idx
int64
project
string
commit_id
string
project_url
string
commit_url
string
commit_message
string
target
int64
func
string
func_hash
float64
file_name
string
file_hash
float64
cwe
list
cve
string
cve_desc
string
nvd_url
string
10,715
libpcap
437b273761adedcbd880f714bfa44afeec186a31
https://github.com/the-tcpdump-group/libpcap
https://github.com/the-tcpdump-group/libpcap/commit/437b273761adedcbd880f714bfa44afeec186a31
Don't crash if crypt() fails. It can fail, so make sure it doesn't before comparing its result with the password. This addresses Include Security issue F12: [libpcap] Remote Packet Capture Daemon Null Pointer Dereference Denial of Service.
1
daemon_AuthUserPwd(char *username, char *password, char *errbuf) { #ifdef _WIN32 /* * Warning: the user which launches the process must have the * SE_TCB_NAME right. * This corresponds to have the "Act as part of the Operating System" * turned on (administrative tools, local security settings, local * polici...
63,029,283,185,700,500,000,000,000,000,000,000,000
daemon.c
265,153,928,199,968,920,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2019-15163
rpcapd/daemon.c in libpcap before 1.9.1 allows attackers to cause a denial of service (NULL pointer dereference and daemon crash) if a crypt() call fails.
https://nvd.nist.gov/vuln/detail/CVE-2019-15163
10,716
poppler
da63c35549e8852a410946ab016a3f25ac701bdf
https://github.com/freedesktop/poppler
https://cgit.freedesktop.org/poppler/poppler/commit/?id=da63c35549e8852a410946ab016a3f25ac701bdf
FoFiType1C::convertToType0: Fix crash in broken files Bug #102724
1
void FoFiType1C::convertToType0(char *psName, int *codeMap, int nCodes, FoFiOutputFunc outputFunc, void *outputStream) { int *cidMap; Type1CIndex subrIdx; Type1CIndexVal val; int nCIDs; GooString *buf; Type1CEexecBuf eb; GBool ok; int fd, i, j, k; // compute the CID count and build the CID-to...
147,790,478,051,028,070,000,000,000,000,000,000,000
FoFiType1C.cc
140,291,466,668,214,960,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-14976
The FoFiType1C::convertToType0 function in FoFiType1C.cc in Poppler 0.59.0 has a heap-based buffer over-read vulnerability if an out-of-bounds font dictionary index is encountered, which allows an attacker to launch a denial of service attack.
https://nvd.nist.gov/vuln/detail/CVE-2017-14976
10,717
WavPack
36a24c7881427d2e1e4dc1cef58f19eee0d13aec
https://github.com/dbry/WavPack
https://github.com/dbry/WavPack/commit/36a24c7881427d2e1e4dc1cef58f19eee0d13aec
issue #28, do not overwrite heap on corrupt DSDIFF file
1
int ParseDsdiffHeaderConfig (FILE *infile, char *infilename, char *fourcc, WavpackContext *wpc, WavpackConfig *config) { int64_t infilesize, total_samples; DFFFileHeader dff_file_header; DFFChunkHeader dff_chunk_header; uint32_t bcount; infilesize = DoGetFileSize (infile); memcpy (&dff_file_hea...
129,741,665,744,977,370,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2018-7253
The ParseDsdiffHeaderConfig function of the cli/dsdiff.c file of WavPack 5.1.0 allows a remote attacker to cause a denial-of-service (heap-based buffer over-read) or possibly overwrite the heap via a maliciously crafted DSDIFF file.
https://nvd.nist.gov/vuln/detail/CVE-2018-7253
10,718
linux
0449641130f5652b344ef6fa39fa019d7e94660a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/0449641130f5652b344ef6fa39fa019d7e94660a
ext4: init timer earlier to avoid a kernel panic in __save_error_info During mount, when we fail to open journal inode or root inode, the __save_error_info will mod_timer. But actually s_err_report isn't initialized yet and the kernel oops. The detailed information can be found https://bugzilla.kernel.org/show_bug.cgi...
1
__acquires(kernel_lock) { char *orig_data = kstrdup(data, GFP_KERNEL); struct buffer_head *bh; struct ext4_super_block *es = NULL; struct ext4_sb_info *sbi; ext4_fsblk_t block; ext4_fsblk_t sb_block = get_sb_block(&data); ext4_fsblk_t logical_sb_block; unsigned long offset = 0; unsigned long journal_devnum...
2,883,871,233,556,824,000,000,000,000,000,000,000
super.c
242,967,321,248,923,500,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2011-2493
The ext4_fill_super function in fs/ext4/super.c in the Linux kernel before 2.6.39 does not properly initialize a certain error-report data structure, which allows local users to cause a denial of service (OOPS) by attempting to mount a crafted ext4 filesystem.
https://nvd.nist.gov/vuln/detail/CVE-2011-2493
10,719
qemu
844864fbae66935951529408831c2f22367a57b6
https://github.com/bonzini/qemu
https://git.qemu.org/?p=qemu.git;a=commit;h=844864fbae66935951529408831c2f22367a57b6
scsi: megasas: null terminate bios version buffer While reading information via 'megasas_ctrl_get_info' routine, a local bios version buffer isn't null terminated. Add the terminating null byte to avoid any OOB access. Reported-by: Li Qiang <liqiang6-s@360.cn> Reviewed-by: Peter Maydell <peter.maydell@linaro.org> Sig...
1
static int megasas_ctrl_get_info(MegasasState *s, MegasasCmd *cmd) { PCIDevice *pci_dev = PCI_DEVICE(s); PCIDeviceClass *pci_class = PCI_DEVICE_GET_CLASS(pci_dev); MegasasBaseClass *base_class = MEGASAS_DEVICE_GET_CLASS(s); struct mfi_ctrl_info info; size_t dcmd_size = sizeof(info); BusChild *ki...
340,248,343,264,835,060,000,000,000,000,000,000,000
megasas.c
35,182,564,994,204,110,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2016-5337
The megasas_ctrl_get_info function in hw/scsi/megasas.c in QEMU allows local guest OS administrators to obtain sensitive host memory information via vectors related to reading device control information.
https://nvd.nist.gov/vuln/detail/CVE-2016-5337
10,720
FFmpeg
c24bcb553650b91e9eff15ef6e54ca73de2453b7
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/c24bcb553650b91e9eff15ef6e54ca73de2453b7
avformat/nsvdec: Fix DoS due to lack of eof check in nsvs_file_offset loop. Fixes: 20170829.nsv Co-Author: 张洪亮(望初)" <wangchu.zhl@alibaba-inc.com> Found-by: Xiaohei and Wangchu from Alibaba Security Team Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
1
static int nsv_parse_NSVf_header(AVFormatContext *s) { NSVContext *nsv = s->priv_data; AVIOContext *pb = s->pb; unsigned int av_unused file_size; unsigned int size; int64_t duration; int strings_size; int table_entries; int table_entries_used; nsv->state = NSV_UNSYNC; /* in case we ...
56,714,162,752,573,535,000,000,000,000,000,000,000
nsvdec.c
37,860,070,422,108,427,000,000,000,000,000,000,000
[ "CWE-834" ]
CVE-2017-14171
In libavformat/nsvdec.c in FFmpeg 2.4 and 3.3.3, a DoS in nsv_parse_NSVf_header() due to lack of an EOF (End of File) check might cause huge CPU consumption. When a crafted NSV file, which claims a large "table_entries_used" field in the header but does not contain sufficient backing data, is provided, the loop over 't...
https://nvd.nist.gov/vuln/detail/CVE-2017-14171
10,721
php-src
8d2539fa0faf3f63e1d1e7635347c5b9e777d47b
https://github.com/php/php-src
https://github.com/php/php-src/commit/8d2539fa0faf3f63e1d1e7635347c5b9e777d47b
Fix bug #73831 - NULL Pointer Dereference while unserialize php object
1
*/ static void php_wddx_pop_element(void *user_data, const XML_Char *name) { st_entry *ent1, *ent2; wddx_stack *stack = (wddx_stack *)user_data; HashTable *target_hash; zend_class_entry *pce; zval obj; /* OBJECTS_FIXME */ if (stack->top == 0) { return; } if (!strcmp((char *)name, EL_STRING) ||...
51,441,026,749,032,170,000,000,000,000,000,000,000
wddx.c
147,391,937,390,179,960,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2016-10162
The php_wddx_pop_element function in ext/wddx/wddx.c in PHP 7.0.x before 7.0.15 and 7.1.x before 7.1.1 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an inapplicable class name in a wddxPacket XML document, leading to mishandling in a wddx_deserialize call.
https://nvd.nist.gov/vuln/detail/CVE-2016-10162
10,722
qemu
a9c380db3b8c6af19546a68145c8d1438a09c92b
https://github.com/bonzini/qemu
http://git.qemu.org/?p=qemu.git;a=commit;h=a9c380db3b8c6af19546a68145c8d1438a09c92b
ssi-sd: fix buffer overrun on invalid state load CVE-2013-4537 s->arglen is taken from wire and used as idx in ssi_sd_transfer(). Validate it before access. Signed-off-by: Michael S. Tsirkin <mst@redhat.com> Signed-off-by: Juan Quintela <quintela@redhat.com>
1
static int ssi_sd_load(QEMUFile *f, void *opaque, int version_id) { SSISlave *ss = SSI_SLAVE(opaque); ssi_sd_state *s = (ssi_sd_state *)opaque; int i; if (version_id != 1) return -EINVAL; s->mode = qemu_get_be32(f); s->cmd = qemu_get_be32(f); for (i = 0; i < 4; i++) s->cmda...
257,645,210,657,267,800,000,000,000,000,000,000,000
None
null
[ "CWE-94" ]
CVE-2013-4537
The ssi_sd_transfer function in hw/sd/ssi-sd.c in QEMU before 1.7.2 allows remote attackers to execute arbitrary code via a crafted arglen value in a savevm image.
https://nvd.nist.gov/vuln/detail/CVE-2013-4537
10,723
libx11
b469da1430cdcee06e31c6251b83aede072a1ff0
https://gitlab.freedesktop.org/xorg/lib/libx11
https://cgit.freedesktop.org/xorg/lib/libX11/commit/?id=b469da1430cdcee06e31c6251b83aede072a1ff0
Fixed off-by-one writes (CVE-2018-14599). The functions XGetFontPath, XListExtensions, and XListFonts are vulnerable to an off-by-one override on malicious server responses. The server replies consist of chunks consisting of a length byte followed by actual string, which is not NUL-terminated. While parsing the resp...
1
char **XListExtensions( register Display *dpy, int *nextensions) /* RETURN */ { xListExtensionsReply rep; char **list = NULL; char *ch = NULL; char *chend; int count = 0; register unsigned i; register int length; _X_UNUSED register xReq *req; unsigned long rlen = 0; LockDisplay(dpy); GetEmptyReq (Li...
163,033,534,115,641,510,000,000,000,000,000,000,000
ListExt.c
320,148,940,157,906,520,000,000,000,000,000,000,000
[ "CWE-682" ]
CVE-2018-14599
An issue was discovered in libX11 through 1.6.5. The function XListExtensions in ListExt.c is vulnerable to an off-by-one error caused by malicious server responses, leading to DoS or possibly unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2018-14599
10,726
php-src
35ceea928b12373a3b1e3eecdc32ed323223a40d
https://github.com/php/php-src
https://github.com/php/php-src/commit/35ceea928b12373a3b1e3eecdc32ed323223a40d
Fix bug #67060: use default mode of 660
1
int fpm_unix_resolve_socket_premissions(struct fpm_worker_pool_s *wp) /* {{{ */ { struct fpm_worker_pool_config_s *c = wp->config; /* uninitialized */ wp->socket_uid = -1; wp->socket_gid = -1; wp->socket_mode = 0666; if (!c) { return 0; } if (c->listen_owner && *c->listen_owner) { struct passwd *pwd; ...
91,364,791,922,883,400,000,000,000,000,000,000,000
fpm_unix.c
34,662,802,751,318,727,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2014-0185
sapi/fpm/fpm/fpm_unix.c in the FastCGI Process Manager (FPM) in PHP before 5.4.28 and 5.5.x before 5.5.12 uses 0666 permissions for the UNIX socket, which allows local users to gain privileges via a crafted FastCGI client.
https://nvd.nist.gov/vuln/detail/CVE-2014-0185
10,727
WavPack
33a0025d1d63ccd05d9dbaa6923d52b1446a62fe
https://github.com/dbry/WavPack
https://github.com/dbry/WavPack/commit/33a0025d1d63ccd05d9dbaa6923d52b1446a62fe
issue #68: clear WaveHeader at start to prevent uninitialized read
1
int ParseWave64HeaderConfig (FILE *infile, char *infilename, char *fourcc, WavpackContext *wpc, WavpackConfig *config) { int64_t total_samples = 0, infilesize; Wave64ChunkHeader chunk_header; Wave64FileHeader filehdr; WaveHeader WaveHeader; int format_chunk = 0; uint32_t bcount; infilesize ...
277,131,272,340,638,830,000,000,000,000,000,000,000
wave64.c
277,994,324,779,500,450,000,000,000,000,000,000,000
[ "CWE-665" ]
CVE-2019-1010319
WavPack 5.1.0 and earlier is affected by: CWE-457: Use of Uninitialized Variable. The impact is: Unexpected control flow, crashes, and segfaults. The component is: ParseWave64HeaderConfig (wave64.c:211). The attack vector is: Maliciously crafted .wav file. The fixed version is: After commit https://github.com/dbry/WavP...
https://nvd.nist.gov/vuln/detail/CVE-2019-1010319
10,728
radare2
bbb4af56003c1afdad67af0c4339267ca38b1017
https://github.com/radare/radare2
https://github.com/radare/radare2/commit/bbb4af56003c1afdad67af0c4339267ca38b1017
Fix #10294 - crash in r2_hoobr__6502_op
1
static int _6502_op(RAnal *anal, RAnalOp *op, ut64 addr, const ut8 *data, int len) { char addrbuf[64]; const int buffsize = sizeof (addrbuf) - 1; memset (op, '\0', sizeof (RAnalOp)); op->size = snes_op_get_size (1, 1, &snes_op[data[0]]); //snes-arch is similiar to nes/6502 op->addr = addr; op->type = R_ANAL_OP_T...
