idx
int64
project
string
commit_id
string
project_url
string
commit_url
string
commit_message
string
target
int64
func
string
func_hash
float64
file_name
string
file_hash
float64
cwe
list
cve
string
cve_desc
string
nvd_url
string
161,167
pam_p11
d150b60e1e14c261b113f55681419ad1dfa8a76c
https://github.com/OpenSC/pam_p11
https://github.com/OpenSC/pam_p11/commit/d150b60e1e14c261b113f55681419ad1dfa8a76c
Use EVP_PKEY_size() to allocate correct size of signature buffer. (#18) Do not use fixed buffer size for signature, EVP_SignFinal() requires buffer for signature at least EVP_PKEY_size(pkey) bytes in size. Fixes crash when using 4K RSA signatures (https://github.com/OpenSC/pam_p11/issues/16, https://github.com/OpenS...
0
static int key_verify(pam_handle_t *pamh, int flags, PKCS11_KEY *authkey) { int ok = 0; unsigned char challenge[30]; unsigned char *signature = NULL; unsigned int siglen; const EVP_MD *md = EVP_sha1(); EVP_MD_CTX *md_ctx = EVP_MD_CTX_new(); EVP_PKEY *privkey = PKCS11_get_private_key(authkey); EVP_PKEY *p...
119,882,099,747,466,950,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2019-16058
An issue was discovered in the pam_p11 component 0.2.0 and 0.3.0 for OpenSC. If a smart card creates a signature with a length longer than 256 bytes, this triggers a buffer overflow. This may be the case for RSA keys with 4096 bits depending on the signature scheme.
https://nvd.nist.gov/vuln/detail/CVE-2019-16058
3,917
linux
01ca667133d019edc9f0a1f70a272447c84ec41f
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/01ca667133d019edc9f0a1f70a272447c84ec41f
fm10k: Fix a potential NULL pointer dereference Syzkaller report this: kasan: GPF could be caused by NULL-ptr deref or user memory access general protection fault: 0000 [#1] SMP KASAN PTI CPU: 0 PID: 4378 Comm: syz-executor.0 Tainted: G C 5.0.0+ #5 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996),...
1
static int __init fm10k_init_module(void) { pr_info("%s - version %s\n", fm10k_driver_string, fm10k_driver_version); pr_info("%s\n", fm10k_copyright); /* create driver workqueue */ fm10k_workqueue = alloc_workqueue("%s", WQ_MEM_RECLAIM, 0, fm10k_driver_name); fm10k_dbg_init(); return fm10k_registe...
247,849,593,238,575,600,000,000,000,000,000,000,000
fm10k_main.c
95,898,875,623,914,100,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2019-15924
An issue was discovered in the Linux kernel before 5.0.11. fm10k_init_module in drivers/net/ethernet/intel/fm10k/fm10k_main.c has a NULL pointer dereference because there is no -ENOMEM upon an alloc_workqueue failure.
https://nvd.nist.gov/vuln/detail/CVE-2019-15924
161,168
linux
01ca667133d019edc9f0a1f70a272447c84ec41f
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/01ca667133d019edc9f0a1f70a272447c84ec41f
fm10k: Fix a potential NULL pointer dereference Syzkaller report this: kasan: GPF could be caused by NULL-ptr deref or user memory access general protection fault: 0000 [#1] SMP KASAN PTI CPU: 0 PID: 4378 Comm: syz-executor.0 Tainted: G C 5.0.0+ #5 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996),...
0
static int __init fm10k_init_module(void) { pr_info("%s - version %s\n", fm10k_driver_string, fm10k_driver_version); pr_info("%s\n", fm10k_copyright); /* create driver workqueue */ fm10k_workqueue = alloc_workqueue("%s", WQ_MEM_RECLAIM, 0, fm10k_driver_name); if (!fm10k_workqueue) return -ENOMEM; ...
116,889,031,473,772,120,000,000,000,000,000,000,000
fm10k_main.c
285,230,609,228,412,020,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2019-15924
An issue was discovered in the Linux kernel before 5.0.11. fm10k_init_module in drivers/net/ethernet/intel/fm10k/fm10k_main.c has a NULL pointer dereference because there is no -ENOMEM upon an alloc_workqueue failure.
https://nvd.nist.gov/vuln/detail/CVE-2019-15924
3,924
linux
ceabee6c59943bdd5e1da1a6a20dc7ee5f8113a2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ceabee6c59943bdd5e1da1a6a20dc7ee5f8113a2
genetlink: Fix a memory leak on error path In genl_register_family(), when idr_alloc() fails, we forget to free the memory we possibly allocate for family->attrbuf. Reported-by: Hulk Robot <hulkci@huawei.com> Fixes: 2ae0f17df1cd ("genetlink: use idr to track families") Signed-off-by: YueHaibing <yuehaibing@huawei.com...
1
int genl_register_family(struct genl_family *family) { int err, i; int start = GENL_START_ALLOC, end = GENL_MAX_ID; err = genl_validate_ops(family); if (err) return err; genl_lock_all(); if (genl_family_find_byname(family->name)) { err = -EEXIST; goto errout_locked; } /* * Sadly, a few cases need to...
108,757,618,594,854,400,000,000,000,000,000,000,000
genetlink.c
258,142,188,450,716,950,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2019-15921
An issue was discovered in the Linux kernel before 5.0.6. There is a memory leak issue when idr_alloc() fails in genl_register_family() in net/netlink/genetlink.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-15921
161,175
linux
ceabee6c59943bdd5e1da1a6a20dc7ee5f8113a2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ceabee6c59943bdd5e1da1a6a20dc7ee5f8113a2
genetlink: Fix a memory leak on error path In genl_register_family(), when idr_alloc() fails, we forget to free the memory we possibly allocate for family->attrbuf. Reported-by: Hulk Robot <hulkci@huawei.com> Fixes: 2ae0f17df1cd ("genetlink: use idr to track families") Signed-off-by: YueHaibing <yuehaibing@huawei.com...
0
int genl_register_family(struct genl_family *family) { int err, i; int start = GENL_START_ALLOC, end = GENL_MAX_ID; err = genl_validate_ops(family); if (err) return err; genl_lock_all(); if (genl_family_find_byname(family->name)) { err = -EEXIST; goto errout_locked; } /* * Sadly, a few cases need to...
287,069,545,760,732,850,000,000,000,000,000,000,000
genetlink.c
174,802,125,817,657,600,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2019-15921
An issue was discovered in the Linux kernel before 5.0.6. There is a memory leak issue when idr_alloc() fails in genl_register_family() in net/netlink/genetlink.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-15921
3,927
linux
b57a55e2200ede754e4dc9cce4ba9402544b9365
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/b57a55e2200ede754e4dc9cce4ba9402544b9365
cifs: Fix lease buffer length error There is a KASAN slab-out-of-bounds: BUG: KASAN: slab-out-of-bounds in _copy_from_iter_full+0x783/0xaa0 Read of size 80 at addr ffff88810c35e180 by task mount.cifs/539 CPU: 1 PID: 539 Comm: mount.cifs Not tainted 4.19 #10 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS ...
1
SMB2_negotiate(const unsigned int xid, struct cifs_ses *ses) { struct smb_rqst rqst; struct smb2_negotiate_req *req; struct smb2_negotiate_rsp *rsp; struct kvec iov[1]; struct kvec rsp_iov; int rc = 0; int resp_buftype; struct TCP_Server_Info *server = ses->server; int blob_offset, blob_length; char *security...
205,015,380,050,265,500,000,000,000,000,000,000,000
smb2pdu.c
140,544,539,280,537,400,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-15918
An issue was discovered in the Linux kernel before 5.0.10. SMB2_negotiate in fs/cifs/smb2pdu.c has an out-of-bounds read because data structures are incompletely updated after a change from smb30 to smb21.
https://nvd.nist.gov/vuln/detail/CVE-2019-15918
161,176
linux
b57a55e2200ede754e4dc9cce4ba9402544b9365
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/b57a55e2200ede754e4dc9cce4ba9402544b9365
cifs: Fix lease buffer length error There is a KASAN slab-out-of-bounds: BUG: KASAN: slab-out-of-bounds in _copy_from_iter_full+0x783/0xaa0 Read of size 80 at addr ffff88810c35e180 by task mount.cifs/539 CPU: 1 PID: 539 Comm: mount.cifs Not tainted 4.19 #10 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS ...
0
SMB2_negotiate(const unsigned int xid, struct cifs_ses *ses) { struct smb_rqst rqst; struct smb2_negotiate_req *req; struct smb2_negotiate_rsp *rsp; struct kvec iov[1]; struct kvec rsp_iov; int rc = 0; int resp_buftype; struct TCP_Server_Info *server = ses->server; int blob_offset, blob_length; char *security...
207,845,521,536,535,400,000,000,000,000,000,000,000
smb2pdu.c
272,372,347,126,887,120,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-15918
An issue was discovered in the Linux kernel before 5.0.10. SMB2_negotiate in fs/cifs/smb2pdu.c has an out-of-bounds read because data structures are incompletely updated after a change from smb30 to smb21.
https://nvd.nist.gov/vuln/detail/CVE-2019-15918
3,928
linux
56897b217a1d0a91c9920cb418d6b3fe922f590a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/56897b217a1d0a91c9920cb418d6b3fe922f590a
Bluetooth: hci_ldisc: Postpone HCI_UART_PROTO_READY bit set in hci_uart_set_proto() task A: task B: hci_uart_set_proto flush_to_ldisc - p->open(hu) -> h5_open //alloc h5 - receive_buf - set_bit HCI_UART_PROTO_READY - tty_port_default_receive_buf - hci_uar...
1
static int hci_uart_set_proto(struct hci_uart *hu, int id) { const struct hci_uart_proto *p; int err; p = hci_uart_get_proto(id); if (!p) return -EPROTONOSUPPORT; hu->proto = p; set_bit(HCI_UART_PROTO_READY, &hu->flags); err = hci_uart_register_dev(hu); if (err) { clear_bit(HCI_UART_PROTO_READY, &h...
136,154,177,591,265,250,000,000,000,000,000,000,000
hci_ldisc.c
5,927,913,923,078,270,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2019-15917
An issue was discovered in the Linux kernel before 5.0.5. There is a use-after-free issue when hci_uart_register_dev() fails in hci_uart_set_proto() in drivers/bluetooth/hci_ldisc.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-15917
161,177
linux
56897b217a1d0a91c9920cb418d6b3fe922f590a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/56897b217a1d0a91c9920cb418d6b3fe922f590a
Bluetooth: hci_ldisc: Postpone HCI_UART_PROTO_READY bit set in hci_uart_set_proto() task A: task B: hci_uart_set_proto flush_to_ldisc - p->open(hu) -> h5_open //alloc h5 - receive_buf - set_bit HCI_UART_PROTO_READY - tty_port_default_receive_buf - hci_uar...
0
static int hci_uart_set_proto(struct hci_uart *hu, int id) { const struct hci_uart_proto *p; int err; p = hci_uart_get_proto(id); if (!p) return -EPROTONOSUPPORT; hu->proto = p; err = hci_uart_register_dev(hu); if (err) { return err; } set_bit(HCI_UART_PROTO_READY, &hu->flags); return 0; }
293,965,652,228,405,500,000,000,000,000,000,000,000
hci_ldisc.c
195,205,955,910,275,230,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2019-15917
An issue was discovered in the Linux kernel before 5.0.5. There is a use-after-free issue when hci_uart_register_dev() fails in hci_uart_set_proto() in drivers/bluetooth/hci_ldisc.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-15917
3,933
linux
1fb254aa983bf190cfd685d40c64a480a9bafaee
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1fb254aa983bf190cfd685d40c64a480a9bafaee
xfs: fix missing ILOCK unlock when xfs_setattr_nonsize fails due to EDQUOT Benjamin Moody reported to Debian that XFS partially wedges when a chgrp fails on account of being out of disk quota. I ran his reproducer script: # adduser dummy # adduser dummy plugdev # dd if=/dev/zero bs=1M count=100 of=test.img # mkfs.x...
1
xfs_setattr_nonsize( struct xfs_inode *ip, struct iattr *iattr, int flags) { xfs_mount_t *mp = ip->i_mount; struct inode *inode = VFS_I(ip); int mask = iattr->ia_valid; xfs_trans_t *tp; int error; kuid_t uid = GLOBAL_ROOT_UID, iuid = GLOBAL_ROOT_UID; kgid_t gid = GLOBAL_ROOT_GID, igid = GLOBAL_R...
255,274,943,777,258,100,000,000,000,000,000,000,000
xfs_iops.c
170,511,364,161,316,920,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2019-15538
An issue was discovered in xfs_setattr_nonsize in fs/xfs/xfs_iops.c in the Linux kernel through 5.2.9. XFS partially wedges when a chgrp fails on account of being out of disk quota. xfs_setattr_nonsize is failing to unlock the ILOCK after the xfs_qm_vop_chown_reserve call fails. This is primarily a local DoS attack vec...
https://nvd.nist.gov/vuln/detail/CVE-2019-15538
161,182
linux
1fb254aa983bf190cfd685d40c64a480a9bafaee
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/1fb254aa983bf190cfd685d40c64a480a9bafaee
xfs: fix missing ILOCK unlock when xfs_setattr_nonsize fails due to EDQUOT Benjamin Moody reported to Debian that XFS partially wedges when a chgrp fails on account of being out of disk quota. I ran his reproducer script: # adduser dummy # adduser dummy plugdev # dd if=/dev/zero bs=1M count=100 of=test.img # mkfs.x...
