idx
int64
project
string
commit_id
string
project_url
string
commit_url
string
commit_message
string
target
int64
func
string
func_hash
float64
file_name
string
file_hash
float64
cwe
list
cve
string
cve_desc
string
nvd_url
string
161,300
linux
401e7e88d4ef80188ffa07095ac00456f901b8c4
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/401e7e88d4ef80188ffa07095ac00456f901b8c4
ipmi_si: fix use-after-free of resource->name When we excute the following commands, we got oops rmmod ipmi_si cat /proc/ioports [ 1623.482380] Unable to handle kernel paging request at virtual address ffff00000901d478 [ 1623.482382] Mem abort info: [ 1623.482383] ESR = 0x96000007 [ 1623.482385] Exception class =...
0
int ipmi_si_port_setup(struct si_sm_io *io) { unsigned int addr = io->addr_data; int idx; if (!addr) return -ENODEV; /* * Figure out the actual inb/inw/inl/etc routine to use based * upon the register size. */ switch (io->regsize) { case 1: io->inputb = port_inb; io->outputb = port_ou...
47,635,359,373,708,250,000,000,000,000,000,000,000
ipmi_si_port_io.c
90,575,793,431,554,030,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2019-11811
An issue was discovered in the Linux kernel before 5.0.4. There is a use-after-free upon attempted read access to /proc/ioports after the ipmi_si module is removed, related to drivers/char/ipmi/ipmi_si_intf.c, drivers/char/ipmi/ipmi_si_mem_io.c, and drivers/char/ipmi/ipmi_si_port_io.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-11811
4,056
linux
bcf3b67d16a4c8ffae0aa79de5853435e683945c
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/bcf3b67d16a4c8ffae0aa79de5853435e683945c
scsi: megaraid_sas: return error when create DMA pool failed when create DMA pool for cmd frames failed, we should return -ENOMEM, instead of 0. In some case in: megasas_init_adapter_fusion() -->megasas_alloc_cmds() -->megasas_create_frame_pool create DMA pool failed, --> megasas_fre...
1
int megasas_alloc_cmds(struct megasas_instance *instance) { int i; int j; u16 max_cmd; struct megasas_cmd *cmd; max_cmd = instance->max_mfi_cmds; /* * instance->cmd_list is an array of struct megasas_cmd pointers. * Allocate the dynamic array first and then allocate individual * commands. */ instance->...
34,156,285,142,247,750,000,000,000,000,000,000,000
megaraid_sas_base.c
129,635,302,641,523,000,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2019-11810
An issue was discovered in the Linux kernel before 5.0.7. A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of Service, related to a use-after-free.
https://nvd.nist.gov/vuln/detail/CVE-2019-11810
161,301
linux
bcf3b67d16a4c8ffae0aa79de5853435e683945c
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/bcf3b67d16a4c8ffae0aa79de5853435e683945c
scsi: megaraid_sas: return error when create DMA pool failed when create DMA pool for cmd frames failed, we should return -ENOMEM, instead of 0. In some case in: megasas_init_adapter_fusion() -->megasas_alloc_cmds() -->megasas_create_frame_pool create DMA pool failed, --> megasas_fre...
0
int megasas_alloc_cmds(struct megasas_instance *instance) { int i; int j; u16 max_cmd; struct megasas_cmd *cmd; max_cmd = instance->max_mfi_cmds; /* * instance->cmd_list is an array of struct megasas_cmd pointers. * Allocate the dynamic array first and then allocate individual * commands. */ instance->...
302,094,480,738,111,520,000,000,000,000,000,000,000
megaraid_sas_base.c
33,332,757,103,148,640,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2019-11810
An issue was discovered in the Linux kernel before 5.0.7. A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of Service, related to a use-after-free.
https://nvd.nist.gov/vuln/detail/CVE-2019-11810
4,057
linux
04f5866e41fb70690e28397487d8bd8eea7d712a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/04f5866e41fb70690e28397487d8bd8eea7d712a
coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping The core dumping code has always run without holding the mmap_sem for writing, despite that is the only way to ensure that the entire vma layout will not change from under it. Only using some signal serialization on the processes bel...
1
void uverbs_user_mmap_disassociate(struct ib_uverbs_file *ufile) { struct rdma_umap_priv *priv, *next_priv; lockdep_assert_held(&ufile->hw_destroy_rwsem); while (1) { struct mm_struct *mm = NULL; /* Get an arbitrary mm pointer that hasn't been cleaned yet */ mutex_lock(&ufile->umap_lock); while (!list_emp...
211,043,662,189,963,800,000,000,000,000,000,000,000
uverbs_main.c
9,360,109,907,240,654,000,000,000,000,000,000,000
[ "CWE-362" ]
CVE-2019-11599
The coredump implementation in the Linux kernel before 5.0.10 does not use locking or other mechanisms to prevent vma layout or vma flags changes while it runs, which allows local users to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a race condition w...
https://nvd.nist.gov/vuln/detail/CVE-2019-11599
161,302
linux
04f5866e41fb70690e28397487d8bd8eea7d712a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/04f5866e41fb70690e28397487d8bd8eea7d712a
coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping The core dumping code has always run without holding the mmap_sem for writing, despite that is the only way to ensure that the entire vma layout will not change from under it. Only using some signal serialization on the processes bel...
0
void uverbs_user_mmap_disassociate(struct ib_uverbs_file *ufile) { struct rdma_umap_priv *priv, *next_priv; lockdep_assert_held(&ufile->hw_destroy_rwsem); while (1) { struct mm_struct *mm = NULL; /* Get an arbitrary mm pointer that hasn't been cleaned yet */ mutex_lock(&ufile->umap_lock); while (!list_emp...
142,893,032,311,907,040,000,000,000,000,000,000,000
uverbs_main.c
62,440,431,152,267,710,000,000,000,000,000,000,000
[ "CWE-362" ]
CVE-2019-11599
The coredump implementation in the Linux kernel before 5.0.10 does not use locking or other mechanisms to prevent vma layout or vma flags changes while it runs, which allows local users to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a race condition w...
https://nvd.nist.gov/vuln/detail/CVE-2019-11599
4,058
linux
04f5866e41fb70690e28397487d8bd8eea7d712a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/04f5866e41fb70690e28397487d8bd8eea7d712a
coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping The core dumping code has always run without holding the mmap_sem for writing, despite that is the only way to ensure that the entire vma layout will not change from under it. Only using some signal serialization on the processes bel...
1
static ssize_t clear_refs_write(struct file *file, const char __user *buf, size_t count, loff_t *ppos) { struct task_struct *task; char buffer[PROC_NUMBUF]; struct mm_struct *mm; struct vm_area_struct *vma; enum clear_refs_types type; struct mmu_gather tlb; int itype; int rv; memset(buffer, 0, sizeof(buff...
91,277,826,670,393,980,000,000,000,000,000,000,000
task_mmu.c
286,334,833,757,047,100,000,000,000,000,000,000,000
[ "CWE-362" ]
CVE-2019-11599
The coredump implementation in the Linux kernel before 5.0.10 does not use locking or other mechanisms to prevent vma layout or vma flags changes while it runs, which allows local users to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a race condition w...
https://nvd.nist.gov/vuln/detail/CVE-2019-11599
161,303
linux
04f5866e41fb70690e28397487d8bd8eea7d712a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/04f5866e41fb70690e28397487d8bd8eea7d712a
coredump: fix race condition between mmget_not_zero()/get_task_mm() and core dumping The core dumping code has always run without holding the mmap_sem for writing, despite that is the only way to ensure that the entire vma layout will not change from under it. Only using some signal serialization on the processes bel...
0
static ssize_t clear_refs_write(struct file *file, const char __user *buf, size_t count, loff_t *ppos) { struct task_struct *task; char buffer[PROC_NUMBUF]; struct mm_struct *mm; struct vm_area_struct *vma; enum clear_refs_types type; struct mmu_gather tlb; int itype; int rv; memset(buffer, 0, sizeof(buff...
63,449,917,871,960,830,000,000,000,000,000,000,000
task_mmu.c
39,097,074,513,772,906,000,000,000,000,000,000,000
[ "CWE-362" ]
CVE-2019-11599
The coredump implementation in the Linux kernel before 5.0.10 does not use locking or other mechanisms to prevent vma layout or vma flags changes while it runs, which allows local users to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a race condition w...
https://nvd.nist.gov/vuln/detail/CVE-2019-11599
4,062
WavPack
bc6cba3f552c44565f7f1e66dc1580189addb2b4
https://github.com/dbry/WavPack
https://github.com/dbry/WavPack/commit/bc6cba3f552c44565f7f1e66dc1580189addb2b4
issue #67: make sure sample rate is specified and non-zero in DFF files
1
int ParseDsdiffHeaderConfig (FILE *infile, char *infilename, char *fourcc, WavpackContext *wpc, WavpackConfig *config) { int64_t infilesize, total_samples; DFFFileHeader dff_file_header; DFFChunkHeader dff_chunk_header; uint32_t bcount; infilesize = DoGetFileSize (infile); memcpy (&dff_file_hea...
165,237,717,197,980,300,000,000,000,000,000,000,000
None
null
[ "CWE-824" ]
CVE-2019-11498
WavpackSetConfiguration64 in pack_utils.c in libwavpack.a in WavPack through 5.1.0 has a "Conditional jump or move depends on uninitialised value" condition, which might allow attackers to cause a denial of service (application crash) via a DFF file that lacks valid sample-rate data.
https://nvd.nist.gov/vuln/detail/CVE-2019-11498
161,307
WavPack
bc6cba3f552c44565f7f1e66dc1580189addb2b4
https://github.com/dbry/WavPack
https://github.com/dbry/WavPack/commit/bc6cba3f552c44565f7f1e66dc1580189addb2b4
issue #67: make sure sample rate is specified and non-zero in DFF files
0
int ParseDsdiffHeaderConfig (FILE *infile, char *infilename, char *fourcc, WavpackContext *wpc, WavpackConfig *config) { int64_t infilesize, total_samples; DFFFileHeader dff_file_header; DFFChunkHeader dff_chunk_header; uint32_t bcount; infilesize = DoGetFileSize (infile); memcpy (&dff_file_hea...
261,099,684,645,135,380,000,000,000,000,000,000,000
None
null
[ "CWE-824" ]
CVE-2019-11498
WavpackSetConfiguration64 in pack_utils.c in libwavpack.a in WavPack through 5.1.0 has a "Conditional jump or move depends on uninitialised value" condition, which might allow attackers to cause a denial of service (application crash) via a DFF file that lacks valid sample-rate data.
https://nvd.nist.gov/vuln/detail/CVE-2019-11498
4,063
ImageMagick6
f663dfb8431c97d95682a2b533cca1c8233d21b4
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/f663dfb8431c97d95682a2b533cca1c8233d21b4
https://github.com/ImageMagick/ImageMagick/issues/1546
1
static Image *ReadXWDImage(const ImageInfo *image_info,ExceptionInfo *exception) { #define CheckOverflowException(length,width,height) \ (((height) != 0) && ((length)/((size_t) height) != ((size_t) width))) char *comment; Image *image; IndexPacket index; int x_status; MagickBooleanType ...
335,197,007,716,929,300,000,000,000,000,000,000,000
xwd.c
75,153,857,084,258,080,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2019-11472
ReadXWDImage in coders/xwd.c in the XWD image parsing component of ImageMagick 7.0.8-41 Q16 allows attackers to cause a denial-of-service (divide-by-zero error) by crafting an XWD image file in which the header indicates neither LSB first nor MSB first.
https://nvd.nist.gov/vuln/detail/CVE-2019-11472
161,308
ImageMagick6
f663dfb8431c97d95682a2b533cca1c8233d21b4
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/f663dfb8431c97d95682a2b533cca1c8233d21b4
https://github.com/ImageMagick/ImageMagick/issues/1546
0
static Image *ReadXWDImage(const ImageInfo *image_info,ExceptionInfo *exception) { #define CheckOverflowException(length,width,height) \ (((height) != 0) && ((length)/((size_t) height) != ((size_t) width))) char *comment; Image *image; IndexPacket index; int x_status; MagickBooleanType ...
125,464,895,678,979,220,000,000,000,000,000,000,000
xwd.c
167,173,576,325,010,360,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2019-11472
ReadXWDImage in coders/xwd.c in the XWD image parsing component of ImageMagick 7.0.8-41 Q16 allows attackers to cause a denial-of-service (divide-by-zero error) by crafting an XWD image file in which the header indicates neither LSB first nor MSB first.
https://nvd.nist.gov/vuln/detail/CVE-2019-11472
4,064
ImageMagick
e3cdce6fe12193f235b8c0ae5efe6880a25eb957
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/e3cdce6fe12193f235b8c0ae5efe6880a25eb957
https://github.com/ImageMagick/ImageMagick/issues/1472
1
static Image *ReadCINImage(const ImageInfo *image_info,ExceptionInfo *exception) { #define MonoColorType 1 #define RGBColorType 3 char property[MagickPathExtent]; CINInfo cin; const unsigned char *pixels; Image *image; MagickBooleanType status; MagickOffsetType offset; Qua...
59,197,480,976,158,010,000,000,000,000,000,000,000
cin.c
292,378,594,999,413,330,000,000,000,000,000,000,000
[ "CWE-400" ]
CVE-2019-11470
The cineon parsing component in ImageMagick 7.0.8-26 Q16 allows attackers to cause a denial-of-service (uncontrolled resource consumption) by crafting a Cineon image with an incorrect claimed image size. This occurs because ReadCINImage in coders/cin.c lacks a check for insufficient image data in a file.
https://nvd.nist.gov/vuln/detail/CVE-2019-11470
161,309
ImageMagick
e3cdce6fe12193f235b8c0ae5efe6880a25eb957
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/e3cdce6fe12193f235b8c0ae5efe6880a25eb957
https://github.com/ImageMagick/ImageMagick/issues/1472
0
static Image *ReadCINImage(const ImageInfo *image_info,ExceptionInfo *exception) { #define MonoColorType 1 #define RGBColorType 3 char property[MagickPathExtent]; CINInfo cin; const unsigned char *pixels; Image *image; MagickBooleanType status; MagickOffsetType offset; Qua...
