idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
160,663 | ImageMagick | ca0c886abd6d3ef335eb74150cd23b89ebd17135 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/ca0c886abd6d3ef335eb74150cd23b89ebd17135 | None | 0 | static Image *ReadVIFFImage(const ImageInfo *image_info,
ExceptionInfo *exception)
{
#define VFF_CM_genericRGB 15
#define VFF_CM_ntscRGB 1
#define VFF_CM_NONE 0
#define VFF_DEP_DECORDER 0x4
#define VFF_DEP_NSORDER 0x8
#define VFF_DES_RAW 0
#define VFF_LOC_IMPLICIT 1
#define VFF_MAPTYP_NONE 0
#define VFF_MAPTY... | 219,975,787,260,886,000,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2016-7528 | The ReadVIFFImage function in coders/viff.c in ImageMagick allows remote attackers to cause a denial of service (segmentation fault) via a crafted VIFF file. | https://nvd.nist.gov/vuln/detail/CVE-2016-7528 |
3,358 | ImageMagick | 30eec879c8b446b0ea9a3bb0da1a441cc8482bc4 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/30eec879c8b446b0ea9a3bb0da1a441cc8482bc4 | Moved check for https://github.com/ImageMagick/ImageMagick/issues/92. | 1 | static ssize_t DecodePSDPixels(const size_t number_compact_pixels,
const unsigned char *compact_pixels,const ssize_t depth,
const size_t number_pixels,unsigned char *pixels)
{
#define CheckNumberCompactPixels \
if (packets == 0) \
return(i); \
packets--
#define CheckNumberPixels(count) \
if (((ssize_t) i... | 23,578,839,469,788,660,000,000,000,000,000,000,000 | psd.c | 171,607,370,422,252,440,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2016-7521 | Heap-based buffer overflow in coders/psd.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PSD file. | https://nvd.nist.gov/vuln/detail/CVE-2016-7521 |
160,664 | ImageMagick | 30eec879c8b446b0ea9a3bb0da1a441cc8482bc4 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/30eec879c8b446b0ea9a3bb0da1a441cc8482bc4 | Moved check for https://github.com/ImageMagick/ImageMagick/issues/92. | 0 | static ssize_t DecodePSDPixels(const size_t number_compact_pixels,
const unsigned char *compact_pixels,const ssize_t depth,
const size_t number_pixels,unsigned char *pixels)
{
#define CheckNumberCompactPixels \
if (packets == 0) \
return(i); \
packets--
#define CheckNumberPixels(count) \
if (((ssize_t) i... | 142,131,229,181,755,830,000,000,000,000,000,000,000 | psd.c | 140,063,542,016,156,050,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2016-7521 | Heap-based buffer overflow in coders/psd.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PSD file. | https://nvd.nist.gov/vuln/detail/CVE-2016-7521 |
3,359 | ImageMagick | 14e606db148d6ebcaae20f1e1d6d71903ca4a556 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/14e606db148d6ebcaae20f1e1d6d71903ca4a556 | https://bugs.launchpad.net/ubuntu/+source/imagemagick/+bug/1537213 | 1 | static MagickBooleanType WriteHDRImage(const ImageInfo *image_info,Image *image,
ExceptionInfo *exception)
{
char
header[MagickPathExtent];
const char
*property;
MagickBooleanType
status;
register const Quantum
*p;
register ssize_t
i,
x;
size_t
length;
ssize_t
count... | 243,995,582,969,504,570,000,000,000,000,000,000,000 | hdr.c | 259,117,064,436,547,000,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2016-7520 | Heap-based buffer overflow in coders/hdr.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted HDR file. | https://nvd.nist.gov/vuln/detail/CVE-2016-7520 |
160,665 | ImageMagick | 14e606db148d6ebcaae20f1e1d6d71903ca4a556 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/14e606db148d6ebcaae20f1e1d6d71903ca4a556 | https://bugs.launchpad.net/ubuntu/+source/imagemagick/+bug/1537213 | 0 | static MagickBooleanType WriteHDRImage(const ImageInfo *image_info,Image *image,
ExceptionInfo *exception)
{
char
header[MagickPathExtent];
const char
*property;
MagickBooleanType
status;
register const Quantum
*p;
register ssize_t
i,
x;
size_t
length;
ssize_t
count... | 267,116,335,028,956,460,000,000,000,000,000,000,000 | hdr.c | 267,598,724,820,380,200,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2016-7520 | Heap-based buffer overflow in coders/hdr.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted HDR file. | https://nvd.nist.gov/vuln/detail/CVE-2016-7520 |
3,360 | ImageMagick | 2ad6d33493750a28a5a655d319a8e0b16c392de1 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/2ad6d33493750a28a5a655d319a8e0b16c392de1 | Fixed check for the number of pixels that will be allocated. | 1 | static Image *ReadRLEImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
#define SkipLinesOp 0x01
#define SetColorOp 0x02
#define SkipPixelsOp 0x03
#define ByteDataOp 0x05
#define RunDataOp 0x06
#define EOFOp 0x07
char
magick[12];
Image
*image;
int
opcode,
operand,
status;
... | 166,192,220,511,748,400,000,000,000,000,000,000,000 | rle.c | 305,611,083,519,864,970,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2016-7515 | The ReadRLEImage function in coders/rle.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via vectors related to the number of pixels. | https://nvd.nist.gov/vuln/detail/CVE-2016-7515 |
160,666 | ImageMagick | 2ad6d33493750a28a5a655d319a8e0b16c392de1 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/2ad6d33493750a28a5a655d319a8e0b16c392de1 | Fixed check for the number of pixels that will be allocated. | 0 | static Image *ReadRLEImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
#define SkipLinesOp 0x01
#define SetColorOp 0x02
#define SkipPixelsOp 0x03
#define ByteDataOp 0x05
#define RunDataOp 0x06
#define EOFOp 0x07
char
magick[12];
Image
*image;
int
opcode,
operand,
status;
... | 100,323,503,807,444,640,000,000,000,000,000,000,000 | rle.c | 33,747,663,647,921,126,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2016-7515 | The ReadRLEImage function in coders/rle.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via vectors related to the number of pixels. | https://nvd.nist.gov/vuln/detail/CVE-2016-7515 |
3,364 | nefarious2 | f50a84bad996d438e7b31b9e74c32a41e43f8be5 | https://github.com/evilnet/nefarious2 | https://github.com/evilnet/nefarious2/commit/f50a84bad996d438e7b31b9e74c32a41e43f8be5 | Fix to prevent SASL security vulnerability | 1 | int m_authenticate(struct Client* cptr, struct Client* sptr, int parc, char* parv[])
{
struct Client* acptr;
int first = 0;
char realhost[HOSTLEN + 3];
char *hoststr = (cli_sockhost(cptr) ? cli_sockhost(cptr) : cli_sock_ip(cptr));
if (!CapActive(cptr, CAP_SASL))
return 0;
if (parc < 2) /* have enough ... | 270,299,999,591,578,300,000,000,000,000,000,000,000 | m_authenticate.c | 308,034,972,284,734,170,000,000,000,000,000,000,000 | [
"CWE-287"
] | CVE-2016-7145 | The m_authenticate function in ircd/m_authenticate.c in nefarious2 allows remote attackers to spoof certificate fingerprints and consequently log in as another user via a crafted AUTHENTICATE parameter. | https://nvd.nist.gov/vuln/detail/CVE-2016-7145 |
160,670 | nefarious2 | f50a84bad996d438e7b31b9e74c32a41e43f8be5 | https://github.com/evilnet/nefarious2 | https://github.com/evilnet/nefarious2/commit/f50a84bad996d438e7b31b9e74c32a41e43f8be5 | Fix to prevent SASL security vulnerability | 0 | int m_authenticate(struct Client* cptr, struct Client* sptr, int parc, char* parv[])
{
struct Client* acptr;
int first = 0;
char realhost[HOSTLEN + 3];
char *hoststr = (cli_sockhost(cptr) ? cli_sockhost(cptr) : cli_sock_ip(cptr));
if (!CapActive(cptr, CAP_SASL))
return 0;
if (parc < 2) /* have enough ... | 75,269,715,363,117,660,000,000,000,000,000,000,000 | m_authenticate.c | 149,150,419,058,536,770,000,000,000,000,000,000,000 | [
"CWE-287"
] | CVE-2016-7145 | The m_authenticate function in ircd/m_authenticate.c in nefarious2 allows remote attackers to spoof certificate fingerprints and consequently log in as another user via a crafted AUTHENTICATE parameter. | https://nvd.nist.gov/vuln/detail/CVE-2016-7145 |
3,365 | unrealircd | f473e355e1dc422c4f019dbf86bc50ba1a34a766 | https://github.com/unrealircd/unrealircd | https://github.com/unrealircd/unrealircd/commit/f473e355e1dc422c4f019dbf86bc50ba1a34a766 | Fix AUTHENTICATE bug | 1 | CMD_FUNC(m_authenticate)
{
aClient *agent_p = NULL;
/* Failing to use CAP REQ for sasl is a protocol violation. */
if (!SASL_SERVER || !MyConnect(sptr) || BadPtr(parv[1]) || !CHECKPROTO(sptr, PROTO_SASL))
return 0;
if (sptr->local->sasl_complete)
{
sendto_one(sptr, err_str(ERR_SASLALREADY), me.name, BadPtr(s... | 190,787,633,910,337,700,000,000,000,000,000,000,000 | None | null | [
"CWE-287"
] | CVE-2016-7144 | The m_authenticate function in modules/m_sasl.c in UnrealIRCd before 3.2.10.7 and 4.x before 4.0.6 allows remote attackers to spoof certificate fingerprints and consequently log in as another user via a crafted AUTHENTICATE parameter. | https://nvd.nist.gov/vuln/detail/CVE-2016-7144 |
160,671 | unrealircd | f473e355e1dc422c4f019dbf86bc50ba1a34a766 | https://github.com/unrealircd/unrealircd | https://github.com/unrealircd/unrealircd/commit/f473e355e1dc422c4f019dbf86bc50ba1a34a766 | Fix AUTHENTICATE bug | 0 | CMD_FUNC(m_authenticate)
{
aClient *agent_p = NULL;
/* Failing to use CAP REQ for sasl is a protocol violation. */
if (!SASL_SERVER || !MyConnect(sptr) || BadPtr(parv[1]) || !CHECKPROTO(sptr, PROTO_SASL))
return 0;
if (sptr->local->sasl_complete)
{
sendto_one(sptr, err_str(ERR_SASLALREADY), me.name, BadPtr(s... | 229,825,302,368,766,140,000,000,000,000,000,000,000 | None | null | [
"CWE-287"
] | CVE-2016-7144 | The m_authenticate function in modules/m_sasl.c in UnrealIRCd before 3.2.10.7 and 4.x before 4.0.6 allows remote attackers to spoof certificate fingerprints and consequently log in as another user via a crafted AUTHENTICATE parameter. | https://nvd.nist.gov/vuln/detail/CVE-2016-7144 |
3,372 | libgd | 4859d69e07504d4b0a4bdf9bcb4d9e3769ca35ae | https://github.com/libgd/libgd | https://github.com/libgd/libgd/commit/4859d69e07504d4b0a4bdf9bcb4d9e3769ca35ae | Fix invalid read in gdImageCreateFromTiffPtr()
tiff_invalid_read.tiff is corrupt, and causes an invalid read in
gdImageCreateFromTiffPtr(), but not in gdImageCreateFromTiff(). The culprit
is dynamicGetbuf(), which doesn't check for out-of-bound reads. In this case,
dynamicGetbuf() is called with a negative dp->pos, bu... | 1 | static int dynamicGetbuf(gdIOCtxPtr ctx, void *buf, int len)
{
int rlen, remain;
dpIOCtxPtr dctx;
dynamicPtr *dp;
dctx = (dpIOCtxPtr) ctx;
dp = dctx->dp;
remain = dp->logicalSize - dp->pos;
if(remain >= len) {
rlen = len;
} else {
if(remain <= 0) {
/* 2.0.34: EOF is incorrect. We use 0 for
... | 113,302,243,464,312,720,000,000,000,000,000,000,000 | gd_io_dp.c | 169,924,014,127,142,480,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2016-6911 | The dynamicGetbuf function in the GD Graphics Library (aka libgd) before 2.2.4 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted TIFF image. | https://nvd.nist.gov/vuln/detail/CVE-2016-6911 |
160,677 | libgd | 4859d69e07504d4b0a4bdf9bcb4d9e3769ca35ae | https://github.com/libgd/libgd | https://github.com/libgd/libgd/commit/4859d69e07504d4b0a4bdf9bcb4d9e3769ca35ae | Fix invalid read in gdImageCreateFromTiffPtr()
tiff_invalid_read.tiff is corrupt, and causes an invalid read in
gdImageCreateFromTiffPtr(), but not in gdImageCreateFromTiff(). The culprit
is dynamicGetbuf(), which doesn't check for out-of-bound reads. In this case,
dynamicGetbuf() is called with a negative dp->pos, bu... | 0 | static int dynamicGetbuf(gdIOCtxPtr ctx, void *buf, int len)
{
int rlen, remain;
dpIOCtxPtr dctx;
dynamicPtr *dp;
dctx = (dpIOCtxPtr) ctx;
dp = dctx->dp;
