idx
int64
project
string
commit_id
string
project_url
string
commit_url
string
commit_message
string
target
int64
func
string
func_hash
float64
file_name
string
file_hash
float64
cwe
list
cve
string
cve_desc
string
nvd_url
string
184,595
ImageMagick
134463b926fa965571aa4febd61b810be5e7da05
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/134463b926fa965571aa4febd61b810be5e7da05
https://github.com/ImageMagick/ImageMagick/issues/129
0
static Image *ReadVIFFImage(const ImageInfo *image_info, ExceptionInfo *exception) { #define VFF_CM_genericRGB 15 #define VFF_CM_ntscRGB 1 #define VFF_CM_NONE 0 #define VFF_DEP_DECORDER 0x4 #define VFF_DEP_NSORDER 0x8 #define VFF_DES_RAW 0 #define VFF_LOC_IMPLICIT 1 #define VFF_MAPTYP_NONE 0 #define VFF_MA...
84,738,426,758,816,520,000,000,000,000,000,000,000
viff.c
304,852,647,525,085,360,000,000,000,000,000,000,000
[ "CWE-284" ]
CVE-2016-10065
The ReadVIFFImage function in coders/viff.c in ImageMagick before 7.0.1-0 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2016-10065
9,512
ImageMagick
9e187b73a8a1290bb0e1a1c878f8be1917aa8742
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/9e187b73a8a1290bb0e1a1c878f8be1917aa8742
None
1
static void WriteProfile(j_compress_ptr jpeg_info,Image *image) { const char *name; const StringInfo *profile; MagickBooleanType iptc; register ssize_t i; size_t length, tag_length; StringInfo *custom_profile; /* Save image profile as a APP marker. */ iptc=MagickF...
203,461,117,257,884,900,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-10052
Buffer overflow in the WriteProfile function in coders/jpeg.c in ImageMagick before 6.9.5-6 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2016-10052
184,597
ImageMagick
9e187b73a8a1290bb0e1a1c878f8be1917aa8742
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/9e187b73a8a1290bb0e1a1c878f8be1917aa8742
None
0
static void WriteProfile(j_compress_ptr jpeg_info,Image *image) { const char *name; const StringInfo *profile; MagickBooleanType iptc; register ssize_t i; size_t length, tag_length; StringInfo *custom_profile; /* Save image profile as a APP marker. */ iptc=MagickF...
267,909,007,897,631,500,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-10052
Buffer overflow in the WriteProfile function in coders/jpeg.c in ImageMagick before 6.9.5-6 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2016-10052
9,516
php-src
863d37ea66d5c960db08d6f4a2cbd2518f0f80d1
https://github.com/php/php-src
https://github.com/php/php-src/commit/863d37ea66d5c960db08d6f4a2cbd2518f0f80d1
Fix #72696: imagefilltoborder stackoverflow on truecolor images We must not allow negative color values be passed to gdImageFillToBorder(), because that can lead to infinite recursion since the recursion termination condition will not necessarily be met.
1
void gdImageFillToBorder (gdImagePtr im, int x, int y, int border, int color) { int lastBorder; /* Seek left */ int leftLimit = -1, rightLimit; int i, restoreAlphaBlending = 0; if (border < 0) { /* Refuse to fill to a non-solid border */ return; } if (!im->trueColor) { if ((color > (im->colorsTotal...
199,950,444,190,713,360,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-9933
Stack consumption vulnerability in the gdImageFillToBorder function in gd.c in the GD Graphics Library (aka libgd) before 2.2.2, as used in PHP before 5.6.28 and 7.x before 7.0.13, allows remote attackers to cause a denial of service (segmentation violation) via a crafted imagefilltoborder call that triggers use of a n...
https://nvd.nist.gov/vuln/detail/CVE-2016-9933
184,601
php-src
863d37ea66d5c960db08d6f4a2cbd2518f0f80d1
https://github.com/php/php-src
https://github.com/php/php-src/commit/863d37ea66d5c960db08d6f4a2cbd2518f0f80d1
Fix #72696: imagefilltoborder stackoverflow on truecolor images We must not allow negative color values be passed to gdImageFillToBorder(), because that can lead to infinite recursion since the recursion termination condition will not necessarily be met.
0
void gdImageFillToBorder (gdImagePtr im, int x, int y, int border, int color) { int lastBorder; /* Seek left */ int leftLimit = -1, rightLimit; int i, restoreAlphaBlending = 0; if (border < 0 || color < 0) { /* Refuse to fill to a non-solid border */ return; } if (!im->trueColor) { if ((color > (im...
134,289,527,342,969,380,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-9933
Stack consumption vulnerability in the gdImageFillToBorder function in gd.c in the GD Graphics Library (aka libgd) before 2.2.2, as used in PHP before 5.6.28 and 7.x before 7.0.13, allows remote attackers to cause a denial of service (segmentation violation) via a crafted imagefilltoborder call that triggers use of a n...
https://nvd.nist.gov/vuln/detail/CVE-2016-9933
9,517
jasper
1abc2e5a401a4bf1d5ca4df91358ce5df111f495
https://github.com/mdadams/jasper
https://github.com/mdadams/jasper/commit/1abc2e5a401a4bf1d5ca4df91358ce5df111f495
Fixed an array overflow problem in the JPC decoder.
1
static int jpc_dec_tileinit(jpc_dec_t *dec, jpc_dec_tile_t *tile) { jpc_dec_tcomp_t *tcomp; int compno; int rlvlno; jpc_dec_rlvl_t *rlvl; jpc_dec_band_t *band; jpc_dec_prc_t *prc; int bndno; jpc_tsfb_band_t *bnd; int bandno; jpc_dec_ccp_t *ccp; int prccnt; jpc_dec_cblk_t *cblk; int cblkcnt; uint_fast32_t ...
152,611,857,864,829,500,000,000,000,000,000,000,000
jpc_dec.c
9,904,405,345,613,609,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-9560
Stack-based buffer overflow in the jpc_tsfb_getbands2 function in jpc_tsfb.c in JasPer before 1.900.30 allows remote attackers to have unspecified impact via a crafted image.
https://nvd.nist.gov/vuln/detail/CVE-2016-9560
184,602
jasper
1abc2e5a401a4bf1d5ca4df91358ce5df111f495
https://github.com/mdadams/jasper
https://github.com/mdadams/jasper/commit/1abc2e5a401a4bf1d5ca4df91358ce5df111f495
Fixed an array overflow problem in the JPC decoder.
0
static int jpc_dec_tileinit(jpc_dec_t *dec, jpc_dec_tile_t *tile) { jpc_dec_tcomp_t *tcomp; int compno; int rlvlno; jpc_dec_rlvl_t *rlvl; jpc_dec_band_t *band; jpc_dec_prc_t *prc; int bndno; jpc_tsfb_band_t *bnd; int bandno; jpc_dec_ccp_t *ccp; int prccnt; jpc_dec_cblk_t *cblk; int cblkcnt; uint_fast32_t ...
29,369,060,289,449,410,000,000,000,000,000,000,000
jpc_dec.c
119,032,582,243,398,160,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-9560
Stack-based buffer overflow in the jpc_tsfb_getbands2 function in jpc_tsfb.c in JasPer before 1.900.30 allows remote attackers to have unspecified impact via a crafted image.
https://nvd.nist.gov/vuln/detail/CVE-2016-9560
9,524
jasper
d8c2604cd438c41ec72aff52c16ebd8183068020
https://github.com/mdadams/jasper
https://github.com/mdadams/jasper/commit/d8c2604cd438c41ec72aff52c16ebd8183068020
Added range check on XRsiz and YRsiz fields of SIZ marker segment.
1
static int jpc_siz_getparms(jpc_ms_t *ms, jpc_cstate_t *cstate, jas_stream_t *in) { jpc_siz_t *siz = &ms->parms.siz; unsigned int i; uint_fast8_t tmp; /* Eliminate compiler warning about unused variables. */ cstate = 0; if (jpc_getuint16(in, &siz->caps) || jpc_getuint32(in, &siz->width) || jpc_getuint32...
10,991,172,644,452,336,000,000,000,000,000,000,000
jpc_cs.c
109,966,816,698,492,500,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2016-8692
The jpc_dec_process_siz function in libjasper/jpc/jpc_dec.c in JasPer before 1.900.4 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted YRsiz value in a BMP image to the imginfo command.
https://nvd.nist.gov/vuln/detail/CVE-2016-8692
184,608
jasper
d8c2604cd438c41ec72aff52c16ebd8183068020
https://github.com/mdadams/jasper
https://github.com/mdadams/jasper/commit/d8c2604cd438c41ec72aff52c16ebd8183068020
Added range check on XRsiz and YRsiz fields of SIZ marker segment.
0
static int jpc_siz_getparms(jpc_ms_t *ms, jpc_cstate_t *cstate, jas_stream_t *in) { jpc_siz_t *siz = &ms->parms.siz; unsigned int i; uint_fast8_t tmp; /* Eliminate compiler warning about unused variables. */ cstate = 0; if (jpc_getuint16(in, &siz->caps) || jpc_getuint32(in, &siz->width) || jpc_getuint32...
83,491,995,228,449,810,000,000,000,000,000,000,000
jpc_cs.c
335,797,736,713,227,740,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2016-8692
The jpc_dec_process_siz function in libjasper/jpc/jpc_dec.c in JasPer before 1.900.4 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted YRsiz value in a BMP image to the imginfo command.
https://nvd.nist.gov/vuln/detail/CVE-2016-8692
9,525
libarchive
eec077f52bfa2d3f7103b4b74d52572ba8a15aca
https://github.com/libarchive/libarchive
https://github.com/libarchive/libarchive/commit/eec077f52bfa2d3f7103b4b74d52572ba8a15aca
Issue 747 (and others?): Avoid OOB read when parsing multiple long lines The mtree bidder needs to look several lines ahead in the input. It does this by extending the read-ahead and parsing subsequent lines from the same growing buffer. A bookkeeping error when extending the read-ahead would sometimes lead it to si...
1
next_line(struct archive_read *a, const char **b, ssize_t *avail, ssize_t *ravail, ssize_t *nl) { ssize_t len; int quit; quit = 0; if (*avail == 0) { *nl = 0; len = 0; } else len = get_line_size(*b, *avail, nl); /* * Read bytes more while it does not reach the end of line. */ while (*nl == 0 &&...
62,295,156,973,029,730,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2016-8688
The mtree bidder in libarchive 3.2.1 does not keep track of line sizes when extending the read-ahead, which allows remote attackers to cause a denial of service (crash) via a crafted file, which triggers an invalid read in the (1) detect_form or (2) bid_entry function in libarchive/archive_read_support_format_mtree.c.
https://nvd.nist.gov/vuln/detail/CVE-2016-8688
184,609
libarchive
eec077f52bfa2d3f7103b4b74d52572ba8a15aca
https://github.com/libarchive/libarchive
https://github.com/libarchive/libarchive/commit/eec077f52bfa2d3f7103b4b74d52572ba8a15aca
Issue 747 (and others?): Avoid OOB read when parsing multiple long lines The mtree bidder needs to look several lines ahead in the input. It does this by extending the read-ahead and parsing subsequent lines from the same growing buffer. A bookkeeping error when extending the read-ahead would sometimes lead it to si...
0
next_line(struct archive_read *a, const char **b, ssize_t *avail, ssize_t *ravail, ssize_t *nl) { ssize_t len; int quit; quit = 0; if (*avail == 0) { *nl = 0; len = 0; } else len = get_line_size(*b, *avail, nl); /* * Read bytes more while it does not reach the end of line. */ while (*nl == 0 &&...
320,859,213,761,789,560,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2016-8688
The mtree bidder in libarchive 3.2.1 does not keep track of line sizes when extending the read-ahead, which allows remote attackers to cause a denial of service (crash) via a crafted file, which triggers an invalid read in the (1) detect_form or (2) bid_entry function in libarchive/archive_read_support_format_mtree.c.
https://nvd.nist.gov/vuln/detail/CVE-2016-8688
9,526
ImageMagick
6e48aa92ff4e6e95424300ecd52a9ea453c19c60
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/6e48aa92ff4e6e95424300ecd52a9ea453c19c60
https://github.com/ImageMagick/ImageMagick/issues/268
1
static Image *ReadTIFFImage(const ImageInfo *image_info, ExceptionInfo *exception) { const char *option; float *chromaticity, x_position, y_position, x_resolution, y_resolution; Image *image; int tiff_status; MagickBooleanType status; MagickSizeType number_pixe...
280,343,953,088,806,580,000,000,000,000,000,000,000
tiff.c
223,604,198,693,155,800,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-8677
The AcquireQuantumPixels function in MagickCore/quantum.c in ImageMagick before 7.0.3-1 allows remote attackers to have unspecified impact via a crafted image file, which triggers a memory allocation failure.
https://nvd.nist.gov/vuln/detail/CVE-2016-8677
184,610
ImageMagick
6e48aa92ff4e6e95424300ecd52a9ea453c19c60
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/6e48aa92ff4e6e95424300ecd52a9ea453c19c60
https://github.com/ImageMagick/ImageMagick/issues/268
0
static Image *ReadTIFFImage(const ImageInfo *image_info, ExceptionInfo *exception) { const char *option; float *chromaticity, x_position, y_position, x_resolution, y_resolution; Image *image; int tiff_status; MagickBooleanType status; MagickSizeType number_pixe...
