idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
160,917 | FFmpeg | 2aa9047486dbff12d9e040f917e5f799ed2fd78b | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/2aa9047486dbff12d9e040f917e5f799ed2fd78b | avcodec/mpeg4videodec: Check read profile before setting it
Fixes: null pointer dereference
Fixes: ffmpeg_crash_7.avi
Found-by: Thuan Pham, Marcel Böhme, Andrew Santosa and Alexandru Razvan Caciulescu with AFLSmart
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 0 | int ff_mpeg4_decode_picture_header(Mpeg4DecContext *ctx, GetBitContext *gb)
{
MpegEncContext *s = &ctx->m;
unsigned startcode, v;
int ret;
int vol = 0;
/* search next start code */
align_get_bits(gb);
if (!s->studio_profile && s->avctx->bits_per_raw_sample != 8)
s->avctx->bits_per_... | 330,188,945,297,559,940,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2018-13301 | In FFmpeg 4.0.1, due to a missing check of a profile value before setting it, the ff_mpeg4_decode_picture_header function in libavcodec/mpeg4videodec.c may trigger a NULL pointer dereference while converting a crafted AVI file to MPEG4, leading to a denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2018-13301 |
3,657 | linux | 23fcb3340d033d9f081e21e6c12c2db7eaa541d3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/23fcb3340d033d9f081e21e6c12c2db7eaa541d3 | xfs: More robust inode extent count validation
When the inode is in extent format, it can't have more extents that
fit in the inode fork. We don't currenty check this, and so this
corruption goes unnoticed by the inode verifiers. This can lead to
crashes operating on invalid in-memory structures.
Attempts to access s... | 1 | xfs_dinode_verify(
struct xfs_mount *mp,
xfs_ino_t ino,
struct xfs_dinode *dip)
{
xfs_failaddr_t fa;
uint16_t mode;
uint16_t flags;
uint64_t flags2;
uint64_t di_size;
if (dip->di_magic != cpu_to_be16(XFS_DINODE_MAGIC))
return __this_address;
/* Verify v3 integrity information first */
if (dip->di... | 274,742,324,962,726,900,000,000,000,000,000,000,000 | xfs_inode_buf.c | 103,496,325,547,574,170,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2018-13095 | An issue was discovered in fs/xfs/libxfs/xfs_inode_buf.c in the Linux kernel through 4.17.3. A denial of service (memory corruption and BUG) can occur for a corrupted xfs image upon encountering an inode that is in extent format, but has more extents than fit in the inode fork. | https://nvd.nist.gov/vuln/detail/CVE-2018-13095 |
160,920 | linux | 23fcb3340d033d9f081e21e6c12c2db7eaa541d3 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/23fcb3340d033d9f081e21e6c12c2db7eaa541d3 | xfs: More robust inode extent count validation
When the inode is in extent format, it can't have more extents that
fit in the inode fork. We don't currenty check this, and so this
corruption goes unnoticed by the inode verifiers. This can lead to
crashes operating on invalid in-memory structures.
Attempts to access s... | 0 | xfs_dinode_verify(
struct xfs_mount *mp,
xfs_ino_t ino,
struct xfs_dinode *dip)
{
xfs_failaddr_t fa;
uint16_t mode;
uint16_t flags;
uint64_t flags2;
uint64_t di_size;
if (dip->di_magic != cpu_to_be16(XFS_DINODE_MAGIC))
return __this_address;
/* Verify v3 integrity information first */
if (dip->di... | 337,413,762,145,059,170,000,000,000,000,000,000,000 | xfs_inode_buf.c | 28,431,729,147,325,600,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2018-13095 | An issue was discovered in fs/xfs/libxfs/xfs_inode_buf.c in the Linux kernel through 4.17.3. A denial of service (memory corruption and BUG) can occur for a corrupted xfs image upon encountering an inode that is in extent format, but has more extents than fit in the inode fork. | https://nvd.nist.gov/vuln/detail/CVE-2018-13095 |
3,658 | linux | bb3d48dcf86a97dc25fe9fc2c11938e19cb4399a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/bb3d48dcf86a97dc25fe9fc2c11938e19cb4399a | xfs: don't call xfs_da_shrink_inode with NULL bp
xfs_attr3_leaf_create may have errored out before instantiating a buffer,
for example if the blkno is out of range. In that case there is no work
to do to remove it, and in fact xfs_da_shrink_inode will lead to an oops
if we try.
This also seems to fix a flaw where th... | 1 | xfs_attr_shortform_to_leaf(
struct xfs_da_args *args,
struct xfs_buf **leaf_bp)
{
xfs_inode_t *dp;
xfs_attr_shortform_t *sf;
xfs_attr_sf_entry_t *sfe;
xfs_da_args_t nargs;
char *tmpbuffer;
int error, i, size;
xfs_dablk_t blkno;
struct xfs_buf *bp;
xfs_ifork_t *ifp;
trace_xfs_attr_sf_to_leaf(args);
dp = ... | 255,451,512,913,001,000,000,000,000,000,000,000,000 | xfs_attr_leaf.c | 330,567,582,969,333,100,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2018-13094 | An issue was discovered in fs/xfs/libxfs/xfs_attr_leaf.c in the Linux kernel through 4.17.3. An OOPS may occur for a corrupted xfs image after xfs_da_shrink_inode() is called with a NULL bp. | https://nvd.nist.gov/vuln/detail/CVE-2018-13094 |
160,921 | linux | bb3d48dcf86a97dc25fe9fc2c11938e19cb4399a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/bb3d48dcf86a97dc25fe9fc2c11938e19cb4399a | xfs: don't call xfs_da_shrink_inode with NULL bp
xfs_attr3_leaf_create may have errored out before instantiating a buffer,
for example if the blkno is out of range. In that case there is no work
to do to remove it, and in fact xfs_da_shrink_inode will lead to an oops
if we try.
This also seems to fix a flaw where th... | 0 | xfs_attr_shortform_to_leaf(
struct xfs_da_args *args,
struct xfs_buf **leaf_bp)
{
xfs_inode_t *dp;
xfs_attr_shortform_t *sf;
xfs_attr_sf_entry_t *sfe;
xfs_da_args_t nargs;
char *tmpbuffer;
int error, i, size;
xfs_dablk_t blkno;
struct xfs_buf *bp;
xfs_ifork_t *ifp;
trace_xfs_attr_sf_to_leaf(args);
dp = ... | 338,092,485,980,990,400,000,000,000,000,000,000,000 | xfs_attr_leaf.c | 70,383,818,540,992,050,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2018-13094 | An issue was discovered in fs/xfs/libxfs/xfs_attr_leaf.c in the Linux kernel through 4.17.3. An OOPS may occur for a corrupted xfs image after xfs_da_shrink_inode() is called with a NULL bp. | https://nvd.nist.gov/vuln/detail/CVE-2018-13094 |
3,662 | gpac | bceb03fd2be95097a7b409ea59914f332fb6bc86 | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/bceb03fd2be95097a7b409ea59914f332fb6bc86 | fixed 2 possible heap overflows (inc. #1088) | 1 | GF_Err hdlr_dump(GF_Box *a, FILE * trace)
{
GF_HandlerBox *p = (GF_HandlerBox *)a;
gf_isom_box_dump_start(a, "HandlerBox", trace);
if (p->nameUTF8 && (u32) p->nameUTF8[0] == strlen(p->nameUTF8+1)) {
fprintf(trace, "hdlrType=\"%s\" Name=\"%s\" ", gf_4cc_to_str(p->handlerType), p->nameUTF8+1);
} else {
fpri... | 20,155,211,497,845,732,000,000,000,000,000,000,000 | box_dump.c | 2,944,473,506,997,116,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-13006 | An issue was discovered in MP4Box in GPAC 0.7.1. There is a heap-based buffer over-read in the isomedia/box_dump.c function hdlr_dump. | https://nvd.nist.gov/vuln/detail/CVE-2018-13006 |
160,925 | gpac | bceb03fd2be95097a7b409ea59914f332fb6bc86 | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/bceb03fd2be95097a7b409ea59914f332fb6bc86 | fixed 2 possible heap overflows (inc. #1088) | 0 | GF_Err hdlr_dump(GF_Box *a, FILE * trace)
{
GF_HandlerBox *p = (GF_HandlerBox *)a;
gf_isom_box_dump_start(a, "HandlerBox", trace);
if (p->nameUTF8 && (u32) p->nameUTF8[0] == strlen(p->nameUTF8)-1) {
fprintf(trace, "hdlrType=\"%s\" Name=\"%s\" ", gf_4cc_to_str(p->handlerType), p->nameUTF8+1);
} else {
fpri... | 184,570,589,019,749,440,000,000,000,000,000,000,000 | box_dump.c | 239,733,804,440,765,300,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-13006 | An issue was discovered in MP4Box in GPAC 0.7.1. There is a heap-based buffer over-read in the isomedia/box_dump.c function hdlr_dump. | https://nvd.nist.gov/vuln/detail/CVE-2018-13006 |
3,680 | linux | bd23a7269834dc7c1f93e83535d16ebc44b75eba | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/bd23a7269834dc7c1f93e83535d16ebc44b75eba | virt: vbox: Only copy_from_user the request-header once
In vbg_misc_device_ioctl(), the header of the ioctl argument is copied from
the userspace pointer 'arg' and saved to the kernel object 'hdr'. Then the
'version', 'size_in', and 'size_out' fields of 'hdr' are verified.
Before this commit, after the checks a buffe... | 1 | static long vbg_misc_device_ioctl(struct file *filp, unsigned int req,
unsigned long arg)
{
struct vbg_session *session = filp->private_data;
size_t returned_size, size;
struct vbg_ioctl_hdr hdr;
bool is_vmmdev_req;
int ret = 0;
void *buf;
if (copy_from_user(&hdr, (void *)arg, sizeof(hdr)))
return -EFAU... | 3,708,566,526,586,698,000,000,000,000,000,000,000 | vboxguest_linux.c | 280,521,136,845,643,650,000,000,000,000,000,000,000 | [
"CWE-362"
] | CVE-2018-12633 | An issue was discovered in the Linux kernel through 4.17.2. vbg_misc_device_ioctl() in drivers/virt/vboxguest/vboxguest_linux.c reads the same user data twice with copy_from_user. The header part of the user data is double-fetched, and a malicious user thread can tamper with the critical variables (hdr.size_in and hdr.... | https://nvd.nist.gov/vuln/detail/CVE-2018-12633 |
160,939 | linux | bd23a7269834dc7c1f93e83535d16ebc44b75eba | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/bd23a7269834dc7c1f93e83535d16ebc44b75eba | virt: vbox: Only copy_from_user the request-header once
In vbg_misc_device_ioctl(), the header of the ioctl argument is copied from
the userspace pointer 'arg' and saved to the kernel object 'hdr'. Then the
'version', 'size_in', and 'size_out' fields of 'hdr' are verified.
