idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
184,595 | ImageMagick | 134463b926fa965571aa4febd61b810be5e7da05 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/134463b926fa965571aa4febd61b810be5e7da05 | https://github.com/ImageMagick/ImageMagick/issues/129 | 0 | static Image *ReadVIFFImage(const ImageInfo *image_info,
ExceptionInfo *exception)
{
#define VFF_CM_genericRGB 15
#define VFF_CM_ntscRGB 1
#define VFF_CM_NONE 0
#define VFF_DEP_DECORDER 0x4
#define VFF_DEP_NSORDER 0x8
#define VFF_DES_RAW 0
#define VFF_LOC_IMPLICIT 1
#define VFF_MAPTYP_NONE 0
#define VFF_MA... | 84,738,426,758,816,520,000,000,000,000,000,000,000 | viff.c | 304,852,647,525,085,360,000,000,000,000,000,000,000 | [
"CWE-284"
] | CVE-2016-10065 | The ReadVIFFImage function in coders/viff.c in ImageMagick before 7.0.1-0 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2016-10065 |
9,512 | ImageMagick | 9e187b73a8a1290bb0e1a1c878f8be1917aa8742 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/9e187b73a8a1290bb0e1a1c878f8be1917aa8742 | None | 1 | static void WriteProfile(j_compress_ptr jpeg_info,Image *image)
{
const char
*name;
const StringInfo
*profile;
MagickBooleanType
iptc;
register ssize_t
i;
size_t
length,
tag_length;
StringInfo
*custom_profile;
/*
Save image profile as a APP marker.
*/
iptc=MagickF... | 203,461,117,257,884,900,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-10052 | Buffer overflow in the WriteProfile function in coders/jpeg.c in ImageMagick before 6.9.5-6 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2016-10052 |
184,597 | ImageMagick | 9e187b73a8a1290bb0e1a1c878f8be1917aa8742 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/9e187b73a8a1290bb0e1a1c878f8be1917aa8742 | None | 0 | static void WriteProfile(j_compress_ptr jpeg_info,Image *image)
{
const char
*name;
const StringInfo
*profile;
MagickBooleanType
iptc;
register ssize_t
i;
size_t
length,
tag_length;
StringInfo
*custom_profile;
/*
Save image profile as a APP marker.
*/
iptc=MagickF... | 267,909,007,897,631,500,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-10052 | Buffer overflow in the WriteProfile function in coders/jpeg.c in ImageMagick before 6.9.5-6 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2016-10052 |
9,516 | php-src | 863d37ea66d5c960db08d6f4a2cbd2518f0f80d1 | https://github.com/php/php-src | https://github.com/php/php-src/commit/863d37ea66d5c960db08d6f4a2cbd2518f0f80d1 | Fix #72696: imagefilltoborder stackoverflow on truecolor images
We must not allow negative color values be passed to
gdImageFillToBorder(), because that can lead to infinite recursion
since the recursion termination condition will not necessarily be met. | 1 | void gdImageFillToBorder (gdImagePtr im, int x, int y, int border, int color)
{
int lastBorder;
/* Seek left */
int leftLimit = -1, rightLimit;
int i, restoreAlphaBlending = 0;
if (border < 0) {
/* Refuse to fill to a non-solid border */
return;
}
if (!im->trueColor) {
if ((color > (im->colorsTotal... | 199,950,444,190,713,360,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-9933 | Stack consumption vulnerability in the gdImageFillToBorder function in gd.c in the GD Graphics Library (aka libgd) before 2.2.2, as used in PHP before 5.6.28 and 7.x before 7.0.13, allows remote attackers to cause a denial of service (segmentation violation) via a crafted imagefilltoborder call that triggers use of a n... | https://nvd.nist.gov/vuln/detail/CVE-2016-9933 |
184,601 | php-src | 863d37ea66d5c960db08d6f4a2cbd2518f0f80d1 | https://github.com/php/php-src | https://github.com/php/php-src/commit/863d37ea66d5c960db08d6f4a2cbd2518f0f80d1 | Fix #72696: imagefilltoborder stackoverflow on truecolor images
We must not allow negative color values be passed to
gdImageFillToBorder(), because that can lead to infinite recursion
since the recursion termination condition will not necessarily be met. | 0 | void gdImageFillToBorder (gdImagePtr im, int x, int y, int border, int color)
{
int lastBorder;
/* Seek left */
int leftLimit = -1, rightLimit;
int i, restoreAlphaBlending = 0;
if (border < 0 || color < 0) {
/* Refuse to fill to a non-solid border */
return;
}
if (!im->trueColor) {
if ((color > (im... | 134,289,527,342,969,380,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-9933 | Stack consumption vulnerability in the gdImageFillToBorder function in gd.c in the GD Graphics Library (aka libgd) before 2.2.2, as used in PHP before 5.6.28 and 7.x before 7.0.13, allows remote attackers to cause a denial of service (segmentation violation) via a crafted imagefilltoborder call that triggers use of a n... | https://nvd.nist.gov/vuln/detail/CVE-2016-9933 |
9,517 | jasper | 1abc2e5a401a4bf1d5ca4df91358ce5df111f495 | https://github.com/mdadams/jasper | https://github.com/mdadams/jasper/commit/1abc2e5a401a4bf1d5ca4df91358ce5df111f495 | Fixed an array overflow problem in the JPC decoder. | 1 | static int jpc_dec_tileinit(jpc_dec_t *dec, jpc_dec_tile_t *tile)
{
jpc_dec_tcomp_t *tcomp;
int compno;
int rlvlno;
jpc_dec_rlvl_t *rlvl;
jpc_dec_band_t *band;
jpc_dec_prc_t *prc;
int bndno;
jpc_tsfb_band_t *bnd;
int bandno;
jpc_dec_ccp_t *ccp;
int prccnt;
jpc_dec_cblk_t *cblk;
int cblkcnt;
uint_fast32_t ... | 152,611,857,864,829,500,000,000,000,000,000,000,000 | jpc_dec.c | 9,904,405,345,613,609,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2016-9560 | Stack-based buffer overflow in the jpc_tsfb_getbands2 function in jpc_tsfb.c in JasPer before 1.900.30 allows remote attackers to have unspecified impact via a crafted image. | https://nvd.nist.gov/vuln/detail/CVE-2016-9560 |
184,602 | jasper | 1abc2e5a401a4bf1d5ca4df91358ce5df111f495 | https://github.com/mdadams/jasper | https://github.com/mdadams/jasper/commit/1abc2e5a401a4bf1d5ca4df91358ce5df111f495 | Fixed an array overflow problem in the JPC decoder. | 0 | static int jpc_dec_tileinit(jpc_dec_t *dec, jpc_dec_tile_t *tile)
{
jpc_dec_tcomp_t *tcomp;
int compno;
int rlvlno;
jpc_dec_rlvl_t *rlvl;
jpc_dec_band_t *band;
jpc_dec_prc_t *prc;
int bndno;
jpc_tsfb_band_t *bnd;
int bandno;
jpc_dec_ccp_t *ccp;
int prccnt;
jpc_dec_cblk_t *cblk;
int cblkcnt;
uint_fast32_t ... | 29,369,060,289,449,410,000,000,000,000,000,000,000 | jpc_dec.c | 119,032,582,243,398,160,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2016-9560 | Stack-based buffer overflow in the jpc_tsfb_getbands2 function in jpc_tsfb.c in JasPer before 1.900.30 allows remote attackers to have unspecified impact via a crafted image. | https://nvd.nist.gov/vuln/detail/CVE-2016-9560 |
9,524 | jasper | d8c2604cd438c41ec72aff52c16ebd8183068020 | https://github.com/mdadams/jasper | https://github.com/mdadams/jasper/commit/d8c2604cd438c41ec72aff52c16ebd8183068020 | Added range check on XRsiz and YRsiz fields of SIZ marker segment. | 1 | static int jpc_siz_getparms(jpc_ms_t *ms, jpc_cstate_t *cstate,
jas_stream_t *in)
{
jpc_siz_t *siz = &ms->parms.siz;
unsigned int i;
uint_fast8_t tmp;
/* Eliminate compiler warning about unused variables. */
cstate = 0;
if (jpc_getuint16(in, &siz->caps) ||
jpc_getuint32(in, &siz->width) ||
jpc_getuint32... | 10,991,172,644,452,336,000,000,000,000,000,000,000 | jpc_cs.c | 109,966,816,698,492,500,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2016-8692 | The jpc_dec_process_siz function in libjasper/jpc/jpc_dec.c in JasPer before 1.900.4 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted YRsiz value in a BMP image to the imginfo command. | https://nvd.nist.gov/vuln/detail/CVE-2016-8692 |
184,608 | jasper | d8c2604cd438c41ec72aff52c16ebd8183068020 | https://github.com/mdadams/jasper | https://github.com/mdadams/jasper/commit/d8c2604cd438c41ec72aff52c16ebd8183068020 | Added range check on XRsiz and YRsiz fields of SIZ marker segment. | 0 | static int jpc_siz_getparms(jpc_ms_t *ms, jpc_cstate_t *cstate,
jas_stream_t *in)
{
jpc_siz_t *siz = &ms->parms.siz;
unsigned int i;
uint_fast8_t tmp;
/* Eliminate compiler warning about unused variables. */
cstate = 0;
if (jpc_getuint16(in, &siz->caps) ||
jpc_getuint32(in, &siz->width) ||
jpc_getuint32... | 83,491,995,228,449,810,000,000,000,000,000,000,000 | jpc_cs.c | 335,797,736,713,227,740,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2016-8692 | The jpc_dec_process_siz function in libjasper/jpc/jpc_dec.c in JasPer before 1.900.4 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted YRsiz value in a BMP image to the imginfo command. | https://nvd.nist.gov/vuln/detail/CVE-2016-8692 |
9,525 | libarchive | eec077f52bfa2d3f7103b4b74d52572ba8a15aca | https://github.com/libarchive/libarchive | https://github.com/libarchive/libarchive/commit/eec077f52bfa2d3f7103b4b74d52572ba8a15aca | Issue 747 (and others?): Avoid OOB read when parsing multiple long lines
The mtree bidder needs to look several lines ahead
in the input. It does this by extending the read-ahead
and parsing subsequent lines from the same growing buffer.
A bookkeeping error when extending the read-ahead would
sometimes lead it to si... | 1 | next_line(struct archive_read *a,
const char **b, ssize_t *avail, ssize_t *ravail, ssize_t *nl)
{
ssize_t len;
int quit;
quit = 0;
if (*avail == 0) {
*nl = 0;
len = 0;
} else
len = get_line_size(*b, *avail, nl);
/*
* Read bytes more while it does not reach the end of line.
*/
while (*nl == 0 &&... | 62,295,156,973,029,730,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2016-8688 | The mtree bidder in libarchive 3.2.1 does not keep track of line sizes when extending the read-ahead, which allows remote attackers to cause a denial of service (crash) via a crafted file, which triggers an invalid read in the (1) detect_form or (2) bid_entry function in libarchive/archive_read_support_format_mtree.c. | https://nvd.nist.gov/vuln/detail/CVE-2016-8688 |
184,609 | libarchive | eec077f52bfa2d3f7103b4b74d52572ba8a15aca | https://github.com/libarchive/libarchive | https://github.com/libarchive/libarchive/commit/eec077f52bfa2d3f7103b4b74d52572ba8a15aca | Issue 747 (and others?): Avoid OOB read when parsing multiple long lines
The mtree bidder needs to look several lines ahead
in the input. It does this by extending the read-ahead
and parsing subsequent lines from the same growing buffer.
A bookkeeping error when extending the read-ahead would
sometimes lead it to si... | 0 | next_line(struct archive_read *a,
const char **b, ssize_t *avail, ssize_t *ravail, ssize_t *nl)
{
ssize_t len;
int quit;
quit = 0;
if (*avail == 0) {
*nl = 0;
len = 0;
} else
len = get_line_size(*b, *avail, nl);
/*
* Read bytes more while it does not reach the end of line.
*/
while (*nl == 0 &&... | 320,859,213,761,789,560,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2016-8688 | The mtree bidder in libarchive 3.2.1 does not keep track of line sizes when extending the read-ahead, which allows remote attackers to cause a denial of service (crash) via a crafted file, which triggers an invalid read in the (1) detect_form or (2) bid_entry function in libarchive/archive_read_support_format_mtree.c. | https://nvd.nist.gov/vuln/detail/CVE-2016-8688 |
9,526 | ImageMagick | 6e48aa92ff4e6e95424300ecd52a9ea453c19c60 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/6e48aa92ff4e6e95424300ecd52a9ea453c19c60 | https://github.com/ImageMagick/ImageMagick/issues/268 | 1 | static Image *ReadTIFFImage(const ImageInfo *image_info,
ExceptionInfo *exception)
{
const char
*option;
float
*chromaticity,
x_position,
y_position,
x_resolution,
y_resolution;
Image
*image;
int
tiff_status;
MagickBooleanType
status;
MagickSizeType
number_pixe... | 280,343,953,088,806,580,000,000,000,000,000,000,000 | tiff.c | 223,604,198,693,155,800,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2016-8677 | The AcquireQuantumPixels function in MagickCore/quantum.c in ImageMagick before 7.0.3-1 allows remote attackers to have unspecified impact via a crafted image file, which triggers a memory allocation failure. | https://nvd.nist.gov/vuln/detail/CVE-2016-8677 |
184,610 | ImageMagick | 6e48aa92ff4e6e95424300ecd52a9ea453c19c60 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/6e48aa92ff4e6e95424300ecd52a9ea453c19c60 | https://github.com/ImageMagick/ImageMagick/issues/268 | 0 | static Image *ReadTIFFImage(const ImageInfo *image_info,
ExceptionInfo *exception)
{
const char
*option;
float
*chromaticity,
x_position,
y_position,
x_resolution,
y_resolution;
Image
*image;
int
tiff_status;
MagickBooleanType
status;
MagickSizeType
number_pixe... | 74,219,455,343,150,730,000,000,000,000,000,000,000 | tiff.c | 15,087,053,951,864,792,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2016-8677 | The AcquireQuantumPixels function in MagickCore/quantum.c in ImageMagick before 7.0.3-1 allows remote attackers to have unspecified impact via a crafted image file, which triggers a memory allocation failure. | https://nvd.nist.gov/vuln/detail/CVE-2016-8677 |
9,527 | libav | e5b019725f53b79159931d3a7317107cbbfd0860 | https://github.com/libav/libav | https://github.com/libav/libav/commit/e5b019725f53b79159931d3a7317107cbbfd0860 | m4vdec: Check for non-startcode 00 00 00 sequences in probe
This makes the m4v detection less trigger-happy.
