idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
4,081 | libmysofa | d39a171e9c6a1c44dbdf43f9db6c3fbd887e38c1 | https://github.com/hoene/libmysofa | https://github.com/hoene/libmysofa/commit/d39a171e9c6a1c44dbdf43f9db6c3fbd887e38c1 | Fixed security issue 1 | 1 | int treeRead(struct READER *reader, struct DATAOBJECT *data) {
int i, j, err, olen, elements, size, x, y, z, b, e, dy, dz, sx, sy, sz, dzy,
szy;
char *input, *output;
uint8_t node_type, node_level;
uint16_t entries_used;
uint32_t size_of_chunk;
uint32_t filter_mask;
uint64_t address_of_left_sibling, address_... | 20,763,822,898,396,646,000,000,000,000,000,000,000 | btree.c | 57,865,174,352,816,090,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2019-10672 | treeRead in hdf/btree.c in libmysofa before 0.7 does not properly validate multiplications and additions. | https://nvd.nist.gov/vuln/detail/CVE-2019-10672 |
4,082 | domoticz | ee70db46f81afa582c96b887b73bcd2a86feda00 | https://github.com/domoticz/domoticz | https://github.com/domoticz/domoticz/commit/ee70db46f81afa582c96b887b73bcd2a86feda00 | Fixed possible SQL Injection Vulnerability (Thanks to Fabio Carretto!) | 1 | void CWebServer::GetFloorplanImage(WebEmSession & session, const request& req, reply & rep)
{
std::string idx = request::findValue(&req, "idx");
if (idx == "") {
return;
}
std::vector<std::vector<std::string> > result;
result = m_sql.safe_queryBlob("SELECT Image FROM Floorplans WHERE ID=%s", i... | 126,919,339,259,422,660,000,000,000,000,000,000,000 | WebServer.cpp | 148,825,033,982,485,370,000,000,000,000,000,000,000 | [
"CWE-89"
] | CVE-2019-10664 | Domoticz before 4.10578 allows SQL Injection via the idx parameter in CWebServer::GetFloorplanImage in WebServer.cpp. | https://nvd.nist.gov/vuln/detail/CVE-2019-10664 |
4,083 | linux | 355b98553789b646ed97ad801a619ff898471b92 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/355b98553789b646ed97ad801a619ff898471b92 | netns: provide pure entropy for net_hash_mix()
net_hash_mix() currently uses kernel address of a struct net,
and is used in many places that could be used to reveal this
address to a patient attacker, thus defeating KASLR, for
the typical case (initial net namespace, &init_net is
not dynamically allocated)
I believe ... | 1 | static __net_init int setup_net(struct net *net, struct user_namespace *user_ns)
{
/* Must be called with pernet_ops_rwsem held */
const struct pernet_operations *ops, *saved_ops;
int error = 0;
LIST_HEAD(net_exit_list);
refcount_set(&net->count, 1);
refcount_set(&net->passive, 1);
net->dev_base_seq = 1;
... | 206,504,535,378,372,680,000,000,000,000,000,000,000 | net_namespace.c | 241,146,489,846,949,000,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2019-10638 | In the Linux kernel before 5.1.7, a device can be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby o... | https://nvd.nist.gov/vuln/detail/CVE-2019-10638 |
4,088 | ImageMagick | cb1214c124e1bd61f7dd551b94a794864861592e | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/cb1214c124e1bd61f7dd551b94a794864861592e | ... | 1 | static int format8BIM(Image *ifile, Image *ofile)
{
char
temp[MagickPathExtent];
unsigned int
foundOSType;
int
ID,
resCount,
i,
c;
ssize_t
count;
unsigned char
*PString,
*str;
resCount=0;
foundOSType=0; /* found the OSType */
(void) foundOSType;
c=ReadBlobByte(... | 166,827,350,039,151,750,000,000,000,000,000,000,000 | meta.c | 231,438,544,697,155,060,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2019-10131 | An off-by-one read vulnerability was discovered in ImageMagick before version 7.0.7-28 in the formatIPTCfromBuffer function in coders/meta.c. A local attacker may use this flaw to read beyond the end of the buffer or to crash the program. | https://nvd.nist.gov/vuln/detail/CVE-2019-10131 |
4,089 | libu2f-host | e4bb58cc8b6202a421e65f8230217d8ae6e16eb5 | https://github.com/Yubico/libu2f-host | https://github.com/Yubico/libu2f-host/commit/e4bb58cc8b6202a421e65f8230217d8ae6e16eb5 | fix filling out of initresp | 1 | init_device (u2fh_devs * devs, struct u2fdevice *dev)
{
unsigned char resp[1024];
unsigned char nonce[8];
if (obtain_nonce(nonce) != 0)
{
return U2FH_TRANSPORT_ERROR;
}
size_t resplen = sizeof (resp);
dev->cid = CID_BROADCAST;
if (u2fh_sendrecv
(devs, dev->id, U2FHID_INIT, nonce, sizeo... | 68,338,259,853,873,010,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2019-9578 | In devs.c in Yubico libu2f-host before 1.1.8, the response to init is misparsed, leaking uninitialized stack memory back to the device. | https://nvd.nist.gov/vuln/detail/CVE-2019-9578 |
4,090 | linux | 0a1d52994d440e21def1c2174932410b4f2a98a1 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0a1d52994d440e21def1c2174932410b4f2a98a1 | mm: enforce min addr even if capable() in expand_downwards()
security_mmap_addr() does a capability check with current_cred(), but
we can reach this code from contexts like a VFS write handler where
current_cred() must not be used.
This can be abused on systems without SMAP to make NULL pointer
dereferences exploitab... | 1 | int expand_downwards(struct vm_area_struct *vma,
unsigned long address)
{
struct mm_struct *mm = vma->vm_mm;
struct vm_area_struct *prev;
int error;
address &= PAGE_MASK;
error = security_mmap_addr(address);
if (error)
return error;
/* Enforce stack_guard_gap */
prev = vma->vm_prev;
/* Check... | 170,619,667,088,948,030,000,000,000,000,000,000,000 | mmap.c | 222,211,593,782,797,660,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2019-9213 | In the Linux kernel before 4.20.14, expand_downwards in mm/mmap.c lacks a check for the mmap minimum address, which makes it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task. | https://nvd.nist.gov/vuln/detail/CVE-2019-9213 |
4,091 | linux | c4c07b4d6fa1f11880eab8e076d3d060ef3f55fc | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c4c07b4d6fa1f11880eab8e076d3d060ef3f55fc | netfilter: nf_nat_snmp_basic: add missing length checks in ASN.1 cbs
The generic ASN.1 decoder infrastructure doesn't guarantee that callbacks
will get as much data as they expect; callbacks have to check the `datalen`
parameter before looking at `data`. Make sure that snmp_version() and
snmp_helper() don't read/write... | 1 | int snmp_helper(void *context, size_t hdrlen, unsigned char tag,
const void *data, size_t datalen)
{
struct snmp_ctx *ctx = (struct snmp_ctx *)context;
__be32 *pdata = (__be32 *)data;
if (*pdata == ctx->from) {
pr_debug("%s: %pI4 to %pI4\n", __func__,
(void *)&ctx->from, (void *)&ctx->to);
if (*ct... | 105,977,845,795,719,550,000,000,000,000,000,000,000 | nf_nat_snmp_basic_main.c | 170,342,232,582,282,240,000,000,000,000,000,000,000 | [
"CWE-129"
] | CVE-2019-9162 | In the Linux kernel before 4.20.12, net/ipv4/netfilter/nf_nat_snmp_basic_main.c in the SNMP NAT module has insufficient ASN.1 length checks (aka an array index error), making out-of-bounds read and write operations possible, leading to an OOPS or local privilege escalation. This affects snmp_version and snmp_helper. | https://nvd.nist.gov/vuln/detail/CVE-2019-9162 |
4,092 | linux | c4c07b4d6fa1f11880eab8e076d3d060ef3f55fc | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c4c07b4d6fa1f11880eab8e076d3d060ef3f55fc | netfilter: nf_nat_snmp_basic: add missing length checks in ASN.1 cbs
The generic ASN.1 decoder infrastructure doesn't guarantee that callbacks
will get as much data as they expect; callbacks have to check the `datalen`
parameter before looking at `data`. Make sure that snmp_version() and
snmp_helper() don't read/write... | 1 | int snmp_version(void *context, size_t hdrlen, unsigned char tag,
const void *data, size_t datalen)
{
if (*(unsigned char *)data > 1)
return -ENOTSUPP;
return 1;
}
| 198,796,159,557,597,100,000,000,000,000,000,000,000 | nf_nat_snmp_basic_main.c | 170,342,232,582,282,240,000,000,000,000,000,000,000 | [
"CWE-129"
] | CVE-2019-9162 | In the Linux kernel before 4.20.12, net/ipv4/netfilter/nf_nat_snmp_basic_main.c in the SNMP NAT module has insufficient ASN.1 length checks (aka an array index error), making out-of-bounds read and write operations possible, leading to an OOPS or local privilege escalation. This affects snmp_version and snmp_helper. | https://nvd.nist.gov/vuln/detail/CVE-2019-9162 |
4,095 | file | 2858eaf99f6cc5aae129bcbf1e24ad160240185f | https://github.com/file/file | https://github.com/file/file/commit/2858eaf99f6cc5aae129bcbf1e24ad160240185f | Avoid OOB read (found by ASAN reported by F. Alonso) | 1 | do_core_note(struct magic_set *ms, unsigned char *nbuf, uint32_t type,
int swap, uint32_t namesz, uint32_t descsz,
size_t noff, size_t doff, int *flags, size_t size, int clazz)
{
#ifdef ELFCORE
int os_style = -1;
/*
* Sigh. The 2.0.36 kernel in Debian 2.1, at
* least, doesn't correctly implement name
*... | 251,178,396,706,421,600,000,000,000,000,000,000,000 | readelf.c | 30,801,224,004,046,760,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-8906 | do_core_note in readelf.c in libmagic.a in file 5.35 has an out-of-bounds read because memcpy is misused. | https://nvd.nist.gov/vuln/detail/CVE-2019-8906 |
4,096 | ImageMagick | 306c1f0fa5754ca78efd16ab752f0e981d4f6b82 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/306c1f0fa5754ca78efd16ab752f0e981d4f6b82 | https://github.com/ImageMagick/ImageMagick/issues/1454 | 1 | static MagickBooleanType WritePDFImage(const ImageInfo *image_info,Image *image,
ExceptionInfo *exception)
{
#define CFormat "/Filter [ /%s ]\n"
#define ObjectsPerImage 14
#define ThrowPDFException(exception,message) \
{ \
if (xref != (MagickOffsetType *) NULL) \
xref=(MagickOffsetType *) RelinquishMagickMemo... | 40,501,662,541,508,744,000,000,000,000,000,000,000 | pdf.c | 291,286,648,213,977,640,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2019-7397 | In ImageMagick before 7.0.8-25 and GraphicsMagick through 1.3.31, several memory leaks exist in WritePDFImage in coders/pdf.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-7397 |
4,097 | ImageMagick | 8a43abefb38c5e29138e1c9c515b313363541c06 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/8a43abefb38c5e29138e1c9c515b313363541c06 | https://github.com/ImageMagick/ImageMagick/issues/1451 | 1 | static size_t WritePSDChannel(const PSDInfo *psd_info,
const ImageInfo *image_info,Image *image,Image *next_image,
const QuantumType quantum_type, unsigned char *compact_pixels,
MagickOffsetType size_offset,const MagickBooleanType separate,
const CompressionType compression,ExceptionInfo *exception)
{
MagickB... | 68,733,002,057,457,950,000,000,000,000,000,000,000 | psd.c | 148,851,851,471,348,200,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2019-7395 | In ImageMagick before 7.0.8-25, a memory leak exists in WritePSDChannel in coders/psd.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-7395 |
4,100 | ImageMagick | 1e6a3ace073c9ec9c71e439c111d23c6e66cb6ae | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/1e6a3ace073c9ec9c71e439c111d23c6e66cb6ae | https://github.com/ImageMagick/ImageMagick/issues/1450 | 1 | static MagickBooleanType DecodeImage(Image *image,unsigned char *luma,
unsigned char *chroma1,unsigned char *chroma2,ExceptionInfo *exception)
{
#define IsSync(sum) ((sum & 0xffffff00UL) == 0xfffffe00UL)
#define PCDGetBits(n) \
{ \
sum=(sum << n) & 0xffffffff; \
bits-=n; \
while (bits <= 24) \
{ \
if (p... | 319,777,982,927,308,370,000,000,000,000,000,000,000 | pcd.c | 279,908,488,505,593,460,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2019-7175 | In ImageMagick before 7.0.8-25, some memory leaks exist in DecodeImage in coders/pcd.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-7175 |
4,109 | mod_auth_mellon | 62041428a32de402e0be6ba45fe12df6a83bedb8 | https://github.com/Uninett/mod_auth_mellon | https://github.com/Uninett/mod_auth_mellon/commit/62041428a32de402e0be6ba45fe12df6a83bedb8 | Fix redirect URL validation bypass
It turns out that browsers silently convert backslash characters into
forward slashes, while apr_uri_parse() does not.
