idx
int64
project
string
commit_id
string
project_url
string
commit_url
string
commit_message
string
target
int64
func
string
func_hash
float64
file_name
string
file_hash
float64
cwe
list
cve
string
cve_desc
string
nvd_url
string
497,981
media_tree
fa52bd506f274b7619955917abfde355e3d19ffe
http://git.linuxtv.org/cgit.cgi/media_tree
http://git.linuxtv.org/cgit.cgi/media_tree.git/commit/?id=fa52bd506f274b7619955917abfde355e3d19ffe
[media] usbvision: fix crash on detecting device with invalid configuration The usbvision driver crashes when a specially crafted usb device with invalid number of interfaces or endpoints is detected. This fix adds checks that the device has proper configuration expected by the driver. Reported-by: Ralf Spenneberg <r...
0
static int usbvision_probe(struct usb_interface *intf, const struct usb_device_id *devid) { struct usb_device *dev = usb_get_dev(interface_to_usbdev(intf)); struct usb_interface *uif; __u8 ifnum = intf->altsetting->desc.bInterfaceNumber; const struct usb_host_interface *interface; struct usb_usbvision *usbvi...
203,101,550,480,497,700,000,000,000,000,000,000,000
None
null
[ "CWE-17" ]
CVE-2015-7833
The usbvision driver in the Linux kernel package 3.10.0-123.20.1.el7 through 3.10.0-229.14.1.el7 in Red Hat Enterprise Linux (RHEL) 7.1 allows physically proximate attackers to cause a denial of service (panic) via a nonzero bInterfaceNumber value in a USB device descriptor.
https://nvd.nist.gov/vuln/detail/CVE-2015-7833
215,958
media_tree
eca2d34b9d2ce70165a50510659838e28ca22742
http://git.linuxtv.org/cgit.cgi/media_tree
https://git.linuxtv.org/media_tree.git/commit/?id=eca2d34b9d2ce70165a50510659838e28ca22742
[media] mb86a20s: apply mask to val after checking for read failure Appling the mask 0x0f to the immediate return of the call to mb86a20s_readreg will always result in a positive value, meaning that the check of ret < 0 will never work. Instead, check for a -ve return value first, and then mask val with 0x0f. Kudos ...
1
static int mb86a20s_read_status(struct dvb_frontend *fe, enum fe_status *status) { struct mb86a20s_state *state = fe->demodulator_priv; int val; *status = 0; val = mb86a20s_readreg(state, 0x0a) & 0xf; if (val < 0) return val; if (val >= 2) *status |= FE_HAS_SIGNAL; if (val >= 4) *status |= FE_HAS_CARRI...
38,764,065,843,598,180,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-5400
Memory leak in the airspy_probe function in drivers/media/usb/airspy/airspy.c in the airspy USB driver in the Linux kernel before 4.7 allows local users to cause a denial of service (memory consumption) via a crafted USB device that emulates many VFL_TYPE_SDR or VFL_TYPE_SUBDEV devices and performs many connect and dis...
https://nvd.nist.gov/vuln/detail/CVE-2016-5400
498,314
media_tree
eca2d34b9d2ce70165a50510659838e28ca22742
http://git.linuxtv.org/cgit.cgi/media_tree
https://git.linuxtv.org/media_tree.git/commit/?id=eca2d34b9d2ce70165a50510659838e28ca22742
[media] mb86a20s: apply mask to val after checking for read failure Appling the mask 0x0f to the immediate return of the call to mb86a20s_readreg will always result in a positive value, meaning that the check of ret < 0 will never work. Instead, check for a -ve return value first, and then mask val with 0x0f. Kudos ...
0
static int mb86a20s_read_status(struct dvb_frontend *fe, enum fe_status *status) { struct mb86a20s_state *state = fe->demodulator_priv; int val; *status = 0; val = mb86a20s_readreg(state, 0x0a); if (val < 0) return val; val &= 0xf; if (val >= 2) *status |= FE_HAS_SIGNAL; if (val >= 4) *status |= FE_HA...
86,561,553,709,108,800,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-5400
Memory leak in the airspy_probe function in drivers/media/usb/airspy/airspy.c in the airspy USB driver in the Linux kernel before 4.7 allows local users to cause a denial of service (memory consumption) via a crafted USB device that emulates many VFL_TYPE_SDR or VFL_TYPE_SUBDEV devices and performs many connect and dis...
https://nvd.nist.gov/vuln/detail/CVE-2016-5400
215,961
libidn
11abd0e02c16f9e0b6944aea4ef0f2df44b42dd4
http://git.savannah.gnu.org/cgit/libidn
http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=11abd0e02c16f9e0b6944aea4ef0f2df44b42dd4
Fix memory leak in last fix.
1
idna_to_ascii_4i (const uint32_t * in, size_t inlen, char *out, int flags) { size_t len, outlen; uint32_t *src; /* XXX don't need to copy data? */ int rc; /* * ToASCII consists of the following steps: * * 1. If all code points in the sequence are in the ASCII range (0..7F) * then skip to step 3. ...
127,857,680,571,525,350,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2016-6261
The idna_to_ascii_4i function in lib/idna.c in libidn before 1.33 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via 64 bytes of input.
https://nvd.nist.gov/vuln/detail/CVE-2016-6261
498,371
libidn
11abd0e02c16f9e0b6944aea4ef0f2df44b42dd4
http://git.savannah.gnu.org/cgit/libidn
http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=11abd0e02c16f9e0b6944aea4ef0f2df44b42dd4
Fix memory leak in last fix.
0
idna_to_ascii_4i (const uint32_t * in, size_t inlen, char *out, int flags) { size_t len, outlen; uint32_t *src; /* XXX don't need to copy data? */ int rc; /* * ToASCII consists of the following steps: * * 1. If all code points in the sequence are in the ASCII range (0..7F) * then skip to step 3. ...
32,588,989,786,821,510,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2016-6261
The idna_to_ascii_4i function in lib/idna.c in libidn before 1.33 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via 64 bytes of input.
https://nvd.nist.gov/vuln/detail/CVE-2016-6261
215,962
libidn
5e3cb9c7b5bf0ce665b9d68f5ddf095af5c9ba60
http://git.savannah.gnu.org/cgit/libidn
http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=5e3cb9c7b5bf0ce665b9d68f5ddf095af5c9ba60
Really fix bug when reading \00 inputs.
1
main (int argc, char *argv[]) { struct gengetopt_args_info args_info; char *line = NULL; size_t linelen = 0; char *p, *r; uint32_t *q; unsigned cmdn = 0; int rc; setlocale (LC_ALL, ""); set_program_name (argv[0]); bindtextdomain (PACKAGE, LOCALEDIR); textdomain (PACKAGE); if (cmdline_parser (a...
178,628,511,189,092,180,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2016-6262
idn in libidn before 1.33 might allow remote attackers to obtain sensitive memory information by reading a zero byte as input, which triggers an out-of-bounds read, a different vulnerability than CVE-2015-8948.
https://nvd.nist.gov/vuln/detail/CVE-2016-6262
498,373
libidn
5e3cb9c7b5bf0ce665b9d68f5ddf095af5c9ba60
http://git.savannah.gnu.org/cgit/libidn
http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=5e3cb9c7b5bf0ce665b9d68f5ddf095af5c9ba60
Really fix bug when reading \00 inputs.
0
main (int argc, char *argv[]) { struct gengetopt_args_info args_info; char *line = NULL; size_t linelen = 0; char *p, *r; uint32_t *q; unsigned cmdn = 0; int rc; setlocale (LC_ALL, ""); set_program_name (argv[0]); bindtextdomain (PACKAGE, LOCALEDIR); textdomain (PACKAGE); if (cmdline_parser (a...
324,056,797,188,847,150,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2016-6262
idn in libidn before 1.33 might allow remote attackers to obtain sensitive memory information by reading a zero byte as input, which triggers an out-of-bounds read, a different vulnerability than CVE-2015-8948.
https://nvd.nist.gov/vuln/detail/CVE-2016-6262
215,974
icoutils
4fbe9222fd79ee31b7ec031b0be070a9a400d1d3
http://git.savannah.gnu.org/cgit/icoutils
http://git.savannah.gnu.org/cgit/icoutils.git/commit/?id=4fbe9222fd79ee31b7ec031b0be070a9a400d1d3
wrestool: Make check_offset more stringent
1
check_offset(char *memory, int total_size, char *name, void *offset, int size) { ptrdiff_t need_size = (char *) offset - memory + size; /*debug("check_offset: size=%x vs %x offset=%x size=%x\n", need_size, total_size, (char *) offset - memory, size);*/ if (need_size < 0 || need_size > total_size) { warn(_("%s:...
28,940,339,251,010,950,000,000,000,000,000,000,000
None
null
[ "CWE-190" ]
CVE-2017-5208
Integer overflow in the wrestool program in icoutils before 0.31.1 allows remote attackers to cause a denial of service (memory corruption) via a crafted executable, which triggers a denial of service (application crash) or the possibility of execution of arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2017-5208
498,399
icoutils
4fbe9222fd79ee31b7ec031b0be070a9a400d1d3
http://git.savannah.gnu.org/cgit/icoutils
http://git.savannah.gnu.org/cgit/icoutils.git/commit/?id=4fbe9222fd79ee31b7ec031b0be070a9a400d1d3
wrestool: Make check_offset more stringent
0
check_offset(char *memory, int total_size, char *name, void *offset, int size) { char* memory_end = memory + total_size; char* block = (char*)offset; char* block_end = offset + size; /*debug("check_offset: size=%x vs %x offset=%x size=%x\n", need_size, total_size, (char *) offset - memory, size);*/ if (((memor...
318,921,570,884,963,100,000,000,000,000,000,000,000
None
null
[ "CWE-190" ]
CVE-2017-5208
Integer overflow in the wrestool program in icoutils before 0.31.1 allows remote attackers to cause a denial of service (memory corruption) via a crafted executable, which triggers a denial of service (application crash) or the possibility of execution of arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2017-5208
215,975
icoutils
1a108713ac26215c7568353f6e02e727e6d4b24a
http://git.savannah.gnu.org/cgit/icoutils
http://git.savannah.gnu.org/cgit/icoutils.git/commit/?id=1a108713ac26215c7568353f6e02e727e6d4b24a
wrestool: Fix an index, additional check
1
extract_group_icon_cursor_resource(WinLibrary *fi, WinResource *wr, char *lang, int *ressize, bool is_icon) { Win32CursorIconDir *icondir; Win32CursorIconFileDir *fileicondir; char *memory; int c, size, offset, skipped; /* get resource data and size */ icondir = (Win32CursorIco...
21,072,850,875,345,257,000,000,000,000,000,000,000
None
null
[ "CWE-190" ]
CVE-2017-5333
Integer overflow in the extract_group_icon_cursor_resource function in b/wrestool/extract.c in icoutils before 0.31.1 allows local users to cause a denial of service (process crash) or execute arbitrary code via a crafted executable file.
https://nvd.nist.gov/vuln/detail/CVE-2017-5333
498,401
icoutils
1a108713ac26215c7568353f6e02e727e6d4b24a
http://git.savannah.gnu.org/cgit/icoutils
http://git.savannah.gnu.org/cgit/icoutils.git/commit/?id=1a108713ac26215c7568353f6e02e727e6d4b24a
wrestool: Fix an index, additional check
0
extract_group_icon_cursor_resource(WinLibrary *fi, WinResource *wr, char *lang, int *ressize, bool is_icon) { Win32CursorIconDir *icondir; Win32CursorIconFileDir *fileicondir; char *memory; int c, size, offset, skipped; /* get resource data and size */ icondir = (Win32CursorIco...
324,867,664,418,490,200,000,000,000,000,000,000,000
None
null
[ "CWE-190" ]
CVE-2017-5333
Integer overflow in the extract_group_icon_cursor_resource function in b/wrestool/extract.c in icoutils before 0.31.1 allows local users to cause a denial of service (process crash) or execute arbitrary code via a crafted executable file.
https://nvd.nist.gov/vuln/detail/CVE-2017-5333
215,980
wget
4d729e322fae359a1aefaafec1144764a54e8ad4
http://git.savannah.gnu.org/cgit/wget
http://git.savannah.gnu.org/cgit/wget.git/commit/?id=4d729e322fae359a1aefaafec1144764a54e8ad4
Fix CRLF injection in Wget host part * src/url.c (url_parse): Reject control characters in host part of URL Reported-by: Orange Tsai
1
url_parse (const char *url, int *error, struct iri *iri, bool percent_encode) { struct url *u; const char *p; bool path_modified, host_modified; enum url_scheme scheme; const char *seps; const char *uname_b, *uname_e; const char *host_b, *host_e; const char *path_b, *path_e; const char...
227,774,665,447,914,740,000,000,000,000,000,000,000
None
null
[ "CWE-93" ]
CVE-2017-6508
CRLF injection vulnerability in the url_parse function in url.c in Wget through 1.19.1 allows remote attackers to inject arbitrary HTTP headers via CRLF sequences in the host subcomponent of a URL.
https://nvd.nist.gov/vuln/detail/CVE-2017-6508
498,444
wget
4d729e322fae359a1aefaafec1144764a54e8ad4
http://git.savannah.gnu.org/cgit/wget
http://git.savannah.gnu.org/cgit/wget.git/commit/?id=4d729e322fae359a1aefaafec1144764a54e8ad4
Fix CRLF injection in Wget host part * src/url.c (url_parse): Reject control characters in host part of URL Reported-by: Orange Tsai
0
url_parse (const char *url, int *error, struct iri *iri, bool percent_encode) { struct url *u; const char *p; bool path_modified, host_modified; enum url_scheme scheme; const char *seps; const char *uname_b, *uname_e; const char *host_b, *host_e; const char *path_b, *path_e; const char...
86,756,306,669,998,620,000,000,000,000,000,000,000
None
null
[ "CWE-93" ]
CVE-2017-6508
CRLF injection vulnerability in the url_parse function in url.c in Wget through 1.19.1 allows remote attackers to inject arbitrary HTTP headers via CRLF sequences in the host subcomponent of a URL.
https://nvd.nist.gov/vuln/detail/CVE-2017-6508
215,981
libcroco
898e3a8c8c0314d2e6b106809a8e3e93cf9d4394
https://git.gnome.org/browse/libcroco
https://git.gnome.org/browse/libcroco/commit/?id=898e3a8c8c0314d2e6b106809a8e3e93cf9d4394
input: check end of input before reading a byte When reading bytes we weren't check that the index wasn't out of bound and this could produce an invalid read which could deal to a security bug.
