b6508c13439
file-psp: fix for bogus input data. Fixes bug #639203
0
read_channel_data (FILE *f, PSPimage *ia, guchar **pixels, guint bytespp, guint offset, GimpDrawable *drawable, guint32 compressed_len) { gint i, y, width = drawable->width, he...
69,505,419,645,543,400,000,000,000,000,000,000,000
file-psp.c
75,479,100,107,507,160,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2011-1782
Heap-based buffer overflow in the read_channel_data function in file-psp.c in the Paint Shop Pro (PSP) plugin in GIMP 2.6.11 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a PSP_COMP_RLE (aka RLE compression) image file that begins a long run count at the...
https://nvd.nist.gov/vuln/detail/CVE-2011-1782
213,488
weechat
efb795c74fe954b9544074aafcebb1be4452b03a
https://github.com/weechat/weechat
http://git.savannah.gnu.org/gitweb/?p=weechat.git;a=commitdiff_plain;h=efb795c74fe954b9544074aafcebb1be4452b03a
core: do not call shell to execute command in hook_process (fix security problem when a plugin/script gives untrusted command) (bug #37764)
1
hook_process_child (struct t_hook *hook_process) { char *exec_args[4] = { "sh", "-c", NULL, NULL }; const char *ptr_url; int rc; /* * close stdin, so that process will fail to read stdin (process reading * stdin should not be run inside WeeChat!) */ close (STDIN_FILENO); /* redi...
280,923,024,449,057,000,000,000,000,000,000,000,000
wee-hook.c
276,147,935,021,672,700,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2012-5534
The hook_process function in the plugin API for WeeChat 0.3.0 through 0.3.9.1 allows remote attackers to execute arbitrary commands via shell metacharacters in a command from a plugin, related to "shell expansion."
https://nvd.nist.gov/vuln/detail/CVE-2012-5534
471,361
weechat
efb795c74fe954b9544074aafcebb1be4452b03a
https://github.com/weechat/weechat
http://git.savannah.gnu.org/gitweb/?p=weechat.git;a=commitdiff_plain;h=efb795c74fe954b9544074aafcebb1be4452b03a
core: do not call shell to execute command in hook_process (fix security problem when a plugin/script gives untrusted command) (bug #37764)
0
hook_process_child (struct t_hook *hook_process) { char **exec_args; const char *ptr_url; int rc, i; /* * close stdin, so that process will fail to read stdin (process reading * stdin should not be run inside WeeChat!) */ close (STDIN_FILENO); /* redirect stdout/stderr to pipe (...
332,420,425,535,788,540,000,000,000,000,000,000,000
wee-hook.c
178,766,994,315,960,500,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2012-5534
The hook_process function in the plugin API for WeeChat 0.3.0 through 0.3.9.1 allows remote attackers to execute arbitrary commands via shell metacharacters in a command from a plugin, related to "shell expansion."
https://nvd.nist.gov/vuln/detail/CVE-2012-5534
213,490
ImageMagick6
6ce6d25b47caf9b6b2979a510b6202ce0f3dd2d4
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/6ce6d25b47caf9b6b2979a510b6202ce0f3dd2d4
https://github.com/ImageMagick/ImageMagick/issues/1195
1
static Image *XMagickCommand(Display *display,XResourceInfo *resource_info, XWindows *windows,const CommandType command_type,Image **image, MagickStatusType *state) { Image *nexus; MagickBooleanType proceed; MagickStatusType status; XTextProperty window_name; /* Process user comman...
231,625,559,286,305,350,000,000,000,000,000,000,000
animate.c
178,078,632,815,084,070,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2018-13153
In ImageMagick 7.0.8-4, there is a memory leak in the XMagickCommand function in MagickCore/animate.c.
https://nvd.nist.gov/vuln/detail/CVE-2018-13153
471,587
ImageMagick6
6ce6d25b47caf9b6b2979a510b6202ce0f3dd2d4
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/6ce6d25b47caf9b6b2979a510b6202ce0f3dd2d4
https://github.com/ImageMagick/ImageMagick/issues/1195
0
static Image *XMagickCommand(Display *display,XResourceInfo *resource_info, XWindows *windows,const CommandType command_type,Image **image, MagickStatusType *state) { Image *nexus; MagickBooleanType proceed; MagickStatusType status; XTextProperty window_name; /* Process user comman...
275,405,940,642,860,300,000,000,000,000,000,000,000
animate.c
195,559,166,946,166,660,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2018-13153
In ImageMagick 7.0.8-4, there is a memory leak in the XMagickCommand function in MagickCore/animate.c.
https://nvd.nist.gov/vuln/detail/CVE-2018-13153
213,494
php-src
8d3dfabef459fe7815e8ea2fd68753fd17859d7b
https://github.com/php/php-src
http://git.php.net/?p=php-src.git;a=commit;h=8d3dfabef459fe7815e8ea2fd68753fd17859d7b
Fix #77369 - memcpy with negative length via crafted DNS response
1
static u_char *php_parserr(u_char *cp, u_char *end, querybuf *answer, int type_to_fetch, int store, int raw, zval *subarray) { u_short type, class, dlen; u_long ttl; long n, i; u_short s; u_char *tp, *p; char name[MAXHOSTNAMELEN]; int have_v6_break = 0, in_v6_break = 0; ZVAL_UNDEF(subarray); n = dn_expand(an...
3,293,586,128,173,186,600,000,000,000,000,000,000
dns.c
79,767,520,775,608,475,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-9022
An issue was discovered in PHP 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.2. dns_get_record misparses a DNS response, which can allow a hostile DNS server to cause PHP to misuse memcpy, leading to read operations going past the buffer allocated for DNS data. This affects php_parserr in ext/standard/dn...
https://nvd.nist.gov/vuln/detail/CVE-2019-9022
471,594
php-src
8d3dfabef459fe7815e8ea2fd68753fd17859d7b
https://github.com/php/php-src
http://git.php.net/?p=php-src.git;a=commit;h=8d3dfabef459fe7815e8ea2fd68753fd17859d7b
Fix #77369 - memcpy with negative length via crafted DNS response
0
static u_char *php_parserr(u_char *cp, u_char *end, querybuf *answer, int type_to_fetch, int store, int raw, zval *subarray) { u_short type, class, dlen; u_long ttl; long n, i; u_short s; u_char *tp, *p; char name[MAXHOSTNAMELEN]; int have_v6_break = 0, in_v6_break = 0; ZVAL_UNDEF(subarray); n = dn_expand(an...
122,246,461,383,970,770,000,000,000,000,000,000,000
dns.c
95,404,559,781,527,680,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-9022
An issue was discovered in PHP 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.2. dns_get_record misparses a DNS response, which can allow a hostile DNS server to cause PHP to misuse memcpy, leading to read operations going past the buffer allocated for DNS data. This affects php_parserr in ext/standard/dn...
https://nvd.nist.gov/vuln/detail/CVE-2019-9022
213,497
ImageMagick6
3b28c8d93aa469f6d90c8b3c05fe3d88c2584e32
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/3b28c8d93aa469f6d90c8b3c05fe3d88c2584e32
https://github.com/ImageMagick/ImageMagick/issues/1454
1
static MagickBooleanType WritePDFImage(const ImageInfo *image_info,Image *image) { #define CFormat "/Filter [ /%s ]\n" #define ObjectsPerImage 14 #define ThrowPDFException(exception,message) \ { \ if (xref != (MagickOffsetType *) NULL) \ xref=(MagickOffsetType *) RelinquishMagickMemory(xref); \ ThrowWriterExc...
88,025,508,075,805,540,000,000,000,000,000,000,000
pdf.c
141,426,464,685,344,450,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2019-7397
In ImageMagick before 7.0.8-25 and GraphicsMagick through 1.3.31, several memory leaks exist in WritePDFImage in coders/pdf.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-7397
471,613
ImageMagick6
3b28c8d93aa469f6d90c8b3c05fe3d88c2584e32
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/3b28c8d93aa469f6d90c8b3c05fe3d88c2584e32
https://github.com/ImageMagick/ImageMagick/issues/1454
0
static MagickBooleanType WritePDFImage(const ImageInfo *image_info,Image *image) { #define CFormat "/Filter [ /%s ]\n" #define ObjectsPerImage 14 #define ThrowPDFException(exception,message) \ { \ if (xref != (MagickOffsetType *) NULL) \ xref=(MagickOffsetType *) RelinquishMagickMemory(xref); \ ThrowWriterExc...
180,808,065,955,658,600,000,000,000,000,000,000,000
pdf.c
210,889,938,189,627,700,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2019-7397
In ImageMagick before 7.0.8-25 and GraphicsMagick through 1.3.31, several memory leaks exist in WritePDFImage in coders/pdf.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-7397
213,501
OpenSC
6903aebfddc466d966c7b865fae34572bf3ed23e
https://github.com/OpenSC/OpenSC
https://github.com/OpenSC/OpenSC/commit/6903aebfddc466d966c7b865fae34572bf3ed23e
Heap-buffer-overflow WRITE fixes https://oss-fuzz.com/testcase-detail/5088104168554496
1
sc_oberthur_read_file(struct sc_pkcs15_card *p15card, const char *in_path, unsigned char **out, size_t *out_len, int verify_pin) { struct sc_context *ctx = p15card->card->ctx; struct sc_card *card = p15card->card; struct sc_file *file = NULL; struct sc_path path; size_t sz; int rv; LOG_FUNC_CALLED(ctx); if...
284,226,323,771,564,550,000,000,000,000,000,000,000
pkcs15-oberthur.c
215,493,386,958,330,340,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2020-26570
The Oberthur smart card software driver in OpenSC before 0.21.0-rc1 has a heap-based buffer overflow in sc_oberthur_read_file.
https://nvd.nist.gov/vuln/detail/CVE-2020-26570
471,690
OpenSC
6903aebfddc466d966c7b865fae34572bf3ed23e
https://github.com/OpenSC/OpenSC
https://github.com/OpenSC/OpenSC/commit/6903aebfddc466d966c7b865fae34572bf3ed23e
Heap-buffer-overflow WRITE fixes https://oss-fuzz.com/testcase-detail/5088104168554496
0
sc_oberthur_read_file(struct sc_pkcs15_card *p15card, const char *in_path, unsigned char **out, size_t *out_len, int verify_pin) { struct sc_context *ctx = p15card->card->ctx; struct sc_card *card = p15card->card; struct sc_file *file = NULL; struct sc_path path; size_t sz; int rv; LOG_FUNC_CALLED(ctx); if...
13,652,587,171,142,750,000,000,000,000,000,000,000
pkcs15-oberthur.c
284,191,403,346,903,100,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2020-26570
The Oberthur smart card software driver in OpenSC before 0.21.0-rc1 has a heap-based buffer overflow in sc_oberthur_read_file.
https://nvd.nist.gov/vuln/detail/CVE-2020-26570
213,504
ImageMagick
b4dd4d266f2d450a2996abf5294671d888991132
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/b4dd4d266f2d450a2996abf5294671d888991132
https://github.com/ImageMagick/ImageMagick/issues/1515
1
static Image *ReadPANGOImage(const ImageInfo *image_info, ExceptionInfo *exception) { cairo_font_options_t *font_options; cairo_surface_t *surface; char *caption, *property; cairo_t *cairo_image; const char *option; DrawInfo *draw_info; Image *image; MagickBoolea...
157,574,486,678,839,000,000,000,000,000,000,000,000
pango.c
20,337,442,773,612,117,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2019-12974
A NULL pointer dereference in the function ReadPANGOImage in coders/pango.c and the function ReadVIDImage in coders/vid.c in ImageMagick 7.0.8-34 allows remote attackers to cause a denial of service via a crafted image.
https://nvd.nist.gov/vuln/detail/CVE-2019-12974
471,751
ImageMagick
b4dd4d266f2d450a2996abf5294671d888991132
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/b4dd4d266f2d450a2996abf5294671d888991132
https://github.com/ImageMagick/ImageMagick/issues/1515
0
static Image *ReadPANGOImage(const ImageInfo *image_info, ExceptionInfo *exception) { cairo_font_options_t *font_options; cairo_surface_t *surface; char *caption, *property; cairo_t *cairo_image; const char *option; DrawInfo *draw_info; Image *image; MagickBoolea...
259,439,766,290,244,150,000,000,000,000,000,000,000
pango.c
214,869,999,186,747,640,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2019-12974
A NULL pointer dereference in the function ReadPANGOImage in coders/pango.c and the function ReadVIDImage in coders/vid.c in ImageMagick 7.0.8-34 allows remote attackers to cause a denial of service via a crafted image.
https://nvd.nist.gov/vuln/detail/CVE-2019-12974
213,505
ImageMagick
b4dd4d266f2d450a2996abf5294671d888991132
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/b4dd4d266f2d450a2996abf5294671d888991132
https://github.com/ImageMagick/ImageMagick/issues/1515
1
static Image *ReadVIDImage(const ImageInfo *image_info,ExceptionInfo *exception) { #define ClientName "montage" char **filelist, *label, **list; Image *image, *images, *montage_image, *next_image, *thumbnail_image; ImageInfo *read_info; int number_files; MagickBoo...
