idx
int64
project
string
commit_id
string
project_url
string
commit_url
string
commit_message
string
target
int64
func
string
func_hash
float64
file_name
string
file_hash
float64
cwe
list
cve
string
cve_desc
string
nvd_url
string
3,861
linux
5af10dfd0afc559bb4b0f7e3e8227a1578333995
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/5af10dfd0afc559bb4b0f7e3e8227a1578333995
userfaultfd: hugetlbfs: remove superfluous page unlock in VM_SHARED case huge_add_to_page_cache->add_to_page_cache implicitly unlocks the page before returning in case of errors. The error returned was -EEXIST by running UFFDIO_COPY on a non-hole offset of a VM_SHARED hugetlbfs mapping. It was an userland bug that t...
1
int hugetlb_mcopy_atomic_pte(struct mm_struct *dst_mm, pte_t *dst_pte, struct vm_area_struct *dst_vma, unsigned long dst_addr, unsigned long src_addr, struct page **pagep) { int vm_shared = dst_vma->vm_flags & VM_SHARED; struct hstate *h = hstate_vma(dst_vma); pte_t _dst_pte; spin...
78,099,884,844,578,590,000,000,000,000,000,000,000
hugetlb.c
337,464,151,745,402,500,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2017-15127
A flaw was found in the hugetlb_mcopy_atomic_pte function in mm/hugetlb.c in the Linux kernel before 4.13. A superfluous implicit page unlock for VM_SHARED hugetlbfs mapping could trigger a local denial of service (BUG).
https://nvd.nist.gov/vuln/detail/CVE-2017-15127
3,865
knc
f237f3e09ecbaf59c897f5046538a7b1a3fa40c1
https://github.com/elric1/knc
https://github.com/elric1/knc/commit/f237f3e09ecbaf59c897f5046538a7b1a3fa40c1
knc: fix a couple of memory leaks. One of these can be remotely triggered during the authentication phase which leads to a remote DoS possibility. Pointed out by: Imre Rad <radimre83@gmail.com>
1
read_packet(int fd, gss_buffer_t buf, int timeout, int first) { int ret; static uint32_t len = 0; static char len_buf[4]; static int len_buf_pos = 0; static char * tmpbuf = 0; static int tmpbuf_pos = 0; if (first) { len_buf_pos = 0; return -2; } if (len_buf_pos < 4) { ret = timed_read(fd, &len_...
224,824,590,746,883,080,000,000,000,000,000,000,000
gssstdio.c
8,886,790,502,415,457,000,000,000,000,000,000,000
[ "CWE-400" ]
CVE-2017-9732
The read_packet function in knc (Kerberised NetCat) before 1.11-1 is vulnerable to denial of service (memory exhaustion) that can be exploited remotely without authentication, possibly affecting another services running on the targeted host.
https://nvd.nist.gov/vuln/detail/CVE-2017-9732
3,866
util-linux
dffab154d29a288aa171ff50263ecc8f2e14a891
https://github.com/karelzak/util-linux
https://github.com/karelzak/util-linux/commit/dffab154d29a288aa171ff50263ecc8f2e14a891
su: properly clear child PID Reported-by: Tobias Stöckmann <tobias@stoeckmann.org> Signed-off-by: Karel Zak <kzak@redhat.com>
1
create_watching_parent (void) { pid_t child; sigset_t ourset; struct sigaction oldact[3]; int status = 0; int retval; retval = pam_open_session (pamh, 0); if (is_pam_failure(retval)) { cleanup_pam (retval); errx (EXIT_FAILURE, _("cannot open session: %s"), pam_strerror (pamh, retval...
132,373,565,874,554,270,000,000,000,000,000,000,000
su-common.c
260,033,572,435,501,420,000,000,000,000,000,000,000
[ "CWE-362" ]
CVE-2017-2616
A race condition was found in util-linux before 2.32.1 in the way su handled the management of child processes. A local authenticated attacker could use this flaw to kill other processes with root privileges under specific conditions.
https://nvd.nist.gov/vuln/detail/CVE-2017-2616
3,877
pacemaker
5d71e65049
https://github.com/ClusterLabs/pacemaker
https://github.com/ClusterLabs/pacemaker/commit/5d71e65049
High: libcrmcommon: fix CVE-2016-7035 (improper IPC guarding) It was discovered that at some not so uncommon circumstances, some pacemaker daemons could be talked to, via libqb-facilitated IPC, by unprivileged clients due to flawed authorization decision. Depending on the capabilities of affected daemons, this might ...
1
crm_client_new(qb_ipcs_connection_t * c, uid_t uid_client, gid_t gid_client) { static uid_t uid_server = 0; static gid_t gid_cluster = 0; crm_client_t *client = NULL; CRM_LOG_ASSERT(c); if (c == NULL) { return NULL; } if (gid_cluster == 0) { uid_server = getuid(); ...
332,194,409,869,094,700,000,000,000,000,000,000,000
ipc.c
236,018,087,578,267,460,000,000,000,000,000,000,000
[ "CWE-285" ]
CVE-2016-7035
An authorization flaw was found in Pacemaker before 1.1.16, where it did not properly guard its IPC interface. An attacker with an unprivileged account on a Pacemaker node could use this flaw to, for example, force the Local Resource Manager daemon to execute a script as root and thereby gain root access on the machine...
https://nvd.nist.gov/vuln/detail/CVE-2016-7035
3,878
libtiff
391e77fcd217e78b2c51342ac3ddb7100ecacdd2
https://github.com/vadz/libtiff
https://github.com/vadz/libtiff/commit/391e77fcd217e78b2c51342ac3ddb7100ecacdd2
* libtiff/tif_pixarlog.c: fix potential buffer write overrun in PixarLogDecode() on corrupted/unexpected images (reported by Mathias Svensson)
1
PixarLogDecode(TIFF* tif, uint8* op, tmsize_t occ, uint16 s) { static const char module[] = "PixarLogDecode"; TIFFDirectory *td = &tif->tif_dir; PixarLogState* sp = DecoderState(tif); tmsize_t i; tmsize_t nsamples; int llen; uint16 *up; switch (sp->user_datafmt) { case PIXARLOGDATAFMT_FLOAT: nsamples = occ ...
310,103,018,809,032,760,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2016-5314
Buffer overflow in the PixarLogDecode function in tif_pixarlog.c in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted TIFF image, as demonstrated by overwriting the vgetparent function pointer with rgb2ycbcr.
https://nvd.nist.gov/vuln/detail/CVE-2016-5314
3,885
linux
0048b4837affd153897ed1222283492070027aa9
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/0048b4837affd153897ed1222283492070027aa9
blk-mq: fix race between timeout and freeing request Inside timeout handler, blk_mq_tag_to_rq() is called to retrieve the request from one tag. This way is obviously wrong because the request can be freed any time and some fiedds of the request can't be trusted, then kernel oops might be triggered[1]. Currently wrt. ...
1
struct request *blk_mq_tag_to_rq(struct blk_mq_tags *tags, unsigned int tag) { struct request *rq = tags->rqs[tag]; /* mq_ctx of flush rq is always cloned from the corresponding req */ struct blk_flush_queue *fq = blk_get_flush_queue(rq->q, rq->mq_ctx); if (!is_flush_request(rq, fq, tag)) return rq; return fq-...
304,211,763,979,747,550,000,000,000,000,000,000,000
blk-mq.c
11,469,473,194,685,080,000,000,000,000,000,000,000
[ "CWE-362" ]
CVE-2015-9016
In blk_mq_tag_to_rq in blk-mq.c in the upstream kernel, there is a possible use after free due to a race condition when a request has been previously freed by blk_mq_complete_request. This could lead to local escalation of privilege. Product: Android. Versions: Android kernel. Android ID: A-63083046.
https://nvd.nist.gov/vuln/detail/CVE-2015-9016
3,887
libtiff
3c5eb8b1be544e41d2c336191bc4936300ad7543
https://github.com/vadz/libtiff
https://github.com/vadz/libtiff/commit/3c5eb8b1be544e41d2c336191bc4936300ad7543
* libtiff/tif_{unix,vms,win32}.c (_TIFFmalloc): ANSI C does not require malloc() to return NULL pointer if requested allocation size is zero. Assure that _TIFFmalloc does.
1
_TIFFmalloc(tmsize_t s) { return (malloc((size_t) s)); }
51,150,050,486,560,425,000,000,000,000,000,000,000
None
null
[ "CWE-369" ]
CVE-2014-8130
The _TIFFmalloc function in tif_unix.c in LibTIFF 4.0.3 does not reject a zero size, which allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted TIFF image that is mishandled by the TIFFWriteScanline function in tif_write.c, as demonstrated by tiffdither.
https://nvd.nist.gov/vuln/detail/CVE-2014-8130
3,888
libtiff
3c5eb8b1be544e41d2c336191bc4936300ad7543
https://github.com/vadz/libtiff
https://github.com/vadz/libtiff/commit/3c5eb8b1be544e41d2c336191bc4936300ad7543
* libtiff/tif_{unix,vms,win32}.c (_TIFFmalloc): ANSI C does not require malloc() to return NULL pointer if requested allocation size is zero. Assure that _TIFFmalloc does.
1
_TIFFmalloc(tsize_t s) { return (malloc((size_t) s)); }
163,740,521,083,677,580,000,000,000,000,000,000,000
None
null
[ "CWE-369" ]
CVE-2014-8130
The _TIFFmalloc function in tif_unix.c in LibTIFF 4.0.3 does not reject a zero size, which allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted TIFF image that is mishandled by the TIFFWriteScanline function in tif_write.c, as demonstrated by tiffdither.
https://nvd.nist.gov/vuln/detail/CVE-2014-8130
3,889
libmspack
2f084136cfe0d05e5bf5703f3e83c6d955234b4d
https://github.com/kyz/libmspack
https://github.com/kyz/libmspack/commit/2f084136cfe0d05e5bf5703f3e83c6d955234b4d
length checks when looking for control files
1
static int chmd_read_headers(struct mspack_system *sys, struct mspack_file *fh, struct mschmd_header *chm, int entire) { unsigned int section, name_len, x, errors, num_chunks; unsigned char buf[0x54], *chunk = NULL, *name, *p, *end; struct mschmd_file *fi, *link = NULL; off_t offset...
20,608,871,291,788,966,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2019-1010305
libmspack 0.9.1alpha is affected by: Buffer Overflow. The impact is: Information Disclosure. The component is: function chmd_read_headers() in libmspack(file libmspack/mspack/chmd.c). The attack vector is: the victim must open a specially crafted chm file. The fixed version is: after commit 2f084136cfe0d05e5bf5703f3e83...
https://nvd.nist.gov/vuln/detail/CVE-2019-1010305
3,890
cJSON
be749d7efa7c9021da746e685bd6dec79f9dd99b
https://github.com/DaveGamble/cJSON
https://github.com/DaveGamble/cJSON/commit/be749d7efa7c9021da746e685bd6dec79f9dd99b
Fix crash of cJSON_GetObjectItemCaseSensitive when calling it on arrays
1
static cJSON *get_object_item(const cJSON * const object, const char * const name, const cJSON_bool case_sensitive) { cJSON *current_element = NULL; if ((object == NULL) || (name == NULL)) { return NULL; } current_element = object->child; if (case_sensitive) { while ((cu...
140,993,672,709,749,150,000,000,000,000,000,000,000
None
null
[ "CWE-754" ]
CVE-2019-1010239
DaveGamble/cJSON cJSON 1.7.8 is affected by: Improper Check for Unusual or Exceptional Conditions. The impact is: Null dereference, so attack can cause denial of service. The component is: cJSON_GetObjectItemCaseSensitive() function. The attack vector is: crafted json file. The fixed version is: 1.7.9 and later.
https://nvd.nist.gov/vuln/detail/CVE-2019-1010239
3,891
VeraCrypt
f30f9339c9a0b9bbcc6f5ad38804af39db1f479e
https://github.com/veracrypt/VeraCrypt
https://github.com/veracrypt/VeraCrypt/commit/f30f9339c9a0b9bbcc6f5ad38804af39db1f479e
Windows: fix low severity vulnerability in driver that allowed reading 3 bytes of kernel stack memory (with a rare possibility of 25 additional bytes). Reported by Tim Harrison.
1
NTSTATUS ProcessMainDeviceControlIrp (PDEVICE_OBJECT DeviceObject, PEXTENSION Extension, PIRP Irp) { PIO_STACK_LOCATION irpSp = IoGetCurrentIrpStackLocation (Irp); NTSTATUS ntStatus; switch (irpSp->Parameters.DeviceIoControl.IoControlCode) { case TC_IOCTL_GET_DRIVER_VERSION: case TC_IOCTL_LEGACY_GET_DRIVER_VERSI...
102,220,743,591,744,230,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2019-1010208
IDRIX, Truecrypt Veracrypt, Truecrypt Prior to 1.23-Hotfix-1 (Veracrypt), all versions (Truecrypt) is affected by: Buffer Overflow. The impact is: Minor information disclosure of kernel stack. The component is: Veracrypt NT Driver (veracrypt.sys). The attack vector is: Locally executed code, IOCTL request to driver. Th...
https://nvd.nist.gov/vuln/detail/CVE-2019-1010208
3,892
libarchive
8312eaa576014cd9b965012af51bc1f967b12423
https://github.com/libarchive/libarchive
https://github.com/libarchive/libarchive/commit/8312eaa576014cd9b965012af51bc1f967b12423
iso9660: Fail when expected Rockridge extensions is missing A corrupted or malicious ISO9660 image can cause read_CE() to loop forever. read_CE() calls parse_rockridge(), expecting a Rockridge extension to be read. However, parse_rockridge() is structured as a while loop starting with a sanity check, and if the sanit...