if (dp->pos < 0 || dp->pos >= dp->realSize) {
return 0;
}
remain = dp->logicalSize - dp->pos;
if(remain >= len) {
rlen = len;
} else {
i... | 92,793,353,838,893,120,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2016-6911 | The dynamicGetbuf function in the GD Graphics Library (aka libgd) before 2.2.4 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted TIFF image. | https://nvd.nist.gov/vuln/detail/CVE-2016-6911 |
3,375 | ImageMagick | 4cc6ec8a4197d4c008577127736bf7985d632323 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/4cc6ec8a4197d4c008577127736bf7985d632323 | Prevent buffer overflow in BMP coder (bug report from pwchen of tencent). | 1 | static MagickBooleanType WriteBMPImage(const ImageInfo *image_info,Image *image,
ExceptionInfo *exception)
{
BMPInfo
bmp_info;
const char
*option;
const StringInfo
*profile;
MagickBooleanType
have_color_info,
status;
MagickOffsetType
scene;
MemoryInfo
*pixel_info;
regis... | 171,765,265,288,600,100,000,000,000,000,000,000,000 | bmp.c | 142,605,325,816,453,950,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2016-6823 | Integer overflow in the BMP coder in ImageMagick before 7.0.2-10 allows remote attackers to cause a denial of service (crash) via crafted height and width values, which triggers an out-of-bounds write. | https://nvd.nist.gov/vuln/detail/CVE-2016-6823 |
160,679 | ImageMagick | 4cc6ec8a4197d4c008577127736bf7985d632323 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/4cc6ec8a4197d4c008577127736bf7985d632323 | Prevent buffer overflow in BMP coder (bug report from pwchen of tencent). | 0 | static MagickBooleanType WriteBMPImage(const ImageInfo *image_info,Image *image,
ExceptionInfo *exception)
{
BMPInfo
bmp_info;
const char
*option;
const StringInfo
*profile;
MagickBooleanType
have_color_info,
status;
MagickOffsetType
scene;
MemoryInfo
*pixel_info;
regis... | 235,291,570,304,609,800,000,000,000,000,000,000,000 | bmp.c | 252,779,019,518,174,600,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2016-6823 | Integer overflow in the BMP coder in ImageMagick before 7.0.2-10 allows remote attackers to cause a denial of service (crash) via crafted height and width values, which triggers an out-of-bounds write. | https://nvd.nist.gov/vuln/detail/CVE-2016-6823 |
3,383 | openjpeg | 162f6199c0cd3ec1c6c6dc65e41b2faab92b2d91 | https://github.com/uclouvain/openjpeg | https://github.com/uclouvain/openjpeg/commit/162f6199c0cd3ec1c6c6dc65e41b2faab92b2d91 | Fix Heap Buffer Overflow in function color_cmyk_to_rgb
Fix uclouvain/openjpeg#774 | 1 | void color_cmyk_to_rgb(opj_image_t *image)
{
float C, M, Y, K;
float sC, sM, sY, sK;
unsigned int w, h, max, i;
w = image->comps[0].w;
h = image->comps[0].h;
if(image->numcomps < 4) return;
max = w * h;
sC = 1.0F / (float)((1 << image->comps[0].prec) - 1);
sM = 1.0F / (float)((1 << image->comps[1].p... | 174,303,624,607,131,550,000,000,000,000,000,000,000 | color.c | 144,381,218,147,487,070,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2016-4796 | Heap-based buffer overflow in the color_cmyk_to_rgb in common/color.c in OpenJPEG before 2.1.1 allows remote attackers to cause a denial of service (crash) via a crafted .j2k file. | https://nvd.nist.gov/vuln/detail/CVE-2016-4796 |
160,688 | openjpeg | 162f6199c0cd3ec1c6c6dc65e41b2faab92b2d91 | https://github.com/uclouvain/openjpeg | https://github.com/uclouvain/openjpeg/commit/162f6199c0cd3ec1c6c6dc65e41b2faab92b2d91 | Fix Heap Buffer Overflow in function color_cmyk_to_rgb
Fix uclouvain/openjpeg#774 | 0 | void color_cmyk_to_rgb(opj_image_t *image)
{
float C, M, Y, K;
float sC, sM, sY, sK;
unsigned int w, h, max, i;
w = image->comps[0].w;
h = image->comps[0].h;
if (
(image->numcomps < 4)
|| (image->comps[0].dx != image->comps[1].dx) || (image->comps[0].dx != image->comps[2].dx) || (image->comps[0].dx != ... | 153,218,819,749,202,490,000,000,000,000,000,000,000 | color.c | 236,919,714,230,762,480,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2016-4796 | Heap-based buffer overflow in the color_cmyk_to_rgb in common/color.c in OpenJPEG before 2.1.1 allows remote attackers to cause a denial of service (crash) via a crafted .j2k file. | https://nvd.nist.gov/vuln/detail/CVE-2016-4796 |
3,384 | linux | d7a6be58edc01b1c66ecd8fcc91236bfbce0a420 | https://github.com/torvalds/linux | https://github.com/mjg59/linux/commit/d7a6be58edc01b1c66ecd8fcc91236bfbce0a420 | None | 1 | static int einj_error_inject(u32 type, u32 flags, u64 param1, u64 param2,
u64 param3, u64 param4)
{
int rc;
u64 base_addr, size;
/* If user manually set "flags", make sure it is legal */
if (flags && (flags &
~(SETWA_FLAGS_APICID|SETWA_FLAGS_MEM|SETWA_FLAGS_PCIE_SBDF)))
return -EINVAL;
/*
* W... | 189,767,553,214,590,050,000,000,000,000,000,000,000 | None | null | [
"CWE-74"
] | CVE-2016-3695 | The einj_error_inject function in drivers/acpi/apei/einj.c in the Linux kernel allows local users to simulate hardware errors and consequently cause a denial of service by leveraging failure to disable APEI error injection through EINJ when securelevel is set. | https://nvd.nist.gov/vuln/detail/CVE-2016-3695 |
160,689 | linux | d7a6be58edc01b1c66ecd8fcc91236bfbce0a420 | https://github.com/torvalds/linux | https://github.com/mjg59/linux/commit/d7a6be58edc01b1c66ecd8fcc91236bfbce0a420 | None | 0 | static int einj_error_inject(u32 type, u32 flags, u64 param1, u64 param2,
u64 param3, u64 param4)
{
int rc;
u64 base_addr, size;
if (get_securelevel() > 0)
return -EPERM;
/* If user manually set "flags", make sure it is legal */
if (flags && (flags &
~(SETWA_FLAGS_APICID|SETWA_FLAGS_MEM|SETWA_F... | 262,935,305,834,805,200,000,000,000,000,000,000,000 | None | null | [
"CWE-74"
] | CVE-2016-3695 | The einj_error_inject function in drivers/acpi/apei/einj.c in the Linux kernel allows local users to simulate hardware errors and consequently cause a denial of service by leveraging failure to disable APEI error injection through EINJ when securelevel is set. | https://nvd.nist.gov/vuln/detail/CVE-2016-3695 |
3,389 | miniupnp | 140ee8d2204b383279f854802b27bdb41c1d5d1a | https://github.com/miniupnp/miniupnp | https://github.com/miniupnp/miniupnp/commit/140ee8d2204b383279f854802b27bdb41c1d5d1a | minissdpd.c: Initialize pointers to NULL (fix) | 1 | void processRequest(struct reqelem * req)
{
ssize_t n;
unsigned int l, m;
unsigned char buf[2048];
const unsigned char * p;
int type;
struct device * d = devlist;
unsigned char rbuf[4096];
unsigned char * rp = rbuf+1;
unsigned char nrep = 0;
time_t t;
struct service * newserv = NULL;
struct service * serv;
... | 37,126,454,427,764,617,000,000,000,000,000,000,000 | minissdpd.c | 80,138,051,541,731,040,000,000,000,000,000,000,000 | [
"CWE-388"
] | CVE-2016-3179 | The processRequest function in minissdpd.c in MiniSSDPd 1.2.20130907-3 allows local users to cause a denial of service (invalid free and daemon crash) via vectors related to error handling. | https://nvd.nist.gov/vuln/detail/CVE-2016-3179 |
160,690 | miniupnp | 140ee8d2204b383279f854802b27bdb41c1d5d1a | https://github.com/miniupnp/miniupnp | https://github.com/miniupnp/miniupnp/commit/140ee8d2204b383279f854802b27bdb41c1d5d1a | minissdpd.c: Initialize pointers to NULL (fix) | 0 | void processRequest(struct reqelem * req)
{
ssize_t n;
unsigned int l, m;
unsigned char buf[2048];
const unsigned char * p;
int type;
struct device * d = devlist;
unsigned char rbuf[4096];
unsigned char * rp = rbuf+1;
unsigned char nrep = 0;
time_t t;
struct service * newserv = NULL;
struct service * serv;
... | 12,438,808,535,568,261,000,000,000,000,000,000,000 | minissdpd.c | 4,046,485,048,239,267,000,000,000,000,000,000,000 | [
"CWE-388"
] | CVE-2016-3179 | The processRequest function in minissdpd.c in MiniSSDPd 1.2.20130907-3 allows local users to cause a denial of service (invalid free and daemon crash) via vectors related to error handling. | https://nvd.nist.gov/vuln/detail/CVE-2016-3179 |
3,390 | miniupnp | b238cade9a173c6f751a34acf8ccff838a62aa47 | https://github.com/miniupnp/miniupnp | https://github.com/miniupnp/miniupnp/commit/b238cade9a173c6f751a34acf8ccff838a62aa47 | minissdpd: Fix broken overflow test (p+l > buf+n) thanks to Salva Piero | 1 | void processRequest(struct reqelem * req)
{
ssize_t n;
unsigned int l, m;
unsigned char buf[2048];
const unsigned char * p;
enum request_type type;
struct device * d = devlist;
unsigned char rbuf[RESPONSE_BUFFER_SIZE];
unsigned char * rp;
unsigned char nrep = 0;
time_t t;
struct service * newserv = NULL;
st... | 230,723,959,165,221,830,000,000,000,000,000,000,000 | minissdpd.c | 313,447,235,104,272,300,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2016-3178 | The processRequest function in minissdpd.c in MiniSSDPd 1.2.20130907-3 allows local users to cause a denial of service (out-of-bounds memory access and daemon crash) via vectors involving a negative length value. | https://nvd.nist.gov/vuln/detail/CVE-2016-3178 |
160,691 | miniupnp | b238cade9a173c6f751a34acf8ccff838a62aa47 | https://github.com/miniupnp/miniupnp | https://github.com/miniupnp/miniupnp/commit/b238cade9a173c6f751a34acf8ccff838a62aa47 | minissdpd: Fix broken overflow test (p+l > buf+n) thanks to Salva Piero | 0 | void processRequest(struct reqelem * req)
{
ssize_t n;
unsigned int l, m;
unsigned char buf[2048];
const unsigned char * p;
enum request_type type;
struct device * d = devlist;
unsigned char rbuf[RESPONSE_BUFFER_SIZE];
unsigned char * rp;
unsigned char nrep = 0;
time_t t;
struct service * newserv = NULL;
st... | 91,023,075,434,640,580,000,000,000,000,000,000,000 | minissdpd.c | 31,382,398,235,247,496,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2016-3178 | The processRequest function in minissdpd.c in MiniSSDPd 1.2.20130907-3 allows local users to cause a denial of service (out-of-bounds memory access and daemon crash) via vectors involving a negative length value. | https://nvd.nist.gov/vuln/detail/CVE-2016-3178 |
3,392 | lhasa | 6fcdb8f1f538b9d63e63a5fa199c5514a15d4564 | https://github.com/fragglet/lhasa | https://github.com/fragglet/lhasa/commit/6fcdb8f1f538b9d63e63a5fa199c5514a15d4564 | Fix integer underflow vulnerability in L3 decode.
Marcin 'Icewall' Noga of Cisco TALOS discovered that the level 3 header
decoding routines were vulnerable to an integer underflow, if the 32-bit
header length was less than the base level 3 header length. This could
lead to an exploitable heap corruption condition.
Th... | 1 | static int decode_level3_header(LHAFileHeader **header, LHAInputStream *stream)
{
unsigned int header_len;
if (lha_decode_uint16(&RAW_DATA(header, 0)) != 4) {
return 0;
}
if (!extend_raw_data(header, stream,
LEVEL_3_HEADER_LEN - RAW_DATA_LEN(header))) {
return 0;
}
header_len = l... | 82,334,831,641,499,670,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2016-2347 | Integer underflow in the decode_level3_header function in lib/lha_file_header.c in Lhasa before 0.3.1 allows remote attackers to execute arbitrary code via a crafted archive. | https://nvd.nist.gov/vuln/detail/CVE-2016-2347 |
160,693 | lhasa | 6fcdb8f1f538b9d63e63a5fa199c5514a15d4564 | https://github.com/fragglet/lhasa | https://github.com/fragglet/lhasa/commit/6fcdb8f1f538b9d63e63a5fa199c5514a15d4564 | Fix integer underflow vulnerability in L3 decode.
Marcin 'Icewall' Noga of Cisco TALOS discovered that the level 3 header
decoding routines were vulnerable to an integer underflow, if the 32-bit
header length was less than the base level 3 header length. This could
lead to an exploitable heap corruption condition.
