idx
int64
project
string
commit_id
string
project_url
string
commit_url
string
commit_message
string
target
int64
func
string
func_hash
float64
file_name
string
file_hash
float64
cwe
list
cve
string
cve_desc
string
nvd_url
string
161,524
radare2
d21e91f075a7a7a8ed23baa5c1bb1fac48313882
https://github.com/radare/radare2
https://github.com/radare/radare2/commit/d21e91f075a7a7a8ed23baa5c1bb1fac48313882
Fix #8764 differently since ptr diff might not fit in ptrdiff_t
0
static Sdb *store_versioninfo_gnu_verdef(ELFOBJ *bin, Elf_(Shdr) *shdr, int sz) { const char *section_name = ""; const char *link_section_name = ""; char *end = NULL; Elf_(Shdr) *link_shdr = NULL; ut8 dfs[sizeof (Elf_(Verdef))] = {0}; Sdb *sdb; int cnt, i; if (shdr->sh_link > bin->ehdr.e_shnum) { return false...
113,707,833,717,209,430,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2017-16359
In radare 2.0.1, a pointer wraparound vulnerability exists in store_versioninfo_gnu_verdef() in libr/bin/format/elf/elf.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-16359
4,327
radare2
fbaf24bce7ea4211e4608b3ab6c1b45702cb243d
https://github.com/radare/radare2
https://github.com/radare/radare2/commit/fbaf24bce7ea4211e4608b3ab6c1b45702cb243d
Fix #8764 a 3rd time since 2nd time is UB and can be optimized away
1
static Sdb *store_versioninfo_gnu_verdef(ELFOBJ *bin, Elf_(Shdr) *shdr, int sz) { const char *section_name = ""; const char *link_section_name = ""; char *end = NULL; Elf_(Shdr) *link_shdr = NULL; ut8 dfs[sizeof (Elf_(Verdef))] = {0}; Sdb *sdb; int cnt, i; if (shdr->sh_link > bin->ehdr.e_shnum) { return false...
49,750,649,927,320,680,000,000,000,000,000,000,000
elf.c
82,792,017,403,717,510,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2017-16359
In radare 2.0.1, a pointer wraparound vulnerability exists in store_versioninfo_gnu_verdef() in libr/bin/format/elf/elf.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-16359
161,525
radare2
fbaf24bce7ea4211e4608b3ab6c1b45702cb243d
https://github.com/radare/radare2
https://github.com/radare/radare2/commit/fbaf24bce7ea4211e4608b3ab6c1b45702cb243d
Fix #8764 a 3rd time since 2nd time is UB and can be optimized away
0
static Sdb *store_versioninfo_gnu_verdef(ELFOBJ *bin, Elf_(Shdr) *shdr, int sz) { const char *section_name = ""; const char *link_section_name = ""; char *end = NULL; Elf_(Shdr) *link_shdr = NULL; ut8 dfs[sizeof (Elf_(Verdef))] = {0}; Sdb *sdb; int cnt, i; if (shdr->sh_link > bin->ehdr.e_shnum) { return false...
138,571,086,863,991,090,000,000,000,000,000,000,000
elf.c
26,207,377,001,347,442,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2017-16359
In radare 2.0.1, a pointer wraparound vulnerability exists in store_versioninfo_gnu_verdef() in libr/bin/format/elf/elf.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-16359
4,329
ImageMagick
04a567494786d5bb50894fc8bb8fea0cf496bea8
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/04a567494786d5bb50894fc8bb8fea0cf496bea8
Slightly different fix for #714
1
static MagickBooleanType ReadPSDLayersInternal(Image *image, const ImageInfo *image_info,const PSDInfo *psd_info, const MagickBooleanType skip_layers,ExceptionInfo *exception) { char type[4]; LayerInfo *layer_info; MagickSizeType size; MagickBooleanType status; register ssize_t i; ...
272,298,623,691,895,300,000,000,000,000,000,000,000
psd.c
10,373,962,997,159,750,000,000,000,000,000,000,000
[ "CWE-834" ]
CVE-2017-14174
In coders/psd.c in ImageMagick 7.0.7-0 Q16, a DoS in ReadPSDLayersInternal() due to lack of an EOF (End of File) check might cause huge CPU consumption. When a crafted PSD file, which claims a large "length" field in the header but does not contain sufficient backing data, is provided, the loop over "length" would cons...
https://nvd.nist.gov/vuln/detail/CVE-2017-14174
161,526
ImageMagick
04a567494786d5bb50894fc8bb8fea0cf496bea8
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/04a567494786d5bb50894fc8bb8fea0cf496bea8
Slightly different fix for #714
0
static MagickBooleanType ReadPSDLayersInternal(Image *image, const ImageInfo *image_info,const PSDInfo *psd_info, const MagickBooleanType skip_layers,ExceptionInfo *exception) { char type[4]; LayerInfo *layer_info; MagickSizeType size; MagickBooleanType status; register ssize_t i; ...
182,085,283,561,600,230,000,000,000,000,000,000,000
psd.c
87,337,031,620,871,340,000,000,000,000,000,000,000
[ "CWE-834" ]
CVE-2017-14174
In coders/psd.c in ImageMagick 7.0.7-0 Q16, a DoS in ReadPSDLayersInternal() due to lack of an EOF (End of File) check might cause huge CPU consumption. When a crafted PSD file, which claims a large "length" field in the header but does not contain sufficient backing data, is provided, the loop over "length" would cons...
https://nvd.nist.gov/vuln/detail/CVE-2017-14174
4,337
tcpdump
29e5470e6ab84badbc31f4532bb7554a796d9d52
https://github.com/the-tcpdump-group/tcpdump
https://github.com/the-tcpdump-group/tcpdump/commit/29e5470e6ab84badbc31f4532bb7554a796d9d52
CVE-2017-13028/BOOTP: Add a bounds check before fetching data This fixes a buffer over-read discovered by Bhargava Shastry, SecT/TU Berlin. Add a test using the capture file supplied by the reporter(s), modified so the capture file won't cause 'tcpdump: pcap_loop: truncated dump file'
1
bootp_print(netdissect_options *ndo, register const u_char *cp, u_int length) { register const struct bootp *bp; static const u_char vm_cmu[4] = VM_CMU; static const u_char vm_rfc1048[4] = VM_RFC1048; bp = (const struct bootp *)cp; ND_TCHECK(bp->bp_op); ND_PRINT((ndo, "BOOTP/DHCP, %s", tok2str(bootp_op...
177,049,373,499,157,830,000,000,000,000,000,000,000
print-bootp.c
159,087,126,255,627,960,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-13028
The BOOTP parser in tcpdump before 4.9.2 has a buffer over-read in print-bootp.c:bootp_print().
https://nvd.nist.gov/vuln/detail/CVE-2017-13028
161,530
tcpdump
29e5470e6ab84badbc31f4532bb7554a796d9d52
https://github.com/the-tcpdump-group/tcpdump
https://github.com/the-tcpdump-group/tcpdump/commit/29e5470e6ab84badbc31f4532bb7554a796d9d52
CVE-2017-13028/BOOTP: Add a bounds check before fetching data This fixes a buffer over-read discovered by Bhargava Shastry, SecT/TU Berlin. Add a test using the capture file supplied by the reporter(s), modified so the capture file won't cause 'tcpdump: pcap_loop: truncated dump file'
0
bootp_print(netdissect_options *ndo, register const u_char *cp, u_int length) { register const struct bootp *bp; static const u_char vm_cmu[4] = VM_CMU; static const u_char vm_rfc1048[4] = VM_RFC1048; bp = (const struct bootp *)cp; ND_TCHECK(bp->bp_op); ND_PRINT((ndo, "BOOTP/DHCP, %s", tok2str(bootp_op...
220,568,402,914,638,800,000,000,000,000,000,000,000
print-bootp.c
52,352,827,576,130,850,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-13028
The BOOTP parser in tcpdump before 4.9.2 has a buffer over-read in print-bootp.c:bootp_print().
https://nvd.nist.gov/vuln/detail/CVE-2017-13028
4,338
tcpdump
42073d54c53a496be40ae84152bbfe2c923ac7bc
https://github.com/the-tcpdump-group/tcpdump
https://github.com/the-tcpdump-group/tcpdump/commit/42073d54c53a496be40ae84152bbfe2c923ac7bc
CVE-2017-13004/Juniper: Add a bounds check. This fixes a buffer over-read discovered by Forcepoint's security researchers Otto Airamo & Antti Levomäki. Add tests using the capture files supplied by the reporter(s).
1
juniper_parse_header(netdissect_options *ndo, const u_char *p, const struct pcap_pkthdr *h, struct juniper_l2info_t *l2info) { const struct juniper_cookie_table_t *lp = juniper_cookie_table; u_int idx, jnx_ext_len, jnx_header_len = 0; uint8_t tlv_type,tlv_len; uint32_t control_word;...
47,824,677,361,513,335,000,000,000,000,000,000,000
print-juniper.c
285,998,041,224,733,920,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-13004
The Juniper protocols parser in tcpdump before 4.9.2 has a buffer over-read in print-juniper.c:juniper_parse_header().
https://nvd.nist.gov/vuln/detail/CVE-2017-13004
161,531
tcpdump
42073d54c53a496be40ae84152bbfe2c923ac7bc
https://github.com/the-tcpdump-group/tcpdump
https://github.com/the-tcpdump-group/tcpdump/commit/42073d54c53a496be40ae84152bbfe2c923ac7bc
CVE-2017-13004/Juniper: Add a bounds check. This fixes a buffer over-read discovered by Forcepoint's security researchers Otto Airamo & Antti Levomäki. Add tests using the capture files supplied by the reporter(s).
0
juniper_parse_header(netdissect_options *ndo, const u_char *p, const struct pcap_pkthdr *h, struct juniper_l2info_t *l2info) { const struct juniper_cookie_table_t *lp = juniper_cookie_table; u_int idx, jnx_ext_len, jnx_header_len = 0; uint8_t tlv_type,tlv_len; uint32_t control_word;...
211,920,252,059,170,600,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2017-13004
The Juniper protocols parser in tcpdump before 4.9.2 has a buffer over-read in print-juniper.c:juniper_parse_header().
https://nvd.nist.gov/vuln/detail/CVE-2017-13004
4,343
tcpdump
c6e0531b5def26ecf912e8de6ade86cbdaed3751
https://github.com/the-tcpdump-group/tcpdump
https://github.com/the-tcpdump-group/tcpdump/commit/c6e0531b5def26ecf912e8de6ade86cbdaed3751
CVE-2017-12899/DECnet: Fix bounds checking. If we're skipping over padding before the *real* flags, check whether the real flags are in the captured data before fetching it. This fixes a buffer over-read discovered by Kamil Frankowicz. Note one place where we don't need to do bounds checking as it's already been don...
1
decnet_print(netdissect_options *ndo, register const u_char *ap, register u_int length, register u_int caplen) { register const union routehdr *rhp; register int mflags; int dst, src, hops; u_int nsplen, pktlen; const u_char *nspp; if (length < sizeof(struct shorthdr)) { ND_PRINT((ndo...
219,860,692,152,115,800,000,000,000,000,000,000,000
print-decnet.c
107,306,623,307,408,510,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-12899
The DECnet parser in tcpdump before 4.9.2 has a buffer over-read in print-decnet.c:decnet_print().
https://nvd.nist.gov/vuln/detail/CVE-2017-12899
161,533
tcpdump
c6e0531b5def26ecf912e8de6ade86cbdaed3751
https://github.com/the-tcpdump-group/tcpdump
https://github.com/the-tcpdump-group/tcpdump/commit/c6e0531b5def26ecf912e8de6ade86cbdaed3751
CVE-2017-12899/DECnet: Fix bounds checking. If we're skipping over padding before the *real* flags, check whether the real flags are in the captured data before fetching it. This fixes a buffer over-read discovered by Kamil Frankowicz. Note one place where we don't need to do bounds checking as it's already been don...
0
decnet_print(netdissect_options *ndo, register const u_char *ap, register u_int length, register u_int caplen) { register const union routehdr *rhp; register int mflags; int dst, src, hops; u_int nsplen, pktlen; const u_char *nspp; if (length < sizeof(struct shorthdr)) { ND_PRINT((ndo...