55,851,122,861,549,740,000,000,000,000,000,000,000
anal_6502.c
13,243,688,809,806,383,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-12322
There is a heap out of bounds read in radare2 2.6.0 in _6502_op() in libr/anal/p/anal_6502.c via a crafted iNES ROM binary file.
https://nvd.nist.gov/vuln/detail/CVE-2018-12322
10,729
yara
992480c30f75943e9cd6245bb2015c7737f9b661
https://github.com/VirusTotal/yara
https://github.com/VirusTotal/yara/commit/992480c30f75943e9cd6245bb2015c7737f9b661
Fix buffer overrun (issue #678). Add assert for detecting this kind of issues earlier.
1
int yr_re_fast_exec( uint8_t* code, uint8_t* input_data, size_t input_forwards_size, size_t input_backwards_size, int flags, RE_MATCH_CALLBACK_FUNC callback, void* callback_args, int* matches) { RE_REPEAT_ANY_ARGS* repeat_any_args; uint8_t* code_stack[MAX_FAST_RE_STACK]; uint8_t* ...
21,370,740,863,343,675,000,000,000,000,000,000,000
re.c
76,461,095,669,381,760,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9465
The yr_arena_write_data function in YARA 3.6.1 allows remote attackers to cause a denial of service (buffer over-read and application crash) or obtain sensitive information from process memory via a crafted file that is mishandled in the yr_re_fast_exec function in libyara/re.c and the _yr_scan_match_callback function ...
https://nvd.nist.gov/vuln/detail/CVE-2017-9465
10,730
yara
992480c30f75943e9cd6245bb2015c7737f9b661
https://github.com/VirusTotal/yara
https://github.com/VirusTotal/yara/commit/992480c30f75943e9cd6245bb2015c7737f9b661
Fix buffer overrun (issue #678). Add assert for detecting this kind of issues earlier.
1
int _yr_scan_match_callback( uint8_t* match_data, int32_t match_length, int flags, void* args) { CALLBACK_ARGS* callback_args = (CALLBACK_ARGS*) args; YR_STRING* string = callback_args->string; YR_MATCH* new_match; int result = ERROR_SUCCESS; int tidx = callback_args->context->tidx; size_...
24,636,487,109,590,925,000,000,000,000,000,000,000
scan.c
278,173,131,600,320,600,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9465
The yr_arena_write_data function in YARA 3.6.1 allows remote attackers to cause a denial of service (buffer over-read and application crash) or obtain sensitive information from process memory via a crafted file that is mishandled in the yr_re_fast_exec function in libyara/re.c and the _yr_scan_match_callback function ...
https://nvd.nist.gov/vuln/detail/CVE-2017-9465
10,731
poppler
9cf2325fb22f812b31858e519411f57747d39bd8
https://github.com/freedesktop/poppler
https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8
More gmalloc → gmallocn
1
poppler_page_prepare_output_dev (PopplerPage *page, double scale, int rotation, gboolean transparent, OutputDevData *output_dev_data) { CairoOutputDev *output_dev; cairo_surface_t *surface; double width, height; int cairo_width, cairo_height, cairo_rowstride, rotate; unsigned char *cairo_d...
214,787,271,645,859,100,000,000,000,000,000,000,000
poppler-page.cc
38,399,974,030,661,296,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2009-3605
Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu...
https://nvd.nist.gov/vuln/detail/CVE-2009-3605
10,734
poppler
9cf2325fb22f812b31858e519411f57747d39bd8
https://github.com/freedesktop/poppler
https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8
More gmalloc → gmallocn
1
SplashBitmap::SplashBitmap(int widthA, int heightA, int rowPad, SplashColorMode modeA, GBool alphaA, GBool topDown) { width = widthA; height = heightA; mode = modeA; switch (mode) { case splashModeMono1: rowSize = (width + 7) >> 3; break; case splashModeMono8: rowSize = width; br...
291,686,055,334,142,570,000,000,000,000,000,000,000
SplashBitmap.cc
211,881,515,219,105,400,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2009-3605
Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu...
https://nvd.nist.gov/vuln/detail/CVE-2009-3605
10,735
poppler
9cf2325fb22f812b31858e519411f57747d39bd8
https://github.com/freedesktop/poppler
https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8
More gmalloc → gmallocn
1
GBool SplashFTFont::makeGlyph(int c, int xFrac, int yFrac, SplashGlyphBitmap *bitmap, int x0, int y0, SplashClip *clip, SplashClipResult *clipRes) { SplashFTFontFile *ff; FT_Vector offset; FT_GlyphSlot slot; FT_UInt gid; int rowSize; Guchar *p, *q; int i; ff = (SplashFTFontFile *)fontFile; ...
320,507,127,576,760,400,000,000,000,000,000,000,000
SplashFTFont.cc
137,915,116,313,860,120,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2009-3605
Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu...
https://nvd.nist.gov/vuln/detail/CVE-2009-3605
10,737
qemu
93060258ae748573ca7197204125a2670047896d
https://github.com/bonzini/qemu
https://git.qemu.org/?p=qemu.git;a=commit;h=93060258ae748573ca7197204125a2670047896d
net: vmxnet: check IP header length Vmxnet3 device emulator when parsing packet headers does not check for IP header length. It could lead to a OOB access when reading further packet data. Add check to avoid it. Reported-by: Li Qiang <liqiang6-s@360.cn> Signed-off-by: Prasad J Pandit <pjp@fedoraproject.org> Reviewed-...
1
static bool vmxnet_tx_pkt_parse_headers(struct VmxnetTxPkt *pkt) { struct iovec *l2_hdr, *l3_hdr; size_t bytes_read; size_t full_ip6hdr_len; uint16_t l3_proto; assert(pkt); l2_hdr = &pkt->vec[VMXNET_TX_PKT_L2HDR_FRAG]; l3_hdr = &pkt->vec[VMXNET_TX_PKT_L3HDR_FRAG]; bytes_read = iov_to_...
279,902,556,539,940,040,000,000,000,000,000,000,000
vmxnet_tx_pkt.c
137,783,482,756,033,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-6835
The vmxnet_tx_pkt_parse_headers function in hw/net/vmxnet_tx_pkt.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (buffer over-read) by leveraging failure to check IP header length.
https://nvd.nist.gov/vuln/detail/CVE-2016-6835
10,738
qemu
167d97a3def77ee2dbf6e908b0ecbfe2103977db
https://github.com/bonzini/qemu
https://git.qemu.org/?p=qemu.git;a=commit;h=167d97a3def77ee2dbf6e908b0ecbfe2103977db
vmsvga: correct bitmap and pixmap size checks When processing svga command DEFINE_CURSOR in vmsvga_fifo_run, the computed BITMAP and PIXMAP size are checked against the 'cursor.mask[]' and 'cursor.image[]' array sizes in bytes. Correct these checks to avoid OOB memory access. Reported-by: Qinghao Tang <luodalongde@gm...
1
static void vmsvga_fifo_run(struct vmsvga_state_s *s) { uint32_t cmd, colour; int args, len, maxloop = 1024; int x, y, dx, dy, width, height; struct vmsvga_cursor_definition_s cursor; uint32_t cmd_start; len = vmsvga_fifo_length(s); while (len > 0 && --maxloop > 0) { /* May need to ...
133,450,826,690,414,800,000,000,000,000,000,000,000
vmware_vga.c
157,911,327,208,299,070,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2016-7170
The vmsvga_fifo_run function in hw/display/vmware_vga.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to cursor.mask[] and cursor.image[] array sizes when processing a DEFINE_CURSOR svga command.
https://nvd.nist.gov/vuln/detail/CVE-2016-7170
10,739
php-src
523f230c831d7b33353203fa34aee4e92ac12bba
https://github.com/php/php-src
https://github.com/php/php-src/commit/523f230c831d7b33353203fa34aee4e92ac12bba
Fix bug #75981: prevent reading beyond buffer start
1
php_stream *php_stream_url_wrap_http_ex(php_stream_wrapper *wrapper, const char *path, const char *mode, int options, char **opened_path, php_stream_context *context, int redirect_max, int flags STREAMS_DC TSRMLS_DC) /* {{{ */ { php_stream *stream = NULL; php_url *resource = NULL; int use_ssl; int use_proxy =...
79,315,660,875,678,490,000,000,000,000,000,000,000
http_fopen_wrapper.c
108,329,095,691,693,000,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-7584
In PHP through 5.6.33, 7.0.x before 7.0.28, 7.1.x through 7.1.14, and 7.2.x through 7.2.2, there is a stack-based buffer under-read while parsing an HTTP response in the php_stream_url_wrap_http_ex function in ext/standard/http_fopen_wrapper.c. This subsequently results in copying a large string.
https://nvd.nist.gov/vuln/detail/CVE-2018-7584
10,740
qemu
dd248ed7e204ee8a1873914e02b8b526e8f1b80d
https://github.com/bonzini/qemu
http://git.qemu.org/?p=qemu.git;a=commitdiff;h=dd248ed7e204ee8a1873914e02b8b526e8f1b80d
virtio-gpu: fix memory leak in set scanout In virtio_gpu_set_scanout function, when creating the 'rect' its refcount is set to 2, by pixman_image_create_bits and qemu_create_displaysurface_pixman function. This can lead a memory leak issues. This patch avoid this issue. Signed-off-by: Li Qiang <liqiang6-s@360.cn> Rev...
1
static void virtio_gpu_set_scanout(VirtIOGPU *g, struct virtio_gpu_ctrl_command *cmd) { struct virtio_gpu_simple_resource *res; struct virtio_gpu_scanout *scanout; pixman_format_code_t format; uint32_t offset; int bpp; struct virtio_gpu_set_scanout ss; VIR...
280,786,379,160,405,420,000,000,000,000,000,000,000
virtio-gpu.c
35,023,000,979,426,380,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2017-9060
Memory leak in the virtio_gpu_set_scanout function in hw/display/virtio-gpu.c in QEMU (aka Quick Emulator) allows local guest OS users to cause a denial of service (memory consumption) via a large number of "VIRTIO_GPU_CMD_SET_SCANOUT:" commands.
https://nvd.nist.gov/vuln/detail/CVE-2017-9060
10,741
pngquant
b7c217680cda02dddced245d237ebe8c383be285
https://github.com/pornel/pngquant
https://github.com/pornel/pngquant/commit/b7c217680cda02dddced245d237ebe8c383be285
Fix integer overflow in rwpng.h (CVE-2016-5735) Reported by Choi Jaeseung Found with Sparrow (http://ropas.snu.ac.kr/sparrow)
1
static pngquant_error rwpng_read_image24_libpng(FILE *infile, png24_image *mainprog_ptr, int verbose) { png_structp png_ptr = NULL; png_infop info_ptr = NULL; png_size_t rowbytes; int color_type, bit_depth; png_ptr = png_create_read_struct(PNG_LIBPNG_VER_STRING, mainprog_ptr, r...
205,294,190,601,256,360,000,000,000,000,000,000,000
rwpng.c
147,508,917,339,336,730,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2016-5735
Integer overflow in the rwpng_read_image24_libpng function in rwpng.c in pngquant 2.7.0 allows remote attackers to have unspecified impact via a crafted PNG file, which triggers a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2016-5735
10,742
libav
0a49a62f998747cfa564d98d36a459fe70d3299b
https://github.com/libav/libav
https://git.libav.org/?p=libav.git;a=commitdiff;h=0a49a62f998747cfa564d98d36a459fe70d3299b
h263: Always check both dimensions CC: libav-stable@libav.org Found-By: ago@gentoo.org
1
int ff_h263_decode_picture_header(MpegEncContext *s) { int format, width, height, i; uint32_t startcode; align_get_bits(&s->gb); startcode= get_bits(&s->gb, 22-8); for(i= get_bits_left(&s->gb); i>24; i-=8) { startcode = ((startcode << 8) | get_bits(&s->gb, 8)) & 0x003FFFFF; if(st...
197,626,158,404,532,300,000,000,000,000,000,000,000
ituh263dec.c
237,581,302,495,997,000,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2015-5479
The ff_h263_decode_mba function in libavcodec/ituh263dec.c in Libav before 11.5 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a file with crafted dimensions.
https://nvd.nist.gov/vuln/detail/CVE-2015-5479
10,743
qemu
3a15cc0e1ee7168db0782133d2607a6bfa422d66
https://github.com/bonzini/qemu
https://git.qemu.org/?p=qemu.git;a=commit;h=3a15cc0e1ee7168db0782133d2607a6bfa422d66
net: stellaris_enet: check packet length against receive buffer When receiving packets over Stellaris ethernet controller, it uses receive buffer of size 2048 bytes. In case the controller accepts large(MTU) packets, it could lead to memory corruption. Add check to avoid it. Reported-by: Oleksandr Bazhaniuk <oleksand...
1
static ssize_t stellaris_enet_receive(NetClientState *nc, const uint8_t *buf, size_t size) { stellaris_enet_state *s = qemu_get_nic_opaque(nc); int n; uint8_t *p; uint32_t crc; if ((s->rctl & SE_RCTL_RXEN) == 0) return -1; if (s->np >= 31) { return 0; } DPRINTF("Receive...
96,844,957,878,192,260,000,000,000,000,000,000,000
stellaris_enet.c
222,717,703,653,803,500,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2016-4001
Buffer overflow in the stellaris_enet_receive function in hw/net/stellaris_enet.c in QEMU, when the Stellaris ethernet controller is configured to accept large packets, allows remote attackers to cause a denial of service (QEMU crash) via a large packet.
https://nvd.nist.gov/vuln/detail/CVE-2016-4001
10,744
qemu
a6b3167fa0e825aebb5a7cd8b437b6d41584a196
https://github.com/bonzini/qemu
https://git.qemu.org/?p=qemu.git;a=commit;h=a6b3167fa0e825aebb5a7cd8b437b6d41584a196
block/iscsi: avoid potential overflow of acb->task->cdb at least in the path via virtio-blk the maximum size is not restricted. Cc: qemu-stable@nongnu.org Signed-off-by: Peter Lieven <pl@kamp.de> Message-Id: <1464080368-29584-1-git-send-email-pl@kamp.de> Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
1
static BlockAIOCB *iscsi_aio_ioctl(BlockDriverState *bs, unsigned long int req, void *buf, BlockCompletionFunc *cb, void *opaque) { IscsiLun *iscsilun = bs->opaque; struct iscsi_context *iscsi = iscsilun->iscsi; struct iscsi_data data; IscsiAIOCB *acb; acb = qemu_aio_get(&iscsi_aioc...