1
parse_rockridge(struct archive_read *a, struct file_info *file, const unsigned char *p, const unsigned char *end) { struct iso9660 *iso9660; iso9660 = (struct iso9660 *)(a->format->data); while (p + 4 <= end /* Enough space for another entry. */ && p[0] >= 'A' && p[0] <= 'Z' /* Sanity-check 1st cha...
54,247,877,453,009,570,000,000,000,000,000,000,000
archive_read_support_format_iso9660.c
163,147,012,537,271,200,000,000,000,000,000,000,000
[ "CWE-400" ]
CVE-2019-1000020
libarchive version commit 5a98dcf8a86364b3c2c469c85b93647dfb139961 onwards (version v2.8.0 onwards) contains a CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') vulnerability in ISO9660 parser, archive_read_support_format_iso9660.c, read_CE()/parse_rockridge() that can result in DoS by infinite loop. This...
https://nvd.nist.gov/vuln/detail/CVE-2019-1000020
3,893
libarchive
65a23f5dbee4497064e9bb467f81138a62b0dae1
https://github.com/libarchive/libarchive
https://github.com/libarchive/libarchive/commit/65a23f5dbee4497064e9bb467f81138a62b0dae1
7zip: fix crash when parsing certain archives Fuzzing with CRCs disabled revealed that a call to get_uncompressed_data() would sometimes fail to return at least 'minimum' bytes. This can cause the crc32() invocation in header_bytes to read off into invalid memory. A specially crafted archive can use this to cause a c...
1
get_uncompressed_data(struct archive_read *a, const void **buff, size_t size, size_t minimum) { struct _7zip *zip = (struct _7zip *)a->format->data; ssize_t bytes_avail; if (zip->codec == _7Z_COPY && zip->codec2 == (unsigned long)-1) { /* Copy mode. */ /* * Note: '1' here is a performance optimizatio...
172,034,182,329,715,270,000,000,000,000,000,000,000
archive_read_support_format_7zip.c
100,268,367,669,914,640,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-1000019
libarchive version commit bf9aec176c6748f0ee7a678c5f9f9555b9a757c1 onwards (release v3.0.2 onwards) contains a CWE-125: Out-of-bounds Read vulnerability in 7zip decompression, archive_read_support_format_7zip.c, header_bytes() that can result in a crash (denial of service). This attack appears to be exploitable via the...
https://nvd.nist.gov/vuln/detail/CVE-2019-1000019
3,894
ImageMagick
ecf7c6b288e11e7e7f75387c5e9e93e423b98397
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/ecf7c6b288e11e7e7f75387c5e9e93e423b98397
...
1
static MagickBooleanType TraceBezier(MVGInfo *mvg_info, const size_t number_coordinates) { double alpha, *coefficients, weight; PointInfo end, point, *points; PrimitiveInfo *primitive_info; register PrimitiveInfo *p; register ssize_t i, j; size_t control_po...
121,438,564,734,510,890,000,000,000,000,000,000,000
None
null
[ "CWE-416" ]
CVE-2019-17547
In ImageMagick before 7.0.8-62, TraceBezier in MagickCore/draw.c has a use-after-free.
https://nvd.nist.gov/vuln/detail/CVE-2019-17547
3,895
FFmpeg
02f909dc24b1f05cfbba75077c7707b905e63cd2
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/02f909dc24b1f05cfbba75077c7707b905e63cd2
avcodec/vqavideo: Set video size Fixes: out of array access Fixes: 15919/clusterfuzz-testcase-minimized-ffmpeg_AV_CODEC_ID_VQA_fuzzer-5657368257363968 Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/projects/ffmpeg Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
1
static av_cold int vqa_decode_init(AVCodecContext *avctx) { VqaContext *s = avctx->priv_data; int i, j, codebook_index, ret; s->avctx = avctx; avctx->pix_fmt = AV_PIX_FMT_PAL8; /* make sure the extradata made it */ if (s->avctx->extradata_size != VQA_HEADER_SIZE) { av_log(s->avctx, AV_...
316,842,430,652,442,060,000,000,000,000,000,000,000
vqavideo.c
113,080,214,120,645,070,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2019-17542
FFmpeg before 4.2 has a heap-based buffer overflow in vqa_decode_chunk because of an out-of-array access in vqa_decode_init in libavcodec/vqavideo.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-17542
3,903
FreeRDP
fc80ab45621bd966f70594c0b7393ec005a94007
https://github.com/FreeRDP/FreeRDP
https://github.com/akallabeth/FreeRDP/commit/fc80ab45621bd966f70594c0b7393ec005a94007
None
1
static unsigned HuffmanTree_makeFromFrequencies(HuffmanTree* tree, const unsigned* frequencies, size_t mincodes, size_t numcodes, unsigned maxbitlen) { unsigned error = 0; while(!frequencies[numcodes - 1] && numcodes > mincodes) numcodes--; /*trim zeroes*/ tre...
314,310,845,739,413,700,000,000,000,000,000,000,000
lodepng.c
327,269,748,731,790,220,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2019-17178
HuffmanTree_makeFromFrequencies in lodepng.c in LodePNG through 2019-09-28, as used in WinPR in FreeRDP and other products, has a memory leak because a supplied realloc pointer (i.e., the first argument to realloc) is also used for a realloc return value.
https://nvd.nist.gov/vuln/detail/CVE-2019-17178
3,904
linux
6caabe7f197d3466d238f70915d65301f1716626
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6caabe7f197d3466d238f70915d65301f1716626
net: hsr: fix memory leak in hsr_dev_finalize() If hsr_add_port(hsr, hsr_dev, HSR_PT_MASTER) failed to add port, it directly returns res and forgets to free the node that allocated in hsr_create_self_node(), and forgets to delete the node->mac_list linked in hsr->self_node_db. BUG: memory leak unreferenced object 0xf...
1
int hsr_dev_finalize(struct net_device *hsr_dev, struct net_device *slave[2], unsigned char multicast_spec, u8 protocol_version) { struct hsr_priv *hsr; struct hsr_port *port; int res; hsr = netdev_priv(hsr_dev); INIT_LIST_HEAD(&hsr->ports); INIT_LIST_HEAD(&hsr->node_db); INIT_LIST_HEAD(&hsr->self_node_d...
119,005,556,713,086,030,000,000,000,000,000,000,000
hsr_device.c
256,445,192,119,124,600,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2019-16995
In the Linux kernel before 5.0.3, a memory leak exits in hsr_dev_finalize() in net/hsr/hsr_device.c if hsr_add_port fails to add a port, which may cause denial of service, aka CID-6caabe7f197d.
https://nvd.nist.gov/vuln/detail/CVE-2019-16995
3,905
linux
07f12b26e21ab359261bf75cfcb424fdc7daeb6d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/07f12b26e21ab359261bf75cfcb424fdc7daeb6d
net: sit: fix memory leak in sit_init_net() If register_netdev() is failed to register sitn->fb_tunnel_dev, it will go to err_reg_dev and forget to free netdev(sitn->fb_tunnel_dev). BUG: memory leak unreferenced object 0xffff888378daad00 (size 512): comm "syz-executor.1", pid 4006, jiffies 4295121142 (age 16.115s) ...
1
static int __net_init sit_init_net(struct net *net) { struct sit_net *sitn = net_generic(net, sit_net_id); struct ip_tunnel *t; int err; sitn->tunnels[0] = sitn->tunnels_wc; sitn->tunnels[1] = sitn->tunnels_l; sitn->tunnels[2] = sitn->tunnels_r; sitn->tunnels[3] = sitn->tunnels_r_l; if (!net_has_fallback_tunn...
172,436,102,843,847,500,000,000,000,000,000,000,000
sit.c
116,232,482,481,814,840,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2019-16994
In the Linux kernel before 5.0, a memory leak exists in sit_init_net() in net/ipv6/sit.c when register_netdev() fails to register sitn->fb_tunnel_dev, which may cause denial of service, aka CID-07f12b26e21a.
https://nvd.nist.gov/vuln/detail/CVE-2019-16994
3,906
linux
df7e40425813c50cd252e6f5e348a81ef1acae56
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/df7e40425813c50cd252e6f5e348a81ef1acae56
RDMA/hns: Fix init resp when alloc ucontext The data in resp will be copied from kernel to userspace, thus it needs to be initialized to zeros to avoid copying uninited stack memory. Reported-by: Dan Carpenter <dan.carpenter@oracle.com> Fixes: e088a685eae9 ("RDMA/hns: Support rq record doorbell for the user space") S...
1
static struct ib_ucontext *hns_roce_alloc_ucontext(struct ib_device *ib_dev, struct ib_udata *udata) { int ret = 0; struct hns_roce_ucontext *context; struct hns_roce_ib_alloc_ucontext_resp resp; struct hns_roce_dev *hr_dev = to_hr_dev(ib_dev); resp.qp_tab_size = hr_dev->caps.num_qps; context = k...
64,634,537,219,115,920,000,000,000,000,000,000,000
hns_roce_main.c
321,078,437,330,342,170,000,000,000,000,000,000,000
[ "CWE-665" ]
CVE-2019-16921
In the Linux kernel before 4.17, hns_roce_alloc_ucontext in drivers/infiniband/hw/hns/hns_roce_main.c does not initialize the resp data structure, which might allow attackers to obtain sensitive information from kernel stack memory, aka CID-df7e40425813.
https://nvd.nist.gov/vuln/detail/CVE-2019-16921
3,912
linux
7d0a06586b2686ba80c4a2da5f91cb10ffbea736
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/7d0a06586b2686ba80c4a2da5f91cb10ffbea736
net/rds: Fix info leak in rds6_inc_info_copy() The rds6_inc_info_copy() function has a couple struct members which are leaking stack information. The ->tos field should hold actual information and the ->flags field needs to be zeroed out. Fixes: 3eb450367d08 ("rds: add type of service(tos) infrastructure") Fixes: b7...
1
void rds6_inc_info_copy(struct rds_incoming *inc, struct rds_info_iterator *iter, struct in6_addr *saddr, struct in6_addr *daddr, int flip) { struct rds6_info_message minfo6; minfo6.seq = be64_to_cpu(inc->i_hdr.h_sequence); minfo6.len = be32_to_cpu(inc->i_hdr.h_len); if (flip) { minfo6.laddr = *d...
4,978,163,243,173,314,000,000,000,000,000,000,000
recv.c
312,731,406,193,587,000,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2019-16714
In the Linux kernel before 5.2.14, rds6_inc_info_copy in net/rds/recv.c allows attackers to obtain sensitive information from kernel stack memory because tos and flags fields are not initialized.
https://nvd.nist.gov/vuln/detail/CVE-2019-16714
3,913
ngiflib
37d939a6f511d16d4c95678025c235fe62e6417a
https://github.com/miniupnp/ngiflib
https://github.com/miniupnp/ngiflib/commit/37d939a6f511d16d4c95678025c235fe62e6417a
fix deinterlacing for small pictures fixes #12
1
static void WritePixel(struct ngiflib_img * i, struct ngiflib_decode_context * context, u8 v) { struct ngiflib_gif * p = i->parent; if(v!=i->gce.transparent_color || !i->gce.transparent_flag) { #ifndef NGIFLIB_INDEXED_ONLY if(p->mode & NGIFLIB_MODE_INDEXED) { #endif /* NGIFLIB_INDEXED_ONLY */ *context->frbuff_p...
48,375,775,932,930,180,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2019-16347
ngiflib 0.4 has a heap-based buffer overflow in WritePixels() in ngiflib.c when called from DecodeGifImg, because deinterlacing for small pictures is mishandled.
https://nvd.nist.gov/vuln/detail/CVE-2019-16347
3,914
ngiflib
37d939a6f511d16d4c95678025c235fe62e6417a
https://github.com/miniupnp/ngiflib
https://github.com/miniupnp/ngiflib/commit/37d939a6f511d16d4c95678025c235fe62e6417a
fix deinterlacing for small pictures fixes #12
1
static void WritePixels(struct ngiflib_img * i, struct ngiflib_decode_context * context, const u8 * pixels, u16 n) { u16 tocopy; struct ngiflib_gif * p = i->parent; while(n > 0) { tocopy = (context->Xtogo < n) ? context->Xtogo : n; if(!i->gce.transparent_flag) { #ifndef NGIFLIB_INDEXED_ONLY if(p->mode & NGI...
121,149,780,617,115,000,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2019-16347
ngiflib 0.4 has a heap-based buffer overflow in WritePixels() in ngiflib.c when called from DecodeGifImg, because deinterlacing for small pictures is mishandled.
https://nvd.nist.gov/vuln/detail/CVE-2019-16347
3,915
pam_p11
d150b60e1e14c261b113f55681419ad1dfa8a76c
https://github.com/OpenSC/pam_p11
https://github.com/OpenSC/pam_p11/commit/d150b60e1e14c261b113f55681419ad1dfa8a76c
Use EVP_PKEY_size() to allocate correct size of signature buffer. (#18) Do not use fixed buffer size for signature, EVP_SignFinal() requires buffer for signature at least EVP_PKEY_size(pkey) bytes in size. Fixes crash when using 4K RSA signatures (https://github.com/OpenSC/pam_p11/issues/16, https://github.com/OpenS...
1
static int key_verify(pam_handle_t *pamh, int flags, PKCS11_KEY *authkey) { int ok = 0; unsigned char challenge[30]; unsigned char signature[256]; unsigned int siglen = sizeof signature; const EVP_MD *md = EVP_sha1(); EVP_MD_CTX *md_ctx = EVP_MD_CTX_new(); EVP_PKEY *privkey = PKCS11_get_private_key(authkey...