0
xfs_setattr_nonsize( struct xfs_inode *ip, struct iattr *iattr, int flags) { xfs_mount_t *mp = ip->i_mount; struct inode *inode = VFS_I(ip); int mask = iattr->ia_valid; xfs_trans_t *tp; int error; kuid_t uid = GLOBAL_ROOT_UID, iuid = GLOBAL_ROOT_UID; kgid_t gid = GLOBAL_ROOT_GID, igid = GLOBAL_R...
77,799,141,129,902,640,000,000,000,000,000,000,000
xfs_iops.c
30,964,977,899,984,950,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2019-15538
An issue was discovered in xfs_setattr_nonsize in fs/xfs/xfs_iops.c in the Linux kernel through 5.2.9. XFS partially wedges when a chgrp fails on account of being out of disk quota. xfs_setattr_nonsize is failing to unlock the ILOCK after the xfs_qm_vop_chown_reserve call fails. This is primarily a local DoS attack vec...
https://nvd.nist.gov/vuln/detail/CVE-2019-15538
3,935
tcpdump
0b661e0aa61850234b64394585cf577aac570bf4
https://github.com/the-tcpdump-group/tcpdump
https://github.com/the-tcpdump-group/tcpdump/commit/0b661e0aa61850234b64394585cf577aac570bf4
(for 4.9.3) LMP: Add some missing bounds checks In lmp_print_data_link_subobjs(), these problems were identified through code review. Moreover: Add and use tstr[]. Update two tests outputs accordingly.
1
lmp_print_data_link_subobjs(netdissect_options *ndo, const u_char *obj_tptr, int total_subobj_len, int offset) { int hexdump = FALSE; int subobj_type, subobj_len; union { /* int to float conversion buffer */ float f; uint32_t i; } bw; while (total_sub...
157,557,897,929,143,570,000,000,000,000,000,000,000
print-lmp.c
284,566,342,901,425,540,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2019-15166
lmp_print_data_link_subobjs() in print-lmp.c in tcpdump before 4.9.3 lacks certain bounds checks.
https://nvd.nist.gov/vuln/detail/CVE-2019-15166
161,186
tcpdump
0b661e0aa61850234b64394585cf577aac570bf4
https://github.com/the-tcpdump-group/tcpdump
https://github.com/the-tcpdump-group/tcpdump/commit/0b661e0aa61850234b64394585cf577aac570bf4
(for 4.9.3) LMP: Add some missing bounds checks In lmp_print_data_link_subobjs(), these problems were identified through code review. Moreover: Add and use tstr[]. Update two tests outputs accordingly.
0
lmp_print_data_link_subobjs(netdissect_options *ndo, const u_char *obj_tptr, int total_subobj_len, int offset) { int hexdump = FALSE; int subobj_type, subobj_len; union { /* int to float conversion buffer */ float f; uint32_t i; } bw; while (total_sub...
35,106,151,798,043,010,000,000,000,000,000,000,000
print-lmp.c
80,152,652,382,804,110,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2019-15166
lmp_print_data_link_subobjs() in print-lmp.c in tcpdump before 4.9.3 lacks certain bounds checks.
https://nvd.nist.gov/vuln/detail/CVE-2019-15166
3,936
libpcap
a5a36d9e82dde7265e38fe1f87b7f11c461c29f6
https://github.com/the-tcpdump-group/libpcap
https://github.com/the-tcpdump-group/libpcap/commit/a5a36d9e82dde7265e38fe1f87b7f11c461c29f6
Fix some format warnings.
1
pcap_ng_check_header(const uint8_t *magic, FILE *fp, u_int precision, char *errbuf, int *err) { bpf_u_int32 magic_int; size_t amt_read; bpf_u_int32 total_length; bpf_u_int32 byte_order_magic; struct block_header *bhdrp; struct section_header_block *shbp; pcap_t *p; int swapped = 0; struct pcap_ng_sf *ps; ...
62,382,392,079,134,400,000,000,000,000,000,000,000
sf-pcapng.c
148,887,623,957,953,060,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2019-15165
sf-pcapng.c in libpcap before 1.9.1 does not properly validate the PHB header length before allocating memory.
https://nvd.nist.gov/vuln/detail/CVE-2019-15165
161,187
libpcap
a5a36d9e82dde7265e38fe1f87b7f11c461c29f6
https://github.com/the-tcpdump-group/libpcap
https://github.com/the-tcpdump-group/libpcap/commit/a5a36d9e82dde7265e38fe1f87b7f11c461c29f6
Fix some format warnings.
0
pcap_ng_check_header(const uint8_t *magic, FILE *fp, u_int precision, char *errbuf, int *err) { bpf_u_int32 magic_int; size_t amt_read; bpf_u_int32 total_length; bpf_u_int32 byte_order_magic; struct block_header *bhdrp; struct section_header_block *shbp; pcap_t *p; int swapped = 0; struct pcap_ng_sf *ps; ...
127,261,570,381,351,610,000,000,000,000,000,000,000
sf-pcapng.c
266,983,192,750,041,900,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2019-15165
sf-pcapng.c in libpcap before 1.9.1 does not properly validate the PHB header length before allocating memory.
https://nvd.nist.gov/vuln/detail/CVE-2019-15165
3,937
gpmf-parser
341f12cd5b97ab419e53853ca00176457c9f1681
https://github.com/gopro/gpmf-parser
https://github.com/gopro/gpmf-parser/commit/341f12cd5b97ab419e53853ca00176457c9f1681
fixed many security issues with the too crude mp4 reader
1
GPMF_ERR IsValidSize(GPMF_stream *ms, uint32_t size) // size is in longs not bytes. { if (ms) { int32_t nestsize = (int32_t)ms->nest_size[ms->nest_level]; if (nestsize == 0 && ms->nest_level == 0) nestsize = ms->buffer_size_longs; if (size + 2 <= nestsize) return GPMF_OK; } return GPMF_ERROR_BAD_STR...
39,887,036,510,019,133,000,000,000,000,000,000,000
GPMF_parser.c
101,923,111,988,893,630,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2019-15148
GoPro GPMF-parser 1.2.2 has an out-of-bounds write in OpenMP4Source in demo/GPMF_mp4reader.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-15148
161,192
gpmf-parser
341f12cd5b97ab419e53853ca00176457c9f1681
https://github.com/gopro/gpmf-parser
https://github.com/gopro/gpmf-parser/commit/341f12cd5b97ab419e53853ca00176457c9f1681
fixed many security issues with the too crude mp4 reader
0
GPMF_ERR IsValidSize(GPMF_stream *ms, uint32_t size) // size is in longs not bytes. { if (ms) { uint32_t nestsize = (uint32_t)ms->nest_size[ms->nest_level]; if (nestsize == 0 && ms->nest_level == 0) nestsize = ms->buffer_size_longs; if (size + 2 <= nestsize) return GPMF_OK; } return GPMF_ERROR_BAD_S...
132,179,529,803,237,370,000,000,000,000,000,000,000
GPMF_parser.c
182,530,503,286,923,300,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2019-15148
GoPro GPMF-parser 1.2.2 has an out-of-bounds write in OpenMP4Source in demo/GPMF_mp4reader.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-15148
3,943
gpmf-parser
341f12cd5b97ab419e53853ca00176457c9f1681
https://github.com/gopro/gpmf-parser
https://github.com/gopro/gpmf-parser/commit/341f12cd5b97ab419e53853ca00176457c9f1681
fixed many security issues with the too crude mp4 reader
1
size_t OpenMP4Source(char *filename, uint32_t traktype, uint32_t traksubtype) //RAW or within MP4 { mp4object *mp4 = (mp4object *)malloc(sizeof(mp4object)); if (mp4 == NULL) return 0; memset(mp4, 0, sizeof(mp4object)); #ifdef _WINDOWS fopen_s(&mp4->mediafp, filename, "rb"); #else mp4->mediafp = fopen(fil...
268,050,768,699,578,650,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2019-15148
GoPro GPMF-parser 1.2.2 has an out-of-bounds write in OpenMP4Source in demo/GPMF_mp4reader.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-15148
161,198
gpmf-parser
341f12cd5b97ab419e53853ca00176457c9f1681
https://github.com/gopro/gpmf-parser
https://github.com/gopro/gpmf-parser/commit/341f12cd5b97ab419e53853ca00176457c9f1681
fixed many security issues with the too crude mp4 reader
0
size_t OpenMP4Source(char *filename, uint32_t traktype, uint32_t traksubtype) //RAW or within MP4 { mp4object *mp4 = (mp4object *)malloc(sizeof(mp4object)); if (mp4 == NULL) return 0; memset(mp4, 0, sizeof(mp4object)); struct stat64 mp4stat; stat64(filename, &mp4stat); mp4->filesize = mp4stat.st_size; if...
301,629,921,569,976,400,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2019-15148
GoPro GPMF-parser 1.2.2 has an out-of-bounds write in OpenMP4Source in demo/GPMF_mp4reader.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-15148
3,946
ImageMagick6
3c53413eb544cc567309b4c86485eae43e956112
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/3c53413eb544cc567309b4c86485eae43e956112
https://github.com/ImageMagick/ImageMagick/issues/1560
1
static MagickBooleanType WriteTIFFImage(const ImageInfo *image_info, Image *image) { const char *mode, *option; CompressionType compression; EndianType endian_type; MagickBooleanType debug, status; MagickOffsetType scene; QuantumInfo *quantum_info; QuantumType q...
36,416,815,289,515,490,000,000,000,000,000,000,000
tiff.c
27,570,316,504,444,440,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-15141
WriteTIFFImage in coders/tiff.c in ImageMagick 7.0.8-43 Q16 allows attackers to cause a denial-of-service (application crash resulting from a heap-based buffer over-read) via a crafted TIFF image file, related to TIFFRewriteDirectory, TIFFWriteDirectory, TIFFWriteDirectorySec, and TIFFWriteDirectoryTagColormap in tif_d...
https://nvd.nist.gov/vuln/detail/CVE-2019-15141
161,201
ImageMagick6
3c53413eb544cc567309b4c86485eae43e956112
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/3c53413eb544cc567309b4c86485eae43e956112
https://github.com/ImageMagick/ImageMagick/issues/1560
0
static MagickBooleanType WriteTIFFImage(const ImageInfo *image_info, Image *image) { const char *mode, *option; CompressionType compression; EndianType endian_type; MagickBooleanType debug, status; MagickOffsetType scene; QuantumInfo *quantum_info; QuantumType q...
10,545,407,722,899,735,000,000,000,000,000,000,000
tiff.c
224,376,204,816,051,970,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-15141
WriteTIFFImage in coders/tiff.c in ImageMagick 7.0.8-43 Q16 allows attackers to cause a denial-of-service (application crash resulting from a heap-based buffer over-read) via a crafted TIFF image file, related to TIFFRewriteDirectory, TIFFWriteDirectory, TIFFWriteDirectorySec, and TIFFWriteDirectoryTagColormap in tif_d...
https://nvd.nist.gov/vuln/detail/CVE-2019-15141
3,949
ImageMagick
c78993d138bf480ab4652b5a48379d4ff75ba5f7
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/c78993d138bf480ab4652b5a48379d4ff75ba5f7
https://github.com/ImageMagick/ImageMagick/issues/1553
1
static Image *ReadXWDImage(const ImageInfo *image_info,ExceptionInfo *exception) { #define CheckOverflowException(length,width,height) \ (((height) != 0) && ((length)/((size_t) height) != ((size_t) width))) char *comment; Image *image; int x_status; MagickBooleanType authentic_colormap; ...
233,532,117,835,758,400,000,000,000,000,000,000,000
xwd.c
57,456,086,150,064,630,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-15139
The XWD image (X Window System window dumping file) parsing component in ImageMagick 7.0.8-41 Q16 allows attackers to cause a denial-of-service (application crash resulting from an out-of-bounds Read) in ReadXWDImage in coders/xwd.c by crafting a corrupted XWD image file, a different vulnerability than CVE-2019-11472.
https://nvd.nist.gov/vuln/detail/CVE-2019-15139
161,204
ImageMagick
c78993d138bf480ab4652b5a48379d4ff75ba5f7
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/c78993d138bf480ab4652b5a48379d4ff75ba5f7
https://github.com/ImageMagick/ImageMagick/issues/1553
0
static Image *ReadXWDImage(const ImageInfo *image_info,ExceptionInfo *exception) { #define CheckOverflowException(length,width,height) \ (((height) != 0) && ((length)/((size_t) height) != ((size_t) width))) char *comment; Image *image; int x_status; MagickBooleanType authentic_colormap; ...
135,003,230,908,140,000,000,000,000,000,000,000,000
xwd.c
239,296,098,258,768,720,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-15139
The XWD image (X Window System window dumping file) parsing component in ImageMagick 7.0.8-41 Q16 allows attackers to cause a denial-of-service (application crash resulting from an out-of-bounds Read) in ReadXWDImage in coders/xwd.c by crafting a corrupted XWD image file, a different vulnerability than CVE-2019-11472.
https://nvd.nist.gov/vuln/detail/CVE-2019-15139
3,954
ImageMagick6
b522d2d857d2f75b659936b59b0da9df1682c256
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/b522d2d857d2f75b659936b59b0da9df1682c256
https://github.com/ImageMagick/ImageMagick/issues/1552
1
MagickExport Image *MeanShiftImage(const Image *image,const size_t width, const size_t height,const double color_distance,ExceptionInfo *exception) { #define MaxMeanShiftIterations 100 #define MeanShiftImageTag "MeanShift/Image" CacheView *image_view, *mean_view, *pixel_view; Image *mean_image...
