idx
int64
project
string
commit_id
string
project_url
string
commit_url
string
commit_message
string
target
int64
func
string
func_hash
float64
file_name
string
file_hash
float64
cwe
list
cve
string
cve_desc
string
nvd_url
string
4,291
libndp
2af9a55b38b55abbf05fd116ec097d4029115839
https://github.com/jpirko/libndp
https://github.com/jpirko/libndp/commit/2af9a55b38b55abbf05fd116ec097d4029115839
libndb: reject redirect and router advertisements from non-link-local RFC4861 suggests that these messages should only originate from link-local addresses in 6.1.2 (RA) and 8.1. (redirect): Mitigates CVE-2016-3698. Signed-off-by: Lubomir Rintel <lkundrak@v3.sk> Signed-off-by: Jiri Pirko <jiri@mellanox.com>
1
static bool ndp_msg_check_valid(struct ndp_msg *msg) { size_t len = ndp_msg_payload_len(msg); enum ndp_msg_type msg_type = ndp_msg_type(msg); if (len < ndp_msg_type_info(msg_type)->raw_struct_size) return false; return true; }
263,634,785,860,008,600,000,000,000,000,000,000,000
libndp.c
106,315,038,392,236,970,000,000,000,000,000,000,000
[ "CWE-284" ]
CVE-2016-3698
libndp before 1.6, as used in NetworkManager, does not properly validate the origin of Neighbor Discovery Protocol (NDP) messages, which allows remote attackers to conduct man-in-the-middle attacks or cause a denial of service (network connectivity disruption) by advertising a node as a router from a non-local network.
https://nvd.nist.gov/vuln/detail/CVE-2016-3698
4,322
linux
3a8b0677fc6180a467e26cc32ce6b0c09a32f9bb
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/3a8b0677fc6180a467e26cc32ce6b0c09a32f9bb
KVM: VMX: Do not BUG() on out-of-bounds guest IRQ The value of the guest_irq argument to vmx_update_pi_irte() is ultimately coming from a KVM_IRQFD API call. Do not BUG() in vmx_update_pi_irte() if the value is out-of bounds. (Especially, since KVM as a whole seems to hang after that.) Instead, print a message only o...
1
static int vmx_update_pi_irte(struct kvm *kvm, unsigned int host_irq, uint32_t guest_irq, bool set) { struct kvm_kernel_irq_routing_entry *e; struct kvm_irq_routing_table *irq_rt; struct kvm_lapic_irq irq; struct kvm_vcpu *vcpu; struct vcpu_data vcpu_info; int idx, ret = -EINVAL; if (!kvm_arch_has...
231,515,050,173,833,580,000,000,000,000,000,000,000
vmx.c
59,498,124,009,138,840,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2017-1000252
The KVM subsystem in the Linux kernel through 4.13.3 allows guest OS users to cause a denial of service (assertion failure, and hypervisor hang or crash) via an out-of bounds guest_irq value, related to arch/x86/kvm/vmx.c and virt/kvm/eventfd.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-1000252
4,323
file
9611f31313a93aa036389c5f3b15eea53510d4d
https://github.com/file/file
https://github.com/file/file/commit/9611f31313a93aa036389c5f3b15eea53510d4d
Extend build-id reporting to 8-byte IDs that lld can generate (Ed Maste)
1
do_bid_note(struct magic_set *ms, unsigned char *nbuf, uint32_t type, int swap __attribute__((__unused__)), uint32_t namesz, uint32_t descsz, size_t noff, size_t doff, int *flags) { if (namesz == 4 && strcmp((char *)&nbuf[noff], "GNU") == 0 && type == NT_GNU_BUILD_ID && (descsz == 16 || descsz == 20)) ...
309,926,617,047,429,440,000,000,000,000,000,000,000
readelf.c
310,659,837,802,899,300,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2017-1000249
An issue in file() was introduced in commit 9611f31313a93aa036389c5f3b15eea53510d4d1 (Oct 2016) lets an attacker overwrite a fixed 20 bytes stack buffer with a specially crafted .notes section in an ELF binary. This was fixed in commit 35c94dc6acc418f1ad7f6241a6680e5327495793 (Aug 2017).
https://nvd.nist.gov/vuln/detail/CVE-2017-1000249
4,324
ImageMagick
e04cf3e9524f50ca336253513d977224e083b816
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/e04cf3e9524f50ca336253513d977224e083b816
None
1
static Image *ReadWPGImage(const ImageInfo *image_info, ExceptionInfo *exception) { typedef struct { size_t FileId; MagickOffsetType DataOffset; unsigned int ProductType; unsigned int FileType; unsigned char MajorVersion; unsigned char MinorVersion; unsigned int EncryptKey; unsigne...
93,853,924,778,718,540,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-16546
The ReadWPGImage function in coders/wpg.c in ImageMagick 7.0.7-9 does not properly validate the colormap index in a WPG palette, which allows remote attackers to cause a denial of service (use of uninitialized data or invalid memory allocation) or possibly have unspecified other impact via a malformed WPG file.
https://nvd.nist.gov/vuln/detail/CVE-2017-16546
4,325
linux
bd998c2e0df0469707503023d50d46cf0b10c787
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/bd998c2e0df0469707503023d50d46cf0b10c787
USB: serial: console: fix use-after-free on disconnect A clean-up patch removing two redundant NULL-checks from the console disconnect handler inadvertently also removed a third check. This could lead to the struct usb_serial being prematurely freed by the console code when a driver accepts but does not register any p...
1
void usb_serial_console_disconnect(struct usb_serial *serial) { if (serial->port[0] == usbcons_info.port) { usb_serial_console_exit(); usb_serial_put(serial); } }
5,359,239,449,223,849,000,000,000,000,000,000,000
console.c
156,313,628,004,751,300,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2017-16525
The usb_serial_console_disconnect function in drivers/usb/serial/console.c in the Linux kernel before 4.13.8 allows local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via a crafted USB device, related to disconnection and failed setup.
https://nvd.nist.gov/vuln/detail/CVE-2017-16525
4,326
radare2
d21e91f075a7a7a8ed23baa5c1bb1fac48313882
https://github.com/radare/radare2
https://github.com/radare/radare2/commit/d21e91f075a7a7a8ed23baa5c1bb1fac48313882
Fix #8764 differently since ptr diff might not fit in ptrdiff_t
1
static Sdb *store_versioninfo_gnu_verdef(ELFOBJ *bin, Elf_(Shdr) *shdr, int sz) { const char *section_name = ""; const char *link_section_name = ""; char *end = NULL; Elf_(Shdr) *link_shdr = NULL; ut8 dfs[sizeof (Elf_(Verdef))] = {0}; Sdb *sdb; int cnt, i; if (shdr->sh_link > bin->ehdr.e_shnum) { return false...
177,654,284,276,873,100,000,000,000,000,000,000,000
elf.c
150,931,977,046,631,910,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2017-16359
In radare 2.0.1, a pointer wraparound vulnerability exists in store_versioninfo_gnu_verdef() in libr/bin/format/elf/elf.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-16359
4,327
radare2
fbaf24bce7ea4211e4608b3ab6c1b45702cb243d
https://github.com/radare/radare2
https://github.com/radare/radare2/commit/fbaf24bce7ea4211e4608b3ab6c1b45702cb243d
Fix #8764 a 3rd time since 2nd time is UB and can be optimized away
1
static Sdb *store_versioninfo_gnu_verdef(ELFOBJ *bin, Elf_(Shdr) *shdr, int sz) { const char *section_name = ""; const char *link_section_name = ""; char *end = NULL; Elf_(Shdr) *link_shdr = NULL; ut8 dfs[sizeof (Elf_(Verdef))] = {0}; Sdb *sdb; int cnt, i; if (shdr->sh_link > bin->ehdr.e_shnum) { return false...
49,750,649,927,320,680,000,000,000,000,000,000,000
elf.c
82,792,017,403,717,510,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2017-16359
In radare 2.0.1, a pointer wraparound vulnerability exists in store_versioninfo_gnu_verdef() in libr/bin/format/elf/elf.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-16359
4,328
linux
008ba2a13f2d04c947adc536d19debb8fe66f110
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/008ba2a13f2d04c947adc536d19debb8fe66f110
packet: hold bind lock when rebinding to fanout hook Packet socket bind operations must hold the po->bind_lock. This keeps po->running consistent with whether the socket is actually on a ptype list to receive packets. fanout_add unbinds a socket and its packet_rcv/tpacket_rcv call, then binds the fanout object to rec...
1
static int fanout_add(struct sock *sk, u16 id, u16 type_flags) { struct packet_rollover *rollover = NULL; struct packet_sock *po = pkt_sk(sk); struct packet_fanout *f, *match; u8 type = type_flags & 0xff; u8 flags = type_flags >> 8; int err; switch (type) { case PACKET_FANOUT_ROLLOVER: if (type_flags & PACKE...
161,989,068,850,130,440,000,000,000,000,000,000,000
af_packet.c
215,849,604,675,932,100,000,000,000,000,000,000,000
[ "CWE-362" ]
CVE-2017-15649
net/packet/af_packet.c in the Linux kernel before 4.13.6 allows local users to gain privileges via crafted system calls that trigger mishandling of packet_fanout data structures, because of a race condition (involving fanout_add and packet_do_bind) that leads to a use-after-free, a different vulnerability than CVE-2017...
https://nvd.nist.gov/vuln/detail/CVE-2017-15649
4,329
ImageMagick
04a567494786d5bb50894fc8bb8fea0cf496bea8
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/04a567494786d5bb50894fc8bb8fea0cf496bea8
Slightly different fix for #714
1
static MagickBooleanType ReadPSDLayersInternal(Image *image, const ImageInfo *image_info,const PSDInfo *psd_info, const MagickBooleanType skip_layers,ExceptionInfo *exception) { char type[4]; LayerInfo *layer_info; MagickSizeType size; MagickBooleanType status; register ssize_t i; ...
272,298,623,691,895,300,000,000,000,000,000,000,000
psd.c
10,373,962,997,159,750,000,000,000,000,000,000,000
[ "CWE-834" ]
CVE-2017-14174
In coders/psd.c in ImageMagick 7.0.7-0 Q16, a DoS in ReadPSDLayersInternal() due to lack of an EOF (End of File) check might cause huge CPU consumption. When a crafted PSD file, which claims a large "length" field in the header but does not contain sufficient backing data, is provided, the loop over "length" would cons...
https://nvd.nist.gov/vuln/detail/CVE-2017-14174
4,333
tcpdump
a1eefe986065846b6c69dbc09afd9fa1a02c4a3d
https://github.com/the-tcpdump-group/tcpdump
https://github.com/the-tcpdump-group/tcpdump/commit/a1eefe986065846b6c69dbc09afd9fa1a02c4a3d
CVE-2017-13687/CHDLC: Improve bounds and length checks. Prevent a possible buffer overread in chdlc_print() and replace the custom check in chdlc_if_print() with a standard check in chdlc_print() so that the latter certainly does not over-read even when reached via juniper_chdlc_print(). Add length checks.
1
chdlc_print(netdissect_options *ndo, register const u_char *p, u_int length) { u_int proto; proto = EXTRACT_16BITS(&p[2]); if (ndo->ndo_eflag) { ND_PRINT((ndo, "%s, ethertype %s (0x%04x), length %u: ", tok2str(chdlc_cast_values, "0x%02x", p[0]), t...
153,136,498,940,710,670,000,000,000,000,000,000,000
print-chdlc.c
66,993,649,061,685,280,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-13687
The Cisco HDLC parser in tcpdump before 4.9.2 has a buffer over-read in print-chdlc.c:chdlc_print().
https://nvd.nist.gov/vuln/detail/CVE-2017-13687
4,334
ImageMagick
ac23b02ecb741e5de60f5235ea443790c88a0b80
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/ac23b02ecb741e5de60f5235ea443790c88a0b80
None
1
static Image *ReadJP2Image(const ImageInfo *image_info,ExceptionInfo *exception) { const char *option; Image *image; int jp2_status; MagickBooleanType status; opj_codec_t *jp2_codec; opj_codestream_index_t *codestream_index = (opj_codestream_index_t *) NULL; opj_dparameters_t...
