idx
int64
project
string
commit_id
string
project_url
string
commit_url
string
commit_message
string
target
int64
func
string
func_hash
float64
file_name
string
file_hash
float64
cwe
list
cve
string
cve_desc
string
nvd_url
string
160,438
libevent
96f64a022014a208105ead6c8a7066018449d86d
https://github.com/libevent/libevent
https://github.com/libevent/libevent/commit/96f64a022014a208105ead6c8a7066018449d86d
evdns: name_parse(): fix remote stack overread @asn-the-goblin-slayer: "the name_parse() function in libevent's DNS code is vulnerable to a buffer overread. 971 if (cp != name_out) { 972 if (cp + 1 >= end) return -1; 973 *cp++ = '.'; 974 } 975 if (cp + ...
0
name_parse(u8 *packet, int length, int *idx, char *name_out, int name_out_len) { int name_end = -1; int j = *idx; int ptr_count = 0; #define GET32(x) do { if (j + 4 > length) goto err; memcpy(&t32_, packet + j, 4); j += 4; x = ntohl(t32_); } while (0) #define GET16(x) do { if (j + 2 > length) goto err; memcpy(&t_, p...
92,910,843,249,159,790,000,000,000,000,000,000,000
evdns.c
115,534,086,427,827,900,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2016-10195
The name_parse function in evdns.c in libevent before 2.1.6-beta allows remote attackers to have unspecified impact via vectors involving the label_len variable, which triggers an out-of-bounds stack read.
https://nvd.nist.gov/vuln/detail/CVE-2016-10195
3,092
FFmpeg
a5d25faa3f4b18dac737fdb35d0dd68eb0dc2156
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/a5d25faa3f4b18dac737fdb35d0dd68eb0dc2156
ffserver: Check chunk size Fixes out of array access Fixes: poc_ffserver.py Found-by: Paul Cher <paulcher@icloud.com> Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
1
static int http_receive_data(HTTPContext *c) { HTTPContext *c1; int len, loop_run = 0; while (c->chunked_encoding && !c->chunk_size && c->buffer_end > c->buffer_ptr) { /* read chunk header, if present */ len = recv(c->fd, c->buffer_ptr, 1, 0); if (len < 0) { ...
226,374,556,346,204,150,000,000,000,000,000,000,000
ffserver.c
10,780,386,245,231,873,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-10192
Heap-based buffer overflow in ffserver.c in FFmpeg before 2.8.10, 3.0.x before 3.0.5, 3.1.x before 3.1.6, and 3.2.x before 3.2.2 allows remote attackers to execute arbitrary code by leveraging failure to check chunk size.
https://nvd.nist.gov/vuln/detail/CVE-2016-10192
160,439
FFmpeg
a5d25faa3f4b18dac737fdb35d0dd68eb0dc2156
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/a5d25faa3f4b18dac737fdb35d0dd68eb0dc2156
ffserver: Check chunk size Fixes out of array access Fixes: poc_ffserver.py Found-by: Paul Cher <paulcher@icloud.com> Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
0
static int http_receive_data(HTTPContext *c) { HTTPContext *c1; int len, loop_run = 0; while (c->chunked_encoding && !c->chunk_size && c->buffer_end > c->buffer_ptr) { /* read chunk header, if present */ len = recv(c->fd, c->buffer_ptr, 1, 0); if (len < 0) { ...
174,391,890,357,674,700,000,000,000,000,000,000,000
ffserver.c
135,296,140,921,599,870,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-10192
Heap-based buffer overflow in ffserver.c in FFmpeg before 2.8.10, 3.0.x before 3.0.5, 3.1.x before 3.1.6, and 3.2.x before 3.2.2 allows remote attackers to execute arbitrary code by leveraging failure to check chunk size.
https://nvd.nist.gov/vuln/detail/CVE-2016-10192
3,100
bitlbee
701ab8129ba9ea64f569daedca9a8603abad740f
https://github.com/bitlbee/bitlbee
https://github.com/bitlbee/bitlbee/commit/701ab8129ba9ea64f569daedca9a8603abad740f
imcb_file_send_start: handle ft attempts from non-existing users
1
file_transfer_t *imcb_file_send_start(struct im_connection *ic, char *handle, char *file_name, size_t file_size) { bee_t *bee = ic->bee; bee_user_t *bu = bee_user_by_handle(bee, ic, handle); if (bee->ui->ft_in_start) { return bee->ui->ft_in_start(bee, bu, file_name, file_size); } else { return NULL; } }...
295,316,547,559,436,450,000,000,000,000,000,000,000
bee_ft.c
22,913,504,337,913,935,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2016-10189
BitlBee before 3.5 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) and possibly execute arbitrary code via a file transfer request for a contact that is not in the contact list.
https://nvd.nist.gov/vuln/detail/CVE-2016-10189
160,448
bitlbee
701ab8129ba9ea64f569daedca9a8603abad740f
https://github.com/bitlbee/bitlbee
https://github.com/bitlbee/bitlbee/commit/701ab8129ba9ea64f569daedca9a8603abad740f
imcb_file_send_start: handle ft attempts from non-existing users
0
file_transfer_t *imcb_file_send_start(struct im_connection *ic, char *handle, char *file_name, size_t file_size) { bee_t *bee = ic->bee; bee_user_t *bu = bee_user_by_handle(bee, ic, handle); if (bee->ui->ft_in_start && bu) { return bee->ui->ft_in_start(bee, bu, file_name, file_size); } else { return NULL...
96,363,477,977,669,400,000,000,000,000,000,000,000
bee_ft.c
79,543,836,780,597,760,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2016-10189
BitlBee before 3.5 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) and possibly execute arbitrary code via a file transfer request for a contact that is not in the contact list.
https://nvd.nist.gov/vuln/detail/CVE-2016-10189
3,103
php-src
16b3003ffc6393e250f069aa28a78dc5a2c064b2
https://github.com/php/php-src
https://github.com/php/php-src/commit/16b3003ffc6393e250f069aa28a78dc5a2c064b2
Fix bug #73825 - Heap out of bounds read on unserialize in finish_nested_data()
1
static inline long object_common1(UNSERIALIZE_PARAMETER, zend_class_entry *ce) { long elements; elements = parse_iv2((*p) + 2, p); (*p) += 2; if (ce->serialize == NULL) { object_init_ex(*rval, ce); } else { /* If this class implements Serializable, it should not land here but in object_custom(). The ...
67,720,542,164,557,350,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2016-10161
The object_common1 function in ext/standard/var_unserializer.c in PHP before 5.6.30, 7.0.x before 7.0.15, and 7.1.x before 7.1.1 allows remote attackers to cause a denial of service (buffer over-read and application crash) via crafted serialized data that is mishandled in a finish_nested_data call.
https://nvd.nist.gov/vuln/detail/CVE-2016-10161
160,454
php-src
16b3003ffc6393e250f069aa28a78dc5a2c064b2
https://github.com/php/php-src
https://github.com/php/php-src/commit/16b3003ffc6393e250f069aa28a78dc5a2c064b2
Fix bug #73825 - Heap out of bounds read on unserialize in finish_nested_data()
0
static inline long object_common1(UNSERIALIZE_PARAMETER, zend_class_entry *ce) { long elements; if( *p >= max - 2) { zend_error(E_WARNING, "Bad unserialize data"); return -1; } elements = parse_iv2((*p) + 2, p); (*p) += 2; if (ce->serialize == NULL) { object_init_ex(*rval, ce); } else { /* If ...
52,996,959,303,945,110,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2016-10161
The object_common1 function in ext/standard/var_unserializer.c in PHP before 5.6.30, 7.0.x before 7.0.15, and 7.1.x before 7.1.1 allows remote attackers to cause a denial of service (buffer over-read and application crash) via crafted serialized data that is mishandled in a finish_nested_data call.
https://nvd.nist.gov/vuln/detail/CVE-2016-10161
3,105
php-src
1cda0d7c2ffb62d8331c64e703131d9cabdc03ea
https://github.com/php/php-src
https://github.com/php/php-src/commit/1cda0d7c2ffb62d8331c64e703131d9cabdc03ea
Fix bug #73737 FPE when parsing a tag format
1
static size_t exif_convert_any_to_int(void *value, int format, int motorola_intel TSRMLS_DC) { int s_den; unsigned u_den; switch(format) { case TAG_FMT_SBYTE: return *(signed char *)value; case TAG_FMT_BYTE: return *(uchar *)value; case TAG_FMT_USHORT: return php_ifd_get16u(value, motorola_int...
117,898,004,511,095,570,000,000,000,000,000,000,000
exif.c
125,847,680,861,239,830,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2016-10158
The exif_convert_any_to_int function in ext/exif/exif.c in PHP before 5.6.30, 7.0.x before 7.0.15, and 7.1.x before 7.1.1 allows remote attackers to cause a denial of service (application crash) via crafted EXIF data that triggers an attempt to divide the minimum representable negative integer by -1.
https://nvd.nist.gov/vuln/detail/CVE-2016-10158
160,456
php-src
1cda0d7c2ffb62d8331c64e703131d9cabdc03ea
https://github.com/php/php-src
https://github.com/php/php-src/commit/1cda0d7c2ffb62d8331c64e703131d9cabdc03ea
Fix bug #73737 FPE when parsing a tag format
0
static size_t exif_convert_any_to_int(void *value, int format, int motorola_intel TSRMLS_DC) { int s_den; unsigned u_den; switch(format) { case TAG_FMT_SBYTE: return *(signed char *)value; case TAG_FMT_BYTE: return *(uchar *)value; case TAG_FMT_USHORT: return php_ifd_get16u(value, motorola_int...
167,339,613,556,723,130,000,000,000,000,000,000,000
exif.c
234,617,860,043,523,420,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2016-10158
The exif_convert_any_to_int function in ext/exif/exif.c in PHP before 5.6.30, 7.0.x before 7.0.15, and 7.1.x before 7.1.1 allows remote attackers to cause a denial of service (application crash) via crafted EXIF data that triggers an attempt to divide the minimum representable negative integer by -1.
https://nvd.nist.gov/vuln/detail/CVE-2016-10158
3,106
systemd
06eeacb6fe029804f296b065b3ce91e796e1cd0e
https://github.com/systemd/systemd
https://github.com/systemd/systemd/commit/06eeacb6fe029804f296b065b3ce91e796e1cd0e
basic: fix touch() creating files with 07777 mode mode_t is unsigned, so MODE_INVALID < 0 can never be true. This fixes a possible DoS where any user could fill /run by writing to a world-writable /run/systemd/show-status.
1
int touch_file(const char *path, bool parents, usec_t stamp, uid_t uid, gid_t gid, mode_t mode) { _cleanup_close_ int fd; int r; assert(path); if (parents) mkdir_parents(path, 0755); fd = open(path, O_WRONLY|O_CREAT|O_CLOEXEC|O_NOCTTY, mode > 0 ? mode : 0644...
144,648,291,483,335,600,000,000,000,000,000,000,000
fs-util.c
25,832,733,540,396,505,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2016-10156
A flaw in systemd v228 in /src/basic/fs-util.c caused world writable suid files to be created when using the systemd timers features, allowing local attackers to escalate their privileges to root. This is fixed in v229.
https://nvd.nist.gov/vuln/detail/CVE-2016-10156
160,457
systemd
06eeacb6fe029804f296b065b3ce91e796e1cd0e
https://github.com/systemd/systemd
https://github.com/systemd/systemd/commit/06eeacb6fe029804f296b065b3ce91e796e1cd0e
basic: fix touch() creating files with 07777 mode mode_t is unsigned, so MODE_INVALID < 0 can never be true. This fixes a possible DoS where any user could fill /run by writing to a world-writable /run/systemd/show-status.
0
int touch_file(const char *path, bool parents, usec_t stamp, uid_t uid, gid_t gid, mode_t mode) { _cleanup_close_ int fd; int r; assert(path); if (parents) mkdir_parents(path, 0755); fd = open(path, O_WRONLY|O_CREAT|O_CLOEXEC|O_NOCTTY, ...
261,094,024,178,118,060,000,000,000,000,000,000,000
fs-util.c
50,325,332,525,198,760,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2016-10156
A flaw in systemd v228 in /src/basic/fs-util.c caused world writable suid files to be created when using the systemd timers features, allowing local attackers to escalate their privileges to root. This is fixed in v229.
https://nvd.nist.gov/vuln/detail/CVE-2016-10156
3,107
linux
06deeec77a5a689cc94b21a8a91a76e42176685d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/06deeec77a5a689cc94b21a8a91a76e42176685d
cifs: Fix smbencrypt() to stop pointing a scatterlist at the stack smbencrypt() points a scatterlist to the stack, which is breaks if CONFIG_VMAP_STACK=y. Fix it by switching to crypto_cipher_encrypt_one(). The new code should be considerably faster as an added benefit. This code is nearly identical to some code th...