Bug-Id: 949
Signed-off-by: Diego Biurrun <diego@biurrun.de> | 1 | static int mpeg4video_probe(AVProbeData *probe_packet)
{
uint32_t temp_buffer = -1;
int VO = 0, VOL = 0, VOP = 0, VISO = 0, res = 0;
int i;
for (i = 0; i < probe_packet->buf_size; i++) {
temp_buffer = (temp_buffer << 8) + probe_packet->buf[i];
if ((temp_buffer & 0xffffff00) != 0x100)... | 296,504,819,383,989,060,000,000,000,000,000,000,000 | m4vdec.c | 292,188,987,403,181,880,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2016-8675 | The get_vlc2 function in get_bits.h in Libav before 11.9 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted mp3 file, possibly related to startcode sequences during m4v detection. | https://nvd.nist.gov/vuln/detail/CVE-2016-8675 |
184,611 | libav | e5b019725f53b79159931d3a7317107cbbfd0860 | https://github.com/libav/libav | https://github.com/libav/libav/commit/e5b019725f53b79159931d3a7317107cbbfd0860 | m4vdec: Check for non-startcode 00 00 00 sequences in probe
This makes the m4v detection less trigger-happy.
Bug-Id: 949
Signed-off-by: Diego Biurrun <diego@biurrun.de> | 0 | static int mpeg4video_probe(AVProbeData *probe_packet)
{
uint32_t temp_buffer = -1;
int VO = 0, VOL = 0, VOP = 0, VISO = 0, res = 0;
int i;
for (i = 0; i < probe_packet->buf_size; i++) {
temp_buffer = (temp_buffer << 8) + probe_packet->buf[i];
if (temp_buffer & 0xfffffe00)
... | 15,708,804,895,323,825,000,000,000,000,000,000,000 | m4vdec.c | 298,654,249,398,717,620,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2016-8675 | The get_vlc2 function in get_bits.h in Libav before 11.9 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted mp3 file, possibly related to startcode sequences during m4v detection. | https://nvd.nist.gov/vuln/detail/CVE-2016-8675 |
9,533 | pupnp-code | be0a01bdb83395d9f3a5ea09c1308a4f1a972cbd | https://github.com/mjg59/pupnp-code | https://github.com/mjg59/pupnp-code/commit/be0a01bdb83395d9f3a5ea09c1308a4f1a972cbd | Don't allow unhandled POSTs to write to the filesystem by default
If there's no registered handler for a POST request, the default behaviour
is to write it to the filesystem. Several million deployed devices appear
to have this behaviour, making it possible to (at least) store arbitrary
data on them. Add a configure o... | 1 | static int http_RecvPostMessage(
/*! HTTP Parser object. */
http_parser_t *parser,
/*! [in] Socket Information object. */
SOCKINFO *info,
/*! File where received data is copied to. */
char *filename,
/*! Send Instruction object which gives information whether the file
* is a virtual file or not. */
struct Sen... | 172,421,084,346,481,900,000,000,000,000,000,000,000 | webserver.c | 294,353,686,090,577,800,000,000,000,000,000,000,000 | [
"CWE-284"
] | CVE-2016-6255 | Portable UPnP SDK (aka libupnp) before 1.6.21 allows remote attackers to write to arbitrary files in the webroot via a POST request without a registered handler. | https://nvd.nist.gov/vuln/detail/CVE-2016-6255 |
184,615 | pupnp-code | be0a01bdb83395d9f3a5ea09c1308a4f1a972cbd | https://github.com/mjg59/pupnp-code | https://github.com/mjg59/pupnp-code/commit/be0a01bdb83395d9f3a5ea09c1308a4f1a972cbd | Don't allow unhandled POSTs to write to the filesystem by default
If there's no registered handler for a POST request, the default behaviour
is to write it to the filesystem. Several million deployed devices appear
to have this behaviour, making it possible to (at least) store arbitrary
data on them. Add a configure o... | 0 | static int http_RecvPostMessage(
/*! HTTP Parser object. */
http_parser_t *parser,
/*! [in] Socket Information object. */
SOCKINFO *info,
/*! File where received data is copied to. */
char *filename,
/*! Send Instruction object which gives information whether the file
* is a virtual file or not. */
struct Sen... | 73,000,648,000,357,850,000,000,000,000,000,000,000 | webserver.c | 78,002,763,967,523,660,000,000,000,000,000,000,000 | [
"CWE-284"
] | CVE-2016-6255 | Portable UPnP SDK (aka libupnp) before 1.6.21 allows remote attackers to write to arbitrary files in the webroot via a POST request without a registered handler. | https://nvd.nist.gov/vuln/detail/CVE-2016-6255 |
9,535 | ImageMagick | bd96074b254c6607a0f7731e59f923ad19d5a46d | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/bd96074b254c6607a0f7731e59f923ad19d5a46d | http://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=26848 | 1 | static Image *ReadSUNImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
#define RMT_EQUAL_RGB 1
#define RMT_NONE 0
#define RMT_RAW 2
#define RT_STANDARD 1
#define RT_ENCODED 2
#define RT_FORMAT_RGB 3
typedef struct _SUNInfo
{
unsigned int
magic,
width,
height,
depth,
... | 223,671,316,596,223,770,000,000,000,000,000,000,000 | sun.c | 234,907,776,145,379,860,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2015-8957 | Buffer overflow in ImageMagick before 6.9.0-4 Beta allows remote attackers to cause a denial of service (application crash) via a crafted SUN file. | https://nvd.nist.gov/vuln/detail/CVE-2015-8957 |
184,616 | ImageMagick | bd96074b254c6607a0f7731e59f923ad19d5a46d | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/bd96074b254c6607a0f7731e59f923ad19d5a46d | http://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=26848 | 0 | static Image *ReadSUNImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
#define RMT_EQUAL_RGB 1
#define RMT_NONE 0
#define RMT_RAW 2
#define RT_STANDARD 1
#define RT_ENCODED 2
#define RT_FORMAT_RGB 3
typedef struct _SUNInfo
{
unsigned int
magic,
width,
height,
depth,
... | 38,171,291,299,912,030,000,000,000,000,000,000,000 | sun.c | 248,884,041,961,488,160,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2015-8957 | Buffer overflow in ImageMagick before 6.9.0-4 Beta allows remote attackers to cause a denial of service (application crash) via a crafted SUN file. | https://nvd.nist.gov/vuln/detail/CVE-2015-8957 |
9,536 | libdwarf | 11750a2838e52953013e3114ef27b3c7b1780697 | https://github.com/tomhughes/libdwarf | https://github.com/tomhughes/libdwarf/commit/11750a2838e52953013e3114ef27b3c7b1780697 | None | 1 | dwarf_elf_object_access_load_section(void* obj_in,
Dwarf_Half section_index,
Dwarf_Small** section_data,
int* error)
{
dwarf_elf_object_access_internals_t*obj =
(dwarf_elf_object_access_internals_t*)obj_in;
if (section_index == 0) {
return DW_DLV_NO_ENTRY;
}
{
Elf_... | 121,953,510,839,817,200,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2015-8750 | libdwarf 20151114 and earlier allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a debug_abbrev section marked NOBITS in an ELF file. | https://nvd.nist.gov/vuln/detail/CVE-2015-8750 |
184,617 | libdwarf | 11750a2838e52953013e3114ef27b3c7b1780697 | https://github.com/tomhughes/libdwarf | https://github.com/tomhughes/libdwarf/commit/11750a2838e52953013e3114ef27b3c7b1780697 | None | 0 | dwarf_elf_object_access_load_section(void* obj_in,
Dwarf_Half section_index,
Dwarf_Small** section_data,
int* error)
{
dwarf_elf_object_access_internals_t*obj =
(dwarf_elf_object_access_internals_t*)obj_in;
if (section_index == 0) {
return DW_DLV_NO_ENTRY;
}
{
Elf_... | 139,657,656,651,288,720,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2015-8750 | libdwarf 20151114 and earlier allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a debug_abbrev section marked NOBITS in an ELF file. | https://nvd.nist.gov/vuln/detail/CVE-2015-8750 |
9,545 | linux | 6c4841c2b6c32a134f9f36e5e08857138cc12b10 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6c4841c2b6c32a134f9f36e5e08857138cc12b10 | [POWERPC] Never panic when taking altivec exceptions from userspace
At the moment we rely on a cpu feature bit or a firmware property to
detect altivec. If we dont have either of these and the cpu does in fact
support altivec we can cause a panic from userspace.
It seems safer to always send a signal if we manage to ... | 1 | void altivec_unavailable_exception(struct pt_regs *regs)
{
#if !defined(CONFIG_ALTIVEC)
if (user_mode(regs)) {
/* A user program has executed an altivec instruction,
but this kernel doesn't support altivec. */
_exception(SIGILL, regs, ILL_ILLOPC, regs->nip);
return;
}
#endif
printk(KERN_EMERG "Un... | 86,528,045,310,394,810,000,000,000,000,000,000,000 | traps.c | 305,004,121,217,082,200,000,000,000,000,000,000 | [
"CWE-19"
] | CVE-2006-5331 | The altivec_unavailable_exception function in arch/powerpc/kernel/traps.c in the Linux kernel before 2.6.19 on 64-bit systems mishandles the case where CONFIG_ALTIVEC is defined and the CPU actually supports Altivec, but the Altivec support was not detected by the kernel, which allows local users to cause a denial of s... | https://nvd.nist.gov/vuln/detail/CVE-2006-5331 |
184,622 | linux | 6c4841c2b6c32a134f9f36e5e08857138cc12b10 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/6c4841c2b6c32a134f9f36e5e08857138cc12b10 | [POWERPC] Never panic when taking altivec exceptions from userspace
At the moment we rely on a cpu feature bit or a firmware property to
detect altivec. If we dont have either of these and the cpu does in fact
support altivec we can cause a panic from userspace.
It seems safer to always send a signal if we manage to ... | 0 | void altivec_unavailable_exception(struct pt_regs *regs)
{
if (user_mode(regs)) {
/* A user program has executed an altivec instruction,
but this kernel doesn't support altivec. */
_exception(SIGILL, regs, ILL_ILLOPC, regs->nip);
return;
}
printk(KERN_EMERG "Unrecoverable VMX/Altivec Unavailable... | 154,530,722,344,789,890,000,000,000,000,000,000,000 | traps.c | 33,423,343,401,116,515,000,000,000,000,000,000,000 | [
"CWE-19"
] | CVE-2006-5331 | The altivec_unavailable_exception function in arch/powerpc/kernel/traps.c in the Linux kernel before 2.6.19 on 64-bit systems mishandles the case where CONFIG_ALTIVEC is defined and the CPU actually supports Altivec, but the Altivec support was not detected by the kernel, which allows local users to cause a denial of s... | https://nvd.nist.gov/vuln/detail/CVE-2006-5331 |
9,546 | linux | 4dcc29e1574d88f4465ba865ed82800032f76418 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/4dcc29e1574d88f4465ba865ed82800032f76418 | [IA64] Workaround for RSE issue
Problem: An application violating the architectural rules regarding
operation dependencies and having specific Register Stack Engine (RSE)
state at the time of the violation, may result in an illegal operation
fault and invalid RSE state. Such faults may initiate a cascade of
repeated ... | 1 | setup_arch (char **cmdline_p)
{
unw_init();
ia64_patch_vtop((u64) __start___vtop_patchlist, (u64) __end___vtop_patchlist);
*cmdline_p = __va(ia64_boot_param->command_line);
strlcpy(boot_command_line, *cmdline_p, COMMAND_LINE_SIZE);
efi_init();
io_port_init();
#ifdef CONFIG_IA64_GENERIC
/* machvec needs to be... | 30,744,359,066,288,716,000,000,000,000,000,000,000 | setup.c | 23,788,835,942,018,467,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2006-3635 | The ia64 subsystem in the Linux kernel before 2.6.26 allows local users to cause a denial of service (stack consumption and system crash) via a crafted application that leverages the mishandling of invalid Register Stack Engine (RSE) state. | https://nvd.nist.gov/vuln/detail/CVE-2006-3635 |
184,623 | linux | 4dcc29e1574d88f4465ba865ed82800032f76418 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/4dcc29e1574d88f4465ba865ed82800032f76418 | [IA64] Workaround for RSE issue
Problem: An application violating the architectural rules regarding
operation dependencies and having specific Register Stack Engine (RSE)
state at the time of the violation, may result in an illegal operation
fault and invalid RSE state. Such faults may initiate a cascade of
repeated ... | 0 | setup_arch (char **cmdline_p)
{
unw_init();
ia64_patch_vtop((u64) __start___vtop_patchlist, (u64) __end___vtop_patchlist);
*cmdline_p = __va(ia64_boot_param->command_line);
strlcpy(boot_command_line, *cmdline_p, COMMAND_LINE_SIZE);
efi_init();
io_port_init();
#ifdef CONFIG_IA64_GENERIC
/* machvec needs to be... | 300,781,803,370,722,600,000,000,000,000,000,000,000 | setup.c | 194,369,857,924,233,700,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2006-3635 | The ia64 subsystem in the Linux kernel before 2.6.26 allows local users to cause a denial of service (stack consumption and system crash) via a crafted application that leverages the mishandling of invalid Register Stack Engine (RSE) state. | https://nvd.nist.gov/vuln/detail/CVE-2006-3635 |
9,547 | FFmpeg | bab0716c7f4793ec42e05a5aa7e80d82a0dd4e75 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/bab0716c7f4793ec42e05a5aa7e80d82a0dd4e75 | avformat/mxfdec: Fix av_log context
Fixes: out of array access
Fixes: mxf-crash-1c2e59bf07a34675bfb3ada5e1ec22fa9f38f923
Found-by: Paul Ch <paulcher@icloud.com>
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 1 | static int mxf_parse_structural_metadata(MXFContext *mxf)
{
MXFPackage *material_package = NULL;
int i, j, k, ret;
av_log(mxf->fc, AV_LOG_TRACE, "metadata sets count %d\n", mxf->metadata_sets_count);
/* TODO: handle multiple material packages (OP3x) */
for (i = 0; i < mxf->packages_count; i++) {
... | 202,689,793,885,959,200,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2018-1999014 | FFmpeg before commit bab0716c7f4793ec42e05a5aa7e80d82a0dd4e75 contains an out of array access vulnerability in MXF format demuxer that can result in DoS. This attack appear to be exploitable via specially crafted MXF file which has to be provided as input. This vulnerability appears to have been fixed in bab0716c7f4793... | https://nvd.nist.gov/vuln/detail/CVE-2018-1999014 |
184,624 | FFmpeg | bab0716c7f4793ec42e05a5aa7e80d82a0dd4e75 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/bab0716c7f4793ec42e05a5aa7e80d82a0dd4e75 | avformat/mxfdec: Fix av_log context
Fixes: out of array access
Fixes: mxf-crash-1c2e59bf07a34675bfb3ada5e1ec22fa9f38f923
Found-by: Paul Ch <paulcher@icloud.com>
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 0 | static int mxf_parse_structural_metadata(MXFContext *mxf)
{
MXFPackage *material_package = NULL;
int i, j, k, ret;
av_log(mxf->fc, AV_LOG_TRACE, "metadata sets count %d\n", mxf->metadata_sets_count);
/* TODO: handle multiple material packages (OP3x) */
for (i = 0; i < mxf->packages_count; i++) {
... | 135,653,714,441,284,850,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2018-1999014 | FFmpeg before commit bab0716c7f4793ec42e05a5aa7e80d82a0dd4e75 contains an out of array access vulnerability in MXF format demuxer that can result in DoS. This attack appear to be exploitable via specially crafted MXF file which has to be provided as input. This vulnerability appears to have been fixed in bab0716c7f4793... | https://nvd.nist.gov/vuln/detail/CVE-2018-1999014 |
9,548 | linux | 704620afc70cf47abb9d6a1a57f3825d2bca49cf | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/704620afc70cf47abb9d6a1a57f3825d2bca49cf | USB: check usb_get_extra_descriptor for proper size
When reading an extra descriptor, we need to properly check the minimum
and maximum size allowed, to prevent from invalid data being sent by a
device.