68,895,088,797,636,250,000,000,000,000,000,000,000
vid.c
245,904,898,213,529,720,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2019-12974
A NULL pointer dereference in the function ReadPANGOImage in coders/pango.c and the function ReadVIDImage in coders/vid.c in ImageMagick 7.0.8-34 allows remote attackers to cause a denial of service via a crafted image.
https://nvd.nist.gov/vuln/detail/CVE-2019-12974
471,750
ImageMagick
b4dd4d266f2d450a2996abf5294671d888991132
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/b4dd4d266f2d450a2996abf5294671d888991132
https://github.com/ImageMagick/ImageMagick/issues/1515
0
static Image *ReadVIDImage(const ImageInfo *image_info,ExceptionInfo *exception) { #define ClientName "montage" char **filelist, *label, **list; Image *image, *images, *montage_image, *next_image, *thumbnail_image; ImageInfo *read_info; int number_files; MagickBoo...
134,928,637,765,032,500,000,000,000,000,000,000,000
vid.c
216,721,314,985,940,500,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2019-12974
A NULL pointer dereference in the function ReadPANGOImage in coders/pango.c and the function ReadVIDImage in coders/vid.c in ImageMagick 7.0.8-34 allows remote attackers to cause a denial of service via a crafted image.
https://nvd.nist.gov/vuln/detail/CVE-2019-12974
213,512
qemu
5311fb805a4403bba024e83886fa0e7572265de4
https://github.com/bonzini/qemu
https://git.qemu.org/?p=qemu.git;a=commit;h=5311fb805a4403bba024e83886fa0e7572265de4
rtl8139: switch to use qemu_receive_packet() for loopback This patch switches to use qemu_receive_packet() which can detect reentrancy and return early. This is intended to address CVE-2021-3416. Cc: Prasad J Pandit <ppandit@redhat.com> Cc: qemu-stable@nongnu.org Buglink: https://bugs.launchpad.net/qemu/+bug/1910826...
1
static void rtl8139_transfer_frame(RTL8139State *s, uint8_t *buf, int size, int do_interrupt, const uint8_t *dot1q_buf) { struct iovec *iov = NULL; struct iovec vlan_iov[3]; if (!size) { DPRINTF("+++ empty ethernet frame\n"); return; } if (dot1q_buf && size >= ETH_ALEN * 2)...
72,207,073,610,620,290,000,000,000,000,000,000,000
rtl8139.c
32,305,688,755,596,744,000,000,000,000,000,000,000
[ "CWE-835" ]
CVE-2021-3416
A potential stack overflow via infinite loop issue was found in various NIC emulators of QEMU in versions up to and including 5.2.0. The issue occurs in loopback mode of a NIC wherein reentrant DMA checks get bypassed. A guest user/process may use this flaw to consume CPU cycles or crash the QEMU process on the host re...
https://nvd.nist.gov/vuln/detail/CVE-2021-3416
471,854
qemu
5311fb805a4403bba024e83886fa0e7572265de4
https://github.com/bonzini/qemu
https://git.qemu.org/?p=qemu.git;a=commit;h=5311fb805a4403bba024e83886fa0e7572265de4
rtl8139: switch to use qemu_receive_packet() for loopback This patch switches to use qemu_receive_packet() which can detect reentrancy and return early. This is intended to address CVE-2021-3416. Cc: Prasad J Pandit <ppandit@redhat.com> Cc: qemu-stable@nongnu.org Buglink: https://bugs.launchpad.net/qemu/+bug/1910826...
0
static void rtl8139_transfer_frame(RTL8139State *s, uint8_t *buf, int size, int do_interrupt, const uint8_t *dot1q_buf) { struct iovec *iov = NULL; struct iovec vlan_iov[3]; if (!size) { DPRINTF("+++ empty ethernet frame\n"); return; } if (dot1q_buf && size >= ETH_ALEN * 2)...
67,590,111,060,286,450,000,000,000,000,000,000,000
rtl8139.c
334,777,128,529,716,000,000,000,000,000,000,000,000
[ "CWE-835" ]
CVE-2021-3416
A potential stack overflow via infinite loop issue was found in various NIC emulators of QEMU in versions up to and including 5.2.0. The issue occurs in loopback mode of a NIC wherein reentrant DMA checks get bypassed. A guest user/process may use this flaw to consume CPU cycles or crash the QEMU process on the host re...
https://nvd.nist.gov/vuln/detail/CVE-2021-3416
213,543
ImageMagick
cdafbc753cf794160eb53b320d4bc0b36ba6ed1d
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/cdafbc753cf794160eb53b320d4bc0b36ba6ed1d
Fix moment when quantum info is acquired to fix issue reported in #469.
1
static Image *ReadMATImage(const ImageInfo *image_info,ExceptionInfo *exception) { Image *image, *image2=NULL, *rotated_image; register Quantum *q; unsigned int status; MATHeader MATLAB_HDR; size_t size; size_t CellType; QuantumInfo *quantum_info; ImageInfo *clone_info; int i; ssize_t ldblk; u...
322,785,602,229,547,300,000,000,000,000,000,000,000
mat.c
322,862,768,624,585,500,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2017-11141
The ReadMATImage function in coders\mat.c in ImageMagick 7.0.5-6 has a memory leak vulnerability that can cause memory exhaustion via a crafted MAT file, related to incorrect ordering of a SetImageExtent call.
https://nvd.nist.gov/vuln/detail/CVE-2017-11141
472,351
ImageMagick
cdafbc753cf794160eb53b320d4bc0b36ba6ed1d
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/cdafbc753cf794160eb53b320d4bc0b36ba6ed1d
Fix moment when quantum info is acquired to fix issue reported in #469.
0
static Image *ReadMATImage(const ImageInfo *image_info,ExceptionInfo *exception) { Image *image, *image2=NULL, *rotated_image; register Quantum *q; unsigned int status; MATHeader MATLAB_HDR; size_t size; size_t CellType; QuantumInfo *quantum_info; ImageInfo *clone_info; int i; ssize_t ldblk; u...
154,792,796,937,169,150,000,000,000,000,000,000,000
mat.c
57,178,113,443,917,655,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2017-11141
The ReadMATImage function in coders\mat.c in ImageMagick 7.0.5-6 has a memory leak vulnerability that can cause memory exhaustion via a crafted MAT file, related to incorrect ordering of a SetImageExtent call.
https://nvd.nist.gov/vuln/detail/CVE-2017-11141
213,549
ImageMagick
82775af03bbb10a0a1d0e15c0156c75673b4525e
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/82775af03bbb10a0a1d0e15c0156c75673b4525e
Moved the free to the correct position to fix #4446.
1
static Image *ReadDCMImage(const ImageInfo *image_info,ExceptionInfo *exception) { #define ThrowDCMException(exception,message) \ { \ RelinquishDCMMemory(&info,&map,stream_info,stack,data); \ ThrowReaderException((exception),(message)); \ } char explicit_vr[MagickPathExtent], implicit_vr[MagickPathExtent...
152,411,006,144,091,710,000,000,000,000,000,000,000
dcm.c
64,543,759,851,391,670,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2021-3962
A flaw was found in ImageMagick where it did not properly sanitize certain input before using it to invoke convert processes. This flaw allows an attacker to create a specially crafted image that leads to a use-after-free vulnerability when processed by ImageMagick. The highest threat from this vulnerability is to conf...
https://nvd.nist.gov/vuln/detail/CVE-2021-3962
472,380
ImageMagick
82775af03bbb10a0a1d0e15c0156c75673b4525e
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/82775af03bbb10a0a1d0e15c0156c75673b4525e
Moved the free to the correct position to fix #4446.
0
static Image *ReadDCMImage(const ImageInfo *image_info,ExceptionInfo *exception) { #define ThrowDCMException(exception,message) \ { \ RelinquishDCMMemory(&info,&map,stream_info,stack,data); \ ThrowReaderException((exception),(message)); \ } char explicit_vr[MagickPathExtent], implicit_vr[MagickPathExtent...
238,512,405,059,643,860,000,000,000,000,000,000,000
dcm.c
129,507,672,840,650,240,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2021-3962
A flaw was found in ImageMagick where it did not properly sanitize certain input before using it to invoke convert processes. This flaw allows an attacker to create a specially crafted image that leads to a use-after-free vulnerability when processed by ImageMagick. The highest threat from this vulnerability is to conf...
https://nvd.nist.gov/vuln/detail/CVE-2021-3962
213,554
exim
57aa14b216432be381b6295c312065b2fd034f86
https://github.com/Exim/exim
https://git.exim.org/exim.git/commit/57aa14b216432be381b6295c312065b2fd034f86
Fix SPA authenticator, checking client-supplied data before using it. Bug 2571
1
spa_base64_to_bits (char *out, int outlength, const char *in) /* base 64 to raw bytes in quasi-big-endian order, returning count of bytes */ { int len = 0; register uschar digit1, digit2, digit3, digit4; if (in[0] == '+' && in[1] == ' ') in += 2; if (*in == '\r') return (0); do { if (len >...
237,185,534,796,488,830,000,000,000,000,000,000,000
auth-spa.c
300,505,394,568,130,620,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2020-12783
Exim through 4.93 has an out-of-bounds read in the SPA authenticator that could result in SPA/NTLM authentication bypass in auths/spa.c and auths/auth-spa.c.
https://nvd.nist.gov/vuln/detail/CVE-2020-12783
472,432
exim
57aa14b216432be381b6295c312065b2fd034f86
https://github.com/Exim/exim
https://git.exim.org/exim.git/commit/57aa14b216432be381b6295c312065b2fd034f86
Fix SPA authenticator, checking client-supplied data before using it. Bug 2571
0
spa_base64_to_bits (char *out, int outlength, const char *in) /* base 64 to raw bytes in quasi-big-endian order, returning count of bytes */ { int len = 0; uschar digit1, digit2, digit3, digit4; if (in[0] == '+' && in[1] == ' ') in += 2; if (*in == '\r') return (0); do { if (len >= outlength) ...
195,963,974,858,701,400,000,000,000,000,000,000,000
auth-spa.c
305,015,162,195,146,430,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2020-12783
Exim through 4.93 has an out-of-bounds read in the SPA authenticator that could result in SPA/NTLM authentication bypass in auths/spa.c and auths/auth-spa.c.
https://nvd.nist.gov/vuln/detail/CVE-2020-12783
213,555
poppler
6912e06d9ab19ba28991b5cab3319d61d856bd6d
https://github.com/freedesktop/poppler
https://gitlab.freedesktop.org/poppler/poppler/commit/6912e06d9ab19ba28991b5cab3319d61d856bd6d
Check for stream before calling stream methods when saving an embedded file. Closes #659
1
bool EmbFile::save2(FILE *f) { int c; m_objStr.streamReset(); while ((c = m_objStr.streamGetChar()) != EOF) { fputc(c, f); } return true; }
37,480,662,750,013,023,000,000,000,000,000,000,000
FileSpec.cc
1,216,643,450,320,484,300,000,000,000,000,000,000
[ "CWE-670" ]
CVE-2018-19058
An issue was discovered in Poppler 0.71.0. There is a reachable abort in Object.h, will lead to denial of service because EmbFile::save2 in FileSpec.cc lacks a stream check before saving an embedded file.
https://nvd.nist.gov/vuln/detail/CVE-2018-19058
472,456
poppler
6912e06d9ab19ba28991b5cab3319d61d856bd6d
https://github.com/freedesktop/poppler
https://gitlab.freedesktop.org/poppler/poppler/commit/6912e06d9ab19ba28991b5cab3319d61d856bd6d
Check for stream before calling stream methods when saving an embedded file. Closes #659
0
bool EmbFile::save2(FILE *f) { int c; if (unlikely(!m_objStr.isStream())) return false; m_objStr.streamReset(); while ((c = m_objStr.streamGetChar()) != EOF) { fputc(c, f); } return true; }
106,567,490,530,378,730,000,000,000,000,000,000,000
FileSpec.cc
252,608,428,506,705,800,000,000,000,000,000,000,000
[ "CWE-670" ]
CVE-2018-19058
An issue was discovered in Poppler 0.71.0. There is a reachable abort in Object.h, will lead to denial of service because EmbFile::save2 in FileSpec.cc lacks a stream check before saving an embedded file.
https://nvd.nist.gov/vuln/detail/CVE-2018-19058
213,565
libxml2
1098c30a040e72a4654968547f415be4e4c40fe7
https://github.com/GNOME/libxml2
https://gitlab.gnome.org/GNOME/libxml2/-/commit/1098c30a040e72a4654968547f415be4e4c40fe7
Fix user-after-free with `xmllint --xinclude --dropdtd` The --dropdtd option can leave dangling pointers in entity reference nodes. Make sure to skip these nodes when processing XIncludes. This also avoids scanning entity declarations and even modifying them inadvertently during XInclude processing. Move from a bloc...
1
xmlXIncludeDoProcess(xmlXIncludeCtxtPtr ctxt, xmlDocPtr doc, xmlNodePtr tree, int skipRoot) { xmlNodePtr cur; int ret = 0; int i, start; if ((doc == NULL) || (tree == NULL) || (tree->type == XML_NAMESPACE_DECL)) return(-1); if ((skipRoot) && (tree->children == NULL)) r...
60,088,334,142,086,320,000,000,000,000,000,000,000
None
null
[ "CWE-416" ]
CVE-2021-3518
There's a flaw in libxml2 in versions before 2.9.11. An attacker who is able to submit a crafted file to be processed by an application linked with libxml2 could trigger a use-after-free. The greatest impact from this flaw is to confidentiality, integrity, and availability.
https://nvd.nist.gov/vuln/detail/CVE-2021-3518
472,640
libxml2
1098c30a040e72a4654968547f415be4e4c40fe7
https://github.com/GNOME/libxml2
https://gitlab.gnome.org/GNOME/libxml2/-/commit/1098c30a040e72a4654968547f415be4e4c40fe7
Fix user-after-free with `xmllint --xinclude --dropdtd` The --dropdtd option can leave dangling pointers in entity reference nodes. Make sure to skip these nodes when processing XIncludes. This also avoids scanning entity declarations and even modifying them inadvertently during XInclude processing. Move from a bloc...
