idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
3,092 | FFmpeg | a5d25faa3f4b18dac737fdb35d0dd68eb0dc2156 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/a5d25faa3f4b18dac737fdb35d0dd68eb0dc2156 | ffserver: Check chunk size
Fixes out of array access
Fixes: poc_ffserver.py
Found-by: Paul Cher <paulcher@icloud.com>
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 1 | static int http_receive_data(HTTPContext *c)
{
HTTPContext *c1;
int len, loop_run = 0;
while (c->chunked_encoding && !c->chunk_size &&
c->buffer_end > c->buffer_ptr) {
/* read chunk header, if present */
len = recv(c->fd, c->buffer_ptr, 1, 0);
if (len < 0) {
... | 226,374,556,346,204,150,000,000,000,000,000,000,000 | ffserver.c | 10,780,386,245,231,873,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2016-10192 | Heap-based buffer overflow in ffserver.c in FFmpeg before 2.8.10, 3.0.x before 3.0.5, 3.1.x before 3.1.6, and 3.2.x before 3.2.2 allows remote attackers to execute arbitrary code by leveraging failure to check chunk size. | https://nvd.nist.gov/vuln/detail/CVE-2016-10192 |
3,100 | bitlbee | 701ab8129ba9ea64f569daedca9a8603abad740f | https://github.com/bitlbee/bitlbee | https://github.com/bitlbee/bitlbee/commit/701ab8129ba9ea64f569daedca9a8603abad740f | imcb_file_send_start: handle ft attempts from non-existing users | 1 | file_transfer_t *imcb_file_send_start(struct im_connection *ic, char *handle, char *file_name, size_t file_size)
{
bee_t *bee = ic->bee;
bee_user_t *bu = bee_user_by_handle(bee, ic, handle);
if (bee->ui->ft_in_start) {
return bee->ui->ft_in_start(bee, bu, file_name, file_size);
} else {
return NULL;
}
}... | 295,316,547,559,436,450,000,000,000,000,000,000,000 | bee_ft.c | 22,913,504,337,913,935,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2016-10189 | BitlBee before 3.5 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) and possibly execute arbitrary code via a file transfer request for a contact that is not in the contact list. | https://nvd.nist.gov/vuln/detail/CVE-2016-10189 |
3,101 | libgd | fe9ed49dafa993e3af96b6a5a589efeea9bfb36f | https://github.com/libgd/libgd | https://github.com/libgd/libgd/commit/fe9ed49dafa993e3af96b6a5a589efeea9bfb36f | Fix DOS vulnerability in gdImageCreateFromGd2Ctx()
We must not pretend that there are image data if there are none. Instead
we fail reading the image file gracefully. | 1 | BGD_DECLARE(gdImagePtr) gdImageCreateFromGd2Ctx (gdIOCtxPtr in)
{
int sx, sy;
int i;
int ncx, ncy, nc, cs, cx, cy;
int x, y, ylo, yhi, xlo, xhi;
int vers, fmt;
t_chunk_info *chunkIdx = NULL; /* So we can gdFree it with impunity. */
unsigned char *chunkBuf = NULL; /* So we can gdFree it with impunity. */
int chu... | 70,644,606,074,500,010,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2016-10167 | The gdImageCreateFromGd2Ctx function in gd_gd2.c in the GD Graphics Library (aka libgd) before 2.2.4 allows remote attackers to cause a denial of service (application crash) via a crafted image file. | https://nvd.nist.gov/vuln/detail/CVE-2016-10167 |
3,102 | libgd | 60bfb401ad5a4a8ae995dcd36372fe15c71e1a35 | https://github.com/libgd/libgd | https://github.com/libgd/libgd/commit/60bfb401ad5a4a8ae995dcd36372fe15c71e1a35 | Fix potential unsigned underflow
No need to decrease `u`, so we don't do it. While we're at it, we also factor
out the overflow check of the loop, what improves performance and readability.
This issue has been reported by Stefan Esser to security@libgd.org. | 1 | static inline LineContribType * _gdContributionsAlloc(unsigned int line_length, unsigned int windows_size)
{
unsigned int u = 0;
LineContribType *res;
int overflow_error = 0;
res = (LineContribType *) gdMalloc(sizeof(LineContribType));
if (!res) {
return NULL;
}
res->WindowSize = windows_size;
res->Li... | 153,366,798,621,193,830,000,000,000,000,000,000,000 | gd_interpolation.c | 247,548,524,122,300,570,000,000,000,000,000,000,000 | [
"CWE-191"
] | CVE-2016-10166 | Integer underflow in the _gdContributionsAlloc function in gd_interpolation.c in the GD Graphics Library (aka libgd) before 2.2.4 allows remote attackers to have unspecified impact via vectors related to decrementing the u variable. | https://nvd.nist.gov/vuln/detail/CVE-2016-10166 |
3,103 | php-src | 16b3003ffc6393e250f069aa28a78dc5a2c064b2 | https://github.com/php/php-src | https://github.com/php/php-src/commit/16b3003ffc6393e250f069aa28a78dc5a2c064b2 | Fix bug #73825 - Heap out of bounds read on unserialize in finish_nested_data() | 1 | static inline long object_common1(UNSERIALIZE_PARAMETER, zend_class_entry *ce)
{
long elements;
elements = parse_iv2((*p) + 2, p);
(*p) += 2;
if (ce->serialize == NULL) {
object_init_ex(*rval, ce);
} else {
/* If this class implements Serializable, it should not land here but in object_custom(). The ... | 67,720,542,164,557,350,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2016-10161 | The object_common1 function in ext/standard/var_unserializer.c in PHP before 5.6.30, 7.0.x before 7.0.15, and 7.1.x before 7.1.1 allows remote attackers to cause a denial of service (buffer over-read and application crash) via crafted serialized data that is mishandled in a finish_nested_data call. | https://nvd.nist.gov/vuln/detail/CVE-2016-10161 |
3,105 | php-src | 1cda0d7c2ffb62d8331c64e703131d9cabdc03ea | https://github.com/php/php-src | https://github.com/php/php-src/commit/1cda0d7c2ffb62d8331c64e703131d9cabdc03ea | Fix bug #73737 FPE when parsing a tag format | 1 | static size_t exif_convert_any_to_int(void *value, int format, int motorola_intel TSRMLS_DC)
{
int s_den;
unsigned u_den;
switch(format) {
case TAG_FMT_SBYTE: return *(signed char *)value;
case TAG_FMT_BYTE: return *(uchar *)value;
case TAG_FMT_USHORT: return php_ifd_get16u(value, motorola_int... | 117,898,004,511,095,570,000,000,000,000,000,000,000 | exif.c | 125,847,680,861,239,830,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2016-10158 | The exif_convert_any_to_int function in ext/exif/exif.c in PHP before 5.6.30, 7.0.x before 7.0.15, and 7.1.x before 7.1.1 allows remote attackers to cause a denial of service (application crash) via crafted EXIF data that triggers an attempt to divide the minimum representable negative integer by -1. | https://nvd.nist.gov/vuln/detail/CVE-2016-10158 |
3,106 | systemd | 06eeacb6fe029804f296b065b3ce91e796e1cd0e | https://github.com/systemd/systemd | https://github.com/systemd/systemd/commit/06eeacb6fe029804f296b065b3ce91e796e1cd0e | basic: fix touch() creating files with 07777 mode
mode_t is unsigned, so MODE_INVALID < 0 can never be true.
This fixes a possible DoS where any user could fill /run by writing to
a world-writable /run/systemd/show-status. | 1 | int touch_file(const char *path, bool parents, usec_t stamp, uid_t uid, gid_t gid, mode_t mode) {
_cleanup_close_ int fd;
int r;
assert(path);
if (parents)
mkdir_parents(path, 0755);
fd = open(path, O_WRONLY|O_CREAT|O_CLOEXEC|O_NOCTTY, mode > 0 ? mode : 0644... | 144,648,291,483,335,600,000,000,000,000,000,000,000 | fs-util.c | 25,832,733,540,396,505,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2016-10156 | A flaw in systemd v228 in /src/basic/fs-util.c caused world writable suid files to be created when using the systemd timers features, allowing local attackers to escalate their privileges to root. This is fixed in v229. | https://nvd.nist.gov/vuln/detail/CVE-2016-10156 |
3,107 | linux | 06deeec77a5a689cc94b21a8a91a76e42176685d | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/06deeec77a5a689cc94b21a8a91a76e42176685d | cifs: Fix smbencrypt() to stop pointing a scatterlist at the stack
smbencrypt() points a scatterlist to the stack, which is breaks if
CONFIG_VMAP_STACK=y.
Fix it by switching to crypto_cipher_encrypt_one(). The new code
should be considerably faster as an added benefit.
This code is nearly identical to some code th... | 1 | smbhash(unsigned char *out, const unsigned char *in, unsigned char *key)
{
int rc;
unsigned char key2[8];
struct crypto_skcipher *tfm_des;
struct scatterlist sgin, sgout;
struct skcipher_request *req;
str_to_key(key, key2);
tfm_des = crypto_alloc_skcipher("ecb(des)", 0, CRYPTO_ALG_ASYNC);
if (IS_ERR(tf... | 257,379,465,516,682,100,000,000,000,000,000,000,000 | smbencrypt.c | 324,230,031,737,444,380,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2016-10154 | The smbhash function in fs/cifs/smbencrypt.c in the Linux kernel 4.9.x before 4.9.1 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page... | https://nvd.nist.gov/vuln/detail/CVE-2016-10154 |
3,108 | linux | a0f1d21c1ccb1da66629627a74059dd7f5ac9c61 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a0f1d21c1ccb1da66629627a74059dd7f5ac9c61 | KVM: use after free in kvm_ioctl_create_device()
We should move the ops->destroy(dev) after the list_del(&dev->vm_node)
so that we don't use "dev" after freeing it.