1
smbhash(unsigned char *out, const unsigned char *in, unsigned char *key) { int rc; unsigned char key2[8]; struct crypto_skcipher *tfm_des; struct scatterlist sgin, sgout; struct skcipher_request *req; str_to_key(key, key2); tfm_des = crypto_alloc_skcipher("ecb(des)", 0, CRYPTO_ALG_ASYNC); if (IS_ERR(tf...
257,379,465,516,682,100,000,000,000,000,000,000,000
smbencrypt.c
324,230,031,737,444,380,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-10154
The smbhash function in fs/cifs/smbencrypt.c in the Linux kernel 4.9.x before 4.9.1 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page...
https://nvd.nist.gov/vuln/detail/CVE-2016-10154
160,458
linux
06deeec77a5a689cc94b21a8a91a76e42176685d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/06deeec77a5a689cc94b21a8a91a76e42176685d
cifs: Fix smbencrypt() to stop pointing a scatterlist at the stack smbencrypt() points a scatterlist to the stack, which is breaks if CONFIG_VMAP_STACK=y. Fix it by switching to crypto_cipher_encrypt_one(). The new code should be considerably faster as an added benefit. This code is nearly identical to some code th...
0
smbhash(unsigned char *out, const unsigned char *in, unsigned char *key) { unsigned char key2[8]; struct crypto_cipher *tfm_des; str_to_key(key, key2); tfm_des = crypto_alloc_cipher("des", 0, 0); if (IS_ERR(tfm_des)) { cifs_dbg(VFS, "could not allocate des crypto API\n"); return PTR_ERR(tfm_des); }...
296,440,717,411,516,900,000,000,000,000,000,000,000
smbencrypt.c
31,273,539,666,737,430,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-10154
The smbhash function in fs/cifs/smbencrypt.c in the Linux kernel 4.9.x before 4.9.1 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page...
https://nvd.nist.gov/vuln/detail/CVE-2016-10154
3,114
ImageMagick
97566cf2806c0a5a86e884c96831a0c3b1ec6c20
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/97566cf2806c0a5a86e884c96831a0c3b1ec6c20
None
1
static MagickBooleanType WriteIPLImage(const ImageInfo *image_info,Image *image) { ExceptionInfo *exception; IPLInfo ipl_info; MagickBooleanType status; MagickOffsetType scene; register const PixelPacket *p; QuantumInfo *quantum_info; ssize_t y; unsigned char *pixe...
168,604,460,062,043,490,000,000,000,000,000,000,000
None
null
[ "CWE-284" ]
CVE-2016-10144
coders/ipl.c in ImageMagick allows remote attackers to have unspecific impact by leveraging a missing malloc check.
https://nvd.nist.gov/vuln/detail/CVE-2016-10144
160,463
ImageMagick
97566cf2806c0a5a86e884c96831a0c3b1ec6c20
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/97566cf2806c0a5a86e884c96831a0c3b1ec6c20
None
0
static MagickBooleanType WriteIPLImage(const ImageInfo *image_info,Image *image) { ExceptionInfo *exception; IPLInfo ipl_info; MagickBooleanType status; MagickOffsetType scene; register const PixelPacket *p; QuantumInfo *quantum_info; ssize_t y; unsigned char *pixe...
126,862,528,697,678,500,000,000,000,000,000,000,000
None
null
[ "CWE-284" ]
CVE-2016-10144
coders/ipl.c in ImageMagick allows remote attackers to have unspecific impact by leveraging a missing malloc check.
https://nvd.nist.gov/vuln/detail/CVE-2016-10144
3,115
libgit2
9a64e62f0f20c9cf9b2e1609f037060eb2d8eb22
https://github.com/libgit2/libgit2
https://github.com/libgit2/libgit2/commit/9a64e62f0f20c9cf9b2e1609f037060eb2d8eb22
http: check certificate validity before clobbering the error variable
1
static int http_connect(http_subtransport *t) { int error; if (t->connected && http_should_keep_alive(&t->parser) && t->parse_finished) return 0; if (t->io) { git_stream_close(t->io); git_stream_free(t->io); t->io = NULL; t->connected = 0; } if (t->connection_data.use_ssl) { error = git_tls_stre...
196,554,667,555,384,750,000,000,000,000,000,000,000
http.c
262,511,896,804,073,250,000,000,000,000,000,000,000
[ "CWE-284" ]
CVE-2016-10130
The http_connect function in transports/http.c in libgit2 before 0.24.6 and 0.25.x before 0.25.1 might allow man-in-the-middle attackers to spoof servers by leveraging clobbering of the error variable.
https://nvd.nist.gov/vuln/detail/CVE-2016-10130
160,464
libgit2
9a64e62f0f20c9cf9b2e1609f037060eb2d8eb22
https://github.com/libgit2/libgit2
https://github.com/libgit2/libgit2/commit/9a64e62f0f20c9cf9b2e1609f037060eb2d8eb22
http: check certificate validity before clobbering the error variable
0
static int http_connect(http_subtransport *t) { int error; if (t->connected && http_should_keep_alive(&t->parser) && t->parse_finished) return 0; if (t->io) { git_stream_close(t->io); git_stream_free(t->io); t->io = NULL; t->connected = 0; } if (t->connection_data.use_ssl) { error = git_tls_stre...
332,711,528,143,510,100,000,000,000,000,000,000,000
http.c
132,296,802,371,283,950,000,000,000,000,000,000,000
[ "CWE-284" ]
CVE-2016-10130
The http_connect function in transports/http.c in libgit2 before 0.24.6 and 0.25.x before 0.25.1 might allow man-in-the-middle attackers to spoof servers by leveraging clobbering of the error variable.
https://nvd.nist.gov/vuln/detail/CVE-2016-10130
3,120
libtiff
c7153361a4041260719b340f73f2f76
https://github.com/vadz/libtiff
https://github.com/vadz/libtiff/commit/c7153361a4041260719b340f73f2f76
* tools/tiff2pdf.c: avoid potential heap-based overflow in t2p_readwrite_pdf_image_tile(). Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2640
1
tsize_t t2p_readwrite_pdf_image_tile(T2P* t2p, TIFF* input, TIFF* output, ttile_t tile){ uint16 edge=0; tsize_t written=0; unsigned char* buffer=NULL; tsize_t bufferoffset=0; unsigned char* samplebuffer=NULL; tsize_t samplebufferoffset=0; tsize_t read=0; uint16 i=0; ttile_t tilecount=0; /* tsize_t tilesize=0...
189,588,000,909,003,600,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2016-10094
Off-by-one error in the t2p_readwrite_pdf_image_tile function in tools/tiff2pdf.c in LibTIFF 4.0.7 allows remote attackers to have unspecified impact via a crafted image.
https://nvd.nist.gov/vuln/detail/CVE-2016-10094
160,467
libtiff
c7153361a4041260719b340f73f2f76
https://github.com/vadz/libtiff
https://github.com/vadz/libtiff/commit/c7153361a4041260719b340f73f2f76
* tools/tiff2pdf.c: avoid potential heap-based overflow in t2p_readwrite_pdf_image_tile(). Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2640
0
tsize_t t2p_readwrite_pdf_image_tile(T2P* t2p, TIFF* input, TIFF* output, ttile_t tile){ uint16 edge=0; tsize_t written=0; unsigned char* buffer=NULL; tsize_t bufferoffset=0; unsigned char* samplebuffer=NULL; tsize_t samplebufferoffset=0; tsize_t read=0; uint16 i=0; ttile_t tilecount=0; /* tsize_t tilesize=0...
42,551,173,115,675,010,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2016-10094
Off-by-one error in the t2p_readwrite_pdf_image_tile function in tools/tiff2pdf.c in LibTIFF 4.0.7 allows remote attackers to have unspecified impact via a crafted image.
https://nvd.nist.gov/vuln/detail/CVE-2016-10094
3,124
ImageMagick
b173a352397877775c51c9a0e9d59eb6ce24c455
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/b173a352397877775c51c9a0e9d59eb6ce24c455
None
1
static Image *ReadMATImage(const ImageInfo *image_info,ExceptionInfo *exception) { Image *image, *image2=NULL, *rotated_image; PixelPacket *q; unsigned int status; MATHeader MATLAB_HDR; size_t size; size_t CellType; QuantumInfo *quantum_info; ImageInfo *clone_info; int i; ssize_t ldblk; unsign...
192,269,583,203,591,370,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2016-10070
Heap-based buffer overflow in the CalcMinMax function in coders/mat.c in ImageMagick before 6.9.4-0 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted mat file.
https://nvd.nist.gov/vuln/detail/CVE-2016-10070
160,469
ImageMagick
b173a352397877775c51c9a0e9d59eb6ce24c455
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/b173a352397877775c51c9a0e9d59eb6ce24c455
None
0
static Image *ReadMATImage(const ImageInfo *image_info,ExceptionInfo *exception) { Image *image, *image2=NULL, *rotated_image; PixelPacket *q; unsigned int status; MATHeader MATLAB_HDR; size_t size; size_t CellType; QuantumInfo *quantum_info; ImageInfo *clone_info; int i; ssize_t ldblk; unsign...
55,468,442,686,930,240,000,000,000,000,000,000,000
mat.c
192,634,289,003,886,670,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2016-10070
Heap-based buffer overflow in the CalcMinMax function in coders/mat.c in ImageMagick before 6.9.4-0 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted mat file.
https://nvd.nist.gov/vuln/detail/CVE-2016-10070
3,125
ImageMagick
8a370f9ab120faf182aa160900ba692ba8e2bcf0
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/8a370f9ab120faf182aa160900ba692ba8e2bcf0
None
1
static Image *ReadMATImage(const ImageInfo *image_info,ExceptionInfo *exception) { Image *image, *image2=NULL, *rotated_image; PixelPacket *q; unsigned int status; MATHeader MATLAB_HDR; size_t size; size_t CellType; QuantumInfo *quantum_info; ImageInfo *clone_info; int i; ssize_t ldblk; unsign...
326,982,455,566,319,460,000,000,000,000,000,000,000
mat.c
137,745,844,689,009,620,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2016-10069
coders/mat.c in ImageMagick before 6.9.4-5 allows remote attackers to cause a denial of service (application crash) via a mat file with an invalid number of frames.
https://nvd.nist.gov/vuln/detail/CVE-2016-10069
160,470
ImageMagick
8a370f9ab120faf182aa160900ba692ba8e2bcf0
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/8a370f9ab120faf182aa160900ba692ba8e2bcf0
None
0
static Image *ReadMATImage(const ImageInfo *image_info,ExceptionInfo *exception) { Image *image, *image2=NULL, *rotated_image; PixelPacket *q; unsigned int status; MATHeader MATLAB_HDR; size_t size; size_t CellType; QuantumInfo *quantum_info; ImageInfo *clone_info; int i; ssize_t ldblk; unsign...
88,145,809,021,505,630,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2016-10069
coders/mat.c in ImageMagick before 6.9.4-5 allows remote attackers to cause a denial of service (application crash) via a mat file with an invalid number of frames.
https://nvd.nist.gov/vuln/detail/CVE-2016-10069
3,126
ImageMagick
56d6e20de489113617cbbddaf41e92600a34db22
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/56d6e20de489113617cbbddaf41e92600a34db22
None
1
static void MSLStartElement(void *context,const xmlChar *tag, const xmlChar **attributes) { AffineMatrix affine, current; ChannelType channel; char key[MaxTextExtent], *value; const char *attribute, *keyword; double angle; DrawInfo *draw_info; ExceptionInfo ...
109,071,652,637,853,450,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2016-10068
The MSL interpreter in ImageMagick before 6.9.6-4 allows remote attackers to cause a denial of service (segmentation fault and application crash) via a crafted XML file.
https://nvd.nist.gov/vuln/detail/CVE-2016-10068
160,471
ImageMagick
56d6e20de489113617cbbddaf41e92600a34db22
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/56d6e20de489113617cbbddaf41e92600a34db22
None
0
static void MSLStartElement(void *context,const xmlChar *tag, const xmlChar **attributes) { AffineMatrix affine, current; ChannelType channel; char key[MaxTextExtent], *value; const char *attribute, *keyword; double angle; DrawInfo *draw_info; ExceptionInfo ...
