idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
3,861 | linux | 5af10dfd0afc559bb4b0f7e3e8227a1578333995 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/5af10dfd0afc559bb4b0f7e3e8227a1578333995 | userfaultfd: hugetlbfs: remove superfluous page unlock in VM_SHARED case
huge_add_to_page_cache->add_to_page_cache implicitly unlocks the page
before returning in case of errors.
The error returned was -EEXIST by running UFFDIO_COPY on a non-hole
offset of a VM_SHARED hugetlbfs mapping. It was an userland bug that
t... | 1 | int hugetlb_mcopy_atomic_pte(struct mm_struct *dst_mm,
pte_t *dst_pte,
struct vm_area_struct *dst_vma,
unsigned long dst_addr,
unsigned long src_addr,
struct page **pagep)
{
int vm_shared = dst_vma->vm_flags & VM_SHARED;
struct hstate *h = hstate_vma(dst_vma);
pte_t _dst_pte;
spin... | 78,099,884,844,578,590,000,000,000,000,000,000,000 | hugetlb.c | 337,464,151,745,402,500,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2017-15127 | A flaw was found in the hugetlb_mcopy_atomic_pte function in mm/hugetlb.c in the Linux kernel before 4.13. A superfluous implicit page unlock for VM_SHARED hugetlbfs mapping could trigger a local denial of service (BUG). | https://nvd.nist.gov/vuln/detail/CVE-2017-15127 |
3,865 | knc | f237f3e09ecbaf59c897f5046538a7b1a3fa40c1 | https://github.com/elric1/knc | https://github.com/elric1/knc/commit/f237f3e09ecbaf59c897f5046538a7b1a3fa40c1 | knc: fix a couple of memory leaks.
One of these can be remotely triggered during the authentication
phase which leads to a remote DoS possibility.
Pointed out by: Imre Rad <radimre83@gmail.com> | 1 | read_packet(int fd, gss_buffer_t buf, int timeout, int first)
{
int ret;
static uint32_t len = 0;
static char len_buf[4];
static int len_buf_pos = 0;
static char * tmpbuf = 0;
static int tmpbuf_pos = 0;
if (first) {
len_buf_pos = 0;
return -2;
}
if (len_buf_pos < 4) {
ret = timed_read(fd, &len_... | 224,824,590,746,883,080,000,000,000,000,000,000,000 | gssstdio.c | 8,886,790,502,415,457,000,000,000,000,000,000,000 | [
"CWE-400"
] | CVE-2017-9732 | The read_packet function in knc (Kerberised NetCat) before 1.11-1 is vulnerable to denial of service (memory exhaustion) that can be exploited remotely without authentication, possibly affecting another services running on the targeted host. | https://nvd.nist.gov/vuln/detail/CVE-2017-9732 |
3,866 | util-linux | dffab154d29a288aa171ff50263ecc8f2e14a891 | https://github.com/karelzak/util-linux | https://github.com/karelzak/util-linux/commit/dffab154d29a288aa171ff50263ecc8f2e14a891 | su: properly clear child PID
Reported-by: Tobias Stöckmann <tobias@stoeckmann.org>
Signed-off-by: Karel Zak <kzak@redhat.com> | 1 | create_watching_parent (void)
{
pid_t child;
sigset_t ourset;
struct sigaction oldact[3];
int status = 0;
int retval;
retval = pam_open_session (pamh, 0);
if (is_pam_failure(retval))
{
cleanup_pam (retval);
errx (EXIT_FAILURE, _("cannot open session: %s"),
pam_strerror (pamh, retval... | 132,373,565,874,554,270,000,000,000,000,000,000,000 | su-common.c | 260,033,572,435,501,420,000,000,000,000,000,000,000 | [
"CWE-362"
] | CVE-2017-2616 | A race condition was found in util-linux before 2.32.1 in the way su handled the management of child processes. A local authenticated attacker could use this flaw to kill other processes with root privileges under specific conditions. | https://nvd.nist.gov/vuln/detail/CVE-2017-2616 |
3,877 | pacemaker | 5d71e65049 | https://github.com/ClusterLabs/pacemaker | https://github.com/ClusterLabs/pacemaker/commit/5d71e65049 | High: libcrmcommon: fix CVE-2016-7035 (improper IPC guarding)
It was discovered that at some not so uncommon circumstances, some
pacemaker daemons could be talked to, via libqb-facilitated IPC, by
unprivileged clients due to flawed authorization decision. Depending
on the capabilities of affected daemons, this might ... | 1 | crm_client_new(qb_ipcs_connection_t * c, uid_t uid_client, gid_t gid_client)
{
static uid_t uid_server = 0;
static gid_t gid_cluster = 0;
crm_client_t *client = NULL;
CRM_LOG_ASSERT(c);
if (c == NULL) {
return NULL;
}
if (gid_cluster == 0) {
uid_server = getuid();
... | 332,194,409,869,094,700,000,000,000,000,000,000,000 | ipc.c | 236,018,087,578,267,460,000,000,000,000,000,000,000 | [
"CWE-285"
] | CVE-2016-7035 | An authorization flaw was found in Pacemaker before 1.1.16, where it did not properly guard its IPC interface. An attacker with an unprivileged account on a Pacemaker node could use this flaw to, for example, force the Local Resource Manager daemon to execute a script as root and thereby gain root access on the machine... | https://nvd.nist.gov/vuln/detail/CVE-2016-7035 |
3,878 | libtiff | 391e77fcd217e78b2c51342ac3ddb7100ecacdd2 | https://github.com/vadz/libtiff | https://github.com/vadz/libtiff/commit/391e77fcd217e78b2c51342ac3ddb7100ecacdd2 | * libtiff/tif_pixarlog.c: fix potential buffer write overrun in
PixarLogDecode() on corrupted/unexpected images (reported by Mathias Svensson) | 1 | PixarLogDecode(TIFF* tif, uint8* op, tmsize_t occ, uint16 s)
{
static const char module[] = "PixarLogDecode";
TIFFDirectory *td = &tif->tif_dir;
PixarLogState* sp = DecoderState(tif);
tmsize_t i;
tmsize_t nsamples;
int llen;
uint16 *up;
switch (sp->user_datafmt) {
case PIXARLOGDATAFMT_FLOAT:
nsamples = occ ... | 310,103,018,809,032,760,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2016-5314 | Buffer overflow in the PixarLogDecode function in tif_pixarlog.c in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted TIFF image, as demonstrated by overwriting the vgetparent function pointer with rgb2ycbcr. | https://nvd.nist.gov/vuln/detail/CVE-2016-5314 |
3,885 | linux | 0048b4837affd153897ed1222283492070027aa9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0048b4837affd153897ed1222283492070027aa9 | blk-mq: fix race between timeout and freeing request
Inside timeout handler, blk_mq_tag_to_rq() is called
to retrieve the request from one tag. This way is obviously
wrong because the request can be freed any time and some
fiedds of the request can't be trusted, then kernel oops
might be triggered[1].
Currently wrt. ... | 1 | struct request *blk_mq_tag_to_rq(struct blk_mq_tags *tags, unsigned int tag)
{
struct request *rq = tags->rqs[tag];
/* mq_ctx of flush rq is always cloned from the corresponding req */
struct blk_flush_queue *fq = blk_get_flush_queue(rq->q, rq->mq_ctx);
if (!is_flush_request(rq, fq, tag))
return rq;
return fq-... | 304,211,763,979,747,550,000,000,000,000,000,000,000 | blk-mq.c | 11,469,473,194,685,080,000,000,000,000,000,000,000 | [
"CWE-362"
] | CVE-2015-9016 | In blk_mq_tag_to_rq in blk-mq.c in the upstream kernel, there is a possible use after free due to a race condition when a request has been previously freed by blk_mq_complete_request. This could lead to local escalation of privilege. Product: Android. Versions: Android kernel. Android ID: A-63083046. | https://nvd.nist.gov/vuln/detail/CVE-2015-9016 |
3,887 | libtiff | 3c5eb8b1be544e41d2c336191bc4936300ad7543 | https://github.com/vadz/libtiff | https://github.com/vadz/libtiff/commit/3c5eb8b1be544e41d2c336191bc4936300ad7543 | * libtiff/tif_{unix,vms,win32}.c (_TIFFmalloc): ANSI C does not
require malloc() to return NULL pointer if requested allocation
size is zero. Assure that _TIFFmalloc does. | 1 | _TIFFmalloc(tmsize_t s)
{
return (malloc((size_t) s));
}
| 51,150,050,486,560,425,000,000,000,000,000,000,000 | None | null | [
"CWE-369"
] | CVE-2014-8130 | The _TIFFmalloc function in tif_unix.c in LibTIFF 4.0.3 does not reject a zero size, which allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted TIFF image that is mishandled by the TIFFWriteScanline function in tif_write.c, as demonstrated by tiffdither. | https://nvd.nist.gov/vuln/detail/CVE-2014-8130 |
3,888 | libtiff | 3c5eb8b1be544e41d2c336191bc4936300ad7543 | https://github.com/vadz/libtiff | https://github.com/vadz/libtiff/commit/3c5eb8b1be544e41d2c336191bc4936300ad7543 | * libtiff/tif_{unix,vms,win32}.c (_TIFFmalloc): ANSI C does not
require malloc() to return NULL pointer if requested allocation
size is zero. Assure that _TIFFmalloc does. | 1 | _TIFFmalloc(tsize_t s)
{
return (malloc((size_t) s));
}
| 163,740,521,083,677,580,000,000,000,000,000,000,000 | None | null | [
"CWE-369"
] | CVE-2014-8130 | The _TIFFmalloc function in tif_unix.c in LibTIFF 4.0.3 does not reject a zero size, which allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted TIFF image that is mishandled by the TIFFWriteScanline function in tif_write.c, as demonstrated by tiffdither. | https://nvd.nist.gov/vuln/detail/CVE-2014-8130 |
3,889 | libmspack | 2f084136cfe0d05e5bf5703f3e83c6d955234b4d | https://github.com/kyz/libmspack | https://github.com/kyz/libmspack/commit/2f084136cfe0d05e5bf5703f3e83c6d955234b4d | length checks when looking for control files | 1 | static int chmd_read_headers(struct mspack_system *sys, struct mspack_file *fh,
struct mschmd_header *chm, int entire)
{
unsigned int section, name_len, x, errors, num_chunks;
unsigned char buf[0x54], *chunk = NULL, *name, *p, *end;
struct mschmd_file *fi, *link = NULL;
off_t offset... | 20,608,871,291,788,966,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2019-1010305 | libmspack 0.9.1alpha is affected by: Buffer Overflow. The impact is: Information Disclosure. The component is: function chmd_read_headers() in libmspack(file libmspack/mspack/chmd.c). The attack vector is: the victim must open a specially crafted chm file. The fixed version is: after commit 2f084136cfe0d05e5bf5703f3e83... | https://nvd.nist.gov/vuln/detail/CVE-2019-1010305 |
3,890 | cJSON | be749d7efa7c9021da746e685bd6dec79f9dd99b | https://github.com/DaveGamble/cJSON | https://github.com/DaveGamble/cJSON/commit/be749d7efa7c9021da746e685bd6dec79f9dd99b | Fix crash of cJSON_GetObjectItemCaseSensitive when calling it on arrays | 1 | static cJSON *get_object_item(const cJSON * const object, const char * const name, const cJSON_bool case_sensitive)
{
cJSON *current_element = NULL;
if ((object == NULL) || (name == NULL))
{
return NULL;
}
current_element = object->child;
if (case_sensitive)
{
while ((cu... | 140,993,672,709,749,150,000,000,000,000,000,000,000 | None | null | [
"CWE-754"
] | CVE-2019-1010239 | DaveGamble/cJSON cJSON 1.7.8 is affected by: Improper Check for Unusual or Exceptional Conditions. The impact is: Null dereference, so attack can cause denial of service. The component is: cJSON_GetObjectItemCaseSensitive() function. The attack vector is: crafted json file. The fixed version is: 1.7.9 and later. | https://nvd.nist.gov/vuln/detail/CVE-2019-1010239 |
3,891 | VeraCrypt | f30f9339c9a0b9bbcc6f5ad38804af39db1f479e | https://github.com/veracrypt/VeraCrypt | https://github.com/veracrypt/VeraCrypt/commit/f30f9339c9a0b9bbcc6f5ad38804af39db1f479e | Windows: fix low severity vulnerability in driver that allowed reading 3 bytes of kernel stack memory (with a rare possibility of 25 additional bytes). Reported by Tim Harrison. | 1 | NTSTATUS ProcessMainDeviceControlIrp (PDEVICE_OBJECT DeviceObject, PEXTENSION Extension, PIRP Irp)
{
PIO_STACK_LOCATION irpSp = IoGetCurrentIrpStackLocation (Irp);
NTSTATUS ntStatus;
switch (irpSp->Parameters.DeviceIoControl.IoControlCode)
{
case TC_IOCTL_GET_DRIVER_VERSION:
case TC_IOCTL_LEGACY_GET_DRIVER_VERSI... | 102,220,743,591,744,230,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2019-1010208 | IDRIX, Truecrypt Veracrypt, Truecrypt Prior to 1.23-Hotfix-1 (Veracrypt), all versions (Truecrypt) is affected by: Buffer Overflow. The impact is: Minor information disclosure of kernel stack. The component is: Veracrypt NT Driver (veracrypt.sys). The attack vector is: Locally executed code, IOCTL request to driver. Th... | https://nvd.nist.gov/vuln/detail/CVE-2019-1010208 |
3,892 | libarchive | 8312eaa576014cd9b965012af51bc1f967b12423 | https://github.com/libarchive/libarchive | https://github.com/libarchive/libarchive/commit/8312eaa576014cd9b965012af51bc1f967b12423 | iso9660: Fail when expected Rockridge extensions is missing
A corrupted or malicious ISO9660 image can cause read_CE() to loop
forever.
read_CE() calls parse_rockridge(), expecting a Rockridge extension
to be read. However, parse_rockridge() is structured as a while
loop starting with a sanity check, and if the sanit... | 1 | parse_rockridge(struct archive_read *a, struct file_info *file,
const unsigned char *p, const unsigned char *end)
{
struct iso9660 *iso9660;
iso9660 = (struct iso9660 *)(a->format->data);
while (p + 4 <= end /* Enough space for another entry. */
&& p[0] >= 'A' && p[0] <= 'Z' /* Sanity-check 1st cha... | 54,247,877,453,009,570,000,000,000,000,000,000,000 | archive_read_support_format_iso9660.c | 163,147,012,537,271,200,000,000,000,000,000,000,000 | [
"CWE-400"
] | CVE-2019-1000020 | libarchive version commit 5a98dcf8a86364b3c2c469c85b93647dfb139961 onwards (version v2.8.0 onwards) contains a CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') vulnerability in ISO9660 parser, archive_read_support_format_iso9660.c, read_CE()/parse_rockridge() that can result in DoS by infinite loop. This... | https://nvd.nist.gov/vuln/detail/CVE-2019-1000020 |
3,893 | libarchive | 65a23f5dbee4497064e9bb467f81138a62b0dae1 | https://github.com/libarchive/libarchive | https://github.com/libarchive/libarchive/commit/65a23f5dbee4497064e9bb467f81138a62b0dae1 | 7zip: fix crash when parsing certain archives
Fuzzing with CRCs disabled revealed that a call to get_uncompressed_data()
would sometimes fail to return at least 'minimum' bytes. This can cause
the crc32() invocation in header_bytes to read off into invalid memory.
