idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
4,291 | libndp | 2af9a55b38b55abbf05fd116ec097d4029115839 | https://github.com/jpirko/libndp | https://github.com/jpirko/libndp/commit/2af9a55b38b55abbf05fd116ec097d4029115839 | libndb: reject redirect and router advertisements from non-link-local
RFC4861 suggests that these messages should only originate from
link-local addresses in 6.1.2 (RA) and 8.1. (redirect):
Mitigates CVE-2016-3698.
Signed-off-by: Lubomir Rintel <lkundrak@v3.sk>
Signed-off-by: Jiri Pirko <jiri@mellanox.com> | 1 | static bool ndp_msg_check_valid(struct ndp_msg *msg)
{
size_t len = ndp_msg_payload_len(msg);
enum ndp_msg_type msg_type = ndp_msg_type(msg);
if (len < ndp_msg_type_info(msg_type)->raw_struct_size)
return false;
return true;
}
| 263,634,785,860,008,600,000,000,000,000,000,000,000 | libndp.c | 106,315,038,392,236,970,000,000,000,000,000,000,000 | [
"CWE-284"
] | CVE-2016-3698 | libndp before 1.6, as used in NetworkManager, does not properly validate the origin of Neighbor Discovery Protocol (NDP) messages, which allows remote attackers to conduct man-in-the-middle attacks or cause a denial of service (network connectivity disruption) by advertising a node as a router from a non-local network. | https://nvd.nist.gov/vuln/detail/CVE-2016-3698 |
4,322 | linux | 3a8b0677fc6180a467e26cc32ce6b0c09a32f9bb | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/3a8b0677fc6180a467e26cc32ce6b0c09a32f9bb | KVM: VMX: Do not BUG() on out-of-bounds guest IRQ
The value of the guest_irq argument to vmx_update_pi_irte() is
ultimately coming from a KVM_IRQFD API call. Do not BUG() in
vmx_update_pi_irte() if the value is out-of bounds. (Especially,
since KVM as a whole seems to hang after that.)
Instead, print a message only o... | 1 | static int vmx_update_pi_irte(struct kvm *kvm, unsigned int host_irq,
uint32_t guest_irq, bool set)
{
struct kvm_kernel_irq_routing_entry *e;
struct kvm_irq_routing_table *irq_rt;
struct kvm_lapic_irq irq;
struct kvm_vcpu *vcpu;
struct vcpu_data vcpu_info;
int idx, ret = -EINVAL;
if (!kvm_arch_has... | 231,515,050,173,833,580,000,000,000,000,000,000,000 | vmx.c | 59,498,124,009,138,840,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2017-1000252 | The KVM subsystem in the Linux kernel through 4.13.3 allows guest OS users to cause a denial of service (assertion failure, and hypervisor hang or crash) via an out-of bounds guest_irq value, related to arch/x86/kvm/vmx.c and virt/kvm/eventfd.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-1000252 |
4,323 | file | 9611f31313a93aa036389c5f3b15eea53510d4d | https://github.com/file/file | https://github.com/file/file/commit/9611f31313a93aa036389c5f3b15eea53510d4d | Extend build-id reporting to 8-byte IDs that lld can generate (Ed Maste) | 1 | do_bid_note(struct magic_set *ms, unsigned char *nbuf, uint32_t type,
int swap __attribute__((__unused__)), uint32_t namesz, uint32_t descsz,
size_t noff, size_t doff, int *flags)
{
if (namesz == 4 && strcmp((char *)&nbuf[noff], "GNU") == 0 &&
type == NT_GNU_BUILD_ID && (descsz == 16 || descsz == 20)) ... | 309,926,617,047,429,440,000,000,000,000,000,000,000 | readelf.c | 310,659,837,802,899,300,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-1000249 | An issue in file() was introduced in commit 9611f31313a93aa036389c5f3b15eea53510d4d1 (Oct 2016) lets an attacker overwrite a fixed 20 bytes stack buffer with a specially crafted .notes section in an ELF binary. This was fixed in commit 35c94dc6acc418f1ad7f6241a6680e5327495793 (Aug 2017). | https://nvd.nist.gov/vuln/detail/CVE-2017-1000249 |
4,324 | ImageMagick | e04cf3e9524f50ca336253513d977224e083b816 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/e04cf3e9524f50ca336253513d977224e083b816 | None | 1 | static Image *ReadWPGImage(const ImageInfo *image_info,
ExceptionInfo *exception)
{
typedef struct
{
size_t FileId;
MagickOffsetType DataOffset;
unsigned int ProductType;
unsigned int FileType;
unsigned char MajorVersion;
unsigned char MinorVersion;
unsigned int EncryptKey;
unsigne... | 93,853,924,778,718,540,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2017-16546 | The ReadWPGImage function in coders/wpg.c in ImageMagick 7.0.7-9 does not properly validate the colormap index in a WPG palette, which allows remote attackers to cause a denial of service (use of uninitialized data or invalid memory allocation) or possibly have unspecified other impact via a malformed WPG file. | https://nvd.nist.gov/vuln/detail/CVE-2017-16546 |
4,325 | linux | bd998c2e0df0469707503023d50d46cf0b10c787 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/bd998c2e0df0469707503023d50d46cf0b10c787 | USB: serial: console: fix use-after-free on disconnect
A clean-up patch removing two redundant NULL-checks from the console
disconnect handler inadvertently also removed a third check. This could
lead to the struct usb_serial being prematurely freed by the console
code when a driver accepts but does not register any p... | 1 | void usb_serial_console_disconnect(struct usb_serial *serial)
{
if (serial->port[0] == usbcons_info.port) {
usb_serial_console_exit();
usb_serial_put(serial);
}
}
| 5,359,239,449,223,849,000,000,000,000,000,000,000 | console.c | 156,313,628,004,751,300,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2017-16525 | The usb_serial_console_disconnect function in drivers/usb/serial/console.c in the Linux kernel before 4.13.8 allows local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via a crafted USB device, related to disconnection and failed setup. | https://nvd.nist.gov/vuln/detail/CVE-2017-16525 |
4,326 | radare2 | d21e91f075a7a7a8ed23baa5c1bb1fac48313882 | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/d21e91f075a7a7a8ed23baa5c1bb1fac48313882 | Fix #8764 differently since ptr diff might not fit in ptrdiff_t | 1 | static Sdb *store_versioninfo_gnu_verdef(ELFOBJ *bin, Elf_(Shdr) *shdr, int sz) {
const char *section_name = "";
const char *link_section_name = "";
char *end = NULL;
Elf_(Shdr) *link_shdr = NULL;
ut8 dfs[sizeof (Elf_(Verdef))] = {0};
Sdb *sdb;
int cnt, i;
if (shdr->sh_link > bin->ehdr.e_shnum) {
return false... | 177,654,284,276,873,100,000,000,000,000,000,000,000 | elf.c | 150,931,977,046,631,910,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2017-16359 | In radare 2.0.1, a pointer wraparound vulnerability exists in store_versioninfo_gnu_verdef() in libr/bin/format/elf/elf.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-16359 |
4,327 | radare2 | fbaf24bce7ea4211e4608b3ab6c1b45702cb243d | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/fbaf24bce7ea4211e4608b3ab6c1b45702cb243d | Fix #8764 a 3rd time since 2nd time is UB and can be optimized away | 1 | static Sdb *store_versioninfo_gnu_verdef(ELFOBJ *bin, Elf_(Shdr) *shdr, int sz) {
const char *section_name = "";
const char *link_section_name = "";
char *end = NULL;
Elf_(Shdr) *link_shdr = NULL;
ut8 dfs[sizeof (Elf_(Verdef))] = {0};
Sdb *sdb;
int cnt, i;
if (shdr->sh_link > bin->ehdr.e_shnum) {
return false... | 49,750,649,927,320,680,000,000,000,000,000,000,000 | elf.c | 82,792,017,403,717,510,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2017-16359 | In radare 2.0.1, a pointer wraparound vulnerability exists in store_versioninfo_gnu_verdef() in libr/bin/format/elf/elf.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-16359 |
4,328 | linux | 008ba2a13f2d04c947adc536d19debb8fe66f110 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/008ba2a13f2d04c947adc536d19debb8fe66f110 | packet: hold bind lock when rebinding to fanout hook
Packet socket bind operations must hold the po->bind_lock. This keeps
po->running consistent with whether the socket is actually on a ptype
list to receive packets.
fanout_add unbinds a socket and its packet_rcv/tpacket_rcv call, then
binds the fanout object to rec... | 1 | static int fanout_add(struct sock *sk, u16 id, u16 type_flags)
{
struct packet_rollover *rollover = NULL;
struct packet_sock *po = pkt_sk(sk);
struct packet_fanout *f, *match;
u8 type = type_flags & 0xff;
u8 flags = type_flags >> 8;
int err;
switch (type) {
case PACKET_FANOUT_ROLLOVER:
if (type_flags & PACKE... | 161,989,068,850,130,440,000,000,000,000,000,000,000 | af_packet.c | 215,849,604,675,932,100,000,000,000,000,000,000,000 | [
"CWE-362"
] | CVE-2017-15649 | net/packet/af_packet.c in the Linux kernel before 4.13.6 allows local users to gain privileges via crafted system calls that trigger mishandling of packet_fanout data structures, because of a race condition (involving fanout_add and packet_do_bind) that leads to a use-after-free, a different vulnerability than CVE-2017... | https://nvd.nist.gov/vuln/detail/CVE-2017-15649 |
4,329 | ImageMagick | 04a567494786d5bb50894fc8bb8fea0cf496bea8 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/04a567494786d5bb50894fc8bb8fea0cf496bea8 | Slightly different fix for #714 | 1 | static MagickBooleanType ReadPSDLayersInternal(Image *image,
const ImageInfo *image_info,const PSDInfo *psd_info,
const MagickBooleanType skip_layers,ExceptionInfo *exception)
{
char
type[4];
LayerInfo
*layer_info;
MagickSizeType
size;
MagickBooleanType
status;
register ssize_t
i;
... | 272,298,623,691,895,300,000,000,000,000,000,000,000 | psd.c | 10,373,962,997,159,750,000,000,000,000,000,000,000 | [
"CWE-834"
] | CVE-2017-14174 | In coders/psd.c in ImageMagick 7.0.7-0 Q16, a DoS in ReadPSDLayersInternal() due to lack of an EOF (End of File) check might cause huge CPU consumption. When a crafted PSD file, which claims a large "length" field in the header but does not contain sufficient backing data, is provided, the loop over "length" would cons... | https://nvd.nist.gov/vuln/detail/CVE-2017-14174 |
4,333 | tcpdump | a1eefe986065846b6c69dbc09afd9fa1a02c4a3d | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/a1eefe986065846b6c69dbc09afd9fa1a02c4a3d | CVE-2017-13687/CHDLC: Improve bounds and length checks.
Prevent a possible buffer overread in chdlc_print() and replace the
custom check in chdlc_if_print() with a standard check in chdlc_print()
so that the latter certainly does not over-read even when reached via
juniper_chdlc_print(). Add length checks. | 1 | chdlc_print(netdissect_options *ndo, register const u_char *p, u_int length)
{
u_int proto;
proto = EXTRACT_16BITS(&p[2]);
if (ndo->ndo_eflag) {
ND_PRINT((ndo, "%s, ethertype %s (0x%04x), length %u: ",
tok2str(chdlc_cast_values, "0x%02x", p[0]),
t... | 153,136,498,940,710,670,000,000,000,000,000,000,000 | print-chdlc.c | 66,993,649,061,685,280,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-13687 | The Cisco HDLC parser in tcpdump before 4.9.2 has a buffer over-read in print-chdlc.c:chdlc_print(). | https://nvd.nist.gov/vuln/detail/CVE-2017-13687 |
4,334 | ImageMagick | ac23b02ecb741e5de60f5235ea443790c88a0b80 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/ac23b02ecb741e5de60f5235ea443790c88a0b80 | None | 1 | static Image *ReadJP2Image(const ImageInfo *image_info,ExceptionInfo *exception)
{
const char
*option;
Image
*image;
int
jp2_status;
MagickBooleanType
status;
opj_codec_t
*jp2_codec;
opj_codestream_index_t
*codestream_index = (opj_codestream_index_t *) NULL;
opj_dparameters_t... | 147,252,422,061,321,770,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-13145 | In ImageMagick before 6.9.8-8 and 7.x before 7.0.5-9, the ReadJP2Image function in coders/jp2.c does not properly validate the channel geometry, leading to a crash. | https://nvd.nist.gov/vuln/detail/CVE-2017-13145 |
4,337 | tcpdump | 29e5470e6ab84badbc31f4532bb7554a796d9d52 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/29e5470e6ab84badbc31f4532bb7554a796d9d52 | CVE-2017-13028/BOOTP: Add a bounds check before fetching data
This fixes a buffer over-read discovered by Bhargava Shastry,
SecT/TU Berlin.