2,380,909,072,613,058,000,000,000,000,000,000,000
cin.c
177,483,449,253,717,050,000,000,000,000,000,000,000
[ "CWE-400" ]
CVE-2019-11470
The cineon parsing component in ImageMagick 7.0.8-26 Q16 allows attackers to cause a denial-of-service (uncontrolled resource consumption) by crafting a Cineon image with an incorrect claimed image size. This occurs because ReadCINImage in coders/cin.c lacks a check for insufficient image data in a file.
https://nvd.nist.gov/vuln/detail/CVE-2019-11470
4,065
libarchive
ba641f73f3d758d9032b3f0e5597a9c6e593a505
https://github.com/libarchive/libarchive
https://github.com/libarchive/libarchive/commit/ba641f73f3d758d9032b3f0e5597a9c6e593a505
Fix typo in preprocessor macro in archive_read_format_zip_cleanup() Frees lzma_stream on cleanup() Fixes #1165
1
archive_read_format_zip_cleanup(struct archive_read *a) { struct zip *zip; struct zip_entry *zip_entry, *next_zip_entry; zip = (struct zip *)(a->format->data); #ifdef HAVE_ZLIB_H if (zip->stream_valid) inflateEnd(&zip->stream); #endif #if HAVA_LZMA_H && HAVE_LIBLZMA if (zip->zipx_lzma_valid) { lzma_...
281,804,672,906,394,530,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2019-11463
A memory leak in archive_read_format_zip_cleanup in archive_read_support_format_zip.c in libarchive 3.3.4-dev allows remote attackers to cause a denial of service via a crafted ZIP file because of a HAVE_LZMA_H typo. NOTE: this only affects users who downloaded the development code from GitHub. Users of the product's o...
https://nvd.nist.gov/vuln/detail/CVE-2019-11463
161,310
libarchive
ba641f73f3d758d9032b3f0e5597a9c6e593a505
https://github.com/libarchive/libarchive
https://github.com/libarchive/libarchive/commit/ba641f73f3d758d9032b3f0e5597a9c6e593a505
Fix typo in preprocessor macro in archive_read_format_zip_cleanup() Frees lzma_stream on cleanup() Fixes #1165
0
archive_read_format_zip_cleanup(struct archive_read *a) { struct zip *zip; struct zip_entry *zip_entry, *next_zip_entry; zip = (struct zip *)(a->format->data); #ifdef HAVE_ZLIB_H if (zip->stream_valid) inflateEnd(&zip->stream); #endif #if HAVE_LZMA_H && HAVE_LIBLZMA if (zip->zipx_lzma_valid) { lzma_...
244,349,834,012,302,360,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2019-11463
A memory leak in archive_read_format_zip_cleanup in archive_read_support_format_zip.c in libarchive 3.3.4-dev allows remote attackers to cause a denial of service via a crafted ZIP file because of a HAVE_LZMA_H typo. NOTE: this only affects users who downloaded the development code from GitHub. Users of the product's o...
https://nvd.nist.gov/vuln/detail/CVE-2019-11463
4,072
mujs
1e5479084bc9852854feb1ba9bf68b52cd127e02
https://github.com/ccxvii/mujs
https://github.com/ccxvii/mujs/commit/1e5479084bc9852854feb1ba9bf68b52cd127e02
Bug 700947: Add missing ENDTRY opcode in try/catch/finally byte code. In one of the code branches in handling exceptions in the catch block we forgot to call the ENDTRY opcode to pop the inner hidden try. This leads to an unbalanced exception stack which can cause a crash due to us jumping to a stack frame that has al...
1
static void ctrycatchfinally(JF, js_Ast *trystm, js_Ast *catchvar, js_Ast *catchstm, js_Ast *finallystm) { int L1, L2, L3; L1 = emitjump(J, F, OP_TRY); { /* if we get here, we have caught an exception in the try block */ L2 = emitjump(J, F, OP_TRY); { /* if we get here, we have caught an exception in the ca...
129,287,468,632,431,320,000,000,000,000,000,000,000
jscompile.c
140,135,126,533,618,000,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2019-11412
An issue was discovered in Artifex MuJS 1.0.5. jscompile.c can cause a denial of service (invalid stack-frame jump) because it lacks an ENDTRY opcode call.
https://nvd.nist.gov/vuln/detail/CVE-2019-11412
161,317
mujs
1e5479084bc9852854feb1ba9bf68b52cd127e02
https://github.com/ccxvii/mujs
https://github.com/ccxvii/mujs/commit/1e5479084bc9852854feb1ba9bf68b52cd127e02
Bug 700947: Add missing ENDTRY opcode in try/catch/finally byte code. In one of the code branches in handling exceptions in the catch block we forgot to call the ENDTRY opcode to pop the inner hidden try. This leads to an unbalanced exception stack which can cause a crash due to us jumping to a stack frame that has al...
0
static void ctrycatchfinally(JF, js_Ast *trystm, js_Ast *catchvar, js_Ast *catchstm, js_Ast *finallystm) { int L1, L2, L3; L1 = emitjump(J, F, OP_TRY); { /* if we get here, we have caught an exception in the try block */ L2 = emitjump(J, F, OP_TRY); { /* if we get here, we have caught an exception in the ca...
272,654,378,475,804,150,000,000,000,000,000,000,000
jscompile.c
315,480,018,467,248,340,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2019-11412
An issue was discovered in Artifex MuJS 1.0.5. jscompile.c can cause a denial of service (invalid stack-frame jump) because it lacks an ENDTRY opcode call.
https://nvd.nist.gov/vuln/detail/CVE-2019-11412
4,074
mujs
da632ca08f240590d2dec786722ed08486ce1be6
https://github.com/ccxvii/mujs
https://github.com/ccxvii/mujs/commit/da632ca08f240590d2dec786722ed08486ce1be6
Bug 700938: Fix stack overflow in numtostr as used by Number#toFixed(). 32 is not enough to fit sprintf("%.20f", 1e20). We need at least 43 bytes to fit that format. Bump the static buffer size.
1
static void numtostr(js_State *J, const char *fmt, int w, double n) { char buf[32], *e; sprintf(buf, fmt, w, n); e = strchr(buf, 'e'); if (e) { int exp = atoi(e+1); sprintf(e, "e%+d", exp); } js_pushstring(J, buf); }
19,501,154,810,031,546,000,000,000,000,000,000,000
jsnumber.c
94,596,169,872,171,320,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2019-11411
An issue was discovered in Artifex MuJS 1.0.5. The Number#toFixed() and numtostr implementations in jsnumber.c have a stack-based buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2019-11411
161,319
mujs
da632ca08f240590d2dec786722ed08486ce1be6
https://github.com/ccxvii/mujs
https://github.com/ccxvii/mujs/commit/da632ca08f240590d2dec786722ed08486ce1be6
Bug 700938: Fix stack overflow in numtostr as used by Number#toFixed(). 32 is not enough to fit sprintf("%.20f", 1e20). We need at least 43 bytes to fit that format. Bump the static buffer size.
0
static void numtostr(js_State *J, const char *fmt, int w, double n) { /* buf needs to fit printf("%.20f", 1e20) */ char buf[50], *e; sprintf(buf, fmt, w, n); e = strchr(buf, 'e'); if (e) { int exp = atoi(e+1); sprintf(e, "e%+d", exp); } js_pushstring(J, buf); }
61,985,091,923,934,830,000,000,000,000,000,000,000
jsnumber.c
255,682,452,337,331,670,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2019-11411
An issue was discovered in Artifex MuJS 1.0.5. The Number#toFixed() and numtostr implementations in jsnumber.c have a stack-based buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2019-11411
4,075
FFmpeg
d227ed5d598340e719eff7156b1aa0a4469e9a6a
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/d227ed5d598340e719eff7156b1aa0a4469e9a6a
avcodec/mpeg4videodec: Check idx in mpeg4_decode_studio_block() Fixes: Out of array access Fixes: 13500/clusterfuzz-testcase-minimized-ffmpeg_AV_CODEC_ID_MPEG4_fuzzer-5769760178962432 Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/projects/ffmpeg Reviewed-by: Kieran Kunhya <kieran...
1
static int mpeg4_decode_studio_block(MpegEncContext *s, int32_t block[64], int n) { Mpeg4DecContext *ctx = s->avctx->priv_data; int cc, dct_dc_size, dct_diff, code, j, idx = 1, group = 0, run = 0, additional_code_len, sign, mismatch; VLC *cur_vlc = &ctx->studio_intra_tab[0]; uint8_t *const scan...
148,338,294,310,981,680,000,000,000,000,000,000,000
mpeg4videodec.c
190,961,130,653,831,770,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-11339
The studio profile decoder in libavcodec/mpeg4videodec.c in FFmpeg 4.0 before 4.0.4 and 4.1 before 4.1.2 allows remote attackers to cause a denial of service (out-of-array access) or possibly have unspecified other impact via crafted MPEG-4 video data.
https://nvd.nist.gov/vuln/detail/CVE-2019-11339
161,320
FFmpeg
d227ed5d598340e719eff7156b1aa0a4469e9a6a
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/d227ed5d598340e719eff7156b1aa0a4469e9a6a
avcodec/mpeg4videodec: Check idx in mpeg4_decode_studio_block() Fixes: Out of array access Fixes: 13500/clusterfuzz-testcase-minimized-ffmpeg_AV_CODEC_ID_MPEG4_fuzzer-5769760178962432 Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/projects/ffmpeg Reviewed-by: Kieran Kunhya <kieran...
0
static int mpeg4_decode_studio_block(MpegEncContext *s, int32_t block[64], int n) { Mpeg4DecContext *ctx = s->avctx->priv_data; int cc, dct_dc_size, dct_diff, code, j, idx = 1, group = 0, run = 0, additional_code_len, sign, mismatch; VLC *cur_vlc = &ctx->studio_intra_tab[0]; uint8_t *const scan...
161,800,780,039,512,440,000,000,000,000,000,000,000
mpeg4videodec.c
216,162,170,291,603,600,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-11339
The studio profile decoder in libavcodec/mpeg4videodec.c in FFmpeg 4.0 before 4.0.4 and 4.1 before 4.1.2 allows remote attackers to cause a denial of service (out-of-array access) or possibly have unspecified other impact via crafted MPEG-4 video data.
https://nvd.nist.gov/vuln/detail/CVE-2019-11339
4,081
libmysofa
d39a171e9c6a1c44dbdf43f9db6c3fbd887e38c1
https://github.com/hoene/libmysofa
https://github.com/hoene/libmysofa/commit/d39a171e9c6a1c44dbdf43f9db6c3fbd887e38c1
Fixed security issue 1
1
int treeRead(struct READER *reader, struct DATAOBJECT *data) { int i, j, err, olen, elements, size, x, y, z, b, e, dy, dz, sx, sy, sz, dzy, szy; char *input, *output; uint8_t node_type, node_level; uint16_t entries_used; uint32_t size_of_chunk; uint32_t filter_mask; uint64_t address_of_left_sibling, address_...
20,763,822,898,396,646,000,000,000,000,000,000,000
btree.c
57,865,174,352,816,090,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2019-10672
treeRead in hdf/btree.c in libmysofa before 0.7 does not properly validate multiplications and additions.
https://nvd.nist.gov/vuln/detail/CVE-2019-10672
161,324
libmysofa
d39a171e9c6a1c44dbdf43f9db6c3fbd887e38c1
https://github.com/hoene/libmysofa
https://github.com/hoene/libmysofa/commit/d39a171e9c6a1c44dbdf43f9db6c3fbd887e38c1
Fixed security issue 1
0
int treeRead(struct READER *reader, struct DATAOBJECT *data) { int i, j, err, olen, elements, size, x, y, z, b, e, dy, dz, sx, sy, sz, dzy, szy; char *input, *output; uint8_t node_type, node_level; uint16_t entries_used; uint32_t size_of_chunk; uint32_t filter_mask; uint64_t address_of_left_sibling, address_...
55,177,176,557,625,520,000,000,000,000,000,000,000
btree.c
302,960,412,240,783,000,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2019-10672
treeRead in hdf/btree.c in libmysofa before 0.7 does not properly validate multiplications and additions.
https://nvd.nist.gov/vuln/detail/CVE-2019-10672
4,082
domoticz
ee70db46f81afa582c96b887b73bcd2a86feda00
https://github.com/domoticz/domoticz
https://github.com/domoticz/domoticz/commit/ee70db46f81afa582c96b887b73bcd2a86feda00
Fixed possible SQL Injection Vulnerability (Thanks to Fabio Carretto!)
1
void CWebServer::GetFloorplanImage(WebEmSession & session, const request& req, reply & rep) { std::string idx = request::findValue(&req, "idx"); if (idx == "") { return; } std::vector<std::vector<std::string> > result; result = m_sql.safe_queryBlob("SELECT Image FROM Floorplans WHERE ID=%s", i...
126,919,339,259,422,660,000,000,000,000,000,000,000
WebServer.cpp
148,825,033,982,485,370,000,000,000,000,000,000,000
[ "CWE-89" ]
CVE-2019-10664
Domoticz before 4.10578 allows SQL Injection via the idx parameter in CWebServer::GetFloorplanImage in WebServer.cpp.
https://nvd.nist.gov/vuln/detail/CVE-2019-10664
161,325
domoticz
ee70db46f81afa582c96b887b73bcd2a86feda00
https://github.com/domoticz/domoticz
https://github.com/domoticz/domoticz/commit/ee70db46f81afa582c96b887b73bcd2a86feda00
Fixed possible SQL Injection Vulnerability (Thanks to Fabio Carretto!)