Before this commit, after the checks a buffe... | 0 | static long vbg_misc_device_ioctl(struct file *filp, unsigned int req,
unsigned long arg)
{
struct vbg_session *session = filp->private_data;
size_t returned_size, size;
struct vbg_ioctl_hdr hdr;
bool is_vmmdev_req;
int ret = 0;
void *buf;
if (copy_from_user(&hdr, (void *)arg, sizeof(hdr)))
return -EFAU... | 59,630,783,945,426,040,000,000,000,000,000,000,000 | vboxguest_linux.c | 160,364,535,416,145,710,000,000,000,000,000,000,000 | [
"CWE-362"
] | CVE-2018-12633 | An issue was discovered in the Linux kernel through 4.17.2. vbg_misc_device_ioctl() in drivers/virt/vboxguest/vboxguest_linux.c reads the same user data twice with copy_from_user. The header part of the user data is double-fetched, and a malicious user thread can tamper with the critical variables (hdr.size_in and hdr.... | https://nvd.nist.gov/vuln/detail/CVE-2018-12633 |
3,681 | FFmpeg | b3332a182f8ba33a34542e4a0370f38b914ccf7d | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/b3332a182f8ba33a34542e4a0370f38b914ccf7d | avcodec/idctdsp: Transmit studio_profile to init instead of using AVCodecContext profile
These 2 fields are not always the same, it is simpler to always use the same field
for detecting studio profile
Fixes: null pointer dereference
Fixes: ffmpeg_crash_3.avi
Found-by: Thuan Pham <thuanpv@comp.nus.edu.sg>, Marcel Böh... | 1 | av_cold void ff_idctdsp_init(IDCTDSPContext *c, AVCodecContext *avctx)
{
const unsigned high_bit_depth = avctx->bits_per_raw_sample > 8;
if (avctx->lowres==1) {
c->idct_put = ff_jref_idct4_put;
c->idct_add = ff_jref_idct4_add;
c->idct = ff_j_rev_dct4;
c->perm_type = FF_ID... | 258,201,715,643,119,100,000,000,000,000,000,000,000 | idctdsp.c | 24,121,040,549,549,385,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2018-12460 | libavcodec in FFmpeg 4.0 may trigger a NULL pointer dereference if the studio profile is incorrectly detected while converting a crafted AVI file to MPEG4, leading to a denial of service, related to idctdsp.c and mpegvideo.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-12460 |
160,940 | FFmpeg | b3332a182f8ba33a34542e4a0370f38b914ccf7d | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/b3332a182f8ba33a34542e4a0370f38b914ccf7d | avcodec/idctdsp: Transmit studio_profile to init instead of using AVCodecContext profile
These 2 fields are not always the same, it is simpler to always use the same field
for detecting studio profile
Fixes: null pointer dereference
Fixes: ffmpeg_crash_3.avi
Found-by: Thuan Pham <thuanpv@comp.nus.edu.sg>, Marcel Böh... | 0 | av_cold void ff_idctdsp_init(IDCTDSPContext *c, AVCodecContext *avctx)
{
const unsigned high_bit_depth = avctx->bits_per_raw_sample > 8;
if (avctx->lowres==1) {
c->idct_put = ff_jref_idct4_put;
c->idct_add = ff_jref_idct4_add;
c->idct = ff_j_rev_dct4;
c->perm_type = FF_ID... | 173,297,010,768,907,530,000,000,000,000,000,000,000 | idctdsp.c | 159,438,465,089,233,700,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2018-12460 | libavcodec in FFmpeg 4.0 may trigger a NULL pointer dereference if the studio profile is incorrectly detected while converting a crafted AVI file to MPEG4, leading to a denial of service, related to idctdsp.c and mpegvideo.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-12460 |
3,682 | FFmpeg | b3332a182f8ba33a34542e4a0370f38b914ccf7d | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/b3332a182f8ba33a34542e4a0370f38b914ccf7d | avcodec/idctdsp: Transmit studio_profile to init instead of using AVCodecContext profile
These 2 fields are not always the same, it is simpler to always use the same field
for detecting studio profile
Fixes: null pointer dereference
Fixes: ffmpeg_crash_3.avi
Found-by: Thuan Pham <thuanpv@comp.nus.edu.sg>, Marcel Böh... | 1 | av_cold void ff_mpv_idct_init(MpegEncContext *s)
{
ff_idctdsp_init(&s->idsp, s->avctx);
/* load & permutate scantables
* note: only wmv uses different ones
*/
if (s->alternate_scan) {
ff_init_scantable(s->idsp.idct_permutation, &s->inter_scantable, ff_alternate_vertical_scan);
... | 214,617,330,672,650,500,000,000,000,000,000,000,000 | mpegvideo.c | 15,848,255,372,654,095,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2018-12460 | libavcodec in FFmpeg 4.0 may trigger a NULL pointer dereference if the studio profile is incorrectly detected while converting a crafted AVI file to MPEG4, leading to a denial of service, related to idctdsp.c and mpegvideo.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-12460 |
160,941 | FFmpeg | b3332a182f8ba33a34542e4a0370f38b914ccf7d | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/b3332a182f8ba33a34542e4a0370f38b914ccf7d | avcodec/idctdsp: Transmit studio_profile to init instead of using AVCodecContext profile
These 2 fields are not always the same, it is simpler to always use the same field
for detecting studio profile
Fixes: null pointer dereference
Fixes: ffmpeg_crash_3.avi
Found-by: Thuan Pham <thuanpv@comp.nus.edu.sg>, Marcel Böh... | 0 | av_cold void ff_mpv_idct_init(MpegEncContext *s)
{
if (s->codec_id == AV_CODEC_ID_MPEG4)
s->idsp.mpeg4_studio_profile = s->studio_profile;
ff_idctdsp_init(&s->idsp, s->avctx);
/* load & permutate scantables
* note: only wmv uses different ones
*/
if (s->alternate_scan) {
... | 300,778,856,920,530,030,000,000,000,000,000,000,000 | mpegvideo.c | 293,517,913,385,128,740,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2018-12460 | libavcodec in FFmpeg 4.0 may trigger a NULL pointer dereference if the studio profile is incorrectly detected while converting a crafted AVI file to MPEG4, leading to a denial of service, related to idctdsp.c and mpegvideo.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-12460 |
3,683 | FFmpeg | 2fc108f60f98cd00813418a8754a46476b404a3c | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/2fc108f60f98cd00813418a8754a46476b404a3c | avcodec/mpeg4videodec: Clear bits_per_raw_sample if it has originated from a previous instance
Fixes: assertion failure
Fixes: ffmpeg_crash_5.avi
Found-by: Thuan Pham <thuanpv@comp.nus.edu.sg>, Marcel Böhme, Andrew Santosa and Alexandru Razvan Caciulescu with AFLSmart
Signed-off-by: Michael Niedermayer <michael@niede... | 1 | int ff_mpeg4_decode_picture_header(Mpeg4DecContext *ctx, GetBitContext *gb)
{
MpegEncContext *s = &ctx->m;
unsigned startcode, v;
int ret;
int vol = 0;
/* search next start code */
align_get_bits(gb);
if (s->codec_tag == AV_RL32("WV1F") && show_bits(gb, 24) == 0x575630) {
skip... | 20,215,823,895,074,912,000,000,000,000,000,000,000 | mpeg4videodec.c | 139,065,503,574,081,020,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2018-12459 | An inconsistent bits-per-sample value in the ff_mpeg4_decode_picture_header function in libavcodec/mpeg4videodec.c in FFmpeg 4.0 may trigger an assertion violation while converting a crafted AVI file to MPEG4, leading to a denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2018-12459 |
160,942 | FFmpeg | 2fc108f60f98cd00813418a8754a46476b404a3c | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/2fc108f60f98cd00813418a8754a46476b404a3c | avcodec/mpeg4videodec: Clear bits_per_raw_sample if it has originated from a previous instance
Fixes: assertion failure
Fixes: ffmpeg_crash_5.avi
Found-by: Thuan Pham <thuanpv@comp.nus.edu.sg>, Marcel Böhme, Andrew Santosa and Alexandru Razvan Caciulescu with AFLSmart
Signed-off-by: Michael Niedermayer <michael@niede... | 0 | int ff_mpeg4_decode_picture_header(Mpeg4DecContext *ctx, GetBitContext *gb)
{
MpegEncContext *s = &ctx->m;
unsigned startcode, v;
int ret;
int vol = 0;
/* search next start code */
align_get_bits(gb);
// If we have not switched to studio profile than we also did not switch bps
// th... | 269,721,986,014,736,850,000,000,000,000,000,000,000 | mpeg4videodec.c | 305,756,025,983,081,440,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2018-12459 | An inconsistent bits-per-sample value in the ff_mpeg4_decode_picture_header function in libavcodec/mpeg4videodec.c in FFmpeg 4.0 may trigger an assertion violation while converting a crafted AVI file to MPEG4, leading to a denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2018-12459 |
3,687 | radare2 | 90b71c017a7fa9732fe45fd21b245ee051b1f548 | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/90b71c017a7fa9732fe45fd21b245ee051b1f548 | Fix #10293 - Use-after-free in r_anal_bb_free() | 1 | R_API void r_anal_bb_free(RAnalBlock *bb) {
if (!bb) {
return;
}
r_anal_cond_free (bb->cond);
R_FREE (bb->fingerprint);
r_anal_diff_free (bb->diff);
bb->diff = NULL;
R_FREE (bb->op_bytes);
r_anal_switch_op_free (bb->switch_op);
bb->switch_op = NULL;
bb->fingerprint = NULL;
bb->cond = NULL;
R_FREE (bb->lab... | 33,807,903,809,090,475,000,000,000,000,000,000,000 | bb.c | 272,606,549,223,286,240,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2018-12320 | There is a use after free in radare2 2.6.0 in r_anal_bb_free() in libr/anal/bb.c via a crafted Java binary file. | https://nvd.nist.gov/vuln/detail/CVE-2018-12320 |
160,948 | radare2 | 90b71c017a7fa9732fe45fd21b245ee051b1f548 | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/90b71c017a7fa9732fe45fd21b245ee051b1f548 | Fix #10293 - Use-after-free in r_anal_bb_free() | 0 | R_API void r_anal_bb_free(RAnalBlock *bb) {
if (!bb) {
return;
}
r_anal_cond_free (bb->cond);
R_FREE (bb->fingerprint);
r_anal_diff_free (bb->diff);
bb->diff = NULL;
R_FREE (bb->op_bytes);
r_anal_switch_op_free (bb->switch_op);
bb->switch_op = NULL;
bb->fingerprint = NULL;
bb->cond = NULL;
R_FREE (bb->lab... | 327,100,944,717,191,680,000,000,000,000,000,000,000 | bb.c | 110,430,317,258,022,160,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2018-12320 | There is a use after free in radare2 2.6.0 in r_anal_bb_free() in libr/anal/bb.c via a crafted Java binary file. | https://nvd.nist.gov/vuln/detail/CVE-2018-12320 |
3,688 | mruby | faa4eaf6803bd11669bc324b4c34e7162286bfa3 | https://github.com/mruby/mruby | https://github.com/mruby/mruby/commit/faa4eaf6803bd11669bc324b4c34e7162286bfa3 | `mrb_class_real()` did not work for `BasicObject`; fix #4037 | 1 | mrb_class_real(struct RClass* cl)
{
if (cl == 0)
return NULL;
while ((cl->tt == MRB_TT_SCLASS) || (cl->tt == MRB_TT_ICLASS)) {
cl = cl->super;
}
return cl;
}
| 120,395,878,351,176,830,000,000,000,000,000,000,000 | class.c | 206,993,897,454,459,300,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2018-12249 | An issue was discovered in mruby 1.4.1. There is a NULL pointer dereference in mrb_class_real because "class BasicObject" is not properly supported in class.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-12249 |
160,949 | mruby | faa4eaf6803bd11669bc324b4c34e7162286bfa3 | https://github.com/mruby/mruby | https://github.com/mruby/mruby/commit/faa4eaf6803bd11669bc324b4c34e7162286bfa3 | `mrb_class_real()` did not work for `BasicObject`; fix #4037 | 0 | mrb_class_real(struct RClass* cl)
{
if (cl == 0) return NULL;
while ((cl->tt == MRB_TT_SCLASS) || (cl->tt == MRB_TT_ICLASS)) {
cl = cl->super;
if (cl == 0) return NULL;
}
return cl;
}
| 76,603,071,541,270,450,000,000,000,000,000,000,000 | class.c | 131,428,111,265,917,550,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2018-12249 | An issue was discovered in mruby 1.4.1. There is a NULL pointer dereference in mrb_class_real because "class BasicObject" is not properly supported in class.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-12249 |
3,689 | mruby | 778500563a9f7ceba996937dc886bd8cde29b42b | https://github.com/mruby/mruby | https://github.com/mruby/mruby/commit/778500563a9f7ceba996937dc886bd8cde29b42b | Extend stack when pushing arguments that does not fit in; fix #4038 | 1 | fiber_switch(mrb_state *mrb, mrb_value self, mrb_int len, const mrb_value *a, mrb_bool resume, mrb_bool vmexec)
{
struct mrb_context *c = fiber_check(mrb, self);
struct mrb_context *old_c = mrb->c;
mrb_value value;
fiber_check_cfunc(mrb, c);
if (resume && c->status == MRB_FIBER_TRANSFERRED) {
mrb_... | 148,482,836,348,799,490,000,000,000,000,000,000,000 | fiber.c | 104,372,639,444,452,630,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-12248 | An issue was discovered in mruby 1.4.1. There is a heap-based buffer over-read associated with OP_ENTER because mrbgems/mruby-fiber/src/fiber.c does not extend the stack in cases of many arguments to fiber. | https://nvd.nist.gov/vuln/detail/CVE-2018-12248 |
160,950 | mruby | 778500563a9f7ceba996937dc886bd8cde29b42b | https://github.com/mruby/mruby | https://github.com/mruby/mruby/commit/778500563a9f7ceba996937dc886bd8cde29b42b | Extend stack when pushing arguments that does not fit in; fix #4038 | 0 | fiber_switch(mrb_state *mrb, mrb_value self, mrb_int len, const mrb_value *a, mrb_bool resume, mrb_bool vmexec)
{
struct mrb_context *c = fiber_check(mrb, self);
struct mrb_context *old_c = mrb->c;
enum mrb_fiber_state status;
mrb_value value;
fiber_check_cfunc(mrb, c);
status = c->status;
if (resu... | 301,048,262,979,747,540,000,000,000,000,000,000,000 | fiber.c | 297,765,300,280,193,800,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-12248 | An issue was discovered in mruby 1.4.1. There is a heap-based buffer over-read associated with OP_ENTER because mrbgems/mruby-fiber/src/fiber.c does not extend the stack in cases of many arguments to fiber. | https://nvd.nist.gov/vuln/detail/CVE-2018-12248 |
3,690 | mruby | 55edae0226409de25e59922807cb09acb45731a2 | https://github.com/mruby/mruby | https://github.com/mruby/mruby/commit/55edae0226409de25e59922807cb09acb45731a2 | Allow `Object#clone` to copy frozen status only; fix #4036
Copying all flags from the original object may overwrite the clone's
flags e.g. the embedded flag. | 1 | mrb_obj_clone(mrb_state *mrb, mrb_value self)
{
struct RObject *p;
mrb_value clone;
if (mrb_immediate_p(self)) {
mrb_raisef(mrb, E_TYPE_ERROR, "can't clone %S", self);
}