Add a test using the capture file supplied by the reporter(s), modified
so the capture file won't cause 'tcpdump: pcap_loop: truncated dump file' | 1 | bootp_print(netdissect_options *ndo,
register const u_char *cp, u_int length)
{
register const struct bootp *bp;
static const u_char vm_cmu[4] = VM_CMU;
static const u_char vm_rfc1048[4] = VM_RFC1048;
bp = (const struct bootp *)cp;
ND_TCHECK(bp->bp_op);
ND_PRINT((ndo, "BOOTP/DHCP, %s",
tok2str(bootp_op... | 177,049,373,499,157,830,000,000,000,000,000,000,000 | print-bootp.c | 159,087,126,255,627,960,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-13028 | The BOOTP parser in tcpdump before 4.9.2 has a buffer over-read in print-bootp.c:bootp_print(). | https://nvd.nist.gov/vuln/detail/CVE-2017-13028 |
4,338 | tcpdump | 42073d54c53a496be40ae84152bbfe2c923ac7bc | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/42073d54c53a496be40ae84152bbfe2c923ac7bc | CVE-2017-13004/Juniper: Add a bounds check.
This fixes a buffer over-read discovered by Forcepoint's security
researchers Otto Airamo & Antti Levomäki.
Add tests using the capture files supplied by the reporter(s). | 1 | juniper_parse_header(netdissect_options *ndo,
const u_char *p, const struct pcap_pkthdr *h, struct juniper_l2info_t *l2info)
{
const struct juniper_cookie_table_t *lp = juniper_cookie_table;
u_int idx, jnx_ext_len, jnx_header_len = 0;
uint8_t tlv_type,tlv_len;
uint32_t control_word;... | 47,824,677,361,513,335,000,000,000,000,000,000,000 | print-juniper.c | 285,998,041,224,733,920,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-13004 | The Juniper protocols parser in tcpdump before 4.9.2 has a buffer over-read in print-juniper.c:juniper_parse_header(). | https://nvd.nist.gov/vuln/detail/CVE-2017-13004 |
4,340 | tcpdump | 9be4e0b5938b705e7e36cfcb110a740c6ff0cb97 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/9be4e0b5938b705e7e36cfcb110a740c6ff0cb97 | CVE-2017-13000/IEEE 802.15.4: Add more bounds checks.
While we're at it, add a bunch of macros for the frame control field's
subfields, have the reserved frame types show the frame type value, use
the same code path for processing source and destination addresses
regardless of whether -v was specified (just leave out ... | 1 | ieee802_15_4_if_print(netdissect_options *ndo,
const struct pcap_pkthdr *h, const u_char *p)
{
u_int caplen = h->caplen;
int hdrlen;
uint16_t fc;
uint8_t seq;
if (caplen < 3) {
ND_PRINT((ndo, "[|802.15.4] %x", caplen));
return caplen;
}
fc = EXTRACT_LE_16BITS(p);
hdrlen =... | 180,975,302,766,879,120,000,000,000,000,000,000,000 | print-802_15_4.c | 98,232,657,074,353,910,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-13000 | The IEEE 802.15.4 parser in tcpdump before 4.9.2 has a buffer over-read in print-802_15_4.c:ieee802_15_4_if_print(). | https://nvd.nist.gov/vuln/detail/CVE-2017-13000 |
4,341 | tcpdump | a7e5f58f402e6919ec444a57946bade7dfd6b184 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/a7e5f58f402e6919ec444a57946bade7dfd6b184 | CVE-2017-13000/IEEE 802.15.4: Fix bug introduced by previous fix.
We've already advanced the pointer past the PAN ID, if present; it now
points to the address, so don't add 2 to it.
This fixes a buffer over-read discovered by Forcepoint's security
researchers Otto Airamo & Antti Levomäki.
Add a test using the captur... | 1 | ieee802_15_4_if_print(netdissect_options *ndo,
const struct pcap_pkthdr *h, const u_char *p)
{
u_int caplen = h->caplen;
u_int hdrlen;
uint16_t fc;
uint8_t seq;
uint16_t panid = 0;
if (caplen < 3) {
ND_PRINT((ndo, "[|802.15.4]"));
return caplen;
}
hdrlen = 3;
fc = EXTRACT_LE_16BITS(... | 5,018,917,320,579,555,000,000,000,000,000,000,000 | print-802_15_4.c | 207,302,936,816,742,200,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-13000 | The IEEE 802.15.4 parser in tcpdump before 4.9.2 has a buffer over-read in print-802_15_4.c:ieee802_15_4_if_print(). | https://nvd.nist.gov/vuln/detail/CVE-2017-13000 |
4,342 | tcpdump | 99798bd9a41bd3d03fdc1e949810a38967f20ed3 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/99798bd9a41bd3d03fdc1e949810a38967f20ed3 | CVE-2017-12987/IEEE 802.11: Fix processing of TIM IE.
The arguments to memcpy() were completely wrong.
This fixes a buffer over-read discovered by Kamil Frankowicz.
Add a test using the capture file supplied by Brian 'geeknik' Carpenter. | 1 | parse_elements(netdissect_options *ndo,
struct mgmt_body_t *pbody, const u_char *p, int offset,
u_int length)
{
u_int elementlen;
struct ssid_t ssid;
struct challenge_t challenge;
struct rates_t rates;
struct ds_t ds;
struct cf_t cf;
struct tim_t tim;
/*
* We haven't seen any el... | 52,408,821,725,921,460,000,000,000,000,000,000,000 | print-802_11.c | 182,219,708,019,235,150,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-12987 | The IEEE 802.11 parser in tcpdump before 4.9.2 has a buffer over-read in print-802_11.c:parse_elements(). | https://nvd.nist.gov/vuln/detail/CVE-2017-12987 |
4,343 | tcpdump | c6e0531b5def26ecf912e8de6ade86cbdaed3751 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/c6e0531b5def26ecf912e8de6ade86cbdaed3751 | CVE-2017-12899/DECnet: Fix bounds checking.
If we're skipping over padding before the *real* flags, check whether
the real flags are in the captured data before fetching it. This fixes
a buffer over-read discovered by Kamil Frankowicz.
Note one place where we don't need to do bounds checking as it's already
been don... | 1 | decnet_print(netdissect_options *ndo,
register const u_char *ap, register u_int length,
register u_int caplen)
{
register const union routehdr *rhp;
register int mflags;
int dst, src, hops;
u_int nsplen, pktlen;
const u_char *nspp;
if (length < sizeof(struct shorthdr)) {
ND_PRINT((ndo... | 219,860,692,152,115,800,000,000,000,000,000,000,000 | print-decnet.c | 107,306,623,307,408,510,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-12899 | The DECnet parser in tcpdump before 4.9.2 has a buffer over-read in print-decnet.c:decnet_print(). | https://nvd.nist.gov/vuln/detail/CVE-2017-12899 |
4,345 | tcpdump | f76e7feb41a4327d2b0978449bbdafe98d4a3771 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/f76e7feb41a4327d2b0978449bbdafe98d4a3771 | CVE-2017-12896/ISAKMP: Do bounds checks in isakmp_rfc3948_print().
This fixes a buffer over-read discovered by Kamil Frankowicz.
Add a test using the capture file supplied by the reporter(s). | 1 | isakmp_rfc3948_print(netdissect_options *ndo,
const u_char *bp, u_int length,
const u_char *bp2)
{
if(length == 1 && bp[0]==0xff) {
ND_PRINT((ndo, "isakmp-nat-keep-alive"));
return;
}
if(length < 4) {
goto trunc;
}
/*
* see if this is an IKE packet
*/
if(bp[0]==0 && bp[1]==0 ... | 293,043,745,684,242,200,000,000,000,000,000,000,000 | print-isakmp.c | 16,893,582,496,315,646,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-12896 | The ISAKMP parser in tcpdump before 4.9.2 has a buffer over-read in print-isakmp.c:isakmp_rfc3948_print(). | https://nvd.nist.gov/vuln/detail/CVE-2017-12896 |
4,346 | cyrus-imapd | 53c4137bd924b954432c6c59da7572c4c5ffa901 | https://github.com/cyrusimap/cyrus-imapd | https://github.com/cyrusimap/cyrus-imapd/commit/53c4137bd924b954432c6c59da7572c4c5ffa901 | imapd: check for isadmin BEFORE parsing sync lines | 1 | static void cmdloop(void)
{
int c;
int usinguid, havepartition, havenamespace, recursive;
static struct buf tag, cmd, arg1, arg2, arg3;
char *p, shut[MAX_MAILBOX_PATH+1], cmdname[100];
const char *err;
const char * commandmintimer;
double commandmintimerd = 0.0;
struct sync_reserve_list ... | 200,822,341,397,563,370,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-12843 | Cyrus IMAP before 3.0.3 allows remote authenticated users to write to arbitrary files via a crafted (1) SYNCAPPLY, (2) SYNCGET or (3) SYNCRESTORE command. | https://nvd.nist.gov/vuln/detail/CVE-2017-12843 |
4,347 | linux | 2b04e8f6bbb196cab4b232af0f8d48ff2c7a8058 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/2b04e8f6bbb196cab4b232af0f8d48ff2c7a8058 | more bio_map_user_iov() leak fixes
we need to take care of failure exit as well - pages already
in bio should be dropped by analogue of bio_unmap_pages(),
since their refcounts had been bumped only once per reference
in bio.
