idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
161,300 | linux | 401e7e88d4ef80188ffa07095ac00456f901b8c4 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/401e7e88d4ef80188ffa07095ac00456f901b8c4 | ipmi_si: fix use-after-free of resource->name
When we excute the following commands, we got oops
rmmod ipmi_si
cat /proc/ioports
[ 1623.482380] Unable to handle kernel paging request at virtual address ffff00000901d478
[ 1623.482382] Mem abort info:
[ 1623.482383] ESR = 0x96000007
[ 1623.482385] Exception class =... | 0 | int ipmi_si_port_setup(struct si_sm_io *io)
{
unsigned int addr = io->addr_data;
int idx;
if (!addr)
return -ENODEV;
/*
* Figure out the actual inb/inw/inl/etc routine to use based
* upon the register size.
*/
switch (io->regsize) {
case 1:
io->inputb = port_inb;
io->outputb = port_ou... | 47,635,359,373,708,250,000,000,000,000,000,000,000 | ipmi_si_port_io.c | 90,575,793,431,554,030,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2019-11811 | An issue was discovered in the Linux kernel before 5.0.4. There is a use-after-free upon attempted read access to /proc/ioports after the ipmi_si module is removed, related to drivers/char/ipmi/ipmi_si_intf.c, drivers/char/ipmi/ipmi_si_mem_io.c, and drivers/char/ipmi/ipmi_si_port_io.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-11811 |
4,056 | linux | bcf3b67d16a4c8ffae0aa79de5853435e683945c | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/bcf3b67d16a4c8ffae0aa79de5853435e683945c | scsi: megaraid_sas: return error when create DMA pool failed
when create DMA pool for cmd frames failed, we should return -ENOMEM,
instead of 0.
In some case in:
megasas_init_adapter_fusion()
-->megasas_alloc_cmds()
-->megasas_create_frame_pool
create DMA pool failed,
--> megasas_fre... | 1 | int megasas_alloc_cmds(struct megasas_instance *instance)
{
int i;
int j;
u16 max_cmd;
struct megasas_cmd *cmd;
max_cmd = instance->max_mfi_cmds;
/*
* instance->cmd_list is an array of struct megasas_cmd pointers.
* Allocate the dynamic array first and then allocate individual
* commands.
*/
instance->... | 34,156,285,142,247,750,000,000,000,000,000,000,000 | megaraid_sas_base.c | 129,635,302,641,523,000,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2019-11810 | An issue was discovered in the Linux kernel before 5.0.7. A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of Service, related to a use-after-free. | https://nvd.nist.gov/vuln/detail/CVE-2019-11810 |
161,301 | linux | bcf3b67d16a4c8ffae0aa79de5853435e683945c | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/bcf3b67d16a4c8ffae0aa79de5853435e683945c | scsi: megaraid_sas: return error when create DMA pool failed
when create DMA pool for cmd frames failed, we should return -ENOMEM,
instead of 0.
In some case in:
megasas_init_adapter_fusion()
-->megasas_alloc_cmds()
-->megasas_create_frame_pool
create DMA pool failed,
--> megasas_fre... | 0 | int megasas_alloc_cmds(struct megasas_instance *instance)
{
int i;
int j;
u16 max_cmd;
struct megasas_cmd *cmd;
max_cmd = instance->max_mfi_cmds;
/*
* instance->cmd_list is an array of struct megasas_cmd pointers.
* Allocate the dynamic array first and then allocate individual
* commands.
*/
instance->... | 302,094,480,738,111,520,000,000,000,000,000,000,000 | megaraid_sas_base.c | 33,332,757,103,148,640,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2019-11810 | An issue was discovered in the Linux kernel before 5.0.7. A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of Service, related to a use-after-free. | https://nvd.nist.gov/vuln/detail/CVE-2019-11810 |
4,057 | linux | 04f5866e41fb70690e28397487d8bd8eea7d712a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/04f5866e41fb70690e28397487d8bd8eea7d712a | coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping
The core dumping code has always run without holding the mmap_sem for
writing, despite that is the only way to ensure that the entire vma
layout will not change from under it. Only using some signal
serialization on the processes bel... | 1 | void uverbs_user_mmap_disassociate(struct ib_uverbs_file *ufile)
{
struct rdma_umap_priv *priv, *next_priv;
lockdep_assert_held(&ufile->hw_destroy_rwsem);
while (1) {
struct mm_struct *mm = NULL;
/* Get an arbitrary mm pointer that hasn't been cleaned yet */
mutex_lock(&ufile->umap_lock);
while (!list_emp... | 211,043,662,189,963,800,000,000,000,000,000,000,000 | uverbs_main.c | 9,360,109,907,240,654,000,000,000,000,000,000,000 | [
"CWE-362"
] | CVE-2019-11599 | The coredump implementation in the Linux kernel before 5.0.10 does not use locking or other mechanisms to prevent vma layout or vma flags changes while it runs, which allows local users to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a race condition w... | https://nvd.nist.gov/vuln/detail/CVE-2019-11599 |
161,302 | linux | 04f5866e41fb70690e28397487d8bd8eea7d712a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/04f5866e41fb70690e28397487d8bd8eea7d712a | coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping
The core dumping code has always run without holding the mmap_sem for
writing, despite that is the only way to ensure that the entire vma
layout will not change from under it. Only using some signal
serialization on the processes bel... | 0 | void uverbs_user_mmap_disassociate(struct ib_uverbs_file *ufile)
{
struct rdma_umap_priv *priv, *next_priv;
lockdep_assert_held(&ufile->hw_destroy_rwsem);
while (1) {
struct mm_struct *mm = NULL;
/* Get an arbitrary mm pointer that hasn't been cleaned yet */
mutex_lock(&ufile->umap_lock);
while (!list_emp... | 142,893,032,311,907,040,000,000,000,000,000,000,000 | uverbs_main.c | 62,440,431,152,267,710,000,000,000,000,000,000,000 | [
"CWE-362"
] | CVE-2019-11599 | The coredump implementation in the Linux kernel before 5.0.10 does not use locking or other mechanisms to prevent vma layout or vma flags changes while it runs, which allows local users to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a race condition w... | https://nvd.nist.gov/vuln/detail/CVE-2019-11599 |
4,058 | linux | 04f5866e41fb70690e28397487d8bd8eea7d712a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/04f5866e41fb70690e28397487d8bd8eea7d712a | coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping
The core dumping code has always run without holding the mmap_sem for
writing, despite that is the only way to ensure that the entire vma
layout will not change from under it. Only using some signal
serialization on the processes bel... | 1 | static ssize_t clear_refs_write(struct file *file, const char __user *buf,
size_t count, loff_t *ppos)
{
struct task_struct *task;
char buffer[PROC_NUMBUF];
struct mm_struct *mm;
struct vm_area_struct *vma;
enum clear_refs_types type;
struct mmu_gather tlb;
int itype;
int rv;
memset(buffer, 0, sizeof(buff... | 91,277,826,670,393,980,000,000,000,000,000,000,000 | task_mmu.c | 286,334,833,757,047,100,000,000,000,000,000,000,000 | [
"CWE-362"
] | CVE-2019-11599 | The coredump implementation in the Linux kernel before 5.0.10 does not use locking or other mechanisms to prevent vma layout or vma flags changes while it runs, which allows local users to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a race condition w... | https://nvd.nist.gov/vuln/detail/CVE-2019-11599 |
161,303 | linux | 04f5866e41fb70690e28397487d8bd8eea7d712a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/04f5866e41fb70690e28397487d8bd8eea7d712a | coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping
The core dumping code has always run without holding the mmap_sem for
writing, despite that is the only way to ensure that the entire vma
layout will not change from under it. Only using some signal
serialization on the processes bel... | 0 | static ssize_t clear_refs_write(struct file *file, const char __user *buf,
size_t count, loff_t *ppos)
{
struct task_struct *task;
char buffer[PROC_NUMBUF];
struct mm_struct *mm;
struct vm_area_struct *vma;
enum clear_refs_types type;
struct mmu_gather tlb;
int itype;
int rv;
memset(buffer, 0, sizeof(buff... | 63,449,917,871,960,830,000,000,000,000,000,000,000 | task_mmu.c | 39,097,074,513,772,906,000,000,000,000,000,000,000 | [
"CWE-362"
] | CVE-2019-11599 | The coredump implementation in the Linux kernel before 5.0.10 does not use locking or other mechanisms to prevent vma layout or vma flags changes while it runs, which allows local users to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a race condition w... | https://nvd.nist.gov/vuln/detail/CVE-2019-11599 |
4,062 | WavPack | bc6cba3f552c44565f7f1e66dc1580189addb2b4 | https://github.com/dbry/WavPack | https://github.com/dbry/WavPack/commit/bc6cba3f552c44565f7f1e66dc1580189addb2b4 | issue #67: make sure sample rate is specified and non-zero in DFF files | 1 | int ParseDsdiffHeaderConfig (FILE *infile, char *infilename, char *fourcc, WavpackContext *wpc, WavpackConfig *config)
{
int64_t infilesize, total_samples;
DFFFileHeader dff_file_header;
DFFChunkHeader dff_chunk_header;
uint32_t bcount;
infilesize = DoGetFileSize (infile);
memcpy (&dff_file_hea... | 165,237,717,197,980,300,000,000,000,000,000,000,000 | None | null | [
"CWE-824"
] | CVE-2019-11498 | WavpackSetConfiguration64 in pack_utils.c in libwavpack.a in WavPack through 5.1.0 has a "Conditional jump or move depends on uninitialised value" condition, which might allow attackers to cause a denial of service (application crash) via a DFF file that lacks valid sample-rate data. | https://nvd.nist.gov/vuln/detail/CVE-2019-11498 |
161,307 | WavPack | bc6cba3f552c44565f7f1e66dc1580189addb2b4 | https://github.com/dbry/WavPack | https://github.com/dbry/WavPack/commit/bc6cba3f552c44565f7f1e66dc1580189addb2b4 | issue #67: make sure sample rate is specified and non-zero in DFF files | 0 | int ParseDsdiffHeaderConfig (FILE *infile, char *infilename, char *fourcc, WavpackContext *wpc, WavpackConfig *config)
{
int64_t infilesize, total_samples;
DFFFileHeader dff_file_header;
DFFChunkHeader dff_chunk_header;
uint32_t bcount;
infilesize = DoGetFileSize (infile);
memcpy (&dff_file_hea... | 261,099,684,645,135,380,000,000,000,000,000,000,000 | None | null | [
"CWE-824"
] | CVE-2019-11498 | WavpackSetConfiguration64 in pack_utils.c in libwavpack.a in WavPack through 5.1.0 has a "Conditional jump or move depends on uninitialised value" condition, which might allow attackers to cause a denial of service (application crash) via a DFF file that lacks valid sample-rate data. | https://nvd.nist.gov/vuln/detail/CVE-2019-11498 |
4,063 | ImageMagick6 | f663dfb8431c97d95682a2b533cca1c8233d21b4 | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/f663dfb8431c97d95682a2b533cca1c8233d21b4 | https://github.com/ImageMagick/ImageMagick/issues/1546 | 1 | static Image *ReadXWDImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
#define CheckOverflowException(length,width,height) \
(((height) != 0) && ((length)/((size_t) height) != ((size_t) width)))
char
*comment;
Image
*image;
IndexPacket
index;
int
x_status;
MagickBooleanType
... | 335,197,007,716,929,300,000,000,000,000,000,000,000 | xwd.c | 75,153,857,084,258,080,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2019-11472 | ReadXWDImage in coders/xwd.c in the XWD image parsing component of ImageMagick 7.0.8-41 Q16 allows attackers to cause a denial-of-service (divide-by-zero error) by crafting an XWD image file in which the header indicates neither LSB first nor MSB first. | https://nvd.nist.gov/vuln/detail/CVE-2019-11472 |
161,308 | ImageMagick6 | f663dfb8431c97d95682a2b533cca1c8233d21b4 | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/f663dfb8431c97d95682a2b533cca1c8233d21b4 | https://github.com/ImageMagick/ImageMagick/issues/1546 | 0 | static Image *ReadXWDImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
#define CheckOverflowException(length,width,height) \
(((height) != 0) && ((length)/((size_t) height) != ((size_t) width)))
char
*comment;
Image
*image;
IndexPacket
index;
int
x_status;
MagickBooleanType
... | 125,464,895,678,979,220,000,000,000,000,000,000,000 | xwd.c | 167,173,576,325,010,360,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2019-11472 | ReadXWDImage in coders/xwd.c in the XWD image parsing component of ImageMagick 7.0.8-41 Q16 allows attackers to cause a denial-of-service (divide-by-zero error) by crafting an XWD image file in which the header indicates neither LSB first nor MSB first. | https://nvd.nist.gov/vuln/detail/CVE-2019-11472 |
4,064 | ImageMagick | e3cdce6fe12193f235b8c0ae5efe6880a25eb957 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/e3cdce6fe12193f235b8c0ae5efe6880a25eb957 | https://github.com/ImageMagick/ImageMagick/issues/1472 | 1 | static Image *ReadCINImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
#define MonoColorType 1
#define RGBColorType 3
char
property[MagickPathExtent];
CINInfo
cin;
const unsigned char
*pixels;
Image
*image;
MagickBooleanType
status;
MagickOffsetType
offset;
Qua... | 59,197,480,976,158,010,000,000,000,000,000,000,000 | cin.c | 292,378,594,999,413,330,000,000,000,000,000,000,000 | [
"CWE-400"
] | CVE-2019-11470 | The cineon parsing component in ImageMagick 7.0.8-26 Q16 allows attackers to cause a denial-of-service (uncontrolled resource consumption) by crafting a Cineon image with an incorrect claimed image size. This occurs because ReadCINImage in coders/cin.c lacks a check for insufficient image data in a file. | https://nvd.nist.gov/vuln/detail/CVE-2019-11470 |
161,309 | ImageMagick | e3cdce6fe12193f235b8c0ae5efe6880a25eb957 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/e3cdce6fe12193f235b8c0ae5efe6880a25eb957 | https://github.com/ImageMagick/ImageMagick/issues/1472 | 0 | static Image *ReadCINImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
#define MonoColorType 1
#define RGBColorType 3
char
property[MagickPathExtent];
CINInfo
cin;
const unsigned char
*pixels;
Image
*image;
MagickBooleanType
status;
MagickOffsetType
offset;
Qua... | 2,380,909,072,613,058,000,000,000,000,000,000,000 | cin.c | 177,483,449,253,717,050,000,000,000,000,000,000,000 | [
"CWE-400"
] | CVE-2019-11470 | The cineon parsing component in ImageMagick 7.0.8-26 Q16 allows attackers to cause a denial-of-service (uncontrolled resource consumption) by crafting a Cineon image with an incorrect claimed image size. This occurs because ReadCINImage in coders/cin.c lacks a check for insufficient image data in a file. | https://nvd.nist.gov/vuln/detail/CVE-2019-11470 |
4,065 | libarchive | ba641f73f3d758d9032b3f0e5597a9c6e593a505 | https://github.com/libarchive/libarchive | https://github.com/libarchive/libarchive/commit/ba641f73f3d758d9032b3f0e5597a9c6e593a505 | Fix typo in preprocessor macro in archive_read_format_zip_cleanup()
Frees lzma_stream on cleanup()
Fixes #1165 | 1 | archive_read_format_zip_cleanup(struct archive_read *a)
{
struct zip *zip;
struct zip_entry *zip_entry, *next_zip_entry;
zip = (struct zip *)(a->format->data);
#ifdef HAVE_ZLIB_H
if (zip->stream_valid)
inflateEnd(&zip->stream);
#endif
#if HAVA_LZMA_H && HAVE_LIBLZMA
if (zip->zipx_lzma_valid) {
lzma_... | 281,804,672,906,394,530,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2019-11463 | A memory leak in archive_read_format_zip_cleanup in archive_read_support_format_zip.c in libarchive 3.3.4-dev allows remote attackers to cause a denial of service via a crafted ZIP file because of a HAVE_LZMA_H typo. NOTE: this only affects users who downloaded the development code from GitHub. Users of the product's o... | https://nvd.nist.gov/vuln/detail/CVE-2019-11463 |
161,310 | libarchive | ba641f73f3d758d9032b3f0e5597a9c6e593a505 | https://github.com/libarchive/libarchive | https://github.com/libarchive/libarchive/commit/ba641f73f3d758d9032b3f0e5597a9c6e593a505 | Fix typo in preprocessor macro in archive_read_format_zip_cleanup()
Frees lzma_stream on cleanup()
Fixes #1165 | 0 | archive_read_format_zip_cleanup(struct archive_read *a)
{
struct zip *zip;
struct zip_entry *zip_entry, *next_zip_entry;
zip = (struct zip *)(a->format->data);
#ifdef HAVE_ZLIB_H
if (zip->stream_valid)
inflateEnd(&zip->stream);
#endif
#if HAVE_LZMA_H && HAVE_LIBLZMA
if (zip->zipx_lzma_valid) {
lzma_... | 244,349,834,012,302,360,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2019-11463 | A memory leak in archive_read_format_zip_cleanup in archive_read_support_format_zip.c in libarchive 3.3.4-dev allows remote attackers to cause a denial of service via a crafted ZIP file because of a HAVE_LZMA_H typo. NOTE: this only affects users who downloaded the development code from GitHub. Users of the product's o... | https://nvd.nist.gov/vuln/detail/CVE-2019-11463 |
4,072 | mujs | 1e5479084bc9852854feb1ba9bf68b52cd127e02 | https://github.com/ccxvii/mujs | https://github.com/ccxvii/mujs/commit/1e5479084bc9852854feb1ba9bf68b52cd127e02 | Bug 700947: Add missing ENDTRY opcode in try/catch/finally byte code.