0
xmlXIncludeDoProcess(xmlXIncludeCtxtPtr ctxt, xmlDocPtr doc, xmlNodePtr tree, int skipRoot) { xmlNodePtr cur; int ret = 0; int i, start; if ((doc == NULL) || (tree == NULL) || (tree->type == XML_NAMESPACE_DECL)) return(-1); if ((skipRoot) && (tree->children == NULL)) r...
65,202,183,450,373,480,000,000,000,000,000,000,000
None
null
[ "CWE-416" ]
CVE-2021-3518
There's a flaw in libxml2 in versions before 2.9.11. An attacker who is able to submit a crafted file to be processed by an application linked with libxml2 could trigger a use-after-free. The greatest impact from this flaw is to confidentiality, integrity, and availability.
https://nvd.nist.gov/vuln/detail/CVE-2021-3518
213,575
w3m
ec99f186380d26ebf791569fdbc56dae60632365
https://github.com/tats/w3m
https://github.com/tats/w3m/commit/ec99f186380d26ebf791569fdbc56dae60632365
Prevent deref null pointer in renderCoTable() Bug-Debian: https://github.com/tats/w3m/issues/20#issuecomment-260649537
1
renderCoTable(struct table *tbl, int maxlimit) { struct readbuffer obuf; struct html_feed_environ h_env; struct environment envs[MAX_ENV_LEVEL]; struct table *t; int i, col, row; int indent, maxwidth; if (cotable_level >= MAX_COTABLE_LEVEL) return; /* workaround to prevent infinite recursi...
60,354,451,208,936,110,000,000,000,000,000,000,000
table.c
121,346,523,427,799,540,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-9439
An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. Infinite recursion vulnerability in w3m allows remote attackers to cause a denial of service via a crafted HTML page.
https://nvd.nist.gov/vuln/detail/CVE-2016-9439
77,512
w3m
8354763b90490d4105695df52674d0fcef823e92
https://github.com/tats/w3m
https://github.com/tats/w3m/commit/8354763b90490d4105695df52674d0fcef823e92
Prevent negative indent value in feed_table_block_tag() Bug-Debian: https://github.com/tats/w3m/issues/88
0
renderCoTable(struct table *tbl, int maxlimit) { struct readbuffer obuf; struct html_feed_environ h_env; struct environment envs[MAX_ENV_LEVEL]; struct table *t; int i, col, row; int indent, maxwidth; if (cotable_level >= MAX_COTABLE_LEVEL) return; /* workaround to prevent infinite recursi...
222,685,405,032,719,630,000,000,000,000,000,000,000
table.c
245,558,100,729,634,500,000,000,000,000,000,000,000
[ "CWE-835" ]
CVE-2018-6196
w3m through 0.5.3 is prone to an infinite recursion flaw in HTMLlineproc0 because the feed_table_block_tag function in table.c does not prevent a negative indent value.
https://nvd.nist.gov/vuln/detail/CVE-2018-6196
213,576
linux
d88d05a9e0b6d9356e97129d4ff9942d765f46ea
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d88d05a9e0b6d9356e97129d4ff9942d765f46ea
perf/x86/intel: Fix a crash caused by zero PEBS status A repeatable crash can be triggered by the perf_fuzzer on some Haswell system. https://lore.kernel.org/lkml/7170d3b-c17f-1ded-52aa-cc6d9ae999f4@maine.edu/ For some old CPUs (HSW and earlier), the PEBS status in a PEBS record may be mistakenly set to 0. To minimiz...
1
static void intel_pmu_drain_pebs_nhm(struct pt_regs *iregs, struct perf_sample_data *data) { struct cpu_hw_events *cpuc = this_cpu_ptr(&cpu_hw_events); struct debug_store *ds = cpuc->ds; struct perf_event *event; void *base, *at, *top; short counts[INTEL_PMC_IDX_FIXED + MAX_FIXED_PEBS_EVENTS] = {}; short error[IN...
230,068,121,129,011,770,000,000,000,000,000,000,000
ds.c
163,530,062,800,110,760,000,000,000,000,000,000,000
[ "CWE-755" ]
CVE-2021-28971
In intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c in the Linux kernel through 5.11.8 on some Haswell CPUs, userspace applications (such as perf-fuzzer) can cause a system crash because the PEBS status in a PEBS record is mishandled, aka CID-d88d05a9e0b6.
https://nvd.nist.gov/vuln/detail/CVE-2021-28971
472,730
linux
d88d05a9e0b6d9356e97129d4ff9942d765f46ea
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d88d05a9e0b6d9356e97129d4ff9942d765f46ea
perf/x86/intel: Fix a crash caused by zero PEBS status A repeatable crash can be triggered by the perf_fuzzer on some Haswell system. https://lore.kernel.org/lkml/7170d3b-c17f-1ded-52aa-cc6d9ae999f4@maine.edu/ For some old CPUs (HSW and earlier), the PEBS status in a PEBS record may be mistakenly set to 0. To minimiz...
0
static void intel_pmu_drain_pebs_nhm(struct pt_regs *iregs, struct perf_sample_data *data) { struct cpu_hw_events *cpuc = this_cpu_ptr(&cpu_hw_events); struct debug_store *ds = cpuc->ds; struct perf_event *event; void *base, *at, *top; short counts[INTEL_PMC_IDX_FIXED + MAX_FIXED_PEBS_EVENTS] = {}; short error[IN...
331,413,978,690,293,400,000,000,000,000,000,000,000
ds.c
148,274,065,210,325,240,000,000,000,000,000,000,000
[ "CWE-755" ]
CVE-2021-28971
In intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c in the Linux kernel through 5.11.8 on some Haswell CPUs, userspace applications (such as perf-fuzzer) can cause a system crash because the PEBS status in a PEBS record is mishandled, aka CID-d88d05a9e0b6.
https://nvd.nist.gov/vuln/detail/CVE-2021-28971
213,578
matio
a47b7cd3aca70e9a0bddf8146eb4ab0cbd19c2c3
https://github.com/tbeu/matio
https://github.com/tbeu/matio/commit/a47b7cd3aca70e9a0bddf8146eb4ab0cbd19c2c3
Fix memory leak As reported by https://github.com/tbeu/matio/issues/131
1
int SafeMulDims(const matvar_t *matvar, size_t* nelems) { int i; for ( i = 0; i < matvar->rank; i++ ) { if ( !psnip_safe_size_mul(nelems, *nelems, matvar->dims[i]) ) { *nelems = 0; return 1; } } return 0; }
34,560,980,269,596,383,000,000,000,000,000,000,000
mat.c
317,137,441,251,099,700,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2019-20052
A memory leak was discovered in Mat_VarCalloc in mat.c in matio 1.5.17 because SafeMulDims does not consider the rank==0 case.
https://nvd.nist.gov/vuln/detail/CVE-2019-20052
472,751
matio
a47b7cd3aca70e9a0bddf8146eb4ab0cbd19c2c3
https://github.com/tbeu/matio
https://github.com/tbeu/matio/commit/a47b7cd3aca70e9a0bddf8146eb4ab0cbd19c2c3
Fix memory leak As reported by https://github.com/tbeu/matio/issues/131
0
int SafeMulDims(const matvar_t *matvar, size_t* nelems) { int i; if ( matvar->rank == 0 ) { *nelems = 0; return 0; } for ( i = 0; i < matvar->rank; i++ ) { if ( !psnip_safe_size_mul(nelems, *nelems, matvar->dims[i]) ) { *nelems = 0; return 1; } ...
96,815,473,635,657,700,000,000,000,000,000,000,000
mat.c
247,905,794,402,579,100,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2019-20052
A memory leak was discovered in Mat_VarCalloc in mat.c in matio 1.5.17 because SafeMulDims does not consider the rank==0 case.
https://nvd.nist.gov/vuln/detail/CVE-2019-20052
213,580
ImageMagick
29cee9152d1b5487cfd19443ca48935eea0cabe2
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/29cee9152d1b5487cfd19443ca48935eea0cabe2
https://github.com/ImageMagick/ImageMagick/issues/1743
1
static double ApplyEvaluateOperator(RandomInfo *random_info,const Quantum pixel, const MagickEvaluateOperator op,const double value) { double result; result=0.0; switch (op) { case UndefinedEvaluateOperator: break; case AbsEvaluateOperator: { result=(double) fabs((double) (pixel+v...
286,455,759,219,391,500,000,000,000,000,000,000,000
statistic.c
318,583,235,116,667,640,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2020-27774
A flaw was found in ImageMagick in MagickCore/statistic.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of a too large shift for 64-bit type `ssize_t`. This would most likely lead to an impact to application availability, but could potentially caus...
https://nvd.nist.gov/vuln/detail/CVE-2020-27774
472,798
ImageMagick
29cee9152d1b5487cfd19443ca48935eea0cabe2
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/29cee9152d1b5487cfd19443ca48935eea0cabe2
https://github.com/ImageMagick/ImageMagick/issues/1743
0
static double ApplyEvaluateOperator(RandomInfo *random_info,const Quantum pixel, const MagickEvaluateOperator op,const double value) { double result; register ssize_t i; result=0.0; switch (op) { case UndefinedEvaluateOperator: break; case AbsEvaluateOperator: { result=(dou...
180,939,333,290,287,200,000,000,000,000,000,000,000
statistic.c
300,066,298,801,738,560,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2020-27774
A flaw was found in ImageMagick in MagickCore/statistic.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of a too large shift for 64-bit type `ssize_t`. This would most likely lead to an impact to application availability, but could potentially caus...
https://nvd.nist.gov/vuln/detail/CVE-2020-27774
213,587
linux
342db04ae71273322f0011384a9ed414df8bdae4
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=342db04ae71273322f0011384a9ed414df8bdae4
x86/dumpstack: Don't dump kernel memory based on usermode RIP show_opcodes() is used both for dumping kernel instructions and for dumping user instructions. If userspace causes #PF by jumping to a kernel address, show_opcodes() can be reached with regs->ip controlled by the user, pointing to kernel code. Make sure th...
1
void show_opcodes(u8 *rip, const char *loglvl) { #define PROLOGUE_SIZE 42 #define EPILOGUE_SIZE 21 #define OPCODE_BUFSIZE (PROLOGUE_SIZE + 1 + EPILOGUE_SIZE) u8 opcodes[OPCODE_BUFSIZE]; if (probe_kernel_read(opcodes, rip - PROLOGUE_SIZE, OPCODE_BUFSIZE)) { printk("%sCode: Bad RIP value.\n", loglvl); } else { pr...
45,691,453,130,485,270,000,000,000,000,000,000,000
dumpstack.c
107,842,985,191,482,380,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2018-14656
A missing address check in the callers of the show_opcodes() in the Linux kernel allows an attacker to dump the kernel memory at an arbitrary kernel address into the dmesg log.
https://nvd.nist.gov/vuln/detail/CVE-2018-14656
472,824
linux
342db04ae71273322f0011384a9ed414df8bdae4
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=342db04ae71273322f0011384a9ed414df8bdae4
x86/dumpstack: Don't dump kernel memory based on usermode RIP show_opcodes() is used both for dumping kernel instructions and for dumping user instructions. If userspace causes #PF by jumping to a kernel address, show_opcodes() can be reached with regs->ip controlled by the user, pointing to kernel code. Make sure th...
0
void show_opcodes(struct pt_regs *regs, const char *loglvl) { #define PROLOGUE_SIZE 42 #define EPILOGUE_SIZE 21 #define OPCODE_BUFSIZE (PROLOGUE_SIZE + 1 + EPILOGUE_SIZE) u8 opcodes[OPCODE_BUFSIZE]; unsigned long prologue = regs->ip - PROLOGUE_SIZE; bool bad_ip; /* * Make sure userspace isn't trying to trick us ...
285,790,535,610,754,430,000,000,000,000,000,000,000
dumpstack.c
183,194,423,419,429,720,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2018-14656
A missing address check in the callers of the show_opcodes() in the Linux kernel allows an attacker to dump the kernel memory at an arbitrary kernel address into the dmesg log.
https://nvd.nist.gov/vuln/detail/CVE-2018-14656
213,602
linux
28d76df18f0ad5bcf5fa48510b225f0ed262a99b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/28d76df18f0ad5bcf5fa48510b225f0ed262a99b
scsi: mptfusion: Fix double fetch bug in ioctl Tom Hatskevich reported that we look up "iocp" then, in the called functions we do a second copy_from_user() and look it up again. The problem that could cause is: drivers/message/fusion/mptctl.c 674 /* All of these commands require an interrupt or 675 ...
1
__mptctl_ioctl(struct file *file, unsigned int cmd, unsigned long arg) { mpt_ioctl_header __user *uhdr = (void __user *) arg; mpt_ioctl_header khdr; int iocnum; unsigned iocnumX; int nonblock = (file->f_flags & O_NONBLOCK); int ret; MPT_ADAPTER *iocp = NULL; if (copy_from_user(&khdr, uhdr, sizeof(khdr))) { ...
