idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
160,001 | tcpdump | 877b66b398518d9501513e0860c9f3a8acc70892 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/877b66b398518d9501513e0860c9f3a8acc70892 | CVE-2017-13010/BEEP: Do bounds checking when comparing strings.
This fixes a buffer over-read discovered by Brian 'geeknik' Carpenter.
Add a test using the capture file supplied by the reporter(s). | 0 | l_strnstart(const char *tstr1, u_int tl1, const char *str2, u_int l2)
l_strnstart(netdissect_options *ndo, const char *tstr1, u_int tl1,
const char *str2, u_int l2)
{
if (!ND_TTEST2(*str2, tl1)) {
/*
* We don't have tl1 bytes worth of captured data
* for the string, so we can't check for this
* string.... | 57,469,393,399,590,880,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2017-13010 | The BEEP parser in tcpdump before 4.9.2 has a buffer over-read in print-beep.c:l_strnstart(). | https://nvd.nist.gov/vuln/detail/CVE-2017-13010 |
2,577 | tcpdump | ca336198e8bebccc18502de27672fdbd6eb34856 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/ca336198e8bebccc18502de27672fdbd6eb34856 | CVE-2017-13007/PKTAP: Pass a properly updated struct pcap_pkthdr to the sub-dissector.
The sub-dissector expects that the length and captured length will
reflect the actual remaining data in the packet, not the raw amount
including the PKTAP header; pass an updated header, just as we do for
PPI.
This fixes a buffer o... | 1 | pktap_if_print(netdissect_options *ndo,
const struct pcap_pkthdr *h, const u_char *p)
{
uint32_t dlt, hdrlen, rectype;
u_int caplen = h->caplen;
u_int length = h->len;
if_printer printer;
const pktap_header_t *hdr;
if (caplen < sizeof(pktap_header_t) || length < sizeof(pktap_header_t)) {
N... | 200,408,431,775,823,500,000,000,000,000,000,000,000 | print-pktap.c | 242,050,816,181,732,100,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-13007 | The Apple PKTAP parser in tcpdump before 4.9.2 has a buffer over-read in print-pktap.c:pktap_if_print(). | https://nvd.nist.gov/vuln/detail/CVE-2017-13007 |
160,002 | tcpdump | ca336198e8bebccc18502de27672fdbd6eb34856 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/ca336198e8bebccc18502de27672fdbd6eb34856 | CVE-2017-13007/PKTAP: Pass a properly updated struct pcap_pkthdr to the sub-dissector.
The sub-dissector expects that the length and captured length will
reflect the actual remaining data in the packet, not the raw amount
including the PKTAP header; pass an updated header, just as we do for
PPI.
This fixes a buffer o... | 0 | pktap_if_print(netdissect_options *ndo,
const struct pcap_pkthdr *h, const u_char *p)
{
uint32_t dlt, hdrlen, rectype;
u_int caplen = h->caplen;
u_int length = h->len;
if_printer printer;
const pktap_header_t *hdr;
struct pcap_pkthdr nhdr;
if (caplen < sizeof(pktap_header_t) || length < size... | 262,883,133,461,274,900,000,000,000,000,000,000,000 | print-pktap.c | 35,341,349,066,887,046,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-13007 | The Apple PKTAP parser in tcpdump before 4.9.2 has a buffer over-read in print-pktap.c:pktap_if_print(). | https://nvd.nist.gov/vuln/detail/CVE-2017-13007 |
2,591 | tcpdump | b45a9a167ca6a3ef2752ae9d48d56ac14b001bfd | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/b45a9a167ca6a3ef2752ae9d48d56ac14b001bfd | CVE-2017-13005/NFS: Add two bounds checks before fetching data
This fixes a buffer over-read discovered by Kamil Frankowicz.
Add a test using the capture file supplied by the reporter(s). | 1 | xid_map_enter(netdissect_options *ndo,
const struct sunrpc_msg *rp, const u_char *bp)
{
const struct ip *ip = NULL;
const struct ip6_hdr *ip6 = NULL;
struct xid_map_entry *xmep;
if (!ND_TTEST(rp->rm_call.cb_vers))
return (0);
switch (IP_V((const struct ip *)bp)) {
case 4:
ip = (const struct ip ... | 55,998,268,801,158,500,000,000,000,000,000,000,000 | print-nfs.c | 325,597,668,871,085,650,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-13005 | The NFS parser in tcpdump before 4.9.2 has a buffer over-read in print-nfs.c:xid_map_enter(). | https://nvd.nist.gov/vuln/detail/CVE-2017-13005 |
160,016 | tcpdump | b45a9a167ca6a3ef2752ae9d48d56ac14b001bfd | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/b45a9a167ca6a3ef2752ae9d48d56ac14b001bfd | CVE-2017-13005/NFS: Add two bounds checks before fetching data
This fixes a buffer over-read discovered by Kamil Frankowicz.
Add a test using the capture file supplied by the reporter(s). | 0 | xid_map_enter(netdissect_options *ndo,
const struct sunrpc_msg *rp, const u_char *bp)
{
const struct ip *ip = NULL;
const struct ip6_hdr *ip6 = NULL;
struct xid_map_entry *xmep;
if (!ND_TTEST(rp->rm_call.cb_vers))
return (0);
switch (IP_V((const struct ip *)bp)) {
case 4:
ip = (const struct ip ... | 128,880,981,466,532,620,000,000,000,000,000,000,000 | print-nfs.c | 112,298,469,328,596,440,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-13005 | The NFS parser in tcpdump before 4.9.2 has a buffer over-read in print-nfs.c:xid_map_enter(). | https://nvd.nist.gov/vuln/detail/CVE-2017-13005 |
2,593 | tcpdump | cbddb98484ea8ec1deece351abd56e063d775b38 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/cbddb98484ea8ec1deece351abd56e063d775b38 | CVE-2017-13002/AODV: Add some missing bounds checks.
In aodv_extension() do a bounds check on the extension header before we
look at it.
This fixes a buffer over-read discovered by Kamil Frankowicz.
Add a test using the capture file supplied by the reporter(s).
While we're at it, add the RFC number, and check the v... | 1 | aodv_extension(netdissect_options *ndo,
const struct aodv_ext *ep, u_int length)
{
const struct aodv_hello *ah;
switch (ep->type) {
case AODV_EXT_HELLO:
ah = (const struct aodv_hello *)(const void *)ep;
ND_TCHECK(*ah);
if (length < sizeof(struct aodv_hello))
goto trunc;
ND_PRINT(... | 90,330,714,944,185,620,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2017-13002 | The AODV parser in tcpdump before 4.9.2 has a buffer over-read in print-aodv.c:aodv_extension(). | https://nvd.nist.gov/vuln/detail/CVE-2017-13002 |
160,017 | tcpdump | cbddb98484ea8ec1deece351abd56e063d775b38 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/cbddb98484ea8ec1deece351abd56e063d775b38 | CVE-2017-13002/AODV: Add some missing bounds checks.
In aodv_extension() do a bounds check on the extension header before we
look at it.
This fixes a buffer over-read discovered by Kamil Frankowicz.
Add a test using the capture file supplied by the reporter(s).
While we're at it, add the RFC number, and check the v... | 0 | aodv_extension(netdissect_options *ndo,
const struct aodv_ext *ep, u_int length)
{
const struct aodv_hello *ah;
ND_TCHECK(*ep);
switch (ep->type) {
case AODV_EXT_HELLO:
ah = (const struct aodv_hello *)(const void *)ep;
ND_TCHECK(*ah);
if (length < sizeof(struct aodv_hello))
goto tr... | 313,542,016,000,852,540,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2017-13002 | The AODV parser in tcpdump before 4.9.2 has a buffer over-read in print-aodv.c:aodv_extension(). | https://nvd.nist.gov/vuln/detail/CVE-2017-13002 |
2,594 | tcpdump | 7a923447fd49a069a0fd3b6c3547438ab5ee2123 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/7a923447fd49a069a0fd3b6c3547438ab5ee2123 | CVE-2017-13001/NFS: Don't copy more data than is in the file handle.
Also, put the buffer on the stack; no reason to make it static. (65
bytes isn't a lot.)
This fixes a buffer over-read discovered by Kamil Frankowicz.
Add a test using the capture file supplied by the reporter(s). | 1 | nfs_printfh(netdissect_options *ndo,
register const uint32_t *dp, const u_int len)
{
my_fsid fsid;
uint32_t ino;
const char *sfsname = NULL;
char *spacep;
if (ndo->ndo_uflag) {
u_int i;
char const *sep = "";
ND_PRINT((ndo, " fh["));
for (i=0; i<len; i++) {
ND_PRINT((ndo, "%s%x", sep, dp[i]... | 339,616,538,929,006,480,000,000,000,000,000,000,000 | print-nfs.c | 100,575,108,855,301,120,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-13001 | The NFS parser in tcpdump before 4.9.2 has a buffer over-read in print-nfs.c:nfs_printfh(). | https://nvd.nist.gov/vuln/detail/CVE-2017-13001 |
160,018 | tcpdump | 7a923447fd49a069a0fd3b6c3547438ab5ee2123 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/7a923447fd49a069a0fd3b6c3547438ab5ee2123 | CVE-2017-13001/NFS: Don't copy more data than is in the file handle.
Also, put the buffer on the stack; no reason to make it static. (65
bytes isn't a lot.)
This fixes a buffer over-read discovered by Kamil Frankowicz.
Add a test using the capture file supplied by the reporter(s). | 0 | nfs_printfh(netdissect_options *ndo,
register const uint32_t *dp, const u_int len)
{
my_fsid fsid;
uint32_t ino;
const char *sfsname = NULL;
char *spacep;
if (ndo->ndo_uflag) {
u_int i;
char const *sep = "";
ND_PRINT((ndo, " fh["));
for (i=0; i<len; i++) {
ND_PRINT((ndo, "%s%x", sep, dp[i]... | 240,668,251,093,714,700,000,000,000,000,000,000,000 | print-nfs.c | 325,597,668,871,085,650,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-13001 | The NFS parser in tcpdump before 4.9.2 has a buffer over-read in print-nfs.c:nfs_printfh(). | https://nvd.nist.gov/vuln/detail/CVE-2017-13001 |
2,595 | tcpdump | 8512734883227c11568bb35da1d48b9f8466f43f | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/8512734883227c11568bb35da1d48b9f8466f43f | CVE-2017-13000/IEEE 802.15.4: Fix bug introduced two fixes prior.
We've already advanced the pointer past the PAN ID, if present; it now
points to the address, so don't add 2 to it.
This fixes a buffer over-read discovered by Forcepoint's security
researchers Otto Airamo & Antti Levomäki.
Add a test using the captur... | 1 | ieee802_15_4_if_print(netdissect_options *ndo,
const struct pcap_pkthdr *h, const u_char *p)
{
u_int caplen = h->caplen;
u_int hdrlen;
uint16_t fc;
uint8_t seq;
uint16_t panid = 0;
if (caplen < 3) {
ND_PRINT((ndo, "[|802.15.4]"));
return caplen;
}
hdrlen = 3;
fc = EXTRACT_LE_16BITS(... | 226,608,746,932,513,560,000,000,000,000,000,000,000 | print-802_15_4.c | 288,503,972,323,871,480,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-13000 | The IEEE 802.15.4 parser in tcpdump before 4.9.2 has a buffer over-read in print-802_15_4.c:ieee802_15_4_if_print(). | https://nvd.nist.gov/vuln/detail/CVE-2017-13000 |
160,019 | tcpdump | 8512734883227c11568bb35da1d48b9f8466f43f | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/8512734883227c11568bb35da1d48b9f8466f43f | CVE-2017-13000/IEEE 802.15.4: Fix bug introduced two fixes prior.
We've already advanced the pointer past the PAN ID, if present; it now
points to the address, so don't add 2 to it.
This fixes a buffer over-read discovered by Forcepoint's security
researchers Otto Airamo & Antti Levomäki.
Add a test using the captur... | 0 | ieee802_15_4_if_print(netdissect_options *ndo,
const struct pcap_pkthdr *h, const u_char *p)
{
u_int caplen = h->caplen;
u_int hdrlen;
uint16_t fc;
uint8_t seq;
uint16_t panid = 0;
if (caplen < 3) {
ND_PRINT((ndo, "[|802.15.4]"));
return caplen;
}
hdrlen = 3;
fc = EXTRACT_LE_16BITS(... | 257,913,645,005,099,250,000,000,000,000,000,000,000 | print-802_15_4.c | 273,367,841,817,140,440,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-13000 | The IEEE 802.15.4 parser in tcpdump before 4.9.2 has a buffer over-read in print-802_15_4.c:ieee802_15_4_if_print(). | https://nvd.nist.gov/vuln/detail/CVE-2017-13000 |
2,598 | tcpdump | 3a76fd7c95fced2c2f8c8148a9055c3a542eff29 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/3a76fd7c95fced2c2f8c8148a9055c3a542eff29 | CVE-2017-12995/Check for DNS compression pointers that don't point backwards.
This is what BIND 9.11.0-P2 does; it not only detects pointers that
loop, as "point backwards" means "point before anything we've processed
so far, including what we're processing right now", so the pointer can't
point to itself (as that's w... | 1 | ns_nprint(netdissect_options *ndo,
register const u_char *cp, register const u_char *bp)
{
register u_int i, l;
register const u_char *rp = NULL;
register int compress = 0;
int chars_processed;
int elt;
int data_size = ndo->ndo_snapend - bp;
if ((l = labellen(ndo, cp)) == (u_int)-1)
return(NU... | 307,707,688,388,100,500,000,000,000,000,000,000,000 | print-domain.c | 48,636,011,061,912,920,000,000,000,000,000,000,000 | [
"CWE-835"
] | CVE-2017-12995 | The DNS parser in tcpdump before 4.9.2 could enter an infinite loop due to a bug in print-domain.c:ns_print(). | https://nvd.nist.gov/vuln/detail/CVE-2017-12995 |
160,020 | tcpdump | 3a76fd7c95fced2c2f8c8148a9055c3a542eff29 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/3a76fd7c95fced2c2f8c8148a9055c3a542eff29 | CVE-2017-12995/Check for DNS compression pointers that don't point backwards.