if (mrb_type(self) == MRB_TT_SCLASS) {
mrb_raise(mrb, E_TYPE_ERROR, "can't clone singleton class");
}
p = (struct RObject*)mrb_... | 229,363,253,371,945,330,000,000,000,000,000,000,000 | kernel.c | 163,099,176,507,490,390,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2018-12247 | An issue was discovered in mruby 1.4.1. There is a NULL pointer dereference in mrb_class, related to certain .clone usage, because mrb_obj_clone in kernel.c copies flags other than the MRB_FLAG_IS_FROZEN flag (e.g., the embedded flag). | https://nvd.nist.gov/vuln/detail/CVE-2018-12247 |
160,951 | mruby | 55edae0226409de25e59922807cb09acb45731a2 | https://github.com/mruby/mruby | https://github.com/mruby/mruby/commit/55edae0226409de25e59922807cb09acb45731a2 | Allow `Object#clone` to copy frozen status only; fix #4036
Copying all flags from the original object may overwrite the clone's
flags e.g. the embedded flag. | 0 | mrb_obj_clone(mrb_state *mrb, mrb_value self)
{
struct RObject *p;
mrb_value clone;
if (mrb_immediate_p(self)) {
mrb_raisef(mrb, E_TYPE_ERROR, "can't clone %S", self);
}
if (mrb_type(self) == MRB_TT_SCLASS) {
mrb_raise(mrb, E_TYPE_ERROR, "can't clone singleton class");
}
p = (struct RObject*)mrb_... | 130,616,005,710,286,650,000,000,000,000,000,000,000 | kernel.c | 93,925,154,757,050,350,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2018-12247 | An issue was discovered in mruby 1.4.1. There is a NULL pointer dereference in mrb_class, related to certain .clone usage, because mrb_obj_clone in kernel.c copies flags other than the MRB_FLAG_IS_FROZEN flag (e.g., the embedded flag). | https://nvd.nist.gov/vuln/detail/CVE-2018-12247 |
3,691 | linux | 6d8c50dcb029872b298eea68cc6209c866fd3e14 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6d8c50dcb029872b298eea68cc6209c866fd3e14 | socket: close race condition between sock_close() and sockfs_setattr()
fchownat() doesn't even hold refcnt of fd until it figures out
fd is really needed (otherwise is ignored) and releases it after
it resolves the path. This means sock_close() could race with
sockfs_setattr(), which leads to a NULL pointer dereferenc... | 1 | static int sock_close(struct inode *inode, struct file *filp)
{
sock_release(SOCKET_I(inode));
return 0;
}
| 84,494,788,491,717,655,000,000,000,000,000,000,000 | socket.c | 177,755,458,975,155,360,000,000,000,000,000,000,000 | [
"CWE-362"
] | CVE-2018-12232 | In net/socket.c in the Linux kernel through 4.17.1, there is a race condition between fchownat and close in cases where they target the same socket file descriptor, related to the sock_close and sockfs_setattr functions. fchownat does not increment the file descriptor reference count, which allows close to set the sock... | https://nvd.nist.gov/vuln/detail/CVE-2018-12232 |
160,952 | linux | 6d8c50dcb029872b298eea68cc6209c866fd3e14 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6d8c50dcb029872b298eea68cc6209c866fd3e14 | socket: close race condition between sock_close() and sockfs_setattr()
fchownat() doesn't even hold refcnt of fd until it figures out
fd is really needed (otherwise is ignored) and releases it after
it resolves the path. This means sock_close() could race with
sockfs_setattr(), which leads to a NULL pointer dereferenc... | 0 | static int sock_close(struct inode *inode, struct file *filp)
{
__sock_release(SOCKET_I(inode), inode);
return 0;
}
| 149,476,558,219,826,160,000,000,000,000,000,000,000 | socket.c | 294,281,140,597,752,370,000,000,000,000,000,000,000 | [
"CWE-362"
] | CVE-2018-12232 | In net/socket.c in the Linux kernel through 4.17.1, there is a race condition between fchownat and close in cases where they target the same socket file descriptor, related to the sock_close and sockfs_setattr functions. fchownat does not increment the file descriptor reference count, which allows close to set the sock... | https://nvd.nist.gov/vuln/detail/CVE-2018-12232 |
9,568 | linux | 6d8c50dcb029872b298eea68cc6209c866fd3e14 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6d8c50dcb029872b298eea68cc6209c866fd3e14 | socket: close race condition between sock_close() and sockfs_setattr()
fchownat() doesn't even hold refcnt of fd until it figures out
fd is really needed (otherwise is ignored) and releases it after
it resolves the path. This means sock_close() could race with
sockfs_setattr(), which leads to a NULL pointer dereferenc... | 1 | static int sockfs_setattr(struct dentry *dentry, struct iattr *iattr)
{
int err = simple_setattr(dentry, iattr);
if (!err && (iattr->ia_valid & ATTR_UID)) {
struct socket *sock = SOCKET_I(d_inode(dentry));
sock->sk->sk_uid = iattr->ia_uid;
}
return err;
}
| 270,332,479,041,084,860,000,000,000,000,000,000,000 | socket.c | 234,908,544,258,993,340,000,000,000,000,000,000,000 | [
"CWE-362"
] | CVE-2018-12232 | In net/socket.c in the Linux kernel through 4.17.1, there is a race condition between fchownat and close in cases where they target the same socket file descriptor, related to the sock_close and sockfs_setattr functions. fchownat does not increment the file descriptor reference count, which allows close to set the sock... | https://nvd.nist.gov/vuln/detail/CVE-2018-12232 |
184,643 | linux | 6d8c50dcb029872b298eea68cc6209c866fd3e14 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6d8c50dcb029872b298eea68cc6209c866fd3e14 | socket: close race condition between sock_close() and sockfs_setattr()
fchownat() doesn't even hold refcnt of fd until it figures out
fd is really needed (otherwise is ignored) and releases it after
it resolves the path. This means sock_close() could race with
sockfs_setattr(), which leads to a NULL pointer dereferenc... | 0 | static int sockfs_setattr(struct dentry *dentry, struct iattr *iattr)
{
int err = simple_setattr(dentry, iattr);
if (!err && (iattr->ia_valid & ATTR_UID)) {
struct socket *sock = SOCKET_I(d_inode(dentry));
if (sock->sk)
sock->sk->sk_uid = iattr->ia_uid;
else
err = -ENOENT;
}
return err;
}
| 110,891,330,105,310,480,000,000,000,000,000,000,000 | socket.c | 294,281,140,597,752,370,000,000,000,000,000,000,000 | [
"CWE-362"
] | CVE-2018-12232 | In net/socket.c in the Linux kernel through 4.17.1, there is a race condition between fchownat and close in cases where they target the same socket file descriptor, related to the sock_close and sockfs_setattr functions. fchownat does not increment the file descriptor reference count, which allows close to set the sock... | https://nvd.nist.gov/vuln/detail/CVE-2018-12232 |
3,696 | Espruino | ce1924193862d58cb43d3d4d9dada710a8361b89 | https://github.com/espruino/Espruino | https://github.com/espruino/Espruino/commit/ce1924193862d58cb43d3d4d9dada710a8361b89 | fix jsvGetString regression | 1 | size_t jsvGetString(const JsVar *v, char *str, size_t len) {
assert(len>0);
const char *s = jsvGetConstString(v);
if (s) {
/* don't use strncpy here because we don't
* want to pad the entire buffer with zeros */
len--;
int l = 0;
while (*s && l<len) {
str[l] = s[l];
l++;
... | 159,195,423,267,930,780,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2018-11596 | Espruino before 1.99 allows attackers to cause a denial of service (application crash) with a user crafted input file via a Buffer Overflow during syntax parsing because a check for '\0' is made for the wrong array element in jsvar.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-11596 |
160,956 | Espruino | ce1924193862d58cb43d3d4d9dada710a8361b89 | https://github.com/espruino/Espruino | https://github.com/espruino/Espruino/commit/ce1924193862d58cb43d3d4d9dada710a8361b89 | fix jsvGetString regression | 0 | size_t jsvGetString(const JsVar *v, char *str, size_t len) {
assert(len>0);
const char *s = jsvGetConstString(v);
if (s) {
/* don't use strncpy here because we don't
* want to pad the entire buffer with zeros */
len--;
int l = 0;
while (s[l] && l<len) {
str[l] = s[l];
l++;
... | 176,515,796,704,044,140,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2018-11596 | Espruino before 1.99 allows attackers to cause a denial of service (application crash) with a user crafted input file via a Buffer Overflow during syntax parsing because a check for '\0' is made for the wrong array element in jsvar.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-11596 |
3,699 | Espruino | 8a44b04b584b3d3ab1cb68fed410f7ecb165e50e | https://github.com/espruino/Espruino | https://github.com/espruino/Espruino/commit/8a44b04b584b3d3ab1cb68fed410f7ecb165e50e | Add height check for Graphics.createArrayBuffer(...vertical_byte:true) (fix #1421) | 1 | JsVar *jswrap_graphics_createArrayBuffer(int width, int height, int bpp, JsVar *options) {
if (width<=0 || height<=0 || width>32767 || height>32767) {
jsExceptionHere(JSET_ERROR, "Invalid Size");
return 0;
}
if (!isValidBPP(bpp)) {
jsExceptionHere(JSET_ERROR, "Invalid BPP");
return 0;
}
JsVar... | 250,096,056,660,193,630,000,000,000,000,000,000,000 | jswrap_graphics.c | 260,225,868,029,461,130,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-11592 | Espruino before 1.98 allows attackers to cause a denial of service (application crash) with a user crafted input file via an Out-of-bounds Read during syntax parsing in which certain height validation is missing in libs/graphics/jswrap_graphics.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-11592 |
160,961 | Espruino | 8a44b04b584b3d3ab1cb68fed410f7ecb165e50e | https://github.com/espruino/Espruino | https://github.com/espruino/Espruino/commit/8a44b04b584b3d3ab1cb68fed410f7ecb165e50e | Add height check for Graphics.createArrayBuffer(...vertical_byte:true) (fix #1421) | 0 | JsVar *jswrap_graphics_createArrayBuffer(int width, int height, int bpp, JsVar *options) {
if (width<=0 || height<=0 || width>32767 || height>32767) {
jsExceptionHere(JSET_ERROR, "Invalid Size");
return 0;
}
if (!isValidBPP(bpp)) {
jsExceptionHere(JSET_ERROR, "Invalid BPP");
return 0;
}
JsVar... | 337,163,940,137,182,720,000,000,000,000,000,000,000 | jswrap_graphics.c | 329,192,746,399,792,980,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-11592 | Espruino before 1.98 allows attackers to cause a denial of service (application crash) with a user crafted input file via an Out-of-bounds Read during syntax parsing in which certain height validation is missing in libs/graphics/jswrap_graphics.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-11592 |
3,700 | Espruino | b6d362f6a1f2de0b3e7604848116efb509196bf4 | https://github.com/espruino/Espruino | https://github.com/espruino/Espruino/commit/b6d362f6a1f2de0b3e7604848116efb509196bf4 | Add sanity check for debug trace print statement (fix #1420) | 1 | void _jsvTrace(JsVar *var, int indent, JsVar *baseVar, int level) {
#ifdef SAVE_ON_FLASH
jsiConsolePrint("Trace unimplemented in this version.\n");
#else
int i;
for (i=0;i<indent;i++) jsiConsolePrint(" ");
if (!var) {
jsiConsolePrint("undefined");
return;
}
jsvTraceLockInfo(var);
int lowestLeve... | 53,958,977,605,870,530,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2018-11591 | Espruino before 1.98 allows attackers to cause a denial of service (application crash) with a user crafted input file via a NULL pointer dereference during syntax parsing. This was addressed by adding validation for a debug trace print statement in jsvar.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-11591 |
160,962 | Espruino | b6d362f6a1f2de0b3e7604848116efb509196bf4 | https://github.com/espruino/Espruino | https://github.com/espruino/Espruino/commit/b6d362f6a1f2de0b3e7604848116efb509196bf4 | Add sanity check for debug trace print statement (fix #1420) | 0 | void _jsvTrace(JsVar *var, int indent, JsVar *baseVar, int level) {
#ifdef SAVE_ON_FLASH
jsiConsolePrint("Trace unimplemented in this version.\n");
#else
int i;
for (i=0;i<indent;i++) jsiConsolePrint(" ");
if (!var) {
jsiConsolePrint("undefined");
return;
}
jsvTraceLockInfo(var);
int lowestLeve... | 320,536,330,793,900,170,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2018-11591 | Espruino before 1.98 allows attackers to cause a denial of service (application crash) with a user crafted input file via a NULL pointer dereference during syntax parsing. This was addressed by adding validation for a debug trace print statement in jsvar.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-11591 |
3,701 | linux | 0a0b98734479aa5b3c671d5190e86273372cab95 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0a0b98734479aa5b3c671d5190e86273372cab95 | compat: fix 4-byte infoleak via uninitialized struct field
Commit 3a4d44b61625 ("ntp: Move adjtimex related compat syscalls to
native counterparts") removed the memset() in compat_get_timex(). Since
then, the compat adjtimex syscall can invoke do_adjtimex() with an
uninitialized ->tai.
If do_adjtimex() doesn't write... | 1 | int compat_get_timex(struct timex *txc, const struct compat_timex __user *utp)
{
struct compat_timex tx32;
if (copy_from_user(&tx32, utp, sizeof(struct compat_timex)))
return -EFAULT;
txc->modes = tx32.modes;
txc->offset = tx32.offset;
txc->freq = tx32.freq;
txc->maxerror = tx32.maxerror;
txc->esterror... | 24,540,572,475,707,357,000,000,000,000,000,000,000 | compat.c | 17,743,863,291,646,434,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2018-11508 | The compat_get_timex function in kernel/compat.c in the Linux kernel before 4.16.9 allows local users to obtain sensitive information from kernel memory via adjtimex. | https://nvd.nist.gov/vuln/detail/CVE-2018-11508 |
160,964 | linux | 0a0b98734479aa5b3c671d5190e86273372cab95 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0a0b98734479aa5b3c671d5190e86273372cab95 | compat: fix 4-byte infoleak via uninitialized struct field
Commit 3a4d44b61625 ("ntp: Move adjtimex related compat syscalls to
native counterparts") removed the memset() in compat_get_timex(). Since
then, the compat adjtimex syscall can invoke do_adjtimex() with an
uninitialized ->tai.
