idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
3,414 | pgbouncer | 7ca3e5279d05fceb1e8a043c6f5b6f58dea3ed38 | https://github.com/pgbouncer/pgbouncer | https://github.com/pgbouncer/pgbouncer/commit/7ca3e5279d05fceb1e8a043c6f5b6f58dea3ed38 | Remove too early set of auth_user
When query returns 0 rows (user not found),
this user stays as login user...
Should fix #69. | 1 | static void start_auth_request(PgSocket *client, const char *username)
{
int res;
PktBuf *buf;
client->auth_user = client->db->auth_user;
/* have to fetch user info from db */
client->pool = get_pool(client->db, client->db->auth_user);
if (!find_server(client)) {
client->wait_for_user_conn = true;
retu... | 192,440,722,953,440,760,000,000,000,000,000,000,000 | client.c | 115,609,358,804,220,030,000,000,000,000,000,000,000 | [
"CWE-287"
] | CVE-2015-6817 | PgBouncer 1.6.x before 1.6.1, when configured with auth_user, allows remote attackers to gain login access as auth_user via an unknown username. | https://nvd.nist.gov/vuln/detail/CVE-2015-6817 |
3,416 | jasper | df5d2867e8004e51e18b89865bc4aa69229227b3 | https://github.com/mdadams/jasper | https://github.com/mdadams/jasper/commit/df5d2867e8004e51e18b89865bc4aa69229227b3 | CVE-2015-5221 | 1 | static int mif_process_cmpt(mif_hdr_t *hdr, char *buf)
{
jas_tvparser_t *tvp;
mif_cmpt_t *cmpt;
int id;
cmpt = 0;
tvp = 0;
if (!(cmpt = mif_cmpt_create())) {
goto error;
}
cmpt->tlx = 0;
cmpt->tly = 0;
cmpt->sampperx = 0;
cmpt->samppery = 0;
cmpt->width = 0;
cmpt->height = 0;
cmpt->prec = 0;
cmpt->sg... | 219,089,908,130,942,330,000,000,000,000,000,000,000 | mif_cod.c | 316,893,017,337,693,300,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2015-5221 | Use-after-free vulnerability in the mif_process_cmpt function in libjasper/mif/mif_cod.c in the JasPer JPEG-2000 library before 1.900.2 allows remote attackers to cause a denial of service (crash) via a crafted JPEG 2000 image file. | https://nvd.nist.gov/vuln/detail/CVE-2015-5221 |
3,421 | pgbouncer | 74d6e5f7de5ec736f71204b7b422af7380c19ac5 | https://github.com/pgbouncer/pgbouncer | https://github.com/pgbouncer/pgbouncer/commit/74d6e5f7de5ec736f71204b7b422af7380c19ac5 | Check if auth_user is set.
Fixes a crash if password packet appears before startup packet (#42). | 1 | static bool handle_client_startup(PgSocket *client, PktHdr *pkt)
{
const char *passwd;
const uint8_t *key;
bool ok;
SBuf *sbuf = &client->sbuf;
/* don't tolerate partial packets */
if (incomplete_pkt(pkt)) {
disconnect_client(client, true, "client sent partial pkt in startup phase");
return false;
}
if (... | 278,553,822,929,822,730,000,000,000,000,000,000,000 | client.c | 284,183,957,477,570,960,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2015-4054 | PgBouncer before 1.5.5 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) by sending a password packet before a startup packet. | https://nvd.nist.gov/vuln/detail/CVE-2015-4054 |
3,422 | proxychains-ng | 9ab7dbeb3baff67a51d0c5e71465c453be0890b5 | https://github.com/rofl0r/proxychains-ng | https://github.com/rofl0r/proxychains-ng/commit/9ab7dbeb3baff67a51d0c5e71465c453be0890b5#diff-803c5170888b8642f2a97e5e9423d399 | fix for CVE-2015-3887
closes #60 | 1 | static void set_own_dir(const char *argv0) {
size_t l = strlen(argv0);
while(l && argv0[l - 1] != '/')
l--;
if(l == 0)
memcpy(own_dir, ".", 2);
else {
memcpy(own_dir, argv0, l - 1);
own_dir[l] = 0;
}
}
| 100,122,726,235,492,770,000,000,000,000,000,000,000 | main.c | 334,785,938,086,402,030,000,000,000,000,000,000,000 | [
"CWE-426"
] | CVE-2015-3887 | Untrusted search path vulnerability in ProxyChains-NG before 4.9 allows local users to gain privileges via a Trojan horse libproxychains4.so library in the current working directory, which is referenced in the LD_PRELOAD path. | https://nvd.nist.gov/vuln/detail/CVE-2015-3887 |
3,423 | abrt | 17cb66b13997b0159b4253b3f5722db79f476d68 | https://github.com/abrt/abrt | https://github.com/abrt/abrt/commit/17cb66b13997b0159b4253b3f5722db79f476d68 | ccpp: stop reading hs_error.log from /tmp
The file might contain anything and there is no way to verify its
contents.
Related: #1211835
Signed-off-by: Jakub Filak <jfilak@redhat.com> | 1 | int main(int argc, char** argv)
{
/* Kernel starts us with all fd's closed.
* But it's dangerous:
* fprintf(stderr) can dump messages into random fds, etc.
* Ensure that if any of fd 0,1,2 is closed, we open it to /dev/null.
*/
int fd = xopen("/dev/null", O_RDWR);
while (fd < 2)
fd = xd... | 103,063,092,257,824,800,000,000,000,000,000,000,000 | None | null | [
"CWE-59"
] | CVE-2015-3315 | Automatic Bug Reporting Tool (ABRT) allows local users to read, change the ownership of, or have other unspecified impact on arbitrary files via a symlink attack on (1) /var/tmp/abrt/*/maps, (2) /tmp/jvm-*/hs_error.log, (3) /proc/*/exe, (4) /etc/os-release in a chroot, or (5) an unspecified root directory related to li... | https://nvd.nist.gov/vuln/detail/CVE-2015-3315 |
3,431 | linux | 60a2362f769cf549dc466134efe71c8bf9fbaaba | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/60a2362f769cf549dc466134efe71c8bf9fbaaba | regulator: core: Fix regualtor_ena_gpio_free not to access pin after freeing
After freeing pin from regulator_ena_gpio_free, loop can access
the pin. So this patch fixes not to access pin after freeing.
Signed-off-by: Seung-Woo Kim <sw0312.kim@samsung.com>
Signed-off-by: Mark Brown <broonie@kernel.org> | 1 | static void regulator_ena_gpio_free(struct regulator_dev *rdev)
{
struct regulator_enable_gpio *pin, *n;
if (!rdev->ena_pin)
return;
/* Free the GPIO only in case of no use */
list_for_each_entry_safe(pin, n, ®ulator_ena_gpio_list, list) {
if (pin->gpiod == rdev->ena_pin->gpiod) {
if (pin->request_count... | 153,964,382,604,737,770,000,000,000,000,000,000,000 | None | null | [
"CWE-416"
] | CVE-2014-9940 | The regulator_ena_gpio_free function in drivers/regulator/core.c in the Linux kernel before 3.19 allows local users to gain privileges or cause a denial of service (use-after-free) via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2014-9940 |
3,432 | linux | 69c433ed2ecd2d3264efd7afec4439524b319121 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/69c433ed2ecd2d3264efd7afec4439524b319121 | fs: limit filesystem stacking depth
Add a simple read-only counter to super_block that indicates how deep this
is in the stack of filesystems. Previously ecryptfs was the only stackable
filesystem and it explicitly disallowed multiple layers of itself.
Overlayfs, however, can be stacked recursively and also may be s... | 1 | static struct dentry *ecryptfs_mount(struct file_system_type *fs_type, int flags,
const char *dev_name, void *raw_data)
{
struct super_block *s;
struct ecryptfs_sb_info *sbi;
struct ecryptfs_dentry_info *root_info;
const char *err = "Getting sb failed";
struct inode *inode;
struct path path;
uid_t check_ruid;... | 206,875,532,923,431,400,000,000,000,000,000,000,000 | main.c | 105,638,946,343,753,250,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2014-9922 | The eCryptfs subsystem in the Linux kernel before 3.18 allows local users to gain privileges via a large filesystem stack that includes an overlayfs layer, related to fs/ecryptfs/main.c and fs/overlayfs/super.c. | https://nvd.nist.gov/vuln/detail/CVE-2014-9922 |
3,433 | linux | 69c433ed2ecd2d3264efd7afec4439524b319121 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/69c433ed2ecd2d3264efd7afec4439524b319121 | fs: limit filesystem stacking depth
Add a simple read-only counter to super_block that indicates how deep this
is in the stack of filesystems. Previously ecryptfs was the only stackable
filesystem and it explicitly disallowed multiple layers of itself.
Overlayfs, however, can be stacked recursively and also may be s... | 1 | static int ovl_fill_super(struct super_block *sb, void *data, int silent)
{
struct path lowerpath;
struct path upperpath;
struct path workpath;
struct inode *root_inode;
struct dentry *root_dentry;
struct ovl_entry *oe;
struct ovl_fs *ufs;
struct kstatfs statfs;
int err;
err = -ENOMEM;
ufs = kzalloc(sizeof(... | 242,173,763,105,780,330,000,000,000,000,000,000,000 | super.c | 28,355,160,904,642,360,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2014-9922 | The eCryptfs subsystem in the Linux kernel before 3.18 allows local users to gain privileges via a large filesystem stack that includes an overlayfs layer, related to fs/ecryptfs/main.c and fs/overlayfs/super.c. | https://nvd.nist.gov/vuln/detail/CVE-2014-9922 |
3,434 | linux | 9709674e68646cee5a24e3000b3558d25412203a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/9709674e68646cee5a24e3000b3558d25412203a | ipv4: fix a race in ip4_datagram_release_cb()
Alexey gave a AddressSanitizer[1] report that finally gave a good hint
at where was the origin of various problems already reported by Dormando
in the past [2]
Problem comes from the fact that UDP can have a lockless TX path, and
concurrent threads can manipulate sk_dst_c... | 1 | void ip4_datagram_release_cb(struct sock *sk)
{
const struct inet_sock *inet = inet_sk(sk);
const struct ip_options_rcu *inet_opt;
__be32 daddr = inet->inet_daddr;
struct flowi4 fl4;
struct rtable *rt;
if (! __sk_dst_get(sk) || __sk_dst_check(sk, 0))
return;
rcu_read_lock();
inet_opt = rcu_derefere... | 311,398,138,099,162,900,000,000,000,000,000,000,000 | datagram.c | 337,751,027,115,515,430,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2014-9914 | Race condition in the ip4_datagram_release_cb function in net/ipv4/datagram.c in the Linux kernel before 3.15.2 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging incorrect expectations about locking during multithreaded access to internal data structures for IPv4 UDP sock... | https://nvd.nist.gov/vuln/detail/CVE-2014-9914 |
3,444 | rawstudio | 9c2cd3c93c05d009a91d84eedbb85873b0cb505d | https://github.com/rawstudio/rawstudio | https://github.com/rawstudio/rawstudio/commit/9c2cd3c93c05d009a91d84eedbb85873b0cb505d | Fixes insecure use of temporary file (CVE-2014-4978). | 1 | rs_filter_graph(RSFilter *filter)
{
g_return_if_fail(RS_IS_FILTER(filter));
GString *str = g_string_new("digraph G {\n");
rs_filter_graph_helper(str, filter);
g_string_append_printf(str, "}\n");
g_file_set_contents("/tmp/rs-filter-graph", str->str, str->len, NULL);
if (0 != system("dot -Tpng >/tmp/rs-... | 20,000,396,220,013,242,000,000,000,000,000,000,000 | rs-filter.c | 248,284,536,212,493,870,000,000,000,000,000,000,000 | [
"CWE-59"
] | CVE-2014-4978 | The rs_filter_graph function in librawstudio/rs-filter.c in rawstudio might allow local users to truncate arbitrary files via a symlink attack on (1) /tmp/rs-filter-graph.png or (2) /tmp/rs-filter-graph. | https://nvd.nist.gov/vuln/detail/CVE-2014-4978 |
3,449 | FFmpeg | 5aba5b89d0b1d73164d3b81764828bb8b20ff32a | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/5aba5b89d0b1d73164d3b81764828bb8b20ff32a | avcodec/mpeg4videodec: Check for bitstream end in read_quant_matrix_ext()
Fixes: out of array read
Fixes: asff-crash-0e53d0dc491dfdd507530b66562812fbd4c36678
Found-by: Paul Ch <paulcher@icloud.com>
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 1 | static void read_quant_matrix_ext(MpegEncContext *s, GetBitContext *gb)
{
int i, j, v;
if (get_bits1(gb)) {
/* intra_quantiser_matrix */
for (i = 0; i < 64; i++) {
v = get_bits(gb, 8);
j = s->idsp.idct_permutation[ff_zigzag_direct[i]];
s->intra_matrix[... | 213,473,736,044,128,240,000,000,000,000,000,000,000 | mpeg4videodec.c | 190,961,130,653,831,770,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-1999015 | FFmpeg before commit 5aba5b89d0b1d73164d3b81764828bb8b20ff32a contains an out of array read vulnerability in ASF_F format demuxer that can result in heap memory reading. This attack appear to be exploitable via specially crafted ASF file that has to provided as input. This vulnerability appears to have been fixed in 5a... | https://nvd.nist.gov/vuln/detail/CVE-2018-1999015 |
3,450 | FFmpeg | a7e032a277452366771951e29fd0bf2bd5c029f0 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/a7e032a277452366771951e29fd0bf2bd5c029f0 | avformat/rmdec: Do not pass mime type in rm_read_multi() to ff_rm_read_mdpr_codecdata()
Fixes: use after free()
Fixes: rmdec-crash-ffe85b4cab1597d1cfea6955705e53f1f5c8a362
Found-by: Paul Ch <paulcher@icloud.com>
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 1 | static int rm_read_multi(AVFormatContext *s, AVIOContext *pb,
AVStream *st, char *mime)
{
int number_of_streams = avio_rb16(pb);
int number_of_mdpr;
int i, ret;
unsigned size2;
for (i = 0; i<number_of_streams; i++)
avio_rb16(pb);
number_of_mdpr = avio_rb16(pb);
... | 260,453,905,446,702,300,000,000,000,000,000,000,000 | rmdec.c | 313,294,444,812,730,200,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2018-1999013 | FFmpeg before commit a7e032a277452366771951e29fd0bf2bd5c029f0 contains a use-after-free vulnerability in the realmedia demuxer that can result in vulnerability allows attacker to read heap memory. This attack appear to be exploitable via specially crafted RM file has to be provided as input. This vulnerability appears ... | https://nvd.nist.gov/vuln/detail/CVE-2018-1999013 |
3,451 | FFmpeg | 9807d3976be0e92e4ece3b4b1701be894cd7c2e1 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/9807d3976be0e92e4ece3b4b1701be894cd7c2e1 | avformat/pva: Check for EOF before retrying in read_part_of_packet()
Fixes: Infinite loop
Fixes: pva-4b1835dbc2027bf3c567005dcc78e85199240d06
Found-by: Paul Ch <paulcher@icloud.com>
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 1 | static int read_part_of_packet(AVFormatContext *s, int64_t *pts,
int *len, int *strid, int read_packet) {
AVIOContext *pb = s->pb;
PVAContext *pvactx = s->priv_data;
int syncword, streamid, reserved, flags, length, pts_flag;
int64_t pva_pts = AV_NOPTS_VALUE, startpos;
... | 82,750,978,880,669,140,000,000,000,000,000,000,000 | None | null | [
"CWE-835"
] | CVE-2018-1999012 | FFmpeg before commit 9807d3976be0e92e4ece3b4b1701be894cd7c2e1 contains a CWE-835: Infinite loop vulnerability in pva format demuxer that can result in a Vulnerability that allows attackers to consume excessive amount of resources like CPU and RAM. This attack appear to be exploitable via specially crafted PVA file has ... | https://nvd.nist.gov/vuln/detail/CVE-2018-1999012 |
3,452 | FFmpeg | 2b46ebdbff1d8dec7a3d8ea280a612b91a582869 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/2b46ebdbff1d8dec7a3d8ea280a612b91a582869 | avformat/asfdec_o: Check size_bmp more fully
Fixes: integer overflow and out of array access
Fixes: asfo-crash-46080c4341572a7137a162331af77f6ded45cbd7
Found-by: Paul Ch <paulcher@icloud.com>
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 1 | static int parse_video_info(AVIOContext *pb, AVStream *st)
{
uint16_t size_asf; // ASF-specific Format Data size
uint32_t size_bmp; // BMP_HEADER-specific Format Data size
unsigned int tag;
st->codecpar->width = avio_rl32(pb);
st->codecpar->height = avio_rl32(pb);
avio_skip(pb, 1); // skip res... | 51,010,198,014,372,410,000,000,000,000,000,000,000 | asfdec_o.c | 216,306,402,722,308,640,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-1999011 | FFmpeg before commit 2b46ebdbff1d8dec7a3d8ea280a612b91a582869 contains a Buffer Overflow vulnerability in asf_o format demuxer that can result in heap-buffer-overflow that may result in remote code execution. This attack appears to be exploitable via specially crafted ASF file that has to be provided as input to FFmpeg... | https://nvd.nist.gov/vuln/detail/CVE-2018-1999011 |
3,453 | FFmpeg | cced03dd667a5df6df8fd40d8de0bff477ee02e8 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/cced03dd667a5df6df8fd40d8de0bff477ee02e8 | avformat/mms: Add missing chunksize check
Fixes: out of array read
Fixes: mms-crash-01b6c5d85f9d9f40f4e879896103e9f5b222816a
Found-by: Paul Ch <paulcher@icloud.com>
1st hunk by Paul Ch <paulcher@icloud.com>
Tested-by: Paul Ch <paulcher@icloud.com>
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 1 | int ff_mms_asf_header_parser(MMSContext *mms)
{
uint8_t *p = mms->asf_header;
uint8_t *end;
int flags, stream_id;
mms->stream_num = 0;
if (mms->asf_header_size < sizeof(ff_asf_guid) * 2 + 22 ||
memcmp(p, ff_asf_header, sizeof(ff_asf_guid))) {
av_log(NULL, AV_LOG_ERROR,
... | 10,142,334,619,194,337,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2018-1999010 | FFmpeg before commit cced03dd667a5df6df8fd40d8de0bff477ee02e8 contains multiple out of array access vulnerabilities in the mms protocol that can result in attackers accessing out of bound data. This attack appear to be exploitable via network connectivity. This vulnerability appears to have been fixed in cced03dd667a5d... | https://nvd.nist.gov/vuln/detail/CVE-2018-1999010 |
3,454 | libarchive | 9c84b7426660c09c18cc349f6d70b5f8168b5680 | https://github.com/libarchive/libarchive | https://github.com/libarchive/libarchive/commit/9c84b7426660c09c18cc349f6d70b5f8168b5680 | warc: consume data once read
The warc decoder only used read ahead, it wouldn't actually consume
data that had previously been printed. This means that if you specify
an invalid content length, it will just reprint the same data over
and over and over again until it hits the desired length.
