idx
int64
project
string
commit_id
string
project_url
string
commit_url
string
commit_message
string
target
int64
func
string
func_hash
float64
file_name
string
file_hash
float64
cwe
list
cve
string
cve_desc
string
nvd_url
string
9,530
ImageMagick
53c1dcd34bed85181b901bfce1a2322f85a59472
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/53c1dcd34bed85181b901bfce1a2322f85a59472
None
1
static void RemoveICCProfileFromResourceBlock(StringInfo *bim_profile) { register const unsigned char *p; size_t length; unsigned char *datum; unsigned int count, long_sans; unsigned short id, short_sans; length=GetStringInfoLength(bim_profile); if (length < 16) return...
189,144,678,419,063,640,000,000,000,000,000,000,000
psd.c
171,607,370,422,252,440,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2016-7538
coders/psd.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2016-7538
9,532
ImageMagick
4b1b9c0522628887195bad3a6723f7000b0c9a58
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/4b1b9c0522628887195bad3a6723f7000b0c9a58
Added extra check to fix https://github.com/ImageMagick/ImageMagick/issues/93
1
static Image *ReadPSDImage(const ImageInfo *image_info,ExceptionInfo *exception) { Image *image; MagickBooleanType has_merged_image, skip_layers; MagickOffsetType offset; MagickSizeType length; MagickBooleanType status; PSDInfo psd_info; register ssize_t i; ssize_t...
211,643,997,121,185,530,000,000,000,000,000,000,000
psd.c
210,776,347,083,540,080,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2016-7522
The ReadPSDImage function in MagickCore/locale.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PSD file.
https://nvd.nist.gov/vuln/detail/CVE-2016-7522
9,533
pupnp-code
be0a01bdb83395d9f3a5ea09c1308a4f1a972cbd
https://github.com/mjg59/pupnp-code
https://github.com/mjg59/pupnp-code/commit/be0a01bdb83395d9f3a5ea09c1308a4f1a972cbd
Don't allow unhandled POSTs to write to the filesystem by default If there's no registered handler for a POST request, the default behaviour is to write it to the filesystem. Several million deployed devices appear to have this behaviour, making it possible to (at least) store arbitrary data on them. Add a configure o...
1
static int http_RecvPostMessage( /*! HTTP Parser object. */ http_parser_t *parser, /*! [in] Socket Information object. */ SOCKINFO *info, /*! File where received data is copied to. */ char *filename, /*! Send Instruction object which gives information whether the file * is a virtual file or not. */ struct Sen...
172,421,084,346,481,900,000,000,000,000,000,000,000
webserver.c
294,353,686,090,577,800,000,000,000,000,000,000,000
[ "CWE-284" ]
CVE-2016-6255
Portable UPnP SDK (aka libupnp) before 1.6.21 allows remote attackers to write to arbitrary files in the webroot via a POST request without a registered handler.
https://nvd.nist.gov/vuln/detail/CVE-2016-6255
9,535
ImageMagick
bd96074b254c6607a0f7731e59f923ad19d5a46d
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/bd96074b254c6607a0f7731e59f923ad19d5a46d
http://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=26848
1
static Image *ReadSUNImage(const ImageInfo *image_info,ExceptionInfo *exception) { #define RMT_EQUAL_RGB 1 #define RMT_NONE 0 #define RMT_RAW 2 #define RT_STANDARD 1 #define RT_ENCODED 2 #define RT_FORMAT_RGB 3 typedef struct _SUNInfo { unsigned int magic, width, height, depth, ...
223,671,316,596,223,770,000,000,000,000,000,000,000
sun.c
234,907,776,145,379,860,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2015-8957
Buffer overflow in ImageMagick before 6.9.0-4 Beta allows remote attackers to cause a denial of service (application crash) via a crafted SUN file.
https://nvd.nist.gov/vuln/detail/CVE-2015-8957
9,536
libdwarf
11750a2838e52953013e3114ef27b3c7b1780697
https://github.com/tomhughes/libdwarf
https://github.com/tomhughes/libdwarf/commit/11750a2838e52953013e3114ef27b3c7b1780697
None
1
dwarf_elf_object_access_load_section(void* obj_in, Dwarf_Half section_index, Dwarf_Small** section_data, int* error) { dwarf_elf_object_access_internals_t*obj = (dwarf_elf_object_access_internals_t*)obj_in; if (section_index == 0) { return DW_DLV_NO_ENTRY; } { Elf_...
121,953,510,839,817,200,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2015-8750
libdwarf 20151114 and earlier allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a debug_abbrev section marked NOBITS in an ELF file.
https://nvd.nist.gov/vuln/detail/CVE-2015-8750
9,544
linux
fc0a80798576f80ca10b3f6c9c7097f12fd1d64e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/fc0a80798576f80ca10b3f6c9c7097f12fd1d64e
[media] v4l: Share code between video_usercopy and video_ioctl2 The two functions are mostly identical. They handle the copy_from_user and copy_to_user operations related with V4L2 ioctls and call the real ioctl handler. Create a __video_usercopy function that implements the core of video_usercopy and video_ioctl2, a...
1
video_usercopy(struct file *file, unsigned int cmd, unsigned long arg, v4l2_kioctl func) { char sbuf[128]; void *mbuf = NULL; void *parg = NULL; long err = -EINVAL; int is_ext_ctrl; size_t ctrls_size = 0; void __user *user_ptr = NULL; is_ext_ctrl = (cmd == VIDIOC_S_EXT_CTRLS || cmd == VIDIOC_G_EXT_CT...
301,806,867,333,767,700,000,000,000,000,000,000,000
v4l2-ioctl.c
39,902,839,306,685,947,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2010-5329
The video_usercopy function in drivers/media/video/v4l2-ioctl.c in the Linux kernel before 2.6.39 relies on the count value of a v4l2_ext_controls data structure to determine a kmalloc size, which might allow local users to cause a denial of service (memory consumption) via a large value.
https://nvd.nist.gov/vuln/detail/CVE-2010-5329
9,545
linux
6c4841c2b6c32a134f9f36e5e08857138cc12b10
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6c4841c2b6c32a134f9f36e5e08857138cc12b10
[POWERPC] Never panic when taking altivec exceptions from userspace At the moment we rely on a cpu feature bit or a firmware property to detect altivec. If we dont have either of these and the cpu does in fact support altivec we can cause a panic from userspace. It seems safer to always send a signal if we manage to ...
1
void altivec_unavailable_exception(struct pt_regs *regs) { #if !defined(CONFIG_ALTIVEC) if (user_mode(regs)) { /* A user program has executed an altivec instruction, but this kernel doesn't support altivec. */ _exception(SIGILL, regs, ILL_ILLOPC, regs->nip); return; } #endif printk(KERN_EMERG "Un...
86,528,045,310,394,810,000,000,000,000,000,000,000
traps.c
305,004,121,217,082,200,000,000,000,000,000,000
[ "CWE-19" ]
CVE-2006-5331
The altivec_unavailable_exception function in arch/powerpc/kernel/traps.c in the Linux kernel before 2.6.19 on 64-bit systems mishandles the case where CONFIG_ALTIVEC is defined and the CPU actually supports Altivec, but the Altivec support was not detected by the kernel, which allows local users to cause a denial of s...
https://nvd.nist.gov/vuln/detail/CVE-2006-5331
9,546
linux
4dcc29e1574d88f4465ba865ed82800032f76418
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/4dcc29e1574d88f4465ba865ed82800032f76418
[IA64] Workaround for RSE issue Problem: An application violating the architectural rules regarding operation dependencies and having specific Register Stack Engine (RSE) state at the time of the violation, may result in an illegal operation fault and invalid RSE state. Such faults may initiate a cascade of repeated ...
1
setup_arch (char **cmdline_p) { unw_init(); ia64_patch_vtop((u64) __start___vtop_patchlist, (u64) __end___vtop_patchlist); *cmdline_p = __va(ia64_boot_param->command_line); strlcpy(boot_command_line, *cmdline_p, COMMAND_LINE_SIZE); efi_init(); io_port_init(); #ifdef CONFIG_IA64_GENERIC /* machvec needs to be...
30,744,359,066,288,716,000,000,000,000,000,000,000
setup.c
23,788,835,942,018,467,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2006-3635
The ia64 subsystem in the Linux kernel before 2.6.26 allows local users to cause a denial of service (stack consumption and system crash) via a crafted application that leverages the mishandling of invalid Register Stack Engine (RSE) state.
https://nvd.nist.gov/vuln/detail/CVE-2006-3635
9,547
FFmpeg
bab0716c7f4793ec42e05a5aa7e80d82a0dd4e75
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/bab0716c7f4793ec42e05a5aa7e80d82a0dd4e75
avformat/mxfdec: Fix av_log context Fixes: out of array access Fixes: mxf-crash-1c2e59bf07a34675bfb3ada5e1ec22fa9f38f923 Found-by: Paul Ch <paulcher@icloud.com> Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
1
static int mxf_parse_structural_metadata(MXFContext *mxf) { MXFPackage *material_package = NULL; int i, j, k, ret; av_log(mxf->fc, AV_LOG_TRACE, "metadata sets count %d\n", mxf->metadata_sets_count); /* TODO: handle multiple material packages (OP3x) */ for (i = 0; i < mxf->packages_count; i++) { ...
202,689,793,885,959,200,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2018-1999014
FFmpeg before commit bab0716c7f4793ec42e05a5aa7e80d82a0dd4e75 contains an out of array access vulnerability in MXF format demuxer that can result in DoS. This attack appear to be exploitable via specially crafted MXF file which has to be provided as input. This vulnerability appears to have been fixed in bab0716c7f4793...
https://nvd.nist.gov/vuln/detail/CVE-2018-1999014
9,548
linux
704620afc70cf47abb9d6a1a57f3825d2bca49cf
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/704620afc70cf47abb9d6a1a57f3825d2bca49cf
USB: check usb_get_extra_descriptor for proper size When reading an extra descriptor, we need to properly check the minimum and maximum size allowed, to prevent from invalid data being sent by a device. Reported-by: Hui Peng <benquike@gmail.com> Reported-by: Mathias Payer <mathias.payer@nebelwelt.net> Co-developed-by...
1
int __usb_get_extra_descriptor(char *buffer, unsigned size, unsigned char type, void **ptr) { struct usb_descriptor_header *header; while (size >= sizeof(struct usb_descriptor_header)) { header = (struct usb_descriptor_header *)buffer; if (header->bLength < 2) { printk(KERN_ERR "%s: bo...
106,931,598,352,293,150,000,000,000,000,000,000,000
None
null
[ "CWE-400" ]
CVE-2018-20169
An issue was discovered in the Linux kernel before 4.19.9. The USB subsystem mishandles size checks during the reading of an extra descriptor, related to __usb_get_extra_descriptor in drivers/usb/core/usb.c.
https://nvd.nist.gov/vuln/detail/CVE-2018-20169
9,553
ImageMagick
76efa969342568841ecf320b5a041685a6d24e0b
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/76efa969342568841ecf320b5a041685a6d24e0b
https://github.com/ImageMagick/ImageMagick/issues/1201
1
static Image *ReadOneJNGImage(MngInfo *mng_info, const ImageInfo *image_info, ExceptionInfo *exception) { Image *alpha_image, *color_image, *image, *jng_image; ImageInfo *alpha_image_info, *color_image_info; MagickBooleanType logging; ssize_t y; MagickBooleanType st...
222,028,886,100,808,540,000,000,000,000,000,000,000
png.c
142,721,393,521,923,200,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2018-16640
ImageMagick 7.0.8-5 has a memory leak vulnerability in the function ReadOneJNGImage in coders/png.c.
https://nvd.nist.gov/vuln/detail/CVE-2018-16640
9,558
OpenSC
360e95d45ac4123255a4c796db96337f332160ad
https://github.com/OpenSC/OpenSC
https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-477b7a40136bb418b10ce271c8664536
fixed out of bounds writes Thanks to Eric Sesterhenn from X41 D-SEC GmbH for reporting the problems.
1
int read_file(struct sc_card *card, char *str_path, unsigned char **data, size_t *data_len) { struct sc_path path; struct sc_file *file; unsigned char *p; int ok = 0; int r; size_t len; sc_format_path(str_path, &path); if (SC_SUCCESS != sc_select_file(card, &path, &file)) { goto err; } len = file ? fil...
