idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
10,715 | libpcap | 437b273761adedcbd880f714bfa44afeec186a31 | https://github.com/the-tcpdump-group/libpcap | https://github.com/the-tcpdump-group/libpcap/commit/437b273761adedcbd880f714bfa44afeec186a31 | Don't crash if crypt() fails.
It can fail, so make sure it doesn't before comparing its result with
the password.
This addresses Include Security issue F12: [libpcap] Remote Packet
Capture Daemon Null Pointer Dereference Denial of Service. | 1 | daemon_AuthUserPwd(char *username, char *password, char *errbuf)
{
#ifdef _WIN32
/*
* Warning: the user which launches the process must have the
* SE_TCB_NAME right.
* This corresponds to have the "Act as part of the Operating System"
* turned on (administrative tools, local security settings, local
* polici... | 63,029,283,185,700,500,000,000,000,000,000,000,000 | daemon.c | 265,153,928,199,968,920,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2019-15163 | rpcapd/daemon.c in libpcap before 1.9.1 allows attackers to cause a denial of service (NULL pointer dereference and daemon crash) if a crypt() call fails. | https://nvd.nist.gov/vuln/detail/CVE-2019-15163 |
10,716 | poppler | da63c35549e8852a410946ab016a3f25ac701bdf | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=da63c35549e8852a410946ab016a3f25ac701bdf | FoFiType1C::convertToType0: Fix crash in broken files
Bug #102724 | 1 | void FoFiType1C::convertToType0(char *psName, int *codeMap, int nCodes,
FoFiOutputFunc outputFunc,
void *outputStream) {
int *cidMap;
Type1CIndex subrIdx;
Type1CIndexVal val;
int nCIDs;
GooString *buf;
Type1CEexecBuf eb;
GBool ok;
int fd, i, j, k;
// compute the CID count and build the CID-to... | 147,790,478,051,028,070,000,000,000,000,000,000,000 | FoFiType1C.cc | 140,291,466,668,214,960,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-14976 | The FoFiType1C::convertToType0 function in FoFiType1C.cc in Poppler 0.59.0 has a heap-based buffer over-read vulnerability if an out-of-bounds font dictionary index is encountered, which allows an attacker to launch a denial of service attack. | https://nvd.nist.gov/vuln/detail/CVE-2017-14976 |
10,717 | WavPack | 36a24c7881427d2e1e4dc1cef58f19eee0d13aec | https://github.com/dbry/WavPack | https://github.com/dbry/WavPack/commit/36a24c7881427d2e1e4dc1cef58f19eee0d13aec | issue #28, do not overwrite heap on corrupt DSDIFF file | 1 | int ParseDsdiffHeaderConfig (FILE *infile, char *infilename, char *fourcc, WavpackContext *wpc, WavpackConfig *config)
{
int64_t infilesize, total_samples;
DFFFileHeader dff_file_header;
DFFChunkHeader dff_chunk_header;
uint32_t bcount;
infilesize = DoGetFileSize (infile);
memcpy (&dff_file_hea... | 129,741,665,744,977,370,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2018-7253 | The ParseDsdiffHeaderConfig function of the cli/dsdiff.c file of WavPack 5.1.0 allows a remote attacker to cause a denial-of-service (heap-based buffer over-read) or possibly overwrite the heap via a maliciously crafted DSDIFF file. | https://nvd.nist.gov/vuln/detail/CVE-2018-7253 |
10,718 | linux | 0449641130f5652b344ef6fa39fa019d7e94660a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0449641130f5652b344ef6fa39fa019d7e94660a | ext4: init timer earlier to avoid a kernel panic in __save_error_info
During mount, when we fail to open journal inode or root inode, the
__save_error_info will mod_timer. But actually s_err_report isn't
initialized yet and the kernel oops. The detailed information can
be found https://bugzilla.kernel.org/show_bug.cgi... | 1 | __acquires(kernel_lock)
{
char *orig_data = kstrdup(data, GFP_KERNEL);
struct buffer_head *bh;
struct ext4_super_block *es = NULL;
struct ext4_sb_info *sbi;
ext4_fsblk_t block;
ext4_fsblk_t sb_block = get_sb_block(&data);
ext4_fsblk_t logical_sb_block;
unsigned long offset = 0;
unsigned long journal_devnum... | 2,883,871,233,556,824,000,000,000,000,000,000,000 | super.c | 242,967,321,248,923,500,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2011-2493 | The ext4_fill_super function in fs/ext4/super.c in the Linux kernel before 2.6.39 does not properly initialize a certain error-report data structure, which allows local users to cause a denial of service (OOPS) by attempting to mount a crafted ext4 filesystem. | https://nvd.nist.gov/vuln/detail/CVE-2011-2493 |
10,719 | qemu | 844864fbae66935951529408831c2f22367a57b6 | https://github.com/bonzini/qemu | https://git.qemu.org/?p=qemu.git;a=commit;h=844864fbae66935951529408831c2f22367a57b6 | scsi: megasas: null terminate bios version buffer
While reading information via 'megasas_ctrl_get_info' routine,
a local bios version buffer isn't null terminated. Add the
terminating null byte to avoid any OOB access.
Reported-by: Li Qiang <liqiang6-s@360.cn>
Reviewed-by: Peter Maydell <peter.maydell@linaro.org>
Sig... | 1 | static int megasas_ctrl_get_info(MegasasState *s, MegasasCmd *cmd)
{
PCIDevice *pci_dev = PCI_DEVICE(s);
PCIDeviceClass *pci_class = PCI_DEVICE_GET_CLASS(pci_dev);
MegasasBaseClass *base_class = MEGASAS_DEVICE_GET_CLASS(s);
struct mfi_ctrl_info info;
size_t dcmd_size = sizeof(info);
BusChild *ki... | 340,248,343,264,835,060,000,000,000,000,000,000,000 | megasas.c | 35,182,564,994,204,110,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2016-5337 | The megasas_ctrl_get_info function in hw/scsi/megasas.c in QEMU allows local guest OS administrators to obtain sensitive host memory information via vectors related to reading device control information. | https://nvd.nist.gov/vuln/detail/CVE-2016-5337 |
10,720 | FFmpeg | c24bcb553650b91e9eff15ef6e54ca73de2453b7 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/c24bcb553650b91e9eff15ef6e54ca73de2453b7 | avformat/nsvdec: Fix DoS due to lack of eof check in nsvs_file_offset loop.
Fixes: 20170829.nsv
Co-Author: 张洪亮(望初)" <wangchu.zhl@alibaba-inc.com>
Found-by: Xiaohei and Wangchu from Alibaba Security Team
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 1 | static int nsv_parse_NSVf_header(AVFormatContext *s)
{
NSVContext *nsv = s->priv_data;
AVIOContext *pb = s->pb;
unsigned int av_unused file_size;
unsigned int size;
int64_t duration;
int strings_size;
int table_entries;
int table_entries_used;
nsv->state = NSV_UNSYNC; /* in case we ... | 56,714,162,752,573,535,000,000,000,000,000,000,000 | nsvdec.c | 37,860,070,422,108,427,000,000,000,000,000,000,000 | [
"CWE-834"
] | CVE-2017-14171 | In libavformat/nsvdec.c in FFmpeg 2.4 and 3.3.3, a DoS in nsv_parse_NSVf_header() due to lack of an EOF (End of File) check might cause huge CPU consumption. When a crafted NSV file, which claims a large "table_entries_used" field in the header but does not contain sufficient backing data, is provided, the loop over 't... | https://nvd.nist.gov/vuln/detail/CVE-2017-14171 |
10,721 | php-src | 8d2539fa0faf3f63e1d1e7635347c5b9e777d47b | https://github.com/php/php-src | https://github.com/php/php-src/commit/8d2539fa0faf3f63e1d1e7635347c5b9e777d47b | Fix bug #73831 - NULL Pointer Dereference while unserialize php object | 1 | */
static void php_wddx_pop_element(void *user_data, const XML_Char *name)
{
st_entry *ent1, *ent2;
wddx_stack *stack = (wddx_stack *)user_data;
HashTable *target_hash;
zend_class_entry *pce;
zval obj;
/* OBJECTS_FIXME */
if (stack->top == 0) {
return;
}
if (!strcmp((char *)name, EL_STRING) ||... | 51,441,026,749,032,170,000,000,000,000,000,000,000 | wddx.c | 147,391,937,390,179,960,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2016-10162 | The php_wddx_pop_element function in ext/wddx/wddx.c in PHP 7.0.x before 7.0.15 and 7.1.x before 7.1.1 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an inapplicable class name in a wddxPacket XML document, leading to mishandling in a wddx_deserialize call. | https://nvd.nist.gov/vuln/detail/CVE-2016-10162 |
10,722 | qemu | a9c380db3b8c6af19546a68145c8d1438a09c92b | https://github.com/bonzini/qemu | http://git.qemu.org/?p=qemu.git;a=commit;h=a9c380db3b8c6af19546a68145c8d1438a09c92b | ssi-sd: fix buffer overrun on invalid state load
CVE-2013-4537
s->arglen is taken from wire and used as idx
in ssi_sd_transfer().
Validate it before access.
Signed-off-by: Michael S. Tsirkin <mst@redhat.com>
Signed-off-by: Juan Quintela <quintela@redhat.com> | 1 | static int ssi_sd_load(QEMUFile *f, void *opaque, int version_id)
{
SSISlave *ss = SSI_SLAVE(opaque);
ssi_sd_state *s = (ssi_sd_state *)opaque;
int i;
if (version_id != 1)
return -EINVAL;
s->mode = qemu_get_be32(f);
s->cmd = qemu_get_be32(f);
for (i = 0; i < 4; i++)
s->cmda... | 257,645,210,657,267,800,000,000,000,000,000,000,000 | None | null | [
"CWE-94"
] | CVE-2013-4537 | The ssi_sd_transfer function in hw/sd/ssi-sd.c in QEMU before 1.7.2 allows remote attackers to execute arbitrary code via a crafted arglen value in a savevm image. | https://nvd.nist.gov/vuln/detail/CVE-2013-4537 |
10,723 | libx11 | b469da1430cdcee06e31c6251b83aede072a1ff0 | https://gitlab.freedesktop.org/xorg/lib/libx11 | https://cgit.freedesktop.org/xorg/lib/libX11/commit/?id=b469da1430cdcee06e31c6251b83aede072a1ff0 | Fixed off-by-one writes (CVE-2018-14599).
The functions XGetFontPath, XListExtensions, and XListFonts are
vulnerable to an off-by-one override on malicious server responses.
The server replies consist of chunks consisting of a length byte
followed by actual string, which is not NUL-terminated.
