idx
int64
project
string
commit_id
string
project_url
string
commit_url
string
commit_message
string
target
int64
func
string
func_hash
float64
file_name
string
file_hash
float64
cwe
list
cve
string
cve_desc
string
nvd_url
string
4,081
libmysofa
d39a171e9c6a1c44dbdf43f9db6c3fbd887e38c1
https://github.com/hoene/libmysofa
https://github.com/hoene/libmysofa/commit/d39a171e9c6a1c44dbdf43f9db6c3fbd887e38c1
Fixed security issue 1
1
int treeRead(struct READER *reader, struct DATAOBJECT *data) { int i, j, err, olen, elements, size, x, y, z, b, e, dy, dz, sx, sy, sz, dzy, szy; char *input, *output; uint8_t node_type, node_level; uint16_t entries_used; uint32_t size_of_chunk; uint32_t filter_mask; uint64_t address_of_left_sibling, address_...
20,763,822,898,396,646,000,000,000,000,000,000,000
btree.c
57,865,174,352,816,090,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2019-10672
treeRead in hdf/btree.c in libmysofa before 0.7 does not properly validate multiplications and additions.
https://nvd.nist.gov/vuln/detail/CVE-2019-10672
4,082
domoticz
ee70db46f81afa582c96b887b73bcd2a86feda00
https://github.com/domoticz/domoticz
https://github.com/domoticz/domoticz/commit/ee70db46f81afa582c96b887b73bcd2a86feda00
Fixed possible SQL Injection Vulnerability (Thanks to Fabio Carretto!)
1
void CWebServer::GetFloorplanImage(WebEmSession & session, const request& req, reply & rep) { std::string idx = request::findValue(&req, "idx"); if (idx == "") { return; } std::vector<std::vector<std::string> > result; result = m_sql.safe_queryBlob("SELECT Image FROM Floorplans WHERE ID=%s", i...
126,919,339,259,422,660,000,000,000,000,000,000,000
WebServer.cpp
148,825,033,982,485,370,000,000,000,000,000,000,000
[ "CWE-89" ]
CVE-2019-10664
Domoticz before 4.10578 allows SQL Injection via the idx parameter in CWebServer::GetFloorplanImage in WebServer.cpp.
https://nvd.nist.gov/vuln/detail/CVE-2019-10664
4,083
linux
355b98553789b646ed97ad801a619ff898471b92
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/355b98553789b646ed97ad801a619ff898471b92
netns: provide pure entropy for net_hash_mix() net_hash_mix() currently uses kernel address of a struct net, and is used in many places that could be used to reveal this address to a patient attacker, thus defeating KASLR, for the typical case (initial net namespace, &init_net is not dynamically allocated) I believe ...
1
static __net_init int setup_net(struct net *net, struct user_namespace *user_ns) { /* Must be called with pernet_ops_rwsem held */ const struct pernet_operations *ops, *saved_ops; int error = 0; LIST_HEAD(net_exit_list); refcount_set(&net->count, 1); refcount_set(&net->passive, 1); net->dev_base_seq = 1; ...
206,504,535,378,372,680,000,000,000,000,000,000,000
net_namespace.c
241,146,489,846,949,000,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2019-10638
In the Linux kernel before 5.1.7, a device can be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby o...
https://nvd.nist.gov/vuln/detail/CVE-2019-10638
4,088
ImageMagick
cb1214c124e1bd61f7dd551b94a794864861592e
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/cb1214c124e1bd61f7dd551b94a794864861592e
...
1
static int format8BIM(Image *ifile, Image *ofile) { char temp[MagickPathExtent]; unsigned int foundOSType; int ID, resCount, i, c; ssize_t count; unsigned char *PString, *str; resCount=0; foundOSType=0; /* found the OSType */ (void) foundOSType; c=ReadBlobByte(...
166,827,350,039,151,750,000,000,000,000,000,000,000
meta.c
231,438,544,697,155,060,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2019-10131
An off-by-one read vulnerability was discovered in ImageMagick before version 7.0.7-28 in the formatIPTCfromBuffer function in coders/meta.c. A local attacker may use this flaw to read beyond the end of the buffer or to crash the program.
https://nvd.nist.gov/vuln/detail/CVE-2019-10131
4,089
libu2f-host
e4bb58cc8b6202a421e65f8230217d8ae6e16eb5
https://github.com/Yubico/libu2f-host
https://github.com/Yubico/libu2f-host/commit/e4bb58cc8b6202a421e65f8230217d8ae6e16eb5
fix filling out of initresp
1
init_device (u2fh_devs * devs, struct u2fdevice *dev) { unsigned char resp[1024]; unsigned char nonce[8]; if (obtain_nonce(nonce) != 0) { return U2FH_TRANSPORT_ERROR; } size_t resplen = sizeof (resp); dev->cid = CID_BROADCAST; if (u2fh_sendrecv (devs, dev->id, U2FHID_INIT, nonce, sizeo...
68,338,259,853,873,010,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2019-9578
In devs.c in Yubico libu2f-host before 1.1.8, the response to init is misparsed, leaking uninitialized stack memory back to the device.
https://nvd.nist.gov/vuln/detail/CVE-2019-9578
4,090
linux
0a1d52994d440e21def1c2174932410b4f2a98a1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/0a1d52994d440e21def1c2174932410b4f2a98a1
mm: enforce min addr even if capable() in expand_downwards() security_mmap_addr() does a capability check with current_cred(), but we can reach this code from contexts like a VFS write handler where current_cred() must not be used. This can be abused on systems without SMAP to make NULL pointer dereferences exploitab...
1
int expand_downwards(struct vm_area_struct *vma, unsigned long address) { struct mm_struct *mm = vma->vm_mm; struct vm_area_struct *prev; int error; address &= PAGE_MASK; error = security_mmap_addr(address); if (error) return error; /* Enforce stack_guard_gap */ prev = vma->vm_prev; /* Check...
170,619,667,088,948,030,000,000,000,000,000,000,000
mmap.c
222,211,593,782,797,660,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2019-9213
In the Linux kernel before 4.20.14, expand_downwards in mm/mmap.c lacks a check for the mmap minimum address, which makes it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task.
https://nvd.nist.gov/vuln/detail/CVE-2019-9213
4,091
linux
c4c07b4d6fa1f11880eab8e076d3d060ef3f55fc
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c4c07b4d6fa1f11880eab8e076d3d060ef3f55fc
netfilter: nf_nat_snmp_basic: add missing length checks in ASN.1 cbs The generic ASN.1 decoder infrastructure doesn't guarantee that callbacks will get as much data as they expect; callbacks have to check the `datalen` parameter before looking at `data`. Make sure that snmp_version() and snmp_helper() don't read/write...
1
int snmp_helper(void *context, size_t hdrlen, unsigned char tag, const void *data, size_t datalen) { struct snmp_ctx *ctx = (struct snmp_ctx *)context; __be32 *pdata = (__be32 *)data; if (*pdata == ctx->from) { pr_debug("%s: %pI4 to %pI4\n", __func__, (void *)&ctx->from, (void *)&ctx->to); if (*ct...
105,977,845,795,719,550,000,000,000,000,000,000,000
nf_nat_snmp_basic_main.c
170,342,232,582,282,240,000,000,000,000,000,000,000
[ "CWE-129" ]
CVE-2019-9162
In the Linux kernel before 4.20.12, net/ipv4/netfilter/nf_nat_snmp_basic_main.c in the SNMP NAT module has insufficient ASN.1 length checks (aka an array index error), making out-of-bounds read and write operations possible, leading to an OOPS or local privilege escalation. This affects snmp_version and snmp_helper.
https://nvd.nist.gov/vuln/detail/CVE-2019-9162
4,092
linux
c4c07b4d6fa1f11880eab8e076d3d060ef3f55fc
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c4c07b4d6fa1f11880eab8e076d3d060ef3f55fc
netfilter: nf_nat_snmp_basic: add missing length checks in ASN.1 cbs The generic ASN.1 decoder infrastructure doesn't guarantee that callbacks will get as much data as they expect; callbacks have to check the `datalen` parameter before looking at `data`. Make sure that snmp_version() and snmp_helper() don't read/write...
1
int snmp_version(void *context, size_t hdrlen, unsigned char tag, const void *data, size_t datalen) { if (*(unsigned char *)data > 1) return -ENOTSUPP; return 1; }
198,796,159,557,597,100,000,000,000,000,000,000,000
nf_nat_snmp_basic_main.c
170,342,232,582,282,240,000,000,000,000,000,000,000
[ "CWE-129" ]
CVE-2019-9162
In the Linux kernel before 4.20.12, net/ipv4/netfilter/nf_nat_snmp_basic_main.c in the SNMP NAT module has insufficient ASN.1 length checks (aka an array index error), making out-of-bounds read and write operations possible, leading to an OOPS or local privilege escalation. This affects snmp_version and snmp_helper.
https://nvd.nist.gov/vuln/detail/CVE-2019-9162
4,095
file
2858eaf99f6cc5aae129bcbf1e24ad160240185f
https://github.com/file/file
https://github.com/file/file/commit/2858eaf99f6cc5aae129bcbf1e24ad160240185f
Avoid OOB read (found by ASAN reported by F. Alonso)
1
do_core_note(struct magic_set *ms, unsigned char *nbuf, uint32_t type, int swap, uint32_t namesz, uint32_t descsz, size_t noff, size_t doff, int *flags, size_t size, int clazz) { #ifdef ELFCORE int os_style = -1; /* * Sigh. The 2.0.36 kernel in Debian 2.1, at * least, doesn't correctly implement name *...
251,178,396,706,421,600,000,000,000,000,000,000,000
readelf.c
30,801,224,004,046,760,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-8906
do_core_note in readelf.c in libmagic.a in file 5.35 has an out-of-bounds read because memcpy is misused.
https://nvd.nist.gov/vuln/detail/CVE-2019-8906
4,096
ImageMagick
306c1f0fa5754ca78efd16ab752f0e981d4f6b82
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/306c1f0fa5754ca78efd16ab752f0e981d4f6b82
https://github.com/ImageMagick/ImageMagick/issues/1454
1
static MagickBooleanType WritePDFImage(const ImageInfo *image_info,Image *image, ExceptionInfo *exception) { #define CFormat "/Filter [ /%s ]\n" #define ObjectsPerImage 14 #define ThrowPDFException(exception,message) \ { \ if (xref != (MagickOffsetType *) NULL) \ xref=(MagickOffsetType *) RelinquishMagickMemo...
40,501,662,541,508,744,000,000,000,000,000,000,000
pdf.c
291,286,648,213,977,640,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2019-7397
In ImageMagick before 7.0.8-25 and GraphicsMagick through 1.3.31, several memory leaks exist in WritePDFImage in coders/pdf.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-7397
4,097
ImageMagick
8a43abefb38c5e29138e1c9c515b313363541c06
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/8a43abefb38c5e29138e1c9c515b313363541c06
https://github.com/ImageMagick/ImageMagick/issues/1451
1
static size_t WritePSDChannel(const PSDInfo *psd_info, const ImageInfo *image_info,Image *image,Image *next_image, const QuantumType quantum_type, unsigned char *compact_pixels, MagickOffsetType size_offset,const MagickBooleanType separate, const CompressionType compression,ExceptionInfo *exception) { MagickB...
68,733,002,057,457,950,000,000,000,000,000,000,000
psd.c
148,851,851,471,348,200,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2019-7395
In ImageMagick before 7.0.8-25, a memory leak exists in WritePSDChannel in coders/psd.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-7395
4,100
ImageMagick
1e6a3ace073c9ec9c71e439c111d23c6e66cb6ae
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/1e6a3ace073c9ec9c71e439c111d23c6e66cb6ae
https://github.com/ImageMagick/ImageMagick/issues/1450
1
static MagickBooleanType DecodeImage(Image *image,unsigned char *luma, unsigned char *chroma1,unsigned char *chroma2,ExceptionInfo *exception) { #define IsSync(sum) ((sum & 0xffffff00UL) == 0xfffffe00UL) #define PCDGetBits(n) \ { \ sum=(sum << n) & 0xffffffff; \ bits-=n; \ while (bits <= 24) \ { \ if (p...
319,777,982,927,308,370,000,000,000,000,000,000,000
pcd.c
279,908,488,505,593,460,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2019-7175
In ImageMagick before 7.0.8-25, some memory leaks exist in DecodeImage in coders/pcd.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-7175
4,109
mod_auth_mellon
62041428a32de402e0be6ba45fe12df6a83bedb8
https://github.com/Uninett/mod_auth_mellon
https://github.com/Uninett/mod_auth_mellon/commit/62041428a32de402e0be6ba45fe12df6a83bedb8
Fix redirect URL validation bypass It turns out that browsers silently convert backslash characters into forward slashes, while apr_uri_parse() does not. This mismatch allows an attacker to bypass the redirect URL validation by using an URL like: https://sp.example.org/mellon/logout?ReturnTo=https:%5c%5cmalicious....
1
int am_check_url(request_rec *r, const char *url) { const char *i; for (i = url; *i; i++) { if (*i >= 0 && *i < ' ') { /* Deny all control-characters. */ AM_LOG_RERROR(APLOG_MARK, APLOG_ERR, HTTP_BAD_REQUEST, r, "Control character detected in URL."); ...
82,672,157,991,462,600,000,000,000,000,000,000,000
auth_mellon_util.c
235,649,112,104,693,500,000,000,000,000,000,000,000
[ "CWE-601" ]
CVE-2019-3877
A vulnerability was found in mod_auth_mellon before v0.14.2. An open redirect in the logout URL allows requests with backslashes to pass through by assuming that it is a relative URL, while the browsers silently convert backslash characters into forward slashes treating them as an absolute URL. This mismatch allows an ...
https://nvd.nist.gov/vuln/detail/CVE-2019-3877
4,118
gpac
d2371b4b204f0a3c0af51ad4e9b491144dd1225c
https://github.com/gpac/gpac
https://github.com/gpac/gpac/commit/d2371b4b204f0a3c0af51ad4e9b491144dd1225c
prevent dref memleak on invalid input (#1183)
1
GF_Err dinf_Read(GF_Box *s, GF_BitStream *bs) { GF_Err e = gf_isom_box_array_read(s, bs, dinf_AddBox); if (e) { return e; } if (!((GF_DataInformationBox *)s)->dref) { GF_LOG(GF_LOG_ERROR, GF_LOG_CONTAINER, ("[iso file] Missing dref box in dinf\n")); ((GF_DataInformationBox *)s)->dref = (GF_DataReferenceBo...
