idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
161,524 | radare2 | d21e91f075a7a7a8ed23baa5c1bb1fac48313882 | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/d21e91f075a7a7a8ed23baa5c1bb1fac48313882 | Fix #8764 differently since ptr diff might not fit in ptrdiff_t | 0 | static Sdb *store_versioninfo_gnu_verdef(ELFOBJ *bin, Elf_(Shdr) *shdr, int sz) {
const char *section_name = "";
const char *link_section_name = "";
char *end = NULL;
Elf_(Shdr) *link_shdr = NULL;
ut8 dfs[sizeof (Elf_(Verdef))] = {0};
Sdb *sdb;
int cnt, i;
if (shdr->sh_link > bin->ehdr.e_shnum) {
return false... | 113,707,833,717,209,430,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2017-16359 | In radare 2.0.1, a pointer wraparound vulnerability exists in store_versioninfo_gnu_verdef() in libr/bin/format/elf/elf.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-16359 |
4,327 | radare2 | fbaf24bce7ea4211e4608b3ab6c1b45702cb243d | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/fbaf24bce7ea4211e4608b3ab6c1b45702cb243d | Fix #8764 a 3rd time since 2nd time is UB and can be optimized away | 1 | static Sdb *store_versioninfo_gnu_verdef(ELFOBJ *bin, Elf_(Shdr) *shdr, int sz) {
const char *section_name = "";
const char *link_section_name = "";
char *end = NULL;
Elf_(Shdr) *link_shdr = NULL;
ut8 dfs[sizeof (Elf_(Verdef))] = {0};
Sdb *sdb;
int cnt, i;
if (shdr->sh_link > bin->ehdr.e_shnum) {
return false... | 49,750,649,927,320,680,000,000,000,000,000,000,000 | elf.c | 82,792,017,403,717,510,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2017-16359 | In radare 2.0.1, a pointer wraparound vulnerability exists in store_versioninfo_gnu_verdef() in libr/bin/format/elf/elf.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-16359 |
161,525 | radare2 | fbaf24bce7ea4211e4608b3ab6c1b45702cb243d | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/fbaf24bce7ea4211e4608b3ab6c1b45702cb243d | Fix #8764 a 3rd time since 2nd time is UB and can be optimized away | 0 | static Sdb *store_versioninfo_gnu_verdef(ELFOBJ *bin, Elf_(Shdr) *shdr, int sz) {
const char *section_name = "";
const char *link_section_name = "";
char *end = NULL;
Elf_(Shdr) *link_shdr = NULL;
ut8 dfs[sizeof (Elf_(Verdef))] = {0};
Sdb *sdb;
int cnt, i;
if (shdr->sh_link > bin->ehdr.e_shnum) {
return false... | 138,571,086,863,991,090,000,000,000,000,000,000,000 | elf.c | 26,207,377,001,347,442,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2017-16359 | In radare 2.0.1, a pointer wraparound vulnerability exists in store_versioninfo_gnu_verdef() in libr/bin/format/elf/elf.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-16359 |
4,329 | ImageMagick | 04a567494786d5bb50894fc8bb8fea0cf496bea8 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/04a567494786d5bb50894fc8bb8fea0cf496bea8 | Slightly different fix for #714 | 1 | static MagickBooleanType ReadPSDLayersInternal(Image *image,
const ImageInfo *image_info,const PSDInfo *psd_info,
const MagickBooleanType skip_layers,ExceptionInfo *exception)
{
char
type[4];
LayerInfo
*layer_info;
MagickSizeType
size;
MagickBooleanType
status;
register ssize_t
i;
... | 272,298,623,691,895,300,000,000,000,000,000,000,000 | psd.c | 10,373,962,997,159,750,000,000,000,000,000,000,000 | [
"CWE-834"
] | CVE-2017-14174 | In coders/psd.c in ImageMagick 7.0.7-0 Q16, a DoS in ReadPSDLayersInternal() due to lack of an EOF (End of File) check might cause huge CPU consumption. When a crafted PSD file, which claims a large "length" field in the header but does not contain sufficient backing data, is provided, the loop over "length" would cons... | https://nvd.nist.gov/vuln/detail/CVE-2017-14174 |
161,526 | ImageMagick | 04a567494786d5bb50894fc8bb8fea0cf496bea8 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/04a567494786d5bb50894fc8bb8fea0cf496bea8 | Slightly different fix for #714 | 0 | static MagickBooleanType ReadPSDLayersInternal(Image *image,
const ImageInfo *image_info,const PSDInfo *psd_info,
const MagickBooleanType skip_layers,ExceptionInfo *exception)
{
char
type[4];
LayerInfo
*layer_info;
MagickSizeType
size;
MagickBooleanType
status;
register ssize_t
i;
... | 182,085,283,561,600,230,000,000,000,000,000,000,000 | psd.c | 87,337,031,620,871,340,000,000,000,000,000,000,000 | [
"CWE-834"
] | CVE-2017-14174 | In coders/psd.c in ImageMagick 7.0.7-0 Q16, a DoS in ReadPSDLayersInternal() due to lack of an EOF (End of File) check might cause huge CPU consumption. When a crafted PSD file, which claims a large "length" field in the header but does not contain sufficient backing data, is provided, the loop over "length" would cons... | https://nvd.nist.gov/vuln/detail/CVE-2017-14174 |
4,337 | tcpdump | 29e5470e6ab84badbc31f4532bb7554a796d9d52 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/29e5470e6ab84badbc31f4532bb7554a796d9d52 | CVE-2017-13028/BOOTP: Add a bounds check before fetching data
This fixes a buffer over-read discovered by Bhargava Shastry,
SecT/TU Berlin.
Add a test using the capture file supplied by the reporter(s), modified
so the capture file won't cause 'tcpdump: pcap_loop: truncated dump file' | 1 | bootp_print(netdissect_options *ndo,
register const u_char *cp, u_int length)
{
register const struct bootp *bp;
static const u_char vm_cmu[4] = VM_CMU;
static const u_char vm_rfc1048[4] = VM_RFC1048;
bp = (const struct bootp *)cp;
ND_TCHECK(bp->bp_op);
ND_PRINT((ndo, "BOOTP/DHCP, %s",
tok2str(bootp_op... | 177,049,373,499,157,830,000,000,000,000,000,000,000 | print-bootp.c | 159,087,126,255,627,960,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-13028 | The BOOTP parser in tcpdump before 4.9.2 has a buffer over-read in print-bootp.c:bootp_print(). | https://nvd.nist.gov/vuln/detail/CVE-2017-13028 |
161,530 | tcpdump | 29e5470e6ab84badbc31f4532bb7554a796d9d52 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/29e5470e6ab84badbc31f4532bb7554a796d9d52 | CVE-2017-13028/BOOTP: Add a bounds check before fetching data
This fixes a buffer over-read discovered by Bhargava Shastry,
SecT/TU Berlin.
Add a test using the capture file supplied by the reporter(s), modified
so the capture file won't cause 'tcpdump: pcap_loop: truncated dump file' | 0 | bootp_print(netdissect_options *ndo,
register const u_char *cp, u_int length)
{
register const struct bootp *bp;
static const u_char vm_cmu[4] = VM_CMU;
static const u_char vm_rfc1048[4] = VM_RFC1048;
bp = (const struct bootp *)cp;
ND_TCHECK(bp->bp_op);
ND_PRINT((ndo, "BOOTP/DHCP, %s",
tok2str(bootp_op... | 220,568,402,914,638,800,000,000,000,000,000,000,000 | print-bootp.c | 52,352,827,576,130,850,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-13028 | The BOOTP parser in tcpdump before 4.9.2 has a buffer over-read in print-bootp.c:bootp_print(). | https://nvd.nist.gov/vuln/detail/CVE-2017-13028 |
4,338 | tcpdump | 42073d54c53a496be40ae84152bbfe2c923ac7bc | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/42073d54c53a496be40ae84152bbfe2c923ac7bc | CVE-2017-13004/Juniper: Add a bounds check.
This fixes a buffer over-read discovered by Forcepoint's security
researchers Otto Airamo & Antti Levomäki.
Add tests using the capture files supplied by the reporter(s). | 1 | juniper_parse_header(netdissect_options *ndo,
const u_char *p, const struct pcap_pkthdr *h, struct juniper_l2info_t *l2info)
{
const struct juniper_cookie_table_t *lp = juniper_cookie_table;
u_int idx, jnx_ext_len, jnx_header_len = 0;
uint8_t tlv_type,tlv_len;
uint32_t control_word;... | 47,824,677,361,513,335,000,000,000,000,000,000,000 | print-juniper.c | 285,998,041,224,733,920,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-13004 | The Juniper protocols parser in tcpdump before 4.9.2 has a buffer over-read in print-juniper.c:juniper_parse_header(). | https://nvd.nist.gov/vuln/detail/CVE-2017-13004 |
161,531 | tcpdump | 42073d54c53a496be40ae84152bbfe2c923ac7bc | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/42073d54c53a496be40ae84152bbfe2c923ac7bc | CVE-2017-13004/Juniper: Add a bounds check.
This fixes a buffer over-read discovered by Forcepoint's security
researchers Otto Airamo & Antti Levomäki.
Add tests using the capture files supplied by the reporter(s). | 0 | juniper_parse_header(netdissect_options *ndo,
const u_char *p, const struct pcap_pkthdr *h, struct juniper_l2info_t *l2info)
{
const struct juniper_cookie_table_t *lp = juniper_cookie_table;
u_int idx, jnx_ext_len, jnx_header_len = 0;
uint8_t tlv_type,tlv_len;
uint32_t control_word;... | 211,920,252,059,170,600,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2017-13004 | The Juniper protocols parser in tcpdump before 4.9.2 has a buffer over-read in print-juniper.c:juniper_parse_header(). | https://nvd.nist.gov/vuln/detail/CVE-2017-13004 |
4,343 | tcpdump | c6e0531b5def26ecf912e8de6ade86cbdaed3751 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/c6e0531b5def26ecf912e8de6ade86cbdaed3751 | CVE-2017-12899/DECnet: Fix bounds checking.
If we're skipping over padding before the *real* flags, check whether
the real flags are in the captured data before fetching it. This fixes
a buffer over-read discovered by Kamil Frankowicz.
Note one place where we don't need to do bounds checking as it's already
been don... | 1 | decnet_print(netdissect_options *ndo,
register const u_char *ap, register u_int length,
register u_int caplen)
{
register const union routehdr *rhp;
register int mflags;
int dst, src, hops;
u_int nsplen, pktlen;
const u_char *nspp;
if (length < sizeof(struct shorthdr)) {
ND_PRINT((ndo... | 219,860,692,152,115,800,000,000,000,000,000,000,000 | print-decnet.c | 107,306,623,307,408,510,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-12899 | The DECnet parser in tcpdump before 4.9.2 has a buffer over-read in print-decnet.c:decnet_print(). | https://nvd.nist.gov/vuln/detail/CVE-2017-12899 |
161,533 | tcpdump | c6e0531b5def26ecf912e8de6ade86cbdaed3751 | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/c6e0531b5def26ecf912e8de6ade86cbdaed3751 | CVE-2017-12899/DECnet: Fix bounds checking.
If we're skipping over padding before the *real* flags, check whether
the real flags are in the captured data before fetching it. This fixes
a buffer over-read discovered by Kamil Frankowicz.