147,252,422,061,321,770,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2017-13145
In ImageMagick before 6.9.8-8 and 7.x before 7.0.5-9, the ReadJP2Image function in coders/jp2.c does not properly validate the channel geometry, leading to a crash.
https://nvd.nist.gov/vuln/detail/CVE-2017-13145
4,337
tcpdump
29e5470e6ab84badbc31f4532bb7554a796d9d52
https://github.com/the-tcpdump-group/tcpdump
https://github.com/the-tcpdump-group/tcpdump/commit/29e5470e6ab84badbc31f4532bb7554a796d9d52
CVE-2017-13028/BOOTP: Add a bounds check before fetching data This fixes a buffer over-read discovered by Bhargava Shastry, SecT/TU Berlin. Add a test using the capture file supplied by the reporter(s), modified so the capture file won't cause 'tcpdump: pcap_loop: truncated dump file'
1
bootp_print(netdissect_options *ndo, register const u_char *cp, u_int length) { register const struct bootp *bp; static const u_char vm_cmu[4] = VM_CMU; static const u_char vm_rfc1048[4] = VM_RFC1048; bp = (const struct bootp *)cp; ND_TCHECK(bp->bp_op); ND_PRINT((ndo, "BOOTP/DHCP, %s", tok2str(bootp_op...
177,049,373,499,157,830,000,000,000,000,000,000,000
print-bootp.c
159,087,126,255,627,960,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-13028
The BOOTP parser in tcpdump before 4.9.2 has a buffer over-read in print-bootp.c:bootp_print().
https://nvd.nist.gov/vuln/detail/CVE-2017-13028
4,338
tcpdump
42073d54c53a496be40ae84152bbfe2c923ac7bc
https://github.com/the-tcpdump-group/tcpdump
https://github.com/the-tcpdump-group/tcpdump/commit/42073d54c53a496be40ae84152bbfe2c923ac7bc
CVE-2017-13004/Juniper: Add a bounds check. This fixes a buffer over-read discovered by Forcepoint's security researchers Otto Airamo & Antti Levomäki. Add tests using the capture files supplied by the reporter(s).
1
juniper_parse_header(netdissect_options *ndo, const u_char *p, const struct pcap_pkthdr *h, struct juniper_l2info_t *l2info) { const struct juniper_cookie_table_t *lp = juniper_cookie_table; u_int idx, jnx_ext_len, jnx_header_len = 0; uint8_t tlv_type,tlv_len; uint32_t control_word;...
47,824,677,361,513,335,000,000,000,000,000,000,000
print-juniper.c
285,998,041,224,733,920,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-13004
The Juniper protocols parser in tcpdump before 4.9.2 has a buffer over-read in print-juniper.c:juniper_parse_header().
https://nvd.nist.gov/vuln/detail/CVE-2017-13004
4,340
tcpdump
9be4e0b5938b705e7e36cfcb110a740c6ff0cb97
https://github.com/the-tcpdump-group/tcpdump
https://github.com/the-tcpdump-group/tcpdump/commit/9be4e0b5938b705e7e36cfcb110a740c6ff0cb97
CVE-2017-13000/IEEE 802.15.4: Add more bounds checks. While we're at it, add a bunch of macros for the frame control field's subfields, have the reserved frame types show the frame type value, use the same code path for processing source and destination addresses regardless of whether -v was specified (just leave out ...
1
ieee802_15_4_if_print(netdissect_options *ndo, const struct pcap_pkthdr *h, const u_char *p) { u_int caplen = h->caplen; int hdrlen; uint16_t fc; uint8_t seq; if (caplen < 3) { ND_PRINT((ndo, "[|802.15.4] %x", caplen)); return caplen; } fc = EXTRACT_LE_16BITS(p); hdrlen =...
180,975,302,766,879,120,000,000,000,000,000,000,000
print-802_15_4.c
98,232,657,074,353,910,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-13000
The IEEE 802.15.4 parser in tcpdump before 4.9.2 has a buffer over-read in print-802_15_4.c:ieee802_15_4_if_print().
https://nvd.nist.gov/vuln/detail/CVE-2017-13000
4,341
tcpdump
a7e5f58f402e6919ec444a57946bade7dfd6b184
https://github.com/the-tcpdump-group/tcpdump
https://github.com/the-tcpdump-group/tcpdump/commit/a7e5f58f402e6919ec444a57946bade7dfd6b184
CVE-2017-13000/IEEE 802.15.4: Fix bug introduced by previous fix. We've already advanced the pointer past the PAN ID, if present; it now points to the address, so don't add 2 to it. This fixes a buffer over-read discovered by Forcepoint's security researchers Otto Airamo & Antti Levomäki. Add a test using the captur...
1
ieee802_15_4_if_print(netdissect_options *ndo, const struct pcap_pkthdr *h, const u_char *p) { u_int caplen = h->caplen; u_int hdrlen; uint16_t fc; uint8_t seq; uint16_t panid = 0; if (caplen < 3) { ND_PRINT((ndo, "[|802.15.4]")); return caplen; } hdrlen = 3; fc = EXTRACT_LE_16BITS(...
5,018,917,320,579,555,000,000,000,000,000,000,000
print-802_15_4.c
207,302,936,816,742,200,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-13000
The IEEE 802.15.4 parser in tcpdump before 4.9.2 has a buffer over-read in print-802_15_4.c:ieee802_15_4_if_print().
https://nvd.nist.gov/vuln/detail/CVE-2017-13000
4,342
tcpdump
99798bd9a41bd3d03fdc1e949810a38967f20ed3
https://github.com/the-tcpdump-group/tcpdump
https://github.com/the-tcpdump-group/tcpdump/commit/99798bd9a41bd3d03fdc1e949810a38967f20ed3
CVE-2017-12987/IEEE 802.11: Fix processing of TIM IE. The arguments to memcpy() were completely wrong. This fixes a buffer over-read discovered by Kamil Frankowicz. Add a test using the capture file supplied by Brian 'geeknik' Carpenter.
1
parse_elements(netdissect_options *ndo, struct mgmt_body_t *pbody, const u_char *p, int offset, u_int length) { u_int elementlen; struct ssid_t ssid; struct challenge_t challenge; struct rates_t rates; struct ds_t ds; struct cf_t cf; struct tim_t tim; /* * We haven't seen any el...
52,408,821,725,921,460,000,000,000,000,000,000,000
print-802_11.c
182,219,708,019,235,150,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-12987
The IEEE 802.11 parser in tcpdump before 4.9.2 has a buffer over-read in print-802_11.c:parse_elements().
https://nvd.nist.gov/vuln/detail/CVE-2017-12987
4,343
tcpdump
c6e0531b5def26ecf912e8de6ade86cbdaed3751
https://github.com/the-tcpdump-group/tcpdump
https://github.com/the-tcpdump-group/tcpdump/commit/c6e0531b5def26ecf912e8de6ade86cbdaed3751
CVE-2017-12899/DECnet: Fix bounds checking. If we're skipping over padding before the *real* flags, check whether the real flags are in the captured data before fetching it. This fixes a buffer over-read discovered by Kamil Frankowicz. Note one place where we don't need to do bounds checking as it's already been don...
1
decnet_print(netdissect_options *ndo, register const u_char *ap, register u_int length, register u_int caplen) { register const union routehdr *rhp; register int mflags; int dst, src, hops; u_int nsplen, pktlen; const u_char *nspp; if (length < sizeof(struct shorthdr)) { ND_PRINT((ndo...
219,860,692,152,115,800,000,000,000,000,000,000,000
print-decnet.c
107,306,623,307,408,510,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-12899
The DECnet parser in tcpdump before 4.9.2 has a buffer over-read in print-decnet.c:decnet_print().
https://nvd.nist.gov/vuln/detail/CVE-2017-12899
4,345
tcpdump
f76e7feb41a4327d2b0978449bbdafe98d4a3771
https://github.com/the-tcpdump-group/tcpdump
https://github.com/the-tcpdump-group/tcpdump/commit/f76e7feb41a4327d2b0978449bbdafe98d4a3771
CVE-2017-12896/ISAKMP: Do bounds checks in isakmp_rfc3948_print(). This fixes a buffer over-read discovered by Kamil Frankowicz. Add a test using the capture file supplied by the reporter(s).
1
isakmp_rfc3948_print(netdissect_options *ndo, const u_char *bp, u_int length, const u_char *bp2) { if(length == 1 && bp[0]==0xff) { ND_PRINT((ndo, "isakmp-nat-keep-alive")); return; } if(length < 4) { goto trunc; } /* * see if this is an IKE packet */ if(bp[0]==0 && bp[1]==0 ...
293,043,745,684,242,200,000,000,000,000,000,000,000
print-isakmp.c
16,893,582,496,315,646,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-12896
The ISAKMP parser in tcpdump before 4.9.2 has a buffer over-read in print-isakmp.c:isakmp_rfc3948_print().
https://nvd.nist.gov/vuln/detail/CVE-2017-12896
4,346
cyrus-imapd
53c4137bd924b954432c6c59da7572c4c5ffa901
https://github.com/cyrusimap/cyrus-imapd
https://github.com/cyrusimap/cyrus-imapd/commit/53c4137bd924b954432c6c59da7572c4c5ffa901
imapd: check for isadmin BEFORE parsing sync lines
1
static void cmdloop(void) { int c; int usinguid, havepartition, havenamespace, recursive; static struct buf tag, cmd, arg1, arg2, arg3; char *p, shut[MAX_MAILBOX_PATH+1], cmdname[100]; const char *err; const char * commandmintimer; double commandmintimerd = 0.0; struct sync_reserve_list ...
200,822,341,397,563,370,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2017-12843
Cyrus IMAP before 3.0.3 allows remote authenticated users to write to arbitrary files via a crafted (1) SYNCAPPLY, (2) SYNCGET or (3) SYNCRESTORE command.
https://nvd.nist.gov/vuln/detail/CVE-2017-12843
4,347
linux
2b04e8f6bbb196cab4b232af0f8d48ff2c7a8058
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/2b04e8f6bbb196cab4b232af0f8d48ff2c7a8058
more bio_map_user_iov() leak fixes we need to take care of failure exit as well - pages already in bio should be dropped by analogue of bio_unmap_pages(), since their refcounts had been bumped only once per reference in bio. Cc: stable@vger.kernel.org Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
1
struct bio *bio_map_user_iov(struct request_queue *q, const struct iov_iter *iter, gfp_t gfp_mask) { int j; int nr_pages = 0; struct page **pages; struct bio *bio; int cur_page = 0; int ret, offset; struct iov_iter i; struct iovec iov; iov_for_each(iov, i, *iter) { unsigned long uaddr ...
75,562,170,872,440,760,000,000,000,000,000,000,000
bio.c
188,686,352,710,057,400,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2017-12190
The bio_map_user_iov and bio_unmap_user functions in block/bio.c in the Linux kernel before 4.13.8 do unbalanced refcounting when a SCSI I/O vector has small consecutive buffers belonging to the same page. The bio_add_pc_page function merges them into one, but the page reference is never dropped. This causes a memory l...
https://nvd.nist.gov/vuln/detail/CVE-2017-12190
4,348
ImageMagick
83e0f8ffd7eeb7661b0ff83257da23d24ca7f078
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/83e0f8ffd7eeb7661b0ff83257da23d24ca7f078
https://github.com/ImageMagick/ImageMagick/issues/591
1
static Image *ReadTXTImage(const ImageInfo *image_info,ExceptionInfo *exception) { char colorspace[MagickPathExtent], text[MagickPathExtent]; Image *image; long x_offset, y_offset; PixelInfo pixel; MagickBooleanType status; QuantumAny range; register ssize_t i, ...
67,229,528,425,872,500,000,000,000,000,000,000,000
txt.c
128,733,898,318,362,080,000,000,000,000,000,000,000
[ "CWE-835" ]
CVE-2017-11523
The ReadTXTImage function in coders/txt.c in ImageMagick through 6.9.9-0 and 7.x through 7.0.6-1 allows remote attackers to cause a denial of service (infinite loop) via a crafted file, because the end-of-file condition is not considered.
https://nvd.nist.gov/vuln/detail/CVE-2017-11523
4,349
linux
a23325b2e583556eae88ed3f764e457786bf4df6
https://github.com/torvalds/linux
https://github.com/acpica/acpica/commit/a23325b2e583556eae88ed3f764e457786bf4df6
None
1
AcpiNsTerminate ( void) { ACPI_STATUS Status; ACPI_FUNCTION_TRACE (NsTerminate); #ifdef ACPI_EXEC_APP { ACPI_OPERAND_OBJECT *Prev; ACPI_OPERAND_OBJECT *Next; /* Delete any module-level code blocks */ Next = AcpiGbl_ModuleCodeList; ...