74,219,455,343,150,730,000,000,000,000,000,000,000
tiff.c
15,087,053,951,864,792,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-8677
The AcquireQuantumPixels function in MagickCore/quantum.c in ImageMagick before 7.0.3-1 allows remote attackers to have unspecified impact via a crafted image file, which triggers a memory allocation failure.
https://nvd.nist.gov/vuln/detail/CVE-2016-8677
9,527
libav
e5b019725f53b79159931d3a7317107cbbfd0860
https://github.com/libav/libav
https://github.com/libav/libav/commit/e5b019725f53b79159931d3a7317107cbbfd0860
m4vdec: Check for non-startcode 00 00 00 sequences in probe This makes the m4v detection less trigger-happy. Bug-Id: 949 Signed-off-by: Diego Biurrun <diego@biurrun.de>
1
static int mpeg4video_probe(AVProbeData *probe_packet) { uint32_t temp_buffer = -1; int VO = 0, VOL = 0, VOP = 0, VISO = 0, res = 0; int i; for (i = 0; i < probe_packet->buf_size; i++) { temp_buffer = (temp_buffer << 8) + probe_packet->buf[i]; if ((temp_buffer & 0xffffff00) != 0x100)...
296,504,819,383,989,060,000,000,000,000,000,000,000
m4vdec.c
292,188,987,403,181,880,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2016-8675
The get_vlc2 function in get_bits.h in Libav before 11.9 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted mp3 file, possibly related to startcode sequences during m4v detection.
https://nvd.nist.gov/vuln/detail/CVE-2016-8675
184,611
libav
e5b019725f53b79159931d3a7317107cbbfd0860
https://github.com/libav/libav
https://github.com/libav/libav/commit/e5b019725f53b79159931d3a7317107cbbfd0860
m4vdec: Check for non-startcode 00 00 00 sequences in probe This makes the m4v detection less trigger-happy. Bug-Id: 949 Signed-off-by: Diego Biurrun <diego@biurrun.de>
0
static int mpeg4video_probe(AVProbeData *probe_packet) { uint32_t temp_buffer = -1; int VO = 0, VOL = 0, VOP = 0, VISO = 0, res = 0; int i; for (i = 0; i < probe_packet->buf_size; i++) { temp_buffer = (temp_buffer << 8) + probe_packet->buf[i]; if (temp_buffer & 0xfffffe00) ...
15,708,804,895,323,825,000,000,000,000,000,000,000
m4vdec.c
298,654,249,398,717,620,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2016-8675
The get_vlc2 function in get_bits.h in Libav before 11.9 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted mp3 file, possibly related to startcode sequences during m4v detection.
https://nvd.nist.gov/vuln/detail/CVE-2016-8675
9,533
pupnp-code
be0a01bdb83395d9f3a5ea09c1308a4f1a972cbd
https://github.com/mjg59/pupnp-code
https://github.com/mjg59/pupnp-code/commit/be0a01bdb83395d9f3a5ea09c1308a4f1a972cbd
Don't allow unhandled POSTs to write to the filesystem by default If there's no registered handler for a POST request, the default behaviour is to write it to the filesystem. Several million deployed devices appear to have this behaviour, making it possible to (at least) store arbitrary data on them. Add a configure o...
1
static int http_RecvPostMessage( /*! HTTP Parser object. */ http_parser_t *parser, /*! [in] Socket Information object. */ SOCKINFO *info, /*! File where received data is copied to. */ char *filename, /*! Send Instruction object which gives information whether the file * is a virtual file or not. */ struct Sen...
172,421,084,346,481,900,000,000,000,000,000,000,000
webserver.c
294,353,686,090,577,800,000,000,000,000,000,000,000
[ "CWE-284" ]
CVE-2016-6255
Portable UPnP SDK (aka libupnp) before 1.6.21 allows remote attackers to write to arbitrary files in the webroot via a POST request without a registered handler.
https://nvd.nist.gov/vuln/detail/CVE-2016-6255
184,615
pupnp-code
be0a01bdb83395d9f3a5ea09c1308a4f1a972cbd
https://github.com/mjg59/pupnp-code
https://github.com/mjg59/pupnp-code/commit/be0a01bdb83395d9f3a5ea09c1308a4f1a972cbd
Don't allow unhandled POSTs to write to the filesystem by default If there's no registered handler for a POST request, the default behaviour is to write it to the filesystem. Several million deployed devices appear to have this behaviour, making it possible to (at least) store arbitrary data on them. Add a configure o...
0
static int http_RecvPostMessage( /*! HTTP Parser object. */ http_parser_t *parser, /*! [in] Socket Information object. */ SOCKINFO *info, /*! File where received data is copied to. */ char *filename, /*! Send Instruction object which gives information whether the file * is a virtual file or not. */ struct Sen...
73,000,648,000,357,850,000,000,000,000,000,000,000
webserver.c
78,002,763,967,523,660,000,000,000,000,000,000,000
[ "CWE-284" ]
CVE-2016-6255
Portable UPnP SDK (aka libupnp) before 1.6.21 allows remote attackers to write to arbitrary files in the webroot via a POST request without a registered handler.
https://nvd.nist.gov/vuln/detail/CVE-2016-6255
9,535
ImageMagick
bd96074b254c6607a0f7731e59f923ad19d5a46d
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/bd96074b254c6607a0f7731e59f923ad19d5a46d
http://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=26848
1
static Image *ReadSUNImage(const ImageInfo *image_info,ExceptionInfo *exception) { #define RMT_EQUAL_RGB 1 #define RMT_NONE 0 #define RMT_RAW 2 #define RT_STANDARD 1 #define RT_ENCODED 2 #define RT_FORMAT_RGB 3 typedef struct _SUNInfo { unsigned int magic, width, height, depth, ...
223,671,316,596,223,770,000,000,000,000,000,000,000
sun.c
234,907,776,145,379,860,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2015-8957
Buffer overflow in ImageMagick before 6.9.0-4 Beta allows remote attackers to cause a denial of service (application crash) via a crafted SUN file.
https://nvd.nist.gov/vuln/detail/CVE-2015-8957
184,616
ImageMagick
bd96074b254c6607a0f7731e59f923ad19d5a46d
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/bd96074b254c6607a0f7731e59f923ad19d5a46d
http://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=26848
0
static Image *ReadSUNImage(const ImageInfo *image_info,ExceptionInfo *exception) { #define RMT_EQUAL_RGB 1 #define RMT_NONE 0 #define RMT_RAW 2 #define RT_STANDARD 1 #define RT_ENCODED 2 #define RT_FORMAT_RGB 3 typedef struct _SUNInfo { unsigned int magic, width, height, depth, ...
38,171,291,299,912,030,000,000,000,000,000,000,000
sun.c
248,884,041,961,488,160,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2015-8957
Buffer overflow in ImageMagick before 6.9.0-4 Beta allows remote attackers to cause a denial of service (application crash) via a crafted SUN file.
https://nvd.nist.gov/vuln/detail/CVE-2015-8957
9,536
libdwarf
11750a2838e52953013e3114ef27b3c7b1780697
https://github.com/tomhughes/libdwarf
https://github.com/tomhughes/libdwarf/commit/11750a2838e52953013e3114ef27b3c7b1780697
None
1
dwarf_elf_object_access_load_section(void* obj_in, Dwarf_Half section_index, Dwarf_Small** section_data, int* error) { dwarf_elf_object_access_internals_t*obj = (dwarf_elf_object_access_internals_t*)obj_in; if (section_index == 0) { return DW_DLV_NO_ENTRY; } { Elf_...
121,953,510,839,817,200,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2015-8750
libdwarf 20151114 and earlier allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a debug_abbrev section marked NOBITS in an ELF file.
https://nvd.nist.gov/vuln/detail/CVE-2015-8750
184,617
libdwarf
11750a2838e52953013e3114ef27b3c7b1780697
https://github.com/tomhughes/libdwarf
https://github.com/tomhughes/libdwarf/commit/11750a2838e52953013e3114ef27b3c7b1780697
None
0
dwarf_elf_object_access_load_section(void* obj_in, Dwarf_Half section_index, Dwarf_Small** section_data, int* error) { dwarf_elf_object_access_internals_t*obj = (dwarf_elf_object_access_internals_t*)obj_in; if (section_index == 0) { return DW_DLV_NO_ENTRY; } { Elf_...
139,657,656,651,288,720,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2015-8750
libdwarf 20151114 and earlier allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a debug_abbrev section marked NOBITS in an ELF file.
https://nvd.nist.gov/vuln/detail/CVE-2015-8750
9,545
linux
6c4841c2b6c32a134f9f36e5e08857138cc12b10
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6c4841c2b6c32a134f9f36e5e08857138cc12b10
[POWERPC] Never panic when taking altivec exceptions from userspace At the moment we rely on a cpu feature bit or a firmware property to detect altivec. If we dont have either of these and the cpu does in fact support altivec we can cause a panic from userspace. It seems safer to always send a signal if we manage to ...
1
void altivec_unavailable_exception(struct pt_regs *regs) { #if !defined(CONFIG_ALTIVEC) if (user_mode(regs)) { /* A user program has executed an altivec instruction, but this kernel doesn't support altivec. */ _exception(SIGILL, regs, ILL_ILLOPC, regs->nip); return; } #endif printk(KERN_EMERG "Un...
86,528,045,310,394,810,000,000,000,000,000,000,000
traps.c
305,004,121,217,082,200,000,000,000,000,000,000
[ "CWE-19" ]
CVE-2006-5331
The altivec_unavailable_exception function in arch/powerpc/kernel/traps.c in the Linux kernel before 2.6.19 on 64-bit systems mishandles the case where CONFIG_ALTIVEC is defined and the CPU actually supports Altivec, but the Altivec support was not detected by the kernel, which allows local users to cause a denial of s...
https://nvd.nist.gov/vuln/detail/CVE-2006-5331
184,622
linux
6c4841c2b6c32a134f9f36e5e08857138cc12b10
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/6c4841c2b6c32a134f9f36e5e08857138cc12b10
[POWERPC] Never panic when taking altivec exceptions from userspace At the moment we rely on a cpu feature bit or a firmware property to detect altivec. If we dont have either of these and the cpu does in fact support altivec we can cause a panic from userspace. It seems safer to always send a signal if we manage to ...
0
void altivec_unavailable_exception(struct pt_regs *regs) { if (user_mode(regs)) { /* A user program has executed an altivec instruction, but this kernel doesn't support altivec. */ _exception(SIGILL, regs, ILL_ILLOPC, regs->nip); return; } printk(KERN_EMERG "Unrecoverable VMX/Altivec Unavailable...
154,530,722,344,789,890,000,000,000,000,000,000,000
traps.c
33,423,343,401,116,515,000,000,000,000,000,000,000
[ "CWE-19" ]
CVE-2006-5331
The altivec_unavailable_exception function in arch/powerpc/kernel/traps.c in the Linux kernel before 2.6.19 on 64-bit systems mishandles the case where CONFIG_ALTIVEC is defined and the CPU actually supports Altivec, but the Altivec support was not detected by the kernel, which allows local users to cause a denial of s...
https://nvd.nist.gov/vuln/detail/CVE-2006-5331
9,546
linux
4dcc29e1574d88f4465ba865ed82800032f76418
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/4dcc29e1574d88f4465ba865ed82800032f76418
[IA64] Workaround for RSE issue Problem: An application violating the architectural rules regarding operation dependencies and having specific Register Stack Engine (RSE) state at the time of the violation, may result in an illegal operation fault and invalid RSE state. Such faults may initiate a cascade of repeated ...
1
setup_arch (char **cmdline_p) { unw_init(); ia64_patch_vtop((u64) __start___vtop_patchlist, (u64) __end___vtop_patchlist); *cmdline_p = __va(ia64_boot_param->command_line); strlcpy(boot_command_line, *cmdline_p, COMMAND_LINE_SIZE); efi_init(); io_port_init(); #ifdef CONFIG_IA64_GENERIC /* machvec needs to be...
30,744,359,066,288,716,000,000,000,000,000,000,000
setup.c
23,788,835,942,018,467,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2006-3635
The ia64 subsystem in the Linux kernel before 2.6.26 allows local users to cause a denial of service (stack consumption and system crash) via a crafted application that leverages the mishandling of invalid Register Stack Engine (RSE) state.
https://nvd.nist.gov/vuln/detail/CVE-2006-3635
184,623
linux
4dcc29e1574d88f4465ba865ed82800032f76418
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/4dcc29e1574d88f4465ba865ed82800032f76418
[IA64] Workaround for RSE issue Problem: An application violating the architectural rules regarding operation dependencies and having specific Register Stack Engine (RSE) state at the time of the violation, may result in an illegal operation fault and invalid RSE state. Such faults may initiate a cascade of repeated ...
0
setup_arch (char **cmdline_p) { unw_init(); ia64_patch_vtop((u64) __start___vtop_patchlist, (u64) __end___vtop_patchlist); *cmdline_p = __va(ia64_boot_param->command_line); strlcpy(boot_command_line, *cmdline_p, COMMAND_LINE_SIZE); efi_init(); io_port_init(); #ifdef CONFIG_IA64_GENERIC /* machvec needs to be...
