idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
194,730 | php | b1bd4119bcafab6f9a8f84d92cd65eec3afeface | https://git.php.net/?p=php-src | https://git.php.net/?p=php-src.git;a=commit;h=b1bd4119bcafab6f9a8f84d92cd65eec3afeface | None | 0 | static void php_wddx_pop_element(void *user_data, const XML_Char *name)
{
st_entry *ent1, *ent2;
wddx_stack *stack = (wddx_stack *)user_data;
HashTable *target_hash;
zend_class_entry **pce;
zval *obj;
zval *tmp;
TSRMLS_FETCH();
/* OBJECTS_FIXME */
if (stack->top == 0) {
return;
}
if (!strc... | 194,011,325,657,017,820,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-3141 | Use-after-free vulnerability in wddx.c in the WDDX extension in PHP before 5.5.33 and 5.6.x before 5.6.19 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact by triggering a wddx_deserialize call on XML data containing a crafted var el... | https://nvd.nist.gov/vuln/detail/CVE-2016-3141 |
10,412 | qemu | 415ab35a441eca767d033a2702223e785b9d5190 | https://github.com/bonzini/qemu | https://git.qemu.org/?p=qemu.git;a=commit;h=415ab35a441eca767d033a2702223e785b9d5190 | net: ne2000: check ring buffer control registers
Ne2000 NIC uses ring buffer of NE2000_MEM_SIZE(49152)
bytes to process network packets. Registers PSTART & PSTOP
define ring buffer size & location. Setting these registers
to invalid values could lead to infinite loop or OOB r/w
access issues. Add check to avoid it.
R... | 1 | static int ne2000_buffer_full(NE2000State *s)
{
int avail, index, boundary;
index = s->curpag << 8;
boundary = s->boundary << 8;
if (index < boundary)
return 1;
return 0;
}
| 251,741,541,197,334,500,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2016-2841 | The ne2000_receive function in the NE2000 NIC emulation support (hw/net/ne2000.c) in QEMU before 2.5.1 allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via crafted values for the PSTART and PSTOP registers, involving ring buffer control. | https://nvd.nist.gov/vuln/detail/CVE-2016-2841 |
194,736 | qemu | 415ab35a441eca767d033a2702223e785b9d5190 | https://github.com/bonzini/qemu | https://git.qemu.org/?p=qemu.git;a=commit;h=415ab35a441eca767d033a2702223e785b9d5190 | net: ne2000: check ring buffer control registers
Ne2000 NIC uses ring buffer of NE2000_MEM_SIZE(49152)
bytes to process network packets. Registers PSTART & PSTOP
define ring buffer size & location. Setting these registers
to invalid values could lead to infinite loop or OOB r/w
access issues. Add check to avoid it.
R... | 0 | static int ne2000_buffer_full(NE2000State *s)
{
int avail, index, boundary;
if (s->stop <= s->start) {
return 1;
}
index = s->curpag << 8;
boundary = s->boundary << 8;
if (index < boundary)
return 1;
return 0;
}
| 102,003,477,430,627,750,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2016-2841 | The ne2000_receive function in the NE2000 NIC emulation support (hw/net/ne2000.c) in QEMU before 2.5.1 allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via crafted values for the PSTART and PSTOP registers, involving ring buffer control. | https://nvd.nist.gov/vuln/detail/CVE-2016-2841 |
10,413 | qemu | fe3c546c5ff2a6210f9a4d8561cc64051ca8603e | https://github.com/bonzini/qemu | https://git.qemu.org/?p=qemu.git;a=commit;h=fe3c546c5ff2a6210f9a4d8561cc64051ca8603e | usb: check RNDIS buffer offsets & length
When processing remote NDIS control message packets,
the USB Net device emulator uses a fixed length(4096) data buffer.
The incoming informationBufferOffset & Length combination could
overflow and cross that range. Check control message buffer
offsets and length to avoid it.
R... | 1 | static int rndis_query_response(USBNetState *s,
rndis_query_msg_type *buf, unsigned int length)
{
rndis_query_cmplt_type *resp;
/* oid_supported_list is the largest data reply */
uint8_t infobuf[sizeof(oid_supported_list)];
uint32_t bufoffs, buflen;
int infobuflen;
unsigned int r... | 35,868,650,006,871,747,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2016-2538 | Multiple integer overflows in the USB Net device emulator (hw/usb/dev-network.c) in QEMU before 2.5.1 allow local guest OS administrators to cause a denial of service (QEMU process crash) or obtain sensitive host memory information via a remote NDIS control message packet that is mishandled in the (1) rndis_query_respo... | https://nvd.nist.gov/vuln/detail/CVE-2016-2538 |
194,737 | qemu | fe3c546c5ff2a6210f9a4d8561cc64051ca8603e | https://github.com/bonzini/qemu | https://git.qemu.org/?p=qemu.git;a=commit;h=fe3c546c5ff2a6210f9a4d8561cc64051ca8603e | usb: check RNDIS buffer offsets & length
When processing remote NDIS control message packets,
the USB Net device emulator uses a fixed length(4096) data buffer.
The incoming informationBufferOffset & Length combination could
overflow and cross that range. Check control message buffer
offsets and length to avoid it.
R... | 0 | static int rndis_query_response(USBNetState *s,
rndis_query_msg_type *buf, unsigned int length)
{
rndis_query_cmplt_type *resp;
/* oid_supported_list is the largest data reply */
uint8_t infobuf[sizeof(oid_supported_list)];
uint32_t bufoffs, buflen;
int infobuflen;
unsigned int r... | 258,081,463,858,313,320,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2016-2538 | Multiple integer overflows in the USB Net device emulator (hw/usb/dev-network.c) in QEMU before 2.5.1 allow local guest OS administrators to cause a denial of service (QEMU process crash) or obtain sensitive host memory information via a remote NDIS control message packet that is mishandled in the (1) rndis_query_respo... | https://nvd.nist.gov/vuln/detail/CVE-2016-2538 |
10,414 | qemu | fe3c546c5ff2a6210f9a4d8561cc64051ca8603e | https://github.com/bonzini/qemu | https://git.qemu.org/?p=qemu.git;a=commit;h=fe3c546c5ff2a6210f9a4d8561cc64051ca8603e | usb: check RNDIS buffer offsets & length
When processing remote NDIS control message packets,
the USB Net device emulator uses a fixed length(4096) data buffer.
The incoming informationBufferOffset & Length combination could
overflow and cross that range. Check control message buffer
offsets and length to avoid it.
R... | 1 | static int rndis_set_response(USBNetState *s,
rndis_set_msg_type *buf, unsigned int length)
{
rndis_set_cmplt_type *resp =
rndis_queue_response(s, sizeof(rndis_set_cmplt_type));
uint32_t bufoffs, buflen;
int ret;
if (!resp)
return USB_RET_STALL;
bufoffs = le3... | 11,035,841,434,505,206,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2016-2538 | Multiple integer overflows in the USB Net device emulator (hw/usb/dev-network.c) in QEMU before 2.5.1 allow local guest OS administrators to cause a denial of service (QEMU process crash) or obtain sensitive host memory information via a remote NDIS control message packet that is mishandled in the (1) rndis_query_respo... | https://nvd.nist.gov/vuln/detail/CVE-2016-2538 |
194,738 | qemu | fe3c546c5ff2a6210f9a4d8561cc64051ca8603e | https://github.com/bonzini/qemu | https://git.qemu.org/?p=qemu.git;a=commit;h=fe3c546c5ff2a6210f9a4d8561cc64051ca8603e | usb: check RNDIS buffer offsets & length
When processing remote NDIS control message packets,
the USB Net device emulator uses a fixed length(4096) data buffer.
The incoming informationBufferOffset & Length combination could
overflow and cross that range. Check control message buffer
offsets and length to avoid it.
R... | 0 | static int rndis_set_response(USBNetState *s,
rndis_set_msg_type *buf, unsigned int length)
{
rndis_set_cmplt_type *resp =
rndis_queue_response(s, sizeof(rndis_set_cmplt_type));
uint32_t bufoffs, buflen;
int ret;
if (!resp)
return USB_RET_STALL;
bufoffs = le3... | 310,886,160,322,124,700,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2016-2538 | Multiple integer overflows in the USB Net device emulator (hw/usb/dev-network.c) in QEMU before 2.5.1 allow local guest OS administrators to cause a denial of service (QEMU process crash) or obtain sensitive host memory information via a remote NDIS control message packet that is mishandled in the (1) rndis_query_respo... | https://nvd.nist.gov/vuln/detail/CVE-2016-2538 |
10,417 | qemu | da885fe1ee8b4589047484bd7fa05a4905b52b17 | https://github.com/bonzini/qemu | https://git.qemu.org/?p=qemu.git;a=commitdiff;h=da885fe1ee8b4589047484bd7fa05a4905b52b17 | device_tree.c: Don't use load_image()
The load_image() function is deprecated, as it does not let the
caller specify how large the buffer to read the file into is.