134,132,948,041,821,770,000,000,000,000,000,000,000
mptctl.c
157,635,789,441,522,630,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2020-12652
The __mptctl_ioctl function in drivers/message/fusion/mptctl.c in the Linux kernel before 5.4.14 allows local users to hold an incorrect lock during the ioctl operation and trigger a race condition, i.e., a "double fetch" vulnerability, aka CID-28d76df18f0a. NOTE: the vendor states "The security impact of this bug is n...
https://nvd.nist.gov/vuln/detail/CVE-2020-12652
472,870
linux
28d76df18f0ad5bcf5fa48510b225f0ed262a99b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/28d76df18f0ad5bcf5fa48510b225f0ed262a99b
scsi: mptfusion: Fix double fetch bug in ioctl Tom Hatskevich reported that we look up "iocp" then, in the called functions we do a second copy_from_user() and look it up again. The problem that could cause is: drivers/message/fusion/mptctl.c 674 /* All of these commands require an interrupt or 675 ...
0
__mptctl_ioctl(struct file *file, unsigned int cmd, unsigned long arg) { mpt_ioctl_header __user *uhdr = (void __user *) arg; mpt_ioctl_header khdr; int iocnum; unsigned iocnumX; int nonblock = (file->f_flags & O_NONBLOCK); int ret; MPT_ADAPTER *iocp = NULL; if (copy_from_user(&khdr, uhdr, sizeof(khdr))) { ...
252,742,897,056,713,730,000,000,000,000,000,000,000
mptctl.c
150,674,889,625,019,520,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2020-12652
The __mptctl_ioctl function in drivers/message/fusion/mptctl.c in the Linux kernel before 5.4.14 allows local users to hold an incorrect lock during the ioctl operation and trigger a race condition, i.e., a "double fetch" vulnerability, aka CID-28d76df18f0a. NOTE: the vendor states "The security impact of this bug is n...
https://nvd.nist.gov/vuln/detail/CVE-2020-12652
213,609
FreeRDP
17f547ae11835bb11baa3d045245dc1694866845
https://github.com/FreeRDP/FreeRDP
https://github.com/FreeRDP/FreeRDP/commit/17f547ae11835bb11baa3d045245dc1694866845
Fixed CVE-2020-11521: Out of bounds write in planar codec. Thanks to Sunglin and HuanGMz from Knownsec 404
1
static INLINE INT32 planar_skip_plane_rle(const BYTE* pSrcData, UINT32 SrcSize, UINT32 nWidth, UINT32 nHeight) { UINT32 x, y; BYTE controlByte; const BYTE* pRLE = pSrcData; const BYTE* pEnd = &pSrcData[SrcSize]; for (y = 0; y < nHeight; y++) { for (x = 0; x < nWidth;) ...
118,569,394,046,871,840,000,000,000,000,000,000,000
planar.c
242,810,828,278,976,070,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2020-11521
libfreerdp/codec/planar.c in FreeRDP version > 1.0 through 2.0.0-rc4 has an Out-of-bounds Write.
https://nvd.nist.gov/vuln/detail/CVE-2020-11521
472,902
FreeRDP
17f547ae11835bb11baa3d045245dc1694866845
https://github.com/FreeRDP/FreeRDP
https://github.com/FreeRDP/FreeRDP/commit/17f547ae11835bb11baa3d045245dc1694866845
Fixed CVE-2020-11521: Out of bounds write in planar codec. Thanks to Sunglin and HuanGMz from Knownsec 404
0
static INLINE INT32 planar_skip_plane_rle(const BYTE* pSrcData, UINT32 SrcSize, UINT32 nWidth, UINT32 nHeight) { UINT32 used = 0; UINT32 x, y; BYTE controlByte; for (y = 0; y < nHeight; y++) { for (x = 0; x < nWidth;) { int cRawBytes; int nRunLength; if (use...
175,320,694,156,370,000,000,000,000,000,000,000,000
planar.c
216,586,034,959,921,970,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2020-11521
libfreerdp/codec/planar.c in FreeRDP version > 1.0 through 2.0.0-rc4 has an Out-of-bounds Write.
https://nvd.nist.gov/vuln/detail/CVE-2020-11521
213,621
cpython
a4d78362397fc3bced6ea80fbc7b5f4827aec55e
https://github.com/python/cpython
https://github.com/python/cpython/commit/a4d78362397fc3bced6ea80fbc7b5f4827aec55e
bpo-36495: Fix two out-of-bounds array reads (GH-12641) Research and fix by @bradlarsen.
1
ast_for_arguments(struct compiling *c, const node *n) { /* This function handles both typedargslist (function definition) and varargslist (lambda definition). parameters: '(' [typedargslist] ')' typedargslist: (tfpdef ['=' test] (',' tfpdef ['=' test])* [',' [ '*' [tfpdef] (',' ...
122,384,450,784,184,490,000,000,000,000,000,000,000
ast.c
224,732,895,062,039,840,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-19275
typed_ast 1.3.0 and 1.3.1 has an ast_for_arguments out-of-bounds read. An attacker with the ability to cause a Python interpreter to parse Python source (but not necessarily execute it) may be able to crash the interpreter process. This could be a concern, for example, in a web-based service that parses (but does not e...
https://nvd.nist.gov/vuln/detail/CVE-2019-19275
473,025
cpython
a4d78362397fc3bced6ea80fbc7b5f4827aec55e
https://github.com/python/cpython
https://github.com/python/cpython/commit/a4d78362397fc3bced6ea80fbc7b5f4827aec55e
bpo-36495: Fix two out-of-bounds array reads (GH-12641) Research and fix by @bradlarsen.
0
ast_for_arguments(struct compiling *c, const node *n) { /* This function handles both typedargslist (function definition) and varargslist (lambda definition). parameters: '(' [typedargslist] ')' typedargslist: (tfpdef ['=' test] (',' tfpdef ['=' test])* [',' [ '*' [tfpdef] (',' ...
224,786,990,092,167,680,000,000,000,000,000,000,000
ast.c
210,937,012,208,519,400,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-19275
typed_ast 1.3.0 and 1.3.1 has an ast_for_arguments out-of-bounds read. An attacker with the ability to cause a Python interpreter to parse Python source (but not necessarily execute it) may be able to crash the interpreter process. This could be a concern, for example, in a web-based service that parses (but does not e...
https://nvd.nist.gov/vuln/detail/CVE-2019-19275
213,622
cpython
a4d78362397fc3bced6ea80fbc7b5f4827aec55e
https://github.com/python/cpython
https://github.com/python/cpython/commit/a4d78362397fc3bced6ea80fbc7b5f4827aec55e
bpo-36495: Fix two out-of-bounds array reads (GH-12641) Research and fix by @bradlarsen.
1
handle_keywordonly_args(struct compiling *c, const node *n, int start, asdl_seq *kwonlyargs, asdl_seq *kwdefaults) { PyObject *argname; node *ch; expr_ty expression, annotation; arg_ty arg = NULL; int i = start; int j = 0; /* index for kwdefaults and kwonlyargs */ if...
72,847,498,067,937,900,000,000,000,000,000,000,000
ast.c
224,732,895,062,039,840,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-19275
typed_ast 1.3.0 and 1.3.1 has an ast_for_arguments out-of-bounds read. An attacker with the ability to cause a Python interpreter to parse Python source (but not necessarily execute it) may be able to crash the interpreter process. This could be a concern, for example, in a web-based service that parses (but does not e...
https://nvd.nist.gov/vuln/detail/CVE-2019-19275
473,024
cpython
a4d78362397fc3bced6ea80fbc7b5f4827aec55e
https://github.com/python/cpython
https://github.com/python/cpython/commit/a4d78362397fc3bced6ea80fbc7b5f4827aec55e
bpo-36495: Fix two out-of-bounds array reads (GH-12641) Research and fix by @bradlarsen.
0
handle_keywordonly_args(struct compiling *c, const node *n, int start, asdl_seq *kwonlyargs, asdl_seq *kwdefaults) { PyObject *argname; node *ch; expr_ty expression, annotation; arg_ty arg = NULL; int i = start; int j = 0; /* index for kwdefaults and kwonlyargs */ if...
289,473,649,526,818,660,000,000,000,000,000,000,000
ast.c
210,937,012,208,519,400,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-19275
typed_ast 1.3.0 and 1.3.1 has an ast_for_arguments out-of-bounds read. An attacker with the ability to cause a Python interpreter to parse Python source (but not necessarily execute it) may be able to crash the interpreter process. This could be a concern, for example, in a web-based service that parses (but does not e...
https://nvd.nist.gov/vuln/detail/CVE-2019-19275
213,665
clamav-devel
3d664817f6ef833a17414a4ecea42004c35cc42f
https://github.com/vrtadmin/clamav-devel
http://git.clamav.net/gitweb?p=clamav-devel.git;a=commit;h=3d664817f6ef833a17414a4ecea42004c35cc42f
fix recursion level crash (bb #3706). Thanks to Stephane Chazelas for the analysis.
1
int32_t cli_bcapi_extract_new(struct cli_bc_ctx *ctx, int32_t id) { cli_ctx *cctx; int res = -1; cli_event_count(EV, BCEV_EXTRACTED); cli_dbgmsg("previous tempfile had %u bytes\n", ctx->written); if (!ctx->written) return 0; if (ctx->ctx && cli_updatelimits(ctx->ctx, ctx->written)) return -1;...
3,715,372,323,113,428,500,000,000,000,000,000,000
bytecode_api.c
289,839,841,651,623,600,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2011-3627
The bytecode engine in ClamAV before 0.97.3 allows remote attackers to cause a denial of service (crash) via vectors related to "recursion level" and (1) libclamav/bytecode.c and (2) libclamav/bytecode_api.c.
https://nvd.nist.gov/vuln/detail/CVE-2011-3627
473,573
clamav-devel
3d664817f6ef833a17414a4ecea42004c35cc42f
https://github.com/vrtadmin/clamav-devel
http://git.clamav.net/gitweb?p=clamav-devel.git;a=commit;h=3d664817f6ef833a17414a4ecea42004c35cc42f
fix recursion level crash (bb #3706). Thanks to Stephane Chazelas for the analysis.
0
int32_t cli_bcapi_extract_new(struct cli_bc_ctx *ctx, int32_t id) { cli_ctx *cctx; int res = -1; cli_event_count(EV, BCEV_EXTRACTED); cli_dbgmsg("previous tempfile had %u bytes\n", ctx->written); if (!ctx->written) return 0; if (ctx->ctx && cli_updatelimits(ctx->ctx, ctx->written)) return -1;...
238,878,768,657,451,500,000,000,000,000,000,000,000
bytecode_api.c
285,310,418,838,760,180,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2011-3627
The bytecode engine in ClamAV before 0.97.3 allows remote attackers to cause a denial of service (crash) via vectors related to "recursion level" and (1) libclamav/bytecode.c and (2) libclamav/bytecode_api.c.
https://nvd.nist.gov/vuln/detail/CVE-2011-3627
213,666
clamav-devel
3d664817f6ef833a17414a4ecea42004c35cc42f
https://github.com/vrtadmin/clamav-devel
http://git.clamav.net/gitweb?p=clamav-devel.git;a=commit;h=3d664817f6ef833a17414a4ecea42004c35cc42f
fix recursion level crash (bb #3706). Thanks to Stephane Chazelas for the analysis.
1
int cli_bytecode_runhook(cli_ctx *cctx, const struct cl_engine *engine, struct cli_bc_ctx *ctx, unsigned id, fmap_t *map, const char **virname) { const unsigned *hooks = engine->hooks[id - _BC_START_HOOKS]; unsigned i, hooks_cnt = engine->hooks_cnt[id - _BC_START_HOOKS]; int ret; unsigned executed =...
149,656,620,365,878,090,000,000,000,000,000,000,000
bytecode.c
178,031,801,549,948,000,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2011-3627
The bytecode engine in ClamAV before 0.97.3 allows remote attackers to cause a denial of service (crash) via vectors related to "recursion level" and (1) libclamav/bytecode.c and (2) libclamav/bytecode_api.c.
https://nvd.nist.gov/vuln/detail/CVE-2011-3627
473,543
clamav-devel
3d664817f6ef833a17414a4ecea42004c35cc42f
https://github.com/vrtadmin/clamav-devel
http://git.clamav.net/gitweb?p=clamav-devel.git;a=commit;h=3d664817f6ef833a17414a4ecea42004c35cc42f
fix recursion level crash (bb #3706). Thanks to Stephane Chazelas for the analysis.
0
int cli_bytecode_runhook(cli_ctx *cctx, const struct cl_engine *engine, struct cli_bc_ctx *ctx, unsigned id, fmap_t *map, const char **virname) { const unsigned *hooks = engine->hooks[id - _BC_START_HOOKS]; unsigned i, hooks_cnt = engine->hooks_cnt[id - _BC_START_HOOKS]; int ret; unsigned executed =...
75,328,879,276,527,280,000,000,000,000,000,000,000
bytecode.c
6,043,968,237,931,547,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2011-3627
The bytecode engine in ClamAV before 0.97.3 allows remote attackers to cause a denial of service (crash) via vectors related to "recursion level" and (1) libclamav/bytecode.c and (2) libclamav/bytecode_api.c.
https://nvd.nist.gov/vuln/detail/CVE-2011-3627
213,993
qemu
705df5466c98f3efdd2b68d3b31dad86858acad7
https://github.com/bonzini/qemu
https://git.qemu.org/?p=qemu.git;a=commit;h=705df5466c98f3efdd2b68d3b31dad86858acad7
net: introduce qemu_receive_packet() Some NIC supports loopback mode and this is done by calling nc->info->receive() directly which in fact suppresses the effort of reentrancy check that is done in qemu_net_queue_send(). Unfortunately we can't use qemu_net_queue_send() here since for loopback there's no sender as pee...
