idx
int64
project
string
commit_id
string
project_url
string
commit_url
string
commit_message
string
target
int64
func
string
func_hash
float64
file_name
string
file_hash
float64
cwe
list
cve
string
cve_desc
string
nvd_url
string
3,092
FFmpeg
a5d25faa3f4b18dac737fdb35d0dd68eb0dc2156
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/a5d25faa3f4b18dac737fdb35d0dd68eb0dc2156
ffserver: Check chunk size Fixes out of array access Fixes: poc_ffserver.py Found-by: Paul Cher <paulcher@icloud.com> Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
1
static int http_receive_data(HTTPContext *c) { HTTPContext *c1; int len, loop_run = 0; while (c->chunked_encoding && !c->chunk_size && c->buffer_end > c->buffer_ptr) { /* read chunk header, if present */ len = recv(c->fd, c->buffer_ptr, 1, 0); if (len < 0) { ...
226,374,556,346,204,150,000,000,000,000,000,000,000
ffserver.c
10,780,386,245,231,873,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-10192
Heap-based buffer overflow in ffserver.c in FFmpeg before 2.8.10, 3.0.x before 3.0.5, 3.1.x before 3.1.6, and 3.2.x before 3.2.2 allows remote attackers to execute arbitrary code by leveraging failure to check chunk size.
https://nvd.nist.gov/vuln/detail/CVE-2016-10192
3,100
bitlbee
701ab8129ba9ea64f569daedca9a8603abad740f
https://github.com/bitlbee/bitlbee
https://github.com/bitlbee/bitlbee/commit/701ab8129ba9ea64f569daedca9a8603abad740f
imcb_file_send_start: handle ft attempts from non-existing users
1
file_transfer_t *imcb_file_send_start(struct im_connection *ic, char *handle, char *file_name, size_t file_size) { bee_t *bee = ic->bee; bee_user_t *bu = bee_user_by_handle(bee, ic, handle); if (bee->ui->ft_in_start) { return bee->ui->ft_in_start(bee, bu, file_name, file_size); } else { return NULL; } }...
295,316,547,559,436,450,000,000,000,000,000,000,000
bee_ft.c
22,913,504,337,913,935,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2016-10189
BitlBee before 3.5 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) and possibly execute arbitrary code via a file transfer request for a contact that is not in the contact list.
https://nvd.nist.gov/vuln/detail/CVE-2016-10189
3,101
libgd
fe9ed49dafa993e3af96b6a5a589efeea9bfb36f
https://github.com/libgd/libgd
https://github.com/libgd/libgd/commit/fe9ed49dafa993e3af96b6a5a589efeea9bfb36f
Fix DOS vulnerability in gdImageCreateFromGd2Ctx() We must not pretend that there are image data if there are none. Instead we fail reading the image file gracefully.
1
BGD_DECLARE(gdImagePtr) gdImageCreateFromGd2Ctx (gdIOCtxPtr in) { int sx, sy; int i; int ncx, ncy, nc, cs, cx, cy; int x, y, ylo, yhi, xlo, xhi; int vers, fmt; t_chunk_info *chunkIdx = NULL; /* So we can gdFree it with impunity. */ unsigned char *chunkBuf = NULL; /* So we can gdFree it with impunity. */ int chu...
70,644,606,074,500,010,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2016-10167
The gdImageCreateFromGd2Ctx function in gd_gd2.c in the GD Graphics Library (aka libgd) before 2.2.4 allows remote attackers to cause a denial of service (application crash) via a crafted image file.
https://nvd.nist.gov/vuln/detail/CVE-2016-10167
3,102
libgd
60bfb401ad5a4a8ae995dcd36372fe15c71e1a35
https://github.com/libgd/libgd
https://github.com/libgd/libgd/commit/60bfb401ad5a4a8ae995dcd36372fe15c71e1a35
Fix potential unsigned underflow No need to decrease `u`, so we don't do it. While we're at it, we also factor out the overflow check of the loop, what improves performance and readability. This issue has been reported by Stefan Esser to security@libgd.org.
1
static inline LineContribType * _gdContributionsAlloc(unsigned int line_length, unsigned int windows_size) { unsigned int u = 0; LineContribType *res; int overflow_error = 0; res = (LineContribType *) gdMalloc(sizeof(LineContribType)); if (!res) { return NULL; } res->WindowSize = windows_size; res->Li...
153,366,798,621,193,830,000,000,000,000,000,000,000
gd_interpolation.c
247,548,524,122,300,570,000,000,000,000,000,000,000
[ "CWE-191" ]
CVE-2016-10166
Integer underflow in the _gdContributionsAlloc function in gd_interpolation.c in the GD Graphics Library (aka libgd) before 2.2.4 allows remote attackers to have unspecified impact via vectors related to decrementing the u variable.
https://nvd.nist.gov/vuln/detail/CVE-2016-10166
3,103
php-src
16b3003ffc6393e250f069aa28a78dc5a2c064b2
https://github.com/php/php-src
https://github.com/php/php-src/commit/16b3003ffc6393e250f069aa28a78dc5a2c064b2
Fix bug #73825 - Heap out of bounds read on unserialize in finish_nested_data()
1
static inline long object_common1(UNSERIALIZE_PARAMETER, zend_class_entry *ce) { long elements; elements = parse_iv2((*p) + 2, p); (*p) += 2; if (ce->serialize == NULL) { object_init_ex(*rval, ce); } else { /* If this class implements Serializable, it should not land here but in object_custom(). The ...
67,720,542,164,557,350,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2016-10161
The object_common1 function in ext/standard/var_unserializer.c in PHP before 5.6.30, 7.0.x before 7.0.15, and 7.1.x before 7.1.1 allows remote attackers to cause a denial of service (buffer over-read and application crash) via crafted serialized data that is mishandled in a finish_nested_data call.
https://nvd.nist.gov/vuln/detail/CVE-2016-10161
3,105
php-src
1cda0d7c2ffb62d8331c64e703131d9cabdc03ea
https://github.com/php/php-src
https://github.com/php/php-src/commit/1cda0d7c2ffb62d8331c64e703131d9cabdc03ea
Fix bug #73737 FPE when parsing a tag format
1
static size_t exif_convert_any_to_int(void *value, int format, int motorola_intel TSRMLS_DC) { int s_den; unsigned u_den; switch(format) { case TAG_FMT_SBYTE: return *(signed char *)value; case TAG_FMT_BYTE: return *(uchar *)value; case TAG_FMT_USHORT: return php_ifd_get16u(value, motorola_int...
117,898,004,511,095,570,000,000,000,000,000,000,000
exif.c
125,847,680,861,239,830,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2016-10158
The exif_convert_any_to_int function in ext/exif/exif.c in PHP before 5.6.30, 7.0.x before 7.0.15, and 7.1.x before 7.1.1 allows remote attackers to cause a denial of service (application crash) via crafted EXIF data that triggers an attempt to divide the minimum representable negative integer by -1.
https://nvd.nist.gov/vuln/detail/CVE-2016-10158
3,106
systemd
06eeacb6fe029804f296b065b3ce91e796e1cd0e
https://github.com/systemd/systemd
https://github.com/systemd/systemd/commit/06eeacb6fe029804f296b065b3ce91e796e1cd0e
basic: fix touch() creating files with 07777 mode mode_t is unsigned, so MODE_INVALID < 0 can never be true. This fixes a possible DoS where any user could fill /run by writing to a world-writable /run/systemd/show-status.
1
int touch_file(const char *path, bool parents, usec_t stamp, uid_t uid, gid_t gid, mode_t mode) { _cleanup_close_ int fd; int r; assert(path); if (parents) mkdir_parents(path, 0755); fd = open(path, O_WRONLY|O_CREAT|O_CLOEXEC|O_NOCTTY, mode > 0 ? mode : 0644...
144,648,291,483,335,600,000,000,000,000,000,000,000
fs-util.c
25,832,733,540,396,505,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2016-10156
A flaw in systemd v228 in /src/basic/fs-util.c caused world writable suid files to be created when using the systemd timers features, allowing local attackers to escalate their privileges to root. This is fixed in v229.
https://nvd.nist.gov/vuln/detail/CVE-2016-10156
3,107
linux
06deeec77a5a689cc94b21a8a91a76e42176685d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/06deeec77a5a689cc94b21a8a91a76e42176685d
cifs: Fix smbencrypt() to stop pointing a scatterlist at the stack smbencrypt() points a scatterlist to the stack, which is breaks if CONFIG_VMAP_STACK=y. Fix it by switching to crypto_cipher_encrypt_one(). The new code should be considerably faster as an added benefit. This code is nearly identical to some code th...
1
smbhash(unsigned char *out, const unsigned char *in, unsigned char *key) { int rc; unsigned char key2[8]; struct crypto_skcipher *tfm_des; struct scatterlist sgin, sgout; struct skcipher_request *req; str_to_key(key, key2); tfm_des = crypto_alloc_skcipher("ecb(des)", 0, CRYPTO_ALG_ASYNC); if (IS_ERR(tf...
257,379,465,516,682,100,000,000,000,000,000,000,000
smbencrypt.c
324,230,031,737,444,380,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-10154
The smbhash function in fs/cifs/smbencrypt.c in the Linux kernel 4.9.x before 4.9.1 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page...
https://nvd.nist.gov/vuln/detail/CVE-2016-10154
3,108
linux
a0f1d21c1ccb1da66629627a74059dd7f5ac9c61
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a0f1d21c1ccb1da66629627a74059dd7f5ac9c61
KVM: use after free in kvm_ioctl_create_device() We should move the ops->destroy(dev) after the list_del(&dev->vm_node) so that we don't use "dev" after freeing it. Fixes: a28ebea2adc4 ("KVM: Protect device ops->create and list_add with kvm->lock") Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com> Reviewed-by: ...
1
static int kvm_ioctl_create_device(struct kvm *kvm, struct kvm_create_device *cd) { struct kvm_device_ops *ops = NULL; struct kvm_device *dev; bool test = cd->flags & KVM_CREATE_DEVICE_TEST; int ret; if (cd->type >= ARRAY_SIZE(kvm_device_ops_table)) return -ENODEV; ops = kvm_device_ops_table[cd->type];...
192,189,468,393,468,960,000,000,000,000,000,000,000
kvm_main.c
247,842,350,317,630,070,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2016-10150
Use-after-free vulnerability in the kvm_ioctl_create_device function in virt/kvm/kvm_main.c in the Linux kernel before 4.8.13 allows host OS users to cause a denial of service (host OS crash) or possibly gain privileges via crafted ioctl calls on the /dev/kvm device.
https://nvd.nist.gov/vuln/detail/CVE-2016-10150
3,113
ImageMagick
d23beebe7b1179fb75db1e85fbca3100e49593d9
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/d23beebe7b1179fb75db1e85fbca3100e49593d9
None
1
static Image *ExtractPostscript(Image *image,const ImageInfo *image_info, MagickOffsetType PS_Offset,ssize_t PS_Size,ExceptionInfo *exception) { char postscript_file[MaxTextExtent]; const MagicInfo *magic_info; FILE *ps_file; ImageInfo *clone_info; Image *image2; unsigned char ...
238,566,412,475,479,400,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2016-10145
Off-by-one error in coders/wpg.c in ImageMagick allows remote attackers to have unspecified impact via vectors related to a string copy.
https://nvd.nist.gov/vuln/detail/CVE-2016-10145
3,114
ImageMagick
97566cf2806c0a5a86e884c96831a0c3b1ec6c20
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/97566cf2806c0a5a86e884c96831a0c3b1ec6c20
None
1
static MagickBooleanType WriteIPLImage(const ImageInfo *image_info,Image *image) { ExceptionInfo *exception; IPLInfo ipl_info; MagickBooleanType status; MagickOffsetType scene; register const PixelPacket *p; QuantumInfo *quantum_info; ssize_t y; unsigned char *pixe...