172,003,075,881,968,860,000,000,000,000,000,000,000
egk-tool.c
139,373,658,683,374,800,000,000,000,000,000,000,000
[ "CWE-415" ]
CVE-2018-16420
Several buffer overflows when handling responses from an ePass 2003 Card in decrypt_response in libopensc/card-epass2003.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2018-16420
9,560
libxkbcommon
4e2ee9c3f6050d773f8bbe05bc0edb17f1ff8371
https://github.com/xkbcommon/libxkbcommon
https://github.com/xkbcommon/libxkbcommon/commit/4e2ee9c3f6050d773f8bbe05bc0edb17f1ff8371
xkbcomp: Don't explode on invalid virtual modifiers testcase: 'virtualModifiers=LevelThreC' Signed-off-by: Daniel Stone <daniels@collabora.com>
1
LookupModMask(struct xkb_context *ctx, const void *priv, xkb_atom_t field, enum expr_value_type type, xkb_mod_mask_t *val_rtrn) { const char *str; xkb_mod_index_t ndx; const LookupModMaskPriv *arg = priv; const struct xkb_mod_set *mods = arg->mods; enum mod_type mod_type = arg->mod_typ...
24,416,886,959,946,870,000,000,000,000,000,000,000
expr.c
130,236,114,452,490,950,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2018-15862
Unchecked NULL pointer usage in LookupModMask in xkbcomp/expr.c in xkbcommon before 0.8.2 could be used by local attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying a crafted keymap file with invalid virtual modifiers.
https://nvd.nist.gov/vuln/detail/CVE-2018-15862
9,561
libxkbcommon
38e1766bc6e20108948aec8a0b222a4bad0254e9
https://github.com/xkbcommon/libxkbcommon
https://github.com/xkbcommon/libxkbcommon/commit/38e1766bc6e20108948aec8a0b222a4bad0254e9
xkbcomp: Don't falsely promise from ExprResolveLhs Every user of ExprReturnLhs goes on to unconditionally dereference the field return, which can be NULL if xkb_intern_atom fails. Return false if this is the case, so we fail safely. testcase: splice geometry data into interp Signed-off-by: Daniel Stone <daniels@coll...
1
ExprResolveLhs(struct xkb_context *ctx, const ExprDef *expr, const char **elem_rtrn, const char **field_rtrn, ExprDef **index_rtrn) { switch (expr->expr.op) { case EXPR_IDENT: *elem_rtrn = NULL; *field_rtrn = xkb_atom_text(ctx, expr->ident.ident); *index_...
310,474,843,548,005,200,000,000,000,000,000,000,000
expr.c
130,236,114,452,490,950,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2018-15861
Unchecked NULL pointer usage in ExprResolveLhs in xkbcomp/expr.c in xkbcommon before 0.8.2 could be used by local attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying a crafted keymap file that triggers an xkb_intern_atom failure.
https://nvd.nist.gov/vuln/detail/CVE-2018-15861
9,563
src
779974d35b4859c07bc3cb8a12c74b43b0a7d1e0
https://github.com/openbsd/src
https://github.com/openbsd/src/commit/779974d35b4859c07bc3cb8a12c74b43b0a7d1e0
delay bailout for invalid authenticating user until after the packet containing the request has been fully parsed. Reported by Dariusz Tytko and Michał Sajdak; ok deraadt
1
userauth_gssapi(struct ssh *ssh) { Authctxt *authctxt = ssh->authctxt; gss_OID_desc goid = {0, NULL}; Gssctxt *ctxt = NULL; int r, present; u_int mechs; OM_uint32 ms; size_t len; u_char *doid = NULL; if (!authctxt->valid || authctxt->user == NULL) return (0); if ((r = sshpkt_get_u32(ssh, &mechs)) != 0)...
135,574,210,007,241,960,000,000,000,000,000,000,000
auth2-gss.c
162,181,254,281,413,600,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2018-15473
OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c.
https://nvd.nist.gov/vuln/detail/CVE-2018-15473
9,564
linux
cb2595c1393b4a5211534e6f0a0fbad369e21ad8
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/cb2595c1393b4a5211534e6f0a0fbad369e21ad8
infiniband: fix a possible use-after-free bug ucma_process_join() will free the new allocated "mc" struct, if there is any error after that, especially the copy_to_user(). But in parallel, ucma_leave_multicast() could find this "mc" through idr_find() before ucma_process_join() frees it, since it is already published...
1
static ssize_t ucma_process_join(struct ucma_file *file, struct rdma_ucm_join_mcast *cmd, int out_len) { struct rdma_ucm_create_id_resp resp; struct ucma_context *ctx; struct ucma_multicast *mc; struct sockaddr *addr; int ret; u8 join_state; if (out_len < sizeof(resp)) return -ENOSPC; addr = (struct s...
215,561,590,485,077,280,000,000,000,000,000,000,000
ucma.c
329,077,903,464,487,270,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2018-14734
drivers/infiniband/core/ucma.c in the Linux kernel through 4.17.11 allows ucma_leave_multicast to access a certain data structure after a cleanup step in ucma_process_join, which allows attackers to cause a denial of service (use-after-free).
https://nvd.nist.gov/vuln/detail/CVE-2018-14734
9,566
neomutt
9e927affe3a021175f354af5fa01d22657c20585
https://github.com/neomutt/neomutt
https://github.com/neomutt/neomutt/commit/9e927affe3a021175f354af5fa01d22657c20585
Add alloc fail check in nntp_fetch_headers
1
static int nntp_fetch_headers(struct Context *ctx, void *hc, anum_t first, anum_t last, int restore) { struct NntpData *nntp_data = ctx->data; struct FetchCtx fc; struct Header *hdr = NULL; char buf[HUGE_STRING]; int rc = 0; int oldmsgcount = ctx->msgcount; anum_t current; ...
63,790,838,672,285,430,000,000,000,000,000,000,000
nntp.c
78,438,500,915,793,575,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2018-14361
An issue was discovered in NeoMutt before 2018-07-16. nntp.c proceeds even if memory allocation fails for messages data.
https://nvd.nist.gov/vuln/detail/CVE-2018-14361
9,568
linux
6d8c50dcb029872b298eea68cc6209c866fd3e14
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6d8c50dcb029872b298eea68cc6209c866fd3e14
socket: close race condition between sock_close() and sockfs_setattr() fchownat() doesn't even hold refcnt of fd until it figures out fd is really needed (otherwise is ignored) and releases it after it resolves the path. This means sock_close() could race with sockfs_setattr(), which leads to a NULL pointer dereferenc...
1
static int sockfs_setattr(struct dentry *dentry, struct iattr *iattr) { int err = simple_setattr(dentry, iattr); if (!err && (iattr->ia_valid & ATTR_UID)) { struct socket *sock = SOCKET_I(d_inode(dentry)); sock->sk->sk_uid = iattr->ia_uid; } return err; }
270,332,479,041,084,860,000,000,000,000,000,000,000
socket.c
234,908,544,258,993,340,000,000,000,000,000,000,000
[ "CWE-362" ]
CVE-2018-12232
In net/socket.c in the Linux kernel through 4.17.1, there is a race condition between fchownat and close in cases where they target the same socket file descriptor, related to the sock_close and sockfs_setattr functions. fchownat does not increment the file descriptor reference count, which allows close to set the sock...
https://nvd.nist.gov/vuln/detail/CVE-2018-12232
9,570
linux
f7068114d45ec55996b9040e98111afa56e010fe
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/f7068114d45ec55996b9040e98111afa56e010fe
sr: pass down correctly sized SCSI sense buffer We're casting the CDROM layer request_sense to the SCSI sense buffer, but the former is 64 bytes and the latter is 96 bytes. As we generally allocate these on the stack, we end up blowing up the stack. Fix this by wrapping the scsi_execute() call with a properly sized s...
1
int sr_do_ioctl(Scsi_CD *cd, struct packet_command *cgc) { struct scsi_device *SDev; struct scsi_sense_hdr sshdr; int result, err = 0, retries = 0; SDev = cd->device; retry: if (!scsi_block_when_processing_errors(SDev)) { err = -ENODEV; goto out; } result = scsi_execute(SDev, cgc->cmd, ...
19,624,638,673,498,000,000,000,000,000,000,000,000
sr_ioctl.c
119,618,448,393,103,850,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-11506
The sr_do_ioctl function in drivers/scsi/sr_ioctl.c in the Linux kernel through 4.16.12 allows local users to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact because sense buffers have different sizes at the CDROM layer and the SCSI layer, as demonstrated by a CDROMREAD...
https://nvd.nist.gov/vuln/detail/CVE-2018-11506
9,571
linux
dd83c161fbcc5d8be637ab159c0de015cbff5ba4
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/dd83c161fbcc5d8be637ab159c0de015cbff5ba4
kernel/exit.c: avoid undefined behaviour when calling wait4() wait4(-2147483648, 0x20, 0, 0xdd0000) triggers: UBSAN: Undefined behaviour in kernel/exit.c:1651:9 The related calltrace is as follows: negation of -2147483648 cannot be represented in type 'int': CPU: 9 PID: 16482 Comm: zj Tainted: G B --...
1
long kernel_wait4(pid_t upid, int __user *stat_addr, int options, struct rusage *ru) { struct wait_opts wo; struct pid *pid = NULL; enum pid_type type; long ret; if (options & ~(WNOHANG|WUNTRACED|WCONTINUED| __WNOTHREAD|__WCLONE|__WALL)) return -EINVAL; if (upid == -1) type = PIDTYPE_MAX; else...
258,323,460,749,912,650,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2018-10087
The kernel_wait4 function in kernel/exit.c in the Linux kernel before 4.13, when an unspecified architecture and compiler is used, might allow local users to cause a denial of service by triggering an attempted use of the -INT_MIN value.
https://nvd.nist.gov/vuln/detail/CVE-2018-10087
9,577
libgit2
58a6fe94cb851f71214dbefac3f9bffee437d6fe
https://github.com/libgit2/libgit2
https://github.com/libgit2/libgit2/commit/58a6fe94cb851f71214dbefac3f9bffee437d6fe
index: convert `read_entry` to return entry size via an out-param The function `read_entry` does not conform to our usual coding style of returning stuff via the out parameter and to use the return value for reporting errors. Due to most of our code conforming to that pattern, it has become quite natural for us to act...
1
static size_t read_entry( git_index_entry **out, git_index *index, const void *buffer, size_t buffer_size, const char *last) { size_t path_length, entry_size; const char *path_ptr; struct entry_short source; git_index_entry entry = {{0}}; bool compressed = index->version >= INDEX_VERSION_NUMBER_COMP; ch...
109,487,150,090,997,030,000,000,000,000,000,000,000
index.c
162,215,619,332,483,000,000,000,000,000,000,000,000
[ "CWE-415" ]
CVE-2018-8099
Incorrect returning of an error code in the index.c:read_entry() function leads to a double free in libgit2 before v0.26.2, which allows an attacker to cause a denial of service via a crafted repository index file.
https://nvd.nist.gov/vuln/detail/CVE-2018-8099
9,581
linux
250c6c49e3b68756b14983c076183568636e2bde
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/250c6c49e3b68756b14983c076183568636e2bde
fbdev: Fixing arbitrary kernel leak in case FBIOGETCMAP_SPARC in sbusfb_ioctl_helper(). Fixing arbitrary kernel leak in case FBIOGETCMAP_SPARC in sbusfb_ioctl_helper(). 'index' is defined as an int in sbusfb_ioctl_helper(). We retrieve this from the user: if (get_user(index, &c->index) || __get_user(count, &c->co...
1
int sbusfb_ioctl_helper(unsigned long cmd, unsigned long arg, struct fb_info *info, int type, int fb_depth, unsigned long fb_size) { switch(cmd) { case FBIOGTYPE: { struct fbtype __user *f = (struct fbtype __user *) arg; if (put_user(type, &f->fb_type) || __put_user(info->var.yres, &f->fb_height) || ...
140,708,769,976,939,500,000,000,000,000,000,000,000
sbuslib.c
169,305,828,568,889,900,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2018-6412
In the function sbusfb_ioctl_helper() in drivers/video/fbdev/sbuslib.c in the Linux kernel through 4.15, an integer signedness error allows arbitrary information leakage for the FBIOPUTCMAP_SPARC and FBIOGETCMAP_SPARC commands.
https://nvd.nist.gov/vuln/detail/CVE-2018-6412
9,582
linux
7d11f77f84b27cef452cee332f4e469503084737
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/7d11f77f84b27cef452cee332f4e469503084737
RDS: null pointer dereference in rds_atomic_free_op set rm->atomic.op_active to 0 when rds_pin_pages() fails or the user supplied address is invalid, this prevents a NULL pointer usage in rds_atomic_free_op() Signed-off-by: Mohamed Ghannam <simo.ghannam@gmail.com> Acked-by: Santosh Shilimkar <santosh.shilimkar@oracle...
1
int rds_cmsg_atomic(struct rds_sock *rs, struct rds_message *rm, struct cmsghdr *cmsg) { struct page *page = NULL; struct rds_atomic_args *args; int ret = 0; if (cmsg->cmsg_len < CMSG_LEN(sizeof(struct rds_atomic_args)) || rm->atomic.op_active) return -EINVAL; args = CMSG_DATA(cmsg); /* Nonmasked & m...