1
cr_input_read_byte (CRInput * a_this, guchar * a_byte) { g_return_val_if_fail (a_this && PRIVATE (a_this) && a_byte, CR_BAD_PARAM_ERROR); g_return_val_if_fail (PRIVATE (a_this)->next_byte_index <= PRIVATE (a_this)->nb_bytes, CR_BAD_PARAM_ERROR...
230,441,619,604,958,360,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2017-7960
The cr_input_new_from_uri function in cr-input.c in libcroco 0.6.11 and 0.6.12 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted CSS file.
https://nvd.nist.gov/vuln/detail/CVE-2017-7960
498,469
libcroco
898e3a8c8c0314d2e6b106809a8e3e93cf9d4394
https://git.gnome.org/browse/libcroco
https://git.gnome.org/browse/libcroco/commit/?id=898e3a8c8c0314d2e6b106809a8e3e93cf9d4394
input: check end of input before reading a byte When reading bytes we weren't check that the index wasn't out of bound and this could produce an invalid read which could deal to a security bug.
0
cr_input_read_byte (CRInput * a_this, guchar * a_byte) { gulong nb_bytes_left = 0; g_return_val_if_fail (a_this && PRIVATE (a_this) && a_byte, CR_BAD_PARAM_ERROR); g_return_val_if_fail (PRIVATE (a_this)->next_byte_index <= PRIVATE (a_...
135,681,970,525,518,550,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2017-7960
The cr_input_new_from_uri function in cr-input.c in libcroco 0.6.11 and 0.6.12 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted CSS file.
https://nvd.nist.gov/vuln/detail/CVE-2017-7960
215,984
libcroco
9ad72875e9f08e4c519ef63d44cdbd94aa9504f7
https://git.gnome.org/browse/libcroco
https://git.gnome.org/browse/libcroco/commit/?id=9ad72875e9f08e4c519ef63d44cdbd94aa9504f7
tknzr: support only max long rgb values This fixes a possible out of bound when reading rgbs which are longer than the support MAXLONG
1
cr_tknzr_parse_rgb (CRTknzr * a_this, CRRgb ** a_rgb) { enum CRStatus status = CR_OK; CRInputPos init_pos; CRNum *num = NULL; guchar next_bytes[3] = { 0 }, cur_byte = 0; glong red = 0, green = 0, blue = 0, i = 0; gboolean is...
110,601,798,526,890,110,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-7961
The cr_tknzr_parse_rgb function in cr-tknzr.c in libcroco 0.6.11 and 0.6.12 has an "outside the range of representable values of type long" undefined behavior issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted CSS file. NOTE...
https://nvd.nist.gov/vuln/detail/CVE-2017-7961
498,484
libcroco
9ad72875e9f08e4c519ef63d44cdbd94aa9504f7
https://git.gnome.org/browse/libcroco
https://git.gnome.org/browse/libcroco/commit/?id=9ad72875e9f08e4c519ef63d44cdbd94aa9504f7
tknzr: support only max long rgb values This fixes a possible out of bound when reading rgbs which are longer than the support MAXLONG
0
cr_tknzr_parse_rgb (CRTknzr * a_this, CRRgb ** a_rgb) { enum CRStatus status = CR_OK; CRInputPos init_pos; CRNum *num = NULL; guchar next_bytes[3] = { 0 }, cur_byte = 0; glong red = 0, green = 0, blue = 0, i = 0; gboolean is...
335,684,837,034,094,240,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-7961
The cr_tknzr_parse_rgb function in cr-tknzr.c in libcroco 0.6.11 and 0.6.12 has an "outside the range of representable values of type long" undefined behavior issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted CSS file. NOTE...
https://nvd.nist.gov/vuln/detail/CVE-2017-7961
215,987
wget
d892291fb8ace4c3b734ea5125770989c215df3f
http://git.savannah.gnu.org/cgit/wget
http://git.savannah.gnu.org/cgit/wget.git/commit/?id=d892291fb8ace4c3b734ea5125770989c215df3f
Fix stack overflow in HTTP protocol handling (CVE-2017-13089) * src/http.c (skip_short_body): Return error on negative chunk size Reported-by: Antti Levomäki, Christian Jalio, Joonas Pihlaja from Forcepoint Reported-by: Juhani Eronen from Finnish National Cyber Security Centre
1
skip_short_body (int fd, wgint contlen, bool chunked) { enum { SKIP_SIZE = 512, /* size of the download buffer */ SKIP_THRESHOLD = 4096 /* the largest size we read */ }; wgint remaining_chunk_size = 0; char dlbuf[SKIP_SIZE + 1]; dlbuf[SKIP_SIZE] = '\0'; /* so DEBUGP can sa...
23,440,613,735,665,960,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-13089
The http.c:skip_short_body() function is called in some circumstances, such as when processing redirects. When the response is sent chunked in wget before 1.19.2, the chunk parser uses strtol() to read each chunk's length, but doesn't check that the chunk length is a non-negative number. The code then tries to skip the...
https://nvd.nist.gov/vuln/detail/CVE-2017-13089
498,544
wget
d892291fb8ace4c3b734ea5125770989c215df3f
http://git.savannah.gnu.org/cgit/wget
http://git.savannah.gnu.org/cgit/wget.git/commit/?id=d892291fb8ace4c3b734ea5125770989c215df3f
Fix stack overflow in HTTP protocol handling (CVE-2017-13089) * src/http.c (skip_short_body): Return error on negative chunk size Reported-by: Antti Levomäki, Christian Jalio, Joonas Pihlaja from Forcepoint Reported-by: Juhani Eronen from Finnish National Cyber Security Centre
0
skip_short_body (int fd, wgint contlen, bool chunked) { enum { SKIP_SIZE = 512, /* size of the download buffer */ SKIP_THRESHOLD = 4096 /* the largest size we read */ }; wgint remaining_chunk_size = 0; char dlbuf[SKIP_SIZE + 1]; dlbuf[SKIP_SIZE] = '\0'; /* so DEBUGP can sa...
79,848,865,014,604,800,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-13089
The http.c:skip_short_body() function is called in some circumstances, such as when processing redirects. When the response is sent chunked in wget before 1.19.2, the chunk parser uses strtol() to read each chunk's length, but doesn't check that the chunk length is a non-negative number. The code then tries to skip the...
https://nvd.nist.gov/vuln/detail/CVE-2017-13089
215,988
wget
ba6b44f6745b14dce414761a8e4b35d31b176bba
http://git.savannah.gnu.org/cgit/wget
http://git.savannah.gnu.org/cgit/wget.git/commit/?id=ba6b44f6745b14dce414761a8e4b35d31b176bba
Fix heap overflow in HTTP protocol handling (CVE-2017-13090) * src/retr.c (fd_read_body): Stop processing on negative chunk size Reported-by: Antti Levomäki, Christian Jalio, Joonas Pihlaja from Forcepoint Reported-by: Juhani Eronen from Finnish National Cyber Security Centre
1
fd_read_body (const char *downloaded_filename, int fd, FILE *out, wgint toread, wgint startpos, wgint *qtyread, wgint *qtywritten, double *elapsed, int flags, FILE *out2) { int ret = 0; #undef max #define max(a,b) ((a) > (b) ? (a) : (b)) int dlbufsize = max (BUFSIZ, 8 * 1024); char *d...
16,084,758,394,362,845,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-13090
The retr.c:fd_read_body() function is called when processing OK responses. When the response is sent chunked in wget before 1.19.2, the chunk parser uses strtol() to read each chunk's length, but doesn't check that the chunk length is a non-negative number. The code then tries to read the chunk in pieces of 8192 bytes ...
https://nvd.nist.gov/vuln/detail/CVE-2017-13090
498,567
wget
ba6b44f6745b14dce414761a8e4b35d31b176bba
http://git.savannah.gnu.org/cgit/wget
http://git.savannah.gnu.org/cgit/wget.git/commit/?id=ba6b44f6745b14dce414761a8e4b35d31b176bba
Fix heap overflow in HTTP protocol handling (CVE-2017-13090) * src/retr.c (fd_read_body): Stop processing on negative chunk size Reported-by: Antti Levomäki, Christian Jalio, Joonas Pihlaja from Forcepoint Reported-by: Juhani Eronen from Finnish National Cyber Security Centre
0
fd_read_body (const char *downloaded_filename, int fd, FILE *out, wgint toread, wgint startpos, wgint *qtyread, wgint *qtywritten, double *elapsed, int flags, FILE *out2) { int ret = 0; #undef max #define max(a,b) ((a) > (b) ? (a) : (b)) int dlbufsize = max (BUFSIZ, 8 * 1024); char *d...
69,563,111,407,593,760,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-13090
The retr.c:fd_read_body() function is called when processing OK responses. When the response is sent chunked in wget before 1.19.2, the chunk parser uses strtol() to read each chunk's length, but doesn't check that the chunk length is a non-negative number. The code then tries to read the chunk in pieces of 8192 bytes ...
https://nvd.nist.gov/vuln/detail/CVE-2017-13090
215,991
gcab
bd2abee5f0a9b5cbe3a1ab1f338c4fb8f6ca797b
https://git.gnome.org/browse/gcab
https://git.gnome.org/browse/gcab/commit/?id=bd2abee5f0a9b5cbe3a1ab1f338c4fb8f6ca797b
Do not crash when ncbytes is larger than the buffer size This fixes CVE-2018-5345
1
cdata_read (cdata_t *cd, guint8 res_data, gint comptype, GDataInputStream *in, GCancellable *cancellable, GError **error) { gboolean success = FALSE; int ret, zret = Z_OK; gint compression = comptype & GCAB_COMPRESSION_MASK; guint8 *buf = compression == GCAB_COMPRESSION_NONE ? cd->out : cd-...
296,636,607,922,968,030,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2018-5345
A stack-based buffer overflow within GNOME gcab through 0.7.4 can be exploited by malicious attackers to cause a crash or, potentially, execute arbitrary code via a crafted .cab file.
https://nvd.nist.gov/vuln/detail/CVE-2018-5345
498,616
gcab
bd2abee5f0a9b5cbe3a1ab1f338c4fb8f6ca797b
https://git.gnome.org/browse/gcab
https://git.gnome.org/browse/gcab/commit/?id=bd2abee5f0a9b5cbe3a1ab1f338c4fb8f6ca797b
Do not crash when ncbytes is larger than the buffer size This fixes CVE-2018-5345
0
cdata_read (cdata_t *cd, guint8 res_data, gint comptype, GDataInputStream *in, GCancellable *cancellable, GError **error) { gboolean success = FALSE; int ret, zret = Z_OK; gint compression = comptype & GCAB_COMPRESSION_MASK; gsize buf_sz; guint8 *buf = NULL; guint32 datacsum; gu...
248,861,159,412,543,400,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2018-5345
A stack-based buffer overflow within GNOME gcab through 0.7.4 can be exploited by malicious attackers to cause a crash or, potentially, execute arbitrary code via a crafted .cab file.
https://nvd.nist.gov/vuln/detail/CVE-2018-5345
215,993
GIMP
8ea316667c8a3296bce2832b3986b58d0fdfc077
https://git.gnome.org/browse/GIMP
https://git.gnome.org/browse/GIMP/commit/?id=8ea316667c8a3296bce2832b3986b58d0fdfc077
plug-ins: TGA 16-bit RGB (without alpha bit) is also valid. According to some spec on the web, 16-bit RGB is also valid. In this case, the last bit is simply ignored (at least that's how it is implemented right now).
1
load_image (const gchar *filename, GError **error) { FILE *fp; tga_info info; guchar header[18]; guchar footer[26]; guchar extension[495]; long offset; gint32 image_ID = -1; gimp_progress_init_printf (_("Opening '%s'"), gimp_filename_...
317,352,887,365,701,430,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2017-17786
In GIMP 2.8.22, there is a heap-based buffer over-read in ReadImage in plug-ins/common/file-tga.c (related to bgr2rgb.part.1) via an unexpected bits-per-pixel value for an RGBA image.
https://nvd.nist.gov/vuln/detail/CVE-2017-17786
498,630
GIMP
8ea316667c8a3296bce2832b3986b58d0fdfc077
https://git.gnome.org/browse/GIMP
https://git.gnome.org/browse/GIMP/commit/?id=8ea316667c8a3296bce2832b3986b58d0fdfc077
plug-ins: TGA 16-bit RGB (without alpha bit) is also valid. According to some spec on the web, 16-bit RGB is also valid. In this case, the last bit is simply ignored (at least that's how it is implemented right now).
0
load_image (const gchar *filename, GError **error) { FILE *fp; tga_info info; guchar header[18]; guchar footer[26]; guchar extension[495]; long offset; gint32 image_ID = -1; gimp_progress_init_printf (_("Opening '%s'"), gimp_filename_...
214,640,182,902,851,070,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2017-17786
In GIMP 2.8.22, there is a heap-based buffer over-read in ReadImage in plug-ins/common/file-tga.c (related to bgr2rgb.part.1) via an unexpected bits-per-pixel value for an RGBA image.
https://nvd.nist.gov/vuln/detail/CVE-2017-17786
215,999
GIMP
edb251a7ef1602d20a5afcbf23f24afb163de63b
https://git.gnome.org/browse/GIMP
https://git.gnome.org/browse/GIMP/commit/?id=edb251a7ef1602d20a5afcbf23f24afb163de63b
Bug 739133 - (CVE-2017-17785) Heap overflow while parsing FLI files. It is possible to trigger a heap overflow while parsing FLI files. The RLE decoder is vulnerable to out of boundary writes due to lack of boundary checks. The variable "framebuf" points to a memory area which was allocated with fli_header->width * f...
1
void fli_read_brun(FILE *f, s_fli_header *fli_header, unsigned char *framebuf) { unsigned short yc; unsigned char *pos; for (yc=0; yc < fli_header->height; yc++) { unsigned short xc, pc, pcnt; pc=fli_read_char(f); xc=0; pos=framebuf+(fli_header->width * yc); for (pcnt=pc; pcnt>0; pcnt--) { unsigned shor...