If do_adjtimex() doesn't write... | 0 | int compat_get_timex(struct timex *txc, const struct compat_timex __user *utp)
{
struct compat_timex tx32;
memset(txc, 0, sizeof(struct timex));
if (copy_from_user(&tx32, utp, sizeof(struct compat_timex)))
return -EFAULT;
txc->modes = tx32.modes;
txc->offset = tx32.offset;
txc->freq = tx32.freq;
txc->m... | 258,236,306,939,108,500,000,000,000,000,000,000,000 | compat.c | 131,729,389,720,760,980,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2018-11508 | The compat_get_timex function in kernel/compat.c in the Linux kernel before 4.16.9 allows local users to obtain sensitive information from kernel memory via adjtimex. | https://nvd.nist.gov/vuln/detail/CVE-2018-11508 |
3,702 | radare2 | 77c47cf873dd55b396da60baa2ca83bbd39e4add | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/77c47cf873dd55b396da60baa2ca83bbd39e4add | Fix #9903 - oobread in RAnal.sh | 1 | static int sh_op(RAnal *anal, RAnalOp *op, ut64 addr, const ut8 *data, int len) {
ut8 op_MSB,op_LSB;
int ret;
if (!data)
return 0;
memset (op, '\0', sizeof (RAnalOp));
op->addr = addr;
op->type = R_ANAL_OP_TYPE_UNK;
op->jump = op->fail = -1;
op->ptr = op->val = -1;
op->size = 2;
op_MSB = anal->big_... | 249,622,554,086,958,550,000,000,000,000,000,000,000 | anal_sh.c | 165,574,273,690,825,930,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-11384 | The sh_op() function in radare2 2.5.0 allows remote attackers to cause a denial of service (heap-based out-of-bounds read and application crash) via a crafted ELF file. | https://nvd.nist.gov/vuln/detail/CVE-2018-11384 |
160,965 | radare2 | 77c47cf873dd55b396da60baa2ca83bbd39e4add | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/77c47cf873dd55b396da60baa2ca83bbd39e4add | Fix #9903 - oobread in RAnal.sh | 0 | static int sh_op(RAnal *anal, RAnalOp *op, ut64 addr, const ut8 *data, int len) {
ut8 op_MSB,op_LSB;
int ret;
if (!data || len < 2) {
return 0;
}
memset (op, '\0', sizeof (RAnalOp));
op->addr = addr;
op->type = R_ANAL_OP_TYPE_UNK;
op->jump = op->fail = -1;
op->ptr = op->val = -1;
op->size = 2;
op_... | 277,188,391,295,267,260,000,000,000,000,000,000,000 | anal_sh.c | 241,611,991,302,889,920,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-11384 | The sh_op() function in radare2 2.5.0 allows remote attackers to cause a denial of service (heap-based out-of-bounds read and application crash) via a crafted ELF file. | https://nvd.nist.gov/vuln/detail/CVE-2018-11384 |
3,703 | radare2 | d04c78773f6959bcb427453f8e5b9824d5ba9eff | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/d04c78773f6959bcb427453f8e5b9824d5ba9eff | Fix #10091 - crash in AVR analysis | 1 | INST_HANDLER (sts) { // STS k, Rr
int r = ((buf[0] >> 4) & 0xf) | ((buf[1] & 0x1) << 4);
int k = (buf[3] << 8) | buf[2];
op->ptr = k;
ESIL_A ("r%d,", r);
__generic_ld_st (op, "ram", 0, 1, 0, k, 1);
op->cycles = 2;
}
| 145,404,004,174,958,070,000,000,000,000,000,000,000 | anal_avr.c | 49,931,515,066,285,090,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-11382 | The _inst__sts() function in radare2 2.5.0 allows remote attackers to cause a denial of service (heap-based out-of-bounds read and application crash) via a crafted binary file. | https://nvd.nist.gov/vuln/detail/CVE-2018-11382 |
160,966 | radare2 | d04c78773f6959bcb427453f8e5b9824d5ba9eff | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/d04c78773f6959bcb427453f8e5b9824d5ba9eff | Fix #10091 - crash in AVR analysis | 0 | INST_HANDLER (sts) { // STS k, Rr
if (len < 4) {
return;
}
int r = ((buf[0] >> 4) & 0xf) | ((buf[1] & 0x1) << 4);
int k = (buf[3] << 8) | buf[2];
op->ptr = k;
ESIL_A ("r%d,", r);
__generic_ld_st (op, "ram", 0, 1, 0, k, 1);
op->cycles = 2;
}
| 218,195,012,166,184,200,000,000,000,000,000,000,000 | anal_avr.c | 213,071,848,516,793,330,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-11382 | The _inst__sts() function in radare2 2.5.0 allows remote attackers to cause a denial of service (heap-based out-of-bounds read and application crash) via a crafted binary file. | https://nvd.nist.gov/vuln/detail/CVE-2018-11382 |
3,704 | radare2 | 3fcf41ed96ffa25b38029449520c8d0a198745f3 | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/3fcf41ed96ffa25b38029449520c8d0a198745f3 | Fix #9902 - Fix oobread in RBin.string_scan_range | 1 | static int string_scan_range(RList *list, RBinFile *bf, int min,
const ut64 from, const ut64 to, int type) {
ut8 tmp[R_STRING_SCAN_BUFFER_SIZE];
ut64 str_start, needle = from;
int count = 0, i, rc, runes;
int str_type = R_STRING_TYPE_DETECT;
if (type == -1) {
type = R_STRING_TYPE_DETECT;
}
if (from >... | 227,698,591,978,418,270,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2018-11381 | The string_scan_range() function in radare2 2.5.0 allows remote attackers to cause a denial of service (heap-based out-of-bounds read and application crash) via a crafted binary file. | https://nvd.nist.gov/vuln/detail/CVE-2018-11381 |
160,967 | radare2 | 3fcf41ed96ffa25b38029449520c8d0a198745f3 | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/3fcf41ed96ffa25b38029449520c8d0a198745f3 | Fix #9902 - Fix oobread in RBin.string_scan_range | 0 | static int string_scan_range(RList *list, RBinFile *bf, int min,
const ut64 from, const ut64 to, int type) {
ut8 tmp[R_STRING_SCAN_BUFFER_SIZE];
ut64 str_start, needle = from;
int count = 0, i, rc, runes;
int str_type = R_STRING_TYPE_DETECT;
if (type == -1) {
type = R_STRING_TYPE_DETECT;
}
if (from >... | 20,418,797,225,860,076,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2018-11381 | The string_scan_range() function in radare2 2.5.0 allows remote attackers to cause a denial of service (heap-based out-of-bounds read and application crash) via a crafted binary file. | https://nvd.nist.gov/vuln/detail/CVE-2018-11381 |
3,707 | radare2 | 60208765887f5f008b3b9a883f3addc8bdb9c134 | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/60208765887f5f008b3b9a883f3addc8bdb9c134 | Fix #9970 - heap oobread in mach0 parser (#10026) | 1 | static int parse_import_ptr(struct MACH0_(obj_t)* bin, struct reloc_t *reloc, int idx) {
int i, j, sym, wordsize;
ut32 stype;
wordsize = MACH0_(get_bits)(bin) / 8;
if (idx < 0 || idx >= bin->nsymtab) {
return 0;
}
if ((bin->symtab[idx].n_desc & REFERENCE_TYPE) == REFERENCE_FLAG_UNDEFINED_LAZY) {
stype = S_LAZ... | 318,868,786,944,603,400,000,000,000,000,000,000,000 | mach0.c | 163,775,332,068,251,860,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-11380 | The parse_import_ptr() function in radare2 2.5.0 allows remote attackers to cause a denial of service (heap-based out-of-bounds read and application crash) via a crafted Mach-O file. | https://nvd.nist.gov/vuln/detail/CVE-2018-11380 |
160,970 | radare2 | 60208765887f5f008b3b9a883f3addc8bdb9c134 | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/60208765887f5f008b3b9a883f3addc8bdb9c134 | Fix #9970 - heap oobread in mach0 parser (#10026) | 0 | static int parse_import_ptr(struct MACH0_(obj_t)* bin, struct reloc_t *reloc, int idx) {
int i, j, sym, wordsize;
ut32 stype;
wordsize = MACH0_(get_bits)(bin) / 8;
if (idx < 0 || idx >= bin->nsymtab) {
return 0;
}
if ((bin->symtab[idx].n_desc & REFERENCE_TYPE) == REFERENCE_FLAG_UNDEFINED_LAZY) {
stype = S_LAZ... | 140,323,910,822,900,690,000,000,000,000,000,000,000 | mach0.c | 9,700,586,922,567,834,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-11380 | The parse_import_ptr() function in radare2 2.5.0 allows remote attackers to cause a denial of service (heap-based out-of-bounds read and application crash) via a crafted Mach-O file. | https://nvd.nist.gov/vuln/detail/CVE-2018-11380 |
3,708 | radare2 | 4e1cf0d3e6f6fe2552a269def0af1cd2403e266c | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/4e1cf0d3e6f6fe2552a269def0af1cd2403e266c | Fix crash in pe | 1 | static int get_debug_info(struct PE_(r_bin_pe_obj_t)* bin, PE_(image_debug_directory_entry)* dbg_dir_entry, ut8* dbg_data, int dbg_data_len, SDebugInfo* res) {
#define SIZEOF_FILE_NAME 255
int i = 0;
const char* basename;
if (!dbg_data) {
return 0;
}
switch (dbg_dir_entry->Type) {
case IMAGE_DEBUG_TYPE_CODEVI... | 38,287,125,071,570,595,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2018-11379 | The get_debug_info() function in radare2 2.5.0 allows remote attackers to cause a denial of service (heap-based out-of-bounds read and application crash) via a crafted PE file. | https://nvd.nist.gov/vuln/detail/CVE-2018-11379 |
160,971 | radare2 | 4e1cf0d3e6f6fe2552a269def0af1cd2403e266c | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/4e1cf0d3e6f6fe2552a269def0af1cd2403e266c | Fix crash in pe | 0 | static int get_debug_info(struct PE_(r_bin_pe_obj_t)* bin, PE_(image_debug_directory_entry)* dbg_dir_entry, ut8* dbg_data, int dbg_data_len, SDebugInfo* res) {
#define SIZEOF_FILE_NAME 255
int i = 0;
const char* basename;
if (!dbg_data) {
return 0;
}
switch (dbg_dir_entry->Type) {
case IMAGE_DEBUG_TYPE_CODEVI... | 255,868,668,608,990,160,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2018-11379 | The get_debug_info() function in radare2 2.5.0 allows remote attackers to cause a denial of service (heap-based out-of-bounds read and application crash) via a crafted PE file. | https://nvd.nist.gov/vuln/detail/CVE-2018-11379 |
3,710 | radare2 | 25a3703ef2e015bbe1d1f16f6b2f63bb10dd34f4 | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/25a3703ef2e015bbe1d1f16f6b2f63bb10dd34f4 | Fix invalid free in RAnal.avr | 1 | INST_HANDLER (sbrx) { // SBRC Rr, b
int b = buf[0] & 0x7;
int r = ((buf[0] >> 4) & 0xf) | ((buf[1] & 0x01) << 4);
RAnalOp next_op;
avr_op_analyze (anal,
&next_op,
op->addr + op->size, buf + op->size, len - op->size,
cpu);
r_strbuf_fini (&next_op.esil);
op->jump = op->addr + next_op.size + 2;
op->cy... | 117,498,818,528,294,220,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2018-11377 | The avr_op_analyze() function in radare2 2.5.0 allows remote attackers to cause a denial of service (heap-based out-of-bounds read and application crash) via a crafted binary file. | https://nvd.nist.gov/vuln/detail/CVE-2018-11377 |
173,998 | radare2 | 25a3703ef2e015bbe1d1f16f6b2f63bb10dd34f4 | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/25a3703ef2e015bbe1d1f16f6b2f63bb10dd34f4 | Fix invalid free in RAnal.avr | 0 | INST_HANDLER (cpse) { // CPSE Rd, Rr
int r = (buf[0] & 0xf) | ((buf[1] & 0x2) << 3);
int d = ((buf[0] >> 4) & 0xf) | ((buf[1] & 0x1) << 4);
RAnalOp next_op;
avr_op_analyze (anal,
&next_op,
op->addr + op->size, buf + op->size, len - op->size,
cpu);
r_strbuf_fini (&next_op.esil);
op->jump = op->addr + nex... | 87,085,470,265,008,460,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2018-11377 | The avr_op_analyze() function in radare2 2.5.0 allows remote attackers to cause a denial of service (heap-based out-of-bounds read and application crash) via a crafted binary file. | https://nvd.nist.gov/vuln/detail/CVE-2018-11377 |
3,714 | linux | f09444639099584bc4784dfcd85ada67c6f33e0f | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/f09444639099584bc4784dfcd85ada67c6f33e0f | coresight: fix kernel panic caused by invalid CPU
Commit d52c9750f150 ("coresight: reset "enable_sink" flag when need be")
caused a kernel panic because of the using of an invalid value: after
'for_each_cpu(cpu, mask)', value of local variable 'cpu' become invalid,
causes following 'cpu_to_node' access invalid memory ... | 1 | static void *etm_setup_aux(int event_cpu, void **pages,
int nr_pages, bool overwrite)
{
int cpu;
cpumask_t *mask;
struct coresight_device *sink;
struct etm_event_data *event_data = NULL;
event_data = alloc_event_data(event_cpu);
if (!event_data)
return NULL;
/*
* In theory nothing prevent tracers in ... | 116,152,585,108,812,740,000,000,000,000,000,000,000 | coresight-etm-perf.c | 265,668,461,210,710,840,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2018-11232 | The etm_setup_aux function in drivers/hwtracing/coresight/coresight-etm-perf.c in the Linux kernel before 4.10.2 allows attackers to cause a denial of service (panic) because a parameter is incorrectly used as a local variable. | https://nvd.nist.gov/vuln/detail/CVE-2018-11232 |
160,976 | linux | f09444639099584bc4784dfcd85ada67c6f33e0f | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/f09444639099584bc4784dfcd85ada67c6f33e0f | coresight: fix kernel panic caused by invalid CPU
Commit d52c9750f150 ("coresight: reset "enable_sink" flag when need be")
caused a kernel panic because of the using of an invalid value: after
'for_each_cpu(cpu, mask)', value of local variable 'cpu' become invalid,
causes following 'cpu_to_node' access invalid memory ... | 0 | static void *etm_setup_aux(int event_cpu, void **pages,
int nr_pages, bool overwrite)
{
int cpu;
cpumask_t *mask;
struct coresight_device *sink;
struct etm_event_data *event_data = NULL;
event_data = alloc_event_data(event_cpu);
if (!event_data)
return NULL;
/*
* In theory nothing prevent tracers in ... | 20,827,468,924,507,206,000,000,000,000,000,000,000 | coresight-etm-perf.c | 224,583,986,247,175,880,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2018-11232 | The etm_setup_aux function in drivers/hwtracing/coresight/coresight-etm-perf.c in the Linux kernel before 4.10.2 allows attackers to cause a denial of service (panic) because a parameter is incorrectly used as a local variable. | https://nvd.nist.gov/vuln/detail/CVE-2018-11232 |
3,717 | libgit2 | c1577110467b701dcbcf9439ac225ea851b47d22 | https://github.com/libgit2/libgit2 | https://github.com/libgit2/libgit2/commit/c1577110467b701dcbcf9439ac225ea851b47d22 | delta: fix overflow when computing limit
When checking whether a delta base offset and length fit into the base
we have in memory already, we can trigger an overflow which breaks the
check. This would subsequently result in us reading memory from out of
bounds of the base.
The issue is easily fixed by checking for ov... | 1 | int git_delta_apply(
void **out,
size_t *out_len,
const unsigned char *base,
size_t base_len,
const unsigned char *delta,
size_t delta_len)
{
const unsigned char *delta_end = delta + delta_len;
size_t base_sz, res_sz, alloc_sz;
unsigned char *res_dp;
*out = NULL;
*out_len = 0;
/*
* Check that the base s... | 228,984,589,945,149,840,000,000,000,000,000,000,000 | delta.c | 235,241,610,924,393,300,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-10887 | A flaw was found in libgit2 before version 0.27.3. It has been discovered that an unexpected sign extension in git_delta_apply function in delta.c file may lead to an integer overflow which in turn leads to an out of bound read, allowing to read before the base object. An attacker may use this flaw to leak memory addre... | https://nvd.nist.gov/vuln/detail/CVE-2018-10887 |
160,977 | libgit2 | c1577110467b701dcbcf9439ac225ea851b47d22 | https://github.com/libgit2/libgit2 | https://github.com/libgit2/libgit2/commit/c1577110467b701dcbcf9439ac225ea851b47d22 | delta: fix overflow when computing limit
When checking whether a delta base offset and length fit into the base
we have in memory already, we can trigger an overflow which breaks the
check. This would subsequently result in us reading memory from out of
bounds of the base.
The issue is easily fixed by checking for ov... | 0 | int git_delta_apply(
void **out,
size_t *out_len,
const unsigned char *base,
size_t base_len,
const unsigned char *delta,
size_t delta_len)
{
const unsigned char *delta_end = delta + delta_len;
size_t base_sz, res_sz, alloc_sz;
unsigned char *res_dp;
*out = NULL;
*out_len = 0;
/*
* Check that the base s... | 309,438,131,761,303,180,000,000,000,000,000,000,000 | delta.c | 38,269,275,644,037,540,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-10887 | A flaw was found in libgit2 before version 0.27.3. It has been discovered that an unexpected sign extension in git_delta_apply function in delta.c file may lead to an integer overflow which in turn leads to an out of bound read, allowing to read before the base object. An attacker may use this flaw to leak memory addre... | https://nvd.nist.gov/vuln/detail/CVE-2018-10887 |
3,718 | ngiflib | cf429e0a2fe26b5f01ce0c8e9b79432e94509b6e | https://github.com/miniupnp/ngiflib | https://github.com/miniupnp/ngiflib/commit/cf429e0a2fe26b5f01ce0c8e9b79432e94509b6e | fix "pixel overrun"
fixes #3 | 1 | static int DecodeGifImg(struct ngiflib_img * i) {
struct ngiflib_decode_context context;
long npix;
u8 * stackp;
u8 * stack_top;
u16 clr;
u16 eof;
u16 free;
u16 act_code = 0;
u16 old_code = 0;
u16 read_byt;
u16 ab_prfx[4096];
u8 ab_suffx[4096];
u8 ab_stack[4096];
u8 flags;
u8 casspecial = 0;
if(!i) ret... | 208,688,875,586,295,620,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2018-10717 | The DecodeGifImg function in ngiflib.c in MiniUPnP ngiflib 0.4 does not consider the bounds of the pixels data structure, which allows remote attackers to cause a denial of service (WritePixels heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted GIF file, a differen... | https://nvd.nist.gov/vuln/detail/CVE-2018-10717 |
160,978 | ngiflib | cf429e0a2fe26b5f01ce0c8e9b79432e94509b6e | https://github.com/miniupnp/ngiflib | https://github.com/miniupnp/ngiflib/commit/cf429e0a2fe26b5f01ce0c8e9b79432e94509b6e | fix "pixel overrun"
fixes #3 | 0 | static int DecodeGifImg(struct ngiflib_img * i) {
struct ngiflib_decode_context context;
long npix;
u8 * stackp;
u8 * stack_top;
u16 clr;
u16 eof;
u16 free;
u16 act_code = 0;
u16 old_code = 0;
u16 read_byt;
u16 ab_prfx[4096];
u8 ab_suffx[4096];
u8 ab_stack[4096];
u8 flags;
u8 casspecial = 0;
if(!i) ret... | 198,691,432,994,164,500,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2018-10717 | The DecodeGifImg function in ngiflib.c in MiniUPnP ngiflib 0.4 does not consider the bounds of the pixels data structure, which allows remote attackers to cause a denial of service (WritePixels heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted GIF file, a differen... | https://nvd.nist.gov/vuln/detail/CVE-2018-10717 |
3,720 | linux | 73223e4e2e3867ebf033a5a8eb2e5df0158ccc99 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/73223e4e2e3867ebf033a5a8eb2e5df0158ccc99 | mm/mempolicy: fix use after free when calling get_mempolicy
I hit a use after free issue when executing trinity and repoduced it
with KASAN enabled. The related call trace is as follows.