58,080,337,703,374,665,000,000,000,000,000,000,000
print-decnet.c
340,272,304,251,680,200,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-12899
The DECnet parser in tcpdump before 4.9.2 has a buffer over-read in print-decnet.c:decnet_print().
https://nvd.nist.gov/vuln/detail/CVE-2017-12899
4,346
cyrus-imapd
53c4137bd924b954432c6c59da7572c4c5ffa901
https://github.com/cyrusimap/cyrus-imapd
https://github.com/cyrusimap/cyrus-imapd/commit/53c4137bd924b954432c6c59da7572c4c5ffa901
imapd: check for isadmin BEFORE parsing sync lines
1
static void cmdloop(void) { int c; int usinguid, havepartition, havenamespace, recursive; static struct buf tag, cmd, arg1, arg2, arg3; char *p, shut[MAX_MAILBOX_PATH+1], cmdname[100]; const char *err; const char * commandmintimer; double commandmintimerd = 0.0; struct sync_reserve_list ...
200,822,341,397,563,370,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2017-12843
Cyrus IMAP before 3.0.3 allows remote authenticated users to write to arbitrary files via a crafted (1) SYNCAPPLY, (2) SYNCGET or (3) SYNCRESTORE command.
https://nvd.nist.gov/vuln/detail/CVE-2017-12843
161,535
cyrus-imapd
53c4137bd924b954432c6c59da7572c4c5ffa901
https://github.com/cyrusimap/cyrus-imapd
https://github.com/cyrusimap/cyrus-imapd/commit/53c4137bd924b954432c6c59da7572c4c5ffa901
imapd: check for isadmin BEFORE parsing sync lines
0
static void cmdloop(void) { int c; int usinguid, havepartition, havenamespace, recursive; static struct buf tag, cmd, arg1, arg2, arg3; char *p, shut[MAX_MAILBOX_PATH+1], cmdname[100]; const char *err; const char * commandmintimer; double commandmintimerd = 0.0; struct sync_reserve_list ...
90,412,593,932,109,100,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2017-12843
Cyrus IMAP before 3.0.3 allows remote authenticated users to write to arbitrary files via a crafted (1) SYNCAPPLY, (2) SYNCGET or (3) SYNCRESTORE command.
https://nvd.nist.gov/vuln/detail/CVE-2017-12843
4,347
linux
2b04e8f6bbb196cab4b232af0f8d48ff2c7a8058
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/2b04e8f6bbb196cab4b232af0f8d48ff2c7a8058
more bio_map_user_iov() leak fixes we need to take care of failure exit as well - pages already in bio should be dropped by analogue of bio_unmap_pages(), since their refcounts had been bumped only once per reference in bio. Cc: stable@vger.kernel.org Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
1
struct bio *bio_map_user_iov(struct request_queue *q, const struct iov_iter *iter, gfp_t gfp_mask) { int j; int nr_pages = 0; struct page **pages; struct bio *bio; int cur_page = 0; int ret, offset; struct iov_iter i; struct iovec iov; iov_for_each(iov, i, *iter) { unsigned long uaddr ...
75,562,170,872,440,760,000,000,000,000,000,000,000
bio.c
188,686,352,710,057,400,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2017-12190
The bio_map_user_iov and bio_unmap_user functions in block/bio.c in the Linux kernel before 4.13.8 do unbalanced refcounting when a SCSI I/O vector has small consecutive buffers belonging to the same page. The bio_add_pc_page function merges them into one, but the page reference is never dropped. This causes a memory l...
https://nvd.nist.gov/vuln/detail/CVE-2017-12190
161,536
linux
2b04e8f6bbb196cab4b232af0f8d48ff2c7a8058
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/2b04e8f6bbb196cab4b232af0f8d48ff2c7a8058
more bio_map_user_iov() leak fixes we need to take care of failure exit as well - pages already in bio should be dropped by analogue of bio_unmap_pages(), since their refcounts had been bumped only once per reference in bio. Cc: stable@vger.kernel.org Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
0
struct bio *bio_map_user_iov(struct request_queue *q, const struct iov_iter *iter, gfp_t gfp_mask) { int j; int nr_pages = 0; struct page **pages; struct bio *bio; int cur_page = 0; int ret, offset; struct iov_iter i; struct iovec iov; struct bio_vec *bvec; iov_for_each(iov, i, *iter) { ...
238,055,990,431,423,600,000,000,000,000,000,000,000
bio.c
317,525,818,263,888,000,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2017-12190
The bio_map_user_iov and bio_unmap_user functions in block/bio.c in the Linux kernel before 4.13.8 do unbalanced refcounting when a SCSI I/O vector has small consecutive buffers belonging to the same page. The bio_add_pc_page function merges them into one, but the page reference is never dropped. This causes a memory l...
https://nvd.nist.gov/vuln/detail/CVE-2017-12190
4,348
ImageMagick
83e0f8ffd7eeb7661b0ff83257da23d24ca7f078
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/83e0f8ffd7eeb7661b0ff83257da23d24ca7f078
https://github.com/ImageMagick/ImageMagick/issues/591
1
static Image *ReadTXTImage(const ImageInfo *image_info,ExceptionInfo *exception) { char colorspace[MagickPathExtent], text[MagickPathExtent]; Image *image; long x_offset, y_offset; PixelInfo pixel; MagickBooleanType status; QuantumAny range; register ssize_t i, ...
67,229,528,425,872,500,000,000,000,000,000,000,000
txt.c
128,733,898,318,362,080,000,000,000,000,000,000,000
[ "CWE-835" ]
CVE-2017-11523
The ReadTXTImage function in coders/txt.c in ImageMagick through 6.9.9-0 and 7.x through 7.0.6-1 allows remote attackers to cause a denial of service (infinite loop) via a crafted file, because the end-of-file condition is not considered.
https://nvd.nist.gov/vuln/detail/CVE-2017-11523
161,537
ImageMagick
83e0f8ffd7eeb7661b0ff83257da23d24ca7f078
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/83e0f8ffd7eeb7661b0ff83257da23d24ca7f078
https://github.com/ImageMagick/ImageMagick/issues/591
0
static Image *ReadTXTImage(const ImageInfo *image_info,ExceptionInfo *exception) { char colorspace[MagickPathExtent], text[MagickPathExtent]; Image *image; long x_offset, y_offset; PixelInfo pixel; MagickBooleanType status; QuantumAny range; register ssize_t i, ...
79,125,421,610,210,030,000,000,000,000,000,000,000
txt.c
202,277,609,461,498,600,000,000,000,000,000,000,000
[ "CWE-835" ]
CVE-2017-11523
The ReadTXTImage function in coders/txt.c in ImageMagick through 6.9.9-0 and 7.x through 7.0.6-1 allows remote attackers to cause a denial of service (infinite loop) via a crafted file, because the end-of-file condition is not considered.
https://nvd.nist.gov/vuln/detail/CVE-2017-11523
4,350
ImageMagick
529ff26b68febb2ac03062c58452ea0b4c6edbc1
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/529ff26b68febb2ac03062c58452ea0b4c6edbc1
None
1
ModuleExport size_t RegisterMPCImage(void) { MagickInfo *entry; entry=SetMagickInfo("CACHE"); entry->description=ConstantString("Magick Persistent Cache image format"); entry->module=ConstantString("MPC"); entry->seekable_stream=MagickTrue; entry->stealth=MagickTrue; (void) RegisterMagickInfo(en...
91,619,705,933,668,880,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2017-11449
coders/mpc.c in ImageMagick before 7.0.6-1 does not enable seekable streams and thus cannot validate blob sizes, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via an image received from stdin.
https://nvd.nist.gov/vuln/detail/CVE-2017-11449
161,539
ImageMagick
529ff26b68febb2ac03062c58452ea0b4c6edbc1
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/529ff26b68febb2ac03062c58452ea0b4c6edbc1
None
0
ModuleExport size_t RegisterMPCImage(void) { MagickInfo *entry; entry=SetMagickInfo("CACHE"); entry->description=ConstantString("Magick Persistent Cache image format"); entry->module=ConstantString("MPC"); entry->stealth=MagickTrue; (void) RegisterMagickInfo(entry); entry=SetMagickInfo("MPC"); ...
206,134,486,049,716,570,000,000,000,000,000,000,000
mpc.c
122,596,445,204,998,810,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2017-11449
coders/mpc.c in ImageMagick before 7.0.6-1 does not enable seekable streams and thus cannot validate blob sizes, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via an image received from stdin.
https://nvd.nist.gov/vuln/detail/CVE-2017-11449
4,351
php-src
a15bffd105ac28fd0dd9b596632dbf035238fda3
https://github.com/php/php-src
https://github.com/php/php-src/commit/a15bffd105ac28fd0dd9b596632dbf035238fda3
Fix bug #73807
1
static zend_bool add_post_var(zval *arr, post_var_data_t *var, zend_bool eof) { char *ksep, *vsep, *val; size_t klen, vlen; size_t new_vlen; if (var->ptr >= var->end) { return 0; } vsep = memchr(var->ptr, '&', var->end - var->ptr); if (!vsep) { if (!eof) { return 0; } else { vsep = va...
300,488,664,044,547,050,000,000,000,000,000,000,000
php_variables.c
8,245,733,581,833,365,000,000,000,000,000,000,000
[ "CWE-400" ]
CVE-2017-11142
In PHP before 5.6.31, 7.x before 7.0.17, and 7.1.x before 7.1.3, remote attackers could cause a CPU consumption denial of service attack by injecting long form variables, related to main/php_variables.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-11142
161,540
php-src
a15bffd105ac28fd0dd9b596632dbf035238fda3
https://github.com/php/php-src
https://github.com/php/php-src/commit/a15bffd105ac28fd0dd9b596632dbf035238fda3
Fix bug #73807
0
static zend_bool add_post_var(zval *arr, post_var_data_t *var, zend_bool eof) { char *start, *ksep, *vsep, *val; size_t klen, vlen; size_t new_vlen; if (var->ptr >= var->end) { return 0; } start = var->ptr + var->already_scanned; vsep = memchr(start, '&', var->end - start); if (!vsep) { if (!eo...
40,058,054,615,145,740,000,000,000,000,000,000,000
php_variables.c
59,511,950,721,059,280,000,000,000,000,000,000,000
[ "CWE-400" ]
CVE-2017-11142
In PHP before 5.6.31, 7.x before 7.0.17, and 7.1.x before 7.1.3, remote attackers could cause a CPU consumption denial of service attack by injecting long form variables, related to main/php_variables.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-11142
4,353
FFmpeg
2171dfae8c065878a2e130390eb78cf2947a5b69
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/2171dfae8c065878a2e130390eb78cf2947a5b69
avcodec/scpr: Fix multiple runtime error: index 256 out of bounds for type 'unsigned int [256]' Fixes: 1519/clusterfuzz-testcase-minimized-5286680976162816 Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/targets/ffmpeg Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
1
static int decode_unit(SCPRContext *s, PixelModel *pixel, unsigned step, unsigned *rval) { GetByteContext *gb = &s->gb; RangeCoder *rc = &s->rc; unsigned totfr = pixel->total_freq; unsigned value, x = 0, cumfr = 0, cnt_x = 0; int i, j, ret, c, cnt_c; if ((ret = s->get_freq(rc, totfr, &value)) <...
281,652,385,257,493,500,000,000,000,000,000,000,000
scpr.c
316,731,203,493,724,650,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2017-9995
libavcodec/scpr.c in FFmpeg 3.3 before 3.3.1 does not properly validate height and width data, which allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2017-9995
161,541
FFmpeg
2171dfae8c065878a2e130390eb78cf2947a5b69
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/2171dfae8c065878a2e130390eb78cf2947a5b69
avcodec/scpr: Fix multiple runtime error: index 256 out of bounds for type 'unsigned int [256]' Fixes: 1519/clusterfuzz-testcase-minimized-5286680976162816 Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/targets/ffmpeg Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
0
static int decode_unit(SCPRContext *s, PixelModel *pixel, unsigned step, unsigned *rval) { GetByteContext *gb = &s->gb; RangeCoder *rc = &s->rc; unsigned totfr = pixel->total_freq; unsigned value, x = 0, cumfr = 0, cnt_x = 0; int i, j, ret, c, cnt_c; if ((ret = s->get_freq(rc, totfr, &value)) <...
178,962,509,902,290,500,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-9995
libavcodec/scpr.c in FFmpeg 3.3 before 3.3.1 does not properly validate height and width data, which allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2017-9995
4,355
FFmpeg
0a709e2a10b8288a0cc383547924ecfe285cef89
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/0a709e2a10b8288a0cc383547924ecfe285cef89
avcodec/dnxhd_parser: Do not return invalid value from dnxhd_find_frame_end() on error Fixes: Null pointer dereference Fixes: CVE-2017-9608 Found-by: Yihan Lian Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> (cherry picked from commit 611b35627488a8d0763e75c25ee0875c5b7987dd) Signed-off-by: Michael Niede...