300,781,803,370,722,600,000,000,000,000,000,000,000
setup.c
194,369,857,924,233,700,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2006-3635
The ia64 subsystem in the Linux kernel before 2.6.26 allows local users to cause a denial of service (stack consumption and system crash) via a crafted application that leverages the mishandling of invalid Register Stack Engine (RSE) state.
https://nvd.nist.gov/vuln/detail/CVE-2006-3635
9,547
FFmpeg
bab0716c7f4793ec42e05a5aa7e80d82a0dd4e75
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/bab0716c7f4793ec42e05a5aa7e80d82a0dd4e75
avformat/mxfdec: Fix av_log context Fixes: out of array access Fixes: mxf-crash-1c2e59bf07a34675bfb3ada5e1ec22fa9f38f923 Found-by: Paul Ch <paulcher@icloud.com> Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
1
static int mxf_parse_structural_metadata(MXFContext *mxf) { MXFPackage *material_package = NULL; int i, j, k, ret; av_log(mxf->fc, AV_LOG_TRACE, "metadata sets count %d\n", mxf->metadata_sets_count); /* TODO: handle multiple material packages (OP3x) */ for (i = 0; i < mxf->packages_count; i++) { ...
202,689,793,885,959,200,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2018-1999014
FFmpeg before commit bab0716c7f4793ec42e05a5aa7e80d82a0dd4e75 contains an out of array access vulnerability in MXF format demuxer that can result in DoS. This attack appear to be exploitable via specially crafted MXF file which has to be provided as input. This vulnerability appears to have been fixed in bab0716c7f4793...
https://nvd.nist.gov/vuln/detail/CVE-2018-1999014
184,624
FFmpeg
bab0716c7f4793ec42e05a5aa7e80d82a0dd4e75
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/bab0716c7f4793ec42e05a5aa7e80d82a0dd4e75
avformat/mxfdec: Fix av_log context Fixes: out of array access Fixes: mxf-crash-1c2e59bf07a34675bfb3ada5e1ec22fa9f38f923 Found-by: Paul Ch <paulcher@icloud.com> Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
0
static int mxf_parse_structural_metadata(MXFContext *mxf) { MXFPackage *material_package = NULL; int i, j, k, ret; av_log(mxf->fc, AV_LOG_TRACE, "metadata sets count %d\n", mxf->metadata_sets_count); /* TODO: handle multiple material packages (OP3x) */ for (i = 0; i < mxf->packages_count; i++) { ...
135,653,714,441,284,850,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2018-1999014
FFmpeg before commit bab0716c7f4793ec42e05a5aa7e80d82a0dd4e75 contains an out of array access vulnerability in MXF format demuxer that can result in DoS. This attack appear to be exploitable via specially crafted MXF file which has to be provided as input. This vulnerability appears to have been fixed in bab0716c7f4793...
https://nvd.nist.gov/vuln/detail/CVE-2018-1999014
9,548
linux
704620afc70cf47abb9d6a1a57f3825d2bca49cf
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/704620afc70cf47abb9d6a1a57f3825d2bca49cf
USB: check usb_get_extra_descriptor for proper size When reading an extra descriptor, we need to properly check the minimum and maximum size allowed, to prevent from invalid data being sent by a device. Reported-by: Hui Peng <benquike@gmail.com> Reported-by: Mathias Payer <mathias.payer@nebelwelt.net> Co-developed-by...
1
int __usb_get_extra_descriptor(char *buffer, unsigned size, unsigned char type, void **ptr) { struct usb_descriptor_header *header; while (size >= sizeof(struct usb_descriptor_header)) { header = (struct usb_descriptor_header *)buffer; if (header->bLength < 2) { printk(KERN_ERR "%s: bo...
106,931,598,352,293,150,000,000,000,000,000,000,000
None
null
[ "CWE-400" ]
CVE-2018-20169
An issue was discovered in the Linux kernel before 4.19.9. The USB subsystem mishandles size checks during the reading of an extra descriptor, related to __usb_get_extra_descriptor in drivers/usb/core/usb.c.
https://nvd.nist.gov/vuln/detail/CVE-2018-20169
184,625
linux
704620afc70cf47abb9d6a1a57f3825d2bca49cf
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/704620afc70cf47abb9d6a1a57f3825d2bca49cf
USB: check usb_get_extra_descriptor for proper size When reading an extra descriptor, we need to properly check the minimum and maximum size allowed, to prevent from invalid data being sent by a device. Reported-by: Hui Peng <benquike@gmail.com> Reported-by: Mathias Payer <mathias.payer@nebelwelt.net> Co-developed-by...
0
int __usb_get_extra_descriptor(char *buffer, unsigned size, unsigned char type, void **ptr, size_t minsize) { struct usb_descriptor_header *header; while (size >= sizeof(struct usb_descriptor_header)) { header = (struct usb_descriptor_header *)buffer; if (header->bLength < 2 || header->bLength ...
17,078,198,138,476,864,000,000,000,000,000,000,000
None
null
[ "CWE-400" ]
CVE-2018-20169
An issue was discovered in the Linux kernel before 4.19.9. The USB subsystem mishandles size checks during the reading of an extra descriptor, related to __usb_get_extra_descriptor in drivers/usb/core/usb.c.
https://nvd.nist.gov/vuln/detail/CVE-2018-20169
9,553
ImageMagick
76efa969342568841ecf320b5a041685a6d24e0b
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/76efa969342568841ecf320b5a041685a6d24e0b
https://github.com/ImageMagick/ImageMagick/issues/1201
1
static Image *ReadOneJNGImage(MngInfo *mng_info, const ImageInfo *image_info, ExceptionInfo *exception) { Image *alpha_image, *color_image, *image, *jng_image; ImageInfo *alpha_image_info, *color_image_info; MagickBooleanType logging; ssize_t y; MagickBooleanType st...
222,028,886,100,808,540,000,000,000,000,000,000,000
png.c
142,721,393,521,923,200,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2018-16640
ImageMagick 7.0.8-5 has a memory leak vulnerability in the function ReadOneJNGImage in coders/png.c.
https://nvd.nist.gov/vuln/detail/CVE-2018-16640
184,629
ImageMagick
76efa969342568841ecf320b5a041685a6d24e0b
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/76efa969342568841ecf320b5a041685a6d24e0b
https://github.com/ImageMagick/ImageMagick/issues/1201
0
static Image *ReadOneJNGImage(MngInfo *mng_info, const ImageInfo *image_info, ExceptionInfo *exception) { Image *alpha_image, *color_image, *image, *jng_image; ImageInfo *alpha_image_info, *color_image_info; MagickBooleanType logging; ssize_t y; MagickBooleanType st...
83,327,144,052,370,470,000,000,000,000,000,000,000
png.c
166,883,469,564,539,470,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2018-16640
ImageMagick 7.0.8-5 has a memory leak vulnerability in the function ReadOneJNGImage in coders/png.c.
https://nvd.nist.gov/vuln/detail/CVE-2018-16640
9,564
linux
cb2595c1393b4a5211534e6f0a0fbad369e21ad8
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/cb2595c1393b4a5211534e6f0a0fbad369e21ad8
infiniband: fix a possible use-after-free bug ucma_process_join() will free the new allocated "mc" struct, if there is any error after that, especially the copy_to_user(). But in parallel, ucma_leave_multicast() could find this "mc" through idr_find() before ucma_process_join() frees it, since it is already published...
1
static ssize_t ucma_process_join(struct ucma_file *file, struct rdma_ucm_join_mcast *cmd, int out_len) { struct rdma_ucm_create_id_resp resp; struct ucma_context *ctx; struct ucma_multicast *mc; struct sockaddr *addr; int ret; u8 join_state; if (out_len < sizeof(resp)) return -ENOSPC; addr = (struct s...
215,561,590,485,077,280,000,000,000,000,000,000,000
ucma.c
329,077,903,464,487,270,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2018-14734
drivers/infiniband/core/ucma.c in the Linux kernel through 4.17.11 allows ucma_leave_multicast to access a certain data structure after a cleanup step in ucma_process_join, which allows attackers to cause a denial of service (use-after-free).
https://nvd.nist.gov/vuln/detail/CVE-2018-14734
184,638
linux
cb2595c1393b4a5211534e6f0a0fbad369e21ad8
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/cb2595c1393b4a5211534e6f0a0fbad369e21ad8
infiniband: fix a possible use-after-free bug ucma_process_join() will free the new allocated "mc" struct, if there is any error after that, especially the copy_to_user(). But in parallel, ucma_leave_multicast() could find this "mc" through idr_find() before ucma_process_join() frees it, since it is already published...
0
static ssize_t ucma_process_join(struct ucma_file *file, struct rdma_ucm_join_mcast *cmd, int out_len) { struct rdma_ucm_create_id_resp resp; struct ucma_context *ctx; struct ucma_multicast *mc; struct sockaddr *addr; int ret; u8 join_state; if (out_len < sizeof(resp)) return -ENOSPC; addr = (struct s...
322,726,665,261,420,380,000,000,000,000,000,000,000
ucma.c
201,536,275,764,309,540,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2018-14734
drivers/infiniband/core/ucma.c in the Linux kernel through 4.17.11 allows ucma_leave_multicast to access a certain data structure after a cleanup step in ucma_process_join, which allows attackers to cause a denial of service (use-after-free).
https://nvd.nist.gov/vuln/detail/CVE-2018-14734
9,566
neomutt
9e927affe3a021175f354af5fa01d22657c20585
https://github.com/neomutt/neomutt
https://github.com/neomutt/neomutt/commit/9e927affe3a021175f354af5fa01d22657c20585
Add alloc fail check in nntp_fetch_headers
1
static int nntp_fetch_headers(struct Context *ctx, void *hc, anum_t first, anum_t last, int restore) { struct NntpData *nntp_data = ctx->data; struct FetchCtx fc; struct Header *hdr = NULL; char buf[HUGE_STRING]; int rc = 0; int oldmsgcount = ctx->msgcount; anum_t current; ...
63,790,838,672,285,430,000,000,000,000,000,000,000
nntp.c
78,438,500,915,793,575,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2018-14361
An issue was discovered in NeoMutt before 2018-07-16. nntp.c proceeds even if memory allocation fails for messages data.
https://nvd.nist.gov/vuln/detail/CVE-2018-14361
184,639
neomutt
9e927affe3a021175f354af5fa01d22657c20585
https://github.com/neomutt/neomutt
https://github.com/neomutt/neomutt/commit/9e927affe3a021175f354af5fa01d22657c20585
Add alloc fail check in nntp_fetch_headers
0
static int nntp_fetch_headers(struct Context *ctx, void *hc, anum_t first, anum_t last, int restore) { struct NntpData *nntp_data = ctx->data; struct FetchCtx fc; struct Header *hdr = NULL; char buf[HUGE_STRING]; int rc = 0; int oldmsgcount = ctx->msgcount; anum_t current; ...
115,049,996,555,630,300,000,000,000,000,000,000,000
nntp.c
194,967,636,491,301,620,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2018-14361
An issue was discovered in NeoMutt before 2018-07-16. nntp.c proceeds even if memory allocation fails for messages data.
https://nvd.nist.gov/vuln/detail/CVE-2018-14361
9,570
linux
f7068114d45ec55996b9040e98111afa56e010fe
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/f7068114d45ec55996b9040e98111afa56e010fe
sr: pass down correctly sized SCSI sense buffer We're casting the CDROM layer request_sense to the SCSI sense buffer, but the former is 64 bytes and the latter is 96 bytes. As we generally allocate these on the stack, we end up blowing up the stack. Fix this by wrapping the scsi_execute() call with a properly sized s...
1
int sr_do_ioctl(Scsi_CD *cd, struct packet_command *cgc) { struct scsi_device *SDev; struct scsi_sense_hdr sshdr; int result, err = 0, retries = 0; SDev = cd->device; retry: if (!scsi_block_when_processing_errors(SDev)) { err = -ENODEV; goto out; } result = scsi_execute(SDev, cgc->cmd, ...
19,624,638,673,498,000,000,000,000,000,000,000,000
sr_ioctl.c
119,618,448,393,103,850,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-11506
The sr_do_ioctl function in drivers/scsi/sr_ioctl.c in the Linux kernel through 4.16.12 allows local users to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact because sense buffers have different sizes at the CDROM layer and the SCSI layer, as demonstrated by a CDROMREAD...
https://nvd.nist.gov/vuln/detail/CVE-2018-11506
184,645
linux
f7068114d45ec55996b9040e98111afa56e010fe
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/f7068114d45ec55996b9040e98111afa56e010fe
sr: pass down correctly sized SCSI sense buffer We're casting the CDROM layer request_sense to the SCSI sense buffer, but the former is 64 bytes and the latter is 96 bytes. As we generally allocate these on the stack, we end up blowing up the stack. Fix this by wrapping the scsi_execute() call with a properly sized s...
0
int sr_do_ioctl(Scsi_CD *cd, struct packet_command *cgc) { struct scsi_device *SDev; struct scsi_sense_hdr sshdr; int result, err = 0, retries = 0; unsigned char sense_buffer[SCSI_SENSE_BUFFERSIZE], *senseptr = NULL; SDev = cd->device; if (cgc->sense) senseptr = sense_buffer; retry: if (!scsi_...
46,843,887,070,495,610,000,000,000,000,000,000,000
sr_ioctl.c
104,410,678,755,399,140,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-11506
The sr_do_ioctl function in drivers/scsi/sr_ioctl.c in the Linux kernel through 4.16.12 allows local users to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact because sense buffers have different sizes at the CDROM layer and the SCSI layer, as demonstrated by a CDROMREAD...
https://nvd.nist.gov/vuln/detail/CVE-2018-11506
9,577
libgit2
58a6fe94cb851f71214dbefac3f9bffee437d6fe
https://github.com/libgit2/libgit2
https://github.com/libgit2/libgit2/commit/58a6fe94cb851f71214dbefac3f9bffee437d6fe
index: convert `read_entry` to return entry size via an out-param The function `read_entry` does not conform to our usual coding style of returning stuff via the out parameter and to use the return value for reporting errors. Due to most of our code conforming to that pattern, it has become quite natural for us to act...