1
int qemu_can_send_packet(NetClientState *sender) { int vm_running = runstate_is_running(); if (!vm_running) { return 0; } if (!sender->peer) { return 1; } if (sender->peer->receive_disabled) { return 0; } else if (sender->peer->info->can_receive && !...
119,494,585,888,553,450,000,000,000,000,000,000,000
net.c
332,465,962,880,371,500,000,000,000,000,000,000,000
[ "CWE-835" ]
CVE-2021-3416
A potential stack overflow via infinite loop issue was found in various NIC emulators of QEMU in versions up to and including 5.2.0. The issue occurs in loopback mode of a NIC wherein reentrant DMA checks get bypassed. A guest user/process may use this flaw to consume CPU cycles or crash the QEMU process on the host re...
https://nvd.nist.gov/vuln/detail/CVE-2021-3416
474,305
qemu
705df5466c98f3efdd2b68d3b31dad86858acad7
https://github.com/bonzini/qemu
https://git.qemu.org/?p=qemu.git;a=commit;h=705df5466c98f3efdd2b68d3b31dad86858acad7
net: introduce qemu_receive_packet() Some NIC supports loopback mode and this is done by calling nc->info->receive() directly which in fact suppresses the effort of reentrancy check that is done in qemu_net_queue_send(). Unfortunately we can't use qemu_net_queue_send() here since for loopback there's no sender as pee...
0
int qemu_can_send_packet(NetClientState *sender) { int vm_running = runstate_is_running(); if (!vm_running) { return 0; } if (!sender->peer) { return 1; } return qemu_can_receive_packet(sender->peer); }
278,178,512,068,252,700,000,000,000,000,000,000,000
net.c
13,869,728,121,641,062,000,000,000,000,000,000,000
[ "CWE-835" ]
CVE-2021-3416
A potential stack overflow via infinite loop issue was found in various NIC emulators of QEMU in versions up to and including 5.2.0. The issue occurs in loopback mode of a NIC wherein reentrant DMA checks get bypassed. A guest user/process may use this flaw to consume CPU cycles or crash the QEMU process on the host re...
https://nvd.nist.gov/vuln/detail/CVE-2021-3416
214,001
gimp
23f685931e5f000dd033a45c60c1e60d7f78caf4
https://github.com/GNOME/gimp
https://git.gnome.org/browse/gimp/commit/?id=23f685931e5f000dd033a45c60c1e60d7f78caf4
file-xwd: sanity check # of colors and map entries (CVE-2013-1978) The number of colors in an image shouldn't be higher than the number of colormap entries. Additionally, consolidate post error cleanup in load_image().
1
load_image (const gchar *filename, GError **error) { FILE *ifp; gint depth, bpp; gint32 image_ID; L_XWDFILEHEADER xwdhdr; L_XWDCOLOR *xwdcolmap = NULL; ifp = g_fopen (filename, "rb"); if (!ifp) { g_set_error (error, G_FILE_ERROR, g_file_e...
245,176,727,075,876,980,000,000,000,000,000,000,000
file-xwd.c
55,893,505,793,125,700,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2013-1978
Heap-based buffer overflow in the read_xwd_cols function in file-xwd.c in the X Window Dump (XWD) plug-in in GIMP 2.6.9 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an X Window System (XWD) image dump with more colors than color map entries.
https://nvd.nist.gov/vuln/detail/CVE-2013-1978
474,461
gimp
23f685931e5f000dd033a45c60c1e60d7f78caf4
https://github.com/GNOME/gimp
https://git.gnome.org/browse/gimp/commit/?id=23f685931e5f000dd033a45c60c1e60d7f78caf4
file-xwd: sanity check # of colors and map entries (CVE-2013-1978) The number of colors in an image shouldn't be higher than the number of colormap entries. Additionally, consolidate post error cleanup in load_image().
0
load_image (const gchar *filename, GError **error) { FILE *ifp = NULL; gint depth, bpp; gint32 image_ID = -1; L_XWDFILEHEADER xwdhdr; L_XWDCOLOR *xwdcolmap = NULL; ifp = g_fopen (filename, "rb"); if (!ifp) { g_set_error (error, G_FILE_ERR...
59,337,161,925,548,395,000,000,000,000,000,000,000
file-xwd.c
285,745,247,563,534,300,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2013-1978
Heap-based buffer overflow in the read_xwd_cols function in file-xwd.c in the X Window Dump (XWD) plug-in in GIMP 2.6.9 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an X Window System (XWD) image dump with more colors than color map entries.
https://nvd.nist.gov/vuln/detail/CVE-2013-1978
214,024
openldap
5a2017d4e61a6ddc4dcb4415028e0d08eb6bca26
https://github.com/openldap/openldap
https://git.openldap.org/openldap/openldap/-/commit/5a2017d4e61a6ddc4dcb4415028e0d08eb6bca26
ITS#9412 fix AVA_Sort on invalid RDN
1
AVA_Sort( LDAPRDN rdn, int nAVAs ) { LDAPAVA *ava_i; int i; assert( rdn != NULL ); for ( i = 1; i < nAVAs; i++ ) { LDAPAVA *ava_j; int j; ava_i = rdn[ i ]; for ( j = i-1; j >=0; j-- ) { int a; ava_j = rdn[ j ]; a = strcmp( ava_i->la_attr.bv_val, ava_j->la_attr.bv_val ); /* RFC4512 does not...
138,010,447,726,806,630,000,000,000,000,000,000,000
dn.c
195,623,694,737,214,060,000,000,000,000,000,000,000
[ "CWE-763" ]
CVE-2020-36224
A flaw was discovered in OpenLDAP before 2.4.57 leading to an invalid pointer free and slapd crash in the saslAuthzTo processing, resulting in denial of service.
https://nvd.nist.gov/vuln/detail/CVE-2020-36224
474,519
openldap
5a2017d4e61a6ddc4dcb4415028e0d08eb6bca26
https://github.com/openldap/openldap
https://git.openldap.org/openldap/openldap/-/commit/5a2017d4e61a6ddc4dcb4415028e0d08eb6bca26
ITS#9412 fix AVA_Sort on invalid RDN
0
AVA_Sort( LDAPRDN rdn, int nAVAs ) { LDAPAVA *ava_i; int i; int rc = LDAP_SUCCESS; assert( rdn != NULL ); for ( i = 1; i < nAVAs; i++ ) { LDAPAVA *ava_j; int j; ava_i = rdn[ i ]; for ( j = i-1; j >=0; j-- ) { int a; ava_j = rdn[ j ]; a = strcmp( ava_i->la_attr.bv_val, ava_j->la_attr.bv_val )...
217,894,482,370,389,630,000,000,000,000,000,000,000
dn.c
167,379,138,843,184,400,000,000,000,000,000,000,000
[ "CWE-763" ]
CVE-2020-36224
A flaw was discovered in OpenLDAP before 2.4.57 leading to an invalid pointer free and slapd crash in the saslAuthzTo processing, resulting in denial of service.
https://nvd.nist.gov/vuln/detail/CVE-2020-36224
214,026
linux
3864d33943b4a76c6e64616280e98d2410b1190f
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3864d33943b4a76c6e64616280e98d2410b1190f
USB: rio500: refuse more than one device at a time This driver is using a global variable. It cannot handle more than one device at a time. The issue has been existing since the dawn of the driver. Signed-off-by: Oliver Neukum <oneukum@suse.com> Reported-by: syzbot+35f04d136fc975a70da4@syzkaller.appspotmail.com Cc: s...
1
static int probe_rio(struct usb_interface *intf, const struct usb_device_id *id) { struct usb_device *dev = interface_to_usbdev(intf); struct rio_usb_data *rio = &rio_instance; int retval; dev_info(&intf->dev, "USB Rio found at address %d\n", dev->devnum); retval = usb_register_dev(intf, &usb_rio_class); ...
133,390,308,317,897,700,000,000,000,000,000,000,000
rio500.c
156,526,608,507,749,280,000,000,000,000,000,000,000
[ "CWE-415" ]
CVE-2019-15212
An issue was discovered in the Linux kernel before 5.1.8. There is a double-free caused by a malicious USB device in the drivers/usb/misc/rio500.c driver.
https://nvd.nist.gov/vuln/detail/CVE-2019-15212
474,565
linux
3864d33943b4a76c6e64616280e98d2410b1190f
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3864d33943b4a76c6e64616280e98d2410b1190f
USB: rio500: refuse more than one device at a time This driver is using a global variable. It cannot handle more than one device at a time. The issue has been existing since the dawn of the driver. Signed-off-by: Oliver Neukum <oneukum@suse.com> Reported-by: syzbot+35f04d136fc975a70da4@syzkaller.appspotmail.com Cc: s...
0
static int probe_rio(struct usb_interface *intf, const struct usb_device_id *id) { struct usb_device *dev = interface_to_usbdev(intf); struct rio_usb_data *rio = &rio_instance; int retval = 0; mutex_lock(&rio500_mutex); if (rio->present) { dev_info(&intf->dev, "Second USB Rio at address %d refused\n", de...
278,351,636,851,528,760,000,000,000,000,000,000,000
rio500.c
219,021,309,140,535,570,000,000,000,000,000,000,000
[ "CWE-415" ]
CVE-2019-15212
An issue was discovered in the Linux kernel before 5.1.8. There is a double-free caused by a malicious USB device in the drivers/usb/misc/rio500.c driver.
https://nvd.nist.gov/vuln/detail/CVE-2019-15212
214,030
exim
7ea1237c783e380d7bdb86c90b13d8203c7ecf26
https://github.com/Exim/exim
https://git.exim.org/exim.git/commitdiff/7ea1237c783e380d7bdb86c90b13d8203c7ecf26
Events: raise msg:fail:internal & msg:complete for -Mrm. Bug 2310
1
deliver_message(uschar *id, BOOL forced, BOOL give_up) { int i, rc; int final_yield = DELIVER_ATTEMPTED_NORMAL; time_t now = time(NULL); address_item *addr_last = NULL; uschar *filter_message = NULL; int process_recipients = RECIP_ACCEPT; open_db dbblock; open_db *dbm_file; extern int acl_where; uschar *info = queue_r...
294,601,626,881,840,300,000,000,000,000,000,000,000
deliver.c
286,670,229,561,929,100,000,000,000,000,000,000,000
[ "CWE-78" ]
CVE-2019-10149
A flaw was found in Exim versions 4.87 to 4.91 (inclusive). Improper validation of recipient address in deliver_message() function in /src/deliver.c may lead to remote command execution.
https://nvd.nist.gov/vuln/detail/CVE-2019-10149
474,596
exim
7ea1237c783e380d7bdb86c90b13d8203c7ecf26
https://github.com/Exim/exim
https://git.exim.org/exim.git/commitdiff/7ea1237c783e380d7bdb86c90b13d8203c7ecf26
Events: raise msg:fail:internal & msg:complete for -Mrm. Bug 2310
0
deliver_message(uschar *id, BOOL forced, BOOL give_up) { int i, rc; int final_yield = DELIVER_ATTEMPTED_NORMAL; time_t now = time(NULL); address_item *addr_last = NULL; uschar *filter_message = NULL; int process_recipients = RECIP_ACCEPT; open_db dbblock; open_db *dbm_file; extern int acl_where; uschar *info = queue_r...
8,461,841,026,536,445,000,000,000,000,000,000,000
deliver.c
188,309,316,658,717,950,000,000,000,000,000,000,000
[ "CWE-78" ]
CVE-2019-10149
A flaw was found in Exim versions 4.87 to 4.91 (inclusive). Improper validation of recipient address in deliver_message() function in /src/deliver.c may lead to remote command execution.
https://nvd.nist.gov/vuln/detail/CVE-2019-10149
214,031
ImageMagick
fbb14283450d3001403e7d9725566dd4fb2c3bb5
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/fbb14283450d3001403e7d9725566dd4fb2c3bb5
Fixed memory leak reported in #457.
1
static Image *ReadICONImage(const ImageInfo *image_info, ExceptionInfo *exception) { IconFile icon_file; IconInfo icon_info; Image *image; MagickBooleanType status; MagickSizeType extent; register ssize_t i, x; register Quantum *q; register unsigned char *p; ...
289,488,900,470,996,870,000,000,000,000,000,000,000
icon.c
159,344,715,507,821,600,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2017-9405
In ImageMagick 7.0.5-5, the ReadICONImage function in icon.c:452 allows attackers to cause a denial of service (memory leak) via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2017-9405
474,609
ImageMagick
fbb14283450d3001403e7d9725566dd4fb2c3bb5
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/fbb14283450d3001403e7d9725566dd4fb2c3bb5
Fixed memory leak reported in #457.
0
static Image *ReadICONImage(const ImageInfo *image_info, ExceptionInfo *exception) { IconFile icon_file; IconInfo icon_info; Image *image; MagickBooleanType status; MagickSizeType extent; register ssize_t i, x; register Quantum *q; register unsigned char *p; ...
114,409,283,514,782,180,000,000,000,000,000,000,000
icon.c
246,845,696,104,888,950,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2017-9405
In ImageMagick 7.0.5-5, the ReadICONImage function in icon.c:452 allows attackers to cause a denial of service (memory leak) via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2017-9405
214,036
icu
53d8c8f3d181d87a6aa925b449b51c4a2c922a51
https://github.com/unicode-org/icu
https://github.com/unicode-org/icu/commit/53d8c8f3d181d87a6aa925b449b51c4a2c922a51
ICU-20246 Fixing another integer overflow in number parsing.