Fixes: a28ebea2adc4 ("KVM: Protect device ops->create and list_add with kvm->lock")
Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>
Reviewed-by: ... | 1 | static int kvm_ioctl_create_device(struct kvm *kvm,
struct kvm_create_device *cd)
{
struct kvm_device_ops *ops = NULL;
struct kvm_device *dev;
bool test = cd->flags & KVM_CREATE_DEVICE_TEST;
int ret;
if (cd->type >= ARRAY_SIZE(kvm_device_ops_table))
return -ENODEV;
ops = kvm_device_ops_table[cd->type];... | 192,189,468,393,468,960,000,000,000,000,000,000,000 | kvm_main.c | 247,842,350,317,630,070,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2016-10150 | Use-after-free vulnerability in the kvm_ioctl_create_device function in virt/kvm/kvm_main.c in the Linux kernel before 4.8.13 allows host OS users to cause a denial of service (host OS crash) or possibly gain privileges via crafted ioctl calls on the /dev/kvm device. | https://nvd.nist.gov/vuln/detail/CVE-2016-10150 |
3,113 | ImageMagick | d23beebe7b1179fb75db1e85fbca3100e49593d9 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/d23beebe7b1179fb75db1e85fbca3100e49593d9 | None | 1 | static Image *ExtractPostscript(Image *image,const ImageInfo *image_info,
MagickOffsetType PS_Offset,ssize_t PS_Size,ExceptionInfo *exception)
{
char
postscript_file[MaxTextExtent];
const MagicInfo
*magic_info;
FILE
*ps_file;
ImageInfo
*clone_info;
Image
*image2;
unsigned char
... | 238,566,412,475,479,400,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2016-10145 | Off-by-one error in coders/wpg.c in ImageMagick allows remote attackers to have unspecified impact via vectors related to a string copy. | https://nvd.nist.gov/vuln/detail/CVE-2016-10145 |
3,114 | ImageMagick | 97566cf2806c0a5a86e884c96831a0c3b1ec6c20 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/97566cf2806c0a5a86e884c96831a0c3b1ec6c20 | None | 1 | static MagickBooleanType WriteIPLImage(const ImageInfo *image_info,Image *image)
{
ExceptionInfo
*exception;
IPLInfo
ipl_info;
MagickBooleanType
status;
MagickOffsetType
scene;
register const PixelPacket
*p;
QuantumInfo
*quantum_info;
ssize_t
y;
unsigned char
*pixe... | 168,604,460,062,043,490,000,000,000,000,000,000,000 | None | null | [
"CWE-284"
] | CVE-2016-10144 | coders/ipl.c in ImageMagick allows remote attackers to have unspecific impact by leveraging a missing malloc check. | https://nvd.nist.gov/vuln/detail/CVE-2016-10144 |
3,115 | libgit2 | 9a64e62f0f20c9cf9b2e1609f037060eb2d8eb22 | https://github.com/libgit2/libgit2 | https://github.com/libgit2/libgit2/commit/9a64e62f0f20c9cf9b2e1609f037060eb2d8eb22 | http: check certificate validity before clobbering the error variable | 1 | static int http_connect(http_subtransport *t)
{
int error;
if (t->connected &&
http_should_keep_alive(&t->parser) &&
t->parse_finished)
return 0;
if (t->io) {
git_stream_close(t->io);
git_stream_free(t->io);
t->io = NULL;
t->connected = 0;
}
if (t->connection_data.use_ssl) {
error = git_tls_stre... | 196,554,667,555,384,750,000,000,000,000,000,000,000 | http.c | 262,511,896,804,073,250,000,000,000,000,000,000,000 | [
"CWE-284"
] | CVE-2016-10130 | The http_connect function in transports/http.c in libgit2 before 0.24.6 and 0.25.x before 0.25.1 might allow man-in-the-middle attackers to spoof servers by leveraging clobbering of the error variable. | https://nvd.nist.gov/vuln/detail/CVE-2016-10130 |
3,116 | libgit2 | 2fdef641fd0dd2828bd948234ae86de75221a11a | https://github.com/libgit2/libgit2 | https://github.com/libgit2/libgit2/commit/2fdef641fd0dd2828bd948234ae86de75221a11a | smart_pkt: treat empty packet lines as error
The Git protocol does not specify what should happen in the case
of an empty packet line (that is a packet line "0004"). We
currently indicate success, but do not return a packet in the
case where we hit an empty line. The smart protocol was not
prepared to handle such pack... | 1 | int git_pkt_parse_line(
git_pkt **head, const char *line, const char **out, size_t bufflen)
{
int ret;
int32_t len;
/* Not even enough for the length */
if (bufflen > 0 && bufflen < PKT_LEN_SIZE)
return GIT_EBUFS;
len = parse_len(line);
if (len < 0) {
/*
* If we fail to parse the length, it might be bec... | 142,114,902,155,973,480,000,000,000,000,000,000,000 | smart_pkt.c | 101,732,438,440,366,980,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2016-10129 | The Git Smart Protocol support in libgit2 before 0.24.6 and 0.25.x before 0.25.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via an empty packet line. | https://nvd.nist.gov/vuln/detail/CVE-2016-10129 |
3,119 | libgit2 | 66e3774d279672ee51c3b54545a79d20d1ada834 | https://github.com/libgit2/libgit2 | https://github.com/libgit2/libgit2/commit/66e3774d279672ee51c3b54545a79d20d1ada834 | smart_pkt: verify packet length exceeds PKT_LEN_SIZE
Each packet line in the Git protocol is prefixed by a four-byte
length of how much data will follow, which we parse in
`git_pkt_parse_line`. The transmitted length can either be equal
to zero in case of a flush packet or has to be at least of length
four, as it also... | 1 | int git_pkt_parse_line(
git_pkt **head, const char *line, const char **out, size_t bufflen)
{
int ret;
int32_t len;
/* Not even enough for the length */
if (bufflen > 0 && bufflen < PKT_LEN_SIZE)
return GIT_EBUFS;
len = parse_len(line);
if (len < 0) {
/*
* If we fail to parse the length, it might be bec... | 224,019,714,945,483,500,000,000,000,000,000,000,000 | smart_pkt.c | 144,877,423,610,598,940,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2016-10128 | Buffer overflow in the git_pkt_parse_line function in transports/smart_pkt.c in the Git Smart Protocol support in libgit2 before 0.24.6 and 0.25.x before 0.25.1 allows remote attackers to have unspecified impact via a crafted non-flush packet. | https://nvd.nist.gov/vuln/detail/CVE-2016-10128 |
3,120 | libtiff | c7153361a4041260719b340f73f2f76 | https://github.com/vadz/libtiff | https://github.com/vadz/libtiff/commit/c7153361a4041260719b340f73f2f76 | * tools/tiff2pdf.c: avoid potential heap-based overflow in
t2p_readwrite_pdf_image_tile().
Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2640 | 1 | tsize_t t2p_readwrite_pdf_image_tile(T2P* t2p, TIFF* input, TIFF* output, ttile_t tile){
uint16 edge=0;
tsize_t written=0;
unsigned char* buffer=NULL;
tsize_t bufferoffset=0;
unsigned char* samplebuffer=NULL;
tsize_t samplebufferoffset=0;
tsize_t read=0;
uint16 i=0;
ttile_t tilecount=0;
/* tsize_t tilesize=0... | 189,588,000,909,003,600,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2016-10094 | Off-by-one error in the t2p_readwrite_pdf_image_tile function in tools/tiff2pdf.c in LibTIFF 4.0.7 allows remote attackers to have unspecified impact via a crafted image. | https://nvd.nist.gov/vuln/detail/CVE-2016-10094 |
3,123 | ImageMagick | f3b483e8b054c50149912523b4773687e18afe25 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/f3b483e8b054c50149912523b4773687e18afe25 | None | 1 | static Image *ReadMATImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
Image *image, *image2=NULL,
*rotated_image;
PixelPacket *q;
unsigned int status;
MATHeader MATLAB_HDR;
size_t size;
size_t CellType;
QuantumInfo *quantum_info;
ImageInfo *clone_info;
int i;
ssize_t ldblk;
unsign... | 292,072,125,937,026,580,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2016-10071 | coders/mat.c in ImageMagick before 6.9.4-0 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted mat file. | https://nvd.nist.gov/vuln/detail/CVE-2016-10071 |
3,124 | ImageMagick | b173a352397877775c51c9a0e9d59eb6ce24c455 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/b173a352397877775c51c9a0e9d59eb6ce24c455 | None | 1 | static Image *ReadMATImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
Image *image, *image2=NULL,
*rotated_image;
PixelPacket *q;
unsigned int status;
MATHeader MATLAB_HDR;
size_t size;
size_t CellType;
QuantumInfo *quantum_info;
ImageInfo *clone_info;
int i;
ssize_t ldblk;
unsign... | 192,269,583,203,591,370,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2016-10070 | Heap-based buffer overflow in the CalcMinMax function in coders/mat.c in ImageMagick before 6.9.4-0 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted mat file. | https://nvd.nist.gov/vuln/detail/CVE-2016-10070 |
3,125 | ImageMagick | 8a370f9ab120faf182aa160900ba692ba8e2bcf0 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/8a370f9ab120faf182aa160900ba692ba8e2bcf0 | None | 1 | static Image *ReadMATImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
Image *image, *image2=NULL,
*rotated_image;
PixelPacket *q;
unsigned int status;
MATHeader MATLAB_HDR;
size_t size;
size_t CellType;
QuantumInfo *quantum_info;
ImageInfo *clone_info;
int i;
ssize_t ldblk;
unsign... | 326,982,455,566,319,460,000,000,000,000,000,000,000 | mat.c | 137,745,844,689,009,620,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2016-10069 | coders/mat.c in ImageMagick before 6.9.4-5 allows remote attackers to cause a denial of service (application crash) via a mat file with an invalid number of frames. | https://nvd.nist.gov/vuln/detail/CVE-2016-10069 |
3,126 | ImageMagick | 56d6e20de489113617cbbddaf41e92600a34db22 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/56d6e20de489113617cbbddaf41e92600a34db22 | None | 1 | static void MSLStartElement(void *context,const xmlChar *tag,
const xmlChar **attributes)
{
AffineMatrix
affine,
current;
ChannelType
channel;
char
key[MaxTextExtent],
*value;
const char
*attribute,
*keyword;
double
angle;
DrawInfo
*draw_info;
ExceptionInfo
... | 109,071,652,637,853,450,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2016-10068 | The MSL interpreter in ImageMagick before 6.9.6-4 allows remote attackers to cause a denial of service (segmentation fault and application crash) via a crafted XML file. | https://nvd.nist.gov/vuln/detail/CVE-2016-10068 |
3,128 | ImageMagick | 0474237508f39c4f783208123431815f1ededb76 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/0474237508f39c4f783208123431815f1ededb76 | None | 1 | static Image *ReadVIFFImage(const ImageInfo *image_info,
ExceptionInfo *exception)
{
#define VFF_CM_genericRGB 15
#define VFF_CM_ntscRGB 1
#define VFF_CM_NONE 0
#define VFF_DEP_DECORDER 0x4
#define VFF_DEP_NSORDER 0x8
#define VFF_DES_RAW 0
#define VFF_LOC_IMPLICIT 1
#define VFF_MAPTYP_NONE 0
#define VFF_MA... | 87,441,195,499,598,980,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-10067 | magick/memory.c in ImageMagick before 6.9.4-5 allows remote attackers to cause a denial of service (application crash) via vectors involving "too many exceptions," which trigger a buffer overflow. | https://nvd.nist.gov/vuln/detail/CVE-2016-10067 |
3,194 | ImageMagick | f6e9d0d9955e85bdd7540b251cd50d598dacc5e6 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/f6e9d0d9955e85bdd7540b251cd50d598dacc5e6 | None | 1 | static Image *ReadVIFFImage(const ImageInfo *image_info,
ExceptionInfo *exception)
{
#define VFF_CM_genericRGB 15
#define VFF_CM_ntscRGB 1
#define VFF_CM_NONE 0
#define VFF_DEP_DECORDER 0x4
#define VFF_DEP_NSORDER 0x8
#define VFF_DES_RAW 0
#define VFF_LOC_IMPLICIT 1
#define VFF_MAPTYP_NONE 0
#define VFF_MAPTY... | 194,560,327,807,090,180,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-10066 | Buffer overflow in the ReadVIFFImage function in coders/viff.c in ImageMagick before 6.9.4-5 allows remote attackers to cause a denial of service (application crash) via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2016-10066 |
3,200 | ImageMagick | f8877abac8e568b2f339cca70c2c3c1b6eaec288 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/f8877abac8e568b2f339cca70c2c3c1b6eaec288 | None | 1 | static Image *ReadTIFFImage(const ImageInfo *image_info,
ExceptionInfo *exception)
{
const char
*option;
float
*chromaticity,
x_position,
y_position,
x_resolution,
y_resolution;
Image
*image;
int
tiff_status;
MagickBooleanType
status;
MagickSizeType
number_pixe... | 58,632,908,984,196,000,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-10064 | Buffer overflow in coders/tiff.c in ImageMagick before 6.9.5-1 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2016-10064 |
3,201 | ImageMagick | 2bb6941a2d557f26a2f2049ade466e118eeaab91 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/2bb6941a2d557f26a2f2049ade466e118eeaab91 | None | 1 | static Image *ReadTIFFImage(const ImageInfo *image_info,
ExceptionInfo *exception)
{
const char
*option;
float
*chromaticity,
x_position,
y_position,
x_resolution,
y_resolution;
Image
*image;
int
tiff_status;
MagickBooleanType
status;
MagickSizeType
number_pixe... | 66,992,638,402,097,515,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-10063 | Buffer overflow in coders/tiff.c in ImageMagick before 6.9.5-1 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted file, related to extend validity. | https://nvd.nist.gov/vuln/detail/CVE-2016-10063 |
3,202 | ImageMagick | 4e914bbe371433f0590cefdf3bd5f3a5710069f9 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/4e914bbe371433f0590cefdf3bd5f3a5710069f9 | https://github.com/ImageMagick/ImageMagick/issues/196 | 1 | static Image *ReadGROUP4Image(const ImageInfo *image_info,
ExceptionInfo *exception)
{
char
filename[MagickPathExtent];
FILE
*file;
Image
*image;
ImageInfo
*read_info;
int
c,
unique_file;
MagickBooleanType
status;
size_t
length;
ssize_t
offset,
strip_offs... | 153,305,737,271,191,830,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2016-10061 | The ReadGROUP4Image function in coders/tiff.c in ImageMagick before 7.0.1-10 does not check the return value of the fputc function, which allows remote attackers to cause a denial of service (crash) via a crafted image file. | https://nvd.nist.gov/vuln/detail/CVE-2016-10061 |
3,203 | ImageMagick | 933e96f01a8c889c7bf5ffd30020e86a02a046e7 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/933e96f01a8c889c7bf5ffd30020e86a02a046e7 | https://github.com/ImageMagick/ImageMagick/issues/196 | 1 | static MagickBooleanType ConcatenateImages(int argc,char **argv,