102,742,711,928,030,080,000,000,000,000,000,000,000
box_code_base.c
230,439,071,816,063,260,000,000,000,000,000,000,000
[ "CWE-400" ]
CVE-2018-21017
GPAC 0.7.1 has a memory leak in dinf_Read in isomedia/box_code_base.c.
https://nvd.nist.gov/vuln/detail/CVE-2018-21017
4,119
openjpeg
2e5ab1d9987831c981ff05862e8ccf1381ed58ea
https://github.com/uclouvain/openjpeg
https://github.com/uclouvain/openjpeg/commit/2e5ab1d9987831c981ff05862e8ccf1381ed58ea
color_apply_icc_profile: avoid potential heap buffer overflow Derived from a patch by Thuan Pham
1
void color_apply_icc_profile(opj_image_t *image) { cmsHPROFILE in_prof, out_prof; cmsHTRANSFORM transform; cmsColorSpaceSignature in_space, out_space; cmsUInt32Number intent, in_type, out_type; int *r, *g, *b; size_t nr_samples, i, max, max_w, max_h; int prec, ok = 0; OPJ_COLOR_SPACE new...
105,259,506,362,981,870,000,000,000,000,000,000,000
color.c
74,641,151,863,664,750,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-21010
OpenJPEG before 2.3.1 has a heap buffer overflow in color_apply_icc_profile in bin/common/color.c.
https://nvd.nist.gov/vuln/detail/CVE-2018-21010
4,120
linux
7fafcfdf6377b18b2a726ea554d6e593ba44349f
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/7fafcfdf6377b18b2a726ea554d6e593ba44349f
USB: gadget: f_midi: fixing a possible double-free in f_midi It looks like there is a possibility of a double-free vulnerability on an error path of the f_midi_set_alt function in the f_midi driver. If the path is feasible then free_ep_req gets called twice: req->complete = f_midi_complete; err = us...
1
static int f_midi_set_alt(struct usb_function *f, unsigned intf, unsigned alt) { struct f_midi *midi = func_to_midi(f); unsigned i; int err; /* we only set alt for MIDIStreaming interface */ if (intf != midi->ms_id) return 0; err = f_midi_start_ep(midi, f, midi->in_ep); if (err) return err; err = f_midi_...
319,178,464,914,382,540,000,000,000,000,000,000,000
None
null
[ "CWE-415" ]
CVE-2018-20961
In the Linux kernel before 4.16.4, a double free vulnerability in the f_midi_set_alt function of drivers/usb/gadget/function/f_midi.c in the f_midi driver may allow attackers to cause a denial of service or possibly have unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2018-20961
4,121
linux
54648cf1ec2d7f4b6a71767799c45676a138ca24
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/54648cf1ec2d7f4b6a71767799c45676a138ca24
block: blk_init_allocated_queue() set q->fq as NULL in the fail case We find the memory use-after-free issue in __blk_drain_queue() on the kernel 4.14. After read the latest kernel 4.18-rc6 we think it has the same problem. Memory is allocated for q->fq in the blk_init_allocated_queue(). If the elevator init function...
1
int blk_init_allocated_queue(struct request_queue *q) { WARN_ON_ONCE(q->mq_ops); q->fq = blk_alloc_flush_queue(q, NUMA_NO_NODE, q->cmd_size); if (!q->fq) return -ENOMEM; if (q->init_rq_fn && q->init_rq_fn(q, q->fq->flush_rq, GFP_KERNEL)) goto out_free_flush_queue; if (blk_init_rl(&q->root_rl, q, GFP_KERNEL)...
302,121,427,349,834,920,000,000,000,000,000,000,000
blk-core.c
50,547,906,985,392,000,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2018-20856
An issue was discovered in the Linux kernel before 4.18.7. In block/blk-core.c, there is an __blk_drain_queue() use-after-free because a certain error case is mishandled.
https://nvd.nist.gov/vuln/detail/CVE-2018-20856
4,122
linux
0625b4ba1a5d4703c7fb01c497bd6c156908af00
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/0625b4ba1a5d4703c7fb01c497bd6c156908af00
IB/mlx5: Fix leaking stack memory to userspace mlx5_ib_create_qp_resp was never initialized and only the first 4 bytes were written. Fixes: 41d902cb7c32 ("RDMA/mlx5: Fix definition of mlx5_ib_create_qp_resp") Cc: <stable@vger.kernel.org> Acked-by: Leon Romanovsky <leonro@mellanox.com> Signed-off-by: Jason Gunthorpe <...
1
static int create_qp_common(struct mlx5_ib_dev *dev, struct ib_pd *pd, struct ib_qp_init_attr *init_attr, struct ib_udata *udata, struct mlx5_ib_qp *qp) { struct mlx5_ib_resources *devr = &dev->devr; int inlen = MLX5_ST_SZ_BYTES(create_qp_in); struct mlx5_core_dev *mdev = dev->mdev; struct mlx5_ib_...
248,861,397,606,415,760,000,000,000,000,000,000,000
qp.c
331,582,094,954,837,000,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-20855
An issue was discovered in the Linux kernel before 4.18.7. In create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace.
https://nvd.nist.gov/vuln/detail/CVE-2018-20855
4,124
openjpeg
c58df149900df862806d0e892859b41115875845
https://github.com/uclouvain/openjpeg
https://github.com/uclouvain/openjpeg/commit/c58df149900df862806d0e892859b41115875845
[OPENJP2] change the way to compute *p_tx0, *p_tx1, *p_ty0, *p_ty1 in function opj_get_encoding_parameters Signed-off-by: Young_X <YangX92@hotmail.com>
1
static void opj_get_encoding_parameters(const opj_image_t *p_image, const opj_cp_t *p_cp, OPJ_UINT32 p_tileno, OPJ_INT32 * p_tx0, OPJ_INT32 * p_tx1, ...
296,815,004,190,301,400,000,000,000,000,000,000,000
pi.c
91,262,203,277,625,340,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2018-20847
An improper computation of p_tx0, p_tx1, p_ty0 and p_ty1 in the function opj_get_encoding_parameters in openjp2/pi.c in OpenJPEG through 2.3.0 can lead to an integer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2018-20847
4,125
openjpeg
c277159986c80142180fbe5efb256bbf3bdf3edc
https://github.com/uclouvain/openjpeg
https://github.com/uclouvain/openjpeg/commit/c277159986c80142180fbe5efb256bbf3bdf3edc
[MJ2] Avoid index out of bounds access to pi->include[] Signed-off-by: Young_X <YangX92@hotmail.com>
1
static opj_bool pi_next_cprl(opj_pi_iterator_t * pi) { opj_pi_comp_t *comp = NULL; opj_pi_resolution_t *res = NULL; long index = 0; if (!pi->first) { comp = &pi->comps[pi->compno]; goto LABEL_SKIP; } else { pi->first = 0; } for (pi->compno = pi->poc.compno0; pi->com...
85,538,911,631,696,440,000,000,000,000,000,000,000
pi.c
29,164,093,234,674,973,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2018-20846
Out-of-bounds accesses in the functions pi_next_lrcp, pi_next_rlcp, pi_next_rpcl, pi_next_pcrl, pi_next_rpcl, and pi_next_cprl in openmj2/pi.c in OpenJPEG through 2.3.0 allow remote attackers to cause a denial of service (application crash).
https://nvd.nist.gov/vuln/detail/CVE-2018-20846
4,126
openjpeg
c277159986c80142180fbe5efb256bbf3bdf3edc
https://github.com/uclouvain/openjpeg
https://github.com/uclouvain/openjpeg/commit/c277159986c80142180fbe5efb256bbf3bdf3edc
[MJ2] Avoid index out of bounds access to pi->include[] Signed-off-by: Young_X <YangX92@hotmail.com>
1
static opj_bool pi_next_lrcp(opj_pi_iterator_t * pi) { opj_pi_comp_t *comp = NULL; opj_pi_resolution_t *res = NULL; long index = 0; if (!pi->first) { comp = &pi->comps[pi->compno]; res = &comp->resolutions[pi->resno]; goto LABEL_SKIP; } else { pi->first = 0; }...
152,272,228,207,417,500,000,000,000,000,000,000,000
pi.c
29,164,093,234,674,973,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2018-20846
Out-of-bounds accesses in the functions pi_next_lrcp, pi_next_rlcp, pi_next_rpcl, pi_next_pcrl, pi_next_rpcl, and pi_next_cprl in openmj2/pi.c in OpenJPEG through 2.3.0 allow remote attackers to cause a denial of service (application crash).
https://nvd.nist.gov/vuln/detail/CVE-2018-20846
4,127
openjpeg
c277159986c80142180fbe5efb256bbf3bdf3edc
https://github.com/uclouvain/openjpeg
https://github.com/uclouvain/openjpeg/commit/c277159986c80142180fbe5efb256bbf3bdf3edc
[MJ2] Avoid index out of bounds access to pi->include[] Signed-off-by: Young_X <YangX92@hotmail.com>
1
static opj_bool pi_next_pcrl(opj_pi_iterator_t * pi) { opj_pi_comp_t *comp = NULL; opj_pi_resolution_t *res = NULL; long index = 0; if (!pi->first) { comp = &pi->comps[pi->compno]; goto LABEL_SKIP; } else { int compno, resno; pi->first = 0; pi->dx = 0; ...
95,796,440,332,548,910,000,000,000,000,000,000,000
pi.c
29,164,093,234,674,973,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2018-20846
Out-of-bounds accesses in the functions pi_next_lrcp, pi_next_rlcp, pi_next_rpcl, pi_next_pcrl, pi_next_rpcl, and pi_next_cprl in openmj2/pi.c in OpenJPEG through 2.3.0 allow remote attackers to cause a denial of service (application crash).
https://nvd.nist.gov/vuln/detail/CVE-2018-20846
4,128
openjpeg
c277159986c80142180fbe5efb256bbf3bdf3edc
https://github.com/uclouvain/openjpeg
https://github.com/uclouvain/openjpeg/commit/c277159986c80142180fbe5efb256bbf3bdf3edc
[MJ2] Avoid index out of bounds access to pi->include[] Signed-off-by: Young_X <YangX92@hotmail.com>
1
static opj_bool pi_next_rlcp(opj_pi_iterator_t * pi) { opj_pi_comp_t *comp = NULL; opj_pi_resolution_t *res = NULL; long index = 0; if (!pi->first) { comp = &pi->comps[pi->compno]; res = &comp->resolutions[pi->resno]; goto LABEL_SKIP; } else { pi->first = 0; } ...
223,188,624,698,480,920,000,000,000,000,000,000,000
pi.c
29,164,093,234,674,973,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2018-20846
Out-of-bounds accesses in the functions pi_next_lrcp, pi_next_rlcp, pi_next_rpcl, pi_next_pcrl, pi_next_rpcl, and pi_next_cprl in openmj2/pi.c in OpenJPEG through 2.3.0 allow remote attackers to cause a denial of service (application crash).
https://nvd.nist.gov/vuln/detail/CVE-2018-20846
4,129
openjpeg
c277159986c80142180fbe5efb256bbf3bdf3edc
https://github.com/uclouvain/openjpeg
https://github.com/uclouvain/openjpeg/commit/c277159986c80142180fbe5efb256bbf3bdf3edc
[MJ2] Avoid index out of bounds access to pi->include[] Signed-off-by: Young_X <YangX92@hotmail.com>
1
static opj_bool pi_next_rpcl(opj_pi_iterator_t * pi) { opj_pi_comp_t *comp = NULL; opj_pi_resolution_t *res = NULL; long index = 0; if (!pi->first) { goto LABEL_SKIP; } else { int compno, resno; pi->first = 0; pi->dx = 0; pi->dy = 0; for (compno = 0; ...
80,601,494,770,304,420,000,000,000,000,000,000,000
pi.c
29,164,093,234,674,973,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2018-20846
Out-of-bounds accesses in the functions pi_next_lrcp, pi_next_rlcp, pi_next_rpcl, pi_next_pcrl, pi_next_rpcl, and pi_next_cprl in openmj2/pi.c in OpenJPEG through 2.3.0 allow remote attackers to cause a denial of service (application crash).
https://nvd.nist.gov/vuln/detail/CVE-2018-20846
4,130
openjpeg
c5bd64ea146162967c29bd2af0cbb845ba3eaaaf
https://github.com/uclouvain/openjpeg
https://github.com/uclouvain/openjpeg/commit/c5bd64ea146162967c29bd2af0cbb845ba3eaaaf
[MJ2] To avoid divisions by zero / undefined behaviour on shift Signed-off-by: Young_X <YangX92@hotmail.com>
1
static opj_bool pi_next_pcrl(opj_pi_iterator_t * pi) { opj_pi_comp_t *comp = NULL; opj_pi_resolution_t *res = NULL; long index = 0; if (!pi->first) { comp = &pi->comps[pi->compno]; goto LABEL_SKIP; } else { int compno, resno; pi->first = 0; pi->dx = 0; ...
305,172,269,991,258,660,000,000,000,000,000,000,000
None
null
[ "CWE-369" ]
CVE-2018-20845
Division-by-zero vulnerabilities in the functions pi_next_pcrl, pi_next_cprl, and pi_next_rpcl in openmj2/pi.c in OpenJPEG through 2.3.0 allow remote attackers to cause a denial of service (application crash).
https://nvd.nist.gov/vuln/detail/CVE-2018-20845
4,131
openjpeg
c5bd64ea146162967c29bd2af0cbb845ba3eaaaf
https://github.com/uclouvain/openjpeg
https://github.com/uclouvain/openjpeg/commit/c5bd64ea146162967c29bd2af0cbb845ba3eaaaf
[MJ2] To avoid divisions by zero / undefined behaviour on shift Signed-off-by: Young_X <YangX92@hotmail.com>
1
static opj_bool pi_next_rpcl(opj_pi_iterator_t * pi) { opj_pi_comp_t *comp = NULL; opj_pi_resolution_t *res = NULL; long index = 0; if (!pi->first) { goto LABEL_SKIP; } else { int compno, resno; pi->first = 0; pi->dx = 0; pi->dy = 0; for (compno = 0; ...