188,572,096,424,461,200,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2019-16058
An issue was discovered in the pam_p11 component 0.2.0 and 0.3.0 for OpenSC. If a smart card creates a signature with a length longer than 256 bytes, this triggers a buffer overflow. This may be the case for RSA keys with 4096 bits depending on the signature scheme.
https://nvd.nist.gov/vuln/detail/CVE-2019-16058
3,916
OpenSC
412a6142c27a5973c61ba540e33cdc22d5608e68
https://github.com/OpenSC/OpenSC
https://github.com/OpenSC/OpenSC/commit/412a6142c27a5973c61ba540e33cdc22d5608e68
fixed out of bounds access of ASN.1 Bitstring Credit to OSS-Fuzz
1
static int decode_bit_string(const u8 * inbuf, size_t inlen, void *outbuf, size_t outlen, int invert) { const u8 *in = inbuf; u8 *out = (u8 *) outbuf; int zero_bits = *in & 0x07; size_t octets_left = inlen - 1; int i, count = 0; memset(outbuf, 0, outlen); in++; if (outlen < octets_left) return...
35,056,032,605,146,490,000,000,000,000,000,000,000
asn1.c
327,585,171,356,570,960,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2019-15945
OpenSC before 0.20.0-rc1 has an out-of-bounds access of an ASN.1 Bitstring in decode_bit_string in libopensc/asn1.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-15945
3,917
linux
01ca667133d019edc9f0a1f70a272447c84ec41f
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/01ca667133d019edc9f0a1f70a272447c84ec41f
fm10k: Fix a potential NULL pointer dereference Syzkaller report this: kasan: GPF could be caused by NULL-ptr deref or user memory access general protection fault: 0000 [#1] SMP KASAN PTI CPU: 0 PID: 4378 Comm: syz-executor.0 Tainted: G C 5.0.0+ #5 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996),...
1
static int __init fm10k_init_module(void) { pr_info("%s - version %s\n", fm10k_driver_string, fm10k_driver_version); pr_info("%s\n", fm10k_copyright); /* create driver workqueue */ fm10k_workqueue = alloc_workqueue("%s", WQ_MEM_RECLAIM, 0, fm10k_driver_name); fm10k_dbg_init(); return fm10k_registe...
247,849,593,238,575,600,000,000,000,000,000,000,000
fm10k_main.c
95,898,875,623,914,100,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2019-15924
An issue was discovered in the Linux kernel before 5.0.11. fm10k_init_module in drivers/net/ethernet/intel/fm10k/fm10k_main.c has a NULL pointer dereference because there is no -ENOMEM upon an alloc_workqueue failure.
https://nvd.nist.gov/vuln/detail/CVE-2019-15924
3,924
linux
ceabee6c59943bdd5e1da1a6a20dc7ee5f8113a2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ceabee6c59943bdd5e1da1a6a20dc7ee5f8113a2
genetlink: Fix a memory leak on error path In genl_register_family(), when idr_alloc() fails, we forget to free the memory we possibly allocate for family->attrbuf. Reported-by: Hulk Robot <hulkci@huawei.com> Fixes: 2ae0f17df1cd ("genetlink: use idr to track families") Signed-off-by: YueHaibing <yuehaibing@huawei.com...
1
int genl_register_family(struct genl_family *family) { int err, i; int start = GENL_START_ALLOC, end = GENL_MAX_ID; err = genl_validate_ops(family); if (err) return err; genl_lock_all(); if (genl_family_find_byname(family->name)) { err = -EEXIST; goto errout_locked; } /* * Sadly, a few cases need to...
108,757,618,594,854,400,000,000,000,000,000,000,000
genetlink.c
258,142,188,450,716,950,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2019-15921
An issue was discovered in the Linux kernel before 5.0.6. There is a memory leak issue when idr_alloc() fails in genl_register_family() in net/netlink/genetlink.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-15921
3,925
linux
088aaf17aa79300cab14dbee2569c58cfafd7d6e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/088aaf17aa79300cab14dbee2569c58cfafd7d6e
cifs: Fix use-after-free in SMB2_read There is a KASAN use-after-free: BUG: KASAN: use-after-free in SMB2_read+0x1136/0x1190 Read of size 8 at addr ffff8880b4e45e50 by task ln/1009 Should not release the 'req' because it will use in the trace. Fixes: eccb4422cf97 ("smb3: Add ftrace tracepoints for improved SMB3 debu...
1
SMB2_read(const unsigned int xid, struct cifs_io_parms *io_parms, unsigned int *nbytes, char **buf, int *buf_type) { struct smb_rqst rqst; int resp_buftype, rc = -EACCES; struct smb2_read_plain_req *req = NULL; struct smb2_read_rsp *rsp = NULL; struct kvec iov[1]; struct kvec rsp_iov; unsigned int total_len; ...
86,958,898,671,006,720,000,000,000,000,000,000,000
smb2pdu.c
140,544,539,280,537,400,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2019-15920
An issue was discovered in the Linux kernel before 5.0.10. SMB2_read in fs/cifs/smb2pdu.c has a use-after-free. NOTE: this was not fixed correctly in 5.0.10; see the 5.0.11 ChangeLog, which documents a memory leak.
https://nvd.nist.gov/vuln/detail/CVE-2019-15920
3,926
linux
6a3eb3360667170988f8a6477f6686242061488a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6a3eb3360667170988f8a6477f6686242061488a
cifs: Fix use-after-free in SMB2_write There is a KASAN use-after-free: BUG: KASAN: use-after-free in SMB2_write+0x1342/0x1580 Read of size 8 at addr ffff8880b6a8e450 by task ln/4196 Should not release the 'req' because it will use in the trace. Fixes: eccb4422cf97 ("smb3: Add ftrace tracepoints for improved SMB3 de...
1
SMB2_write(const unsigned int xid, struct cifs_io_parms *io_parms, unsigned int *nbytes, struct kvec *iov, int n_vec) { struct smb_rqst rqst; int rc = 0; struct smb2_write_req *req = NULL; struct smb2_write_rsp *rsp = NULL; int resp_buftype; struct kvec rsp_iov; int flags = 0; unsigned int total_len; *nby...
57,757,169,545,362,260,000,000,000,000,000,000,000
smb2pdu.c
106,341,982,764,248,110,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2019-15919
An issue was discovered in the Linux kernel before 5.0.10. SMB2_write in fs/cifs/smb2pdu.c has a use-after-free.
https://nvd.nist.gov/vuln/detail/CVE-2019-15919
3,927
linux
b57a55e2200ede754e4dc9cce4ba9402544b9365
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/b57a55e2200ede754e4dc9cce4ba9402544b9365
cifs: Fix lease buffer length error There is a KASAN slab-out-of-bounds: BUG: KASAN: slab-out-of-bounds in _copy_from_iter_full+0x783/0xaa0 Read of size 80 at addr ffff88810c35e180 by task mount.cifs/539 CPU: 1 PID: 539 Comm: mount.cifs Not tainted 4.19 #10 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS ...
1
SMB2_negotiate(const unsigned int xid, struct cifs_ses *ses) { struct smb_rqst rqst; struct smb2_negotiate_req *req; struct smb2_negotiate_rsp *rsp; struct kvec iov[1]; struct kvec rsp_iov; int rc = 0; int resp_buftype; struct TCP_Server_Info *server = ses->server; int blob_offset, blob_length; char *security...
205,015,380,050,265,500,000,000,000,000,000,000,000
smb2pdu.c
140,544,539,280,537,400,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-15918
An issue was discovered in the Linux kernel before 5.0.10. SMB2_negotiate in fs/cifs/smb2pdu.c has an out-of-bounds read because data structures are incompletely updated after a change from smb30 to smb21.
https://nvd.nist.gov/vuln/detail/CVE-2019-15918
3,928
linux
56897b217a1d0a91c9920cb418d6b3fe922f590a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/56897b217a1d0a91c9920cb418d6b3fe922f590a
Bluetooth: hci_ldisc: Postpone HCI_UART_PROTO_READY bit set in hci_uart_set_proto() task A: task B: hci_uart_set_proto flush_to_ldisc - p->open(hu) -> h5_open //alloc h5 - receive_buf - set_bit HCI_UART_PROTO_READY - tty_port_default_receive_buf - hci_uar...
1
static int hci_uart_set_proto(struct hci_uart *hu, int id) { const struct hci_uart_proto *p; int err; p = hci_uart_get_proto(id); if (!p) return -EPROTONOSUPPORT; hu->proto = p; set_bit(HCI_UART_PROTO_READY, &hu->flags); err = hci_uart_register_dev(hu); if (err) { clear_bit(HCI_UART_PROTO_READY, &h...
136,154,177,591,265,250,000,000,000,000,000,000,000
hci_ldisc.c
5,927,913,923,078,270,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2019-15917
An issue was discovered in the Linux kernel before 5.0.5. There is a use-after-free issue when hci_uart_register_dev() fails in hci_uart_set_proto() in drivers/bluetooth/hci_ldisc.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-15917
3,933
linux
1fb254aa983bf190cfd685d40c64a480a9bafaee
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1fb254aa983bf190cfd685d40c64a480a9bafaee
xfs: fix missing ILOCK unlock when xfs_setattr_nonsize fails due to EDQUOT Benjamin Moody reported to Debian that XFS partially wedges when a chgrp fails on account of being out of disk quota. I ran his reproducer script: # adduser dummy # adduser dummy plugdev # dd if=/dev/zero bs=1M count=100 of=test.img # mkfs.x...
1
xfs_setattr_nonsize( struct xfs_inode *ip, struct iattr *iattr, int flags) { xfs_mount_t *mp = ip->i_mount; struct inode *inode = VFS_I(ip); int mask = iattr->ia_valid; xfs_trans_t *tp; int error; kuid_t uid = GLOBAL_ROOT_UID, iuid = GLOBAL_ROOT_UID; kgid_t gid = GLOBAL_ROOT_GID, igid = GLOBAL_R...
255,274,943,777,258,100,000,000,000,000,000,000,000
xfs_iops.c
170,511,364,161,316,920,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2019-15538
An issue was discovered in xfs_setattr_nonsize in fs/xfs/xfs_iops.c in the Linux kernel through 5.2.9. XFS partially wedges when a chgrp fails on account of being out of disk quota. xfs_setattr_nonsize is failing to unlock the ILOCK after the xfs_qm_vop_chown_reserve call fails. This is primarily a local DoS attack vec...
https://nvd.nist.gov/vuln/detail/CVE-2019-15538
3,935
tcpdump
0b661e0aa61850234b64394585cf577aac570bf4
https://github.com/the-tcpdump-group/tcpdump
https://github.com/the-tcpdump-group/tcpdump/commit/0b661e0aa61850234b64394585cf577aac570bf4
(for 4.9.3) LMP: Add some missing bounds checks In lmp_print_data_link_subobjs(), these problems were identified through code review. Moreover: Add and use tstr[]. Update two tests outputs accordingly.
1
lmp_print_data_link_subobjs(netdissect_options *ndo, const u_char *obj_tptr, int total_subobj_len, int offset) { int hexdump = FALSE; int subobj_type, subobj_len; union { /* int to float conversion buffer */ float f; uint32_t i; } bw; while (total_sub...
157,557,897,929,143,570,000,000,000,000,000,000,000
print-lmp.c
284,566,342,901,425,540,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2019-15166
lmp_print_data_link_subobjs() in print-lmp.c in tcpdump before 4.9.3 lacks certain bounds checks.
https://nvd.nist.gov/vuln/detail/CVE-2019-15166
3,936
libpcap
a5a36d9e82dde7265e38fe1f87b7f11c461c29f6
https://github.com/the-tcpdump-group/libpcap
https://github.com/the-tcpdump-group/libpcap/commit/a5a36d9e82dde7265e38fe1f87b7f11c461c29f6
Fix some format warnings.
1
pcap_ng_check_header(const uint8_t *magic, FILE *fp, u_int precision, char *errbuf, int *err) { bpf_u_int32 magic_int; size_t amt_read; bpf_u_int32 total_length; bpf_u_int32 byte_order_magic; struct block_header *bhdrp; struct section_header_block *shbp; pcap_t *p; int swapped = 0; struct pcap_ng_sf *ps; ...
62,382,392,079,134,400,000,000,000,000,000,000,000
sf-pcapng.c
148,887,623,957,953,060,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2019-15165
sf-pcapng.c in libpcap before 1.9.1 does not properly validate the PHB header length before allocating memory.
https://nvd.nist.gov/vuln/detail/CVE-2019-15165
3,937
gpmf-parser
341f12cd5b97ab419e53853ca00176457c9f1681
https://github.com/gopro/gpmf-parser
https://github.com/gopro/gpmf-parser/commit/341f12cd5b97ab419e53853ca00176457c9f1681
fixed many security issues with the too crude mp4 reader
1
GPMF_ERR IsValidSize(GPMF_stream *ms, uint32_t size) // size is in longs not bytes. { if (ms) { int32_t nestsize = (int32_t)ms->nest_size[ms->nest_level]; if (nestsize == 0 && ms->nest_level == 0) nestsize = ms->buffer_size_longs; if (size + 2 <= nestsize) return GPMF_OK; } return GPMF_ERROR_BAD_STR...
39,887,036,510,019,133,000,000,000,000,000,000,000
GPMF_parser.c
101,923,111,988,893,630,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2019-15148
GoPro GPMF-parser 1.2.2 has an out-of-bounds write in OpenMP4Source in demo/GPMF_mp4reader.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-15148
3,943
gpmf-parser
341f12cd5b97ab419e53853ca00176457c9f1681
https://github.com/gopro/gpmf-parser
https://github.com/gopro/gpmf-parser/commit/341f12cd5b97ab419e53853ca00176457c9f1681
fixed many security issues with the too crude mp4 reader
1
size_t OpenMP4Source(char *filename, uint32_t traktype, uint32_t traksubtype) //RAW or within MP4 { mp4object *mp4 = (mp4object *)malloc(sizeof(mp4object)); if (mp4 == NULL) return 0; memset(mp4, 0, sizeof(mp4object)); #ifdef _WINDOWS fopen_s(&mp4->mediafp, filename, "rb"); #else mp4->mediafp = fopen(fil...