53,707,930,125,692,390,000,000,000,000,000,000,000
rdma.c
236,152,132,911,027,400,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2018-5333
In the Linux kernel through 4.14.13, the rds_cmsg_atomic function in net/rds/rdma.c mishandles cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference.
https://nvd.nist.gov/vuln/detail/CVE-2018-5333
9,583
linux
c095508770aebf1b9218e77026e48345d719b17c
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c095508770aebf1b9218e77026e48345d719b17c
RDS: Heap OOB write in rds_message_alloc_sgs() When args->nr_local is 0, nr_pages gets also 0 due some size calculation via rds_rm_size(), which is later used to allocate pages for DMA, this bug produces a heap Out-Of-Bound write access to a specific memory region. Signed-off-by: Mohamed Ghannam <simo.ghannam@gmail.c...
1
int rds_rdma_extra_size(struct rds_rdma_args *args) { struct rds_iovec vec; struct rds_iovec __user *local_vec; int tot_pages = 0; unsigned int nr_pages; unsigned int i; local_vec = (struct rds_iovec __user *)(unsigned long) args->local_vec_addr; /* figure out the number of pages in the vector */ for (i ...
8,114,545,912,579,210,000,000,000,000,000,000,000
rdma.c
236,152,132,911,027,400,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2018-5332
In the Linux kernel through 3.2, the rds_message_alloc_sgs() function does not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size function in net/rds/rdma.c).
https://nvd.nist.gov/vuln/detail/CVE-2018-5332
9,584
libjpeg-turbo
43e84cff1bb2bd8293066f6ac4eb0df61ddddbc6
https://github.com/libjpeg-turbo/libjpeg-turbo
https://github.com/libjpeg-turbo/libjpeg-turbo/commit/43e84cff1bb2bd8293066f6ac4eb0df61ddddbc6
tjLoadImage(): Fix FPE triggered by malformed BMP In rdbmp.c, it is necessary to guard against 32-bit overflow/wraparound when allocating the row buffer, because since BMP files have 32-bit width and height fields, the value of biWidth can be up to 4294967295. Specifically, if biWidth is 1073741824 and cinfo->input_co...
1
start_input_bmp(j_compress_ptr cinfo, cjpeg_source_ptr sinfo) { bmp_source_ptr source = (bmp_source_ptr)sinfo; U_CHAR bmpfileheader[14]; U_CHAR bmpinfoheader[64]; #define GET_2B(array, offset) \ ((unsigned short)UCH(array[offset]) + \ (((unsigned short)UCH(array[offset + 1])) << 8)) #define GET_4B(array, of...
167,507,206,180,713,230,000,000,000,000,000,000,000
rdbmp.c
325,802,294,962,207,120,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2018-1152
libjpeg-turbo 1.5.90 is vulnerable to a denial of service vulnerability caused by a divide by zero when processing a crafted BMP image.
https://nvd.nist.gov/vuln/detail/CVE-2018-1152
9,585
linux
57ebd808a97d7c5b1e1afb937c2db22beba3c1f8
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/57ebd808a97d7c5b1e1afb937c2db22beba3c1f8
netfilter: add back stackpointer size checks The rationale for removing the check is only correct for rulesets generated by ip(6)tables. In iptables, a jump can only occur to a user-defined chain, i.e. because we size the stack based on number of user-defined chains we cannot exceed stack size. However, the underlyi...
1
unsigned int arpt_do_table(struct sk_buff *skb, const struct nf_hook_state *state, struct xt_table *table) { unsigned int hook = state->hook; static const char nulldevname[IFNAMSIZ] __attribute__((aligned(sizeof(long)))); unsigned int verdict = NF_DROP; const struct arphdr *arp; struct arpt_entry *e, *...
28,617,907,846,005,074,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2018-1065
The netfilter subsystem in the Linux kernel through 4.15.7 mishandles the case of a rule blob that contains a jump but lacks a user-defined chain, which allows local users to cause a denial of service (NULL pointer dereference) by leveraging the CAP_NET_RAW or CAP_NET_ADMIN capability, related to arpt_do_table in net/i...
https://nvd.nist.gov/vuln/detail/CVE-2018-1065
9,586
linux
57ebd808a97d7c5b1e1afb937c2db22beba3c1f8
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/57ebd808a97d7c5b1e1afb937c2db22beba3c1f8
netfilter: add back stackpointer size checks The rationale for removing the check is only correct for rulesets generated by ip(6)tables. In iptables, a jump can only occur to a user-defined chain, i.e. because we size the stack based on number of user-defined chains we cannot exceed stack size. However, the underlyi...
1
ip6t_do_table(struct sk_buff *skb, const struct nf_hook_state *state, struct xt_table *table) { unsigned int hook = state->hook; static const char nulldevname[IFNAMSIZ] __attribute__((aligned(sizeof(long)))); /* Initializing verdict to NF_DROP keeps gcc happy. */ unsigned int verdict = NF_DROP; const...
143,731,313,107,222,320,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2018-1065
The netfilter subsystem in the Linux kernel through 4.15.7 mishandles the case of a rule blob that contains a jump but lacks a user-defined chain, which allows local users to cause a denial of service (NULL pointer dereference) by leveraging the CAP_NET_RAW or CAP_NET_ADMIN capability, related to arpt_do_table in net/i...
https://nvd.nist.gov/vuln/detail/CVE-2018-1065
9,591
linux
687cb0884a714ff484d038e9190edc874edcf146
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/687cb0884a714ff484d038e9190edc874edcf146
mm, oom_reaper: gather each vma to prevent leaking TLB entry tlb_gather_mmu(&tlb, mm, 0, -1) means gathering the whole virtual memory space. In this case, tlb->fullmm is true. Some archs like arm64 doesn't flush TLB when tlb->fullmm is true: commit 5a7862e83000 ("arm64: tlbflush: avoid flushing when fullmm == 1")...
1
static bool __oom_reap_task_mm(struct task_struct *tsk, struct mm_struct *mm) { struct mmu_gather tlb; struct vm_area_struct *vma; bool ret = true; /* * We have to make sure to not race with the victim exit path * and cause premature new oom victim selection: * __oom_reap_task_mm exit_mm * mmget_not_zer...
210,432,325,877,869,770,000,000,000,000,000,000,000
oom_kill.c
34,517,807,293,828,100,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2017-18202
The __oom_reap_task_mm function in mm/oom_kill.c in the Linux kernel before 4.14.4 mishandles gather operations, which allows attackers to cause a denial of service (TLB entry leak or use-after-free) or possibly have unspecified other impact by triggering a copy_to_user call within a certain time window.
https://nvd.nist.gov/vuln/detail/CVE-2017-18202
9,592
jasper
aa0b0f79ade5eef8b0e7a214c03f5af54b36ba7d
https://github.com/mdadams/jasper
https://github.com/mdadams/jasper/commit/aa0b0f79ade5eef8b0e7a214c03f5af54b36ba7d
Fixed numerous integer overflow problems in the code for packet iterators in the JPC decoder.
1
static int jpc_pi_nextpcrl(register jpc_pi_t *pi) { int rlvlno; jpc_pirlvl_t *pirlvl; jpc_pchg_t *pchg; int prchind; int prcvind; int *prclyrno; int compno; jpc_picomp_t *picomp; int xstep; int ystep; uint_fast32_t trx0; uint_fast32_t try0; uint_fast32_t r; uint_fast32_t rpx; uint_fast32_t rpy; pchg = ...
143,438,351,204,945,960,000,000,000,000,000,000,000
jpc_t2cod.c
159,588,622,480,218,420,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2016-9583
An out-of-bounds heap read vulnerability was found in the jpc_pi_nextpcrl() function of jasper before 2.0.6 when processing crafted input.
https://nvd.nist.gov/vuln/detail/CVE-2016-9583
9,595
suricata
d8634daf74c882356659addb65fb142b738a186b
https://github.com/OISF/suricata
https://github.com/OISF/suricata/commit/d8634daf74c882356659addb65fb142b738a186b
stream: fix false negative on bad RST If a bad RST was received the stream inspection would not happen for that packet, but it would still move the 'raw progress' tracker forward. Following good packets would then fail to detect anything before the 'raw progress' position. Bug #2770 Reported-by: Alexey Vishnyakov
1
static void DetectRunCleanup(DetectEngineThreadCtx *det_ctx, Packet *p, Flow * const pflow) { PACKET_PROFILING_DETECT_START(p, PROF_DETECT_CLEANUP); /* cleanup pkt specific part of the patternmatcher */ PacketPatternCleanup(det_ctx); if (pflow != NULL) { /* update inspected tracker f...
199,138,939,076,611,400,000,000,000,000,000,000,000
detect.c
146,865,518,338,528,100,000,000,000,000,000,000,000
[ "CWE-347" ]
CVE-2019-1010279
Open Information Security Foundation Suricata prior to version 4.1.3 is affected by: Denial of Service - TCP/HTTP detection bypass. The impact is: An attacker can evade a signature detection with a specialy formed sequence of network packets. The component is: detect.c (https://github.com/OISF/suricata/pull/3625/commit...
https://nvd.nist.gov/vuln/detail/CVE-2019-1010279
9,596
libvips
ce684dd008532ea0bf9d4a1d89bacb35f4a83f4d
https://github.com/libvips/libvips
https://github.com/libvips/libvips/commit/ce684dd008532ea0bf9d4a1d89bacb35f4a83f4d
fetch map after DGifGetImageDesc() Earlier refactoring broke GIF map fetch.
1
vips_foreign_load_gif_scan_image( VipsForeignLoadGif *gif ) { VipsObjectClass *class = VIPS_OBJECT_GET_CLASS( gif ); GifFileType *file = gif->file; ColorMapObject *map = file->Image.ColorMap ? file->Image.ColorMap : file->SColorMap; GifByteType *extension; if( DGifGetImageDesc( gif->file ) == GIF_ERROR...
85,832,030,463,082,010,000,000,000,000,000,000,000
gifload.c
169,810,479,207,440,950,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2019-17534
vips_foreign_load_gif_scan_image in foreign/gifload.c in libvips before 8.8.2 tries to access a color map before a DGifGetImageDesc call, leading to a use-after-free.
https://nvd.nist.gov/vuln/detail/CVE-2019-17534
9,597
matio
651a8e28099edb5fbb9e4e1d4d3238848f446c9a
https://github.com/tbeu/matio
https://github.com/tbeu/matio/commit/651a8e28099edb5fbb9e4e1d4d3238848f446c9a
Avoid uninitialized memory As reported by https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16856
1
Mat_VarReadNextInfo4(mat_t *mat) { int M,O,data_type,class_type; mat_int32_t tmp; long nBytes; size_t readresult; matvar_t *matvar = NULL; union { mat_uint32_t u; mat_uint8_t c[4]; } endian; if ( mat == NULL || mat->fp == NULL ) return NULL; el...
283,675,808,883,276,520,000,000,000,000,000,000,000
mat4.c
297,796,931,425,830,640,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2019-17533
Mat_VarReadNextInfo4 in mat4.c in MATIO 1.5.17 omits a certain '\0' character, leading to a heap-based buffer over-read in strdup_vprintf when uninitialized memory is accessed.
https://nvd.nist.gov/vuln/detail/CVE-2019-17533
9,600
OpenSC
a3fc7693f3a035a8a7921cffb98432944bb42740
https://github.com/OpenSC/OpenSC
https://github.com/OpenSC/OpenSC/commit/a3fc7693f3a035a8a7921cffb98432944bb42740
Fixed out of bounds access in ASN.1 Octet string Credit to OSS-Fuzz
1
static int asn1_decode_entry(sc_context_t *ctx,struct sc_asn1_entry *entry, const u8 *obj, size_t objlen, int depth) { void *parm = entry->parm; int (*callback_func)(sc_context_t *nctx, void *arg, const u8 *nobj, size_t nobjlen, int ndepth); size_t *len = (size_t *) entry->arg; int r = 0; callback...
69,488,774,016,521,850,000,000,000,000,000,000,000
asn1.c
327,585,171,356,570,960,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2019-15946
OpenSC before 0.20.0-rc1 has an out-of-bounds access of an ASN.1 Octet string in asn1_decode_entry in libopensc/asn1.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-15946
9,607
linux
f3554aeb991214cbfafd17d55e2bfddb50282e32
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/f3554aeb991214cbfafd17d55e2bfddb50282e32
floppy: fix div-by-zero in setup_format_params This fixes a divide by zero error in the setup_format_params function of the floppy driver. Two consecutive ioctls can trigger the bug: The first one should set the drive geometry with such .sect and .rate values for the F_SECT_PER_TRACK to become zero. Next, the floppy...
1
static void setup_format_params(int track) { int n; int il; int count; int head_shift; int track_shift; struct fparm { unsigned char track, head, sect, size; } *here = (struct fparm *)floppy_track_buffer; raw_cmd = &default_raw_cmd; raw_cmd->track = track; raw_cmd->flags = (FD_RAW_WRITE | FD_RAW_INTR | FD...