0
void CWebServer::GetFloorplanImage(WebEmSession & session, const request& req, reply & rep) { std::string idx = request::findValue(&req, "idx"); if (idx == "") { return; } std::vector<std::vector<std::string> > result; result = m_sql.safe_queryBlob("SELECT Image FROM Floorplans WHERE ID=%d", a...
197,783,324,510,857,200,000,000,000,000,000,000,000
WebServer.cpp
151,122,777,681,589,000,000,000,000,000,000,000,000
[ "CWE-89" ]
CVE-2019-10664
Domoticz before 4.10578 allows SQL Injection via the idx parameter in CWebServer::GetFloorplanImage in WebServer.cpp.
https://nvd.nist.gov/vuln/detail/CVE-2019-10664
4,083
linux
355b98553789b646ed97ad801a619ff898471b92
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/355b98553789b646ed97ad801a619ff898471b92
netns: provide pure entropy for net_hash_mix() net_hash_mix() currently uses kernel address of a struct net, and is used in many places that could be used to reveal this address to a patient attacker, thus defeating KASLR, for the typical case (initial net namespace, &init_net is not dynamically allocated) I believe ...
1
static __net_init int setup_net(struct net *net, struct user_namespace *user_ns) { /* Must be called with pernet_ops_rwsem held */ const struct pernet_operations *ops, *saved_ops; int error = 0; LIST_HEAD(net_exit_list); refcount_set(&net->count, 1); refcount_set(&net->passive, 1); net->dev_base_seq = 1; ...
206,504,535,378,372,680,000,000,000,000,000,000,000
net_namespace.c
241,146,489,846,949,000,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2019-10638
In the Linux kernel before 5.1.7, a device can be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby o...
https://nvd.nist.gov/vuln/detail/CVE-2019-10638
161,326
linux
355b98553789b646ed97ad801a619ff898471b92
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/355b98553789b646ed97ad801a619ff898471b92
netns: provide pure entropy for net_hash_mix() net_hash_mix() currently uses kernel address of a struct net, and is used in many places that could be used to reveal this address to a patient attacker, thus defeating KASLR, for the typical case (initial net namespace, &init_net is not dynamically allocated) I believe ...
0
static __net_init int setup_net(struct net *net, struct user_namespace *user_ns) { /* Must be called with pernet_ops_rwsem held */ const struct pernet_operations *ops, *saved_ops; int error = 0; LIST_HEAD(net_exit_list); refcount_set(&net->count, 1); refcount_set(&net->passive, 1); get_random_bytes(&net->has...
339,561,622,403,215,620,000,000,000,000,000,000,000
net_namespace.c
45,920,932,712,570,670,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2019-10638
In the Linux kernel before 5.1.7, a device can be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby o...
https://nvd.nist.gov/vuln/detail/CVE-2019-10638
4,088
ImageMagick
cb1214c124e1bd61f7dd551b94a794864861592e
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/cb1214c124e1bd61f7dd551b94a794864861592e
...
1
static int format8BIM(Image *ifile, Image *ofile) { char temp[MagickPathExtent]; unsigned int foundOSType; int ID, resCount, i, c; ssize_t count; unsigned char *PString, *str; resCount=0; foundOSType=0; /* found the OSType */ (void) foundOSType; c=ReadBlobByte(...
166,827,350,039,151,750,000,000,000,000,000,000,000
meta.c
231,438,544,697,155,060,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2019-10131
An off-by-one read vulnerability was discovered in ImageMagick before version 7.0.7-28 in the formatIPTCfromBuffer function in coders/meta.c. A local attacker may use this flaw to read beyond the end of the buffer or to crash the program.
https://nvd.nist.gov/vuln/detail/CVE-2019-10131
161,331
ImageMagick
cb1214c124e1bd61f7dd551b94a794864861592e
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/cb1214c124e1bd61f7dd551b94a794864861592e
...
0
static int format8BIM(Image *ifile, Image *ofile) { char temp[MagickPathExtent]; unsigned int foundOSType; int ID, resCount, i, c; ssize_t count; unsigned char *PString, *str; resCount=0; foundOSType=0; /* found the OSType */ (void) foundOSType; c=ReadBlobByte(...
169,697,026,794,072,460,000,000,000,000,000,000,000
meta.c
197,122,505,717,199,880,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2019-10131
An off-by-one read vulnerability was discovered in ImageMagick before version 7.0.7-28 in the formatIPTCfromBuffer function in coders/meta.c. A local attacker may use this flaw to read beyond the end of the buffer or to crash the program.
https://nvd.nist.gov/vuln/detail/CVE-2019-10131
4,089
libu2f-host
e4bb58cc8b6202a421e65f8230217d8ae6e16eb5
https://github.com/Yubico/libu2f-host
https://github.com/Yubico/libu2f-host/commit/e4bb58cc8b6202a421e65f8230217d8ae6e16eb5
fix filling out of initresp
1
init_device (u2fh_devs * devs, struct u2fdevice *dev) { unsigned char resp[1024]; unsigned char nonce[8]; if (obtain_nonce(nonce) != 0) { return U2FH_TRANSPORT_ERROR; } size_t resplen = sizeof (resp); dev->cid = CID_BROADCAST; if (u2fh_sendrecv (devs, dev->id, U2FHID_INIT, nonce, sizeo...
68,338,259,853,873,010,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2019-9578
In devs.c in Yubico libu2f-host before 1.1.8, the response to init is misparsed, leaking uninitialized stack memory back to the device.
https://nvd.nist.gov/vuln/detail/CVE-2019-9578
161,332
libu2f-host
e4bb58cc8b6202a421e65f8230217d8ae6e16eb5
https://github.com/Yubico/libu2f-host
https://github.com/Yubico/libu2f-host/commit/e4bb58cc8b6202a421e65f8230217d8ae6e16eb5
fix filling out of initresp
0
init_device (u2fh_devs * devs, struct u2fdevice *dev) { unsigned char resp[1024]; unsigned char nonce[8]; if (obtain_nonce(nonce) != 0) { return U2FH_TRANSPORT_ERROR; } size_t resplen = sizeof (resp); dev->cid = CID_BROADCAST; if (u2fh_sendrecv (devs, dev->id, U2FHID_INIT, nonce, sizeo...
46,732,489,515,601,340,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2019-9578
In devs.c in Yubico libu2f-host before 1.1.8, the response to init is misparsed, leaking uninitialized stack memory back to the device.
https://nvd.nist.gov/vuln/detail/CVE-2019-9578
4,091
linux
c4c07b4d6fa1f11880eab8e076d3d060ef3f55fc
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c4c07b4d6fa1f11880eab8e076d3d060ef3f55fc
netfilter: nf_nat_snmp_basic: add missing length checks in ASN.1 cbs The generic ASN.1 decoder infrastructure doesn't guarantee that callbacks will get as much data as they expect; callbacks have to check the `datalen` parameter before looking at `data`. Make sure that snmp_version() and snmp_helper() don't read/write...
1
int snmp_helper(void *context, size_t hdrlen, unsigned char tag, const void *data, size_t datalen) { struct snmp_ctx *ctx = (struct snmp_ctx *)context; __be32 *pdata = (__be32 *)data; if (*pdata == ctx->from) { pr_debug("%s: %pI4 to %pI4\n", __func__, (void *)&ctx->from, (void *)&ctx->to); if (*ct...
105,977,845,795,719,550,000,000,000,000,000,000,000
nf_nat_snmp_basic_main.c
170,342,232,582,282,240,000,000,000,000,000,000,000
[ "CWE-129" ]
CVE-2019-9162
In the Linux kernel before 4.20.12, net/ipv4/netfilter/nf_nat_snmp_basic_main.c in the SNMP NAT module has insufficient ASN.1 length checks (aka an array index error), making out-of-bounds read and write operations possible, leading to an OOPS or local privilege escalation. This affects snmp_version and snmp_helper.
https://nvd.nist.gov/vuln/detail/CVE-2019-9162
161,333
linux
c4c07b4d6fa1f11880eab8e076d3d060ef3f55fc
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c4c07b4d6fa1f11880eab8e076d3d060ef3f55fc
netfilter: nf_nat_snmp_basic: add missing length checks in ASN.1 cbs The generic ASN.1 decoder infrastructure doesn't guarantee that callbacks will get as much data as they expect; callbacks have to check the `datalen` parameter before looking at `data`. Make sure that snmp_version() and snmp_helper() don't read/write...
0
int snmp_helper(void *context, size_t hdrlen, unsigned char tag, const void *data, size_t datalen) { struct snmp_ctx *ctx = (struct snmp_ctx *)context; __be32 *pdata; if (datalen != 4) return -EINVAL; pdata = (__be32 *)data; if (*pdata == ctx->from) { pr_debug("%s: %pI4 to %pI4\n", __func__, (voi...
272,015,177,791,663,720,000,000,000,000,000,000,000
nf_nat_snmp_basic_main.c
143,170,956,048,095,800,000,000,000,000,000,000,000
[ "CWE-129" ]
CVE-2019-9162
In the Linux kernel before 4.20.12, net/ipv4/netfilter/nf_nat_snmp_basic_main.c in the SNMP NAT module has insufficient ASN.1 length checks (aka an array index error), making out-of-bounds read and write operations possible, leading to an OOPS or local privilege escalation. This affects snmp_version and snmp_helper.
https://nvd.nist.gov/vuln/detail/CVE-2019-9162
4,092
linux
c4c07b4d6fa1f11880eab8e076d3d060ef3f55fc
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c4c07b4d6fa1f11880eab8e076d3d060ef3f55fc
netfilter: nf_nat_snmp_basic: add missing length checks in ASN.1 cbs The generic ASN.1 decoder infrastructure doesn't guarantee that callbacks will get as much data as they expect; callbacks have to check the `datalen` parameter before looking at `data`. Make sure that snmp_version() and snmp_helper() don't read/write...
1
int snmp_version(void *context, size_t hdrlen, unsigned char tag, const void *data, size_t datalen) { if (*(unsigned char *)data > 1) return -ENOTSUPP; return 1; }
198,796,159,557,597,100,000,000,000,000,000,000,000
nf_nat_snmp_basic_main.c
170,342,232,582,282,240,000,000,000,000,000,000,000
[ "CWE-129" ]
CVE-2019-9162
In the Linux kernel before 4.20.12, net/ipv4/netfilter/nf_nat_snmp_basic_main.c in the SNMP NAT module has insufficient ASN.1 length checks (aka an array index error), making out-of-bounds read and write operations possible, leading to an OOPS or local privilege escalation. This affects snmp_version and snmp_helper.
https://nvd.nist.gov/vuln/detail/CVE-2019-9162
161,334
linux
c4c07b4d6fa1f11880eab8e076d3d060ef3f55fc
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c4c07b4d6fa1f11880eab8e076d3d060ef3f55fc
netfilter: nf_nat_snmp_basic: add missing length checks in ASN.1 cbs The generic ASN.1 decoder infrastructure doesn't guarantee that callbacks will get as much data as they expect; callbacks have to check the `datalen` parameter before looking at `data`. Make sure that snmp_version() and snmp_helper() don't read/write...
0
int snmp_version(void *context, size_t hdrlen, unsigned char tag, const void *data, size_t datalen) { if (datalen != 1) return -EINVAL; if (*(unsigned char *)data > 1) return -ENOTSUPP; return 1; }
151,449,529,578,357,770,000,000,000,000,000,000,000
nf_nat_snmp_basic_main.c
143,170,956,048,095,800,000,000,000,000,000,000,000
[ "CWE-129" ]
CVE-2019-9162
In the Linux kernel before 4.20.12, net/ipv4/netfilter/nf_nat_snmp_basic_main.c in the SNMP NAT module has insufficient ASN.1 length checks (aka an array index error), making out-of-bounds read and write operations possible, leading to an OOPS or local privilege escalation. This affects snmp_version and snmp_helper.
https://nvd.nist.gov/vuln/detail/CVE-2019-9162
4,095
file
2858eaf99f6cc5aae129bcbf1e24ad160240185f
https://github.com/file/file
https://github.com/file/file/commit/2858eaf99f6cc5aae129bcbf1e24ad160240185f
Avoid OOB read (found by ASAN reported by F. Alonso)
1
do_core_note(struct magic_set *ms, unsigned char *nbuf, uint32_t type, int swap, uint32_t namesz, uint32_t descsz, size_t noff, size_t doff, int *flags, size_t size, int clazz) { #ifdef ELFCORE int os_style = -1; /* * Sigh. The 2.0.36 kernel in Debian 2.1, at * least, doesn't correctly implement name *...
251,178,396,706,421,600,000,000,000,000,000,000,000
readelf.c
30,801,224,004,046,760,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-8906
do_core_note in readelf.c in libmagic.a in file 5.35 has an out-of-bounds read because memcpy is misused.
https://nvd.nist.gov/vuln/detail/CVE-2019-8906
161,337
file
2858eaf99f6cc5aae129bcbf1e24ad160240185f
https://github.com/file/file
https://github.com/file/file/commit/2858eaf99f6cc5aae129bcbf1e24ad160240185f
Avoid OOB read (found by ASAN reported by F. Alonso)
0
do_core_note(struct magic_set *ms, unsigned char *nbuf, uint32_t type, int swap, uint32_t namesz, uint32_t descsz, size_t noff, size_t doff, int *flags, size_t size, int clazz) { #ifdef ELFCORE int os_style = -1; /* * Sigh. The 2.0.36 kernel in Debian 2.1, at * least, doesn't correctly implement name *...