244,414,468,968,368,240,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2017-17785
In GIMP 2.8.22, there is a heap-based buffer overflow in the fli_read_brun function in plug-ins/file-fli/fli.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-17785
498,654
GIMP
edb251a7ef1602d20a5afcbf23f24afb163de63b
https://git.gnome.org/browse/GIMP
https://git.gnome.org/browse/GIMP/commit/?id=edb251a7ef1602d20a5afcbf23f24afb163de63b
Bug 739133 - (CVE-2017-17785) Heap overflow while parsing FLI files. It is possible to trigger a heap overflow while parsing FLI files. The RLE decoder is vulnerable to out of boundary writes due to lack of boundary checks. The variable "framebuf" points to a memory area which was allocated with fli_header->width * f...
0
void fli_read_brun(FILE *f, s_fli_header *fli_header, unsigned char *framebuf) { unsigned short yc; unsigned char *pos; for (yc=0; yc < fli_header->height; yc++) { unsigned short pc, pcnt; size_t n, xc; pc=fli_read_char(f); xc=0; pos=framebuf+(fli_header->width * yc); n=(size_t)fli_header->width * (fli_h...
267,539,709,967,857,700,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2017-17785
In GIMP 2.8.22, there is a heap-based buffer overflow in the fli_read_brun function in plug-ins/file-fli/fli.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-17785
216,003
libcdio
dec2f876c2d7162da213429bce1a7140cdbdd734
https://git.savannah.gnu.org/cgit/libcdio
https://git.savannah.gnu.org/cgit/libcdio.git/commit/?id=dec2f876c2d7162da213429bce1a7140cdbdd734
Removed wrong line
1
get_cdtext_generic (void *p_user_data) { generic_img_private_t *p_env = p_user_data; uint8_t *p_cdtext_data = NULL; size_t len; if (!p_env) return NULL; if (p_env->b_cdtext_error) return NULL; if (NULL == p_env->cdtext) { p_cdtext_data = read_cdtext_generic (p_env); if (NULL != p_cdtext_data) {...
148,641,529,179,930,130,000,000,000,000,000,000,000
None
null
[ "CWE-415" ]
CVE-2017-18201
An issue was discovered in GNU libcdio before 2.0.0. There is a double free in get_cdtext_generic() in lib/driver/_cdio_generic.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-18201
498,695
libcdio
dec2f876c2d7162da213429bce1a7140cdbdd734
https://git.savannah.gnu.org/cgit/libcdio
https://git.savannah.gnu.org/cgit/libcdio.git/commit/?id=dec2f876c2d7162da213429bce1a7140cdbdd734
Removed wrong line
0
get_cdtext_generic (void *p_user_data) { generic_img_private_t *p_env = p_user_data; uint8_t *p_cdtext_data = NULL; size_t len; if (!p_env) return NULL; if (p_env->b_cdtext_error) return NULL; if (NULL == p_env->cdtext) { p_cdtext_data = read_cdtext_generic (p_env); if (NULL != p_cdtext_data) {...
25,645,811,427,049,850,000,000,000,000,000,000,000
None
null
[ "CWE-415" ]
CVE-2017-18201
An issue was discovered in GNU libcdio before 2.0.0. There is a double free in get_cdtext_generic() in lib/driver/_cdio_generic.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-18201
216,005
wget
1fc9c95ec144499e69dc8ec76dbe07799d7d82cd
http://git.savannah.gnu.org/cgit/wget
https://git.savannah.gnu.org/cgit/wget.git/commit/?id=1fc9c95ec144499e69dc8ec76dbe07799d7d82cd
Fix cookie injection (CVE-2018-0494) * src/http.c (resp_new): Replace \r\n by space in continuation lines Fixes #53763 "Malicious website can write arbitrary cookie entries to cookie jar" HTTP header parsing left the \r\n from continuation line intact. The Set-Cookie code didn't check and could be tricked to write ...
1
resp_new (const char *head) { const char *hdr; int count, size; struct response *resp = xnew0 (struct response); resp->data = head; if (*head == '\0') { /* Empty head means that we're dealing with a headerless (HTTP/0.9) response. In that case, don't set HEADERS at all. */ ...
29,046,241,833,154,510,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2018-0494
GNU Wget before 1.19.5 is prone to a cookie injection vulnerability in the resp_new function in http.c via a \r\n sequence in a continuation line.
https://nvd.nist.gov/vuln/detail/CVE-2018-0494
498,714
wget
1fc9c95ec144499e69dc8ec76dbe07799d7d82cd
http://git.savannah.gnu.org/cgit/wget
https://git.savannah.gnu.org/cgit/wget.git/commit/?id=1fc9c95ec144499e69dc8ec76dbe07799d7d82cd
Fix cookie injection (CVE-2018-0494) * src/http.c (resp_new): Replace \r\n by space in continuation lines Fixes #53763 "Malicious website can write arbitrary cookie entries to cookie jar" HTTP header parsing left the \r\n from continuation line intact. The Set-Cookie code didn't check and could be tricked to write ...
0
resp_new (char *head) { char *hdr; int count, size; struct response *resp = xnew0 (struct response); resp->data = head; if (*head == '\0') { /* Empty head means that we're dealing with a headerless (HTTP/0.9) response. In that case, don't set HEADERS at all. */ return res...
216,399,764,691,244,600,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2018-0494
GNU Wget before 1.19.5 is prone to a cookie injection vulnerability in the resp_new function in http.c via a \r\n sequence in a continuation line.
https://nvd.nist.gov/vuln/detail/CVE-2018-0494
216,008
busybox
45fa3f18adf57ef9d743038743d9c90573aeeb91
http://git.busybox.net/busybox
https://git.busybox.net/busybox/commit/?id=45fa3f18adf57ef9d743038743d9c90573aeeb91
wget: implement TLS verification with ENABLE_FEATURE_WGET_OPENSSL When ENABLE_FEATURE_WGET_OPENSSL is enabled, correctly implement TLS verification by default. And only ignore verification errors, if --no-check-certificate was passed. Also note, that previously OPENSSL implementation did not implement TLS verificatio...
1
static int spawn_https_helper_openssl(const char *host, unsigned port) { char *allocated = NULL; char *servername; int sp[2]; int pid; IF_FEATURE_WGET_HTTPS(volatile int child_failed = 0;) if (socketpair(AF_UNIX, SOCK_STREAM, 0, sp) != 0) /* Kernel can have AF_UNIX support disabled */ bb_simple_perror_msg_an...
197,280,812,858,767,360,000,000,000,000,000,000,000
None
null
[ "CWE-295" ]
CVE-2018-1000500
Busybox contains a Missing SSL certificate validation vulnerability in The "busybox wget" applet that can result in arbitrary code execution. This attack appear to be exploitable via Simply download any file over HTTPS using "busybox wget https://compromised-domain.com/important-file".
https://nvd.nist.gov/vuln/detail/CVE-2018-1000500
498,739
busybox
45fa3f18adf57ef9d743038743d9c90573aeeb91
http://git.busybox.net/busybox
https://git.busybox.net/busybox/commit/?id=45fa3f18adf57ef9d743038743d9c90573aeeb91
wget: implement TLS verification with ENABLE_FEATURE_WGET_OPENSSL When ENABLE_FEATURE_WGET_OPENSSL is enabled, correctly implement TLS verification by default. And only ignore verification errors, if --no-check-certificate was passed. Also note, that previously OPENSSL implementation did not implement TLS verificatio...
0
static int spawn_https_helper_openssl(const char *host, unsigned port) { char *allocated = NULL; char *servername; int sp[2]; int pid; IF_FEATURE_WGET_HTTPS(volatile int child_failed = 0;) if (socketpair(AF_UNIX, SOCK_STREAM, 0, sp) != 0) /* Kernel can have AF_UNIX support disabled */ bb_simple_perror_msg_an...
95,434,382,055,770,890,000,000,000,000,000,000,000
None
null
[ "CWE-295" ]
CVE-2018-1000500
Busybox contains a Missing SSL certificate validation vulnerability in The "busybox wget" applet that can result in arbitrary code execution. This attack appear to be exploitable via Simply download any file over HTTPS using "busybox wget https://compromised-domain.com/important-file".
https://nvd.nist.gov/vuln/detail/CVE-2018-1000500
216,019
wget
3cdfb594cf75f11cdbb9702ac5e856c332ccacfa
http://git.savannah.gnu.org/cgit/wget
http://git.savannah.gnu.org/cgit/wget.git/commit/?id=3cdfb594cf75f11cdbb9702ac5e856c332ccacfa
Don't save user/pw with --xattr Also the Referer info is reduced to scheme+host+port. * src/ftp.c (getftp): Change params of set_file_metadata() * src/http.c (gethttp): Change params of set_file_metadata() * src/xattr.c (set_file_metadata): Remove user/password from origin URL, reduce Referer value to scheme/host/p...
1
set_file_metadata (const char *origin_url, const char *referrer_url, FILE *fp) { /* Save metadata about where the file came from (requested, final URLs) to * user POSIX Extended Attributes of retrieved file. * * For more details about the user namespace see * [http://freedesktop.org/wiki/CommonExtendedAtt...
94,528,294,453,995,030,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2018-20483
set_file_metadata in xattr.c in GNU Wget before 1.20.1 stores a file's origin URL in the user.xdg.origin.url metadata attribute of the extended attributes of the downloaded file, which allows local users to obtain sensitive information (e.g., credentials contained in the URL) by reading this attribute, as demonstrated ...
https://nvd.nist.gov/vuln/detail/CVE-2018-20483
498,864
wget
3cdfb594cf75f11cdbb9702ac5e856c332ccacfa
http://git.savannah.gnu.org/cgit/wget
http://git.savannah.gnu.org/cgit/wget.git/commit/?id=3cdfb594cf75f11cdbb9702ac5e856c332ccacfa
Don't save user/pw with --xattr Also the Referer info is reduced to scheme+host+port. * src/ftp.c (getftp): Change params of set_file_metadata() * src/http.c (gethttp): Change params of set_file_metadata() * src/xattr.c (set_file_metadata): Remove user/password from origin URL, reduce Referer value to scheme/host/p...
0
set_file_metadata (const struct url *origin_url, const struct url *referrer_url, FILE *fp) { /* Save metadata about where the file came from (requested, final URLs) to * user POSIX Extended Attributes of retrieved file. * * For more details about the user namespace see * [http://freedesktop.org/wiki/Commo...
1,896,027,882,338,314,700,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2018-20483
set_file_metadata in xattr.c in GNU Wget before 1.20.1 stores a file's origin URL in the user.xdg.origin.url metadata attribute of the extended attributes of the downloaded file, which allows local users to obtain sensitive information (e.g., credentials contained in the URL) by reading this attribute, as demonstrated ...
https://nvd.nist.gov/vuln/detail/CVE-2018-20483
216,026
gpsd
7646cbd04055a50b157312ba6b376e88bd398c19
http://git.savannah.gnu.org/cgit/gpsd
https://git.savannah.gnu.org/cgit/gpsd.git/commit/json.c?id=7646cbd04055a50b157312ba6b376e88bd398c19
Add bounds check in in_escape state of JSON parser.
1
static int json_internal_read_object(const char *cp, const struct json_attr_t *attrs, const struct json_array_t *parent, int offset, const char **end) { enum { init, await_attr, in_attr, await_value, in_val_string, in_escape, in_val_token, post_val, post_array } state = ...
250,554,275,764,320,300,000,000,000,000,000,000,000
None
null
[ "CWE-121" ]
CVE-2018-17937
gpsd versions 2.90 to 3.17 and microjson versions 1.0 to 1.3, an open source project, allow a stack-based buffer overflow, which may allow remote attackers to execute arbitrary code on embedded platforms via traffic on Port 2947/TCP or crafted JSON inputs.
https://nvd.nist.gov/vuln/detail/CVE-2018-17937
498,913
gpsd
7646cbd04055a50b157312ba6b376e88bd398c19
http://git.savannah.gnu.org/cgit/gpsd
https://git.savannah.gnu.org/cgit/gpsd.git/commit/json.c?id=7646cbd04055a50b157312ba6b376e88bd398c19
Add bounds check in in_escape state of JSON parser.
0
static int json_internal_read_object(const char *cp, const struct json_attr_t *attrs, const struct json_array_t *parent, int offset, const char **end) { enum { init, await_attr, in_attr, await_value, in_val_string, in_escape, in_val_token, post_val, post_array } state = ...
76,937,451,767,874,140,000,000,000,000,000,000,000
None
null
[ "CWE-121" ]
CVE-2018-17937
gpsd versions 2.90 to 3.17 and microjson versions 1.0 to 1.3, an open source project, allow a stack-based buffer overflow, which may allow remote attackers to execute arbitrary code on embedded platforms via traffic on Port 2947/TCP or crafted JSON inputs.
https://nvd.nist.gov/vuln/detail/CVE-2018-17937
216,029
wget
562eacb76a2b64d5dc80a443f0f739bc9ef76c17
http://git.savannah.gnu.org/cgit/wget
http://git.savannah.gnu.org/cgit/wget.git/commit/?id=562eacb76a2b64d5dc80a443f0f739bc9ef76c17
* src/iri.c (do_conversion): Remove unneeded debug lines
1
do_conversion (const char *tocode, const char *fromcode, char const *in_org, size_t inlen, char **out) { iconv_t cd; /* sXXXav : hummm hard to guess... */ size_t len, done, outlen; int invalid = 0, tooshort = 0; char *s, *in, *in_save; cd = iconv_open (tocode, fromcode); if (cd == (iconv_t)(-1)) { ...
108,993,015,973,141,400,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2019-5953
Buffer overflow in GNU Wget 1.20.1 and earlier allows remote attackers to cause a denial-of-service (DoS) or may execute an arbitrary code via unspecified vectors.
https://nvd.nist.gov/vuln/detail/CVE-2019-5953
498,932
wget
562eacb76a2b64d5dc80a443f0f739bc9ef76c17
http://git.savannah.gnu.org/cgit/wget
http://git.savannah.gnu.org/cgit/wget.git/commit/?id=562eacb76a2b64d5dc80a443f0f739bc9ef76c17
* src/iri.c (do_conversion): Remove unneeded debug lines
0
do_conversion (const char *tocode, const char *fromcode, char const *in_org, size_t inlen, char **out) { iconv_t cd; /* sXXXav : hummm hard to guess... */ size_t len, done, outlen; int invalid = 0, tooshort = 0; char *s, *in, *in_save; cd = iconv_open (tocode, fromcode); if (cd == (iconv_t)(-1)) { ...