Th... | 0 | static int decode_level3_header(LHAFileHeader **header, LHAInputStream *stream)
{
unsigned int header_len;
if (lha_decode_uint16(&RAW_DATA(header, 0)) != 4) {
return 0;
}
if (!extend_raw_data(header, stream,
LEVEL_3_HEADER_LEN - RAW_DATA_LEN(header))) {
return 0;
}
header_len = l... | 13,827,641,392,102,537,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2016-2347 | Integer underflow in the decode_level3_header function in lib/lha_file_header.c in Lhasa before 0.3.1 allows remote attackers to execute arbitrary code via a crafted archive. | https://nvd.nist.gov/vuln/detail/CVE-2016-2347 |
3,398 | ImageMagick | 9b428b7af688fe319320aed15f2b94281d1e37b4 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/9b428b7af688fe319320aed15f2b94281d1e37b4 | None | 1 | static MagickBooleanType SkipDXTMipmaps(Image *image,DDSInfo *dds_info,
int texel_size,ExceptionInfo *exception)
{
register ssize_t
i;
MagickOffsetType
offset;
size_t
h,
w;
/*
Only skip mipmaps for textures and cube maps
*/
if (EOFBlob(image) != MagickFalse)
{
ThrowFileExc... | 161,526,989,354,860,710,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2015-8959 | coders/dds.c in ImageMagick before 6.9.0-4 Beta allows remote attackers to cause a denial of service (CPU consumption) via a crafted DDS file. | https://nvd.nist.gov/vuln/detail/CVE-2015-8959 |
160,697 | ImageMagick | 9b428b7af688fe319320aed15f2b94281d1e37b4 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/9b428b7af688fe319320aed15f2b94281d1e37b4 | None | 0 | static MagickBooleanType SkipDXTMipmaps(Image *image,DDSInfo *dds_info,
int texel_size,ExceptionInfo *exception)
{
register ssize_t
i;
MagickOffsetType
offset;
size_t
h,
w;
/*
Only skip mipmaps for textures and cube maps
*/
if (EOFBlob(image) != MagickFalse)
{
ThrowFileExc... | 135,142,054,378,691,100,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2015-8959 | coders/dds.c in ImageMagick before 6.9.0-4 Beta allows remote attackers to cause a denial of service (CPU consumption) via a crafted DDS file. | https://nvd.nist.gov/vuln/detail/CVE-2015-8959 |
3,400 | ImageMagick | 97aa7d7cfd2027f6ba7ce42caf8b798541b9cdc6 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/97aa7d7cfd2027f6ba7ce42caf8b798541b9cdc6 | Fixed infinite loop and added checks for the sscanf result. | 1 | static Image *ReadHDRImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
char
format[MaxTextExtent],
keyword[MaxTextExtent],
tag[MaxTextExtent],
value[MaxTextExtent];
double
gamma;
Image
*image;
int
c;
MagickBooleanType
status,
value_expected;
register Quan... | 132,512,135,164,293,850,000,000,000,000,000,000,000 | hdr.c | 197,334,708,565,562,500,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2015-8900 | The ReadHDRImage function in coders/hdr.c in ImageMagick 6.x and 7.x allows remote attackers to cause a denial of service (infinite loop) via a crafted HDR file. | https://nvd.nist.gov/vuln/detail/CVE-2015-8900 |
160,698 | ImageMagick | 97aa7d7cfd2027f6ba7ce42caf8b798541b9cdc6 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/97aa7d7cfd2027f6ba7ce42caf8b798541b9cdc6 | Fixed infinite loop and added checks for the sscanf result. | 0 | static Image *ReadHDRImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
char
format[MaxTextExtent],
keyword[MaxTextExtent],
tag[MaxTextExtent],
value[MaxTextExtent];
double
gamma;
Image
*image;
int
c;
MagickBooleanType
status,
value_expected;
register Quan... | 105,221,324,722,130,400,000,000,000,000,000,000,000 | hdr.c | 189,433,786,930,264,830,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2015-8900 | The ReadHDRImage function in coders/hdr.c in ImageMagick 6.x and 7.x allows remote attackers to cause a denial of service (infinite loop) via a crafted HDR file. | https://nvd.nist.gov/vuln/detail/CVE-2015-8900 |
3,401 | ImageMagick | 5b4bebaa91849c592a8448bc353ab25a54ff8c44 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/5b4bebaa91849c592a8448bc353ab25a54ff8c44 | https://github.com/ImageMagick/ImageMagick/pull/34 | 1 | MagickExport MagickBooleanType WriteImages(const ImageInfo *image_info,
Image *images,const char *filename,ExceptionInfo *exception)
{
#define WriteImageTag "Write/Image"
ExceptionInfo
*sans_exception;
ImageInfo
*write_info;
MagickBooleanType
proceed;
MagickOffsetType
progress;
MagickP... | 295,077,649,590,654,430,000,000,000,000,000,000,000 | constitute.c | 61,617,961,026,596,400,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2015-8898 | The WriteImages function in magick/constitute.c in ImageMagick before 6.9.2-4 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted image file. | https://nvd.nist.gov/vuln/detail/CVE-2015-8898 |
160,699 | ImageMagick | 5b4bebaa91849c592a8448bc353ab25a54ff8c44 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/5b4bebaa91849c592a8448bc353ab25a54ff8c44 | https://github.com/ImageMagick/ImageMagick/pull/34 | 0 | MagickExport MagickBooleanType WriteImages(const ImageInfo *image_info,
Image *images,const char *filename,ExceptionInfo *exception)
{
#define WriteImageTag "Write/Image"
ExceptionInfo
*sans_exception;
ImageInfo
*write_info;
MagickBooleanType
proceed;
MagickOffsetType
progress;
MagickP... | 321,109,016,875,635,860,000,000,000,000,000,000,000 | constitute.c | 199,859,930,407,694,200,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2015-8898 | The WriteImages function in magick/constitute.c in ImageMagick before 6.9.2-4 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted image file. | https://nvd.nist.gov/vuln/detail/CVE-2015-8898 |
3,402 | ImageMagick | 7b1cf5784b5bcd85aa9293ecf56769f68c037231 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/7b1cf5784b5bcd85aa9293ecf56769f68c037231 | Fixed out of bounds error in SpliceImage. | 1 | MagickExport Image *SpliceImage(const Image *image,
const RectangleInfo *geometry,ExceptionInfo *exception)
{
#define SpliceImageTag "Splice/Image"
CacheView
*image_view,
*splice_view;
Image
*splice_image;
MagickBooleanType
status;
MagickOffsetType
progress;
RectangleInfo
spli... | 15,111,872,907,779,805,000,000,000,000,000,000,000 | transform.c | 99,447,129,808,024,770,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2015-8897 | The SpliceImage function in MagickCore/transform.c in ImageMagick before 6.9.2-4 allows remote attackers to cause a denial of service (application crash) via a crafted png file. | https://nvd.nist.gov/vuln/detail/CVE-2015-8897 |
160,700 | ImageMagick | 7b1cf5784b5bcd85aa9293ecf56769f68c037231 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/7b1cf5784b5bcd85aa9293ecf56769f68c037231 | Fixed out of bounds error in SpliceImage. | 0 | MagickExport Image *SpliceImage(const Image *image,
const RectangleInfo *geometry,ExceptionInfo *exception)
{
#define SpliceImageTag "Splice/Image"
CacheView
*image_view,
*splice_view;
Image
*splice_image;
MagickBooleanType
status;
MagickOffsetType
progress;
RectangleInfo
spli... | 159,875,931,282,199,700,000,000,000,000,000,000,000 | transform.c | 163,461,686,609,171,400,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2015-8897 | The SpliceImage function in MagickCore/transform.c in ImageMagick before 6.9.2-4 allows remote attackers to cause a denial of service (application crash) via a crafted png file. | https://nvd.nist.gov/vuln/detail/CVE-2015-8897 |
3,408 | ImageMagick | 0f6fc2d5bf8f500820c3dbcf0d23ee14f2d9f734 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/0f6fc2d5bf8f500820c3dbcf0d23ee14f2d9f734 | 1 | static MagickBooleanType WritePICTImage(const ImageInfo *image_info,
Image *image,ExceptionInfo *exception)
{
#define MaxCount 128
#define PictCropRegionOp 0x01
#define PictEndOfPictureOp 0xff
#define PictJPEGOp 0x8200
#define PictInfoOp 0x0C00
#define PictInfoSize 512
#define PictPixmapOp 0x9A
#define PictPIC... | 268,543,993,326,910,650,000,000,000,000,000,000,000 | pict.c | 191,832,857,215,210,400,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2015-8896 | Integer truncation issue in coders/pict.c in ImageMagick before 7.0.5-0 allows remote attackers to cause a denial of service (application crash) via a crafted .pict file. | https://nvd.nist.gov/vuln/detail/CVE-2015-8896 | |
160,706 | ImageMagick | 0f6fc2d5bf8f500820c3dbcf0d23ee14f2d9f734 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/0f6fc2d5bf8f500820c3dbcf0d23ee14f2d9f734 | 0 | static MagickBooleanType WritePICTImage(const ImageInfo *image_info,
Image *image,ExceptionInfo *exception)
{
#define MaxCount 128
#define PictCropRegionOp 0x01
#define PictEndOfPictureOp 0xff
#define PictJPEGOp 0x8200
#define PictInfoOp 0x0C00
#define PictInfoSize 512
#define PictPixmapOp 0x9A
#define PictPIC... | 95,822,017,928,684,620,000,000,000,000,000,000,000 | pict.c | 16,918,765,499,069,375,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2015-8896 | Integer truncation issue in coders/pict.c in ImageMagick before 7.0.5-0 allows remote attackers to cause a denial of service (application crash) via a crafted .pict file. | https://nvd.nist.gov/vuln/detail/CVE-2015-8896 | |
3,409 | ImageMagick | 4f68e9661518463fca523c9726bb5d940a2aa6d8 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/4f68e9661518463fca523c9726bb5d940a2aa6d8 | https://bugs.launchpad.net/ubuntu/+source/imagemagick/+bug/1490362 | 1 | static Image *ReadTGAImage(const ImageInfo *image_info,
ExceptionInfo *exception)
{
Image
*image;
MagickBooleanType
status;
PixelInfo
pixel;
Quantum
index;
register Quantum
*q;
register ssize_t
i,
x;
size_t
base,
flag,
offset,
real,
skip;
ssize_t
... | 240,609,813,257,975,770,000,000,000,000,000,000,000 | tga.c | 312,438,178,534,953,840,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2015-8894 | Double free vulnerability in coders/tga.c in ImageMagick 7.0.0 and later allows remote attackers to cause a denial of service (application crash) via a crafted tga file. | https://nvd.nist.gov/vuln/detail/CVE-2015-8894 |
160,707 | ImageMagick | 4f68e9661518463fca523c9726bb5d940a2aa6d8 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/4f68e9661518463fca523c9726bb5d940a2aa6d8 | https://bugs.launchpad.net/ubuntu/+source/imagemagick/+bug/1490362 | 0 | static Image *ReadTGAImage(const ImageInfo *image_info,
ExceptionInfo *exception)
{
Image
*image;
MagickBooleanType
status;
PixelInfo
pixel;
Quantum
index;
register Quantum
*q;
register ssize_t
i,
x;
size_t
base,
flag,
offset,
real,
skip;
ssize_t
... | 91,874,687,946,556,900,000,000,000,000,000,000,000 | tga.c | 77,408,969,979,215,250,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2015-8894 | Double free vulnerability in coders/tga.c in ImageMagick 7.0.0 and later allows remote attackers to cause a denial of service (application crash) via a crafted tga file. | https://nvd.nist.gov/vuln/detail/CVE-2015-8894 |
3,410 | exfat | 2e86ae5f81da11f11673d0546efb525af02b7786 | https://github.com/relan/exfat | https://github.com/relan/exfat/commit/2e86ae5f81da11f11673d0546efb525af02b7786 | None | 1 | int exfat_mount(struct exfat* ef, const char* spec, const char* options)
{
int rc;
enum exfat_mode mode;
exfat_tzset();
memset(ef, 0, sizeof(struct exfat));
parse_options(ef, options);
if (match_option(options, "ro"))
mode = EXFAT_MODE_RO;
else if (match_option(options, "ro_fallback"))
mode = EXFAT_MODE_A... | 172,240,473,177,799,060,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2015-8026 | Heap-based buffer overflow in the verify_vbr_checksum function in exfatfsck in exfat-utils before 1.2.1 allows remote attackers to cause a denial of service (infinite loop) or possibly execute arbitrary code via a crafted filesystem. | https://nvd.nist.gov/vuln/detail/CVE-2015-8026 |
160,708 | exfat | 2e86ae5f81da11f11673d0546efb525af02b7786 | https://github.com/relan/exfat | https://github.com/relan/exfat/commit/2e86ae5f81da11f11673d0546efb525af02b7786 | None | 0 | int exfat_mount(struct exfat* ef, const char* spec, const char* options)
{
int rc;
enum exfat_mode mode;
exfat_tzset();
memset(ef, 0, sizeof(struct exfat));
parse_options(ef, options);
if (match_option(options, "ro"))
mode = EXFAT_MODE_RO;
else if (match_option(options, "ro_fallback"))
mode = EXFAT_MODE_A... | 45,705,562,859,276,480,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2015-8026 | Heap-based buffer overflow in the verify_vbr_checksum function in exfatfsck in exfat-utils before 1.2.1 allows remote attackers to cause a denial of service (infinite loop) or possibly execute arbitrary code via a crafted filesystem. | https://nvd.nist.gov/vuln/detail/CVE-2015-8026 |
3,411 | linux | 4b2b64d5a6ebc84214755ebccd599baef7c1b798 | https://github.com/torvalds/linux | https://github.com/mjg59/linux/commit/4b2b64d5a6ebc84214755ebccd599baef7c1b798 | None | 1 | setup_efi_state(struct boot_params *params, unsigned long params_load_addr,
unsigned int efi_map_offset, unsigned int efi_map_sz,
unsigned int efi_setup_data_offset)
{
struct efi_info *current_ei = &boot_params.efi_info;
struct efi_info *ei = ¶ms->efi_info;
if (!current_ei->efi_memmap_size)
return 0;
/*... | 305,796,494,330,244,700,000,000,000,000,000,000,000 | None | null | [
"CWE-254"
] | CVE-2015-7837 | The Linux kernel, as used in Red Hat Enterprise Linux 7, kernel-rt, and Enterprise MRG 2 and when booted with UEFI Secure Boot enabled, allows local users to bypass intended securelevel/secureboot restrictions by leveraging improper handling of secure_boot flag across kexec reboot. | https://nvd.nist.gov/vuln/detail/CVE-2015-7837 |
160,709 | linux | 4b2b64d5a6ebc84214755ebccd599baef7c1b798 | https://github.com/torvalds/linux | https://github.com/mjg59/linux/commit/4b2b64d5a6ebc84214755ebccd599baef7c1b798 | None | 0 | setup_efi_state(struct boot_params *params, unsigned long params_load_addr,
unsigned int efi_map_offset, unsigned int efi_map_sz,
unsigned int efi_setup_data_offset)
{
struct efi_info *current_ei = &boot_params.efi_info;
struct efi_info *ei = ¶ms->efi_info;
if (!current_ei->efi_memmap_size)
return 0;
/*... | 81,635,001,860,321,660,000,000,000,000,000,000,000 | None | null | [
"CWE-254"
] | CVE-2015-7837 | The Linux kernel, as used in Red Hat Enterprise Linux 7, kernel-rt, and Enterprise MRG 2 and when booted with UEFI Secure Boot enabled, allows local users to bypass intended securelevel/secureboot restrictions by leveraging improper handling of secure_boot flag across kexec reboot. | https://nvd.nist.gov/vuln/detail/CVE-2015-7837 |
3,414 | pgbouncer | 7ca3e5279d05fceb1e8a043c6f5b6f58dea3ed38 | https://github.com/pgbouncer/pgbouncer | https://github.com/pgbouncer/pgbouncer/commit/7ca3e5279d05fceb1e8a043c6f5b6f58dea3ed38 | Remove too early set of auth_user
When query returns 0 rows (user not found),
this user stays as login user...
Should fix #69. | 1 | static void start_auth_request(PgSocket *client, const char *username)
{
int res;
PktBuf *buf;
client->auth_user = client->db->auth_user;
/* have to fetch user info from db */
client->pool = get_pool(client->db, client->db->auth_user);
if (!find_server(client)) {
client->wait_for_user_conn = true;
retu... | 192,440,722,953,440,760,000,000,000,000,000,000,000 | client.c | 115,609,358,804,220,030,000,000,000,000,000,000,000 | [
"CWE-287"
] | CVE-2015-6817 | PgBouncer 1.6.x before 1.6.1, when configured with auth_user, allows remote attackers to gain login access as auth_user via an unknown username. | https://nvd.nist.gov/vuln/detail/CVE-2015-6817 |
160,712 | pgbouncer | 7ca3e5279d05fceb1e8a043c6f5b6f58dea3ed38 | https://github.com/pgbouncer/pgbouncer | https://github.com/pgbouncer/pgbouncer/commit/7ca3e5279d05fceb1e8a043c6f5b6f58dea3ed38 | Remove too early set of auth_user
When query returns 0 rows (user not found),
this user stays as login user...