Cc: stable@vger.kernel.org
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk> | 1 | struct bio *bio_map_user_iov(struct request_queue *q,
const struct iov_iter *iter,
gfp_t gfp_mask)
{
int j;
int nr_pages = 0;
struct page **pages;
struct bio *bio;
int cur_page = 0;
int ret, offset;
struct iov_iter i;
struct iovec iov;
iov_for_each(iov, i, *iter) {
unsigned long uaddr ... | 75,562,170,872,440,760,000,000,000,000,000,000,000 | bio.c | 188,686,352,710,057,400,000,000,000,000,000,000,000 | [
"CWE-772"
] | CVE-2017-12190 | The bio_map_user_iov and bio_unmap_user functions in block/bio.c in the Linux kernel before 4.13.8 do unbalanced refcounting when a SCSI I/O vector has small consecutive buffers belonging to the same page. The bio_add_pc_page function merges them into one, but the page reference is never dropped. This causes a memory l... | https://nvd.nist.gov/vuln/detail/CVE-2017-12190 |
4,348 | ImageMagick | 83e0f8ffd7eeb7661b0ff83257da23d24ca7f078 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/83e0f8ffd7eeb7661b0ff83257da23d24ca7f078 | https://github.com/ImageMagick/ImageMagick/issues/591 | 1 | static Image *ReadTXTImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
char
colorspace[MagickPathExtent],
text[MagickPathExtent];
Image
*image;
long
x_offset,
y_offset;
PixelInfo
pixel;
MagickBooleanType
status;
QuantumAny
range;
register ssize_t
i,
... | 67,229,528,425,872,500,000,000,000,000,000,000,000 | txt.c | 128,733,898,318,362,080,000,000,000,000,000,000,000 | [
"CWE-835"
] | CVE-2017-11523 | The ReadTXTImage function in coders/txt.c in ImageMagick through 6.9.9-0 and 7.x through 7.0.6-1 allows remote attackers to cause a denial of service (infinite loop) via a crafted file, because the end-of-file condition is not considered. | https://nvd.nist.gov/vuln/detail/CVE-2017-11523 |
4,349 | linux | a23325b2e583556eae88ed3f764e457786bf4df6 | https://github.com/torvalds/linux | https://github.com/acpica/acpica/commit/a23325b2e583556eae88ed3f764e457786bf4df6 | None | 1 | AcpiNsTerminate (
void)
{
ACPI_STATUS Status;
ACPI_FUNCTION_TRACE (NsTerminate);
#ifdef ACPI_EXEC_APP
{
ACPI_OPERAND_OBJECT *Prev;
ACPI_OPERAND_OBJECT *Next;
/* Delete any module-level code blocks */
Next = AcpiGbl_ModuleCodeList;
... | 273,062,363,533,863,200,000,000,000,000,000,000,000 | nsutils.c | 91,184,489,201,841,060,000,000,000,000,000,000,000 | [
"CWE-755"
] | CVE-2017-11472 | The acpi_ns_terminate() function in drivers/acpi/acpica/nsutils.c in the Linux kernel before 4.12 does not flush the operand cache and causes a kernel stack dump, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism (in the kernel through 4.9) via a craft... | https://nvd.nist.gov/vuln/detail/CVE-2017-11472 |
4,350 | ImageMagick | 529ff26b68febb2ac03062c58452ea0b4c6edbc1 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/529ff26b68febb2ac03062c58452ea0b4c6edbc1 | None | 1 | ModuleExport size_t RegisterMPCImage(void)
{
MagickInfo
*entry;
entry=SetMagickInfo("CACHE");
entry->description=ConstantString("Magick Persistent Cache image format");
entry->module=ConstantString("MPC");
entry->seekable_stream=MagickTrue;
entry->stealth=MagickTrue;
(void) RegisterMagickInfo(en... | 91,619,705,933,668,880,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-11449 | coders/mpc.c in ImageMagick before 7.0.6-1 does not enable seekable streams and thus cannot validate blob sizes, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via an image received from stdin. | https://nvd.nist.gov/vuln/detail/CVE-2017-11449 |
4,351 | php-src | a15bffd105ac28fd0dd9b596632dbf035238fda3 | https://github.com/php/php-src | https://github.com/php/php-src/commit/a15bffd105ac28fd0dd9b596632dbf035238fda3 | Fix bug #73807 | 1 | static zend_bool add_post_var(zval *arr, post_var_data_t *var, zend_bool eof)
{
char *ksep, *vsep, *val;
size_t klen, vlen;
size_t new_vlen;
if (var->ptr >= var->end) {
return 0;
}
vsep = memchr(var->ptr, '&', var->end - var->ptr);
if (!vsep) {
if (!eof) {
return 0;
} else {
vsep = va... | 300,488,664,044,547,050,000,000,000,000,000,000,000 | php_variables.c | 8,245,733,581,833,365,000,000,000,000,000,000,000 | [
"CWE-400"
] | CVE-2017-11142 | In PHP before 5.6.31, 7.x before 7.0.17, and 7.1.x before 7.1.3, remote attackers could cause a CPU consumption denial of service attack by injecting long form variables, related to main/php_variables.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-11142 |
4,352 | FFmpeg | e1b60aad77c27ed5d4dfc11e5e6a05a38c70489d | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/e1b60aad77c27ed5d4dfc11e5e6a05a38c70489d | avcodec/cdxl: Check format parameter
Fixes out of array access
Fixes: 1378/clusterfuzz-testcase-minimized-5715088008806400
Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/targets/ffmpeg
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 1 | static int cdxl_decode_frame(AVCodecContext *avctx, void *data,
int *got_frame, AVPacket *pkt)
{
CDXLVideoContext *c = avctx->priv_data;
AVFrame * const p = data;
int ret, w, h, encoding, aligned_width, buf_size = pkt->size;
const uint8_t *buf = pkt->data;
if (buf_size ... | 178,486,467,278,167,660,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2017-9996 | The cdxl_decode_frame function in libavcodec/cdxl.c in FFmpeg 2.8.x before 2.8.12, 3.0.x before 3.0.8, 3.1.x before 3.1.8, 3.2.x before 3.2.5, and 3.3.x before 3.3.1 does not exclude the CHUNKY format, which allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possi... | https://nvd.nist.gov/vuln/detail/CVE-2017-9996 |
4,353 | FFmpeg | 2171dfae8c065878a2e130390eb78cf2947a5b69 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/2171dfae8c065878a2e130390eb78cf2947a5b69 | avcodec/scpr: Fix multiple runtime error: index 256 out of bounds for type 'unsigned int [256]'
Fixes: 1519/clusterfuzz-testcase-minimized-5286680976162816
Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/targets/ffmpeg
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 1 | static int decode_unit(SCPRContext *s, PixelModel *pixel, unsigned step, unsigned *rval)
{
GetByteContext *gb = &s->gb;
RangeCoder *rc = &s->rc;
unsigned totfr = pixel->total_freq;
unsigned value, x = 0, cumfr = 0, cnt_x = 0;
int i, j, ret, c, cnt_c;
if ((ret = s->get_freq(rc, totfr, &value)) <... | 281,652,385,257,493,500,000,000,000,000,000,000,000 | scpr.c | 316,731,203,493,724,650,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-9995 | libavcodec/scpr.c in FFmpeg 3.3 before 3.3.1 does not properly validate height and width data, which allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2017-9995 |
4,354 | FFmpeg | 189ff4219644532bdfa7bab28dfedaee4d6d4021 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/189ff4219644532bdfa7bab28dfedaee4d6d4021 | avformat/hls: Check local file extensions
This reduces the attack surface of local file-system
information leaking.
It prevents the existing exploit leading to an information leak. As
well as similar hypothetical attacks.
Leaks of information from files and symlinks ending in common multimedia extensions
are still p... | 1 | static int open_url(AVFormatContext *s, AVIOContext **pb, const char *url,
AVDictionary *opts, AVDictionary *opts2, int *is_http)
{
HLSContext *c = s->priv_data;
AVDictionary *tmp = NULL;
const char *proto_name = NULL;
int ret;
av_dict_copy(&tmp, opts, 0);
av_dict_copy(&tmp,... | 337,479,268,948,256,700,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2017-9993 | FFmpeg before 2.8.12, 3.0.x and 3.1.x before 3.1.9, 3.2.x before 3.2.6, and 3.3.x before 3.3.2 does not properly restrict HTTP Live Streaming filename extensions and demuxer names, which allows attackers to read arbitrary files via crafted playlist data. | https://nvd.nist.gov/vuln/detail/CVE-2017-9993 |
4,355 | FFmpeg | 0a709e2a10b8288a0cc383547924ecfe285cef89 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/0a709e2a10b8288a0cc383547924ecfe285cef89 | avcodec/dnxhd_parser: Do not return invalid value from dnxhd_find_frame_end() on error
Fixes: Null pointer dereference
Fixes: CVE-2017-9608
Found-by: Yihan Lian
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
(cherry picked from commit 611b35627488a8d0763e75c25ee0875c5b7987dd)
Signed-off-by: Michael Niede... | 1 | static int dnxhd_find_frame_end(DNXHDParserContext *dctx,
const uint8_t *buf, int buf_size)
{
ParseContext *pc = &dctx->pc;
uint64_t state = pc->state64;
int pic_found = pc->frame_start_found;
int i = 0;
if (!pic_found) {
for (i = 0; i < buf_size; i++) {
... | 315,425,032,861,470,850,000,000,000,000,000,000,000 | dnxhd_parser.c | 103,784,583,369,010,030,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2017-9608 | The dnxhd decoder in FFmpeg before 3.2.6, and 3.3.x before 3.3.3 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted mov file. | https://nvd.nist.gov/vuln/detail/CVE-2017-9608 |
4,366 | libsndfile | 708e996c87c5fae77b104ccfeb8f6db784c32074 | https://github.com/erikd/libsndfile | https://github.com/erikd/libsndfile/commit/708e996c87c5fae77b104ccfeb8f6db784c32074 | src/ : Move to a variable length header buffer
Previously, the `psf->header` buffer was a fixed length specified by
`SF_HEADER_LEN` which was set to `12292`. This was problematic for
two reasons; this value was un-necessarily large for the majority
of files and too small for some others.
Now the size of the header bu... | 1 | header_read (SF_PRIVATE *psf, void *ptr, int bytes)
{ int count = 0 ;
if (psf->headindex >= SIGNED_SIZEOF (psf->header))
return psf_fread (ptr, 1, bytes, psf) ;
if (psf->headindex + bytes > SIGNED_SIZEOF (psf->header))
{ int most ;
most = SIGNED_SIZEOF (psf->header) - psf->headend ;
psf_fread (psf->heade... | 137,428,299,166,907,450,000,000,000,000,000,000,000 | common.c | 339,310,387,561,950,540,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-7586 | In libsndfile before 1.0.28, an error in the "header_read()" function (common.c) when handling ID3 tags can be exploited to cause a stack-based buffer overflow via a specially crafted FLAC file. | https://nvd.nist.gov/vuln/detail/CVE-2017-7586 |
4,374 | proftpd | ecff21e0d0e84f35c299ef91d7fda088e516d4ed | https://github.com/proftpd/proftpd | https://github.com/proftpd/proftpd/commit/ecff21e0d0e84f35c299ef91d7fda088e516d4ed | Backporting recursive handling of DefaultRoot path, when AllowChrootSymlinks
is off, to 1.3.5 branch. | 1 | static int get_default_root(pool *p, int allow_symlinks, char **root) {
config_rec *c = NULL;
char *dir = NULL;
int res;
c = find_config(main_server->conf, CONF_PARAM, "DefaultRoot", FALSE);
while (c) {
pr_signals_handle();
/* Check the groups acl */
if (c->argc < 2) {
dir = c->argv[0];... | 40,186,582,881,128,860,000,000,000,000,000,000,000 | mod_auth.c | 288,997,673,937,166,560,000,000,000,000,000,000,000 | [
"CWE-59"
] | CVE-2017-7418 | ProFTPD before 1.3.5e and 1.3.6 before 1.3.6rc5 controls whether the home directory of a user could contain a symbolic link through the AllowChrootSymlinks configuration option, but checks only the last path component when enforcing AllowChrootSymlinks. Attackers with local access could bypass the AllowChrootSymlinks c... | https://nvd.nist.gov/vuln/detail/CVE-2017-7418 |
4,377 | linux | 4ef1b2869447411ad3ef91ad7d4891a83c1a509a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/4ef1b2869447411ad3ef91ad7d4891a83c1a509a | tcp: mark skbs with SCM_TIMESTAMPING_OPT_STATS
SOF_TIMESTAMPING_OPT_STATS can be enabled and disabled
while packets are collected on the error queue.
So, checking SOF_TIMESTAMPING_OPT_STATS in sk->sk_tsflags
is not enough to safely assume that the skb contains
OPT_STATS data.