ExceptionInfo *exception )
{
FILE
*input,
*output;
int
c;
register ssize_t
i;
if (ExpandFilenames(&argc,&argv) == MagickFalse)
ThrowFileException(exception,ResourceLimitError,"MemoryAllocationFailed",
... | 20,999,313,557,570,732,000,000,000,000,000,000,000 | magick-cli.c | 12,808,080,539,331,031,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2016-10060 | The ConcatenateImages function in MagickWand/magick-cli.c in ImageMagick before 7.0.1-10 does not check the return value of the fputc function, which allows remote attackers to cause a denial of service (application crash) via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2016-10060 |
3,205 | ImageMagick | 58cf5bf4fade82e3b510e8f3463a967278a3e410 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/58cf5bf4fade82e3b510e8f3463a967278a3e410 | None | 1 | static Image *ReadTIFFImage(const ImageInfo *image_info,
ExceptionInfo *exception)
{
const char
*option;
float
*chromaticity,
x_position,
y_position,
x_resolution,
y_resolution;
Image
*image;
int
tiff_status;
MagickBooleanType
status;
MagickSizeType
number_pixe... | 25,900,952,869,174,794,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-10059 | Buffer overflow in coders/tiff.c in ImageMagick before 6.9.4-1 allows remote attackers to cause a denial of service (application crash) or have unspecified other impact via a crafted TIFF file. | https://nvd.nist.gov/vuln/detail/CVE-2016-10059 |
3,206 | ImageMagick | 4ec444f4eab88cf4bec664fafcf9cab50bc5ff6a | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/4ec444f4eab88cf4bec664fafcf9cab50bc5ff6a | None | 1 | ModuleExport MagickBooleanType ReadPSDLayers(Image *image,
const ImageInfo *image_info,const PSDInfo *psd_info,
const MagickBooleanType skip_layers,ExceptionInfo *exception)
{
char
type[4];
LayerInfo
*layer_info;
MagickSizeType
size;
MagickBooleanType
status;
register ssize_t
i;
... | 278,062,416,282,574,900,000,000,000,000,000,000,000 | None | null | [
"CWE-400"
] | CVE-2016-10058 | Memory leak in the ReadPSDLayers function in coders/psd.c in ImageMagick before 6.9.6-3 allows remote attackers to cause a denial of service (memory consumption) via a crafted image file. | https://nvd.nist.gov/vuln/detail/CVE-2016-10058 |
3,207 | ImageMagick | 10b3823a7619ed22d42764733eb052c4159bc8c1 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/10b3823a7619ed22d42764733eb052c4159bc8c1 | None | 1 | static MagickBooleanType WriteMAPImage(const ImageInfo *image_info,Image *image)
{
MagickBooleanType
status;
register const IndexPacket
*indexes;
register const PixelPacket
*p;
register ssize_t
i,
x;
register unsigned char
*q;
size_t
depth,
packet_size;
ssize_t
y;... | 138,602,654,054,034,700,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-10054 | Buffer overflow in the WriteMAPImage function in coders/map.c in ImageMagick before 6.9.5-8 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2016-10054 |
3,210 | ImageMagick | 10b3823a7619ed22d42764733eb052c4159bc8c1 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/10b3823a7619ed22d42764733eb052c4159bc8c1 | None | 1 | static MagickBooleanType WriteGROUP4Image(const ImageInfo *image_info,
Image *image)
{
char
filename[MaxTextExtent];
FILE
*file;
Image
*huffman_image;
ImageInfo
*write_info;
int
unique_file;
MagickBooleanType
status;
register ssize_t
i;
ssize_t
count;
TIFF
... | 138,399,397,511,847,460,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-10054 | Buffer overflow in the WriteMAPImage function in coders/map.c in ImageMagick before 6.9.5-8 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2016-10054 |
3,211 | ImageMagick | f983dcdf9c178e0cbc49608a78713c5669aa1bb5 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/f983dcdf9c178e0cbc49608a78713c5669aa1bb5 | None | 1 | static MagickBooleanType WriteTIFFImage(const ImageInfo *image_info,
Image *image)
{
#if !defined(TIFFDefaultStripSize)
#define TIFFDefaultStripSize(tiff,request) (8192UL/TIFFScanlineSize(tiff))
#endif
const char
*mode,
*option;
CompressionType
compression;
EndianType
endian_type;
MagickB... | 142,572,469,438,655,880,000,000,000,000,000,000,000 | None | null | [
"CWE-369"
] | CVE-2016-10053 | The WriteTIFFImage function in coders/tiff.c in ImageMagick before 6.9.5-8 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2016-10053 |
3,212 | ImageMagick | ecc03a2518c2b7dd375fde3a040fdae0bdf6a521 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/ecc03a2518c2b7dd375fde3a040fdae0bdf6a521 | None | 1 | static Image *ReadPWPImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
FILE
*file;
Image
*image,
*next_image,
*pwp_image;
ImageInfo
*read_info;
int
c,
unique_file;
MagickBooleanType
status;
register Image
*p;
register ssize_t
i;
size_t
files... | 35,362,358,607,063,336,000,000,000,000,000,000,000 | None | null | [
"CWE-416"
] | CVE-2016-10051 | Use-after-free vulnerability in the ReadPWPImage function in coders/pwp.c in ImageMagick 6.9.5-5 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2016-10051 |
3,213 | ImageMagick | 73fb0aac5b958521e1511e179ecc0ad49f70ebaf | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/73fb0aac5b958521e1511e179ecc0ad49f70ebaf | None | 1 | static Image *ReadRLEImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
#define SkipLinesOp 0x01
#define SetColorOp 0x02
#define SkipPixelsOp 0x03
#define ByteDataOp 0x05
#define RunDataOp 0x06
#define EOFOp 0x07
char
magick[12];
Image
*image;
IndexPacket
index;
int
opcode,
... | 75,140,968,535,640,320,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-10050 | Heap-based buffer overflow in the ReadRLEImage function in coders/rle.c in ImageMagick 6.9.4-8 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted RLE file. | https://nvd.nist.gov/vuln/detail/CVE-2016-10050 |
3,214 | ImageMagick | 3e9165285eda6e1bb71172031d3048b51bb443a4 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/3e9165285eda6e1bb71172031d3048b51bb443a4 | None | 1 | static Image *ReadRLEImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
#define SkipLinesOp 0x01
#define SetColorOp 0x02
#define SkipPixelsOp 0x03
#define ByteDataOp 0x05
#define RunDataOp 0x06
#define EOFOp 0x07
char
magick[12];
Image
*image;
IndexPacket
index;
int
opcode,
... | 32,279,303,255,127,930,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-10049 | Buffer overflow in the ReadRLEImage function in coders/rle.c in ImageMagick before 6.9.4-4 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted RLE file. | https://nvd.nist.gov/vuln/detail/CVE-2016-10049 |
3,216 | ImageMagick | fc6080f1321fd21e86ef916195cc110b05d9effb | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/fc6080f1321fd21e86ef916195cc110b05d9effb | None | 1 | MagickExport XMLTreeInfo *NewXMLTree(const char *xml,ExceptionInfo *exception)
{
char
**attribute,
**attributes,
*tag,
*utf8;
int
c,
terminal;
MagickBooleanType
status;
register char
*p;
register ssize_t
i;
size_t
ignore_depth,
length;
ssize_t
j,
l... | 132,413,851,071,805,780,000,000,000,000,000,000,000 | None | null | [
"CWE-22"
] | CVE-2016-10048 | Directory traversal vulnerability in magick/module.c in ImageMagick 6.9.4-7 allows remote attackers to load arbitrary modules via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2016-10048 |
3,217 | ImageMagick | 989f9f88ea6db09b99d25586e912c921c0da8d3f | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/989f9f88ea6db09b99d25586e912c921c0da8d3f | None | 1 | MagickExport MagickBooleanType DrawImage(Image *image,const DrawInfo *draw_info)
{
#define RenderImageTag "Render/Image"
AffineMatrix
affine,
current;
char
key[2*MaxTextExtent],
keyword[MaxTextExtent],
geometry[MaxTextExtent],
name[MaxTextExtent],
*next_token,
pattern[MaxTextExten... | 274,761,832,932,917,900,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-10046 | Heap-based buffer overflow in the DrawImage function in magick/draw.c in ImageMagick before 6.9.5-5 allows remote attackers to cause a denial of service (application crash) via a crafted image file. | https://nvd.nist.gov/vuln/detail/CVE-2016-10046 |
3,218 | linux | 22f6b4d34fcf039c63a94e7670e0da24f8575a5a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/22f6b4d34fcf039c63a94e7670e0da24f8575a5a | aio: mark AIO pseudo-fs noexec
This ensures that do_mmap() won't implicitly make AIO memory mappings
executable if the READ_IMPLIES_EXEC personality flag is set. Such
behavior is problematic because the security_mmap_file LSM hook doesn't
catch this case, potentially permitting an attacker to bypass a W^X
policy enfo... | 1 | static struct dentry *aio_mount(struct file_system_type *fs_type,
int flags, const char *dev_name, void *data)
{
static const struct dentry_operations ops = {
.d_dname = simple_dname,
};
return mount_pseudo(fs_type, "aio:", NULL, &ops, AIO_RING_MAGIC);
}
| 306,823,533,012,731,260,000,000,000,000,000,000,000 | aio.c | 237,696,531,853,282,900,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2016-10044 | The aio_mount function in fs/aio.c in the Linux kernel before 4.7.7 does not properly restrict execute access, which makes it easier for local users to bypass intended SELinux W^X policy restrictions, and consequently gain privileges, via an io_setup system call. | https://nvd.nist.gov/vuln/detail/CVE-2016-10044 |
3,219 | slurm | 92362a92fffe60187df61f99ab11c249d44120ee | https://github.com/SchedMD/slurm | https://github.com/SchedMD/slurm/commit/92362a92fffe60187df61f99ab11c249d44120ee | Fix security issue in _prolog_error().
Fix security issue caused by insecure file path handling triggered by
the failure of a Prolog script. To exploit this a user needs to
anticipate or cause the Prolog to fail for their job.
(This commit is slightly different from the fix to the 15.08 branch.)
CVE-2016-10030. | 1 | _prolog_error(batch_job_launch_msg_t *req, int rc)
{
char *err_name_ptr, err_name[256], path_name[MAXPATHLEN];
char *fmt_char;
int fd;
if (req->std_err || req->std_out) {
if (req->std_err)
strncpy(err_name, req->std_err, sizeof(err_name));
else
strncpy(err_name, req->std_out, sizeof(err_name));
if ((... | 132,874,965,140,059,950,000,000,000,000,000,000,000 | req.c | 4,641,462,002,959,163,000,000,000,000,000,000,000 | [
"CWE-284"
] | CVE-2016-10030 | The _prolog_error function in slurmd/req.c in Slurm before 15.08.13, 16.x before 16.05.7, and 17.x before 17.02.0-pre4 has a vulnerability in how the slurmd daemon informs users of a Prolog failure on a compute node. That vulnerability could allow a user to assume control of an arbitrary file on the system. Any exploit... | https://nvd.nist.gov/vuln/detail/CVE-2016-10030 |
3,231 | src | ac8147a06ed2e2403fb6b9a0c03e618a9333c0e9 | https://github.com/openbsd/src | https://github.com/openbsd/src/commit/ac8147a06ed2e2403fb6b9a0c03e618a9333c0e9 | use sshbuf_allocate() to pre-allocate the buffer used for loading
keys. This avoids implicit realloc inside the buffer code, which
might theoretically leave fragments of the key on the heap. This
doesn't appear to happen in practice for normal sized keys, but
was observed for novelty oversize ones.
Pointed out by Jann... | 1 | sshkey_load_file(int fd, struct sshbuf *blob)
{
u_char buf[1024];
size_t len;
struct stat st;
int r;
if (fstat(fd, &st) < 0)
return SSH_ERR_SYSTEM_ERROR;
if ((st.st_mode & (S_IFSOCK|S_IFCHR|S_IFIFO)) == 0 &&
st.st_size > MAX_KEY_FILE_SIZE)
return SSH_ERR_INVALID_FORMAT;
for (;;) {
if ((len... | 87,271,877,278,747,050,000,000,000,000,000,000,000 | authfile.c | 264,566,486,326,241,450,000,000,000,000,000,000,000 | [
"CWE-320"
] | CVE-2016-10011 | authfile.c in sshd in OpenSSH before 7.4 does not properly consider the effects of realloc on buffer contents, which might allow local users to obtain sensitive private-key information by leveraging access to a privilege-separated child process. | https://nvd.nist.gov/vuln/detail/CVE-2016-10011 |
3,236 | php-src | b2af4e8868726a040234de113436c6e4f6372d17 | https://github.com/php/php-src | https://github.com/php/php-src/commit/b2af4e8868726a040234de113436c6e4f6372d17 | Complete the fix of bug #70172 for PHP 7 | 1 | PHP_FUNCTION(unserialize)
{
char *buf = NULL;
size_t buf_len;
const unsigned char *p;
php_unserialize_data_t var_hash;
zval *options = NULL, *classes = NULL;
HashTable *class_hash = NULL;
if (zend_parse_parameters(ZEND_NUM_ARGS(), "s|a", &buf, &buf_len, &options) == FAILURE) {
RETURN_FALSE;
}
if (buf... | 3,385,748,056,525,523,300,000,000,000,000,000,000 | var.c | 176,599,822,315,762,470,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2016-9936 | The unserialize implementation in ext/standard/var.c in PHP 7.x before 7.0.14 allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted serialized data. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-6834. | https://nvd.nist.gov/vuln/detail/CVE-2016-9936 |
3,237 | php-src | 66fd44209d5ffcb9b3d1bc1b9fd8e35b485040c0 | https://github.com/php/php-src | https://github.com/php/php-src/commit/66fd44209d5ffcb9b3d1bc1b9fd8e35b485040c0 | Fix bug #73631 - Invalid read when wddx decodes empty boolean element | 1 | static void php_wddx_push_element(void *user_data, const XML_Char *name, const XML_Char **atts)
{
st_entry ent;
wddx_stack *stack = (wddx_stack *)user_data;
if (!strcmp(name, EL_PACKET)) {
int i;
if (atts) for (i=0; atts[i]; i++) {
if (!strcmp(atts[i], EL_VERSION)) {
/* nothing for now */
}
}
} el... | 47,837,849,909,634,070,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2016-9935 | The php_wddx_push_element function in ext/wddx/wddx.c in PHP before 5.6.29 and 7.x before 7.0.14 allows remote attackers to cause a denial of service (out-of-bounds read and memory corruption) or possibly have unspecified other impact via an empty boolean element in a wddxPacket XML document. | https://nvd.nist.gov/vuln/detail/CVE-2016-9935 |
3,241 | zlib | d1d577490c15a0c6862473d7576352a9f18ef811 | https://github.com/madler/zlib | https://github.com/madler/zlib/commit/d1d577490c15a0c6862473d7576352a9f18ef811 | Avoid pre-decrement of pointer in big-endian CRC calculation.