While parsing the resp... | 1 | char **XListExtensions(
register Display *dpy,
int *nextensions) /* RETURN */
{
xListExtensionsReply rep;
char **list = NULL;
char *ch = NULL;
char *chend;
int count = 0;
register unsigned i;
register int length;
_X_UNUSED register xReq *req;
unsigned long rlen = 0;
LockDisplay(dpy);
GetEmptyReq (Li... | 163,033,534,115,641,510,000,000,000,000,000,000,000 | ListExt.c | 320,148,940,157,906,520,000,000,000,000,000,000,000 | [
"CWE-682"
] | CVE-2018-14599 | An issue was discovered in libX11 through 1.6.5. The function XListExtensions in ListExt.c is vulnerable to an off-by-one error caused by malicious server responses, leading to DoS or possibly unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2018-14599 |
10,726 | php-src | 35ceea928b12373a3b1e3eecdc32ed323223a40d | https://github.com/php/php-src | https://github.com/php/php-src/commit/35ceea928b12373a3b1e3eecdc32ed323223a40d | Fix bug #67060: use default mode of 660 | 1 | int fpm_unix_resolve_socket_premissions(struct fpm_worker_pool_s *wp) /* {{{ */
{
struct fpm_worker_pool_config_s *c = wp->config;
/* uninitialized */
wp->socket_uid = -1;
wp->socket_gid = -1;
wp->socket_mode = 0666;
if (!c) {
return 0;
}
if (c->listen_owner && *c->listen_owner) {
struct passwd *pwd;
... | 91,364,791,922,883,400,000,000,000,000,000,000,000 | fpm_unix.c | 34,662,802,751,318,727,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2014-0185 | sapi/fpm/fpm/fpm_unix.c in the FastCGI Process Manager (FPM) in PHP before 5.4.28 and 5.5.x before 5.5.12 uses 0666 permissions for the UNIX socket, which allows local users to gain privileges via a crafted FastCGI client. | https://nvd.nist.gov/vuln/detail/CVE-2014-0185 |
10,727 | WavPack | 33a0025d1d63ccd05d9dbaa6923d52b1446a62fe | https://github.com/dbry/WavPack | https://github.com/dbry/WavPack/commit/33a0025d1d63ccd05d9dbaa6923d52b1446a62fe | issue #68: clear WaveHeader at start to prevent uninitialized read | 1 | int ParseWave64HeaderConfig (FILE *infile, char *infilename, char *fourcc, WavpackContext *wpc, WavpackConfig *config)
{
int64_t total_samples = 0, infilesize;
Wave64ChunkHeader chunk_header;
Wave64FileHeader filehdr;
WaveHeader WaveHeader;
int format_chunk = 0;
uint32_t bcount;
infilesize ... | 277,131,272,340,638,830,000,000,000,000,000,000,000 | wave64.c | 277,994,324,779,500,450,000,000,000,000,000,000,000 | [
"CWE-665"
] | CVE-2019-1010319 | WavPack 5.1.0 and earlier is affected by: CWE-457: Use of Uninitialized Variable. The impact is: Unexpected control flow, crashes, and segfaults. The component is: ParseWave64HeaderConfig (wave64.c:211). The attack vector is: Maliciously crafted .wav file. The fixed version is: After commit https://github.com/dbry/WavP... | https://nvd.nist.gov/vuln/detail/CVE-2019-1010319 |
10,728 | radare2 | bbb4af56003c1afdad67af0c4339267ca38b1017 | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/bbb4af56003c1afdad67af0c4339267ca38b1017 | Fix #10294 - crash in r2_hoobr__6502_op | 1 | static int _6502_op(RAnal *anal, RAnalOp *op, ut64 addr, const ut8 *data, int len) {
char addrbuf[64];
const int buffsize = sizeof (addrbuf) - 1;
memset (op, '\0', sizeof (RAnalOp));
op->size = snes_op_get_size (1, 1, &snes_op[data[0]]); //snes-arch is similiar to nes/6502
op->addr = addr;
op->type = R_ANAL_OP_T... | 55,851,122,861,549,740,000,000,000,000,000,000,000 | anal_6502.c | 13,243,688,809,806,383,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-12322 | There is a heap out of bounds read in radare2 2.6.0 in _6502_op() in libr/anal/p/anal_6502.c via a crafted iNES ROM binary file. | https://nvd.nist.gov/vuln/detail/CVE-2018-12322 |
10,729 | yara | 992480c30f75943e9cd6245bb2015c7737f9b661 | https://github.com/VirusTotal/yara | https://github.com/VirusTotal/yara/commit/992480c30f75943e9cd6245bb2015c7737f9b661 | Fix buffer overrun (issue #678). Add assert for detecting this kind of issues earlier. | 1 | int yr_re_fast_exec(
uint8_t* code,
uint8_t* input_data,
size_t input_forwards_size,
size_t input_backwards_size,
int flags,
RE_MATCH_CALLBACK_FUNC callback,
void* callback_args,
int* matches)
{
RE_REPEAT_ANY_ARGS* repeat_any_args;
uint8_t* code_stack[MAX_FAST_RE_STACK];
uint8_t* ... | 21,370,740,863,343,675,000,000,000,000,000,000,000 | re.c | 76,461,095,669,381,760,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9465 | The yr_arena_write_data function in YARA 3.6.1 allows remote attackers to cause a denial of service (buffer over-read and application crash) or obtain sensitive information from process memory via a crafted file that is mishandled in the yr_re_fast_exec function in libyara/re.c and the _yr_scan_match_callback function ... | https://nvd.nist.gov/vuln/detail/CVE-2017-9465 |
10,730 | yara | 992480c30f75943e9cd6245bb2015c7737f9b661 | https://github.com/VirusTotal/yara | https://github.com/VirusTotal/yara/commit/992480c30f75943e9cd6245bb2015c7737f9b661 | Fix buffer overrun (issue #678). Add assert for detecting this kind of issues earlier. | 1 | int _yr_scan_match_callback(
uint8_t* match_data,
int32_t match_length,
int flags,
void* args)
{
CALLBACK_ARGS* callback_args = (CALLBACK_ARGS*) args;
YR_STRING* string = callback_args->string;
YR_MATCH* new_match;
int result = ERROR_SUCCESS;
int tidx = callback_args->context->tidx;
size_... | 24,636,487,109,590,925,000,000,000,000,000,000,000 | scan.c | 278,173,131,600,320,600,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9465 | The yr_arena_write_data function in YARA 3.6.1 allows remote attackers to cause a denial of service (buffer over-read and application crash) or obtain sensitive information from process memory via a crafted file that is mishandled in the yr_re_fast_exec function in libyara/re.c and the _yr_scan_match_callback function ... | https://nvd.nist.gov/vuln/detail/CVE-2017-9465 |
10,731 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc → gmallocn | 1 | poppler_page_prepare_output_dev (PopplerPage *page,
double scale,
int rotation,
gboolean transparent,
OutputDevData *output_dev_data)
{
CairoOutputDev *output_dev;
cairo_surface_t *surface;
double width, height;
int cairo_width, cairo_height, cairo_rowstride, rotate;
unsigned char *cairo_d... | 214,787,271,645,859,100,000,000,000,000,000,000,000 | poppler-page.cc | 38,399,974,030,661,296,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu... | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
10,734 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc → gmallocn | 1 | SplashBitmap::SplashBitmap(int widthA, int heightA, int rowPad,
SplashColorMode modeA, GBool alphaA,
GBool topDown) {
width = widthA;
height = heightA;
mode = modeA;
switch (mode) {
case splashModeMono1:
rowSize = (width + 7) >> 3;
break;
case splashModeMono8:
rowSize = width;
br... | 291,686,055,334,142,570,000,000,000,000,000,000,000 | SplashBitmap.cc | 211,881,515,219,105,400,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu... | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
10,735 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc → gmallocn | 1 | GBool SplashFTFont::makeGlyph(int c, int xFrac, int yFrac,
SplashGlyphBitmap *bitmap, int x0, int y0, SplashClip *clip, SplashClipResult *clipRes) {
SplashFTFontFile *ff;
FT_Vector offset;
FT_GlyphSlot slot;
FT_UInt gid;
int rowSize;
Guchar *p, *q;
int i;
ff = (SplashFTFontFile *)fontFile;
... | 320,507,127,576,760,400,000,000,000,000,000,000,000 | SplashFTFont.cc | 137,915,116,313,860,120,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu... | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
10,737 | qemu | 93060258ae748573ca7197204125a2670047896d | https://github.com/bonzini/qemu | https://git.qemu.org/?p=qemu.git;a=commit;h=93060258ae748573ca7197204125a2670047896d | net: vmxnet: check IP header length
Vmxnet3 device emulator when parsing packet headers does not check
for IP header length. It could lead to a OOB access when reading
further packet data. Add check to avoid it.
Reported-by: Li Qiang <liqiang6-s@360.cn>
Signed-off-by: Prasad J Pandit <pjp@fedoraproject.org>
Reviewed-... | 1 | static bool vmxnet_tx_pkt_parse_headers(struct VmxnetTxPkt *pkt)
{
struct iovec *l2_hdr, *l3_hdr;
size_t bytes_read;
size_t full_ip6hdr_len;
uint16_t l3_proto;
assert(pkt);
l2_hdr = &pkt->vec[VMXNET_TX_PKT_L2HDR_FRAG];
l3_hdr = &pkt->vec[VMXNET_TX_PKT_L3HDR_FRAG];
bytes_read = iov_to_... | 279,902,556,539,940,040,000,000,000,000,000,000,000 | vmxnet_tx_pkt.c | 137,783,482,756,033,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2016-6835 | The vmxnet_tx_pkt_parse_headers function in hw/net/vmxnet_tx_pkt.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (buffer over-read) by leveraging failure to check IP header length. | https://nvd.nist.gov/vuln/detail/CVE-2016-6835 |
10,738 | qemu | 167d97a3def77ee2dbf6e908b0ecbfe2103977db | https://github.com/bonzini/qemu | https://git.qemu.org/?p=qemu.git;a=commit;h=167d97a3def77ee2dbf6e908b0ecbfe2103977db | vmsvga: correct bitmap and pixmap size checks
When processing svga command DEFINE_CURSOR in vmsvga_fifo_run,
the computed BITMAP and PIXMAP size are checked against the
'cursor.mask[]' and 'cursor.image[]' array sizes in bytes.
Correct these checks to avoid OOB memory access.
Reported-by: Qinghao Tang <luodalongde@gm... | 1 | static void vmsvga_fifo_run(struct vmsvga_state_s *s)
{
uint32_t cmd, colour;
int args, len, maxloop = 1024;
int x, y, dx, dy, width, height;
struct vmsvga_cursor_definition_s cursor;
uint32_t cmd_start;
len = vmsvga_fifo_length(s);
while (len > 0 && --maxloop > 0) {
/* May need to ... | 133,450,826,690,414,800,000,000,000,000,000,000,000 | vmware_vga.c | 157,911,327,208,299,070,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2016-7170 | The vmsvga_fifo_run function in hw/display/vmware_vga.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to cursor.mask[] and cursor.image[] array sizes when processing a DEFINE_CURSOR svga command. | https://nvd.nist.gov/vuln/detail/CVE-2016-7170 |
10,739 | php-src | 523f230c831d7b33353203fa34aee4e92ac12bba | https://github.com/php/php-src | https://github.com/php/php-src/commit/523f230c831d7b33353203fa34aee4e92ac12bba | Fix bug #75981: prevent reading beyond buffer start | 1 | php_stream *php_stream_url_wrap_http_ex(php_stream_wrapper *wrapper,
const char *path, const char *mode, int options, char **opened_path,
php_stream_context *context, int redirect_max, int flags STREAMS_DC TSRMLS_DC) /* {{{ */
{
php_stream *stream = NULL;
php_url *resource = NULL;
int use_ssl;
int use_proxy =... | 79,315,660,875,678,490,000,000,000,000,000,000,000 | http_fopen_wrapper.c | 108,329,095,691,693,000,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-7584 | In PHP through 5.6.33, 7.0.x before 7.0.28, 7.1.x through 7.1.14, and 7.2.x through 7.2.2, there is a stack-based buffer under-read while parsing an HTTP response in the php_stream_url_wrap_http_ex function in ext/standard/http_fopen_wrapper.c. This subsequently results in copying a large string. | https://nvd.nist.gov/vuln/detail/CVE-2018-7584 |
10,740 | qemu | dd248ed7e204ee8a1873914e02b8b526e8f1b80d | https://github.com/bonzini/qemu | http://git.qemu.org/?p=qemu.git;a=commitdiff;h=dd248ed7e204ee8a1873914e02b8b526e8f1b80d | virtio-gpu: fix memory leak in set scanout
In virtio_gpu_set_scanout function, when creating the 'rect'
its refcount is set to 2, by pixman_image_create_bits and
qemu_create_displaysurface_pixman function. This can lead
a memory leak issues. This patch avoid this issue.
Signed-off-by: Li Qiang <liqiang6-s@360.cn>
Rev... | 1 | static void virtio_gpu_set_scanout(VirtIOGPU *g,
struct virtio_gpu_ctrl_command *cmd)
{
struct virtio_gpu_simple_resource *res;
struct virtio_gpu_scanout *scanout;
pixman_format_code_t format;
uint32_t offset;
int bpp;
struct virtio_gpu_set_scanout ss;
VIR... | 280,786,379,160,405,420,000,000,000,000,000,000,000 | virtio-gpu.c | 35,023,000,979,426,380,000,000,000,000,000,000,000 | [
"CWE-772"
] | CVE-2017-9060 | Memory leak in the virtio_gpu_set_scanout function in hw/display/virtio-gpu.c in QEMU (aka Quick Emulator) allows local guest OS users to cause a denial of service (memory consumption) via a large number of "VIRTIO_GPU_CMD_SET_SCANOUT:" commands. | https://nvd.nist.gov/vuln/detail/CVE-2017-9060 |
10,741 | pngquant | b7c217680cda02dddced245d237ebe8c383be285 | https://github.com/pornel/pngquant | https://github.com/pornel/pngquant/commit/b7c217680cda02dddced245d237ebe8c383be285 | Fix integer overflow in rwpng.h (CVE-2016-5735)
Reported by Choi Jaeseung
Found with Sparrow (http://ropas.snu.ac.kr/sparrow) | 1 | static pngquant_error rwpng_read_image24_libpng(FILE *infile, png24_image *mainprog_ptr, int verbose)
{
png_structp png_ptr = NULL;
png_infop info_ptr = NULL;
png_size_t rowbytes;
int color_type, bit_depth;
png_ptr = png_create_read_struct(PNG_LIBPNG_VER_STRING, mainprog_ptr,
r... | 205,294,190,601,256,360,000,000,000,000,000,000,000 | rwpng.c | 147,508,917,339,336,730,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2016-5735 | Integer overflow in the rwpng_read_image24_libpng function in rwpng.c in pngquant 2.7.0 allows remote attackers to have unspecified impact via a crafted PNG file, which triggers a buffer overflow. | https://nvd.nist.gov/vuln/detail/CVE-2016-5735 |
10,742 | libav | 0a49a62f998747cfa564d98d36a459fe70d3299b | https://github.com/libav/libav | https://git.libav.org/?p=libav.git;a=commitdiff;h=0a49a62f998747cfa564d98d36a459fe70d3299b | h263: Always check both dimensions
CC: libav-stable@libav.org
Found-By: ago@gentoo.org | 1 | int ff_h263_decode_picture_header(MpegEncContext *s)
{
int format, width, height, i;
uint32_t startcode;
align_get_bits(&s->gb);
startcode= get_bits(&s->gb, 22-8);
for(i= get_bits_left(&s->gb); i>24; i-=8) {
startcode = ((startcode << 8) | get_bits(&s->gb, 8)) & 0x003FFFFF;
if(st... | 197,626,158,404,532,300,000,000,000,000,000,000,000 | ituh263dec.c | 237,581,302,495,997,000,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2015-5479 | The ff_h263_decode_mba function in libavcodec/ituh263dec.c in Libav before 11.5 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a file with crafted dimensions. | https://nvd.nist.gov/vuln/detail/CVE-2015-5479 |
10,743 | qemu | 3a15cc0e1ee7168db0782133d2607a6bfa422d66 | https://github.com/bonzini/qemu | https://git.qemu.org/?p=qemu.git;a=commit;h=3a15cc0e1ee7168db0782133d2607a6bfa422d66 | net: stellaris_enet: check packet length against receive buffer
When receiving packets over Stellaris ethernet controller, it
uses receive buffer of size 2048 bytes. In case the controller
accepts large(MTU) packets, it could lead to memory corruption.
Add check to avoid it.
Reported-by: Oleksandr Bazhaniuk <oleksand... | 1 | static ssize_t stellaris_enet_receive(NetClientState *nc, const uint8_t *buf, size_t size)
{
stellaris_enet_state *s = qemu_get_nic_opaque(nc);
int n;
uint8_t *p;
uint32_t crc;
if ((s->rctl & SE_RCTL_RXEN) == 0)
return -1;
if (s->np >= 31) {
return 0;
}
DPRINTF("Receive... | 96,844,957,878,192,260,000,000,000,000,000,000,000 | stellaris_enet.c | 222,717,703,653,803,500,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2016-4001 | Buffer overflow in the stellaris_enet_receive function in hw/net/stellaris_enet.c in QEMU, when the Stellaris ethernet controller is configured to accept large packets, allows remote attackers to cause a denial of service (QEMU crash) via a large packet. | https://nvd.nist.gov/vuln/detail/CVE-2016-4001 |
10,744 | qemu | a6b3167fa0e825aebb5a7cd8b437b6d41584a196 | https://github.com/bonzini/qemu | https://git.qemu.org/?p=qemu.git;a=commit;h=a6b3167fa0e825aebb5a7cd8b437b6d41584a196 | block/iscsi: avoid potential overflow of acb->task->cdb
at least in the path via virtio-blk the maximum size is not
restricted.