85,296,107,075,422,000,000,000,000,000,000,000,000
readelf.c
33,867,220,749,021,000,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-8906
do_core_note in readelf.c in libmagic.a in file 5.35 has an out-of-bounds read because memcpy is misused.
https://nvd.nist.gov/vuln/detail/CVE-2019-8906
4,096
ImageMagick
306c1f0fa5754ca78efd16ab752f0e981d4f6b82
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/306c1f0fa5754ca78efd16ab752f0e981d4f6b82
https://github.com/ImageMagick/ImageMagick/issues/1454
1
static MagickBooleanType WritePDFImage(const ImageInfo *image_info,Image *image, ExceptionInfo *exception) { #define CFormat "/Filter [ /%s ]\n" #define ObjectsPerImage 14 #define ThrowPDFException(exception,message) \ { \ if (xref != (MagickOffsetType *) NULL) \ xref=(MagickOffsetType *) RelinquishMagickMemo...
40,501,662,541,508,744,000,000,000,000,000,000,000
pdf.c
291,286,648,213,977,640,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2019-7397
In ImageMagick before 7.0.8-25 and GraphicsMagick through 1.3.31, several memory leaks exist in WritePDFImage in coders/pdf.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-7397
161,338
ImageMagick
306c1f0fa5754ca78efd16ab752f0e981d4f6b82
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/306c1f0fa5754ca78efd16ab752f0e981d4f6b82
https://github.com/ImageMagick/ImageMagick/issues/1454
0
static MagickBooleanType WritePDFImage(const ImageInfo *image_info,Image *image, ExceptionInfo *exception) { #define CFormat "/Filter [ /%s ]\n" #define ObjectsPerImage 14 #define ThrowPDFException(exception,message) \ { \ if (xref != (MagickOffsetType *) NULL) \ xref=(MagickOffsetType *) RelinquishMagickMemo...
213,487,739,598,544,130,000,000,000,000,000,000,000
pdf.c
332,364,242,538,094,800,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2019-7397
In ImageMagick before 7.0.8-25 and GraphicsMagick through 1.3.31, several memory leaks exist in WritePDFImage in coders/pdf.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-7397
4,097
ImageMagick
8a43abefb38c5e29138e1c9c515b313363541c06
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/8a43abefb38c5e29138e1c9c515b313363541c06
https://github.com/ImageMagick/ImageMagick/issues/1451
1
static size_t WritePSDChannel(const PSDInfo *psd_info, const ImageInfo *image_info,Image *image,Image *next_image, const QuantumType quantum_type, unsigned char *compact_pixels, MagickOffsetType size_offset,const MagickBooleanType separate, const CompressionType compression,ExceptionInfo *exception) { MagickB...
68,733,002,057,457,950,000,000,000,000,000,000,000
psd.c
148,851,851,471,348,200,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2019-7395
In ImageMagick before 7.0.8-25, a memory leak exists in WritePSDChannel in coders/psd.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-7395
161,339
ImageMagick
8a43abefb38c5e29138e1c9c515b313363541c06
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/8a43abefb38c5e29138e1c9c515b313363541c06
https://github.com/ImageMagick/ImageMagick/issues/1451
0
static size_t WritePSDChannel(const PSDInfo *psd_info, const ImageInfo *image_info,Image *image,Image *next_image, const QuantumType quantum_type, unsigned char *compact_pixels, MagickOffsetType size_offset,const MagickBooleanType separate, const CompressionType compression,ExceptionInfo *exception) { MagickB...
205,942,507,666,218,120,000,000,000,000,000,000,000
psd.c
27,299,609,756,153,676,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2019-7395
In ImageMagick before 7.0.8-25, a memory leak exists in WritePSDChannel in coders/psd.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-7395
4,100
ImageMagick
1e6a3ace073c9ec9c71e439c111d23c6e66cb6ae
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/1e6a3ace073c9ec9c71e439c111d23c6e66cb6ae
https://github.com/ImageMagick/ImageMagick/issues/1450
1
static MagickBooleanType DecodeImage(Image *image,unsigned char *luma, unsigned char *chroma1,unsigned char *chroma2,ExceptionInfo *exception) { #define IsSync(sum) ((sum & 0xffffff00UL) == 0xfffffe00UL) #define PCDGetBits(n) \ { \ sum=(sum << n) & 0xffffffff; \ bits-=n; \ while (bits <= 24) \ { \ if (p...
319,777,982,927,308,370,000,000,000,000,000,000,000
pcd.c
279,908,488,505,593,460,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2019-7175
In ImageMagick before 7.0.8-25, some memory leaks exist in DecodeImage in coders/pcd.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-7175
161,342
ImageMagick
1e6a3ace073c9ec9c71e439c111d23c6e66cb6ae
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/1e6a3ace073c9ec9c71e439c111d23c6e66cb6ae
https://github.com/ImageMagick/ImageMagick/issues/1450
0
static MagickBooleanType DecodeImage(Image *image,unsigned char *luma, unsigned char *chroma1,unsigned char *chroma2,ExceptionInfo *exception) { #define IsSync(sum) ((sum & 0xffffff00UL) == 0xfffffe00UL) #define PCDGetBits(n) \ { \ sum=(sum << n) & 0xffffffff; \ bits-=n; \ while (bits <= 24) \ { \ if (p...
166,023,602,708,219,940,000,000,000,000,000,000,000
pcd.c
78,447,038,637,858,290,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2019-7175
In ImageMagick before 7.0.8-25, some memory leaks exist in DecodeImage in coders/pcd.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-7175
4,109
mod_auth_mellon
62041428a32de402e0be6ba45fe12df6a83bedb8
https://github.com/Uninett/mod_auth_mellon
https://github.com/Uninett/mod_auth_mellon/commit/62041428a32de402e0be6ba45fe12df6a83bedb8
Fix redirect URL validation bypass It turns out that browsers silently convert backslash characters into forward slashes, while apr_uri_parse() does not. This mismatch allows an attacker to bypass the redirect URL validation by using an URL like: https://sp.example.org/mellon/logout?ReturnTo=https:%5c%5cmalicious....
1
int am_check_url(request_rec *r, const char *url) { const char *i; for (i = url; *i; i++) { if (*i >= 0 && *i < ' ') { /* Deny all control-characters. */ AM_LOG_RERROR(APLOG_MARK, APLOG_ERR, HTTP_BAD_REQUEST, r, "Control character detected in URL."); ...
82,672,157,991,462,600,000,000,000,000,000,000,000
auth_mellon_util.c
235,649,112,104,693,500,000,000,000,000,000,000,000
[ "CWE-601" ]
CVE-2019-3877
A vulnerability was found in mod_auth_mellon before v0.14.2. An open redirect in the logout URL allows requests with backslashes to pass through by assuming that it is a relative URL, while the browsers silently convert backslash characters into forward slashes treating them as an absolute URL. This mismatch allows an ...
https://nvd.nist.gov/vuln/detail/CVE-2019-3877
161,351
mod_auth_mellon
62041428a32de402e0be6ba45fe12df6a83bedb8
https://github.com/Uninett/mod_auth_mellon
https://github.com/Uninett/mod_auth_mellon/commit/62041428a32de402e0be6ba45fe12df6a83bedb8
Fix redirect URL validation bypass It turns out that browsers silently convert backslash characters into forward slashes, while apr_uri_parse() does not. This mismatch allows an attacker to bypass the redirect URL validation by using an URL like: https://sp.example.org/mellon/logout?ReturnTo=https:%5c%5cmalicious....
0
int am_check_url(request_rec *r, const char *url) { const char *i; for (i = url; *i; i++) { if (*i >= 0 && *i < ' ') { /* Deny all control-characters. */ AM_LOG_RERROR(APLOG_MARK, APLOG_ERR, HTTP_BAD_REQUEST, r, "Control character detected in URL."); ...
161,409,562,378,437,540,000,000,000,000,000,000,000
auth_mellon_util.c
104,935,388,546,746,630,000,000,000,000,000,000,000
[ "CWE-601" ]
CVE-2019-3877
A vulnerability was found in mod_auth_mellon before v0.14.2. An open redirect in the logout URL allows requests with backslashes to pass through by assuming that it is a relative URL, while the browsers silently convert backslash characters into forward slashes treating them as an absolute URL. This mismatch allows an ...
https://nvd.nist.gov/vuln/detail/CVE-2019-3877
4,118
gpac
d2371b4b204f0a3c0af51ad4e9b491144dd1225c
https://github.com/gpac/gpac
https://github.com/gpac/gpac/commit/d2371b4b204f0a3c0af51ad4e9b491144dd1225c
prevent dref memleak on invalid input (#1183)
1
GF_Err dinf_Read(GF_Box *s, GF_BitStream *bs) { GF_Err e = gf_isom_box_array_read(s, bs, dinf_AddBox); if (e) { return e; } if (!((GF_DataInformationBox *)s)->dref) { GF_LOG(GF_LOG_ERROR, GF_LOG_CONTAINER, ("[iso file] Missing dref box in dinf\n")); ((GF_DataInformationBox *)s)->dref = (GF_DataReferenceBo...
102,742,711,928,030,080,000,000,000,000,000,000,000
box_code_base.c
230,439,071,816,063,260,000,000,000,000,000,000,000
[ "CWE-400" ]
CVE-2018-21017
GPAC 0.7.1 has a memory leak in dinf_Read in isomedia/box_code_base.c.
https://nvd.nist.gov/vuln/detail/CVE-2018-21017
161,360
gpac
d2371b4b204f0a3c0af51ad4e9b491144dd1225c
https://github.com/gpac/gpac
https://github.com/gpac/gpac/commit/d2371b4b204f0a3c0af51ad4e9b491144dd1225c
prevent dref memleak on invalid input (#1183)
0
GF_Err dinf_Read(GF_Box *s, GF_BitStream *bs) { GF_Err e = gf_isom_box_array_read(s, bs, dinf_AddBox); if (e) { return e; } if (!((GF_DataInformationBox *)s)->dref) { GF_Box* dref; GF_LOG(GF_LOG_ERROR, GF_LOG_CONTAINER, ("[iso file] Missing dref box in dinf\n")); dref = gf_isom_box_new(GF_ISOM_BOX_TYPE_...
308,809,438,634,628,800,000,000,000,000,000,000,000
box_code_base.c
95,603,189,090,506,600,000,000,000,000,000,000,000
[ "CWE-400" ]
CVE-2018-21017
GPAC 0.7.1 has a memory leak in dinf_Read in isomedia/box_code_base.c.
https://nvd.nist.gov/vuln/detail/CVE-2018-21017
4,119
openjpeg
2e5ab1d9987831c981ff05862e8ccf1381ed58ea
https://github.com/uclouvain/openjpeg
https://github.com/uclouvain/openjpeg/commit/2e5ab1d9987831c981ff05862e8ccf1381ed58ea
color_apply_icc_profile: avoid potential heap buffer overflow Derived from a patch by Thuan Pham
1
void color_apply_icc_profile(opj_image_t *image) { cmsHPROFILE in_prof, out_prof; cmsHTRANSFORM transform; cmsColorSpaceSignature in_space, out_space; cmsUInt32Number intent, in_type, out_type; int *r, *g, *b; size_t nr_samples, i, max, max_w, max_h; int prec, ok = 0; OPJ_COLOR_SPACE new...
105,259,506,362,981,870,000,000,000,000,000,000,000
color.c
74,641,151,863,664,750,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-21010
OpenJPEG before 2.3.1 has a heap buffer overflow in color_apply_icc_profile in bin/common/color.c.
https://nvd.nist.gov/vuln/detail/CVE-2018-21010
161,361
openjpeg
2e5ab1d9987831c981ff05862e8ccf1381ed58ea
https://github.com/uclouvain/openjpeg
https://github.com/uclouvain/openjpeg/commit/2e5ab1d9987831c981ff05862e8ccf1381ed58ea
color_apply_icc_profile: avoid potential heap buffer overflow Derived from a patch by Thuan Pham
0
void color_apply_icc_profile(opj_image_t *image) { cmsHPROFILE in_prof, out_prof; cmsHTRANSFORM transform; cmsColorSpaceSignature in_space, out_space; cmsUInt32Number intent, in_type, out_type; int *r, *g, *b; size_t nr_samples, i, max, max_w, max_h; int prec, ok = 0; OPJ_COLOR_SPACE new...
109,498,780,464,417,920,000,000,000,000,000,000,000
color.c
14,748,644,194,213,563,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-21010
OpenJPEG before 2.3.1 has a heap buffer overflow in color_apply_icc_profile in bin/common/color.c.
https://nvd.nist.gov/vuln/detail/CVE-2018-21010
4,120
linux
7fafcfdf6377b18b2a726ea554d6e593ba44349f
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/7fafcfdf6377b18b2a726ea554d6e593ba44349f
USB: gadget: f_midi: fixing a possible double-free in f_midi It looks like there is a possibility of a double-free vulnerability on an error path of the f_midi_set_alt function in the f_midi driver. If the path is feasible then free_ep_req gets called twice: req->complete = f_midi_complete; err = us...
1
static int f_midi_set_alt(struct usb_function *f, unsigned intf, unsigned alt) { struct f_midi *midi = func_to_midi(f); unsigned i; int err; /* we only set alt for MIDIStreaming interface */ if (intf != midi->ms_id) return 0; err = f_midi_start_ep(midi, f, midi->in_ep); if (err) return err; err = f_midi_...
319,178,464,914,382,540,000,000,000,000,000,000,000
None
null
[ "CWE-415" ]
CVE-2018-20961
In the Linux kernel before 4.16.4, a double free vulnerability in the f_midi_set_alt function of drivers/usb/gadget/function/f_midi.c in the f_midi driver may allow attackers to cause a denial of service or possibly have unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2018-20961
161,362
linux
7fafcfdf6377b18b2a726ea554d6e593ba44349f
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/7fafcfdf6377b18b2a726ea554d6e593ba44349f
USB: gadget: f_midi: fixing a possible double-free in f_midi It looks like there is a possibility of a double-free vulnerability on an error path of the f_midi_set_alt function in the f_midi driver. If the path is feasible then free_ep_req gets called twice: req->complete = f_midi_complete; err = us...