Should fix #69. | 0 | static void start_auth_request(PgSocket *client, const char *username)
{
int res;
PktBuf *buf;
/* have to fetch user info from db */
client->pool = get_pool(client->db, client->db->auth_user);
if (!find_server(client)) {
client->wait_for_user_conn = true;
return;
}
slog_noise(client, "Doing auth_conn ... | 79,205,329,567,611,970,000,000,000,000,000,000,000 | client.c | 158,411,821,133,249,770,000,000,000,000,000,000,000 | [
"CWE-287"
] | CVE-2015-6817 | PgBouncer 1.6.x before 1.6.1, when configured with auth_user, allows remote attackers to gain login access as auth_user via an unknown username. | https://nvd.nist.gov/vuln/detail/CVE-2015-6817 |
3,416 | jasper | df5d2867e8004e51e18b89865bc4aa69229227b3 | https://github.com/mdadams/jasper | https://github.com/mdadams/jasper/commit/df5d2867e8004e51e18b89865bc4aa69229227b3 | CVE-2015-5221 | 1 | static int mif_process_cmpt(mif_hdr_t *hdr, char *buf)
{
jas_tvparser_t *tvp;
mif_cmpt_t *cmpt;
int id;
cmpt = 0;
tvp = 0;
if (!(cmpt = mif_cmpt_create())) {
goto error;
}
cmpt->tlx = 0;
cmpt->tly = 0;
cmpt->sampperx = 0;
cmpt->samppery = 0;
cmpt->width = 0;
cmpt->height = 0;
cmpt->prec = 0;
cmpt->sg... | 219,089,908,130,942,330,000,000,000,000,000,000,000 | mif_cod.c | 316,893,017,337,693,300,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2015-5221 | Use-after-free vulnerability in the mif_process_cmpt function in libjasper/mif/mif_cod.c in the JasPer JPEG-2000 library before 1.900.2 allows remote attackers to cause a denial of service (crash) via a crafted JPEG 2000 image file. | https://nvd.nist.gov/vuln/detail/CVE-2015-5221 |
160,714 | jasper | df5d2867e8004e51e18b89865bc4aa69229227b3 | https://github.com/mdadams/jasper | https://github.com/mdadams/jasper/commit/df5d2867e8004e51e18b89865bc4aa69229227b3 | CVE-2015-5221 | 0 | static int mif_process_cmpt(mif_hdr_t *hdr, char *buf)
{
jas_tvparser_t *tvp;
mif_cmpt_t *cmpt;
int id;
cmpt = 0;
tvp = 0;
if (!(cmpt = mif_cmpt_create())) {
goto error;
}
cmpt->tlx = 0;
cmpt->tly = 0;
cmpt->sampperx = 0;
cmpt->samppery = 0;
cmpt->width = 0;
cmpt->height = 0;
cmpt->prec = 0;
cmpt->sg... | 10,083,764,080,444,983,000,000,000,000,000,000,000 | mif_cod.c | 254,401,579,117,563,020,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2015-5221 | Use-after-free vulnerability in the mif_process_cmpt function in libjasper/mif/mif_cod.c in the JasPer JPEG-2000 library before 1.900.2 allows remote attackers to cause a denial of service (crash) via a crafted JPEG 2000 image file. | https://nvd.nist.gov/vuln/detail/CVE-2015-5221 |
3,421 | pgbouncer | 74d6e5f7de5ec736f71204b7b422af7380c19ac5 | https://github.com/pgbouncer/pgbouncer | https://github.com/pgbouncer/pgbouncer/commit/74d6e5f7de5ec736f71204b7b422af7380c19ac5 | Check if auth_user is set.
Fixes a crash if password packet appears before startup packet (#42). | 1 | static bool handle_client_startup(PgSocket *client, PktHdr *pkt)
{
const char *passwd;
const uint8_t *key;
bool ok;
SBuf *sbuf = &client->sbuf;
/* don't tolerate partial packets */
if (incomplete_pkt(pkt)) {
disconnect_client(client, true, "client sent partial pkt in startup phase");
return false;
}
if (... | 278,553,822,929,822,730,000,000,000,000,000,000,000 | client.c | 284,183,957,477,570,960,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2015-4054 | PgBouncer before 1.5.5 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) by sending a password packet before a startup packet. | https://nvd.nist.gov/vuln/detail/CVE-2015-4054 |
160,719 | pgbouncer | 74d6e5f7de5ec736f71204b7b422af7380c19ac5 | https://github.com/pgbouncer/pgbouncer | https://github.com/pgbouncer/pgbouncer/commit/74d6e5f7de5ec736f71204b7b422af7380c19ac5 | Check if auth_user is set.
Fixes a crash if password packet appears before startup packet (#42). | 0 | static bool handle_client_startup(PgSocket *client, PktHdr *pkt)
{
const char *passwd;
const uint8_t *key;
bool ok;
SBuf *sbuf = &client->sbuf;
/* don't tolerate partial packets */
if (incomplete_pkt(pkt)) {
disconnect_client(client, true, "client sent partial pkt in startup phase");
return false;
}
if (... | 114,851,079,844,768,040,000,000,000,000,000,000,000 | client.c | 231,648,386,052,178,430,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2015-4054 | PgBouncer before 1.5.5 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) by sending a password packet before a startup packet. | https://nvd.nist.gov/vuln/detail/CVE-2015-4054 |
3,431 | linux | 60a2362f769cf549dc466134efe71c8bf9fbaaba | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/60a2362f769cf549dc466134efe71c8bf9fbaaba | regulator: core: Fix regualtor_ena_gpio_free not to access pin after freeing
After freeing pin from regulator_ena_gpio_free, loop can access
the pin. So this patch fixes not to access pin after freeing.
Signed-off-by: Seung-Woo Kim <sw0312.kim@samsung.com>
Signed-off-by: Mark Brown <broonie@kernel.org> | 1 | static void regulator_ena_gpio_free(struct regulator_dev *rdev)
{
struct regulator_enable_gpio *pin, *n;
if (!rdev->ena_pin)
return;
/* Free the GPIO only in case of no use */
list_for_each_entry_safe(pin, n, ®ulator_ena_gpio_list, list) {
if (pin->gpiod == rdev->ena_pin->gpiod) {
if (pin->request_count... | 153,964,382,604,737,770,000,000,000,000,000,000,000 | None | null | [
"CWE-416"
] | CVE-2014-9940 | The regulator_ena_gpio_free function in drivers/regulator/core.c in the Linux kernel before 3.19 allows local users to gain privileges or cause a denial of service (use-after-free) via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2014-9940 |
160,724 | linux | 60a2362f769cf549dc466134efe71c8bf9fbaaba | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/60a2362f769cf549dc466134efe71c8bf9fbaaba | regulator: core: Fix regualtor_ena_gpio_free not to access pin after freeing
After freeing pin from regulator_ena_gpio_free, loop can access
the pin. So this patch fixes not to access pin after freeing.
Signed-off-by: Seung-Woo Kim <sw0312.kim@samsung.com>
Signed-off-by: Mark Brown <broonie@kernel.org> | 0 | static void regulator_ena_gpio_free(struct regulator_dev *rdev)
{
struct regulator_enable_gpio *pin, *n;
if (!rdev->ena_pin)
return;
/* Free the GPIO only in case of no use */
list_for_each_entry_safe(pin, n, ®ulator_ena_gpio_list, list) {
if (pin->gpiod == rdev->ena_pin->gpiod) {
if (pin->request_count... | 51,396,502,597,491,960,000,000,000,000,000,000,000 | None | null | [
"CWE-416"
] | CVE-2014-9940 | The regulator_ena_gpio_free function in drivers/regulator/core.c in the Linux kernel before 3.19 allows local users to gain privileges or cause a denial of service (use-after-free) via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2014-9940 |
3,432 | linux | 69c433ed2ecd2d3264efd7afec4439524b319121 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/69c433ed2ecd2d3264efd7afec4439524b319121 | fs: limit filesystem stacking depth
Add a simple read-only counter to super_block that indicates how deep this
is in the stack of filesystems. Previously ecryptfs was the only stackable
filesystem and it explicitly disallowed multiple layers of itself.
Overlayfs, however, can be stacked recursively and also may be s... | 1 | static struct dentry *ecryptfs_mount(struct file_system_type *fs_type, int flags,
const char *dev_name, void *raw_data)
{
struct super_block *s;
struct ecryptfs_sb_info *sbi;
struct ecryptfs_dentry_info *root_info;
const char *err = "Getting sb failed";
struct inode *inode;
struct path path;
uid_t check_ruid;... | 206,875,532,923,431,400,000,000,000,000,000,000,000 | main.c | 105,638,946,343,753,250,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2014-9922 | The eCryptfs subsystem in the Linux kernel before 3.18 allows local users to gain privileges via a large filesystem stack that includes an overlayfs layer, related to fs/ecryptfs/main.c and fs/overlayfs/super.c. | https://nvd.nist.gov/vuln/detail/CVE-2014-9922 |
160,725 | linux | 69c433ed2ecd2d3264efd7afec4439524b319121 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/69c433ed2ecd2d3264efd7afec4439524b319121 | fs: limit filesystem stacking depth
Add a simple read-only counter to super_block that indicates how deep this
is in the stack of filesystems. Previously ecryptfs was the only stackable
filesystem and it explicitly disallowed multiple layers of itself.
Overlayfs, however, can be stacked recursively and also may be s... | 0 | static struct dentry *ecryptfs_mount(struct file_system_type *fs_type, int flags,
const char *dev_name, void *raw_data)
{
struct super_block *s;
struct ecryptfs_sb_info *sbi;
struct ecryptfs_dentry_info *root_info;
const char *err = "Getting sb failed";
struct inode *inode;
struct path path;
uid_t check_ruid;... | 7,752,379,790,910,423,000,000,000,000,000,000,000 | main.c | 24,751,742,485,860,580,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2014-9922 | The eCryptfs subsystem in the Linux kernel before 3.18 allows local users to gain privileges via a large filesystem stack that includes an overlayfs layer, related to fs/ecryptfs/main.c and fs/overlayfs/super.c. | https://nvd.nist.gov/vuln/detail/CVE-2014-9922 |
3,433 | linux | 69c433ed2ecd2d3264efd7afec4439524b319121 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/69c433ed2ecd2d3264efd7afec4439524b319121 | fs: limit filesystem stacking depth
Add a simple read-only counter to super_block that indicates how deep this
is in the stack of filesystems. Previously ecryptfs was the only stackable
filesystem and it explicitly disallowed multiple layers of itself.
Overlayfs, however, can be stacked recursively and also may be s... | 1 | static int ovl_fill_super(struct super_block *sb, void *data, int silent)
{
struct path lowerpath;
struct path upperpath;
struct path workpath;
struct inode *root_inode;
struct dentry *root_dentry;
struct ovl_entry *oe;
struct ovl_fs *ufs;
struct kstatfs statfs;
int err;
err = -ENOMEM;
ufs = kzalloc(sizeof(... | 242,173,763,105,780,330,000,000,000,000,000,000,000 | super.c | 28,355,160,904,642,360,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2014-9922 | The eCryptfs subsystem in the Linux kernel before 3.18 allows local users to gain privileges via a large filesystem stack that includes an overlayfs layer, related to fs/ecryptfs/main.c and fs/overlayfs/super.c. | https://nvd.nist.gov/vuln/detail/CVE-2014-9922 |
160,726 | linux | 69c433ed2ecd2d3264efd7afec4439524b319121 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/69c433ed2ecd2d3264efd7afec4439524b319121 | fs: limit filesystem stacking depth
Add a simple read-only counter to super_block that indicates how deep this
is in the stack of filesystems. Previously ecryptfs was the only stackable
filesystem and it explicitly disallowed multiple layers of itself.