268,050,768,699,578,650,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2019-15148
GoPro GPMF-parser 1.2.2 has an out-of-bounds write in OpenMP4Source in demo/GPMF_mp4reader.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-15148
3,946
ImageMagick6
3c53413eb544cc567309b4c86485eae43e956112
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/3c53413eb544cc567309b4c86485eae43e956112
https://github.com/ImageMagick/ImageMagick/issues/1560
1
static MagickBooleanType WriteTIFFImage(const ImageInfo *image_info, Image *image) { const char *mode, *option; CompressionType compression; EndianType endian_type; MagickBooleanType debug, status; MagickOffsetType scene; QuantumInfo *quantum_info; QuantumType q...
36,416,815,289,515,490,000,000,000,000,000,000,000
tiff.c
27,570,316,504,444,440,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-15141
WriteTIFFImage in coders/tiff.c in ImageMagick 7.0.8-43 Q16 allows attackers to cause a denial-of-service (application crash resulting from a heap-based buffer over-read) via a crafted TIFF image file, related to TIFFRewriteDirectory, TIFFWriteDirectory, TIFFWriteDirectorySec, and TIFFWriteDirectoryTagColormap in tif_d...
https://nvd.nist.gov/vuln/detail/CVE-2019-15141
3,949
ImageMagick
c78993d138bf480ab4652b5a48379d4ff75ba5f7
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/c78993d138bf480ab4652b5a48379d4ff75ba5f7
https://github.com/ImageMagick/ImageMagick/issues/1553
1
static Image *ReadXWDImage(const ImageInfo *image_info,ExceptionInfo *exception) { #define CheckOverflowException(length,width,height) \ (((height) != 0) && ((length)/((size_t) height) != ((size_t) width))) char *comment; Image *image; int x_status; MagickBooleanType authentic_colormap; ...
233,532,117,835,758,400,000,000,000,000,000,000,000
xwd.c
57,456,086,150,064,630,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-15139
The XWD image (X Window System window dumping file) parsing component in ImageMagick 7.0.8-41 Q16 allows attackers to cause a denial-of-service (application crash resulting from an out-of-bounds Read) in ReadXWDImage in coders/xwd.c by crafting a corrupted XWD image file, a different vulnerability than CVE-2019-11472.
https://nvd.nist.gov/vuln/detail/CVE-2019-15139
3,954
ImageMagick6
b522d2d857d2f75b659936b59b0da9df1682c256
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/b522d2d857d2f75b659936b59b0da9df1682c256
https://github.com/ImageMagick/ImageMagick/issues/1552
1
MagickExport Image *MeanShiftImage(const Image *image,const size_t width, const size_t height,const double color_distance,ExceptionInfo *exception) { #define MaxMeanShiftIterations 100 #define MeanShiftImageTag "MeanShift/Image" CacheView *image_view, *mean_view, *pixel_view; Image *mean_image...
231,391,488,542,660,700,000,000,000,000,000,000,000
feature.c
334,519,932,082,623,530,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2019-14981
In ImageMagick 7.x before 7.0.8-41 and 6.x before 6.9.10-41, there is a divide-by-zero vulnerability in the MeanShiftImage function. It allows an attacker to cause a denial of service by sending a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2019-14981
3,955
ImageMagick6
614a257295bdcdeda347086761062ac7658b6830
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/614a257295bdcdeda347086761062ac7658b6830
https://github.com/ImageMagick/ImageMagick6/issues/43
1
MagickExport unsigned char *DetachBlob(BlobInfo *blob_info) { unsigned char *data; assert(blob_info != (BlobInfo *) NULL); if (blob_info->debug != MagickFalse) (void) LogMagickEvent(TraceEvent,GetMagickModule(),"..."); if (blob_info->mapped != MagickFalse) { (void) UnmapBlob(blob_info->dat...
230,870,644,106,464,150,000,000,000,000,000,000,000
blob.c
310,539,915,566,168,340,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2019-14980
In ImageMagick 7.x before 7.0.8-42 and 6.x before 6.9.10-42, there is a use after free vulnerability in the UnmapBlob function that allows an attacker to cause a denial of service by sending a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2019-14980
3,961
pdfresurrect
0c4120fffa3dffe97b95c486a120eded82afe8a6
https://github.com/enferex/pdfresurrect
https://github.com/enferex/pdfresurrect/commit/0c4120fffa3dffe97b95c486a120eded82afe8a6
Zero and sanity check all dynamic allocs. This addresses the memory issues in Issue #6 expressed in calloc_some.pdf and malloc_some.pdf
1
void pdf_load_pages_kids(FILE *fp, pdf_t *pdf) { int i, id, dummy; char *buf, *c; long start, sz; start = ftell(fp); /* Load all kids for all xref tables (versions) */ for (i=0; i<pdf->n_xrefs; i++) { if (pdf->xrefs[i].version && (pdf->xrefs[i].end != 0)) { ...
305,307,068,957,863,400,000,000,000,000,000,000,000
pdf.c
66,527,136,684,972,825,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2019-14934
An issue was discovered in PDFResurrect before 0.18. pdf_load_pages_kids in pdf.c doesn't validate a certain size value, which leads to a malloc failure and out-of-bounds write.
https://nvd.nist.gov/vuln/detail/CVE-2019-14934
3,966
linux
7caac62ed598a196d6ddf8d9c121e12e082cac3
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/7caac62ed598a196d6ddf8d9c121e12e082cac3
mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings mwifiex_update_vs_ie(),mwifiex_set_uap_rates() and mwifiex_set_wmm_params() call memcpy() without checking the destination size.Since the source is given from user-space, this may trigger a heap buffer overflow. Fix them by putting the length...
1
mwifiex_set_wmm_params(struct mwifiex_private *priv, struct mwifiex_uap_bss_param *bss_cfg, struct cfg80211_ap_settings *params) { const u8 *vendor_ie; const u8 *wmm_ie; u8 wmm_oui[] = {0x00, 0x50, 0xf2, 0x02}; vendor_ie = cfg80211_find_vendor_ie(WLAN_OUI_MICROSOFT, WLAN_OUI_TYPE_MICROSO...
210,184,099,351,750,200,000,000,000,000,000,000,000
uap_cmd.c
4,975,642,954,145,404,000,000,000,000,000,000,000
[ "CWE-120" ]
CVE-2019-14816
There is heap-based buffer overflow in kernel, all versions up to, excluding 5.3, in the marvell wifi chip driver in Linux kernel, that allows local users to cause a denial of service(system crash) or possibly execute arbitrary code.
https://nvd.nist.gov/vuln/detail/CVE-2019-14816
3,969
3proxy
3b67dc844789dc0f00e934270c7b349bcb547865
https://github.com/z3APA3A/3proxy
https://github.com/z3APA3A/3proxy/commit/3b67dc844789dc0f00e934270c7b349bcb547865
Fix: out-of-bounds write and few more bugs in 'admin' configuration upload
1
void * adminchild(struct clientparam* param) { int i, res; char * buf; char username[256]; char *sb; char *req = NULL; struct printparam pp; int contentlen = 0; int isform = 0; pp.inbuf = 0; pp.cp = param; buf = myalloc(LINESIZE); if(!buf) {RETURN(555);} i = sockgetlinebuf(param, CLIENT, (unsigned ...
208,643,767,936,815,360,000,000,000,000,000,000,000
webadmin.c
8,093,695,503,031,678,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2019-14495
webadmin.c in 3proxy before 0.8.13 has an out-of-bounds write in the admin interface.
https://nvd.nist.gov/vuln/detail/CVE-2019-14495
3,970
libmodbus
5ccdf5ef79d742640355d1132fa9e2abc7fbaefc
https://github.com/stephane/libmodbus
https://github.com/stephane/libmodbus/commit/5ccdf5ef79d742640355d1132fa9e2abc7fbaefc
Fix VD-1301 and VD-1302 vulnerabilities This patch was contributed by Maor Vermucht and Or Peles from VDOO Connected Trust.
1
int modbus_reply(modbus_t *ctx, const uint8_t *req, int req_length, modbus_mapping_t *mb_mapping) { int offset; int slave; int function; uint16_t address; uint8_t rsp[MAX_MESSAGE_LENGTH]; int rsp_length = 0; sft_t sft; if (ctx == NULL) { errno = EINVAL; ...
118,810,954,539,967,250,000,000,000,000,000,000,000
modbus.c
310,438,196,523,364,550,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-14462
An issue was discovered in libmodbus before 3.0.7 and 3.1.x before 3.1.5. There is an out-of-bounds read for the MODBUS_FC_WRITE_MULTIPLE_COILS case, aka VD-1302.
https://nvd.nist.gov/vuln/detail/CVE-2019-14462
3,972
nfdump
3b006ededaf351f1723aea6c727c9edd1b1fff9b
https://github.com/phaag/nfdump
https://github.com/phaag/nfdump/commit/3b006ededaf351f1723aea6c727c9edd1b1fff9b
Fix potential unsigned integer underflow
1
static void Process_ipfix_template_withdraw(exporter_ipfix_domain_t *exporter, void *DataPtr, uint32_t size_left, FlowSource_t *fs) { ipfix_template_record_t *ipfix_template_record; while ( size_left ) { uint32_t id; ipfix_template_record = (ipfix_template_record_t *)DataPtr; size_left -= 4; id = ...
255,402,460,928,750,500,000,000,000,000,000,000,000
None
null
[ "CWE-190" ]
CVE-2019-14459
nfdump 1.6.17 and earlier is affected by an integer overflow in the function Process_ipfix_template_withdraw in ipfix.c that can be abused in order to crash the process remotely (denial of service).
https://nvd.nist.gov/vuln/detail/CVE-2019-14459
3,973
ssdp-responder
ce04b1f29a137198182f60bbb628d5ceb8171765
https://github.com/troglobit/ssdp-responder
https://github.com/troglobit/ssdp-responder/commit/ce04b1f29a137198182f60bbb628d5ceb8171765
Fix #1: Ensure recv buf is always NUL terminated Signed-off-by: Joachim Nilsson <troglobit@gmail.com>
1
static void ssdp_recv(int sd) { ssize_t len; struct sockaddr sa; socklen_t salen; char buf[MAX_PKT_SIZE]; memset(buf, 0, sizeof(buf)); len = recvfrom(sd, buf, sizeof(buf), MSG_DONTWAIT, &sa, &salen); if (len > 0) { buf[len] = 0; if (sa.sa_family != AF_INET) return; if (strstr(buf, "M-SEARCH *...
280,032,986,814,402,150,000,000,000,000,000,000,000
ssdpd.c
339,921,506,989,161,030,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2019-14323
SSDP Responder 1.x through 1.5 mishandles incoming network messages, leading to a stack-based buffer overflow by 1 byte. This results in a crash of the server, but only when strict stack checking is enabled. This is caused by an off-by-one error in ssdp_recv in ssdpd.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-14323
3,975
linux
da99466ac243f15fbba65bd261bfc75ffa1532b6
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/da99466ac243f15fbba65bd261bfc75ffa1532b6
floppy: fix out-of-bounds read in copy_buffer This fixes a global out-of-bounds read access in the copy_buffer function of the floppy driver. The FDDEFPRM ioctl allows one to set the geometry of a disk. The sect and head fields (unsigned int) of the floppy_drive structure are used to compute the max_sector (int) in ...
1
static int set_geometry(unsigned int cmd, struct floppy_struct *g, int drive, int type, struct block_device *bdev) { int cnt; /* sanity checking for parameters. */ if (g->sect <= 0 || g->head <= 0 || /* check for zero in F_SECT_PER_TRACK */ (unsigned char)((g->sect << 2) >> FD_SIZECODE...
296,852,991,544,563,100,000,000,000,000,000,000,000
floppy.c
82,662,511,541,790,550,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-14283
In the Linux kernel before 5.2.3, set_geometry in drivers/block/floppy.c does not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk has been inserted. NOTE: QEMU creates the floppy device by default.
https://nvd.nist.gov/vuln/detail/CVE-2019-14283
3,976
ImageMagick6
4f31d78716ac94c85c244efcea368fea202e2ed4
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/4f31d78716ac94c85c244efcea368fea202e2ed4
https://github.com/ImageMagick/ImageMagick/issues/1629
1
MagickExport void RemoveDuplicateLayers(Image **images, ExceptionInfo *exception) { register Image *curr, *next; RectangleInfo bounds; assert((*images) != (const Image *) NULL); assert((*images)->signature == MagickCoreSignature); if ((*images)->debug != MagickFalse) (void) LogMag...
325,777,336,146,972,950,000,000,000,000,000,000,000
layer.c
274,333,210,266,149,130,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2019-13454
ImageMagick 7.0.8-54 Q16 allows Division by Zero in RemoveDuplicateLayers in MagickCore/layer.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-13454
3,978
ImageMagick6
f6ffc702c6eecd963587273a429dcd608c648984
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/f6ffc702c6eecd963587273a429dcd608c648984
https://github.com/ImageMagick/ImageMagick/issues/1588
1
MagickExport Image *ComplexImages(const Image *images,const ComplexOperator op, ExceptionInfo *exception) { #define ComplexImageTag "Complex/Image" CacheView *Ai_view, *Ar_view, *Bi_view, *Br_view, *Ci_view, *Cr_view; const char *artifact; const Image *Ai_image, *Ar_image...