Instead use load_image_size().
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
Revie... | 1 | void *load_device_tree(const char *filename_path, int *sizep)
{
int dt_size;
int dt_file_load_size;
int ret;
void *fdt = NULL;
*sizep = 0;
dt_size = get_image_size(filename_path);
if (dt_size < 0) {
error_report("Unable to get size of device tree file '%s'",
fil... | 202,841,112,256,018,630,000,000,000,000,000,000,000 | device_tree.c | 336,961,887,516,060,170,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-20815 | In QEMU 3.1.0, load_device_tree in device_tree.c calls the deprecated load_image function, which has a buffer overflow risk. | https://nvd.nist.gov/vuln/detail/CVE-2018-20815 |
194,740 | qemu | da885fe1ee8b4589047484bd7fa05a4905b52b17 | https://github.com/bonzini/qemu | https://git.qemu.org/?p=qemu.git;a=commitdiff;h=da885fe1ee8b4589047484bd7fa05a4905b52b17 | device_tree.c: Don't use load_image()
The load_image() function is deprecated, as it does not let the
caller specify how large the buffer to read the file into is.
Instead use load_image_size().
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
Revie... | 0 | void *load_device_tree(const char *filename_path, int *sizep)
{
int dt_size;
int dt_file_load_size;
int ret;
void *fdt = NULL;
*sizep = 0;
dt_size = get_image_size(filename_path);
if (dt_size < 0) {
error_report("Unable to get size of device tree file '%s'",
fil... | 73,017,233,914,071,400,000,000,000,000,000,000,000 | device_tree.c | 68,834,706,600,885,980,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-20815 | In QEMU 3.1.0, load_device_tree in device_tree.c calls the deprecated load_image function, which has a buffer overflow risk. | https://nvd.nist.gov/vuln/detail/CVE-2018-20815 |
10,422 | php | 16023f3e3b9c06cf677c3c980e8d574e4c162827 | https://git.php.net/?p=php-src | https://git.php.net/?p=php-src.git;a=commit;h=16023f3e3b9c06cf677c3c980e8d574e4c162827 | None | 1 | PHP_FUNCTION(openssl_random_pseudo_bytes)
{
long buffer_length;
unsigned char *buffer = NULL;
zval *zstrong_result_returned = NULL;
int strong_result = 0;
if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "l|z", &buffer_length, &zstrong_result_returned) == FAILURE) {
... | 90,247,547,542,504,240,000,000,000,000,000,000,000 | None | null | [
"CWE-310"
] | CVE-2015-8867 | The openssl_random_pseudo_bytes function in ext/openssl/openssl.c in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 incorrectly relies on the deprecated RAND_pseudo_bytes function, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2015-8867 |
194,745 | php | 16023f3e3b9c06cf677c3c980e8d574e4c162827 | https://git.php.net/?p=php-src | https://git.php.net/?p=php-src.git;a=commit;h=16023f3e3b9c06cf677c3c980e8d574e4c162827 | None | 0 | PHP_FUNCTION(openssl_random_pseudo_bytes)
{
long buffer_length;
unsigned char *buffer = NULL;
zval *zstrong_result_returned = NULL;
if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "l|z", &buffer_length, &zstrong_result_returned) == FAILURE) {
return;
return;
}
... | 30,472,461,541,175,280,000,000,000,000,000,000,000 | None | null | [
"CWE-310"
] | CVE-2015-8867 | The openssl_random_pseudo_bytes function in ext/openssl/openssl.c in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 incorrectly relies on the deprecated RAND_pseudo_bytes function, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2015-8867 |
10,425 | php | 97aa752fee61fccdec361279adbfb17a3c60f3f4 | https://git.php.net/?p=php-src | https://git.php.net/?p=php-src.git;a=commit;h=97aa752fee61fccdec361279adbfb17a3c60f3f4 | None | 1 | mysqlnd_switch_to_ssl_if_needed(
MYSQLND_CONN_DATA * conn,
const MYSQLND_PACKET_GREET * const greet_packet,
const MYSQLND_OPTIONS * const options,
unsigned long mysql_flags
TSRMLS_DC
)
{
enum_func_status ret = FAIL;
const MYSQLND_CHARSET * charset;
MYSQLND_PACKET_AUTH * auth_packet;
DBG_ENTER("mysq... | 296,126,824,449,519,960,000,000,000,000,000,000,000 | None | null | [
"CWE-284"
] | CVE-2015-8838 | ext/mysqlnd/mysqlnd.c in PHP before 5.4.43, 5.5.x before 5.5.27, and 5.6.x before 5.6.11 uses a client SSL option to mean that SSL is optional, which allows man-in-the-middle attackers to spoof servers via a cleartext-downgrade attack, a related issue to CVE-2015-3152. | https://nvd.nist.gov/vuln/detail/CVE-2015-8838 |
194,747 | php | 97aa752fee61fccdec361279adbfb17a3c60f3f4 | https://git.php.net/?p=php-src | https://git.php.net/?p=php-src.git;a=commit;h=97aa752fee61fccdec361279adbfb17a3c60f3f4 | None | 0 | mysqlnd_switch_to_ssl_if_needed(
MYSQLND_CONN_DATA * conn,
const MYSQLND_PACKET_GREET * const greet_packet,
const MYSQLND_OPTIONS * const options,
unsigned long mysql_flags
TSRMLS_DC
)
{
enum_func_status ret = FAIL;
const MYSQLND_CHARSET * charset;
MYSQLND_PACKET_AUTH * auth_packet;
DBG_ENTER("mysq... | 246,779,593,052,978,800,000,000,000,000,000,000,000 | None | null | [
"CWE-284"
] | CVE-2015-8838 | ext/mysqlnd/mysqlnd.c in PHP before 5.4.43, 5.5.x before 5.5.27, and 5.6.x before 5.6.11 uses a client SSL option to mean that SSL is optional, which allows man-in-the-middle attackers to spoof servers via a cleartext-downgrade attack, a related issue to CVE-2015-3152. | https://nvd.nist.gov/vuln/detail/CVE-2015-8838 |
10,428 | qemu | 156a2e4dbffa85997636a7a39ef12da6f1b40254 | https://github.com/bonzini/qemu | https://git.qemu.org/?p=qemu.git;a=commit;h=156a2e4dbffa85997636a7a39ef12da6f1b40254 | ehci: make idt processing more robust
Make ehci_process_itd return an error in case we didn't do any actual
iso transfer because we've found no active transaction. That'll avoid
ehci happily run in circles forever if the guest builds a loop out of
idts.
This is CVE-2015-8558.
Cc: qemu-stable@nongnu.org
Reported-by:... | 1 | static int ehci_process_itd(EHCIState *ehci,
EHCIitd *itd,
uint32_t addr)
{
USBDevice *dev;
USBEndpoint *ep;
uint32_t i, len, pid, dir, devaddr, endp;
uint32_t pg, off, ptr1, ptr2, max, mult;
ehci->periodic_sched_active = PERIODIC_ACTIVE... | 186,685,491,160,390,440,000,000,000,000,000,000,000 | hcd-ehci.c | 267,373,257,609,963,030,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2015-8558 | The ehci_process_itd function in hw/usb/hcd-ehci.c in QEMU allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via a circular isochronous transfer descriptor (iTD) list. | https://nvd.nist.gov/vuln/detail/CVE-2015-8558 |
194,750 | qemu | 156a2e4dbffa85997636a7a39ef12da6f1b40254 | https://github.com/bonzini/qemu | https://git.qemu.org/?p=qemu.git;a=commit;h=156a2e4dbffa85997636a7a39ef12da6f1b40254 | ehci: make idt processing more robust
Make ehci_process_itd return an error in case we didn't do any actual
iso transfer because we've found no active transaction. That'll avoid
ehci happily run in circles forever if the guest builds a loop out of
idts.
This is CVE-2015-8558.