206,434,534,494,524,000,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2019-5953
Buffer overflow in GNU Wget 1.20.1 and earlier allows remote attackers to cause a denial-of-service (DoS) or may execute an arbitrary code via unspecified vectors.
https://nvd.nist.gov/vuln/detail/CVE-2019-5953
216,037
media_tree
0c4df39e504bf925ab666132ac3c98d6cbbe380b
http://git.linuxtv.org/cgit.cgi/media_tree
https://git.linuxtv.org/media_tree.git/commit/?id=0c4df39e504bf925ab666132ac3c98d6cbbe380b
media: technisat-usb2: break out of loop at end of buffer Ensure we do not access the buffer beyond the end if no 0xff byte is encountered. Reported-by: syzbot+eaaaf38a95427be88f4b@syzkaller.appspotmail.com Signed-off-by: Sean Young <sean@mess.org> Reviewed-by: Kees Cook <keescook@chromium.org> Signed-off-by: Mauro C...
1
static int technisat_usb2_get_ir(struct dvb_usb_device *d) { struct technisat_usb2_state *state = d->priv; u8 *buf = state->buf; u8 *b; int ret; struct ir_raw_event ev; buf[0] = GET_IR_DATA_VENDOR_REQUEST; buf[1] = 0x08; buf[2] = 0x8f; buf[3] = MINIMUM_IR_BIT_TRANSITION_TICK_COUNT; buf[4] = MAXIMUM_IR_BIT_TI...
43,508,758,266,973,030,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2019-15505
drivers/media/usb/dvb-usb/technisat-usb2.c in the Linux kernel through 5.2.9 has an out-of-bounds read via crafted USB device traffic (which may be remote via usbip or usbredir).
https://nvd.nist.gov/vuln/detail/CVE-2019-15505
498,980
media_tree
0c4df39e504bf925ab666132ac3c98d6cbbe380b
http://git.linuxtv.org/cgit.cgi/media_tree
https://git.linuxtv.org/media_tree.git/commit/?id=0c4df39e504bf925ab666132ac3c98d6cbbe380b
media: technisat-usb2: break out of loop at end of buffer Ensure we do not access the buffer beyond the end if no 0xff byte is encountered. Reported-by: syzbot+eaaaf38a95427be88f4b@syzkaller.appspotmail.com Signed-off-by: Sean Young <sean@mess.org> Reviewed-by: Kees Cook <keescook@chromium.org> Signed-off-by: Mauro C...
0
static int technisat_usb2_get_ir(struct dvb_usb_device *d) { struct technisat_usb2_state *state = d->priv; struct ir_raw_event ev; u8 *buf = state->buf; int i, ret; buf[0] = GET_IR_DATA_VENDOR_REQUEST; buf[1] = 0x08; buf[2] = 0x8f; buf[3] = MINIMUM_IR_BIT_TRANSITION_TICK_COUNT; buf[4] = MAXIMUM_IR_BIT_TIME_TI...
181,905,604,056,718,740,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2019-15505
drivers/media/usb/dvb-usb/technisat-usb2.c in the Linux kernel through 5.2.9 has an out-of-bounds read via crafted USB device traffic (which may be remote via usbip or usbredir).
https://nvd.nist.gov/vuln/detail/CVE-2019-15505
216,038
libextractor
d2b032452241708bee68d02aa02092cfbfba951a
https://git.gnunet.org/libextractor
https://git.gnunet.org/libextractor.git/commit/?id=d2b032452241708bee68d02aa02092cfbfba951a
fix #5846
1
EXTRACTOR_dvi_extract_method (struct EXTRACTOR_ExtractContext *ec) { unsigned int klen; uint32_t pos; uint32_t opos; unsigned int len; unsigned int pageCount; char pages[16]; void *buf; unsigned char *data; uint64_t size; uint64_t off; ssize_t iret; if (40 >= (iret = ec->read (ec->cls, &buf, ...
340,046,622,825,312,520,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2019-15531
GNU Libextractor through 1.9 has a heap-based buffer over-read in the function EXTRACTOR_dvi_extract_method in plugins/dvi_extractor.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-15531
498,990
libextractor
d2b032452241708bee68d02aa02092cfbfba951a
https://git.gnunet.org/libextractor
https://git.gnunet.org/libextractor.git/commit/?id=d2b032452241708bee68d02aa02092cfbfba951a
fix #5846
0
EXTRACTOR_dvi_extract_method (struct EXTRACTOR_ExtractContext *ec) { unsigned int klen; uint32_t pos; uint32_t opos; unsigned int len; unsigned int pageCount; char pages[16]; void *buf; unsigned char *data; uint64_t size; uint64_t off; ssize_t iret; if (40 >= (iret = ec->read (ec->cls, &buf, ...
114,548,001,031,347,790,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2019-15531
GNU Libextractor through 1.9 has a heap-based buffer over-read in the function EXTRACTOR_dvi_extract_method in plugins/dvi_extractor.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-15531
216,039
libssh
b36272eac1b36982598c10de7af0a501582de07a
http://git.libssh.org/projects/libssh
https://git.libssh.org/projects/libssh.git/commit/?id=b36272eac1b36982598c10de7af0a501582de07a
CVE-2020-1730: Fix a possible segfault when zeroing AES-CTR key Fixes T213 Signed-off-by: Andreas Schneider <asn@cryptomilk.org> Reviewed-by: Anderson Toshiyuki Sasaki <ansasaki@redhat.com>
1
static void aes_ctr_cleanup(struct ssh_cipher_struct *cipher){ explicit_bzero(cipher->aes_key, sizeof(*cipher->aes_key)); SAFE_FREE(cipher->aes_key); }
6,015,689,460,022,238,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2020-1730
A flaw was found in libssh versions before 0.8.9 and before 0.9.4 in the way it handled AES-CTR (or DES ciphers if enabled) ciphers. The server or client could crash when the connection hasn't been fully initialized and the system tries to cleanup the ciphers when closing the connection. The biggest threat from this vu...
https://nvd.nist.gov/vuln/detail/CVE-2020-1730
498,997
libssh
b36272eac1b36982598c10de7af0a501582de07a
http://git.libssh.org/projects/libssh
https://git.libssh.org/projects/libssh.git/commit/?id=b36272eac1b36982598c10de7af0a501582de07a
CVE-2020-1730: Fix a possible segfault when zeroing AES-CTR key Fixes T213 Signed-off-by: Andreas Schneider <asn@cryptomilk.org> Reviewed-by: Anderson Toshiyuki Sasaki <ansasaki@redhat.com>
0
static void aes_ctr_cleanup(struct ssh_cipher_struct *cipher){ if (cipher != NULL) { if (cipher->aes_key != NULL) { explicit_bzero(cipher->aes_key, sizeof(*cipher->aes_key)); } SAFE_FREE(cipher->aes_key); } }
21,235,183,656,112,916,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2020-1730
A flaw was found in libssh versions before 0.8.9 and before 0.9.4 in the way it handled AES-CTR (or DES ciphers if enabled) ciphers. The server or client could crash when the connection hasn't been fully initialized and the system tries to cleanup the ciphers when closing the connection. The biggest threat from this vu...
https://nvd.nist.gov/vuln/detail/CVE-2020-1730
216,043
linux-2.6
272b62c1f0f6f742046e45b50b6fec98860208a0
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=272b62c1f0f6f742046e45b50b6fec98860208a0
Treat writes as new when holes span across page boundaries When a hole spans across page boundaries, the next write forces a read of the block. This could end up reading existing garbage data from the disk in ocfs2_map_page_blocks. This leads to non-zero holes. In order to avoid this, mark the writes as new when the h...
1
static int ocfs2_prepare_page_for_write(struct inode *inode, u64 *p_blkno, struct ocfs2_write_ctxt *wc, struct page *page, u32 cpos, loff_t user_pos, unsigned user_len, int new) { int ret; unsigned int map_from = 0, map_to = 0; unsigned int cluster_start, cluster_end; unsigned int user_data_from...
313,190,426,386,914,600,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2011-0463
The ocfs2_prepare_page_for_write function in fs/ocfs2/aops.c in the Oracle Cluster File System 2 (OCFS2) subsystem in the Linux kernel before 2.6.39-rc1 does not properly handle holes that cross page boundaries, which allows local users to obtain potentially sensitive information from uninitialized disk locations by re...
https://nvd.nist.gov/vuln/detail/CVE-2011-0463
499,140
linux-2.6
272b62c1f0f6f742046e45b50b6fec98860208a0
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=272b62c1f0f6f742046e45b50b6fec98860208a0
Treat writes as new when holes span across page boundaries When a hole spans across page boundaries, the next write forces a read of the block. This could end up reading existing garbage data from the disk in ocfs2_map_page_blocks. This leads to non-zero holes. In order to avoid this, mark the writes as new when the h...
0
static int ocfs2_prepare_page_for_write(struct inode *inode, u64 *p_blkno, struct ocfs2_write_ctxt *wc, struct page *page, u32 cpos, loff_t user_pos, unsigned user_len, int new) { int ret; unsigned int map_from = 0, map_to = 0; unsigned int cluster_start, cluster_end; unsigned int user_data_from...
23,863,270,394,278,217,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2011-0463
The ocfs2_prepare_page_for_write function in fs/ocfs2/aops.c in the Oracle Cluster File System 2 (OCFS2) subsystem in the Linux kernel before 2.6.39-rc1 does not properly handle holes that cross page boundaries, which allows local users to obtain potentially sensitive information from uninitialized disk locations by re...
https://nvd.nist.gov/vuln/detail/CVE-2011-0463
216,065
tar
d9d4435692150fa8ff68e1b1a473d187cc3fd777
http://git.savannah.gnu.org/cgit/tar
https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777
Fix memory leak in read_header Bug reported in https://savannah.gnu.org/bugs/?59897 * src/list.c (read_header): Don't return directly from the loop. Instead set the status and break. Return the status. Free next_long_name and next_long_link before returning.
1
read_header (union block **return_block, struct tar_stat_info *info, enum read_header_mode mode) { union block *header; union block *header_copy; char *bp; union block *data_block; size_t size, written; union block *next_long_name = 0; union block *next_long_link = 0; size_t next_long_name_blocks ...
220,202,712,533,898,020,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2021-20193
A flaw was found in the src/list.c of tar 1.33 and earlier. This flaw allows an attacker who can submit a crafted input file to tar to cause uncontrolled consumption of memory. The highest threat from this vulnerability is to system availability.
https://nvd.nist.gov/vuln/detail/CVE-2021-20193
499,528
tar
d9d4435692150fa8ff68e1b1a473d187cc3fd777
http://git.savannah.gnu.org/cgit/tar
https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777
Fix memory leak in read_header Bug reported in https://savannah.gnu.org/bugs/?59897 * src/list.c (read_header): Don't return directly from the loop. Instead set the status and break. Return the status. Free next_long_name and next_long_link before returning.
0
read_header (union block **return_block, struct tar_stat_info *info, enum read_header_mode mode) { union block *header; char *bp; union block *data_block; size_t size, written; union block *next_long_name = NULL; union block *next_long_link = NULL; size_t next_long_name_blocks = 0; size_t next_lon...
317,224,477,689,340,540,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2021-20193
A flaw was found in the src/list.c of tar 1.33 and earlier. This flaw allows an attacker who can submit a crafted input file to tar to cause uncontrolled consumption of memory. The highest threat from this vulnerability is to system availability.
https://nvd.nist.gov/vuln/detail/CVE-2021-20193
216,068
libmicrohttpd
a110ae6276660bee3caab30e9ff3f12f85cf3241
https://git.gnunet.org/libmicrohttpd
https://git.gnunet.org/libmicrohttpd.git/commit/?id=a110ae6276660bee3caab30e9ff3f12f85cf3241
fix buffer overflow and add test
1
post_process_urlencoded (struct MHD_PostProcessor *pp, const char *post_data, size_t post_data_len) { char *kbuf = (char *) &pp[1]; size_t poff; const char *start_key = NULL; const char *end_key = NULL; const char *start_value = NULL; const char *end_value =...
190,069,807,145,140,300,000,000,000,000,000,000,000
None
null
[ "CWE-120" ]
CVE-2021-3466
A flaw was found in libmicrohttpd. A missing bounds check in the post_process_urlencoded function leads to a buffer overflow, allowing a remote attacker to write arbitrary data in an application that uses libmicrohttpd. The highest threat from this vulnerability is to data confidentiality and integrity as well as syste...
https://nvd.nist.gov/vuln/detail/CVE-2021-3466
499,530
libmicrohttpd
a110ae6276660bee3caab30e9ff3f12f85cf3241
https://git.gnunet.org/libmicrohttpd
https://git.gnunet.org/libmicrohttpd.git/commit/?id=a110ae6276660bee3caab30e9ff3f12f85cf3241
fix buffer overflow and add test
0
post_process_urlencoded (struct MHD_PostProcessor *pp, const char *post_data, size_t post_data_len) { char *kbuf = (char *) &pp[1]; size_t poff; const char *start_key = NULL; const char *end_key = NULL; const char *start_value = NULL; const char *end_value =...
164,230,521,032,418,990,000,000,000,000,000,000,000
None
null
[ "CWE-120" ]
CVE-2021-3466
A flaw was found in libmicrohttpd. A missing bounds check in the post_process_urlencoded function leads to a buffer overflow, allowing a remote attacker to write arbitrary data in an application that uses libmicrohttpd. The highest threat from this vulnerability is to data confidentiality and integrity as well as syste...
https://nvd.nist.gov/vuln/detail/CVE-2021-3466
216,078
nettle
971bed6ab4b27014eb23085e8176917e1a096fd5
https://git.lysator.liu.se/nettle/nettle
https://git.lysator.liu.se/nettle/nettle/-/commit/971bed6ab4b27014eb23085e8176917e1a096fd5
Use ecc_mod_mul_canonical for point comparison. * eddsa-verify.c (equal_h): Use ecc_mod_mul_canonical. (cherry picked from commit 5b7608fde3a6d2ab82bffb35db1e4e330927c906)
1
equal_h (const struct ecc_modulo *p, const mp_limb_t *x1, const mp_limb_t *z1, const mp_limb_t *x2, const mp_limb_t *z2, mp_limb_t *scratch) { #define t0 scratch #define t1 (scratch + p->size) ecc_mod_mul (p, t0, x1, z2, t0); if (mpn_cmp (t0, p->m, p->size) >= 0) mpn_sub_n (t0, t0, p->m, p->size); ecc...