0
static int f_midi_set_alt(struct usb_function *f, unsigned intf, unsigned alt) { struct f_midi *midi = func_to_midi(f); unsigned i; int err; /* we only set alt for MIDIStreaming interface */ if (intf != midi->ms_id) return 0; err = f_midi_start_ep(midi, f, midi->in_ep); if (err) return err; err = f_midi_...
226,912,574,947,505,360,000,000,000,000,000,000,000
None
null
[ "CWE-415" ]
CVE-2018-20961
In the Linux kernel before 4.16.4, a double free vulnerability in the f_midi_set_alt function of drivers/usb/gadget/function/f_midi.c in the f_midi driver may allow attackers to cause a denial of service or possibly have unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2018-20961
4,121
linux
54648cf1ec2d7f4b6a71767799c45676a138ca24
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/54648cf1ec2d7f4b6a71767799c45676a138ca24
block: blk_init_allocated_queue() set q->fq as NULL in the fail case We find the memory use-after-free issue in __blk_drain_queue() on the kernel 4.14. After read the latest kernel 4.18-rc6 we think it has the same problem. Memory is allocated for q->fq in the blk_init_allocated_queue(). If the elevator init function...
1
int blk_init_allocated_queue(struct request_queue *q) { WARN_ON_ONCE(q->mq_ops); q->fq = blk_alloc_flush_queue(q, NUMA_NO_NODE, q->cmd_size); if (!q->fq) return -ENOMEM; if (q->init_rq_fn && q->init_rq_fn(q, q->fq->flush_rq, GFP_KERNEL)) goto out_free_flush_queue; if (blk_init_rl(&q->root_rl, q, GFP_KERNEL)...
302,121,427,349,834,920,000,000,000,000,000,000,000
blk-core.c
50,547,906,985,392,000,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2018-20856
An issue was discovered in the Linux kernel before 4.18.7. In block/blk-core.c, there is an __blk_drain_queue() use-after-free because a certain error case is mishandled.
https://nvd.nist.gov/vuln/detail/CVE-2018-20856
161,363
linux
54648cf1ec2d7f4b6a71767799c45676a138ca24
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/54648cf1ec2d7f4b6a71767799c45676a138ca24
block: blk_init_allocated_queue() set q->fq as NULL in the fail case We find the memory use-after-free issue in __blk_drain_queue() on the kernel 4.14. After read the latest kernel 4.18-rc6 we think it has the same problem. Memory is allocated for q->fq in the blk_init_allocated_queue(). If the elevator init function...
0
int blk_init_allocated_queue(struct request_queue *q) { WARN_ON_ONCE(q->mq_ops); q->fq = blk_alloc_flush_queue(q, NUMA_NO_NODE, q->cmd_size); if (!q->fq) return -ENOMEM; if (q->init_rq_fn && q->init_rq_fn(q, q->fq->flush_rq, GFP_KERNEL)) goto out_free_flush_queue; if (blk_init_rl(&q->root_rl, q, GFP_KERNEL)...
306,223,966,788,099,170,000,000,000,000,000,000,000
blk-core.c
304,795,442,038,354,070,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2018-20856
An issue was discovered in the Linux kernel before 4.18.7. In block/blk-core.c, there is an __blk_drain_queue() use-after-free because a certain error case is mishandled.
https://nvd.nist.gov/vuln/detail/CVE-2018-20856
4,122
linux
0625b4ba1a5d4703c7fb01c497bd6c156908af00
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/0625b4ba1a5d4703c7fb01c497bd6c156908af00
IB/mlx5: Fix leaking stack memory to userspace mlx5_ib_create_qp_resp was never initialized and only the first 4 bytes were written. Fixes: 41d902cb7c32 ("RDMA/mlx5: Fix definition of mlx5_ib_create_qp_resp") Cc: <stable@vger.kernel.org> Acked-by: Leon Romanovsky <leonro@mellanox.com> Signed-off-by: Jason Gunthorpe <...
1
static int create_qp_common(struct mlx5_ib_dev *dev, struct ib_pd *pd, struct ib_qp_init_attr *init_attr, struct ib_udata *udata, struct mlx5_ib_qp *qp) { struct mlx5_ib_resources *devr = &dev->devr; int inlen = MLX5_ST_SZ_BYTES(create_qp_in); struct mlx5_core_dev *mdev = dev->mdev; struct mlx5_ib_...
248,861,397,606,415,760,000,000,000,000,000,000,000
qp.c
331,582,094,954,837,000,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-20855
An issue was discovered in the Linux kernel before 4.18.7. In create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace.
https://nvd.nist.gov/vuln/detail/CVE-2018-20855
161,364
linux
0625b4ba1a5d4703c7fb01c497bd6c156908af00
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/0625b4ba1a5d4703c7fb01c497bd6c156908af00
IB/mlx5: Fix leaking stack memory to userspace mlx5_ib_create_qp_resp was never initialized and only the first 4 bytes were written. Fixes: 41d902cb7c32 ("RDMA/mlx5: Fix definition of mlx5_ib_create_qp_resp") Cc: <stable@vger.kernel.org> Acked-by: Leon Romanovsky <leonro@mellanox.com> Signed-off-by: Jason Gunthorpe <...
0
static int create_qp_common(struct mlx5_ib_dev *dev, struct ib_pd *pd, struct ib_qp_init_attr *init_attr, struct ib_udata *udata, struct mlx5_ib_qp *qp) { struct mlx5_ib_resources *devr = &dev->devr; int inlen = MLX5_ST_SZ_BYTES(create_qp_in); struct mlx5_core_dev *mdev = dev->mdev; struct mlx5_ib_...
100,002,669,697,923,270,000,000,000,000,000,000,000
qp.c
75,062,449,826,770,040,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-20855
An issue was discovered in the Linux kernel before 4.18.7. In create_qp_common in drivers/infiniband/hw/mlx5/qp.c, mlx5_ib_create_qp_resp was never initialized, resulting in a leak of stack memory to userspace.
https://nvd.nist.gov/vuln/detail/CVE-2018-20855
4,124
openjpeg
c58df149900df862806d0e892859b41115875845
https://github.com/uclouvain/openjpeg
https://github.com/uclouvain/openjpeg/commit/c58df149900df862806d0e892859b41115875845
[OPENJP2] change the way to compute *p_tx0, *p_tx1, *p_ty0, *p_ty1 in function opj_get_encoding_parameters Signed-off-by: Young_X <YangX92@hotmail.com>
1
static void opj_get_encoding_parameters(const opj_image_t *p_image, const opj_cp_t *p_cp, OPJ_UINT32 p_tileno, OPJ_INT32 * p_tx0, OPJ_INT32 * p_tx1, ...
296,815,004,190,301,400,000,000,000,000,000,000,000
pi.c
91,262,203,277,625,340,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2018-20847
An improper computation of p_tx0, p_tx1, p_ty0 and p_ty1 in the function opj_get_encoding_parameters in openjp2/pi.c in OpenJPEG through 2.3.0 can lead to an integer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2018-20847
161,366
openjpeg
c58df149900df862806d0e892859b41115875845
https://github.com/uclouvain/openjpeg
https://github.com/uclouvain/openjpeg/commit/c58df149900df862806d0e892859b41115875845
[OPENJP2] change the way to compute *p_tx0, *p_tx1, *p_ty0, *p_ty1 in function opj_get_encoding_parameters Signed-off-by: Young_X <YangX92@hotmail.com>
0
static void opj_get_encoding_parameters(const opj_image_t *p_image, const opj_cp_t *p_cp, OPJ_UINT32 p_tileno, OPJ_INT32 * p_tx0, OPJ_INT32 * p_tx1, ...
182,177,806,558,737,580,000,000,000,000,000,000,000
pi.c
118,240,156,771,842,050,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2018-20847
An improper computation of p_tx0, p_tx1, p_ty0 and p_ty1 in the function opj_get_encoding_parameters in openjp2/pi.c in OpenJPEG through 2.3.0 can lead to an integer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2018-20847
4,125
openjpeg
c277159986c80142180fbe5efb256bbf3bdf3edc
https://github.com/uclouvain/openjpeg
https://github.com/uclouvain/openjpeg/commit/c277159986c80142180fbe5efb256bbf3bdf3edc
[MJ2] Avoid index out of bounds access to pi->include[] Signed-off-by: Young_X <YangX92@hotmail.com>
1
static opj_bool pi_next_cprl(opj_pi_iterator_t * pi) { opj_pi_comp_t *comp = NULL; opj_pi_resolution_t *res = NULL; long index = 0; if (!pi->first) { comp = &pi->comps[pi->compno]; goto LABEL_SKIP; } else { pi->first = 0; } for (pi->compno = pi->poc.compno0; pi->com...
85,538,911,631,696,440,000,000,000,000,000,000,000
pi.c
29,164,093,234,674,973,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2018-20846
Out-of-bounds accesses in the functions pi_next_lrcp, pi_next_rlcp, pi_next_rpcl, pi_next_pcrl, pi_next_rpcl, and pi_next_cprl in openmj2/pi.c in OpenJPEG through 2.3.0 allow remote attackers to cause a denial of service (application crash).
https://nvd.nist.gov/vuln/detail/CVE-2018-20846
161,367
openjpeg
c277159986c80142180fbe5efb256bbf3bdf3edc
https://github.com/uclouvain/openjpeg
https://github.com/uclouvain/openjpeg/commit/c277159986c80142180fbe5efb256bbf3bdf3edc
[MJ2] Avoid index out of bounds access to pi->include[] Signed-off-by: Young_X <YangX92@hotmail.com>
0
static opj_bool pi_next_cprl(opj_pi_iterator_t * pi) { opj_pi_comp_t *comp = NULL; opj_pi_resolution_t *res = NULL; long index = 0; if (!pi->first) { comp = &pi->comps[pi->compno]; goto LABEL_SKIP; } else { pi->first = 0; } for (pi->compno = pi->poc.compno0; pi->com...
152,568,987,785,447,740,000,000,000,000,000,000,000
pi.c
263,911,731,707,844,140,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2018-20846
Out-of-bounds accesses in the functions pi_next_lrcp, pi_next_rlcp, pi_next_rpcl, pi_next_pcrl, pi_next_rpcl, and pi_next_cprl in openmj2/pi.c in OpenJPEG through 2.3.0 allow remote attackers to cause a denial of service (application crash).
https://nvd.nist.gov/vuln/detail/CVE-2018-20846
4,126
openjpeg
c277159986c80142180fbe5efb256bbf3bdf3edc
https://github.com/uclouvain/openjpeg
https://github.com/uclouvain/openjpeg/commit/c277159986c80142180fbe5efb256bbf3bdf3edc
[MJ2] Avoid index out of bounds access to pi->include[] Signed-off-by: Young_X <YangX92@hotmail.com>
1
static opj_bool pi_next_lrcp(opj_pi_iterator_t * pi) { opj_pi_comp_t *comp = NULL; opj_pi_resolution_t *res = NULL; long index = 0; if (!pi->first) { comp = &pi->comps[pi->compno]; res = &comp->resolutions[pi->resno]; goto LABEL_SKIP; } else { pi->first = 0; }...
152,272,228,207,417,500,000,000,000,000,000,000,000
pi.c
29,164,093,234,674,973,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2018-20846
Out-of-bounds accesses in the functions pi_next_lrcp, pi_next_rlcp, pi_next_rpcl, pi_next_pcrl, pi_next_rpcl, and pi_next_cprl in openmj2/pi.c in OpenJPEG through 2.3.0 allow remote attackers to cause a denial of service (application crash).
https://nvd.nist.gov/vuln/detail/CVE-2018-20846
161,368
openjpeg
c277159986c80142180fbe5efb256bbf3bdf3edc
https://github.com/uclouvain/openjpeg
https://github.com/uclouvain/openjpeg/commit/c277159986c80142180fbe5efb256bbf3bdf3edc
[MJ2] Avoid index out of bounds access to pi->include[] Signed-off-by: Young_X <YangX92@hotmail.com>
0
static opj_bool pi_next_lrcp(opj_pi_iterator_t * pi) { opj_pi_comp_t *comp = NULL; opj_pi_resolution_t *res = NULL; long index = 0; if (!pi->first) { comp = &pi->comps[pi->compno]; res = &comp->resolutions[pi->resno]; goto LABEL_SKIP; } else { pi->first = 0; }...
340,147,979,248,397,630,000,000,000,000,000,000,000
pi.c
263,911,731,707,844,140,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2018-20846
Out-of-bounds accesses in the functions pi_next_lrcp, pi_next_rlcp, pi_next_rpcl, pi_next_pcrl, pi_next_rpcl, and pi_next_cprl in openmj2/pi.c in OpenJPEG through 2.3.0 allow remote attackers to cause a denial of service (application crash).
https://nvd.nist.gov/vuln/detail/CVE-2018-20846
4,127
openjpeg
c277159986c80142180fbe5efb256bbf3bdf3edc
https://github.com/uclouvain/openjpeg
https://github.com/uclouvain/openjpeg/commit/c277159986c80142180fbe5efb256bbf3bdf3edc
[MJ2] Avoid index out of bounds access to pi->include[] Signed-off-by: Young_X <YangX92@hotmail.com>
1
static opj_bool pi_next_pcrl(opj_pi_iterator_t * pi) { opj_pi_comp_t *comp = NULL; opj_pi_resolution_t *res = NULL; long index = 0; if (!pi->first) { comp = &pi->comps[pi->compno]; goto LABEL_SKIP; } else { int compno, resno; pi->first = 0; pi->dx = 0; ...
