idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
9,530 | ImageMagick | 53c1dcd34bed85181b901bfce1a2322f85a59472 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/53c1dcd34bed85181b901bfce1a2322f85a59472 | None | 1 | static void RemoveICCProfileFromResourceBlock(StringInfo *bim_profile)
{
register const unsigned char
*p;
size_t
length;
unsigned char
*datum;
unsigned int
count,
long_sans;
unsigned short
id,
short_sans;
length=GetStringInfoLength(bim_profile);
if (length < 16)
return... | 189,144,678,419,063,640,000,000,000,000,000,000,000 | psd.c | 171,607,370,422,252,440,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2016-7538 | coders/psd.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2016-7538 |
9,532 | ImageMagick | 4b1b9c0522628887195bad3a6723f7000b0c9a58 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/4b1b9c0522628887195bad3a6723f7000b0c9a58 | Added extra check to fix https://github.com/ImageMagick/ImageMagick/issues/93 | 1 | static Image *ReadPSDImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
Image
*image;
MagickBooleanType
has_merged_image,
skip_layers;
MagickOffsetType
offset;
MagickSizeType
length;
MagickBooleanType
status;
PSDInfo
psd_info;
register ssize_t
i;
ssize_t... | 211,643,997,121,185,530,000,000,000,000,000,000,000 | psd.c | 210,776,347,083,540,080,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2016-7522 | The ReadPSDImage function in MagickCore/locale.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PSD file. | https://nvd.nist.gov/vuln/detail/CVE-2016-7522 |
9,533 | pupnp-code | be0a01bdb83395d9f3a5ea09c1308a4f1a972cbd | https://github.com/mjg59/pupnp-code | https://github.com/mjg59/pupnp-code/commit/be0a01bdb83395d9f3a5ea09c1308a4f1a972cbd | Don't allow unhandled POSTs to write to the filesystem by default
If there's no registered handler for a POST request, the default behaviour
is to write it to the filesystem. Several million deployed devices appear
to have this behaviour, making it possible to (at least) store arbitrary
data on them. Add a configure o... | 1 | static int http_RecvPostMessage(
/*! HTTP Parser object. */
http_parser_t *parser,
/*! [in] Socket Information object. */
SOCKINFO *info,
/*! File where received data is copied to. */
char *filename,
/*! Send Instruction object which gives information whether the file
* is a virtual file or not. */
struct Sen... | 172,421,084,346,481,900,000,000,000,000,000,000,000 | webserver.c | 294,353,686,090,577,800,000,000,000,000,000,000,000 | [
"CWE-284"
] | CVE-2016-6255 | Portable UPnP SDK (aka libupnp) before 1.6.21 allows remote attackers to write to arbitrary files in the webroot via a POST request without a registered handler. | https://nvd.nist.gov/vuln/detail/CVE-2016-6255 |
9,535 | ImageMagick | bd96074b254c6607a0f7731e59f923ad19d5a46d | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/bd96074b254c6607a0f7731e59f923ad19d5a46d | http://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=26848 | 1 | static Image *ReadSUNImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
#define RMT_EQUAL_RGB 1
#define RMT_NONE 0
#define RMT_RAW 2
#define RT_STANDARD 1
#define RT_ENCODED 2
#define RT_FORMAT_RGB 3
typedef struct _SUNInfo
{
unsigned int
magic,
width,
height,
depth,
... | 223,671,316,596,223,770,000,000,000,000,000,000,000 | sun.c | 234,907,776,145,379,860,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2015-8957 | Buffer overflow in ImageMagick before 6.9.0-4 Beta allows remote attackers to cause a denial of service (application crash) via a crafted SUN file. | https://nvd.nist.gov/vuln/detail/CVE-2015-8957 |
9,536 | libdwarf | 11750a2838e52953013e3114ef27b3c7b1780697 | https://github.com/tomhughes/libdwarf | https://github.com/tomhughes/libdwarf/commit/11750a2838e52953013e3114ef27b3c7b1780697 | None | 1 | dwarf_elf_object_access_load_section(void* obj_in,
Dwarf_Half section_index,
Dwarf_Small** section_data,
int* error)
{
dwarf_elf_object_access_internals_t*obj =
(dwarf_elf_object_access_internals_t*)obj_in;
if (section_index == 0) {
return DW_DLV_NO_ENTRY;
}
{
Elf_... | 121,953,510,839,817,200,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2015-8750 | libdwarf 20151114 and earlier allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a debug_abbrev section marked NOBITS in an ELF file. | https://nvd.nist.gov/vuln/detail/CVE-2015-8750 |
9,544 | linux | fc0a80798576f80ca10b3f6c9c7097f12fd1d64e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/fc0a80798576f80ca10b3f6c9c7097f12fd1d64e | [media] v4l: Share code between video_usercopy and video_ioctl2
The two functions are mostly identical. They handle the copy_from_user
and copy_to_user operations related with V4L2 ioctls and call the real
ioctl handler.
Create a __video_usercopy function that implements the core of
video_usercopy and video_ioctl2, a... | 1 | video_usercopy(struct file *file, unsigned int cmd, unsigned long arg,
v4l2_kioctl func)
{
char sbuf[128];
void *mbuf = NULL;
void *parg = NULL;
long err = -EINVAL;
int is_ext_ctrl;
size_t ctrls_size = 0;
void __user *user_ptr = NULL;
is_ext_ctrl = (cmd == VIDIOC_S_EXT_CTRLS || cmd == VIDIOC_G_EXT_CT... | 301,806,867,333,767,700,000,000,000,000,000,000,000 | v4l2-ioctl.c | 39,902,839,306,685,947,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2010-5329 | The video_usercopy function in drivers/media/video/v4l2-ioctl.c in the Linux kernel before 2.6.39 relies on the count value of a v4l2_ext_controls data structure to determine a kmalloc size, which might allow local users to cause a denial of service (memory consumption) via a large value. | https://nvd.nist.gov/vuln/detail/CVE-2010-5329 |
9,545 | linux | 6c4841c2b6c32a134f9f36e5e08857138cc12b10 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6c4841c2b6c32a134f9f36e5e08857138cc12b10 | [POWERPC] Never panic when taking altivec exceptions from userspace
At the moment we rely on a cpu feature bit or a firmware property to
detect altivec. If we dont have either of these and the cpu does in fact
support altivec we can cause a panic from userspace.
It seems safer to always send a signal if we manage to ... | 1 | void altivec_unavailable_exception(struct pt_regs *regs)
{
#if !defined(CONFIG_ALTIVEC)
if (user_mode(regs)) {
/* A user program has executed an altivec instruction,
but this kernel doesn't support altivec. */
_exception(SIGILL, regs, ILL_ILLOPC, regs->nip);
return;
}
#endif
printk(KERN_EMERG "Un... | 86,528,045,310,394,810,000,000,000,000,000,000,000 | traps.c | 305,004,121,217,082,200,000,000,000,000,000,000 | [
"CWE-19"
] | CVE-2006-5331 | The altivec_unavailable_exception function in arch/powerpc/kernel/traps.c in the Linux kernel before 2.6.19 on 64-bit systems mishandles the case where CONFIG_ALTIVEC is defined and the CPU actually supports Altivec, but the Altivec support was not detected by the kernel, which allows local users to cause a denial of s... | https://nvd.nist.gov/vuln/detail/CVE-2006-5331 |
9,546 | linux | 4dcc29e1574d88f4465ba865ed82800032f76418 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/4dcc29e1574d88f4465ba865ed82800032f76418 | [IA64] Workaround for RSE issue
Problem: An application violating the architectural rules regarding
operation dependencies and having specific Register Stack Engine (RSE)
state at the time of the violation, may result in an illegal operation
fault and invalid RSE state. Such faults may initiate a cascade of
repeated ... | 1 | setup_arch (char **cmdline_p)
{
unw_init();
ia64_patch_vtop((u64) __start___vtop_patchlist, (u64) __end___vtop_patchlist);
*cmdline_p = __va(ia64_boot_param->command_line);
strlcpy(boot_command_line, *cmdline_p, COMMAND_LINE_SIZE);
efi_init();
io_port_init();
#ifdef CONFIG_IA64_GENERIC
/* machvec needs to be... | 30,744,359,066,288,716,000,000,000,000,000,000,000 | setup.c | 23,788,835,942,018,467,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2006-3635 | The ia64 subsystem in the Linux kernel before 2.6.26 allows local users to cause a denial of service (stack consumption and system crash) via a crafted application that leverages the mishandling of invalid Register Stack Engine (RSE) state. | https://nvd.nist.gov/vuln/detail/CVE-2006-3635 |
9,547 | FFmpeg | bab0716c7f4793ec42e05a5aa7e80d82a0dd4e75 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/bab0716c7f4793ec42e05a5aa7e80d82a0dd4e75 | avformat/mxfdec: Fix av_log context
Fixes: out of array access
Fixes: mxf-crash-1c2e59bf07a34675bfb3ada5e1ec22fa9f38f923
Found-by: Paul Ch <paulcher@icloud.com>
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 1 | static int mxf_parse_structural_metadata(MXFContext *mxf)
{
MXFPackage *material_package = NULL;
int i, j, k, ret;
av_log(mxf->fc, AV_LOG_TRACE, "metadata sets count %d\n", mxf->metadata_sets_count);
/* TODO: handle multiple material packages (OP3x) */
for (i = 0; i < mxf->packages_count; i++) {
... | 202,689,793,885,959,200,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2018-1999014 | FFmpeg before commit bab0716c7f4793ec42e05a5aa7e80d82a0dd4e75 contains an out of array access vulnerability in MXF format demuxer that can result in DoS. This attack appear to be exploitable via specially crafted MXF file which has to be provided as input. This vulnerability appears to have been fixed in bab0716c7f4793... | https://nvd.nist.gov/vuln/detail/CVE-2018-1999014 |
9,548 | linux | 704620afc70cf47abb9d6a1a57f3825d2bca49cf | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/704620afc70cf47abb9d6a1a57f3825d2bca49cf | USB: check usb_get_extra_descriptor for proper size
When reading an extra descriptor, we need to properly check the minimum
and maximum size allowed, to prevent from invalid data being sent by a
device.
Reported-by: Hui Peng <benquike@gmail.com>
Reported-by: Mathias Payer <mathias.payer@nebelwelt.net>
Co-developed-by... | 1 | int __usb_get_extra_descriptor(char *buffer, unsigned size,
unsigned char type, void **ptr)
{
struct usb_descriptor_header *header;
while (size >= sizeof(struct usb_descriptor_header)) {
header = (struct usb_descriptor_header *)buffer;
if (header->bLength < 2) {
printk(KERN_ERR
"%s: bo... | 106,931,598,352,293,150,000,000,000,000,000,000,000 | None | null | [
"CWE-400"
] | CVE-2018-20169 | An issue was discovered in the Linux kernel before 4.19.9. The USB subsystem mishandles size checks during the reading of an extra descriptor, related to __usb_get_extra_descriptor in drivers/usb/core/usb.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-20169 |
9,553 | ImageMagick | 76efa969342568841ecf320b5a041685a6d24e0b | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/76efa969342568841ecf320b5a041685a6d24e0b | https://github.com/ImageMagick/ImageMagick/issues/1201 | 1 | static Image *ReadOneJNGImage(MngInfo *mng_info,
const ImageInfo *image_info, ExceptionInfo *exception)
{
Image
*alpha_image,
*color_image,
*image,
*jng_image;
ImageInfo
*alpha_image_info,
*color_image_info;
MagickBooleanType
logging;
ssize_t
y;
MagickBooleanType
st... | 222,028,886,100,808,540,000,000,000,000,000,000,000 | png.c | 142,721,393,521,923,200,000,000,000,000,000,000,000 | [
"CWE-772"
] | CVE-2018-16640 | ImageMagick 7.0.8-5 has a memory leak vulnerability in the function ReadOneJNGImage in coders/png.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-16640 |
9,558 | OpenSC | 360e95d45ac4123255a4c796db96337f332160ad | https://github.com/OpenSC/OpenSC | https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-477b7a40136bb418b10ce271c8664536 | fixed out of bounds writes
Thanks to Eric Sesterhenn from X41 D-SEC GmbH
for reporting the problems. | 1 | int read_file(struct sc_card *card, char *str_path, unsigned char **data, size_t *data_len)
{
struct sc_path path;
struct sc_file *file;
unsigned char *p;
int ok = 0;
int r;
size_t len;
sc_format_path(str_path, &path);
if (SC_SUCCESS != sc_select_file(card, &path, &file)) {
goto err;
}
len = file ? fil... | 172,003,075,881,968,860,000,000,000,000,000,000,000 | egk-tool.c | 139,373,658,683,374,800,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2018-16420 | Several buffer overflows when handling responses from an ePass 2003 Card in decrypt_response in libopensc/card-epass2003.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2018-16420 |
9,560 | libxkbcommon | 4e2ee9c3f6050d773f8bbe05bc0edb17f1ff8371 | https://github.com/xkbcommon/libxkbcommon | https://github.com/xkbcommon/libxkbcommon/commit/4e2ee9c3f6050d773f8bbe05bc0edb17f1ff8371 | xkbcomp: Don't explode on invalid virtual modifiers
testcase: 'virtualModifiers=LevelThreC'
Signed-off-by: Daniel Stone <daniels@collabora.com> | 1 | LookupModMask(struct xkb_context *ctx, const void *priv, xkb_atom_t field,
enum expr_value_type type, xkb_mod_mask_t *val_rtrn)
{
const char *str;
xkb_mod_index_t ndx;
const LookupModMaskPriv *arg = priv;
const struct xkb_mod_set *mods = arg->mods;
enum mod_type mod_type = arg->mod_typ... | 24,416,886,959,946,870,000,000,000,000,000,000,000 | expr.c | 130,236,114,452,490,950,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2018-15862 | Unchecked NULL pointer usage in LookupModMask in xkbcomp/expr.c in xkbcommon before 0.8.2 could be used by local attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying a crafted keymap file with invalid virtual modifiers. | https://nvd.nist.gov/vuln/detail/CVE-2018-15862 |
9,561 | libxkbcommon | 38e1766bc6e20108948aec8a0b222a4bad0254e9 | https://github.com/xkbcommon/libxkbcommon | https://github.com/xkbcommon/libxkbcommon/commit/38e1766bc6e20108948aec8a0b222a4bad0254e9 | xkbcomp: Don't falsely promise from ExprResolveLhs
Every user of ExprReturnLhs goes on to unconditionally dereference the
field return, which can be NULL if xkb_intern_atom fails. Return false
if this is the case, so we fail safely.