146,244,999,549,307,640,000,000,000,000,000,000,000
None
null
[ "CWE-369" ]
CVE-2018-20845
Division-by-zero vulnerabilities in the functions pi_next_pcrl, pi_next_cprl, and pi_next_rpcl in openmj2/pi.c in OpenJPEG through 2.3.0 allow remote attackers to cause a denial of service (application crash).
https://nvd.nist.gov/vuln/detail/CVE-2018-20845
4,132
libexpat
11f8838bf99ea0a6f0b76f9760c43704d00c4ff6
https://github.com/libexpat/libexpat
https://github.com/libexpat/libexpat/commit/11f8838bf99ea0a6f0b76f9760c43704d00c4ff6
xmlparse.c: Fix extraction of namespace prefix from XML name (#186)
1
setElementTypePrefix(XML_Parser parser, ELEMENT_TYPE *elementType) { DTD * const dtd = parser->m_dtd; /* save one level of indirection */ const XML_Char *name; for (name = elementType->name; *name; name++) { if (*name == XML_T(ASCII_COLON)) { PREFIX *prefix; const XML_Char *s; for (s = elem...
149,797,917,410,026,080,000,000,000,000,000,000,000
xmlparse.c
279,896,994,209,473,240,000,000,000,000,000,000,000
[ "CWE-611" ]
CVE-2018-20843
In libexpat in Expat before 2.2.7, XML input including XML names that contain a large number of colons could make the XML parser consume a high amount of RAM and CPU resources while processing (enough to be usable for denial-of-service attacks).
https://nvd.nist.gov/vuln/detail/CVE-2018-20843
4,137
linux
b90cd6f2b905905fb42671009dc0e27c310a16ae
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/b90cd6f2b905905fb42671009dc0e27c310a16ae
scsi: libsas: fix a race condition when smp task timeout When the lldd is processing the complete sas task in interrupt and set the task stat as SAS_TASK_STATE_DONE, the smp timeout timer is able to be triggered at the same time. And smp_task_timedout() will complete the task wheter the SAS_TASK_STATE_DONE is set or n...
1
static void smp_task_done(struct sas_task *task) { if (!del_timer(&task->slow_task->timer)) return; complete(&task->slow_task->completion); }
29,609,062,973,361,010,000,000,000,000,000,000,000
sas_expander.c
251,418,024,640,382,320,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2018-20836
An issue was discovered in the Linux kernel before 4.20. There is a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free.
https://nvd.nist.gov/vuln/detail/CVE-2018-20836
4,138
linux
b90cd6f2b905905fb42671009dc0e27c310a16ae
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/b90cd6f2b905905fb42671009dc0e27c310a16ae
scsi: libsas: fix a race condition when smp task timeout When the lldd is processing the complete sas task in interrupt and set the task stat as SAS_TASK_STATE_DONE, the smp timeout timer is able to be triggered at the same time. And smp_task_timedout() will complete the task wheter the SAS_TASK_STATE_DONE is set or n...
1
static void smp_task_timedout(struct timer_list *t) { struct sas_task_slow *slow = from_timer(slow, t, timer); struct sas_task *task = slow->task; unsigned long flags; spin_lock_irqsave(&task->task_state_lock, flags); if (!(task->task_state_flags & SAS_TASK_STATE_DONE)) task->task_state_flags |= SAS_TASK_ST...
300,277,114,529,588,760,000,000,000,000,000,000,000
sas_expander.c
251,418,024,640,382,320,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2018-20836
An issue was discovered in the Linux kernel before 4.20. There is a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free.
https://nvd.nist.gov/vuln/detail/CVE-2018-20836
4,141
linux
c40f7d74c741a907cfaeb73a7697081881c497d0
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c40f7d74c741a907cfaeb73a7697081881c497d0
sched/fair: Fix infinite loop in update_blocked_averages() by reverting a9e7f6544b9c Zhipeng Xie, Xie XiuQi and Sargun Dhillon reported lockups in the scheduler under high loads, starting at around the v4.18 time frame, and Zhipeng Xie tracked it down to bugs in the rq->leaf_cfs_rq_list manipulation. Do a (manual) re...
1
static void update_blocked_averages(int cpu) { struct rq *rq = cpu_rq(cpu); struct cfs_rq *cfs_rq, *pos; const struct sched_class *curr_class; struct rq_flags rf; bool done = true; rq_lock_irqsave(rq, &rf); update_rq_clock(rq); /* * Iterates the task_group tree in a bottom up fashion, see * list_a...
242,733,069,005,675,960,000,000,000,000,000,000,000
fair.c
71,919,484,539,312,920,000,000,000,000,000,000,000
[ "CWE-400" ]
CVE-2018-20784
In the Linux kernel before 4.20.2, kernel/sched/fair.c mishandles leaf cfs_rq's, which allows attackers to cause a denial of service (infinite loop in update_blocked_averages) or possibly have unspecified other impact by inducing a high load.
https://nvd.nist.gov/vuln/detail/CVE-2018-20784
4,142
gpac
1c449a34fe0b50aaffb881bfb9d7c5ab0bb18cdd
https://github.com/gpac/gpac
https://github.com/gpac/gpac/commit/1c449a34fe0b50aaffb881bfb9d7c5ab0bb18cdd
add some boundary checks on gf_text_get_utf8_line (#1188)
1
int mp4client_main(int argc, char **argv) { char c; const char *str; int ret_val = 0; u32 i, times[100], nb_times, dump_mode; u32 simulation_time_in_ms = 0; u32 initial_service_id = 0; Bool auto_exit = GF_FALSE; Bool logs_set = GF_FALSE; Bool start_fs = GF_FALSE; Bool use_rtix = GF_FALSE; Bool pause_at_first...
33,731,538,446,325,954,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2018-20763
In GPAC 0.7.1 and earlier, gf_text_get_utf8_line in media_tools/text_import.c in libgpac_static.a allows an out-of-bounds write because of missing szLineConv bounds checking.
https://nvd.nist.gov/vuln/detail/CVE-2018-20763
4,143
gpac
35ab4475a7df9b2a4bcab235e379c0c3ec543658
https://github.com/gpac/gpac
https://github.com/gpac/gpac/commit/35ab4475a7df9b2a4bcab235e379c0c3ec543658
fix some overflows due to strcpy fixes #1184, #1186, #1187 among other things
1
GF_Err cat_multiple_files(GF_ISOFile *dest, char *fileName, u32 import_flags, Double force_fps, u32 frames_per_sample, char *tmp_dir, Bool force_cat, Bool align_timelines, Bool allow_add_in_command) { CATEnum cat_enum; char *sep; cat_enum.dest = dest; cat_enum.import_flags = import_flags; cat_enum.force_fps = for...
184,974,595,979,520,000,000,000,000,000,000,000,000
fileimport.c
215,039,272,518,635,600,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-20761
GPAC version 0.7.1 and earlier has a Buffer Overflow vulnerability in the gf_sm_load_init function in scene_manager.c in libgpac_static.a.
https://nvd.nist.gov/vuln/detail/CVE-2018-20761
4,147
gpac
35ab4475a7df9b2a4bcab235e379c0c3ec543658
https://github.com/gpac/gpac
https://github.com/gpac/gpac/commit/35ab4475a7df9b2a4bcab235e379c0c3ec543658
fix some overflows due to strcpy fixes #1184, #1186, #1187 among other things
1
GF_Err gf_sm_load_init(GF_SceneLoader *load) { GF_Err e = GF_NOT_SUPPORTED; char *ext, szExt[50]; /*we need at least a scene graph*/ if (!load || (!load->ctx && !load->scene_graph) #ifndef GPAC_DISABLE_ISOM || (!load->fileName && !load->isom && !(load->flags & GF_SM_LOAD_FOR_PLAYBACK) ) #endif ) return...
297,086,645,771,880,500,000,000,000,000,000,000,000
scene_manager.c
72,644,650,139,823,230,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-20761
GPAC version 0.7.1 and earlier has a Buffer Overflow vulnerability in the gf_sm_load_init function in scene_manager.c in libgpac_static.a.
https://nvd.nist.gov/vuln/detail/CVE-2018-20761
4,149
rdesktop
4dca546d04321a610c1835010b5dad85163b65e1
https://github.com/rdesktop/rdesktop
https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
Malicious RDP server security fixes This commit includes fixes for a set of 21 vulnerabilities in rdesktop when a malicious RDP server is used. All vulnerabilities was identified and reported by Eyal Itkin. * Add rdp_protocol_error function that is used in several fixes * Refactor of process_bitmap_updates * Fix ...
1
process_plane(uint8 * in, int width, int height, uint8 * out, int size) { UNUSED(size); int indexw; int indexh; int code; int collen; int replen; int color; int x; int revcode; uint8 * last_line; uint8 * this_line; uint8 * org_in; uint8 * org_out; org_in = in; org_out = out; last_line = 0; indexh = 0;...
243,072,446,217,366,000,000,000,000,000,000,000,000
bitmap.c
298,040,105,414,695,750,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-8799
rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function process_secondary_order() that results in a Denial of Service (segfault).
https://nvd.nist.gov/vuln/detail/CVE-2018-8799
4,151
rdesktop
4dca546d04321a610c1835010b5dad85163b65e1
https://github.com/rdesktop/rdesktop
https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
Malicious RDP server security fixes This commit includes fixes for a set of 21 vulnerabilities in rdesktop when a malicious RDP server is used. All vulnerabilities was identified and reported by Eyal Itkin. * Add rdp_protocol_error function that is used in several fixes * Refactor of process_bitmap_updates * Fix ...
1
cssp_read_tsrequest(STREAM token, STREAM pubkey) { STREAM s; int length; int tagval; s = tcp_recv(NULL, 4); if (s == NULL) return False; if (s->p[0] != (BER_TAG_SEQUENCE | BER_TAG_CONSTRUCTED)) { logger(Protocol, Error, "cssp_read_tsrequest(), expected BER_TAG_SEQUENCE|BER_TAG_CONSTRUCTED, ...
154,298,624,846,793,850,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2018-8799
rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function process_secondary_order() that results in a Denial of Service (segfault).
https://nvd.nist.gov/vuln/detail/CVE-2018-8799
4,154
rdesktop
4dca546d04321a610c1835010b5dad85163b65e1
https://github.com/rdesktop/rdesktop
https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
Malicious RDP server security fixes This commit includes fixes for a set of 21 vulnerabilities in rdesktop when a malicious RDP server is used. All vulnerabilities was identified and reported by Eyal Itkin. * Add rdp_protocol_error function that is used in several fixes * Refactor of process_bitmap_updates * Fix ...
1
process_bitmap_updates(STREAM s) { uint16 num_updates; uint16 left, top, right, bottom, width, height; uint16 cx, cy, bpp, Bpp, compress, bufsize, size; uint8 *data, *bmpdata; int i; logger(Protocol, Debug, "%s()", __func__); in_uint16_le(s, num_updates); for (i = 0; i < num_updates; i++) { in_uint16...
255,073,384,789,805,870,000,000,000,000,000,000,000
rdp.c
177,705,998,885,746,530,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-8799
rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function process_secondary_order() that results in a Denial of Service (segfault).
https://nvd.nist.gov/vuln/detail/CVE-2018-8799
4,155
rdesktop
4dca546d04321a610c1835010b5dad85163b65e1
https://github.com/rdesktop/rdesktop
https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
Malicious RDP server security fixes This commit includes fixes for a set of 21 vulnerabilities in rdesktop when a malicious RDP server is used. All vulnerabilities was identified and reported by Eyal Itkin. * Add rdp_protocol_error function that is used in several fixes * Refactor of process_bitmap_updates * Fix ...
1
process_demand_active(STREAM s) { uint8 type; uint16 len_src_descriptor, len_combined_caps; /* at this point we need to ensure that we have ui created */ rd_create_ui(); in_uint32_le(s, g_rdp_shareid); in_uint16_le(s, len_src_descriptor); in_uint16_le(s, len_combined_caps); in_uint8s(s, len_src_des...
50,427,493,118,138,860,000,000,000,000,000,000,000
rdp.c
177,705,998,885,746,530,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-8799
rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function process_secondary_order() that results in a Denial of Service (segfault).
https://nvd.nist.gov/vuln/detail/CVE-2018-8799
4,156
rdesktop
4dca546d04321a610c1835010b5dad85163b65e1
https://github.com/rdesktop/rdesktop
https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
Malicious RDP server security fixes This commit includes fixes for a set of 21 vulnerabilities in rdesktop when a malicious RDP server is used. All vulnerabilities was identified and reported by Eyal Itkin. * Add rdp_protocol_error function that is used in several fixes * Refactor of process_bitmap_updates * Fix ...
1
rdp_in_unistr(STREAM s, int in_len, char **string, uint32 * str_size) { static iconv_t icv_utf16_to_local; size_t ibl, obl; char *pin, *pout; if (!icv_utf16_to_local) { icv_utf16_to_local = iconv_open(g_codepage, WINDOWS_CODEPAGE); if (icv_utf16_to_local == (iconv_t) - 1) { logger(Protocol, Error, "...
87,473,831,233,998,540,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2018-8799
rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function process_secondary_order() that results in a Denial of Service (segfault).
https://nvd.nist.gov/vuln/detail/CVE-2018-8799
4,157
rdesktop
4dca546d04321a610c1835010b5dad85163b65e1
https://github.com/rdesktop/rdesktop
https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
Malicious RDP server security fixes This commit includes fixes for a set of 21 vulnerabilities in rdesktop when a malicious RDP server is used. All vulnerabilities was identified and reported by Eyal Itkin. * Add rdp_protocol_error function that is used in several fixes * Refactor of process_bitmap_updates * Fix ...
1
rdpdr_process(STREAM s) { uint32 handle; uint16 vmin; uint16 component; uint16 pakid; logger(Protocol, Debug, "rdpdr_process()"); /* hexdump(s->p, s->end - s->p); */ in_uint16(s, component); in_uint16(s, pakid); if (component == RDPDR_CTYP_CORE) { switch (pakid) { case PAKID_CORE_DEVICE_IOREQU...
130,790,675,046,993,960,000,000,000,000,000,000,000
rdpdr.c
63,172,116,204,848,340,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-8799
rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function process_secondary_order() that results in a Denial of Service (segfault).
https://nvd.nist.gov/vuln/detail/CVE-2018-8799
4,159
rdesktop
4dca546d04321a610c1835010b5dad85163b65e1
https://github.com/rdesktop/rdesktop
https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
Malicious RDP server security fixes This commit includes fixes for a set of 21 vulnerabilities in rdesktop when a malicious RDP server is used. All vulnerabilities was identified and reported by Eyal Itkin. * Add rdp_protocol_error function that is used in several fixes * Refactor of process_bitmap_updates * Fix ...