95,796,440,332,548,910,000,000,000,000,000,000,000
pi.c
29,164,093,234,674,973,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2018-20846
Out-of-bounds accesses in the functions pi_next_lrcp, pi_next_rlcp, pi_next_rpcl, pi_next_pcrl, pi_next_rpcl, and pi_next_cprl in openmj2/pi.c in OpenJPEG through 2.3.0 allow remote attackers to cause a denial of service (application crash).
https://nvd.nist.gov/vuln/detail/CVE-2018-20846
161,369
openjpeg
c277159986c80142180fbe5efb256bbf3bdf3edc
https://github.com/uclouvain/openjpeg
https://github.com/uclouvain/openjpeg/commit/c277159986c80142180fbe5efb256bbf3bdf3edc
[MJ2] Avoid index out of bounds access to pi->include[] Signed-off-by: Young_X <YangX92@hotmail.com>
0
static opj_bool pi_next_pcrl(opj_pi_iterator_t * pi) { opj_pi_comp_t *comp = NULL; opj_pi_resolution_t *res = NULL; long index = 0; if (!pi->first) { comp = &pi->comps[pi->compno]; goto LABEL_SKIP; } else { int compno, resno; pi->first = 0; pi->dx = 0; ...
212,417,702,150,292,840,000,000,000,000,000,000,000
pi.c
263,911,731,707,844,140,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2018-20846
Out-of-bounds accesses in the functions pi_next_lrcp, pi_next_rlcp, pi_next_rpcl, pi_next_pcrl, pi_next_rpcl, and pi_next_cprl in openmj2/pi.c in OpenJPEG through 2.3.0 allow remote attackers to cause a denial of service (application crash).
https://nvd.nist.gov/vuln/detail/CVE-2018-20846
4,128
openjpeg
c277159986c80142180fbe5efb256bbf3bdf3edc
https://github.com/uclouvain/openjpeg
https://github.com/uclouvain/openjpeg/commit/c277159986c80142180fbe5efb256bbf3bdf3edc
[MJ2] Avoid index out of bounds access to pi->include[] Signed-off-by: Young_X <YangX92@hotmail.com>
1
static opj_bool pi_next_rlcp(opj_pi_iterator_t * pi) { opj_pi_comp_t *comp = NULL; opj_pi_resolution_t *res = NULL; long index = 0; if (!pi->first) { comp = &pi->comps[pi->compno]; res = &comp->resolutions[pi->resno]; goto LABEL_SKIP; } else { pi->first = 0; } ...
223,188,624,698,480,920,000,000,000,000,000,000,000
pi.c
29,164,093,234,674,973,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2018-20846
Out-of-bounds accesses in the functions pi_next_lrcp, pi_next_rlcp, pi_next_rpcl, pi_next_pcrl, pi_next_rpcl, and pi_next_cprl in openmj2/pi.c in OpenJPEG through 2.3.0 allow remote attackers to cause a denial of service (application crash).
https://nvd.nist.gov/vuln/detail/CVE-2018-20846
161,370
openjpeg
c277159986c80142180fbe5efb256bbf3bdf3edc
https://github.com/uclouvain/openjpeg
https://github.com/uclouvain/openjpeg/commit/c277159986c80142180fbe5efb256bbf3bdf3edc
[MJ2] Avoid index out of bounds access to pi->include[] Signed-off-by: Young_X <YangX92@hotmail.com>
0
static opj_bool pi_next_rlcp(opj_pi_iterator_t * pi) { opj_pi_comp_t *comp = NULL; opj_pi_resolution_t *res = NULL; long index = 0; if (!pi->first) { comp = &pi->comps[pi->compno]; res = &comp->resolutions[pi->resno]; goto LABEL_SKIP; } else { pi->first = 0; } ...
200,157,178,676,074,700,000,000,000,000,000,000,000
pi.c
263,911,731,707,844,140,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2018-20846
Out-of-bounds accesses in the functions pi_next_lrcp, pi_next_rlcp, pi_next_rpcl, pi_next_pcrl, pi_next_rpcl, and pi_next_cprl in openmj2/pi.c in OpenJPEG through 2.3.0 allow remote attackers to cause a denial of service (application crash).
https://nvd.nist.gov/vuln/detail/CVE-2018-20846
4,129
openjpeg
c277159986c80142180fbe5efb256bbf3bdf3edc
https://github.com/uclouvain/openjpeg
https://github.com/uclouvain/openjpeg/commit/c277159986c80142180fbe5efb256bbf3bdf3edc
[MJ2] Avoid index out of bounds access to pi->include[] Signed-off-by: Young_X <YangX92@hotmail.com>
1
static opj_bool pi_next_rpcl(opj_pi_iterator_t * pi) { opj_pi_comp_t *comp = NULL; opj_pi_resolution_t *res = NULL; long index = 0; if (!pi->first) { goto LABEL_SKIP; } else { int compno, resno; pi->first = 0; pi->dx = 0; pi->dy = 0; for (compno = 0; ...
80,601,494,770,304,420,000,000,000,000,000,000,000
pi.c
29,164,093,234,674,973,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2018-20846
Out-of-bounds accesses in the functions pi_next_lrcp, pi_next_rlcp, pi_next_rpcl, pi_next_pcrl, pi_next_rpcl, and pi_next_cprl in openmj2/pi.c in OpenJPEG through 2.3.0 allow remote attackers to cause a denial of service (application crash).
https://nvd.nist.gov/vuln/detail/CVE-2018-20846
161,371
openjpeg
c277159986c80142180fbe5efb256bbf3bdf3edc
https://github.com/uclouvain/openjpeg
https://github.com/uclouvain/openjpeg/commit/c277159986c80142180fbe5efb256bbf3bdf3edc
[MJ2] Avoid index out of bounds access to pi->include[] Signed-off-by: Young_X <YangX92@hotmail.com>
0
static opj_bool pi_next_rpcl(opj_pi_iterator_t * pi) { opj_pi_comp_t *comp = NULL; opj_pi_resolution_t *res = NULL; long index = 0; if (!pi->first) { goto LABEL_SKIP; } else { int compno, resno; pi->first = 0; pi->dx = 0; pi->dy = 0; for (compno = 0; ...
322,166,698,431,701,670,000,000,000,000,000,000,000
pi.c
263,911,731,707,844,140,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2018-20846
Out-of-bounds accesses in the functions pi_next_lrcp, pi_next_rlcp, pi_next_rpcl, pi_next_pcrl, pi_next_rpcl, and pi_next_cprl in openmj2/pi.c in OpenJPEG through 2.3.0 allow remote attackers to cause a denial of service (application crash).
https://nvd.nist.gov/vuln/detail/CVE-2018-20846
4,137
linux
b90cd6f2b905905fb42671009dc0e27c310a16ae
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/b90cd6f2b905905fb42671009dc0e27c310a16ae
scsi: libsas: fix a race condition when smp task timeout When the lldd is processing the complete sas task in interrupt and set the task stat as SAS_TASK_STATE_DONE, the smp timeout timer is able to be triggered at the same time. And smp_task_timedout() will complete the task wheter the SAS_TASK_STATE_DONE is set or n...
1
static void smp_task_done(struct sas_task *task) { if (!del_timer(&task->slow_task->timer)) return; complete(&task->slow_task->completion); }
29,609,062,973,361,010,000,000,000,000,000,000,000
sas_expander.c
251,418,024,640,382,320,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2018-20836
An issue was discovered in the Linux kernel before 4.20. There is a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free.
https://nvd.nist.gov/vuln/detail/CVE-2018-20836
161,376
linux
b90cd6f2b905905fb42671009dc0e27c310a16ae
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/b90cd6f2b905905fb42671009dc0e27c310a16ae
scsi: libsas: fix a race condition when smp task timeout When the lldd is processing the complete sas task in interrupt and set the task stat as SAS_TASK_STATE_DONE, the smp timeout timer is able to be triggered at the same time. And smp_task_timedout() will complete the task wheter the SAS_TASK_STATE_DONE is set or n...
0
static void smp_task_done(struct sas_task *task) { del_timer(&task->slow_task->timer); complete(&task->slow_task->completion); }
338,994,261,007,418,500,000,000,000,000,000,000,000
sas_expander.c
178,098,637,815,964,250,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2018-20836
An issue was discovered in the Linux kernel before 4.20. There is a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free.
https://nvd.nist.gov/vuln/detail/CVE-2018-20836
4,138
linux
b90cd6f2b905905fb42671009dc0e27c310a16ae
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/b90cd6f2b905905fb42671009dc0e27c310a16ae
scsi: libsas: fix a race condition when smp task timeout When the lldd is processing the complete sas task in interrupt and set the task stat as SAS_TASK_STATE_DONE, the smp timeout timer is able to be triggered at the same time. And smp_task_timedout() will complete the task wheter the SAS_TASK_STATE_DONE is set or n...
1
static void smp_task_timedout(struct timer_list *t) { struct sas_task_slow *slow = from_timer(slow, t, timer); struct sas_task *task = slow->task; unsigned long flags; spin_lock_irqsave(&task->task_state_lock, flags); if (!(task->task_state_flags & SAS_TASK_STATE_DONE)) task->task_state_flags |= SAS_TASK_ST...
300,277,114,529,588,760,000,000,000,000,000,000,000
sas_expander.c
251,418,024,640,382,320,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2018-20836
An issue was discovered in the Linux kernel before 4.20. There is a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free.
https://nvd.nist.gov/vuln/detail/CVE-2018-20836
161,377
linux
b90cd6f2b905905fb42671009dc0e27c310a16ae
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/b90cd6f2b905905fb42671009dc0e27c310a16ae
scsi: libsas: fix a race condition when smp task timeout When the lldd is processing the complete sas task in interrupt and set the task stat as SAS_TASK_STATE_DONE, the smp timeout timer is able to be triggered at the same time. And smp_task_timedout() will complete the task wheter the SAS_TASK_STATE_DONE is set or n...
0
static void smp_task_timedout(struct timer_list *t) { struct sas_task_slow *slow = from_timer(slow, t, timer); struct sas_task *task = slow->task; unsigned long flags; spin_lock_irqsave(&task->task_state_lock, flags); if (!(task->task_state_flags & SAS_TASK_STATE_DONE)) { task->task_state_flags |= SAS_TASK_...
278,202,733,767,203,030,000,000,000,000,000,000,000
sas_expander.c
178,098,637,815,964,250,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2018-20836
An issue was discovered in the Linux kernel before 4.20. There is a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free.
https://nvd.nist.gov/vuln/detail/CVE-2018-20836
4,141
linux
c40f7d74c741a907cfaeb73a7697081881c497d0
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c40f7d74c741a907cfaeb73a7697081881c497d0
sched/fair: Fix infinite loop in update_blocked_averages() by reverting a9e7f6544b9c Zhipeng Xie, Xie XiuQi and Sargun Dhillon reported lockups in the scheduler under high loads, starting at around the v4.18 time frame, and Zhipeng Xie tracked it down to bugs in the rq->leaf_cfs_rq_list manipulation. Do a (manual) re...
1
static void update_blocked_averages(int cpu) { struct rq *rq = cpu_rq(cpu); struct cfs_rq *cfs_rq, *pos; const struct sched_class *curr_class; struct rq_flags rf; bool done = true; rq_lock_irqsave(rq, &rf); update_rq_clock(rq); /* * Iterates the task_group tree in a bottom up fashion, see * list_a...
242,733,069,005,675,960,000,000,000,000,000,000,000
fair.c
71,919,484,539,312,920,000,000,000,000,000,000,000
[ "CWE-400" ]
CVE-2018-20784
In the Linux kernel before 4.20.2, kernel/sched/fair.c mishandles leaf cfs_rq's, which allows attackers to cause a denial of service (infinite loop in update_blocked_averages) or possibly have unspecified other impact by inducing a high load.
https://nvd.nist.gov/vuln/detail/CVE-2018-20784
161,380
linux
c40f7d74c741a907cfaeb73a7697081881c497d0
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c40f7d74c741a907cfaeb73a7697081881c497d0
sched/fair: Fix infinite loop in update_blocked_averages() by reverting a9e7f6544b9c Zhipeng Xie, Xie XiuQi and Sargun Dhillon reported lockups in the scheduler under high loads, starting at around the v4.18 time frame, and Zhipeng Xie tracked it down to bugs in the rq->leaf_cfs_rq_list manipulation. Do a (manual) re...
0
static void update_blocked_averages(int cpu) { struct rq *rq = cpu_rq(cpu); struct cfs_rq *cfs_rq; const struct sched_class *curr_class; struct rq_flags rf; bool done = true; rq_lock_irqsave(rq, &rf); update_rq_clock(rq); /* * Iterates the task_group tree in a bottom up fashion, see * list_add_lea...
82,250,912,236,639,870,000,000,000,000,000,000,000
fair.c
120,169,292,865,537,350,000,000,000,000,000,000,000
[ "CWE-400" ]
CVE-2018-20784
In the Linux kernel before 4.20.2, kernel/sched/fair.c mishandles leaf cfs_rq's, which allows attackers to cause a denial of service (infinite loop in update_blocked_averages) or possibly have unspecified other impact by inducing a high load.
https://nvd.nist.gov/vuln/detail/CVE-2018-20784
4,142
gpac
1c449a34fe0b50aaffb881bfb9d7c5ab0bb18cdd
https://github.com/gpac/gpac
https://github.com/gpac/gpac/commit/1c449a34fe0b50aaffb881bfb9d7c5ab0bb18cdd
add some boundary checks on gf_text_get_utf8_line (#1188)
1
int mp4client_main(int argc, char **argv) { char c; const char *str; int ret_val = 0; u32 i, times[100], nb_times, dump_mode; u32 simulation_time_in_ms = 0; u32 initial_service_id = 0; Bool auto_exit = GF_FALSE; Bool logs_set = GF_FALSE; Bool start_fs = GF_FALSE; Bool use_rtix = GF_FALSE; Bool pause_at_first...