In one of the code branches in handling exceptions in the catch block
we forgot to call the ENDTRY opcode to pop the inner hidden try.
This leads to an unbalanced exception stack which can cause a crash
due to us jumping to a stack frame that has al... | 1 | static void ctrycatchfinally(JF, js_Ast *trystm, js_Ast *catchvar, js_Ast *catchstm, js_Ast *finallystm)
{
int L1, L2, L3;
L1 = emitjump(J, F, OP_TRY);
{
/* if we get here, we have caught an exception in the try block */
L2 = emitjump(J, F, OP_TRY);
{
/* if we get here, we have caught an exception in the ca... | 129,287,468,632,431,320,000,000,000,000,000,000,000 | jscompile.c | 140,135,126,533,618,000,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2019-11412 | An issue was discovered in Artifex MuJS 1.0.5. jscompile.c can cause a denial of service (invalid stack-frame jump) because it lacks an ENDTRY opcode call. | https://nvd.nist.gov/vuln/detail/CVE-2019-11412 |
161,317 | mujs | 1e5479084bc9852854feb1ba9bf68b52cd127e02 | https://github.com/ccxvii/mujs | https://github.com/ccxvii/mujs/commit/1e5479084bc9852854feb1ba9bf68b52cd127e02 | Bug 700947: Add missing ENDTRY opcode in try/catch/finally byte code.
In one of the code branches in handling exceptions in the catch block
we forgot to call the ENDTRY opcode to pop the inner hidden try.
This leads to an unbalanced exception stack which can cause a crash
due to us jumping to a stack frame that has al... | 0 | static void ctrycatchfinally(JF, js_Ast *trystm, js_Ast *catchvar, js_Ast *catchstm, js_Ast *finallystm)
{
int L1, L2, L3;
L1 = emitjump(J, F, OP_TRY);
{
/* if we get here, we have caught an exception in the try block */
L2 = emitjump(J, F, OP_TRY);
{
/* if we get here, we have caught an exception in the ca... | 272,654,378,475,804,150,000,000,000,000,000,000,000 | jscompile.c | 315,480,018,467,248,340,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2019-11412 | An issue was discovered in Artifex MuJS 1.0.5. jscompile.c can cause a denial of service (invalid stack-frame jump) because it lacks an ENDTRY opcode call. | https://nvd.nist.gov/vuln/detail/CVE-2019-11412 |
4,074 | mujs | da632ca08f240590d2dec786722ed08486ce1be6 | https://github.com/ccxvii/mujs | https://github.com/ccxvii/mujs/commit/da632ca08f240590d2dec786722ed08486ce1be6 | Bug 700938: Fix stack overflow in numtostr as used by Number#toFixed().
32 is not enough to fit sprintf("%.20f", 1e20).
We need at least 43 bytes to fit that format.
Bump the static buffer size. | 1 | static void numtostr(js_State *J, const char *fmt, int w, double n)
{
char buf[32], *e;
sprintf(buf, fmt, w, n);
e = strchr(buf, 'e');
if (e) {
int exp = atoi(e+1);
sprintf(e, "e%+d", exp);
}
js_pushstring(J, buf);
}
| 19,501,154,810,031,546,000,000,000,000,000,000,000 | jsnumber.c | 94,596,169,872,171,320,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2019-11411 | An issue was discovered in Artifex MuJS 1.0.5. The Number#toFixed() and numtostr implementations in jsnumber.c have a stack-based buffer overflow. | https://nvd.nist.gov/vuln/detail/CVE-2019-11411 |
161,319 | mujs | da632ca08f240590d2dec786722ed08486ce1be6 | https://github.com/ccxvii/mujs | https://github.com/ccxvii/mujs/commit/da632ca08f240590d2dec786722ed08486ce1be6 | Bug 700938: Fix stack overflow in numtostr as used by Number#toFixed().
32 is not enough to fit sprintf("%.20f", 1e20).
We need at least 43 bytes to fit that format.
Bump the static buffer size. | 0 | static void numtostr(js_State *J, const char *fmt, int w, double n)
{
/* buf needs to fit printf("%.20f", 1e20) */
char buf[50], *e;
sprintf(buf, fmt, w, n);
e = strchr(buf, 'e');
if (e) {
int exp = atoi(e+1);
sprintf(e, "e%+d", exp);
}
js_pushstring(J, buf);
}
| 61,985,091,923,934,830,000,000,000,000,000,000,000 | jsnumber.c | 255,682,452,337,331,670,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2019-11411 | An issue was discovered in Artifex MuJS 1.0.5. The Number#toFixed() and numtostr implementations in jsnumber.c have a stack-based buffer overflow. | https://nvd.nist.gov/vuln/detail/CVE-2019-11411 |
4,075 | FFmpeg | d227ed5d598340e719eff7156b1aa0a4469e9a6a | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/d227ed5d598340e719eff7156b1aa0a4469e9a6a | avcodec/mpeg4videodec: Check idx in mpeg4_decode_studio_block()
Fixes: Out of array access
Fixes: 13500/clusterfuzz-testcase-minimized-ffmpeg_AV_CODEC_ID_MPEG4_fuzzer-5769760178962432
Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/projects/ffmpeg
Reviewed-by: Kieran Kunhya <kieran... | 1 | static int mpeg4_decode_studio_block(MpegEncContext *s, int32_t block[64], int n)
{
Mpeg4DecContext *ctx = s->avctx->priv_data;
int cc, dct_dc_size, dct_diff, code, j, idx = 1, group = 0, run = 0,
additional_code_len, sign, mismatch;
VLC *cur_vlc = &ctx->studio_intra_tab[0];
uint8_t *const scan... | 148,338,294,310,981,680,000,000,000,000,000,000,000 | mpeg4videodec.c | 190,961,130,653,831,770,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-11339 | The studio profile decoder in libavcodec/mpeg4videodec.c in FFmpeg 4.0 before 4.0.4 and 4.1 before 4.1.2 allows remote attackers to cause a denial of service (out-of-array access) or possibly have unspecified other impact via crafted MPEG-4 video data. | https://nvd.nist.gov/vuln/detail/CVE-2019-11339 |
161,320 | FFmpeg | d227ed5d598340e719eff7156b1aa0a4469e9a6a | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/d227ed5d598340e719eff7156b1aa0a4469e9a6a | avcodec/mpeg4videodec: Check idx in mpeg4_decode_studio_block()
Fixes: Out of array access
Fixes: 13500/clusterfuzz-testcase-minimized-ffmpeg_AV_CODEC_ID_MPEG4_fuzzer-5769760178962432
Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/projects/ffmpeg
Reviewed-by: Kieran Kunhya <kieran... | 0 | static int mpeg4_decode_studio_block(MpegEncContext *s, int32_t block[64], int n)
{
Mpeg4DecContext *ctx = s->avctx->priv_data;
int cc, dct_dc_size, dct_diff, code, j, idx = 1, group = 0, run = 0,
additional_code_len, sign, mismatch;
VLC *cur_vlc = &ctx->studio_intra_tab[0];
uint8_t *const scan... | 161,800,780,039,512,440,000,000,000,000,000,000,000 | mpeg4videodec.c | 216,162,170,291,603,600,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-11339 | The studio profile decoder in libavcodec/mpeg4videodec.c in FFmpeg 4.0 before 4.0.4 and 4.1 before 4.1.2 allows remote attackers to cause a denial of service (out-of-array access) or possibly have unspecified other impact via crafted MPEG-4 video data. | https://nvd.nist.gov/vuln/detail/CVE-2019-11339 |
4,081 | libmysofa | d39a171e9c6a1c44dbdf43f9db6c3fbd887e38c1 | https://github.com/hoene/libmysofa | https://github.com/hoene/libmysofa/commit/d39a171e9c6a1c44dbdf43f9db6c3fbd887e38c1 | Fixed security issue 1 | 1 | int treeRead(struct READER *reader, struct DATAOBJECT *data) {
int i, j, err, olen, elements, size, x, y, z, b, e, dy, dz, sx, sy, sz, dzy,
szy;
char *input, *output;
uint8_t node_type, node_level;
uint16_t entries_used;
uint32_t size_of_chunk;
uint32_t filter_mask;
uint64_t address_of_left_sibling, address_... | 20,763,822,898,396,646,000,000,000,000,000,000,000 | btree.c | 57,865,174,352,816,090,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2019-10672 | treeRead in hdf/btree.c in libmysofa before 0.7 does not properly validate multiplications and additions. | https://nvd.nist.gov/vuln/detail/CVE-2019-10672 |
161,324 | libmysofa | d39a171e9c6a1c44dbdf43f9db6c3fbd887e38c1 | https://github.com/hoene/libmysofa | https://github.com/hoene/libmysofa/commit/d39a171e9c6a1c44dbdf43f9db6c3fbd887e38c1 | Fixed security issue 1 | 0 | int treeRead(struct READER *reader, struct DATAOBJECT *data) {
int i, j, err, olen, elements, size, x, y, z, b, e, dy, dz, sx, sy, sz, dzy,
szy;
char *input, *output;
uint8_t node_type, node_level;
uint16_t entries_used;
uint32_t size_of_chunk;
uint32_t filter_mask;
uint64_t address_of_left_sibling, address_... | 55,177,176,557,625,520,000,000,000,000,000,000,000 | btree.c | 302,960,412,240,783,000,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2019-10672 | treeRead in hdf/btree.c in libmysofa before 0.7 does not properly validate multiplications and additions. | https://nvd.nist.gov/vuln/detail/CVE-2019-10672 |
4,082 | domoticz | ee70db46f81afa582c96b887b73bcd2a86feda00 | https://github.com/domoticz/domoticz | https://github.com/domoticz/domoticz/commit/ee70db46f81afa582c96b887b73bcd2a86feda00 | Fixed possible SQL Injection Vulnerability (Thanks to Fabio Carretto!) | 1 | void CWebServer::GetFloorplanImage(WebEmSession & session, const request& req, reply & rep)
{
std::string idx = request::findValue(&req, "idx");
if (idx == "") {
return;
}
std::vector<std::vector<std::string> > result;
result = m_sql.safe_queryBlob("SELECT Image FROM Floorplans WHERE ID=%s", i... | 126,919,339,259,422,660,000,000,000,000,000,000,000 | WebServer.cpp | 148,825,033,982,485,370,000,000,000,000,000,000,000 | [
"CWE-89"
] | CVE-2019-10664 | Domoticz before 4.10578 allows SQL Injection via the idx parameter in CWebServer::GetFloorplanImage in WebServer.cpp. | https://nvd.nist.gov/vuln/detail/CVE-2019-10664 |
161,325 | domoticz | ee70db46f81afa582c96b887b73bcd2a86feda00 | https://github.com/domoticz/domoticz | https://github.com/domoticz/domoticz/commit/ee70db46f81afa582c96b887b73bcd2a86feda00 | Fixed possible SQL Injection Vulnerability (Thanks to Fabio Carretto!) | 0 | void CWebServer::GetFloorplanImage(WebEmSession & session, const request& req, reply & rep)
{
std::string idx = request::findValue(&req, "idx");
if (idx == "") {
return;
}
std::vector<std::vector<std::string> > result;
result = m_sql.safe_queryBlob("SELECT Image FROM Floorplans WHERE ID=%d", a... | 197,783,324,510,857,200,000,000,000,000,000,000,000 | WebServer.cpp | 151,122,777,681,589,000,000,000,000,000,000,000,000 | [
"CWE-89"
] | CVE-2019-10664 | Domoticz before 4.10578 allows SQL Injection via the idx parameter in CWebServer::GetFloorplanImage in WebServer.cpp. | https://nvd.nist.gov/vuln/detail/CVE-2019-10664 |
4,083 | linux | 355b98553789b646ed97ad801a619ff898471b92 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/355b98553789b646ed97ad801a619ff898471b92 | netns: provide pure entropy for net_hash_mix()
net_hash_mix() currently uses kernel address of a struct net,
and is used in many places that could be used to reveal this
address to a patient attacker, thus defeating KASLR, for
the typical case (initial net namespace, &init_net is
not dynamically allocated)
I believe ... | 1 | static __net_init int setup_net(struct net *net, struct user_namespace *user_ns)
{
/* Must be called with pernet_ops_rwsem held */
const struct pernet_operations *ops, *saved_ops;
int error = 0;
LIST_HEAD(net_exit_list);
refcount_set(&net->count, 1);
refcount_set(&net->passive, 1);
net->dev_base_seq = 1;
... | 206,504,535,378,372,680,000,000,000,000,000,000,000 | net_namespace.c | 241,146,489,846,949,000,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2019-10638 | In the Linux kernel before 5.1.7, a device can be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby o... | https://nvd.nist.gov/vuln/detail/CVE-2019-10638 |
161,326 | linux | 355b98553789b646ed97ad801a619ff898471b92 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/355b98553789b646ed97ad801a619ff898471b92 | netns: provide pure entropy for net_hash_mix()
net_hash_mix() currently uses kernel address of a struct net,
and is used in many places that could be used to reveal this
address to a patient attacker, thus defeating KASLR, for
the typical case (initial net namespace, &init_net is
not dynamically allocated)
I believe ... | 0 | static __net_init int setup_net(struct net *net, struct user_namespace *user_ns)
{
/* Must be called with pernet_ops_rwsem held */
const struct pernet_operations *ops, *saved_ops;
int error = 0;
LIST_HEAD(net_exit_list);
refcount_set(&net->count, 1);
refcount_set(&net->passive, 1);
get_random_bytes(&net->has... | 339,561,622,403,215,620,000,000,000,000,000,000,000 | net_namespace.c | 45,920,932,712,570,670,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2019-10638 | In the Linux kernel before 5.1.7, a device can be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby o... | https://nvd.nist.gov/vuln/detail/CVE-2019-10638 |