1
seamless_process(STREAM s) { unsigned int pkglen; char *buf; pkglen = s->end - s->p; /* str_handle_lines requires null terminated strings */ buf = xmalloc(pkglen + 1); STRNCPY(buf, (char *) s->p, pkglen + 1); str_handle_lines(buf, &seamless_rest, seamless_line_handler, NULL); xfree(buf); }
58,925,099,420,725,390,000,000,000,000,000,000,000
seamless.c
132,321,470,131,883,330,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-8799
rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function process_secondary_order() that results in a Denial of Service (segfault).
https://nvd.nist.gov/vuln/detail/CVE-2018-8799
4,163
tcpdump
24182d959f661327525a20d9a94c98a8ec016778
https://github.com/the-tcpdump-group/tcpdump
https://github.com/the-tcpdump-group/tcpdump/commit/24182d959f661327525a20d9a94c98a8ec016778
(for 4.9.3) CVE-2018-16452/SMB: prevent stack exhaustion Enforce a limit on how many times smb_fdata() can recurse. This fixes a stack exhaustion discovered by Include Security working under the Mozilla SOS program in 2018 by means of code audit.
1
smb_fdata(netdissect_options *ndo, const u_char *buf, const char *fmt, const u_char *maxbuf, int unicodestr) { static int depth = 0; char s[128]; char *p; while (*fmt) { switch (*fmt) { case '*': fmt++; while (buf < maxbuf) { const u_char *buf2; depth++; buf2 = ...
244,595,164,974,697,600,000,000,000,000,000,000,000
smbutil.c
40,949,174,088,914,413,000,000,000,000,000,000,000
[ "CWE-674" ]
CVE-2018-16452
The SMB parser in tcpdump before 4.9.3 has stack exhaustion in smbutil.c:smb_fdata() via recursion.
https://nvd.nist.gov/vuln/detail/CVE-2018-16452
4,164
tcpdump
96480ab95308cd9234b4f09b175ebf60e17792c6
https://github.com/the-tcpdump-group/tcpdump
https://github.com/the-tcpdump-group/tcpdump/commit/96480ab95308cd9234b4f09b175ebf60e17792c6
(for 4.9.3) SMB: Add two missing bounds checks
1
print_trans(netdissect_options *ndo, const u_char *words, const u_char *data1, const u_char *buf, const u_char *maxbuf) { u_int bcc; const char *f1, *f2, *f3, *f4; const u_char *data, *param; const u_char *w = words + 1; int datalen, paramlen; if (request) { ND_TCHECK2(w[12 * 2], 2...
290,096,538,158,812,750,000,000,000,000,000,000,000
print-smb.c
242,560,732,155,246,320,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-16451
The SMB parser in tcpdump before 4.9.3 has buffer over-reads in print-smb.c:print_trans() for \MAILSLOT\BROWSE and \PIPE\LANMAN.
https://nvd.nist.gov/vuln/detail/CVE-2018-16451
4,165
tcpdump
af2cf04a9394c1a56227c2289ae8da262828294a
https://github.com/the-tcpdump-group/tcpdump
https://github.com/the-tcpdump-group/tcpdump/commit/af2cf04a9394c1a56227c2289ae8da262828294a
(for 4.9.3) CVE-2018-16300/BGP: prevent stack exhaustion Enforce a limit on how many times bgp_attr_print() can recurse. This fixes a stack exhaustion discovered by Include Security working under the Mozilla SOS program in 2018 by means of code audit.
1
bgp_attr_print(netdissect_options *ndo, u_int atype, const u_char *pptr, u_int len) { int i; uint16_t af; uint8_t safi, snpa, nhlen; union { /* copy buffer for bandwidth values */ float f; uint32_t i; } bw; int advance; u_int tlen; const u_char *tptr; ch...
5,230,270,584,618,741,000,000,000,000,000,000,000
print-bgp.c
232,531,695,120,400,940,000,000,000,000,000,000,000
[ "CWE-674" ]
CVE-2018-16300
The BGP parser in tcpdump before 4.9.3 allows stack consumption in print-bgp.c:bgp_attr_print() because of unlimited recursion.
https://nvd.nist.gov/vuln/detail/CVE-2018-16300
4,167
tcpdump
13d52e9c0e7caf7e6325b0051bc90a49968be67f
https://github.com/the-tcpdump-group/tcpdump
https://github.com/the-tcpdump-group/tcpdump/commit/13d52e9c0e7caf7e6325b0051bc90a49968be67f
(for 4.9.3) CVE-2018-16230/BGP: fix decoding of MP_REACH_NLRI When bgp_attr_print() tried to decode the variable-length nexthop value for the NSAP VPN case, it did not check that the declared length is good to interpret the value as a mapped IPv4 or IPv6 address. Add missing checks to make this safe. This fixes a buf...
1
bgp_attr_print(netdissect_options *ndo, u_int atype, const u_char *pptr, u_int len) { int i; uint16_t af; uint8_t safi, snpa, nhlen; union { /* copy buffer for bandwidth values */ float f; uint32_t i; } bw; int advance; u_int tlen; const u_char *tptr; char b...
338,883,693,916,013,400,000,000,000,000,000,000,000
print-bgp.c
219,392,234,472,983,600,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-16230
The BGP parser in tcpdump before 4.9.3 has a buffer over-read in print-bgp.c:bgp_attr_print() (MP_REACH_NLRI).
https://nvd.nist.gov/vuln/detail/CVE-2018-16230
4,168
tcpdump
211124b972e74f0da66bc8b16f181f78793e2f66
https://github.com/the-tcpdump-group/tcpdump
https://github.com/the-tcpdump-group/tcpdump/commit/211124b972e74f0da66bc8b16f181f78793e2f66
(for 4.9.3) CVE-2018-16229/DCCP: Fix printing "Timestamp" and "Timestamp Echo" options Add some comments. Moreover: Put a function definition name at the beginning of the line. (This change was ported from commit 6df4852 in the master branch.) Ryan Ackroyd had independently identified this buffer over-read later by...
1
static int dccp_print_option(netdissect_options *ndo, const u_char *option, u_int hlen) { uint8_t optlen, i; ND_TCHECK(*option); if (*option >= 32) { ND_TCHECK(*(option+1)); optlen = *(option +1); if (optlen < 2) { if (*option >= 128) ND_PRINT((ndo, "CCID option %u optlen too short", *option)); ...
15,798,034,750,616,692,000,000,000,000,000,000,000
print-dccp.c
145,045,132,521,129,190,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-16229
The DCCP parser in tcpdump before 4.9.3 has a buffer over-read in print-dccp.c:dccp_print_option().
https://nvd.nist.gov/vuln/detail/CVE-2018-16229
4,169
tcpdump
4846b3c5d0a850e860baf4f07340495d29837d09
https://github.com/the-tcpdump-group/tcpdump
https://github.com/the-tcpdump-group/tcpdump/commit/4846b3c5d0a850e860baf4f07340495d29837d09
(for 4.9.3) CVE-2018-16227/IEEE 802.11: add a missing bounds check ieee802_11_print() tried to access the Mesh Flags subfield of the Mesh Control field to find the size of the latter and increment the expected 802.11 header length before checking it is fully present in the input buffer. Add an intermediate bounds chec...
1
ieee802_11_print(netdissect_options *ndo, const u_char *p, u_int length, u_int orig_caplen, int pad, u_int fcslen) { uint16_t fc; u_int caplen, hdrlen, meshdrlen; struct lladdr_info src, dst; int llc_hdrlen; caplen = orig_caplen; /* Remove FCS, if present */ if (length < fcslen...
36,678,721,672,009,150,000,000,000,000,000,000,000
print-802_11.c
126,620,455,302,702,500,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-16227
The IEEE 802.11 parser in tcpdump before 4.9.3 has a buffer over-read in print-802_11.c for the Mesh Flags subfield.
https://nvd.nist.gov/vuln/detail/CVE-2018-16227
4,181
tcpdump
e01c9bf76740802025c9328901b55ee4a0c49ed6
https://github.com/the-tcpdump-group/tcpdump
https://github.com/the-tcpdump-group/tcpdump/commit/e01c9bf76740802025c9328901b55ee4a0c49ed6
(for 4.9.3) CVE-2018-14880/OSPFv3: Fix a bounds check Need to test bounds check for the last field of the structure lsa6_hdr. No need to test other fields. Include Security working under the Mozilla SOS program had independently identified this vulnerability in 2018 by means of code audit. Wang Junjie of 360 ESG Cod...
1
ospf6_print_lshdr(netdissect_options *ndo, register const struct lsa6_hdr *lshp, const u_char *dataend) { if ((const u_char *)(lshp + 1) > dataend) goto trunc; ND_TCHECK(lshp->ls_type); ND_TCHECK(lshp->ls_seq); ND_PRINT((ndo, "\n\t Advertising Router %s, seq 0x%08x, age %us, length %u", ...
129,283,399,906,377,130,000,000,000,000,000,000,000
print-ospf6.c
147,818,747,608,204,800,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-14880
The OSPFv3 parser in tcpdump before 4.9.3 has a buffer over-read in print-ospf6.c:ospf6_print_lshdr().
https://nvd.nist.gov/vuln/detail/CVE-2018-14880
4,182
tcpdump
9ba91381954ad325ea4fd26b9c65a8bd9a2a85b6
https://github.com/the-tcpdump-group/tcpdump
https://github.com/the-tcpdump-group/tcpdump/commit/9ba91381954ad325ea4fd26b9c65a8bd9a2a85b6
(for 4.9.3) CVE-2018-14879/fix -V to fail invalid input safely get_next_file() did not check the return value of strlen() and underflowed an array index if the line read by fgets() from the file started with \0. This caused an out-of-bounds read and could cause a write. Add the missing check. This vulnerability was d...
1
get_next_file(FILE *VFile, char *ptr) { char *ret; ret = fgets(ptr, PATH_MAX, VFile); if (!ret) return NULL; if (ptr[strlen(ptr) - 1] == '\n') ptr[strlen(ptr) - 1] = '\0'; return ret; }
257,347,123,511,778,800,000,000,000,000,000,000,000
tcpdump.c
120,937,434,841,688,800,000,000,000,000,000,000,000
[ "CWE-120" ]
CVE-2018-14879
The command-line argument parser in tcpdump before 4.9.3 has a buffer overflow in tcpdump.c:get_next_file().
https://nvd.nist.gov/vuln/detail/CVE-2018-14879
4,183
libjpeg-turbo
9c78a04df4e44ef6487eee99c4258397f4fdca55
https://github.com/libjpeg-turbo/libjpeg-turbo
https://github.com/libjpeg-turbo/libjpeg-turbo/commit/9c78a04df4e44ef6487eee99c4258397f4fdca55
cjpeg: Fix OOB read caused by malformed 8-bit BMP ... in which one or more of the color indices is out of range for the number of palette entries. Fix partly borrowed from jpeg-9c. This commit also adopts Guido's JERR_PPM_OUTOFRANGE enum value in lieu of our project-specific JERR_PPM_TOOLARGE enum value. Fixes #258
1
METHODDEF(JDIMENSION) get_8bit_row(j_compress_ptr cinfo, cjpeg_source_ptr sinfo) /* This version is for reading 8-bit colormap indexes */ { bmp_source_ptr source = (bmp_source_ptr)sinfo; register JSAMPARRAY colormap = source->colormap; JSAMPARRAY image_ptr; register int t; register JSAMPROW inptr, outpt...
167,548,316,555,997,960,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2018-14498
get_8bit_row in rdbmp.c in libjpeg-turbo through 1.5.90 and MozJPEG through 3.3.1 allows attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted 8-bit BMP in which one or more of the color indices is out of range for the number of palette entries.
https://nvd.nist.gov/vuln/detail/CVE-2018-14498
4,187
tcpdump
12f66f69f7bf1ec1266ddbee90a7616cbf33696b
https://github.com/the-tcpdump-group/tcpdump
https://github.com/the-tcpdump-group/tcpdump/commit/12f66f69f7bf1ec1266ddbee90a7616cbf33696b
(for 4.9.3) CVE-2018-14470/Babel: fix an existing length check In babel_print_v2() the non-verbose branch for an Update TLV compared the TLV Length against 1 instead of 10 (probably a typo), put it right. This fixes a buffer over-read discovered by Henri Salo from Nixu Corporation. Add a test using the capture file ...
1
babel_print_v2(netdissect_options *ndo, const u_char *cp, u_int length) { u_int i; u_short bodylen; u_char v4_prefix[16] = {0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0xFF, 0xFF, 0, 0, 0, 0 }; u_char v6_prefix[16] = {0}; ND_TCHECK2(*cp, 4); if (length < 4) goto invalid; bo...
221,650,779,211,644,100,000,000,000,000,000,000,000
print-babel.c
165,395,599,757,044,750,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-14470
The Babel parser in tcpdump before 4.9.3 has a buffer over-read in print-babel.c:babel_print_v2().
https://nvd.nist.gov/vuln/detail/CVE-2018-14470
4,188
tcpdump
396e94ff55a80d554b1fe46bf107db1e91008d6c
https://github.com/the-tcpdump-group/tcpdump
https://github.com/the-tcpdump-group/tcpdump/commit/396e94ff55a80d554b1fe46bf107db1e91008d6c
(for 4.9.3) CVE-2018-14469/ISAKMP: Add a missing bounds check In ikev1_n_print() check bounds before trying to fetch the replay detection status. This fixes a buffer over-read discovered by Bhargava Shastry. Add a test using the capture file supplied by the reporter(s).
1
ikev1_n_print(netdissect_options *ndo, u_char tpay _U_, const struct isakmp_gen *ext, u_int item_len, const u_char *ep, uint32_t phase _U_, uint32_t doi0 _U_, uint32_t proto0 _U_, int depth _U_) { const struct ikev1_pl_n *p; struct ikev1_pl_n n; const u_char *cp; const u_char *ep2; uint32_t do...
234,740,568,020,028,660,000,000,000,000,000,000,000
print-isakmp.c
46,301,836,066,961,200,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-14469
The IKEv1 parser in tcpdump before 4.9.3 has a buffer over-read in print-isakmp.c:ikev1_n_print().
https://nvd.nist.gov/vuln/detail/CVE-2018-14469
4,189
tcpdump
aa3e54f594385ce7e1e319b0c84999e51192578b
https://github.com/the-tcpdump-group/tcpdump
https://github.com/the-tcpdump-group/tcpdump/commit/aa3e54f594385ce7e1e319b0c84999e51192578b
(for 4.9.3) CVE-2018-14468/FRF.16: Add a missing length check. The specification says in a well-formed Magic Number information element the data is exactly 4 bytes long. In mfr_print() check this before trying to read those 4 bytes. This fixes a buffer over-read discovered by Bhargava Shastry, SecT/TU Berlin. Add a ...