168,604,460,062,043,490,000,000,000,000,000,000,000
None
null
[ "CWE-284" ]
CVE-2016-10144
coders/ipl.c in ImageMagick allows remote attackers to have unspecific impact by leveraging a missing malloc check.
https://nvd.nist.gov/vuln/detail/CVE-2016-10144
3,115
libgit2
9a64e62f0f20c9cf9b2e1609f037060eb2d8eb22
https://github.com/libgit2/libgit2
https://github.com/libgit2/libgit2/commit/9a64e62f0f20c9cf9b2e1609f037060eb2d8eb22
http: check certificate validity before clobbering the error variable
1
static int http_connect(http_subtransport *t) { int error; if (t->connected && http_should_keep_alive(&t->parser) && t->parse_finished) return 0; if (t->io) { git_stream_close(t->io); git_stream_free(t->io); t->io = NULL; t->connected = 0; } if (t->connection_data.use_ssl) { error = git_tls_stre...
196,554,667,555,384,750,000,000,000,000,000,000,000
http.c
262,511,896,804,073,250,000,000,000,000,000,000,000
[ "CWE-284" ]
CVE-2016-10130
The http_connect function in transports/http.c in libgit2 before 0.24.6 and 0.25.x before 0.25.1 might allow man-in-the-middle attackers to spoof servers by leveraging clobbering of the error variable.
https://nvd.nist.gov/vuln/detail/CVE-2016-10130
3,116
libgit2
2fdef641fd0dd2828bd948234ae86de75221a11a
https://github.com/libgit2/libgit2
https://github.com/libgit2/libgit2/commit/2fdef641fd0dd2828bd948234ae86de75221a11a
smart_pkt: treat empty packet lines as error The Git protocol does not specify what should happen in the case of an empty packet line (that is a packet line "0004"). We currently indicate success, but do not return a packet in the case where we hit an empty line. The smart protocol was not prepared to handle such pack...
1
int git_pkt_parse_line( git_pkt **head, const char *line, const char **out, size_t bufflen) { int ret; int32_t len; /* Not even enough for the length */ if (bufflen > 0 && bufflen < PKT_LEN_SIZE) return GIT_EBUFS; len = parse_len(line); if (len < 0) { /* * If we fail to parse the length, it might be bec...
142,114,902,155,973,480,000,000,000,000,000,000,000
smart_pkt.c
101,732,438,440,366,980,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2016-10129
The Git Smart Protocol support in libgit2 before 0.24.6 and 0.25.x before 0.25.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via an empty packet line.
https://nvd.nist.gov/vuln/detail/CVE-2016-10129
3,119
libgit2
66e3774d279672ee51c3b54545a79d20d1ada834
https://github.com/libgit2/libgit2
https://github.com/libgit2/libgit2/commit/66e3774d279672ee51c3b54545a79d20d1ada834
smart_pkt: verify packet length exceeds PKT_LEN_SIZE Each packet line in the Git protocol is prefixed by a four-byte length of how much data will follow, which we parse in `git_pkt_parse_line`. The transmitted length can either be equal to zero in case of a flush packet or has to be at least of length four, as it also...
1
int git_pkt_parse_line( git_pkt **head, const char *line, const char **out, size_t bufflen) { int ret; int32_t len; /* Not even enough for the length */ if (bufflen > 0 && bufflen < PKT_LEN_SIZE) return GIT_EBUFS; len = parse_len(line); if (len < 0) { /* * If we fail to parse the length, it might be bec...
224,019,714,945,483,500,000,000,000,000,000,000,000
smart_pkt.c
144,877,423,610,598,940,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-10128
Buffer overflow in the git_pkt_parse_line function in transports/smart_pkt.c in the Git Smart Protocol support in libgit2 before 0.24.6 and 0.25.x before 0.25.1 allows remote attackers to have unspecified impact via a crafted non-flush packet.
https://nvd.nist.gov/vuln/detail/CVE-2016-10128
3,120
libtiff
c7153361a4041260719b340f73f2f76
https://github.com/vadz/libtiff
https://github.com/vadz/libtiff/commit/c7153361a4041260719b340f73f2f76
* tools/tiff2pdf.c: avoid potential heap-based overflow in t2p_readwrite_pdf_image_tile(). Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2640
1
tsize_t t2p_readwrite_pdf_image_tile(T2P* t2p, TIFF* input, TIFF* output, ttile_t tile){ uint16 edge=0; tsize_t written=0; unsigned char* buffer=NULL; tsize_t bufferoffset=0; unsigned char* samplebuffer=NULL; tsize_t samplebufferoffset=0; tsize_t read=0; uint16 i=0; ttile_t tilecount=0; /* tsize_t tilesize=0...
189,588,000,909,003,600,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2016-10094
Off-by-one error in the t2p_readwrite_pdf_image_tile function in tools/tiff2pdf.c in LibTIFF 4.0.7 allows remote attackers to have unspecified impact via a crafted image.
https://nvd.nist.gov/vuln/detail/CVE-2016-10094
3,123
ImageMagick
f3b483e8b054c50149912523b4773687e18afe25
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/f3b483e8b054c50149912523b4773687e18afe25
None
1
static Image *ReadMATImage(const ImageInfo *image_info,ExceptionInfo *exception) { Image *image, *image2=NULL, *rotated_image; PixelPacket *q; unsigned int status; MATHeader MATLAB_HDR; size_t size; size_t CellType; QuantumInfo *quantum_info; ImageInfo *clone_info; int i; ssize_t ldblk; unsign...
292,072,125,937,026,580,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2016-10071
coders/mat.c in ImageMagick before 6.9.4-0 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted mat file.
https://nvd.nist.gov/vuln/detail/CVE-2016-10071
3,124
ImageMagick
b173a352397877775c51c9a0e9d59eb6ce24c455
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/b173a352397877775c51c9a0e9d59eb6ce24c455
None
1
static Image *ReadMATImage(const ImageInfo *image_info,ExceptionInfo *exception) { Image *image, *image2=NULL, *rotated_image; PixelPacket *q; unsigned int status; MATHeader MATLAB_HDR; size_t size; size_t CellType; QuantumInfo *quantum_info; ImageInfo *clone_info; int i; ssize_t ldblk; unsign...
192,269,583,203,591,370,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2016-10070
Heap-based buffer overflow in the CalcMinMax function in coders/mat.c in ImageMagick before 6.9.4-0 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted mat file.
https://nvd.nist.gov/vuln/detail/CVE-2016-10070
3,125
ImageMagick
8a370f9ab120faf182aa160900ba692ba8e2bcf0
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/8a370f9ab120faf182aa160900ba692ba8e2bcf0
None
1
static Image *ReadMATImage(const ImageInfo *image_info,ExceptionInfo *exception) { Image *image, *image2=NULL, *rotated_image; PixelPacket *q; unsigned int status; MATHeader MATLAB_HDR; size_t size; size_t CellType; QuantumInfo *quantum_info; ImageInfo *clone_info; int i; ssize_t ldblk; unsign...
326,982,455,566,319,460,000,000,000,000,000,000,000
mat.c
137,745,844,689,009,620,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2016-10069
coders/mat.c in ImageMagick before 6.9.4-5 allows remote attackers to cause a denial of service (application crash) via a mat file with an invalid number of frames.
https://nvd.nist.gov/vuln/detail/CVE-2016-10069
3,126
ImageMagick
56d6e20de489113617cbbddaf41e92600a34db22
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/56d6e20de489113617cbbddaf41e92600a34db22
None
1
static void MSLStartElement(void *context,const xmlChar *tag, const xmlChar **attributes) { AffineMatrix affine, current; ChannelType channel; char key[MaxTextExtent], *value; const char *attribute, *keyword; double angle; DrawInfo *draw_info; ExceptionInfo ...
109,071,652,637,853,450,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2016-10068
The MSL interpreter in ImageMagick before 6.9.6-4 allows remote attackers to cause a denial of service (segmentation fault and application crash) via a crafted XML file.
https://nvd.nist.gov/vuln/detail/CVE-2016-10068
3,128
ImageMagick
0474237508f39c4f783208123431815f1ededb76
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/0474237508f39c4f783208123431815f1ededb76
None
1
static Image *ReadVIFFImage(const ImageInfo *image_info, ExceptionInfo *exception) { #define VFF_CM_genericRGB 15 #define VFF_CM_ntscRGB 1 #define VFF_CM_NONE 0 #define VFF_DEP_DECORDER 0x4 #define VFF_DEP_NSORDER 0x8 #define VFF_DES_RAW 0 #define VFF_LOC_IMPLICIT 1 #define VFF_MAPTYP_NONE 0 #define VFF_MA...
87,441,195,499,598,980,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-10067
magick/memory.c in ImageMagick before 6.9.4-5 allows remote attackers to cause a denial of service (application crash) via vectors involving "too many exceptions," which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2016-10067
3,194
ImageMagick
f6e9d0d9955e85bdd7540b251cd50d598dacc5e6
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/f6e9d0d9955e85bdd7540b251cd50d598dacc5e6
None
1
static Image *ReadVIFFImage(const ImageInfo *image_info, ExceptionInfo *exception) { #define VFF_CM_genericRGB 15 #define VFF_CM_ntscRGB 1 #define VFF_CM_NONE 0 #define VFF_DEP_DECORDER 0x4 #define VFF_DEP_NSORDER 0x8 #define VFF_DES_RAW 0 #define VFF_LOC_IMPLICIT 1 #define VFF_MAPTYP_NONE 0 #define VFF_MAPTY...
194,560,327,807,090,180,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-10066
Buffer overflow in the ReadVIFFImage function in coders/viff.c in ImageMagick before 6.9.4-5 allows remote attackers to cause a denial of service (application crash) via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2016-10066
3,200
ImageMagick
f8877abac8e568b2f339cca70c2c3c1b6eaec288
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/f8877abac8e568b2f339cca70c2c3c1b6eaec288
None
1
static Image *ReadTIFFImage(const ImageInfo *image_info, ExceptionInfo *exception) { const char *option; float *chromaticity, x_position, y_position, x_resolution, y_resolution; Image *image; int tiff_status; MagickBooleanType status; MagickSizeType number_pixe...
58,632,908,984,196,000,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-10064
Buffer overflow in coders/tiff.c in ImageMagick before 6.9.5-1 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2016-10064
3,201
ImageMagick
2bb6941a2d557f26a2f2049ade466e118eeaab91
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/2bb6941a2d557f26a2f2049ade466e118eeaab91
None
1
static Image *ReadTIFFImage(const ImageInfo *image_info, ExceptionInfo *exception) { const char *option; float *chromaticity, x_position, y_position, x_resolution, y_resolution; Image *image; int tiff_status; MagickBooleanType status; MagickSizeType number_pixe...
66,992,638,402,097,515,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-10063
Buffer overflow in coders/tiff.c in ImageMagick before 6.9.5-1 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted file, related to extend validity.
https://nvd.nist.gov/vuln/detail/CVE-2016-10063
3,202
ImageMagick
4e914bbe371433f0590cefdf3bd5f3a5710069f9
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/4e914bbe371433f0590cefdf3bd5f3a5710069f9
https://github.com/ImageMagick/ImageMagick/issues/196
1
static Image *ReadGROUP4Image(const ImageInfo *image_info, ExceptionInfo *exception) { char filename[MagickPathExtent]; FILE *file; Image *image; ImageInfo *read_info; int c, unique_file; MagickBooleanType status; size_t length; ssize_t offset, strip_offs...
153,305,737,271,191,830,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2016-10061
The ReadGROUP4Image function in coders/tiff.c in ImageMagick before 7.0.1-10 does not check the return value of the fputc function, which allows remote attackers to cause a denial of service (crash) via a crafted image file.
https://nvd.nist.gov/vuln/detail/CVE-2016-10061
3,203
ImageMagick
933e96f01a8c889c7bf5ffd30020e86a02a046e7
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/933e96f01a8c889c7bf5ffd30020e86a02a046e7
https://github.com/ImageMagick/ImageMagick/issues/196
1
static MagickBooleanType ConcatenateImages(int argc,char **argv, ExceptionInfo *exception ) { FILE *input, *output; int c; register ssize_t i; if (ExpandFilenames(&argc,&argv) == MagickFalse) ThrowFileException(exception,ResourceLimitError,"MemoryAllocationFailed", ...
20,999,313,557,570,732,000,000,000,000,000,000,000
magick-cli.c
12,808,080,539,331,031,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2016-10060
The ConcatenateImages function in MagickWand/magick-cli.c in ImageMagick before 7.0.1-10 does not check the return value of the fputc function, which allows remote attackers to cause a denial of service (application crash) via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2016-10060
3,205
ImageMagick
58cf5bf4fade82e3b510e8f3463a967278a3e410
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/58cf5bf4fade82e3b510e8f3463a967278a3e410
None
1
static Image *ReadTIFFImage(const ImageInfo *image_info, ExceptionInfo *exception) { const char *option; float *chromaticity, x_position, y_position, x_resolution, y_resolution; Image *image; int tiff_status; MagickBooleanType status; MagickSizeType number_pixe...