1
static size_t read_entry( git_index_entry **out, git_index *index, const void *buffer, size_t buffer_size, const char *last) { size_t path_length, entry_size; const char *path_ptr; struct entry_short source; git_index_entry entry = {{0}}; bool compressed = index->version >= INDEX_VERSION_NUMBER_COMP; ch...
109,487,150,090,997,030,000,000,000,000,000,000,000
index.c
162,215,619,332,483,000,000,000,000,000,000,000,000
[ "CWE-415" ]
CVE-2018-8099
Incorrect returning of an error code in the index.c:read_entry() function leads to a double free in libgit2 before v0.26.2, which allows an attacker to cause a denial of service via a crafted repository index file.
https://nvd.nist.gov/vuln/detail/CVE-2018-8099
184,652
libgit2
58a6fe94cb851f71214dbefac3f9bffee437d6fe
https://github.com/libgit2/libgit2
https://github.com/libgit2/libgit2/commit/58a6fe94cb851f71214dbefac3f9bffee437d6fe
index: convert `read_entry` to return entry size via an out-param The function `read_entry` does not conform to our usual coding style of returning stuff via the out parameter and to use the return value for reporting errors. Due to most of our code conforming to that pattern, it has become quite natural for us to act...
0
static size_t read_entry( static int read_entry( git_index_entry **out, size_t *out_size, git_index *index, const void *buffer, size_t buffer_size, const char *last) { size_t path_length, entry_size; const char *path_ptr; struct entry_short source; git_index_entry entry = {{0}}; bool compressed = index->...
116,430,469,860,629,450,000,000,000,000,000,000,000
None
null
[ "CWE-415" ]
CVE-2018-8099
Incorrect returning of an error code in the index.c:read_entry() function leads to a double free in libgit2 before v0.26.2, which allows an attacker to cause a denial of service via a crafted repository index file.
https://nvd.nist.gov/vuln/detail/CVE-2018-8099
9,581
linux
250c6c49e3b68756b14983c076183568636e2bde
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/250c6c49e3b68756b14983c076183568636e2bde
fbdev: Fixing arbitrary kernel leak in case FBIOGETCMAP_SPARC in sbusfb_ioctl_helper(). Fixing arbitrary kernel leak in case FBIOGETCMAP_SPARC in sbusfb_ioctl_helper(). 'index' is defined as an int in sbusfb_ioctl_helper(). We retrieve this from the user: if (get_user(index, &c->index) || __get_user(count, &c->co...
1
int sbusfb_ioctl_helper(unsigned long cmd, unsigned long arg, struct fb_info *info, int type, int fb_depth, unsigned long fb_size) { switch(cmd) { case FBIOGTYPE: { struct fbtype __user *f = (struct fbtype __user *) arg; if (put_user(type, &f->fb_type) || __put_user(info->var.yres, &f->fb_height) || ...
140,708,769,976,939,500,000,000,000,000,000,000,000
sbuslib.c
169,305,828,568,889,900,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2018-6412
In the function sbusfb_ioctl_helper() in drivers/video/fbdev/sbuslib.c in the Linux kernel through 4.15, an integer signedness error allows arbitrary information leakage for the FBIOPUTCMAP_SPARC and FBIOGETCMAP_SPARC commands.
https://nvd.nist.gov/vuln/detail/CVE-2018-6412
184,656
linux
250c6c49e3b68756b14983c076183568636e2bde
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/250c6c49e3b68756b14983c076183568636e2bde
fbdev: Fixing arbitrary kernel leak in case FBIOGETCMAP_SPARC in sbusfb_ioctl_helper(). Fixing arbitrary kernel leak in case FBIOGETCMAP_SPARC in sbusfb_ioctl_helper(). 'index' is defined as an int in sbusfb_ioctl_helper(). We retrieve this from the user: if (get_user(index, &c->index) || __get_user(count, &c->co...
0
int sbusfb_ioctl_helper(unsigned long cmd, unsigned long arg, struct fb_info *info, int type, int fb_depth, unsigned long fb_size) { switch(cmd) { case FBIOGTYPE: { struct fbtype __user *f = (struct fbtype __user *) arg; if (put_user(type, &f->fb_type) || __put_user(info->var.yres, &f->fb_height) || ...
51,336,586,153,410,510,000,000,000,000,000,000,000
sbuslib.c
45,729,126,392,189,520,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2018-6412
In the function sbusfb_ioctl_helper() in drivers/video/fbdev/sbuslib.c in the Linux kernel through 4.15, an integer signedness error allows arbitrary information leakage for the FBIOPUTCMAP_SPARC and FBIOGETCMAP_SPARC commands.
https://nvd.nist.gov/vuln/detail/CVE-2018-6412
9,582
linux
7d11f77f84b27cef452cee332f4e469503084737
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/7d11f77f84b27cef452cee332f4e469503084737
RDS: null pointer dereference in rds_atomic_free_op set rm->atomic.op_active to 0 when rds_pin_pages() fails or the user supplied address is invalid, this prevents a NULL pointer usage in rds_atomic_free_op() Signed-off-by: Mohamed Ghannam <simo.ghannam@gmail.com> Acked-by: Santosh Shilimkar <santosh.shilimkar@oracle...
1
int rds_cmsg_atomic(struct rds_sock *rs, struct rds_message *rm, struct cmsghdr *cmsg) { struct page *page = NULL; struct rds_atomic_args *args; int ret = 0; if (cmsg->cmsg_len < CMSG_LEN(sizeof(struct rds_atomic_args)) || rm->atomic.op_active) return -EINVAL; args = CMSG_DATA(cmsg); /* Nonmasked & m...
53,707,930,125,692,390,000,000,000,000,000,000,000
rdma.c
236,152,132,911,027,400,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2018-5333
In the Linux kernel through 4.14.13, the rds_cmsg_atomic function in net/rds/rdma.c mishandles cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference.
https://nvd.nist.gov/vuln/detail/CVE-2018-5333
184,657
linux
7d11f77f84b27cef452cee332f4e469503084737
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/7d11f77f84b27cef452cee332f4e469503084737
RDS: null pointer dereference in rds_atomic_free_op set rm->atomic.op_active to 0 when rds_pin_pages() fails or the user supplied address is invalid, this prevents a NULL pointer usage in rds_atomic_free_op() Signed-off-by: Mohamed Ghannam <simo.ghannam@gmail.com> Acked-by: Santosh Shilimkar <santosh.shilimkar@oracle...
0
int rds_cmsg_atomic(struct rds_sock *rs, struct rds_message *rm, struct cmsghdr *cmsg) { struct page *page = NULL; struct rds_atomic_args *args; int ret = 0; if (cmsg->cmsg_len < CMSG_LEN(sizeof(struct rds_atomic_args)) || rm->atomic.op_active) return -EINVAL; args = CMSG_DATA(cmsg); /* Nonmasked & m...
285,791,403,384,478,530,000,000,000,000,000,000,000
rdma.c
245,834,273,113,460,700,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2018-5333
In the Linux kernel through 4.14.13, the rds_cmsg_atomic function in net/rds/rdma.c mishandles cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference.
https://nvd.nist.gov/vuln/detail/CVE-2018-5333
9,591
linux
687cb0884a714ff484d038e9190edc874edcf146
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/687cb0884a714ff484d038e9190edc874edcf146
mm, oom_reaper: gather each vma to prevent leaking TLB entry tlb_gather_mmu(&tlb, mm, 0, -1) means gathering the whole virtual memory space. In this case, tlb->fullmm is true. Some archs like arm64 doesn't flush TLB when tlb->fullmm is true: commit 5a7862e83000 ("arm64: tlbflush: avoid flushing when fullmm == 1")...
1
static bool __oom_reap_task_mm(struct task_struct *tsk, struct mm_struct *mm) { struct mmu_gather tlb; struct vm_area_struct *vma; bool ret = true; /* * We have to make sure to not race with the victim exit path * and cause premature new oom victim selection: * __oom_reap_task_mm exit_mm * mmget_not_zer...
210,432,325,877,869,770,000,000,000,000,000,000,000
oom_kill.c
34,517,807,293,828,100,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2017-18202
The __oom_reap_task_mm function in mm/oom_kill.c in the Linux kernel before 4.14.4 mishandles gather operations, which allows attackers to cause a denial of service (TLB entry leak or use-after-free) or possibly have unspecified other impact by triggering a copy_to_user call within a certain time window.
https://nvd.nist.gov/vuln/detail/CVE-2017-18202
184,664
linux
687cb0884a714ff484d038e9190edc874edcf146
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/687cb0884a714ff484d038e9190edc874edcf146
mm, oom_reaper: gather each vma to prevent leaking TLB entry tlb_gather_mmu(&tlb, mm, 0, -1) means gathering the whole virtual memory space. In this case, tlb->fullmm is true. Some archs like arm64 doesn't flush TLB when tlb->fullmm is true: commit 5a7862e83000 ("arm64: tlbflush: avoid flushing when fullmm == 1")...
0
static bool __oom_reap_task_mm(struct task_struct *tsk, struct mm_struct *mm) { struct mmu_gather tlb; struct vm_area_struct *vma; bool ret = true; /* * We have to make sure to not race with the victim exit path * and cause premature new oom victim selection: * __oom_reap_task_mm exit_mm * mmget_not_zer...
262,956,396,515,299,320,000,000,000,000,000,000,000
oom_kill.c
76,761,435,979,865,940,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2017-18202
The __oom_reap_task_mm function in mm/oom_kill.c in the Linux kernel before 4.14.4 mishandles gather operations, which allows attackers to cause a denial of service (TLB entry leak or use-after-free) or possibly have unspecified other impact by triggering a copy_to_user call within a certain time window.
https://nvd.nist.gov/vuln/detail/CVE-2017-18202
9,592
jasper
aa0b0f79ade5eef8b0e7a214c03f5af54b36ba7d
https://github.com/mdadams/jasper
https://github.com/mdadams/jasper/commit/aa0b0f79ade5eef8b0e7a214c03f5af54b36ba7d
Fixed numerous integer overflow problems in the code for packet iterators in the JPC decoder.
1
static int jpc_pi_nextpcrl(register jpc_pi_t *pi) { int rlvlno; jpc_pirlvl_t *pirlvl; jpc_pchg_t *pchg; int prchind; int prcvind; int *prclyrno; int compno; jpc_picomp_t *picomp; int xstep; int ystep; uint_fast32_t trx0; uint_fast32_t try0; uint_fast32_t r; uint_fast32_t rpx; uint_fast32_t rpy; pchg = ...
143,438,351,204,945,960,000,000,000,000,000,000,000
jpc_t2cod.c
159,588,622,480,218,420,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2016-9583
An out-of-bounds heap read vulnerability was found in the jpc_pi_nextpcrl() function of jasper before 2.0.6 when processing crafted input.
https://nvd.nist.gov/vuln/detail/CVE-2016-9583
184,665
jasper
aa0b0f79ade5eef8b0e7a214c03f5af54b36ba7d
https://github.com/mdadams/jasper
https://github.com/mdadams/jasper/commit/aa0b0f79ade5eef8b0e7a214c03f5af54b36ba7d
Fixed numerous integer overflow problems in the code for packet iterators in the JPC decoder.
0
static int jpc_pi_nextpcrl(register jpc_pi_t *pi) { int rlvlno; jpc_pirlvl_t *pirlvl; jpc_pchg_t *pchg; int prchind; int prcvind; int *prclyrno; int compno; jpc_picomp_t *picomp; int xstep; int ystep; uint_fast32_t trx0; uint_fast32_t try0; uint_fast32_t r; uint_fast32_t rpx; uint_fast32_t rpy; pchg = ...
141,712,621,339,828,340,000,000,000,000,000,000,000
jpc_t2cod.c
308,812,337,262,584,700,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2016-9583
An out-of-bounds heap read vulnerability was found in the jpc_pi_nextpcrl() function of jasper before 2.0.6 when processing crafted input.
https://nvd.nist.gov/vuln/detail/CVE-2016-9583
9,595
suricata
d8634daf74c882356659addb65fb142b738a186b
https://github.com/OISF/suricata
https://github.com/OISF/suricata/commit/d8634daf74c882356659addb65fb142b738a186b
stream: fix false negative on bad RST If a bad RST was received the stream inspection would not happen for that packet, but it would still move the 'raw progress' tracker forward. Following good packets would then fail to detect anything before the 'raw progress' position. Bug #2770 Reported-by: Alexey Vishnyakov
1
static void DetectRunCleanup(DetectEngineThreadCtx *det_ctx, Packet *p, Flow * const pflow) { PACKET_PROFILING_DETECT_START(p, PROF_DETECT_CLEANUP); /* cleanup pkt specific part of the patternmatcher */ PacketPatternCleanup(det_ctx); if (pflow != NULL) { /* update inspected tracker f...