There was a small optimization for PowerPCs to pre-increment a
pointer when accessing a word, instead of post-incrementing. This
required prefacing the loop with a decrement of the pointer,
possibly pointing before the object passed. This is not compliant
w... | 1 | local unsigned long crc32_big(crc, buf, len)
unsigned long crc;
const unsigned char FAR *buf;
unsigned len;
{
register z_crc_t c;
register const z_crc_t FAR *buf4;
c = ZSWAP32((z_crc_t)crc);
c = ~c;
while (len && ((ptrdiff_t)buf & 3)) {
c = crc_table[4][(c >> 24) ^ *buf++] ^ (c ... | 72,455,579,918,499,885,000,000,000,000,000,000,000 | crc32.c | 219,879,363,491,041,870,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2016-9843 | The crc32_big function in crc32.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving big-endian CRC calculation. | https://nvd.nist.gov/vuln/detail/CVE-2016-9843 |
3,242 | zlib | e54e1299404101a5a9d0cf5e45512b543967f958 | https://github.com/madler/zlib | https://github.com/madler/zlib/commit/e54e1299404101a5a9d0cf5e45512b543967f958 | Avoid shifts of negative values inflateMark().
The C standard says that bit shifts of negative integers is
undefined. This casts to unsigned values to assure a known
result. | 1 | long ZEXPORT inflateMark(strm)
z_streamp strm;
{
struct inflate_state FAR *state;
if (strm == Z_NULL || strm->state == Z_NULL) return -1L << 16;
state = (struct inflate_state FAR *)strm->state;
return ((long)(state->back) << 16) +
(state->mode == COPY ? state->length :
(state-... | 225,690,671,182,833,500,000,000,000,000,000,000,000 | inflate.c | 143,972,972,253,035,300,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2016-9842 | The inflateMark function in inflate.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving left shifts of negative integers. | https://nvd.nist.gov/vuln/detail/CVE-2016-9842 |
3,243 | zlib | 9aaec95e82117c1cb0f9624264c3618fc380cecb | https://github.com/madler/zlib | https://github.com/madler/zlib/commit/9aaec95e82117c1cb0f9624264c3618fc380cecb | Use post-increment only in inffast.c.
An old inffast.c optimization turns out to not be optimal anymore
with modern compilers, and furthermore was not compliant with the
C standard, for which decrementing a pointer before its allocated
memory is undefined. Per the recommendation of a security audit of
the zlib code by... | 1 | void ZLIB_INTERNAL inflate_fast(strm, start)
z_streamp strm;
unsigned start; /* inflate()'s starting value for strm->avail_out */
{
struct inflate_state FAR *state;
z_const unsigned char FAR *in; /* local strm->next_in */
z_const unsigned char FAR *last; /* have enough input while in < last ... | 180,070,009,003,744,170,000,000,000,000,000,000,000 | inffast.c | 141,923,369,108,859,480,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2016-9841 | inffast.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic. | https://nvd.nist.gov/vuln/detail/CVE-2016-9841 |
3,244 | zlib | 6a043145ca6e9c55184013841a67b2fef87e44c0 | https://github.com/madler/zlib | https://github.com/madler/zlib/commit/6a043145ca6e9c55184013841a67b2fef87e44c0 | Remove offset pointer optimization in inftrees.c.
inftrees.c was subtracting an offset from a pointer to an array,
in order to provide a pointer that allowed indexing starting at
the offset. This is not compliant with the C standard, for which
the behavior of a pointer decremented before its allocated memory
is undefi... | 1 | int ZLIB_INTERNAL inflate_table(type, lens, codes, table, bits, work)
codetype type;
unsigned short FAR *lens;
unsigned codes;
code FAR * FAR *table;
unsigned FAR *bits;
unsigned short FAR *work;
{
unsigned len; /* a code's length in bits */
unsigned sym; /* index of code symbols */
... | 267,171,999,140,286,600,000,000,000,000,000,000,000 | inftrees.c | 83,840,119,816,087,030,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2016-9840 | inftrees.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic. | https://nvd.nist.gov/vuln/detail/CVE-2016-9840 |
3,245 | linux | 59643d1535eb220668692a5359de22545af579f6 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/59643d1535eb220668692a5359de22545af579f6 | ring-buffer: Prevent overflow of size in ring_buffer_resize()
If the size passed to ring_buffer_resize() is greater than MAX_LONG - BUF_PAGE_SIZE
then the DIV_ROUND_UP() will return zero.
Here's the details:
# echo 18014398509481980 > /sys/kernel/debug/tracing/buffer_size_kb
tracing_entries_write() processes this... | 1 | int ring_buffer_resize(struct ring_buffer *buffer, unsigned long size,
int cpu_id)
{
struct ring_buffer_per_cpu *cpu_buffer;
unsigned long nr_pages;
int cpu, err = 0;
/*
* Always succeed at resizing a non-existent buffer:
*/
if (!buffer)
return size;
/* Make sure the requested buffer exists */
if (cpu... | 90,202,152,161,649,740,000,000,000,000,000,000,000 | ring_buffer.c | 28,390,889,497,820,790,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2016-9754 | The ring_buffer_resize function in kernel/trace/ring_buffer.c in the profiling subsystem in the Linux kernel before 4.6.1 mishandles certain integer calculations, which allows local users to gain privileges by writing to the /sys/kernel/debug/tracing/buffer_size_kb file. | https://nvd.nist.gov/vuln/detail/CVE-2016-9754 |
3,247 | ImageMagick | b61d35eaccc0a7ddeff8a1c3abfcd0a43ccf210b | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/b61d35eaccc0a7ddeff8a1c3abfcd0a43ccf210b | https://github.com/ImageMagick/ImageMagick/issues/298 | 1 | static void TIFFGetProperties(TIFF *tiff,Image *image,ExceptionInfo *exception)
{
char
message[MagickPathExtent],
*text;
uint32
count,
length,
type;
unsigned long
*tietz;
if (TIFFGetField(tiff,TIFFTAG_ARTIST,&text) == 1)
(void) SetImageProperty(image,"tiff:artist",text,excepti... | 162,973,266,049,293,700,000,000,000,000,000,000,000 | tiff.c | 187,666,361,061,321,670,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2016-9559 | coders/tiff.c in ImageMagick before 7.0.3.7 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted image. | https://nvd.nist.gov/vuln/detail/CVE-2016-9559 |
3,274 | jasper | d42b2388f7f8e0332c846675133acea151fc557a | https://github.com/mdadams/jasper | https://github.com/mdadams/jasper/commit/d42b2388f7f8e0332c846675133acea151fc557a | The generation of the configuration file jas_config.h has been completely
reworked in order to avoid pollution of the global namespace.
Some problematic types like uchar, ulong, and friends have been replaced
with names with a jas_ prefix.
An option max_samples has been added to the BMP and JPEG decoders to
restrict ... | 1 | jas_matrix_t *jas_seq2d_create(int xstart, int ystart, int xend, int yend)
{
jas_matrix_t *matrix;
assert(xstart <= xend && ystart <= yend);
if (!(matrix = jas_matrix_create(yend - ystart, xend - xstart))) {
return 0;
}
matrix->xstart_ = xstart;
matrix->ystart_ = ystart;
matrix->xend_ = xend;
matrix->yend_... | 47,377,460,787,985,390,000,000,000,000,000,000,000 | jas_seq.c | 231,791,317,884,716,800,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2015-5203 | Double free vulnerability in the jasper_image_stop_load function in JasPer 1.900.17 allows remote attackers to cause a denial of service (crash) via a crafted JPEG 2000 image file. | https://nvd.nist.gov/vuln/detail/CVE-2015-5203 |
3,294 | ImageMagick | ce98a7acbcfca7f0a178f4b1e7b957e419e0cc99 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/ce98a7acbcfca7f0a178f4b1e7b957e419e0cc99 | https://github.com/ImageMagick/ImageMagick/issues/301 | 1 | static Image *ReadSGIImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
Image
*image;
MagickBooleanType
status;
MagickSizeType
number_pixels;
MemoryInfo
*pixel_info;
register Quantum
*q;
register ssize_t
i,
x;
register unsigned char
*p;
SGIInfo
iris_... | 30,401,003,998,596,426,000,000,000,000,000,000,000 | sgi.c | 50,673,686,952,176,880,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2016-9556 | The IsPixelGray function in MagickCore/pixel-accessor.h in ImageMagick 7.0.3-8 allows remote attackers to cause a denial of service (out-of-bounds heap read) via a crafted image file. | https://nvd.nist.gov/vuln/detail/CVE-2016-9556 |
3,295 | jasper | f7038068550fba0e41e1d0c355787f1dcd5bf330 | https://github.com/mdadams/jasper | https://github.com/mdadams/jasper/commit/f7038068550fba0e41e1d0c355787f1dcd5bf330 | Added some missing sanity checks on the data in a SIZ marker segment. | 1 | static int jpc_siz_getparms(jpc_ms_t *ms, jpc_cstate_t *cstate,
jas_stream_t *in)
{
jpc_siz_t *siz = &ms->parms.siz;
unsigned int i;
uint_fast8_t tmp;
/* Eliminate compiler warning about unused variables. */
cstate = 0;
if (jpc_getuint16(in, &siz->caps) ||
jpc_getuint32(in, &siz->width) ||
jpc_get... | 217,306,071,554,431,300,000,000,000,000,000,000,000 | jpc_cs.c | 308,647,300,296,725,800,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2016-9394 | The jas_seq2d_create function in jas_seq.c in JasPer before 1.900.17 allows remote attackers to cause a denial of service (assertion failure) via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2016-9394 |
3,296 | jasper | 1e84674d95353c64e5c4c0e7232ae86fd6ea813b | https://github.com/mdadams/jasper | https://github.com/mdadams/jasper/commit/1e84674d95353c64e5c4c0e7232ae86fd6ea813b | Changed the JPC bitstream code to more gracefully handle a request
for a larger sized integer than what can be handled (i.e., return
with an error instead of failing an assert). | 1 | long jpc_bitstream_getbits(jpc_bitstream_t *bitstream, int n)
{
long v;
int u;
/* We can reliably get at most 31 bits since ISO/IEC 9899 only
guarantees that a long can represent values up to 2^31-1. */
assert(n >= 0 && n < 32);
/* Get the number of bits requested from the specified bit stream. */
v = ... | 299,025,905,055,741,460,000,000,000,000,000,000,000 | jpc_bs.c | 84,360,022,075,198,790,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2016-9391 | The jpc_bitstream_getbits function in jpc_bs.c in JasPer before 2.0.10 allows remote attackers to cause a denial of service (assertion failure) via a very large integer. | https://nvd.nist.gov/vuln/detail/CVE-2016-9391 |
3,299 | jasper | ba2b9d000660313af7b692542afbd374c5685865 | https://github.com/mdadams/jasper | https://github.com/mdadams/jasper/commit/ba2b9d000660313af7b692542afbd374c5685865 | Ensure that not all tiles lie outside the image area. | 1 | static int jpc_siz_getparms(jpc_ms_t *ms, jpc_cstate_t *cstate,
jas_stream_t *in)
{
jpc_siz_t *siz = &ms->parms.siz;
unsigned int i;
uint_fast8_t tmp;
/* Eliminate compiler warning about unused variables. */
cstate = 0;
if (jpc_getuint16(in, &siz->caps) ||
jpc_getuint32(in, &siz->width) ||
jpc_getuint32... | 92,505,799,264,745,780,000,000,000,000,000,000,000 | jpc_cs.c | 103,838,678,232,001,470,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2016-9390 | The jas_seq2d_create function in jas_seq.c in JasPer before 1.900.14 allows remote attackers to cause a denial of service (assertion failure) via a crafted image file. | https://nvd.nist.gov/vuln/detail/CVE-2016-9390 |
3,300 | jasper | dee11ec440d7908d1daf69f40a3324b27cf213ba | https://github.com/mdadams/jasper | https://github.com/mdadams/jasper/commit/dee11ec440d7908d1daf69f40a3324b27cf213ba | The component domains must be the same for the ICT/RCT in the JPC codec.