This means that a WARC res... | 1 | _warc_read(struct archive_read *a, const void **buf, size_t *bsz, int64_t *off)
{
struct warc_s *w = a->format->data;
const char *rab;
ssize_t nrd;
if (w->cntoff >= w->cntlen) {
eof:
/* it's our lucky day, no work, we can leave early */
*buf = NULL;
*bsz = 0U;
*off = w->cntoff + 4U/*for \r\n\r\n separator... | 335,908,245,050,720,980,000,000,000,000,000,000,000 | archive_read_support_format_warc.c | 311,131,878,398,425,230,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2018-1000880 | libarchive version commit 9693801580c0cf7c70e862d305270a16b52826a7 onwards (release v3.2.0 onwards) contains a CWE-20: Improper Input Validation vulnerability in WARC parser - libarchive/archive_read_support_format_warc.c, _warc_read() that can result in DoS - quasi-infinite run time and disk usage from tiny file. This... | https://nvd.nist.gov/vuln/detail/CVE-2018-1000880 |
3,455 | libarchive | 15bf44fd2c1ad0e3fd87048b3fcc90c4dcff1175 | https://github.com/libarchive/libarchive | https://github.com/libarchive/libarchive/commit/15bf44fd2c1ad0e3fd87048b3fcc90c4dcff1175 | Skip 0-length ACL fields
Currently, it is possible to create an archive that crashes bsdtar
with a malformed ACL:
Program received signal SIGSEGV, Segmentation fault.
archive_acl_from_text_l (acl=<optimised out>, text=0x7e2e92 "", want_type=<optimised out>, sc=<optimised out>) at libarchive/archive_acl.c:1726
1726 ... | 1 | archive_acl_from_text_l(struct archive_acl *acl, const char *text,
int want_type, struct archive_string_conv *sc)
{
struct {
const char *start;
const char *end;
} field[6], name;
const char *s, *st;
int numfields, fields, n, r, sol, ret;
int type, types, tag, permset, id;
size_t len;
char sep;
switch ... | 2,001,925,255,634,939,000,000,000,000,000,000,000 | archive_acl.c | 109,360,223,959,071,340,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2018-1000879 | libarchive version commit 379867ecb330b3a952fb7bfa7bffb7bbd5547205 onwards (release v3.3.0 onwards) contains a CWE-476: NULL Pointer Dereference vulnerability in ACL parser - libarchive/archive_acl.c, archive_acl_from_text_l() that can result in Crash/DoS. This attack appear to be exploitable via the victim must open a... | https://nvd.nist.gov/vuln/detail/CVE-2018-1000879 |
3,458 | libarchive | 021efa522ad729ff0f5806c4ce53e4a6cc1daa31 | https://github.com/libarchive/libarchive | https://github.com/libarchive/libarchive/commit/021efa522ad729ff0f5806c4ce53e4a6cc1daa31 | Avoid a double-free when a window size of 0 is specified
new_size can be 0 with a malicious or corrupted RAR archive.
realloc(area, 0) is equivalent to free(area), so the region would
be free()d here and the free()d again in the cleanup function.
Found with a setup running AFL, afl-rb, and qsym. | 1 | parse_codes(struct archive_read *a)
{
int i, j, val, n, r;
unsigned char bitlengths[MAX_SYMBOLS], zerocount, ppmd_flags;
unsigned int maxorder;
struct huffman_code precode;
struct rar *rar = (struct rar *)(a->format->data);
struct rar_br *br = &(rar->br);
free_codes(a);
/* Skip to the next byte */
r... | 150,545,278,699,006,770,000,000,000,000,000,000,000 | archive_read_support_format_rar.c | 265,141,872,084,551,300,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2018-1000877 | libarchive version commit 416694915449219d505531b1096384f3237dd6cc onwards (release v3.1.0 onwards) contains a CWE-415: Double Free vulnerability in RAR decoder - libarchive/archive_read_support_format_rar.c, parse_codes(), realloc(rar->lzss.window, new_size) with new_size = 0 that can result in Crash/DoS. This attack ... | https://nvd.nist.gov/vuln/detail/CVE-2018-1000877 |
3,460 | FreeRDP | baee520e3dd9be6511c45a14c5f5e77784de1471 | https://github.com/FreeRDP/FreeRDP | https://github.com/FreeRDP/FreeRDP/commit/baee520e3dd9be6511c45a14c5f5e77784de1471 | Fix for #4866: Added additional length checks | 1 | static UINT drdynvc_process_capability_request(drdynvcPlugin* drdynvc, int Sp,
int cbChId, wStream* s)
{
UINT status;
if (!drdynvc)
return CHANNEL_RC_BAD_INIT_HANDLE;
WLog_Print(drdynvc->log, WLOG_TRACE, "capability_request Sp=%d cbChId=%d", Sp, cbChId);
Stream_Seek(s, 1); /* pad */
Stream_Read_U... | 297,380,158,017,412,500,000,000,000,000,000,000,000 | drdynvc_main.c | 119,867,415,456,564,860,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-1000852 | FreeRDP FreeRDP 2.0.0-rc3 released version before commit 205c612820dac644d665b5bb1cdf437dc5ca01e3 contains a Other/Unknown vulnerability in channels/drdynvc/client/drdynvc_main.c, drdynvc_process_capability_request that can result in The RDP server can read the client's memory.. This attack appear to be exploitable via... | https://nvd.nist.gov/vuln/detail/CVE-2018-1000852 |
3,467 | minisphere | 252c1ca184cb38e1acb917aa0e451c5f08519996 | https://github.com/fatcerberus/minisphere | https://github.com/fatcerberus/minisphere/commit/252c1ca184cb38e1acb917aa0e451c5f08519996 | Fix integer overflow in layer_resize in map_engine.c (#268)
* Fix integer overflow in layer_resize in map_engine.c
There's a buffer overflow bug in the function layer_resize. It allocates
a buffer `tilemap` with size `x_size * y_size * sizeof(struct map_tile)`.
But it didn't check for integer overflow, so if x_size a... | 1 | layer_resize(int layer, int x_size, int y_size)
{
int old_height;
int old_width;
struct map_tile* tile;
int tile_width;
int tile_height;
struct map_tile* tilemap;
struct map_trigger* trigger;
struct map_zone* zone;
int x, y, i;
o... | 25,690,879,642,748,460,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2018-1000524 | miniSphere version 5.2.9 and earlier contains a Integer Overflow vulnerability in layer_resize() function in map_engine.c that can result in remote denial of service. This attack appear to be exploitable via the victim must load a specially-crafted map which calls SetLayerSize in its entry script. This vulnerability ap... | https://nvd.nist.gov/vuln/detail/CVE-2018-1000524 |
3,469 | memcached | a8c4a82787b8b6c256d61bd5c42fb7f92d1bae00 | https://github.com/memcached/memcached | https://github.com/memcached/memcached/commit/a8c4a82787b8b6c256d61bd5c42fb7f92d1bae00 | Don't overflow item refcount on get
Counts as a miss if the refcount is too high. ASCII multigets are the only
time refcounts can be held for so long.
doing a dirty read of refcount. is aligned.
trying to avoid adding an extra refcount branch for all calls of item_get due
to performance. might be able to move it in ... | 1 | static inline void process_get_command(conn *c, token_t *tokens, size_t ntokens, bool return_cas) {
char *key;
size_t nkey;
int i = 0;
item *it;
token_t *key_token = &tokens[KEY_TOKEN];
char *suffix;
assert(c != NULL);
do {
while(key_token->length != 0) {
key = ke... | 185,526,984,390,699,900,000,000,000,000,000,000,000 | memcached.c | 302,848,843,381,355,740,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2018-1000127 | memcached version prior to 1.4.37 contains an Integer Overflow vulnerability in items.c:item_free() that can result in data corruption and deadlocks due to items existing in hash table being reused from free list. This attack appear to be exploitable via network connectivity to the memcached service. This vulnerability... | https://nvd.nist.gov/vuln/detail/CVE-2018-1000127 |
3,476 | libxsmm | 151481489192e6d1997f8bde52c5c425ea41741d | https://github.com/hfp/libxsmm | https://github.com/hfp/libxsmm/commit/151481489192e6d1997f8bde52c5c425ea41741d | Issue #287: made CSR/CSC readers more robust against invalid input (case #1). | 1 | void libxsmm_sparse_csc_reader( libxsmm_generated_code* io_generated_code,
const char* i_csc_file_in,
unsigned int** o_row_idx,
unsigned int** o_column_idx,
doubl... | 58,824,011,372,759,270,000,000,000,000,000,000,000 | generator_spgemm_csc_reader.c | 118,932,308,961,341,520,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-20542 | There is a heap-based buffer-overflow at generator_spgemm_csc_reader.c (function libxsmm_sparse_csc_reader) in LIBXSMM 1.10, a different vulnerability than CVE-2018-20541 (which is in a different part of the source code and is seen at a different address). | https://nvd.nist.gov/vuln/detail/CVE-2018-20542 |
3,478 | linux | 9824dfae5741275473a23a7ed5756c7b6efacc9d | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/9824dfae5741275473a23a7ed5756c7b6efacc9d | net/appletalk: fix minor pointer leak to userspace in SIOCFINDIPDDPRT
Fields ->dev and ->next of struct ipddp_route may be copied to
userspace on the SIOCFINDIPDDPRT ioctl. This is only accessible
to CAP_NET_ADMIN though. Let's manually copy the relevant fields
instead of using memcpy().