Overlayfs, however, can be stacked recursively and also may be s... | 0 | static int ovl_fill_super(struct super_block *sb, void *data, int silent)
{
struct path lowerpath;
struct path upperpath;
struct path workpath;
struct inode *root_inode;
struct dentry *root_dentry;
struct ovl_entry *oe;
struct ovl_fs *ufs;
struct kstatfs statfs;
int err;
err = -ENOMEM;
ufs = kzalloc(sizeof(... | 146,514,829,432,940,000,000,000,000,000,000,000,000 | super.c | 172,839,926,408,435,900,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2014-9922 | The eCryptfs subsystem in the Linux kernel before 3.18 allows local users to gain privileges via a large filesystem stack that includes an overlayfs layer, related to fs/ecryptfs/main.c and fs/overlayfs/super.c. | https://nvd.nist.gov/vuln/detail/CVE-2014-9922 |
3,434 | linux | 9709674e68646cee5a24e3000b3558d25412203a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/9709674e68646cee5a24e3000b3558d25412203a | ipv4: fix a race in ip4_datagram_release_cb()
Alexey gave a AddressSanitizer[1] report that finally gave a good hint
at where was the origin of various problems already reported by Dormando
in the past [2]
Problem comes from the fact that UDP can have a lockless TX path, and
concurrent threads can manipulate sk_dst_c... | 1 | void ip4_datagram_release_cb(struct sock *sk)
{
const struct inet_sock *inet = inet_sk(sk);
const struct ip_options_rcu *inet_opt;
__be32 daddr = inet->inet_daddr;
struct flowi4 fl4;
struct rtable *rt;
if (! __sk_dst_get(sk) || __sk_dst_check(sk, 0))
return;
rcu_read_lock();
inet_opt = rcu_derefere... | 311,398,138,099,162,900,000,000,000,000,000,000,000 | datagram.c | 337,751,027,115,515,430,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2014-9914 | Race condition in the ip4_datagram_release_cb function in net/ipv4/datagram.c in the Linux kernel before 3.15.2 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging incorrect expectations about locking during multithreaded access to internal data structures for IPv4 UDP sock... | https://nvd.nist.gov/vuln/detail/CVE-2014-9914 |
160,727 | linux | 9709674e68646cee5a24e3000b3558d25412203a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/9709674e68646cee5a24e3000b3558d25412203a | ipv4: fix a race in ip4_datagram_release_cb()
Alexey gave a AddressSanitizer[1] report that finally gave a good hint
at where was the origin of various problems already reported by Dormando
in the past [2]
Problem comes from the fact that UDP can have a lockless TX path, and
concurrent threads can manipulate sk_dst_c... | 0 | void ip4_datagram_release_cb(struct sock *sk)
{
const struct inet_sock *inet = inet_sk(sk);
const struct ip_options_rcu *inet_opt;
__be32 daddr = inet->inet_daddr;
struct dst_entry *dst;
struct flowi4 fl4;
struct rtable *rt;
rcu_read_lock();
dst = __sk_dst_get(sk);
if (!dst || !dst->obsolete || dst-... | 316,663,150,310,531,970,000,000,000,000,000,000,000 | datagram.c | 325,452,411,980,208,270,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2014-9914 | Race condition in the ip4_datagram_release_cb function in net/ipv4/datagram.c in the Linux kernel before 3.15.2 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging incorrect expectations about locking during multithreaded access to internal data structures for IPv4 UDP sock... | https://nvd.nist.gov/vuln/detail/CVE-2014-9914 |
3,444 | rawstudio | 9c2cd3c93c05d009a91d84eedbb85873b0cb505d | https://github.com/rawstudio/rawstudio | https://github.com/rawstudio/rawstudio/commit/9c2cd3c93c05d009a91d84eedbb85873b0cb505d | Fixes insecure use of temporary file (CVE-2014-4978). | 1 | rs_filter_graph(RSFilter *filter)
{
g_return_if_fail(RS_IS_FILTER(filter));
GString *str = g_string_new("digraph G {\n");
rs_filter_graph_helper(str, filter);
g_string_append_printf(str, "}\n");
g_file_set_contents("/tmp/rs-filter-graph", str->str, str->len, NULL);
if (0 != system("dot -Tpng >/tmp/rs-... | 20,000,396,220,013,242,000,000,000,000,000,000,000 | rs-filter.c | 248,284,536,212,493,870,000,000,000,000,000,000,000 | [
"CWE-59"
] | CVE-2014-4978 | The rs_filter_graph function in librawstudio/rs-filter.c in rawstudio might allow local users to truncate arbitrary files via a symlink attack on (1) /tmp/rs-filter-graph.png or (2) /tmp/rs-filter-graph. | https://nvd.nist.gov/vuln/detail/CVE-2014-4978 |
160,732 | rawstudio | 9c2cd3c93c05d009a91d84eedbb85873b0cb505d | https://github.com/rawstudio/rawstudio | https://github.com/rawstudio/rawstudio/commit/9c2cd3c93c05d009a91d84eedbb85873b0cb505d | Fixes insecure use of temporary file (CVE-2014-4978). | 0 | rs_filter_graph(RSFilter *filter)
{
g_return_if_fail(RS_IS_FILTER(filter));
gchar *dot_filename;
gchar *png_filename;
gchar *command_line;
GString *str = g_string_new("digraph G {\n");
rs_filter_graph_helper(str, filter);
g_string_append_printf(str, "}\n");
/* Here we would like to use g_mkdtemp(), ... | 286,000,577,759,232,640,000,000,000,000,000,000,000 | rs-filter.c | 93,914,794,328,813,090,000,000,000,000,000,000,000 | [
"CWE-59"
] | CVE-2014-4978 | The rs_filter_graph function in librawstudio/rs-filter.c in rawstudio might allow local users to truncate arbitrary files via a symlink attack on (1) /tmp/rs-filter-graph.png or (2) /tmp/rs-filter-graph. | https://nvd.nist.gov/vuln/detail/CVE-2014-4978 |
3,449 | FFmpeg | 5aba5b89d0b1d73164d3b81764828bb8b20ff32a | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/5aba5b89d0b1d73164d3b81764828bb8b20ff32a | avcodec/mpeg4videodec: Check for bitstream end in read_quant_matrix_ext()
Fixes: out of array read
Fixes: asff-crash-0e53d0dc491dfdd507530b66562812fbd4c36678
Found-by: Paul Ch <paulcher@icloud.com>
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 1 | static void read_quant_matrix_ext(MpegEncContext *s, GetBitContext *gb)
{
int i, j, v;
if (get_bits1(gb)) {
/* intra_quantiser_matrix */
for (i = 0; i < 64; i++) {
v = get_bits(gb, 8);
j = s->idsp.idct_permutation[ff_zigzag_direct[i]];
s->intra_matrix[... | 213,473,736,044,128,240,000,000,000,000,000,000,000 | mpeg4videodec.c | 190,961,130,653,831,770,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-1999015 | FFmpeg before commit 5aba5b89d0b1d73164d3b81764828bb8b20ff32a contains an out of array read vulnerability in ASF_F format demuxer that can result in heap memory reading. This attack appear to be exploitable via specially crafted ASF file that has to provided as input. This vulnerability appears to have been fixed in 5a... | https://nvd.nist.gov/vuln/detail/CVE-2018-1999015 |
160,737 | FFmpeg | 5aba5b89d0b1d73164d3b81764828bb8b20ff32a | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/5aba5b89d0b1d73164d3b81764828bb8b20ff32a | avcodec/mpeg4videodec: Check for bitstream end in read_quant_matrix_ext()
Fixes: out of array read
Fixes: asff-crash-0e53d0dc491dfdd507530b66562812fbd4c36678
Found-by: Paul Ch <paulcher@icloud.com>
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 0 | static void read_quant_matrix_ext(MpegEncContext *s, GetBitContext *gb)
static int read_quant_matrix_ext(MpegEncContext *s, GetBitContext *gb)
{
int i, j, v;
if (get_bits1(gb)) {
if (get_bits_left(gb) < 64*8)
return AVERROR_INVALIDDATA;
/* intra_quantiser_matrix */
for... | 171,454,744,360,729,050,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2018-1999015 | FFmpeg before commit 5aba5b89d0b1d73164d3b81764828bb8b20ff32a contains an out of array read vulnerability in ASF_F format demuxer that can result in heap memory reading. This attack appear to be exploitable via specially crafted ASF file that has to provided as input. This vulnerability appears to have been fixed in 5a... | https://nvd.nist.gov/vuln/detail/CVE-2018-1999015 |
3,450 | FFmpeg | a7e032a277452366771951e29fd0bf2bd5c029f0 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/a7e032a277452366771951e29fd0bf2bd5c029f0 | avformat/rmdec: Do not pass mime type in rm_read_multi() to ff_rm_read_mdpr_codecdata()
Fixes: use after free()
Fixes: rmdec-crash-ffe85b4cab1597d1cfea6955705e53f1f5c8a362
Found-by: Paul Ch <paulcher@icloud.com>
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 1 | static int rm_read_multi(AVFormatContext *s, AVIOContext *pb,
AVStream *st, char *mime)
{
int number_of_streams = avio_rb16(pb);
int number_of_mdpr;
int i, ret;
unsigned size2;
for (i = 0; i<number_of_streams; i++)
avio_rb16(pb);
number_of_mdpr = avio_rb16(pb);
... | 260,453,905,446,702,300,000,000,000,000,000,000,000 | rmdec.c | 313,294,444,812,730,200,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2018-1999013 | FFmpeg before commit a7e032a277452366771951e29fd0bf2bd5c029f0 contains a use-after-free vulnerability in the realmedia demuxer that can result in vulnerability allows attacker to read heap memory. This attack appear to be exploitable via specially crafted RM file has to be provided as input. This vulnerability appears ... | https://nvd.nist.gov/vuln/detail/CVE-2018-1999013 |
160,738 | FFmpeg | a7e032a277452366771951e29fd0bf2bd5c029f0 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/a7e032a277452366771951e29fd0bf2bd5c029f0 | avformat/rmdec: Do not pass mime type in rm_read_multi() to ff_rm_read_mdpr_codecdata()
Fixes: use after free()
Fixes: rmdec-crash-ffe85b4cab1597d1cfea6955705e53f1f5c8a362
Found-by: Paul Ch <paulcher@icloud.com>
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 0 | static int rm_read_multi(AVFormatContext *s, AVIOContext *pb,
AVStream *st, char *mime)
{
int number_of_streams = avio_rb16(pb);
int number_of_mdpr;
int i, ret;
unsigned size2;
for (i = 0; i<number_of_streams; i++)
avio_rb16(pb);
number_of_mdpr = avio_rb16(pb);
... | 59,496,157,898,063,640,000,000,000,000,000,000,000 | None | null | [
"CWE-416"
] | CVE-2018-1999013 | FFmpeg before commit a7e032a277452366771951e29fd0bf2bd5c029f0 contains a use-after-free vulnerability in the realmedia demuxer that can result in vulnerability allows attacker to read heap memory. This attack appear to be exploitable via specially crafted RM file has to be provided as input. This vulnerability appears ... | https://nvd.nist.gov/vuln/detail/CVE-2018-1999013 |
3,451 | FFmpeg | 9807d3976be0e92e4ece3b4b1701be894cd7c2e1 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/9807d3976be0e92e4ece3b4b1701be894cd7c2e1 | avformat/pva: Check for EOF before retrying in read_part_of_packet()
Fixes: Infinite loop
Fixes: pva-4b1835dbc2027bf3c567005dcc78e85199240d06
Found-by: Paul Ch <paulcher@icloud.com>
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 1 | static int read_part_of_packet(AVFormatContext *s, int64_t *pts,
int *len, int *strid, int read_packet) {
AVIOContext *pb = s->pb;
PVAContext *pvactx = s->priv_data;
int syncword, streamid, reserved, flags, length, pts_flag;
int64_t pva_pts = AV_NOPTS_VALUE, startpos;
... | 82,750,978,880,669,140,000,000,000,000,000,000,000 | None | null | [
"CWE-835"
] | CVE-2018-1999012 | FFmpeg before commit 9807d3976be0e92e4ece3b4b1701be894cd7c2e1 contains a CWE-835: Infinite loop vulnerability in pva format demuxer that can result in a Vulnerability that allows attackers to consume excessive amount of resources like CPU and RAM. This attack appear to be exploitable via specially crafted PVA file has ... | https://nvd.nist.gov/vuln/detail/CVE-2018-1999012 |
160,739 | FFmpeg | 9807d3976be0e92e4ece3b4b1701be894cd7c2e1 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/9807d3976be0e92e4ece3b4b1701be894cd7c2e1 | avformat/pva: Check for EOF before retrying in read_part_of_packet()
Fixes: Infinite loop
Fixes: pva-4b1835dbc2027bf3c567005dcc78e85199240d06
Found-by: Paul Ch <paulcher@icloud.com>
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 0 | static int read_part_of_packet(AVFormatContext *s, int64_t *pts,
int *len, int *strid, int read_packet) {
AVIOContext *pb = s->pb;
PVAContext *pvactx = s->priv_data;
int syncword, streamid, reserved, flags, length, pts_flag;
int64_t pva_pts = AV_NOPTS_VALUE, startpos;
... | 183,637,118,478,417,200,000,000,000,000,000,000,000 | None | null | [
"CWE-835"
] | CVE-2018-1999012 | FFmpeg before commit 9807d3976be0e92e4ece3b4b1701be894cd7c2e1 contains a CWE-835: Infinite loop vulnerability in pva format demuxer that can result in a Vulnerability that allows attackers to consume excessive amount of resources like CPU and RAM. This attack appear to be exploitable via specially crafted PVA file has ... | https://nvd.nist.gov/vuln/detail/CVE-2018-1999012 |
3,452 | FFmpeg | 2b46ebdbff1d8dec7a3d8ea280a612b91a582869 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/2b46ebdbff1d8dec7a3d8ea280a612b91a582869 | avformat/asfdec_o: Check size_bmp more fully
Fixes: integer overflow and out of array access
Fixes: asfo-crash-46080c4341572a7137a162331af77f6ded45cbd7
Found-by: Paul Ch <paulcher@icloud.com>
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 1 | static int parse_video_info(AVIOContext *pb, AVStream *st)
{
uint16_t size_asf; // ASF-specific Format Data size
uint32_t size_bmp; // BMP_HEADER-specific Format Data size
unsigned int tag;
st->codecpar->width = avio_rl32(pb);
st->codecpar->height = avio_rl32(pb);
avio_skip(pb, 1); // skip res... | 51,010,198,014,372,410,000,000,000,000,000,000,000 | asfdec_o.c | 216,306,402,722,308,640,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-1999011 | FFmpeg before commit 2b46ebdbff1d8dec7a3d8ea280a612b91a582869 contains a Buffer Overflow vulnerability in asf_o format demuxer that can result in heap-buffer-overflow that may result in remote code execution. This attack appears to be exploitable via specially crafted ASF file that has to be provided as input to FFmpeg... | https://nvd.nist.gov/vuln/detail/CVE-2018-1999011 |
160,740 | FFmpeg | 2b46ebdbff1d8dec7a3d8ea280a612b91a582869 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/2b46ebdbff1d8dec7a3d8ea280a612b91a582869 | avformat/asfdec_o: Check size_bmp more fully
Fixes: integer overflow and out of array access
Fixes: asfo-crash-46080c4341572a7137a162331af77f6ded45cbd7
Found-by: Paul Ch <paulcher@icloud.com>
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 0 | static int parse_video_info(AVIOContext *pb, AVStream *st)
{
uint16_t size_asf; // ASF-specific Format Data size
uint32_t size_bmp; // BMP_HEADER-specific Format Data size
unsigned int tag;
st->codecpar->width = avio_rl32(pb);
st->codecpar->height = avio_rl32(pb);
avio_skip(pb, 1); // skip res... | 198,656,369,714,641,800,000,000,000,000,000,000,000 | asfdec_o.c | 132,474,423,002,626,600,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-1999011 | FFmpeg before commit 2b46ebdbff1d8dec7a3d8ea280a612b91a582869 contains a Buffer Overflow vulnerability in asf_o format demuxer that can result in heap-buffer-overflow that may result in remote code execution. This attack appears to be exploitable via specially crafted ASF file that has to be provided as input to FFmpeg... | https://nvd.nist.gov/vuln/detail/CVE-2018-1999011 |
3,453 | FFmpeg | cced03dd667a5df6df8fd40d8de0bff477ee02e8 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/cced03dd667a5df6df8fd40d8de0bff477ee02e8 | avformat/mms: Add missing chunksize check
Fixes: out of array read
Fixes: mms-crash-01b6c5d85f9d9f40f4e879896103e9f5b222816a
Found-by: Paul Ch <paulcher@icloud.com>
1st hunk by Paul Ch <paulcher@icloud.com>
Tested-by: Paul Ch <paulcher@icloud.com>
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 1 | int ff_mms_asf_header_parser(MMSContext *mms)
{
uint8_t *p = mms->asf_header;
uint8_t *end;
int flags, stream_id;
mms->stream_num = 0;
if (mms->asf_header_size < sizeof(ff_asf_guid) * 2 + 22 ||
memcmp(p, ff_asf_header, sizeof(ff_asf_guid))) {
av_log(NULL, AV_LOG_ERROR,
... | 10,142,334,619,194,337,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2018-1999010 | FFmpeg before commit cced03dd667a5df6df8fd40d8de0bff477ee02e8 contains multiple out of array access vulnerabilities in the mms protocol that can result in attackers accessing out of bound data. This attack appear to be exploitable via network connectivity. This vulnerability appears to have been fixed in cced03dd667a5d... | https://nvd.nist.gov/vuln/detail/CVE-2018-1999010 |
160,741 | FFmpeg | cced03dd667a5df6df8fd40d8de0bff477ee02e8 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/cced03dd667a5df6df8fd40d8de0bff477ee02e8 | avformat/mms: Add missing chunksize check
Fixes: out of array read
Fixes: mms-crash-01b6c5d85f9d9f40f4e879896103e9f5b222816a
Found-by: Paul Ch <paulcher@icloud.com>
1st hunk by Paul Ch <paulcher@icloud.com>
Tested-by: Paul Ch <paulcher@icloud.com>
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 0 | int ff_mms_asf_header_parser(MMSContext *mms)
{
uint8_t *p = mms->asf_header;
uint8_t *end;
int flags, stream_id;
mms->stream_num = 0;
if (mms->asf_header_size < sizeof(ff_asf_guid) * 2 + 22 ||
memcmp(p, ff_asf_header, sizeof(ff_asf_guid))) {
av_log(NULL, AV_LOG_ERROR,
... | 87,268,627,983,556,500,000,000,000,000,000,000,000 | mms.c | 58,254,164,229,135,820,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-1999010 | FFmpeg before commit cced03dd667a5df6df8fd40d8de0bff477ee02e8 contains multiple out of array access vulnerabilities in the mms protocol that can result in attackers accessing out of bound data. This attack appear to be exploitable via network connectivity. This vulnerability appears to have been fixed in cced03dd667a5d... | https://nvd.nist.gov/vuln/detail/CVE-2018-1999010 |
3,454 | libarchive | 9c84b7426660c09c18cc349f6d70b5f8168b5680 | https://github.com/libarchive/libarchive | https://github.com/libarchive/libarchive/commit/9c84b7426660c09c18cc349f6d70b5f8168b5680 | warc: consume data once read
The warc decoder only used read ahead, it wouldn't actually consume
data that had previously been printed. This means that if you specify
an invalid content length, it will just reprint the same data over
and over and over again until it hits the desired length.