1
static int dnxhd_find_frame_end(DNXHDParserContext *dctx, const uint8_t *buf, int buf_size) { ParseContext *pc = &dctx->pc; uint64_t state = pc->state64; int pic_found = pc->frame_start_found; int i = 0; if (!pic_found) { for (i = 0; i < buf_size; i++) { ...
315,425,032,861,470,850,000,000,000,000,000,000,000
dnxhd_parser.c
103,784,583,369,010,030,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2017-9608
The dnxhd decoder in FFmpeg before 3.2.6, and 3.3.x before 3.3.3 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted mov file.
https://nvd.nist.gov/vuln/detail/CVE-2017-9608
161,542
FFmpeg
0a709e2a10b8288a0cc383547924ecfe285cef89
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/0a709e2a10b8288a0cc383547924ecfe285cef89
avcodec/dnxhd_parser: Do not return invalid value from dnxhd_find_frame_end() on error Fixes: Null pointer dereference Fixes: CVE-2017-9608 Found-by: Yihan Lian Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> (cherry picked from commit 611b35627488a8d0763e75c25ee0875c5b7987dd) Signed-off-by: Michael Niede...
0
static int dnxhd_find_frame_end(DNXHDParserContext *dctx, const uint8_t *buf, int buf_size) { ParseContext *pc = &dctx->pc; uint64_t state = pc->state64; int pic_found = pc->frame_start_found; int i = 0; if (!pic_found) { for (i = 0; i < buf_size; i++) { ...
42,878,246,315,029,070,000,000,000,000,000,000,000
dnxhd_parser.c
61,380,702,221,703,020,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2017-9608
The dnxhd decoder in FFmpeg before 3.2.6, and 3.3.x before 3.3.3 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted mov file.
https://nvd.nist.gov/vuln/detail/CVE-2017-9608
4,366
libsndfile
708e996c87c5fae77b104ccfeb8f6db784c32074
https://github.com/erikd/libsndfile
https://github.com/erikd/libsndfile/commit/708e996c87c5fae77b104ccfeb8f6db784c32074
src/ : Move to a variable length header buffer Previously, the `psf->header` buffer was a fixed length specified by `SF_HEADER_LEN` which was set to `12292`. This was problematic for two reasons; this value was un-necessarily large for the majority of files and too small for some others. Now the size of the header bu...
1
header_read (SF_PRIVATE *psf, void *ptr, int bytes) { int count = 0 ; if (psf->headindex >= SIGNED_SIZEOF (psf->header)) return psf_fread (ptr, 1, bytes, psf) ; if (psf->headindex + bytes > SIGNED_SIZEOF (psf->header)) { int most ; most = SIGNED_SIZEOF (psf->header) - psf->headend ; psf_fread (psf->heade...
137,428,299,166,907,450,000,000,000,000,000,000,000
common.c
339,310,387,561,950,540,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2017-7586
In libsndfile before 1.0.28, an error in the "header_read()" function (common.c) when handling ID3 tags can be exploited to cause a stack-based buffer overflow via a specially crafted FLAC file.
https://nvd.nist.gov/vuln/detail/CVE-2017-7586
161,553
libsndfile
708e996c87c5fae77b104ccfeb8f6db784c32074
https://github.com/erikd/libsndfile
https://github.com/erikd/libsndfile/commit/708e996c87c5fae77b104ccfeb8f6db784c32074
src/ : Move to a variable length header buffer Previously, the `psf->header` buffer was a fixed length specified by `SF_HEADER_LEN` which was set to `12292`. This was problematic for two reasons; this value was un-necessarily large for the majority of files and too small for some others. Now the size of the header bu...
0
header_read (SF_PRIVATE *psf, void *ptr, int bytes) { int count = 0 ; if (psf->header.indx + bytes >= psf->header.len && psf_bump_header_allocation (psf, bytes)) return count ; if (psf->header.indx + bytes > psf->header.end) { count = psf_fread (psf->header.ptr + psf->header.end, 1, bytes - (psf->header.end ...
50,594,758,077,466,320,000,000,000,000,000,000,000
common.c
336,888,234,339,970,560,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2017-7586
In libsndfile before 1.0.28, an error in the "header_read()" function (common.c) when handling ID3 tags can be exploited to cause a stack-based buffer overflow via a specially crafted FLAC file.
https://nvd.nist.gov/vuln/detail/CVE-2017-7586
4,374
proftpd
ecff21e0d0e84f35c299ef91d7fda088e516d4ed
https://github.com/proftpd/proftpd
https://github.com/proftpd/proftpd/commit/ecff21e0d0e84f35c299ef91d7fda088e516d4ed
Backporting recursive handling of DefaultRoot path, when AllowChrootSymlinks is off, to 1.3.5 branch.
1
static int get_default_root(pool *p, int allow_symlinks, char **root) { config_rec *c = NULL; char *dir = NULL; int res; c = find_config(main_server->conf, CONF_PARAM, "DefaultRoot", FALSE); while (c) { pr_signals_handle(); /* Check the groups acl */ if (c->argc < 2) { dir = c->argv[0];...
40,186,582,881,128,860,000,000,000,000,000,000,000
mod_auth.c
288,997,673,937,166,560,000,000,000,000,000,000,000
[ "CWE-59" ]
CVE-2017-7418
ProFTPD before 1.3.5e and 1.3.6 before 1.3.6rc5 controls whether the home directory of a user could contain a symbolic link through the AllowChrootSymlinks configuration option, but checks only the last path component when enforcing AllowChrootSymlinks. Attackers with local access could bypass the AllowChrootSymlinks c...
https://nvd.nist.gov/vuln/detail/CVE-2017-7418
161,561
proftpd
ecff21e0d0e84f35c299ef91d7fda088e516d4ed
https://github.com/proftpd/proftpd
https://github.com/proftpd/proftpd/commit/ecff21e0d0e84f35c299ef91d7fda088e516d4ed
Backporting recursive handling of DefaultRoot path, when AllowChrootSymlinks is off, to 1.3.5 branch.
0
static int get_default_root(pool *p, int allow_symlinks, char **root) { config_rec *c = NULL; char *dir = NULL; int res; c = find_config(main_server->conf, CONF_PARAM, "DefaultRoot", FALSE); while (c) { pr_signals_handle(); /* Check the groups acl */ if (c->argc < 2) { dir = c->argv[0];...
263,475,962,204,349,200,000,000,000,000,000,000,000
mod_auth.c
56,413,642,028,993,720,000,000,000,000,000,000,000
[ "CWE-59" ]
CVE-2017-7418
ProFTPD before 1.3.5e and 1.3.6 before 1.3.6rc5 controls whether the home directory of a user could contain a symbolic link through the AllowChrootSymlinks configuration option, but checks only the last path component when enforcing AllowChrootSymlinks. Attackers with local access could bypass the AllowChrootSymlinks c...
https://nvd.nist.gov/vuln/detail/CVE-2017-7418
4,377
linux
4ef1b2869447411ad3ef91ad7d4891a83c1a509a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/4ef1b2869447411ad3ef91ad7d4891a83c1a509a
tcp: mark skbs with SCM_TIMESTAMPING_OPT_STATS SOF_TIMESTAMPING_OPT_STATS can be enabled and disabled while packets are collected on the error queue. So, checking SOF_TIMESTAMPING_OPT_STATS in sk->sk_tsflags is not enough to safely assume that the skb contains OPT_STATS data. Add a bit in sock_exterr_skb to indicate ...
1
void __sock_recv_timestamp(struct msghdr *msg, struct sock *sk, struct sk_buff *skb) { int need_software_tstamp = sock_flag(sk, SOCK_RCVTSTAMP); struct scm_timestamping tss; int empty = 1; struct skb_shared_hwtstamps *shhwtstamps = skb_hwtstamps(skb); /* Race occurred between timestamp enabling and packet ...
318,403,522,723,650,600,000,000,000,000,000,000,000
socket.c
136,313,628,448,494,970,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-7277
The TCP stack in the Linux kernel through 4.10.6 mishandles the SCM_TIMESTAMPING_OPT_STATS feature, which allows local users to obtain sensitive information from the kernel's internal socket data structures or cause a denial of service (out-of-bounds read) via crafted system calls, related to net/core/skbuff.c and net/...
https://nvd.nist.gov/vuln/detail/CVE-2017-7277
161,564
linux
4ef1b2869447411ad3ef91ad7d4891a83c1a509a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/4ef1b2869447411ad3ef91ad7d4891a83c1a509a
tcp: mark skbs with SCM_TIMESTAMPING_OPT_STATS SOF_TIMESTAMPING_OPT_STATS can be enabled and disabled while packets are collected on the error queue. So, checking SOF_TIMESTAMPING_OPT_STATS in sk->sk_tsflags is not enough to safely assume that the skb contains OPT_STATS data. Add a bit in sock_exterr_skb to indicate ...
0
void __sock_recv_timestamp(struct msghdr *msg, struct sock *sk, struct sk_buff *skb) { int need_software_tstamp = sock_flag(sk, SOCK_RCVTSTAMP); struct scm_timestamping tss; int empty = 1; struct skb_shared_hwtstamps *shhwtstamps = skb_hwtstamps(skb); /* Race occurred between timestamp enabling and packet ...
310,346,414,068,363,930,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2017-7277
The TCP stack in the Linux kernel through 4.10.6 mishandles the SCM_TIMESTAMPING_OPT_STATS feature, which allows local users to obtain sensitive information from the kernel's internal socket data structures or cause a denial of service (out-of-bounds read) via crafted system calls, related to net/core/skbuff.c and net/...
https://nvd.nist.gov/vuln/detail/CVE-2017-7277
4,389
ImageMagick
7d65a814ac76bd04760072c33e452371692ee790
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/7d65a814ac76bd04760072c33e452371692ee790
None
1
ModuleExport MagickBooleanType ReadPSDLayers(Image *image, const ImageInfo *image_info,const PSDInfo *psd_info, const MagickBooleanType skip_layers,ExceptionInfo *exception) { char type[4]; LayerInfo *layer_info; MagickSizeType size; MagickBooleanType status; register ssize_t i; ...
4,351,382,808,025,695,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-5511
coders/psd.c in ImageMagick allows remote attackers to have unspecified impact by leveraging an improper cast, which triggers a heap-based buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-5511
161,571
ImageMagick
7d65a814ac76bd04760072c33e452371692ee790
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/7d65a814ac76bd04760072c33e452371692ee790
None
0
ModuleExport MagickBooleanType ReadPSDLayers(Image *image, const ImageInfo *image_info,const PSDInfo *psd_info, const MagickBooleanType skip_layers,ExceptionInfo *exception) { char type[4]; LayerInfo *layer_info; MagickSizeType size; MagickBooleanType status; register ssize_t i; ...
66,333,111,237,190,715,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-5511
coders/psd.c in ImageMagick allows remote attackers to have unspecified impact by leveraging an improper cast, which triggers a heap-based buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2017-5511
4,396
libgit2
b5c6a1b407b7f8b952bded2789593b68b1876211
https://github.com/libgit2/libgit2
https://github.com/libgit2/libgit2/commit/b5c6a1b407b7f8b952bded2789593b68b1876211
http: check certificate validity before clobbering the error variable
1
static int http_connect(http_subtransport *t) { int error; char *proxy_url; if (t->connected && http_should_keep_alive(&t->parser) && t->parse_finished) return 0; if (t->io) { git_stream_close(t->io); git_stream_free(t->io); t->io = NULL; t->connected = 0; } if (t->connection_data.use_ssl) { er...
181,137,872,357,421,300,000,000,000,000,000,000,000
None
null
[ "CWE-284" ]
CVE-2016-10130
The http_connect function in transports/http.c in libgit2 before 0.24.6 and 0.25.x before 0.25.1 might allow man-in-the-middle attackers to spoof servers by leveraging clobbering of the error variable.
https://nvd.nist.gov/vuln/detail/CVE-2016-10130
161,575
libgit2
b5c6a1b407b7f8b952bded2789593b68b1876211
https://github.com/libgit2/libgit2
https://github.com/libgit2/libgit2/commit/b5c6a1b407b7f8b952bded2789593b68b1876211
http: check certificate validity before clobbering the error variable
0
static int http_connect(http_subtransport *t) { int error; char *proxy_url; if (t->connected && http_should_keep_alive(&t->parser) && t->parse_finished) return 0; if (t->io) { git_stream_close(t->io); git_stream_free(t->io); t->io = NULL; t->connected = 0; } if (t->connection_data.use_ssl) { er...