BugLink: http://blog.infosect... | 1 | static int ipddp_ioctl(struct net_device *dev, struct ifreq *ifr, int cmd)
{
struct ipddp_route __user *rt = ifr->ifr_data;
struct ipddp_route rcp, rcp2, *rp;
if(!capable(CAP_NET_ADMIN))
return -EPERM;
if(copy_from_user(&rcp, rt, sizeof(rcp)))
return -EFAULT;
switch... | 248,089,498,899,169,800,000,000,000,000,000,000,000 | ipddp.c | 149,960,990,739,195,910,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2018-20511 | An issue was discovered in the Linux kernel before 4.18.11. The ipddp_ioctl function in drivers/net/appletalk/ipddp.c allows local users to obtain sensitive kernel address information by leveraging CAP_NET_ADMIN to read the ipddp_route dev and next fields via an SIOCFINDIPDDPRT ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2018-20511 |
3,479 | ImageMagick | db0add932fb850d762b02604ca3053b7d7ab6deb | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/db0add932fb850d762b02604ca3053b7d7ab6deb | Prevent infinite loop | 1 | static Image *ReadBMPImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
BMPInfo
bmp_info;
Image
*image;
MagickBooleanType
status;
MagickOffsetType
offset,
start_position;
MemoryInfo
*pixel_info;
Quantum
index;
register Quantum
*q;
register ssize_t
i,... | 272,939,187,823,507,500,000,000,000,000,000,000,000 | bmp.c | 314,845,857,041,993,600,000,000,000,000,000,000,000 | [
"CWE-835"
] | CVE-2018-20467 | In coders/bmp.c in ImageMagick before 7.0.8-16, an input file can result in an infinite loop and hang, with high CPU and memory consumption. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2018-20467 |
3,480 | radare2 | 4e98402f09a0ef0bb8559a33a4c1988c54938eaf | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/4e98402f09a0ef0bb8559a33a4c1988c54938eaf | None | 1 | struct r_bin_dyldcache_lib_t *r_bin_dyldcache_extract(struct r_bin_dyldcache_obj_t* bin, int idx, int *nlib) {
ut64 liboff, linkedit_offset;
ut64 dyld_vmbase;
ut32 addend = 0;
struct r_bin_dyldcache_lib_t *ret = NULL;
struct dyld_cache_image_info* image_infos = NULL;
struct mach_header *mh;
ut8 *data, *cmdptr;... | 77,793,453,937,260,060,000,000,000,000,000,000,000 | dyldcache.c | 307,373,198,687,004,000,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-20458 | In radare2 prior to 3.1.1, r_bin_dyldcache_extract in libr/bin/format/mach0/dyldcache.c may allow attackers to cause a denial-of-service (application crash caused by out-of-bounds read) by crafting an input file. | https://nvd.nist.gov/vuln/detail/CVE-2018-20458 |
3,486 | mosquitto | 9097577b49b7fdcf45d30975976dd93808ccc0c4 | https://github.com/eclipse/mosquitto | https://github.com/eclipse/mosquitto/commit/9097577b49b7fdcf45d30975976dd93808ccc0c4 | Fix acl_file being ignore for default listener if with per_listener_settings
Close #1073. Thanks to Jef Driesen.
Bug: https://github.com/eclipse/mosquitto/issues/1073 | 1 | int config__parse_args(struct mosquitto_db *db, struct mosquitto__config *config, int argc, char *argv[])
{
int i;
int port_tmp;
for(i=1; i<argc; i++){
if(!strcmp(argv[i], "-c") || !strcmp(argv[i], "--config-file")){
if(i<argc-1){
db->config_file = argv[i+1];
if(config__read(db, config, false)){
... | 173,901,566,023,283,400,000,000,000,000,000,000,000 | conf.c | 218,142,261,545,231,700,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2018-20145 | Eclipse Mosquitto 1.5.x before 1.5.5 allows ACL bypass: if the option per_listener_settings was set to true, and the default listener was in use, and the default listener specified an acl_file, then the acl file was being ignored. | https://nvd.nist.gov/vuln/detail/CVE-2018-20145 |
3,492 | linux | f43f39958beb206b53292801e216d9b8a660f087 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/f43f39958beb206b53292801e216d9b8a660f087 | crypto: user - fix leaking uninitialized memory to userspace
All bytes of the NETLINK_CRYPTO report structures must be initialized,
since they are copied to userspace. The change from strncpy() to
strlcpy() broke this. As a minimal fix, change it back.
Fixes: 4473710df1f8 ("crypto: user - Prepare for CRYPTO_MAX_ALG... | 1 | static int crypto_report_one(struct crypto_alg *alg,
struct crypto_user_alg *ualg, struct sk_buff *skb)
{
strlcpy(ualg->cru_name, alg->cra_name, sizeof(ualg->cru_name));
strlcpy(ualg->cru_driver_name, alg->cra_driver_name,
sizeof(ualg->cru_driver_name));
strlcpy(ualg->cru_module_name, module_name(alg->... | 285,899,801,669,781,700,000,000,000,000,000,000,000 | crypto_user_base.c | 192,031,452,937,307,500,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2018-19854 | An issue was discovered in the Linux kernel before 4.19.3. crypto_report_one() and related functions in crypto/crypto_user.c (the crypto user configuration API) do not fully initialize structures that are copied to userspace, potentially leaking sensitive memory to user programs. NOTE: this is a CVE-2013-2547 regressio... | https://nvd.nist.gov/vuln/detail/CVE-2018-19854 |
3,493 | WavPack | bba5389dc598a92bdf2b297c3ea34620b6679b5b | https://github.com/dbry/WavPack | https://github.com/dbry/WavPack/commit/bba5389dc598a92bdf2b297c3ea34620b6679b5b | issue #54: fix potential out-of-bounds heap read | 1 | int WavpackVerifySingleBlock (unsigned char *buffer, int verify_checksum)
{
WavpackHeader *wphdr = (WavpackHeader *) buffer;
uint32_t checksum_passed = 0, bcount, meta_bc;
unsigned char *dp, meta_id, c1, c2;
if (strncmp (wphdr->ckID, "wvpk", 4) || wphdr->ckSize + 8 < sizeof (WavpackHeader))
ret... | 272,130,961,827,911,630,000,000,000,000,000,000,000 | open_utils.c | 309,449,084,172,843,070,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-19841 | The function WavpackVerifySingleBlock in open_utils.c in libwavpack.a in WavPack through 5.1.0 allows attackers to cause a denial-of-service (out-of-bounds read and application crash) via a crafted WavPack Lossless Audio file, as demonstrated by wvunpack. | https://nvd.nist.gov/vuln/detail/CVE-2018-19841 |
3,494 | linux | 5f8cf712582617d523120df67d392059eaf2fc4b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/5f8cf712582617d523120df67d392059eaf2fc4b | ALSA: usb-audio: Fix UAF decrement if card has no live interfaces in card.c
If a USB sound card reports 0 interfaces, an error condition is triggered
and the function usb_audio_probe errors out. In the error path, there was a
use-after-free vulnerability where the memory object of the card was first
freed, followed by... | 1 | static int usb_audio_probe(struct usb_interface *intf,
const struct usb_device_id *usb_id)
{
struct usb_device *dev = interface_to_usbdev(intf);
const struct snd_usb_audio_quirk *quirk =
(const struct snd_usb_audio_quirk *)usb_id->driver_info;
struct snd_usb_audio *chip;
int i, err;
struct usb_host_interfa... | 14,561,827,276,978,056,000,000,000,000,000,000,000 | card.c | 15,688,473,712,363,913,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2018-19824 | In the Linux kernel through 4.19.6, a local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-19824 |
3,495 | sleuthkit | bc04aa017c0bd297de8a3b7fc40ffc6ddddbb95d | https://github.com/sleuthkit/sleuthkit | https://github.com/sleuthkit/sleuthkit/commit/bc04aa017c0bd297de8a3b7fc40ffc6ddddbb95d | Merge pull request #1374 from JordyZomer/develop
Fix CVE-2018-19497. | 1 | hfs_cat_traverse(HFS_INFO * hfs,
TSK_HFS_BTREE_CB a_cb, void *ptr)
{
TSK_FS_INFO *fs = &(hfs->fs_info);
uint32_t cur_node; /* node id of the current node */
char *node;
uint16_t nodesize;
uint8_t is_done = 0;
tsk_error_reset();
nodesize = tsk_getu16(fs->endian, hfs->catalog_h... | 217,046,689,785,223,500,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2018-19497 | In The Sleuth Kit (TSK) through 4.6.4, hfs_cat_traverse in tsk/fs/hfs.c does not properly determine when a key length is too large, which allows attackers to cause a denial of service (SEGV on unknown address with READ memory access in a tsk_getu16 call in hfs_dir_open_meta_cb in tsk/fs/hfs_dent.c). | https://nvd.nist.gov/vuln/detail/CVE-2018-19497 |
3,496 | uriparser | f76275d4a91b28d687250525d3a0c5509bbd666f | https://github.com/uriparser/uriparser | https://github.com/uriparser/uriparser/commit/f76275d4a91b28d687250525d3a0c5509bbd666f | UriQuery.c: Catch integer overflow in ComposeQuery and ...Ex | 1 | int URI_FUNC(ComposeQueryEngine)(URI_CHAR * dest,
const URI_TYPE(QueryList) * queryList,
int maxChars, int * charsWritten, int * charsRequired,
UriBool spaceToPlus, UriBool normalizeBreaks) {
UriBool firstItem = URI_TRUE;
int ampersandLen = 0; /* increased to 1 from second item on */
URI_CHAR * write = dest;
... | 35,761,845,554,934,990,000,000,000,000,000,000,000 | UriQuery.c | 250,998,275,312,918,000,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2018-19199 | An issue was discovered in uriparser before 0.9.0. UriQuery.c allows an integer overflow via a uriComposeQuery* or uriComposeQueryEx* function because of an unchecked multiplication. | https://nvd.nist.gov/vuln/detail/CVE-2018-19199 |
3,497 | uriparser | 864f5d4c127def386dd5cc926ad96934b297f04e | https://github.com/uriparser/uriparser | https://github.com/uriparser/uriparser/commit/864f5d4c127def386dd5cc926ad96934b297f04e | UriQuery.c: Fix out-of-bounds-write in ComposeQuery and ...Ex
Reported by Google Autofuzz team | 1 | int URI_FUNC(ComposeQueryEngine)(URI_CHAR * dest,
const URI_TYPE(QueryList) * queryList,
int maxChars, int * charsWritten, int * charsRequired,
UriBool spaceToPlus, UriBool normalizeBreaks) {
UriBool firstItem = URI_TRUE;
int ampersandLen = 0; /* increased to 1 from second item on */
URI_CHAR * write = dest;
... | 110,870,270,092,081,400,000,000,000,000,000,000,000 | UriQuery.c | 228,924,076,332,498,600,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2018-19198 | An issue was discovered in uriparser before 0.9.0. UriQuery.c allows an out-of-bounds write via a uriComposeQuery* or uriComposeQueryEx* function because the '&' character is mishandled in certain contexts. | https://nvd.nist.gov/vuln/detail/CVE-2018-19198 |
3,499 | keepalived | f28015671a4b04785859d1b4b1327b367b6a10e9 | https://github.com/acassen/keepalived | https://github.com/acassen/keepalived/commit/f28015671a4b04785859d1b4b1327b367b6a10e9 | Fix buffer overflow in extract_status_code()
Issue #960 identified that the buffer allocated for copying the
HTTP status code could overflow if the http response was corrupted.
This commit changes the way the status code is read, avoids copying
data, and also ensures that the status code is three digits long,
is non-... | 1 | int extract_status_code(char *buffer, size_t size)
{
char *buf_code;
char *begin;
char *end = buffer + size;
size_t inc = 0;
int code;
/* Allocate the room */
buf_code = (char *)MALLOC(10);
/* Status-Code extraction */
while (buffer < end && *buffer++ != ' ') ;
begin = buffer;
while (buffer < end && *b... | 63,080,800,693,476,370,000,000,000,000,000,000,000 | html.c | 230,836,095,768,403,100,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-19115 | keepalived before 2.0.7 has a heap-based buffer overflow when parsing HTTP status codes resulting in DoS or possibly unspecified other impact, because extract_status_code in lib/html.c has no validation of the status code and instead writes an unlimited amount of data to the heap. | https://nvd.nist.gov/vuln/detail/CVE-2018-19115 |
3,500 | lighttpd1.4 | 2105dae0f9d7a964375ce681e53cb165375f84c1 | https://github.com/lighttpd/lighttpd1.4 | https://github.com/lighttpd/lighttpd1.4/commit/2105dae0f9d7a964375ce681e53cb165375f84c1 | [mod_alias] security: potential path traversal with specific configs
Security: potential path traversal of a single directory above the alias
target with a specific mod_alias config where the alias which is matched
does not end in '/', but alias target filesystem path does end in '/'.
e.g. server.docroot = "/srv/www/... | 1 | PHYSICALPATH_FUNC(mod_alias_physical_handler) {
plugin_data *p = p_d;
int uri_len, basedir_len;
char *uri_ptr;
size_t k;
if (buffer_is_empty(con->physical.path)) return HANDLER_GO_ON;
mod_alias_patch_connection(srv, con, p);
/* not to include the tailing slash */
basedir_len = buffer_string_length(con->physi... | 56,562,215,835,898,430,000,000,000,000,000,000,000 | mod_alias.c | 99,393,277,811,407,030,000,000,000,000,000,000,000 | [
"CWE-22"
] | CVE-2018-19052 | An issue was discovered in mod_alias_physical_handler in mod_alias.c in lighttpd before 1.4.50. There is potential ../ path traversal of a single directory above an alias target, with a specific mod_alias configuration where the matched alias lacks a trailing '/' character, but the alias target filesystem path does hav... | https://nvd.nist.gov/vuln/detail/CVE-2018-19052 |
3,518 | linux | d2f007dbe7e4c9583eea6eb04d60001e85c6f1bd | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d2f007dbe7e4c9583eea6eb04d60001e85c6f1bd | userns: also map extents in the reverse map to kernel IDs
The current logic first clones the extent array and sorts both copies, then
maps the lower IDs of the forward mapping into the lower namespace, but
doesn't map the lower IDs of the reverse mapping.
This means that code in a nested user namespace with >5 extent... | 1 | static ssize_t map_write(struct file *file, const char __user *buf,
size_t count, loff_t *ppos,
int cap_setid,
struct uid_gid_map *map,
struct uid_gid_map *parent_map)
{
struct seq_file *seq = file->private_data;
struct user_namespace *ns = seq->private;
struct uid_gid_map new_map;
unsigned idx;
st... | 254,509,644,118,020,100,000,000,000,000,000,000,000 | user_namespace.c | 68,584,570,552,716,830,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2018-18955 | In the Linux kernel 4.15.x through 4.19.x before 4.19.2, map_write() in kernel/user_namespace.c allows privilege escalation because it mishandles nested user namespaces with more than 5 UID or GID ranges. A user who has CAP_SYS_ADMIN in an affected user namespace can bypass access controls on resources outside the name... | https://nvd.nist.gov/vuln/detail/CVE-2018-18955 |
3,519 | linux | e4f3aa2e1e67bb48dfbaaf1cad59013d5a5bc276 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/e4f3aa2e1e67bb48dfbaaf1cad59013d5a5bc276 | cdrom: fix improper type cast, which can leat to information leak.
There is another cast from unsigned long to int which causes
a bounds check to fail with specially crafted input. The value is
then used as an index in the slot array in cdrom_slot_status().
This issue is similar to CVE-2018-16658 and CVE-2018-10940.