265,791,920,018,166,770,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2016-10068
The MSL interpreter in ImageMagick before 6.9.6-4 allows remote attackers to cause a denial of service (segmentation fault and application crash) via a crafted XML file.
https://nvd.nist.gov/vuln/detail/CVE-2016-10068
3,128
ImageMagick
0474237508f39c4f783208123431815f1ededb76
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/0474237508f39c4f783208123431815f1ededb76
None
1
static Image *ReadVIFFImage(const ImageInfo *image_info, ExceptionInfo *exception) { #define VFF_CM_genericRGB 15 #define VFF_CM_ntscRGB 1 #define VFF_CM_NONE 0 #define VFF_DEP_DECORDER 0x4 #define VFF_DEP_NSORDER 0x8 #define VFF_DES_RAW 0 #define VFF_LOC_IMPLICIT 1 #define VFF_MAPTYP_NONE 0 #define VFF_MA...
87,441,195,499,598,980,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-10067
magick/memory.c in ImageMagick before 6.9.4-5 allows remote attackers to cause a denial of service (application crash) via vectors involving "too many exceptions," which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2016-10067
160,473
ImageMagick
0474237508f39c4f783208123431815f1ededb76
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/0474237508f39c4f783208123431815f1ededb76
None
0
static Image *ReadVIFFImage(const ImageInfo *image_info, ExceptionInfo *exception) { #define VFF_CM_genericRGB 15 #define VFF_CM_ntscRGB 1 #define VFF_CM_NONE 0 #define VFF_DEP_DECORDER 0x4 #define VFF_DEP_NSORDER 0x8 #define VFF_DES_RAW 0 #define VFF_LOC_IMPLICIT 1 #define VFF_MAPTYP_NONE 0 #define VFF_MA...
31,309,987,483,495,790,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-10067
magick/memory.c in ImageMagick before 6.9.4-5 allows remote attackers to cause a denial of service (application crash) via vectors involving "too many exceptions," which trigger a buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2016-10067
3,194
ImageMagick
f6e9d0d9955e85bdd7540b251cd50d598dacc5e6
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/f6e9d0d9955e85bdd7540b251cd50d598dacc5e6
None
1
static Image *ReadVIFFImage(const ImageInfo *image_info, ExceptionInfo *exception) { #define VFF_CM_genericRGB 15 #define VFF_CM_ntscRGB 1 #define VFF_CM_NONE 0 #define VFF_DEP_DECORDER 0x4 #define VFF_DEP_NSORDER 0x8 #define VFF_DES_RAW 0 #define VFF_LOC_IMPLICIT 1 #define VFF_MAPTYP_NONE 0 #define VFF_MAPTY...
194,560,327,807,090,180,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-10066
Buffer overflow in the ReadVIFFImage function in coders/viff.c in ImageMagick before 6.9.4-5 allows remote attackers to cause a denial of service (application crash) via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2016-10066
160,534
ImageMagick
f6e9d0d9955e85bdd7540b251cd50d598dacc5e6
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/f6e9d0d9955e85bdd7540b251cd50d598dacc5e6
None
0
static Image *ReadVIFFImage(const ImageInfo *image_info, ExceptionInfo *exception) { #define VFF_CM_genericRGB 15 #define VFF_CM_ntscRGB 1 #define VFF_CM_NONE 0 #define VFF_DEP_DECORDER 0x4 #define VFF_DEP_NSORDER 0x8 #define VFF_DES_RAW 0 #define VFF_LOC_IMPLICIT 1 #define VFF_MAPTYP_NONE 0 #define VFF_MAPTY...
61,645,540,667,684,990,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-10066
Buffer overflow in the ReadVIFFImage function in coders/viff.c in ImageMagick before 6.9.4-5 allows remote attackers to cause a denial of service (application crash) via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2016-10066
3,200
ImageMagick
f8877abac8e568b2f339cca70c2c3c1b6eaec288
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/f8877abac8e568b2f339cca70c2c3c1b6eaec288
None
1
static Image *ReadTIFFImage(const ImageInfo *image_info, ExceptionInfo *exception) { const char *option; float *chromaticity, x_position, y_position, x_resolution, y_resolution; Image *image; int tiff_status; MagickBooleanType status; MagickSizeType number_pixe...
58,632,908,984,196,000,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-10064
Buffer overflow in coders/tiff.c in ImageMagick before 6.9.5-1 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2016-10064
160,539
ImageMagick
f8877abac8e568b2f339cca70c2c3c1b6eaec288
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/f8877abac8e568b2f339cca70c2c3c1b6eaec288
None
0
static Image *ReadTIFFImage(const ImageInfo *image_info, ExceptionInfo *exception) { const char *option; float *chromaticity, x_position, y_position, x_resolution, y_resolution; Image *image; int tiff_status; MagickBooleanType status; MagickSizeType number_pixe...
16,759,274,679,753,153,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-10064
Buffer overflow in coders/tiff.c in ImageMagick before 6.9.5-1 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2016-10064
3,203
ImageMagick
933e96f01a8c889c7bf5ffd30020e86a02a046e7
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/933e96f01a8c889c7bf5ffd30020e86a02a046e7
https://github.com/ImageMagick/ImageMagick/issues/196
1
static MagickBooleanType ConcatenateImages(int argc,char **argv, ExceptionInfo *exception ) { FILE *input, *output; int c; register ssize_t i; if (ExpandFilenames(&argc,&argv) == MagickFalse) ThrowFileException(exception,ResourceLimitError,"MemoryAllocationFailed", ...
20,999,313,557,570,732,000,000,000,000,000,000,000
magick-cli.c
12,808,080,539,331,031,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2016-10060
The ConcatenateImages function in MagickWand/magick-cli.c in ImageMagick before 7.0.1-10 does not check the return value of the fputc function, which allows remote attackers to cause a denial of service (application crash) via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2016-10060
160,540
ImageMagick
933e96f01a8c889c7bf5ffd30020e86a02a046e7
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/933e96f01a8c889c7bf5ffd30020e86a02a046e7
https://github.com/ImageMagick/ImageMagick/issues/196
0
static MagickBooleanType ConcatenateImages(int argc,char **argv, ExceptionInfo *exception ) { FILE *input, *output; MagickBooleanType status; int c; register ssize_t i; if (ExpandFilenames(&argc,&argv) == MagickFalse) ThrowFileException(exception,ResourceLimitError,"M...
81,059,994,454,607,910,000,000,000,000,000,000,000
magick-cli.c
31,118,888,895,649,180,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2016-10060
The ConcatenateImages function in MagickWand/magick-cli.c in ImageMagick before 7.0.1-10 does not check the return value of the fputc function, which allows remote attackers to cause a denial of service (application crash) via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2016-10060
9,511
ImageMagick
10b3823a7619ed22d42764733eb052c4159bc8c1
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/10b3823a7619ed22d42764733eb052c4159bc8c1
None
1
MagickBooleanType sixel_decode(unsigned char /* in */ *p, /* sixel bytes */ unsigned char /* out */ **pixels, /* decoded pixels */ size_t /* out */ *pwidth, /* image width */ ...
35,991,042,325,313,126,000,000,000,000,000,000,000
sixel.c
213,717,042,796,677,070,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-10054
Buffer overflow in the WriteMAPImage function in coders/map.c in ImageMagick before 6.9.5-8 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2016-10054
184,596
ImageMagick
10b3823a7619ed22d42764733eb052c4159bc8c1
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/10b3823a7619ed22d42764733eb052c4159bc8c1
None
0
MagickBooleanType sixel_decode(unsigned char /* in */ *p, /* sixel bytes */ unsigned char /* out */ **pixels, /* decoded pixels */ size_t /* out */ *pwidth, /* image width */ ...
185,708,913,973,440,460,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-10054
Buffer overflow in the WriteMAPImage function in coders/map.c in ImageMagick before 6.9.5-8 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2016-10054
3,211
ImageMagick
f983dcdf9c178e0cbc49608a78713c5669aa1bb5
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/f983dcdf9c178e0cbc49608a78713c5669aa1bb5
None
1
static MagickBooleanType WriteTIFFImage(const ImageInfo *image_info, Image *image) { #if !defined(TIFFDefaultStripSize) #define TIFFDefaultStripSize(tiff,request) (8192UL/TIFFScanlineSize(tiff)) #endif const char *mode, *option; CompressionType compression; EndianType endian_type; MagickB...
142,572,469,438,655,880,000,000,000,000,000,000,000
None
null
[ "CWE-369" ]
CVE-2016-10053
The WriteTIFFImage function in coders/tiff.c in ImageMagick before 6.9.5-8 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2016-10053
160,543
ImageMagick
f983dcdf9c178e0cbc49608a78713c5669aa1bb5
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/f983dcdf9c178e0cbc49608a78713c5669aa1bb5
None
0
static MagickBooleanType WriteTIFFImage(const ImageInfo *image_info, Image *image) { #if !defined(TIFFDefaultStripSize) #define TIFFDefaultStripSize(tiff,request) (8192UL/TIFFScanlineSize(tiff)) #endif const char *mode, *option; CompressionType compression; EndianType endian_type; MagickB...
44,616,049,784,015,430,000,000,000,000,000,000,000
None
null
[ "CWE-369" ]
CVE-2016-10053
The WriteTIFFImage function in coders/tiff.c in ImageMagick before 6.9.5-8 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2016-10053
3,212
ImageMagick
ecc03a2518c2b7dd375fde3a040fdae0bdf6a521
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/ecc03a2518c2b7dd375fde3a040fdae0bdf6a521
None
1
static Image *ReadPWPImage(const ImageInfo *image_info,ExceptionInfo *exception) { FILE *file; Image *image, *next_image, *pwp_image; ImageInfo *read_info; int c, unique_file; MagickBooleanType status; register Image *p; register ssize_t i; size_t files...
35,362,358,607,063,336,000,000,000,000,000,000,000
None
null
[ "CWE-416" ]
CVE-2016-10051
Use-after-free vulnerability in the ReadPWPImage function in coders/pwp.c in ImageMagick 6.9.5-5 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2016-10051
160,544
ImageMagick
ecc03a2518c2b7dd375fde3a040fdae0bdf6a521
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/ecc03a2518c2b7dd375fde3a040fdae0bdf6a521
None
0
static Image *ReadPWPImage(const ImageInfo *image_info,ExceptionInfo *exception) { FILE *file; Image *image, *next_image, *pwp_image; ImageInfo *read_info; int c, unique_file; MagickBooleanType status; register Image *p; register ssize_t i; size_t files...
22,718,158,323,206,855,000,000,000,000,000,000,000
None
null
[ "CWE-416" ]
CVE-2016-10051
Use-after-free vulnerability in the ReadPWPImage function in coders/pwp.c in ImageMagick 6.9.5-5 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2016-10051
3,213
ImageMagick
73fb0aac5b958521e1511e179ecc0ad49f70ebaf
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/73fb0aac5b958521e1511e179ecc0ad49f70ebaf
None
1
static Image *ReadRLEImage(const ImageInfo *image_info,ExceptionInfo *exception) { #define SkipLinesOp 0x01 #define SetColorOp 0x02 #define SkipPixelsOp 0x03 #define ByteDataOp 0x05 #define RunDataOp 0x06 #define EOFOp 0x07 char magick[12]; Image *image; IndexPacket index; int opcode, ...
75,140,968,535,640,320,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-10050
Heap-based buffer overflow in the ReadRLEImage function in coders/rle.c in ImageMagick 6.9.4-8 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted RLE file.
https://nvd.nist.gov/vuln/detail/CVE-2016-10050
160,545
ImageMagick
73fb0aac5b958521e1511e179ecc0ad49f70ebaf
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/73fb0aac5b958521e1511e179ecc0ad49f70ebaf
None
0
static Image *ReadRLEImage(const ImageInfo *image_info,ExceptionInfo *exception) { #define SkipLinesOp 0x01 #define SetColorOp 0x02 #define SkipPixelsOp 0x03 #define ByteDataOp 0x05 #define RunDataOp 0x06 #define EOFOp 0x07 char magick[12]; Image *image; IndexPacket index; int opcode, ...
312,064,195,008,050,900,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-10050
Heap-based buffer overflow in the ReadRLEImage function in coders/rle.c in ImageMagick 6.9.4-8 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted RLE file.
https://nvd.nist.gov/vuln/detail/CVE-2016-10050
3,216
ImageMagick
fc6080f1321fd21e86ef916195cc110b05d9effb
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/fc6080f1321fd21e86ef916195cc110b05d9effb
None
1
MagickExport XMLTreeInfo *NewXMLTree(const char *xml,ExceptionInfo *exception) { char **attribute, **attributes, *tag, *utf8; int c, terminal; MagickBooleanType status; register char *p; register ssize_t i; size_t ignore_depth, length; ssize_t j, l...