This mismatch allows an attacker to bypass the redirect URL validation
by using an URL like:
https://sp.example.org/mellon/logout?ReturnTo=https:%5c%5cmalicious.... | 1 | int am_check_url(request_rec *r, const char *url)
{
const char *i;
for (i = url; *i; i++) {
if (*i >= 0 && *i < ' ') {
/* Deny all control-characters. */
AM_LOG_RERROR(APLOG_MARK, APLOG_ERR, HTTP_BAD_REQUEST, r,
"Control character detected in URL.");
... | 82,672,157,991,462,600,000,000,000,000,000,000,000 | auth_mellon_util.c | 235,649,112,104,693,500,000,000,000,000,000,000,000 | [
"CWE-601"
] | CVE-2019-3877 | A vulnerability was found in mod_auth_mellon before v0.14.2. An open redirect in the logout URL allows requests with backslashes to pass through by assuming that it is a relative URL, while the browsers silently convert backslash characters into forward slashes treating them as an absolute URL. This mismatch allows an ... | https://nvd.nist.gov/vuln/detail/CVE-2019-3877 |
4,118 | gpac | d2371b4b204f0a3c0af51ad4e9b491144dd1225c | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/d2371b4b204f0a3c0af51ad4e9b491144dd1225c | prevent dref memleak on invalid input (#1183) | 1 | GF_Err dinf_Read(GF_Box *s, GF_BitStream *bs)
{
GF_Err e = gf_isom_box_array_read(s, bs, dinf_AddBox);
if (e) {
return e;
}
if (!((GF_DataInformationBox *)s)->dref) {
GF_LOG(GF_LOG_ERROR, GF_LOG_CONTAINER, ("[iso file] Missing dref box in dinf\n"));
((GF_DataInformationBox *)s)->dref = (GF_DataReferenceBo... | 102,742,711,928,030,080,000,000,000,000,000,000,000 | box_code_base.c | 230,439,071,816,063,260,000,000,000,000,000,000,000 | [
"CWE-400"
] | CVE-2018-21017 | GPAC 0.7.1 has a memory leak in dinf_Read in isomedia/box_code_base.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-21017 |
4,119 | openjpeg | 2e5ab1d9987831c981ff05862e8ccf1381ed58ea | https://github.com/uclouvain/openjpeg | https://github.com/uclouvain/openjpeg/commit/2e5ab1d9987831c981ff05862e8ccf1381ed58ea | color_apply_icc_profile: avoid potential heap buffer overflow
Derived from a patch by Thuan Pham | 1 | void color_apply_icc_profile(opj_image_t *image)
{
cmsHPROFILE in_prof, out_prof;
cmsHTRANSFORM transform;
cmsColorSpaceSignature in_space, out_space;
cmsUInt32Number intent, in_type, out_type;
int *r, *g, *b;
size_t nr_samples, i, max, max_w, max_h;
int prec, ok = 0;
OPJ_COLOR_SPACE new... | 105,259,506,362,981,870,000,000,000,000,000,000,000 | color.c | 74,641,151,863,664,750,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-21010 | OpenJPEG before 2.3.1 has a heap buffer overflow in color_apply_icc_profile in bin/common/color.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-21010 |
4,120 | linux | 7fafcfdf6377b18b2a726ea554d6e593ba44349f | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7fafcfdf6377b18b2a726ea554d6e593ba44349f | USB: gadget: f_midi: fixing a possible double-free in f_midi
It looks like there is a possibility of a double-free vulnerability on an
error path of the f_midi_set_alt function in the f_midi driver. If the
path is feasible then free_ep_req gets called twice:
req->complete = f_midi_complete;
err = us... | 1 | static int f_midi_set_alt(struct usb_function *f, unsigned intf, unsigned alt)
{
struct f_midi *midi = func_to_midi(f);
unsigned i;
int err;
/* we only set alt for MIDIStreaming interface */
if (intf != midi->ms_id)
return 0;
err = f_midi_start_ep(midi, f, midi->in_ep);
if (err)
return err;
err = f_midi_... | 319,178,464,914,382,540,000,000,000,000,000,000,000 | None | null | [
"CWE-415"
] | CVE-2018-20961 | In the Linux kernel before 4.16.4, a double free vulnerability in the f_midi_set_alt function of drivers/usb/gadget/function/f_midi.c in the f_midi driver may allow attackers to cause a denial of service or possibly have unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2018-20961 |
4,121 | linux | 54648cf1ec2d7f4b6a71767799c45676a138ca24 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/54648cf1ec2d7f4b6a71767799c45676a138ca24 | block: blk_init_allocated_queue() set q->fq as NULL in the fail case
We find the memory use-after-free issue in __blk_drain_queue()
on the kernel 4.14. After read the latest kernel 4.18-rc6 we
think it has the same problem.
Memory is allocated for q->fq in the blk_init_allocated_queue().
If the elevator init function... | 1 | int blk_init_allocated_queue(struct request_queue *q)
{
WARN_ON_ONCE(q->mq_ops);
q->fq = blk_alloc_flush_queue(q, NUMA_NO_NODE, q->cmd_size);
if (!q->fq)
return -ENOMEM;
if (q->init_rq_fn && q->init_rq_fn(q, q->fq->flush_rq, GFP_KERNEL))
goto out_free_flush_queue;
if (blk_init_rl(&q->root_rl, q, GFP_KERNEL)... | 302,121,427,349,834,920,000,000,000,000,000,000,000 | blk-core.c | 50,547,906,985,392,000,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2018-20856 | An issue was discovered in the Linux kernel before 4.18.7. In block/blk-core.c, there is an __blk_drain_queue() use-after-free because a certain error case is mishandled. | https://nvd.nist.gov/vuln/detail/CVE-2018-20856 |
4,122 | linux | 0625b4ba1a5d4703c7fb01c497bd6c156908af00 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0625b4ba1a5d4703c7fb01c497bd6c156908af00 | IB/mlx5: Fix leaking stack memory to userspace
mlx5_ib_create_qp_resp was never initialized and only the first 4 bytes
were written.
Fixes: 41d902cb7c32 ("RDMA/mlx5: Fix definition of mlx5_ib_create_qp_resp")
Cc: <stable@vger.kernel.org>
Acked-by: Leon Romanovsky <leonro@mellanox.com>
Signed-off-by: Jason Gunthorpe <... | 1 | static int create_qp_common(struct mlx5_ib_dev *dev, struct ib_pd *pd,
struct ib_qp_init_attr *init_attr,
struct ib_udata *udata, struct mlx5_ib_qp *qp)
{
struct mlx5_ib_resources *devr = &dev->devr;
int inlen = MLX5_ST_SZ_BYTES(create_qp_in);
struct mlx5_core_dev *mdev = dev->mdev;
struct mlx5_ib_... | 248,861,397,606,415,760,000,000,000,000,000,000,000 | qp.c | 331,582,094,954,837,000,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-20855 | An issue was discovered in the Linux kernel before 4.18.7. In create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace. | https://nvd.nist.gov/vuln/detail/CVE-2018-20855 |
4,124 | openjpeg | c58df149900df862806d0e892859b41115875845 | https://github.com/uclouvain/openjpeg | https://github.com/uclouvain/openjpeg/commit/c58df149900df862806d0e892859b41115875845 | [OPENJP2] change the way to compute *p_tx0, *p_tx1, *p_ty0, *p_ty1 in function
opj_get_encoding_parameters
Signed-off-by: Young_X <YangX92@hotmail.com> | 1 | static void opj_get_encoding_parameters(const opj_image_t *p_image,
const opj_cp_t *p_cp,
OPJ_UINT32 p_tileno,
OPJ_INT32 * p_tx0,
OPJ_INT32 * p_tx1,
... | 296,815,004,190,301,400,000,000,000,000,000,000,000 | pi.c | 91,262,203,277,625,340,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2018-20847 | An improper computation of p_tx0, p_tx1, p_ty0 and p_ty1 in the function opj_get_encoding_parameters in openjp2/pi.c in OpenJPEG through 2.3.0 can lead to an integer overflow. | https://nvd.nist.gov/vuln/detail/CVE-2018-20847 |
4,125 | openjpeg | c277159986c80142180fbe5efb256bbf3bdf3edc | https://github.com/uclouvain/openjpeg | https://github.com/uclouvain/openjpeg/commit/c277159986c80142180fbe5efb256bbf3bdf3edc | [MJ2] Avoid index out of bounds access to pi->include[]
Signed-off-by: Young_X <YangX92@hotmail.com> | 1 | static opj_bool pi_next_cprl(opj_pi_iterator_t * pi)
{
opj_pi_comp_t *comp = NULL;
opj_pi_resolution_t *res = NULL;
long index = 0;
if (!pi->first) {
comp = &pi->comps[pi->compno];
goto LABEL_SKIP;
} else {
pi->first = 0;
}
for (pi->compno = pi->poc.compno0; pi->com... | 85,538,911,631,696,440,000,000,000,000,000,000,000 | pi.c | 29,164,093,234,674,973,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2018-20846 | Out-of-bounds accesses in the functions pi_next_lrcp, pi_next_rlcp, pi_next_rpcl, pi_next_pcrl, pi_next_rpcl, and pi_next_cprl in openmj2/pi.c in OpenJPEG through 2.3.0 allow remote attackers to cause a denial of service (application crash). | https://nvd.nist.gov/vuln/detail/CVE-2018-20846 |
4,126 | openjpeg | c277159986c80142180fbe5efb256bbf3bdf3edc | https://github.com/uclouvain/openjpeg | https://github.com/uclouvain/openjpeg/commit/c277159986c80142180fbe5efb256bbf3bdf3edc | [MJ2] Avoid index out of bounds access to pi->include[]
Signed-off-by: Young_X <YangX92@hotmail.com> | 1 | static opj_bool pi_next_lrcp(opj_pi_iterator_t * pi)
{
opj_pi_comp_t *comp = NULL;
opj_pi_resolution_t *res = NULL;
long index = 0;
if (!pi->first) {
comp = &pi->comps[pi->compno];
res = &comp->resolutions[pi->resno];
goto LABEL_SKIP;
} else {
pi->first = 0;
}... | 152,272,228,207,417,500,000,000,000,000,000,000,000 | pi.c | 29,164,093,234,674,973,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2018-20846 | Out-of-bounds accesses in the functions pi_next_lrcp, pi_next_rlcp, pi_next_rpcl, pi_next_pcrl, pi_next_rpcl, and pi_next_cprl in openmj2/pi.c in OpenJPEG through 2.3.0 allow remote attackers to cause a denial of service (application crash). | https://nvd.nist.gov/vuln/detail/CVE-2018-20846 |
4,127 | openjpeg | c277159986c80142180fbe5efb256bbf3bdf3edc | https://github.com/uclouvain/openjpeg | https://github.com/uclouvain/openjpeg/commit/c277159986c80142180fbe5efb256bbf3bdf3edc | [MJ2] Avoid index out of bounds access to pi->include[]
Signed-off-by: Young_X <YangX92@hotmail.com> | 1 | static opj_bool pi_next_pcrl(opj_pi_iterator_t * pi)
{
opj_pi_comp_t *comp = NULL;
opj_pi_resolution_t *res = NULL;
long index = 0;
if (!pi->first) {
comp = &pi->comps[pi->compno];
goto LABEL_SKIP;
} else {
int compno, resno;
pi->first = 0;
pi->dx = 0;
... | 95,796,440,332,548,910,000,000,000,000,000,000,000 | pi.c | 29,164,093,234,674,973,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2018-20846 | Out-of-bounds accesses in the functions pi_next_lrcp, pi_next_rlcp, pi_next_rpcl, pi_next_pcrl, pi_next_rpcl, and pi_next_cprl in openmj2/pi.c in OpenJPEG through 2.3.0 allow remote attackers to cause a denial of service (application crash). | https://nvd.nist.gov/vuln/detail/CVE-2018-20846 |
4,128 | openjpeg | c277159986c80142180fbe5efb256bbf3bdf3edc | https://github.com/uclouvain/openjpeg | https://github.com/uclouvain/openjpeg/commit/c277159986c80142180fbe5efb256bbf3bdf3edc | [MJ2] Avoid index out of bounds access to pi->include[]
Signed-off-by: Young_X <YangX92@hotmail.com> | 1 | static opj_bool pi_next_rlcp(opj_pi_iterator_t * pi)
{
opj_pi_comp_t *comp = NULL;
opj_pi_resolution_t *res = NULL;
long index = 0;
if (!pi->first) {
comp = &pi->comps[pi->compno];
res = &comp->resolutions[pi->resno];
goto LABEL_SKIP;
} else {
pi->first = 0;
}
... | 223,188,624,698,480,920,000,000,000,000,000,000,000 | pi.c | 29,164,093,234,674,973,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2018-20846 | Out-of-bounds accesses in the functions pi_next_lrcp, pi_next_rlcp, pi_next_rpcl, pi_next_pcrl, pi_next_rpcl, and pi_next_cprl in openmj2/pi.c in OpenJPEG through 2.3.0 allow remote attackers to cause a denial of service (application crash). | https://nvd.nist.gov/vuln/detail/CVE-2018-20846 |
4,129 | openjpeg | c277159986c80142180fbe5efb256bbf3bdf3edc | https://github.com/uclouvain/openjpeg | https://github.com/uclouvain/openjpeg/commit/c277159986c80142180fbe5efb256bbf3bdf3edc | [MJ2] Avoid index out of bounds access to pi->include[]
Signed-off-by: Young_X <YangX92@hotmail.com> | 1 | static opj_bool pi_next_rpcl(opj_pi_iterator_t * pi)
{
opj_pi_comp_t *comp = NULL;
opj_pi_resolution_t *res = NULL;
long index = 0;
if (!pi->first) {
goto LABEL_SKIP;
} else {
int compno, resno;
pi->first = 0;
pi->dx = 0;
pi->dy = 0;
for (compno = 0; ... | 80,601,494,770,304,420,000,000,000,000,000,000,000 | pi.c | 29,164,093,234,674,973,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2018-20846 | Out-of-bounds accesses in the functions pi_next_lrcp, pi_next_rlcp, pi_next_rpcl, pi_next_pcrl, pi_next_rpcl, and pi_next_cprl in openmj2/pi.c in OpenJPEG through 2.3.0 allow remote attackers to cause a denial of service (application crash). | https://nvd.nist.gov/vuln/detail/CVE-2018-20846 |
4,130 | openjpeg | c5bd64ea146162967c29bd2af0cbb845ba3eaaaf | https://github.com/uclouvain/openjpeg | https://github.com/uclouvain/openjpeg/commit/c5bd64ea146162967c29bd2af0cbb845ba3eaaaf | [MJ2] To avoid divisions by zero / undefined behaviour on shift
Signed-off-by: Young_X <YangX92@hotmail.com> | 1 | static opj_bool pi_next_pcrl(opj_pi_iterator_t * pi)
{
opj_pi_comp_t *comp = NULL;
opj_pi_resolution_t *res = NULL;
long index = 0;
if (!pi->first) {
comp = &pi->comps[pi->compno];
goto LABEL_SKIP;
} else {
int compno, resno;
pi->first = 0;
pi->dx = 0;
... | 305,172,269,991,258,660,000,000,000,000,000,000,000 | None | null | [
"CWE-369"
] | CVE-2018-20845 | Division-by-zero vulnerabilities in the functions pi_next_pcrl, pi_next_cprl, and pi_next_rpcl in openmj2/pi.c in OpenJPEG through 2.3.0 allow remote attackers to cause a denial of service (application crash). | https://nvd.nist.gov/vuln/detail/CVE-2018-20845 |
4,131 | openjpeg | c5bd64ea146162967c29bd2af0cbb845ba3eaaaf | https://github.com/uclouvain/openjpeg | https://github.com/uclouvain/openjpeg/commit/c5bd64ea146162967c29bd2af0cbb845ba3eaaaf | [MJ2] To avoid divisions by zero / undefined behaviour on shift
Signed-off-by: Young_X <YangX92@hotmail.com> | 1 | static opj_bool pi_next_rpcl(opj_pi_iterator_t * pi)
{
opj_pi_comp_t *comp = NULL;
opj_pi_resolution_t *res = NULL;
long index = 0;
if (!pi->first) {
goto LABEL_SKIP;
} else {
int compno, resno;
pi->first = 0;
pi->dx = 0;
pi->dy = 0;
for (compno = 0; ... | 146,244,999,549,307,640,000,000,000,000,000,000,000 | None | null | [
"CWE-369"
] | CVE-2018-20845 | Division-by-zero vulnerabilities in the functions pi_next_pcrl, pi_next_cprl, and pi_next_rpcl in openmj2/pi.c in OpenJPEG through 2.3.0 allow remote attackers to cause a denial of service (application crash). | https://nvd.nist.gov/vuln/detail/CVE-2018-20845 |
4,132 | libexpat | 11f8838bf99ea0a6f0b76f9760c43704d00c4ff6 | https://github.com/libexpat/libexpat | https://github.com/libexpat/libexpat/commit/11f8838bf99ea0a6f0b76f9760c43704d00c4ff6 | xmlparse.c: Fix extraction of namespace prefix from XML name (#186) | 1 | setElementTypePrefix(XML_Parser parser, ELEMENT_TYPE *elementType)
{
DTD * const dtd = parser->m_dtd; /* save one level of indirection */
const XML_Char *name;
for (name = elementType->name; *name; name++) {
if (*name == XML_T(ASCII_COLON)) {
PREFIX *prefix;
const XML_Char *s;
for (s = elem... | 149,797,917,410,026,080,000,000,000,000,000,000,000 | xmlparse.c | 279,896,994,209,473,240,000,000,000,000,000,000,000 | [
"CWE-611"
] | CVE-2018-20843 | In libexpat in Expat before 2.2.7, XML input including XML names that contain a large number of colons could make the XML parser consume a high amount of RAM and CPU resources while processing (enough to be usable for denial-of-service attacks). | https://nvd.nist.gov/vuln/detail/CVE-2018-20843 |
4,137 | linux | b90cd6f2b905905fb42671009dc0e27c310a16ae | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/b90cd6f2b905905fb42671009dc0e27c310a16ae | scsi: libsas: fix a race condition when smp task timeout
When the lldd is processing the complete sas task in interrupt and set the
task stat as SAS_TASK_STATE_DONE, the smp timeout timer is able to be
triggered at the same time. And smp_task_timedout() will complete the task
wheter the SAS_TASK_STATE_DONE is set or n... | 1 | static void smp_task_done(struct sas_task *task)
{
if (!del_timer(&task->slow_task->timer))
return;
complete(&task->slow_task->completion);
}
| 29,609,062,973,361,010,000,000,000,000,000,000,000 | sas_expander.c | 251,418,024,640,382,320,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2018-20836 | An issue was discovered in the Linux kernel before 4.20. There is a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free. | https://nvd.nist.gov/vuln/detail/CVE-2018-20836 |
4,138 | linux | b90cd6f2b905905fb42671009dc0e27c310a16ae | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/b90cd6f2b905905fb42671009dc0e27c310a16ae | scsi: libsas: fix a race condition when smp task timeout
When the lldd is processing the complete sas task in interrupt and set the
task stat as SAS_TASK_STATE_DONE, the smp timeout timer is able to be
triggered at the same time. And smp_task_timedout() will complete the task
wheter the SAS_TASK_STATE_DONE is set or n... | 1 | static void smp_task_timedout(struct timer_list *t)
{
struct sas_task_slow *slow = from_timer(slow, t, timer);
struct sas_task *task = slow->task;
unsigned long flags;
spin_lock_irqsave(&task->task_state_lock, flags);
if (!(task->task_state_flags & SAS_TASK_STATE_DONE))
task->task_state_flags |= SAS_TASK_ST... | 300,277,114,529,588,760,000,000,000,000,000,000,000 | sas_expander.c | 251,418,024,640,382,320,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2018-20836 | An issue was discovered in the Linux kernel before 4.20. There is a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free. | https://nvd.nist.gov/vuln/detail/CVE-2018-20836 |
4,141 | linux | c40f7d74c741a907cfaeb73a7697081881c497d0 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c40f7d74c741a907cfaeb73a7697081881c497d0 | sched/fair: Fix infinite loop in update_blocked_averages() by reverting a9e7f6544b9c
Zhipeng Xie, Xie XiuQi and Sargun Dhillon reported lockups in the
scheduler under high loads, starting at around the v4.18 time frame,
and Zhipeng Xie tracked it down to bugs in the rq->leaf_cfs_rq_list
manipulation.