25,900,952,869,174,794,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-10059
Buffer overflow in coders/tiff.c in ImageMagick before 6.9.4-1 allows remote attackers to cause a denial of service (application crash) or have unspecified other impact via a crafted TIFF file.
https://nvd.nist.gov/vuln/detail/CVE-2016-10059
3,206
ImageMagick
4ec444f4eab88cf4bec664fafcf9cab50bc5ff6a
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/4ec444f4eab88cf4bec664fafcf9cab50bc5ff6a
None
1
ModuleExport MagickBooleanType ReadPSDLayers(Image *image, const ImageInfo *image_info,const PSDInfo *psd_info, const MagickBooleanType skip_layers,ExceptionInfo *exception) { char type[4]; LayerInfo *layer_info; MagickSizeType size; MagickBooleanType status; register ssize_t i; ...
278,062,416,282,574,900,000,000,000,000,000,000,000
None
null
[ "CWE-400" ]
CVE-2016-10058
Memory leak in the ReadPSDLayers function in coders/psd.c in ImageMagick before 6.9.6-3 allows remote attackers to cause a denial of service (memory consumption) via a crafted image file.
https://nvd.nist.gov/vuln/detail/CVE-2016-10058
3,207
ImageMagick
10b3823a7619ed22d42764733eb052c4159bc8c1
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/10b3823a7619ed22d42764733eb052c4159bc8c1
None
1
static MagickBooleanType WriteMAPImage(const ImageInfo *image_info,Image *image) { MagickBooleanType status; register const IndexPacket *indexes; register const PixelPacket *p; register ssize_t i, x; register unsigned char *q; size_t depth, packet_size; ssize_t y;...
138,602,654,054,034,700,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-10054
Buffer overflow in the WriteMAPImage function in coders/map.c in ImageMagick before 6.9.5-8 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2016-10054
3,210
ImageMagick
10b3823a7619ed22d42764733eb052c4159bc8c1
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/10b3823a7619ed22d42764733eb052c4159bc8c1
None
1
static MagickBooleanType WriteGROUP4Image(const ImageInfo *image_info, Image *image) { char filename[MaxTextExtent]; FILE *file; Image *huffman_image; ImageInfo *write_info; int unique_file; MagickBooleanType status; register ssize_t i; ssize_t count; TIFF ...
138,399,397,511,847,460,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-10054
Buffer overflow in the WriteMAPImage function in coders/map.c in ImageMagick before 6.9.5-8 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2016-10054
3,211
ImageMagick
f983dcdf9c178e0cbc49608a78713c5669aa1bb5
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/f983dcdf9c178e0cbc49608a78713c5669aa1bb5
None
1
static MagickBooleanType WriteTIFFImage(const ImageInfo *image_info, Image *image) { #if !defined(TIFFDefaultStripSize) #define TIFFDefaultStripSize(tiff,request) (8192UL/TIFFScanlineSize(tiff)) #endif const char *mode, *option; CompressionType compression; EndianType endian_type; MagickB...
142,572,469,438,655,880,000,000,000,000,000,000,000
None
null
[ "CWE-369" ]
CVE-2016-10053
The WriteTIFFImage function in coders/tiff.c in ImageMagick before 6.9.5-8 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2016-10053
3,212
ImageMagick
ecc03a2518c2b7dd375fde3a040fdae0bdf6a521
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/ecc03a2518c2b7dd375fde3a040fdae0bdf6a521
None
1
static Image *ReadPWPImage(const ImageInfo *image_info,ExceptionInfo *exception) { FILE *file; Image *image, *next_image, *pwp_image; ImageInfo *read_info; int c, unique_file; MagickBooleanType status; register Image *p; register ssize_t i; size_t files...
35,362,358,607,063,336,000,000,000,000,000,000,000
None
null
[ "CWE-416" ]
CVE-2016-10051
Use-after-free vulnerability in the ReadPWPImage function in coders/pwp.c in ImageMagick 6.9.5-5 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2016-10051
3,213
ImageMagick
73fb0aac5b958521e1511e179ecc0ad49f70ebaf
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/73fb0aac5b958521e1511e179ecc0ad49f70ebaf
None
1
static Image *ReadRLEImage(const ImageInfo *image_info,ExceptionInfo *exception) { #define SkipLinesOp 0x01 #define SetColorOp 0x02 #define SkipPixelsOp 0x03 #define ByteDataOp 0x05 #define RunDataOp 0x06 #define EOFOp 0x07 char magick[12]; Image *image; IndexPacket index; int opcode, ...
75,140,968,535,640,320,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-10050
Heap-based buffer overflow in the ReadRLEImage function in coders/rle.c in ImageMagick 6.9.4-8 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted RLE file.
https://nvd.nist.gov/vuln/detail/CVE-2016-10050
3,214
ImageMagick
3e9165285eda6e1bb71172031d3048b51bb443a4
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/3e9165285eda6e1bb71172031d3048b51bb443a4
None
1
static Image *ReadRLEImage(const ImageInfo *image_info,ExceptionInfo *exception) { #define SkipLinesOp 0x01 #define SetColorOp 0x02 #define SkipPixelsOp 0x03 #define ByteDataOp 0x05 #define RunDataOp 0x06 #define EOFOp 0x07 char magick[12]; Image *image; IndexPacket index; int opcode, ...
32,279,303,255,127,930,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-10049
Buffer overflow in the ReadRLEImage function in coders/rle.c in ImageMagick before 6.9.4-4 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted RLE file.
https://nvd.nist.gov/vuln/detail/CVE-2016-10049
3,216
ImageMagick
fc6080f1321fd21e86ef916195cc110b05d9effb
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/fc6080f1321fd21e86ef916195cc110b05d9effb
None
1
MagickExport XMLTreeInfo *NewXMLTree(const char *xml,ExceptionInfo *exception) { char **attribute, **attributes, *tag, *utf8; int c, terminal; MagickBooleanType status; register char *p; register ssize_t i; size_t ignore_depth, length; ssize_t j, l...
132,413,851,071,805,780,000,000,000,000,000,000,000
None
null
[ "CWE-22" ]
CVE-2016-10048
Directory traversal vulnerability in magick/module.c in ImageMagick 6.9.4-7 allows remote attackers to load arbitrary modules via unspecified vectors.
https://nvd.nist.gov/vuln/detail/CVE-2016-10048
3,217
ImageMagick
989f9f88ea6db09b99d25586e912c921c0da8d3f
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/989f9f88ea6db09b99d25586e912c921c0da8d3f
None
1
MagickExport MagickBooleanType DrawImage(Image *image,const DrawInfo *draw_info) { #define RenderImageTag "Render/Image" AffineMatrix affine, current; char key[2*MaxTextExtent], keyword[MaxTextExtent], geometry[MaxTextExtent], name[MaxTextExtent], *next_token, pattern[MaxTextExten...
274,761,832,932,917,900,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-10046
Heap-based buffer overflow in the DrawImage function in magick/draw.c in ImageMagick before 6.9.5-5 allows remote attackers to cause a denial of service (application crash) via a crafted image file.
https://nvd.nist.gov/vuln/detail/CVE-2016-10046
3,218
linux
22f6b4d34fcf039c63a94e7670e0da24f8575a5a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/22f6b4d34fcf039c63a94e7670e0da24f8575a5a
aio: mark AIO pseudo-fs noexec This ensures that do_mmap() won't implicitly make AIO memory mappings executable if the READ_IMPLIES_EXEC personality flag is set. Such behavior is problematic because the security_mmap_file LSM hook doesn't catch this case, potentially permitting an attacker to bypass a W^X policy enfo...
1
static struct dentry *aio_mount(struct file_system_type *fs_type, int flags, const char *dev_name, void *data) { static const struct dentry_operations ops = { .d_dname = simple_dname, }; return mount_pseudo(fs_type, "aio:", NULL, &ops, AIO_RING_MAGIC); }
306,823,533,012,731,260,000,000,000,000,000,000,000
aio.c
237,696,531,853,282,900,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2016-10044
The aio_mount function in fs/aio.c in the Linux kernel before 4.7.7 does not properly restrict execute access, which makes it easier for local users to bypass intended SELinux W^X policy restrictions, and consequently gain privileges, via an io_setup system call.
https://nvd.nist.gov/vuln/detail/CVE-2016-10044
3,219
slurm
92362a92fffe60187df61f99ab11c249d44120ee
https://github.com/SchedMD/slurm
https://github.com/SchedMD/slurm/commit/92362a92fffe60187df61f99ab11c249d44120ee
Fix security issue in _prolog_error(). Fix security issue caused by insecure file path handling triggered by the failure of a Prolog script. To exploit this a user needs to anticipate or cause the Prolog to fail for their job. (This commit is slightly different from the fix to the 15.08 branch.) CVE-2016-10030.
1
_prolog_error(batch_job_launch_msg_t *req, int rc) { char *err_name_ptr, err_name[256], path_name[MAXPATHLEN]; char *fmt_char; int fd; if (req->std_err || req->std_out) { if (req->std_err) strncpy(err_name, req->std_err, sizeof(err_name)); else strncpy(err_name, req->std_out, sizeof(err_name)); if ((...
132,874,965,140,059,950,000,000,000,000,000,000,000
req.c
4,641,462,002,959,163,000,000,000,000,000,000,000
[ "CWE-284" ]
CVE-2016-10030
The _prolog_error function in slurmd/req.c in Slurm before 15.08.13, 16.x before 16.05.7, and 17.x before 17.02.0-pre4 has a vulnerability in how the slurmd daemon informs users of a Prolog failure on a compute node. That vulnerability could allow a user to assume control of an arbitrary file on the system. Any exploit...
https://nvd.nist.gov/vuln/detail/CVE-2016-10030
3,231
src
ac8147a06ed2e2403fb6b9a0c03e618a9333c0e9
https://github.com/openbsd/src
https://github.com/openbsd/src/commit/ac8147a06ed2e2403fb6b9a0c03e618a9333c0e9
use sshbuf_allocate() to pre-allocate the buffer used for loading keys. This avoids implicit realloc inside the buffer code, which might theoretically leave fragments of the key on the heap. This doesn't appear to happen in practice for normal sized keys, but was observed for novelty oversize ones. Pointed out by Jann...
1
sshkey_load_file(int fd, struct sshbuf *blob) { u_char buf[1024]; size_t len; struct stat st; int r; if (fstat(fd, &st) < 0) return SSH_ERR_SYSTEM_ERROR; if ((st.st_mode & (S_IFSOCK|S_IFCHR|S_IFIFO)) == 0 && st.st_size > MAX_KEY_FILE_SIZE) return SSH_ERR_INVALID_FORMAT; for (;;) { if ((len...
87,271,877,278,747,050,000,000,000,000,000,000,000
authfile.c
264,566,486,326,241,450,000,000,000,000,000,000,000
[ "CWE-320" ]
CVE-2016-10011
authfile.c in sshd in OpenSSH before 7.4 does not properly consider the effects of realloc on buffer contents, which might allow local users to obtain sensitive private-key information by leveraging access to a privilege-separated child process.
https://nvd.nist.gov/vuln/detail/CVE-2016-10011
3,236
php-src
b2af4e8868726a040234de113436c6e4f6372d17
https://github.com/php/php-src
https://github.com/php/php-src/commit/b2af4e8868726a040234de113436c6e4f6372d17
Complete the fix of bug #70172 for PHP 7
1
PHP_FUNCTION(unserialize) { char *buf = NULL; size_t buf_len; const unsigned char *p; php_unserialize_data_t var_hash; zval *options = NULL, *classes = NULL; HashTable *class_hash = NULL; if (zend_parse_parameters(ZEND_NUM_ARGS(), "s|a", &buf, &buf_len, &options) == FAILURE) { RETURN_FALSE; } if (buf...