This was previously enforced with an assertion.
Now, it is handled in a more graceful manner. | 1 | static int jpc_dec_tiledecode(jpc_dec_t *dec, jpc_dec_tile_t *tile)
{
int i;
int j;
jpc_dec_tcomp_t *tcomp;
jpc_dec_rlvl_t *rlvl;
jpc_dec_band_t *band;
int compno;
int rlvlno;
int bandno;
int adjust;
int v;
jpc_dec_ccp_t *ccp;
jpc_dec_cmpt_t *cmpt;
if (jpc_dec_decodecblks(dec, tile)) {
jas_eprintf("jpc_... | 81,323,985,259,108,210,000,000,000,000,000,000,000 | jpc_dec.c | 304,708,091,272,308,030,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2016-9389 | The jpc_irct and jpc_iict functions in jpc_mct.c in JasPer before 1.900.14 allow remote attackers to cause a denial of service (assertion failure). | https://nvd.nist.gov/vuln/detail/CVE-2016-9389 |
3,303 | jasper | d91198abd00fc435a397fe6bad906a4c1748e9cf | https://github.com/mdadams/jasper | https://github.com/mdadams/jasper/commit/d91198abd00fc435a397fe6bad906a4c1748e9cf | Fixed another integer overflow problem. | 1 | static int jpc_dec_process_siz(jpc_dec_t *dec, jpc_ms_t *ms)
{
jpc_siz_t *siz = &ms->parms.siz;
int compno;
int tileno;
jpc_dec_tile_t *tile;
jpc_dec_tcomp_t *tcomp;
int htileno;
int vtileno;
jpc_dec_cmpt_t *cmpt;
dec->xstart = siz->xoff;
dec->ystart = siz->yoff;
dec->xend = siz->width;
dec->yend = s... | 322,953,387,659,988,940,000,000,000,000,000,000,000 | jpc_dec.c | 107,750,017,904,378,620,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2016-9387 | Integer overflow in the jpc_dec_process_siz function in libjasper/jpc/jpc_dec.c in JasPer before 1.900.13 allows remote attackers to have unspecified impact via a crafted file, which triggers an assertion failure. | https://nvd.nist.gov/vuln/detail/CVE-2016-9387 |
3,311 | jasper | 634ce8e8a5accc0fa05dd2c20d42b4749d4b2735 | https://github.com/mdadams/jasper | https://github.com/mdadams/jasper/commit/634ce8e8a5accc0fa05dd2c20d42b4749d4b2735 | Made some changes to the I/O stream library for memory streams.
There were a number of potential problems due to the possibility
of integer overflow.
Changed some integral types to the larger types size_t or ssize_t.
For example, the function mem_resize now takes the buffer size parameter
as a size_t.
Added a new funct... | 1 | static int mem_resize(jas_stream_memobj_t *m, int bufsize)
{
unsigned char *buf;
assert(bufsize >= 0);
JAS_DBGLOG(100, ("mem_resize(%p, %d)\n", m, bufsize));
if (!(buf = jas_realloc2(m->buf_, bufsize, sizeof(unsigned char))) &&
bufsize) {
JAS_DBGLOG(100, ("mem_resize realloc failed\n"));
return -1;
... | 66,639,206,046,311,920,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2015-5203 | Double free vulnerability in the jasper_image_stop_load function in JasPer 1.900.17 allows remote attackers to cause a denial of service (crash) via a crafted JPEG 2000 image file. | https://nvd.nist.gov/vuln/detail/CVE-2015-5203 |
3,314 | jasper | e24bdc716c3327b067c551bc6cfb97fd2370358d | https://github.com/mdadams/jasper | https://github.com/mdadams/jasper/commit/e24bdc716c3327b067c551bc6cfb97fd2370358d | Fixed a bug that resulted in the destruction of JP2 box data that had never
been constructed in the first place. | 1 | jp2_box_t *jp2_box_get(jas_stream_t *in)
{
jp2_box_t *box;
jp2_boxinfo_t *boxinfo;
jas_stream_t *tmpstream;
uint_fast32_t len;
uint_fast64_t extlen;
bool dataflag;
box = 0;
tmpstream = 0;
if (!(box = jas_malloc(sizeof(jp2_box_t)))) {
goto error;
}
box->ops = &jp2_boxinfo_unk.ops;
if (jp2_getuint32(in, &... | 269,241,090,374,988,640,000,000,000,000,000,000,000 | jp2_cod.c | 7,434,947,174,323,374,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2016-8887 | The jp2_colr_destroy function in libjasper/jp2/jp2_cod.c in JasPer before 1.900.10 allows remote attackers to cause a denial of service (NULL pointer dereference). | https://nvd.nist.gov/vuln/detail/CVE-2016-8887 |
3,317 | jasper | 5d66894d2313e3f3469f19066e149e08ff076698 | https://github.com/mdadams/jasper | https://github.com/mdadams/jasper/commit/5d66894d2313e3f3469f19066e149e08ff076698 | Fixed a problem with a null pointer dereference in the BMP decoder. | 1 | jas_image_t *bmp_decode(jas_stream_t *in, char *optstr)
{
jas_image_t *image;
bmp_hdr_t hdr;
bmp_info_t *info;
uint_fast16_t cmptno;
jas_image_cmptparm_t cmptparms[3];
jas_image_cmptparm_t *cmptparm;
uint_fast16_t numcmpts;
long n;
if (optstr) {
jas_eprintf("warning: ignoring BMP decoder options\n");
... | 228,936,594,935,256,760,000,000,000,000,000,000,000 | bmp_dec.c | 45,366,044,036,465,890,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2016-8690 | The bmp_getdata function in libjasper/bmp/bmp_dec.c in JasPer before 1.900.5 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted BMP image in an imginfo command. | https://nvd.nist.gov/vuln/detail/CVE-2016-8690 |
3,320 | jasper | 44a524e367597af58d6265ae2014468b334d0309 | https://github.com/mdadams/jasper | https://github.com/mdadams/jasper/commit/44a524e367597af58d6265ae2014468b334d0309 | The memory stream interface allows for a buffer size of zero.
The case of a zero-sized buffer was not handled correctly, as it could
lead to a double free.
This problem has now been fixed (hopefully).
One might ask whether a zero-sized buffer should be allowed at all,
but this is a question for another day. | 1 | static int mem_resize(jas_stream_memobj_t *m, int bufsize)
{
unsigned char *buf;
assert(m->buf_);
assert(bufsize >= 0);
if (!(buf = jas_realloc2(m->buf_, bufsize, sizeof(unsigned char)))) {
return -1;
}
m->buf_ = buf;
m->bufsize_ = bufsize;
return 0;
}
| 24,603,643,167,309,006,000,000,000,000,000,000,000 | jas_stream.c | 131,633,196,601,018,700,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2016-8693 | Double free vulnerability in the mem_close function in jas_stream.c in JasPer before 1.900.10 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted BMP image to the imginfo command. | https://nvd.nist.gov/vuln/detail/CVE-2016-8693 |
3,324 | libarchive | 7f17c791dcfd8c0416e2cd2485b19410e47ef126 | https://github.com/libarchive/libarchive | https://github.com/libarchive/libarchive/commit/7f17c791dcfd8c0416e2cd2485b19410e47ef126 | Issue 761: Heap overflow reading corrupted 7Zip files
The sample file that demonstrated this had multiple 'EmptyStream'
attributes. The first one ended up being used to calculate
certain statistics, then was overwritten by the second which
was incompatible with those statistics.
The fix here is to reject any header... | 1 | read_Header(struct archive_read *a, struct _7z_header_info *h,
int check_header_id)
{
struct _7zip *zip = (struct _7zip *)a->format->data;
const unsigned char *p;
struct _7z_folder *folders;
struct _7z_stream_info *si = &(zip->si);
struct _7zip_entry *entries;
uint32_t folderIndex, indexInFolder;
unsigned i;... | 275,704,645,812,219,200,000,000,000,000,000,000,000 | archive_read_support_format_7zip.c | 1,218,370,420,990,421,900,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2016-8689 | The read_Header function in archive_read_support_format_7zip.c in libarchive 3.2.1 allows remote attackers to cause a denial of service (out-of-bounds read) via multiple EmptyStream attributes in a header in a 7zip archive. | https://nvd.nist.gov/vuln/detail/CVE-2016-8689 |
3,325 | libarchive | e37b620fe8f14535d737e89a4dcabaed4517bf1a | https://github.com/libarchive/libarchive | https://github.com/libarchive/libarchive/commit/e37b620fe8f14535d737e89a4dcabaed4517bf1a | Issue #767: Buffer overflow printing a filename
The safe_fprintf function attempts to ensure clean output for an
arbitrary sequence of bytes by doing a trial conversion of the
multibyte characters to wide characters -- if the resulting wide
character is printable then we pass through the corresponding bytes
unaltered... | 1 | safe_fprintf(FILE *f, const char *fmt, ...)
{
char fmtbuff_stack[256]; /* Place to format the printf() string. */
char outbuff[256]; /* Buffer for outgoing characters. */
char *fmtbuff_heap; /* If fmtbuff_stack is too small, we use malloc */
char *fmtbuff; /* Pointer to fmtbuff_stack or fmtbuff_heap. */
int fmtbu... | 311,304,728,748,629,950,000,000,000,000,000,000,000 | util.c | 62,782,488,428,051,630,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2016-8687 | Stack-based buffer overflow in the safe_fprintf function in tar/util.c in libarchive 3.2.1 allows remote attackers to cause a denial of service via a crafted non-printable multibyte character in a filename. | https://nvd.nist.gov/vuln/detail/CVE-2016-8687 |
3,326 | libgd | 53110871935244816bbb9d131da0bccff734bfe9 | https://github.com/libgd/libgd | https://github.com/libgd/libgd/commit/53110871935244816bbb9d131da0bccff734bfe9 | Avoid potentially dangerous signed to unsigned conversion
We make sure to never pass a negative `rlen` as size to memcpy(). See
also <https://bugs.php.net/bug.php?id=73280>.
Patch provided by Emmanuel Law. | 1 | static int dynamicGetbuf(gdIOCtxPtr ctx, void *buf, int len)
{
int rlen, remain;
dpIOCtxPtr dctx;
dynamicPtr *dp;
dctx = (dpIOCtxPtr) ctx;
dp = dctx->dp;
remain = dp->logicalSize - dp->pos;
if(remain >= len) {
rlen = len;
} else {
if(remain == 0) {
/* 2.0.34: EOF is incorrect. We use 0 for
* e... | 79,633,158,215,157,250,000,000,000,000,000,000,000 | gd_io_dp.c | 268,482,256,665,110,800,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2016-8670 | Integer signedness error in the dynamicGetbuf function in gd_io_dp.c in the GD Graphics Library (aka libgd) through 2.2.3, as used in PHP before 5.6.28 and 7.x before 7.0.13, allows remote attackers to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a crafted imagec... | https://nvd.nist.gov/vuln/detail/CVE-2016-8670 |
3,329 | linux | 647bf3d8a8e5777319da92af672289b2a6c4dc66 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/647bf3d8a8e5777319da92af672289b2a6c4dc66 | IB/rxe: Fix mem_check_range integer overflow
Update the range check to avoid integer-overflow in edge case.
Resolves CVE 2016-8636.
Signed-off-by: Eyal Itkin <eyal.itkin@gmail.com>
Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>
Reviewed-by: Leon Romanovsky <leonro@mellanox.com>
Signed-off-by: Doug Ledford <d... | 1 | int mem_check_range(struct rxe_mem *mem, u64 iova, size_t length)
{
switch (mem->type) {
case RXE_MEM_TYPE_DMA:
return 0;
case RXE_MEM_TYPE_MR:
case RXE_MEM_TYPE_FMR:
return ((iova < mem->iova) ||
((iova + length) > (mem->iova + mem->length))) ?