BUG: KASan: use after free in SyS_get_mempolicy+0x3c8/0x960 at addr ffff8801f582d766
Read of size 2 by task syz-executor1/798
... | 1 | static long do_get_mempolicy(int *policy, nodemask_t *nmask,
unsigned long addr, unsigned long flags)
{
int err;
struct mm_struct *mm = current->mm;
struct vm_area_struct *vma = NULL;
struct mempolicy *pol = current->mempolicy;
if (flags &
~(unsigned long)(MPOL_F_NODE|MPOL_F_ADDR|MPOL_F_MEMS_ALLOWED))
... | 152,269,556,434,917,930,000,000,000,000,000,000,000 | mempolicy.c | 25,852,424,809,621,314,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2018-10675 | The do_get_mempolicy function in mm/mempolicy.c in the Linux kernel before 4.12.9 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted system calls. | https://nvd.nist.gov/vuln/detail/CVE-2018-10675 |
160,979 | linux | 73223e4e2e3867ebf033a5a8eb2e5df0158ccc99 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/73223e4e2e3867ebf033a5a8eb2e5df0158ccc99 | mm/mempolicy: fix use after free when calling get_mempolicy
I hit a use after free issue when executing trinity and repoduced it
with KASAN enabled. The related call trace is as follows.
BUG: KASan: use after free in SyS_get_mempolicy+0x3c8/0x960 at addr ffff8801f582d766
Read of size 2 by task syz-executor1/798
... | 0 | static long do_get_mempolicy(int *policy, nodemask_t *nmask,
unsigned long addr, unsigned long flags)
{
int err;
struct mm_struct *mm = current->mm;
struct vm_area_struct *vma = NULL;
struct mempolicy *pol = current->mempolicy;
if (flags &
~(unsigned long)(MPOL_F_NODE|MPOL_F_ADDR|MPOL_F_MEMS_ALLOWED))
... | 201,196,923,326,928,940,000,000,000,000,000,000,000 | mempolicy.c | 211,369,732,351,571,060,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2018-10675 | The do_get_mempolicy function in mm/mempolicy.c in the Linux kernel before 4.12.9 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted system calls. | https://nvd.nist.gov/vuln/detail/CVE-2018-10675 |
3,721 | file | a642587a9c9e2dd7feacdf513c3643ce26ad3c22 | https://github.com/file/file | https://github.com/file/file/commit/a642587a9c9e2dd7feacdf513c3643ce26ad3c22 | Avoid reading past the end of buffer (Rui Reis) | 1 | do_core_note(struct magic_set *ms, unsigned char *nbuf, uint32_t type,
int swap, uint32_t namesz, uint32_t descsz,
size_t noff, size_t doff, int *flags, size_t size, int clazz)
{
#ifdef ELFCORE
int os_style = -1;
/*
* Sigh. The 2.0.36 kernel in Debian 2.1, at
* least, doesn't correctly implement name
*... | 272,730,783,674,373,480,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2018-10360 | The do_core_note function in readelf.c in libmagic.a in file 5.33 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted ELF file. | https://nvd.nist.gov/vuln/detail/CVE-2018-10360 |
160,984 | file | a642587a9c9e2dd7feacdf513c3643ce26ad3c22 | https://github.com/file/file | https://github.com/file/file/commit/a642587a9c9e2dd7feacdf513c3643ce26ad3c22 | Avoid reading past the end of buffer (Rui Reis) | 0 | do_core_note(struct magic_set *ms, unsigned char *nbuf, uint32_t type,
int swap, uint32_t namesz, uint32_t descsz,
size_t noff, size_t doff, int *flags, size_t size, int clazz)
{
#ifdef ELFCORE
int os_style = -1;
/*
* Sigh. The 2.0.36 kernel in Debian 2.1, at
* least, doesn't correctly implement name
*... | 34,135,913,143,551,836,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2018-10360 | The do_core_note function in readelf.c in libmagic.a in file 5.33 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted ELF file. | https://nvd.nist.gov/vuln/detail/CVE-2018-10360 |
3,722 | mruby | b51b21fc63c9805862322551387d9036f2b63433 | https://github.com/mruby/mruby | https://github.com/mruby/mruby/commit/b51b21fc63c9805862322551387d9036f2b63433 | Fix `use after free in File#initilialize_copy`; fix #4001
The bug and the fix were reported by https://hackerone.com/pnoltof | 1 | mrb_io_initialize_copy(mrb_state *mrb, mrb_value copy)
{
mrb_value orig;
mrb_value buf;
struct mrb_io *fptr_copy;
struct mrb_io *fptr_orig;
mrb_bool failed = TRUE;
mrb_get_args(mrb, "o", &orig);
fptr_copy = (struct mrb_io *)DATA_PTR(copy);
if (fptr_copy != NULL) {
fptr_finalize(mrb, fptr_copy... | 150,634,863,447,224,430,000,000,000,000,000,000,000 | io.c | 41,201,053,483,208,995,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2018-10199 | In versions of mruby up to and including 1.4.0, a use-after-free vulnerability exists in src/io.c::File#initilialize_copy(). An attacker that can cause Ruby code to be run can possibly use this to execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2018-10199 |
160,985 | mruby | b51b21fc63c9805862322551387d9036f2b63433 | https://github.com/mruby/mruby | https://github.com/mruby/mruby/commit/b51b21fc63c9805862322551387d9036f2b63433 | Fix `use after free in File#initilialize_copy`; fix #4001
The bug and the fix were reported by https://hackerone.com/pnoltof | 0 | mrb_io_initialize_copy(mrb_state *mrb, mrb_value copy)
{
mrb_value orig;
mrb_value buf;
struct mrb_io *fptr_copy;
struct mrb_io *fptr_orig;
mrb_bool failed = TRUE;
mrb_get_args(mrb, "o", &orig);
fptr_orig = io_get_open_fptr(mrb, orig);
fptr_copy = (struct mrb_io *)DATA_PTR(copy);
if (fptr_copy !... | 137,891,612,850,244,730,000,000,000,000,000,000,000 | io.c | 250,286,733,697,983,800,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2018-10199 | In versions of mruby up to and including 1.4.0, a use-after-free vulnerability exists in src/io.c::File#initilialize_copy(). An attacker that can cause Ruby code to be run can possibly use this to execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2018-10199 |
3,723 | mruby | 1905091634a6a2925c911484434448e568330626 | https://github.com/mruby/mruby | https://github.com/mruby/mruby/commit/1905091634a6a2925c911484434448e568330626 | Check length of env stack before accessing upvar; fix #3995 | 1 | mrb_vm_exec(mrb_state *mrb, struct RProc *proc, mrb_code *pc)
{
/* mrb_assert(mrb_proc_cfunc_p(proc)) */
mrb_irep *irep = proc->body.irep;
mrb_value *pool = irep->pool;
mrb_sym *syms = irep->syms;
mrb_code i;
int ai = mrb_gc_arena_save(mrb);
struct mrb_jmpbuf *prev_jmp = mrb->jmp;
struct mrb_jmpbuf c_jm... | 140,181,947,558,548,590,000,000,000,000,000,000,000 | vm.c | 252,079,256,979,517,780,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2018-10191 | In versions of mruby up to and including 1.4.0, an integer overflow exists in src/vm.c::mrb_vm_exec() when handling OP_GETUPVAR in the presence of deep scope nesting, resulting in a use-after-free. An attacker that can cause Ruby code to be run can use this to possibly execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2018-10191 |
160,986 | mruby | 1905091634a6a2925c911484434448e568330626 | https://github.com/mruby/mruby | https://github.com/mruby/mruby/commit/1905091634a6a2925c911484434448e568330626 | Check length of env stack before accessing upvar; fix #3995 | 0 | mrb_vm_exec(mrb_state *mrb, struct RProc *proc, mrb_code *pc)
{
/* mrb_assert(mrb_proc_cfunc_p(proc)) */
mrb_irep *irep = proc->body.irep;
mrb_value *pool = irep->pool;
mrb_sym *syms = irep->syms;
mrb_code i;
int ai = mrb_gc_arena_save(mrb);
struct mrb_jmpbuf *prev_jmp = mrb->jmp;
struct mrb_jmpbuf c_jm... | 221,387,497,292,321,870,000,000,000,000,000,000,000 | vm.c | 167,135,015,352,903,940,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2018-10191 | In versions of mruby up to and including 1.4.0, an integer overflow exists in src/vm.c::mrb_vm_exec() when handling OP_GETUPVAR in the presence of deep scope nesting, resulting in a use-after-free. An attacker that can cause Ruby code to be run can use this to possibly execute arbitrary code. | https://nvd.nist.gov/vuln/detail/CVE-2018-10191 |
3,724 | linux | 4ea77014af0d6205b05503d1c7aac6eace11d473 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/4ea77014af0d6205b05503d1c7aac6eace11d473 | kernel/signal.c: avoid undefined behaviour in kill_something_info
When running kill(72057458746458112, 0) in userspace I hit the following
issue.
UBSAN: Undefined behaviour in kernel/signal.c:1462:11
negation of -2147483648 cannot be represented in type 'int':
CPU: 226 PID: 9849 Comm: test Tainted: G B ... | 1 | static int kill_something_info(int sig, struct siginfo *info, pid_t pid)
{
int ret;
if (pid > 0) {
rcu_read_lock();
ret = kill_pid_info(sig, info, find_vpid(pid));
rcu_read_unlock();
return ret;
}
read_lock(&tasklist_lock);
if (pid != -1) {
ret = __kill_pgrp_info(sig, info,
pid ? find_vpid(-p... | 233,236,629,790,152,600,000,000,000,000,000,000,000 | signal.c | 43,790,563,659,993,175,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-10124 | The kill_something_info function in kernel/signal.c in the Linux kernel before 4.13, when an unspecified architecture and compiler is used, might allow local users to cause a denial of service via an INT_MIN argument. | https://nvd.nist.gov/vuln/detail/CVE-2018-10124 |
160,987 | linux | 4ea77014af0d6205b05503d1c7aac6eace11d473 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/4ea77014af0d6205b05503d1c7aac6eace11d473 | kernel/signal.c: avoid undefined behaviour in kill_something_info
When running kill(72057458746458112, 0) in userspace I hit the following
issue.
UBSAN: Undefined behaviour in kernel/signal.c:1462:11
negation of -2147483648 cannot be represented in type 'int':
CPU: 226 PID: 9849 Comm: test Tainted: G B ... | 0 | static int kill_something_info(int sig, struct siginfo *info, pid_t pid)
{
int ret;
if (pid > 0) {
rcu_read_lock();
ret = kill_pid_info(sig, info, find_vpid(pid));
rcu_read_unlock();
return ret;
}
/* -INT_MIN is undefined. Exclude this case to avoid a UBSAN warning */
if (pid == INT_MIN)
return -ES... | 312,729,270,885,095,970,000,000,000,000,000,000,000 | signal.c | 235,985,041,497,662,160,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-10124 | The kill_something_info function in kernel/signal.c in the Linux kernel before 4.13, when an unspecified architecture and compiler is used, might allow local users to cause a denial of service via an INT_MIN argument. | https://nvd.nist.gov/vuln/detail/CVE-2018-10124 |
3,725 | linux | 9903e41ae1f5d50c93f268ca3304d4d7c64b9311 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/9903e41ae1f5d50c93f268ca3304d4d7c64b9311 | clk: hisilicon: hi3660:Fix potential NULL dereference in hi3660_stub_clk_probe()
platform_get_resource() may return NULL, add proper check to
avoid potential NULL dereferencing.
This is detected by Coccinelle semantic patch.
@@
expression pdev, res, n, t, e, e1, e2;
@@
res = platform_get_resource(pdev, t, n);
+ if ... | 1 | static int hi3660_stub_clk_probe(struct platform_device *pdev)
{
struct device *dev = &pdev->dev;
struct resource *res;
unsigned int i;
int ret;
/* Use mailbox client without blocking */
stub_clk_chan.cl.dev = dev;
stub_clk_chan.cl.tx_done = NULL;
stub_clk_chan.cl.tx_block = false;
stub_clk_chan.cl.knows_txdo... | 198,852,483,878,198,200,000,000,000,000,000,000,000 | clk-hi3660-stub.c | 154,652,412,877,365,080,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2018-10074 | The hi3660_stub_clk_probe function in drivers/clk/hisilicon/clk-hi3660-stub.c in the Linux kernel before 4.16 allows local users to cause a denial of service (NULL pointer dereference) by triggering a failure of resource retrieval. | https://nvd.nist.gov/vuln/detail/CVE-2018-10074 |
160,988 | linux | 9903e41ae1f5d50c93f268ca3304d4d7c64b9311 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/9903e41ae1f5d50c93f268ca3304d4d7c64b9311 | clk: hisilicon: hi3660:Fix potential NULL dereference in hi3660_stub_clk_probe()
platform_get_resource() may return NULL, add proper check to
avoid potential NULL dereferencing.
This is detected by Coccinelle semantic patch.