199,138,939,076,611,400,000,000,000,000,000,000,000
detect.c
146,865,518,338,528,100,000,000,000,000,000,000,000
[ "CWE-347" ]
CVE-2019-1010279
Open Information Security Foundation Suricata prior to version 4.1.3 is affected by: Denial of Service - TCP/HTTP detection bypass. The impact is: An attacker can evade a signature detection with a specialy formed sequence of network packets. The component is: detect.c (https://github.com/OISF/suricata/pull/3625/commit...
https://nvd.nist.gov/vuln/detail/CVE-2019-1010279
184,667
suricata
d8634daf74c882356659addb65fb142b738a186b
https://github.com/OISF/suricata
https://github.com/OISF/suricata/commit/d8634daf74c882356659addb65fb142b738a186b
stream: fix false negative on bad RST If a bad RST was received the stream inspection would not happen for that packet, but it would still move the 'raw progress' tracker forward. Following good packets would then fail to detect anything before the 'raw progress' position. Bug #2770 Reported-by: Alexey Vishnyakov
0
static void DetectRunCleanup(DetectEngineThreadCtx *det_ctx, Packet *p, Flow * const pflow) { PACKET_PROFILING_DETECT_START(p, PROF_DETECT_CLEANUP); /* cleanup pkt specific part of the patternmatcher */ PacketPatternCleanup(det_ctx); if (pflow != NULL) { /* update inspected tracker f...
264,828,872,860,133,660,000,000,000,000,000,000,000
detect.c
322,747,998,482,219,100,000,000,000,000,000,000,000
[ "CWE-347" ]
CVE-2019-1010279
Open Information Security Foundation Suricata prior to version 4.1.3 is affected by: Denial of Service - TCP/HTTP detection bypass. The impact is: An attacker can evade a signature detection with a specialy formed sequence of network packets. The component is: detect.c (https://github.com/OISF/suricata/pull/3625/commit...
https://nvd.nist.gov/vuln/detail/CVE-2019-1010279
9,596
libvips
ce684dd008532ea0bf9d4a1d89bacb35f4a83f4d
https://github.com/libvips/libvips
https://github.com/libvips/libvips/commit/ce684dd008532ea0bf9d4a1d89bacb35f4a83f4d
fetch map after DGifGetImageDesc() Earlier refactoring broke GIF map fetch.
1
vips_foreign_load_gif_scan_image( VipsForeignLoadGif *gif ) { VipsObjectClass *class = VIPS_OBJECT_GET_CLASS( gif ); GifFileType *file = gif->file; ColorMapObject *map = file->Image.ColorMap ? file->Image.ColorMap : file->SColorMap; GifByteType *extension; if( DGifGetImageDesc( gif->file ) == GIF_ERROR...
85,832,030,463,082,010,000,000,000,000,000,000,000
gifload.c
169,810,479,207,440,950,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2019-17534
vips_foreign_load_gif_scan_image in foreign/gifload.c in libvips before 8.8.2 tries to access a color map before a DGifGetImageDesc call, leading to a use-after-free.
https://nvd.nist.gov/vuln/detail/CVE-2019-17534
184,669
libvips
ce684dd008532ea0bf9d4a1d89bacb35f4a83f4d
https://github.com/libvips/libvips
https://github.com/libvips/libvips/commit/ce684dd008532ea0bf9d4a1d89bacb35f4a83f4d
fetch map after DGifGetImageDesc() Earlier refactoring broke GIF map fetch.
0
vips_foreign_load_gif_scan_image( VipsForeignLoadGif *gif ) { VipsObjectClass *class = VIPS_OBJECT_GET_CLASS( gif ); GifFileType *file = gif->file; ColorMapObject *map; GifByteType *extension; if( DGifGetImageDesc( gif->file ) == GIF_ERROR ) { vips_foreign_load_gif_error( gif ); return( -1 ); } /...
101,080,913,960,963,160,000,000,000,000,000,000,000
gifload.c
312,966,949,570,964,200,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2019-17534
vips_foreign_load_gif_scan_image in foreign/gifload.c in libvips before 8.8.2 tries to access a color map before a DGifGetImageDesc call, leading to a use-after-free.
https://nvd.nist.gov/vuln/detail/CVE-2019-17534
9,597
matio
651a8e28099edb5fbb9e4e1d4d3238848f446c9a
https://github.com/tbeu/matio
https://github.com/tbeu/matio/commit/651a8e28099edb5fbb9e4e1d4d3238848f446c9a
Avoid uninitialized memory As reported by https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16856
1
Mat_VarReadNextInfo4(mat_t *mat) { int M,O,data_type,class_type; mat_int32_t tmp; long nBytes; size_t readresult; matvar_t *matvar = NULL; union { mat_uint32_t u; mat_uint8_t c[4]; } endian; if ( mat == NULL || mat->fp == NULL ) return NULL; el...
283,675,808,883,276,520,000,000,000,000,000,000,000
mat4.c
297,796,931,425,830,640,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2019-17533
Mat_VarReadNextInfo4 in mat4.c in MATIO 1.5.17 omits a certain '\0' character, leading to a heap-based buffer over-read in strdup_vprintf when uninitialized memory is accessed.
https://nvd.nist.gov/vuln/detail/CVE-2019-17533
184,670
matio
651a8e28099edb5fbb9e4e1d4d3238848f446c9a
https://github.com/tbeu/matio
https://github.com/tbeu/matio/commit/651a8e28099edb5fbb9e4e1d4d3238848f446c9a
Avoid uninitialized memory As reported by https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16856
0
Mat_VarReadNextInfo4(mat_t *mat) { int M,O,data_type,class_type; mat_int32_t tmp; long nBytes; size_t readresult; matvar_t *matvar = NULL; union { mat_uint32_t u; mat_uint8_t c[4]; } endian; if ( mat == NULL || mat->fp == NULL ) return NULL; el...
139,703,846,613,261,640,000,000,000,000,000,000,000
mat4.c
249,820,899,233,110,900,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2019-17533
Mat_VarReadNextInfo4 in mat4.c in MATIO 1.5.17 omits a certain '\0' character, leading to a heap-based buffer over-read in strdup_vprintf when uninitialized memory is accessed.
https://nvd.nist.gov/vuln/detail/CVE-2019-17533
9,600
OpenSC
a3fc7693f3a035a8a7921cffb98432944bb42740
https://github.com/OpenSC/OpenSC
https://github.com/OpenSC/OpenSC/commit/a3fc7693f3a035a8a7921cffb98432944bb42740
Fixed out of bounds access in ASN.1 Octet string Credit to OSS-Fuzz
1
static int asn1_decode_entry(sc_context_t *ctx,struct sc_asn1_entry *entry, const u8 *obj, size_t objlen, int depth) { void *parm = entry->parm; int (*callback_func)(sc_context_t *nctx, void *arg, const u8 *nobj, size_t nobjlen, int ndepth); size_t *len = (size_t *) entry->arg; int r = 0; callback...
69,488,774,016,521,850,000,000,000,000,000,000,000
asn1.c
327,585,171,356,570,960,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2019-15946
OpenSC before 0.20.0-rc1 has an out-of-bounds access of an ASN.1 Octet string in asn1_decode_entry in libopensc/asn1.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-15946
184,673
OpenSC
a3fc7693f3a035a8a7921cffb98432944bb42740
https://github.com/OpenSC/OpenSC
https://github.com/OpenSC/OpenSC/commit/a3fc7693f3a035a8a7921cffb98432944bb42740
Fixed out of bounds access in ASN.1 Octet string Credit to OSS-Fuzz
0
static int asn1_decode_entry(sc_context_t *ctx,struct sc_asn1_entry *entry, const u8 *obj, size_t objlen, int depth) { void *parm = entry->parm; int (*callback_func)(sc_context_t *nctx, void *arg, const u8 *nobj, size_t nobjlen, int ndepth); size_t *len = (size_t *) entry->arg; int r = 0; callback...
202,564,784,172,260,040,000,000,000,000,000,000,000
asn1.c
20,036,034,663,220,034,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2019-15946
OpenSC before 0.20.0-rc1 has an out-of-bounds access of an ASN.1 Octet string in asn1_decode_entry in libopensc/asn1.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-15946
9,609
ImageMagick6
91e58d967a92250439ede038ccfb0913a81e59fe
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/91e58d967a92250439ede038ccfb0913a81e59fe
https://github.com/ImageMagick/ImageMagick/issues/1615
1
static MagickPixelPacket **AcquirePixelThreadSet(const Image *images) { const Image *next; MagickPixelPacket **pixels; register ssize_t i, j; size_t columns, number_threads; number_threads=(size_t) GetMagickResourceLimit(ThreadResource); pixels=(MagickPixelPacket **) AcquireQ...
240,210,483,832,148,400,000,000,000,000,000,000,000
statistic.c
62,577,200,016,171,590,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2019-13307
ImageMagick 7.0.8-50 Q16 has a heap-based buffer overflow at MagickCore/statistic.c in EvaluateImages because of mishandling rows.
https://nvd.nist.gov/vuln/detail/CVE-2019-13307
184,681
ImageMagick6
91e58d967a92250439ede038ccfb0913a81e59fe
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/91e58d967a92250439ede038ccfb0913a81e59fe
https://github.com/ImageMagick/ImageMagick/issues/1615
0
static MagickPixelPacket **AcquirePixelThreadSet(const Image *images) { const Image *next; MagickPixelPacket **pixels; register ssize_t i, j; size_t columns, rows; rows=MagickMax(GetImageListLength(images), (size_t) GetMagickResourceLimit(ThreadResource)); pixels=(MagickP...
131,386,159,077,571,550,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2019-13307
ImageMagick 7.0.8-50 Q16 has a heap-based buffer overflow at MagickCore/statistic.c in EvaluateImages because of mishandling rows.
https://nvd.nist.gov/vuln/detail/CVE-2019-13307
9,611
ImageMagick
fe5f4b85e6b1b54d3b4588a77133c06ade46d891
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/fe5f4b85e6b1b54d3b4588a77133c06ade46d891
https://github.com/ImageMagick/ImageMagick/issues/1602
1
static MagickOffsetType TIFFSeekCustomStream(const MagickOffsetType offset, const int whence,void *user_data) { PhotoshopProfile *profile; profile=(PhotoshopProfile *) user_data; switch (whence) { case SEEK_SET: default: { if (offset < 0) return(-1); profile->offset=offset...
41,710,944,332,559,617,000,000,000,000,000,000,000
tiff.c
316,057,833,404,137,560,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2019-13136
ImageMagick before 7.0.8-50 has an integer overflow vulnerability in the function TIFFSeekCustomStream in coders/tiff.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-13136
184,683
ImageMagick
fe5f4b85e6b1b54d3b4588a77133c06ade46d891
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/fe5f4b85e6b1b54d3b4588a77133c06ade46d891
https://github.com/ImageMagick/ImageMagick/issues/1602
0
static MagickOffsetType TIFFSeekCustomStream(const MagickOffsetType offset, const int whence,void *user_data) { PhotoshopProfile *profile; profile=(PhotoshopProfile *) user_data; switch (whence) { case SEEK_SET: default: { if (offset < 0) return(-1); profile->offset=offset...
120,785,237,617,281,760,000,000,000,000,000,000,000
tiff.c
44,253,922,806,073,120,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2019-13136
ImageMagick before 7.0.8-50 has an integer overflow vulnerability in the function TIFFSeekCustomStream in coders/tiff.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-13136
9,613
linux
385097a3675749cbc9e97c085c0e5dfe4269ca51
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/385097a3675749cbc9e97c085c0e5dfe4269ca51
nfc: Ensure presence of required attributes in the deactivate_target handler Check that the NFC_ATTR_TARGET_INDEX attributes (in addition to NFC_ATTR_DEVICE_INDEX) are provided by the netlink client prior to accessing them. This prevents potential unhandled NULL pointer dereference exceptions which can be triggered by...
1
static int nfc_genl_deactivate_target(struct sk_buff *skb, struct genl_info *info) { struct nfc_dev *dev; u32 device_idx, target_idx; int rc; if (!info->attrs[NFC_ATTR_DEVICE_INDEX]) return -EINVAL; device_idx = nla_get_u32(info->attrs[NFC_ATTR_DEVICE_INDEX]); dev = nfc_get_device(device_idx)...
321,500,771,127,873,160,000,000,000,000,000,000,000
netlink.c
108,702,105,730,330,880,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2019-12984
A NULL pointer dereference vulnerability in the function nfc_genl_deactivate_target() in net/nfc/netlink.c in the Linux kernel before 5.1.13 can be triggered by a malicious user-mode program that omits certain NFC attributes, leading to denial of service.
https://nvd.nist.gov/vuln/detail/CVE-2019-12984
184,685
linux
385097a3675749cbc9e97c085c0e5dfe4269ca51
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/385097a3675749cbc9e97c085c0e5dfe4269ca51
nfc: Ensure presence of required attributes in the deactivate_target handler Check that the NFC_ATTR_TARGET_INDEX attributes (in addition to NFC_ATTR_DEVICE_INDEX) are provided by the netlink client prior to accessing them. This prevents potential unhandled NULL pointer dereference exceptions which can be triggered by...
0
static int nfc_genl_deactivate_target(struct sk_buff *skb, struct genl_info *info) { struct nfc_dev *dev; u32 device_idx, target_idx; int rc; if (!info->attrs[NFC_ATTR_DEVICE_INDEX] || !info->attrs[NFC_ATTR_TARGET_INDEX]) return -EINVAL; device_idx = nla_get_u32(info->attrs[NFC_ATTR_DEVICE...