231,391,488,542,660,700,000,000,000,000,000,000,000
feature.c
334,519,932,082,623,530,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2019-14981
In ImageMagick 7.x before 7.0.8-41 and 6.x before 6.9.10-41, there is a divide-by-zero vulnerability in the MeanShiftImage function. It allows an attacker to cause a denial of service by sending a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2019-14981
161,209
ImageMagick6
b522d2d857d2f75b659936b59b0da9df1682c256
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/b522d2d857d2f75b659936b59b0da9df1682c256
https://github.com/ImageMagick/ImageMagick/issues/1552
0
MagickExport Image *MeanShiftImage(const Image *image,const size_t width, const size_t height,const double color_distance,ExceptionInfo *exception) { #define MaxMeanShiftIterations 100 #define MeanShiftImageTag "MeanShift/Image" CacheView *image_view, *mean_view, *pixel_view; Image *mean_image...
49,100,708,930,099,580,000,000,000,000,000,000,000
feature.c
207,947,771,459,608,770,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2019-14981
In ImageMagick 7.x before 7.0.8-41 and 6.x before 6.9.10-41, there is a divide-by-zero vulnerability in the MeanShiftImage function. It allows an attacker to cause a denial of service by sending a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2019-14981
3,955
ImageMagick6
614a257295bdcdeda347086761062ac7658b6830
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/614a257295bdcdeda347086761062ac7658b6830
https://github.com/ImageMagick/ImageMagick6/issues/43
1
MagickExport unsigned char *DetachBlob(BlobInfo *blob_info) { unsigned char *data; assert(blob_info != (BlobInfo *) NULL); if (blob_info->debug != MagickFalse) (void) LogMagickEvent(TraceEvent,GetMagickModule(),"..."); if (blob_info->mapped != MagickFalse) { (void) UnmapBlob(blob_info->dat...
230,870,644,106,464,150,000,000,000,000,000,000,000
blob.c
310,539,915,566,168,340,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2019-14980
In ImageMagick 7.x before 7.0.8-42 and 6.x before 6.9.10-42, there is a use after free vulnerability in the UnmapBlob function that allows an attacker to cause a denial of service by sending a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2019-14980
161,210
ImageMagick6
614a257295bdcdeda347086761062ac7658b6830
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/614a257295bdcdeda347086761062ac7658b6830
https://github.com/ImageMagick/ImageMagick6/issues/43
0
MagickExport unsigned char *DetachBlob(BlobInfo *blob_info) { unsigned char *data; assert(blob_info != (BlobInfo *) NULL); if (blob_info->debug != MagickFalse) (void) LogMagickEvent(TraceEvent,GetMagickModule(),"..."); if (blob_info->mapped != MagickFalse) { (void) UnmapBlob(blob_info->dat...
248,318,823,094,126,720,000,000,000,000,000,000,000
blob.c
199,613,840,358,723,470,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2019-14980
In ImageMagick 7.x before 7.0.8-42 and 6.x before 6.9.10-42, there is a use after free vulnerability in the UnmapBlob function that allows an attacker to cause a denial of service by sending a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2019-14980
3,961
pdfresurrect
0c4120fffa3dffe97b95c486a120eded82afe8a6
https://github.com/enferex/pdfresurrect
https://github.com/enferex/pdfresurrect/commit/0c4120fffa3dffe97b95c486a120eded82afe8a6
Zero and sanity check all dynamic allocs. This addresses the memory issues in Issue #6 expressed in calloc_some.pdf and malloc_some.pdf
1
void pdf_load_pages_kids(FILE *fp, pdf_t *pdf) { int i, id, dummy; char *buf, *c; long start, sz; start = ftell(fp); /* Load all kids for all xref tables (versions) */ for (i=0; i<pdf->n_xrefs; i++) { if (pdf->xrefs[i].version && (pdf->xrefs[i].end != 0)) { ...
305,307,068,957,863,400,000,000,000,000,000,000,000
pdf.c
66,527,136,684,972,825,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2019-14934
An issue was discovered in PDFResurrect before 0.18. pdf_load_pages_kids in pdf.c doesn't validate a certain size value, which leads to a malloc failure and out-of-bounds write.
https://nvd.nist.gov/vuln/detail/CVE-2019-14934
161,216
pdfresurrect
0c4120fffa3dffe97b95c486a120eded82afe8a6
https://github.com/enferex/pdfresurrect
https://github.com/enferex/pdfresurrect/commit/0c4120fffa3dffe97b95c486a120eded82afe8a6
Zero and sanity check all dynamic allocs. This addresses the memory issues in Issue #6 expressed in calloc_some.pdf and malloc_some.pdf
0
void pdf_load_pages_kids(FILE *fp, pdf_t *pdf) { int i, id, dummy; char *buf, *c; long start, sz; start = ftell(fp); /* Load all kids for all xref tables (versions) */ for (i=0; i<pdf->n_xrefs; i++) { if (pdf->xrefs[i].version && (pdf->xrefs[i].end != 0)) { ...
319,526,675,347,839,870,000,000,000,000,000,000,000
pdf.c
76,381,566,457,461,010,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2019-14934
An issue was discovered in PDFResurrect before 0.18. pdf_load_pages_kids in pdf.c doesn't validate a certain size value, which leads to a malloc failure and out-of-bounds write.
https://nvd.nist.gov/vuln/detail/CVE-2019-14934
3,969
3proxy
3b67dc844789dc0f00e934270c7b349bcb547865
https://github.com/z3APA3A/3proxy
https://github.com/z3APA3A/3proxy/commit/3b67dc844789dc0f00e934270c7b349bcb547865
Fix: out-of-bounds write and few more bugs in 'admin' configuration upload
1
void * adminchild(struct clientparam* param) { int i, res; char * buf; char username[256]; char *sb; char *req = NULL; struct printparam pp; int contentlen = 0; int isform = 0; pp.inbuf = 0; pp.cp = param; buf = myalloc(LINESIZE); if(!buf) {RETURN(555);} i = sockgetlinebuf(param, CLIENT, (unsigned ...
208,643,767,936,815,360,000,000,000,000,000,000,000
webadmin.c
8,093,695,503,031,678,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2019-14495
webadmin.c in 3proxy before 0.8.13 has an out-of-bounds write in the admin interface.
https://nvd.nist.gov/vuln/detail/CVE-2019-14495
161,224
3proxy
3b67dc844789dc0f00e934270c7b349bcb547865
https://github.com/z3APA3A/3proxy
https://github.com/z3APA3A/3proxy/commit/3b67dc844789dc0f00e934270c7b349bcb547865
Fix: out-of-bounds write and few more bugs in 'admin' configuration upload
0
void * adminchild(struct clientparam* param) { int i, res; char * buf; char username[256]; char *sb; char *req = NULL; struct printparam pp; unsigned contentlen = 0; int isform = 0; pp.inbuf = 0; pp.cp = param; buf = myalloc(LINESIZE); if(!buf) {RETURN(555);} i = sockgetlinebuf(param, CLIENT, (unsi...
330,867,647,764,447,020,000,000,000,000,000,000,000
webadmin.c
210,754,516,119,364,600,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2019-14495
webadmin.c in 3proxy before 0.8.13 has an out-of-bounds write in the admin interface.
https://nvd.nist.gov/vuln/detail/CVE-2019-14495
3,970
libmodbus
5ccdf5ef79d742640355d1132fa9e2abc7fbaefc
https://github.com/stephane/libmodbus
https://github.com/stephane/libmodbus/commit/5ccdf5ef79d742640355d1132fa9e2abc7fbaefc
Fix VD-1301 and VD-1302 vulnerabilities This patch was contributed by Maor Vermucht and Or Peles from VDOO Connected Trust.
1
int modbus_reply(modbus_t *ctx, const uint8_t *req, int req_length, modbus_mapping_t *mb_mapping) { int offset; int slave; int function; uint16_t address; uint8_t rsp[MAX_MESSAGE_LENGTH]; int rsp_length = 0; sft_t sft; if (ctx == NULL) { errno = EINVAL; ...
118,810,954,539,967,250,000,000,000,000,000,000,000
modbus.c
310,438,196,523,364,550,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-14462
An issue was discovered in libmodbus before 3.0.7 and 3.1.x before 3.1.5. There is an out-of-bounds read for the MODBUS_FC_WRITE_MULTIPLE_COILS case, aka VD-1302.
https://nvd.nist.gov/vuln/detail/CVE-2019-14462
161,225
libmodbus
5ccdf5ef79d742640355d1132fa9e2abc7fbaefc
https://github.com/stephane/libmodbus
https://github.com/stephane/libmodbus/commit/5ccdf5ef79d742640355d1132fa9e2abc7fbaefc
Fix VD-1301 and VD-1302 vulnerabilities This patch was contributed by Maor Vermucht and Or Peles from VDOO Connected Trust.
0
int modbus_reply(modbus_t *ctx, const uint8_t *req, int req_length, modbus_mapping_t *mb_mapping) { int offset; int slave; int function; uint16_t address; uint8_t rsp[MAX_MESSAGE_LENGTH]; int rsp_length = 0; sft_t sft; if (ctx == NULL) { errno = EINVAL; ...
136,095,312,023,237,790,000,000,000,000,000,000,000
modbus.c
168,196,760,599,866,200,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-14462
An issue was discovered in libmodbus before 3.0.7 and 3.1.x before 3.1.5. There is an out-of-bounds read for the MODBUS_FC_WRITE_MULTIPLE_COILS case, aka VD-1302.
https://nvd.nist.gov/vuln/detail/CVE-2019-14462
3,972
nfdump
3b006ededaf351f1723aea6c727c9edd1b1fff9b
https://github.com/phaag/nfdump
https://github.com/phaag/nfdump/commit/3b006ededaf351f1723aea6c727c9edd1b1fff9b
Fix potential unsigned integer underflow
1
static void Process_ipfix_template_withdraw(exporter_ipfix_domain_t *exporter, void *DataPtr, uint32_t size_left, FlowSource_t *fs) { ipfix_template_record_t *ipfix_template_record; while ( size_left ) { uint32_t id; ipfix_template_record = (ipfix_template_record_t *)DataPtr; size_left -= 4; id = ...
255,402,460,928,750,500,000,000,000,000,000,000,000
None
null
[ "CWE-190" ]
CVE-2019-14459
nfdump 1.6.17 and earlier is affected by an integer overflow in the function Process_ipfix_template_withdraw in ipfix.c that can be abused in order to crash the process remotely (denial of service).
https://nvd.nist.gov/vuln/detail/CVE-2019-14459
161,227
nfdump
3b006ededaf351f1723aea6c727c9edd1b1fff9b
https://github.com/phaag/nfdump
https://github.com/phaag/nfdump/commit/3b006ededaf351f1723aea6c727c9edd1b1fff9b
Fix potential unsigned integer underflow
0
static void Process_ipfix_template_withdraw(exporter_ipfix_domain_t *exporter, void *DataPtr, uint32_t size_left, FlowSource_t *fs) { ipfix_template_record_t *ipfix_template_record; while ( size_left ) { uint32_t id; if ( size_left < 4 ) { LogError("Process_ipfix [%u] Template withdraw size error at %s lin...
127,575,173,521,629,320,000,000,000,000,000,000,000
None
null
[ "CWE-190" ]
CVE-2019-14459
nfdump 1.6.17 and earlier is affected by an integer overflow in the function Process_ipfix_template_withdraw in ipfix.c that can be abused in order to crash the process remotely (denial of service).
https://nvd.nist.gov/vuln/detail/CVE-2019-14459
3,973
ssdp-responder
ce04b1f29a137198182f60bbb628d5ceb8171765
https://github.com/troglobit/ssdp-responder
https://github.com/troglobit/ssdp-responder/commit/ce04b1f29a137198182f60bbb628d5ceb8171765
Fix #1: Ensure recv buf is always NUL terminated Signed-off-by: Joachim Nilsson <troglobit@gmail.com>
1
static void ssdp_recv(int sd) { ssize_t len; struct sockaddr sa; socklen_t salen; char buf[MAX_PKT_SIZE]; memset(buf, 0, sizeof(buf)); len = recvfrom(sd, buf, sizeof(buf), MSG_DONTWAIT, &sa, &salen); if (len > 0) { buf[len] = 0; if (sa.sa_family != AF_INET) return; if (strstr(buf, "M-SEARCH *...
280,032,986,814,402,150,000,000,000,000,000,000,000
ssdpd.c
339,921,506,989,161,030,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2019-14323
SSDP Responder 1.x through 1.5 mishandles incoming network messages, leading to a stack-based buffer overflow by 1 byte. This results in a crash of the server, but only when strict stack checking is enabled. This is caused by an off-by-one error in ssdp_recv in ssdpd.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-14323
161,228
ssdp-responder
ce04b1f29a137198182f60bbb628d5ceb8171765
https://github.com/troglobit/ssdp-responder
https://github.com/troglobit/ssdp-responder/commit/ce04b1f29a137198182f60bbb628d5ceb8171765
Fix #1: Ensure recv buf is always NUL terminated Signed-off-by: Joachim Nilsson <troglobit@gmail.com>
0
static void ssdp_recv(int sd) { ssize_t len; struct sockaddr sa; socklen_t salen; char buf[MAX_PKT_SIZE + 1]; memset(buf, 0, sizeof(buf)); len = recvfrom(sd, buf, sizeof(buf) - 1, MSG_DONTWAIT, &sa, &salen); if (len > 0) { if (sa.sa_family != AF_INET) return; if (strstr(buf, "M-SEARCH *")) { ...