340,262,197,679,650,720,000,000,000,000,000,000,000
floppy.c
124,756,562,287,441,240,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2019-14284
In the Linux kernel before 5.2.3, drivers/block/floppy.c allows a denial of service by setup_format_params division-by-zero. Two consecutive ioctls can trigger the bug: the first one should set the drive geometry with .sect and .rate values that make F_SECT_PER_TRACK be zero. Next, the floppy format operation should be...
https://nvd.nist.gov/vuln/detail/CVE-2019-14284
9,609
ImageMagick6
91e58d967a92250439ede038ccfb0913a81e59fe
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/91e58d967a92250439ede038ccfb0913a81e59fe
https://github.com/ImageMagick/ImageMagick/issues/1615
1
static MagickPixelPacket **AcquirePixelThreadSet(const Image *images) { const Image *next; MagickPixelPacket **pixels; register ssize_t i, j; size_t columns, number_threads; number_threads=(size_t) GetMagickResourceLimit(ThreadResource); pixels=(MagickPixelPacket **) AcquireQ...
240,210,483,832,148,400,000,000,000,000,000,000,000
statistic.c
62,577,200,016,171,590,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2019-13307
ImageMagick 7.0.8-50 Q16 has a heap-based buffer overflow at MagickCore/statistic.c in EvaluateImages because of mishandling rows.
https://nvd.nist.gov/vuln/detail/CVE-2019-13307
9,611
ImageMagick
fe5f4b85e6b1b54d3b4588a77133c06ade46d891
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/fe5f4b85e6b1b54d3b4588a77133c06ade46d891
https://github.com/ImageMagick/ImageMagick/issues/1602
1
static MagickOffsetType TIFFSeekCustomStream(const MagickOffsetType offset, const int whence,void *user_data) { PhotoshopProfile *profile; profile=(PhotoshopProfile *) user_data; switch (whence) { case SEEK_SET: default: { if (offset < 0) return(-1); profile->offset=offset...
41,710,944,332,559,617,000,000,000,000,000,000,000
tiff.c
316,057,833,404,137,560,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2019-13136
ImageMagick before 7.0.8-50 has an integer overflow vulnerability in the function TIFFSeekCustomStream in coders/tiff.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-13136
9,613
linux
385097a3675749cbc9e97c085c0e5dfe4269ca51
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/385097a3675749cbc9e97c085c0e5dfe4269ca51
nfc: Ensure presence of required attributes in the deactivate_target handler Check that the NFC_ATTR_TARGET_INDEX attributes (in addition to NFC_ATTR_DEVICE_INDEX) are provided by the netlink client prior to accessing them. This prevents potential unhandled NULL pointer dereference exceptions which can be triggered by...
1
static int nfc_genl_deactivate_target(struct sk_buff *skb, struct genl_info *info) { struct nfc_dev *dev; u32 device_idx, target_idx; int rc; if (!info->attrs[NFC_ATTR_DEVICE_INDEX]) return -EINVAL; device_idx = nla_get_u32(info->attrs[NFC_ATTR_DEVICE_INDEX]); dev = nfc_get_device(device_idx)...
321,500,771,127,873,160,000,000,000,000,000,000,000
netlink.c
108,702,105,730,330,880,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2019-12984
A NULL pointer dereference vulnerability in the function nfc_genl_deactivate_target() in net/nfc/netlink.c in the Linux kernel before 5.1.13 can be triggered by a malicious user-mode program that omits certain NFC attributes, leading to denial of service.
https://nvd.nist.gov/vuln/detail/CVE-2019-12984
9,614
miniupnp
bec6ccec63cadc95655721bc0e1dd49dac759d94
https://github.com/miniupnp/miniupnp
https://github.com/miniupnp/miniupnp/commit/bec6ccec63cadc95655721bc0e1dd49dac759d94
upnp_event_prepare(): check the return value of snprintf()
1
static void upnp_event_prepare(struct upnp_event_notify * obj) { static const char notifymsg[] = "NOTIFY %s HTTP/1.1\r\n" "Host: %s%s\r\n" #if (UPNP_VERSION_MAJOR == 1) && (UPNP_VERSION_MINOR == 0) "Content-Type: text/xml\r\n" /* UDA v1.0 */ #else "Content-Type: text/xml; charset=\"utf-8\"\r\n" /* UDA v1.1 or ...
254,184,219,963,562,300,000,000,000,000,000,000,000
upnpevents.c
22,282,999,164,038,923,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2019-12107
The upnp_event_prepare function in upnpevents.c in MiniUPnP MiniUPnPd through 2.1 allows a remote attacker to leak information from the heap due to improper validation of an snprintf return value.
https://nvd.nist.gov/vuln/detail/CVE-2019-12107
9,619
lighttpd1.4
32120d5b8b3203fc21ccb9eafb0eaf824bb59354
https://github.com/lighttpd/lighttpd1.4
https://github.com/lighttpd/lighttpd1.4/commit/32120d5b8b3203fc21ccb9eafb0eaf824bb59354
[core] fix abort in http-parseopts (fixes #2945) fix abort in server.http-parseopts with url-path-2f-decode enabled (thx stze) x-ref: "Security - SIGABRT during GET request handling with url-path-2f-decode enabled" https://redmine.lighttpd.net/issues/2945
1
static int burl_normalize_2F_to_slash_fix (buffer *b, int qs, int i) { char * const s = b->ptr; const int blen = (int)buffer_string_length(b); const int used = qs < 0 ? blen : qs; int j = i; for (; i < used; ++i, ++j) { s[j] = s[i]; if (s[i] == '%' && s[i+1] == '2' && s[i+2] == 'F') ...
124,662,619,963,424,430,000,000,000,000,000,000,000
burl.c
192,492,788,285,266,940,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2019-11072
lighttpd before 1.4.54 has a signed integer overflow, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a malicious HTTP GET request, as demonstrated by mishandling of /%2F? in burl_normalize_2F_to_slash_fix in burl.c. NOTE: The developer s...
https://nvd.nist.gov/vuln/detail/CVE-2019-11072
9,623
linux
cfa39381173d5f969daf43582c95ad679189cbc9
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/cfa39381173d5f969daf43582c95ad679189cbc9
kvm: fix kvm_ioctl_create_device() reference counting (CVE-2019-6974) kvm_ioctl_create_device() does the following: 1. creates a device that holds a reference to the VM object (with a borrowed reference, the VM's refcount has not been bumped yet) 2. initializes the device 3. transfers the reference to the device t...
1
static int kvm_ioctl_create_device(struct kvm *kvm, struct kvm_create_device *cd) { struct kvm_device_ops *ops = NULL; struct kvm_device *dev; bool test = cd->flags & KVM_CREATE_DEVICE_TEST; int ret; if (cd->type >= ARRAY_SIZE(kvm_device_ops_table)) return -ENODEV; ops = kvm_device_ops_table[cd->type];...
176,950,247,388,431,500,000,000,000,000,000,000,000
kvm_main.c
148,296,589,878,720,510,000,000,000,000,000,000,000
[ "CWE-362" ]
CVE-2019-6974
In the Linux kernel before 4.20.8, kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandles reference counting because of a race condition, leading to a use-after-free.
https://nvd.nist.gov/vuln/detail/CVE-2019-6974
9,627
openjpeg
c5bd64ea146162967c29bd2af0cbb845ba3eaaaf
https://github.com/uclouvain/openjpeg
https://github.com/uclouvain/openjpeg/commit/c5bd64ea146162967c29bd2af0cbb845ba3eaaaf
[MJ2] To avoid divisions by zero / undefined behaviour on shift Signed-off-by: Young_X <YangX92@hotmail.com>
1
static opj_bool pi_next_cprl(opj_pi_iterator_t * pi) { opj_pi_comp_t *comp = NULL; opj_pi_resolution_t *res = NULL; long index = 0; if (!pi->first) { comp = &pi->comps[pi->compno]; goto LABEL_SKIP; } else { pi->first = 0; } for (pi->compno = pi->poc.compno0; pi->com...
198,208,281,540,271,430,000,000,000,000,000,000,000
None
null
[ "CWE-369" ]
CVE-2018-20845
Division-by-zero vulnerabilities in the functions pi_next_pcrl, pi_next_cprl, and pi_next_rpcl in openmj2/pi.c in OpenJPEG through 2.3.0 allow remote attackers to cause a denial of service (application crash).
https://nvd.nist.gov/vuln/detail/CVE-2018-20845
9,631
rdesktop
4dca546d04321a610c1835010b5dad85163b65e1
https://github.com/rdesktop/rdesktop
https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
Malicious RDP server security fixes This commit includes fixes for a set of 21 vulnerabilities in rdesktop when a malicious RDP server is used. All vulnerabilities was identified and reported by Eyal Itkin. * Add rdp_protocol_error function that is used in several fixes * Refactor of process_bitmap_updates * Fix ...
1
lspci_process(STREAM s) { unsigned int pkglen; static char *rest = NULL; char *buf; pkglen = s->end - s->p; /* str_handle_lines requires null terminated strings */ buf = xmalloc(pkglen + 1); STRNCPY(buf, (char *) s->p, pkglen + 1); str_handle_lines(buf, &rest, lspci_process_line, NULL); xfree(buf); }
209,920,996,478,819,600,000,000,000,000,000,000,000
lspci.c
74,336,506,313,865,020,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-8799
rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function process_secondary_order() that results in a Denial of Service (segfault).
https://nvd.nist.gov/vuln/detail/CVE-2018-8799
9,632
rdesktop
4dca546d04321a610c1835010b5dad85163b65e1
https://github.com/rdesktop/rdesktop
https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
Malicious RDP server security fixes This commit includes fixes for a set of 21 vulnerabilities in rdesktop when a malicious RDP server is used. All vulnerabilities was identified and reported by Eyal Itkin. * Add rdp_protocol_error function that is used in several fixes * Refactor of process_bitmap_updates * Fix ...
1
process_secondary_order(STREAM s) { /* The length isn't calculated correctly by the server. * For very compact orders the length becomes negative * so a signed integer must be used. */ uint16 length; uint16 flags; uint8 type; uint8 *next_order; in_uint16_le(s, length); in_uint16_le(s, flags); /* used ...
155,193,719,227,379,600,000,000,000,000,000,000,000
orders.c
24,108,224,018,686,034,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-8799
rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function process_secondary_order() that results in a Denial of Service (segfault).
https://nvd.nist.gov/vuln/detail/CVE-2018-8799
9,633
rdesktop
4dca546d04321a610c1835010b5dad85163b65e1
https://github.com/rdesktop/rdesktop
https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
Malicious RDP server security fixes This commit includes fixes for a set of 21 vulnerabilities in rdesktop when a malicious RDP server is used. All vulnerabilities was identified and reported by Eyal Itkin. * Add rdp_protocol_error function that is used in several fixes * Refactor of process_bitmap_updates * Fix ...
1
rdpsnddbg_process(STREAM s) { unsigned int pkglen; static char *rest = NULL; char *buf; pkglen = s->end - s->p; /* str_handle_lines requires null terminated strings */ buf = (char *) xmalloc(pkglen + 1); STRNCPY(buf, (char *) s->p, pkglen + 1); str_handle_lines(buf, &rest, rdpsnddbg_line_handler, NULL);...
88,148,949,623,728,080,000,000,000,000,000,000,000
rdpsnd.c
318,702,186,162,208,240,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-8799
rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function process_secondary_order() that results in a Denial of Service (segfault).
https://nvd.nist.gov/vuln/detail/CVE-2018-8799
9,634
tcpdump
83a412a5275cac973c5841eca3511c766bed778d
https://github.com/the-tcpdump-group/tcpdump
https://github.com/the-tcpdump-group/tcpdump/commit/83a412a5275cac973c5841eca3511c766bed778d
(for 4.9.3) CVE-2018-16228/HNCP: make buffer access safer print_prefix() has a buffer and does not initialize it. It may call decode_prefix6(), which also does not initialize the buffer on invalid input. When that happens, make sure to return from print_prefix() before trying to print the [still uninitialized] buffer....
1
print_prefix(netdissect_options *ndo, const u_char *prefix, u_int max_length) { int plenbytes; char buf[sizeof("xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx::/128")]; if (prefix[0] >= 96 && max_length >= IPV4_MAPPED_HEADING_LEN + 1 && is_ipv4_mapped_address(&prefix[1])) { struct in_addr addr; ...