1
mfr_print(netdissect_options *ndo, register const u_char *p, u_int length) { u_int tlen,idx,hdr_len = 0; uint16_t sequence_num; uint8_t ie_type,ie_len; const uint8_t *tptr; /* * FRF.16 Link Integrity Control Frame * * 7 6 5 4 3 2 1 0 * +----+----+----+----+--...
34,406,534,537,232,213,000,000,000,000,000,000,000
print-fr.c
155,609,240,038,833,600,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-14468
The FRF.16 parser in tcpdump before 4.9.3 has a buffer over-read in print-fr.c:mfr_print().
https://nvd.nist.gov/vuln/detail/CVE-2018-14468
4,190
tcpdump
e3f3b445e2d20ac5d5b7fcb7559ce6beb55da0c9
https://github.com/the-tcpdump-group/tcpdump
https://github.com/the-tcpdump-group/tcpdump/commit/e3f3b445e2d20ac5d5b7fcb7559ce6beb55da0c9
(for 4.9.3) CVE-2018-14467/BGP: Fix BGP_CAPCODE_MP. Add a bounds check and a comment to bgp_capabilities_print(). This fixes a buffer over-read discovered by Bhargava Shastry, SecT/TU Berlin. Add a test using the capture file supplied by the reporter(s).
1
bgp_capabilities_print(netdissect_options *ndo, const u_char *opt, int caps_len) { int cap_type, cap_len, tcap_len, cap_offset; int i = 0; while (i < caps_len) { ND_TCHECK2(opt[i], BGP_CAP_HEADER_SIZE); cap_type=opt[i]; cap_len=opt...
48,898,273,469,995,470,000,000,000,000,000,000,000
print-bgp.c
102,553,564,603,133,500,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-14467
The BGP parser in tcpdump before 4.9.3 has a buffer over-read in print-bgp.c:bgp_capabilities_print() (BGP_CAPCODE_MP).
https://nvd.nist.gov/vuln/detail/CVE-2018-14467
4,191
tcpdump
c24922e692a52121e853a84ead6b9337f4c08a94
https://github.com/the-tcpdump-group/tcpdump
https://github.com/the-tcpdump-group/tcpdump/commit/c24922e692a52121e853a84ead6b9337f4c08a94
(for 4.9.3) CVE-2018-14466/Rx: fix an over-read bug In rx_cache_insert() and rx_cache_find() properly read the serviceId field of the rx_header structure as a 16-bit integer. When those functions tried to read 32 bits the extra 16 bits could be outside of the bounds checked in rx_print() for the rx_header structure, a...
1
rx_cache_find(const struct rx_header *rxh, const struct ip *ip, int sport, int32_t *opcode) { int i; struct rx_cache_entry *rxent; uint32_t clip; uint32_t sip; UNALIGNED_MEMCPY(&clip, &ip->ip_dst, sizeof(uint32_t)); UNALIGNED_MEMCPY(&sip, &ip->ip_src, sizeof(uint32_t)); /* Start the search where we last...
103,259,589,506,430,560,000,000,000,000,000,000,000
print-rx.c
87,888,529,561,150,320,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-14466
The Rx parser in tcpdump before 4.9.3 has a buffer over-read in print-rx.c:rx_cache_find() and rx_cache_insert().
https://nvd.nist.gov/vuln/detail/CVE-2018-14466
4,192
tcpdump
bea2686c296b79609060a104cc139810785b0739
https://github.com/the-tcpdump-group/tcpdump
https://github.com/the-tcpdump-group/tcpdump/commit/bea2686c296b79609060a104cc139810785b0739
(for 4.9.3) CVE-2018-14465/RSVP: Add a missing bounds check In rsvp_obj_print(). This fixes a buffer over-read discovered by Bhargava Shastry. Add a test using the capture file supplied by the reporter(s).
1
rsvp_obj_print(netdissect_options *ndo, const u_char *pptr, u_int plen, const u_char *tptr, const char *ident, u_int tlen, const struct rsvp_common_header *rsvp_com_header) { const struct rsvp_object_header *rsvp_obj_header; const u_char *obj_tptr; union { ...
337,800,776,597,343,780,000,000,000,000,000,000,000
print-rsvp.c
309,134,377,433,343,500,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-14465
The RSVP parser in tcpdump before 4.9.3 has a buffer over-read in print-rsvp.c:rsvp_obj_print().
https://nvd.nist.gov/vuln/detail/CVE-2018-14465
4,194
tcpdump
d97e94223720684c6aa740ff219e0d19426c2220
https://github.com/the-tcpdump-group/tcpdump
https://github.com/the-tcpdump-group/tcpdump/commit/d97e94223720684c6aa740ff219e0d19426c2220
(for 4.9.3) CVE-2018-14464/LMP: Add a missing bounds check In lmp_print_data_link_subobjs(). This fixes a buffer over-read discovered by Bhargava Shastry, SecT/TU Berlin. Add a test using the capture file supplied by the reporter(s).
1
lmp_print_data_link_subobjs(netdissect_options *ndo, const u_char *obj_tptr, int total_subobj_len, int offset) { int hexdump = FALSE; int subobj_type, subobj_len; union { /* int to float conversion buffer */ float f; uint32_t i; } bw; while (total_subobj...
251,322,797,576,181,440,000,000,000,000,000,000,000
print-lmp.c
246,828,076,691,630,670,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-14464
The LMP parser in tcpdump before 4.9.3 has a buffer over-read in print-lmp.c:lmp_print_data_link_subobjs().
https://nvd.nist.gov/vuln/detail/CVE-2018-14464
4,195
tcpdump
3de07c772166b7e8e8bb4b9d1d078f1d901b570b
https://github.com/the-tcpdump-group/tcpdump
https://github.com/the-tcpdump-group/tcpdump/commit/3de07c772166b7e8e8bb4b9d1d078f1d901b570b
(for 4.9.3) CVE-2018-14463/VRRP: Add a missing bounds check In vrrp_print(). This fixes a buffer over-read discovered by Bhargava Shastry. Add a test using the capture file supplied by the reporter(s).
1
vrrp_print(netdissect_options *ndo, register const u_char *bp, register u_int len, register const u_char *bp2, int ttl) { int version, type, auth_type = VRRP_AUTH_NONE; /* keep compiler happy */ const char *type_s; ND_TCHECK(bp[0]); version = (bp[0] & 0xf0) >> 4; type = bp[0] & 0x0f; type_s...
177,267,562,973,387,440,000,000,000,000,000,000,000
print-vrrp.c
276,178,921,820,745,950,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-14463
The VRRP parser in tcpdump before 4.9.3 has a buffer over-read in print-vrrp.c:vrrp_print() for VRRP version 2, a different vulnerability than CVE-2019-15167.
https://nvd.nist.gov/vuln/detail/CVE-2018-14463
4,196
tcpdump
1a1bce0526a77b62e41531b00f8bb5e21fd4f3a3
https://github.com/the-tcpdump-group/tcpdump
https://github.com/the-tcpdump-group/tcpdump/commit/1a1bce0526a77b62e41531b00f8bb5e21fd4f3a3
(for 4.9.3) CVE-2018-14462/ICMP: Add a missing bounds check In icmp_print(). This fixes a buffer over-read discovered by Bhargava Shastry. Add two tests using the capture files supplied by the reporter(s).
1
icmp_print(netdissect_options *ndo, const u_char *bp, u_int plen, const u_char *bp2, int fragmented) { char *cp; const struct icmp *dp; const struct icmp_ext_t *ext_dp; const struct ip *ip; const char *str, *fmt; const struct ip *oip; const struct udphdr *ouh; const uint8_t *obj_tptr; ...
292,921,596,680,894,330,000,000,000,000,000,000,000
print-icmp.c
139,842,233,616,481,950,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-14462
The ICMP parser in tcpdump before 4.9.3 has a buffer over-read in print-icmp.c:icmp_print().
https://nvd.nist.gov/vuln/detail/CVE-2018-14462
4,198
tcpdump
aa5c6b710dfd8020d2c908d6b3bd41f1da719b3b
https://github.com/the-tcpdump-group/tcpdump
https://github.com/the-tcpdump-group/tcpdump/commit/aa5c6b710dfd8020d2c908d6b3bd41f1da719b3b
(for 4.9.3) CVE-2018-14461/LDP: Fix a bounds check In ldp_tlv_print(), the FT Session TLV length must be 12, not 8 (RFC3479) This fixes a buffer over-read discovered by Konrad Rieck and Bhargava Shastry. Add a test using the capture file supplied by the reporter(s). Moreover: Add and use tstr[]. Add a comment.
1
ldp_tlv_print(netdissect_options *ndo, register const u_char *tptr, u_short msg_tlen) { struct ldp_tlv_header { uint8_t type[2]; uint8_t length[2]; }; const struct ldp_tlv_header *ldp_tlv_header; u_short tlv_type,tlv_len,tlv_tlen,af,ft_flags; u_char fec_t...
175,449,531,126,840,100,000,000,000,000,000,000,000
print-ldp.c
199,241,510,340,081,260,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-14461
The LDP parser in tcpdump before 4.9.3 has a buffer over-read in print-ldp.c:ldp_tlv_print().
https://nvd.nist.gov/vuln/detail/CVE-2018-14461
4,200
linux
0ad646c81b2182f7fa67ec0c8c825e0ee165696d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/0ad646c81b2182f7fa67ec0c8c825e0ee165696d
tun: call dev_get_valid_name() before register_netdevice() register_netdevice() could fail early when we have an invalid dev name, in which case ->ndo_uninit() is not called. For tun device, this is a problem because a timer etc. are already initialized and it expects ->ndo_uninit() to clean them up. We could move th...
1
static int dev_get_valid_name(struct net *net, struct net_device *dev, const char *name) { BUG_ON(!net); if (!dev_valid_name(name)) return -EINVAL; if (strchr(name, '%')) return dev_alloc_name_ns(net, dev, name); else if (__dev_get_by_name(net, name)) return -EEXIST; else if (dev->name...
194,124,048,216,443,300,000,000,000,000,000,000,000
dev.c
337,658,462,804,777,840,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2018-7191
In the tun subsystem in the Linux kernel before 4.13.14, dev_get_valid_name is not called before register_netdevice. This allows local users to cause a denial of service (NULL pointer dereference and panic) via an ioctl(TUNSETIFF) call with a dev name containing a / character. This is similar to CVE-2013-4343.
https://nvd.nist.gov/vuln/detail/CVE-2018-7191
4,203
linux
0c319d3a144d4b8f1ea2047fd614d2149b68f889
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/0c319d3a144d4b8f1ea2047fd614d2149b68f889
nvmet-fc: ensure target queue id within range. When searching for queue id's ensure they are within the expected range. Signed-off-by: James Smart <james.smart@broadcom.com> Signed-off-by: Christoph Hellwig <hch@lst.de> Signed-off-by: Jens Axboe <axboe@kernel.dk>
1
nvmet_fc_find_target_queue(struct nvmet_fc_tgtport *tgtport, u64 connection_id) { struct nvmet_fc_tgt_assoc *assoc; struct nvmet_fc_tgt_queue *queue; u64 association_id = nvmet_fc_getassociationid(connection_id); u16 qid = nvmet_fc_getqueueid(connection_id); unsigned long flags; spin_lock_irqsave(&tgtpor...
185,335,558,178,742,060,000,000,000,000,000,000,000
fc.c
272,260,028,181,561,500,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2017-18379
In the Linux kernel before 4.14, an out of boundary access happened in drivers/nvme/target/fc.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-18379
4,204
linux
6aeb75e6adfaed16e58780309613a578fe1ee90b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6aeb75e6adfaed16e58780309613a578fe1ee90b
USB: serial: io_ti: fix div-by-zero in set_termios Fix a division-by-zero in set_termios when debugging is enabled and a high-enough speed has been requested so that the divisor value becomes zero. Instead of just fixing the offending debug statement, cap the baud rate at the base as a zero divisor value also appears...
1
static void change_port_settings(struct tty_struct *tty, struct edgeport_port *edge_port, struct ktermios *old_termios) { struct device *dev = &edge_port->port->dev; struct ump_uart_config *config; int baud; unsigned cflag; int status; int port_number = edge_port->port->port_number; config = kmalloc (sizeof (...
2,899,605,228,826,136,000,000,000,000,000,000,000
io_ti.c
311,416,253,777,553,600,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2017-18360
In change_port_settings in drivers/usb/serial/io_ti.c in the Linux kernel before 4.11.3, local users could cause a denial of service by division-by-zero in the serial device layer by trying to set very high baud rates.
https://nvd.nist.gov/vuln/detail/CVE-2017-18360
4,205
linux
193e87143c290ec16838f5368adc0e0bc94eb931
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/193e87143c290ec16838f5368adc0e0bc94eb931
mtd: spi-nor: Off by one in cqspi_setup_flash() There are CQSPI_MAX_CHIPSELECT elements in the ->f_pdata array so the > should be >=. Fixes: 140623410536 ('mtd: spi-nor: Add driver for Cadence Quad SPI Flash Controller') Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com> Reviewed-by: Marek Vasut <marex@denx.de> ...
1
static int cqspi_setup_flash(struct cqspi_st *cqspi, struct device_node *np) { struct platform_device *pdev = cqspi->pdev; struct device *dev = &pdev->dev; struct cqspi_flash_pdata *f_pdata; struct spi_nor *nor; struct mtd_info *mtd; unsigned int cs; int i, ret; /* Get flash device data */ for_each_available_...
186,302,357,406,260,160,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-10764
In the Linux kernel before 4.9.6, there is an off by one in the drivers/mtd/spi-nor/cadence-quadspi.c cqspi_setup_flash() function. There are CQSPI_MAX_CHIPSELECT elements in the ->f_pdata array so the ">" should be ">=" instead.
https://nvd.nist.gov/vuln/detail/CVE-2016-10764
4,206
cJSON
94df772485c92866ca417d92137747b2e3b0a917
https://github.com/DaveGamble/cJSON
https://github.com/DaveGamble/cJSON/commit/94df772485c92866ca417d92137747b2e3b0a917
fix buffer overflow (#30)
1
static const char *parse_string(cJSON *item,const char *str,const char **ep) { const char *ptr=str+1,*end_ptr=str+1;char *ptr2;char *out;int len=0;unsigned uc,uc2; if (*str!='\"') {*ep=str;return 0;} /* not a string! */ while (*end_ptr!='\"' && *end_ptr && ++len) if (*end_ptr++ == '\\') end_ptr++; /* Skip escaped...