This is what BIND 9.11.0-P2 does; it not only detects pointers that
loop, as "point backwards" means "point before anything we've processed
so far, including what we're processing right now", so the pointer can't
point to itself (as that's w... | 0 | ns_nprint(netdissect_options *ndo,
register const u_char *cp, register const u_char *bp)
{
register u_int i, l;
register const u_char *rp = NULL;
register int compress = 0;
int elt;
u_int offset, max_offset;
if ((l = labellen(ndo, cp)) == (u_int)-1)
return(NULL);
if (!ND_TTEST2(*cp, 1))
r... | 262,481,142,418,601,870,000,000,000,000,000,000,000 | print-domain.c | 180,152,224,979,205,500,000,000,000,000,000,000,000 | [
"CWE-835"
] | CVE-2017-12995 | The DNS parser in tcpdump before 4.9.2 could enter an infinite loop due to a bug in print-domain.c:ns_print(). | https://nvd.nist.gov/vuln/detail/CVE-2017-12995 |
2,599 | tcpdump | ffde45acf3348f8353fb4064a1b21683ee6b5ddf | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/ffde45acf3348f8353fb4064a1b21683ee6b5ddf | CVE-2017-12994/BGP: Move a test inside a loop.
The loop can be executed more than once (that's kinda the whole point of
a loop), so the check has to be made each time through the loop, not
just once before the loop is executed.
Do some additional length checks while we're at it.
This fixes a buffer over-read discove... | 1 | bgp_attr_print(netdissect_options *ndo,
u_int atype, const u_char *pptr, u_int len)
{
int i;
uint16_t af;
uint8_t safi, snpa, nhlen;
union { /* copy buffer for bandwidth values */
float f;
uint32_t i;
} bw;
int advance;
u_int tlen;
const u_char *tptr;
char b... | 110,718,534,424,942,980,000,000,000,000,000,000,000 | print-bgp.c | 81,233,617,923,263,840,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-12994 | The BGP parser in tcpdump before 4.9.2 has a buffer over-read in print-bgp.c:bgp_attr_print(). | https://nvd.nist.gov/vuln/detail/CVE-2017-12994 |
160,021 | tcpdump | ffde45acf3348f8353fb4064a1b21683ee6b5ddf | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/ffde45acf3348f8353fb4064a1b21683ee6b5ddf | CVE-2017-12994/BGP: Move a test inside a loop.
The loop can be executed more than once (that's kinda the whole point of
a loop), so the check has to be made each time through the loop, not
just once before the loop is executed.
Do some additional length checks while we're at it.
This fixes a buffer over-read discove... | 0 | bgp_attr_print(netdissect_options *ndo,
u_int atype, const u_char *pptr, u_int len)
{
int i;
uint16_t af;
uint8_t safi, snpa, nhlen;
union { /* copy buffer for bandwidth values */
float f;
uint32_t i;
} bw;
int advance;
u_int tlen;
const u_char *tptr;
char b... | 170,730,597,488,739,560,000,000,000,000,000,000,000 | print-bgp.c | 252,144,078,047,607,820,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-12994 | The BGP parser in tcpdump before 4.9.2 has a buffer over-read in print-bgp.c:bgp_attr_print(). | https://nvd.nist.gov/vuln/detail/CVE-2017-12994 |
2,608 | tcpdump | e942fb84fbe3a73a98a00d2a279425872b5fb9d2 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/e942fb84fbe3a73a98a00d2a279425872b5fb9d2 | CVE-2017-12992/RIPng: Clean up bounds checking.
Do bounds checking as we access items.
Scan the list of netinfo6 entries based on the supplied packet length,
without taking the captured length into account; let the aforementioned
bounds checking handle that.
This fixes a buffer over-read discovered by Kamil Frankowi... | 1 | ripng_print(netdissect_options *ndo, const u_char *dat, unsigned int length)
{
register const struct rip6 *rp = (const struct rip6 *)dat;
register const struct netinfo6 *ni;
register u_int amt;
register u_int i;
int j;
int trunc;
if (ndo->ndo_snapend < dat)
return;
amt = ndo->ndo_snapend - dat;
i = min(le... | 219,968,970,773,034,400,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2017-12992 | The RIPng parser in tcpdump before 4.9.2 has a buffer over-read in print-ripng.c:ripng_print(). | https://nvd.nist.gov/vuln/detail/CVE-2017-12992 |
160,022 | tcpdump | e942fb84fbe3a73a98a00d2a279425872b5fb9d2 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/e942fb84fbe3a73a98a00d2a279425872b5fb9d2 | CVE-2017-12992/RIPng: Clean up bounds checking.
Do bounds checking as we access items.
Scan the list of netinfo6 entries based on the supplied packet length,
without taking the captured length into account; let the aforementioned
bounds checking handle that.
This fixes a buffer over-read discovered by Kamil Frankowi... | 0 | ripng_print(netdissect_options *ndo, const u_char *dat, unsigned int length)
{
register const struct rip6 *rp = (const struct rip6 *)dat;
register const struct netinfo6 *ni;
unsigned int length_left;
u_int j;
ND_TCHECK(rp->rip6_cmd);
switch (rp->rip6_cmd) {
case RIP6_REQUEST:
length_left = length;
i... | 131,872,674,482,666,930,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2017-12992 | The RIPng parser in tcpdump before 4.9.2 has a buffer over-read in print-ripng.c:ripng_print(). | https://nvd.nist.gov/vuln/detail/CVE-2017-12992 |
2,613 | tcpdump | db24063b01cba8e9d4d88b7d8ac70c9000c104e4 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/db24063b01cba8e9d4d88b7d8ac70c9000c104e4 | CVE-2017-12989/RESP: Make sure resp_get_length() advances the pointer for invalid lengths.
Make sure that it always sends *endp before returning and that, for
invalid lengths where we don't like a character in the length string,
what it sets *endp to is past the character in question, so we don't
run the risk of infin... | 1 | resp_get_length(netdissect_options *ndo, register const u_char *bp, int len, const u_char **endp)
{
int result;
u_char c;
int saw_digit;
int neg;
int too_large;
if (len == 0)
goto trunc;
ND_TCHECK(*bp);
too_large = 0;
neg = 0;
if (*bp == '-') {
neg = 1;
b... | 167,321,145,110,708,070,000,000,000,000,000,000,000 | print-resp.c | 272,971,736,668,673,780,000,000,000,000,000,000,000 | [
"CWE-835"
] | CVE-2017-12989 | The RESP parser in tcpdump before 4.9.2 could enter an infinite loop due to a bug in print-resp.c:resp_get_length(). | https://nvd.nist.gov/vuln/detail/CVE-2017-12989 |
160,023 | tcpdump | db24063b01cba8e9d4d88b7d8ac70c9000c104e4 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/db24063b01cba8e9d4d88b7d8ac70c9000c104e4 | CVE-2017-12989/RESP: Make sure resp_get_length() advances the pointer for invalid lengths.
Make sure that it always sends *endp before returning and that, for
invalid lengths where we don't like a character in the length string,
what it sets *endp to is past the character in question, so we don't
run the risk of infin... | 0 | resp_get_length(netdissect_options *ndo, register const u_char *bp, int len, const u_char **endp)
{
int result;
u_char c;
int saw_digit;
int neg;
int too_large;
if (len == 0)
goto trunc;
ND_TCHECK(*bp);
too_large = 0;
neg = 0;
if (*bp == '-') {
neg = 1;
b... | 174,015,953,829,241,470,000,000,000,000,000,000,000 | print-resp.c | 216,278,389,575,360,500,000,000,000,000,000,000,000 | [
"CWE-835"
] | CVE-2017-12989 | The RESP parser in tcpdump before 4.9.2 could enter an infinite loop due to a bug in print-resp.c:resp_get_length(). | https://nvd.nist.gov/vuln/detail/CVE-2017-12989 |
2,614 | tcpdump | 8934a7d6307267d301182f19ed162563717e29e3 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/8934a7d6307267d301182f19ed162563717e29e3 | CVE-2017-12988/TELNET: Add a missing bounds check.
This fixes a buffer over-read discovered by Forcepoint's security
researchers Otto Airamo & Antti Levomäki.
Add a test using the capture file supplied by the reporter(s). | 1 | telnet_parse(netdissect_options *ndo, const u_char *sp, u_int length, int print)
{
int i, x;
u_int c;
const u_char *osp, *p;
#define FETCH(c, sp, length) \
do { \
if (length < 1) \
goto pktend; \
ND_TCHECK(*sp); \
c = *sp++; \
length--; \
} while (0)
osp = sp;
FETCH(c, sp, length);
if (c != IAC)
... | 107,867,064,229,076,670,000,000,000,000,000,000,000 | print-telnet.c | 184,247,914,215,497,200,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-12988 | The telnet parser in tcpdump before 4.9.2 has a buffer over-read in print-telnet.c:telnet_parse(). | https://nvd.nist.gov/vuln/detail/CVE-2017-12988 |
160,024 | tcpdump | 8934a7d6307267d301182f19ed162563717e29e3 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/8934a7d6307267d301182f19ed162563717e29e3 | CVE-2017-12988/TELNET: Add a missing bounds check.
This fixes a buffer over-read discovered by Forcepoint's security
researchers Otto Airamo & Antti Levomäki.
Add a test using the capture file supplied by the reporter(s). | 0 | telnet_parse(netdissect_options *ndo, const u_char *sp, u_int length, int print)
{
int i, x;
u_int c;
const u_char *osp, *p;
#define FETCH(c, sp, length) \
do { \
if (length < 1) \
goto pktend; \
ND_TCHECK(*sp); \
c = *sp++; \
length--; \
} while (0)
osp = sp;
FETCH(c, sp, length);
if (c != IAC)
... | 207,077,938,237,960,200,000,000,000,000,000,000,000 | print-telnet.c | 16,798,107,899,324,310,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-12988 | The telnet parser in tcpdump before 4.9.2 has a buffer over-read in print-telnet.c:telnet_parse(). | https://nvd.nist.gov/vuln/detail/CVE-2017-12988 |
2,615 | openjpeg | baf0c1ad4572daa89caa3b12985bdd93530f0dd7 | https://github.com/uclouvain/openjpeg | https://github.com/uclouvain/openjpeg/commit/baf0c1ad4572daa89caa3b12985bdd93530f0dd7 | bmp_read_info_header(): reject bmp files with biBitCount == 0 (#983) | 1 | static OPJ_BOOL bmp_read_info_header(FILE* IN, OPJ_BITMAPINFOHEADER* header)
{
memset(header, 0, sizeof(*header));
/* INFO HEADER */
/* ------------- */
header->biSize = (OPJ_UINT32)getc(IN);
header->biSize |= (OPJ_UINT32)getc(IN) << 8;
header->biSize |= (OPJ_UINT32)getc(IN) << 16;
header->... | 165,457,040,852,911,900,000,000,000,000,000,000,000 | convertbmp.c | 197,193,176,428,127,820,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-12982 | The bmp_read_info_header function in bin/jp2/convertbmp.c in OpenJPEG 2.2.0 does not reject headers with a zero biBitCount, which allows remote attackers to cause a denial of service (memory allocation failure) in the opj_image_create function in lib/openjp2/image.c, related to the opj_aligned_alloc_n function in opj_m... | https://nvd.nist.gov/vuln/detail/CVE-2017-12982 |
160,025 | openjpeg | baf0c1ad4572daa89caa3b12985bdd93530f0dd7 | https://github.com/uclouvain/openjpeg | https://github.com/uclouvain/openjpeg/commit/baf0c1ad4572daa89caa3b12985bdd93530f0dd7 | bmp_read_info_header(): reject bmp files with biBitCount == 0 (#983) | 0 | static OPJ_BOOL bmp_read_info_header(FILE* IN, OPJ_BITMAPINFOHEADER* header)
{
memset(header, 0, sizeof(*header));
/* INFO HEADER */
/* ------------- */
header->biSize = (OPJ_UINT32)getc(IN);
header->biSize |= (OPJ_UINT32)getc(IN) << 8;
header->biSize |= (OPJ_UINT32)getc(IN) << 16;
header->... | 147,759,721,558,063,660,000,000,000,000,000,000,000 | convertbmp.c | 181,722,490,948,692,250,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-12982 | The bmp_read_info_header function in bin/jp2/convertbmp.c in OpenJPEG 2.2.0 does not reject headers with a zero biBitCount, which allows remote attackers to cause a denial of service (memory allocation failure) in the opj_image_create function in lib/openjp2/image.c, related to the opj_aligned_alloc_n function in opj_m... | https://nvd.nist.gov/vuln/detail/CVE-2017-12982 |
2,619 | tcpdump | de981e6070d168b58ec1bb0713ded77ed4ad87f4 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/de981e6070d168b58ec1bb0713ded77ed4ad87f4 | CVE-2017-12901/EIGRP: Do more length checks.
This fixes a buffer over-read discovered by Forcepoint's security
researchers Otto Airamo & Antti Levomäki.