Reported-by: Hui Peng <benquike@gmail.com>
Reported-by: Mathias Payer <mathias.payer@nebelwelt.net>
Co-developed-by... | 1 | int __usb_get_extra_descriptor(char *buffer, unsigned size,
unsigned char type, void **ptr)
{
struct usb_descriptor_header *header;
while (size >= sizeof(struct usb_descriptor_header)) {
header = (struct usb_descriptor_header *)buffer;
if (header->bLength < 2) {
printk(KERN_ERR
"%s: bo... | 106,931,598,352,293,150,000,000,000,000,000,000,000 | None | null | [
"CWE-400"
] | CVE-2018-20169 | An issue was discovered in the Linux kernel before 4.19.9. The USB subsystem mishandles size checks during the reading of an extra descriptor, related to __usb_get_extra_descriptor in drivers/usb/core/usb.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-20169 |
184,625 | linux | 704620afc70cf47abb9d6a1a57f3825d2bca49cf | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/704620afc70cf47abb9d6a1a57f3825d2bca49cf | USB: check usb_get_extra_descriptor for proper size
When reading an extra descriptor, we need to properly check the minimum
and maximum size allowed, to prevent from invalid data being sent by a
device.
Reported-by: Hui Peng <benquike@gmail.com>
Reported-by: Mathias Payer <mathias.payer@nebelwelt.net>
Co-developed-by... | 0 | int __usb_get_extra_descriptor(char *buffer, unsigned size,
unsigned char type, void **ptr, size_t minsize)
{
struct usb_descriptor_header *header;
while (size >= sizeof(struct usb_descriptor_header)) {
header = (struct usb_descriptor_header *)buffer;
if (header->bLength < 2 || header->bLength ... | 17,078,198,138,476,864,000,000,000,000,000,000,000 | None | null | [
"CWE-400"
] | CVE-2018-20169 | An issue was discovered in the Linux kernel before 4.19.9. The USB subsystem mishandles size checks during the reading of an extra descriptor, related to __usb_get_extra_descriptor in drivers/usb/core/usb.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-20169 |
9,553 | ImageMagick | 76efa969342568841ecf320b5a041685a6d24e0b | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/76efa969342568841ecf320b5a041685a6d24e0b | https://github.com/ImageMagick/ImageMagick/issues/1201 | 1 | static Image *ReadOneJNGImage(MngInfo *mng_info,
const ImageInfo *image_info, ExceptionInfo *exception)
{
Image
*alpha_image,
*color_image,
*image,
*jng_image;
ImageInfo
*alpha_image_info,
*color_image_info;
MagickBooleanType
logging;
ssize_t
y;
MagickBooleanType
st... | 222,028,886,100,808,540,000,000,000,000,000,000,000 | png.c | 142,721,393,521,923,200,000,000,000,000,000,000,000 | [
"CWE-772"
] | CVE-2018-16640 | ImageMagick 7.0.8-5 has a memory leak vulnerability in the function ReadOneJNGImage in coders/png.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-16640 |
184,629 | ImageMagick | 76efa969342568841ecf320b5a041685a6d24e0b | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/76efa969342568841ecf320b5a041685a6d24e0b | https://github.com/ImageMagick/ImageMagick/issues/1201 | 0 | static Image *ReadOneJNGImage(MngInfo *mng_info,
const ImageInfo *image_info, ExceptionInfo *exception)
{
Image
*alpha_image,
*color_image,
*image,
*jng_image;
ImageInfo
*alpha_image_info,
*color_image_info;
MagickBooleanType
logging;
ssize_t
y;
MagickBooleanType
st... | 83,327,144,052,370,470,000,000,000,000,000,000,000 | png.c | 166,883,469,564,539,470,000,000,000,000,000,000,000 | [
"CWE-772"
] | CVE-2018-16640 | ImageMagick 7.0.8-5 has a memory leak vulnerability in the function ReadOneJNGImage in coders/png.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-16640 |
9,564 | linux | cb2595c1393b4a5211534e6f0a0fbad369e21ad8 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/cb2595c1393b4a5211534e6f0a0fbad369e21ad8 | infiniband: fix a possible use-after-free bug
ucma_process_join() will free the new allocated "mc" struct,
if there is any error after that, especially the copy_to_user().
But in parallel, ucma_leave_multicast() could find this "mc"
through idr_find() before ucma_process_join() frees it, since it
is already published... | 1 | static ssize_t ucma_process_join(struct ucma_file *file,
struct rdma_ucm_join_mcast *cmd, int out_len)
{
struct rdma_ucm_create_id_resp resp;
struct ucma_context *ctx;
struct ucma_multicast *mc;
struct sockaddr *addr;
int ret;
u8 join_state;
if (out_len < sizeof(resp))
return -ENOSPC;
addr = (struct s... | 215,561,590,485,077,280,000,000,000,000,000,000,000 | ucma.c | 329,077,903,464,487,270,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2018-14734 | drivers/infiniband/core/ucma.c in the Linux kernel through 4.17.11 allows ucma_leave_multicast to access a certain data structure after a cleanup step in ucma_process_join, which allows attackers to cause a denial of service (use-after-free). | https://nvd.nist.gov/vuln/detail/CVE-2018-14734 |
184,638 | linux | cb2595c1393b4a5211534e6f0a0fbad369e21ad8 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/cb2595c1393b4a5211534e6f0a0fbad369e21ad8 | infiniband: fix a possible use-after-free bug
ucma_process_join() will free the new allocated "mc" struct,
if there is any error after that, especially the copy_to_user().
But in parallel, ucma_leave_multicast() could find this "mc"
through idr_find() before ucma_process_join() frees it, since it
is already published... | 0 | static ssize_t ucma_process_join(struct ucma_file *file,
struct rdma_ucm_join_mcast *cmd, int out_len)
{
struct rdma_ucm_create_id_resp resp;
struct ucma_context *ctx;
struct ucma_multicast *mc;
struct sockaddr *addr;
int ret;
u8 join_state;
if (out_len < sizeof(resp))
return -ENOSPC;
addr = (struct s... | 322,726,665,261,420,380,000,000,000,000,000,000,000 | ucma.c | 201,536,275,764,309,540,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2018-14734 | drivers/infiniband/core/ucma.c in the Linux kernel through 4.17.11 allows ucma_leave_multicast to access a certain data structure after a cleanup step in ucma_process_join, which allows attackers to cause a denial of service (use-after-free). | https://nvd.nist.gov/vuln/detail/CVE-2018-14734 |
9,566 | neomutt | 9e927affe3a021175f354af5fa01d22657c20585 | https://github.com/neomutt/neomutt | https://github.com/neomutt/neomutt/commit/9e927affe3a021175f354af5fa01d22657c20585 | Add alloc fail check in nntp_fetch_headers | 1 | static int nntp_fetch_headers(struct Context *ctx, void *hc, anum_t first,
anum_t last, int restore)
{
struct NntpData *nntp_data = ctx->data;
struct FetchCtx fc;
struct Header *hdr = NULL;
char buf[HUGE_STRING];
int rc = 0;
int oldmsgcount = ctx->msgcount;
anum_t current;
... | 63,790,838,672,285,430,000,000,000,000,000,000,000 | nntp.c | 78,438,500,915,793,575,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2018-14361 | An issue was discovered in NeoMutt before 2018-07-16. nntp.c proceeds even if memory allocation fails for messages data. | https://nvd.nist.gov/vuln/detail/CVE-2018-14361 |
184,639 | neomutt | 9e927affe3a021175f354af5fa01d22657c20585 | https://github.com/neomutt/neomutt | https://github.com/neomutt/neomutt/commit/9e927affe3a021175f354af5fa01d22657c20585 | Add alloc fail check in nntp_fetch_headers | 0 | static int nntp_fetch_headers(struct Context *ctx, void *hc, anum_t first,
anum_t last, int restore)
{
struct NntpData *nntp_data = ctx->data;
struct FetchCtx fc;
struct Header *hdr = NULL;
char buf[HUGE_STRING];
int rc = 0;
int oldmsgcount = ctx->msgcount;
anum_t current;
... | 115,049,996,555,630,300,000,000,000,000,000,000,000 | nntp.c | 194,967,636,491,301,620,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2018-14361 | An issue was discovered in NeoMutt before 2018-07-16. nntp.c proceeds even if memory allocation fails for messages data. | https://nvd.nist.gov/vuln/detail/CVE-2018-14361 |
9,570 | linux | f7068114d45ec55996b9040e98111afa56e010fe | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/f7068114d45ec55996b9040e98111afa56e010fe | sr: pass down correctly sized SCSI sense buffer
We're casting the CDROM layer request_sense to the SCSI sense
buffer, but the former is 64 bytes and the latter is 96 bytes.
As we generally allocate these on the stack, we end up blowing
up the stack.
Fix this by wrapping the scsi_execute() call with a properly
sized s... | 1 | int sr_do_ioctl(Scsi_CD *cd, struct packet_command *cgc)
{
struct scsi_device *SDev;
struct scsi_sense_hdr sshdr;
int result, err = 0, retries = 0;
SDev = cd->device;
retry:
if (!scsi_block_when_processing_errors(SDev)) {
err = -ENODEV;
goto out;
}
result = scsi_execute(SDev, cgc->cmd, ... | 19,624,638,673,498,000,000,000,000,000,000,000,000 | sr_ioctl.c | 119,618,448,393,103,850,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-11506 | The sr_do_ioctl function in drivers/scsi/sr_ioctl.c in the Linux kernel through 4.16.12 allows local users to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact because sense buffers have different sizes at the CDROM layer and the SCSI layer, as demonstrated by a CDROMREAD... | https://nvd.nist.gov/vuln/detail/CVE-2018-11506 |
184,645 | linux | f7068114d45ec55996b9040e98111afa56e010fe | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/f7068114d45ec55996b9040e98111afa56e010fe | sr: pass down correctly sized SCSI sense buffer
We're casting the CDROM layer request_sense to the SCSI sense
buffer, but the former is 64 bytes and the latter is 96 bytes.
As we generally allocate these on the stack, we end up blowing
up the stack.
