idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
161,167 | pam_p11 | d150b60e1e14c261b113f55681419ad1dfa8a76c | https://github.com/OpenSC/pam_p11 | https://github.com/OpenSC/pam_p11/commit/d150b60e1e14c261b113f55681419ad1dfa8a76c | Use EVP_PKEY_size() to allocate correct size of signature buffer. (#18)
Do not use fixed buffer size for signature, EVP_SignFinal() requires
buffer for signature at least EVP_PKEY_size(pkey) bytes in size.
Fixes crash when using 4K RSA signatures (https://github.com/OpenSC/pam_p11/issues/16, https://github.com/OpenS... | 0 | static int key_verify(pam_handle_t *pamh, int flags, PKCS11_KEY *authkey)
{
int ok = 0;
unsigned char challenge[30];
unsigned char *signature = NULL;
unsigned int siglen;
const EVP_MD *md = EVP_sha1();
EVP_MD_CTX *md_ctx = EVP_MD_CTX_new();
EVP_PKEY *privkey = PKCS11_get_private_key(authkey);
EVP_PKEY *p... | 119,882,099,747,466,950,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2019-16058 | An issue was discovered in the pam_p11 component 0.2.0 and 0.3.0 for OpenSC. If a smart card creates a signature with a length longer than 256 bytes, this triggers a buffer overflow. This may be the case for RSA keys with 4096 bits depending on the signature scheme. | https://nvd.nist.gov/vuln/detail/CVE-2019-16058 |
3,917 | linux | 01ca667133d019edc9f0a1f70a272447c84ec41f | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/01ca667133d019edc9f0a1f70a272447c84ec41f | fm10k: Fix a potential NULL pointer dereference
Syzkaller report this:
kasan: GPF could be caused by NULL-ptr deref or user memory access
general protection fault: 0000 [#1] SMP KASAN PTI
CPU: 0 PID: 4378 Comm: syz-executor.0 Tainted: G C 5.0.0+ #5
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996),... | 1 | static int __init fm10k_init_module(void)
{
pr_info("%s - version %s\n", fm10k_driver_string, fm10k_driver_version);
pr_info("%s\n", fm10k_copyright);
/* create driver workqueue */
fm10k_workqueue = alloc_workqueue("%s", WQ_MEM_RECLAIM, 0,
fm10k_driver_name);
fm10k_dbg_init();
return fm10k_registe... | 247,849,593,238,575,600,000,000,000,000,000,000,000 | fm10k_main.c | 95,898,875,623,914,100,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2019-15924 | An issue was discovered in the Linux kernel before 5.0.11. fm10k_init_module in drivers/net/ethernet/intel/fm10k/fm10k_main.c has a NULL pointer dereference because there is no -ENOMEM upon an alloc_workqueue failure. | https://nvd.nist.gov/vuln/detail/CVE-2019-15924 |
161,168 | linux | 01ca667133d019edc9f0a1f70a272447c84ec41f | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/01ca667133d019edc9f0a1f70a272447c84ec41f | fm10k: Fix a potential NULL pointer dereference
Syzkaller report this:
kasan: GPF could be caused by NULL-ptr deref or user memory access
general protection fault: 0000 [#1] SMP KASAN PTI
CPU: 0 PID: 4378 Comm: syz-executor.0 Tainted: G C 5.0.0+ #5
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996),... | 0 | static int __init fm10k_init_module(void)
{
pr_info("%s - version %s\n", fm10k_driver_string, fm10k_driver_version);
pr_info("%s\n", fm10k_copyright);
/* create driver workqueue */
fm10k_workqueue = alloc_workqueue("%s", WQ_MEM_RECLAIM, 0,
fm10k_driver_name);
if (!fm10k_workqueue)
return -ENOMEM;
... | 116,889,031,473,772,120,000,000,000,000,000,000,000 | fm10k_main.c | 285,230,609,228,412,020,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2019-15924 | An issue was discovered in the Linux kernel before 5.0.11. fm10k_init_module in drivers/net/ethernet/intel/fm10k/fm10k_main.c has a NULL pointer dereference because there is no -ENOMEM upon an alloc_workqueue failure. | https://nvd.nist.gov/vuln/detail/CVE-2019-15924 |
3,924 | linux | ceabee6c59943bdd5e1da1a6a20dc7ee5f8113a2 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/ceabee6c59943bdd5e1da1a6a20dc7ee5f8113a2 | genetlink: Fix a memory leak on error path
In genl_register_family(), when idr_alloc() fails,
we forget to free the memory we possibly allocate for
family->attrbuf.
Reported-by: Hulk Robot <hulkci@huawei.com>
Fixes: 2ae0f17df1cd ("genetlink: use idr to track families")
Signed-off-by: YueHaibing <yuehaibing@huawei.com... | 1 | int genl_register_family(struct genl_family *family)
{
int err, i;
int start = GENL_START_ALLOC, end = GENL_MAX_ID;
err = genl_validate_ops(family);
if (err)
return err;
genl_lock_all();
if (genl_family_find_byname(family->name)) {
err = -EEXIST;
goto errout_locked;
}
/*
* Sadly, a few cases need to... | 108,757,618,594,854,400,000,000,000,000,000,000,000 | genetlink.c | 258,142,188,450,716,950,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2019-15921 | An issue was discovered in the Linux kernel before 5.0.6. There is a memory leak issue when idr_alloc() fails in genl_register_family() in net/netlink/genetlink.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-15921 |
161,175 | linux | ceabee6c59943bdd5e1da1a6a20dc7ee5f8113a2 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/ceabee6c59943bdd5e1da1a6a20dc7ee5f8113a2 | genetlink: Fix a memory leak on error path
In genl_register_family(), when idr_alloc() fails,
we forget to free the memory we possibly allocate for
family->attrbuf.
Reported-by: Hulk Robot <hulkci@huawei.com>
Fixes: 2ae0f17df1cd ("genetlink: use idr to track families")
Signed-off-by: YueHaibing <yuehaibing@huawei.com... | 0 | int genl_register_family(struct genl_family *family)
{
int err, i;
int start = GENL_START_ALLOC, end = GENL_MAX_ID;
err = genl_validate_ops(family);
if (err)
return err;
genl_lock_all();
if (genl_family_find_byname(family->name)) {
err = -EEXIST;
goto errout_locked;
}
/*
* Sadly, a few cases need to... | 287,069,545,760,732,850,000,000,000,000,000,000,000 | genetlink.c | 174,802,125,817,657,600,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2019-15921 | An issue was discovered in the Linux kernel before 5.0.6. There is a memory leak issue when idr_alloc() fails in genl_register_family() in net/netlink/genetlink.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-15921 |
3,927 | linux | b57a55e2200ede754e4dc9cce4ba9402544b9365 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/b57a55e2200ede754e4dc9cce4ba9402544b9365 | cifs: Fix lease buffer length error
There is a KASAN slab-out-of-bounds:
BUG: KASAN: slab-out-of-bounds in _copy_from_iter_full+0x783/0xaa0
Read of size 80 at addr ffff88810c35e180 by task mount.cifs/539
CPU: 1 PID: 539 Comm: mount.cifs Not tainted 4.19 #10
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS
... | 1 | SMB2_negotiate(const unsigned int xid, struct cifs_ses *ses)
{
struct smb_rqst rqst;
struct smb2_negotiate_req *req;
struct smb2_negotiate_rsp *rsp;
struct kvec iov[1];
struct kvec rsp_iov;
int rc = 0;
int resp_buftype;
struct TCP_Server_Info *server = ses->server;
int blob_offset, blob_length;
char *security... | 205,015,380,050,265,500,000,000,000,000,000,000,000 | smb2pdu.c | 140,544,539,280,537,400,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-15918 | An issue was discovered in the Linux kernel before 5.0.10. SMB2_negotiate in fs/cifs/smb2pdu.c has an out-of-bounds read because data structures are incompletely updated after a change from smb30 to smb21. | https://nvd.nist.gov/vuln/detail/CVE-2019-15918 |
161,176 | linux | b57a55e2200ede754e4dc9cce4ba9402544b9365 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/b57a55e2200ede754e4dc9cce4ba9402544b9365 | cifs: Fix lease buffer length error
There is a KASAN slab-out-of-bounds:
BUG: KASAN: slab-out-of-bounds in _copy_from_iter_full+0x783/0xaa0
Read of size 80 at addr ffff88810c35e180 by task mount.cifs/539
CPU: 1 PID: 539 Comm: mount.cifs Not tainted 4.19 #10
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS
... | 0 | SMB2_negotiate(const unsigned int xid, struct cifs_ses *ses)
{
struct smb_rqst rqst;
struct smb2_negotiate_req *req;
struct smb2_negotiate_rsp *rsp;
struct kvec iov[1];
struct kvec rsp_iov;
int rc = 0;
int resp_buftype;
struct TCP_Server_Info *server = ses->server;
int blob_offset, blob_length;
char *security... | 207,845,521,536,535,400,000,000,000,000,000,000,000 | smb2pdu.c | 272,372,347,126,887,120,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-15918 | An issue was discovered in the Linux kernel before 5.0.10. SMB2_negotiate in fs/cifs/smb2pdu.c has an out-of-bounds read because data structures are incompletely updated after a change from smb30 to smb21. | https://nvd.nist.gov/vuln/detail/CVE-2019-15918 |
3,928 | linux | 56897b217a1d0a91c9920cb418d6b3fe922f590a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/56897b217a1d0a91c9920cb418d6b3fe922f590a | Bluetooth: hci_ldisc: Postpone HCI_UART_PROTO_READY bit set in hci_uart_set_proto()
task A: task B:
hci_uart_set_proto flush_to_ldisc
- p->open(hu) -> h5_open //alloc h5 - receive_buf
- set_bit HCI_UART_PROTO_READY - tty_port_default_receive_buf
- hci_uar... | 1 | static int hci_uart_set_proto(struct hci_uart *hu, int id)
{
const struct hci_uart_proto *p;
int err;
p = hci_uart_get_proto(id);
if (!p)
return -EPROTONOSUPPORT;
hu->proto = p;
set_bit(HCI_UART_PROTO_READY, &hu->flags);
err = hci_uart_register_dev(hu);
if (err) {
clear_bit(HCI_UART_PROTO_READY, &h... | 136,154,177,591,265,250,000,000,000,000,000,000,000 | hci_ldisc.c | 5,927,913,923,078,270,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2019-15917 | An issue was discovered in the Linux kernel before 5.0.5. There is a use-after-free issue when hci_uart_register_dev() fails in hci_uart_set_proto() in drivers/bluetooth/hci_ldisc.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-15917 |
161,177 | linux | 56897b217a1d0a91c9920cb418d6b3fe922f590a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/56897b217a1d0a91c9920cb418d6b3fe922f590a | Bluetooth: hci_ldisc: Postpone HCI_UART_PROTO_READY bit set in hci_uart_set_proto()
task A: task B:
hci_uart_set_proto flush_to_ldisc
- p->open(hu) -> h5_open //alloc h5 - receive_buf
- set_bit HCI_UART_PROTO_READY - tty_port_default_receive_buf
- hci_uar... | 0 | static int hci_uart_set_proto(struct hci_uart *hu, int id)
{
const struct hci_uart_proto *p;
int err;
p = hci_uart_get_proto(id);
if (!p)
return -EPROTONOSUPPORT;
hu->proto = p;
err = hci_uart_register_dev(hu);
if (err) {
return err;
}
set_bit(HCI_UART_PROTO_READY, &hu->flags);
return 0;
}
| 293,965,652,228,405,500,000,000,000,000,000,000,000 | hci_ldisc.c | 195,205,955,910,275,230,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2019-15917 | An issue was discovered in the Linux kernel before 5.0.5. There is a use-after-free issue when hci_uart_register_dev() fails in hci_uart_set_proto() in drivers/bluetooth/hci_ldisc.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-15917 |
3,933 | linux | 1fb254aa983bf190cfd685d40c64a480a9bafaee | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1fb254aa983bf190cfd685d40c64a480a9bafaee | xfs: fix missing ILOCK unlock when xfs_setattr_nonsize fails due to EDQUOT
Benjamin Moody reported to Debian that XFS partially wedges when a chgrp
fails on account of being out of disk quota. I ran his reproducer
script:
# adduser dummy
# adduser dummy plugdev
# dd if=/dev/zero bs=1M count=100 of=test.img
# mkfs.x... | 1 | xfs_setattr_nonsize(
struct xfs_inode *ip,
struct iattr *iattr,
int flags)
{
xfs_mount_t *mp = ip->i_mount;
struct inode *inode = VFS_I(ip);
int mask = iattr->ia_valid;
xfs_trans_t *tp;
int error;
kuid_t uid = GLOBAL_ROOT_UID, iuid = GLOBAL_ROOT_UID;
kgid_t gid = GLOBAL_ROOT_GID, igid = GLOBAL_R... | 255,274,943,777,258,100,000,000,000,000,000,000,000 | xfs_iops.c | 170,511,364,161,316,920,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2019-15538 | An issue was discovered in xfs_setattr_nonsize in fs/xfs/xfs_iops.c in the Linux kernel through 5.2.9. XFS partially wedges when a chgrp fails on account of being out of disk quota. xfs_setattr_nonsize is failing to unlock the ILOCK after the xfs_qm_vop_chown_reserve call fails. This is primarily a local DoS attack vec... | https://nvd.nist.gov/vuln/detail/CVE-2019-15538 |
161,182 | linux | 1fb254aa983bf190cfd685d40c64a480a9bafaee | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/1fb254aa983bf190cfd685d40c64a480a9bafaee | xfs: fix missing ILOCK unlock when xfs_setattr_nonsize fails due to EDQUOT
Benjamin Moody reported to Debian that XFS partially wedges when a chgrp
fails on account of being out of disk quota. I ran his reproducer
script:
# adduser dummy
# adduser dummy plugdev
# dd if=/dev/zero bs=1M count=100 of=test.img
# mkfs.x... | 0 | xfs_setattr_nonsize(
struct xfs_inode *ip,
struct iattr *iattr,
int flags)
{
xfs_mount_t *mp = ip->i_mount;
struct inode *inode = VFS_I(ip);
int mask = iattr->ia_valid;
xfs_trans_t *tp;
int error;
kuid_t uid = GLOBAL_ROOT_UID, iuid = GLOBAL_ROOT_UID;
kgid_t gid = GLOBAL_ROOT_GID, igid = GLOBAL_R... | 77,799,141,129,902,640,000,000,000,000,000,000,000 | xfs_iops.c | 30,964,977,899,984,950,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2019-15538 | An issue was discovered in xfs_setattr_nonsize in fs/xfs/xfs_iops.c in the Linux kernel through 5.2.9. XFS partially wedges when a chgrp fails on account of being out of disk quota. xfs_setattr_nonsize is failing to unlock the ILOCK after the xfs_qm_vop_chown_reserve call fails. This is primarily a local DoS attack vec... | https://nvd.nist.gov/vuln/detail/CVE-2019-15538 |
3,935 | tcpdump | 0b661e0aa61850234b64394585cf577aac570bf4 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/0b661e0aa61850234b64394585cf577aac570bf4 | (for 4.9.3) LMP: Add some missing bounds checks
In lmp_print_data_link_subobjs(), these problems were identified
through code review.