281,431,584,605,820,930,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-5126
Heap-based buffer overflow in the iscsi_aio_ioctl function in block/iscsi.c in QEMU allows local guest OS users to cause a denial of service (QEMU process crash) or possibly execute arbitrary code via a crafted iSCSI asynchronous I/O ioctl call.
https://nvd.nist.gov/vuln/detail/CVE-2016-5126
10,745
FFmpeg
ed188f6dcdf0935c939ed813cf8745d50742014b
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/ed188f6dcdf0935c939ed813cf8745d50742014b
avformat/aadec: Check for scanf() failure Fixes: use of uninitialized variables Fixes: blank.aa Found-by: Chamal De Silva <chamal.desilva@gmail.com> Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
1
static int aa_read_header(AVFormatContext *s) { int i, j, idx, largest_idx = -1; uint32_t nkey, nval, toc_size, npairs, header_seed = 0, start; char key[128], val[128], codec_name[64] = {0}; uint8_t output[24], dst[8], src[8]; int64_t largest_size = -1, current_size = -1, chapter_pos; struct toc...
62,314,827,938,333,340,000,000,000,000,000,000,000
aadec.c
278,941,088,614,423,300,000,000,000,000,000,000,000
[ "CWE-665" ]
CVE-2019-12730
aa_read_header in libavformat/aadec.c in FFmpeg before 3.2.14 and 4.x before 4.1.4 does not check for sscanf failure and consequently allows use of uninitialized variables.
https://nvd.nist.gov/vuln/detail/CVE-2019-12730
10,746
samba
b000da128b5fb519d2d3f2e7fd20e4a25b7dae7d
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commit;h=b000da128b5fb519d2d3f2e7fd20e4a25b7dae7d
CVE-2015-8467: samdb: Match MS15-096 behaviour for userAccountControl Swapping between account types is now restricted Bug: https://bugzilla.samba.org/show_bug.cgi?id=11552 Signed-off-by: Andrew Bartlett <abartlet@samba.org> Reviewed-by: Jeremy Allison <jra@samba.org> Reviewed-by: Ralph Boehme <slow@samba.org>
1
static int samldb_check_user_account_control_acl(struct samldb_ctx *ac, struct dom_sid *sid, uint32_t user_account_control, uint32_t user_account_control_old) { int i, ret = 0; bool need_acl_check = false; struct ldb_result *res; const char * const sd_attrs[] = {"ntSecurityDescriptor", NULL}; ...
59,441,307,753,859,120,000,000,000,000,000,000,000
samldb.c
318,825,023,360,728,400,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2015-8467
The samldb_check_user_account_control_acl function in dsdb/samdb/ldb_modules/samldb.c in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3 does not properly check for administrative privileges during creation of machine accounts, which allows remote authenticated users to bypass intended access restri...
https://nvd.nist.gov/vuln/detail/CVE-2015-8467
10,747
spice
8af619009660b24e0b41ad26b30289eea288fcc2
https://gitlab.freedesktop.org/spice/spice
https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2
Fix buffer overflow when decrypting client SPICE ticket reds_handle_ticket uses a fixed size 'password' buffer for the decrypted password whose size is SPICE_MAX_PASSWORD_LENGTH. However, RSA_private_decrypt which we call for the decryption expects the destination buffer to be at least RSA_size(link->tiTicketing.rsa) ...
1
static void reds_handle_ticket(void *opaque) { RedLinkInfo *link = (RedLinkInfo *)opaque; char password[SPICE_MAX_PASSWORD_LENGTH]; time_t ltime; //todo: use monotonic time time(&ltime); RSA_private_decrypt(link->tiTicketing.rsa_size, link->tiTicketing.encrypted_ticket.e...
18,934,837,448,161,983,000,000,000,000,000,000,000
reds.c
322,336,886,463,452,100,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4282
Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
https://nvd.nist.gov/vuln/detail/CVE-2013-4282
10,748
qemu
eea750a5623ddac7a61982eec8f1c93481857578
https://github.com/bonzini/qemu
http://git.qemu.org/?p=qemu.git;a=commit;h=eea750a5623ddac7a61982eec8f1c93481857578
virtio-net: out-of-bounds buffer write on invalid state load CVE-2013-4150 QEMU 1.5.0 out-of-bounds buffer write in virtio_net_load()@hw/net/virtio-net.c This code is in hw/net/virtio-net.c: if (n->max_queues > 1) { if (n->max_queues != qemu_get_be16(f)) { error_report("virtio-net: different ...
1
static int virtio_net_load(QEMUFile *f, void *opaque, int version_id) { VirtIONet *n = opaque; VirtIODevice *vdev = VIRTIO_DEVICE(n); int ret, i, link_down; if (version_id < 2 || version_id > VIRTIO_NET_VM_VERSION) return -EINVAL; ret = virtio_load(vdev, f); if (ret) { return r...
279,963,136,302,441,130,000,000,000,000,000,000,000
virtio-net.c
191,493,264,050,525,200,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4150
The virtio_net_load function in hw/net/virtio-net.c in QEMU 1.5.0 through 1.7.x before 1.7.2 allows remote attackers to cause a denial of service or possibly execute arbitrary code via vectors in which the value of curr_queues is greater than max_queues, which triggers an out-of-bounds write.
https://nvd.nist.gov/vuln/detail/CVE-2013-4150
10,749
Espruino
bed844f109b6c222816740555068de2e101e8018
https://github.com/espruino/Espruino
https://github.com/espruino/Espruino/commit/bed844f109b6c222816740555068de2e101e8018
remove strncpy usage as it's effectively useless, replace with an assertion since fn is only used internally (fix #1426)
1
void jslTokenAsString(int token, char *str, size_t len) { // see JS_ERROR_TOKEN_BUF_SIZE if (token>32 && token<128) { assert(len>=4); str[0] = '\''; str[1] = (char)token; str[2] = '\''; str[3] = 0; return; } switch (token) { case LEX_EOF : strncpy(str, "EOF", len); return; case LEX_...
335,155,697,690,853,050,000,000,000,000,000,000,000
jslex.c
202,131,620,748,012,570,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2018-11593
Espruino before 1.99 allows attackers to cause a denial of service (application crash) and potential Information Disclosure with a user crafted input file via a Buffer Overflow during syntax parsing because strncpy is misused in jslex.c.
https://nvd.nist.gov/vuln/detail/CVE-2018-11593
10,751
radare2
52b1526443c1f433087928291d1c3d37a5600515
https://github.com/radare/radare2
https://github.com/radare/radare2/commit/52b1526443c1f433087928291d1c3d37a5600515
Fix crash in wasm disassembler
1
int wasm_dis(WasmOp *op, const unsigned char *buf, int buf_len) { op->len = 1; op->op = buf[0]; if (op->op > 0xbf) return 1; // add support for extension opcodes (SIMD + atomics) WasmOpDef *opdef = &opcodes[op->op]; switch (op->op) { case WASM_OP_TRAP: case WASM_OP_NOP: case WASM_OP_ELSE: case WASM_OP_RETURN:...
197,820,120,957,265,730,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2017-15368
The wasm_dis function in libr/asm/arch/wasm/wasm.c in radare2 2.0.0 allows remote attackers to cause a denial of service (stack-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted WASM file that triggers an incorrect r_hex_bin2str call.
https://nvd.nist.gov/vuln/detail/CVE-2017-15368
10,752
poppler
b1026b5978c385328f2a15a2185c599a563edf91
https://github.com/freedesktop/poppler
https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=b1026b5978c385328f2a15a2185c599a563edf91
Initialize refLine totally Fixes uninitialized memory read in 1004.pdf.asan.7.3
1
int CCITTFaxStream::lookChar() { int code1, code2, code3; int b1i, blackPixels, i, bits; GBool gotEOL; if (buf != EOF) { return buf; } // read the next row if (outputBits == 0) { // if at eof just return EOF if (eof) { return EOF; } err = gFalse; // 2-D encoding if (...
280,129,395,979,896,770,000,000,000,000,000,000,000
Stream.cc
138,337,928,539,390,720,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-1790
poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function.
https://nvd.nist.gov/vuln/detail/CVE-2013-1790
10,753
radare2
224e6bc13fa353dd3b7f7a2334588f1c4229e58d
https://github.com/radare/radare2
https://github.com/radare/radare2/commit/224e6bc13fa353dd3b7f7a2334588f1c4229e58d
Fix #10296 - Heap out of bounds read in java_switch_op()
1
static int java_switch_op(RAnal *anal, RAnalOp *op, ut64 addr, const ut8 *data, int len) { ut8 op_byte = data[0]; ut64 offset = addr - java_get_method_start (); ut8 pos = (offset+1)%4 ? 1 + 4 - (offset+1)%4 : 1; if (op_byte == 0xaa) { // handle a table switch condition if (pos + 8 > len) { return op->size; ...
287,953,916,860,564,700,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2018-12321
There is a heap out of bounds read in radare2 2.6.0 in java_switch_op() in libr/anal/p/anal_java.c via a crafted Java binary file.
https://nvd.nist.gov/vuln/detail/CVE-2018-12321
10,754
radare2
66191f780863ea8c66ace4040d0d04a8842e8432
https://github.com/radare/radare2
https://github.com/radare/radare2/commit/66191f780863ea8c66ace4040d0d04a8842e8432
Fix #12239 - crash in the x86.nz assembler ##asm (#12252)
1
static x86newTokenType getToken(const char *str, size_t *begin, size_t *end) { // Skip whitespace while (begin && isspace ((ut8)str[*begin])) { ++(*begin); } if (!str[*begin]) { // null byte *end = *begin; return TT_EOF; } else if (isalpha ((ut8)str[*begin])) { // word token *end = *begin...
263,590,908,712,476,940,000,000,000,000,000,000,000
asm_x86_nz.c
190,202,613,220,381,800,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-19842
getToken in libr/asm/p/asm_x86_nz.c in radare2 before 3.1.0 allows attackers to cause a denial of service (stack-based buffer over-read) via crafted x86 assembly data, as demonstrated by rasm2.
https://nvd.nist.gov/vuln/detail/CVE-2018-19842
10,755
libav
58b2e0f0f2fc96c1158e04f8aba95cbe6157a1a3
https://github.com/libav/libav
https://git.libav.org/?p=libav.git;a=commit;h=58b2e0f0f2fc96c1158e04f8aba95cbe6157a1a3
vqavideo: return error if image size is not a multiple of block size The decoder assumes in various places that the image size is a multiple of the block size, and there is no obvious way to support odd sizes. Bailing out early if the header specifies a bad size avoids various errors later on. Fixes CVE-2012-0947. ...
1
static av_cold int vqa_decode_init(AVCodecContext *avctx) { VqaContext *s = avctx->priv_data; int i, j, codebook_index; s->avctx = avctx; avctx->pix_fmt = PIX_FMT_PAL8; /* make sure the extradata made it */ if (s->avctx->extradata_size != VQA_HEADER_SIZE) { av_log(s->avctx, AV_LOG_ERRO...
165,589,397,962,084,270,000,000,000,000,000,000,000
vqavideo.c
257,245,612,007,333,320,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2012-0947
Heap-based buffer overflow in the vqa_decode_chunk function in the VQA codec (vqavideo.c) in libavcodec in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.6, and 0.8.x before 0.8.2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted VQA media fil...
https://nvd.nist.gov/vuln/detail/CVE-2012-0947
10,756
WavPack
070ef6f138956d9ea9612e69586152339dbefe51
https://github.com/dbry/WavPack
https://github.com/dbry/WavPack/commit/070ef6f138956d9ea9612e69586152339dbefe51
issue #53: error out on zero sample rate
1
int WavpackSetConfiguration64 (WavpackContext *wpc, WavpackConfig *config, int64_t total_samples, const unsigned char *chan_ids) { uint32_t flags, bps = 0; uint32_t chan_mask = config->channel_mask; int num_chans = config->num_channels; int i; wpc->stream_version = (config->flags & CONFIG_COMPATIBL...
37,881,151,474,472,780,000,000,000,000,000,000,000
pack_utils.c
140,559,045,431,218,750,000,000,000,000,000,000,000
[ "CWE-835" ]
CVE-2018-19840
The function WavpackPackInit in pack_utils.c in libwavpack.a in WavPack through 5.1.0 allows attackers to cause a denial-of-service (resource exhaustion caused by an infinite loop) via a crafted wav audio file because WavpackSetConfiguration64 mishandles a sample rate of zero.
https://nvd.nist.gov/vuln/detail/CVE-2018-19840
10,757
FFmpeg
8df6884832ec413cf032dfaa45c23b1c7876670c
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/8df6884832ec413cf032dfaa45c23b1c7876670c
avcodec/utils: Check close before calling it Fixes: NULL pointer dereference Fixes: 15733/clusterfuzz-testcase-minimized-ffmpeg_AV_CODEC_ID_IDF_fuzzer-5658616977162240 Reviewed-by: Paul B Mahol <onemda@gmail.com> Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/projects/ffmpeg Signe...
1
int attribute_align_arg avcodec_open2(AVCodecContext *avctx, const AVCodec *codec, AVDictionary **options) { int ret = 0; int codec_init_ok = 0; AVDictionary *tmp = NULL; const AVPixFmtDescriptor *pixdesc; if (avcodec_is_open(avctx)) return 0; if ((!codec && !avctx->codec)) { a...
186,955,190,953,485,440,000,000,000,000,000,000,000
utils.c
36,691,661,158,649,837,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2019-17539
In FFmpeg before 4.2, avcodec_open2 in libavcodec/utils.c allows a NULL pointer dereference and possibly unspecified other impact when there is no valid close function pointer.
https://nvd.nist.gov/vuln/detail/CVE-2019-17539
10,758
faad2
942c3e0aee748ea6fe97cb2c1aa5893225316174
https://github.com/knik0/faad2
https://github.com/knik0/faad2/commit/942c3e0aee748ea6fe97cb2c1aa5893225316174
Fix a couple buffer overflows https://hackerone.com/reports/502816 https://hackerone.com/reports/507858 https://github.com/videolan/vlc/blob/master/contrib/src/faad2/faad2-fix-overflows.patch
1
void faad_resetbits(bitfile *ld, int bits) { uint32_t tmp; int words = bits >> 5; int remainder = bits & 0x1F; ld->bytes_left = ld->buffer_size - words*4; if (ld->bytes_left >= 4) { tmp = getdword(&ld->start[words]); ld->bytes_left -= 4; } else { tmp = getdword_n(&l...