Cc: qemu-stable@nongnu.org
Signed-off-by: Peter Lieven <pl@kamp.de>
Message-Id: <1464080368-29584-1-git-send-email-pl@kamp.de>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com> | 1 | static BlockAIOCB *iscsi_aio_ioctl(BlockDriverState *bs,
unsigned long int req, void *buf,
BlockCompletionFunc *cb, void *opaque)
{
IscsiLun *iscsilun = bs->opaque;
struct iscsi_context *iscsi = iscsilun->iscsi;
struct iscsi_data data;
IscsiAIOCB *acb;
acb = qemu_aio_get(&iscsi_aioc... | 281,431,584,605,820,930,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-5126 | Heap-based buffer overflow in the iscsi_aio_ioctl function in block/iscsi.c in QEMU allows local guest OS users to cause a denial of service (QEMU process crash) or possibly execute arbitrary code via a crafted iSCSI asynchronous I/O ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2016-5126 |
10,745 | FFmpeg | ed188f6dcdf0935c939ed813cf8745d50742014b | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/ed188f6dcdf0935c939ed813cf8745d50742014b | avformat/aadec: Check for scanf() failure
Fixes: use of uninitialized variables
Fixes: blank.aa
Found-by: Chamal De Silva <chamal.desilva@gmail.com>
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 1 | static int aa_read_header(AVFormatContext *s)
{
int i, j, idx, largest_idx = -1;
uint32_t nkey, nval, toc_size, npairs, header_seed = 0, start;
char key[128], val[128], codec_name[64] = {0};
uint8_t output[24], dst[8], src[8];
int64_t largest_size = -1, current_size = -1, chapter_pos;
struct toc... | 62,314,827,938,333,340,000,000,000,000,000,000,000 | aadec.c | 278,941,088,614,423,300,000,000,000,000,000,000,000 | [
"CWE-665"
] | CVE-2019-12730 | aa_read_header in libavformat/aadec.c in FFmpeg before 3.2.14 and 4.x before 4.1.4 does not check for sscanf failure and consequently allows use of uninitialized variables. | https://nvd.nist.gov/vuln/detail/CVE-2019-12730 |
10,746 | samba | b000da128b5fb519d2d3f2e7fd20e4a25b7dae7d | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commit;h=b000da128b5fb519d2d3f2e7fd20e4a25b7dae7d | CVE-2015-8467: samdb: Match MS15-096 behaviour for userAccountControl
Swapping between account types is now restricted
Bug: https://bugzilla.samba.org/show_bug.cgi?id=11552
Signed-off-by: Andrew Bartlett <abartlet@samba.org>
Reviewed-by: Jeremy Allison <jra@samba.org>
Reviewed-by: Ralph Boehme <slow@samba.org> | 1 | static int samldb_check_user_account_control_acl(struct samldb_ctx *ac,
struct dom_sid *sid,
uint32_t user_account_control,
uint32_t user_account_control_old)
{
int i, ret = 0;
bool need_acl_check = false;
struct ldb_result *res;
const char * const sd_attrs[] = {"ntSecurityDescriptor", NULL};
... | 59,441,307,753,859,120,000,000,000,000,000,000,000 | samldb.c | 318,825,023,360,728,400,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2015-8467 | The samldb_check_user_account_control_acl function in dsdb/samdb/ldb_modules/samldb.c in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3 does not properly check for administrative privileges during creation of machine accounts, which allows remote authenticated users to bypass intended access restri... | https://nvd.nist.gov/vuln/detail/CVE-2015-8467 |
10,747 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 1 | static void reds_handle_ticket(void *opaque)
{
RedLinkInfo *link = (RedLinkInfo *)opaque;
char password[SPICE_MAX_PASSWORD_LENGTH];
time_t ltime;
//todo: use monotonic time
time(<ime);
RSA_private_decrypt(link->tiTicketing.rsa_size,
link->tiTicketing.encrypted_ticket.e... | 18,934,837,448,161,983,000,000,000,000,000,000,000 | reds.c | 322,336,886,463,452,100,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
10,748 | qemu | eea750a5623ddac7a61982eec8f1c93481857578 | https://github.com/bonzini/qemu | http://git.qemu.org/?p=qemu.git;a=commit;h=eea750a5623ddac7a61982eec8f1c93481857578 | virtio-net: out-of-bounds buffer write on invalid state load
CVE-2013-4150 QEMU 1.5.0 out-of-bounds buffer write in
virtio_net_load()@hw/net/virtio-net.c
This code is in hw/net/virtio-net.c:
if (n->max_queues > 1) {
if (n->max_queues != qemu_get_be16(f)) {
error_report("virtio-net: different ... | 1 | static int virtio_net_load(QEMUFile *f, void *opaque, int version_id)
{
VirtIONet *n = opaque;
VirtIODevice *vdev = VIRTIO_DEVICE(n);
int ret, i, link_down;
if (version_id < 2 || version_id > VIRTIO_NET_VM_VERSION)
return -EINVAL;
ret = virtio_load(vdev, f);
if (ret) {
return r... | 279,963,136,302,441,130,000,000,000,000,000,000,000 | virtio-net.c | 191,493,264,050,525,200,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4150 | The virtio_net_load function in hw/net/virtio-net.c in QEMU 1.5.0 through 1.7.x before 1.7.2 allows remote attackers to cause a denial of service or possibly execute arbitrary code via vectors in which the value of curr_queues is greater than max_queues, which triggers an out-of-bounds write. | https://nvd.nist.gov/vuln/detail/CVE-2013-4150 |
10,749 | Espruino | bed844f109b6c222816740555068de2e101e8018 | https://github.com/espruino/Espruino | https://github.com/espruino/Espruino/commit/bed844f109b6c222816740555068de2e101e8018 | remove strncpy usage as it's effectively useless, replace with an assertion since fn is only used internally (fix #1426) | 1 | void jslTokenAsString(int token, char *str, size_t len) {
// see JS_ERROR_TOKEN_BUF_SIZE
if (token>32 && token<128) {
assert(len>=4);
str[0] = '\'';
str[1] = (char)token;
str[2] = '\'';
str[3] = 0;
return;
}
switch (token) {
case LEX_EOF : strncpy(str, "EOF", len); return;
case LEX_... | 335,155,697,690,853,050,000,000,000,000,000,000,000 | jslex.c | 202,131,620,748,012,570,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2018-11593 | Espruino before 1.99 allows attackers to cause a denial of service (application crash) and potential Information Disclosure with a user crafted input file via a Buffer Overflow during syntax parsing because strncpy is misused in jslex.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-11593 |
10,751 | radare2 | 52b1526443c1f433087928291d1c3d37a5600515 | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/52b1526443c1f433087928291d1c3d37a5600515 | Fix crash in wasm disassembler | 1 | int wasm_dis(WasmOp *op, const unsigned char *buf, int buf_len) {
op->len = 1;
op->op = buf[0];
if (op->op > 0xbf) return 1;
// add support for extension opcodes (SIMD + atomics)
WasmOpDef *opdef = &opcodes[op->op];
switch (op->op) {
case WASM_OP_TRAP:
case WASM_OP_NOP:
case WASM_OP_ELSE:
case WASM_OP_RETURN:... | 197,820,120,957,265,730,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2017-15368 | The wasm_dis function in libr/asm/arch/wasm/wasm.c in radare2 2.0.0 allows remote attackers to cause a denial of service (stack-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted WASM file that triggers an incorrect r_hex_bin2str call. | https://nvd.nist.gov/vuln/detail/CVE-2017-15368 |
10,752 | poppler | b1026b5978c385328f2a15a2185c599a563edf91 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=b1026b5978c385328f2a15a2185c599a563edf91 | Initialize refLine totally
Fixes uninitialized memory read in 1004.pdf.asan.7.3 | 1 | int CCITTFaxStream::lookChar() {
int code1, code2, code3;
int b1i, blackPixels, i, bits;
GBool gotEOL;
if (buf != EOF) {
return buf;
}
// read the next row
if (outputBits == 0) {
// if at eof just return EOF
if (eof) {
return EOF;
}
err = gFalse;
// 2-D encoding
if (... | 280,129,395,979,896,770,000,000,000,000,000,000,000 | Stream.cc | 138,337,928,539,390,720,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-1790 | poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function. | https://nvd.nist.gov/vuln/detail/CVE-2013-1790 |
10,753 | radare2 | 224e6bc13fa353dd3b7f7a2334588f1c4229e58d | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/224e6bc13fa353dd3b7f7a2334588f1c4229e58d | Fix #10296 - Heap out of bounds read in java_switch_op() | 1 | static int java_switch_op(RAnal *anal, RAnalOp *op, ut64 addr, const ut8 *data, int len) {
ut8 op_byte = data[0];
ut64 offset = addr - java_get_method_start ();
ut8 pos = (offset+1)%4 ? 1 + 4 - (offset+1)%4 : 1;
if (op_byte == 0xaa) {
// handle a table switch condition
if (pos + 8 > len) {
return op->size;
... | 287,953,916,860,564,700,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2018-12321 | There is a heap out of bounds read in radare2 2.6.0 in java_switch_op() in libr/anal/p/anal_java.c via a crafted Java binary file. | https://nvd.nist.gov/vuln/detail/CVE-2018-12321 |
10,754 | radare2 | 66191f780863ea8c66ace4040d0d04a8842e8432 | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/66191f780863ea8c66ace4040d0d04a8842e8432 | Fix #12239 - crash in the x86.nz assembler ##asm (#12252) | 1 | static x86newTokenType getToken(const char *str, size_t *begin, size_t *end) {
// Skip whitespace
while (begin && isspace ((ut8)str[*begin])) {
++(*begin);
}
if (!str[*begin]) { // null byte
*end = *begin;
return TT_EOF;
} else if (isalpha ((ut8)str[*begin])) { // word token
*end = *begin... | 263,590,908,712,476,940,000,000,000,000,000,000,000 | asm_x86_nz.c | 190,202,613,220,381,800,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-19842 | getToken in libr/asm/p/asm_x86_nz.c in radare2 before 3.1.0 allows attackers to cause a denial of service (stack-based buffer over-read) via crafted x86 assembly data, as demonstrated by rasm2. | https://nvd.nist.gov/vuln/detail/CVE-2018-19842 |
10,755 | libav | 58b2e0f0f2fc96c1158e04f8aba95cbe6157a1a3 | https://github.com/libav/libav | https://git.libav.org/?p=libav.git;a=commit;h=58b2e0f0f2fc96c1158e04f8aba95cbe6157a1a3 | vqavideo: return error if image size is not a multiple of block size
The decoder assumes in various places that the image size
is a multiple of the block size, and there is no obvious
way to support odd sizes. Bailing out early if the header
specifies a bad size avoids various errors later on.
Fixes CVE-2012-0947.
... | 1 | static av_cold int vqa_decode_init(AVCodecContext *avctx)
{
VqaContext *s = avctx->priv_data;
int i, j, codebook_index;
s->avctx = avctx;
avctx->pix_fmt = PIX_FMT_PAL8;
/* make sure the extradata made it */
if (s->avctx->extradata_size != VQA_HEADER_SIZE) {
av_log(s->avctx, AV_LOG_ERRO... | 165,589,397,962,084,270,000,000,000,000,000,000,000 | vqavideo.c | 257,245,612,007,333,320,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2012-0947 | Heap-based buffer overflow in the vqa_decode_chunk function in the VQA codec (vqavideo.c) in libavcodec in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.6, and 0.8.x before 0.8.2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted VQA media fil... | https://nvd.nist.gov/vuln/detail/CVE-2012-0947 |
10,756 | WavPack | 070ef6f138956d9ea9612e69586152339dbefe51 | https://github.com/dbry/WavPack | https://github.com/dbry/WavPack/commit/070ef6f138956d9ea9612e69586152339dbefe51 | issue #53: error out on zero sample rate | 1 | int WavpackSetConfiguration64 (WavpackContext *wpc, WavpackConfig *config, int64_t total_samples, const unsigned char *chan_ids)
{
uint32_t flags, bps = 0;
uint32_t chan_mask = config->channel_mask;
int num_chans = config->num_channels;
int i;
wpc->stream_version = (config->flags & CONFIG_COMPATIBL... | 37,881,151,474,472,780,000,000,000,000,000,000,000 | pack_utils.c | 140,559,045,431,218,750,000,000,000,000,000,000,000 | [
"CWE-835"
] | CVE-2018-19840 | The function WavpackPackInit in pack_utils.c in libwavpack.a in WavPack through 5.1.0 allows attackers to cause a denial-of-service (resource exhaustion caused by an infinite loop) via a crafted wav audio file because WavpackSetConfiguration64 mishandles a sample rate of zero. | https://nvd.nist.gov/vuln/detail/CVE-2018-19840 |
10,757 | FFmpeg | 8df6884832ec413cf032dfaa45c23b1c7876670c | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/8df6884832ec413cf032dfaa45c23b1c7876670c | avcodec/utils: Check close before calling it
Fixes: NULL pointer dereference
Fixes: 15733/clusterfuzz-testcase-minimized-ffmpeg_AV_CODEC_ID_IDF_fuzzer-5658616977162240
Reviewed-by: Paul B Mahol <onemda@gmail.com>
Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/projects/ffmpeg
Signe... | 1 | int attribute_align_arg avcodec_open2(AVCodecContext *avctx, const AVCodec *codec, AVDictionary **options)
{
int ret = 0;
int codec_init_ok = 0;
AVDictionary *tmp = NULL;
const AVPixFmtDescriptor *pixdesc;
if (avcodec_is_open(avctx))
return 0;
if ((!codec && !avctx->codec)) {
a... | 186,955,190,953,485,440,000,000,000,000,000,000,000 | utils.c | 36,691,661,158,649,837,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2019-17539 | In FFmpeg before 4.2, avcodec_open2 in libavcodec/utils.c allows a NULL pointer dereference and possibly unspecified other impact when there is no valid close function pointer. | https://nvd.nist.gov/vuln/detail/CVE-2019-17539 |
10,758 | faad2 | 942c3e0aee748ea6fe97cb2c1aa5893225316174 | https://github.com/knik0/faad2 | https://github.com/knik0/faad2/commit/942c3e0aee748ea6fe97cb2c1aa5893225316174 | Fix a couple buffer overflows
https://hackerone.com/reports/502816
https://hackerone.com/reports/507858
https://github.com/videolan/vlc/blob/master/contrib/src/faad2/faad2-fix-overflows.patch | 1 | void faad_resetbits(bitfile *ld, int bits)
{
uint32_t tmp;
int words = bits >> 5;
int remainder = bits & 0x1F;
ld->bytes_left = ld->buffer_size - words*4;
if (ld->bytes_left >= 4)
{
tmp = getdword(&ld->start[words]);
ld->bytes_left -= 4;
} else {
tmp = getdword_n(&l... | 41,758,919,436,567,693,000,000,000,000,000,000,000 | bits.c | 144,039,870,893,866,260,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2019-15296 | An issue was discovered in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.8. The faad_resetbits function in libfaad/bits.c is affected by a buffer overflow vulnerability. The number of bits to be read is determined by ld->buffer_size - words*4, cast to uint32. If ld->buffer_size - words*4 is negative, a buffer overflow ... | https://nvd.nist.gov/vuln/detail/CVE-2019-15296 |
10,760 | poppler | 8b6dc55e530b2f5ede6b9dfb64aafdd1d5836492 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=8b6dc55e530b2f5ede6b9dfb64aafdd1d5836492 | Fix invalid memory access in 1150.pdf.asan.8.69 | 1 | SplashPath *Splash::makeDashedPath(SplashPath *path) {
SplashPath *dPath;
SplashCoord lineDashTotal;
SplashCoord lineDashStartPhase, lineDashDist, segLen;
SplashCoord x0, y0, x1, y1, xa, ya;
GBool lineDashStartOn, lineDashOn, newPath;
int lineDashStartIdx, lineDashIdx;
int i, j, k;
lineDashTotal = 0;
... | 112,288,227,865,298,480,000,000,000,000,000,000,000 | Splash.cc | 318,374,184,463,754,600,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-1788 | poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors that trigger an "invalid memory access" in (1) splash/Splash.cc, (2) poppler/Function.cc, and (3) poppler/Stream.cc. | https://nvd.nist.gov/vuln/detail/CVE-2013-1788 |
10,761 | capstone | 87a25bb543c8e4c09b48d4b4a6c7db31ce58df06 | https://github.com/aquynh/capstone | https://github.com/aquynh/capstone/commit/87a25bb543c8e4c09b48d4b4a6c7db31ce58df06 | x86: fast path checking for X86_insn_reg_intel() | 1 | x86_reg X86_insn_reg_intel(unsigned int id, enum cs_ac_type *access)
{
unsigned int first = 0;
unsigned int last = ARR_SIZE(insn_regs_intel) - 1;
unsigned int mid = ARR_SIZE(insn_regs_intel) / 2;
if (!intel_regs_sorted) {
memcpy(insn_regs_intel_sorted, insn_regs_intel,
sizeof(insn_regs_intel_sorted));
qsor... | 314,014,179,055,219,480,000,000,000,000,000,000,000 | X86Mapping.c | 223,710,474,603,118,000,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2016-7151 | Capstone 3.0.4 has an out-of-bounds vulnerability (SEGV caused by a read memory access) in X86_insn_reg_intel in arch/X86/X86Mapping.c. | https://nvd.nist.gov/vuln/detail/CVE-2016-7151 |
10,762 | FFmpeg | ed22dc22216f74c75ee7901f82649e1ff725ba50 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/ed22dc22216f74c75ee7901f82649e1ff725ba50 | avformat/movenc: Check that frame_types other than EAC3_FRAME_TYPE_INDEPENDENT have a supported substream id
Fixes: out of array access
Fixes: ffmpeg_bof_1.avi
Found-by: Thuan Pham, Marcel Böhme, Andrew Santosa and Alexandru Razvan Caciulescu with AFLSmart
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 1 | static int handle_eac3(MOVMuxContext *mov, AVPacket *pkt, MOVTrack *track)
{
AC3HeaderInfo *hdr = NULL;
struct eac3_info *info;
int num_blocks, ret;
if (!track->eac3_priv && !(track->eac3_priv = av_mallocz(sizeof(*info))))
return AVERROR(ENOMEM);
info = track->eac3_priv;
if (avpriv_ac3... | 94,813,621,897,229,420,000,000,000,000,000,000,000 | movenc.c | 10,914,575,145,131,144,000,000,000,000,000,000,000 | [
"CWE-129"
] | CVE-2018-13302 | In FFmpeg 4.0.1, improper handling of frame types (other than EAC3_FRAME_TYPE_INDEPENDENT) that have multiple independent substreams in the handle_eac3 function in libavformat/movenc.c may trigger an out-of-array access while converting a crafted AVI file to MPEG4, leading to a denial of service or possibly unspecified... | https://nvd.nist.gov/vuln/detail/CVE-2018-13302 |
10,763 | virglrenderer | 6eb13f7a2dcf391ec9e19b4c2a79e68305f63c22 | https://gitlab.freedesktop.org/virgl/virglrenderer | https://cgit.freedesktop.org/virglrenderer/commit/?id=6eb13f7a2dcf391ec9e19b4c2a79e68305f63c22 | vrend: fix memory leak in int blit context
The 'blit_ctx->initialised' is not setted to true.