Add a test using the capture file supplied by the reporter(s). | 1 | eigrp_print(netdissect_options *ndo, register const u_char *pptr, register u_int len)
{
const struct eigrp_common_header *eigrp_com_header;
const struct eigrp_tlv_header *eigrp_tlv_header;
const u_char *tptr,*tlv_tptr;
u_int tlen,eigrp_tlv_len,eigrp_tlv_type,tlv_tlen, byte_length, bit_length;
uint8_... | 34,544,532,256,323,543,000,000,000,000,000,000,000 | print-eigrp.c | 168,041,154,571,529,710,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-12901 | The EIGRP parser in tcpdump before 4.9.2 has a buffer over-read in print-eigrp.c:eigrp_print(). | https://nvd.nist.gov/vuln/detail/CVE-2017-12901 |
160,029 | tcpdump | de981e6070d168b58ec1bb0713ded77ed4ad87f4 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/de981e6070d168b58ec1bb0713ded77ed4ad87f4 | CVE-2017-12901/EIGRP: Do more length checks.
This fixes a buffer over-read discovered by Forcepoint's security
researchers Otto Airamo & Antti Levomäki.
Add a test using the capture file supplied by the reporter(s). | 0 | eigrp_print(netdissect_options *ndo, register const u_char *pptr, register u_int len)
{
const struct eigrp_common_header *eigrp_com_header;
const struct eigrp_tlv_header *eigrp_tlv_header;
const u_char *tptr,*tlv_tptr;
u_int tlen,eigrp_tlv_len,eigrp_tlv_type,tlv_tlen, byte_length, bit_length;
uint8_... | 124,842,310,550,949,310,000,000,000,000,000,000,000 | print-eigrp.c | 34,249,284,094,196,200,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-12901 | The EIGRP parser in tcpdump before 4.9.2 has a buffer over-read in print-eigrp.c:eigrp_print(). | https://nvd.nist.gov/vuln/detail/CVE-2017-12901 |
2,629 | tcpdump | 1dcd10aceabbc03bf571ea32b892c522cbe923de | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/1dcd10aceabbc03bf571ea32b892c522cbe923de | CVE-2017-12897/ISO CLNS: Use ND_TTEST() for the bounds checks in isoclns_print().
This fixes a buffer over-read discovered by Kamil Frankowicz.
Don't pass the remaining caplen - that's too hard to get right, and we
were getting it wrong in at least one case; just use ND_TTEST().
Add a test using the capture file sup... | 1 | isoclns_print(netdissect_options *ndo,
const uint8_t *p, u_int length, u_int caplen)
{
if (caplen <= 1) { /* enough bytes on the wire ? */
ND_PRINT((ndo, "|OSI"));
return;
}
if (ndo->ndo_eflag)
ND_PRINT((ndo, "OSI NLPID %s (0x%02x): ", tok2str(nlpid_values, "Unknown", *p), *p));
switch (*p... | 100,921,063,137,195,820,000,000,000,000,000,000,000 | print-isoclns.c | 145,104,362,232,404,600,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-12897 | The ISO CLNS parser in tcpdump before 4.9.2 has a buffer over-read in print-isoclns.c:isoclns_print(). | https://nvd.nist.gov/vuln/detail/CVE-2017-12897 |
160,034 | tcpdump | 1dcd10aceabbc03bf571ea32b892c522cbe923de | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/1dcd10aceabbc03bf571ea32b892c522cbe923de | CVE-2017-12897/ISO CLNS: Use ND_TTEST() for the bounds checks in isoclns_print().
This fixes a buffer over-read discovered by Kamil Frankowicz.
Don't pass the remaining caplen - that's too hard to get right, and we
were getting it wrong in at least one case; just use ND_TTEST().
Add a test using the capture file sup... | 0 | isoclns_print(netdissect_options *ndo,
isoclns_print(netdissect_options *ndo, const uint8_t *p, u_int length)
{
if (!ND_TTEST(*p)) { /* enough bytes on the wire ? */
ND_PRINT((ndo, "|OSI"));
return;
}
if (ndo->ndo_eflag)
ND_PRINT((ndo, "OSI NLPID %s (0x%02x): ", tok2str(nlpid_values, "Unknown", *p), *p));... | 215,164,069,956,367,340,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2017-12897 | The ISO CLNS parser in tcpdump before 4.9.2 has a buffer over-read in print-isoclns.c:isoclns_print(). | https://nvd.nist.gov/vuln/detail/CVE-2017-12897 |
2,642 | tcpdump | 730fc35968c5433b9e2a829779057f4f9495dc51 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/730fc35968c5433b9e2a829779057f4f9495dc51 | CVE-2017-12894/In lookup_bytestring(), take the length of the byte string into account.
Otherwise, if, in our search of the hash table, we come across a byte
string that's shorter than the string we're looking for, we'll search
past the end of the string in the hash table.
This fixes a buffer over-read discovered by ... | 1 | lookup_bytestring(netdissect_options *ndo, register const u_char *bs,
const unsigned int nlen)
{
struct enamemem *tp;
register u_int i, j, k;
if (nlen >= 6) {
k = (bs[0] << 8) | bs[1];
j = (bs[2] << 8) | bs[3];
i = (bs[4] << 8) | bs[5];
} else if (nlen >= 4) {
k = (bs[0] << 8) | bs[1];
j = (bs[... | 266,681,780,576,494,960,000,000,000,000,000,000,000 | addrtoname.c | 317,193,900,967,712,260,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-12894 | Several protocol parsers in tcpdump before 4.9.2 could cause a buffer over-read in addrtoname.c:lookup_bytestring(). | https://nvd.nist.gov/vuln/detail/CVE-2017-12894 |
160,041 | tcpdump | 730fc35968c5433b9e2a829779057f4f9495dc51 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/730fc35968c5433b9e2a829779057f4f9495dc51 | CVE-2017-12894/In lookup_bytestring(), take the length of the byte string into account.
Otherwise, if, in our search of the hash table, we come across a byte
string that's shorter than the string we're looking for, we'll search
past the end of the string in the hash table.
This fixes a buffer over-read discovered by ... | 0 | lookup_bytestring(netdissect_options *ndo, register const u_char *bs,
const unsigned int nlen)
{
struct bsnamemem *tp;
register u_int i, j, k;
if (nlen >= 6) {
k = (bs[0] << 8) | bs[1];
j = (bs[2] << 8) | bs[3];
i = (bs[4] << 8) | bs[5];
} else if (nlen >= 4) {
k = (bs[0] << 8) | bs[1];
j = (bs... | 292,097,246,352,968,700,000,000,000,000,000,000,000 | addrtoname.c | 291,983,787,774,438,320,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-12894 | Several protocol parsers in tcpdump before 4.9.2 could cause a buffer over-read in addrtoname.c:lookup_bytestring(). | https://nvd.nist.gov/vuln/detail/CVE-2017-12894 |
2,644 | ImageMagick | 04178de2247e353fc095846784b9a10fefdbf890 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/04178de2247e353fc095846784b9a10fefdbf890 | https://github.com/ImageMagick/ImageMagick/issues/662 | 1 | static Image *ReadMATImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
Image *image, *image2=NULL,
*rotated_image;
register Quantum *q;
unsigned int status;
MATHeader MATLAB_HDR;
size_t size;
size_t CellType;
QuantumInfo *quantum_info;
ImageInfo *clone_info;
int i;
ssize_t ldblk;
u... | 8,018,273,083,591,260,000,000,000,000,000,000,000 | None | null | [
"CWE-416"
] | CVE-2017-12877 | Use-after-free vulnerability in the DestroyImage function in image.c in ImageMagick before 7.0.6-6 allows remote attackers to cause a denial of service via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2017-12877 |
160,042 | ImageMagick | 04178de2247e353fc095846784b9a10fefdbf890 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/04178de2247e353fc095846784b9a10fefdbf890 | https://github.com/ImageMagick/ImageMagick/issues/662 | 0 | static Image *ReadMATImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
Image *image, *image2=NULL,
*rotated_image;
register Quantum *q;
unsigned int status;
MATHeader MATLAB_HDR;
size_t size;
size_t CellType;
QuantumInfo *quantum_info;
ImageInfo *clone_info;
int i;
ssize_t ldblk;
u... | 50,799,352,855,754,550,000,000,000,000,000,000,000 | mat.c | 115,352,298,327,445,360,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2017-12877 | Use-after-free vulnerability in the DestroyImage function in image.c in ImageMagick before 7.0.6-6 allows remote attackers to cause a denial of service via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2017-12877 |
2,646 | ImageMagick | 3d5ac8c20846871f1eb3068b65f93da7cd33bfd0 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/3d5ac8c20846871f1eb3068b65f93da7cd33bfd0 | None | 1 | static MagickBooleanType WriteCALSImage(const ImageInfo *image_info,
Image *image)
{
char
header[MaxTextExtent];
Image
*group4_image;
ImageInfo
*write_info;
MagickBooleanType
status;
register ssize_t
i;
size_t
density,
length,
orient_x,
orient_y;
ssize_t
cou... | 223,208,806,303,774,400,000,000,000,000,000,000,000 | None | null | [
"CWE-772"
] | CVE-2017-12669 | ImageMagick 7.0.6-2 has a memory leak vulnerability in WriteCALSImage in coders/cals.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-12669 |
160,044 | ImageMagick | 3d5ac8c20846871f1eb3068b65f93da7cd33bfd0 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/3d5ac8c20846871f1eb3068b65f93da7cd33bfd0 | None | 0 | static MagickBooleanType WriteCALSImage(const ImageInfo *image_info,
Image *image)
{
char
header[MaxTextExtent];
Image
*group4_image;
ImageInfo
*write_info;
MagickBooleanType
status;
register ssize_t
i;
size_t
density,
length,
orient_x,
orient_y;
ssize_t
cou... | 36,511,171,695,203,762,000,000,000,000,000,000,000 | None | null | [
"CWE-772"
] | CVE-2017-12669 | ImageMagick 7.0.6-2 has a memory leak vulnerability in WriteCALSImage in coders/cals.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-12669 |
2,648 | ImageMagick | 560e6e512961008938aa1d1b9aab06347b1c8f9b | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/560e6e512961008938aa1d1b9aab06347b1c8f9b | None | 1 | static MagickBooleanType WritePCXImage(const ImageInfo *image_info,Image *image)
{
MagickBooleanType
status;
MagickOffsetType
offset,
*page_table,
scene;
MemoryInfo
*pixel_info;
PCXInfo
pcx_info;
register const IndexPacket
*indexes;
register const PixelPacket
*p;
regi... | 185,312,616,346,228,350,000,000,000,000,000,000,000 | None | null | [
"CWE-772"
] | CVE-2017-12668 | ImageMagick 7.0.6-2 has a memory leak vulnerability in WritePCXImage in coders/pcx.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-12668 |
160,046 | ImageMagick | 560e6e512961008938aa1d1b9aab06347b1c8f9b | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/560e6e512961008938aa1d1b9aab06347b1c8f9b | None | 0 | static MagickBooleanType WritePCXImage(const ImageInfo *image_info,Image *image)
{
MagickBooleanType
status;
MagickOffsetType
offset,
*page_table,
scene;
MemoryInfo
*pixel_info;
PCXInfo
pcx_info;
register const IndexPacket
*indexes;
register const PixelPacket
*p;
regi... | 52,895,917,359,230,500,000,000,000,000,000,000,000 | None | null | [
"CWE-772"
] | CVE-2017-12668 | ImageMagick 7.0.6-2 has a memory leak vulnerability in WritePCXImage in coders/pcx.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-12668 |
2,649 | ImageMagick | 8985ed08f01d465ee65ab5a106186b3868b6f601 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/8985ed08f01d465ee65ab5a106186b3868b6f601 | None | 1 | static Image *ReadMATImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
Image *image, *image2=NULL,
*rotated_image;
PixelPacket *q;
unsigned int status;
MATHeader MATLAB_HDR;
size_t size;
size_t CellType;
QuantumInfo *quantum_info;
ImageInfo *clone_info;
int i;
ssize_t ldblk;
unsign... | 208,847,878,789,259,360,000,000,000,000,000,000,000 | None | null | [
"CWE-772"
] | CVE-2017-12667 | ImageMagick 7.0.6-1 has a memory leak vulnerability in ReadMATImage in coders\mat.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-12667 |