41,758,919,436,567,693,000,000,000,000,000,000,000
bits.c
144,039,870,893,866,260,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2019-15296
An issue was discovered in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.8. The faad_resetbits function in libfaad/bits.c is affected by a buffer overflow vulnerability. The number of bits to be read is determined by ld->buffer_size - words*4, cast to uint32. If ld->buffer_size - words*4 is negative, a buffer overflow ...
https://nvd.nist.gov/vuln/detail/CVE-2019-15296
10,760
poppler
8b6dc55e530b2f5ede6b9dfb64aafdd1d5836492
https://github.com/freedesktop/poppler
https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=8b6dc55e530b2f5ede6b9dfb64aafdd1d5836492
Fix invalid memory access in 1150.pdf.asan.8.69
1
SplashPath *Splash::makeDashedPath(SplashPath *path) { SplashPath *dPath; SplashCoord lineDashTotal; SplashCoord lineDashStartPhase, lineDashDist, segLen; SplashCoord x0, y0, x1, y1, xa, ya; GBool lineDashStartOn, lineDashOn, newPath; int lineDashStartIdx, lineDashIdx; int i, j, k; lineDashTotal = 0; ...
112,288,227,865,298,480,000,000,000,000,000,000,000
Splash.cc
318,374,184,463,754,600,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-1788
poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors that trigger an "invalid memory access" in (1) splash/Splash.cc, (2) poppler/Function.cc, and (3) poppler/Stream.cc.
https://nvd.nist.gov/vuln/detail/CVE-2013-1788
10,761
capstone
87a25bb543c8e4c09b48d4b4a6c7db31ce58df06
https://github.com/aquynh/capstone
https://github.com/aquynh/capstone/commit/87a25bb543c8e4c09b48d4b4a6c7db31ce58df06
x86: fast path checking for X86_insn_reg_intel()
1
x86_reg X86_insn_reg_intel(unsigned int id, enum cs_ac_type *access) { unsigned int first = 0; unsigned int last = ARR_SIZE(insn_regs_intel) - 1; unsigned int mid = ARR_SIZE(insn_regs_intel) / 2; if (!intel_regs_sorted) { memcpy(insn_regs_intel_sorted, insn_regs_intel, sizeof(insn_regs_intel_sorted)); qsor...
314,014,179,055,219,480,000,000,000,000,000,000,000
X86Mapping.c
223,710,474,603,118,000,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2016-7151
Capstone 3.0.4 has an out-of-bounds vulnerability (SEGV caused by a read memory access) in X86_insn_reg_intel in arch/X86/X86Mapping.c.
https://nvd.nist.gov/vuln/detail/CVE-2016-7151
10,762
FFmpeg
ed22dc22216f74c75ee7901f82649e1ff725ba50
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/ed22dc22216f74c75ee7901f82649e1ff725ba50
avformat/movenc: Check that frame_types other than EAC3_FRAME_TYPE_INDEPENDENT have a supported substream id Fixes: out of array access Fixes: ffmpeg_bof_1.avi Found-by: Thuan Pham, Marcel Böhme, Andrew Santosa and Alexandru Razvan Caciulescu with AFLSmart Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
1
static int handle_eac3(MOVMuxContext *mov, AVPacket *pkt, MOVTrack *track) { AC3HeaderInfo *hdr = NULL; struct eac3_info *info; int num_blocks, ret; if (!track->eac3_priv && !(track->eac3_priv = av_mallocz(sizeof(*info)))) return AVERROR(ENOMEM); info = track->eac3_priv; if (avpriv_ac3...
94,813,621,897,229,420,000,000,000,000,000,000,000
movenc.c
10,914,575,145,131,144,000,000,000,000,000,000,000
[ "CWE-129" ]
CVE-2018-13302
In FFmpeg 4.0.1, improper handling of frame types (other than EAC3_FRAME_TYPE_INDEPENDENT) that have multiple independent substreams in the handle_eac3 function in libavformat/movenc.c may trigger an out-of-array access while converting a crafted AVI file to MPEG4, leading to a denial of service or possibly unspecified...
https://nvd.nist.gov/vuln/detail/CVE-2018-13302
10,763
virglrenderer
6eb13f7a2dcf391ec9e19b4c2a79e68305f63c22
https://gitlab.freedesktop.org/virgl/virglrenderer
https://cgit.freedesktop.org/virglrenderer/commit/?id=6eb13f7a2dcf391ec9e19b4c2a79e68305f63c22
vrend: fix memory leak in int blit context The 'blit_ctx->initialised' is not setted to true. Every time init blit context, it will create a new 'blit_ctx->gl_context' thus causing a memory leak. This patch avoid this. Signed-off-by: Li Qiang <liq3ea@gmail.com> Signed-off-by: Dave Airlie <airlied@redhat.com>
1
static void vrend_renderer_init_blit_ctx(struct vrend_blitter_ctx *blit_ctx) { struct virgl_gl_ctx_param ctx_params; int i; if (blit_ctx->initialised) { vrend_clicbs->make_current(0, blit_ctx->gl_context); return; } ctx_params.shared = true; ctx_params.major_ver = VREND_GL_VER_MAJOR; c...
81,858,904,308,721,850,000,000,000,000,000,000,000
vrend_blitter.c
269,551,575,942,070,470,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2017-5993
Memory leak in the vrend_renderer_init_blit_ctx function in vrend_blitter.c in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (host memory consumption) via a large number of VIRGL_CCMD_BLIT commands.
https://nvd.nist.gov/vuln/detail/CVE-2017-5993
10,764
radare2
ad55822430a03fe075221b543efb434567e9e431
https://github.com/radare/radare2
https://github.com/radare/radare2/commit/ad55822430a03fe075221b543efb434567e9e431
Fix #6836 - oob write in dex
1
static void dex_parse_debug_item(RBinFile *binfile, RBinDexObj *bin, RBinDexClass *c, int MI, int MA, int paddr, int ins_size, int insns_size, char *class_name, int regsz, int debug_info_off) { struct r_bin_t *rbin = binfile->rbin; const ut8 *p4 = r_buf_get_at (binfile->buf, debug_info_off, NULL); ...
248,508,498,085,489,930,000,000,000,000,000,000,000
bin_dex.c
330,647,830,799,263,530,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2017-6319
The dex_parse_debug_item function in libr/bin/p/bin_dex.c in radare2 1.2.1 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted DEX file.
https://nvd.nist.gov/vuln/detail/CVE-2017-6319
10,765
qemu
0be839a2701369f669532ea5884c15bead1c6e08
https://github.com/bonzini/qemu
http://git.qemu.org/?p=qemu.git;a=commit;h=0be839a2701369f669532ea5884c15bead1c6e08
migration: fix parameter validation on ram load During migration, the values read from migration stream during ram load are not validated. Especially offset in host_from_stream_offset() and also the length of the writes in the callers of said function. To fix this, we need to make sure that the [offset, offset + leng...
1
static inline void *host_from_stream_offset(QEMUFile *f, ram_addr_t offset, int flags) { static RAMBlock *block = NULL; char id[256]; uint8_t len; if (flags & RAM_SAVE_FLAG_CONTINUE) { if (!block) { ...
210,208,517,146,366,460,000,000,000,000,000,000,000
arch_init.c
288,153,132,893,003,240,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2014-7840
The host_from_stream_offset function in arch_init.c in QEMU, when loading RAM during migration, allows remote attackers to execute arbitrary code via a crafted (1) offset or (2) length value in savevm data.
https://nvd.nist.gov/vuln/detail/CVE-2014-7840
10,766
qemu
362786f14a753d8a5256ef97d7c10ed576d6572b
https://github.com/bonzini/qemu
https://git.qemu.org/?p=qemu.git;a=commitdiff;h=362786f14a753d8a5256ef97d7c10ed576d6572b
net: check packet payload length While computing IP checksum, 'net_checksum_calculate' reads payload length from the packet. It could exceed the given 'data' buffer size. Add a check to avoid it. Reported-by: Liu Ling <liuling-it@360.cn> Signed-off-by: Prasad J Pandit <pjp@fedoraproject.org> Signed-off-by: Jason Wang...
1
void net_checksum_calculate(uint8_t *data, int length) { int hlen, plen, proto, csum_offset; uint16_t csum; if ((data[14] & 0xf0) != 0x40) return; /* not IPv4 */ hlen = (data[14] & 0x0f) * 4; plen = (data[16] << 8 | data[17]) - hlen; proto = data[23]; switch (proto) { case PROTO_TCP...
8,961,402,814,564,434,000,000,000,000,000,000,000
checksum.c
322,468,048,645,822,800,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-2857
The net_checksum_calculate function in net/checksum.c in QEMU allows local guest OS users to cause a denial of service (out-of-bounds heap read and crash) via the payload length in a crafted packet.
https://nvd.nist.gov/vuln/detail/CVE-2016-2857
10,767
qemu
ead7a57df37d2187813a121308213f41591bd811
https://github.com/bonzini/qemu
http://git.qemu.org/?p=qemu.git;a=commit;h=ead7a57df37d2187813a121308213f41591bd811
ssd0323: fix buffer overun on invalid state load CVE-2013-4538 s->cmd_len used as index in ssd0323_transfer() to store 32-bit field. Possible this field might then be supplied by guest to overwrite a return addr somewhere. Same for row/col fields, which are indicies into framebuffer array. To fix validate after load...
1
static int ssd0323_load(QEMUFile *f, void *opaque, int version_id) { SSISlave *ss = SSI_SLAVE(opaque); ssd0323_state *s = (ssd0323_state *)opaque; int i; if (version_id != 1) return -EINVAL; s->cmd_len = qemu_get_be32(f); s->cmd = qemu_get_be32(f); for (i = 0; i < 8; i++) s...
195,120,517,621,946,700,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2013-4538
Multiple buffer overflows in the ssd0323_load function in hw/display/ssd0323.c in QEMU before 1.7.2 allow remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via crafted (1) cmd_len, (2) row, or (3) col values; (4) row_start and row_end values; or (5) col_star and col_en...
https://nvd.nist.gov/vuln/detail/CVE-2013-4538
10,768
capstone
6fe86eef621b9849f51a5e1e5d73258a93440403
https://github.com/aquynh/capstone
https://github.com/aquynh/capstone/commit/6fe86eef621b9849f51a5e1e5d73258a93440403
provide a validity check to prevent against Integer overflow conditions (#870) * provide a validity check to prevent against Integer overflow conditions * fix some style issues.
1
void * CAPSTONE_API cs_winkernel_malloc(size_t size) { // Disallow zero length allocation because they waste pool header space and, // in many cases, indicate a potential validation issue in the calling code. NT_ASSERT(size); // FP; a use of NonPagedPool is required for Windows 7 support #pragma prefast(suppress :...
132,932,202,241,765,970,000,000,000,000,000,000,000
None
null
[ "CWE-190" ]
CVE-2017-6952
Integer overflow in the cs_winkernel_malloc function in winkernel_mm.c in Capstone 3.0.4 and earlier allows attackers to cause a denial of service (heap-based buffer overflow in a kernel driver) or possibly have unspecified other impact via a large value.
https://nvd.nist.gov/vuln/detail/CVE-2017-6952
10,769
netdata
92327c9ec211bd1616315abcb255861b130b97ca
https://github.com/netdata/netdata
https://github.com/netdata/netdata/commit/92327c9ec211bd1616315abcb255861b130b97ca
fixed vulnerabilities identified by red4sec.com (#4521)
1
inline int web_client_api_request_v1_data(RRDHOST *host, struct web_client *w, char *url) { debug(D_WEB_CLIENT, "%llu: API v1 data with URL '%s'", w->id, url); int ret = 400; BUFFER *dimensions = NULL; buffer_flush(w->response.data); char *google_version = "0.6", *google_reqId = "0...
53,029,324,079,806,850,000,000,000,000,000,000,000
web_api_v1.c
63,923,686,889,514,750,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2018-18839
An issue was discovered in Netdata 1.10.0. Full Path Disclosure (FPD) exists via api/v1/alarms. NOTE: the vendor says "is intentional.
https://nvd.nist.gov/vuln/detail/CVE-2018-18839
10,771
Espruino
c36d30529118aa049797db43f111ddad468aad29
https://github.com/espruino/Espruino
https://github.com/espruino/Espruino/commit/c36d30529118aa049797db43f111ddad468aad29
Fix stack overflow if void void void... is repeated many times (fix #1434)
1
NO_INLINE JsVar *jspeFactor() { if (lex->tk==LEX_ID) { JsVar *a = jspGetNamedVariable(jslGetTokenValueAsString(lex)); JSP_ASSERT_MATCH(LEX_ID); #ifndef SAVE_ON_FLASH if (lex->tk==LEX_TEMPLATE_LITERAL) jsExceptionHere(JSET_SYNTAXERROR, "Tagged template literals not supported"); else if (lex->tk==...
59,713,758,321,053,350,000,000,000,000,000,000,000
jsparse.c
60,267,210,341,651,270,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-11594
Espruino before 1.99 allows attackers to cause a denial of service (application crash) with a user crafted input file via a Buffer Overflow during syntax parsing of "VOID" tokens in jsparse.c.
https://nvd.nist.gov/vuln/detail/CVE-2018-11594
10,772
poppler
39d140bfc0b8239bdd96d6a55842034ae5c05473
https://github.com/freedesktop/poppler
https://cgit.freedesktop.org/poppler/poppler/commit/?id=39d140bfc0b8239bdd96d6a55842034ae5c05473
Fix crash in broken pdf (code < 0) Found thanks to PDF provided by Joel Voss of Leviathan Security Group
1
void FoFiType1::parse() { char *line, *line1, *p, *p2; char buf[256]; char c; int n, code, i, j; char *tokptr; for (i = 1, line = (char *)file; i <= 100 && line && (!name || !encoding); ++i) { // get font name if (!name && !strncmp(line, "/FontName", 9)) { strncpy(buf, line, 25...
212,676,828,599,961,000,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2010-3704
The FoFiType1::parse function in fofi/FoFiType1.cc in the PDF parser in xpdf before 3.02pl5, poppler 0.8.7 and possibly other versions up to 0.15.1, kdegraphics, and possibly other products allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a PDF file with a ...
https://nvd.nist.gov/vuln/detail/CVE-2010-3704
10,773
qemu
bf25983345ca44aec3dd92c57142be45452bd38a
https://github.com/bonzini/qemu
https://git.qemu.org/?p=qemu.git;a=commit;h=bf25983345ca44aec3dd92c57142be45452bd38a
cirrus: don't overflow CirrusVGAState->cirrus_bltbuf This is CVE-2014-8106. Signed-off-by: Gerd Hoffmann <kraxel@redhat.com>
1
static bool blit_is_unsafe(struct CirrusVGAState *s) { /* should be the case, see cirrus_bitblt_start */ assert(s->cirrus_blt_width > 0); assert(s->cirrus_blt_height > 0); if (blit_region_is_unsafe(s, s->cirrus_blt_dstpitch, s->cirrus_blt_dstaddr & s->cirrus_addr_mask)) { ...