Moreover:
Add and use tstr[].
Update two tests outputs accordingly. | 1 | lmp_print_data_link_subobjs(netdissect_options *ndo, const u_char *obj_tptr,
int total_subobj_len, int offset)
{
int hexdump = FALSE;
int subobj_type, subobj_len;
union { /* int to float conversion buffer */
float f;
uint32_t i;
} bw;
while (total_sub... | 157,557,897,929,143,570,000,000,000,000,000,000,000 | print-lmp.c | 284,566,342,901,425,540,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2019-15166 | lmp_print_data_link_subobjs() in print-lmp.c in tcpdump before 4.9.3 lacks certain bounds checks. | https://nvd.nist.gov/vuln/detail/CVE-2019-15166 |
161,186 | tcpdump | 0b661e0aa61850234b64394585cf577aac570bf4 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/0b661e0aa61850234b64394585cf577aac570bf4 | (for 4.9.3) LMP: Add some missing bounds checks
In lmp_print_data_link_subobjs(), these problems were identified
through code review.
Moreover:
Add and use tstr[].
Update two tests outputs accordingly. | 0 | lmp_print_data_link_subobjs(netdissect_options *ndo, const u_char *obj_tptr,
int total_subobj_len, int offset)
{
int hexdump = FALSE;
int subobj_type, subobj_len;
union { /* int to float conversion buffer */
float f;
uint32_t i;
} bw;
while (total_sub... | 35,106,151,798,043,010,000,000,000,000,000,000,000 | print-lmp.c | 80,152,652,382,804,110,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2019-15166 | lmp_print_data_link_subobjs() in print-lmp.c in tcpdump before 4.9.3 lacks certain bounds checks. | https://nvd.nist.gov/vuln/detail/CVE-2019-15166 |
3,936 | libpcap | a5a36d9e82dde7265e38fe1f87b7f11c461c29f6 | https://github.com/the-tcpdump-group/libpcap | https://github.com/the-tcpdump-group/libpcap/commit/a5a36d9e82dde7265e38fe1f87b7f11c461c29f6 | Fix some format warnings. | 1 | pcap_ng_check_header(const uint8_t *magic, FILE *fp, u_int precision,
char *errbuf, int *err)
{
bpf_u_int32 magic_int;
size_t amt_read;
bpf_u_int32 total_length;
bpf_u_int32 byte_order_magic;
struct block_header *bhdrp;
struct section_header_block *shbp;
pcap_t *p;
int swapped = 0;
struct pcap_ng_sf *ps;
... | 62,382,392,079,134,400,000,000,000,000,000,000,000 | sf-pcapng.c | 148,887,623,957,953,060,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2019-15165 | sf-pcapng.c in libpcap before 1.9.1 does not properly validate the PHB header length before allocating memory. | https://nvd.nist.gov/vuln/detail/CVE-2019-15165 |
161,187 | libpcap | a5a36d9e82dde7265e38fe1f87b7f11c461c29f6 | https://github.com/the-tcpdump-group/libpcap | https://github.com/the-tcpdump-group/libpcap/commit/a5a36d9e82dde7265e38fe1f87b7f11c461c29f6 | Fix some format warnings. | 0 | pcap_ng_check_header(const uint8_t *magic, FILE *fp, u_int precision,
char *errbuf, int *err)
{
bpf_u_int32 magic_int;
size_t amt_read;
bpf_u_int32 total_length;
bpf_u_int32 byte_order_magic;
struct block_header *bhdrp;
struct section_header_block *shbp;
pcap_t *p;
int swapped = 0;
struct pcap_ng_sf *ps;
... | 127,261,570,381,351,610,000,000,000,000,000,000,000 | sf-pcapng.c | 266,983,192,750,041,900,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2019-15165 | sf-pcapng.c in libpcap before 1.9.1 does not properly validate the PHB header length before allocating memory. | https://nvd.nist.gov/vuln/detail/CVE-2019-15165 |
3,937 | gpmf-parser | 341f12cd5b97ab419e53853ca00176457c9f1681 | https://github.com/gopro/gpmf-parser | https://github.com/gopro/gpmf-parser/commit/341f12cd5b97ab419e53853ca00176457c9f1681 | fixed many security issues with the too crude mp4 reader | 1 | GPMF_ERR IsValidSize(GPMF_stream *ms, uint32_t size) // size is in longs not bytes.
{
if (ms)
{
int32_t nestsize = (int32_t)ms->nest_size[ms->nest_level];
if (nestsize == 0 && ms->nest_level == 0)
nestsize = ms->buffer_size_longs;
if (size + 2 <= nestsize) return GPMF_OK;
}
return GPMF_ERROR_BAD_STR... | 39,887,036,510,019,133,000,000,000,000,000,000,000 | GPMF_parser.c | 101,923,111,988,893,630,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2019-15148 | GoPro GPMF-parser 1.2.2 has an out-of-bounds write in OpenMP4Source in demo/GPMF_mp4reader.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-15148 |
161,192 | gpmf-parser | 341f12cd5b97ab419e53853ca00176457c9f1681 | https://github.com/gopro/gpmf-parser | https://github.com/gopro/gpmf-parser/commit/341f12cd5b97ab419e53853ca00176457c9f1681 | fixed many security issues with the too crude mp4 reader | 0 | GPMF_ERR IsValidSize(GPMF_stream *ms, uint32_t size) // size is in longs not bytes.
{
if (ms)
{
uint32_t nestsize = (uint32_t)ms->nest_size[ms->nest_level];
if (nestsize == 0 && ms->nest_level == 0)
nestsize = ms->buffer_size_longs;
if (size + 2 <= nestsize) return GPMF_OK;
}
return GPMF_ERROR_BAD_S... | 132,179,529,803,237,370,000,000,000,000,000,000,000 | GPMF_parser.c | 182,530,503,286,923,300,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2019-15148 | GoPro GPMF-parser 1.2.2 has an out-of-bounds write in OpenMP4Source in demo/GPMF_mp4reader.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-15148 |
3,943 | gpmf-parser | 341f12cd5b97ab419e53853ca00176457c9f1681 | https://github.com/gopro/gpmf-parser | https://github.com/gopro/gpmf-parser/commit/341f12cd5b97ab419e53853ca00176457c9f1681 | fixed many security issues with the too crude mp4 reader | 1 | size_t OpenMP4Source(char *filename, uint32_t traktype, uint32_t traksubtype) //RAW or within MP4
{
mp4object *mp4 = (mp4object *)malloc(sizeof(mp4object));
if (mp4 == NULL) return 0;
memset(mp4, 0, sizeof(mp4object));
#ifdef _WINDOWS
fopen_s(&mp4->mediafp, filename, "rb");
#else
mp4->mediafp = fopen(fil... | 268,050,768,699,578,650,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2019-15148 | GoPro GPMF-parser 1.2.2 has an out-of-bounds write in OpenMP4Source in demo/GPMF_mp4reader.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-15148 |
161,198 | gpmf-parser | 341f12cd5b97ab419e53853ca00176457c9f1681 | https://github.com/gopro/gpmf-parser | https://github.com/gopro/gpmf-parser/commit/341f12cd5b97ab419e53853ca00176457c9f1681 | fixed many security issues with the too crude mp4 reader | 0 | size_t OpenMP4Source(char *filename, uint32_t traktype, uint32_t traksubtype) //RAW or within MP4
{
mp4object *mp4 = (mp4object *)malloc(sizeof(mp4object));
if (mp4 == NULL) return 0;
memset(mp4, 0, sizeof(mp4object));
struct stat64 mp4stat;
stat64(filename, &mp4stat);
mp4->filesize = mp4stat.st_size;
if... | 301,629,921,569,976,400,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2019-15148 | GoPro GPMF-parser 1.2.2 has an out-of-bounds write in OpenMP4Source in demo/GPMF_mp4reader.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-15148 |
3,946 | ImageMagick6 | 3c53413eb544cc567309b4c86485eae43e956112 | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/3c53413eb544cc567309b4c86485eae43e956112 | https://github.com/ImageMagick/ImageMagick/issues/1560 | 1 | static MagickBooleanType WriteTIFFImage(const ImageInfo *image_info,
Image *image)
{
const char
*mode,
*option;
CompressionType
compression;
EndianType
endian_type;
MagickBooleanType
debug,
status;
MagickOffsetType
scene;
QuantumInfo
*quantum_info;
QuantumType
q... | 36,416,815,289,515,490,000,000,000,000,000,000,000 | tiff.c | 27,570,316,504,444,440,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-15141 | WriteTIFFImage in coders/tiff.c in ImageMagick 7.0.8-43 Q16 allows attackers to cause a denial-of-service (application crash resulting from a heap-based buffer over-read) via a crafted TIFF image file, related to TIFFRewriteDirectory, TIFFWriteDirectory, TIFFWriteDirectorySec, and TIFFWriteDirectoryTagColormap in tif_d... | https://nvd.nist.gov/vuln/detail/CVE-2019-15141 |
161,201 | ImageMagick6 | 3c53413eb544cc567309b4c86485eae43e956112 | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/3c53413eb544cc567309b4c86485eae43e956112 | https://github.com/ImageMagick/ImageMagick/issues/1560 | 0 | static MagickBooleanType WriteTIFFImage(const ImageInfo *image_info,
Image *image)
{
const char
*mode,
*option;
CompressionType
compression;
EndianType
endian_type;
MagickBooleanType
debug,
status;
MagickOffsetType
scene;
QuantumInfo
*quantum_info;
QuantumType
q... | 10,545,407,722,899,735,000,000,000,000,000,000,000 | tiff.c | 224,376,204,816,051,970,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-15141 | WriteTIFFImage in coders/tiff.c in ImageMagick 7.0.8-43 Q16 allows attackers to cause a denial-of-service (application crash resulting from a heap-based buffer over-read) via a crafted TIFF image file, related to TIFFRewriteDirectory, TIFFWriteDirectory, TIFFWriteDirectorySec, and TIFFWriteDirectoryTagColormap in tif_d... | https://nvd.nist.gov/vuln/detail/CVE-2019-15141 |
3,949 | ImageMagick | c78993d138bf480ab4652b5a48379d4ff75ba5f7 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/c78993d138bf480ab4652b5a48379d4ff75ba5f7 | https://github.com/ImageMagick/ImageMagick/issues/1553 | 1 | static Image *ReadXWDImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
#define CheckOverflowException(length,width,height) \
(((height) != 0) && ((length)/((size_t) height) != ((size_t) width)))
char
*comment;
Image
*image;
int
x_status;
MagickBooleanType
authentic_colormap;
... | 233,532,117,835,758,400,000,000,000,000,000,000,000 | xwd.c | 57,456,086,150,064,630,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-15139 | The XWD image (X Window System window dumping file) parsing component in ImageMagick 7.0.8-41 Q16 allows attackers to cause a denial-of-service (application crash resulting from an out-of-bounds Read) in ReadXWDImage in coders/xwd.c by crafting a corrupted XWD image file, a different vulnerability than CVE-2019-11472. | https://nvd.nist.gov/vuln/detail/CVE-2019-15139 |
161,204 | ImageMagick | c78993d138bf480ab4652b5a48379d4ff75ba5f7 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/c78993d138bf480ab4652b5a48379d4ff75ba5f7 | https://github.com/ImageMagick/ImageMagick/issues/1553 | 0 | static Image *ReadXWDImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
#define CheckOverflowException(length,width,height) \
(((height) != 0) && ((length)/((size_t) height) != ((size_t) width)))
char
*comment;
Image
*image;
int
x_status;
MagickBooleanType
authentic_colormap;
... | 135,003,230,908,140,000,000,000,000,000,000,000,000 | xwd.c | 239,296,098,258,768,720,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-15139 | The XWD image (X Window System window dumping file) parsing component in ImageMagick 7.0.8-41 Q16 allows attackers to cause a denial-of-service (application crash resulting from an out-of-bounds Read) in ReadXWDImage in coders/xwd.c by crafting a corrupted XWD image file, a different vulnerability than CVE-2019-11472. | https://nvd.nist.gov/vuln/detail/CVE-2019-15139 |
3,954 | ImageMagick6 | b522d2d857d2f75b659936b59b0da9df1682c256 | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/b522d2d857d2f75b659936b59b0da9df1682c256 | https://github.com/ImageMagick/ImageMagick/issues/1552 | 1 | MagickExport Image *MeanShiftImage(const Image *image,const size_t width,
const size_t height,const double color_distance,ExceptionInfo *exception)
{
#define MaxMeanShiftIterations 100
#define MeanShiftImageTag "MeanShift/Image"
CacheView
*image_view,
*mean_view,
*pixel_view;
Image
*mean_image... | 231,391,488,542,660,700,000,000,000,000,000,000,000 | feature.c | 334,519,932,082,623,530,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2019-14981 | In ImageMagick 7.x before 7.0.8-41 and 6.x before 6.9.10-41, there is a divide-by-zero vulnerability in the MeanShiftImage function. It allows an attacker to cause a denial of service by sending a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2019-14981 |
161,209 | ImageMagick6 | b522d2d857d2f75b659936b59b0da9df1682c256 | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/b522d2d857d2f75b659936b59b0da9df1682c256 | https://github.com/ImageMagick/ImageMagick/issues/1552 | 0 | MagickExport Image *MeanShiftImage(const Image *image,const size_t width,
const size_t height,const double color_distance,ExceptionInfo *exception)
{
#define MaxMeanShiftIterations 100
#define MeanShiftImageTag "MeanShift/Image"
CacheView
*image_view,
*mean_view,
*pixel_view;
Image
*mean_image... | 49,100,708,930,099,580,000,000,000,000,000,000,000 | feature.c | 207,947,771,459,608,770,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2019-14981 | In ImageMagick 7.x before 7.0.8-41 and 6.x before 6.9.10-41, there is a divide-by-zero vulnerability in the MeanShiftImage function. It allows an attacker to cause a denial of service by sending a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2019-14981 |
3,955 | ImageMagick6 | 614a257295bdcdeda347086761062ac7658b6830 | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/614a257295bdcdeda347086761062ac7658b6830 | https://github.com/ImageMagick/ImageMagick6/issues/43 | 1 | MagickExport unsigned char *DetachBlob(BlobInfo *blob_info)
{
unsigned char
*data;
assert(blob_info != (BlobInfo *) NULL);
if (blob_info->debug != MagickFalse)
(void) LogMagickEvent(TraceEvent,GetMagickModule(),"...");
if (blob_info->mapped != MagickFalse)
{
(void) UnmapBlob(blob_info->dat... | 230,870,644,106,464,150,000,000,000,000,000,000,000 | blob.c | 310,539,915,566,168,340,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2019-14980 | In ImageMagick 7.x before 7.0.8-42 and 6.x before 6.9.10-42, there is a use after free vulnerability in the UnmapBlob function that allows an attacker to cause a denial of service by sending a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2019-14980 |
161,210 | ImageMagick6 | 614a257295bdcdeda347086761062ac7658b6830 | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/614a257295bdcdeda347086761062ac7658b6830 | https://github.com/ImageMagick/ImageMagick6/issues/43 | 0 | MagickExport unsigned char *DetachBlob(BlobInfo *blob_info)
{
unsigned char
*data;
assert(blob_info != (BlobInfo *) NULL);
if (blob_info->debug != MagickFalse)
(void) LogMagickEvent(TraceEvent,GetMagickModule(),"...");
if (blob_info->mapped != MagickFalse)
{
(void) UnmapBlob(blob_info->dat... | 248,318,823,094,126,720,000,000,000,000,000,000,000 | blob.c | 199,613,840,358,723,470,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2019-14980 | In ImageMagick 7.x before 7.0.8-42 and 6.x before 6.9.10-42, there is a use after free vulnerability in the UnmapBlob function that allows an attacker to cause a denial of service by sending a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2019-14980 |
3,961 | pdfresurrect | 0c4120fffa3dffe97b95c486a120eded82afe8a6 | https://github.com/enferex/pdfresurrect | https://github.com/enferex/pdfresurrect/commit/0c4120fffa3dffe97b95c486a120eded82afe8a6 | Zero and sanity check all dynamic allocs.