Cc: qemu-stable@nongnu.org
Reported-by:... | 0 | static int ehci_process_itd(EHCIState *ehci,
EHCIitd *itd,
uint32_t addr)
{
USBDevice *dev;
USBEndpoint *ep;
uint32_t i, len, pid, dir, devaddr, endp, xfers = 0;
uint32_t pg, off, ptr1, ptr2, max, mult;
ehci->periodic_sched_active = PERI... | 28,117,767,936,584,440,000,000,000,000,000,000,000 | hcd-ehci.c | 175,376,265,398,322,300,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2015-8558 | The ehci_process_itd function in hw/usb/hcd-ehci.c in QEMU allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via a circular isochronous transfer descriptor (iTD) list. | https://nvd.nist.gov/vuln/detail/CVE-2015-8558 |
10,429 | qemu | a890a2f9137ac3cf5b607649e66a6f3a5512d8dc | https://github.com/bonzini/qemu | http://git.qemu.org/?p=qemu.git;a=commit;h=a890a2f9137ac3cf5b607649e66a6f3a5512d8dc | virtio: validate config_len on load
Malformed input can have config_len in migration stream
exceed the array size allocated on destination, the
result will be heap overflow.
To fix, that config_len matches on both sides.
CVE-2014-0182
Reported-by: "Dr. David Alan Gilbert" <dgilbert@redhat.com>
Signed-off-by: Michae... | 1 | int virtio_load(VirtIODevice *vdev, QEMUFile *f)
{
int i, ret;
uint32_t num;
uint32_t features;
uint32_t supported_features;
VirtioBusClass *k = VIRTIO_BUS_GET_CLASS(qbus);
if (k->load_config) {
ret = k->load_config(qbus->parent, f);
if (ret)
return ret;
}
... | 33,588,596,390,600,103,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2014-0182 | Heap-based buffer overflow in the virtio_load function in hw/virtio/virtio.c in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via a crafted config length in a savevm image. | https://nvd.nist.gov/vuln/detail/CVE-2014-0182 |
194,751 | qemu | a890a2f9137ac3cf5b607649e66a6f3a5512d8dc | https://github.com/bonzini/qemu | http://git.qemu.org/?p=qemu.git;a=commit;h=a890a2f9137ac3cf5b607649e66a6f3a5512d8dc | virtio: validate config_len on load
Malformed input can have config_len in migration stream
exceed the array size allocated on destination, the
result will be heap overflow.
To fix, that config_len matches on both sides.
CVE-2014-0182
Reported-by: "Dr. David Alan Gilbert" <dgilbert@redhat.com>
Signed-off-by: Michae... | 0 | int virtio_load(VirtIODevice *vdev, QEMUFile *f)
{
int i, ret;
int32_t config_len;
uint32_t num;
uint32_t features;
uint32_t supported_features;
VirtioBusClass *k = VIRTIO_BUS_GET_CLASS(qbus);
if (k->load_config) {
ret = k->load_config(qbus->parent, f);
if (ret)
... | 265,477,271,742,666,100,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2014-0182 | Heap-based buffer overflow in the virtio_load function in hw/virtio/virtio.c in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via a crafted config length in a savevm image. | https://nvd.nist.gov/vuln/detail/CVE-2014-0182 |
10,430 | qemu | 8b98a2f07175d46c3f7217639bd5e03f2ec56343 | https://github.com/bonzini/qemu | https://git.qemu.org/?p=qemu.git;a=commit;h=8b98a2f07175d46c3f7217639bd5e03f | pcnet: fix rx buffer overflow(CVE-2015-7512)
Backends could provide a packet whose length is greater than buffer
size. Check for this and truncate the packet to avoid rx buffer
overflow in this case.
Cc: Prasad J Pandit <pjp@fedoraproject.org>
Cc: qemu-stable@nongnu.org
Reviewed-by: Michael S. Tsirkin <mst@redhat.com... | 1 | ssize_t pcnet_receive(NetClientState *nc, const uint8_t *buf, size_t size_)
{
PCNetState *s = qemu_get_nic_opaque(nc);
int is_padr = 0, is_bcast = 0, is_ladr = 0;
uint8_t buf1[60];
int remaining;
int crc_err = 0;
int size = size_;
if (CSR_DRX(s) || CSR_STOP(s) || CSR_SPND(s) || !size ||
... | 296,112,816,119,408,620,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2015-7512 | Buffer overflow in the pcnet_receive function in hw/net/pcnet.c in QEMU, when a guest NIC has a larger MTU, allows remote attackers to cause a denial of service (guest OS crash) or execute arbitrary code via a large packet. | https://nvd.nist.gov/vuln/detail/CVE-2015-7512 |
194,752 | qemu | 8b98a2f07175d46c3f7217639bd5e03f2ec56343 | https://github.com/bonzini/qemu | https://git.qemu.org/?p=qemu.git;a=commit;h=8b98a2f07175d46c3f7217639bd5e03f | pcnet: fix rx buffer overflow(CVE-2015-7512)
Backends could provide a packet whose length is greater than buffer
size. Check for this and truncate the packet to avoid rx buffer
overflow in this case.
Cc: Prasad J Pandit <pjp@fedoraproject.org>
Cc: qemu-stable@nongnu.org
Reviewed-by: Michael S. Tsirkin <mst@redhat.com... | 0 | ssize_t pcnet_receive(NetClientState *nc, const uint8_t *buf, size_t size_)
{
PCNetState *s = qemu_get_nic_opaque(nc);
int is_padr = 0, is_bcast = 0, is_ladr = 0;
uint8_t buf1[60];
int remaining;
int crc_err = 0;
int size = size_;
if (CSR_DRX(s) || CSR_STOP(s) || CSR_SPND(s) || !size ||
... | 308,459,732,396,735,450,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2015-7512 | Buffer overflow in the pcnet_receive function in hw/net/pcnet.c in QEMU, when a guest NIC has a larger MTU, allows remote attackers to cause a denial of service (guest OS crash) or execute arbitrary code via a large packet. | https://nvd.nist.gov/vuln/detail/CVE-2015-7512 |
10,431 | php | bf58162ddf970f63502837f366930e44d6a992cf | https://git.php.net/?p=php-src | https://git.php.net/?p=php-src.git;a=commit;h=bf58162ddf970f63502837f366930e44d6a992cf | None | 1 | PHP_METHOD(Phar, webPhar)
{
zval *mimeoverride = NULL, *rewrite = NULL;
char *alias = NULL, *error, *index_php = NULL, *f404 = NULL, *ru = NULL;
int alias_len = 0, ret, f404_len = 0, free_pathinfo = 0, ru_len = 0;
char *fname, *path_info, *mime_type = NULL, *entry, *pt;
const char *basename;
int fname_len, entry_... | 269,655,417,478,932,030,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2015-5589 | The phar_convert_to_other function in ext/phar/phar_object.c in PHP before 5.4.43, 5.5.x before 5.5.27, and 5.6.x before 5.6.11 does not validate a file pointer before a close operation, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a craft... | https://nvd.nist.gov/vuln/detail/CVE-2015-5589 |
194,753 | php | bf58162ddf970f63502837f366930e44d6a992cf | https://git.php.net/?p=php-src | https://git.php.net/?p=php-src.git;a=commit;h=bf58162ddf970f63502837f366930e44d6a992cf | None | 0 | PHP_METHOD(Phar, webPhar)
{
zval *mimeoverride = NULL, *rewrite = NULL;
char *alias = NULL, *error, *index_php = NULL, *f404 = NULL, *ru = NULL;
int alias_len = 0, ret, f404_len = 0, free_pathinfo = 0, ru_len = 0;
char *fname, *path_info, *mime_type = NULL, *entry, *pt;
const char *basename;