4,088 | ImageMagick | cb1214c124e1bd61f7dd551b94a794864861592e | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/cb1214c124e1bd61f7dd551b94a794864861592e | ... | 1 | static int format8BIM(Image *ifile, Image *ofile)
{
char
temp[MagickPathExtent];
unsigned int
foundOSType;
int
ID,
resCount,
i,
c;
ssize_t
count;
unsigned char
*PString,
*str;
resCount=0;
foundOSType=0; /* found the OSType */
(void) foundOSType;
c=ReadBlobByte(... | 166,827,350,039,151,750,000,000,000,000,000,000,000 | meta.c | 231,438,544,697,155,060,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2019-10131 | An off-by-one read vulnerability was discovered in ImageMagick before version 7.0.7-28 in the formatIPTCfromBuffer function in coders/meta.c. A local attacker may use this flaw to read beyond the end of the buffer or to crash the program. | https://nvd.nist.gov/vuln/detail/CVE-2019-10131 |
161,331 | ImageMagick | cb1214c124e1bd61f7dd551b94a794864861592e | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/cb1214c124e1bd61f7dd551b94a794864861592e | ... | 0 | static int format8BIM(Image *ifile, Image *ofile)
{
char
temp[MagickPathExtent];
unsigned int
foundOSType;
int
ID,
resCount,
i,
c;
ssize_t
count;
unsigned char
*PString,
*str;
resCount=0;
foundOSType=0; /* found the OSType */
(void) foundOSType;
c=ReadBlobByte(... | 169,697,026,794,072,460,000,000,000,000,000,000,000 | meta.c | 197,122,505,717,199,880,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2019-10131 | An off-by-one read vulnerability was discovered in ImageMagick before version 7.0.7-28 in the formatIPTCfromBuffer function in coders/meta.c. A local attacker may use this flaw to read beyond the end of the buffer or to crash the program. | https://nvd.nist.gov/vuln/detail/CVE-2019-10131 |
4,089 | libu2f-host | e4bb58cc8b6202a421e65f8230217d8ae6e16eb5 | https://github.com/Yubico/libu2f-host | https://github.com/Yubico/libu2f-host/commit/e4bb58cc8b6202a421e65f8230217d8ae6e16eb5 | fix filling out of initresp | 1 | init_device (u2fh_devs * devs, struct u2fdevice *dev)
{
unsigned char resp[1024];
unsigned char nonce[8];
if (obtain_nonce(nonce) != 0)
{
return U2FH_TRANSPORT_ERROR;
}
size_t resplen = sizeof (resp);
dev->cid = CID_BROADCAST;
if (u2fh_sendrecv
(devs, dev->id, U2FHID_INIT, nonce, sizeo... | 68,338,259,853,873,010,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2019-9578 | In devs.c in Yubico libu2f-host before 1.1.8, the response to init is misparsed, leaking uninitialized stack memory back to the device. | https://nvd.nist.gov/vuln/detail/CVE-2019-9578 |
161,332 | libu2f-host | e4bb58cc8b6202a421e65f8230217d8ae6e16eb5 | https://github.com/Yubico/libu2f-host | https://github.com/Yubico/libu2f-host/commit/e4bb58cc8b6202a421e65f8230217d8ae6e16eb5 | fix filling out of initresp | 0 | init_device (u2fh_devs * devs, struct u2fdevice *dev)
{
unsigned char resp[1024];
unsigned char nonce[8];
if (obtain_nonce(nonce) != 0)
{
return U2FH_TRANSPORT_ERROR;
}
size_t resplen = sizeof (resp);
dev->cid = CID_BROADCAST;
if (u2fh_sendrecv
(devs, dev->id, U2FHID_INIT, nonce, sizeo... | 46,732,489,515,601,340,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2019-9578 | In devs.c in Yubico libu2f-host before 1.1.8, the response to init is misparsed, leaking uninitialized stack memory back to the device. | https://nvd.nist.gov/vuln/detail/CVE-2019-9578 |
4,091 | linux | c4c07b4d6fa1f11880eab8e076d3d060ef3f55fc | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c4c07b4d6fa1f11880eab8e076d3d060ef3f55fc | netfilter: nf_nat_snmp_basic: add missing length checks in ASN.1 cbs
The generic ASN.1 decoder infrastructure doesn't guarantee that callbacks
will get as much data as they expect; callbacks have to check the `datalen`
parameter before looking at `data`. Make sure that snmp_version() and
snmp_helper() don't read/write... | 1 | int snmp_helper(void *context, size_t hdrlen, unsigned char tag,
const void *data, size_t datalen)
{
struct snmp_ctx *ctx = (struct snmp_ctx *)context;
__be32 *pdata = (__be32 *)data;
if (*pdata == ctx->from) {
pr_debug("%s: %pI4 to %pI4\n", __func__,
(void *)&ctx->from, (void *)&ctx->to);
if (*ct... | 105,977,845,795,719,550,000,000,000,000,000,000,000 | nf_nat_snmp_basic_main.c | 170,342,232,582,282,240,000,000,000,000,000,000,000 | [
"CWE-129"
] | CVE-2019-9162 | In the Linux kernel before 4.20.12, net/ipv4/netfilter/nf_nat_snmp_basic_main.c in the SNMP NAT module has insufficient ASN.1 length checks (aka an array index error), making out-of-bounds read and write operations possible, leading to an OOPS or local privilege escalation. This affects snmp_version and snmp_helper. | https://nvd.nist.gov/vuln/detail/CVE-2019-9162 |
161,333 | linux | c4c07b4d6fa1f11880eab8e076d3d060ef3f55fc | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c4c07b4d6fa1f11880eab8e076d3d060ef3f55fc | netfilter: nf_nat_snmp_basic: add missing length checks in ASN.1 cbs
The generic ASN.1 decoder infrastructure doesn't guarantee that callbacks
will get as much data as they expect; callbacks have to check the `datalen`
parameter before looking at `data`. Make sure that snmp_version() and
snmp_helper() don't read/write... | 0 | int snmp_helper(void *context, size_t hdrlen, unsigned char tag,
const void *data, size_t datalen)
{
struct snmp_ctx *ctx = (struct snmp_ctx *)context;
__be32 *pdata;
if (datalen != 4)
return -EINVAL;
pdata = (__be32 *)data;
if (*pdata == ctx->from) {
pr_debug("%s: %pI4 to %pI4\n", __func__,
(voi... | 272,015,177,791,663,720,000,000,000,000,000,000,000 | nf_nat_snmp_basic_main.c | 143,170,956,048,095,800,000,000,000,000,000,000,000 | [
"CWE-129"
] | CVE-2019-9162 | In the Linux kernel before 4.20.12, net/ipv4/netfilter/nf_nat_snmp_basic_main.c in the SNMP NAT module has insufficient ASN.1 length checks (aka an array index error), making out-of-bounds read and write operations possible, leading to an OOPS or local privilege escalation. This affects snmp_version and snmp_helper. | https://nvd.nist.gov/vuln/detail/CVE-2019-9162 |
4,092 | linux | c4c07b4d6fa1f11880eab8e076d3d060ef3f55fc | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c4c07b4d6fa1f11880eab8e076d3d060ef3f55fc | netfilter: nf_nat_snmp_basic: add missing length checks in ASN.1 cbs
The generic ASN.1 decoder infrastructure doesn't guarantee that callbacks
will get as much data as they expect; callbacks have to check the `datalen`
parameter before looking at `data`. Make sure that snmp_version() and
snmp_helper() don't read/write... | 1 | int snmp_version(void *context, size_t hdrlen, unsigned char tag,
const void *data, size_t datalen)
{
if (*(unsigned char *)data > 1)
return -ENOTSUPP;
return 1;
}
| 198,796,159,557,597,100,000,000,000,000,000,000,000 | nf_nat_snmp_basic_main.c | 170,342,232,582,282,240,000,000,000,000,000,000,000 | [
"CWE-129"
] | CVE-2019-9162 | In the Linux kernel before 4.20.12, net/ipv4/netfilter/nf_nat_snmp_basic_main.c in the SNMP NAT module has insufficient ASN.1 length checks (aka an array index error), making out-of-bounds read and write operations possible, leading to an OOPS or local privilege escalation. This affects snmp_version and snmp_helper. | https://nvd.nist.gov/vuln/detail/CVE-2019-9162 |
161,334 | linux | c4c07b4d6fa1f11880eab8e076d3d060ef3f55fc | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c4c07b4d6fa1f11880eab8e076d3d060ef3f55fc | netfilter: nf_nat_snmp_basic: add missing length checks in ASN.1 cbs
The generic ASN.1 decoder infrastructure doesn't guarantee that callbacks
will get as much data as they expect; callbacks have to check the `datalen`
parameter before looking at `data`. Make sure that snmp_version() and
snmp_helper() don't read/write... | 0 | int snmp_version(void *context, size_t hdrlen, unsigned char tag,
const void *data, size_t datalen)
{
if (datalen != 1)
return -EINVAL;
if (*(unsigned char *)data > 1)
return -ENOTSUPP;
return 1;
}
| 151,449,529,578,357,770,000,000,000,000,000,000,000 | nf_nat_snmp_basic_main.c | 143,170,956,048,095,800,000,000,000,000,000,000,000 | [
"CWE-129"
] | CVE-2019-9162 | In the Linux kernel before 4.20.12, net/ipv4/netfilter/nf_nat_snmp_basic_main.c in the SNMP NAT module has insufficient ASN.1 length checks (aka an array index error), making out-of-bounds read and write operations possible, leading to an OOPS or local privilege escalation. This affects snmp_version and snmp_helper. | https://nvd.nist.gov/vuln/detail/CVE-2019-9162 |
4,095 | file | 2858eaf99f6cc5aae129bcbf1e24ad160240185f | https://github.com/file/file | https://github.com/file/file/commit/2858eaf99f6cc5aae129bcbf1e24ad160240185f | Avoid OOB read (found by ASAN reported by F. Alonso) | 1 | do_core_note(struct magic_set *ms, unsigned char *nbuf, uint32_t type,
int swap, uint32_t namesz, uint32_t descsz,
size_t noff, size_t doff, int *flags, size_t size, int clazz)
{
#ifdef ELFCORE
int os_style = -1;
/*
* Sigh. The 2.0.36 kernel in Debian 2.1, at
* least, doesn't correctly implement name
*... | 251,178,396,706,421,600,000,000,000,000,000,000,000 | readelf.c | 30,801,224,004,046,760,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-8906 | do_core_note in readelf.c in libmagic.a in file 5.35 has an out-of-bounds read because memcpy is misused. | https://nvd.nist.gov/vuln/detail/CVE-2019-8906 |
161,337 | file | 2858eaf99f6cc5aae129bcbf1e24ad160240185f | https://github.com/file/file | https://github.com/file/file/commit/2858eaf99f6cc5aae129bcbf1e24ad160240185f | Avoid OOB read (found by ASAN reported by F. Alonso) | 0 | do_core_note(struct magic_set *ms, unsigned char *nbuf, uint32_t type,
int swap, uint32_t namesz, uint32_t descsz,
size_t noff, size_t doff, int *flags, size_t size, int clazz)
{
#ifdef ELFCORE
int os_style = -1;
/*
* Sigh. The 2.0.36 kernel in Debian 2.1, at
* least, doesn't correctly implement name
*... | 85,296,107,075,422,000,000,000,000,000,000,000,000 | readelf.c | 33,867,220,749,021,000,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-8906 | do_core_note in readelf.c in libmagic.a in file 5.35 has an out-of-bounds read because memcpy is misused. | https://nvd.nist.gov/vuln/detail/CVE-2019-8906 |
4,096 | ImageMagick | 306c1f0fa5754ca78efd16ab752f0e981d4f6b82 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/306c1f0fa5754ca78efd16ab752f0e981d4f6b82 | https://github.com/ImageMagick/ImageMagick/issues/1454 | 1 | static MagickBooleanType WritePDFImage(const ImageInfo *image_info,Image *image,
ExceptionInfo *exception)
{
#define CFormat "/Filter [ /%s ]\n"
#define ObjectsPerImage 14
#define ThrowPDFException(exception,message) \
{ \
if (xref != (MagickOffsetType *) NULL) \
xref=(MagickOffsetType *) RelinquishMagickMemo... | 40,501,662,541,508,744,000,000,000,000,000,000,000 | pdf.c | 291,286,648,213,977,640,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2019-7397 | In ImageMagick before 7.0.8-25 and GraphicsMagick through 1.3.31, several memory leaks exist in WritePDFImage in coders/pdf.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-7397 |
161,338 | ImageMagick | 306c1f0fa5754ca78efd16ab752f0e981d4f6b82 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/306c1f0fa5754ca78efd16ab752f0e981d4f6b82 | https://github.com/ImageMagick/ImageMagick/issues/1454 | 0 | static MagickBooleanType WritePDFImage(const ImageInfo *image_info,Image *image,
ExceptionInfo *exception)
{
#define CFormat "/Filter [ /%s ]\n"
#define ObjectsPerImage 14
#define ThrowPDFException(exception,message) \
{ \
if (xref != (MagickOffsetType *) NULL) \
xref=(MagickOffsetType *) RelinquishMagickMemo... | 213,487,739,598,544,130,000,000,000,000,000,000,000 | pdf.c | 332,364,242,538,094,800,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2019-7397 | In ImageMagick before 7.0.8-25 and GraphicsMagick through 1.3.31, several memory leaks exist in WritePDFImage in coders/pdf.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-7397 |