Add a bit in sock_exterr_skb to indicate ... | 1 | void __sock_recv_timestamp(struct msghdr *msg, struct sock *sk,
struct sk_buff *skb)
{
int need_software_tstamp = sock_flag(sk, SOCK_RCVTSTAMP);
struct scm_timestamping tss;
int empty = 1;
struct skb_shared_hwtstamps *shhwtstamps =
skb_hwtstamps(skb);
/* Race occurred between timestamp enabling and packet
... | 318,403,522,723,650,600,000,000,000,000,000,000,000 | socket.c | 136,313,628,448,494,970,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-7277 | The TCP stack in the Linux kernel through 4.10.6 mishandles the SCM_TIMESTAMPING_OPT_STATS feature, which allows local users to obtain sensitive information from the kernel's internal socket data structures or cause a denial of service (out-of-bounds read) via crafted system calls, related to net/core/skbuff.c and net/... | https://nvd.nist.gov/vuln/detail/CVE-2017-7277 |
4,378 | linux | 677e806da4d916052585301785d847c3b3e6186a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/677e806da4d916052585301785d847c3b3e6186a | xfrm_user: validate XFRM_MSG_NEWAE XFRMA_REPLAY_ESN_VAL replay_window
When a new xfrm state is created during an XFRM_MSG_NEWSA call we
validate the user supplied replay_esn to ensure that the size is valid
and to ensure that the replay_window size is within the allocated
buffer. However later it is possible to updat... | 1 | static inline int xfrm_replay_verify_len(struct xfrm_replay_state_esn *replay_esn,
struct nlattr *rp)
{
struct xfrm_replay_state_esn *up;
int ulen;
if (!replay_esn || !rp)
return 0;
up = nla_data(rp);
ulen = xfrm_replay_state_esn_len(up);
if (nla_len(rp) < ulen || xfrm_replay_state_esn_len(replay_esn)... | 265,697,284,654,293,840,000,000,000,000,000,000,000 | xfrm_user.c | 34,945,409,834,448,290,000,000,000,000,000,000,000 | [
"CWE-284"
] | CVE-2017-7184 | The xfrm_replay_verify_len function in net/xfrm/xfrm_user.c in the Linux kernel through 4.10.6 does not validate certain size data after an XFRM_MSG_NEWAE update, which allows local users to obtain root privileges or cause a denial of service (heap-based out-of-bounds access) by leveraging the CAP_NET_ADMIN capability,... | https://nvd.nist.gov/vuln/detail/CVE-2017-7184 |
4,389 | ImageMagick | 7d65a814ac76bd04760072c33e452371692ee790 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/7d65a814ac76bd04760072c33e452371692ee790 | None | 1 | ModuleExport MagickBooleanType ReadPSDLayers(Image *image,
const ImageInfo *image_info,const PSDInfo *psd_info,
const MagickBooleanType skip_layers,ExceptionInfo *exception)
{
char
type[4];
LayerInfo
*layer_info;
MagickSizeType
size;
MagickBooleanType
status;
register ssize_t
i;
... | 4,351,382,808,025,695,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2017-5511 | coders/psd.c in ImageMagick allows remote attackers to have unspecified impact by leveraging an improper cast, which triggers a heap-based buffer overflow. | https://nvd.nist.gov/vuln/detail/CVE-2017-5511 |
4,390 | ImageMagick | 37a1710e2dab6ed91128ea648d654a22fbe2a6af | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/37a1710e2dab6ed91128ea648d654a22fbe2a6af | None | 1 | static ssize_t WritePSDChannels(const PSDInfo *psd_info,
const ImageInfo *image_info,Image *image,Image *next_image,
MagickOffsetType size_offset,const MagickBooleanType separate)
{
Image
*mask;
MagickOffsetType
rows_offset;
size_t
channels,
count,
length,
offset_length;
unsigned ... | 155,653,748,314,334,410,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2017-5509 | coders/psd.c in ImageMagick allows remote attackers to have unspecified impact via a crafted PSD file, which triggers an out-of-bounds write. | https://nvd.nist.gov/vuln/detail/CVE-2017-5509 |
4,396 | libgit2 | b5c6a1b407b7f8b952bded2789593b68b1876211 | https://github.com/libgit2/libgit2 | https://github.com/libgit2/libgit2/commit/b5c6a1b407b7f8b952bded2789593b68b1876211 | http: check certificate validity before clobbering the error variable | 1 | static int http_connect(http_subtransport *t)
{
int error;
char *proxy_url;
if (t->connected &&
http_should_keep_alive(&t->parser) &&
t->parse_finished)
return 0;
if (t->io) {
git_stream_close(t->io);
git_stream_free(t->io);
t->io = NULL;
t->connected = 0;
}
if (t->connection_data.use_ssl) {
er... | 181,137,872,357,421,300,000,000,000,000,000,000,000 | None | null | [
"CWE-284"
] | CVE-2016-10130 | The http_connect function in transports/http.c in libgit2 before 0.24.6 and 0.25.x before 0.25.1 might allow man-in-the-middle attackers to spoof servers by leveraging clobbering of the error variable. | https://nvd.nist.gov/vuln/detail/CVE-2016-10130 |
4,397 | libgit2 | 84d30d569ada986f3eef527cbdb932643c2dd037 | https://github.com/libgit2/libgit2 | https://github.com/libgit2/libgit2/commit/84d30d569ada986f3eef527cbdb932643c2dd037 | smart_pkt: treat empty packet lines as error
The Git protocol does not specify what should happen in the case
of an empty packet line (that is a packet line "0004"). We
currently indicate success, but do not return a packet in the
case where we hit an empty line. The smart protocol was not
prepared to handle such pack... | 1 | static int add_push_report_sideband_pkt(git_push *push, git_pkt_data *data_pkt, git_buf *data_pkt_buf)
{
git_pkt *pkt;
const char *line, *line_end;
size_t line_len;
int error;
int reading_from_buf = data_pkt_buf->size > 0;
if (reading_from_buf) {
/* We had an existing partial packet, so add the new
* packet... | 40,688,963,026,714,930,000,000,000,000,000,000,000 | smart_protocol.c | 169,851,288,010,794,390,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2016-10129 | The Git Smart Protocol support in libgit2 before 0.24.6 and 0.25.x before 0.25.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via an empty packet line. | https://nvd.nist.gov/vuln/detail/CVE-2016-10129 |
4,398 | php-src | 77f619d48259383628c3ec4654b1ad578e9eb40e | https://github.com/php/php-src | https://github.com/libgd/libgd/commit/77f619d48259383628c3ec4654b1ad578e9eb40e | None | 1 | BGD_DECLARE(void) gdImageFillToBorder (gdImagePtr im, int x, int y, int border, int color)
{
int lastBorder;
/* Seek left */
int leftLimit, rightLimit;
int i;
int restoreAlphaBleding;
if (border < 0) {
/* Refuse to fill to a non-solid border */
return;
}
leftLimit = (-1);
restoreAlphaBleding =... | 239,173,184,754,285,350,000,000,000,000,000,000,000 | gd.c | 249,258,694,972,014,260,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2016-9933 | Stack consumption vulnerability in the gdImageFillToBorder function in gd.c in the GD Graphics Library (aka libgd) before 2.2.2, as used in PHP before 5.6.28 and 7.x before 7.0.13, allows remote attackers to cause a denial of service (segmentation violation) via a crafted imagefilltoborder call that triggers use of a n... | https://nvd.nist.gov/vuln/detail/CVE-2016-9933 |
4,399 | ImageMagick | 63346f34f9d19179599b5b256e5e8d3dda46435c | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/63346f34f9d19179599b5b256e5e8d3dda46435c | None | 1 | int main( int /*argc*/, char ** argv)
{
InitializeMagick(*argv);
int failures=0;
try {
string srcdir("");
if(getenv("SRCDIR") != 0)
srcdir = getenv("SRCDIR");
list<Image> imageList;
readImages( &imageList, srcdir + "test_image_anim.miff" );
Image appended;
appendImages( &appe... | 11,870,402,558,612,043,000,000,000,000,000,000,000 | None | null | [
"CWE-369"
] | CVE-2016-7530 | The quantum handling code in ImageMagick allows remote attackers to cause a denial of service (divide-by-zero error or out-of-bounds write) via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2016-7530 |
4,400 | ImageMagick | b5ed738f8060266bf4ae521f7e3ed145aa4498a3 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/b5ed738f8060266bf4ae521f7e3ed145aa4498a3 | None | 1 | MagickExport MagickBooleanType SetQuantumDepth(const Image *image,
QuantumInfo *quantum_info,const size_t depth)
{
size_t
extent,
quantum;
/*
Allocate the quantum pixel buffer.
*/
assert(image != (Image *) NULL);
assert(image->signature == MagickSignature);
if (image->debug != MagickFalse)
... | 198,311,459,592,439,570,000,000,000,000,000,000,000 | None | null | [
"CWE-369"
] | CVE-2016-7530 | The quantum handling code in ImageMagick allows remote attackers to cause a denial of service (divide-by-zero error or out-of-bounds write) via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2016-7530 |
4,402 | ImageMagick | 198fffab4daf8aea88badd9c629350e5b26ec32f | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/198fffab4daf8aea88badd9c629350e5b26ec32f | Added check for bit depth 1. | 1 | static Image *ReadPSDImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
Image
*image;
MagickBooleanType
has_merged_image,
skip_layers;
MagickOffsetType
offset;
MagickSizeType
length;
MagickBooleanType
status;
PSDInfo
psd_info;
register ssize_t
i;
ssize_t... | 204,504,254,206,595,570,000,000,000,000,000,000,000 | psd.c | 171,607,370,422,252,440,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2016-7514 | The ReadPSDChannelPixels function in coders/psd.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PSD file. | https://nvd.nist.gov/vuln/detail/CVE-2016-7514 |
4,403 | ImageMagick | 6f1879d498bcc5cce12fe0c5decb8dbc0f608e5d | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/6f1879d498bcc5cce12fe0c5decb8dbc0f608e5d | Fixed overflow. | 1 | static MagickBooleanType WriteImageChannels(const PSDInfo *psd_info,
const ImageInfo *image_info,Image *image,Image *next_image,
const MagickBooleanType separate,ExceptionInfo *exception)
{
size_t
channels,
packet_size;
unsigned char
*compact_pixels;
/*
Write uncompressed pixels as separate ... | 150,687,575,848,649,830,000,000,000,000,000,000,000 | psd.c | 158,380,458,428,940,300,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2016-7514 | The ReadPSDChannelPixels function in coders/psd.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PSD file. | https://nvd.nist.gov/vuln/detail/CVE-2016-7514 |
4,404 | ImageMagick | 8f8959033e4e59418d6506b345829af1f7a71127 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/8f8959033e4e59418d6506b345829af1f7a71127 | ... | 1 | static Image *ReadSGIImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
Image
*image;
MagickBooleanType
status;
MagickSizeType
number_pixels;
MemoryInfo
*pixel_info;
register Quantum
*q;
register ssize_t
i,
x;
register unsigned char
*p;
SGIInfo
iris_... | 9,093,028,214,754,756,000,000,000,000,000,000,000 | sgi.c | 56,650,646,473,342,340,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2016-7101 | The SGI coder in ImageMagick before 7.0.2-10 allows remote attackers to cause a denial of service (out-of-bounds read) via a large row value in an sgi file. | https://nvd.nist.gov/vuln/detail/CVE-2016-7101 |
4,405 | libgd | 58b6dde319c301b0eae27d12e2a659e067d80558 | https://github.com/libgd/libgd | https://github.com/libgd/libgd/commit/58b6dde319c301b0eae27d12e2a659e067d80558 | Fix OOB reads of the TGA decompression buffer
It is possible to craft TGA files which will overflow the decompression
buffer, but not the image's bitmap. Therefore we also have to check for
potential decompression buffer overflows.
This issue had been reported by Ibrahim El-Sayed to security@libgd.org;
a modified cas... | 1 | int read_image_tga( gdIOCtx *ctx, oTga *tga )
{
int pixel_block_size = (tga->bits / 8);
int image_block_size = (tga->width * tga->height) * pixel_block_size;
int* decompression_buffer = NULL;
unsigned char* conversion_buffer = NULL;
int buffer_caret = 0;
int bitmap_caret = 0;
int i = 0;
int encoded_pixels;
int... | 45,807,417,306,419,930,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2016-6906 | The read_image_tga function in gd_tga.c in the GD Graphics Library (aka libgd) before 2.2.4 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted TGA file, related to the decompression buffer. | https://nvd.nist.gov/vuln/detail/CVE-2016-6906 |
4,407 | ImageMagick | 3ab016764c7f787829d9065440d86f5609765110 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/3ab016764c7f787829d9065440d86f5609765110 | None | 1 | static MagickBooleanType SkipRGBMipmaps(Image *image,DDSInfo *dds_info,
int pixel_size,ExceptionInfo *exception)
{
MagickOffsetType
offset;
register ssize_t
i;
size_t
h,
w;
/*
Only skip mipmaps for textures and cube maps
*/
if (EOFBlob(image) != MagickFalse)
{
ThrowFileExc... | 246,197,186,530,972,530,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2015-8959 | coders/dds.c in ImageMagick before 6.9.0-4 Beta allows remote attackers to cause a denial of service (CPU consumption) via a crafted DDS file. | https://nvd.nist.gov/vuln/detail/CVE-2015-8959 |
4,408 | ImageMagick | 8ea44b48a182dd46d018f4b4f09a5e2ee9638105 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/8ea44b48a182dd46d018f4b4f09a5e2ee9638105 | 1 | static Image *ReadSUNImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
#define RMT_EQUAL_RGB 1
#define RMT_NONE 0
#define RMT_RAW 2
#define RT_STANDARD 1
#define RT_ENCODED 2
#define RT_FORMAT_RGB 3
typedef struct _SUNInfo
{
unsigned int
magic,
width,
height,
depth,
... | 185,822,657,637,374,900,000,000,000,000,000,000,000 | sun.c | 276,234,285,718,895,500,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2015-8958 | coders/sun.c in ImageMagick before 6.9.0-4 Beta allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted SUN file. | https://nvd.nist.gov/vuln/detail/CVE-2015-8958 | |
4,409 | ImageMagick | 1aa0c6dab6dcef4d9bc3571866ae1c1ddbec7d8f | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/1aa0c6dab6dcef4d9bc3571866ae1c1ddbec7d8f | 1 | static Image *ReadSUNImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
#define RMT_EQUAL_RGB 1
#define RMT_NONE 0
#define RMT_RAW 2
#define RT_STANDARD 1
#define RT_ENCODED 2
#define RT_FORMAT_RGB 3
typedef struct _SUNInfo
{
unsigned int
magic,
width,
height,
depth,
... | 72,822,587,876,171,710,000,000,000,000,000,000,000 | sun.c | 243,858,115,172,867,770,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2015-8958 | coders/sun.c in ImageMagick before 6.9.0-4 Beta allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted SUN file. | https://nvd.nist.gov/vuln/detail/CVE-2015-8958 | |
4,410 | ImageMagick | 6b4aff0f117b978502ee5bcd6e753c17aec5a961 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/6b4aff0f117b978502ee5bcd6e753c17aec5a961 | 1 | static Image *ReadSUNImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
#define RMT_EQUAL_RGB 1
#define RMT_NONE 0
#define RMT_RAW 2
#define RT_STANDARD 1
#define RT_ENCODED 2
#define RT_FORMAT_RGB 3
typedef struct _SUNInfo
{
unsigned int
magic,
width,
height,
depth,
... | 100,062,307,657,952,780,000,000,000,000,000,000,000 | sun.c | 337,243,953,370,380,560,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2015-8958 | coders/sun.c in ImageMagick before 6.9.0-4 Beta allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted SUN file. | https://nvd.nist.gov/vuln/detail/CVE-2015-8958 | |
4,411 | ImageMagick | 78f82d9d1c2944725a279acd573a22168dc6e22a | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/78f82d9d1c2944725a279acd573a22168dc6e22a | http://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=26838 | 1 | static Image *ReadSUNImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
#define RMT_EQUAL_RGB 1
#define RMT_NONE 0
#define RMT_RAW 2
#define RT_STANDARD 1
#define RT_ENCODED 2
#define RT_FORMAT_RGB 3
typedef struct _SUNInfo
{
unsigned int
magic,
width,
height,
depth,
... | 317,374,088,228,359,770,000,000,000,000,000,000,000 | sun.c | 157,334,686,057,961,900,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2015-8957 | Buffer overflow in ImageMagick before 6.9.0-4 Beta allows remote attackers to cause a denial of service (application crash) via a crafted SUN file. | https://nvd.nist.gov/vuln/detail/CVE-2015-8957 |
4,417 | pgbouncer | edab5be6665b9e8de66c25ba527509b229468573 | https://github.com/pgbouncer/pgbouncer | https://github.com/pgbouncer/pgbouncer/commit/edab5be6665b9e8de66c25ba527509b229468573 | Check if auth_user is set.