Do a (manual) re... | 1 | static void update_blocked_averages(int cpu)
{
struct rq *rq = cpu_rq(cpu);
struct cfs_rq *cfs_rq, *pos;
const struct sched_class *curr_class;
struct rq_flags rf;
bool done = true;
rq_lock_irqsave(rq, &rf);
update_rq_clock(rq);
/*
* Iterates the task_group tree in a bottom up fashion, see
* list_a... | 242,733,069,005,675,960,000,000,000,000,000,000,000 | fair.c | 71,919,484,539,312,920,000,000,000,000,000,000,000 | [
"CWE-400"
] | CVE-2018-20784 | In the Linux kernel before 4.20.2, kernel/sched/fair.c mishandles leaf cfs_rq's, which allows attackers to cause a denial of service (infinite loop in update_blocked_averages) or possibly have unspecified other impact by inducing a high load. | https://nvd.nist.gov/vuln/detail/CVE-2018-20784 |
4,142 | gpac | 1c449a34fe0b50aaffb881bfb9d7c5ab0bb18cdd | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/1c449a34fe0b50aaffb881bfb9d7c5ab0bb18cdd | add some boundary checks on gf_text_get_utf8_line (#1188) | 1 | int mp4client_main(int argc, char **argv)
{
char c;
const char *str;
int ret_val = 0;
u32 i, times[100], nb_times, dump_mode;
u32 simulation_time_in_ms = 0;
u32 initial_service_id = 0;
Bool auto_exit = GF_FALSE;
Bool logs_set = GF_FALSE;
Bool start_fs = GF_FALSE;
Bool use_rtix = GF_FALSE;
Bool pause_at_first... | 33,731,538,446,325,954,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2018-20763 | In GPAC 0.7.1 and earlier, gf_text_get_utf8_line in media_tools/text_import.c in libgpac_static.a allows an out-of-bounds write because of missing szLineConv bounds checking. | https://nvd.nist.gov/vuln/detail/CVE-2018-20763 |
4,143 | gpac | 35ab4475a7df9b2a4bcab235e379c0c3ec543658 | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/35ab4475a7df9b2a4bcab235e379c0c3ec543658 | fix some overflows due to strcpy
fixes #1184, #1186, #1187 among other things | 1 | GF_Err cat_multiple_files(GF_ISOFile *dest, char *fileName, u32 import_flags, Double force_fps, u32 frames_per_sample, char *tmp_dir, Bool force_cat, Bool align_timelines, Bool allow_add_in_command)
{
CATEnum cat_enum;
char *sep;
cat_enum.dest = dest;
cat_enum.import_flags = import_flags;
cat_enum.force_fps = for... | 184,974,595,979,520,000,000,000,000,000,000,000,000 | fileimport.c | 215,039,272,518,635,600,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-20761 | GPAC version 0.7.1 and earlier has a Buffer Overflow vulnerability in the gf_sm_load_init function in scene_manager.c in libgpac_static.a. | https://nvd.nist.gov/vuln/detail/CVE-2018-20761 |
4,147 | gpac | 35ab4475a7df9b2a4bcab235e379c0c3ec543658 | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/35ab4475a7df9b2a4bcab235e379c0c3ec543658 | fix some overflows due to strcpy
fixes #1184, #1186, #1187 among other things | 1 | GF_Err gf_sm_load_init(GF_SceneLoader *load)
{
GF_Err e = GF_NOT_SUPPORTED;
char *ext, szExt[50];
/*we need at least a scene graph*/
if (!load || (!load->ctx && !load->scene_graph)
#ifndef GPAC_DISABLE_ISOM
|| (!load->fileName && !load->isom && !(load->flags & GF_SM_LOAD_FOR_PLAYBACK) )
#endif
) return... | 297,086,645,771,880,500,000,000,000,000,000,000,000 | scene_manager.c | 72,644,650,139,823,230,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-20761 | GPAC version 0.7.1 and earlier has a Buffer Overflow vulnerability in the gf_sm_load_init function in scene_manager.c in libgpac_static.a. | https://nvd.nist.gov/vuln/detail/CVE-2018-20761 |
4,149 | rdesktop | 4dca546d04321a610c1835010b5dad85163b65e1 | https://github.com/rdesktop/rdesktop | https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1 | Malicious RDP server security fixes
This commit includes fixes for a set of 21 vulnerabilities in
rdesktop when a malicious RDP server is used.
All vulnerabilities was identified and reported by Eyal Itkin.
* Add rdp_protocol_error function that is used in several fixes
* Refactor of process_bitmap_updates
* Fix ... | 1 | process_plane(uint8 * in, int width, int height, uint8 * out, int size)
{
UNUSED(size);
int indexw;
int indexh;
int code;
int collen;
int replen;
int color;
int x;
int revcode;
uint8 * last_line;
uint8 * this_line;
uint8 * org_in;
uint8 * org_out;
org_in = in;
org_out = out;
last_line = 0;
indexh = 0;... | 243,072,446,217,366,000,000,000,000,000,000,000,000 | bitmap.c | 298,040,105,414,695,750,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-8799 | rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function process_secondary_order() that results in a Denial of Service (segfault). | https://nvd.nist.gov/vuln/detail/CVE-2018-8799 |
4,151 | rdesktop | 4dca546d04321a610c1835010b5dad85163b65e1 | https://github.com/rdesktop/rdesktop | https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1 | Malicious RDP server security fixes
This commit includes fixes for a set of 21 vulnerabilities in
rdesktop when a malicious RDP server is used.
All vulnerabilities was identified and reported by Eyal Itkin.
* Add rdp_protocol_error function that is used in several fixes
* Refactor of process_bitmap_updates
* Fix ... | 1 | cssp_read_tsrequest(STREAM token, STREAM pubkey)
{
STREAM s;
int length;
int tagval;
s = tcp_recv(NULL, 4);
if (s == NULL)
return False;
if (s->p[0] != (BER_TAG_SEQUENCE | BER_TAG_CONSTRUCTED))
{
logger(Protocol, Error,
"cssp_read_tsrequest(), expected BER_TAG_SEQUENCE|BER_TAG_CONSTRUCTED, ... | 154,298,624,846,793,850,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2018-8799 | rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function process_secondary_order() that results in a Denial of Service (segfault). | https://nvd.nist.gov/vuln/detail/CVE-2018-8799 |
4,154 | rdesktop | 4dca546d04321a610c1835010b5dad85163b65e1 | https://github.com/rdesktop/rdesktop | https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1 | Malicious RDP server security fixes
This commit includes fixes for a set of 21 vulnerabilities in
rdesktop when a malicious RDP server is used.
All vulnerabilities was identified and reported by Eyal Itkin.
* Add rdp_protocol_error function that is used in several fixes
* Refactor of process_bitmap_updates
* Fix ... | 1 | process_bitmap_updates(STREAM s)
{
uint16 num_updates;
uint16 left, top, right, bottom, width, height;
uint16 cx, cy, bpp, Bpp, compress, bufsize, size;
uint8 *data, *bmpdata;
int i;
logger(Protocol, Debug, "%s()", __func__);
in_uint16_le(s, num_updates);
for (i = 0; i < num_updates; i++)
{
in_uint16... | 255,073,384,789,805,870,000,000,000,000,000,000,000 | rdp.c | 177,705,998,885,746,530,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-8799 | rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function process_secondary_order() that results in a Denial of Service (segfault). | https://nvd.nist.gov/vuln/detail/CVE-2018-8799 |
4,155 | rdesktop | 4dca546d04321a610c1835010b5dad85163b65e1 | https://github.com/rdesktop/rdesktop | https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1 | Malicious RDP server security fixes
This commit includes fixes for a set of 21 vulnerabilities in
rdesktop when a malicious RDP server is used.
All vulnerabilities was identified and reported by Eyal Itkin.
* Add rdp_protocol_error function that is used in several fixes
* Refactor of process_bitmap_updates
* Fix ... | 1 | process_demand_active(STREAM s)
{
uint8 type;
uint16 len_src_descriptor, len_combined_caps;
/* at this point we need to ensure that we have ui created */
rd_create_ui();
in_uint32_le(s, g_rdp_shareid);
in_uint16_le(s, len_src_descriptor);
in_uint16_le(s, len_combined_caps);
in_uint8s(s, len_src_des... | 50,427,493,118,138,860,000,000,000,000,000,000,000 | rdp.c | 177,705,998,885,746,530,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-8799 | rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function process_secondary_order() that results in a Denial of Service (segfault). | https://nvd.nist.gov/vuln/detail/CVE-2018-8799 |
4,156 | rdesktop | 4dca546d04321a610c1835010b5dad85163b65e1 | https://github.com/rdesktop/rdesktop | https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1 | Malicious RDP server security fixes
This commit includes fixes for a set of 21 vulnerabilities in
rdesktop when a malicious RDP server is used.
All vulnerabilities was identified and reported by Eyal Itkin.
* Add rdp_protocol_error function that is used in several fixes
* Refactor of process_bitmap_updates
* Fix ... | 1 | rdp_in_unistr(STREAM s, int in_len, char **string, uint32 * str_size)
{
static iconv_t icv_utf16_to_local;
size_t ibl, obl;
char *pin, *pout;
if (!icv_utf16_to_local)
{
icv_utf16_to_local = iconv_open(g_codepage, WINDOWS_CODEPAGE);
if (icv_utf16_to_local == (iconv_t) - 1)
{
logger(Protocol, Error, "... | 87,473,831,233,998,540,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2018-8799 | rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function process_secondary_order() that results in a Denial of Service (segfault). | https://nvd.nist.gov/vuln/detail/CVE-2018-8799 |
4,157 | rdesktop | 4dca546d04321a610c1835010b5dad85163b65e1 | https://github.com/rdesktop/rdesktop | https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1 | Malicious RDP server security fixes
This commit includes fixes for a set of 21 vulnerabilities in
rdesktop when a malicious RDP server is used.
All vulnerabilities was identified and reported by Eyal Itkin.
* Add rdp_protocol_error function that is used in several fixes
* Refactor of process_bitmap_updates
* Fix ... | 1 | rdpdr_process(STREAM s)
{
uint32 handle;
uint16 vmin;
uint16 component;
uint16 pakid;
logger(Protocol, Debug, "rdpdr_process()");
/* hexdump(s->p, s->end - s->p); */
in_uint16(s, component);
in_uint16(s, pakid);
if (component == RDPDR_CTYP_CORE)
{
switch (pakid)
{
case PAKID_CORE_DEVICE_IOREQU... | 130,790,675,046,993,960,000,000,000,000,000,000,000 | rdpdr.c | 63,172,116,204,848,340,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-8799 | rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function process_secondary_order() that results in a Denial of Service (segfault). | https://nvd.nist.gov/vuln/detail/CVE-2018-8799 |
4,159 | rdesktop | 4dca546d04321a610c1835010b5dad85163b65e1 | https://github.com/rdesktop/rdesktop | https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1 | Malicious RDP server security fixes
This commit includes fixes for a set of 21 vulnerabilities in
rdesktop when a malicious RDP server is used.