4,097 | ImageMagick | 8a43abefb38c5e29138e1c9c515b313363541c06 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/8a43abefb38c5e29138e1c9c515b313363541c06 | https://github.com/ImageMagick/ImageMagick/issues/1451 | 1 | static size_t WritePSDChannel(const PSDInfo *psd_info,
const ImageInfo *image_info,Image *image,Image *next_image,
const QuantumType quantum_type, unsigned char *compact_pixels,
MagickOffsetType size_offset,const MagickBooleanType separate,
const CompressionType compression,ExceptionInfo *exception)
{
MagickB... | 68,733,002,057,457,950,000,000,000,000,000,000,000 | psd.c | 148,851,851,471,348,200,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2019-7395 | In ImageMagick before 7.0.8-25, a memory leak exists in WritePSDChannel in coders/psd.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-7395 |
161,339 | ImageMagick | 8a43abefb38c5e29138e1c9c515b313363541c06 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/8a43abefb38c5e29138e1c9c515b313363541c06 | https://github.com/ImageMagick/ImageMagick/issues/1451 | 0 | static size_t WritePSDChannel(const PSDInfo *psd_info,
const ImageInfo *image_info,Image *image,Image *next_image,
const QuantumType quantum_type, unsigned char *compact_pixels,
MagickOffsetType size_offset,const MagickBooleanType separate,
const CompressionType compression,ExceptionInfo *exception)
{
MagickB... | 205,942,507,666,218,120,000,000,000,000,000,000,000 | psd.c | 27,299,609,756,153,676,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2019-7395 | In ImageMagick before 7.0.8-25, a memory leak exists in WritePSDChannel in coders/psd.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-7395 |
4,100 | ImageMagick | 1e6a3ace073c9ec9c71e439c111d23c6e66cb6ae | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/1e6a3ace073c9ec9c71e439c111d23c6e66cb6ae | https://github.com/ImageMagick/ImageMagick/issues/1450 | 1 | static MagickBooleanType DecodeImage(Image *image,unsigned char *luma,
unsigned char *chroma1,unsigned char *chroma2,ExceptionInfo *exception)
{
#define IsSync(sum) ((sum & 0xffffff00UL) == 0xfffffe00UL)
#define PCDGetBits(n) \
{ \
sum=(sum << n) & 0xffffffff; \
bits-=n; \
while (bits <= 24) \
{ \
if (p... | 319,777,982,927,308,370,000,000,000,000,000,000,000 | pcd.c | 279,908,488,505,593,460,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2019-7175 | In ImageMagick before 7.0.8-25, some memory leaks exist in DecodeImage in coders/pcd.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-7175 |
161,342 | ImageMagick | 1e6a3ace073c9ec9c71e439c111d23c6e66cb6ae | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/1e6a3ace073c9ec9c71e439c111d23c6e66cb6ae | https://github.com/ImageMagick/ImageMagick/issues/1450 | 0 | static MagickBooleanType DecodeImage(Image *image,unsigned char *luma,
unsigned char *chroma1,unsigned char *chroma2,ExceptionInfo *exception)
{
#define IsSync(sum) ((sum & 0xffffff00UL) == 0xfffffe00UL)
#define PCDGetBits(n) \
{ \
sum=(sum << n) & 0xffffffff; \
bits-=n; \
while (bits <= 24) \
{ \
if (p... | 166,023,602,708,219,940,000,000,000,000,000,000,000 | pcd.c | 78,447,038,637,858,290,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2019-7175 | In ImageMagick before 7.0.8-25, some memory leaks exist in DecodeImage in coders/pcd.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-7175 |
4,109 | mod_auth_mellon | 62041428a32de402e0be6ba45fe12df6a83bedb8 | https://github.com/Uninett/mod_auth_mellon | https://github.com/Uninett/mod_auth_mellon/commit/62041428a32de402e0be6ba45fe12df6a83bedb8 | Fix redirect URL validation bypass
It turns out that browsers silently convert backslash characters into
forward slashes, while apr_uri_parse() does not.
This mismatch allows an attacker to bypass the redirect URL validation
by using an URL like:
https://sp.example.org/mellon/logout?ReturnTo=https:%5c%5cmalicious.... | 1 | int am_check_url(request_rec *r, const char *url)
{
const char *i;
for (i = url; *i; i++) {
if (*i >= 0 && *i < ' ') {
/* Deny all control-characters. */
AM_LOG_RERROR(APLOG_MARK, APLOG_ERR, HTTP_BAD_REQUEST, r,
"Control character detected in URL.");
... | 82,672,157,991,462,600,000,000,000,000,000,000,000 | auth_mellon_util.c | 235,649,112,104,693,500,000,000,000,000,000,000,000 | [
"CWE-601"
] | CVE-2019-3877 | A vulnerability was found in mod_auth_mellon before v0.14.2. An open redirect in the logout URL allows requests with backslashes to pass through by assuming that it is a relative URL, while the browsers silently convert backslash characters into forward slashes treating them as an absolute URL. This mismatch allows an ... | https://nvd.nist.gov/vuln/detail/CVE-2019-3877 |
161,351 | mod_auth_mellon | 62041428a32de402e0be6ba45fe12df6a83bedb8 | https://github.com/Uninett/mod_auth_mellon | https://github.com/Uninett/mod_auth_mellon/commit/62041428a32de402e0be6ba45fe12df6a83bedb8 | Fix redirect URL validation bypass
It turns out that browsers silently convert backslash characters into
forward slashes, while apr_uri_parse() does not.
This mismatch allows an attacker to bypass the redirect URL validation
by using an URL like:
https://sp.example.org/mellon/logout?ReturnTo=https:%5c%5cmalicious.... | 0 | int am_check_url(request_rec *r, const char *url)
{
const char *i;
for (i = url; *i; i++) {
if (*i >= 0 && *i < ' ') {
/* Deny all control-characters. */
AM_LOG_RERROR(APLOG_MARK, APLOG_ERR, HTTP_BAD_REQUEST, r,
"Control character detected in URL.");
... | 161,409,562,378,437,540,000,000,000,000,000,000,000 | auth_mellon_util.c | 104,935,388,546,746,630,000,000,000,000,000,000,000 | [
"CWE-601"
] | CVE-2019-3877 | A vulnerability was found in mod_auth_mellon before v0.14.2. An open redirect in the logout URL allows requests with backslashes to pass through by assuming that it is a relative URL, while the browsers silently convert backslash characters into forward slashes treating them as an absolute URL. This mismatch allows an ... | https://nvd.nist.gov/vuln/detail/CVE-2019-3877 |
4,118 | gpac | d2371b4b204f0a3c0af51ad4e9b491144dd1225c | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/d2371b4b204f0a3c0af51ad4e9b491144dd1225c | prevent dref memleak on invalid input (#1183) | 1 | GF_Err dinf_Read(GF_Box *s, GF_BitStream *bs)
{
GF_Err e = gf_isom_box_array_read(s, bs, dinf_AddBox);
if (e) {
return e;
}
if (!((GF_DataInformationBox *)s)->dref) {
GF_LOG(GF_LOG_ERROR, GF_LOG_CONTAINER, ("[iso file] Missing dref box in dinf\n"));
((GF_DataInformationBox *)s)->dref = (GF_DataReferenceBo... | 102,742,711,928,030,080,000,000,000,000,000,000,000 | box_code_base.c | 230,439,071,816,063,260,000,000,000,000,000,000,000 | [
"CWE-400"
] | CVE-2018-21017 | GPAC 0.7.1 has a memory leak in dinf_Read in isomedia/box_code_base.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-21017 |
161,360 | gpac | d2371b4b204f0a3c0af51ad4e9b491144dd1225c | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/d2371b4b204f0a3c0af51ad4e9b491144dd1225c | prevent dref memleak on invalid input (#1183) | 0 | GF_Err dinf_Read(GF_Box *s, GF_BitStream *bs)
{
GF_Err e = gf_isom_box_array_read(s, bs, dinf_AddBox);
if (e) {
return e;
}
if (!((GF_DataInformationBox *)s)->dref) {
GF_Box* dref;
GF_LOG(GF_LOG_ERROR, GF_LOG_CONTAINER, ("[iso file] Missing dref box in dinf\n"));
dref = gf_isom_box_new(GF_ISOM_BOX_TYPE_... | 308,809,438,634,628,800,000,000,000,000,000,000,000 | box_code_base.c | 95,603,189,090,506,600,000,000,000,000,000,000,000 | [
"CWE-400"
] | CVE-2018-21017 | GPAC 0.7.1 has a memory leak in dinf_Read in isomedia/box_code_base.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-21017 |
4,119 | openjpeg | 2e5ab1d9987831c981ff05862e8ccf1381ed58ea | https://github.com/uclouvain/openjpeg | https://github.com/uclouvain/openjpeg/commit/2e5ab1d9987831c981ff05862e8ccf1381ed58ea | color_apply_icc_profile: avoid potential heap buffer overflow
Derived from a patch by Thuan Pham | 1 | void color_apply_icc_profile(opj_image_t *image)
{
cmsHPROFILE in_prof, out_prof;
cmsHTRANSFORM transform;
cmsColorSpaceSignature in_space, out_space;
cmsUInt32Number intent, in_type, out_type;
int *r, *g, *b;
size_t nr_samples, i, max, max_w, max_h;
int prec, ok = 0;
OPJ_COLOR_SPACE new... | 105,259,506,362,981,870,000,000,000,000,000,000,000 | color.c | 74,641,151,863,664,750,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-21010 | OpenJPEG before 2.3.1 has a heap buffer overflow in color_apply_icc_profile in bin/common/color.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-21010 |
161,361 | openjpeg | 2e5ab1d9987831c981ff05862e8ccf1381ed58ea | https://github.com/uclouvain/openjpeg | https://github.com/uclouvain/openjpeg/commit/2e5ab1d9987831c981ff05862e8ccf1381ed58ea | color_apply_icc_profile: avoid potential heap buffer overflow
Derived from a patch by Thuan Pham | 0 | void color_apply_icc_profile(opj_image_t *image)
{
cmsHPROFILE in_prof, out_prof;
cmsHTRANSFORM transform;
cmsColorSpaceSignature in_space, out_space;
cmsUInt32Number intent, in_type, out_type;
int *r, *g, *b;
size_t nr_samples, i, max, max_w, max_h;
int prec, ok = 0;
OPJ_COLOR_SPACE new... | 109,498,780,464,417,920,000,000,000,000,000,000,000 | color.c | 14,748,644,194,213,563,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-21010 | OpenJPEG before 2.3.1 has a heap buffer overflow in color_apply_icc_profile in bin/common/color.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-21010 |
4,120 | linux | 7fafcfdf6377b18b2a726ea554d6e593ba44349f | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7fafcfdf6377b18b2a726ea554d6e593ba44349f | USB: gadget: f_midi: fixing a possible double-free in f_midi
It looks like there is a possibility of a double-free vulnerability on an
error path of the f_midi_set_alt function in the f_midi driver. If the
path is feasible then free_ep_req gets called twice:
req->complete = f_midi_complete;
err = us... | 1 | static int f_midi_set_alt(struct usb_function *f, unsigned intf, unsigned alt)
{
struct f_midi *midi = func_to_midi(f);
unsigned i;
int err;
/* we only set alt for MIDIStreaming interface */
if (intf != midi->ms_id)
return 0;
err = f_midi_start_ep(midi, f, midi->in_ep);
if (err)
return err;
err = f_midi_... | 319,178,464,914,382,540,000,000,000,000,000,000,000 | None | null | [
"CWE-415"
] | CVE-2018-20961 | In the Linux kernel before 4.16.4, a double free vulnerability in the f_midi_set_alt function of drivers/usb/gadget/function/f_midi.c in the f_midi driver may allow attackers to cause a denial of service or possibly have unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2018-20961 |
161,362 | linux | 7fafcfdf6377b18b2a726ea554d6e593ba44349f | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7fafcfdf6377b18b2a726ea554d6e593ba44349f | USB: gadget: f_midi: fixing a possible double-free in f_midi
It looks like there is a possibility of a double-free vulnerability on an
error path of the f_midi_set_alt function in the f_midi driver. If the
path is feasible then free_ep_req gets called twice:
req->complete = f_midi_complete;
err = us... | 0 | static int f_midi_set_alt(struct usb_function *f, unsigned intf, unsigned alt)
{
struct f_midi *midi = func_to_midi(f);
unsigned i;
int err;
/* we only set alt for MIDIStreaming interface */
if (intf != midi->ms_id)
return 0;
err = f_midi_start_ep(midi, f, midi->in_ep);
if (err)
return err;
err = f_midi_... | 226,912,574,947,505,360,000,000,000,000,000,000,000 | None | null | [
"CWE-415"
] | CVE-2018-20961 | In the Linux kernel before 4.16.4, a double free vulnerability in the f_midi_set_alt function of drivers/usb/gadget/function/f_midi.c in the f_midi driver may allow attackers to cause a denial of service or possibly have unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2018-20961 |
4,121 | linux | 54648cf1ec2d7f4b6a71767799c45676a138ca24 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/54648cf1ec2d7f4b6a71767799c45676a138ca24 | block: blk_init_allocated_queue() set q->fq as NULL in the fail case
We find the memory use-after-free issue in __blk_drain_queue()
on the kernel 4.14. After read the latest kernel 4.18-rc6 we
think it has the same problem.