3,385,748,056,525,523,300,000,000,000,000,000,000
var.c
176,599,822,315,762,470,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2016-9936
The unserialize implementation in ext/standard/var.c in PHP 7.x before 7.0.14 allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted serialized data. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-6834.
https://nvd.nist.gov/vuln/detail/CVE-2016-9936
3,237
php-src
66fd44209d5ffcb9b3d1bc1b9fd8e35b485040c0
https://github.com/php/php-src
https://github.com/php/php-src/commit/66fd44209d5ffcb9b3d1bc1b9fd8e35b485040c0
Fix bug #73631 - Invalid read when wddx decodes empty boolean element
1
static void php_wddx_push_element(void *user_data, const XML_Char *name, const XML_Char **atts) { st_entry ent; wddx_stack *stack = (wddx_stack *)user_data; if (!strcmp(name, EL_PACKET)) { int i; if (atts) for (i=0; atts[i]; i++) { if (!strcmp(atts[i], EL_VERSION)) { /* nothing for now */ } } } el...
47,837,849,909,634,070,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2016-9935
The php_wddx_push_element function in ext/wddx/wddx.c in PHP before 5.6.29 and 7.x before 7.0.14 allows remote attackers to cause a denial of service (out-of-bounds read and memory corruption) or possibly have unspecified other impact via an empty boolean element in a wddxPacket XML document.
https://nvd.nist.gov/vuln/detail/CVE-2016-9935
3,241
zlib
d1d577490c15a0c6862473d7576352a9f18ef811
https://github.com/madler/zlib
https://github.com/madler/zlib/commit/d1d577490c15a0c6862473d7576352a9f18ef811
Avoid pre-decrement of pointer in big-endian CRC calculation. There was a small optimization for PowerPCs to pre-increment a pointer when accessing a word, instead of post-incrementing. This required prefacing the loop with a decrement of the pointer, possibly pointing before the object passed. This is not compliant w...
1
local unsigned long crc32_big(crc, buf, len) unsigned long crc; const unsigned char FAR *buf; unsigned len; { register z_crc_t c; register const z_crc_t FAR *buf4; c = ZSWAP32((z_crc_t)crc); c = ~c; while (len && ((ptrdiff_t)buf & 3)) { c = crc_table[4][(c >> 24) ^ *buf++] ^ (c ...
72,455,579,918,499,885,000,000,000,000,000,000,000
crc32.c
219,879,363,491,041,870,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2016-9843
The crc32_big function in crc32.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving big-endian CRC calculation.
https://nvd.nist.gov/vuln/detail/CVE-2016-9843
3,242
zlib
e54e1299404101a5a9d0cf5e45512b543967f958
https://github.com/madler/zlib
https://github.com/madler/zlib/commit/e54e1299404101a5a9d0cf5e45512b543967f958
Avoid shifts of negative values inflateMark(). The C standard says that bit shifts of negative integers is undefined. This casts to unsigned values to assure a known result.
1
long ZEXPORT inflateMark(strm) z_streamp strm; { struct inflate_state FAR *state; if (strm == Z_NULL || strm->state == Z_NULL) return -1L << 16; state = (struct inflate_state FAR *)strm->state; return ((long)(state->back) << 16) + (state->mode == COPY ? state->length : (state-...
225,690,671,182,833,500,000,000,000,000,000,000,000
inflate.c
143,972,972,253,035,300,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2016-9842
The inflateMark function in inflate.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving left shifts of negative integers.
https://nvd.nist.gov/vuln/detail/CVE-2016-9842
3,243
zlib
9aaec95e82117c1cb0f9624264c3618fc380cecb
https://github.com/madler/zlib
https://github.com/madler/zlib/commit/9aaec95e82117c1cb0f9624264c3618fc380cecb
Use post-increment only in inffast.c. An old inffast.c optimization turns out to not be optimal anymore with modern compilers, and furthermore was not compliant with the C standard, for which decrementing a pointer before its allocated memory is undefined. Per the recommendation of a security audit of the zlib code by...
1
void ZLIB_INTERNAL inflate_fast(strm, start) z_streamp strm; unsigned start; /* inflate()'s starting value for strm->avail_out */ { struct inflate_state FAR *state; z_const unsigned char FAR *in; /* local strm->next_in */ z_const unsigned char FAR *last; /* have enough input while in < last ...
180,070,009,003,744,170,000,000,000,000,000,000,000
inffast.c
141,923,369,108,859,480,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2016-9841
inffast.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.
https://nvd.nist.gov/vuln/detail/CVE-2016-9841
3,244
zlib
6a043145ca6e9c55184013841a67b2fef87e44c0
https://github.com/madler/zlib
https://github.com/madler/zlib/commit/6a043145ca6e9c55184013841a67b2fef87e44c0
Remove offset pointer optimization in inftrees.c. inftrees.c was subtracting an offset from a pointer to an array, in order to provide a pointer that allowed indexing starting at the offset. This is not compliant with the C standard, for which the behavior of a pointer decremented before its allocated memory is undefi...
1
int ZLIB_INTERNAL inflate_table(type, lens, codes, table, bits, work) codetype type; unsigned short FAR *lens; unsigned codes; code FAR * FAR *table; unsigned FAR *bits; unsigned short FAR *work; { unsigned len; /* a code's length in bits */ unsigned sym; /* index of code symbols */ ...
267,171,999,140,286,600,000,000,000,000,000,000,000
inftrees.c
83,840,119,816,087,030,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2016-9840
inftrees.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.
https://nvd.nist.gov/vuln/detail/CVE-2016-9840
3,245
linux
59643d1535eb220668692a5359de22545af579f6
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/59643d1535eb220668692a5359de22545af579f6
ring-buffer: Prevent overflow of size in ring_buffer_resize() If the size passed to ring_buffer_resize() is greater than MAX_LONG - BUF_PAGE_SIZE then the DIV_ROUND_UP() will return zero. Here's the details: # echo 18014398509481980 > /sys/kernel/debug/tracing/buffer_size_kb tracing_entries_write() processes this...
1
int ring_buffer_resize(struct ring_buffer *buffer, unsigned long size, int cpu_id) { struct ring_buffer_per_cpu *cpu_buffer; unsigned long nr_pages; int cpu, err = 0; /* * Always succeed at resizing a non-existent buffer: */ if (!buffer) return size; /* Make sure the requested buffer exists */ if (cpu...
90,202,152,161,649,740,000,000,000,000,000,000,000
ring_buffer.c
28,390,889,497,820,790,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2016-9754
The ring_buffer_resize function in kernel/trace/ring_buffer.c in the profiling subsystem in the Linux kernel before 4.6.1 mishandles certain integer calculations, which allows local users to gain privileges by writing to the /sys/kernel/debug/tracing/buffer_size_kb file.
https://nvd.nist.gov/vuln/detail/CVE-2016-9754
3,247
ImageMagick
b61d35eaccc0a7ddeff8a1c3abfcd0a43ccf210b
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/b61d35eaccc0a7ddeff8a1c3abfcd0a43ccf210b
https://github.com/ImageMagick/ImageMagick/issues/298
1
static void TIFFGetProperties(TIFF *tiff,Image *image,ExceptionInfo *exception) { char message[MagickPathExtent], *text; uint32 count, length, type; unsigned long *tietz; if (TIFFGetField(tiff,TIFFTAG_ARTIST,&text) == 1) (void) SetImageProperty(image,"tiff:artist",text,excepti...
162,973,266,049,293,700,000,000,000,000,000,000,000
tiff.c
187,666,361,061,321,670,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2016-9559
coders/tiff.c in ImageMagick before 7.0.3.7 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted image.
https://nvd.nist.gov/vuln/detail/CVE-2016-9559
3,274
jasper
d42b2388f7f8e0332c846675133acea151fc557a
https://github.com/mdadams/jasper
https://github.com/mdadams/jasper/commit/d42b2388f7f8e0332c846675133acea151fc557a
The generation of the configuration file jas_config.h has been completely reworked in order to avoid pollution of the global namespace. Some problematic types like uchar, ulong, and friends have been replaced with names with a jas_ prefix. An option max_samples has been added to the BMP and JPEG decoders to restrict ...
1
jas_matrix_t *jas_seq2d_create(int xstart, int ystart, int xend, int yend) { jas_matrix_t *matrix; assert(xstart <= xend && ystart <= yend); if (!(matrix = jas_matrix_create(yend - ystart, xend - xstart))) { return 0; } matrix->xstart_ = xstart; matrix->ystart_ = ystart; matrix->xend_ = xend; matrix->yend_...
47,377,460,787,985,390,000,000,000,000,000,000,000
jas_seq.c
231,791,317,884,716,800,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2015-5203
Double free vulnerability in the jasper_image_stop_load function in JasPer 1.900.17 allows remote attackers to cause a denial of service (crash) via a crafted JPEG 2000 image file.
https://nvd.nist.gov/vuln/detail/CVE-2015-5203
3,294
ImageMagick
ce98a7acbcfca7f0a178f4b1e7b957e419e0cc99
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/ce98a7acbcfca7f0a178f4b1e7b957e419e0cc99
https://github.com/ImageMagick/ImageMagick/issues/301
1
static Image *ReadSGIImage(const ImageInfo *image_info,ExceptionInfo *exception) { Image *image; MagickBooleanType status; MagickSizeType number_pixels; MemoryInfo *pixel_info; register Quantum *q; register ssize_t i, x; register unsigned char *p; SGIInfo iris_...
30,401,003,998,596,426,000,000,000,000,000,000,000
sgi.c
50,673,686,952,176,880,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-9556
The IsPixelGray function in MagickCore/pixel-accessor.h in ImageMagick 7.0.3-8 allows remote attackers to cause a denial of service (out-of-bounds heap read) via a crafted image file.
https://nvd.nist.gov/vuln/detail/CVE-2016-9556
3,295
jasper
f7038068550fba0e41e1d0c355787f1dcd5bf330
https://github.com/mdadams/jasper
https://github.com/mdadams/jasper/commit/f7038068550fba0e41e1d0c355787f1dcd5bf330
Added some missing sanity checks on the data in a SIZ marker segment.
1
static int jpc_siz_getparms(jpc_ms_t *ms, jpc_cstate_t *cstate, jas_stream_t *in) { jpc_siz_t *siz = &ms->parms.siz; unsigned int i; uint_fast8_t tmp; /* Eliminate compiler warning about unused variables. */ cstate = 0; if (jpc_getuint16(in, &siz->caps) || jpc_getuint32(in, &siz->width) || jpc_get...
217,306,071,554,431,300,000,000,000,000,000,000,000
jpc_cs.c
308,647,300,296,725,800,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2016-9394
The jas_seq2d_create function in jas_seq.c in JasPer before 1.900.17 allows remote attackers to cause a denial of service (assertion failure) via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2016-9394
3,296
jasper
1e84674d95353c64e5c4c0e7232ae86fd6ea813b
https://github.com/mdadams/jasper
https://github.com/mdadams/jasper/commit/1e84674d95353c64e5c4c0e7232ae86fd6ea813b
Changed the JPC bitstream code to more gracefully handle a request for a larger sized integer than what can be handled (i.e., return with an error instead of failing an assert).
1
long jpc_bitstream_getbits(jpc_bitstream_t *bitstream, int n) { long v; int u; /* We can reliably get at most 31 bits since ISO/IEC 9899 only guarantees that a long can represent values up to 2^31-1. */ assert(n >= 0 && n < 32); /* Get the number of bits requested from the specified bit stream. */ v = ...
299,025,905,055,741,460,000,000,000,000,000,000,000
jpc_bs.c
84,360,022,075,198,790,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2016-9391
The jpc_bitstream_getbits function in jpc_bs.c in JasPer before 2.0.10 allows remote attackers to cause a denial of service (assertion failure) via a very large integer.
https://nvd.nist.gov/vuln/detail/CVE-2016-9391
3,299
jasper
ba2b9d000660313af7b692542afbd374c5685865
https://github.com/mdadams/jasper
https://github.com/mdadams/jasper/commit/ba2b9d000660313af7b692542afbd374c5685865
Ensure that not all tiles lie outside the image area.
1
static int jpc_siz_getparms(jpc_ms_t *ms, jpc_cstate_t *cstate, jas_stream_t *in) { jpc_siz_t *siz = &ms->parms.siz; unsigned int i; uint_fast8_t tmp; /* Eliminate compiler warning about unused variables. */ cstate = 0; if (jpc_getuint16(in, &siz->caps) || jpc_getuint32(in, &siz->width) || jpc_getuint32...