132,413,851,071,805,780,000,000,000,000,000,000,000
None
null
[ "CWE-22" ]
CVE-2016-10048
Directory traversal vulnerability in magick/module.c in ImageMagick 6.9.4-7 allows remote attackers to load arbitrary modules via unspecified vectors.
https://nvd.nist.gov/vuln/detail/CVE-2016-10048
160,547
ImageMagick
fc6080f1321fd21e86ef916195cc110b05d9effb
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/fc6080f1321fd21e86ef916195cc110b05d9effb
None
0
MagickExport XMLTreeInfo *NewXMLTree(const char *xml,ExceptionInfo *exception) { char **attribute, **attributes, *tag, *utf8; int c, terminal; MagickBooleanType status; register char *p; register ssize_t i; size_t ignore_depth, length; ssize_t j, l...
40,850,238,976,111,830,000,000,000,000,000,000,000
None
null
[ "CWE-22" ]
CVE-2016-10048
Directory traversal vulnerability in magick/module.c in ImageMagick 6.9.4-7 allows remote attackers to load arbitrary modules via unspecified vectors.
https://nvd.nist.gov/vuln/detail/CVE-2016-10048
3,217
ImageMagick
989f9f88ea6db09b99d25586e912c921c0da8d3f
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/989f9f88ea6db09b99d25586e912c921c0da8d3f
None
1
MagickExport MagickBooleanType DrawImage(Image *image,const DrawInfo *draw_info) { #define RenderImageTag "Render/Image" AffineMatrix affine, current; char key[2*MaxTextExtent], keyword[MaxTextExtent], geometry[MaxTextExtent], name[MaxTextExtent], *next_token, pattern[MaxTextExten...
274,761,832,932,917,900,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-10046
Heap-based buffer overflow in the DrawImage function in magick/draw.c in ImageMagick before 6.9.5-5 allows remote attackers to cause a denial of service (application crash) via a crafted image file.
https://nvd.nist.gov/vuln/detail/CVE-2016-10046
160,548
ImageMagick
989f9f88ea6db09b99d25586e912c921c0da8d3f
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/989f9f88ea6db09b99d25586e912c921c0da8d3f
None
0
MagickExport MagickBooleanType DrawImage(Image *image,const DrawInfo *draw_info) { #define RenderImageTag "Render/Image" AffineMatrix affine, current; char key[2*MaxTextExtent], keyword[MaxTextExtent], geometry[MaxTextExtent], name[MaxTextExtent], *next_token, pattern[MaxTextExten...
205,802,462,639,444,260,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-10046
Heap-based buffer overflow in the DrawImage function in magick/draw.c in ImageMagick before 6.9.5-5 allows remote attackers to cause a denial of service (application crash) via a crafted image file.
https://nvd.nist.gov/vuln/detail/CVE-2016-10046
3,218
linux
22f6b4d34fcf039c63a94e7670e0da24f8575a5a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/22f6b4d34fcf039c63a94e7670e0da24f8575a5a
aio: mark AIO pseudo-fs noexec This ensures that do_mmap() won't implicitly make AIO memory mappings executable if the READ_IMPLIES_EXEC personality flag is set. Such behavior is problematic because the security_mmap_file LSM hook doesn't catch this case, potentially permitting an attacker to bypass a W^X policy enfo...
1
static struct dentry *aio_mount(struct file_system_type *fs_type, int flags, const char *dev_name, void *data) { static const struct dentry_operations ops = { .d_dname = simple_dname, }; return mount_pseudo(fs_type, "aio:", NULL, &ops, AIO_RING_MAGIC); }
306,823,533,012,731,260,000,000,000,000,000,000,000
aio.c
237,696,531,853,282,900,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2016-10044
The aio_mount function in fs/aio.c in the Linux kernel before 4.7.7 does not properly restrict execute access, which makes it easier for local users to bypass intended SELinux W^X policy restrictions, and consequently gain privileges, via an io_setup system call.
https://nvd.nist.gov/vuln/detail/CVE-2016-10044
160,549
linux
22f6b4d34fcf039c63a94e7670e0da24f8575a5a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/22f6b4d34fcf039c63a94e7670e0da24f8575a5a
aio: mark AIO pseudo-fs noexec This ensures that do_mmap() won't implicitly make AIO memory mappings executable if the READ_IMPLIES_EXEC personality flag is set. Such behavior is problematic because the security_mmap_file LSM hook doesn't catch this case, potentially permitting an attacker to bypass a W^X policy enfo...
0
static struct dentry *aio_mount(struct file_system_type *fs_type, int flags, const char *dev_name, void *data) { static const struct dentry_operations ops = { .d_dname = simple_dname, }; struct dentry *root = mount_pseudo(fs_type, "aio:", NULL, &ops, AIO_RING_MAGIC); if (!IS_ERR(root)) root->d_s...
236,695,779,613,560,750,000,000,000,000,000,000,000
aio.c
30,486,927,269,978,305,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2016-10044
The aio_mount function in fs/aio.c in the Linux kernel before 4.7.7 does not properly restrict execute access, which makes it easier for local users to bypass intended SELinux W^X policy restrictions, and consequently gain privileges, via an io_setup system call.
https://nvd.nist.gov/vuln/detail/CVE-2016-10044
3,219
slurm
92362a92fffe60187df61f99ab11c249d44120ee
https://github.com/SchedMD/slurm
https://github.com/SchedMD/slurm/commit/92362a92fffe60187df61f99ab11c249d44120ee
Fix security issue in _prolog_error(). Fix security issue caused by insecure file path handling triggered by the failure of a Prolog script. To exploit this a user needs to anticipate or cause the Prolog to fail for their job. (This commit is slightly different from the fix to the 15.08 branch.) CVE-2016-10030.
1
_prolog_error(batch_job_launch_msg_t *req, int rc) { char *err_name_ptr, err_name[256], path_name[MAXPATHLEN]; char *fmt_char; int fd; if (req->std_err || req->std_out) { if (req->std_err) strncpy(err_name, req->std_err, sizeof(err_name)); else strncpy(err_name, req->std_out, sizeof(err_name)); if ((...
132,874,965,140,059,950,000,000,000,000,000,000,000
req.c
4,641,462,002,959,163,000,000,000,000,000,000,000
[ "CWE-284" ]
CVE-2016-10030
The _prolog_error function in slurmd/req.c in Slurm before 15.08.13, 16.x before 16.05.7, and 17.x before 17.02.0-pre4 has a vulnerability in how the slurmd daemon informs users of a Prolog failure on a compute node. That vulnerability could allow a user to assume control of an arbitrary file on the system. Any exploit...
https://nvd.nist.gov/vuln/detail/CVE-2016-10030
160,550
slurm
92362a92fffe60187df61f99ab11c249d44120ee
https://github.com/SchedMD/slurm
https://github.com/SchedMD/slurm/commit/92362a92fffe60187df61f99ab11c249d44120ee
Fix security issue in _prolog_error(). Fix security issue caused by insecure file path handling triggered by the failure of a Prolog script. To exploit this a user needs to anticipate or cause the Prolog to fail for their job. (This commit is slightly different from the fix to the 15.08 branch.) CVE-2016-10030.
0
_prolog_error(batch_job_launch_msg_t *req, int rc) { char *err_name_ptr, err_name[256], path_name[MAXPATHLEN]; char *fmt_char; int fd; if (req->std_err || req->std_out) { if (req->std_err) strncpy(err_name, req->std_err, sizeof(err_name)); else strncpy(err_name, req->std_out, sizeof(err_name)); if ((...
71,971,412,709,540,050,000,000,000,000,000,000,000
req.c
289,813,073,730,615,900,000,000,000,000,000,000,000
[ "CWE-284" ]
CVE-2016-10030
The _prolog_error function in slurmd/req.c in Slurm before 15.08.13, 16.x before 16.05.7, and 17.x before 17.02.0-pre4 has a vulnerability in how the slurmd daemon informs users of a Prolog failure on a compute node. That vulnerability could allow a user to assume control of an arbitrary file on the system. Any exploit...
https://nvd.nist.gov/vuln/detail/CVE-2016-10030
3,231
src
ac8147a06ed2e2403fb6b9a0c03e618a9333c0e9
https://github.com/openbsd/src
https://github.com/openbsd/src/commit/ac8147a06ed2e2403fb6b9a0c03e618a9333c0e9
use sshbuf_allocate() to pre-allocate the buffer used for loading keys. This avoids implicit realloc inside the buffer code, which might theoretically leave fragments of the key on the heap. This doesn't appear to happen in practice for normal sized keys, but was observed for novelty oversize ones. Pointed out by Jann...
1
sshkey_load_file(int fd, struct sshbuf *blob) { u_char buf[1024]; size_t len; struct stat st; int r; if (fstat(fd, &st) < 0) return SSH_ERR_SYSTEM_ERROR; if ((st.st_mode & (S_IFSOCK|S_IFCHR|S_IFIFO)) == 0 && st.st_size > MAX_KEY_FILE_SIZE) return SSH_ERR_INVALID_FORMAT; for (;;) { if ((len...
87,271,877,278,747,050,000,000,000,000,000,000,000
authfile.c
264,566,486,326,241,450,000,000,000,000,000,000,000
[ "CWE-320" ]
CVE-2016-10011
authfile.c in sshd in OpenSSH before 7.4 does not properly consider the effects of realloc on buffer contents, which might allow local users to obtain sensitive private-key information by leveraging access to a privilege-separated child process.
https://nvd.nist.gov/vuln/detail/CVE-2016-10011
160,562
src
ac8147a06ed2e2403fb6b9a0c03e618a9333c0e9
https://github.com/openbsd/src
https://github.com/openbsd/src/commit/ac8147a06ed2e2403fb6b9a0c03e618a9333c0e9
use sshbuf_allocate() to pre-allocate the buffer used for loading keys. This avoids implicit realloc inside the buffer code, which might theoretically leave fragments of the key on the heap. This doesn't appear to happen in practice for normal sized keys, but was observed for novelty oversize ones. Pointed out by Jann...
0
sshkey_load_file(int fd, struct sshbuf *blob) { u_char buf[1024]; size_t len; struct stat st; int r, dontmax = 0; if (fstat(fd, &st) < 0) return SSH_ERR_SYSTEM_ERROR; if ((st.st_mode & (S_IFSOCK|S_IFCHR|S_IFIFO)) == 0 && st.st_size > MAX_KEY_FILE_SIZE) return SSH_ERR_INVALID_FORMAT; /* * Pre...
51,275,164,127,480,610,000,000,000,000,000,000,000
authfile.c
298,555,526,736,213,000,000,000,000,000,000,000,000
[ "CWE-320" ]
CVE-2016-10011
authfile.c in sshd in OpenSSH before 7.4 does not properly consider the effects of realloc on buffer contents, which might allow local users to obtain sensitive private-key information by leveraging access to a privilege-separated child process.
https://nvd.nist.gov/vuln/detail/CVE-2016-10011
3,236
php-src
b2af4e8868726a040234de113436c6e4f6372d17
https://github.com/php/php-src
https://github.com/php/php-src/commit/b2af4e8868726a040234de113436c6e4f6372d17
Complete the fix of bug #70172 for PHP 7
1
PHP_FUNCTION(unserialize) { char *buf = NULL; size_t buf_len; const unsigned char *p; php_unserialize_data_t var_hash; zval *options = NULL, *classes = NULL; HashTable *class_hash = NULL; if (zend_parse_parameters(ZEND_NUM_ARGS(), "s|a", &buf, &buf_len, &options) == FAILURE) { RETURN_FALSE; } if (buf...
3,385,748,056,525,523,300,000,000,000,000,000,000
var.c
176,599,822,315,762,470,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2016-9936
The unserialize implementation in ext/standard/var.c in PHP 7.x before 7.0.14 allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted serialized data. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-6834.
https://nvd.nist.gov/vuln/detail/CVE-2016-9936
160,567
php-src
b2af4e8868726a040234de113436c6e4f6372d17
https://github.com/php/php-src
https://github.com/php/php-src/commit/b2af4e8868726a040234de113436c6e4f6372d17
Complete the fix of bug #70172 for PHP 7
0
PHP_FUNCTION(unserialize) { char *buf = NULL; size_t buf_len; const unsigned char *p; php_unserialize_data_t var_hash; zval *options = NULL, *classes = NULL; zval *retval; HashTable *class_hash = NULL; if (zend_parse_parameters(ZEND_NUM_ARGS(), "s|a", &buf, &buf_len, &options) == FAILURE) { RETURN_FALS...