296,958,635,835,410,900,000,000,000,000,000,000,000
print-hncp.c
71,707,496,757,408,950,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-16228
The HNCP parser in tcpdump before 4.9.3 has a buffer over-read in print-hncp.c:print_prefix().
https://nvd.nist.gov/vuln/detail/CVE-2018-16228
9,635
tcpdump
86326e880d31b328a151d45348c35220baa9a1ff
https://github.com/the-tcpdump-group/tcpdump
https://github.com/the-tcpdump-group/tcpdump/commit/86326e880d31b328a151d45348c35220baa9a1ff
(for 4.9.3) CVE-2018-14881/BGP: Fix BGP_CAPCODE_RESTART. Add a bounds check and a comment to bgp_capabilities_print(). This fixes a buffer over-read discovered by Bhargava Shastry, SecT/TU Berlin. Add a test using the capture file supplied by the reporter(s).
1
bgp_capabilities_print(netdissect_options *ndo, const u_char *opt, int caps_len) { int cap_type, cap_len, tcap_len, cap_offset; int i = 0; while (i < caps_len) { ND_TCHECK2(opt[i], BGP_CAP_HEADER_SIZE); cap_type=opt[i]; cap_len=opt...
29,552,793,108,757,430,000,000,000,000,000,000,000
print-bgp.c
81,233,617,923,263,840,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-14881
The BGP parser in tcpdump before 4.9.3 has a buffer over-read in print-bgp.c:bgp_capabilities_print() (BGP_CAPCODE_RESTART).
https://nvd.nist.gov/vuln/detail/CVE-2018-14881
9,637
tcpdump
c24922e692a52121e853a84ead6b9337f4c08a94
https://github.com/the-tcpdump-group/tcpdump
https://github.com/the-tcpdump-group/tcpdump/commit/c24922e692a52121e853a84ead6b9337f4c08a94
(for 4.9.3) CVE-2018-14466/Rx: fix an over-read bug In rx_cache_insert() and rx_cache_find() properly read the serviceId field of the rx_header structure as a 16-bit integer. When those functions tried to read 32 bits the extra 16 bits could be outside of the bounds checked in rx_print() for the rx_header structure, a...
1
rx_cache_insert(netdissect_options *ndo, const u_char *bp, const struct ip *ip, int dport) { struct rx_cache_entry *rxent; const struct rx_header *rxh = (const struct rx_header *) bp; if (ndo->ndo_snapend - bp + 1 <= (int)(sizeof(struct rx_header) + sizeof(int32_t))) return; rxent = &rx_cache[rx...
15,665,195,569,772,354,000,000,000,000,000,000,000
print-rx.c
87,888,529,561,150,320,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-14466
The Rx parser in tcpdump before 4.9.3 has a buffer over-read in print-rx.c:rx_cache_find() and rx_cache_insert().
https://nvd.nist.gov/vuln/detail/CVE-2018-14466
9,638
linux
04197b341f23b908193308b8d63d17ff23232598
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/04197b341f23b908193308b8d63d17ff23232598
xfs: don't BUG() on mixed direct and mapped I/O We've had reports of generic/095 causing XFS to BUG() in __xfs_get_blocks() due to the existence of delalloc blocks on a direct I/O read. generic/095 issues a mix of various types of I/O, including direct and memory mapped I/O to a single file. This is clearly not suppor...
1
__xfs_get_blocks( struct inode *inode, sector_t iblock, struct buffer_head *bh_result, int create, bool direct, bool dax_fault) { struct xfs_inode *ip = XFS_I(inode); struct xfs_mount *mp = ip->i_mount; xfs_fileoff_t offset_fsb, end_fsb; int error = 0; int lockmode = 0; struct xfs_bmbt_irec ima...
195,875,716,643,763,600,000,000,000,000,000,000,000
xfs_aops.c
300,830,705,963,493,000,000,000,000,000,000,000,000
[ "CWE-362" ]
CVE-2016-10741
In the Linux kernel before 4.9.3, fs/xfs/xfs_aops.c allows local users to cause a denial of service (system crash) because there is a race condition between direct and memory-mapped I/O (associated with a hole) that is handled with BUG_ON instead of an I/O failure.
https://nvd.nist.gov/vuln/detail/CVE-2016-10741
9,641
linux
f9432c5ec8b1e9a09b9b0e5569e3c73db8de432a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/f9432c5ec8b1e9a09b9b0e5569e3c73db8de432a
Bluetooth: RFCOMM - Fix info leak in ioctl(RFCOMMGETDEVLIST) The RFCOMM code fails to initialize the two padding bytes of struct rfcomm_dev_list_req inserted for alignment before copying it to userland. Additionally there are two padding bytes in each instance of struct rfcomm_dev_info. The ioctl() that for disclosure...
1
static int rfcomm_get_dev_list(void __user *arg) { struct rfcomm_dev *dev; struct rfcomm_dev_list_req *dl; struct rfcomm_dev_info *di; int n = 0, size, err; u16 dev_num; BT_DBG(""); if (get_user(dev_num, (u16 __user *) arg)) return -EFAULT; if (!dev_num || dev_num > (PAGE_SIZE * 4) / sizeof(*di)) return ...
139,069,687,710,975,940,000,000,000,000,000,000,000
tty.c
176,026,457,291,408,430,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2012-6545
The Bluetooth RFCOMM implementation in the Linux kernel before 3.6 does not properly initialize certain structures, which allows local users to obtain sensitive information from kernel memory via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2012-6545
9,642
linux
7b789836f434c87168eab067cfbed1ec4783dffd
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/7b789836f434c87168eab067cfbed1ec4783dffd
xfrm_user: fix info leak in copy_to_user_policy() The memory reserved to dump the xfrm policy includes multiple padding bytes added by the compiler for alignment (padding bytes in struct xfrm_selector and struct xfrm_userpolicy_info). Add an explicit memset(0) before filling the buffer to avoid the heap info leak. Si...
1
static void copy_to_user_policy(struct xfrm_policy *xp, struct xfrm_userpolicy_info *p, int dir) { memcpy(&p->sel, &xp->selector, sizeof(p->sel)); memcpy(&p->lft, &xp->lft, sizeof(p->lft)); memcpy(&p->curlft, &xp->curlft, sizeof(p->curlft)); p->priority = xp->priority; p->index = xp->index; p->sel.family = x...
24,315,986,261,003,055,000,000,000,000,000,000,000
xfrm_user.c
300,447,579,570,024,820,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2012-6537
net/xfrm/xfrm_user.c in the Linux kernel before 3.6 does not initialize certain structures, which allows local users to obtain sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability.
https://nvd.nist.gov/vuln/detail/CVE-2012-6537
9,643
sgminer
78cc408369bdbbd440196c93574098d1482efbce
https://github.com/sgminer-dev/sgminer
https://github.com/sgminer-dev/sgminer/commit/78cc408369bdbbd440196c93574098d1482efbce
stratum: parse_reconnect(): treat pool-sent URL as untrusted. Thanks to Mick Ayzenberg <mick@dejavusecurity.com> for reminding that this existed and highlighting the offender. Also to Luke-jr for actually fixing this in bfgminer. :D
1
static bool parse_reconnect(struct pool *pool, json_t *val) { char *sockaddr_url, *stratum_port, *tmp; char *url, *port, address[256]; if (opt_disable_client_reconnect) { applog(LOG_WARNING, "Stratum client.reconnect forbidden, aborting."); return false; } memset(address, 0, 255); url = (char *)json_s...
122,543,891,288,543,540,000,000,000,000,000,000,000
util.c
336,394,571,693,941,070,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2014-4501
Multiple stack-based buffer overflows in sgminer before 4.2.2, cgminer before 4.3.5, and BFGMiner before 3.3.0 allow remote pool servers to have unspecified impact via a long URL in a client.reconnect stratum message to the (1) extract_sockaddr or (2) parse_reconnect functions in util.c.
https://nvd.nist.gov/vuln/detail/CVE-2014-4501
9,646
libgd
1ccfe21e14c4d18336f9da8515cd17db88c3de61
https://github.com/libgd/libgd
https://github.com/libgd/libgd/commit/1ccfe21e14c4d18336f9da8515cd17db88c3de61
fix php 72494, invalid color index not handled, can lead to crash
1
BGD_DECLARE(gdImagePtr) gdImageCropThreshold(gdImagePtr im, const unsigned int color, const float threshold) { const int width = gdImageSX(im); const int height = gdImageSY(im); int x,y; int match; gdRect crop; crop.x = 0; crop.y = 0; crop.width = 0; crop.height = 0; /* Pierre: crop everything sounds bad *...
58,602,749,696,991,850,000,000,000,000,000,000,000
gd_crop.c
283,844,472,613,649,240,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2016-6128
The gdImageCropThreshold function in gd_crop.c in the GD Graphics Library (aka libgd) before 2.2.3, as used in PHP before 7.0.9, allows remote attackers to cause a denial of service (application crash) via an invalid color index.
https://nvd.nist.gov/vuln/detail/CVE-2016-6128
9,649
wireshark
11edc83b98a61e890d7bb01855389d40e984ea82
https://github.com/wireshark/wireshark
https://github.com/wireshark/wireshark/commit/11edc83b98a61e890d7bb01855389d40e984ea82
Don't treat the packet length as unsigned. The scanf family of functions are as annoyingly bad at handling unsigned numbers as strtoul() is - both of them are perfectly willing to accept a value beginning with a negative sign as an unsigned value. When using strtoul(), you can compensate for this by explicitly checki...
1
parse_netscreen_packet(FILE_T fh, struct wtap_pkthdr *phdr, Buffer* buf, char *line, int *err, gchar **err_info) { int sec; int dsec; char cap_int[NETSCREEN_MAX_INT_NAME_LENGTH]; char direction[2]; guint pkt_len; char cap_src[13]; char cap_dst[13]; guint8 *pd; gchar *p; int n, i = 0;...
147,371,450,414,689,870,000,000,000,000,000,000,000
netscreen.c
286,276,784,978,868,850,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2016-5357
wiretap/netscreen.c in the NetScreen file parser in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles sscanf unsigned-integer processing, which allows remote attackers to cause a denial of service (application crash) via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2016-5357
9,655
linux
4c185ce06dca14f5cea192f5a2c981ef50663f2b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/4c185ce06dca14f5cea192f5a2c981ef50663f2b
aio: lift iov_iter_init() into aio_setup_..._rw() the only non-trivial detail is that we do it before rw_verify_area(), so we'd better cap the length ourselves in aio_setup_single_rw() case (for vectored case rw_copy_check_uvector() will do that for us). Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
1
static ssize_t aio_setup_single_vector(struct kiocb *kiocb, int rw, char __user *buf, unsigned long *nr_segs, size_t len, struct iovec *iovec) { if (unlikely(!access_ok(!rw, buf, len))) return -EFAULT; iovec->iov_base = buf; iovec->iov_len = len; *nr_segs = ...
1,764,598,624,184,633,000,000,000,000,000,000,000
aio.c
10,187,739,604,289,771,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2015-8830
Integer overflow in the aio_setup_single_vector function in fs/aio.c in the Linux kernel 4.0 allows local users to cause a denial of service or possibly have unspecified other impact via a large AIO iovec. NOTE: this vulnerability exists because of a CVE-2012-6701 regression.
https://nvd.nist.gov/vuln/detail/CVE-2015-8830
9,656
linux
d11662f4f798b50d8c8743f433842c3e40fe3378
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d11662f4f798b50d8c8743f433842c3e40fe3378
ALSA: timer: Fix race between read and ioctl The read from ALSA timer device, the function snd_timer_user_tread(), may access to an uninitialized struct snd_timer_user fields when the read is concurrently performed while the ioctl like snd_timer_user_tselect() is invoked. We have already fixed the races among ioctls ...
1
static ssize_t snd_timer_user_read(struct file *file, char __user *buffer, size_t count, loff_t *offset) { struct snd_timer_user *tu; long result = 0, unit; int qhead; int err = 0; tu = file->private_data; unit = tu->tread ? sizeof(struct snd_timer_tread) : sizeof(struct snd_timer_read); spin_lock_ir...
56,027,744,184,134,710,000,000,000,000,000,000,000
timer.c
26,953,491,466,752,155,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2017-1000380
sound/core/timer.c in the Linux kernel before 4.11.5 is vulnerable to a data race in the ALSA /dev/snd/timer driver resulting in local users being able to read information belonging to other users, i.e., uninitialized memory contents may be disclosed when a read and an ioctl happen at the same time.
https://nvd.nist.gov/vuln/detail/CVE-2017-1000380
9,659
ImageMagick
acee073df34aa4d491bf5cb74d3a15fc80f0a3aa
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/acee073df34aa4d491bf5cb74d3a15fc80f0a3aa
None
1
static Image *ReadJP2Image(const ImageInfo *image_info,ExceptionInfo *exception) { const char *option; Image *image; int jp2_status; MagickBooleanType status; opj_codec_t *jp2_codec; opj_codestream_index_t *codestream_index = (opj_codestream_index_t *) NULL; opj_dparameters_t...