testcase: splice geometry data into interp
Signed-off-by: Daniel Stone <daniels@coll... | 1 | ExprResolveLhs(struct xkb_context *ctx, const ExprDef *expr,
const char **elem_rtrn, const char **field_rtrn,
ExprDef **index_rtrn)
{
switch (expr->expr.op) {
case EXPR_IDENT:
*elem_rtrn = NULL;
*field_rtrn = xkb_atom_text(ctx, expr->ident.ident);
*index_... | 310,474,843,548,005,200,000,000,000,000,000,000,000 | expr.c | 130,236,114,452,490,950,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2018-15861 | Unchecked NULL pointer usage in ExprResolveLhs in xkbcomp/expr.c in xkbcommon before 0.8.2 could be used by local attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying a crafted keymap file that triggers an xkb_intern_atom failure. | https://nvd.nist.gov/vuln/detail/CVE-2018-15861 |
9,563 | src | 779974d35b4859c07bc3cb8a12c74b43b0a7d1e0 | https://github.com/openbsd/src | https://github.com/openbsd/src/commit/779974d35b4859c07bc3cb8a12c74b43b0a7d1e0 | delay bailout for invalid authenticating user until after the packet
containing the request has been fully parsed. Reported by Dariusz Tytko
and Michał Sajdak; ok deraadt | 1 | userauth_gssapi(struct ssh *ssh)
{
Authctxt *authctxt = ssh->authctxt;
gss_OID_desc goid = {0, NULL};
Gssctxt *ctxt = NULL;
int r, present;
u_int mechs;
OM_uint32 ms;
size_t len;
u_char *doid = NULL;
if (!authctxt->valid || authctxt->user == NULL)
return (0);
if ((r = sshpkt_get_u32(ssh, &mechs)) != 0)... | 135,574,210,007,241,960,000,000,000,000,000,000,000 | auth2-gss.c | 162,181,254,281,413,600,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2018-15473 | OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-15473 |
9,564 | linux | cb2595c1393b4a5211534e6f0a0fbad369e21ad8 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/cb2595c1393b4a5211534e6f0a0fbad369e21ad8 | infiniband: fix a possible use-after-free bug
ucma_process_join() will free the new allocated "mc" struct,
if there is any error after that, especially the copy_to_user().
But in parallel, ucma_leave_multicast() could find this "mc"
through idr_find() before ucma_process_join() frees it, since it
is already published... | 1 | static ssize_t ucma_process_join(struct ucma_file *file,
struct rdma_ucm_join_mcast *cmd, int out_len)
{
struct rdma_ucm_create_id_resp resp;
struct ucma_context *ctx;
struct ucma_multicast *mc;
struct sockaddr *addr;
int ret;
u8 join_state;
if (out_len < sizeof(resp))
return -ENOSPC;
addr = (struct s... | 215,561,590,485,077,280,000,000,000,000,000,000,000 | ucma.c | 329,077,903,464,487,270,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2018-14734 | drivers/infiniband/core/ucma.c in the Linux kernel through 4.17.11 allows ucma_leave_multicast to access a certain data structure after a cleanup step in ucma_process_join, which allows attackers to cause a denial of service (use-after-free). | https://nvd.nist.gov/vuln/detail/CVE-2018-14734 |
9,566 | neomutt | 9e927affe3a021175f354af5fa01d22657c20585 | https://github.com/neomutt/neomutt | https://github.com/neomutt/neomutt/commit/9e927affe3a021175f354af5fa01d22657c20585 | Add alloc fail check in nntp_fetch_headers | 1 | static int nntp_fetch_headers(struct Context *ctx, void *hc, anum_t first,
anum_t last, int restore)
{
struct NntpData *nntp_data = ctx->data;
struct FetchCtx fc;
struct Header *hdr = NULL;
char buf[HUGE_STRING];
int rc = 0;
int oldmsgcount = ctx->msgcount;
anum_t current;
... | 63,790,838,672,285,430,000,000,000,000,000,000,000 | nntp.c | 78,438,500,915,793,575,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2018-14361 | An issue was discovered in NeoMutt before 2018-07-16. nntp.c proceeds even if memory allocation fails for messages data. | https://nvd.nist.gov/vuln/detail/CVE-2018-14361 |
9,568 | linux | 6d8c50dcb029872b298eea68cc6209c866fd3e14 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6d8c50dcb029872b298eea68cc6209c866fd3e14 | socket: close race condition between sock_close() and sockfs_setattr()
fchownat() doesn't even hold refcnt of fd until it figures out
fd is really needed (otherwise is ignored) and releases it after
it resolves the path. This means sock_close() could race with
sockfs_setattr(), which leads to a NULL pointer dereferenc... | 1 | static int sockfs_setattr(struct dentry *dentry, struct iattr *iattr)
{
int err = simple_setattr(dentry, iattr);
if (!err && (iattr->ia_valid & ATTR_UID)) {
struct socket *sock = SOCKET_I(d_inode(dentry));
sock->sk->sk_uid = iattr->ia_uid;
}
return err;
}
| 270,332,479,041,084,860,000,000,000,000,000,000,000 | socket.c | 234,908,544,258,993,340,000,000,000,000,000,000,000 | [
"CWE-362"
] | CVE-2018-12232 | In net/socket.c in the Linux kernel through 4.17.1, there is a race condition between fchownat and close in cases where they target the same socket file descriptor, related to the sock_close and sockfs_setattr functions. fchownat does not increment the file descriptor reference count, which allows close to set the sock... | https://nvd.nist.gov/vuln/detail/CVE-2018-12232 |
9,570 | linux | f7068114d45ec55996b9040e98111afa56e010fe | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/f7068114d45ec55996b9040e98111afa56e010fe | sr: pass down correctly sized SCSI sense buffer
We're casting the CDROM layer request_sense to the SCSI sense
buffer, but the former is 64 bytes and the latter is 96 bytes.
As we generally allocate these on the stack, we end up blowing
up the stack.
Fix this by wrapping the scsi_execute() call with a properly
sized s... | 1 | int sr_do_ioctl(Scsi_CD *cd, struct packet_command *cgc)
{
struct scsi_device *SDev;
struct scsi_sense_hdr sshdr;
int result, err = 0, retries = 0;
SDev = cd->device;
retry:
if (!scsi_block_when_processing_errors(SDev)) {
err = -ENODEV;
goto out;
}
result = scsi_execute(SDev, cgc->cmd, ... | 19,624,638,673,498,000,000,000,000,000,000,000,000 | sr_ioctl.c | 119,618,448,393,103,850,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-11506 | The sr_do_ioctl function in drivers/scsi/sr_ioctl.c in the Linux kernel through 4.16.12 allows local users to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact because sense buffers have different sizes at the CDROM layer and the SCSI layer, as demonstrated by a CDROMREAD... | https://nvd.nist.gov/vuln/detail/CVE-2018-11506 |
9,571 | linux | dd83c161fbcc5d8be637ab159c0de015cbff5ba4 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/dd83c161fbcc5d8be637ab159c0de015cbff5ba4 | kernel/exit.c: avoid undefined behaviour when calling wait4()
wait4(-2147483648, 0x20, 0, 0xdd0000) triggers:
UBSAN: Undefined behaviour in kernel/exit.c:1651:9
The related calltrace is as follows:
negation of -2147483648 cannot be represented in type 'int':
CPU: 9 PID: 16482 Comm: zj Tainted: G B --... | 1 | long kernel_wait4(pid_t upid, int __user *stat_addr, int options,
struct rusage *ru)
{
struct wait_opts wo;
struct pid *pid = NULL;
enum pid_type type;
long ret;
if (options & ~(WNOHANG|WUNTRACED|WCONTINUED|
__WNOTHREAD|__WCLONE|__WALL))
return -EINVAL;
if (upid == -1)
type = PIDTYPE_MAX;
else... | 258,323,460,749,912,650,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-10087 | The kernel_wait4 function in kernel/exit.c in the Linux kernel before 4.13, when an unspecified architecture and compiler is used, might allow local users to cause a denial of service by triggering an attempted use of the -INT_MIN value. | https://nvd.nist.gov/vuln/detail/CVE-2018-10087 |
9,577 | libgit2 | 58a6fe94cb851f71214dbefac3f9bffee437d6fe | https://github.com/libgit2/libgit2 | https://github.com/libgit2/libgit2/commit/58a6fe94cb851f71214dbefac3f9bffee437d6fe | index: convert `read_entry` to return entry size via an out-param
The function `read_entry` does not conform to our usual coding style of
returning stuff via the out parameter and to use the return value for
reporting errors. Due to most of our code conforming to that pattern, it
has become quite natural for us to act... | 1 | static size_t read_entry(
git_index_entry **out,
git_index *index,
const void *buffer,
size_t buffer_size,
const char *last)
{
size_t path_length, entry_size;
const char *path_ptr;
struct entry_short source;
git_index_entry entry = {{0}};
bool compressed = index->version >= INDEX_VERSION_NUMBER_COMP;
ch... | 109,487,150,090,997,030,000,000,000,000,000,000,000 | index.c | 162,215,619,332,483,000,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2018-8099 | Incorrect returning of an error code in the index.c:read_entry() function leads to a double free in libgit2 before v0.26.2, which allows an attacker to cause a denial of service via a crafted repository index file. | https://nvd.nist.gov/vuln/detail/CVE-2018-8099 |
9,581 | linux | 250c6c49e3b68756b14983c076183568636e2bde | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/250c6c49e3b68756b14983c076183568636e2bde | fbdev: Fixing arbitrary kernel leak in case FBIOGETCMAP_SPARC in sbusfb_ioctl_helper().
Fixing arbitrary kernel leak in case FBIOGETCMAP_SPARC in
sbusfb_ioctl_helper().
'index' is defined as an int in sbusfb_ioctl_helper().
We retrieve this from the user:
if (get_user(index, &c->index) ||
__get_user(count, &c->co... | 1 | int sbusfb_ioctl_helper(unsigned long cmd, unsigned long arg,
struct fb_info *info,
int type, int fb_depth, unsigned long fb_size)
{
switch(cmd) {
case FBIOGTYPE: {
struct fbtype __user *f = (struct fbtype __user *) arg;
if (put_user(type, &f->fb_type) ||
__put_user(info->var.yres, &f->fb_height) ||
... | 140,708,769,976,939,500,000,000,000,000,000,000,000 | sbuslib.c | 169,305,828,568,889,900,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2018-6412 | In the function sbusfb_ioctl_helper() in drivers/video/fbdev/sbuslib.c in the Linux kernel through 4.15, an integer signedness error allows arbitrary information leakage for the FBIOPUTCMAP_SPARC and FBIOGETCMAP_SPARC commands. | https://nvd.nist.gov/vuln/detail/CVE-2018-6412 |
9,582 | linux | 7d11f77f84b27cef452cee332f4e469503084737 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7d11f77f84b27cef452cee332f4e469503084737 | RDS: null pointer dereference in rds_atomic_free_op
set rm->atomic.op_active to 0 when rds_pin_pages() fails
or the user supplied address is invalid,
this prevents a NULL pointer usage in rds_atomic_free_op()
Signed-off-by: Mohamed Ghannam <simo.ghannam@gmail.com>
Acked-by: Santosh Shilimkar <santosh.shilimkar@oracle... | 1 | int rds_cmsg_atomic(struct rds_sock *rs, struct rds_message *rm,
struct cmsghdr *cmsg)
{
struct page *page = NULL;
struct rds_atomic_args *args;
int ret = 0;
if (cmsg->cmsg_len < CMSG_LEN(sizeof(struct rds_atomic_args))
|| rm->atomic.op_active)
return -EINVAL;
args = CMSG_DATA(cmsg);
/* Nonmasked & m... | 53,707,930,125,692,390,000,000,000,000,000,000,000 | rdma.c | 236,152,132,911,027,400,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2018-5333 | In the Linux kernel through 4.14.13, the rds_cmsg_atomic function in net/rds/rdma.c mishandles cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference. | https://nvd.nist.gov/vuln/detail/CVE-2018-5333 |
9,583 | linux | c095508770aebf1b9218e77026e48345d719b17c | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c095508770aebf1b9218e77026e48345d719b17c | RDS: Heap OOB write in rds_message_alloc_sgs()
When args->nr_local is 0, nr_pages gets also 0 due some size
calculation via rds_rm_size(), which is later used to allocate
pages for DMA, this bug produces a heap Out-Of-Bound write access
to a specific memory region.