All vulnerabilities was identified and reported by Eyal Itkin.
* Add rdp_protocol_error function that is used in several fixes
* Refactor of process_bitmap_updates
* Fix ... | 1 | seamless_process(STREAM s)
{
unsigned int pkglen;
char *buf;
pkglen = s->end - s->p;
/* str_handle_lines requires null terminated strings */
buf = xmalloc(pkglen + 1);
STRNCPY(buf, (char *) s->p, pkglen + 1);
str_handle_lines(buf, &seamless_rest, seamless_line_handler, NULL);
xfree(buf);
}
| 58,925,099,420,725,390,000,000,000,000,000,000,000 | seamless.c | 132,321,470,131,883,330,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-8799 | rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function process_secondary_order() that results in a Denial of Service (segfault). | https://nvd.nist.gov/vuln/detail/CVE-2018-8799 |
4,163 | tcpdump | 24182d959f661327525a20d9a94c98a8ec016778 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/24182d959f661327525a20d9a94c98a8ec016778 | (for 4.9.3) CVE-2018-16452/SMB: prevent stack exhaustion
Enforce a limit on how many times smb_fdata() can recurse.
This fixes a stack exhaustion discovered by Include Security working
under the Mozilla SOS program in 2018 by means of code audit. | 1 | smb_fdata(netdissect_options *ndo,
const u_char *buf, const char *fmt, const u_char *maxbuf,
int unicodestr)
{
static int depth = 0;
char s[128];
char *p;
while (*fmt) {
switch (*fmt) {
case '*':
fmt++;
while (buf < maxbuf) {
const u_char *buf2;
depth++;
buf2 = ... | 244,595,164,974,697,600,000,000,000,000,000,000,000 | smbutil.c | 40,949,174,088,914,413,000,000,000,000,000,000,000 | [
"CWE-674"
] | CVE-2018-16452 | The SMB parser in tcpdump before 4.9.3 has stack exhaustion in smbutil.c:smb_fdata() via recursion. | https://nvd.nist.gov/vuln/detail/CVE-2018-16452 |
4,164 | tcpdump | 96480ab95308cd9234b4f09b175ebf60e17792c6 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/96480ab95308cd9234b4f09b175ebf60e17792c6 | (for 4.9.3) SMB: Add two missing bounds checks | 1 | print_trans(netdissect_options *ndo,
const u_char *words, const u_char *data1, const u_char *buf, const u_char *maxbuf)
{
u_int bcc;
const char *f1, *f2, *f3, *f4;
const u_char *data, *param;
const u_char *w = words + 1;
int datalen, paramlen;
if (request) {
ND_TCHECK2(w[12 * 2], 2... | 290,096,538,158,812,750,000,000,000,000,000,000,000 | print-smb.c | 242,560,732,155,246,320,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-16451 | The SMB parser in tcpdump before 4.9.3 has buffer over-reads in print-smb.c:print_trans() for \MAILSLOT\BROWSE and \PIPE\LANMAN. | https://nvd.nist.gov/vuln/detail/CVE-2018-16451 |
4,165 | tcpdump | af2cf04a9394c1a56227c2289ae8da262828294a | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/af2cf04a9394c1a56227c2289ae8da262828294a | (for 4.9.3) CVE-2018-16300/BGP: prevent stack exhaustion
Enforce a limit on how many times bgp_attr_print() can recurse.
This fixes a stack exhaustion discovered by Include Security working
under the Mozilla SOS program in 2018 by means of code audit. | 1 | bgp_attr_print(netdissect_options *ndo,
u_int atype, const u_char *pptr, u_int len)
{
int i;
uint16_t af;
uint8_t safi, snpa, nhlen;
union { /* copy buffer for bandwidth values */
float f;
uint32_t i;
} bw;
int advance;
u_int tlen;
const u_char *tptr;
ch... | 5,230,270,584,618,741,000,000,000,000,000,000,000 | print-bgp.c | 232,531,695,120,400,940,000,000,000,000,000,000,000 | [
"CWE-674"
] | CVE-2018-16300 | The BGP parser in tcpdump before 4.9.3 allows stack consumption in print-bgp.c:bgp_attr_print() because of unlimited recursion. | https://nvd.nist.gov/vuln/detail/CVE-2018-16300 |
4,167 | tcpdump | 13d52e9c0e7caf7e6325b0051bc90a49968be67f | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/13d52e9c0e7caf7e6325b0051bc90a49968be67f | (for 4.9.3) CVE-2018-16230/BGP: fix decoding of MP_REACH_NLRI
When bgp_attr_print() tried to decode the variable-length nexthop value
for the NSAP VPN case, it did not check that the declared length is good
to interpret the value as a mapped IPv4 or IPv6 address. Add missing
checks to make this safe.
This fixes a buf... | 1 | bgp_attr_print(netdissect_options *ndo,
u_int atype, const u_char *pptr, u_int len)
{
int i;
uint16_t af;
uint8_t safi, snpa, nhlen;
union { /* copy buffer for bandwidth values */
float f;
uint32_t i;
} bw;
int advance;
u_int tlen;
const u_char *tptr;
char b... | 338,883,693,916,013,400,000,000,000,000,000,000,000 | print-bgp.c | 219,392,234,472,983,600,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-16230 | The BGP parser in tcpdump before 4.9.3 has a buffer over-read in print-bgp.c:bgp_attr_print() (MP_REACH_NLRI). | https://nvd.nist.gov/vuln/detail/CVE-2018-16230 |
4,168 | tcpdump | 211124b972e74f0da66bc8b16f181f78793e2f66 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/211124b972e74f0da66bc8b16f181f78793e2f66 | (for 4.9.3) CVE-2018-16229/DCCP: Fix printing "Timestamp" and "Timestamp Echo" options
Add some comments.
Moreover:
Put a function definition name at the beginning of the line.
(This change was ported from commit 6df4852 in the master branch.)
Ryan Ackroyd had independently identified this buffer over-read later by... | 1 | static int dccp_print_option(netdissect_options *ndo, const u_char *option, u_int hlen)
{
uint8_t optlen, i;
ND_TCHECK(*option);
if (*option >= 32) {
ND_TCHECK(*(option+1));
optlen = *(option +1);
if (optlen < 2) {
if (*option >= 128)
ND_PRINT((ndo, "CCID option %u optlen too short", *option));
... | 15,798,034,750,616,692,000,000,000,000,000,000,000 | print-dccp.c | 145,045,132,521,129,190,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-16229 | The DCCP parser in tcpdump before 4.9.3 has a buffer over-read in print-dccp.c:dccp_print_option(). | https://nvd.nist.gov/vuln/detail/CVE-2018-16229 |
4,169 | tcpdump | 4846b3c5d0a850e860baf4f07340495d29837d09 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/4846b3c5d0a850e860baf4f07340495d29837d09 | (for 4.9.3) CVE-2018-16227/IEEE 802.11: add a missing bounds check
ieee802_11_print() tried to access the Mesh Flags subfield of the Mesh
Control field to find the size of the latter and increment the expected
802.11 header length before checking it is fully present in the input
buffer. Add an intermediate bounds chec... | 1 | ieee802_11_print(netdissect_options *ndo,
const u_char *p, u_int length, u_int orig_caplen, int pad,
u_int fcslen)
{
uint16_t fc;
u_int caplen, hdrlen, meshdrlen;
struct lladdr_info src, dst;
int llc_hdrlen;
caplen = orig_caplen;
/* Remove FCS, if present */
if (length < fcslen... | 36,678,721,672,009,150,000,000,000,000,000,000,000 | print-802_11.c | 126,620,455,302,702,500,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-16227 | The IEEE 802.11 parser in tcpdump before 4.9.3 has a buffer over-read in print-802_11.c for the Mesh Flags subfield. | https://nvd.nist.gov/vuln/detail/CVE-2018-16227 |
4,181 | tcpdump | e01c9bf76740802025c9328901b55ee4a0c49ed6 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/e01c9bf76740802025c9328901b55ee4a0c49ed6 | (for 4.9.3) CVE-2018-14880/OSPFv3: Fix a bounds check
Need to test bounds check for the last field of the structure lsa6_hdr.
No need to test other fields.
Include Security working under the Mozilla SOS program had independently
identified this vulnerability in 2018 by means of code audit.
Wang Junjie of 360 ESG Cod... | 1 | ospf6_print_lshdr(netdissect_options *ndo,
register const struct lsa6_hdr *lshp, const u_char *dataend)
{
if ((const u_char *)(lshp + 1) > dataend)
goto trunc;
ND_TCHECK(lshp->ls_type);
ND_TCHECK(lshp->ls_seq);
ND_PRINT((ndo, "\n\t Advertising Router %s, seq 0x%08x, age %us, length %u",
... | 129,283,399,906,377,130,000,000,000,000,000,000,000 | print-ospf6.c | 147,818,747,608,204,800,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-14880 | The OSPFv3 parser in tcpdump before 4.9.3 has a buffer over-read in print-ospf6.c:ospf6_print_lshdr(). | https://nvd.nist.gov/vuln/detail/CVE-2018-14880 |
4,182 | tcpdump | 9ba91381954ad325ea4fd26b9c65a8bd9a2a85b6 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/9ba91381954ad325ea4fd26b9c65a8bd9a2a85b6 | (for 4.9.3) CVE-2018-14879/fix -V to fail invalid input safely
get_next_file() did not check the return value of strlen() and
underflowed an array index if the line read by fgets() from the file
started with \0. This caused an out-of-bounds read and could cause a
write. Add the missing check.
This vulnerability was d... | 1 | get_next_file(FILE *VFile, char *ptr)
{
char *ret;
ret = fgets(ptr, PATH_MAX, VFile);
if (!ret)
return NULL;
if (ptr[strlen(ptr) - 1] == '\n')
ptr[strlen(ptr) - 1] = '\0';
return ret;
}
| 257,347,123,511,778,800,000,000,000,000,000,000,000 | tcpdump.c | 120,937,434,841,688,800,000,000,000,000,000,000,000 | [
"CWE-120"
] | CVE-2018-14879 | The command-line argument parser in tcpdump before 4.9.3 has a buffer overflow in tcpdump.c:get_next_file(). | https://nvd.nist.gov/vuln/detail/CVE-2018-14879 |
4,183 | libjpeg-turbo | 9c78a04df4e44ef6487eee99c4258397f4fdca55 | https://github.com/libjpeg-turbo/libjpeg-turbo | https://github.com/libjpeg-turbo/libjpeg-turbo/commit/9c78a04df4e44ef6487eee99c4258397f4fdca55 | cjpeg: Fix OOB read caused by malformed 8-bit BMP
... in which one or more of the color indices is out of range for the
number of palette entries.
Fix partly borrowed from jpeg-9c. This commit also adopts Guido's
JERR_PPM_OUTOFRANGE enum value in lieu of our project-specific
JERR_PPM_TOOLARGE enum value.
Fixes #258 | 1 | METHODDEF(JDIMENSION)
get_8bit_row(j_compress_ptr cinfo, cjpeg_source_ptr sinfo)
/* This version is for reading 8-bit colormap indexes */
{
bmp_source_ptr source = (bmp_source_ptr)sinfo;
register JSAMPARRAY colormap = source->colormap;
JSAMPARRAY image_ptr;
register int t;
register JSAMPROW inptr, outpt... | 167,548,316,555,997,960,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2018-14498 | get_8bit_row in rdbmp.c in libjpeg-turbo through 1.5.90 and MozJPEG through 3.3.1 allows attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted 8-bit BMP in which one or more of the color indices is out of range for the number of palette entries. | https://nvd.nist.gov/vuln/detail/CVE-2018-14498 |
4,187 | tcpdump | 12f66f69f7bf1ec1266ddbee90a7616cbf33696b | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/12f66f69f7bf1ec1266ddbee90a7616cbf33696b | (for 4.9.3) CVE-2018-14470/Babel: fix an existing length check
In babel_print_v2() the non-verbose branch for an Update TLV compared
the TLV Length against 1 instead of 10 (probably a typo), put it right.
This fixes a buffer over-read discovered by Henri Salo from Nixu
Corporation.
Add a test using the capture file ... | 1 | babel_print_v2(netdissect_options *ndo,
const u_char *cp, u_int length)
{
u_int i;
u_short bodylen;
u_char v4_prefix[16] =
{0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0xFF, 0xFF, 0, 0, 0, 0 };
u_char v6_prefix[16] = {0};
ND_TCHECK2(*cp, 4);
if (length < 4)
goto invalid;
bo... | 221,650,779,211,644,100,000,000,000,000,000,000,000 | print-babel.c | 165,395,599,757,044,750,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-14470 | The Babel parser in tcpdump before 4.9.3 has a buffer over-read in print-babel.c:babel_print_v2(). | https://nvd.nist.gov/vuln/detail/CVE-2018-14470 |
4,188 | tcpdump | 396e94ff55a80d554b1fe46bf107db1e91008d6c | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/396e94ff55a80d554b1fe46bf107db1e91008d6c | (for 4.9.3) CVE-2018-14469/ISAKMP: Add a missing bounds check
In ikev1_n_print() check bounds before trying to fetch the replay detection
status.
This fixes a buffer over-read discovered by Bhargava Shastry.
Add a test using the capture file supplied by the reporter(s). | 1 | ikev1_n_print(netdissect_options *ndo, u_char tpay _U_,
const struct isakmp_gen *ext, u_int item_len,
const u_char *ep, uint32_t phase _U_, uint32_t doi0 _U_,
uint32_t proto0 _U_, int depth _U_)
{
const struct ikev1_pl_n *p;
struct ikev1_pl_n n;
const u_char *cp;
const u_char *ep2;
uint32_t do... | 234,740,568,020,028,660,000,000,000,000,000,000,000 | print-isakmp.c | 46,301,836,066,961,200,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-14469 | The IKEv1 parser in tcpdump before 4.9.3 has a buffer over-read in print-isakmp.c:ikev1_n_print(). | https://nvd.nist.gov/vuln/detail/CVE-2018-14469 |
4,189 | tcpdump | aa3e54f594385ce7e1e319b0c84999e51192578b | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/aa3e54f594385ce7e1e319b0c84999e51192578b | (for 4.9.3) CVE-2018-14468/FRF.16: Add a missing length check.
The specification says in a well-formed Magic Number information element
the data is exactly 4 bytes long. In mfr_print() check this before trying
to read those 4 bytes.
This fixes a buffer over-read discovered by Bhargava Shastry,
SecT/TU Berlin.