246,689,348,517,670,700,000,000,000,000,000,000,000
None
null
[ "CWE-284" ]
CVE-2016-10130
The http_connect function in transports/http.c in libgit2 before 0.24.6 and 0.25.x before 0.25.1 might allow man-in-the-middle attackers to spoof servers by leveraging clobbering of the error variable.
https://nvd.nist.gov/vuln/detail/CVE-2016-10130
4,397
libgit2
84d30d569ada986f3eef527cbdb932643c2dd037
https://github.com/libgit2/libgit2
https://github.com/libgit2/libgit2/commit/84d30d569ada986f3eef527cbdb932643c2dd037
smart_pkt: treat empty packet lines as error The Git protocol does not specify what should happen in the case of an empty packet line (that is a packet line "0004"). We currently indicate success, but do not return a packet in the case where we hit an empty line. The smart protocol was not prepared to handle such pack...
1
static int add_push_report_sideband_pkt(git_push *push, git_pkt_data *data_pkt, git_buf *data_pkt_buf) { git_pkt *pkt; const char *line, *line_end; size_t line_len; int error; int reading_from_buf = data_pkt_buf->size > 0; if (reading_from_buf) { /* We had an existing partial packet, so add the new * packet...
40,688,963,026,714,930,000,000,000,000,000,000,000
smart_protocol.c
169,851,288,010,794,390,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2016-10129
The Git Smart Protocol support in libgit2 before 0.24.6 and 0.25.x before 0.25.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via an empty packet line.
https://nvd.nist.gov/vuln/detail/CVE-2016-10129
161,576
libgit2
84d30d569ada986f3eef527cbdb932643c2dd037
https://github.com/libgit2/libgit2
https://github.com/libgit2/libgit2/commit/84d30d569ada986f3eef527cbdb932643c2dd037
smart_pkt: treat empty packet lines as error The Git protocol does not specify what should happen in the case of an empty packet line (that is a packet line "0004"). We currently indicate success, but do not return a packet in the case where we hit an empty line. The smart protocol was not prepared to handle such pack...
0
static int add_push_report_sideband_pkt(git_push *push, git_pkt_data *data_pkt, git_buf *data_pkt_buf) { git_pkt *pkt; const char *line, *line_end; size_t line_len; int error; int reading_from_buf = data_pkt_buf->size > 0; if (reading_from_buf) { /* We had an existing partial packet, so add the new * packet...
239,091,266,584,449,000,000,000,000,000,000,000,000
smart_protocol.c
336,083,806,196,513,300,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2016-10129
The Git Smart Protocol support in libgit2 before 0.24.6 and 0.25.x before 0.25.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via an empty packet line.
https://nvd.nist.gov/vuln/detail/CVE-2016-10129
4,398
php-src
77f619d48259383628c3ec4654b1ad578e9eb40e
https://github.com/php/php-src
https://github.com/libgd/libgd/commit/77f619d48259383628c3ec4654b1ad578e9eb40e
None
1
BGD_DECLARE(void) gdImageFillToBorder (gdImagePtr im, int x, int y, int border, int color) { int lastBorder; /* Seek left */ int leftLimit, rightLimit; int i; int restoreAlphaBleding; if (border < 0) { /* Refuse to fill to a non-solid border */ return; } leftLimit = (-1); restoreAlphaBleding =...
239,173,184,754,285,350,000,000,000,000,000,000,000
gd.c
249,258,694,972,014,260,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-9933
Stack consumption vulnerability in the gdImageFillToBorder function in gd.c in the GD Graphics Library (aka libgd) before 2.2.2, as used in PHP before 5.6.28 and 7.x before 7.0.13, allows remote attackers to cause a denial of service (segmentation violation) via a crafted imagefilltoborder call that triggers use of a n...
https://nvd.nist.gov/vuln/detail/CVE-2016-9933
86,532
php-src
77f619d48259383628c3ec4654b1ad578e9eb40e
https://github.com/php/php-src
https://github.com/libgd/libgd/commit/77f619d48259383628c3ec4654b1ad578e9eb40e
None
0
BGD_DECLARE(gdImagePtr) gdImageCreate (int sx, int sy) { int i; gdImagePtr im; if (overflow2(sizeof (unsigned char *), sy)) { return NULL; } if (overflow2(sizeof (unsigned char *), sx)) { return NULL; } im = (gdImage *) gdCalloc(1, sizeof(gdImage)); if (!im) { return NULL; } /* Row-major ever since g...
52,237,471,661,989,170,000,000,000,000,000,000,000
gd.c
113,990,142,482,157,950,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-9933
Stack consumption vulnerability in the gdImageFillToBorder function in gd.c in the GD Graphics Library (aka libgd) before 2.2.2, as used in PHP before 5.6.28 and 7.x before 7.0.13, allows remote attackers to cause a denial of service (segmentation violation) via a crafted imagefilltoborder call that triggers use of a n...
https://nvd.nist.gov/vuln/detail/CVE-2016-9933
4,399
ImageMagick
63346f34f9d19179599b5b256e5e8d3dda46435c
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/63346f34f9d19179599b5b256e5e8d3dda46435c
None
1
int main( int /*argc*/, char ** argv) { InitializeMagick(*argv); int failures=0; try { string srcdir(""); if(getenv("SRCDIR") != 0) srcdir = getenv("SRCDIR"); list<Image> imageList; readImages( &imageList, srcdir + "test_image_anim.miff" ); Image appended; appendImages( &appe...
11,870,402,558,612,043,000,000,000,000,000,000,000
None
null
[ "CWE-369" ]
CVE-2016-7530
The quantum handling code in ImageMagick allows remote attackers to cause a denial of service (divide-by-zero error or out-of-bounds write) via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2016-7530
161,578
ImageMagick
63346f34f9d19179599b5b256e5e8d3dda46435c
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/63346f34f9d19179599b5b256e5e8d3dda46435c
None
0
int main( int /*argc*/, char ** argv) { InitializeMagick(*argv); int failures=0; try { string srcdir(""); if(getenv("SRCDIR") != 0) srcdir = getenv("SRCDIR"); list<Image> imageList; readImages( &imageList, srcdir + "test_image_anim.miff" ); Image appended; appendImages( &appe...
17,095,752,038,152,691,000,000,000,000,000,000,000
None
null
[ "CWE-369" ]
CVE-2016-7530
The quantum handling code in ImageMagick allows remote attackers to cause a denial of service (divide-by-zero error or out-of-bounds write) via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2016-7530
4,400
ImageMagick
b5ed738f8060266bf4ae521f7e3ed145aa4498a3
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/b5ed738f8060266bf4ae521f7e3ed145aa4498a3
None
1
MagickExport MagickBooleanType SetQuantumDepth(const Image *image, QuantumInfo *quantum_info,const size_t depth) { size_t extent, quantum; /* Allocate the quantum pixel buffer. */ assert(image != (Image *) NULL); assert(image->signature == MagickSignature); if (image->debug != MagickFalse) ...
198,311,459,592,439,570,000,000,000,000,000,000,000
None
null
[ "CWE-369" ]
CVE-2016-7530
The quantum handling code in ImageMagick allows remote attackers to cause a denial of service (divide-by-zero error or out-of-bounds write) via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2016-7530
161,579
ImageMagick
b5ed738f8060266bf4ae521f7e3ed145aa4498a3
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/b5ed738f8060266bf4ae521f7e3ed145aa4498a3
None
0
MagickExport MagickBooleanType SetQuantumDepth(const Image *image, QuantumInfo *quantum_info,const size_t depth) { size_t extent, quantum; /* Allocate the quantum pixel buffer. */ assert(image != (Image *) NULL); assert(image->signature == MagickSignature); if (image->debug != MagickFalse) ...
170,196,186,915,288,000,000,000,000,000,000,000,000
None
null
[ "CWE-369" ]
CVE-2016-7530
The quantum handling code in ImageMagick allows remote attackers to cause a denial of service (divide-by-zero error or out-of-bounds write) via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2016-7530
4,404
ImageMagick
8f8959033e4e59418d6506b345829af1f7a71127
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/8f8959033e4e59418d6506b345829af1f7a71127
...
1
static Image *ReadSGIImage(const ImageInfo *image_info,ExceptionInfo *exception) { Image *image; MagickBooleanType status; MagickSizeType number_pixels; MemoryInfo *pixel_info; register Quantum *q; register ssize_t i, x; register unsigned char *p; SGIInfo iris_...
9,093,028,214,754,756,000,000,000,000,000,000,000
sgi.c
56,650,646,473,342,340,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2016-7101
The SGI coder in ImageMagick before 7.0.2-10 allows remote attackers to cause a denial of service (out-of-bounds read) via a large row value in an sgi file.
https://nvd.nist.gov/vuln/detail/CVE-2016-7101
161,580
ImageMagick
8f8959033e4e59418d6506b345829af1f7a71127
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/8f8959033e4e59418d6506b345829af1f7a71127
...
0
static Image *ReadSGIImage(const ImageInfo *image_info,ExceptionInfo *exception) { Image *image; MagickBooleanType status; MagickSizeType number_pixels; MemoryInfo *pixel_info; register Quantum *q; register ssize_t i, x; register unsigned char *p; SGIInfo iris_...
332,022,567,930,033,900,000,000,000,000,000,000,000
sgi.c
314,915,683,086,862,000,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2016-7101
The SGI coder in ImageMagick before 7.0.2-10 allows remote attackers to cause a denial of service (out-of-bounds read) via a large row value in an sgi file.
https://nvd.nist.gov/vuln/detail/CVE-2016-7101
4,405
libgd
58b6dde319c301b0eae27d12e2a659e067d80558
https://github.com/libgd/libgd
https://github.com/libgd/libgd/commit/58b6dde319c301b0eae27d12e2a659e067d80558
Fix OOB reads of the TGA decompression buffer It is possible to craft TGA files which will overflow the decompression buffer, but not the image's bitmap. Therefore we also have to check for potential decompression buffer overflows. This issue had been reported by Ibrahim El-Sayed to security@libgd.org; a modified cas...
1
int read_image_tga( gdIOCtx *ctx, oTga *tga ) { int pixel_block_size = (tga->bits / 8); int image_block_size = (tga->width * tga->height) * pixel_block_size; int* decompression_buffer = NULL; unsigned char* conversion_buffer = NULL; int buffer_caret = 0; int bitmap_caret = 0; int i = 0; int encoded_pixels; int...
45,807,417,306,419,930,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2016-6906
The read_image_tga function in gd_tga.c in the GD Graphics Library (aka libgd) before 2.2.4 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted TGA file, related to the decompression buffer.
https://nvd.nist.gov/vuln/detail/CVE-2016-6906
161,581
libgd
58b6dde319c301b0eae27d12e2a659e067d80558
https://github.com/libgd/libgd
https://github.com/libgd/libgd/commit/58b6dde319c301b0eae27d12e2a659e067d80558
Fix OOB reads of the TGA decompression buffer It is possible to craft TGA files which will overflow the decompression buffer, but not the image's bitmap. Therefore we also have to check for potential decompression buffer overflows. This issue had been reported by Ibrahim El-Sayed to security@libgd.org; a modified cas...
0
int read_image_tga( gdIOCtx *ctx, oTga *tga ) { int pixel_block_size = (tga->bits / 8); int image_block_size = (tga->width * tga->height) * pixel_block_size; int* decompression_buffer = NULL; unsigned char* conversion_buffer = NULL; int buffer_caret = 0; int bitmap_caret = 0; int i = 0; int encoded_pixels; int...
249,788,825,959,476,140,000,000,000,000,000,000,000
gd_tga.c
25,386,267,781,431,800,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2016-6906
The read_image_tga function in gd_tga.c in the GD Graphics Library (aka libgd) before 2.2.4 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted TGA file, related to the decompression buffer.
https://nvd.nist.gov/vuln/detail/CVE-2016-6906
4,408
ImageMagick
8ea44b48a182dd46d018f4b4f09a5e2ee9638105
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/8ea44b48a182dd46d018f4b4f09a5e2ee9638105
1
static Image *ReadSUNImage(const ImageInfo *image_info,ExceptionInfo *exception) { #define RMT_EQUAL_RGB 1 #define RMT_NONE 0 #define RMT_RAW 2 #define RT_STANDARD 1 #define RT_ENCODED 2 #define RT_FORMAT_RGB 3 typedef struct _SUNInfo { unsigned int magic, width, height, depth, ...