92,505,799,264,745,780,000,000,000,000,000,000,000
jpc_cs.c
103,838,678,232,001,470,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2016-9390
The jas_seq2d_create function in jas_seq.c in JasPer before 1.900.14 allows remote attackers to cause a denial of service (assertion failure) via a crafted image file.
https://nvd.nist.gov/vuln/detail/CVE-2016-9390
3,300
jasper
dee11ec440d7908d1daf69f40a3324b27cf213ba
https://github.com/mdadams/jasper
https://github.com/mdadams/jasper/commit/dee11ec440d7908d1daf69f40a3324b27cf213ba
The component domains must be the same for the ICT/RCT in the JPC codec. This was previously enforced with an assertion. Now, it is handled in a more graceful manner.
1
static int jpc_dec_tiledecode(jpc_dec_t *dec, jpc_dec_tile_t *tile) { int i; int j; jpc_dec_tcomp_t *tcomp; jpc_dec_rlvl_t *rlvl; jpc_dec_band_t *band; int compno; int rlvlno; int bandno; int adjust; int v; jpc_dec_ccp_t *ccp; jpc_dec_cmpt_t *cmpt; if (jpc_dec_decodecblks(dec, tile)) { jas_eprintf("jpc_...
81,323,985,259,108,210,000,000,000,000,000,000,000
jpc_dec.c
304,708,091,272,308,030,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2016-9389
The jpc_irct and jpc_iict functions in jpc_mct.c in JasPer before 1.900.14 allow remote attackers to cause a denial of service (assertion failure).
https://nvd.nist.gov/vuln/detail/CVE-2016-9389
3,303
jasper
d91198abd00fc435a397fe6bad906a4c1748e9cf
https://github.com/mdadams/jasper
https://github.com/mdadams/jasper/commit/d91198abd00fc435a397fe6bad906a4c1748e9cf
Fixed another integer overflow problem.
1
static int jpc_dec_process_siz(jpc_dec_t *dec, jpc_ms_t *ms) { jpc_siz_t *siz = &ms->parms.siz; int compno; int tileno; jpc_dec_tile_t *tile; jpc_dec_tcomp_t *tcomp; int htileno; int vtileno; jpc_dec_cmpt_t *cmpt; dec->xstart = siz->xoff; dec->ystart = siz->yoff; dec->xend = siz->width; dec->yend = s...
322,953,387,659,988,940,000,000,000,000,000,000,000
jpc_dec.c
107,750,017,904,378,620,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2016-9387
Integer overflow in the jpc_dec_process_siz function in libjasper/jpc/jpc_dec.c in JasPer before 1.900.13 allows remote attackers to have unspecified impact via a crafted file, which triggers an assertion failure.
https://nvd.nist.gov/vuln/detail/CVE-2016-9387
3,311
jasper
634ce8e8a5accc0fa05dd2c20d42b4749d4b2735
https://github.com/mdadams/jasper
https://github.com/mdadams/jasper/commit/634ce8e8a5accc0fa05dd2c20d42b4749d4b2735
Made some changes to the I/O stream library for memory streams. There were a number of potential problems due to the possibility of integer overflow. Changed some integral types to the larger types size_t or ssize_t. For example, the function mem_resize now takes the buffer size parameter as a size_t. Added a new funct...
1
static int mem_resize(jas_stream_memobj_t *m, int bufsize) { unsigned char *buf; assert(bufsize >= 0); JAS_DBGLOG(100, ("mem_resize(%p, %d)\n", m, bufsize)); if (!(buf = jas_realloc2(m->buf_, bufsize, sizeof(unsigned char))) && bufsize) { JAS_DBGLOG(100, ("mem_resize realloc failed\n")); return -1; ...
66,639,206,046,311,920,000,000,000,000,000,000,000
None
null
[ "CWE-190" ]
CVE-2015-5203
Double free vulnerability in the jasper_image_stop_load function in JasPer 1.900.17 allows remote attackers to cause a denial of service (crash) via a crafted JPEG 2000 image file.
https://nvd.nist.gov/vuln/detail/CVE-2015-5203
3,314
jasper
e24bdc716c3327b067c551bc6cfb97fd2370358d
https://github.com/mdadams/jasper
https://github.com/mdadams/jasper/commit/e24bdc716c3327b067c551bc6cfb97fd2370358d
Fixed a bug that resulted in the destruction of JP2 box data that had never been constructed in the first place.
1
jp2_box_t *jp2_box_get(jas_stream_t *in) { jp2_box_t *box; jp2_boxinfo_t *boxinfo; jas_stream_t *tmpstream; uint_fast32_t len; uint_fast64_t extlen; bool dataflag; box = 0; tmpstream = 0; if (!(box = jas_malloc(sizeof(jp2_box_t)))) { goto error; } box->ops = &jp2_boxinfo_unk.ops; if (jp2_getuint32(in, &...
269,241,090,374,988,640,000,000,000,000,000,000,000
jp2_cod.c
7,434,947,174,323,374,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2016-8887
The jp2_colr_destroy function in libjasper/jp2/jp2_cod.c in JasPer before 1.900.10 allows remote attackers to cause a denial of service (NULL pointer dereference).
https://nvd.nist.gov/vuln/detail/CVE-2016-8887
3,317
jasper
5d66894d2313e3f3469f19066e149e08ff076698
https://github.com/mdadams/jasper
https://github.com/mdadams/jasper/commit/5d66894d2313e3f3469f19066e149e08ff076698
Fixed a problem with a null pointer dereference in the BMP decoder.
1
jas_image_t *bmp_decode(jas_stream_t *in, char *optstr) { jas_image_t *image; bmp_hdr_t hdr; bmp_info_t *info; uint_fast16_t cmptno; jas_image_cmptparm_t cmptparms[3]; jas_image_cmptparm_t *cmptparm; uint_fast16_t numcmpts; long n; if (optstr) { jas_eprintf("warning: ignoring BMP decoder options\n"); ...
228,936,594,935,256,760,000,000,000,000,000,000,000
bmp_dec.c
45,366,044,036,465,890,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2016-8690
The bmp_getdata function in libjasper/bmp/bmp_dec.c in JasPer before 1.900.5 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted BMP image in an imginfo command.
https://nvd.nist.gov/vuln/detail/CVE-2016-8690
3,320
jasper
44a524e367597af58d6265ae2014468b334d0309
https://github.com/mdadams/jasper
https://github.com/mdadams/jasper/commit/44a524e367597af58d6265ae2014468b334d0309
The memory stream interface allows for a buffer size of zero. The case of a zero-sized buffer was not handled correctly, as it could lead to a double free. This problem has now been fixed (hopefully). One might ask whether a zero-sized buffer should be allowed at all, but this is a question for another day.
1
static int mem_resize(jas_stream_memobj_t *m, int bufsize) { unsigned char *buf; assert(m->buf_); assert(bufsize >= 0); if (!(buf = jas_realloc2(m->buf_, bufsize, sizeof(unsigned char)))) { return -1; } m->buf_ = buf; m->bufsize_ = bufsize; return 0; }
24,603,643,167,309,006,000,000,000,000,000,000,000
jas_stream.c
131,633,196,601,018,700,000,000,000,000,000,000,000
[ "CWE-415" ]
CVE-2016-8693
Double free vulnerability in the mem_close function in jas_stream.c in JasPer before 1.900.10 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted BMP image to the imginfo command.
https://nvd.nist.gov/vuln/detail/CVE-2016-8693
3,324
libarchive
7f17c791dcfd8c0416e2cd2485b19410e47ef126
https://github.com/libarchive/libarchive
https://github.com/libarchive/libarchive/commit/7f17c791dcfd8c0416e2cd2485b19410e47ef126
Issue 761: Heap overflow reading corrupted 7Zip files The sample file that demonstrated this had multiple 'EmptyStream' attributes. The first one ended up being used to calculate certain statistics, then was overwritten by the second which was incompatible with those statistics. The fix here is to reject any header...
1
read_Header(struct archive_read *a, struct _7z_header_info *h, int check_header_id) { struct _7zip *zip = (struct _7zip *)a->format->data; const unsigned char *p; struct _7z_folder *folders; struct _7z_stream_info *si = &(zip->si); struct _7zip_entry *entries; uint32_t folderIndex, indexInFolder; unsigned i;...
275,704,645,812,219,200,000,000,000,000,000,000,000
archive_read_support_format_7zip.c
1,218,370,420,990,421,900,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2016-8689
The read_Header function in archive_read_support_format_7zip.c in libarchive 3.2.1 allows remote attackers to cause a denial of service (out-of-bounds read) via multiple EmptyStream attributes in a header in a 7zip archive.
https://nvd.nist.gov/vuln/detail/CVE-2016-8689
3,325
libarchive
e37b620fe8f14535d737e89a4dcabaed4517bf1a
https://github.com/libarchive/libarchive
https://github.com/libarchive/libarchive/commit/e37b620fe8f14535d737e89a4dcabaed4517bf1a
Issue #767: Buffer overflow printing a filename The safe_fprintf function attempts to ensure clean output for an arbitrary sequence of bytes by doing a trial conversion of the multibyte characters to wide characters -- if the resulting wide character is printable then we pass through the corresponding bytes unaltered...
1
safe_fprintf(FILE *f, const char *fmt, ...) { char fmtbuff_stack[256]; /* Place to format the printf() string. */ char outbuff[256]; /* Buffer for outgoing characters. */ char *fmtbuff_heap; /* If fmtbuff_stack is too small, we use malloc */ char *fmtbuff; /* Pointer to fmtbuff_stack or fmtbuff_heap. */ int fmtbu...
311,304,728,748,629,950,000,000,000,000,000,000,000
util.c
62,782,488,428,051,630,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-8687
Stack-based buffer overflow in the safe_fprintf function in tar/util.c in libarchive 3.2.1 allows remote attackers to cause a denial of service via a crafted non-printable multibyte character in a filename.
https://nvd.nist.gov/vuln/detail/CVE-2016-8687
3,326
libgd
53110871935244816bbb9d131da0bccff734bfe9
https://github.com/libgd/libgd
https://github.com/libgd/libgd/commit/53110871935244816bbb9d131da0bccff734bfe9
Avoid potentially dangerous signed to unsigned conversion We make sure to never pass a negative `rlen` as size to memcpy(). See also <https://bugs.php.net/bug.php?id=73280>. Patch provided by Emmanuel Law.
1
static int dynamicGetbuf(gdIOCtxPtr ctx, void *buf, int len) { int rlen, remain; dpIOCtxPtr dctx; dynamicPtr *dp; dctx = (dpIOCtxPtr) ctx; dp = dctx->dp; remain = dp->logicalSize - dp->pos; if(remain >= len) { rlen = len; } else { if(remain == 0) { /* 2.0.34: EOF is incorrect. We use 0 for * e...
79,633,158,215,157,250,000,000,000,000,000,000,000
gd_io_dp.c
268,482,256,665,110,800,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-8670
Integer signedness error in the dynamicGetbuf function in gd_io_dp.c in the GD Graphics Library (aka libgd) through 2.2.3, as used in PHP before 5.6.28 and 7.x before 7.0.13, allows remote attackers to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a crafted imagec...
https://nvd.nist.gov/vuln/detail/CVE-2016-8670
3,329
linux
647bf3d8a8e5777319da92af672289b2a6c4dc66
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/647bf3d8a8e5777319da92af672289b2a6c4dc66
IB/rxe: Fix mem_check_range integer overflow Update the range check to avoid integer-overflow in edge case. Resolves CVE 2016-8636. Signed-off-by: Eyal Itkin <eyal.itkin@gmail.com> Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com> Reviewed-by: Leon Romanovsky <leonro@mellanox.com> Signed-off-by: Doug Ledford <d...