Add a ... | 1 | mfr_print(netdissect_options *ndo,
register const u_char *p, u_int length)
{
u_int tlen,idx,hdr_len = 0;
uint16_t sequence_num;
uint8_t ie_type,ie_len;
const uint8_t *tptr;
/*
* FRF.16 Link Integrity Control Frame
*
* 7 6 5 4 3 2 1 0
* +----+----+----+----+--... | 34,406,534,537,232,213,000,000,000,000,000,000,000 | print-fr.c | 155,609,240,038,833,600,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-14468 | The FRF.16 parser in tcpdump before 4.9.3 has a buffer over-read in print-fr.c:mfr_print(). | https://nvd.nist.gov/vuln/detail/CVE-2018-14468 |
4,190 | tcpdump | e3f3b445e2d20ac5d5b7fcb7559ce6beb55da0c9 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/e3f3b445e2d20ac5d5b7fcb7559ce6beb55da0c9 | (for 4.9.3) CVE-2018-14467/BGP: Fix BGP_CAPCODE_MP.
Add a bounds check and a comment to bgp_capabilities_print().
This fixes a buffer over-read discovered by Bhargava Shastry,
SecT/TU Berlin.
Add a test using the capture file supplied by the reporter(s). | 1 | bgp_capabilities_print(netdissect_options *ndo,
const u_char *opt, int caps_len)
{
int cap_type, cap_len, tcap_len, cap_offset;
int i = 0;
while (i < caps_len) {
ND_TCHECK2(opt[i], BGP_CAP_HEADER_SIZE);
cap_type=opt[i];
cap_len=opt... | 48,898,273,469,995,470,000,000,000,000,000,000,000 | print-bgp.c | 102,553,564,603,133,500,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-14467 | The BGP parser in tcpdump before 4.9.3 has a buffer over-read in print-bgp.c:bgp_capabilities_print() (BGP_CAPCODE_MP). | https://nvd.nist.gov/vuln/detail/CVE-2018-14467 |
4,191 | tcpdump | c24922e692a52121e853a84ead6b9337f4c08a94 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/c24922e692a52121e853a84ead6b9337f4c08a94 | (for 4.9.3) CVE-2018-14466/Rx: fix an over-read bug
In rx_cache_insert() and rx_cache_find() properly read the serviceId
field of the rx_header structure as a 16-bit integer. When those
functions tried to read 32 bits the extra 16 bits could be outside of
the bounds checked in rx_print() for the rx_header structure, a... | 1 | rx_cache_find(const struct rx_header *rxh, const struct ip *ip, int sport,
int32_t *opcode)
{
int i;
struct rx_cache_entry *rxent;
uint32_t clip;
uint32_t sip;
UNALIGNED_MEMCPY(&clip, &ip->ip_dst, sizeof(uint32_t));
UNALIGNED_MEMCPY(&sip, &ip->ip_src, sizeof(uint32_t));
/* Start the search where we last... | 103,259,589,506,430,560,000,000,000,000,000,000,000 | print-rx.c | 87,888,529,561,150,320,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-14466 | The Rx parser in tcpdump before 4.9.3 has a buffer over-read in print-rx.c:rx_cache_find() and rx_cache_insert(). | https://nvd.nist.gov/vuln/detail/CVE-2018-14466 |
4,192 | tcpdump | bea2686c296b79609060a104cc139810785b0739 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/bea2686c296b79609060a104cc139810785b0739 | (for 4.9.3) CVE-2018-14465/RSVP: Add a missing bounds check
In rsvp_obj_print().
This fixes a buffer over-read discovered by Bhargava Shastry.
Add a test using the capture file supplied by the reporter(s). | 1 | rsvp_obj_print(netdissect_options *ndo,
const u_char *pptr, u_int plen, const u_char *tptr,
const char *ident, u_int tlen,
const struct rsvp_common_header *rsvp_com_header)
{
const struct rsvp_object_header *rsvp_obj_header;
const u_char *obj_tptr;
union {
... | 337,800,776,597,343,780,000,000,000,000,000,000,000 | print-rsvp.c | 309,134,377,433,343,500,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-14465 | The RSVP parser in tcpdump before 4.9.3 has a buffer over-read in print-rsvp.c:rsvp_obj_print(). | https://nvd.nist.gov/vuln/detail/CVE-2018-14465 |
4,194 | tcpdump | d97e94223720684c6aa740ff219e0d19426c2220 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/d97e94223720684c6aa740ff219e0d19426c2220 | (for 4.9.3) CVE-2018-14464/LMP: Add a missing bounds check
In lmp_print_data_link_subobjs().
This fixes a buffer over-read discovered by Bhargava Shastry,
SecT/TU Berlin.
Add a test using the capture file supplied by the reporter(s). | 1 | lmp_print_data_link_subobjs(netdissect_options *ndo, const u_char *obj_tptr,
int total_subobj_len, int offset)
{
int hexdump = FALSE;
int subobj_type, subobj_len;
union { /* int to float conversion buffer */
float f;
uint32_t i;
} bw;
while (total_subobj... | 251,322,797,576,181,440,000,000,000,000,000,000,000 | print-lmp.c | 246,828,076,691,630,670,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-14464 | The LMP parser in tcpdump before 4.9.3 has a buffer over-read in print-lmp.c:lmp_print_data_link_subobjs(). | https://nvd.nist.gov/vuln/detail/CVE-2018-14464 |
4,195 | tcpdump | 3de07c772166b7e8e8bb4b9d1d078f1d901b570b | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/3de07c772166b7e8e8bb4b9d1d078f1d901b570b | (for 4.9.3) CVE-2018-14463/VRRP: Add a missing bounds check
In vrrp_print().
This fixes a buffer over-read discovered by Bhargava Shastry.
Add a test using the capture file supplied by the reporter(s). | 1 | vrrp_print(netdissect_options *ndo,
register const u_char *bp, register u_int len,
register const u_char *bp2, int ttl)
{
int version, type, auth_type = VRRP_AUTH_NONE; /* keep compiler happy */
const char *type_s;
ND_TCHECK(bp[0]);
version = (bp[0] & 0xf0) >> 4;
type = bp[0] & 0x0f;
type_s... | 177,267,562,973,387,440,000,000,000,000,000,000,000 | print-vrrp.c | 276,178,921,820,745,950,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-14463 | The VRRP parser in tcpdump before 4.9.3 has a buffer over-read in print-vrrp.c:vrrp_print() for VRRP version 2, a different vulnerability than CVE-2019-15167. | https://nvd.nist.gov/vuln/detail/CVE-2018-14463 |
4,196 | tcpdump | 1a1bce0526a77b62e41531b00f8bb5e21fd4f3a3 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/1a1bce0526a77b62e41531b00f8bb5e21fd4f3a3 | (for 4.9.3) CVE-2018-14462/ICMP: Add a missing bounds check
In icmp_print().
This fixes a buffer over-read discovered by Bhargava Shastry.
Add two tests using the capture files supplied by the reporter(s). | 1 | icmp_print(netdissect_options *ndo, const u_char *bp, u_int plen, const u_char *bp2,
int fragmented)
{
char *cp;
const struct icmp *dp;
const struct icmp_ext_t *ext_dp;
const struct ip *ip;
const char *str, *fmt;
const struct ip *oip;
const struct udphdr *ouh;
const uint8_t *obj_tptr;
... | 292,921,596,680,894,330,000,000,000,000,000,000,000 | print-icmp.c | 139,842,233,616,481,950,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-14462 | The ICMP parser in tcpdump before 4.9.3 has a buffer over-read in print-icmp.c:icmp_print(). | https://nvd.nist.gov/vuln/detail/CVE-2018-14462 |
4,198 | tcpdump | aa5c6b710dfd8020d2c908d6b3bd41f1da719b3b | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/aa5c6b710dfd8020d2c908d6b3bd41f1da719b3b | (for 4.9.3) CVE-2018-14461/LDP: Fix a bounds check
In ldp_tlv_print(), the FT Session TLV length must be 12, not 8 (RFC3479)
This fixes a buffer over-read discovered by Konrad Rieck and
Bhargava Shastry.
Add a test using the capture file supplied by the reporter(s).
Moreover:
Add and use tstr[].
Add a comment. | 1 | ldp_tlv_print(netdissect_options *ndo,
register const u_char *tptr,
u_short msg_tlen)
{
struct ldp_tlv_header {
uint8_t type[2];
uint8_t length[2];
};
const struct ldp_tlv_header *ldp_tlv_header;
u_short tlv_type,tlv_len,tlv_tlen,af,ft_flags;
u_char fec_t... | 175,449,531,126,840,100,000,000,000,000,000,000,000 | print-ldp.c | 199,241,510,340,081,260,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-14461 | The LDP parser in tcpdump before 4.9.3 has a buffer over-read in print-ldp.c:ldp_tlv_print(). | https://nvd.nist.gov/vuln/detail/CVE-2018-14461 |
4,200 | linux | 0ad646c81b2182f7fa67ec0c8c825e0ee165696d | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0ad646c81b2182f7fa67ec0c8c825e0ee165696d | tun: call dev_get_valid_name() before register_netdevice()
register_netdevice() could fail early when we have an invalid
dev name, in which case ->ndo_uninit() is not called. For tun
device, this is a problem because a timer etc. are already
initialized and it expects ->ndo_uninit() to clean them up.
We could move th... | 1 | static int dev_get_valid_name(struct net *net,
struct net_device *dev,
const char *name)
{
BUG_ON(!net);
if (!dev_valid_name(name))
return -EINVAL;
if (strchr(name, '%'))
return dev_alloc_name_ns(net, dev, name);
else if (__dev_get_by_name(net, name))
return -EEXIST;
else if (dev->name... | 194,124,048,216,443,300,000,000,000,000,000,000,000 | dev.c | 337,658,462,804,777,840,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2018-7191 | In the tun subsystem in the Linux kernel before 4.13.14, dev_get_valid_name is not called before register_netdevice. This allows local users to cause a denial of service (NULL pointer dereference and panic) via an ioctl(TUNSETIFF) call with a dev name containing a / character. This is similar to CVE-2013-4343. | https://nvd.nist.gov/vuln/detail/CVE-2018-7191 |
4,203 | linux | 0c319d3a144d4b8f1ea2047fd614d2149b68f889 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0c319d3a144d4b8f1ea2047fd614d2149b68f889 | nvmet-fc: ensure target queue id within range.
When searching for queue id's ensure they are within the expected range.
Signed-off-by: James Smart <james.smart@broadcom.com>
Signed-off-by: Christoph Hellwig <hch@lst.de>
Signed-off-by: Jens Axboe <axboe@kernel.dk> | 1 | nvmet_fc_find_target_queue(struct nvmet_fc_tgtport *tgtport,
u64 connection_id)
{
struct nvmet_fc_tgt_assoc *assoc;
struct nvmet_fc_tgt_queue *queue;
u64 association_id = nvmet_fc_getassociationid(connection_id);
u16 qid = nvmet_fc_getqueueid(connection_id);
unsigned long flags;
spin_lock_irqsave(&tgtpor... | 185,335,558,178,742,060,000,000,000,000,000,000,000 | fc.c | 272,260,028,181,561,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-18379 | In the Linux kernel before 4.14, an out of boundary access happened in drivers/nvme/target/fc.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-18379 |
4,204 | linux | 6aeb75e6adfaed16e58780309613a578fe1ee90b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6aeb75e6adfaed16e58780309613a578fe1ee90b | USB: serial: io_ti: fix div-by-zero in set_termios
Fix a division-by-zero in set_termios when debugging is enabled and a
high-enough speed has been requested so that the divisor value becomes
zero.
Instead of just fixing the offending debug statement, cap the baud rate
at the base as a zero divisor value also appears... | 1 | static void change_port_settings(struct tty_struct *tty,
struct edgeport_port *edge_port, struct ktermios *old_termios)
{
struct device *dev = &edge_port->port->dev;
struct ump_uart_config *config;
int baud;
unsigned cflag;
int status;
int port_number = edge_port->port->port_number;
config = kmalloc (sizeof (... | 2,899,605,228,826,136,000,000,000,000,000,000,000 | io_ti.c | 311,416,253,777,553,600,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2017-18360 | In change_port_settings in drivers/usb/serial/io_ti.c in the Linux kernel before 4.11.3, local users could cause a denial of service by division-by-zero in the serial device layer by trying to set very high baud rates. | https://nvd.nist.gov/vuln/detail/CVE-2017-18360 |
4,205 | linux | 193e87143c290ec16838f5368adc0e0bc94eb931 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/193e87143c290ec16838f5368adc0e0bc94eb931 | mtd: spi-nor: Off by one in cqspi_setup_flash()
There are CQSPI_MAX_CHIPSELECT elements in the ->f_pdata array so the >
should be >=.
Fixes: 140623410536 ('mtd: spi-nor: Add driver for Cadence Quad SPI Flash Controller')
Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>
Reviewed-by: Marek Vasut <marex@denx.de>
... | 1 | static int cqspi_setup_flash(struct cqspi_st *cqspi, struct device_node *np)
{
struct platform_device *pdev = cqspi->pdev;
struct device *dev = &pdev->dev;
struct cqspi_flash_pdata *f_pdata;
struct spi_nor *nor;
struct mtd_info *mtd;
unsigned int cs;
int i, ret;
/* Get flash device data */
for_each_available_... | 186,302,357,406,260,160,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-10764 | In the Linux kernel before 4.9.6, there is an off by one in the drivers/mtd/spi-nor/cadence-quadspi.c cqspi_setup_flash() function. There are CQSPI_MAX_CHIPSELECT elements in the ->f_pdata array so the ">" should be ">=" instead. | https://nvd.nist.gov/vuln/detail/CVE-2016-10764 |
4,206 | cJSON | 94df772485c92866ca417d92137747b2e3b0a917 | https://github.com/DaveGamble/cJSON | https://github.com/DaveGamble/cJSON/commit/94df772485c92866ca417d92137747b2e3b0a917 | fix buffer overflow (#30) | 1 | static const char *parse_string(cJSON *item,const char *str,const char **ep)
{
const char *ptr=str+1,*end_ptr=str+1;char *ptr2;char *out;int len=0;unsigned uc,uc2;
if (*str!='\"') {*ep=str;return 0;} /* not a string! */
while (*end_ptr!='\"' && *end_ptr && ++len) if (*end_ptr++ == '\\') end_ptr++; /* Skip escaped... | 118,463,785,809,405,890,000,000,000,000,000,000,000 | cjson.c | 284,722,214,602,097,060,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2016-10749 | parse_string in cJSON.c in cJSON before 2016-10-02 has a buffer over-read, as demonstrated by a string that begins with a " character and ends with a \ character. | https://nvd.nist.gov/vuln/detail/CVE-2016-10749 |
4,207 | libvirt | 506e9d6c2d4baaf580d489fff0690c0ff2ff588f | https://github.com/libvirt/libvirt | https://github.com/libvirt/libvirt/commit/506e9d6c2d4baaf580d489fff0690c0ff2ff588f | virDomainGetTime: Deny on RO connections
We have a policy that if API may end up talking to a guest agent
it should require RW connection. We don't obey the rule in
virDomainGetTime().