185,822,657,637,374,900,000,000,000,000,000,000,000
sun.c
276,234,285,718,895,500,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2015-8958
coders/sun.c in ImageMagick before 6.9.0-4 Beta allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted SUN file.
https://nvd.nist.gov/vuln/detail/CVE-2015-8958
161,583
ImageMagick
8ea44b48a182dd46d018f4b4f09a5e2ee9638105
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/8ea44b48a182dd46d018f4b4f09a5e2ee9638105
0
static Image *ReadSUNImage(const ImageInfo *image_info,ExceptionInfo *exception) { #define RMT_EQUAL_RGB 1 #define RMT_NONE 0 #define RMT_RAW 2 #define RT_STANDARD 1 #define RT_ENCODED 2 #define RT_FORMAT_RGB 3 typedef struct _SUNInfo { unsigned int magic, width, height, depth, ...
219,381,137,967,165,030,000,000,000,000,000,000,000
sun.c
268,164,255,673,164,160,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2015-8958
coders/sun.c in ImageMagick before 6.9.0-4 Beta allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted SUN file.
https://nvd.nist.gov/vuln/detail/CVE-2015-8958
4,417
pgbouncer
edab5be6665b9e8de66c25ba527509b229468573
https://github.com/pgbouncer/pgbouncer
https://github.com/pgbouncer/pgbouncer/commit/edab5be6665b9e8de66c25ba527509b229468573
Check if auth_user is set. Fixes a crash if password packet appears before startup packet (#42).
1
static bool check_client_passwd(PgSocket *client, const char *passwd) { char md5[MD5_PASSWD_LEN + 1]; const char *correct; PgUser *user = client->auth_user; /* disallow empty passwords */ if (!*passwd || !*user->passwd) return false; switch (cf_auth_type) { case AUTH_PLAIN: return strcmp(user->passwd...
262,462,810,635,753,940,000,000,000,000,000,000,000
client.c
203,590,908,184,515,350,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2015-4054
PgBouncer before 1.5.5 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) by sending a password packet before a startup packet.
https://nvd.nist.gov/vuln/detail/CVE-2015-4054
161,589
pgbouncer
edab5be6665b9e8de66c25ba527509b229468573
https://github.com/pgbouncer/pgbouncer
https://github.com/pgbouncer/pgbouncer/commit/edab5be6665b9e8de66c25ba527509b229468573
Check if auth_user is set. Fixes a crash if password packet appears before startup packet (#42).
0
static bool check_client_passwd(PgSocket *client, const char *passwd) { char md5[MD5_PASSWD_LEN + 1]; const char *correct; PgUser *user = client->auth_user; /* auth_user may be missing */ if (!user) { slog_error(client, "Password packet before auth packet?"); return false; } /* disallow empty passwords...
154,878,987,802,049,780,000,000,000,000,000,000,000
client.c
115,609,358,804,220,030,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2015-4054
PgBouncer before 1.5.5 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) by sending a password packet before a startup packet.
https://nvd.nist.gov/vuln/detail/CVE-2015-4054
4,423
abrt
d6e2f6f128cef4c21cb80941ae674c9842681aa7
https://github.com/abrt/abrt
https://github.com/abrt/abrt/commit/d6e2f6f128cef4c21cb80941ae674c9842681aa7
ccpp: open file for dump_fd_info with O_EXCL To avoid possible races. Related: #1211835 Signed-off-by: Jakub Filak <jfilak@redhat.com>
1
static bool dump_fd_info(const char *dest_filename, char *source_filename, int source_base_ofs, uid_t uid, gid_t gid) { FILE *fp = fopen(dest_filename, "w"); if (!fp) return false; unsigned fd = 0; while (fd <= 99999) /* paranoia check */ { sprintf(source_filename + source_base...
242,345,425,049,513,960,000,000,000,000,000,000,000
abrt-hook-ccpp.c
332,533,851,336,417,600,000,000,000,000,000,000,000
[ "CWE-59" ]
CVE-2015-3315
Automatic Bug Reporting Tool (ABRT) allows local users to read, change the ownership of, or have other unspecified impact on arbitrary files via a symlink attack on (1) /var/tmp/abrt/*/maps, (2) /tmp/jvm-*/hs_error.log, (3) /proc/*/exe, (4) /etc/os-release in a chroot, or (5) an unspecified root directory related to li...
https://nvd.nist.gov/vuln/detail/CVE-2015-3315
161,594
abrt
d6e2f6f128cef4c21cb80941ae674c9842681aa7
https://github.com/abrt/abrt
https://github.com/abrt/abrt/commit/d6e2f6f128cef4c21cb80941ae674c9842681aa7
ccpp: open file for dump_fd_info with O_EXCL To avoid possible races. Related: #1211835 Signed-off-by: Jakub Filak <jfilak@redhat.com>
0
static bool dump_fd_info(const char *dest_filename, char *source_filename, int source_base_ofs, uid_t uid, gid_t gid) { FILE *fp = fopen(dest_filename, "wx"); if (!fp) return false; unsigned fd = 0; while (fd <= 99999) /* paranoia check */ { sprintf(source_filename + source_bas...
326,417,298,670,193,430,000,000,000,000,000,000,000
abrt-hook-ccpp.c
336,174,652,352,971,120,000,000,000,000,000,000,000
[ "CWE-59" ]
CVE-2015-3315
Automatic Bug Reporting Tool (ABRT) allows local users to read, change the ownership of, or have other unspecified impact on arbitrary files via a symlink attack on (1) /var/tmp/abrt/*/maps, (2) /tmp/jvm-*/hs_error.log, (3) /proc/*/exe, (4) /etc/os-release in a chroot, or (5) an unspecified root directory related to li...
https://nvd.nist.gov/vuln/detail/CVE-2015-3315
4,439
librsvg
f9d69eadd2b16b00d1a1f9f286122123f8e547dd
https://github.com/GNOME/librsvg
https://github.com/ImageMagick/librsvg/commit/f9d69eadd2b16b00d1a1f9f286122123f8e547dd
Fixed possible credentials leaking reported by Alex Birsan.
1
_rsvg_io_get_file_path (const gchar * filename, const gchar * base_uri) { gchar *absolute_filename; if (g_file_test (filename, G_FILE_TEST_EXISTS) || g_path_is_absolute (filename)) { absolute_filename = g_strdup (filename); } else { gchar *tmpcdir; gcha...
330,502,157,723,936,650,000,000,000,000,000,000,000
rsvg-io.c
108,187,284,530,270,120,000,000,000,000,000,000,000
[ "CWE-522" ]
CVE-2018-1000041
GNOME librsvg version before commit c6ddf2ed4d768fd88adbea2b63f575cd523022ea contains a Improper input validation vulnerability in rsvg-io.c that can result in the victim's Windows username and NTLM password hash being leaked to remote attackers through SMB. This attack appear to be exploitable via The victim must proc...
https://nvd.nist.gov/vuln/detail/CVE-2018-1000041
161,607
librsvg
f9d69eadd2b16b00d1a1f9f286122123f8e547dd
https://github.com/GNOME/librsvg
https://github.com/ImageMagick/librsvg/commit/f9d69eadd2b16b00d1a1f9f286122123f8e547dd
Fixed possible credentials leaking reported by Alex Birsan.
0
_rsvg_io_get_file_path (const gchar * filename, const gchar * base_uri) { gchar *absolute_filename; if (g_path_is_absolute (filename)) { absolute_filename = g_strdup (filename); } else { gchar *tmpcdir; gchar *base_filename; if (base_uri) { ...
27,692,438,953,328,130,000,000,000,000,000,000,000
rsvg-io.c
124,899,316,242,507,420,000,000,000,000,000,000,000
[ "CWE-522" ]
CVE-2018-1000041
GNOME librsvg version before commit c6ddf2ed4d768fd88adbea2b63f575cd523022ea contains a Improper input validation vulnerability in rsvg-io.c that can result in the victim's Windows username and NTLM password hash being leaked to remote attackers through SMB. This attack appear to be exploitable via The victim must proc...
https://nvd.nist.gov/vuln/detail/CVE-2018-1000041
4,441
linux
2a3f93459d689d990b3ecfbe782fec89b97d3279
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/2a3f93459d689d990b3ecfbe782fec89b97d3279
arm64: KVM: Sanitize PSTATE.M when being set from userspace Not all execution modes are valid for a guest, and some of them depend on what the HW actually supports. Let's verify that what userspace provides is compatible with both the VM settings and the HW capabilities. Cc: <stable@vger.kernel.org> Fixes: 0d854a60b1...
1
static int set_core_reg(struct kvm_vcpu *vcpu, const struct kvm_one_reg *reg) { __u32 __user *uaddr = (__u32 __user *)(unsigned long)reg->addr; struct kvm_regs *regs = vcpu_gp_regs(vcpu); int nr_regs = sizeof(*regs) / sizeof(__u32); __uint128_t tmp; void *valp = &tmp; u64 off; int err = 0; /* Our ID is an inde...
103,022,671,665,194,350,000,000,000,000,000,000,000
guest.c
236,591,481,754,431,170,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2018-18021
arch/arm64/kvm/guest.c in KVM in the Linux kernel before 4.18.12 on the arm64 platform mishandles the KVM_SET_ON_REG ioctl. This is exploitable by attackers who can create virtual machines. An attacker can arbitrarily redirect the hypervisor flow of control (with full register control). An attacker can also cause a den...
https://nvd.nist.gov/vuln/detail/CVE-2018-18021
161,608
linux
2a3f93459d689d990b3ecfbe782fec89b97d3279
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/2a3f93459d689d990b3ecfbe782fec89b97d3279
arm64: KVM: Sanitize PSTATE.M when being set from userspace Not all execution modes are valid for a guest, and some of them depend on what the HW actually supports. Let's verify that what userspace provides is compatible with both the VM settings and the HW capabilities. Cc: <stable@vger.kernel.org> Fixes: 0d854a60b1...
0
static int set_core_reg(struct kvm_vcpu *vcpu, const struct kvm_one_reg *reg) { __u32 __user *uaddr = (__u32 __user *)(unsigned long)reg->addr; struct kvm_regs *regs = vcpu_gp_regs(vcpu); int nr_regs = sizeof(*regs) / sizeof(__u32); __uint128_t tmp; void *valp = &tmp; u64 off; int err = 0; /* Our ID is an inde...
109,864,069,029,007,100,000,000,000,000,000,000,000
guest.c
243,214,060,563,885,700,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2018-18021
arch/arm64/kvm/guest.c in KVM in the Linux kernel before 4.18.12 on the arm64 platform mishandles the KVM_SET_ON_REG ioctl. This is exploitable by attackers who can create virtual machines. An attacker can arbitrarily redirect the hypervisor flow of control (with full register control). An attacker can also cause a den...
https://nvd.nist.gov/vuln/detail/CVE-2018-18021
4,442
git
1a7fd1fb2998002da6e9ff2ee46e1bdd25ee8404
https://github.com/git/git
https://github.com/git/git/commit/1a7fd1fb2998002da6e9ff2ee46e1bdd25ee8404
fsck: detect submodule paths starting with dash As with urls, submodule paths with dashes are ignored by git, but may end up confusing older versions. Detecting them via fsck lets us prevent modern versions of git from being a vector to spread broken .gitmodules to older versions. Compared to blocking leading-dash ur...
1
static int fsck_gitmodules_fn(const char *var, const char *value, void *vdata) { struct fsck_gitmodules_data *data = vdata; const char *subsection, *key; int subsection_len; char *name; if (parse_config_key(var, "submodule", &subsection, &subsection_len, &key) < 0 || !subsection) return 0; name = xmemdup...
157,706,953,577,909,880,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2018-17456
Git before 2.14.5, 2.15.x before 2.15.3, 2.16.x before 2.16.5, 2.17.x before 2.17.2, 2.18.x before 2.18.1, and 2.19.x before 2.19.1 allows remote code execution during processing of a recursive "git clone" of a superproject if a .gitmodules file has a URL field beginning with a '-' character.
https://nvd.nist.gov/vuln/detail/CVE-2018-17456
161,609
git
1a7fd1fb2998002da6e9ff2ee46e1bdd25ee8404
https://github.com/git/git
https://github.com/git/git/commit/1a7fd1fb2998002da6e9ff2ee46e1bdd25ee8404
fsck: detect submodule paths starting with dash As with urls, submodule paths with dashes are ignored by git, but may end up confusing older versions. Detecting them via fsck lets us prevent modern versions of git from being a vector to spread broken .gitmodules to older versions. Compared to blocking leading-dash ur...
0
static int fsck_gitmodules_fn(const char *var, const char *value, void *vdata) { struct fsck_gitmodules_data *data = vdata; const char *subsection, *key; int subsection_len; char *name; if (parse_config_key(var, "submodule", &subsection, &subsection_len, &key) < 0 || !subsection) return 0; name = xmemdup...