int fname_len, entry_... | 174,843,586,449,077,900,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2015-5589 | The phar_convert_to_other function in ext/phar/phar_object.c in PHP before 5.4.43, 5.5.x before 5.5.27, and 5.6.x before 5.6.11 does not validate a file pointer before a close operation, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a craft... | https://nvd.nist.gov/vuln/detail/CVE-2015-5589 |
10,440 | php | 0765623d6991b62ffcd93ddb6be8a5203a2fa7e2 | https://git.php.net/?p=php-src | https://git.php.net/?p=php-src.git;a=commit;h=0765623d6991b62ffcd93ddb6be8a5203a2fa7e2 | None | 1 | ftp_genlist(ftpbuf_t *ftp, const char *cmd, const char *path TSRMLS_DC)
{
php_stream *tmpstream = NULL;
databuf_t *data = NULL;
char *ptr;
int ch, lastch;
size_t size, rcvd;
size_t lines;
char **ret = NULL;
char **entry;
char *text;
if ((tmpstream = php_stream_fopen_tmpfile()) == NULL) {
php_error_... | 335,438,984,272,943,800,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2015-4643 | Integer overflow in the ftp_genlist function in ext/ftp/ftp.c in PHP before 5.4.42, 5.5.x before 5.5.26, and 5.6.x before 5.6.10 allows remote FTP servers to execute arbitrary code via a long reply to a LIST command, leading to a heap-based buffer overflow. NOTE: this vulnerability exists because of an incomplete fix ... | https://nvd.nist.gov/vuln/detail/CVE-2015-4643 |
194,755 | php | 0765623d6991b62ffcd93ddb6be8a5203a2fa7e2 | https://git.php.net/?p=php-src | https://git.php.net/?p=php-src.git;a=commit;h=0765623d6991b62ffcd93ddb6be8a5203a2fa7e2 | None | 0 | ftp_genlist(ftpbuf_t *ftp, const char *cmd, const char *path TSRMLS_DC)
{
php_stream *tmpstream = NULL;
databuf_t *data = NULL;
char *ptr;
int ch, lastch;
size_t size, rcvd;
size_t lines;
char **ret = NULL;
char **entry;
char *text;
if ((tmpstream = php_stream_fopen_tmpfile()) == NULL) {
php_error_... | 70,397,914,542,979,830,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2015-4643 | Integer overflow in the ftp_genlist function in ext/ftp/ftp.c in PHP before 5.4.42, 5.5.x before 5.5.26, and 5.6.x before 5.6.10 allows remote FTP servers to execute arbitrary code via a long reply to a LIST command, leading to a heap-based buffer overflow. NOTE: this vulnerability exists because of an incomplete fix ... | https://nvd.nist.gov/vuln/detail/CVE-2015-4643 |
10,441 | php | d2ac264ffea5ca2e85640b6736e0c7cd4ee9a4a9 | https://git.php.net/?p=php-src | https://git.php.net/?p=php-src.git;a=commit;h=d2ac264ffea5ca2e85640b6736e0c7cd4ee9a4a9 | None | 1 | PHPAPI char *php_escape_shell_arg(char *str)
{
int x, y = 0, l = strlen(str);
char *cmd;
size_t estimate = (4 * l) + 3;
TSRMLS_FETCH();
cmd = safe_emalloc(4, l, 3); /* worst case */
#ifdef PHP_WIN32
cmd[y++] = '"';
#else
cmd[y++] = '\'';
#endif
for (x = 0; x < l; x++) {
int mb_len = php_mblen(str + x, (l ... | 201,437,012,404,707,300,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2015-4642 | The escapeshellarg function in ext/standard/exec.c in PHP before 5.4.42, 5.5.x before 5.5.26, and 5.6.x before 5.6.10 on Windows allows remote attackers to execute arbitrary OS commands via a crafted string to an application that accepts command-line arguments for a call to the PHP system function. | https://nvd.nist.gov/vuln/detail/CVE-2015-4642 |
194,756 | php | d2ac264ffea5ca2e85640b6736e0c7cd4ee9a4a9 | https://git.php.net/?p=php-src | https://git.php.net/?p=php-src.git;a=commit;h=d2ac264ffea5ca2e85640b6736e0c7cd4ee9a4a9 | None | 0 | PHPAPI char *php_escape_shell_arg(char *str)
{
int x, y = 0, l = strlen(str);
char *cmd;
size_t estimate = (4 * l) + 3;
TSRMLS_FETCH();
cmd = safe_emalloc(4, l, 3); /* worst case */
#ifdef PHP_WIN32
cmd[y++] = '"';
#else
cmd[y++] = '\'';
#endif
for (x = 0; x < l; x++) {
int mb_len = php_mblen(str + x, (l ... | 236,770,724,168,283,750,000,000,000,000,000,000,000 | None | null | [
"CWE-78"
] | CVE-2015-4642 | The escapeshellarg function in ext/standard/exec.c in PHP before 5.4.42, 5.5.x before 5.5.26, and 5.6.x before 5.6.10 on Windows allows remote attackers to execute arbitrary OS commands via a crafted string to an application that accepts command-line arguments for a call to the PHP system function. | https://nvd.nist.gov/vuln/detail/CVE-2015-4642 |
10,459 | qemu | 4b53c2c72cb5541cf394033b528a6fe2a86c0ac1 | https://github.com/bonzini/qemu | http://git.qemu.org/?p=qemu.git;a=commit;h=4b53c2c72cb5541cf394033b528a6fe2a86c0ac1 | virtio: avoid buffer overrun on incoming migration
CVE-2013-6399
vdev->queue_sel is read from the wire, and later used in the
emulation code as an index into vdev->vq[]. If the value of
vdev->queue_sel exceeds the length of vdev->vq[], currently
allocated to be VIRTIO_PCI_QUEUE_MAX elements, subsequent PIO
operations... | 1 | int virtio_load(VirtIODevice *vdev, QEMUFile *f)
{
int i, ret;
uint32_t num;
uint32_t features;
uint32_t supported_features;
BusState *qbus = qdev_get_parent_bus(DEVICE(vdev));
VirtioBusClass *k = VIRTIO_BUS_GET_CLASS(qbus);
if (k->load_config) {
ret = k->load_config(qbus->parent, f... | 324,234,853,826,218,240,000,000,000,000,000,000,000 | None | null | [
"CWE-94"
] | CVE-2013-6399 | Array index error in the virtio_load function in hw/virtio/virtio.c in QEMU before 1.7.2 allows remote attackers to execute arbitrary code via a crafted savevm image. | https://nvd.nist.gov/vuln/detail/CVE-2013-6399 |
194,772 | qemu | 4b53c2c72cb5541cf394033b528a6fe2a86c0ac1 | https://github.com/bonzini/qemu | http://git.qemu.org/?p=qemu.git;a=commit;h=4b53c2c72cb5541cf394033b528a6fe2a86c0ac1 | virtio: avoid buffer overrun on incoming migration
CVE-2013-6399
vdev->queue_sel is read from the wire, and later used in the
emulation code as an index into vdev->vq[]. If the value of
vdev->queue_sel exceeds the length of vdev->vq[], currently
allocated to be VIRTIO_PCI_QUEUE_MAX elements, subsequent PIO
operations... | 0 | int virtio_load(VirtIODevice *vdev, QEMUFile *f)
{
int i, ret;
uint32_t num;
uint32_t features;
uint32_t supported_features;
BusState *qbus = qdev_get_parent_bus(DEVICE(vdev));
VirtioBusClass *k = VIRTIO_BUS_GET_CLASS(qbus);
if (k->load_config) {
ret = k->load_config(qbus->parent, f... | 115,708,194,996,713,120,000,000,000,000,000,000,000 | None | null | [
"CWE-94"
] | CVE-2013-6399 | Array index error in the virtio_load function in hw/virtio/virtio.c in QEMU before 1.7.2 allows remote attackers to execute arbitrary code via a crafted savevm image. | https://nvd.nist.gov/vuln/detail/CVE-2013-6399 |
10,460 | pixman | 857e40f3d2bc2cfb714913e0cd7e6184cf69aca3 | https://cgit.freedesktop.org/pixman/commit/?id=857e40f3d2bc2cfb714913e0cd7e6184cf69aca3 | https://cgit.freedesktop.org/pixman/commit/?id=857e40f3d2bc2cfb714913e0cd7e6184cf69aca3 | None | 1 | create_bits (pixman_format_code_t format,
int width,
int height,
int * rowstride_bytes,
pixman_bool_t clear)
{
int stride;
size_t buf_size;
int bpp;