1
int mem_check_range(struct rxe_mem *mem, u64 iova, size_t length) { switch (mem->type) { case RXE_MEM_TYPE_DMA: return 0; case RXE_MEM_TYPE_MR: case RXE_MEM_TYPE_FMR: return ((iova < mem->iova) || ((iova + length) > (mem->iova + mem->length))) ? -EFAULT : 0; default: return -EFAULT; } }
35,540,940,678,846,424,000,000,000,000,000,000,000
rxe_mr.c
113,202,750,157,069,660,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2016-8636
Integer overflow in the mem_check_range function in drivers/infiniband/sw/rxe/rxe_mr.c in the Linux kernel before 4.9.10 allows local users to cause a denial of service (memory corruption), obtain sensitive information from kernel memory, or possibly have unspecified other impact via a write or read request involving t...
https://nvd.nist.gov/vuln/detail/CVE-2016-8636
3,330
libass
aa54e0b59200a994d50a346b5d7ac818ebcf2d4b
https://github.com/libass/libass
https://github.com/libass/libass/commit/aa54e0b59200a994d50a346b5d7ac818ebcf2d4b
shaper: fix reallocation Update the variable that tracks the allocated size. This potentially improves performance and avoid some side effects, which lead to undefined behavior in some cases. Fixes fuzzer test case id:000051,sig:11,sync:fuzzer3,src:004221.
1
static bool check_allocations(ASS_Shaper *shaper, size_t new_size) { if (new_size > shaper->n_glyphs) { if (!ASS_REALLOC_ARRAY(shaper->event_text, new_size) || !ASS_REALLOC_ARRAY(shaper->ctypes, new_size) || !ASS_REALLOC_ARRAY(shaper->emblevels, new_size) || !ASS_REALLO...
280,811,577,264,489,950,000,000,000,000,000,000,000
ass_shaper.c
28,748,660,120,420,735,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2016-7972
The check_allocations function in libass/ass_shaper.c in libass before 0.13.4 allows remote attackers to cause a denial of service (memory allocation failure) via unspecified vectors.
https://nvd.nist.gov/vuln/detail/CVE-2016-7972
3,331
libass
08e754612019ed84d1db0d1fc4f5798248decd75
https://github.com/libass/libass
https://github.com/libass/libass/commit/08e754612019ed84d1db0d1fc4f5798248decd75
Fix blur coefficient calculation buffer overflow Found by fuzzer test case id:000082,sig:11,src:002579,op:havoc,rep:8. Correctness should be checked, but this fixes the overflow for good.
1
static void calc_coeff(double mu[4], const int index[4], int prefilter, double r2, double mul) { double mul2 = mul * mul, mul3 = mul2 * mul; double kernel[] = { (5204 + 2520 * mul + 1092 * mul2 + 3280 * mul3) / 12096, (2943 - 210 * mul - 273 * mul2 - 2460 * mul3) / 12096, ( 486 - 924 ...
118,260,111,892,519,520,000,000,000,000,000,000,000
ass_blur.c
96,345,802,284,211,620,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-7970
Buffer overflow in the calc_coeff function in libass/ass_blur.c in libass before 0.13.4 allows remote attackers to cause a denial of service via unspecified vectors.
https://nvd.nist.gov/vuln/detail/CVE-2016-7970
3,332
ImageMagick
d63a3c5729df59f183e9e110d5d8385d17caaad0
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/d63a3c5729df59f183e9e110d5d8385d17caaad0
None
1
MagickExport MagickBooleanType SetImageType(Image *image,const ImageType type) { const char *artifact; ImageInfo *image_info; MagickBooleanType status; QuantizeInfo *quantize_info; assert(image != (Image *) NULL); if (image->debug != MagickFalse) (void) LogMagickEvent(TraceEvent,GetM...
186,672,624,143,323,880,000,000,000,000,000,000,000
None
null
[ "CWE-416" ]
CVE-2016-7906
magick/attribute.c in ImageMagick 7.0.3-2 allows remote attackers to cause a denial of service (use-after-free) via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2016-7906
3,333
ImageMagick
a7bb158b7bedd1449a34432feb3a67c8f1873bfa
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/a7bb158b7bedd1449a34432feb3a67c8f1873bfa
https://github.com/ImageMagick/ImageMagick/issues/280
1
MagickBooleanType SyncExifProfile(Image *image,StringInfo *profile) { #define MaxDirectoryStack 16 #define EXIF_DELIMITER "\n" #define EXIF_NUM_FORMATS 12 #define TAG_EXIF_OFFSET 0x8769 #define TAG_INTEROP_OFFSET 0xa005 typedef struct _DirectoryInfo { unsigned char *directory; size_t entr...
86,130,161,965,126,200,000,000,000,000,000,000,000
profile.c
226,382,576,658,349,350,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2016-7799
MagickCore/profile.c in ImageMagick before 7.0.3-2 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2016-7799
3,341
ImageMagick
a0108a892f9ea3c2bb1e7a49b7d71376c2ecbff7
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/a0108a892f9ea3c2bb1e7a49b7d71376c2ecbff7
None
1
static MagickBooleanType WriteRGFImage(const ImageInfo *image_info,Image *image, ExceptionInfo *exception) { MagickBooleanType status; int bit; register const PixelPacket *p; register ssize_t x; ssize_t y; unsigned char byte; /* Open output image file. */ assert(...
268,413,691,376,706,580,000,000,000,000,000,000,000
None
null
[ "CWE-19" ]
CVE-2016-7540
coders/rgf.c in ImageMagick before 6.9.4-10 allows remote attackers to cause a denial of service (assertion failure) by converting an image to rgf format.
https://nvd.nist.gov/vuln/detail/CVE-2016-7540
3,346
ImageMagick
478cce544fdf1de882d78381768458f397964453
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/478cce544fdf1de882d78381768458f397964453
None
1
static void WriteTo8BimProfile(Image *image,const char *name, const StringInfo *profile) { const unsigned char *datum, *q; register const unsigned char *p; size_t length; StringInfo *profile_8bim; ssize_t count; unsigned char length_byte; unsigned int value; uns...
41,729,025,431,347,140,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2016-7536
magick/profile.c in ImageMagick allows remote attackers to cause a denial of service (segmentation fault) via a crafted profile.
https://nvd.nist.gov/vuln/detail/CVE-2016-7536
3,349
ImageMagick
bef1e4f637d8f665bc133a9c6d30df08d983bc3a
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/bef1e4f637d8f665bc133a9c6d30df08d983bc3a
https://github.com/ImageMagick/ImageMagick/issues/120
1
static Image *ReadWPGImage(const ImageInfo *image_info, ExceptionInfo *exception) { typedef struct { size_t FileId; MagickOffsetType DataOffset; unsigned int ProductType; unsigned int FileType; unsigned char MajorVersion; unsigned char MinorVersion; unsigned int EncryptKey; unsigne...
173,315,226,387,850,500,000,000,000,000,000,000,000
wpg.c
307,364,454,630,746,860,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2016-7533
The ReadWPGImage function in coders/wpg.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted WPG file.
https://nvd.nist.gov/vuln/detail/CVE-2016-7533
3,350
ImageMagick
4f2c04ea6673863b87ac7f186cbb0d911f74085c
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/4f2c04ea6673863b87ac7f186cbb0d911f74085c
Added check for out of bounds read (https://github.com/ImageMagick/ImageMagick/issues/108).
1
static void RemoveResolutionFromResourceBlock(StringInfo *bim_profile) { register const unsigned char *p; size_t length; unsigned char *datum; unsigned int count, long_sans; unsigned short id, short_sans; length=GetStringInfoLength(bim_profile); if (length < 16) return...
140,735,378,452,963,910,000,000,000,000,000,000,000
psd.c
171,607,370,422,252,440,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2016-7532
coders/psd.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PSD file.
https://nvd.nist.gov/vuln/detail/CVE-2016-7532
3,353
ImageMagick
a2e1064f288a353bc5fef7f79ccb7683759e775c
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/a2e1064f288a353bc5fef7f79ccb7683759e775c
https://github.com/ImageMagick/ImageMagick/issues/104
1
static MagickBooleanType load_tile(Image *image,Image *tile_image, XCFDocInfo *inDocInfo,XCFLayerInfo *inLayerInfo,size_t data_length, ExceptionInfo *exception) { ssize_t y; register ssize_t x; register Quantum *q; ssize_t count; unsigned char *graydata; XCFPixelInfo *xcfda...
37,826,674,930,539,910,000,000,000,000,000,000,000
xcf.c
69,929,030,200,192,770,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2016-7529
coders/xcf.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted XCF file.
https://nvd.nist.gov/vuln/detail/CVE-2016-7529
3,354
ImageMagick
ca0c886abd6d3ef335eb74150cd23b89ebd17135
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/ca0c886abd6d3ef335eb74150cd23b89ebd17135
None
1
static Image *ReadVIFFImage(const ImageInfo *image_info, ExceptionInfo *exception) { #define VFF_CM_genericRGB 15 #define VFF_CM_ntscRGB 1 #define VFF_CM_NONE 0 #define VFF_DEP_DECORDER 0x4 #define VFF_DEP_NSORDER 0x8 #define VFF_DES_RAW 0 #define VFF_LOC_IMPLICIT 1 #define VFF_MAPTYP_NONE 0 #define VFF_MAPTY...
260,039,204,831,931,700,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2016-7528
The ReadVIFFImage function in coders/viff.c in ImageMagick allows remote attackers to cause a denial of service (segmentation fault) via a crafted VIFF file.
https://nvd.nist.gov/vuln/detail/CVE-2016-7528
3,355
ImageMagick
a251039393f423c7858e63cab6aa98d17b8b7a41
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/a251039393f423c7858e63cab6aa98d17b8b7a41
None
1
static Image *ExtractPostscript(Image *image,const ImageInfo *image_info, MagickOffsetType PS_Offset,ssize_t PS_Size,ExceptionInfo *exception) { char postscript_file[MaxTextExtent]; const MagicInfo *magic_info; FILE *ps_file; ImageInfo *clone_info; Image *image2; unsigned char ...
33,895,286,292,450,400,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2016-7527
coders/wpg.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2016-7527
3,356
ImageMagick
b6ae2f9e0ab13343c0281732d479757a8e8979c7
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/b6ae2f9e0ab13343c0281732d479757a8e8979c7
None
1
static void InsertRow(unsigned char *p,ssize_t y,Image *image, int bpp) { ExceptionInfo *exception; int bit; ssize_t x; register PixelPacket *q; IndexPacket index; register IndexPacket *indexes; exception=(&image->exception); switch (bpp) { case 1: /* Convert bitma...
67,821,963,809,470,810,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2016-7526
coders/wpg.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2016-7526
3,357
ImageMagick
5f16640725b1225e6337c62526e6577f0f88edb8
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/5f16640725b1225e6337c62526e6577f0f88edb8
Fixed head buffer overflow reported in: https://github.com/ImageMagick/ImageMagick/issues/98
1
static inline size_t GetPSDRowSize(Image *image) { if (image->depth == 1) return((image->columns+7)/8); else return(image->columns*GetPSDPacketSize(image)); }
101,676,811,618,980,070,000,000,000,000,000,000,000
psd.c
171,607,370,422,252,440,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2016-7525
Heap-based buffer overflow in coders/psd.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PSD file.
https://nvd.nist.gov/vuln/detail/CVE-2016-7525
3,358
ImageMagick
30eec879c8b446b0ea9a3bb0da1a441cc8482bc4
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/30eec879c8b446b0ea9a3bb0da1a441cc8482bc4
Moved check for https://github.com/ImageMagick/ImageMagick/issues/92.
1
static ssize_t DecodePSDPixels(const size_t number_compact_pixels, const unsigned char *compact_pixels,const ssize_t depth, const size_t number_pixels,unsigned char *pixels) { #define CheckNumberCompactPixels \ if (packets == 0) \ return(i); \ packets-- #define CheckNumberPixels(count) \ if (((ssize_t) i...
23,578,839,469,788,660,000,000,000,000,000,000,000
psd.c
171,607,370,422,252,440,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2016-7521
Heap-based buffer overflow in coders/psd.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PSD file.
https://nvd.nist.gov/vuln/detail/CVE-2016-7521
3,359
ImageMagick
14e606db148d6ebcaae20f1e1d6d71903ca4a556
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/14e606db148d6ebcaae20f1e1d6d71903ca4a556
https://bugs.launchpad.net/ubuntu/+source/imagemagick/+bug/1537213
1
static MagickBooleanType WriteHDRImage(const ImageInfo *image_info,Image *image, ExceptionInfo *exception) { char header[MagickPathExtent]; const char *property; MagickBooleanType status; register const Quantum *p; register ssize_t i, x; size_t length; ssize_t count...