... | 1 | static int cdrom_ioctl_select_disc(struct cdrom_device_info *cdi,
unsigned long arg)
{
cd_dbg(CD_DO_IOCTL, "entering CDROM_SELECT_DISC\n");
if (!CDROM_CAN(CDC_SELECT_DISC))
return -ENOSYS;
if (arg != CDSL_CURRENT && arg != CDSL_NONE) {
if ((int)arg >= cdi->capacity)
return -EINVAL;
}
/*
* ->sel... | 224,235,905,693,533,500,000,000,000,000,000,000,000 | cdrom.c | 303,156,356,238,150,500,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2018-18710 | An issue was discovered in the Linux kernel through 4.19. An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658. | https://nvd.nist.gov/vuln/detail/CVE-2018-18710 |
3,520 | linux | 7b38460dc8e4eafba06c78f8e37099d3b34d473c | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7b38460dc8e4eafba06c78f8e37099d3b34d473c | xfs: don't fail when converting shortform attr to long form during ATTR_REPLACE
Kanda Motohiro reported that expanding a tiny xattr into a large xattr
fails on XFS because we remove the tiny xattr from a shortform fork and
then try to re-add it after converting the fork to extents format having
not removed the ATTR_RE... | 1 | xfs_attr_shortform_addname(xfs_da_args_t *args)
{
int newsize, forkoff, retval;
trace_xfs_attr_sf_addname(args);
retval = xfs_attr_shortform_lookup(args);
if ((args->flags & ATTR_REPLACE) && (retval == -ENOATTR)) {
return retval;
} else if (retval == -EEXIST) {
if (args->flags & ATTR_CREATE)
return retv... | 35,925,866,201,613,620,000,000,000,000,000,000,000 | xfs_attr.c | 51,495,444,875,997,870,000,000,000,000,000,000,000 | [
"CWE-754"
] | CVE-2018-18690 | In the Linux kernel before 4.17, a local attacker able to set attributes on an xfs filesystem could make this filesystem non-operational until the next mount by triggering an unchecked error condition during an xfs attribute change, because xfs_attr_shortform_addname in fs/xfs/libxfs/xfs_attr.c mishandles ATTR_REPLACE ... | https://nvd.nist.gov/vuln/detail/CVE-2018-18690 |
3,523 | libmspack | 8759da8db6ec9e866cb8eb143313f397f925bb4f | https://github.com/kyz/libmspack | https://github.com/kyz/libmspack/commit/8759da8db6ec9e866cb8eb143313f397f925bb4f | Avoid returning CHM file entries that are "blank" because they have embedded null bytes | 1 | static int chmd_read_headers(struct mspack_system *sys, struct mspack_file *fh,
struct mschmd_header *chm, int entire)
{
unsigned int section, name_len, x, errors, num_chunks;
unsigned char buf[0x54], *chunk = NULL, *name, *p, *end;
struct mschmd_file *fi, *link = NULL;
off_t offset, length;
int num_e... | 286,877,828,864,113,330,000,000,000,000,000,000,000 | chmd.c | 86,023,333,538,823,280,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2018-18585 | chmd_read_headers in mspack/chmd.c in libmspack before 0.8alpha accepts a filename that has '\0' as its first or second character (such as the "/\0" name). | https://nvd.nist.gov/vuln/detail/CVE-2018-18585 |
3,524 | linux | b799207e1e1816b09e7a5920fbb2d5fcf6edd681 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/b799207e1e1816b09e7a5920fbb2d5fcf6edd681 | bpf: 32-bit RSH verification must truncate input before the ALU op
When I wrote commit 468f6eafa6c4 ("bpf: fix 32-bit ALU op verification"), I
assumed that, in order to emulate 64-bit arithmetic with 32-bit logic, it
is sufficient to just truncate the output to 32 bits; and so I just moved
the register size coercion t... | 1 | static int adjust_scalar_min_max_vals(struct bpf_verifier_env *env,
struct bpf_insn *insn,
struct bpf_reg_state *dst_reg,
struct bpf_reg_state src_reg)
{
struct bpf_reg_state *regs = cur_regs(env);
u8 opcode = BPF_OP(insn->code);
bool src_known, dst_known;
s64 smin_val, smax_val;
u64... | 160,529,925,453,980,600,000,000,000,000,000,000,000 | verifier.c | 16,895,124,142,472,440,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-18445 | In the Linux kernel 4.14.x, 4.15.x, 4.16.x, 4.17.x, and 4.18.x before 4.18.13, faulty computation of numeric bounds in the BPF verifier permits out-of-bounds memory accesses because adjust_scalar_min_max_vals in kernel/bpf/verifier.c mishandles 32-bit right shifts. | https://nvd.nist.gov/vuln/detail/CVE-2018-18445 |
3,532 | gnulib | 278b4175c9d7dd47c1a3071554aac02add3b3c35 | https://github.com/coreutils/gnulib | https://github.com/coreutils/gnulib/commit/278b4175c9d7dd47c1a3071554aac02add3b3c35 | vasnprintf: Fix heap memory overrun bug.
Reported by Ben Pfaff <blp@cs.stanford.edu> in
<https://lists.gnu.org/archive/html/bug-gnulib/2018-09/msg00107.html>.
* lib/vasnprintf.c (convert_to_decimal): Allocate one more byte of
memory.
* tests/test-vasnprintf.c (test_function): Add another test. | 1 | convert_to_decimal (mpn_t a, size_t extra_zeroes)
{
mp_limb_t *a_ptr = a.limbs;
size_t a_len = a.nlimbs;
/* 0.03345 is slightly larger than log(2)/(9*log(10)). */
size_t c_len = 9 * ((size_t)(a_len * (GMP_LIMB_BITS * 0.03345f)) + 1);
char *c_ptr = (char *) malloc (xsum (c_len, extra_zeroes));
if (c_ptr... | 267,101,733,010,542,500,000,000,000,000,000,000,000 | vasnprintf.c | 310,190,725,670,108,440,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-17942 | The convert_to_decimal function in vasnprintf.c in Gnulib before 2018-09-23 has a heap-based buffer overflow because memory is not allocated for a trailing '\0' character during %f processing. | https://nvd.nist.gov/vuln/detail/CVE-2018-17942 |
3,536 | git | a124133e1e6ab5c7a9fef6d0e6bcb084e3455b46 | https://github.com/git/git | https://github.com/git/git/commit/a124133e1e6ab5c7a9fef6d0e6bcb084e3455b46 | fsck: detect submodule urls starting with dash
Urls with leading dashes can cause mischief on older
versions of Git. We should detect them so that they can be
rejected by receive.fsckObjects, preventing modern versions
of git from being a vector by which attacks can spread.
Signed-off-by: Jeff King <peff@peff.net>
Si... | 1 | static int fsck_gitmodules_fn(const char *var, const char *value, void *vdata)
{
struct fsck_gitmodules_data *data = vdata;
const char *subsection, *key;
int subsection_len;
char *name;
if (parse_config_key(var, "submodule", &subsection, &subsection_len, &key) < 0 ||
!subsection)
return 0;
name = xmemdup... | 101,845,170,772,504,270,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-17456 | Git before 2.14.5, 2.15.x before 2.15.3, 2.16.x before 2.16.5, 2.17.x before 2.17.2, 2.18.x before 2.18.1, and 2.19.x before 2.19.1 allows remote code execution during processing of a recursive "git clone" of a superproject if a .gitmodules file has a URL field beginning with a '-' character. | https://nvd.nist.gov/vuln/detail/CVE-2018-17456 |
3,537 | texlive-source | 6ed0077520e2b0da1fd060c7f88db7b2e6068e4c | https://github.com/TeX-Live/texlive-source | https://github.com/TeX-Live/texlive-source/commit/6ed0077520e2b0da1fd060c7f88db7b2e6068e4c | writet1 protection against buffer overflow
git-svn-id: svn://tug.org/texlive/trunk/Build/source@48697 c570f23f-e606-0410-a88d-b1316a301751 | 1 | static void t1_check_unusual_charstring(void)
{
char *p = strstr(t1_line_array, charstringname) + strlen(charstringname);
int i;
/* if no number follows "/CharStrings", let's read the next line */
if (sscanf(p, "%i", &i) != 1) {
/* pdftex_warn("no number found after `%s', I assume it's on the ne... | 111,289,472,377,531,110,000,000,000,000,000,000,000 | writet1.c | 296,322,236,862,841,300,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-17407 | An issue was discovered in t1_check_unusual_charstring functions in writet1.c files in TeX Live before 2018-09-21. A buffer overflow in the handling of Type 1 fonts allows arbitrary code execution when a malicious font is loaded by one of the vulnerable tools: pdflatex, pdftex, dvips, or luatex. | https://nvd.nist.gov/vuln/detail/CVE-2018-17407 |
3,538 | texlive-source | 6ed0077520e2b0da1fd060c7f88db7b2e6068e4c | https://github.com/TeX-Live/texlive-source | https://github.com/TeX-Live/texlive-source/commit/6ed0077520e2b0da1fd060c7f88db7b2e6068e4c | writet1 protection against buffer overflow
git-svn-id: svn://tug.org/texlive/trunk/Build/source@48697 c570f23f-e606-0410-a88d-b1316a301751 | 1 | static void t1_check_unusual_charstring(void)
{
char *p = strstr(t1_line_array, charstringname) + strlen(charstringname);
int i;
/*tex If no number follows |/CharStrings|, let's read the next line. */
if (sscanf(p, "%i", &i) != 1) {
strcpy(t1_buf_array, t1_line_array);
t1_getline();
... | 186,302,796,745,694,270,000,000,000,000,000,000,000 | writet1.c | 34,977,694,572,360,150,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-17407 | An issue was discovered in t1_check_unusual_charstring functions in writet1.c files in TeX Live before 2018-09-21. A buffer overflow in the handling of Type 1 fonts allows arbitrary code execution when a malicious font is loaded by one of the vulnerable tools: pdflatex, pdftex, dvips, or luatex. | https://nvd.nist.gov/vuln/detail/CVE-2018-17407 |
3,539 | ovs | 9237a63c47bd314b807cda0bd2216264e82edbe8 | https://github.com/openvswitch/ovs | https://github.com/openvswitch/ovs/commit/9237a63c47bd314b807cda0bd2216264e82edbe8 | ofp-actions: Avoid buffer overread in BUNDLE action decoding.
Reported-at: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=9052
Signed-off-by: Ben Pfaff <blp@ovn.org>
Acked-by: Justin Pettit <jpettit@ovn.org> | 1 | decode_bundle(bool load, const struct nx_action_bundle *nab,
const struct vl_mff_map *vl_mff_map, uint64_t *tlv_bitmap,
struct ofpbuf *ofpacts)
{
static struct vlog_rate_limit rl = VLOG_RATE_LIMIT_INIT(1, 5);
struct ofpact_bundle *bundle;
uint32_t slave_type;
size_t slaves_si... | 246,918,809,104,071,950,000,000,000,000,000,000,000 | ofp-actions.c | 262,989,974,079,934,800,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-17206 | An issue was discovered in Open vSwitch (OvS) 2.7.x through 2.7.6. The decode_bundle function inside lib/ofp-actions.c is affected by a buffer over-read issue during BUNDLE action decoding. | https://nvd.nist.gov/vuln/detail/CVE-2018-17206 |
3,540 | ovs | 0befd1f3745055c32940f5faf9559be6a14395e6 | https://github.com/openvswitch/ovs | https://github.com/openvswitch/ovs/commit/0befd1f3745055c32940f5faf9559be6a14395e6 | ofproto: Fix OVS crash when reverting old flows in bundle commit
During bundle commit flows which are added in bundle are applied
to ofproto in-order. In case if a flow cannot be added (e.g. flow
action is go-to group id which does not exist), OVS tries to
revert back all previous flows which were successfully applied... | 1 | OVS_REQUIRES(ofproto_mutex)
{
const struct rule_actions *actions = rule_get_actions(rule);
/* A rule may not be reinserted. */
ovs_assert(rule->state == RULE_INITIALIZED);
if (rule->hard_timeout || rule->idle_timeout) {
ovs_list_insert(&ofproto->expirable, &rule->expirable);
}
... | 230,678,121,195,317,530,000,000,000,000,000,000,000 | ofproto.c | 288,950,316,551,410,930,000,000,000,000,000,000,000 | [
"CWE-617"
] | CVE-2018-17205 | An issue was discovered in Open vSwitch (OvS) 2.7.x through 2.7.6, affecting ofproto_rule_insert__ in ofproto/ofproto.c. During bundle commit, flows that are added in a bundle are applied to ofproto in order. If a flow cannot be added (e.g., the flow action is a go-to for a group id that does not exist), OvS tries to r... | https://nvd.nist.gov/vuln/detail/CVE-2018-17205 |
3,541 | ovs | 4af6da3b275b764b1afe194df6499b33d2bf4cde | https://github.com/openvswitch/ovs | https://github.com/openvswitch/ovs/commit/4af6da3b275b764b1afe194df6499b33d2bf4cde | ofp-group: Don't assert-fail decoding bad OF1.5 group mod type or command.