Every time init blit context, it will create a new
'blit_ctx->gl_context' thus causing a memory leak.
This patch avoid this.
Signed-off-by: Li Qiang <liq3ea@gmail.com>
Signed-off-by: Dave Airlie <airlied@redhat.com> | 1 | static void vrend_renderer_init_blit_ctx(struct vrend_blitter_ctx *blit_ctx)
{
struct virgl_gl_ctx_param ctx_params;
int i;
if (blit_ctx->initialised) {
vrend_clicbs->make_current(0, blit_ctx->gl_context);
return;
}
ctx_params.shared = true;
ctx_params.major_ver = VREND_GL_VER_MAJOR;
c... | 81,858,904,308,721,850,000,000,000,000,000,000,000 | vrend_blitter.c | 269,551,575,942,070,470,000,000,000,000,000,000,000 | [
"CWE-772"
] | CVE-2017-5993 | Memory leak in the vrend_renderer_init_blit_ctx function in vrend_blitter.c in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (host memory consumption) via a large number of VIRGL_CCMD_BLIT commands. | https://nvd.nist.gov/vuln/detail/CVE-2017-5993 |
10,764 | radare2 | ad55822430a03fe075221b543efb434567e9e431 | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/ad55822430a03fe075221b543efb434567e9e431 | Fix #6836 - oob write in dex | 1 | static void dex_parse_debug_item(RBinFile *binfile, RBinDexObj *bin,
RBinDexClass *c, int MI, int MA, int paddr, int ins_size,
int insns_size, char *class_name, int regsz,
int debug_info_off) {
struct r_bin_t *rbin = binfile->rbin;
const ut8 *p4 = r_buf_get_at (binfile->buf, debug_info_off, NULL);
... | 248,508,498,085,489,930,000,000,000,000,000,000,000 | bin_dex.c | 330,647,830,799,263,530,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-6319 | The dex_parse_debug_item function in libr/bin/p/bin_dex.c in radare2 1.2.1 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted DEX file. | https://nvd.nist.gov/vuln/detail/CVE-2017-6319 |
10,765 | qemu | 0be839a2701369f669532ea5884c15bead1c6e08 | https://github.com/bonzini/qemu | http://git.qemu.org/?p=qemu.git;a=commit;h=0be839a2701369f669532ea5884c15bead1c6e08 | migration: fix parameter validation on ram load
During migration, the values read from migration stream during ram load
are not validated. Especially offset in host_from_stream_offset() and
also the length of the writes in the callers of said function.
To fix this, we need to make sure that the [offset, offset + leng... | 1 | static inline void *host_from_stream_offset(QEMUFile *f,
ram_addr_t offset,
int flags)
{
static RAMBlock *block = NULL;
char id[256];
uint8_t len;
if (flags & RAM_SAVE_FLAG_CONTINUE) {
if (!block) {
... | 210,208,517,146,366,460,000,000,000,000,000,000,000 | arch_init.c | 288,153,132,893,003,240,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2014-7840 | The host_from_stream_offset function in arch_init.c in QEMU, when loading RAM during migration, allows remote attackers to execute arbitrary code via a crafted (1) offset or (2) length value in savevm data. | https://nvd.nist.gov/vuln/detail/CVE-2014-7840 |
10,766 | qemu | 362786f14a753d8a5256ef97d7c10ed576d6572b | https://github.com/bonzini/qemu | https://git.qemu.org/?p=qemu.git;a=commitdiff;h=362786f14a753d8a5256ef97d7c10ed576d6572b | net: check packet payload length
While computing IP checksum, 'net_checksum_calculate' reads
payload length from the packet. It could exceed the given 'data'
buffer size. Add a check to avoid it.
Reported-by: Liu Ling <liuling-it@360.cn>
Signed-off-by: Prasad J Pandit <pjp@fedoraproject.org>
Signed-off-by: Jason Wang... | 1 | void net_checksum_calculate(uint8_t *data, int length)
{
int hlen, plen, proto, csum_offset;
uint16_t csum;
if ((data[14] & 0xf0) != 0x40)
return; /* not IPv4 */
hlen = (data[14] & 0x0f) * 4;
plen = (data[16] << 8 | data[17]) - hlen;
proto = data[23];
switch (proto) {
case PROTO_TCP... | 8,961,402,814,564,434,000,000,000,000,000,000,000 | checksum.c | 322,468,048,645,822,800,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2016-2857 | The net_checksum_calculate function in net/checksum.c in QEMU allows local guest OS users to cause a denial of service (out-of-bounds heap read and crash) via the payload length in a crafted packet. | https://nvd.nist.gov/vuln/detail/CVE-2016-2857 |
10,767 | qemu | ead7a57df37d2187813a121308213f41591bd811 | https://github.com/bonzini/qemu | http://git.qemu.org/?p=qemu.git;a=commit;h=ead7a57df37d2187813a121308213f41591bd811 | ssd0323: fix buffer overun on invalid state load
CVE-2013-4538
s->cmd_len used as index in ssd0323_transfer() to store 32-bit field.
Possible this field might then be supplied by guest to overwrite a
return addr somewhere. Same for row/col fields, which are indicies into
framebuffer array.
To fix validate after load... | 1 | static int ssd0323_load(QEMUFile *f, void *opaque, int version_id)
{
SSISlave *ss = SSI_SLAVE(opaque);
ssd0323_state *s = (ssd0323_state *)opaque;
int i;
if (version_id != 1)
return -EINVAL;
s->cmd_len = qemu_get_be32(f);
s->cmd = qemu_get_be32(f);
for (i = 0; i < 8; i++)
s... | 195,120,517,621,946,700,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2013-4538 | Multiple buffer overflows in the ssd0323_load function in hw/display/ssd0323.c in QEMU before 1.7.2 allow remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via crafted (1) cmd_len, (2) row, or (3) col values; (4) row_start and row_end values; or (5) col_star and col_en... | https://nvd.nist.gov/vuln/detail/CVE-2013-4538 |
10,768 | capstone | 6fe86eef621b9849f51a5e1e5d73258a93440403 | https://github.com/aquynh/capstone | https://github.com/aquynh/capstone/commit/6fe86eef621b9849f51a5e1e5d73258a93440403 | provide a validity check to prevent against Integer overflow conditions (#870)
* provide a validity check to prevent against Integer overflow conditions
* fix some style issues. | 1 | void * CAPSTONE_API cs_winkernel_malloc(size_t size)
{
// Disallow zero length allocation because they waste pool header space and,
// in many cases, indicate a potential validation issue in the calling code.
NT_ASSERT(size);
// FP; a use of NonPagedPool is required for Windows 7 support
#pragma prefast(suppress :... | 132,932,202,241,765,970,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2017-6952 | Integer overflow in the cs_winkernel_malloc function in winkernel_mm.c in Capstone 3.0.4 and earlier allows attackers to cause a denial of service (heap-based buffer overflow in a kernel driver) or possibly have unspecified other impact via a large value. | https://nvd.nist.gov/vuln/detail/CVE-2017-6952 |
10,769 | netdata | 92327c9ec211bd1616315abcb255861b130b97ca | https://github.com/netdata/netdata | https://github.com/netdata/netdata/commit/92327c9ec211bd1616315abcb255861b130b97ca | fixed vulnerabilities identified by red4sec.com (#4521) | 1 | inline int web_client_api_request_v1_data(RRDHOST *host, struct web_client *w, char *url) {
debug(D_WEB_CLIENT, "%llu: API v1 data with URL '%s'", w->id, url);
int ret = 400;
BUFFER *dimensions = NULL;
buffer_flush(w->response.data);
char *google_version = "0.6",
*google_reqId = "0... | 53,029,324,079,806,850,000,000,000,000,000,000,000 | web_api_v1.c | 63,923,686,889,514,750,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2018-18839 | An issue was discovered in Netdata 1.10.0. Full Path Disclosure (FPD) exists via api/v1/alarms. NOTE: the vendor says "is intentional. | https://nvd.nist.gov/vuln/detail/CVE-2018-18839 |
10,771 | Espruino | c36d30529118aa049797db43f111ddad468aad29 | https://github.com/espruino/Espruino | https://github.com/espruino/Espruino/commit/c36d30529118aa049797db43f111ddad468aad29 | Fix stack overflow if void void void... is repeated many times (fix #1434) | 1 | NO_INLINE JsVar *jspeFactor() {
if (lex->tk==LEX_ID) {
JsVar *a = jspGetNamedVariable(jslGetTokenValueAsString(lex));
JSP_ASSERT_MATCH(LEX_ID);
#ifndef SAVE_ON_FLASH
if (lex->tk==LEX_TEMPLATE_LITERAL)
jsExceptionHere(JSET_SYNTAXERROR, "Tagged template literals not supported");
else if (lex->tk==... | 59,713,758,321,053,350,000,000,000,000,000,000,000 | jsparse.c | 60,267,210,341,651,270,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-11594 | Espruino before 1.99 allows attackers to cause a denial of service (application crash) with a user crafted input file via a Buffer Overflow during syntax parsing of "VOID" tokens in jsparse.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-11594 |
10,772 | poppler | 39d140bfc0b8239bdd96d6a55842034ae5c05473 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=39d140bfc0b8239bdd96d6a55842034ae5c05473 | Fix crash in broken pdf (code < 0)
Found thanks to PDF provided by Joel Voss of Leviathan Security Group | 1 | void FoFiType1::parse() {
char *line, *line1, *p, *p2;
char buf[256];
char c;
int n, code, i, j;
char *tokptr;
for (i = 1, line = (char *)file;
i <= 100 && line && (!name || !encoding);
++i) {
// get font name
if (!name && !strncmp(line, "/FontName", 9)) {
strncpy(buf, line, 25... | 212,676,828,599,961,000,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2010-3704 | The FoFiType1::parse function in fofi/FoFiType1.cc in the PDF parser in xpdf before 3.02pl5, poppler 0.8.7 and possibly other versions up to 0.15.1, kdegraphics, and possibly other products allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a PDF file with a ... | https://nvd.nist.gov/vuln/detail/CVE-2010-3704 |
10,773 | qemu | bf25983345ca44aec3dd92c57142be45452bd38a | https://github.com/bonzini/qemu | https://git.qemu.org/?p=qemu.git;a=commit;h=bf25983345ca44aec3dd92c57142be45452bd38a | cirrus: don't overflow CirrusVGAState->cirrus_bltbuf
This is CVE-2014-8106.