145,640,868,358,261,100,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2017-13145
In ImageMagick before 6.9.8-8 and 7.x before 7.0.5-9, the ReadJP2Image function in coders/jp2.c does not properly validate the channel geometry, leading to a crash.
https://nvd.nist.gov/vuln/detail/CVE-2017-13145
9,660
FFmpeg
611b35627488a8d0763e75c25ee0875c5b7987dd
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/611b35627488a8d0763e75c25ee0875c5b7987dd
avcodec/dnxhd_parser: Do not return invalid value from dnxhd_find_frame_end() on error Fixes: Null pointer dereference Fixes: CVE-2017-9608 Found-by: Yihan Lian Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
1
static int dnxhd_find_frame_end(DNXHDParserContext *dctx, const uint8_t *buf, int buf_size) { ParseContext *pc = &dctx->pc; uint64_t state = pc->state64; int pic_found = pc->frame_start_found; int i = 0; if (!pic_found) { for (i = 0; i < buf_size; i++) { ...
86,046,191,373,808,070,000,000,000,000,000,000,000
dnxhd_parser.c
54,129,044,710,275,890,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2017-9608
The dnxhd decoder in FFmpeg before 3.2.6, and 3.3.x before 3.3.3 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted mov file.
https://nvd.nist.gov/vuln/detail/CVE-2017-9608
9,667
ImageMagick
e87af64b1ff1635a32d9b6162f1b0e260fb54ed9
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/e87af64b1ff1635a32d9b6162f1b0e260fb54ed9
None
1
static size_t WritePSDChannel(const PSDInfo *psd_info, const ImageInfo *image_info,Image *image,Image *next_image, const QuantumType quantum_type, unsigned char *compact_pixels, MagickOffsetType size_offset,const MagickBooleanType separate) { int y; MagickBooleanType monochrome; QuantumInfo *q...
273,458,965,762,153,770,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2017-5510
coders/psd.c in ImageMagick allows remote attackers to have unspecified impact via a crafted PSD file, which triggers an out-of-bounds write.
https://nvd.nist.gov/vuln/detail/CVE-2017-5510
9,669
ImageMagick
280215b9936d145dd5ee91403738ccce1333cab1
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/280215b9936d145dd5ee91403738ccce1333cab1
Rewrite reading pixel values.
1
static MagickBooleanType ReadPSDChannelPixels(Image *image, const size_t channels,const size_t row,const ssize_t type, const unsigned char *pixels,ExceptionInfo *exception) { Quantum pixel; register const unsigned char *p; register Quantum *q; register ssize_t x; size_t packet_s...
42,358,738,219,081,613,000,000,000,000,000,000,000
psd.c
332,626,216,864,854,940,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2016-7514
The ReadPSDChannelPixels function in coders/psd.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PSD file.
https://nvd.nist.gov/vuln/detail/CVE-2016-7514
9,672
ImageMagick
504ada82b6fa38a30c846c1c29116af7290decb2
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/504ada82b6fa38a30c846c1c29116af7290decb2
None
1
static Image *ReadDDSImage(const ImageInfo *image_info,ExceptionInfo *exception) { Image *image; MagickBooleanType status, cubemap = MagickFalse, volume = MagickFalse, matte; CompressionType compression; DDSInfo dds_info; DDSDecoder *decoder; size_t n, num_images...
213,987,347,007,398,430,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2014-9907
coders/dds.c in ImageMagick allows remote attackers to cause a denial of service via a crafted DDS file.
https://nvd.nist.gov/vuln/detail/CVE-2014-9907
9,673
linux
251e22abde21833b3d29577e4d8c7aaccd650eee
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/251e22abde21833b3d29577e4d8c7aaccd650eee
pinctrl: amd: Use devm_pinctrl_register() for pinctrl registration Use devm_pinctrl_register() for pin control registration and clean error path. Signed-off-by: Laxman Dewangan <ldewangan@nvidia.com> Signed-off-by: Linus Walleij <linus.walleij@linaro.org>
1
static int amd_gpio_probe(struct platform_device *pdev) { int ret = 0; int irq_base; struct resource *res; struct amd_gpio *gpio_dev; gpio_dev = devm_kzalloc(&pdev->dev, sizeof(struct amd_gpio), GFP_KERNEL); if (!gpio_dev) return -ENOMEM; spin_lock_init(&gpio_dev->lock); res = platform_get_resource(pde...
152,429,198,517,298,730,000,000,000,000,000,000,000
pinctrl-amd.c
15,215,002,648,681,079,000,000,000,000,000,000,000
[ "CWE-415" ]
CVE-2017-18174
In the Linux kernel before 4.7, the amd_gpio_remove function in drivers/pinctrl/pinctrl-amd.c calls the pinctrl_unregister function, leading to a double free.
https://nvd.nist.gov/vuln/detail/CVE-2017-18174
9,674
jasper
f25486c3d4aa472fec79150f2c41ed4333395d3d
https://github.com/mdadams/jasper
https://github.com/mdadams/jasper/commit/f25486c3d4aa472fec79150f2c41ed4333395d3d
Fixed a bug in the packet iterator code. Added a new regression test case.
1
static int jpc_pi_nextrpcl(register jpc_pi_t *pi) { int rlvlno; jpc_pirlvl_t *pirlvl; jpc_pchg_t *pchg; int prchind; int prcvind; int *prclyrno; int compno; jpc_picomp_t *picomp; int xstep; int ystep; uint_fast32_t r; uint_fast32_t rpx; uint_fast32_t rpy; uint_fast32_t trx0; uint_fast32_t try0; pchg = ...
71,544,139,196,461,260,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2016-9583
An out-of-bounds heap read vulnerability was found in the jpc_pi_nextpcrl() function of jasper before 2.0.6 when processing crafted input.
https://nvd.nist.gov/vuln/detail/CVE-2016-9583
9,676
ImageMagick6
a77d8d97f5a7bced0468f0b08798c83fb67427bc
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick/commit/a77d8d97f5a7bced0468f0b08798c83fb67427bc
None
1
MagickExport Image *MeanShiftImage(const Image *image,const size_t width, const size_t height,const double color_distance,ExceptionInfo *exception) { #define MaxMeanShiftIterations 100 #define MeanShiftImageTag "MeanShift/Image" CacheView *image_view, *mean_view, *pixel_view; Image *mean_image...
143,092,893,080,934,220,000,000,000,000,000,000,000
feature.c
270,023,721,232,859,400,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2019-14981
In ImageMagick 7.x before 7.0.8-41 and 6.x before 6.9.10-41, there is a divide-by-zero vulnerability in the MeanShiftImage function. It allows an attacker to cause a denial of service by sending a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2019-14981
9,677
ImageMagick6
e92040ea6ee2a844ebfd2344174076795a4787bd
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick/commit/e92040ea6ee2a844ebfd2344174076795a4787bd
None
1
static MagickBooleanType WritePNMImage(const ImageInfo *image_info,Image *image, ExceptionInfo *exception) { char buffer[MagickPathExtent], format, magick[MagickPathExtent]; const char *value; MagickBooleanType status; MagickOffsetType scene; Quantum index; QuantumAny ...
296,982,318,816,803,260,000,000,000,000,000,000,000
pnm.c
275,734,749,286,090,340,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2019-13306
ImageMagick 7.0.8-50 Q16 has a stack-based buffer overflow at coders/pnm.c in WritePNMImage because of off-by-one errors.
https://nvd.nist.gov/vuln/detail/CVE-2019-13306
9,678
ImageMagick6
29efd648f38b73a64d73f14cd2019d869a585888
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick/commit/29efd648f38b73a64d73f14cd2019d869a585888
None
1
static MagickBooleanType WritePNMImage(const ImageInfo *image_info,Image *image, ExceptionInfo *exception) { char buffer[MagickPathExtent], format, magick[MagickPathExtent]; const char *value; MagickBooleanType status; MagickOffsetType scene; Quantum index; QuantumAny ...
29,796,776,391,938,395,000,000,000,000,000,000,000
pnm.c
180,653,638,133,340,120,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2019-13305
ImageMagick 7.0.8-50 Q16 has a stack-based buffer overflow at coders/pnm.c in WritePNMImage because of a misplaced strncpy and an off-by-one error.
https://nvd.nist.gov/vuln/detail/CVE-2019-13305
9,679
ImageMagick
bfa3b9610c83227894c92b0d312ad327fceb6241
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick6/commit/bfa3b9610c83227894c92b0d312ad327fceb6241
None
1
static MagickBooleanType WritePNMImage(const ImageInfo *image_info,Image *image) { char buffer[MaxTextExtent], format, magick[MaxTextExtent]; const char *value; IndexPacket index; MagickBooleanType status; MagickOffsetType scene; QuantumAny pixel; QuantumInfo *qua...
135,724,383,670,322,900,000,000,000,000,000,000,000
pnm.c
158,507,840,479,517,230,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2019-13304
ImageMagick 7.0.8-50 Q16 has a stack-based buffer overflow at coders/pnm.c in WritePNMImage because of a misplaced assignment.
https://nvd.nist.gov/vuln/detail/CVE-2019-13304
9,680
ImageMagick6
35ccb468ee2dcbe8ce9cf1e2f1957acc27f54c34
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick/commit/35ccb468ee2dcbe8ce9cf1e2f1957acc27f54c34
None
1
static Image *ReadPSImage(const ImageInfo *image_info,ExceptionInfo *exception) { #define BoundingBox "BoundingBox:" #define BeginDocument "BeginDocument:" #define BeginXMPPacket "<?xpacket begin=" #define EndXMPPacket "<?xpacket end=" #define ICCProfile "BeginICCProfile:" #define CMYKCustomColor "CMYKCustomColor:...
175,368,670,304,185,900,000,000,000,000,000,000,000
ps.c
319,201,275,157,302,900,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2019-13137
ImageMagick before 7.0.8-50 has a memory leak vulnerability in the function ReadPSImage in coders/ps.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-13137
9,681
openjpeg
cbe7384016083eac16078b359acd7a842253d503
https://github.com/uclouvain/openjpeg
https://github.com/uclouvain/openjpeg/commit/cbe7384016083eac16078b359acd7a842253d503
None
1
static OPJ_BOOL bmp_read_rle4_data(FILE* IN, OPJ_UINT8* pData, OPJ_UINT32 stride, OPJ_UINT32 width, OPJ_UINT32 height) { OPJ_UINT32 x, y; OPJ_UINT8 *pix; const OPJ_UINT8 *beyond; beyond = pData + stride * height; pix = pData; x = y = 0U; while (y ...
107,959,287,325,417,320,000,000,000,000,000,000,000
convertbmp.c
204,530,473,747,156,800,000,000,000,000,000,000,000
[ "CWE-400" ]
CVE-2019-12973
In OpenJPEG 2.3.1, there is excessive iteration in the opj_t1_encode_cblks function of openjp2/t1.c. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted bmp file. This issue is similar to CVE-2018-6616.
https://nvd.nist.gov/vuln/detail/CVE-2019-12973
9,710
Chrome
60c9d8a39e4aa78dd51c236bd1b2c4f17c9d27fe
https://github.com/chromium/chromium
https://github.com/chromium/chromium/commit/60c9d8a39e4aa78dd51c236bd1b2c4f17c9d27fe
None
1
bool TextAutosizer::processSubtree(RenderObject* layoutRoot) { if (!m_document->settings() || !m_document->settings()->textAutosizingEnabled() || layoutRoot->view()->printing() || !m_document->page()) return false; Frame* mainFrame = m_document->page()->mainFrame(); TextAutosizingWindowInfo window...
58,579,830,367,491,530,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-3906
The PDF parser in Google Chrome before 16.0.912.63 allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.
https://nvd.nist.gov/vuln/detail/CVE-2011-3906
9,726
Chrome
08b630e66e042af3fe80015509b3238c2679ea40
https://github.com/chromium/chromium
https://github.com/chromium/chromium/commit/08b630e66e042af3fe80015509b3238c2679ea40
None
1
bool RenderMenuList::multiple() { return toHTMLSelectElement(node())->multiple(); }
153,962,476,287,418,380,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2011-2830
Google V8, as used in Google Chrome before 14.0.835.163, does not properly implement script object wrappers, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via unknown vectors.
https://nvd.nist.gov/vuln/detail/CVE-2011-2830
9,737
Chrome
9eb1fd426a04adac0906c81ed88f1089969702ba
https://github.com/chromium/chromium
https://github.com/chromium/chromium/commit/9eb1fd426a04adac0906c81ed88f1089969702ba
None
1
void BeginInstallWithManifestFunction::OnParseSuccess( const SkBitmap& icon, DictionaryValue* parsed_manifest) { CHECK(parsed_manifest); icon_ = icon; parsed_manifest_.reset(parsed_manifest); std::string init_errors; dummy_extension_ = Extension::Create( FilePath(), Extension::INTERNAL, ...