Signed-off-by: Mohamed Ghannam <simo.ghannam@gmail.c... | 1 | int rds_rdma_extra_size(struct rds_rdma_args *args)
{
struct rds_iovec vec;
struct rds_iovec __user *local_vec;
int tot_pages = 0;
unsigned int nr_pages;
unsigned int i;
local_vec = (struct rds_iovec __user *)(unsigned long) args->local_vec_addr;
/* figure out the number of pages in the vector */
for (i ... | 8,114,545,912,579,210,000,000,000,000,000,000,000 | rdma.c | 236,152,132,911,027,400,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2018-5332 | In the Linux kernel through 3.2, the rds_message_alloc_sgs() function does not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size function in net/rds/rdma.c). | https://nvd.nist.gov/vuln/detail/CVE-2018-5332 |
9,584 | libjpeg-turbo | 43e84cff1bb2bd8293066f6ac4eb0df61ddddbc6 | https://github.com/libjpeg-turbo/libjpeg-turbo | https://github.com/libjpeg-turbo/libjpeg-turbo/commit/43e84cff1bb2bd8293066f6ac4eb0df61ddddbc6 | tjLoadImage(): Fix FPE triggered by malformed BMP
In rdbmp.c, it is necessary to guard against 32-bit overflow/wraparound
when allocating the row buffer, because since BMP files have 32-bit
width and height fields, the value of biWidth can be up to 4294967295.
Specifically, if biWidth is 1073741824 and cinfo->input_co... | 1 | start_input_bmp(j_compress_ptr cinfo, cjpeg_source_ptr sinfo)
{
bmp_source_ptr source = (bmp_source_ptr)sinfo;
U_CHAR bmpfileheader[14];
U_CHAR bmpinfoheader[64];
#define GET_2B(array, offset) \
((unsigned short)UCH(array[offset]) + \
(((unsigned short)UCH(array[offset + 1])) << 8))
#define GET_4B(array, of... | 167,507,206,180,713,230,000,000,000,000,000,000,000 | rdbmp.c | 325,802,294,962,207,120,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2018-1152 | libjpeg-turbo 1.5.90 is vulnerable to a denial of service vulnerability caused by a divide by zero when processing a crafted BMP image. | https://nvd.nist.gov/vuln/detail/CVE-2018-1152 |
9,585 | linux | 57ebd808a97d7c5b1e1afb937c2db22beba3c1f8 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/57ebd808a97d7c5b1e1afb937c2db22beba3c1f8 | netfilter: add back stackpointer size checks
The rationale for removing the check is only correct for rulesets
generated by ip(6)tables.
In iptables, a jump can only occur to a user-defined chain, i.e.
because we size the stack based on number of user-defined chains we
cannot exceed stack size.
However, the underlyi... | 1 | unsigned int arpt_do_table(struct sk_buff *skb,
const struct nf_hook_state *state,
struct xt_table *table)
{
unsigned int hook = state->hook;
static const char nulldevname[IFNAMSIZ] __attribute__((aligned(sizeof(long))));
unsigned int verdict = NF_DROP;
const struct arphdr *arp;
struct arpt_entry *e, *... | 28,617,907,846,005,074,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2018-1065 | The netfilter subsystem in the Linux kernel through 4.15.7 mishandles the case of a rule blob that contains a jump but lacks a user-defined chain, which allows local users to cause a denial of service (NULL pointer dereference) by leveraging the CAP_NET_RAW or CAP_NET_ADMIN capability, related to arpt_do_table in net/i... | https://nvd.nist.gov/vuln/detail/CVE-2018-1065 |
9,586 | linux | 57ebd808a97d7c5b1e1afb937c2db22beba3c1f8 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/57ebd808a97d7c5b1e1afb937c2db22beba3c1f8 | netfilter: add back stackpointer size checks
The rationale for removing the check is only correct for rulesets
generated by ip(6)tables.
In iptables, a jump can only occur to a user-defined chain, i.e.
because we size the stack based on number of user-defined chains we
cannot exceed stack size.
However, the underlyi... | 1 | ip6t_do_table(struct sk_buff *skb,
const struct nf_hook_state *state,
struct xt_table *table)
{
unsigned int hook = state->hook;
static const char nulldevname[IFNAMSIZ] __attribute__((aligned(sizeof(long))));
/* Initializing verdict to NF_DROP keeps gcc happy. */
unsigned int verdict = NF_DROP;
const... | 143,731,313,107,222,320,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2018-1065 | The netfilter subsystem in the Linux kernel through 4.15.7 mishandles the case of a rule blob that contains a jump but lacks a user-defined chain, which allows local users to cause a denial of service (NULL pointer dereference) by leveraging the CAP_NET_RAW or CAP_NET_ADMIN capability, related to arpt_do_table in net/i... | https://nvd.nist.gov/vuln/detail/CVE-2018-1065 |
9,591 | linux | 687cb0884a714ff484d038e9190edc874edcf146 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/687cb0884a714ff484d038e9190edc874edcf146 | mm, oom_reaper: gather each vma to prevent leaking TLB entry
tlb_gather_mmu(&tlb, mm, 0, -1) means gathering the whole virtual memory
space. In this case, tlb->fullmm is true. Some archs like arm64
doesn't flush TLB when tlb->fullmm is true:
commit 5a7862e83000 ("arm64: tlbflush: avoid flushing when fullmm == 1")... | 1 | static bool __oom_reap_task_mm(struct task_struct *tsk, struct mm_struct *mm)
{
struct mmu_gather tlb;
struct vm_area_struct *vma;
bool ret = true;
/*
* We have to make sure to not race with the victim exit path
* and cause premature new oom victim selection:
* __oom_reap_task_mm exit_mm
* mmget_not_zer... | 210,432,325,877,869,770,000,000,000,000,000,000,000 | oom_kill.c | 34,517,807,293,828,100,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2017-18202 | The __oom_reap_task_mm function in mm/oom_kill.c in the Linux kernel before 4.14.4 mishandles gather operations, which allows attackers to cause a denial of service (TLB entry leak or use-after-free) or possibly have unspecified other impact by triggering a copy_to_user call within a certain time window. | https://nvd.nist.gov/vuln/detail/CVE-2017-18202 |
9,592 | jasper | aa0b0f79ade5eef8b0e7a214c03f5af54b36ba7d | https://github.com/mdadams/jasper | https://github.com/mdadams/jasper/commit/aa0b0f79ade5eef8b0e7a214c03f5af54b36ba7d | Fixed numerous integer overflow problems in the code for packet iterators
in the JPC decoder. | 1 | static int jpc_pi_nextpcrl(register jpc_pi_t *pi)
{
int rlvlno;
jpc_pirlvl_t *pirlvl;
jpc_pchg_t *pchg;
int prchind;
int prcvind;
int *prclyrno;
int compno;
jpc_picomp_t *picomp;
int xstep;
int ystep;
uint_fast32_t trx0;
uint_fast32_t try0;
uint_fast32_t r;
uint_fast32_t rpx;
uint_fast32_t rpy;
pchg = ... | 143,438,351,204,945,960,000,000,000,000,000,000,000 | jpc_t2cod.c | 159,588,622,480,218,420,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2016-9583 | An out-of-bounds heap read vulnerability was found in the jpc_pi_nextpcrl() function of jasper before 2.0.6 when processing crafted input. | https://nvd.nist.gov/vuln/detail/CVE-2016-9583 |
9,595 | suricata | d8634daf74c882356659addb65fb142b738a186b | https://github.com/OISF/suricata | https://github.com/OISF/suricata/commit/d8634daf74c882356659addb65fb142b738a186b | stream: fix false negative on bad RST
If a bad RST was received the stream inspection would not happen
for that packet, but it would still move the 'raw progress' tracker
forward. Following good packets would then fail to detect anything
before the 'raw progress' position.
Bug #2770
Reported-by: Alexey Vishnyakov | 1 | static void DetectRunCleanup(DetectEngineThreadCtx *det_ctx,
Packet *p, Flow * const pflow)
{
PACKET_PROFILING_DETECT_START(p, PROF_DETECT_CLEANUP);
/* cleanup pkt specific part of the patternmatcher */
PacketPatternCleanup(det_ctx);
if (pflow != NULL) {
/* update inspected tracker f... | 199,138,939,076,611,400,000,000,000,000,000,000,000 | detect.c | 146,865,518,338,528,100,000,000,000,000,000,000,000 | [
"CWE-347"
] | CVE-2019-1010279 | Open Information Security Foundation Suricata prior to version 4.1.3 is affected by: Denial of Service - TCP/HTTP detection bypass. The impact is: An attacker can evade a signature detection with a specialy formed sequence of network packets. The component is: detect.c (https://github.com/OISF/suricata/pull/3625/commit... | https://nvd.nist.gov/vuln/detail/CVE-2019-1010279 |
9,596 | libvips | ce684dd008532ea0bf9d4a1d89bacb35f4a83f4d | https://github.com/libvips/libvips | https://github.com/libvips/libvips/commit/ce684dd008532ea0bf9d4a1d89bacb35f4a83f4d | fetch map after DGifGetImageDesc()
Earlier refactoring broke GIF map fetch. | 1 | vips_foreign_load_gif_scan_image( VipsForeignLoadGif *gif )
{
VipsObjectClass *class = VIPS_OBJECT_GET_CLASS( gif );
GifFileType *file = gif->file;
ColorMapObject *map = file->Image.ColorMap ?
file->Image.ColorMap : file->SColorMap;
GifByteType *extension;
if( DGifGetImageDesc( gif->file ) == GIF_ERROR... | 85,832,030,463,082,010,000,000,000,000,000,000,000 | gifload.c | 169,810,479,207,440,950,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2019-17534 | vips_foreign_load_gif_scan_image in foreign/gifload.c in libvips before 8.8.2 tries to access a color map before a DGifGetImageDesc call, leading to a use-after-free. | https://nvd.nist.gov/vuln/detail/CVE-2019-17534 |
9,597 | matio | 651a8e28099edb5fbb9e4e1d4d3238848f446c9a | https://github.com/tbeu/matio | https://github.com/tbeu/matio/commit/651a8e28099edb5fbb9e4e1d4d3238848f446c9a | Avoid uninitialized memory
As reported by https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16856 | 1 | Mat_VarReadNextInfo4(mat_t *mat)
{
int M,O,data_type,class_type;
mat_int32_t tmp;
long nBytes;
size_t readresult;
matvar_t *matvar = NULL;
union {
mat_uint32_t u;
mat_uint8_t c[4];
} endian;
if ( mat == NULL || mat->fp == NULL )
return NULL;
el... | 283,675,808,883,276,520,000,000,000,000,000,000,000 | mat4.c | 297,796,931,425,830,640,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2019-17533 | Mat_VarReadNextInfo4 in mat4.c in MATIO 1.5.17 omits a certain '\0' character, leading to a heap-based buffer over-read in strdup_vprintf when uninitialized memory is accessed. | https://nvd.nist.gov/vuln/detail/CVE-2019-17533 |
9,600 | OpenSC | a3fc7693f3a035a8a7921cffb98432944bb42740 | https://github.com/OpenSC/OpenSC | https://github.com/OpenSC/OpenSC/commit/a3fc7693f3a035a8a7921cffb98432944bb42740 | Fixed out of bounds access in ASN.1 Octet string
Credit to OSS-Fuzz | 1 | static int asn1_decode_entry(sc_context_t *ctx,struct sc_asn1_entry *entry,
const u8 *obj, size_t objlen, int depth)
{
void *parm = entry->parm;
int (*callback_func)(sc_context_t *nctx, void *arg, const u8 *nobj,
size_t nobjlen, int ndepth);
size_t *len = (size_t *) entry->arg;
int r = 0;
callback... | 69,488,774,016,521,850,000,000,000,000,000,000,000 | asn1.c | 327,585,171,356,570,960,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2019-15946 | OpenSC before 0.20.0-rc1 has an out-of-bounds access of an ASN.1 Octet string in asn1_decode_entry in libopensc/asn1.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-15946 |
9,607 | linux | f3554aeb991214cbfafd17d55e2bfddb50282e32 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/f3554aeb991214cbfafd17d55e2bfddb50282e32 | floppy: fix div-by-zero in setup_format_params
This fixes a divide by zero error in the setup_format_params function of
the floppy driver.