/* what follows is a long-winded way, avoiding any possibility of inte... | 338,189,852,796,356,470,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2014-9766 | Integer overflow in the create_bits function in pixman-bits-image.c in Pixman before 0.32.6 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via large height and stride values. | https://nvd.nist.gov/vuln/detail/CVE-2014-9766 |
194,773 | pixman | 857e40f3d2bc2cfb714913e0cd7e6184cf69aca3 | https://cgit.freedesktop.org/pixman/commit/?id=857e40f3d2bc2cfb714913e0cd7e6184cf69aca3 | https://cgit.freedesktop.org/pixman/commit/?id=857e40f3d2bc2cfb714913e0cd7e6184cf69aca3 | None | 0 | create_bits (pixman_format_code_t format,
int width,
int height,
int * rowstride_bytes,
pixman_bool_t clear)
{
int stride;
size_t buf_size;
int bpp;
/* what follows is a long-winded way, avoiding any possibility of inte... | 241,257,217,184,630,170,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2014-9766 | Integer overflow in the create_bits function in pixman-bits-image.c in Pixman before 0.32.6 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via large height and stride values. | https://nvd.nist.gov/vuln/detail/CVE-2014-9766 |
10,461 | qemu | 3c99afc779c2c78718a565ad8c5e98de7c2c7484 | https://github.com/bonzini/qemu | https://git.qemu.org/?p=qemu.git;a=commit;h=3c99afc779c2c78718a565ad8c5e98de7c2c7484 | vmxnet3: validate interrupt indices read on migration
CVE-2013-4544
Signed-off-by: Dmitry Fleytman <dmitry@daynix.com>
Reported-by: Michael S. Tsirkin <mst@redhat.com>
Signed-off-by: Michael S. Tsirkin <mst@redhat.com>
Reviewed-by: Dr. David Alan Gilbert <dgilbert@redhat.com>
Message-id: 1396604722-11902-4-git-send-e... | 1 | static int vmxnet3_post_load(void *opaque, int version_id)
{
VMXNET3State *s = opaque;
PCIDevice *d = PCI_DEVICE(s);
vmxnet_tx_pkt_init(&s->tx_pkt, s->max_tx_frags, s->peer_has_vhdr);
vmxnet_rx_pkt_init(&s->rx_pkt, s->peer_has_vhdr);
if (s->msix_used) {
if (!vmxnet3_use_msix_vectors(s, VM... | 41,449,705,420,556,697,000,000,000,000,000,000,000 | vmxnet3.c | 158,084,607,350,311,640,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4544 | hw/net/vmxnet3.c in QEMU 2.0.0-rc0, 1.7.1, and earlier allows local guest users to cause a denial of service or possibly execute arbitrary code via vectors related to (1) RX or (2) TX queue numbers or (3) interrupt indices. NOTE: some of these details are obtained from third party information. | https://nvd.nist.gov/vuln/detail/CVE-2013-4544 |
194,774 | qemu | 3c99afc779c2c78718a565ad8c5e98de7c2c7484 | https://github.com/bonzini/qemu | https://git.qemu.org/?p=qemu.git;a=commit;h=3c99afc779c2c78718a565ad8c5e98de7c2c7484 | vmxnet3: validate interrupt indices read on migration
CVE-2013-4544
Signed-off-by: Dmitry Fleytman <dmitry@daynix.com>
Reported-by: Michael S. Tsirkin <mst@redhat.com>
Signed-off-by: Michael S. Tsirkin <mst@redhat.com>
Reviewed-by: Dr. David Alan Gilbert <dgilbert@redhat.com>
Message-id: 1396604722-11902-4-git-send-e... | 0 | static int vmxnet3_post_load(void *opaque, int version_id)
{
VMXNET3State *s = opaque;
PCIDevice *d = PCI_DEVICE(s);
vmxnet_tx_pkt_init(&s->tx_pkt, s->max_tx_frags, s->peer_has_vhdr);
vmxnet_rx_pkt_init(&s->rx_pkt, s->peer_has_vhdr);
if (s->msix_used) {
if (!vmxnet3_use_msix_vectors(s, VM... | 291,093,312,836,574,350,000,000,000,000,000,000,000 | vmxnet3.c | 316,558,834,407,060,870,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4544 | hw/net/vmxnet3.c in QEMU 2.0.0-rc0, 1.7.1, and earlier allows local guest users to cause a denial of service or possibly execute arbitrary code via vectors related to (1) RX or (2) TX queue numbers or (3) interrupt indices. NOTE: some of these details are obtained from third party information. | https://nvd.nist.gov/vuln/detail/CVE-2013-4544 |
10,462 | qemu | d2ef4b61fe6d33d2a5dcf100a9b9440de341ad62 | https://github.com/bonzini/qemu | http://git.qemu.org/?p=qemu.git;a=commit;h=d2ef4b61fe6d33d2a5dcf100a9b9440de341ad62 | vmstate: fix buffer overflow in target-arm/machine.c
CVE-2013-4531
cpreg_vmstate_indexes is a VARRAY_INT32. A negative value for
cpreg_vmstate_array_len will cause a buffer overflow.
VMSTATE_INT32_LE was supposed to protect against this
but doesn't because it doesn't validate that input is
non-negative.
Fix this ma... | 1 | static int get_int32_le(QEMUFile *f, void *pv, size_t size)
{
int32_t loaded;
int32_t loaded;
qemu_get_sbe32s(f, &loaded);
if (loaded <= *cur) {
*cur = loaded;
return 0;
}
}
| 134,727,717,376,042,790,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2013-4531 | Buffer overflow in target-arm/machine.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a negative value in cpreg_vmstate_array_len in a savevm image. | https://nvd.nist.gov/vuln/detail/CVE-2013-4531 |
194,779 | qemu | d2ef4b61fe6d33d2a5dcf100a9b9440de341ad62 | https://github.com/bonzini/qemu | http://git.qemu.org/?p=qemu.git;a=commit;h=d2ef4b61fe6d33d2a5dcf100a9b9440de341ad62 | vmstate: fix buffer overflow in target-arm/machine.c
CVE-2013-4531
cpreg_vmstate_indexes is a VARRAY_INT32. A negative value for
cpreg_vmstate_array_len will cause a buffer overflow.
VMSTATE_INT32_LE was supposed to protect against this
but doesn't because it doesn't validate that input is
non-negative.
Fix this ma... | 0 | static int get_int32_le(QEMUFile *f, void *pv, size_t size)
{
int32_t loaded;
int32_t loaded;
qemu_get_sbe32s(f, &loaded);
if (loaded >= 0 && loaded <= *cur) {
*cur = loaded;
return 0;
}
}
| 292,787,055,355,379,800,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2013-4531 | Buffer overflow in target-arm/machine.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a negative value in cpreg_vmstate_array_len in a savevm image. | https://nvd.nist.gov/vuln/detail/CVE-2013-4531 |
10,463 | exempi | 886cd1d2314755adb1f4cdb99c16ff00830f0331 | https://cgit.freedesktop.org/exempi/commit/?id=aabedb5e749dd59112a3fe1e8e08f2d934f56666 | https://cgit.freedesktop.org/exempi/commit/?id=886cd1d2314755adb1f4cdb99c16ff00830f0331 | None | 1 | bool TradQT_Manager::ParseCachedBoxes ( const MOOV_Manager & moovMgr )
{
MOOV_Manager::BoxInfo udtaInfo;
MOOV_Manager::BoxRef udtaRef = moovMgr.GetBox ( "moov/udta", &udtaInfo );
if ( udtaRef == 0 ) return false;
for ( XMP_Uns32 i = 0; i < udtaInfo.childCount; ++i ) {
MOOV_Manager::BoxInfo currInfo;
MOOV_Man... | 23,259,527,281,897,320,000,000,000,000,000,000,000 | None | null | [
"CWE-835"
] | CVE-2017-18238 | An issue was discovered in Exempi before 2.4.4. The TradQT_Manager::ParseCachedBoxes function in XMPFiles/source/FormatSupport/QuickTime_Support.cpp allows remote attackers to cause a denial of service (infinite loop) via crafted XMP data in a .qt file. | https://nvd.nist.gov/vuln/detail/CVE-2017-18238 |