Signed-off-by: Gerd Hoffmann <kraxel@redhat.com> | 1 | static bool blit_is_unsafe(struct CirrusVGAState *s)
{
/* should be the case, see cirrus_bitblt_start */
assert(s->cirrus_blt_width > 0);
assert(s->cirrus_blt_height > 0);
if (blit_region_is_unsafe(s, s->cirrus_blt_dstpitch,
s->cirrus_blt_dstaddr & s->cirrus_addr_mask)) {
... | 24,989,570,285,750,455,000,000,000,000,000,000,000 | cirrus_vga.c | 74,911,260,684,549,020,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2014-8106 | Heap-based buffer overflow in the Cirrus VGA emulator (hw/display/cirrus_vga.c) in QEMU before 2.2.0 allows local guest users to execute arbitrary code via vectors related to blit regions. NOTE: this vulnerability exists because an incomplete fix for CVE-2007-1320. | https://nvd.nist.gov/vuln/detail/CVE-2014-8106 |
10,774 | poppler | 957aa252912cde85d76c41e9710b33425a82b696 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=957aa252912cde85d76c41e9710b33425a82b696 | Fix invalid memory accesses in 1091.pdf.asan.72.42 | 1 | void Splash::scaleMaskYdXu(SplashImageMaskSource src, void *srcData,
int srcWidth, int srcHeight,
int scaledWidth, int scaledHeight,
SplashBitmap *dest) {
Guchar *lineBuf;
Guint *pixBuf;
Guint pix;
Guchar *destPtr;
int yp, yq, xp, xq, yt, y, yStep, xt, x, xStep, d;
int i, j;
// Bresenha... | 313,979,367,089,057,100,000,000,000,000,000,000,000 | Splash.cc | 186,046,208,096,924,120,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-1788 | poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors that trigger an "invalid memory access" in (1) splash/Splash.cc, (2) poppler/Function.cc, and (3) poppler/Stream.cc. | https://nvd.nist.gov/vuln/detail/CVE-2013-1788 |
10,775 | file | 6f737ddfadb596d7d4a993f7ed2141ffd664a81c | https://github.com/file/file | https://github.com/file/file/commit/6f737ddfadb596d7d4a993f7ed2141ffd664a81c | - reduce recursion level from 20 to 10 and make a symbolic constant for it.
- pull out the guts of saving and restoring the output buffer into functions
and take care not to overwrite the error message if an error happened. | 1 |
private int
mget(struct magic_set *ms, const unsigned char *s, struct magic *m,
size_t nbytes, size_t o, unsigned int cont_level, int mode, int text,
int flip, int recursion_level, int *printed_something,
int *need_separator, int *returnval)
{
uint32_t soffset, offset = ms->offset;
uint32_t lhs;
int rv,... | 260,682,246,970,550,750,000,000,000,000,000,000,000 | softmagic.c | 241,208,425,722,088,000,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2014-8117 | softmagic.c in file before 5.21 does not properly limit recursion, which allows remote attackers to cause a denial of service (CPU consumption or crash) via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2014-8117 |
10,776 | samba | d724f835acb9f4886c0001af32cd325dbbf1f895 | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commitdiff;h=d724f835acb9f4886c0001af32cd325dbbf1f895 | CVE-2015-5296: s3:libsmb: force signing when requiring encryption in do_connect()
BUG: https://bugzilla.samba.org/show_bug.cgi?id=11536
Signed-off-by: Stefan Metzmacher <metze@samba.org>
Reviewed-by: Jeremy Allison <jra@samba.org> | 1 | static NTSTATUS do_connect(TALLOC_CTX *ctx,
const char *server,
const char *share,
const struct user_auth_info *auth_info,
bool show_sessetup,
bool force_encrypt,
int max_protocol,
int port,
int name_type,
struct cli_state **pcli)
{
struct cli_state *c = NULL;
char *servic... | 102,913,365,890,764,230,000,000,000,000,000,000,000 | clidfs.c | 69,981,830,403,477,720,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2015-5296 | Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3 supports connections that are encrypted but unsigned, which allows man-in-the-middle attackers to conduct encrypted-to-unencrypted downgrade attacks by modifying the client-server data stream, related to clidfs.c, libsmb_server.c, and smbXcli_b... | https://nvd.nist.gov/vuln/detail/CVE-2015-5296 |
10,777 | linux | 8605330aac5a5785630aec8f64378a54891937cc | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/8605330aac5a5785630aec8f64378a54891937cc | tcp: fix SCM_TIMESTAMPING_OPT_STATS for normal skbs
__sock_recv_timestamp can be called for both normal skbs (for
receive timestamps) and for skbs on the error queue (for transmit
timestamps).
Commit 1c885808e456
(tcp: SOF_TIMESTAMPING_OPT_STATS option for SO_TIMESTAMPING)
assumes any skb passed to __sock_recv_timest... | 1 | void __sock_recv_timestamp(struct msghdr *msg, struct sock *sk,
struct sk_buff *skb)
{
int need_software_tstamp = sock_flag(sk, SOCK_RCVTSTAMP);
struct scm_timestamping tss;
int empty = 1;
struct skb_shared_hwtstamps *shhwtstamps =
skb_hwtstamps(skb);
/* Race occurred between timestamp enabling and packet
... | 161,777,901,395,312,220,000,000,000,000,000,000,000 | socket.c | 60,698,745,955,753,130,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-7277 | The TCP stack in the Linux kernel through 4.10.6 mishandles the SCM_TIMESTAMPING_OPT_STATS feature, which allows local users to obtain sensitive information from the kernel's internal socket data structures or cause a denial of service (out-of-bounds read) via crafted system calls, related to net/core/skbuff.c and net/... | https://nvd.nist.gov/vuln/detail/CVE-2017-7277 |
10,778 | linux | 8605330aac5a5785630aec8f64378a54891937cc | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/8605330aac5a5785630aec8f64378a54891937cc | tcp: fix SCM_TIMESTAMPING_OPT_STATS for normal skbs
__sock_recv_timestamp can be called for both normal skbs (for
receive timestamps) and for skbs on the error queue (for transmit
timestamps).
Commit 1c885808e456
(tcp: SOF_TIMESTAMPING_OPT_STATS option for SO_TIMESTAMPING)
assumes any skb passed to __sock_recv_timest... | 1 | */
int sock_queue_err_skb(struct sock *sk, struct sk_buff *skb)
{
if (atomic_read(&sk->sk_rmem_alloc) + skb->truesize >=
(unsigned int)sk->sk_rcvbuf)
return -ENOMEM;
skb_orphan(skb);
skb->sk = sk;
skb->destructor = sock_rmem_free;
atomic_add(skb->truesize, &sk->sk_rmem_alloc);
/* before exiting rcu sect... | 339,241,323,239,055,800,000,000,000,000,000,000,000 | skbuff.c | 201,914,970,725,584,370,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-7277 | The TCP stack in the Linux kernel through 4.10.6 mishandles the SCM_TIMESTAMPING_OPT_STATS feature, which allows local users to obtain sensitive information from the kernel's internal socket data structures or cause a denial of service (out-of-bounds read) via crafted system calls, related to net/core/skbuff.c and net/... | https://nvd.nist.gov/vuln/detail/CVE-2017-7277 |
10,780 | radare2 | 9d348bcc2c4bbd3805e7eec97b594be9febbdf9a | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/9d348bcc2c4bbd3805e7eec97b594be9febbdf9a | Fix #9943 - Invalid free on RAnal.avr | 1 | INST_HANDLER (cpse) { // CPSE Rd, Rr
int r = (buf[0] & 0xf) | ((buf[1] & 0x2) << 3);
int d = ((buf[0] >> 4) & 0xf) | ((buf[1] & 0x1) << 4);
RAnalOp next_op;
// calculate next instruction size (call recursively avr_op_analyze)
// and free next_op's esil string (we dont need it now)
avr_op_analyze (anal,
&next_... | 109,446,500,842,023,420,000,000,000,000,000,000,000 | anal_avr.c | 49,931,515,066,285,090,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2018-11383 | The r_strbuf_fini() function in radare2 2.5.0 allows remote attackers to cause a denial of service (invalid free and application crash) via a crafted ELF file because of an uninitialized variable in the CPSE handler in libr/anal/p/anal_avr.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-11383 |
10,781 | exim | 5b7a7c051c9ab9ee7c924a611f90ef2be03e0ad0 | https://github.com/Exim/exim | https://git.exim.org/exim.git/commitdiff/5b7a7c051c9ab9ee7c924a611f90ef2be03e0ad0 | SECURITY: DMARC uses From header untrusted data
CVE-2014-2957
To find the sending domain, expand_string() was used to directly parse
the contents of the From header. This passes untrusted data directly
into an internal function. Convert to use standard internal parsing
functions. | 1 | int dmarc_process() {
int sr, origin; /* used in SPF section */
int dmarc_spf_result = 0; /* stores spf into dmarc conn ctx */
pdkim_signature *sig = NULL;
BOOL has_dmarc_record = TRUE;
u_char **ruf; /* forensic report addressees, if called for */
/* ACLs have "control=dmarc_disabl... | 164,959,432,179,770,350,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2014-2957 | The dmarc_process function in dmarc.c in Exim before 4.82.1, when EXPERIMENTAL_DMARC is enabled, allows remote attackers to execute arbitrary code via the From header in an email, which is passed to the expand_string function. | https://nvd.nist.gov/vuln/detail/CVE-2014-2957 |
10,782 | qemu | e95c9a493a5a8d6f969e86c9f19f80ffe6587e19 | https://github.com/bonzini/qemu | http://git.qemu.org/?p=qemu.git;a=commit;h=e95c9a493a5a8d6f969e86c9f19f80ffe6587e19 | 9pfs: fix potential host memory leak in v9fs_read
In 9pfs read dispatch function, it doesn't free two QEMUIOVector
object thus causing potential memory leak. This patch avoid this.
Signed-off-by: Li Qiang <liqiang6-s@360.cn>
Signed-off-by: Greg Kurz <groug@kaod.org> | 1 | static void v9fs_read(void *opaque)
{
int32_t fid;
uint64_t off;
ssize_t err = 0;
int32_t count = 0;
size_t offset = 7;
uint32_t max_count;
V9fsFidState *fidp;
V9fsPDU *pdu = opaque;
V9fsState *s = pdu->s;
err = pdu_unmarshal(pdu, offset, "dqd", &fid, &off, &max_count);
if (... | 163,413,897,778,522,470,000,000,000,000,000,000,000 | 9p.c | 169,354,661,467,446,540,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2016-8577 | Memory leak in the v9fs_read function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) via vectors related to an I/O read operation. | https://nvd.nist.gov/vuln/detail/CVE-2016-8577 |
10,783 | WavPack | f68a9555b548306c5b1ee45199ccdc4a16a6101b | https://github.com/dbry/WavPack | https://github.com/dbry/WavPack/commit/f68a9555b548306c5b1ee45199ccdc4a16a6101b | issue #66: make sure CAF files have a "desc" chunk | 1 | int ParseCaffHeaderConfig (FILE *infile, char *infilename, char *fourcc, WavpackContext *wpc, WavpackConfig *config)
{
uint32_t chan_chunk = 0, channel_layout = 0, bcount;
unsigned char *channel_identities = NULL;
unsigned char *channel_reorder = NULL;
int64_t total_samples = 0, infilesize;
CAFFileH... | 118,572,273,366,970,060,000,000,000,000,000,000,000 | caff.c | 128,333,408,347,865,570,000,000,000,000,000,000,000 | [
"CWE-665"
] | CVE-2019-1010317 | WavPack 5.1.0 and earlier is affected by: CWE-457: Use of Uninitialized Variable. The impact is: Unexpected control flow, crashes, and segfaults. The component is: ParseCaffHeaderConfig (caff.c:486). The attack vector is: Maliciously crafted .wav file. The fixed version is: After commit https://github.com/dbry/WavPack/... | https://nvd.nist.gov/vuln/detail/CVE-2019-1010317 |
10,784 | linux | a0ad220c96692eda76b2e3fd7279f3dcd1d8a8ff | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a0ad220c96692eda76b2e3fd7279f3dcd1d8a8ff | Input: ims-pcu - sanity check against missing interfaces
A malicious device missing interface can make the driver oops.
Add sanity checking.
Signed-off-by: Oliver Neukum <ONeukum@suse.com>
CC: stable@vger.kernel.org
Signed-off-by: Dmitry Torokhov <dmitry.torokhov@gmail.com> | 1 |
static int ims_pcu_parse_cdc_data(struct usb_interface *intf, struct ims_pcu *pcu)
{
const struct usb_cdc_union_desc *union_desc;
struct usb_host_interface *alt;
union_desc = ims_pcu_get_cdc_union_desc(intf);
if (!union_desc)
return -EINVAL;
pcu->ctrl_intf = usb_ifnum_to_if(pcu->udev,
union_desc->bMaste... | 77,222,324,192,872,990,000,000,000,000,000,000,000 | ims-pcu.c | 301,299,678,614,062,960,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2016-3689 | The ims_pcu_parse_cdc_data function in drivers/input/misc/ims-pcu.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (system crash) via a USB device without both a master and a slave interface. | https://nvd.nist.gov/vuln/detail/CVE-2016-3689 |
10,785 | WavPack | 4bc05fc490b66ef2d45b1de26abf1455b486b0dc | https://github.com/dbry/WavPack | https://github.com/dbry/WavPack/commit/4bc05fc490b66ef2d45b1de26abf1455b486b0dc | fixes for 4 fuzz failures posted to SourceForge mailing list | 1 | static int read_new_config_info (WavpackContext *wpc, WavpackMetadata *wpmd)
{
int bytecnt = wpmd->byte_length;
unsigned char *byteptr = wpmd->data;
wpc->version_five = 1; // just having this block signals version 5.0
wpc->file_format = wpc->config.qmode = wpc->channel_layout = 0;
if (wpc->c... | 84,954,385,767,670,320,000,000,000,000,000,000,000 | open_utils.c | 316,363,060,510,470,100,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2016-10171 | The unreorder_channels function in cli/wvunpack.c in Wavpack before 5.1.0 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted WV file. | https://nvd.nist.gov/vuln/detail/CVE-2016-10171 |
10,786 | WavPack | 4bc05fc490b66ef2d45b1de26abf1455b486b0dc | https://github.com/dbry/WavPack | https://github.com/dbry/WavPack/commit/4bc05fc490b66ef2d45b1de26abf1455b486b0dc | fixes for 4 fuzz failures posted to SourceForge mailing list | 1 | int32_t FASTCALL get_word (WavpackStream *wps, int chan, int32_t *correction)
{
register struct entropy_data *c = wps->w.c + chan;
uint32_t ones_count, low, mid, high;
int32_t value;
int sign;
if (!wps->wvbits.ptr)
return WORD_EOF;
if (correction)
*correction = 0;
if (!(wp... | 189,954,028,957,454,100,000,000,000,000,000,000,000 | read_words.c | 32,055,560,853,634,266,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2016-10171 | The unreorder_channels function in cli/wvunpack.c in Wavpack before 5.1.0 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted WV file. | https://nvd.nist.gov/vuln/detail/CVE-2016-10171 |
10,787 | qemu | b53dd4495ced2432a0b652ea895e651d07336f7e | https://github.com/bonzini/qemu | https://git.qemu.org/?p=qemu.git;a=commit;h=b53dd4495ced2432a0b652ea895e651d07336f7e | usb:xhci:fix memory leak in usb_xhci_exit
If the xhci uses msix, it doesn't free the corresponding
memory, thus leading a memory leak. This patch avoid this.