224,469,605,457,449,740,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2021-20305
A flaw was found in Nettle in versions before 3.7.2, where several Nettle signature verification functions (GOST DSA, EDDSA & ECDSA) result in the Elliptic Curve Cryptography point (ECC) multiply function being called with out-of-range scalers, possibly resulting in incorrect results. This flaw allows an attacker to fo...
https://nvd.nist.gov/vuln/detail/CVE-2021-20305
499,609
nettle
971bed6ab4b27014eb23085e8176917e1a096fd5
https://git.lysator.liu.se/nettle/nettle
https://git.lysator.liu.se/nettle/nettle/-/commit/971bed6ab4b27014eb23085e8176917e1a096fd5
Use ecc_mod_mul_canonical for point comparison. * eddsa-verify.c (equal_h): Use ecc_mod_mul_canonical. (cherry picked from commit 5b7608fde3a6d2ab82bffb35db1e4e330927c906)
0
equal_h (const struct ecc_modulo *p, const mp_limb_t *x1, const mp_limb_t *z1, const mp_limb_t *x2, const mp_limb_t *z2, mp_limb_t *scratch) { #define t0 scratch #define t1 (scratch + p->size) ecc_mod_mul_canonical (p, t0, x1, z2, t0); ecc_mod_mul_canonical (p, t1, x2, z1, t1); return mpn_cmp (t0, t1, p->...
137,332,979,815,558,650,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2021-20305
A flaw was found in Nettle in versions before 3.7.2, where several Nettle signature verification functions (GOST DSA, EDDSA & ECDSA) result in the Elliptic Curve Cryptography point (ECC) multiply function being called with out-of-range scalers, possibly resulting in incorrect results. This flaw allows an attacker to fo...
https://nvd.nist.gov/vuln/detail/CVE-2021-20305
216,082
nettle
51f643eee00e2caa65c8a2f5857f49acdf3ef1ce
https://git.lysator.liu.se/nettle/nettle
https://git.lysator.liu.se/nettle/nettle/-/commit/51f643eee00e2caa65c8a2f5857f49acdf3ef1ce
Ensure ecdsa_sign output is canonically reduced. * ecc-ecdsa-sign.c (ecc_ecdsa_sign): Ensure s output is reduced to canonical range. (cherry picked from commit c24b36160dc5303f7541dd9da1429c4046f27398)
1
ecc_ecdsa_sign (const struct ecc_curve *ecc, const mp_limb_t *zp, /* Random nonce, must be invertible mod ecc group order. */ const mp_limb_t *kp, size_t length, const uint8_t *digest, mp_limb_t *rp, mp_limb_t *sp, mp_limb_t *scratch) { #define P scratch #define kinv scratch #define hp (scr...
43,599,864,529,457,920,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2021-20305
A flaw was found in Nettle in versions before 3.7.2, where several Nettle signature verification functions (GOST DSA, EDDSA & ECDSA) result in the Elliptic Curve Cryptography point (ECC) multiply function being called with out-of-range scalers, possibly resulting in incorrect results. This flaw allows an attacker to fo...
https://nvd.nist.gov/vuln/detail/CVE-2021-20305
499,619
nettle
51f643eee00e2caa65c8a2f5857f49acdf3ef1ce
https://git.lysator.liu.se/nettle/nettle
https://git.lysator.liu.se/nettle/nettle/-/commit/51f643eee00e2caa65c8a2f5857f49acdf3ef1ce
Ensure ecdsa_sign output is canonically reduced. * ecc-ecdsa-sign.c (ecc_ecdsa_sign): Ensure s output is reduced to canonical range. (cherry picked from commit c24b36160dc5303f7541dd9da1429c4046f27398)
0
ecc_ecdsa_sign (const struct ecc_curve *ecc, const mp_limb_t *zp, /* Random nonce, must be invertible mod ecc group order. */ const mp_limb_t *kp, size_t length, const uint8_t *digest, mp_limb_t *rp, mp_limb_t *sp, mp_limb_t *scratch) { #define P scratch #define kinv scratch #define hp (scr...
128,106,232,308,080,240,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2021-20305
A flaw was found in Nettle in versions before 3.7.2, where several Nettle signature verification functions (GOST DSA, EDDSA & ECDSA) result in the Elliptic Curve Cryptography point (ECC) multiply function being called with out-of-range scalers, possibly resulting in incorrect results. This flaw allows an attacker to fo...
https://nvd.nist.gov/vuln/detail/CVE-2021-20305
216,083
nettle
401c8d53d8a8cf1e79980e62bda3f946f8e07c14
https://git.lysator.liu.se/nettle/nettle
https://git.lysator.liu.se/nettle/nettle/-/commit/401c8d53d8a8cf1e79980e62bda3f946f8e07c14
Analogous fix to ecc_gostdsa_verify. * ecc-gostdsa-verify.c (ecc_gostdsa_verify): Use ecc_mod_mul_canonical to compute the scalars used for ecc multiplication. (cherry picked from commit fbaefb64b90cb45b7075a0ed72a92f2a1fbcd2ab)
1
ecc_gostdsa_verify (const struct ecc_curve *ecc, const mp_limb_t *pp, /* Public key */ size_t length, const uint8_t *digest, const mp_limb_t *rp, const mp_limb_t *sp, mp_limb_t *scratch) { /* Procedure, according to GOST R 34.10. q denotes the group order. 1. Check 0 < r, s < q. 2. v ...
147,387,029,767,935,680,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2021-20305
A flaw was found in Nettle in versions before 3.7.2, where several Nettle signature verification functions (GOST DSA, EDDSA & ECDSA) result in the Elliptic Curve Cryptography point (ECC) multiply function being called with out-of-range scalers, possibly resulting in incorrect results. This flaw allows an attacker to fo...
https://nvd.nist.gov/vuln/detail/CVE-2021-20305
499,622
nettle
401c8d53d8a8cf1e79980e62bda3f946f8e07c14
https://git.lysator.liu.se/nettle/nettle
https://git.lysator.liu.se/nettle/nettle/-/commit/401c8d53d8a8cf1e79980e62bda3f946f8e07c14
Analogous fix to ecc_gostdsa_verify. * ecc-gostdsa-verify.c (ecc_gostdsa_verify): Use ecc_mod_mul_canonical to compute the scalars used for ecc multiplication. (cherry picked from commit fbaefb64b90cb45b7075a0ed72a92f2a1fbcd2ab)
0
ecc_gostdsa_verify (const struct ecc_curve *ecc, const mp_limb_t *pp, /* Public key */ size_t length, const uint8_t *digest, const mp_limb_t *rp, const mp_limb_t *sp, mp_limb_t *scratch) { /* Procedure, according to GOST R 34.10. q denotes the group order. 1. Check 0 < r, s < q. 2. v ...
172,427,404,295,328,560,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2021-20305
A flaw was found in Nettle in versions before 3.7.2, where several Nettle signature verification functions (GOST DSA, EDDSA & ECDSA) result in the Elliptic Curve Cryptography point (ECC) multiply function being called with out-of-range scalers, possibly resulting in incorrect results. This flaw allows an attacker to fo...
https://nvd.nist.gov/vuln/detail/CVE-2021-20305
216,085
nettle
63f222c60b03470c0005aa9bc4296fbf585f68b9
https://git.lysator.liu.se/nettle/nettle
https://git.lysator.liu.se/nettle/nettle/-/commit/63f222c60b03470c0005aa9bc4296fbf585f68b9
Fix canonical reduction in gostdsa_vko. * gostdsa-vko.c (gostdsa_vko): Use ecc_mod_mul_canonical to compute the scalar used for ecc multiplication. (cherry picked from commit b30e0ca6d2b41579a5b6a010fc54065d790e8d55)
1
gostdsa_vko (const struct ecc_scalar *priv, const struct ecc_point *pub, size_t ukm_length, const uint8_t *ukm, uint8_t *out) { const struct ecc_curve *ecc = priv->ecc; unsigned bsize = (ecc_bit_size (ecc) + 7) / 8; mp_size_t size = ecc->p.size; mp_size_t itch = 4*size + ecc->mul_itch; mp_limb_t *scratc...
255,361,265,070,159,030,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2021-20305
A flaw was found in Nettle in versions before 3.7.2, where several Nettle signature verification functions (GOST DSA, EDDSA & ECDSA) result in the Elliptic Curve Cryptography point (ECC) multiply function being called with out-of-range scalers, possibly resulting in incorrect results. This flaw allows an attacker to fo...
https://nvd.nist.gov/vuln/detail/CVE-2021-20305
499,624
nettle
63f222c60b03470c0005aa9bc4296fbf585f68b9
https://git.lysator.liu.se/nettle/nettle
https://git.lysator.liu.se/nettle/nettle/-/commit/63f222c60b03470c0005aa9bc4296fbf585f68b9
Fix canonical reduction in gostdsa_vko. * gostdsa-vko.c (gostdsa_vko): Use ecc_mod_mul_canonical to compute the scalar used for ecc multiplication. (cherry picked from commit b30e0ca6d2b41579a5b6a010fc54065d790e8d55)
0
gostdsa_vko (const struct ecc_scalar *priv, const struct ecc_point *pub, size_t ukm_length, const uint8_t *ukm, uint8_t *out) { const struct ecc_curve *ecc = priv->ecc; unsigned bsize = (ecc_bit_size (ecc) + 7) / 8; mp_size_t size = ecc->p.size; mp_size_t itch = 4*size + ecc->mul_itch; mp_limb_t *scratc...
316,681,175,801,786,060,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2021-20305
A flaw was found in Nettle in versions before 3.7.2, where several Nettle signature verification functions (GOST DSA, EDDSA & ECDSA) result in the Elliptic Curve Cryptography point (ECC) multiply function being called with out-of-range scalers, possibly resulting in incorrect results. This flaw allows an attacker to fo...
https://nvd.nist.gov/vuln/detail/CVE-2021-20305
216,118
linux-2.6
f5fb09fa3392ad43fbcfc2f4580752f383ab5996
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=f5fb09fa3392ad43fbcfc2f4580752f383ab5996
[PATCH] Fix for minix crash Mounting a (corrupt) minix filesystem with zero s_zmap_blocks gives a spectacular crash on my 2.6.17.8 system, no doubt because minix/inode.c does an unconditional minix_set_bit(0,sbi->s_zmap[0]->b_data); [akpm@osdl.org: make labels conistent while we're there] Signed-off-by: Andrew Mort...
1
static int minix_fill_super(struct super_block *s, void *data, int silent) { struct buffer_head *bh; struct buffer_head **map; struct minix_super_block *ms; int i, block; struct inode *root_inode; struct minix_sb_info *sbi; sbi = kmalloc(sizeof(struct minix_sb_info), GFP_KERNEL); if (!sbi) return -ENOMEM; s...
147,924,331,550,666,200,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2006-6058
The minix filesystem code in Linux kernel 2.6.x before 2.6.24, including 2.6.18, allows local users to cause a denial of service (hang) via a malformed minix file stream that triggers an infinite loop in the minix_bmap function. NOTE: this issue might be due to an integer overflow or signedness error.
https://nvd.nist.gov/vuln/detail/CVE-2006-6058
499,872
linux-2.6
f5fb09fa3392ad43fbcfc2f4580752f383ab5996
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=f5fb09fa3392ad43fbcfc2f4580752f383ab5996
[PATCH] Fix for minix crash Mounting a (corrupt) minix filesystem with zero s_zmap_blocks gives a spectacular crash on my 2.6.17.8 system, no doubt because minix/inode.c does an unconditional minix_set_bit(0,sbi->s_zmap[0]->b_data); [akpm@osdl.org: make labels conistent while we're there] Signed-off-by: Andrew Mort...
0
static int minix_fill_super(struct super_block *s, void *data, int silent) { struct buffer_head *bh; struct buffer_head **map; struct minix_super_block *ms; int i, block; struct inode *root_inode; struct minix_sb_info *sbi; sbi = kmalloc(sizeof(struct minix_sb_info), GFP_KERNEL); if (!sbi) return -ENOMEM; s...
245,925,984,699,744,340,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2006-6058
The minix filesystem code in Linux kernel 2.6.x before 2.6.24, including 2.6.18, allows local users to cause a denial of service (hang) via a malformed minix file stream that triggers an infinite loop in the minix_bmap function. NOTE: this issue might be due to an integer overflow or signedness error.
https://nvd.nist.gov/vuln/detail/CVE-2006-6058
216,123
opensips
54e027adfa486cfcf993828512b2e273aeb163c2
http://github.com/OpenSIPS/opensips
http://github.com/OpenSIPS/opensips/commit/54e027adfa486cfcf993828512b2e273aeb163c2
backport from 1.9 (rev #9980) fixed temporary GRUU bug that lead to infinite loop Credits to Tolga Tarhan git-svn-id: svn+ssh://svn.code.sf.net/p/opensips/svn/trunk@9982 689a6050-402a-0410-94f2-e92a70836424
1
int lookup(struct sip_msg* _m, char* _t, char* _f, char* _s) { unsigned int flags; urecord_t* r; str aor, uri; ucontact_t* ptr,*it; int res; int ret; str path_dst; str flags_s; pv_value_t val; int_str istr; str sip_instance = {0,0},call_id = {0,0}; flags = 0; if (_f && _f[0]!=0) { if (fixup_get_svalue( ...
14,899,486,356,936,930,000,000,000,000,000,000,000
None
null
[ "CWE-835" ]
CVE-2013-3722
A Denial of Service (infinite loop) exists in OpenSIPS before 1.10 in lookup.c.
https://nvd.nist.gov/vuln/detail/CVE-2013-3722
499,983
opensips
54e027adfa486cfcf993828512b2e273aeb163c2
http://github.com/OpenSIPS/opensips
http://github.com/OpenSIPS/opensips/commit/54e027adfa486cfcf993828512b2e273aeb163c2
backport from 1.9 (rev #9980) fixed temporary GRUU bug that lead to infinite loop Credits to Tolga Tarhan git-svn-id: svn+ssh://svn.code.sf.net/p/opensips/svn/trunk@9982 689a6050-402a-0410-94f2-e92a70836424
0
int lookup(struct sip_msg* _m, char* _t, char* _f, char* _s) { unsigned int flags; urecord_t* r; str aor, uri; ucontact_t* ptr,*it; int res; int ret; str path_dst; str flags_s; pv_value_t val; int_str istr; str sip_instance = {0,0},call_id = {0,0}; flags = 0; if (_f && _f[0]!=0) { if (fixup_get_svalue( ...