Fixes a crash if password packet appears before startup packet (#42). | 1 | static bool check_client_passwd(PgSocket *client, const char *passwd)
{
char md5[MD5_PASSWD_LEN + 1];
const char *correct;
PgUser *user = client->auth_user;
/* disallow empty passwords */
if (!*passwd || !*user->passwd)
return false;
switch (cf_auth_type) {
case AUTH_PLAIN:
return strcmp(user->passwd... | 262,462,810,635,753,940,000,000,000,000,000,000,000 | client.c | 203,590,908,184,515,350,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2015-4054 | PgBouncer before 1.5.5 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) by sending a password packet before a startup packet. | https://nvd.nist.gov/vuln/detail/CVE-2015-4054 |
4,420 | abrt | 4f2c1ddd3e3b81d2d5146b883115371f1cada9f9 | https://github.com/abrt/abrt | https://github.com/abrt/abrt/commit/4f2c1ddd3e3b81d2d5146b883115371f1cada9f9 | ccpp: do not read data from root directories
Users are allowed to modify /proc/[pid]/root to any directory by running
their own MOUNT namespace.
Related: #1211835
Signed-off-by: Jakub Filak <jfilak@redhat.com> | 1 | int main(int argc, char** argv)
{
/* Kernel starts us with all fd's closed.
* But it's dangerous:
* fprintf(stderr) can dump messages into random fds, etc.
* Ensure that if any of fd 0,1,2 is closed, we open it to /dev/null.
*/
int fd = xopen("/dev/null", O_RDWR);
while (fd < 2)
fd = xd... | 119,288,858,394,488,250,000,000,000,000,000,000,000 | None | null | [
"CWE-59"
] | CVE-2015-3315 | Automatic Bug Reporting Tool (ABRT) allows local users to read, change the ownership of, or have other unspecified impact on arbitrary files via a symlink attack on (1) /var/tmp/abrt/*/maps, (2) /tmp/jvm-*/hs_error.log, (3) /proc/*/exe, (4) /etc/os-release in a chroot, or (5) an unspecified root directory related to li... | https://nvd.nist.gov/vuln/detail/CVE-2015-3315 |
4,423 | abrt | d6e2f6f128cef4c21cb80941ae674c9842681aa7 | https://github.com/abrt/abrt | https://github.com/abrt/abrt/commit/d6e2f6f128cef4c21cb80941ae674c9842681aa7 | ccpp: open file for dump_fd_info with O_EXCL
To avoid possible races.
Related: #1211835
Signed-off-by: Jakub Filak <jfilak@redhat.com> | 1 | static bool dump_fd_info(const char *dest_filename, char *source_filename, int source_base_ofs, uid_t uid, gid_t gid)
{
FILE *fp = fopen(dest_filename, "w");
if (!fp)
return false;
unsigned fd = 0;
while (fd <= 99999) /* paranoia check */
{
sprintf(source_filename + source_base... | 242,345,425,049,513,960,000,000,000,000,000,000,000 | abrt-hook-ccpp.c | 332,533,851,336,417,600,000,000,000,000,000,000,000 | [
"CWE-59"
] | CVE-2015-3315 | Automatic Bug Reporting Tool (ABRT) allows local users to read, change the ownership of, or have other unspecified impact on arbitrary files via a symlink attack on (1) /var/tmp/abrt/*/maps, (2) /tmp/jvm-*/hs_error.log, (3) /proc/*/exe, (4) /etc/os-release in a chroot, or (5) an unspecified root directory related to li... | https://nvd.nist.gov/vuln/detail/CVE-2015-3315 |
4,438 | linux | f106eee10038c2ee5b6056aaf3f6d5229be6dcdd | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/f106eee10038c2ee5b6056aaf3f6d5229be6dcdd | pids: fix fork_idle() to setup ->pids correctly
copy_process(pid => &init_struct_pid) doesn't do attach_pid/etc.
It shouldn't, but this means that the idle threads run with the wrong
pids copied from the caller's task_struct. In x86 case the caller is
either kernel_init() thread or keventd.
In particular, this means... | 1 | struct task_struct * __cpuinit fork_idle(int cpu)
{
struct task_struct *task;
struct pt_regs regs;
task = copy_process(CLONE_VM, 0, idle_regs(®s), 0, NULL,
&init_struct_pid, 0);
if (!IS_ERR(task))
init_idle(task, cpu);
return task;
}
| 331,334,078,248,499,600,000,000,000,000,000,000,000 | fork.c | 192,604,631,227,405,160,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2010-5328 | include/linux/init_task.h in the Linux kernel before 2.6.35 does not prevent signals with a process group ID of zero from reaching the swapper process, which allows local users to cause a denial of service (system crash) by leveraging access to this process group. | https://nvd.nist.gov/vuln/detail/CVE-2010-5328 |
4,439 | librsvg | f9d69eadd2b16b00d1a1f9f286122123f8e547dd | https://github.com/GNOME/librsvg | https://github.com/ImageMagick/librsvg/commit/f9d69eadd2b16b00d1a1f9f286122123f8e547dd | Fixed possible credentials leaking reported by Alex Birsan. | 1 | _rsvg_io_get_file_path (const gchar * filename,
const gchar * base_uri)
{
gchar *absolute_filename;
if (g_file_test (filename, G_FILE_TEST_EXISTS) || g_path_is_absolute (filename)) {
absolute_filename = g_strdup (filename);
} else {
gchar *tmpcdir;
gcha... | 330,502,157,723,936,650,000,000,000,000,000,000,000 | rsvg-io.c | 108,187,284,530,270,120,000,000,000,000,000,000,000 | [
"CWE-522"
] | CVE-2018-1000041 | GNOME librsvg version before commit c6ddf2ed4d768fd88adbea2b63f575cd523022ea contains a Improper input validation vulnerability in rsvg-io.c that can result in the victim's Windows username and NTLM password hash being leaked to remote attackers through SMB. This attack appear to be exploitable via The victim must proc... | https://nvd.nist.gov/vuln/detail/CVE-2018-1000041 |
4,440 | keepalived | 5241e4d7b177d0b6f073cfc9ed5444bf51ec89d6 | https://github.com/acassen/keepalived | https://github.com/acassen/keepalived/commit/5241e4d7b177d0b6f073cfc9ed5444bf51ec89d6 | Fix compile warning introduced in commit c6247a9
Commit c6247a9 - "Add command line and configuration option to set umask"
introduced a compile warning, although the code would have worked OK.
Signed-off-by: Quentin Armitage <quentin@armitage.org.uk> | 1 | set_umask(const char *optarg)
{
long umask_long;
mode_t umask_val;
char *endptr;
umask_long = strtoll(optarg, &endptr, 0);
if (*endptr || umask_long < 0 || umask_long & ~0777L) {
fprintf(stderr, "Invalid --umask option %s", optarg);
return;
}
umask_val = umask_long & 0777;
umask(umask_val);
umask... | 244,254,477,401,396,200,000,000,000,000,000,000,000 | main.c | 146,439,141,467,785,800,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2018-19045 | keepalived 2.0.8 used mode 0666 when creating new temporary files upon a call to PrintData or PrintStats, potentially leaking sensitive information. | https://nvd.nist.gov/vuln/detail/CVE-2018-19045 |
4,441 | linux | 2a3f93459d689d990b3ecfbe782fec89b97d3279 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/2a3f93459d689d990b3ecfbe782fec89b97d3279 | arm64: KVM: Sanitize PSTATE.M when being set from userspace
Not all execution modes are valid for a guest, and some of them
depend on what the HW actually supports. Let's verify that what
userspace provides is compatible with both the VM settings and
the HW capabilities.
Cc: <stable@vger.kernel.org>
Fixes: 0d854a60b1... | 1 | static int set_core_reg(struct kvm_vcpu *vcpu, const struct kvm_one_reg *reg)
{
__u32 __user *uaddr = (__u32 __user *)(unsigned long)reg->addr;
struct kvm_regs *regs = vcpu_gp_regs(vcpu);
int nr_regs = sizeof(*regs) / sizeof(__u32);
__uint128_t tmp;
void *valp = &tmp;
u64 off;
int err = 0;
/* Our ID is an inde... | 103,022,671,665,194,350,000,000,000,000,000,000,000 | guest.c | 236,591,481,754,431,170,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2018-18021 | arch/arm64/kvm/guest.c in KVM in the Linux kernel before 4.18.12 on the arm64 platform mishandles the KVM_SET_ON_REG ioctl. This is exploitable by attackers who can create virtual machines. An attacker can arbitrarily redirect the hypervisor flow of control (with full register control). An attacker can also cause a den... | https://nvd.nist.gov/vuln/detail/CVE-2018-18021 |
4,442 | git | 1a7fd1fb2998002da6e9ff2ee46e1bdd25ee8404 | https://github.com/git/git | https://github.com/git/git/commit/1a7fd1fb2998002da6e9ff2ee46e1bdd25ee8404 | fsck: detect submodule paths starting with dash
As with urls, submodule paths with dashes are ignored by
git, but may end up confusing older versions. Detecting them
via fsck lets us prevent modern versions of git from being a
vector to spread broken .gitmodules to older versions.