272,292,785,777,929,500,000,000,000,000,000,000,000
netlink.c
291,373,697,328,931,870,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2019-12984
A NULL pointer dereference vulnerability in the function nfc_genl_deactivate_target() in net/nfc/netlink.c in the Linux kernel before 5.1.13 can be triggered by a malicious user-mode program that omits certain NFC attributes, leading to denial of service.
https://nvd.nist.gov/vuln/detail/CVE-2019-12984
9,614
miniupnp
bec6ccec63cadc95655721bc0e1dd49dac759d94
https://github.com/miniupnp/miniupnp
https://github.com/miniupnp/miniupnp/commit/bec6ccec63cadc95655721bc0e1dd49dac759d94
upnp_event_prepare(): check the return value of snprintf()
1
static void upnp_event_prepare(struct upnp_event_notify * obj) { static const char notifymsg[] = "NOTIFY %s HTTP/1.1\r\n" "Host: %s%s\r\n" #if (UPNP_VERSION_MAJOR == 1) && (UPNP_VERSION_MINOR == 0) "Content-Type: text/xml\r\n" /* UDA v1.0 */ #else "Content-Type: text/xml; charset=\"utf-8\"\r\n" /* UDA v1.1 or ...
254,184,219,963,562,300,000,000,000,000,000,000,000
upnpevents.c
22,282,999,164,038,923,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2019-12107
The upnp_event_prepare function in upnpevents.c in MiniUPnP MiniUPnPd through 2.1 allows a remote attacker to leak information from the heap due to improper validation of an snprintf return value.
https://nvd.nist.gov/vuln/detail/CVE-2019-12107
184,686
miniupnp
bec6ccec63cadc95655721bc0e1dd49dac759d94
https://github.com/miniupnp/miniupnp
https://github.com/miniupnp/miniupnp/commit/bec6ccec63cadc95655721bc0e1dd49dac759d94
upnp_event_prepare(): check the return value of snprintf()
0
static void upnp_event_prepare(struct upnp_event_notify * obj) { static const char notifymsg[] = "NOTIFY %s HTTP/1.1\r\n" "Host: %s%s\r\n" #if (UPNP_VERSION_MAJOR == 1) && (UPNP_VERSION_MINOR == 0) "Content-Type: text/xml\r\n" /* UDA v1.0 */ #else "Content-Type: text/xml; charset=\"utf-8\"\r\n" /* UDA v1.1 or ...
308,950,518,598,306,800,000,000,000,000,000,000,000
upnpevents.c
233,628,126,169,902,930,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2019-12107
The upnp_event_prepare function in upnpevents.c in MiniUPnP MiniUPnPd through 2.1 allows a remote attacker to leak information from the heap due to improper validation of an snprintf return value.
https://nvd.nist.gov/vuln/detail/CVE-2019-12107
9,619
lighttpd1.4
32120d5b8b3203fc21ccb9eafb0eaf824bb59354
https://github.com/lighttpd/lighttpd1.4
https://github.com/lighttpd/lighttpd1.4/commit/32120d5b8b3203fc21ccb9eafb0eaf824bb59354
[core] fix abort in http-parseopts (fixes #2945) fix abort in server.http-parseopts with url-path-2f-decode enabled (thx stze) x-ref: "Security - SIGABRT during GET request handling with url-path-2f-decode enabled" https://redmine.lighttpd.net/issues/2945
1
static int burl_normalize_2F_to_slash_fix (buffer *b, int qs, int i) { char * const s = b->ptr; const int blen = (int)buffer_string_length(b); const int used = qs < 0 ? blen : qs; int j = i; for (; i < used; ++i, ++j) { s[j] = s[i]; if (s[i] == '%' && s[i+1] == '2' && s[i+2] == 'F') ...
124,662,619,963,424,430,000,000,000,000,000,000,000
burl.c
192,492,788,285,266,940,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2019-11072
lighttpd before 1.4.54 has a signed integer overflow, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a malicious HTTP GET request, as demonstrated by mishandling of /%2F? in burl_normalize_2F_to_slash_fix in burl.c. NOTE: The developer s...
https://nvd.nist.gov/vuln/detail/CVE-2019-11072
184,691
lighttpd1.4
32120d5b8b3203fc21ccb9eafb0eaf824bb59354
https://github.com/lighttpd/lighttpd1.4
https://github.com/lighttpd/lighttpd1.4/commit/32120d5b8b3203fc21ccb9eafb0eaf824bb59354
[core] fix abort in http-parseopts (fixes #2945) fix abort in server.http-parseopts with url-path-2f-decode enabled (thx stze) x-ref: "Security - SIGABRT during GET request handling with url-path-2f-decode enabled" https://redmine.lighttpd.net/issues/2945
0
static int burl_normalize_2F_to_slash_fix (buffer *b, int qs, int i) { char * const s = b->ptr; const int blen = (int)buffer_string_length(b); const int used = qs < 0 ? blen : qs; int j = i; for (; i < used; ++i, ++j) { s[j] = s[i]; if (s[i] == '%' && s[i+1] == '2' && s[i+2] == 'F') ...
326,141,762,342,458,520,000,000,000,000,000,000,000
burl.c
29,268,463,068,782,594,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2019-11072
lighttpd before 1.4.54 has a signed integer overflow, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a malicious HTTP GET request, as demonstrated by mishandling of /%2F? in burl_normalize_2F_to_slash_fix in burl.c. NOTE: The developer s...
https://nvd.nist.gov/vuln/detail/CVE-2019-11072
9,623
linux
cfa39381173d5f969daf43582c95ad679189cbc9
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/cfa39381173d5f969daf43582c95ad679189cbc9
kvm: fix kvm_ioctl_create_device() reference counting (CVE-2019-6974) kvm_ioctl_create_device() does the following: 1. creates a device that holds a reference to the VM object (with a borrowed reference, the VM's refcount has not been bumped yet) 2. initializes the device 3. transfers the reference to the device t...
1
static int kvm_ioctl_create_device(struct kvm *kvm, struct kvm_create_device *cd) { struct kvm_device_ops *ops = NULL; struct kvm_device *dev; bool test = cd->flags & KVM_CREATE_DEVICE_TEST; int ret; if (cd->type >= ARRAY_SIZE(kvm_device_ops_table)) return -ENODEV; ops = kvm_device_ops_table[cd->type];...
176,950,247,388,431,500,000,000,000,000,000,000,000
kvm_main.c
148,296,589,878,720,510,000,000,000,000,000,000,000
[ "CWE-362" ]
CVE-2019-6974
In the Linux kernel before 4.20.8, kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandles reference counting because of a race condition, leading to a use-after-free.
https://nvd.nist.gov/vuln/detail/CVE-2019-6974
184,695
linux
cfa39381173d5f969daf43582c95ad679189cbc9
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/cfa39381173d5f969daf43582c95ad679189cbc9
kvm: fix kvm_ioctl_create_device() reference counting (CVE-2019-6974) kvm_ioctl_create_device() does the following: 1. creates a device that holds a reference to the VM object (with a borrowed reference, the VM's refcount has not been bumped yet) 2. initializes the device 3. transfers the reference to the device t...
0
static int kvm_ioctl_create_device(struct kvm *kvm, struct kvm_create_device *cd) { struct kvm_device_ops *ops = NULL; struct kvm_device *dev; bool test = cd->flags & KVM_CREATE_DEVICE_TEST; int ret; if (cd->type >= ARRAY_SIZE(kvm_device_ops_table)) return -ENODEV; ops = kvm_device_ops_table[cd->type];...
137,874,489,955,188,300,000,000,000,000,000,000,000
kvm_main.c
195,444,155,949,027,950,000,000,000,000,000,000,000
[ "CWE-362" ]
CVE-2019-6974
In the Linux kernel before 4.20.8, kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandles reference counting because of a race condition, leading to a use-after-free.
https://nvd.nist.gov/vuln/detail/CVE-2019-6974
9,634
tcpdump
83a412a5275cac973c5841eca3511c766bed778d
https://github.com/the-tcpdump-group/tcpdump
https://github.com/the-tcpdump-group/tcpdump/commit/83a412a5275cac973c5841eca3511c766bed778d
(for 4.9.3) CVE-2018-16228/HNCP: make buffer access safer print_prefix() has a buffer and does not initialize it. It may call decode_prefix6(), which also does not initialize the buffer on invalid input. When that happens, make sure to return from print_prefix() before trying to print the [still uninitialized] buffer....
1
print_prefix(netdissect_options *ndo, const u_char *prefix, u_int max_length) { int plenbytes; char buf[sizeof("xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx::/128")]; if (prefix[0] >= 96 && max_length >= IPV4_MAPPED_HEADING_LEN + 1 && is_ipv4_mapped_address(&prefix[1])) { struct in_addr addr; ...
296,958,635,835,410,900,000,000,000,000,000,000,000
print-hncp.c
71,707,496,757,408,950,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-16228
The HNCP parser in tcpdump before 4.9.3 has a buffer over-read in print-hncp.c:print_prefix().
https://nvd.nist.gov/vuln/detail/CVE-2018-16228
184,703
tcpdump
83a412a5275cac973c5841eca3511c766bed778d
https://github.com/the-tcpdump-group/tcpdump
https://github.com/the-tcpdump-group/tcpdump/commit/83a412a5275cac973c5841eca3511c766bed778d
(for 4.9.3) CVE-2018-16228/HNCP: make buffer access safer print_prefix() has a buffer and does not initialize it. It may call decode_prefix6(), which also does not initialize the buffer on invalid input. When that happens, make sure to return from print_prefix() before trying to print the [still uninitialized] buffer....
0
print_prefix(netdissect_options *ndo, const u_char *prefix, u_int max_length) { int plenbytes; char buf[sizeof("xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx::/128")]; if (prefix[0] >= 96 && max_length >= IPV4_MAPPED_HEADING_LEN + 1 && is_ipv4_mapped_address(&prefix[1])) { struct in_addr addr; ...
66,529,608,188,001,110,000,000,000,000,000,000,000
print-hncp.c
102,355,438,122,732,180,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-16228
The HNCP parser in tcpdump before 4.9.3 has a buffer over-read in print-hncp.c:print_prefix().
https://nvd.nist.gov/vuln/detail/CVE-2018-16228
9,638
linux
04197b341f23b908193308b8d63d17ff23232598
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/04197b341f23b908193308b8d63d17ff23232598
xfs: don't BUG() on mixed direct and mapped I/O We've had reports of generic/095 causing XFS to BUG() in __xfs_get_blocks() due to the existence of delalloc blocks on a direct I/O read. generic/095 issues a mix of various types of I/O, including direct and memory mapped I/O to a single file. This is clearly not suppor...
1
__xfs_get_blocks( struct inode *inode, sector_t iblock, struct buffer_head *bh_result, int create, bool direct, bool dax_fault) { struct xfs_inode *ip = XFS_I(inode); struct xfs_mount *mp = ip->i_mount; xfs_fileoff_t offset_fsb, end_fsb; int error = 0; int lockmode = 0; struct xfs_bmbt_irec ima...
195,875,716,643,763,600,000,000,000,000,000,000,000
xfs_aops.c
300,830,705,963,493,000,000,000,000,000,000,000,000
[ "CWE-362" ]
CVE-2016-10741
In the Linux kernel before 4.9.3, fs/xfs/xfs_aops.c allows local users to cause a denial of service (system crash) because there is a race condition between direct and memory-mapped I/O (associated with a hole) that is handled with BUG_ON instead of an I/O failure.
https://nvd.nist.gov/vuln/detail/CVE-2016-10741
184,706
linux
04197b341f23b908193308b8d63d17ff23232598
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/04197b341f23b908193308b8d63d17ff23232598
xfs: don't BUG() on mixed direct and mapped I/O We've had reports of generic/095 causing XFS to BUG() in __xfs_get_blocks() due to the existence of delalloc blocks on a direct I/O read. generic/095 issues a mix of various types of I/O, including direct and memory mapped I/O to a single file. This is clearly not suppor...
0
__xfs_get_blocks( struct inode *inode, sector_t iblock, struct buffer_head *bh_result, int create, bool direct, bool dax_fault) { struct xfs_inode *ip = XFS_I(inode); struct xfs_mount *mp = ip->i_mount; xfs_fileoff_t offset_fsb, end_fsb; int error = 0; int lockmode = 0; struct xfs_bmbt_irec ima...
165,371,123,751,058,870,000,000,000,000,000,000,000
xfs_aops.c
179,663,587,725,984,670,000,000,000,000,000,000,000
[ "CWE-362" ]
CVE-2016-10741
In the Linux kernel before 4.9.3, fs/xfs/xfs_aops.c allows local users to cause a denial of service (system crash) because there is a race condition between direct and memory-mapped I/O (associated with a hole) that is handled with BUG_ON instead of an I/O failure.
https://nvd.nist.gov/vuln/detail/CVE-2016-10741
9,641
linux
f9432c5ec8b1e9a09b9b0e5569e3c73db8de432a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/f9432c5ec8b1e9a09b9b0e5569e3c73db8de432a
Bluetooth: RFCOMM - Fix info leak in ioctl(RFCOMMGETDEVLIST) The RFCOMM code fails to initialize the two padding bytes of struct rfcomm_dev_list_req inserted for alignment before copying it to userland. Additionally there are two padding bytes in each instance of struct rfcomm_dev_info. The ioctl() that for disclosure...
1
static int rfcomm_get_dev_list(void __user *arg) { struct rfcomm_dev *dev; struct rfcomm_dev_list_req *dl; struct rfcomm_dev_info *di; int n = 0, size, err; u16 dev_num; BT_DBG(""); if (get_user(dev_num, (u16 __user *) arg)) return -EFAULT; if (!dev_num || dev_num > (PAGE_SIZE * 4) / sizeof(*di)) return ...