174,887,836,793,841,050,000,000,000,000,000,000,000
fourier.c
35,236,892,983,773,670,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-13391
In ImageMagick 7.0.8-50 Q16, ComplexImages in MagickCore/fourier.c has a heap-based buffer over-read because of incorrect calls to GetCacheViewVirtualPixels.
https://nvd.nist.gov/vuln/detail/CVE-2019-13391
3,979
ImageMagick6
bb812022d0bc12107db215c981cab0b1ccd73d91
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/bb812022d0bc12107db215c981cab0b1ccd73d91
https://github.com/ImageMagick/ImageMagick/issues/1623
1
WandExport MagickBooleanType MogrifyImageList(ImageInfo *image_info, const int argc,const char **argv,Image **images,ExceptionInfo *exception) { ChannelType channel; const char *option; ImageInfo *mogrify_info; MagickStatusType status; QuantizeInfo *quantize_info; register ssize_t...
271,961,819,426,692,350,000,000,000,000,000,000,000
mogrify.c
239,266,582,883,320,800,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2019-13311
ImageMagick 7.0.8-50 Q16 has memory leaks at AcquireMagickMemory because of a wand/mogrify.c error.
https://nvd.nist.gov/vuln/detail/CVE-2019-13311
3,980
ImageMagick6
5982632109cad48bc6dab867298fdea4dea57c51
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51
https://github.com/ImageMagick/ImageMagick/issues/1616
1
WandExport MagickBooleanType MogrifyImageList(ImageInfo *image_info, const int argc,const char **argv,Image **images,ExceptionInfo *exception) { ChannelType channel; const char *option; ImageInfo *mogrify_info; MagickStatusType status; QuantizeInfo *quantize_info; register ssize_t...
86,170,942,970,773,200,000,000,000,000,000,000,000
mogrify.c
156,590,874,836,840,700,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2019-13309
ImageMagick 7.0.8-50 Q16 has memory leaks at AcquireMagickMemory because of mishandling the NoSuchImage error in CLIListOperatorImages in MagickWand/operation.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-13309
3,981
ImageMagick6
19651f3db63fa1511ed83a348c4c82fa553f8d01
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/19651f3db63fa1511ed83a348c4c82fa553f8d01
https://github.com/ImageMagick/ImageMagick/issues/1595
1
MagickExport Image *ComplexImages(const Image *images,const ComplexOperator op, ExceptionInfo *exception) { #define ComplexImageTag "Complex/Image" CacheView *Ai_view, *Ar_view, *Bi_view, *Br_view, *Ci_view, *Cr_view; const char *artifact; const Image *Ai_image, *Ar_image...
27,837,401,205,454,582,000,000,000,000,000,000,000
fourier.c
247,841,583,304,662,700,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2019-13308
ImageMagick 7.0.8-50 Q16 has a heap-based buffer overflow in MagickCore/fourier.c in ComplexImage.
https://nvd.nist.gov/vuln/detail/CVE-2019-13308
3,982
ImageMagick6
cb5ec7d98195aa74d5ed299b38eff2a68122f3fa
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/cb5ec7d98195aa74d5ed299b38eff2a68122f3fa
https://github.com/ImageMagick/ImageMagick/issues/1612
1
static MagickBooleanType WritePNMImage(const ImageInfo *image_info,Image *image) { char buffer[MaxTextExtent], format, magick[MaxTextExtent]; const char *value; IndexPacket index; MagickBooleanType status; MagickOffsetType scene; QuantumAny pixel; QuantumInfo *qua...
329,339,327,940,665,850,000,000,000,000,000,000,000
pnm.c
184,005,202,624,430,060,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2019-13306
ImageMagick 7.0.8-50 Q16 has a stack-based buffer overflow at coders/pnm.c in WritePNMImage because of off-by-one errors.
https://nvd.nist.gov/vuln/detail/CVE-2019-13306
3,983
ImageMagick6
5c7fbf9a14fb83c9685ad69d48899f490a37609d
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/5c7fbf9a14fb83c9685ad69d48899f490a37609d
https://github.com/ImageMagick/ImageMagick/issues/1613
1
static MagickBooleanType WritePNMImage(const ImageInfo *image_info,Image *image) { char buffer[MaxTextExtent], format, magick[MaxTextExtent]; const char *value; IndexPacket index; MagickBooleanType status; MagickOffsetType scene; QuantumAny pixel; QuantumInfo *qua...
9,166,256,097,747,162,000,000,000,000,000,000,000
pnm.c
43,884,406,822,241,460,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2019-13305
ImageMagick 7.0.8-50 Q16 has a stack-based buffer overflow at coders/pnm.c in WritePNMImage because of a misplaced strncpy and an off-by-one error.
https://nvd.nist.gov/vuln/detail/CVE-2019-13305
3,984
ImageMagick
7689875ef64f34141e7292f6945efdf0530b4a5e
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/7689875ef64f34141e7292f6945efdf0530b4a5e
https://github.com/ImageMagick/ImageMagick/issues/1614
1
static MagickBooleanType WritePNMImage(const ImageInfo *image_info,Image *image, ExceptionInfo *exception) { char buffer[MagickPathExtent], format, magick[MagickPathExtent]; const char *value; MagickBooleanType status; MagickOffsetType scene; Quantum index; QuantumAny ...
238,763,905,085,634,700,000,000,000,000,000,000,000
pnm.c
126,691,523,255,213,540,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2019-13304
ImageMagick 7.0.8-50 Q16 has a stack-based buffer overflow at coders/pnm.c in WritePNMImage because of a misplaced assignment.
https://nvd.nist.gov/vuln/detail/CVE-2019-13304
3,985
ImageMagick
d5089971bd792311aaab5cb73460326d7ef7f32d
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/d5089971bd792311aaab5cb73460326d7ef7f32d
https://github.com/ImageMagick/ImageMagick/issues/1597
1
MagickExport Image *ComplexImages(const Image *images,const ComplexOperator op, ExceptionInfo *exception) { #define ComplexImageTag "Complex/Image" CacheView *Ai_view, *Ar_view, *Bi_view, *Br_view, *Ci_view, *Cr_view; const char *artifact; const Image *Ai_image, *Ar_image...
52,955,262,328,526,060,000,000,000,000,000,000,000
fourier.c
124,486,227,486,599,340,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-13302
ImageMagick 7.0.8-50 Q16 has a heap-based buffer over-read in MagickCore/fourier.c in ComplexImages.
https://nvd.nist.gov/vuln/detail/CVE-2019-13302
3,986
ImageMagick
f595a1985233c399a05c0c37cc41de16a90dd025
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/f595a1985233c399a05c0c37cc41de16a90dd025
https://github.com/ImageMagick/ImageMagick/issues/1589
1
MagickExport MagickBooleanType AnnotateImage(Image *image, const DrawInfo *draw_info,ExceptionInfo *exception) { char *p, primitive[MagickPathExtent], *text, **textlist; DrawInfo *annotate, *annotate_info; GeometryInfo geometry_info; MagickBooleanType status; PointInfo ...
38,384,457,200,441,266,000,000,000,000,000,000,000
annotate.c
142,178,898,008,591,400,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2019-13301
ImageMagick 7.0.8-50 Q16 has memory leaks in AcquireMagickMemory because of an AnnotateImage error.
https://nvd.nist.gov/vuln/detail/CVE-2019-13301
3,987
ImageMagick6
5e409ae7a389cdf2ed17469303be3f3f21cec450
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/5e409ae7a389cdf2ed17469303be3f3f21cec450
https://github.com/ImageMagick/ImageMagick/issues/1586
1
static MagickPixelPacket **AcquirePixelThreadSet(const Image *image) { MagickPixelPacket **pixels; register ssize_t i, j; size_t number_threads; number_threads=(size_t) GetMagickResourceLimit(ThreadResource); pixels=(MagickPixelPacket **) AcquireQuantumMemory(number_threads, s...
298,386,231,418,854,870,000,000,000,000,000,000,000
statistic.c
130,627,906,262,576,380,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2019-13300
ImageMagick 7.0.8-50 Q16 has a heap-based buffer overflow at MagickCore/statistic.c in EvaluateImages because of mishandling columns.
https://nvd.nist.gov/vuln/detail/CVE-2019-13300
3,988
ImageMagick
d4fc44b58a14f76b1ac997517d742ee12c9dc5d3
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/d4fc44b58a14f76b1ac997517d742ee12c9dc5d3
https://github.com/ImageMagick/ImageMagick/issues/1611
1
MagickExport Image *EnhanceImage(const Image *image,ExceptionInfo *exception) { #define EnhanceImageTag "Enhance/Image" #define EnhancePixel(weight) \ mean=QuantumScale*((double) GetPixelRed(image,r)+pixel.red)/2.0; \ distance=QuantumScale*((double) GetPixelRed(image,r)-pixel.red); \ distance_squared=(4.0+mean)*...
39,724,954,808,497,897,000,000,000,000,000,000,000
enhance.c
155,505,691,939,167,960,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2019-13298
ImageMagick 7.0.8-50 Q16 has a heap-based buffer overflow at MagickCore/pixel-accessor.h in SetPixelViaPixelInfo because of a MagickCore/enhance.c error.
https://nvd.nist.gov/vuln/detail/CVE-2019-13298
3,989
ImageMagick6
35c7032723d85eee7318ff6c82f031fa2666b773
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/35c7032723d85eee7318ff6c82f031fa2666b773
https://github.com/ImageMagick/ImageMagick/issues/1609
1
MagickExport Image *AdaptiveThresholdImage(const Image *image, const size_t width,const size_t height,const ssize_t offset, ExceptionInfo *exception) { #define ThresholdImageTag "Threshold/Image" CacheView *image_view, *threshold_view; Image *threshold_image; MagickBooleanType status; M...
320,134,287,425,152,820,000,000,000,000,000,000,000
threshold.c
115,482,682,457,321,940,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-13297
ImageMagick 7.0.8-50 Q16 has a heap-based buffer over-read at MagickCore/threshold.c in AdaptiveThresholdImage because a height of zero is mishandled.
https://nvd.nist.gov/vuln/detail/CVE-2019-13297
3,990
ImageMagick
ce08a3691a8ac29125e29fc41967b3737fa3f425
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/ce08a3691a8ac29125e29fc41967b3737fa3f425
https://github.com/ImageMagick/ImageMagick/issues/1604
1
WandPrivate MagickBooleanType CLIListOperatorImages(MagickCLI *cli_wand, const char *option,const char *arg1n,const char *arg2n) { const char /* percent escaped versions of the args */ *arg1, *arg2; Image *new_images; MagickStatusType status; ssize_t parse; #define _image_info (...
306,991,356,440,369,000,000,000,000,000,000,000,000
operation.c
157,788,665,975,600,050,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2019-13296
ImageMagick 7.0.8-50 Q16 has direct memory leaks in AcquireMagickMemory because of an error in CLIListOperatorImages in MagickWand/operation.c for a NULL value.
https://nvd.nist.gov/vuln/detail/CVE-2019-13296
3,991
ImageMagick
a7759f410b773a1dd57b0e1fb28112e1cd8b97bc
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/a7759f410b773a1dd57b0e1fb28112e1cd8b97bc
https://github.com/ImageMagick/ImageMagick/issues/1608
1
MagickExport Image *AdaptiveThresholdImage(const Image *image, const size_t width,const size_t height,const double bias, ExceptionInfo *exception) { #define AdaptiveThresholdImageTag "AdaptiveThreshold/Image" CacheView *image_view, *threshold_view; Image *threshold_image; MagickBooleanType ...
312,905,073,757,981,080,000,000,000,000,000,000,000
threshold.c
133,075,084,422,734,550,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-13295
ImageMagick 7.0.8-50 Q16 has a heap-based buffer over-read at MagickCore/threshold.c in AdaptiveThresholdImage because a width of zero is mishandled.
https://nvd.nist.gov/vuln/detail/CVE-2019-13295
3,992
linux
6994eefb0053799d2e07cd140df6c2ea106c41ee
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6994eefb0053799d2e07cd140df6c2ea106c41ee
ptrace: Fix ->ptracer_cred handling for PTRACE_TRACEME Fix two issues: When called for PTRACE_TRACEME, ptrace_link() would obtain an RCU reference to the parent's objective credentials, then give that pointer to get_cred(). However, the object lifetime rules for things like struct cred do not permit unconditionally ...
1
static void ptrace_link(struct task_struct *child, struct task_struct *new_parent) { rcu_read_lock(); __ptrace_link(child, new_parent, __task_cred(new_parent)); rcu_read_unlock(); }
156,288,679,258,947,600,000,000,000,000,000,000,000
ptrace.c
156,184,805,185,643,770,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2019-13272
In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges ...
https://nvd.nist.gov/vuln/detail/CVE-2019-13272
3,998
oniguruma
0f7f61ed1b7b697e283e37bd2d731d0bd57adb55
https://github.com/kkos/oniguruma
https://github.com/kkos/oniguruma/commit/0f7f61ed1b7b697e283e37bd2d731d0bd57adb55
Fix CVE-2019-13224: don't allow different encodings for onig_new_deluxe()
1
onig_new_deluxe(regex_t** reg, const UChar* pattern, const UChar* pattern_end, OnigCompileInfo* ci, OnigErrorInfo* einfo) { int r; UChar *cpat, *cpat_end; if (IS_NOT_NULL(einfo)) einfo->par = (UChar* )NULL; if (ci->pattern_enc != ci->target_enc) { r = conv_encoding(ci->pattern_enc, ci-...
271,415,581,749,750,400,000,000,000,000,000,000,000
regext.c
108,449,085,595,308,860,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2019-13224
A use-after-free in onig_new_deluxe() in regext.c in Oniguruma 6.9.2 allows attackers to potentially cause information disclosure, denial of service, or possibly code execution by providing a crafted regular expression. The attacker provides a pair of a regex pattern and a string, with a multi-byte encoding that gets h...
https://nvd.nist.gov/vuln/detail/CVE-2019-13224
3,999
stb
98fdfc6df88b1e34a736d5e126e6c8139c8de1a6
https://github.com/nothings/stb
https://github.com/nothings/stb/commit/98fdfc6df88b1e34a736d5e126e6c8139c8de1a6
Fix seven bugs discovered and fixed by ForAllSecure: CVE-2019-13217: heap buffer overflow in start_decoder() CVE-2019-13218: stack buffer overflow in compute_codewords() CVE-2019-13219: uninitialized memory in vorbis_decode_packet_rest() CVE-2019-13220: out-of-range read in draw_line() CVE-2019-13221: issue with large...