This means that a WARC res... | 1 | _warc_read(struct archive_read *a, const void **buf, size_t *bsz, int64_t *off)
{
struct warc_s *w = a->format->data;
const char *rab;
ssize_t nrd;
if (w->cntoff >= w->cntlen) {
eof:
/* it's our lucky day, no work, we can leave early */
*buf = NULL;
*bsz = 0U;
*off = w->cntoff + 4U/*for \r\n\r\n separator... | 335,908,245,050,720,980,000,000,000,000,000,000,000 | archive_read_support_format_warc.c | 311,131,878,398,425,230,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2018-1000880 | libarchive version commit 9693801580c0cf7c70e862d305270a16b52826a7 onwards (release v3.2.0 onwards) contains a CWE-20: Improper Input Validation vulnerability in WARC parser - libarchive/archive_read_support_format_warc.c, _warc_read() that can result in DoS - quasi-infinite run time and disk usage from tiny file. This... | https://nvd.nist.gov/vuln/detail/CVE-2018-1000880 |
160,742 | libarchive | 9c84b7426660c09c18cc349f6d70b5f8168b5680 | https://github.com/libarchive/libarchive | https://github.com/libarchive/libarchive/commit/9c84b7426660c09c18cc349f6d70b5f8168b5680 | warc: consume data once read
The warc decoder only used read ahead, it wouldn't actually consume
data that had previously been printed. This means that if you specify
an invalid content length, it will just reprint the same data over
and over and over again until it hits the desired length.
This means that a WARC res... | 0 | _warc_read(struct archive_read *a, const void **buf, size_t *bsz, int64_t *off)
{
struct warc_s *w = a->format->data;
const char *rab;
ssize_t nrd;
if (w->cntoff >= w->cntlen) {
eof:
/* it's our lucky day, no work, we can leave early */
*buf = NULL;
*bsz = 0U;
*off = w->cntoff + 4U/*for \r\n\r\n separator... | 115,976,818,761,495,420,000,000,000,000,000,000,000 | archive_read_support_format_warc.c | 15,545,914,332,046,220,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2018-1000880 | libarchive version commit 9693801580c0cf7c70e862d305270a16b52826a7 onwards (release v3.2.0 onwards) contains a CWE-20: Improper Input Validation vulnerability in WARC parser - libarchive/archive_read_support_format_warc.c, _warc_read() that can result in DoS - quasi-infinite run time and disk usage from tiny file. This... | https://nvd.nist.gov/vuln/detail/CVE-2018-1000880 |
3,455 | libarchive | 15bf44fd2c1ad0e3fd87048b3fcc90c4dcff1175 | https://github.com/libarchive/libarchive | https://github.com/libarchive/libarchive/commit/15bf44fd2c1ad0e3fd87048b3fcc90c4dcff1175 | Skip 0-length ACL fields
Currently, it is possible to create an archive that crashes bsdtar
with a malformed ACL:
Program received signal SIGSEGV, Segmentation fault.
archive_acl_from_text_l (acl=<optimised out>, text=0x7e2e92 "", want_type=<optimised out>, sc=<optimised out>) at libarchive/archive_acl.c:1726
1726 ... | 1 | archive_acl_from_text_l(struct archive_acl *acl, const char *text,
int want_type, struct archive_string_conv *sc)
{
struct {
const char *start;
const char *end;
} field[6], name;
const char *s, *st;
int numfields, fields, n, r, sol, ret;
int type, types, tag, permset, id;
size_t len;
char sep;
switch ... | 2,001,925,255,634,939,000,000,000,000,000,000,000 | archive_acl.c | 109,360,223,959,071,340,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2018-1000879 | libarchive version commit 379867ecb330b3a952fb7bfa7bffb7bbd5547205 onwards (release v3.3.0 onwards) contains a CWE-476: NULL Pointer Dereference vulnerability in ACL parser - libarchive/archive_acl.c, archive_acl_from_text_l() that can result in Crash/DoS. This attack appear to be exploitable via the victim must open a... | https://nvd.nist.gov/vuln/detail/CVE-2018-1000879 |
160,743 | libarchive | 15bf44fd2c1ad0e3fd87048b3fcc90c4dcff1175 | https://github.com/libarchive/libarchive | https://github.com/libarchive/libarchive/commit/15bf44fd2c1ad0e3fd87048b3fcc90c4dcff1175 | Skip 0-length ACL fields
Currently, it is possible to create an archive that crashes bsdtar
with a malformed ACL:
Program received signal SIGSEGV, Segmentation fault.
archive_acl_from_text_l (acl=<optimised out>, text=0x7e2e92 "", want_type=<optimised out>, sc=<optimised out>) at libarchive/archive_acl.c:1726
1726 ... | 0 | archive_acl_from_text_l(struct archive_acl *acl, const char *text,
int want_type, struct archive_string_conv *sc)
{
struct {
const char *start;
const char *end;
} field[6], name;
const char *s, *st;
int numfields, fields, n, r, sol, ret;
int type, types, tag, permset, id;
size_t len;
char sep;
switch ... | 280,170,834,845,320,550,000,000,000,000,000,000,000 | archive_acl.c | 129,044,179,870,758,680,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2018-1000879 | libarchive version commit 379867ecb330b3a952fb7bfa7bffb7bbd5547205 onwards (release v3.3.0 onwards) contains a CWE-476: NULL Pointer Dereference vulnerability in ACL parser - libarchive/archive_acl.c, archive_acl_from_text_l() that can result in Crash/DoS. This attack appear to be exploitable via the victim must open a... | https://nvd.nist.gov/vuln/detail/CVE-2018-1000879 |
3,460 | FreeRDP | baee520e3dd9be6511c45a14c5f5e77784de1471 | https://github.com/FreeRDP/FreeRDP | https://github.com/FreeRDP/FreeRDP/commit/baee520e3dd9be6511c45a14c5f5e77784de1471 | Fix for #4866: Added additional length checks | 1 | static UINT drdynvc_process_capability_request(drdynvcPlugin* drdynvc, int Sp,
int cbChId, wStream* s)
{
UINT status;
if (!drdynvc)
return CHANNEL_RC_BAD_INIT_HANDLE;
WLog_Print(drdynvc->log, WLOG_TRACE, "capability_request Sp=%d cbChId=%d", Sp, cbChId);
Stream_Seek(s, 1); /* pad */
Stream_Read_U... | 297,380,158,017,412,500,000,000,000,000,000,000,000 | drdynvc_main.c | 119,867,415,456,564,860,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-1000852 | FreeRDP FreeRDP 2.0.0-rc3 released version before commit 205c612820dac644d665b5bb1cdf437dc5ca01e3 contains a Other/Unknown vulnerability in channels/drdynvc/client/drdynvc_main.c, drdynvc_process_capability_request that can result in The RDP server can read the client's memory.. This attack appear to be exploitable via... | https://nvd.nist.gov/vuln/detail/CVE-2018-1000852 |
160,747 | FreeRDP | baee520e3dd9be6511c45a14c5f5e77784de1471 | https://github.com/FreeRDP/FreeRDP | https://github.com/FreeRDP/FreeRDP/commit/baee520e3dd9be6511c45a14c5f5e77784de1471 | Fix for #4866: Added additional length checks | 0 | static UINT drdynvc_process_capability_request(drdynvcPlugin* drdynvc, int Sp,
int cbChId, wStream* s)
{
UINT status;
if (!drdynvc)
return CHANNEL_RC_BAD_INIT_HANDLE;
if (Stream_GetRemainingLength(s) < 3)
return ERROR_INVALID_DATA;
WLog_Print(drdynvc->log, WLOG_TRACE, "capability_request Sp=%d cb... | 92,932,177,092,908,920,000,000,000,000,000,000,000 | drdynvc_main.c | 100,953,048,662,456,420,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-1000852 | FreeRDP FreeRDP 2.0.0-rc3 released version before commit 205c612820dac644d665b5bb1cdf437dc5ca01e3 contains a Other/Unknown vulnerability in channels/drdynvc/client/drdynvc_main.c, drdynvc_process_capability_request that can result in The RDP server can read the client's memory.. This attack appear to be exploitable via... | https://nvd.nist.gov/vuln/detail/CVE-2018-1000852 |
3,467 | minisphere | 252c1ca184cb38e1acb917aa0e451c5f08519996 | https://github.com/fatcerberus/minisphere | https://github.com/fatcerberus/minisphere/commit/252c1ca184cb38e1acb917aa0e451c5f08519996 | Fix integer overflow in layer_resize in map_engine.c (#268)
* Fix integer overflow in layer_resize in map_engine.c
There's a buffer overflow bug in the function layer_resize. It allocates
a buffer `tilemap` with size `x_size * y_size * sizeof(struct map_tile)`.
But it didn't check for integer overflow, so if x_size a... | 1 | layer_resize(int layer, int x_size, int y_size)
{
int old_height;
int old_width;
struct map_tile* tile;
int tile_width;
int tile_height;
struct map_tile* tilemap;
struct map_trigger* trigger;
struct map_zone* zone;
int x, y, i;
o... | 25,690,879,642,748,460,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2018-1000524 | miniSphere version 5.2.9 and earlier contains a Integer Overflow vulnerability in layer_resize() function in map_engine.c that can result in remote denial of service. This attack appear to be exploitable via the victim must load a specially-crafted map which calls SetLayerSize in its entry script. This vulnerability ap... | https://nvd.nist.gov/vuln/detail/CVE-2018-1000524 |
160,754 | minisphere | 252c1ca184cb38e1acb917aa0e451c5f08519996 | https://github.com/fatcerberus/minisphere | https://github.com/fatcerberus/minisphere/commit/252c1ca184cb38e1acb917aa0e451c5f08519996 | Fix integer overflow in layer_resize in map_engine.c (#268)
* Fix integer overflow in layer_resize in map_engine.c
There's a buffer overflow bug in the function layer_resize. It allocates
a buffer `tilemap` with size `x_size * y_size * sizeof(struct map_tile)`.