A specially crafted archive can use this to cause a c... | 1 | get_uncompressed_data(struct archive_read *a, const void **buff, size_t size,
size_t minimum)
{
struct _7zip *zip = (struct _7zip *)a->format->data;
ssize_t bytes_avail;
if (zip->codec == _7Z_COPY && zip->codec2 == (unsigned long)-1) {
/* Copy mode. */
/*
* Note: '1' here is a performance optimizatio... | 172,034,182,329,715,270,000,000,000,000,000,000,000 | archive_read_support_format_7zip.c | 100,268,367,669,914,640,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-1000019 | libarchive version commit bf9aec176c6748f0ee7a678c5f9f9555b9a757c1 onwards (release v3.0.2 onwards) contains a CWE-125: Out-of-bounds Read vulnerability in 7zip decompression, archive_read_support_format_7zip.c, header_bytes() that can result in a crash (denial of service). This attack appears to be exploitable via the... | https://nvd.nist.gov/vuln/detail/CVE-2019-1000019 |
3,894 | ImageMagick | ecf7c6b288e11e7e7f75387c5e9e93e423b98397 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/ecf7c6b288e11e7e7f75387c5e9e93e423b98397 | ... | 1 | static MagickBooleanType TraceBezier(MVGInfo *mvg_info,
const size_t number_coordinates)
{
double
alpha,
*coefficients,
weight;
PointInfo
end,
point,
*points;
PrimitiveInfo
*primitive_info;
register PrimitiveInfo
*p;
register ssize_t
i,
j;
size_t
control_po... | 121,438,564,734,510,890,000,000,000,000,000,000,000 | None | null | [
"CWE-416"
] | CVE-2019-17547 | In ImageMagick before 7.0.8-62, TraceBezier in MagickCore/draw.c has a use-after-free. | https://nvd.nist.gov/vuln/detail/CVE-2019-17547 |
3,895 | FFmpeg | 02f909dc24b1f05cfbba75077c7707b905e63cd2 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/02f909dc24b1f05cfbba75077c7707b905e63cd2 | avcodec/vqavideo: Set video size
Fixes: out of array access
Fixes: 15919/clusterfuzz-testcase-minimized-ffmpeg_AV_CODEC_ID_VQA_fuzzer-5657368257363968
Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/projects/ffmpeg
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 1 | static av_cold int vqa_decode_init(AVCodecContext *avctx)
{
VqaContext *s = avctx->priv_data;
int i, j, codebook_index, ret;
s->avctx = avctx;
avctx->pix_fmt = AV_PIX_FMT_PAL8;
/* make sure the extradata made it */
if (s->avctx->extradata_size != VQA_HEADER_SIZE) {
av_log(s->avctx, AV_... | 316,842,430,652,442,060,000,000,000,000,000,000,000 | vqavideo.c | 113,080,214,120,645,070,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2019-17542 | FFmpeg before 4.2 has a heap-based buffer overflow in vqa_decode_chunk because of an out-of-array access in vqa_decode_init in libavcodec/vqavideo.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-17542 |
3,903 | FreeRDP | fc80ab45621bd966f70594c0b7393ec005a94007 | https://github.com/FreeRDP/FreeRDP | https://github.com/akallabeth/FreeRDP/commit/fc80ab45621bd966f70594c0b7393ec005a94007 | None | 1 | static unsigned HuffmanTree_makeFromFrequencies(HuffmanTree* tree, const unsigned* frequencies,
size_t mincodes, size_t numcodes, unsigned maxbitlen)
{
unsigned error = 0;
while(!frequencies[numcodes - 1] && numcodes > mincodes) numcodes--; /*trim zeroes*/
tre... | 314,310,845,739,413,700,000,000,000,000,000,000,000 | lodepng.c | 327,269,748,731,790,220,000,000,000,000,000,000,000 | [
"CWE-772"
] | CVE-2019-17178 | HuffmanTree_makeFromFrequencies in lodepng.c in LodePNG through 2019-09-28, as used in WinPR in FreeRDP and other products, has a memory leak because a supplied realloc pointer (i.e., the first argument to realloc) is also used for a realloc return value. | https://nvd.nist.gov/vuln/detail/CVE-2019-17178 |
3,904 | linux | 6caabe7f197d3466d238f70915d65301f1716626 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6caabe7f197d3466d238f70915d65301f1716626 | net: hsr: fix memory leak in hsr_dev_finalize()
If hsr_add_port(hsr, hsr_dev, HSR_PT_MASTER) failed to
add port, it directly returns res and forgets to free the node
that allocated in hsr_create_self_node(), and forgets to delete
the node->mac_list linked in hsr->self_node_db.
BUG: memory leak
unreferenced object 0xf... | 1 | int hsr_dev_finalize(struct net_device *hsr_dev, struct net_device *slave[2],
unsigned char multicast_spec, u8 protocol_version)
{
struct hsr_priv *hsr;
struct hsr_port *port;
int res;
hsr = netdev_priv(hsr_dev);
INIT_LIST_HEAD(&hsr->ports);
INIT_LIST_HEAD(&hsr->node_db);
INIT_LIST_HEAD(&hsr->self_node_d... | 119,005,556,713,086,030,000,000,000,000,000,000,000 | hsr_device.c | 256,445,192,119,124,600,000,000,000,000,000,000,000 | [
"CWE-772"
] | CVE-2019-16995 | In the Linux kernel before 5.0.3, a memory leak exits in hsr_dev_finalize() in net/hsr/hsr_device.c if hsr_add_port fails to add a port, which may cause denial of service, aka CID-6caabe7f197d. | https://nvd.nist.gov/vuln/detail/CVE-2019-16995 |
3,905 | linux | 07f12b26e21ab359261bf75cfcb424fdc7daeb6d | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/07f12b26e21ab359261bf75cfcb424fdc7daeb6d | net: sit: fix memory leak in sit_init_net()
If register_netdev() is failed to register sitn->fb_tunnel_dev,
it will go to err_reg_dev and forget to free netdev(sitn->fb_tunnel_dev).
BUG: memory leak
unreferenced object 0xffff888378daad00 (size 512):
comm "syz-executor.1", pid 4006, jiffies 4295121142 (age 16.115s)
... | 1 | static int __net_init sit_init_net(struct net *net)
{
struct sit_net *sitn = net_generic(net, sit_net_id);
struct ip_tunnel *t;
int err;
sitn->tunnels[0] = sitn->tunnels_wc;
sitn->tunnels[1] = sitn->tunnels_l;
sitn->tunnels[2] = sitn->tunnels_r;
sitn->tunnels[3] = sitn->tunnels_r_l;
if (!net_has_fallback_tunn... | 172,436,102,843,847,500,000,000,000,000,000,000,000 | sit.c | 116,232,482,481,814,840,000,000,000,000,000,000,000 | [
"CWE-772"
] | CVE-2019-16994 | In the Linux kernel before 5.0, a memory leak exists in sit_init_net() in net/ipv6/sit.c when register_netdev() fails to register sitn->fb_tunnel_dev, which may cause denial of service, aka CID-07f12b26e21a. | https://nvd.nist.gov/vuln/detail/CVE-2019-16994 |
3,906 | linux | df7e40425813c50cd252e6f5e348a81ef1acae56 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/df7e40425813c50cd252e6f5e348a81ef1acae56 | RDMA/hns: Fix init resp when alloc ucontext
The data in resp will be copied from kernel to userspace, thus it needs to
be initialized to zeros to avoid copying uninited stack memory.
Reported-by: Dan Carpenter <dan.carpenter@oracle.com>
Fixes: e088a685eae9 ("RDMA/hns: Support rq record doorbell for the user space")
S... | 1 | static struct ib_ucontext *hns_roce_alloc_ucontext(struct ib_device *ib_dev,
struct ib_udata *udata)
{
int ret = 0;
struct hns_roce_ucontext *context;
struct hns_roce_ib_alloc_ucontext_resp resp;
struct hns_roce_dev *hr_dev = to_hr_dev(ib_dev);
resp.qp_tab_size = hr_dev->caps.num_qps;
context = k... | 64,634,537,219,115,920,000,000,000,000,000,000,000 | hns_roce_main.c | 321,078,437,330,342,170,000,000,000,000,000,000,000 | [
"CWE-665"
] | CVE-2019-16921 | In the Linux kernel before 4.17, hns_roce_alloc_ucontext in drivers/infiniband/hw/hns/hns_roce_main.c does not initialize the resp data structure, which might allow attackers to obtain sensitive information from kernel stack memory, aka CID-df7e40425813. | https://nvd.nist.gov/vuln/detail/CVE-2019-16921 |
3,912 | linux | 7d0a06586b2686ba80c4a2da5f91cb10ffbea736 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7d0a06586b2686ba80c4a2da5f91cb10ffbea736 | net/rds: Fix info leak in rds6_inc_info_copy()
The rds6_inc_info_copy() function has a couple struct members which
are leaking stack information. The ->tos field should hold actual
information and the ->flags field needs to be zeroed out.
Fixes: 3eb450367d08 ("rds: add type of service(tos) infrastructure")
Fixes: b7... | 1 | void rds6_inc_info_copy(struct rds_incoming *inc,
struct rds_info_iterator *iter,
struct in6_addr *saddr, struct in6_addr *daddr,
int flip)
{
struct rds6_info_message minfo6;
minfo6.seq = be64_to_cpu(inc->i_hdr.h_sequence);
minfo6.len = be32_to_cpu(inc->i_hdr.h_len);
if (flip) {
minfo6.laddr = *d... | 4,978,163,243,173,314,000,000,000,000,000,000,000 | recv.c | 312,731,406,193,587,000,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2019-16714 | In the Linux kernel before 5.2.14, rds6_inc_info_copy in net/rds/recv.c allows attackers to obtain sensitive information from kernel stack memory because tos and flags fields are not initialized. | https://nvd.nist.gov/vuln/detail/CVE-2019-16714 |
3,913 | ngiflib | 37d939a6f511d16d4c95678025c235fe62e6417a | https://github.com/miniupnp/ngiflib | https://github.com/miniupnp/ngiflib/commit/37d939a6f511d16d4c95678025c235fe62e6417a | fix deinterlacing for small pictures
fixes #12 | 1 | static void WritePixel(struct ngiflib_img * i, struct ngiflib_decode_context * context, u8 v) {
struct ngiflib_gif * p = i->parent;
if(v!=i->gce.transparent_color || !i->gce.transparent_flag) {
#ifndef NGIFLIB_INDEXED_ONLY
if(p->mode & NGIFLIB_MODE_INDEXED) {
#endif /* NGIFLIB_INDEXED_ONLY */
*context->frbuff_p... | 48,375,775,932,930,180,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2019-16347 | ngiflib 0.4 has a heap-based buffer overflow in WritePixels() in ngiflib.c when called from DecodeGifImg, because deinterlacing for small pictures is mishandled. | https://nvd.nist.gov/vuln/detail/CVE-2019-16347 |
3,914 | ngiflib | 37d939a6f511d16d4c95678025c235fe62e6417a | https://github.com/miniupnp/ngiflib | https://github.com/miniupnp/ngiflib/commit/37d939a6f511d16d4c95678025c235fe62e6417a | fix deinterlacing for small pictures
fixes #12 | 1 | static void WritePixels(struct ngiflib_img * i, struct ngiflib_decode_context * context, const u8 * pixels, u16 n) {
u16 tocopy;
struct ngiflib_gif * p = i->parent;
while(n > 0) {
tocopy = (context->Xtogo < n) ? context->Xtogo : n;
if(!i->gce.transparent_flag) {
#ifndef NGIFLIB_INDEXED_ONLY
if(p->mode & NGI... | 121,149,780,617,115,000,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2019-16347 | ngiflib 0.4 has a heap-based buffer overflow in WritePixels() in ngiflib.c when called from DecodeGifImg, because deinterlacing for small pictures is mishandled. | https://nvd.nist.gov/vuln/detail/CVE-2019-16347 |
3,915 | pam_p11 | d150b60e1e14c261b113f55681419ad1dfa8a76c | https://github.com/OpenSC/pam_p11 | https://github.com/OpenSC/pam_p11/commit/d150b60e1e14c261b113f55681419ad1dfa8a76c | Use EVP_PKEY_size() to allocate correct size of signature buffer. (#18)
Do not use fixed buffer size for signature, EVP_SignFinal() requires
buffer for signature at least EVP_PKEY_size(pkey) bytes in size.