When decoding a group mod, the current code validates the group type and
command after the whole group mod has been decoded. The OF1.5 decoder,
however, tries to use the type and command earlier, when it might still be
invalid. This caused an... | 1 | parse_group_prop_ntr_selection_method(struct ofpbuf *payload,
enum ofp11_group_type group_type,
enum ofp15_group_mod_command group_cmd,
struct ofputil_group_props *gp)
{
struct ntr_group_prop_selection_... | 160,132,015,962,314,390,000,000,000,000,000,000,000 | ofp-util.c | 208,088,101,152,268,600,000,000,000,000,000,000,000 | [
"CWE-617"
] | CVE-2018-17204 | An issue was discovered in Open vSwitch (OvS) 2.7.x through 2.7.6, affecting parse_group_prop_ntr_selection_method in lib/ofp-util.c. When decoding a group mod, it validates the group type and command after the whole group mod has been decoded. The OF1.5 decoder, however, tries to use the type and command earlier, when... | https://nvd.nist.gov/vuln/detail/CVE-2018-17204 |
3,543 | linux | 7a9cdebdcc17e426fb5287e4a82db1dfe86339b2 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7a9cdebdcc17e426fb5287e4a82db1dfe86339b2 | mm: get rid of vmacache_flush_all() entirely
Jann Horn points out that the vmacache_flush_all() function is not only
potentially expensive, it's buggy too. It also happens to be entirely
unnecessary, because the sequence number overflow case can be avoided by
simply making the sequence number be 64-bit. That doesn't... | 1 | void vmacache_flush_all(struct mm_struct *mm)
{
struct task_struct *g, *p;
count_vm_vmacache_event(VMACACHE_FULL_FLUSHES);
/*
* Single threaded tasks need not iterate the entire
* list of process. We can avoid the flushing as well
* since the mm's seqnum was increased and don't have
* to worry about other th... | 232,034,716,255,818,700,000,000,000,000,000,000,000 | vmacache.c | 287,040,567,472,576,300,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2018-17182 | An issue was discovered in the Linux kernel through 4.18.8. The vmacache_flush_all function in mm/vmacache.c mishandles sequence number overflows. An attacker can trigger a use-after-free (and possibly gain privileges) via certain thread creation, map, unmap, invalidation, and dereference operations. | https://nvd.nist.gov/vuln/detail/CVE-2018-17182 |
3,544 | php-src | 23b057742e3cf199612fa8050ae86cae675e214e | https://github.com/php/php-src | https://github.com/php/php-src/commit/23b057742e3cf199612fa8050ae86cae675e214e | Fix for bug #76582
The brigade seems to end up in a messed up state if something fails
in shutdown, so we clean it up. | 1 | static int php_handler(request_rec *r)
{
php_struct * volatile ctx;
void *conf;
apr_bucket_brigade * volatile brigade;
apr_bucket *bucket;
apr_status_t rv;
request_rec * volatile parent_req = NULL;
TSRMLS_FETCH();
#define PHPAP_INI_OFF php_apache_ini_dtor(r, parent_req TSRMLS_CC);
conf = ap_get_module_config(... | 182,394,297,957,195,980,000,000,000,000,000,000,000 | sapi_apache2.c | 187,699,522,903,415,300,000,000,000,000,000,000,000 | [
"CWE-79"
] | CVE-2018-17082 | The Apache2 component in PHP before 5.6.38, 7.0.x before 7.0.32, 7.1.x before 7.1.22, and 7.2.x before 7.2.10 allows XSS via the body of a "Transfer-Encoding: chunked" request, because the bucket brigade is mishandled in the php_handler function in sapi/apache2handler/sapi_apache2.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-17082 |
3,545 | curl | d530e92f59ae9bb2d47066c3c460b25d2ffeb211 | https://github.com/curl/curl | https://github.com/curl/curl/commit/d530e92f59ae9bb2d47066c3c460b25d2ffeb211 | voutf: fix bad arethmetic when outputting warnings to stderr
CVE-2018-16842
Reported-by: Brian Carpenter
Bug: https://curl.haxx.se/docs/CVE-2018-16842.html | 1 | static void voutf(struct GlobalConfig *config,
const char *prefix,
const char *fmt,
va_list ap)
{
size_t width = (79 - strlen(prefix));
if(!config->mute) {
size_t len;
char *ptr;
char *print_buffer;
print_buffer = curlx_mvaprintf(fmt, ap);
i... | 243,200,030,011,946,100,000,000,000,000,000,000,000 | tool_msgs.c | 68,505,042,536,067,880,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-16842 | Curl versions 7.14.1 through 7.61.1 are vulnerable to a heap-based buffer over-read in the tool_msgs.c:voutf() function that may result in information exposure and denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2018-16842 |
3,546 | curl | 81d135d67155c5295b1033679c606165d4e28f3f | https://github.com/curl/curl | https://github.com/curl/curl/commit/81d135d67155c5295b1033679c606165d4e28f3f | Curl_close: clear data->multi_easy on free to avoid use-after-free
Regression from b46cfbc068 (7.59.0)
CVE-2018-16840
Reported-by: Brian Carpenter (Geeknik Labs)
Bug: https://curl.haxx.se/docs/CVE-2018-16840.html | 1 | CURLcode Curl_close(struct Curl_easy *data)
{
struct Curl_multi *m;
if(!data)
return CURLE_OK;
Curl_expire_clear(data); /* shut off timers */
m = data->multi;
if(m)
/* This handle is still part of a multi handle, take care of this first
and detach this handle from there. */
curl_multi_... | 146,738,609,343,169,300,000,000,000,000,000,000,000 | url.c | 21,183,698,655,484,456,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2018-16840 | A heap use-after-free flaw was found in curl versions from 7.59.0 through 7.61.1 in the code related to closing an easy handle. When closing and cleaning up an 'easy' handle in the `Curl_close()` function, the library code first frees a struct (without nulling the pointer) and might then subsequently erroneously write ... | https://nvd.nist.gov/vuln/detail/CVE-2018-16840 |
3,547 | curl | f3a24d7916b9173c69a3e0ee790102993833d6c5 | https://github.com/curl/curl | https://github.com/curl/curl/commit/f3a24d7916b9173c69a3e0ee790102993833d6c5 | Curl_auth_create_plain_message: fix too-large-input-check
CVE-2018-16839
Reported-by: Harry Sintonen
Bug: https://curl.haxx.se/docs/CVE-2018-16839.html | 1 | CURLcode Curl_auth_create_plain_message(struct Curl_easy *data,
const char *userp,
const char *passwdp,
char **outptr, size_t *outlen)
{
CURLcode result;
char *plainauth;
size_t ulen;
size_t p... | 151,646,974,909,090,780,000,000,000,000,000,000,000 | cleartext.c | 284,710,761,622,311,070,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-16839 | Curl versions 7.33.0 through 7.61.1 are vulnerable to a buffer overrun in the SASL authentication code that may lead to denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2018-16839 |
3,548 | mongo-c-driver | 0d9a4d98bfdf4acd2c0138d4aaeb4e2e0934bd84 | https://github.com/mongodb/mongo-c-driver | https://github.com/mongodb/mongo-c-driver/commit/0d9a4d98bfdf4acd2c0138d4aaeb4e2e0934bd84 | Fix for CVE-2018-16790 -- Verify bounds before binary length read.
As reported here: https://jira.mongodb.org/browse/CDRIVER-2819,
a heap overread occurs due a failure to correctly verify data
bounds.
In the original check, len - o returns the data left including the
sizeof(l) we just read. Instead, the comparison sh... | 1 | _bson_iter_next_internal (bson_iter_t *iter, /* INOUT */
uint32_t next_keylen, /* IN */
const char **key, /* OUT */
uint32_t *bson_type, /* OUT */
bool *unsupported) /* OUT */
{
const uint8_t *data;
... | 247,944,174,862,272,700,000,000,000,000,000,000,000 | bson-iter.c | 140,668,676,497,403,740,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-16790 | _bson_iter_next_internal in bson-iter.c in libbson 1.12.0, as used in MongoDB mongo-c-driver and other products, has a heap-based buffer over-read via a crafted bson buffer. | https://nvd.nist.gov/vuln/detail/CVE-2018-16790 |
3,550 | ImageMagick6 | 1007b98f8795ad4bea6bc5f68a32d83e982fdae4 | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/1007b98f8795ad4bea6bc5f68a32d83e982fdae4 | https://github.com/ImageMagick/ImageMagick/issues/1119 | 1 | static Image *ReadOneJNGImage(MngInfo *mng_info,
const ImageInfo *image_info, ExceptionInfo *exception)
{
Image
*alpha_image,
*color_image,
*image,
*jng_image;
ImageInfo
*alpha_image_info,
*color_image_info;
MagickBooleanType
logging;
int
unique_filenames;
ssize_t
y... | 54,473,371,976,532,860,000,000,000,000,000,000,000 | png.c | 229,500,338,170,202,940,000,000,000,000,000,000,000 | [
"CWE-617"
] | CVE-2018-16749 | In ImageMagick 7.0.7-29 and earlier, a missing NULL check in ReadOneJNGImage in coders/png.c allows an attacker to cause a denial of service (WriteBlob assertion failure and application exit) via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2018-16749 |
3,551 | linux | 8f3fafc9c2f0ece10832c25f7ffcb07c97a32ad4 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/8f3fafc9c2f0ece10832c25f7ffcb07c97a32ad4 | cdrom: Fix info leak/OOB read in cdrom_ioctl_drive_status
Like d88b6d04: "cdrom: information leak in cdrom_ioctl_media_changed()"
There is another cast from unsigned long to int which causes
a bounds check to fail with specially crafted input. The value is
then used as an index in the slot array in cdrom_slot_status(... | 1 | static int cdrom_ioctl_drive_status(struct cdrom_device_info *cdi,
unsigned long arg)
{
cd_dbg(CD_DO_IOCTL, "entering CDROM_DRIVE_STATUS\n");
if (!(cdi->ops->capability & CDC_DRIVE_STATUS))
return -ENOSYS;
if (!CDROM_CAN(CDC_SELECT_DISC) ||
(arg == CDSL_CURRENT || arg == CDSL_NONE))
return cdi->ops->d... | 318,716,308,735,320,030,000,000,000,000,000,000,000 | cdrom.c | 303,156,356,238,150,500,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2018-16658 | An issue was discovered in the Linux kernel before 4.18.6. An information leak in cdrom_ioctl_drive_status in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940. | https://nvd.nist.gov/vuln/detail/CVE-2018-16658 |
3,552 | ImageMagick | ecb31dbad39ccdc65868d5d2a37f0f0521250832 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/ecb31dbad39ccdc65868d5d2a37f0f0521250832 | https://github.com/ImageMagick/ImageMagick/issues/1268 | 1 | static Image *ReadBMPImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
BMPInfo
bmp_info;
Image
*image;
MagickBooleanType
status;
MagickOffsetType
offset,
start_position;
MemoryInfo
*pixel_info;
Quantum
index;
register Quantum
*q;
register ssize_t
i,... | 231,882,249,216,637,050,000,000,000,000,000,000,000 | bmp.c | 74,586,236,604,626,345,000,000,000,000,000,000,000 | [
"CWE-770"
] | CVE-2018-16645 | There is an excessive memory allocation issue in the functions ReadBMPImage of coders/bmp.c and ReadDIBImage of coders/dib.c in ImageMagick 7.0.8-11, which allows remote attackers to cause a denial of service via a crafted image file. | https://nvd.nist.gov/vuln/detail/CVE-2018-16645 |
3,553 | ImageMagick | afa878a689870c28b6994ecf3bb8dbfb2b76d135 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/afa878a689870c28b6994ecf3bb8dbfb2b76d135 | https://github.com/ImageMagick/ImageMagick/issues/1269 | 1 | static Image *ReadPICTImage(const ImageInfo *image_info,
ExceptionInfo *exception)
{
#define ThrowPICTException(exception,message) \
{ \
if (tile_image != (Image *) NULL) \
tile_image=DestroyImage(tile_image); \
if (read_info != (ImageInfo *) NULL) \
read_info=DestroyImageInfo(read_info); \
ThrowReaderE... | 268,226,971,198,431,460,000,000,000,000,000,000,000 | pict.c | 85,654,100,738,905,160,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2018-16644 | There is a missing check for length in the functions ReadDCMImage of coders/dcm.c and ReadPICTImage of coders/pict.c in ImageMagick 7.0.8-11, which allows remote attackers to cause a denial of service via a crafted image. | https://nvd.nist.gov/vuln/detail/CVE-2018-16644 |
3,554 | ImageMagick | 6b6bff054d569a77973f2140c0e86366e6168a6c | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/6b6bff054d569a77973f2140c0e86366e6168a6c | https://github.com/ImageMagick/ImageMagick/issues/1199 | 1 | static Image *ReadCALSImage(const ImageInfo *image_info,
ExceptionInfo *exception)
{
char
filename[MagickPathExtent],
header[MagickPathExtent],
message[MagickPathExtent];
FILE
*file;
Image
*image;
ImageInfo
*read_info;
int
c,
unique_file;
MagickBooleanType
status;
... | 230,963,622,459,541,900,000,000,000,000,000,000,000 | cals.c | 249,874,488,600,858,530,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2018-16643 | The functions ReadDCMImage in coders/dcm.c, ReadPWPImage in coders/pwp.c, ReadCALSImage in coders/cals.c, and ReadPICTImage in coders/pict.c in ImageMagick 7.0.8-4 do not check the return value of the fputc function, which allows remote attackers to cause a denial of service via a crafted image file. | https://nvd.nist.gov/vuln/detail/CVE-2018-16643 |
3,555 | ImageMagick | 6b6bff054d569a77973f2140c0e86366e6168a6c | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/6b6bff054d569a77973f2140c0e86366e6168a6c | https://github.com/ImageMagick/ImageMagick/issues/1199 | 1 | static Image *ReadDCMImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
#define ThrowDCMException(exception,message) \
{ \
if (info.scale != (Quantum *) NULL) \
info.scale=(Quantum *) RelinquishMagickMemory(info.scale); \
if (data != (unsigned char *) NULL) \
data=(unsigned char *) RelinquishMagi... | 32,603,143,152,590,400,000,000,000,000,000,000,000 | dcm.c | 23,780,388,635,429,870,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2018-16643 | The functions ReadDCMImage in coders/dcm.c, ReadPWPImage in coders/pwp.c, ReadCALSImage in coders/cals.c, and ReadPICTImage in coders/pict.c in ImageMagick 7.0.8-4 do not check the return value of the fputc function, which allows remote attackers to cause a denial of service via a crafted image file. | https://nvd.nist.gov/vuln/detail/CVE-2018-16643 |
3,556 | ImageMagick | 6b6bff054d569a77973f2140c0e86366e6168a6c | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/6b6bff054d569a77973f2140c0e86366e6168a6c | https://github.com/ImageMagick/ImageMagick/issues/1199 | 1 | static Image *ReadPICTImage(const ImageInfo *image_info,
ExceptionInfo *exception)
{
#define ThrowPICTException(exception,message) \
{ \
if (tile_image != (Image *) NULL) \
tile_image=DestroyImage(tile_image); \
if (read_info != (ImageInfo *) NULL) \
read_info=DestroyImageInfo(read_info); \
ThrowReaderE... | 105,401,273,080,100,600,000,000,000,000,000,000,000 | pict.c | 225,266,491,896,176,200,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2018-16643 | The functions ReadDCMImage in coders/dcm.c, ReadPWPImage in coders/pwp.c, ReadCALSImage in coders/cals.c, and ReadPICTImage in coders/pict.c in ImageMagick 7.0.8-4 do not check the return value of the fputc function, which allows remote attackers to cause a denial of service via a crafted image file. | https://nvd.nist.gov/vuln/detail/CVE-2018-16643 |
3,557 | ImageMagick | 6b6bff054d569a77973f2140c0e86366e6168a6c | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/6b6bff054d569a77973f2140c0e86366e6168a6c | https://github.com/ImageMagick/ImageMagick/issues/1199 | 1 | static Image *ReadPWPImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
char
filename[MagickPathExtent];
FILE
*file;
Image
*image,
*next_image,
*pwp_image;
ImageInfo
*read_info;
int
c,
unique_file;
MagickBooleanType
status;
register Image
*p;
reg... | 327,038,602,402,263,440,000,000,000,000,000,000,000 | pwp.c | 138,360,736,349,985,270,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2018-16643 | The functions ReadDCMImage in coders/dcm.c, ReadPWPImage in coders/pwp.c, ReadCALSImage in coders/cals.c, and ReadPICTImage in coders/pict.c in ImageMagick 7.0.8-4 do not check the return value of the fputc function, which allows remote attackers to cause a denial of service via a crafted image file. | https://nvd.nist.gov/vuln/detail/CVE-2018-16643 |
3,558 | ImageMagick | cc4ac341f29fa368da6ef01c207deaf8c61f6a2e | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/cc4ac341f29fa368da6ef01c207deaf8c61f6a2e | https://github.com/ImageMagick/ImageMagick/issues/1162 | 1 | static void InsertRow(Image *image,ssize_t depth,unsigned char *p,ssize_t y,