31,286,386,419,319,730,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2011-2358
Google Chrome before 13.0.782.107 does not ensure that extension installations are confirmed by a browser dialog, which makes it easier for remote attackers to modify the product's functionality via a Trojan horse extension.
https://nvd.nist.gov/vuln/detail/CVE-2011-2358
9,744
Chrome
ce891a86763d3540e2612be26938a6163310efe0
https://github.com/chromium/chromium
https://github.com/chromium/chromium/commit/ce891a86763d3540e2612be26938a6163310efe0
None
1
void ChromeContentRendererClient::RenderThreadStarted() { chrome_observer_.reset(new ChromeRenderProcessObserver()); extension_dispatcher_.reset(new ExtensionDispatcher()); histogram_snapshots_.reset(new RendererHistogramSnapshots()); net_predictor_.reset(new RendererNetPredictor()); spellcheck_.reset(new Spe...
161,105,270,804,386,400,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2011-2798
Google Chrome before 13.0.782.107 does not properly restrict access to internal schemes, which allows remote attackers to have an unspecified impact via a crafted web site.
https://nvd.nist.gov/vuln/detail/CVE-2011-2798
9,757
Chrome
bf04ad0dae9f4f479f90fd2b38f634ffbaf434b4
https://github.com/chromium/chromium
https://github.com/chromium/chromium/commit/bf04ad0dae9f4f479f90fd2b38f634ffbaf434b4
None
1
bool PPVarToNPVariant(PP_Var var, NPVariant* result) { switch (var.type) { case PP_VARTYPE_UNDEFINED: VOID_TO_NPVARIANT(*result); break; case PP_VARTYPE_NULL: NULL_TO_NPVARIANT(*result); break; case PP_VARTYPE_BOOL: BOOLEAN_TO_NPVARIANT(var.value.as_bool, *result); brea...
114,945,807,708,477,050,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-2345
The NPAPI implementation in Google Chrome before 12.0.742.112 does not properly handle strings, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.
https://nvd.nist.gov/vuln/detail/CVE-2011-2345
9,764
Chrome
514f93279494ec4448b34a7aeeff27eccaae983f
https://github.com/chromium/chromium
https://github.com/chromium/chromium/commit/514f93279494ec4448b34a7aeeff27eccaae983f
None
1
bool DebugOnStart::FindArgument(wchar_t* command_line, const char* argument_c) { wchar_t argument[50]; for (int i = 0; argument_c[i]; ++i) argument[i] = argument_c[i]; int argument_len = lstrlen(argument); int command_line_len = lstrlen(command_line); while (command_line_len > argument_len) { wch...
26,055,336,896,940,780,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2011-1301
Use-after-free vulnerability in the GPU process in Google Chrome before 10.0.648.205 allows remote attackers to execute arbitrary code via unknown vectors.
https://nvd.nist.gov/vuln/detail/CVE-2011-1301
9,784
Chrome
ad103a1564365c95f4ee4f10261f9604f91f686a
https://github.com/chromium/chromium
https://github.com/chromium/chromium/commit/ad103a1564365c95f4ee4f10261f9604f91f686a
None
1
bool PPB_ImageData_Impl::Init(PP_ImageDataFormat format, int width, int height, bool init_to_zero) { if (!IsImageDataFormatSupported(format)) return false; // Only support this one format for now. if (width <= 0 || height <= 0) return false; ...
310,179,316,202,690,940,000,000,000,000,000,000,000
None
null
[ "CWE-190" ]
CVE-2012-5143
Integer overflow in Google Chrome before 23.0.1271.97 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to PPAPI image buffers.
https://nvd.nist.gov/vuln/detail/CVE-2012-5143
9,815
Chrome
9939d35f9827ed0929646607cbdb071af627ac38
https://github.com/chromium/chromium
https://github.com/chromium/chromium/commit/9939d35f9827ed0929646607cbdb071af627ac38
None
1
xsltCompileLocationPathPattern(xsltParserContextPtr ctxt, int novar) { SKIP_BLANKS; if ((CUR == '/') && (NXT(1) == '/')) { /* * since we reverse the query * a leading // can be safely ignored */ NEXT; NEXT; ctxt->comp->priority = 0.5; /* '//' means not 0 priority */ xsltCompileRelativePathPattern(ctx...
156,995,017,980,789,130,000,000,000,000,000,000,000
pattern.c
30,154,932,143,922,863,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2012-2870
libxslt 1.1.26 and earlier, as used in Google Chrome before 21.0.1180.89, does not properly manage memory, which might allow remote attackers to cause a denial of service (application crash) via a crafted XSLT expression that is not properly identified during XPath navigation, related to (1) the xsltCompileLocationPath...
https://nvd.nist.gov/vuln/detail/CVE-2012-2870
9,824
Chrome
9b9a9f33f0a26f40d083be85a539dd7963adfc9b
https://github.com/chromium/chromium
https://github.com/chromium/chromium/commit/9b9a9f33f0a26f40d083be85a539dd7963adfc9b
None
1
MediaStreamImpl::~MediaStreamImpl() { DCHECK(!peer_connection_handler_); if (dependency_factory_.get()) dependency_factory_->ReleasePeerConnectionFactory(); if (network_manager_) { if (chrome_worker_thread_.IsRunning()) { chrome_worker_thread_.message_loop()->PostTask(FROM_HERE, base::Bind( ...
149,244,836,860,547,970,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2012-2817
Use-after-free vulnerability in Google Chrome before 20.0.1132.43 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to tables that have sections.
https://nvd.nist.gov/vuln/detail/CVE-2012-2817
9,842
Chrome
4c46d7a5b0af9b7d320e709291b270ab7cf07e83
https://github.com/chromium/chromium
https://github.com/chromium/chromium/commit/4c46d7a5b0af9b7d320e709291b270ab7cf07e83
None
1
xmlXPtrEvalXPtrPart(xmlXPathParserContextPtr ctxt, xmlChar *name) { xmlChar *buffer, *cur; int len; int level; if (name == NULL) name = xmlXPathParseName(ctxt); if (name == NULL) XP_ERROR(XPATH_EXPR_ERROR); if (CUR != '(') XP_ERROR(XPATH_EXPR_ERROR); NEXT; level = 1; len = x...
294,708,993,167,079,470,000,000,000,000,000,000,000
xpointer.c
16,906,315,991,765,553,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2011-3102
Off-by-one error in libxml2, as used in Google Chrome before 19.0.1084.46 and other products, allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via unknown vectors.
https://nvd.nist.gov/vuln/detail/CVE-2011-3102
9,856
Chrome
4d77eed905ce1d00361282e8822a2a3be61d25c0
https://github.com/chromium/chromium
https://github.com/chromium/chromium/commit/4d77eed905ce1d00361282e8822a2a3be61d25c0
None
1
bool HTMLFormElement::prepareForSubmission(Event* event) { Frame* frame = document().frame(); if (m_isSubmittingOrPreparingForSubmission || !frame) return m_isSubmittingOrPreparingForSubmission; m_isSubmittingOrPreparingForSubmission = true; m_shouldSubmit = false; if (!validateIntera...
82,440,017,099,070,620,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2013-2927
Use-after-free vulnerability in the HTMLFormElement::prepareForSubmission function in core/html/HTMLFormElement.cpp in Blink, as used in Google Chrome before 30.0.1599.101, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to submission for FORM elements.
https://nvd.nist.gov/vuln/detail/CVE-2013-2927
9,857
Chrome
c4a4dfb26615b5ef5e9dcc730ef43f70ce9202e2
https://github.com/chromium/chromium
https://github.com/chromium/chromium/commit/c4a4dfb26615b5ef5e9dcc730ef43f70ce9202e2
None
1
void RenderThreadImpl::Shutdown() { FOR_EACH_OBSERVER( RenderProcessObserver, observers_, OnRenderProcessShutdown()); ChildThread::Shutdown(); if (memory_observer_) { message_loop()->RemoveTaskObserver(memory_observer_.get()); memory_observer_.reset(); } if (webkit_platform_support_) { ...
237,606,688,755,037,100,000,000,000,000,000,000,000
None
null
[ "CWE-362" ]
CVE-2013-2906
Multiple race conditions in the Web Audio implementation in Blink, as used in Google Chrome before 30.0.1599.66, allow remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to threading in core/html/HTMLMediaElement.cpp, core/platform/audio/AudioDSPKernelProcessor.c...
https://nvd.nist.gov/vuln/detail/CVE-2013-2906
9,858
Chrome
5b998565255a504887c6d2e90d11001a00c9d6da
https://github.com/chromium/chromium
https://github.com/chromium/chromium/commit/5b998565255a504887c6d2e90d11001a00c9d6da
None
1
ExtensionBookmarksTest() : client_(NULL), model_(NULL), node_(NULL), folder_(NULL) {}
155,261,079,591,022,440,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2013-2913
Use-after-free vulnerability in the XMLDocumentParser::append function in core/xml/parser/XMLDocumentParser.cpp in Blink, as used in Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving an XML document.
https://nvd.nist.gov/vuln/detail/CVE-2013-2913
9,884
Chrome
0a57375ad73780e61e1770a9d88b0529b0dbd33b
https://github.com/chromium/chromium
https://github.com/chromium/chromium/commit/0a57375ad73780e61e1770a9d88b0529b0dbd33b
None
1
WebNavigationPolicy RenderViewImpl::decidePolicyForNavigation( WebFrame* frame, const WebURLRequest& request, WebNavigationType type, const WebNode&, WebNavigationPolicy default_policy, bool is_redirect) { if (request.url() != GURL(kSwappedOutURL) && GetContentClient()->renderer()->HandleNavigation(fram...
270,273,416,564,137,120,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2013-0918
Google Chrome before 26.0.1410.43 does not prevent navigation to developer tools in response to a drag-and-drop operation, which allows user-assisted remote attackers to have an unspecified impact via a crafted web site.
https://nvd.nist.gov/vuln/detail/CVE-2013-0918
9,888
Chrome
85f2fcc7b577362dd1def5895d60ea70d6e6b8d0
https://github.com/chromium/chromium
https://github.com/chromium/chromium/commit/85f2fcc7b577362dd1def5895d60ea70d6e6b8d0
None
1
void TabSpecificContentSettings::OnContentBlocked( ContentSettingsType type, const std::string& resource_identifier) { DCHECK(type != CONTENT_SETTINGS_TYPE_GEOLOCATION) << "Geolocation settings handled by OnGeolocationPermissionSet"; content_accessed_[type] = true; std::string identifier; if (...
49,248,163,557,894,240,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2013-0841
Array index error in the content-blocking functionality in Google Chrome before 24.0.1312.56 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
https://nvd.nist.gov/vuln/detail/CVE-2013-0841
9,889
Chrome
f96f1f27d9bc16b1a045c4fb5c8a8a82f73ece59
https://github.com/chromium/chromium
https://github.com/chromium/chromium/commit/f96f1f27d9bc16b1a045c4fb5c8a8a82f73ece59
None
1
bool WebRtcAudioRenderer::Initialize(WebRtcAudioRendererSource* source) { base::AutoLock auto_lock(lock_); DCHECK_EQ(state_, UNINITIALIZED); DCHECK(source); DCHECK(!sink_); DCHECK(!source_); sink_ = AudioDeviceFactory::NewOutputDevice(); DCHECK(sink_); int sample_rate = GetAudioOutputSampleRate(); D...
158,651,565,407,137,820,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2013-0843
content/renderer/media/webrtc_audio_renderer.cc in Google Chrome before 24.0.1312.56 on Mac OS X does not use an appropriate buffer size for the 96 kHz sampling rate, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a web ...
https://nvd.nist.gov/vuln/detail/CVE-2013-0843
9,901
Chrome
137458c8680c51fe9d3984ded2ef50a45a667b8b
https://github.com/chromium/chromium
https://github.com/chromium/chromium/commit/137458c8680c51fe9d3984ded2ef50a45a667b8b
None
1
bool DoTouchScroll(const gfx::Point& point, const gfx::Vector2d& distance, bool wait_until_scrolled) { EXPECT_EQ(0, GetScrollTop()); int scrollHeight = ExecuteScriptAndExtractInt( "document.documentElement.scrollHeight"); EXPECT_EQ(1200, scrollHeight); ...
328,679,834,534,134,300,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2014-7903
Buffer overflow in OpenJPEG before r2911 in PDFium, as used in Google Chrome before 39.0.2171.65, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted JPEG image.
https://nvd.nist.gov/vuln/detail/CVE-2014-7903
9,903
Chrome
b2006ac87cec58363090e7d5e10d5d9e3bbda9f9
https://github.com/chromium/chromium
https://github.com/chromium/chromium/commit/b2006ac87cec58363090e7d5e10d5d9e3bbda9f9
None
1
static bool CheckMov(const uint8* buffer, int buffer_size) { RCHECK(buffer_size > 8); int offset = 0; while (offset + 8 < buffer_size) { int atomsize = Read32(buffer + offset); uint32 atomtype = Read32(buffer + offset + 4); switch (atomtype) { case TAG('f','t','y','p'): case TAG('p',...