98,043,063,009,456,290,000,000,000,000,000,000,000
None
null
[ "CWE-835" ]
CVE-2013-3722
A Denial of Service (infinite loop) exists in OpenSIPS before 1.10 in lookup.c.
https://nvd.nist.gov/vuln/detail/CVE-2013-3722
216,271
openssl
33f44acbbe83ab718ae15c0d2c6a57e802705a36
https://github.com/openssl/openssl
http://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=33f44acbbe83ab718ae15c0d2c6a57e802705a36
s3/s3_cbc.c: allow for compilations with NO_SHA256|512. (cherry picked from commit d5371324d978e4096bf99b9d0fe71b2cb65d9dc8)
1
void ssl3_cbc_digest_record( const EVP_MD_CTX *ctx, unsigned char* md_out, size_t* md_out_size, const unsigned char header[13], const unsigned char *data, size_t data_plus_mac_size, size_t data_plus_mac_plus_padding_size, const unsigned char *mac_secret, unsigned mac_secret_length, char is_sslv3) { union { ...
336,130,642,225,679,270,000,000,000,000,000,000,000
None
null
[ "CWE-310" ]
CVE-2013-0169
The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and p...
https://nvd.nist.gov/vuln/detail/CVE-2013-0169
500,937
openssl
33f44acbbe83ab718ae15c0d2c6a57e802705a36
https://github.com/openssl/openssl
http://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=33f44acbbe83ab718ae15c0d2c6a57e802705a36
s3/s3_cbc.c: allow for compilations with NO_SHA256|512. (cherry picked from commit d5371324d978e4096bf99b9d0fe71b2cb65d9dc8)
0
void ssl3_cbc_digest_record( const EVP_MD_CTX *ctx, unsigned char* md_out, size_t* md_out_size, const unsigned char header[13], const unsigned char *data, size_t data_plus_mac_size, size_t data_plus_mac_plus_padding_size, const unsigned char *mac_secret, unsigned mac_secret_length, char is_sslv3) { union { ...
247,703,121,096,290,850,000,000,000,000,000,000,000
None
null
[ "CWE-310" ]
CVE-2013-0169
The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and p...
https://nvd.nist.gov/vuln/detail/CVE-2013-0169
216,272
openssl
32cc2479b473c49ce869e57fded7e9a77b695c0d
https://github.com/openssl/openssl
http://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=32cc2479b473c49ce869e57fded7e9a77b695c0d
Fix IV check and padding removal. Fix the calculation that checks there is enough room in a record after removing padding and optional explicit IV. (by Steve) For AEAD remove the correct number of padding bytes (by Andy)
1
int tls1_cbc_remove_padding(const SSL* s, SSL3_RECORD *rec, unsigned block_size, unsigned mac_size) { unsigned padding_length, good, to_check, i; const char has_explicit_iv = s->version >= TLS1_1_VERSION || s->version == DTLS1_VERSION; const unsigned overhead = 1 /* padding length byte */ + ...
120,851,383,526,898,310,000,000,000,000,000,000,000
None
null
[ "CWE-310" ]
CVE-2013-0169
The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and p...
https://nvd.nist.gov/vuln/detail/CVE-2013-0169
500,940
openssl
32cc2479b473c49ce869e57fded7e9a77b695c0d
https://github.com/openssl/openssl
http://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=32cc2479b473c49ce869e57fded7e9a77b695c0d
Fix IV check and padding removal. Fix the calculation that checks there is enough room in a record after removing padding and optional explicit IV. (by Steve) For AEAD remove the correct number of padding bytes (by Andy)
0
int tls1_cbc_remove_padding(const SSL* s, SSL3_RECORD *rec, unsigned block_size, unsigned mac_size) { unsigned padding_length, good, to_check, i; const unsigned overhead = 1 /* padding length byte */ + mac_size; /* Check if version requires explicit IV */ if (s->version >= TLS1_1_VERSION || s-...
235,458,583,385,985,500,000,000,000,000,000,000,000
None
null
[ "CWE-310" ]
CVE-2013-0169
The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and p...
https://nvd.nist.gov/vuln/detail/CVE-2013-0169
216,275
openssl
746c6f3a533b1eb50b909147b35fa1b0e5c61f59
https://github.com/openssl/openssl
http://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=746c6f3a533b1eb50b909147b35fa1b0e5c61f59
e_aes_cbc_hmac_sha1.c: align calculated MAC at cache line.
1
static int aesni_cbc_hmac_sha1_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, size_t len) { EVP_AES_HMAC_SHA1 *key = data(ctx); unsigned int l; size_t plen = key->payload_length, iv = 0, /* explicit IV in TLS 1.1 and later */ sha_off = 0; #if defined(STITCHED_CALL) size_t aes...
331,199,747,980,017,670,000,000,000,000,000,000,000
None
null
[ "CWE-310" ]
CVE-2013-0169
The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and p...
https://nvd.nist.gov/vuln/detail/CVE-2013-0169
500,951
openssl
746c6f3a533b1eb50b909147b35fa1b0e5c61f59
https://github.com/openssl/openssl
http://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=746c6f3a533b1eb50b909147b35fa1b0e5c61f59
e_aes_cbc_hmac_sha1.c: align calculated MAC at cache line.
0
static int aesni_cbc_hmac_sha1_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, size_t len) { EVP_AES_HMAC_SHA1 *key = data(ctx); unsigned int l; size_t plen = key->payload_length, iv = 0, /* explicit IV in TLS 1.1 and later */ sha_off = 0; #if defined(STITCHED_CALL) size_t aes...
130,070,298,181,177,380,000,000,000,000,000,000,000
None
null
[ "CWE-310" ]
CVE-2013-0169
The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and p...
https://nvd.nist.gov/vuln/detail/CVE-2013-0169
216,278
openssl
579f3a631ebeef5eb0135977640a835968d3ad6c
https://github.com/openssl/openssl
http://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=579f3a631ebeef5eb0135977640a835968d3ad6c
s3_cbc.c: make CBC_MAC_ROTATE_IN_PLACE universal. (cherry picked from commit f93a41877d8d7a287debb7c63d7b646abaaf269c)
1
void ssl3_cbc_copy_mac(unsigned char* out, const SSL3_RECORD *rec, unsigned md_size,unsigned orig_len) { #if defined(CBC_MAC_ROTATE_IN_PLACE) unsigned char rotated_mac_buf[EVP_MAX_MD_SIZE*2]; unsigned char *rotated_mac; #else unsigned char rotated_mac[EVP_MAX_MD_SIZE]; #endif /* mac_end is the i...
263,903,455,626,464,270,000,000,000,000,000,000,000
None
null
[ "CWE-310" ]
CVE-2013-0169
The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and p...
https://nvd.nist.gov/vuln/detail/CVE-2013-0169
500,954
openssl
579f3a631ebeef5eb0135977640a835968d3ad6c
https://github.com/openssl/openssl
http://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=579f3a631ebeef5eb0135977640a835968d3ad6c
s3_cbc.c: make CBC_MAC_ROTATE_IN_PLACE universal. (cherry picked from commit f93a41877d8d7a287debb7c63d7b646abaaf269c)
0
void ssl3_cbc_copy_mac(unsigned char* out, const SSL3_RECORD *rec, unsigned md_size,unsigned orig_len) { #if defined(CBC_MAC_ROTATE_IN_PLACE) unsigned char rotated_mac_buf[64+EVP_MAX_MD_SIZE]; unsigned char *rotated_mac; #else unsigned char rotated_mac[EVP_MAX_MD_SIZE]; #endif /* mac_end is the ...
295,481,800,492,125,030,000,000,000,000,000,000,000
None
null
[ "CWE-310" ]
CVE-2013-0169
The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and p...
https://nvd.nist.gov/vuln/detail/CVE-2013-0169
216,321
openssl
f9b6c0ba4c02497782f801e3c45688f3efaac55c
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/f9b6c0ba4c02497782f801e3c45688f3efaac55c
Fix for CVE-2014-0076 Fix for the attack described in the paper "Recovering OpenSSL ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack" by Yuval Yarom and Naomi Benger. Details can be obtained from: http://eprint.iacr.org/2014/140 Thanks to Yuval Yarom and Naomi Benger for discovering this flaw and to Yuva...
1
static int ec_GF2m_montgomery_point_multiply(const EC_GROUP *group, EC_POINT *r, const BIGNUM *scalar, const EC_POINT *point, BN_CTX *ctx) { BIGNUM *x1, *x2, *z1, *z2; int ret = 0, i; BN_ULONG mask,word; if (r == point) { ECerr(EC_F_EC_GF2M_MONTGOMERY_POINT_MULTIPLY, EC_R_INVALID_ARGUMENT); return 0; } ...
314,777,153,541,948,460,000,000,000,000,000,000,000
None
null
[ "CWE-310" ]
CVE-2014-0076
The Montgomery ladder implementation in OpenSSL through 1.0.0l does not ensure that certain swap operations have a constant-time behavior, which makes it easier for local users to obtain ECDSA nonces via a FLUSH+RELOAD cache side-channel attack.
https://nvd.nist.gov/vuln/detail/CVE-2014-0076
501,362
openssl
f9b6c0ba4c02497782f801e3c45688f3efaac55c
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/f9b6c0ba4c02497782f801e3c45688f3efaac55c
Fix for CVE-2014-0076 Fix for the attack described in the paper "Recovering OpenSSL ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack" by Yuval Yarom and Naomi Benger. Details can be obtained from: http://eprint.iacr.org/2014/140 Thanks to Yuval Yarom and Naomi Benger for discovering this flaw and to Yuva...
0
static int ec_GF2m_montgomery_point_multiply(const EC_GROUP *group, EC_POINT *r, const BIGNUM *scalar, const EC_POINT *point, BN_CTX *ctx) { BIGNUM *x1, *x2, *z1, *z2; int ret = 0, i; BN_ULONG mask,word; if (r == point) { ECerr(EC_F_EC_GF2M_MONTGOMERY_POINT_MULTIPLY, EC_R_INVALID_ARGUMENT); return 0; } ...
324,336,876,446,221,280,000,000,000,000,000,000,000
None
null
[ "CWE-310" ]
CVE-2014-0076
The Montgomery ladder implementation in OpenSSL through 1.0.0l does not ensure that certain swap operations have a constant-time behavior, which makes it easier for local users to obtain ECDSA nonces via a FLUSH+RELOAD cache side-channel attack.
https://nvd.nist.gov/vuln/detail/CVE-2014-0076
216,354
openssl
006cd7083f76ed5cb0d9a914857e9231ef1bc317
https://github.com/openssl/openssl
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=006cd7083f76ed5cb0d9a914857e9231ef1bc317
Additional CVE-2014-0224 protection. Return a fatal error if an attempt is made to use a zero length master secret.
1
int ssl3_do_change_cipher_spec(SSL *s) { int i; const char *sender; int slen; if (s->state & SSL_ST_ACCEPT) i=SSL3_CHANGE_CIPHER_SERVER_READ; else i=SSL3_CHANGE_CIPHER_CLIENT_READ; if (s->s3->tmp.key_block == NULL) { if (s->session == NULL) { /* might happen if dtls1_read_bytes() calls this */ ...
98,411,911,279,321,300,000,000,000,000,000,000,000
None
null
[ "CWE-326" ]
CVE-2014-0224
OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive ...
https://nvd.nist.gov/vuln/detail/CVE-2014-0224
175,178
openssl
feba02f3919495e1b960c33ba849e10e77d0785d
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/feba02f3919495e1b960c33ba849e10e77d0785d
Fix crash in dtls1_get_record whilst in the listen state where you get two separate reads performed - one for the header and one for the body of the handshake record. CVE-2014-3571 Reviewed-by: Matt Caswell <matt@openssl.org>
0
int ssl3_do_change_cipher_spec(SSL *s) { int i; const char *sender; int slen; if (s->state & SSL_ST_ACCEPT) i=SSL3_CHANGE_CIPHER_SERVER_READ; else i=SSL3_CHANGE_CIPHER_CLIENT_READ; if (s->s3->tmp.key_block == NULL) { if (s->session == NULL || s->session->master_key_length == 0) { /* might happen ...
301,520,913,552,968,440,000,000,000,000,000,000,000
None
null
[ "NVD-CWE-Other" ]
CVE-2014-3571
OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted DTLS message that is processed with a different read operation for the handshake header than for the handshake body, related to the dtl...
https://nvd.nist.gov/vuln/detail/CVE-2014-3571
216,359
openssl
897169fdf06bf75b4d0c503d61abb45656dd90a6
https://github.com/openssl/openssl
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=897169fdf06bf75b4d0c503d61abb45656dd90a6
Additional CVE-2014-0224 protection. Return a fatal error if an attempt is made to use a zero length master secret.
1
int ssl3_do_change_cipher_spec(SSL *s) { int i; const char *sender; int slen; if (s->state & SSL_ST_ACCEPT) i=SSL3_CHANGE_CIPHER_SERVER_READ; else i=SSL3_CHANGE_CIPHER_CLIENT_READ; if (s->s3->tmp.key_block == NULL) { if (s->session == NULL) { /* might happen if dtls1_read_bytes() calls this */ ...
28,308,454,817,544,945,000,000,000,000,000,000,000
None
null
[ "CWE-326" ]
CVE-2014-0224
OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive ...
https://nvd.nist.gov/vuln/detail/CVE-2014-0224
501,540
openssl
897169fdf06bf75b4d0c503d61abb45656dd90a6
https://github.com/openssl/openssl
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=897169fdf06bf75b4d0c503d61abb45656dd90a6
Additional CVE-2014-0224 protection. Return a fatal error if an attempt is made to use a zero length master secret.
0
int ssl3_do_change_cipher_spec(SSL *s) { int i; const char *sender; int slen; if (s->state & SSL_ST_ACCEPT) i=SSL3_CHANGE_CIPHER_SERVER_READ; else i=SSL3_CHANGE_CIPHER_CLIENT_READ; if (s->s3->tmp.key_block == NULL) { if (s->session == NULL || s->session->master_key_length == 0) { /* might happen ...