Signed-off-by: Michal Privoznik <mprivozn@redhat.com> | 1 | virDomainGetTime(virDomainPtr dom,
long long *seconds,
unsigned int *nseconds,
unsigned int flags)
{
VIR_DOMAIN_DEBUG(dom, "seconds=%p, nseconds=%p, flags=%x",
seconds, nseconds, flags);
virResetLastError();
virCheckDomainReturn(do... | 207,738,922,790,026,470,000,000,000,000,000,000,000 | libvirt-domain.c | 330,174,055,389,131,060,000,000,000,000,000,000,000 | [
"CWE-254"
] | CVE-2016-10746 | libvirt-domain.c in libvirt before 1.3.1 supports virDomainGetTime API calls by guest agents with an RO connection, even though an RW connection was supposed to be required, a different vulnerability than CVE-2019-3886. | https://nvd.nist.gov/vuln/detail/CVE-2016-10746 |
4,208 | linux | 1fa2337a315a2448c5434f41e00d56b01a22283c | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1fa2337a315a2448c5434f41e00d56b01a22283c | [media] cx24116: fix a buffer overflow when checking userspace params
The maximum size for a DiSEqC command is 6, according to the
userspace API. However, the code allows to write up much more values:
drivers/media/dvb-frontends/cx24116.c:983 cx24116_send_diseqc_msg() error: buffer overflow 'd->msg' 6 <= 23
Cc: stab... | 1 | static int cx24116_send_diseqc_msg(struct dvb_frontend *fe,
struct dvb_diseqc_master_cmd *d)
{
struct cx24116_state *state = fe->demodulator_priv;
int i, ret;
/* Dump DiSEqC message */
if (debug) {
printk(KERN_INFO "cx24116: %s(", __func__);
for (i = 0 ; i < d->msg_len ;) {
printk(KERN_INFO "0x%02x",... | 191,512,209,927,685,670,000,000,000,000,000,000,000 | cx24116.c | 85,302,384,688,479,090,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2015-9289 | In the Linux kernel before 4.1.4, a buffer overflow occurs when checking userspace params in drivers/media/dvb-frontends/cx24116.c. The maximum size for a DiSEqC command is 6, according to the userspace API. However, the code allows larger values such as 23. | https://nvd.nist.gov/vuln/detail/CVE-2015-9289 |
4,211 | linux | 12f09ccb4612734a53e47ed5302e0479c10a50f8 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/12f09ccb4612734a53e47ed5302e0479c10a50f8 | loopback: off by one in tcm_loop_make_naa_tpg()
This is an off by one 'tgpt' check in tcm_loop_make_naa_tpg() that could result
in memory corruption.
Signed-off-by: Dan Carpenter <error27@gmail.com>
Signed-off-by: Nicholas A. Bellinger <nab@linux-iscsi.org> | 1 | struct se_portal_group *tcm_loop_make_naa_tpg(
struct se_wwn *wwn,
struct config_group *group,
const char *name)
{
struct tcm_loop_hba *tl_hba = container_of(wwn,
struct tcm_loop_hba, tl_hba_wwn);
struct tcm_loop_tpg *tl_tpg;
char *tpgt_str, *end_ptr;
int ret;
unsigned short int tpgt;
tpgt_str = strstr(nam... | 173,887,909,380,776,370,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-5327 | In the Linux kernel before 3.1, an off by one in the drivers/target/loopback/tcm_loop.c tcm_loop_make_naa_tpg() function could result in at least memory corruption. | https://nvd.nist.gov/vuln/detail/CVE-2011-5327 |
4,212 | linux | 0926f91083f34d047abc74f1ca4fa6a9c161f7db | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0926f91083f34d047abc74f1ca4fa6a9c161f7db | mlx4_en: Fix out of bounds array access
When searching for a free entry in either mlx4_register_vlan() or
mlx4_register_mac(), and there is no free entry, the loop terminates without
updating the local variable free thus causing out of array bounds access. Fix
this by adding a proper check outside the loop.
Signed-of... | 1 | int mlx4_register_mac(struct mlx4_dev *dev, u8 port, u64 mac, int *index)
{
struct mlx4_mac_table *table = &mlx4_priv(dev)->port[port].mac_table;
int i, err = 0;
int free = -1;
mlx4_dbg(dev, "Registering MAC: 0x%llx\n", (unsigned long long) mac);
mutex_lock(&table->mutex);
for (i = 0; i < MLX4_MAX_MAC_NUM - 1; i... | 334,432,146,822,531,400,000,000,000,000,000,000,000 | port.c | 320,353,152,093,700,700,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2010-5332 | In the Linux kernel before 2.6.37, an out of bounds array access happened in drivers/net/mlx4/port.c. When searching for a free entry in either mlx4_register_vlan() or mlx4_register_mac(), and there is no free entry, the loop terminates without updating the local variable free thus causing out of array bounds access. | https://nvd.nist.gov/vuln/detail/CVE-2010-5332 |
4,213 | linux | 0926f91083f34d047abc74f1ca4fa6a9c161f7db | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0926f91083f34d047abc74f1ca4fa6a9c161f7db | mlx4_en: Fix out of bounds array access
When searching for a free entry in either mlx4_register_vlan() or
mlx4_register_mac(), and there is no free entry, the loop terminates without
updating the local variable free thus causing out of array bounds access. Fix
this by adding a proper check outside the loop.
Signed-of... | 1 | int mlx4_register_vlan(struct mlx4_dev *dev, u8 port, u16 vlan, int *index)
{
struct mlx4_vlan_table *table = &mlx4_priv(dev)->port[port].vlan_table;
int i, err = 0;
int free = -1;
mutex_lock(&table->mutex);
for (i = MLX4_VLAN_REGULAR; i < MLX4_MAX_VLAN_NUM; i++) {
if (free < 0 && (table->refs[i] == 0)) {
fr... | 152,912,856,707,100,740,000,000,000,000,000,000,000 | port.c | 320,353,152,093,700,700,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2010-5332 | In the Linux kernel before 2.6.37, an out of bounds array access happened in drivers/net/mlx4/port.c. When searching for a free entry in either mlx4_register_vlan() or mlx4_register_mac(), and there is no free entry, the loop terminates without updating the local variable free thus causing out of array bounds access. | https://nvd.nist.gov/vuln/detail/CVE-2010-5332 |
4,214 | linux | 0031c41be5c529f8329e327b63cde92ba1284842 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0031c41be5c529f8329e327b63cde92ba1284842 | drivers/gpu/drm/radeon/radeon_atombios.c: range check issues
This change makes the array larger, "MAX_SUPPORTED_TV_TIMING_V1_2" is 3
and the original size "MAX_SUPPORTED_TV_TIMING" is 2.
Also there were checks that were off by one.
Signed-off-by: Dan Carpenter <error27@gmail.com>
Acked-by: Alex Deucher <alexdeucher@... | 1 | bool radeon_atom_get_tv_timings(struct radeon_device *rdev, int index,
struct drm_display_mode *mode)
{
struct radeon_mode_info *mode_info = &rdev->mode_info;
ATOM_ANALOG_TV_INFO *tv_info;
ATOM_ANALOG_TV_INFO_V1_2 *tv_info_v1_2;
ATOM_DTD_FORMAT *dtd_timings;
int data_index = GetIndexIntoMasterTable(DATA, Analo... | 235,165,537,631,957,300,000,000,000,000,000,000,000 | radeon_atombios.c | 10,244,202,857,860,056,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2010-5331 | In the Linux kernel before 2.6.34, a range check issue in drivers/gpu/drm/radeon/atombios.c could cause an off by one (buffer overflow) problem. NOTE: At least one Linux maintainer believes that this CVE is incorrectly assigned and should be rejected because the value is hard coded and are not user-controllable where i... | https://nvd.nist.gov/vuln/detail/CVE-2010-5331 |
4,215 | linux | 2a2f11c227bdf292b3a2900ad04139d301b56ac4 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/2a2f11c227bdf292b3a2900ad04139d301b56ac4 | NetLabel: correct CIPSO tag handling when adding new DOI definitions
The current netlbl_cipsov4_add_common() function has two problems which are
fixed with this patch. The first is an off-by-one bug where it is possibile to
overflow the doi_def->tags[] array. The second is a bug where the same
doi_def->tags[] array ... | 1 | static int netlbl_cipsov4_add_common(struct genl_info *info,
struct cipso_v4_doi *doi_def)
{
struct nlattr *nla;
int nla_rem;
u32 iter = 0;
doi_def->doi = nla_get_u32(info->attrs[NLBL_CIPSOV4_A_DOI]);
if (nla_validate_nested(info->attrs[NLBL_CIPSOV4_A_TAGLST],
NLBL_CIPSOV4_A_MAX,
netlbl_cipsov4_... | 185,225,743,962,151,470,000,000,000,000,000,000,000 | netlabel_cipso_v4.c | 9,839,229,491,276,271,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2007-6762 | In the Linux kernel before 2.6.20, there is an off-by-one bug in net/netlabel/netlabel_cipso_v4.c where it is possible to overflow the doi_def->tags[] array. | https://nvd.nist.gov/vuln/detail/CVE-2007-6762 |
4,217 | linux | 1df2ae31c724e57be9d7ac00d78db8a5dabdd050 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1df2ae31c724e57be9d7ac00d78db8a5dabdd050 | udf: Fortify loading of sparing table
Add sanity checks when loading sparing table from disk to avoid accessing
unallocated memory or writing to it.
Signed-off-by: Jan Kara <jack@suse.cz> | 1 | static int udf_load_logicalvol(struct super_block *sb, sector_t block,
struct kernel_lb_addr *fileset)
{
struct logicalVolDesc *lvd;
int i, j, offset;
uint8_t type;
struct udf_sb_info *sbi = UDF_SB(sb);
struct genericPartitionMap *gpm;
uint16_t ident;
struct buffer_head *bh;
unsigned int table_... | 203,586,019,560,546,920,000,000,000,000,000,000,000 | super.c | 167,850,010,728,400,120,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2012-3400 | Heap-based buffer overflow in the udf_load_logicalvol function in fs/udf/super.c in the Linux kernel before 3.4.5 allows remote attackers to cause a denial of service (system crash) or possibly have unspecified other impact via a crafted UDF filesystem. | https://nvd.nist.gov/vuln/detail/CVE-2012-3400 |
4,223 | linux | 093019cf1b18dd31b2c3b77acce4e000e2cbc9ce | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/093019cf1b18dd31b2c3b77acce4e000e2cbc9ce | xfs: fix acl count validation in xfs_acl_from_disk()
Commit fa8b18ed didn't prevent the integer overflow and possible
memory corruption. "count" can go negative and bypass the check.
Signed-off-by: Xi Wang <xi.wang@gmail.com>
Reviewed-by: Christoph Hellwig <hch@lst.de>
Signed-off-by: Ben Myers <bpm@sgi.com> | 1 | xfs_acl_from_disk(struct xfs_acl *aclp)
{
struct posix_acl_entry *acl_e;
struct posix_acl *acl;
struct xfs_acl_entry *ace;
int count, i;
count = be32_to_cpu(aclp->acl_cnt);
if (count > XFS_ACL_MAX_ENTRIES)
return ERR_PTR(-EFSCORRUPTED);
acl = posix_acl_alloc(count, GFP_KERNEL);
if (!acl)
return ERR_... | 338,872,511,102,859,500,000,000,000,000,000,000,000 | xfs_acl.c | 255,306,518,644,300,600,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-0038 | Integer overflow in the xfs_acl_from_disk function in fs/xfs/xfs_acl.c in the Linux kernel before 3.1.9 allows local users to cause a denial of service (panic) via a filesystem with a malformed ACL, leading to a heap-based buffer overflow. | https://nvd.nist.gov/vuln/detail/CVE-2012-0038 |
4,227 | linux | e40f193f5bb022e927a57a4f5d5194e4f12ddb74 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/e40f193f5bb022e927a57a4f5d5194e4f12ddb74 | KVM: Fix iommu map/unmap to handle memory slot moves
The iommu integration into memory slots expects memory slots to be
added or removed and doesn't handle the move case. We can unmap
slots from the iommu after we mark them invalid and map them before
installing the final memslot array. Also re-order the kmemdup vs
... | 1 | int __kvm_set_memory_region(struct kvm *kvm,
struct kvm_userspace_memory_region *mem,
int user_alloc)
{
int r;
gfn_t base_gfn;
unsigned long npages;
struct kvm_memory_slot *memslot, *slot;
struct kvm_memory_slot old, new;
struct kvm_memslots *slots, *old_memslots;
r = check_memory_region_flags(mem... | 42,039,554,948,212,130,000,000,000,000,000,000,000 | kvm_main.c | 289,658,061,896,194,840,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2013-4592 | Memory leak in the __kvm_set_memory_region function in virt/kvm/kvm_main.c in the Linux kernel before 3.9 allows local users to cause a denial of service (memory consumption) by leveraging certain device access to trigger movement of memory slots. | https://nvd.nist.gov/vuln/detail/CVE-2013-4592 |
4,228 | linux | c547dbf55d5f8cf615ccc0e7265e98db27d3fb8b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c547dbf55d5f8cf615ccc0e7265e98db27d3fb8b | ip6_output: do skb ufo init for peeked non ufo skb as well
Now, if user application does:
sendto len<mtu flag MSG_MORE
sendto len>mtu flag 0
The skb is not treated as fragmented one because it is not initialized
that way. So move the initialization to fix this.
introduced by:
commit e89e9cf539a28df7d0eb1d0a545368e992... | 1 | static inline int ip6_ufo_append_data(struct sock *sk,
int getfrag(void *from, char *to, int offset, int len,
int odd, struct sk_buff *skb),
void *from, int length, int hh_len, int fragheaderlen,
int transhdrlen, int mtu,unsigned int flags,
struct rt6_info *rt)
{
struct sk_buff *skb;
int err;
... | 210,909,608,125,529,560,000,000,000,000,000,000,000 | ip6_output.c | 21,304,489,657,470,253,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2013-4470 | The Linux kernel before 3.12, when UDP Fragmentation Offload (UFO) is enabled, does not properly initialize certain data structures, which allows local users to cause a denial of service (memory corruption and system crash) or possibly gain privileges via a crafted application that uses the UDP_CORK option in a setsock... | https://nvd.nist.gov/vuln/detail/CVE-2013-4470 |
4,229 | linux | c802d759623acbd6e1ee9fbdabae89159a513913 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c802d759623acbd6e1ee9fbdabae89159a513913 | netrom: fix invalid use of sizeof in nr_recvmsg()
sizeof() when applied to a pointer typed expression gives the size of the
pointer, not that of the pointed data.