273,062,363,533,863,200,000,000,000,000,000,000,000
nsutils.c
91,184,489,201,841,060,000,000,000,000,000,000,000
[ "CWE-755" ]
CVE-2017-11472
The acpi_ns_terminate() function in drivers/acpi/acpica/nsutils.c in the Linux kernel before 4.12 does not flush the operand cache and causes a kernel stack dump, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism (in the kernel through 4.9) via a craft...
https://nvd.nist.gov/vuln/detail/CVE-2017-11472
4,350
ImageMagick
529ff26b68febb2ac03062c58452ea0b4c6edbc1
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/529ff26b68febb2ac03062c58452ea0b4c6edbc1
None
1
ModuleExport size_t RegisterMPCImage(void) { MagickInfo *entry; entry=SetMagickInfo("CACHE"); entry->description=ConstantString("Magick Persistent Cache image format"); entry->module=ConstantString("MPC"); entry->seekable_stream=MagickTrue; entry->stealth=MagickTrue; (void) RegisterMagickInfo(en...
91,619,705,933,668,880,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2017-11449
coders/mpc.c in ImageMagick before 7.0.6-1 does not enable seekable streams and thus cannot validate blob sizes, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via an image received from stdin.
https://nvd.nist.gov/vuln/detail/CVE-2017-11449
4,351
php-src
a15bffd105ac28fd0dd9b596632dbf035238fda3
https://github.com/php/php-src
https://github.com/php/php-src/commit/a15bffd105ac28fd0dd9b596632dbf035238fda3
Fix bug #73807
1
static zend_bool add_post_var(zval *arr, post_var_data_t *var, zend_bool eof) { char *ksep, *vsep, *val; size_t klen, vlen; size_t new_vlen; if (var->ptr >= var->end) { return 0; } vsep = memchr(var->ptr, '&', var->end - var->ptr); if (!vsep) { if (!eof) { return 0; } else { vsep = va...
300,488,664,044,547,050,000,000,000,000,000,000,000
php_variables.c
8,245,733,581,833,365,000,000,000,000,000,000,000
[ "CWE-400" ]
CVE-2017-11142
In PHP before 5.6.31, 7.x before 7.0.17, and 7.1.x before 7.1.3, remote attackers could cause a CPU consumption denial of service attack by injecting long form variables, related to main/php_variables.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-11142
4,352
FFmpeg
e1b60aad77c27ed5d4dfc11e5e6a05a38c70489d
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/e1b60aad77c27ed5d4dfc11e5e6a05a38c70489d
avcodec/cdxl: Check format parameter Fixes out of array access Fixes: 1378/clusterfuzz-testcase-minimized-5715088008806400 Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/targets/ffmpeg Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
1
static int cdxl_decode_frame(AVCodecContext *avctx, void *data, int *got_frame, AVPacket *pkt) { CDXLVideoContext *c = avctx->priv_data; AVFrame * const p = data; int ret, w, h, encoding, aligned_width, buf_size = pkt->size; const uint8_t *buf = pkt->data; if (buf_size ...
178,486,467,278,167,660,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-9996
The cdxl_decode_frame function in libavcodec/cdxl.c in FFmpeg 2.8.x before 2.8.12, 3.0.x before 3.0.8, 3.1.x before 3.1.8, 3.2.x before 3.2.5, and 3.3.x before 3.3.1 does not exclude the CHUNKY format, which allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possi...
https://nvd.nist.gov/vuln/detail/CVE-2017-9996
4,353
FFmpeg
2171dfae8c065878a2e130390eb78cf2947a5b69
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/2171dfae8c065878a2e130390eb78cf2947a5b69
avcodec/scpr: Fix multiple runtime error: index 256 out of bounds for type 'unsigned int [256]' Fixes: 1519/clusterfuzz-testcase-minimized-5286680976162816 Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/targets/ffmpeg Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
1
static int decode_unit(SCPRContext *s, PixelModel *pixel, unsigned step, unsigned *rval) { GetByteContext *gb = &s->gb; RangeCoder *rc = &s->rc; unsigned totfr = pixel->total_freq; unsigned value, x = 0, cumfr = 0, cnt_x = 0; int i, j, ret, c, cnt_c; if ((ret = s->get_freq(rc, totfr, &value)) <...
281,652,385,257,493,500,000,000,000,000,000,000,000
scpr.c
316,731,203,493,724,650,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2017-9995
libavcodec/scpr.c in FFmpeg 3.3 before 3.3.1 does not properly validate height and width data, which allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2017-9995
4,354
FFmpeg
189ff4219644532bdfa7bab28dfedaee4d6d4021
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/189ff4219644532bdfa7bab28dfedaee4d6d4021
avformat/hls: Check local file extensions This reduces the attack surface of local file-system information leaking. It prevents the existing exploit leading to an information leak. As well as similar hypothetical attacks. Leaks of information from files and symlinks ending in common multimedia extensions are still p...
1
static int open_url(AVFormatContext *s, AVIOContext **pb, const char *url, AVDictionary *opts, AVDictionary *opts2, int *is_http) { HLSContext *c = s->priv_data; AVDictionary *tmp = NULL; const char *proto_name = NULL; int ret; av_dict_copy(&tmp, opts, 0); av_dict_copy(&tmp,...
337,479,268,948,256,700,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2017-9993
FFmpeg before 2.8.12, 3.0.x and 3.1.x before 3.1.9, 3.2.x before 3.2.6, and 3.3.x before 3.3.2 does not properly restrict HTTP Live Streaming filename extensions and demuxer names, which allows attackers to read arbitrary files via crafted playlist data.
https://nvd.nist.gov/vuln/detail/CVE-2017-9993
4,355
FFmpeg
0a709e2a10b8288a0cc383547924ecfe285cef89
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/0a709e2a10b8288a0cc383547924ecfe285cef89
avcodec/dnxhd_parser: Do not return invalid value from dnxhd_find_frame_end() on error Fixes: Null pointer dereference Fixes: CVE-2017-9608 Found-by: Yihan Lian Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> (cherry picked from commit 611b35627488a8d0763e75c25ee0875c5b7987dd) Signed-off-by: Michael Niede...
1
static int dnxhd_find_frame_end(DNXHDParserContext *dctx, const uint8_t *buf, int buf_size) { ParseContext *pc = &dctx->pc; uint64_t state = pc->state64; int pic_found = pc->frame_start_found; int i = 0; if (!pic_found) { for (i = 0; i < buf_size; i++) { ...
315,425,032,861,470,850,000,000,000,000,000,000,000
dnxhd_parser.c
103,784,583,369,010,030,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2017-9608
The dnxhd decoder in FFmpeg before 3.2.6, and 3.3.x before 3.3.3 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted mov file.
https://nvd.nist.gov/vuln/detail/CVE-2017-9608
4,366
libsndfile
708e996c87c5fae77b104ccfeb8f6db784c32074
https://github.com/erikd/libsndfile
https://github.com/erikd/libsndfile/commit/708e996c87c5fae77b104ccfeb8f6db784c32074
src/ : Move to a variable length header buffer Previously, the `psf->header` buffer was a fixed length specified by `SF_HEADER_LEN` which was set to `12292`. This was problematic for two reasons; this value was un-necessarily large for the majority of files and too small for some others. Now the size of the header bu...
1
header_read (SF_PRIVATE *psf, void *ptr, int bytes) { int count = 0 ; if (psf->headindex >= SIGNED_SIZEOF (psf->header)) return psf_fread (ptr, 1, bytes, psf) ; if (psf->headindex + bytes > SIGNED_SIZEOF (psf->header)) { int most ; most = SIGNED_SIZEOF (psf->header) - psf->headend ; psf_fread (psf->heade...
137,428,299,166,907,450,000,000,000,000,000,000,000
common.c
339,310,387,561,950,540,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2017-7586
In libsndfile before 1.0.28, an error in the "header_read()" function (common.c) when handling ID3 tags can be exploited to cause a stack-based buffer overflow via a specially crafted FLAC file.
https://nvd.nist.gov/vuln/detail/CVE-2017-7586
4,374
proftpd
ecff21e0d0e84f35c299ef91d7fda088e516d4ed
https://github.com/proftpd/proftpd
https://github.com/proftpd/proftpd/commit/ecff21e0d0e84f35c299ef91d7fda088e516d4ed
Backporting recursive handling of DefaultRoot path, when AllowChrootSymlinks is off, to 1.3.5 branch.
1
static int get_default_root(pool *p, int allow_symlinks, char **root) { config_rec *c = NULL; char *dir = NULL; int res; c = find_config(main_server->conf, CONF_PARAM, "DefaultRoot", FALSE); while (c) { pr_signals_handle(); /* Check the groups acl */ if (c->argc < 2) { dir = c->argv[0];...
40,186,582,881,128,860,000,000,000,000,000,000,000
mod_auth.c
288,997,673,937,166,560,000,000,000,000,000,000,000
[ "CWE-59" ]
CVE-2017-7418
ProFTPD before 1.3.5e and 1.3.6 before 1.3.6rc5 controls whether the home directory of a user could contain a symbolic link through the AllowChrootSymlinks configuration option, but checks only the last path component when enforcing AllowChrootSymlinks. Attackers with local access could bypass the AllowChrootSymlinks c...
https://nvd.nist.gov/vuln/detail/CVE-2017-7418
4,377
linux
4ef1b2869447411ad3ef91ad7d4891a83c1a509a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/4ef1b2869447411ad3ef91ad7d4891a83c1a509a
tcp: mark skbs with SCM_TIMESTAMPING_OPT_STATS SOF_TIMESTAMPING_OPT_STATS can be enabled and disabled while packets are collected on the error queue. So, checking SOF_TIMESTAMPING_OPT_STATS in sk->sk_tsflags is not enough to safely assume that the skb contains OPT_STATS data. Add a bit in sock_exterr_skb to indicate ...
1
void __sock_recv_timestamp(struct msghdr *msg, struct sock *sk, struct sk_buff *skb) { int need_software_tstamp = sock_flag(sk, SOCK_RCVTSTAMP); struct scm_timestamping tss; int empty = 1; struct skb_shared_hwtstamps *shhwtstamps = skb_hwtstamps(skb); /* Race occurred between timestamp enabling and packet ...
318,403,522,723,650,600,000,000,000,000,000,000,000
socket.c
136,313,628,448,494,970,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-7277
The TCP stack in the Linux kernel through 4.10.6 mishandles the SCM_TIMESTAMPING_OPT_STATS feature, which allows local users to obtain sensitive information from the kernel's internal socket data structures or cause a denial of service (out-of-bounds read) via crafted system calls, related to net/core/skbuff.c and net/...
https://nvd.nist.gov/vuln/detail/CVE-2017-7277
4,378
linux
677e806da4d916052585301785d847c3b3e6186a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/677e806da4d916052585301785d847c3b3e6186a
xfrm_user: validate XFRM_MSG_NEWAE XFRMA_REPLAY_ESN_VAL replay_window When a new xfrm state is created during an XFRM_MSG_NEWSA call we validate the user supplied replay_esn to ensure that the size is valid and to ensure that the replay_window size is within the allocated buffer. However later it is possible to updat...
1
static inline int xfrm_replay_verify_len(struct xfrm_replay_state_esn *replay_esn, struct nlattr *rp) { struct xfrm_replay_state_esn *up; int ulen; if (!replay_esn || !rp) return 0; up = nla_data(rp); ulen = xfrm_replay_state_esn_len(up); if (nla_len(rp) < ulen || xfrm_replay_state_esn_len(replay_esn)...
265,697,284,654,293,840,000,000,000,000,000,000,000
xfrm_user.c
34,945,409,834,448,290,000,000,000,000,000,000,000
[ "CWE-284" ]
CVE-2017-7184
The xfrm_replay_verify_len function in net/xfrm/xfrm_user.c in the Linux kernel through 4.10.6 does not validate certain size data after an XFRM_MSG_NEWAE update, which allows local users to obtain root privileges or cause a denial of service (heap-based out-of-bounds access) by leveraging the CAP_NET_ADMIN capability,...
https://nvd.nist.gov/vuln/detail/CVE-2017-7184
4,389
ImageMagick
7d65a814ac76bd04760072c33e452371692ee790
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/7d65a814ac76bd04760072c33e452371692ee790
None
1
ModuleExport MagickBooleanType ReadPSDLayers(Image *image, const ImageInfo *image_info,const PSDInfo *psd_info, const MagickBooleanType skip_layers,ExceptionInfo *exception) { char type[4]; LayerInfo *layer_info; MagickSizeType size; MagickBooleanType status; register ssize_t i; ...