317,254,645,209,288,450,000,000,000,000,000,000,000
None
null
[ "CWE-326" ]
CVE-2014-0224
OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive ...
https://nvd.nist.gov/vuln/detail/CVE-2014-0224
216,452
openssl
2ed80d14d7159de7b52c7720128459e8c24a94d5
https://github.com/openssl/openssl
https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=2ed80d14d7159de7b52c7720128459e8c24a94d5
Fix for session tickets memory leak. CVE-2014-3567 Reviewed-by: Rich Salz <rsalz@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (cherry picked from commit 90e53055939db40cf0fac1ad0c59630280aeee86)
1
static int tls_decrypt_ticket(SSL *s, const unsigned char *etick, int eticklen, const unsigned char *sess_id, int sesslen, SSL_SESSION **psess) { SSL_SESSION *sess; unsigned char *sdec; const unsigned char *p; int slen, mlen, renew_ticket = 0; unsigned char tick_hmac[EVP_MAX_MD_SIZE]; HMAC_CTX hctx; EVP...
40,711,749,733,511,063,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2014-3567
Memory leak in the tls_decrypt_ticket function in t1_lib.c in OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted session ticket that triggers an integrity-check failure.
https://nvd.nist.gov/vuln/detail/CVE-2014-3567
502,025
openssl
2ed80d14d7159de7b52c7720128459e8c24a94d5
https://github.com/openssl/openssl
https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=2ed80d14d7159de7b52c7720128459e8c24a94d5
Fix for session tickets memory leak. CVE-2014-3567 Reviewed-by: Rich Salz <rsalz@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (cherry picked from commit 90e53055939db40cf0fac1ad0c59630280aeee86)
0
static int tls_decrypt_ticket(SSL *s, const unsigned char *etick, int eticklen, const unsigned char *sess_id, int sesslen, SSL_SESSION **psess) { SSL_SESSION *sess; unsigned char *sdec; const unsigned char *p; int slen, mlen, renew_ticket = 0; unsigned char tick_hmac[EVP_MAX_MD_SIZE]; HMAC_CTX hctx; EVP...
8,541,192,164,585,383,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2014-3567
Memory leak in the tls_decrypt_ticket function in t1_lib.c in OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted session ticket that triggers an integrity-check failure.
https://nvd.nist.gov/vuln/detail/CVE-2014-3567
216,457
librsvg
40af93e6eb1c94b90c3b9a0b87e0840e126bb8df
https://github.com/GNOME/librsvg
https://git.gnome.org/browse/librsvg/commit/?id=40af93e6eb1c94b90c3b9a0b87e0840e126bb8df
bgo#738050 - Handle the case where a list of coordinate pairs has an odd number of elements Lists of points come in coordinate pairs, but we didn't have any checking for that. It was possible to try to fetch the 'last' coordinate in a list, i.e. the y coordinate of an x,y pair, that was in fact missing, leading to an ...
1
_rsvg_node_poly_build_path (const char *value, gboolean close_path) { double *pointlist; guint pointlist_len, i; GString *d; cairo_path_t *path; char buf[G_ASCII_DTOSTR_BUF_SIZE]; pointlist = rsvg_css_parse_number_list (value, &pointlist_len); if (pointlist == NU...
125,965,033,795,776,590,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2014-7904
Buffer overflow in Skia, as used in Google Chrome before 39.0.2171.65, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
https://nvd.nist.gov/vuln/detail/CVE-2014-7904
502,039
librsvg
40af93e6eb1c94b90c3b9a0b87e0840e126bb8df
https://github.com/GNOME/librsvg
https://git.gnome.org/browse/librsvg/commit/?id=40af93e6eb1c94b90c3b9a0b87e0840e126bb8df
bgo#738050 - Handle the case where a list of coordinate pairs has an odd number of elements Lists of points come in coordinate pairs, but we didn't have any checking for that. It was possible to try to fetch the 'last' coordinate in a list, i.e. the y coordinate of an x,y pair, that was in fact missing, leading to an ...
0
_rsvg_node_poly_build_path (const char *value, gboolean close_path) { double *pointlist; guint pointlist_len, i; GString *d; cairo_path_t *path; char buf[G_ASCII_DTOSTR_BUF_SIZE]; pointlist = rsvg_css_parse_number_list (value, &pointlist_len); if (pointlist == NU...
154,460,730,062,486,610,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2014-7904
Buffer overflow in Skia, as used in Google Chrome before 39.0.2171.65, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
https://nvd.nist.gov/vuln/detail/CVE-2014-7904
216,469
openssl
72f181539118828ca966a0f8d03f6428e2bcf0d6
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/72f181539118828ca966a0f8d03f6428e2bcf0d6
Only allow ephemeral RSA keys in export ciphersuites. OpenSSL clients would tolerate temporary RSA keys in non-export ciphersuites. It also had an option SSL_OP_EPHEMERAL_RSA which enabled this server side. Remove both options as they are a protocol violation. Thanks to Karthikeyan Bhargavan for reporting this issue....
1
int ssl3_get_key_exchange(SSL *s) { #ifndef OPENSSL_NO_RSA unsigned char *q,md_buf[EVP_MAX_MD_SIZE*2]; #endif EVP_MD_CTX md_ctx; unsigned char *param,*p; int al,j,ok; long i,param_len,n,alg; EVP_PKEY *pkey=NULL; #ifndef OPENSSL_NO_RSA RSA *rsa=NULL; #endif #ifndef OPENSSL_NO_DH DH *dh=NULL; #endif #ifndef OPEN...
239,894,095,986,458,470,000,000,000,000,000,000,000
None
null
[ "CWE-310" ]
CVE-2015-0204
The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct RSA-to-EXPORT_RSA downgrade attacks and facilitate brute-force decryption by offering a weak ephemeral RSA key in a noncompliant role, related to the "FREAK" issue...
https://nvd.nist.gov/vuln/detail/CVE-2015-0204
502,074
openssl
72f181539118828ca966a0f8d03f6428e2bcf0d6
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/72f181539118828ca966a0f8d03f6428e2bcf0d6
Only allow ephemeral RSA keys in export ciphersuites. OpenSSL clients would tolerate temporary RSA keys in non-export ciphersuites. It also had an option SSL_OP_EPHEMERAL_RSA which enabled this server side. Remove both options as they are a protocol violation. Thanks to Karthikeyan Bhargavan for reporting this issue....
0
int ssl3_get_key_exchange(SSL *s) { #ifndef OPENSSL_NO_RSA unsigned char *q,md_buf[EVP_MAX_MD_SIZE*2]; #endif EVP_MD_CTX md_ctx; unsigned char *param,*p; int al,j,ok; long i,param_len,n,alg; EVP_PKEY *pkey=NULL; #ifndef OPENSSL_NO_RSA RSA *rsa=NULL; #endif #ifndef OPENSSL_NO_DH DH *dh=NULL; #endif #ifndef OPEN...
3,717,788,806,990,836,000,000,000,000,000,000,000
None
null
[ "CWE-310" ]
CVE-2015-0204
The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct RSA-to-EXPORT_RSA downgrade attacks and facilitate brute-force decryption by offering a weak ephemeral RSA key in a noncompliant role, related to the "FREAK" issue...
https://nvd.nist.gov/vuln/detail/CVE-2015-0204
216,471
openssl
37580f43b5a39f5f4e920d17273fab9713d3a744
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/37580f43b5a39f5f4e920d17273fab9713d3a744
Only allow ephemeral RSA keys in export ciphersuites. OpenSSL clients would tolerate temporary RSA keys in non-export ciphersuites. It also had an option SSL_OP_EPHEMERAL_RSA which enabled this server side. Remove both options as they are a protocol violation. Thanks to Karthikeyan Bhargavan for reporting this issue....
1
int ssl3_get_key_exchange(SSL *s) { #ifndef OPENSSL_NO_RSA unsigned char *q,md_buf[EVP_MAX_MD_SIZE*2]; #endif EVP_MD_CTX md_ctx; unsigned char *param,*p; int al,j,ok; long i,param_len,n,alg_k,alg_a; EVP_PKEY *pkey=NULL; const EVP_MD *md = NULL; #ifndef OPENSSL_NO_RSA RSA *rsa=NULL; #endif #ifndef OPENSSL_NO_DH...
338,742,367,262,154,950,000,000,000,000,000,000,000
None
null
[ "CWE-310" ]
CVE-2015-0204
The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct RSA-to-EXPORT_RSA downgrade attacks and facilitate brute-force decryption by offering a weak ephemeral RSA key in a noncompliant role, related to the "FREAK" issue...
https://nvd.nist.gov/vuln/detail/CVE-2015-0204
502,086
openssl
37580f43b5a39f5f4e920d17273fab9713d3a744
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/37580f43b5a39f5f4e920d17273fab9713d3a744
Only allow ephemeral RSA keys in export ciphersuites. OpenSSL clients would tolerate temporary RSA keys in non-export ciphersuites. It also had an option SSL_OP_EPHEMERAL_RSA which enabled this server side. Remove both options as they are a protocol violation. Thanks to Karthikeyan Bhargavan for reporting this issue....
0
int ssl3_get_key_exchange(SSL *s) { #ifndef OPENSSL_NO_RSA unsigned char *q,md_buf[EVP_MAX_MD_SIZE*2]; #endif EVP_MD_CTX md_ctx; unsigned char *param,*p; int al,j,ok; long i,param_len,n,alg_k,alg_a; EVP_PKEY *pkey=NULL; const EVP_MD *md = NULL; #ifndef OPENSSL_NO_RSA RSA *rsa=NULL; #endif #ifndef OPENSSL_NO_DH...
308,464,899,959,723,500,000,000,000,000,000,000,000
None
null
[ "CWE-310" ]
CVE-2015-0204
The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct RSA-to-EXPORT_RSA downgrade attacks and facilitate brute-force decryption by offering a weak ephemeral RSA key in a noncompliant role, related to the "FREAK" issue...
https://nvd.nist.gov/vuln/detail/CVE-2015-0204
216,511
openssl
fa57f74a3941db6b2efb2f43c6add914ec83db20
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/fa57f74a3941db6b2efb2f43c6add914ec83db20
Fix length checks in X509_cmp_time to avoid out-of-bounds reads. Also tighten X509_cmp_time to reject more than three fractional seconds in the time; and to reject trailing garbage after the offset. CVE-2015-1789 Reviewed-by: Viktor Dukhovni <viktor@openssl.org> Reviewed-by: Richard Levitte <levitte@openssl.org>
1
int X509_cmp_time(ASN1_TIME *ctm, time_t *cmp_time) { char *str; ASN1_TIME atm; long offset; char buff1[24], buff2[24], *p; int i, j; p = buff1; i = ctm->length; str = (char *)ctm->data; if (ctm->type == V_ASN1_UTCTIME) { if ((i < 11) || (i > 17)) return 0; ...
90,751,591,921,006,810,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2015-1789
The X509_cmp_time function in crypto/x509/x509_vfy.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted length field in ASN1_TIME data, as demonstrated by an attack aga...
https://nvd.nist.gov/vuln/detail/CVE-2015-1789
502,652
openssl
fa57f74a3941db6b2efb2f43c6add914ec83db20
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/fa57f74a3941db6b2efb2f43c6add914ec83db20
Fix length checks in X509_cmp_time to avoid out-of-bounds reads. Also tighten X509_cmp_time to reject more than three fractional seconds in the time; and to reject trailing garbage after the offset. CVE-2015-1789 Reviewed-by: Viktor Dukhovni <viktor@openssl.org> Reviewed-by: Richard Levitte <levitte@openssl.org>
0
int X509_cmp_time(ASN1_TIME *ctm, time_t *cmp_time) { char *str; ASN1_TIME atm; long offset; char buff1[24], buff2[24], *p; int i, j, remaining; p = buff1; remaining = ctm->length; str = (char *)ctm->data; /* * Note that the following (historical) code allows much more slack in...
211,104,468,981,826,600,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2015-1789
The X509_cmp_time function in crypto/x509/x509_vfy.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted length field in ASN1_TIME data, as demonstrated by an attack aga...
https://nvd.nist.gov/vuln/detail/CVE-2015-1789
216,516
openssl
708cf593587e2fda67dae9782991ff9fccc781eb
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/708cf593587e2fda67dae9782991ff9fccc781eb
More ssl_session_dup fixes Fix error handling in ssl_session_dup, as well as incorrect setting up of the session ticket. Follow on from CVE-2015-1791. Thanks to LibreSSL project for reporting these issues. Reviewed-by: Tim Hudson <tjh@openssl.org>
1
SSL_SESSION *ssl_session_dup(SSL_SESSION *src, int ticket) { SSL_SESSION *dest; dest = OPENSSL_malloc(sizeof(*src)); if (dest == NULL) { goto err; } memcpy(dest, src, sizeof(*dest)); #ifndef OPENSSL_NO_PSK if (src->psk_identity_hint) { dest->psk_identity_hint = BUF_strdup(src->...
53,711,852,958,386,060,000,000,000,000,000,000,000
None
null
[ "CWE-362" ]
CVE-2015-1791
Race condition in the ssl3_get_new_session_ticket function in ssl/s3_clnt.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b, when used for a multi-threaded client, allows remote attackers to cause a denial of service (double free and application crash) or possibly have unspe...
https://nvd.nist.gov/vuln/detail/CVE-2015-1791
502,739
openssl
708cf593587e2fda67dae9782991ff9fccc781eb
https://github.com/openssl/openssl
https://github.com/openssl/openssl/commit/708cf593587e2fda67dae9782991ff9fccc781eb
More ssl_session_dup fixes Fix error handling in ssl_session_dup, as well as incorrect setting up of the session ticket. Follow on from CVE-2015-1791. Thanks to LibreSSL project for reporting these issues. Reviewed-by: Tim Hudson <tjh@openssl.org>
0
SSL_SESSION *ssl_session_dup(SSL_SESSION *src, int ticket) { SSL_SESSION *dest; dest = OPENSSL_malloc(sizeof(*src)); if (dest == NULL) { goto err; } memcpy(dest, src, sizeof(*dest)); /* * Set the various pointers to NULL so that we can call SSL_SESSION_free in * the case of a...
245,399,656,695,249,850,000,000,000,000,000,000,000
None
null
[ "CWE-362" ]
CVE-2015-1791
Race condition in the ssl3_get_new_session_ticket function in ssl/s3_clnt.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b, when used for a multi-threaded client, allows remote attackers to cause a denial of service (double free and application crash) or possibly have unspe...
https://nvd.nist.gov/vuln/detail/CVE-2015-1791
216,534
openssl
cf432b3b1bd7caa22943b41b94ec2472ae497dc6
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commit;h=cf432b3b1bd7caa22943b41b94ec2472ae497dc6
Fix leak with ASN.1 combine. When parsing a combined structure pass a flag to the decode routine so on error a pointer to the parent structure is not zeroed as this will leak any additional components in the parent. This can leak memory in any application parsing PKCS#7 or CMS structures. CVE-2015-3195. Thanks to A...