Compared to blocking leading-dash ur... | 1 | static int fsck_gitmodules_fn(const char *var, const char *value, void *vdata)
{
struct fsck_gitmodules_data *data = vdata;
const char *subsection, *key;
int subsection_len;
char *name;
if (parse_config_key(var, "submodule", &subsection, &subsection_len, &key) < 0 ||
!subsection)
return 0;
name = xmemdup... | 157,706,953,577,909,880,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-17456 | Git before 2.14.5, 2.15.x before 2.15.3, 2.16.x before 2.16.5, 2.17.x before 2.17.2, 2.18.x before 2.18.1, and 2.19.x before 2.19.1 allows remote code execution during processing of a recursive "git clone" of a superproject if a .gitmodules file has a URL field beginning with a '-' character. | https://nvd.nist.gov/vuln/detail/CVE-2018-17456 |
4,443 | ImageMagick | 16916c8979c32765c542e216b31cee2671b7afe7 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/16916c8979c32765c542e216b31cee2671b7afe7 | https://github.com/ImageMagick/ImageMagick/issues/1269 | 1 | static Image *ReadDCMImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
#define ThrowDCMException(exception,message) \
{ \
if (info.scale != (Quantum *) NULL) \
info.scale=(Quantum *) RelinquishMagickMemory(info.scale); \
if (data != (unsigned char *) NULL) \
data=(unsigned char *) RelinquishMagi... | 166,974,640,597,951,750,000,000,000,000,000,000,000 | dcm.c | 271,804,267,068,497,900,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2018-16644 | There is a missing check for length in the functions ReadDCMImage of coders/dcm.c and ReadPICTImage of coders/pict.c in ImageMagick 7.0.8-11, which allows remote attackers to cause a denial of service via a crafted image. | https://nvd.nist.gov/vuln/detail/CVE-2018-16644 |
4,444 | radare2 | b35530fa0681b27eba084de5527037ebfb397422 | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/b35530fa0681b27eba084de5527037ebfb397422 | Fix oobread in avr | 1 | static OPCODE_DESC* avr_op_analyze(RAnal *anal, RAnalOp *op, ut64 addr, const ut8 *buf, int len, CPU_MODEL *cpu) {
OPCODE_DESC *opcode_desc;
ut16 ins = (buf[1] << 8) | buf[0];
int fail;
char *t;
memset (op, 0, sizeof (RAnalOp));
op->ptr = UT64_MAX;
op->val = UT64_MAX;
op->jump = UT64_MAX;
r_strbuf_init (... | 238,906,534,179,308,200,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2018-11377 | The avr_op_analyze() function in radare2 2.5.0 allows remote attackers to cause a denial of service (heap-based out-of-bounds read and application crash) via a crafted binary file. | https://nvd.nist.gov/vuln/detail/CVE-2018-11377 |
4,445 | libgit2 | 3f461902dc1072acb8b7607ee65d0a0458ffac2a | https://github.com/libgit2/libgit2 | https://github.com/libgit2/libgit2/commit/3f461902dc1072acb8b7607ee65d0a0458ffac2a | delta: fix sign-extension of big left-shift
Our delta code was originally adapted from JGit, which itself adapted it
from git itself. Due to this heritage, we inherited a bug from git.git
in how we compute the delta offset, which was fixed upstream in
48fb7deb5 (Fix big left-shifts of unsigned char, 2009-06-17). As
ex... | 1 | int git_delta_apply(
void **out,
size_t *out_len,
const unsigned char *base,
size_t base_len,
const unsigned char *delta,
size_t delta_len)
{
const unsigned char *delta_end = delta + delta_len;
size_t base_sz, res_sz, alloc_sz;
unsigned char *res_dp;
*out = NULL;
*out_len = 0;
/* Check that the base si... | 323,670,314,909,050,680,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2018-10887 | A flaw was found in libgit2 before version 0.27.3. It has been discovered that an unexpected sign extension in git_delta_apply function in delta.c file may lead to an integer overflow which in turn leads to an out of bound read, allowing to read before the base object. An attacker may use this flaw to leak memory addre... | https://nvd.nist.gov/vuln/detail/CVE-2018-10887 |
4,446 | mbedtls | 5224a7544c95552553e2e6be0b4a789956a6464e | https://github.com/ARMmbed/mbedtls | https://github.com/ARMmbed/mbedtls/commit/5224a7544c95552553e2e6be0b4a789956a6464e | Prevent arithmetic overflow on bounds check | 1 | static int ssl_parse_server_psk_hint( mbedtls_ssl_context *ssl,
unsigned char **p,
unsigned char *end )
{
int ret = MBEDTLS_ERR_SSL_FEATURE_UNAVAILABLE;
size_t len;
((void) ssl);
/*
* PSK parameters:
*
* opaque ... | 9,975,011,487,963,196,000,000,000,000,000,000,000 | ssl_cli.c | 245,686,137,588,342,770,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-9989 | ARM mbed TLS before 2.1.11, before 2.7.2, and before 2.8.0 has a buffer over-read in ssl_parse_server_psk_hint() that could cause a crash on invalid input. | https://nvd.nist.gov/vuln/detail/CVE-2018-9989 |
4,447 | mbedtls | 027f84c69f4ef30c0693832a6c396ef19e563ca1 | https://github.com/ARMmbed/mbedtls | https://github.com/ARMmbed/mbedtls/commit/027f84c69f4ef30c0693832a6c396ef19e563ca1 | Prevent arithmetic overflow on bounds check | 1 | static int ssl_parse_server_key_exchange( mbedtls_ssl_context *ssl )
{
int ret;
const mbedtls_ssl_ciphersuite_t *ciphersuite_info =
ssl->transform_negotiate->ciphersuite_info;
unsigned char *p = NULL, *end = NULL;
MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> parse server key exchange" ) );
#if defined(MBED... | 216,299,019,030,539,130,000,000,000,000,000,000,000 | ssl_cli.c | 83,727,931,143,460,710,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-9988 | ARM mbed TLS before 2.1.11, before 2.7.2, and before 2.8.0 has a buffer over-read in ssl_parse_server_key_exchange() that could cause a crash on invalid input. | https://nvd.nist.gov/vuln/detail/CVE-2018-9988 |
4,448 | libgit2 | 3db1af1f370295ad5355b8f64b865a2a357bcac0 | https://github.com/libgit2/libgit2 | https://github.com/libgit2/libgit2/commit/3db1af1f370295ad5355b8f64b865a2a357bcac0 | index: error out on unreasonable prefix-compressed path lengths
When computing the complete path length from the encoded
prefix-compressed path, we end up just allocating the complete path
without ever checking what the encoded path length actually is. This can
easily lead to a denial of service by just encoding an un... | 1 | static int read_entry(
git_index_entry **out,
size_t *out_size,
git_index *index,
const void *buffer,
size_t buffer_size,
const char *last)
{
size_t path_length, entry_size;
const char *path_ptr;
struct entry_short source;
git_index_entry entry = {{0}};
bool compressed = index->version >= INDEX_VERSION_NUMBE... | 285,266,082,278,998,730,000,000,000,000,000,000,000 | index.c | 148,456,201,620,914,240,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2018-8098 | Integer overflow in the index.c:read_entry() function while decompressing a compressed prefix length in libgit2 before v0.26.2 allows an attacker to cause a denial of service (out-of-bounds read) via a crafted repository index file. | https://nvd.nist.gov/vuln/detail/CVE-2018-8098 |
4,452 | suricata | 8357ef3f8ffc7d99ef6571350724160de356158b | https://github.com/OISF/suricata | https://github.com/OISF/suricata/commit/8357ef3f8ffc7d99ef6571350724160de356158b | proto/detect: workaround dns misdetected as dcerpc
The DCERPC UDP detection would misfire on DNS with transaction
ID 0x0400. This would happen as the protocol detection engine
gives preference to pattern based detection over probing parsers for
performance reasons.
This hack/workaround fixes this specific case by sti... | 1 | AppProto AppLayerProtoDetectGetProto(AppLayerProtoDetectThreadCtx *tctx,
Flow *f,
uint8_t *buf, uint32_t buflen,
uint8_t ipproto, uint8_t direction)
{
SCEnter();
SCLogDebug("buflen %u for %s direction"... | 42,797,380,008,853,400,000,000,000,000,000,000,000 | app-layer-detect-proto.c | 123,595,736,309,035,860,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2019-1010251 | Open Information Security Foundation Suricata prior to version 4.1.2 is affected by: Denial of Service - DNS detection bypass. The impact is: An attacker can evade a signature detection with a specialy formed network packet. The component is: app-layer-detect-proto.c, decode.c, decode-teredo.c and decode-ipv6.c (https:... | https://nvd.nist.gov/vuln/detail/CVE-2019-1010251 |
4,458 | radare2 | 5411543a310a470b1257fb93273cdd6e8dfcb3af | https://github.com/radare/radare2 | https://github.com/radareorg/radare2/commit/5411543a310a470b1257fb93273cdd6e8dfcb3af | More fixes for the CVE-2019-14745 | 1 | static int bin_symbols(RCore *r, int mode, ut64 laddr, int va, ut64 at, const char *name, bool exponly, const char *args) {
RBinInfo *info = r_bin_get_info (r->bin);
RList *entries = r_bin_get_entries (r->bin);
RBinSymbol *symbol;
RBinAddr *entry;
RListIter *iter;
bool firstexp = true;
bool printHere = false;
i... | 135,940,108,812,750,360,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2019-16718 | In radare2 before 3.9.0, a command injection vulnerability exists in bin_symbols() in libr/core/cbin.c. By using a crafted executable file, it's possible to execute arbitrary shell commands with the permissions of the victim. This vulnerability is due to an insufficient fix for CVE-2019-14745 and improper handling of s... | https://nvd.nist.gov/vuln/detail/CVE-2019-16718 |
4,461 | ImageMagick6 | c5d012a46ae22be9444326aa37969a3f75daa3ba | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick/commit/c5d012a46ae22be9444326aa37969a3f75daa3ba | None | 1 | MagickExport void *DetachBlob(BlobInfo *blob_info)
{
void
*data;
assert(blob_info != (BlobInfo *) NULL);
if (blob_info->debug != MagickFalse)
(void) LogMagickEvent(TraceEvent,GetMagickModule(),"...");
if (blob_info->mapped != MagickFalse)
{
(void) UnmapBlob(blob_info->data,blob_info->lengt... | 280,895,254,590,469,120,000,000,000,000,000,000,000 | blob.c | 50,762,778,983,390,390,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2019-14980 | In ImageMagick 7.x before 7.0.8-42 and 6.x before 6.9.10-42, there is a use after free vulnerability in the UnmapBlob function that allows an attacker to cause a denial of service by sending a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2019-14980 |
4,462 | linux | 072684e8c58d17e853f8e8b9f6d9ce2e58d2b036 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/072684e8c58d17e853f8e8b9f6d9ce2e58d2b036 | USB: gadget: f_hid: fix deadlock in f_hidg_write()
In f_hidg_write() the write_spinlock is acquired before calling
usb_ep_queue() which causes a deadlock when dummy_hcd is being used.