335,161,480,007,111,900,000,000,000,000,000,000,000
ssdpd.c
285,958,017,955,953,500,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2019-14323
SSDP Responder 1.x through 1.5 mishandles incoming network messages, leading to a stack-based buffer overflow by 1 byte. This results in a crash of the server, but only when strict stack checking is enabled. This is caused by an off-by-one error in ssdp_recv in ssdpd.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-14323
3,975
linux
da99466ac243f15fbba65bd261bfc75ffa1532b6
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/da99466ac243f15fbba65bd261bfc75ffa1532b6
floppy: fix out-of-bounds read in copy_buffer This fixes a global out-of-bounds read access in the copy_buffer function of the floppy driver. The FDDEFPRM ioctl allows one to set the geometry of a disk. The sect and head fields (unsigned int) of the floppy_drive structure are used to compute the max_sector (int) in ...
1
static int set_geometry(unsigned int cmd, struct floppy_struct *g, int drive, int type, struct block_device *bdev) { int cnt; /* sanity checking for parameters. */ if (g->sect <= 0 || g->head <= 0 || /* check for zero in F_SECT_PER_TRACK */ (unsigned char)((g->sect << 2) >> FD_SIZECODE...
296,852,991,544,563,100,000,000,000,000,000,000,000
floppy.c
82,662,511,541,790,550,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-14283
In the Linux kernel before 5.2.3, set_geometry in drivers/block/floppy.c does not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk has been inserted. NOTE: QEMU creates the floppy device by default.
https://nvd.nist.gov/vuln/detail/CVE-2019-14283
161,229
linux
da99466ac243f15fbba65bd261bfc75ffa1532b6
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/da99466ac243f15fbba65bd261bfc75ffa1532b6
floppy: fix out-of-bounds read in copy_buffer This fixes a global out-of-bounds read access in the copy_buffer function of the floppy driver. The FDDEFPRM ioctl allows one to set the geometry of a disk. The sect and head fields (unsigned int) of the floppy_drive structure are used to compute the max_sector (int) in ...
0
static int set_geometry(unsigned int cmd, struct floppy_struct *g, int drive, int type, struct block_device *bdev) { int cnt; /* sanity checking for parameters. */ if ((int)g->sect <= 0 || (int)g->head <= 0 || /* check for overflow in max_sector */ (int)(g->sect * g->head) <= 0 || ...
289,239,221,328,007,470,000,000,000,000,000,000,000
floppy.c
56,207,149,155,076,080,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-14283
In the Linux kernel before 5.2.3, set_geometry in drivers/block/floppy.c does not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk has been inserted. NOTE: QEMU creates the floppy device by default.
https://nvd.nist.gov/vuln/detail/CVE-2019-14283
3,976
ImageMagick6
4f31d78716ac94c85c244efcea368fea202e2ed4
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/4f31d78716ac94c85c244efcea368fea202e2ed4
https://github.com/ImageMagick/ImageMagick/issues/1629
1
MagickExport void RemoveDuplicateLayers(Image **images, ExceptionInfo *exception) { register Image *curr, *next; RectangleInfo bounds; assert((*images) != (const Image *) NULL); assert((*images)->signature == MagickCoreSignature); if ((*images)->debug != MagickFalse) (void) LogMag...
325,777,336,146,972,950,000,000,000,000,000,000,000
layer.c
274,333,210,266,149,130,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2019-13454
ImageMagick 7.0.8-54 Q16 allows Division by Zero in RemoveDuplicateLayers in MagickCore/layer.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-13454
161,230
ImageMagick6
4f31d78716ac94c85c244efcea368fea202e2ed4
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/4f31d78716ac94c85c244efcea368fea202e2ed4
https://github.com/ImageMagick/ImageMagick/issues/1629
0
MagickExport void RemoveDuplicateLayers(Image **images, MagickExport void RemoveDuplicateLayers(Image **images,ExceptionInfo *exception) { RectangleInfo bounds; register Image *image, *next; assert((*images) != (const Image *) NULL); assert((*images)->signature == MagickCoreSignature); if...
265,112,738,087,403,950,000,000,000,000,000,000,000
None
null
[ "CWE-369" ]
CVE-2019-13454
ImageMagick 7.0.8-54 Q16 allows Division by Zero in RemoveDuplicateLayers in MagickCore/layer.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-13454
3,979
ImageMagick6
bb812022d0bc12107db215c981cab0b1ccd73d91
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/bb812022d0bc12107db215c981cab0b1ccd73d91
https://github.com/ImageMagick/ImageMagick/issues/1623
1
WandExport MagickBooleanType MogrifyImageList(ImageInfo *image_info, const int argc,const char **argv,Image **images,ExceptionInfo *exception) { ChannelType channel; const char *option; ImageInfo *mogrify_info; MagickStatusType status; QuantizeInfo *quantize_info; register ssize_t...
271,961,819,426,692,350,000,000,000,000,000,000,000
mogrify.c
239,266,582,883,320,800,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2019-13311
ImageMagick 7.0.8-50 Q16 has memory leaks at AcquireMagickMemory because of a wand/mogrify.c error.
https://nvd.nist.gov/vuln/detail/CVE-2019-13311
161,232
ImageMagick6
bb812022d0bc12107db215c981cab0b1ccd73d91
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/bb812022d0bc12107db215c981cab0b1ccd73d91
https://github.com/ImageMagick/ImageMagick/issues/1623
0
WandExport MagickBooleanType MogrifyImageList(ImageInfo *image_info, const int argc,const char **argv,Image **images,ExceptionInfo *exception) { ChannelType channel; const char *option; ImageInfo *mogrify_info; MagickStatusType status; QuantizeInfo *quantize_info; register ssize_t...
100,547,208,158,693,220,000,000,000,000,000,000,000
mogrify.c
322,727,302,508,814,900,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2019-13311
ImageMagick 7.0.8-50 Q16 has memory leaks at AcquireMagickMemory because of a wand/mogrify.c error.
https://nvd.nist.gov/vuln/detail/CVE-2019-13311
3,981
ImageMagick6
19651f3db63fa1511ed83a348c4c82fa553f8d01
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/19651f3db63fa1511ed83a348c4c82fa553f8d01
https://github.com/ImageMagick/ImageMagick/issues/1595
1
MagickExport Image *ComplexImages(const Image *images,const ComplexOperator op, ExceptionInfo *exception) { #define ComplexImageTag "Complex/Image" CacheView *Ai_view, *Ar_view, *Bi_view, *Br_view, *Ci_view, *Cr_view; const char *artifact; const Image *Ai_image, *Ar_image...
27,837,401,205,454,582,000,000,000,000,000,000,000
fourier.c
247,841,583,304,662,700,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2019-13308
ImageMagick 7.0.8-50 Q16 has a heap-based buffer overflow in MagickCore/fourier.c in ComplexImage.
https://nvd.nist.gov/vuln/detail/CVE-2019-13308
161,233
ImageMagick6
19651f3db63fa1511ed83a348c4c82fa553f8d01
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/19651f3db63fa1511ed83a348c4c82fa553f8d01
https://github.com/ImageMagick/ImageMagick/issues/1595
0
MagickExport Image *ComplexImages(const Image *images,const ComplexOperator op, ExceptionInfo *exception) { #define ComplexImageTag "Complex/Image" CacheView *Ai_view, *Ar_view, *Bi_view, *Br_view, *Ci_view, *Cr_view; const char *artifact; const Image *Ai_image, *Ar_image...
172,163,545,142,626,580,000,000,000,000,000,000,000
fourier.c
18,157,732,769,012,660,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2019-13308
ImageMagick 7.0.8-50 Q16 has a heap-based buffer overflow in MagickCore/fourier.c in ComplexImage.
https://nvd.nist.gov/vuln/detail/CVE-2019-13308
3,984
ImageMagick
7689875ef64f34141e7292f6945efdf0530b4a5e
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/7689875ef64f34141e7292f6945efdf0530b4a5e
https://github.com/ImageMagick/ImageMagick/issues/1614
1
static MagickBooleanType WritePNMImage(const ImageInfo *image_info,Image *image, ExceptionInfo *exception) { char buffer[MagickPathExtent], format, magick[MagickPathExtent]; const char *value; MagickBooleanType status; MagickOffsetType scene; Quantum index; QuantumAny ...
238,763,905,085,634,700,000,000,000,000,000,000,000
pnm.c
126,691,523,255,213,540,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2019-13304
ImageMagick 7.0.8-50 Q16 has a stack-based buffer overflow at coders/pnm.c in WritePNMImage because of a misplaced assignment.
https://nvd.nist.gov/vuln/detail/CVE-2019-13304
161,234
ImageMagick
7689875ef64f34141e7292f6945efdf0530b4a5e
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/7689875ef64f34141e7292f6945efdf0530b4a5e
https://github.com/ImageMagick/ImageMagick/issues/1614
0
static MagickBooleanType WritePNMImage(const ImageInfo *image_info,Image *image, ExceptionInfo *exception) { char buffer[MagickPathExtent], format, magick[MagickPathExtent]; const char *value; MagickBooleanType status; MagickOffsetType scene; Quantum index; QuantumAny ...
212,877,802,773,805,630,000,000,000,000,000,000,000
pnm.c
78,942,154,286,481,280,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2019-13304
ImageMagick 7.0.8-50 Q16 has a stack-based buffer overflow at coders/pnm.c in WritePNMImage because of a misplaced assignment.
https://nvd.nist.gov/vuln/detail/CVE-2019-13304
3,985
ImageMagick
d5089971bd792311aaab5cb73460326d7ef7f32d
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/d5089971bd792311aaab5cb73460326d7ef7f32d
https://github.com/ImageMagick/ImageMagick/issues/1597
1
MagickExport Image *ComplexImages(const Image *images,const ComplexOperator op, ExceptionInfo *exception) { #define ComplexImageTag "Complex/Image" CacheView *Ai_view, *Ar_view, *Bi_view, *Br_view, *Ci_view, *Cr_view; const char *artifact; const Image *Ai_image, *Ar_image...
52,955,262,328,526,060,000,000,000,000,000,000,000
fourier.c
124,486,227,486,599,340,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-13302
ImageMagick 7.0.8-50 Q16 has a heap-based buffer over-read in MagickCore/fourier.c in ComplexImages.
https://nvd.nist.gov/vuln/detail/CVE-2019-13302
161,235
ImageMagick
d5089971bd792311aaab5cb73460326d7ef7f32d
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/d5089971bd792311aaab5cb73460326d7ef7f32d
https://github.com/ImageMagick/ImageMagick/issues/1597
0
MagickExport Image *ComplexImages(const Image *images,const ComplexOperator op, ExceptionInfo *exception) { #define ComplexImageTag "Complex/Image" CacheView *Ai_view, *Ar_view, *Bi_view, *Br_view, *Ci_view, *Cr_view; const char *artifact; const Image *Ai_image, *Ar_image...
275,310,954,133,013,060,000,000,000,000,000,000,000
fourier.c
49,978,581,568,202,490,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-13302
ImageMagick 7.0.8-50 Q16 has a heap-based buffer over-read in MagickCore/fourier.c in ComplexImages.
https://nvd.nist.gov/vuln/detail/CVE-2019-13302
3,987
ImageMagick6
5e409ae7a389cdf2ed17469303be3f3f21cec450
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/5e409ae7a389cdf2ed17469303be3f3f21cec450
https://github.com/ImageMagick/ImageMagick/issues/1586
1
static MagickPixelPacket **AcquirePixelThreadSet(const Image *image) { MagickPixelPacket **pixels; register ssize_t i, j; size_t number_threads; number_threads=(size_t) GetMagickResourceLimit(ThreadResource); pixels=(MagickPixelPacket **) AcquireQuantumMemory(number_threads, s...
298,386,231,418,854,870,000,000,000,000,000,000,000
statistic.c
130,627,906,262,576,380,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2019-13300
ImageMagick 7.0.8-50 Q16 has a heap-based buffer overflow at MagickCore/statistic.c in EvaluateImages because of mishandling columns.
https://nvd.nist.gov/vuln/detail/CVE-2019-13300
161,236
ImageMagick6
5e409ae7a389cdf2ed17469303be3f3f21cec450
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/5e409ae7a389cdf2ed17469303be3f3f21cec450
https://github.com/ImageMagick/ImageMagick/issues/1586
0
static MagickPixelPacket **AcquirePixelThreadSet(const Image *image) static MagickPixelPacket **AcquirePixelThreadSet(const Image *images) { const Image *next; MagickPixelPacket **pixels; register ssize_t i, j; size_t columns, number_threads; number_threads=(size_t) GetMa...
44,242,994,469,090,320,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2019-13300
ImageMagick 7.0.8-50 Q16 has a heap-based buffer overflow at MagickCore/statistic.c in EvaluateImages because of mishandling columns.
https://nvd.nist.gov/vuln/detail/CVE-2019-13300
3,988
ImageMagick
d4fc44b58a14f76b1ac997517d742ee12c9dc5d3
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/d4fc44b58a14f76b1ac997517d742ee12c9dc5d3
https://github.com/ImageMagick/ImageMagick/issues/1611
1
MagickExport Image *EnhanceImage(const Image *image,ExceptionInfo *exception) { #define EnhanceImageTag "Enhance/Image" #define EnhancePixel(weight) \ mean=QuantumScale*((double) GetPixelRed(image,r)+pixel.red)/2.0; \ distance=QuantumScale*((double) GetPixelRed(image,r)-pixel.red); \ distance_squared=(4.0+mean)*...