24,989,570,285,750,455,000,000,000,000,000,000,000
cirrus_vga.c
74,911,260,684,549,020,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2014-8106
Heap-based buffer overflow in the Cirrus VGA emulator (hw/display/cirrus_vga.c) in QEMU before 2.2.0 allows local guest users to execute arbitrary code via vectors related to blit regions. NOTE: this vulnerability exists because an incomplete fix for CVE-2007-1320.
https://nvd.nist.gov/vuln/detail/CVE-2014-8106
10,774
poppler
957aa252912cde85d76c41e9710b33425a82b696
https://github.com/freedesktop/poppler
https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=957aa252912cde85d76c41e9710b33425a82b696
Fix invalid memory accesses in 1091.pdf.asan.72.42
1
void Splash::scaleMaskYdXu(SplashImageMaskSource src, void *srcData, int srcWidth, int srcHeight, int scaledWidth, int scaledHeight, SplashBitmap *dest) { Guchar *lineBuf; Guint *pixBuf; Guint pix; Guchar *destPtr; int yp, yq, xp, xq, yt, y, yStep, xt, x, xStep, d; int i, j; // Bresenha...
313,979,367,089,057,100,000,000,000,000,000,000,000
Splash.cc
186,046,208,096,924,120,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-1788
poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors that trigger an "invalid memory access" in (1) splash/Splash.cc, (2) poppler/Function.cc, and (3) poppler/Stream.cc.
https://nvd.nist.gov/vuln/detail/CVE-2013-1788
10,775
file
6f737ddfadb596d7d4a993f7ed2141ffd664a81c
https://github.com/file/file
https://github.com/file/file/commit/6f737ddfadb596d7d4a993f7ed2141ffd664a81c
- reduce recursion level from 20 to 10 and make a symbolic constant for it. - pull out the guts of saving and restoring the output buffer into functions and take care not to overwrite the error message if an error happened.
1
private int mget(struct magic_set *ms, const unsigned char *s, struct magic *m, size_t nbytes, size_t o, unsigned int cont_level, int mode, int text, int flip, int recursion_level, int *printed_something, int *need_separator, int *returnval) { uint32_t soffset, offset = ms->offset; uint32_t lhs; int rv,...
260,682,246,970,550,750,000,000,000,000,000,000,000
softmagic.c
241,208,425,722,088,000,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2014-8117
softmagic.c in file before 5.21 does not properly limit recursion, which allows remote attackers to cause a denial of service (CPU consumption or crash) via unspecified vectors.
https://nvd.nist.gov/vuln/detail/CVE-2014-8117
10,776
samba
d724f835acb9f4886c0001af32cd325dbbf1f895
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=d724f835acb9f4886c0001af32cd325dbbf1f895
CVE-2015-5296: s3:libsmb: force signing when requiring encryption in do_connect() BUG: https://bugzilla.samba.org/show_bug.cgi?id=11536 Signed-off-by: Stefan Metzmacher <metze@samba.org> Reviewed-by: Jeremy Allison <jra@samba.org>
1
static NTSTATUS do_connect(TALLOC_CTX *ctx, const char *server, const char *share, const struct user_auth_info *auth_info, bool show_sessetup, bool force_encrypt, int max_protocol, int port, int name_type, struct cli_state **pcli) { struct cli_state *c = NULL; char *servic...
102,913,365,890,764,230,000,000,000,000,000,000,000
clidfs.c
69,981,830,403,477,720,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2015-5296
Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3 supports connections that are encrypted but unsigned, which allows man-in-the-middle attackers to conduct encrypted-to-unencrypted downgrade attacks by modifying the client-server data stream, related to clidfs.c, libsmb_server.c, and smbXcli_b...
https://nvd.nist.gov/vuln/detail/CVE-2015-5296
10,777
linux
8605330aac5a5785630aec8f64378a54891937cc
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/8605330aac5a5785630aec8f64378a54891937cc
tcp: fix SCM_TIMESTAMPING_OPT_STATS for normal skbs __sock_recv_timestamp can be called for both normal skbs (for receive timestamps) and for skbs on the error queue (for transmit timestamps). Commit 1c885808e456 (tcp: SOF_TIMESTAMPING_OPT_STATS option for SO_TIMESTAMPING) assumes any skb passed to __sock_recv_timest...
1
void __sock_recv_timestamp(struct msghdr *msg, struct sock *sk, struct sk_buff *skb) { int need_software_tstamp = sock_flag(sk, SOCK_RCVTSTAMP); struct scm_timestamping tss; int empty = 1; struct skb_shared_hwtstamps *shhwtstamps = skb_hwtstamps(skb); /* Race occurred between timestamp enabling and packet ...
161,777,901,395,312,220,000,000,000,000,000,000,000
socket.c
60,698,745,955,753,130,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-7277
The TCP stack in the Linux kernel through 4.10.6 mishandles the SCM_TIMESTAMPING_OPT_STATS feature, which allows local users to obtain sensitive information from the kernel's internal socket data structures or cause a denial of service (out-of-bounds read) via crafted system calls, related to net/core/skbuff.c and net/...
https://nvd.nist.gov/vuln/detail/CVE-2017-7277
10,778
linux
8605330aac5a5785630aec8f64378a54891937cc
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/8605330aac5a5785630aec8f64378a54891937cc
tcp: fix SCM_TIMESTAMPING_OPT_STATS for normal skbs __sock_recv_timestamp can be called for both normal skbs (for receive timestamps) and for skbs on the error queue (for transmit timestamps). Commit 1c885808e456 (tcp: SOF_TIMESTAMPING_OPT_STATS option for SO_TIMESTAMPING) assumes any skb passed to __sock_recv_timest...
1
*/ int sock_queue_err_skb(struct sock *sk, struct sk_buff *skb) { if (atomic_read(&sk->sk_rmem_alloc) + skb->truesize >= (unsigned int)sk->sk_rcvbuf) return -ENOMEM; skb_orphan(skb); skb->sk = sk; skb->destructor = sock_rmem_free; atomic_add(skb->truesize, &sk->sk_rmem_alloc); /* before exiting rcu sect...
339,241,323,239,055,800,000,000,000,000,000,000,000
skbuff.c
201,914,970,725,584,370,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-7277
The TCP stack in the Linux kernel through 4.10.6 mishandles the SCM_TIMESTAMPING_OPT_STATS feature, which allows local users to obtain sensitive information from the kernel's internal socket data structures or cause a denial of service (out-of-bounds read) via crafted system calls, related to net/core/skbuff.c and net/...
https://nvd.nist.gov/vuln/detail/CVE-2017-7277
10,780
radare2
9d348bcc2c4bbd3805e7eec97b594be9febbdf9a
https://github.com/radare/radare2
https://github.com/radare/radare2/commit/9d348bcc2c4bbd3805e7eec97b594be9febbdf9a
Fix #9943 - Invalid free on RAnal.avr
1
INST_HANDLER (cpse) { // CPSE Rd, Rr int r = (buf[0] & 0xf) | ((buf[1] & 0x2) << 3); int d = ((buf[0] >> 4) & 0xf) | ((buf[1] & 0x1) << 4); RAnalOp next_op; // calculate next instruction size (call recursively avr_op_analyze) // and free next_op's esil string (we dont need it now) avr_op_analyze (anal, &next_...
109,446,500,842,023,420,000,000,000,000,000,000,000
anal_avr.c
49,931,515,066,285,090,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2018-11383
The r_strbuf_fini() function in radare2 2.5.0 allows remote attackers to cause a denial of service (invalid free and application crash) via a crafted ELF file because of an uninitialized variable in the CPSE handler in libr/anal/p/anal_avr.c.
https://nvd.nist.gov/vuln/detail/CVE-2018-11383
10,781
exim
5b7a7c051c9ab9ee7c924a611f90ef2be03e0ad0
https://github.com/Exim/exim
https://git.exim.org/exim.git/commitdiff/5b7a7c051c9ab9ee7c924a611f90ef2be03e0ad0
SECURITY: DMARC uses From header untrusted data CVE-2014-2957 To find the sending domain, expand_string() was used to directly parse the contents of the From header. This passes untrusted data directly into an internal function. Convert to use standard internal parsing functions.
1
int dmarc_process() { int sr, origin; /* used in SPF section */ int dmarc_spf_result = 0; /* stores spf into dmarc conn ctx */ pdkim_signature *sig = NULL; BOOL has_dmarc_record = TRUE; u_char **ruf; /* forensic report addressees, if called for */ /* ACLs have "control=dmarc_disabl...
164,959,432,179,770,350,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2014-2957
The dmarc_process function in dmarc.c in Exim before 4.82.1, when EXPERIMENTAL_DMARC is enabled, allows remote attackers to execute arbitrary code via the From header in an email, which is passed to the expand_string function.
https://nvd.nist.gov/vuln/detail/CVE-2014-2957
10,782
qemu
e95c9a493a5a8d6f969e86c9f19f80ffe6587e19
https://github.com/bonzini/qemu
http://git.qemu.org/?p=qemu.git;a=commit;h=e95c9a493a5a8d6f969e86c9f19f80ffe6587e19
9pfs: fix potential host memory leak in v9fs_read In 9pfs read dispatch function, it doesn't free two QEMUIOVector object thus causing potential memory leak. This patch avoid this. Signed-off-by: Li Qiang <liqiang6-s@360.cn> Signed-off-by: Greg Kurz <groug@kaod.org>
1
static void v9fs_read(void *opaque) { int32_t fid; uint64_t off; ssize_t err = 0; int32_t count = 0; size_t offset = 7; uint32_t max_count; V9fsFidState *fidp; V9fsPDU *pdu = opaque; V9fsState *s = pdu->s; err = pdu_unmarshal(pdu, offset, "dqd", &fid, &off, &max_count); if (...
163,413,897,778,522,470,000,000,000,000,000,000,000
9p.c
169,354,661,467,446,540,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2016-8577
Memory leak in the v9fs_read function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) via vectors related to an I/O read operation.
https://nvd.nist.gov/vuln/detail/CVE-2016-8577
10,783
WavPack
f68a9555b548306c5b1ee45199ccdc4a16a6101b
https://github.com/dbry/WavPack
https://github.com/dbry/WavPack/commit/f68a9555b548306c5b1ee45199ccdc4a16a6101b
issue #66: make sure CAF files have a "desc" chunk
1
int ParseCaffHeaderConfig (FILE *infile, char *infilename, char *fourcc, WavpackContext *wpc, WavpackConfig *config) { uint32_t chan_chunk = 0, channel_layout = 0, bcount; unsigned char *channel_identities = NULL; unsigned char *channel_reorder = NULL; int64_t total_samples = 0, infilesize; CAFFileH...
118,572,273,366,970,060,000,000,000,000,000,000,000
caff.c
128,333,408,347,865,570,000,000,000,000,000,000,000
[ "CWE-665" ]
CVE-2019-1010317
WavPack 5.1.0 and earlier is affected by: CWE-457: Use of Uninitialized Variable. The impact is: Unexpected control flow, crashes, and segfaults. The component is: ParseCaffHeaderConfig (caff.c:486). The attack vector is: Maliciously crafted .wav file. The fixed version is: After commit https://github.com/dbry/WavPack/...
https://nvd.nist.gov/vuln/detail/CVE-2019-1010317
10,784
linux
a0ad220c96692eda76b2e3fd7279f3dcd1d8a8ff
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a0ad220c96692eda76b2e3fd7279f3dcd1d8a8ff
Input: ims-pcu - sanity check against missing interfaces A malicious device missing interface can make the driver oops. Add sanity checking. Signed-off-by: Oliver Neukum <ONeukum@suse.com> CC: stable@vger.kernel.org Signed-off-by: Dmitry Torokhov <dmitry.torokhov@gmail.com>
1
static int ims_pcu_parse_cdc_data(struct usb_interface *intf, struct ims_pcu *pcu) { const struct usb_cdc_union_desc *union_desc; struct usb_host_interface *alt; union_desc = ims_pcu_get_cdc_union_desc(intf); if (!union_desc) return -EINVAL; pcu->ctrl_intf = usb_ifnum_to_if(pcu->udev, union_desc->bMaste...
77,222,324,192,872,990,000,000,000,000,000,000,000
ims-pcu.c
301,299,678,614,062,960,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2016-3689
The ims_pcu_parse_cdc_data function in drivers/input/misc/ims-pcu.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (system crash) via a USB device without both a master and a slave interface.
https://nvd.nist.gov/vuln/detail/CVE-2016-3689
10,785
WavPack
4bc05fc490b66ef2d45b1de26abf1455b486b0dc
https://github.com/dbry/WavPack
https://github.com/dbry/WavPack/commit/4bc05fc490b66ef2d45b1de26abf1455b486b0dc
fixes for 4 fuzz failures posted to SourceForge mailing list
1
static int read_new_config_info (WavpackContext *wpc, WavpackMetadata *wpmd) { int bytecnt = wpmd->byte_length; unsigned char *byteptr = wpmd->data; wpc->version_five = 1; // just having this block signals version 5.0 wpc->file_format = wpc->config.qmode = wpc->channel_layout = 0; if (wpc->c...
84,954,385,767,670,320,000,000,000,000,000,000,000
open_utils.c
316,363,060,510,470,100,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2016-10171
The unreorder_channels function in cli/wvunpack.c in Wavpack before 5.1.0 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted WV file.
https://nvd.nist.gov/vuln/detail/CVE-2016-10171
10,786
WavPack
4bc05fc490b66ef2d45b1de26abf1455b486b0dc
https://github.com/dbry/WavPack
https://github.com/dbry/WavPack/commit/4bc05fc490b66ef2d45b1de26abf1455b486b0dc
fixes for 4 fuzz failures posted to SourceForge mailing list
1
int32_t FASTCALL get_word (WavpackStream *wps, int chan, int32_t *correction) { register struct entropy_data *c = wps->w.c + chan; uint32_t ones_count, low, mid, high; int32_t value; int sign; if (!wps->wvbits.ptr) return WORD_EOF; if (correction) *correction = 0; if (!(wp...