@@
expression pdev, res, n, t, e, e1, e2;
@@
res = platform_get_resource(pdev, t, n);
+ if ... | 0 | static int hi3660_stub_clk_probe(struct platform_device *pdev)
{
struct device *dev = &pdev->dev;
struct resource *res;
unsigned int i;
int ret;
/* Use mailbox client without blocking */
stub_clk_chan.cl.dev = dev;
stub_clk_chan.cl.tx_done = NULL;
stub_clk_chan.cl.tx_block = false;
stub_clk_chan.cl.knows_txdo... | 244,569,872,212,383,930,000,000,000,000,000,000,000 | clk-hi3660-stub.c | 241,551,178,345,863,100,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2018-10074 | The hi3660_stub_clk_probe function in drivers/clk/hisilicon/clk-hi3660-stub.c in the Linux kernel before 4.16 allows local users to cause a denial of service (NULL pointer dereference) by triggering a failure of resource retrieval. | https://nvd.nist.gov/vuln/detail/CVE-2018-10074 |
3,731 | openvpn | 1394192b210cb3c6624a7419bcf3ff966742e79b | https://github.com/OpenVPN/openvpn | https://github.com/OpenVPN/openvpn/commit/1394192b210cb3c6624a7419bcf3ff966742e79b | Fix potential double-free() in Interactive Service (CVE-2018-9336)
Malformed input data on the service pipe towards the OpenVPN interactive
service (normally used by the OpenVPN GUI to request openvpn instances
from the service) can result in a double free() in the error handling code.
This usually only leads to a pr... | 1 | GetStartupData(HANDLE pipe, STARTUP_DATA *sud)
{
size_t size, len;
BOOL ret = FALSE;
WCHAR *data = NULL;
DWORD bytes, read;
bytes = PeekNamedPipeAsync(pipe, 1, &exit_event);
if (bytes == 0)
{
MsgToEventLog(M_SYSERR, TEXT("PeekNamedPipeAsync failed"));
ReturnLastErro... | 292,015,260,812,614,400,000,000,000,000,000,000,000 | interactive.c | 297,968,443,524,703,830,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2018-9336 | openvpnserv.exe (aka the interactive service helper) in OpenVPN 2.4.x before 2.4.6 allows a local attacker to cause a double-free of memory by sending a malformed request to the interactive service. This could cause a denial-of-service through memory corruption or possibly have unspecified other impact including privil... | https://nvd.nist.gov/vuln/detail/CVE-2018-9336 |
160,992 | openvpn | 1394192b210cb3c6624a7419bcf3ff966742e79b | https://github.com/OpenVPN/openvpn | https://github.com/OpenVPN/openvpn/commit/1394192b210cb3c6624a7419bcf3ff966742e79b | Fix potential double-free() in Interactive Service (CVE-2018-9336)
Malformed input data on the service pipe towards the OpenVPN interactive
service (normally used by the OpenVPN GUI to request openvpn instances
from the service) can result in a double free() in the error handling code.
This usually only leads to a pr... | 0 | GetStartupData(HANDLE pipe, STARTUP_DATA *sud)
{
size_t size, len;
WCHAR *data = NULL;
DWORD bytes, read;
bytes = PeekNamedPipeAsync(pipe, 1, &exit_event);
if (bytes == 0)
{
MsgToEventLog(M_SYSERR, TEXT("PeekNamedPipeAsync failed"));
ReturnLastError(pipe, L"PeekNamedPip... | 96,951,091,625,404,450,000,000,000,000,000,000,000 | interactive.c | 107,113,004,345,582,610,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2018-9336 | openvpnserv.exe (aka the interactive service helper) in OpenVPN 2.4.x before 2.4.6 allows a local attacker to cause a double-free of memory by sending a malformed request to the interactive service. This could cause a denial-of-service through memory corruption or possibly have unspecified other impact including privil... | https://nvd.nist.gov/vuln/detail/CVE-2018-9336 |
3,732 | yubico-pam | 0f6ceabab0a8849b47f67d727aa526c2656089ba | https://github.com/Yubico/yubico-pam | https://github.com/Yubico/yubico-pam/commit/0f6ceabab0a8849b47f67d727aa526c2656089ba | util: make sure to close the authfile before returning success
fixes #136 | 1 | check_user_token (const char *authfile,
const char *username,
const char *otp_id,
int verbose,
FILE *debug_file)
{
char buf[1024];
char *s_user, *s_token;
int retval = AUTH_ERROR;
int fd;
struct stat st;
FILE *opwfile;
fd = open(authfile, O_RDONLY, 0);
if (fd < 0) {
... | 73,976,873,416,705,270,000,000,000,000,000,000,000 | util.c | 194,446,551,470,215,400,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2018-9275 | In check_user_token in util.c in the Yubico PAM module (aka pam_yubico) 2.18 through 2.25, successful logins can leak file descriptors to the auth mapping file, which can lead to information disclosure (serial number of a device) and/or DoS (reaching the maximum number of file descriptors). | https://nvd.nist.gov/vuln/detail/CVE-2018-9275 |
160,993 | yubico-pam | 0f6ceabab0a8849b47f67d727aa526c2656089ba | https://github.com/Yubico/yubico-pam | https://github.com/Yubico/yubico-pam/commit/0f6ceabab0a8849b47f67d727aa526c2656089ba | util: make sure to close the authfile before returning success
fixes #136 | 0 | check_user_token (const char *authfile,
const char *username,
const char *otp_id,
int verbose,
FILE *debug_file)
{
char buf[1024];
char *s_user, *s_token;
int retval = AUTH_ERROR;
int fd;
struct stat st;
FILE *opwfile;
fd = open(authfile, O_RDONLY, 0);
if (fd < 0) {
... | 71,128,020,389,365,740,000,000,000,000,000,000,000 | util.c | 282,724,143,551,467,370,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2018-9275 | In check_user_token in util.c in the Yubico PAM module (aka pam_yubico) 2.18 through 2.25, successful logins can leak file descriptors to the auth mapping file, which can lead to information disclosure (serial number of a device) and/or DoS (reaching the maximum number of file descriptors). | https://nvd.nist.gov/vuln/detail/CVE-2018-9275 |
3,733 | openbsd | 0654414afcce51a16d35d05060190a3ec4618d42 | https://github.com/libressl-portable/openbsd | https://github.com/libressl-portable/openbsd/commit/0654414afcce51a16d35d05060190a3ec4618d42 | None | 1 | int_x509_param_set_hosts(X509_VERIFY_PARAM_ID *id, int mode,
const char *name, size_t namelen)
{
char *copy;
/*
* Refuse names with embedded NUL bytes.
* XXX: Do we need to push an error onto the error stack?
*/
if (name && memchr(name, '\0', namelen))
return 0;
if (mode == SET_HOST && id->hosts... | 281,204,162,380,877,240,000,000,000,000,000,000,000 | None | null | [
"CWE-295"
] | CVE-2018-8970 | The int_x509_param_set_hosts function in lib/libcrypto/x509/x509_vpm.c in LibreSSL 2.7.0 before 2.7.1 does not support a certain special case of a zero name length, which causes silent omission of hostname verification, and consequently allows man-in-the-middle attackers to spoof servers and obtain sensitive informatio... | https://nvd.nist.gov/vuln/detail/CVE-2018-8970 |
160,994 | openbsd | 0654414afcce51a16d35d05060190a3ec4618d42 | https://github.com/libressl-portable/openbsd | https://github.com/libressl-portable/openbsd/commit/0654414afcce51a16d35d05060190a3ec4618d42 | None | 0 | int_x509_param_set_hosts(X509_VERIFY_PARAM_ID *id, int mode,
const char *name, size_t namelen)
{
char *copy;
if (name != NULL && namelen == 0)
namelen = strlen(name);
/*
* Refuse names with embedded NUL bytes.
* XXX: Do we need to push an error onto the error stack?
*/
if (name && memchr(name, '\... | 36,974,064,073,248,410,000,000,000,000,000,000,000 | None | null | [
"CWE-295"
] | CVE-2018-8970 | The int_x509_param_set_hosts function in lib/libcrypto/x509/x509_vpm.c in LibreSSL 2.7.0 before 2.7.1 does not support a certain special case of a zero name length, which causes silent omission of hostname verification, and consequently allows man-in-the-middle attackers to spoof servers and obtain sensitive informatio... | https://nvd.nist.gov/vuln/detail/CVE-2018-8970 |
3,734 | linux | d8ba61ba58c88d5207c1ba2f7d9a2280e7d03be9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d8ba61ba58c88d5207c1ba2f7d9a2280e7d03be9 | x86/entry/64: Don't use IST entry for #BP stack
There's nothing IST-worthy about #BP/int3. We don't allow kprobes
in the small handful of places in the kernel that run at CPL0 with
an invalid stack, and 32-bit kernels have used normal interrupt
gates for #BP forever.
Furthermore, we don't allow kprobes in places tha... | 1 | dotraplinkage void notrace do_int3(struct pt_regs *regs, long error_code)
{
#ifdef CONFIG_DYNAMIC_FTRACE
/*
* ftrace must be first, everything else may cause a recursive crash.
* See note by declaration of modifying_ftrace_code in ftrace.c
*/
if (unlikely(atomic_read(&modifying_ftrace_code)) &&
ftrace_i... | 106,804,786,307,522,770,000,000,000,000,000,000,000 | traps.c | 166,654,386,209,643,410,000,000,000,000,000,000,000 | [
"CWE-362"
] | CVE-2018-8897 | A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer's Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) pri... | https://nvd.nist.gov/vuln/detail/CVE-2018-8897 |
160,995 | linux | d8ba61ba58c88d5207c1ba2f7d9a2280e7d03be9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d8ba61ba58c88d5207c1ba2f7d9a2280e7d03be9 | x86/entry/64: Don't use IST entry for #BP stack
There's nothing IST-worthy about #BP/int3. We don't allow kprobes
in the small handful of places in the kernel that run at CPL0 with
an invalid stack, and 32-bit kernels have used normal interrupt
gates for #BP forever.
Furthermore, we don't allow kprobes in places tha... | 0 | dotraplinkage void notrace do_int3(struct pt_regs *regs, long error_code)
{
#ifdef CONFIG_DYNAMIC_FTRACE
/*
* ftrace must be first, everything else may cause a recursive crash.
* See note by declaration of modifying_ftrace_code in ftrace.c
*/
if (unlikely(atomic_read(&modifying_ftrace_code)) &&
ftrace_i... | 97,251,873,565,591,650,000,000,000,000,000,000,000 | traps.c | 31,243,274,411,237,575,000,000,000,000,000,000,000 | [
"CWE-362"
] | CVE-2018-8897 | A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer's Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) pri... | https://nvd.nist.gov/vuln/detail/CVE-2018-8897 |
3,735 | kamailio | e1d8008a09d9390ebaf698abe8909e10dfec4097 | https://github.com/kamailio/kamailio | https://github.com/kamailio/kamailio/commit/e1d8008a09d9390ebaf698abe8909e10dfec4097 | tmx: allocate space to store ending 0 for branch value
- reported by Alfred Farrugia and Sandro Gauci | 1 | int tmx_check_pretran(sip_msg_t *msg)
{
unsigned int chid;
unsigned int slotid;
int dsize;
struct via_param *vbr;
str scallid;
str scseqmet;
str scseqnum;
str sftag;
str svbranch = {NULL, 0};
pretran_t *it;
if(_tmx_ptran_table==NULL) {
LM_ERR("pretran hash table not initialized yet\n");
return -1;
}
i... | 133,412,845,150,430,060,000,000,000,000,000,000,000 | tmx_pretran.c | 50,705,933,634,594,320,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-8828 | A Buffer Overflow issue was discovered in Kamailio before 4.4.7, 5.0.x before 5.0.6, and 5.1.x before 5.1.2. A specially crafted REGISTER message with a malformed branch or From tag triggers an off-by-one heap-based buffer overflow in the tmx_check_pretran function in modules/tmx/tmx_pretran.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-8828 |
160,996 | kamailio | e1d8008a09d9390ebaf698abe8909e10dfec4097 | https://github.com/kamailio/kamailio | https://github.com/kamailio/kamailio/commit/e1d8008a09d9390ebaf698abe8909e10dfec4097 | tmx: allocate space to store ending 0 for branch value
- reported by Alfred Farrugia and Sandro Gauci | 0 | int tmx_check_pretran(sip_msg_t *msg)
{
unsigned int chid;
unsigned int slotid;
int dsize;
struct via_param *vbr;
str scallid;
str scseqmet;
str scseqnum;
str sftag;
str svbranch = {NULL, 0};
pretran_t *it;
if(_tmx_ptran_table==NULL) {
LM_ERR("pretran hash table not initialized yet\n");
return -1;
}
i... | 330,806,019,978,226,260,000,000,000,000,000,000,000 | tmx_pretran.c | 48,175,142,808,956,900,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-8828 | A Buffer Overflow issue was discovered in Kamailio before 4.4.7, 5.0.x before 5.0.6, and 5.1.x before 5.1.2. A specially crafted REGISTER message with a malformed branch or From tag triggers an off-by-one heap-based buffer overflow in the tmx_check_pretran function in modules/tmx/tmx_pretran.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-8828 |
3,746 | FreeRDP | d1112c279bd1a327e8e4d0b5f371458bf2579659 | https://github.com/FreeRDP/FreeRDP | https://github.com/FreeRDP/FreeRDP/commit/d1112c279bd1a327e8e4d0b5f371458bf2579659 | Fixed CVE-2018-8788
Thanks to Eyal Itkin from Check Point Software Technologies. | 1 | static void nsc_rle_decode(BYTE* in, BYTE* out, UINT32 originalSize)
{
UINT32 len;
UINT32 left;
BYTE value;
left = originalSize;
while (left > 4)
{
value = *in++;
if (left == 5)
{
*out++ = value;
left--;
}
else if (value == *in)
{
in++;
if (*in < 0xFF)
{
len = (UINT32) *... | 6,048,075,215,570,503,000,000,000,000,000,000,000 | nsc.c | 220,797,472,776,409,930,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2018-8788 | FreeRDP prior to version 2.0.0-rc4 contains an Out-Of-Bounds Write of up to 4 bytes in function nsc_rle_decode() that results in a memory corruption and possibly even a remote code execution. | https://nvd.nist.gov/vuln/detail/CVE-2018-8788 |