Note one place where we don't need to do bounds checking as it's already
been don... | 0 | decnet_print(netdissect_options *ndo,
register const u_char *ap, register u_int length,
register u_int caplen)
{
register const union routehdr *rhp;
register int mflags;
int dst, src, hops;
u_int nsplen, pktlen;
const u_char *nspp;
if (length < sizeof(struct shorthdr)) {
ND_PRINT((ndo... | 58,080,337,703,374,665,000,000,000,000,000,000,000 | print-decnet.c | 340,272,304,251,680,200,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-12899 | The DECnet parser in tcpdump before 4.9.2 has a buffer over-read in print-decnet.c:decnet_print(). | https://nvd.nist.gov/vuln/detail/CVE-2017-12899 |
4,346 | cyrus-imapd | 53c4137bd924b954432c6c59da7572c4c5ffa901 | https://github.com/cyrusimap/cyrus-imapd | https://github.com/cyrusimap/cyrus-imapd/commit/53c4137bd924b954432c6c59da7572c4c5ffa901 | imapd: check for isadmin BEFORE parsing sync lines | 1 | static void cmdloop(void)
{
int c;
int usinguid, havepartition, havenamespace, recursive;
static struct buf tag, cmd, arg1, arg2, arg3;
char *p, shut[MAX_MAILBOX_PATH+1], cmdname[100];
const char *err;
const char * commandmintimer;
double commandmintimerd = 0.0;
struct sync_reserve_list ... | 200,822,341,397,563,370,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-12843 | Cyrus IMAP before 3.0.3 allows remote authenticated users to write to arbitrary files via a crafted (1) SYNCAPPLY, (2) SYNCGET or (3) SYNCRESTORE command. | https://nvd.nist.gov/vuln/detail/CVE-2017-12843 |
161,535 | cyrus-imapd | 53c4137bd924b954432c6c59da7572c4c5ffa901 | https://github.com/cyrusimap/cyrus-imapd | https://github.com/cyrusimap/cyrus-imapd/commit/53c4137bd924b954432c6c59da7572c4c5ffa901 | imapd: check for isadmin BEFORE parsing sync lines | 0 | static void cmdloop(void)
{
int c;
int usinguid, havepartition, havenamespace, recursive;
static struct buf tag, cmd, arg1, arg2, arg3;
char *p, shut[MAX_MAILBOX_PATH+1], cmdname[100];
const char *err;
const char * commandmintimer;
double commandmintimerd = 0.0;
struct sync_reserve_list ... | 90,412,593,932,109,100,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-12843 | Cyrus IMAP before 3.0.3 allows remote authenticated users to write to arbitrary files via a crafted (1) SYNCAPPLY, (2) SYNCGET or (3) SYNCRESTORE command. | https://nvd.nist.gov/vuln/detail/CVE-2017-12843 |
4,347 | linux | 2b04e8f6bbb196cab4b232af0f8d48ff2c7a8058 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/2b04e8f6bbb196cab4b232af0f8d48ff2c7a8058 | more bio_map_user_iov() leak fixes
we need to take care of failure exit as well - pages already
in bio should be dropped by analogue of bio_unmap_pages(),
since their refcounts had been bumped only once per reference
in bio.
Cc: stable@vger.kernel.org
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk> | 1 | struct bio *bio_map_user_iov(struct request_queue *q,
const struct iov_iter *iter,
gfp_t gfp_mask)
{
int j;
int nr_pages = 0;
struct page **pages;
struct bio *bio;
int cur_page = 0;
int ret, offset;
struct iov_iter i;
struct iovec iov;
iov_for_each(iov, i, *iter) {
unsigned long uaddr ... | 75,562,170,872,440,760,000,000,000,000,000,000,000 | bio.c | 188,686,352,710,057,400,000,000,000,000,000,000,000 | [
"CWE-772"
] | CVE-2017-12190 | The bio_map_user_iov and bio_unmap_user functions in block/bio.c in the Linux kernel before 4.13.8 do unbalanced refcounting when a SCSI I/O vector has small consecutive buffers belonging to the same page. The bio_add_pc_page function merges them into one, but the page reference is never dropped. This causes a memory l... | https://nvd.nist.gov/vuln/detail/CVE-2017-12190 |
161,536 | linux | 2b04e8f6bbb196cab4b232af0f8d48ff2c7a8058 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/2b04e8f6bbb196cab4b232af0f8d48ff2c7a8058 | more bio_map_user_iov() leak fixes
we need to take care of failure exit as well - pages already
in bio should be dropped by analogue of bio_unmap_pages(),
since their refcounts had been bumped only once per reference
in bio.
Cc: stable@vger.kernel.org
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk> | 0 | struct bio *bio_map_user_iov(struct request_queue *q,
const struct iov_iter *iter,
gfp_t gfp_mask)
{
int j;
int nr_pages = 0;
struct page **pages;
struct bio *bio;
int cur_page = 0;
int ret, offset;
struct iov_iter i;
struct iovec iov;
struct bio_vec *bvec;
iov_for_each(iov, i, *iter) {
... | 238,055,990,431,423,600,000,000,000,000,000,000,000 | bio.c | 317,525,818,263,888,000,000,000,000,000,000,000,000 | [
"CWE-772"
] | CVE-2017-12190 | The bio_map_user_iov and bio_unmap_user functions in block/bio.c in the Linux kernel before 4.13.8 do unbalanced refcounting when a SCSI I/O vector has small consecutive buffers belonging to the same page. The bio_add_pc_page function merges them into one, but the page reference is never dropped. This causes a memory l... | https://nvd.nist.gov/vuln/detail/CVE-2017-12190 |
4,348 | ImageMagick | 83e0f8ffd7eeb7661b0ff83257da23d24ca7f078 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/83e0f8ffd7eeb7661b0ff83257da23d24ca7f078 | https://github.com/ImageMagick/ImageMagick/issues/591 | 1 | static Image *ReadTXTImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
char
colorspace[MagickPathExtent],
text[MagickPathExtent];
Image
*image;
long
x_offset,
y_offset;
PixelInfo
pixel;
MagickBooleanType
status;
QuantumAny
range;
register ssize_t
i,
... | 67,229,528,425,872,500,000,000,000,000,000,000,000 | txt.c | 128,733,898,318,362,080,000,000,000,000,000,000,000 | [
"CWE-835"
] | CVE-2017-11523 | The ReadTXTImage function in coders/txt.c in ImageMagick through 6.9.9-0 and 7.x through 7.0.6-1 allows remote attackers to cause a denial of service (infinite loop) via a crafted file, because the end-of-file condition is not considered. | https://nvd.nist.gov/vuln/detail/CVE-2017-11523 |
161,537 | ImageMagick | 83e0f8ffd7eeb7661b0ff83257da23d24ca7f078 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/83e0f8ffd7eeb7661b0ff83257da23d24ca7f078 | https://github.com/ImageMagick/ImageMagick/issues/591 | 0 | static Image *ReadTXTImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
char
colorspace[MagickPathExtent],
text[MagickPathExtent];
Image
*image;
long
x_offset,
y_offset;
PixelInfo
pixel;
MagickBooleanType
status;
QuantumAny
range;
register ssize_t
i,
... | 79,125,421,610,210,030,000,000,000,000,000,000,000 | txt.c | 202,277,609,461,498,600,000,000,000,000,000,000,000 | [
"CWE-835"
] | CVE-2017-11523 | The ReadTXTImage function in coders/txt.c in ImageMagick through 6.9.9-0 and 7.x through 7.0.6-1 allows remote attackers to cause a denial of service (infinite loop) via a crafted file, because the end-of-file condition is not considered. | https://nvd.nist.gov/vuln/detail/CVE-2017-11523 |
4,350 | ImageMagick | 529ff26b68febb2ac03062c58452ea0b4c6edbc1 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/529ff26b68febb2ac03062c58452ea0b4c6edbc1 | None | 1 | ModuleExport size_t RegisterMPCImage(void)
{
MagickInfo
*entry;
entry=SetMagickInfo("CACHE");
entry->description=ConstantString("Magick Persistent Cache image format");
entry->module=ConstantString("MPC");
entry->seekable_stream=MagickTrue;
entry->stealth=MagickTrue;
(void) RegisterMagickInfo(en... | 91,619,705,933,668,880,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2017-11449 | coders/mpc.c in ImageMagick before 7.0.6-1 does not enable seekable streams and thus cannot validate blob sizes, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via an image received from stdin. | https://nvd.nist.gov/vuln/detail/CVE-2017-11449 |
161,539 | ImageMagick | 529ff26b68febb2ac03062c58452ea0b4c6edbc1 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/529ff26b68febb2ac03062c58452ea0b4c6edbc1 | None | 0 | ModuleExport size_t RegisterMPCImage(void)
{
MagickInfo
*entry;
entry=SetMagickInfo("CACHE");
entry->description=ConstantString("Magick Persistent Cache image format");
entry->module=ConstantString("MPC");
entry->stealth=MagickTrue;
(void) RegisterMagickInfo(entry);
entry=SetMagickInfo("MPC");
... | 206,134,486,049,716,570,000,000,000,000,000,000,000 | mpc.c | 122,596,445,204,998,810,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2017-11449 | coders/mpc.c in ImageMagick before 7.0.6-1 does not enable seekable streams and thus cannot validate blob sizes, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via an image received from stdin. | https://nvd.nist.gov/vuln/detail/CVE-2017-11449 |
4,351 | php-src | a15bffd105ac28fd0dd9b596632dbf035238fda3 | https://github.com/php/php-src | https://github.com/php/php-src/commit/a15bffd105ac28fd0dd9b596632dbf035238fda3 | Fix bug #73807 | 1 | static zend_bool add_post_var(zval *arr, post_var_data_t *var, zend_bool eof)
{
char *ksep, *vsep, *val;
size_t klen, vlen;
size_t new_vlen;
if (var->ptr >= var->end) {
return 0;
}
vsep = memchr(var->ptr, '&', var->end - var->ptr);
if (!vsep) {
if (!eof) {
return 0;
} else {
vsep = va... | 300,488,664,044,547,050,000,000,000,000,000,000,000 | php_variables.c | 8,245,733,581,833,365,000,000,000,000,000,000,000 | [
"CWE-400"
] | CVE-2017-11142 | In PHP before 5.6.31, 7.x before 7.0.17, and 7.1.x before 7.1.3, remote attackers could cause a CPU consumption denial of service attack by injecting long form variables, related to main/php_variables.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-11142 |
161,540 | php-src | a15bffd105ac28fd0dd9b596632dbf035238fda3 | https://github.com/php/php-src | https://github.com/php/php-src/commit/a15bffd105ac28fd0dd9b596632dbf035238fda3 | Fix bug #73807 | 0 | static zend_bool add_post_var(zval *arr, post_var_data_t *var, zend_bool eof)
{
char *start, *ksep, *vsep, *val;
size_t klen, vlen;
size_t new_vlen;
if (var->ptr >= var->end) {
return 0;
}
start = var->ptr + var->already_scanned;
vsep = memchr(start, '&', var->end - start);
if (!vsep) {
if (!eo... | 40,058,054,615,145,740,000,000,000,000,000,000,000 | php_variables.c | 59,511,950,721,059,280,000,000,000,000,000,000,000 | [
"CWE-400"
] | CVE-2017-11142 | In PHP before 5.6.31, 7.x before 7.0.17, and 7.1.x before 7.1.3, remote attackers could cause a CPU consumption denial of service attack by injecting long form variables, related to main/php_variables.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-11142 |
4,353 | FFmpeg | 2171dfae8c065878a2e130390eb78cf2947a5b69 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/2171dfae8c065878a2e130390eb78cf2947a5b69 | avcodec/scpr: Fix multiple runtime error: index 256 out of bounds for type 'unsigned int [256]'
Fixes: 1519/clusterfuzz-testcase-minimized-5286680976162816
Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/targets/ffmpeg
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 1 | static int decode_unit(SCPRContext *s, PixelModel *pixel, unsigned step, unsigned *rval)
{
GetByteContext *gb = &s->gb;
RangeCoder *rc = &s->rc;
unsigned totfr = pixel->total_freq;
unsigned value, x = 0, cumfr = 0, cnt_x = 0;
int i, j, ret, c, cnt_c;
if ((ret = s->get_freq(rc, totfr, &value)) <... | 281,652,385,257,493,500,000,000,000,000,000,000,000 | scpr.c | 316,731,203,493,724,650,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-9995 | libavcodec/scpr.c in FFmpeg 3.3 before 3.3.1 does not properly validate height and width data, which allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2017-9995 |
161,541 | FFmpeg | 2171dfae8c065878a2e130390eb78cf2947a5b69 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/2171dfae8c065878a2e130390eb78cf2947a5b69 | avcodec/scpr: Fix multiple runtime error: index 256 out of bounds for type 'unsigned int [256]'
Fixes: 1519/clusterfuzz-testcase-minimized-5286680976162816
Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/targets/ffmpeg
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 0 | static int decode_unit(SCPRContext *s, PixelModel *pixel, unsigned step, unsigned *rval)
{
GetByteContext *gb = &s->gb;
RangeCoder *rc = &s->rc;
unsigned totfr = pixel->total_freq;
unsigned value, x = 0, cumfr = 0, cnt_x = 0;
int i, j, ret, c, cnt_c;
if ((ret = s->get_freq(rc, totfr, &value)) <... | 178,962,509,902,290,500,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2017-9995 | libavcodec/scpr.c in FFmpeg 3.3 before 3.3.1 does not properly validate height and width data, which allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2017-9995 |
4,355 | FFmpeg | 0a709e2a10b8288a0cc383547924ecfe285cef89 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/0a709e2a10b8288a0cc383547924ecfe285cef89 | avcodec/dnxhd_parser: Do not return invalid value from dnxhd_find_frame_end() on error
Fixes: Null pointer dereference
Fixes: CVE-2017-9608
Found-by: Yihan Lian
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
(cherry picked from commit 611b35627488a8d0763e75c25ee0875c5b7987dd)
Signed-off-by: Michael Niede... | 1 | static int dnxhd_find_frame_end(DNXHDParserContext *dctx,
const uint8_t *buf, int buf_size)
{
ParseContext *pc = &dctx->pc;
uint64_t state = pc->state64;
int pic_found = pc->frame_start_found;
int i = 0;
if (!pic_found) {
for (i = 0; i < buf_size; i++) {
... | 315,425,032,861,470,850,000,000,000,000,000,000,000 | dnxhd_parser.c | 103,784,583,369,010,030,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2017-9608 | The dnxhd decoder in FFmpeg before 3.2.6, and 3.3.x before 3.3.3 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted mov file. | https://nvd.nist.gov/vuln/detail/CVE-2017-9608 |
161,542 | FFmpeg | 0a709e2a10b8288a0cc383547924ecfe285cef89 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/0a709e2a10b8288a0cc383547924ecfe285cef89 | avcodec/dnxhd_parser: Do not return invalid value from dnxhd_find_frame_end() on error
Fixes: Null pointer dereference
Fixes: CVE-2017-9608
Found-by: Yihan Lian
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
(cherry picked from commit 611b35627488a8d0763e75c25ee0875c5b7987dd)
Signed-off-by: Michael Niede... | 0 | static int dnxhd_find_frame_end(DNXHDParserContext *dctx,
const uint8_t *buf, int buf_size)
{
ParseContext *pc = &dctx->pc;
uint64_t state = pc->state64;
int pic_found = pc->frame_start_found;
int i = 0;
if (!pic_found) {
for (i = 0; i < buf_size; i++) {
... | 42,878,246,315,029,070,000,000,000,000,000,000,000 | dnxhd_parser.c | 61,380,702,221,703,020,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2017-9608 | The dnxhd decoder in FFmpeg before 3.2.6, and 3.3.x before 3.3.3 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted mov file. | https://nvd.nist.gov/vuln/detail/CVE-2017-9608 |
4,366 | libsndfile | 708e996c87c5fae77b104ccfeb8f6db784c32074 | https://github.com/erikd/libsndfile | https://github.com/erikd/libsndfile/commit/708e996c87c5fae77b104ccfeb8f6db784c32074 | src/ : Move to a variable length header buffer
Previously, the `psf->header` buffer was a fixed length specified by
`SF_HEADER_LEN` which was set to `12292`. This was problematic for
two reasons; this value was un-necessarily large for the majority
of files and too small for some others.