This addresses the memory issues in Issue #6 expressed in
calloc_some.pdf and malloc_some.pdf | 1 | void pdf_load_pages_kids(FILE *fp, pdf_t *pdf)
{
int i, id, dummy;
char *buf, *c;
long start, sz;
start = ftell(fp);
/* Load all kids for all xref tables (versions) */
for (i=0; i<pdf->n_xrefs; i++)
{
if (pdf->xrefs[i].version && (pdf->xrefs[i].end != 0))
{
... | 305,307,068,957,863,400,000,000,000,000,000,000,000 | pdf.c | 66,527,136,684,972,825,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2019-14934 | An issue was discovered in PDFResurrect before 0.18. pdf_load_pages_kids in pdf.c doesn't validate a certain size value, which leads to a malloc failure and out-of-bounds write. | https://nvd.nist.gov/vuln/detail/CVE-2019-14934 |
161,216 | pdfresurrect | 0c4120fffa3dffe97b95c486a120eded82afe8a6 | https://github.com/enferex/pdfresurrect | https://github.com/enferex/pdfresurrect/commit/0c4120fffa3dffe97b95c486a120eded82afe8a6 | Zero and sanity check all dynamic allocs.
This addresses the memory issues in Issue #6 expressed in
calloc_some.pdf and malloc_some.pdf | 0 | void pdf_load_pages_kids(FILE *fp, pdf_t *pdf)
{
int i, id, dummy;
char *buf, *c;
long start, sz;
start = ftell(fp);
/* Load all kids for all xref tables (versions) */
for (i=0; i<pdf->n_xrefs; i++)
{
if (pdf->xrefs[i].version && (pdf->xrefs[i].end != 0))
{
... | 319,526,675,347,839,870,000,000,000,000,000,000,000 | pdf.c | 76,381,566,457,461,010,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2019-14934 | An issue was discovered in PDFResurrect before 0.18. pdf_load_pages_kids in pdf.c doesn't validate a certain size value, which leads to a malloc failure and out-of-bounds write. | https://nvd.nist.gov/vuln/detail/CVE-2019-14934 |
3,969 | 3proxy | 3b67dc844789dc0f00e934270c7b349bcb547865 | https://github.com/z3APA3A/3proxy | https://github.com/z3APA3A/3proxy/commit/3b67dc844789dc0f00e934270c7b349bcb547865 | Fix: out-of-bounds write and few more bugs in 'admin' configuration upload | 1 | void * adminchild(struct clientparam* param) {
int i, res;
char * buf;
char username[256];
char *sb;
char *req = NULL;
struct printparam pp;
int contentlen = 0;
int isform = 0;
pp.inbuf = 0;
pp.cp = param;
buf = myalloc(LINESIZE);
if(!buf) {RETURN(555);}
i = sockgetlinebuf(param, CLIENT, (unsigned ... | 208,643,767,936,815,360,000,000,000,000,000,000,000 | webadmin.c | 8,093,695,503,031,678,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2019-14495 | webadmin.c in 3proxy before 0.8.13 has an out-of-bounds write in the admin interface. | https://nvd.nist.gov/vuln/detail/CVE-2019-14495 |
161,224 | 3proxy | 3b67dc844789dc0f00e934270c7b349bcb547865 | https://github.com/z3APA3A/3proxy | https://github.com/z3APA3A/3proxy/commit/3b67dc844789dc0f00e934270c7b349bcb547865 | Fix: out-of-bounds write and few more bugs in 'admin' configuration upload | 0 | void * adminchild(struct clientparam* param) {
int i, res;
char * buf;
char username[256];
char *sb;
char *req = NULL;
struct printparam pp;
unsigned contentlen = 0;
int isform = 0;
pp.inbuf = 0;
pp.cp = param;
buf = myalloc(LINESIZE);
if(!buf) {RETURN(555);}
i = sockgetlinebuf(param, CLIENT, (unsi... | 330,867,647,764,447,020,000,000,000,000,000,000,000 | webadmin.c | 210,754,516,119,364,600,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2019-14495 | webadmin.c in 3proxy before 0.8.13 has an out-of-bounds write in the admin interface. | https://nvd.nist.gov/vuln/detail/CVE-2019-14495 |
3,970 | libmodbus | 5ccdf5ef79d742640355d1132fa9e2abc7fbaefc | https://github.com/stephane/libmodbus | https://github.com/stephane/libmodbus/commit/5ccdf5ef79d742640355d1132fa9e2abc7fbaefc | Fix VD-1301 and VD-1302 vulnerabilities
This patch was contributed by Maor Vermucht and Or Peles from
VDOO Connected Trust. | 1 | int modbus_reply(modbus_t *ctx, const uint8_t *req,
int req_length, modbus_mapping_t *mb_mapping)
{
int offset;
int slave;
int function;
uint16_t address;
uint8_t rsp[MAX_MESSAGE_LENGTH];
int rsp_length = 0;
sft_t sft;
if (ctx == NULL) {
errno = EINVAL;
... | 118,810,954,539,967,250,000,000,000,000,000,000,000 | modbus.c | 310,438,196,523,364,550,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-14462 | An issue was discovered in libmodbus before 3.0.7 and 3.1.x before 3.1.5. There is an out-of-bounds read for the MODBUS_FC_WRITE_MULTIPLE_COILS case, aka VD-1302. | https://nvd.nist.gov/vuln/detail/CVE-2019-14462 |
161,225 | libmodbus | 5ccdf5ef79d742640355d1132fa9e2abc7fbaefc | https://github.com/stephane/libmodbus | https://github.com/stephane/libmodbus/commit/5ccdf5ef79d742640355d1132fa9e2abc7fbaefc | Fix VD-1301 and VD-1302 vulnerabilities
This patch was contributed by Maor Vermucht and Or Peles from
VDOO Connected Trust. | 0 | int modbus_reply(modbus_t *ctx, const uint8_t *req,
int req_length, modbus_mapping_t *mb_mapping)
{
int offset;
int slave;
int function;
uint16_t address;
uint8_t rsp[MAX_MESSAGE_LENGTH];
int rsp_length = 0;
sft_t sft;
if (ctx == NULL) {
errno = EINVAL;
... | 136,095,312,023,237,790,000,000,000,000,000,000,000 | modbus.c | 168,196,760,599,866,200,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-14462 | An issue was discovered in libmodbus before 3.0.7 and 3.1.x before 3.1.5. There is an out-of-bounds read for the MODBUS_FC_WRITE_MULTIPLE_COILS case, aka VD-1302. | https://nvd.nist.gov/vuln/detail/CVE-2019-14462 |
3,972 | nfdump | 3b006ededaf351f1723aea6c727c9edd1b1fff9b | https://github.com/phaag/nfdump | https://github.com/phaag/nfdump/commit/3b006ededaf351f1723aea6c727c9edd1b1fff9b | Fix potential unsigned integer underflow | 1 | static void Process_ipfix_template_withdraw(exporter_ipfix_domain_t *exporter, void *DataPtr, uint32_t size_left, FlowSource_t *fs) {
ipfix_template_record_t *ipfix_template_record;
while ( size_left ) {
uint32_t id;
ipfix_template_record = (ipfix_template_record_t *)DataPtr;
size_left -= 4;
id = ... | 255,402,460,928,750,500,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2019-14459 | nfdump 1.6.17 and earlier is affected by an integer overflow in the function Process_ipfix_template_withdraw in ipfix.c that can be abused in order to crash the process remotely (denial of service). | https://nvd.nist.gov/vuln/detail/CVE-2019-14459 |
161,227 | nfdump | 3b006ededaf351f1723aea6c727c9edd1b1fff9b | https://github.com/phaag/nfdump | https://github.com/phaag/nfdump/commit/3b006ededaf351f1723aea6c727c9edd1b1fff9b | Fix potential unsigned integer underflow | 0 | static void Process_ipfix_template_withdraw(exporter_ipfix_domain_t *exporter, void *DataPtr, uint32_t size_left, FlowSource_t *fs) {
ipfix_template_record_t *ipfix_template_record;
while ( size_left ) {
uint32_t id;
if ( size_left < 4 ) {
LogError("Process_ipfix [%u] Template withdraw size error at %s lin... | 127,575,173,521,629,320,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2019-14459 | nfdump 1.6.17 and earlier is affected by an integer overflow in the function Process_ipfix_template_withdraw in ipfix.c that can be abused in order to crash the process remotely (denial of service). | https://nvd.nist.gov/vuln/detail/CVE-2019-14459 |
3,973 | ssdp-responder | ce04b1f29a137198182f60bbb628d5ceb8171765 | https://github.com/troglobit/ssdp-responder | https://github.com/troglobit/ssdp-responder/commit/ce04b1f29a137198182f60bbb628d5ceb8171765 | Fix #1: Ensure recv buf is always NUL terminated
Signed-off-by: Joachim Nilsson <troglobit@gmail.com> | 1 | static void ssdp_recv(int sd)
{
ssize_t len;
struct sockaddr sa;
socklen_t salen;
char buf[MAX_PKT_SIZE];
memset(buf, 0, sizeof(buf));
len = recvfrom(sd, buf, sizeof(buf), MSG_DONTWAIT, &sa, &salen);
if (len > 0) {
buf[len] = 0;
if (sa.sa_family != AF_INET)
return;
if (strstr(buf, "M-SEARCH *... | 280,032,986,814,402,150,000,000,000,000,000,000,000 | ssdpd.c | 339,921,506,989,161,030,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2019-14323 | SSDP Responder 1.x through 1.5 mishandles incoming network messages, leading to a stack-based buffer overflow by 1 byte. This results in a crash of the server, but only when strict stack checking is enabled. This is caused by an off-by-one error in ssdp_recv in ssdpd.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-14323 |
161,228 | ssdp-responder | ce04b1f29a137198182f60bbb628d5ceb8171765 | https://github.com/troglobit/ssdp-responder | https://github.com/troglobit/ssdp-responder/commit/ce04b1f29a137198182f60bbb628d5ceb8171765 | Fix #1: Ensure recv buf is always NUL terminated
Signed-off-by: Joachim Nilsson <troglobit@gmail.com> | 0 | static void ssdp_recv(int sd)
{
ssize_t len;
struct sockaddr sa;
socklen_t salen;
char buf[MAX_PKT_SIZE + 1];
memset(buf, 0, sizeof(buf));
len = recvfrom(sd, buf, sizeof(buf) - 1, MSG_DONTWAIT, &sa, &salen);
if (len > 0) {
if (sa.sa_family != AF_INET)
return;
if (strstr(buf, "M-SEARCH *")) {
... | 335,161,480,007,111,900,000,000,000,000,000,000,000 | ssdpd.c | 285,958,017,955,953,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2019-14323 | SSDP Responder 1.x through 1.5 mishandles incoming network messages, leading to a stack-based buffer overflow by 1 byte. This results in a crash of the server, but only when strict stack checking is enabled. This is caused by an off-by-one error in ssdp_recv in ssdpd.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-14323 |
3,975 | linux | da99466ac243f15fbba65bd261bfc75ffa1532b6 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/da99466ac243f15fbba65bd261bfc75ffa1532b6 | floppy: fix out-of-bounds read in copy_buffer
This fixes a global out-of-bounds read access in the copy_buffer
function of the floppy driver.