160,047 | ImageMagick | 8985ed08f01d465ee65ab5a106186b3868b6f601 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/8985ed08f01d465ee65ab5a106186b3868b6f601 | None | 0 | static Image *ReadMATImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
Image *image, *image2=NULL,
*rotated_image;
PixelPacket *q;
unsigned int status;
MATHeader MATLAB_HDR;
size_t size;
size_t CellType;
QuantumInfo *quantum_info;
ImageInfo *clone_info;
int i;
ssize_t ldblk;
unsign... | 139,941,792,982,353,600,000,000,000,000,000,000,000 | None | null | [
"CWE-772"
] | CVE-2017-12667 | ImageMagick 7.0.6-1 has a memory leak vulnerability in ReadMATImage in coders\mat.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-12667 |
2,650 | ImageMagick | 859084b4fd966ac007965c3d85caabccd8aee9b4 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/859084b4fd966ac007965c3d85caabccd8aee9b4 | None | 1 | static MagickBooleanType WritePICTImage(const ImageInfo *image_info,
Image *image)
{
#define MaxCount 128
#define PictCropRegionOp 0x01
#define PictEndOfPictureOp 0xff
#define PictJPEGOp 0x8200
#define PictInfoOp 0x0C00
#define PictInfoSize 512
#define PictPixmapOp 0x9A
#define PictPICTOp 0x98
#define PictVer... | 16,589,949,673,789,804,000,000,000,000,000,000,000 | None | null | [
"CWE-772"
] | CVE-2017-12665 | ImageMagick 7.0.6-2 has a memory leak vulnerability in WritePICTImage in coders/pict.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-12665 |
160,048 | ImageMagick | 859084b4fd966ac007965c3d85caabccd8aee9b4 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/859084b4fd966ac007965c3d85caabccd8aee9b4 | None | 0 | static MagickBooleanType WritePICTImage(const ImageInfo *image_info,
Image *image)
{
#define MaxCount 128
#define PictCropRegionOp 0x01
#define PictEndOfPictureOp 0xff
#define PictJPEGOp 0x8200
#define PictInfoOp 0x0C00
#define PictInfoSize 512
#define PictPixmapOp 0x9A
#define PictPICTOp 0x98
#define PictVer... | 218,679,799,744,453,460,000,000,000,000,000,000,000 | None | null | [
"CWE-772"
] | CVE-2017-12665 | ImageMagick 7.0.6-2 has a memory leak vulnerability in WritePICTImage in coders/pict.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-12665 |
2,652 | ImageMagick | db1ffb6cf44bcfe5c4d5fcf9d9109ded5617387f | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/db1ffb6cf44bcfe5c4d5fcf9d9109ded5617387f | None | 1 | static MagickBooleanType WritePALMImage(const ImageInfo *image_info,
Image *image)
{
ExceptionInfo
*exception;
MagickBooleanType
status;
MagickOffsetType
currentOffset,
offset,
scene;
MagickSizeType
cc;
PixelPacket
transpix;
QuantizeInfo
*quantize_info;
register Ind... | 326,733,059,304,932,100,000,000,000,000,000,000,000 | None | null | [
"CWE-772"
] | CVE-2017-12664 | ImageMagick 7.0.6-2 has a memory leak vulnerability in WritePALMImage in coders/palm.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-12664 |
160,050 | ImageMagick | db1ffb6cf44bcfe5c4d5fcf9d9109ded5617387f | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/db1ffb6cf44bcfe5c4d5fcf9d9109ded5617387f | None | 0 | static MagickBooleanType WritePALMImage(const ImageInfo *image_info,
Image *image)
{
ExceptionInfo
*exception;
MagickBooleanType
status;
MagickOffsetType
currentOffset,
offset,
scene;
MagickSizeType
cc;
PixelPacket
transpix;
QuantizeInfo
*quantize_info;
register Ind... | 188,729,318,137,706,140,000,000,000,000,000,000,000 | None | null | [
"CWE-772"
] | CVE-2017-12664 | ImageMagick 7.0.6-2 has a memory leak vulnerability in WritePALMImage in coders/palm.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-12664 |
2,654 | ImageMagick | 6233ef75bb973745ab1092b59aea8fe316f09074 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/6233ef75bb973745ab1092b59aea8fe316f09074 | None | 1 | static MagickBooleanType WriteMAPImage(const ImageInfo *image_info,Image *image)
{
MagickBooleanType
status;
register const IndexPacket
*indexes;
register const PixelPacket
*p;
register ssize_t
i,
x;
register unsigned char
*q;
size_t
depth,
packet_size;
ssize_t
y;... | 48,387,372,742,263,020,000,000,000,000,000,000,000 | None | null | [
"CWE-772"
] | CVE-2017-12663 | ImageMagick 7.0.6-2 has a memory leak vulnerability in WriteMAPImage in coders/map.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-12663 |
160,052 | ImageMagick | 6233ef75bb973745ab1092b59aea8fe316f09074 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/6233ef75bb973745ab1092b59aea8fe316f09074 | None | 0 | static MagickBooleanType WriteMAPImage(const ImageInfo *image_info,Image *image)
{
MagickBooleanType
status;
register const IndexPacket
*indexes;
register const PixelPacket
*p;
register ssize_t
i,
x;
register unsigned char
*q;
size_t
depth,
packet_size;
ssize_t
y;... | 65,995,654,260,245,880,000,000,000,000,000,000,000 | None | null | [
"CWE-772"
] | CVE-2017-12663 | ImageMagick 7.0.6-2 has a memory leak vulnerability in WriteMAPImage in coders/map.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-12663 |
2,655 | ImageMagick | 73a2bad43d157acfe360595feee739b4cc4406cb | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/73a2bad43d157acfe360595feee739b4cc4406cb | None | 1 | static MagickBooleanType WritePDFImage(const ImageInfo *image_info,Image *image)
{
#define CFormat "/Filter [ /%s ]\n"
#define ObjectsPerImage 14
DisableMSCWarning(4310)
static const char
XMPProfile[]=
{
"<?xpacket begin=\"%s\" id=\"W5M0MpCehiHzreSzNTczkc9d\"?>\n"
"<x:xmpmeta xmlns:x=\"adobe:ns... | 295,540,819,852,515,800,000,000,000,000,000,000,000 | None | null | [
"CWE-772"
] | CVE-2017-12662 | ImageMagick 7.0.6-2 has a memory leak vulnerability in WritePDFImage in coders/pdf.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-12662 |
160,053 | ImageMagick | 73a2bad43d157acfe360595feee739b4cc4406cb | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/73a2bad43d157acfe360595feee739b4cc4406cb | None | 0 | static MagickBooleanType WritePDFImage(const ImageInfo *image_info,Image *image)
{
#define CFormat "/Filter [ /%s ]\n"
#define ObjectsPerImage 14
DisableMSCWarning(4310)
static const char
XMPProfile[]=
{
"<?xpacket begin=\"%s\" id=\"W5M0MpCehiHzreSzNTczkc9d\"?>\n"
"<x:xmpmeta xmlns:x=\"adobe:ns... | 187,132,738,061,883,530,000,000,000,000,000,000,000 | None | null | [
"CWE-772"
] | CVE-2017-12662 | ImageMagick 7.0.6-2 has a memory leak vulnerability in WritePDFImage in coders/pdf.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-12662 |
2,658 | ImageMagick | 3320955045e5a2a22c13a04fa9422bb809e75eda | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/3320955045e5a2a22c13a04fa9422bb809e75eda | None | 1 | static Image *ReadOneJNGImage(MngInfo *mng_info,
const ImageInfo *image_info, ExceptionInfo *exception)
{
Image
*alpha_image,
*color_image,
*image,
*jng_image;
ImageInfo
*alpha_image_info,
*color_image_info;
MagickBooleanType
logging;
int
unique_filenames;
ssize_t
y... | 230,970,568,755,587,880,000,000,000,000,000,000,000 | None | null | [
"CWE-772"
] | CVE-2017-12641 | ImageMagick 7.0.6-1 has a memory leak vulnerability in ReadOneJNGImage in coders\png.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-12641 |
160,054 | ImageMagick | 3320955045e5a2a22c13a04fa9422bb809e75eda | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/3320955045e5a2a22c13a04fa9422bb809e75eda | None | 0 | static Image *ReadOneJNGImage(MngInfo *mng_info,
const ImageInfo *image_info, ExceptionInfo *exception)
{
Image
*alpha_image,
*color_image,
*image,
*jng_image;
ImageInfo
*alpha_image_info,
*color_image_info;
MagickBooleanType
logging;
int
unique_filenames;
ssize_t
y... | 295,095,777,977,334,900,000,000,000,000,000,000,000 | None | null | [
"CWE-772"
] | CVE-2017-12641 | ImageMagick 7.0.6-1 has a memory leak vulnerability in ReadOneJNGImage in coders\png.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-12641 |
2,662 | ImageMagick | e793eb203e5e0f91f5037aed6585e81b1e27395b | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/e793eb203e5e0f91f5037aed6585e81b1e27395b | https://github.com/ImageMagick/ImageMagick/issues/636 | 1 | static MagickBooleanType ProcessMSLScript(const ImageInfo *image_info,
Image **image,ExceptionInfo *exception)
{
char
message[MagickPathExtent];
Image
*msl_image;
int
status;
ssize_t
n;
MSLInfo
msl_info;
xmlSAXHandler
sax_modules;
xmlSAXHandlerPtr
sax_handler;
/*
... | 112,895,750,210,052,900,000,000,000,000,000,000,000 | msl.c | 158,414,803,465,023,320,000,000,000,000,000,000,000 | [
"CWE-772"
] | CVE-2017-12427 | The ProcessMSLScript function in coders/msl.c in ImageMagick before 6.9.9-5 and 7.x before 7.0.6-5 allows remote attackers to cause a denial of service (memory leak) via a crafted file, related to the WriteMSLImage function. | https://nvd.nist.gov/vuln/detail/CVE-2017-12427 |
160,057 | ImageMagick | e793eb203e5e0f91f5037aed6585e81b1e27395b | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/e793eb203e5e0f91f5037aed6585e81b1e27395b | https://github.com/ImageMagick/ImageMagick/issues/636 | 0 | static MagickBooleanType ProcessMSLScript(const ImageInfo *image_info,
Image **image,ExceptionInfo *exception)
{
char
message[MagickPathExtent];
Image
*msl_image;
int
status;
ssize_t
n;
MSLInfo
msl_info;
xmlSAXHandler
sax_modules;
xmlSAXHandlerPtr
sax_handler;
/*
... | 135,754,561,457,292,280,000,000,000,000,000,000,000 | msl.c | 325,153,737,108,310,430,000,000,000,000,000,000,000 | [
"CWE-772"
] | CVE-2017-12427 | The ProcessMSLScript function in coders/msl.c in ImageMagick before 6.9.9-5 and 7.x before 7.0.6-5 allows remote attackers to cause a denial of service (memory leak) via a crafted file, related to the WriteMSLImage function. | https://nvd.nist.gov/vuln/detail/CVE-2017-12427 |
2,663 | linux | ea6789980fdaa610d7eb63602c746bf6ec70cd2b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/ea6789980fdaa610d7eb63602c746bf6ec70cd2b | assoc_array: Fix a buggy node-splitting case
This fixes CVE-2017-12193.
Fix a case in the assoc_array implementation in which a new leaf is
added that needs to go into a node that happens to be full, where the
existing leaves in that node cluster together at that level to the
exclusion of new leaf.
What needs to hap... | 1 | static bool assoc_array_insert_into_terminal_node(struct assoc_array_edit *edit,
const struct assoc_array_ops *ops,
const void *index_key,
struct assoc_array_walk_result *result)
{
struct assoc_array_shortcut *shortcut, *new_s0;
struct assoc_array_node *node, *new_n0, *new_n1, *side;
struct a... | 253,577,312,062,185,030,000,000,000,000,000,000,000 | assoc_array.c | 298,293,148,560,020,940,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2017-12193 | The assoc_array_insert_into_terminal_node function in lib/assoc_array.c in the Linux kernel before 4.13.11 mishandles node splitting, which allows local users to cause a denial of service (NULL pointer dereference and panic) via a crafted application, as demonstrated by the keyring key type, and key addition and link c... | https://nvd.nist.gov/vuln/detail/CVE-2017-12193 |
160,058 | linux | ea6789980fdaa610d7eb63602c746bf6ec70cd2b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/ea6789980fdaa610d7eb63602c746bf6ec70cd2b | assoc_array: Fix a buggy node-splitting case
This fixes CVE-2017-12193.
Fix a case in the assoc_array implementation in which a new leaf is
added that needs to go into a node that happens to be full, where the
existing leaves in that node cluster together at that level to the
exclusion of new leaf.