But it didn't check for integer overflow, so if x_size a... | 0 | layer_resize(int layer, int x_size, int y_size)
{
int old_height;
int old_width;
struct map_tile* tile;
int tile_width;
int tile_height;
struct map_tile* tilemap;
struct map_trigger* trigger;
struct map_zone* zone;
size_t ... | 52,192,001,264,543,390,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2018-1000524 | miniSphere version 5.2.9 and earlier contains a Integer Overflow vulnerability in layer_resize() function in map_engine.c that can result in remote denial of service. This attack appear to be exploitable via the victim must load a specially-crafted map which calls SetLayerSize in its entry script. This vulnerability ap... | https://nvd.nist.gov/vuln/detail/CVE-2018-1000524 |
3,469 | memcached | a8c4a82787b8b6c256d61bd5c42fb7f92d1bae00 | https://github.com/memcached/memcached | https://github.com/memcached/memcached/commit/a8c4a82787b8b6c256d61bd5c42fb7f92d1bae00 | Don't overflow item refcount on get
Counts as a miss if the refcount is too high. ASCII multigets are the only
time refcounts can be held for so long.
doing a dirty read of refcount. is aligned.
trying to avoid adding an extra refcount branch for all calls of item_get due
to performance. might be able to move it in ... | 1 | static inline void process_get_command(conn *c, token_t *tokens, size_t ntokens, bool return_cas) {
char *key;
size_t nkey;
int i = 0;
item *it;
token_t *key_token = &tokens[KEY_TOKEN];
char *suffix;
assert(c != NULL);
do {
while(key_token->length != 0) {
key = ke... | 185,526,984,390,699,900,000,000,000,000,000,000,000 | memcached.c | 302,848,843,381,355,740,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2018-1000127 | memcached version prior to 1.4.37 contains an Integer Overflow vulnerability in items.c:item_free() that can result in data corruption and deadlocks due to items existing in hash table being reused from free list. This attack appear to be exploitable via network connectivity to the memcached service. This vulnerability... | https://nvd.nist.gov/vuln/detail/CVE-2018-1000127 |
160,756 | memcached | a8c4a82787b8b6c256d61bd5c42fb7f92d1bae00 | https://github.com/memcached/memcached | https://github.com/memcached/memcached/commit/a8c4a82787b8b6c256d61bd5c42fb7f92d1bae00 | Don't overflow item refcount on get
Counts as a miss if the refcount is too high. ASCII multigets are the only
time refcounts can be held for so long.
doing a dirty read of refcount. is aligned.
trying to avoid adding an extra refcount branch for all calls of item_get due
to performance. might be able to move it in ... | 0 | static inline void process_get_command(conn *c, token_t *tokens, size_t ntokens, bool return_cas) {
char *key;
size_t nkey;
int i = 0;
item *it;
token_t *key_token = &tokens[KEY_TOKEN];
char *suffix;
assert(c != NULL);
do {
while(key_token->length != 0) {
key = ke... | 219,291,383,614,045,600,000,000,000,000,000,000,000 | memcached.c | 131,507,844,729,028,670,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2018-1000127 | memcached version prior to 1.4.37 contains an Integer Overflow vulnerability in items.c:item_free() that can result in data corruption and deadlocks due to items existing in hash table being reused from free list. This attack appear to be exploitable via network connectivity to the memcached service. This vulnerability... | https://nvd.nist.gov/vuln/detail/CVE-2018-1000127 |
3,476 | libxsmm | 151481489192e6d1997f8bde52c5c425ea41741d | https://github.com/hfp/libxsmm | https://github.com/hfp/libxsmm/commit/151481489192e6d1997f8bde52c5c425ea41741d | Issue #287: made CSR/CSC readers more robust against invalid input (case #1). | 1 | void libxsmm_sparse_csc_reader( libxsmm_generated_code* io_generated_code,
const char* i_csc_file_in,
unsigned int** o_row_idx,
unsigned int** o_column_idx,
doubl... | 58,824,011,372,759,270,000,000,000,000,000,000,000 | generator_spgemm_csc_reader.c | 118,932,308,961,341,520,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-20542 | There is a heap-based buffer-overflow at generator_spgemm_csc_reader.c (function libxsmm_sparse_csc_reader) in LIBXSMM 1.10, a different vulnerability than CVE-2018-20541 (which is in a different part of the source code and is seen at a different address). | https://nvd.nist.gov/vuln/detail/CVE-2018-20542 |
160,762 | libxsmm | 151481489192e6d1997f8bde52c5c425ea41741d | https://github.com/hfp/libxsmm | https://github.com/hfp/libxsmm/commit/151481489192e6d1997f8bde52c5c425ea41741d | Issue #287: made CSR/CSC readers more robust against invalid input (case #1). | 0 | void libxsmm_sparse_csc_reader( libxsmm_generated_code* io_generated_code,
const char* i_csc_file_in,
unsigned int** o_row_idx,
unsigned int** o_column_idx,
doubl... | 300,759,623,763,847,900,000,000,000,000,000,000,000 | generator_spgemm_csc_reader.c | 172,382,550,039,566,160,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-20542 | There is a heap-based buffer-overflow at generator_spgemm_csc_reader.c (function libxsmm_sparse_csc_reader) in LIBXSMM 1.10, a different vulnerability than CVE-2018-20541 (which is in a different part of the source code and is seen at a different address). | https://nvd.nist.gov/vuln/detail/CVE-2018-20542 |
3,478 | linux | 9824dfae5741275473a23a7ed5756c7b6efacc9d | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/9824dfae5741275473a23a7ed5756c7b6efacc9d | net/appletalk: fix minor pointer leak to userspace in SIOCFINDIPDDPRT
Fields ->dev and ->next of struct ipddp_route may be copied to
userspace on the SIOCFINDIPDDPRT ioctl. This is only accessible
to CAP_NET_ADMIN though. Let's manually copy the relevant fields
instead of using memcpy().
BugLink: http://blog.infosect... | 1 | static int ipddp_ioctl(struct net_device *dev, struct ifreq *ifr, int cmd)
{
struct ipddp_route __user *rt = ifr->ifr_data;
struct ipddp_route rcp, rcp2, *rp;
if(!capable(CAP_NET_ADMIN))
return -EPERM;
if(copy_from_user(&rcp, rt, sizeof(rcp)))
return -EFAULT;
switch... | 248,089,498,899,169,800,000,000,000,000,000,000,000 | ipddp.c | 149,960,990,739,195,910,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2018-20511 | An issue was discovered in the Linux kernel before 4.18.11. The ipddp_ioctl function in drivers/net/appletalk/ipddp.c allows local users to obtain sensitive kernel address information by leveraging CAP_NET_ADMIN to read the ipddp_route dev and next fields via an SIOCFINDIPDDPRT ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2018-20511 |
160,764 | linux | 9824dfae5741275473a23a7ed5756c7b6efacc9d | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/9824dfae5741275473a23a7ed5756c7b6efacc9d | net/appletalk: fix minor pointer leak to userspace in SIOCFINDIPDDPRT
Fields ->dev and ->next of struct ipddp_route may be copied to
userspace on the SIOCFINDIPDDPRT ioctl. This is only accessible
to CAP_NET_ADMIN though. Let's manually copy the relevant fields
instead of using memcpy().
BugLink: http://blog.infosect... | 0 | static int ipddp_ioctl(struct net_device *dev, struct ifreq *ifr, int cmd)
{
struct ipddp_route __user *rt = ifr->ifr_data;
struct ipddp_route rcp, rcp2, *rp;
if(!capable(CAP_NET_ADMIN))
return -EPERM;
if(copy_from_user(&rcp, rt, sizeof(rcp)))
return -EFAULT;
switch... | 101,011,372,955,699,140,000,000,000,000,000,000,000 | ipddp.c | 193,193,809,780,971,200,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2018-20511 | An issue was discovered in the Linux kernel before 4.18.11. The ipddp_ioctl function in drivers/net/appletalk/ipddp.c allows local users to obtain sensitive kernel address information by leveraging CAP_NET_ADMIN to read the ipddp_route dev and next fields via an SIOCFINDIPDDPRT ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2018-20511 |
3,479 | ImageMagick | db0add932fb850d762b02604ca3053b7d7ab6deb | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/db0add932fb850d762b02604ca3053b7d7ab6deb | Prevent infinite loop | 1 | static Image *ReadBMPImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
BMPInfo
bmp_info;
Image
*image;
MagickBooleanType
status;
MagickOffsetType
offset,
start_position;
MemoryInfo
*pixel_info;
Quantum
index;
register Quantum
*q;
register ssize_t
i,... | 272,939,187,823,507,500,000,000,000,000,000,000,000 | bmp.c | 314,845,857,041,993,600,000,000,000,000,000,000,000 | [
"CWE-835"
] | CVE-2018-20467 | In coders/bmp.c in ImageMagick before 7.0.8-16, an input file can result in an infinite loop and hang, with high CPU and memory consumption. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2018-20467 |
160,765 | ImageMagick | db0add932fb850d762b02604ca3053b7d7ab6deb | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/db0add932fb850d762b02604ca3053b7d7ab6deb | Prevent infinite loop | 0 | static Image *ReadBMPImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
BMPInfo
bmp_info;
Image
*image;
MagickBooleanType
status;
MagickOffsetType
offset,
start_position;
MemoryInfo
*pixel_info;
Quantum
index;
register Quantum
*q;
register ssize_t
i,... | 320,469,407,266,324,500,000,000,000,000,000,000,000 | bmp.c | 124,312,222,839,230,660,000,000,000,000,000,000,000 | [
"CWE-835"
] | CVE-2018-20467 | In coders/bmp.c in ImageMagick before 7.0.8-16, an input file can result in an infinite loop and hang, with high CPU and memory consumption. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2018-20467 |
3,486 | mosquitto | 9097577b49b7fdcf45d30975976dd93808ccc0c4 | https://github.com/eclipse/mosquitto | https://github.com/eclipse/mosquitto/commit/9097577b49b7fdcf45d30975976dd93808ccc0c4 | Fix acl_file being ignore for default listener if with per_listener_settings
Close #1073. Thanks to Jef Driesen.
Bug: https://github.com/eclipse/mosquitto/issues/1073 | 1 | int config__parse_args(struct mosquitto_db *db, struct mosquitto__config *config, int argc, char *argv[])
{
int i;
int port_tmp;
for(i=1; i<argc; i++){
if(!strcmp(argv[i], "-c") || !strcmp(argv[i], "--config-file")){
if(i<argc-1){
db->config_file = argv[i+1];
if(config__read(db, config, false)){
... | 173,901,566,023,283,400,000,000,000,000,000,000,000 | conf.c | 218,142,261,545,231,700,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2018-20145 | Eclipse Mosquitto 1.5.x before 1.5.5 allows ACL bypass: if the option per_listener_settings was set to true, and the default listener was in use, and the default listener specified an acl_file, then the acl file was being ignored. | https://nvd.nist.gov/vuln/detail/CVE-2018-20145 |
160,773 | mosquitto | 9097577b49b7fdcf45d30975976dd93808ccc0c4 | https://github.com/eclipse/mosquitto | https://github.com/eclipse/mosquitto/commit/9097577b49b7fdcf45d30975976dd93808ccc0c4 | Fix acl_file being ignore for default listener if with per_listener_settings
Close #1073. Thanks to Jef Driesen.
Bug: https://github.com/eclipse/mosquitto/issues/1073 | 0 | int config__parse_args(struct mosquitto_db *db, struct mosquitto__config *config, int argc, char *argv[])
{
int i;
int port_tmp;
for(i=1; i<argc; i++){
if(!strcmp(argv[i], "-c") || !strcmp(argv[i], "--config-file")){
if(i<argc-1){
db->config_file = argv[i+1];
if(config__read(db, config, false)){
... | 155,911,273,468,250,070,000,000,000,000,000,000,000 | conf.c | 250,299,779,528,574,900,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2018-20145 | Eclipse Mosquitto 1.5.x before 1.5.5 allows ACL bypass: if the option per_listener_settings was set to true, and the default listener was in use, and the default listener specified an acl_file, then the acl file was being ignored. | https://nvd.nist.gov/vuln/detail/CVE-2018-20145 |
3,492 | linux | f43f39958beb206b53292801e216d9b8a660f087 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/f43f39958beb206b53292801e216d9b8a660f087 | crypto: user - fix leaking uninitialized memory to userspace
All bytes of the NETLINK_CRYPTO report structures must be initialized,
since they are copied to userspace. The change from strncpy() to
strlcpy() broke this. As a minimal fix, change it back.
Fixes: 4473710df1f8 ("crypto: user - Prepare for CRYPTO_MAX_ALG... | 1 | static int crypto_report_one(struct crypto_alg *alg,
struct crypto_user_alg *ualg, struct sk_buff *skb)
{
strlcpy(ualg->cru_name, alg->cra_name, sizeof(ualg->cru_name));
strlcpy(ualg->cru_driver_name, alg->cra_driver_name,
sizeof(ualg->cru_driver_name));
strlcpy(ualg->cru_module_name, module_name(alg->... | 285,899,801,669,781,700,000,000,000,000,000,000,000 | crypto_user_base.c | 192,031,452,937,307,500,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2018-19854 | An issue was discovered in the Linux kernel before 4.19.3. crypto_report_one() and related functions in crypto/crypto_user.c (the crypto user configuration API) do not fully initialize structures that are copied to userspace, potentially leaking sensitive memory to user programs. NOTE: this is a CVE-2013-2547 regressio... | https://nvd.nist.gov/vuln/detail/CVE-2018-19854 |
160,777 | linux | f43f39958beb206b53292801e216d9b8a660f087 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/f43f39958beb206b53292801e216d9b8a660f087 | crypto: user - fix leaking uninitialized memory to userspace
All bytes of the NETLINK_CRYPTO report structures must be initialized,
since they are copied to userspace. The change from strncpy() to
strlcpy() broke this. As a minimal fix, change it back.