Now the size of the header bu... | 1 | header_read (SF_PRIVATE *psf, void *ptr, int bytes)
{ int count = 0 ;
if (psf->headindex >= SIGNED_SIZEOF (psf->header))
return psf_fread (ptr, 1, bytes, psf) ;
if (psf->headindex + bytes > SIGNED_SIZEOF (psf->header))
{ int most ;
most = SIGNED_SIZEOF (psf->header) - psf->headend ;
psf_fread (psf->heade... | 137,428,299,166,907,450,000,000,000,000,000,000,000 | common.c | 339,310,387,561,950,540,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-7586 | In libsndfile before 1.0.28, an error in the "header_read()" function (common.c) when handling ID3 tags can be exploited to cause a stack-based buffer overflow via a specially crafted FLAC file. | https://nvd.nist.gov/vuln/detail/CVE-2017-7586 |
161,553 | libsndfile | 708e996c87c5fae77b104ccfeb8f6db784c32074 | https://github.com/erikd/libsndfile | https://github.com/erikd/libsndfile/commit/708e996c87c5fae77b104ccfeb8f6db784c32074 | src/ : Move to a variable length header buffer
Previously, the `psf->header` buffer was a fixed length specified by
`SF_HEADER_LEN` which was set to `12292`. This was problematic for
two reasons; this value was un-necessarily large for the majority
of files and too small for some others.
Now the size of the header bu... | 0 | header_read (SF_PRIVATE *psf, void *ptr, int bytes)
{ int count = 0 ;
if (psf->header.indx + bytes >= psf->header.len && psf_bump_header_allocation (psf, bytes))
return count ;
if (psf->header.indx + bytes > psf->header.end)
{ count = psf_fread (psf->header.ptr + psf->header.end, 1, bytes - (psf->header.end ... | 50,594,758,077,466,320,000,000,000,000,000,000,000 | common.c | 336,888,234,339,970,560,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-7586 | In libsndfile before 1.0.28, an error in the "header_read()" function (common.c) when handling ID3 tags can be exploited to cause a stack-based buffer overflow via a specially crafted FLAC file. | https://nvd.nist.gov/vuln/detail/CVE-2017-7586 |
4,374 | proftpd | ecff21e0d0e84f35c299ef91d7fda088e516d4ed | https://github.com/proftpd/proftpd | https://github.com/proftpd/proftpd/commit/ecff21e0d0e84f35c299ef91d7fda088e516d4ed | Backporting recursive handling of DefaultRoot path, when AllowChrootSymlinks
is off, to 1.3.5 branch. | 1 | static int get_default_root(pool *p, int allow_symlinks, char **root) {
config_rec *c = NULL;
char *dir = NULL;
int res;
c = find_config(main_server->conf, CONF_PARAM, "DefaultRoot", FALSE);
while (c) {
pr_signals_handle();
/* Check the groups acl */
if (c->argc < 2) {
dir = c->argv[0];... | 40,186,582,881,128,860,000,000,000,000,000,000,000 | mod_auth.c | 288,997,673,937,166,560,000,000,000,000,000,000,000 | [
"CWE-59"
] | CVE-2017-7418 | ProFTPD before 1.3.5e and 1.3.6 before 1.3.6rc5 controls whether the home directory of a user could contain a symbolic link through the AllowChrootSymlinks configuration option, but checks only the last path component when enforcing AllowChrootSymlinks. Attackers with local access could bypass the AllowChrootSymlinks c... | https://nvd.nist.gov/vuln/detail/CVE-2017-7418 |
161,561 | proftpd | ecff21e0d0e84f35c299ef91d7fda088e516d4ed | https://github.com/proftpd/proftpd | https://github.com/proftpd/proftpd/commit/ecff21e0d0e84f35c299ef91d7fda088e516d4ed | Backporting recursive handling of DefaultRoot path, when AllowChrootSymlinks
is off, to 1.3.5 branch. | 0 | static int get_default_root(pool *p, int allow_symlinks, char **root) {
config_rec *c = NULL;
char *dir = NULL;
int res;
c = find_config(main_server->conf, CONF_PARAM, "DefaultRoot", FALSE);
while (c) {
pr_signals_handle();
/* Check the groups acl */
if (c->argc < 2) {
dir = c->argv[0];... | 263,475,962,204,349,200,000,000,000,000,000,000,000 | mod_auth.c | 56,413,642,028,993,720,000,000,000,000,000,000,000 | [
"CWE-59"
] | CVE-2017-7418 | ProFTPD before 1.3.5e and 1.3.6 before 1.3.6rc5 controls whether the home directory of a user could contain a symbolic link through the AllowChrootSymlinks configuration option, but checks only the last path component when enforcing AllowChrootSymlinks. Attackers with local access could bypass the AllowChrootSymlinks c... | https://nvd.nist.gov/vuln/detail/CVE-2017-7418 |
4,377 | linux | 4ef1b2869447411ad3ef91ad7d4891a83c1a509a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/4ef1b2869447411ad3ef91ad7d4891a83c1a509a | tcp: mark skbs with SCM_TIMESTAMPING_OPT_STATS
SOF_TIMESTAMPING_OPT_STATS can be enabled and disabled
while packets are collected on the error queue.
So, checking SOF_TIMESTAMPING_OPT_STATS in sk->sk_tsflags
is not enough to safely assume that the skb contains
OPT_STATS data.
Add a bit in sock_exterr_skb to indicate ... | 1 | void __sock_recv_timestamp(struct msghdr *msg, struct sock *sk,
struct sk_buff *skb)
{
int need_software_tstamp = sock_flag(sk, SOCK_RCVTSTAMP);
struct scm_timestamping tss;
int empty = 1;
struct skb_shared_hwtstamps *shhwtstamps =
skb_hwtstamps(skb);
/* Race occurred between timestamp enabling and packet
... | 318,403,522,723,650,600,000,000,000,000,000,000,000 | socket.c | 136,313,628,448,494,970,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-7277 | The TCP stack in the Linux kernel through 4.10.6 mishandles the SCM_TIMESTAMPING_OPT_STATS feature, which allows local users to obtain sensitive information from the kernel's internal socket data structures or cause a denial of service (out-of-bounds read) via crafted system calls, related to net/core/skbuff.c and net/... | https://nvd.nist.gov/vuln/detail/CVE-2017-7277 |
161,564 | linux | 4ef1b2869447411ad3ef91ad7d4891a83c1a509a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/4ef1b2869447411ad3ef91ad7d4891a83c1a509a | tcp: mark skbs with SCM_TIMESTAMPING_OPT_STATS
SOF_TIMESTAMPING_OPT_STATS can be enabled and disabled
while packets are collected on the error queue.
So, checking SOF_TIMESTAMPING_OPT_STATS in sk->sk_tsflags
is not enough to safely assume that the skb contains
OPT_STATS data.
Add a bit in sock_exterr_skb to indicate ... | 0 | void __sock_recv_timestamp(struct msghdr *msg, struct sock *sk,
struct sk_buff *skb)
{
int need_software_tstamp = sock_flag(sk, SOCK_RCVTSTAMP);
struct scm_timestamping tss;
int empty = 1;
struct skb_shared_hwtstamps *shhwtstamps =
skb_hwtstamps(skb);
/* Race occurred between timestamp enabling and packet
... | 310,346,414,068,363,930,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2017-7277 | The TCP stack in the Linux kernel through 4.10.6 mishandles the SCM_TIMESTAMPING_OPT_STATS feature, which allows local users to obtain sensitive information from the kernel's internal socket data structures or cause a denial of service (out-of-bounds read) via crafted system calls, related to net/core/skbuff.c and net/... | https://nvd.nist.gov/vuln/detail/CVE-2017-7277 |
4,389 | ImageMagick | 7d65a814ac76bd04760072c33e452371692ee790 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/7d65a814ac76bd04760072c33e452371692ee790 | None | 1 | ModuleExport MagickBooleanType ReadPSDLayers(Image *image,
const ImageInfo *image_info,const PSDInfo *psd_info,
const MagickBooleanType skip_layers,ExceptionInfo *exception)
{
char
type[4];
LayerInfo
*layer_info;
MagickSizeType
size;
MagickBooleanType
status;
register ssize_t
i;
... | 4,351,382,808,025,695,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2017-5511 | coders/psd.c in ImageMagick allows remote attackers to have unspecified impact by leveraging an improper cast, which triggers a heap-based buffer overflow. | https://nvd.nist.gov/vuln/detail/CVE-2017-5511 |
161,571 | ImageMagick | 7d65a814ac76bd04760072c33e452371692ee790 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/7d65a814ac76bd04760072c33e452371692ee790 | None | 0 | ModuleExport MagickBooleanType ReadPSDLayers(Image *image,
const ImageInfo *image_info,const PSDInfo *psd_info,
const MagickBooleanType skip_layers,ExceptionInfo *exception)
{
char
type[4];
LayerInfo
*layer_info;
MagickSizeType
size;
MagickBooleanType
status;
register ssize_t
i;
... | 66,333,111,237,190,715,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2017-5511 | coders/psd.c in ImageMagick allows remote attackers to have unspecified impact by leveraging an improper cast, which triggers a heap-based buffer overflow. | https://nvd.nist.gov/vuln/detail/CVE-2017-5511 |
4,396 | libgit2 | b5c6a1b407b7f8b952bded2789593b68b1876211 | https://github.com/libgit2/libgit2 | https://github.com/libgit2/libgit2/commit/b5c6a1b407b7f8b952bded2789593b68b1876211 | http: check certificate validity before clobbering the error variable | 1 | static int http_connect(http_subtransport *t)
{
int error;
char *proxy_url;
if (t->connected &&
http_should_keep_alive(&t->parser) &&
t->parse_finished)
return 0;
if (t->io) {
git_stream_close(t->io);
git_stream_free(t->io);
t->io = NULL;
t->connected = 0;
}
if (t->connection_data.use_ssl) {
er... | 181,137,872,357,421,300,000,000,000,000,000,000,000 | None | null | [
"CWE-284"
] | CVE-2016-10130 | The http_connect function in transports/http.c in libgit2 before 0.24.6 and 0.25.x before 0.25.1 might allow man-in-the-middle attackers to spoof servers by leveraging clobbering of the error variable. | https://nvd.nist.gov/vuln/detail/CVE-2016-10130 |
161,575 | libgit2 | b5c6a1b407b7f8b952bded2789593b68b1876211 | https://github.com/libgit2/libgit2 | https://github.com/libgit2/libgit2/commit/b5c6a1b407b7f8b952bded2789593b68b1876211 | http: check certificate validity before clobbering the error variable | 0 | static int http_connect(http_subtransport *t)
{
int error;
char *proxy_url;
if (t->connected &&
http_should_keep_alive(&t->parser) &&
t->parse_finished)
return 0;
if (t->io) {
git_stream_close(t->io);
git_stream_free(t->io);
t->io = NULL;
t->connected = 0;
}
if (t->connection_data.use_ssl) {
er... | 246,689,348,517,670,700,000,000,000,000,000,000,000 | None | null | [
"CWE-284"
] | CVE-2016-10130 | The http_connect function in transports/http.c in libgit2 before 0.24.6 and 0.25.x before 0.25.1 might allow man-in-the-middle attackers to spoof servers by leveraging clobbering of the error variable. | https://nvd.nist.gov/vuln/detail/CVE-2016-10130 |
4,397 | libgit2 | 84d30d569ada986f3eef527cbdb932643c2dd037 | https://github.com/libgit2/libgit2 | https://github.com/libgit2/libgit2/commit/84d30d569ada986f3eef527cbdb932643c2dd037 | smart_pkt: treat empty packet lines as error
The Git protocol does not specify what should happen in the case