243,995,582,969,504,570,000,000,000,000,000,000,000
hdr.c
259,117,064,436,547,000,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2016-7520
Heap-based buffer overflow in coders/hdr.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted HDR file.
https://nvd.nist.gov/vuln/detail/CVE-2016-7520
3,360
ImageMagick
2ad6d33493750a28a5a655d319a8e0b16c392de1
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/2ad6d33493750a28a5a655d319a8e0b16c392de1
Fixed check for the number of pixels that will be allocated.
1
static Image *ReadRLEImage(const ImageInfo *image_info,ExceptionInfo *exception) { #define SkipLinesOp 0x01 #define SetColorOp 0x02 #define SkipPixelsOp 0x03 #define ByteDataOp 0x05 #define RunDataOp 0x06 #define EOFOp 0x07 char magick[12]; Image *image; int opcode, operand, status; ...
166,192,220,511,748,400,000,000,000,000,000,000,000
rle.c
305,611,083,519,864,970,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2016-7515
The ReadRLEImage function in coders/rle.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via vectors related to the number of pixels.
https://nvd.nist.gov/vuln/detail/CVE-2016-7515
3,361
ImageMagick
e14fd0a2801f73bdc123baf4fbab97dec55919eb
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/e14fd0a2801f73bdc123baf4fbab97dec55919eb
Added missing call to ConstrainColormapIndex.
1
static MagickBooleanType ReadPSDChannelPixels(Image *image, const size_t channels,const size_t row,const ssize_t type, const unsigned char *pixels,ExceptionInfo *exception) { Quantum pixel; register const unsigned char *p; register Quantum *q; register ssize_t x; size_t packet_size...
170,558,121,983,130,240,000,000,000,000,000,000,000
psd.c
171,607,370,422,252,440,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2016-7514
The ReadPSDChannelPixels function in coders/psd.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PSD file.
https://nvd.nist.gov/vuln/detail/CVE-2016-7514
3,364
nefarious2
f50a84bad996d438e7b31b9e74c32a41e43f8be5
https://github.com/evilnet/nefarious2
https://github.com/evilnet/nefarious2/commit/f50a84bad996d438e7b31b9e74c32a41e43f8be5
Fix to prevent SASL security vulnerability
1
int m_authenticate(struct Client* cptr, struct Client* sptr, int parc, char* parv[]) { struct Client* acptr; int first = 0; char realhost[HOSTLEN + 3]; char *hoststr = (cli_sockhost(cptr) ? cli_sockhost(cptr) : cli_sock_ip(cptr)); if (!CapActive(cptr, CAP_SASL)) return 0; if (parc < 2) /* have enough ...
270,299,999,591,578,300,000,000,000,000,000,000,000
m_authenticate.c
308,034,972,284,734,170,000,000,000,000,000,000,000
[ "CWE-287" ]
CVE-2016-7145
The m_authenticate function in ircd/m_authenticate.c in nefarious2 allows remote attackers to spoof certificate fingerprints and consequently log in as another user via a crafted AUTHENTICATE parameter.
https://nvd.nist.gov/vuln/detail/CVE-2016-7145
3,365
unrealircd
f473e355e1dc422c4f019dbf86bc50ba1a34a766
https://github.com/unrealircd/unrealircd
https://github.com/unrealircd/unrealircd/commit/f473e355e1dc422c4f019dbf86bc50ba1a34a766
Fix AUTHENTICATE bug
1
CMD_FUNC(m_authenticate) { aClient *agent_p = NULL; /* Failing to use CAP REQ for sasl is a protocol violation. */ if (!SASL_SERVER || !MyConnect(sptr) || BadPtr(parv[1]) || !CHECKPROTO(sptr, PROTO_SASL)) return 0; if (sptr->local->sasl_complete) { sendto_one(sptr, err_str(ERR_SASLALREADY), me.name, BadPtr(s...
190,787,633,910,337,700,000,000,000,000,000,000,000
None
null
[ "CWE-287" ]
CVE-2016-7144
The m_authenticate function in modules/m_sasl.c in UnrealIRCd before 3.2.10.7 and 4.x before 4.0.6 allows remote attackers to spoof certificate fingerprints and consequently log in as another user via a crafted AUTHENTICATE parameter.
https://nvd.nist.gov/vuln/detail/CVE-2016-7144
3,366
ImageMagick
7afcf9f71043df15508e46f079387bd4689a738d
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/7afcf9f71043df15508e46f079387bd4689a738d
Prevent buffer overflow in BMP & SGI coders (bug report from pwchen&rayzhong of tencent)
1
static Image *ReadSGIImage(const ImageInfo *image_info,ExceptionInfo *exception) { Image *image; MagickBooleanType status; MagickSizeType number_pixels; MemoryInfo *pixel_info; register Quantum *q; register ssize_t i, x; register unsigned char *p; SGIInfo iris_...
292,399,848,198,788,200,000,000,000,000,000,000,000
sgi.c
43,178,305,401,502,410,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2016-7101
The SGI coder in ImageMagick before 7.0.2-10 allows remote attackers to cause a denial of service (out-of-bounds read) via a large row value in an sgi file.
https://nvd.nist.gov/vuln/detail/CVE-2016-7101
3,372
libgd
4859d69e07504d4b0a4bdf9bcb4d9e3769ca35ae
https://github.com/libgd/libgd
https://github.com/libgd/libgd/commit/4859d69e07504d4b0a4bdf9bcb4d9e3769ca35ae
Fix invalid read in gdImageCreateFromTiffPtr() tiff_invalid_read.tiff is corrupt, and causes an invalid read in gdImageCreateFromTiffPtr(), but not in gdImageCreateFromTiff(). The culprit is dynamicGetbuf(), which doesn't check for out-of-bound reads. In this case, dynamicGetbuf() is called with a negative dp->pos, bu...
1
static int dynamicGetbuf(gdIOCtxPtr ctx, void *buf, int len) { int rlen, remain; dpIOCtxPtr dctx; dynamicPtr *dp; dctx = (dpIOCtxPtr) ctx; dp = dctx->dp; remain = dp->logicalSize - dp->pos; if(remain >= len) { rlen = len; } else { if(remain <= 0) { /* 2.0.34: EOF is incorrect. We use 0 for ...
113,302,243,464,312,720,000,000,000,000,000,000,000
gd_io_dp.c
169,924,014,127,142,480,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2016-6911
The dynamicGetbuf function in the GD Graphics Library (aka libgd) before 2.2.4 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted TIFF image.
https://nvd.nist.gov/vuln/detail/CVE-2016-6911
3,374
libgd
fb0e0cce0b9f25389ab56604c3547351617e1415
https://github.com/libgd/libgd
https://github.com/libgd/libgd/commit/fb0e0cce0b9f25389ab56604c3547351617e1415
Fix OOB reads of the TGA decompression buffer It is possible to craft TGA files which will overflow the decompression buffer, but not the image's bitmap. Therefore we augment the check for the bitmap's overflow with a check for the buffer's overflow. This issue had been reported by Ibrahim El-Sayed to security@libgd....
1
int read_image_tga( gdIOCtx *ctx, oTga *tga ) { int pixel_block_size = (tga->bits / 8); int image_block_size = (tga->width * tga->height) * pixel_block_size; int* decompression_buffer = NULL; unsigned char* conversion_buffer = NULL; int buffer_caret = 0; int bitmap_caret = 0; int i = 0; int encoded_pixels; int...
135,235,955,196,351,180,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2016-6906
The read_image_tga function in gd_tga.c in the GD Graphics Library (aka libgd) before 2.2.4 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted TGA file, related to the decompression buffer.
https://nvd.nist.gov/vuln/detail/CVE-2016-6906
3,375
ImageMagick
4cc6ec8a4197d4c008577127736bf7985d632323
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/4cc6ec8a4197d4c008577127736bf7985d632323
Prevent buffer overflow in BMP coder (bug report from pwchen of tencent).
1
static MagickBooleanType WriteBMPImage(const ImageInfo *image_info,Image *image, ExceptionInfo *exception) { BMPInfo bmp_info; const char *option; const StringInfo *profile; MagickBooleanType have_color_info, status; MagickOffsetType scene; MemoryInfo *pixel_info; regis...
171,765,265,288,600,100,000,000,000,000,000,000,000
bmp.c
142,605,325,816,453,950,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2016-6823
Integer overflow in the BMP coder in ImageMagick before 7.0.2-10 allows remote attackers to cause a denial of service (crash) via crafted height and width values, which triggers an out-of-bounds write.
https://nvd.nist.gov/vuln/detail/CVE-2016-6823
3,382
libtomcrypt
5eb9743410ce4657e9d54fef26a2ee31a1b5dd0
https://github.com/libtom/libtomcrypt
https://github.com/libtom/libtomcrypt/commit/5eb9743410ce4657e9d54fef26a2ee31a1b5dd0
rsa_verify_hash: fix possible bleichenbacher signature attack
1
int rsa_verify_hash_ex(const unsigned char *sig, unsigned long siglen, const unsigned char *hash, unsigned long hashlen, int padding, int hash_idx, unsigned long saltlen, int ...
76,073,170,727,925,490,000,000,000,000,000,000,000
rsa_verify_hash.c
139,169,440,986,897,670,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2016-6129
The rsa_verify_hash_ex function in rsa_verify_hash.c in LibTomCrypt, as used in OP-TEE before 2.2.0, does not validate that the message length is equal to the ASN.1 encoded data length, which makes it easier for remote attackers to forge RSA signatures or public certificates by leveraging a Bleichenbacher signature for...
https://nvd.nist.gov/vuln/detail/CVE-2016-6129
3,383
openjpeg
162f6199c0cd3ec1c6c6dc65e41b2faab92b2d91
https://github.com/uclouvain/openjpeg
https://github.com/uclouvain/openjpeg/commit/162f6199c0cd3ec1c6c6dc65e41b2faab92b2d91
Fix Heap Buffer Overflow in function color_cmyk_to_rgb Fix uclouvain/openjpeg#774
1
void color_cmyk_to_rgb(opj_image_t *image) { float C, M, Y, K; float sC, sM, sY, sK; unsigned int w, h, max, i; w = image->comps[0].w; h = image->comps[0].h; if(image->numcomps < 4) return; max = w * h; sC = 1.0F / (float)((1 << image->comps[0].prec) - 1); sM = 1.0F / (float)((1 << image->comps[1].p...
174,303,624,607,131,550,000,000,000,000,000,000,000
color.c
144,381,218,147,487,070,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-4796
Heap-based buffer overflow in the color_cmyk_to_rgb in common/color.c in OpenJPEG before 2.1.1 allows remote attackers to cause a denial of service (crash) via a crafted .j2k file.
https://nvd.nist.gov/vuln/detail/CVE-2016-4796
3,384
linux
d7a6be58edc01b1c66ecd8fcc91236bfbce0a420
https://github.com/torvalds/linux
https://github.com/mjg59/linux/commit/d7a6be58edc01b1c66ecd8fcc91236bfbce0a420
None
1
static int einj_error_inject(u32 type, u32 flags, u64 param1, u64 param2, u64 param3, u64 param4) { int rc; u64 base_addr, size; /* If user manually set "flags", make sure it is legal */ if (flags && (flags & ~(SETWA_FLAGS_APICID|SETWA_FLAGS_MEM|SETWA_FLAGS_PCIE_SBDF))) return -EINVAL; /* * W...
189,767,553,214,590,050,000,000,000,000,000,000,000
None
null
[ "CWE-74" ]
CVE-2016-3695
The einj_error_inject function in drivers/acpi/apei/einj.c in the Linux kernel allows local users to simulate hardware errors and consequently cause a denial of service by leveraging failure to disable APEI error injection through EINJ when securelevel is set.
https://nvd.nist.gov/vuln/detail/CVE-2016-3695
3,389
miniupnp
140ee8d2204b383279f854802b27bdb41c1d5d1a
https://github.com/miniupnp/miniupnp
https://github.com/miniupnp/miniupnp/commit/140ee8d2204b383279f854802b27bdb41c1d5d1a
minissdpd.c: Initialize pointers to NULL (fix)
1
void processRequest(struct reqelem * req) { ssize_t n; unsigned int l, m; unsigned char buf[2048]; const unsigned char * p; int type; struct device * d = devlist; unsigned char rbuf[4096]; unsigned char * rp = rbuf+1; unsigned char nrep = 0; time_t t; struct service * newserv = NULL; struct service * serv; ...