Fixes: 4473710df1f8 ("crypto: user - Prepare for CRYPTO_MAX_ALG... | 0 | static int crypto_report_one(struct crypto_alg *alg,
struct crypto_user_alg *ualg, struct sk_buff *skb)
{
strncpy(ualg->cru_name, alg->cra_name, sizeof(ualg->cru_name));
strncpy(ualg->cru_driver_name, alg->cra_driver_name,
sizeof(ualg->cru_driver_name));
strncpy(ualg->cru_module_name, module_name(alg->... | 10,761,980,265,396,460,000,000,000,000,000,000,000 | crypto_user_base.c | 42,538,118,092,002,900,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2018-19854 | An issue was discovered in the Linux kernel before 4.19.3. crypto_report_one() and related functions in crypto/crypto_user.c (the crypto user configuration API) do not fully initialize structures that are copied to userspace, potentially leaking sensitive memory to user programs. NOTE: this is a CVE-2013-2547 regressio... | https://nvd.nist.gov/vuln/detail/CVE-2018-19854 |
3,493 | WavPack | bba5389dc598a92bdf2b297c3ea34620b6679b5b | https://github.com/dbry/WavPack | https://github.com/dbry/WavPack/commit/bba5389dc598a92bdf2b297c3ea34620b6679b5b | issue #54: fix potential out-of-bounds heap read | 1 | int WavpackVerifySingleBlock (unsigned char *buffer, int verify_checksum)
{
WavpackHeader *wphdr = (WavpackHeader *) buffer;
uint32_t checksum_passed = 0, bcount, meta_bc;
unsigned char *dp, meta_id, c1, c2;
if (strncmp (wphdr->ckID, "wvpk", 4) || wphdr->ckSize + 8 < sizeof (WavpackHeader))
ret... | 272,130,961,827,911,630,000,000,000,000,000,000,000 | open_utils.c | 309,449,084,172,843,070,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-19841 | The function WavpackVerifySingleBlock in open_utils.c in libwavpack.a in WavPack through 5.1.0 allows attackers to cause a denial-of-service (out-of-bounds read and application crash) via a crafted WavPack Lossless Audio file, as demonstrated by wvunpack. | https://nvd.nist.gov/vuln/detail/CVE-2018-19841 |
160,779 | WavPack | bba5389dc598a92bdf2b297c3ea34620b6679b5b | https://github.com/dbry/WavPack | https://github.com/dbry/WavPack/commit/bba5389dc598a92bdf2b297c3ea34620b6679b5b | issue #54: fix potential out-of-bounds heap read | 0 | int WavpackVerifySingleBlock (unsigned char *buffer, int verify_checksum)
{
WavpackHeader *wphdr = (WavpackHeader *) buffer;
uint32_t checksum_passed = 0, bcount, meta_bc;
unsigned char *dp, meta_id, c1, c2;
if (strncmp (wphdr->ckID, "wvpk", 4) || wphdr->ckSize + 8 < sizeof (WavpackHeader))
ret... | 149,541,977,340,175,770,000,000,000,000,000,000,000 | open_utils.c | 252,907,153,773,764,460,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-19841 | The function WavpackVerifySingleBlock in open_utils.c in libwavpack.a in WavPack through 5.1.0 allows attackers to cause a denial-of-service (out-of-bounds read and application crash) via a crafted WavPack Lossless Audio file, as demonstrated by wvunpack. | https://nvd.nist.gov/vuln/detail/CVE-2018-19841 |
3,495 | sleuthkit | bc04aa017c0bd297de8a3b7fc40ffc6ddddbb95d | https://github.com/sleuthkit/sleuthkit | https://github.com/sleuthkit/sleuthkit/commit/bc04aa017c0bd297de8a3b7fc40ffc6ddddbb95d | Merge pull request #1374 from JordyZomer/develop
Fix CVE-2018-19497. | 1 | hfs_cat_traverse(HFS_INFO * hfs,
TSK_HFS_BTREE_CB a_cb, void *ptr)
{
TSK_FS_INFO *fs = &(hfs->fs_info);
uint32_t cur_node; /* node id of the current node */
char *node;
uint16_t nodesize;
uint8_t is_done = 0;
tsk_error_reset();
nodesize = tsk_getu16(fs->endian, hfs->catalog_h... | 217,046,689,785,223,500,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2018-19497 | In The Sleuth Kit (TSK) through 4.6.4, hfs_cat_traverse in tsk/fs/hfs.c does not properly determine when a key length is too large, which allows attackers to cause a denial of service (SEGV on unknown address with READ memory access in a tsk_getu16 call in hfs_dir_open_meta_cb in tsk/fs/hfs_dent.c). | https://nvd.nist.gov/vuln/detail/CVE-2018-19497 |
160,782 | sleuthkit | bc04aa017c0bd297de8a3b7fc40ffc6ddddbb95d | https://github.com/sleuthkit/sleuthkit | https://github.com/sleuthkit/sleuthkit/commit/bc04aa017c0bd297de8a3b7fc40ffc6ddddbb95d | Merge pull request #1374 from JordyZomer/develop
Fix CVE-2018-19497. | 0 | hfs_cat_traverse(HFS_INFO * hfs,
TSK_HFS_BTREE_CB a_cb, void *ptr)
{
TSK_FS_INFO *fs = &(hfs->fs_info);
uint32_t cur_node; /* node id of the current node */
char *node;
uint16_t nodesize;
uint8_t is_done = 0;
tsk_error_reset();
nodesize = tsk_getu16(fs->endian, hfs->catalog_h... | 24,559,104,691,834,250,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2018-19497 | In The Sleuth Kit (TSK) through 4.6.4, hfs_cat_traverse in tsk/fs/hfs.c does not properly determine when a key length is too large, which allows attackers to cause a denial of service (SEGV on unknown address with READ memory access in a tsk_getu16 call in hfs_dir_open_meta_cb in tsk/fs/hfs_dent.c). | https://nvd.nist.gov/vuln/detail/CVE-2018-19497 |
3,496 | uriparser | f76275d4a91b28d687250525d3a0c5509bbd666f | https://github.com/uriparser/uriparser | https://github.com/uriparser/uriparser/commit/f76275d4a91b28d687250525d3a0c5509bbd666f | UriQuery.c: Catch integer overflow in ComposeQuery and ...Ex | 1 | int URI_FUNC(ComposeQueryEngine)(URI_CHAR * dest,
const URI_TYPE(QueryList) * queryList,
int maxChars, int * charsWritten, int * charsRequired,
UriBool spaceToPlus, UriBool normalizeBreaks) {
UriBool firstItem = URI_TRUE;
int ampersandLen = 0; /* increased to 1 from second item on */
URI_CHAR * write = dest;
... | 35,761,845,554,934,990,000,000,000,000,000,000,000 | UriQuery.c | 250,998,275,312,918,000,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2018-19199 | An issue was discovered in uriparser before 0.9.0. UriQuery.c allows an integer overflow via a uriComposeQuery* or uriComposeQueryEx* function because of an unchecked multiplication. | https://nvd.nist.gov/vuln/detail/CVE-2018-19199 |
160,783 | uriparser | f76275d4a91b28d687250525d3a0c5509bbd666f | https://github.com/uriparser/uriparser | https://github.com/uriparser/uriparser/commit/f76275d4a91b28d687250525d3a0c5509bbd666f | UriQuery.c: Catch integer overflow in ComposeQuery and ...Ex | 0 | int URI_FUNC(ComposeQueryEngine)(URI_CHAR * dest,
const URI_TYPE(QueryList) * queryList,
int maxChars, int * charsWritten, int * charsRequired,
UriBool spaceToPlus, UriBool normalizeBreaks) {
UriBool firstItem = URI_TRUE;
int ampersandLen = 0; /* increased to 1 from second item on */
URI_CHAR * write = dest;
... | 102,820,611,669,811,440,000,000,000,000,000,000,000 | UriQuery.c | 248,766,432,489,047,470,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2018-19199 | An issue was discovered in uriparser before 0.9.0. UriQuery.c allows an integer overflow via a uriComposeQuery* or uriComposeQueryEx* function because of an unchecked multiplication. | https://nvd.nist.gov/vuln/detail/CVE-2018-19199 |
3,497 | uriparser | 864f5d4c127def386dd5cc926ad96934b297f04e | https://github.com/uriparser/uriparser | https://github.com/uriparser/uriparser/commit/864f5d4c127def386dd5cc926ad96934b297f04e | UriQuery.c: Fix out-of-bounds-write in ComposeQuery and ...Ex
Reported by Google Autofuzz team | 1 | int URI_FUNC(ComposeQueryEngine)(URI_CHAR * dest,
const URI_TYPE(QueryList) * queryList,
int maxChars, int * charsWritten, int * charsRequired,
UriBool spaceToPlus, UriBool normalizeBreaks) {
UriBool firstItem = URI_TRUE;
int ampersandLen = 0; /* increased to 1 from second item on */
URI_CHAR * write = dest;
... | 110,870,270,092,081,400,000,000,000,000,000,000,000 | UriQuery.c | 228,924,076,332,498,600,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2018-19198 | An issue was discovered in uriparser before 0.9.0. UriQuery.c allows an out-of-bounds write via a uriComposeQuery* or uriComposeQueryEx* function because the '&' character is mishandled in certain contexts. | https://nvd.nist.gov/vuln/detail/CVE-2018-19198 |
160,784 | uriparser | 864f5d4c127def386dd5cc926ad96934b297f04e | https://github.com/uriparser/uriparser | https://github.com/uriparser/uriparser/commit/864f5d4c127def386dd5cc926ad96934b297f04e | UriQuery.c: Fix out-of-bounds-write in ComposeQuery and ...Ex
Reported by Google Autofuzz team | 0 | int URI_FUNC(ComposeQueryEngine)(URI_CHAR * dest,
const URI_TYPE(QueryList) * queryList,
int maxChars, int * charsWritten, int * charsRequired,
UriBool spaceToPlus, UriBool normalizeBreaks) {
UriBool firstItem = URI_TRUE;
int ampersandLen = 0; /* increased to 1 from second item on */
URI_CHAR * write = dest;
... | 275,676,797,792,352,340,000,000,000,000,000,000,000 | UriQuery.c | 82,019,785,952,299,370,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2018-19198 | An issue was discovered in uriparser before 0.9.0. UriQuery.c allows an out-of-bounds write via a uriComposeQuery* or uriComposeQueryEx* function because the '&' character is mishandled in certain contexts. | https://nvd.nist.gov/vuln/detail/CVE-2018-19198 |
3,499 | keepalived | f28015671a4b04785859d1b4b1327b367b6a10e9 | https://github.com/acassen/keepalived | https://github.com/acassen/keepalived/commit/f28015671a4b04785859d1b4b1327b367b6a10e9 | Fix buffer overflow in extract_status_code()
Issue #960 identified that the buffer allocated for copying the
HTTP status code could overflow if the http response was corrupted.
This commit changes the way the status code is read, avoids copying
data, and also ensures that the status code is three digits long,
is non-... | 1 | int extract_status_code(char *buffer, size_t size)
{
char *buf_code;
char *begin;
char *end = buffer + size;
size_t inc = 0;
int code;
/* Allocate the room */
buf_code = (char *)MALLOC(10);
/* Status-Code extraction */
while (buffer < end && *buffer++ != ' ') ;
begin = buffer;
while (buffer < end && *b... | 63,080,800,693,476,370,000,000,000,000,000,000,000 | html.c | 230,836,095,768,403,100,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-19115 | keepalived before 2.0.7 has a heap-based buffer overflow when parsing HTTP status codes resulting in DoS or possibly unspecified other impact, because extract_status_code in lib/html.c has no validation of the status code and instead writes an unlimited amount of data to the heap. | https://nvd.nist.gov/vuln/detail/CVE-2018-19115 |
160,786 | keepalived | f28015671a4b04785859d1b4b1327b367b6a10e9 | https://github.com/acassen/keepalived | https://github.com/acassen/keepalived/commit/f28015671a4b04785859d1b4b1327b367b6a10e9 | Fix buffer overflow in extract_status_code()
Issue #960 identified that the buffer allocated for copying the
HTTP status code could overflow if the http response was corrupted.
This commit changes the way the status code is read, avoids copying
data, and also ensures that the status code is three digits long,
is non-... | 0 | int extract_status_code(char *buffer, size_t size)
{
char *end = buffer + size;
unsigned long code;
/* Status-Code extraction */
while (buffer < end && *buffer != ' ' && *buffer != '\r')
buffer++;
buffer++;
if (buffer + 3 >= end || *buffer == ' ' || buffer[3] != ' ')
return 0;
code = strtoul(buffer, &e... | 199,892,831,451,230,800,000,000,000,000,000,000,000 | html.c | 224,425,627,547,513,030,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-19115 | keepalived before 2.0.7 has a heap-based buffer overflow when parsing HTTP status codes resulting in DoS or possibly unspecified other impact, because extract_status_code in lib/html.c has no validation of the status code and instead writes an unlimited amount of data to the heap. | https://nvd.nist.gov/vuln/detail/CVE-2018-19115 |
3,500 | lighttpd1.4 | 2105dae0f9d7a964375ce681e53cb165375f84c1 | https://github.com/lighttpd/lighttpd1.4 | https://github.com/lighttpd/lighttpd1.4/commit/2105dae0f9d7a964375ce681e53cb165375f84c1 | [mod_alias] security: potential path traversal with specific configs
Security: potential path traversal of a single directory above the alias
target with a specific mod_alias config where the alias which is matched
does not end in '/', but alias target filesystem path does end in '/'.
e.g. server.docroot = "/srv/www/... | 1 | PHYSICALPATH_FUNC(mod_alias_physical_handler) {
plugin_data *p = p_d;
int uri_len, basedir_len;
char *uri_ptr;
size_t k;
if (buffer_is_empty(con->physical.path)) return HANDLER_GO_ON;
mod_alias_patch_connection(srv, con, p);
/* not to include the tailing slash */
basedir_len = buffer_string_length(con->physi... | 56,562,215,835,898,430,000,000,000,000,000,000,000 | mod_alias.c | 99,393,277,811,407,030,000,000,000,000,000,000,000 | [
"CWE-22"
] | CVE-2018-19052 | An issue was discovered in mod_alias_physical_handler in mod_alias.c in lighttpd before 1.4.50. There is potential ../ path traversal of a single directory above an alias target, with a specific mod_alias configuration where the matched alias lacks a trailing '/' character, but the alias target filesystem path does hav... | https://nvd.nist.gov/vuln/detail/CVE-2018-19052 |
160,787 | lighttpd1.4 | 2105dae0f9d7a964375ce681e53cb165375f84c1 | https://github.com/lighttpd/lighttpd1.4 | https://github.com/lighttpd/lighttpd1.4/commit/2105dae0f9d7a964375ce681e53cb165375f84c1 | [mod_alias] security: potential path traversal with specific configs
Security: potential path traversal of a single directory above the alias
target with a specific mod_alias config where the alias which is matched
does not end in '/', but alias target filesystem path does end in '/'.
e.g. server.docroot = "/srv/www/... | 0 | PHYSICALPATH_FUNC(mod_alias_physical_handler) {
plugin_data *p = p_d;
int uri_len, basedir_len;
char *uri_ptr;
size_t k;
if (buffer_is_empty(con->physical.path)) return HANDLER_GO_ON;
mod_alias_patch_connection(srv, con, p);
/* not to include the tailing slash */
basedir_len = buffer_string_length(con->physi... | 56,507,838,194,928,160,000,000,000,000,000,000,000 | mod_alias.c | 3,521,148,212,204,517,500,000,000,000,000,000,000 | [
"CWE-22"
] | CVE-2018-19052 | An issue was discovered in mod_alias_physical_handler in mod_alias.c in lighttpd before 1.4.50. There is potential ../ path traversal of a single directory above an alias target, with a specific mod_alias configuration where the matched alias lacks a trailing '/' character, but the alias target filesystem path does hav... | https://nvd.nist.gov/vuln/detail/CVE-2018-19052 |
3,518 | linux | d2f007dbe7e4c9583eea6eb04d60001e85c6f1bd | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d2f007dbe7e4c9583eea6eb04d60001e85c6f1bd | userns: also map extents in the reverse map to kernel IDs
The current logic first clones the extent array and sorts both copies, then
maps the lower IDs of the forward mapping into the lower namespace, but
doesn't map the lower IDs of the reverse mapping.
This means that code in a nested user namespace with >5 extent... | 1 | static ssize_t map_write(struct file *file, const char __user *buf,
size_t count, loff_t *ppos,
int cap_setid,
struct uid_gid_map *map,
struct uid_gid_map *parent_map)
{
struct seq_file *seq = file->private_data;
struct user_namespace *ns = seq->private;
struct uid_gid_map new_map;
unsigned idx;
st... | 254,509,644,118,020,100,000,000,000,000,000,000,000 | user_namespace.c | 68,584,570,552,716,830,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2018-18955 | In the Linux kernel 4.15.x through 4.19.x before 4.19.2, map_write() in kernel/user_namespace.c allows privilege escalation because it mishandles nested user namespaces with more than 5 UID or GID ranges. A user who has CAP_SYS_ADMIN in an affected user namespace can bypass access controls on resources outside the name... | https://nvd.nist.gov/vuln/detail/CVE-2018-18955 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.