of an empty packet line (that is a packet line "0004"). We
currently indicate success, but do not return a packet in the
case where we hit an empty line. The smart protocol was not
prepared to handle such pack... | 1 | static int add_push_report_sideband_pkt(git_push *push, git_pkt_data *data_pkt, git_buf *data_pkt_buf)
{
git_pkt *pkt;
const char *line, *line_end;
size_t line_len;
int error;
int reading_from_buf = data_pkt_buf->size > 0;
if (reading_from_buf) {
/* We had an existing partial packet, so add the new
* packet... | 40,688,963,026,714,930,000,000,000,000,000,000,000 | smart_protocol.c | 169,851,288,010,794,390,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2016-10129 | The Git Smart Protocol support in libgit2 before 0.24.6 and 0.25.x before 0.25.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via an empty packet line. | https://nvd.nist.gov/vuln/detail/CVE-2016-10129 |
161,576 | libgit2 | 84d30d569ada986f3eef527cbdb932643c2dd037 | https://github.com/libgit2/libgit2 | https://github.com/libgit2/libgit2/commit/84d30d569ada986f3eef527cbdb932643c2dd037 | smart_pkt: treat empty packet lines as error
The Git protocol does not specify what should happen in the case
of an empty packet line (that is a packet line "0004"). We
currently indicate success, but do not return a packet in the
case where we hit an empty line. The smart protocol was not
prepared to handle such pack... | 0 | static int add_push_report_sideband_pkt(git_push *push, git_pkt_data *data_pkt, git_buf *data_pkt_buf)
{
git_pkt *pkt;
const char *line, *line_end;
size_t line_len;
int error;
int reading_from_buf = data_pkt_buf->size > 0;
if (reading_from_buf) {
/* We had an existing partial packet, so add the new
* packet... | 239,091,266,584,449,000,000,000,000,000,000,000,000 | smart_protocol.c | 336,083,806,196,513,300,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2016-10129 | The Git Smart Protocol support in libgit2 before 0.24.6 and 0.25.x before 0.25.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via an empty packet line. | https://nvd.nist.gov/vuln/detail/CVE-2016-10129 |
4,398 | php-src | 77f619d48259383628c3ec4654b1ad578e9eb40e | https://github.com/php/php-src | https://github.com/libgd/libgd/commit/77f619d48259383628c3ec4654b1ad578e9eb40e | None | 1 | BGD_DECLARE(void) gdImageFillToBorder (gdImagePtr im, int x, int y, int border, int color)
{
int lastBorder;
/* Seek left */
int leftLimit, rightLimit;
int i;
int restoreAlphaBleding;
if (border < 0) {
/* Refuse to fill to a non-solid border */
return;
}
leftLimit = (-1);
restoreAlphaBleding =... | 239,173,184,754,285,350,000,000,000,000,000,000,000 | gd.c | 249,258,694,972,014,260,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2016-9933 | Stack consumption vulnerability in the gdImageFillToBorder function in gd.c in the GD Graphics Library (aka libgd) before 2.2.2, as used in PHP before 5.6.28 and 7.x before 7.0.13, allows remote attackers to cause a denial of service (segmentation violation) via a crafted imagefilltoborder call that triggers use of a n... | https://nvd.nist.gov/vuln/detail/CVE-2016-9933 |
86,532 | php-src | 77f619d48259383628c3ec4654b1ad578e9eb40e | https://github.com/php/php-src | https://github.com/libgd/libgd/commit/77f619d48259383628c3ec4654b1ad578e9eb40e | None | 0 | BGD_DECLARE(gdImagePtr) gdImageCreate (int sx, int sy)
{
int i;
gdImagePtr im;
if (overflow2(sizeof (unsigned char *), sy)) {
return NULL;
}
if (overflow2(sizeof (unsigned char *), sx)) {
return NULL;
}
im = (gdImage *) gdCalloc(1, sizeof(gdImage));
if (!im) {
return NULL;
}
/* Row-major ever since g... | 52,237,471,661,989,170,000,000,000,000,000,000,000 | gd.c | 113,990,142,482,157,950,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2016-9933 | Stack consumption vulnerability in the gdImageFillToBorder function in gd.c in the GD Graphics Library (aka libgd) before 2.2.2, as used in PHP before 5.6.28 and 7.x before 7.0.13, allows remote attackers to cause a denial of service (segmentation violation) via a crafted imagefilltoborder call that triggers use of a n... | https://nvd.nist.gov/vuln/detail/CVE-2016-9933 |
4,399 | ImageMagick | 63346f34f9d19179599b5b256e5e8d3dda46435c | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/63346f34f9d19179599b5b256e5e8d3dda46435c | None | 1 | int main( int /*argc*/, char ** argv)
{
InitializeMagick(*argv);
int failures=0;
try {
string srcdir("");
if(getenv("SRCDIR") != 0)
srcdir = getenv("SRCDIR");
list<Image> imageList;
readImages( &imageList, srcdir + "test_image_anim.miff" );
Image appended;
appendImages( &appe... | 11,870,402,558,612,043,000,000,000,000,000,000,000 | None | null | [
"CWE-369"
] | CVE-2016-7530 | The quantum handling code in ImageMagick allows remote attackers to cause a denial of service (divide-by-zero error or out-of-bounds write) via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2016-7530 |
161,578 | ImageMagick | 63346f34f9d19179599b5b256e5e8d3dda46435c | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/63346f34f9d19179599b5b256e5e8d3dda46435c | None | 0 | int main( int /*argc*/, char ** argv)
{
InitializeMagick(*argv);
int failures=0;
try {
string srcdir("");
if(getenv("SRCDIR") != 0)
srcdir = getenv("SRCDIR");
list<Image> imageList;
readImages( &imageList, srcdir + "test_image_anim.miff" );
Image appended;
appendImages( &appe... | 17,095,752,038,152,691,000,000,000,000,000,000,000 | None | null | [
"CWE-369"
] | CVE-2016-7530 | The quantum handling code in ImageMagick allows remote attackers to cause a denial of service (divide-by-zero error or out-of-bounds write) via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2016-7530 |
4,400 | ImageMagick | b5ed738f8060266bf4ae521f7e3ed145aa4498a3 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/b5ed738f8060266bf4ae521f7e3ed145aa4498a3 | None | 1 | MagickExport MagickBooleanType SetQuantumDepth(const Image *image,
QuantumInfo *quantum_info,const size_t depth)
{
size_t
extent,
quantum;
/*
Allocate the quantum pixel buffer.
*/
assert(image != (Image *) NULL);
assert(image->signature == MagickSignature);
if (image->debug != MagickFalse)
... | 198,311,459,592,439,570,000,000,000,000,000,000,000 | None | null | [
"CWE-369"
] | CVE-2016-7530 | The quantum handling code in ImageMagick allows remote attackers to cause a denial of service (divide-by-zero error or out-of-bounds write) via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2016-7530 |
161,579 | ImageMagick | b5ed738f8060266bf4ae521f7e3ed145aa4498a3 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/b5ed738f8060266bf4ae521f7e3ed145aa4498a3 | None | 0 | MagickExport MagickBooleanType SetQuantumDepth(const Image *image,
QuantumInfo *quantum_info,const size_t depth)
{
size_t
extent,
quantum;
/*
Allocate the quantum pixel buffer.
*/
assert(image != (Image *) NULL);
assert(image->signature == MagickSignature);
if (image->debug != MagickFalse)
... | 170,196,186,915,288,000,000,000,000,000,000,000,000 | None | null | [
"CWE-369"
] | CVE-2016-7530 | The quantum handling code in ImageMagick allows remote attackers to cause a denial of service (divide-by-zero error or out-of-bounds write) via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2016-7530 |
4,404 | ImageMagick | 8f8959033e4e59418d6506b345829af1f7a71127 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/8f8959033e4e59418d6506b345829af1f7a71127 | ... | 1 | static Image *ReadSGIImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
Image
*image;
MagickBooleanType
status;
MagickSizeType
number_pixels;
MemoryInfo
*pixel_info;
register Quantum
*q;
register ssize_t
i,
x;
register unsigned char
*p;
SGIInfo
iris_... | 9,093,028,214,754,756,000,000,000,000,000,000,000 | sgi.c | 56,650,646,473,342,340,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2016-7101 | The SGI coder in ImageMagick before 7.0.2-10 allows remote attackers to cause a denial of service (out-of-bounds read) via a large row value in an sgi file. | https://nvd.nist.gov/vuln/detail/CVE-2016-7101 |
161,580 | ImageMagick | 8f8959033e4e59418d6506b345829af1f7a71127 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/8f8959033e4e59418d6506b345829af1f7a71127 | ... | 0 | static Image *ReadSGIImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
Image
*image;
MagickBooleanType
status;
MagickSizeType
number_pixels;
MemoryInfo
*pixel_info;
register Quantum
*q;
register ssize_t
i,
x;
register unsigned char
*p;
SGIInfo
iris_... | 332,022,567,930,033,900,000,000,000,000,000,000,000 | sgi.c | 314,915,683,086,862,000,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2016-7101 | The SGI coder in ImageMagick before 7.0.2-10 allows remote attackers to cause a denial of service (out-of-bounds read) via a large row value in an sgi file. | https://nvd.nist.gov/vuln/detail/CVE-2016-7101 |
4,405 | libgd | 58b6dde319c301b0eae27d12e2a659e067d80558 | https://github.com/libgd/libgd | https://github.com/libgd/libgd/commit/58b6dde319c301b0eae27d12e2a659e067d80558 | Fix OOB reads of the TGA decompression buffer
It is possible to craft TGA files which will overflow the decompression
buffer, but not the image's bitmap. Therefore we also have to check for
potential decompression buffer overflows.
This issue had been reported by Ibrahim El-Sayed to security@libgd.org;
a modified cas... | 1 | int read_image_tga( gdIOCtx *ctx, oTga *tga )
{
int pixel_block_size = (tga->bits / 8);
int image_block_size = (tga->width * tga->height) * pixel_block_size;
int* decompression_buffer = NULL;
unsigned char* conversion_buffer = NULL;
int buffer_caret = 0;
int bitmap_caret = 0;
int i = 0;
int encoded_pixels;
int... | 45,807,417,306,419,930,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2016-6906 | The read_image_tga function in gd_tga.c in the GD Graphics Library (aka libgd) before 2.2.4 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted TGA file, related to the decompression buffer. | https://nvd.nist.gov/vuln/detail/CVE-2016-6906 |
161,581 | libgd | 58b6dde319c301b0eae27d12e2a659e067d80558 | https://github.com/libgd/libgd | https://github.com/libgd/libgd/commit/58b6dde319c301b0eae27d12e2a659e067d80558 | Fix OOB reads of the TGA decompression buffer
It is possible to craft TGA files which will overflow the decompression
buffer, but not the image's bitmap. Therefore we also have to check for
potential decompression buffer overflows.