What needs to hap... | 0 | static bool assoc_array_insert_into_terminal_node(struct assoc_array_edit *edit,
const struct assoc_array_ops *ops,
const void *index_key,
struct assoc_array_walk_result *result)
{
struct assoc_array_shortcut *shortcut, *new_s0;
struct assoc_array_node *node, *new_n0, *new_n1, *side;
struct a... | 81,118,548,884,591,770,000,000,000,000,000,000,000 | assoc_array.c | 22,003,643,060,369,240,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2017-12193 | The assoc_array_insert_into_terminal_node function in lib/assoc_array.c in the Linux kernel before 4.13.11 mishandles node splitting, which allows local users to cause a denial of service (NULL pointer dereference and panic) via a crafted application, as demonstrated by the keyring key type, and key addition and link c... | https://nvd.nist.gov/vuln/detail/CVE-2017-12193 |
2,676 | FFmpeg | ffcc82219cef0928bed2d558b19ef6ea35634130 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/ffcc82219cef0928bed2d558b19ef6ea35634130 | avformat/rtmppkt: Convert ff_amf_get_field_value() to bytestream2
Fixes: out of array accesses
Found-by: JunDong Xie of Ant-financial Light-Year Security Lab
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 1 | int ff_amf_get_field_value(const uint8_t *data, const uint8_t *data_end,
const uint8_t *name, uint8_t *dst, int dst_size)
{
int namelen = strlen(name);
int len;
while (*data != AMF_DATA_TYPE_OBJECT && data < data_end) {
len = ff_amf_tag_size(data, data_end);
... | 65,922,353,615,166,360,000,000,000,000,000,000,000 | rtmppkt.c | 39,451,849,705,085,110,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2017-11665 | The ff_amf_get_field_value function in libavformat/rtmppkt.c in FFmpeg 3.3.2 allows remote RTMP servers to cause a denial of service (Segmentation Violation and application crash) via a crafted stream. | https://nvd.nist.gov/vuln/detail/CVE-2017-11665 |
160,069 | FFmpeg | ffcc82219cef0928bed2d558b19ef6ea35634130 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/ffcc82219cef0928bed2d558b19ef6ea35634130 | avformat/rtmppkt: Convert ff_amf_get_field_value() to bytestream2
Fixes: out of array accesses
Found-by: JunDong Xie of Ant-financial Light-Year Security Lab
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 0 | int ff_amf_get_field_value(const uint8_t *data, const uint8_t *data_end,
static int amf_get_field_value2(GetByteContext *gb,
const uint8_t *name, uint8_t *dst, int dst_size)
{
int namelen = strlen(name);
int len;
while (bytestream2_peek_byte(gb) != AMF_DATA_TYPE_OBJECT && by... | 307,907,888,267,036,370,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-11665 | The ff_amf_get_field_value function in libavformat/rtmppkt.c in FFmpeg 3.3.2 allows remote RTMP servers to cause a denial of service (Segmentation Violation and application crash) via a crafted stream. | https://nvd.nist.gov/vuln/detail/CVE-2017-11665 |
2,683 | ImageMagick | a8f9c2aabed37cd6a728532d1aed13ae0f3dfd78 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/a8f9c2aabed37cd6a728532d1aed13ae0f3dfd78 | None | 1 | static Image *ReadTXTImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
char
colorspace[MaxTextExtent],
text[MaxTextExtent];
Image
*image;
IndexPacket
*indexes;
long
x_offset,
y_offset;
MagickBooleanType
status;
MagickPixelPacket
pixel;
QuantumAny
range... | 255,352,715,063,295,070,000,000,000,000,000,000,000 | None | null | [
"CWE-835"
] | CVE-2017-11523 | The ReadTXTImage function in coders/txt.c in ImageMagick through 6.9.9-0 and 7.x through 7.0.6-1 allows remote attackers to cause a denial of service (infinite loop) via a crafted file, because the end-of-file condition is not considered. | https://nvd.nist.gov/vuln/detail/CVE-2017-11523 |
160,076 | ImageMagick | a8f9c2aabed37cd6a728532d1aed13ae0f3dfd78 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/a8f9c2aabed37cd6a728532d1aed13ae0f3dfd78 | None | 0 | static Image *ReadTXTImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
char
colorspace[MaxTextExtent],
text[MaxTextExtent];
Image
*image;
IndexPacket
*indexes;
long
x_offset,
y_offset;
MagickBooleanType
status;
MagickPixelPacket
pixel;
QuantumAny
range... | 22,721,170,066,440,524,000,000,000,000,000,000,000 | None | null | [
"CWE-835"
] | CVE-2017-11523 | The ReadTXTImage function in coders/txt.c in ImageMagick through 6.9.9-0 and 7.x through 7.0.6-1 allows remote attackers to cause a denial of service (infinite loop) via a crafted file, because the end-of-file condition is not considered. | https://nvd.nist.gov/vuln/detail/CVE-2017-11523 |
2,684 | ImageMagick | 816ecab6c532ae086ff4186b3eaf4aa7092d536f | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/816ecab6c532ae086ff4186b3eaf4aa7092d536f | https://github.com/ImageMagick/ImageMagick/issues/58 | 1 | static MagickBooleanType WriteOnePNGImage(MngInfo *mng_info,
const ImageInfo *IMimage_info,Image *IMimage,ExceptionInfo *exception)
{
char
im_vers[32],
libpng_runv[32],
libpng_vers[32],
zlib_runv[32],
zlib_vers[32];
Image
*image;
ImageInfo
*image_info;
char
s[2];
const ch... | 46,130,426,879,440,080,000,000,000,000,000,000,000 | png.c | 85,174,790,945,754,270,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2017-11522 | The WriteOnePNGImage function in coders/png.c in ImageMagick through 6.9.9-0 and 7.x through 7.0.6-1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2017-11522 |
160,077 | ImageMagick | 816ecab6c532ae086ff4186b3eaf4aa7092d536f | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/816ecab6c532ae086ff4186b3eaf4aa7092d536f | https://github.com/ImageMagick/ImageMagick/issues/58 | 0 | static MagickBooleanType WriteOnePNGImage(MngInfo *mng_info,
const ImageInfo *IMimage_info,Image *IMimage,ExceptionInfo *exception)
{
char
im_vers[32],
libpng_runv[32],
libpng_vers[32],
zlib_runv[32],
zlib_vers[32];
Image
*image;
ImageInfo
*image_info;
char
s[2];
const ch... | 19,355,422,623,847,822,000,000,000,000,000,000,000 | png.c | 30,611,584,455,442,043,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2017-11522 | The WriteOnePNGImage function in coders/png.c in ImageMagick through 6.9.9-0 and 7.x through 7.0.6-1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2017-11522 |
2,685 | linux | 3b2d69114fefa474fca542e51119036dceb4aa6f | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/3b2d69114fefa474fca542e51119036dceb4aa6f | ACPICA: Namespace: fix operand cache leak
ACPICA commit a23325b2e583556eae88ed3f764e457786bf4df6
I found some ACPI operand cache leaks in ACPI early abort cases.
Boot log of ACPI operand cache leak is as follows:
>[ 0.174332] ACPI: Added _OSI(Module Device)
>[ 0.175504] ACPI: Added _OSI(Processor Device)
>[ ... | 1 | void acpi_ns_terminate(void)
{
acpi_status status;
ACPI_FUNCTION_TRACE(ns_terminate);
#ifdef ACPI_EXEC_APP
{
union acpi_operand_object *prev;
union acpi_operand_object *next;
/* Delete any module-level code blocks */
next = acpi_gbl_module_code_list;
while (next) {
prev = next;
next = next-... | 280,039,072,811,556,760,000,000,000,000,000,000,000 | nsutils.c | 109,243,291,210,227,210,000,000,000,000,000,000,000 | [
"CWE-755"
] | CVE-2017-11472 | The acpi_ns_terminate() function in drivers/acpi/acpica/nsutils.c in the Linux kernel before 4.12 does not flush the operand cache and causes a kernel stack dump, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism (in the kernel through 4.9) via a craft... | https://nvd.nist.gov/vuln/detail/CVE-2017-11472 |
160,078 | linux | 3b2d69114fefa474fca542e51119036dceb4aa6f | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/3b2d69114fefa474fca542e51119036dceb4aa6f | ACPICA: Namespace: fix operand cache leak
ACPICA commit a23325b2e583556eae88ed3f764e457786bf4df6
I found some ACPI operand cache leaks in ACPI early abort cases.
Boot log of ACPI operand cache leak is as follows:
>[ 0.174332] ACPI: Added _OSI(Module Device)
>[ 0.175504] ACPI: Added _OSI(Processor Device)
>[ ... | 0 | void acpi_ns_terminate(void)
{
acpi_status status;
union acpi_operand_object *prev;
union acpi_operand_object *next;
ACPI_FUNCTION_TRACE(ns_terminate);
/* Delete any module-level code blocks */
next = acpi_gbl_module_code_list;
while (next) {
prev = next;
next = next->method.mutex;
prev->method.m... | 117,645,864,794,316,930,000,000,000,000,000,000,000 | nsutils.c | 245,076,048,450,368,900,000,000,000,000,000,000,000 | [
"CWE-755"
] | CVE-2017-11472 | The acpi_ns_terminate() function in drivers/acpi/acpica/nsutils.c in the Linux kernel before 4.12 does not flush the operand cache and causes a kernel stack dump, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism (in the kernel through 4.9) via a craft... | https://nvd.nist.gov/vuln/detail/CVE-2017-11472 |
2,709 | ImageMagick | 1737ac82b335e53376382c07b9a500d73dd2aa11 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/1737ac82b335e53376382c07b9a500d73dd2aa11 | None | 1 | static Image *ReadJPEGImage(const ImageInfo *image_info,
ExceptionInfo *exception)
{
char
value[MaxTextExtent];
const char
*option;
ErrorManager
error_manager;
Image
*image;
IndexPacket
index;
JSAMPLE
*volatile jpeg_pixels;
JSAMPROW
scanline[1];
MagickBooleanType
... | 139,760,603,405,269,560,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2017-11448 | The ReadJPEGImage function in coders/jpeg.c in ImageMagick before 7.0.6-1 allows remote attackers to obtain sensitive information from uninitialized memory locations via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2017-11448 |
160,099 | ImageMagick | 1737ac82b335e53376382c07b9a500d73dd2aa11 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/1737ac82b335e53376382c07b9a500d73dd2aa11 | None | 0 | static Image *ReadJPEGImage(const ImageInfo *image_info,
ExceptionInfo *exception)
{
char
value[MaxTextExtent];
const char
*option;
ErrorManager
error_manager;
Image
*image;
IndexPacket
index;
JSAMPLE
*volatile jpeg_pixels;
JSAMPROW
scanline[1];
MagickBooleanType
... | 59,141,832,454,392,870,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2017-11448 | The ReadJPEGImage function in coders/jpeg.c in ImageMagick before 7.0.6-1 allows remote attackers to obtain sensitive information from uninitialized memory locations via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2017-11448 |
2,710 | ImageMagick | 8c10b9247509c0484b55330458846115131ec2ae | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/8c10b9247509c0484b55330458846115131ec2ae | None | 1 | static Image *ReadSCREENSHOTImage(const ImageInfo *image_info,
ExceptionInfo *exception)
{
Image
*image;
assert(image_info->signature == MagickSignature);
if (image_info->debug != MagickFalse)
(void) LogMagickEvent(TraceEvent,GetMagickModule(),"%s",
image_info->filename);
assert(exception != (E... | 220,742,260,935,559,080,000,000,000,000,000,000,000 | None | null | [
"CWE-772"
] | CVE-2017-11447 | The ReadSCREENSHOTImage function in coders/screenshot.c in ImageMagick before 7.0.6-1 has memory leaks, causing denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2017-11447 |
160,100 | ImageMagick | 8c10b9247509c0484b55330458846115131ec2ae | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/8c10b9247509c0484b55330458846115131ec2ae | None | 0 | static Image *ReadSCREENSHOTImage(const ImageInfo *image_info,
ExceptionInfo *exception)
{
Image
*image;
assert(image_info->signature == MagickSignature);
if (image_info->debug != MagickFalse)
(void) LogMagickEvent(TraceEvent,GetMagickModule(),"%s",
image_info->filename);
assert(exception != (E... | 190,010,828,555,515,870,000,000,000,000,000,000,000 | None | null | [
"CWE-772"
] | CVE-2017-11447 | The ReadSCREENSHOTImage function in coders/screenshot.c in ImageMagick before 7.0.6-1 has memory leaks, causing denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2017-11447 |
2,716 | yara | 4a342f01e5439b9bb901aff1c6c23c536baeeb3f | https://github.com/VirusTotal/yara | https://github.com/VirusTotal/yara/commit/4a342f01e5439b9bb901aff1c6c23c536baeeb3f | Fix heap overflow (reported by Jurriaan Bremer)
When setting a new array item with yr_object_array_set_item() the array size is doubled if the index for the new item is larger than the already allocated ones. No further checks were made to ensure that the index fits into the array after doubling its capacity. If the a... | 1 | int yr_object_array_set_item(