Signed-off-by: Li Qiang <liqiang6-s@360.cn>
Message-id: 57d7d2e0.d4301c0a.d13e9.9a55@mx.google.com
Signed-off-by: Gerd Hoffmann <kraxel@redhat.com> | 1 | static void usb_xhci_exit(PCIDevice *dev)
{
int i;
XHCIState *xhci = XHCI(dev);
trace_usb_xhci_exit();
for (i = 0; i < xhci->numslots; i++) {
xhci_disable_slot(xhci, i + 1);
}
if (xhci->mfwrap_timer) {
timer_del(xhci->mfwrap_timer);
timer_free(xhci->mfwrap_timer);
... | 261,890,516,668,008,700,000,000,000,000,000,000,000 | hcd-xhci.c | 300,866,919,474,701,800,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2016-7466 | Memory leak in the usb_xhci_exit function in hw/usb/hcd-xhci.c in QEMU (aka Quick Emulator), when the xhci uses msix, allows local guest OS administrators to cause a denial of service (memory consumption and possibly QEMU process crash) by repeatedly unplugging a USB device. | https://nvd.nist.gov/vuln/detail/CVE-2016-7466 |
10,788 | libpcap | 617b12c0339db4891d117b661982126c495439ea | https://github.com/the-tcpdump-group/libpcap | https://github.com/the-tcpdump-group/libpcap/commit/617b12c0339db4891d117b661982126c495439ea | Calculate the reply payload length in a local variable.
Using the same variable for the remaining request length and the reply
length is confusing at best and can cause errors at worst (if the
request had extra stuff at the end, so that the variable is non-zero).
This addresses Include Security issue I8: [libpcap] Re... | 1 | daemon_msg_findallif_req(uint8 ver, struct daemon_slpars *pars, uint32 plen)
{
char errbuf[PCAP_ERRBUF_SIZE]; // buffer for network errors
char errmsgbuf[PCAP_ERRBUF_SIZE]; // buffer for errors to send to the client
char sendbuf[RPCAP_NETBUF_SIZE]; // temporary buffer in which data to be sent is buffered
int sendb... | 300,816,215,695,720,580,000,000,000,000,000,000,000 | daemon.c | 30,742,645,121,715,390,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2019-15161 | rpcapd/daemon.c in libpcap before 1.9.1 mishandles certain length values because of reuse of a variable. This may open up an attack vector involving extra data at the end of a request. | https://nvd.nist.gov/vuln/detail/CVE-2019-15161 |
10,789 | qemu | 4ffcdef4277a91af15a3c09f7d16af072c29f3f2 | https://github.com/bonzini/qemu | http://git.qemu.org/?p=qemu.git;a=commit;h=4ffcdef4277a91af15a3c09f7d16af072c29f3f2 | 9pfs: xattr: fix memory leak in v9fs_list_xattr
Free 'orig_value' in error path.
Signed-off-by: Li Qiang <liqiang6-s@360.cn>
Signed-off-by: Greg Kurz <groug@kaod.org> | 1 | ssize_t v9fs_list_xattr(FsContext *ctx, const char *path,
void *value, size_t vsize)
{
ssize_t size = 0;
void *ovalue = value;
XattrOperations *xops;
char *orig_value, *orig_value_start;
ssize_t xattr_len, parsed_len = 0, attr_len;
char *dirpath, *name;
int dirfd;
... | 296,947,472,346,732,770,000,000,000,000,000,000,000 | 9p-xattr.c | 228,116,327,888,906,060,000,000,000,000,000,000,000 | [
"CWE-772"
] | CVE-2017-8086 | Memory leak in the v9fs_list_xattr function in hw/9pfs/9p-xattr.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (memory consumption) via vectors involving the orig_value variable. | https://nvd.nist.gov/vuln/detail/CVE-2017-8086 |
10,790 | libav | ce7aee9b733134649a6ce2fa743e51733f33e67e | https://github.com/libav/libav | https://git.libav.org/?p=libav.git;a=commit;h=ce7aee9b733134649a6ce2fa743e51733f33e67e | dpcm: ignore extra unpaired bytes in stereo streams.
Fixes: CVE-2011-3951
Found-by: Mateusz "j00ru" Jurczyk and Gynvael Coldwind | 1 | static int dpcm_decode_frame(AVCodecContext *avctx, void *data,
int *got_frame_ptr, AVPacket *avpkt)
{
const uint8_t *buf = avpkt->data;
int buf_size = avpkt->size;
const uint8_t *buf_end = buf + buf_size;
DPCMContext *s = avctx->priv_data;
int out = 0, ret;
int pred... | 37,165,043,090,743,030,000,000,000,000,000,000,000 | dpcm.c | 233,708,027,832,503,570,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3951 | The dpcm_decode_frame function in dpcm.c in libavcodec in FFmpeg before 0.10 and in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.6, and 0.8.x before 0.8.1 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted stereo stream in a media... | https://nvd.nist.gov/vuln/detail/CVE-2011-3951 |
10,791 | linux | ea04efee7635c9120d015dcdeeeb6988130cb67a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/ea04efee7635c9120d015dcdeeeb6988130cb67a | Input: ims-psu - check if CDC union descriptor is sane
Before trying to use CDC union descriptor, try to validate whether that it
is sane by checking that intf->altsetting->extra is big enough and that
descriptor bLength is not too big and not too small.
Reported-by: Andrey Konovalov <andreyknvl@google.com>
Signed-of... | 1 | static const struct usb_cdc_union_desc *
ims_pcu_get_cdc_union_desc(struct usb_interface *intf)
{
const void *buf = intf->altsetting->extra;
size_t buflen = intf->altsetting->extralen;
struct usb_cdc_union_desc *union_desc;
if (!buf) {
dev_err(&intf->dev, "Missing descriptor data\n");
return NULL;
}
if (!bu... | 205,163,903,394,648,750,000,000,000,000,000,000,000 | ims-pcu.c | 276,473,746,066,141,500,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-16645 | The ims_pcu_get_cdc_union_desc function in drivers/input/misc/ims-pcu.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (ims_pcu_parse_cdc_data out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device. | https://nvd.nist.gov/vuln/detail/CVE-2017-16645 |
10,792 | gstreamer | 566583e87147f774e7fc4c78b5f7e61d427e40a9 | https://github.com/GStreamer/gstreamer | https://cgit.freedesktop.org/gstreamer/gst-plugins-base/commit/?id=566583e87147f774e7fc4c78b5f7e61d427e40a9 | vorbistag: Protect memory allocation calculation from overflow.
Patch by: Tomas Hoger <thoger@redhat.com> Fixes CVE-2009-0586 | 1 | gst_vorbis_tag_add_coverart (GstTagList * tags, const gchar * img_data_base64,
gint base64_len)
{
GstBuffer *img;
guchar *img_data;
gsize img_len;
guint save = 0;
gint state = 0;
if (base64_len < 2)
goto not_enough_data;
img_data = g_try_malloc0 (base64_len * 3 / 4);
if (img_data == NULL)
... | 146,313,219,496,584,400,000,000,000,000,000,000,000 | gstvorbistag.c | 211,094,231,011,375,400,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-0586 | Integer overflow in the gst_vorbis_tag_add_coverart function (gst-libs/gst/tag/gstvorbistag.c) in vorbistag in gst-plugins-base (aka gstreamer-plugins-base) before 0.10.23 in GStreamer allows context-dependent attackers to execute arbitrary code via a crafted COVERART tag that is converted from a base64 representation,... | https://nvd.nist.gov/vuln/detail/CVE-2009-0586 |
10,793 | qemu | 070c4b92b8cd5390889716677a0b92444d6e087a | https://github.com/bonzini/qemu | https://git.qemu.org/?p=qemu.git;a=commit;h=070c4b92b8cd5390889716677a0b92444d6e087a | net: mcf: limit buffer descriptor count
ColdFire Fast Ethernet Controller uses buffer descriptors to manage
data flow to/fro receive & transmit queues. While transmitting
packets, it could continue to read buffer descriptors if a buffer
descriptor has length of zero and has crafted values in bd.flags.
Set upper limit ... | 1 | static void mcf_fec_do_tx(mcf_fec_state *s)
{
uint32_t addr;
mcf_fec_bd bd;
int frame_size;
int len;
uint8_t frame[FEC_MAX_FRAME_SIZE];
uint8_t *ptr;
DPRINTF("do_tx\n");
ptr = frame;
frame_size = 0;
addr = s->tx_descriptor;
while (1) {
mcf_fec_read_bd(&bd, addr);
... | 39,214,142,760,099,140,000,000,000,000,000,000,000 | mcf_fec.c | 198,260,955,982,896,700,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2016-7908 | The mcf_fec_do_tx function in hw/net/mcf_fec.c in QEMU (aka Quick Emulator) does not properly limit the buffer descriptor count when transmitting packets, which allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via vectors involving a buffer descriptor with a lengt... | https://nvd.nist.gov/vuln/detail/CVE-2016-7908 |
10,794 | xserver | 5725849a1b427cd4a72b84e57f211edb35838718 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/render/render.c?id=5725849a1b427cd4a72b84e57f211edb35838718 | render: Bounds check for nglyphs in ProcRenderAddGlyphs (#28801)
Signed-off-by: Adam Jackson <ajax@redhat.com>
Reviewed-by: Julien Cristau <jcristau@debian.org>
Signed-off-by: Keith Packard <keithp@keithp.com> | 1 | ProcRenderAddGlyphs (ClientPtr client)
{
GlyphSetPtr glyphSet;
REQUEST(xRenderAddGlyphsReq);
GlyphNewRec glyphsLocal[NLOCALGLYPH];
GlyphNewPtr glyphsBase, glyphs, glyph_new;
int remain, nglyphs;
CARD32 *gids;
xGlyphInfo *gi;
CARD8 *bits;
unsigned int s... | 1,204,159,738,485,995,000,000,000,000,000,000,000 | render.c | 107,649,397,098,920,510,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2010-4819 | The ProcRenderAddGlyphs function in the Render extension (render/render.c) in X.Org xserver 1.7.7 and earlier allows local users to read arbitrary memory and possibly cause a denial of service (server crash) via unspecified vectors related to an "input sanitization flaw." | https://nvd.nist.gov/vuln/detail/CVE-2010-4819 |
10,795 | FFmpeg | 2080bc33717955a0e4268e738acf8c1eeddbf8cb | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/2080bc33717955a0e4268e738acf8c1eeddbf8cb | avcodec/utils: correct align value for interplay
Fixes out of array access
Fixes: 452/fuzz-1-ffmpeg_VIDEO_AV_CODEC_ID_INTERPLAY_VIDEO_fuzzer
Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/targets/ffmpeg
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 1 | void avcodec_align_dimensions2(AVCodecContext *s, int *width, int *height,
int linesize_align[AV_NUM_DATA_POINTERS])
{
int i;
int w_align = 1;
int h_align = 1;
AVPixFmtDescriptor const *desc = av_pix_fmt_desc_get(s->pix_fmt);
if (desc) {
w_align = 1 << desc->l... | 327,181,451,425,415,020,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2017-7865 | FFmpeg before 2017-01-24 has an out-of-bounds write caused by a heap-based buffer overflow related to the ipvideo_decode_block_opcode_0xA function in libavcodec/interplayvideo.c and the avcodec_align_dimensions2 function in libavcodec/utils.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-7865 |
10,796 | radare2 | 9b46d38dd3c4de6048a488b655c7319f845af185 | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/9b46d38dd3c4de6048a488b655c7319f845af185 | Fix #12372 and #12373 - Crash in x86 assembler (#12380)
0 ,0,[bP-bL-bP-bL-bL-r-bL-bP-bL-bL-
mov ,0,[ax+Bx-ax+Bx-ax+ax+Bx-ax+Bx--
leA ,0,[bP-bL-bL-bP-bL-bP-bL-60@bL-
leA ,0,[bP-bL-r-bP-bL-bP-bL-60@bL-
mov ,0,[ax+Bx-ax+Bx-ax+ax+Bx-ax+Bx-- | 1 | static int parseOperand(RAsm *a, const char *str, Operand *op, bool isrepop) {
size_t pos, nextpos = 0;
x86newTokenType last_type;
int size_token = 1;
bool explicit_size = false;
int reg_index = 0;
// Reset type
op->type = 0;
// Consume tokens denoting the operand size
while (size_token) {
pos = nextpos;
l... | 6,131,296,079,931,054,000,000,000,000,000,000,000 | asm_x86_nz.c | 152,405,387,834,847,820,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-20456 | In radare2 prior to 3.1.1, the parseOperand function inside libr/asm/p/asm_x86_nz.c may allow attackers to cause a denial of service (application crash in libr/util/strbuf.c via a stack-based buffer over-read) by crafting an input file, a related issue to CVE-2018-20455. | https://nvd.nist.gov/vuln/detail/CVE-2018-20456 |
10,797 | WavPack | 4c0faba32fddbd0745cbfaf1e1aeb3da5d35b9fc | https://github.com/dbry/WavPack | https://github.com/dbry/WavPack/commit/4c0faba32fddbd0745cbfaf1e1aeb3da5d35b9fc | issue #65: make sure DSDIFF files have a valid channel count | 1 | int ParseDsdiffHeaderConfig (FILE *infile, char *infilename, char *fourcc, WavpackContext *wpc, WavpackConfig *config)
{
int64_t infilesize, total_samples;
DFFFileHeader dff_file_header;
DFFChunkHeader dff_chunk_header;
uint32_t bcount;
infilesize = DoGetFileSize (infile);
memcpy (&dff_file_hea... | 106,925,413,231,207,760,000,000,000,000,000,000,000 | None | null | [
"CWE-369"
] | CVE-2019-1010315 | WavPack 5.1 and earlier is affected by: CWE 369: Divide by Zero. The impact is: Divide by zero can lead to sudden crash of a software/service that tries to parse a .wav file. The component is: ParseDsdiffHeaderConfig (dsdiff.c:282). The attack vector is: Maliciously crafted .wav file. The fixed version is: After commit... | https://nvd.nist.gov/vuln/detail/CVE-2019-1010315 |
10,798 | radare2 | c6d0076c924891ad9948a62d89d0bcdaf965f0cd | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/c6d0076c924891ad9948a62d89d0bcdaf965f0cd | Fix #8731 - Crash in ELF parser with negative 32bit number | 1 | static Sdb *store_versioninfo_gnu_verneed(ELFOBJ *bin, Elf_(Shdr) *shdr, int sz) {
ut8 *end, *need = NULL;
const char *section_name = "";
Elf_(Shdr) *link_shdr = NULL;
const char *link_section_name = "";
Sdb *sdb_vernaux = NULL;
Sdb *sdb_version = NULL;
Sdb *sdb = NULL;
int i, cnt;
if (!bin || !bin->dynstr) {... | 277,570,248,229,841,480,000,000,000,000,000,000,000 | elf.c | 122,361,186,926,896,020,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-15931 | In radare2 2.0.1, an integer exception (negative number leading to an invalid memory access) exists in store_versioninfo_gnu_verneed() in libr/bin/format/elf/elf.c via crafted ELF files on 32bit systems. | https://nvd.nist.gov/vuln/detail/CVE-2017-15931 |
10,799 | qemu | 1e7aed70144b4673fc26e73062064b6724795e5f | https://github.com/bonzini/qemu | https://git.qemu.org/?p=qemu.git;a=commit;h=1e7aed70144b4673fc26e73062064b6724795e5f | virtio: check vring descriptor buffer length
virtio back end uses set of buffers to facilitate I/O operations.