39,724,954,808,497,897,000,000,000,000,000,000,000
enhance.c
155,505,691,939,167,960,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2019-13298
ImageMagick 7.0.8-50 Q16 has a heap-based buffer overflow at MagickCore/pixel-accessor.h in SetPixelViaPixelInfo because of a MagickCore/enhance.c error.
https://nvd.nist.gov/vuln/detail/CVE-2019-13298
161,237
ImageMagick
d4fc44b58a14f76b1ac997517d742ee12c9dc5d3
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/d4fc44b58a14f76b1ac997517d742ee12c9dc5d3
https://github.com/ImageMagick/ImageMagick/issues/1611
0
MagickExport Image *EnhanceImage(const Image *image,ExceptionInfo *exception) { #define EnhanceImageTag "Enhance/Image" #define EnhancePixel(weight) \ mean=QuantumScale*((double) GetPixelRed(image,r)+pixel.red)/2.0; \ distance=QuantumScale*((double) GetPixelRed(image,r)-pixel.red); \ distance_squared=(4.0+mean)*...
114,389,103,699,748,440,000,000,000,000,000,000,000
enhance.c
86,958,995,252,953,000,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2019-13298
ImageMagick 7.0.8-50 Q16 has a heap-based buffer overflow at MagickCore/pixel-accessor.h in SetPixelViaPixelInfo because of a MagickCore/enhance.c error.
https://nvd.nist.gov/vuln/detail/CVE-2019-13298
3,989
ImageMagick6
35c7032723d85eee7318ff6c82f031fa2666b773
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/35c7032723d85eee7318ff6c82f031fa2666b773
https://github.com/ImageMagick/ImageMagick/issues/1609
1
MagickExport Image *AdaptiveThresholdImage(const Image *image, const size_t width,const size_t height,const ssize_t offset, ExceptionInfo *exception) { #define ThresholdImageTag "Threshold/Image" CacheView *image_view, *threshold_view; Image *threshold_image; MagickBooleanType status; M...
320,134,287,425,152,820,000,000,000,000,000,000,000
threshold.c
115,482,682,457,321,940,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-13297
ImageMagick 7.0.8-50 Q16 has a heap-based buffer over-read at MagickCore/threshold.c in AdaptiveThresholdImage because a height of zero is mishandled.
https://nvd.nist.gov/vuln/detail/CVE-2019-13297
161,238
ImageMagick6
35c7032723d85eee7318ff6c82f031fa2666b773
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/35c7032723d85eee7318ff6c82f031fa2666b773
https://github.com/ImageMagick/ImageMagick/issues/1609
0
MagickExport Image *AdaptiveThresholdImage(const Image *image, const size_t width,const size_t height,const ssize_t offset, ExceptionInfo *exception) { #define ThresholdImageTag "Threshold/Image" CacheView *image_view, *threshold_view; Image *threshold_image; MagickBooleanType status; M...
207,041,805,623,304,600,000,000,000,000,000,000,000
threshold.c
54,537,054,846,566,605,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-13297
ImageMagick 7.0.8-50 Q16 has a heap-based buffer over-read at MagickCore/threshold.c in AdaptiveThresholdImage because a height of zero is mishandled.
https://nvd.nist.gov/vuln/detail/CVE-2019-13297
3,990
ImageMagick
ce08a3691a8ac29125e29fc41967b3737fa3f425
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/ce08a3691a8ac29125e29fc41967b3737fa3f425
https://github.com/ImageMagick/ImageMagick/issues/1604
1
WandPrivate MagickBooleanType CLIListOperatorImages(MagickCLI *cli_wand, const char *option,const char *arg1n,const char *arg2n) { const char /* percent escaped versions of the args */ *arg1, *arg2; Image *new_images; MagickStatusType status; ssize_t parse; #define _image_info (...
306,991,356,440,369,000,000,000,000,000,000,000,000
operation.c
157,788,665,975,600,050,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2019-13296
ImageMagick 7.0.8-50 Q16 has direct memory leaks in AcquireMagickMemory because of an error in CLIListOperatorImages in MagickWand/operation.c for a NULL value.
https://nvd.nist.gov/vuln/detail/CVE-2019-13296
161,239
ImageMagick
ce08a3691a8ac29125e29fc41967b3737fa3f425
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/ce08a3691a8ac29125e29fc41967b3737fa3f425
https://github.com/ImageMagick/ImageMagick/issues/1604
0
WandPrivate MagickBooleanType CLIListOperatorImages(MagickCLI *cli_wand, const char *option,const char *arg1n,const char *arg2n) { const char /* percent escaped versions of the args */ *arg1, *arg2; Image *new_images; MagickStatusType status; ssize_t parse; #define _image_info (...
194,068,701,374,956,200,000,000,000,000,000,000,000
operation.c
237,629,883,327,894,250,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2019-13296
ImageMagick 7.0.8-50 Q16 has direct memory leaks in AcquireMagickMemory because of an error in CLIListOperatorImages in MagickWand/operation.c for a NULL value.
https://nvd.nist.gov/vuln/detail/CVE-2019-13296
3,992
linux
6994eefb0053799d2e07cd140df6c2ea106c41ee
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6994eefb0053799d2e07cd140df6c2ea106c41ee
ptrace: Fix ->ptracer_cred handling for PTRACE_TRACEME Fix two issues: When called for PTRACE_TRACEME, ptrace_link() would obtain an RCU reference to the parent's objective credentials, then give that pointer to get_cred(). However, the object lifetime rules for things like struct cred do not permit unconditionally ...
1
static void ptrace_link(struct task_struct *child, struct task_struct *new_parent) { rcu_read_lock(); __ptrace_link(child, new_parent, __task_cred(new_parent)); rcu_read_unlock(); }
156,288,679,258,947,600,000,000,000,000,000,000,000
ptrace.c
156,184,805,185,643,770,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2019-13272
In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges ...
https://nvd.nist.gov/vuln/detail/CVE-2019-13272
161,240
linux
6994eefb0053799d2e07cd140df6c2ea106c41ee
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6994eefb0053799d2e07cd140df6c2ea106c41ee
ptrace: Fix ->ptracer_cred handling for PTRACE_TRACEME Fix two issues: When called for PTRACE_TRACEME, ptrace_link() would obtain an RCU reference to the parent's objective credentials, then give that pointer to get_cred(). However, the object lifetime rules for things like struct cred do not permit unconditionally ...
0
static void ptrace_link(struct task_struct *child, struct task_struct *new_parent) { __ptrace_link(child, new_parent, current_cred()); }
155,344,718,164,282,690,000,000,000,000,000,000,000
ptrace.c
269,111,176,348,979,430,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2019-13272
In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges ...
https://nvd.nist.gov/vuln/detail/CVE-2019-13272
3,998
oniguruma
0f7f61ed1b7b697e283e37bd2d731d0bd57adb55
https://github.com/kkos/oniguruma
https://github.com/kkos/oniguruma/commit/0f7f61ed1b7b697e283e37bd2d731d0bd57adb55
Fix CVE-2019-13224: don't allow different encodings for onig_new_deluxe()
1
onig_new_deluxe(regex_t** reg, const UChar* pattern, const UChar* pattern_end, OnigCompileInfo* ci, OnigErrorInfo* einfo) { int r; UChar *cpat, *cpat_end; if (IS_NOT_NULL(einfo)) einfo->par = (UChar* )NULL; if (ci->pattern_enc != ci->target_enc) { r = conv_encoding(ci->pattern_enc, ci-...
271,415,581,749,750,400,000,000,000,000,000,000,000
regext.c
108,449,085,595,308,860,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2019-13224
A use-after-free in onig_new_deluxe() in regext.c in Oniguruma 6.9.2 allows attackers to potentially cause information disclosure, denial of service, or possibly code execution by providing a crafted regular expression. The attacker provides a pair of a regex pattern and a string, with a multi-byte encoding that gets h...
https://nvd.nist.gov/vuln/detail/CVE-2019-13224
161,246
oniguruma
0f7f61ed1b7b697e283e37bd2d731d0bd57adb55
https://github.com/kkos/oniguruma
https://github.com/kkos/oniguruma/commit/0f7f61ed1b7b697e283e37bd2d731d0bd57adb55
Fix CVE-2019-13224: don't allow different encodings for onig_new_deluxe()
0
onig_new_deluxe(regex_t** reg, const UChar* pattern, const UChar* pattern_end, OnigCompileInfo* ci, OnigErrorInfo* einfo) { int r; UChar *cpat, *cpat_end; if (IS_NOT_NULL(einfo)) einfo->par = (UChar* )NULL; if (ci->pattern_enc != ci->target_enc) { return ONIGERR_NOT_SUPPORTED_ENCODING_...
224,887,714,749,809,400,000,000,000,000,000,000,000
regext.c
112,443,550,990,439,670,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2019-13224
A use-after-free in onig_new_deluxe() in regext.c in Oniguruma 6.9.2 allows attackers to potentially cause information disclosure, denial of service, or possibly code execution by providing a crafted regular expression. The attacker provides a pair of a regex pattern and a string, with a multi-byte encoding that gets h...
https://nvd.nist.gov/vuln/detail/CVE-2019-13224
3,999
stb
98fdfc6df88b1e34a736d5e126e6c8139c8de1a6
https://github.com/nothings/stb
https://github.com/nothings/stb/commit/98fdfc6df88b1e34a736d5e126e6c8139c8de1a6
Fix seven bugs discovered and fixed by ForAllSecure: CVE-2019-13217: heap buffer overflow in start_decoder() CVE-2019-13218: stack buffer overflow in compute_codewords() CVE-2019-13219: uninitialized memory in vorbis_decode_packet_rest() CVE-2019-13220: out-of-range read in draw_line() CVE-2019-13221: issue with large...
1
static __forceinline void draw_line(float *output, int x0, int y0, int x1, int y1, int n) { int dy = y1 - y0; int adx = x1 - x0; int ady = abs(dy); int base; int x=x0,y=y0; int err = 0; int sy; #ifdef STB_VORBIS_DIVIDE_TABLE if (adx < DIVTAB_DENOM && ady < DIVTAB_NUMER) { if (dy < 0) { ...
148,378,993,502,453,470,000,000,000,000,000,000,000
stb_vorbis.c
334,088,542,074,155,050,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2019-13219
A NULL pointer dereference in the get_window function in stb_vorbis through 2019-03-04 allows an attacker to cause a denial of service by opening a crafted Ogg Vorbis file.
https://nvd.nist.gov/vuln/detail/CVE-2019-13219
161,247
stb
98fdfc6df88b1e34a736d5e126e6c8139c8de1a6
https://github.com/nothings/stb
https://github.com/nothings/stb/commit/98fdfc6df88b1e34a736d5e126e6c8139c8de1a6
Fix seven bugs discovered and fixed by ForAllSecure: CVE-2019-13217: heap buffer overflow in start_decoder() CVE-2019-13218: stack buffer overflow in compute_codewords() CVE-2019-13219: uninitialized memory in vorbis_decode_packet_rest() CVE-2019-13220: out-of-range read in draw_line() CVE-2019-13221: issue with large...
0
static __forceinline void draw_line(float *output, int x0, int y0, int x1, int y1, int n) { int dy = y1 - y0; int adx = x1 - x0; int ady = abs(dy); int base; int x=x0,y=y0; int err = 0; int sy; #ifdef STB_VORBIS_DIVIDE_TABLE if (adx < DIVTAB_DENOM && ady < DIVTAB_NUMER) { if (dy < 0) { ...
239,049,947,196,564,480,000,000,000,000,000,000,000
stb_vorbis.c
196,552,066,288,262,920,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2019-13219
A NULL pointer dereference in the get_window function in stb_vorbis through 2019-03-04 allows an attacker to cause a denial of service by opening a crafted Ogg Vorbis file.
https://nvd.nist.gov/vuln/detail/CVE-2019-13219
4,000
stb
98fdfc6df88b1e34a736d5e126e6c8139c8de1a6
https://github.com/nothings/stb
https://github.com/nothings/stb/commit/98fdfc6df88b1e34a736d5e126e6c8139c8de1a6
Fix seven bugs discovered and fixed by ForAllSecure: CVE-2019-13217: heap buffer overflow in start_decoder() CVE-2019-13218: stack buffer overflow in compute_codewords() CVE-2019-13219: uninitialized memory in vorbis_decode_packet_rest() CVE-2019-13220: out-of-range read in draw_line() CVE-2019-13221: issue with large...
1
static float *get_window(vorb *f, int len) { len <<= 1; if (len == f->blocksize_0) return f->window[0]; if (len == f->blocksize_1) return f->window[1]; assert(0); return NULL; }
54,906,354,596,068,530,000,000,000,000,000,000,000
stb_vorbis.c
334,088,542,074,155,050,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2019-13219
A NULL pointer dereference in the get_window function in stb_vorbis through 2019-03-04 allows an attacker to cause a denial of service by opening a crafted Ogg Vorbis file.
https://nvd.nist.gov/vuln/detail/CVE-2019-13219
161,248
stb
98fdfc6df88b1e34a736d5e126e6c8139c8de1a6
https://github.com/nothings/stb
https://github.com/nothings/stb/commit/98fdfc6df88b1e34a736d5e126e6c8139c8de1a6
Fix seven bugs discovered and fixed by ForAllSecure: CVE-2019-13217: heap buffer overflow in start_decoder() CVE-2019-13218: stack buffer overflow in compute_codewords() CVE-2019-13219: uninitialized memory in vorbis_decode_packet_rest() CVE-2019-13220: out-of-range read in draw_line() CVE-2019-13221: issue with large...