194,782 | exempi | 886cd1d2314755adb1f4cdb99c16ff00830f0331 | https://cgit.freedesktop.org/exempi/commit/?id=aabedb5e749dd59112a3fe1e8e08f2d934f56666 | https://cgit.freedesktop.org/exempi/commit/?id=886cd1d2314755adb1f4cdb99c16ff00830f0331 | None | 0 | bool TradQT_Manager::ParseCachedBoxes ( const MOOV_Manager & moovMgr )
{
MOOV_Manager::BoxInfo udtaInfo;
MOOV_Manager::BoxRef udtaRef = moovMgr.GetBox ( "moov/udta", &udtaInfo );
if ( udtaRef == 0 ) return false;
for ( XMP_Uns32 i = 0; i < udtaInfo.childCount; ++i ) {
MOOV_Manager::BoxInfo currInfo;
MOOV_Man... | 146,641,617,753,916,030,000,000,000,000,000,000,000 | None | null | [
"CWE-835"
] | CVE-2017-18238 | An issue was discovered in Exempi before 2.4.4. The TradQT_Manager::ParseCachedBoxes function in XMPFiles/source/FormatSupport/QuickTime_Support.cpp allows remote attackers to cause a denial of service (infinite loop) via crafted XMP data in a .qt file. | https://nvd.nist.gov/vuln/detail/CVE-2017-18238 |
10,468 | exempi | 65a8492832b7335ffabd01f5f64d89dec757c260 | https://cgit.freedesktop.org/exempi/commit/?id=aabedb5e749dd59112a3fe1e8e08f2d934f56666 | https://cgit.freedesktop.org/exempi/commit/?id=65a8492832b7335ffabd01f5f64d89dec757c260 | None | 1 | Chunk::Chunk( ContainerChunk* parent, RIFF_MetaHandler* handler, bool skip, ChunkType c )
{
chunkType = c; // base class assumption
this->parent = parent;
this->oldSize = 0;
this->hasChange = false; // [2414649] valid assumption at creation time
XMP_IO* file = handler->parent->ioRef;
this->oldPos = file->Offs... | 327,787,765,077,432,330,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2017-18233 | An issue was discovered in Exempi before 2.4.4. Integer overflow in the Chunk class in XMPFiles/source/FormatSupport/RIFF.cpp allows remote attackers to cause a denial of service (infinite loop) via crafted XMP data in a .avi file. | https://nvd.nist.gov/vuln/detail/CVE-2017-18233 |
194,787 | exempi | 65a8492832b7335ffabd01f5f64d89dec757c260 | https://cgit.freedesktop.org/exempi/commit/?id=aabedb5e749dd59112a3fe1e8e08f2d934f56666 | https://cgit.freedesktop.org/exempi/commit/?id=65a8492832b7335ffabd01f5f64d89dec757c260 | None | 0 | Chunk::Chunk( ContainerChunk* parent, RIFF_MetaHandler* handler, bool skip, ChunkType c )
{
chunkType = c; // base class assumption
this->parent = parent;
this->oldSize = 0;
this->hasChange = false; // [2414649] valid assumption at creation time
XMP_IO* file = handler->parent->ioRef;
this->oldPos = file->Offs... | 55,066,647,564,386,920,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2017-18233 | An issue was discovered in Exempi before 2.4.4. Integer overflow in the Chunk class in XMPFiles/source/FormatSupport/RIFF.cpp allows remote attackers to cause a denial of service (infinite loop) via crafted XMP data in a .avi file. | https://nvd.nist.gov/vuln/detail/CVE-2017-18233 |
10,469 | qemu | f153b563f8cf121aebf5a2fff5f0110faf58ccb3 | https://github.com/bonzini/qemu | https://git.qemu.org/?p=qemu.git;a=commitdiff;h=f153b563f8cf121aebf5a2fff5f0110faf58ccb3 | cirrus: handle negative pitch in cirrus_invalidate_region()
cirrus_invalidate_region() calls memory_region_set_dirty()
on a per-line basis, always ranging from off_begin to
off_begin+bytesperline. With a negative pitch off_begin
marks the top most used address and thus we need to do an
initial shift backwards by a lin... | 1 | static void cirrus_invalidate_region(CirrusVGAState * s, int off_begin,
int off_pitch, int bytesperline,
int lines)
{
int y;
int off_cur;
int off_cur_end;
for (y = 0; y < lines; y++) {
off_cur = off_begin;
off_cur_end = (off_cur + bytesperline) & s->cirrus_addr_mas... | 18,925,896,616,992,010,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2017-18030 | The cirrus_invalidate_region function in hw/display/cirrus_vga.c in Qemu allows local OS guest privileged users to cause a denial of service (out-of-bounds array access and QEMU process crash) via vectors related to negative pitch. | https://nvd.nist.gov/vuln/detail/CVE-2017-18030 |
194,788 | qemu | f153b563f8cf121aebf5a2fff5f0110faf58ccb3 | https://github.com/bonzini/qemu | https://git.qemu.org/?p=qemu.git;a=commitdiff;h=f153b563f8cf121aebf5a2fff5f0110faf58ccb3 | cirrus: handle negative pitch in cirrus_invalidate_region()
cirrus_invalidate_region() calls memory_region_set_dirty()
on a per-line basis, always ranging from off_begin to
off_begin+bytesperline. With a negative pitch off_begin
marks the top most used address and thus we need to do an
initial shift backwards by a lin... | 0 | static void cirrus_invalidate_region(CirrusVGAState * s, int off_begin,
int off_pitch, int bytesperline,
int lines)
{
int y;
int off_cur;
int off_cur_end;
if (off_pitch < 0) {
off_begin -= bytesperline - 1;
}
for (y = 0; y < lines; y++) {
off_cur = off_beg... | 76,173,464,788,302,900,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2017-18030 | The cirrus_invalidate_region function in hw/display/cirrus_vga.c in Qemu allows local OS guest privileged users to cause a denial of service (out-of-bounds array access and QEMU process crash) via vectors related to negative pitch. | https://nvd.nist.gov/vuln/detail/CVE-2017-18030 |
10,470 | qemu | c05e4667be91b46ab42b5a11babf8e84d476cc6b | https://github.com/bonzini/qemu | http://git.qemu.org/?p=qemu.git;a=commit;h=c05e4667be91b46ab42b5a11babf8e84d476cc6b | qcow2: Fix L1 allocation size in qcow2_snapshot_load_tmp() (CVE-2014-0145)
For the L1 table to loaded for an internal snapshot, the code allocated
only enough memory to hold the currently active L1 table. If the
snapshot's L1 table is actually larger than the current one, this leads
to a buffer overflow.
Signed-off-b... | 1 | int qcow2_snapshot_load_tmp(BlockDriverState *bs,
const char *snapshot_id,
const char *name,
Error **errp)
{
int i, snapshot_index;
BDRVQcowState *s = bs->opaque;
QCowSnapshot *sn;
uint64_t *new_l1_table;
int new_l1_... | 144,482,353,548,212,770,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2014-0145 | Multiple buffer overflows in QEMU before 1.7.2 and 2.x before 2.0.0, allow local users to cause a denial of service (crash) or possibly execute arbitrary code via a large (1) L1 table in the qcow2_snapshot_load_tmp in the QCOW 2 block driver (block/qcow2-snapshot.c) or (2) uncompressed chunk, (3) chunk length, or (4) n... | https://nvd.nist.gov/vuln/detail/CVE-2014-0145 |
194,789 | qemu | c05e4667be91b46ab42b5a11babf8e84d476cc6b | https://github.com/bonzini/qemu | http://git.qemu.org/?p=qemu.git;a=commit;h=c05e4667be91b46ab42b5a11babf8e84d476cc6b | qcow2: Fix L1 allocation size in qcow2_snapshot_load_tmp() (CVE-2014-0145)
For the L1 table to loaded for an internal snapshot, the code allocated
only enough memory to hold the currently active L1 table. If the
snapshot's L1 table is actually larger than the current one, this leads
to a buffer overflow.