82,572,215,792,595,670,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-7908
Multiple integer overflows in the CheckMov function in media/base/container_names.cc in Google Chrome before 39.0.2171.65 allow remote attackers to cause a denial of service or possibly have unspecified other impact via a large atom in (1) MPEG-4 or (2) QuickTime .mov data.
https://nvd.nist.gov/vuln/detail/CVE-2014-7908
9,912
Chrome
0b694217046d6b2bfa5814676e8615c18e6a45ff
https://github.com/chromium/chromium
https://github.com/chromium/chromium/commit/0b694217046d6b2bfa5814676e8615c18e6a45ff
None
1
void SystemClipboard::WriteImage(Image* image, const KURL& url, const String& title) { DCHECK(image); PaintImage paint_image = image->PaintImageForCurrentFrame(); SkBitmap bitmap; if (sk_sp<SkImage> sk_image = paint_image.GetSkImage()) sk_im...
187,180,540,660,422,700,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2014-3156
Buffer overflow in the clipboard implementation in Google Chrome before 35.0.1916.153 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger unexpected bitmap data, related to content/renderer/renderer_clipboard_client.cc and content/renderer/webclipboard...
https://nvd.nist.gov/vuln/detail/CVE-2014-3156
9,937
Chrome
f7b2214a08547e0d28b1a2fef3c19ee0f9febd19
https://github.com/chromium/chromium
https://github.com/chromium/chromium/commit/f7b2214a08547e0d28b1a2fef3c19ee0f9febd19
None
1
bool GetNetworkList(NetworkInterfaceList* networks, int policy) { int s = socket(AF_INET, SOCK_DGRAM, 0); if (s <= 0) { PLOG(ERROR) << "socket"; return false; } uint32_t num_ifs = 0; if (ioctl_netc_get_num_ifs(s, &num_ifs) < 0) { PLOG(ERROR) << "ioctl_netc_get_num_ifs"; PCHECK(close(s) == 0);...
249,454,725,959,250,330,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2015-6764
The BasicJsonStringifier::SerializeJSArray function in json-stringifier.h in the JSON stringifier in Google V8, as used in Google Chrome before 47.0.2526.73, improperly loads array elements, which allows remote attackers to cause a denial of service (out-of-bounds memory access) or possibly have unspecified other impac...
https://nvd.nist.gov/vuln/detail/CVE-2015-6764
9,941
Chrome
e1e0c4301aaa8228e362f2409dbde2d4d1896866
https://github.com/chromium/chromium
https://github.com/chromium/chromium/commit/e1e0c4301aaa8228e362f2409dbde2d4d1896866
None
1
void Document::open() { ASSERT(!importLoader()); if (m_frame) { if (ScriptableDocumentParser* parser = scriptableDocumentParser()) { if (parser->isParsing()) { if (parser->isExecutingScript()) return; if (!parser->wasCreatedByScript() && ...
33,649,530,546,418,673,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2015-6782
The Document::open function in WebKit/Source/core/dom/Document.cpp in Google Chrome before 47.0.2526.73 does not ensure that page-dismissal event handling is compatible with modal-dialog blocking, which makes it easier for remote attackers to spoof Omnibox content via a crafted web site.
https://nvd.nist.gov/vuln/detail/CVE-2015-6782
9,968
Chrome
fc81fcf38edd250876cc384a6ed5567e1b2999e4
https://github.com/chromium/chromium
https://github.com/chromium/chromium/commit/fc81fcf38edd250876cc384a6ed5567e1b2999e4
None
1
void V8LazyEventListener::prepareListenerObject(ExecutionContext* executionContext) { if (!executionContext) return; v8::HandleScope handleScope(toIsolate(executionContext)); v8::Local<v8::Context> v8Context = toV8Context(executionContext, world()); if (v8Context.IsEmpty()) return; ...
124,785,778,898,912,590,000,000,000,000,000,000,000
None
null
[ "CWE-17" ]
CVE-2015-1217
The V8LazyEventListener::prepareListenerObject function in bindings/core/v8/V8LazyEventListener.cpp in the V8 bindings in Blink, as used in Google Chrome before 41.0.2272.76, does not properly compile listeners, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via vec...
https://nvd.nist.gov/vuln/detail/CVE-2015-1217
9,972
Chrome
5472db1c7eca35822219d03be5c817d9a9258c11
https://github.com/chromium/chromium
https://github.com/chromium/chromium/commit/5472db1c7eca35822219d03be5c817d9a9258c11
None
1
void PaintLayerScrollableArea::UpdateCompositingLayersAfterScroll() { PaintLayerCompositor* compositor = GetLayoutBox()->View()->Compositor(); if (!compositor->InCompositingMode()) return; if (UsesCompositedScrolling()) { DCHECK(Layer()->HasCompositedLayerMapping()); ScrollingCoordinator* scrolling...
254,694,208,352,117,680,000,000,000,000,000,000,000
None
null
[ "CWE-79" ]
CVE-2016-5147
Blink, as used in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux, mishandles deferred page loads, which allows remote attackers to inject arbitrary web script or HTML via a crafted web site, aka "Universal XSS (UXSS)."
https://nvd.nist.gov/vuln/detail/CVE-2016-5147
9,995
Chrome
0d151e09e13a704e9738ea913d117df7282e6c7d
https://github.com/chromium/chromium
https://github.com/chromium/chromium/commit/0d151e09e13a704e9738ea913d117df7282e6c7d
None
1
void TestBlinkPlatformSupport::cryptographicallyRandomValues( unsigned char* buffer, size_t length) { }
267,872,989,200,443,520,000,000,000,000,000,000,000
None
null
[ "CWE-310" ]
CVE-2016-1618
Blink, as used in Google Chrome before 48.0.2564.82, does not ensure that a proper cryptographicallyRandomValues random number generator is used, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors.
https://nvd.nist.gov/vuln/detail/CVE-2016-1618
9,998
Chrome
7c5aa07be11cd63d953fbe66370c5869a52170bf
https://github.com/chromium/chromium
https://github.com/chromium/chromium/commit/7c5aa07be11cd63d953fbe66370c5869a52170bf
None
1
std::string GetUploadData(const std::string& brand) { DCHECK(!brand.empty()); std::string data(kPostXml); const std::string placeholder("__BRANDCODE_PLACEHOLDER__"); size_t placeholder_pos = data.find(placeholder); DCHECK(placeholder_pos != std::string::npos); data.replace(placeholder_pos, placeholder.siz...
208,654,258,749,662,370,000,000,000,000,000,000,000
None
null
[ "CWE-79" ]
CVE-2016-1652
Cross-site scripting (XSS) vulnerability in the ModuleSystem::RequireForJsInner function in extensions/renderer/module_system.cc in the Extensions subsystem in Google Chrome before 50.0.2661.75 allows remote attackers to inject arbitrary web script or HTML via a crafted web site, aka "Universal XSS (UXSS)."
https://nvd.nist.gov/vuln/detail/CVE-2016-1652
10,007
Chrome
48a13696977c4bd082341ac85d942128ba2638e4
https://github.com/chromium/chromium
https://github.com/chromium/chromium/commit/48a13696977c4bd082341ac85d942128ba2638e4
None
1
const service_manager::Manifest& GetChromeContentBrowserOverlayManifest() { static base::NoDestructor<service_manager::Manifest> manifest { service_manager::ManifestBuilder() .ExposeCapability("gpu", service_manager::Manifest::InterfaceList< metrics:...
173,432,205,096,925,380,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2017-5110
Inappropriate implementation of the web payments API on blob: and data: schemes in Web Payments in Google Chrome prior to 60.0.3112.78 for Mac, Windows, Linux, and Android allowed a remote attacker to spoof the contents of the Omnibox via a crafted HTML page.
https://nvd.nist.gov/vuln/detail/CVE-2017-5110
10,008
Chrome
ae6f339fba0736224fdca0b96d2bb1cda42d8ad3
https://github.com/chromium/chromium
https://github.com/chromium/chromium/commit/ae6f339fba0736224fdca0b96d2bb1cda42d8ad3
None
1
bool IDNSpoofChecker::SafeToDisplayAsUnicode(base::StringPiece16 label, bool is_tld_ascii) { UErrorCode status = U_ZERO_ERROR; int32_t result = uspoof_check(checker_, label.data(), base::checked_cast<int32_t>(label.size()), NULL, &status); if (...
331,452,579,950,378,500,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2017-5086
Insufficient Policy Enforcement in Omnibox in Google Chrome prior to 59.0.3071.86 for Windows and Mac allowed a remote attacker to perform domain spoofing via IDN homographs in a crafted domain name.
https://nvd.nist.gov/vuln/detail/CVE-2017-5086
10,041
Chrome
7da6c3419fd172405bcece1ae4ec6ec8316cd345
https://github.com/chromium/chromium
https://github.com/chromium/chromium/commit/7da6c3419fd172405bcece1ae4ec6ec8316cd345
None
1
void RenderWidgetHostImpl::DidNavigate(uint32_t next_source_id) { current_content_source_id_ = next_source_id; did_receive_first_frame_after_navigation_ = false; if (enable_surface_synchronization_) { visual_properties_ack_pending_ = false; viz::LocalSurfaceId old_surface_id = view_->GetLocalSurfaceId()...
179,967,799,219,761,100,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2018-17467
Insufficiently quick clearing of stale rendered content in Navigation in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
https://nvd.nist.gov/vuln/detail/CVE-2018-17467
10,044
Chrome
e89b9003df8c7bd7822e5b6c0a76e726a6ed1505
https://github.com/chromium/chromium
https://github.com/chromium/chromium/commit/e89b9003df8c7bd7822e5b6c0a76e726a6ed1505
None
1
void MimeHandlerViewContainer::OnReady() { if (!render_frame() || !is_embedded_) return; blink::WebLocalFrame* frame = render_frame()->GetWebFrame(); blink::WebAssociatedURLLoaderOptions options; DCHECK(!loader_); loader_.reset(frame->CreateAssociatedURLLoader(options)); blink::WebURLRequest request...
136,943,128,534,837,900,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2018-6089
A lack of CORS checks, after a Service Worker redirected to a cross-origin PDF, in Service Worker in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to leak limited cross-origin data via a crafted HTML page.
https://nvd.nist.gov/vuln/detail/CVE-2018-6089
10,057
Chrome
e56aee6473486fdfac0429747284fda7cdd3aae5
https://github.com/chromium/chromium
https://github.com/chromium/chromium/commit/e56aee6473486fdfac0429747284fda7cdd3aae5
None
1
void ImageLoader::DoUpdateFromElement(BypassMainWorldBehavior bypass_behavior, UpdateFromElementBehavior update_behavior, const KURL& url, ReferrerPolicy referrer_policy, ...
101,908,932,034,635,230,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2018-6114
Incorrect enforcement of CSP for <object> tags in Blink in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to bypass content security policy via a crafted HTML page.
https://nvd.nist.gov/vuln/detail/CVE-2018-6114
10,067
Chrome
9d81094d7b0bfc8be6bba2f5084e790677e527c8
https://github.com/chromium/chromium
https://github.com/chromium/chromium/commit/9d81094d7b0bfc8be6bba2f5084e790677e527c8
None
1
ProfilingProcessHost::Mode ProfilingProcessHost::GetCurrentMode() { const base::CommandLine* cmdline = base::CommandLine::ForCurrentProcess(); #if BUILDFLAG(USE_ALLOCATOR_SHIM) if (cmdline->HasSwitch(switches::kMemlog) || base::FeatureList::IsEnabled(kOOPHeapProfilingFeature)) { if (cmdline->HasSwitch(swi...
46,622,500,276,925,110,000,000,000,000,000,000,000
None
null
[ "CWE-416" ]
CVE-2017-15411
Use after free in PDFium in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.
https://nvd.nist.gov/vuln/detail/CVE-2017-15411
10,079
Chrome
cfb022640b5eec337b06f88a485487dc92ca1ac1
https://github.com/chromium/chromium
https://github.com/chromium/chromium/commit/cfb022640b5eec337b06f88a485487dc92ca1ac1
None
1
void MediaStreamDispatcherHost::DoOpenDevice( int32_t page_request_id, const std::string& device_id, blink::MediaStreamType type, OpenDeviceCallback callback, MediaDeviceSaltAndOrigin salt_and_origin) { DCHECK_CURRENTLY_ON(BrowserThread::IO); if (!MediaStreamManager::IsOriginAllowed(render_proce...
16,333,236,676,002,740,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2019-5824
Parameter passing error in media in Google Chrome prior to 74.0.3729.131 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
https://nvd.nist.gov/vuln/detail/CVE-2019-5824