YR_OBJECT* object,
YR_OBJECT* item,
int index)
{
YR_OBJECT_ARRAY* array;
int i;
int count;
assert(index >= 0);
assert(object->type == OBJECT_TYPE_ARRAY);
array = object_as_array(object);
if (array->items == NULL)
{
count = yr_max(64, (index + 1) * 2);... | 226,909,454,874,264,900,000,000,000,000,000,000,000 | object.c | 256,017,910,395,129,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-11328 | Heap buffer overflow in the yr_object_array_set_item() function in object.c in YARA 3.x allows a denial-of-service attack by scanning a crafted .NET file. | https://nvd.nist.gov/vuln/detail/CVE-2017-11328 |
160,104 | yara | 4a342f01e5439b9bb901aff1c6c23c536baeeb3f | https://github.com/VirusTotal/yara | https://github.com/VirusTotal/yara/commit/4a342f01e5439b9bb901aff1c6c23c536baeeb3f | Fix heap overflow (reported by Jurriaan Bremer)
When setting a new array item with yr_object_array_set_item() the array size is doubled if the index for the new item is larger than the already allocated ones. No further checks were made to ensure that the index fits into the array after doubling its capacity. If the a... | 0 | int yr_object_array_set_item(
YR_OBJECT* object,
YR_OBJECT* item,
int index)
{
YR_OBJECT_ARRAY* array;
int i;
int count;
assert(index >= 0);
assert(object->type == OBJECT_TYPE_ARRAY);
array = object_as_array(object);
if (array->items == NULL)
{
count = 64;
while (count <= ind... | 96,846,261,094,929,950,000,000,000,000,000,000,000 | object.c | 146,010,632,680,346,480,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-11328 | Heap buffer overflow in the yr_object_array_set_item() function in object.c in YARA 3.x allows a denial-of-service attack by scanning a crafted .NET file. | https://nvd.nist.gov/vuln/detail/CVE-2017-11328 |
2,717 | ImageMagick | 8ca35831e91c3db8c6d281d09b605001003bec08 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/8ca35831e91c3db8c6d281d09b605001003bec08 | coders/png.c: Stop a memory leak in read_user_chunk_callback() (reference
https://github.com/ImageMagick/ImageMagick/issues/517). | 1 | static Image *ReadOnePNGImage(MngInfo *mng_info,
const ImageInfo *image_info, ExceptionInfo *exception)
{
/* Read one PNG image */
/* To do: Read the tEXt/Creation Time chunk into the date:create property */
Image
*image;
char
im_vers[32],
libpng_runv[32],
libpng_vers[32],
zlib_runv[3... | 6,716,675,637,673,233,000,000,000,000,000,000,000 | png.c | 228,033,773,830,255,870,000,000,000,000,000,000,000 | [
"CWE-772"
] | CVE-2017-11310 | The read_user_chunk_callback function in coders\png.c in ImageMagick 7.0.6-1 Q16 2017-06-21 (beta) has memory leak vulnerabilities via crafted PNG files. | https://nvd.nist.gov/vuln/detail/CVE-2017-11310 |
160,105 | ImageMagick | 8ca35831e91c3db8c6d281d09b605001003bec08 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/8ca35831e91c3db8c6d281d09b605001003bec08 | coders/png.c: Stop a memory leak in read_user_chunk_callback() (reference
https://github.com/ImageMagick/ImageMagick/issues/517). | 0 | static Image *ReadOnePNGImage(MngInfo *mng_info,
const ImageInfo *image_info, ExceptionInfo *exception)
{
/* Read one PNG image */
/* To do: Read the tEXt/Creation Time chunk into the date:create property */
Image
*image;
char
im_vers[32],
libpng_runv[32],
libpng_vers[32],
zlib_runv[3... | 66,321,349,650,092,410,000,000,000,000,000,000,000 | png.c | 133,390,610,587,338,430,000,000,000,000,000,000,000 | [
"CWE-772"
] | CVE-2017-11310 | The read_user_chunk_callback function in coders\png.c in ImageMagick 7.0.6-1 Q16 2017-06-21 (beta) has memory leak vulnerabilities via crafted PNG files. | https://nvd.nist.gov/vuln/detail/CVE-2017-11310 |
2,718 | linux | f991af3daabaecff34684fd51fac80319d1baad1 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/f991af3daabaecff34684fd51fac80319d1baad1 | mqueue: fix a use-after-free in sys_mq_notify()
The retry logic for netlink_attachskb() inside sys_mq_notify()
is nasty and vulnerable:
1) The sock refcnt is already released when retry is needed
2) The fd is controllable by user-space because we already
release the file refcnt
so we when retry but the fd has bee... | 1 | static int do_mq_notify(mqd_t mqdes, const struct sigevent *notification)
{
int ret;
struct fd f;
struct sock *sock;
struct inode *inode;
struct mqueue_inode_info *info;
struct sk_buff *nc;
audit_mq_notify(mqdes, notification);
nc = NULL;
sock = NULL;
if (notification != NULL) {
if (unlikely(notification-... | 64,115,780,527,379,680,000,000,000,000,000,000,000 | mqueue.c | 183,724,114,749,802,100,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2017-11176 | The mq_notify function in the Linux kernel through 4.11.9 does not set the sock pointer to NULL upon entry into the retry logic. During a user-space close of a Netlink socket, it allows attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2017-11176 |
160,106 | linux | f991af3daabaecff34684fd51fac80319d1baad1 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/f991af3daabaecff34684fd51fac80319d1baad1 | mqueue: fix a use-after-free in sys_mq_notify()
The retry logic for netlink_attachskb() inside sys_mq_notify()
is nasty and vulnerable:
1) The sock refcnt is already released when retry is needed
2) The fd is controllable by user-space because we already
release the file refcnt
so we when retry but the fd has bee... | 0 | static int do_mq_notify(mqd_t mqdes, const struct sigevent *notification)
{
int ret;
struct fd f;
struct sock *sock;
struct inode *inode;
struct mqueue_inode_info *info;
struct sk_buff *nc;
audit_mq_notify(mqdes, notification);
nc = NULL;
sock = NULL;
if (notification != NULL) {
if (unlikely(notification-... | 188,893,110,705,841,960,000,000,000,000,000,000,000 | mqueue.c | 202,842,413,276,995,580,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2017-11176 | The mq_notify function in the Linux kernel through 4.11.9 does not set the sock pointer to NULL upon entry into the retry logic. During a user-space close of a Netlink socket, it allows attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2017-11176 |
2,721 | gnome-session | b0dc999e0b45355314616321dbb6cb71e729fc9d | https://github.com/GNOME/gnome-session | https://github.com/GNOME/gnome-session/commit/b0dc999e0b45355314616321dbb6cb71e729fc9d | [gsm] Delay the creation of the GsmXSMPClient until it really exists
We used to create the GsmXSMPClient before the XSMP connection is really
accepted. This can lead to some issues, though. An example is:
https://bugzilla.gnome.org/show_bug.cgi?id=598211#c19. Quoting:
"What is happening is that a new client (probabl... | 1 | accept_ice_connection (GIOChannel *source,
GIOCondition condition,
GsmIceConnectionData *data)
{
IceListenObj listener;
IceConn ice_conn;
IceAcceptStatus status;
GsmClient *client;
GsmXsmpServe... | 115,853,477,812,783,840,000,000,000,000,000,000,000 | gsm-xsmp-server.c | 139,028,771,084,308,010,000,000,000,000,000,000,000 | [
"CWE-835"
] | CVE-2017-11171 | Bad reference counting in the context of accept_ice_connection() in gsm-xsmp-server.c in old versions of gnome-session up until version 2.29.92 allows a local attacker to establish ICE connections to gnome-session with invalid authentication data (an invalid magic cookie). Each failed authentication attempt will leak a... | https://nvd.nist.gov/vuln/detail/CVE-2017-11171 |
160,109 | gnome-session | b0dc999e0b45355314616321dbb6cb71e729fc9d | https://github.com/GNOME/gnome-session | https://github.com/GNOME/gnome-session/commit/b0dc999e0b45355314616321dbb6cb71e729fc9d | [gsm] Delay the creation of the GsmXSMPClient until it really exists
We used to create the GsmXSMPClient before the XSMP connection is really
accepted. This can lead to some issues, though. An example is:
https://bugzilla.gnome.org/show_bug.cgi?id=598211#c19. Quoting:
"What is happening is that a new client (probabl... | 0 | accept_ice_connection (GIOChannel *source,
GIOCondition condition,
GsmIceConnectionData *data)
{
IceConn ice_conn;
IceAcceptStatus status;
g_debug ("GsmXsmpServer: accept_ice_connection()");
ice_conn = Ic... | 138,054,033,130,075,100,000,000,000,000,000,000,000 | gsm-xsmp-server.c | 203,239,007,314,094,620,000,000,000,000,000,000,000 | [
"CWE-835"
] | CVE-2017-11171 | Bad reference counting in the context of accept_ice_connection() in gsm-xsmp-server.c in old versions of gnome-session up until version 2.29.92 allows a local attacker to establish ICE connections to gnome-session with invalid authentication data (an invalid magic cookie). Each failed authentication attempt will leak a... | https://nvd.nist.gov/vuln/detail/CVE-2017-11171 |
2,725 | radare2 | c57997e76ec70862174a1b3b3aeb62a6f8570e85 | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/c57997e76ec70862174a1b3b3aeb62a6f8570e85 | Fix r2_hbo_grub_memmove ext2 crash | 1 | grub_disk_read (grub_disk_t disk, grub_disk_addr_t sector,
grub_off_t offset, grub_size_t size, void *buf)
{
char *tmp_buf;
unsigned real_offset;
/* First of all, check if the region is within the disk. */
if (grub_disk_adjust_range (disk, §or, &offset, size) != GRUB_ERR_NONE)
{
grub_error_pus... | 303,262,332,284,339,200,000,000,000,000,000,000,000 | disk.c | 311,683,975,526,626,800,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10929 | The grub_memmove function in shlr/grub/kern/misc.c in radare2 1.5.0 allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, possibly related to a read overflow in the grub_disk_read_small_real function i... | https://nvd.nist.gov/vuln/detail/CVE-2017-10929 |
160,113 | radare2 | c57997e76ec70862174a1b3b3aeb62a6f8570e85 | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/c57997e76ec70862174a1b3b3aeb62a6f8570e85 | Fix r2_hbo_grub_memmove ext2 crash | 0 | grub_disk_read (grub_disk_t disk, grub_disk_addr_t sector,
grub_off_t offset, grub_size_t size, void *buf)
{
char *tmp_buf;
unsigned real_offset;
/* First of all, check if the region is within the disk. */
if (grub_disk_adjust_range (disk, §or, &offset, size) != GRUB_ERR_NONE)
{
grub_error_pus... | 116,475,755,647,267,870,000,000,000,000,000,000,000 | disk.c | 249,987,949,430,885,670,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-10929 | The grub_memmove function in shlr/grub/kern/misc.c in radare2 1.5.0 allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file, possibly related to a read overflow in the grub_disk_read_small_real function i... | https://nvd.nist.gov/vuln/detail/CVE-2017-10929 |
2,726 | linux | 089bc0143f489bd3a4578bdff5f4ca68fb26f341 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/089bc0143f489bd3a4578bdff5f4ca68fb26f341 | xen-blkback: don't leak stack data via response ring
Rather than constructing a local structure instance on the stack, fill
the fields directly on the shared ring, just like other backends do.
Build on the fact that all response structure flavors are actually
identical (the old code did make this assumption too).
Thi... | 1 | static void make_response(struct xen_blkif_ring *ring, u64 id,
unsigned short op, int st)
{
struct blkif_response resp;
unsigned long flags;
union blkif_back_rings *blk_rings;
int notify;
resp.id = id;
resp.operation = op;
resp.status = st;
spin_lock_irqsave(&ring->blk_ring_lock, fl... | 3,010,677,516,050,940,000,000,000,000,000,000,000 | blkback.c | 154,573,801,860,346,860,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2017-10911 | The make_response function in drivers/block/xen-blkback/blkback.c in the Linux kernel before 4.11.8 allows guest OS users to obtain sensitive information from host OS (or other guest OS) kernel memory by leveraging the copying of uninitialized padding fields in Xen block-interface response structures, aka XSA-216. | https://nvd.nist.gov/vuln/detail/CVE-2017-10911 |
160,114 | linux | 089bc0143f489bd3a4578bdff5f4ca68fb26f341 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/089bc0143f489bd3a4578bdff5f4ca68fb26f341 | xen-blkback: don't leak stack data via response ring
Rather than constructing a local structure instance on the stack, fill
the fields directly on the shared ring, just like other backends do.
Build on the fact that all response structure flavors are actually
identical (the old code did make this assumption too).