111,385,059,885,427,450,000,000,000,000,000,000,000
var.c
68,852,769,275,369,730,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2016-9936
The unserialize implementation in ext/standard/var.c in PHP 7.x before 7.0.14 allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted serialized data. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-6834.
https://nvd.nist.gov/vuln/detail/CVE-2016-9936
3,237
php-src
66fd44209d5ffcb9b3d1bc1b9fd8e35b485040c0
https://github.com/php/php-src
https://github.com/php/php-src/commit/66fd44209d5ffcb9b3d1bc1b9fd8e35b485040c0
Fix bug #73631 - Invalid read when wddx decodes empty boolean element
1
static void php_wddx_push_element(void *user_data, const XML_Char *name, const XML_Char **atts) { st_entry ent; wddx_stack *stack = (wddx_stack *)user_data; if (!strcmp(name, EL_PACKET)) { int i; if (atts) for (i=0; atts[i]; i++) { if (!strcmp(atts[i], EL_VERSION)) { /* nothing for now */ } } } el...
47,837,849,909,634,070,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2016-9935
The php_wddx_push_element function in ext/wddx/wddx.c in PHP before 5.6.29 and 7.x before 7.0.14 allows remote attackers to cause a denial of service (out-of-bounds read and memory corruption) or possibly have unspecified other impact via an empty boolean element in a wddxPacket XML document.
https://nvd.nist.gov/vuln/detail/CVE-2016-9935
160,568
php-src
66fd44209d5ffcb9b3d1bc1b9fd8e35b485040c0
https://github.com/php/php-src
https://github.com/php/php-src/commit/66fd44209d5ffcb9b3d1bc1b9fd8e35b485040c0
Fix bug #73631 - Invalid read when wddx decodes empty boolean element
0
static void php_wddx_push_element(void *user_data, const XML_Char *name, const XML_Char **atts) { st_entry ent; wddx_stack *stack = (wddx_stack *)user_data; if (!strcmp(name, EL_PACKET)) { int i; if (atts) for (i=0; atts[i]; i++) { if (!strcmp(atts[i], EL_VERSION)) { /* nothing for now */ } } } el...
332,744,513,181,436,100,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2016-9935
The php_wddx_push_element function in ext/wddx/wddx.c in PHP before 5.6.29 and 7.x before 7.0.14 allows remote attackers to cause a denial of service (out-of-bounds read and memory corruption) or possibly have unspecified other impact via an empty boolean element in a wddxPacket XML document.
https://nvd.nist.gov/vuln/detail/CVE-2016-9935
3,241
zlib
d1d577490c15a0c6862473d7576352a9f18ef811
https://github.com/madler/zlib
https://github.com/madler/zlib/commit/d1d577490c15a0c6862473d7576352a9f18ef811
Avoid pre-decrement of pointer in big-endian CRC calculation. There was a small optimization for PowerPCs to pre-increment a pointer when accessing a word, instead of post-incrementing. This required prefacing the loop with a decrement of the pointer, possibly pointing before the object passed. This is not compliant w...
1
local unsigned long crc32_big(crc, buf, len) unsigned long crc; const unsigned char FAR *buf; unsigned len; { register z_crc_t c; register const z_crc_t FAR *buf4; c = ZSWAP32((z_crc_t)crc); c = ~c; while (len && ((ptrdiff_t)buf & 3)) { c = crc_table[4][(c >> 24) ^ *buf++] ^ (c ...
72,455,579,918,499,885,000,000,000,000,000,000,000
crc32.c
219,879,363,491,041,870,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2016-9843
The crc32_big function in crc32.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving big-endian CRC calculation.
https://nvd.nist.gov/vuln/detail/CVE-2016-9843
160,572
zlib
d1d577490c15a0c6862473d7576352a9f18ef811
https://github.com/madler/zlib
https://github.com/madler/zlib/commit/d1d577490c15a0c6862473d7576352a9f18ef811
Avoid pre-decrement of pointer in big-endian CRC calculation. There was a small optimization for PowerPCs to pre-increment a pointer when accessing a word, instead of post-incrementing. This required prefacing the loop with a decrement of the pointer, possibly pointing before the object passed. This is not compliant w...
0
local unsigned long crc32_big(crc, buf, len) unsigned long crc; const unsigned char FAR *buf; unsigned len; { register z_crc_t c; register const z_crc_t FAR *buf4; c = ZSWAP32((z_crc_t)crc); c = ~c; while (len && ((ptrdiff_t)buf & 3)) { c = crc_table[4][(c >> 24) ^ *buf++] ^ (c ...
256,731,203,865,202,000,000,000,000,000,000,000,000
crc32.c
233,003,446,608,341,800,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2016-9843
The crc32_big function in crc32.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving big-endian CRC calculation.
https://nvd.nist.gov/vuln/detail/CVE-2016-9843
3,242
zlib
e54e1299404101a5a9d0cf5e45512b543967f958
https://github.com/madler/zlib
https://github.com/madler/zlib/commit/e54e1299404101a5a9d0cf5e45512b543967f958
Avoid shifts of negative values inflateMark(). The C standard says that bit shifts of negative integers is undefined. This casts to unsigned values to assure a known result.
1
long ZEXPORT inflateMark(strm) z_streamp strm; { struct inflate_state FAR *state; if (strm == Z_NULL || strm->state == Z_NULL) return -1L << 16; state = (struct inflate_state FAR *)strm->state; return ((long)(state->back) << 16) + (state->mode == COPY ? state->length : (state-...
225,690,671,182,833,500,000,000,000,000,000,000,000
inflate.c
143,972,972,253,035,300,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2016-9842
The inflateMark function in inflate.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving left shifts of negative integers.
https://nvd.nist.gov/vuln/detail/CVE-2016-9842
160,573
zlib
e54e1299404101a5a9d0cf5e45512b543967f958
https://github.com/madler/zlib
https://github.com/madler/zlib/commit/e54e1299404101a5a9d0cf5e45512b543967f958
Avoid shifts of negative values inflateMark(). The C standard says that bit shifts of negative integers is undefined. This casts to unsigned values to assure a known result.
0
long ZEXPORT inflateMark(strm) z_streamp strm; { struct inflate_state FAR *state; if (strm == Z_NULL || strm->state == Z_NULL) return (long)(((unsigned long)0 - 1) << 16); state = (struct inflate_state FAR *)strm->state; return (long)(((unsigned long)((long)state->back)) << 16) + (...
277,856,133,545,947,660,000,000,000,000,000,000,000
inflate.c
118,291,032,335,358,850,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2016-9842
The inflateMark function in inflate.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving left shifts of negative integers.
https://nvd.nist.gov/vuln/detail/CVE-2016-9842
3,243
zlib
9aaec95e82117c1cb0f9624264c3618fc380cecb
https://github.com/madler/zlib
https://github.com/madler/zlib/commit/9aaec95e82117c1cb0f9624264c3618fc380cecb
Use post-increment only in inffast.c. An old inffast.c optimization turns out to not be optimal anymore with modern compilers, and furthermore was not compliant with the C standard, for which decrementing a pointer before its allocated memory is undefined. Per the recommendation of a security audit of the zlib code by...
1
void ZLIB_INTERNAL inflate_fast(strm, start) z_streamp strm; unsigned start; /* inflate()'s starting value for strm->avail_out */ { struct inflate_state FAR *state; z_const unsigned char FAR *in; /* local strm->next_in */ z_const unsigned char FAR *last; /* have enough input while in < last ...
180,070,009,003,744,170,000,000,000,000,000,000,000
inffast.c
141,923,369,108,859,480,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2016-9841
inffast.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.
https://nvd.nist.gov/vuln/detail/CVE-2016-9841
160,574
zlib
9aaec95e82117c1cb0f9624264c3618fc380cecb
https://github.com/madler/zlib
https://github.com/madler/zlib/commit/9aaec95e82117c1cb0f9624264c3618fc380cecb
Use post-increment only in inffast.c. An old inffast.c optimization turns out to not be optimal anymore with modern compilers, and furthermore was not compliant with the C standard, for which decrementing a pointer before its allocated memory is undefined. Per the recommendation of a security audit of the zlib code by...
0
void ZLIB_INTERNAL inflate_fast(strm, start) z_streamp strm; unsigned start; /* inflate()'s starting value for strm->avail_out */ { struct inflate_state FAR *state; z_const unsigned char FAR *in; /* local strm->next_in */ z_const unsigned char FAR *last; /* have enough input while in < last ...
21,320,107,842,417,320,000,000,000,000,000,000,000
inffast.c
318,535,073,282,265,160,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2016-9841
inffast.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.
https://nvd.nist.gov/vuln/detail/CVE-2016-9841
3,244
zlib
6a043145ca6e9c55184013841a67b2fef87e44c0
https://github.com/madler/zlib
https://github.com/madler/zlib/commit/6a043145ca6e9c55184013841a67b2fef87e44c0
Remove offset pointer optimization in inftrees.c. inftrees.c was subtracting an offset from a pointer to an array, in order to provide a pointer that allowed indexing starting at the offset. This is not compliant with the C standard, for which the behavior of a pointer decremented before its allocated memory is undefi...
1
int ZLIB_INTERNAL inflate_table(type, lens, codes, table, bits, work) codetype type; unsigned short FAR *lens; unsigned codes; code FAR * FAR *table; unsigned FAR *bits; unsigned short FAR *work; { unsigned len; /* a code's length in bits */ unsigned sym; /* index of code symbols */ ...
267,171,999,140,286,600,000,000,000,000,000,000,000
inftrees.c
83,840,119,816,087,030,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2016-9840
inftrees.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.
https://nvd.nist.gov/vuln/detail/CVE-2016-9840
160,575
zlib
6a043145ca6e9c55184013841a67b2fef87e44c0
https://github.com/madler/zlib
https://github.com/madler/zlib/commit/6a043145ca6e9c55184013841a67b2fef87e44c0
Remove offset pointer optimization in inftrees.c. inftrees.c was subtracting an offset from a pointer to an array, in order to provide a pointer that allowed indexing starting at the offset. This is not compliant with the C standard, for which the behavior of a pointer decremented before its allocated memory is undefi...
0
int ZLIB_INTERNAL inflate_table(type, lens, codes, table, bits, work) codetype type; unsigned short FAR *lens; unsigned codes; code FAR * FAR *table; unsigned FAR *bits; unsigned short FAR *work; { unsigned len; /* a code's length in bits */ unsigned sym; /* index of code symbols */ ...
289,193,798,494,554,870,000,000,000,000,000,000,000
inftrees.c
100,230,909,780,333,250,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2016-9840
inftrees.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.
https://nvd.nist.gov/vuln/detail/CVE-2016-9840
3,274
jasper
d42b2388f7f8e0332c846675133acea151fc557a
https://github.com/mdadams/jasper
https://github.com/mdadams/jasper/commit/d42b2388f7f8e0332c846675133acea151fc557a
The generation of the configuration file jas_config.h has been completely reworked in order to avoid pollution of the global namespace. Some problematic types like uchar, ulong, and friends have been replaced with names with a jas_ prefix. An option max_samples has been added to the BMP and JPEG decoders to restrict ...
1
jas_matrix_t *jas_seq2d_create(int xstart, int ystart, int xend, int yend) { jas_matrix_t *matrix; assert(xstart <= xend && ystart <= yend); if (!(matrix = jas_matrix_create(yend - ystart, xend - xstart))) { return 0; } matrix->xstart_ = xstart; matrix->ystart_ = ystart; matrix->xend_ = xend; matrix->yend_...
47,377,460,787,985,390,000,000,000,000,000,000,000
jas_seq.c
231,791,317,884,716,800,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2015-5203
Double free vulnerability in the jasper_image_stop_load function in JasPer 1.900.17 allows remote attackers to cause a denial of service (crash) via a crafted JPEG 2000 image file.
https://nvd.nist.gov/vuln/detail/CVE-2015-5203
160,602
jasper
d42b2388f7f8e0332c846675133acea151fc557a
https://github.com/mdadams/jasper
https://github.com/mdadams/jasper/commit/d42b2388f7f8e0332c846675133acea151fc557a
The generation of the configuration file jas_config.h has been completely reworked in order to avoid pollution of the global namespace. Some problematic types like uchar, ulong, and friends have been replaced with names with a jas_ prefix. An option max_samples has been added to the BMP and JPEG decoders to restrict ...
0
jas_matrix_t *jas_seq2d_create(int xstart, int ystart, int xend, int yend) jas_matrix_t *jas_seq2d_create(jas_matind_t xstart, jas_matind_t ystart, jas_matind_t xend, jas_matind_t yend) { jas_matrix_t *matrix; assert(xstart <= xend && ystart <= yend); if (!(matrix = jas_matrix_create(yend - ystart, xend - xstar...