4,351,382,808,025,695,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-5511
coders/psd.c in ImageMagick allows remote attackers to have unspecified impact by leveraging an improper cast, which triggers a heap-based buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-5511
4,390
ImageMagick
37a1710e2dab6ed91128ea648d654a22fbe2a6af
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/37a1710e2dab6ed91128ea648d654a22fbe2a6af
None
1
static ssize_t WritePSDChannels(const PSDInfo *psd_info, const ImageInfo *image_info,Image *image,Image *next_image, MagickOffsetType size_offset,const MagickBooleanType separate) { Image *mask; MagickOffsetType rows_offset; size_t channels, count, length, offset_length; unsigned ...
155,653,748,314,334,410,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2017-5509
coders/psd.c in ImageMagick allows remote attackers to have unspecified impact via a crafted PSD file, which triggers an out-of-bounds write.
https://nvd.nist.gov/vuln/detail/CVE-2017-5509
4,396
libgit2
b5c6a1b407b7f8b952bded2789593b68b1876211
https://github.com/libgit2/libgit2
https://github.com/libgit2/libgit2/commit/b5c6a1b407b7f8b952bded2789593b68b1876211
http: check certificate validity before clobbering the error variable
1
static int http_connect(http_subtransport *t) { int error; char *proxy_url; if (t->connected && http_should_keep_alive(&t->parser) && t->parse_finished) return 0; if (t->io) { git_stream_close(t->io); git_stream_free(t->io); t->io = NULL; t->connected = 0; } if (t->connection_data.use_ssl) { er...
181,137,872,357,421,300,000,000,000,000,000,000,000
None
null
[ "CWE-284" ]
CVE-2016-10130
The http_connect function in transports/http.c in libgit2 before 0.24.6 and 0.25.x before 0.25.1 might allow man-in-the-middle attackers to spoof servers by leveraging clobbering of the error variable.
https://nvd.nist.gov/vuln/detail/CVE-2016-10130
4,397
libgit2
84d30d569ada986f3eef527cbdb932643c2dd037
https://github.com/libgit2/libgit2
https://github.com/libgit2/libgit2/commit/84d30d569ada986f3eef527cbdb932643c2dd037
smart_pkt: treat empty packet lines as error The Git protocol does not specify what should happen in the case of an empty packet line (that is a packet line "0004"). We currently indicate success, but do not return a packet in the case where we hit an empty line. The smart protocol was not prepared to handle such pack...
1
static int add_push_report_sideband_pkt(git_push *push, git_pkt_data *data_pkt, git_buf *data_pkt_buf) { git_pkt *pkt; const char *line, *line_end; size_t line_len; int error; int reading_from_buf = data_pkt_buf->size > 0; if (reading_from_buf) { /* We had an existing partial packet, so add the new * packet...
40,688,963,026,714,930,000,000,000,000,000,000,000
smart_protocol.c
169,851,288,010,794,390,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2016-10129
The Git Smart Protocol support in libgit2 before 0.24.6 and 0.25.x before 0.25.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via an empty packet line.
https://nvd.nist.gov/vuln/detail/CVE-2016-10129
4,398
php-src
77f619d48259383628c3ec4654b1ad578e9eb40e
https://github.com/php/php-src
https://github.com/libgd/libgd/commit/77f619d48259383628c3ec4654b1ad578e9eb40e
None
1
BGD_DECLARE(void) gdImageFillToBorder (gdImagePtr im, int x, int y, int border, int color) { int lastBorder; /* Seek left */ int leftLimit, rightLimit; int i; int restoreAlphaBleding; if (border < 0) { /* Refuse to fill to a non-solid border */ return; } leftLimit = (-1); restoreAlphaBleding =...
239,173,184,754,285,350,000,000,000,000,000,000,000
gd.c
249,258,694,972,014,260,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-9933
Stack consumption vulnerability in the gdImageFillToBorder function in gd.c in the GD Graphics Library (aka libgd) before 2.2.2, as used in PHP before 5.6.28 and 7.x before 7.0.13, allows remote attackers to cause a denial of service (segmentation violation) via a crafted imagefilltoborder call that triggers use of a n...
https://nvd.nist.gov/vuln/detail/CVE-2016-9933
4,399
ImageMagick
63346f34f9d19179599b5b256e5e8d3dda46435c
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/63346f34f9d19179599b5b256e5e8d3dda46435c
None
1
int main( int /*argc*/, char ** argv) { InitializeMagick(*argv); int failures=0; try { string srcdir(""); if(getenv("SRCDIR") != 0) srcdir = getenv("SRCDIR"); list<Image> imageList; readImages( &imageList, srcdir + "test_image_anim.miff" ); Image appended; appendImages( &appe...
11,870,402,558,612,043,000,000,000,000,000,000,000
None
null
[ "CWE-369" ]
CVE-2016-7530
The quantum handling code in ImageMagick allows remote attackers to cause a denial of service (divide-by-zero error or out-of-bounds write) via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2016-7530
4,400
ImageMagick
b5ed738f8060266bf4ae521f7e3ed145aa4498a3
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/b5ed738f8060266bf4ae521f7e3ed145aa4498a3
None
1
MagickExport MagickBooleanType SetQuantumDepth(const Image *image, QuantumInfo *quantum_info,const size_t depth) { size_t extent, quantum; /* Allocate the quantum pixel buffer. */ assert(image != (Image *) NULL); assert(image->signature == MagickSignature); if (image->debug != MagickFalse) ...
198,311,459,592,439,570,000,000,000,000,000,000,000
None
null
[ "CWE-369" ]
CVE-2016-7530
The quantum handling code in ImageMagick allows remote attackers to cause a denial of service (divide-by-zero error or out-of-bounds write) via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2016-7530
4,402
ImageMagick
198fffab4daf8aea88badd9c629350e5b26ec32f
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/198fffab4daf8aea88badd9c629350e5b26ec32f
Added check for bit depth 1.
1
static Image *ReadPSDImage(const ImageInfo *image_info,ExceptionInfo *exception) { Image *image; MagickBooleanType has_merged_image, skip_layers; MagickOffsetType offset; MagickSizeType length; MagickBooleanType status; PSDInfo psd_info; register ssize_t i; ssize_t...
204,504,254,206,595,570,000,000,000,000,000,000,000
psd.c
171,607,370,422,252,440,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2016-7514
The ReadPSDChannelPixels function in coders/psd.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PSD file.
https://nvd.nist.gov/vuln/detail/CVE-2016-7514
4,403
ImageMagick
6f1879d498bcc5cce12fe0c5decb8dbc0f608e5d
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/6f1879d498bcc5cce12fe0c5decb8dbc0f608e5d
Fixed overflow.
1
static MagickBooleanType WriteImageChannels(const PSDInfo *psd_info, const ImageInfo *image_info,Image *image,Image *next_image, const MagickBooleanType separate,ExceptionInfo *exception) { size_t channels, packet_size; unsigned char *compact_pixels; /* Write uncompressed pixels as separate ...
150,687,575,848,649,830,000,000,000,000,000,000,000
psd.c
158,380,458,428,940,300,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2016-7514
The ReadPSDChannelPixels function in coders/psd.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PSD file.
https://nvd.nist.gov/vuln/detail/CVE-2016-7514
4,404
ImageMagick
8f8959033e4e59418d6506b345829af1f7a71127
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/8f8959033e4e59418d6506b345829af1f7a71127
...
1
static Image *ReadSGIImage(const ImageInfo *image_info,ExceptionInfo *exception) { Image *image; MagickBooleanType status; MagickSizeType number_pixels; MemoryInfo *pixel_info; register Quantum *q; register ssize_t i, x; register unsigned char *p; SGIInfo iris_...
9,093,028,214,754,756,000,000,000,000,000,000,000
sgi.c
56,650,646,473,342,340,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2016-7101
The SGI coder in ImageMagick before 7.0.2-10 allows remote attackers to cause a denial of service (out-of-bounds read) via a large row value in an sgi file.
https://nvd.nist.gov/vuln/detail/CVE-2016-7101
4,405
libgd
58b6dde319c301b0eae27d12e2a659e067d80558
https://github.com/libgd/libgd
https://github.com/libgd/libgd/commit/58b6dde319c301b0eae27d12e2a659e067d80558
Fix OOB reads of the TGA decompression buffer It is possible to craft TGA files which will overflow the decompression buffer, but not the image's bitmap. Therefore we also have to check for potential decompression buffer overflows. This issue had been reported by Ibrahim El-Sayed to security@libgd.org; a modified cas...
1
int read_image_tga( gdIOCtx *ctx, oTga *tga ) { int pixel_block_size = (tga->bits / 8); int image_block_size = (tga->width * tga->height) * pixel_block_size; int* decompression_buffer = NULL; unsigned char* conversion_buffer = NULL; int buffer_caret = 0; int bitmap_caret = 0; int i = 0; int encoded_pixels; int...
45,807,417,306,419,930,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2016-6906
The read_image_tga function in gd_tga.c in the GD Graphics Library (aka libgd) before 2.2.4 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted TGA file, related to the decompression buffer.
https://nvd.nist.gov/vuln/detail/CVE-2016-6906
4,407
ImageMagick
3ab016764c7f787829d9065440d86f5609765110
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/3ab016764c7f787829d9065440d86f5609765110
None
1
static MagickBooleanType SkipRGBMipmaps(Image *image,DDSInfo *dds_info, int pixel_size,ExceptionInfo *exception) { MagickOffsetType offset; register ssize_t i; size_t h, w; /* Only skip mipmaps for textures and cube maps */ if (EOFBlob(image) != MagickFalse) { ThrowFileExc...
246,197,186,530,972,530,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2015-8959
coders/dds.c in ImageMagick before 6.9.0-4 Beta allows remote attackers to cause a denial of service (CPU consumption) via a crafted DDS file.
https://nvd.nist.gov/vuln/detail/CVE-2015-8959
4,408
ImageMagick
8ea44b48a182dd46d018f4b4f09a5e2ee9638105
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/8ea44b48a182dd46d018f4b4f09a5e2ee9638105
1
static Image *ReadSUNImage(const ImageInfo *image_info,ExceptionInfo *exception) { #define RMT_EQUAL_RGB 1 #define RMT_NONE 0 #define RMT_RAW 2 #define RT_STANDARD 1 #define RT_ENCODED 2 #define RT_FORMAT_RGB 3 typedef struct _SUNInfo { unsigned int magic, width, height, depth, ...
185,822,657,637,374,900,000,000,000,000,000,000,000
sun.c
276,234,285,718,895,500,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2015-8958
coders/sun.c in ImageMagick before 6.9.0-4 Beta allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted SUN file.
https://nvd.nist.gov/vuln/detail/CVE-2015-8958
4,409
ImageMagick
1aa0c6dab6dcef4d9bc3571866ae1c1ddbec7d8f
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/1aa0c6dab6dcef4d9bc3571866ae1c1ddbec7d8f
1
static Image *ReadSUNImage(const ImageInfo *image_info,ExceptionInfo *exception) { #define RMT_EQUAL_RGB 1 #define RMT_NONE 0 #define RMT_RAW 2 #define RT_STANDARD 1 #define RT_ENCODED 2 #define RT_FORMAT_RGB 3 typedef struct _SUNInfo { unsigned int magic, width, height, depth, ...
72,822,587,876,171,710,000,000,000,000,000,000,000
sun.c
243,858,115,172,867,770,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2015-8958
coders/sun.c in ImageMagick before 6.9.0-4 Beta allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted SUN file.
https://nvd.nist.gov/vuln/detail/CVE-2015-8958
4,410
ImageMagick
6b4aff0f117b978502ee5bcd6e753c17aec5a961
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/6b4aff0f117b978502ee5bcd6e753c17aec5a961
1
static Image *ReadSUNImage(const ImageInfo *image_info,ExceptionInfo *exception) { #define RMT_EQUAL_RGB 1 #define RMT_NONE 0 #define RMT_RAW 2 #define RT_STANDARD 1 #define RT_ENCODED 2 #define RT_FORMAT_RGB 3 typedef struct _SUNInfo { unsigned int magic, width, height, depth, ...