0
static float *get_window(vorb *f, int len) { len <<= 1; if (len == f->blocksize_0) return f->window[0]; if (len == f->blocksize_1) return f->window[1]; return NULL; }
80,044,236,823,342,520,000,000,000,000,000,000,000
stb_vorbis.c
196,552,066,288,262,920,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2019-13219
A NULL pointer dereference in the get_window function in stb_vorbis through 2019-03-04 allows an attacker to cause a denial of service by opening a crafted Ogg Vorbis file.
https://nvd.nist.gov/vuln/detail/CVE-2019-13219
4,001
stb
98fdfc6df88b1e34a736d5e126e6c8139c8de1a6
https://github.com/nothings/stb
https://github.com/nothings/stb/commit/98fdfc6df88b1e34a736d5e126e6c8139c8de1a6
Fix seven bugs discovered and fixed by ForAllSecure: CVE-2019-13217: heap buffer overflow in start_decoder() CVE-2019-13218: stack buffer overflow in compute_codewords() CVE-2019-13219: uninitialized memory in vorbis_decode_packet_rest() CVE-2019-13220: out-of-range read in draw_line() CVE-2019-13221: issue with large...
1
static int lookup1_values(int entries, int dim) { int r = (int) floor(exp((float) log((float) entries) / dim)); if ((int) floor(pow((float) r+1, dim)) <= entries) // (int) cast for MinGW warning; ++r; // floor() to avoid _ftol() when non-CRT assert(pow((f...
246,719,121,438,152,280,000,000,000,000,000,000,000
stb_vorbis.c
334,088,542,074,155,050,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2019-13219
A NULL pointer dereference in the get_window function in stb_vorbis through 2019-03-04 allows an attacker to cause a denial of service by opening a crafted Ogg Vorbis file.
https://nvd.nist.gov/vuln/detail/CVE-2019-13219
161,249
stb
98fdfc6df88b1e34a736d5e126e6c8139c8de1a6
https://github.com/nothings/stb
https://github.com/nothings/stb/commit/98fdfc6df88b1e34a736d5e126e6c8139c8de1a6
Fix seven bugs discovered and fixed by ForAllSecure: CVE-2019-13217: heap buffer overflow in start_decoder() CVE-2019-13218: stack buffer overflow in compute_codewords() CVE-2019-13219: uninitialized memory in vorbis_decode_packet_rest() CVE-2019-13220: out-of-range read in draw_line() CVE-2019-13221: issue with large...
0
static int lookup1_values(int entries, int dim) { int r = (int) floor(exp((float) log((float) entries) / dim)); if ((int) floor(pow((float) r+1, dim)) <= entries) // (int) cast for MinGW warning; ++r; // floor() to avoid _ftol() when non-CRT if (pow((floa...
282,473,809,087,801,520,000,000,000,000,000,000,000
stb_vorbis.c
196,552,066,288,262,920,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2019-13219
A NULL pointer dereference in the get_window function in stb_vorbis through 2019-03-04 allows an attacker to cause a denial of service by opening a crafted Ogg Vorbis file.
https://nvd.nist.gov/vuln/detail/CVE-2019-13219
4,002
stb
98fdfc6df88b1e34a736d5e126e6c8139c8de1a6
https://github.com/nothings/stb
https://github.com/nothings/stb/commit/98fdfc6df88b1e34a736d5e126e6c8139c8de1a6
Fix seven bugs discovered and fixed by ForAllSecure: CVE-2019-13217: heap buffer overflow in start_decoder() CVE-2019-13218: stack buffer overflow in compute_codewords() CVE-2019-13219: uninitialized memory in vorbis_decode_packet_rest() CVE-2019-13220: out-of-range read in draw_line() CVE-2019-13221: issue with large...
1
static int start_decoder(vorb *f) { uint8 header[6], x,y; int len,i,j,k, max_submaps = 0; int longest_floorlist=0; if (!start_page(f)) return FALSE; if (!(f->page_flag & PAGEFLAG_first_page)) return error(f, VORBIS_invalid_first_page); if (f->page_flag & PAGEFLAG_l...
252,497,019,343,885,260,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2019-13219
A NULL pointer dereference in the get_window function in stb_vorbis through 2019-03-04 allows an attacker to cause a denial of service by opening a crafted Ogg Vorbis file.
https://nvd.nist.gov/vuln/detail/CVE-2019-13219
161,250
stb
98fdfc6df88b1e34a736d5e126e6c8139c8de1a6
https://github.com/nothings/stb
https://github.com/nothings/stb/commit/98fdfc6df88b1e34a736d5e126e6c8139c8de1a6
Fix seven bugs discovered and fixed by ForAllSecure: CVE-2019-13217: heap buffer overflow in start_decoder() CVE-2019-13218: stack buffer overflow in compute_codewords() CVE-2019-13219: uninitialized memory in vorbis_decode_packet_rest() CVE-2019-13220: out-of-range read in draw_line() CVE-2019-13221: issue with large...
0
static int start_decoder(vorb *f) { uint8 header[6], x,y; int len,i,j,k, max_submaps = 0; int longest_floorlist=0; if (!start_page(f)) return FALSE; if (!(f->page_flag & PAGEFLAG_first_page)) return error(f, VORBIS_invalid_first_page); if (f->page_flag & PAGEFLAG_l...
307,758,620,837,610,100,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2019-13219
A NULL pointer dereference in the get_window function in stb_vorbis through 2019-03-04 allows an attacker to cause a denial of service by opening a crafted Ogg Vorbis file.
https://nvd.nist.gov/vuln/detail/CVE-2019-13219
4,004
ImageMagick6
7d11230060fa9c8f67e53c85224daf6648805c7b
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/7d11230060fa9c8f67e53c85224daf6648805c7b
https://github.com/ImageMagick/ImageMagick/issues/1601
1
static Image *ReadPSImage(const ImageInfo *image_info,ExceptionInfo *exception) { #define BoundingBox "BoundingBox:" #define BeginDocument "BeginDocument:" #define BeginXMPPacket "<?xpacket begin=" #define EndXMPPacket "<?xpacket end=" #define ICCProfile "BeginICCProfile:" #define CMYKCustomColor "CMYKCustomColor:...
324,044,698,586,397,400,000,000,000,000,000,000,000
ps.c
201,065,018,049,002,330,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2019-13137
ImageMagick before 7.0.8-50 has a memory leak vulnerability in the function ReadPSImage in coders/ps.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-13137
161,252
ImageMagick6
7d11230060fa9c8f67e53c85224daf6648805c7b
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/7d11230060fa9c8f67e53c85224daf6648805c7b
https://github.com/ImageMagick/ImageMagick/issues/1601
0
static Image *ReadPSImage(const ImageInfo *image_info,ExceptionInfo *exception) { #define BoundingBox "BoundingBox:" #define BeginDocument "BeginDocument:" #define BeginXMPPacket "<?xpacket begin=" #define EndXMPPacket "<?xpacket end=" #define ICCProfile "BeginICCProfile:" #define CMYKCustomColor "CMYKCustomColor:...
79,794,999,147,885,250,000,000,000,000,000,000,000
ps.c
140,218,400,700,783,220,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2019-13137
ImageMagick before 7.0.8-50 has a memory leak vulnerability in the function ReadPSImage in coders/ps.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-13137
4,005
ImageMagick
cdb383749ef7b68a38891440af8cc23e0115306d
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/cdb383749ef7b68a38891440af8cc23e0115306d
https://github.com/ImageMagick/ImageMagick/issues/1599
1
static Image *ReadCUTImage(const ImageInfo *image_info,ExceptionInfo *exception) { #define ThrowCUTReaderException(severity,tag) \ { \ if (palette != NULL) \ palette=DestroyImage(palette); \ if (clone_info != NULL) \ clone_info=DestroyImageInfo(clone_info); \ ThrowReaderException(severity,tag); \ } Ima...
88,863,127,355,848,590,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2019-13135
ImageMagick before 7.0.8-50 has a "use of uninitialized value" vulnerability in the function ReadCUTImage in coders/cut.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-13135
161,253
ImageMagick
cdb383749ef7b68a38891440af8cc23e0115306d
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/cdb383749ef7b68a38891440af8cc23e0115306d
https://github.com/ImageMagick/ImageMagick/issues/1599
0
static Image *ReadCUTImage(const ImageInfo *image_info,ExceptionInfo *exception) { #define ThrowCUTReaderException(severity,tag) \ { \ if (palette != NULL) \ palette=DestroyImage(palette); \ if (clone_info != NULL) \ clone_info=DestroyImageInfo(clone_info); \ ThrowReaderException(severity,tag); \ } Ima...
27,201,390,366,141,730,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2019-13135
ImageMagick before 7.0.8-50 has a "use of uninitialized value" vulnerability in the function ReadCUTImage in coders/cut.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-13135
4,006
ImageMagick
fe3066122ef72c82415811d25e9e3fad622c0a99
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/fe3066122ef72c82415811d25e9e3fad622c0a99
https://github.com/ImageMagick/ImageMagick/issues/1600
1
static Image *ReadBMPImage(const ImageInfo *image_info,ExceptionInfo *exception) { BMPInfo bmp_info; Image *image; MagickBooleanType status; MagickOffsetType offset, profile_data, profile_size, start_position; MemoryInfo *pixel_info; Quantum index; register Quantu...
86,565,001,831,407,070,000,000,000,000,000,000,000
bmp.c
36,858,631,049,690,346,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2019-13134
ImageMagick before 7.0.8-50 has a memory leak vulnerability in the function ReadVIFFImage in coders/viff.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-13134
161,254
ImageMagick
fe3066122ef72c82415811d25e9e3fad622c0a99
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/fe3066122ef72c82415811d25e9e3fad622c0a99
https://github.com/ImageMagick/ImageMagick/issues/1600
0
static Image *ReadBMPImage(const ImageInfo *image_info,ExceptionInfo *exception) { BMPInfo bmp_info; Image *image; MagickBooleanType status; MagickOffsetType offset, profile_data, profile_size, start_position; MemoryInfo *pixel_info; Quantum index; register Quantu...
132,264,814,774,421,650,000,000,000,000,000,000,000
bmp.c
191,838,398,971,920,460,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2019-13134
ImageMagick before 7.0.8-50 has a memory leak vulnerability in the function ReadVIFFImage in coders/viff.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-13134
4,007
ImageMagick
fe3066122ef72c82415811d25e9e3fad622c0a99
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/fe3066122ef72c82415811d25e9e3fad622c0a99
https://github.com/ImageMagick/ImageMagick/issues/1600
1
static Image *ReadVIFFImage(const ImageInfo *image_info, ExceptionInfo *exception) { #define VFF_CM_genericRGB 15 #define VFF_CM_ntscRGB 1 #define VFF_CM_NONE 0 #define VFF_DEP_DECORDER 0x4 #define VFF_DEP_NSORDER 0x8 #define VFF_DES_RAW 0 #define VFF_LOC_IMPLICIT 1 #define VFF_MAPTYP_NONE 0 #define VFF_MAPTY...
105,511,065,680,299,740,000,000,000,000,000,000,000
viff.c
68,297,603,364,140,680,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2019-13134
ImageMagick before 7.0.8-50 has a memory leak vulnerability in the function ReadVIFFImage in coders/viff.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-13134
161,255
ImageMagick
fe3066122ef72c82415811d25e9e3fad622c0a99
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/fe3066122ef72c82415811d25e9e3fad622c0a99
https://github.com/ImageMagick/ImageMagick/issues/1600
0
static Image *ReadVIFFImage(const ImageInfo *image_info, ExceptionInfo *exception) { #define VFF_CM_genericRGB 15 #define VFF_CM_ntscRGB 1 #define VFF_CM_NONE 0 #define VFF_DEP_DECORDER 0x4 #define VFF_DEP_NSORDER 0x8 #define VFF_DES_RAW 0 #define VFF_LOC_IMPLICIT 1 #define VFF_MAPTYP_NONE 0 #define VFF_MAPTY...
97,411,666,062,047,380,000,000,000,000,000,000,000
viff.c
329,101,530,715,299,200,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2019-13134
ImageMagick before 7.0.8-50 has a memory leak vulnerability in the function ReadVIFFImage in coders/viff.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-13134
4,031
linux
6ff7b060535e87c2ae14dd8548512abfdda528fb
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6ff7b060535e87c2ae14dd8548512abfdda528fb
mdio_bus: Fix use-after-free on device_register fails KASAN has found use-after-free in fixed_mdio_bus_init, commit 0c692d07842a ("drivers/net/phy/mdio_bus.c: call put_device on device_register() failure") call put_device() while device_register() fails,give up the last reference to the device and allow mdiobus_releas...
1
int __mdiobus_register(struct mii_bus *bus, struct module *owner) { struct mdio_device *mdiodev; int i, err; struct gpio_desc *gpiod; if (NULL == bus || NULL == bus->name || NULL == bus->read || NULL == bus->write) return -EINVAL; BUG_ON(bus->state != MDIOBUS_ALLOCATED && bus->state != MDIOBUS_UNR...