68,495,942,184,844,730,000,000,000,000,000,000,000
None
null
[ "CWE-190" ]
CVE-2015-5203
Double free vulnerability in the jasper_image_stop_load function in JasPer 1.900.17 allows remote attackers to cause a denial of service (crash) via a crafted JPEG 2000 image file.
https://nvd.nist.gov/vuln/detail/CVE-2015-5203
3,294
ImageMagick
ce98a7acbcfca7f0a178f4b1e7b957e419e0cc99
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/ce98a7acbcfca7f0a178f4b1e7b957e419e0cc99
https://github.com/ImageMagick/ImageMagick/issues/301
1
static Image *ReadSGIImage(const ImageInfo *image_info,ExceptionInfo *exception) { Image *image; MagickBooleanType status; MagickSizeType number_pixels; MemoryInfo *pixel_info; register Quantum *q; register ssize_t i, x; register unsigned char *p; SGIInfo iris_...
30,401,003,998,596,426,000,000,000,000,000,000,000
sgi.c
50,673,686,952,176,880,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-9556
The IsPixelGray function in MagickCore/pixel-accessor.h in ImageMagick 7.0.3-8 allows remote attackers to cause a denial of service (out-of-bounds heap read) via a crafted image file.
https://nvd.nist.gov/vuln/detail/CVE-2016-9556
160,620
ImageMagick
ce98a7acbcfca7f0a178f4b1e7b957e419e0cc99
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/ce98a7acbcfca7f0a178f4b1e7b957e419e0cc99
https://github.com/ImageMagick/ImageMagick/issues/301
0
static Image *ReadSGIImage(const ImageInfo *image_info,ExceptionInfo *exception) { Image *image; MagickBooleanType status; MagickSizeType number_pixels; MemoryInfo *pixel_info; register Quantum *q; register ssize_t i, x; register unsigned char *p; SGIInfo iris_...
54,638,996,650,743,890,000,000,000,000,000,000,000
sgi.c
123,836,635,326,396,600,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-9556
The IsPixelGray function in MagickCore/pixel-accessor.h in ImageMagick 7.0.3-8 allows remote attackers to cause a denial of service (out-of-bounds heap read) via a crafted image file.
https://nvd.nist.gov/vuln/detail/CVE-2016-9556
3,296
jasper
1e84674d95353c64e5c4c0e7232ae86fd6ea813b
https://github.com/mdadams/jasper
https://github.com/mdadams/jasper/commit/1e84674d95353c64e5c4c0e7232ae86fd6ea813b
Changed the JPC bitstream code to more gracefully handle a request for a larger sized integer than what can be handled (i.e., return with an error instead of failing an assert).
1
long jpc_bitstream_getbits(jpc_bitstream_t *bitstream, int n) { long v; int u; /* We can reliably get at most 31 bits since ISO/IEC 9899 only guarantees that a long can represent values up to 2^31-1. */ assert(n >= 0 && n < 32); /* Get the number of bits requested from the specified bit stream. */ v = ...
299,025,905,055,741,460,000,000,000,000,000,000,000
jpc_bs.c
84,360,022,075,198,790,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2016-9391
The jpc_bitstream_getbits function in jpc_bs.c in JasPer before 2.0.10 allows remote attackers to cause a denial of service (assertion failure) via a very large integer.
https://nvd.nist.gov/vuln/detail/CVE-2016-9391
160,621
jasper
1e84674d95353c64e5c4c0e7232ae86fd6ea813b
https://github.com/mdadams/jasper
https://github.com/mdadams/jasper/commit/1e84674d95353c64e5c4c0e7232ae86fd6ea813b
Changed the JPC bitstream code to more gracefully handle a request for a larger sized integer than what can be handled (i.e., return with an error instead of failing an assert).
0
long jpc_bitstream_getbits(jpc_bitstream_t *bitstream, int n) { long v; int u; /* We can reliably get at most 31 bits since ISO/IEC 9899 only guarantees that a long can represent values up to 2^31-1. */ //assert(n >= 0 && n < 32); if (n < 0 || n >= 32) { return -1; } /* Get the number of bits request...
339,357,650,229,848,260,000,000,000,000,000,000,000
jpc_bs.c
138,673,695,644,118,760,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2016-9391
The jpc_bitstream_getbits function in jpc_bs.c in JasPer before 2.0.10 allows remote attackers to cause a denial of service (assertion failure) via a very large integer.
https://nvd.nist.gov/vuln/detail/CVE-2016-9391
3,300
jasper
dee11ec440d7908d1daf69f40a3324b27cf213ba
https://github.com/mdadams/jasper
https://github.com/mdadams/jasper/commit/dee11ec440d7908d1daf69f40a3324b27cf213ba
The component domains must be the same for the ICT/RCT in the JPC codec. This was previously enforced with an assertion. Now, it is handled in a more graceful manner.
1
static int jpc_dec_tiledecode(jpc_dec_t *dec, jpc_dec_tile_t *tile) { int i; int j; jpc_dec_tcomp_t *tcomp; jpc_dec_rlvl_t *rlvl; jpc_dec_band_t *band; int compno; int rlvlno; int bandno; int adjust; int v; jpc_dec_ccp_t *ccp; jpc_dec_cmpt_t *cmpt; if (jpc_dec_decodecblks(dec, tile)) { jas_eprintf("jpc_...
81,323,985,259,108,210,000,000,000,000,000,000,000
jpc_dec.c
304,708,091,272,308,030,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2016-9389
The jpc_irct and jpc_iict functions in jpc_mct.c in JasPer before 1.900.14 allow remote attackers to cause a denial of service (assertion failure).
https://nvd.nist.gov/vuln/detail/CVE-2016-9389
160,624
jasper
dee11ec440d7908d1daf69f40a3324b27cf213ba
https://github.com/mdadams/jasper
https://github.com/mdadams/jasper/commit/dee11ec440d7908d1daf69f40a3324b27cf213ba
The component domains must be the same for the ICT/RCT in the JPC codec. This was previously enforced with an assertion. Now, it is handled in a more graceful manner.
0
static int jpc_dec_tiledecode(jpc_dec_t *dec, jpc_dec_tile_t *tile) { int i; int j; jpc_dec_tcomp_t *tcomp; jpc_dec_rlvl_t *rlvl; jpc_dec_band_t *band; int compno; int rlvlno; int bandno; int adjust; int v; jpc_dec_ccp_t *ccp; jpc_dec_cmpt_t *cmpt; if (jpc_dec_decodecblks(dec, tile)) { jas_eprintf("jpc_...
213,736,832,455,554,340,000,000,000,000,000,000,000
jpc_dec.c
9,904,405,345,613,609,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2016-9389
The jpc_irct and jpc_iict functions in jpc_mct.c in JasPer before 1.900.14 allow remote attackers to cause a denial of service (assertion failure).
https://nvd.nist.gov/vuln/detail/CVE-2016-9389
3,311
jasper
634ce8e8a5accc0fa05dd2c20d42b4749d4b2735
https://github.com/mdadams/jasper
https://github.com/mdadams/jasper/commit/634ce8e8a5accc0fa05dd2c20d42b4749d4b2735
Made some changes to the I/O stream library for memory streams. There were a number of potential problems due to the possibility of integer overflow. Changed some integral types to the larger types size_t or ssize_t. For example, the function mem_resize now takes the buffer size parameter as a size_t. Added a new funct...
1
static int mem_resize(jas_stream_memobj_t *m, int bufsize) { unsigned char *buf; assert(bufsize >= 0); JAS_DBGLOG(100, ("mem_resize(%p, %d)\n", m, bufsize)); if (!(buf = jas_realloc2(m->buf_, bufsize, sizeof(unsigned char))) && bufsize) { JAS_DBGLOG(100, ("mem_resize realloc failed\n")); return -1; ...
66,639,206,046,311,920,000,000,000,000,000,000,000
None
null
[ "CWE-190" ]
CVE-2015-5203
Double free vulnerability in the jasper_image_stop_load function in JasPer 1.900.17 allows remote attackers to cause a denial of service (crash) via a crafted JPEG 2000 image file.
https://nvd.nist.gov/vuln/detail/CVE-2015-5203
160,630
jasper
634ce8e8a5accc0fa05dd2c20d42b4749d4b2735
https://github.com/mdadams/jasper
https://github.com/mdadams/jasper/commit/634ce8e8a5accc0fa05dd2c20d42b4749d4b2735
Made some changes to the I/O stream library for memory streams. There were a number of potential problems due to the possibility of integer overflow. Changed some integral types to the larger types size_t or ssize_t. For example, the function mem_resize now takes the buffer size parameter as a size_t. Added a new funct...
0
static int mem_resize(jas_stream_memobj_t *m, int bufsize) static int mem_resize(jas_stream_memobj_t *m, size_t bufsize) { unsigned char *buf; //assert(bufsize >= 0); JAS_DBGLOG(100, ("mem_resize(%p, %zu)\n", m, bufsize)); if (!bufsize) { jas_eprintf( "mem_resize was not really designed to handle a buffe...
195,268,361,693,725,960,000,000,000,000,000,000,000
None
null
[ "CWE-190" ]
CVE-2015-5203
Double free vulnerability in the jasper_image_stop_load function in JasPer 1.900.17 allows remote attackers to cause a denial of service (crash) via a crafted JPEG 2000 image file.
https://nvd.nist.gov/vuln/detail/CVE-2015-5203
3,314
jasper
e24bdc716c3327b067c551bc6cfb97fd2370358d
https://github.com/mdadams/jasper
https://github.com/mdadams/jasper/commit/e24bdc716c3327b067c551bc6cfb97fd2370358d
Fixed a bug that resulted in the destruction of JP2 box data that had never been constructed in the first place.
1
jp2_box_t *jp2_box_get(jas_stream_t *in) { jp2_box_t *box; jp2_boxinfo_t *boxinfo; jas_stream_t *tmpstream; uint_fast32_t len; uint_fast64_t extlen; bool dataflag; box = 0; tmpstream = 0; if (!(box = jas_malloc(sizeof(jp2_box_t)))) { goto error; } box->ops = &jp2_boxinfo_unk.ops; if (jp2_getuint32(in, &...
269,241,090,374,988,640,000,000,000,000,000,000,000
jp2_cod.c
7,434,947,174,323,374,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2016-8887
The jp2_colr_destroy function in libjasper/jp2/jp2_cod.c in JasPer before 1.900.10 allows remote attackers to cause a denial of service (NULL pointer dereference).
https://nvd.nist.gov/vuln/detail/CVE-2016-8887
160,632
jasper
e24bdc716c3327b067c551bc6cfb97fd2370358d
https://github.com/mdadams/jasper
https://github.com/mdadams/jasper/commit/e24bdc716c3327b067c551bc6cfb97fd2370358d
Fixed a bug that resulted in the destruction of JP2 box data that had never been constructed in the first place.
0
jp2_box_t *jp2_box_get(jas_stream_t *in) { jp2_box_t *box; jp2_boxinfo_t *boxinfo; jas_stream_t *tmpstream; uint_fast32_t len; uint_fast64_t extlen; bool dataflag; box = 0; tmpstream = 0; if (!(box = jas_malloc(sizeof(jp2_box_t)))) { goto error; } box->ops = &jp2_boxinfo_unk.ops; if (jp2_getuint32(in, &...
247,824,527,682,006,600,000,000,000,000,000,000,000
jp2_cod.c
250,067,815,251,904,760,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2016-8887
The jp2_colr_destroy function in libjasper/jp2/jp2_cod.c in JasPer before 1.900.10 allows remote attackers to cause a denial of service (NULL pointer dereference).
https://nvd.nist.gov/vuln/detail/CVE-2016-8887
3,317
jasper
5d66894d2313e3f3469f19066e149e08ff076698
https://github.com/mdadams/jasper
https://github.com/mdadams/jasper/commit/5d66894d2313e3f3469f19066e149e08ff076698
Fixed a problem with a null pointer dereference in the BMP decoder.
1
jas_image_t *bmp_decode(jas_stream_t *in, char *optstr) { jas_image_t *image; bmp_hdr_t hdr; bmp_info_t *info; uint_fast16_t cmptno; jas_image_cmptparm_t cmptparms[3]; jas_image_cmptparm_t *cmptparm; uint_fast16_t numcmpts; long n; if (optstr) { jas_eprintf("warning: ignoring BMP decoder options\n"); ...