157,590,565,606,615,230,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2018-17456
Git before 2.14.5, 2.15.x before 2.15.3, 2.16.x before 2.16.5, 2.17.x before 2.17.2, 2.18.x before 2.18.1, and 2.19.x before 2.19.1 allows remote code execution during processing of a recursive "git clone" of a superproject if a .gitmodules file has a URL field beginning with a '-' character.
https://nvd.nist.gov/vuln/detail/CVE-2018-17456
4,443
ImageMagick
16916c8979c32765c542e216b31cee2671b7afe7
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/16916c8979c32765c542e216b31cee2671b7afe7
https://github.com/ImageMagick/ImageMagick/issues/1269
1
static Image *ReadDCMImage(const ImageInfo *image_info,ExceptionInfo *exception) { #define ThrowDCMException(exception,message) \ { \ if (info.scale != (Quantum *) NULL) \ info.scale=(Quantum *) RelinquishMagickMemory(info.scale); \ if (data != (unsigned char *) NULL) \ data=(unsigned char *) RelinquishMagi...
166,974,640,597,951,750,000,000,000,000,000,000,000
dcm.c
271,804,267,068,497,900,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2018-16644
There is a missing check for length in the functions ReadDCMImage of coders/dcm.c and ReadPICTImage of coders/pict.c in ImageMagick 7.0.8-11, which allows remote attackers to cause a denial of service via a crafted image.
https://nvd.nist.gov/vuln/detail/CVE-2018-16644
161,610
ImageMagick
16916c8979c32765c542e216b31cee2671b7afe7
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/16916c8979c32765c542e216b31cee2671b7afe7
https://github.com/ImageMagick/ImageMagick/issues/1269
0
static Image *ReadDCMImage(const ImageInfo *image_info,ExceptionInfo *exception) { #define ThrowDCMException(exception,message) \ { \ if (info.scale != (Quantum *) NULL) \ info.scale=(Quantum *) RelinquishMagickMemory(info.scale); \ if (data != (unsigned char *) NULL) \ data=(unsigned char *) RelinquishMagi...
108,873,788,728,209,000,000,000,000,000,000,000,000
dcm.c
22,362,050,219,457,944,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2018-16644
There is a missing check for length in the functions ReadDCMImage of coders/dcm.c and ReadPICTImage of coders/pict.c in ImageMagick 7.0.8-11, which allows remote attackers to cause a denial of service via a crafted image.
https://nvd.nist.gov/vuln/detail/CVE-2018-16644
4,446
mbedtls
5224a7544c95552553e2e6be0b4a789956a6464e
https://github.com/ARMmbed/mbedtls
https://github.com/ARMmbed/mbedtls/commit/5224a7544c95552553e2e6be0b4a789956a6464e
Prevent arithmetic overflow on bounds check
1
static int ssl_parse_server_psk_hint( mbedtls_ssl_context *ssl, unsigned char **p, unsigned char *end ) { int ret = MBEDTLS_ERR_SSL_FEATURE_UNAVAILABLE; size_t len; ((void) ssl); /* * PSK parameters: * * opaque ...
9,975,011,487,963,196,000,000,000,000,000,000,000
ssl_cli.c
245,686,137,588,342,770,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-9989
ARM mbed TLS before 2.1.11, before 2.7.2, and before 2.8.0 has a buffer over-read in ssl_parse_server_psk_hint() that could cause a crash on invalid input.
https://nvd.nist.gov/vuln/detail/CVE-2018-9989
161,611
mbedtls
5224a7544c95552553e2e6be0b4a789956a6464e
https://github.com/ARMmbed/mbedtls
https://github.com/ARMmbed/mbedtls/commit/5224a7544c95552553e2e6be0b4a789956a6464e
Prevent arithmetic overflow on bounds check
0
static int ssl_parse_server_psk_hint( mbedtls_ssl_context *ssl, unsigned char **p, unsigned char *end ) { int ret = MBEDTLS_ERR_SSL_FEATURE_UNAVAILABLE; size_t len; ((void) ssl); /* * PSK parameters: * * opaque ...
223,300,202,793,194,100,000,000,000,000,000,000,000
ssl_cli.c
166,625,442,403,966,110,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-9989
ARM mbed TLS before 2.1.11, before 2.7.2, and before 2.8.0 has a buffer over-read in ssl_parse_server_psk_hint() that could cause a crash on invalid input.
https://nvd.nist.gov/vuln/detail/CVE-2018-9989
4,447
mbedtls
027f84c69f4ef30c0693832a6c396ef19e563ca1
https://github.com/ARMmbed/mbedtls
https://github.com/ARMmbed/mbedtls/commit/027f84c69f4ef30c0693832a6c396ef19e563ca1
Prevent arithmetic overflow on bounds check
1
static int ssl_parse_server_key_exchange( mbedtls_ssl_context *ssl ) { int ret; const mbedtls_ssl_ciphersuite_t *ciphersuite_info = ssl->transform_negotiate->ciphersuite_info; unsigned char *p = NULL, *end = NULL; MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> parse server key exchange" ) ); #if defined(MBED...
216,299,019,030,539,130,000,000,000,000,000,000,000
ssl_cli.c
83,727,931,143,460,710,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-9988
ARM mbed TLS before 2.1.11, before 2.7.2, and before 2.8.0 has a buffer over-read in ssl_parse_server_key_exchange() that could cause a crash on invalid input.
https://nvd.nist.gov/vuln/detail/CVE-2018-9988
161,612
mbedtls
027f84c69f4ef30c0693832a6c396ef19e563ca1
https://github.com/ARMmbed/mbedtls
https://github.com/ARMmbed/mbedtls/commit/027f84c69f4ef30c0693832a6c396ef19e563ca1
Prevent arithmetic overflow on bounds check
0
static int ssl_parse_server_key_exchange( mbedtls_ssl_context *ssl ) { int ret; const mbedtls_ssl_ciphersuite_t *ciphersuite_info = ssl->transform_negotiate->ciphersuite_info; unsigned char *p = NULL, *end = NULL; MBEDTLS_SSL_DEBUG_MSG( 2, ( "=> parse server key exchange" ) ); #if defined(MBED...
15,725,512,410,610,159,000,000,000,000,000,000,000
ssl_cli.c
226,530,295,457,411,400,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-9988
ARM mbed TLS before 2.1.11, before 2.7.2, and before 2.8.0 has a buffer over-read in ssl_parse_server_key_exchange() that could cause a crash on invalid input.
https://nvd.nist.gov/vuln/detail/CVE-2018-9988
4,448
libgit2
3db1af1f370295ad5355b8f64b865a2a357bcac0
https://github.com/libgit2/libgit2
https://github.com/libgit2/libgit2/commit/3db1af1f370295ad5355b8f64b865a2a357bcac0
index: error out on unreasonable prefix-compressed path lengths When computing the complete path length from the encoded prefix-compressed path, we end up just allocating the complete path without ever checking what the encoded path length actually is. This can easily lead to a denial of service by just encoding an un...
1
static int read_entry( git_index_entry **out, size_t *out_size, git_index *index, const void *buffer, size_t buffer_size, const char *last) { size_t path_length, entry_size; const char *path_ptr; struct entry_short source; git_index_entry entry = {{0}}; bool compressed = index->version >= INDEX_VERSION_NUMBE...
285,266,082,278,998,730,000,000,000,000,000,000,000
index.c
148,456,201,620,914,240,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2018-8098
Integer overflow in the index.c:read_entry() function while decompressing a compressed prefix length in libgit2 before v0.26.2 allows an attacker to cause a denial of service (out-of-bounds read) via a crafted repository index file.
https://nvd.nist.gov/vuln/detail/CVE-2018-8098
161,613
libgit2
3db1af1f370295ad5355b8f64b865a2a357bcac0
https://github.com/libgit2/libgit2
https://github.com/libgit2/libgit2/commit/3db1af1f370295ad5355b8f64b865a2a357bcac0
index: error out on unreasonable prefix-compressed path lengths When computing the complete path length from the encoded prefix-compressed path, we end up just allocating the complete path without ever checking what the encoded path length actually is. This can easily lead to a denial of service by just encoding an un...
0
static int read_entry( git_index_entry **out, size_t *out_size, git_index *index, const void *buffer, size_t buffer_size, const char *last) { size_t path_length, entry_size; const char *path_ptr; struct entry_short source; git_index_entry entry = {{0}}; bool compressed = index->version >= INDEX_VERSION_NUMBE...
230,198,378,009,671,630,000,000,000,000,000,000,000
index.c
16,865,441,319,100,942,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2018-8098
Integer overflow in the index.c:read_entry() function while decompressing a compressed prefix length in libgit2 before v0.26.2 allows an attacker to cause a denial of service (out-of-bounds read) via a crafted repository index file.
https://nvd.nist.gov/vuln/detail/CVE-2018-8098
4,452
suricata
8357ef3f8ffc7d99ef6571350724160de356158b
https://github.com/OISF/suricata
https://github.com/OISF/suricata/commit/8357ef3f8ffc7d99ef6571350724160de356158b
proto/detect: workaround dns misdetected as dcerpc The DCERPC UDP detection would misfire on DNS with transaction ID 0x0400. This would happen as the protocol detection engine gives preference to pattern based detection over probing parsers for performance reasons. This hack/workaround fixes this specific case by sti...
1
AppProto AppLayerProtoDetectGetProto(AppLayerProtoDetectThreadCtx *tctx, Flow *f, uint8_t *buf, uint32_t buflen, uint8_t ipproto, uint8_t direction) { SCEnter(); SCLogDebug("buflen %u for %s direction"...
42,797,380,008,853,400,000,000,000,000,000,000,000
app-layer-detect-proto.c
123,595,736,309,035,860,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2019-1010251
Open Information Security Foundation Suricata prior to version 4.1.2 is affected by: Denial of Service - DNS detection bypass. The impact is: An attacker can evade a signature detection with a specialy formed network packet. The component is: app-layer-detect-proto.c, decode.c, decode-teredo.c and decode-ipv6.c (https:...
https://nvd.nist.gov/vuln/detail/CVE-2019-1010251
161,616
suricata
8357ef3f8ffc7d99ef6571350724160de356158b
https://github.com/OISF/suricata
https://github.com/OISF/suricata/commit/8357ef3f8ffc7d99ef6571350724160de356158b
proto/detect: workaround dns misdetected as dcerpc The DCERPC UDP detection would misfire on DNS with transaction ID 0x0400. This would happen as the protocol detection engine gives preference to pattern based detection over probing parsers for performance reasons. This hack/workaround fixes this specific case by sti...
0
AppProto AppLayerProtoDetectGetProto(AppLayerProtoDetectThreadCtx *tctx, Flow *f, uint8_t *buf, uint32_t buflen, uint8_t ipproto, uint8_t direction) { SCEnter(); SCLogDebug("buflen %u for %s direction"...
231,773,358,303,191,280,000,000,000,000,000,000,000
app-layer-detect-proto.c
232,783,236,937,813,620,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2019-1010251
Open Information Security Foundation Suricata prior to version 4.1.2 is affected by: Denial of Service - DNS detection bypass. The impact is: An attacker can evade a signature detection with a specialy formed network packet. The component is: app-layer-detect-proto.c, decode.c, decode-teredo.c and decode-ipv6.c (https:...
https://nvd.nist.gov/vuln/detail/CVE-2019-1010251
4,458
radare2
5411543a310a470b1257fb93273cdd6e8dfcb3af
https://github.com/radare/radare2
https://github.com/radareorg/radare2/commit/5411543a310a470b1257fb93273cdd6e8dfcb3af
More fixes for the CVE-2019-14745
1
static int bin_symbols(RCore *r, int mode, ut64 laddr, int va, ut64 at, const char *name, bool exponly, const char *args) { RBinInfo *info = r_bin_get_info (r->bin); RList *entries = r_bin_get_entries (r->bin); RBinSymbol *symbol; RBinAddr *entry; RListIter *iter; bool firstexp = true; bool printHere = false; i...
135,940,108,812,750,360,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2019-16718
In radare2 before 3.9.0, a command injection vulnerability exists in bin_symbols() in libr/core/cbin.c. By using a crafted executable file, it's possible to execute arbitrary shell commands with the permissions of the victim. This vulnerability is due to an insufficient fix for CVE-2019-14745 and improper handling of s...
https://nvd.nist.gov/vuln/detail/CVE-2019-16718
161,622
radare2
5411543a310a470b1257fb93273cdd6e8dfcb3af
https://github.com/radare/radare2
https://github.com/radareorg/radare2/commit/5411543a310a470b1257fb93273cdd6e8dfcb3af
More fixes for the CVE-2019-14745
0
static int bin_symbols(RCore *r, int mode, ut64 laddr, int va, ut64 at, const char *name, bool exponly, const char *args) { RBinInfo *info = r_bin_get_info (r->bin); RList *entries = r_bin_get_entries (r->bin); RBinSymbol *symbol; RBinAddr *entry; RListIter *iter; bool firstexp = true; bool printHere = false; i...