-EFAULT : 0;
default:
return -EFAULT;
}
}
| 35,540,940,678,846,424,000,000,000,000,000,000,000 | rxe_mr.c | 113,202,750,157,069,660,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2016-8636 | Integer overflow in the mem_check_range function in drivers/infiniband/sw/rxe/rxe_mr.c in the Linux kernel before 4.9.10 allows local users to cause a denial of service (memory corruption), obtain sensitive information from kernel memory, or possibly have unspecified other impact via a write or read request involving t... | https://nvd.nist.gov/vuln/detail/CVE-2016-8636 |
3,330 | libass | aa54e0b59200a994d50a346b5d7ac818ebcf2d4b | https://github.com/libass/libass | https://github.com/libass/libass/commit/aa54e0b59200a994d50a346b5d7ac818ebcf2d4b | shaper: fix reallocation
Update the variable that tracks the allocated size. This potentially
improves performance and avoid some side effects, which lead to
undefined behavior in some cases.
Fixes fuzzer test case id:000051,sig:11,sync:fuzzer3,src:004221. | 1 | static bool check_allocations(ASS_Shaper *shaper, size_t new_size)
{
if (new_size > shaper->n_glyphs) {
if (!ASS_REALLOC_ARRAY(shaper->event_text, new_size) ||
!ASS_REALLOC_ARRAY(shaper->ctypes, new_size) ||
!ASS_REALLOC_ARRAY(shaper->emblevels, new_size) ||
!ASS_REALLO... | 280,811,577,264,489,950,000,000,000,000,000,000,000 | ass_shaper.c | 28,748,660,120,420,735,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2016-7972 | The check_allocations function in libass/ass_shaper.c in libass before 0.13.4 allows remote attackers to cause a denial of service (memory allocation failure) via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2016-7972 |
3,331 | libass | 08e754612019ed84d1db0d1fc4f5798248decd75 | https://github.com/libass/libass | https://github.com/libass/libass/commit/08e754612019ed84d1db0d1fc4f5798248decd75 | Fix blur coefficient calculation buffer overflow
Found by fuzzer test case id:000082,sig:11,src:002579,op:havoc,rep:8.
Correctness should be checked, but this fixes the overflow for good. | 1 | static void calc_coeff(double mu[4], const int index[4], int prefilter, double r2, double mul)
{
double mul2 = mul * mul, mul3 = mul2 * mul;
double kernel[] = {
(5204 + 2520 * mul + 1092 * mul2 + 3280 * mul3) / 12096,
(2943 - 210 * mul - 273 * mul2 - 2460 * mul3) / 12096,
( 486 - 924 ... | 118,260,111,892,519,520,000,000,000,000,000,000,000 | ass_blur.c | 96,345,802,284,211,620,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2016-7970 | Buffer overflow in the calc_coeff function in libass/ass_blur.c in libass before 0.13.4 allows remote attackers to cause a denial of service via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2016-7970 |
3,332 | ImageMagick | d63a3c5729df59f183e9e110d5d8385d17caaad0 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/d63a3c5729df59f183e9e110d5d8385d17caaad0 | None | 1 | MagickExport MagickBooleanType SetImageType(Image *image,const ImageType type)
{
const char
*artifact;
ImageInfo
*image_info;
MagickBooleanType
status;
QuantizeInfo
*quantize_info;
assert(image != (Image *) NULL);
if (image->debug != MagickFalse)
(void) LogMagickEvent(TraceEvent,GetM... | 186,672,624,143,323,880,000,000,000,000,000,000,000 | None | null | [
"CWE-416"
] | CVE-2016-7906 | magick/attribute.c in ImageMagick 7.0.3-2 allows remote attackers to cause a denial of service (use-after-free) via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2016-7906 |
3,333 | ImageMagick | a7bb158b7bedd1449a34432feb3a67c8f1873bfa | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/a7bb158b7bedd1449a34432feb3a67c8f1873bfa | https://github.com/ImageMagick/ImageMagick/issues/280 | 1 | MagickBooleanType SyncExifProfile(Image *image,StringInfo *profile)
{
#define MaxDirectoryStack 16
#define EXIF_DELIMITER "\n"
#define EXIF_NUM_FORMATS 12
#define TAG_EXIF_OFFSET 0x8769
#define TAG_INTEROP_OFFSET 0xa005
typedef struct _DirectoryInfo
{
unsigned char
*directory;
size_t
entr... | 86,130,161,965,126,200,000,000,000,000,000,000,000 | profile.c | 226,382,576,658,349,350,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2016-7799 | MagickCore/profile.c in ImageMagick before 7.0.3-2 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2016-7799 |
3,341 | ImageMagick | a0108a892f9ea3c2bb1e7a49b7d71376c2ecbff7 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/a0108a892f9ea3c2bb1e7a49b7d71376c2ecbff7 | None | 1 | static MagickBooleanType WriteRGFImage(const ImageInfo *image_info,Image *image,
ExceptionInfo *exception)
{
MagickBooleanType
status;
int
bit;
register const PixelPacket
*p;
register ssize_t
x;
ssize_t
y;
unsigned char
byte;
/*
Open output image file.
*/
assert(... | 268,413,691,376,706,580,000,000,000,000,000,000,000 | None | null | [
"CWE-19"
] | CVE-2016-7540 | coders/rgf.c in ImageMagick before 6.9.4-10 allows remote attackers to cause a denial of service (assertion failure) by converting an image to rgf format. | https://nvd.nist.gov/vuln/detail/CVE-2016-7540 |
3,346 | ImageMagick | 478cce544fdf1de882d78381768458f397964453 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/478cce544fdf1de882d78381768458f397964453 | None | 1 | static void WriteTo8BimProfile(Image *image,const char *name,
const StringInfo *profile)
{
const unsigned char
*datum,
*q;
register const unsigned char
*p;
size_t
length;
StringInfo
*profile_8bim;
ssize_t
count;
unsigned char
length_byte;
unsigned int
value;
uns... | 41,729,025,431,347,140,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2016-7536 | magick/profile.c in ImageMagick allows remote attackers to cause a denial of service (segmentation fault) via a crafted profile. | https://nvd.nist.gov/vuln/detail/CVE-2016-7536 |
3,349 | ImageMagick | bef1e4f637d8f665bc133a9c6d30df08d983bc3a | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/bef1e4f637d8f665bc133a9c6d30df08d983bc3a | https://github.com/ImageMagick/ImageMagick/issues/120 | 1 | static Image *ReadWPGImage(const ImageInfo *image_info,
ExceptionInfo *exception)
{
typedef struct
{
size_t FileId;
MagickOffsetType DataOffset;
unsigned int ProductType;
unsigned int FileType;
unsigned char MajorVersion;
unsigned char MinorVersion;
unsigned int EncryptKey;
unsigne... | 173,315,226,387,850,500,000,000,000,000,000,000,000 | wpg.c | 307,364,454,630,746,860,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2016-7533 | The ReadWPGImage function in coders/wpg.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted WPG file. | https://nvd.nist.gov/vuln/detail/CVE-2016-7533 |
3,350 | ImageMagick | 4f2c04ea6673863b87ac7f186cbb0d911f74085c | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/4f2c04ea6673863b87ac7f186cbb0d911f74085c | Added check for out of bounds read (https://github.com/ImageMagick/ImageMagick/issues/108). | 1 | static void RemoveResolutionFromResourceBlock(StringInfo *bim_profile)
{
register const unsigned char
*p;
size_t
length;
unsigned char
*datum;
unsigned int
count,
long_sans;
unsigned short
id,
short_sans;
length=GetStringInfoLength(bim_profile);
if (length < 16)
return... | 140,735,378,452,963,910,000,000,000,000,000,000,000 | psd.c | 171,607,370,422,252,440,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2016-7532 | coders/psd.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PSD file. | https://nvd.nist.gov/vuln/detail/CVE-2016-7532 |
3,353 | ImageMagick | a2e1064f288a353bc5fef7f79ccb7683759e775c | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/a2e1064f288a353bc5fef7f79ccb7683759e775c | https://github.com/ImageMagick/ImageMagick/issues/104 | 1 | static MagickBooleanType load_tile(Image *image,Image *tile_image,
XCFDocInfo *inDocInfo,XCFLayerInfo *inLayerInfo,size_t data_length,
ExceptionInfo *exception)
{
ssize_t
y;
register ssize_t
x;
register Quantum
*q;
ssize_t
count;
unsigned char
*graydata;
XCFPixelInfo
*xcfda... | 37,826,674,930,539,910,000,000,000,000,000,000,000 | xcf.c | 69,929,030,200,192,770,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2016-7529 | coders/xcf.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted XCF file. | https://nvd.nist.gov/vuln/detail/CVE-2016-7529 |
3,354 | ImageMagick | ca0c886abd6d3ef335eb74150cd23b89ebd17135 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/ca0c886abd6d3ef335eb74150cd23b89ebd17135 | None | 1 | static Image *ReadVIFFImage(const ImageInfo *image_info,
ExceptionInfo *exception)
{
#define VFF_CM_genericRGB 15
#define VFF_CM_ntscRGB 1
#define VFF_CM_NONE 0
#define VFF_DEP_DECORDER 0x4
#define VFF_DEP_NSORDER 0x8
#define VFF_DES_RAW 0
#define VFF_LOC_IMPLICIT 1
#define VFF_MAPTYP_NONE 0
#define VFF_MAPTY... | 260,039,204,831,931,700,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2016-7528 | The ReadVIFFImage function in coders/viff.c in ImageMagick allows remote attackers to cause a denial of service (segmentation fault) via a crafted VIFF file. | https://nvd.nist.gov/vuln/detail/CVE-2016-7528 |
3,355 | ImageMagick | a251039393f423c7858e63cab6aa98d17b8b7a41 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/a251039393f423c7858e63cab6aa98d17b8b7a41 | None | 1 | static Image *ExtractPostscript(Image *image,const ImageInfo *image_info,
MagickOffsetType PS_Offset,ssize_t PS_Size,ExceptionInfo *exception)
{
char
postscript_file[MaxTextExtent];
const MagicInfo
*magic_info;
FILE
*ps_file;
ImageInfo
*clone_info;
Image
*image2;
unsigned char
... | 33,895,286,292,450,400,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2016-7527 | coders/wpg.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2016-7527 |
3,356 | ImageMagick | b6ae2f9e0ab13343c0281732d479757a8e8979c7 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/b6ae2f9e0ab13343c0281732d479757a8e8979c7 | None | 1 | static void InsertRow(unsigned char *p,ssize_t y,Image *image, int bpp)
{
ExceptionInfo
*exception;
int
bit;
ssize_t
x;
register PixelPacket
*q;
IndexPacket
index;
register IndexPacket
*indexes;
exception=(&image->exception);
switch (bpp)
{
case 1: /* Convert bitma... | 67,821,963,809,470,810,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2016-7526 | coders/wpg.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2016-7526 |
3,357 | ImageMagick | 5f16640725b1225e6337c62526e6577f0f88edb8 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/5f16640725b1225e6337c62526e6577f0f88edb8 | Fixed head buffer overflow reported in: https://github.com/ImageMagick/ImageMagick/issues/98 | 1 | static inline size_t GetPSDRowSize(Image *image)
{
if (image->depth == 1)
return((image->columns+7)/8);
else
return(image->columns*GetPSDPacketSize(image));
}
| 101,676,811,618,980,070,000,000,000,000,000,000,000 | psd.c | 171,607,370,422,252,440,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2016-7525 | Heap-based buffer overflow in coders/psd.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PSD file. | https://nvd.nist.gov/vuln/detail/CVE-2016-7525 |
3,358 | ImageMagick | 30eec879c8b446b0ea9a3bb0da1a441cc8482bc4 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/30eec879c8b446b0ea9a3bb0da1a441cc8482bc4 | Moved check for https://github.com/ImageMagick/ImageMagick/issues/92. | 1 | static ssize_t DecodePSDPixels(const size_t number_compact_pixels,
const unsigned char *compact_pixels,const ssize_t depth,
const size_t number_pixels,unsigned char *pixels)
{
#define CheckNumberCompactPixels \
if (packets == 0) \
return(i); \
packets--
#define CheckNumberPixels(count) \
if (((ssize_t) i... | 23,578,839,469,788,660,000,000,000,000,000,000,000 | psd.c | 171,607,370,422,252,440,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2016-7521 | Heap-based buffer overflow in coders/psd.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PSD file. | https://nvd.nist.gov/vuln/detail/CVE-2016-7521 |
3,359 | ImageMagick | 14e606db148d6ebcaae20f1e1d6d71903ca4a556 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/14e606db148d6ebcaae20f1e1d6d71903ca4a556 | https://bugs.launchpad.net/ubuntu/+source/imagemagick/+bug/1537213 | 1 | static MagickBooleanType WriteHDRImage(const ImageInfo *image_info,Image *image,
ExceptionInfo *exception)
{
char
header[MagickPathExtent];
const char
*property;
MagickBooleanType
status;
register const Quantum
*p;
register ssize_t
i,
x;
size_t
length;
ssize_t
count... | 243,995,582,969,504,570,000,000,000,000,000,000,000 | hdr.c | 259,117,064,436,547,000,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2016-7520 | Heap-based buffer overflow in coders/hdr.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted HDR file. | https://nvd.nist.gov/vuln/detail/CVE-2016-7520 |