Memory is allocated for q->fq in the blk_init_allocated_queue().
If the elevator init function... | 1 | int blk_init_allocated_queue(struct request_queue *q)
{
WARN_ON_ONCE(q->mq_ops);
q->fq = blk_alloc_flush_queue(q, NUMA_NO_NODE, q->cmd_size);
if (!q->fq)
return -ENOMEM;
if (q->init_rq_fn && q->init_rq_fn(q, q->fq->flush_rq, GFP_KERNEL))
goto out_free_flush_queue;
if (blk_init_rl(&q->root_rl, q, GFP_KERNEL)... | 302,121,427,349,834,920,000,000,000,000,000,000,000 | blk-core.c | 50,547,906,985,392,000,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2018-20856 | An issue was discovered in the Linux kernel before 4.18.7. In block/blk-core.c, there is an __blk_drain_queue() use-after-free because a certain error case is mishandled. | https://nvd.nist.gov/vuln/detail/CVE-2018-20856 |
161,363 | linux | 54648cf1ec2d7f4b6a71767799c45676a138ca24 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/54648cf1ec2d7f4b6a71767799c45676a138ca24 | block: blk_init_allocated_queue() set q->fq as NULL in the fail case
We find the memory use-after-free issue in __blk_drain_queue()
on the kernel 4.14. After read the latest kernel 4.18-rc6 we
think it has the same problem.
Memory is allocated for q->fq in the blk_init_allocated_queue().
If the elevator init function... | 0 | int blk_init_allocated_queue(struct request_queue *q)
{
WARN_ON_ONCE(q->mq_ops);
q->fq = blk_alloc_flush_queue(q, NUMA_NO_NODE, q->cmd_size);
if (!q->fq)
return -ENOMEM;
if (q->init_rq_fn && q->init_rq_fn(q, q->fq->flush_rq, GFP_KERNEL))
goto out_free_flush_queue;
if (blk_init_rl(&q->root_rl, q, GFP_KERNEL)... | 306,223,966,788,099,170,000,000,000,000,000,000,000 | blk-core.c | 304,795,442,038,354,070,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2018-20856 | An issue was discovered in the Linux kernel before 4.18.7. In block/blk-core.c, there is an __blk_drain_queue() use-after-free because a certain error case is mishandled. | https://nvd.nist.gov/vuln/detail/CVE-2018-20856 |
4,122 | linux | 0625b4ba1a5d4703c7fb01c497bd6c156908af00 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0625b4ba1a5d4703c7fb01c497bd6c156908af00 | IB/mlx5: Fix leaking stack memory to userspace
mlx5_ib_create_qp_resp was never initialized and only the first 4 bytes
were written.
Fixes: 41d902cb7c32 ("RDMA/mlx5: Fix definition of mlx5_ib_create_qp_resp")
Cc: <stable@vger.kernel.org>
Acked-by: Leon Romanovsky <leonro@mellanox.com>
Signed-off-by: Jason Gunthorpe <... | 1 | static int create_qp_common(struct mlx5_ib_dev *dev, struct ib_pd *pd,
struct ib_qp_init_attr *init_attr,
struct ib_udata *udata, struct mlx5_ib_qp *qp)
{
struct mlx5_ib_resources *devr = &dev->devr;
int inlen = MLX5_ST_SZ_BYTES(create_qp_in);
struct mlx5_core_dev *mdev = dev->mdev;
struct mlx5_ib_... | 248,861,397,606,415,760,000,000,000,000,000,000,000 | qp.c | 331,582,094,954,837,000,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-20855 | An issue was discovered in the Linux kernel before 4.18.7. In create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace. | https://nvd.nist.gov/vuln/detail/CVE-2018-20855 |
161,364 | linux | 0625b4ba1a5d4703c7fb01c497bd6c156908af00 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/0625b4ba1a5d4703c7fb01c497bd6c156908af00 | IB/mlx5: Fix leaking stack memory to userspace
mlx5_ib_create_qp_resp was never initialized and only the first 4 bytes
were written.
Fixes: 41d902cb7c32 ("RDMA/mlx5: Fix definition of mlx5_ib_create_qp_resp")
Cc: <stable@vger.kernel.org>
Acked-by: Leon Romanovsky <leonro@mellanox.com>
Signed-off-by: Jason Gunthorpe <... | 0 | static int create_qp_common(struct mlx5_ib_dev *dev, struct ib_pd *pd,
struct ib_qp_init_attr *init_attr,
struct ib_udata *udata, struct mlx5_ib_qp *qp)
{
struct mlx5_ib_resources *devr = &dev->devr;
int inlen = MLX5_ST_SZ_BYTES(create_qp_in);
struct mlx5_core_dev *mdev = dev->mdev;
struct mlx5_ib_... | 100,002,669,697,923,270,000,000,000,000,000,000,000 | qp.c | 75,062,449,826,770,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-20855 | An issue was discovered in the Linux kernel before 4.18.7. In create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace. | https://nvd.nist.gov/vuln/detail/CVE-2018-20855 |
4,124 | openjpeg | c58df149900df862806d0e892859b41115875845 | https://github.com/uclouvain/openjpeg | https://github.com/uclouvain/openjpeg/commit/c58df149900df862806d0e892859b41115875845 | [OPENJP2] change the way to compute *p_tx0, *p_tx1, *p_ty0, *p_ty1 in function
opj_get_encoding_parameters
Signed-off-by: Young_X <YangX92@hotmail.com> | 1 | static void opj_get_encoding_parameters(const opj_image_t *p_image,
const opj_cp_t *p_cp,
OPJ_UINT32 p_tileno,
OPJ_INT32 * p_tx0,
OPJ_INT32 * p_tx1,
... | 296,815,004,190,301,400,000,000,000,000,000,000,000 | pi.c | 91,262,203,277,625,340,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2018-20847 | An improper computation of p_tx0, p_tx1, p_ty0 and p_ty1 in the function opj_get_encoding_parameters in openjp2/pi.c in OpenJPEG through 2.3.0 can lead to an integer overflow. | https://nvd.nist.gov/vuln/detail/CVE-2018-20847 |
161,366 | openjpeg | c58df149900df862806d0e892859b41115875845 | https://github.com/uclouvain/openjpeg | https://github.com/uclouvain/openjpeg/commit/c58df149900df862806d0e892859b41115875845 | [OPENJP2] change the way to compute *p_tx0, *p_tx1, *p_ty0, *p_ty1 in function
opj_get_encoding_parameters
Signed-off-by: Young_X <YangX92@hotmail.com> | 0 | static void opj_get_encoding_parameters(const opj_image_t *p_image,
const opj_cp_t *p_cp,
OPJ_UINT32 p_tileno,
OPJ_INT32 * p_tx0,
OPJ_INT32 * p_tx1,
... | 182,177,806,558,737,580,000,000,000,000,000,000,000 | pi.c | 118,240,156,771,842,050,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2018-20847 | An improper computation of p_tx0, p_tx1, p_ty0 and p_ty1 in the function opj_get_encoding_parameters in openjp2/pi.c in OpenJPEG through 2.3.0 can lead to an integer overflow. | https://nvd.nist.gov/vuln/detail/CVE-2018-20847 |
4,125 | openjpeg | c277159986c80142180fbe5efb256bbf3bdf3edc | https://github.com/uclouvain/openjpeg | https://github.com/uclouvain/openjpeg/commit/c277159986c80142180fbe5efb256bbf3bdf3edc | [MJ2] Avoid index out of bounds access to pi->include[]
Signed-off-by: Young_X <YangX92@hotmail.com> | 1 | static opj_bool pi_next_cprl(opj_pi_iterator_t * pi)
{
opj_pi_comp_t *comp = NULL;
opj_pi_resolution_t *res = NULL;
long index = 0;
if (!pi->first) {
comp = &pi->comps[pi->compno];
goto LABEL_SKIP;
} else {
pi->first = 0;
}
for (pi->compno = pi->poc.compno0; pi->com... | 85,538,911,631,696,440,000,000,000,000,000,000,000 | pi.c | 29,164,093,234,674,973,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2018-20846 | Out-of-bounds accesses in the functions pi_next_lrcp, pi_next_rlcp, pi_next_rpcl, pi_next_pcrl, pi_next_rpcl, and pi_next_cprl in openmj2/pi.c in OpenJPEG through 2.3.0 allow remote attackers to cause a denial of service (application crash). | https://nvd.nist.gov/vuln/detail/CVE-2018-20846 |
161,367 | openjpeg | c277159986c80142180fbe5efb256bbf3bdf3edc | https://github.com/uclouvain/openjpeg | https://github.com/uclouvain/openjpeg/commit/c277159986c80142180fbe5efb256bbf3bdf3edc | [MJ2] Avoid index out of bounds access to pi->include[]
Signed-off-by: Young_X <YangX92@hotmail.com> | 0 | static opj_bool pi_next_cprl(opj_pi_iterator_t * pi)
{
opj_pi_comp_t *comp = NULL;
opj_pi_resolution_t *res = NULL;
long index = 0;
if (!pi->first) {
comp = &pi->comps[pi->compno];
goto LABEL_SKIP;
} else {
pi->first = 0;
}
for (pi->compno = pi->poc.compno0; pi->com... | 152,568,987,785,447,740,000,000,000,000,000,000,000 | pi.c | 263,911,731,707,844,140,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2018-20846 | Out-of-bounds accesses in the functions pi_next_lrcp, pi_next_rlcp, pi_next_rpcl, pi_next_pcrl, pi_next_rpcl, and pi_next_cprl in openmj2/pi.c in OpenJPEG through 2.3.0 allow remote attackers to cause a denial of service (application crash). | https://nvd.nist.gov/vuln/detail/CVE-2018-20846 |
4,126 | openjpeg | c277159986c80142180fbe5efb256bbf3bdf3edc | https://github.com/uclouvain/openjpeg | https://github.com/uclouvain/openjpeg/commit/c277159986c80142180fbe5efb256bbf3bdf3edc | [MJ2] Avoid index out of bounds access to pi->include[]
Signed-off-by: Young_X <YangX92@hotmail.com> | 1 | static opj_bool pi_next_lrcp(opj_pi_iterator_t * pi)
{
opj_pi_comp_t *comp = NULL;
opj_pi_resolution_t *res = NULL;
long index = 0;
if (!pi->first) {
comp = &pi->comps[pi->compno];
res = &comp->resolutions[pi->resno];
goto LABEL_SKIP;
} else {
pi->first = 0;
}... | 152,272,228,207,417,500,000,000,000,000,000,000,000 | pi.c | 29,164,093,234,674,973,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2018-20846 | Out-of-bounds accesses in the functions pi_next_lrcp, pi_next_rlcp, pi_next_rpcl, pi_next_pcrl, pi_next_rpcl, and pi_next_cprl in openmj2/pi.c in OpenJPEG through 2.3.0 allow remote attackers to cause a denial of service (application crash). | https://nvd.nist.gov/vuln/detail/CVE-2018-20846 |
161,368 | openjpeg | c277159986c80142180fbe5efb256bbf3bdf3edc | https://github.com/uclouvain/openjpeg | https://github.com/uclouvain/openjpeg/commit/c277159986c80142180fbe5efb256bbf3bdf3edc | [MJ2] Avoid index out of bounds access to pi->include[]
Signed-off-by: Young_X <YangX92@hotmail.com> | 0 | static opj_bool pi_next_lrcp(opj_pi_iterator_t * pi)
{
opj_pi_comp_t *comp = NULL;
opj_pi_resolution_t *res = NULL;
long index = 0;
if (!pi->first) {
comp = &pi->comps[pi->compno];
res = &comp->resolutions[pi->resno];
goto LABEL_SKIP;
} else {
pi->first = 0;
}... | 340,147,979,248,397,630,000,000,000,000,000,000,000 | pi.c | 263,911,731,707,844,140,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2018-20846 | Out-of-bounds accesses in the functions pi_next_lrcp, pi_next_rlcp, pi_next_rpcl, pi_next_pcrl, pi_next_rpcl, and pi_next_cprl in openmj2/pi.c in OpenJPEG through 2.3.0 allow remote attackers to cause a denial of service (application crash). | https://nvd.nist.gov/vuln/detail/CVE-2018-20846 |
4,127 | openjpeg | c277159986c80142180fbe5efb256bbf3bdf3edc | https://github.com/uclouvain/openjpeg | https://github.com/uclouvain/openjpeg/commit/c277159986c80142180fbe5efb256bbf3bdf3edc | [MJ2] Avoid index out of bounds access to pi->include[]
Signed-off-by: Young_X <YangX92@hotmail.com> | 1 | static opj_bool pi_next_pcrl(opj_pi_iterator_t * pi)
{
opj_pi_comp_t *comp = NULL;
opj_pi_resolution_t *res = NULL;
long index = 0;
if (!pi->first) {
comp = &pi->comps[pi->compno];
goto LABEL_SKIP;
} else {
int compno, resno;
pi->first = 0;
pi->dx = 0;
... | 95,796,440,332,548,910,000,000,000,000,000,000,000 | pi.c | 29,164,093,234,674,973,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2018-20846 | Out-of-bounds accesses in the functions pi_next_lrcp, pi_next_rlcp, pi_next_rpcl, pi_next_pcrl, pi_next_rpcl, and pi_next_cprl in openmj2/pi.c in OpenJPEG through 2.3.0 allow remote attackers to cause a denial of service (application crash). | https://nvd.nist.gov/vuln/detail/CVE-2018-20846 |