161,007 | FreeRDP | d1112c279bd1a327e8e4d0b5f371458bf2579659 | https://github.com/FreeRDP/FreeRDP | https://github.com/FreeRDP/FreeRDP/commit/d1112c279bd1a327e8e4d0b5f371458bf2579659 | Fixed CVE-2018-8788
Thanks to Eyal Itkin from Check Point Software Technologies. | 0 | static void nsc_rle_decode(BYTE* in, BYTE* out, UINT32 originalSize)
static BOOL nsc_rle_decode(BYTE* in, BYTE* out, UINT32 outSize, UINT32 originalSize)
{
UINT32 len;
UINT32 left;
BYTE value;
left = originalSize;
while (left > 4)
{
value = *in++;
if (left == 5)
{
if (outSize < 1)
return FALS... | 95,973,209,383,017,750,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2018-8788 | FreeRDP prior to version 2.0.0-rc4 contains an Out-Of-Bounds Write of up to 4 bytes in function nsc_rle_decode() that results in a memory corruption and possibly even a remote code execution. | https://nvd.nist.gov/vuln/detail/CVE-2018-8788 |
3,752 | FreeRDP | 09b9d4f1994a674c4ec85b4947aa656eda1aed8a | https://github.com/FreeRDP/FreeRDP | https://github.com/FreeRDP/FreeRDP/commit/09b9d4f1994a674c4ec85b4947aa656eda1aed8a | Fixed CVE-2018-8787
Thanks to Eyal Itkin from Check Point Software Technologies. | 1 | static BOOL gdi_Bitmap_Decompress(rdpContext* context, rdpBitmap* bitmap,
const BYTE* pSrcData, UINT32 DstWidth, UINT32 DstHeight,
UINT32 bpp, UINT32 length, BOOL compressed,
UINT32 codecId)
{
UINT32 SrcSize = lengt... | 8,582,638,630,962,748,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2018-8787 | FreeRDP prior to version 2.0.0-rc4 contains an Integer Overflow that leads to a Heap-Based Buffer Overflow in function gdi_Bitmap_Decompress() and results in a memory corruption and probably even a remote code execution. | https://nvd.nist.gov/vuln/detail/CVE-2018-8787 |
161,012 | FreeRDP | 09b9d4f1994a674c4ec85b4947aa656eda1aed8a | https://github.com/FreeRDP/FreeRDP | https://github.com/FreeRDP/FreeRDP/commit/09b9d4f1994a674c4ec85b4947aa656eda1aed8a | Fixed CVE-2018-8787
Thanks to Eyal Itkin from Check Point Software Technologies. | 0 | static BOOL gdi_Bitmap_Decompress(rdpContext* context, rdpBitmap* bitmap,
const BYTE* pSrcData, UINT32 DstWidth, UINT32 DstHeight,
UINT32 bpp, UINT32 length, BOOL compressed,
UINT32 codecId)
{
UINT32 SrcSize = lengt... | 53,096,206,632,953,220,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2018-8787 | FreeRDP prior to version 2.0.0-rc4 contains an Integer Overflow that leads to a Heap-Based Buffer Overflow in function gdi_Bitmap_Decompress() and results in a memory corruption and probably even a remote code execution. | https://nvd.nist.gov/vuln/detail/CVE-2018-8787 |
3,753 | FreeRDP | 445a5a42c500ceb80f8fa7f2c11f3682538033f3 | https://github.com/FreeRDP/FreeRDP | https://github.com/FreeRDP/FreeRDP/commit/445a5a42c500ceb80f8fa7f2c11f3682538033f3 | Fixed CVE-2018-8786
Thanks to Eyal Itkin from Check Point Software Technologies. | 1 | BITMAP_UPDATE* update_read_bitmap_update(rdpUpdate* update, wStream* s)
{
UINT32 i;
BITMAP_UPDATE* bitmapUpdate = calloc(1, sizeof(BITMAP_UPDATE));
if (!bitmapUpdate)
goto fail;
if (Stream_GetRemainingLength(s) < 2)
goto fail;
Stream_Read_UINT16(s, bitmapUpdate->number); /* numberRectangles (2 bytes) */
WL... | 282,936,062,818,017,570,000,000,000,000,000,000,000 | update.c | 243,677,407,853,847,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-8786 | FreeRDP prior to version 2.0.0-rc4 contains an Integer Truncation that leads to a Heap-Based Buffer Overflow in function update_read_bitmap_update() and results in a memory corruption and probably even a remote code execution. | https://nvd.nist.gov/vuln/detail/CVE-2018-8786 |
161,013 | FreeRDP | 445a5a42c500ceb80f8fa7f2c11f3682538033f3 | https://github.com/FreeRDP/FreeRDP | https://github.com/FreeRDP/FreeRDP/commit/445a5a42c500ceb80f8fa7f2c11f3682538033f3 | Fixed CVE-2018-8786
Thanks to Eyal Itkin from Check Point Software Technologies. | 0 | BITMAP_UPDATE* update_read_bitmap_update(rdpUpdate* update, wStream* s)
{
UINT32 i;
BITMAP_UPDATE* bitmapUpdate = calloc(1, sizeof(BITMAP_UPDATE));
if (!bitmapUpdate)
goto fail;
if (Stream_GetRemainingLength(s) < 2)
goto fail;
Stream_Read_UINT16(s, bitmapUpdate->number); /* numberRectangles (2 bytes) */
WL... | 213,214,190,834,677,970,000,000,000,000,000,000,000 | update.c | 249,848,087,189,512,400,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-8786 | FreeRDP prior to version 2.0.0-rc4 contains an Integer Truncation that leads to a Heap-Based Buffer Overflow in function update_read_bitmap_update() and results in a memory corruption and probably even a remote code execution. | https://nvd.nist.gov/vuln/detail/CVE-2018-8786 |
3,757 | FreeRDP | 17c363a5162fd4dc77b1df54e48d7bd9bf6b3be7 | https://github.com/FreeRDP/FreeRDP | https://github.com/FreeRDP/FreeRDP/commit/17c363a5162fd4dc77b1df54e48d7bd9bf6b3be7 | Fixed CVE-2018-8784
Thanks to Eyal Itkin from Check Point Software Technologies. | 1 | static BOOL zgfx_decompress_segment(ZGFX_CONTEXT* zgfx, wStream* stream, size_t segmentSize)
{
BYTE c;
BYTE flags;
UINT32 extra = 0;
int opIndex;
int haveBits;
int inPrefix;
UINT32 count;
UINT32 distance;
BYTE* pbSegment;
size_t cbSegment = segmentSize - 1;
if ((Stream_GetRemainingLength(stream) < segme... | 48,551,217,187,937,530,000,000,000,000,000,000,000 | zgfx.c | 146,200,484,448,513,670,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-8784 | FreeRDP prior to version 2.0.0-rc4 contains a Heap-Based Buffer Overflow in function zgfx_decompress_segment() that results in a memory corruption and probably even a remote code execution. | https://nvd.nist.gov/vuln/detail/CVE-2018-8784 |
161,015 | FreeRDP | 17c363a5162fd4dc77b1df54e48d7bd9bf6b3be7 | https://github.com/FreeRDP/FreeRDP | https://github.com/FreeRDP/FreeRDP/commit/17c363a5162fd4dc77b1df54e48d7bd9bf6b3be7 | Fixed CVE-2018-8784
Thanks to Eyal Itkin from Check Point Software Technologies. | 0 | static BOOL zgfx_decompress_segment(ZGFX_CONTEXT* zgfx, wStream* stream, size_t segmentSize)
{
BYTE c;
BYTE flags;
UINT32 extra = 0;
int opIndex;
int haveBits;
int inPrefix;
UINT32 count;
UINT32 distance;
BYTE* pbSegment;
size_t cbSegment;
if (!zgfx || !stream)
return FALSE;
cbSegment = segmentSize ... | 5,631,931,520,153,907,000,000,000,000,000,000,000 | zgfx.c | 51,544,153,158,023,390,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-8784 | FreeRDP prior to version 2.0.0-rc4 contains a Heap-Based Buffer Overflow in function zgfx_decompress_segment() that results in a memory corruption and probably even a remote code execution. | https://nvd.nist.gov/vuln/detail/CVE-2018-8784 |
3,760 | linux | 0ddcff49b672239dda94d70d0fcf50317a9f4b51 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0ddcff49b672239dda94d70d0fcf50317a9f4b51 | mac80211_hwsim: fix possible memory leak in hwsim_new_radio_nl()
'hwname' is malloced in hwsim_new_radio_nl() and should be freed
before leaving from the error handling cases, otherwise it will cause
memory leak.
Fixes: ff4dd73dd2b4 ("mac80211_hwsim: check HWSIM_ATTR_RADIO_NAME length")
Signed-off-by: Wei Yongjun <we... | 1 | static int hwsim_new_radio_nl(struct sk_buff *msg, struct genl_info *info)
{
struct hwsim_new_radio_params param = { 0 };
const char *hwname = NULL;
int ret;
param.reg_strict = info->attrs[HWSIM_ATTR_REG_STRICT_REG];
param.p2p_device = info->attrs[HWSIM_ATTR_SUPPORT_P2P_DEVICE];
param.channels = channels;
param... | 260,520,256,202,264,520,000,000,000,000,000,000,000 | mac80211_hwsim.c | 75,874,823,711,895,600,000,000,000,000,000,000,000 | [
"CWE-772"
] | CVE-2018-8087 | Memory leak in the hwsim_new_radio_nl function in drivers/net/wireless/mac80211_hwsim.c in the Linux kernel through 4.15.9 allows local users to cause a denial of service (memory consumption) by triggering an out-of-array error case. | https://nvd.nist.gov/vuln/detail/CVE-2018-8087 |
161,016 | linux | 0ddcff49b672239dda94d70d0fcf50317a9f4b51 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0ddcff49b672239dda94d70d0fcf50317a9f4b51 | mac80211_hwsim: fix possible memory leak in hwsim_new_radio_nl()
'hwname' is malloced in hwsim_new_radio_nl() and should be freed
before leaving from the error handling cases, otherwise it will cause
memory leak.
Fixes: ff4dd73dd2b4 ("mac80211_hwsim: check HWSIM_ATTR_RADIO_NAME length")
Signed-off-by: Wei Yongjun <we... | 0 | static int hwsim_new_radio_nl(struct sk_buff *msg, struct genl_info *info)
{
struct hwsim_new_radio_params param = { 0 };
const char *hwname = NULL;
int ret;
param.reg_strict = info->attrs[HWSIM_ATTR_REG_STRICT_REG];
param.p2p_device = info->attrs[HWSIM_ATTR_SUPPORT_P2P_DEVICE];
param.channels = channels;
param... | 84,720,724,825,544,020,000,000,000,000,000,000,000 | mac80211_hwsim.c | 137,254,228,526,880,320,000,000,000,000,000,000,000 | [
"CWE-772"
] | CVE-2018-8087 | Memory leak in the hwsim_new_radio_nl function in drivers/net/wireless/mac80211_hwsim.c in the Linux kernel through 4.15.9 allows local users to cause a denial of service (memory consumption) by triggering an out-of-array error case. | https://nvd.nist.gov/vuln/detail/CVE-2018-8087 |
3,761 | linux | 297a6961ffb8ff4dc66c9fbf53b924bd1dda05d5 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/297a6961ffb8ff4dc66c9fbf53b924bd1dda05d5 | net: phy: mdio-bcm-unimac: fix potential NULL dereference in unimac_mdio_probe()
platform_get_resource() may fail and return NULL, so we should
better check it's return value to avoid a NULL pointer dereference
a bit later in the code.
This is detected by Coccinelle semantic patch.
@@
expression pdev, res, n, t, e, ... | 1 | static int unimac_mdio_probe(struct platform_device *pdev)
{
struct unimac_mdio_pdata *pdata = pdev->dev.platform_data;
struct unimac_mdio_priv *priv;
struct device_node *np;
struct mii_bus *bus;
struct resource *r;
int ret;
np = pdev->dev.of_node;
priv = devm_kzalloc(&pdev->dev, sizeof(*priv), GFP_KERNEL);
... | 265,342,746,482,685,360,000,000,000,000,000,000,000 | mdio-bcm-unimac.c | 301,959,438,202,686,220,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2018-8043 | The unimac_mdio_probe function in drivers/net/phy/mdio-bcm-unimac.c in the Linux kernel through 4.15.8 does not validate certain resource availability, which allows local users to cause a denial of service (NULL pointer dereference). | https://nvd.nist.gov/vuln/detail/CVE-2018-8043 |
161,017 | linux | 297a6961ffb8ff4dc66c9fbf53b924bd1dda05d5 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/297a6961ffb8ff4dc66c9fbf53b924bd1dda05d5 | net: phy: mdio-bcm-unimac: fix potential NULL dereference in unimac_mdio_probe()
platform_get_resource() may fail and return NULL, so we should
better check it's return value to avoid a NULL pointer dereference
a bit later in the code.
This is detected by Coccinelle semantic patch.
@@
expression pdev, res, n, t, e, ... | 0 | static int unimac_mdio_probe(struct platform_device *pdev)
{
struct unimac_mdio_pdata *pdata = pdev->dev.platform_data;
struct unimac_mdio_priv *priv;
struct device_node *np;
struct mii_bus *bus;
struct resource *r;
int ret;
np = pdev->dev.of_node;
priv = devm_kzalloc(&pdev->dev, sizeof(*priv), GFP_KERNEL);
... | 73,284,772,991,509,900,000,000,000,000,000,000,000 | mdio-bcm-unimac.c | 286,624,256,882,919,930,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2018-8043 | The unimac_mdio_probe function in drivers/net/phy/mdio-bcm-unimac.c in the Linux kernel through 4.15.8 does not validate certain resource availability, which allows local users to cause a denial of service (NULL pointer dereference). | https://nvd.nist.gov/vuln/detail/CVE-2018-8043 |
3,762 | libvips | 20d840e6da15c1574b3ed998bc92f91d1e36c2a5 | https://github.com/libvips/libvips | https://github.com/jcupitt/libvips/commit/20d840e6da15c1574b3ed998bc92f91d1e36c2a5 | fix a crash with delayed load
If a delayed load failed, it could leave the pipeline only half-set up.
Sebsequent threads could then segv.
Set a load-has-failed flag and test before generate.
See https://github.com/jcupitt/libvips/issues/893 | 1 | vips_foreign_load_start( VipsImage *out, void *a, void *b )
{
VipsForeignLoad *load = VIPS_FOREIGN_LOAD( b );
VipsForeignLoadClass *class = VIPS_FOREIGN_LOAD_GET_CLASS( load );
if( !load->real ) {
if( !(load->real = vips_foreign_load_temp( load )) )
return( NULL );
#ifdef DEBUG
printf( "vips_foreign_l... | 279,924,439,095,021,870,000,000,000,000,000,000,000 | foreign.c | 110,778,714,136,646,050,000,000,000,000,000,000,000 | [
"CWE-362"
] | CVE-2018-7998 | In libvips before 8.6.3, a NULL function pointer dereference vulnerability was found in the vips_region_generate function in region.c, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted image file. This occurs because of a race condition involving a failed... | https://nvd.nist.gov/vuln/detail/CVE-2018-7998 |
161,018 | libvips | 20d840e6da15c1574b3ed998bc92f91d1e36c2a5 | https://github.com/libvips/libvips | https://github.com/jcupitt/libvips/commit/20d840e6da15c1574b3ed998bc92f91d1e36c2a5 | fix a crash with delayed load
If a delayed load failed, it could leave the pipeline only half-set up.
Sebsequent threads could then segv.
Set a load-has-failed flag and test before generate.