Two consecutive ioctls can trigger the bug: The first one should set the
drive geometry with such .sect and .rate values for the F_SECT_PER_TRACK
to become zero. Next, the floppy... | 1 | static void setup_format_params(int track)
{
int n;
int il;
int count;
int head_shift;
int track_shift;
struct fparm {
unsigned char track, head, sect, size;
} *here = (struct fparm *)floppy_track_buffer;
raw_cmd = &default_raw_cmd;
raw_cmd->track = track;
raw_cmd->flags = (FD_RAW_WRITE | FD_RAW_INTR | FD... | 340,262,197,679,650,720,000,000,000,000,000,000,000 | floppy.c | 124,756,562,287,441,240,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2019-14284 | In the Linux kernel before 5.2.3, drivers/block/floppy.c allows a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be... | https://nvd.nist.gov/vuln/detail/CVE-2019-14284 |
9,609 | ImageMagick6 | 91e58d967a92250439ede038ccfb0913a81e59fe | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/91e58d967a92250439ede038ccfb0913a81e59fe | https://github.com/ImageMagick/ImageMagick/issues/1615 | 1 | static MagickPixelPacket **AcquirePixelThreadSet(const Image *images)
{
const Image
*next;
MagickPixelPacket
**pixels;
register ssize_t
i,
j;
size_t
columns,
number_threads;
number_threads=(size_t) GetMagickResourceLimit(ThreadResource);
pixels=(MagickPixelPacket **) AcquireQ... | 240,210,483,832,148,400,000,000,000,000,000,000,000 | statistic.c | 62,577,200,016,171,590,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2019-13307 | ImageMagick 7.0.8-50 Q16 has a heap-based buffer overflow at MagickCore/statistic.c in EvaluateImages because of mishandling rows. | https://nvd.nist.gov/vuln/detail/CVE-2019-13307 |
9,611 | ImageMagick | fe5f4b85e6b1b54d3b4588a77133c06ade46d891 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/fe5f4b85e6b1b54d3b4588a77133c06ade46d891 | https://github.com/ImageMagick/ImageMagick/issues/1602 | 1 | static MagickOffsetType TIFFSeekCustomStream(const MagickOffsetType offset,
const int whence,void *user_data)
{
PhotoshopProfile
*profile;
profile=(PhotoshopProfile *) user_data;
switch (whence)
{
case SEEK_SET:
default:
{
if (offset < 0)
return(-1);
profile->offset=offset... | 41,710,944,332,559,617,000,000,000,000,000,000,000 | tiff.c | 316,057,833,404,137,560,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2019-13136 | ImageMagick before 7.0.8-50 has an integer overflow vulnerability in the function TIFFSeekCustomStream in coders/tiff.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-13136 |
9,613 | linux | 385097a3675749cbc9e97c085c0e5dfe4269ca51 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/385097a3675749cbc9e97c085c0e5dfe4269ca51 | nfc: Ensure presence of required attributes in the deactivate_target handler
Check that the NFC_ATTR_TARGET_INDEX attributes (in addition to
NFC_ATTR_DEVICE_INDEX) are provided by the netlink client prior to
accessing them. This prevents potential unhandled NULL pointer dereference
exceptions which can be triggered by... | 1 | static int nfc_genl_deactivate_target(struct sk_buff *skb,
struct genl_info *info)
{
struct nfc_dev *dev;
u32 device_idx, target_idx;
int rc;
if (!info->attrs[NFC_ATTR_DEVICE_INDEX])
return -EINVAL;
device_idx = nla_get_u32(info->attrs[NFC_ATTR_DEVICE_INDEX]);
dev = nfc_get_device(device_idx)... | 321,500,771,127,873,160,000,000,000,000,000,000,000 | netlink.c | 108,702,105,730,330,880,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2019-12984 | A NULL pointer dereference vulnerability in the function nfc_genl_deactivate_target() in net/nfc/netlink.c in the Linux kernel before 5.1.13 can be triggered by a malicious user-mode program that omits certain NFC attributes, leading to denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2019-12984 |
9,614 | miniupnp | bec6ccec63cadc95655721bc0e1dd49dac759d94 | https://github.com/miniupnp/miniupnp | https://github.com/miniupnp/miniupnp/commit/bec6ccec63cadc95655721bc0e1dd49dac759d94 | upnp_event_prepare(): check the return value of snprintf() | 1 | static void upnp_event_prepare(struct upnp_event_notify * obj)
{
static const char notifymsg[] =
"NOTIFY %s HTTP/1.1\r\n"
"Host: %s%s\r\n"
#if (UPNP_VERSION_MAJOR == 1) && (UPNP_VERSION_MINOR == 0)
"Content-Type: text/xml\r\n" /* UDA v1.0 */
#else
"Content-Type: text/xml; charset=\"utf-8\"\r\n" /* UDA v1.1 or ... | 254,184,219,963,562,300,000,000,000,000,000,000,000 | upnpevents.c | 22,282,999,164,038,923,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2019-12107 | The upnp_event_prepare function in upnpevents.c in MiniUPnP MiniUPnPd through 2.1 allows a remote attacker to leak information from the heap due to improper validation of an snprintf return value. | https://nvd.nist.gov/vuln/detail/CVE-2019-12107 |
9,619 | lighttpd1.4 | 32120d5b8b3203fc21ccb9eafb0eaf824bb59354 | https://github.com/lighttpd/lighttpd1.4 | https://github.com/lighttpd/lighttpd1.4/commit/32120d5b8b3203fc21ccb9eafb0eaf824bb59354 | [core] fix abort in http-parseopts (fixes #2945)
fix abort in server.http-parseopts with url-path-2f-decode enabled
(thx stze)
x-ref:
"Security - SIGABRT during GET request handling with url-path-2f-decode enabled"
https://redmine.lighttpd.net/issues/2945 | 1 | static int burl_normalize_2F_to_slash_fix (buffer *b, int qs, int i)
{
char * const s = b->ptr;
const int blen = (int)buffer_string_length(b);
const int used = qs < 0 ? blen : qs;
int j = i;
for (; i < used; ++i, ++j) {
s[j] = s[i];
if (s[i] == '%' && s[i+1] == '2' && s[i+2] == 'F') ... | 124,662,619,963,424,430,000,000,000,000,000,000,000 | burl.c | 192,492,788,285,266,940,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2019-11072 | lighttpd before 1.4.54 has a signed integer overflow, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a malicious HTTP GET request, as demonstrated by mishandling of /%2F? in burl_normalize_2F_to_slash_fix in burl.c. NOTE: The developer s... | https://nvd.nist.gov/vuln/detail/CVE-2019-11072 |
9,623 | linux | cfa39381173d5f969daf43582c95ad679189cbc9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/cfa39381173d5f969daf43582c95ad679189cbc9 | kvm: fix kvm_ioctl_create_device() reference counting (CVE-2019-6974)
kvm_ioctl_create_device() does the following:
1. creates a device that holds a reference to the VM object (with a borrowed
reference, the VM's refcount has not been bumped yet)
2. initializes the device
3. transfers the reference to the device t... | 1 | static int kvm_ioctl_create_device(struct kvm *kvm,
struct kvm_create_device *cd)
{
struct kvm_device_ops *ops = NULL;
struct kvm_device *dev;
bool test = cd->flags & KVM_CREATE_DEVICE_TEST;
int ret;
if (cd->type >= ARRAY_SIZE(kvm_device_ops_table))
return -ENODEV;
ops = kvm_device_ops_table[cd->type];... | 176,950,247,388,431,500,000,000,000,000,000,000,000 | kvm_main.c | 148,296,589,878,720,510,000,000,000,000,000,000,000 | [
"CWE-362"
] | CVE-2019-6974 | In the Linux kernel before 4.20.8, kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandles reference counting because of a race condition, leading to a use-after-free. | https://nvd.nist.gov/vuln/detail/CVE-2019-6974 |
9,627 | openjpeg | c5bd64ea146162967c29bd2af0cbb845ba3eaaaf | https://github.com/uclouvain/openjpeg | https://github.com/uclouvain/openjpeg/commit/c5bd64ea146162967c29bd2af0cbb845ba3eaaaf | [MJ2] To avoid divisions by zero / undefined behaviour on shift
Signed-off-by: Young_X <YangX92@hotmail.com> | 1 | static opj_bool pi_next_cprl(opj_pi_iterator_t * pi)
{
opj_pi_comp_t *comp = NULL;
opj_pi_resolution_t *res = NULL;
long index = 0;
if (!pi->first) {
comp = &pi->comps[pi->compno];
goto LABEL_SKIP;
} else {
pi->first = 0;
}
for (pi->compno = pi->poc.compno0; pi->com... | 198,208,281,540,271,430,000,000,000,000,000,000,000 | None | null | [
"CWE-369"
] | CVE-2018-20845 | Division-by-zero vulnerabilities in the functions pi_next_pcrl, pi_next_cprl, and pi_next_rpcl in openmj2/pi.c in OpenJPEG through 2.3.0 allow remote attackers to cause a denial of service (application crash). | https://nvd.nist.gov/vuln/detail/CVE-2018-20845 |
9,631 | rdesktop | 4dca546d04321a610c1835010b5dad85163b65e1 | https://github.com/rdesktop/rdesktop | https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1 | Malicious RDP server security fixes
This commit includes fixes for a set of 21 vulnerabilities in
rdesktop when a malicious RDP server is used.
All vulnerabilities was identified and reported by Eyal Itkin.
* Add rdp_protocol_error function that is used in several fixes
* Refactor of process_bitmap_updates
* Fix ... | 1 | lspci_process(STREAM s)
{
unsigned int pkglen;
static char *rest = NULL;
char *buf;
pkglen = s->end - s->p;
/* str_handle_lines requires null terminated strings */
buf = xmalloc(pkglen + 1);
STRNCPY(buf, (char *) s->p, pkglen + 1);
str_handle_lines(buf, &rest, lspci_process_line, NULL);
xfree(buf);
}
| 209,920,996,478,819,600,000,000,000,000,000,000,000 | lspci.c | 74,336,506,313,865,020,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-8799 | rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function process_secondary_order() that results in a Denial of Service (segfault). | https://nvd.nist.gov/vuln/detail/CVE-2018-8799 |
9,632 | rdesktop | 4dca546d04321a610c1835010b5dad85163b65e1 | https://github.com/rdesktop/rdesktop | https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1 | Malicious RDP server security fixes
This commit includes fixes for a set of 21 vulnerabilities in
rdesktop when a malicious RDP server is used.
All vulnerabilities was identified and reported by Eyal Itkin.
* Add rdp_protocol_error function that is used in several fixes
* Refactor of process_bitmap_updates
* Fix ... | 1 | process_secondary_order(STREAM s)
{
/* The length isn't calculated correctly by the server.
* For very compact orders the length becomes negative
* so a signed integer must be used. */
uint16 length;
uint16 flags;
uint8 type;
uint8 *next_order;
in_uint16_le(s, length);
in_uint16_le(s, flags); /* used ... | 155,193,719,227,379,600,000,000,000,000,000,000,000 | orders.c | 24,108,224,018,686,034,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-8799 | rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function process_secondary_order() that results in a Denial of Service (segfault). | https://nvd.nist.gov/vuln/detail/CVE-2018-8799 |
9,633 | rdesktop | 4dca546d04321a610c1835010b5dad85163b65e1 | https://github.com/rdesktop/rdesktop | https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1 | Malicious RDP server security fixes
This commit includes fixes for a set of 21 vulnerabilities in
rdesktop when a malicious RDP server is used.
All vulnerabilities was identified and reported by Eyal Itkin.