This issue had been reported by Ibrahim El-Sayed to security@libgd.org;
a modified cas... | 0 | int read_image_tga( gdIOCtx *ctx, oTga *tga )
{
int pixel_block_size = (tga->bits / 8);
int image_block_size = (tga->width * tga->height) * pixel_block_size;
int* decompression_buffer = NULL;
unsigned char* conversion_buffer = NULL;
int buffer_caret = 0;
int bitmap_caret = 0;
int i = 0;
int encoded_pixels;
int... | 249,788,825,959,476,140,000,000,000,000,000,000,000 | gd_tga.c | 25,386,267,781,431,800,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2016-6906 | The read_image_tga function in gd_tga.c in the GD Graphics Library (aka libgd) before 2.2.4 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted TGA file, related to the decompression buffer. | https://nvd.nist.gov/vuln/detail/CVE-2016-6906 |
4,408 | ImageMagick | 8ea44b48a182dd46d018f4b4f09a5e2ee9638105 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/8ea44b48a182dd46d018f4b4f09a5e2ee9638105 | 1 | static Image *ReadSUNImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
#define RMT_EQUAL_RGB 1
#define RMT_NONE 0
#define RMT_RAW 2
#define RT_STANDARD 1
#define RT_ENCODED 2
#define RT_FORMAT_RGB 3
typedef struct _SUNInfo
{
unsigned int
magic,
width,
height,
depth,
... | 185,822,657,637,374,900,000,000,000,000,000,000,000 | sun.c | 276,234,285,718,895,500,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2015-8958 | coders/sun.c in ImageMagick before 6.9.0-4 Beta allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted SUN file. | https://nvd.nist.gov/vuln/detail/CVE-2015-8958 | |
161,583 | ImageMagick | 8ea44b48a182dd46d018f4b4f09a5e2ee9638105 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/8ea44b48a182dd46d018f4b4f09a5e2ee9638105 | 0 | static Image *ReadSUNImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
#define RMT_EQUAL_RGB 1
#define RMT_NONE 0
#define RMT_RAW 2
#define RT_STANDARD 1
#define RT_ENCODED 2
#define RT_FORMAT_RGB 3
typedef struct _SUNInfo
{
unsigned int
magic,
width,
height,
depth,
... | 219,381,137,967,165,030,000,000,000,000,000,000,000 | sun.c | 268,164,255,673,164,160,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2015-8958 | coders/sun.c in ImageMagick before 6.9.0-4 Beta allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted SUN file. | https://nvd.nist.gov/vuln/detail/CVE-2015-8958 | |
4,417 | pgbouncer | edab5be6665b9e8de66c25ba527509b229468573 | https://github.com/pgbouncer/pgbouncer | https://github.com/pgbouncer/pgbouncer/commit/edab5be6665b9e8de66c25ba527509b229468573 | Check if auth_user is set.
Fixes a crash if password packet appears before startup packet (#42). | 1 | static bool check_client_passwd(PgSocket *client, const char *passwd)
{
char md5[MD5_PASSWD_LEN + 1];
const char *correct;
PgUser *user = client->auth_user;
/* disallow empty passwords */
if (!*passwd || !*user->passwd)
return false;
switch (cf_auth_type) {
case AUTH_PLAIN:
return strcmp(user->passwd... | 262,462,810,635,753,940,000,000,000,000,000,000,000 | client.c | 203,590,908,184,515,350,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2015-4054 | PgBouncer before 1.5.5 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) by sending a password packet before a startup packet. | https://nvd.nist.gov/vuln/detail/CVE-2015-4054 |
161,589 | pgbouncer | edab5be6665b9e8de66c25ba527509b229468573 | https://github.com/pgbouncer/pgbouncer | https://github.com/pgbouncer/pgbouncer/commit/edab5be6665b9e8de66c25ba527509b229468573 | Check if auth_user is set.
Fixes a crash if password packet appears before startup packet (#42). | 0 | static bool check_client_passwd(PgSocket *client, const char *passwd)
{
char md5[MD5_PASSWD_LEN + 1];
const char *correct;
PgUser *user = client->auth_user;
/* auth_user may be missing */
if (!user) {
slog_error(client, "Password packet before auth packet?");
return false;
}
/* disallow empty passwords... | 154,878,987,802,049,780,000,000,000,000,000,000,000 | client.c | 115,609,358,804,220,030,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2015-4054 | PgBouncer before 1.5.5 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) by sending a password packet before a startup packet. | https://nvd.nist.gov/vuln/detail/CVE-2015-4054 |
4,423 | abrt | d6e2f6f128cef4c21cb80941ae674c9842681aa7 | https://github.com/abrt/abrt | https://github.com/abrt/abrt/commit/d6e2f6f128cef4c21cb80941ae674c9842681aa7 | ccpp: open file for dump_fd_info with O_EXCL
To avoid possible races.
Related: #1211835
Signed-off-by: Jakub Filak <jfilak@redhat.com> | 1 | static bool dump_fd_info(const char *dest_filename, char *source_filename, int source_base_ofs, uid_t uid, gid_t gid)
{
FILE *fp = fopen(dest_filename, "w");
if (!fp)
return false;
unsigned fd = 0;
while (fd <= 99999) /* paranoia check */
{
sprintf(source_filename + source_base... | 242,345,425,049,513,960,000,000,000,000,000,000,000 | abrt-hook-ccpp.c | 332,533,851,336,417,600,000,000,000,000,000,000,000 | [
"CWE-59"
] | CVE-2015-3315 | Automatic Bug Reporting Tool (ABRT) allows local users to read, change the ownership of, or have other unspecified impact on arbitrary files via a symlink attack on (1) /var/tmp/abrt/*/maps, (2) /tmp/jvm-*/hs_error.log, (3) /proc/*/exe, (4) /etc/os-release in a chroot, or (5) an unspecified root directory related to li... | https://nvd.nist.gov/vuln/detail/CVE-2015-3315 |
161,594 | abrt | d6e2f6f128cef4c21cb80941ae674c9842681aa7 | https://github.com/abrt/abrt | https://github.com/abrt/abrt/commit/d6e2f6f128cef4c21cb80941ae674c9842681aa7 | ccpp: open file for dump_fd_info with O_EXCL
To avoid possible races.
Related: #1211835
Signed-off-by: Jakub Filak <jfilak@redhat.com> | 0 | static bool dump_fd_info(const char *dest_filename, char *source_filename, int source_base_ofs, uid_t uid, gid_t gid)
{
FILE *fp = fopen(dest_filename, "wx");
if (!fp)
return false;
unsigned fd = 0;
while (fd <= 99999) /* paranoia check */
{
sprintf(source_filename + source_bas... | 326,417,298,670,193,430,000,000,000,000,000,000,000 | abrt-hook-ccpp.c | 336,174,652,352,971,120,000,000,000,000,000,000,000 | [
"CWE-59"
] | CVE-2015-3315 | Automatic Bug Reporting Tool (ABRT) allows local users to read, change the ownership of, or have other unspecified impact on arbitrary files via a symlink attack on (1) /var/tmp/abrt/*/maps, (2) /tmp/jvm-*/hs_error.log, (3) /proc/*/exe, (4) /etc/os-release in a chroot, or (5) an unspecified root directory related to li... | https://nvd.nist.gov/vuln/detail/CVE-2015-3315 |
4,439 | librsvg | f9d69eadd2b16b00d1a1f9f286122123f8e547dd | https://github.com/GNOME/librsvg | https://github.com/ImageMagick/librsvg/commit/f9d69eadd2b16b00d1a1f9f286122123f8e547dd | Fixed possible credentials leaking reported by Alex Birsan. | 1 | _rsvg_io_get_file_path (const gchar * filename,
const gchar * base_uri)
{
gchar *absolute_filename;
if (g_file_test (filename, G_FILE_TEST_EXISTS) || g_path_is_absolute (filename)) {
absolute_filename = g_strdup (filename);
} else {
gchar *tmpcdir;
gcha... | 330,502,157,723,936,650,000,000,000,000,000,000,000 | rsvg-io.c | 108,187,284,530,270,120,000,000,000,000,000,000,000 | [
"CWE-522"
] | CVE-2018-1000041 | GNOME librsvg version before commit c6ddf2ed4d768fd88adbea2b63f575cd523022ea contains a Improper input validation vulnerability in rsvg-io.c that can result in the victim's Windows username and NTLM password hash being leaked to remote attackers through SMB. This attack appear to be exploitable via The victim must proc... | https://nvd.nist.gov/vuln/detail/CVE-2018-1000041 |
161,607 | librsvg | f9d69eadd2b16b00d1a1f9f286122123f8e547dd | https://github.com/GNOME/librsvg | https://github.com/ImageMagick/librsvg/commit/f9d69eadd2b16b00d1a1f9f286122123f8e547dd | Fixed possible credentials leaking reported by Alex Birsan. | 0 | _rsvg_io_get_file_path (const gchar * filename,
const gchar * base_uri)
{
gchar *absolute_filename;
if (g_path_is_absolute (filename)) {
absolute_filename = g_strdup (filename);
} else {
gchar *tmpcdir;
gchar *base_filename;
if (base_uri) {
... | 27,692,438,953,328,130,000,000,000,000,000,000,000 | rsvg-io.c | 124,899,316,242,507,420,000,000,000,000,000,000,000 | [
"CWE-522"
] | CVE-2018-1000041 | GNOME librsvg version before commit c6ddf2ed4d768fd88adbea2b63f575cd523022ea contains a Improper input validation vulnerability in rsvg-io.c that can result in the victim's Windows username and NTLM password hash being leaked to remote attackers through SMB. This attack appear to be exploitable via The victim must proc... | https://nvd.nist.gov/vuln/detail/CVE-2018-1000041 |
4,441 | linux | 2a3f93459d689d990b3ecfbe782fec89b97d3279 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/2a3f93459d689d990b3ecfbe782fec89b97d3279 | arm64: KVM: Sanitize PSTATE.M when being set from userspace
Not all execution modes are valid for a guest, and some of them
depend on what the HW actually supports. Let's verify that what
userspace provides is compatible with both the VM settings and
the HW capabilities.
Cc: <stable@vger.kernel.org>
Fixes: 0d854a60b1... | 1 | static int set_core_reg(struct kvm_vcpu *vcpu, const struct kvm_one_reg *reg)
{
__u32 __user *uaddr = (__u32 __user *)(unsigned long)reg->addr;
struct kvm_regs *regs = vcpu_gp_regs(vcpu);
int nr_regs = sizeof(*regs) / sizeof(__u32);
__uint128_t tmp;
void *valp = &tmp;
u64 off;
int err = 0;
/* Our ID is an inde... | 103,022,671,665,194,350,000,000,000,000,000,000,000 | guest.c | 236,591,481,754,431,170,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2018-18021 | arch/arm64/kvm/guest.c in KVM in the Linux kernel before 4.18.12 on the arm64 platform mishandles the KVM_SET_ON_REG ioctl. This is exploitable by attackers who can create virtual machines. An attacker can arbitrarily redirect the hypervisor flow of control (with full register control). An attacker can also cause a den... | https://nvd.nist.gov/vuln/detail/CVE-2018-18021 |
161,608 | linux | 2a3f93459d689d990b3ecfbe782fec89b97d3279 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/2a3f93459d689d990b3ecfbe782fec89b97d3279 | arm64: KVM: Sanitize PSTATE.M when being set from userspace
Not all execution modes are valid for a guest, and some of them
depend on what the HW actually supports. Let's verify that what
userspace provides is compatible with both the VM settings and
the HW capabilities.
Cc: <stable@vger.kernel.org>
Fixes: 0d854a60b1... | 0 | static int set_core_reg(struct kvm_vcpu *vcpu, const struct kvm_one_reg *reg)
{
__u32 __user *uaddr = (__u32 __user *)(unsigned long)reg->addr;
struct kvm_regs *regs = vcpu_gp_regs(vcpu);
int nr_regs = sizeof(*regs) / sizeof(__u32);
__uint128_t tmp;
void *valp = &tmp;
u64 off;
int err = 0;
/* Our ID is an inde... | 109,864,069,029,007,100,000,000,000,000,000,000,000 | guest.c | 243,214,060,563,885,700,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2018-18021 | arch/arm64/kvm/guest.c in KVM in the Linux kernel before 4.18.12 on the arm64 platform mishandles the KVM_SET_ON_REG ioctl. This is exploitable by attackers who can create virtual machines. An attacker can arbitrarily redirect the hypervisor flow of control (with full register control). An attacker can also cause a den... | https://nvd.nist.gov/vuln/detail/CVE-2018-18021 |
4,442 | git | 1a7fd1fb2998002da6e9ff2ee46e1bdd25ee8404 | https://github.com/git/git | https://github.com/git/git/commit/1a7fd1fb2998002da6e9ff2ee46e1bdd25ee8404 | fsck: detect submodule paths starting with dash
As with urls, submodule paths with dashes are ignored by
git, but may end up confusing older versions. Detecting them
via fsck lets us prevent modern versions of git from being a
vector to spread broken .gitmodules to older versions.
Compared to blocking leading-dash ur... | 1 | static int fsck_gitmodules_fn(const char *var, const char *value, void *vdata)
{
struct fsck_gitmodules_data *data = vdata;
const char *subsection, *key;
int subsection_len;
char *name;
if (parse_config_key(var, "submodule", &subsection, &subsection_len, &key) < 0 ||
!subsection)
return 0;
name = xmemdup... | 157,706,953,577,909,880,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-17456 | Git before 2.14.5, 2.15.x before 2.15.3, 2.16.x before 2.16.5, 2.17.x before 2.17.2, 2.18.x before 2.18.1, and 2.19.x before 2.19.1 allows remote code execution during processing of a recursive "git clone" of a superproject if a .gitmodules file has a URL field beginning with a '-' character. | https://nvd.nist.gov/vuln/detail/CVE-2018-17456 |
161,609 | git | 1a7fd1fb2998002da6e9ff2ee46e1bdd25ee8404 | https://github.com/git/git | https://github.com/git/git/commit/1a7fd1fb2998002da6e9ff2ee46e1bdd25ee8404 | fsck: detect submodule paths starting with dash
As with urls, submodule paths with dashes are ignored by
git, but may end up confusing older versions. Detecting them
via fsck lets us prevent modern versions of git from being a
vector to spread broken .gitmodules to older versions.