118,463,785,809,405,890,000,000,000,000,000,000,000
cjson.c
284,722,214,602,097,060,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2016-10749
parse_string in cJSON.c in cJSON before 2016-10-02 has a buffer over-read, as demonstrated by a string that begins with a " character and ends with a \ character.
https://nvd.nist.gov/vuln/detail/CVE-2016-10749
4,207
libvirt
506e9d6c2d4baaf580d489fff0690c0ff2ff588f
https://github.com/libvirt/libvirt
https://github.com/libvirt/libvirt/commit/506e9d6c2d4baaf580d489fff0690c0ff2ff588f
virDomainGetTime: Deny on RO connections We have a policy that if API may end up talking to a guest agent it should require RW connection. We don't obey the rule in virDomainGetTime(). Signed-off-by: Michal Privoznik <mprivozn@redhat.com>
1
virDomainGetTime(virDomainPtr dom, long long *seconds, unsigned int *nseconds, unsigned int flags) { VIR_DOMAIN_DEBUG(dom, "seconds=%p, nseconds=%p, flags=%x", seconds, nseconds, flags); virResetLastError(); virCheckDomainReturn(do...
207,738,922,790,026,470,000,000,000,000,000,000,000
libvirt-domain.c
330,174,055,389,131,060,000,000,000,000,000,000,000
[ "CWE-254" ]
CVE-2016-10746
libvirt-domain.c in libvirt before 1.3.1 supports virDomainGetTime API calls by guest agents with an RO connection, even though an RW connection was supposed to be required, a different vulnerability than CVE-2019-3886.
https://nvd.nist.gov/vuln/detail/CVE-2016-10746
4,208
linux
1fa2337a315a2448c5434f41e00d56b01a22283c
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1fa2337a315a2448c5434f41e00d56b01a22283c
[media] cx24116: fix a buffer overflow when checking userspace params The maximum size for a DiSEqC command is 6, according to the userspace API. However, the code allows to write up much more values: drivers/media/dvb-frontends/cx24116.c:983 cx24116_send_diseqc_msg() error: buffer overflow 'd->msg' 6 <= 23 Cc: stab...
1
static int cx24116_send_diseqc_msg(struct dvb_frontend *fe, struct dvb_diseqc_master_cmd *d) { struct cx24116_state *state = fe->demodulator_priv; int i, ret; /* Dump DiSEqC message */ if (debug) { printk(KERN_INFO "cx24116: %s(", __func__); for (i = 0 ; i < d->msg_len ;) { printk(KERN_INFO "0x%02x",...
191,512,209,927,685,670,000,000,000,000,000,000,000
cx24116.c
85,302,384,688,479,090,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2015-9289
In the Linux kernel before 4.1.4, a buffer overflow occurs when checking userspace params in drivers/media/dvb-frontends/cx24116.c. The maximum size for a DiSEqC command is 6, according to the userspace API. However, the code allows larger values such as 23.
https://nvd.nist.gov/vuln/detail/CVE-2015-9289
4,211
linux
12f09ccb4612734a53e47ed5302e0479c10a50f8
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/12f09ccb4612734a53e47ed5302e0479c10a50f8
loopback: off by one in tcm_loop_make_naa_tpg() This is an off by one 'tgpt' check in tcm_loop_make_naa_tpg() that could result in memory corruption. Signed-off-by: Dan Carpenter <error27@gmail.com> Signed-off-by: Nicholas A. Bellinger <nab@linux-iscsi.org>
1
struct se_portal_group *tcm_loop_make_naa_tpg( struct se_wwn *wwn, struct config_group *group, const char *name) { struct tcm_loop_hba *tl_hba = container_of(wwn, struct tcm_loop_hba, tl_hba_wwn); struct tcm_loop_tpg *tl_tpg; char *tpgt_str, *end_ptr; int ret; unsigned short int tpgt; tpgt_str = strstr(nam...
173,887,909,380,776,370,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-5327
In the Linux kernel before 3.1, an off by one in the drivers/target/loopback/tcm_loop.c tcm_loop_make_naa_tpg() function could result in at least memory corruption.
https://nvd.nist.gov/vuln/detail/CVE-2011-5327
4,212
linux
0926f91083f34d047abc74f1ca4fa6a9c161f7db
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/0926f91083f34d047abc74f1ca4fa6a9c161f7db
mlx4_en: Fix out of bounds array access When searching for a free entry in either mlx4_register_vlan() or mlx4_register_mac(), and there is no free entry, the loop terminates without updating the local variable free thus causing out of array bounds access. Fix this by adding a proper check outside the loop. Signed-of...
1
int mlx4_register_mac(struct mlx4_dev *dev, u8 port, u64 mac, int *index) { struct mlx4_mac_table *table = &mlx4_priv(dev)->port[port].mac_table; int i, err = 0; int free = -1; mlx4_dbg(dev, "Registering MAC: 0x%llx\n", (unsigned long long) mac); mutex_lock(&table->mutex); for (i = 0; i < MLX4_MAX_MAC_NUM - 1; i...
334,432,146,822,531,400,000,000,000,000,000,000,000
port.c
320,353,152,093,700,700,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2010-5332
In the Linux kernel before 2.6.37, an out of bounds array access happened in drivers/net/mlx4/port.c. When searching for a free entry in either mlx4_register_vlan() or mlx4_register_mac(), and there is no free entry, the loop terminates without updating the local variable free thus causing out of array bounds access.
https://nvd.nist.gov/vuln/detail/CVE-2010-5332
4,213
linux
0926f91083f34d047abc74f1ca4fa6a9c161f7db
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/0926f91083f34d047abc74f1ca4fa6a9c161f7db
mlx4_en: Fix out of bounds array access When searching for a free entry in either mlx4_register_vlan() or mlx4_register_mac(), and there is no free entry, the loop terminates without updating the local variable free thus causing out of array bounds access. Fix this by adding a proper check outside the loop. Signed-of...
1
int mlx4_register_vlan(struct mlx4_dev *dev, u8 port, u16 vlan, int *index) { struct mlx4_vlan_table *table = &mlx4_priv(dev)->port[port].vlan_table; int i, err = 0; int free = -1; mutex_lock(&table->mutex); for (i = MLX4_VLAN_REGULAR; i < MLX4_MAX_VLAN_NUM; i++) { if (free < 0 && (table->refs[i] == 0)) { fr...
152,912,856,707,100,740,000,000,000,000,000,000,000
port.c
320,353,152,093,700,700,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2010-5332
In the Linux kernel before 2.6.37, an out of bounds array access happened in drivers/net/mlx4/port.c. When searching for a free entry in either mlx4_register_vlan() or mlx4_register_mac(), and there is no free entry, the loop terminates without updating the local variable free thus causing out of array bounds access.
https://nvd.nist.gov/vuln/detail/CVE-2010-5332
4,214
linux
0031c41be5c529f8329e327b63cde92ba1284842
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/0031c41be5c529f8329e327b63cde92ba1284842
drivers/gpu/drm/radeon/radeon_atombios.c: range check issues This change makes the array larger, "MAX_SUPPORTED_TV_TIMING_V1_2" is 3 and the original size "MAX_SUPPORTED_TV_TIMING" is 2. Also there were checks that were off by one. Signed-off-by: Dan Carpenter <error27@gmail.com> Acked-by: Alex Deucher <alexdeucher@...
1
bool radeon_atom_get_tv_timings(struct radeon_device *rdev, int index, struct drm_display_mode *mode) { struct radeon_mode_info *mode_info = &rdev->mode_info; ATOM_ANALOG_TV_INFO *tv_info; ATOM_ANALOG_TV_INFO_V1_2 *tv_info_v1_2; ATOM_DTD_FORMAT *dtd_timings; int data_index = GetIndexIntoMasterTable(DATA, Analo...
235,165,537,631,957,300,000,000,000,000,000,000,000
radeon_atombios.c
10,244,202,857,860,056,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2010-5331
In the Linux kernel before 2.6.34, a range check issue in drivers/gpu/drm/radeon/atombios.c could cause an off by one (buffer overflow) problem. NOTE: At least one Linux maintainer believes that this CVE is incorrectly assigned and should be rejected because the value is hard coded and are not user-controllable where i...
https://nvd.nist.gov/vuln/detail/CVE-2010-5331
4,215
linux
2a2f11c227bdf292b3a2900ad04139d301b56ac4
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/2a2f11c227bdf292b3a2900ad04139d301b56ac4
NetLabel: correct CIPSO tag handling when adding new DOI definitions The current netlbl_cipsov4_add_common() function has two problems which are fixed with this patch. The first is an off-by-one bug where it is possibile to overflow the doi_def->tags[] array. The second is a bug where the same doi_def->tags[] array ...
1
static int netlbl_cipsov4_add_common(struct genl_info *info, struct cipso_v4_doi *doi_def) { struct nlattr *nla; int nla_rem; u32 iter = 0; doi_def->doi = nla_get_u32(info->attrs[NLBL_CIPSOV4_A_DOI]); if (nla_validate_nested(info->attrs[NLBL_CIPSOV4_A_TAGLST], NLBL_CIPSOV4_A_MAX, netlbl_cipsov4_...
185,225,743,962,151,470,000,000,000,000,000,000,000
netlabel_cipso_v4.c
9,839,229,491,276,271,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2007-6762
In the Linux kernel before 2.6.20, there is an off-by-one bug in net/netlabel/netlabel_cipso_v4.c where it is possible to overflow the doi_def->tags[] array.
https://nvd.nist.gov/vuln/detail/CVE-2007-6762
4,217
linux
1df2ae31c724e57be9d7ac00d78db8a5dabdd050
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1df2ae31c724e57be9d7ac00d78db8a5dabdd050
udf: Fortify loading of sparing table Add sanity checks when loading sparing table from disk to avoid accessing unallocated memory or writing to it. Signed-off-by: Jan Kara <jack@suse.cz>
1
static int udf_load_logicalvol(struct super_block *sb, sector_t block, struct kernel_lb_addr *fileset) { struct logicalVolDesc *lvd; int i, j, offset; uint8_t type; struct udf_sb_info *sbi = UDF_SB(sb); struct genericPartitionMap *gpm; uint16_t ident; struct buffer_head *bh; unsigned int table_...
203,586,019,560,546,920,000,000,000,000,000,000,000
super.c
167,850,010,728,400,120,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2012-3400
Heap-based buffer overflow in the udf_load_logicalvol function in fs/udf/super.c in the Linux kernel before 3.4.5 allows remote attackers to cause a denial of service (system crash) or possibly have unspecified other impact via a crafted UDF filesystem.
https://nvd.nist.gov/vuln/detail/CVE-2012-3400
4,223
linux
093019cf1b18dd31b2c3b77acce4e000e2cbc9ce
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/093019cf1b18dd31b2c3b77acce4e000e2cbc9ce
xfs: fix acl count validation in xfs_acl_from_disk() Commit fa8b18ed didn't prevent the integer overflow and possible memory corruption. "count" can go negative and bypass the check. Signed-off-by: Xi Wang <xi.wang@gmail.com> Reviewed-by: Christoph Hellwig <hch@lst.de> Signed-off-by: Ben Myers <bpm@sgi.com>
1
xfs_acl_from_disk(struct xfs_acl *aclp) { struct posix_acl_entry *acl_e; struct posix_acl *acl; struct xfs_acl_entry *ace; int count, i; count = be32_to_cpu(aclp->acl_cnt); if (count > XFS_ACL_MAX_ENTRIES) return ERR_PTR(-EFSCORRUPTED); acl = posix_acl_alloc(count, GFP_KERNEL); if (!acl) return ERR_...
338,872,511,102,859,500,000,000,000,000,000,000,000
xfs_acl.c
255,306,518,644,300,600,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-0038
Integer overflow in the xfs_acl_from_disk function in fs/xfs/xfs_acl.c in the Linux kernel before 3.1.9 allows local users to cause a denial of service (panic) via a filesystem with a malformed ACL, leading to a heap-based buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2012-0038
4,227
linux
e40f193f5bb022e927a57a4f5d5194e4f12ddb74
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/e40f193f5bb022e927a57a4f5d5194e4f12ddb74
KVM: Fix iommu map/unmap to handle memory slot moves The iommu integration into memory slots expects memory slots to be added or removed and doesn't handle the move case. We can unmap slots from the iommu after we mark them invalid and map them before installing the final memslot array. Also re-order the kmemdup vs ...
1
int __kvm_set_memory_region(struct kvm *kvm, struct kvm_userspace_memory_region *mem, int user_alloc) { int r; gfn_t base_gfn; unsigned long npages; struct kvm_memory_slot *memslot, *slot; struct kvm_memory_slot old, new; struct kvm_memslots *slots, *old_memslots; r = check_memory_region_flags(mem...
42,039,554,948,212,130,000,000,000,000,000,000,000
kvm_main.c
289,658,061,896,194,840,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2013-4592
Memory leak in the __kvm_set_memory_region function in virt/kvm/kvm_main.c in the Linux kernel before 3.9 allows local users to cause a denial of service (memory consumption) by leveraging certain device access to trigger movement of memory slots.
https://nvd.nist.gov/vuln/detail/CVE-2013-4592
4,228
linux
c547dbf55d5f8cf615ccc0e7265e98db27d3fb8b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c547dbf55d5f8cf615ccc0e7265e98db27d3fb8b
ip6_output: do skb ufo init for peeked non ufo skb as well Now, if user application does: sendto len<mtu flag MSG_MORE sendto len>mtu flag 0 The skb is not treated as fragmented one because it is not initialized that way. So move the initialization to fix this. introduced by: commit e89e9cf539a28df7d0eb1d0a545368e992...
1
static inline int ip6_ufo_append_data(struct sock *sk, int getfrag(void *from, char *to, int offset, int len, int odd, struct sk_buff *skb), void *from, int length, int hh_len, int fragheaderlen, int transhdrlen, int mtu,unsigned int flags, struct rt6_info *rt) { struct sk_buff *skb; int err; ...