33,731,538,446,325,954,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2018-20763
In GPAC 0.7.1 and earlier, gf_text_get_utf8_line in media_tools/text_import.c in libgpac_static.a allows an out-of-bounds write because of missing szLineConv bounds checking.
https://nvd.nist.gov/vuln/detail/CVE-2018-20763
161,381
gpac
1c449a34fe0b50aaffb881bfb9d7c5ab0bb18cdd
https://github.com/gpac/gpac
https://github.com/gpac/gpac/commit/1c449a34fe0b50aaffb881bfb9d7c5ab0bb18cdd
add some boundary checks on gf_text_get_utf8_line (#1188)
0
int mp4client_main(int argc, char **argv) { char c; const char *str; int ret_val = 0; u32 i, times[100], nb_times, dump_mode; u32 simulation_time_in_ms = 0; u32 initial_service_id = 0; Bool auto_exit = GF_FALSE; Bool logs_set = GF_FALSE; Bool start_fs = GF_FALSE; Bool use_rtix = GF_FALSE; Bool pause_at_first...
168,088,242,868,606,200,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2018-20763
In GPAC 0.7.1 and earlier, gf_text_get_utf8_line in media_tools/text_import.c in libgpac_static.a allows an out-of-bounds write because of missing szLineConv bounds checking.
https://nvd.nist.gov/vuln/detail/CVE-2018-20763
4,143
gpac
35ab4475a7df9b2a4bcab235e379c0c3ec543658
https://github.com/gpac/gpac
https://github.com/gpac/gpac/commit/35ab4475a7df9b2a4bcab235e379c0c3ec543658
fix some overflows due to strcpy fixes #1184, #1186, #1187 among other things
1
GF_Err cat_multiple_files(GF_ISOFile *dest, char *fileName, u32 import_flags, Double force_fps, u32 frames_per_sample, char *tmp_dir, Bool force_cat, Bool align_timelines, Bool allow_add_in_command) { CATEnum cat_enum; char *sep; cat_enum.dest = dest; cat_enum.import_flags = import_flags; cat_enum.force_fps = for...
184,974,595,979,520,000,000,000,000,000,000,000,000
fileimport.c
215,039,272,518,635,600,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-20761
GPAC version 0.7.1 and earlier has a Buffer Overflow vulnerability in the gf_sm_load_init function in scene_manager.c in libgpac_static.a.
https://nvd.nist.gov/vuln/detail/CVE-2018-20761
161,382
gpac
35ab4475a7df9b2a4bcab235e379c0c3ec543658
https://github.com/gpac/gpac
https://github.com/gpac/gpac/commit/35ab4475a7df9b2a4bcab235e379c0c3ec543658
fix some overflows due to strcpy fixes #1184, #1186, #1187 among other things
0
GF_Err cat_multiple_files(GF_ISOFile *dest, char *fileName, u32 import_flags, Double force_fps, u32 frames_per_sample, char *tmp_dir, Bool force_cat, Bool align_timelines, Bool allow_add_in_command) { CATEnum cat_enum; char *sep; cat_enum.dest = dest; cat_enum.import_flags = import_flags; cat_enum.force_fps = for...
93,042,088,020,180,560,000,000,000,000,000,000,000
fileimport.c
162,158,034,306,373,570,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-20761
GPAC version 0.7.1 and earlier has a Buffer Overflow vulnerability in the gf_sm_load_init function in scene_manager.c in libgpac_static.a.
https://nvd.nist.gov/vuln/detail/CVE-2018-20761
4,147
gpac
35ab4475a7df9b2a4bcab235e379c0c3ec543658
https://github.com/gpac/gpac
https://github.com/gpac/gpac/commit/35ab4475a7df9b2a4bcab235e379c0c3ec543658
fix some overflows due to strcpy fixes #1184, #1186, #1187 among other things
1
GF_Err gf_sm_load_init(GF_SceneLoader *load) { GF_Err e = GF_NOT_SUPPORTED; char *ext, szExt[50]; /*we need at least a scene graph*/ if (!load || (!load->ctx && !load->scene_graph) #ifndef GPAC_DISABLE_ISOM || (!load->fileName && !load->isom && !(load->flags & GF_SM_LOAD_FOR_PLAYBACK) ) #endif ) return...
297,086,645,771,880,500,000,000,000,000,000,000,000
scene_manager.c
72,644,650,139,823,230,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-20761
GPAC version 0.7.1 and earlier has a Buffer Overflow vulnerability in the gf_sm_load_init function in scene_manager.c in libgpac_static.a.
https://nvd.nist.gov/vuln/detail/CVE-2018-20761
161,385
gpac
35ab4475a7df9b2a4bcab235e379c0c3ec543658
https://github.com/gpac/gpac
https://github.com/gpac/gpac/commit/35ab4475a7df9b2a4bcab235e379c0c3ec543658
fix some overflows due to strcpy fixes #1184, #1186, #1187 among other things
0
GF_Err gf_sm_load_init(GF_SceneLoader *load) { GF_Err e = GF_NOT_SUPPORTED; char *ext, szExt[50]; /*we need at least a scene graph*/ if (!load || (!load->ctx && !load->scene_graph) #ifndef GPAC_DISABLE_ISOM || (!load->fileName && !load->isom && !(load->flags & GF_SM_LOAD_FOR_PLAYBACK) ) #endif ) return...
144,439,695,720,800,540,000,000,000,000,000,000,000
scene_manager.c
340,230,047,790,908,450,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-20761
GPAC version 0.7.1 and earlier has a Buffer Overflow vulnerability in the gf_sm_load_init function in scene_manager.c in libgpac_static.a.
https://nvd.nist.gov/vuln/detail/CVE-2018-20761
4,149
rdesktop
4dca546d04321a610c1835010b5dad85163b65e1
https://github.com/rdesktop/rdesktop
https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
Malicious RDP server security fixes This commit includes fixes for a set of 21 vulnerabilities in rdesktop when a malicious RDP server is used. All vulnerabilities was identified and reported by Eyal Itkin. * Add rdp_protocol_error function that is used in several fixes * Refactor of process_bitmap_updates * Fix ...
1
process_plane(uint8 * in, int width, int height, uint8 * out, int size) { UNUSED(size); int indexw; int indexh; int code; int collen; int replen; int color; int x; int revcode; uint8 * last_line; uint8 * this_line; uint8 * org_in; uint8 * org_out; org_in = in; org_out = out; last_line = 0; indexh = 0;...
243,072,446,217,366,000,000,000,000,000,000,000,000
bitmap.c
298,040,105,414,695,750,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-8799
rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function process_secondary_order() that results in a Denial of Service (segfault).
https://nvd.nist.gov/vuln/detail/CVE-2018-8799
161,387
rdesktop
4dca546d04321a610c1835010b5dad85163b65e1
https://github.com/rdesktop/rdesktop
https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
Malicious RDP server security fixes This commit includes fixes for a set of 21 vulnerabilities in rdesktop when a malicious RDP server is used. All vulnerabilities was identified and reported by Eyal Itkin. * Add rdp_protocol_error function that is used in several fixes * Refactor of process_bitmap_updates * Fix ...
0
process_plane(uint8 * in, int width, int height, uint8 * out, int size) { UNUSED(size); int indexw; int indexh; int code; int collen; int replen; int color; int x; int revcode; uint8 * last_line; uint8 * this_line; uint8 * org_in; uint8 * org_out; org_in = in; org_out = out; last_line = 0; indexh = 0;...
233,589,960,412,521,700,000,000,000,000,000,000,000
bitmap.c
32,536,846,353,251,934,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-8799
rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function process_secondary_order() that results in a Denial of Service (segfault).
https://nvd.nist.gov/vuln/detail/CVE-2018-8799
4,151
rdesktop
4dca546d04321a610c1835010b5dad85163b65e1
https://github.com/rdesktop/rdesktop
https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
Malicious RDP server security fixes This commit includes fixes for a set of 21 vulnerabilities in rdesktop when a malicious RDP server is used. All vulnerabilities was identified and reported by Eyal Itkin. * Add rdp_protocol_error function that is used in several fixes * Refactor of process_bitmap_updates * Fix ...
1
cssp_read_tsrequest(STREAM token, STREAM pubkey) { STREAM s; int length; int tagval; s = tcp_recv(NULL, 4); if (s == NULL) return False; if (s->p[0] != (BER_TAG_SEQUENCE | BER_TAG_CONSTRUCTED)) { logger(Protocol, Error, "cssp_read_tsrequest(), expected BER_TAG_SEQUENCE|BER_TAG_CONSTRUCTED, ...
154,298,624,846,793,850,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2018-8799
rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function process_secondary_order() that results in a Denial of Service (segfault).
https://nvd.nist.gov/vuln/detail/CVE-2018-8799
161,389
rdesktop
4dca546d04321a610c1835010b5dad85163b65e1
https://github.com/rdesktop/rdesktop
https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
Malicious RDP server security fixes This commit includes fixes for a set of 21 vulnerabilities in rdesktop when a malicious RDP server is used. All vulnerabilities was identified and reported by Eyal Itkin. * Add rdp_protocol_error function that is used in several fixes * Refactor of process_bitmap_updates * Fix ...
0
cssp_read_tsrequest(STREAM token, STREAM pubkey) { STREAM s; int length; int tagval; struct stream packet; s = tcp_recv(NULL, 4); if (s == NULL) return False; if (s->p[0] != (BER_TAG_SEQUENCE | BER_TAG_CONSTRUCTED)) { logger(Protocol, Error, "cssp_read_tsrequest(), expected BER_TAG_SEQUENC...
250,570,883,717,841,500,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2018-8799
rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function process_secondary_order() that results in a Denial of Service (segfault).
https://nvd.nist.gov/vuln/detail/CVE-2018-8799
4,154
rdesktop
4dca546d04321a610c1835010b5dad85163b65e1
https://github.com/rdesktop/rdesktop
https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
Malicious RDP server security fixes This commit includes fixes for a set of 21 vulnerabilities in rdesktop when a malicious RDP server is used. All vulnerabilities was identified and reported by Eyal Itkin. * Add rdp_protocol_error function that is used in several fixes * Refactor of process_bitmap_updates * Fix ...
1
process_bitmap_updates(STREAM s) { uint16 num_updates; uint16 left, top, right, bottom, width, height; uint16 cx, cy, bpp, Bpp, compress, bufsize, size; uint8 *data, *bmpdata; int i; logger(Protocol, Debug, "%s()", __func__); in_uint16_le(s, num_updates); for (i = 0; i < num_updates; i++) { in_uint16...
255,073,384,789,805,870,000,000,000,000,000,000,000
rdp.c
177,705,998,885,746,530,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-8799
rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function process_secondary_order() that results in a Denial of Service (segfault).
https://nvd.nist.gov/vuln/detail/CVE-2018-8799
161,392
rdesktop
4dca546d04321a610c1835010b5dad85163b65e1
https://github.com/rdesktop/rdesktop
https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
Malicious RDP server security fixes This commit includes fixes for a set of 21 vulnerabilities in rdesktop when a malicious RDP server is used. All vulnerabilities was identified and reported by Eyal Itkin. * Add rdp_protocol_error function that is used in several fixes * Refactor of process_bitmap_updates * Fix ...
0
process_bitmap_updates(STREAM s) /* Process TS_BITMAP_DATA */ static void process_bitmap_data(STREAM s) { uint16 left, top, right, bottom, width, height; uint16 cx, cy, bpp, Bpp, flags, bufsize, size; uint8 *data, *bmpdata; logger(Protocol, Debug, "%s()", __func__); struct stream packet = *s; in_uint16_...
298,197,954,642,949,130,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2018-8799
rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function process_secondary_order() that results in a Denial of Service (segfault).
https://nvd.nist.gov/vuln/detail/CVE-2018-8799
4,155
rdesktop
4dca546d04321a610c1835010b5dad85163b65e1
https://github.com/rdesktop/rdesktop
https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
Malicious RDP server security fixes This commit includes fixes for a set of 21 vulnerabilities in rdesktop when a malicious RDP server is used. All vulnerabilities was identified and reported by Eyal Itkin. * Add rdp_protocol_error function that is used in several fixes * Refactor of process_bitmap_updates * Fix ...
1
process_demand_active(STREAM s) { uint8 type; uint16 len_src_descriptor, len_combined_caps; /* at this point we need to ensure that we have ui created */ rd_create_ui(); in_uint32_le(s, g_rdp_shareid); in_uint16_le(s, len_src_descriptor); in_uint16_le(s, len_combined_caps); in_uint8s(s, len_src_des...
50,427,493,118,138,860,000,000,000,000,000,000,000
rdp.c
177,705,998,885,746,530,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-8799
rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function process_secondary_order() that results in a Denial of Service (segfault).
https://nvd.nist.gov/vuln/detail/CVE-2018-8799
161,393
rdesktop
4dca546d04321a610c1835010b5dad85163b65e1
https://github.com/rdesktop/rdesktop
https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
Malicious RDP server security fixes This commit includes fixes for a set of 21 vulnerabilities in rdesktop when a malicious RDP server is used. All vulnerabilities was identified and reported by Eyal Itkin. * Add rdp_protocol_error function that is used in several fixes * Refactor of process_bitmap_updates * Fix ...
0
process_demand_active(STREAM s) { uint8 type; uint16 len_src_descriptor, len_combined_caps; struct stream packet = *s; /* at this point we need to ensure that we have ui created */ rd_create_ui(); in_uint32_le(s, g_rdp_shareid); in_uint16_le(s, len_src_descriptor); in_uint16_le(s, len_combined_caps)...