ExceptionInfo *exception)
{
size_t bit; ssize_t x;
register Quantum *q;
Quantum index;
index=0;
switch (depth)
{
case 1: /* Convert bitmap scanline. */
{
q=QueueAuthenticPixels(image,0,y,image->columns,1,e... | 248,821,212,902,523,860,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2018-16642 | The function InsertRow in coders/cut.c in ImageMagick 7.0.7-37 allows remote attackers to cause a denial of service via a crafted image file due to an out-of-bounds write. | https://nvd.nist.gov/vuln/detail/CVE-2018-16642 |
3,559 | ImageMagick | 256825d4eb33dc301496710d15cf5a7ae924088b | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/256825d4eb33dc301496710d15cf5a7ae924088b | Fixed possible memory leak reported in #1206 | 1 | static MagickBooleanType TIFFWritePhotoshopLayers(Image* image,
const ImageInfo *image_info,EndianType endian,ExceptionInfo *exception)
{
BlobInfo
*blob;
CustomStreamInfo
*custom_stream;
Image
*base_image,
*next;
ImageInfo
*clone_info;
MagickBooleanType
status;
PhotoshopProfil... | 24,688,139,327,807,033,000,000,000,000,000,000,000 | tiff.c | 316,057,833,404,137,560,000,000,000,000,000,000,000 | [
"CWE-772"
] | CVE-2018-16641 | ImageMagick 7.0.8-6 has a memory leak vulnerability in the TIFFWritePhotoshopLayers function in coders/tiff.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-16641 |
3,560 | Little-CMS | 768f70ca405cd3159d990e962d54456773bb8cf8 | https://github.com/mm2/Little-CMS | https://github.com/mm2/Little-CMS/commit/768f70ca405cd3159d990e962d54456773bb8cf8 | Upgrade Visual studio 2017 15.8
- Upgrade to 15.8
- Add check on CGATS memory allocation (thanks to Quang Nguyen for
pointing out this) | 1 | void AllocateDataSet(cmsIT8* it8)
{
TABLE* t = GetTable(it8);
if (t -> Data) return; // Already allocated
t-> nSamples = atoi(cmsIT8GetProperty(it8, "NUMBER_OF_FIELDS"));
t-> nPatches = atoi(cmsIT8GetProperty(it8, "NUMBER_OF_SETS"));
t-> Data = (char**)AllocChunk (it8, ((cmsUInt32Number... | 130,867,891,295,494,080,000,000,000,000,000,000,000 | cmscgats.c | 158,410,423,807,065,500,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2018-16435 | Little CMS (aka Little Color Management System) 2.9 has an integer overflow in the AllocateDataSet function in cmscgats.c, leading to a heap-based buffer overflow in the SetData function via a crafted file in the second argument to cmsIT8LoadFromFile. | https://nvd.nist.gov/vuln/detail/CVE-2018-16435 |
3,581 | OpenSC | 03628449b75a93787eb2359412a3980365dda49b | https://github.com/OpenSC/OpenSC | https://github.com/OpenSC/OpenSC/commit/03628449b75a93787eb2359412a3980365dda49b#diff-f8c0128e14031ed9307d47f10f601b54 | iasecc: fixed unbound recursion | 1 | iasecc_select_file(struct sc_card *card, const struct sc_path *path,
struct sc_file **file_out)
{
struct sc_context *ctx = card->ctx;
struct sc_path lpath;
int cache_valid = card->cache.valid, df_from_cache = 0;
int rv, ii;
LOG_FUNC_CALLED(ctx);
memcpy(&lpath, path, sizeof(struct sc_path));
if (file_out)
*... | 15,095,566,280,526,777,000,000,000,000,000,000,000 | card-iasecc.c | 119,175,450,858,239,650,000,000,000,000,000,000,000 | [
"CWE-674"
] | CVE-2018-16426 | Endless recursion when handling responses from an IAS-ECC card in iasecc_select_file in libopensc/card-iasecc.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to hang or crash the opensc library using programs. | https://nvd.nist.gov/vuln/detail/CVE-2018-16426 |
3,582 | OpenSC | 360e95d45ac4123255a4c796db96337f332160ad | https://github.com/OpenSC/OpenSC | https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-477b7a40136bb418b10ce271c8664536 | fixed out of bounds writes
Thanks to Eric Sesterhenn from X41 D-SEC GmbH
for reporting the problems. | 1 | static int cac_get_serial_nr_from_CUID(sc_card_t* card, sc_serial_number_t* serial)
{
cac_private_data_t * priv = CAC_DATA(card);
SC_FUNC_CALLED(card->ctx, SC_LOG_DEBUG_NORMAL);
if (card->serialnr.len) {
*serial = card->serialnr;
SC_FUNC_RETURN(card->ctx, SC_LOG_DEBUG_NORMAL... | 62,749,081,203,659,250,000,000,000,000,000,000,000 | card-cac.c | 325,767,557,583,895,600,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2018-16420 | Several buffer overflows when handling responses from an ePass 2003 Card in decrypt_response in libopensc/card-epass2003.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2018-16420 |
3,583 | OpenSC | 360e95d45ac4123255a4c796db96337f332160ad | https://github.com/OpenSC/OpenSC | https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-477b7a40136bb418b10ce271c8664536 | fixed out of bounds writes
Thanks to Eric Sesterhenn from X41 D-SEC GmbH
for reporting the problems. | 1 | decrypt_response(struct sc_card *card, unsigned char *in, size_t inlen, unsigned char *out, size_t * out_len)
{
size_t cipher_len;
size_t i;
unsigned char iv[16] = { 0 };
unsigned char plaintext[4096] = { 0 };
epass2003_exdata *exdata = NULL;
if (!card->drv_data)
return SC_ERROR_INVALID_ARGUMENTS;
exdata = ... | 242,799,205,298,628,300,000,000,000,000,000,000,000 | card-epass2003.c | 97,419,460,844,644,880,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2018-16420 | Several buffer overflows when handling responses from an ePass 2003 Card in decrypt_response in libopensc/card-epass2003.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2018-16420 |
3,585 | OpenSC | 360e95d45ac4123255a4c796db96337f332160ad | https://github.com/OpenSC/OpenSC | https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-477b7a40136bb418b10ce271c8664536 | fixed out of bounds writes
Thanks to Eric Sesterhenn from X41 D-SEC GmbH
for reporting the problems. | 1 | static int muscle_list_files(sc_card_t *card, u8 *buf, size_t bufLen)
{
muscle_private_t* priv = MUSCLE_DATA(card);
mscfs_t *fs = priv->fs;
int x;
int count = 0;
mscfs_check_cache(priv->fs);
for(x = 0; x < fs->cache.size; x++) {
u8* oid= fs->cache.array[x].objectId.id;
sc_debug(card->ctx, SC_LOG_DEBUG_N... | 276,035,595,384,972,040,000,000,000,000,000,000,000 | card-muscle.c | 67,473,597,783,102,210,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2018-16420 | Several buffer overflows when handling responses from an ePass 2003 Card in decrypt_response in libopensc/card-epass2003.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2018-16420 |
3,586 | OpenSC | 360e95d45ac4123255a4c796db96337f332160ad | https://github.com/OpenSC/OpenSC | https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-477b7a40136bb418b10ce271c8664536 | fixed out of bounds writes
Thanks to Eric Sesterhenn from X41 D-SEC GmbH
for reporting the problems. | 1 | static int tcos_select_file(sc_card_t *card,
const sc_path_t *in_path,
sc_file_t **file_out)
{
sc_context_t *ctx;
sc_apdu_t apdu;
sc_file_t *file=NULL;
u8 buf[SC_MAX_APDU_BUFFER_SIZE], pathbuf[SC_MAX_PATH_SIZE], *path = pathbuf;
unsigned int i;
int r, pathlen;
assert(card != NULL && in_path != NUL... | 206,419,591,839,581,680,000,000,000,000,000,000,000 | card-tcos.c | 9,490,541,125,465,637,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2018-16420 | Several buffer overflows when handling responses from an ePass 2003 Card in decrypt_response in libopensc/card-epass2003.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2018-16420 |
3,587 | OpenSC | 360e95d45ac4123255a4c796db96337f332160ad | https://github.com/OpenSC/OpenSC | https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-477b7a40136bb418b10ce271c8664536 | fixed out of bounds writes
Thanks to Eric Sesterhenn from X41 D-SEC GmbH
for reporting the problems. | 1 | sc_pkcs15emu_esteid_init (sc_pkcs15_card_t * p15card)
{
sc_card_t *card = p15card->card;
unsigned char buff[128];
int r, i;
size_t field_length = 0, modulus_length = 0;
sc_path_t tmppath;
set_string (&p15card->tokeninfo->label, "ID-kaart");
set_string (&p15card->tokeninfo->manufacturer_id, "AS Sertifitseerimisk... | 178,422,683,966,294,870,000,000,000,000,000,000,000 | pkcs15-esteid.c | 123,910,476,764,601,500,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2018-16420 | Several buffer overflows when handling responses from an ePass 2003 Card in decrypt_response in libopensc/card-epass2003.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2018-16420 |
3,588 | OpenSC | 360e95d45ac4123255a4c796db96337f332160ad | https://github.com/OpenSC/OpenSC | https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-477b7a40136bb418b10ce271c8664536 | fixed out of bounds writes
Thanks to Eric Sesterhenn from X41 D-SEC GmbH
for reporting the problems. | 1 | static int gemsafe_get_cert_len(sc_card_t *card)
{
int r;
u8 ibuf[GEMSAFE_MAX_OBJLEN];
u8 *iptr;
struct sc_path path;
struct sc_file *file;
size_t objlen, certlen;
unsigned int ind, i=0;
sc_format_path(GEMSAFE_PATH, &path);
r = sc_select_file(card, &path, &file);
if (r != SC_SUCCESS || !file)
return SC_ER... | 173,755,131,876,834,830,000,000,000,000,000,000,000 | pkcs15-gemsafeV1.c | 195,161,354,280,101,900,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2018-16420 | Several buffer overflows when handling responses from an ePass 2003 Card in decrypt_response in libopensc/card-epass2003.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2018-16420 |
3,589 | OpenSC | 360e95d45ac4123255a4c796db96337f332160ad | https://github.com/OpenSC/OpenSC | https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-477b7a40136bb418b10ce271c8664536 | fixed out of bounds writes
Thanks to Eric Sesterhenn from X41 D-SEC GmbH
for reporting the problems. | 1 | static int sc_pkcs15emu_sc_hsm_init (sc_pkcs15_card_t * p15card)
{
sc_card_t *card = p15card->card;
sc_hsm_private_data_t *priv = (sc_hsm_private_data_t *) card->drv_data;
sc_file_t *file = NULL;
sc_path_t path;
u8 filelist[MAX_EXT_APDU_LENGTH];
int filelistlength;
int r, i;
sc_cvc_t devcert;
struct sc_app_inf... | 292,005,769,458,856,380,000,000,000,000,000,000,000 | pkcs15-sc-hsm.c | 66,134,502,400,003,190,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2018-16420 | Several buffer overflows when handling responses from an ePass 2003 Card in decrypt_response in libopensc/card-epass2003.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2018-16420 |
3,590 | OpenSC | 360e95d45ac4123255a4c796db96337f332160ad | https://github.com/OpenSC/OpenSC | https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-477b7a40136bb418b10ce271c8664536 | fixed out of bounds writes
Thanks to Eric Sesterhenn from X41 D-SEC GmbH
for reporting the problems. | 1 | int sc_file_set_sec_attr(sc_file_t *file, const u8 *sec_attr,
size_t sec_attr_len)
{
u8 *tmp;
if (!sc_file_valid(file)) {
return SC_ERROR_INVALID_ARGUMENTS;
}
if (sec_attr == NULL) {
if (file->sec_attr != NULL)
free(file->sec_attr);
file->sec_attr = NULL;
file->sec_attr_len = 0;
return 0;
... | 200,304,011,778,260,900,000,000,000,000,000,000,000 | sc.c | 239,432,632,543,135,840,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2018-16420 | Several buffer overflows when handling responses from an ePass 2003 Card in decrypt_response in libopensc/card-epass2003.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2018-16420 |
3,592 | OpenSC | 360e95d45ac4123255a4c796db96337f332160ad | https://github.com/OpenSC/OpenSC | https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-477b7a40136bb418b10ce271c8664536 | fixed out of bounds writes
Thanks to Eric Sesterhenn from X41 D-SEC GmbH
for reporting the problems. | 1 | static int read_public_key(RSA *rsa)
{
int r;
sc_path_t path;
sc_file_t *file;
u8 buf[2048], *p = buf;
size_t bufsize, keysize;
r = select_app_df();
if (r)
return 1;
sc_format_path("I1012", &path);
r = sc_select_file(card, &path, &file);
if (r) {
fprintf(stderr, "Unable to select public key file: %s\n",... | 161,354,385,550,546,090,000,000,000,000,000,000,000 | cryptoflex-tool.c | 123,572,892,140,995,400,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2018-16420 | Several buffer overflows when handling responses from an ePass 2003 Card in decrypt_response in libopensc/card-epass2003.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2018-16420 |
3,593 | OpenSC | 360e95d45ac4123255a4c796db96337f332160ad | https://github.com/OpenSC/OpenSC | https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-477b7a40136bb418b10ce271c8664536 | fixed out of bounds writes
Thanks to Eric Sesterhenn from X41 D-SEC GmbH
for reporting the problems. | 1 | const char * util_acl_to_str(const sc_acl_entry_t *e)
{
static char line[80], buf[20];
unsigned int acl;
if (e == NULL)
return "N/A";
line[0] = 0;
while (e != NULL) {
acl = e->method;
switch (acl) {
case SC_AC_UNKNOWN:
return "N/A";
case SC_AC_NEVER:
return "NEVR";
case SC_AC_NONE:
return "N... | 104,691,721,202,525,020,000,000,000,000,000,000,000 | util.c | 143,310,929,442,614,960,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2018-16420 | Several buffer overflows when handling responses from an ePass 2003 Card in decrypt_response in libopensc/card-epass2003.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2018-16420 |
3,594 | linux | f1e255d60ae66a9f672ff9a207ee6cd8e33d2679 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/f1e255d60ae66a9f672ff9a207ee6cd8e33d2679 | USB: yurex: fix out-of-bounds uaccess in read handler
In general, accessing userspace memory beyond the length of the supplied
buffer in VFS read/write handlers can lead to both kernel memory corruption
(via kernel_read()/kernel_write(), which can e.g. be triggered via
sys_splice()) and privilege escalation inside use... | 1 | static ssize_t yurex_read(struct file *file, char __user *buffer, size_t count,
loff_t *ppos)
{
struct usb_yurex *dev;
int retval = 0;
int bytes_read = 0;
char in_buffer[20];
unsigned long flags;
dev = file->private_data;
mutex_lock(&dev->io_mutex);
if (!dev->interface) { /* already disconnect... | 31,187,263,457,320,156,000,000,000,000,000,000,000 | yurex.c | 153,797,157,770,324,700,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2018-16276 | An issue was discovered in yurex_read in drivers/usb/misc/yurex.c in the Linux kernel before 4.17.7. Local attackers could use user access read/writes with incorrect bounds checking in the yurex USB driver to crash the kernel or potentially escalate privileges. | https://nvd.nist.gov/vuln/detail/CVE-2018-16276 |
3,595 | axtls-8266 | 5efe2947ab45e81d84b5f707c51d1c64be52f36c | https://github.com/igrr/axtls-8266 | https://github.com/igrr/axtls-8266/commit/5efe2947ab45e81d84b5f707c51d1c64be52f36c | Apply CVE fixes for X509 parsing
Apply patches developed by Sze Yiu which correct a vulnerability in
X509 parsing. See CVE-2018-16150 and CVE-2018-16149 for more info. | 1 | static bigint *sig_verify(BI_CTX *ctx, const uint8_t *sig, int sig_len,
bigint *modulus, bigint *pub_exp)
{
int i, size;
bigint *decrypted_bi, *dat_bi;
bigint *bir = NULL;
uint8_t *block = (uint8_t *)malloc(sig_len);
/* decrypt */
dat_bi = bi_import(ctx, sig, sig_len);
ctx-... | 270,479,850,159,638,380,000,000,000,000,000,000,000 | x509.c | 310,893,347,411,045,500,000,000,000,000,000,000,000 | [
"CWE-347"
] | CVE-2018-16253 | In sig_verify() in x509.c in axTLS version 2.1.3 and before, the PKCS#1 v1.5 signature verification does not properly verify the ASN.1 metadata. Consequently, a remote attacker can forge signatures when small public exponents are being used, which could lead to impersonation through fake X.509 certificates. This is an ... | https://nvd.nist.gov/vuln/detail/CVE-2018-16253 |
3,597 | libxkbcommon | 96df3106d49438e442510c59acad306e94f3db4d | https://github.com/xkbcommon/libxkbcommon | https://github.com/xkbcommon/libxkbcommon/commit/96df3106d49438e442510c59acad306e94f3db4d | xkbcomp: Don't crash on no-op modmask expressions
If we have an expression of the form 'l1' in an interp section, we
unconditionally try to dereference its args, even if it has none.