This is because dummy_queue() callbacks into f_hidg_req_complete() which
tries to acquire the same spinlock. This is (part of) the back... | 1 | static ssize_t f_hidg_write(struct file *file, const char __user *buffer,
size_t count, loff_t *offp)
{
struct f_hidg *hidg = file->private_data;
struct usb_request *req;
unsigned long flags;
ssize_t status = -ENOMEM;
if (!access_ok(buffer, count))
return -EFAULT;
spin_lock_irqsave(&hidg->write_spinlo... | 18,722,974,638,875,233,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2019-14763 | In the Linux kernel before 4.16.4, a double-locking error in drivers/usb/dwc3/gadget.c may potentially cause a deadlock with f_hid. | https://nvd.nist.gov/vuln/detail/CVE-2019-14763 |
4,463 | ImageMagick6 | 1ddcf2e4f28029a888cadef2e757509ef5047ad8 | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick/commit/1ddcf2e4f28029a888cadef2e757509ef5047ad8 | None | 1 | MagickExport void RemoveDuplicateLayers(Image **images,
ExceptionInfo *exception)
{
register Image
*curr,
*next;
RectangleInfo
bounds;
assert((*images) != (const Image *) NULL);
assert((*images)->signature == MagickCoreSignature);
if ((*images)->debug != MagickFalse)
(void) LogMag... | 310,600,417,952,627,740,000,000,000,000,000,000,000 | layer.c | 59,494,479,781,036,230,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2019-13454 | ImageMagick 7.0.8-54 Q16 allows Division by Zero in RemoveDuplicateLayers in MagickCore/layer.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-13454 |
4,465 | ImageMagick6 | 7c2c5ba5b8e3a0b2b82f56c71dfab74ed4006df7 | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick/commit/7c2c5ba5b8e3a0b2b82f56c71dfab74ed4006df7 | None | 1 | MagickExport Image *ComplexImages(const Image *images,const ComplexOperator op,
ExceptionInfo *exception)
{
#define ComplexImageTag "Complex/Image"
CacheView
*Ai_view,
*Ar_view,
*Bi_view,
*Br_view,
*Ci_view,
*Cr_view;
const char
*artifact;
const Image
*Ai_image,
*Ar_image... | 215,062,495,765,014,500,000,000,000,000,000,000,000 | fourier.c | 226,470,859,563,935,540,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-13391 | In ImageMagick 7.0.8-50 Q16, ComplexImages in MagickCore/fourier.c has a heap-based buffer over-read because of incorrect calls to GetCacheViewVirtualPixels. | https://nvd.nist.gov/vuln/detail/CVE-2019-13391 |
4,466 | ImageMagick6 | 4a334bbf5584de37c6f5a47c380a531c8c4b140a | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick/commit/4a334bbf5584de37c6f5a47c380a531c8c4b140a | None | 1 | WandExport MagickBooleanType MogrifyImageList(ImageInfo *image_info,
const int argc,const char **argv,Image **images,ExceptionInfo *exception)
{
const char
*option;
ImageInfo
*mogrify_info;
MagickStatusType
status;
PixelInterpolateMethod
interpolate_method;
QuantizeInfo
*quantize_info... | 261,737,277,868,569,700,000,000,000,000,000,000,000 | mogrify.c | 267,856,201,129,586,840,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2019-13311 | ImageMagick 7.0.8-50 Q16 has memory leaks at AcquireMagickMemory because of a wand/mogrify.c error. | https://nvd.nist.gov/vuln/detail/CVE-2019-13311 |
4,468 | ImageMagick6 | 5f21230b657ccd65452dd3d94c5b5401ba691a2d | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d | None | 1 | WandExport MagickBooleanType MogrifyImageList(ImageInfo *image_info,
const int argc,const char **argv,Image **images,ExceptionInfo *exception)
{
const char
*option;
ImageInfo
*mogrify_info;
MagickStatusType
status;
PixelInterpolateMethod
interpolate_method;
QuantizeInfo
*quantize_info... | 56,586,835,940,470,490,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2019-13310 | ImageMagick 7.0.8-50 Q16 has memory leaks at AcquireMagickMemory because of an error in MagickWand/mogrify.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-13310 |
4,469 | ImageMagick6 | 5f21230b657ccd65452dd3d94c5b5401ba691a2d | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick/commit/5f21230b657ccd65452dd3d94c5b5401ba691a2d | None | 1 | WandPrivate MagickBooleanType CLIListOperatorImages(MagickCLI *cli_wand,
const char *option,const char *arg1n,const char *arg2n)
{
const char /* percent escaped versions of the args */
*arg1,
*arg2;
Image
*new_images;
MagickStatusType
status;
ssize_t
parse;
#define _image_info (... | 154,589,151,942,532,500,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2019-13310 | ImageMagick 7.0.8-50 Q16 has memory leaks at AcquireMagickMemory because of an error in MagickWand/mogrify.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-13310 |
4,470 | ImageMagick6 | 61135001a625364e29bdce83832f043eebde7b5a | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick/commit/61135001a625364e29bdce83832f043eebde7b5a | None | 1 | MagickExport Image *ComplexImages(const Image *images,const ComplexOperator op,
ExceptionInfo *exception)
{
#define ComplexImageTag "Complex/Image"
CacheView
*Ai_view,
*Ar_view,
*Bi_view,
*Br_view,
*Ci_view,
*Cr_view;
const char
*artifact;
const Image
*Ai_image,
*Ar_image... | 19,704,003,200,428,535,000,000,000,000,000,000,000 | fourier.c | 339,766,886,036,792,560,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2019-13308 | ImageMagick 7.0.8-50 Q16 has a heap-based buffer overflow in MagickCore/fourier.c in ComplexImage. | https://nvd.nist.gov/vuln/detail/CVE-2019-13308 |
4,472 | ImageMagick6 | 025e77fcb2f45b21689931ba3bf74eac153afa48 | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick/commit/025e77fcb2f45b21689931ba3bf74eac153afa48 | None | 1 | static PixelChannels **AcquirePixelThreadSet(const Image *images)
{
const Image
*next;
PixelChannels
**pixels;
register ssize_t
i;
size_t
columns,
number_threads;
number_threads=(size_t) GetMagickResourceLimit(ThreadResource);
pixels=(PixelChannels **) AcquireQuantumMemory(number... | 278,819,893,071,001,940,000,000,000,000,000,000,000 | statistic.c | 80,018,803,613,585,420,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2019-13307 | ImageMagick 7.0.8-50 Q16 has a heap-based buffer overflow at MagickCore/statistic.c in EvaluateImages because of mishandling rows. | https://nvd.nist.gov/vuln/detail/CVE-2019-13307 |
4,473 | ImageMagick6 | a906fe9298bf89e01d5272023db687935068849a | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick/commit/a906fe9298bf89e01d5272023db687935068849a | None | 1 | static PixelChannels **AcquirePixelThreadSet(const Image *image)
{
PixelChannels
**pixels;
register ssize_t
i;
size_t
number_threads;
number_threads=(size_t) GetMagickResourceLimit(ThreadResource);
pixels=(PixelChannels **) AcquireQuantumMemory(number_threads,
sizeof(*pixels));
... | 62,466,630,452,413,280,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2019-13300 | ImageMagick 7.0.8-50 Q16 has a heap-based buffer overflow at MagickCore/statistic.c in EvaluateImages because of mishandling columns. | https://nvd.nist.gov/vuln/detail/CVE-2019-13300 |
4,474 | ImageMagick6 | 604588fc35c7585abb7a9e71f69bb82e4389fefc | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick/commit/604588fc35c7585abb7a9e71f69bb82e4389fefc | None | 1 | MagickExport Image *AdaptiveThresholdImage(const Image *image,
const size_t width,const size_t height,const double bias,
ExceptionInfo *exception)
{
#define AdaptiveThresholdImageTag "AdaptiveThreshold/Image"
CacheView
*image_view,
*threshold_view;
Image
*threshold_image;
MagickBooleanType
... | 212,875,349,161,019,100,000,000,000,000,000,000,000 | threshold.c | 148,404,985,148,536,100,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-13297 | ImageMagick 7.0.8-50 Q16 has a heap-based buffer over-read at MagickCore/threshold.c in AdaptiveThresholdImage because a height of zero is mishandled. | https://nvd.nist.gov/vuln/detail/CVE-2019-13297 |
4,475 | ImageMagick | 55e6dc49f1a381d9d511ee2f888fdc3e3c3e3953 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick6/commit/55e6dc49f1a381d9d511ee2f888fdc3e3c3e3953 | None | 1 | MagickExport Image *AdaptiveThresholdImage(const Image *image,
const size_t width,const size_t height,const ssize_t offset,
ExceptionInfo *exception)
{
#define ThresholdImageTag "Threshold/Image"
CacheView
*image_view,
*threshold_view;
Image
*threshold_image;
MagickBooleanType
status;
M... | 327,060,304,646,736,800,000,000,000,000,000,000,000 | threshold.c | 92,873,204,867,266,100,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-13295 | ImageMagick 7.0.8-50 Q16 has a heap-based buffer over-read at MagickCore/threshold.c in AdaptiveThresholdImage because a width of zero is mishandled. | https://nvd.nist.gov/vuln/detail/CVE-2019-13295 |
4,476 | ImageMagick | 1e59b29e520d2beab73e8c78aacd5f1c0d76196d | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick6/commit/1e59b29e520d2beab73e8c78aacd5f1c0d76196d | None | 1 | static Image *ReadCUTImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
#define ThrowCUTReaderException(severity,tag) \
{ \
if (palette != NULL) \
palette=DestroyImage(palette); \
if (clone_info != NULL) \
clone_info=DestroyImageInfo(clone_info); \
ThrowReaderException(severity,tag); \
}
Ima... | 261,271,325,794,813,800,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2019-13135 | ImageMagick before 7.0.8-50 has a "use of uninitialized value" vulnerability in the function ReadCUTImage in coders/cut.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-13135 |
4,482 | miniupnp | 86030db849260dd8fb2ed975b9890aef1b62b692 | https://github.com/miniupnp/miniupnp | https://github.com/miniupnp/miniupnp/commit/86030db849260dd8fb2ed975b9890aef1b62b692 | fix error from commit 13585f15c7f7dc28bbbba1661efb280d530d114c | 1 | GetOutboundPinholeTimeout(struct upnphttp * h, const char * action, const char * ns)
{
int r;
static const char resp[] =
"<u:%sResponse "
"xmlns:u=\"%s\">"
"<OutboundPinholeTimeout>%d</OutboundPinholeTimeout>"
"</u:%sResponse>";
char body[512];
int bodylen;
struct NameValueParserData data;
char * int_ip... | 189,077,583,638,678,540,000,000,000,000,000,000,000 | upnpsoap.c | 43,985,210,412,667,610,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2019-12109 | A Denial Of Service vulnerability in MiniUPnP MiniUPnPd through 2.1 exists due to a NULL pointer dereference in GetOutboundPinholeTimeout in upnpsoap.c for rem_port. | https://nvd.nist.gov/vuln/detail/CVE-2019-12109 |
4,483 | linux | 6b3a707736301c2128ca85ce85fb13f60b5e350a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6b3a707736301c2128ca85ce85fb13f60b5e350a | Merge branch 'page-refs' (page ref overflow)
Merge page ref overflow branch.
Jann Horn reported that he can overflow the page ref count with
sufficient memory (and a filesystem that is intentionally extremely
slow).
Admittedly it's not exactly easy. To have more than four billion
references to a page requires a min... | 1 | static ssize_t fuse_dev_splice_write(struct pipe_inode_info *pipe,
struct file *out, loff_t *ppos,
size_t len, unsigned int flags)
{
unsigned nbuf;
unsigned idx;
struct pipe_buffer *bufs;
struct fuse_copy_state cs;
struct fuse_dev *fud;
size_t rem;
ssize_t ret;
fud = fuse_get_dev(out);
if (!... | 86,844,860,026,443,000,000,000,000,000,000,000,000 | dev.c | 146,766,077,963,326,700,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2019-11487 | The Linux kernel before 5.1-rc5 allows page->_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur w... | https://nvd.nist.gov/vuln/detail/CVE-2019-11487 |
4,484 | linux | 6b3a707736301c2128ca85ce85fb13f60b5e350a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6b3a707736301c2128ca85ce85fb13f60b5e350a | Merge branch 'page-refs' (page ref overflow)
Merge page ref overflow branch.
Jann Horn reported that he can overflow the page ref count with
sufficient memory (and a filesystem that is intentionally extremely
slow).
Admittedly it's not exactly easy. To have more than four billion
references to a page requires a min... | 1 | void generic_pipe_buf_get(struct pipe_inode_info *pipe, struct pipe_buffer *buf)
{
get_page(buf->page);
}
| 312,685,732,251,810,900,000,000,000,000,000,000,000 | pipe.c | 102,189,005,623,994,540,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2019-11487 | The Linux kernel before 5.1-rc5 allows page->_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur w... | https://nvd.nist.gov/vuln/detail/CVE-2019-11487 |
4,487 | linux | 6b3a707736301c2128ca85ce85fb13f60b5e350a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6b3a707736301c2128ca85ce85fb13f60b5e350a | Merge branch 'page-refs' (page ref overflow)
Merge page ref overflow branch.
Jann Horn reported that he can overflow the page ref count with
sufficient memory (and a filesystem that is intentionally extremely
slow).
Admittedly it's not exactly easy. To have more than four billion
references to a page requires a min... | 1 | static void buffer_pipe_buf_get(struct pipe_inode_info *pipe,
struct pipe_buffer *buf)
{
struct buffer_ref *ref = (struct buffer_ref *)buf->private;
ref->ref++;
}
| 60,451,291,240,657,920,000,000,000,000,000,000,000 | trace.c | 20,504,281,239,694,024,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2019-11487 | The Linux kernel before 5.1-rc5 allows page->_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur w... | https://nvd.nist.gov/vuln/detail/CVE-2019-11487 |
4,496 | FFmpeg | 1f686d023b95219db933394a7704ad9aa5f01cbb | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/1f686d023b95219db933394a7704ad9aa5f01cbb | avcodec/mpeg4videodec: Clear interlaced_dct for studio profile
Fixes: Out of array access
Fixes: 13090/clusterfuzz-testcase-minimized-ffmpeg_AV_CODEC_ID_MPEG4_fuzzer-5408668986638336
Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/projects/ffmpeg
Reviewed-by: Kieran Kunhya <kierank... | 1 | static int decode_studio_vop_header(Mpeg4DecContext *ctx, GetBitContext *gb)
{
MpegEncContext *s = &ctx->m;
if (get_bits_left(gb) <= 32)
return 0;
s->partitioned_frame = 0;
s->decode_mb = mpeg4_decode_studio_mb;
decode_smpte_tc(ctx, gb);
skip_bits(gb, 10); /* temporal_reference... | 204,823,687,192,060,740,000,000,000,000,000,000,000 | mpeg4videodec.c | 311,209,441,877,484,500,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-11339 | The studio profile decoder in libavcodec/mpeg4videodec.c in FFmpeg 4.0 before 4.0.4 and 4.1 before 4.1.2 allows remote attackers to cause a denial of service (out-of-array access) or possibly have unspecified other impact via crafted MPEG-4 video data. | https://nvd.nist.gov/vuln/detail/CVE-2019-11339 |
4,497 | ImageMagick | 07eebcd72f45c8fd7563d3f9ec5d2bed48f65f36 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/07eebcd72f45c8fd7563d3f9ec5d2bed48f65f36 | ... | 1 | MagickExport int LocaleLowercase(const int c)
{
#if defined(MAGICKCORE_LOCALE_SUPPORT)
if (c_locale != (locale_t) NULL)
return(tolower_l(c,c_locale));
#endif
return(tolower(c));
}
| 44,140,332,928,912,330,000,000,000,000,000,000,000 | locale.c | 259,207,606,297,916,680,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-10714 | LocaleLowercase in MagickCore/locale.c in ImageMagick before 7.0.8-32 allows out-of-bounds access, leading to a SIGSEGV. | https://nvd.nist.gov/vuln/detail/CVE-2019-10714 |
4,499 | ImageMagick | 58d9c46929ca0828edde34d263700c3a5fe8dc3c | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/58d9c46929ca0828edde34d263700c3a5fe8dc3c | ... | 1 | MagickExport int LocaleLowercase(const int c)
{
if (c < 0)
return(c);
#if defined(MAGICKCORE_LOCALE_SUPPORT)
if (c_locale != (locale_t) NULL)
return(tolower_l((int) ((unsigned char) c),c_locale));
#endif
return(tolower((int) ((unsigned char) c)));
}
| 281,269,707,960,595,000,000,000,000,000,000,000,000 | locale.c | 280,458,419,050,800,300,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-10714 | LocaleLowercase in MagickCore/locale.c in ImageMagick before 7.0.8-32 allows out-of-bounds access, leading to a SIGSEGV. | https://nvd.nist.gov/vuln/detail/CVE-2019-10714 |
4,510 | openjpeg | 5d00b719f4b93b1445e6fb4c766b9a9883c57949 | https://github.com/uclouvain/openjpeg | https://github.com/uclouvain/openjpeg/commit/5d00b719f4b93b1445e6fb4c766b9a9883c57949 | [trunk] fixed a buffer overflow in opj_tcd_init_decode_tile
Update issue 431 | 1 | void opj_get_all_encoding_parameters( const opj_image_t *p_image,
const opj_cp_t *p_cp,
OPJ_UINT32 tileno,
OPJ_INT32 * p_tx0,
OPJ_INT32 * p_tx1,
... | 279,071,337,625,763,900,000,000,000,000,000,000,000 | pi.c | 61,290,128,435,409,710,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2018-20847 | An improper computation of p_tx0, p_tx1, p_ty0 and p_ty1 in the function opj_get_encoding_parameters in openjp2/pi.c in OpenJPEG through 2.3.0 can lead to an integer overflow. | https://nvd.nist.gov/vuln/detail/CVE-2018-20847 |
4,511 | linux | 5c25f65fd1e42685f7ccd80e0621829c105785d9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/5c25f65fd1e42685f7ccd80e0621829c105785d9 | tun: allow positive return values on dev_get_valid_name() call
If the name argument of dev_get_valid_name() contains "%d", it will try
to assign it a unit number in __dev__alloc_name() and return either the
unit number (>= 0) or an error code (< 0).