* Add rdp_protocol_error function that is used in several fixes
* Refactor of process_bitmap_updates
* Fix ... | 1 | rdpsnddbg_process(STREAM s)
{
unsigned int pkglen;
static char *rest = NULL;
char *buf;
pkglen = s->end - s->p;
/* str_handle_lines requires null terminated strings */
buf = (char *) xmalloc(pkglen + 1);
STRNCPY(buf, (char *) s->p, pkglen + 1);
str_handle_lines(buf, &rest, rdpsnddbg_line_handler, NULL);... | 88,148,949,623,728,080,000,000,000,000,000,000,000 | rdpsnd.c | 318,702,186,162,208,240,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-8799 | rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function process_secondary_order() that results in a Denial of Service (segfault). | https://nvd.nist.gov/vuln/detail/CVE-2018-8799 |
9,634 | tcpdump | 83a412a5275cac973c5841eca3511c766bed778d | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/83a412a5275cac973c5841eca3511c766bed778d | (for 4.9.3) CVE-2018-16228/HNCP: make buffer access safer
print_prefix() has a buffer and does not initialize it. It may call
decode_prefix6(), which also does not initialize the buffer on invalid
input. When that happens, make sure to return from print_prefix() before
trying to print the [still uninitialized] buffer.... | 1 | print_prefix(netdissect_options *ndo, const u_char *prefix, u_int max_length)
{
int plenbytes;
char buf[sizeof("xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx::/128")];
if (prefix[0] >= 96 && max_length >= IPV4_MAPPED_HEADING_LEN + 1 &&
is_ipv4_mapped_address(&prefix[1])) {
struct in_addr addr;
... | 296,958,635,835,410,900,000,000,000,000,000,000,000 | print-hncp.c | 71,707,496,757,408,950,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-16228 | The HNCP parser in tcpdump before 4.9.3 has a buffer over-read in print-hncp.c:print_prefix(). | https://nvd.nist.gov/vuln/detail/CVE-2018-16228 |
9,635 | tcpdump | 86326e880d31b328a151d45348c35220baa9a1ff | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/86326e880d31b328a151d45348c35220baa9a1ff | (for 4.9.3) CVE-2018-14881/BGP: Fix BGP_CAPCODE_RESTART.
Add a bounds check and a comment to bgp_capabilities_print().
This fixes a buffer over-read discovered by Bhargava Shastry,
SecT/TU Berlin.
Add a test using the capture file supplied by the reporter(s). | 1 | bgp_capabilities_print(netdissect_options *ndo,
const u_char *opt, int caps_len)
{
int cap_type, cap_len, tcap_len, cap_offset;
int i = 0;
while (i < caps_len) {
ND_TCHECK2(opt[i], BGP_CAP_HEADER_SIZE);
cap_type=opt[i];
cap_len=opt... | 29,552,793,108,757,430,000,000,000,000,000,000,000 | print-bgp.c | 81,233,617,923,263,840,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-14881 | The BGP parser in tcpdump before 4.9.3 has a buffer over-read in print-bgp.c:bgp_capabilities_print() (BGP_CAPCODE_RESTART). | https://nvd.nist.gov/vuln/detail/CVE-2018-14881 |
9,637 | tcpdump | c24922e692a52121e853a84ead6b9337f4c08a94 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/c24922e692a52121e853a84ead6b9337f4c08a94 | (for 4.9.3) CVE-2018-14466/Rx: fix an over-read bug
In rx_cache_insert() and rx_cache_find() properly read the serviceId
field of the rx_header structure as a 16-bit integer. When those
functions tried to read 32 bits the extra 16 bits could be outside of
the bounds checked in rx_print() for the rx_header structure, a... | 1 | rx_cache_insert(netdissect_options *ndo,
const u_char *bp, const struct ip *ip, int dport)
{
struct rx_cache_entry *rxent;
const struct rx_header *rxh = (const struct rx_header *) bp;
if (ndo->ndo_snapend - bp + 1 <= (int)(sizeof(struct rx_header) + sizeof(int32_t)))
return;
rxent = &rx_cache[rx... | 15,665,195,569,772,354,000,000,000,000,000,000,000 | print-rx.c | 87,888,529,561,150,320,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-14466 | The Rx parser in tcpdump before 4.9.3 has a buffer over-read in print-rx.c:rx_cache_find() and rx_cache_insert(). | https://nvd.nist.gov/vuln/detail/CVE-2018-14466 |
9,638 | linux | 04197b341f23b908193308b8d63d17ff23232598 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/04197b341f23b908193308b8d63d17ff23232598 | xfs: don't BUG() on mixed direct and mapped I/O
We've had reports of generic/095 causing XFS to BUG() in
__xfs_get_blocks() due to the existence of delalloc blocks on a
direct I/O read. generic/095 issues a mix of various types of I/O,
including direct and memory mapped I/O to a single file. This is
clearly not suppor... | 1 | __xfs_get_blocks(
struct inode *inode,
sector_t iblock,
struct buffer_head *bh_result,
int create,
bool direct,
bool dax_fault)
{
struct xfs_inode *ip = XFS_I(inode);
struct xfs_mount *mp = ip->i_mount;
xfs_fileoff_t offset_fsb, end_fsb;
int error = 0;
int lockmode = 0;
struct xfs_bmbt_irec ima... | 195,875,716,643,763,600,000,000,000,000,000,000,000 | xfs_aops.c | 300,830,705,963,493,000,000,000,000,000,000,000,000 | [
"CWE-362"
] | CVE-2016-10741 | In the Linux kernel before 4.9.3, fs/xfs/xfs_aops.c allows local users to cause a denial of service (system crash) because there is a race condition between direct and memory-mapped I/O (associated with a hole) that is handled with BUG_ON instead of an I/O failure. | https://nvd.nist.gov/vuln/detail/CVE-2016-10741 |
9,641 | linux | f9432c5ec8b1e9a09b9b0e5569e3c73db8de432a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/f9432c5ec8b1e9a09b9b0e5569e3c73db8de432a | Bluetooth: RFCOMM - Fix info leak in ioctl(RFCOMMGETDEVLIST)
The RFCOMM code fails to initialize the two padding bytes of struct
rfcomm_dev_list_req inserted for alignment before copying it to
userland. Additionally there are two padding bytes in each instance of
struct rfcomm_dev_info. The ioctl() that for disclosure... | 1 | static int rfcomm_get_dev_list(void __user *arg)
{
struct rfcomm_dev *dev;
struct rfcomm_dev_list_req *dl;
struct rfcomm_dev_info *di;
int n = 0, size, err;
u16 dev_num;
BT_DBG("");
if (get_user(dev_num, (u16 __user *) arg))
return -EFAULT;
if (!dev_num || dev_num > (PAGE_SIZE * 4) / sizeof(*di))
return ... | 139,069,687,710,975,940,000,000,000,000,000,000,000 | tty.c | 176,026,457,291,408,430,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2012-6545 | The Bluetooth RFCOMM implementation in the Linux kernel before 3.6 does not properly initialize certain structures, which allows local users to obtain sensitive information from kernel memory via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2012-6545 |
9,642 | linux | 7b789836f434c87168eab067cfbed1ec4783dffd | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7b789836f434c87168eab067cfbed1ec4783dffd | xfrm_user: fix info leak in copy_to_user_policy()
The memory reserved to dump the xfrm policy includes multiple padding
bytes added by the compiler for alignment (padding bytes in struct
xfrm_selector and struct xfrm_userpolicy_info). Add an explicit
memset(0) before filling the buffer to avoid the heap info leak.
Si... | 1 | static void copy_to_user_policy(struct xfrm_policy *xp, struct xfrm_userpolicy_info *p, int dir)
{
memcpy(&p->sel, &xp->selector, sizeof(p->sel));
memcpy(&p->lft, &xp->lft, sizeof(p->lft));
memcpy(&p->curlft, &xp->curlft, sizeof(p->curlft));
p->priority = xp->priority;
p->index = xp->index;
p->sel.family = x... | 24,315,986,261,003,055,000,000,000,000,000,000,000 | xfrm_user.c | 300,447,579,570,024,820,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2012-6537 | net/xfrm/xfrm_user.c in the Linux kernel before 3.6 does not initialize certain structures, which allows local users to obtain sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability. | https://nvd.nist.gov/vuln/detail/CVE-2012-6537 |
9,643 | sgminer | 78cc408369bdbbd440196c93574098d1482efbce | https://github.com/sgminer-dev/sgminer | https://github.com/sgminer-dev/sgminer/commit/78cc408369bdbbd440196c93574098d1482efbce | stratum: parse_reconnect(): treat pool-sent URL as untrusted.
Thanks to Mick Ayzenberg <mick@dejavusecurity.com> for reminding
that this existed and highlighting the offender.
Also to Luke-jr for actually fixing this in bfgminer. :D | 1 | static bool parse_reconnect(struct pool *pool, json_t *val)
{
char *sockaddr_url, *stratum_port, *tmp;
char *url, *port, address[256];
if (opt_disable_client_reconnect) {
applog(LOG_WARNING, "Stratum client.reconnect forbidden, aborting.");
return false;
}
memset(address, 0, 255);
url = (char *)json_s... | 122,543,891,288,543,540,000,000,000,000,000,000,000 | util.c | 336,394,571,693,941,070,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2014-4501 | Multiple stack-based buffer overflows in sgminer before 4.2.2, cgminer before 4.3.5, and BFGMiner before 3.3.0 allow remote pool servers to have unspecified impact via a long URL in a client.reconnect stratum message to the (1) extract_sockaddr or (2) parse_reconnect functions in util.c. | https://nvd.nist.gov/vuln/detail/CVE-2014-4501 |
9,646 | libgd | 1ccfe21e14c4d18336f9da8515cd17db88c3de61 | https://github.com/libgd/libgd | https://github.com/libgd/libgd/commit/1ccfe21e14c4d18336f9da8515cd17db88c3de61 | fix php 72494, invalid color index not handled, can lead to crash | 1 | BGD_DECLARE(gdImagePtr) gdImageCropThreshold(gdImagePtr im, const unsigned int color, const float threshold)
{
const int width = gdImageSX(im);
const int height = gdImageSY(im);
int x,y;
int match;
gdRect crop;
crop.x = 0;
crop.y = 0;
crop.width = 0;
crop.height = 0;
/* Pierre: crop everything sounds bad *... | 58,602,749,696,991,850,000,000,000,000,000,000,000 | gd_crop.c | 283,844,472,613,649,240,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2016-6128 | The gdImageCropThreshold function in gd_crop.c in the GD Graphics Library (aka libgd) before 2.2.3, as used in PHP before 7.0.9, allows remote attackers to cause a denial of service (application crash) via an invalid color index. | https://nvd.nist.gov/vuln/detail/CVE-2016-6128 |
9,649 | wireshark | 11edc83b98a61e890d7bb01855389d40e984ea82 | https://github.com/wireshark/wireshark | https://github.com/wireshark/wireshark/commit/11edc83b98a61e890d7bb01855389d40e984ea82 | Don't treat the packet length as unsigned.
The scanf family of functions are as annoyingly bad at handling unsigned
numbers as strtoul() is - both of them are perfectly willing to accept a
value beginning with a negative sign as an unsigned value. When using
strtoul(), you can compensate for this by explicitly checki... | 1 | parse_netscreen_packet(FILE_T fh, struct wtap_pkthdr *phdr, Buffer* buf,
char *line, int *err, gchar **err_info)
{
int sec;
int dsec;
char cap_int[NETSCREEN_MAX_INT_NAME_LENGTH];
char direction[2];
guint pkt_len;
char cap_src[13];
char cap_dst[13];
guint8 *pd;
gchar *p;
int n, i = 0;... | 147,371,450,414,689,870,000,000,000,000,000,000,000 | netscreen.c | 286,276,784,978,868,850,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2016-5357 | wiretap/netscreen.c in the NetScreen file parser in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles sscanf unsigned-integer processing, which allows remote attackers to cause a denial of service (application crash) via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2016-5357 |
9,655 | linux | 4c185ce06dca14f5cea192f5a2c981ef50663f2b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/4c185ce06dca14f5cea192f5a2c981ef50663f2b | aio: lift iov_iter_init() into aio_setup_..._rw()
the only non-trivial detail is that we do it before rw_verify_area(),
so we'd better cap the length ourselves in aio_setup_single_rw()
case (for vectored case rw_copy_check_uvector() will do that for us).