1
static __forceinline void draw_line(float *output, int x0, int y0, int x1, int y1, int n) { int dy = y1 - y0; int adx = x1 - x0; int ady = abs(dy); int base; int x=x0,y=y0; int err = 0; int sy; #ifdef STB_VORBIS_DIVIDE_TABLE if (adx < DIVTAB_DENOM && ady < DIVTAB_NUMER) { if (dy < 0) { ...
148,378,993,502,453,470,000,000,000,000,000,000,000
stb_vorbis.c
334,088,542,074,155,050,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2019-13219
A NULL pointer dereference in the get_window function in stb_vorbis through 2019-03-04 allows an attacker to cause a denial of service by opening a crafted Ogg Vorbis file.
https://nvd.nist.gov/vuln/detail/CVE-2019-13219
4,000
stb
98fdfc6df88b1e34a736d5e126e6c8139c8de1a6
https://github.com/nothings/stb
https://github.com/nothings/stb/commit/98fdfc6df88b1e34a736d5e126e6c8139c8de1a6
Fix seven bugs discovered and fixed by ForAllSecure: CVE-2019-13217: heap buffer overflow in start_decoder() CVE-2019-13218: stack buffer overflow in compute_codewords() CVE-2019-13219: uninitialized memory in vorbis_decode_packet_rest() CVE-2019-13220: out-of-range read in draw_line() CVE-2019-13221: issue with large...
1
static float *get_window(vorb *f, int len) { len <<= 1; if (len == f->blocksize_0) return f->window[0]; if (len == f->blocksize_1) return f->window[1]; assert(0); return NULL; }
54,906,354,596,068,530,000,000,000,000,000,000,000
stb_vorbis.c
334,088,542,074,155,050,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2019-13219
A NULL pointer dereference in the get_window function in stb_vorbis through 2019-03-04 allows an attacker to cause a denial of service by opening a crafted Ogg Vorbis file.
https://nvd.nist.gov/vuln/detail/CVE-2019-13219
4,001
stb
98fdfc6df88b1e34a736d5e126e6c8139c8de1a6
https://github.com/nothings/stb
https://github.com/nothings/stb/commit/98fdfc6df88b1e34a736d5e126e6c8139c8de1a6
Fix seven bugs discovered and fixed by ForAllSecure: CVE-2019-13217: heap buffer overflow in start_decoder() CVE-2019-13218: stack buffer overflow in compute_codewords() CVE-2019-13219: uninitialized memory in vorbis_decode_packet_rest() CVE-2019-13220: out-of-range read in draw_line() CVE-2019-13221: issue with large...
1
static int lookup1_values(int entries, int dim) { int r = (int) floor(exp((float) log((float) entries) / dim)); if ((int) floor(pow((float) r+1, dim)) <= entries) // (int) cast for MinGW warning; ++r; // floor() to avoid _ftol() when non-CRT assert(pow((f...
246,719,121,438,152,280,000,000,000,000,000,000,000
stb_vorbis.c
334,088,542,074,155,050,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2019-13219
A NULL pointer dereference in the get_window function in stb_vorbis through 2019-03-04 allows an attacker to cause a denial of service by opening a crafted Ogg Vorbis file.
https://nvd.nist.gov/vuln/detail/CVE-2019-13219
4,002
stb
98fdfc6df88b1e34a736d5e126e6c8139c8de1a6
https://github.com/nothings/stb
https://github.com/nothings/stb/commit/98fdfc6df88b1e34a736d5e126e6c8139c8de1a6
Fix seven bugs discovered and fixed by ForAllSecure: CVE-2019-13217: heap buffer overflow in start_decoder() CVE-2019-13218: stack buffer overflow in compute_codewords() CVE-2019-13219: uninitialized memory in vorbis_decode_packet_rest() CVE-2019-13220: out-of-range read in draw_line() CVE-2019-13221: issue with large...
1
static int start_decoder(vorb *f) { uint8 header[6], x,y; int len,i,j,k, max_submaps = 0; int longest_floorlist=0; if (!start_page(f)) return FALSE; if (!(f->page_flag & PAGEFLAG_first_page)) return error(f, VORBIS_invalid_first_page); if (f->page_flag & PAGEFLAG_l...
252,497,019,343,885,260,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2019-13219
A NULL pointer dereference in the get_window function in stb_vorbis through 2019-03-04 allows an attacker to cause a denial of service by opening a crafted Ogg Vorbis file.
https://nvd.nist.gov/vuln/detail/CVE-2019-13219
4,004
ImageMagick6
7d11230060fa9c8f67e53c85224daf6648805c7b
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/7d11230060fa9c8f67e53c85224daf6648805c7b
https://github.com/ImageMagick/ImageMagick/issues/1601
1
static Image *ReadPSImage(const ImageInfo *image_info,ExceptionInfo *exception) { #define BoundingBox "BoundingBox:" #define BeginDocument "BeginDocument:" #define BeginXMPPacket "<?xpacket begin=" #define EndXMPPacket "<?xpacket end=" #define ICCProfile "BeginICCProfile:" #define CMYKCustomColor "CMYKCustomColor:...
324,044,698,586,397,400,000,000,000,000,000,000,000
ps.c
201,065,018,049,002,330,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2019-13137
ImageMagick before 7.0.8-50 has a memory leak vulnerability in the function ReadPSImage in coders/ps.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-13137
4,005
ImageMagick
cdb383749ef7b68a38891440af8cc23e0115306d
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/cdb383749ef7b68a38891440af8cc23e0115306d
https://github.com/ImageMagick/ImageMagick/issues/1599
1
static Image *ReadCUTImage(const ImageInfo *image_info,ExceptionInfo *exception) { #define ThrowCUTReaderException(severity,tag) \ { \ if (palette != NULL) \ palette=DestroyImage(palette); \ if (clone_info != NULL) \ clone_info=DestroyImageInfo(clone_info); \ ThrowReaderException(severity,tag); \ } Ima...
88,863,127,355,848,590,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2019-13135
ImageMagick before 7.0.8-50 has a "use of uninitialized value" vulnerability in the function ReadCUTImage in coders/cut.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-13135
4,006
ImageMagick
fe3066122ef72c82415811d25e9e3fad622c0a99
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/fe3066122ef72c82415811d25e9e3fad622c0a99
https://github.com/ImageMagick/ImageMagick/issues/1600
1
static Image *ReadBMPImage(const ImageInfo *image_info,ExceptionInfo *exception) { BMPInfo bmp_info; Image *image; MagickBooleanType status; MagickOffsetType offset, profile_data, profile_size, start_position; MemoryInfo *pixel_info; Quantum index; register Quantu...
86,565,001,831,407,070,000,000,000,000,000,000,000
bmp.c
36,858,631,049,690,346,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2019-13134
ImageMagick before 7.0.8-50 has a memory leak vulnerability in the function ReadVIFFImage in coders/viff.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-13134
4,007
ImageMagick
fe3066122ef72c82415811d25e9e3fad622c0a99
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/fe3066122ef72c82415811d25e9e3fad622c0a99
https://github.com/ImageMagick/ImageMagick/issues/1600
1
static Image *ReadVIFFImage(const ImageInfo *image_info, ExceptionInfo *exception) { #define VFF_CM_genericRGB 15 #define VFF_CM_ntscRGB 1 #define VFF_CM_NONE 0 #define VFF_DEP_DECORDER 0x4 #define VFF_DEP_NSORDER 0x8 #define VFF_DES_RAW 0 #define VFF_LOC_IMPLICIT 1 #define VFF_MAPTYP_NONE 0 #define VFF_MAPTY...
105,511,065,680,299,740,000,000,000,000,000,000,000
viff.c
68,297,603,364,140,680,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2019-13134
ImageMagick before 7.0.8-50 has a memory leak vulnerability in the function ReadVIFFImage in coders/viff.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-13134
4,025
libming
2be22fcf56a223dafe8de0e8a20fe20e8bbdb0b9
https://github.com/libming/libming
https://github.com/libming/libming/commit/2be22fcf56a223dafe8de0e8a20fe20e8bbdb0b9
None
1
decompileAction(int n, SWF_ACTION *actions, int maxn) { if( n > maxn ) SWF_error("Action overflow!!"); #ifdef DEBUG fprintf(stderr,"%d:\tACTION[%3.3d]: %s\n", actions[n].SWF_ACTIONRECORD.Offset, n, actionName(actions[n].SWF_ACTIONRECORD.ActionCode)); #endif switch(actions[n].SWF_ACTIONR...
125,508,971,660,947,630,000,000,000,000,000,000,000
decompile.c
35,225,409,819,271,564,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2019-12982
Ming (aka libming) 0.4.8 has a heap buffer overflow and underflow in the decompileCAST function in util/decompile.c in libutil.a. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted SWF file.
https://nvd.nist.gov/vuln/detail/CVE-2019-12982
4,026
libming
3dc0338e4a36a3092720ebaa5b908ba3dca467d9
https://github.com/libming/libming
https://github.com/libming/libming/commit/3dc0338e4a36a3092720ebaa5b908ba3dca467d9
None
1
SWFShape_setLeftFillStyle(SWFShape shape, SWFFillStyle fill) { ShapeRecord record; int idx; if ( shape->isEnded || shape->isMorph ) return; if(fill == NOFILL) { record = addStyleRecord(shape); record.record.stateChange->leftFill = 0; record.record.stateChange->flags |= SWF_SHAPE_FILLSTYLE0FLAG; return...
22,722,777,434,440,266,000,000,000,000,000,000,000
shape.c
50,076,327,699,061,760,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2019-12981
Ming (aka libming) 0.4.8 has an "fill overflow" vulnerability in the function SWFShape_setLeftFillStyle in blocks/shape.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-12981
4,027
libming
2223f7a1e431455a1411bee77c90db94a6f8e8fe
https://github.com/libming/libming
https://github.com/libming/libming/commit/2223f7a1e431455a1411bee77c90db94a6f8e8fe
None
1
SWFInput_readSBits(SWFInput input, int number) { int num = SWFInput_readBits(input, number); if ( num & (1<<(number-1)) ) return num - (1<<number); else return num; }
263,739,449,907,377,670,000,000,000,000,000,000,000
None
null
[ "CWE-190" ]
CVE-2019-12980
In Ming (aka libming) 0.4.8, there is an integer overflow (caused by an out-of-range left shift) in the SWFInput_readSBits function in blocks/input.c. Remote attackers could leverage this vulnerability to cause a denial-of-service via a crafted swf file.
https://nvd.nist.gov/vuln/detail/CVE-2019-12980
4,028
openjpeg
8ee335227bbcaf1614124046aa25e53d67b11ec3
https://github.com/uclouvain/openjpeg
https://github.com/uclouvain/openjpeg/commit/8ee335227bbcaf1614124046aa25e53d67b11ec3
convertbmp: detect invalid file dimensions early width/length dimensions read from bmp headers are not necessarily valid. For instance they may have been maliciously set to very large values with the intention to cause DoS (large memory allocation, stack overflow). In these cases we want to detect the invalid size as ...
1
static OPJ_BOOL bmp_read_rle8_data(FILE* IN, OPJ_UINT8* pData, OPJ_UINT32 stride, OPJ_UINT32 width, OPJ_UINT32 height) { OPJ_UINT32 x, y; OPJ_UINT8 *pix; const OPJ_UINT8 *beyond; beyond = pData + stride * height; pix = pData; x = y = 0U; while (...
85,511,402,824,178,120,000,000,000,000,000,000,000
convertbmp.c
112,168,728,826,446,540,000,000,000,000,000,000,000
[ "CWE-400" ]
CVE-2019-12973
In OpenJPEG 2.3.1, there is excessive iteration in the opj_t1_encode_cblks function of openjp2/t1.c. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted bmp file. This issue is similar to CVE-2018-6616.
https://nvd.nist.gov/vuln/detail/CVE-2019-12973
4,031
linux
6ff7b060535e87c2ae14dd8548512abfdda528fb
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6ff7b060535e87c2ae14dd8548512abfdda528fb
mdio_bus: Fix use-after-free on device_register fails KASAN has found use-after-free in fixed_mdio_bus_init, commit 0c692d07842a ("drivers/net/phy/mdio_bus.c: call put_device on device_register() failure") call put_device() while device_register() fails,give up the last reference to the device and allow mdiobus_releas...
1
int __mdiobus_register(struct mii_bus *bus, struct module *owner) { struct mdio_device *mdiodev; int i, err; struct gpio_desc *gpiod; if (NULL == bus || NULL == bus->name || NULL == bus->read || NULL == bus->write) return -EINVAL; BUG_ON(bus->state != MDIOBUS_ALLOCATED && bus->state != MDIOBUS_UNR...
332,319,665,854,404,400,000,000,000,000,000,000,000
mdio_bus.c
24,842,619,289,389,920,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2019-12819
An issue was discovered in the Linux kernel before 5.0. The function __mdiobus_register() in drivers/net/phy/mdio_bus.c calls put_device(), which will trigger a fixed_mdio_bus_init use-after-free. This will cause a denial of service.
https://nvd.nist.gov/vuln/detail/CVE-2019-12819
4,034
linux
58bdd544e2933a21a51eecf17c3f5f94038261b5
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/58bdd544e2933a21a51eecf17c3f5f94038261b5
net: nfc: Fix NULL dereference on nfc_llcp_build_tlv fails KASAN report this: BUG: KASAN: null-ptr-deref in nfc_llcp_build_gb+0x37f/0x540 [nfc] Read of size 3 at addr 0000000000000000 by task syz-executor.0/5401 CPU: 0 PID: 5401 Comm: syz-executor.0 Not tainted 5.0.0-rc7+ #45 Hardware name: QEMU Standard PC (i440FX ...