Compared to blocking leading-dash ur... | 0 | static int fsck_gitmodules_fn(const char *var, const char *value, void *vdata)
{
struct fsck_gitmodules_data *data = vdata;
const char *subsection, *key;
int subsection_len;
char *name;
if (parse_config_key(var, "submodule", &subsection, &subsection_len, &key) < 0 ||
!subsection)
return 0;
name = xmemdup... | 157,590,565,606,615,230,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2018-17456 | Git before 2.14.5, 2.15.x before 2.15.3, 2.16.x before 2.16.5, 2.17.x before 2.17.2, 2.18.x before 2.18.1, and 2.19.x before 2.19.1 allows remote code execution during processing of a recursive "git clone" of a superproject if a .gitmodules file has a URL field beginning with a '-' character. | https://nvd.nist.gov/vuln/detail/CVE-2018-17456 |
4,443 | ImageMagick | 16916c8979c32765c542e216b31cee2671b7afe7 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/16916c8979c32765c542e216b31cee2671b7afe7 | https://github.com/ImageMagick/ImageMagick/issues/1269 | 1 | static Image *ReadDCMImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
#define ThrowDCMException(exception,message) \
{ \
if (info.scale != (Quantum *) NULL) \
info.scale=(Quantum *) RelinquishMagickMemory(info.scale); \
if (data != (unsigned char *) NULL) \
data=(unsigned char *) RelinquishMagi... | 166,974,640,597,951,750,000,000,000,000,000,000,000 | dcm.c | 271,804,267,068,497,900,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2018-16644 | There is a missing check for length in the functions ReadDCMImage of coders/dcm.c and ReadPICTImage of coders/pict.c in ImageMagick 7.0.8-11, which allows remote attackers to cause a denial of service via a crafted image. | https://nvd.nist.gov/vuln/detail/CVE-2018-16644 |
161,610 | ImageMagick | 16916c8979c32765c542e216b31cee2671b7afe7 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/16916c8979c32765c542e216b31cee2671b7afe7 | https://github.com/ImageMagick/ImageMagick/issues/1269 | 0 | static Image *ReadDCMImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
#define ThrowDCMException(exception,message) \
{ \
if (info.scale != (Quantum *) NULL) \
info.scale=(Quantum *) RelinquishMagickMemory(info.scale); \
if (data != (unsigned char *) NULL) \
data=(unsigned char *) RelinquishMagi... | 108,873,788,728,209,000,000,000,000,000,000,000,000 | dcm.c | 22,362,050,219,457,944,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2018-16644 | There is a missing check for length in the functions ReadDCMImage of coders/dcm.c and ReadPICTImage of coders/pict.c in ImageMagick 7.0.8-11, which allows remote attackers to cause a denial of service via a crafted image. | https://nvd.nist.gov/vuln/detail/CVE-2018-16644 |
4,446 | mbedtls | 5224a7544c95552553e2e6be0b4a789956a6464e | https://github.com/ARMmbed/mbedtls | https://github.com/ARMmbed/mbedtls/commit/5224a7544c95552553e2e6be0b4a789956a6464e | Prevent arithmetic overflow on bounds check | 1 | static int ssl_parse_server_psk_hint( mbedtls_ssl_context *ssl,
unsigned char **p,
unsigned char *end )
{
int ret = MBEDTLS_ERR_SSL_FEATURE_UNAVAILABLE;
size_t len;
((void) ssl);
/*
* PSK parameters:
*
* opaque ... | 9,975,011,487,963,196,000,000,000,000,000,000,000 | ssl_cli.c | 245,686,137,588,342,770,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-9989 | ARM mbed TLS before 2.1.11, before 2.7.2, and before 2.8.0 has a buffer over-read in ssl_parse_server_psk_hint() that could cause a crash on invalid input. | https://nvd.nist.gov/vuln/detail/CVE-2018-9989 |
161,611 | mbedtls | 5224a7544c95552553e2e6be0b4a789956a6464e | https://github.com/ARMmbed/mbedtls | https://github.com/ARMmbed/mbedtls/commit/5224a7544c95552553e2e6be0b4a789956a6464e | Prevent arithmetic overflow on bounds check | 0 | static int ssl_parse_server_psk_hint( mbedtls_ssl_context *ssl,
unsigned char **p,
unsigned char *end )
{
int ret = MBEDTLS_ERR_SSL_FEATURE_UNAVAILABLE;
size_t len;
((void) ssl);
/*
* PSK parameters:
*
* opaque ... | 223,300,202,793,194,100,000,000,000,000,000,000,000 | ssl_cli.c | 166,625,442,403,966,110,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-9989 | ARM mbed TLS before 2.1.11, before 2.7.2, and before 2.8.0 has a buffer over-read in ssl_parse_server_psk_hint() that could cause a crash on invalid input. | https://nvd.nist.gov/vuln/detail/CVE-2018-9989 |
4,447 | mbedtls | 027f84c69f4ef30c0693832a6c396ef19e563ca1 | https://github.com/ARMmbed/mbedtls | https://github.com/ARMmbed/mbedtls/commit/027f84c69f4ef30c0693832a6c396ef19e563ca1 | Prevent arithmetic overflow on bounds check | 1 | static int ssl_parse_server_key_exchange( mbedtls_ssl_context *ssl )
{
int ret;
const mbedtls_ssl_ciphersuite_t *ciphersuite_info =
ssl->transform_negotiate->ciphersuite_info;
unsigned char *p = NULL, *end = NULL;
MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> parse server key exchange" ) );
#if defined(MBED... | 216,299,019,030,539,130,000,000,000,000,000,000,000 | ssl_cli.c | 83,727,931,143,460,710,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-9988 | ARM mbed TLS before 2.1.11, before 2.7.2, and before 2.8.0 has a buffer over-read in ssl_parse_server_key_exchange() that could cause a crash on invalid input. | https://nvd.nist.gov/vuln/detail/CVE-2018-9988 |
161,612 | mbedtls | 027f84c69f4ef30c0693832a6c396ef19e563ca1 | https://github.com/ARMmbed/mbedtls | https://github.com/ARMmbed/mbedtls/commit/027f84c69f4ef30c0693832a6c396ef19e563ca1 | Prevent arithmetic overflow on bounds check | 0 | static int ssl_parse_server_key_exchange( mbedtls_ssl_context *ssl )
{
int ret;
const mbedtls_ssl_ciphersuite_t *ciphersuite_info =
ssl->transform_negotiate->ciphersuite_info;
unsigned char *p = NULL, *end = NULL;
MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> parse server key exchange" ) );
#if defined(MBED... | 15,725,512,410,610,159,000,000,000,000,000,000,000 | ssl_cli.c | 226,530,295,457,411,400,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-9988 | ARM mbed TLS before 2.1.11, before 2.7.2, and before 2.8.0 has a buffer over-read in ssl_parse_server_key_exchange() that could cause a crash on invalid input. | https://nvd.nist.gov/vuln/detail/CVE-2018-9988 |
4,448 | libgit2 | 3db1af1f370295ad5355b8f64b865a2a357bcac0 | https://github.com/libgit2/libgit2 | https://github.com/libgit2/libgit2/commit/3db1af1f370295ad5355b8f64b865a2a357bcac0 | index: error out on unreasonable prefix-compressed path lengths
When computing the complete path length from the encoded
prefix-compressed path, we end up just allocating the complete path
without ever checking what the encoded path length actually is. This can
easily lead to a denial of service by just encoding an un... | 1 | static int read_entry(
git_index_entry **out,
size_t *out_size,
git_index *index,
const void *buffer,
size_t buffer_size,
const char *last)
{
size_t path_length, entry_size;
const char *path_ptr;
struct entry_short source;
git_index_entry entry = {{0}};
bool compressed = index->version >= INDEX_VERSION_NUMBE... | 285,266,082,278,998,730,000,000,000,000,000,000,000 | index.c | 148,456,201,620,914,240,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2018-8098 | Integer overflow in the index.c:read_entry() function while decompressing a compressed prefix length in libgit2 before v0.26.2 allows an attacker to cause a denial of service (out-of-bounds read) via a crafted repository index file. | https://nvd.nist.gov/vuln/detail/CVE-2018-8098 |
161,613 | libgit2 | 3db1af1f370295ad5355b8f64b865a2a357bcac0 | https://github.com/libgit2/libgit2 | https://github.com/libgit2/libgit2/commit/3db1af1f370295ad5355b8f64b865a2a357bcac0 | index: error out on unreasonable prefix-compressed path lengths
When computing the complete path length from the encoded
prefix-compressed path, we end up just allocating the complete path
without ever checking what the encoded path length actually is. This can
easily lead to a denial of service by just encoding an un... | 0 | static int read_entry(
git_index_entry **out,
size_t *out_size,
git_index *index,
const void *buffer,
size_t buffer_size,
const char *last)
{
size_t path_length, entry_size;
const char *path_ptr;
struct entry_short source;
git_index_entry entry = {{0}};
bool compressed = index->version >= INDEX_VERSION_NUMBE... | 230,198,378,009,671,630,000,000,000,000,000,000,000 | index.c | 16,865,441,319,100,942,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2018-8098 | Integer overflow in the index.c:read_entry() function while decompressing a compressed prefix length in libgit2 before v0.26.2 allows an attacker to cause a denial of service (out-of-bounds read) via a crafted repository index file. | https://nvd.nist.gov/vuln/detail/CVE-2018-8098 |
4,452 | suricata | 8357ef3f8ffc7d99ef6571350724160de356158b | https://github.com/OISF/suricata | https://github.com/OISF/suricata/commit/8357ef3f8ffc7d99ef6571350724160de356158b | proto/detect: workaround dns misdetected as dcerpc
The DCERPC UDP detection would misfire on DNS with transaction
ID 0x0400. This would happen as the protocol detection engine
gives preference to pattern based detection over probing parsers for
performance reasons.
This hack/workaround fixes this specific case by sti... | 1 | AppProto AppLayerProtoDetectGetProto(AppLayerProtoDetectThreadCtx *tctx,
Flow *f,
uint8_t *buf, uint32_t buflen,
uint8_t ipproto, uint8_t direction)
{
SCEnter();
SCLogDebug("buflen %u for %s direction"... | 42,797,380,008,853,400,000,000,000,000,000,000,000 | app-layer-detect-proto.c | 123,595,736,309,035,860,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2019-1010251 | Open Information Security Foundation Suricata prior to version 4.1.2 is affected by: Denial of Service - DNS detection bypass. The impact is: An attacker can evade a signature detection with a specialy formed network packet. The component is: app-layer-detect-proto.c, decode.c, decode-teredo.c and decode-ipv6.c (https:... | https://nvd.nist.gov/vuln/detail/CVE-2019-1010251 |
161,616 | suricata | 8357ef3f8ffc7d99ef6571350724160de356158b | https://github.com/OISF/suricata | https://github.com/OISF/suricata/commit/8357ef3f8ffc7d99ef6571350724160de356158b | proto/detect: workaround dns misdetected as dcerpc
The DCERPC UDP detection would misfire on DNS with transaction
ID 0x0400. This would happen as the protocol detection engine
gives preference to pattern based detection over probing parsers for
performance reasons.