Considering positive values as error values prevent tun device creati... | 1 | static int tun_set_iff(struct net *net, struct file *file, struct ifreq *ifr)
{
struct tun_struct *tun;
struct tun_file *tfile = file->private_data;
struct net_device *dev;
int err;
if (tfile->detached)
return -EINVAL;
dev = __dev_get_by_name(net, ifr->ifr_name);
if (dev) {
if (ifr->ifr_flags & IFF_TUN_EXC... | 55,157,606,478,905,350,000,000,000,000,000,000,000 | tun.c | 129,036,952,106,696,010,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2018-7191 | In the tun subsystem in the Linux kernel before 4.13.14, dev_get_valid_name is not called before register_netdevice. This allows local users to cause a denial of service (NULL pointer dereference and panic) via an ioctl(TUNSETIFF) call with a dev name containing a / character. This is similar to CVE-2013-4343. | https://nvd.nist.gov/vuln/detail/CVE-2018-7191 |
4,694 | Chrome | 7d8cefdf6d0e457b7a855c9503684f1058c2a356 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/7d8cefdf6d0e457b7a855c9503684f1058c2a356 | None | 1 | WebGLObject::WebGLObject(WebGLRenderingContext* context)
: m_object(0)
, m_attachmentCount(0)
, m_deleted(false)
{
}
| 113,581,393,010,610,800,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-3916 | Google Chrome before 16.0.912.63 does not properly handle PDF cross references, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2011-3916 |
4,803 | Chrome | d662b905d30cec7899bbb15140dcfacd73506167 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/d662b905d30cec7899bbb15140dcfacd73506167 | None | 1 | BlockedPluginInfoBarDelegate::BlockedPluginInfoBarDelegate(
TabContents* tab_contents,
const string16& utf16_name)
: PluginInfoBarDelegate(tab_contents, utf16_name) {
UserMetrics::RecordAction(UserMetricsAction("BlockedPluginInfobar.Shown"));
std::string name = UTF16ToUTF8(utf16_name);
if (name == web... | 129,354,267,864,543,600,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2011-2836 | Google Chrome before 14.0.835.163 does not require Infobar interaction before use of the Windows Media Player plug-in, which makes it easier for remote attackers to have an unspecified impact via crafted Flash content. | https://nvd.nist.gov/vuln/detail/CVE-2011-2836 |
4,807 | Chrome | d304b5ec1b16766ea2cb552a27dc14df848d6a0e | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/d304b5ec1b16766ea2cb552a27dc14df848d6a0e | None | 1 | void FFmpegVideoDecodeEngine::Initialize(
MessageLoop* message_loop,
VideoDecodeEngine::EventHandler* event_handler,
VideoDecodeContext* context,
const VideoDecoderConfig& config) {
static const int kDecodeThreads = 2;
static const int kMaxDecodeThreads = 16;
codec_context_ = avcodec_alloc_contex... | 158,059,457,852,489,340,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-2843 | Google Chrome before 14.0.835.163 does not properly handle media buffers, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2011-2843 |
4,811 | Chrome | 52dac009556881941c60d378e34867cdb2fd00a0 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/52dac009556881941c60d378e34867cdb2fd00a0 | None | 1 | FilePath ExtensionPrefs::GetExtensionPath(const std::string& extension_id) {
const DictionaryValue* dict = GetExtensionPref(extension_id);
std::string path;
if (!dict->GetString(kPrefPath, &path))
return FilePath();
return install_directory_.Append(FilePath::FromWStringHack(UTF8ToWide(path)));
}
| 39,958,822,954,185,000,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-3234 | Google Chrome before 14.0.835.163 does not properly handle boxes, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2011-3234 |
4,816 | Chrome | 7155d7caafd2aa1fb822dc5672c90ea446247e8d | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/7155d7caafd2aa1fb822dc5672c90ea446247e8d | None | 1 | void ScaleYUVToRGB32(const uint8* y_buf,
const uint8* u_buf,
const uint8* v_buf,
uint8* rgb_buf,
int source_width,
int source_height,
int width,
int height,
... | 253,694,277,743,522,000,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-2851 | Google Chrome before 14.0.835.163 does not properly handle video, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2011-2851 |
4,817 | Chrome | d82e91c46938520466e9d7c695e0bc638fc70970 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/d82e91c46938520466e9d7c695e0bc638fc70970 | None | 1 | NativeBrowserFrame* NativeBrowserFrame::CreateNativeBrowserFrame(
BrowserFrame* browser_frame,
BrowserView* browser_view) {
if (views::Widget::IsPureViews())
return new BrowserFrameViews(browser_frame, browser_view);
return new BrowserFrameGtk(browser_frame, browser_view);
}
| 284,461,539,438,023,930,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2011-2853 | Use-after-free vulnerability in Google Chrome before 14.0.835.163 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to plug-in handling. | https://nvd.nist.gov/vuln/detail/CVE-2011-2853 |
4,819 | Chrome | 061ddbae1ee31476b57ea44a953970ab2fe8aca1 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/061ddbae1ee31476b57ea44a953970ab2fe8aca1 | None | 1 | void DocumentWriter::setDecoder(TextResourceDecoder* decoder)
{
m_decoder = decoder;
}
| 124,821,018,363,863,960,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2011-2854 | Use-after-free vulnerability in Google Chrome before 14.0.835.163 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to "ruby / table style handing." | https://nvd.nist.gov/vuln/detail/CVE-2011-2854 |
4,820 | Chrome | 3a766e0115e9799db766a88554b9ab12ee5bf2a4 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/3a766e0115e9799db766a88554b9ab12ee5bf2a4 | None | 1 | xmlXPathCompOpEval(xmlXPathParserContextPtr ctxt, xmlXPathStepOpPtr op)
{
int total = 0;
int equal, ret;
xmlXPathCompExprPtr comp;
xmlXPathObjectPtr arg1, arg2;
xmlNodePtr bak;
xmlDocPtr bakd;
int pp;
int cs;
CHECK_ERROR0;
comp = ctxt->comp;
switch (op->op) {
case XP... | 152,834,258,874,192,350,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2011-2834 | Double free vulnerability in libxml2, as used in Google Chrome before 14.0.835.163, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to XPath handling. | https://nvd.nist.gov/vuln/detail/CVE-2011-2834 |
4,821 | Chrome | 454434f6100cb6a529652a25b5fc181caa7c7f32 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/454434f6100cb6a529652a25b5fc181caa7c7f32 | None | 1 | bool ExtensionService::IsDownloadFromGallery(const GURL& download_url,
const GURL& referrer_url) {
if (IsDownloadFromMiniGallery(download_url) &&
StartsWithASCII(referrer_url.spec(),
extension_urls::kMiniGalleryBrowsePrefix, false)) {
retu... | 110,603,712,723,080,350,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2011-2859 | Google Chrome before 14.0.835.163 uses incorrect permissions for non-gallery pages, which has unspecified impact and attack vectors. | https://nvd.nist.gov/vuln/detail/CVE-2011-2859 |
4,822 | Chrome | 6c390601f9ee3436bb32f84772977570265982ea | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/6c390601f9ee3436bb32f84772977570265982ea | None | 1 | bool ContainerNode::replaceChild(PassRefPtr<Node> newChild, Node* oldChild, ExceptionCode& ec, bool shouldLazyAttach)
{
ASSERT(refCount() || parentOrHostNode());
RefPtr<Node> protect(this);
ec = 0;
if (oldChild == newChild) // nothing to do
return true;
checkReplaceChild(newChild.get(), ... | 226,083,901,999,659,320,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2011-2860 | Use-after-free vulnerability in Google Chrome before 14.0.835.163 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to table styles. | https://nvd.nist.gov/vuln/detail/CVE-2011-2860 |
4,829 | Chrome | 5b65968b6c64fa02e74ca6b965bf5998b911e826 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/5b65968b6c64fa02e74ca6b965bf5998b911e826 | None | 1 | bool SubsetterImpl::ResolveCompositeGlyphs(const unsigned int* glyph_ids,
size_t glyph_count,
IntegerSet* glyph_id_processed) {
if (glyph_ids == NULL || glyph_count == 0 || glyph_id_processed == NULL) {
return false;
}
Glyp... | 88,383,665,204,444,790,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-2864 | Google Chrome before 14.0.835.163 does not properly handle Tibetan characters, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2011-2864 |
4,860 | Chrome | a64c3cf0ab6da24a9a010a45ebe4794422d40c71 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/a64c3cf0ab6da24a9a010a45ebe4794422d40c71 | None | 1 | GURL URLFixerUpper::FixupRelativeFile(const FilePath& base_dir,
const FilePath& text) {
FilePath old_cur_directory;
if (!base_dir.empty()) {
file_util::GetCurrentDirectory(&old_cur_directory);
file_util::SetCurrentDirectory(base_dir);
}
FilePath::StringType trimmed... | 102,425,623,880,400,520,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2011-2822 | Google Chrome before 13.0.782.215 on Windows does not properly parse URLs located on the command line, which has unspecified impact and attack vectors. | https://nvd.nist.gov/vuln/detail/CVE-2011-2822 |
4,861 | Chrome | c9911bc93097a5df5518f5b88e1d5ed5ef275a4d | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/c9911bc93097a5df5518f5b88e1d5ed5ef275a4d | None | 1 | xmlXPathCompOpEvalPositionalPredicate(xmlXPathParserContextPtr ctxt,
xmlXPathStepOpPtr op,
xmlNodeSetPtr set,
int contextSize,
int minPos,
int maxPos,
int hasNsNodes)
{
if (op->ch1 != -1) {
xmlXPathCompExprPtr comp = ctxt->comp;
if (comp->steps[op->ch1].... | 195,728,010,268,250,480,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2011-2821 | Double free vulnerability in libxml2, as used in Google Chrome before 13.0.782.215, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted XPath expression. | https://nvd.nist.gov/vuln/detail/CVE-2011-2821 |
4,862 | Chrome | 01e4ee2fda0a5e57a8d0c8cb829022eb84fdff12 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/01e4ee2fda0a5e57a8d0c8cb829022eb84fdff12 | None | 1 | static PassRefPtr<CSSValue> getPositionOffsetValue(RenderStyle* style, CSSPropertyID propertyID, RenderView* renderView)
{
if (!style)
return 0;
Length l;
switch (propertyID) {
case CSSPropertyLeft:
l = style->left();
break;
case CSSPropertyRight:
... | 261,655,135,801,417,640,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-2806 | Google Chrome before 13.0.782.215 on Windows does not properly handle vertex data, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2011-2806 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.