100,062,307,657,952,780,000,000,000,000,000,000,000
sun.c
337,243,953,370,380,560,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2015-8958
coders/sun.c in ImageMagick before 6.9.0-4 Beta allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted SUN file.
https://nvd.nist.gov/vuln/detail/CVE-2015-8958
4,411
ImageMagick
78f82d9d1c2944725a279acd573a22168dc6e22a
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/78f82d9d1c2944725a279acd573a22168dc6e22a
http://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=26838
1
static Image *ReadSUNImage(const ImageInfo *image_info,ExceptionInfo *exception) { #define RMT_EQUAL_RGB 1 #define RMT_NONE 0 #define RMT_RAW 2 #define RT_STANDARD 1 #define RT_ENCODED 2 #define RT_FORMAT_RGB 3 typedef struct _SUNInfo { unsigned int magic, width, height, depth, ...
317,374,088,228,359,770,000,000,000,000,000,000,000
sun.c
157,334,686,057,961,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2015-8957
Buffer overflow in ImageMagick before 6.9.0-4 Beta allows remote attackers to cause a denial of service (application crash) via a crafted SUN file.
https://nvd.nist.gov/vuln/detail/CVE-2015-8957
4,417
pgbouncer
edab5be6665b9e8de66c25ba527509b229468573
https://github.com/pgbouncer/pgbouncer
https://github.com/pgbouncer/pgbouncer/commit/edab5be6665b9e8de66c25ba527509b229468573
Check if auth_user is set. Fixes a crash if password packet appears before startup packet (#42).
1
static bool check_client_passwd(PgSocket *client, const char *passwd) { char md5[MD5_PASSWD_LEN + 1]; const char *correct; PgUser *user = client->auth_user; /* disallow empty passwords */ if (!*passwd || !*user->passwd) return false; switch (cf_auth_type) { case AUTH_PLAIN: return strcmp(user->passwd...
262,462,810,635,753,940,000,000,000,000,000,000,000
client.c
203,590,908,184,515,350,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2015-4054
PgBouncer before 1.5.5 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) by sending a password packet before a startup packet.
https://nvd.nist.gov/vuln/detail/CVE-2015-4054
4,420
abrt
4f2c1ddd3e3b81d2d5146b883115371f1cada9f9
https://github.com/abrt/abrt
https://github.com/abrt/abrt/commit/4f2c1ddd3e3b81d2d5146b883115371f1cada9f9
ccpp: do not read data from root directories Users are allowed to modify /proc/[pid]/root to any directory by running their own MOUNT namespace. Related: #1211835 Signed-off-by: Jakub Filak <jfilak@redhat.com>
1
int main(int argc, char** argv) { /* Kernel starts us with all fd's closed. * But it's dangerous: * fprintf(stderr) can dump messages into random fds, etc. * Ensure that if any of fd 0,1,2 is closed, we open it to /dev/null. */ int fd = xopen("/dev/null", O_RDWR); while (fd < 2) fd = xd...
119,288,858,394,488,250,000,000,000,000,000,000,000
None
null
[ "CWE-59" ]
CVE-2015-3315
Automatic Bug Reporting Tool (ABRT) allows local users to read, change the ownership of, or have other unspecified impact on arbitrary files via a symlink attack on (1) /var/tmp/abrt/*/maps, (2) /tmp/jvm-*/hs_error.log, (3) /proc/*/exe, (4) /etc/os-release in a chroot, or (5) an unspecified root directory related to li...
https://nvd.nist.gov/vuln/detail/CVE-2015-3315
4,423
abrt
d6e2f6f128cef4c21cb80941ae674c9842681aa7
https://github.com/abrt/abrt
https://github.com/abrt/abrt/commit/d6e2f6f128cef4c21cb80941ae674c9842681aa7
ccpp: open file for dump_fd_info with O_EXCL To avoid possible races. Related: #1211835 Signed-off-by: Jakub Filak <jfilak@redhat.com>
1
static bool dump_fd_info(const char *dest_filename, char *source_filename, int source_base_ofs, uid_t uid, gid_t gid) { FILE *fp = fopen(dest_filename, "w"); if (!fp) return false; unsigned fd = 0; while (fd <= 99999) /* paranoia check */ { sprintf(source_filename + source_base...
242,345,425,049,513,960,000,000,000,000,000,000,000
abrt-hook-ccpp.c
332,533,851,336,417,600,000,000,000,000,000,000,000
[ "CWE-59" ]
CVE-2015-3315
Automatic Bug Reporting Tool (ABRT) allows local users to read, change the ownership of, or have other unspecified impact on arbitrary files via a symlink attack on (1) /var/tmp/abrt/*/maps, (2) /tmp/jvm-*/hs_error.log, (3) /proc/*/exe, (4) /etc/os-release in a chroot, or (5) an unspecified root directory related to li...
https://nvd.nist.gov/vuln/detail/CVE-2015-3315
4,438
linux
f106eee10038c2ee5b6056aaf3f6d5229be6dcdd
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/f106eee10038c2ee5b6056aaf3f6d5229be6dcdd
pids: fix fork_idle() to setup ->pids correctly copy_process(pid => &init_struct_pid) doesn't do attach_pid/etc. It shouldn't, but this means that the idle threads run with the wrong pids copied from the caller's task_struct. In x86 case the caller is either kernel_init() thread or keventd. In particular, this means...
1
struct task_struct * __cpuinit fork_idle(int cpu) { struct task_struct *task; struct pt_regs regs; task = copy_process(CLONE_VM, 0, idle_regs(&regs), 0, NULL, &init_struct_pid, 0); if (!IS_ERR(task)) init_idle(task, cpu); return task; }
331,334,078,248,499,600,000,000,000,000,000,000,000
fork.c
192,604,631,227,405,160,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2010-5328
include/linux/init_task.h in the Linux kernel before 2.6.35 does not prevent signals with a process group ID of zero from reaching the swapper process, which allows local users to cause a denial of service (system crash) by leveraging access to this process group.
https://nvd.nist.gov/vuln/detail/CVE-2010-5328
4,439
librsvg
f9d69eadd2b16b00d1a1f9f286122123f8e547dd
https://github.com/GNOME/librsvg
https://github.com/ImageMagick/librsvg/commit/f9d69eadd2b16b00d1a1f9f286122123f8e547dd
Fixed possible credentials leaking reported by Alex Birsan.
1
_rsvg_io_get_file_path (const gchar * filename, const gchar * base_uri) { gchar *absolute_filename; if (g_file_test (filename, G_FILE_TEST_EXISTS) || g_path_is_absolute (filename)) { absolute_filename = g_strdup (filename); } else { gchar *tmpcdir; gcha...
330,502,157,723,936,650,000,000,000,000,000,000,000
rsvg-io.c
108,187,284,530,270,120,000,000,000,000,000,000,000
[ "CWE-522" ]
CVE-2018-1000041
GNOME librsvg version before commit c6ddf2ed4d768fd88adbea2b63f575cd523022ea contains a Improper input validation vulnerability in rsvg-io.c that can result in the victim's Windows username and NTLM password hash being leaked to remote attackers through SMB. This attack appear to be exploitable via The victim must proc...
https://nvd.nist.gov/vuln/detail/CVE-2018-1000041
4,440
keepalived
5241e4d7b177d0b6f073cfc9ed5444bf51ec89d6
https://github.com/acassen/keepalived
https://github.com/acassen/keepalived/commit/5241e4d7b177d0b6f073cfc9ed5444bf51ec89d6
Fix compile warning introduced in commit c6247a9 Commit c6247a9 - "Add command line and configuration option to set umask" introduced a compile warning, although the code would have worked OK. Signed-off-by: Quentin Armitage <quentin@armitage.org.uk>
1
set_umask(const char *optarg) { long umask_long; mode_t umask_val; char *endptr; umask_long = strtoll(optarg, &endptr, 0); if (*endptr || umask_long < 0 || umask_long & ~0777L) { fprintf(stderr, "Invalid --umask option %s", optarg); return; } umask_val = umask_long & 0777; umask(umask_val); umask...
244,254,477,401,396,200,000,000,000,000,000,000,000
main.c
146,439,141,467,785,800,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2018-19045
keepalived 2.0.8 used mode 0666 when creating new temporary files upon a call to PrintData or PrintStats, potentially leaking sensitive information.
https://nvd.nist.gov/vuln/detail/CVE-2018-19045
4,441
linux
2a3f93459d689d990b3ecfbe782fec89b97d3279
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/2a3f93459d689d990b3ecfbe782fec89b97d3279
arm64: KVM: Sanitize PSTATE.M when being set from userspace Not all execution modes are valid for a guest, and some of them depend on what the HW actually supports. Let's verify that what userspace provides is compatible with both the VM settings and the HW capabilities. Cc: <stable@vger.kernel.org> Fixes: 0d854a60b1...
1
static int set_core_reg(struct kvm_vcpu *vcpu, const struct kvm_one_reg *reg) { __u32 __user *uaddr = (__u32 __user *)(unsigned long)reg->addr; struct kvm_regs *regs = vcpu_gp_regs(vcpu); int nr_regs = sizeof(*regs) / sizeof(__u32); __uint128_t tmp; void *valp = &tmp; u64 off; int err = 0; /* Our ID is an inde...
103,022,671,665,194,350,000,000,000,000,000,000,000
guest.c
236,591,481,754,431,170,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2018-18021
arch/arm64/kvm/guest.c in KVM in the Linux kernel before 4.18.12 on the arm64 platform mishandles the KVM_SET_ON_REG ioctl. This is exploitable by attackers who can create virtual machines. An attacker can arbitrarily redirect the hypervisor flow of control (with full register control). An attacker can also cause a den...
https://nvd.nist.gov/vuln/detail/CVE-2018-18021
4,442
git
1a7fd1fb2998002da6e9ff2ee46e1bdd25ee8404
https://github.com/git/git
https://github.com/git/git/commit/1a7fd1fb2998002da6e9ff2ee46e1bdd25ee8404
fsck: detect submodule paths starting with dash As with urls, submodule paths with dashes are ignored by git, but may end up confusing older versions. Detecting them via fsck lets us prevent modern versions of git from being a vector to spread broken .gitmodules to older versions. Compared to blocking leading-dash ur...
1
static int fsck_gitmodules_fn(const char *var, const char *value, void *vdata) { struct fsck_gitmodules_data *data = vdata; const char *subsection, *key; int subsection_len; char *name; if (parse_config_key(var, "submodule", &subsection, &subsection_len, &key) < 0 || !subsection) return 0; name = xmemdup...
157,706,953,577,909,880,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2018-17456
Git before 2.14.5, 2.15.x before 2.15.3, 2.16.x before 2.16.5, 2.17.x before 2.17.2, 2.18.x before 2.18.1, and 2.19.x before 2.19.1 allows remote code execution during processing of a recursive "git clone" of a superproject if a .gitmodules file has a URL field beginning with a '-' character.
https://nvd.nist.gov/vuln/detail/CVE-2018-17456
4,443
ImageMagick
16916c8979c32765c542e216b31cee2671b7afe7
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/16916c8979c32765c542e216b31cee2671b7afe7
https://github.com/ImageMagick/ImageMagick/issues/1269
1
static Image *ReadDCMImage(const ImageInfo *image_info,ExceptionInfo *exception) { #define ThrowDCMException(exception,message) \ { \ if (info.scale != (Quantum *) NULL) \ info.scale=(Quantum *) RelinquishMagickMemory(info.scale); \ if (data != (unsigned char *) NULL) \ data=(unsigned char *) RelinquishMagi...
166,974,640,597,951,750,000,000,000,000,000,000,000
dcm.c
271,804,267,068,497,900,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2018-16644
There is a missing check for length in the functions ReadDCMImage of coders/dcm.c and ReadPICTImage of coders/pict.c in ImageMagick 7.0.8-11, which allows remote attackers to cause a denial of service via a crafted image.
https://nvd.nist.gov/vuln/detail/CVE-2018-16644
4,444
radare2
b35530fa0681b27eba084de5527037ebfb397422
https://github.com/radare/radare2
https://github.com/radare/radare2/commit/b35530fa0681b27eba084de5527037ebfb397422
Fix oobread in avr
1
static OPCODE_DESC* avr_op_analyze(RAnal *anal, RAnalOp *op, ut64 addr, const ut8 *buf, int len, CPU_MODEL *cpu) { OPCODE_DESC *opcode_desc; ut16 ins = (buf[1] << 8) | buf[0]; int fail; char *t; memset (op, 0, sizeof (RAnalOp)); op->ptr = UT64_MAX; op->val = UT64_MAX; op->jump = UT64_MAX; r_strbuf_init (...