197,456,506,973,153,860,000,000,000,000,000,000,000
None
null
[ "CWE-78" ]
CVE-2019-16718
In radare2 before 3.9.0, a command injection vulnerability exists in bin_symbols() in libr/core/cbin.c. By using a crafted executable file, it's possible to execute arbitrary shell commands with the permissions of the victim. This vulnerability is due to an insufficient fix for CVE-2019-14745 and improper handling of s...
https://nvd.nist.gov/vuln/detail/CVE-2019-16718
4,462
linux
072684e8c58d17e853f8e8b9f6d9ce2e58d2b036
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/072684e8c58d17e853f8e8b9f6d9ce2e58d2b036
USB: gadget: f_hid: fix deadlock in f_hidg_write() In f_hidg_write() the write_spinlock is acquired before calling usb_ep_queue() which causes a deadlock when dummy_hcd is being used. This is because dummy_queue() callbacks into f_hidg_req_complete() which tries to acquire the same spinlock. This is (part of) the back...
1
static ssize_t f_hidg_write(struct file *file, const char __user *buffer, size_t count, loff_t *offp) { struct f_hidg *hidg = file->private_data; struct usb_request *req; unsigned long flags; ssize_t status = -ENOMEM; if (!access_ok(buffer, count)) return -EFAULT; spin_lock_irqsave(&hidg->write_spinlo...
18,722,974,638,875,233,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2019-14763
In the Linux kernel before 4.16.4, a double-locking error in drivers/usb/dwc3/gadget.c may potentially cause a deadlock with f_hid.
https://nvd.nist.gov/vuln/detail/CVE-2019-14763
161,624
linux
072684e8c58d17e853f8e8b9f6d9ce2e58d2b036
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/072684e8c58d17e853f8e8b9f6d9ce2e58d2b036
USB: gadget: f_hid: fix deadlock in f_hidg_write() In f_hidg_write() the write_spinlock is acquired before calling usb_ep_queue() which causes a deadlock when dummy_hcd is being used. This is because dummy_queue() callbacks into f_hidg_req_complete() which tries to acquire the same spinlock. This is (part of) the back...
0
static ssize_t f_hidg_write(struct file *file, const char __user *buffer, size_t count, loff_t *offp) { struct f_hidg *hidg = file->private_data; struct usb_request *req; unsigned long flags; ssize_t status = -ENOMEM; if (!access_ok(buffer, count)) return -EFAULT; spin_lock_irqsave(&hidg->write_spinlo...
4,425,856,548,019,936,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2019-14763
In the Linux kernel before 4.16.4, a double-locking error in drivers/usb/dwc3/gadget.c may potentially cause a deadlock with f_hid.
https://nvd.nist.gov/vuln/detail/CVE-2019-14763
4,482
miniupnp
86030db849260dd8fb2ed975b9890aef1b62b692
https://github.com/miniupnp/miniupnp
https://github.com/miniupnp/miniupnp/commit/86030db849260dd8fb2ed975b9890aef1b62b692
fix error from commit 13585f15c7f7dc28bbbba1661efb280d530d114c
1
GetOutboundPinholeTimeout(struct upnphttp * h, const char * action, const char * ns) { int r; static const char resp[] = "<u:%sResponse " "xmlns:u=\"%s\">" "<OutboundPinholeTimeout>%d</OutboundPinholeTimeout>" "</u:%sResponse>"; char body[512]; int bodylen; struct NameValueParserData data; char * int_ip...
189,077,583,638,678,540,000,000,000,000,000,000,000
upnpsoap.c
43,985,210,412,667,610,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2019-12109
A Denial Of Service vulnerability in MiniUPnP MiniUPnPd through 2.1 exists due to a NULL pointer dereference in GetOutboundPinholeTimeout in upnpsoap.c for rem_port.
https://nvd.nist.gov/vuln/detail/CVE-2019-12109
161,639
miniupnp
86030db849260dd8fb2ed975b9890aef1b62b692
https://github.com/miniupnp/miniupnp
https://github.com/miniupnp/miniupnp/commit/86030db849260dd8fb2ed975b9890aef1b62b692
fix error from commit 13585f15c7f7dc28bbbba1661efb280d530d114c
0
GetOutboundPinholeTimeout(struct upnphttp * h, const char * action, const char * ns) { int r; static const char resp[] = "<u:%sResponse " "xmlns:u=\"%s\">" "<OutboundPinholeTimeout>%d</OutboundPinholeTimeout>" "</u:%sResponse>"; char body[512]; int bodylen; struct NameValueParserData data; char * int_ip...
274,980,753,247,083,820,000,000,000,000,000,000,000
upnpsoap.c
239,055,731,804,881,930,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2019-12109
A Denial Of Service vulnerability in MiniUPnP MiniUPnPd through 2.1 exists due to a NULL pointer dereference in GetOutboundPinholeTimeout in upnpsoap.c for rem_port.
https://nvd.nist.gov/vuln/detail/CVE-2019-12109
4,499
ImageMagick
58d9c46929ca0828edde34d263700c3a5fe8dc3c
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/58d9c46929ca0828edde34d263700c3a5fe8dc3c
...
1
MagickExport int LocaleLowercase(const int c) { if (c < 0) return(c); #if defined(MAGICKCORE_LOCALE_SUPPORT) if (c_locale != (locale_t) NULL) return(tolower_l((int) ((unsigned char) c),c_locale)); #endif return(tolower((int) ((unsigned char) c))); }
281,269,707,960,595,000,000,000,000,000,000,000,000
locale.c
280,458,419,050,800,300,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-10714
LocaleLowercase in MagickCore/locale.c in ImageMagick before 7.0.8-32 allows out-of-bounds access, leading to a SIGSEGV.
https://nvd.nist.gov/vuln/detail/CVE-2019-10714
161,655
ImageMagick
58d9c46929ca0828edde34d263700c3a5fe8dc3c
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/58d9c46929ca0828edde34d263700c3a5fe8dc3c
...
0
MagickExport int LocaleLowercase(const int c) { if (c == EOF) return(c); #if defined(MAGICKCORE_LOCALE_SUPPORT) if (c_locale != (locale_t) NULL) return(tolower_l((int) ((unsigned char) c),c_locale)); #endif return(tolower((int) ((unsigned char) c))); }
29,052,808,171,853,630,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2019-10714
LocaleLowercase in MagickCore/locale.c in ImageMagick before 7.0.8-32 allows out-of-bounds access, leading to a SIGSEGV.
https://nvd.nist.gov/vuln/detail/CVE-2019-10714
4,510
openjpeg
5d00b719f4b93b1445e6fb4c766b9a9883c57949
https://github.com/uclouvain/openjpeg
https://github.com/uclouvain/openjpeg/commit/5d00b719f4b93b1445e6fb4c766b9a9883c57949
[trunk] fixed a buffer overflow in opj_tcd_init_decode_tile Update issue 431
1
void opj_get_all_encoding_parameters( const opj_image_t *p_image, const opj_cp_t *p_cp, OPJ_UINT32 tileno, OPJ_INT32 * p_tx0, OPJ_INT32 * p_tx1, ...
279,071,337,625,763,900,000,000,000,000,000,000,000
pi.c
61,290,128,435,409,710,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2018-20847
An improper computation of p_tx0, p_tx1, p_ty0 and p_ty1 in the function opj_get_encoding_parameters in openjp2/pi.c in OpenJPEG through 2.3.0 can lead to an integer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2018-20847
161,659
openjpeg
5d00b719f4b93b1445e6fb4c766b9a9883c57949
https://github.com/uclouvain/openjpeg
https://github.com/uclouvain/openjpeg/commit/5d00b719f4b93b1445e6fb4c766b9a9883c57949
[trunk] fixed a buffer overflow in opj_tcd_init_decode_tile Update issue 431
0
void opj_get_all_encoding_parameters( const opj_image_t *p_image, const opj_cp_t *p_cp, OPJ_UINT32 tileno, OPJ_INT32 * p_tx0, OPJ_INT32 * p_tx1, ...
228,945,466,921,933,980,000,000,000,000,000,000,000
pi.c
85,117,321,979,618,870,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2018-20847
An improper computation of p_tx0, p_tx1, p_ty0 and p_ty1 in the function opj_get_encoding_parameters in openjp2/pi.c in OpenJPEG through 2.3.0 can lead to an integer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2018-20847
4,511
linux
5c25f65fd1e42685f7ccd80e0621829c105785d9
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/5c25f65fd1e42685f7ccd80e0621829c105785d9
tun: allow positive return values on dev_get_valid_name() call If the name argument of dev_get_valid_name() contains "%d", it will try to assign it a unit number in __dev__alloc_name() and return either the unit number (>= 0) or an error code (< 0). Considering positive values as error values prevent tun device creati...
1
static int tun_set_iff(struct net *net, struct file *file, struct ifreq *ifr) { struct tun_struct *tun; struct tun_file *tfile = file->private_data; struct net_device *dev; int err; if (tfile->detached) return -EINVAL; dev = __dev_get_by_name(net, ifr->ifr_name); if (dev) { if (ifr->ifr_flags & IFF_TUN_EXC...
55,157,606,478,905,350,000,000,000,000,000,000,000
tun.c
129,036,952,106,696,010,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2018-7191
In the tun subsystem in the Linux kernel before 4.13.14, dev_get_valid_name is not called before register_netdevice. This allows local users to cause a denial of service (NULL pointer dereference and panic) via an ioctl(TUNSETIFF) call with a dev name containing a / character. This is similar to CVE-2013-4343.
https://nvd.nist.gov/vuln/detail/CVE-2018-7191
161,660
linux
5c25f65fd1e42685f7ccd80e0621829c105785d9
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/5c25f65fd1e42685f7ccd80e0621829c105785d9
tun: allow positive return values on dev_get_valid_name() call If the name argument of dev_get_valid_name() contains "%d", it will try to assign it a unit number in __dev__alloc_name() and return either the unit number (>= 0) or an error code (< 0). Considering positive values as error values prevent tun device creati...
0
static int tun_set_iff(struct net *net, struct file *file, struct ifreq *ifr) { struct tun_struct *tun; struct tun_file *tfile = file->private_data; struct net_device *dev; int err; if (tfile->detached) return -EINVAL; dev = __dev_get_by_name(net, ifr->ifr_name); if (dev) { if (ifr->ifr_flags & IFF_TUN_EXC...
299,196,588,912,012,760,000,000,000,000,000,000,000
tun.c
183,292,750,824,109,400,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2018-7191
In the tun subsystem in the Linux kernel before 4.13.14, dev_get_valid_name is not called before register_netdevice. This allows local users to cause a denial of service (NULL pointer dereference and panic) via an ioctl(TUNSETIFF) call with a dev name containing a / character. This is similar to CVE-2013-4343.
https://nvd.nist.gov/vuln/detail/CVE-2018-7191
4,694
Chrome
7d8cefdf6d0e457b7a855c9503684f1058c2a356
https://github.com/chromium/chromium
https://github.com/chromium/chromium/commit/7d8cefdf6d0e457b7a855c9503684f1058c2a356
None
1
WebGLObject::WebGLObject(WebGLRenderingContext* context) : m_object(0) , m_attachmentCount(0) , m_deleted(false) { }
113,581,393,010,610,800,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-3916
Google Chrome before 16.0.912.63 does not properly handle PDF cross references, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.
https://nvd.nist.gov/vuln/detail/CVE-2011-3916
161,832
Chrome
7d8cefdf6d0e457b7a855c9503684f1058c2a356
https://github.com/chromium/chromium
https://github.com/chromium/chromium/commit/7d8cefdf6d0e457b7a855c9503684f1058c2a356
None
0
WebGLObject::WebGLObject(WebGLRenderingContext* context) WebGLObject::WebGLObject(WebGLRenderingContext*) : m_object(0) , m_attachmentCount(0) , m_deleted(false) { }
294,387,494,251,585,160,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-3916
Google Chrome before 16.0.912.63 does not properly handle PDF cross references, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.
https://nvd.nist.gov/vuln/detail/CVE-2011-3916
4,803
Chrome
d662b905d30cec7899bbb15140dcfacd73506167
https://github.com/chromium/chromium
https://github.com/chromium/chromium/commit/d662b905d30cec7899bbb15140dcfacd73506167
None
1
BlockedPluginInfoBarDelegate::BlockedPluginInfoBarDelegate( TabContents* tab_contents, const string16& utf16_name) : PluginInfoBarDelegate(tab_contents, utf16_name) { UserMetrics::RecordAction(UserMetricsAction("BlockedPluginInfobar.Shown")); std::string name = UTF16ToUTF8(utf16_name); if (name == web...