Fix this by wrapping the scsi_execute() call with a properly
sized s... | 0 | int sr_do_ioctl(Scsi_CD *cd, struct packet_command *cgc)
{
struct scsi_device *SDev;
struct scsi_sense_hdr sshdr;
int result, err = 0, retries = 0;
unsigned char sense_buffer[SCSI_SENSE_BUFFERSIZE], *senseptr = NULL;
SDev = cd->device;
if (cgc->sense)
senseptr = sense_buffer;
retry:
if (!scsi_... | 46,843,887,070,495,610,000,000,000,000,000,000,000 | sr_ioctl.c | 104,410,678,755,399,140,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-11506 | The sr_do_ioctl function in drivers/scsi/sr_ioctl.c in the Linux kernel through 4.16.12 allows local users to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact because sense buffers have different sizes at the CDROM layer and the SCSI layer, as demonstrated by a CDROMREAD... | https://nvd.nist.gov/vuln/detail/CVE-2018-11506 |
9,577 | libgit2 | 58a6fe94cb851f71214dbefac3f9bffee437d6fe | https://github.com/libgit2/libgit2 | https://github.com/libgit2/libgit2/commit/58a6fe94cb851f71214dbefac3f9bffee437d6fe | index: convert `read_entry` to return entry size via an out-param
The function `read_entry` does not conform to our usual coding style of
returning stuff via the out parameter and to use the return value for
reporting errors. Due to most of our code conforming to that pattern, it
has become quite natural for us to act... | 1 | static size_t read_entry(
git_index_entry **out,
git_index *index,
const void *buffer,
size_t buffer_size,
const char *last)
{
size_t path_length, entry_size;
const char *path_ptr;
struct entry_short source;
git_index_entry entry = {{0}};
bool compressed = index->version >= INDEX_VERSION_NUMBER_COMP;
ch... | 109,487,150,090,997,030,000,000,000,000,000,000,000 | index.c | 162,215,619,332,483,000,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2018-8099 | Incorrect returning of an error code in the index.c:read_entry() function leads to a double free in libgit2 before v0.26.2, which allows an attacker to cause a denial of service via a crafted repository index file. | https://nvd.nist.gov/vuln/detail/CVE-2018-8099 |
184,652 | libgit2 | 58a6fe94cb851f71214dbefac3f9bffee437d6fe | https://github.com/libgit2/libgit2 | https://github.com/libgit2/libgit2/commit/58a6fe94cb851f71214dbefac3f9bffee437d6fe | index: convert `read_entry` to return entry size via an out-param
The function `read_entry` does not conform to our usual coding style of
returning stuff via the out parameter and to use the return value for
reporting errors. Due to most of our code conforming to that pattern, it
has become quite natural for us to act... | 0 | static size_t read_entry(
static int read_entry(
git_index_entry **out,
size_t *out_size,
git_index *index,
const void *buffer,
size_t buffer_size,
const char *last)
{
size_t path_length, entry_size;
const char *path_ptr;
struct entry_short source;
git_index_entry entry = {{0}};
bool compressed = index->... | 116,430,469,860,629,450,000,000,000,000,000,000,000 | None | null | [
"CWE-415"
] | CVE-2018-8099 | Incorrect returning of an error code in the index.c:read_entry() function leads to a double free in libgit2 before v0.26.2, which allows an attacker to cause a denial of service via a crafted repository index file. | https://nvd.nist.gov/vuln/detail/CVE-2018-8099 |
9,581 | linux | 250c6c49e3b68756b14983c076183568636e2bde | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/250c6c49e3b68756b14983c076183568636e2bde | fbdev: Fixing arbitrary kernel leak in case FBIOGETCMAP_SPARC in sbusfb_ioctl_helper().
Fixing arbitrary kernel leak in case FBIOGETCMAP_SPARC in
sbusfb_ioctl_helper().
'index' is defined as an int in sbusfb_ioctl_helper().
We retrieve this from the user:
if (get_user(index, &c->index) ||
__get_user(count, &c->co... | 1 | int sbusfb_ioctl_helper(unsigned long cmd, unsigned long arg,
struct fb_info *info,
int type, int fb_depth, unsigned long fb_size)
{
switch(cmd) {
case FBIOGTYPE: {
struct fbtype __user *f = (struct fbtype __user *) arg;
if (put_user(type, &f->fb_type) ||
__put_user(info->var.yres, &f->fb_height) ||
... | 140,708,769,976,939,500,000,000,000,000,000,000,000 | sbuslib.c | 169,305,828,568,889,900,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2018-6412 | In the function sbusfb_ioctl_helper() in drivers/video/fbdev/sbuslib.c in the Linux kernel through 4.15, an integer signedness error allows arbitrary information leakage for the FBIOPUTCMAP_SPARC and FBIOGETCMAP_SPARC commands. | https://nvd.nist.gov/vuln/detail/CVE-2018-6412 |
184,656 | linux | 250c6c49e3b68756b14983c076183568636e2bde | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/250c6c49e3b68756b14983c076183568636e2bde | fbdev: Fixing arbitrary kernel leak in case FBIOGETCMAP_SPARC in sbusfb_ioctl_helper().
Fixing arbitrary kernel leak in case FBIOGETCMAP_SPARC in
sbusfb_ioctl_helper().
'index' is defined as an int in sbusfb_ioctl_helper().
We retrieve this from the user:
if (get_user(index, &c->index) ||
__get_user(count, &c->co... | 0 | int sbusfb_ioctl_helper(unsigned long cmd, unsigned long arg,
struct fb_info *info,
int type, int fb_depth, unsigned long fb_size)
{
switch(cmd) {
case FBIOGTYPE: {
struct fbtype __user *f = (struct fbtype __user *) arg;
if (put_user(type, &f->fb_type) ||
__put_user(info->var.yres, &f->fb_height) ||
... | 51,336,586,153,410,510,000,000,000,000,000,000,000 | sbuslib.c | 45,729,126,392,189,520,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2018-6412 | In the function sbusfb_ioctl_helper() in drivers/video/fbdev/sbuslib.c in the Linux kernel through 4.15, an integer signedness error allows arbitrary information leakage for the FBIOPUTCMAP_SPARC and FBIOGETCMAP_SPARC commands. | https://nvd.nist.gov/vuln/detail/CVE-2018-6412 |
9,582 | linux | 7d11f77f84b27cef452cee332f4e469503084737 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7d11f77f84b27cef452cee332f4e469503084737 | RDS: null pointer dereference in rds_atomic_free_op
set rm->atomic.op_active to 0 when rds_pin_pages() fails
or the user supplied address is invalid,
this prevents a NULL pointer usage in rds_atomic_free_op()
Signed-off-by: Mohamed Ghannam <simo.ghannam@gmail.com>
Acked-by: Santosh Shilimkar <santosh.shilimkar@oracle... | 1 | int rds_cmsg_atomic(struct rds_sock *rs, struct rds_message *rm,
struct cmsghdr *cmsg)
{
struct page *page = NULL;
struct rds_atomic_args *args;
int ret = 0;
if (cmsg->cmsg_len < CMSG_LEN(sizeof(struct rds_atomic_args))
|| rm->atomic.op_active)
return -EINVAL;
args = CMSG_DATA(cmsg);
/* Nonmasked & m... | 53,707,930,125,692,390,000,000,000,000,000,000,000 | rdma.c | 236,152,132,911,027,400,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2018-5333 | In the Linux kernel through 4.14.13, the rds_cmsg_atomic function in net/rds/rdma.c mishandles cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference. | https://nvd.nist.gov/vuln/detail/CVE-2018-5333 |
184,657 | linux | 7d11f77f84b27cef452cee332f4e469503084737 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/7d11f77f84b27cef452cee332f4e469503084737 | RDS: null pointer dereference in rds_atomic_free_op
set rm->atomic.op_active to 0 when rds_pin_pages() fails
or the user supplied address is invalid,
this prevents a NULL pointer usage in rds_atomic_free_op()
Signed-off-by: Mohamed Ghannam <simo.ghannam@gmail.com>
Acked-by: Santosh Shilimkar <santosh.shilimkar@oracle... | 0 | int rds_cmsg_atomic(struct rds_sock *rs, struct rds_message *rm,
struct cmsghdr *cmsg)
{
struct page *page = NULL;
struct rds_atomic_args *args;
int ret = 0;
if (cmsg->cmsg_len < CMSG_LEN(sizeof(struct rds_atomic_args))
|| rm->atomic.op_active)
return -EINVAL;
args = CMSG_DATA(cmsg);
/* Nonmasked & m... | 285,791,403,384,478,530,000,000,000,000,000,000,000 | rdma.c | 245,834,273,113,460,700,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2018-5333 | In the Linux kernel through 4.14.13, the rds_cmsg_atomic function in net/rds/rdma.c mishandles cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference. | https://nvd.nist.gov/vuln/detail/CVE-2018-5333 |
9,591 | linux | 687cb0884a714ff484d038e9190edc874edcf146 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/687cb0884a714ff484d038e9190edc874edcf146 | mm, oom_reaper: gather each vma to prevent leaking TLB entry
tlb_gather_mmu(&tlb, mm, 0, -1) means gathering the whole virtual memory
space. In this case, tlb->fullmm is true. Some archs like arm64
doesn't flush TLB when tlb->fullmm is true:
commit 5a7862e83000 ("arm64: tlbflush: avoid flushing when fullmm == 1")... | 1 | static bool __oom_reap_task_mm(struct task_struct *tsk, struct mm_struct *mm)
{
struct mmu_gather tlb;
struct vm_area_struct *vma;
bool ret = true;
/*
* We have to make sure to not race with the victim exit path
* and cause premature new oom victim selection:
* __oom_reap_task_mm exit_mm
* mmget_not_zer... | 210,432,325,877,869,770,000,000,000,000,000,000,000 | oom_kill.c | 34,517,807,293,828,100,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2017-18202 | The __oom_reap_task_mm function in mm/oom_kill.c in the Linux kernel before 4.14.4 mishandles gather operations, which allows attackers to cause a denial of service (TLB entry leak or use-after-free) or possibly have unspecified other impact by triggering a copy_to_user call within a certain time window. | https://nvd.nist.gov/vuln/detail/CVE-2017-18202 |
184,664 | linux | 687cb0884a714ff484d038e9190edc874edcf146 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/687cb0884a714ff484d038e9190edc874edcf146 | mm, oom_reaper: gather each vma to prevent leaking TLB entry
tlb_gather_mmu(&tlb, mm, 0, -1) means gathering the whole virtual memory
space. In this case, tlb->fullmm is true. Some archs like arm64
doesn't flush TLB when tlb->fullmm is true:
commit 5a7862e83000 ("arm64: tlbflush: avoid flushing when fullmm == 1")... | 0 | static bool __oom_reap_task_mm(struct task_struct *tsk, struct mm_struct *mm)
{
struct mmu_gather tlb;
struct vm_area_struct *vma;
bool ret = true;
/*
* We have to make sure to not race with the victim exit path
* and cause premature new oom victim selection:
* __oom_reap_task_mm exit_mm
* mmget_not_zer... | 262,956,396,515,299,320,000,000,000,000,000,000,000 | oom_kill.c | 76,761,435,979,865,940,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2017-18202 | The __oom_reap_task_mm function in mm/oom_kill.c in the Linux kernel before 4.14.4 mishandles gather operations, which allows attackers to cause a denial of service (TLB entry leak or use-after-free) or possibly have unspecified other impact by triggering a copy_to_user call within a certain time window. | https://nvd.nist.gov/vuln/detail/CVE-2017-18202 |
9,592 | jasper | aa0b0f79ade5eef8b0e7a214c03f5af54b36ba7d | https://github.com/mdadams/jasper | https://github.com/mdadams/jasper/commit/aa0b0f79ade5eef8b0e7a214c03f5af54b36ba7d | Fixed numerous integer overflow problems in the code for packet iterators
in the JPC decoder. | 1 | static int jpc_pi_nextpcrl(register jpc_pi_t *pi)
{
int rlvlno;
jpc_pirlvl_t *pirlvl;
jpc_pchg_t *pchg;
int prchind;
int prcvind;
int *prclyrno;
int compno;
jpc_picomp_t *picomp;
int xstep;
int ystep;
uint_fast32_t trx0;
uint_fast32_t try0;
uint_fast32_t r;
uint_fast32_t rpx;
uint_fast32_t rpy;
pchg = ... | 143,438,351,204,945,960,000,000,000,000,000,000,000 | jpc_t2cod.c | 159,588,622,480,218,420,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2016-9583 | An out-of-bounds heap read vulnerability was found in the jpc_pi_nextpcrl() function of jasper before 2.0.6 when processing crafted input. | https://nvd.nist.gov/vuln/detail/CVE-2016-9583 |
184,665 | jasper | aa0b0f79ade5eef8b0e7a214c03f5af54b36ba7d | https://github.com/mdadams/jasper | https://github.com/mdadams/jasper/commit/aa0b0f79ade5eef8b0e7a214c03f5af54b36ba7d | Fixed numerous integer overflow problems in the code for packet iterators
in the JPC decoder. | 0 | static int jpc_pi_nextpcrl(register jpc_pi_t *pi)
{
int rlvlno;
jpc_pirlvl_t *pirlvl;
jpc_pchg_t *pchg;
int prchind;
int prcvind;
int *prclyrno;
int compno;
jpc_picomp_t *picomp;
int xstep;
int ystep;
uint_fast32_t trx0;
uint_fast32_t try0;
uint_fast32_t r;
uint_fast32_t rpx;
uint_fast32_t rpy;
pchg = ... | 141,712,621,339,828,340,000,000,000,000,000,000,000 | jpc_t2cod.c | 308,812,337,262,584,700,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2016-9583 | An out-of-bounds heap read vulnerability was found in the jpc_pi_nextpcrl() function of jasper before 2.0.6 when processing crafted input. | https://nvd.nist.gov/vuln/detail/CVE-2016-9583 |
9,595 | suricata | d8634daf74c882356659addb65fb142b738a186b | https://github.com/OISF/suricata | https://github.com/OISF/suricata/commit/d8634daf74c882356659addb65fb142b738a186b | stream: fix false negative on bad RST
If a bad RST was received the stream inspection would not happen
for that packet, but it would still move the 'raw progress' tracker
forward. Following good packets would then fail to detect anything
before the 'raw progress' position.