The FDDEFPRM ioctl allows one to set the geometry of a disk. The sect
and head fields (unsigned int) of the floppy_drive structure are used to
compute the max_sector (int) in ... | 1 | static int set_geometry(unsigned int cmd, struct floppy_struct *g,
int drive, int type, struct block_device *bdev)
{
int cnt;
/* sanity checking for parameters. */
if (g->sect <= 0 ||
g->head <= 0 ||
/* check for zero in F_SECT_PER_TRACK */
(unsigned char)((g->sect << 2) >> FD_SIZECODE... | 296,852,991,544,563,100,000,000,000,000,000,000,000 | floppy.c | 82,662,511,541,790,550,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-14283 | In the Linux kernel before 5.2.3, set_geometry in drivers/block/floppy.c does not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk has been inserted. NOTE: QEMU creates the floppy device by default. | https://nvd.nist.gov/vuln/detail/CVE-2019-14283 |
161,229 | linux | da99466ac243f15fbba65bd261bfc75ffa1532b6 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/da99466ac243f15fbba65bd261bfc75ffa1532b6 | floppy: fix out-of-bounds read in copy_buffer
This fixes a global out-of-bounds read access in the copy_buffer
function of the floppy driver.
The FDDEFPRM ioctl allows one to set the geometry of a disk. The sect
and head fields (unsigned int) of the floppy_drive structure are used to
compute the max_sector (int) in ... | 0 | static int set_geometry(unsigned int cmd, struct floppy_struct *g,
int drive, int type, struct block_device *bdev)
{
int cnt;
/* sanity checking for parameters. */
if ((int)g->sect <= 0 ||
(int)g->head <= 0 ||
/* check for overflow in max_sector */
(int)(g->sect * g->head) <= 0 ||
... | 289,239,221,328,007,470,000,000,000,000,000,000,000 | floppy.c | 56,207,149,155,076,080,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-14283 | In the Linux kernel before 5.2.3, set_geometry in drivers/block/floppy.c does not validate the sect and head fields, as demonstrated by an integer overflow and out-of-bounds read. It can be triggered by an unprivileged local user when a floppy disk has been inserted. NOTE: QEMU creates the floppy device by default. | https://nvd.nist.gov/vuln/detail/CVE-2019-14283 |
3,976 | ImageMagick6 | 4f31d78716ac94c85c244efcea368fea202e2ed4 | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/4f31d78716ac94c85c244efcea368fea202e2ed4 | https://github.com/ImageMagick/ImageMagick/issues/1629 | 1 | MagickExport void RemoveDuplicateLayers(Image **images,
ExceptionInfo *exception)
{
register Image
*curr,
*next;
RectangleInfo
bounds;
assert((*images) != (const Image *) NULL);
assert((*images)->signature == MagickCoreSignature);
if ((*images)->debug != MagickFalse)
(void) LogMag... | 325,777,336,146,972,950,000,000,000,000,000,000,000 | layer.c | 274,333,210,266,149,130,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2019-13454 | ImageMagick 7.0.8-54 Q16 allows Division by Zero in RemoveDuplicateLayers in MagickCore/layer.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-13454 |
161,230 | ImageMagick6 | 4f31d78716ac94c85c244efcea368fea202e2ed4 | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/4f31d78716ac94c85c244efcea368fea202e2ed4 | https://github.com/ImageMagick/ImageMagick/issues/1629 | 0 | MagickExport void RemoveDuplicateLayers(Image **images,
MagickExport void RemoveDuplicateLayers(Image **images,ExceptionInfo *exception)
{
RectangleInfo
bounds;
register Image
*image,
*next;
assert((*images) != (const Image *) NULL);
assert((*images)->signature == MagickCoreSignature);
if... | 265,112,738,087,403,950,000,000,000,000,000,000,000 | None | null | [
"CWE-369"
] | CVE-2019-13454 | ImageMagick 7.0.8-54 Q16 allows Division by Zero in RemoveDuplicateLayers in MagickCore/layer.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-13454 |
3,979 | ImageMagick6 | bb812022d0bc12107db215c981cab0b1ccd73d91 | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/bb812022d0bc12107db215c981cab0b1ccd73d91 | https://github.com/ImageMagick/ImageMagick/issues/1623 | 1 | WandExport MagickBooleanType MogrifyImageList(ImageInfo *image_info,
const int argc,const char **argv,Image **images,ExceptionInfo *exception)
{
ChannelType
channel;
const char
*option;
ImageInfo
*mogrify_info;
MagickStatusType
status;
QuantizeInfo
*quantize_info;
register ssize_t... | 271,961,819,426,692,350,000,000,000,000,000,000,000 | mogrify.c | 239,266,582,883,320,800,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2019-13311 | ImageMagick 7.0.8-50 Q16 has memory leaks at AcquireMagickMemory because of a wand/mogrify.c error. | https://nvd.nist.gov/vuln/detail/CVE-2019-13311 |
161,232 | ImageMagick6 | bb812022d0bc12107db215c981cab0b1ccd73d91 | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/bb812022d0bc12107db215c981cab0b1ccd73d91 | https://github.com/ImageMagick/ImageMagick/issues/1623 | 0 | WandExport MagickBooleanType MogrifyImageList(ImageInfo *image_info,
const int argc,const char **argv,Image **images,ExceptionInfo *exception)
{
ChannelType
channel;
const char
*option;
ImageInfo
*mogrify_info;
MagickStatusType
status;
QuantizeInfo
*quantize_info;
register ssize_t... | 100,547,208,158,693,220,000,000,000,000,000,000,000 | mogrify.c | 322,727,302,508,814,900,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2019-13311 | ImageMagick 7.0.8-50 Q16 has memory leaks at AcquireMagickMemory because of a wand/mogrify.c error. | https://nvd.nist.gov/vuln/detail/CVE-2019-13311 |
3,981 | ImageMagick6 | 19651f3db63fa1511ed83a348c4c82fa553f8d01 | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/19651f3db63fa1511ed83a348c4c82fa553f8d01 | https://github.com/ImageMagick/ImageMagick/issues/1595 | 1 | MagickExport Image *ComplexImages(const Image *images,const ComplexOperator op,
ExceptionInfo *exception)
{
#define ComplexImageTag "Complex/Image"
CacheView
*Ai_view,
*Ar_view,
*Bi_view,
*Br_view,
*Ci_view,
*Cr_view;
const char
*artifact;
const Image
*Ai_image,
*Ar_image... | 27,837,401,205,454,582,000,000,000,000,000,000,000 | fourier.c | 247,841,583,304,662,700,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2019-13308 | ImageMagick 7.0.8-50 Q16 has a heap-based buffer overflow in MagickCore/fourier.c in ComplexImage. | https://nvd.nist.gov/vuln/detail/CVE-2019-13308 |
161,233 | ImageMagick6 | 19651f3db63fa1511ed83a348c4c82fa553f8d01 | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/19651f3db63fa1511ed83a348c4c82fa553f8d01 | https://github.com/ImageMagick/ImageMagick/issues/1595 | 0 | MagickExport Image *ComplexImages(const Image *images,const ComplexOperator op,
ExceptionInfo *exception)
{
#define ComplexImageTag "Complex/Image"
CacheView
*Ai_view,
*Ar_view,
*Bi_view,
*Br_view,
*Ci_view,
*Cr_view;
const char
*artifact;
const Image
*Ai_image,
*Ar_image... | 172,163,545,142,626,580,000,000,000,000,000,000,000 | fourier.c | 18,157,732,769,012,660,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2019-13308 | ImageMagick 7.0.8-50 Q16 has a heap-based buffer overflow in MagickCore/fourier.c in ComplexImage. | https://nvd.nist.gov/vuln/detail/CVE-2019-13308 |
3,984 | ImageMagick | 7689875ef64f34141e7292f6945efdf0530b4a5e | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/7689875ef64f34141e7292f6945efdf0530b4a5e | https://github.com/ImageMagick/ImageMagick/issues/1614 | 1 | static MagickBooleanType WritePNMImage(const ImageInfo *image_info,Image *image,
ExceptionInfo *exception)
{
char
buffer[MagickPathExtent],
format,
magick[MagickPathExtent];
const char
*value;
MagickBooleanType
status;
MagickOffsetType
scene;
Quantum
index;
QuantumAny
... | 238,763,905,085,634,700,000,000,000,000,000,000,000 | pnm.c | 126,691,523,255,213,540,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2019-13304 | ImageMagick 7.0.8-50 Q16 has a stack-based buffer overflow at coders/pnm.c in WritePNMImage because of a misplaced assignment. | https://nvd.nist.gov/vuln/detail/CVE-2019-13304 |
161,234 | ImageMagick | 7689875ef64f34141e7292f6945efdf0530b4a5e | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/7689875ef64f34141e7292f6945efdf0530b4a5e | https://github.com/ImageMagick/ImageMagick/issues/1614 | 0 | static MagickBooleanType WritePNMImage(const ImageInfo *image_info,Image *image,
ExceptionInfo *exception)
{
char
buffer[MagickPathExtent],
format,
magick[MagickPathExtent];
const char
*value;
MagickBooleanType
status;
MagickOffsetType
scene;
Quantum
index;
QuantumAny
... | 212,877,802,773,805,630,000,000,000,000,000,000,000 | pnm.c | 78,942,154,286,481,280,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2019-13304 | ImageMagick 7.0.8-50 Q16 has a stack-based buffer overflow at coders/pnm.c in WritePNMImage because of a misplaced assignment. | https://nvd.nist.gov/vuln/detail/CVE-2019-13304 |
3,985 | ImageMagick | d5089971bd792311aaab5cb73460326d7ef7f32d | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/d5089971bd792311aaab5cb73460326d7ef7f32d | https://github.com/ImageMagick/ImageMagick/issues/1597 | 1 | MagickExport Image *ComplexImages(const Image *images,const ComplexOperator op,
ExceptionInfo *exception)
{
#define ComplexImageTag "Complex/Image"
CacheView
*Ai_view,
*Ar_view,
*Bi_view,
*Br_view,
*Ci_view,
*Cr_view;
const char
*artifact;
const Image
*Ai_image,
*Ar_image... | 52,955,262,328,526,060,000,000,000,000,000,000,000 | fourier.c | 124,486,227,486,599,340,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-13302 | ImageMagick 7.0.8-50 Q16 has a heap-based buffer over-read in MagickCore/fourier.c in ComplexImages. | https://nvd.nist.gov/vuln/detail/CVE-2019-13302 |
161,235 | ImageMagick | d5089971bd792311aaab5cb73460326d7ef7f32d | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/d5089971bd792311aaab5cb73460326d7ef7f32d | https://github.com/ImageMagick/ImageMagick/issues/1597 | 0 | MagickExport Image *ComplexImages(const Image *images,const ComplexOperator op,
ExceptionInfo *exception)
{
#define ComplexImageTag "Complex/Image"
CacheView
*Ai_view,
*Ar_view,
*Bi_view,
*Br_view,
*Ci_view,
*Cr_view;
const char
*artifact;
const Image
*Ai_image,
*Ar_image... | 275,310,954,133,013,060,000,000,000,000,000,000,000 | fourier.c | 49,978,581,568,202,490,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-13302 | ImageMagick 7.0.8-50 Q16 has a heap-based buffer over-read in MagickCore/fourier.c in ComplexImages. | https://nvd.nist.gov/vuln/detail/CVE-2019-13302 |
3,987 | ImageMagick6 | 5e409ae7a389cdf2ed17469303be3f3f21cec450 | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/5e409ae7a389cdf2ed17469303be3f3f21cec450 | https://github.com/ImageMagick/ImageMagick/issues/1586 | 1 | static MagickPixelPacket **AcquirePixelThreadSet(const Image *image)
{
MagickPixelPacket
**pixels;
register ssize_t
i,
j;
size_t
number_threads;
number_threads=(size_t) GetMagickResourceLimit(ThreadResource);
pixels=(MagickPixelPacket **) AcquireQuantumMemory(number_threads,
s... | 298,386,231,418,854,870,000,000,000,000,000,000,000 | statistic.c | 130,627,906,262,576,380,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2019-13300 | ImageMagick 7.0.8-50 Q16 has a heap-based buffer overflow at MagickCore/statistic.c in EvaluateImages because of mishandling columns. | https://nvd.nist.gov/vuln/detail/CVE-2019-13300 |
161,236 | ImageMagick6 | 5e409ae7a389cdf2ed17469303be3f3f21cec450 | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/5e409ae7a389cdf2ed17469303be3f3f21cec450 | https://github.com/ImageMagick/ImageMagick/issues/1586 | 0 | static MagickPixelPacket **AcquirePixelThreadSet(const Image *image)
static MagickPixelPacket **AcquirePixelThreadSet(const Image *images)
{
const Image
*next;
MagickPixelPacket
**pixels;
register ssize_t
i,
j;
size_t
columns,
number_threads;
number_threads=(size_t) GetMa... | 44,242,994,469,090,320,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2019-13300 | ImageMagick 7.0.8-50 Q16 has a heap-based buffer overflow at MagickCore/statistic.c in EvaluateImages because of mishandling columns. | https://nvd.nist.gov/vuln/detail/CVE-2019-13300 |
3,988 | ImageMagick | d4fc44b58a14f76b1ac997517d742ee12c9dc5d3 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/d4fc44b58a14f76b1ac997517d742ee12c9dc5d3 | https://github.com/ImageMagick/ImageMagick/issues/1611 | 1 | MagickExport Image *EnhanceImage(const Image *image,ExceptionInfo *exception)
{
#define EnhanceImageTag "Enhance/Image"
#define EnhancePixel(weight) \
mean=QuantumScale*((double) GetPixelRed(image,r)+pixel.red)/2.0; \
distance=QuantumScale*((double) GetPixelRed(image,r)-pixel.red); \
distance_squared=(4.0+mean)*... | 39,724,954,808,497,897,000,000,000,000,000,000,000 | enhance.c | 155,505,691,939,167,960,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2019-13298 | ImageMagick 7.0.8-50 Q16 has a heap-based buffer overflow at MagickCore/pixel-accessor.h in SetPixelViaPixelInfo because of a MagickCore/enhance.c error. | https://nvd.nist.gov/vuln/detail/CVE-2019-13298 |