129,354,267,864,543,600,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2011-2836
Google Chrome before 14.0.835.163 does not require Infobar interaction before use of the Windows Media Player plug-in, which makes it easier for remote attackers to have an unspecified impact via crafted Flash content.
https://nvd.nist.gov/vuln/detail/CVE-2011-2836
161,936
Chrome
d662b905d30cec7899bbb15140dcfacd73506167
https://github.com/chromium/chromium
https://github.com/chromium/chromium/commit/d662b905d30cec7899bbb15140dcfacd73506167
None
0
BlockedPluginInfoBarDelegate::BlockedPluginInfoBarDelegate( TabContents* tab_contents, const string16& utf16_name) : PluginInfoBarDelegate(tab_contents, utf16_name) { UserMetrics::RecordAction(UserMetricsAction("BlockedPluginInfobar.Shown")); std::string name = UTF16ToUTF8(utf16_name); if (name == web...
106,969,321,277,819,680,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2011-2836
Google Chrome before 14.0.835.163 does not require Infobar interaction before use of the Windows Media Player plug-in, which makes it easier for remote attackers to have an unspecified impact via crafted Flash content.
https://nvd.nist.gov/vuln/detail/CVE-2011-2836
4,807
Chrome
d304b5ec1b16766ea2cb552a27dc14df848d6a0e
https://github.com/chromium/chromium
https://github.com/chromium/chromium/commit/d304b5ec1b16766ea2cb552a27dc14df848d6a0e
None
1
void FFmpegVideoDecodeEngine::Initialize( MessageLoop* message_loop, VideoDecodeEngine::EventHandler* event_handler, VideoDecodeContext* context, const VideoDecoderConfig& config) { static const int kDecodeThreads = 2; static const int kMaxDecodeThreads = 16; codec_context_ = avcodec_alloc_contex...
158,059,457,852,489,340,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-2843
Google Chrome before 14.0.835.163 does not properly handle media buffers, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.
https://nvd.nist.gov/vuln/detail/CVE-2011-2843
161,940
Chrome
d304b5ec1b16766ea2cb552a27dc14df848d6a0e
https://github.com/chromium/chromium
https://github.com/chromium/chromium/commit/d304b5ec1b16766ea2cb552a27dc14df848d6a0e
None
0
void FFmpegVideoDecodeEngine::Initialize( MessageLoop* message_loop, VideoDecodeEngine::EventHandler* event_handler, VideoDecodeContext* context, const VideoDecoderConfig& config) { static const int kDecodeThreads = 2; static const int kMaxDecodeThreads = 16; codec_context_ = avcodec_alloc_contex...
311,936,192,025,024,040,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-2843
Google Chrome before 14.0.835.163 does not properly handle media buffers, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.
https://nvd.nist.gov/vuln/detail/CVE-2011-2843
4,816
Chrome
7155d7caafd2aa1fb822dc5672c90ea446247e8d
https://github.com/chromium/chromium
https://github.com/chromium/chromium/commit/7155d7caafd2aa1fb822dc5672c90ea446247e8d
None
1
void ScaleYUVToRGB32(const uint8* y_buf, const uint8* u_buf, const uint8* v_buf, uint8* rgb_buf, int source_width, int source_height, int width, int height, ...
253,694,277,743,522,000,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-2851
Google Chrome before 14.0.835.163 does not properly handle video, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.
https://nvd.nist.gov/vuln/detail/CVE-2011-2851
161,948
Chrome
7155d7caafd2aa1fb822dc5672c90ea446247e8d
https://github.com/chromium/chromium
https://github.com/chromium/chromium/commit/7155d7caafd2aa1fb822dc5672c90ea446247e8d
None
0
void ScaleYUVToRGB32(const uint8* y_buf, const uint8* u_buf, const uint8* v_buf, uint8* rgb_buf, int source_width, int source_height, int width, int height, ...
321,584,538,849,835,450,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-2851
Google Chrome before 14.0.835.163 does not properly handle video, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.
https://nvd.nist.gov/vuln/detail/CVE-2011-2851
4,817
Chrome
d82e91c46938520466e9d7c695e0bc638fc70970
https://github.com/chromium/chromium
https://github.com/chromium/chromium/commit/d82e91c46938520466e9d7c695e0bc638fc70970
None
1
NativeBrowserFrame* NativeBrowserFrame::CreateNativeBrowserFrame( BrowserFrame* browser_frame, BrowserView* browser_view) { if (views::Widget::IsPureViews()) return new BrowserFrameViews(browser_frame, browser_view); return new BrowserFrameGtk(browser_frame, browser_view); }
284,461,539,438,023,930,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2011-2853
Use-after-free vulnerability in Google Chrome before 14.0.835.163 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to plug-in handling.
https://nvd.nist.gov/vuln/detail/CVE-2011-2853
161,949
Chrome
d82e91c46938520466e9d7c695e0bc638fc70970
https://github.com/chromium/chromium
https://github.com/chromium/chromium/commit/d82e91c46938520466e9d7c695e0bc638fc70970
None
0
NativeBrowserFrame* NativeBrowserFrame::CreateNativeBrowserFrame( BrowserFrame* browser_frame, BrowserView* browser_view) { if (views::Widget::IsPureViews() && views::ViewsDelegate::views_delegate->GetDefaultParentView()) return new BrowserFrameViews(browser_frame, browser_view); return new B...
326,999,065,481,318,850,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2011-2853
Use-after-free vulnerability in Google Chrome before 14.0.835.163 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to plug-in handling.
https://nvd.nist.gov/vuln/detail/CVE-2011-2853
4,819
Chrome
061ddbae1ee31476b57ea44a953970ab2fe8aca1
https://github.com/chromium/chromium
https://github.com/chromium/chromium/commit/061ddbae1ee31476b57ea44a953970ab2fe8aca1
None
1
void DocumentWriter::setDecoder(TextResourceDecoder* decoder) { m_decoder = decoder; }
124,821,018,363,863,960,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2011-2854
Use-after-free vulnerability in Google Chrome before 14.0.835.163 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to "ruby / table style handing."
https://nvd.nist.gov/vuln/detail/CVE-2011-2854
161,951
Chrome
061ddbae1ee31476b57ea44a953970ab2fe8aca1
https://github.com/chromium/chromium
https://github.com/chromium/chromium/commit/061ddbae1ee31476b57ea44a953970ab2fe8aca1
None
0
void DocumentWriter::setDecoder(TextResourceDecoder* decoder)
158,557,431,112,174,510,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2011-2854
Use-after-free vulnerability in Google Chrome before 14.0.835.163 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to "ruby / table style handing."
https://nvd.nist.gov/vuln/detail/CVE-2011-2854
4,820
Chrome
3a766e0115e9799db766a88554b9ab12ee5bf2a4
https://github.com/chromium/chromium
https://github.com/chromium/chromium/commit/3a766e0115e9799db766a88554b9ab12ee5bf2a4
None
1
xmlXPathCompOpEval(xmlXPathParserContextPtr ctxt, xmlXPathStepOpPtr op) { int total = 0; int equal, ret; xmlXPathCompExprPtr comp; xmlXPathObjectPtr arg1, arg2; xmlNodePtr bak; xmlDocPtr bakd; int pp; int cs; CHECK_ERROR0; comp = ctxt->comp; switch (op->op) { case XP...
152,834,258,874,192,350,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2011-2834
Double free vulnerability in libxml2, as used in Google Chrome before 14.0.835.163, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to XPath handling.
https://nvd.nist.gov/vuln/detail/CVE-2011-2834
161,952
Chrome
3a766e0115e9799db766a88554b9ab12ee5bf2a4
https://github.com/chromium/chromium
https://github.com/chromium/chromium/commit/3a766e0115e9799db766a88554b9ab12ee5bf2a4
None
0
xmlXPathCompOpEval(xmlXPathParserContextPtr ctxt, xmlXPathStepOpPtr op) { int total = 0; int equal, ret; xmlXPathCompExprPtr comp; xmlXPathObjectPtr arg1, arg2; xmlNodePtr bak; xmlDocPtr bakd; int pp; int cs; CHECK_ERROR0; comp = ctxt->comp; switch (op->op) { case XP...
313,226,224,957,561,150,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2011-2834
Double free vulnerability in libxml2, as used in Google Chrome before 14.0.835.163, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to XPath handling.
https://nvd.nist.gov/vuln/detail/CVE-2011-2834
4,821
Chrome
454434f6100cb6a529652a25b5fc181caa7c7f32
https://github.com/chromium/chromium
https://github.com/chromium/chromium/commit/454434f6100cb6a529652a25b5fc181caa7c7f32
None
1
bool ExtensionService::IsDownloadFromGallery(const GURL& download_url, const GURL& referrer_url) { if (IsDownloadFromMiniGallery(download_url) && StartsWithASCII(referrer_url.spec(), extension_urls::kMiniGalleryBrowsePrefix, false)) { retu...
110,603,712,723,080,350,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2011-2859
Google Chrome before 14.0.835.163 uses incorrect permissions for non-gallery pages, which has unspecified impact and attack vectors.
https://nvd.nist.gov/vuln/detail/CVE-2011-2859
161,953
Chrome
454434f6100cb6a529652a25b5fc181caa7c7f32
https://github.com/chromium/chromium
https://github.com/chromium/chromium/commit/454434f6100cb6a529652a25b5fc181caa7c7f32
None
0
bool ExtensionService::IsDownloadFromGallery(const GURL& download_url, const GURL& referrer_url) { if (IsDownloadFromMiniGallery(download_url) && StartsWithASCII(referrer_url.spec(), extension_urls::kMiniGalleryBrowsePrefix, false)) { retu...
152,275,995,827,129,880,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2011-2859
Google Chrome before 14.0.835.163 uses incorrect permissions for non-gallery pages, which has unspecified impact and attack vectors.
https://nvd.nist.gov/vuln/detail/CVE-2011-2859
4,822
Chrome
6c390601f9ee3436bb32f84772977570265982ea
https://github.com/chromium/chromium
https://github.com/chromium/chromium/commit/6c390601f9ee3436bb32f84772977570265982ea
None
1
bool ContainerNode::replaceChild(PassRefPtr<Node> newChild, Node* oldChild, ExceptionCode& ec, bool shouldLazyAttach) { ASSERT(refCount() || parentOrHostNode()); RefPtr<Node> protect(this); ec = 0; if (oldChild == newChild) // nothing to do return true; checkReplaceChild(newChild.get(), ...
226,083,901,999,659,320,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2011-2860
Use-after-free vulnerability in Google Chrome before 14.0.835.163 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to table styles.
https://nvd.nist.gov/vuln/detail/CVE-2011-2860
161,954
Chrome
6c390601f9ee3436bb32f84772977570265982ea
https://github.com/chromium/chromium
https://github.com/chromium/chromium/commit/6c390601f9ee3436bb32f84772977570265982ea
None
0
bool ContainerNode::replaceChild(PassRefPtr<Node> newChild, Node* oldChild, ExceptionCode& ec, bool shouldLazyAttach) { ASSERT(refCount() || parentOrHostNode()); RefPtr<Node> protect(this); ec = 0; if (oldChild == newChild) // nothing to do return true; checkReplaceChild(newChild.get(), ...
282,795,495,570,752,560,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2011-2860
Use-after-free vulnerability in Google Chrome before 14.0.835.163 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to table styles.
https://nvd.nist.gov/vuln/detail/CVE-2011-2860
4,829
Chrome
5b65968b6c64fa02e74ca6b965bf5998b911e826
https://github.com/chromium/chromium
https://github.com/chromium/chromium/commit/5b65968b6c64fa02e74ca6b965bf5998b911e826
None
1
bool SubsetterImpl::ResolveCompositeGlyphs(const unsigned int* glyph_ids, size_t glyph_count, IntegerSet* glyph_id_processed) { if (glyph_ids == NULL || glyph_count == 0 || glyph_id_processed == NULL) { return false; } Glyp...
88,383,665,204,444,790,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-2864
Google Chrome before 14.0.835.163 does not properly handle Tibetan characters, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.
https://nvd.nist.gov/vuln/detail/CVE-2011-2864