Bug #2770
Reported-by: Alexey Vishnyakov | 1 | static void DetectRunCleanup(DetectEngineThreadCtx *det_ctx,
Packet *p, Flow * const pflow)
{
PACKET_PROFILING_DETECT_START(p, PROF_DETECT_CLEANUP);
/* cleanup pkt specific part of the patternmatcher */
PacketPatternCleanup(det_ctx);
if (pflow != NULL) {
/* update inspected tracker f... | 199,138,939,076,611,400,000,000,000,000,000,000,000 | detect.c | 146,865,518,338,528,100,000,000,000,000,000,000,000 | [
"CWE-347"
] | CVE-2019-1010279 | Open Information Security Foundation Suricata prior to version 4.1.3 is affected by: Denial of Service - TCP/HTTP detection bypass. The impact is: An attacker can evade a signature detection with a specialy formed sequence of network packets. The component is: detect.c (https://github.com/OISF/suricata/pull/3625/commit... | https://nvd.nist.gov/vuln/detail/CVE-2019-1010279 |
184,667 | suricata | d8634daf74c882356659addb65fb142b738a186b | https://github.com/OISF/suricata | https://github.com/OISF/suricata/commit/d8634daf74c882356659addb65fb142b738a186b | stream: fix false negative on bad RST
If a bad RST was received the stream inspection would not happen
for that packet, but it would still move the 'raw progress' tracker
forward. Following good packets would then fail to detect anything
before the 'raw progress' position.
Bug #2770
Reported-by: Alexey Vishnyakov | 0 | static void DetectRunCleanup(DetectEngineThreadCtx *det_ctx,
Packet *p, Flow * const pflow)
{
PACKET_PROFILING_DETECT_START(p, PROF_DETECT_CLEANUP);
/* cleanup pkt specific part of the patternmatcher */
PacketPatternCleanup(det_ctx);
if (pflow != NULL) {
/* update inspected tracker f... | 264,828,872,860,133,660,000,000,000,000,000,000,000 | detect.c | 322,747,998,482,219,100,000,000,000,000,000,000,000 | [
"CWE-347"
] | CVE-2019-1010279 | Open Information Security Foundation Suricata prior to version 4.1.3 is affected by: Denial of Service - TCP/HTTP detection bypass. The impact is: An attacker can evade a signature detection with a specialy formed sequence of network packets. The component is: detect.c (https://github.com/OISF/suricata/pull/3625/commit... | https://nvd.nist.gov/vuln/detail/CVE-2019-1010279 |
9,596 | libvips | ce684dd008532ea0bf9d4a1d89bacb35f4a83f4d | https://github.com/libvips/libvips | https://github.com/libvips/libvips/commit/ce684dd008532ea0bf9d4a1d89bacb35f4a83f4d | fetch map after DGifGetImageDesc()
Earlier refactoring broke GIF map fetch. | 1 | vips_foreign_load_gif_scan_image( VipsForeignLoadGif *gif )
{
VipsObjectClass *class = VIPS_OBJECT_GET_CLASS( gif );
GifFileType *file = gif->file;
ColorMapObject *map = file->Image.ColorMap ?
file->Image.ColorMap : file->SColorMap;
GifByteType *extension;
if( DGifGetImageDesc( gif->file ) == GIF_ERROR... | 85,832,030,463,082,010,000,000,000,000,000,000,000 | gifload.c | 169,810,479,207,440,950,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2019-17534 | vips_foreign_load_gif_scan_image in foreign/gifload.c in libvips before 8.8.2 tries to access a color map before a DGifGetImageDesc call, leading to a use-after-free. | https://nvd.nist.gov/vuln/detail/CVE-2019-17534 |
184,669 | libvips | ce684dd008532ea0bf9d4a1d89bacb35f4a83f4d | https://github.com/libvips/libvips | https://github.com/libvips/libvips/commit/ce684dd008532ea0bf9d4a1d89bacb35f4a83f4d | fetch map after DGifGetImageDesc()
Earlier refactoring broke GIF map fetch. | 0 | vips_foreign_load_gif_scan_image( VipsForeignLoadGif *gif )
{
VipsObjectClass *class = VIPS_OBJECT_GET_CLASS( gif );
GifFileType *file = gif->file;
ColorMapObject *map;
GifByteType *extension;
if( DGifGetImageDesc( gif->file ) == GIF_ERROR ) {
vips_foreign_load_gif_error( gif );
return( -1 );
}
/... | 101,080,913,960,963,160,000,000,000,000,000,000,000 | gifload.c | 312,966,949,570,964,200,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2019-17534 | vips_foreign_load_gif_scan_image in foreign/gifload.c in libvips before 8.8.2 tries to access a color map before a DGifGetImageDesc call, leading to a use-after-free. | https://nvd.nist.gov/vuln/detail/CVE-2019-17534 |
9,597 | matio | 651a8e28099edb5fbb9e4e1d4d3238848f446c9a | https://github.com/tbeu/matio | https://github.com/tbeu/matio/commit/651a8e28099edb5fbb9e4e1d4d3238848f446c9a | Avoid uninitialized memory
As reported by https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16856 | 1 | Mat_VarReadNextInfo4(mat_t *mat)
{
int M,O,data_type,class_type;
mat_int32_t tmp;
long nBytes;
size_t readresult;
matvar_t *matvar = NULL;
union {
mat_uint32_t u;
mat_uint8_t c[4];
} endian;
if ( mat == NULL || mat->fp == NULL )
return NULL;
el... | 283,675,808,883,276,520,000,000,000,000,000,000,000 | mat4.c | 297,796,931,425,830,640,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2019-17533 | Mat_VarReadNextInfo4 in mat4.c in MATIO 1.5.17 omits a certain '\0' character, leading to a heap-based buffer over-read in strdup_vprintf when uninitialized memory is accessed. | https://nvd.nist.gov/vuln/detail/CVE-2019-17533 |
184,670 | matio | 651a8e28099edb5fbb9e4e1d4d3238848f446c9a | https://github.com/tbeu/matio | https://github.com/tbeu/matio/commit/651a8e28099edb5fbb9e4e1d4d3238848f446c9a | Avoid uninitialized memory
As reported by https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16856 | 0 | Mat_VarReadNextInfo4(mat_t *mat)
{
int M,O,data_type,class_type;
mat_int32_t tmp;
long nBytes;
size_t readresult;
matvar_t *matvar = NULL;
union {
mat_uint32_t u;
mat_uint8_t c[4];
} endian;
if ( mat == NULL || mat->fp == NULL )
return NULL;
el... | 139,703,846,613,261,640,000,000,000,000,000,000,000 | mat4.c | 249,820,899,233,110,900,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2019-17533 | Mat_VarReadNextInfo4 in mat4.c in MATIO 1.5.17 omits a certain '\0' character, leading to a heap-based buffer over-read in strdup_vprintf when uninitialized memory is accessed. | https://nvd.nist.gov/vuln/detail/CVE-2019-17533 |
9,600 | OpenSC | a3fc7693f3a035a8a7921cffb98432944bb42740 | https://github.com/OpenSC/OpenSC | https://github.com/OpenSC/OpenSC/commit/a3fc7693f3a035a8a7921cffb98432944bb42740 | Fixed out of bounds access in ASN.1 Octet string
Credit to OSS-Fuzz | 1 | static int asn1_decode_entry(sc_context_t *ctx,struct sc_asn1_entry *entry,
const u8 *obj, size_t objlen, int depth)
{
void *parm = entry->parm;
int (*callback_func)(sc_context_t *nctx, void *arg, const u8 *nobj,
size_t nobjlen, int ndepth);
size_t *len = (size_t *) entry->arg;
int r = 0;
callback... | 69,488,774,016,521,850,000,000,000,000,000,000,000 | asn1.c | 327,585,171,356,570,960,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2019-15946 | OpenSC before 0.20.0-rc1 has an out-of-bounds access of an ASN.1 Octet string in asn1_decode_entry in libopensc/asn1.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-15946 |
184,673 | OpenSC | a3fc7693f3a035a8a7921cffb98432944bb42740 | https://github.com/OpenSC/OpenSC | https://github.com/OpenSC/OpenSC/commit/a3fc7693f3a035a8a7921cffb98432944bb42740 | Fixed out of bounds access in ASN.1 Octet string
Credit to OSS-Fuzz | 0 | static int asn1_decode_entry(sc_context_t *ctx,struct sc_asn1_entry *entry,
const u8 *obj, size_t objlen, int depth)
{
void *parm = entry->parm;
int (*callback_func)(sc_context_t *nctx, void *arg, const u8 *nobj,
size_t nobjlen, int ndepth);
size_t *len = (size_t *) entry->arg;
int r = 0;
callback... | 202,564,784,172,260,040,000,000,000,000,000,000,000 | asn1.c | 20,036,034,663,220,034,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2019-15946 | OpenSC before 0.20.0-rc1 has an out-of-bounds access of an ASN.1 Octet string in asn1_decode_entry in libopensc/asn1.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-15946 |
9,609 | ImageMagick6 | 91e58d967a92250439ede038ccfb0913a81e59fe | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/91e58d967a92250439ede038ccfb0913a81e59fe | https://github.com/ImageMagick/ImageMagick/issues/1615 | 1 | static MagickPixelPacket **AcquirePixelThreadSet(const Image *images)
{
const Image
*next;
MagickPixelPacket
**pixels;
register ssize_t
i,
j;
size_t
columns,
number_threads;
number_threads=(size_t) GetMagickResourceLimit(ThreadResource);
pixels=(MagickPixelPacket **) AcquireQ... | 240,210,483,832,148,400,000,000,000,000,000,000,000 | statistic.c | 62,577,200,016,171,590,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2019-13307 | ImageMagick 7.0.8-50 Q16 has a heap-based buffer overflow at MagickCore/statistic.c in EvaluateImages because of mishandling rows. | https://nvd.nist.gov/vuln/detail/CVE-2019-13307 |
184,681 | ImageMagick6 | 91e58d967a92250439ede038ccfb0913a81e59fe | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/91e58d967a92250439ede038ccfb0913a81e59fe | https://github.com/ImageMagick/ImageMagick/issues/1615 | 0 | static MagickPixelPacket **AcquirePixelThreadSet(const Image *images)
{
const Image
*next;
MagickPixelPacket
**pixels;
register ssize_t
i,
j;
size_t
columns,
rows;
rows=MagickMax(GetImageListLength(images),
(size_t) GetMagickResourceLimit(ThreadResource));
pixels=(MagickP... | 131,386,159,077,571,550,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2019-13307 | ImageMagick 7.0.8-50 Q16 has a heap-based buffer overflow at MagickCore/statistic.c in EvaluateImages because of mishandling rows. | https://nvd.nist.gov/vuln/detail/CVE-2019-13307 |
9,611 | ImageMagick | fe5f4b85e6b1b54d3b4588a77133c06ade46d891 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/fe5f4b85e6b1b54d3b4588a77133c06ade46d891 | https://github.com/ImageMagick/ImageMagick/issues/1602 | 1 | static MagickOffsetType TIFFSeekCustomStream(const MagickOffsetType offset,
const int whence,void *user_data)
{
PhotoshopProfile
*profile;
profile=(PhotoshopProfile *) user_data;
switch (whence)
{
case SEEK_SET:
default:
{
if (offset < 0)
return(-1);
profile->offset=offset... | 41,710,944,332,559,617,000,000,000,000,000,000,000 | tiff.c | 316,057,833,404,137,560,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2019-13136 | ImageMagick before 7.0.8-50 has an integer overflow vulnerability in the function TIFFSeekCustomStream in coders/tiff.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-13136 |
184,683 | ImageMagick | fe5f4b85e6b1b54d3b4588a77133c06ade46d891 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/fe5f4b85e6b1b54d3b4588a77133c06ade46d891 | https://github.com/ImageMagick/ImageMagick/issues/1602 | 0 | static MagickOffsetType TIFFSeekCustomStream(const MagickOffsetType offset,
const int whence,void *user_data)
{
PhotoshopProfile
*profile;
profile=(PhotoshopProfile *) user_data;
switch (whence)
{
case SEEK_SET:
default:
{
if (offset < 0)
return(-1);
profile->offset=offset... | 120,785,237,617,281,760,000,000,000,000,000,000,000 | tiff.c | 44,253,922,806,073,120,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2019-13136 | ImageMagick before 7.0.8-50 has an integer overflow vulnerability in the function TIFFSeekCustomStream in coders/tiff.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-13136 |
9,613 | linux | 385097a3675749cbc9e97c085c0e5dfe4269ca51 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/385097a3675749cbc9e97c085c0e5dfe4269ca51 | nfc: Ensure presence of required attributes in the deactivate_target handler
Check that the NFC_ATTR_TARGET_INDEX attributes (in addition to
NFC_ATTR_DEVICE_INDEX) are provided by the netlink client prior to
accessing them. This prevents potential unhandled NULL pointer dereference
exceptions which can be triggered by... | 1 | static int nfc_genl_deactivate_target(struct sk_buff *skb,
struct genl_info *info)
{
struct nfc_dev *dev;
u32 device_idx, target_idx;
int rc;
if (!info->attrs[NFC_ATTR_DEVICE_INDEX])
return -EINVAL;
device_idx = nla_get_u32(info->attrs[NFC_ATTR_DEVICE_INDEX]);
dev = nfc_get_device(device_idx)... | 321,500,771,127,873,160,000,000,000,000,000,000,000 | netlink.c | 108,702,105,730,330,880,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2019-12984 | A NULL pointer dereference vulnerability in the function nfc_genl_deactivate_target() in net/nfc/netlink.c in the Linux kernel before 5.1.13 can be triggered by a malicious user-mode program that omits certain NFC attributes, leading to denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2019-12984 |
184,685 | linux | 385097a3675749cbc9e97c085c0e5dfe4269ca51 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/385097a3675749cbc9e97c085c0e5dfe4269ca51 | nfc: Ensure presence of required attributes in the deactivate_target handler
Check that the NFC_ATTR_TARGET_INDEX attributes (in addition to
NFC_ATTR_DEVICE_INDEX) are provided by the netlink client prior to
accessing them. This prevents potential unhandled NULL pointer dereference