161,237 | ImageMagick | d4fc44b58a14f76b1ac997517d742ee12c9dc5d3 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/d4fc44b58a14f76b1ac997517d742ee12c9dc5d3 | https://github.com/ImageMagick/ImageMagick/issues/1611 | 0 | MagickExport Image *EnhanceImage(const Image *image,ExceptionInfo *exception)
{
#define EnhanceImageTag "Enhance/Image"
#define EnhancePixel(weight) \
mean=QuantumScale*((double) GetPixelRed(image,r)+pixel.red)/2.0; \
distance=QuantumScale*((double) GetPixelRed(image,r)-pixel.red); \
distance_squared=(4.0+mean)*... | 114,389,103,699,748,440,000,000,000,000,000,000,000 | enhance.c | 86,958,995,252,953,000,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2019-13298 | ImageMagick 7.0.8-50 Q16 has a heap-based buffer overflow at MagickCore/pixel-accessor.h in SetPixelViaPixelInfo because of a MagickCore/enhance.c error. | https://nvd.nist.gov/vuln/detail/CVE-2019-13298 |
3,989 | ImageMagick6 | 35c7032723d85eee7318ff6c82f031fa2666b773 | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/35c7032723d85eee7318ff6c82f031fa2666b773 | https://github.com/ImageMagick/ImageMagick/issues/1609 | 1 | MagickExport Image *AdaptiveThresholdImage(const Image *image,
const size_t width,const size_t height,const ssize_t offset,
ExceptionInfo *exception)
{
#define ThresholdImageTag "Threshold/Image"
CacheView
*image_view,
*threshold_view;
Image
*threshold_image;
MagickBooleanType
status;
M... | 320,134,287,425,152,820,000,000,000,000,000,000,000 | threshold.c | 115,482,682,457,321,940,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-13297 | ImageMagick 7.0.8-50 Q16 has a heap-based buffer over-read at MagickCore/threshold.c in AdaptiveThresholdImage because a height of zero is mishandled. | https://nvd.nist.gov/vuln/detail/CVE-2019-13297 |
161,238 | ImageMagick6 | 35c7032723d85eee7318ff6c82f031fa2666b773 | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/35c7032723d85eee7318ff6c82f031fa2666b773 | https://github.com/ImageMagick/ImageMagick/issues/1609 | 0 | MagickExport Image *AdaptiveThresholdImage(const Image *image,
const size_t width,const size_t height,const ssize_t offset,
ExceptionInfo *exception)
{
#define ThresholdImageTag "Threshold/Image"
CacheView
*image_view,
*threshold_view;
Image
*threshold_image;
MagickBooleanType
status;
M... | 207,041,805,623,304,600,000,000,000,000,000,000,000 | threshold.c | 54,537,054,846,566,605,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-13297 | ImageMagick 7.0.8-50 Q16 has a heap-based buffer over-read at MagickCore/threshold.c in AdaptiveThresholdImage because a height of zero is mishandled. | https://nvd.nist.gov/vuln/detail/CVE-2019-13297 |
3,990 | ImageMagick | ce08a3691a8ac29125e29fc41967b3737fa3f425 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/ce08a3691a8ac29125e29fc41967b3737fa3f425 | https://github.com/ImageMagick/ImageMagick/issues/1604 | 1 | WandPrivate MagickBooleanType CLIListOperatorImages(MagickCLI *cli_wand,
const char *option,const char *arg1n,const char *arg2n)
{
const char /* percent escaped versions of the args */
*arg1,
*arg2;
Image
*new_images;
MagickStatusType
status;
ssize_t
parse;
#define _image_info (... | 306,991,356,440,369,000,000,000,000,000,000,000,000 | operation.c | 157,788,665,975,600,050,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2019-13296 | ImageMagick 7.0.8-50 Q16 has direct memory leaks in AcquireMagickMemory because of an error in CLIListOperatorImages in MagickWand/operation.c for a NULL value. | https://nvd.nist.gov/vuln/detail/CVE-2019-13296 |
161,239 | ImageMagick | ce08a3691a8ac29125e29fc41967b3737fa3f425 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/ce08a3691a8ac29125e29fc41967b3737fa3f425 | https://github.com/ImageMagick/ImageMagick/issues/1604 | 0 | WandPrivate MagickBooleanType CLIListOperatorImages(MagickCLI *cli_wand,
const char *option,const char *arg1n,const char *arg2n)
{
const char /* percent escaped versions of the args */
*arg1,
*arg2;
Image
*new_images;
MagickStatusType
status;
ssize_t
parse;
#define _image_info (... | 194,068,701,374,956,200,000,000,000,000,000,000,000 | operation.c | 237,629,883,327,894,250,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2019-13296 | ImageMagick 7.0.8-50 Q16 has direct memory leaks in AcquireMagickMemory because of an error in CLIListOperatorImages in MagickWand/operation.c for a NULL value. | https://nvd.nist.gov/vuln/detail/CVE-2019-13296 |
3,992 | linux | 6994eefb0053799d2e07cd140df6c2ea106c41ee | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6994eefb0053799d2e07cd140df6c2ea106c41ee | ptrace: Fix ->ptracer_cred handling for PTRACE_TRACEME
Fix two issues:
When called for PTRACE_TRACEME, ptrace_link() would obtain an RCU
reference to the parent's objective credentials, then give that pointer
to get_cred(). However, the object lifetime rules for things like
struct cred do not permit unconditionally ... | 1 | static void ptrace_link(struct task_struct *child, struct task_struct *new_parent)
{
rcu_read_lock();
__ptrace_link(child, new_parent, __task_cred(new_parent));
rcu_read_unlock();
}
| 156,288,679,258,947,600,000,000,000,000,000,000,000 | ptrace.c | 156,184,805,185,643,770,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2019-13272 | In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges ... | https://nvd.nist.gov/vuln/detail/CVE-2019-13272 |
161,240 | linux | 6994eefb0053799d2e07cd140df6c2ea106c41ee | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6994eefb0053799d2e07cd140df6c2ea106c41ee | ptrace: Fix ->ptracer_cred handling for PTRACE_TRACEME
Fix two issues:
When called for PTRACE_TRACEME, ptrace_link() would obtain an RCU
reference to the parent's objective credentials, then give that pointer
to get_cred(). However, the object lifetime rules for things like
struct cred do not permit unconditionally ... | 0 | static void ptrace_link(struct task_struct *child, struct task_struct *new_parent)
{
__ptrace_link(child, new_parent, current_cred());
}
| 155,344,718,164,282,690,000,000,000,000,000,000,000 | ptrace.c | 269,111,176,348,979,430,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2019-13272 | In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges ... | https://nvd.nist.gov/vuln/detail/CVE-2019-13272 |
3,998 | oniguruma | 0f7f61ed1b7b697e283e37bd2d731d0bd57adb55 | https://github.com/kkos/oniguruma | https://github.com/kkos/oniguruma/commit/0f7f61ed1b7b697e283e37bd2d731d0bd57adb55 | Fix CVE-2019-13224: don't allow different encodings for onig_new_deluxe() | 1 | onig_new_deluxe(regex_t** reg, const UChar* pattern, const UChar* pattern_end,
OnigCompileInfo* ci, OnigErrorInfo* einfo)
{
int r;
UChar *cpat, *cpat_end;
if (IS_NOT_NULL(einfo)) einfo->par = (UChar* )NULL;
if (ci->pattern_enc != ci->target_enc) {
r = conv_encoding(ci->pattern_enc, ci-... | 271,415,581,749,750,400,000,000,000,000,000,000,000 | regext.c | 108,449,085,595,308,860,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2019-13224 | A use-after-free in onig_new_deluxe() in regext.c in Oniguruma 6.9.2 allows attackers to potentially cause information disclosure, denial of service, or possibly code execution by providing a crafted regular expression. The attacker provides a pair of a regex pattern and a string, with a multi-byte encoding that gets h... | https://nvd.nist.gov/vuln/detail/CVE-2019-13224 |
161,246 | oniguruma | 0f7f61ed1b7b697e283e37bd2d731d0bd57adb55 | https://github.com/kkos/oniguruma | https://github.com/kkos/oniguruma/commit/0f7f61ed1b7b697e283e37bd2d731d0bd57adb55 | Fix CVE-2019-13224: don't allow different encodings for onig_new_deluxe() | 0 | onig_new_deluxe(regex_t** reg, const UChar* pattern, const UChar* pattern_end,
OnigCompileInfo* ci, OnigErrorInfo* einfo)
{
int r;
UChar *cpat, *cpat_end;
if (IS_NOT_NULL(einfo)) einfo->par = (UChar* )NULL;
if (ci->pattern_enc != ci->target_enc) {
return ONIGERR_NOT_SUPPORTED_ENCODING_... | 224,887,714,749,809,400,000,000,000,000,000,000,000 | regext.c | 112,443,550,990,439,670,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2019-13224 | A use-after-free in onig_new_deluxe() in regext.c in Oniguruma 6.9.2 allows attackers to potentially cause information disclosure, denial of service, or possibly code execution by providing a crafted regular expression. The attacker provides a pair of a regex pattern and a string, with a multi-byte encoding that gets h... | https://nvd.nist.gov/vuln/detail/CVE-2019-13224 |
3,999 | stb | 98fdfc6df88b1e34a736d5e126e6c8139c8de1a6 | https://github.com/nothings/stb | https://github.com/nothings/stb/commit/98fdfc6df88b1e34a736d5e126e6c8139c8de1a6 | Fix seven bugs discovered and fixed by ForAllSecure:
CVE-2019-13217: heap buffer overflow in start_decoder()
CVE-2019-13218: stack buffer overflow in compute_codewords()
CVE-2019-13219: uninitialized memory in vorbis_decode_packet_rest()
CVE-2019-13220: out-of-range read in draw_line()
CVE-2019-13221: issue with large... | 1 | static __forceinline void draw_line(float *output, int x0, int y0, int x1, int y1, int n)
{
int dy = y1 - y0;
int adx = x1 - x0;
int ady = abs(dy);
int base;
int x=x0,y=y0;
int err = 0;
int sy;
#ifdef STB_VORBIS_DIVIDE_TABLE
if (adx < DIVTAB_DENOM && ady < DIVTAB_NUMER) {
if (dy < 0) {
... | 148,378,993,502,453,470,000,000,000,000,000,000,000 | stb_vorbis.c | 334,088,542,074,155,050,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2019-13219 | A NULL pointer dereference in the get_window function in stb_vorbis through 2019-03-04 allows an attacker to cause a denial of service by opening a crafted Ogg Vorbis file. | https://nvd.nist.gov/vuln/detail/CVE-2019-13219 |
161,247 | stb | 98fdfc6df88b1e34a736d5e126e6c8139c8de1a6 | https://github.com/nothings/stb | https://github.com/nothings/stb/commit/98fdfc6df88b1e34a736d5e126e6c8139c8de1a6 | Fix seven bugs discovered and fixed by ForAllSecure:
CVE-2019-13217: heap buffer overflow in start_decoder()
CVE-2019-13218: stack buffer overflow in compute_codewords()
CVE-2019-13219: uninitialized memory in vorbis_decode_packet_rest()
CVE-2019-13220: out-of-range read in draw_line()
CVE-2019-13221: issue with large... | 0 | static __forceinline void draw_line(float *output, int x0, int y0, int x1, int y1, int n)
{
int dy = y1 - y0;
int adx = x1 - x0;
int ady = abs(dy);
int base;
int x=x0,y=y0;
int err = 0;
int sy;
#ifdef STB_VORBIS_DIVIDE_TABLE
if (adx < DIVTAB_DENOM && ady < DIVTAB_NUMER) {
if (dy < 0) {
... | 239,049,947,196,564,480,000,000,000,000,000,000,000 | stb_vorbis.c | 196,552,066,288,262,920,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2019-13219 | A NULL pointer dereference in the get_window function in stb_vorbis through 2019-03-04 allows an attacker to cause a denial of service by opening a crafted Ogg Vorbis file. | https://nvd.nist.gov/vuln/detail/CVE-2019-13219 |
4,000 | stb | 98fdfc6df88b1e34a736d5e126e6c8139c8de1a6 | https://github.com/nothings/stb | https://github.com/nothings/stb/commit/98fdfc6df88b1e34a736d5e126e6c8139c8de1a6 | Fix seven bugs discovered and fixed by ForAllSecure:
CVE-2019-13217: heap buffer overflow in start_decoder()
CVE-2019-13218: stack buffer overflow in compute_codewords()
CVE-2019-13219: uninitialized memory in vorbis_decode_packet_rest()
CVE-2019-13220: out-of-range read in draw_line()
CVE-2019-13221: issue with large... | 1 | static float *get_window(vorb *f, int len)
{
len <<= 1;
if (len == f->blocksize_0) return f->window[0];
if (len == f->blocksize_1) return f->window[1];
assert(0);
return NULL;
}
| 54,906,354,596,068,530,000,000,000,000,000,000,000 | stb_vorbis.c | 334,088,542,074,155,050,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2019-13219 | A NULL pointer dereference in the get_window function in stb_vorbis through 2019-03-04 allows an attacker to cause a denial of service by opening a crafted Ogg Vorbis file. | https://nvd.nist.gov/vuln/detail/CVE-2019-13219 |
161,248 | stb | 98fdfc6df88b1e34a736d5e126e6c8139c8de1a6 | https://github.com/nothings/stb | https://github.com/nothings/stb/commit/98fdfc6df88b1e34a736d5e126e6c8139c8de1a6 | Fix seven bugs discovered and fixed by ForAllSecure:
CVE-2019-13217: heap buffer overflow in start_decoder()
CVE-2019-13218: stack buffer overflow in compute_codewords()
CVE-2019-13219: uninitialized memory in vorbis_decode_packet_rest()
CVE-2019-13220: out-of-range read in draw_line()
CVE-2019-13221: issue with large... | 0 | static float *get_window(vorb *f, int len)
{
len <<= 1;
if (len == f->blocksize_0) return f->window[0];
if (len == f->blocksize_1) return f->window[1];
return NULL;
}
| 80,044,236,823,342,520,000,000,000,000,000,000,000 | stb_vorbis.c | 196,552,066,288,262,920,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2019-13219 | A NULL pointer dereference in the get_window function in stb_vorbis through 2019-03-04 allows an attacker to cause a denial of service by opening a crafted Ogg Vorbis file. | https://nvd.nist.gov/vuln/detail/CVE-2019-13219 |