210,909,608,125,529,560,000,000,000,000,000,000,000
ip6_output.c
21,304,489,657,470,253,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-4470
The Linux kernel before 3.12, when UDP Fragmentation Offload (UFO) is enabled, does not properly initialize certain data structures, which allows local users to cause a denial of service (memory corruption and system crash) or possibly gain privileges via a crafted application that uses the UDP_CORK option in a setsock...
https://nvd.nist.gov/vuln/detail/CVE-2013-4470
4,229
linux
c802d759623acbd6e1ee9fbdabae89159a513913
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c802d759623acbd6e1ee9fbdabae89159a513913
netrom: fix invalid use of sizeof in nr_recvmsg() sizeof() when applied to a pointer typed expression gives the size of the pointer, not that of the pointed data. Introduced by commit 3ce5ef(netrom: fix info leak via msg_name in nr_recvmsg) Signed-off-by: Wei Yongjun <yongjun_wei@trendmicro.com.cn> Signed-off-by: Dav...
1
static int nr_recvmsg(struct kiocb *iocb, struct socket *sock, struct msghdr *msg, size_t size, int flags) { struct sock *sk = sock->sk; struct sockaddr_ax25 *sax = (struct sockaddr_ax25 *)msg->msg_name; size_t copied; struct sk_buff *skb; int er; /* * This works for seqpacket too. The receiver has ord...
328,939,254,347,918,100,000,000,000,000,000,000,000
af_netrom.c
92,523,120,517,097,200,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2013-3232
The nr_recvmsg function in net/netrom/af_netrom.c in the Linux kernel before 3.9-rc7 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.
https://nvd.nist.gov/vuln/detail/CVE-2013-3232
4,230
linux
e3211c120a85b792978bcb4be7b2886df18d27f0
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/e3211c120a85b792978bcb4be7b2886df18d27f0
userns: Check uid_map's opener's fsuid, not the current fsuid Signed-off-by: Andy Lutomirski <luto@amacapital.net>
1
static bool new_idmap_permitted(const struct file *file, struct user_namespace *ns, int cap_setid, struct uid_gid_map *new_map) { /* Allow mapping to your own filesystem ids */ if ((new_map->nr_extents == 1) && (new_map->extent[0].count == 1)) { u32 id = new_map->extent[0].lower_first; if (cap_setid ==...
42,581,331,517,218,380,000,000,000,000,000,000,000
user_namespace.c
170,014,386,278,445,950,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-1959
kernel/user_namespace.c in the Linux kernel before 3.8.9 does not have appropriate capability requirements for the uid_map and gid_map files, which allows local users to gain privileges by opening a file within an unprivileged process and then modifying the file within a privileged process.
https://nvd.nist.gov/vuln/detail/CVE-2013-1959
4,231
linux
3c0c5cfdcd4d69ffc4b9c0907cec99039f30a50a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/3c0c5cfdcd4d69ffc4b9c0907cec99039f30a50a
atm: fix info leak via getsockname() The ATM code fails to initialize the two padding bytes of struct sockaddr_atmpvc inserted for alignment. Add an explicit memset(0) before filling the structure to avoid the info leak. Signed-off-by: Mathias Krause <minipli@googlemail.com> Signed-off-by: David S. Miller <davem@dave...
1
static int pvc_getname(struct socket *sock, struct sockaddr *sockaddr, int *sockaddr_len, int peer) { struct sockaddr_atmpvc *addr; struct atm_vcc *vcc = ATM_SD(sock); if (!vcc->dev || !test_bit(ATM_VF_ADDR, &vcc->flags)) return -ENOTCONN; *sockaddr_len = sizeof(struct sockaddr_atmpvc); addr = (stru...
86,538,267,407,615,000,000,000,000,000,000,000,000
pvc.c
132,442,317,636,064,100,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2012-6546
The ATM implementation in the Linux kernel before 3.6 does not initialize certain structures, which allows local users to obtain sensitive information from kernel stack memory via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2012-6546
4,232
linux
9ad2de43f1aee7e7274a4e0d41465489299e344b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/9ad2de43f1aee7e7274a4e0d41465489299e344b
Bluetooth: RFCOMM - Fix info leak in getsockopt(BT_SECURITY) The RFCOMM code fails to initialize the key_size member of struct bt_security before copying it to userland -- that for leaking one byte kernel stack. Initialize key_size with 0 to avoid the info leak. Signed-off-by: Mathias Krause <minipli@googlemail.com> ...
1
static int rfcomm_sock_getsockopt(struct socket *sock, int level, int optname, char __user *optval, int __user *optlen) { struct sock *sk = sock->sk; struct bt_security sec; int len, err = 0; BT_DBG("sk %p", sk); if (level == SOL_RFCOMM) return rfcomm_sock_getsockopt_old(sock, optname, optval, optlen); if (l...
287,987,662,761,858,430,000,000,000,000,000,000,000
sock.c
154,602,950,500,930,880,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2012-6545
The Bluetooth RFCOMM implementation in the Linux kernel before 3.6 does not properly initialize certain structures, which allows local users to obtain sensitive information from kernel memory via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2012-6545
4,233
linux
792039c73cf176c8e39a6e8beef2c94ff46522ed
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/792039c73cf176c8e39a6e8beef2c94ff46522ed
Bluetooth: L2CAP - Fix info leak via getsockname() The L2CAP code fails to initialize the l2_bdaddr_type member of struct sockaddr_l2 and the padding byte added for alignment. It that for leaks two bytes kernel stack via the getsockname() syscall. Add an explicit memset(0) before filling the structure to avoid the inf...
1
static int l2cap_sock_getname(struct socket *sock, struct sockaddr *addr, int *len, int peer) { struct sockaddr_l2 *la = (struct sockaddr_l2 *) addr; struct sock *sk = sock->sk; struct l2cap_chan *chan = l2cap_pi(sk)->chan; BT_DBG("sock %p, sk %p", sock, sk); addr->sa_family = AF_BLUETOOTH; *len = sizeof(s...
34,986,358,148,467,107,000,000,000,000,000,000,000
l2cap_sock.c
15,566,378,726,684,005,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2012-6544
The Bluetooth protocol stack in the Linux kernel before 3.6 does not properly initialize certain structures, which allows local users to obtain sensitive information from kernel stack memory via a crafted application that targets the (1) L2CAP or (2) HCI implementation.
https://nvd.nist.gov/vuln/detail/CVE-2012-6544
4,234
linux
3f68ba07b1da811bf383b4b701b129bfcb2e4988
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/3f68ba07b1da811bf383b4b701b129bfcb2e4988
Bluetooth: HCI - Fix info leak via getsockname() The HCI code fails to initialize the hci_channel member of struct sockaddr_hci and that for leaks two bytes kernel stack via the getsockname() syscall. Initialize hci_channel with 0 to avoid the info leak. Signed-off-by: Mathias Krause <minipli@googlemail.com> Cc: Marc...
1
static int hci_sock_getname(struct socket *sock, struct sockaddr *addr, int *addr_len, int peer) { struct sockaddr_hci *haddr = (struct sockaddr_hci *) addr; struct sock *sk = sock->sk; struct hci_dev *hdev = hci_pi(sk)->hdev; BT_DBG("sock %p sk %p", sock, sk); if (!hdev) return -EBADFD; lock_sock(sk)...
40,232,294,479,022,940,000,000,000,000,000,000,000
hci_sock.c
182,751,817,217,473,300,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2012-6544
The Bluetooth protocol stack in the Linux kernel before 3.6 does not properly initialize certain structures, which allows local users to obtain sensitive information from kernel stack memory via a crafted application that targets the (1) L2CAP or (2) HCI implementation.
https://nvd.nist.gov/vuln/detail/CVE-2012-6544
4,235
linux
1f86840f897717f86d523a13e99a447e6a5d2fa5
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1f86840f897717f86d523a13e99a447e6a5d2fa5
xfrm_user: fix info leak in copy_to_user_tmpl() The memory used for the template copy is a local stack variable. As struct xfrm_user_tmpl contains multiple holes added by the compiler for alignment, not initializing the memory will lead to leaking stack bytes to userland. Add an explicit memset(0) to avoid the info le...
1
static int copy_to_user_tmpl(struct xfrm_policy *xp, struct sk_buff *skb) { struct xfrm_user_tmpl vec[XFRM_MAX_DEPTH]; int i; if (xp->xfrm_nr == 0) return 0; for (i = 0; i < xp->xfrm_nr; i++) { struct xfrm_user_tmpl *up = &vec[i]; struct xfrm_tmpl *kp = &xp->xfrm_vec[i]; memcpy(&up->id, &kp->id, size...
76,479,207,690,283,055,000,000,000,000,000,000,000
xfrm_user.c
66,804,102,214,937,230,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2012-6537
net/xfrm/xfrm_user.c in the Linux kernel before 3.6 does not initialize certain structures, which allows local users to obtain sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability.
https://nvd.nist.gov/vuln/detail/CVE-2012-6537
4,238
linux
883a1d49f0d77d30012f114b2e19fc141beb3e8e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/883a1d49f0d77d30012f114b2e19fc141beb3e8e
ALSA: control: Make sure that id->index does not overflow The ALSA control code expects that the range of assigned indices to a control is continuous and does not overflow. Currently there are no checks to enforce this. If a control with a overflowing index range is created that control becomes effectively inaccessibl...
1
int snd_ctl_add(struct snd_card *card, struct snd_kcontrol *kcontrol) { struct snd_ctl_elem_id id; unsigned int idx; unsigned int count; int err = -EINVAL; if (! kcontrol) return err; if (snd_BUG_ON(!card || !kcontrol->info)) goto error; id = kcontrol->id; down_write(&card->controls_rwsem); if (snd_c...
304,470,449,259,529,630,000,000,000,000,000,000,000
control.c
179,532,723,377,993,540,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2014-4656
Multiple integer overflows in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 allow local users to cause a denial of service by leveraging /dev/snd/controlCX access, related to (1) index values in the snd_ctl_add function and (2) numid values in the snd_ctl_remove_numid_conflic...
https://nvd.nist.gov/vuln/detail/CVE-2014-4656
4,239
cgminer
bac5831b355f916e0696b7bbcccfc51c057b729a
https://github.com/ckolivas/cgminer
https://github.com/sgminer-dev/sgminer/commit/bac5831b355f916e0696b7bbcccfc51c057b729a
None
1
bool initiate_stratum(struct pool *pool) { bool ret = false, recvd = false, noresume = false, sockd = false; char s[RBUFSIZE], *sret = NULL, *nonce1, *sessionid; json_t *val = NULL, *res_val, *err_val; json_error_t err; int n2size; resend: if (!setup_stratum_socket(pool)) { /* FIXME: change to LOG_DEBUG when i...
85,722,006,779,524,040,000,000,000,000,000,000,000
util.c
294,909,057,015,150,300,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2014-4502
Multiple heap-based buffer overflows in the parse_notify function in sgminer before 4.2.2, cgminer before 4.3.5, and BFGMiner before 4.1.0 allow remote pool servers to have unspecified impact via a (1) large or (2) negative value in the Extranonc2_size parameter in a mining.subscribe response and a crafted mining.notif...
https://nvd.nist.gov/vuln/detail/CVE-2014-4502
4,249
php-src
0641e56be1af003aa02c7c6b0184466540637233
https://github.com/php/php-src
https://github.com/file/file/commit/0641e56be1af003aa02c7c6b0184466540637233
None
1
cdf_read_property_info(const cdf_stream_t *sst, const cdf_header_t *h, uint32_t offs, cdf_property_info_t **info, size_t *count, size_t *maxcount) { const cdf_section_header_t *shp; cdf_section_header_t sh; const uint8_t *p, *q, *e; int16_t s16; int32_t s32; uint32_t u32; int64_t s64; uint64_t u64; cdf_tim...
310,605,146,063,042,650,000,000,000,000,000,000,000
cdf.c
320,241,359,265,609,450,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2014-3587
Integer overflow in the cdf_read_property_info function in cdf.c in file through 5.19, as used in the Fileinfo component in PHP before 5.4.32 and 5.5.x before 5.5.16, allows remote attackers to cause a denial of service (application crash) via a crafted CDF file. NOTE: this vulnerability exists because of an incomplet...
https://nvd.nist.gov/vuln/detail/CVE-2014-3587
4,250
file
74cafd7de9ec99a14f4480927580e501c8f852c3
https://github.com/file/file
https://github.com/file/file/commit/74cafd7de9ec99a14f4480927580e501c8f852c3
If requested, limit search length.
1
magiccheck(struct magic_set *ms, struct magic *m) { uint64_t l = m->value.q; uint64_t v; float fl, fv; double dl, dv; int matched; union VALUETYPE *p = &ms->ms_value; switch (m->type) { case FILE_BYTE: v = p->b; break; case FILE_SHORT: case FILE_BESHORT: case FILE_LESHORT: v = p->h; break; case F...
22,957,534,152,900,236,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2014-3538
file before 5.19 does not properly restrict the amount of data read during a regex search, which allows remote attackers to cause a denial of service (CPU consumption) via a crafted file that triggers backtracking during processing of an awk rule. NOTE: this vulnerability exists because of an incomplete fix for CVE-20...
https://nvd.nist.gov/vuln/detail/CVE-2014-3538
4,251
linux
fdc81f45e9f57858da6351836507fbcf1b7583ee
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/fdc81f45e9f57858da6351836507fbcf1b7583ee
sg_start_req(): use import_iovec() Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
1
sg_start_req(Sg_request *srp, unsigned char *cmd) { int res; struct request *rq; Sg_fd *sfp = srp->parentfp; sg_io_hdr_t *hp = &srp->header; int dxfer_len = (int) hp->dxfer_len; int dxfer_dir = hp->dxfer_direction; unsigned int iov_count = hp->iovec_count; Sg_scatter_hold *req_schp = &srp->data; Sg_scatter_hol...
66,924,822,577,657,650,000,000,000,000,000,000,000
sg.c
72,917,896,964,332,490,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2015-5707
Integer overflow in the sg_start_req function in drivers/scsi/sg.c in the Linux kernel 2.6.x through 4.x before 4.1 allows local users to cause a denial of service or possibly have unspecified other impact via a large iov_count value in a write request.
https://nvd.nist.gov/vuln/detail/CVE-2015-5707
4,252
linux
9a59029bc218b48eff8b5d4dde5662fd79d3e1a8
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/9a59029bc218b48eff8b5d4dde5662fd79d3e1a8
ozwpan: unchecked signed subtraction leads to DoS The subtraction here was using a signed integer and did not have any bounds checking at all. This commit adds proper bounds checking, made easy by use of an unsigned integer. This way, a single packet won't be able to remotely trigger a massive loop, locking up the sys...