332,319,665,854,404,400,000,000,000,000,000,000,000
mdio_bus.c
24,842,619,289,389,920,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2019-12819
An issue was discovered in the Linux kernel before 5.0. The function __mdiobus_register() in drivers/net/phy/mdio_bus.c calls put_device(), which will trigger a fixed_mdio_bus_init use-after-free. This will cause a denial of service.
https://nvd.nist.gov/vuln/detail/CVE-2019-12819
161,276
linux
6ff7b060535e87c2ae14dd8548512abfdda528fb
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6ff7b060535e87c2ae14dd8548512abfdda528fb
mdio_bus: Fix use-after-free on device_register fails KASAN has found use-after-free in fixed_mdio_bus_init, commit 0c692d07842a ("drivers/net/phy/mdio_bus.c: call put_device on device_register() failure") call put_device() while device_register() fails,give up the last reference to the device and allow mdiobus_releas...
0
int __mdiobus_register(struct mii_bus *bus, struct module *owner) { struct mdio_device *mdiodev; int i, err; struct gpio_desc *gpiod; if (NULL == bus || NULL == bus->name || NULL == bus->read || NULL == bus->write) return -EINVAL; BUG_ON(bus->state != MDIOBUS_ALLOCATED && bus->state != MDIOBUS_UNR...
145,243,368,707,512,590,000,000,000,000,000,000,000
mdio_bus.c
320,326,918,310,982,460,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2019-12819
An issue was discovered in the Linux kernel before 5.0. The function __mdiobus_register() in drivers/net/phy/mdio_bus.c calls put_device(), which will trigger a fixed_mdio_bus_init use-after-free. This will cause a denial of service.
https://nvd.nist.gov/vuln/detail/CVE-2019-12819
4,034
linux
58bdd544e2933a21a51eecf17c3f5f94038261b5
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/58bdd544e2933a21a51eecf17c3f5f94038261b5
net: nfc: Fix NULL dereference on nfc_llcp_build_tlv fails KASAN report this: BUG: KASAN: null-ptr-deref in nfc_llcp_build_gb+0x37f/0x540 [nfc] Read of size 3 at addr 0000000000000000 by task syz-executor.0/5401 CPU: 0 PID: 5401 Comm: syz-executor.0 Not tainted 5.0.0-rc7+ #45 Hardware name: QEMU Standard PC (i440FX ...
1
static int nfc_llcp_build_gb(struct nfc_llcp_local *local) { u8 *gb_cur, *version_tlv, version, version_length; u8 *lto_tlv, lto_length; u8 *wks_tlv, wks_length; u8 *miux_tlv, miux_length; __be16 wks = cpu_to_be16(local->local_wks); u8 gb_len = 0; int ret = 0; version = LLCP_VERSION_11; version_tlv = ...
276,762,293,576,136,130,000,000,000,000,000,000,000
llcp_core.c
30,611,209,877,008,776,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2019-12818
An issue was discovered in the Linux kernel before 4.20.15. The nfc_llcp_build_tlv function in net/nfc/llcp_commands.c may return NULL. If the caller does not check for this, it will trigger a NULL pointer dereference. This will cause denial of service. This affects nfc_llcp_build_gb in net/nfc/llcp_core.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-12818
161,279
linux
58bdd544e2933a21a51eecf17c3f5f94038261b5
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/58bdd544e2933a21a51eecf17c3f5f94038261b5
net: nfc: Fix NULL dereference on nfc_llcp_build_tlv fails KASAN report this: BUG: KASAN: null-ptr-deref in nfc_llcp_build_gb+0x37f/0x540 [nfc] Read of size 3 at addr 0000000000000000 by task syz-executor.0/5401 CPU: 0 PID: 5401 Comm: syz-executor.0 Not tainted 5.0.0-rc7+ #45 Hardware name: QEMU Standard PC (i440FX ...
0
static int nfc_llcp_build_gb(struct nfc_llcp_local *local) { u8 *gb_cur, version, version_length; u8 lto_length, wks_length, miux_length; u8 *version_tlv = NULL, *lto_tlv = NULL, *wks_tlv = NULL, *miux_tlv = NULL; __be16 wks = cpu_to_be16(local->local_wks); u8 gb_len = 0; int ret = 0; version = LLCP_...
160,375,820,850,741,730,000,000,000,000,000,000,000
llcp_core.c
183,766,262,371,673,460,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2019-12818
An issue was discovered in the Linux kernel before 4.20.15. The nfc_llcp_build_tlv function in net/nfc/llcp_commands.c may return NULL. If the caller does not check for this, it will trigger a NULL pointer dereference. This will cause denial of service. This affects nfc_llcp_build_gb in net/nfc/llcp_core.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-12818
4,038
bubblewrap
efc89e3b939b4bde42c10f065f6b7b02958ed50e
https://github.com/containers/bubblewrap
https://github.com/projectatomic/bubblewrap/commit/efc89e3b939b4bde42c10f065f6b7b02958ed50e
Don't create our own temporary mount point for pivot_root An attacker could pre-create /tmp/.bubblewrap-$UID and make it a non-directory, non-symlink (in which case mounting our tmpfs would fail, causing denial of service), or make it a symlink under their control (potentially allowing bad things if the protected_syml...
1
main (int argc, char **argv) { mode_t old_umask; cleanup_free char *base_path = NULL; int clone_flags; char *old_cwd = NULL; pid_t pid; int event_fd = -1; int child_wait_fd = -1; int setup_finished_pipe[] = {-1, -1}; const char *new_cwd; uid_t ns_uid; gid_t ns_gid; struct stat sbu...
41,291,708,509,448,165,000,000,000,000,000,000,000
bubblewrap.c
67,742,006,587,564,080,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2019-12439
bubblewrap.c in Bubblewrap before 0.3.3 misuses temporary directories in /tmp as a mount point. In some particular configurations (related to XDG_RUNTIME_DIR), a local attacker may abuse this flaw to prevent other users from executing bubblewrap or potentially execute code.
https://nvd.nist.gov/vuln/detail/CVE-2019-12439
161,284
bubblewrap
efc89e3b939b4bde42c10f065f6b7b02958ed50e
https://github.com/containers/bubblewrap
https://github.com/projectatomic/bubblewrap/commit/efc89e3b939b4bde42c10f065f6b7b02958ed50e
Don't create our own temporary mount point for pivot_root An attacker could pre-create /tmp/.bubblewrap-$UID and make it a non-directory, non-symlink (in which case mounting our tmpfs would fail, causing denial of service), or make it a symlink under their control (potentially allowing bad things if the protected_syml...
0
main (int argc, char **argv) { mode_t old_umask; const char *base_path = NULL; int clone_flags; char *old_cwd = NULL; pid_t pid; int event_fd = -1; int child_wait_fd = -1; int setup_finished_pipe[] = {-1, -1}; const char *new_cwd; uid_t ns_uid; gid_t ns_gid; struct stat sbuf; ui...
316,681,900,437,652,380,000,000,000,000,000,000,000
bubblewrap.c
288,907,675,690,756,020,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2019-12439
bubblewrap.c in Bubblewrap before 0.3.3 misuses temporary directories in /tmp as a mount point. In some particular configurations (related to XDG_RUNTIME_DIR), a local attacker may abuse this flaw to prevent other users from executing bubblewrap or potentially execute code.
https://nvd.nist.gov/vuln/detail/CVE-2019-12439
4,039
miniupnp
cb8a02af7a5677cf608e86d57ab04241cf34e24f
https://github.com/miniupnp/miniupnp
https://github.com/miniupnp/miniupnp/commit/cb8a02af7a5677cf608e86d57ab04241cf34e24f
pcpserver.c: copyIPv6IfDifferent() check for NULL src argument
1
static void copyIPv6IfDifferent(void * dest, const void * src) { if(dest != src) { memcpy(dest, src, sizeof(struct in6_addr)); } }
329,926,470,648,283,770,000,000,000,000,000,000,000
pcpserver.c
144,192,023,563,153,640,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2019-12111
A Denial Of Service vulnerability in MiniUPnP MiniUPnPd through 2.1 exists due to a NULL pointer dereference in copyIPv6IfDifferent in pcpserver.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-12111
161,285
miniupnp
cb8a02af7a5677cf608e86d57ab04241cf34e24f
https://github.com/miniupnp/miniupnp
https://github.com/miniupnp/miniupnp/commit/cb8a02af7a5677cf608e86d57ab04241cf34e24f
pcpserver.c: copyIPv6IfDifferent() check for NULL src argument
0
static void copyIPv6IfDifferent(void * dest, const void * src) { if(dest != src && src != NULL) { memcpy(dest, src, sizeof(struct in6_addr)); } }
240,041,599,050,415,500,000,000,000,000,000,000,000
pcpserver.c
133,393,389,707,240,000,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2019-12111
A Denial Of Service vulnerability in MiniUPnP MiniUPnPd through 2.1 exists due to a NULL pointer dereference in copyIPv6IfDifferent in pcpserver.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-12111
4,040
miniupnp
f321c2066b96d18afa5158dfa2d2873a2957ef38
https://github.com/miniupnp/miniupnp
https://github.com/miniupnp/miniupnp/commit/f321c2066b96d18afa5158dfa2d2873a2957ef38
upnp_redirect(): accept NULL desc argument
1
upnp_redirect(const char * rhost, unsigned short eport, const char * iaddr, unsigned short iport, const char * protocol, const char * desc, unsigned int leaseduration) { int proto, r; char iaddr_old[32]; char rhost_old[32]; unsigned short iport_old; struct in_addr address;...
46,344,349,630,705,210,000,000,000,000,000,000,000
upnpredirect.c
92,609,255,182,890,540,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2019-12110
An AddPortMapping Denial Of Service vulnerability in MiniUPnP MiniUPnPd through 2.1 exists due to a NULL pointer dereference in upnpredirect.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-12110
161,286
miniupnp
f321c2066b96d18afa5158dfa2d2873a2957ef38
https://github.com/miniupnp/miniupnp
https://github.com/miniupnp/miniupnp/commit/f321c2066b96d18afa5158dfa2d2873a2957ef38
upnp_redirect(): accept NULL desc argument
0
upnp_redirect(const char * rhost, unsigned short eport, const char * iaddr, unsigned short iport, const char * protocol, const char * desc, unsigned int leaseduration) { int proto, r; char iaddr_old[32]; char rhost_old[32]; unsigned short iport_old; struct in_addr address;...
95,668,996,657,163,880,000,000,000,000,000,000,000
upnpredirect.c
108,157,219,556,769,850,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2019-12110
An AddPortMapping Denial Of Service vulnerability in MiniUPnP MiniUPnPd through 2.1 exists due to a NULL pointer dereference in upnpredirect.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-12110
4,042
miniupnp
cd506a67e174a45c6a202eff182a712955ed6d6f
https://github.com/miniupnp/miniupnp
https://github.com/miniupnp/miniupnp/commit/cd506a67e174a45c6a202eff182a712955ed6d6f
updateDevice() remove element from the list when realloc fails
1
updateDevice(const struct header * headers, time_t t) { struct device ** pp = &devlist; struct device * p = *pp; /* = devlist; */ while(p) { if( p->headers[HEADER_NT].l == headers[HEADER_NT].l && (0==memcmp(p->headers[HEADER_NT].p, headers[HEADER_NT].p, headers[HEADER_NT].l)) && p->headers[HEADER_USN].l ...
221,734,464,000,496,170,000,000,000,000,000,000,000
minissdpd.c
279,070,277,622,417,970,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2019-12106
The updateDevice function in minissdpd.c in MiniUPnP MiniSSDPd 1.4 and 1.5 allows a remote attacker to crash the process due to a Use After Free vulnerability.
https://nvd.nist.gov/vuln/detail/CVE-2019-12106
161,287
miniupnp
cd506a67e174a45c6a202eff182a712955ed6d6f
https://github.com/miniupnp/miniupnp
https://github.com/miniupnp/miniupnp/commit/cd506a67e174a45c6a202eff182a712955ed6d6f
updateDevice() remove element from the list when realloc fails
0
updateDevice(const struct header * headers, time_t t) { struct device ** pp = &devlist; struct device * p = *pp; /* = devlist; */ while(p) { if( p->headers[HEADER_NT].l == headers[HEADER_NT].l && (0==memcmp(p->headers[HEADER_NT].p, headers[HEADER_NT].p, headers[HEADER_NT].l)) && p->headers[HEADER_USN].l ...
208,003,559,432,433,950,000,000,000,000,000,000,000
minissdpd.c
96,589,306,211,317,110,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2019-12106
The updateDevice function in minissdpd.c in MiniUPnP MiniSSDPd 1.4 and 1.5 allows a remote attacker to crash the process due to a Use After Free vulnerability.
https://nvd.nist.gov/vuln/detail/CVE-2019-12106
4,043
heimdal
2f7f3d9960aa6ea21358bdf3687cee5149aa35cf
https://github.com/heimdal/heimdal
https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf
CVE-2019-12098: krb5: always confirm PA-PKINIT-KX for anon PKINIT RFC8062 Section 7 requires verification of the PA-PKINIT-KX key excahnge when anonymous PKINIT is used. Failure to do so can permit an active attacker to become a man-in-the-middle. Introduced by a1ef548600c5bb51cf52a9a9ea12676506ede19f. First tagged...
1
krb5_init_creds_step(krb5_context context, krb5_init_creds_context ctx, krb5_data *in, krb5_data *out, krb5_krbhst_info *hostinfo, unsigned int *flags) { krb5_error_code ret; size_t len = 0; size_t size; AS_REQ req2; krb5_data_zero(out); if (ctx->as_req.req_b...