This hack/workaround fixes this specific case by sti... | 0 | AppProto AppLayerProtoDetectGetProto(AppLayerProtoDetectThreadCtx *tctx,
Flow *f,
uint8_t *buf, uint32_t buflen,
uint8_t ipproto, uint8_t direction)
{
SCEnter();
SCLogDebug("buflen %u for %s direction"... | 231,773,358,303,191,280,000,000,000,000,000,000,000 | app-layer-detect-proto.c | 232,783,236,937,813,620,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2019-1010251 | Open Information Security Foundation Suricata prior to version 4.1.2 is affected by: Denial of Service - DNS detection bypass. The impact is: An attacker can evade a signature detection with a specialy formed network packet. The component is: app-layer-detect-proto.c, decode.c, decode-teredo.c and decode-ipv6.c (https:... | https://nvd.nist.gov/vuln/detail/CVE-2019-1010251 |
4,458 | radare2 | 5411543a310a470b1257fb93273cdd6e8dfcb3af | https://github.com/radare/radare2 | https://github.com/radareorg/radare2/commit/5411543a310a470b1257fb93273cdd6e8dfcb3af | More fixes for the CVE-2019-14745 | 1 | static int bin_symbols(RCore *r, int mode, ut64 laddr, int va, ut64 at, const char *name, bool exponly, const char *args) {
RBinInfo *info = r_bin_get_info (r->bin);
RList *entries = r_bin_get_entries (r->bin);
RBinSymbol *symbol;
RBinAddr *entry;
RListIter *iter;
bool firstexp = true;
bool printHere = false;
i... | 135,940,108,812,750,360,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2019-16718 | In radare2 before 3.9.0, a command injection vulnerability exists in bin_symbols() in libr/core/cbin.c. By using a crafted executable file, it's possible to execute arbitrary shell commands with the permissions of the victim. This vulnerability is due to an insufficient fix for CVE-2019-14745 and improper handling of s... | https://nvd.nist.gov/vuln/detail/CVE-2019-16718 |
161,622 | radare2 | 5411543a310a470b1257fb93273cdd6e8dfcb3af | https://github.com/radare/radare2 | https://github.com/radareorg/radare2/commit/5411543a310a470b1257fb93273cdd6e8dfcb3af | More fixes for the CVE-2019-14745 | 0 | static int bin_symbols(RCore *r, int mode, ut64 laddr, int va, ut64 at, const char *name, bool exponly, const char *args) {
RBinInfo *info = r_bin_get_info (r->bin);
RList *entries = r_bin_get_entries (r->bin);
RBinSymbol *symbol;
RBinAddr *entry;
RListIter *iter;
bool firstexp = true;
bool printHere = false;
i... | 197,456,506,973,153,860,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2019-16718 | In radare2 before 3.9.0, a command injection vulnerability exists in bin_symbols() in libr/core/cbin.c. By using a crafted executable file, it's possible to execute arbitrary shell commands with the permissions of the victim. This vulnerability is due to an insufficient fix for CVE-2019-14745 and improper handling of s... | https://nvd.nist.gov/vuln/detail/CVE-2019-16718 |
4,462 | linux | 072684e8c58d17e853f8e8b9f6d9ce2e58d2b036 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/072684e8c58d17e853f8e8b9f6d9ce2e58d2b036 | USB: gadget: f_hid: fix deadlock in f_hidg_write()
In f_hidg_write() the write_spinlock is acquired before calling
usb_ep_queue() which causes a deadlock when dummy_hcd is being used.
This is because dummy_queue() callbacks into f_hidg_req_complete() which
tries to acquire the same spinlock. This is (part of) the back... | 1 | static ssize_t f_hidg_write(struct file *file, const char __user *buffer,
size_t count, loff_t *offp)
{
struct f_hidg *hidg = file->private_data;
struct usb_request *req;
unsigned long flags;
ssize_t status = -ENOMEM;
if (!access_ok(buffer, count))
return -EFAULT;
spin_lock_irqsave(&hidg->write_spinlo... | 18,722,974,638,875,233,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2019-14763 | In the Linux kernel before 4.16.4, a double-locking error in drivers/usb/dwc3/gadget.c may potentially cause a deadlock with f_hid. | https://nvd.nist.gov/vuln/detail/CVE-2019-14763 |
161,624 | linux | 072684e8c58d17e853f8e8b9f6d9ce2e58d2b036 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/072684e8c58d17e853f8e8b9f6d9ce2e58d2b036 | USB: gadget: f_hid: fix deadlock in f_hidg_write()
In f_hidg_write() the write_spinlock is acquired before calling
usb_ep_queue() which causes a deadlock when dummy_hcd is being used.
This is because dummy_queue() callbacks into f_hidg_req_complete() which
tries to acquire the same spinlock. This is (part of) the back... | 0 | static ssize_t f_hidg_write(struct file *file, const char __user *buffer,
size_t count, loff_t *offp)
{
struct f_hidg *hidg = file->private_data;
struct usb_request *req;
unsigned long flags;
ssize_t status = -ENOMEM;
if (!access_ok(buffer, count))
return -EFAULT;
spin_lock_irqsave(&hidg->write_spinlo... | 4,425,856,548,019,936,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2019-14763 | In the Linux kernel before 4.16.4, a double-locking error in drivers/usb/dwc3/gadget.c may potentially cause a deadlock with f_hid. | https://nvd.nist.gov/vuln/detail/CVE-2019-14763 |
4,482 | miniupnp | 86030db849260dd8fb2ed975b9890aef1b62b692 | https://github.com/miniupnp/miniupnp | https://github.com/miniupnp/miniupnp/commit/86030db849260dd8fb2ed975b9890aef1b62b692 | fix error from commit 13585f15c7f7dc28bbbba1661efb280d530d114c | 1 | GetOutboundPinholeTimeout(struct upnphttp * h, const char * action, const char * ns)
{
int r;
static const char resp[] =
"<u:%sResponse "
"xmlns:u=\"%s\">"
"<OutboundPinholeTimeout>%d</OutboundPinholeTimeout>"
"</u:%sResponse>";
char body[512];
int bodylen;
struct NameValueParserData data;
char * int_ip... | 189,077,583,638,678,540,000,000,000,000,000,000,000 | upnpsoap.c | 43,985,210,412,667,610,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2019-12109 | A Denial Of Service vulnerability in MiniUPnP MiniUPnPd through 2.1 exists due to a NULL pointer dereference in GetOutboundPinholeTimeout in upnpsoap.c for rem_port. | https://nvd.nist.gov/vuln/detail/CVE-2019-12109 |
161,639 | miniupnp | 86030db849260dd8fb2ed975b9890aef1b62b692 | https://github.com/miniupnp/miniupnp | https://github.com/miniupnp/miniupnp/commit/86030db849260dd8fb2ed975b9890aef1b62b692 | fix error from commit 13585f15c7f7dc28bbbba1661efb280d530d114c | 0 | GetOutboundPinholeTimeout(struct upnphttp * h, const char * action, const char * ns)
{
int r;
static const char resp[] =
"<u:%sResponse "
"xmlns:u=\"%s\">"
"<OutboundPinholeTimeout>%d</OutboundPinholeTimeout>"
"</u:%sResponse>";
char body[512];
int bodylen;
struct NameValueParserData data;
char * int_ip... | 274,980,753,247,083,820,000,000,000,000,000,000,000 | upnpsoap.c | 239,055,731,804,881,930,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2019-12109 | A Denial Of Service vulnerability in MiniUPnP MiniUPnPd through 2.1 exists due to a NULL pointer dereference in GetOutboundPinholeTimeout in upnpsoap.c for rem_port. | https://nvd.nist.gov/vuln/detail/CVE-2019-12109 |
4,499 | ImageMagick | 58d9c46929ca0828edde34d263700c3a5fe8dc3c | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/58d9c46929ca0828edde34d263700c3a5fe8dc3c | ... | 1 | MagickExport int LocaleLowercase(const int c)
{
if (c < 0)
return(c);
#if defined(MAGICKCORE_LOCALE_SUPPORT)
if (c_locale != (locale_t) NULL)
return(tolower_l((int) ((unsigned char) c),c_locale));
#endif
return(tolower((int) ((unsigned char) c)));
}
| 281,269,707,960,595,000,000,000,000,000,000,000,000 | locale.c | 280,458,419,050,800,300,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-10714 | LocaleLowercase in MagickCore/locale.c in ImageMagick before 7.0.8-32 allows out-of-bounds access, leading to a SIGSEGV. | https://nvd.nist.gov/vuln/detail/CVE-2019-10714 |
161,655 | ImageMagick | 58d9c46929ca0828edde34d263700c3a5fe8dc3c | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/58d9c46929ca0828edde34d263700c3a5fe8dc3c | ... | 0 | MagickExport int LocaleLowercase(const int c)
{
if (c == EOF)
return(c);
#if defined(MAGICKCORE_LOCALE_SUPPORT)
if (c_locale != (locale_t) NULL)
return(tolower_l((int) ((unsigned char) c),c_locale));
#endif
return(tolower((int) ((unsigned char) c)));
}
| 29,052,808,171,853,630,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2019-10714 | LocaleLowercase in MagickCore/locale.c in ImageMagick before 7.0.8-32 allows out-of-bounds access, leading to a SIGSEGV. | https://nvd.nist.gov/vuln/detail/CVE-2019-10714 |
4,510 | openjpeg | 5d00b719f4b93b1445e6fb4c766b9a9883c57949 | https://github.com/uclouvain/openjpeg | https://github.com/uclouvain/openjpeg/commit/5d00b719f4b93b1445e6fb4c766b9a9883c57949 | [trunk] fixed a buffer overflow in opj_tcd_init_decode_tile
Update issue 431 | 1 | void opj_get_all_encoding_parameters( const opj_image_t *p_image,
const opj_cp_t *p_cp,
OPJ_UINT32 tileno,
OPJ_INT32 * p_tx0,
OPJ_INT32 * p_tx1,
... | 279,071,337,625,763,900,000,000,000,000,000,000,000 | pi.c | 61,290,128,435,409,710,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2018-20847 | An improper computation of p_tx0, p_tx1, p_ty0 and p_ty1 in the function opj_get_encoding_parameters in openjp2/pi.c in OpenJPEG through 2.3.0 can lead to an integer overflow. | https://nvd.nist.gov/vuln/detail/CVE-2018-20847 |
161,659 | openjpeg | 5d00b719f4b93b1445e6fb4c766b9a9883c57949 | https://github.com/uclouvain/openjpeg | https://github.com/uclouvain/openjpeg/commit/5d00b719f4b93b1445e6fb4c766b9a9883c57949 | [trunk] fixed a buffer overflow in opj_tcd_init_decode_tile
Update issue 431 | 0 | void opj_get_all_encoding_parameters( const opj_image_t *p_image,
const opj_cp_t *p_cp,
OPJ_UINT32 tileno,
OPJ_INT32 * p_tx0,
OPJ_INT32 * p_tx1,
... | 228,945,466,921,933,980,000,000,000,000,000,000,000 | pi.c | 85,117,321,979,618,870,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2018-20847 | An improper computation of p_tx0, p_tx1, p_ty0 and p_ty1 in the function opj_get_encoding_parameters in openjp2/pi.c in OpenJPEG through 2.3.0 can lead to an integer overflow. | https://nvd.nist.gov/vuln/detail/CVE-2018-20847 |
4,511 | linux | 5c25f65fd1e42685f7ccd80e0621829c105785d9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/5c25f65fd1e42685f7ccd80e0621829c105785d9 | tun: allow positive return values on dev_get_valid_name() call
If the name argument of dev_get_valid_name() contains "%d", it will try
to assign it a unit number in __dev__alloc_name() and return either the
unit number (>= 0) or an error code (< 0).
Considering positive values as error values prevent tun device creati... | 1 | static int tun_set_iff(struct net *net, struct file *file, struct ifreq *ifr)
{
struct tun_struct *tun;
struct tun_file *tfile = file->private_data;
struct net_device *dev;
int err;
if (tfile->detached)
return -EINVAL;
dev = __dev_get_by_name(net, ifr->ifr_name);
if (dev) {
if (ifr->ifr_flags & IFF_TUN_EXC... | 55,157,606,478,905,350,000,000,000,000,000,000,000 | tun.c | 129,036,952,106,696,010,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2018-7191 | In the tun subsystem in the Linux kernel before 4.13.14, dev_get_valid_name is not called before register_netdevice. This allows local users to cause a denial of service (NULL pointer dereference and panic) via an ioctl(TUNSETIFF) call with a dev name containing a / character. This is similar to CVE-2013-4343. | https://nvd.nist.gov/vuln/detail/CVE-2018-7191 |
161,660 | linux | 5c25f65fd1e42685f7ccd80e0621829c105785d9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/5c25f65fd1e42685f7ccd80e0621829c105785d9 | tun: allow positive return values on dev_get_valid_name() call
If the name argument of dev_get_valid_name() contains "%d", it will try
to assign it a unit number in __dev__alloc_name() and return either the
unit number (>= 0) or an error code (< 0).