1
static void oz_usb_handle_ep_data(struct oz_usb_ctx *usb_ctx, struct oz_usb_hdr *usb_hdr, int len) { struct oz_data *data_hdr = (struct oz_data *)usb_hdr; switch (data_hdr->format) { case OZ_DATA_F_MULTIPLE_FIXED: { struct oz_multiple_fixed *body = (struct oz_multiple_fixed *)data_hdr; u8 *data = body...
236,342,740,336,501,530,000,000,000,000,000,000,000
ozusbsvc1.c
24,203,781,560,545,576,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2015-4002
drivers/staging/ozwpan/ozusbsvc1.c in the OZWPAN driver in the Linux kernel through 4.0.5 does not ensure that certain length values are sufficiently large, which allows remote attackers to cause a denial of service (system crash or large loop) or possibly execute arbitrary code via a crafted packet, related to the (1)...
https://nvd.nist.gov/vuln/detail/CVE-2015-4002
4,253
linux
cde93be45a8a90d8c264c776fab63487b5038a65
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/cde93be45a8a90d8c264c776fab63487b5038a65
dcache: Handle escaped paths in prepend_path A rename can result in a dentry that by walking up d_parent will never reach it's mnt_root. For lack of a better term I call this an escaped path. prepend_path is called by four different functions __d_path, d_absolute_path, d_path, and getcwd. __d_path only wants to see...
1
static int prepend_path(const struct path *path, const struct path *root, char **buffer, int *buflen) { struct dentry *dentry; struct vfsmount *vfsmnt; struct mount *mnt; int error = 0; unsigned seq, m_seq = 0; char *bptr; int blen; rcu_read_lock(); restart_mnt: read_seqbegin_or_lock(&mount_lock, &m_seq...
240,377,922,459,030,080,000,000,000,000,000,000,000
dcache.c
221,889,601,120,940,870,000,000,000,000,000,000,000
[ "CWE-254" ]
CVE-2015-2925
The prepend_path function in fs/dcache.c in the Linux kernel before 4.2.4 does not properly handle rename actions inside a bind mount, which allows local users to bypass an intended container protection mechanism by renaming a directory, related to a "double-chroot attack."
https://nvd.nist.gov/vuln/detail/CVE-2015-2925
4,256
linux
637b58c2887e5e57850865839cc75f59184b23d1
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/637b58c2887e5e57850865839cc75f59184b23d1
switch pipe_read() to copy_page_to_iter() Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
1
pipe_read(struct kiocb *iocb, const struct iovec *_iov, unsigned long nr_segs, loff_t pos) { struct file *filp = iocb->ki_filp; struct pipe_inode_info *pipe = filp->private_data; int do_wakeup; ssize_t ret; struct iovec *iov = (struct iovec *)_iov; size_t total_len; total_len = iov_length(iov, nr_segs)...
68,472,811,572,124,770,000,000,000,000,000,000,000
pipe.c
80,334,105,915,950,020,000,000,000,000,000,000,000
[ "CWE-17" ]
CVE-2015-1805
The (1) pipe_read and (2) pipe_write implementations in fs/pipe.c in the Linux kernel before 3.16 do not properly consider the side effects of failed __copy_to_user_inatomic and __copy_from_user_inatomic calls, which allows local users to cause a denial of service (system crash) or possibly gain privileges via a crafte...
https://nvd.nist.gov/vuln/detail/CVE-2015-1805
4,257
linux
a1d47b262952a45aae62bd49cfaf33dd76c11a2c
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a1d47b262952a45aae62bd49cfaf33dd76c11a2c
udf: Verify symlink size before loading it UDF specification allows arbitrarily large symlinks. However we support only symlinks at most one block large. Check the length of the symlink so that we don't access memory beyond end of the symlink block. CC: stable@vger.kernel.org Reported-by: Carl Henrik Lunde <chlunde@g...
1
static int udf_symlink_filler(struct file *file, struct page *page) { struct inode *inode = page->mapping->host; struct buffer_head *bh = NULL; unsigned char *symlink; int err = -EIO; unsigned char *p = kmap(page); struct udf_inode_info *iinfo; uint32_t pos; iinfo = UDF_I(inode); pos = udf_block_map(...
310,960,582,466,799,800,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2014-9728
The UDF filesystem implementation in the Linux kernel before 3.18.2 does not validate certain lengths, which allows local users to cause a denial of service (buffer over-read and system crash) via a crafted filesystem image, related to fs/udf/inode.c and fs/udf/symlink.c.
https://nvd.nist.gov/vuln/detail/CVE-2014-9728
4,266
libgd
c18263e0e0769faee96a5d0ee04b750c442783c6
https://github.com/libgd/libgd
https://github.com/php/php-src/commit/c18263e0e0769faee96a5d0ee04b750c442783c6
None
1
void gdImageWebpCtx (gdImagePtr im, gdIOCtx * outfile, int quantization) { uint8_t *argb; int x, y; uint8_t *p; uint8_t *out; size_t out_size; if (im == NULL) { return; } if (!gdImageTrueColor(im)) { zend_error(E_ERROR, "Paletter image not supported by webp"); return; } if (quantization == -1) { q...
260,398,564,512,501,660,000,000,000,000,000,000,000
None
null
[ "CWE-190" ]
CVE-2016-7568
Integer overflow in the gdImageWebpCtx function in gd_webp.c in the GD Graphics Library (aka libgd) through 2.2.3, as used in PHP through 7.0.11, allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted imagewebp and imagedestroy calls.
https://nvd.nist.gov/vuln/detail/CVE-2016-7568
4,267
openjpeg
ef01f18dfc6780b776d0674ed3e7415c6ef54d24
https://github.com/uclouvain/openjpeg
https://github.com/uclouvain/openjpeg/commit/ef01f18dfc6780b776d0674ed3e7415c6ef54d24
Cast to size_t before multiplication Need to cast to size_t before multiplication otherwise overflow check is useless.
1
opj_pi_iterator_t *opj_pi_create_decode(opj_image_t *p_image, opj_cp_t *p_cp, OPJ_UINT32 p_tile_no) { /* loop */ OPJ_UINT32 pino; OPJ_UINT32 compno, resno; /* to store w, h, dx and dy fro all components and resolutions */ OPJ_UINT32 * l_tmp_data; OPJ_UINT32 ** l_tmp_ptr; /* encoding pramete...
214,675,431,033,653,840,000,000,000,000,000,000,000
pi.c
155,797,594,499,992,280,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2016-7163
Integer overflow in the opj_pi_create_decode function in pi.c in OpenJPEG allows remote attackers to execute arbitrary code via a crafted JP2 file, which triggers an out-of-bounds read or write.
https://nvd.nist.gov/vuln/detail/CVE-2016-7163
4,268
libgd
3c2b605d72e8b080dace1d98a6e50b46c1d12186
https://github.com/libgd/libgd
https://github.com/libgd/libgd/commit/3c2b605d72e8b080dace1d98a6e50b46c1d12186
bug #248, fix Out-Of-Bounds Read in read_image_tga
1
int read_image_tga( gdIOCtx *ctx, oTga *tga ) { int pixel_block_size = (tga->bits / 8); int image_block_size = (tga->width * tga->height) * pixel_block_size; uint8_t* decompression_buffer = NULL; unsigned char* conversion_buffer = NULL; int buffer_caret = 0; int bitmap_caret = 0; int i = 0; int j = 0; uint8_t ...
88,682,079,805,925,440,000,000,000,000,000,000,000
gd_tga.c
316,236,023,198,357,030,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2016-6905
The read_image_tga function in gd_tga.c in the GD Graphics Library (aka libgd) before 2.2.3 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted TGA image.
https://nvd.nist.gov/vuln/detail/CVE-2016-6905
4,269
linux
54d5ca871e72f2bb172ec9323497f01cd5091ec7
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/54d5ca871e72f2bb172ec9323497f01cd5091ec7
vfs: add vfs_select_inode() helper Signed-off-by: Miklos Szeredi <mszeredi@redhat.com> Cc: <stable@vger.kernel.org> # v4.2+
1
int vfs_open(const struct path *path, struct file *file, const struct cred *cred) { struct dentry *dentry = path->dentry; struct inode *inode = dentry->d_inode; file->f_path = *path; if (dentry->d_flags & DCACHE_OP_SELECT_INODE) { inode = dentry->d_op->d_select_inode(dentry, file->f_flags); if (IS_ER...
81,047,983,480,425,140,000,000,000,000,000,000,000
open.c
329,475,889,001,649,380,000,000,000,000,000,000,000
[ "CWE-284" ]
CVE-2016-6198
The filesystem layer in the Linux kernel before 4.5.5 proceeds with post-rename operations after an OverlayFS file is renamed to a self-hardlink, which allows local users to cause a denial of service (system crash) via a rename system call, related to fs/namei.c and fs/open.c.
https://nvd.nist.gov/vuln/detail/CVE-2016-6198
4,281
ImageMagick
fc43974d34318c834fbf78570ca1a3764ed8c7d7
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/fc43974d34318c834fbf78570ca1a3764ed8c7d7
Ensure image extent does not exceed maximum
1
static Image *ReadWPGImage(const ImageInfo *image_info, ExceptionInfo *exception) { typedef struct { size_t FileId; MagickOffsetType DataOffset; unsigned int ProductType; unsigned int FileType; unsigned char MajorVersion; unsigned char MinorVersion; unsigned int EncryptKey; unsigne...
180,171,464,052,447,030,000,000,000,000,000,000,000
wpg.c
99,965,343,271,644,740,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-5688
The WPG parser in ImageMagick before 6.9.4-4 and 7.x before 7.0.1-5, when a memory limit is set, allows remote attackers to have unspecified impact via vectors related to the SetImageExtent return-value check, which trigger (1) a heap-based buffer overflow in the SetPixelIndex function or an invalid write operation in ...
https://nvd.nist.gov/vuln/detail/CVE-2016-5688
4,287
wireshark
5efb45231671baa2db2011d8f67f9d6e72bc455b
https://github.com/wireshark/wireshark
https://github.com/wireshark/wireshark/commit/5efb45231671baa2db2011d8f67f9d6e72bc455b
Fix packet length handling. Treat the packet length as unsigned - it shouldn't be negative in the file. If it is, that'll probably cause the sscanf to fail, so we'll report the file as bad. Check it against WTAP_MAX_PACKET_SIZE to make sure we don't try to allocate a huge amount of memory, just as we do in other fil...
1
parse_toshiba_packet(FILE_T fh, struct wtap_pkthdr *phdr, Buffer *buf, int *err, gchar **err_info) { union wtap_pseudo_header *pseudo_header = &phdr->pseudo_header; char line[TOSHIBA_LINE_LENGTH]; int num_items_scanned; int pkt_len, pktnum, hr, min, sec, csec; char channel[10], direction[10]; int i, hex_...
309,314,898,049,093,650,000,000,000,000,000,000,000
toshiba.c
201,719,230,202,864,100,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2016-5355
wiretap/toshiba.c in the Toshiba file parser in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles sscanf unsigned-integer processing, which allows remote attackers to cause a denial of service (application crash) via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2016-5355
4,288
libimobiledevice
4397b3376dc4e4cb1c991d0aed61ce6482614196
https://github.com/libimobiledevice/libimobiledevice
https://github.com/libimobiledevice/libusbmuxd/commit/4397b3376dc4e4cb1c991d0aed61ce6482614196
None
1
int socket_create(uint16_t port) { int sfd = -1; int yes = 1; #ifdef WIN32 WSADATA wsa_data; if (!wsa_init) { if (WSAStartup(MAKEWORD(2,2), &wsa_data) != ERROR_SUCCESS) { fprintf(stderr, "WSAStartup failed!\n"); ExitProcess(-1); } wsa_init = 1; } #endif struct sockaddr_in saddr; if (0 > (sfd = socke...
294,733,776,418,858,640,000,000,000,000,000,000,000
None
null
[ "CWE-284" ]
CVE-2016-5104
The socket_create function in common/socket.c in libimobiledevice and libusbmuxd allows remote attackers to bypass intended access restrictions and communicate with services on iOS devices by connecting to an IPv4 TCP socket.
https://nvd.nist.gov/vuln/detail/CVE-2016-5104
4,289
linux
9a47e9cff994f37f7f0dbd9ae23740d0f64f9fe6
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/9a47e9cff994f37f7f0dbd9ae23740d0f64f9fe6
ALSA: timer: Fix leak in events via snd_timer_user_ccallback The stack object “r1” has a total size of 32 bytes. Its field “event” and “val” both contain 4 bytes padding. These 8 bytes padding bytes are sent to user without being initialized. Signed-off-by: Kangjie Lu <kjlu@gatech.edu> Signed-off-by: Takashi Iwai <ti...
1
static void snd_timer_user_ccallback(struct snd_timer_instance *timeri, int event, struct timespec *tstamp, unsigned long resolution) { struct snd_timer_user *tu = timeri->callback_data; struct snd_timer_tread r1; unsigned long flags; if (event >= SNDRV_TIMER_EVENT_START && event <=...
53,749,721,225,904,320,000,000,000,000,000,000,000
timer.c
102,836,771,800,390,000,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2016-4578
sound/core/timer.c in the Linux kernel through 4.6 does not initialize certain r1 data structures, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions.
https://nvd.nist.gov/vuln/detail/CVE-2016-4578
4,290
linux
1666984c8625b3db19a9abc298931d35ab7bc64b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1666984c8625b3db19a9abc298931d35ab7bc64b
usbnet: cleanup after bind() in probe() In case bind() works, but a later error forces bailing in probe() in error cases work and a timer may be scheduled. They must be killed. This fixes an error case related to the double free reported in http://www.spinics.net/lists/netdev/msg367669.html and needs to go on top of L...
1
usbnet_probe (struct usb_interface *udev, const struct usb_device_id *prod) { struct usbnet *dev; struct net_device *net; struct usb_host_interface *interface; struct driver_info *info; struct usb_device *xdev; int status; const char *name; struct usb_driver *driver = to_usb_driver(udev->dev.driver);...
17,911,033,984,720,165,000,000,000,000,000,000,000
None
null
[ "CWE-703" ]
CVE-2016-3951
Double free vulnerability in drivers/net/usb/cdc_ncm.c in the Linux kernel before 4.5 allows physically proximate attackers to cause a denial of service (system crash) or possibly have unspecified other impact by inserting a USB device with an invalid USB descriptor.
https://nvd.nist.gov/vuln/detail/CVE-2016-3951