238,906,534,179,308,200,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2018-11377
The avr_op_analyze() function in radare2 2.5.0 allows remote attackers to cause a denial of service (heap-based out-of-bounds read and application crash) via a crafted binary file.
https://nvd.nist.gov/vuln/detail/CVE-2018-11377
4,445
libgit2
3f461902dc1072acb8b7607ee65d0a0458ffac2a
https://github.com/libgit2/libgit2
https://github.com/libgit2/libgit2/commit/3f461902dc1072acb8b7607ee65d0a0458ffac2a
delta: fix sign-extension of big left-shift Our delta code was originally adapted from JGit, which itself adapted it from git itself. Due to this heritage, we inherited a bug from git.git in how we compute the delta offset, which was fixed upstream in 48fb7deb5 (Fix big left-shifts of unsigned char, 2009-06-17). As ex...
1
int git_delta_apply( void **out, size_t *out_len, const unsigned char *base, size_t base_len, const unsigned char *delta, size_t delta_len) { const unsigned char *delta_end = delta + delta_len; size_t base_sz, res_sz, alloc_sz; unsigned char *res_dp; *out = NULL; *out_len = 0; /* Check that the base si...
323,670,314,909,050,680,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2018-10887
A flaw was found in libgit2 before version 0.27.3. It has been discovered that an unexpected sign extension in git_delta_apply function in delta.c file may lead to an integer overflow which in turn leads to an out of bound read, allowing to read before the base object. An attacker may use this flaw to leak memory addre...
https://nvd.nist.gov/vuln/detail/CVE-2018-10887
4,446
mbedtls
5224a7544c95552553e2e6be0b4a789956a6464e
https://github.com/ARMmbed/mbedtls
https://github.com/ARMmbed/mbedtls/commit/5224a7544c95552553e2e6be0b4a789956a6464e
Prevent arithmetic overflow on bounds check
1
static int ssl_parse_server_psk_hint( mbedtls_ssl_context *ssl, unsigned char **p, unsigned char *end ) { int ret = MBEDTLS_ERR_SSL_FEATURE_UNAVAILABLE; size_t len; ((void) ssl); /* * PSK parameters: * * opaque ...
9,975,011,487,963,196,000,000,000,000,000,000,000
ssl_cli.c
245,686,137,588,342,770,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-9989
ARM mbed TLS before 2.1.11, before 2.7.2, and before 2.8.0 has a buffer over-read in ssl_parse_server_psk_hint() that could cause a crash on invalid input.
https://nvd.nist.gov/vuln/detail/CVE-2018-9989
4,447
mbedtls
027f84c69f4ef30c0693832a6c396ef19e563ca1
https://github.com/ARMmbed/mbedtls
https://github.com/ARMmbed/mbedtls/commit/027f84c69f4ef30c0693832a6c396ef19e563ca1
Prevent arithmetic overflow on bounds check
1
static int ssl_parse_server_key_exchange( mbedtls_ssl_context *ssl ) { int ret; const mbedtls_ssl_ciphersuite_t *ciphersuite_info = ssl->transform_negotiate->ciphersuite_info; unsigned char *p = NULL, *end = NULL; MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> parse server key exchange" ) ); #if defined(MBED...
216,299,019,030,539,130,000,000,000,000,000,000,000
ssl_cli.c
83,727,931,143,460,710,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-9988
ARM mbed TLS before 2.1.11, before 2.7.2, and before 2.8.0 has a buffer over-read in ssl_parse_server_key_exchange() that could cause a crash on invalid input.
https://nvd.nist.gov/vuln/detail/CVE-2018-9988
4,448
libgit2
3db1af1f370295ad5355b8f64b865a2a357bcac0
https://github.com/libgit2/libgit2
https://github.com/libgit2/libgit2/commit/3db1af1f370295ad5355b8f64b865a2a357bcac0
index: error out on unreasonable prefix-compressed path lengths When computing the complete path length from the encoded prefix-compressed path, we end up just allocating the complete path without ever checking what the encoded path length actually is. This can easily lead to a denial of service by just encoding an un...
1
static int read_entry( git_index_entry **out, size_t *out_size, git_index *index, const void *buffer, size_t buffer_size, const char *last) { size_t path_length, entry_size; const char *path_ptr; struct entry_short source; git_index_entry entry = {{0}}; bool compressed = index->version >= INDEX_VERSION_NUMBE...
285,266,082,278,998,730,000,000,000,000,000,000,000
index.c
148,456,201,620,914,240,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2018-8098
Integer overflow in the index.c:read_entry() function while decompressing a compressed prefix length in libgit2 before v0.26.2 allows an attacker to cause a denial of service (out-of-bounds read) via a crafted repository index file.
https://nvd.nist.gov/vuln/detail/CVE-2018-8098
4,452
suricata
8357ef3f8ffc7d99ef6571350724160de356158b
https://github.com/OISF/suricata
https://github.com/OISF/suricata/commit/8357ef3f8ffc7d99ef6571350724160de356158b
proto/detect: workaround dns misdetected as dcerpc The DCERPC UDP detection would misfire on DNS with transaction ID 0x0400. This would happen as the protocol detection engine gives preference to pattern based detection over probing parsers for performance reasons. This hack/workaround fixes this specific case by sti...
1
AppProto AppLayerProtoDetectGetProto(AppLayerProtoDetectThreadCtx *tctx, Flow *f, uint8_t *buf, uint32_t buflen, uint8_t ipproto, uint8_t direction) { SCEnter(); SCLogDebug("buflen %u for %s direction"...
42,797,380,008,853,400,000,000,000,000,000,000,000
app-layer-detect-proto.c
123,595,736,309,035,860,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2019-1010251
Open Information Security Foundation Suricata prior to version 4.1.2 is affected by: Denial of Service - DNS detection bypass. The impact is: An attacker can evade a signature detection with a specialy formed network packet. The component is: app-layer-detect-proto.c, decode.c, decode-teredo.c and decode-ipv6.c (https:...
https://nvd.nist.gov/vuln/detail/CVE-2019-1010251
4,458
radare2
5411543a310a470b1257fb93273cdd6e8dfcb3af
https://github.com/radare/radare2
https://github.com/radareorg/radare2/commit/5411543a310a470b1257fb93273cdd6e8dfcb3af
More fixes for the CVE-2019-14745
1
static int bin_symbols(RCore *r, int mode, ut64 laddr, int va, ut64 at, const char *name, bool exponly, const char *args) { RBinInfo *info = r_bin_get_info (r->bin); RList *entries = r_bin_get_entries (r->bin); RBinSymbol *symbol; RBinAddr *entry; RListIter *iter; bool firstexp = true; bool printHere = false; i...
135,940,108,812,750,360,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2019-16718
In radare2 before 3.9.0, a command injection vulnerability exists in bin_symbols() in libr/core/cbin.c. By using a crafted executable file, it's possible to execute arbitrary shell commands with the permissions of the victim. This vulnerability is due to an insufficient fix for CVE-2019-14745 and improper handling of s...
https://nvd.nist.gov/vuln/detail/CVE-2019-16718
4,461
ImageMagick6
c5d012a46ae22be9444326aa37969a3f75daa3ba
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick/commit/c5d012a46ae22be9444326aa37969a3f75daa3ba
None
1
MagickExport void *DetachBlob(BlobInfo *blob_info) { void *data; assert(blob_info != (BlobInfo *) NULL); if (blob_info->debug != MagickFalse) (void) LogMagickEvent(TraceEvent,GetMagickModule(),"..."); if (blob_info->mapped != MagickFalse) { (void) UnmapBlob(blob_info->data,blob_info->lengt...
280,895,254,590,469,120,000,000,000,000,000,000,000
blob.c
50,762,778,983,390,390,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2019-14980
In ImageMagick 7.x before 7.0.8-42 and 6.x before 6.9.10-42, there is a use after free vulnerability in the UnmapBlob function that allows an attacker to cause a denial of service by sending a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2019-14980
4,462
linux
072684e8c58d17e853f8e8b9f6d9ce2e58d2b036
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/072684e8c58d17e853f8e8b9f6d9ce2e58d2b036
USB: gadget: f_hid: fix deadlock in f_hidg_write() In f_hidg_write() the write_spinlock is acquired before calling usb_ep_queue() which causes a deadlock when dummy_hcd is being used. This is because dummy_queue() callbacks into f_hidg_req_complete() which tries to acquire the same spinlock. This is (part of) the back...
1
static ssize_t f_hidg_write(struct file *file, const char __user *buffer, size_t count, loff_t *offp) { struct f_hidg *hidg = file->private_data; struct usb_request *req; unsigned long flags; ssize_t status = -ENOMEM; if (!access_ok(buffer, count)) return -EFAULT; spin_lock_irqsave(&hidg->write_spinlo...
18,722,974,638,875,233,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2019-14763
In the Linux kernel before 4.16.4, a double-locking error in drivers/usb/dwc3/gadget.c may potentially cause a deadlock with f_hid.
https://nvd.nist.gov/vuln/detail/CVE-2019-14763
4,463
ImageMagick6
1ddcf2e4f28029a888cadef2e757509ef5047ad8
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick/commit/1ddcf2e4f28029a888cadef2e757509ef5047ad8
None
1
MagickExport void RemoveDuplicateLayers(Image **images, ExceptionInfo *exception) { register Image *curr, *next; RectangleInfo bounds; assert((*images) != (const Image *) NULL); assert((*images)->signature == MagickCoreSignature); if ((*images)->debug != MagickFalse) (void) LogMag...
310,600,417,952,627,740,000,000,000,000,000,000,000
layer.c
59,494,479,781,036,230,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2019-13454
ImageMagick 7.0.8-54 Q16 allows Division by Zero in RemoveDuplicateLayers in MagickCore/layer.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-13454
4,465
ImageMagick6
7c2c5ba5b8e3a0b2b82f56c71dfab74ed4006df7
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick/commit/7c2c5ba5b8e3a0b2b82f56c71dfab74ed4006df7
None
1
MagickExport Image *ComplexImages(const Image *images,const ComplexOperator op, ExceptionInfo *exception) { #define ComplexImageTag "Complex/Image" CacheView *Ai_view, *Ar_view, *Bi_view, *Br_view, *Ci_view, *Cr_view; const char *artifact; const Image *Ai_image, *Ar_image...
215,062,495,765,014,500,000,000,000,000,000,000,000
fourier.c
226,470,859,563,935,540,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-13391
In ImageMagick 7.0.8-50 Q16, ComplexImages in MagickCore/fourier.c has a heap-based buffer over-read because of incorrect calls to GetCacheViewVirtualPixels.
https://nvd.nist.gov/vuln/detail/CVE-2019-13391
4,466
ImageMagick6
4a334bbf5584de37c6f5a47c380a531c8c4b140a
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick/commit/4a334bbf5584de37c6f5a47c380a531c8c4b140a
None
1
WandExport MagickBooleanType MogrifyImageList(ImageInfo *image_info, const int argc,const char **argv,Image **images,ExceptionInfo *exception) { const char *option; ImageInfo *mogrify_info; MagickStatusType status; PixelInterpolateMethod interpolate_method; QuantizeInfo *quantize_info...
261,737,277,868,569,700,000,000,000,000,000,000,000
mogrify.c
267,856,201,129,586,840,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2019-13311
ImageMagick 7.0.8-50 Q16 has memory leaks at AcquireMagickMemory because of a wand/mogrify.c error.
https://nvd.nist.gov/vuln/detail/CVE-2019-13311
4,468
ImageMagick6
5f21230b657ccd65452dd3d94c5b5401ba691a2d
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d
None
1
WandExport MagickBooleanType MogrifyImageList(ImageInfo *image_info, const int argc,const char **argv,Image **images,ExceptionInfo *exception) { const char *option; ImageInfo *mogrify_info; MagickStatusType status; PixelInterpolateMethod interpolate_method; QuantizeInfo *quantize_info...