exceptions which can be triggered by... | 0 | static int nfc_genl_deactivate_target(struct sk_buff *skb,
struct genl_info *info)
{
struct nfc_dev *dev;
u32 device_idx, target_idx;
int rc;
if (!info->attrs[NFC_ATTR_DEVICE_INDEX] ||
!info->attrs[NFC_ATTR_TARGET_INDEX])
return -EINVAL;
device_idx = nla_get_u32(info->attrs[NFC_ATTR_DEVICE... | 272,292,785,777,929,500,000,000,000,000,000,000,000 | netlink.c | 291,373,697,328,931,870,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2019-12984 | A NULL pointer dereference vulnerability in the function nfc_genl_deactivate_target() in net/nfc/netlink.c in the Linux kernel before 5.1.13 can be triggered by a malicious user-mode program that omits certain NFC attributes, leading to denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2019-12984 |
9,614 | miniupnp | bec6ccec63cadc95655721bc0e1dd49dac759d94 | https://github.com/miniupnp/miniupnp | https://github.com/miniupnp/miniupnp/commit/bec6ccec63cadc95655721bc0e1dd49dac759d94 | upnp_event_prepare(): check the return value of snprintf() | 1 | static void upnp_event_prepare(struct upnp_event_notify * obj)
{
static const char notifymsg[] =
"NOTIFY %s HTTP/1.1\r\n"
"Host: %s%s\r\n"
#if (UPNP_VERSION_MAJOR == 1) && (UPNP_VERSION_MINOR == 0)
"Content-Type: text/xml\r\n" /* UDA v1.0 */
#else
"Content-Type: text/xml; charset=\"utf-8\"\r\n" /* UDA v1.1 or ... | 254,184,219,963,562,300,000,000,000,000,000,000,000 | upnpevents.c | 22,282,999,164,038,923,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2019-12107 | The upnp_event_prepare function in upnpevents.c in MiniUPnP MiniUPnPd through 2.1 allows a remote attacker to leak information from the heap due to improper validation of an snprintf return value. | https://nvd.nist.gov/vuln/detail/CVE-2019-12107 |
184,686 | miniupnp | bec6ccec63cadc95655721bc0e1dd49dac759d94 | https://github.com/miniupnp/miniupnp | https://github.com/miniupnp/miniupnp/commit/bec6ccec63cadc95655721bc0e1dd49dac759d94 | upnp_event_prepare(): check the return value of snprintf() | 0 | static void upnp_event_prepare(struct upnp_event_notify * obj)
{
static const char notifymsg[] =
"NOTIFY %s HTTP/1.1\r\n"
"Host: %s%s\r\n"
#if (UPNP_VERSION_MAJOR == 1) && (UPNP_VERSION_MINOR == 0)
"Content-Type: text/xml\r\n" /* UDA v1.0 */
#else
"Content-Type: text/xml; charset=\"utf-8\"\r\n" /* UDA v1.1 or ... | 308,950,518,598,306,800,000,000,000,000,000,000,000 | upnpevents.c | 233,628,126,169,902,930,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2019-12107 | The upnp_event_prepare function in upnpevents.c in MiniUPnP MiniUPnPd through 2.1 allows a remote attacker to leak information from the heap due to improper validation of an snprintf return value. | https://nvd.nist.gov/vuln/detail/CVE-2019-12107 |
9,619 | lighttpd1.4 | 32120d5b8b3203fc21ccb9eafb0eaf824bb59354 | https://github.com/lighttpd/lighttpd1.4 | https://github.com/lighttpd/lighttpd1.4/commit/32120d5b8b3203fc21ccb9eafb0eaf824bb59354 | [core] fix abort in http-parseopts (fixes #2945)
fix abort in server.http-parseopts with url-path-2f-decode enabled
(thx stze)
x-ref:
"Security - SIGABRT during GET request handling with url-path-2f-decode enabled"
https://redmine.lighttpd.net/issues/2945 | 1 | static int burl_normalize_2F_to_slash_fix (buffer *b, int qs, int i)
{
char * const s = b->ptr;
const int blen = (int)buffer_string_length(b);
const int used = qs < 0 ? blen : qs;
int j = i;
for (; i < used; ++i, ++j) {
s[j] = s[i];
if (s[i] == '%' && s[i+1] == '2' && s[i+2] == 'F') ... | 124,662,619,963,424,430,000,000,000,000,000,000,000 | burl.c | 192,492,788,285,266,940,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2019-11072 | lighttpd before 1.4.54 has a signed integer overflow, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a malicious HTTP GET request, as demonstrated by mishandling of /%2F? in burl_normalize_2F_to_slash_fix in burl.c. NOTE: The developer s... | https://nvd.nist.gov/vuln/detail/CVE-2019-11072 |
184,691 | lighttpd1.4 | 32120d5b8b3203fc21ccb9eafb0eaf824bb59354 | https://github.com/lighttpd/lighttpd1.4 | https://github.com/lighttpd/lighttpd1.4/commit/32120d5b8b3203fc21ccb9eafb0eaf824bb59354 | [core] fix abort in http-parseopts (fixes #2945)
fix abort in server.http-parseopts with url-path-2f-decode enabled
(thx stze)
x-ref:
"Security - SIGABRT during GET request handling with url-path-2f-decode enabled"
https://redmine.lighttpd.net/issues/2945 | 0 | static int burl_normalize_2F_to_slash_fix (buffer *b, int qs, int i)
{
char * const s = b->ptr;
const int blen = (int)buffer_string_length(b);
const int used = qs < 0 ? blen : qs;
int j = i;
for (; i < used; ++i, ++j) {
s[j] = s[i];
if (s[i] == '%' && s[i+1] == '2' && s[i+2] == 'F') ... | 326,141,762,342,458,520,000,000,000,000,000,000,000 | burl.c | 29,268,463,068,782,594,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2019-11072 | lighttpd before 1.4.54 has a signed integer overflow, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a malicious HTTP GET request, as demonstrated by mishandling of /%2F? in burl_normalize_2F_to_slash_fix in burl.c. NOTE: The developer s... | https://nvd.nist.gov/vuln/detail/CVE-2019-11072 |
9,623 | linux | cfa39381173d5f969daf43582c95ad679189cbc9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/cfa39381173d5f969daf43582c95ad679189cbc9 | kvm: fix kvm_ioctl_create_device() reference counting (CVE-2019-6974)
kvm_ioctl_create_device() does the following:
1. creates a device that holds a reference to the VM object (with a borrowed
reference, the VM's refcount has not been bumped yet)
2. initializes the device
3. transfers the reference to the device t... | 1 | static int kvm_ioctl_create_device(struct kvm *kvm,
struct kvm_create_device *cd)
{
struct kvm_device_ops *ops = NULL;
struct kvm_device *dev;
bool test = cd->flags & KVM_CREATE_DEVICE_TEST;
int ret;
if (cd->type >= ARRAY_SIZE(kvm_device_ops_table))
return -ENODEV;
ops = kvm_device_ops_table[cd->type];... | 176,950,247,388,431,500,000,000,000,000,000,000,000 | kvm_main.c | 148,296,589,878,720,510,000,000,000,000,000,000,000 | [
"CWE-362"
] | CVE-2019-6974 | In the Linux kernel before 4.20.8, kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandles reference counting because of a race condition, leading to a use-after-free. | https://nvd.nist.gov/vuln/detail/CVE-2019-6974 |
184,695 | linux | cfa39381173d5f969daf43582c95ad679189cbc9 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/cfa39381173d5f969daf43582c95ad679189cbc9 | kvm: fix kvm_ioctl_create_device() reference counting (CVE-2019-6974)
kvm_ioctl_create_device() does the following:
1. creates a device that holds a reference to the VM object (with a borrowed
reference, the VM's refcount has not been bumped yet)
2. initializes the device
3. transfers the reference to the device t... | 0 | static int kvm_ioctl_create_device(struct kvm *kvm,
struct kvm_create_device *cd)
{
struct kvm_device_ops *ops = NULL;
struct kvm_device *dev;
bool test = cd->flags & KVM_CREATE_DEVICE_TEST;
int ret;
if (cd->type >= ARRAY_SIZE(kvm_device_ops_table))
return -ENODEV;
ops = kvm_device_ops_table[cd->type];... | 137,874,489,955,188,300,000,000,000,000,000,000,000 | kvm_main.c | 195,444,155,949,027,950,000,000,000,000,000,000,000 | [
"CWE-362"
] | CVE-2019-6974 | In the Linux kernel before 4.20.8, kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandles reference counting because of a race condition, leading to a use-after-free. | https://nvd.nist.gov/vuln/detail/CVE-2019-6974 |
9,634 | tcpdump | 83a412a5275cac973c5841eca3511c766bed778d | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/83a412a5275cac973c5841eca3511c766bed778d | (for 4.9.3) CVE-2018-16228/HNCP: make buffer access safer
print_prefix() has a buffer and does not initialize it. It may call
decode_prefix6(), which also does not initialize the buffer on invalid
input. When that happens, make sure to return from print_prefix() before
trying to print the [still uninitialized] buffer.... | 1 | print_prefix(netdissect_options *ndo, const u_char *prefix, u_int max_length)
{
int plenbytes;
char buf[sizeof("xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx::/128")];
if (prefix[0] >= 96 && max_length >= IPV4_MAPPED_HEADING_LEN + 1 &&
is_ipv4_mapped_address(&prefix[1])) {
struct in_addr addr;
... | 296,958,635,835,410,900,000,000,000,000,000,000,000 | print-hncp.c | 71,707,496,757,408,950,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-16228 | The HNCP parser in tcpdump before 4.9.3 has a buffer over-read in print-hncp.c:print_prefix(). | https://nvd.nist.gov/vuln/detail/CVE-2018-16228 |
184,703 | tcpdump | 83a412a5275cac973c5841eca3511c766bed778d | https://github.com/the-tcpdump-group/tcpdump | https://github.com/the-tcpdump-group/tcpdump/commit/83a412a5275cac973c5841eca3511c766bed778d | (for 4.9.3) CVE-2018-16228/HNCP: make buffer access safer
print_prefix() has a buffer and does not initialize it. It may call
decode_prefix6(), which also does not initialize the buffer on invalid
input. When that happens, make sure to return from print_prefix() before
trying to print the [still uninitialized] buffer.... | 0 | print_prefix(netdissect_options *ndo, const u_char *prefix, u_int max_length)
{
int plenbytes;
char buf[sizeof("xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx::/128")];
if (prefix[0] >= 96 && max_length >= IPV4_MAPPED_HEADING_LEN + 1 &&
is_ipv4_mapped_address(&prefix[1])) {
struct in_addr addr;
... | 66,529,608,188,001,110,000,000,000,000,000,000,000 | print-hncp.c | 102,355,438,122,732,180,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-16228 | The HNCP parser in tcpdump before 4.9.3 has a buffer over-read in print-hncp.c:print_prefix(). | https://nvd.nist.gov/vuln/detail/CVE-2018-16228 |
9,638 | linux | 04197b341f23b908193308b8d63d17ff23232598 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/04197b341f23b908193308b8d63d17ff23232598 | xfs: don't BUG() on mixed direct and mapped I/O
We've had reports of generic/095 causing XFS to BUG() in
__xfs_get_blocks() due to the existence of delalloc blocks on a
direct I/O read. generic/095 issues a mix of various types of I/O,
including direct and memory mapped I/O to a single file. This is
clearly not suppor... | 1 | __xfs_get_blocks(
struct inode *inode,
sector_t iblock,
struct buffer_head *bh_result,
int create,
bool direct,
bool dax_fault)
{
struct xfs_inode *ip = XFS_I(inode);
struct xfs_mount *mp = ip->i_mount;
xfs_fileoff_t offset_fsb, end_fsb;
int error = 0;
int lockmode = 0;
struct xfs_bmbt_irec ima... | 195,875,716,643,763,600,000,000,000,000,000,000,000 | xfs_aops.c | 300,830,705,963,493,000,000,000,000,000,000,000,000 | [
"CWE-362"
] | CVE-2016-10741 | In the Linux kernel before 4.9.3, fs/xfs/xfs_aops.c allows local users to cause a denial of service (system crash) because there is a race condition between direct and memory-mapped I/O (associated with a hole) that is handled with BUG_ON instead of an I/O failure. | https://nvd.nist.gov/vuln/detail/CVE-2016-10741 |
184,706 | linux | 04197b341f23b908193308b8d63d17ff23232598 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/04197b341f23b908193308b8d63d17ff23232598 | xfs: don't BUG() on mixed direct and mapped I/O
We've had reports of generic/095 causing XFS to BUG() in
__xfs_get_blocks() due to the existence of delalloc blocks on a
direct I/O read. generic/095 issues a mix of various types of I/O,
including direct and memory mapped I/O to a single file. This is
clearly not suppor... | 0 | __xfs_get_blocks(
struct inode *inode,
sector_t iblock,
struct buffer_head *bh_result,
int create,
bool direct,
bool dax_fault)
{
struct xfs_inode *ip = XFS_I(inode);
struct xfs_mount *mp = ip->i_mount;
xfs_fileoff_t offset_fsb, end_fsb;
int error = 0;
int lockmode = 0;
struct xfs_bmbt_irec ima... | 165,371,123,751,058,870,000,000,000,000,000,000,000 | xfs_aops.c | 179,663,587,725,984,670,000,000,000,000,000,000,000 | [
"CWE-362"
] | CVE-2016-10741 | In the Linux kernel before 4.9.3, fs/xfs/xfs_aops.c allows local users to cause a denial of service (system crash) because there is a race condition between direct and memory-mapped I/O (associated with a hole) that is handled with BUG_ON instead of an I/O failure. | https://nvd.nist.gov/vuln/detail/CVE-2016-10741 |
9,641 | linux | f9432c5ec8b1e9a09b9b0e5569e3c73db8de432a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/f9432c5ec8b1e9a09b9b0e5569e3c73db8de432a | Bluetooth: RFCOMM - Fix info leak in ioctl(RFCOMMGETDEVLIST)
The RFCOMM code fails to initialize the two padding bytes of struct
rfcomm_dev_list_req inserted for alignment before copying it to
userland. Additionally there are two padding bytes in each instance of
struct rfcomm_dev_info. The ioctl() that for disclosure... | 1 | static int rfcomm_get_dev_list(void __user *arg)