228,936,594,935,256,760,000,000,000,000,000,000,000
bmp_dec.c
45,366,044,036,465,890,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2016-8690
The bmp_getdata function in libjasper/bmp/bmp_dec.c in JasPer before 1.900.5 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted BMP image in an imginfo command.
https://nvd.nist.gov/vuln/detail/CVE-2016-8690
160,633
jasper
5d66894d2313e3f3469f19066e149e08ff076698
https://github.com/mdadams/jasper
https://github.com/mdadams/jasper/commit/5d66894d2313e3f3469f19066e149e08ff076698
Fixed a problem with a null pointer dereference in the BMP decoder.
0
jas_image_t *bmp_decode(jas_stream_t *in, char *optstr) { jas_image_t *image; bmp_hdr_t hdr; bmp_info_t *info; uint_fast16_t cmptno; jas_image_cmptparm_t cmptparms[3]; jas_image_cmptparm_t *cmptparm; uint_fast16_t numcmpts; long n; image = 0; info = 0; if (optstr) { jas_eprintf("warning: ignoring BM...
276,728,953,916,609,440,000,000,000,000,000,000,000
bmp_dec.c
118,114,575,294,326,840,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2016-8690
The bmp_getdata function in libjasper/bmp/bmp_dec.c in JasPer before 1.900.5 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted BMP image in an imginfo command.
https://nvd.nist.gov/vuln/detail/CVE-2016-8690
3,320
jasper
44a524e367597af58d6265ae2014468b334d0309
https://github.com/mdadams/jasper
https://github.com/mdadams/jasper/commit/44a524e367597af58d6265ae2014468b334d0309
The memory stream interface allows for a buffer size of zero. The case of a zero-sized buffer was not handled correctly, as it could lead to a double free. This problem has now been fixed (hopefully). One might ask whether a zero-sized buffer should be allowed at all, but this is a question for another day.
1
static int mem_resize(jas_stream_memobj_t *m, int bufsize) { unsigned char *buf; assert(m->buf_); assert(bufsize >= 0); if (!(buf = jas_realloc2(m->buf_, bufsize, sizeof(unsigned char)))) { return -1; } m->buf_ = buf; m->bufsize_ = bufsize; return 0; }
24,603,643,167,309,006,000,000,000,000,000,000,000
jas_stream.c
131,633,196,601,018,700,000,000,000,000,000,000,000
[ "CWE-415" ]
CVE-2016-8693
Double free vulnerability in the mem_close function in jas_stream.c in JasPer before 1.900.10 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted BMP image to the imginfo command.
https://nvd.nist.gov/vuln/detail/CVE-2016-8693
160,636
jasper
44a524e367597af58d6265ae2014468b334d0309
https://github.com/mdadams/jasper
https://github.com/mdadams/jasper/commit/44a524e367597af58d6265ae2014468b334d0309
The memory stream interface allows for a buffer size of zero. The case of a zero-sized buffer was not handled correctly, as it could lead to a double free. This problem has now been fixed (hopefully). One might ask whether a zero-sized buffer should be allowed at all, but this is a question for another day.
0
static int mem_resize(jas_stream_memobj_t *m, int bufsize) { unsigned char *buf; //assert(m->buf_); assert(bufsize >= 0); if (!(buf = jas_realloc2(m->buf_, bufsize, sizeof(unsigned char))) && bufsize) { return -1; } m->buf_ = buf; m->bufsize_ = bufsize; return 0; }
186,309,944,528,178,670,000,000,000,000,000,000,000
jas_stream.c
92,937,582,461,512,620,000,000,000,000,000,000,000
[ "CWE-415" ]
CVE-2016-8693
Double free vulnerability in the mem_close function in jas_stream.c in JasPer before 1.900.10 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted BMP image to the imginfo command.
https://nvd.nist.gov/vuln/detail/CVE-2016-8693
3,324
libarchive
7f17c791dcfd8c0416e2cd2485b19410e47ef126
https://github.com/libarchive/libarchive
https://github.com/libarchive/libarchive/commit/7f17c791dcfd8c0416e2cd2485b19410e47ef126
Issue 761: Heap overflow reading corrupted 7Zip files The sample file that demonstrated this had multiple 'EmptyStream' attributes. The first one ended up being used to calculate certain statistics, then was overwritten by the second which was incompatible with those statistics. The fix here is to reject any header...
1
read_Header(struct archive_read *a, struct _7z_header_info *h, int check_header_id) { struct _7zip *zip = (struct _7zip *)a->format->data; const unsigned char *p; struct _7z_folder *folders; struct _7z_stream_info *si = &(zip->si); struct _7zip_entry *entries; uint32_t folderIndex, indexInFolder; unsigned i;...
275,704,645,812,219,200,000,000,000,000,000,000,000
archive_read_support_format_7zip.c
1,218,370,420,990,421,900,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2016-8689
The read_Header function in archive_read_support_format_7zip.c in libarchive 3.2.1 allows remote attackers to cause a denial of service (out-of-bounds read) via multiple EmptyStream attributes in a header in a 7zip archive.
https://nvd.nist.gov/vuln/detail/CVE-2016-8689
160,638
libarchive
7f17c791dcfd8c0416e2cd2485b19410e47ef126
https://github.com/libarchive/libarchive
https://github.com/libarchive/libarchive/commit/7f17c791dcfd8c0416e2cd2485b19410e47ef126
Issue 761: Heap overflow reading corrupted 7Zip files The sample file that demonstrated this had multiple 'EmptyStream' attributes. The first one ended up being used to calculate certain statistics, then was overwritten by the second which was incompatible with those statistics. The fix here is to reject any header...
0
read_Header(struct archive_read *a, struct _7z_header_info *h, int check_header_id) { struct _7zip *zip = (struct _7zip *)a->format->data; const unsigned char *p; struct _7z_folder *folders; struct _7z_stream_info *si = &(zip->si); struct _7zip_entry *entries; uint32_t folderIndex, indexInFolder; unsigned i;...
260,010,128,138,353,430,000,000,000,000,000,000,000
archive_read_support_format_7zip.c
286,626,011,473,088,330,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2016-8689
The read_Header function in archive_read_support_format_7zip.c in libarchive 3.2.1 allows remote attackers to cause a denial of service (out-of-bounds read) via multiple EmptyStream attributes in a header in a 7zip archive.
https://nvd.nist.gov/vuln/detail/CVE-2016-8689
3,325
libarchive
e37b620fe8f14535d737e89a4dcabaed4517bf1a
https://github.com/libarchive/libarchive
https://github.com/libarchive/libarchive/commit/e37b620fe8f14535d737e89a4dcabaed4517bf1a
Issue #767: Buffer overflow printing a filename The safe_fprintf function attempts to ensure clean output for an arbitrary sequence of bytes by doing a trial conversion of the multibyte characters to wide characters -- if the resulting wide character is printable then we pass through the corresponding bytes unaltered...
1
safe_fprintf(FILE *f, const char *fmt, ...) { char fmtbuff_stack[256]; /* Place to format the printf() string. */ char outbuff[256]; /* Buffer for outgoing characters. */ char *fmtbuff_heap; /* If fmtbuff_stack is too small, we use malloc */ char *fmtbuff; /* Pointer to fmtbuff_stack or fmtbuff_heap. */ int fmtbu...
311,304,728,748,629,950,000,000,000,000,000,000,000
util.c
62,782,488,428,051,630,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-8687
Stack-based buffer overflow in the safe_fprintf function in tar/util.c in libarchive 3.2.1 allows remote attackers to cause a denial of service via a crafted non-printable multibyte character in a filename.
https://nvd.nist.gov/vuln/detail/CVE-2016-8687
160,639
libarchive
e37b620fe8f14535d737e89a4dcabaed4517bf1a
https://github.com/libarchive/libarchive
https://github.com/libarchive/libarchive/commit/e37b620fe8f14535d737e89a4dcabaed4517bf1a
Issue #767: Buffer overflow printing a filename The safe_fprintf function attempts to ensure clean output for an arbitrary sequence of bytes by doing a trial conversion of the multibyte characters to wide characters -- if the resulting wide character is printable then we pass through the corresponding bytes unaltered...
0
safe_fprintf(FILE *f, const char *fmt, ...) { char fmtbuff_stack[256]; /* Place to format the printf() string. */ char outbuff[256]; /* Buffer for outgoing characters. */ char *fmtbuff_heap; /* If fmtbuff_stack is too small, we use malloc */ char *fmtbuff; /* Pointer to fmtbuff_stack or fmtbuff_heap. */ int fmtbu...
86,366,519,138,158,840,000,000,000,000,000,000,000
util.c
163,313,441,386,719,530,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-8687
Stack-based buffer overflow in the safe_fprintf function in tar/util.c in libarchive 3.2.1 allows remote attackers to cause a denial of service via a crafted non-printable multibyte character in a filename.
https://nvd.nist.gov/vuln/detail/CVE-2016-8687
3,329
linux
647bf3d8a8e5777319da92af672289b2a6c4dc66
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/647bf3d8a8e5777319da92af672289b2a6c4dc66
IB/rxe: Fix mem_check_range integer overflow Update the range check to avoid integer-overflow in edge case. Resolves CVE 2016-8636. Signed-off-by: Eyal Itkin <eyal.itkin@gmail.com> Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com> Reviewed-by: Leon Romanovsky <leonro@mellanox.com> Signed-off-by: Doug Ledford <d...
1
int mem_check_range(struct rxe_mem *mem, u64 iova, size_t length) { switch (mem->type) { case RXE_MEM_TYPE_DMA: return 0; case RXE_MEM_TYPE_MR: case RXE_MEM_TYPE_FMR: return ((iova < mem->iova) || ((iova + length) > (mem->iova + mem->length))) ? -EFAULT : 0; default: return -EFAULT; } }
35,540,940,678,846,424,000,000,000,000,000,000,000
rxe_mr.c
113,202,750,157,069,660,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2016-8636
Integer overflow in the mem_check_range function in drivers/infiniband/sw/rxe/rxe_mr.c in the Linux kernel before 4.9.10 allows local users to cause a denial of service (memory corruption), obtain sensitive information from kernel memory, or possibly have unspecified other impact via a write or read request involving t...
https://nvd.nist.gov/vuln/detail/CVE-2016-8636
160,642
linux
647bf3d8a8e5777319da92af672289b2a6c4dc66
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/647bf3d8a8e5777319da92af672289b2a6c4dc66
IB/rxe: Fix mem_check_range integer overflow Update the range check to avoid integer-overflow in edge case. Resolves CVE 2016-8636. Signed-off-by: Eyal Itkin <eyal.itkin@gmail.com> Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com> Reviewed-by: Leon Romanovsky <leonro@mellanox.com> Signed-off-by: Doug Ledford <d...
0
int mem_check_range(struct rxe_mem *mem, u64 iova, size_t length) { switch (mem->type) { case RXE_MEM_TYPE_DMA: return 0; case RXE_MEM_TYPE_MR: case RXE_MEM_TYPE_FMR: if (iova < mem->iova || length > mem->length || iova > mem->iova + mem->length - length) return -EFAULT; return 0; defau...
135,034,422,546,563,840,000,000,000,000,000,000,000
rxe_mr.c
36,879,722,375,933,434,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2016-8636
Integer overflow in the mem_check_range function in drivers/infiniband/sw/rxe/rxe_mr.c in the Linux kernel before 4.9.10 allows local users to cause a denial of service (memory corruption), obtain sensitive information from kernel memory, or possibly have unspecified other impact via a write or read request involving t...
https://nvd.nist.gov/vuln/detail/CVE-2016-8636
3,330
libass
aa54e0b59200a994d50a346b5d7ac818ebcf2d4b
https://github.com/libass/libass
https://github.com/libass/libass/commit/aa54e0b59200a994d50a346b5d7ac818ebcf2d4b
shaper: fix reallocation Update the variable that tracks the allocated size. This potentially improves performance and avoid some side effects, which lead to undefined behavior in some cases. Fixes fuzzer test case id:000051,sig:11,sync:fuzzer3,src:004221.
1
static bool check_allocations(ASS_Shaper *shaper, size_t new_size) { if (new_size > shaper->n_glyphs) { if (!ASS_REALLOC_ARRAY(shaper->event_text, new_size) || !ASS_REALLOC_ARRAY(shaper->ctypes, new_size) || !ASS_REALLOC_ARRAY(shaper->emblevels, new_size) || !ASS_REALLO...