4,001 | stb | 98fdfc6df88b1e34a736d5e126e6c8139c8de1a6 | https://github.com/nothings/stb | https://github.com/nothings/stb/commit/98fdfc6df88b1e34a736d5e126e6c8139c8de1a6 | Fix seven bugs discovered and fixed by ForAllSecure:
CVE-2019-13217: heap buffer overflow in start_decoder()
CVE-2019-13218: stack buffer overflow in compute_codewords()
CVE-2019-13219: uninitialized memory in vorbis_decode_packet_rest()
CVE-2019-13220: out-of-range read in draw_line()
CVE-2019-13221: issue with large... | 1 | static int lookup1_values(int entries, int dim)
{
int r = (int) floor(exp((float) log((float) entries) / dim));
if ((int) floor(pow((float) r+1, dim)) <= entries) // (int) cast for MinGW warning;
++r; // floor() to avoid _ftol() when non-CRT
assert(pow((f... | 246,719,121,438,152,280,000,000,000,000,000,000,000 | stb_vorbis.c | 334,088,542,074,155,050,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2019-13219 | A NULL pointer dereference in the get_window function in stb_vorbis through 2019-03-04 allows an attacker to cause a denial of service by opening a crafted Ogg Vorbis file. | https://nvd.nist.gov/vuln/detail/CVE-2019-13219 |
161,249 | stb | 98fdfc6df88b1e34a736d5e126e6c8139c8de1a6 | https://github.com/nothings/stb | https://github.com/nothings/stb/commit/98fdfc6df88b1e34a736d5e126e6c8139c8de1a6 | Fix seven bugs discovered and fixed by ForAllSecure:
CVE-2019-13217: heap buffer overflow in start_decoder()
CVE-2019-13218: stack buffer overflow in compute_codewords()
CVE-2019-13219: uninitialized memory in vorbis_decode_packet_rest()
CVE-2019-13220: out-of-range read in draw_line()
CVE-2019-13221: issue with large... | 0 | static int lookup1_values(int entries, int dim)
{
int r = (int) floor(exp((float) log((float) entries) / dim));
if ((int) floor(pow((float) r+1, dim)) <= entries) // (int) cast for MinGW warning;
++r; // floor() to avoid _ftol() when non-CRT
if (pow((floa... | 282,473,809,087,801,520,000,000,000,000,000,000,000 | stb_vorbis.c | 196,552,066,288,262,920,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2019-13219 | A NULL pointer dereference in the get_window function in stb_vorbis through 2019-03-04 allows an attacker to cause a denial of service by opening a crafted Ogg Vorbis file. | https://nvd.nist.gov/vuln/detail/CVE-2019-13219 |
4,002 | stb | 98fdfc6df88b1e34a736d5e126e6c8139c8de1a6 | https://github.com/nothings/stb | https://github.com/nothings/stb/commit/98fdfc6df88b1e34a736d5e126e6c8139c8de1a6 | Fix seven bugs discovered and fixed by ForAllSecure:
CVE-2019-13217: heap buffer overflow in start_decoder()
CVE-2019-13218: stack buffer overflow in compute_codewords()
CVE-2019-13219: uninitialized memory in vorbis_decode_packet_rest()
CVE-2019-13220: out-of-range read in draw_line()
CVE-2019-13221: issue with large... | 1 | static int start_decoder(vorb *f)
{
uint8 header[6], x,y;
int len,i,j,k, max_submaps = 0;
int longest_floorlist=0;
if (!start_page(f)) return FALSE;
if (!(f->page_flag & PAGEFLAG_first_page)) return error(f, VORBIS_invalid_first_page);
if (f->page_flag & PAGEFLAG_l... | 252,497,019,343,885,260,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2019-13219 | A NULL pointer dereference in the get_window function in stb_vorbis through 2019-03-04 allows an attacker to cause a denial of service by opening a crafted Ogg Vorbis file. | https://nvd.nist.gov/vuln/detail/CVE-2019-13219 |
161,250 | stb | 98fdfc6df88b1e34a736d5e126e6c8139c8de1a6 | https://github.com/nothings/stb | https://github.com/nothings/stb/commit/98fdfc6df88b1e34a736d5e126e6c8139c8de1a6 | Fix seven bugs discovered and fixed by ForAllSecure:
CVE-2019-13217: heap buffer overflow in start_decoder()
CVE-2019-13218: stack buffer overflow in compute_codewords()
CVE-2019-13219: uninitialized memory in vorbis_decode_packet_rest()
CVE-2019-13220: out-of-range read in draw_line()
CVE-2019-13221: issue with large... | 0 | static int start_decoder(vorb *f)
{
uint8 header[6], x,y;
int len,i,j,k, max_submaps = 0;
int longest_floorlist=0;
if (!start_page(f)) return FALSE;
if (!(f->page_flag & PAGEFLAG_first_page)) return error(f, VORBIS_invalid_first_page);
if (f->page_flag & PAGEFLAG_l... | 307,758,620,837,610,100,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2019-13219 | A NULL pointer dereference in the get_window function in stb_vorbis through 2019-03-04 allows an attacker to cause a denial of service by opening a crafted Ogg Vorbis file. | https://nvd.nist.gov/vuln/detail/CVE-2019-13219 |
4,004 | ImageMagick6 | 7d11230060fa9c8f67e53c85224daf6648805c7b | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/7d11230060fa9c8f67e53c85224daf6648805c7b | https://github.com/ImageMagick/ImageMagick/issues/1601 | 1 | static Image *ReadPSImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
#define BoundingBox "BoundingBox:"
#define BeginDocument "BeginDocument:"
#define BeginXMPPacket "<?xpacket begin="
#define EndXMPPacket "<?xpacket end="
#define ICCProfile "BeginICCProfile:"
#define CMYKCustomColor "CMYKCustomColor:... | 324,044,698,586,397,400,000,000,000,000,000,000,000 | ps.c | 201,065,018,049,002,330,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2019-13137 | ImageMagick before 7.0.8-50 has a memory leak vulnerability in the function ReadPSImage in coders/ps.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-13137 |
161,252 | ImageMagick6 | 7d11230060fa9c8f67e53c85224daf6648805c7b | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/7d11230060fa9c8f67e53c85224daf6648805c7b | https://github.com/ImageMagick/ImageMagick/issues/1601 | 0 | static Image *ReadPSImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
#define BoundingBox "BoundingBox:"
#define BeginDocument "BeginDocument:"
#define BeginXMPPacket "<?xpacket begin="
#define EndXMPPacket "<?xpacket end="
#define ICCProfile "BeginICCProfile:"
#define CMYKCustomColor "CMYKCustomColor:... | 79,794,999,147,885,250,000,000,000,000,000,000,000 | ps.c | 140,218,400,700,783,220,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2019-13137 | ImageMagick before 7.0.8-50 has a memory leak vulnerability in the function ReadPSImage in coders/ps.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-13137 |
4,005 | ImageMagick | cdb383749ef7b68a38891440af8cc23e0115306d | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/cdb383749ef7b68a38891440af8cc23e0115306d | https://github.com/ImageMagick/ImageMagick/issues/1599 | 1 | static Image *ReadCUTImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
#define ThrowCUTReaderException(severity,tag) \
{ \
if (palette != NULL) \
palette=DestroyImage(palette); \
if (clone_info != NULL) \
clone_info=DestroyImageInfo(clone_info); \
ThrowReaderException(severity,tag); \
}
Ima... | 88,863,127,355,848,590,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2019-13135 | ImageMagick before 7.0.8-50 has a "use of uninitialized value" vulnerability in the function ReadCUTImage in coders/cut.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-13135 |
161,253 | ImageMagick | cdb383749ef7b68a38891440af8cc23e0115306d | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/cdb383749ef7b68a38891440af8cc23e0115306d | https://github.com/ImageMagick/ImageMagick/issues/1599 | 0 | static Image *ReadCUTImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
#define ThrowCUTReaderException(severity,tag) \
{ \
if (palette != NULL) \
palette=DestroyImage(palette); \
if (clone_info != NULL) \
clone_info=DestroyImageInfo(clone_info); \
ThrowReaderException(severity,tag); \
}
Ima... | 27,201,390,366,141,730,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2019-13135 | ImageMagick before 7.0.8-50 has a "use of uninitialized value" vulnerability in the function ReadCUTImage in coders/cut.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-13135 |
4,006 | ImageMagick | fe3066122ef72c82415811d25e9e3fad622c0a99 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/fe3066122ef72c82415811d25e9e3fad622c0a99 | https://github.com/ImageMagick/ImageMagick/issues/1600 | 1 | static Image *ReadBMPImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
BMPInfo
bmp_info;
Image
*image;
MagickBooleanType
status;
MagickOffsetType
offset,
profile_data,
profile_size,
start_position;
MemoryInfo
*pixel_info;
Quantum
index;
register Quantu... | 86,565,001,831,407,070,000,000,000,000,000,000,000 | bmp.c | 36,858,631,049,690,346,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2019-13134 | ImageMagick before 7.0.8-50 has a memory leak vulnerability in the function ReadVIFFImage in coders/viff.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-13134 |
161,254 | ImageMagick | fe3066122ef72c82415811d25e9e3fad622c0a99 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/fe3066122ef72c82415811d25e9e3fad622c0a99 | https://github.com/ImageMagick/ImageMagick/issues/1600 | 0 | static Image *ReadBMPImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
BMPInfo
bmp_info;
Image
*image;
MagickBooleanType
status;
MagickOffsetType
offset,
profile_data,
profile_size,
start_position;
MemoryInfo
*pixel_info;
Quantum
index;
register Quantu... | 132,264,814,774,421,650,000,000,000,000,000,000,000 | bmp.c | 191,838,398,971,920,460,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2019-13134 | ImageMagick before 7.0.8-50 has a memory leak vulnerability in the function ReadVIFFImage in coders/viff.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-13134 |
4,007 | ImageMagick | fe3066122ef72c82415811d25e9e3fad622c0a99 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/fe3066122ef72c82415811d25e9e3fad622c0a99 | https://github.com/ImageMagick/ImageMagick/issues/1600 | 1 | static Image *ReadVIFFImage(const ImageInfo *image_info,
ExceptionInfo *exception)
{
#define VFF_CM_genericRGB 15
#define VFF_CM_ntscRGB 1
#define VFF_CM_NONE 0
#define VFF_DEP_DECORDER 0x4
#define VFF_DEP_NSORDER 0x8
#define VFF_DES_RAW 0
#define VFF_LOC_IMPLICIT 1
#define VFF_MAPTYP_NONE 0
#define VFF_MAPTY... | 105,511,065,680,299,740,000,000,000,000,000,000,000 | viff.c | 68,297,603,364,140,680,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2019-13134 | ImageMagick before 7.0.8-50 has a memory leak vulnerability in the function ReadVIFFImage in coders/viff.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-13134 |
161,255 | ImageMagick | fe3066122ef72c82415811d25e9e3fad622c0a99 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/fe3066122ef72c82415811d25e9e3fad622c0a99 | https://github.com/ImageMagick/ImageMagick/issues/1600 | 0 | static Image *ReadVIFFImage(const ImageInfo *image_info,
ExceptionInfo *exception)
{
#define VFF_CM_genericRGB 15
#define VFF_CM_ntscRGB 1
#define VFF_CM_NONE 0
#define VFF_DEP_DECORDER 0x4
#define VFF_DEP_NSORDER 0x8
#define VFF_DES_RAW 0
#define VFF_LOC_IMPLICIT 1
#define VFF_MAPTYP_NONE 0
#define VFF_MAPTY... | 97,411,666,062,047,380,000,000,000,000,000,000,000 | viff.c | 329,101,530,715,299,200,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2019-13134 | ImageMagick before 7.0.8-50 has a memory leak vulnerability in the function ReadVIFFImage in coders/viff.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-13134 |
4,031 | linux | 6ff7b060535e87c2ae14dd8548512abfdda528fb | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6ff7b060535e87c2ae14dd8548512abfdda528fb | mdio_bus: Fix use-after-free on device_register fails
KASAN has found use-after-free in fixed_mdio_bus_init,
commit 0c692d07842a ("drivers/net/phy/mdio_bus.c: call
put_device on device_register() failure") call put_device()
while device_register() fails,give up the last reference
to the device and allow mdiobus_releas... | 1 | int __mdiobus_register(struct mii_bus *bus, struct module *owner)
{
struct mdio_device *mdiodev;
int i, err;
struct gpio_desc *gpiod;
if (NULL == bus || NULL == bus->name ||
NULL == bus->read || NULL == bus->write)
return -EINVAL;
BUG_ON(bus->state != MDIOBUS_ALLOCATED &&
bus->state != MDIOBUS_UNR... | 332,319,665,854,404,400,000,000,000,000,000,000,000 | mdio_bus.c | 24,842,619,289,389,920,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2019-12819 | An issue was discovered in the Linux kernel before 5.0. The function __mdiobus_register() in drivers/net/phy/mdio_bus.c calls put_device(), which will trigger a fixed_mdio_bus_init use-after-free. This will cause a denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2019-12819 |
161,276 | linux | 6ff7b060535e87c2ae14dd8548512abfdda528fb | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6ff7b060535e87c2ae14dd8548512abfdda528fb | mdio_bus: Fix use-after-free on device_register fails
KASAN has found use-after-free in fixed_mdio_bus_init,
commit 0c692d07842a ("drivers/net/phy/mdio_bus.c: call
put_device on device_register() failure") call put_device()
while device_register() fails,give up the last reference