{
struct rfcomm_dev *dev;
struct rfcomm_dev_list_req *dl;
struct rfcomm_dev_info *di;
int n = 0, size, err;
u16 dev_num;
BT_DBG("");
if (get_user(dev_num, (u16 __user *) arg))
return -EFAULT;
if (!dev_num || dev_num > (PAGE_SIZE * 4) / sizeof(*di))
return ... | 139,069,687,710,975,940,000,000,000,000,000,000,000 | tty.c | 176,026,457,291,408,430,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2012-6545 | The Bluetooth RFCOMM implementation in the Linux kernel before 3.6 does not properly initialize certain structures, which allows local users to obtain sensitive information from kernel memory via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2012-6545 |
184,708 | linux | f9432c5ec8b1e9a09b9b0e5569e3c73db8de432a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/f9432c5ec8b1e9a09b9b0e5569e3c73db8de432a | Bluetooth: RFCOMM - Fix info leak in ioctl(RFCOMMGETDEVLIST)
The RFCOMM code fails to initialize the two padding bytes of struct
rfcomm_dev_list_req inserted for alignment before copying it to
userland. Additionally there are two padding bytes in each instance of
struct rfcomm_dev_info. The ioctl() that for disclosure... | 0 | static int rfcomm_get_dev_list(void __user *arg)
{
struct rfcomm_dev *dev;
struct rfcomm_dev_list_req *dl;
struct rfcomm_dev_info *di;
int n = 0, size, err;
u16 dev_num;
BT_DBG("");
if (get_user(dev_num, (u16 __user *) arg))
return -EFAULT;
if (!dev_num || dev_num > (PAGE_SIZE * 4) / sizeof(*di))
return ... | 101,971,326,271,357,420,000,000,000,000,000,000,000 | tty.c | 142,318,201,572,018,090,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2012-6545 | The Bluetooth RFCOMM implementation in the Linux kernel before 3.6 does not properly initialize certain structures, which allows local users to obtain sensitive information from kernel memory via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2012-6545 |
9,646 | libgd | 1ccfe21e14c4d18336f9da8515cd17db88c3de61 | https://github.com/libgd/libgd | https://github.com/libgd/libgd/commit/1ccfe21e14c4d18336f9da8515cd17db88c3de61 | fix php 72494, invalid color index not handled, can lead to crash | 1 | BGD_DECLARE(gdImagePtr) gdImageCropThreshold(gdImagePtr im, const unsigned int color, const float threshold)
{
const int width = gdImageSX(im);
const int height = gdImageSY(im);
int x,y;
int match;
gdRect crop;
crop.x = 0;
crop.y = 0;
crop.width = 0;
crop.height = 0;
/* Pierre: crop everything sounds bad *... | 58,602,749,696,991,850,000,000,000,000,000,000,000 | gd_crop.c | 283,844,472,613,649,240,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2016-6128 | The gdImageCropThreshold function in gd_crop.c in the GD Graphics Library (aka libgd) before 2.2.3, as used in PHP before 7.0.9, allows remote attackers to cause a denial of service (application crash) via an invalid color index. | https://nvd.nist.gov/vuln/detail/CVE-2016-6128 |
184,711 | libgd | 1ccfe21e14c4d18336f9da8515cd17db88c3de61 | https://github.com/libgd/libgd | https://github.com/libgd/libgd/commit/1ccfe21e14c4d18336f9da8515cd17db88c3de61 | fix php 72494, invalid color index not handled, can lead to crash | 0 | BGD_DECLARE(gdImagePtr) gdImageCropThreshold(gdImagePtr im, const unsigned int color, const float threshold)
{
const int width = gdImageSX(im);
const int height = gdImageSY(im);
int x,y;
int match;
gdRect crop;
crop.x = 0;
crop.y = 0;
crop.width = 0;
crop.height = 0;
/* Pierre: crop everything sounds bad *... | 35,227,494,179,725,593,000,000,000,000,000,000,000 | gd_crop.c | 125,155,221,022,675,590,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2016-6128 | The gdImageCropThreshold function in gd_crop.c in the GD Graphics Library (aka libgd) before 2.2.3, as used in PHP before 7.0.9, allows remote attackers to cause a denial of service (application crash) via an invalid color index. | https://nvd.nist.gov/vuln/detail/CVE-2016-6128 |
9,649 | wireshark | 11edc83b98a61e890d7bb01855389d40e984ea82 | https://github.com/wireshark/wireshark | https://github.com/wireshark/wireshark/commit/11edc83b98a61e890d7bb01855389d40e984ea82 | Don't treat the packet length as unsigned.
The scanf family of functions are as annoyingly bad at handling unsigned
numbers as strtoul() is - both of them are perfectly willing to accept a
value beginning with a negative sign as an unsigned value. When using
strtoul(), you can compensate for this by explicitly checki... | 1 | parse_netscreen_packet(FILE_T fh, struct wtap_pkthdr *phdr, Buffer* buf,
char *line, int *err, gchar **err_info)
{
int sec;
int dsec;
char cap_int[NETSCREEN_MAX_INT_NAME_LENGTH];
char direction[2];
guint pkt_len;
char cap_src[13];
char cap_dst[13];
guint8 *pd;
gchar *p;
int n, i = 0;... | 147,371,450,414,689,870,000,000,000,000,000,000,000 | netscreen.c | 286,276,784,978,868,850,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2016-5357 | wiretap/netscreen.c in the NetScreen file parser in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles sscanf unsigned-integer processing, which allows remote attackers to cause a denial of service (application crash) via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2016-5357 |
184,712 | wireshark | 11edc83b98a61e890d7bb01855389d40e984ea82 | https://github.com/wireshark/wireshark | https://github.com/wireshark/wireshark/commit/11edc83b98a61e890d7bb01855389d40e984ea82 | Don't treat the packet length as unsigned.
The scanf family of functions are as annoyingly bad at handling unsigned
numbers as strtoul() is - both of them are perfectly willing to accept a
value beginning with a negative sign as an unsigned value. When using
strtoul(), you can compensate for this by explicitly checki... | 0 | parse_netscreen_packet(FILE_T fh, struct wtap_pkthdr *phdr, Buffer* buf,
char *line, int *err, gchar **err_info)
{
int pkt_len;
int sec;
int dsec;
char cap_int[NETSCREEN_MAX_INT_NAME_LENGTH];
char direction[2];
char cap_src[13];
char cap_dst[13];
guint8 *pd;
gchar *p;
int n, i = 0;
... | 289,287,380,428,776,400,000,000,000,000,000,000,000 | netscreen.c | 280,112,886,465,280,600,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2016-5357 | wiretap/netscreen.c in the NetScreen file parser in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles sscanf unsigned-integer processing, which allows remote attackers to cause a denial of service (application crash) via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2016-5357 |
9,655 | linux | 4c185ce06dca14f5cea192f5a2c981ef50663f2b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/4c185ce06dca14f5cea192f5a2c981ef50663f2b | aio: lift iov_iter_init() into aio_setup_..._rw()
the only non-trivial detail is that we do it before rw_verify_area(),
so we'd better cap the length ourselves in aio_setup_single_rw()
case (for vectored case rw_copy_check_uvector() will do that for us).
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk> | 1 | static ssize_t aio_setup_single_vector(struct kiocb *kiocb,
int rw, char __user *buf,
unsigned long *nr_segs,
size_t len,
struct iovec *iovec)
{
if (unlikely(!access_ok(!rw, buf, len)))
return -EFAULT;
iovec->iov_base = buf;
iovec->iov_len = len;
*nr_segs = ... | 1,764,598,624,184,633,000,000,000,000,000,000,000 | aio.c | 10,187,739,604,289,771,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2015-8830 | Integer overflow in the aio_setup_single_vector function in fs/aio.c in the Linux kernel 4.0 allows local users to cause a denial of service or possibly have unspecified other impact via a large AIO iovec. NOTE: this vulnerability exists because of a CVE-2012-6701 regression. | https://nvd.nist.gov/vuln/detail/CVE-2015-8830 |
184,718 | linux | 4c185ce06dca14f5cea192f5a2c981ef50663f2b | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/4c185ce06dca14f5cea192f5a2c981ef50663f2b | aio: lift iov_iter_init() into aio_setup_..._rw()
the only non-trivial detail is that we do it before rw_verify_area(),
so we'd better cap the length ourselves in aio_setup_single_rw()
case (for vectored case rw_copy_check_uvector() will do that for us).
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk> | 0 | static ssize_t aio_setup_single_vector(struct kiocb *kiocb,
int rw, char __user *buf,
unsigned long *nr_segs,
size_t len,
struct iovec *iovec,
struct iov_iter *iter)
{
if (len > MAX_RW_COUNT)
len = MAX_RW_COUNT;
if (unlikely(!access_ok(!rw, buf, len)))
... | 101,288,277,757,083,190,000,000,000,000,000,000,000 | aio.c | 110,902,703,907,162,260,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2015-8830 | Integer overflow in the aio_setup_single_vector function in fs/aio.c in the Linux kernel 4.0 allows local users to cause a denial of service or possibly have unspecified other impact via a large AIO iovec. NOTE: this vulnerability exists because of a CVE-2012-6701 regression. | https://nvd.nist.gov/vuln/detail/CVE-2015-8830 |
9,660 | FFmpeg | 611b35627488a8d0763e75c25ee0875c5b7987dd | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/611b35627488a8d0763e75c25ee0875c5b7987dd | avcodec/dnxhd_parser: Do not return invalid value from dnxhd_find_frame_end() on error
Fixes: Null pointer dereference
Fixes: CVE-2017-9608
Found-by: Yihan Lian
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 1 | static int dnxhd_find_frame_end(DNXHDParserContext *dctx,
const uint8_t *buf, int buf_size)
{
ParseContext *pc = &dctx->pc;
uint64_t state = pc->state64;
int pic_found = pc->frame_start_found;
int i = 0;
if (!pic_found) {
for (i = 0; i < buf_size; i++) {
... | 86,046,191,373,808,070,000,000,000,000,000,000,000 | dnxhd_parser.c | 54,129,044,710,275,890,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2017-9608 | The dnxhd decoder in FFmpeg before 3.2.6, and 3.3.x before 3.3.3 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted mov file. | https://nvd.nist.gov/vuln/detail/CVE-2017-9608 |
184,719 | FFmpeg | 611b35627488a8d0763e75c25ee0875c5b7987dd | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/611b35627488a8d0763e75c25ee0875c5b7987dd | avcodec/dnxhd_parser: Do not return invalid value from dnxhd_find_frame_end() on error
Fixes: Null pointer dereference
Fixes: CVE-2017-9608
Found-by: Yihan Lian
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 0 | static int dnxhd_find_frame_end(DNXHDParserContext *dctx,
const uint8_t *buf, int buf_size)
{
ParseContext *pc = &dctx->pc;
uint64_t state = pc->state64;
int pic_found = pc->frame_start_found;
int i = 0;
if (!pic_found) {
for (i = 0; i < buf_size; i++) {
... | 256,227,833,484,968,670,000,000,000,000,000,000,000 | dnxhd_parser.c | 221,954,861,288,586,140,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2017-9608 | The dnxhd decoder in FFmpeg before 3.2.6, and 3.3.x before 3.3.3 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted mov file. | https://nvd.nist.gov/vuln/detail/CVE-2017-9608 |
9,669 | ImageMagick | 280215b9936d145dd5ee91403738ccce1333cab1 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/280215b9936d145dd5ee91403738ccce1333cab1 | Rewrite reading pixel values. | 1 | static MagickBooleanType ReadPSDChannelPixels(Image *image,
const size_t channels,const size_t row,const ssize_t type,
const unsigned char *pixels,ExceptionInfo *exception)
{
Quantum
pixel;
register const unsigned char
*p;
register Quantum
*q;
register ssize_t
x;
size_t
packet_s... | 42,358,738,219,081,613,000,000,000,000,000,000,000 | psd.c | 332,626,216,864,854,940,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2016-7514 | The ReadPSDChannelPixels function in coders/psd.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PSD file. | https://nvd.nist.gov/vuln/detail/CVE-2016-7514 |
184,727 | ImageMagick | 280215b9936d145dd5ee91403738ccce1333cab1 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/280215b9936d145dd5ee91403738ccce1333cab1 | Rewrite reading pixel values. | 0 | static MagickBooleanType ReadPSDChannelPixels(Image *image,
const size_t channels,const size_t row,const ssize_t type,
const unsigned char *pixels,ExceptionInfo *exception)
{
Quantum
pixel;
register const unsigned char
*p;
register Quantum
*q;
register ssize_t
x;
size_t
packet_s... | 15,030,130,327,058,568,000,000,000,000,000,000,000 | psd.c | 210,776,347,083,540,080,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2016-7514 | The ReadPSDChannelPixels function in coders/psd.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PSD file. | https://nvd.nist.gov/vuln/detail/CVE-2016-7514 |
9,673 | linux | 251e22abde21833b3d29577e4d8c7aaccd650eee | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/251e22abde21833b3d29577e4d8c7aaccd650eee | pinctrl: amd: Use devm_pinctrl_register() for pinctrl registration
Use devm_pinctrl_register() for pin control registration and clean
error path.