Introduced by commit 3ce5ef(netrom: fix info leak via msg_name in nr_recvmsg)
Signed-off-by: Wei Yongjun <yongjun_wei@trendmicro.com.cn>
Signed-off-by: Dav... | 1 | static int nr_recvmsg(struct kiocb *iocb, struct socket *sock,
struct msghdr *msg, size_t size, int flags)
{
struct sock *sk = sock->sk;
struct sockaddr_ax25 *sax = (struct sockaddr_ax25 *)msg->msg_name;
size_t copied;
struct sk_buff *skb;
int er;
/*
* This works for seqpacket too. The receiver has ord... | 328,939,254,347,918,100,000,000,000,000,000,000,000 | af_netrom.c | 92,523,120,517,097,200,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2013-3232 | The nr_recvmsg function in net/netrom/af_netrom.c in the Linux kernel before 3.9-rc7 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call. | https://nvd.nist.gov/vuln/detail/CVE-2013-3232 |
4,230 | linux | e3211c120a85b792978bcb4be7b2886df18d27f0 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/e3211c120a85b792978bcb4be7b2886df18d27f0 | userns: Check uid_map's opener's fsuid, not the current fsuid
Signed-off-by: Andy Lutomirski <luto@amacapital.net> | 1 | static bool new_idmap_permitted(const struct file *file,
struct user_namespace *ns, int cap_setid,
struct uid_gid_map *new_map)
{
/* Allow mapping to your own filesystem ids */
if ((new_map->nr_extents == 1) && (new_map->extent[0].count == 1)) {
u32 id = new_map->extent[0].lower_first;
if (cap_setid ==... | 42,581,331,517,218,380,000,000,000,000,000,000,000 | user_namespace.c | 170,014,386,278,445,950,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2013-1959 | kernel/user_namespace.c in the Linux kernel before 3.8.9 does not have appropriate capability requirements for the uid_map and gid_map files, which allows local users to gain privileges by opening a file within an unprivileged process and then modifying the file within a privileged process. | https://nvd.nist.gov/vuln/detail/CVE-2013-1959 |
4,231 | linux | 3c0c5cfdcd4d69ffc4b9c0907cec99039f30a50a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/3c0c5cfdcd4d69ffc4b9c0907cec99039f30a50a | atm: fix info leak via getsockname()
The ATM code fails to initialize the two padding bytes of struct
sockaddr_atmpvc inserted for alignment. Add an explicit memset(0)
before filling the structure to avoid the info leak.
Signed-off-by: Mathias Krause <minipli@googlemail.com>
Signed-off-by: David S. Miller <davem@dave... | 1 | static int pvc_getname(struct socket *sock, struct sockaddr *sockaddr,
int *sockaddr_len, int peer)
{
struct sockaddr_atmpvc *addr;
struct atm_vcc *vcc = ATM_SD(sock);
if (!vcc->dev || !test_bit(ATM_VF_ADDR, &vcc->flags))
return -ENOTCONN;
*sockaddr_len = sizeof(struct sockaddr_atmpvc);
addr = (stru... | 86,538,267,407,615,000,000,000,000,000,000,000,000 | pvc.c | 132,442,317,636,064,100,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2012-6546 | The ATM implementation in the Linux kernel before 3.6 does not initialize certain structures, which allows local users to obtain sensitive information from kernel stack memory via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2012-6546 |
4,232 | linux | 9ad2de43f1aee7e7274a4e0d41465489299e344b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/9ad2de43f1aee7e7274a4e0d41465489299e344b | Bluetooth: RFCOMM - Fix info leak in getsockopt(BT_SECURITY)
The RFCOMM code fails to initialize the key_size member of struct
bt_security before copying it to userland -- that for leaking one
byte kernel stack. Initialize key_size with 0 to avoid the info
leak.
Signed-off-by: Mathias Krause <minipli@googlemail.com>
... | 1 | static int rfcomm_sock_getsockopt(struct socket *sock, int level, int optname, char __user *optval, int __user *optlen)
{
struct sock *sk = sock->sk;
struct bt_security sec;
int len, err = 0;
BT_DBG("sk %p", sk);
if (level == SOL_RFCOMM)
return rfcomm_sock_getsockopt_old(sock, optname, optval, optlen);
if (l... | 287,987,662,761,858,430,000,000,000,000,000,000,000 | sock.c | 154,602,950,500,930,880,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2012-6545 | The Bluetooth RFCOMM implementation in the Linux kernel before 3.6 does not properly initialize certain structures, which allows local users to obtain sensitive information from kernel memory via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2012-6545 |
4,233 | linux | 792039c73cf176c8e39a6e8beef2c94ff46522ed | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/792039c73cf176c8e39a6e8beef2c94ff46522ed | Bluetooth: L2CAP - Fix info leak via getsockname()
The L2CAP code fails to initialize the l2_bdaddr_type member of struct
sockaddr_l2 and the padding byte added for alignment. It that for leaks
two bytes kernel stack via the getsockname() syscall. Add an explicit
memset(0) before filling the structure to avoid the inf... | 1 | static int l2cap_sock_getname(struct socket *sock, struct sockaddr *addr, int *len, int peer)
{
struct sockaddr_l2 *la = (struct sockaddr_l2 *) addr;
struct sock *sk = sock->sk;
struct l2cap_chan *chan = l2cap_pi(sk)->chan;
BT_DBG("sock %p, sk %p", sock, sk);
addr->sa_family = AF_BLUETOOTH;
*len = sizeof(s... | 34,986,358,148,467,107,000,000,000,000,000,000,000 | l2cap_sock.c | 15,566,378,726,684,005,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2012-6544 | The Bluetooth protocol stack in the Linux kernel before 3.6 does not properly initialize certain structures, which allows local users to obtain sensitive information from kernel stack memory via a crafted application that targets the (1) L2CAP or (2) HCI implementation. | https://nvd.nist.gov/vuln/detail/CVE-2012-6544 |
4,234 | linux | 3f68ba07b1da811bf383b4b701b129bfcb2e4988 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/3f68ba07b1da811bf383b4b701b129bfcb2e4988 | Bluetooth: HCI - Fix info leak via getsockname()
The HCI code fails to initialize the hci_channel member of struct
sockaddr_hci and that for leaks two bytes kernel stack via the
getsockname() syscall. Initialize hci_channel with 0 to avoid the
info leak.
Signed-off-by: Mathias Krause <minipli@googlemail.com>
Cc: Marc... | 1 | static int hci_sock_getname(struct socket *sock, struct sockaddr *addr,
int *addr_len, int peer)
{
struct sockaddr_hci *haddr = (struct sockaddr_hci *) addr;
struct sock *sk = sock->sk;
struct hci_dev *hdev = hci_pi(sk)->hdev;
BT_DBG("sock %p sk %p", sock, sk);
if (!hdev)
return -EBADFD;
lock_sock(sk)... | 40,232,294,479,022,940,000,000,000,000,000,000,000 | hci_sock.c | 182,751,817,217,473,300,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2012-6544 | The Bluetooth protocol stack in the Linux kernel before 3.6 does not properly initialize certain structures, which allows local users to obtain sensitive information from kernel stack memory via a crafted application that targets the (1) L2CAP or (2) HCI implementation. | https://nvd.nist.gov/vuln/detail/CVE-2012-6544 |
4,235 | linux | 1f86840f897717f86d523a13e99a447e6a5d2fa5 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1f86840f897717f86d523a13e99a447e6a5d2fa5 | xfrm_user: fix info leak in copy_to_user_tmpl()
The memory used for the template copy is a local stack variable. As
struct xfrm_user_tmpl contains multiple holes added by the compiler for
alignment, not initializing the memory will lead to leaking stack bytes
to userland. Add an explicit memset(0) to avoid the info le... | 1 | static int copy_to_user_tmpl(struct xfrm_policy *xp, struct sk_buff *skb)
{
struct xfrm_user_tmpl vec[XFRM_MAX_DEPTH];
int i;
if (xp->xfrm_nr == 0)
return 0;
for (i = 0; i < xp->xfrm_nr; i++) {
struct xfrm_user_tmpl *up = &vec[i];
struct xfrm_tmpl *kp = &xp->xfrm_vec[i];
memcpy(&up->id, &kp->id, size... | 76,479,207,690,283,055,000,000,000,000,000,000,000 | xfrm_user.c | 66,804,102,214,937,230,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2012-6537 | net/xfrm/xfrm_user.c in the Linux kernel before 3.6 does not initialize certain structures, which allows local users to obtain sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability. | https://nvd.nist.gov/vuln/detail/CVE-2012-6537 |
4,238 | linux | 883a1d49f0d77d30012f114b2e19fc141beb3e8e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/883a1d49f0d77d30012f114b2e19fc141beb3e8e | ALSA: control: Make sure that id->index does not overflow
The ALSA control code expects that the range of assigned indices to a control is
continuous and does not overflow. Currently there are no checks to enforce this.
If a control with a overflowing index range is created that control becomes
effectively inaccessibl... | 1 | int snd_ctl_add(struct snd_card *card, struct snd_kcontrol *kcontrol)
{
struct snd_ctl_elem_id id;
unsigned int idx;
unsigned int count;
int err = -EINVAL;
if (! kcontrol)
return err;
if (snd_BUG_ON(!card || !kcontrol->info))
goto error;
id = kcontrol->id;
down_write(&card->controls_rwsem);
if (snd_c... | 304,470,449,259,529,630,000,000,000,000,000,000,000 | control.c | 179,532,723,377,993,540,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2014-4656 | Multiple integer overflows in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 allow local users to cause a denial of service by leveraging /dev/snd/controlCX access, related to (1) index values in the snd_ctl_add function and (2) numid values in the snd_ctl_remove_numid_conflic... | https://nvd.nist.gov/vuln/detail/CVE-2014-4656 |
4,239 | cgminer | bac5831b355f916e0696b7bbcccfc51c057b729a | https://github.com/ckolivas/cgminer | https://github.com/sgminer-dev/sgminer/commit/bac5831b355f916e0696b7bbcccfc51c057b729a | None | 1 | bool initiate_stratum(struct pool *pool)
{
bool ret = false, recvd = false, noresume = false, sockd = false;
char s[RBUFSIZE], *sret = NULL, *nonce1, *sessionid;
json_t *val = NULL, *res_val, *err_val;
json_error_t err;
int n2size;
resend:
if (!setup_stratum_socket(pool)) {
/* FIXME: change to LOG_DEBUG when i... | 85,722,006,779,524,040,000,000,000,000,000,000,000 | util.c | 294,909,057,015,150,300,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2014-4502 | Multiple heap-based buffer overflows in the parse_notify function in sgminer before 4.2.2, cgminer before 4.3.5, and BFGMiner before 4.1.0 allow remote pool servers to have unspecified impact via a (1) large or (2) negative value in the Extranonc2_size parameter in a mining.subscribe response and a crafted mining.notif... | https://nvd.nist.gov/vuln/detail/CVE-2014-4502 |
4,249 | php-src | 0641e56be1af003aa02c7c6b0184466540637233 | https://github.com/php/php-src | https://github.com/file/file/commit/0641e56be1af003aa02c7c6b0184466540637233 | None | 1 | cdf_read_property_info(const cdf_stream_t *sst, const cdf_header_t *h,
uint32_t offs, cdf_property_info_t **info, size_t *count, size_t *maxcount)
{
const cdf_section_header_t *shp;
cdf_section_header_t sh;
const uint8_t *p, *q, *e;
int16_t s16;
int32_t s32;
uint32_t u32;
int64_t s64;
uint64_t u64;
cdf_tim... | 310,605,146,063,042,650,000,000,000,000,000,000,000 | cdf.c | 320,241,359,265,609,450,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2014-3587 | Integer overflow in the cdf_read_property_info function in cdf.c in file through 5.19, as used in the Fileinfo component in PHP before 5.4.32 and 5.5.x before 5.5.16, allows remote attackers to cause a denial of service (application crash) via a crafted CDF file. NOTE: this vulnerability exists because of an incomplet... | https://nvd.nist.gov/vuln/detail/CVE-2014-3587 |
4,250 | file | 74cafd7de9ec99a14f4480927580e501c8f852c3 | https://github.com/file/file | https://github.com/file/file/commit/74cafd7de9ec99a14f4480927580e501c8f852c3 | If requested, limit search length. | 1 | magiccheck(struct magic_set *ms, struct magic *m)
{
uint64_t l = m->value.q;
uint64_t v;
float fl, fv;
double dl, dv;
int matched;
union VALUETYPE *p = &ms->ms_value;
switch (m->type) {
case FILE_BYTE:
v = p->b;
break;
case FILE_SHORT:
case FILE_BESHORT:
case FILE_LESHORT:
v = p->h;
break;
case F... | 22,957,534,152,900,236,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2014-3538 | file before 5.19 does not properly restrict the amount of data read during a regex search, which allows remote attackers to cause a denial of service (CPU consumption) via a crafted file that triggers backtracking during processing of an awk rule. NOTE: this vulnerability exists because of an incomplete fix for CVE-20... | https://nvd.nist.gov/vuln/detail/CVE-2014-3538 |
4,251 | linux | fdc81f45e9f57858da6351836507fbcf1b7583ee | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/fdc81f45e9f57858da6351836507fbcf1b7583ee | sg_start_req(): use import_iovec()
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk> | 1 | sg_start_req(Sg_request *srp, unsigned char *cmd)
{
int res;
struct request *rq;
Sg_fd *sfp = srp->parentfp;
sg_io_hdr_t *hp = &srp->header;
int dxfer_len = (int) hp->dxfer_len;
int dxfer_dir = hp->dxfer_direction;
unsigned int iov_count = hp->iovec_count;
Sg_scatter_hold *req_schp = &srp->data;
Sg_scatter_hol... | 66,924,822,577,657,650,000,000,000,000,000,000,000 | sg.c | 72,917,896,964,332,490,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2015-5707 | Integer overflow in the sg_start_req function in drivers/scsi/sg.c in the Linux kernel 2.6.x through 4.x before 4.1 allows local users to cause a denial of service or possibly have unspecified other impact via a large iov_count value in a write request. | https://nvd.nist.gov/vuln/detail/CVE-2015-5707 |
4,252 | linux | 9a59029bc218b48eff8b5d4dde5662fd79d3e1a8 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/9a59029bc218b48eff8b5d4dde5662fd79d3e1a8 | ozwpan: unchecked signed subtraction leads to DoS
The subtraction here was using a signed integer and did not have any
bounds checking at all. This commit adds proper bounds checking, made
easy by use of an unsigned integer. This way, a single packet won't be
able to remotely trigger a massive loop, locking up the sys... | 1 | static void oz_usb_handle_ep_data(struct oz_usb_ctx *usb_ctx,
struct oz_usb_hdr *usb_hdr, int len)
{
struct oz_data *data_hdr = (struct oz_data *)usb_hdr;
switch (data_hdr->format) {
case OZ_DATA_F_MULTIPLE_FIXED: {
struct oz_multiple_fixed *body =
(struct oz_multiple_fixed *)data_hdr;
u8 *data = body... | 236,342,740,336,501,530,000,000,000,000,000,000,000 | ozusbsvc1.c | 24,203,781,560,545,576,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2015-4002 | drivers/staging/ozwpan/ozusbsvc1.c in the OZWPAN driver in the Linux kernel through 4.0.5 does not ensure that certain length values are sufficiently large, which allows remote attackers to cause a denial of service (system crash or large loop) or possibly execute arbitrary code via a crafted packet, related to the (1)... | https://nvd.nist.gov/vuln/detail/CVE-2015-4002 |
4,253 | linux | cde93be45a8a90d8c264c776fab63487b5038a65 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/cde93be45a8a90d8c264c776fab63487b5038a65 | dcache: Handle escaped paths in prepend_path
A rename can result in a dentry that by walking up d_parent
will never reach it's mnt_root. For lack of a better term
I call this an escaped path.
prepend_path is called by four different functions __d_path,
d_absolute_path, d_path, and getcwd.