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk> | 1 | static ssize_t aio_setup_single_vector(struct kiocb *kiocb,
int rw, char __user *buf,
unsigned long *nr_segs,
size_t len,
struct iovec *iovec)
{
if (unlikely(!access_ok(!rw, buf, len)))
return -EFAULT;
iovec->iov_base = buf;
iovec->iov_len = len;
*nr_segs = ... | 1,764,598,624,184,633,000,000,000,000,000,000,000 | aio.c | 10,187,739,604,289,771,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2015-8830 | Integer overflow in the aio_setup_single_vector function in fs/aio.c in the Linux kernel 4.0 allows local users to cause a denial of service or possibly have unspecified other impact via a large AIO iovec. NOTE: this vulnerability exists because of a CVE-2012-6701 regression. | https://nvd.nist.gov/vuln/detail/CVE-2015-8830 |
9,656 | linux | d11662f4f798b50d8c8743f433842c3e40fe3378 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d11662f4f798b50d8c8743f433842c3e40fe3378 | ALSA: timer: Fix race between read and ioctl
The read from ALSA timer device, the function snd_timer_user_tread(),
may access to an uninitialized struct snd_timer_user fields when the
read is concurrently performed while the ioctl like
snd_timer_user_tselect() is invoked. We have already fixed the races
among ioctls ... | 1 | static ssize_t snd_timer_user_read(struct file *file, char __user *buffer,
size_t count, loff_t *offset)
{
struct snd_timer_user *tu;
long result = 0, unit;
int qhead;
int err = 0;
tu = file->private_data;
unit = tu->tread ? sizeof(struct snd_timer_tread) : sizeof(struct snd_timer_read);
spin_lock_ir... | 56,027,744,184,134,710,000,000,000,000,000,000,000 | timer.c | 26,953,491,466,752,155,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2017-1000380 | sound/core/timer.c in the Linux kernel before 4.11.5 is vulnerable to a data race in the ALSA /dev/snd/timer driver resulting in local users being able to read information belonging to other users, i.e., uninitialized memory contents may be disclosed when a read and an ioctl happen at the same time. | https://nvd.nist.gov/vuln/detail/CVE-2017-1000380 |
9,659 | ImageMagick | acee073df34aa4d491bf5cb74d3a15fc80f0a3aa | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/acee073df34aa4d491bf5cb74d3a15fc80f0a3aa | None | 1 | static Image *ReadJP2Image(const ImageInfo *image_info,ExceptionInfo *exception)
{
const char
*option;
Image
*image;
int
jp2_status;
MagickBooleanType
status;
opj_codec_t
*jp2_codec;
opj_codestream_index_t
*codestream_index = (opj_codestream_index_t *) NULL;
opj_dparameters_t... | 145,640,868,358,261,100,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-13145 | In ImageMagick before 6.9.8-8 and 7.x before 7.0.5-9, the ReadJP2Image function in coders/jp2.c does not properly validate the channel geometry, leading to a crash. | https://nvd.nist.gov/vuln/detail/CVE-2017-13145 |
9,660 | FFmpeg | 611b35627488a8d0763e75c25ee0875c5b7987dd | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/611b35627488a8d0763e75c25ee0875c5b7987dd | avcodec/dnxhd_parser: Do not return invalid value from dnxhd_find_frame_end() on error
Fixes: Null pointer dereference
Fixes: CVE-2017-9608
Found-by: Yihan Lian
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 1 | static int dnxhd_find_frame_end(DNXHDParserContext *dctx,
const uint8_t *buf, int buf_size)
{
ParseContext *pc = &dctx->pc;
uint64_t state = pc->state64;
int pic_found = pc->frame_start_found;
int i = 0;
if (!pic_found) {
for (i = 0; i < buf_size; i++) {
... | 86,046,191,373,808,070,000,000,000,000,000,000,000 | dnxhd_parser.c | 54,129,044,710,275,890,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2017-9608 | The dnxhd decoder in FFmpeg before 3.2.6, and 3.3.x before 3.3.3 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted mov file. | https://nvd.nist.gov/vuln/detail/CVE-2017-9608 |
9,667 | ImageMagick | e87af64b1ff1635a32d9b6162f1b0e260fb54ed9 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/e87af64b1ff1635a32d9b6162f1b0e260fb54ed9 | None | 1 | static size_t WritePSDChannel(const PSDInfo *psd_info,
const ImageInfo *image_info,Image *image,Image *next_image,
const QuantumType quantum_type, unsigned char *compact_pixels,
MagickOffsetType size_offset,const MagickBooleanType separate)
{
int
y;
MagickBooleanType
monochrome;
QuantumInfo
*q... | 273,458,965,762,153,770,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2017-5510 | coders/psd.c in ImageMagick allows remote attackers to have unspecified impact via a crafted PSD file, which triggers an out-of-bounds write. | https://nvd.nist.gov/vuln/detail/CVE-2017-5510 |
9,669 | ImageMagick | 280215b9936d145dd5ee91403738ccce1333cab1 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/280215b9936d145dd5ee91403738ccce1333cab1 | Rewrite reading pixel values. | 1 | static MagickBooleanType ReadPSDChannelPixels(Image *image,
const size_t channels,const size_t row,const ssize_t type,
const unsigned char *pixels,ExceptionInfo *exception)
{
Quantum
pixel;
register const unsigned char
*p;
register Quantum
*q;
register ssize_t
x;
size_t
packet_s... | 42,358,738,219,081,613,000,000,000,000,000,000,000 | psd.c | 332,626,216,864,854,940,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2016-7514 | The ReadPSDChannelPixels function in coders/psd.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PSD file. | https://nvd.nist.gov/vuln/detail/CVE-2016-7514 |
9,672 | ImageMagick | 504ada82b6fa38a30c846c1c29116af7290decb2 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/504ada82b6fa38a30c846c1c29116af7290decb2 | None | 1 | static Image *ReadDDSImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
Image
*image;
MagickBooleanType
status,
cubemap = MagickFalse,
volume = MagickFalse,
matte;
CompressionType
compression;
DDSInfo
dds_info;
DDSDecoder
*decoder;
size_t
n,
num_images... | 213,987,347,007,398,430,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2014-9907 | coders/dds.c in ImageMagick allows remote attackers to cause a denial of service via a crafted DDS file. | https://nvd.nist.gov/vuln/detail/CVE-2014-9907 |
9,673 | linux | 251e22abde21833b3d29577e4d8c7aaccd650eee | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/251e22abde21833b3d29577e4d8c7aaccd650eee | pinctrl: amd: Use devm_pinctrl_register() for pinctrl registration
Use devm_pinctrl_register() for pin control registration and clean
error path.
Signed-off-by: Laxman Dewangan <ldewangan@nvidia.com>
Signed-off-by: Linus Walleij <linus.walleij@linaro.org> | 1 | static int amd_gpio_probe(struct platform_device *pdev)
{
int ret = 0;
int irq_base;
struct resource *res;
struct amd_gpio *gpio_dev;
gpio_dev = devm_kzalloc(&pdev->dev,
sizeof(struct amd_gpio), GFP_KERNEL);
if (!gpio_dev)
return -ENOMEM;
spin_lock_init(&gpio_dev->lock);
res = platform_get_resource(pde... | 152,429,198,517,298,730,000,000,000,000,000,000,000 | pinctrl-amd.c | 15,215,002,648,681,079,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2017-18174 | In the Linux kernel before 4.7, the amd_gpio_remove function in drivers/pinctrl/pinctrl-amd.c calls the pinctrl_unregister function, leading to a double free. | https://nvd.nist.gov/vuln/detail/CVE-2017-18174 |
9,674 | jasper | f25486c3d4aa472fec79150f2c41ed4333395d3d | https://github.com/mdadams/jasper | https://github.com/mdadams/jasper/commit/f25486c3d4aa472fec79150f2c41ed4333395d3d | Fixed a bug in the packet iterator code.
Added a new regression test case. | 1 | static int jpc_pi_nextrpcl(register jpc_pi_t *pi)
{
int rlvlno;
jpc_pirlvl_t *pirlvl;
jpc_pchg_t *pchg;
int prchind;
int prcvind;
int *prclyrno;
int compno;
jpc_picomp_t *picomp;
int xstep;
int ystep;
uint_fast32_t r;
uint_fast32_t rpx;
uint_fast32_t rpy;
uint_fast32_t trx0;
uint_fast32_t try0;
pchg = ... | 71,544,139,196,461,260,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2016-9583 | An out-of-bounds heap read vulnerability was found in the jpc_pi_nextpcrl() function of jasper before 2.0.6 when processing crafted input. | https://nvd.nist.gov/vuln/detail/CVE-2016-9583 |
9,676 | ImageMagick6 | a77d8d97f5a7bced0468f0b08798c83fb67427bc | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick/commit/a77d8d97f5a7bced0468f0b08798c83fb67427bc | None | 1 | MagickExport Image *MeanShiftImage(const Image *image,const size_t width,
const size_t height,const double color_distance,ExceptionInfo *exception)
{
#define MaxMeanShiftIterations 100
#define MeanShiftImageTag "MeanShift/Image"
CacheView
*image_view,
*mean_view,
*pixel_view;
Image
*mean_image... | 143,092,893,080,934,220,000,000,000,000,000,000,000 | feature.c | 270,023,721,232,859,400,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2019-14981 | In ImageMagick 7.x before 7.0.8-41 and 6.x before 6.9.10-41, there is a divide-by-zero vulnerability in the MeanShiftImage function. It allows an attacker to cause a denial of service by sending a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2019-14981 |
9,677 | ImageMagick6 | e92040ea6ee2a844ebfd2344174076795a4787bd | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick/commit/e92040ea6ee2a844ebfd2344174076795a4787bd | None | 1 | static MagickBooleanType WritePNMImage(const ImageInfo *image_info,Image *image,
ExceptionInfo *exception)
{
char
buffer[MagickPathExtent],
format,
magick[MagickPathExtent];
const char
*value;
MagickBooleanType
status;
MagickOffsetType
scene;
Quantum
index;
QuantumAny
... | 296,982,318,816,803,260,000,000,000,000,000,000,000 | pnm.c | 275,734,749,286,090,340,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2019-13306 | ImageMagick 7.0.8-50 Q16 has a stack-based buffer overflow at coders/pnm.c in WritePNMImage because of off-by-one errors. | https://nvd.nist.gov/vuln/detail/CVE-2019-13306 |
9,678 | ImageMagick6 | 29efd648f38b73a64d73f14cd2019d869a585888 | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick/commit/29efd648f38b73a64d73f14cd2019d869a585888 | None | 1 | static MagickBooleanType WritePNMImage(const ImageInfo *image_info,Image *image,
ExceptionInfo *exception)
{
char
buffer[MagickPathExtent],
format,
magick[MagickPathExtent];
const char
*value;
MagickBooleanType
status;
MagickOffsetType
scene;
Quantum
index;
QuantumAny
... | 29,796,776,391,938,395,000,000,000,000,000,000,000 | pnm.c | 180,653,638,133,340,120,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2019-13305 | ImageMagick 7.0.8-50 Q16 has a stack-based buffer overflow at coders/pnm.c in WritePNMImage because of a misplaced strncpy and an off-by-one error. | https://nvd.nist.gov/vuln/detail/CVE-2019-13305 |
9,679 | ImageMagick | bfa3b9610c83227894c92b0d312ad327fceb6241 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick6/commit/bfa3b9610c83227894c92b0d312ad327fceb6241 | None | 1 | static MagickBooleanType WritePNMImage(const ImageInfo *image_info,Image *image)
{
char
buffer[MaxTextExtent],
format,
magick[MaxTextExtent];
const char
*value;
IndexPacket
index;
MagickBooleanType
status;
MagickOffsetType
scene;
QuantumAny
pixel;
QuantumInfo
*qua... | 135,724,383,670,322,900,000,000,000,000,000,000,000 | pnm.c | 158,507,840,479,517,230,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2019-13304 | ImageMagick 7.0.8-50 Q16 has a stack-based buffer overflow at coders/pnm.c in WritePNMImage because of a misplaced assignment. | https://nvd.nist.gov/vuln/detail/CVE-2019-13304 |
9,680 | ImageMagick6 | 35ccb468ee2dcbe8ce9cf1e2f1957acc27f54c34 | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick/commit/35ccb468ee2dcbe8ce9cf1e2f1957acc27f54c34 | None | 1 | static Image *ReadPSImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
#define BoundingBox "BoundingBox:"
#define BeginDocument "BeginDocument:"
#define BeginXMPPacket "<?xpacket begin="
#define EndXMPPacket "<?xpacket end="
#define ICCProfile "BeginICCProfile:"
#define CMYKCustomColor "CMYKCustomColor:... | 175,368,670,304,185,900,000,000,000,000,000,000,000 | ps.c | 319,201,275,157,302,900,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2019-13137 | ImageMagick before 7.0.8-50 has a memory leak vulnerability in the function ReadPSImage in coders/ps.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-13137 |
9,681 | openjpeg | cbe7384016083eac16078b359acd7a842253d503 | https://github.com/uclouvain/openjpeg | https://github.com/uclouvain/openjpeg/commit/cbe7384016083eac16078b359acd7a842253d503 | None | 1 | static OPJ_BOOL bmp_read_rle4_data(FILE* IN, OPJ_UINT8* pData,
OPJ_UINT32 stride, OPJ_UINT32 width, OPJ_UINT32 height)
{
OPJ_UINT32 x, y;
OPJ_UINT8 *pix;
const OPJ_UINT8 *beyond;
beyond = pData + stride * height;
pix = pData;
x = y = 0U;
while (y ... | 107,959,287,325,417,320,000,000,000,000,000,000,000 | convertbmp.c | 204,530,473,747,156,800,000,000,000,000,000,000,000 | [