161,369 | openjpeg | c277159986c80142180fbe5efb256bbf3bdf3edc | https://github.com/uclouvain/openjpeg | https://github.com/uclouvain/openjpeg/commit/c277159986c80142180fbe5efb256bbf3bdf3edc | [MJ2] Avoid index out of bounds access to pi->include[]
Signed-off-by: Young_X <YangX92@hotmail.com> | 0 | static opj_bool pi_next_pcrl(opj_pi_iterator_t * pi)
{
opj_pi_comp_t *comp = NULL;
opj_pi_resolution_t *res = NULL;
long index = 0;
if (!pi->first) {
comp = &pi->comps[pi->compno];
goto LABEL_SKIP;
} else {
int compno, resno;
pi->first = 0;
pi->dx = 0;
... | 212,417,702,150,292,840,000,000,000,000,000,000,000 | pi.c | 263,911,731,707,844,140,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2018-20846 | Out-of-bounds accesses in the functions pi_next_lrcp, pi_next_rlcp, pi_next_rpcl, pi_next_pcrl, pi_next_rpcl, and pi_next_cprl in openmj2/pi.c in OpenJPEG through 2.3.0 allow remote attackers to cause a denial of service (application crash). | https://nvd.nist.gov/vuln/detail/CVE-2018-20846 |
4,128 | openjpeg | c277159986c80142180fbe5efb256bbf3bdf3edc | https://github.com/uclouvain/openjpeg | https://github.com/uclouvain/openjpeg/commit/c277159986c80142180fbe5efb256bbf3bdf3edc | [MJ2] Avoid index out of bounds access to pi->include[]
Signed-off-by: Young_X <YangX92@hotmail.com> | 1 | static opj_bool pi_next_rlcp(opj_pi_iterator_t * pi)
{
opj_pi_comp_t *comp = NULL;
opj_pi_resolution_t *res = NULL;
long index = 0;
if (!pi->first) {
comp = &pi->comps[pi->compno];
res = &comp->resolutions[pi->resno];
goto LABEL_SKIP;
} else {
pi->first = 0;
}
... | 223,188,624,698,480,920,000,000,000,000,000,000,000 | pi.c | 29,164,093,234,674,973,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2018-20846 | Out-of-bounds accesses in the functions pi_next_lrcp, pi_next_rlcp, pi_next_rpcl, pi_next_pcrl, pi_next_rpcl, and pi_next_cprl in openmj2/pi.c in OpenJPEG through 2.3.0 allow remote attackers to cause a denial of service (application crash). | https://nvd.nist.gov/vuln/detail/CVE-2018-20846 |
161,370 | openjpeg | c277159986c80142180fbe5efb256bbf3bdf3edc | https://github.com/uclouvain/openjpeg | https://github.com/uclouvain/openjpeg/commit/c277159986c80142180fbe5efb256bbf3bdf3edc | [MJ2] Avoid index out of bounds access to pi->include[]
Signed-off-by: Young_X <YangX92@hotmail.com> | 0 | static opj_bool pi_next_rlcp(opj_pi_iterator_t * pi)
{
opj_pi_comp_t *comp = NULL;
opj_pi_resolution_t *res = NULL;
long index = 0;
if (!pi->first) {
comp = &pi->comps[pi->compno];
res = &comp->resolutions[pi->resno];
goto LABEL_SKIP;
} else {
pi->first = 0;
}
... | 200,157,178,676,074,700,000,000,000,000,000,000,000 | pi.c | 263,911,731,707,844,140,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2018-20846 | Out-of-bounds accesses in the functions pi_next_lrcp, pi_next_rlcp, pi_next_rpcl, pi_next_pcrl, pi_next_rpcl, and pi_next_cprl in openmj2/pi.c in OpenJPEG through 2.3.0 allow remote attackers to cause a denial of service (application crash). | https://nvd.nist.gov/vuln/detail/CVE-2018-20846 |
4,129 | openjpeg | c277159986c80142180fbe5efb256bbf3bdf3edc | https://github.com/uclouvain/openjpeg | https://github.com/uclouvain/openjpeg/commit/c277159986c80142180fbe5efb256bbf3bdf3edc | [MJ2] Avoid index out of bounds access to pi->include[]
Signed-off-by: Young_X <YangX92@hotmail.com> | 1 | static opj_bool pi_next_rpcl(opj_pi_iterator_t * pi)
{
opj_pi_comp_t *comp = NULL;
opj_pi_resolution_t *res = NULL;
long index = 0;
if (!pi->first) {
goto LABEL_SKIP;
} else {
int compno, resno;
pi->first = 0;
pi->dx = 0;
pi->dy = 0;
for (compno = 0; ... | 80,601,494,770,304,420,000,000,000,000,000,000,000 | pi.c | 29,164,093,234,674,973,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2018-20846 | Out-of-bounds accesses in the functions pi_next_lrcp, pi_next_rlcp, pi_next_rpcl, pi_next_pcrl, pi_next_rpcl, and pi_next_cprl in openmj2/pi.c in OpenJPEG through 2.3.0 allow remote attackers to cause a denial of service (application crash). | https://nvd.nist.gov/vuln/detail/CVE-2018-20846 |
161,371 | openjpeg | c277159986c80142180fbe5efb256bbf3bdf3edc | https://github.com/uclouvain/openjpeg | https://github.com/uclouvain/openjpeg/commit/c277159986c80142180fbe5efb256bbf3bdf3edc | [MJ2] Avoid index out of bounds access to pi->include[]
Signed-off-by: Young_X <YangX92@hotmail.com> | 0 | static opj_bool pi_next_rpcl(opj_pi_iterator_t * pi)
{
opj_pi_comp_t *comp = NULL;
opj_pi_resolution_t *res = NULL;
long index = 0;
if (!pi->first) {
goto LABEL_SKIP;
} else {
int compno, resno;
pi->first = 0;
pi->dx = 0;
pi->dy = 0;
for (compno = 0; ... | 322,166,698,431,701,670,000,000,000,000,000,000,000 | pi.c | 263,911,731,707,844,140,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2018-20846 | Out-of-bounds accesses in the functions pi_next_lrcp, pi_next_rlcp, pi_next_rpcl, pi_next_pcrl, pi_next_rpcl, and pi_next_cprl in openmj2/pi.c in OpenJPEG through 2.3.0 allow remote attackers to cause a denial of service (application crash). | https://nvd.nist.gov/vuln/detail/CVE-2018-20846 |
4,137 | linux | b90cd6f2b905905fb42671009dc0e27c310a16ae | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/b90cd6f2b905905fb42671009dc0e27c310a16ae | scsi: libsas: fix a race condition when smp task timeout
When the lldd is processing the complete sas task in interrupt and set the
task stat as SAS_TASK_STATE_DONE, the smp timeout timer is able to be
triggered at the same time. And smp_task_timedout() will complete the task
wheter the SAS_TASK_STATE_DONE is set or n... | 1 | static void smp_task_done(struct sas_task *task)
{
if (!del_timer(&task->slow_task->timer))
return;
complete(&task->slow_task->completion);
}
| 29,609,062,973,361,010,000,000,000,000,000,000,000 | sas_expander.c | 251,418,024,640,382,320,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2018-20836 | An issue was discovered in the Linux kernel before 4.20. There is a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free. | https://nvd.nist.gov/vuln/detail/CVE-2018-20836 |
161,376 | linux | b90cd6f2b905905fb42671009dc0e27c310a16ae | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/b90cd6f2b905905fb42671009dc0e27c310a16ae | scsi: libsas: fix a race condition when smp task timeout
When the lldd is processing the complete sas task in interrupt and set the
task stat as SAS_TASK_STATE_DONE, the smp timeout timer is able to be
triggered at the same time. And smp_task_timedout() will complete the task
wheter the SAS_TASK_STATE_DONE is set or n... | 0 | static void smp_task_done(struct sas_task *task)
{
del_timer(&task->slow_task->timer);
complete(&task->slow_task->completion);
}
| 338,994,261,007,418,500,000,000,000,000,000,000,000 | sas_expander.c | 178,098,637,815,964,250,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2018-20836 | An issue was discovered in the Linux kernel before 4.20. There is a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free. | https://nvd.nist.gov/vuln/detail/CVE-2018-20836 |
4,138 | linux | b90cd6f2b905905fb42671009dc0e27c310a16ae | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/b90cd6f2b905905fb42671009dc0e27c310a16ae | scsi: libsas: fix a race condition when smp task timeout
When the lldd is processing the complete sas task in interrupt and set the
task stat as SAS_TASK_STATE_DONE, the smp timeout timer is able to be
triggered at the same time. And smp_task_timedout() will complete the task
wheter the SAS_TASK_STATE_DONE is set or n... | 1 | static void smp_task_timedout(struct timer_list *t)
{
struct sas_task_slow *slow = from_timer(slow, t, timer);
struct sas_task *task = slow->task;
unsigned long flags;
spin_lock_irqsave(&task->task_state_lock, flags);
if (!(task->task_state_flags & SAS_TASK_STATE_DONE))
task->task_state_flags |= SAS_TASK_ST... | 300,277,114,529,588,760,000,000,000,000,000,000,000 | sas_expander.c | 251,418,024,640,382,320,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2018-20836 | An issue was discovered in the Linux kernel before 4.20. There is a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free. | https://nvd.nist.gov/vuln/detail/CVE-2018-20836 |
161,377 | linux | b90cd6f2b905905fb42671009dc0e27c310a16ae | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/b90cd6f2b905905fb42671009dc0e27c310a16ae | scsi: libsas: fix a race condition when smp task timeout
When the lldd is processing the complete sas task in interrupt and set the
task stat as SAS_TASK_STATE_DONE, the smp timeout timer is able to be
triggered at the same time. And smp_task_timedout() will complete the task
wheter the SAS_TASK_STATE_DONE is set or n... | 0 | static void smp_task_timedout(struct timer_list *t)
{
struct sas_task_slow *slow = from_timer(slow, t, timer);
struct sas_task *task = slow->task;
unsigned long flags;
spin_lock_irqsave(&task->task_state_lock, flags);
if (!(task->task_state_flags & SAS_TASK_STATE_DONE)) {
task->task_state_flags |= SAS_TASK_... | 278,202,733,767,203,030,000,000,000,000,000,000,000 | sas_expander.c | 178,098,637,815,964,250,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2018-20836 | An issue was discovered in the Linux kernel before 4.20. There is a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free. | https://nvd.nist.gov/vuln/detail/CVE-2018-20836 |
4,141 | linux | c40f7d74c741a907cfaeb73a7697081881c497d0 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c40f7d74c741a907cfaeb73a7697081881c497d0 | sched/fair: Fix infinite loop in update_blocked_averages() by reverting a9e7f6544b9c
Zhipeng Xie, Xie XiuQi and Sargun Dhillon reported lockups in the
scheduler under high loads, starting at around the v4.18 time frame,
and Zhipeng Xie tracked it down to bugs in the rq->leaf_cfs_rq_list
manipulation.
Do a (manual) re... | 1 | static void update_blocked_averages(int cpu)
{
struct rq *rq = cpu_rq(cpu);
struct cfs_rq *cfs_rq, *pos;
const struct sched_class *curr_class;
struct rq_flags rf;
bool done = true;
rq_lock_irqsave(rq, &rf);
update_rq_clock(rq);
/*
* Iterates the task_group tree in a bottom up fashion, see
* list_a... | 242,733,069,005,675,960,000,000,000,000,000,000,000 | fair.c | 71,919,484,539,312,920,000,000,000,000,000,000,000 | [
"CWE-400"
] | CVE-2018-20784 | In the Linux kernel before 4.20.2, kernel/sched/fair.c mishandles leaf cfs_rq's, which allows attackers to cause a denial of service (infinite loop in update_blocked_averages) or possibly have unspecified other impact by inducing a high load. | https://nvd.nist.gov/vuln/detail/CVE-2018-20784 |
161,380 | linux | c40f7d74c741a907cfaeb73a7697081881c497d0 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c40f7d74c741a907cfaeb73a7697081881c497d0 | sched/fair: Fix infinite loop in update_blocked_averages() by reverting a9e7f6544b9c
Zhipeng Xie, Xie XiuQi and Sargun Dhillon reported lockups in the
scheduler under high loads, starting at around the v4.18 time frame,
and Zhipeng Xie tracked it down to bugs in the rq->leaf_cfs_rq_list
manipulation.