1
static int nfc_llcp_build_gb(struct nfc_llcp_local *local) { u8 *gb_cur, *version_tlv, version, version_length; u8 *lto_tlv, lto_length; u8 *wks_tlv, wks_length; u8 *miux_tlv, miux_length; __be16 wks = cpu_to_be16(local->local_wks); u8 gb_len = 0; int ret = 0; version = LLCP_VERSION_11; version_tlv = ...
276,762,293,576,136,130,000,000,000,000,000,000,000
llcp_core.c
30,611,209,877,008,776,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2019-12818
An issue was discovered in the Linux kernel before 4.20.15. The nfc_llcp_build_tlv function in net/nfc/llcp_commands.c may return NULL. If the caller does not check for this, it will trigger a NULL pointer dereference. This will cause denial of service. This affects nfc_llcp_build_gb in net/nfc/llcp_core.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-12818
4,038
bubblewrap
efc89e3b939b4bde42c10f065f6b7b02958ed50e
https://github.com/containers/bubblewrap
https://github.com/projectatomic/bubblewrap/commit/efc89e3b939b4bde42c10f065f6b7b02958ed50e
Don't create our own temporary mount point for pivot_root An attacker could pre-create /tmp/.bubblewrap-$UID and make it a non-directory, non-symlink (in which case mounting our tmpfs would fail, causing denial of service), or make it a symlink under their control (potentially allowing bad things if the protected_syml...
1
main (int argc, char **argv) { mode_t old_umask; cleanup_free char *base_path = NULL; int clone_flags; char *old_cwd = NULL; pid_t pid; int event_fd = -1; int child_wait_fd = -1; int setup_finished_pipe[] = {-1, -1}; const char *new_cwd; uid_t ns_uid; gid_t ns_gid; struct stat sbu...
41,291,708,509,448,165,000,000,000,000,000,000,000
bubblewrap.c
67,742,006,587,564,080,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2019-12439
bubblewrap.c in Bubblewrap before 0.3.3 misuses temporary directories in /tmp as a mount point. In some particular configurations (related to XDG_RUNTIME_DIR), a local attacker may abuse this flaw to prevent other users from executing bubblewrap or potentially execute code.
https://nvd.nist.gov/vuln/detail/CVE-2019-12439
4,039
miniupnp
cb8a02af7a5677cf608e86d57ab04241cf34e24f
https://github.com/miniupnp/miniupnp
https://github.com/miniupnp/miniupnp/commit/cb8a02af7a5677cf608e86d57ab04241cf34e24f
pcpserver.c: copyIPv6IfDifferent() check for NULL src argument
1
static void copyIPv6IfDifferent(void * dest, const void * src) { if(dest != src) { memcpy(dest, src, sizeof(struct in6_addr)); } }
329,926,470,648,283,770,000,000,000,000,000,000,000
pcpserver.c
144,192,023,563,153,640,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2019-12111
A Denial Of Service vulnerability in MiniUPnP MiniUPnPd through 2.1 exists due to a NULL pointer dereference in copyIPv6IfDifferent in pcpserver.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-12111
4,040
miniupnp
f321c2066b96d18afa5158dfa2d2873a2957ef38
https://github.com/miniupnp/miniupnp
https://github.com/miniupnp/miniupnp/commit/f321c2066b96d18afa5158dfa2d2873a2957ef38
upnp_redirect(): accept NULL desc argument
1
upnp_redirect(const char * rhost, unsigned short eport, const char * iaddr, unsigned short iport, const char * protocol, const char * desc, unsigned int leaseduration) { int proto, r; char iaddr_old[32]; char rhost_old[32]; unsigned short iport_old; struct in_addr address;...
46,344,349,630,705,210,000,000,000,000,000,000,000
upnpredirect.c
92,609,255,182,890,540,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2019-12110
An AddPortMapping Denial Of Service vulnerability in MiniUPnP MiniUPnPd through 2.1 exists due to a NULL pointer dereference in upnpredirect.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-12110
4,041
miniupnp
13585f15c7f7dc28bbbba1661efb280d530d114c
https://github.com/miniupnp/miniupnp
https://github.com/miniupnp/miniupnp/commit/13585f15c7f7dc28bbbba1661efb280d530d114c
GetOutboundPinholeTimeout: check args
1
GetOutboundPinholeTimeout(struct upnphttp * h, const char * action, const char * ns) { int r; static const char resp[] = "<u:%sResponse " "xmlns:u=\"%s\">" "<OutboundPinholeTimeout>%d</OutboundPinholeTimeout>" "</u:%sResponse>"; char body[512]; int bodylen; struct NameValueParserData data; char * int_ip...
158,973,129,754,763,100,000,000,000,000,000,000,000
upnpsoap.c
217,760,622,990,765,140,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2019-12109
A Denial Of Service vulnerability in MiniUPnP MiniUPnPd through 2.1 exists due to a NULL pointer dereference in GetOutboundPinholeTimeout in upnpsoap.c for rem_port.
https://nvd.nist.gov/vuln/detail/CVE-2019-12109
4,042
miniupnp
cd506a67e174a45c6a202eff182a712955ed6d6f
https://github.com/miniupnp/miniupnp
https://github.com/miniupnp/miniupnp/commit/cd506a67e174a45c6a202eff182a712955ed6d6f
updateDevice() remove element from the list when realloc fails
1
updateDevice(const struct header * headers, time_t t) { struct device ** pp = &devlist; struct device * p = *pp; /* = devlist; */ while(p) { if( p->headers[HEADER_NT].l == headers[HEADER_NT].l && (0==memcmp(p->headers[HEADER_NT].p, headers[HEADER_NT].p, headers[HEADER_NT].l)) && p->headers[HEADER_USN].l ...
221,734,464,000,496,170,000,000,000,000,000,000,000
minissdpd.c
279,070,277,622,417,970,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2019-12106
The updateDevice function in minissdpd.c in MiniUPnP MiniSSDPd 1.4 and 1.5 allows a remote attacker to crash the process due to a Use After Free vulnerability.
https://nvd.nist.gov/vuln/detail/CVE-2019-12106
4,043
heimdal
2f7f3d9960aa6ea21358bdf3687cee5149aa35cf
https://github.com/heimdal/heimdal
https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf
CVE-2019-12098: krb5: always confirm PA-PKINIT-KX for anon PKINIT RFC8062 Section 7 requires verification of the PA-PKINIT-KX key excahnge when anonymous PKINIT is used. Failure to do so can permit an active attacker to become a man-in-the-middle. Introduced by a1ef548600c5bb51cf52a9a9ea12676506ede19f. First tagged...
1
krb5_init_creds_step(krb5_context context, krb5_init_creds_context ctx, krb5_data *in, krb5_data *out, krb5_krbhst_info *hostinfo, unsigned int *flags) { krb5_error_code ret; size_t len = 0; size_t size; AS_REQ req2; krb5_data_zero(out); if (ctx->as_req.req_b...
261,068,004,113,217,340,000,000,000,000,000,000,000
init_creds_pw.c
312,349,701,812,782,430,000,000,000,000,000,000,000
[ "CWE-320" ]
CVE-2019-12098
In the client side of Heimdal before 7.6.0, failure to verify anonymous PKINIT PA-PKINIT-KX key exchange permits a man-in-the-middle attack. This issue is in krb5_init_creds_step in lib/krb5/init_creds_pw.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-12098
4,049
linux
a1616a5ac99ede5d605047a9012481ce7ff18b16
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a1616a5ac99ede5d605047a9012481ce7ff18b16
Bluetooth: hidp: fix buffer overflow Struct ca is copied from userspace. It is not checked whether the "name" field is NULL terminated, which allows local users to obtain potentially sensitive information from kernel stack memory, via a HIDPCONNADD command. This vulnerability is similar to CVE-2011-1079. Signed-off-...
1
static int do_hidp_sock_ioctl(struct socket *sock, unsigned int cmd, void __user *argp) { struct hidp_connadd_req ca; struct hidp_conndel_req cd; struct hidp_connlist_req cl; struct hidp_conninfo ci; struct socket *csock; struct socket *isock; int err; BT_DBG("cmd %x arg %p", cmd, argp); switch (cmd) { case...
190,362,082,081,650,330,000,000,000,000,000,000,000
None
null
[ "CWE-77" ]
CVE-2019-11884
The do_hidp_sock_ioctl function in net/bluetooth/hidp/sock.c in the Linux kernel before 5.0.15 allows a local user to obtain potentially sensitive information from kernel stack memory via a HIDPCONNADD command, because a name field may not end with a '\0' character.
https://nvd.nist.gov/vuln/detail/CVE-2019-11884
4,052
linux
cb66ddd156203daefb8d71158036b27b0e2caf63
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/cb66ddd156203daefb8d71158036b27b0e2caf63
net: rds: force to destroy connection if t_sock is NULL in rds_tcp_kill_sock(). When it is to cleanup net namespace, rds_tcp_exit_net() will call rds_tcp_kill_sock(), if t_sock is NULL, it will not call rds_conn_destroy(), rds_conn_path_destroy() and rds_tcp_conn_free() to free connection, and the worker cp_conn_w is ...
1
static void rds_tcp_kill_sock(struct net *net) { struct rds_tcp_connection *tc, *_tc; LIST_HEAD(tmp_list); struct rds_tcp_net *rtn = net_generic(net, rds_tcp_netid); struct socket *lsock = rtn->rds_tcp_listen_sock; rtn->rds_tcp_listen_sock = NULL; rds_tcp_listen_stop(lsock, &rtn->rds_tcp_accept_w); spin_lock_ir...
8,107,321,106,413,303,000,000,000,000,000,000,000
tcp.c
218,691,657,463,008,300,000,000,000,000,000,000,000
[ "CWE-362" ]
CVE-2019-11815
An issue was discovered in rds_tcp_kill_sock in net/rds/tcp.c in the Linux kernel before 5.0.8. There is a race condition leading to a use-after-free, related to net namespace cleanup.
https://nvd.nist.gov/vuln/detail/CVE-2019-11815
4,053
linux
401e7e88d4ef80188ffa07095ac00456f901b8c4
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/401e7e88d4ef80188ffa07095ac00456f901b8c4
ipmi_si: fix use-after-free of resource->name When we excute the following commands, we got oops rmmod ipmi_si cat /proc/ioports [ 1623.482380] Unable to handle kernel paging request at virtual address ffff00000901d478 [ 1623.482382] Mem abort info: [ 1623.482383] ESR = 0x96000007 [ 1623.482385] Exception class =...
1
static int try_smi_init(struct smi_info *new_smi) { int rv = 0; int i; char *init_name = NULL; pr_info("Trying %s-specified %s state machine at %s address 0x%lx, slave address 0x%x, irq %d\n", ipmi_addr_src_to_str(new_smi->io.addr_source), si_to_str[new_smi->io.si_type], addr_space_to_str[new_smi->io.addr_ty...
165,864,638,601,569,780,000,000,000,000,000,000,000
ipmi_si_intf.c
224,449,302,204,137,970,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2019-11811
An issue was discovered in the Linux kernel before 5.0.4. There is a use-after-free upon attempted read access to /proc/ioports after the ipmi_si module is removed, related to drivers/char/ipmi/ipmi_si_intf.c, drivers/char/ipmi/ipmi_si_mem_io.c, and drivers/char/ipmi/ipmi_si_port_io.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-11811
4,054
linux
401e7e88d4ef80188ffa07095ac00456f901b8c4
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/401e7e88d4ef80188ffa07095ac00456f901b8c4
ipmi_si: fix use-after-free of resource->name When we excute the following commands, we got oops rmmod ipmi_si cat /proc/ioports [ 1623.482380] Unable to handle kernel paging request at virtual address ffff00000901d478 [ 1623.482382] Mem abort info: [ 1623.482383] ESR = 0x96000007 [ 1623.482385] Exception class =...
1
int ipmi_si_mem_setup(struct si_sm_io *io) { unsigned long addr = io->addr_data; int mapsize, idx; if (!addr) return -ENODEV; io->io_cleanup = mem_cleanup; /* * Figure out the actual readb/readw/readl/etc routine to use based * upon the register size. */ switch (io->regsize) { case 1: ...
268,861,984,312,861,500,000,000,000,000,000,000,000
ipmi_si_mem_io.c
76,869,389,163,316,280,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2019-11811
An issue was discovered in the Linux kernel before 5.0.4. There is a use-after-free upon attempted read access to /proc/ioports after the ipmi_si module is removed, related to drivers/char/ipmi/ipmi_si_intf.c, drivers/char/ipmi/ipmi_si_mem_io.c, and drivers/char/ipmi/ipmi_si_port_io.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-11811
4,055
linux
401e7e88d4ef80188ffa07095ac00456f901b8c4
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/401e7e88d4ef80188ffa07095ac00456f901b8c4
ipmi_si: fix use-after-free of resource->name When we excute the following commands, we got oops rmmod ipmi_si cat /proc/ioports [ 1623.482380] Unable to handle kernel paging request at virtual address ffff00000901d478 [ 1623.482382] Mem abort info: [ 1623.482383] ESR = 0x96000007 [ 1623.482385] Exception class =...
1
int ipmi_si_port_setup(struct si_sm_io *io) { unsigned int addr = io->addr_data; int idx; if (!addr) return -ENODEV; io->io_cleanup = port_cleanup; /* * Figure out the actual inb/inw/inl/etc routine to use based * upon the register size. */ switch (io->regsize) { case 1: io->inputb = p...