"CWE-400"
] | CVE-2019-12973 | In OpenJPEG 2.3.1, there is excessive iteration in the opj_t1_encode_cblks function of openjp2/t1.c. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted bmp file. This issue is similar to CVE-2018-6616. | https://nvd.nist.gov/vuln/detail/CVE-2019-12973 |
9,710 | Chrome | 60c9d8a39e4aa78dd51c236bd1b2c4f17c9d27fe | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/60c9d8a39e4aa78dd51c236bd1b2c4f17c9d27fe | None | 1 | bool TextAutosizer::processSubtree(RenderObject* layoutRoot)
{
if (!m_document->settings() || !m_document->settings()->textAutosizingEnabled() || layoutRoot->view()->printing() || !m_document->page())
return false;
Frame* mainFrame = m_document->page()->mainFrame();
TextAutosizingWindowInfo window... | 58,579,830,367,491,530,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-3906 | The PDF parser in Google Chrome before 16.0.912.63 allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2011-3906 |
9,726 | Chrome | 08b630e66e042af3fe80015509b3238c2679ea40 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/08b630e66e042af3fe80015509b3238c2679ea40 | None | 1 | bool RenderMenuList::multiple()
{
return toHTMLSelectElement(node())->multiple();
}
| 153,962,476,287,418,380,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2011-2830 | Google V8, as used in Google Chrome before 14.0.835.163, does not properly implement script object wrappers, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via unknown vectors. | https://nvd.nist.gov/vuln/detail/CVE-2011-2830 |
9,737 | Chrome | 9eb1fd426a04adac0906c81ed88f1089969702ba | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/9eb1fd426a04adac0906c81ed88f1089969702ba | None | 1 | void BeginInstallWithManifestFunction::OnParseSuccess(
const SkBitmap& icon, DictionaryValue* parsed_manifest) {
CHECK(parsed_manifest);
icon_ = icon;
parsed_manifest_.reset(parsed_manifest);
std::string init_errors;
dummy_extension_ = Extension::Create(
FilePath(),
Extension::INTERNAL,
... | 31,286,386,419,319,730,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2011-2358 | Google Chrome before 13.0.782.107 does not ensure that extension installations are confirmed by a browser dialog, which makes it easier for remote attackers to modify the product's functionality via a Trojan horse extension. | https://nvd.nist.gov/vuln/detail/CVE-2011-2358 |
9,744 | Chrome | ce891a86763d3540e2612be26938a6163310efe0 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/ce891a86763d3540e2612be26938a6163310efe0 | None | 1 | void ChromeContentRendererClient::RenderThreadStarted() {
chrome_observer_.reset(new ChromeRenderProcessObserver());
extension_dispatcher_.reset(new ExtensionDispatcher());
histogram_snapshots_.reset(new RendererHistogramSnapshots());
net_predictor_.reset(new RendererNetPredictor());
spellcheck_.reset(new Spe... | 161,105,270,804,386,400,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2011-2798 | Google Chrome before 13.0.782.107 does not properly restrict access to internal schemes, which allows remote attackers to have an unspecified impact via a crafted web site. | https://nvd.nist.gov/vuln/detail/CVE-2011-2798 |
9,757 | Chrome | bf04ad0dae9f4f479f90fd2b38f634ffbaf434b4 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/bf04ad0dae9f4f479f90fd2b38f634ffbaf434b4 | None | 1 | bool PPVarToNPVariant(PP_Var var, NPVariant* result) {
switch (var.type) {
case PP_VARTYPE_UNDEFINED:
VOID_TO_NPVARIANT(*result);
break;
case PP_VARTYPE_NULL:
NULL_TO_NPVARIANT(*result);
break;
case PP_VARTYPE_BOOL:
BOOLEAN_TO_NPVARIANT(var.value.as_bool, *result);
brea... | 114,945,807,708,477,050,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-2345 | The NPAPI implementation in Google Chrome before 12.0.742.112 does not properly handle strings, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2011-2345 |
9,764 | Chrome | 514f93279494ec4448b34a7aeeff27eccaae983f | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/514f93279494ec4448b34a7aeeff27eccaae983f | None | 1 | bool DebugOnStart::FindArgument(wchar_t* command_line, const char* argument_c) {
wchar_t argument[50];
for (int i = 0; argument_c[i]; ++i)
argument[i] = argument_c[i];
int argument_len = lstrlen(argument);
int command_line_len = lstrlen(command_line);
while (command_line_len > argument_len) {
wch... | 26,055,336,896,940,780,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2011-1301 | Use-after-free vulnerability in the GPU process in Google Chrome before 10.0.648.205 allows remote attackers to execute arbitrary code via unknown vectors. | https://nvd.nist.gov/vuln/detail/CVE-2011-1301 |
9,784 | Chrome | ad103a1564365c95f4ee4f10261f9604f91f686a | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/ad103a1564365c95f4ee4f10261f9604f91f686a | None | 1 | bool PPB_ImageData_Impl::Init(PP_ImageDataFormat format,
int width, int height,
bool init_to_zero) {
if (!IsImageDataFormatSupported(format))
return false; // Only support this one format for now.
if (width <= 0 || height <= 0)
return false;
... | 310,179,316,202,690,940,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2012-5143 | Integer overflow in Google Chrome before 23.0.1271.97 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to PPAPI image buffers. | https://nvd.nist.gov/vuln/detail/CVE-2012-5143 |
9,815 | Chrome | 9939d35f9827ed0929646607cbdb071af627ac38 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/9939d35f9827ed0929646607cbdb071af627ac38 | None | 1 | xsltCompileLocationPathPattern(xsltParserContextPtr ctxt, int novar) {
SKIP_BLANKS;
if ((CUR == '/') && (NXT(1) == '/')) {
/*
* since we reverse the query
* a leading // can be safely ignored
*/
NEXT;
NEXT;
ctxt->comp->priority = 0.5; /* '//' means not 0 priority */
xsltCompileRelativePathPattern(ctx... | 156,995,017,980,789,130,000,000,000,000,000,000,000 | pattern.c | 30,154,932,143,922,863,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2012-2870 | libxslt 1.1.26 and earlier, as used in Google Chrome before 21.0.1180.89, does not properly manage memory, which might allow remote attackers to cause a denial of service (application crash) via a crafted XSLT expression that is not properly identified during XPath navigation, related to (1) the xsltCompileLocationPath... | https://nvd.nist.gov/vuln/detail/CVE-2012-2870 |
9,824 | Chrome | 9b9a9f33f0a26f40d083be85a539dd7963adfc9b | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/9b9a9f33f0a26f40d083be85a539dd7963adfc9b | None | 1 | MediaStreamImpl::~MediaStreamImpl() {
DCHECK(!peer_connection_handler_);
if (dependency_factory_.get())
dependency_factory_->ReleasePeerConnectionFactory();
if (network_manager_) {
if (chrome_worker_thread_.IsRunning()) {
chrome_worker_thread_.message_loop()->PostTask(FROM_HERE, base::Bind(
... | 149,244,836,860,547,970,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2012-2817 | Use-after-free vulnerability in Google Chrome before 20.0.1132.43 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to tables that have sections. | https://nvd.nist.gov/vuln/detail/CVE-2012-2817 |
9,842 | Chrome | 4c46d7a5b0af9b7d320e709291b270ab7cf07e83 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/4c46d7a5b0af9b7d320e709291b270ab7cf07e83 | None | 1 | xmlXPtrEvalXPtrPart(xmlXPathParserContextPtr ctxt, xmlChar *name) {
xmlChar *buffer, *cur;
int len;
int level;
if (name == NULL)
name = xmlXPathParseName(ctxt);
if (name == NULL)
XP_ERROR(XPATH_EXPR_ERROR);
if (CUR != '(')
XP_ERROR(XPATH_EXPR_ERROR);
NEXT;
level = 1;
len = x... | 294,708,993,167,079,470,000,000,000,000,000,000,000 | xpointer.c | 16,906,315,991,765,553,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2011-3102 | Off-by-one error in libxml2, as used in Google Chrome before 19.0.1084.46 and other products, allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via unknown vectors. | https://nvd.nist.gov/vuln/detail/CVE-2011-3102 |
9,856 | Chrome | 4d77eed905ce1d00361282e8822a2a3be61d25c0 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/4d77eed905ce1d00361282e8822a2a3be61d25c0 | None | 1 | bool HTMLFormElement::prepareForSubmission(Event* event)
{
Frame* frame = document().frame();
if (m_isSubmittingOrPreparingForSubmission || !frame)
return m_isSubmittingOrPreparingForSubmission;
m_isSubmittingOrPreparingForSubmission = true;
m_shouldSubmit = false;
if (!validateIntera... | 82,440,017,099,070,620,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2013-2927 | Use-after-free vulnerability in the HTMLFormElement::prepareForSubmission function in core/html/HTMLFormElement.cpp in Blink, as used in Google Chrome before 30.0.1599.101, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to submission for FORM elements. | https://nvd.nist.gov/vuln/detail/CVE-2013-2927 |
9,857 | Chrome | c4a4dfb26615b5ef5e9dcc730ef43f70ce9202e2 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/c4a4dfb26615b5ef5e9dcc730ef43f70ce9202e2 | None | 1 | void RenderThreadImpl::Shutdown() {
FOR_EACH_OBSERVER(
RenderProcessObserver, observers_, OnRenderProcessShutdown());
ChildThread::Shutdown();
if (memory_observer_) {
message_loop()->RemoveTaskObserver(memory_observer_.get());
memory_observer_.reset();
}
if (webkit_platform_support_) {
... | 237,606,688,755,037,100,000,000,000,000,000,000,000 | None | null | [
"CWE-362"
] | CVE-2013-2906 | Multiple race conditions in the Web Audio implementation in Blink, as used in Google Chrome before 30.0.1599.66, allow remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to threading in core/html/HTMLMediaElement.cpp, core/platform/audio/AudioDSPKernelProcessor.c... | https://nvd.nist.gov/vuln/detail/CVE-2013-2906 |
9,858 | Chrome | 5b998565255a504887c6d2e90d11001a00c9d6da | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/5b998565255a504887c6d2e90d11001a00c9d6da | None | 1 | ExtensionBookmarksTest()
: client_(NULL), model_(NULL), node_(NULL), folder_(NULL) {}
| 155,261,079,591,022,440,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2013-2913 | Use-after-free vulnerability in the XMLDocumentParser::append function in core/xml/parser/XMLDocumentParser.cpp in Blink, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving an XML document. | https://nvd.nist.gov/vuln/detail/CVE-2013-2913 |
9,884 | Chrome | 0a57375ad73780e61e1770a9d88b0529b0dbd33b | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/0a57375ad73780e61e1770a9d88b0529b0dbd33b | None | 1 | WebNavigationPolicy RenderViewImpl::decidePolicyForNavigation(
WebFrame* frame, const WebURLRequest& request, WebNavigationType type,
const WebNode&, WebNavigationPolicy default_policy, bool is_redirect) {
if (request.url() != GURL(kSwappedOutURL) &&
GetContentClient()->renderer()->HandleNavigation(fram... | 270,273,416,564,137,120,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2013-0918 | Google Chrome before 26.0.1410.43 does not prevent navigation to developer tools in response to a drag-and-drop operation, which allows user-assisted remote attackers to have an unspecified impact via a crafted web site. | https://nvd.nist.gov/vuln/detail/CVE-2013-0918 |
9,888 | Chrome | 85f2fcc7b577362dd1def5895d60ea70d6e6b8d0 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/85f2fcc7b577362dd1def5895d60ea70d6e6b8d0 | None | 1 | void TabSpecificContentSettings::OnContentBlocked(
ContentSettingsType type,
const std::string& resource_identifier) {
DCHECK(type != CONTENT_SETTINGS_TYPE_GEOLOCATION)
<< "Geolocation settings handled by OnGeolocationPermissionSet";
content_accessed_[type] = true;
std::string identifier;
if (... | 49,248,163,557,894,240,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2013-0841 | Array index error in the content-blocking functionality in Google Chrome before 24.0.1312.56 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors. | https://nvd.nist.gov/vuln/detail/CVE-2013-0841 |
9,889 | Chrome | f96f1f27d9bc16b1a045c4fb5c8a8a82f73ece59 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/f96f1f27d9bc16b1a045c4fb5c8a8a82f73ece59 | None | 1 | bool WebRtcAudioRenderer::Initialize(WebRtcAudioRendererSource* source) {
base::AutoLock auto_lock(lock_);
DCHECK_EQ(state_, UNINITIALIZED);
DCHECK(source);
DCHECK(!sink_);
DCHECK(!source_);
sink_ = AudioDeviceFactory::NewOutputDevice();
DCHECK(sink_);
int sample_rate = GetAudioOutputSampleRate();
D... | 158,651,565,407,137,820,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2013-0843 | content/renderer/media/webrtc_audio_renderer.cc in Google Chrome before 24.0.1312.56 on Mac OS X does not use an appropriate buffer size for the 96 kHz sampling rate, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a web ... | https://nvd.nist.gov/vuln/detail/CVE-2013-0843 |