56,586,835,940,470,490,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2019-13310
ImageMagick 7.0.8-50 Q16 has memory leaks at AcquireMagickMemory because of an error in MagickWand/mogrify.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-13310
4,469
ImageMagick6
5f21230b657ccd65452dd3d94c5b5401ba691a2d
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d
None
1
WandPrivate MagickBooleanType CLIListOperatorImages(MagickCLI *cli_wand, const char *option,const char *arg1n,const char *arg2n) { const char /* percent escaped versions of the args */ *arg1, *arg2; Image *new_images; MagickStatusType status; ssize_t parse; #define _image_info (...
154,589,151,942,532,500,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2019-13310
ImageMagick 7.0.8-50 Q16 has memory leaks at AcquireMagickMemory because of an error in MagickWand/mogrify.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-13310
4,470
ImageMagick6
61135001a625364e29bdce83832f043eebde7b5a
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick/commit/61135001a625364e29bdce83832f043eebde7b5a
None
1
MagickExport Image *ComplexImages(const Image *images,const ComplexOperator op, ExceptionInfo *exception) { #define ComplexImageTag "Complex/Image" CacheView *Ai_view, *Ar_view, *Bi_view, *Br_view, *Ci_view, *Cr_view; const char *artifact; const Image *Ai_image, *Ar_image...
19,704,003,200,428,535,000,000,000,000,000,000,000
fourier.c
339,766,886,036,792,560,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2019-13308
ImageMagick 7.0.8-50 Q16 has a heap-based buffer overflow in MagickCore/fourier.c in ComplexImage.
https://nvd.nist.gov/vuln/detail/CVE-2019-13308
4,472
ImageMagick6
025e77fcb2f45b21689931ba3bf74eac153afa48
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick/commit/025e77fcb2f45b21689931ba3bf74eac153afa48
None
1
static PixelChannels **AcquirePixelThreadSet(const Image *images) { const Image *next; PixelChannels **pixels; register ssize_t i; size_t columns, number_threads; number_threads=(size_t) GetMagickResourceLimit(ThreadResource); pixels=(PixelChannels **) AcquireQuantumMemory(number...
278,819,893,071,001,940,000,000,000,000,000,000,000
statistic.c
80,018,803,613,585,420,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2019-13307
ImageMagick 7.0.8-50 Q16 has a heap-based buffer overflow at MagickCore/statistic.c in EvaluateImages because of mishandling rows.
https://nvd.nist.gov/vuln/detail/CVE-2019-13307
4,473
ImageMagick6
a906fe9298bf89e01d5272023db687935068849a
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick/commit/a906fe9298bf89e01d5272023db687935068849a
None
1
static PixelChannels **AcquirePixelThreadSet(const Image *image) { PixelChannels **pixels; register ssize_t i; size_t number_threads; number_threads=(size_t) GetMagickResourceLimit(ThreadResource); pixels=(PixelChannels **) AcquireQuantumMemory(number_threads, sizeof(*pixels)); ...
62,466,630,452,413,280,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2019-13300
ImageMagick 7.0.8-50 Q16 has a heap-based buffer overflow at MagickCore/statistic.c in EvaluateImages because of mishandling columns.
https://nvd.nist.gov/vuln/detail/CVE-2019-13300
4,474
ImageMagick6
604588fc35c7585abb7a9e71f69bb82e4389fefc
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick/commit/604588fc35c7585abb7a9e71f69bb82e4389fefc
None
1
MagickExport Image *AdaptiveThresholdImage(const Image *image, const size_t width,const size_t height,const double bias, ExceptionInfo *exception) { #define AdaptiveThresholdImageTag "AdaptiveThreshold/Image" CacheView *image_view, *threshold_view; Image *threshold_image; MagickBooleanType ...
212,875,349,161,019,100,000,000,000,000,000,000,000
threshold.c
148,404,985,148,536,100,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-13297
ImageMagick 7.0.8-50 Q16 has a heap-based buffer over-read at MagickCore/threshold.c in AdaptiveThresholdImage because a height of zero is mishandled.
https://nvd.nist.gov/vuln/detail/CVE-2019-13297
4,475
ImageMagick
55e6dc49f1a381d9d511ee2f888fdc3e3c3e3953
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick6/commit/55e6dc49f1a381d9d511ee2f888fdc3e3c3e3953
None
1
MagickExport Image *AdaptiveThresholdImage(const Image *image, const size_t width,const size_t height,const ssize_t offset, ExceptionInfo *exception) { #define ThresholdImageTag "Threshold/Image" CacheView *image_view, *threshold_view; Image *threshold_image; MagickBooleanType status; M...
327,060,304,646,736,800,000,000,000,000,000,000,000
threshold.c
92,873,204,867,266,100,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-13295
ImageMagick 7.0.8-50 Q16 has a heap-based buffer over-read at MagickCore/threshold.c in AdaptiveThresholdImage because a width of zero is mishandled.
https://nvd.nist.gov/vuln/detail/CVE-2019-13295
4,476
ImageMagick
1e59b29e520d2beab73e8c78aacd5f1c0d76196d
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick6/commit/1e59b29e520d2beab73e8c78aacd5f1c0d76196d
None
1
static Image *ReadCUTImage(const ImageInfo *image_info,ExceptionInfo *exception) { #define ThrowCUTReaderException(severity,tag) \ { \ if (palette != NULL) \ palette=DestroyImage(palette); \ if (clone_info != NULL) \ clone_info=DestroyImageInfo(clone_info); \ ThrowReaderException(severity,tag); \ } Ima...
261,271,325,794,813,800,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2019-13135
ImageMagick before 7.0.8-50 has a "use of uninitialized value" vulnerability in the function ReadCUTImage in coders/cut.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-13135
4,482
miniupnp
86030db849260dd8fb2ed975b9890aef1b62b692
https://github.com/miniupnp/miniupnp
https://github.com/miniupnp/miniupnp/commit/86030db849260dd8fb2ed975b9890aef1b62b692
fix error from commit 13585f15c7f7dc28bbbba1661efb280d530d114c
1
GetOutboundPinholeTimeout(struct upnphttp * h, const char * action, const char * ns) { int r; static const char resp[] = "<u:%sResponse " "xmlns:u=\"%s\">" "<OutboundPinholeTimeout>%d</OutboundPinholeTimeout>" "</u:%sResponse>"; char body[512]; int bodylen; struct NameValueParserData data; char * int_ip...
189,077,583,638,678,540,000,000,000,000,000,000,000
upnpsoap.c
43,985,210,412,667,610,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2019-12109
A Denial Of Service vulnerability in MiniUPnP MiniUPnPd through 2.1 exists due to a NULL pointer dereference in GetOutboundPinholeTimeout in upnpsoap.c for rem_port.
https://nvd.nist.gov/vuln/detail/CVE-2019-12109
4,483
linux
6b3a707736301c2128ca85ce85fb13f60b5e350a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6b3a707736301c2128ca85ce85fb13f60b5e350a
Merge branch 'page-refs' (page ref overflow) Merge page ref overflow branch. Jann Horn reported that he can overflow the page ref count with sufficient memory (and a filesystem that is intentionally extremely slow). Admittedly it's not exactly easy. To have more than four billion references to a page requires a min...
1
static ssize_t fuse_dev_splice_write(struct pipe_inode_info *pipe, struct file *out, loff_t *ppos, size_t len, unsigned int flags) { unsigned nbuf; unsigned idx; struct pipe_buffer *bufs; struct fuse_copy_state cs; struct fuse_dev *fud; size_t rem; ssize_t ret; fud = fuse_get_dev(out); if (!...
86,844,860,026,443,000,000,000,000,000,000,000,000
dev.c
146,766,077,963,326,700,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2019-11487
The Linux kernel before 5.1-rc5 allows page->_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur w...
https://nvd.nist.gov/vuln/detail/CVE-2019-11487
4,484
linux
6b3a707736301c2128ca85ce85fb13f60b5e350a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6b3a707736301c2128ca85ce85fb13f60b5e350a
Merge branch 'page-refs' (page ref overflow) Merge page ref overflow branch. Jann Horn reported that he can overflow the page ref count with sufficient memory (and a filesystem that is intentionally extremely slow). Admittedly it's not exactly easy. To have more than four billion references to a page requires a min...
1
void generic_pipe_buf_get(struct pipe_inode_info *pipe, struct pipe_buffer *buf) { get_page(buf->page); }
312,685,732,251,810,900,000,000,000,000,000,000,000
pipe.c
102,189,005,623,994,540,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2019-11487
The Linux kernel before 5.1-rc5 allows page->_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur w...
https://nvd.nist.gov/vuln/detail/CVE-2019-11487
4,487
linux
6b3a707736301c2128ca85ce85fb13f60b5e350a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6b3a707736301c2128ca85ce85fb13f60b5e350a
Merge branch 'page-refs' (page ref overflow) Merge page ref overflow branch. Jann Horn reported that he can overflow the page ref count with sufficient memory (and a filesystem that is intentionally extremely slow). Admittedly it's not exactly easy. To have more than four billion references to a page requires a min...
1
static void buffer_pipe_buf_get(struct pipe_inode_info *pipe, struct pipe_buffer *buf) { struct buffer_ref *ref = (struct buffer_ref *)buf->private; ref->ref++; }
60,451,291,240,657,920,000,000,000,000,000,000,000
trace.c
20,504,281,239,694,024,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2019-11487
The Linux kernel before 5.1-rc5 allows page->_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur w...
https://nvd.nist.gov/vuln/detail/CVE-2019-11487
4,496
FFmpeg
1f686d023b95219db933394a7704ad9aa5f01cbb
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/1f686d023b95219db933394a7704ad9aa5f01cbb
avcodec/mpeg4videodec: Clear interlaced_dct for studio profile Fixes: Out of array access Fixes: 13090/clusterfuzz-testcase-minimized-ffmpeg_AV_CODEC_ID_MPEG4_fuzzer-5408668986638336 Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/projects/ffmpeg Reviewed-by: Kieran Kunhya <kierank...
1
static int decode_studio_vop_header(Mpeg4DecContext *ctx, GetBitContext *gb) { MpegEncContext *s = &ctx->m; if (get_bits_left(gb) <= 32) return 0; s->partitioned_frame = 0; s->decode_mb = mpeg4_decode_studio_mb; decode_smpte_tc(ctx, gb); skip_bits(gb, 10); /* temporal_reference...
204,823,687,192,060,740,000,000,000,000,000,000,000
mpeg4videodec.c
311,209,441,877,484,500,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-11339
The studio profile decoder in libavcodec/mpeg4videodec.c in FFmpeg 4.0 before 4.0.4 and 4.1 before 4.1.2 allows remote attackers to cause a denial of service (out-of-array access) or possibly have unspecified other impact via crafted MPEG-4 video data.
https://nvd.nist.gov/vuln/detail/CVE-2019-11339
4,497
ImageMagick
07eebcd72f45c8fd7563d3f9ec5d2bed48f65f36
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/07eebcd72f45c8fd7563d3f9ec5d2bed48f65f36
...
1
MagickExport int LocaleLowercase(const int c) { #if defined(MAGICKCORE_LOCALE_SUPPORT) if (c_locale != (locale_t) NULL) return(tolower_l(c,c_locale)); #endif return(tolower(c)); }
44,140,332,928,912,330,000,000,000,000,000,000,000
locale.c
259,207,606,297,916,680,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-10714
LocaleLowercase in MagickCore/locale.c in ImageMagick before 7.0.8-32 allows out-of-bounds access, leading to a SIGSEGV.
https://nvd.nist.gov/vuln/detail/CVE-2019-10714
4,499
ImageMagick
58d9c46929ca0828edde34d263700c3a5fe8dc3c
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/58d9c46929ca0828edde34d263700c3a5fe8dc3c
...
1
MagickExport int LocaleLowercase(const int c) { if (c < 0) return(c); #if defined(MAGICKCORE_LOCALE_SUPPORT) if (c_locale != (locale_t) NULL) return(tolower_l((int) ((unsigned char) c),c_locale)); #endif return(tolower((int) ((unsigned char) c))); }
281,269,707,960,595,000,000,000,000,000,000,000,000
locale.c
280,458,419,050,800,300,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-10714
LocaleLowercase in MagickCore/locale.c in ImageMagick before 7.0.8-32 allows out-of-bounds access, leading to a SIGSEGV.
https://nvd.nist.gov/vuln/detail/CVE-2019-10714
4,510
openjpeg
5d00b719f4b93b1445e6fb4c766b9a9883c57949
https://github.com/uclouvain/openjpeg
https://github.com/uclouvain/openjpeg/commit/5d00b719f4b93b1445e6fb4c766b9a9883c57949
[trunk] fixed a buffer overflow in opj_tcd_init_decode_tile Update issue 431
1
void opj_get_all_encoding_parameters( const opj_image_t *p_image, const opj_cp_t *p_cp, OPJ_UINT32 tileno, OPJ_INT32 * p_tx0, OPJ_INT32 * p_tx1, ...