Fixes crash when using 4K RSA signatures (https://github.com/OpenSC/pam_p11/issues/16, https://github.com/OpenS... | 1 | static int key_verify(pam_handle_t *pamh, int flags, PKCS11_KEY *authkey)
{
int ok = 0;
unsigned char challenge[30];
unsigned char signature[256];
unsigned int siglen = sizeof signature;
const EVP_MD *md = EVP_sha1();
EVP_MD_CTX *md_ctx = EVP_MD_CTX_new();
EVP_PKEY *privkey = PKCS11_get_private_key(authkey... | 188,572,096,424,461,200,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2019-16058 | An issue was discovered in the pam_p11 component 0.2.0 and 0.3.0 for OpenSC. If a smart card creates a signature with a length longer than 256 bytes, this triggers a buffer overflow. This may be the case for RSA keys with 4096 bits depending on the signature scheme. | https://nvd.nist.gov/vuln/detail/CVE-2019-16058 |
3,916 | OpenSC | 412a6142c27a5973c61ba540e33cdc22d5608e68 | https://github.com/OpenSC/OpenSC | https://github.com/OpenSC/OpenSC/commit/412a6142c27a5973c61ba540e33cdc22d5608e68 | fixed out of bounds access of ASN.1 Bitstring
Credit to OSS-Fuzz | 1 | static int decode_bit_string(const u8 * inbuf, size_t inlen, void *outbuf,
size_t outlen, int invert)
{
const u8 *in = inbuf;
u8 *out = (u8 *) outbuf;
int zero_bits = *in & 0x07;
size_t octets_left = inlen - 1;
int i, count = 0;
memset(outbuf, 0, outlen);
in++;
if (outlen < octets_left)
return... | 35,056,032,605,146,490,000,000,000,000,000,000,000 | asn1.c | 327,585,171,356,570,960,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2019-15945 | OpenSC before 0.20.0-rc1 has an out-of-bounds access of an ASN.1 Bitstring in decode_bit_string in libopensc/asn1.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-15945 |
3,917 | linux | 01ca667133d019edc9f0a1f70a272447c84ec41f | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/01ca667133d019edc9f0a1f70a272447c84ec41f | fm10k: Fix a potential NULL pointer dereference
Syzkaller report this:
kasan: GPF could be caused by NULL-ptr deref or user memory access
general protection fault: 0000 [#1] SMP KASAN PTI
CPU: 0 PID: 4378 Comm: syz-executor.0 Tainted: G C 5.0.0+ #5
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996),... | 1 | static int __init fm10k_init_module(void)
{
pr_info("%s - version %s\n", fm10k_driver_string, fm10k_driver_version);
pr_info("%s\n", fm10k_copyright);
/* create driver workqueue */
fm10k_workqueue = alloc_workqueue("%s", WQ_MEM_RECLAIM, 0,
fm10k_driver_name);
fm10k_dbg_init();
return fm10k_registe... | 247,849,593,238,575,600,000,000,000,000,000,000,000 | fm10k_main.c | 95,898,875,623,914,100,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2019-15924 | An issue was discovered in the Linux kernel before 5.0.11. fm10k_init_module in drivers/net/ethernet/intel/fm10k/fm10k_main.c has a NULL pointer dereference because there is no -ENOMEM upon an alloc_workqueue failure. | https://nvd.nist.gov/vuln/detail/CVE-2019-15924 |
3,924 | linux | ceabee6c59943bdd5e1da1a6a20dc7ee5f8113a2 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/ceabee6c59943bdd5e1da1a6a20dc7ee5f8113a2 | genetlink: Fix a memory leak on error path
In genl_register_family(), when idr_alloc() fails,
we forget to free the memory we possibly allocate for
family->attrbuf.
Reported-by: Hulk Robot <hulkci@huawei.com>
Fixes: 2ae0f17df1cd ("genetlink: use idr to track families")
Signed-off-by: YueHaibing <yuehaibing@huawei.com... | 1 | int genl_register_family(struct genl_family *family)
{
int err, i;
int start = GENL_START_ALLOC, end = GENL_MAX_ID;
err = genl_validate_ops(family);
if (err)
return err;
genl_lock_all();
if (genl_family_find_byname(family->name)) {
err = -EEXIST;
goto errout_locked;
}
/*
* Sadly, a few cases need to... | 108,757,618,594,854,400,000,000,000,000,000,000,000 | genetlink.c | 258,142,188,450,716,950,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2019-15921 | An issue was discovered in the Linux kernel before 5.0.6. There is a memory leak issue when idr_alloc() fails in genl_register_family() in net/netlink/genetlink.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-15921 |
3,925 | linux | 088aaf17aa79300cab14dbee2569c58cfafd7d6e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/088aaf17aa79300cab14dbee2569c58cfafd7d6e | cifs: Fix use-after-free in SMB2_read
There is a KASAN use-after-free:
BUG: KASAN: use-after-free in SMB2_read+0x1136/0x1190
Read of size 8 at addr ffff8880b4e45e50 by task ln/1009
Should not release the 'req' because it will use in the trace.
Fixes: eccb4422cf97 ("smb3: Add ftrace tracepoints for improved SMB3 debu... | 1 | SMB2_read(const unsigned int xid, struct cifs_io_parms *io_parms,
unsigned int *nbytes, char **buf, int *buf_type)
{
struct smb_rqst rqst;
int resp_buftype, rc = -EACCES;
struct smb2_read_plain_req *req = NULL;
struct smb2_read_rsp *rsp = NULL;
struct kvec iov[1];
struct kvec rsp_iov;
unsigned int total_len;
... | 86,958,898,671,006,720,000,000,000,000,000,000,000 | smb2pdu.c | 140,544,539,280,537,400,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2019-15920 | An issue was discovered in the Linux kernel before 5.0.10. SMB2_read in fs/cifs/smb2pdu.c has a use-after-free. NOTE: this was not fixed correctly in 5.0.10; see the 5.0.11 ChangeLog, which documents a memory leak. | https://nvd.nist.gov/vuln/detail/CVE-2019-15920 |
3,926 | linux | 6a3eb3360667170988f8a6477f6686242061488a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6a3eb3360667170988f8a6477f6686242061488a | cifs: Fix use-after-free in SMB2_write
There is a KASAN use-after-free:
BUG: KASAN: use-after-free in SMB2_write+0x1342/0x1580
Read of size 8 at addr ffff8880b6a8e450 by task ln/4196
Should not release the 'req' because it will use in the trace.
Fixes: eccb4422cf97 ("smb3: Add ftrace tracepoints for improved SMB3 de... | 1 | SMB2_write(const unsigned int xid, struct cifs_io_parms *io_parms,
unsigned int *nbytes, struct kvec *iov, int n_vec)
{
struct smb_rqst rqst;
int rc = 0;
struct smb2_write_req *req = NULL;
struct smb2_write_rsp *rsp = NULL;
int resp_buftype;
struct kvec rsp_iov;
int flags = 0;
unsigned int total_len;
*nby... | 57,757,169,545,362,260,000,000,000,000,000,000,000 | smb2pdu.c | 106,341,982,764,248,110,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2019-15919 | An issue was discovered in the Linux kernel before 5.0.10. SMB2_write in fs/cifs/smb2pdu.c has a use-after-free. | https://nvd.nist.gov/vuln/detail/CVE-2019-15919 |
3,927 | linux | b57a55e2200ede754e4dc9cce4ba9402544b9365 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/b57a55e2200ede754e4dc9cce4ba9402544b9365 | cifs: Fix lease buffer length error
There is a KASAN slab-out-of-bounds:
BUG: KASAN: slab-out-of-bounds in _copy_from_iter_full+0x783/0xaa0
Read of size 80 at addr ffff88810c35e180 by task mount.cifs/539
CPU: 1 PID: 539 Comm: mount.cifs Not tainted 4.19 #10
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS
... | 1 | SMB2_negotiate(const unsigned int xid, struct cifs_ses *ses)
{
struct smb_rqst rqst;
struct smb2_negotiate_req *req;
struct smb2_negotiate_rsp *rsp;
struct kvec iov[1];
struct kvec rsp_iov;
int rc = 0;
int resp_buftype;
struct TCP_Server_Info *server = ses->server;
int blob_offset, blob_length;
char *security... | 205,015,380,050,265,500,000,000,000,000,000,000,000 | smb2pdu.c | 140,544,539,280,537,400,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-15918 | An issue was discovered in the Linux kernel before 5.0.10. SMB2_negotiate in fs/cifs/smb2pdu.c has an out-of-bounds read because data structures are incompletely updated after a change from smb30 to smb21. | https://nvd.nist.gov/vuln/detail/CVE-2019-15918 |
3,928 | linux | 56897b217a1d0a91c9920cb418d6b3fe922f590a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/56897b217a1d0a91c9920cb418d6b3fe922f590a | Bluetooth: hci_ldisc: Postpone HCI_UART_PROTO_READY bit set in hci_uart_set_proto()
task A: task B:
hci_uart_set_proto flush_to_ldisc
- p->open(hu) -> h5_open //alloc h5 - receive_buf
- set_bit HCI_UART_PROTO_READY - tty_port_default_receive_buf
- hci_uar... | 1 | static int hci_uart_set_proto(struct hci_uart *hu, int id)
{
const struct hci_uart_proto *p;
int err;
p = hci_uart_get_proto(id);
if (!p)
return -EPROTONOSUPPORT;
hu->proto = p;
set_bit(HCI_UART_PROTO_READY, &hu->flags);
err = hci_uart_register_dev(hu);
if (err) {
clear_bit(HCI_UART_PROTO_READY, &h... | 136,154,177,591,265,250,000,000,000,000,000,000,000 | hci_ldisc.c | 5,927,913,923,078,270,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2019-15917 | An issue was discovered in the Linux kernel before 5.0.5. There is a use-after-free issue when hci_uart_register_dev() fails in hci_uart_set_proto() in drivers/bluetooth/hci_ldisc.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-15917 |
3,933 | linux | 1fb254aa983bf190cfd685d40c64a480a9bafaee | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1fb254aa983bf190cfd685d40c64a480a9bafaee | xfs: fix missing ILOCK unlock when xfs_setattr_nonsize fails due to EDQUOT
Benjamin Moody reported to Debian that XFS partially wedges when a chgrp
fails on account of being out of disk quota. I ran his reproducer
script:
# adduser dummy
# adduser dummy plugdev
# dd if=/dev/zero bs=1M count=100 of=test.img
# mkfs.x... | 1 | xfs_setattr_nonsize(
struct xfs_inode *ip,
struct iattr *iattr,
int flags)
{
xfs_mount_t *mp = ip->i_mount;
struct inode *inode = VFS_I(ip);
int mask = iattr->ia_valid;
xfs_trans_t *tp;
int error;
kuid_t uid = GLOBAL_ROOT_UID, iuid = GLOBAL_ROOT_UID;
kgid_t gid = GLOBAL_ROOT_GID, igid = GLOBAL_R... | 255,274,943,777,258,100,000,000,000,000,000,000,000 | xfs_iops.c | 170,511,364,161,316,920,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2019-15538 | An issue was discovered in xfs_setattr_nonsize in fs/xfs/xfs_iops.c in the Linux kernel through 5.2.9. XFS partially wedges when a chgrp fails on account of being out of disk quota. xfs_setattr_nonsize is failing to unlock the ILOCK after the xfs_qm_vop_chown_reserve call fails. This is primarily a local DoS attack vec... | https://nvd.nist.gov/vuln/detail/CVE-2019-15538 |
3,935 | tcpdump | 0b661e0aa61850234b64394585cf577aac570bf4 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/0b661e0aa61850234b64394585cf577aac570bf4 | (for 4.9.3) LMP: Add some missing bounds checks
In lmp_print_data_link_subobjs(), these problems were identified
through code review.
Moreover:
Add and use tstr[].
Update two tests outputs accordingly. | 1 | lmp_print_data_link_subobjs(netdissect_options *ndo, const u_char *obj_tptr,
int total_subobj_len, int offset)
{
int hexdump = FALSE;
int subobj_type, subobj_len;
union { /* int to float conversion buffer */
float f;
uint32_t i;
} bw;
while (total_sub... | 157,557,897,929,143,570,000,000,000,000,000,000,000 | print-lmp.c | 284,566,342,901,425,540,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2019-15166 | lmp_print_data_link_subobjs() in print-lmp.c in tcpdump before 4.9.3 lacks certain bounds checks. | https://nvd.nist.gov/vuln/detail/CVE-2019-15166 |
3,936 | libpcap | a5a36d9e82dde7265e38fe1f87b7f11c461c29f6 | https://github.com/the-tcpdump-group/libpcap | https://github.com/the-tcpdump-group/libpcap/commit/a5a36d9e82dde7265e38fe1f87b7f11c461c29f6 | Fix some format warnings. | 1 | pcap_ng_check_header(const uint8_t *magic, FILE *fp, u_int precision,
char *errbuf, int *err)
{
bpf_u_int32 magic_int;
size_t amt_read;
bpf_u_int32 total_length;
bpf_u_int32 byte_order_magic;
struct block_header *bhdrp;
struct section_header_block *shbp;
pcap_t *p;
int swapped = 0;
struct pcap_ng_sf *ps;
... | 62,382,392,079,134,400,000,000,000,000,000,000,000 | sf-pcapng.c | 148,887,623,957,953,060,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2019-15165 | sf-pcapng.c in libpcap before 1.9.1 does not properly validate the PHB header length before allocating memory. | https://nvd.nist.gov/vuln/detail/CVE-2019-15165 |
3,937 | gpmf-parser | 341f12cd5b97ab419e53853ca00176457c9f1681 | https://github.com/gopro/gpmf-parser | https://github.com/gopro/gpmf-parser/commit/341f12cd5b97ab419e53853ca00176457c9f1681 | fixed many security issues with the too crude mp4 reader | 1 | GPMF_ERR IsValidSize(GPMF_stream *ms, uint32_t size) // size is in longs not bytes.