Signed-off-b... | 0 | int qcow2_snapshot_load_tmp(BlockDriverState *bs,
const char *snapshot_id,
const char *name,
Error **errp)
{
int i, snapshot_index;
BDRVQcowState *s = bs->opaque;
QCowSnapshot *sn;
uint64_t *new_l1_table;
int new_l1_... | 202,769,357,788,118,670,000,000,000,000,000,000,000 | qcow2-snapshot.c | 270,434,867,997,953,330,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2014-0145 | Multiple buffer overflows in QEMU before 1.7.2 and 2.x before 2.0.0, allow local users to cause a denial of service (crash) or possibly execute arbitrary code via a large (1) L1 table in the qcow2_snapshot_load_tmp in the QCOW 2 block driver (block/qcow2-snapshot.c) or (2) uncompressed chunk, (3) chunk length, or (4) n... | https://nvd.nist.gov/vuln/detail/CVE-2014-0145 |
10,471 | qemu | 509a41bab5306181044b5fff02eadf96d9c8676a | https://github.com/bonzini/qemu | http://git.qemu.org/?p=qemu.git;a=commit;h=509a41bab5306181044b5fff02eadf96d9c8676a | block/cloop: prevent offsets_size integer overflow (CVE-2014-0143)
The following integer overflow in offsets_size can lead to out-of-bounds
memory stores when n_blocks has a huge value:
uint32_t n_blocks, offsets_size;
[...]
ret = bdrv_pread(bs->file, 128 + 4, &s->n_blocks, 4);
[...]
s->n_blocks =... | 1 | static int cloop_open(BlockDriverState *bs, QDict *options, int flags,
Error **errp)
{
BDRVCloopState *s = bs->opaque;
uint32_t offsets_size, max_compressed_block_size = 1, i;
int ret;
bs->read_only = 1;
/* read header */
ret = bdrv_pread(bs->file, 128, &s->block_size, 4)... | 202,962,117,817,616,150,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2014-0143 | Multiple integer overflows in the block drivers in QEMU, possibly before 2.0.0, allow local users to cause a denial of service (crash) via a crafted catalog size in (1) the parallels_open function in block/parallels.c or (2) bochs_open function in bochs.c, a large L1 table in the (3) qcow2_snapshot_load_tmp in qcow2-sn... | https://nvd.nist.gov/vuln/detail/CVE-2014-0143 |
194,790 | qemu | 509a41bab5306181044b5fff02eadf96d9c8676a | https://github.com/bonzini/qemu | http://git.qemu.org/?p=qemu.git;a=commit;h=509a41bab5306181044b5fff02eadf96d9c8676a | block/cloop: prevent offsets_size integer overflow (CVE-2014-0143)
The following integer overflow in offsets_size can lead to out-of-bounds
memory stores when n_blocks has a huge value:
uint32_t n_blocks, offsets_size;
[...]
ret = bdrv_pread(bs->file, 128 + 4, &s->n_blocks, 4);
[...]
s->n_blocks =... | 0 | static int cloop_open(BlockDriverState *bs, QDict *options, int flags,
Error **errp)
{
BDRVCloopState *s = bs->opaque;
uint32_t offsets_size, max_compressed_block_size = 1, i;
int ret;
bs->read_only = 1;
/* read header */
ret = bdrv_pread(bs->file, 128, &s->block_size, 4)... | 31,707,551,150,213,597,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2014-0143 | Multiple integer overflows in the block drivers in QEMU, possibly before 2.0.0, allow local users to cause a denial of service (crash) via a crafted catalog size in (1) the parallels_open function in block/parallels.c or (2) bochs_open function in bochs.c, a large L1 table in the (3) qcow2_snapshot_load_tmp in qcow2-sn... | https://nvd.nist.gov/vuln/detail/CVE-2014-0143 |
10,472 | qemu | e3737b820b45e54b059656dc3f914f895ac7a88b | https://github.com/bonzini/qemu | http://git.qemu.org/?p=qemu.git;a=commit;h=e3737b820b45e54b059656dc3f914f895ac7a88b | bochs: Check catalog_size header field (CVE-2014-0143)
It should neither become negative nor allow unbounded memory
allocations. This fixes aborts in g_malloc() and an s->catalog_bitmap
buffer overflow on big endian hosts.
Signed-off-by: Kevin Wolf <kwolf@redhat.com>
Reviewed-by: Stefan Hajnoczi <stefanha@redhat.com>... | 1 | static int bochs_open(BlockDriverState *bs, QDict *options, int flags,
Error **errp)
{
BDRVBochsState *s = bs->opaque;
uint32_t i;
struct bochs_header bochs;
int ret;
bs->read_only = 1; // no write support yet
ret = bdrv_pread(bs->file, 0, &bochs, sizeof(bochs));
if (... | 228,447,863,724,695,350,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2014-0143 | Multiple integer overflows in the block drivers in QEMU, possibly before 2.0.0, allow local users to cause a denial of service (crash) via a crafted catalog size in (1) the parallels_open function in block/parallels.c or (2) bochs_open function in bochs.c, a large L1 table in the (3) qcow2_snapshot_load_tmp in qcow2-sn... | https://nvd.nist.gov/vuln/detail/CVE-2014-0143 |
194,791 | qemu | e3737b820b45e54b059656dc3f914f895ac7a88b | https://github.com/bonzini/qemu | http://git.qemu.org/?p=qemu.git;a=commit;h=e3737b820b45e54b059656dc3f914f895ac7a88b | bochs: Check catalog_size header field (CVE-2014-0143)
It should neither become negative nor allow unbounded memory
allocations. This fixes aborts in g_malloc() and an s->catalog_bitmap
buffer overflow on big endian hosts.
Signed-off-by: Kevin Wolf <kwolf@redhat.com>
Reviewed-by: Stefan Hajnoczi <stefanha@redhat.com>... | 0 | static int bochs_open(BlockDriverState *bs, QDict *options, int flags,
Error **errp)
{
BDRVBochsState *s = bs->opaque;
uint32_t i;
struct bochs_header bochs;
int ret;
bs->read_only = 1; // no write support yet
ret = bdrv_pread(bs->file, 0, &bochs, sizeof(bochs));
if (... | 9,426,936,449,638,937,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2014-0143 | Multiple integer overflows in the block drivers in QEMU, possibly before 2.0.0, allow local users to cause a denial of service (crash) via a crafted catalog size in (1) the parallels_open function in block/parallels.c or (2) bochs_open function in bochs.c, a large L1 table in the (3) qcow2_snapshot_load_tmp in qcow2-sn... | https://nvd.nist.gov/vuln/detail/CVE-2014-0143 |
10,473 | qemu | db8a31d11d6a60f48d6817530640d75aa72a9a2f | https://github.com/bonzini/qemu | http://git.qemu.org/?p=qemu.git;a=commit;h=db8a31d11d6a60f48d6817530640d75aa72a9a2f | qcow2: Avoid integer overflow in get_refcount (CVE-2014-0143)
This ensures that the checks catch all invalid cluster indexes
instead of returning the refcount of a wrong cluster.
Signed-off-by: Kevin Wolf <kwolf@redhat.com>
Reviewed-by: Max Reitz <mreitz@redhat.com>
Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com... | 1 | static int get_refcount(BlockDriverState *bs, int64_t cluster_index)
{
BDRVQcowState *s = bs->opaque;
int refcount_table_index, block_index;
int64_t refcount_block_offset;
int ret;
uint16_t *refcount_block;
uint16_t refcount;
refcount_table_index = cluster_index >> (s->cluster_bits - ... | 40,167,723,741,227,405,000,000,000,000,000,000,000 | qcow2-refcount.c | 238,076,570,902,205,180,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2014-0143 | Multiple integer overflows in the block drivers in QEMU, possibly before 2.0.0, allow local users to cause a denial of service (crash) via a crafted catalog size in (1) the parallels_open function in block/parallels.c or (2) bochs_open function in bochs.c, a large L1 table in the (3) qcow2_snapshot_load_tmp in qcow2-sn... | https://nvd.nist.gov/vuln/detail/CVE-2014-0143 |
194,792 | qemu | db8a31d11d6a60f48d6817530640d75aa72a9a2f | https://github.com/bonzini/qemu | http://git.qemu.org/?p=qemu.git;a=commit;h=db8a31d11d6a60f48d6817530640d75aa72a9a2f | qcow2: Avoid integer overflow in get_refcount (CVE-2014-0143)
This ensures that the checks catch all invalid cluster indexes
instead of returning the refcount of a wrong cluster.
Signed-off-by: Kevin Wolf <kwolf@redhat.com>
Reviewed-by: Max Reitz <mreitz@redhat.com>
Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com... | 0 | static int get_refcount(BlockDriverState *bs, int64_t cluster_index)
{
BDRVQcowState *s = bs->opaque;
uint64_t refcount_table_index, block_index;
int64_t refcount_block_offset;
int ret;
uint16_t *refcount_block;
uint16_t refcount;
refcount_table_index = cluster_index >> (s->cluster_bi... | 311,035,485,956,368,570,000,000,000,000,000,000,000 | qcow2-refcount.c | 172,213,297,254,765,840,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2014-0143 | Multiple integer overflows in the block drivers in QEMU, possibly before 2.0.0, allow local users to cause a denial of service (crash) via a crafted catalog size in (1) the parallels_open function in block/parallels.c or (2) bochs_open function in bochs.c, a large L1 table in the (3) qcow2_snapshot_load_tmp in qcow2-sn... | https://nvd.nist.gov/vuln/detail/CVE-2014-0143 |
10,474 | qemu | 6a83f8b5bec6f59e56cc49bd49e4c3f8f805d56f | https://github.com/bonzini/qemu | http://git.qemu.org/?p=qemu.git;a=commit;h=6a83f8b5bec6f59e56cc49bd49e4c3f8f805d56f | qcow2: Check maximum L1 size in qcow2_snapshot_load_tmp() (CVE-2014-0143)
This avoids an unbounded allocation.