__d_path only wants to see... | 1 | static int prepend_path(const struct path *path,
const struct path *root,
char **buffer, int *buflen)
{
struct dentry *dentry;
struct vfsmount *vfsmnt;
struct mount *mnt;
int error = 0;
unsigned seq, m_seq = 0;
char *bptr;
int blen;
rcu_read_lock();
restart_mnt:
read_seqbegin_or_lock(&mount_lock, &m_seq... | 240,377,922,459,030,080,000,000,000,000,000,000,000 | dcache.c | 221,889,601,120,940,870,000,000,000,000,000,000,000 | [
"CWE-254"
] | CVE-2015-2925 | The prepend_path function in fs/dcache.c in the Linux kernel before 4.2.4 does not properly handle rename actions inside a bind mount, which allows local users to bypass an intended container protection mechanism by renaming a directory, related to a "double-chroot attack." | https://nvd.nist.gov/vuln/detail/CVE-2015-2925 |
4,256 | linux | 637b58c2887e5e57850865839cc75f59184b23d1 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/637b58c2887e5e57850865839cc75f59184b23d1 | switch pipe_read() to copy_page_to_iter()
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk> | 1 | pipe_read(struct kiocb *iocb, const struct iovec *_iov,
unsigned long nr_segs, loff_t pos)
{
struct file *filp = iocb->ki_filp;
struct pipe_inode_info *pipe = filp->private_data;
int do_wakeup;
ssize_t ret;
struct iovec *iov = (struct iovec *)_iov;
size_t total_len;
total_len = iov_length(iov, nr_segs)... | 68,472,811,572,124,770,000,000,000,000,000,000,000 | pipe.c | 80,334,105,915,950,020,000,000,000,000,000,000,000 | [
"CWE-17"
] | CVE-2015-1805 | The (1) pipe_read and (2) pipe_write implementations in fs/pipe.c in the Linux kernel before 3.16 do not properly consider the side effects of failed __copy_to_user_inatomic and __copy_from_user_inatomic calls, which allows local users to cause a denial of service (system crash) or possibly gain privileges via a crafte... | https://nvd.nist.gov/vuln/detail/CVE-2015-1805 |
4,257 | linux | a1d47b262952a45aae62bd49cfaf33dd76c11a2c | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a1d47b262952a45aae62bd49cfaf33dd76c11a2c | udf: Verify symlink size before loading it
UDF specification allows arbitrarily large symlinks. However we support
only symlinks at most one block large. Check the length of the symlink
so that we don't access memory beyond end of the symlink block.
CC: stable@vger.kernel.org
Reported-by: Carl Henrik Lunde <chlunde@g... | 1 | static int udf_symlink_filler(struct file *file, struct page *page)
{
struct inode *inode = page->mapping->host;
struct buffer_head *bh = NULL;
unsigned char *symlink;
int err = -EIO;
unsigned char *p = kmap(page);
struct udf_inode_info *iinfo;
uint32_t pos;
iinfo = UDF_I(inode);
pos = udf_block_map(... | 310,960,582,466,799,800,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2014-9728 | The UDF filesystem implementation in the Linux kernel before 3.18.2 does not validate certain lengths, which allows local users to cause a denial of service (buffer over-read and system crash) via a crafted filesystem image, related to fs/udf/inode.c and fs/udf/symlink.c. | https://nvd.nist.gov/vuln/detail/CVE-2014-9728 |
4,266 | libgd | c18263e0e0769faee96a5d0ee04b750c442783c6 | https://github.com/libgd/libgd | https://github.com/php/php-src/commit/c18263e0e0769faee96a5d0ee04b750c442783c6 | None | 1 | void gdImageWebpCtx (gdImagePtr im, gdIOCtx * outfile, int quantization)
{
uint8_t *argb;
int x, y;
uint8_t *p;
uint8_t *out;
size_t out_size;
if (im == NULL) {
return;
}
if (!gdImageTrueColor(im)) {
zend_error(E_ERROR, "Paletter image not supported by webp");
return;
}
if (quantization == -1) {
q... | 260,398,564,512,501,660,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2016-7568 | Integer overflow in the gdImageWebpCtx function in gd_webp.c in the GD Graphics Library (aka libgd) through 2.2.3, as used in PHP through 7.0.11, allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted imagewebp and imagedestroy calls. | https://nvd.nist.gov/vuln/detail/CVE-2016-7568 |
4,267 | openjpeg | ef01f18dfc6780b776d0674ed3e7415c6ef54d24 | https://github.com/uclouvain/openjpeg | https://github.com/uclouvain/openjpeg/commit/ef01f18dfc6780b776d0674ed3e7415c6ef54d24 | Cast to size_t before multiplication
Need to cast to size_t before multiplication otherwise overflow check is useless. | 1 | opj_pi_iterator_t *opj_pi_create_decode(opj_image_t *p_image,
opj_cp_t *p_cp,
OPJ_UINT32 p_tile_no)
{
/* loop */
OPJ_UINT32 pino;
OPJ_UINT32 compno, resno;
/* to store w, h, dx and dy fro all components and resolutions */
OPJ_UINT32 * l_tmp_data;
OPJ_UINT32 ** l_tmp_ptr;
/* encoding pramete... | 214,675,431,033,653,840,000,000,000,000,000,000,000 | pi.c | 155,797,594,499,992,280,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2016-7163 | Integer overflow in the opj_pi_create_decode function in pi.c in OpenJPEG allows remote attackers to execute arbitrary code via a crafted JP2 file, which triggers an out-of-bounds read or write. | https://nvd.nist.gov/vuln/detail/CVE-2016-7163 |
4,268 | libgd | 3c2b605d72e8b080dace1d98a6e50b46c1d12186 | https://github.com/libgd/libgd | https://github.com/libgd/libgd/commit/3c2b605d72e8b080dace1d98a6e50b46c1d12186 | bug #248, fix Out-Of-Bounds Read in read_image_tga | 1 | int read_image_tga( gdIOCtx *ctx, oTga *tga )
{
int pixel_block_size = (tga->bits / 8);
int image_block_size = (tga->width * tga->height) * pixel_block_size;
uint8_t* decompression_buffer = NULL;
unsigned char* conversion_buffer = NULL;
int buffer_caret = 0;
int bitmap_caret = 0;
int i = 0;
int j = 0;
uint8_t ... | 88,682,079,805,925,440,000,000,000,000,000,000,000 | gd_tga.c | 316,236,023,198,357,030,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2016-6905 | The read_image_tga function in gd_tga.c in the GD Graphics Library (aka libgd) before 2.2.3 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted TGA image. | https://nvd.nist.gov/vuln/detail/CVE-2016-6905 |
4,269 | linux | 54d5ca871e72f2bb172ec9323497f01cd5091ec7 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/54d5ca871e72f2bb172ec9323497f01cd5091ec7 | vfs: add vfs_select_inode() helper
Signed-off-by: Miklos Szeredi <mszeredi@redhat.com>
Cc: <stable@vger.kernel.org> # v4.2+ | 1 | int vfs_open(const struct path *path, struct file *file,
const struct cred *cred)
{
struct dentry *dentry = path->dentry;
struct inode *inode = dentry->d_inode;
file->f_path = *path;
if (dentry->d_flags & DCACHE_OP_SELECT_INODE) {
inode = dentry->d_op->d_select_inode(dentry, file->f_flags);
if (IS_ER... | 81,047,983,480,425,140,000,000,000,000,000,000,000 | open.c | 329,475,889,001,649,380,000,000,000,000,000,000,000 | [
"CWE-284"
] | CVE-2016-6198 | The filesystem layer in the Linux kernel before 4.5.5 proceeds with post-rename operations after an OverlayFS file is renamed to a self-hardlink, which allows local users to cause a denial of service (system crash) via a rename system call, related to fs/namei.c and fs/open.c. | https://nvd.nist.gov/vuln/detail/CVE-2016-6198 |
4,281 | ImageMagick | fc43974d34318c834fbf78570ca1a3764ed8c7d7 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/fc43974d34318c834fbf78570ca1a3764ed8c7d7 | Ensure image extent does not exceed maximum | 1 | static Image *ReadWPGImage(const ImageInfo *image_info,
ExceptionInfo *exception)
{
typedef struct
{
size_t FileId;
MagickOffsetType DataOffset;
unsigned int ProductType;
unsigned int FileType;
unsigned char MajorVersion;
unsigned char MinorVersion;
unsigned int EncryptKey;
unsigne... | 180,171,464,052,447,030,000,000,000,000,000,000,000 | wpg.c | 99,965,343,271,644,740,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2016-5688 | The WPG parser in ImageMagick before 6.9.4-4 and 7.x before 7.0.1-5, when a memory limit is set, allows remote attackers to have unspecified impact via vectors related to the SetImageExtent return-value check, which trigger (1) a heap-based buffer overflow in the SetPixelIndex function or an invalid write operation in ... | https://nvd.nist.gov/vuln/detail/CVE-2016-5688 |
4,287 | wireshark | 5efb45231671baa2db2011d8f67f9d6e72bc455b | https://github.com/wireshark/wireshark | https://github.com/wireshark/wireshark/commit/5efb45231671baa2db2011d8f67f9d6e72bc455b | Fix packet length handling.
Treat the packet length as unsigned - it shouldn't be negative in the
file. If it is, that'll probably cause the sscanf to fail, so we'll
report the file as bad.
Check it against WTAP_MAX_PACKET_SIZE to make sure we don't try to
allocate a huge amount of memory, just as we do in other fil... | 1 | parse_toshiba_packet(FILE_T fh, struct wtap_pkthdr *phdr, Buffer *buf,
int *err, gchar **err_info)
{
union wtap_pseudo_header *pseudo_header = &phdr->pseudo_header;
char line[TOSHIBA_LINE_LENGTH];
int num_items_scanned;
int pkt_len, pktnum, hr, min, sec, csec;
char channel[10], direction[10];
int i, hex_... | 309,314,898,049,093,650,000,000,000,000,000,000,000 | toshiba.c | 201,719,230,202,864,100,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2016-5355 | wiretap/toshiba.c in the Toshiba file parser in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles sscanf unsigned-integer processing, which allows remote attackers to cause a denial of service (application crash) via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2016-5355 |
4,288 | libimobiledevice | 4397b3376dc4e4cb1c991d0aed61ce6482614196 | https://github.com/libimobiledevice/libimobiledevice | https://github.com/libimobiledevice/libusbmuxd/commit/4397b3376dc4e4cb1c991d0aed61ce6482614196 | None | 1 | int socket_create(uint16_t port)
{
int sfd = -1;
int yes = 1;
#ifdef WIN32
WSADATA wsa_data;
if (!wsa_init) {
if (WSAStartup(MAKEWORD(2,2), &wsa_data) != ERROR_SUCCESS) {
fprintf(stderr, "WSAStartup failed!\n");
ExitProcess(-1);
}
wsa_init = 1;
}
#endif
struct sockaddr_in saddr;
if (0 > (sfd = socke... | 294,733,776,418,858,640,000,000,000,000,000,000,000 | None | null | [
"CWE-284"
] | CVE-2016-5104 | The socket_create function in common/socket.c in libimobiledevice and libusbmuxd allows remote attackers to bypass intended access restrictions and communicate with services on iOS devices by connecting to an IPv4 TCP socket. | https://nvd.nist.gov/vuln/detail/CVE-2016-5104 |
4,289 | linux | 9a47e9cff994f37f7f0dbd9ae23740d0f64f9fe6 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/9a47e9cff994f37f7f0dbd9ae23740d0f64f9fe6 | ALSA: timer: Fix leak in events via snd_timer_user_ccallback
The stack object “r1” has a total size of 32 bytes. Its field
“event” and “val” both contain 4 bytes padding. These 8 bytes
padding bytes are sent to user without being initialized.
Signed-off-by: Kangjie Lu <kjlu@gatech.edu>
Signed-off-by: Takashi Iwai <ti... | 1 | static void snd_timer_user_ccallback(struct snd_timer_instance *timeri,
int event,
struct timespec *tstamp,
unsigned long resolution)
{
struct snd_timer_user *tu = timeri->callback_data;
struct snd_timer_tread r1;
unsigned long flags;
if (event >= SNDRV_TIMER_EVENT_START &&
event <=... | 53,749,721,225,904,320,000,000,000,000,000,000,000 | timer.c | 102,836,771,800,390,000,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2016-4578 | sound/core/timer.c in the Linux kernel through 4.6 does not initialize certain r1 data structures, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions. | https://nvd.nist.gov/vuln/detail/CVE-2016-4578 |
4,290 | linux | 1666984c8625b3db19a9abc298931d35ab7bc64b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1666984c8625b3db19a9abc298931d35ab7bc64b | usbnet: cleanup after bind() in probe()
In case bind() works, but a later error forces bailing
in probe() in error cases work and a timer may be scheduled.
They must be killed. This fixes an error case related to
the double free reported in
http://www.spinics.net/lists/netdev/msg367669.html
and needs to go on top of L... | 1 | usbnet_probe (struct usb_interface *udev, const struct usb_device_id *prod)
{
struct usbnet *dev;
struct net_device *net;
struct usb_host_interface *interface;
struct driver_info *info;
struct usb_device *xdev;
int status;
const char *name;
struct usb_driver *driver = to_usb_driver(udev->dev.driver);... | 17,911,033,984,720,165,000,000,000,000,000,000,000 | None | null | [
"CWE-703"
] | CVE-2016-3951 | Double free vulnerability in drivers/net/usb/cdc_ncm.c in the Linux kernel before 4.5 allows physically proximate attackers to cause a denial of service (system crash) or possibly have unspecified other impact by inserting a USB device with an invalid USB descriptor. | https://nvd.nist.gov/vuln/detail/CVE-2016-3951 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.