3,360 | ImageMagick | 2ad6d33493750a28a5a655d319a8e0b16c392de1 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/2ad6d33493750a28a5a655d319a8e0b16c392de1 | Fixed check for the number of pixels that will be allocated. | 1 | static Image *ReadRLEImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
#define SkipLinesOp 0x01
#define SetColorOp 0x02
#define SkipPixelsOp 0x03
#define ByteDataOp 0x05
#define RunDataOp 0x06
#define EOFOp 0x07
char
magick[12];
Image
*image;
int
opcode,
operand,
status;
... | 166,192,220,511,748,400,000,000,000,000,000,000,000 | rle.c | 305,611,083,519,864,970,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2016-7515 | The ReadRLEImage function in coders/rle.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via vectors related to the number of pixels. | https://nvd.nist.gov/vuln/detail/CVE-2016-7515 |
3,361 | ImageMagick | e14fd0a2801f73bdc123baf4fbab97dec55919eb | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/e14fd0a2801f73bdc123baf4fbab97dec55919eb | Added missing call to ConstrainColormapIndex. | 1 | static MagickBooleanType ReadPSDChannelPixels(Image *image,
const size_t channels,const size_t row,const ssize_t type,
const unsigned char *pixels,ExceptionInfo *exception)
{
Quantum
pixel;
register const unsigned char
*p;
register Quantum
*q;
register ssize_t
x;
size_t
packet_size... | 170,558,121,983,130,240,000,000,000,000,000,000,000 | psd.c | 171,607,370,422,252,440,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2016-7514 | The ReadPSDChannelPixels function in coders/psd.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PSD file. | https://nvd.nist.gov/vuln/detail/CVE-2016-7514 |
3,364 | nefarious2 | f50a84bad996d438e7b31b9e74c32a41e43f8be5 | https://github.com/evilnet/nefarious2 | https://github.com/evilnet/nefarious2/commit/f50a84bad996d438e7b31b9e74c32a41e43f8be5 | Fix to prevent SASL security vulnerability | 1 | int m_authenticate(struct Client* cptr, struct Client* sptr, int parc, char* parv[])
{
struct Client* acptr;
int first = 0;
char realhost[HOSTLEN + 3];
char *hoststr = (cli_sockhost(cptr) ? cli_sockhost(cptr) : cli_sock_ip(cptr));
if (!CapActive(cptr, CAP_SASL))
return 0;
if (parc < 2) /* have enough ... | 270,299,999,591,578,300,000,000,000,000,000,000,000 | m_authenticate.c | 308,034,972,284,734,170,000,000,000,000,000,000,000 | [
"CWE-287"
] | CVE-2016-7145 | The m_authenticate function in ircd/m_authenticate.c in nefarious2 allows remote attackers to spoof certificate fingerprints and consequently log in as another user via a crafted AUTHENTICATE parameter. | https://nvd.nist.gov/vuln/detail/CVE-2016-7145 |
3,365 | unrealircd | f473e355e1dc422c4f019dbf86bc50ba1a34a766 | https://github.com/unrealircd/unrealircd | https://github.com/unrealircd/unrealircd/commit/f473e355e1dc422c4f019dbf86bc50ba1a34a766 | Fix AUTHENTICATE bug | 1 | CMD_FUNC(m_authenticate)
{
aClient *agent_p = NULL;
/* Failing to use CAP REQ for sasl is a protocol violation. */
if (!SASL_SERVER || !MyConnect(sptr) || BadPtr(parv[1]) || !CHECKPROTO(sptr, PROTO_SASL))
return 0;
if (sptr->local->sasl_complete)
{
sendto_one(sptr, err_str(ERR_SASLALREADY), me.name, BadPtr(s... | 190,787,633,910,337,700,000,000,000,000,000,000,000 | None | null | [
"CWE-287"
] | CVE-2016-7144 | The m_authenticate function in modules/m_sasl.c in UnrealIRCd before 3.2.10.7 and 4.x before 4.0.6 allows remote attackers to spoof certificate fingerprints and consequently log in as another user via a crafted AUTHENTICATE parameter. | https://nvd.nist.gov/vuln/detail/CVE-2016-7144 |
3,366 | ImageMagick | 7afcf9f71043df15508e46f079387bd4689a738d | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/7afcf9f71043df15508e46f079387bd4689a738d | Prevent buffer overflow in BMP & SGI coders (bug report from pwchen&rayzhong of tencent) | 1 | static Image *ReadSGIImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
Image
*image;
MagickBooleanType
status;
MagickSizeType
number_pixels;
MemoryInfo
*pixel_info;
register Quantum
*q;
register ssize_t
i,
x;
register unsigned char
*p;
SGIInfo
iris_... | 292,399,848,198,788,200,000,000,000,000,000,000,000 | sgi.c | 43,178,305,401,502,410,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2016-7101 | The SGI coder in ImageMagick before 7.0.2-10 allows remote attackers to cause a denial of service (out-of-bounds read) via a large row value in an sgi file. | https://nvd.nist.gov/vuln/detail/CVE-2016-7101 |
3,372 | libgd | 4859d69e07504d4b0a4bdf9bcb4d9e3769ca35ae | https://github.com/libgd/libgd | https://github.com/libgd/libgd/commit/4859d69e07504d4b0a4bdf9bcb4d9e3769ca35ae | Fix invalid read in gdImageCreateFromTiffPtr()
tiff_invalid_read.tiff is corrupt, and causes an invalid read in
gdImageCreateFromTiffPtr(), but not in gdImageCreateFromTiff(). The culprit
is dynamicGetbuf(), which doesn't check for out-of-bound reads. In this case,
dynamicGetbuf() is called with a negative dp->pos, bu... | 1 | static int dynamicGetbuf(gdIOCtxPtr ctx, void *buf, int len)
{
int rlen, remain;
dpIOCtxPtr dctx;
dynamicPtr *dp;
dctx = (dpIOCtxPtr) ctx;
dp = dctx->dp;
remain = dp->logicalSize - dp->pos;
if(remain >= len) {
rlen = len;
} else {
if(remain <= 0) {
/* 2.0.34: EOF is incorrect. We use 0 for
... | 113,302,243,464,312,720,000,000,000,000,000,000,000 | gd_io_dp.c | 169,924,014,127,142,480,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2016-6911 | The dynamicGetbuf function in the GD Graphics Library (aka libgd) before 2.2.4 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted TIFF image. | https://nvd.nist.gov/vuln/detail/CVE-2016-6911 |
3,374 | libgd | fb0e0cce0b9f25389ab56604c3547351617e1415 | https://github.com/libgd/libgd | https://github.com/libgd/libgd/commit/fb0e0cce0b9f25389ab56604c3547351617e1415 | Fix OOB reads of the TGA decompression buffer
It is possible to craft TGA files which will overflow the decompression
buffer, but not the image's bitmap. Therefore we augment the check for the
bitmap's overflow with a check for the buffer's overflow.
This issue had been reported by Ibrahim El-Sayed to security@libgd.... | 1 | int read_image_tga( gdIOCtx *ctx, oTga *tga )
{
int pixel_block_size = (tga->bits / 8);
int image_block_size = (tga->width * tga->height) * pixel_block_size;
int* decompression_buffer = NULL;
unsigned char* conversion_buffer = NULL;
int buffer_caret = 0;
int bitmap_caret = 0;
int i = 0;
int encoded_pixels;
int... | 135,235,955,196,351,180,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2016-6906 | The read_image_tga function in gd_tga.c in the GD Graphics Library (aka libgd) before 2.2.4 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted TGA file, related to the decompression buffer. | https://nvd.nist.gov/vuln/detail/CVE-2016-6906 |
3,375 | ImageMagick | 4cc6ec8a4197d4c008577127736bf7985d632323 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/4cc6ec8a4197d4c008577127736bf7985d632323 | Prevent buffer overflow in BMP coder (bug report from pwchen of tencent). | 1 | static MagickBooleanType WriteBMPImage(const ImageInfo *image_info,Image *image,
ExceptionInfo *exception)
{
BMPInfo
bmp_info;
const char
*option;
const StringInfo
*profile;
MagickBooleanType
have_color_info,
status;
MagickOffsetType
scene;
MemoryInfo
*pixel_info;
regis... | 171,765,265,288,600,100,000,000,000,000,000,000,000 | bmp.c | 142,605,325,816,453,950,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2016-6823 | Integer overflow in the BMP coder in ImageMagick before 7.0.2-10 allows remote attackers to cause a denial of service (crash) via crafted height and width values, which triggers an out-of-bounds write. | https://nvd.nist.gov/vuln/detail/CVE-2016-6823 |
3,382 | libtomcrypt | 5eb9743410ce4657e9d54fef26a2ee31a1b5dd0 | https://github.com/libtom/libtomcrypt | https://github.com/libtom/libtomcrypt/commit/5eb9743410ce4657e9d54fef26a2ee31a1b5dd0 | rsa_verify_hash: fix possible bleichenbacher signature attack | 1 | int rsa_verify_hash_ex(const unsigned char *sig, unsigned long siglen,
const unsigned char *hash, unsigned long hashlen,
int padding,
int hash_idx, unsigned long saltlen,
int ... | 76,073,170,727,925,490,000,000,000,000,000,000,000 | rsa_verify_hash.c | 139,169,440,986,897,670,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2016-6129 | The rsa_verify_hash_ex function in rsa_verify_hash.c in LibTomCrypt, as used in OP-TEE before 2.2.0, does not validate that the message length is equal to the ASN.1 encoded data length, which makes it easier for remote attackers to forge RSA signatures or public certificates by leveraging a Bleichenbacher signature for... | https://nvd.nist.gov/vuln/detail/CVE-2016-6129 |
3,383 | openjpeg | 162f6199c0cd3ec1c6c6dc65e41b2faab92b2d91 | https://github.com/uclouvain/openjpeg | https://github.com/uclouvain/openjpeg/commit/162f6199c0cd3ec1c6c6dc65e41b2faab92b2d91 | Fix Heap Buffer Overflow in function color_cmyk_to_rgb
Fix uclouvain/openjpeg#774 | 1 | void color_cmyk_to_rgb(opj_image_t *image)
{
float C, M, Y, K;
float sC, sM, sY, sK;
unsigned int w, h, max, i;
w = image->comps[0].w;
h = image->comps[0].h;
if(image->numcomps < 4) return;
max = w * h;
sC = 1.0F / (float)((1 << image->comps[0].prec) - 1);
sM = 1.0F / (float)((1 << image->comps[1].p... | 174,303,624,607,131,550,000,000,000,000,000,000,000 | color.c | 144,381,218,147,487,070,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2016-4796 | Heap-based buffer overflow in the color_cmyk_to_rgb in common/color.c in OpenJPEG before 2.1.1 allows remote attackers to cause a denial of service (crash) via a crafted .j2k file. | https://nvd.nist.gov/vuln/detail/CVE-2016-4796 |
3,384 | linux | d7a6be58edc01b1c66ecd8fcc91236bfbce0a420 | https://github.com/torvalds/linux | https://github.com/mjg59/linux/commit/d7a6be58edc01b1c66ecd8fcc91236bfbce0a420 | None | 1 | static int einj_error_inject(u32 type, u32 flags, u64 param1, u64 param2,
u64 param3, u64 param4)
{
int rc;
u64 base_addr, size;
/* If user manually set "flags", make sure it is legal */
if (flags && (flags &
~(SETWA_FLAGS_APICID|SETWA_FLAGS_MEM|SETWA_FLAGS_PCIE_SBDF)))
return -EINVAL;
/*
* W... | 189,767,553,214,590,050,000,000,000,000,000,000,000 | None | null | [
"CWE-74"
] | CVE-2016-3695 | The einj_error_inject function in drivers/acpi/apei/einj.c in the Linux kernel allows local users to simulate hardware errors and consequently cause a denial of service by leveraging failure to disable APEI error injection through EINJ when securelevel is set. | https://nvd.nist.gov/vuln/detail/CVE-2016-3695 |
3,389 | miniupnp | 140ee8d2204b383279f854802b27bdb41c1d5d1a | https://github.com/miniupnp/miniupnp | https://github.com/miniupnp/miniupnp/commit/140ee8d2204b383279f854802b27bdb41c1d5d1a | minissdpd.c: Initialize pointers to NULL (fix) | 1 | void processRequest(struct reqelem * req)
{
ssize_t n;
unsigned int l, m;
unsigned char buf[2048];
const unsigned char * p;
int type;
struct device * d = devlist;
unsigned char rbuf[4096];
unsigned char * rp = rbuf+1;
unsigned char nrep = 0;
time_t t;
struct service * newserv = NULL;
struct service * serv;
... | 37,126,454,427,764,617,000,000,000,000,000,000,000 | minissdpd.c | 80,138,051,541,731,040,000,000,000,000,000,000,000 | [
"CWE-388"
] | CVE-2016-3179 | The processRequest function in minissdpd.c in MiniSSDPd 1.2.20130907-3 allows local users to cause a denial of service (invalid free and daemon crash) via vectors related to error handling. | https://nvd.nist.gov/vuln/detail/CVE-2016-3179 |
3,390 | miniupnp | b238cade9a173c6f751a34acf8ccff838a62aa47 | https://github.com/miniupnp/miniupnp | https://github.com/miniupnp/miniupnp/commit/b238cade9a173c6f751a34acf8ccff838a62aa47 | minissdpd: Fix broken overflow test (p+l > buf+n) thanks to Salva Piero | 1 | void processRequest(struct reqelem * req)
{
ssize_t n;
unsigned int l, m;
unsigned char buf[2048];
const unsigned char * p;
enum request_type type;
struct device * d = devlist;
unsigned char rbuf[RESPONSE_BUFFER_SIZE];
unsigned char * rp;
unsigned char nrep = 0;
time_t t;
struct service * newserv = NULL;
st... | 230,723,959,165,221,830,000,000,000,000,000,000,000 | minissdpd.c | 313,447,235,104,272,300,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2016-3178 | The processRequest function in minissdpd.c in MiniSSDPd 1.2.20130907-3 allows local users to cause a denial of service (out-of-bounds memory access and daemon crash) via vectors involving a negative length value. | https://nvd.nist.gov/vuln/detail/CVE-2016-3178 |
3,392 | lhasa | 6fcdb8f1f538b9d63e63a5fa199c5514a15d4564 | https://github.com/fragglet/lhasa | https://github.com/fragglet/lhasa/commit/6fcdb8f1f538b9d63e63a5fa199c5514a15d4564 | Fix integer underflow vulnerability in L3 decode.