Signed-off-by: Daniel Stone <daniels@collabora.com> | 1 | ResolveStateAndPredicate(ExprDef *expr, enum xkb_match_operation *pred_rtrn,
xkb_mod_mask_t *mods_rtrn, CompatInfo *info)
{
if (expr == NULL) {
*pred_rtrn = MATCH_ANY_OR_NONE;
*mods_rtrn = MOD_REAL_MASK_ALL;
return true;
}
*pred_rtrn = MATCH_EXACTLY;
i... | 322,677,027,855,373,450,000,000,000,000,000,000,000 | compat.c | 62,511,665,433,778,810,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2018-15863 | Unchecked NULL pointer usage in ResolveStateAndPredicate in xkbcomp/compat.c in xkbcommon before 0.8.2 could be used by local attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying a crafted keymap file with a no-op modmask expression. | https://nvd.nist.gov/vuln/detail/CVE-2018-15863 |
3,598 | libxkbcommon | bb4909d2d8fa6b08155e449986a478101e2b2634 | https://github.com/xkbcommon/libxkbcommon | https://github.com/xkbcommon/libxkbcommon/commit/bb4909d2d8fa6b08155e449986a478101e2b2634 | Fail expression lookup on invalid atoms
If we fail atom lookup, then we should not claim that we successfully
looked up the expression.
Signed-off-by: Daniel Stone <daniels@collabora.com> | 1 | ExprResolveLhs(struct xkb_context *ctx, const ExprDef *expr,
const char **elem_rtrn, const char **field_rtrn,
ExprDef **index_rtrn)
{
switch (expr->expr.op) {
case EXPR_IDENT:
*elem_rtrn = NULL;
*field_rtrn = xkb_atom_text(ctx, expr->ident.ident);
*index_rtr... | 31,784,033,323,607,916,000,000,000,000,000,000,000 | expr.c | 36,624,667,439,648,246,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2018-15859 | Unchecked NULL pointer usage when parsing invalid atoms in ExprResolveLhs in xkbcomp/expr.c in xkbcommon before 0.8.2 could be used by local attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying a crafted keymap file, because lookup failures are mishandled. | https://nvd.nist.gov/vuln/detail/CVE-2018-15859 |
3,599 | libxkbcommon | badb428e63387140720f22486b3acbd3d738859f | https://github.com/xkbcommon/libxkbcommon | https://github.com/xkbcommon/libxkbcommon/commit/badb428e63387140720f22486b3acbd3d738859f | keycodes: don't try to copy zero key aliases
Move the aliases copy to within the (num_key_aliases > 0) block.
Passing info->aliases into this fuction with invalid aliases will
cause log messages but num_key_aliases stays on 0. The key_aliases array
is never allocated and remains NULL. We then loop through the aliases... | 1 | CopyKeyAliasesToKeymap(struct xkb_keymap *keymap, KeyNamesInfo *info)
{
AliasInfo *alias;
unsigned i, num_key_aliases;
struct xkb_key_alias *key_aliases;
/*
* Do some sanity checking on the aliases. We can't do it before
* because keys and their aliases may be added out-of-order.
*/
... | 36,688,546,490,544,030,000,000,000,000,000,000,000 | keycodes.c | 170,792,000,299,261,260,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2018-15858 | Unchecked NULL pointer usage when handling invalid aliases in CopyKeyAliasesToKeymap in xkbcomp/keycodes.c in xkbcommon before 0.8.1 could be used by local attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying a crafted keymap file. | https://nvd.nist.gov/vuln/detail/CVE-2018-15858 |
3,600 | libxkbcommon | c1e5ac16e77a21f87bdf3bc4dea61b037a17dddb | https://github.com/xkbcommon/libxkbcommon | https://github.com/xkbcommon/libxkbcommon/commit/c1e5ac16e77a21f87bdf3bc4dea61b037a17dddb | xkbcomp: fix pointer value for FreeStmt
Signed-off-by: Peter Hutterer <peter.hutterer@who-t.net> | 1 | ExprAppendMultiKeysymList(ExprDef *expr, ExprDef *append)
{
unsigned nSyms = darray_size(expr->keysym_list.syms);
unsigned numEntries = darray_size(append->keysym_list.syms);
darray_append(expr->keysym_list.symsMapIndex, nSyms);
darray_append(expr->keysym_list.symsNumEntries, numEntries);
darray_... | 50,655,231,442,243,785,000,000,000,000,000,000,000 | ast-build.c | 176,330,050,765,854,960,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2018-15857 | An invalid free in ExprAppendMultiKeysymList in xkbcomp/ast-build.c in xkbcommon before 0.8.1 could be used by local attackers to crash xkbcommon keymap parsers or possibly have unspecified other impact by supplying a crafted keymap file. | https://nvd.nist.gov/vuln/detail/CVE-2018-15857 |
3,601 | libxkbcommon | 842e4351c2c97de6051cab6ce36b4a81e709a0e1 | https://github.com/xkbcommon/libxkbcommon | https://github.com/xkbcommon/libxkbcommon/commit/842e4351c2c97de6051cab6ce36b4a81e709a0e1 | compose: fix infinite loop in parser on some inputs
The parser would enter an infinite loop if an unterminated keysym
literal occurs at EOF.
Found with the afl fuzzer.
Signed-off-by: Ran Benita <ran234@gmail.com> | 1 | lex(struct scanner *s, union lvalue *val)
{
skip_more_whitespace_and_comments:
/* Skip spaces. */
while (is_space(peek(s)))
if (next(s) == '\n')
return TOK_END_OF_LINE;
/* Skip comments. */
if (chr(s, '#')) {
skip_to_eol(s);
goto skip_more_whitespace_and_comments;
... | 100,560,431,963,326,220,000,000,000,000,000,000,000 | parser.c | 167,577,738,802,424,040,000,000,000,000,000,000,000 | [
"CWE-835"
] | CVE-2018-15856 | An infinite loop when reaching EOL unexpectedly in compose/parser.c (aka the keymap parser) in xkbcommon before 0.8.1 could be used by local attackers to cause a denial of service during parsing of crafted keymap files. | https://nvd.nist.gov/vuln/detail/CVE-2018-15856 |
3,602 | libxkbcommon | 917636b1d0d70205a13f89062b95e3a0fc31d4ff | https://github.com/xkbcommon/libxkbcommon | https://github.com/xkbcommon/libxkbcommon/commit/917636b1d0d70205a13f89062b95e3a0fc31d4ff | xkbcomp: fix crash when parsing an xkb_geometry section
xkb_geometry sections are ignored; previously the had done so by
returning NULL for the section's XkbFile, however some sections of the
code do not expect this. Instead, create an XkbFile for it, it will
never be processes and discarded later.
Caught with the af... | 1 | CompileKeymap(XkbFile *file, struct xkb_keymap *keymap, enum merge_mode merge)
{
bool ok;
XkbFile *files[LAST_KEYMAP_FILE_TYPE + 1] = { NULL };
enum xkb_file_type type;
struct xkb_context *ctx = keymap->ctx;
/* Collect section files and check for duplicates. */
for (file = (XkbFile *) file->def... | 188,930,561,233,461,670,000,000,000,000,000,000,000 | keymap.c | 77,713,275,270,082,730,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2018-15855 | Unchecked NULL pointer usage in xkbcommon before 0.8.1 could be used by local attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying a crafted keymap file, because the XkbFile for an xkb_geometry section was mishandled. | https://nvd.nist.gov/vuln/detail/CVE-2018-15855 |
3,603 | libxkbcommon | 1f9d1248c07cda8aaff762429c0dce146de8632a | https://github.com/xkbcommon/libxkbcommon | https://github.com/xkbcommon/libxkbcommon/commit/1f9d1248c07cda8aaff762429c0dce146de8632a | xkbcomp: fix stack overflow when evaluating boolean negation
The expression evaluator would go into an infinite recursion when
evaluating something like this as a boolean: `!True`. Instead of
recursing to just `True` and negating, it recursed to `!True` itself
again.
Bug inherited from xkbcomp.
Caught with the afl f... | 1 | ExprResolveBoolean(struct xkb_context *ctx, const ExprDef *expr,
bool *set_rtrn)
{
bool ok = false;
const char *ident;
switch (expr->expr.op) {
case EXPR_VALUE:
if (expr->expr.value_type != EXPR_TYPE_BOOLEAN) {
log_err(ctx,
"Found constant of t... | 335,781,184,501,352,730,000,000,000,000,000,000,000 | expr.c | 229,868,570,928,468,760,000,000,000,000,000,000,000 | [
"CWE-400"
] | CVE-2018-15853 | Endless recursion exists in xkbcomp/expr.c in xkbcommon and libxkbcommon before 0.8.1, which could be used by local attackers to crash xkbcommon users by supplying a crafted keymap file that triggers boolean negation. | https://nvd.nist.gov/vuln/detail/CVE-2018-15853 |
3,604 | Openswan | 9eaa6c2a823c1d2b58913506a15f9474bf857a3d | https://github.com/xelerance/Openswan | https://github.com/xelerance/Openswan/commit/9eaa6c2a823c1d2b58913506a15f9474bf857a3d | wo#7449 . verify padding contents for IKEv2 RSA sig check
Special thanks to Sze Yiu Chau of Purdue University (schau@purdue.edu)
who reported the issue. | 1 | err_t verify_signed_hash(const struct RSA_public_key *k
, u_char *s, unsigned int s_max_octets
, u_char **psig
, size_t hash_len
, const u_char *sig_val, size_t sig_len)
{
unsigned int padlen;
/* actual exponent... | 27,311,431,029,886,654,000,000,000,000,000,000,000 | signatures.c | 134,374,594,679,708,330,000,000,000,000,000,000,000 | [
"CWE-347"
] | CVE-2018-15836 | In verify_signed_hash() in lib/liboswkeys/signatures.c in Openswan before 2.6.50.1, the RSA implementation does not verify the value of padding string during PKCS#1 v1.5 signature verification. Consequently, a remote attacker can forge signatures when small public exponents are being used. IKEv2 signature verification ... | https://nvd.nist.gov/vuln/detail/CVE-2018-15836 |
3,607 | linux | fdf82a7856b32d905c39afc85e34364491e46346 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/fdf82a7856b32d905c39afc85e34364491e46346 | x86/speculation: Protect against userspace-userspace spectreRSB
The article "Spectre Returns! Speculation Attacks using the Return Stack
Buffer" [1] describes two new (sub-)variants of spectrev2-like attacks,
making use solely of the RSB contents even on CPUs that don't fallback to
BTB on RSB underflow (Skylake+).
... | 1 | static void __init spectre_v2_select_mitigation(void)
{
enum spectre_v2_mitigation_cmd cmd = spectre_v2_parse_cmdline();
enum spectre_v2_mitigation mode = SPECTRE_V2_NONE;
/*
* If the CPU is not affected and the command line mode is NONE or AUTO
* then nothing to do.