{
if (ms)
{
int32_t nestsize = (int32_t)ms->nest_size[ms->nest_level];
if (nestsize == 0 && ms->nest_level == 0)
nestsize = ms->buffer_size_longs;
if (size + 2 <= nestsize) return GPMF_OK;
}
return GPMF_ERROR_BAD_STR... | 39,887,036,510,019,133,000,000,000,000,000,000,000 | GPMF_parser.c | 101,923,111,988,893,630,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2019-15148 | GoPro GPMF-parser 1.2.2 has an out-of-bounds write in OpenMP4Source in demo/GPMF_mp4reader.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-15148 |
3,943 | gpmf-parser | 341f12cd5b97ab419e53853ca00176457c9f1681 | https://github.com/gopro/gpmf-parser | https://github.com/gopro/gpmf-parser/commit/341f12cd5b97ab419e53853ca00176457c9f1681 | fixed many security issues with the too crude mp4 reader | 1 | size_t OpenMP4Source(char *filename, uint32_t traktype, uint32_t traksubtype) //RAW or within MP4
{
mp4object *mp4 = (mp4object *)malloc(sizeof(mp4object));
if (mp4 == NULL) return 0;
memset(mp4, 0, sizeof(mp4object));
#ifdef _WINDOWS
fopen_s(&mp4->mediafp, filename, "rb");
#else
mp4->mediafp = fopen(fil... | 268,050,768,699,578,650,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2019-15148 | GoPro GPMF-parser 1.2.2 has an out-of-bounds write in OpenMP4Source in demo/GPMF_mp4reader.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-15148 |
3,946 | ImageMagick6 | 3c53413eb544cc567309b4c86485eae43e956112 | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/3c53413eb544cc567309b4c86485eae43e956112 | https://github.com/ImageMagick/ImageMagick/issues/1560 | 1 | static MagickBooleanType WriteTIFFImage(const ImageInfo *image_info,
Image *image)
{
const char
*mode,
*option;
CompressionType
compression;
EndianType
endian_type;
MagickBooleanType
debug,
status;
MagickOffsetType
scene;
QuantumInfo
*quantum_info;
QuantumType
q... | 36,416,815,289,515,490,000,000,000,000,000,000,000 | tiff.c | 27,570,316,504,444,440,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-15141 | WriteTIFFImage in coders/tiff.c in ImageMagick 7.0.8-43 Q16 allows attackers to cause a denial-of-service (application crash resulting from a heap-based buffer over-read) via a crafted TIFF image file, related to TIFFRewriteDirectory, TIFFWriteDirectory, TIFFWriteDirectorySec, and TIFFWriteDirectoryTagColormap in tif_d... | https://nvd.nist.gov/vuln/detail/CVE-2019-15141 |
3,949 | ImageMagick | c78993d138bf480ab4652b5a48379d4ff75ba5f7 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/c78993d138bf480ab4652b5a48379d4ff75ba5f7 | https://github.com/ImageMagick/ImageMagick/issues/1553 | 1 | static Image *ReadXWDImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
#define CheckOverflowException(length,width,height) \
(((height) != 0) && ((length)/((size_t) height) != ((size_t) width)))
char
*comment;
Image
*image;
int
x_status;
MagickBooleanType
authentic_colormap;
... | 233,532,117,835,758,400,000,000,000,000,000,000,000 | xwd.c | 57,456,086,150,064,630,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-15139 | The XWD image (X Window System window dumping file) parsing component in ImageMagick 7.0.8-41 Q16 allows attackers to cause a denial-of-service (application crash resulting from an out-of-bounds Read) in ReadXWDImage in coders/xwd.c by crafting a corrupted XWD image file, a different vulnerability than CVE-2019-11472. | https://nvd.nist.gov/vuln/detail/CVE-2019-15139 |
3,954 | ImageMagick6 | b522d2d857d2f75b659936b59b0da9df1682c256 | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/b522d2d857d2f75b659936b59b0da9df1682c256 | https://github.com/ImageMagick/ImageMagick/issues/1552 | 1 | MagickExport Image *MeanShiftImage(const Image *image,const size_t width,
const size_t height,const double color_distance,ExceptionInfo *exception)
{
#define MaxMeanShiftIterations 100
#define MeanShiftImageTag "MeanShift/Image"
CacheView
*image_view,
*mean_view,
*pixel_view;
Image
*mean_image... | 231,391,488,542,660,700,000,000,000,000,000,000,000 | feature.c | 334,519,932,082,623,530,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2019-14981 | In ImageMagick 7.x before 7.0.8-41 and 6.x before 6.9.10-41, there is a divide-by-zero vulnerability in the MeanShiftImage function. It allows an attacker to cause a denial of service by sending a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2019-14981 |
3,955 | ImageMagick6 | 614a257295bdcdeda347086761062ac7658b6830 | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/614a257295bdcdeda347086761062ac7658b6830 | https://github.com/ImageMagick/ImageMagick6/issues/43 | 1 | MagickExport unsigned char *DetachBlob(BlobInfo *blob_info)
{
unsigned char
*data;
assert(blob_info != (BlobInfo *) NULL);
if (blob_info->debug != MagickFalse)
(void) LogMagickEvent(TraceEvent,GetMagickModule(),"...");
if (blob_info->mapped != MagickFalse)
{
(void) UnmapBlob(blob_info->dat... | 230,870,644,106,464,150,000,000,000,000,000,000,000 | blob.c | 310,539,915,566,168,340,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2019-14980 | In ImageMagick 7.x before 7.0.8-42 and 6.x before 6.9.10-42, there is a use after free vulnerability in the UnmapBlob function that allows an attacker to cause a denial of service by sending a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2019-14980 |
3,961 | pdfresurrect | 0c4120fffa3dffe97b95c486a120eded82afe8a6 | https://github.com/enferex/pdfresurrect | https://github.com/enferex/pdfresurrect/commit/0c4120fffa3dffe97b95c486a120eded82afe8a6 | Zero and sanity check all dynamic allocs.
This addresses the memory issues in Issue #6 expressed in
calloc_some.pdf and malloc_some.pdf | 1 | void pdf_load_pages_kids(FILE *fp, pdf_t *pdf)
{
int i, id, dummy;
char *buf, *c;
long start, sz;
start = ftell(fp);
/* Load all kids for all xref tables (versions) */
for (i=0; i<pdf->n_xrefs; i++)
{
if (pdf->xrefs[i].version && (pdf->xrefs[i].end != 0))
{
... | 305,307,068,957,863,400,000,000,000,000,000,000,000 | pdf.c | 66,527,136,684,972,825,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2019-14934 | An issue was discovered in PDFResurrect before 0.18. pdf_load_pages_kids in pdf.c doesn't validate a certain size value, which leads to a malloc failure and out-of-bounds write. | https://nvd.nist.gov/vuln/detail/CVE-2019-14934 |
3,966 | linux | 7caac62ed598a196d6ddf8d9c121e12e082cac3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7caac62ed598a196d6ddf8d9c121e12e082cac3 | mwifiex: Fix three heap overflow at parsing element in cfg80211_ap_settings
mwifiex_update_vs_ie(),mwifiex_set_uap_rates() and
mwifiex_set_wmm_params() call memcpy() without checking
the destination size.Since the source is given from
user-space, this may trigger a heap buffer overflow.
Fix them by putting the length... | 1 | mwifiex_set_wmm_params(struct mwifiex_private *priv,
struct mwifiex_uap_bss_param *bss_cfg,
struct cfg80211_ap_settings *params)
{
const u8 *vendor_ie;
const u8 *wmm_ie;
u8 wmm_oui[] = {0x00, 0x50, 0xf2, 0x02};
vendor_ie = cfg80211_find_vendor_ie(WLAN_OUI_MICROSOFT,
WLAN_OUI_TYPE_MICROSO... | 210,184,099,351,750,200,000,000,000,000,000,000,000 | uap_cmd.c | 4,975,642,954,145,404,000,000,000,000,000,000,000 | [
"CWE-120"
] | CVE-2019-14816 | There is heap-based buffer overflow in kernel, all versions up to, excluding 5.3, in the marvell wifi chip driver in Linux kernel, that allows local users to cause a denial of service(system crash) or possibly execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2019-14816 |
3,969 | 3proxy | 3b67dc844789dc0f00e934270c7b349bcb547865 | https://github.com/z3APA3A/3proxy | https://github.com/z3APA3A/3proxy/commit/3b67dc844789dc0f00e934270c7b349bcb547865 | Fix: out-of-bounds write and few more bugs in 'admin' configuration upload | 1 | void * adminchild(struct clientparam* param) {
int i, res;
char * buf;
char username[256];
char *sb;
char *req = NULL;
struct printparam pp;
int contentlen = 0;
int isform = 0;
pp.inbuf = 0;
pp.cp = param;
buf = myalloc(LINESIZE);
if(!buf) {RETURN(555);}
i = sockgetlinebuf(param, CLIENT, (unsigned ... | 208,643,767,936,815,360,000,000,000,000,000,000,000 | webadmin.c | 8,093,695,503,031,678,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2019-14495 | webadmin.c in 3proxy before 0.8.13 has an out-of-bounds write in the admin interface. | https://nvd.nist.gov/vuln/detail/CVE-2019-14495 |
3,970 | libmodbus | 5ccdf5ef79d742640355d1132fa9e2abc7fbaefc | https://github.com/stephane/libmodbus | https://github.com/stephane/libmodbus/commit/5ccdf5ef79d742640355d1132fa9e2abc7fbaefc | Fix VD-1301 and VD-1302 vulnerabilities
This patch was contributed by Maor Vermucht and Or Peles from
VDOO Connected Trust. | 1 | int modbus_reply(modbus_t *ctx, const uint8_t *req,
int req_length, modbus_mapping_t *mb_mapping)
{
int offset;
int slave;
int function;
uint16_t address;
uint8_t rsp[MAX_MESSAGE_LENGTH];
int rsp_length = 0;
sft_t sft;
if (ctx == NULL) {
errno = EINVAL;
... | 118,810,954,539,967,250,000,000,000,000,000,000,000 | modbus.c | 310,438,196,523,364,550,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-14462 | An issue was discovered in libmodbus before 3.0.7 and 3.1.x before 3.1.5. There is an out-of-bounds read for the MODBUS_FC_WRITE_MULTIPLE_COILS case, aka VD-1302. | https://nvd.nist.gov/vuln/detail/CVE-2019-14462 |
3,972 | nfdump | 3b006ededaf351f1723aea6c727c9edd1b1fff9b | https://github.com/phaag/nfdump | https://github.com/phaag/nfdump/commit/3b006ededaf351f1723aea6c727c9edd1b1fff9b | Fix potential unsigned integer underflow | 1 | static void Process_ipfix_template_withdraw(exporter_ipfix_domain_t *exporter, void *DataPtr, uint32_t size_left, FlowSource_t *fs) {
ipfix_template_record_t *ipfix_template_record;
while ( size_left ) {
uint32_t id;
ipfix_template_record = (ipfix_template_record_t *)DataPtr;
size_left -= 4;
id = ... | 255,402,460,928,750,500,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2019-14459 | nfdump 1.6.17 and earlier is affected by an integer overflow in the function Process_ipfix_template_withdraw in ipfix.c that can be abused in order to crash the process remotely (denial of service). | https://nvd.nist.gov/vuln/detail/CVE-2019-14459 |
3,973 | ssdp-responder | ce04b1f29a137198182f60bbb628d5ceb8171765 | https://github.com/troglobit/ssdp-responder | https://github.com/troglobit/ssdp-responder/commit/ce04b1f29a137198182f60bbb628d5ceb8171765 | Fix #1: Ensure recv buf is always NUL terminated
Signed-off-by: Joachim Nilsson <troglobit@gmail.com> | 1 | static void ssdp_recv(int sd)
{
ssize_t len;
struct sockaddr sa;
socklen_t salen;
char buf[MAX_PKT_SIZE];
memset(buf, 0, sizeof(buf));
len = recvfrom(sd, buf, sizeof(buf), MSG_DONTWAIT, &sa, &salen);
if (len > 0) {
buf[len] = 0;
if (sa.sa_family != AF_INET)
return;
if (strstr(buf, "M-SEARCH *... | 280,032,986,814,402,150,000,000,000,000,000,000,000 | ssdpd.c | 339,921,506,989,161,030,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2019-14323 | SSDP Responder 1.x through 1.5 mishandles incoming network messages, leading to a stack-based buffer overflow by 1 byte. This results in a crash of the server, but only when strict stack checking is enabled. This is caused by an off-by-one error in ssdp_recv in ssdpd.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-14323 |
3,975 | linux | da99466ac243f15fbba65bd261bfc75ffa1532b6 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/da99466ac243f15fbba65bd261bfc75ffa1532b6 | floppy: fix out-of-bounds read in copy_buffer
This fixes a global out-of-bounds read access in the copy_buffer
function of the floppy driver.