Marcin 'Icewall' Noga of Cisco TALOS discovered that the level 3 header
decoding routines were vulnerable to an integer underflow, if the 32-bit
header length was less than the base level 3 header length. This could
lead to an exploitable heap corruption condition.
Th... | 1 | static int decode_level3_header(LHAFileHeader **header, LHAInputStream *stream)
{
unsigned int header_len;
if (lha_decode_uint16(&RAW_DATA(header, 0)) != 4) {
return 0;
}
if (!extend_raw_data(header, stream,
LEVEL_3_HEADER_LEN - RAW_DATA_LEN(header))) {
return 0;
}
header_len = l... | 82,334,831,641,499,670,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2016-2347 | Integer underflow in the decode_level3_header function in lib/lha_file_header.c in Lhasa before 0.3.1 allows remote attackers to execute arbitrary code via a crafted archive. | https://nvd.nist.gov/vuln/detail/CVE-2016-2347 |
3,397 | linux | c3c87e770458aa004bd7ed3f29945ff436fd6511 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c3c87e770458aa004bd7ed3f29945ff436fd6511 | perf: Tighten (and fix) the grouping condition
The fix from 9fc81d87420d ("perf: Fix events installation during
moving group") was incomplete in that it failed to recognise that
creating a group with events for different CPUs is semantically
broken -- they cannot be co-scheduled.
Furthermore, it leads to real breakag... | 1 | int perf_pmu_register(struct pmu *pmu, const char *name, int type)
{
int cpu, ret;
mutex_lock(&pmus_lock);
ret = -ENOMEM;
pmu->pmu_disable_count = alloc_percpu(int);
if (!pmu->pmu_disable_count)
goto unlock;
pmu->type = -1;
if (!name)
goto skip_type;
pmu->name = name;
if (type < 0) {
type = idr_alloc(... | 318,169,107,449,246,140,000,000,000,000,000,000,000 | core.c | 213,587,612,764,546,300,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2015-9004 | kernel/events/core.c in the Linux kernel before 3.19 mishandles counter grouping, which allows local users to gain privileges via a crafted application, related to the perf_pmu_register and perf_event_open functions. | https://nvd.nist.gov/vuln/detail/CVE-2015-9004 |
3,398 | ImageMagick | 9b428b7af688fe319320aed15f2b94281d1e37b4 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/9b428b7af688fe319320aed15f2b94281d1e37b4 | None | 1 | static MagickBooleanType SkipDXTMipmaps(Image *image,DDSInfo *dds_info,
int texel_size,ExceptionInfo *exception)
{
register ssize_t
i;
MagickOffsetType
offset;
size_t
h,
w;
/*
Only skip mipmaps for textures and cube maps
*/
if (EOFBlob(image) != MagickFalse)
{
ThrowFileExc... | 161,526,989,354,860,710,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2015-8959 | coders/dds.c in ImageMagick before 6.9.0-4 Beta allows remote attackers to cause a denial of service (CPU consumption) via a crafted DDS file. | https://nvd.nist.gov/vuln/detail/CVE-2015-8959 |
3,399 | ImageMagick | b8f17d08b7418204bf8a05a5c24e87b2fc395b75 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/b8f17d08b7418204bf8a05a5c24e87b2fc395b75 | http://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=26857 | 1 | static Image *ReadSUNImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
#define RMT_EQUAL_RGB 1
#define RMT_NONE 0
#define RMT_RAW 2
#define RT_STANDARD 1
#define RT_ENCODED 2
#define RT_FORMAT_RGB 3
typedef struct _SUNInfo
{
unsigned int
magic,
width,
height,
depth,
... | 103,972,331,085,104,530,000,000,000,000,000,000,000 | sun.c | 285,366,394,174,551,600,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2015-8958 | coders/sun.c in ImageMagick before 6.9.0-4 Beta allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted SUN file. | https://nvd.nist.gov/vuln/detail/CVE-2015-8958 |
3,400 | ImageMagick | 97aa7d7cfd2027f6ba7ce42caf8b798541b9cdc6 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/97aa7d7cfd2027f6ba7ce42caf8b798541b9cdc6 | Fixed infinite loop and added checks for the sscanf result. | 1 | static Image *ReadHDRImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
char
format[MaxTextExtent],
keyword[MaxTextExtent],
tag[MaxTextExtent],
value[MaxTextExtent];
double
gamma;
Image
*image;
int
c;
MagickBooleanType
status,
value_expected;
register Quan... | 132,512,135,164,293,850,000,000,000,000,000,000,000 | hdr.c | 197,334,708,565,562,500,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2015-8900 | The ReadHDRImage function in coders/hdr.c in ImageMagick 6.x and 7.x allows remote attackers to cause a denial of service (infinite loop) via a crafted HDR file. | https://nvd.nist.gov/vuln/detail/CVE-2015-8900 |
3,401 | ImageMagick | 5b4bebaa91849c592a8448bc353ab25a54ff8c44 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/5b4bebaa91849c592a8448bc353ab25a54ff8c44 | https://github.com/ImageMagick/ImageMagick/pull/34 | 1 | MagickExport MagickBooleanType WriteImages(const ImageInfo *image_info,
Image *images,const char *filename,ExceptionInfo *exception)
{
#define WriteImageTag "Write/Image"
ExceptionInfo
*sans_exception;
ImageInfo
*write_info;
MagickBooleanType
proceed;
MagickOffsetType
progress;
MagickP... | 295,077,649,590,654,430,000,000,000,000,000,000,000 | constitute.c | 61,617,961,026,596,400,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2015-8898 | The WriteImages function in magick/constitute.c in ImageMagick before 6.9.2-4 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted image file. | https://nvd.nist.gov/vuln/detail/CVE-2015-8898 |
3,402 | ImageMagick | 7b1cf5784b5bcd85aa9293ecf56769f68c037231 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/7b1cf5784b5bcd85aa9293ecf56769f68c037231 | Fixed out of bounds error in SpliceImage. | 1 | MagickExport Image *SpliceImage(const Image *image,
const RectangleInfo *geometry,ExceptionInfo *exception)
{
#define SpliceImageTag "Splice/Image"
CacheView
*image_view,
*splice_view;
Image
*splice_image;
MagickBooleanType
status;
MagickOffsetType
progress;
RectangleInfo
spli... | 15,111,872,907,779,805,000,000,000,000,000,000,000 | transform.c | 99,447,129,808,024,770,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2015-8897 | The SpliceImage function in MagickCore/transform.c in ImageMagick before 6.9.2-4 allows remote attackers to cause a denial of service (application crash) via a crafted png file. | https://nvd.nist.gov/vuln/detail/CVE-2015-8897 |
3,408 | ImageMagick | 0f6fc2d5bf8f500820c3dbcf0d23ee14f2d9f734 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/0f6fc2d5bf8f500820c3dbcf0d23ee14f2d9f734 | 1 | static MagickBooleanType WritePICTImage(const ImageInfo *image_info,
Image *image,ExceptionInfo *exception)
{
#define MaxCount 128
#define PictCropRegionOp 0x01
#define PictEndOfPictureOp 0xff
#define PictJPEGOp 0x8200
#define PictInfoOp 0x0C00
#define PictInfoSize 512
#define PictPixmapOp 0x9A
#define PictPIC... | 268,543,993,326,910,650,000,000,000,000,000,000,000 | pict.c | 191,832,857,215,210,400,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2015-8896 | Integer truncation issue in coders/pict.c in ImageMagick before 7.0.5-0 allows remote attackers to cause a denial of service (application crash) via a crafted .pict file. | https://nvd.nist.gov/vuln/detail/CVE-2015-8896 | |
3,409 | ImageMagick | 4f68e9661518463fca523c9726bb5d940a2aa6d8 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/4f68e9661518463fca523c9726bb5d940a2aa6d8 | https://bugs.launchpad.net/ubuntu/+source/imagemagick/+bug/1490362 | 1 | static Image *ReadTGAImage(const ImageInfo *image_info,
ExceptionInfo *exception)
{
Image
*image;
MagickBooleanType
status;
PixelInfo
pixel;
Quantum
index;
register Quantum
*q;
register ssize_t
i,
x;
size_t
base,
flag,
offset,
real,
skip;
ssize_t
... | 240,609,813,257,975,770,000,000,000,000,000,000,000 | tga.c | 312,438,178,534,953,840,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2015-8894 | Double free vulnerability in coders/tga.c in ImageMagick 7.0.0 and later allows remote attackers to cause a denial of service (application crash) via a crafted tga file. | https://nvd.nist.gov/vuln/detail/CVE-2015-8894 |
3,410 | exfat | 2e86ae5f81da11f11673d0546efb525af02b7786 | https://github.com/relan/exfat | https://github.com/relan/exfat/commit/2e86ae5f81da11f11673d0546efb525af02b7786 | None | 1 | int exfat_mount(struct exfat* ef, const char* spec, const char* options)
{
int rc;
enum exfat_mode mode;
exfat_tzset();
memset(ef, 0, sizeof(struct exfat));
parse_options(ef, options);
if (match_option(options, "ro"))
mode = EXFAT_MODE_RO;
else if (match_option(options, "ro_fallback"))
mode = EXFAT_MODE_A... | 172,240,473,177,799,060,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2015-8026 | Heap-based buffer overflow in the verify_vbr_checksum function in exfatfsck in exfat-utils before 1.2.1 allows remote attackers to cause a denial of service (infinite loop) or possibly execute arbitrary code via a crafted filesystem. | https://nvd.nist.gov/vuln/detail/CVE-2015-8026 |
3,411 | linux | 4b2b64d5a6ebc84214755ebccd599baef7c1b798 | https://github.com/torvalds/linux | https://github.com/mjg59/linux/commit/4b2b64d5a6ebc84214755ebccd599baef7c1b798 | None | 1 | setup_efi_state(struct boot_params *params, unsigned long params_load_addr,
unsigned int efi_map_offset, unsigned int efi_map_sz,
unsigned int efi_setup_data_offset)
{
struct efi_info *current_ei = &boot_params.efi_info;
struct efi_info *ei = ¶ms->efi_info;
if (!current_ei->efi_memmap_size)
return 0;
/*... | 305,796,494,330,244,700,000,000,000,000,000,000,000 | None | null | [
"CWE-254"
] | CVE-2015-7837 | The Linux kernel, as used in Red Hat Enterprise Linux 7, kernel-rt, and Enterprise MRG 2 and when booted with UEFI Secure Boot enabled, allows local users to bypass intended securelevel/secureboot restrictions by leveraging improper handling of secure_boot flag across kexec reboot. | https://nvd.nist.gov/vuln/detail/CVE-2015-7837 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.