1
UnicodeString DecimalQuantity::toScientificString() const { U_ASSERT(!isApproximate); UnicodeString result; if (isNegative()) { result.append(u'-'); } if (precision == 0) { result.append(u"0E+0", -1); return result; } // NOTE: It is not safe to add to lOptPos (aka max...
133,057,663,444,405,350,000,000,000,000,000,000,000
number_decimalquantity.cpp
190,068,549,769,740,800,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2018-18928
International Components for Unicode (ICU) for C/C++ 63.1 has an integer overflow in number::impl::DecimalQuantity::toScientificString() in i18n/number_decimalquantity.cpp.
https://nvd.nist.gov/vuln/detail/CVE-2018-18928
474,890
icu
53d8c8f3d181d87a6aa925b449b51c4a2c922a51
https://github.com/unicode-org/icu
https://github.com/unicode-org/icu/commit/53d8c8f3d181d87a6aa925b449b51c4a2c922a51
ICU-20246 Fixing another integer overflow in number parsing.
0
UnicodeString DecimalQuantity::toScientificString() const { U_ASSERT(!isApproximate); UnicodeString result; if (isNegative()) { result.append(u'-'); } if (precision == 0) { result.append(u"0E+0", -1); return result; } // NOTE: It is not safe to add to lOptPos (aka max...
88,580,937,834,026,290,000,000,000,000,000,000,000
number_decimalquantity.cpp
246,660,459,707,311,670,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2018-18928
International Components for Unicode (ICU) for C/C++ 63.1 has an integer overflow in number::impl::DecimalQuantity::toScientificString() in i18n/number_decimalquantity.cpp.
https://nvd.nist.gov/vuln/detail/CVE-2018-18928
214,055
libvirt
a4947e8f63c3e6b7b067b444f3d6cf674c0d7f36
https://github.com/libvirt/libvirt
https://gitlab.com/libvirt/libvirt/-/commit/a4947e8f63c3e6b7b067b444f3d6cf674c0d7f36
nwfilter: fix crash when counting number of network filters The virNWFilterObjListNumOfNWFilters method iterates over the driver->nwfilters, accessing virNWFilterObj instances. As such it needs to be protected against concurrent modification of the driver->nwfilters object. This API allows unprivileged users to conne...
1
nwfilterConnectNumOfNWFilters(virConnectPtr conn) { if (virConnectNumOfNWFiltersEnsureACL(conn) < 0) return -1; return virNWFilterObjListNumOfNWFilters(driver->nwfilters, conn, virConnectNumOfNWFiltersCheckACL); }
315,427,908,616,623,650,000,000,000,000,000,000,000
nwfilter_driver.c
9,475,946,123,683,950,000,000,000,000,000,000,000
[ "CWE-667" ]
CVE-2022-0897
A flaw was found in the libvirt nwfilter driver. The virNWFilterObjListNumOfNWFilters method failed to acquire the driver->nwfilters mutex before iterating over virNWFilterObj instances. There was no protection to stop another thread from concurrently modifying the driver->nwfilters object. This flaw allows a malicious...
https://nvd.nist.gov/vuln/detail/CVE-2022-0897
475,232
libvirt
a4947e8f63c3e6b7b067b444f3d6cf674c0d7f36
https://github.com/libvirt/libvirt
https://gitlab.com/libvirt/libvirt/-/commit/a4947e8f63c3e6b7b067b444f3d6cf674c0d7f36
nwfilter: fix crash when counting number of network filters The virNWFilterObjListNumOfNWFilters method iterates over the driver->nwfilters, accessing virNWFilterObj instances. As such it needs to be protected against concurrent modification of the driver->nwfilters object. This API allows unprivileged users to conne...
0
nwfilterConnectNumOfNWFilters(virConnectPtr conn) { int ret; if (virConnectNumOfNWFiltersEnsureACL(conn) < 0) return -1; nwfilterDriverLock(); ret = virNWFilterObjListNumOfNWFilters(driver->nwfilters, conn, virConnectNumOfNWFiltersCheckACL); nwfilt...
334,264,229,405,564,560,000,000,000,000,000,000,000
nwfilter_driver.c
218,481,510,436,941,640,000,000,000,000,000,000,000
[ "CWE-667" ]
CVE-2022-0897
A flaw was found in the libvirt nwfilter driver. The virNWFilterObjListNumOfNWFilters method failed to acquire the driver->nwfilters mutex before iterating over virNWFilterObj instances. There was no protection to stop another thread from concurrently modifying the driver->nwfilters object. This flaw allows a malicious...
https://nvd.nist.gov/vuln/detail/CVE-2022-0897
214,090
file-roller
21dfcdbfe258984db89fb65243a1a888924e45a0
https://git.gnome.org/browse/file-roller
https://gitlab.gnome.org/GNOME/file-roller/-/commit/21dfcdbfe258984db89fb65243a1a888924e45a0
libarchive: do not follow external links when extracting files Do not extract a file if its parent is a symbolic link to a directory external to the destination.
1
extract_archive_thread (GSimpleAsyncResult *result, GObject *object, GCancellable *cancellable) { ExtractData *extract_data; LoadData *load_data; GHashTable *checked_folders; GHashTable *created_files; GHashTable *folders_created_during_extr...
148,301,815,287,678,100,000,000,000,000,000,000,000
fr-archive-libarchive.c
232,302,128,256,963,830,000,000,000,000,000,000,000
[ "CWE-22" ]
CVE-2020-11736
fr-archive-libarchive.c in GNOME file-roller through 3.36.1 allows Directory Traversal during extraction because it lacks a check of whether a file's parent is a symlink to a directory outside of the intended extraction location.
https://nvd.nist.gov/vuln/detail/CVE-2020-11736
475,823
file-roller
21dfcdbfe258984db89fb65243a1a888924e45a0
https://git.gnome.org/browse/file-roller
https://gitlab.gnome.org/GNOME/file-roller/-/commit/21dfcdbfe258984db89fb65243a1a888924e45a0
libarchive: do not follow external links when extracting files Do not extract a file if its parent is a symbolic link to a directory external to the destination.
0
extract_archive_thread (GSimpleAsyncResult *result, GObject *object, GCancellable *cancellable) { ExtractData *extract_data; LoadData *load_data; GHashTable *checked_folders; GHashTable *created_files; GHashTable *folders_created_during_extr...
31,952,659,417,925,164,000,000,000,000,000,000,000
fr-archive-libarchive.c
179,942,474,539,335,500,000,000,000,000,000,000,000
[ "CWE-22" ]
CVE-2020-11736
fr-archive-libarchive.c in GNOME file-roller through 3.36.1 allows Directory Traversal during extraction because it lacks a check of whether a file's parent is a symlink to a directory outside of the intended extraction location.
https://nvd.nist.gov/vuln/detail/CVE-2020-11736
214,092
zziplib
1ba660b3300d67b8ce9f6b96bbae0b36fa2d6b06
https://github.com/gdraheim/zziplib
https://github.com/gdraheim/zziplib/commit/1ba660b3300d67b8ce9f6b96bbae0b36fa2d6b06
check zlib space to be within buffer #39
1
zzip_disk_entry_fopen(ZZIP_DISK * disk, ZZIP_DISK_ENTRY * entry) { /* keep this in sync with zzip_mem_entry_fopen */ struct zzip_file_header *header = zzip_disk_entry_to_file_header(disk, entry); if (! header) return 0; /* EBADMSG */ ___ ZZIP_DISK_FILE *file = malloc(sizeof(ZZIP_DISK_FIL...
179,854,955,415,689,360,000,000,000,000,000,000,000
mmapped.c
264,055,777,047,859,460,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-7725
An issue was discovered in ZZIPlib 0.13.68. An invalid memory address dereference was discovered in zzip_disk_fread in mmapped.c. The vulnerability causes an application crash, which leads to denial of service.
https://nvd.nist.gov/vuln/detail/CVE-2018-7725
475,827
zziplib
1ba660b3300d67b8ce9f6b96bbae0b36fa2d6b06
https://github.com/gdraheim/zziplib
https://github.com/gdraheim/zziplib/commit/1ba660b3300d67b8ce9f6b96bbae0b36fa2d6b06
check zlib space to be within buffer #39
0
zzip_disk_entry_fopen(ZZIP_DISK * disk, ZZIP_DISK_ENTRY * entry) { /* keep this in sync with zzip_mem_entry_fopen */ struct zzip_file_header *header = zzip_disk_entry_to_file_header(disk, entry); if (! header) return 0; /* EBADMSG */ ___ ZZIP_DISK_FILE *file = malloc(sizeof(ZZIP_DISK_FIL...
185,475,818,855,268,900,000,000,000,000,000,000,000
mmapped.c
53,688,132,654,170,735,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-7725
An issue was discovered in ZZIPlib 0.13.68. An invalid memory address dereference was discovered in zzip_disk_fread in mmapped.c. The vulnerability causes an application crash, which leads to denial of service.
https://nvd.nist.gov/vuln/detail/CVE-2018-7725
214,093
curl
79b9d5f1a42578f807a6c94914bc65cbaa304b6d
https://github.com/curl/curl
https://github.com/bagder/curl/commit/79b9d5f1a42578f807a6c94914bc65cbaa304b6d
http_done: close Negotiate connections when done When doing HTTP requests Negotiate authenticated, the entire connnection may become authenticated and not just the specific HTTP request which is otherwise how HTTP works, as Negotiate can basically use NTLM under the hood. curl was not adhering to this fact but would a...
1
CURLcode Curl_http_done(struct connectdata *conn, CURLcode status, bool premature) { struct SessionHandle *data = conn->data; struct HTTP *http =data->req.protop; Curl_unencode_cleanup(conn); #ifdef USE_SPNEGO if(data->state.proxyneg.state == GSS_AUTHSENT || data->state.negotiate...
124,227,102,062,282,920,000,000,000,000,000,000,000
http.c
193,220,677,218,317,700,000,000,000,000,000,000,000
[ "CWE-284" ]
CVE-2015-3148
cURL and libcurl 7.10.6 through 7.41.0 do not properly re-use authenticated Negotiate connections, which allows remote attackers to connect as other users via a request.
https://nvd.nist.gov/vuln/detail/CVE-2015-3148
475,843
curl
79b9d5f1a42578f807a6c94914bc65cbaa304b6d
https://github.com/curl/curl
https://github.com/bagder/curl/commit/79b9d5f1a42578f807a6c94914bc65cbaa304b6d
http_done: close Negotiate connections when done When doing HTTP requests Negotiate authenticated, the entire connnection may become authenticated and not just the specific HTTP request which is otherwise how HTTP works, as Negotiate can basically use NTLM under the hood. curl was not adhering to this fact but would a...
0
CURLcode Curl_http_done(struct connectdata *conn, CURLcode status, bool premature) { struct SessionHandle *data = conn->data; struct HTTP *http =data->req.protop; Curl_unencode_cleanup(conn); #ifdef USE_SPNEGO if(data->state.proxyneg.state == GSS_AUTHSENT || data->state.negotiate....
136,040,060,556,006,140,000,000,000,000,000,000,000
http.c
210,646,243,203,154,300,000,000,000,000,000,000,000
[ "CWE-284" ]
CVE-2015-3148
cURL and libcurl 7.10.6 through 7.41.0 do not properly re-use authenticated Negotiate connections, which allows remote attackers to connect as other users via a request.
https://nvd.nist.gov/vuln/detail/CVE-2015-3148
214,096
ImageMagick
7a42f63927e7f2e26846b7ed4560e9cb4984af7b
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/7a42f63927e7f2e26846b7ed4560e9cb4984af7b
https://github.com/ImageMagick/ImageMagick/issues/903
1
static Cache GetImagePixelCache(Image *image,const MagickBooleanType clone, ExceptionInfo *exception) { CacheInfo *magick_restrict cache_info; MagickBooleanType destroy, status; static MagickSizeType cache_timelimit = MagickResourceInfinity, cpu_throttle = MagickResourceInfinity, cycle...
93,340,072,696,756,780,000,000,000,000,000,000,000
cache.c
2,053,889,816,065,031,600,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2017-17887
In ImageMagick 7.0.7-16 Q16, a memory leak vulnerability was found in the function GetImagePixelCache in magick/cache.c, which allows attackers to cause a denial of service via a crafted MNG image file that is processed by ReadOneMNGImage.
https://nvd.nist.gov/vuln/detail/CVE-2017-17887
475,849
ImageMagick
7a42f63927e7f2e26846b7ed4560e9cb4984af7b
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/7a42f63927e7f2e26846b7ed4560e9cb4984af7b
https://github.com/ImageMagick/ImageMagick/issues/903
0
static Cache GetImagePixelCache(Image *image,const MagickBooleanType clone, ExceptionInfo *exception) { CacheInfo *magick_restrict cache_info; MagickBooleanType destroy, status; static MagickSizeType cache_timelimit = MagickResourceInfinity, cpu_throttle = MagickResourceInfinity, cycle...