Do a (manual) re... | 0 | static void update_blocked_averages(int cpu)
{
struct rq *rq = cpu_rq(cpu);
struct cfs_rq *cfs_rq;
const struct sched_class *curr_class;
struct rq_flags rf;
bool done = true;
rq_lock_irqsave(rq, &rf);
update_rq_clock(rq);
/*
* Iterates the task_group tree in a bottom up fashion, see
* list_add_lea... | 82,250,912,236,639,870,000,000,000,000,000,000,000 | fair.c | 120,169,292,865,537,350,000,000,000,000,000,000,000 | [
"CWE-400"
] | CVE-2018-20784 | In the Linux kernel before 4.20.2, kernel/sched/fair.c mishandles leaf cfs_rq's, which allows attackers to cause a denial of service (infinite loop in update_blocked_averages) or possibly have unspecified other impact by inducing a high load. | https://nvd.nist.gov/vuln/detail/CVE-2018-20784 |
4,142 | gpac | 1c449a34fe0b50aaffb881bfb9d7c5ab0bb18cdd | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/1c449a34fe0b50aaffb881bfb9d7c5ab0bb18cdd | add some boundary checks on gf_text_get_utf8_line (#1188) | 1 | int mp4client_main(int argc, char **argv)
{
char c;
const char *str;
int ret_val = 0;
u32 i, times[100], nb_times, dump_mode;
u32 simulation_time_in_ms = 0;
u32 initial_service_id = 0;
Bool auto_exit = GF_FALSE;
Bool logs_set = GF_FALSE;
Bool start_fs = GF_FALSE;
Bool use_rtix = GF_FALSE;
Bool pause_at_first... | 33,731,538,446,325,954,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2018-20763 | In GPAC 0.7.1 and earlier, gf_text_get_utf8_line in media_tools/text_import.c in libgpac_static.a allows an out-of-bounds write because of missing szLineConv bounds checking. | https://nvd.nist.gov/vuln/detail/CVE-2018-20763 |
161,381 | gpac | 1c449a34fe0b50aaffb881bfb9d7c5ab0bb18cdd | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/1c449a34fe0b50aaffb881bfb9d7c5ab0bb18cdd | add some boundary checks on gf_text_get_utf8_line (#1188) | 0 | int mp4client_main(int argc, char **argv)
{
char c;
const char *str;
int ret_val = 0;
u32 i, times[100], nb_times, dump_mode;
u32 simulation_time_in_ms = 0;
u32 initial_service_id = 0;
Bool auto_exit = GF_FALSE;
Bool logs_set = GF_FALSE;
Bool start_fs = GF_FALSE;
Bool use_rtix = GF_FALSE;
Bool pause_at_first... | 168,088,242,868,606,200,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2018-20763 | In GPAC 0.7.1 and earlier, gf_text_get_utf8_line in media_tools/text_import.c in libgpac_static.a allows an out-of-bounds write because of missing szLineConv bounds checking. | https://nvd.nist.gov/vuln/detail/CVE-2018-20763 |
4,143 | gpac | 35ab4475a7df9b2a4bcab235e379c0c3ec543658 | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/35ab4475a7df9b2a4bcab235e379c0c3ec543658 | fix some overflows due to strcpy
fixes #1184, #1186, #1187 among other things | 1 | GF_Err cat_multiple_files(GF_ISOFile *dest, char *fileName, u32 import_flags, Double force_fps, u32 frames_per_sample, char *tmp_dir, Bool force_cat, Bool align_timelines, Bool allow_add_in_command)
{
CATEnum cat_enum;
char *sep;
cat_enum.dest = dest;
cat_enum.import_flags = import_flags;
cat_enum.force_fps = for... | 184,974,595,979,520,000,000,000,000,000,000,000,000 | fileimport.c | 215,039,272,518,635,600,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-20761 | GPAC version 0.7.1 and earlier has a Buffer Overflow vulnerability in the gf_sm_load_init function in scene_manager.c in libgpac_static.a. | https://nvd.nist.gov/vuln/detail/CVE-2018-20761 |
161,382 | gpac | 35ab4475a7df9b2a4bcab235e379c0c3ec543658 | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/35ab4475a7df9b2a4bcab235e379c0c3ec543658 | fix some overflows due to strcpy
fixes #1184, #1186, #1187 among other things | 0 | GF_Err cat_multiple_files(GF_ISOFile *dest, char *fileName, u32 import_flags, Double force_fps, u32 frames_per_sample, char *tmp_dir, Bool force_cat, Bool align_timelines, Bool allow_add_in_command)
{
CATEnum cat_enum;
char *sep;
cat_enum.dest = dest;
cat_enum.import_flags = import_flags;
cat_enum.force_fps = for... | 93,042,088,020,180,560,000,000,000,000,000,000,000 | fileimport.c | 162,158,034,306,373,570,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-20761 | GPAC version 0.7.1 and earlier has a Buffer Overflow vulnerability in the gf_sm_load_init function in scene_manager.c in libgpac_static.a. | https://nvd.nist.gov/vuln/detail/CVE-2018-20761 |
4,147 | gpac | 35ab4475a7df9b2a4bcab235e379c0c3ec543658 | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/35ab4475a7df9b2a4bcab235e379c0c3ec543658 | fix some overflows due to strcpy
fixes #1184, #1186, #1187 among other things | 1 | GF_Err gf_sm_load_init(GF_SceneLoader *load)
{
GF_Err e = GF_NOT_SUPPORTED;
char *ext, szExt[50];
/*we need at least a scene graph*/
if (!load || (!load->ctx && !load->scene_graph)
#ifndef GPAC_DISABLE_ISOM
|| (!load->fileName && !load->isom && !(load->flags & GF_SM_LOAD_FOR_PLAYBACK) )
#endif
) return... | 297,086,645,771,880,500,000,000,000,000,000,000,000 | scene_manager.c | 72,644,650,139,823,230,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-20761 | GPAC version 0.7.1 and earlier has a Buffer Overflow vulnerability in the gf_sm_load_init function in scene_manager.c in libgpac_static.a. | https://nvd.nist.gov/vuln/detail/CVE-2018-20761 |
161,385 | gpac | 35ab4475a7df9b2a4bcab235e379c0c3ec543658 | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/35ab4475a7df9b2a4bcab235e379c0c3ec543658 | fix some overflows due to strcpy
fixes #1184, #1186, #1187 among other things | 0 | GF_Err gf_sm_load_init(GF_SceneLoader *load)
{
GF_Err e = GF_NOT_SUPPORTED;
char *ext, szExt[50];
/*we need at least a scene graph*/
if (!load || (!load->ctx && !load->scene_graph)
#ifndef GPAC_DISABLE_ISOM
|| (!load->fileName && !load->isom && !(load->flags & GF_SM_LOAD_FOR_PLAYBACK) )
#endif
) return... | 144,439,695,720,800,540,000,000,000,000,000,000,000 | scene_manager.c | 340,230,047,790,908,450,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-20761 | GPAC version 0.7.1 and earlier has a Buffer Overflow vulnerability in the gf_sm_load_init function in scene_manager.c in libgpac_static.a. | https://nvd.nist.gov/vuln/detail/CVE-2018-20761 |
4,149 | rdesktop | 4dca546d04321a610c1835010b5dad85163b65e1 | https://github.com/rdesktop/rdesktop | https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1 | Malicious RDP server security fixes
This commit includes fixes for a set of 21 vulnerabilities in
rdesktop when a malicious RDP server is used.
All vulnerabilities was identified and reported by Eyal Itkin.
* Add rdp_protocol_error function that is used in several fixes
* Refactor of process_bitmap_updates
* Fix ... | 1 | process_plane(uint8 * in, int width, int height, uint8 * out, int size)
{
UNUSED(size);
int indexw;
int indexh;
int code;
int collen;
int replen;
int color;
int x;
int revcode;
uint8 * last_line;
uint8 * this_line;
uint8 * org_in;
uint8 * org_out;
org_in = in;
org_out = out;
last_line = 0;
indexh = 0;... | 243,072,446,217,366,000,000,000,000,000,000,000,000 | bitmap.c | 298,040,105,414,695,750,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-8799 | rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function process_secondary_order() that results in a Denial of Service (segfault). | https://nvd.nist.gov/vuln/detail/CVE-2018-8799 |
161,387 | rdesktop | 4dca546d04321a610c1835010b5dad85163b65e1 | https://github.com/rdesktop/rdesktop | https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1 | Malicious RDP server security fixes
This commit includes fixes for a set of 21 vulnerabilities in
rdesktop when a malicious RDP server is used.
All vulnerabilities was identified and reported by Eyal Itkin.
* Add rdp_protocol_error function that is used in several fixes
* Refactor of process_bitmap_updates
* Fix ... | 0 | process_plane(uint8 * in, int width, int height, uint8 * out, int size)
{
UNUSED(size);
int indexw;
int indexh;
int code;
int collen;
int replen;
int color;
int x;
int revcode;
uint8 * last_line;
uint8 * this_line;
uint8 * org_in;
uint8 * org_out;
org_in = in;
org_out = out;
last_line = 0;
indexh = 0;... | 233,589,960,412,521,700,000,000,000,000,000,000,000 | bitmap.c | 32,536,846,353,251,934,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-8799 | rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function process_secondary_order() that results in a Denial of Service (segfault). | https://nvd.nist.gov/vuln/detail/CVE-2018-8799 |
4,151 | rdesktop | 4dca546d04321a610c1835010b5dad85163b65e1 | https://github.com/rdesktop/rdesktop | https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1 | Malicious RDP server security fixes
This commit includes fixes for a set of 21 vulnerabilities in
rdesktop when a malicious RDP server is used.
All vulnerabilities was identified and reported by Eyal Itkin.
* Add rdp_protocol_error function that is used in several fixes
* Refactor of process_bitmap_updates
* Fix ... | 1 | cssp_read_tsrequest(STREAM token, STREAM pubkey)
{
STREAM s;
int length;
int tagval;
s = tcp_recv(NULL, 4);
if (s == NULL)
return False;
if (s->p[0] != (BER_TAG_SEQUENCE | BER_TAG_CONSTRUCTED))
{
logger(Protocol, Error,
"cssp_read_tsrequest(), expected BER_TAG_SEQUENCE|BER_TAG_CONSTRUCTED, ... | 154,298,624,846,793,850,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2018-8799 | rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function process_secondary_order() that results in a Denial of Service (segfault). | https://nvd.nist.gov/vuln/detail/CVE-2018-8799 |
161,389 | rdesktop | 4dca546d04321a610c1835010b5dad85163b65e1 | https://github.com/rdesktop/rdesktop | https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1 | Malicious RDP server security fixes
This commit includes fixes for a set of 21 vulnerabilities in
rdesktop when a malicious RDP server is used.
All vulnerabilities was identified and reported by Eyal Itkin.
* Add rdp_protocol_error function that is used in several fixes
* Refactor of process_bitmap_updates
* Fix ... | 0 | cssp_read_tsrequest(STREAM token, STREAM pubkey)
{
STREAM s;
int length;
int tagval;
struct stream packet;
s = tcp_recv(NULL, 4);
if (s == NULL)
return False;
if (s->p[0] != (BER_TAG_SEQUENCE | BER_TAG_CONSTRUCTED))
{
logger(Protocol, Error,
"cssp_read_tsrequest(), expected BER_TAG_SEQUENC... | 250,570,883,717,841,500,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2018-8799 | rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function process_secondary_order() that results in a Denial of Service (segfault). | https://nvd.nist.gov/vuln/detail/CVE-2018-8799 |
4,154 | rdesktop | 4dca546d04321a610c1835010b5dad85163b65e1 | https://github.com/rdesktop/rdesktop | https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1 | Malicious RDP server security fixes
This commit includes fixes for a set of 21 vulnerabilities in
rdesktop when a malicious RDP server is used.
All vulnerabilities was identified and reported by Eyal Itkin.
* Add rdp_protocol_error function that is used in several fixes
* Refactor of process_bitmap_updates
* Fix ... | 1 | process_bitmap_updates(STREAM s)
{
uint16 num_updates;
uint16 left, top, right, bottom, width, height;
uint16 cx, cy, bpp, Bpp, compress, bufsize, size;
uint8 *data, *bmpdata;
int i;
logger(Protocol, Debug, "%s()", __func__);
in_uint16_le(s, num_updates);
for (i = 0; i < num_updates; i++)
{
in_uint16... | 255,073,384,789,805,870,000,000,000,000,000,000,000 | rdp.c | 177,705,998,885,746,530,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-8799 | rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function process_secondary_order() that results in a Denial of Service (segfault). | https://nvd.nist.gov/vuln/detail/CVE-2018-8799 |
161,392 | rdesktop | 4dca546d04321a610c1835010b5dad85163b65e1 | https://github.com/rdesktop/rdesktop | https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1 | Malicious RDP server security fixes
This commit includes fixes for a set of 21 vulnerabilities in
rdesktop when a malicious RDP server is used.
All vulnerabilities was identified and reported by Eyal Itkin.
* Add rdp_protocol_error function that is used in several fixes
* Refactor of process_bitmap_updates
* Fix ... | 0 | process_bitmap_updates(STREAM s)
/* Process TS_BITMAP_DATA */
static void
process_bitmap_data(STREAM s)
{
uint16 left, top, right, bottom, width, height;
uint16 cx, cy, bpp, Bpp, flags, bufsize, size;
uint8 *data, *bmpdata;
logger(Protocol, Debug, "%s()", __func__);
struct stream packet = *s;
in_uint16_... | 298,197,954,642,949,130,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2018-8799 | rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function process_secondary_order() that results in a Denial of Service (segfault). | https://nvd.nist.gov/vuln/detail/CVE-2018-8799 |
4,155 | rdesktop | 4dca546d04321a610c1835010b5dad85163b65e1 | https://github.com/rdesktop/rdesktop | https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1 | Malicious RDP server security fixes
This commit includes fixes for a set of 21 vulnerabilities in
rdesktop when a malicious RDP server is used.
All vulnerabilities was identified and reported by Eyal Itkin.
* Add rdp_protocol_error function that is used in several fixes
* Refactor of process_bitmap_updates
* Fix ... | 1 | process_demand_active(STREAM s)
{
uint8 type;
uint16 len_src_descriptor, len_combined_caps;
/* at this point we need to ensure that we have ui created */
rd_create_ui();
in_uint32_le(s, g_rdp_shareid);
in_uint16_le(s, len_src_descriptor);
in_uint16_le(s, len_combined_caps);
in_uint8s(s, len_src_des... | 50,427,493,118,138,860,000,000,000,000,000,000,000 | rdp.c | 177,705,998,885,746,530,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-8799 | rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function process_secondary_order() that results in a Denial of Service (segfault). | https://nvd.nist.gov/vuln/detail/CVE-2018-8799 |
161,393 | rdesktop | 4dca546d04321a610c1835010b5dad85163b65e1 | https://github.com/rdesktop/rdesktop | https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1 | Malicious RDP server security fixes
This commit includes fixes for a set of 21 vulnerabilities in
rdesktop when a malicious RDP server is used.
All vulnerabilities was identified and reported by Eyal Itkin.
* Add rdp_protocol_error function that is used in several fixes
* Refactor of process_bitmap_updates
* Fix ... | 0 | process_demand_active(STREAM s)
{
uint8 type;
uint16 len_src_descriptor, len_combined_caps;
struct stream packet = *s;
/* at this point we need to ensure that we have ui created */
rd_create_ui();
in_uint32_le(s, g_rdp_shareid);
in_uint16_le(s, len_src_descriptor);
in_uint16_le(s, len_combined_caps)... | 184,781,662,968,541,300,000,000,000,000,000,000,000 | rdp.c | 103,974,296,073,739,700,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-8799 | rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function process_secondary_order() that results in a Denial of Service (segfault). | https://nvd.nist.gov/vuln/detail/CVE-2018-8799 |
4,156 | rdesktop | 4dca546d04321a610c1835010b5dad85163b65e1 | https://github.com/rdesktop/rdesktop | https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1 | Malicious RDP server security fixes
This commit includes fixes for a set of 21 vulnerabilities in
rdesktop when a malicious RDP server is used.