*/
if (!boot_cpu_has_bug(X86_BUG_SPECT... | 315,846,410,972,680,360,000,000,000,000,000,000,000 | bugs.c | 84,576,212,440,621,210,000,000,000,000,000,000,000 | [
"CWE-362"
] | CVE-2018-15572 | The spectre_v2_select_mitigation function in arch/x86/kernel/cpu/bugs.c in the Linux kernel before 4.18.1 does not always fill RSB upon a context switch, which makes it easier for attackers to conduct userspace-userspace spectreRSB attacks. | https://nvd.nist.gov/vuln/detail/CVE-2018-15572 |
3,608 | libgit2 | 1f9a8510e1d2f20ed7334eeeddb92c4dd8e7c649 | https://github.com/libgit2/libgit2 | https://github.com/libgit2/libgit2/commit/1f9a8510e1d2f20ed7334eeeddb92c4dd8e7c649 | smart_pkt: fix potential OOB-read when processing ng packet
OSS-fuzz has reported a potential out-of-bounds read when processing a
"ng" smart packet:
==1==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6310000249c0 at pc 0x000000493a92 bp 0x7ffddc882cd0 sp 0x7ffddc882480
READ of size 65529 at 0x631000024... | 1 | static int ng_pkt(git_pkt **out, const char *line, size_t len)
{
git_pkt_ng *pkt;
const char *ptr;
size_t alloclen;
pkt = git__malloc(sizeof(*pkt));
GITERR_CHECK_ALLOC(pkt);
pkt->ref = NULL;
pkt->type = GIT_PKT_NG;
line += 3; /* skip "ng " */
if (!(ptr = strchr(line, ' ')))
goto out_err;
len = ptr ... | 104,719,273,059,594,510,000,000,000,000,000,000,000 | smart_pkt.c | 110,262,442,168,514,210,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-15501 | In ng_pkt in transports/smart_pkt.c in libgit2 before 0.26.6 and 0.27.x before 0.27.4, a remote attacker can send a crafted smart-protocol "ng" packet that lacks a '\0' byte to trigger an out-of-bounds read that leads to DoS. | https://nvd.nist.gov/vuln/detail/CVE-2018-15501 |
3,609 | src | 779974d35b4859c07bc3cb8a12c74b43b0a7d1e0 | https://github.com/openbsd/src | https://github.com/openbsd/src/commit/779974d35b4859c07bc3cb8a12c74b43b0a7d1e0 | delay bailout for invalid authenticating user until after the packet
containing the request has been fully parsed. Reported by Dariusz Tytko
and Michał Sajdak; ok deraadt | 1 | userauth_hostbased(struct ssh *ssh)
{
Authctxt *authctxt = ssh->authctxt;
struct sshbuf *b;
struct sshkey *key = NULL;
char *pkalg, *cuser, *chost;
u_char *pkblob, *sig;
size_t alen, blen, slen;
int r, pktype, authenticated = 0;
if (!authctxt->valid) {
debug2("%s: disabled because of invalid user", __func... | 163,718,903,000,687,200,000,000,000,000,000,000,000 | auth2-hostbased.c | 94,121,909,882,891,920,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2018-15473 | OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-15473 |
3,610 | src | 779974d35b4859c07bc3cb8a12c74b43b0a7d1e0 | https://github.com/openbsd/src | https://github.com/openbsd/src/commit/779974d35b4859c07bc3cb8a12c74b43b0a7d1e0 | delay bailout for invalid authenticating user until after the packet
containing the request has been fully parsed. Reported by Dariusz Tytko
and Michał Sajdak; ok deraadt | 1 | userauth_pubkey(struct ssh *ssh)
{
Authctxt *authctxt = ssh->authctxt;
struct passwd *pw = authctxt->pw;
struct sshbuf *b;
struct sshkey *key = NULL;
char *pkalg, *userstyle = NULL, *key_s = NULL, *ca_s = NULL;
u_char *pkblob, *sig, have_sig;
size_t blen, slen;
int r, pktype;
int authenticated = 0;
st... | 267,521,840,593,734,700,000,000,000,000,000,000,000 | auth2-pubkey.c | 260,497,764,924,877,280,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2018-15473 | OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-15473 |
3,611 | php-src | f151e048ed27f6f4eef729f3310d053ab5da71d4 | https://github.com/php/php-src | https://github.com/php/php-src/commit/f151e048ed27f6f4eef729f3310d053ab5da71d4 | Fixed bug #76459 windows linkinfo lacks openbasedir check | 1 | PHP_FUNCTION(linkinfo)
{
char *link;
size_t link_len;
zend_stat_t sb;
int ret;
if (zend_parse_parameters(ZEND_NUM_ARGS(), "p", &link, &link_len) == FAILURE) {
return;
}
ret = VCWD_STAT(link, &sb);
if (ret == -1) {
php_error_docref(NULL, E_WARNING, "%s", strerror(errno));
RETURN_LONG(Z_L(-1)... | 81,678,671,678,671,030,000,000,000,000,000,000,000 | link_win32.c | 7,661,815,426,260,158,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2018-15132 | An issue was discovered in ext/standard/link_win32.c in PHP before 5.6.37, 7.0.x before 7.0.31, 7.1.x before 7.1.20, and 7.2.x before 7.2.8. The linkinfo function on Windows doesn't implement the open_basedir check. This could be abused to find files on paths outside of the allowed directories. | https://nvd.nist.gov/vuln/detail/CVE-2018-15132 |
3,612 | pango | 71aaeaf020340412b8d012fe23a556c0420eda5f | http://github.com/bratsche/pango | https://github.com/GNOME/pango/commit/71aaeaf020340412b8d012fe23a556c0420eda5f | Prevent an assertion with invalid Unicode sequences
Invalid Unicode sequences, such as 0x2665 0xfe0e 0xfe0f,
can trick the Emoji iter code into returning an empty
segment, which then triggers an assertion in the itemizer.
Prevent this by ensuring that we make progress.
This issue was reported by Jeffrey M. | 1 | _pango_emoji_iter_next (PangoEmojiIter *iter)
{
PangoEmojiType current_emoji_type = PANGO_EMOJI_TYPE_INVALID;
if (iter->end == iter->text_end)
return FALSE;
iter->start = iter->end;
for (; iter->end < iter->text_end; iter->end = g_utf8_next_char (iter->end))
{
gunichar ch = g_utf8_get_char (ite... | 267,323,365,278,579,830,000,000,000,000,000,000,000 | pango-emoji.c | 204,716,741,270,840,960,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-15120 | libpango in Pango 1.40.8 through 1.42.3, as used in hexchat and other products, allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted text with invalid Unicode sequences. | https://nvd.nist.gov/vuln/detail/CVE-2018-15120 |
3,614 | libmspack | 0b0ef9344255ff5acfac6b7af09198ac9c9756c8 | https://github.com/kyz/libmspack | https://github.com/kyz/libmspack/commit/0b0ef9344255ff5acfac6b7af09198ac9c9756c8 | kwaj_read_headers(): fix handling of non-terminated strings | 1 | static int kwajd_read_headers(struct mspack_system *sys,
struct mspack_file *fh,
struct mskwajd_header *hdr)
{
unsigned char buf[16];
int i;
/* read in the header */
if (sys->read(fh, &buf[0], kwajh_SIZEOF) != kwajh_SIZEOF) {
return MSPACK_ERR_READ;
}
/* check for "KWAJ" sig... | 276,727,971,155,017,370,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2018-14681 | An issue was discovered in kwajd_read_headers in mspack/kwajd.c in libmspack before 0.7alpha. Bad KWAJ file header extensions could cause a one or two byte overwrite. | https://nvd.nist.gov/vuln/detail/CVE-2018-14681 |
3,620 | FFmpeg | fa19fbcf712a6a6cc5a5cfdc3254a97b9bce6582 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/fa19fbcf712a6a6cc5a5cfdc3254a97b9bce6582 | avformat/movenc: Write version 2 of audio atom if channels is not known
The version 1 needs the channel count and would divide by 0
Fixes: division by 0
Fixes: fpe_movenc.c_1108_1.ogg
Fixes: fpe_movenc.c_1108_2.ogg
Fixes: fpe_movenc.c_1108_3.wav
Found-by: #CHEN HONGXU# <HCHEN017@e.ntu.edu.sg>
Signed-off-by: Michael N... | 1 | static int mov_write_audio_tag(AVFormatContext *s, AVIOContext *pb, MOVMuxContext *mov, MOVTrack *track)
{
int64_t pos = avio_tell(pb);
int version = 0;
uint32_t tag = track->tag;
if (track->mode == MODE_MOV) {
if (track->timescale > UINT16_MAX) {
if (mov_get_lpcm_flags(track->p... | 170,281,166,197,927,180,000,000,000,000,000,000,000 | movenc.c | 225,582,288,725,160,770,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2018-14395 | libavformat/movenc.c in FFmpeg 3.2 and 4.0.2 allows attackers to cause a denial of service (application crash caused by a divide-by-zero error) with a user crafted audio file when converting to the MOV audio format. | https://nvd.nist.gov/vuln/detail/CVE-2018-14395 |
3,621 | FFmpeg | 3a2d21bc5f97aa0161db3ae731fc2732be6108b8 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/3a2d21bc5f97aa0161db3ae731fc2732be6108b8 | avformat/movenc: Check input sample count
Fixes: division by 0
Fixes: fpe_movenc.c_199_1.wav
Fixes: fpe_movenc.c_199_2.wav
Fixes: fpe_movenc.c_199_3.wav
Fixes: fpe_movenc.c_199_4.wav
Fixes: fpe_movenc.c_199_5.wav
Fixes: fpe_movenc.c_199_6.wav
Fixes: fpe_movenc.c_199_7.wav
Found-by: #CHEN HONGXU# <HCHEN017@e.ntu.edu.s... | 1 | int ff_mov_write_packet(AVFormatContext *s, AVPacket *pkt)
{
MOVMuxContext *mov = s->priv_data;
AVIOContext *pb = s->pb;
MOVTrack *trk = &mov->tracks[pkt->stream_index];
AVCodecParameters *par = trk->par;
unsigned int samples_in_chunk = 0;
int size = pkt->size, ret = 0;
uint8_t *reformatted_... | 329,834,679,352,203,600,000,000,000,000,000,000,000 | movenc.c | 225,582,288,725,160,770,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2018-14394 | libavformat/movenc.c in FFmpeg before 4.0.2 allows attackers to cause a denial of service (application crash caused by a divide-by-zero error) with a user crafted Waveform audio file. | https://nvd.nist.gov/vuln/detail/CVE-2018-14394 |
3,622 | neomutt | 9bfab35522301794483f8f9ed60820bdec9be59e | https://github.com/neomutt/neomutt | https://github.com/neomutt/neomutt/commit/9bfab35522301794483f8f9ed60820bdec9be59e | sanitise cache paths
Co-authored-by: JerikoOne <jeriko.one@gmx.us> | 1 | static int nntp_hcache_namer(const char *path, char *dest, size_t destlen)
{
return snprintf(dest, destlen, "%s.hcache", path);
}
| 226,490,900,771,100,700,000,000,000,000,000,000,000 | newsrc.c | 212,530,194,709,979,250,000,000,000,000,000,000,000 | [
"CWE-22"
] | CVE-2018-14363 | An issue was discovered in NeoMutt before 2018-07-16. newsrc.c does not properly restrict '/' characters that may have unsafe interaction with cache pathnames. | https://nvd.nist.gov/vuln/detail/CVE-2018-14363 |
3,626 | neomutt | 6296f7153f0c9d5e5cd3aaf08f9731e56621bdd3 | https://github.com/neomutt/neomutt | https://github.com/neomutt/neomutt/commit/6296f7153f0c9d5e5cd3aaf08f9731e56621bdd3 | Set length modifiers for group and desc
nntp_add_group parses a line controlled by the connected nntp server.
Restrict the maximum lengths read into the stack buffers group, and
desc. | 1 | int nntp_add_group(char *line, void *data)
{
struct NntpServer *nserv = data;
struct NntpData *nntp_data = NULL;
char group[LONG_STRING];
char desc[HUGE_STRING] = "";
char mod;
anum_t first, last;
if (!nserv || !line)
return 0;
if (sscanf(line, "%s " ANUM " " ANUM " %c %[^\n]", group, &l... | 119,568,824,275,084,950,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2018-14360 | An issue was discovered in NeoMutt before 2018-07-16. nntp_add_group in newsrc.c has a stack-based buffer overflow because of incorrect sscanf usage. | https://nvd.nist.gov/vuln/detail/CVE-2018-14360 |
3,633 | neomutt | 1b0f0d0988e6df4e32e9f4bf8780846ea95d4485 | https://github.com/neomutt/neomutt | https://github.com/neomutt/neomutt/commit/1b0f0d0988e6df4e32e9f4bf8780846ea95d4485 | Don't overflow stack buffer in msg_parse_fetch | 1 | static int msg_parse_fetch(struct ImapHeader *h, char *s)
{
char tmp[SHORT_STRING];
char *ptmp = NULL;
if (!s)
return -1;
while (*s)
{
SKIPWS(s);
if (mutt_str_strncasecmp("FLAGS", s, 5) == 0)
{
s = msg_parse_flags(h, s);
if (!s)
return -1;
}
else if (mutt_str_str... | 8,085,076,253,557,074,000,000,000,000,000,000,000 | message.c | 194,626,342,975,920,640,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-14350 | An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/message.c has a stack-based buffer overflow for a FETCH response with a long INTERNALDATE field. | https://nvd.nist.gov/vuln/detail/CVE-2018-14350 |
3,637 | neomutt | 93b8ac558752d09e1c56d4f1bc82631316fa9c82 | https://github.com/neomutt/neomutt | https://github.com/neomutt/neomutt/commit/93b8ac558752d09e1c56d4f1bc82631316fa9c82 | Ensure UID in fetch_uidl | 1 | static int fetch_uidl(char *line, void *data)
{
int i, index;
struct Context *ctx = (struct Context *) data;
struct PopData *pop_data = (struct PopData *) ctx->data;
char *endp = NULL;
errno = 0;
index = strtol(line, &endp, 10);
if (errno)
return -1;
while (*endp == ' ')
endp++;
memmove(lin... | 91,378,846,021,011,030,000,000,000,000,000,000,000 | pop.c | 75,915,389,016,422,660,000,000,000,000,000,000,000 | [
"CWE-824"
] | CVE-2018-14356 | An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. pop.c mishandles a zero-length UID. | https://nvd.nist.gov/vuln/detail/CVE-2018-14356 |
3,638 | neomutt | 95e80bf9ff10f68cb6443f760b85df4117cb15eb | https://github.com/neomutt/neomutt | https://github.com/neomutt/neomutt/commit/95e80bf9ff10f68cb6443f760b85df4117cb15eb | Quote path in imap_subscribe | 1 | int imap_subscribe(char *path, bool subscribe)
{
struct ImapData *idata = NULL;
char buf[LONG_STRING];
char mbox[LONG_STRING];
char errstr[STRING];
struct Buffer err, token;
struct ImapMbox mx;
if (!mx_is_imap(path) || imap_parse_path(path, &mx) || !mx.mbox)
{
mutt_error(_("Bad mailbox name")... | 336,804,774,773,163,760,000,000,000,000,000,000,000 | imap.c | 118,871,774,482,714,800,000,000,000,000,000,000,000 | [
"CWE-77"
] | CVE-2018-14354 | An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. They allow remote IMAP servers to execute arbitrary commands via backquote characters, related to the mailboxes command associated with a manual subscription or unsubscription. | https://nvd.nist.gov/vuln/detail/CVE-2018-14354 |
3,639 | neomutt | 3c49c44be9b459d9c616bcaef6eb5d51298c1741 | https://github.com/neomutt/neomutt | https://github.com/neomutt/neomutt/commit/3c49c44be9b459d9c616bcaef6eb5d51298c1741 | Ensure litlen isn't larger than our mailbox | 1 | static void cmd_parse_status(struct ImapData *idata, char *s)
{
char *value = NULL;
struct Buffy *inc = NULL;
struct ImapMbox mx;
struct ImapStatus *status = NULL;
unsigned int olduv, oldun;
unsigned int litlen;
short new = 0;
short new_msg_count = 0;
char *mailbox = imap_next_word(s);
/* We need ... | 255,835,415,023,365,760,000,000,000,000,000,000,000 | command.c | 171,255,987,523,769,300,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2018-14351 | An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/command.c mishandles a long IMAP status mailbox literal count size. | https://nvd.nist.gov/vuln/detail/CVE-2018-14351 |
3,640 | neomutt | 36a29280448097f34ce9c94606195f2ac643fed1 | https://github.com/neomutt/neomutt | https://github.com/neomutt/neomutt/commit/36a29280448097f34ce9c94606195f2ac643fed1 | Handle NO response without message properly | 1 | static int cmd_handle_untagged(struct ImapData *idata)
{
unsigned int count = 0;
char *s = imap_next_word(idata->buf);
char *pn = imap_next_word(s);
if ((idata->state >= IMAP_SELECTED) && isdigit((unsigned char) *s))
{
pn = s;
s = imap_next_word(s);
/* EXISTS and EXPUNGE are always related to th... | 183,539,949,140,153,240,000,000,000,000,000,000,000 | command.c | 212,780,463,296,082,520,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2018-14349 | An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/command.c mishandles a NO response without a message. | https://nvd.nist.gov/vuln/detail/CVE-2018-14349 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.