1
int ASN1_item_ex_d2i(ASN1_VALUE **pval, const unsigned char **in, long len, const ASN1_ITEM *it, int tag, int aclass, char opt, ASN1_TLC *ctx) { const ASN1_TEMPLATE *tt, *errtt = NULL; const ASN1_COMPAT_FUNCS *cf; const ASN1_EXTERN_FUNCS *ef; const ASN1_AUX *aux...
263,909,722,983,773,970,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2015-3195
The ASN1_TFLG_COMBINE implementation in crypto/asn1/tasn_dec.c in OpenSSL before 0.9.8zh, 1.0.0 before 1.0.0t, 1.0.1 before 1.0.1q, and 1.0.2 before 1.0.2e mishandles errors caused by malformed X509_ATTRIBUTE data, which allows remote attackers to obtain sensitive information from process memory by triggering a decodin...
https://nvd.nist.gov/vuln/detail/CVE-2015-3195
502,828
openssl
cf432b3b1bd7caa22943b41b94ec2472ae497dc6
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commit;h=cf432b3b1bd7caa22943b41b94ec2472ae497dc6
Fix leak with ASN.1 combine. When parsing a combined structure pass a flag to the decode routine so on error a pointer to the parent structure is not zeroed as this will leak any additional components in the parent. This can leak memory in any application parsing PKCS#7 or CMS structures. CVE-2015-3195. Thanks to A...
0
int ASN1_item_ex_d2i(ASN1_VALUE **pval, const unsigned char **in, long len, const ASN1_ITEM *it, int tag, int aclass, char opt, ASN1_TLC *ctx) { const ASN1_TEMPLATE *tt, *errtt = NULL; const ASN1_COMPAT_FUNCS *cf; const ASN1_EXTERN_FUNCS *ef; const ASN1_AUX *aux...
328,836,160,859,697,960,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2015-3195
The ASN1_TFLG_COMBINE implementation in crypto/asn1/tasn_dec.c in OpenSSL before 0.9.8zh, 1.0.0 before 1.0.0t, 1.0.1 before 1.0.1q, and 1.0.2 before 1.0.2e mishandles errors caused by malformed X509_ATTRIBUTE data, which allows remote attackers to obtain sensitive information from process memory by triggering a decodin...
https://nvd.nist.gov/vuln/detail/CVE-2015-3195
216,566
openssl
4040a7fd104b412bd446338c6c28a62eb7d8e852
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commitdiff;h=4040a7fd104b412bd446338c6c28a62eb7d8e852
Better SSLv2 cipher-suite enforcement Based on patch by: Nimrod Aviram <nimrod.aviram@gmail.com> CVE-2015-3197 Reviewed-by: Tim Hudson <tjh@openssl.org> Reviewed-by: Richard Levitte <levitte@openssl.org>
1
static int get_client_hello(SSL *s) { int i, n; unsigned long len; unsigned char *p; STACK_OF(SSL_CIPHER) *cs; /* a stack of SSL_CIPHERS */ STACK_OF(SSL_CIPHER) *cl; /* the ones we want to use */ STACK_OF(SSL_CIPHER) *prio, *allow; int z; /* * This is a bit of a hack to check f...
38,126,118,214,104,405,000,000,000,000,000,000,000
None
null
[ "CWE-310" ]
CVE-2015-3197
ssl/s2_srvr.c in OpenSSL 1.0.1 before 1.0.1r and 1.0.2 before 1.0.2f does not prevent use of disabled ciphers, which makes it easier for man-in-the-middle attackers to defeat cryptographic protection mechanisms by performing computations on SSLv2 traffic, related to the get_client_master_key and get_client_hello functi...
https://nvd.nist.gov/vuln/detail/CVE-2015-3197
503,113
openssl
4040a7fd104b412bd446338c6c28a62eb7d8e852
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commitdiff;h=4040a7fd104b412bd446338c6c28a62eb7d8e852
Better SSLv2 cipher-suite enforcement Based on patch by: Nimrod Aviram <nimrod.aviram@gmail.com> CVE-2015-3197 Reviewed-by: Tim Hudson <tjh@openssl.org> Reviewed-by: Richard Levitte <levitte@openssl.org>
0
static int get_client_hello(SSL *s) { int i, n; unsigned long len; unsigned char *p; STACK_OF(SSL_CIPHER) *cs; /* a stack of SSL_CIPHERS */ STACK_OF(SSL_CIPHER) *cl; /* the ones we want to use */ STACK_OF(SSL_CIPHER) *prio, *allow; int z; /* * This is a bit of a hack to check f...
133,264,326,909,688,220,000,000,000,000,000,000,000
None
null
[ "CWE-310" ]
CVE-2015-3197
ssl/s2_srvr.c in OpenSSL 1.0.1 before 1.0.1r and 1.0.2 before 1.0.2f does not prevent use of disabled ciphers, which makes it easier for man-in-the-middle attackers to defeat cryptographic protection mechanisms by performing computations on SSLv2 traffic, related to the get_client_master_key and get_client_hello functi...
https://nvd.nist.gov/vuln/detail/CVE-2015-3197
216,567
server
f0d774d48416bb06063184380b684380ca005a41
https://github.com/MariaDB/server
https://github.com/MariaDB/server/commit/f0d774d48416bb06063184380b684380ca005a41
MDEV-9212 ssl-validate-cert incorrect hostname check Reimplement ssl_verify_server_cert() using the logic from https://wiki.openssl.org/index.php/Hostname_validation The bug was discovered by Alex Gaynor.
1
static int ssl_verify_server_cert(Vio *vio, const char* server_hostname, const char **errptr) { SSL *ssl; X509 *server_cert; char *cp1, *cp2; char *buf; DBUG_ENTER("ssl_verify_server_cert"); DBUG_PRINT("enter", ("server_hostname: %s", server_hostname)); if (!(ssl= (SSL*)vio->ssl_arg)) { *errptr= "N...
39,185,740,081,848,935,000,000,000,000,000,000,000
None
null
[ "CWE-254" ]
CVE-2016-2047
The ssl_verify_server_cert function in sql-common/client.c in MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10; Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier; and Percona Server do not properly verify that the server hostname matches a domain name in the subject's Co...
https://nvd.nist.gov/vuln/detail/CVE-2016-2047
503,134
server
f0d774d48416bb06063184380b684380ca005a41
https://github.com/MariaDB/server
https://github.com/MariaDB/server/commit/f0d774d48416bb06063184380b684380ca005a41
MDEV-9212 ssl-validate-cert incorrect hostname check Reimplement ssl_verify_server_cert() using the logic from https://wiki.openssl.org/index.php/Hostname_validation The bug was discovered by Alex Gaynor.
0
static int ssl_verify_server_cert(Vio *vio, const char* server_hostname, const char **errptr) { SSL *ssl; X509 *server_cert; X509_NAME *x509sn; int cn_pos; X509_NAME_ENTRY *cn_entry; ASN1_STRING *cn_asn1; const char *cn_str; DBUG_ENTER("ssl_verify_server_cert"); DBUG_PRINT("enter", ("server_hostname: ...
109,669,441,192,962,960,000,000,000,000,000,000,000
None
null
[ "CWE-254" ]
CVE-2016-2047
The ssl_verify_server_cert function in sql-common/client.c in MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10; Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier; and Percona Server do not properly verify that the server hostname matches a domain name in the subject's Co...
https://nvd.nist.gov/vuln/detail/CVE-2016-2047
216,569
openssl
56f1acf5ef8a432992497a04792ff4b3b2c6f286
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commitdiff;h=56f1acf5ef8a432992497a04792ff4b3b2c6f286
Disable SSLv2 default build, default negotiation and weak ciphers. SSLv2 is by default disabled at build-time. Builds that are not configured with "enable-ssl2" will not support SSLv2. Even if "enable-ssl2" is used, users who want to negotiate SSLv2 via the version-flexible SSLv23_method() will need to explicitly ca...
1
SSL_CTX *SSL_CTX_new(const SSL_METHOD *meth) { SSL_CTX *ret = NULL; if (meth == NULL) { SSLerr(SSL_F_SSL_CTX_NEW, SSL_R_NULL_SSL_METHOD_PASSED); return (NULL); } #ifdef OPENSSL_FIPS if (FIPS_mode() && (meth->version < TLS1_VERSION)) { SSLerr(SSL_F_SSL_CTX_NEW, SSL_R_ONLY_TLS_ALL...
168,611,592,344,533,550,000,000,000,000,000,000,000
None
null
[ "CWE-310" ]
CVE-2016-0800
The SSLv2 protocol, as used in OpenSSL before 1.0.1s and 1.0.2 before 1.0.2g and other products, requires a server to send a ServerVerify message before establishing that a client possesses certain plaintext RSA data, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbach...
https://nvd.nist.gov/vuln/detail/CVE-2016-0800
503,195
openssl
56f1acf5ef8a432992497a04792ff4b3b2c6f286
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commitdiff;h=56f1acf5ef8a432992497a04792ff4b3b2c6f286
Disable SSLv2 default build, default negotiation and weak ciphers. SSLv2 is by default disabled at build-time. Builds that are not configured with "enable-ssl2" will not support SSLv2. Even if "enable-ssl2" is used, users who want to negotiate SSLv2 via the version-flexible SSLv23_method() will need to explicitly ca...
0
SSL_CTX *SSL_CTX_new(const SSL_METHOD *meth) { SSL_CTX *ret = NULL; if (meth == NULL) { SSLerr(SSL_F_SSL_CTX_NEW, SSL_R_NULL_SSL_METHOD_PASSED); return (NULL); } #ifdef OPENSSL_FIPS if (FIPS_mode() && (meth->version < TLS1_VERSION)) { SSLerr(SSL_F_SSL_CTX_NEW, SSL_R_ONLY_TLS_ALL...
282,725,754,377,997,300,000,000,000,000,000,000,000
None
null
[ "CWE-310" ]
CVE-2016-0800
The SSLv2 protocol, as used in OpenSSL before 1.0.1s and 1.0.2 before 1.0.2g and other products, requires a server to send a ServerVerify message before establishing that a client possesses certain plaintext RSA data, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbach...
https://nvd.nist.gov/vuln/detail/CVE-2016-0800
216,574
openssl
8fc8f486f7fa098c9fbb6a6ae399e3c6856e0d87
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commitdiff;h=8fc8f486f7fa098c9fbb6a6ae399e3c6856e0d87
crypto/bn/x86_64-mont5.pl: constant-time gather procedure. At the same time remove miniscule bias in final subtraction. Performance penalty varies from platform to platform, and even with key length. For rsa2048 sign it was observed to be 4% for Sandy Bridge and 7% on Broadwell. CVE-2016-0702 Reviewed-by: Richard Le...
1
int BN_mod_exp_mont_consttime(BIGNUM *rr, const BIGNUM *a, const BIGNUM *p, const BIGNUM *m, BN_CTX *ctx, BN_MONT_CTX *in_mont) { int i, bits, ret = 0, window, wvalue; int top; BN_MONT_CTX *mont = NULL; int numPowers; unsigned char *powerb...
257,014,971,242,853,200,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2016-0702
The MOD_EXP_CTIME_COPY_FROM_PREBUF function in crypto/bn/bn_exp.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g does not properly consider cache-bank access times during modular exponentiation, which makes it easier for local users to discover RSA keys by running a crafted application on the same Intel Sandy B...
https://nvd.nist.gov/vuln/detail/CVE-2016-0702
503,357
openssl
8fc8f486f7fa098c9fbb6a6ae399e3c6856e0d87
https://github.com/openssl/openssl
https://git.openssl.org/?p=openssl.git;a=commitdiff;h=8fc8f486f7fa098c9fbb6a6ae399e3c6856e0d87
crypto/bn/x86_64-mont5.pl: constant-time gather procedure. At the same time remove miniscule bias in final subtraction. Performance penalty varies from platform to platform, and even with key length. For rsa2048 sign it was observed to be 4% for Sandy Bridge and 7% on Broadwell. CVE-2016-0702 Reviewed-by: Richard Le...
0
int BN_mod_exp_mont_consttime(BIGNUM *rr, const BIGNUM *a, const BIGNUM *p, const BIGNUM *m, BN_CTX *ctx, BN_MONT_CTX *in_mont) { int i, bits, ret = 0, window, wvalue; int top; BN_MONT_CTX *mont = NULL; int numPowers; unsigned char *powerb...
211,104,678,558,070,900,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2016-0702
The MOD_EXP_CTIME_COPY_FROM_PREBUF function in crypto/bn/bn_exp.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g does not properly consider cache-bank access times during modular exponentiation, which makes it easier for local users to discover RSA keys by running a crafted application on the same Intel Sandy B...
https://nvd.nist.gov/vuln/detail/CVE-2016-0702
216,577
openssl
380f18ed5f140e0ae1b68f3ab8f4f7c395658d9e
https://github.com/openssl/openssl
http://git.openssl.org/?p=openssl.git;a=commitdiff;h=380f18ed5f140e0ae1b68f3ab8f4f7c395658d9e
CVE-2016-0798: avoid memory leak in SRP The SRP user database lookup method SRP_VBASE_get_by_user had confusing memory management semantics; the returned pointer was sometimes newly allocated, and sometimes owned by the callee. The calling code has no way of distinguishing these two cases. Specifically, SRP servers t...
1
SRP_user_pwd *SRP_VBASE_get_by_user(SRP_VBASE *vb, char *username) { int i; SRP_user_pwd *user; unsigned char digv[SHA_DIGEST_LENGTH]; unsigned char digs[SHA_DIGEST_LENGTH]; EVP_MD_CTX *ctxt = NULL; if (vb == NULL) return NULL; for (i = 0; i < sk_SRP_user_pwd_num(vb->users_pwd); i++...
315,632,142,932,209,800,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2016-0798
Memory leak in the SRP_VBASE_get_by_user implementation in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allows remote attackers to cause a denial of service (memory consumption) by providing an invalid username in a connection attempt, related to apps/s_server.c and crypto/srp/srp_vfy.c.
https://nvd.nist.gov/vuln/detail/CVE-2016-0798