All vulnerabilities was identified and reported by Eyal Itkin.
* Add rdp_protocol_error function that is used in several fixes
* Refactor of process_bitmap_updates
* Fix ... | 1 | rdp_in_unistr(STREAM s, int in_len, char **string, uint32 * str_size)
{
static iconv_t icv_utf16_to_local;
size_t ibl, obl;
char *pin, *pout;
if (!icv_utf16_to_local)
{
icv_utf16_to_local = iconv_open(g_codepage, WINDOWS_CODEPAGE);
if (icv_utf16_to_local == (iconv_t) - 1)
{
logger(Protocol, Error, "... | 87,473,831,233,998,540,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2018-8799 | rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function process_secondary_order() that results in a Denial of Service (segfault). | https://nvd.nist.gov/vuln/detail/CVE-2018-8799 |
161,394 | rdesktop | 4dca546d04321a610c1835010b5dad85163b65e1 | https://github.com/rdesktop/rdesktop | https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1 | Malicious RDP server security fixes
This commit includes fixes for a set of 21 vulnerabilities in
rdesktop when a malicious RDP server is used.
All vulnerabilities was identified and reported by Eyal Itkin.
* Add rdp_protocol_error function that is used in several fixes
* Refactor of process_bitmap_updates
* Fix ... | 0 | rdp_in_unistr(STREAM s, int in_len, char **string, uint32 * str_size)
{
static iconv_t icv_utf16_to_local;
size_t ibl, obl;
char *pin, *pout;
struct stream packet = *s;
if ((in_len < 0) || ((uint32)in_len >= (RD_UINT32_MAX / 2)))
{
logger(Protocol, Error, "rdp_in_unistr(), length of unicode data is out of ... | 152,983,717,312,745,780,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2018-8799 | rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function process_secondary_order() that results in a Denial of Service (segfault). | https://nvd.nist.gov/vuln/detail/CVE-2018-8799 |
4,157 | rdesktop | 4dca546d04321a610c1835010b5dad85163b65e1 | https://github.com/rdesktop/rdesktop | https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1 | Malicious RDP server security fixes
This commit includes fixes for a set of 21 vulnerabilities in
rdesktop when a malicious RDP server is used.
All vulnerabilities was identified and reported by Eyal Itkin.
* Add rdp_protocol_error function that is used in several fixes
* Refactor of process_bitmap_updates
* Fix ... | 1 | rdpdr_process(STREAM s)
{
uint32 handle;
uint16 vmin;
uint16 component;
uint16 pakid;
logger(Protocol, Debug, "rdpdr_process()");
/* hexdump(s->p, s->end - s->p); */
in_uint16(s, component);
in_uint16(s, pakid);
if (component == RDPDR_CTYP_CORE)
{
switch (pakid)
{
case PAKID_CORE_DEVICE_IOREQU... | 130,790,675,046,993,960,000,000,000,000,000,000,000 | rdpdr.c | 63,172,116,204,848,340,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-8799 | rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function process_secondary_order() that results in a Denial of Service (segfault). | https://nvd.nist.gov/vuln/detail/CVE-2018-8799 |
161,395 | rdesktop | 4dca546d04321a610c1835010b5dad85163b65e1 | https://github.com/rdesktop/rdesktop | https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1 | Malicious RDP server security fixes
This commit includes fixes for a set of 21 vulnerabilities in
rdesktop when a malicious RDP server is used.
All vulnerabilities was identified and reported by Eyal Itkin.
* Add rdp_protocol_error function that is used in several fixes
* Refactor of process_bitmap_updates
* Fix ... | 0 | rdpdr_process(STREAM s)
{
uint32 handle;
uint16 vmin;
uint16 component;
uint16 pakid;
struct stream packet = *s;
logger(Protocol, Debug, "rdpdr_process()");
/* hexdump(s->p, s->end - s->p); */
in_uint16(s, component);
in_uint16(s, pakid);
if (component == RDPDR_CTYP_CORE)
{
switch (pakid)
{
c... | 139,505,307,156,969,320,000,000,000,000,000,000,000 | rdpdr.c | 122,373,306,423,667,240,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-8799 | rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function process_secondary_order() that results in a Denial of Service (segfault). | https://nvd.nist.gov/vuln/detail/CVE-2018-8799 |
4,159 | rdesktop | 4dca546d04321a610c1835010b5dad85163b65e1 | https://github.com/rdesktop/rdesktop | https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1 | Malicious RDP server security fixes
This commit includes fixes for a set of 21 vulnerabilities in
rdesktop when a malicious RDP server is used.
All vulnerabilities was identified and reported by Eyal Itkin.
* Add rdp_protocol_error function that is used in several fixes
* Refactor of process_bitmap_updates
* Fix ... | 1 | seamless_process(STREAM s)
{
unsigned int pkglen;
char *buf;
pkglen = s->end - s->p;
/* str_handle_lines requires null terminated strings */
buf = xmalloc(pkglen + 1);
STRNCPY(buf, (char *) s->p, pkglen + 1);
str_handle_lines(buf, &seamless_rest, seamless_line_handler, NULL);
xfree(buf);
}
| 58,925,099,420,725,390,000,000,000,000,000,000,000 | seamless.c | 132,321,470,131,883,330,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-8799 | rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function process_secondary_order() that results in a Denial of Service (segfault). | https://nvd.nist.gov/vuln/detail/CVE-2018-8799 |
161,397 | rdesktop | 4dca546d04321a610c1835010b5dad85163b65e1 | https://github.com/rdesktop/rdesktop | https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1 | Malicious RDP server security fixes
This commit includes fixes for a set of 21 vulnerabilities in
rdesktop when a malicious RDP server is used.
All vulnerabilities was identified and reported by Eyal Itkin.
* Add rdp_protocol_error function that is used in several fixes
* Refactor of process_bitmap_updates
* Fix ... | 0 | seamless_process(STREAM s)
{
unsigned int pkglen;
char *buf;
struct stream packet = *s;
if (!s_check(s))
{
rdp_protocol_error("seamless_process(), stream is in unstable state", &packet);
}
pkglen = s->end - s->p;
/* str_handle_lines requires null terminated strings */
buf = xmalloc(pkglen + 1);
STRN... | 238,895,251,763,442,230,000,000,000,000,000,000,000 | seamless.c | 95,747,929,786,246,930,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-8799 | rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function process_secondary_order() that results in a Denial of Service (segfault). | https://nvd.nist.gov/vuln/detail/CVE-2018-8799 |
9,631 | rdesktop | 4dca546d04321a610c1835010b5dad85163b65e1 | https://github.com/rdesktop/rdesktop | https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1 | Malicious RDP server security fixes
This commit includes fixes for a set of 21 vulnerabilities in
rdesktop when a malicious RDP server is used.
All vulnerabilities was identified and reported by Eyal Itkin.
* Add rdp_protocol_error function that is used in several fixes
* Refactor of process_bitmap_updates
* Fix ... | 1 | lspci_process(STREAM s)
{
unsigned int pkglen;
static char *rest = NULL;
char *buf;
pkglen = s->end - s->p;
/* str_handle_lines requires null terminated strings */
buf = xmalloc(pkglen + 1);
STRNCPY(buf, (char *) s->p, pkglen + 1);
str_handle_lines(buf, &rest, lspci_process_line, NULL);
xfree(buf);
}
| 209,920,996,478,819,600,000,000,000,000,000,000,000 | lspci.c | 74,336,506,313,865,020,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-8799 | rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function process_secondary_order() that results in a Denial of Service (segfault). | https://nvd.nist.gov/vuln/detail/CVE-2018-8799 |
184,700 | rdesktop | 4dca546d04321a610c1835010b5dad85163b65e1 | https://github.com/rdesktop/rdesktop | https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1 | Malicious RDP server security fixes
This commit includes fixes for a set of 21 vulnerabilities in
rdesktop when a malicious RDP server is used.
All vulnerabilities was identified and reported by Eyal Itkin.
* Add rdp_protocol_error function that is used in several fixes
* Refactor of process_bitmap_updates
* Fix ... | 0 | lspci_process(STREAM s)
{
unsigned int pkglen;
static char *rest = NULL;
char *buf;
struct stream packet = *s;
if (!s_check(s))
{
rdp_protocol_error("lspci_process(), stream is in unstable state", &packet);
}
pkglen = s->end - s->p;
/* str_handle_lines requires null terminated strings */
buf = xmall... | 3,778,535,898,656,608,600,000,000,000,000,000,000 | lspci.c | 65,418,183,944,373,280,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-8799 | rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function process_secondary_order() that results in a Denial of Service (segfault). | https://nvd.nist.gov/vuln/detail/CVE-2018-8799 |
9,632 | rdesktop | 4dca546d04321a610c1835010b5dad85163b65e1 | https://github.com/rdesktop/rdesktop | https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1 | Malicious RDP server security fixes
This commit includes fixes for a set of 21 vulnerabilities in
rdesktop when a malicious RDP server is used.
All vulnerabilities was identified and reported by Eyal Itkin.
* Add rdp_protocol_error function that is used in several fixes
* Refactor of process_bitmap_updates
* Fix ... | 1 | process_secondary_order(STREAM s)
{
/* The length isn't calculated correctly by the server.
* For very compact orders the length becomes negative
* so a signed integer must be used. */
uint16 length;
uint16 flags;
uint8 type;
uint8 *next_order;
in_uint16_le(s, length);
in_uint16_le(s, flags); /* used ... | 155,193,719,227,379,600,000,000,000,000,000,000,000 | orders.c | 24,108,224,018,686,034,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-8799 | rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function process_secondary_order() that results in a Denial of Service (segfault). | https://nvd.nist.gov/vuln/detail/CVE-2018-8799 |
184,701 | rdesktop | 4dca546d04321a610c1835010b5dad85163b65e1 | https://github.com/rdesktop/rdesktop | https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1 | Malicious RDP server security fixes
This commit includes fixes for a set of 21 vulnerabilities in
rdesktop when a malicious RDP server is used.
All vulnerabilities was identified and reported by Eyal Itkin.
* Add rdp_protocol_error function that is used in several fixes
* Refactor of process_bitmap_updates
* Fix ... | 0 | process_secondary_order(STREAM s)
{
/* The length isn't calculated correctly by the server.
* For very compact orders the length becomes negative
* so a signed integer must be used. */
uint16 length;
uint16 flags;
uint8 type;
uint8 *next_order;
struct stream packet = *s;
in_uint16_le(s, length);
in_u... | 22,344,585,920,528,400,000,000,000,000,000,000,000 | orders.c | 264,776,853,468,261,180,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-8799 | rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function process_secondary_order() that results in a Denial of Service (segfault). | https://nvd.nist.gov/vuln/detail/CVE-2018-8799 |
9,633 | rdesktop | 4dca546d04321a610c1835010b5dad85163b65e1 | https://github.com/rdesktop/rdesktop | https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1 | Malicious RDP server security fixes
This commit includes fixes for a set of 21 vulnerabilities in
rdesktop when a malicious RDP server is used.
All vulnerabilities was identified and reported by Eyal Itkin.
* Add rdp_protocol_error function that is used in several fixes
* Refactor of process_bitmap_updates
* Fix ... | 1 | rdpsnddbg_process(STREAM s)
{
unsigned int pkglen;
static char *rest = NULL;
char *buf;
pkglen = s->end - s->p;
/* str_handle_lines requires null terminated strings */
buf = (char *) xmalloc(pkglen + 1);
STRNCPY(buf, (char *) s->p, pkglen + 1);
str_handle_lines(buf, &rest, rdpsnddbg_line_handler, NULL);... | 88,148,949,623,728,080,000,000,000,000,000,000,000 | rdpsnd.c | 318,702,186,162,208,240,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-8799 | rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function process_secondary_order() that results in a Denial of Service (segfault). | https://nvd.nist.gov/vuln/detail/CVE-2018-8799 |
184,702 | rdesktop | 4dca546d04321a610c1835010b5dad85163b65e1 | https://github.com/rdesktop/rdesktop | https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1 | Malicious RDP server security fixes
This commit includes fixes for a set of 21 vulnerabilities in
rdesktop when a malicious RDP server is used.
All vulnerabilities was identified and reported by Eyal Itkin.
* Add rdp_protocol_error function that is used in several fixes
* Refactor of process_bitmap_updates
* Fix ... | 0 | rdpsnddbg_process(STREAM s)
{
unsigned int pkglen;
static char *rest = NULL;
char *buf;
if (!s_check(s))
{
rdp_protocol_error("rdpsnddbg_process(), stream is in unstable state", s);
}
pkglen = s->end - s->p;
/* str_handle_lines requires null terminated strings */
buf = (char *) xmalloc(pkglen + 1);
... | 238,085,256,603,923,300,000,000,000,000,000,000,000 | rdpsnd.c | 120,073,401,828,647,780,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-8799 | rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function process_secondary_order() that results in a Denial of Service (segfault). | https://nvd.nist.gov/vuln/detail/CVE-2018-8799 |
4,163 | tcpdump | 24182d959f661327525a20d9a94c98a8ec016778 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/24182d959f661327525a20d9a94c98a8ec016778 | (for 4.9.3) CVE-2018-16452/SMB: prevent stack exhaustion
Enforce a limit on how many times smb_fdata() can recurse.
This fixes a stack exhaustion discovered by Include Security working
under the Mozilla SOS program in 2018 by means of code audit. | 1 | smb_fdata(netdissect_options *ndo,
const u_char *buf, const char *fmt, const u_char *maxbuf,
int unicodestr)
{
static int depth = 0;
char s[128];
char *p;
while (*fmt) {
switch (*fmt) {
case '*':
fmt++;
while (buf < maxbuf) {
const u_char *buf2;
depth++;
buf2 = ... | 244,595,164,974,697,600,000,000,000,000,000,000,000 | smbutil.c | 40,949,174,088,914,413,000,000,000,000,000,000,000 | [
"CWE-674"
] | CVE-2018-16452 | The SMB parser in tcpdump before 4.9.3 has stack exhaustion in smbutil.c:smb_fdata() via recursion. | https://nvd.nist.gov/vuln/detail/CVE-2018-16452 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.