261,068,004,113,217,340,000,000,000,000,000,000,000
init_creds_pw.c
312,349,701,812,782,430,000,000,000,000,000,000,000
[ "CWE-320" ]
CVE-2019-12098
In the client side of Heimdal before 7.6.0, failure to verify anonymous PKINIT PA-PKINIT-KX key exchange permits a man-in-the-middle attack. This issue is in krb5_init_creds_step in lib/krb5/init_creds_pw.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-12098
161,288
heimdal
2f7f3d9960aa6ea21358bdf3687cee5149aa35cf
https://github.com/heimdal/heimdal
https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf
CVE-2019-12098: krb5: always confirm PA-PKINIT-KX for anon PKINIT RFC8062 Section 7 requires verification of the PA-PKINIT-KX key excahnge when anonymous PKINIT is used. Failure to do so can permit an active attacker to become a man-in-the-middle. Introduced by a1ef548600c5bb51cf52a9a9ea12676506ede19f. First tagged...
0
krb5_init_creds_step(krb5_context context, krb5_init_creds_context ctx, krb5_data *in, krb5_data *out, krb5_krbhst_info *hostinfo, unsigned int *flags) { krb5_error_code ret; size_t len = 0; size_t size; AS_REQ req2; krb5_data_zero(out); if (ctx->as_req.req_b...
111,256,736,111,399,240,000,000,000,000,000,000,000
init_creds_pw.c
151,864,158,531,124,180,000,000,000,000,000,000,000
[ "CWE-320" ]
CVE-2019-12098
In the client side of Heimdal before 7.6.0, failure to verify anonymous PKINIT PA-PKINIT-KX key exchange permits a man-in-the-middle attack. This issue is in krb5_init_creds_step in lib/krb5/init_creds_pw.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-12098
4,049
linux
a1616a5ac99ede5d605047a9012481ce7ff18b16
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a1616a5ac99ede5d605047a9012481ce7ff18b16
Bluetooth: hidp: fix buffer overflow Struct ca is copied from userspace. It is not checked whether the "name" field is NULL terminated, which allows local users to obtain potentially sensitive information from kernel stack memory, via a HIDPCONNADD command. This vulnerability is similar to CVE-2011-1079. Signed-off-...
1
static int do_hidp_sock_ioctl(struct socket *sock, unsigned int cmd, void __user *argp) { struct hidp_connadd_req ca; struct hidp_conndel_req cd; struct hidp_connlist_req cl; struct hidp_conninfo ci; struct socket *csock; struct socket *isock; int err; BT_DBG("cmd %x arg %p", cmd, argp); switch (cmd) { case...
190,362,082,081,650,330,000,000,000,000,000,000,000
None
null
[ "CWE-77" ]
CVE-2019-11884
The do_hidp_sock_ioctl function in net/bluetooth/hidp/sock.c in the Linux kernel before 5.0.15 allows a local user to obtain potentially sensitive information from kernel stack memory via a HIDPCONNADD command, because a name field may not end with a '\0' character.
https://nvd.nist.gov/vuln/detail/CVE-2019-11884
161,294
linux
a1616a5ac99ede5d605047a9012481ce7ff18b16
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/a1616a5ac99ede5d605047a9012481ce7ff18b16
Bluetooth: hidp: fix buffer overflow Struct ca is copied from userspace. It is not checked whether the "name" field is NULL terminated, which allows local users to obtain potentially sensitive information from kernel stack memory, via a HIDPCONNADD command. This vulnerability is similar to CVE-2011-1079. Signed-off-...
0
static int do_hidp_sock_ioctl(struct socket *sock, unsigned int cmd, void __user *argp) { struct hidp_connadd_req ca; struct hidp_conndel_req cd; struct hidp_connlist_req cl; struct hidp_conninfo ci; struct socket *csock; struct socket *isock; int err; BT_DBG("cmd %x arg %p", cmd, argp); switch (cmd) { case...
126,773,609,245,914,850,000,000,000,000,000,000,000
None
null
[ "CWE-77" ]
CVE-2019-11884
The do_hidp_sock_ioctl function in net/bluetooth/hidp/sock.c in the Linux kernel before 5.0.15 allows a local user to obtain potentially sensitive information from kernel stack memory via a HIDPCONNADD command, because a name field may not end with a '\0' character.
https://nvd.nist.gov/vuln/detail/CVE-2019-11884
4,052
linux
cb66ddd156203daefb8d71158036b27b0e2caf63
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/cb66ddd156203daefb8d71158036b27b0e2caf63
net: rds: force to destroy connection if t_sock is NULL in rds_tcp_kill_sock(). When it is to cleanup net namespace, rds_tcp_exit_net() will call rds_tcp_kill_sock(), if t_sock is NULL, it will not call rds_conn_destroy(), rds_conn_path_destroy() and rds_tcp_conn_free() to free connection, and the worker cp_conn_w is ...
1
static void rds_tcp_kill_sock(struct net *net) { struct rds_tcp_connection *tc, *_tc; LIST_HEAD(tmp_list); struct rds_tcp_net *rtn = net_generic(net, rds_tcp_netid); struct socket *lsock = rtn->rds_tcp_listen_sock; rtn->rds_tcp_listen_sock = NULL; rds_tcp_listen_stop(lsock, &rtn->rds_tcp_accept_w); spin_lock_ir...
8,107,321,106,413,303,000,000,000,000,000,000,000
tcp.c
218,691,657,463,008,300,000,000,000,000,000,000,000
[ "CWE-362" ]
CVE-2019-11815
An issue was discovered in rds_tcp_kill_sock in net/rds/tcp.c in the Linux kernel before 5.0.8. There is a race condition leading to a use-after-free, related to net namespace cleanup.
https://nvd.nist.gov/vuln/detail/CVE-2019-11815
161,297
linux
cb66ddd156203daefb8d71158036b27b0e2caf63
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/cb66ddd156203daefb8d71158036b27b0e2caf63
net: rds: force to destroy connection if t_sock is NULL in rds_tcp_kill_sock(). When it is to cleanup net namespace, rds_tcp_exit_net() will call rds_tcp_kill_sock(), if t_sock is NULL, it will not call rds_conn_destroy(), rds_conn_path_destroy() and rds_tcp_conn_free() to free connection, and the worker cp_conn_w is ...
0
static void rds_tcp_kill_sock(struct net *net) { struct rds_tcp_connection *tc, *_tc; LIST_HEAD(tmp_list); struct rds_tcp_net *rtn = net_generic(net, rds_tcp_netid); struct socket *lsock = rtn->rds_tcp_listen_sock; rtn->rds_tcp_listen_sock = NULL; rds_tcp_listen_stop(lsock, &rtn->rds_tcp_accept_w); spin_lock_ir...
304,580,934,188,077,300,000,000,000,000,000,000,000
tcp.c
238,093,555,522,402,100,000,000,000,000,000,000,000
[ "CWE-362" ]
CVE-2019-11815
An issue was discovered in rds_tcp_kill_sock in net/rds/tcp.c in the Linux kernel before 5.0.8. There is a race condition leading to a use-after-free, related to net namespace cleanup.
https://nvd.nist.gov/vuln/detail/CVE-2019-11815
4,053
linux
401e7e88d4ef80188ffa07095ac00456f901b8c4
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/401e7e88d4ef80188ffa07095ac00456f901b8c4
ipmi_si: fix use-after-free of resource->name When we excute the following commands, we got oops rmmod ipmi_si cat /proc/ioports [ 1623.482380] Unable to handle kernel paging request at virtual address ffff00000901d478 [ 1623.482382] Mem abort info: [ 1623.482383] ESR = 0x96000007 [ 1623.482385] Exception class =...
1
static int try_smi_init(struct smi_info *new_smi) { int rv = 0; int i; char *init_name = NULL; pr_info("Trying %s-specified %s state machine at %s address 0x%lx, slave address 0x%x, irq %d\n", ipmi_addr_src_to_str(new_smi->io.addr_source), si_to_str[new_smi->io.si_type], addr_space_to_str[new_smi->io.addr_ty...
165,864,638,601,569,780,000,000,000,000,000,000,000
ipmi_si_intf.c
224,449,302,204,137,970,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2019-11811
An issue was discovered in the Linux kernel before 5.0.4. There is a use-after-free upon attempted read access to /proc/ioports after the ipmi_si module is removed, related to drivers/char/ipmi/ipmi_si_intf.c, drivers/char/ipmi/ipmi_si_mem_io.c, and drivers/char/ipmi/ipmi_si_port_io.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-11811
161,298
linux
401e7e88d4ef80188ffa07095ac00456f901b8c4
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/401e7e88d4ef80188ffa07095ac00456f901b8c4
ipmi_si: fix use-after-free of resource->name When we excute the following commands, we got oops rmmod ipmi_si cat /proc/ioports [ 1623.482380] Unable to handle kernel paging request at virtual address ffff00000901d478 [ 1623.482382] Mem abort info: [ 1623.482383] ESR = 0x96000007 [ 1623.482385] Exception class =...
0
static int try_smi_init(struct smi_info *new_smi) { int rv = 0; int i; char *init_name = NULL; pr_info("Trying %s-specified %s state machine at %s address 0x%lx, slave address 0x%x, irq %d\n", ipmi_addr_src_to_str(new_smi->io.addr_source), si_to_str[new_smi->io.si_type], addr_space_to_str[new_smi->io.addr_ty...
57,187,727,698,118,990,000,000,000,000,000,000,000
ipmi_si_intf.c
205,253,459,092,288,450,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2019-11811
An issue was discovered in the Linux kernel before 5.0.4. There is a use-after-free upon attempted read access to /proc/ioports after the ipmi_si module is removed, related to drivers/char/ipmi/ipmi_si_intf.c, drivers/char/ipmi/ipmi_si_mem_io.c, and drivers/char/ipmi/ipmi_si_port_io.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-11811
4,054
linux
401e7e88d4ef80188ffa07095ac00456f901b8c4
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/401e7e88d4ef80188ffa07095ac00456f901b8c4
ipmi_si: fix use-after-free of resource->name When we excute the following commands, we got oops rmmod ipmi_si cat /proc/ioports [ 1623.482380] Unable to handle kernel paging request at virtual address ffff00000901d478 [ 1623.482382] Mem abort info: [ 1623.482383] ESR = 0x96000007 [ 1623.482385] Exception class =...
1
int ipmi_si_mem_setup(struct si_sm_io *io) { unsigned long addr = io->addr_data; int mapsize, idx; if (!addr) return -ENODEV; io->io_cleanup = mem_cleanup; /* * Figure out the actual readb/readw/readl/etc routine to use based * upon the register size. */ switch (io->regsize) { case 1: ...
268,861,984,312,861,500,000,000,000,000,000,000,000
ipmi_si_mem_io.c
76,869,389,163,316,280,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2019-11811
An issue was discovered in the Linux kernel before 5.0.4. There is a use-after-free upon attempted read access to /proc/ioports after the ipmi_si module is removed, related to drivers/char/ipmi/ipmi_si_intf.c, drivers/char/ipmi/ipmi_si_mem_io.c, and drivers/char/ipmi/ipmi_si_port_io.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-11811
161,299
linux
401e7e88d4ef80188ffa07095ac00456f901b8c4
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/401e7e88d4ef80188ffa07095ac00456f901b8c4
ipmi_si: fix use-after-free of resource->name When we excute the following commands, we got oops rmmod ipmi_si cat /proc/ioports [ 1623.482380] Unable to handle kernel paging request at virtual address ffff00000901d478 [ 1623.482382] Mem abort info: [ 1623.482383] ESR = 0x96000007 [ 1623.482385] Exception class =...
0
int ipmi_si_mem_setup(struct si_sm_io *io) { unsigned long addr = io->addr_data; int mapsize, idx; if (!addr) return -ENODEV; /* * Figure out the actual readb/readw/readl/etc routine to use based * upon the register size. */ switch (io->regsize) { case 1: io->inputb = intf_mem_inb; i...
5,653,851,178,262,609,000,000,000,000,000,000,000
ipmi_si_mem_io.c
180,868,498,994,322,750,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2019-11811
An issue was discovered in the Linux kernel before 5.0.4. There is a use-after-free upon attempted read access to /proc/ioports after the ipmi_si module is removed, related to drivers/char/ipmi/ipmi_si_intf.c, drivers/char/ipmi/ipmi_si_mem_io.c, and drivers/char/ipmi/ipmi_si_port_io.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-11811
4,055
linux
401e7e88d4ef80188ffa07095ac00456f901b8c4
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/401e7e88d4ef80188ffa07095ac00456f901b8c4
ipmi_si: fix use-after-free of resource->name When we excute the following commands, we got oops rmmod ipmi_si cat /proc/ioports [ 1623.482380] Unable to handle kernel paging request at virtual address ffff00000901d478 [ 1623.482382] Mem abort info: [ 1623.482383] ESR = 0x96000007 [ 1623.482385] Exception class =...
1
int ipmi_si_port_setup(struct si_sm_io *io) { unsigned int addr = io->addr_data; int idx; if (!addr) return -ENODEV; io->io_cleanup = port_cleanup; /* * Figure out the actual inb/inw/inl/etc routine to use based * upon the register size. */ switch (io->regsize) { case 1: io->inputb = p...
46,989,818,832,240,890,000,000,000,000,000,000,000
ipmi_si_port_io.c
125,840,401,664,174,400,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2019-11811
An issue was discovered in the Linux kernel before 5.0.4. There is a use-after-free upon attempted read access to /proc/ioports after the ipmi_si module is removed, related to drivers/char/ipmi/ipmi_si_intf.c, drivers/char/ipmi/ipmi_si_mem_io.c, and drivers/char/ipmi/ipmi_si_port_io.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-11811