Thi... | 0 | static void make_response(struct xen_blkif_ring *ring, u64 id,
unsigned short op, int st)
{
struct blkif_response *resp;
unsigned long flags;
union blkif_back_rings *blk_rings;
int notify;
spin_lock_irqsave(&ring->blk_ring_lock, flags);
blk_rings = &ring->blk_rings;
/* Place on the response r... | 225,829,387,305,785,700,000,000,000,000,000,000,000 | blkback.c | 331,399,315,042,525,030,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2017-10911 | The make_response function in drivers/block/xen-blkback/blkback.c in the Linux kernel before 4.11.8 allows guest OS users to obtain sensitive information from host OS (or other guest OS) kernel memory by leveraging the copying of uninitialized padding fields in Xen block-interface response structures, aka XSA-216. | https://nvd.nist.gov/vuln/detail/CVE-2017-10911 |
2,727 | linux | 385aee965b4e4c36551c362a334378d2985b722a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/385aee965b4e4c36551c362a334378d2985b722a | drm/virtio: don't leak bo on drm_gem_object_init failure
Reported-by: 李强 <liqiang6-s@360.cn>
Signed-off-by: Gerd Hoffmann <kraxel@redhat.com>
Link: http://patchwork.freedesktop.org/patch/msgid/20170406155941.458-1-kraxel@redhat.com | 1 | int virtio_gpu_object_create(struct virtio_gpu_device *vgdev,
unsigned long size, bool kernel, bool pinned,
struct virtio_gpu_object **bo_ptr)
{
struct virtio_gpu_object *bo;
enum ttm_bo_type type;
size_t acc_size;
int ret;
if (kernel)
type = ttm_bo_type_kernel;
else
type = ttm_bo_type_device... | 94,677,181,086,707,980,000,000,000,000,000,000,000 | virtgpu_object.c | 7,738,869,874,472,682,000,000,000,000,000,000,000 | [
"CWE-772"
] | CVE-2017-10810 | Memory leak in the virtio_gpu_object_create function in drivers/gpu/drm/virtio/virtgpu_object.c in the Linux kernel through 4.11.8 allows attackers to cause a denial of service (memory consumption) by triggering object-initialization failures. | https://nvd.nist.gov/vuln/detail/CVE-2017-10810 |
160,115 | linux | 385aee965b4e4c36551c362a334378d2985b722a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/385aee965b4e4c36551c362a334378d2985b722a | drm/virtio: don't leak bo on drm_gem_object_init failure
Reported-by: 李强 <liqiang6-s@360.cn>
Signed-off-by: Gerd Hoffmann <kraxel@redhat.com>
Link: http://patchwork.freedesktop.org/patch/msgid/20170406155941.458-1-kraxel@redhat.com | 0 | int virtio_gpu_object_create(struct virtio_gpu_device *vgdev,
unsigned long size, bool kernel, bool pinned,
struct virtio_gpu_object **bo_ptr)
{
struct virtio_gpu_object *bo;
enum ttm_bo_type type;
size_t acc_size;
int ret;
if (kernel)
type = ttm_bo_type_kernel;
else
type = ttm_bo_type_device... | 122,744,681,669,071,310,000,000,000,000,000,000,000 | virtgpu_object.c | 13,054,163,728,105,955,000,000,000,000,000,000,000 | [
"CWE-772"
] | CVE-2017-10810 | Memory leak in the virtio_gpu_object_create function in drivers/gpu/drm/virtio/virtgpu_object.c in the Linux kernel through 4.11.8 allows attackers to cause a denial of service (memory consumption) by triggering object-initialization failures. | https://nvd.nist.gov/vuln/detail/CVE-2017-10810 |
2,730 | sthttpd | c0dc63a49d8605649f1d8e4a96c9b468b0bff660 | https://github.com/blueness/sthttpd | https://github.com/blueness/sthttpd/commit/c0dc63a49d8605649f1d8e4a96c9b468b0bff660 | Fix heap buffer overflow in de_dotdot | 1 | de_dotdot( char* file )
{
char* cp;
char* cp2;
int l;
/* Collapse any multiple / sequences. */
while ( ( cp = strstr( file, "//") ) != (char*) 0 )
{
for ( cp2 = cp + 2; *cp2 == '/'; ++cp2 )
continue;
(void) strcpy( cp + 1, cp2 );
}
/* Remove leading ./ and any /./ sequences. */
... | 45,843,749,197,328,700,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2017-10671 | Heap-based Buffer Overflow in the de_dotdot function in libhttpd.c in sthttpd before 2.27.1 allows remote attackers to cause a denial of service (daemon crash) or possibly have unspecified other impact via a crafted filename. | https://nvd.nist.gov/vuln/detail/CVE-2017-10671 |
160,118 | sthttpd | c0dc63a49d8605649f1d8e4a96c9b468b0bff660 | https://github.com/blueness/sthttpd | https://github.com/blueness/sthttpd/commit/c0dc63a49d8605649f1d8e4a96c9b468b0bff660 | Fix heap buffer overflow in de_dotdot | 0 | de_dotdot( char* file )
{
char* cp;
char* cp2;
int l;
/* Collapse any multiple / sequences. */
while ( ( cp = strstr( file, "//") ) != (char*) 0 )
{
for ( cp2 = cp + 2; *cp2 == '/'; ++cp2 )
continue;
(void) strcpy( cp + 1, cp2 );
}
/* Remove leading ./ and any /./ sequences. */
... | 60,624,892,052,849,830,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2017-10671 | Heap-based Buffer Overflow in the de_dotdot function in libhttpd.c in sthttpd before 2.27.1 allows remote attackers to cause a denial of service (daemon crash) or possibly have unspecified other impact via a crafted filename. | https://nvd.nist.gov/vuln/detail/CVE-2017-10671 |
2,735 | FFmpeg | 1e42736b95065c69a7481d0cf55247024f54b660 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/1e42736b95065c69a7481d0cf55247024f54b660 | avcodec/cdxl: Check format for BGR24
Fixes: out of array access
Fixes: 1427/clusterfuzz-testcase-minimized-5020737339392000
Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/targets/ffmpeg
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 1 | static int cdxl_decode_frame(AVCodecContext *avctx, void *data,
int *got_frame, AVPacket *pkt)
{
CDXLVideoContext *c = avctx->priv_data;
AVFrame * const p = data;
int ret, w, h, encoding, aligned_width, buf_size = pkt->size;
const uint8_t *buf = pkt->data;
if (buf_size ... | 272,076,656,890,640,220,000,000,000,000,000,000,000 | cdxl.c | 286,646,798,604,789,030,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-9996 | The cdxl_decode_frame function in libavcodec/cdxl.c in FFmpeg 2.8.x before 2.8.12, 3.0.x before 3.0.8, 3.1.x before 3.1.8, 3.2.x before 3.2.5, and 3.3.x before 3.3.1 does not exclude the CHUNKY format, which allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possi... | https://nvd.nist.gov/vuln/detail/CVE-2017-9996 |
160,121 | FFmpeg | 1e42736b95065c69a7481d0cf55247024f54b660 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/1e42736b95065c69a7481d0cf55247024f54b660 | avcodec/cdxl: Check format for BGR24
Fixes: out of array access
Fixes: 1427/clusterfuzz-testcase-minimized-5020737339392000
Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/targets/ffmpeg
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 0 | static int cdxl_decode_frame(AVCodecContext *avctx, void *data,
int *got_frame, AVPacket *pkt)
{
CDXLVideoContext *c = avctx->priv_data;
AVFrame * const p = data;
int ret, w, h, encoding, aligned_width, buf_size = pkt->size;
const uint8_t *buf = pkt->data;
if (buf_size ... | 102,871,101,375,031,870,000,000,000,000,000,000,000 | cdxl.c | 223,048,921,965,913,700,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-9996 | The cdxl_decode_frame function in libavcodec/cdxl.c in FFmpeg 2.8.x before 2.8.12, 3.0.x before 3.0.8, 3.1.x before 3.1.8, 3.2.x before 3.2.5, and 3.3.x before 3.3.1 does not exclude the CHUNKY format, which allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possi... | https://nvd.nist.gov/vuln/detail/CVE-2017-9996 |
2,738 | FFmpeg | 6b5d3fb26fb4be48e4966e4b1d97c2165538d4ef | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/6b5d3fb26fb4be48e4966e4b1d97c2165538d4ef | avcodec/webp: Always set pix_fmt
Fixes: out of array access
Fixes: 1434/clusterfuzz-testcase-minimized-6314998085189632
Fixes: 1435/clusterfuzz-testcase-minimized-6483783723253760
Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/targets/ffmpeg
Reviewed-by: "Ronald S. Bultje" <rsbult... | 1 | static int vp8_lossy_decode_frame(AVCodecContext *avctx, AVFrame *p,
int *got_frame, uint8_t *data_start,
unsigned int data_size)
{
WebPContext *s = avctx->priv_data;
AVPacket pkt;
int ret;
if (!s->initialized) {
ff_vp8_decod... | 92,038,738,073,539,860,000,000,000,000,000,000,000 | webp.c | 318,309,543,806,629,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-9994 | libavcodec/webp.c in FFmpeg before 2.8.12, 3.0.x before 3.0.8, 3.1.x before 3.1.8, 3.2.x before 3.2.5, and 3.3.x before 3.3.1 does not ensure that pix_fmt is set, which allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a... | https://nvd.nist.gov/vuln/detail/CVE-2017-9994 |
160,123 | FFmpeg | 6b5d3fb26fb4be48e4966e4b1d97c2165538d4ef | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/6b5d3fb26fb4be48e4966e4b1d97c2165538d4ef | avcodec/webp: Always set pix_fmt
Fixes: out of array access
Fixes: 1434/clusterfuzz-testcase-minimized-6314998085189632
Fixes: 1435/clusterfuzz-testcase-minimized-6483783723253760
Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/targets/ffmpeg
Reviewed-by: "Ronald S. Bultje" <rsbult... | 0 | static int vp8_lossy_decode_frame(AVCodecContext *avctx, AVFrame *p,
int *got_frame, uint8_t *data_start,
unsigned int data_size)
{
WebPContext *s = avctx->priv_data;
AVPacket pkt;
int ret;
if (!s->initialized) {
ff_vp8_decod... | 80,418,567,197,548,210,000,000,000,000,000,000,000 | webp.c | 307,034,377,249,174,900,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-9994 | libavcodec/webp.c in FFmpeg before 2.8.12, 3.0.x before 3.0.8, 3.1.x before 3.1.8, 3.2.x before 3.2.5, and 3.3.x before 3.3.1 does not ensure that pix_fmt is set, which allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a... | https://nvd.nist.gov/vuln/detail/CVE-2017-9994 |
2,739 | FFmpeg | a5d849b149ca67ced2d271dc84db0bc95a548abb | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/a5d849b149ca67ced2d271dc84db0bc95a548abb | avformat/avidec: Limit formats in gab2 to srt and ass/ssa
This prevents part of one exploit leading to an information leak
Found-by: Emil Lerner and Pavel Cheremushkin
Reported-by: Thierry Foucu <tfoucu@google.com>
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 1 | static int read_gab2_sub(AVFormatContext *s, AVStream *st, AVPacket *pkt)
{
if (pkt->size >= 7 &&
pkt->size < INT_MAX - AVPROBE_PADDING_SIZE &&
!strcmp(pkt->data, "GAB2") && AV_RL16(pkt->data + 5) == 2) {
uint8_t desc[256];
int score = AVPROBE_SCORE_EXTENSION, ret;
AVISt... | 57,648,922,262,249,090,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2017-9993 | FFmpeg before 2.8.12, 3.0.x and 3.1.x before 3.1.9, 3.2.x before 3.2.6, and 3.3.x before 3.3.2 does not properly restrict HTTP Live Streaming filename extensions and demuxer names, which allows attackers to read arbitrary files via crafted playlist data. | https://nvd.nist.gov/vuln/detail/CVE-2017-9993 |
160,124 | FFmpeg | a5d849b149ca67ced2d271dc84db0bc95a548abb | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/a5d849b149ca67ced2d271dc84db0bc95a548abb | avformat/avidec: Limit formats in gab2 to srt and ass/ssa
This prevents part of one exploit leading to an information leak
Found-by: Emil Lerner and Pavel Cheremushkin
Reported-by: Thierry Foucu <tfoucu@google.com>
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 0 | static int read_gab2_sub(AVFormatContext *s, AVStream *st, AVPacket *pkt)
{
if (pkt->size >= 7 &&
pkt->size < INT_MAX - AVPROBE_PADDING_SIZE &&
!strcmp(pkt->data, "GAB2") && AV_RL16(pkt->data + 5) == 2) {
uint8_t desc[256];
int score = AVPROBE_SCORE_EXTENSION, ret;
AVISt... | 330,603,969,826,715,060,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2017-9993 | FFmpeg before 2.8.12, 3.0.x and 3.1.x before 3.1.9, 3.2.x before 3.2.6, and 3.3.x before 3.3.2 does not properly restrict HTTP Live Streaming filename extensions and demuxer names, which allows attackers to read arbitrary files via crafted playlist data. | https://nvd.nist.gov/vuln/detail/CVE-2017-9993 |
2,740 | FFmpeg | f52fbf4f3ed02a7d872d8a102006f29b4421f360 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/f52fbf4f3ed02a7d872d8a102006f29b4421f360 | avcodec/dfa: Fix off by 1 error
Fixes out of array access
Fixes: 1345/clusterfuzz-testcase-minimized-6062963045695488
Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/targets/ffmpeg
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 1 | static int decode_dds1(GetByteContext *gb, uint8_t *frame, int width, int height)
{
const uint8_t *frame_start = frame;
const uint8_t *frame_end = frame + width * height;
int mask = 0x10000, bitbuf = 0;
int i, v, offset, count, segments;
segments = bytestream2_get_le16(gb);
while (segments--)... | 311,517,746,864,273,740,000,000,000,000,000,000,000 | dfa.c | 52,043,501,485,622,960,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-9992 | Heap-based buffer overflow in the decode_dds1 function in libavcodec/dfa.c in FFmpeg before 2.8.12, 3.0.x before 3.0.8, 3.1.x before 3.1.8, 3.2.x before 3.2.5, and 3.3.x before 3.3.1 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2017-9992 |
160,125 | FFmpeg | f52fbf4f3ed02a7d872d8a102006f29b4421f360 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/f52fbf4f3ed02a7d872d8a102006f29b4421f360 | avcodec/dfa: Fix off by 1 error
Fixes out of array access
Fixes: 1345/clusterfuzz-testcase-minimized-6062963045695488
Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/targets/ffmpeg
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 0 | static int decode_dds1(GetByteContext *gb, uint8_t *frame, int width, int height)
{
const uint8_t *frame_start = frame;
const uint8_t *frame_end = frame + width * height;
int mask = 0x10000, bitbuf = 0;
int i, v, offset, count, segments;
segments = bytestream2_get_le16(gb);
while (segments--)... | 171,224,325,263,157,400,000,000,000,000,000,000,000 | dfa.c | 148,250,947,754,090,960,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-9992 | Heap-based buffer overflow in the decode_dds1 function in libavcodec/dfa.c in FFmpeg before 2.8.12, 3.0.x before 3.0.8, 3.1.x before 3.1.8, 3.2.x before 3.2.5, and 3.3.x before 3.3.1 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2017-9992 |
2,741 | FFmpeg | 441026fcb13ac23aa10edc312bdacb6445a0ad06 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/441026fcb13ac23aa10edc312bdacb6445a0ad06 | avcodec/xwddec: Check bpp more completely
Fixes out of array access
Fixes: 1399/clusterfuzz-testcase-minimized-4866094172995584
Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/targets/ffmpeg
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 1 | static int xwd_decode_frame(AVCodecContext *avctx, void *data,
int *got_frame, AVPacket *avpkt)
{
AVFrame *p = data;
const uint8_t *buf = avpkt->data;
int i, ret, buf_size = avpkt->size;
uint32_t version, header_size, vclass, ncolors;
uint32_t xoffset, be, bpp, lsize, rsi... | 154,378,037,284,752,480,000,000,000,000,000,000,000 | xwddec.c | 294,025,484,135,912,770,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-9991 | Heap-based buffer overflow in the xwd_decode_frame function in libavcodec/xwddec.c in FFmpeg before 2.8.12, 3.0.x before 3.0.8, 3.1.x before 3.1.8, 3.2.x before 3.2.5, and 3.3.x before 3.3.1 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted ... | https://nvd.nist.gov/vuln/detail/CVE-2017-9991 |
160,126 | FFmpeg | 441026fcb13ac23aa10edc312bdacb6445a0ad06 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/441026fcb13ac23aa10edc312bdacb6445a0ad06 | avcodec/xwddec: Check bpp more completely
Fixes out of array access
Fixes: 1399/clusterfuzz-testcase-minimized-4866094172995584
Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/targets/ffmpeg
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 0 | static int xwd_decode_frame(AVCodecContext *avctx, void *data,
int *got_frame, AVPacket *avpkt)
{
AVFrame *p = data;
const uint8_t *buf = avpkt->data;
int i, ret, buf_size = avpkt->size;
uint32_t version, header_size, vclass, ncolors;
uint32_t xoffset, be, bpp, lsize, rsi... | 211,690,699,807,637,840,000,000,000,000,000,000,000 | xwddec.c | 187,964,561,086,707,450,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-9991 | Heap-based buffer overflow in the xwd_decode_frame function in libavcodec/xwddec.c in FFmpeg before 2.8.12, 3.0.x before 3.0.8, 3.1.x before 3.1.8, 3.2.x before 3.2.5, and 3.3.x before 3.3.1 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted ... | https://nvd.nist.gov/vuln/detail/CVE-2017-9991 |
2,742 | FFmpeg | cb243972b121b1ae6b60a78ff55a0506c69f3879 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/cb243972b121b1ae6b60a78ff55a0506c69f3879 | avcodec/xpmdec: Fix multiple pointer/memory issues
Most of these were found through code review in response to
fixing 1466/clusterfuzz-testcase-minimized-5961584419536896
There is thus no testcase for most of this.