189,954,028,957,454,100,000,000,000,000,000,000,000
read_words.c
32,055,560,853,634,266,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2016-10171
The unreorder_channels function in cli/wvunpack.c in Wavpack before 5.1.0 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted WV file.
https://nvd.nist.gov/vuln/detail/CVE-2016-10171
10,787
qemu
b53dd4495ced2432a0b652ea895e651d07336f7e
https://github.com/bonzini/qemu
https://git.qemu.org/?p=qemu.git;a=commit;h=b53dd4495ced2432a0b652ea895e651d07336f7e
usb:xhci:fix memory leak in usb_xhci_exit If the xhci uses msix, it doesn't free the corresponding memory, thus leading a memory leak. This patch avoid this. Signed-off-by: Li Qiang <liqiang6-s@360.cn> Message-id: 57d7d2e0.d4301c0a.d13e9.9a55@mx.google.com Signed-off-by: Gerd Hoffmann <kraxel@redhat.com>
1
static void usb_xhci_exit(PCIDevice *dev) { int i; XHCIState *xhci = XHCI(dev); trace_usb_xhci_exit(); for (i = 0; i < xhci->numslots; i++) { xhci_disable_slot(xhci, i + 1); } if (xhci->mfwrap_timer) { timer_del(xhci->mfwrap_timer); timer_free(xhci->mfwrap_timer); ...
261,890,516,668,008,700,000,000,000,000,000,000,000
hcd-xhci.c
300,866,919,474,701,800,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2016-7466
Memory leak in the usb_xhci_exit function in hw/usb/hcd-xhci.c in QEMU (aka Quick Emulator), when the xhci uses msix, allows local guest OS administrators to cause a denial of service (memory consumption and possibly QEMU process crash) by repeatedly unplugging a USB device.
https://nvd.nist.gov/vuln/detail/CVE-2016-7466
10,788
libpcap
617b12c0339db4891d117b661982126c495439ea
https://github.com/the-tcpdump-group/libpcap
https://github.com/the-tcpdump-group/libpcap/commit/617b12c0339db4891d117b661982126c495439ea
Calculate the reply payload length in a local variable. Using the same variable for the remaining request length and the reply length is confusing at best and can cause errors at worst (if the request had extra stuff at the end, so that the variable is non-zero). This addresses Include Security issue I8: [libpcap] Re...
1
daemon_msg_findallif_req(uint8 ver, struct daemon_slpars *pars, uint32 plen) { char errbuf[PCAP_ERRBUF_SIZE]; // buffer for network errors char errmsgbuf[PCAP_ERRBUF_SIZE]; // buffer for errors to send to the client char sendbuf[RPCAP_NETBUF_SIZE]; // temporary buffer in which data to be sent is buffered int sendb...
300,816,215,695,720,580,000,000,000,000,000,000,000
daemon.c
30,742,645,121,715,390,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2019-15161
rpcapd/daemon.c in libpcap before 1.9.1 mishandles certain length values because of reuse of a variable. This may open up an attack vector involving extra data at the end of a request.
https://nvd.nist.gov/vuln/detail/CVE-2019-15161
10,789
qemu
4ffcdef4277a91af15a3c09f7d16af072c29f3f2
https://github.com/bonzini/qemu
http://git.qemu.org/?p=qemu.git;a=commit;h=4ffcdef4277a91af15a3c09f7d16af072c29f3f2
9pfs: xattr: fix memory leak in v9fs_list_xattr Free 'orig_value' in error path. Signed-off-by: Li Qiang <liqiang6-s@360.cn> Signed-off-by: Greg Kurz <groug@kaod.org>
1
ssize_t v9fs_list_xattr(FsContext *ctx, const char *path, void *value, size_t vsize) { ssize_t size = 0; void *ovalue = value; XattrOperations *xops; char *orig_value, *orig_value_start; ssize_t xattr_len, parsed_len = 0, attr_len; char *dirpath, *name; int dirfd; ...
296,947,472,346,732,770,000,000,000,000,000,000,000
9p-xattr.c
228,116,327,888,906,060,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2017-8086
Memory leak in the v9fs_list_xattr function in hw/9pfs/9p-xattr.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (memory consumption) via vectors involving the orig_value variable.
https://nvd.nist.gov/vuln/detail/CVE-2017-8086
10,790
libav
ce7aee9b733134649a6ce2fa743e51733f33e67e
https://github.com/libav/libav
https://git.libav.org/?p=libav.git;a=commit;h=ce7aee9b733134649a6ce2fa743e51733f33e67e
dpcm: ignore extra unpaired bytes in stereo streams. Fixes: CVE-2011-3951 Found-by: Mateusz "j00ru" Jurczyk and Gynvael Coldwind
1
static int dpcm_decode_frame(AVCodecContext *avctx, void *data, int *got_frame_ptr, AVPacket *avpkt) { const uint8_t *buf = avpkt->data; int buf_size = avpkt->size; const uint8_t *buf_end = buf + buf_size; DPCMContext *s = avctx->priv_data; int out = 0, ret; int pred...
37,165,043,090,743,030,000,000,000,000,000,000,000
dpcm.c
233,708,027,832,503,570,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2011-3951
The dpcm_decode_frame function in dpcm.c in libavcodec in FFmpeg before 0.10 and in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.6, and 0.8.x before 0.8.1 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted stereo stream in a media...
https://nvd.nist.gov/vuln/detail/CVE-2011-3951
10,791
linux
ea04efee7635c9120d015dcdeeeb6988130cb67a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ea04efee7635c9120d015dcdeeeb6988130cb67a
Input: ims-psu - check if CDC union descriptor is sane Before trying to use CDC union descriptor, try to validate whether that it is sane by checking that intf->altsetting->extra is big enough and that descriptor bLength is not too big and not too small. Reported-by: Andrey Konovalov <andreyknvl@google.com> Signed-of...
1
static const struct usb_cdc_union_desc * ims_pcu_get_cdc_union_desc(struct usb_interface *intf) { const void *buf = intf->altsetting->extra; size_t buflen = intf->altsetting->extralen; struct usb_cdc_union_desc *union_desc; if (!buf) { dev_err(&intf->dev, "Missing descriptor data\n"); return NULL; } if (!bu...
205,163,903,394,648,750,000,000,000,000,000,000,000
ims-pcu.c
276,473,746,066,141,500,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-16645
The ims_pcu_get_cdc_union_desc function in drivers/input/misc/ims-pcu.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (ims_pcu_parse_cdc_data out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device.
https://nvd.nist.gov/vuln/detail/CVE-2017-16645
10,792
gstreamer
566583e87147f774e7fc4c78b5f7e61d427e40a9
https://github.com/GStreamer/gstreamer
https://cgit.freedesktop.org/gstreamer/gst-plugins-base/commit/?id=566583e87147f774e7fc4c78b5f7e61d427e40a9
vorbistag: Protect memory allocation calculation from overflow. Patch by: Tomas Hoger <thoger@redhat.com> Fixes CVE-2009-0586
1
gst_vorbis_tag_add_coverart (GstTagList * tags, const gchar * img_data_base64, gint base64_len) { GstBuffer *img; guchar *img_data; gsize img_len; guint save = 0; gint state = 0; if (base64_len < 2) goto not_enough_data; img_data = g_try_malloc0 (base64_len * 3 / 4); if (img_data == NULL) ...
146,313,219,496,584,400,000,000,000,000,000,000,000
gstvorbistag.c
211,094,231,011,375,400,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2009-0586
Integer overflow in the gst_vorbis_tag_add_coverart function (gst-libs/gst/tag/gstvorbistag.c) in vorbistag in gst-plugins-base (aka gstreamer-plugins-base) before 0.10.23 in GStreamer allows context-dependent attackers to execute arbitrary code via a crafted COVERART tag that is converted from a base64 representation,...
https://nvd.nist.gov/vuln/detail/CVE-2009-0586
10,793
qemu
070c4b92b8cd5390889716677a0b92444d6e087a
https://github.com/bonzini/qemu
https://git.qemu.org/?p=qemu.git;a=commit;h=070c4b92b8cd5390889716677a0b92444d6e087a
net: mcf: limit buffer descriptor count ColdFire Fast Ethernet Controller uses buffer descriptors to manage data flow to/fro receive & transmit queues. While transmitting packets, it could continue to read buffer descriptors if a buffer descriptor has length of zero and has crafted values in bd.flags. Set upper limit ...
1
static void mcf_fec_do_tx(mcf_fec_state *s) { uint32_t addr; mcf_fec_bd bd; int frame_size; int len; uint8_t frame[FEC_MAX_FRAME_SIZE]; uint8_t *ptr; DPRINTF("do_tx\n"); ptr = frame; frame_size = 0; addr = s->tx_descriptor; while (1) { mcf_fec_read_bd(&bd, addr); ...
39,214,142,760,099,140,000,000,000,000,000,000,000
mcf_fec.c
198,260,955,982,896,700,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2016-7908
The mcf_fec_do_tx function in hw/net/mcf_fec.c in QEMU (aka Quick Emulator) does not properly limit the buffer descriptor count when transmitting packets, which allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via vectors involving a buffer descriptor with a lengt...
https://nvd.nist.gov/vuln/detail/CVE-2016-7908
10,794
xserver
5725849a1b427cd4a72b84e57f211edb35838718
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/render/render.c?id=5725849a1b427cd4a72b84e57f211edb35838718
render: Bounds check for nglyphs in ProcRenderAddGlyphs (#28801) Signed-off-by: Adam Jackson <ajax@redhat.com> Reviewed-by: Julien Cristau <jcristau@debian.org> Signed-off-by: Keith Packard <keithp@keithp.com>
1
ProcRenderAddGlyphs (ClientPtr client) { GlyphSetPtr glyphSet; REQUEST(xRenderAddGlyphsReq); GlyphNewRec glyphsLocal[NLOCALGLYPH]; GlyphNewPtr glyphsBase, glyphs, glyph_new; int remain, nglyphs; CARD32 *gids; xGlyphInfo *gi; CARD8 *bits; unsigned int s...
1,204,159,738,485,995,000,000,000,000,000,000,000
render.c
107,649,397,098,920,510,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2010-4819
The ProcRenderAddGlyphs function in the Render extension (render/render.c) in X.Org xserver 1.7.7 and earlier allows local users to read arbitrary memory and possibly cause a denial of service (server crash) via unspecified vectors related to an "input sanitization flaw."
https://nvd.nist.gov/vuln/detail/CVE-2010-4819
10,795
FFmpeg
2080bc33717955a0e4268e738acf8c1eeddbf8cb
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/2080bc33717955a0e4268e738acf8c1eeddbf8cb
avcodec/utils: correct align value for interplay Fixes out of array access Fixes: 452/fuzz-1-ffmpeg_VIDEO_AV_CODEC_ID_INTERPLAY_VIDEO_fuzzer Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/targets/ffmpeg Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
1
void avcodec_align_dimensions2(AVCodecContext *s, int *width, int *height, int linesize_align[AV_NUM_DATA_POINTERS]) { int i; int w_align = 1; int h_align = 1; AVPixFmtDescriptor const *desc = av_pix_fmt_desc_get(s->pix_fmt); if (desc) { w_align = 1 << desc->l...
327,181,451,425,415,020,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2017-7865
FFmpeg before 2017-01-24 has an out-of-bounds write caused by a heap-based buffer overflow related to the ipvideo_decode_block_opcode_0xA function in libavcodec/interplayvideo.c and the avcodec_align_dimensions2 function in libavcodec/utils.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-7865
10,796
radare2
9b46d38dd3c4de6048a488b655c7319f845af185
https://github.com/radare/radare2
https://github.com/radare/radare2/commit/9b46d38dd3c4de6048a488b655c7319f845af185
Fix #12372 and #12373 - Crash in x86 assembler (#12380) 0 ,0,[bP-bL-bP-bL-bL-r-bL-bP-bL-bL- mov ,0,[ax+Bx-ax+Bx-ax+ax+Bx-ax+Bx-- leA ,0,[bP-bL-bL-bP-bL-bP-bL-60@bL- leA ,0,[bP-bL-r-bP-bL-bP-bL-60@bL- mov ,0,[ax+Bx-ax+Bx-ax+ax+Bx-ax+Bx--
1
static int parseOperand(RAsm *a, const char *str, Operand *op, bool isrepop) { size_t pos, nextpos = 0; x86newTokenType last_type; int size_token = 1; bool explicit_size = false; int reg_index = 0; // Reset type op->type = 0; // Consume tokens denoting the operand size while (size_token) { pos = nextpos; l...
6,131,296,079,931,054,000,000,000,000,000,000,000
asm_x86_nz.c
152,405,387,834,847,820,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-20456
In radare2 prior to 3.1.1, the parseOperand function inside libr/asm/p/asm_x86_nz.c may allow attackers to cause a denial of service (application crash in libr/util/strbuf.c via a stack-based buffer over-read) by crafting an input file, a related issue to CVE-2018-20455.
https://nvd.nist.gov/vuln/detail/CVE-2018-20456
10,797
WavPack
4c0faba32fddbd0745cbfaf1e1aeb3da5d35b9fc
https://github.com/dbry/WavPack
https://github.com/dbry/WavPack/commit/4c0faba32fddbd0745cbfaf1e1aeb3da5d35b9fc
issue #65: make sure DSDIFF files have a valid channel count
1
int ParseDsdiffHeaderConfig (FILE *infile, char *infilename, char *fourcc, WavpackContext *wpc, WavpackConfig *config) { int64_t infilesize, total_samples; DFFFileHeader dff_file_header; DFFChunkHeader dff_chunk_header; uint32_t bcount; infilesize = DoGetFileSize (infile); memcpy (&dff_file_hea...
106,925,413,231,207,760,000,000,000,000,000,000,000
None
null
[ "CWE-369" ]
CVE-2019-1010315
WavPack 5.1 and earlier is affected by: CWE 369: Divide by Zero. The impact is: Divide by zero can lead to sudden crash of a software/service that tries to parse a .wav file. The component is: ParseDsdiffHeaderConfig (dsdiff.c:282). The attack vector is: Maliciously crafted .wav file. The fixed version is: After commit...
https://nvd.nist.gov/vuln/detail/CVE-2019-1010315
10,798
radare2
c6d0076c924891ad9948a62d89d0bcdaf965f0cd
https://github.com/radare/radare2
https://github.com/radare/radare2/commit/c6d0076c924891ad9948a62d89d0bcdaf965f0cd
Fix #8731 - Crash in ELF parser with negative 32bit number
1
static Sdb *store_versioninfo_gnu_verneed(ELFOBJ *bin, Elf_(Shdr) *shdr, int sz) { ut8 *end, *need = NULL; const char *section_name = ""; Elf_(Shdr) *link_shdr = NULL; const char *link_section_name = ""; Sdb *sdb_vernaux = NULL; Sdb *sdb_version = NULL; Sdb *sdb = NULL; int i, cnt; if (!bin || !bin->dynstr) {...