139,069,687,710,975,940,000,000,000,000,000,000,000
tty.c
176,026,457,291,408,430,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2012-6545
The Bluetooth RFCOMM implementation in the Linux kernel before 3.6 does not properly initialize certain structures, which allows local users to obtain sensitive information from kernel memory via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2012-6545
184,708
linux
f9432c5ec8b1e9a09b9b0e5569e3c73db8de432a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/f9432c5ec8b1e9a09b9b0e5569e3c73db8de432a
Bluetooth: RFCOMM - Fix info leak in ioctl(RFCOMMGETDEVLIST) The RFCOMM code fails to initialize the two padding bytes of struct rfcomm_dev_list_req inserted for alignment before copying it to userland. Additionally there are two padding bytes in each instance of struct rfcomm_dev_info. The ioctl() that for disclosure...
0
static int rfcomm_get_dev_list(void __user *arg) { struct rfcomm_dev *dev; struct rfcomm_dev_list_req *dl; struct rfcomm_dev_info *di; int n = 0, size, err; u16 dev_num; BT_DBG(""); if (get_user(dev_num, (u16 __user *) arg)) return -EFAULT; if (!dev_num || dev_num > (PAGE_SIZE * 4) / sizeof(*di)) return ...
101,971,326,271,357,420,000,000,000,000,000,000,000
tty.c
142,318,201,572,018,090,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2012-6545
The Bluetooth RFCOMM implementation in the Linux kernel before 3.6 does not properly initialize certain structures, which allows local users to obtain sensitive information from kernel memory via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2012-6545
9,646
libgd
1ccfe21e14c4d18336f9da8515cd17db88c3de61
https://github.com/libgd/libgd
https://github.com/libgd/libgd/commit/1ccfe21e14c4d18336f9da8515cd17db88c3de61
fix php 72494, invalid color index not handled, can lead to crash
1
BGD_DECLARE(gdImagePtr) gdImageCropThreshold(gdImagePtr im, const unsigned int color, const float threshold) { const int width = gdImageSX(im); const int height = gdImageSY(im); int x,y; int match; gdRect crop; crop.x = 0; crop.y = 0; crop.width = 0; crop.height = 0; /* Pierre: crop everything sounds bad *...
58,602,749,696,991,850,000,000,000,000,000,000,000
gd_crop.c
283,844,472,613,649,240,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2016-6128
The gdImageCropThreshold function in gd_crop.c in the GD Graphics Library (aka libgd) before 2.2.3, as used in PHP before 7.0.9, allows remote attackers to cause a denial of service (application crash) via an invalid color index.
https://nvd.nist.gov/vuln/detail/CVE-2016-6128
184,711
libgd
1ccfe21e14c4d18336f9da8515cd17db88c3de61
https://github.com/libgd/libgd
https://github.com/libgd/libgd/commit/1ccfe21e14c4d18336f9da8515cd17db88c3de61
fix php 72494, invalid color index not handled, can lead to crash
0
BGD_DECLARE(gdImagePtr) gdImageCropThreshold(gdImagePtr im, const unsigned int color, const float threshold) { const int width = gdImageSX(im); const int height = gdImageSY(im); int x,y; int match; gdRect crop; crop.x = 0; crop.y = 0; crop.width = 0; crop.height = 0; /* Pierre: crop everything sounds bad *...
35,227,494,179,725,593,000,000,000,000,000,000,000
gd_crop.c
125,155,221,022,675,590,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2016-6128
The gdImageCropThreshold function in gd_crop.c in the GD Graphics Library (aka libgd) before 2.2.3, as used in PHP before 7.0.9, allows remote attackers to cause a denial of service (application crash) via an invalid color index.
https://nvd.nist.gov/vuln/detail/CVE-2016-6128
9,649
wireshark
11edc83b98a61e890d7bb01855389d40e984ea82
https://github.com/wireshark/wireshark
https://github.com/wireshark/wireshark/commit/11edc83b98a61e890d7bb01855389d40e984ea82
Don't treat the packet length as unsigned. The scanf family of functions are as annoyingly bad at handling unsigned numbers as strtoul() is - both of them are perfectly willing to accept a value beginning with a negative sign as an unsigned value. When using strtoul(), you can compensate for this by explicitly checki...
1
parse_netscreen_packet(FILE_T fh, struct wtap_pkthdr *phdr, Buffer* buf, char *line, int *err, gchar **err_info) { int sec; int dsec; char cap_int[NETSCREEN_MAX_INT_NAME_LENGTH]; char direction[2]; guint pkt_len; char cap_src[13]; char cap_dst[13]; guint8 *pd; gchar *p; int n, i = 0;...
147,371,450,414,689,870,000,000,000,000,000,000,000
netscreen.c
286,276,784,978,868,850,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2016-5357
wiretap/netscreen.c in the NetScreen file parser in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles sscanf unsigned-integer processing, which allows remote attackers to cause a denial of service (application crash) via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2016-5357
184,712
wireshark
11edc83b98a61e890d7bb01855389d40e984ea82
https://github.com/wireshark/wireshark
https://github.com/wireshark/wireshark/commit/11edc83b98a61e890d7bb01855389d40e984ea82
Don't treat the packet length as unsigned. The scanf family of functions are as annoyingly bad at handling unsigned numbers as strtoul() is - both of them are perfectly willing to accept a value beginning with a negative sign as an unsigned value. When using strtoul(), you can compensate for this by explicitly checki...
0
parse_netscreen_packet(FILE_T fh, struct wtap_pkthdr *phdr, Buffer* buf, char *line, int *err, gchar **err_info) { int pkt_len; int sec; int dsec; char cap_int[NETSCREEN_MAX_INT_NAME_LENGTH]; char direction[2]; char cap_src[13]; char cap_dst[13]; guint8 *pd; gchar *p; int n, i = 0; ...
289,287,380,428,776,400,000,000,000,000,000,000,000
netscreen.c
280,112,886,465,280,600,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2016-5357
wiretap/netscreen.c in the NetScreen file parser in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles sscanf unsigned-integer processing, which allows remote attackers to cause a denial of service (application crash) via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2016-5357
9,655
linux
4c185ce06dca14f5cea192f5a2c981ef50663f2b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/4c185ce06dca14f5cea192f5a2c981ef50663f2b
aio: lift iov_iter_init() into aio_setup_..._rw() the only non-trivial detail is that we do it before rw_verify_area(), so we'd better cap the length ourselves in aio_setup_single_rw() case (for vectored case rw_copy_check_uvector() will do that for us). Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
1
static ssize_t aio_setup_single_vector(struct kiocb *kiocb, int rw, char __user *buf, unsigned long *nr_segs, size_t len, struct iovec *iovec) { if (unlikely(!access_ok(!rw, buf, len))) return -EFAULT; iovec->iov_base = buf; iovec->iov_len = len; *nr_segs = ...
1,764,598,624,184,633,000,000,000,000,000,000,000
aio.c
10,187,739,604,289,771,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2015-8830
Integer overflow in the aio_setup_single_vector function in fs/aio.c in the Linux kernel 4.0 allows local users to cause a denial of service or possibly have unspecified other impact via a large AIO iovec. NOTE: this vulnerability exists because of a CVE-2012-6701 regression.
https://nvd.nist.gov/vuln/detail/CVE-2015-8830
184,718
linux
4c185ce06dca14f5cea192f5a2c981ef50663f2b
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/4c185ce06dca14f5cea192f5a2c981ef50663f2b
aio: lift iov_iter_init() into aio_setup_..._rw() the only non-trivial detail is that we do it before rw_verify_area(), so we'd better cap the length ourselves in aio_setup_single_rw() case (for vectored case rw_copy_check_uvector() will do that for us). Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
0
static ssize_t aio_setup_single_vector(struct kiocb *kiocb, int rw, char __user *buf, unsigned long *nr_segs, size_t len, struct iovec *iovec, struct iov_iter *iter) { if (len > MAX_RW_COUNT) len = MAX_RW_COUNT; if (unlikely(!access_ok(!rw, buf, len))) ...
101,288,277,757,083,190,000,000,000,000,000,000,000
aio.c
110,902,703,907,162,260,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2015-8830
Integer overflow in the aio_setup_single_vector function in fs/aio.c in the Linux kernel 4.0 allows local users to cause a denial of service or possibly have unspecified other impact via a large AIO iovec. NOTE: this vulnerability exists because of a CVE-2012-6701 regression.
https://nvd.nist.gov/vuln/detail/CVE-2015-8830
9,660
FFmpeg
611b35627488a8d0763e75c25ee0875c5b7987dd
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/611b35627488a8d0763e75c25ee0875c5b7987dd
avcodec/dnxhd_parser: Do not return invalid value from dnxhd_find_frame_end() on error Fixes: Null pointer dereference Fixes: CVE-2017-9608 Found-by: Yihan Lian Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
1
static int dnxhd_find_frame_end(DNXHDParserContext *dctx, const uint8_t *buf, int buf_size) { ParseContext *pc = &dctx->pc; uint64_t state = pc->state64; int pic_found = pc->frame_start_found; int i = 0; if (!pic_found) { for (i = 0; i < buf_size; i++) { ...
86,046,191,373,808,070,000,000,000,000,000,000,000
dnxhd_parser.c
54,129,044,710,275,890,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2017-9608
The dnxhd decoder in FFmpeg before 3.2.6, and 3.3.x before 3.3.3 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted mov file.
https://nvd.nist.gov/vuln/detail/CVE-2017-9608
184,719
FFmpeg
611b35627488a8d0763e75c25ee0875c5b7987dd
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/611b35627488a8d0763e75c25ee0875c5b7987dd
avcodec/dnxhd_parser: Do not return invalid value from dnxhd_find_frame_end() on error Fixes: Null pointer dereference Fixes: CVE-2017-9608 Found-by: Yihan Lian Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
0
static int dnxhd_find_frame_end(DNXHDParserContext *dctx, const uint8_t *buf, int buf_size) { ParseContext *pc = &dctx->pc; uint64_t state = pc->state64; int pic_found = pc->frame_start_found; int i = 0; if (!pic_found) { for (i = 0; i < buf_size; i++) { ...
256,227,833,484,968,670,000,000,000,000,000,000,000
dnxhd_parser.c
221,954,861,288,586,140,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2017-9608
The dnxhd decoder in FFmpeg before 3.2.6, and 3.3.x before 3.3.3 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted mov file.
https://nvd.nist.gov/vuln/detail/CVE-2017-9608
9,669
ImageMagick
280215b9936d145dd5ee91403738ccce1333cab1
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/280215b9936d145dd5ee91403738ccce1333cab1
Rewrite reading pixel values.
1
static MagickBooleanType ReadPSDChannelPixels(Image *image, const size_t channels,const size_t row,const ssize_t type, const unsigned char *pixels,ExceptionInfo *exception) { Quantum pixel; register const unsigned char *p; register Quantum *q; register ssize_t x; size_t packet_s...
42,358,738,219,081,613,000,000,000,000,000,000,000
psd.c
332,626,216,864,854,940,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2016-7514
The ReadPSDChannelPixels function in coders/psd.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PSD file.
https://nvd.nist.gov/vuln/detail/CVE-2016-7514
184,727
ImageMagick
280215b9936d145dd5ee91403738ccce1333cab1
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/280215b9936d145dd5ee91403738ccce1333cab1
Rewrite reading pixel values.
0
static MagickBooleanType ReadPSDChannelPixels(Image *image, const size_t channels,const size_t row,const ssize_t type, const unsigned char *pixels,ExceptionInfo *exception) { Quantum pixel; register const unsigned char *p; register Quantum *q; register ssize_t x; size_t packet_s...
15,030,130,327,058,568,000,000,000,000,000,000,000
psd.c
210,776,347,083,540,080,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2016-7514
The ReadPSDChannelPixels function in coders/psd.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PSD file.
https://nvd.nist.gov/vuln/detail/CVE-2016-7514
9,673
linux
251e22abde21833b3d29577e4d8c7aaccd650eee
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/251e22abde21833b3d29577e4d8c7aaccd650eee
pinctrl: amd: Use devm_pinctrl_register() for pinctrl registration Use devm_pinctrl_register() for pin control registration and clean error path. Signed-off-by: Laxman Dewangan <ldewangan@nvidia.com> Signed-off-by: Linus Walleij <linus.walleij@linaro.org>
1
static int amd_gpio_probe(struct platform_device *pdev) { int ret = 0; int irq_base; struct resource *res; struct amd_gpio *gpio_dev; gpio_dev = devm_kzalloc(&pdev->dev, sizeof(struct amd_gpio), GFP_KERNEL); if (!gpio_dev) return -ENOMEM; spin_lock_init(&gpio_dev->lock); res = platform_get_resource(pde...
152,429,198,517,298,730,000,000,000,000,000,000,000
pinctrl-amd.c
15,215,002,648,681,079,000,000,000,000,000,000,000
[ "CWE-415" ]
CVE-2017-18174
In the Linux kernel before 4.7, the amd_gpio_remove function in drivers/pinctrl/pinctrl-amd.c calls the pinctrl_unregister function, leading to a double free.
https://nvd.nist.gov/vuln/detail/CVE-2017-18174
184,730
linux
251e22abde21833b3d29577e4d8c7aaccd650eee
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/251e22abde21833b3d29577e4d8c7aaccd650eee
pinctrl: amd: Use devm_pinctrl_register() for pinctrl registration Use devm_pinctrl_register() for pin control registration and clean error path. Signed-off-by: Laxman Dewangan <ldewangan@nvidia.com> Signed-off-by: Linus Walleij <linus.walleij@linaro.org>
0
static int amd_gpio_probe(struct platform_device *pdev) { int ret = 0; int irq_base; struct resource *res; struct amd_gpio *gpio_dev; gpio_dev = devm_kzalloc(&pdev->dev, sizeof(struct amd_gpio), GFP_KERNEL); if (!gpio_dev) return -ENOMEM; spin_lock_init(&gpio_dev->lock); res = platform_get_resource(pde...