9,901 | Chrome | 137458c8680c51fe9d3984ded2ef50a45a667b8b | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/137458c8680c51fe9d3984ded2ef50a45a667b8b | None | 1 | bool DoTouchScroll(const gfx::Point& point,
const gfx::Vector2d& distance,
bool wait_until_scrolled) {
EXPECT_EQ(0, GetScrollTop());
int scrollHeight = ExecuteScriptAndExtractInt(
"document.documentElement.scrollHeight");
EXPECT_EQ(1200, scrollHeight);
... | 328,679,834,534,134,300,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2014-7903 | Buffer overflow in OpenJPEG before r2911 in PDFium, as used in Google Chrome before 39.0.2171.65, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted JPEG image. | https://nvd.nist.gov/vuln/detail/CVE-2014-7903 |
9,903 | Chrome | b2006ac87cec58363090e7d5e10d5d9e3bbda9f9 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/b2006ac87cec58363090e7d5e10d5d9e3bbda9f9 | None | 1 | static bool CheckMov(const uint8* buffer, int buffer_size) {
RCHECK(buffer_size > 8);
int offset = 0;
while (offset + 8 < buffer_size) {
int atomsize = Read32(buffer + offset);
uint32 atomtype = Read32(buffer + offset + 4);
switch (atomtype) {
case TAG('f','t','y','p'):
case TAG('p',... | 82,572,215,792,595,670,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2014-7908 | Multiple integer overflows in the CheckMov function in media/base/container_names.cc in Google Chrome before 39.0.2171.65 allow remote attackers to cause a denial of service or possibly have unspecified other impact via a large atom in (1) MPEG-4 or (2) QuickTime .mov data. | https://nvd.nist.gov/vuln/detail/CVE-2014-7908 |
9,912 | Chrome | 0b694217046d6b2bfa5814676e8615c18e6a45ff | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/0b694217046d6b2bfa5814676e8615c18e6a45ff | None | 1 | void SystemClipboard::WriteImage(Image* image,
const KURL& url,
const String& title) {
DCHECK(image);
PaintImage paint_image = image->PaintImageForCurrentFrame();
SkBitmap bitmap;
if (sk_sp<SkImage> sk_image = paint_image.GetSkImage())
sk_im... | 187,180,540,660,422,700,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2014-3156 | Buffer overflow in the clipboard implementation in Google Chrome before 35.0.1916.153 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger unexpected bitmap data, related to content/renderer/renderer_clipboard_client.cc and content/renderer/webclipboard... | https://nvd.nist.gov/vuln/detail/CVE-2014-3156 |
9,937 | Chrome | f7b2214a08547e0d28b1a2fef3c19ee0f9febd19 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/f7b2214a08547e0d28b1a2fef3c19ee0f9febd19 | None | 1 | bool GetNetworkList(NetworkInterfaceList* networks, int policy) {
int s = socket(AF_INET, SOCK_DGRAM, 0);
if (s <= 0) {
PLOG(ERROR) << "socket";
return false;
}
uint32_t num_ifs = 0;
if (ioctl_netc_get_num_ifs(s, &num_ifs) < 0) {
PLOG(ERROR) << "ioctl_netc_get_num_ifs";
PCHECK(close(s) == 0);... | 249,454,725,959,250,330,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2015-6764 | The BasicJsonStringifier::SerializeJSArray function in json-stringifier.h in the JSON stringifier in Google V8, as used in Google Chrome before 47.0.2526.73, improperly loads array elements, which allows remote attackers to cause a denial of service (out-of-bounds memory access) or possibly have unspecified other impac... | https://nvd.nist.gov/vuln/detail/CVE-2015-6764 |
9,941 | Chrome | e1e0c4301aaa8228e362f2409dbde2d4d1896866 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/e1e0c4301aaa8228e362f2409dbde2d4d1896866 | None | 1 | void Document::open()
{
ASSERT(!importLoader());
if (m_frame) {
if (ScriptableDocumentParser* parser = scriptableDocumentParser()) {
if (parser->isParsing()) {
if (parser->isExecutingScript())
return;
if (!parser->wasCreatedByScript() && ... | 33,649,530,546,418,673,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2015-6782 | The Document::open function in WebKit/Source/core/dom/Document.cpp in Google Chrome before 47.0.2526.73 does not ensure that page-dismissal event handling is compatible with modal-dialog blocking, which makes it easier for remote attackers to spoof Omnibox content via a crafted web site. | https://nvd.nist.gov/vuln/detail/CVE-2015-6782 |
9,968 | Chrome | fc81fcf38edd250876cc384a6ed5567e1b2999e4 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/fc81fcf38edd250876cc384a6ed5567e1b2999e4 | None | 1 | void V8LazyEventListener::prepareListenerObject(ExecutionContext* executionContext)
{
if (!executionContext)
return;
v8::HandleScope handleScope(toIsolate(executionContext));
v8::Local<v8::Context> v8Context = toV8Context(executionContext, world());
if (v8Context.IsEmpty())
return;
... | 124,785,778,898,912,590,000,000,000,000,000,000,000 | None | null | [
"CWE-17"
] | CVE-2015-1217 | The V8LazyEventListener::prepareListenerObject function in bindings/core/v8/V8LazyEventListener.cpp in the V8 bindings in Blink, as used in Google Chrome before 41.0.2272.76, does not properly compile listeners, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via vec... | https://nvd.nist.gov/vuln/detail/CVE-2015-1217 |
9,972 | Chrome | 5472db1c7eca35822219d03be5c817d9a9258c11 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/5472db1c7eca35822219d03be5c817d9a9258c11 | None | 1 | void PaintLayerScrollableArea::UpdateCompositingLayersAfterScroll() {
PaintLayerCompositor* compositor = GetLayoutBox()->View()->Compositor();
if (!compositor->InCompositingMode())
return;
if (UsesCompositedScrolling()) {
DCHECK(Layer()->HasCompositedLayerMapping());
ScrollingCoordinator* scrolling... | 254,694,208,352,117,680,000,000,000,000,000,000,000 | None | null | [
"CWE-79"
] | CVE-2016-5147 | Blink, as used in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux, mishandles deferred page loads, which allows remote attackers to inject arbitrary web script or HTML via a crafted web site, aka "Universal XSS (UXSS)." | https://nvd.nist.gov/vuln/detail/CVE-2016-5147 |
9,995 | Chrome | 0d151e09e13a704e9738ea913d117df7282e6c7d | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/0d151e09e13a704e9738ea913d117df7282e6c7d | None | 1 | void TestBlinkPlatformSupport::cryptographicallyRandomValues(
unsigned char* buffer,
size_t length) {
}
| 267,872,989,200,443,520,000,000,000,000,000,000,000 | None | null | [
"CWE-310"
] | CVE-2016-1618 | Blink, as used in Google Chrome before 48.0.2564.82, does not ensure that a proper cryptographicallyRandomValues random number generator is used, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2016-1618 |
9,998 | Chrome | 7c5aa07be11cd63d953fbe66370c5869a52170bf | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/7c5aa07be11cd63d953fbe66370c5869a52170bf | None | 1 | std::string GetUploadData(const std::string& brand) {
DCHECK(!brand.empty());
std::string data(kPostXml);
const std::string placeholder("__BRANDCODE_PLACEHOLDER__");
size_t placeholder_pos = data.find(placeholder);
DCHECK(placeholder_pos != std::string::npos);
data.replace(placeholder_pos, placeholder.siz... | 208,654,258,749,662,370,000,000,000,000,000,000,000 | None | null | [
"CWE-79"
] | CVE-2016-1652 | Cross-site scripting (XSS) vulnerability in the ModuleSystem::RequireForJsInner function in extensions/renderer/module_system.cc in the Extensions subsystem in Google Chrome before 50.0.2661.75 allows remote attackers to inject arbitrary web script or HTML via a crafted web site, aka "Universal XSS (UXSS)." | https://nvd.nist.gov/vuln/detail/CVE-2016-1652 |
10,007 | Chrome | 48a13696977c4bd082341ac85d942128ba2638e4 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/48a13696977c4bd082341ac85d942128ba2638e4 | None | 1 | const service_manager::Manifest& GetChromeContentBrowserOverlayManifest() {
static base::NoDestructor<service_manager::Manifest> manifest {
service_manager::ManifestBuilder()
.ExposeCapability("gpu",
service_manager::Manifest::InterfaceList<
metrics:... | 173,432,205,096,925,380,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-5110 | Inappropriate implementation of the web payments API on blob: and data: schemes in Web Payments in Google Chrome prior to 60.0.3112.78 for Mac, Windows, Linux, and Android allowed a remote attacker to spoof the contents of the Omnibox via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2017-5110 |
10,008 | Chrome | ae6f339fba0736224fdca0b96d2bb1cda42d8ad3 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/ae6f339fba0736224fdca0b96d2bb1cda42d8ad3 | None | 1 | bool IDNSpoofChecker::SafeToDisplayAsUnicode(base::StringPiece16 label,
bool is_tld_ascii) {
UErrorCode status = U_ZERO_ERROR;
int32_t result =
uspoof_check(checker_, label.data(),
base::checked_cast<int32_t>(label.size()), NULL, &status);
if (... | 331,452,579,950,378,500,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-5086 | Insufficient Policy Enforcement in Omnibox in Google Chrome prior to 59.0.3071.86 for Windows and Mac allowed a remote attacker to perform domain spoofing via IDN homographs in a crafted domain name. | https://nvd.nist.gov/vuln/detail/CVE-2017-5086 |
10,041 | Chrome | 7da6c3419fd172405bcece1ae4ec6ec8316cd345 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/7da6c3419fd172405bcece1ae4ec6ec8316cd345 | None | 1 | void RenderWidgetHostImpl::DidNavigate(uint32_t next_source_id) {
current_content_source_id_ = next_source_id;
did_receive_first_frame_after_navigation_ = false;
if (enable_surface_synchronization_) {
visual_properties_ack_pending_ = false;
viz::LocalSurfaceId old_surface_id = view_->GetLocalSurfaceId()... | 179,967,799,219,761,100,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-17467 | Insufficiently quick clearing of stale rendered content in Navigation in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-17467 |
10,044 | Chrome | e89b9003df8c7bd7822e5b6c0a76e726a6ed1505 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/e89b9003df8c7bd7822e5b6c0a76e726a6ed1505 | None | 1 | void MimeHandlerViewContainer::OnReady() {
if (!render_frame() || !is_embedded_)
return;
blink::WebLocalFrame* frame = render_frame()->GetWebFrame();
blink::WebAssociatedURLLoaderOptions options;
DCHECK(!loader_);
loader_.reset(frame->CreateAssociatedURLLoader(options));
blink::WebURLRequest request... | 136,943,128,534,837,900,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-6089 | A lack of CORS checks, after a Service Worker redirected to a cross-origin PDF, in Service Worker in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to leak limited cross-origin data via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-6089 |
10,057 | Chrome | e56aee6473486fdfac0429747284fda7cdd3aae5 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/e56aee6473486fdfac0429747284fda7cdd3aae5 | None | 1 | void ImageLoader::DoUpdateFromElement(BypassMainWorldBehavior bypass_behavior,
UpdateFromElementBehavior update_behavior,
const KURL& url,
ReferrerPolicy referrer_policy,
... | 101,908,932,034,635,230,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-6114 | Incorrect enforcement of CSP for <object> tags in Blink in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to bypass content security policy via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2018-6114 |
10,067 | Chrome | 9d81094d7b0bfc8be6bba2f5084e790677e527c8 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/9d81094d7b0bfc8be6bba2f5084e790677e527c8 | None | 1 | ProfilingProcessHost::Mode ProfilingProcessHost::GetCurrentMode() {
const base::CommandLine* cmdline = base::CommandLine::ForCurrentProcess();
#if BUILDFLAG(USE_ALLOCATOR_SHIM)
if (cmdline->HasSwitch(switches::kMemlog) ||
base::FeatureList::IsEnabled(kOOPHeapProfilingFeature)) {
if (cmdline->HasSwitch(swi... | 46,622,500,276,925,110,000,000,000,000,000,000,000 | None | null | [
"CWE-416"
] | CVE-2017-15411 | Use after free in PDFium in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. | https://nvd.nist.gov/vuln/detail/CVE-2017-15411 |
10,079 | Chrome | cfb022640b5eec337b06f88a485487dc92ca1ac1 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/cfb022640b5eec337b06f88a485487dc92ca1ac1 | None | 1 | void MediaStreamDispatcherHost::DoOpenDevice(
int32_t page_request_id,
const std::string& device_id,
blink::MediaStreamType type,
OpenDeviceCallback callback,
MediaDeviceSaltAndOrigin salt_and_origin) {
DCHECK_CURRENTLY_ON(BrowserThread::IO);
if (!MediaStreamManager::IsOriginAllowed(render_proce... | 16,333,236,676,002,740,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2019-5824 | Parameter passing error in media in Google Chrome prior to 74.0.3729.131 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2019-5824 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.