The FDDEFPRM ioctl allows one to set the geometry of a disk. The sect
and head fields (unsigned int) of the floppy_drive structure are used to
compute the max_sector (int) in ... | 1 | static int set_geometry(unsigned int cmd, struct floppy_struct *g,
int drive, int type, struct block_device *bdev)
{
int cnt;
/* sanity checking for parameters. */
if (g->sect <= 0 ||
g->head <= 0 ||
/* check for zero in F_SECT_PER_TRACK */
(unsigned char)((g->sect << 2) >> FD_SIZECODE... | 296,852,991,544,563,100,000,000,000,000,000,000,000 | floppy.c | 82,662,511,541,790,550,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-14283 | In the Linux kernel before 5.2.3, set_geometry in drivers/block/floppy.c does not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk has been inserted. NOTE: QEMU creates the floppy device by default. | https://nvd.nist.gov/vuln/detail/CVE-2019-14283 |
3,976 | ImageMagick6 | 4f31d78716ac94c85c244efcea368fea202e2ed4 | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/4f31d78716ac94c85c244efcea368fea202e2ed4 | https://github.com/ImageMagick/ImageMagick/issues/1629 | 1 | MagickExport void RemoveDuplicateLayers(Image **images,
ExceptionInfo *exception)
{
register Image
*curr,
*next;
RectangleInfo
bounds;
assert((*images) != (const Image *) NULL);
assert((*images)->signature == MagickCoreSignature);
if ((*images)->debug != MagickFalse)
(void) LogMag... | 325,777,336,146,972,950,000,000,000,000,000,000,000 | layer.c | 274,333,210,266,149,130,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2019-13454 | ImageMagick 7.0.8-54 Q16 allows Division by Zero in RemoveDuplicateLayers in MagickCore/layer.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-13454 |
3,978 | ImageMagick6 | f6ffc702c6eecd963587273a429dcd608c648984 | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/f6ffc702c6eecd963587273a429dcd608c648984 | https://github.com/ImageMagick/ImageMagick/issues/1588 | 1 | MagickExport Image *ComplexImages(const Image *images,const ComplexOperator op,
ExceptionInfo *exception)
{
#define ComplexImageTag "Complex/Image"
CacheView
*Ai_view,
*Ar_view,
*Bi_view,
*Br_view,
*Ci_view,
*Cr_view;
const char
*artifact;
const Image
*Ai_image,
*Ar_image... | 174,887,836,793,841,050,000,000,000,000,000,000,000 | fourier.c | 35,236,892,983,773,670,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-13391 | In ImageMagick 7.0.8-50 Q16, ComplexImages in MagickCore/fourier.c has a heap-based buffer over-read because of incorrect calls to GetCacheViewVirtualPixels. | https://nvd.nist.gov/vuln/detail/CVE-2019-13391 |
3,979 | ImageMagick6 | bb812022d0bc12107db215c981cab0b1ccd73d91 | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/bb812022d0bc12107db215c981cab0b1ccd73d91 | https://github.com/ImageMagick/ImageMagick/issues/1623 | 1 | WandExport MagickBooleanType MogrifyImageList(ImageInfo *image_info,
const int argc,const char **argv,Image **images,ExceptionInfo *exception)
{
ChannelType
channel;
const char
*option;
ImageInfo
*mogrify_info;
MagickStatusType
status;
QuantizeInfo
*quantize_info;
register ssize_t... | 271,961,819,426,692,350,000,000,000,000,000,000,000 | mogrify.c | 239,266,582,883,320,800,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2019-13311 | ImageMagick 7.0.8-50 Q16 has memory leaks at AcquireMagickMemory because of a wand/mogrify.c error. | https://nvd.nist.gov/vuln/detail/CVE-2019-13311 |
3,980 | ImageMagick6 | 5982632109cad48bc6dab867298fdea4dea57c51 | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/5982632109cad48bc6dab867298fdea4dea57c51 | https://github.com/ImageMagick/ImageMagick/issues/1616 | 1 | WandExport MagickBooleanType MogrifyImageList(ImageInfo *image_info,
const int argc,const char **argv,Image **images,ExceptionInfo *exception)
{
ChannelType
channel;
const char
*option;
ImageInfo
*mogrify_info;
MagickStatusType
status;
QuantizeInfo
*quantize_info;
register ssize_t... | 86,170,942,970,773,200,000,000,000,000,000,000,000 | mogrify.c | 156,590,874,836,840,700,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2019-13309 | ImageMagick 7.0.8-50 Q16 has memory leaks at AcquireMagickMemory because of mishandling the NoSuchImage error in CLIListOperatorImages in MagickWand/operation.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-13309 |
3,981 | ImageMagick6 | 19651f3db63fa1511ed83a348c4c82fa553f8d01 | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/19651f3db63fa1511ed83a348c4c82fa553f8d01 | https://github.com/ImageMagick/ImageMagick/issues/1595 | 1 | MagickExport Image *ComplexImages(const Image *images,const ComplexOperator op,
ExceptionInfo *exception)
{
#define ComplexImageTag "Complex/Image"
CacheView
*Ai_view,
*Ar_view,
*Bi_view,
*Br_view,
*Ci_view,
*Cr_view;
const char
*artifact;
const Image
*Ai_image,
*Ar_image... | 27,837,401,205,454,582,000,000,000,000,000,000,000 | fourier.c | 247,841,583,304,662,700,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2019-13308 | ImageMagick 7.0.8-50 Q16 has a heap-based buffer overflow in MagickCore/fourier.c in ComplexImage. | https://nvd.nist.gov/vuln/detail/CVE-2019-13308 |
3,982 | ImageMagick6 | cb5ec7d98195aa74d5ed299b38eff2a68122f3fa | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/cb5ec7d98195aa74d5ed299b38eff2a68122f3fa | https://github.com/ImageMagick/ImageMagick/issues/1612 | 1 | static MagickBooleanType WritePNMImage(const ImageInfo *image_info,Image *image)
{
char
buffer[MaxTextExtent],
format,
magick[MaxTextExtent];
const char
*value;
IndexPacket
index;
MagickBooleanType
status;
MagickOffsetType
scene;
QuantumAny
pixel;
QuantumInfo
*qua... | 329,339,327,940,665,850,000,000,000,000,000,000,000 | pnm.c | 184,005,202,624,430,060,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2019-13306 | ImageMagick 7.0.8-50 Q16 has a stack-based buffer overflow at coders/pnm.c in WritePNMImage because of off-by-one errors. | https://nvd.nist.gov/vuln/detail/CVE-2019-13306 |
3,983 | ImageMagick6 | 5c7fbf9a14fb83c9685ad69d48899f490a37609d | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/5c7fbf9a14fb83c9685ad69d48899f490a37609d | https://github.com/ImageMagick/ImageMagick/issues/1613 | 1 | static MagickBooleanType WritePNMImage(const ImageInfo *image_info,Image *image)
{
char
buffer[MaxTextExtent],
format,
magick[MaxTextExtent];
const char
*value;
IndexPacket
index;
MagickBooleanType
status;
MagickOffsetType
scene;
QuantumAny
pixel;
QuantumInfo
*qua... | 9,166,256,097,747,162,000,000,000,000,000,000,000 | pnm.c | 43,884,406,822,241,460,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2019-13305 | ImageMagick 7.0.8-50 Q16 has a stack-based buffer overflow at coders/pnm.c in WritePNMImage because of a misplaced strncpy and an off-by-one error. | https://nvd.nist.gov/vuln/detail/CVE-2019-13305 |
3,984 | ImageMagick | 7689875ef64f34141e7292f6945efdf0530b4a5e | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/7689875ef64f34141e7292f6945efdf0530b4a5e | https://github.com/ImageMagick/ImageMagick/issues/1614 | 1 | static MagickBooleanType WritePNMImage(const ImageInfo *image_info,Image *image,
ExceptionInfo *exception)
{
char
buffer[MagickPathExtent],
format,
magick[MagickPathExtent];
const char
*value;
MagickBooleanType
status;
MagickOffsetType
scene;
Quantum
index;
QuantumAny
... | 238,763,905,085,634,700,000,000,000,000,000,000,000 | pnm.c | 126,691,523,255,213,540,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2019-13304 | ImageMagick 7.0.8-50 Q16 has a stack-based buffer overflow at coders/pnm.c in WritePNMImage because of a misplaced assignment. | https://nvd.nist.gov/vuln/detail/CVE-2019-13304 |
3,985 | ImageMagick | d5089971bd792311aaab5cb73460326d7ef7f32d | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/d5089971bd792311aaab5cb73460326d7ef7f32d | https://github.com/ImageMagick/ImageMagick/issues/1597 | 1 | MagickExport Image *ComplexImages(const Image *images,const ComplexOperator op,
ExceptionInfo *exception)
{
#define ComplexImageTag "Complex/Image"
CacheView
*Ai_view,
*Ar_view,
*Bi_view,
*Br_view,
*Ci_view,
*Cr_view;
const char
*artifact;
const Image
*Ai_image,
*Ar_image... | 52,955,262,328,526,060,000,000,000,000,000,000,000 | fourier.c | 124,486,227,486,599,340,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-13302 | ImageMagick 7.0.8-50 Q16 has a heap-based buffer over-read in MagickCore/fourier.c in ComplexImages. | https://nvd.nist.gov/vuln/detail/CVE-2019-13302 |
3,986 | ImageMagick | f595a1985233c399a05c0c37cc41de16a90dd025 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/f595a1985233c399a05c0c37cc41de16a90dd025 | https://github.com/ImageMagick/ImageMagick/issues/1589 | 1 | MagickExport MagickBooleanType AnnotateImage(Image *image,
const DrawInfo *draw_info,ExceptionInfo *exception)
{
char
*p,
primitive[MagickPathExtent],
*text,
**textlist;
DrawInfo
*annotate,
*annotate_info;
GeometryInfo
geometry_info;
MagickBooleanType
status;
PointInfo
... | 38,384,457,200,441,266,000,000,000,000,000,000,000 | annotate.c | 142,178,898,008,591,400,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2019-13301 | ImageMagick 7.0.8-50 Q16 has memory leaks in AcquireMagickMemory because of an AnnotateImage error. | https://nvd.nist.gov/vuln/detail/CVE-2019-13301 |
3,987 | ImageMagick6 | 5e409ae7a389cdf2ed17469303be3f3f21cec450 | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/5e409ae7a389cdf2ed17469303be3f3f21cec450 | https://github.com/ImageMagick/ImageMagick/issues/1586 | 1 | static MagickPixelPacket **AcquirePixelThreadSet(const Image *image)
{
MagickPixelPacket
**pixels;
register ssize_t
i,
j;
size_t
number_threads;
number_threads=(size_t) GetMagickResourceLimit(ThreadResource);
pixels=(MagickPixelPacket **) AcquireQuantumMemory(number_threads,
s... | 298,386,231,418,854,870,000,000,000,000,000,000,000 | statistic.c | 130,627,906,262,576,380,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2019-13300 | ImageMagick 7.0.8-50 Q16 has a heap-based buffer overflow at MagickCore/statistic.c in EvaluateImages because of mishandling columns. | https://nvd.nist.gov/vuln/detail/CVE-2019-13300 |
3,988 | ImageMagick | d4fc44b58a14f76b1ac997517d742ee12c9dc5d3 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/d4fc44b58a14f76b1ac997517d742ee12c9dc5d3 | https://github.com/ImageMagick/ImageMagick/issues/1611 | 1 | MagickExport Image *EnhanceImage(const Image *image,ExceptionInfo *exception)
{
#define EnhanceImageTag "Enhance/Image"
#define EnhancePixel(weight) \
mean=QuantumScale*((double) GetPixelRed(image,r)+pixel.red)/2.0; \
distance=QuantumScale*((double) GetPixelRed(image,r)-pixel.red); \
distance_squared=(4.0+mean)*... | 39,724,954,808,497,897,000,000,000,000,000,000,000 | enhance.c | 155,505,691,939,167,960,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2019-13298 | ImageMagick 7.0.8-50 Q16 has a heap-based buffer overflow at MagickCore/pixel-accessor.h in SetPixelViaPixelInfo because of a MagickCore/enhance.c error. | https://nvd.nist.gov/vuln/detail/CVE-2019-13298 |
3,989 | ImageMagick6 | 35c7032723d85eee7318ff6c82f031fa2666b773 | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/35c7032723d85eee7318ff6c82f031fa2666b773 | https://github.com/ImageMagick/ImageMagick/issues/1609 | 1 | MagickExport Image *AdaptiveThresholdImage(const Image *image,
const size_t width,const size_t height,const ssize_t offset,
ExceptionInfo *exception)
{
#define ThresholdImageTag "Threshold/Image"
CacheView
*image_view,
*threshold_view;
Image
*threshold_image;
MagickBooleanType
status;
M... | 320,134,287,425,152,820,000,000,000,000,000,000,000 | threshold.c | 115,482,682,457,321,940,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-13297 | ImageMagick 7.0.8-50 Q16 has a heap-based buffer over-read at MagickCore/threshold.c in AdaptiveThresholdImage because a height of zero is mishandled. | https://nvd.nist.gov/vuln/detail/CVE-2019-13297 |
3,990 | ImageMagick | ce08a3691a8ac29125e29fc41967b3737fa3f425 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/ce08a3691a8ac29125e29fc41967b3737fa3f425 | https://github.com/ImageMagick/ImageMagick/issues/1604 | 1 | WandPrivate MagickBooleanType CLIListOperatorImages(MagickCLI *cli_wand,
const char *option,const char *arg1n,const char *arg2n)
{
const char /* percent escaped versions of the args */
*arg1,
*arg2;
Image
*new_images;
MagickStatusType
status;
ssize_t
parse;
#define _image_info (... | 306,991,356,440,369,000,000,000,000,000,000,000,000 | operation.c | 157,788,665,975,600,050,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2019-13296 | ImageMagick 7.0.8-50 Q16 has direct memory leaks in AcquireMagickMemory because of an error in CLIListOperatorImages in MagickWand/operation.c for a NULL value. | https://nvd.nist.gov/vuln/detail/CVE-2019-13296 |
3,991 | ImageMagick | a7759f410b773a1dd57b0e1fb28112e1cd8b97bc | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/a7759f410b773a1dd57b0e1fb28112e1cd8b97bc | https://github.com/ImageMagick/ImageMagick/issues/1608 | 1 | MagickExport Image *AdaptiveThresholdImage(const Image *image,
const size_t width,const size_t height,const double bias,
ExceptionInfo *exception)
{
#define AdaptiveThresholdImageTag "AdaptiveThreshold/Image"
CacheView
*image_view,
*threshold_view;
Image
*threshold_image;
MagickBooleanType
... | 312,905,073,757,981,080,000,000,000,000,000,000,000 | threshold.c | 133,075,084,422,734,550,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-13295 | ImageMagick 7.0.8-50 Q16 has a heap-based buffer over-read at MagickCore/threshold.c in AdaptiveThresholdImage because a width of zero is mishandled. | https://nvd.nist.gov/vuln/detail/CVE-2019-13295 |
3,992 | linux | 6994eefb0053799d2e07cd140df6c2ea106c41ee | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6994eefb0053799d2e07cd140df6c2ea106c41ee | ptrace: Fix ->ptracer_cred handling for PTRACE_TRACEME