277,570,248,229,841,480,000,000,000,000,000,000,000
elf.c
122,361,186,926,896,020,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-15931
In radare2 2.0.1, an integer exception (negative number leading to an invalid memory access) exists in store_versioninfo_gnu_verneed() in libr/bin/format/elf/elf.c via crafted ELF files on 32bit systems.
https://nvd.nist.gov/vuln/detail/CVE-2017-15931
10,799
qemu
1e7aed70144b4673fc26e73062064b6724795e5f
https://github.com/bonzini/qemu
https://git.qemu.org/?p=qemu.git;a=commit;h=1e7aed70144b4673fc26e73062064b6724795e5f
virtio: check vring descriptor buffer length virtio back end uses set of buffers to facilitate I/O operations. An infinite loop unfolds in virtqueue_pop() if a buffer was of zero size. Add check to avoid it. Reported-by: Li Qiang <liqiang6-s@360.cn> Signed-off-by: Prasad J Pandit <pjp@fedoraproject.org> Reviewed-by: ...
1
static void virtqueue_map_desc(unsigned int *p_num_sg, hwaddr *addr, struct iovec *iov, unsigned int max_num_sg, bool is_write, hwaddr pa, size_t sz) { unsigned num_sg = *p_num_sg; assert(num_sg <= max_num_sg); while (sz) { hwaddr len = ...
36,317,471,279,521,866,000,000,000,000,000,000,000
virtio.c
321,252,410,795,560,630,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2016-6490
The virtqueue_map_desc function in hw/virtio/virtio.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a zero length for the descriptor buffer.
https://nvd.nist.gov/vuln/detail/CVE-2016-6490
10,800
file
59e63838913eee47f5c120a6c53d4565af638158
https://github.com/file/file
https://github.com/file/file/commit/59e63838913eee47f5c120a6c53d4565af638158
PR/398: Correctly truncate pascal strings (fixes out of bounds read of 1, 2, or 4 bytes).
1
*/ private int mconvert(struct magic_set *ms, struct magic *m, int flip) { union VALUETYPE *p = &ms->ms_value; uint8_t type; switch (type = cvt_flip(m->type, flip)) { case FILE_BYTE: cvt_8(p, m); return 1; case FILE_SHORT: cvt_16(p, m); return 1; case FILE_LONG: case FILE_DATE: case FILE_LDATE: cvt_...
223,205,916,752,918,680,000,000,000,000,000,000,000
softmagic.c
176,551,318,546,496,700,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2014-9652
The mconvert function in softmagic.c in file before 5.21, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not properly handle a certain string-length field during a copy of a truncated version of a Pascal string, which might allow remote attackers to cause a den...
https://nvd.nist.gov/vuln/detail/CVE-2014-9652
10,801
php-src
b101a6bbd4f2181c360bd38e7683df4a03cba83e
https://github.com/php/php-src
https://github.com/php/php-src/commit/b101a6bbd4f2181c360bd38e7683df4a03cba83e
Use format string
1
static void zend_throw_or_error(int fetch_type, zend_class_entry *exception_ce, const char *format, ...) /* {{{ */ { va_list va; char *message = NULL; va_start(va, format); zend_vspprintf(&message, 0, format, va); if (fetch_type & ZEND_FETCH_CLASS_EXCEPTION) { zend_throw_error(exception_ce, message); } else {...
274,261,182,855,572,440,000,000,000,000,000,000,000
None
null
[ "CWE-134" ]
CVE-2015-8617
Format string vulnerability in the zend_throw_or_error function in Zend/zend_execute_API.c in PHP 7.x before 7.0.1 allows remote attackers to execute arbitrary code via format string specifiers in a string that is misused as a class name, leading to incorrect error handling.
https://nvd.nist.gov/vuln/detail/CVE-2015-8617
10,802
gnupg
014b2103fcb12f261135e3954f26e9e07b39e342
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=014b2103fcb12f261135e3954f26e9e07b39e342
gpg: Avoid infinite loop in uncompressing garbled packets. * g10/compress.c (do_uncompress): Limit the number of extra FF bytes. -- A packet like (a3 01 5b ff) leads to an infinite loop. Using --max-output won't help if it is a partial packet. This patch actually fixes a regression introduced on 1999-05-31 (c34c676...
1
do_uncompress( compress_filter_context_t *zfx, z_stream *zs, IOBUF a, size_t *ret_len ) { int zrc; int rc=0; size_t n; int nread, count; int refill = !zs->avail_in; if( DBG_FILTER ) log_debug("begin inflate: avail_in=%u, avail_out=%u, inbuf=%u\n", (unsigned)zs->avail_in, (unsigned)zs...
87,629,636,256,725,120,000,000,000,000,000,000,000
compress.c
329,533,514,336,488,180,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2014-4617
The do_uncompress function in g10/compress.c in GnuPG 1.x before 1.4.17 and 2.x before 2.0.24 allows context-dependent attackers to cause a denial of service (infinite loop) via malformed compressed packets, as demonstrated by an a3 01 5b ff byte sequence.
https://nvd.nist.gov/vuln/detail/CVE-2014-4617
10,804
udisks
0fcc7cb3b66f23fac53ae08647aa0007a2bd56c4
https://github.com/pothos/udisks
https://cgit.freedesktop.org/udisks/commit/?id=0fcc7cb3b66f23fac53ae08647aa0007a2bd56c4
Bug 27494 — publicly exports dm key information Change udisks-dm-export to only export UDISKS_DM_TARGETS_PARAMS for "linear" types. It is the only one we care about for now and know how to interpret. "crypto" types have information about the encryption key in the target parameters, which we must not leak. Also add ap...
1
dm_export (int major, int minor) { gboolean ret; struct dm_task *dmt; void *next; uint64_t start, length; char *target_type; char *params; const char *name; struct dm_info info; GString *target_types_str; GString *start_str; GString *length_str; GString *params_str; gchar buf[4096]; ret = F...
324,533,183,669,046,300,000,000,000,000,000,000,000
udisks-dm-export.c
277,263,213,864,383,560,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2010-1149
probers/udisks-dm-export.c in udisks before 1.0.1 exports UDISKS_DM_TARGETS_PARAMS information to udev even for a crypt UDISKS_DM_TARGETS_TYPE, which allows local users to discover encryption keys by (1) running a certain udevadm command or (2) reading a certain file under /dev/.udev/db/.
https://nvd.nist.gov/vuln/detail/CVE-2010-1149
10,807
linux
fa3d315a4ce2c0891cdde262562e710d95fba19e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/fa3d315a4ce2c0891cdde262562e710d95fba19e
KVM: Validate userspace_addr of memslot when registered This way, we can avoid checking the user space address many times when we read the guest memory. Although we can do the same for write if we check which slots are writable, we do not care write now: reading the guest memory happens more often than writing. [avi...
1
static int FNAME(walk_addr_generic)(struct guest_walker *walker, struct kvm_vcpu *vcpu, struct kvm_mmu *mmu, gva_t addr, u32 access) { pt_element_t pte; pt_element_t __user *ptep_user; gfn_t table_gfn; unsigned index, pt_access, uninitialized_var(pte_access); gpa_t pte_gpa; bool eperm, present, rs...
152,638,346,673,194,920,000,000,000,000,000,000,000
paging_tmpl.h
211,636,996,141,201,900,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-1943
The KVM subsystem in the Linux kernel before 3.0 does not check whether kernel addresses are specified during allocation of memory slots for use in a guest's physical address space, which allows local users to gain privileges or obtain sensitive information from kernel memory via a crafted application, related to arch/...
https://nvd.nist.gov/vuln/detail/CVE-2013-1943
10,809
FFmpeg
296debd213bd6dce7647cedd34eb64e5b94cdc92
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/296debd213bd6dce7647cedd34eb64e5b94cdc92
avcodec/dnxhddec: Move mb height check out of non hr branch Fixes: out of array access Fixes: poc.dnxhd Found-by: Bingchang, Liu@VARAS of IIE Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
1
static int dnxhd_decode_header(DNXHDContext *ctx, AVFrame *frame, const uint8_t *buf, int buf_size, int first_field) { int i, cid, ret; int old_bit_depth = ctx->bit_depth, bitdepth; uint64_t header_prefix; if (buf_size < 0x280) { av_l...
177,963,056,591,493,700,000,000,000,000,000,000,000
dnxhddec.c
101,910,416,377,302,030,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-11719
The dnxhd_decode_header function in libavcodec/dnxhddec.c in FFmpeg 3.0 through 3.3.2 allows remote attackers to cause a denial of service (out-of-array access) or possibly have unspecified other impact via a crafted DNxHD file.
https://nvd.nist.gov/vuln/detail/CVE-2017-11719
10,810
FFmpeg
6b67d7f05918f7a1ee8fc6ff21355d7e8736aa10
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/6b67d7f05918f7a1ee8fc6ff21355d7e8736aa10
avformat/flvenc: Check audio packet size Fixes: Assertion failure Fixes: assert_flvenc.c:941_1.swf Found-by: #CHEN HONGXU# <HCHEN017@e.ntu.edu.sg> Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
1
static int flv_write_packet(AVFormatContext *s, AVPacket *pkt) { AVIOContext *pb = s->pb; AVCodecParameters *par = s->streams[pkt->stream_index]->codecpar; FLVContext *flv = s->priv_data; FLVStreamContext *sc = s->streams[pkt->stream_index]->priv_data; unsigned ts; int size = pkt->size...
322,148,846,991,142,300,000,000,000,000,000,000,000
None
null
[ "CWE-617" ]
CVE-2018-15822
The flv_write_packet function in libavformat/flvenc.c in FFmpeg through 2.8 does not check for an empty audio packet, leading to an assertion failure.
https://nvd.nist.gov/vuln/detail/CVE-2018-15822
10,811
FFmpeg
29ffeef5e73b8f41ff3a3f2242d356759c66f91f
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/29ffeef5e73b8f41ff3a3f2242d356759c66f91f
avcodec/h264: do not trust last_pic_droppable when marking pictures as done This simplifies the code and fixes a deadlock Fixes Ticket2927 Signed-off-by: Michael Niedermayer <michaelni@gmx.at>
1
static int decode_slice_header(H264Context *h, H264Context *h0) { unsigned int first_mb_in_slice; unsigned int pps_id; int ret; unsigned int slice_type, tmp, i, j; int last_pic_structure, last_pic_droppable; int must_reinit; int needs_reinit = 0; int field_pic_flag, bottom_field_flag; ...
236,248,743,148,359,600,000,000,000,000,000,000,000
h264.c
324,658,081,924,643,700,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2013-7008
The decode_slice_header function in libavcodec/h264.c in FFmpeg before 2.1 incorrectly relies on a certain droppable field, which allows remote attackers to cause a denial of service (deadlock) or possibly have unspecified other impact via crafted H.264 data.
https://nvd.nist.gov/vuln/detail/CVE-2013-7008
10,812
qemu
98f93ddd84800f207889491e0b5d851386b459cf
https://github.com/bonzini/qemu
http://git.qemu.org/?p=qemu.git;a=commit;h=98f93ddd84800f207889491e0b5d851386b459cf
virtio-net: out-of-bounds buffer write on load CVE-2013-4149 QEMU 1.3.0 out-of-bounds buffer write in virtio_net_load()@hw/net/virtio-net.c > } else if (n->mac_table.in_use) { > uint8_t *buf = g_malloc0(n->mac_table.in_use); We are allocating buffer of size n->mac_table.in_use > qemu...
1
static int virtio_net_load(QEMUFile *f, void *opaque, int version_id) { VirtIONet *n = opaque; VirtIODevice *vdev = VIRTIO_DEVICE(n); int ret, i, link_down; if (version_id < 2 || version_id > VIRTIO_NET_VM_VERSION) return -EINVAL; ret = virtio_load(vdev, f); if (ret) { return r...
244,500,327,533,408,620,000,000,000,000,000,000,000
virtio-net.c
92,965,056,721,602,890,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4149
Buffer overflow in virtio_net_load function in net/virtio-net.c in QEMU 1.3.0 through 1.7.x before 1.7.2 might allow remote attackers to execute arbitrary code via a large MAC table.
https://nvd.nist.gov/vuln/detail/CVE-2013-4149
10,813
varnish-cache
176f8a075a963ffbfa56f1c460c15f6a1a6af5a7
https://github.com/varnishcache/varnish-cache
https://github.com/varnishcache/varnish-cache/commit/176f8a075a963ffbfa56f1c460c15f6a1a6af5a7
Avoid buffer read overflow on vcl_error and -sfile The file stevedore may return a buffer larger than asked for when requesting storage. Due to lack of check for this condition, the code to copy the synthetic error memory buffer from vcl_error would overrun the buffer. Patch by @shamger Fixes: #2429
1
vbf_stp_error(struct worker *wrk, struct busyobj *bo) { ssize_t l, ll, o; double now; uint8_t *ptr; struct vsb *synth_body; CHECK_OBJ_NOTNULL(wrk, WORKER_MAGIC); CHECK_OBJ_NOTNULL(bo, BUSYOBJ_MAGIC); CHECK_OBJ_NOTNULL(bo->fetch_objcore, OBJCORE_MAGIC); AN(bo->fetch_objcore->flags & OC_F_BUSY); assert(bo->dire...
38,998,115,844,148,544,000,000,000,000,000,000,000
cache_fetch.c
254,969,103,215,596,540,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2017-8807
vbf_stp_error in bin/varnishd/cache/cache_fetch.c in Varnish HTTP Cache 4.1.x before 4.1.9 and 5.x before 5.2.1 allows remote attackers to obtain sensitive information from process memory because a VFP_GetStorage buffer is larger than intended in certain circumstances involving -sfile Stevedore transient objects.
https://nvd.nist.gov/vuln/detail/CVE-2017-8807
10,814
gpac
90dc7f853d31b0a4e9441cba97feccf36d8b69a4
https://github.com/gpac/gpac
https://github.com/gpac/gpac/commit/90dc7f853d31b0a4e9441cba97feccf36d8b69a4
fix some exploitable overflows (#994, #997)
1
GF_Err gf_isom_oinf_read_entry(void *entry, GF_BitStream *bs) { GF_OperatingPointsInformation* ptr = (GF_OperatingPointsInformation *)entry; u32 i, j, count; if (!ptr) return GF_BAD_PARAM; ptr->scalability_mask = gf_bs_read_u16(bs); gf_bs_read_int(bs, 2);//reserved count = gf_bs_read_int(bs, 6); for (i = 0; i <...