294,902,518,685,254,530,000,000,000,000,000,000,000
cache.c
327,586,818,609,895,330,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2017-17887
In ImageMagick 7.0.7-16 Q16, a memory leak vulnerability was found in the function GetImagePixelCache in magick/cache.c, which allows attackers to cause a denial of service via a crafted MNG image file that is processed by ReadOneMNGImage.
https://nvd.nist.gov/vuln/detail/CVE-2017-17887
214,098
linux
bbe692e349e2a1edf3fe0a29a0e05899c9c94d51
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/bbe692e349e2a1edf3fe0a29a0e05899c9c94d51
rpmsg: char: release allocated memory In rpmsg_eptdev_write_iter, if copy_from_iter_full fails the allocated buffer needs to be released. Signed-off-by: Navid Emamdoost <navid.emamdoost@gmail.com> Signed-off-by: Bjorn Andersson <bjorn.andersson@linaro.org>
1
static ssize_t rpmsg_eptdev_write_iter(struct kiocb *iocb, struct iov_iter *from) { struct file *filp = iocb->ki_filp; struct rpmsg_eptdev *eptdev = filp->private_data; size_t len = iov_iter_count(from); void *kbuf; int ret; kbuf = kzalloc(len, GFP_KERNEL); if (!kbuf) return -ENOMEM; if (!copy_fr...
43,680,864,153,068,520,000,000,000,000,000,000,000
rpmsg_char.c
17,836,138,227,971,876,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2019-19053
A memory leak in the rpmsg_eptdev_write_iter() function in drivers/rpmsg/rpmsg_char.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering copy_from_iter_full() failures, aka CID-bbe692e349e2.
https://nvd.nist.gov/vuln/detail/CVE-2019-19053
475,863
linux
bbe692e349e2a1edf3fe0a29a0e05899c9c94d51
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/bbe692e349e2a1edf3fe0a29a0e05899c9c94d51
rpmsg: char: release allocated memory In rpmsg_eptdev_write_iter, if copy_from_iter_full fails the allocated buffer needs to be released. Signed-off-by: Navid Emamdoost <navid.emamdoost@gmail.com> Signed-off-by: Bjorn Andersson <bjorn.andersson@linaro.org>
0
static ssize_t rpmsg_eptdev_write_iter(struct kiocb *iocb, struct iov_iter *from) { struct file *filp = iocb->ki_filp; struct rpmsg_eptdev *eptdev = filp->private_data; size_t len = iov_iter_count(from); void *kbuf; int ret; kbuf = kzalloc(len, GFP_KERNEL); if (!kbuf) return -ENOMEM; if (!copy_fr...
251,541,183,689,801,760,000,000,000,000,000,000,000
rpmsg_char.c
154,773,002,679,875,260,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2019-19053
A memory leak in the rpmsg_eptdev_write_iter() function in drivers/rpmsg/rpmsg_char.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering copy_from_iter_full() failures, aka CID-bbe692e349e2.
https://nvd.nist.gov/vuln/detail/CVE-2019-19053
214,116
cxxtools
142bb2589dc184709857c08c1e10570947c444e3
https://github.com/maekitalo/cxxtools
https://github.com/maekitalo/cxxtools/commit/142bb2589dc184709857c08c1e10570947c444e3
fix parsing double % in query parameters
1
void UrlParser::parse(char ch) { switch(_state) { case state_0: if (ch == '=') _state = state_value; else if (ch == '&') ; else if (ch == '%') _state = state_keyesc; else { _key = ch; _state = state_key; ...
146,998,449,035,886,400,000,000,000,000,000,000,000
query_params.cpp
331,576,263,354,728,950,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2013-7298
query_params.cpp in cxxtools before 2.2.1 allows remote attackers to cause a denial of service (infinite recursion and crash) via an HTTP query that contains %% (double percent) characters.
https://nvd.nist.gov/vuln/detail/CVE-2013-7298
475,962
cxxtools
142bb2589dc184709857c08c1e10570947c444e3
https://github.com/maekitalo/cxxtools
https://github.com/maekitalo/cxxtools/commit/142bb2589dc184709857c08c1e10570947c444e3
fix parsing double % in query parameters
0
void UrlParser::parse(char ch) { switch(_state) { case state_0: if (ch == '=') _state = state_value; else if (ch == '&') ; else if (ch == '%') _state = state_keyesc; else { _key = ch; _state = state_key; ...
283,876,024,174,621,340,000,000,000,000,000,000,000
query_params.cpp
36,198,160,111,428,470,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2013-7298
query_params.cpp in cxxtools before 2.2.1 allows remote attackers to cause a denial of service (infinite recursion and crash) via an HTTP query that contains %% (double percent) characters.
https://nvd.nist.gov/vuln/detail/CVE-2013-7298
214,153
exiv2
43f154f44b838e6b232193ccbd48e5a2e94bdd35
https://github.com/Exiv2/exiv2
https://github.com/Exiv2/exiv2/commit/43f154f44b838e6b232193ccbd48e5a2e94bdd35
Merge two enforces into one.
1
DataBuf PngChunk::readRawProfile(const DataBuf& text,bool iTXt) { DataBuf info; unsigned char unhex[103]={0,0,0,0,0,0,0,0,0,0, 0,0,0,0,0,0,0,0,0,0, 0,0,0,0,0,0,0,0,0,0, 0,0,0,0,0,0,0,0,0,0, 0,0,0,0,0,0,0,0,0,1, 2,3,4,5,6,7,8,9,0,0, 0,...
321,616,521,586,550,480,000,000,000,000,000,000,000
pngchunk_int.cpp
247,499,716,160,878,100,000,000,000,000,000,000,000
[ "CWE-770" ]
CVE-2019-13112
A PngChunk::parseChunkContent uncontrolled memory allocation in Exiv2 through 0.27.1 allows an attacker to cause a denial of service (crash due to an std::bad_alloc exception) via a crafted PNG image file.
https://nvd.nist.gov/vuln/detail/CVE-2019-13112
476,057
exiv2
43f154f44b838e6b232193ccbd48e5a2e94bdd35
https://github.com/Exiv2/exiv2
https://github.com/Exiv2/exiv2/commit/43f154f44b838e6b232193ccbd48e5a2e94bdd35
Merge two enforces into one.
0
DataBuf PngChunk::readRawProfile(const DataBuf& text,bool iTXt) { DataBuf info; unsigned char unhex[103]={0,0,0,0,0,0,0,0,0,0, 0,0,0,0,0,0,0,0,0,0, 0,0,0,0,0,0,0,0,0,0, 0,0,0,0,0,0,0,0,0,0, 0,0,0,0,0,0,0,0,0,1, 2,3,4,5,6,7,8,9,0,0, 0,...
132,265,467,662,308,290,000,000,000,000,000,000,000
pngchunk_int.cpp
23,411,566,232,110,930,000,000,000,000,000,000,000
[ "CWE-770" ]
CVE-2019-13112
A PngChunk::parseChunkContent uncontrolled memory allocation in Exiv2 through 0.27.1 allows an attacker to cause a denial of service (crash due to an std::bad_alloc exception) via a crafted PNG image file.
https://nvd.nist.gov/vuln/detail/CVE-2019-13112
214,161
grub
451d80e52d851432e109771bb8febafca7a5f1f2
http://git.savannah.gnu.org/cgit/grub
http://git.savannah.gnu.org/cgit/grub.git/commit/?id=451d80e52d851432e109771bb8febafca7a5f1f2
Fix security issue when reading username and password This patch fixes two integer underflows at: * grub-core/lib/crypto.c * grub-core/normal/auth.c CVE-2015-8370 Signed-off-by: Hector Marco-Gisbert <hecmargi@upv.es> Signed-off-by: Ismael Ripoll-Ripoll <iripoll@disca.upv.es> Also-By: Andrey Borzenkov <arvidjaar@...
1
grub_password_get (char buf[], unsigned buf_size) { unsigned cur_len = 0; int key; while (1) { key = grub_getkey (); if (key == '\n' || key == '\r') break; if (key == '\e') { cur_len = 0; break; } if (key == '\b') { cur_len--; continue; } if (!grub_isprint (...
225,895,683,657,818,140,000,000,000,000,000,000,000
crypto.c
163,139,052,227,021,200,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2015-8370
Multiple integer underflows in Grub2 1.98 through 2.02 allow physically proximate attackers to bypass authentication, obtain sensitive information, or cause a denial of service (disk corruption) via backspace characters in the (1) grub_username_get function in grub-core/normal/auth.c or the (2) grub_password_get functi...
https://nvd.nist.gov/vuln/detail/CVE-2015-8370
476,158
grub
451d80e52d851432e109771bb8febafca7a5f1f2
http://git.savannah.gnu.org/cgit/grub
http://git.savannah.gnu.org/cgit/grub.git/commit/?id=451d80e52d851432e109771bb8febafca7a5f1f2
Fix security issue when reading username and password This patch fixes two integer underflows at: * grub-core/lib/crypto.c * grub-core/normal/auth.c CVE-2015-8370 Signed-off-by: Hector Marco-Gisbert <hecmargi@upv.es> Signed-off-by: Ismael Ripoll-Ripoll <iripoll@disca.upv.es> Also-By: Andrey Borzenkov <arvidjaar@...
0
grub_password_get (char buf[], unsigned buf_size) { unsigned cur_len = 0; int key; while (1) { key = grub_getkey (); if (key == '\n' || key == '\r') break; if (key == '\e') { cur_len = 0; break; } if (key == '\b') { if (cur_len) cur_len--; continue; } i...
256,459,968,304,373,300,000,000,000,000,000,000,000
crypto.c
270,064,135,870,995,730,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2015-8370
Multiple integer underflows in Grub2 1.98 through 2.02 allow physically proximate attackers to bypass authentication, obtain sensitive information, or cause a denial of service (disk corruption) via backspace characters in the (1) grub_username_get function in grub-core/normal/auth.c or the (2) grub_password_get functi...
https://nvd.nist.gov/vuln/detail/CVE-2015-8370
214,162
grub
451d80e52d851432e109771bb8febafca7a5f1f2
http://git.savannah.gnu.org/cgit/grub
http://git.savannah.gnu.org/cgit/grub.git/commit/?id=451d80e52d851432e109771bb8febafca7a5f1f2
Fix security issue when reading username and password This patch fixes two integer underflows at: * grub-core/lib/crypto.c * grub-core/normal/auth.c CVE-2015-8370 Signed-off-by: Hector Marco-Gisbert <hecmargi@upv.es> Signed-off-by: Ismael Ripoll-Ripoll <iripoll@disca.upv.es> Also-By: Andrey Borzenkov <arvidjaar@...
1
grub_username_get (char buf[], unsigned buf_size) { unsigned cur_len = 0; int key; while (1) { key = grub_getkey (); if (key == '\n' || key == '\r') break; if (key == '\e') { cur_len = 0; break; } if (key == '\b') { cur_len--; grub_printf ("\b"); continue; } ...
226,833,632,574,004,480,000,000,000,000,000,000,000
auth.c
269,346,585,097,170,120,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2015-8370
Multiple integer underflows in Grub2 1.98 through 2.02 allow physically proximate attackers to bypass authentication, obtain sensitive information, or cause a denial of service (disk corruption) via backspace characters in the (1) grub_username_get function in grub-core/normal/auth.c or the (2) grub_password_get functi...
https://nvd.nist.gov/vuln/detail/CVE-2015-8370
476,165
grub
451d80e52d851432e109771bb8febafca7a5f1f2
http://git.savannah.gnu.org/cgit/grub
http://git.savannah.gnu.org/cgit/grub.git/commit/?id=451d80e52d851432e109771bb8febafca7a5f1f2
Fix security issue when reading username and password This patch fixes two integer underflows at: * grub-core/lib/crypto.c * grub-core/normal/auth.c CVE-2015-8370 Signed-off-by: Hector Marco-Gisbert <hecmargi@upv.es> Signed-off-by: Ismael Ripoll-Ripoll <iripoll@disca.upv.es> Also-By: Andrey Borzenkov <arvidjaar@...
0
grub_username_get (char buf[], unsigned buf_size) { unsigned cur_len = 0; int key; while (1) { key = grub_getkey (); if (key == '\n' || key == '\r') break; if (key == '\e') { cur_len = 0; break; } if (key == '\b') { if (cur_len) { cur_len--; grub_pri...
158,853,056,239,619,920,000,000,000,000,000,000,000
auth.c
193,602,933,690,856,650,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2015-8370
Multiple integer underflows in Grub2 1.98 through 2.02 allow physically proximate attackers to bypass authentication, obtain sensitive information, or cause a denial of service (disk corruption) via backspace characters in the (1) grub_username_get function in grub-core/normal/auth.c or the (2) grub_password_get functi...
https://nvd.nist.gov/vuln/detail/CVE-2015-8370
214,164
passenger
4e97fdb86d0a0141ec9a052c6e691fcd07bb45c8
https://github.com/phusion/passenger
https://github.com/phusion/passenger/commit/4e97fdb86d0a0141ec9a052c6e691fcd07bb45c8
ExecHelperMain: fix privilege lowering code
1
switchGroup(uid_t uid, const struct passwd *userInfo, gid_t gid) { if (userInfo != NULL) { bool setgroupsCalled = false; #if defined(__linux__) || defined(__APPLE__) || defined(__FreeBSD__) #ifdef __APPLE__ int groups[1024]; int ngroups = sizeof(groups) / sizeof(int); #else gid_t groups[1024]; ...
198,641,138,383,488,570,000,000,000,000,000,000,000
ExecHelperMain.cpp
127,561,795,438,167,370,000,000,000,000,000,000,000
[ "CWE-284" ]
CVE-2018-12615
An issue was discovered in switchGroup() in agent/ExecHelper/ExecHelperMain.cpp in Phusion Passenger before 5.3.2. The set of groups (gidset) is not set correctly, leaving it up to randomness (i.e., uninitialized memory) which supplementary groups are actually being set while lowering privileges.
https://nvd.nist.gov/vuln/detail/CVE-2018-12615
476,208
passenger
4e97fdb86d0a0141ec9a052c6e691fcd07bb45c8
https://github.com/phusion/passenger
https://github.com/phusion/passenger/commit/4e97fdb86d0a0141ec9a052c6e691fcd07bb45c8
ExecHelperMain: fix privilege lowering code
0
switchGroup(uid_t uid, const struct passwd *userInfo, gid_t gid) { if (userInfo != NULL) { bool setgroupsCalled = false; #if defined(__linux__) || defined(__APPLE__) || defined(__FreeBSD__) #ifdef __APPLE__ int groups[1024]; int ngroups = sizeof(groups) / sizeof(int); #else gid_t groups[1024]; ...