209,284,362,012,157,400,000,000,000,000,000,000,000
pinctrl-amd.c
118,956,490,816,980,920,000,000,000,000,000,000,000
[ "CWE-415" ]
CVE-2017-18174
In the Linux kernel before 4.7, the amd_gpio_remove function in drivers/pinctrl/pinctrl-amd.c calls the pinctrl_unregister function, leading to a double free.
https://nvd.nist.gov/vuln/detail/CVE-2017-18174
9,674
jasper
f25486c3d4aa472fec79150f2c41ed4333395d3d
https://github.com/mdadams/jasper
https://github.com/mdadams/jasper/commit/f25486c3d4aa472fec79150f2c41ed4333395d3d
Fixed a bug in the packet iterator code. Added a new regression test case.
1
static int jpc_pi_nextrpcl(register jpc_pi_t *pi) { int rlvlno; jpc_pirlvl_t *pirlvl; jpc_pchg_t *pchg; int prchind; int prcvind; int *prclyrno; int compno; jpc_picomp_t *picomp; int xstep; int ystep; uint_fast32_t r; uint_fast32_t rpx; uint_fast32_t rpy; uint_fast32_t trx0; uint_fast32_t try0; pchg = ...
71,544,139,196,461,260,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2016-9583
An out-of-bounds heap read vulnerability was found in the jpc_pi_nextpcrl() function of jasper before 2.0.6 when processing crafted input.
https://nvd.nist.gov/vuln/detail/CVE-2016-9583
184,731
jasper
f25486c3d4aa472fec79150f2c41ed4333395d3d
https://github.com/mdadams/jasper
https://github.com/mdadams/jasper/commit/f25486c3d4aa472fec79150f2c41ed4333395d3d
Fixed a bug in the packet iterator code. Added a new regression test case.
0
static int jpc_pi_nextrpcl(register jpc_pi_t *pi) { int rlvlno; jpc_pirlvl_t *pirlvl; jpc_pchg_t *pchg; int prchind; int prcvind; int *prclyrno; int compno; jpc_picomp_t *picomp; int xstep; int ystep; uint_fast32_t r; uint_fast32_t rpx; uint_fast32_t rpy; uint_fast32_t trx0; uint_fast32_t try0; pchg = ...
194,901,967,515,631,960,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2016-9583
An out-of-bounds heap read vulnerability was found in the jpc_pi_nextpcrl() function of jasper before 2.0.6 when processing crafted input.
https://nvd.nist.gov/vuln/detail/CVE-2016-9583
9,681
openjpeg
cbe7384016083eac16078b359acd7a842253d503
https://github.com/uclouvain/openjpeg
https://github.com/uclouvain/openjpeg/commit/cbe7384016083eac16078b359acd7a842253d503
None
1
static OPJ_BOOL bmp_read_rle4_data(FILE* IN, OPJ_UINT8* pData, OPJ_UINT32 stride, OPJ_UINT32 width, OPJ_UINT32 height) { OPJ_UINT32 x, y; OPJ_UINT8 *pix; const OPJ_UINT8 *beyond; beyond = pData + stride * height; pix = pData; x = y = 0U; while (y ...
107,959,287,325,417,320,000,000,000,000,000,000,000
convertbmp.c
204,530,473,747,156,800,000,000,000,000,000,000,000
[ "CWE-400" ]
CVE-2019-12973
In OpenJPEG 2.3.1, there is excessive iteration in the opj_t1_encode_cblks function of openjp2/t1.c. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted bmp file. This issue is similar to CVE-2018-6616.
https://nvd.nist.gov/vuln/detail/CVE-2019-12973
184,736
openjpeg
cbe7384016083eac16078b359acd7a842253d503
https://github.com/uclouvain/openjpeg
https://github.com/uclouvain/openjpeg/commit/cbe7384016083eac16078b359acd7a842253d503
None
0
static OPJ_BOOL bmp_read_rle4_data(FILE* IN, OPJ_UINT8* pData, OPJ_UINT32 stride, OPJ_UINT32 width, OPJ_UINT32 height) { OPJ_UINT32 x, y, written; OPJ_UINT8 *pix; const OPJ_UINT8 *beyond; beyond = pData + stride * height; pix = pData; x = y = written =...
134,963,054,834,351,210,000,000,000,000,000,000,000
None
null
[ "CWE-400" ]
CVE-2019-12973
In OpenJPEG 2.3.1, there is excessive iteration in the opj_t1_encode_cblks function of openjp2/t1.c. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted bmp file. This issue is similar to CVE-2018-6616.
https://nvd.nist.gov/vuln/detail/CVE-2019-12973
9,710
Chrome
60c9d8a39e4aa78dd51c236bd1b2c4f17c9d27fe
https://github.com/chromium/chromium
https://github.com/chromium/chromium/commit/60c9d8a39e4aa78dd51c236bd1b2c4f17c9d27fe
None
1
bool TextAutosizer::processSubtree(RenderObject* layoutRoot) { if (!m_document->settings() || !m_document->settings()->textAutosizingEnabled() || layoutRoot->view()->printing() || !m_document->page()) return false; Frame* mainFrame = m_document->page()->mainFrame(); TextAutosizingWindowInfo window...
58,579,830,367,491,530,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-3906
The PDF parser in Google Chrome before 16.0.912.63 allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.
https://nvd.nist.gov/vuln/detail/CVE-2011-3906
184,763
Chrome
60c9d8a39e4aa78dd51c236bd1b2c4f17c9d27fe
https://github.com/chromium/chromium
https://github.com/chromium/chromium/commit/60c9d8a39e4aa78dd51c236bd1b2c4f17c9d27fe
None
0
bool TextAutosizer::processSubtree(RenderObject* layoutRoot) { if (!m_document->settings() || !m_document->settings()->textAutosizingEnabled() || layoutRoot->view()->printing() || !m_document->page()) return false; Frame* mainFrame = m_document->page()->mainFrame(); TextAutosizingWindowInfo window...
331,413,159,561,956,900,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-3906
The PDF parser in Google Chrome before 16.0.912.63 allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.
https://nvd.nist.gov/vuln/detail/CVE-2011-3906
9,726
Chrome
08b630e66e042af3fe80015509b3238c2679ea40
https://github.com/chromium/chromium
https://github.com/chromium/chromium/commit/08b630e66e042af3fe80015509b3238c2679ea40
None
1
bool RenderMenuList::multiple() { return toHTMLSelectElement(node())->multiple(); }
153,962,476,287,418,380,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2011-2830
Google V8, as used in Google Chrome before 14.0.835.163, does not properly implement script object wrappers, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via unknown vectors.
https://nvd.nist.gov/vuln/detail/CVE-2011-2830
184,779
Chrome
08b630e66e042af3fe80015509b3238c2679ea40
https://github.com/chromium/chromium
https://github.com/chromium/chromium/commit/08b630e66e042af3fe80015509b3238c2679ea40
None
0
bool RenderMenuList::multiple() bool RenderMenuList::multiple() const { return toHTMLSelectElement(node())->multiple(); }
94,905,042,104,443,020,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2011-2830
Google V8, as used in Google Chrome before 14.0.835.163, does not properly implement script object wrappers, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via unknown vectors.
https://nvd.nist.gov/vuln/detail/CVE-2011-2830
9,737
Chrome
9eb1fd426a04adac0906c81ed88f1089969702ba
https://github.com/chromium/chromium
https://github.com/chromium/chromium/commit/9eb1fd426a04adac0906c81ed88f1089969702ba
None
1
void BeginInstallWithManifestFunction::OnParseSuccess( const SkBitmap& icon, DictionaryValue* parsed_manifest) { CHECK(parsed_manifest); icon_ = icon; parsed_manifest_.reset(parsed_manifest); std::string init_errors; dummy_extension_ = Extension::Create( FilePath(), Extension::INTERNAL, ...
31,286,386,419,319,730,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2011-2358
Google Chrome before 13.0.782.107 does not ensure that extension installations are confirmed by a browser dialog, which makes it easier for remote attackers to modify the product's functionality via a Trojan horse extension.
https://nvd.nist.gov/vuln/detail/CVE-2011-2358
184,790
Chrome
9eb1fd426a04adac0906c81ed88f1089969702ba
https://github.com/chromium/chromium
https://github.com/chromium/chromium/commit/9eb1fd426a04adac0906c81ed88f1089969702ba
None
0
void BeginInstallWithManifestFunction::OnParseSuccess( const SkBitmap& icon, DictionaryValue* parsed_manifest) { CHECK(parsed_manifest); icon_ = icon; parsed_manifest_.reset(parsed_manifest); std::string init_errors; dummy_extension_ = Extension::Create( FilePath(), Extension::INTERNAL, ...
305,490,087,900,030,100,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2011-2358
Google Chrome before 13.0.782.107 does not ensure that extension installations are confirmed by a browser dialog, which makes it easier for remote attackers to modify the product's functionality via a Trojan horse extension.
https://nvd.nist.gov/vuln/detail/CVE-2011-2358
9,744
Chrome
ce891a86763d3540e2612be26938a6163310efe0
https://github.com/chromium/chromium
https://github.com/chromium/chromium/commit/ce891a86763d3540e2612be26938a6163310efe0
None
1
void ChromeContentRendererClient::RenderThreadStarted() { chrome_observer_.reset(new ChromeRenderProcessObserver()); extension_dispatcher_.reset(new ExtensionDispatcher()); histogram_snapshots_.reset(new RendererHistogramSnapshots()); net_predictor_.reset(new RendererNetPredictor()); spellcheck_.reset(new Spe...
161,105,270,804,386,400,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2011-2798
Google Chrome before 13.0.782.107 does not properly restrict access to internal schemes, which allows remote attackers to have an unspecified impact via a crafted web site.
https://nvd.nist.gov/vuln/detail/CVE-2011-2798
184,797
Chrome
ce891a86763d3540e2612be26938a6163310efe0
https://github.com/chromium/chromium
https://github.com/chromium/chromium/commit/ce891a86763d3540e2612be26938a6163310efe0
None
0
void ChromeContentRendererClient::RenderThreadStarted() { chrome_observer_.reset(new ChromeRenderProcessObserver()); extension_dispatcher_.reset(new ExtensionDispatcher()); histogram_snapshots_.reset(new RendererHistogramSnapshots()); net_predictor_.reset(new RendererNetPredictor()); spellcheck_.reset(new Spe...
129,717,633,571,444,400,000,000,000,000,000,000,000
None
null
[ "CWE-264" ]
CVE-2011-2798
Google Chrome before 13.0.782.107 does not properly restrict access to internal schemes, which allows remote attackers to have an unspecified impact via a crafted web site.
https://nvd.nist.gov/vuln/detail/CVE-2011-2798
9,757
Chrome
bf04ad0dae9f4f479f90fd2b38f634ffbaf434b4
https://github.com/chromium/chromium
https://github.com/chromium/chromium/commit/bf04ad0dae9f4f479f90fd2b38f634ffbaf434b4
None
1
bool PPVarToNPVariant(PP_Var var, NPVariant* result) { switch (var.type) { case PP_VARTYPE_UNDEFINED: VOID_TO_NPVARIANT(*result); break; case PP_VARTYPE_NULL: NULL_TO_NPVARIANT(*result); break; case PP_VARTYPE_BOOL: BOOLEAN_TO_NPVARIANT(var.value.as_bool, *result); brea...
114,945,807,708,477,050,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-2345
The NPAPI implementation in Google Chrome before 12.0.742.112 does not properly handle strings, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.
https://nvd.nist.gov/vuln/detail/CVE-2011-2345
184,810
Chrome
bf04ad0dae9f4f479f90fd2b38f634ffbaf434b4
https://github.com/chromium/chromium
https://github.com/chromium/chromium/commit/bf04ad0dae9f4f479f90fd2b38f634ffbaf434b4
None
0
bool PPVarToNPVariant(PP_Var var, NPVariant* result) { switch (var.type) { case PP_VARTYPE_UNDEFINED: VOID_TO_NPVARIANT(*result); break; case PP_VARTYPE_NULL: NULL_TO_NPVARIANT(*result); break; case PP_VARTYPE_BOOL: BOOLEAN_TO_NPVARIANT(var.value.as_bool, *result); brea...
333,965,227,441,118,670,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-2345
The NPAPI implementation in Google Chrome before 12.0.742.112 does not properly handle strings, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.
https://nvd.nist.gov/vuln/detail/CVE-2011-2345
9,764
Chrome
514f93279494ec4448b34a7aeeff27eccaae983f
https://github.com/chromium/chromium
https://github.com/chromium/chromium/commit/514f93279494ec4448b34a7aeeff27eccaae983f
None
1
bool DebugOnStart::FindArgument(wchar_t* command_line, const char* argument_c) { wchar_t argument[50]; for (int i = 0; argument_c[i]; ++i) argument[i] = argument_c[i]; int argument_len = lstrlen(argument); int command_line_len = lstrlen(command_line); while (command_line_len > argument_len) { wch...
26,055,336,896,940,780,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2011-1301
Use-after-free vulnerability in the GPU process in Google Chrome before 10.0.648.205 allows remote attackers to execute arbitrary code via unknown vectors.
https://nvd.nist.gov/vuln/detail/CVE-2011-1301