279,071,337,625,763,900,000,000,000,000,000,000,000
pi.c
61,290,128,435,409,710,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2018-20847
An improper computation of p_tx0, p_tx1, p_ty0 and p_ty1 in the function opj_get_encoding_parameters in openjp2/pi.c in OpenJPEG through 2.3.0 can lead to an integer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2018-20847
4,511
linux
5c25f65fd1e42685f7ccd80e0621829c105785d9
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/5c25f65fd1e42685f7ccd80e0621829c105785d9
tun: allow positive return values on dev_get_valid_name() call If the name argument of dev_get_valid_name() contains "%d", it will try to assign it a unit number in __dev__alloc_name() and return either the unit number (>= 0) or an error code (< 0). Considering positive values as error values prevent tun device creati...
1
static int tun_set_iff(struct net *net, struct file *file, struct ifreq *ifr) { struct tun_struct *tun; struct tun_file *tfile = file->private_data; struct net_device *dev; int err; if (tfile->detached) return -EINVAL; dev = __dev_get_by_name(net, ifr->ifr_name); if (dev) { if (ifr->ifr_flags & IFF_TUN_EXC...
55,157,606,478,905,350,000,000,000,000,000,000,000
tun.c
129,036,952,106,696,010,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2018-7191
In the tun subsystem in the Linux kernel before 4.13.14, dev_get_valid_name is not called before register_netdevice. This allows local users to cause a denial of service (NULL pointer dereference and panic) via an ioctl(TUNSETIFF) call with a dev name containing a / character. This is similar to CVE-2013-4343.
https://nvd.nist.gov/vuln/detail/CVE-2018-7191
4,694
Chrome
7d8cefdf6d0e457b7a855c9503684f1058c2a356
https://github.com/chromium/chromium
https://github.com/chromium/chromium/commit/7d8cefdf6d0e457b7a855c9503684f1058c2a356
None
1
WebGLObject::WebGLObject(WebGLRenderingContext* context) : m_object(0) , m_attachmentCount(0) , m_deleted(false) { }
113,581,393,010,610,800,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-3916
Google Chrome before 16.0.912.63 does not properly handle PDF cross references, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.
https://nvd.nist.gov/vuln/detail/CVE-2011-3916
4,803
Chrome
d662b905d30cec7899bbb15140dcfacd73506167
https://github.com/chromium/chromium
https://github.com/chromium/chromium/commit/d662b905d30cec7899bbb15140dcfacd73506167
None
1
BlockedPluginInfoBarDelegate::BlockedPluginInfoBarDelegate( TabContents* tab_contents, const string16& utf16_name) : PluginInfoBarDelegate(tab_contents, utf16_name) { UserMetrics::RecordAction(UserMetricsAction("BlockedPluginInfobar.Shown")); std::string name = UTF16ToUTF8(utf16_name); if (name == web...
129,354,267,864,543,600,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2011-2836
Google Chrome before 14.0.835.163 does not require Infobar interaction before use of the Windows Media Player plug-in, which makes it easier for remote attackers to have an unspecified impact via crafted Flash content.
https://nvd.nist.gov/vuln/detail/CVE-2011-2836
4,807
Chrome
d304b5ec1b16766ea2cb552a27dc14df848d6a0e
https://github.com/chromium/chromium
https://github.com/chromium/chromium/commit/d304b5ec1b16766ea2cb552a27dc14df848d6a0e
None
1
void FFmpegVideoDecodeEngine::Initialize( MessageLoop* message_loop, VideoDecodeEngine::EventHandler* event_handler, VideoDecodeContext* context, const VideoDecoderConfig& config) { static const int kDecodeThreads = 2; static const int kMaxDecodeThreads = 16; codec_context_ = avcodec_alloc_contex...
158,059,457,852,489,340,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-2843
Google Chrome before 14.0.835.163 does not properly handle media buffers, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.
https://nvd.nist.gov/vuln/detail/CVE-2011-2843
4,811
Chrome
52dac009556881941c60d378e34867cdb2fd00a0
https://github.com/chromium/chromium
https://github.com/chromium/chromium/commit/52dac009556881941c60d378e34867cdb2fd00a0
None
1
FilePath ExtensionPrefs::GetExtensionPath(const std::string& extension_id) { const DictionaryValue* dict = GetExtensionPref(extension_id); std::string path; if (!dict->GetString(kPrefPath, &path)) return FilePath(); return install_directory_.Append(FilePath::FromWStringHack(UTF8ToWide(path))); }
39,958,822,954,185,000,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-3234
Google Chrome before 14.0.835.163 does not properly handle boxes, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.
https://nvd.nist.gov/vuln/detail/CVE-2011-3234
4,816
Chrome
7155d7caafd2aa1fb822dc5672c90ea446247e8d
https://github.com/chromium/chromium
https://github.com/chromium/chromium/commit/7155d7caafd2aa1fb822dc5672c90ea446247e8d
None
1
void ScaleYUVToRGB32(const uint8* y_buf, const uint8* u_buf, const uint8* v_buf, uint8* rgb_buf, int source_width, int source_height, int width, int height, ...
253,694,277,743,522,000,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-2851
Google Chrome before 14.0.835.163 does not properly handle video, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.
https://nvd.nist.gov/vuln/detail/CVE-2011-2851
4,817
Chrome
d82e91c46938520466e9d7c695e0bc638fc70970
https://github.com/chromium/chromium
https://github.com/chromium/chromium/commit/d82e91c46938520466e9d7c695e0bc638fc70970
None
1
NativeBrowserFrame* NativeBrowserFrame::CreateNativeBrowserFrame( BrowserFrame* browser_frame, BrowserView* browser_view) { if (views::Widget::IsPureViews()) return new BrowserFrameViews(browser_frame, browser_view); return new BrowserFrameGtk(browser_frame, browser_view); }
284,461,539,438,023,930,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2011-2853
Use-after-free vulnerability in Google Chrome before 14.0.835.163 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to plug-in handling.
https://nvd.nist.gov/vuln/detail/CVE-2011-2853
4,819
Chrome
061ddbae1ee31476b57ea44a953970ab2fe8aca1
https://github.com/chromium/chromium
https://github.com/chromium/chromium/commit/061ddbae1ee31476b57ea44a953970ab2fe8aca1
None
1
void DocumentWriter::setDecoder(TextResourceDecoder* decoder) { m_decoder = decoder; }
124,821,018,363,863,960,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2011-2854
Use-after-free vulnerability in Google Chrome before 14.0.835.163 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to "ruby / table style handing."
https://nvd.nist.gov/vuln/detail/CVE-2011-2854
4,820
Chrome
3a766e0115e9799db766a88554b9ab12ee5bf2a4
https://github.com/chromium/chromium
https://github.com/chromium/chromium/commit/3a766e0115e9799db766a88554b9ab12ee5bf2a4
None
1
xmlXPathCompOpEval(xmlXPathParserContextPtr ctxt, xmlXPathStepOpPtr op) { int total = 0; int equal, ret; xmlXPathCompExprPtr comp; xmlXPathObjectPtr arg1, arg2; xmlNodePtr bak; xmlDocPtr bakd; int pp; int cs; CHECK_ERROR0; comp = ctxt->comp; switch (op->op) { case XP...
152,834,258,874,192,350,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2011-2834
Double free vulnerability in libxml2, as used in Google Chrome before 14.0.835.163, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to XPath handling.
https://nvd.nist.gov/vuln/detail/CVE-2011-2834
4,821
Chrome
454434f6100cb6a529652a25b5fc181caa7c7f32
https://github.com/chromium/chromium
https://github.com/chromium/chromium/commit/454434f6100cb6a529652a25b5fc181caa7c7f32
None
1
bool ExtensionService::IsDownloadFromGallery(const GURL& download_url, const GURL& referrer_url) { if (IsDownloadFromMiniGallery(download_url) && StartsWithASCII(referrer_url.spec(), extension_urls::kMiniGalleryBrowsePrefix, false)) { retu...
110,603,712,723,080,350,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2011-2859
Google Chrome before 14.0.835.163 uses incorrect permissions for non-gallery pages, which has unspecified impact and attack vectors.
https://nvd.nist.gov/vuln/detail/CVE-2011-2859
4,822
Chrome
6c390601f9ee3436bb32f84772977570265982ea
https://github.com/chromium/chromium
https://github.com/chromium/chromium/commit/6c390601f9ee3436bb32f84772977570265982ea
None
1
bool ContainerNode::replaceChild(PassRefPtr<Node> newChild, Node* oldChild, ExceptionCode& ec, bool shouldLazyAttach) { ASSERT(refCount() || parentOrHostNode()); RefPtr<Node> protect(this); ec = 0; if (oldChild == newChild) // nothing to do return true; checkReplaceChild(newChild.get(), ...
226,083,901,999,659,320,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2011-2860
Use-after-free vulnerability in Google Chrome before 14.0.835.163 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to table styles.
https://nvd.nist.gov/vuln/detail/CVE-2011-2860
4,829
Chrome
5b65968b6c64fa02e74ca6b965bf5998b911e826
https://github.com/chromium/chromium
https://github.com/chromium/chromium/commit/5b65968b6c64fa02e74ca6b965bf5998b911e826
None
1
bool SubsetterImpl::ResolveCompositeGlyphs(const unsigned int* glyph_ids, size_t glyph_count, IntegerSet* glyph_id_processed) { if (glyph_ids == NULL || glyph_count == 0 || glyph_id_processed == NULL) { return false; } Glyp...
88,383,665,204,444,790,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-2864
Google Chrome before 14.0.835.163 does not properly handle Tibetan characters, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.
https://nvd.nist.gov/vuln/detail/CVE-2011-2864
4,860
Chrome
a64c3cf0ab6da24a9a010a45ebe4794422d40c71
https://github.com/chromium/chromium
https://github.com/chromium/chromium/commit/a64c3cf0ab6da24a9a010a45ebe4794422d40c71
None
1
GURL URLFixerUpper::FixupRelativeFile(const FilePath& base_dir, const FilePath& text) { FilePath old_cur_directory; if (!base_dir.empty()) { file_util::GetCurrentDirectory(&old_cur_directory); file_util::SetCurrentDirectory(base_dir); } FilePath::StringType trimmed...
102,425,623,880,400,520,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2011-2822
Google Chrome before 13.0.782.215 on Windows does not properly parse URLs located on the command line, which has unspecified impact and attack vectors.
https://nvd.nist.gov/vuln/detail/CVE-2011-2822
4,861
Chrome
c9911bc93097a5df5518f5b88e1d5ed5ef275a4d
https://github.com/chromium/chromium
https://github.com/chromium/chromium/commit/c9911bc93097a5df5518f5b88e1d5ed5ef275a4d
None
1
xmlXPathCompOpEvalPositionalPredicate(xmlXPathParserContextPtr ctxt, xmlXPathStepOpPtr op, xmlNodeSetPtr set, int contextSize, int minPos, int maxPos, int hasNsNodes) { if (op->ch1 != -1) { xmlXPathCompExprPtr comp = ctxt->comp; if (comp->steps[op->ch1]....
195,728,010,268,250,480,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2011-2821
Double free vulnerability in libxml2, as used in Google Chrome before 13.0.782.215, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted XPath expression.
https://nvd.nist.gov/vuln/detail/CVE-2011-2821
4,862
Chrome
01e4ee2fda0a5e57a8d0c8cb829022eb84fdff12
https://github.com/chromium/chromium
https://github.com/chromium/chromium/commit/01e4ee2fda0a5e57a8d0c8cb829022eb84fdff12
None
1
static PassRefPtr<CSSValue> getPositionOffsetValue(RenderStyle* style, CSSPropertyID propertyID, RenderView* renderView) { if (!style) return 0; Length l; switch (propertyID) { case CSSPropertyLeft: l = style->left(); break; case CSSPropertyRight: ...
261,655,135,801,417,640,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-2806
Google Chrome before 13.0.782.215 on Windows does not properly handle vertex data, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
https://nvd.nist.gov/vuln/detail/CVE-2011-2806