232,743,474,220,257,650,000,000,000,000,000,000,000
ExecHelperMain.cpp
204,458,997,542,380,700,000,000,000,000,000,000,000
[ "CWE-284" ]
CVE-2018-12615
An issue was discovered in switchGroup() in agent/ExecHelper/ExecHelperMain.cpp in Phusion Passenger before 5.3.2. The set of groups (gidset) is not set correctly, leaving it up to randomness (i.e., uninitialized memory) which supplementary groups are actually being set while lowering privileges.
https://nvd.nist.gov/vuln/detail/CVE-2018-12615
214,166
abrt
7269a2cc88735aee0d1fa62491b9efe73ab5c6e8
https://github.com/abrt/abrt
https://github.com/abrt/abrt/commit/7269a2cc88735aee0d1fa62491b9efe73ab5c6e8
ccpp: revert the UID/GID changes if user core fails Thanks Florian Weimer <fweimer@redhat.com> Signed-off-by: Jakub Filak <jfilak@redhat.com>
1
static int open_user_core(uid_t uid, uid_t fsuid, pid_t pid, char **percent_values) { proc_cwd = open_cwd(pid); if (proc_cwd == NULL) return -1; errno = 0; /* http://article.gmane.org/gmane.comp.security.selinux/21842 */ security_context_t newcon; if (compute_selinux_con_for_new_file(p...
51,547,557,310,852,805,000,000,000,000,000,000,000
abrt-hook-ccpp.c
329,397,073,143,931,880,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2015-3142
The kernel-invoked coredump processor in Automatic Bug Reporting Tool (ABRT) does not properly check the ownership of files before writing core dumps to them, which allows local users to obtain sensitive information by leveraging write permissions to the working directory of a crashed application.
https://nvd.nist.gov/vuln/detail/CVE-2015-3142
476,255
abrt
7269a2cc88735aee0d1fa62491b9efe73ab5c6e8
https://github.com/abrt/abrt
https://github.com/abrt/abrt/commit/7269a2cc88735aee0d1fa62491b9efe73ab5c6e8
ccpp: revert the UID/GID changes if user core fails Thanks Florian Weimer <fweimer@redhat.com> Signed-off-by: Jakub Filak <jfilak@redhat.com>
0
static int open_user_core(uid_t uid, uid_t fsuid, pid_t pid, char **percent_values) { proc_cwd = open_cwd(pid); if (proc_cwd == NULL) return -1; errno = 0; /* http://article.gmane.org/gmane.comp.security.selinux/21842 */ security_context_t newcon; if (compute_selinux_con_for_new_file(p...
90,358,687,385,810,820,000,000,000,000,000,000,000
abrt-hook-ccpp.c
276,899,952,972,904,500,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2015-3142
The kernel-invoked coredump processor in Automatic Bug Reporting Tool (ABRT) does not properly check the ownership of files before writing core dumps to them, which allows local users to obtain sensitive information by leveraging write permissions to the working directory of a crashed application.
https://nvd.nist.gov/vuln/detail/CVE-2015-3142
214,172
linux
d10dcb615c8e29d403a24d35f8310a7a53e3050c
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d10dcb615c8e29d403a24d35f8310a7a53e3050c
mwifiex: pcie: Fix memory leak in mwifiex_pcie_init_evt_ring In mwifiex_pcie_init_evt_ring, a new skb is allocated which should be released if mwifiex_map_pci_memory() fails. The release for skb and card->evtbd_ring_vbase is added. Fixes: 0732484b47b5 ("mwifiex: separate ring initialization and ring creation routines...
1
static int mwifiex_pcie_init_evt_ring(struct mwifiex_adapter *adapter) { struct pcie_service_card *card = adapter->card; struct mwifiex_evt_buf_desc *desc; struct sk_buff *skb; dma_addr_t buf_pa; int i; for (i = 0; i < MWIFIEX_MAX_EVT_BD; i++) { /* Allocate skb here so that firmware can DMA data from it */ s...
59,433,706,910,968,040,000,000,000,000,000,000,000
pcie.c
65,655,637,588,017,340,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2019-19057
Two memory leaks in the mwifiex_pcie_init_evt_ring() function in drivers/net/wireless/marvell/mwifiex/pcie.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures, aka CID-d10dcb615c8e.
https://nvd.nist.gov/vuln/detail/CVE-2019-19057
476,273
linux
d10dcb615c8e29d403a24d35f8310a7a53e3050c
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d10dcb615c8e29d403a24d35f8310a7a53e3050c
mwifiex: pcie: Fix memory leak in mwifiex_pcie_init_evt_ring In mwifiex_pcie_init_evt_ring, a new skb is allocated which should be released if mwifiex_map_pci_memory() fails. The release for skb and card->evtbd_ring_vbase is added. Fixes: 0732484b47b5 ("mwifiex: separate ring initialization and ring creation routines...
0
static int mwifiex_pcie_init_evt_ring(struct mwifiex_adapter *adapter) { struct pcie_service_card *card = adapter->card; struct mwifiex_evt_buf_desc *desc; struct sk_buff *skb; dma_addr_t buf_pa; int i; for (i = 0; i < MWIFIEX_MAX_EVT_BD; i++) { /* Allocate skb here so that firmware can DMA data from it */ s...
147,871,505,170,226,950,000,000,000,000,000,000,000
pcie.c
151,248,231,780,596,260,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2019-19057
Two memory leaks in the mwifiex_pcie_init_evt_ring() function in drivers/net/wireless/marvell/mwifiex/pcie.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures, aka CID-d10dcb615c8e.
https://nvd.nist.gov/vuln/detail/CVE-2019-19057
214,185
gst-plugins-bad
d58f668ece8795bddb3316832e1848c7b7cf38ac
https://github.com/GStreamer/gst-plugins-bad
https://github.com/GStreamer/gst-plugins-bad/commit/d58f668ece8795bddb3316832e1848c7b7cf38ac
mpegtssection: Add more section size checks The smallest section ever needs to be at least 3 bytes (i.e. just the short header). Non-short headers need to be at least 11 bytes long (3 for the minimum header, 5 for the non-short header, and 4 for the CRC). https://bugzilla.gnome.org/show_bug.cgi?id=775048
1
gst_mpegts_section_new (guint16 pid, guint8 * data, gsize data_size) { GstMpegtsSection *res = NULL; guint8 tmp; guint8 table_id; guint16 section_length; /* Check for length */ section_length = GST_READ_UINT16_BE (data + 1) & 0x0FFF; if (G_UNLIKELY (data_size < section_length + 3)) goto short_packet;...
273,614,624,784,294,800,000,000,000,000,000,000,000
gstmpegtssection.c
224,299,742,673,468,840,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2016-9812
The gst_mpegts_section_new function in the mpegts decoder in GStreamer before 1.10.2 allows remote attackers to cause a denial of service (out-of-bounds read) via a too small section.
https://nvd.nist.gov/vuln/detail/CVE-2016-9812
476,389
gst-plugins-bad
d58f668ece8795bddb3316832e1848c7b7cf38ac
https://github.com/GStreamer/gst-plugins-bad
https://github.com/GStreamer/gst-plugins-bad/commit/d58f668ece8795bddb3316832e1848c7b7cf38ac
mpegtssection: Add more section size checks The smallest section ever needs to be at least 3 bytes (i.e. just the short header). Non-short headers need to be at least 11 bytes long (3 for the minimum header, 5 for the non-short header, and 4 for the CRC). https://bugzilla.gnome.org/show_bug.cgi?id=775048
0
gst_mpegts_section_new (guint16 pid, guint8 * data, gsize data_size) { GstMpegtsSection *res = NULL; guint8 tmp; guint8 table_id; guint16 section_length = 0; /* The smallest section ever is 3 bytes */ if (G_UNLIKELY (data_size < 3)) goto short_packet; /* Check for length */ section_length = GST_RE...
205,096,893,977,488,900,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2016-9812
The gst_mpegts_section_new function in the mpegts decoder in GStreamer before 1.10.2 allows remote attackers to cause a denial of service (out-of-bounds read) via a too small section.
https://nvd.nist.gov/vuln/detail/CVE-2016-9812
214,188
linux
c9fbd7bbc23dbdd73364be4d045e5d3612cf6e82
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c9fbd7bbc23dbdd73364be4d045e5d3612cf6e82
xfs: clear sb->s_fs_info on mount failure We recently had an oops reported on a 4.14 kernel in xfs_reclaim_inodes_count() where sb->s_fs_info pointed to garbage and so the m_perag_tree lookup walked into lala land. Essentially, the machine was under memory pressure when the mount was being run, xfs_fs_fill_super() fa...
1
xfs_fs_fill_super( struct super_block *sb, void *data, int silent) { struct inode *root; struct xfs_mount *mp = NULL; int flags = 0, error = -ENOMEM; /* * allocate mp and do all low-level struct initializations before we * attach it to the super */ mp = xfs_mount_alloc(sb); if (!mp) goto out; ...
277,860,177,226,170,220,000,000,000,000,000,000,000
xfs_super.c
14,981,166,057,471,163,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2018-20976
An issue was discovered in fs/xfs/xfs_super.c in the Linux kernel before 4.18. A use after free exists, related to xfs_fs_fill_super failure.
https://nvd.nist.gov/vuln/detail/CVE-2018-20976
476,396
linux
c9fbd7bbc23dbdd73364be4d045e5d3612cf6e82
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c9fbd7bbc23dbdd73364be4d045e5d3612cf6e82
xfs: clear sb->s_fs_info on mount failure We recently had an oops reported on a 4.14 kernel in xfs_reclaim_inodes_count() where sb->s_fs_info pointed to garbage and so the m_perag_tree lookup walked into lala land. Essentially, the machine was under memory pressure when the mount was being run, xfs_fs_fill_super() fa...
0
xfs_fs_fill_super( struct super_block *sb, void *data, int silent) { struct inode *root; struct xfs_mount *mp = NULL; int flags = 0, error = -ENOMEM; /* * allocate mp and do all low-level struct initializations before we * attach it to the super */ mp = xfs_mount_alloc(sb); if (!mp) goto out; ...
150,778,296,756,657,730,000,000,000,000,000,000,000
xfs_super.c
131,887,113,801,046,140,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2018-20976
An issue was discovered in fs/xfs/xfs_super.c in the Linux kernel before 4.18. A use after free exists, related to xfs_fs_fill_super failure.
https://nvd.nist.gov/vuln/detail/CVE-2018-20976
214,239
ImageMagick
e92492afac23315358850e5e050144930049e9cb
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/e92492afac23315358850e5e050144930049e9cb
https://github.com/ImageMagick/ImageMagick/issues/1052
1
static MagickBooleanType WriteSGIImage(const ImageInfo *image_info,Image *image, ExceptionInfo *exception) { CompressionType compression; const char *value; MagickBooleanType status; MagickOffsetType scene; MagickSizeType number_pixels; MemoryInfo *pixel_info; SGIInfo i...
146,154,543,520,544,760,000,000,000,000,000,000,000
sgi.c
197,776,076,151,414,450,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2018-17965
ImageMagick 7.0.7-28 has a memory leak vulnerability in WriteSGIImage in coders/sgi.c.
https://nvd.nist.gov/vuln/detail/CVE-2018-17965
476,856
ImageMagick
e92492afac23315358850e5e050144930049e9cb
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/e92492afac23315358850e5e050144930049e9cb
https://github.com/ImageMagick/ImageMagick/issues/1052
0
static MagickBooleanType WriteSGIImage(const ImageInfo *image_info,Image *image, ExceptionInfo *exception) { CompressionType compression; const char *value; MagickBooleanType status; MagickOffsetType scene; MagickSizeType number_pixels; MemoryInfo *pixel_info; SGIInfo i...
115,006,117,270,335,270,000,000,000,000,000,000,000
sgi.c
57,022,506,168,724,120,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2018-17965
ImageMagick 7.0.7-28 has a memory leak vulnerability in WriteSGIImage in coders/sgi.c.
https://nvd.nist.gov/vuln/detail/CVE-2018-17965
214,240
vim
5f25c3855071bd7e26255c68bf458b1b5cf92f39
https://github.com/vim/vim
https://github.com/vim/vim/commit/5f25c3855071bd7e26255c68bf458b1b5cf92f39
patch 8.2.4049: Vim9: reading before the start of the line with "$" Problem: Vim9: reading before the start of the line with "$" by itself. Solution: Do not subtract one when reporting the error.
1
compile_get_env(char_u **arg, cctx_T *cctx) { char_u *start = *arg; int len; int ret; char_u *name; ++*arg; len = get_env_len(arg); if (len == 0) { semsg(_(e_syntax_error_at_str), start - 1); return FAIL; } // include the '$' in the name, eval_env_var() expects it. name...
34,875,256,404,605,417,000,000,000,000,000,000,000
vim9expr.c
312,413,597,284,457,300,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2022-0158
vim is vulnerable to Heap-based Buffer Overflow
https://nvd.nist.gov/vuln/detail/CVE-2022-0158