An infinite loop unfolds in virtqueue_pop() if a buffer was
of zero size. Add check to avoid it.
Reported-by: Li Qiang <liqiang6-s@360.cn>
Signed-off-by: Prasad J Pandit <pjp@fedoraproject.org>
Reviewed-by: ... | 1 | static void virtqueue_map_desc(unsigned int *p_num_sg, hwaddr *addr, struct iovec *iov,
unsigned int max_num_sg, bool is_write,
hwaddr pa, size_t sz)
{
unsigned num_sg = *p_num_sg;
assert(num_sg <= max_num_sg);
while (sz) {
hwaddr len = ... | 36,317,471,279,521,866,000,000,000,000,000,000,000 | virtio.c | 321,252,410,795,560,630,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2016-6490 | The virtqueue_map_desc function in hw/virtio/virtio.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a zero length for the descriptor buffer. | https://nvd.nist.gov/vuln/detail/CVE-2016-6490 |
10,800 | file | 59e63838913eee47f5c120a6c53d4565af638158 | https://github.com/file/file | https://github.com/file/file/commit/59e63838913eee47f5c120a6c53d4565af638158 | PR/398: Correctly truncate pascal strings (fixes out of bounds read of 1, 2,
or 4 bytes). | 1 | */
private int
mconvert(struct magic_set *ms, struct magic *m, int flip)
{
union VALUETYPE *p = &ms->ms_value;
uint8_t type;
switch (type = cvt_flip(m->type, flip)) {
case FILE_BYTE:
cvt_8(p, m);
return 1;
case FILE_SHORT:
cvt_16(p, m);
return 1;
case FILE_LONG:
case FILE_DATE:
case FILE_LDATE:
cvt_... | 223,205,916,752,918,680,000,000,000,000,000,000,000 | softmagic.c | 176,551,318,546,496,700,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2014-9652 | The mconvert function in softmagic.c in file before 5.21, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not properly handle a certain string-length field during a copy of a truncated version of a Pascal string, which might allow remote attackers to cause a den... | https://nvd.nist.gov/vuln/detail/CVE-2014-9652 |
10,801 | php-src | b101a6bbd4f2181c360bd38e7683df4a03cba83e | https://github.com/php/php-src | https://github.com/php/php-src/commit/b101a6bbd4f2181c360bd38e7683df4a03cba83e | Use format string | 1 | static void zend_throw_or_error(int fetch_type, zend_class_entry *exception_ce, const char *format, ...) /* {{{ */
{
va_list va;
char *message = NULL;
va_start(va, format);
zend_vspprintf(&message, 0, format, va);
if (fetch_type & ZEND_FETCH_CLASS_EXCEPTION) {
zend_throw_error(exception_ce, message);
} else {... | 274,261,182,855,572,440,000,000,000,000,000,000,000 | None | null | [
"CWE-134"
] | CVE-2015-8617 | Format string vulnerability in the zend_throw_or_error function in Zend/zend_execute_API.c in PHP 7.x before 7.0.1 allows remote attackers to execute arbitrary code via format string specifiers in a string that is misused as a class name, leading to incorrect error handling. | https://nvd.nist.gov/vuln/detail/CVE-2015-8617 |
10,802 | gnupg | 014b2103fcb12f261135e3954f26e9e07b39e342 | http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg | http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=014b2103fcb12f261135e3954f26e9e07b39e342 | gpg: Avoid infinite loop in uncompressing garbled packets.
* g10/compress.c (do_uncompress): Limit the number of extra FF bytes.
--
A packet like (a3 01 5b ff) leads to an infinite loop. Using
--max-output won't help if it is a partial packet. This patch
actually fixes a regression introduced on 1999-05-31 (c34c676... | 1 | do_uncompress( compress_filter_context_t *zfx, z_stream *zs,
IOBUF a, size_t *ret_len )
{
int zrc;
int rc=0;
size_t n;
int nread, count;
int refill = !zs->avail_in;
if( DBG_FILTER )
log_debug("begin inflate: avail_in=%u, avail_out=%u, inbuf=%u\n",
(unsigned)zs->avail_in, (unsigned)zs... | 87,629,636,256,725,120,000,000,000,000,000,000,000 | compress.c | 329,533,514,336,488,180,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2014-4617 | The do_uncompress function in g10/compress.c in GnuPG 1.x before 1.4.17 and 2.x before 2.0.24 allows context-dependent attackers to cause a denial of service (infinite loop) via malformed compressed packets, as demonstrated by an a3 01 5b ff byte sequence. | https://nvd.nist.gov/vuln/detail/CVE-2014-4617 |
10,804 | udisks | 0fcc7cb3b66f23fac53ae08647aa0007a2bd56c4 | https://github.com/pothos/udisks | https://cgit.freedesktop.org/udisks/commit/?id=0fcc7cb3b66f23fac53ae08647aa0007a2bd56c4 | Bug 27494 — publicly exports dm key information
Change udisks-dm-export to only export UDISKS_DM_TARGETS_PARAMS for "linear"
types. It is the only one we care about for now and know how to interpret.
"crypto" types have information about the encryption key in the target
parameters, which we must not leak.
Also add ap... | 1 | dm_export (int major, int minor)
{
gboolean ret;
struct dm_task *dmt;
void *next;
uint64_t start, length;
char *target_type;
char *params;
const char *name;
struct dm_info info;
GString *target_types_str;
GString *start_str;
GString *length_str;
GString *params_str;
gchar buf[4096];
ret = F... | 324,533,183,669,046,300,000,000,000,000,000,000,000 | udisks-dm-export.c | 277,263,213,864,383,560,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2010-1149 | probers/udisks-dm-export.c in udisks before 1.0.1 exports UDISKS_DM_TARGETS_PARAMS information to udev even for a crypt UDISKS_DM_TARGETS_TYPE, which allows local users to discover encryption keys by (1) running a certain udevadm command or (2) reading a certain file under /dev/.udev/db/. | https://nvd.nist.gov/vuln/detail/CVE-2010-1149 |
10,807 | linux | fa3d315a4ce2c0891cdde262562e710d95fba19e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/fa3d315a4ce2c0891cdde262562e710d95fba19e | KVM: Validate userspace_addr of memslot when registered
This way, we can avoid checking the user space address many times when
we read the guest memory.
Although we can do the same for write if we check which slots are
writable, we do not care write now: reading the guest memory happens
more often than writing.
[avi... | 1 | static int FNAME(walk_addr_generic)(struct guest_walker *walker,
struct kvm_vcpu *vcpu, struct kvm_mmu *mmu,
gva_t addr, u32 access)
{
pt_element_t pte;
pt_element_t __user *ptep_user;
gfn_t table_gfn;
unsigned index, pt_access, uninitialized_var(pte_access);
gpa_t pte_gpa;
bool eperm, present, rs... | 152,638,346,673,194,920,000,000,000,000,000,000,000 | paging_tmpl.h | 211,636,996,141,201,900,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-1943 | The KVM subsystem in the Linux kernel before 3.0 does not check whether kernel addresses are specified during allocation of memory slots for use in a guest's physical address space, which allows local users to gain privileges or obtain sensitive information from kernel memory via a crafted application, related to arch/... | https://nvd.nist.gov/vuln/detail/CVE-2013-1943 |
10,809 | FFmpeg | 296debd213bd6dce7647cedd34eb64e5b94cdc92 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/296debd213bd6dce7647cedd34eb64e5b94cdc92 | avcodec/dnxhddec: Move mb height check out of non hr branch
Fixes: out of array access
Fixes: poc.dnxhd
Found-by: Bingchang, Liu@VARAS of IIE
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 1 | static int dnxhd_decode_header(DNXHDContext *ctx, AVFrame *frame,
const uint8_t *buf, int buf_size,
int first_field)
{
int i, cid, ret;
int old_bit_depth = ctx->bit_depth, bitdepth;
uint64_t header_prefix;
if (buf_size < 0x280) {
av_l... | 177,963,056,591,493,700,000,000,000,000,000,000,000 | dnxhddec.c | 101,910,416,377,302,030,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-11719 | The dnxhd_decode_header function in libavcodec/dnxhddec.c in FFmpeg 3.0 through 3.3.2 allows remote attackers to cause a denial of service (out-of-array access) or possibly have unspecified other impact via a crafted DNxHD file. | https://nvd.nist.gov/vuln/detail/CVE-2017-11719 |
10,810 | FFmpeg | 6b67d7f05918f7a1ee8fc6ff21355d7e8736aa10 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/6b67d7f05918f7a1ee8fc6ff21355d7e8736aa10 | avformat/flvenc: Check audio packet size
Fixes: Assertion failure
Fixes: assert_flvenc.c:941_1.swf
Found-by: #CHEN HONGXU# <HCHEN017@e.ntu.edu.sg>
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 1 | static int flv_write_packet(AVFormatContext *s, AVPacket *pkt)
{
AVIOContext *pb = s->pb;
AVCodecParameters *par = s->streams[pkt->stream_index]->codecpar;
FLVContext *flv = s->priv_data;
FLVStreamContext *sc = s->streams[pkt->stream_index]->priv_data;
unsigned ts;
int size = pkt->size... | 322,148,846,991,142,300,000,000,000,000,000,000,000 | None | null | [
"CWE-617"
] | CVE-2018-15822 | The flv_write_packet function in libavformat/flvenc.c in FFmpeg through 2.8 does not check for an empty audio packet, leading to an assertion failure. | https://nvd.nist.gov/vuln/detail/CVE-2018-15822 |
10,811 | FFmpeg | 29ffeef5e73b8f41ff3a3f2242d356759c66f91f | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/29ffeef5e73b8f41ff3a3f2242d356759c66f91f | avcodec/h264: do not trust last_pic_droppable when marking pictures as done
This simplifies the code and fixes a deadlock
Fixes Ticket2927
Signed-off-by: Michael Niedermayer <michaelni@gmx.at> | 1 | static int decode_slice_header(H264Context *h, H264Context *h0)
{
unsigned int first_mb_in_slice;
unsigned int pps_id;
int ret;
unsigned int slice_type, tmp, i, j;
int last_pic_structure, last_pic_droppable;
int must_reinit;
int needs_reinit = 0;
int field_pic_flag, bottom_field_flag;
... | 236,248,743,148,359,600,000,000,000,000,000,000,000 | h264.c | 324,658,081,924,643,700,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2013-7008 | The decode_slice_header function in libavcodec/h264.c in FFmpeg before 2.1 incorrectly relies on a certain droppable field, which allows remote attackers to cause a denial of service (deadlock) or possibly have unspecified other impact via crafted H.264 data. | https://nvd.nist.gov/vuln/detail/CVE-2013-7008 |
10,812 | qemu | 98f93ddd84800f207889491e0b5d851386b459cf | https://github.com/bonzini/qemu | http://git.qemu.org/?p=qemu.git;a=commit;h=98f93ddd84800f207889491e0b5d851386b459cf | virtio-net: out-of-bounds buffer write on load
CVE-2013-4149 QEMU 1.3.0 out-of-bounds buffer write in
virtio_net_load()@hw/net/virtio-net.c
> } else if (n->mac_table.in_use) {
> uint8_t *buf = g_malloc0(n->mac_table.in_use);
We are allocating buffer of size n->mac_table.in_use
> qemu... | 1 | static int virtio_net_load(QEMUFile *f, void *opaque, int version_id)
{
VirtIONet *n = opaque;
VirtIODevice *vdev = VIRTIO_DEVICE(n);
int ret, i, link_down;
if (version_id < 2 || version_id > VIRTIO_NET_VM_VERSION)
return -EINVAL;
ret = virtio_load(vdev, f);
if (ret) {
return r... | 244,500,327,533,408,620,000,000,000,000,000,000,000 | virtio-net.c | 92,965,056,721,602,890,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4149 | Buffer overflow in virtio_net_load function in net/virtio-net.c in QEMU 1.3.0 through 1.7.x before 1.7.2 might allow remote attackers to execute arbitrary code via a large MAC table. | https://nvd.nist.gov/vuln/detail/CVE-2013-4149 |
10,813 | varnish-cache | 176f8a075a963ffbfa56f1c460c15f6a1a6af5a7 | https://github.com/varnishcache/varnish-cache | https://github.com/varnishcache/varnish-cache/commit/176f8a075a963ffbfa56f1c460c15f6a1a6af5a7 | Avoid buffer read overflow on vcl_error and -sfile
The file stevedore may return a buffer larger than asked for when
requesting storage. Due to lack of check for this condition, the code
to copy the synthetic error memory buffer from vcl_error would overrun
the buffer.