Signed-off-by: Laxman Dewangan <ldewangan@nvidia.com>
Signed-off-by: Linus Walleij <linus.walleij@linaro.org> | 1 | static int amd_gpio_probe(struct platform_device *pdev)
{
int ret = 0;
int irq_base;
struct resource *res;
struct amd_gpio *gpio_dev;
gpio_dev = devm_kzalloc(&pdev->dev,
sizeof(struct amd_gpio), GFP_KERNEL);
if (!gpio_dev)
return -ENOMEM;
spin_lock_init(&gpio_dev->lock);
res = platform_get_resource(pde... | 152,429,198,517,298,730,000,000,000,000,000,000,000 | pinctrl-amd.c | 15,215,002,648,681,079,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2017-18174 | In the Linux kernel before 4.7, the amd_gpio_remove function in drivers/pinctrl/pinctrl-amd.c calls the pinctrl_unregister function, leading to a double free. | https://nvd.nist.gov/vuln/detail/CVE-2017-18174 |
184,730 | linux | 251e22abde21833b3d29577e4d8c7aaccd650eee | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/251e22abde21833b3d29577e4d8c7aaccd650eee | pinctrl: amd: Use devm_pinctrl_register() for pinctrl registration
Use devm_pinctrl_register() for pin control registration and clean
error path.
Signed-off-by: Laxman Dewangan <ldewangan@nvidia.com>
Signed-off-by: Linus Walleij <linus.walleij@linaro.org> | 0 | static int amd_gpio_probe(struct platform_device *pdev)
{
int ret = 0;
int irq_base;
struct resource *res;
struct amd_gpio *gpio_dev;
gpio_dev = devm_kzalloc(&pdev->dev,
sizeof(struct amd_gpio), GFP_KERNEL);
if (!gpio_dev)
return -ENOMEM;
spin_lock_init(&gpio_dev->lock);
res = platform_get_resource(pde... | 209,284,362,012,157,400,000,000,000,000,000,000,000 | pinctrl-amd.c | 118,956,490,816,980,920,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2017-18174 | In the Linux kernel before 4.7, the amd_gpio_remove function in drivers/pinctrl/pinctrl-amd.c calls the pinctrl_unregister function, leading to a double free. | https://nvd.nist.gov/vuln/detail/CVE-2017-18174 |
9,674 | jasper | f25486c3d4aa472fec79150f2c41ed4333395d3d | https://github.com/mdadams/jasper | https://github.com/mdadams/jasper/commit/f25486c3d4aa472fec79150f2c41ed4333395d3d | Fixed a bug in the packet iterator code.
Added a new regression test case. | 1 | static int jpc_pi_nextrpcl(register jpc_pi_t *pi)
{
int rlvlno;
jpc_pirlvl_t *pirlvl;
jpc_pchg_t *pchg;
int prchind;
int prcvind;
int *prclyrno;
int compno;
jpc_picomp_t *picomp;
int xstep;
int ystep;
uint_fast32_t r;
uint_fast32_t rpx;
uint_fast32_t rpy;
uint_fast32_t trx0;
uint_fast32_t try0;
pchg = ... | 71,544,139,196,461,260,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2016-9583 | An out-of-bounds heap read vulnerability was found in the jpc_pi_nextpcrl() function of jasper before 2.0.6 when processing crafted input. | https://nvd.nist.gov/vuln/detail/CVE-2016-9583 |
184,731 | jasper | f25486c3d4aa472fec79150f2c41ed4333395d3d | https://github.com/mdadams/jasper | https://github.com/mdadams/jasper/commit/f25486c3d4aa472fec79150f2c41ed4333395d3d | Fixed a bug in the packet iterator code.
Added a new regression test case. | 0 | static int jpc_pi_nextrpcl(register jpc_pi_t *pi)
{
int rlvlno;
jpc_pirlvl_t *pirlvl;
jpc_pchg_t *pchg;
int prchind;
int prcvind;
int *prclyrno;
int compno;
jpc_picomp_t *picomp;
int xstep;
int ystep;
uint_fast32_t r;
uint_fast32_t rpx;
uint_fast32_t rpy;
uint_fast32_t trx0;
uint_fast32_t try0;
pchg = ... | 194,901,967,515,631,960,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2016-9583 | An out-of-bounds heap read vulnerability was found in the jpc_pi_nextpcrl() function of jasper before 2.0.6 when processing crafted input. | https://nvd.nist.gov/vuln/detail/CVE-2016-9583 |
9,681 | openjpeg | cbe7384016083eac16078b359acd7a842253d503 | https://github.com/uclouvain/openjpeg | https://github.com/uclouvain/openjpeg/commit/cbe7384016083eac16078b359acd7a842253d503 | None | 1 | static OPJ_BOOL bmp_read_rle4_data(FILE* IN, OPJ_UINT8* pData,
OPJ_UINT32 stride, OPJ_UINT32 width, OPJ_UINT32 height)
{
OPJ_UINT32 x, y;
OPJ_UINT8 *pix;
const OPJ_UINT8 *beyond;
beyond = pData + stride * height;
pix = pData;
x = y = 0U;
while (y ... | 107,959,287,325,417,320,000,000,000,000,000,000,000 | convertbmp.c | 204,530,473,747,156,800,000,000,000,000,000,000,000 | [
"CWE-400"
] | CVE-2019-12973 | In OpenJPEG 2.3.1, there is excessive iteration in the opj_t1_encode_cblks function of openjp2/t1.c. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted bmp file. This issue is similar to CVE-2018-6616. | https://nvd.nist.gov/vuln/detail/CVE-2019-12973 |
184,736 | openjpeg | cbe7384016083eac16078b359acd7a842253d503 | https://github.com/uclouvain/openjpeg | https://github.com/uclouvain/openjpeg/commit/cbe7384016083eac16078b359acd7a842253d503 | None | 0 | static OPJ_BOOL bmp_read_rle4_data(FILE* IN, OPJ_UINT8* pData,
OPJ_UINT32 stride, OPJ_UINT32 width, OPJ_UINT32 height)
{
OPJ_UINT32 x, y, written;
OPJ_UINT8 *pix;
const OPJ_UINT8 *beyond;
beyond = pData + stride * height;
pix = pData;
x = y = written =... | 134,963,054,834,351,210,000,000,000,000,000,000,000 | None | null | [
"CWE-400"
] | CVE-2019-12973 | In OpenJPEG 2.3.1, there is excessive iteration in the opj_t1_encode_cblks function of openjp2/t1.c. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted bmp file. This issue is similar to CVE-2018-6616. | https://nvd.nist.gov/vuln/detail/CVE-2019-12973 |
9,710 | Chrome | 60c9d8a39e4aa78dd51c236bd1b2c4f17c9d27fe | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/60c9d8a39e4aa78dd51c236bd1b2c4f17c9d27fe | None | 1 | bool TextAutosizer::processSubtree(RenderObject* layoutRoot)
{
if (!m_document->settings() || !m_document->settings()->textAutosizingEnabled() || layoutRoot->view()->printing() || !m_document->page())
return false;
Frame* mainFrame = m_document->page()->mainFrame();
TextAutosizingWindowInfo window... | 58,579,830,367,491,530,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-3906 | The PDF parser in Google Chrome before 16.0.912.63 allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2011-3906 |
184,763 | Chrome | 60c9d8a39e4aa78dd51c236bd1b2c4f17c9d27fe | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/60c9d8a39e4aa78dd51c236bd1b2c4f17c9d27fe | None | 0 | bool TextAutosizer::processSubtree(RenderObject* layoutRoot)
{
if (!m_document->settings() || !m_document->settings()->textAutosizingEnabled() || layoutRoot->view()->printing() || !m_document->page())
return false;
Frame* mainFrame = m_document->page()->mainFrame();
TextAutosizingWindowInfo window... | 331,413,159,561,956,900,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-3906 | The PDF parser in Google Chrome before 16.0.912.63 allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2011-3906 |
9,726 | Chrome | 08b630e66e042af3fe80015509b3238c2679ea40 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/08b630e66e042af3fe80015509b3238c2679ea40 | None | 1 | bool RenderMenuList::multiple()
{
return toHTMLSelectElement(node())->multiple();
}
| 153,962,476,287,418,380,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2011-2830 | Google V8, as used in Google Chrome before 14.0.835.163, does not properly implement script object wrappers, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via unknown vectors. | https://nvd.nist.gov/vuln/detail/CVE-2011-2830 |
184,779 | Chrome | 08b630e66e042af3fe80015509b3238c2679ea40 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/08b630e66e042af3fe80015509b3238c2679ea40 | None | 0 | bool RenderMenuList::multiple()
bool RenderMenuList::multiple() const
{
return toHTMLSelectElement(node())->multiple();
}
| 94,905,042,104,443,020,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2011-2830 | Google V8, as used in Google Chrome before 14.0.835.163, does not properly implement script object wrappers, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via unknown vectors. | https://nvd.nist.gov/vuln/detail/CVE-2011-2830 |
9,737 | Chrome | 9eb1fd426a04adac0906c81ed88f1089969702ba | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/9eb1fd426a04adac0906c81ed88f1089969702ba | None | 1 | void BeginInstallWithManifestFunction::OnParseSuccess(
const SkBitmap& icon, DictionaryValue* parsed_manifest) {
CHECK(parsed_manifest);
icon_ = icon;
parsed_manifest_.reset(parsed_manifest);
std::string init_errors;
dummy_extension_ = Extension::Create(
FilePath(),
Extension::INTERNAL,
... | 31,286,386,419,319,730,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2011-2358 | Google Chrome before 13.0.782.107 does not ensure that extension installations are confirmed by a browser dialog, which makes it easier for remote attackers to modify the product's functionality via a Trojan horse extension. | https://nvd.nist.gov/vuln/detail/CVE-2011-2358 |
184,790 | Chrome | 9eb1fd426a04adac0906c81ed88f1089969702ba | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/9eb1fd426a04adac0906c81ed88f1089969702ba | None | 0 | void BeginInstallWithManifestFunction::OnParseSuccess(
const SkBitmap& icon, DictionaryValue* parsed_manifest) {
CHECK(parsed_manifest);
icon_ = icon;
parsed_manifest_.reset(parsed_manifest);
std::string init_errors;
dummy_extension_ = Extension::Create(
FilePath(),
Extension::INTERNAL,
... | 305,490,087,900,030,100,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2011-2358 | Google Chrome before 13.0.782.107 does not ensure that extension installations are confirmed by a browser dialog, which makes it easier for remote attackers to modify the product's functionality via a Trojan horse extension. | https://nvd.nist.gov/vuln/detail/CVE-2011-2358 |
9,744 | Chrome | ce891a86763d3540e2612be26938a6163310efe0 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/ce891a86763d3540e2612be26938a6163310efe0 | None | 1 | void ChromeContentRendererClient::RenderThreadStarted() {
chrome_observer_.reset(new ChromeRenderProcessObserver());
extension_dispatcher_.reset(new ExtensionDispatcher());
histogram_snapshots_.reset(new RendererHistogramSnapshots());
net_predictor_.reset(new RendererNetPredictor());
spellcheck_.reset(new Spe... | 161,105,270,804,386,400,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2011-2798 | Google Chrome before 13.0.782.107 does not properly restrict access to internal schemes, which allows remote attackers to have an unspecified impact via a crafted web site. | https://nvd.nist.gov/vuln/detail/CVE-2011-2798 |
184,797 | Chrome | ce891a86763d3540e2612be26938a6163310efe0 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/ce891a86763d3540e2612be26938a6163310efe0 | None | 0 | void ChromeContentRendererClient::RenderThreadStarted() {
chrome_observer_.reset(new ChromeRenderProcessObserver());
extension_dispatcher_.reset(new ExtensionDispatcher());
histogram_snapshots_.reset(new RendererHistogramSnapshots());
net_predictor_.reset(new RendererNetPredictor());
spellcheck_.reset(new Spe... | 129,717,633,571,444,400,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2011-2798 | Google Chrome before 13.0.782.107 does not properly restrict access to internal schemes, which allows remote attackers to have an unspecified impact via a crafted web site. | https://nvd.nist.gov/vuln/detail/CVE-2011-2798 |
9,757 | Chrome | bf04ad0dae9f4f479f90fd2b38f634ffbaf434b4 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/bf04ad0dae9f4f479f90fd2b38f634ffbaf434b4 | None | 1 | bool PPVarToNPVariant(PP_Var var, NPVariant* result) {
switch (var.type) {
case PP_VARTYPE_UNDEFINED:
VOID_TO_NPVARIANT(*result);
break;
case PP_VARTYPE_NULL:
NULL_TO_NPVARIANT(*result);
break;
case PP_VARTYPE_BOOL:
BOOLEAN_TO_NPVARIANT(var.value.as_bool, *result);
brea... | 114,945,807,708,477,050,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-2345 | The NPAPI implementation in Google Chrome before 12.0.742.112 does not properly handle strings, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2011-2345 |
184,810 | Chrome | bf04ad0dae9f4f479f90fd2b38f634ffbaf434b4 | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/bf04ad0dae9f4f479f90fd2b38f634ffbaf434b4 | None | 0 | bool PPVarToNPVariant(PP_Var var, NPVariant* result) {
switch (var.type) {
case PP_VARTYPE_UNDEFINED:
VOID_TO_NPVARIANT(*result);
break;
case PP_VARTYPE_NULL:
NULL_TO_NPVARIANT(*result);
break;
case PP_VARTYPE_BOOL:
BOOLEAN_TO_NPVARIANT(var.value.as_bool, *result);
brea... | 333,965,227,441,118,670,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-2345 | The NPAPI implementation in Google Chrome before 12.0.742.112 does not properly handle strings, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2011-2345 |
9,764 | Chrome | 514f93279494ec4448b34a7aeeff27eccaae983f | https://github.com/chromium/chromium | https://github.com/chromium/chromium/commit/514f93279494ec4448b34a7aeeff27eccaae983f | None | 1 | bool DebugOnStart::FindArgument(wchar_t* command_line, const char* argument_c) {
wchar_t argument[50];
for (int i = 0; argument_c[i]; ++i)
argument[i] = argument_c[i];
int argument_len = lstrlen(argument);
int command_line_len = lstrlen(command_line);
while (command_line_len > argument_len) {
wch... | 26,055,336,896,940,780,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2011-1301 | Use-after-free vulnerability in the GPU process in Google Chrome before 10.0.648.205 allows remote attackers to execute arbitrary code via unknown vectors. | https://nvd.nist.gov/vuln/detail/CVE-2011-1301 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.