The initial issue was Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/maste... | 1 | static uint32_t color_string_to_rgba(const char *p, int len)
{
uint32_t ret = 0xFF000000;
const ColorEntry *entry;
char color_name[100];
if (*p == '#') {
p++;
len--;
if (len == 3) {
ret |= (hex_char_to_number(p[2]) << 4) |
(hex_char_to_numbe... | 238,040,376,254,480,200,000,000,000,000,000,000,000 | xpmdec.c | 78,083,234,821,023,300,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-9990 | Stack-based buffer overflow in the color_string_to_rgba function in libavcodec/xpmdec.c in FFmpeg 3.3 before 3.3.1 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2017-9990 |
160,127 | FFmpeg | cb243972b121b1ae6b60a78ff55a0506c69f3879 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/cb243972b121b1ae6b60a78ff55a0506c69f3879 | avcodec/xpmdec: Fix multiple pointer/memory issues
Most of these were found through code review in response to
fixing 1466/clusterfuzz-testcase-minimized-5961584419536896
There is thus no testcase for most of this.
The initial issue was Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/maste... | 0 | static uint32_t color_string_to_rgba(const char *p, int len)
{
uint32_t ret = 0xFF000000;
const ColorEntry *entry;
char color_name[100];
len = FFMIN(FFMAX(len, 0), sizeof(color_name) - 1);
if (*p == '#') {
p++;
len--;
if (len == 3) {
ret |= (hex_char_to_nu... | 309,528,883,027,056,070,000,000,000,000,000,000,000 | xpmdec.c | 301,837,735,761,470,030,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-9990 | Stack-based buffer overflow in the color_string_to_rgba function in libavcodec/xpmdec.c in FFmpeg 3.3 before 3.3.1 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2017-9990 |
2,745 | linux | 20e2b791796bd68816fa115f12be5320de2b8021 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/20e2b791796bd68816fa115f12be5320de2b8021 | ALSA: msnd: Optimize / harden DSP and MIDI loops
The ISA msnd drivers have loops fetching the ring-buffer head, tail
and size values inside the loops. Such codes are inefficient and
fragile.
This patch optimizes it, and also adds the sanity check to avoid the
endless loops.
Bugzilla: https://bugzilla.kernel.org/sho... | 1 | void snd_msndmidi_input_read(void *mpuv)
{
unsigned long flags;
struct snd_msndmidi *mpu = mpuv;
void *pwMIDQData = mpu->dev->mappedbase + MIDQ_DATA_BUFF;
spin_lock_irqsave(&mpu->input_lock, flags);
while (readw(mpu->dev->MIDQ + JQS_wTail) !=
readw(mpu->dev->MIDQ + JQS_wHead)) {
u16 wTmp, val;
va... | 241,508,483,468,154,000,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2017-9984 | The snd_msnd_interrupt function in sound/isa/msnd/msnd_pinnacle.c in the Linux kernel through 4.11.7 allows local users to cause a denial of service (over-boundary access) or possibly have unspecified other impact by changing the value of a message queue head pointer between two kernel reads of that value, aka a "doubl... | https://nvd.nist.gov/vuln/detail/CVE-2017-9984 |
160,130 | linux | 20e2b791796bd68816fa115f12be5320de2b8021 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/20e2b791796bd68816fa115f12be5320de2b8021 | ALSA: msnd: Optimize / harden DSP and MIDI loops
The ISA msnd drivers have loops fetching the ring-buffer head, tail
and size values inside the loops. Such codes are inefficient and
fragile.
This patch optimizes it, and also adds the sanity check to avoid the
endless loops.
Bugzilla: https://bugzilla.kernel.org/sho... | 0 | void snd_msndmidi_input_read(void *mpuv)
{
unsigned long flags;
struct snd_msndmidi *mpu = mpuv;
void *pwMIDQData = mpu->dev->mappedbase + MIDQ_DATA_BUFF;
u16 head, tail, size;
spin_lock_irqsave(&mpu->input_lock, flags);
head = readw(mpu->dev->MIDQ + JQS_wHead);
tail = readw(mpu->dev->MIDQ + JQS_wTail);
s... | 297,516,602,952,991,100,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2017-9984 | The snd_msnd_interrupt function in sound/isa/msnd/msnd_pinnacle.c in the Linux kernel through 4.11.7 allows local users to cause a denial of service (over-boundary access) or possibly have unspecified other impact by changing the value of a message queue head pointer between two kernel reads of that value, aka a "doubl... | https://nvd.nist.gov/vuln/detail/CVE-2017-9984 |
2,746 | linux | 20e2b791796bd68816fa115f12be5320de2b8021 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/20e2b791796bd68816fa115f12be5320de2b8021 | ALSA: msnd: Optimize / harden DSP and MIDI loops
The ISA msnd drivers have loops fetching the ring-buffer head, tail
and size values inside the loops. Such codes are inefficient and
fragile.
This patch optimizes it, and also adds the sanity check to avoid the
endless loops.
Bugzilla: https://bugzilla.kernel.org/sho... | 1 | static irqreturn_t snd_msnd_interrupt(int irq, void *dev_id)
{
struct snd_msnd *chip = dev_id;
void *pwDSPQData = chip->mappedbase + DSPQ_DATA_BUFF;
/* Send ack to DSP */
/* inb(chip->io + HP_RXL); */
/* Evaluate queued DSP messages */
while (readw(chip->DSPQ + JQS_wTail) != readw(chip->DSPQ + JQS_wHead... | 157,005,536,200,453,300,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2017-9984 | The snd_msnd_interrupt function in sound/isa/msnd/msnd_pinnacle.c in the Linux kernel through 4.11.7 allows local users to cause a denial of service (over-boundary access) or possibly have unspecified other impact by changing the value of a message queue head pointer between two kernel reads of that value, aka a "doubl... | https://nvd.nist.gov/vuln/detail/CVE-2017-9984 |
160,131 | linux | 20e2b791796bd68816fa115f12be5320de2b8021 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/20e2b791796bd68816fa115f12be5320de2b8021 | ALSA: msnd: Optimize / harden DSP and MIDI loops
The ISA msnd drivers have loops fetching the ring-buffer head, tail
and size values inside the loops. Such codes are inefficient and
fragile.
This patch optimizes it, and also adds the sanity check to avoid the
endless loops.
Bugzilla: https://bugzilla.kernel.org/sho... | 0 | static irqreturn_t snd_msnd_interrupt(int irq, void *dev_id)
{
struct snd_msnd *chip = dev_id;
void *pwDSPQData = chip->mappedbase + DSPQ_DATA_BUFF;
u16 head, tail, size;
/* Send ack to DSP */
/* inb(chip->io + HP_RXL); */
/* Evaluate queued DSP messages */
head = readw(chip->DSPQ + JQS_wHead);
tail =... | 177,448,939,680,897,020,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2017-9984 | The snd_msnd_interrupt function in sound/isa/msnd/msnd_pinnacle.c in the Linux kernel through 4.11.7 allows local users to cause a denial of service (over-boundary access) or possibly have unspecified other impact by changing the value of a message queue head pointer between two kernel reads of that value, aka a "doubl... | https://nvd.nist.gov/vuln/detail/CVE-2017-9984 |
2,752 | radare2 | 65000a7fd9eea62359e6d6714f17b94a99a82edd | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/65000a7fd9eea62359e6d6714f17b94a99a82edd | Fix #7723 - crash in ext2 GRUB code because of variable size array in stack | 1 | grub_ext2_read_block (grub_fshelp_node_t node, grub_disk_addr_t fileblock)
{
struct grub_ext2_data *data = node->data;
struct grub_ext2_inode *inode = &node->inode;
int blknr = -1;
unsigned int blksz = EXT2_BLOCK_SIZE (data);
int log2_blksz = LOG2_EXT2_BLOCK_SIZE (data);
if (grub_le_to_cpu32(inode->flags... | 210,811,521,877,163,650,000,000,000,000,000,000,000 | ext2.c | 53,758,202,141,423,640,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-9763 | The grub_ext2_read_block function in fs/ext2.c in GNU GRUB before 2013-11-12, as used in shlr/grub/fs/ext2.c in radare2 1.5.0, allows remote attackers to cause a denial of service (excessive stack use and application crash) via a crafted binary file, related to use of a variable-size stack array. | https://nvd.nist.gov/vuln/detail/CVE-2017-9763 |
160,136 | radare2 | 65000a7fd9eea62359e6d6714f17b94a99a82edd | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/65000a7fd9eea62359e6d6714f17b94a99a82edd | Fix #7723 - crash in ext2 GRUB code because of variable size array in stack | 0 | grub_ext2_read_block (grub_fshelp_node_t node, grub_disk_addr_t fileblock)
{
struct grub_ext2_data *data = node->data;
struct grub_ext2_inode *inode = &node->inode;
int blknr = -1;
unsigned int blksz = EXT2_BLOCK_SIZE (data);
int log2_blksz = LOG2_EXT2_BLOCK_SIZE (data);
if (grub_le_to_cpu32(inode->flags... | 273,282,090,940,190,200,000,000,000,000,000,000,000 | ext2.c | 281,764,185,056,404,600,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-9763 | The grub_ext2_read_block function in fs/ext2.c in GNU GRUB before 2013-11-12, as used in shlr/grub/fs/ext2.c in radare2 1.5.0, allows remote attackers to cause a denial of service (excessive stack use and application crash) via a crafted binary file, related to use of a variable-size stack array. | https://nvd.nist.gov/vuln/detail/CVE-2017-9763 |
2,757 | linux | 07678eca2cf9c9a18584e546c2b2a0d0c9a3150c | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/07678eca2cf9c9a18584e546c2b2a0d0c9a3150c | drm/vmwgfx: Make sure backup_handle is always valid
When vmw_gb_surface_define_ioctl() is called with an existing buffer,
we end up returning an uninitialized variable in the backup_handle.
The fix is to first initialize backup_handle to 0 just to be sure, and
second, when a user-provided buffer is found, we will use... | 1 | int vmw_gb_surface_define_ioctl(struct drm_device *dev, void *data,
struct drm_file *file_priv)
{
struct vmw_private *dev_priv = vmw_priv(dev);
struct vmw_user_surface *user_srf;
struct vmw_surface *srf;
struct vmw_resource *res;
struct vmw_resource *tmp;
union drm_vmw_gb_surface_create_arg *arg =
(union... | 174,250,850,425,960,800,000,000,000,000,000,000,000 | vmwgfx_surface.c | 245,292,923,373,553,170,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2017-9605 | The vmw_gb_surface_define_ioctl function (accessible via DRM_IOCTL_VMW_GB_SURFACE_CREATE) in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel through 4.11.4 defines a backup_handle variable but does not give it an initial value. If one attempts to create a GB surface, with a previously allocated DMA buffer t... | https://nvd.nist.gov/vuln/detail/CVE-2017-9605 |
160,141 | linux | 07678eca2cf9c9a18584e546c2b2a0d0c9a3150c | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/07678eca2cf9c9a18584e546c2b2a0d0c9a3150c | drm/vmwgfx: Make sure backup_handle is always valid
When vmw_gb_surface_define_ioctl() is called with an existing buffer,
we end up returning an uninitialized variable in the backup_handle.
The fix is to first initialize backup_handle to 0 just to be sure, and
second, when a user-provided buffer is found, we will use... | 0 | int vmw_gb_surface_define_ioctl(struct drm_device *dev, void *data,
struct drm_file *file_priv)
{
struct vmw_private *dev_priv = vmw_priv(dev);
struct vmw_user_surface *user_srf;
struct vmw_surface *srf;
struct vmw_resource *res;
struct vmw_resource *tmp;
union drm_vmw_gb_surface_create_arg *arg =
(union... | 333,843,172,164,796,700,000,000,000,000,000,000,000 | vmwgfx_surface.c | 61,002,937,846,300,540,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2017-9605 | The vmw_gb_surface_define_ioctl function (accessible via DRM_IOCTL_VMW_GB_SURFACE_CREATE) in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel through 4.11.4 defines a backup_handle variable but does not give it an initial value. If one attempts to create a GB surface, with a previously allocated DMA buffer t... | https://nvd.nist.gov/vuln/detail/CVE-2017-9605 |
2,758 | mruby | 5c114c91d4ff31859fcd84cf8bf349b737b90d99 | https://github.com/mruby/mruby | https://github.com/mruby/mruby/commit/5c114c91d4ff31859fcd84cf8bf349b737b90d99 | Clear unused stack region that may refer freed objects; fix #3596 | 1 | mark_context_stack(mrb_state *mrb, struct mrb_context *c)
{
size_t i;
size_t e;
if (c->stack == NULL) return;
e = c->stack - c->stbase;
if (c->ci) e += c->ci->nregs;
if (c->stbase + e > c->stend) e = c->stend - c->stbase;
for (i=0; i<e; i++) {
mrb_value v = c->stbase[i];
if (!mrb_immedi... | 125,574,988,804,055,740,000,000,000,000,000,000,000 | gc.c | 192,625,814,561,719,470,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2017-9527 | The mark_context_stack function in gc.c in mruby through 1.2.0 allows attackers to cause a denial of service (heap-based use-after-free and application crash) or possibly have unspecified other impact via a crafted .rb file. | https://nvd.nist.gov/vuln/detail/CVE-2017-9527 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.