Patch by @shamger
Fixes: #2429 | 1 | vbf_stp_error(struct worker *wrk, struct busyobj *bo)
{
ssize_t l, ll, o;
double now;
uint8_t *ptr;
struct vsb *synth_body;
CHECK_OBJ_NOTNULL(wrk, WORKER_MAGIC);
CHECK_OBJ_NOTNULL(bo, BUSYOBJ_MAGIC);
CHECK_OBJ_NOTNULL(bo->fetch_objcore, OBJCORE_MAGIC);
AN(bo->fetch_objcore->flags & OC_F_BUSY);
assert(bo->dire... | 38,998,115,844,148,544,000,000,000,000,000,000,000 | cache_fetch.c | 254,969,103,215,596,540,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-8807 | vbf_stp_error in bin/varnishd/cache/cache_fetch.c in Varnish HTTP Cache 4.1.x before 4.1.9 and 5.x before 5.2.1 allows remote attackers to obtain sensitive information from process memory because a VFP_GetStorage buffer is larger than intended in certain circumstances involving -sfile Stevedore transient objects. | https://nvd.nist.gov/vuln/detail/CVE-2017-8807 |
10,814 | gpac | 90dc7f853d31b0a4e9441cba97feccf36d8b69a4 | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/90dc7f853d31b0a4e9441cba97feccf36d8b69a4 | fix some exploitable overflows (#994, #997) | 1 | GF_Err gf_isom_oinf_read_entry(void *entry, GF_BitStream *bs)
{
GF_OperatingPointsInformation* ptr = (GF_OperatingPointsInformation *)entry;
u32 i, j, count;
if (!ptr) return GF_BAD_PARAM;
ptr->scalability_mask = gf_bs_read_u16(bs);
gf_bs_read_int(bs, 2);//reserved
count = gf_bs_read_int(bs, 6);
for (i = 0; i <... | 45,493,324,744,899,785,000,000,000,000,000,000,000 | avc_ext.c | 91,426,739,831,411,360,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-7752 | GPAC through 0.7.1 has a Buffer Overflow in the gf_media_avc_read_sps function in media_tools/av_parsers.c, a different vulnerability than CVE-2018-1000100. | https://nvd.nist.gov/vuln/detail/CVE-2018-7752 |
10,815 | gpac | 90dc7f853d31b0a4e9441cba97feccf36d8b69a4 | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/90dc7f853d31b0a4e9441cba97feccf36d8b69a4 | fix some exploitable overflows (#994, #997) | 1 | s32 gf_media_avc_read_sps(const char *sps_data, u32 sps_size, AVCState *avc, u32 subseq_sps, u32 *vui_flag_pos)
{
AVC_SPS *sps;
u32 ChromaArrayType = 0;
s32 mb_width, mb_height, sps_id = -1;
u32 profile_idc, level_idc, pcomp, i, chroma_format_idc, cl=0, cr=0, ct=0, cb=0, luma_bd, chroma_bd;
u8 separate_colour_plan... | 118,493,925,447,285,940,000,000,000,000,000,000,000 | av_parsers.c | 7,451,292,680,691,841,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-7752 | GPAC through 0.7.1 has a Buffer Overflow in the gf_media_avc_read_sps function in media_tools/av_parsers.c, a different vulnerability than CVE-2018-1000100. | https://nvd.nist.gov/vuln/detail/CVE-2018-7752 |
10,816 | FFmpeg | 2960576378d17d71cc8dccc926352ce568b5eec1 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/2960576378d17d71cc8dccc926352ce568b5eec1 | avcodec/g2meet: fix src pointer checks in kempf_decode_tile()
Fixes Ticket2842
Signed-off-by: Michael Niedermayer <michaelni@gmx.at> | 1 | static int kempf_decode_tile(G2MContext *c, int tile_x, int tile_y,
const uint8_t *src, int src_size)
{
int width, height;
int hdr, zsize, npal, tidx = -1, ret;
int i, j;
const uint8_t *src_end = src + src_size;
uint8_t pal[768], transp[3];
uLongf dlen = (c->tile_wid... | 157,199,865,468,937,770,000,000,000,000,000,000,000 | g2meet.c | 337,666,674,445,830,870,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4264 | The kempf_decode_tile function in libavcodec/g2meet.c in FFmpeg before 2.0.1 allows remote attackers to cause a denial of service (out-of-bounds heap write) via a G2M4 encoded file. | https://nvd.nist.gov/vuln/detail/CVE-2013-4264 |
10,817 | radare2 | bd276ef2fd8ac3401e65be7c126a43175ccfbcd7 | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/bd276ef2fd8ac3401e65be7c126a43175ccfbcd7 | Fix #9969 - Stack overflow in wasm disassembler | 1 | int wasm_dis(WasmOp *op, const unsigned char *buf, int buf_len) {
op->len = 1;
op->op = buf[0];
if (op->op > 0xbf) {
return 1;
}
// add support for extension opcodes (SIMD + atomics)
WasmOpDef *opdef = &opcodes[op->op];
switch (op->op) {
case WASM_OP_TRAP:
case WASM_OP_NOP:
case WASM_OP_ELSE:
case WASM_OP_... | 6,673,601,905,180,170,000,000,000,000,000,000,000 | wasm.c | 128,755,337,374,787,100,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-11378 | The wasm_dis() function in libr/asm/arch/wasm/wasm.c in or possibly have unspecified other impact via a crafted WASM file. | https://nvd.nist.gov/vuln/detail/CVE-2018-11378 |
10,818 | virglrenderer | 747a293ff6055203e529f083896b823e22523fe7 | https://gitlab.freedesktop.org/virgl/virglrenderer | https://cgit.freedesktop.org/virglrenderer/commit/?id=747a293ff6055203e529f083896b823e22523fe7 | vrend: fix a leak in context create internal
Create a context more than once causes memory leak issue.
Juest return if the context exists.
Signed-off-by: Li Qiang <liq3ea@gmail.com>
Signed-off-by: Dave Airlie <airlied@redhat.com> | 1 | void vrend_renderer_context_create_internal(uint32_t handle, uint32_t nlen,
const char *debug_name)
{
struct vrend_decode_ctx *dctx;
if (handle >= VREND_MAX_CTX)
return;
dctx = malloc(sizeof(struct vrend_decode_ctx));
if (!dctx)
return;
dctx->grc... | 314,270,549,268,056,050,000,000,000,000,000,000,000 | vrend_decode.c | 312,476,336,926,305,480,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2016-10163 | Memory leak in the vrend_renderer_context_create_internal function in vrend_decode.c in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (host memory consumption) by repeatedly creating a decode context. | https://nvd.nist.gov/vuln/detail/CVE-2016-10163 |
10,819 | poppler | 58e04a08afee39370283c494ee2e4e392fd3b684 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=58e04a08afee39370283c494ee2e4e392fd3b684 | segExtraBytes is a goffset not an int so use lld
Fixes KDE bug #328511 | 1 | void JBIG2Stream::readSegments() {
Guint segNum, segFlags, segType, page, segLength;
Guint refFlags, nRefSegs;
Guint *refSegs;
Goffset segDataPos;
int c1, c2, c3;
Guint i;
while (readULong(&segNum)) {
// segment header flags
if (!readUByte(&segFlags)) {
goto eofError1;
}
segType = ... | 234,137,405,656,432,350,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2013-7296 | The JBIG2Stream::readSegments method in JBIG2Stream.cc in Poppler before 0.24.5 does not use the correct specifier within a format string, which allows context-dependent attackers to cause a denial of service (segmentation fault and application crash) via a crafted PDF file. | https://nvd.nist.gov/vuln/detail/CVE-2013-7296 |
10,820 | nmap | 350bbe0597d37ad67abe5fef8fba984707b4e9ad | https://github.com/nmap/nmap | https://github.com/nmap/nmap/commit/350bbe0597d37ad67abe5fef8fba984707b4e9ad | Avoid a crash (double-free) when SSH connection fails | 1 | static int do_session_handshake (lua_State *L, int status, lua_KContext ctx) {
int rc;
struct ssh_userdata *sshu = NULL;
assert(lua_gettop(L) == 4);
sshu = (struct ssh_userdata *) nseU_checkudata(L, 3, SSH2_UDATA, "ssh2");
while ((rc = libssh2_session_handshake(sshu->session, sshu->sp[0])) == LIBS... | 158,553,276,448,407,060,000,000,000,000,000,000,000 | nse_libssh2.cc | 198,789,152,988,758,870,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2017-18594 | nse_libssh2.cc in Nmap 7.70 is subject to a denial of service condition due to a double free when an SSH connection fails, as demonstrated by a leading \n character to ssh-brute.nse or ssh-auth-methods.nse. | https://nvd.nist.gov/vuln/detail/CVE-2017-18594 |
10,822 | linux | 5a0fdfada3a2aa50d7b947a2e958bf00cbe0d830 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/5a0fdfada3a2aa50d7b947a2e958bf00cbe0d830 | Revert "arm64: Introduce execute-only page access permissions"
This reverts commit bc07c2c6e9ed125d362af0214b6313dca180cb08.
While the aim is increased security for --x memory maps, it does not
protect against kernel level reads. Until SECCOMP is implemented for
arm64, revert this patch to avoid giving a false idea o... | 1 | static inline void set_pte_at(struct mm_struct *mm, unsigned long addr,
pte_t *ptep, pte_t pte)
{
if (pte_valid_ng(pte)) {
if (!pte_special(pte) && pte_exec(pte))
__sync_icache_dcache(pte, addr);
if (pte_dirty(pte) && pte_write(pte))
pte_val(pte) &= ~PTE_RDONLY;
else
pte_val(pte) |= PTE_RDONLY;... | 72,720,086,549,577,510,000,000,000,000,000,000,000 | None | null | [
"CWE-19"
] | CVE-2014-9803 | arch/arm64/include/asm/pgtable.h in the Linux kernel before 3.15-rc5-next-20140519, as used in Android before 2016-07-05 on Nexus 5X and 6P devices, mishandles execute-only pages, which allows attackers to gain privileges via a crafted application, aka Android internal bug 28557020. | https://nvd.nist.gov/vuln/detail/CVE-2014-9803 |
10,824 | linux | b4789b8e6be3151a955ade74872822f30e8cd914 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/b4789b8e6be3151a955ade74872822f30e8cd914 | aacraid: prevent invalid pointer dereference
It appears that driver runs into a problem here if fibsize is too small
because we allocate user_srbcmd with fibsize size only but later we
access it until user_srbcmd->sg.count to copy it over to srbcmd.
It is not correct to test (fibsize < sizeof(*user_srbcmd)) because t... | 1 | static int aac_send_raw_srb(struct aac_dev* dev, void __user * arg)
{
struct fib* srbfib;
int status;
struct aac_srb *srbcmd = NULL;
struct user_aac_srb *user_srbcmd = NULL;
struct user_aac_srb __user *user_srb = arg;
struct aac_srb_reply __user *user_reply;
struct aac_srb_reply* reply;
u32 fibsize = 0;
u32 fl... | 278,785,541,490,766,400,000,000,000,000,000,000,000 | commctrl.c | 11,190,411,268,765,080,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-6380 | The aac_send_raw_srb function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 3.12.1 does not properly validate a certain size value, which allows local users to cause a denial of service (invalid pointer dereference) or possibly have unspecified other impact via an FSACTL_SEND_RAW_SRB ioctl call that tr... | https://nvd.nist.gov/vuln/detail/CVE-2013-6380 |
10,827 | linux | 15fab63e1e57be9fdb5eec1bbc5916e9825e9acb | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/15fab63e1e57be9fdb5eec1bbc5916e9825e9acb | fs: prevent page refcount overflow in pipe_buf_get
Change pipe_buf_get() to return a bool indicating whether it succeeded
in raising the refcount of the page (if the thing in the pipe is a page).
This removes another mechanism for overflowing the page refcount. All
callers converted to handle a failure.
Reported-by:... | 1 | static inline void pipe_buf_get(struct pipe_inode_info *pipe,
struct pipe_buffer *buf)
{
buf->ops->get(pipe, buf);
} | 82,379,531,495,560,300,000,000,000,000,000,000,000 | pipe_fs_i.h | 187,618,379,157,083,460,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2019-11487 | The Linux kernel before 5.1-rc5 allows page->_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur w... | https://nvd.nist.gov/vuln/detail/CVE-2019-11487 |
10,830 | FFmpeg | 8c2ea3030af7b40a3c4275696fb5c76cdb80950a | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/8c2ea3030af7b40a3c4275696fb5c76cdb80950a | avcodec/pictordec: Fix logic error
Fixes: 559/clusterfuzz-testcase-6424225917173760
Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/targets/ffmpeg
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 1 | static int decode_frame(AVCodecContext *avctx,
void *data, int *got_frame,
AVPacket *avpkt)
{
PicContext *s = avctx->priv_data;
AVFrame *frame = data;
uint32_t *palette;
int bits_per_plane, bpp, etype, esize, npal, pos_after_pal;
int i, x, y, plane, tm... | 221,742,097,572,568,800,000,000,000,000,000,000,000 | pictordec.c | 75,293,849,504,293,415,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2017-7862 | FFmpeg before 2017-02-07 has an out-of-bounds write caused by a heap-based buffer overflow related to the decode_frame function in libavcodec/pictordec.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-7862 |
10,831 | radare2 | f41e941341e44aa86edd4483c4487ec09a074257 | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/f41e941341e44aa86edd4483c4487ec09a074257 | Fix #6885 - oob write in dalvik_disassemble | 1 | static int dalvik_disassemble (RAsm *a, RAsmOp *op, const ut8 *buf, int len) {
int vA, vB, vC, payload = 0, i = (int) buf[0];
int size = dalvik_opcodes[i].len;
char str[1024], *strasm;
ut64 offset;
const char *flag_str;
op->buf_asm[0] = 0;
if (buf[0] == 0x00) { /* nop */
switch (buf[1]) {
case 0x01: /* pac... | 15,765,353,407,801,864,000,000,000,000,000,000,000 | asm_dalvik.c | 278,723,867,294,495,130,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-6448 | The dalvik_disassemble function in libr/asm/p/asm_dalvik.c in radare2 1.2.1 allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted DEX file. | https://nvd.nist.gov/vuln/detail/CVE-2017-6448 |
10,832 | radare2 | f17bfd9f1da05f30f23a4dd05e9d2363e1406948 | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/f17bfd9f1da05f30f23a4dd05e9d2363e1406948 | Fix #12242 - Crash in x86.nz assembler (#12266) | 1 | static int opmov(RAsm *a, ut8 *data, const Opcode *op) {
int l = 0;
st64 offset = 0;
int mod = 0;
int base = 0;
int rex = 0;
ut64 immediate = 0;
if (op->operands[1].type & OT_CONSTANT) {
if (!op->operands[1].is_good_flag) {
return -1;
}
if (op->operands[1].immediate == -1) {
return -1;
}
immediat... | 40,973,769,706,127,207,000,000,000,000,000,000,000 | asm_x86_nz.c | 338,540,879,983,035,860,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-19843 | opmov in libr/asm/p/asm_x86_nz.c in radare2 before 3.1.0 allows attackers to cause a denial of service (buffer over-read) via crafted x86 assembly data, as demonstrated by rasm2. | https://nvd.nist.gov/vuln/detail/CVE-2018-19843 |
10,833 | php-src | 61cdd1255d5b9c8453be71aacbbf682796ac77d4 | https://github.com/php/php-src | https://github.com/php/php-src/commit/61cdd1255d5b9c8453be71aacbbf682796ac77d4 | Fix bug #73257 and bug #73258 - SplObjectStorage unserialize allows use of non-object as key | 1 | SPL_METHOD(SplObjectStorage, unserialize)
{
spl_SplObjectStorage *intern = Z_SPLOBJSTORAGE_P(getThis());
char *buf;
size_t buf_len;
const unsigned char *p, *s;
php_unserialize_data_t var_hash;
zval entry, inf;
zval *pcount, *pmembers;
spl_SplObjectStorageElement *element;
zend_long count;
if (zend_parse_par... | 91,704,803,847,212,610,000,000,000,000,000,000,000 | spl_observer.c | 126,391,975,154,037,090,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2016-7480 | The SplObjectStorage unserialize implementation in ext/spl/spl_observer.c in PHP before 7.0.12 does not verify that a key is an object, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access) via crafted serialized data. | https://nvd.nist.gov/vuln/detail/CVE-2016-7480 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.