37,126,454,427,764,617,000,000,000,000,000,000,000
minissdpd.c
80,138,051,541,731,040,000,000,000,000,000,000,000
[ "CWE-388" ]
CVE-2016-3179
The processRequest function in minissdpd.c in MiniSSDPd 1.2.20130907-3 allows local users to cause a denial of service (invalid free and daemon crash) via vectors related to error handling.
https://nvd.nist.gov/vuln/detail/CVE-2016-3179
3,390
miniupnp
b238cade9a173c6f751a34acf8ccff838a62aa47
https://github.com/miniupnp/miniupnp
https://github.com/miniupnp/miniupnp/commit/b238cade9a173c6f751a34acf8ccff838a62aa47
minissdpd: Fix broken overflow test (p+l > buf+n) thanks to Salva Piero
1
void processRequest(struct reqelem * req) { ssize_t n; unsigned int l, m; unsigned char buf[2048]; const unsigned char * p; enum request_type type; struct device * d = devlist; unsigned char rbuf[RESPONSE_BUFFER_SIZE]; unsigned char * rp; unsigned char nrep = 0; time_t t; struct service * newserv = NULL; st...
230,723,959,165,221,830,000,000,000,000,000,000,000
minissdpd.c
313,447,235,104,272,300,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2016-3178
The processRequest function in minissdpd.c in MiniSSDPd 1.2.20130907-3 allows local users to cause a denial of service (out-of-bounds memory access and daemon crash) via vectors involving a negative length value.
https://nvd.nist.gov/vuln/detail/CVE-2016-3178
3,392
lhasa
6fcdb8f1f538b9d63e63a5fa199c5514a15d4564
https://github.com/fragglet/lhasa
https://github.com/fragglet/lhasa/commit/6fcdb8f1f538b9d63e63a5fa199c5514a15d4564
Fix integer underflow vulnerability in L3 decode. Marcin 'Icewall' Noga of Cisco TALOS discovered that the level 3 header decoding routines were vulnerable to an integer underflow, if the 32-bit header length was less than the base level 3 header length. This could lead to an exploitable heap corruption condition. Th...
1
static int decode_level3_header(LHAFileHeader **header, LHAInputStream *stream) { unsigned int header_len; if (lha_decode_uint16(&RAW_DATA(header, 0)) != 4) { return 0; } if (!extend_raw_data(header, stream, LEVEL_3_HEADER_LEN - RAW_DATA_LEN(header))) { return 0; } header_len = l...
82,334,831,641,499,670,000,000,000,000,000,000,000
None
null
[ "CWE-190" ]
CVE-2016-2347
Integer underflow in the decode_level3_header function in lib/lha_file_header.c in Lhasa before 0.3.1 allows remote attackers to execute arbitrary code via a crafted archive.
https://nvd.nist.gov/vuln/detail/CVE-2016-2347
3,397
linux
c3c87e770458aa004bd7ed3f29945ff436fd6511
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c3c87e770458aa004bd7ed3f29945ff436fd6511
perf: Tighten (and fix) the grouping condition The fix from 9fc81d87420d ("perf: Fix events installation during moving group") was incomplete in that it failed to recognise that creating a group with events for different CPUs is semantically broken -- they cannot be co-scheduled. Furthermore, it leads to real breakag...
1
int perf_pmu_register(struct pmu *pmu, const char *name, int type) { int cpu, ret; mutex_lock(&pmus_lock); ret = -ENOMEM; pmu->pmu_disable_count = alloc_percpu(int); if (!pmu->pmu_disable_count) goto unlock; pmu->type = -1; if (!name) goto skip_type; pmu->name = name; if (type < 0) { type = idr_alloc(...
318,169,107,449,246,140,000,000,000,000,000,000,000
core.c
213,587,612,764,546,300,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2015-9004
kernel/events/core.c in the Linux kernel before 3.19 mishandles counter grouping, which allows local users to gain privileges via a crafted application, related to the perf_pmu_register and perf_event_open functions.
https://nvd.nist.gov/vuln/detail/CVE-2015-9004
3,398
ImageMagick
9b428b7af688fe319320aed15f2b94281d1e37b4
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/9b428b7af688fe319320aed15f2b94281d1e37b4
None
1
static MagickBooleanType SkipDXTMipmaps(Image *image,DDSInfo *dds_info, int texel_size,ExceptionInfo *exception) { register ssize_t i; MagickOffsetType offset; size_t h, w; /* Only skip mipmaps for textures and cube maps */ if (EOFBlob(image) != MagickFalse) { ThrowFileExc...
161,526,989,354,860,710,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2015-8959
coders/dds.c in ImageMagick before 6.9.0-4 Beta allows remote attackers to cause a denial of service (CPU consumption) via a crafted DDS file.
https://nvd.nist.gov/vuln/detail/CVE-2015-8959
3,399
ImageMagick
b8f17d08b7418204bf8a05a5c24e87b2fc395b75
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/b8f17d08b7418204bf8a05a5c24e87b2fc395b75
http://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=26857
1
static Image *ReadSUNImage(const ImageInfo *image_info,ExceptionInfo *exception) { #define RMT_EQUAL_RGB 1 #define RMT_NONE 0 #define RMT_RAW 2 #define RT_STANDARD 1 #define RT_ENCODED 2 #define RT_FORMAT_RGB 3 typedef struct _SUNInfo { unsigned int magic, width, height, depth, ...
103,972,331,085,104,530,000,000,000,000,000,000,000
sun.c
285,366,394,174,551,600,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2015-8958
coders/sun.c in ImageMagick before 6.9.0-4 Beta allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted SUN file.
https://nvd.nist.gov/vuln/detail/CVE-2015-8958
3,400
ImageMagick
97aa7d7cfd2027f6ba7ce42caf8b798541b9cdc6
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/97aa7d7cfd2027f6ba7ce42caf8b798541b9cdc6
Fixed infinite loop and added checks for the sscanf result.
1
static Image *ReadHDRImage(const ImageInfo *image_info,ExceptionInfo *exception) { char format[MaxTextExtent], keyword[MaxTextExtent], tag[MaxTextExtent], value[MaxTextExtent]; double gamma; Image *image; int c; MagickBooleanType status, value_expected; register Quan...
132,512,135,164,293,850,000,000,000,000,000,000,000
hdr.c
197,334,708,565,562,500,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2015-8900
The ReadHDRImage function in coders/hdr.c in ImageMagick 6.x and 7.x allows remote attackers to cause a denial of service (infinite loop) via a crafted HDR file.
https://nvd.nist.gov/vuln/detail/CVE-2015-8900
3,401
ImageMagick
5b4bebaa91849c592a8448bc353ab25a54ff8c44
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/5b4bebaa91849c592a8448bc353ab25a54ff8c44
https://github.com/ImageMagick/ImageMagick/pull/34
1
MagickExport MagickBooleanType WriteImages(const ImageInfo *image_info, Image *images,const char *filename,ExceptionInfo *exception) { #define WriteImageTag "Write/Image" ExceptionInfo *sans_exception; ImageInfo *write_info; MagickBooleanType proceed; MagickOffsetType progress; MagickP...
295,077,649,590,654,430,000,000,000,000,000,000,000
constitute.c
61,617,961,026,596,400,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2015-8898
The WriteImages function in magick/constitute.c in ImageMagick before 6.9.2-4 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted image file.
https://nvd.nist.gov/vuln/detail/CVE-2015-8898
3,402
ImageMagick
7b1cf5784b5bcd85aa9293ecf56769f68c037231
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/7b1cf5784b5bcd85aa9293ecf56769f68c037231
Fixed out of bounds error in SpliceImage.
1
MagickExport Image *SpliceImage(const Image *image, const RectangleInfo *geometry,ExceptionInfo *exception) { #define SpliceImageTag "Splice/Image" CacheView *image_view, *splice_view; Image *splice_image; MagickBooleanType status; MagickOffsetType progress; RectangleInfo spli...
15,111,872,907,779,805,000,000,000,000,000,000,000
transform.c
99,447,129,808,024,770,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2015-8897
The SpliceImage function in MagickCore/transform.c in ImageMagick before 6.9.2-4 allows remote attackers to cause a denial of service (application crash) via a crafted png file.
https://nvd.nist.gov/vuln/detail/CVE-2015-8897
3,408
ImageMagick
0f6fc2d5bf8f500820c3dbcf0d23ee14f2d9f734
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/0f6fc2d5bf8f500820c3dbcf0d23ee14f2d9f734
1
static MagickBooleanType WritePICTImage(const ImageInfo *image_info, Image *image,ExceptionInfo *exception) { #define MaxCount 128 #define PictCropRegionOp 0x01 #define PictEndOfPictureOp 0xff #define PictJPEGOp 0x8200 #define PictInfoOp 0x0C00 #define PictInfoSize 512 #define PictPixmapOp 0x9A #define PictPIC...
268,543,993,326,910,650,000,000,000,000,000,000,000
pict.c
191,832,857,215,210,400,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2015-8896
Integer truncation issue in coders/pict.c in ImageMagick before 7.0.5-0 allows remote attackers to cause a denial of service (application crash) via a crafted .pict file.
https://nvd.nist.gov/vuln/detail/CVE-2015-8896
3,409
ImageMagick
4f68e9661518463fca523c9726bb5d940a2aa6d8
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/4f68e9661518463fca523c9726bb5d940a2aa6d8
https://bugs.launchpad.net/ubuntu/+source/imagemagick/+bug/1490362
1
static Image *ReadTGAImage(const ImageInfo *image_info, ExceptionInfo *exception) { Image *image; MagickBooleanType status; PixelInfo pixel; Quantum index; register Quantum *q; register ssize_t i, x; size_t base, flag, offset, real, skip; ssize_t ...
240,609,813,257,975,770,000,000,000,000,000,000,000
tga.c
312,438,178,534,953,840,000,000,000,000,000,000,000
[ "CWE-415" ]
CVE-2015-8894
Double free vulnerability in coders/tga.c in ImageMagick 7.0.0 and later allows remote attackers to cause a denial of service (application crash) via a crafted tga file.
https://nvd.nist.gov/vuln/detail/CVE-2015-8894
3,410
exfat
2e86ae5f81da11f11673d0546efb525af02b7786
https://github.com/relan/exfat
https://github.com/relan/exfat/commit/2e86ae5f81da11f11673d0546efb525af02b7786
None
1
int exfat_mount(struct exfat* ef, const char* spec, const char* options) { int rc; enum exfat_mode mode; exfat_tzset(); memset(ef, 0, sizeof(struct exfat)); parse_options(ef, options); if (match_option(options, "ro")) mode = EXFAT_MODE_RO; else if (match_option(options, "ro_fallback")) mode = EXFAT_MODE_A...
172,240,473,177,799,060,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2015-8026
Heap-based buffer overflow in the verify_vbr_checksum function in exfatfsck in exfat-utils before 1.2.1 allows remote attackers to cause a denial of service (infinite loop) or possibly execute arbitrary code via a crafted filesystem.
https://nvd.nist.gov/vuln/detail/CVE-2015-8026
3,411
linux
4b2b64d5a6ebc84214755ebccd599baef7c1b798
https://github.com/torvalds/linux
https://github.com/mjg59/linux/commit/4b2b64d5a6ebc84214755ebccd599baef7c1b798
None
1
setup_efi_state(struct boot_params *params, unsigned long params_load_addr, unsigned int efi_map_offset, unsigned int efi_map_sz, unsigned int efi_setup_data_offset) { struct efi_info *current_ei = &boot_params.efi_info; struct efi_info *ei = &params->efi_info; if (!current_ei->efi_memmap_size) return 0; /*...
305,796,494,330,244,700,000,000,000,000,000,000,000
None
null
[ "CWE-254" ]
CVE-2015-7837
The Linux kernel, as used in Red Hat Enterprise Linux 7, kernel-rt, and Enterprise MRG 2 and when booted with UEFI Secure Boot enabled, allows local users to bypass intended securelevel/secureboot restrictions by leveraging improper handling of secure_boot flag across kexec reboot.
https://nvd.nist.gov/vuln/detail/CVE-2015-7837