184,781,662,968,541,300,000,000,000,000,000,000,000
rdp.c
103,974,296,073,739,700,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-8799
rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function process_secondary_order() that results in a Denial of Service (segfault).
https://nvd.nist.gov/vuln/detail/CVE-2018-8799
4,156
rdesktop
4dca546d04321a610c1835010b5dad85163b65e1
https://github.com/rdesktop/rdesktop
https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
Malicious RDP server security fixes This commit includes fixes for a set of 21 vulnerabilities in rdesktop when a malicious RDP server is used. All vulnerabilities was identified and reported by Eyal Itkin. * Add rdp_protocol_error function that is used in several fixes * Refactor of process_bitmap_updates * Fix ...
1
rdp_in_unistr(STREAM s, int in_len, char **string, uint32 * str_size) { static iconv_t icv_utf16_to_local; size_t ibl, obl; char *pin, *pout; if (!icv_utf16_to_local) { icv_utf16_to_local = iconv_open(g_codepage, WINDOWS_CODEPAGE); if (icv_utf16_to_local == (iconv_t) - 1) { logger(Protocol, Error, "...
87,473,831,233,998,540,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2018-8799
rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function process_secondary_order() that results in a Denial of Service (segfault).
https://nvd.nist.gov/vuln/detail/CVE-2018-8799
161,394
rdesktop
4dca546d04321a610c1835010b5dad85163b65e1
https://github.com/rdesktop/rdesktop
https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
Malicious RDP server security fixes This commit includes fixes for a set of 21 vulnerabilities in rdesktop when a malicious RDP server is used. All vulnerabilities was identified and reported by Eyal Itkin. * Add rdp_protocol_error function that is used in several fixes * Refactor of process_bitmap_updates * Fix ...
0
rdp_in_unistr(STREAM s, int in_len, char **string, uint32 * str_size) { static iconv_t icv_utf16_to_local; size_t ibl, obl; char *pin, *pout; struct stream packet = *s; if ((in_len < 0) || ((uint32)in_len >= (RD_UINT32_MAX / 2))) { logger(Protocol, Error, "rdp_in_unistr(), length of unicode data is out of ...
152,983,717,312,745,780,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2018-8799
rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function process_secondary_order() that results in a Denial of Service (segfault).
https://nvd.nist.gov/vuln/detail/CVE-2018-8799
4,157
rdesktop
4dca546d04321a610c1835010b5dad85163b65e1
https://github.com/rdesktop/rdesktop
https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
Malicious RDP server security fixes This commit includes fixes for a set of 21 vulnerabilities in rdesktop when a malicious RDP server is used. All vulnerabilities was identified and reported by Eyal Itkin. * Add rdp_protocol_error function that is used in several fixes * Refactor of process_bitmap_updates * Fix ...
1
rdpdr_process(STREAM s) { uint32 handle; uint16 vmin; uint16 component; uint16 pakid; logger(Protocol, Debug, "rdpdr_process()"); /* hexdump(s->p, s->end - s->p); */ in_uint16(s, component); in_uint16(s, pakid); if (component == RDPDR_CTYP_CORE) { switch (pakid) { case PAKID_CORE_DEVICE_IOREQU...
130,790,675,046,993,960,000,000,000,000,000,000,000
rdpdr.c
63,172,116,204,848,340,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-8799
rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function process_secondary_order() that results in a Denial of Service (segfault).
https://nvd.nist.gov/vuln/detail/CVE-2018-8799
161,395
rdesktop
4dca546d04321a610c1835010b5dad85163b65e1
https://github.com/rdesktop/rdesktop
https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
Malicious RDP server security fixes This commit includes fixes for a set of 21 vulnerabilities in rdesktop when a malicious RDP server is used. All vulnerabilities was identified and reported by Eyal Itkin. * Add rdp_protocol_error function that is used in several fixes * Refactor of process_bitmap_updates * Fix ...
0
rdpdr_process(STREAM s) { uint32 handle; uint16 vmin; uint16 component; uint16 pakid; struct stream packet = *s; logger(Protocol, Debug, "rdpdr_process()"); /* hexdump(s->p, s->end - s->p); */ in_uint16(s, component); in_uint16(s, pakid); if (component == RDPDR_CTYP_CORE) { switch (pakid) { c...
139,505,307,156,969,320,000,000,000,000,000,000,000
rdpdr.c
122,373,306,423,667,240,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-8799
rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function process_secondary_order() that results in a Denial of Service (segfault).
https://nvd.nist.gov/vuln/detail/CVE-2018-8799
4,159
rdesktop
4dca546d04321a610c1835010b5dad85163b65e1
https://github.com/rdesktop/rdesktop
https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
Malicious RDP server security fixes This commit includes fixes for a set of 21 vulnerabilities in rdesktop when a malicious RDP server is used. All vulnerabilities was identified and reported by Eyal Itkin. * Add rdp_protocol_error function that is used in several fixes * Refactor of process_bitmap_updates * Fix ...
1
seamless_process(STREAM s) { unsigned int pkglen; char *buf; pkglen = s->end - s->p; /* str_handle_lines requires null terminated strings */ buf = xmalloc(pkglen + 1); STRNCPY(buf, (char *) s->p, pkglen + 1); str_handle_lines(buf, &seamless_rest, seamless_line_handler, NULL); xfree(buf); }
58,925,099,420,725,390,000,000,000,000,000,000,000
seamless.c
132,321,470,131,883,330,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-8799
rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function process_secondary_order() that results in a Denial of Service (segfault).
https://nvd.nist.gov/vuln/detail/CVE-2018-8799
161,397
rdesktop
4dca546d04321a610c1835010b5dad85163b65e1
https://github.com/rdesktop/rdesktop
https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
Malicious RDP server security fixes This commit includes fixes for a set of 21 vulnerabilities in rdesktop when a malicious RDP server is used. All vulnerabilities was identified and reported by Eyal Itkin. * Add rdp_protocol_error function that is used in several fixes * Refactor of process_bitmap_updates * Fix ...
0
seamless_process(STREAM s) { unsigned int pkglen; char *buf; struct stream packet = *s; if (!s_check(s)) { rdp_protocol_error("seamless_process(), stream is in unstable state", &packet); } pkglen = s->end - s->p; /* str_handle_lines requires null terminated strings */ buf = xmalloc(pkglen + 1); STRN...
238,895,251,763,442,230,000,000,000,000,000,000,000
seamless.c
95,747,929,786,246,930,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-8799
rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function process_secondary_order() that results in a Denial of Service (segfault).
https://nvd.nist.gov/vuln/detail/CVE-2018-8799
9,631
rdesktop
4dca546d04321a610c1835010b5dad85163b65e1
https://github.com/rdesktop/rdesktop
https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
Malicious RDP server security fixes This commit includes fixes for a set of 21 vulnerabilities in rdesktop when a malicious RDP server is used. All vulnerabilities was identified and reported by Eyal Itkin. * Add rdp_protocol_error function that is used in several fixes * Refactor of process_bitmap_updates * Fix ...
1
lspci_process(STREAM s) { unsigned int pkglen; static char *rest = NULL; char *buf; pkglen = s->end - s->p; /* str_handle_lines requires null terminated strings */ buf = xmalloc(pkglen + 1); STRNCPY(buf, (char *) s->p, pkglen + 1); str_handle_lines(buf, &rest, lspci_process_line, NULL); xfree(buf); }
209,920,996,478,819,600,000,000,000,000,000,000,000
lspci.c
74,336,506,313,865,020,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-8799
rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function process_secondary_order() that results in a Denial of Service (segfault).
https://nvd.nist.gov/vuln/detail/CVE-2018-8799
184,700
rdesktop
4dca546d04321a610c1835010b5dad85163b65e1
https://github.com/rdesktop/rdesktop
https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
Malicious RDP server security fixes This commit includes fixes for a set of 21 vulnerabilities in rdesktop when a malicious RDP server is used. All vulnerabilities was identified and reported by Eyal Itkin. * Add rdp_protocol_error function that is used in several fixes * Refactor of process_bitmap_updates * Fix ...
0
lspci_process(STREAM s) { unsigned int pkglen; static char *rest = NULL; char *buf; struct stream packet = *s; if (!s_check(s)) { rdp_protocol_error("lspci_process(), stream is in unstable state", &packet); } pkglen = s->end - s->p; /* str_handle_lines requires null terminated strings */ buf = xmall...
3,778,535,898,656,608,600,000,000,000,000,000,000
lspci.c
65,418,183,944,373,280,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-8799
rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function process_secondary_order() that results in a Denial of Service (segfault).
https://nvd.nist.gov/vuln/detail/CVE-2018-8799
9,632
rdesktop
4dca546d04321a610c1835010b5dad85163b65e1
https://github.com/rdesktop/rdesktop
https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
Malicious RDP server security fixes This commit includes fixes for a set of 21 vulnerabilities in rdesktop when a malicious RDP server is used. All vulnerabilities was identified and reported by Eyal Itkin. * Add rdp_protocol_error function that is used in several fixes * Refactor of process_bitmap_updates * Fix ...
1
process_secondary_order(STREAM s) { /* The length isn't calculated correctly by the server. * For very compact orders the length becomes negative * so a signed integer must be used. */ uint16 length; uint16 flags; uint8 type; uint8 *next_order; in_uint16_le(s, length); in_uint16_le(s, flags); /* used ...
155,193,719,227,379,600,000,000,000,000,000,000,000
orders.c
24,108,224,018,686,034,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-8799
rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function process_secondary_order() that results in a Denial of Service (segfault).
https://nvd.nist.gov/vuln/detail/CVE-2018-8799
184,701
rdesktop
4dca546d04321a610c1835010b5dad85163b65e1
https://github.com/rdesktop/rdesktop
https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
Malicious RDP server security fixes This commit includes fixes for a set of 21 vulnerabilities in rdesktop when a malicious RDP server is used. All vulnerabilities was identified and reported by Eyal Itkin. * Add rdp_protocol_error function that is used in several fixes * Refactor of process_bitmap_updates * Fix ...
0
process_secondary_order(STREAM s) { /* The length isn't calculated correctly by the server. * For very compact orders the length becomes negative * so a signed integer must be used. */ uint16 length; uint16 flags; uint8 type; uint8 *next_order; struct stream packet = *s; in_uint16_le(s, length); in_u...
22,344,585,920,528,400,000,000,000,000,000,000,000
orders.c
264,776,853,468,261,180,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-8799
rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function process_secondary_order() that results in a Denial of Service (segfault).
https://nvd.nist.gov/vuln/detail/CVE-2018-8799
9,633
rdesktop
4dca546d04321a610c1835010b5dad85163b65e1
https://github.com/rdesktop/rdesktop
https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
Malicious RDP server security fixes This commit includes fixes for a set of 21 vulnerabilities in rdesktop when a malicious RDP server is used. All vulnerabilities was identified and reported by Eyal Itkin. * Add rdp_protocol_error function that is used in several fixes * Refactor of process_bitmap_updates * Fix ...
1
rdpsnddbg_process(STREAM s) { unsigned int pkglen; static char *rest = NULL; char *buf; pkglen = s->end - s->p; /* str_handle_lines requires null terminated strings */ buf = (char *) xmalloc(pkglen + 1); STRNCPY(buf, (char *) s->p, pkglen + 1); str_handle_lines(buf, &rest, rdpsnddbg_line_handler, NULL);...
88,148,949,623,728,080,000,000,000,000,000,000,000
rdpsnd.c
318,702,186,162,208,240,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-8799
rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function process_secondary_order() that results in a Denial of Service (segfault).
https://nvd.nist.gov/vuln/detail/CVE-2018-8799
184,702
rdesktop
4dca546d04321a610c1835010b5dad85163b65e1
https://github.com/rdesktop/rdesktop
https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
Malicious RDP server security fixes This commit includes fixes for a set of 21 vulnerabilities in rdesktop when a malicious RDP server is used. All vulnerabilities was identified and reported by Eyal Itkin. * Add rdp_protocol_error function that is used in several fixes * Refactor of process_bitmap_updates * Fix ...
0
rdpsnddbg_process(STREAM s) { unsigned int pkglen; static char *rest = NULL; char *buf; if (!s_check(s)) { rdp_protocol_error("rdpsnddbg_process(), stream is in unstable state", s); } pkglen = s->end - s->p; /* str_handle_lines requires null terminated strings */ buf = (char *) xmalloc(pkglen + 1); ...
238,085,256,603,923,300,000,000,000,000,000,000,000
rdpsnd.c
120,073,401,828,647,780,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-8799
rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function process_secondary_order() that results in a Denial of Service (segfault).
https://nvd.nist.gov/vuln/detail/CVE-2018-8799
4,163
tcpdump
24182d959f661327525a20d9a94c98a8ec016778
https://github.com/the-tcpdump-group/tcpdump
https://github.com/the-tcpdump-group/tcpdump/commit/24182d959f661327525a20d9a94c98a8ec016778
(for 4.9.3) CVE-2018-16452/SMB: prevent stack exhaustion Enforce a limit on how many times smb_fdata() can recurse. This fixes a stack exhaustion discovered by Include Security working under the Mozilla SOS program in 2018 by means of code audit.
1
smb_fdata(netdissect_options *ndo, const u_char *buf, const char *fmt, const u_char *maxbuf, int unicodestr) { static int depth = 0; char s[128]; char *p; while (*fmt) { switch (*fmt) { case '*': fmt++; while (buf < maxbuf) { const u_char *buf2; depth++; buf2 = ...
244,595,164,974,697,600,000,000,000,000,000,000,000
smbutil.c
40,949,174,088,914,413,000,000,000,000,000,000,000
[ "CWE-674" ]
CVE-2018-16452
The SMB parser in tcpdump before 4.9.3 has stack exhaustion in smbutil.c:smb_fdata() via recursion.
https://nvd.nist.gov/vuln/detail/CVE-2018-16452