Fix two issues:
When called for PTRACE_TRACEME, ptrace_link() would obtain an RCU
reference to the parent's objective credentials, then give that pointer
to get_cred(). However, the object lifetime rules for things like
struct cred do not permit unconditionally ... | 1 | static void ptrace_link(struct task_struct *child, struct task_struct *new_parent)
{
rcu_read_lock();
__ptrace_link(child, new_parent, __task_cred(new_parent));
rcu_read_unlock();
}
| 156,288,679,258,947,600,000,000,000,000,000,000,000 | ptrace.c | 156,184,805,185,643,770,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2019-13272 | In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges ... | https://nvd.nist.gov/vuln/detail/CVE-2019-13272 |
3,998 | oniguruma | 0f7f61ed1b7b697e283e37bd2d731d0bd57adb55 | https://github.com/kkos/oniguruma | https://github.com/kkos/oniguruma/commit/0f7f61ed1b7b697e283e37bd2d731d0bd57adb55 | Fix CVE-2019-13224: don't allow different encodings for onig_new_deluxe() | 1 | onig_new_deluxe(regex_t** reg, const UChar* pattern, const UChar* pattern_end,
OnigCompileInfo* ci, OnigErrorInfo* einfo)
{
int r;
UChar *cpat, *cpat_end;
if (IS_NOT_NULL(einfo)) einfo->par = (UChar* )NULL;
if (ci->pattern_enc != ci->target_enc) {
r = conv_encoding(ci->pattern_enc, ci-... | 271,415,581,749,750,400,000,000,000,000,000,000,000 | regext.c | 108,449,085,595,308,860,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2019-13224 | A use-after-free in onig_new_deluxe() in regext.c in Oniguruma 6.9.2 allows attackers to potentially cause information disclosure, denial of service, or possibly code execution by providing a crafted regular expression. The attacker provides a pair of a regex pattern and a string, with a multi-byte encoding that gets h... | https://nvd.nist.gov/vuln/detail/CVE-2019-13224 |
3,999 | stb | 98fdfc6df88b1e34a736d5e126e6c8139c8de1a6 | https://github.com/nothings/stb | https://github.com/nothings/stb/commit/98fdfc6df88b1e34a736d5e126e6c8139c8de1a6 | Fix seven bugs discovered and fixed by ForAllSecure:
CVE-2019-13217: heap buffer overflow in start_decoder()
CVE-2019-13218: stack buffer overflow in compute_codewords()
CVE-2019-13219: uninitialized memory in vorbis_decode_packet_rest()
CVE-2019-13220: out-of-range read in draw_line()
CVE-2019-13221: issue with large... | 1 | static __forceinline void draw_line(float *output, int x0, int y0, int x1, int y1, int n)
{
int dy = y1 - y0;
int adx = x1 - x0;
int ady = abs(dy);
int base;
int x=x0,y=y0;
int err = 0;
int sy;
#ifdef STB_VORBIS_DIVIDE_TABLE
if (adx < DIVTAB_DENOM && ady < DIVTAB_NUMER) {
if (dy < 0) {
... | 148,378,993,502,453,470,000,000,000,000,000,000,000 | stb_vorbis.c | 334,088,542,074,155,050,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2019-13219 | A NULL pointer dereference in the get_window function in stb_vorbis through 2019-03-04 allows an attacker to cause a denial of service by opening a crafted Ogg Vorbis file. | https://nvd.nist.gov/vuln/detail/CVE-2019-13219 |
4,000 | stb | 98fdfc6df88b1e34a736d5e126e6c8139c8de1a6 | https://github.com/nothings/stb | https://github.com/nothings/stb/commit/98fdfc6df88b1e34a736d5e126e6c8139c8de1a6 | Fix seven bugs discovered and fixed by ForAllSecure:
CVE-2019-13217: heap buffer overflow in start_decoder()
CVE-2019-13218: stack buffer overflow in compute_codewords()
CVE-2019-13219: uninitialized memory in vorbis_decode_packet_rest()
CVE-2019-13220: out-of-range read in draw_line()
CVE-2019-13221: issue with large... | 1 | static float *get_window(vorb *f, int len)
{
len <<= 1;
if (len == f->blocksize_0) return f->window[0];
if (len == f->blocksize_1) return f->window[1];
assert(0);
return NULL;
}
| 54,906,354,596,068,530,000,000,000,000,000,000,000 | stb_vorbis.c | 334,088,542,074,155,050,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2019-13219 | A NULL pointer dereference in the get_window function in stb_vorbis through 2019-03-04 allows an attacker to cause a denial of service by opening a crafted Ogg Vorbis file. | https://nvd.nist.gov/vuln/detail/CVE-2019-13219 |
4,001 | stb | 98fdfc6df88b1e34a736d5e126e6c8139c8de1a6 | https://github.com/nothings/stb | https://github.com/nothings/stb/commit/98fdfc6df88b1e34a736d5e126e6c8139c8de1a6 | Fix seven bugs discovered and fixed by ForAllSecure:
CVE-2019-13217: heap buffer overflow in start_decoder()
CVE-2019-13218: stack buffer overflow in compute_codewords()
CVE-2019-13219: uninitialized memory in vorbis_decode_packet_rest()
CVE-2019-13220: out-of-range read in draw_line()
CVE-2019-13221: issue with large... | 1 | static int lookup1_values(int entries, int dim)
{
int r = (int) floor(exp((float) log((float) entries) / dim));
if ((int) floor(pow((float) r+1, dim)) <= entries) // (int) cast for MinGW warning;
++r; // floor() to avoid _ftol() when non-CRT
assert(pow((f... | 246,719,121,438,152,280,000,000,000,000,000,000,000 | stb_vorbis.c | 334,088,542,074,155,050,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2019-13219 | A NULL pointer dereference in the get_window function in stb_vorbis through 2019-03-04 allows an attacker to cause a denial of service by opening a crafted Ogg Vorbis file. | https://nvd.nist.gov/vuln/detail/CVE-2019-13219 |
4,002 | stb | 98fdfc6df88b1e34a736d5e126e6c8139c8de1a6 | https://github.com/nothings/stb | https://github.com/nothings/stb/commit/98fdfc6df88b1e34a736d5e126e6c8139c8de1a6 | Fix seven bugs discovered and fixed by ForAllSecure:
CVE-2019-13217: heap buffer overflow in start_decoder()
CVE-2019-13218: stack buffer overflow in compute_codewords()
CVE-2019-13219: uninitialized memory in vorbis_decode_packet_rest()
CVE-2019-13220: out-of-range read in draw_line()
CVE-2019-13221: issue with large... | 1 | static int start_decoder(vorb *f)
{
uint8 header[6], x,y;
int len,i,j,k, max_submaps = 0;
int longest_floorlist=0;
if (!start_page(f)) return FALSE;
if (!(f->page_flag & PAGEFLAG_first_page)) return error(f, VORBIS_invalid_first_page);
if (f->page_flag & PAGEFLAG_l... | 252,497,019,343,885,260,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2019-13219 | A NULL pointer dereference in the get_window function in stb_vorbis through 2019-03-04 allows an attacker to cause a denial of service by opening a crafted Ogg Vorbis file. | https://nvd.nist.gov/vuln/detail/CVE-2019-13219 |
4,004 | ImageMagick6 | 7d11230060fa9c8f67e53c85224daf6648805c7b | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/7d11230060fa9c8f67e53c85224daf6648805c7b | https://github.com/ImageMagick/ImageMagick/issues/1601 | 1 | static Image *ReadPSImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
#define BoundingBox "BoundingBox:"
#define BeginDocument "BeginDocument:"
#define BeginXMPPacket "<?xpacket begin="
#define EndXMPPacket "<?xpacket end="
#define ICCProfile "BeginICCProfile:"
#define CMYKCustomColor "CMYKCustomColor:... | 324,044,698,586,397,400,000,000,000,000,000,000,000 | ps.c | 201,065,018,049,002,330,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2019-13137 | ImageMagick before 7.0.8-50 has a memory leak vulnerability in the function ReadPSImage in coders/ps.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-13137 |
4,005 | ImageMagick | cdb383749ef7b68a38891440af8cc23e0115306d | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/cdb383749ef7b68a38891440af8cc23e0115306d | https://github.com/ImageMagick/ImageMagick/issues/1599 | 1 | static Image *ReadCUTImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
#define ThrowCUTReaderException(severity,tag) \
{ \
if (palette != NULL) \
palette=DestroyImage(palette); \
if (clone_info != NULL) \
clone_info=DestroyImageInfo(clone_info); \
ThrowReaderException(severity,tag); \
}
Ima... | 88,863,127,355,848,590,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2019-13135 | ImageMagick before 7.0.8-50 has a "use of uninitialized value" vulnerability in the function ReadCUTImage in coders/cut.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-13135 |
4,006 | ImageMagick | fe3066122ef72c82415811d25e9e3fad622c0a99 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/fe3066122ef72c82415811d25e9e3fad622c0a99 | https://github.com/ImageMagick/ImageMagick/issues/1600 | 1 | static Image *ReadBMPImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
BMPInfo
bmp_info;
Image
*image;
MagickBooleanType
status;
MagickOffsetType
offset,
profile_data,
profile_size,
start_position;
MemoryInfo
*pixel_info;
Quantum
index;
register Quantu... | 86,565,001,831,407,070,000,000,000,000,000,000,000 | bmp.c | 36,858,631,049,690,346,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2019-13134 | ImageMagick before 7.0.8-50 has a memory leak vulnerability in the function ReadVIFFImage in coders/viff.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-13134 |
4,007 | ImageMagick | fe3066122ef72c82415811d25e9e3fad622c0a99 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/fe3066122ef72c82415811d25e9e3fad622c0a99 | https://github.com/ImageMagick/ImageMagick/issues/1600 | 1 | static Image *ReadVIFFImage(const ImageInfo *image_info,
ExceptionInfo *exception)
{
#define VFF_CM_genericRGB 15
#define VFF_CM_ntscRGB 1
#define VFF_CM_NONE 0
#define VFF_DEP_DECORDER 0x4
#define VFF_DEP_NSORDER 0x8
#define VFF_DES_RAW 0
#define VFF_LOC_IMPLICIT 1
#define VFF_MAPTYP_NONE 0
#define VFF_MAPTY... | 105,511,065,680,299,740,000,000,000,000,000,000,000 | viff.c | 68,297,603,364,140,680,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2019-13134 | ImageMagick before 7.0.8-50 has a memory leak vulnerability in the function ReadVIFFImage in coders/viff.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-13134 |
4,025 | libming | 2be22fcf56a223dafe8de0e8a20fe20e8bbdb0b9 | https://github.com/libming/libming | https://github.com/libming/libming/commit/2be22fcf56a223dafe8de0e8a20fe20e8bbdb0b9 | None | 1 | decompileAction(int n, SWF_ACTION *actions, int maxn)
{
if( n > maxn ) SWF_error("Action overflow!!");
#ifdef DEBUG
fprintf(stderr,"%d:\tACTION[%3.3d]: %s\n",
actions[n].SWF_ACTIONRECORD.Offset, n,
actionName(actions[n].SWF_ACTIONRECORD.ActionCode));
#endif
switch(actions[n].SWF_ACTIONR... | 125,508,971,660,947,630,000,000,000,000,000,000,000 | decompile.c | 35,225,409,819,271,564,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2019-12982 | Ming (aka libming) 0.4.8 has a heap buffer overflow and underflow in the decompileCAST function in util/decompile.c in libutil.a. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted SWF file. | https://nvd.nist.gov/vuln/detail/CVE-2019-12982 |
4,026 | libming | 3dc0338e4a36a3092720ebaa5b908ba3dca467d9 | https://github.com/libming/libming | https://github.com/libming/libming/commit/3dc0338e4a36a3092720ebaa5b908ba3dca467d9 | None | 1 | SWFShape_setLeftFillStyle(SWFShape shape, SWFFillStyle fill)
{
ShapeRecord record;
int idx;
if ( shape->isEnded || shape->isMorph )
return;
if(fill == NOFILL)
{
record = addStyleRecord(shape);
record.record.stateChange->leftFill = 0;
record.record.stateChange->flags |= SWF_SHAPE_FILLSTYLE0FLAG;
return... | 22,722,777,434,440,266,000,000,000,000,000,000,000 | shape.c | 50,076,327,699,061,760,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2019-12981 | Ming (aka libming) 0.4.8 has an "fill overflow" vulnerability in the function SWFShape_setLeftFillStyle in blocks/shape.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-12981 |
4,027 | libming | 2223f7a1e431455a1411bee77c90db94a6f8e8fe | https://github.com/libming/libming | https://github.com/libming/libming/commit/2223f7a1e431455a1411bee77c90db94a6f8e8fe | None | 1 | SWFInput_readSBits(SWFInput input, int number)
{
int num = SWFInput_readBits(input, number);
if ( num & (1<<(number-1)) )
return num - (1<<number);
else
return num;
}
| 263,739,449,907,377,670,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2019-12980 | In Ming (aka libming) 0.4.8, there is an integer overflow (caused by an out-of-range left shift) in the SWFInput_readSBits function in blocks/input.c. Remote attackers could leverage this vulnerability to cause a denial-of-service via a crafted swf file. | https://nvd.nist.gov/vuln/detail/CVE-2019-12980 |
4,028 | openjpeg | 8ee335227bbcaf1614124046aa25e53d67b11ec3 | https://github.com/uclouvain/openjpeg | https://github.com/uclouvain/openjpeg/commit/8ee335227bbcaf1614124046aa25e53d67b11ec3 | convertbmp: detect invalid file dimensions early
width/length dimensions read from bmp headers are not necessarily
valid. For instance they may have been maliciously set to very large
values with the intention to cause DoS (large memory allocation, stack
overflow). In these cases we want to detect the invalid size as ... | 1 | static OPJ_BOOL bmp_read_rle8_data(FILE* IN, OPJ_UINT8* pData,
OPJ_UINT32 stride, OPJ_UINT32 width, OPJ_UINT32 height)
{
OPJ_UINT32 x, y;
OPJ_UINT8 *pix;
const OPJ_UINT8 *beyond;
beyond = pData + stride * height;
pix = pData;
x = y = 0U;
while (... | 85,511,402,824,178,120,000,000,000,000,000,000,000 | convertbmp.c | 112,168,728,826,446,540,000,000,000,000,000,000,000 | [
"CWE-400"
] | CVE-2019-12973 | In OpenJPEG 2.3.1, there is excessive iteration in the opj_t1_encode_cblks function of openjp2/t1.c. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted bmp file. This issue is similar to CVE-2018-6616. | https://nvd.nist.gov/vuln/detail/CVE-2019-12973 |
4,031 | linux | 6ff7b060535e87c2ae14dd8548512abfdda528fb | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6ff7b060535e87c2ae14dd8548512abfdda528fb | mdio_bus: Fix use-after-free on device_register fails
KASAN has found use-after-free in fixed_mdio_bus_init,
commit 0c692d07842a ("drivers/net/phy/mdio_bus.c: call
put_device on device_register() failure") call put_device()
while device_register() fails,give up the last reference