to the device and allow mdiobus_releas... | 0 | int __mdiobus_register(struct mii_bus *bus, struct module *owner)
{
struct mdio_device *mdiodev;
int i, err;
struct gpio_desc *gpiod;
if (NULL == bus || NULL == bus->name ||
NULL == bus->read || NULL == bus->write)
return -EINVAL;
BUG_ON(bus->state != MDIOBUS_ALLOCATED &&
bus->state != MDIOBUS_UNR... | 145,243,368,707,512,590,000,000,000,000,000,000,000 | mdio_bus.c | 320,326,918,310,982,460,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2019-12819 | An issue was discovered in the Linux kernel before 5.0. The function __mdiobus_register() in drivers/net/phy/mdio_bus.c calls put_device(), which will trigger a fixed_mdio_bus_init use-after-free. This will cause a denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2019-12819 |
4,034 | linux | 58bdd544e2933a21a51eecf17c3f5f94038261b5 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/58bdd544e2933a21a51eecf17c3f5f94038261b5 | net: nfc: Fix NULL dereference on nfc_llcp_build_tlv fails
KASAN report this:
BUG: KASAN: null-ptr-deref in nfc_llcp_build_gb+0x37f/0x540 [nfc]
Read of size 3 at addr 0000000000000000 by task syz-executor.0/5401
CPU: 0 PID: 5401 Comm: syz-executor.0 Not tainted 5.0.0-rc7+ #45
Hardware name: QEMU Standard PC (i440FX ... | 1 | static int nfc_llcp_build_gb(struct nfc_llcp_local *local)
{
u8 *gb_cur, *version_tlv, version, version_length;
u8 *lto_tlv, lto_length;
u8 *wks_tlv, wks_length;
u8 *miux_tlv, miux_length;
__be16 wks = cpu_to_be16(local->local_wks);
u8 gb_len = 0;
int ret = 0;
version = LLCP_VERSION_11;
version_tlv = ... | 276,762,293,576,136,130,000,000,000,000,000,000,000 | llcp_core.c | 30,611,209,877,008,776,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2019-12818 | An issue was discovered in the Linux kernel before 4.20.15. The nfc_llcp_build_tlv function in net/nfc/llcp_commands.c may return NULL. If the caller does not check for this, it will trigger a NULL pointer dereference. This will cause denial of service. This affects nfc_llcp_build_gb in net/nfc/llcp_core.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-12818 |
161,279 | linux | 58bdd544e2933a21a51eecf17c3f5f94038261b5 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/58bdd544e2933a21a51eecf17c3f5f94038261b5 | net: nfc: Fix NULL dereference on nfc_llcp_build_tlv fails
KASAN report this:
BUG: KASAN: null-ptr-deref in nfc_llcp_build_gb+0x37f/0x540 [nfc]
Read of size 3 at addr 0000000000000000 by task syz-executor.0/5401
CPU: 0 PID: 5401 Comm: syz-executor.0 Not tainted 5.0.0-rc7+ #45
Hardware name: QEMU Standard PC (i440FX ... | 0 | static int nfc_llcp_build_gb(struct nfc_llcp_local *local)
{
u8 *gb_cur, version, version_length;
u8 lto_length, wks_length, miux_length;
u8 *version_tlv = NULL, *lto_tlv = NULL,
*wks_tlv = NULL, *miux_tlv = NULL;
__be16 wks = cpu_to_be16(local->local_wks);
u8 gb_len = 0;
int ret = 0;
version = LLCP_... | 160,375,820,850,741,730,000,000,000,000,000,000,000 | llcp_core.c | 183,766,262,371,673,460,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2019-12818 | An issue was discovered in the Linux kernel before 4.20.15. The nfc_llcp_build_tlv function in net/nfc/llcp_commands.c may return NULL. If the caller does not check for this, it will trigger a NULL pointer dereference. This will cause denial of service. This affects nfc_llcp_build_gb in net/nfc/llcp_core.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-12818 |
4,038 | bubblewrap | efc89e3b939b4bde42c10f065f6b7b02958ed50e | https://github.com/containers/bubblewrap | https://github.com/projectatomic/bubblewrap/commit/efc89e3b939b4bde42c10f065f6b7b02958ed50e | Don't create our own temporary mount point for pivot_root
An attacker could pre-create /tmp/.bubblewrap-$UID and make it a
non-directory, non-symlink (in which case mounting our tmpfs would fail,
causing denial of service), or make it a symlink under their control
(potentially allowing bad things if the protected_syml... | 1 | main (int argc,
char **argv)
{
mode_t old_umask;
cleanup_free char *base_path = NULL;
int clone_flags;
char *old_cwd = NULL;
pid_t pid;
int event_fd = -1;
int child_wait_fd = -1;
int setup_finished_pipe[] = {-1, -1};
const char *new_cwd;
uid_t ns_uid;
gid_t ns_gid;
struct stat sbu... | 41,291,708,509,448,165,000,000,000,000,000,000,000 | bubblewrap.c | 67,742,006,587,564,080,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2019-12439 | bubblewrap.c in Bubblewrap before 0.3.3 misuses temporary directories in /tmp as a mount point. In some particular configurations (related to XDG_RUNTIME_DIR), a local attacker may abuse this flaw to prevent other users from executing bubblewrap or potentially execute code. | https://nvd.nist.gov/vuln/detail/CVE-2019-12439 |
161,284 | bubblewrap | efc89e3b939b4bde42c10f065f6b7b02958ed50e | https://github.com/containers/bubblewrap | https://github.com/projectatomic/bubblewrap/commit/efc89e3b939b4bde42c10f065f6b7b02958ed50e | Don't create our own temporary mount point for pivot_root
An attacker could pre-create /tmp/.bubblewrap-$UID and make it a
non-directory, non-symlink (in which case mounting our tmpfs would fail,
causing denial of service), or make it a symlink under their control
(potentially allowing bad things if the protected_syml... | 0 | main (int argc,
char **argv)
{
mode_t old_umask;
const char *base_path = NULL;
int clone_flags;
char *old_cwd = NULL;
pid_t pid;
int event_fd = -1;
int child_wait_fd = -1;
int setup_finished_pipe[] = {-1, -1};
const char *new_cwd;
uid_t ns_uid;
gid_t ns_gid;
struct stat sbuf;
ui... | 316,681,900,437,652,380,000,000,000,000,000,000,000 | bubblewrap.c | 288,907,675,690,756,020,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2019-12439 | bubblewrap.c in Bubblewrap before 0.3.3 misuses temporary directories in /tmp as a mount point. In some particular configurations (related to XDG_RUNTIME_DIR), a local attacker may abuse this flaw to prevent other users from executing bubblewrap or potentially execute code. | https://nvd.nist.gov/vuln/detail/CVE-2019-12439 |
4,039 | miniupnp | cb8a02af7a5677cf608e86d57ab04241cf34e24f | https://github.com/miniupnp/miniupnp | https://github.com/miniupnp/miniupnp/commit/cb8a02af7a5677cf608e86d57ab04241cf34e24f | pcpserver.c: copyIPv6IfDifferent() check for NULL src argument | 1 | static void copyIPv6IfDifferent(void * dest, const void * src)
{
if(dest != src) {
memcpy(dest, src, sizeof(struct in6_addr));
}
}
| 329,926,470,648,283,770,000,000,000,000,000,000,000 | pcpserver.c | 144,192,023,563,153,640,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2019-12111 | A Denial Of Service vulnerability in MiniUPnP MiniUPnPd through 2.1 exists due to a NULL pointer dereference in copyIPv6IfDifferent in pcpserver.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-12111 |
161,285 | miniupnp | cb8a02af7a5677cf608e86d57ab04241cf34e24f | https://github.com/miniupnp/miniupnp | https://github.com/miniupnp/miniupnp/commit/cb8a02af7a5677cf608e86d57ab04241cf34e24f | pcpserver.c: copyIPv6IfDifferent() check for NULL src argument | 0 | static void copyIPv6IfDifferent(void * dest, const void * src)
{
if(dest != src && src != NULL) {
memcpy(dest, src, sizeof(struct in6_addr));
}
}
| 240,041,599,050,415,500,000,000,000,000,000,000,000 | pcpserver.c | 133,393,389,707,240,000,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2019-12111 | A Denial Of Service vulnerability in MiniUPnP MiniUPnPd through 2.1 exists due to a NULL pointer dereference in copyIPv6IfDifferent in pcpserver.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-12111 |
4,040 | miniupnp | f321c2066b96d18afa5158dfa2d2873a2957ef38 | https://github.com/miniupnp/miniupnp | https://github.com/miniupnp/miniupnp/commit/f321c2066b96d18afa5158dfa2d2873a2957ef38 | upnp_redirect(): accept NULL desc argument | 1 | upnp_redirect(const char * rhost, unsigned short eport,
const char * iaddr, unsigned short iport,
const char * protocol, const char * desc,
unsigned int leaseduration)
{
int proto, r;
char iaddr_old[32];
char rhost_old[32];
unsigned short iport_old;
struct in_addr address;... | 46,344,349,630,705,210,000,000,000,000,000,000,000 | upnpredirect.c | 92,609,255,182,890,540,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2019-12110 | An AddPortMapping Denial Of Service vulnerability in MiniUPnP MiniUPnPd through 2.1 exists due to a NULL pointer dereference in upnpredirect.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-12110 |
161,286 | miniupnp | f321c2066b96d18afa5158dfa2d2873a2957ef38 | https://github.com/miniupnp/miniupnp | https://github.com/miniupnp/miniupnp/commit/f321c2066b96d18afa5158dfa2d2873a2957ef38 | upnp_redirect(): accept NULL desc argument | 0 | upnp_redirect(const char * rhost, unsigned short eport,
const char * iaddr, unsigned short iport,
const char * protocol, const char * desc,
unsigned int leaseduration)
{
int proto, r;
char iaddr_old[32];
char rhost_old[32];
unsigned short iport_old;
struct in_addr address;... | 95,668,996,657,163,880,000,000,000,000,000,000,000 | upnpredirect.c | 108,157,219,556,769,850,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2019-12110 | An AddPortMapping Denial Of Service vulnerability in MiniUPnP MiniUPnPd through 2.1 exists due to a NULL pointer dereference in upnpredirect.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-12110 |
4,042 | miniupnp | cd506a67e174a45c6a202eff182a712955ed6d6f | https://github.com/miniupnp/miniupnp | https://github.com/miniupnp/miniupnp/commit/cd506a67e174a45c6a202eff182a712955ed6d6f | updateDevice() remove element from the list when realloc fails | 1 | updateDevice(const struct header * headers, time_t t)
{
struct device ** pp = &devlist;
struct device * p = *pp; /* = devlist; */
while(p)
{
if( p->headers[HEADER_NT].l == headers[HEADER_NT].l
&& (0==memcmp(p->headers[HEADER_NT].p, headers[HEADER_NT].p, headers[HEADER_NT].l))
&& p->headers[HEADER_USN].l ... | 221,734,464,000,496,170,000,000,000,000,000,000,000 | minissdpd.c | 279,070,277,622,417,970,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2019-12106 | The updateDevice function in minissdpd.c in MiniUPnP MiniSSDPd 1.4 and 1.5 allows a remote attacker to crash the process due to a Use After Free vulnerability. | https://nvd.nist.gov/vuln/detail/CVE-2019-12106 |
161,287 | miniupnp | cd506a67e174a45c6a202eff182a712955ed6d6f | https://github.com/miniupnp/miniupnp | https://github.com/miniupnp/miniupnp/commit/cd506a67e174a45c6a202eff182a712955ed6d6f | updateDevice() remove element from the list when realloc fails | 0 | updateDevice(const struct header * headers, time_t t)
{
struct device ** pp = &devlist;
struct device * p = *pp; /* = devlist; */
while(p)
{
if( p->headers[HEADER_NT].l == headers[HEADER_NT].l
&& (0==memcmp(p->headers[HEADER_NT].p, headers[HEADER_NT].p, headers[HEADER_NT].l))
&& p->headers[HEADER_USN].l ... | 208,003,559,432,433,950,000,000,000,000,000,000,000 | minissdpd.c | 96,589,306,211,317,110,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2019-12106 | The updateDevice function in minissdpd.c in MiniUPnP MiniSSDPd 1.4 and 1.5 allows a remote attacker to crash the process due to a Use After Free vulnerability. | https://nvd.nist.gov/vuln/detail/CVE-2019-12106 |
4,043 | heimdal | 2f7f3d9960aa6ea21358bdf3687cee5149aa35cf | https://github.com/heimdal/heimdal | https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf | CVE-2019-12098: krb5: always confirm PA-PKINIT-KX for anon PKINIT
RFC8062 Section 7 requires verification of the PA-PKINIT-KX key excahnge
when anonymous PKINIT is used. Failure to do so can permit an active
attacker to become a man-in-the-middle.
Introduced by a1ef548600c5bb51cf52a9a9ea12676506ede19f. First tagged... | 1 | krb5_init_creds_step(krb5_context context,
krb5_init_creds_context ctx,
krb5_data *in,
krb5_data *out,
krb5_krbhst_info *hostinfo,
unsigned int *flags)
{
krb5_error_code ret;
size_t len = 0;
size_t size;
AS_REQ req2;
krb5_data_zero(out);
if (ctx->as_req.req_b... | 261,068,004,113,217,340,000,000,000,000,000,000,000 | init_creds_pw.c | 312,349,701,812,782,430,000,000,000,000,000,000,000 | [
"CWE-320"
] | CVE-2019-12098 | In the client side of Heimdal before 7.6.0, failure to verify anonymous PKINIT PA-PKINIT-KX key exchange permits a man-in-the-middle attack. This issue is in krb5_init_creds_step in lib/krb5/init_creds_pw.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-12098 |
161,288 | heimdal | 2f7f3d9960aa6ea21358bdf3687cee5149aa35cf | https://github.com/heimdal/heimdal | https://github.com/heimdal/heimdal/commit/2f7f3d9960aa6ea21358bdf3687cee5149aa35cf | CVE-2019-12098: krb5: always confirm PA-PKINIT-KX for anon PKINIT
RFC8062 Section 7 requires verification of the PA-PKINIT-KX key excahnge
when anonymous PKINIT is used. Failure to do so can permit an active
attacker to become a man-in-the-middle.