45,493,324,744,899,785,000,000,000,000,000,000,000
avc_ext.c
91,426,739,831,411,360,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-7752
GPAC through 0.7.1 has a Buffer Overflow in the gf_media_avc_read_sps function in media_tools/av_parsers.c, a different vulnerability than CVE-2018-1000100.
https://nvd.nist.gov/vuln/detail/CVE-2018-7752
10,815
gpac
90dc7f853d31b0a4e9441cba97feccf36d8b69a4
https://github.com/gpac/gpac
https://github.com/gpac/gpac/commit/90dc7f853d31b0a4e9441cba97feccf36d8b69a4
fix some exploitable overflows (#994, #997)
1
s32 gf_media_avc_read_sps(const char *sps_data, u32 sps_size, AVCState *avc, u32 subseq_sps, u32 *vui_flag_pos) { AVC_SPS *sps; u32 ChromaArrayType = 0; s32 mb_width, mb_height, sps_id = -1; u32 profile_idc, level_idc, pcomp, i, chroma_format_idc, cl=0, cr=0, ct=0, cb=0, luma_bd, chroma_bd; u8 separate_colour_plan...
118,493,925,447,285,940,000,000,000,000,000,000,000
av_parsers.c
7,451,292,680,691,841,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-7752
GPAC through 0.7.1 has a Buffer Overflow in the gf_media_avc_read_sps function in media_tools/av_parsers.c, a different vulnerability than CVE-2018-1000100.
https://nvd.nist.gov/vuln/detail/CVE-2018-7752
10,816
FFmpeg
2960576378d17d71cc8dccc926352ce568b5eec1
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/2960576378d17d71cc8dccc926352ce568b5eec1
avcodec/g2meet: fix src pointer checks in kempf_decode_tile() Fixes Ticket2842 Signed-off-by: Michael Niedermayer <michaelni@gmx.at>
1
static int kempf_decode_tile(G2MContext *c, int tile_x, int tile_y, const uint8_t *src, int src_size) { int width, height; int hdr, zsize, npal, tidx = -1, ret; int i, j; const uint8_t *src_end = src + src_size; uint8_t pal[768], transp[3]; uLongf dlen = (c->tile_wid...
157,199,865,468,937,770,000,000,000,000,000,000,000
g2meet.c
337,666,674,445,830,870,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4264
The kempf_decode_tile function in libavcodec/g2meet.c in FFmpeg before 2.0.1 allows remote attackers to cause a denial of service (out-of-bounds heap write) via a G2M4 encoded file.
https://nvd.nist.gov/vuln/detail/CVE-2013-4264
10,817
radare2
bd276ef2fd8ac3401e65be7c126a43175ccfbcd7
https://github.com/radare/radare2
https://github.com/radare/radare2/commit/bd276ef2fd8ac3401e65be7c126a43175ccfbcd7
Fix #9969 - Stack overflow in wasm disassembler
1
int wasm_dis(WasmOp *op, const unsigned char *buf, int buf_len) { op->len = 1; op->op = buf[0]; if (op->op > 0xbf) { return 1; } // add support for extension opcodes (SIMD + atomics) WasmOpDef *opdef = &opcodes[op->op]; switch (op->op) { case WASM_OP_TRAP: case WASM_OP_NOP: case WASM_OP_ELSE: case WASM_OP_...
6,673,601,905,180,170,000,000,000,000,000,000,000
wasm.c
128,755,337,374,787,100,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-11378
The wasm_dis() function in libr/asm/arch/wasm/wasm.c in or possibly have unspecified other impact via a crafted WASM file.
https://nvd.nist.gov/vuln/detail/CVE-2018-11378
10,818
virglrenderer
747a293ff6055203e529f083896b823e22523fe7
https://gitlab.freedesktop.org/virgl/virglrenderer
https://cgit.freedesktop.org/virglrenderer/commit/?id=747a293ff6055203e529f083896b823e22523fe7
vrend: fix a leak in context create internal Create a context more than once causes memory leak issue. Juest return if the context exists. Signed-off-by: Li Qiang <liq3ea@gmail.com> Signed-off-by: Dave Airlie <airlied@redhat.com>
1
void vrend_renderer_context_create_internal(uint32_t handle, uint32_t nlen, const char *debug_name) { struct vrend_decode_ctx *dctx; if (handle >= VREND_MAX_CTX) return; dctx = malloc(sizeof(struct vrend_decode_ctx)); if (!dctx) return; dctx->grc...
314,270,549,268,056,050,000,000,000,000,000,000,000
vrend_decode.c
312,476,336,926,305,480,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2016-10163
Memory leak in the vrend_renderer_context_create_internal function in vrend_decode.c in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (host memory consumption) by repeatedly creating a decode context.
https://nvd.nist.gov/vuln/detail/CVE-2016-10163
10,819
poppler
58e04a08afee39370283c494ee2e4e392fd3b684
https://github.com/freedesktop/poppler
https://cgit.freedesktop.org/poppler/poppler/commit/?id=58e04a08afee39370283c494ee2e4e392fd3b684
segExtraBytes is a goffset not an int so use lld Fixes KDE bug #328511
1
void JBIG2Stream::readSegments() { Guint segNum, segFlags, segType, page, segLength; Guint refFlags, nRefSegs; Guint *refSegs; Goffset segDataPos; int c1, c2, c3; Guint i; while (readULong(&segNum)) { // segment header flags if (!readUByte(&segFlags)) { goto eofError1; } segType = ...
234,137,405,656,432,350,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2013-7296
The JBIG2Stream::readSegments method in JBIG2Stream.cc in Poppler before 0.24.5 does not use the correct specifier within a format string, which allows context-dependent attackers to cause a denial of service (segmentation fault and application crash) via a crafted PDF file.
https://nvd.nist.gov/vuln/detail/CVE-2013-7296
10,820
nmap
350bbe0597d37ad67abe5fef8fba984707b4e9ad
https://github.com/nmap/nmap
https://github.com/nmap/nmap/commit/350bbe0597d37ad67abe5fef8fba984707b4e9ad
Avoid a crash (double-free) when SSH connection fails
1
static int do_session_handshake (lua_State *L, int status, lua_KContext ctx) { int rc; struct ssh_userdata *sshu = NULL; assert(lua_gettop(L) == 4); sshu = (struct ssh_userdata *) nseU_checkudata(L, 3, SSH2_UDATA, "ssh2"); while ((rc = libssh2_session_handshake(sshu->session, sshu->sp[0])) == LIBS...
158,553,276,448,407,060,000,000,000,000,000,000,000
nse_libssh2.cc
198,789,152,988,758,870,000,000,000,000,000,000,000
[ "CWE-415" ]
CVE-2017-18594
nse_libssh2.cc in Nmap 7.70 is subject to a denial of service condition due to a double free when an SSH connection fails, as demonstrated by a leading \n character to ssh-brute.nse or ssh-auth-methods.nse.
https://nvd.nist.gov/vuln/detail/CVE-2017-18594
10,822
linux
5a0fdfada3a2aa50d7b947a2e958bf00cbe0d830
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/5a0fdfada3a2aa50d7b947a2e958bf00cbe0d830
Revert "arm64: Introduce execute-only page access permissions" This reverts commit bc07c2c6e9ed125d362af0214b6313dca180cb08. While the aim is increased security for --x memory maps, it does not protect against kernel level reads. Until SECCOMP is implemented for arm64, revert this patch to avoid giving a false idea o...
1
static inline void set_pte_at(struct mm_struct *mm, unsigned long addr, pte_t *ptep, pte_t pte) { if (pte_valid_ng(pte)) { if (!pte_special(pte) && pte_exec(pte)) __sync_icache_dcache(pte, addr); if (pte_dirty(pte) && pte_write(pte)) pte_val(pte) &= ~PTE_RDONLY; else pte_val(pte) |= PTE_RDONLY;...
72,720,086,549,577,510,000,000,000,000,000,000,000
None
null
[ "CWE-19" ]
CVE-2014-9803
arch/arm64/include/asm/pgtable.h in the Linux kernel before 3.15-rc5-next-20140519, as used in Android before 2016-07-05 on Nexus 5X and 6P devices, mishandles execute-only pages, which allows attackers to gain privileges via a crafted application, aka Android internal bug 28557020.
https://nvd.nist.gov/vuln/detail/CVE-2014-9803
10,824
linux
b4789b8e6be3151a955ade74872822f30e8cd914
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/b4789b8e6be3151a955ade74872822f30e8cd914
aacraid: prevent invalid pointer dereference It appears that driver runs into a problem here if fibsize is too small because we allocate user_srbcmd with fibsize size only but later we access it until user_srbcmd->sg.count to copy it over to srbcmd. It is not correct to test (fibsize < sizeof(*user_srbcmd)) because t...
1
static int aac_send_raw_srb(struct aac_dev* dev, void __user * arg) { struct fib* srbfib; int status; struct aac_srb *srbcmd = NULL; struct user_aac_srb *user_srbcmd = NULL; struct user_aac_srb __user *user_srb = arg; struct aac_srb_reply __user *user_reply; struct aac_srb_reply* reply; u32 fibsize = 0; u32 fl...
278,785,541,490,766,400,000,000,000,000,000,000,000
commctrl.c
11,190,411,268,765,080,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-6380
The aac_send_raw_srb function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 3.12.1 does not properly validate a certain size value, which allows local users to cause a denial of service (invalid pointer dereference) or possibly have unspecified other impact via an FSACTL_SEND_RAW_SRB ioctl call that tr...
https://nvd.nist.gov/vuln/detail/CVE-2013-6380
10,827
linux
15fab63e1e57be9fdb5eec1bbc5916e9825e9acb
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/15fab63e1e57be9fdb5eec1bbc5916e9825e9acb
fs: prevent page refcount overflow in pipe_buf_get Change pipe_buf_get() to return a bool indicating whether it succeeded in raising the refcount of the page (if the thing in the pipe is a page). This removes another mechanism for overflowing the page refcount. All callers converted to handle a failure. Reported-by:...
1
static inline void pipe_buf_get(struct pipe_inode_info *pipe, struct pipe_buffer *buf) { buf->ops->get(pipe, buf); }
82,379,531,495,560,300,000,000,000,000,000,000,000
pipe_fs_i.h
187,618,379,157,083,460,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2019-11487
The Linux kernel before 5.1-rc5 allows page->_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur w...
https://nvd.nist.gov/vuln/detail/CVE-2019-11487
10,830
FFmpeg
8c2ea3030af7b40a3c4275696fb5c76cdb80950a
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/8c2ea3030af7b40a3c4275696fb5c76cdb80950a
avcodec/pictordec: Fix logic error Fixes: 559/clusterfuzz-testcase-6424225917173760 Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/targets/ffmpeg Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
1
static int decode_frame(AVCodecContext *avctx, void *data, int *got_frame, AVPacket *avpkt) { PicContext *s = avctx->priv_data; AVFrame *frame = data; uint32_t *palette; int bits_per_plane, bpp, etype, esize, npal, pos_after_pal; int i, x, y, plane, tm...
221,742,097,572,568,800,000,000,000,000,000,000,000
pictordec.c
75,293,849,504,293,415,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2017-7862
FFmpeg before 2017-02-07 has an out-of-bounds write caused by a heap-based buffer overflow related to the decode_frame function in libavcodec/pictordec.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-7862
10,831
radare2
f41e941341e44aa86edd4483c4487ec09a074257
https://github.com/radare/radare2
https://github.com/radare/radare2/commit/f41e941341e44aa86edd4483c4487ec09a074257
Fix #6885 - oob write in dalvik_disassemble
1
static int dalvik_disassemble (RAsm *a, RAsmOp *op, const ut8 *buf, int len) { int vA, vB, vC, payload = 0, i = (int) buf[0]; int size = dalvik_opcodes[i].len; char str[1024], *strasm; ut64 offset; const char *flag_str; op->buf_asm[0] = 0; if (buf[0] == 0x00) { /* nop */ switch (buf[1]) { case 0x01: /* pac...
15,765,353,407,801,864,000,000,000,000,000,000,000
asm_dalvik.c
278,723,867,294,495,130,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2017-6448
The dalvik_disassemble function in libr/asm/p/asm_dalvik.c in radare2 1.2.1 allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted DEX file.
https://nvd.nist.gov/vuln/detail/CVE-2017-6448
10,832
radare2
f17bfd9f1da05f30f23a4dd05e9d2363e1406948
https://github.com/radare/radare2
https://github.com/radare/radare2/commit/f17bfd9f1da05f30f23a4dd05e9d2363e1406948
Fix #12242 - Crash in x86.nz assembler (#12266)
1
static int opmov(RAsm *a, ut8 *data, const Opcode *op) { int l = 0; st64 offset = 0; int mod = 0; int base = 0; int rex = 0; ut64 immediate = 0; if (op->operands[1].type & OT_CONSTANT) { if (!op->operands[1].is_good_flag) { return -1; } if (op->operands[1].immediate == -1) { return -1; } immediat...
40,973,769,706,127,207,000,000,000,000,000,000,000
asm_x86_nz.c
338,540,879,983,035,860,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-19843
opmov in libr/asm/p/asm_x86_nz.c in radare2 before 3.1.0 allows attackers to cause a denial of service (buffer over-read) via crafted x86 assembly data, as demonstrated by rasm2.
https://nvd.nist.gov/vuln/detail/CVE-2018-19843
10,833
php-src
61cdd1255d5b9c8453be71aacbbf682796ac77d4
https://github.com/php/php-src
https://github.com/php/php-src/commit/61cdd1255d5b9c8453be71aacbbf682796ac77d4
Fix bug #73257 and bug #73258 - SplObjectStorage unserialize allows use of non-object as key
1
SPL_METHOD(SplObjectStorage, unserialize) { spl_SplObjectStorage *intern = Z_SPLOBJSTORAGE_P(getThis()); char *buf; size_t buf_len; const unsigned char *p, *s; php_unserialize_data_t var_hash; zval entry, inf; zval *pcount, *pmembers; spl_SplObjectStorageElement *element; zend_long count; if (zend_parse_par...
91,704,803,847,212,610,000,000,000,000,000,000,000
spl_observer.c
126,391,975,154,037,090,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-7480
The SplObjectStorage unserialize implementation in ext/spl/spl_observer.c in PHP before 7.0.12 does not verify that a key is an object, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access) via crafted serialized data.
https://nvd.nist.gov/vuln/detail/CVE-2016-7480