to the device and allow mdiobus_releas... | 1 | int __mdiobus_register(struct mii_bus *bus, struct module *owner)
{
struct mdio_device *mdiodev;
int i, err;
struct gpio_desc *gpiod;
if (NULL == bus || NULL == bus->name ||
NULL == bus->read || NULL == bus->write)
return -EINVAL;
BUG_ON(bus->state != MDIOBUS_ALLOCATED &&
bus->state != MDIOBUS_UNR... | 332,319,665,854,404,400,000,000,000,000,000,000,000 | mdio_bus.c | 24,842,619,289,389,920,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2019-12819 | An issue was discovered in the Linux kernel before 5.0. The function __mdiobus_register() in drivers/net/phy/mdio_bus.c calls put_device(), which will trigger a fixed_mdio_bus_init use-after-free. This will cause a denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2019-12819 |
4,034 | linux | 58bdd544e2933a21a51eecf17c3f5f94038261b5 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/58bdd544e2933a21a51eecf17c3f5f94038261b5 | net: nfc: Fix NULL dereference on nfc_llcp_build_tlv fails
KASAN report this:
BUG: KASAN: null-ptr-deref in nfc_llcp_build_gb+0x37f/0x540 [nfc]
Read of size 3 at addr 0000000000000000 by task syz-executor.0/5401
CPU: 0 PID: 5401 Comm: syz-executor.0 Not tainted 5.0.0-rc7+ #45
Hardware name: QEMU Standard PC (i440FX ... | 1 | static int nfc_llcp_build_gb(struct nfc_llcp_local *local)
{
u8 *gb_cur, *version_tlv, version, version_length;
u8 *lto_tlv, lto_length;
u8 *wks_tlv, wks_length;
u8 *miux_tlv, miux_length;
__be16 wks = cpu_to_be16(local->local_wks);
u8 gb_len = 0;
int ret = 0;
version = LLCP_VERSION_11;
version_tlv = ... | 276,762,293,576,136,130,000,000,000,000,000,000,000 | llcp_core.c | 30,611,209,877,008,776,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2019-12818 | An issue was discovered in the Linux kernel before 4.20.15. The nfc_llcp_build_tlv function in net/nfc/llcp_commands.c may return NULL. If the caller does not check for this, it will trigger a NULL pointer dereference. This will cause denial of service. This affects nfc_llcp_build_gb in net/nfc/llcp_core.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-12818 |
4,038 | bubblewrap | efc89e3b939b4bde42c10f065f6b7b02958ed50e | https://github.com/containers/bubblewrap | https://github.com/projectatomic/bubblewrap/commit/efc89e3b939b4bde42c10f065f6b7b02958ed50e | Don't create our own temporary mount point for pivot_root
An attacker could pre-create /tmp/.bubblewrap-$UID and make it a
non-directory, non-symlink (in which case mounting our tmpfs would fail,
causing denial of service), or make it a symlink under their control
(potentially allowing bad things if the protected_syml... | 1 | main (int argc,
char **argv)
{
mode_t old_umask;
cleanup_free char *base_path = NULL;
int clone_flags;
char *old_cwd = NULL;
pid_t pid;
int event_fd = -1;
int child_wait_fd = -1;
int setup_finished_pipe[] = {-1, -1};
const char *new_cwd;
uid_t ns_uid;
gid_t ns_gid;
struct stat sbu... | 41,291,708,509,448,165,000,000,000,000,000,000,000 | bubblewrap.c | 67,742,006,587,564,080,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2019-12439 | bubblewrap.c in Bubblewrap before 0.3.3 misuses temporary directories in /tmp as a mount point. In some particular configurations (related to XDG_RUNTIME_DIR), a local attacker may abuse this flaw to prevent other users from executing bubblewrap or potentially execute code. | https://nvd.nist.gov/vuln/detail/CVE-2019-12439 |
4,039 | miniupnp | cb8a02af7a5677cf608e86d57ab04241cf34e24f | https://github.com/miniupnp/miniupnp | https://github.com/miniupnp/miniupnp/commit/cb8a02af7a5677cf608e86d57ab04241cf34e24f | pcpserver.c: copyIPv6IfDifferent() check for NULL src argument | 1 | static void copyIPv6IfDifferent(void * dest, const void * src)
{
if(dest != src) {
memcpy(dest, src, sizeof(struct in6_addr));
}
}
| 329,926,470,648,283,770,000,000,000,000,000,000,000 | pcpserver.c | 144,192,023,563,153,640,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2019-12111 | A Denial Of Service vulnerability in MiniUPnP MiniUPnPd through 2.1 exists due to a NULL pointer dereference in copyIPv6IfDifferent in pcpserver.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-12111 |
4,040 | miniupnp | f321c2066b96d18afa5158dfa2d2873a2957ef38 | https://github.com/miniupnp/miniupnp | https://github.com/miniupnp/miniupnp/commit/f321c2066b96d18afa5158dfa2d2873a2957ef38 | upnp_redirect(): accept NULL desc argument | 1 | upnp_redirect(const char * rhost, unsigned short eport,
const char * iaddr, unsigned short iport,
const char * protocol, const char * desc,
unsigned int leaseduration)
{
int proto, r;
char iaddr_old[32];
char rhost_old[32];
unsigned short iport_old;
struct in_addr address;... | 46,344,349,630,705,210,000,000,000,000,000,000,000 | upnpredirect.c | 92,609,255,182,890,540,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2019-12110 | An AddPortMapping Denial Of Service vulnerability in MiniUPnP MiniUPnPd through 2.1 exists due to a NULL pointer dereference in upnpredirect.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-12110 |
4,041 | miniupnp | 13585f15c7f7dc28bbbba1661efb280d530d114c | https://github.com/miniupnp/miniupnp | https://github.com/miniupnp/miniupnp/commit/13585f15c7f7dc28bbbba1661efb280d530d114c | GetOutboundPinholeTimeout: check args | 1 | GetOutboundPinholeTimeout(struct upnphttp * h, const char * action, const char * ns)
{
int r;
static const char resp[] =
"<u:%sResponse "
"xmlns:u=\"%s\">"
"<OutboundPinholeTimeout>%d</OutboundPinholeTimeout>"
"</u:%sResponse>";
char body[512];
int bodylen;
struct NameValueParserData data;
char * int_ip... | 158,973,129,754,763,100,000,000,000,000,000,000,000 | upnpsoap.c | 217,760,622,990,765,140,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2019-12109 | A Denial Of Service vulnerability in MiniUPnP MiniUPnPd through 2.1 exists due to a NULL pointer dereference in GetOutboundPinholeTimeout in upnpsoap.c for rem_port. | https://nvd.nist.gov/vuln/detail/CVE-2019-12109 |
4,042 | miniupnp | cd506a67e174a45c6a202eff182a712955ed6d6f | https://github.com/miniupnp/miniupnp | https://github.com/miniupnp/miniupnp/commit/cd506a67e174a45c6a202eff182a712955ed6d6f | updateDevice() remove element from the list when realloc fails | 1 | updateDevice(const struct header * headers, time_t t)
{
struct device ** pp = &devlist;
struct device * p = *pp; /* = devlist; */
while(p)
{
if( p->headers[HEADER_NT].l == headers[HEADER_NT].l
&& (0==memcmp(p->headers[HEADER_NT].p, headers[HEADER_NT].p, headers[HEADER_NT].l))
&& p->headers[HEADER_USN].l ... | 221,734,464,000,496,170,000,000,000,000,000,000,000 | minissdpd.c | 279,070,277,622,417,970,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2019-12106 | The updateDevice function in minissdpd.c in MiniUPnP MiniSSDPd 1.4 and 1.5 allows a remote attacker to crash the process due to a Use After Free vulnerability. | https://nvd.nist.gov/vuln/detail/CVE-2019-12106 |
4,043 | heimdal | 2f7f3d9960aa6ea21358bdf3687cee5149aa35cf | https://github.com/heimdal/heimdal | https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf | CVE-2019-12098: krb5: always confirm PA-PKINIT-KX for anon PKINIT
RFC8062 Section 7 requires verification of the PA-PKINIT-KX key excahnge
when anonymous PKINIT is used. Failure to do so can permit an active
attacker to become a man-in-the-middle.
Introduced by a1ef548600c5bb51cf52a9a9ea12676506ede19f. First tagged... | 1 | krb5_init_creds_step(krb5_context context,
krb5_init_creds_context ctx,
krb5_data *in,
krb5_data *out,
krb5_krbhst_info *hostinfo,
unsigned int *flags)
{
krb5_error_code ret;
size_t len = 0;
size_t size;
AS_REQ req2;
krb5_data_zero(out);
if (ctx->as_req.req_b... | 261,068,004,113,217,340,000,000,000,000,000,000,000 | init_creds_pw.c | 312,349,701,812,782,430,000,000,000,000,000,000,000 | [
"CWE-320"
] | CVE-2019-12098 | In the client side of Heimdal before 7.6.0, failure to verify anonymous PKINIT PA-PKINIT-KX key exchange permits a man-in-the-middle attack. This issue is in krb5_init_creds_step in lib/krb5/init_creds_pw.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-12098 |
4,049 | linux | a1616a5ac99ede5d605047a9012481ce7ff18b16 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a1616a5ac99ede5d605047a9012481ce7ff18b16 | Bluetooth: hidp: fix buffer overflow
Struct ca is copied from userspace. It is not checked whether the "name"
field is NULL terminated, which allows local users to obtain potentially
sensitive information from kernel stack memory, via a HIDPCONNADD command.
This vulnerability is similar to CVE-2011-1079.
Signed-off-... | 1 | static int do_hidp_sock_ioctl(struct socket *sock, unsigned int cmd, void __user *argp)
{
struct hidp_connadd_req ca;
struct hidp_conndel_req cd;
struct hidp_connlist_req cl;
struct hidp_conninfo ci;
struct socket *csock;
struct socket *isock;
int err;
BT_DBG("cmd %x arg %p", cmd, argp);
switch (cmd) {
case... | 190,362,082,081,650,330,000,000,000,000,000,000,000 | None | null | [
"CWE-77"
] | CVE-2019-11884 | The do_hidp_sock_ioctl function in net/bluetooth/hidp/sock.c in the Linux kernel before 5.0.15 allows a local user to obtain potentially sensitive information from kernel stack memory via a HIDPCONNADD command, because a name field may not end with a '\0' character. | https://nvd.nist.gov/vuln/detail/CVE-2019-11884 |
4,052 | linux | cb66ddd156203daefb8d71158036b27b0e2caf63 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/cb66ddd156203daefb8d71158036b27b0e2caf63 | net: rds: force to destroy connection if t_sock is NULL in rds_tcp_kill_sock().
When it is to cleanup net namespace, rds_tcp_exit_net() will call
rds_tcp_kill_sock(), if t_sock is NULL, it will not call
rds_conn_destroy(), rds_conn_path_destroy() and rds_tcp_conn_free() to free
connection, and the worker cp_conn_w is ... | 1 | static void rds_tcp_kill_sock(struct net *net)
{
struct rds_tcp_connection *tc, *_tc;
LIST_HEAD(tmp_list);
struct rds_tcp_net *rtn = net_generic(net, rds_tcp_netid);
struct socket *lsock = rtn->rds_tcp_listen_sock;
rtn->rds_tcp_listen_sock = NULL;
rds_tcp_listen_stop(lsock, &rtn->rds_tcp_accept_w);
spin_lock_ir... | 8,107,321,106,413,303,000,000,000,000,000,000,000 | tcp.c | 218,691,657,463,008,300,000,000,000,000,000,000,000 | [
"CWE-362"
] | CVE-2019-11815 | An issue was discovered in rds_tcp_kill_sock in net/rds/tcp.c in the Linux kernel before 5.0.8. There is a race condition leading to a use-after-free, related to net namespace cleanup. | https://nvd.nist.gov/vuln/detail/CVE-2019-11815 |
4,053 | linux | 401e7e88d4ef80188ffa07095ac00456f901b8c4 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/401e7e88d4ef80188ffa07095ac00456f901b8c4 | ipmi_si: fix use-after-free of resource->name
When we excute the following commands, we got oops
rmmod ipmi_si
cat /proc/ioports
[ 1623.482380] Unable to handle kernel paging request at virtual address ffff00000901d478
[ 1623.482382] Mem abort info:
[ 1623.482383] ESR = 0x96000007
[ 1623.482385] Exception class =... | 1 | static int try_smi_init(struct smi_info *new_smi)
{
int rv = 0;
int i;
char *init_name = NULL;
pr_info("Trying %s-specified %s state machine at %s address 0x%lx, slave address 0x%x, irq %d\n",
ipmi_addr_src_to_str(new_smi->io.addr_source),
si_to_str[new_smi->io.si_type],
addr_space_to_str[new_smi->io.addr_ty... | 165,864,638,601,569,780,000,000,000,000,000,000,000 | ipmi_si_intf.c | 224,449,302,204,137,970,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2019-11811 | An issue was discovered in the Linux kernel before 5.0.4. There is a use-after-free upon attempted read access to /proc/ioports after the ipmi_si module is removed, related to drivers/char/ipmi/ipmi_si_intf.c, drivers/char/ipmi/ipmi_si_mem_io.c, and drivers/char/ipmi/ipmi_si_port_io.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-11811 |
4,054 | linux | 401e7e88d4ef80188ffa07095ac00456f901b8c4 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/401e7e88d4ef80188ffa07095ac00456f901b8c4 | ipmi_si: fix use-after-free of resource->name
When we excute the following commands, we got oops
rmmod ipmi_si
cat /proc/ioports
[ 1623.482380] Unable to handle kernel paging request at virtual address ffff00000901d478
[ 1623.482382] Mem abort info:
[ 1623.482383] ESR = 0x96000007
[ 1623.482385] Exception class =... | 1 | int ipmi_si_mem_setup(struct si_sm_io *io)
{
unsigned long addr = io->addr_data;
int mapsize, idx;
if (!addr)
return -ENODEV;
io->io_cleanup = mem_cleanup;
/*
* Figure out the actual readb/readw/readl/etc routine to use based
* upon the register size.
*/
switch (io->regsize) {
case 1:
... | 268,861,984,312,861,500,000,000,000,000,000,000,000 | ipmi_si_mem_io.c | 76,869,389,163,316,280,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2019-11811 | An issue was discovered in the Linux kernel before 5.0.4. There is a use-after-free upon attempted read access to /proc/ioports after the ipmi_si module is removed, related to drivers/char/ipmi/ipmi_si_intf.c, drivers/char/ipmi/ipmi_si_mem_io.c, and drivers/char/ipmi/ipmi_si_port_io.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-11811 |
4,055 | linux | 401e7e88d4ef80188ffa07095ac00456f901b8c4 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/401e7e88d4ef80188ffa07095ac00456f901b8c4 | ipmi_si: fix use-after-free of resource->name
When we excute the following commands, we got oops
rmmod ipmi_si
cat /proc/ioports
[ 1623.482380] Unable to handle kernel paging request at virtual address ffff00000901d478
[ 1623.482382] Mem abort info:
[ 1623.482383] ESR = 0x96000007
[ 1623.482385] Exception class =... | 1 | int ipmi_si_port_setup(struct si_sm_io *io)
{
unsigned int addr = io->addr_data;
int idx;
if (!addr)
return -ENODEV;
io->io_cleanup = port_cleanup;
/*
* Figure out the actual inb/inw/inl/etc routine to use based
* upon the register size.