Introduced by a1ef548600c5bb51cf52a9a9ea12676506ede19f. First tagged... | 0 | krb5_init_creds_step(krb5_context context,
krb5_init_creds_context ctx,
krb5_data *in,
krb5_data *out,
krb5_krbhst_info *hostinfo,
unsigned int *flags)
{
krb5_error_code ret;
size_t len = 0;
size_t size;
AS_REQ req2;
krb5_data_zero(out);
if (ctx->as_req.req_b... | 111,256,736,111,399,240,000,000,000,000,000,000,000 | init_creds_pw.c | 151,864,158,531,124,180,000,000,000,000,000,000,000 | [
"CWE-320"
] | CVE-2019-12098 | In the client side of Heimdal before 7.6.0, failure to verify anonymous PKINIT PA-PKINIT-KX key exchange permits a man-in-the-middle attack. This issue is in krb5_init_creds_step in lib/krb5/init_creds_pw.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-12098 |
4,049 | linux | a1616a5ac99ede5d605047a9012481ce7ff18b16 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a1616a5ac99ede5d605047a9012481ce7ff18b16 | Bluetooth: hidp: fix buffer overflow
Struct ca is copied from userspace. It is not checked whether the "name"
field is NULL terminated, which allows local users to obtain potentially
sensitive information from kernel stack memory, via a HIDPCONNADD command.
This vulnerability is similar to CVE-2011-1079.
Signed-off-... | 1 | static int do_hidp_sock_ioctl(struct socket *sock, unsigned int cmd, void __user *argp)
{
struct hidp_connadd_req ca;
struct hidp_conndel_req cd;
struct hidp_connlist_req cl;
struct hidp_conninfo ci;
struct socket *csock;
struct socket *isock;
int err;
BT_DBG("cmd %x arg %p", cmd, argp);
switch (cmd) {
case... | 190,362,082,081,650,330,000,000,000,000,000,000,000 | None | null | [
"CWE-77"
] | CVE-2019-11884 | The do_hidp_sock_ioctl function in net/bluetooth/hidp/sock.c in the Linux kernel before 5.0.15 allows a local user to obtain potentially sensitive information from kernel stack memory via a HIDPCONNADD command, because a name field may not end with a '\0' character. | https://nvd.nist.gov/vuln/detail/CVE-2019-11884 |
161,294 | linux | a1616a5ac99ede5d605047a9012481ce7ff18b16 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a1616a5ac99ede5d605047a9012481ce7ff18b16 | Bluetooth: hidp: fix buffer overflow
Struct ca is copied from userspace. It is not checked whether the "name"
field is NULL terminated, which allows local users to obtain potentially
sensitive information from kernel stack memory, via a HIDPCONNADD command.
This vulnerability is similar to CVE-2011-1079.
Signed-off-... | 0 | static int do_hidp_sock_ioctl(struct socket *sock, unsigned int cmd, void __user *argp)
{
struct hidp_connadd_req ca;
struct hidp_conndel_req cd;
struct hidp_connlist_req cl;
struct hidp_conninfo ci;
struct socket *csock;
struct socket *isock;
int err;
BT_DBG("cmd %x arg %p", cmd, argp);
switch (cmd) {
case... | 126,773,609,245,914,850,000,000,000,000,000,000,000 | None | null | [
"CWE-77"
] | CVE-2019-11884 | The do_hidp_sock_ioctl function in net/bluetooth/hidp/sock.c in the Linux kernel before 5.0.15 allows a local user to obtain potentially sensitive information from kernel stack memory via a HIDPCONNADD command, because a name field may not end with a '\0' character. | https://nvd.nist.gov/vuln/detail/CVE-2019-11884 |
4,052 | linux | cb66ddd156203daefb8d71158036b27b0e2caf63 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/cb66ddd156203daefb8d71158036b27b0e2caf63 | net: rds: force to destroy connection if t_sock is NULL in rds_tcp_kill_sock().
When it is to cleanup net namespace, rds_tcp_exit_net() will call
rds_tcp_kill_sock(), if t_sock is NULL, it will not call
rds_conn_destroy(), rds_conn_path_destroy() and rds_tcp_conn_free() to free
connection, and the worker cp_conn_w is ... | 1 | static void rds_tcp_kill_sock(struct net *net)
{
struct rds_tcp_connection *tc, *_tc;
LIST_HEAD(tmp_list);
struct rds_tcp_net *rtn = net_generic(net, rds_tcp_netid);
struct socket *lsock = rtn->rds_tcp_listen_sock;
rtn->rds_tcp_listen_sock = NULL;
rds_tcp_listen_stop(lsock, &rtn->rds_tcp_accept_w);
spin_lock_ir... | 8,107,321,106,413,303,000,000,000,000,000,000,000 | tcp.c | 218,691,657,463,008,300,000,000,000,000,000,000,000 | [
"CWE-362"
] | CVE-2019-11815 | An issue was discovered in rds_tcp_kill_sock in net/rds/tcp.c in the Linux kernel before 5.0.8. There is a race condition leading to a use-after-free, related to net namespace cleanup. | https://nvd.nist.gov/vuln/detail/CVE-2019-11815 |
161,297 | linux | cb66ddd156203daefb8d71158036b27b0e2caf63 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/cb66ddd156203daefb8d71158036b27b0e2caf63 | net: rds: force to destroy connection if t_sock is NULL in rds_tcp_kill_sock().
When it is to cleanup net namespace, rds_tcp_exit_net() will call
rds_tcp_kill_sock(), if t_sock is NULL, it will not call
rds_conn_destroy(), rds_conn_path_destroy() and rds_tcp_conn_free() to free
connection, and the worker cp_conn_w is ... | 0 | static void rds_tcp_kill_sock(struct net *net)
{
struct rds_tcp_connection *tc, *_tc;
LIST_HEAD(tmp_list);
struct rds_tcp_net *rtn = net_generic(net, rds_tcp_netid);
struct socket *lsock = rtn->rds_tcp_listen_sock;
rtn->rds_tcp_listen_sock = NULL;
rds_tcp_listen_stop(lsock, &rtn->rds_tcp_accept_w);
spin_lock_ir... | 304,580,934,188,077,300,000,000,000,000,000,000,000 | tcp.c | 238,093,555,522,402,100,000,000,000,000,000,000,000 | [
"CWE-362"
] | CVE-2019-11815 | An issue was discovered in rds_tcp_kill_sock in net/rds/tcp.c in the Linux kernel before 5.0.8. There is a race condition leading to a use-after-free, related to net namespace cleanup. | https://nvd.nist.gov/vuln/detail/CVE-2019-11815 |
4,053 | linux | 401e7e88d4ef80188ffa07095ac00456f901b8c4 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/401e7e88d4ef80188ffa07095ac00456f901b8c4 | ipmi_si: fix use-after-free of resource->name
When we excute the following commands, we got oops
rmmod ipmi_si
cat /proc/ioports
[ 1623.482380] Unable to handle kernel paging request at virtual address ffff00000901d478
[ 1623.482382] Mem abort info:
[ 1623.482383] ESR = 0x96000007
[ 1623.482385] Exception class =... | 1 | static int try_smi_init(struct smi_info *new_smi)
{
int rv = 0;
int i;
char *init_name = NULL;
pr_info("Trying %s-specified %s state machine at %s address 0x%lx, slave address 0x%x, irq %d\n",
ipmi_addr_src_to_str(new_smi->io.addr_source),
si_to_str[new_smi->io.si_type],
addr_space_to_str[new_smi->io.addr_ty... | 165,864,638,601,569,780,000,000,000,000,000,000,000 | ipmi_si_intf.c | 224,449,302,204,137,970,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2019-11811 | An issue was discovered in the Linux kernel before 5.0.4. There is a use-after-free upon attempted read access to /proc/ioports after the ipmi_si module is removed, related to drivers/char/ipmi/ipmi_si_intf.c, drivers/char/ipmi/ipmi_si_mem_io.c, and drivers/char/ipmi/ipmi_si_port_io.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-11811 |
161,298 | linux | 401e7e88d4ef80188ffa07095ac00456f901b8c4 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/401e7e88d4ef80188ffa07095ac00456f901b8c4 | ipmi_si: fix use-after-free of resource->name
When we excute the following commands, we got oops
rmmod ipmi_si
cat /proc/ioports
[ 1623.482380] Unable to handle kernel paging request at virtual address ffff00000901d478
[ 1623.482382] Mem abort info:
[ 1623.482383] ESR = 0x96000007
[ 1623.482385] Exception class =... | 0 | static int try_smi_init(struct smi_info *new_smi)
{
int rv = 0;
int i;
char *init_name = NULL;
pr_info("Trying %s-specified %s state machine at %s address 0x%lx, slave address 0x%x, irq %d\n",
ipmi_addr_src_to_str(new_smi->io.addr_source),
si_to_str[new_smi->io.si_type],
addr_space_to_str[new_smi->io.addr_ty... | 57,187,727,698,118,990,000,000,000,000,000,000,000 | ipmi_si_intf.c | 205,253,459,092,288,450,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2019-11811 | An issue was discovered in the Linux kernel before 5.0.4. There is a use-after-free upon attempted read access to /proc/ioports after the ipmi_si module is removed, related to drivers/char/ipmi/ipmi_si_intf.c, drivers/char/ipmi/ipmi_si_mem_io.c, and drivers/char/ipmi/ipmi_si_port_io.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-11811 |
4,054 | linux | 401e7e88d4ef80188ffa07095ac00456f901b8c4 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/401e7e88d4ef80188ffa07095ac00456f901b8c4 | ipmi_si: fix use-after-free of resource->name
When we excute the following commands, we got oops
rmmod ipmi_si
cat /proc/ioports
[ 1623.482380] Unable to handle kernel paging request at virtual address ffff00000901d478
[ 1623.482382] Mem abort info:
[ 1623.482383] ESR = 0x96000007
[ 1623.482385] Exception class =... | 1 | int ipmi_si_mem_setup(struct si_sm_io *io)
{
unsigned long addr = io->addr_data;
int mapsize, idx;
if (!addr)
return -ENODEV;
io->io_cleanup = mem_cleanup;
/*
* Figure out the actual readb/readw/readl/etc routine to use based
* upon the register size.
*/
switch (io->regsize) {
case 1:
... | 268,861,984,312,861,500,000,000,000,000,000,000,000 | ipmi_si_mem_io.c | 76,869,389,163,316,280,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2019-11811 | An issue was discovered in the Linux kernel before 5.0.4. There is a use-after-free upon attempted read access to /proc/ioports after the ipmi_si module is removed, related to drivers/char/ipmi/ipmi_si_intf.c, drivers/char/ipmi/ipmi_si_mem_io.c, and drivers/char/ipmi/ipmi_si_port_io.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-11811 |
161,299 | linux | 401e7e88d4ef80188ffa07095ac00456f901b8c4 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/401e7e88d4ef80188ffa07095ac00456f901b8c4 | ipmi_si: fix use-after-free of resource->name
When we excute the following commands, we got oops
rmmod ipmi_si
cat /proc/ioports
[ 1623.482380] Unable to handle kernel paging request at virtual address ffff00000901d478
[ 1623.482382] Mem abort info:
[ 1623.482383] ESR = 0x96000007
[ 1623.482385] Exception class =... | 0 | int ipmi_si_mem_setup(struct si_sm_io *io)
{
unsigned long addr = io->addr_data;
int mapsize, idx;
if (!addr)
return -ENODEV;
/*
* Figure out the actual readb/readw/readl/etc routine to use based
* upon the register size.
*/
switch (io->regsize) {
case 1:
io->inputb = intf_mem_inb;
i... | 5,653,851,178,262,609,000,000,000,000,000,000,000 | ipmi_si_mem_io.c | 180,868,498,994,322,750,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2019-11811 | An issue was discovered in the Linux kernel before 5.0.4. There is a use-after-free upon attempted read access to /proc/ioports after the ipmi_si module is removed, related to drivers/char/ipmi/ipmi_si_intf.c, drivers/char/ipmi/ipmi_si_mem_io.c, and drivers/char/ipmi/ipmi_si_port_io.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-11811 |
4,055 | linux | 401e7e88d4ef80188ffa07095ac00456f901b8c4 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/401e7e88d4ef80188ffa07095ac00456f901b8c4 | ipmi_si: fix use-after-free of resource->name
When we excute the following commands, we got oops
rmmod ipmi_si
cat /proc/ioports
[ 1623.482380] Unable to handle kernel paging request at virtual address ffff00000901d478
[ 1623.482382] Mem abort info:
[ 1623.482383] ESR = 0x96000007
[ 1623.482385] Exception class =... | 1 | int ipmi_si_port_setup(struct si_sm_io *io)
{
unsigned int addr = io->addr_data;
int idx;
if (!addr)
return -ENODEV;
io->io_cleanup = port_cleanup;
/*
* Figure out the actual inb/inw/inl/etc routine to use based
* upon the register size.
*/
switch (io->regsize) {
case 1:
io->inputb = p... | 46,989,818,832,240,890,000,000,000,000,000,000,000 | ipmi_si_port_io.c | 125,840,401,664,174,400,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2019-11811 | An issue was discovered in the Linux kernel before 5.0.4. There is a use-after-free upon attempted read access to /proc/ioports after the ipmi_si module is removed, related to drivers/char/ipmi/ipmi_si_intf.c, drivers/char/ipmi/ipmi_si_mem_io.c, and drivers/char/ipmi/ipmi_si_port_io.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-11811 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.