280,811,577,264,489,950,000,000,000,000,000,000,000
ass_shaper.c
28,748,660,120,420,735,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2016-7972
The check_allocations function in libass/ass_shaper.c in libass before 0.13.4 allows remote attackers to cause a denial of service (memory allocation failure) via unspecified vectors.
https://nvd.nist.gov/vuln/detail/CVE-2016-7972
160,643
libass
aa54e0b59200a994d50a346b5d7ac818ebcf2d4b
https://github.com/libass/libass
https://github.com/libass/libass/commit/aa54e0b59200a994d50a346b5d7ac818ebcf2d4b
shaper: fix reallocation Update the variable that tracks the allocated size. This potentially improves performance and avoid some side effects, which lead to undefined behavior in some cases. Fixes fuzzer test case id:000051,sig:11,sync:fuzzer3,src:004221.
0
static bool check_allocations(ASS_Shaper *shaper, size_t new_size) { if (new_size > shaper->n_glyphs) { if (!ASS_REALLOC_ARRAY(shaper->event_text, new_size) || !ASS_REALLOC_ARRAY(shaper->ctypes, new_size) || !ASS_REALLOC_ARRAY(shaper->emblevels, new_size) || !ASS_REALLO...
33,445,553,358,012,500,000,000,000,000,000,000,000
ass_shaper.c
314,895,431,202,493,800,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2016-7972
The check_allocations function in libass/ass_shaper.c in libass before 0.13.4 allows remote attackers to cause a denial of service (memory allocation failure) via unspecified vectors.
https://nvd.nist.gov/vuln/detail/CVE-2016-7972
3,331
libass
08e754612019ed84d1db0d1fc4f5798248decd75
https://github.com/libass/libass
https://github.com/libass/libass/commit/08e754612019ed84d1db0d1fc4f5798248decd75
Fix blur coefficient calculation buffer overflow Found by fuzzer test case id:000082,sig:11,src:002579,op:havoc,rep:8. Correctness should be checked, but this fixes the overflow for good.
1
static void calc_coeff(double mu[4], const int index[4], int prefilter, double r2, double mul) { double mul2 = mul * mul, mul3 = mul2 * mul; double kernel[] = { (5204 + 2520 * mul + 1092 * mul2 + 3280 * mul3) / 12096, (2943 - 210 * mul - 273 * mul2 - 2460 * mul3) / 12096, ( 486 - 924 ...
118,260,111,892,519,520,000,000,000,000,000,000,000
ass_blur.c
96,345,802,284,211,620,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-7970
Buffer overflow in the calc_coeff function in libass/ass_blur.c in libass before 0.13.4 allows remote attackers to cause a denial of service via unspecified vectors.
https://nvd.nist.gov/vuln/detail/CVE-2016-7970
160,644
libass
08e754612019ed84d1db0d1fc4f5798248decd75
https://github.com/libass/libass
https://github.com/libass/libass/commit/08e754612019ed84d1db0d1fc4f5798248decd75
Fix blur coefficient calculation buffer overflow Found by fuzzer test case id:000082,sig:11,src:002579,op:havoc,rep:8. Correctness should be checked, but this fixes the overflow for good.
0
static void calc_coeff(double mu[4], const int index[4], int prefilter, double r2, double mul) { double mul2 = mul * mul, mul3 = mul2 * mul; double kernel[] = { (5204 + 2520 * mul + 1092 * mul2 + 3280 * mul3) / 12096, (2943 - 210 * mul - 273 * mul2 - 2460 * mul3) / 12096, ( 486 - 924 ...
82,660,506,467,555,930,000,000,000,000,000,000,000
ass_blur.c
328,259,086,246,453,330,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-7970
Buffer overflow in the calc_coeff function in libass/ass_blur.c in libass before 0.13.4 allows remote attackers to cause a denial of service via unspecified vectors.
https://nvd.nist.gov/vuln/detail/CVE-2016-7970
3,332
ImageMagick
d63a3c5729df59f183e9e110d5d8385d17caaad0
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/d63a3c5729df59f183e9e110d5d8385d17caaad0
None
1
MagickExport MagickBooleanType SetImageType(Image *image,const ImageType type) { const char *artifact; ImageInfo *image_info; MagickBooleanType status; QuantizeInfo *quantize_info; assert(image != (Image *) NULL); if (image->debug != MagickFalse) (void) LogMagickEvent(TraceEvent,GetM...
186,672,624,143,323,880,000,000,000,000,000,000,000
None
null
[ "CWE-416" ]
CVE-2016-7906
magick/attribute.c in ImageMagick 7.0.3-2 allows remote attackers to cause a denial of service (use-after-free) via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2016-7906
160,645
ImageMagick
d63a3c5729df59f183e9e110d5d8385d17caaad0
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/d63a3c5729df59f183e9e110d5d8385d17caaad0
None
0
MagickExport MagickBooleanType SetImageType(Image *image,const ImageType type) { const char *artifact; ImageInfo *image_info; MagickBooleanType status; QuantizeInfo *quantize_info; assert(image != (Image *) NULL); if (image->debug != MagickFalse) (void) LogMagickEvent(TraceEvent,GetM...
289,988,667,313,943,230,000,000,000,000,000,000,000
None
null
[ "CWE-416" ]
CVE-2016-7906
magick/attribute.c in ImageMagick 7.0.3-2 allows remote attackers to cause a denial of service (use-after-free) via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2016-7906
3,333
ImageMagick
a7bb158b7bedd1449a34432feb3a67c8f1873bfa
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/a7bb158b7bedd1449a34432feb3a67c8f1873bfa
https://github.com/ImageMagick/ImageMagick/issues/280
1
MagickBooleanType SyncExifProfile(Image *image,StringInfo *profile) { #define MaxDirectoryStack 16 #define EXIF_DELIMITER "\n" #define EXIF_NUM_FORMATS 12 #define TAG_EXIF_OFFSET 0x8769 #define TAG_INTEROP_OFFSET 0xa005 typedef struct _DirectoryInfo { unsigned char *directory; size_t entr...
86,130,161,965,126,200,000,000,000,000,000,000,000
profile.c
226,382,576,658,349,350,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2016-7799
MagickCore/profile.c in ImageMagick before 7.0.3-2 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2016-7799
160,646
ImageMagick
a7bb158b7bedd1449a34432feb3a67c8f1873bfa
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/a7bb158b7bedd1449a34432feb3a67c8f1873bfa
https://github.com/ImageMagick/ImageMagick/issues/280
0
MagickBooleanType SyncExifProfile(Image *image,StringInfo *profile) { #define MaxDirectoryStack 16 #define EXIF_DELIMITER "\n" #define EXIF_NUM_FORMATS 12 #define TAG_EXIF_OFFSET 0x8769 #define TAG_INTEROP_OFFSET 0xa005 typedef struct _DirectoryInfo { unsigned char *directory; size_t entr...
337,963,140,549,959,740,000,000,000,000,000,000,000
profile.c
111,191,593,916,868,450,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2016-7799
MagickCore/profile.c in ImageMagick before 7.0.3-2 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2016-7799
3,341
ImageMagick
a0108a892f9ea3c2bb1e7a49b7d71376c2ecbff7
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/a0108a892f9ea3c2bb1e7a49b7d71376c2ecbff7
None
1
static MagickBooleanType WriteRGFImage(const ImageInfo *image_info,Image *image, ExceptionInfo *exception) { MagickBooleanType status; int bit; register const PixelPacket *p; register ssize_t x; ssize_t y; unsigned char byte; /* Open output image file. */ assert(...
268,413,691,376,706,580,000,000,000,000,000,000,000
None
null
[ "CWE-19" ]
CVE-2016-7540
coders/rgf.c in ImageMagick before 6.9.4-10 allows remote attackers to cause a denial of service (assertion failure) by converting an image to rgf format.
https://nvd.nist.gov/vuln/detail/CVE-2016-7540
160,654
ImageMagick
a0108a892f9ea3c2bb1e7a49b7d71376c2ecbff7
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/a0108a892f9ea3c2bb1e7a49b7d71376c2ecbff7
None
0
static MagickBooleanType WriteRGFImage(const ImageInfo *image_info,Image *image, static MagickBooleanType WriteRGFImage(const ImageInfo *image_info,Image *image) { MagickBooleanType status; int bit; register const PixelPacket *p; register ssize_t x; ssize_t y; unsigned char b...
138,507,627,219,454,330,000,000,000,000,000,000,000
None
null
[ "CWE-19" ]
CVE-2016-7540
coders/rgf.c in ImageMagick before 6.9.4-10 allows remote attackers to cause a denial of service (assertion failure) by converting an image to rgf format.
https://nvd.nist.gov/vuln/detail/CVE-2016-7540
3,349
ImageMagick
bef1e4f637d8f665bc133a9c6d30df08d983bc3a
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/bef1e4f637d8f665bc133a9c6d30df08d983bc3a
https://github.com/ImageMagick/ImageMagick/issues/120
1
static Image *ReadWPGImage(const ImageInfo *image_info, ExceptionInfo *exception) { typedef struct { size_t FileId; MagickOffsetType DataOffset; unsigned int ProductType; unsigned int FileType; unsigned char MajorVersion; unsigned char MinorVersion; unsigned int EncryptKey; unsigne...
173,315,226,387,850,500,000,000,000,000,000,000,000
wpg.c
307,364,454,630,746,860,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2016-7533
The ReadWPGImage function in coders/wpg.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted WPG file.
https://nvd.nist.gov/vuln/detail/CVE-2016-7533
160,660
ImageMagick
bef1e4f637d8f665bc133a9c6d30df08d983bc3a
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/bef1e4f637d8f665bc133a9c6d30df08d983bc3a
https://github.com/ImageMagick/ImageMagick/issues/120
0
static Image *ReadWPGImage(const ImageInfo *image_info, ExceptionInfo *exception) { typedef struct { size_t FileId; MagickOffsetType DataOffset; unsigned int ProductType; unsigned int FileType; unsigned char MajorVersion; unsigned char MinorVersion; unsigned int EncryptKey; unsigne...
62,741,228,354,330,960,000,000,000,000,000,000,000
wpg.c
178,696,501,667,658,330,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2016-7533
The ReadWPGImage function in coders/wpg.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted WPG file.
https://nvd.nist.gov/vuln/detail/CVE-2016-7533
3,353
ImageMagick
a2e1064f288a353bc5fef7f79ccb7683759e775c
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/a2e1064f288a353bc5fef7f79ccb7683759e775c
https://github.com/ImageMagick/ImageMagick/issues/104
1
static MagickBooleanType load_tile(Image *image,Image *tile_image, XCFDocInfo *inDocInfo,XCFLayerInfo *inLayerInfo,size_t data_length, ExceptionInfo *exception) { ssize_t y; register ssize_t x; register Quantum *q; ssize_t count; unsigned char *graydata; XCFPixelInfo *xcfda...
37,826,674,930,539,910,000,000,000,000,000,000,000
xcf.c
69,929,030,200,192,770,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2016-7529
coders/xcf.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted XCF file.
https://nvd.nist.gov/vuln/detail/CVE-2016-7529
160,662
ImageMagick
a2e1064f288a353bc5fef7f79ccb7683759e775c
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/a2e1064f288a353bc5fef7f79ccb7683759e775c
https://github.com/ImageMagick/ImageMagick/issues/104
0
static MagickBooleanType load_tile(Image *image,Image *tile_image, XCFDocInfo *inDocInfo,XCFLayerInfo *inLayerInfo,size_t data_length, ExceptionInfo *exception) { ssize_t y; register ssize_t x; register Quantum *q; ssize_t count; unsigned char *graydata; XCFPixelInfo *xcfda...
74,732,995,727,965,610,000,000,000,000,000,000,000
xcf.c
74,364,607,248,796,500,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2016-7529
coders/xcf.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted XCF file.
https://nvd.nist.gov/vuln/detail/CVE-2016-7529
3,354
ImageMagick
ca0c886abd6d3ef335eb74150cd23b89ebd17135
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/ca0c886abd6d3ef335eb74150cd23b89ebd17135
None
1
static Image *ReadVIFFImage(const ImageInfo *image_info, ExceptionInfo *exception) { #define VFF_CM_genericRGB 15 #define VFF_CM_ntscRGB 1 #define VFF_CM_NONE 0 #define VFF_DEP_DECORDER 0x4 #define VFF_DEP_NSORDER 0x8 #define VFF_DES_RAW 0 #define VFF_LOC_IMPLICIT 1 #define VFF_MAPTYP_NONE 0 #define VFF_MAPTY...
260,039,204,831,931,700,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2016-7528
The ReadVIFFImage function in coders/viff.c in ImageMagick allows remote attackers to cause a denial of service (segmentation fault) via a crafted VIFF file.
https://nvd.nist.gov/vuln/detail/CVE-2016-7528