*/
switch (io->regsize) {
case 1:
io->inputb = p... | 46,989,818,832,240,890,000,000,000,000,000,000,000 | ipmi_si_port_io.c | 125,840,401,664,174,400,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2019-11811 | An issue was discovered in the Linux kernel before 5.0.4. There is a use-after-free upon attempted read access to /proc/ioports after the ipmi_si module is removed, related to drivers/char/ipmi/ipmi_si_intf.c, drivers/char/ipmi/ipmi_si_mem_io.c, and drivers/char/ipmi/ipmi_si_port_io.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-11811 |
4,056 | linux | bcf3b67d16a4c8ffae0aa79de5853435e683945c | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/bcf3b67d16a4c8ffae0aa79de5853435e683945c | scsi: megaraid_sas: return error when create DMA pool failed
when create DMA pool for cmd frames failed, we should return -ENOMEM,
instead of 0.
In some case in:
megasas_init_adapter_fusion()
-->megasas_alloc_cmds()
-->megasas_create_frame_pool
create DMA pool failed,
--> megasas_fre... | 1 | int megasas_alloc_cmds(struct megasas_instance *instance)
{
int i;
int j;
u16 max_cmd;
struct megasas_cmd *cmd;
max_cmd = instance->max_mfi_cmds;
/*
* instance->cmd_list is an array of struct megasas_cmd pointers.
* Allocate the dynamic array first and then allocate individual
* commands.
*/
instance->... | 34,156,285,142,247,750,000,000,000,000,000,000,000 | megaraid_sas_base.c | 129,635,302,641,523,000,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2019-11810 | An issue was discovered in the Linux kernel before 5.0.7. A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of Service, related to a use-after-free. | https://nvd.nist.gov/vuln/detail/CVE-2019-11810 |
4,057 | linux | 04f5866e41fb70690e28397487d8bd8eea7d712a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/04f5866e41fb70690e28397487d8bd8eea7d712a | coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping
The core dumping code has always run without holding the mmap_sem for
writing, despite that is the only way to ensure that the entire vma
layout will not change from under it. Only using some signal
serialization on the processes bel... | 1 | void uverbs_user_mmap_disassociate(struct ib_uverbs_file *ufile)
{
struct rdma_umap_priv *priv, *next_priv;
lockdep_assert_held(&ufile->hw_destroy_rwsem);
while (1) {
struct mm_struct *mm = NULL;
/* Get an arbitrary mm pointer that hasn't been cleaned yet */
mutex_lock(&ufile->umap_lock);
while (!list_emp... | 211,043,662,189,963,800,000,000,000,000,000,000,000 | uverbs_main.c | 9,360,109,907,240,654,000,000,000,000,000,000,000 | [
"CWE-362"
] | CVE-2019-11599 | The coredump implementation in the Linux kernel before 5.0.10 does not use locking or other mechanisms to prevent vma layout or vma flags changes while it runs, which allows local users to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a race condition w... | https://nvd.nist.gov/vuln/detail/CVE-2019-11599 |
4,058 | linux | 04f5866e41fb70690e28397487d8bd8eea7d712a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/04f5866e41fb70690e28397487d8bd8eea7d712a | coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping
The core dumping code has always run without holding the mmap_sem for
writing, despite that is the only way to ensure that the entire vma
layout will not change from under it. Only using some signal
serialization on the processes bel... | 1 | static ssize_t clear_refs_write(struct file *file, const char __user *buf,
size_t count, loff_t *ppos)
{
struct task_struct *task;
char buffer[PROC_NUMBUF];
struct mm_struct *mm;
struct vm_area_struct *vma;
enum clear_refs_types type;
struct mmu_gather tlb;
int itype;
int rv;
memset(buffer, 0, sizeof(buff... | 91,277,826,670,393,980,000,000,000,000,000,000,000 | task_mmu.c | 286,334,833,757,047,100,000,000,000,000,000,000,000 | [
"CWE-362"
] | CVE-2019-11599 | The coredump implementation in the Linux kernel before 5.0.10 does not use locking or other mechanisms to prevent vma layout or vma flags changes while it runs, which allows local users to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a race condition w... | https://nvd.nist.gov/vuln/detail/CVE-2019-11599 |
4,062 | WavPack | bc6cba3f552c44565f7f1e66dc1580189addb2b4 | https://github.com/dbry/WavPack | https://github.com/dbry/WavPack/commit/bc6cba3f552c44565f7f1e66dc1580189addb2b4 | issue #67: make sure sample rate is specified and non-zero in DFF files | 1 | int ParseDsdiffHeaderConfig (FILE *infile, char *infilename, char *fourcc, WavpackContext *wpc, WavpackConfig *config)
{
int64_t infilesize, total_samples;
DFFFileHeader dff_file_header;
DFFChunkHeader dff_chunk_header;
uint32_t bcount;
infilesize = DoGetFileSize (infile);
memcpy (&dff_file_hea... | 165,237,717,197,980,300,000,000,000,000,000,000,000 | None | null | [
"CWE-824"
] | CVE-2019-11498 | WavpackSetConfiguration64 in pack_utils.c in libwavpack.a in WavPack through 5.1.0 has a "Conditional jump or move depends on uninitialised value" condition, which might allow attackers to cause a denial of service (application crash) via a DFF file that lacks valid sample-rate data. | https://nvd.nist.gov/vuln/detail/CVE-2019-11498 |
4,063 | ImageMagick6 | f663dfb8431c97d95682a2b533cca1c8233d21b4 | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/f663dfb8431c97d95682a2b533cca1c8233d21b4 | https://github.com/ImageMagick/ImageMagick/issues/1546 | 1 | static Image *ReadXWDImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
#define CheckOverflowException(length,width,height) \
(((height) != 0) && ((length)/((size_t) height) != ((size_t) width)))
char
*comment;
Image
*image;
IndexPacket
index;
int
x_status;
MagickBooleanType
... | 335,197,007,716,929,300,000,000,000,000,000,000,000 | xwd.c | 75,153,857,084,258,080,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2019-11472 | ReadXWDImage in coders/xwd.c in the XWD image parsing component of ImageMagick 7.0.8-41 Q16 allows attackers to cause a denial-of-service (divide-by-zero error) by crafting an XWD image file in which the header indicates neither LSB first nor MSB first. | https://nvd.nist.gov/vuln/detail/CVE-2019-11472 |
4,064 | ImageMagick | e3cdce6fe12193f235b8c0ae5efe6880a25eb957 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/e3cdce6fe12193f235b8c0ae5efe6880a25eb957 | https://github.com/ImageMagick/ImageMagick/issues/1472 | 1 | static Image *ReadCINImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
#define MonoColorType 1
#define RGBColorType 3
char
property[MagickPathExtent];
CINInfo
cin;
const unsigned char
*pixels;
Image
*image;
MagickBooleanType
status;
MagickOffsetType
offset;
Qua... | 59,197,480,976,158,010,000,000,000,000,000,000,000 | cin.c | 292,378,594,999,413,330,000,000,000,000,000,000,000 | [
"CWE-400"
] | CVE-2019-11470 | The cineon parsing component in ImageMagick 7.0.8-26 Q16 allows attackers to cause a denial-of-service (uncontrolled resource consumption) by crafting a Cineon image with an incorrect claimed image size. This occurs because ReadCINImage in coders/cin.c lacks a check for insufficient image data in a file. | https://nvd.nist.gov/vuln/detail/CVE-2019-11470 |
4,065 | libarchive | ba641f73f3d758d9032b3f0e5597a9c6e593a505 | https://github.com/libarchive/libarchive | https://github.com/libarchive/libarchive/commit/ba641f73f3d758d9032b3f0e5597a9c6e593a505 | Fix typo in preprocessor macro in archive_read_format_zip_cleanup()
Frees lzma_stream on cleanup()
Fixes #1165 | 1 | archive_read_format_zip_cleanup(struct archive_read *a)
{
struct zip *zip;
struct zip_entry *zip_entry, *next_zip_entry;
zip = (struct zip *)(a->format->data);
#ifdef HAVE_ZLIB_H
if (zip->stream_valid)
inflateEnd(&zip->stream);
#endif
#if HAVA_LZMA_H && HAVE_LIBLZMA
if (zip->zipx_lzma_valid) {
lzma_... | 281,804,672,906,394,530,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2019-11463 | A memory leak in archive_read_format_zip_cleanup in archive_read_support_format_zip.c in libarchive 3.3.4-dev allows remote attackers to cause a denial of service via a crafted ZIP file because of a HAVE_LZMA_H typo. NOTE: this only affects users who downloaded the development code from GitHub. Users of the product's o... | https://nvd.nist.gov/vuln/detail/CVE-2019-11463 |
4,072 | mujs | 1e5479084bc9852854feb1ba9bf68b52cd127e02 | https://github.com/ccxvii/mujs | https://github.com/ccxvii/mujs/commit/1e5479084bc9852854feb1ba9bf68b52cd127e02 | Bug 700947: Add missing ENDTRY opcode in try/catch/finally byte code.
In one of the code branches in handling exceptions in the catch block
we forgot to call the ENDTRY opcode to pop the inner hidden try.
This leads to an unbalanced exception stack which can cause a crash
due to us jumping to a stack frame that has al... | 1 | static void ctrycatchfinally(JF, js_Ast *trystm, js_Ast *catchvar, js_Ast *catchstm, js_Ast *finallystm)
{
int L1, L2, L3;
L1 = emitjump(J, F, OP_TRY);
{
/* if we get here, we have caught an exception in the try block */
L2 = emitjump(J, F, OP_TRY);
{
/* if we get here, we have caught an exception in the ca... | 129,287,468,632,431,320,000,000,000,000,000,000,000 | jscompile.c | 140,135,126,533,618,000,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2019-11412 | An issue was discovered in Artifex MuJS 1.0.5. jscompile.c can cause a denial of service (invalid stack-frame jump) because it lacks an ENDTRY opcode call. | https://nvd.nist.gov/vuln/detail/CVE-2019-11412 |
4,074 | mujs | da632ca08f240590d2dec786722ed08486ce1be6 | https://github.com/ccxvii/mujs | https://github.com/ccxvii/mujs/commit/da632ca08f240590d2dec786722ed08486ce1be6 | Bug 700938: Fix stack overflow in numtostr as used by Number#toFixed().
32 is not enough to fit sprintf("%.20f", 1e20).
We need at least 43 bytes to fit that format.
Bump the static buffer size. | 1 | static void numtostr(js_State *J, const char *fmt, int w, double n)
{
char buf[32], *e;
sprintf(buf, fmt, w, n);
e = strchr(buf, 'e');
if (e) {
int exp = atoi(e+1);
sprintf(e, "e%+d", exp);
}
js_pushstring(J, buf);
}
| 19,501,154,810,031,546,000,000,000,000,000,000,000 | jsnumber.c | 94,596,169,872,171,320,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2019-11411 | An issue was discovered in Artifex MuJS 1.0.5. The Number#toFixed() and numtostr implementations in jsnumber.c have a stack-based buffer overflow. | https://nvd.nist.gov/vuln/detail/CVE-2019-11411 |
4,075 | FFmpeg | d227ed5d598340e719eff7156b1aa0a4469e9a6a | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/d227ed5d598340e719eff7156b1aa0a4469e9a6a | avcodec/mpeg4videodec: Check idx in mpeg4_decode_studio_block()
Fixes: Out of array access
Fixes: 13500/clusterfuzz-testcase-minimized-ffmpeg_AV_CODEC_ID_MPEG4_fuzzer-5769760178962432
Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/projects/ffmpeg
Reviewed-by: Kieran Kunhya <kieran... | 1 | static int mpeg4_decode_studio_block(MpegEncContext *s, int32_t block[64], int n)
{
Mpeg4DecContext *ctx = s->avctx->priv_data;
int cc, dct_dc_size, dct_diff, code, j, idx = 1, group = 0, run = 0,
additional_code_len, sign, mismatch;
VLC *cur_vlc = &ctx->studio_intra_tab[0];
uint8_t *const scan... | 148,338,294,310,981,680,000,000,000,000,000,000,000 | mpeg4videodec.c | 190,961,130,653,831,770,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-11339 | The studio profile decoder in libavcodec/mpeg4videodec.c in FFmpeg 4.0 before 4.0.4 and 4.1 before 4.1.2 allows remote attackers to cause a denial of service (out-of-array access) or possibly have unspecified other impact via crafted MPEG-4 video data. | https://nvd.nist.gov/vuln/detail/CVE-2019-11339 |
4,077 | gpac | f36525c5beafb78959c3a07d6622c9028de348da | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/f36525c5beafb78959c3a07d6622c9028de348da | None | 1 | GF_Err gf_bin128_parse(const char *string, bin128 value)
{
u32 len;
u32 i=0;
if (!strnicmp(string, "0x", 2)) string += 2;
len = (u32) strlen(string);
if (len >= 32) {
u32 j;
for (j=0; j<len; j+=2) {
u32 v;
char szV[5];
while (string[j] && !isalnum(string[j]))
j++;
if (!string[j])
break;
... | 205,544,941,712,958,340,000,000,000,000,000,000,000 | os_divers.c | 23,454,987,379,422,535,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2019-11222 | gf_bin128_parse in utils/os_divers.c in GPAC 0.7.1 has a buffer overflow issue for the crypt feature when encountering a crafted_drm_file.xml file. | https://nvd.nist.gov/vuln/detail/CVE-2019-11222 |
4,079 | ImageMagick | edc7d3035883ddca8413e4fe7689aa2e579ef04a | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/edc7d3035883ddca8413e4fe7689aa2e579ef04a | ... | 1 | MagickExport int LocaleLowercase(const int c)
{
#if defined(MAGICKCORE_LOCALE_SUPPORT)
if (c_locale != (locale_t) NULL)
return(tolower_l((int) ((unsigned char) c),c_locale));
#endif
return(tolower((int) ((unsigned char) c)));
}
| 293,889,575,556,524,600,000,000,000,000,000,000,000 | locale.c | 168,293,578,099,613,210,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-10714 | LocaleLowercase in MagickCore/locale.c in ImageMagick before 7.0.8-32 allows out-of-bounds access, leading to a SIGSEGV. | https://nvd.nist.gov/vuln/detail/CVE-2019-10714 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.