Considering positive values as error values prevent tun device creati... | 0 | static int tun_set_iff(struct net *net, struct file *file, struct ifreq *ifr)
{
struct tun_struct *tun;
struct tun_file *tfile = file->private_data;
struct net_device *dev;
int err;
if (tfile->detached)
return -EINVAL;
dev = __dev_get_by_name(net, ifr->ifr_name);
if (dev) {
if (ifr->ifr_flags & IFF_TUN_EXC... | 299,196,588,912,012,760,000,000,000,000,000,000,000 | tun.c | 183,292,750,824,109,400,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2018-7191 | In the tun subsystem in the Linux kernel before 4.13.14, dev_get_valid_name is not called before register_netdevice. This allows local users to cause a denial of service (NULL pointer dereference and panic) via an ioctl(TUNSETIFF) call with a dev name containing a / character. This is similar to CVE-2013-4343. | https://nvd.nist.gov/vuln/detail/CVE-2018-7191 |
4,694 | Chrome | 7d8cefdf6d0e457b7a855c9503684f1058c2a356 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/7d8cefdf6d0e457b7a855c9503684f1058c2a356 | None | 1 | WebGLObject::WebGLObject(WebGLRenderingContext* context)
: m_object(0)
, m_attachmentCount(0)
, m_deleted(false)
{
}
| 113,581,393,010,610,800,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-3916 | Google Chrome before 16.0.912.63 does not properly handle PDF cross references, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2011-3916 |
161,832 | Chrome | 7d8cefdf6d0e457b7a855c9503684f1058c2a356 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/7d8cefdf6d0e457b7a855c9503684f1058c2a356 | None | 0 | WebGLObject::WebGLObject(WebGLRenderingContext* context)
WebGLObject::WebGLObject(WebGLRenderingContext*)
: m_object(0)
, m_attachmentCount(0)
, m_deleted(false)
{
}
| 294,387,494,251,585,160,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-3916 | Google Chrome before 16.0.912.63 does not properly handle PDF cross references, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2011-3916 |
4,803 | Chrome | d662b905d30cec7899bbb15140dcfacd73506167 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/d662b905d30cec7899bbb15140dcfacd73506167 | None | 1 | BlockedPluginInfoBarDelegate::BlockedPluginInfoBarDelegate(
TabContents* tab_contents,
const string16& utf16_name)
: PluginInfoBarDelegate(tab_contents, utf16_name) {
UserMetrics::RecordAction(UserMetricsAction("BlockedPluginInfobar.Shown"));
std::string name = UTF16ToUTF8(utf16_name);
if (name == web... | 129,354,267,864,543,600,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2011-2836 | Google Chrome before 14.0.835.163 does not require Infobar interaction before use of the Windows Media Player plug-in, which makes it easier for remote attackers to have an unspecified impact via crafted Flash content. | https://nvd.nist.gov/vuln/detail/CVE-2011-2836 |
161,936 | Chrome | d662b905d30cec7899bbb15140dcfacd73506167 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/d662b905d30cec7899bbb15140dcfacd73506167 | None | 0 | BlockedPluginInfoBarDelegate::BlockedPluginInfoBarDelegate(
TabContents* tab_contents,
const string16& utf16_name)
: PluginInfoBarDelegate(tab_contents, utf16_name) {
UserMetrics::RecordAction(UserMetricsAction("BlockedPluginInfobar.Shown"));
std::string name = UTF16ToUTF8(utf16_name);
if (name == web... | 106,969,321,277,819,680,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2011-2836 | Google Chrome before 14.0.835.163 does not require Infobar interaction before use of the Windows Media Player plug-in, which makes it easier for remote attackers to have an unspecified impact via crafted Flash content. | https://nvd.nist.gov/vuln/detail/CVE-2011-2836 |
4,807 | Chrome | d304b5ec1b16766ea2cb552a27dc14df848d6a0e | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/d304b5ec1b16766ea2cb552a27dc14df848d6a0e | None | 1 | void FFmpegVideoDecodeEngine::Initialize(
MessageLoop* message_loop,
VideoDecodeEngine::EventHandler* event_handler,
VideoDecodeContext* context,
const VideoDecoderConfig& config) {
static const int kDecodeThreads = 2;
static const int kMaxDecodeThreads = 16;
codec_context_ = avcodec_alloc_contex... | 158,059,457,852,489,340,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-2843 | Google Chrome before 14.0.835.163 does not properly handle media buffers, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2011-2843 |
161,940 | Chrome | d304b5ec1b16766ea2cb552a27dc14df848d6a0e | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/d304b5ec1b16766ea2cb552a27dc14df848d6a0e | None | 0 | void FFmpegVideoDecodeEngine::Initialize(
MessageLoop* message_loop,
VideoDecodeEngine::EventHandler* event_handler,
VideoDecodeContext* context,
const VideoDecoderConfig& config) {
static const int kDecodeThreads = 2;
static const int kMaxDecodeThreads = 16;
codec_context_ = avcodec_alloc_contex... | 311,936,192,025,024,040,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-2843 | Google Chrome before 14.0.835.163 does not properly handle media buffers, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2011-2843 |
4,816 | Chrome | 7155d7caafd2aa1fb822dc5672c90ea446247e8d | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/7155d7caafd2aa1fb822dc5672c90ea446247e8d | None | 1 | void ScaleYUVToRGB32(const uint8* y_buf,
const uint8* u_buf,
const uint8* v_buf,
uint8* rgb_buf,
int source_width,
int source_height,
int width,
int height,
... | 253,694,277,743,522,000,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-2851 | Google Chrome before 14.0.835.163 does not properly handle video, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2011-2851 |
161,948 | Chrome | 7155d7caafd2aa1fb822dc5672c90ea446247e8d | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/7155d7caafd2aa1fb822dc5672c90ea446247e8d | None | 0 | void ScaleYUVToRGB32(const uint8* y_buf,
const uint8* u_buf,
const uint8* v_buf,
uint8* rgb_buf,
int source_width,
int source_height,
int width,
int height,
... | 321,584,538,849,835,450,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-2851 | Google Chrome before 14.0.835.163 does not properly handle video, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2011-2851 |
4,817 | Chrome | d82e91c46938520466e9d7c695e0bc638fc70970 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/d82e91c46938520466e9d7c695e0bc638fc70970 | None | 1 | NativeBrowserFrame* NativeBrowserFrame::CreateNativeBrowserFrame(
BrowserFrame* browser_frame,
BrowserView* browser_view) {
if (views::Widget::IsPureViews())
return new BrowserFrameViews(browser_frame, browser_view);
return new BrowserFrameGtk(browser_frame, browser_view);
}
| 284,461,539,438,023,930,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2011-2853 | Use-after-free vulnerability in Google Chrome before 14.0.835.163 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to plug-in handling. | https://nvd.nist.gov/vuln/detail/CVE-2011-2853 |
161,949 | Chrome | d82e91c46938520466e9d7c695e0bc638fc70970 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/d82e91c46938520466e9d7c695e0bc638fc70970 | None | 0 | NativeBrowserFrame* NativeBrowserFrame::CreateNativeBrowserFrame(
BrowserFrame* browser_frame,
BrowserView* browser_view) {
if (views::Widget::IsPureViews() &&
views::ViewsDelegate::views_delegate->GetDefaultParentView())
return new BrowserFrameViews(browser_frame, browser_view);
return new B... | 326,999,065,481,318,850,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2011-2853 | Use-after-free vulnerability in Google Chrome before 14.0.835.163 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to plug-in handling. | https://nvd.nist.gov/vuln/detail/CVE-2011-2853 |
4,819 | Chrome | 061ddbae1ee31476b57ea44a953970ab2fe8aca1 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/061ddbae1ee31476b57ea44a953970ab2fe8aca1 | None | 1 | void DocumentWriter::setDecoder(TextResourceDecoder* decoder)
{
m_decoder = decoder;
}
| 124,821,018,363,863,960,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2011-2854 | Use-after-free vulnerability in Google Chrome before 14.0.835.163 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to "ruby / table style handing." | https://nvd.nist.gov/vuln/detail/CVE-2011-2854 |
161,951 | Chrome | 061ddbae1ee31476b57ea44a953970ab2fe8aca1 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/061ddbae1ee31476b57ea44a953970ab2fe8aca1 | None | 0 | void DocumentWriter::setDecoder(TextResourceDecoder* decoder)
| 158,557,431,112,174,510,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2011-2854 | Use-after-free vulnerability in Google Chrome before 14.0.835.163 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to "ruby / table style handing." | https://nvd.nist.gov/vuln/detail/CVE-2011-2854 |
4,820 | Chrome | 3a766e0115e9799db766a88554b9ab12ee5bf2a4 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/3a766e0115e9799db766a88554b9ab12ee5bf2a4 | None | 1 | xmlXPathCompOpEval(xmlXPathParserContextPtr ctxt, xmlXPathStepOpPtr op)
{
int total = 0;
int equal, ret;
xmlXPathCompExprPtr comp;
xmlXPathObjectPtr arg1, arg2;
xmlNodePtr bak;
xmlDocPtr bakd;
int pp;
int cs;
CHECK_ERROR0;
comp = ctxt->comp;
switch (op->op) {
case XP... | 152,834,258,874,192,350,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2011-2834 | Double free vulnerability in libxml2, as used in Google Chrome before 14.0.835.163, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to XPath handling. | https://nvd.nist.gov/vuln/detail/CVE-2011-2834 |
161,952 | Chrome | 3a766e0115e9799db766a88554b9ab12ee5bf2a4 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/3a766e0115e9799db766a88554b9ab12ee5bf2a4 | None | 0 | xmlXPathCompOpEval(xmlXPathParserContextPtr ctxt, xmlXPathStepOpPtr op)
{
int total = 0;
int equal, ret;
xmlXPathCompExprPtr comp;
xmlXPathObjectPtr arg1, arg2;
xmlNodePtr bak;
xmlDocPtr bakd;
int pp;
int cs;
CHECK_ERROR0;
comp = ctxt->comp;
switch (op->op) {
case XP... | 313,226,224,957,561,150,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2011-2834 | Double free vulnerability in libxml2, as used in Google Chrome before 14.0.835.163, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to XPath handling. | https://nvd.nist.gov/vuln/detail/CVE-2011-2834 |
4,821 | Chrome | 454434f6100cb6a529652a25b5fc181caa7c7f32 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/454434f6100cb6a529652a25b5fc181caa7c7f32 | None | 1 | bool ExtensionService::IsDownloadFromGallery(const GURL& download_url,
const GURL& referrer_url) {
if (IsDownloadFromMiniGallery(download_url) &&
StartsWithASCII(referrer_url.spec(),
extension_urls::kMiniGalleryBrowsePrefix, false)) {
retu... | 110,603,712,723,080,350,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2011-2859 | Google Chrome before 14.0.835.163 uses incorrect permissions for non-gallery pages, which has unspecified impact and attack vectors. | https://nvd.nist.gov/vuln/detail/CVE-2011-2859 |
161,953 | Chrome | 454434f6100cb6a529652a25b5fc181caa7c7f32 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/454434f6100cb6a529652a25b5fc181caa7c7f32 | None | 0 | bool ExtensionService::IsDownloadFromGallery(const GURL& download_url,
const GURL& referrer_url) {
if (IsDownloadFromMiniGallery(download_url) &&
StartsWithASCII(referrer_url.spec(),
extension_urls::kMiniGalleryBrowsePrefix, false)) {
retu... | 152,275,995,827,129,880,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2011-2859 | Google Chrome before 14.0.835.163 uses incorrect permissions for non-gallery pages, which has unspecified impact and attack vectors. | https://nvd.nist.gov/vuln/detail/CVE-2011-2859 |
4,822 | Chrome | 6c390601f9ee3436bb32f84772977570265982ea | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/6c390601f9ee3436bb32f84772977570265982ea | None | 1 | bool ContainerNode::replaceChild(PassRefPtr<Node> newChild, Node* oldChild, ExceptionCode& ec, bool shouldLazyAttach)
{
ASSERT(refCount() || parentOrHostNode());
RefPtr<Node> protect(this);
ec = 0;
if (oldChild == newChild) // nothing to do
return true;
checkReplaceChild(newChild.get(), ... | 226,083,901,999,659,320,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2011-2860 | Use-after-free vulnerability in Google Chrome before 14.0.835.163 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to table styles. | https://nvd.nist.gov/vuln/detail/CVE-2011-2860 |
161,954 | Chrome | 6c390601f9ee3436bb32f84772977570265982ea | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/6c390601f9ee3436bb32f84772977570265982ea | None | 0 | bool ContainerNode::replaceChild(PassRefPtr<Node> newChild, Node* oldChild, ExceptionCode& ec, bool shouldLazyAttach)
{
ASSERT(refCount() || parentOrHostNode());
RefPtr<Node> protect(this);
ec = 0;
if (oldChild == newChild) // nothing to do
return true;
checkReplaceChild(newChild.get(), ... | 282,795,495,570,752,560,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2011-2860 | Use-after-free vulnerability in Google Chrome before 14.0.835.163 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to table styles. | https://nvd.nist.gov/vuln/detail/CVE-2011-2860 |
4,829 | Chrome | 5b65968b6c64fa02e74ca6b965bf5998b911e826 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/5b65968b6c64fa02e74ca6b965bf5998b911e826 | None | 1 | bool SubsetterImpl::ResolveCompositeGlyphs(const unsigned int* glyph_ids,
size_t glyph_count,
IntegerSet* glyph_id_processed) {
if (glyph_ids == NULL || glyph_count == 0 || glyph_id_processed == NULL) {
return false;
}
Glyp... | 88,383,665,204,444,790,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-2864 | Google Chrome before 14.0.835.163 does not properly handle Tibetan characters, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2011-2864 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.