See https://github.com/jcupitt/libvips/issues/893 | 0 | vips_foreign_load_start( VipsImage *out, void *a, void *b )
{
VipsForeignLoad *load = VIPS_FOREIGN_LOAD( b );
VipsForeignLoadClass *class = VIPS_FOREIGN_LOAD_GET_CLASS( load );
/* If this start has failed before in another thread, we can fail now.
*/
if( load->error )
return( NULL );
if( !load->real ) {
... | 306,948,291,873,726,800,000,000,000,000,000,000,000 | foreign.c | 228,402,268,970,536,370,000,000,000,000,000,000,000 | [
"CWE-362"
] | CVE-2018-7998 | In libvips before 8.6.3, a NULL function pointer dereference vulnerability was found in the vips_region_generate function in region.c, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted image file. This occurs because of a race condition involving a failed... | https://nvd.nist.gov/vuln/detail/CVE-2018-7998 |
3,763 | linux | 4a491b1ab11ca0556d2fda1ff1301e862a2d44c4 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/4a491b1ab11ca0556d2fda1ff1301e862a2d44c4 | scsi: libsas: fix memory leak in sas_smp_get_phy_events()
We've got a memory leak with the following producer:
while true;
do cat /sys/class/sas_phy/phy-1:0:12/invalid_dword_count >/dev/null;
done
The buffer req is allocated and not freed after we return. Fix it.
Fixes: 2908d778ab3e ("[SCSI] aic94xx: new driver")
S... | 1 | int sas_smp_get_phy_events(struct sas_phy *phy)
{
int res;
u8 *req;
u8 *resp;
struct sas_rphy *rphy = dev_to_rphy(phy->dev.parent);
struct domain_device *dev = sas_find_dev_by_rphy(rphy);
req = alloc_smp_req(RPEL_REQ_SIZE);
if (!req)
return -ENOMEM;
resp = alloc_smp_resp(RPEL_RESP_SIZE);
if (!resp) {
kfr... | 239,534,202,847,056,830,000,000,000,000,000,000,000 | sas_expander.c | 20,389,702,074,033,690,000,000,000,000,000,000,000 | [
"CWE-772"
] | CVE-2018-7757 | Memory leak in the sas_smp_get_phy_events function in drivers/scsi/libsas/sas_expander.c in the Linux kernel through 4.15.7 allows local users to cause a denial of service (memory consumption) via many read accesses to files in the /sys/class/sas_phy directory, as demonstrated by the /sys/class/sas_phy/phy-1:0:12/inval... | https://nvd.nist.gov/vuln/detail/CVE-2018-7757 |
161,019 | linux | 4a491b1ab11ca0556d2fda1ff1301e862a2d44c4 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/4a491b1ab11ca0556d2fda1ff1301e862a2d44c4 | scsi: libsas: fix memory leak in sas_smp_get_phy_events()
We've got a memory leak with the following producer:
while true;
do cat /sys/class/sas_phy/phy-1:0:12/invalid_dword_count >/dev/null;
done
The buffer req is allocated and not freed after we return. Fix it.
Fixes: 2908d778ab3e ("[SCSI] aic94xx: new driver")
S... | 0 | int sas_smp_get_phy_events(struct sas_phy *phy)
{
int res;
u8 *req;
u8 *resp;
struct sas_rphy *rphy = dev_to_rphy(phy->dev.parent);
struct domain_device *dev = sas_find_dev_by_rphy(rphy);
req = alloc_smp_req(RPEL_REQ_SIZE);
if (!req)
return -ENOMEM;
resp = alloc_smp_resp(RPEL_RESP_SIZE);
if (!resp) {
kfr... | 16,211,652,808,234,612,000,000,000,000,000,000,000 | sas_expander.c | 232,026,743,340,659,800,000,000,000,000,000,000,000 | [
"CWE-772"
] | CVE-2018-7757 | Memory leak in the sas_smp_get_phy_events function in drivers/scsi/libsas/sas_expander.c in the Linux kernel through 4.15.7 allows local users to cause a denial of service (memory consumption) via many read accesses to files in the /sys/class/sas_phy directory, as demonstrated by the /sys/class/sas_phy/phy-1:0:12/inval... | https://nvd.nist.gov/vuln/detail/CVE-2018-7757 |
3,773 | linux | 9b54d816e00425c3a517514e0d677bb3cec49258 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/9b54d816e00425c3a517514e0d677bb3cec49258 | blkcg: fix double free of new_blkg in blkcg_init_queue
If blkg_create fails, new_blkg passed as an argument will
be freed by blkg_create, so there is no need to free it again.
Signed-off-by: Hou Tao <houtao1@huawei.com>
Signed-off-by: Jens Axboe <axboe@fb.com> | 1 | int blkcg_init_queue(struct request_queue *q)
{
struct blkcg_gq *new_blkg, *blkg;
bool preloaded;
int ret;
new_blkg = blkg_alloc(&blkcg_root, q, GFP_KERNEL);
if (!new_blkg)
return -ENOMEM;
preloaded = !radix_tree_preload(GFP_KERNEL);
/*
* Make sure the root blkg exists and count the existing blkgs. As
... | 94,022,243,707,851,460,000,000,000,000,000,000,000 | blk-cgroup.c | 11,694,601,837,132,450,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2018-7480 | The blkcg_init_queue function in block/blk-cgroup.c in the Linux kernel before 4.11 allows local users to cause a denial of service (double free) or possibly have unspecified other impact by triggering a creation failure. | https://nvd.nist.gov/vuln/detail/CVE-2018-7480 |
161,030 | linux | 9b54d816e00425c3a517514e0d677bb3cec49258 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/9b54d816e00425c3a517514e0d677bb3cec49258 | blkcg: fix double free of new_blkg in blkcg_init_queue
If blkg_create fails, new_blkg passed as an argument will
be freed by blkg_create, so there is no need to free it again.
Signed-off-by: Hou Tao <houtao1@huawei.com>
Signed-off-by: Jens Axboe <axboe@fb.com> | 0 | int blkcg_init_queue(struct request_queue *q)
{
struct blkcg_gq *new_blkg, *blkg;
bool preloaded;
int ret;
new_blkg = blkg_alloc(&blkcg_root, q, GFP_KERNEL);
if (!new_blkg)
return -ENOMEM;
preloaded = !radix_tree_preload(GFP_KERNEL);
/*
* Make sure the root blkg exists and count the existing blkgs. As
... | 247,660,507,643,548,620,000,000,000,000,000,000,000 | blk-cgroup.c | 91,131,812,272,412,300,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2018-7480 | The blkcg_init_queue function in block/blk-cgroup.c in the Linux kernel before 4.11 allows local users to cause a denial of service (double free) or possibly have unspecified other impact by triggering a creation failure. | https://nvd.nist.gov/vuln/detail/CVE-2018-7480 |
3,774 | leptonica | c1079bb8e77cdd426759e466729917ca37a3ed9f | https://github.com/DanBloomberg/leptonica | https://github.com/DanBloomberg/leptonica/commit/c1079bb8e77cdd426759e466729917ca37a3ed9f | prog/htmlviewer: Catch unbound memory access (CID 1386222)
rootname can have any size, so limit the amount of copied bytes.
Signed-off-by: Stefan Weil <sw@weilnetz.de> | 1 | pixHtmlViewer(const char *dirin,
const char *dirout,
const char *rootname,
l_int32 thumbwidth,
l_int32 viewwidth)
{
char *fname, *fullname, *outname;
char *mainname, *linkname, *linknameshort;
char *viewfile, *thumbfile;
char *shtm... | 91,775,814,159,057,430,000,000,000,000,000,000,000 | htmlviewer.c | 175,672,854,193,627,600,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-7247 | An issue was discovered in pixHtmlViewer in prog/htmlviewer.c in Leptonica before 1.75.3. Unsanitized input (rootname) can overflow a buffer, leading potentially to arbitrary code execution or possibly unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2018-7247 |
161,033 | leptonica | c1079bb8e77cdd426759e466729917ca37a3ed9f | https://github.com/DanBloomberg/leptonica | https://github.com/DanBloomberg/leptonica/commit/c1079bb8e77cdd426759e466729917ca37a3ed9f | prog/htmlviewer: Catch unbound memory access (CID 1386222)
rootname can have any size, so limit the amount of copied bytes.
Signed-off-by: Stefan Weil <sw@weilnetz.de> | 0 | pixHtmlViewer(const char *dirin,
const char *dirout,
const char *rootname,
l_int32 thumbwidth,
l_int32 viewwidth)
{
char *fname, *fullname, *outname;
char *mainname, *linkname, *linknameshort;
char *viewfile, *thumbfile;
char *shtm... | 188,584,470,622,570,870,000,000,000,000,000,000,000 | htmlviewer.c | 218,714,039,880,852,480,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-7247 | An issue was discovered in pixHtmlViewer in prog/htmlviewer.c in Leptonica before 1.75.3. Unsanitized input (rootname) can overflow a buffer, leading potentially to arbitrary code execution or possibly unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2018-7247 |
3,779 | leptonica | ee301cb2029db8a6289c5295daa42bba7715e99a | https://github.com/DanBloomberg/leptonica | https://github.com/DanBloomberg/leptonica/commit/ee301cb2029db8a6289c5295daa42bba7715e99a | Security fixes: expect final changes for release 1.75.3.
* Fixed a debian security issue with fscanf() reading a string with
possible buffer overflow.
* There were also a few similar situations with sscanf(). | 1 | gplotRead(const char *filename)
{
char buf[L_BUF_SIZE];
char *rootname, *title, *xlabel, *ylabel, *ignores;
l_int32 outformat, ret, version, ignore;
FILE *fp;
GPLOT *gplot;
PROCNAME("gplotRead");
if (!filename)
return (GPLOT *)ERROR_PTR("filename not defined", procName, NULL);
... | 92,835,320,699,013,360,000,000,000,000,000,000,000 | gplot.c | 223,723,602,336,187,550,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-7186 | Leptonica before 1.75.3 does not limit the number of characters in a %s format argument to fscanf or sscanf, which allows remote attackers to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a long string, as demonstrated by the gplotRead and ptaReadStream functions. | https://nvd.nist.gov/vuln/detail/CVE-2018-7186 |
161,038 | leptonica | ee301cb2029db8a6289c5295daa42bba7715e99a | https://github.com/DanBloomberg/leptonica | https://github.com/DanBloomberg/leptonica/commit/ee301cb2029db8a6289c5295daa42bba7715e99a | Security fixes: expect final changes for release 1.75.3.
* Fixed a debian security issue with fscanf() reading a string with
possible buffer overflow.
* There were also a few similar situations with sscanf(). | 0 | gplotRead(const char *filename)
{
char buf[L_BUFSIZE];
char *rootname, *title, *xlabel, *ylabel, *ignores;
l_int32 outformat, ret, version, ignore;
FILE *fp;
GPLOT *gplot;
PROCNAME("gplotRead");
if (!filename)
return (GPLOT *)ERROR_PTR("filename not defined", procName, NULL);
i... | 314,045,513,838,586,580,000,000,000,000,000,000,000 | gplot.c | 140,435,775,019,677,200,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-7186 | Leptonica before 1.75.3 does not limit the number of characters in a %s format argument to fscanf or sscanf, which allows remote attackers to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a long string, as demonstrated by the gplotRead and ptaReadStream functions. | https://nvd.nist.gov/vuln/detail/CVE-2018-7186 |
3,780 | leptonica | ee301cb2029db8a6289c5295daa42bba7715e99a | https://github.com/DanBloomberg/leptonica | https://github.com/DanBloomberg/leptonica/commit/ee301cb2029db8a6289c5295daa42bba7715e99a | Security fixes: expect final changes for release 1.75.3.
* Fixed a debian security issue with fscanf() reading a string with
possible buffer overflow.
* There were also a few similar situations with sscanf(). | 1 | ptaReadStream(FILE *fp)
{
char typestr[128];
l_int32 i, n, ix, iy, type, version;
l_float32 x, y;
PTA *pta;
PROCNAME("ptaReadStream");
if (!fp)
return (PTA *)ERROR_PTR("stream not defined", procName, NULL);
if (fscanf(fp, "\n Pta Version %d\n", &version) != 1)
retur... | 30,001,997,675,172,210,000,000,000,000,000,000,000 | ptabasic.c | 4,753,893,045,332,788,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-7186 | Leptonica before 1.75.3 does not limit the number of characters in a %s format argument to fscanf or sscanf, which allows remote attackers to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a long string, as demonstrated by the gplotRead and ptaReadStream functions. | https://nvd.nist.gov/vuln/detail/CVE-2018-7186 |
161,039 | leptonica | ee301cb2029db8a6289c5295daa42bba7715e99a | https://github.com/DanBloomberg/leptonica | https://github.com/DanBloomberg/leptonica/commit/ee301cb2029db8a6289c5295daa42bba7715e99a | Security fixes: expect final changes for release 1.75.3.
* Fixed a debian security issue with fscanf() reading a string with
possible buffer overflow.
* There were also a few similar situations with sscanf(). | 0 | ptaReadStream(FILE *fp)
{
char typestr[128]; /* hardcoded below in fscanf */
l_int32 i, n, ix, iy, type, version;
l_float32 x, y;
PTA *pta;
PROCNAME("ptaReadStream");
if (!fp)
return (PTA *)ERROR_PTR("stream not defined", procName, NULL);
if (fscanf(fp, "\n Pta Version %d\n... | 42,914,115,244,778,570,000,000,000,000,000,000,000 | ptabasic.c | 209,766,695,744,551,200,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-7186 | Leptonica before 1.75.3 does not limit the number of characters in a %s format argument to fscanf or sscanf, which allows remote attackers to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a long string, as demonstrated by the gplotRead and ptaReadStream functions. | https://nvd.nist.gov/vuln/detail/CVE-2018-7186 |
3,783 | linux | fbe0e839d1e22d88810f3ee3e2f1479be4c0aa4a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/fbe0e839d1e22d88810f3ee3e2f1479be4c0aa4a | futex: Prevent overflow by strengthen input validation
UBSAN reports signed integer overflow in kernel/futex.c:
UBSAN: Undefined behaviour in kernel/futex.c:2041:18
signed integer overflow:
0 - -2147483648 cannot be represented in type 'int'
Add a sanity check to catch negative values of nr_wake and nr_requeue.
... | 1 | static int futex_requeue(u32 __user *uaddr1, unsigned int flags,
u32 __user *uaddr2, int nr_wake, int nr_requeue,
u32 *cmpval, int requeue_pi)
{
union futex_key key1 = FUTEX_KEY_INIT, key2 = FUTEX_KEY_INIT;
int drop_count = 0, task_count = 0, ret;
struct futex_pi_state *pi_state = NULL;
struct futex_hash_bu... | 199,927,163,848,810,380,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2018-6927 | The futex_requeue function in kernel/futex.c in the Linux kernel before 4.14.15 might allow attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact by triggering a negative wake or requeue value. | https://nvd.nist.gov/vuln/detail/CVE-2018-6927 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.