46,989,818,832,240,890,000,000,000,000,000,000,000
ipmi_si_port_io.c
125,840,401,664,174,400,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2019-11811
An issue was discovered in the Linux kernel before 5.0.4. There is a use-after-free upon attempted read access to /proc/ioports after the ipmi_si module is removed, related to drivers/char/ipmi/ipmi_si_intf.c, drivers/char/ipmi/ipmi_si_mem_io.c, and drivers/char/ipmi/ipmi_si_port_io.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-11811
4,056
linux
bcf3b67d16a4c8ffae0aa79de5853435e683945c
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/bcf3b67d16a4c8ffae0aa79de5853435e683945c
scsi: megaraid_sas: return error when create DMA pool failed when create DMA pool for cmd frames failed, we should return -ENOMEM, instead of 0. In some case in: megasas_init_adapter_fusion() -->megasas_alloc_cmds() -->megasas_create_frame_pool create DMA pool failed, --> megasas_fre...
1
int megasas_alloc_cmds(struct megasas_instance *instance) { int i; int j; u16 max_cmd; struct megasas_cmd *cmd; max_cmd = instance->max_mfi_cmds; /* * instance->cmd_list is an array of struct megasas_cmd pointers. * Allocate the dynamic array first and then allocate individual * commands. */ instance->...
34,156,285,142,247,750,000,000,000,000,000,000,000
megaraid_sas_base.c
129,635,302,641,523,000,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2019-11810
An issue was discovered in the Linux kernel before 5.0.7. A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of Service, related to a use-after-free.
https://nvd.nist.gov/vuln/detail/CVE-2019-11810
4,057
linux
04f5866e41fb70690e28397487d8bd8eea7d712a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/04f5866e41fb70690e28397487d8bd8eea7d712a
coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping The core dumping code has always run without holding the mmap_sem for writing, despite that is the only way to ensure that the entire vma layout will not change from under it. Only using some signal serialization on the processes bel...
1
void uverbs_user_mmap_disassociate(struct ib_uverbs_file *ufile) { struct rdma_umap_priv *priv, *next_priv; lockdep_assert_held(&ufile->hw_destroy_rwsem); while (1) { struct mm_struct *mm = NULL; /* Get an arbitrary mm pointer that hasn't been cleaned yet */ mutex_lock(&ufile->umap_lock); while (!list_emp...
211,043,662,189,963,800,000,000,000,000,000,000,000
uverbs_main.c
9,360,109,907,240,654,000,000,000,000,000,000,000
[ "CWE-362" ]
CVE-2019-11599
The coredump implementation in the Linux kernel before 5.0.10 does not use locking or other mechanisms to prevent vma layout or vma flags changes while it runs, which allows local users to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a race condition w...
https://nvd.nist.gov/vuln/detail/CVE-2019-11599
4,058
linux
04f5866e41fb70690e28397487d8bd8eea7d712a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/04f5866e41fb70690e28397487d8bd8eea7d712a
coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping The core dumping code has always run without holding the mmap_sem for writing, despite that is the only way to ensure that the entire vma layout will not change from under it. Only using some signal serialization on the processes bel...
1
static ssize_t clear_refs_write(struct file *file, const char __user *buf, size_t count, loff_t *ppos) { struct task_struct *task; char buffer[PROC_NUMBUF]; struct mm_struct *mm; struct vm_area_struct *vma; enum clear_refs_types type; struct mmu_gather tlb; int itype; int rv; memset(buffer, 0, sizeof(buff...
91,277,826,670,393,980,000,000,000,000,000,000,000
task_mmu.c
286,334,833,757,047,100,000,000,000,000,000,000,000
[ "CWE-362" ]
CVE-2019-11599
The coredump implementation in the Linux kernel before 5.0.10 does not use locking or other mechanisms to prevent vma layout or vma flags changes while it runs, which allows local users to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a race condition w...
https://nvd.nist.gov/vuln/detail/CVE-2019-11599
4,062
WavPack
bc6cba3f552c44565f7f1e66dc1580189addb2b4
https://github.com/dbry/WavPack
https://github.com/dbry/WavPack/commit/bc6cba3f552c44565f7f1e66dc1580189addb2b4
issue #67: make sure sample rate is specified and non-zero in DFF files
1
int ParseDsdiffHeaderConfig (FILE *infile, char *infilename, char *fourcc, WavpackContext *wpc, WavpackConfig *config) { int64_t infilesize, total_samples; DFFFileHeader dff_file_header; DFFChunkHeader dff_chunk_header; uint32_t bcount; infilesize = DoGetFileSize (infile); memcpy (&dff_file_hea...
165,237,717,197,980,300,000,000,000,000,000,000,000
None
null
[ "CWE-824" ]
CVE-2019-11498
WavpackSetConfiguration64 in pack_utils.c in libwavpack.a in WavPack through 5.1.0 has a "Conditional jump or move depends on uninitialised value" condition, which might allow attackers to cause a denial of service (application crash) via a DFF file that lacks valid sample-rate data.
https://nvd.nist.gov/vuln/detail/CVE-2019-11498
4,063
ImageMagick6
f663dfb8431c97d95682a2b533cca1c8233d21b4
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/f663dfb8431c97d95682a2b533cca1c8233d21b4
https://github.com/ImageMagick/ImageMagick/issues/1546
1
static Image *ReadXWDImage(const ImageInfo *image_info,ExceptionInfo *exception) { #define CheckOverflowException(length,width,height) \ (((height) != 0) && ((length)/((size_t) height) != ((size_t) width))) char *comment; Image *image; IndexPacket index; int x_status; MagickBooleanType ...
335,197,007,716,929,300,000,000,000,000,000,000,000
xwd.c
75,153,857,084,258,080,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2019-11472
ReadXWDImage in coders/xwd.c in the XWD image parsing component of ImageMagick 7.0.8-41 Q16 allows attackers to cause a denial-of-service (divide-by-zero error) by crafting an XWD image file in which the header indicates neither LSB first nor MSB first.
https://nvd.nist.gov/vuln/detail/CVE-2019-11472
4,064
ImageMagick
e3cdce6fe12193f235b8c0ae5efe6880a25eb957
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/e3cdce6fe12193f235b8c0ae5efe6880a25eb957
https://github.com/ImageMagick/ImageMagick/issues/1472
1
static Image *ReadCINImage(const ImageInfo *image_info,ExceptionInfo *exception) { #define MonoColorType 1 #define RGBColorType 3 char property[MagickPathExtent]; CINInfo cin; const unsigned char *pixels; Image *image; MagickBooleanType status; MagickOffsetType offset; Qua...
59,197,480,976,158,010,000,000,000,000,000,000,000
cin.c
292,378,594,999,413,330,000,000,000,000,000,000,000
[ "CWE-400" ]
CVE-2019-11470
The cineon parsing component in ImageMagick 7.0.8-26 Q16 allows attackers to cause a denial-of-service (uncontrolled resource consumption) by crafting a Cineon image with an incorrect claimed image size. This occurs because ReadCINImage in coders/cin.c lacks a check for insufficient image data in a file.
https://nvd.nist.gov/vuln/detail/CVE-2019-11470
4,065
libarchive
ba641f73f3d758d9032b3f0e5597a9c6e593a505
https://github.com/libarchive/libarchive
https://github.com/libarchive/libarchive/commit/ba641f73f3d758d9032b3f0e5597a9c6e593a505
Fix typo in preprocessor macro in archive_read_format_zip_cleanup() Frees lzma_stream on cleanup() Fixes #1165
1
archive_read_format_zip_cleanup(struct archive_read *a) { struct zip *zip; struct zip_entry *zip_entry, *next_zip_entry; zip = (struct zip *)(a->format->data); #ifdef HAVE_ZLIB_H if (zip->stream_valid) inflateEnd(&zip->stream); #endif #if HAVA_LZMA_H && HAVE_LIBLZMA if (zip->zipx_lzma_valid) { lzma_...
281,804,672,906,394,530,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2019-11463
A memory leak in archive_read_format_zip_cleanup in archive_read_support_format_zip.c in libarchive 3.3.4-dev allows remote attackers to cause a denial of service via a crafted ZIP file because of a HAVE_LZMA_H typo. NOTE: this only affects users who downloaded the development code from GitHub. Users of the product's o...
https://nvd.nist.gov/vuln/detail/CVE-2019-11463
4,072
mujs
1e5479084bc9852854feb1ba9bf68b52cd127e02
https://github.com/ccxvii/mujs
https://github.com/ccxvii/mujs/commit/1e5479084bc9852854feb1ba9bf68b52cd127e02
Bug 700947: Add missing ENDTRY opcode in try/catch/finally byte code. In one of the code branches in handling exceptions in the catch block we forgot to call the ENDTRY opcode to pop the inner hidden try. This leads to an unbalanced exception stack which can cause a crash due to us jumping to a stack frame that has al...
1
static void ctrycatchfinally(JF, js_Ast *trystm, js_Ast *catchvar, js_Ast *catchstm, js_Ast *finallystm) { int L1, L2, L3; L1 = emitjump(J, F, OP_TRY); { /* if we get here, we have caught an exception in the try block */ L2 = emitjump(J, F, OP_TRY); { /* if we get here, we have caught an exception in the ca...
129,287,468,632,431,320,000,000,000,000,000,000,000
jscompile.c
140,135,126,533,618,000,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2019-11412
An issue was discovered in Artifex MuJS 1.0.5. jscompile.c can cause a denial of service (invalid stack-frame jump) because it lacks an ENDTRY opcode call.
https://nvd.nist.gov/vuln/detail/CVE-2019-11412
4,074
mujs
da632ca08f240590d2dec786722ed08486ce1be6
https://github.com/ccxvii/mujs
https://github.com/ccxvii/mujs/commit/da632ca08f240590d2dec786722ed08486ce1be6
Bug 700938: Fix stack overflow in numtostr as used by Number#toFixed(). 32 is not enough to fit sprintf("%.20f", 1e20). We need at least 43 bytes to fit that format. Bump the static buffer size.
1
static void numtostr(js_State *J, const char *fmt, int w, double n) { char buf[32], *e; sprintf(buf, fmt, w, n); e = strchr(buf, 'e'); if (e) { int exp = atoi(e+1); sprintf(e, "e%+d", exp); } js_pushstring(J, buf); }
19,501,154,810,031,546,000,000,000,000,000,000,000
jsnumber.c
94,596,169,872,171,320,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2019-11411
An issue was discovered in Artifex MuJS 1.0.5. The Number#toFixed() and numtostr implementations in jsnumber.c have a stack-based buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2019-11411
4,075
FFmpeg
d227ed5d598340e719eff7156b1aa0a4469e9a6a
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/d227ed5d598340e719eff7156b1aa0a4469e9a6a
avcodec/mpeg4videodec: Check idx in mpeg4_decode_studio_block() Fixes: Out of array access Fixes: 13500/clusterfuzz-testcase-minimized-ffmpeg_AV_CODEC_ID_MPEG4_fuzzer-5769760178962432 Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/projects/ffmpeg Reviewed-by: Kieran Kunhya <kieran...
1
static int mpeg4_decode_studio_block(MpegEncContext *s, int32_t block[64], int n) { Mpeg4DecContext *ctx = s->avctx->priv_data; int cc, dct_dc_size, dct_diff, code, j, idx = 1, group = 0, run = 0, additional_code_len, sign, mismatch; VLC *cur_vlc = &ctx->studio_intra_tab[0]; uint8_t *const scan...
148,338,294,310,981,680,000,000,000,000,000,000,000
mpeg4videodec.c
190,961,130,653,831,770,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-11339
The studio profile decoder in libavcodec/mpeg4videodec.c in FFmpeg 4.0 before 4.0.4 and 4.1 before 4.1.2 allows remote attackers to cause a denial of service (out-of-array access) or possibly have unspecified other impact via crafted MPEG-4 video data.
https://nvd.nist.gov/vuln/detail/CVE-2019-11339
4,077
gpac
f36525c5beafb78959c3a07d6622c9028de348da
https://github.com/gpac/gpac
https://github.com/gpac/gpac/commit/f36525c5beafb78959c3a07d6622c9028de348da
None
1
GF_Err gf_bin128_parse(const char *string, bin128 value) { u32 len; u32 i=0; if (!strnicmp(string, "0x", 2)) string += 2; len = (u32) strlen(string); if (len >= 32) { u32 j; for (j=0; j<len; j+=2) { u32 v; char szV[5]; while (string[j] && !isalnum(string[j])) j++; if (!string[j]) break; ...
205,544,941,712,958,340,000,000,000,000,000,000,000
os_divers.c
23,454,987,379,422,535,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2019-11222
gf_bin128_parse in utils/os_divers.c in GPAC 0.7.1 has a buffer overflow issue for the crypt feature when encountering a crafted_drm_file.xml file.
https://nvd.nist.gov/vuln/detail/CVE-2019-11222
4,079
ImageMagick
edc7d3035883ddca8413e4fe7689aa2e579ef04a
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/edc7d3035883ddca8413e4fe7689aa2e579ef04a
...
1
MagickExport int LocaleLowercase(const int c) { #if defined(MAGICKCORE_LOCALE_SUPPORT) if (c_locale != (locale_t) NULL) return(tolower_l((int) ((unsigned char) c),c_locale)); #endif return(tolower((int) ((unsigned char) c))); }
293,889,575,556,524,600,000,000,000,000,000,000,000
locale.c
168,293,578,099,613,210,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-10714
LocaleLowercase in MagickCore/locale.c in ImageMagick before 7.0.8-32 allows out-of-bounds access, leading to a SIGSEGV.
https://nvd.nist.gov/vuln/detail/CVE-2019-10714