Signed-off-by: Kevin Wolf <kwolf@redhat.com>
Reviewed-by: Max Reitz <mreitz@redhat.com>
Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com> | 1 | int qcow2_snapshot_load_tmp(BlockDriverState *bs,
const char *snapshot_id,
const char *name,
Error **errp)
{
int i, snapshot_index;
BDRVQcowState *s = bs->opaque;
QCowSnapshot *sn;
uint64_t *new_l1_table;
int new_l1_... | 73,607,432,206,298,630,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2014-0143 | Multiple integer overflows in the block drivers in QEMU, possibly before 2.0.0, allow local users to cause a denial of service (crash) via a crafted catalog size in (1) the parallels_open function in block/parallels.c or (2) bochs_open function in bochs.c, a large L1 table in the (3) qcow2_snapshot_load_tmp in qcow2-sn... | https://nvd.nist.gov/vuln/detail/CVE-2014-0143 |
194,793 | qemu | 6a83f8b5bec6f59e56cc49bd49e4c3f8f805d56f | https://github.com/bonzini/qemu | http://git.qemu.org/?p=qemu.git;a=commit;h=6a83f8b5bec6f59e56cc49bd49e4c3f8f805d56f | qcow2: Check maximum L1 size in qcow2_snapshot_load_tmp() (CVE-2014-0143)
This avoids an unbounded allocation.
Signed-off-by: Kevin Wolf <kwolf@redhat.com>
Reviewed-by: Max Reitz <mreitz@redhat.com>
Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com> | 0 | int qcow2_snapshot_load_tmp(BlockDriverState *bs,
const char *snapshot_id,
const char *name,
Error **errp)
{
int i, snapshot_index;
BDRVQcowState *s = bs->opaque;
QCowSnapshot *sn;
uint64_t *new_l1_table;
int new_l1_... | 139,867,346,846,521,250,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2014-0143 | Multiple integer overflows in the block drivers in QEMU, possibly before 2.0.0, allow local users to cause a denial of service (crash) via a crafted catalog size in (1) the parallels_open function in block/parallels.c or (2) bochs_open function in bochs.c, a large L1 table in the (3) qcow2_snapshot_load_tmp in qcow2-sn... | https://nvd.nist.gov/vuln/detail/CVE-2014-0143 |
10,476 | qemu | 8f4754ede56e3f9ea3fd7207f4a7c4453e59285b | https://github.com/bonzini/qemu | http://git.qemu.org/?p=qemu.git;a=commit;h=8f4754ede56e3f9ea3fd7207f4a7c4453e59285b | block: Limit request size (CVE-2014-0143)
Limiting the size of a single request to INT_MAX not only fixes a
direct integer overflow in bdrv_check_request() (which would only
trigger bad behaviour with ridiculously huge images, as in close to
2^64 bytes), but can also prevent overflows in all block drivers.
Signed-off... | 1 | static int bdrv_check_request(BlockDriverState *bs, int64_t sector_num,
int nb_sectors)
{
return bdrv_check_byte_request(bs, sector_num * BDRV_SECTOR_SIZE,
nb_sectors * BDRV_SECTOR_SIZE);
}
| 334,793,103,852,536,480,000,000,000,000,000,000,000 | block.c | 262,553,636,226,404,800,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2014-0143 | Multiple integer overflows in the block drivers in QEMU, possibly before 2.0.0, allow local users to cause a denial of service (crash) via a crafted catalog size in (1) the parallels_open function in block/parallels.c or (2) bochs_open function in bochs.c, a large L1 table in the (3) qcow2_snapshot_load_tmp in qcow2-sn... | https://nvd.nist.gov/vuln/detail/CVE-2014-0143 |
194,795 | qemu | 8f4754ede56e3f9ea3fd7207f4a7c4453e59285b | https://github.com/bonzini/qemu | http://git.qemu.org/?p=qemu.git;a=commit;h=8f4754ede56e3f9ea3fd7207f4a7c4453e59285b | block: Limit request size (CVE-2014-0143)
Limiting the size of a single request to INT_MAX not only fixes a
direct integer overflow in bdrv_check_request() (which would only
trigger bad behaviour with ridiculously huge images, as in close to
2^64 bytes), but can also prevent overflows in all block drivers.
Signed-off... | 0 | static int bdrv_check_request(BlockDriverState *bs, int64_t sector_num,
int nb_sectors)
{
if (nb_sectors > INT_MAX / BDRV_SECTOR_SIZE) {
return -EIO;
}
return bdrv_check_byte_request(bs, sector_num * BDRV_SECTOR_SIZE,
nb_sectors ... | 194,211,635,001,600,050,000,000,000,000,000,000,000 | block.c | 144,295,483,611,155,140,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2014-0143 | Multiple integer overflows in the block drivers in QEMU, possibly before 2.0.0, allow local users to cause a denial of service (crash) via a crafted catalog size in (1) the parallels_open function in block/parallels.c or (2) bochs_open function in bochs.c, a large L1 table in the (3) qcow2_snapshot_load_tmp in qcow2-sn... | https://nvd.nist.gov/vuln/detail/CVE-2014-0143 |
10,477 | qemu | cab60de930684c33f67d4e32c7509b567f8c445b | https://github.com/bonzini/qemu | http://git.qemu.org/?p=qemu.git;a=commit;h=cab60de930684c33f67d4e32c7509b567f8c445b | qcow2: Fix new L1 table size check (CVE-2014-0143)
The size in bytes is assigned to an int later, so check that instead of
the number of entries.
Signed-off-by: Kevin Wolf <kwolf@redhat.com>
Reviewed-by: Max Reitz <mreitz@redhat.com>
Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com> | 1 | int qcow2_grow_l1_table(BlockDriverState *bs, uint64_t min_size,
bool exact_size)
{
BDRVQcowState *s = bs->opaque;
int new_l1_size2, ret, i;
uint64_t *new_l1_table;
int64_t old_l1_table_offset, old_l1_size;
int64_t new_l1_table_offset, new_l1_size;
uint8_t data[12];
... | 250,508,172,956,291,080,000,000,000,000,000,000,000 | qcow2-cluster.c | 187,376,374,035,438,880,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2014-0143 | Multiple integer overflows in the block drivers in QEMU, possibly before 2.0.0, allow local users to cause a denial of service (crash) via a crafted catalog size in (1) the parallels_open function in block/parallels.c or (2) bochs_open function in bochs.c, a large L1 table in the (3) qcow2_snapshot_load_tmp in qcow2-sn... | https://nvd.nist.gov/vuln/detail/CVE-2014-0143 |
194,796 | qemu | cab60de930684c33f67d4e32c7509b567f8c445b | https://github.com/bonzini/qemu | http://git.qemu.org/?p=qemu.git;a=commit;h=cab60de930684c33f67d4e32c7509b567f8c445b | qcow2: Fix new L1 table size check (CVE-2014-0143)
The size in bytes is assigned to an int later, so check that instead of
the number of entries.
Signed-off-by: Kevin Wolf <kwolf@redhat.com>
Reviewed-by: Max Reitz <mreitz@redhat.com>
Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com> | 0 | int qcow2_grow_l1_table(BlockDriverState *bs, uint64_t min_size,
bool exact_size)
{
BDRVQcowState *s = bs->opaque;
int new_l1_size2, ret, i;
uint64_t *new_l1_table;
int64_t old_l1_table_offset, old_l1_size;
int64_t new_l1_table_offset, new_l1_size;
uint8_t data[12];
... | 340,036,502,879,419,250,000,000,000,000,000,000,000 | qcow2-cluster.c | 209,321,718,369,432,930,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2014-0143 | Multiple integer overflows in the block drivers in QEMU, possibly before 2.0.0, allow local users to cause a denial of service (crash) via a crafted catalog size in (1) the parallels_open function in block/parallels.c or (2) bochs_open function in bochs.c, a large L1 table in the (3) qcow2_snapshot_load_tmp in qcow2-sn... | https://nvd.nist.gov/vuln/detail/CVE-2014-0143 |
10,485 | qemu | 9c6b899f7a46893ab3b671e341a2234e9c0c060e | https://github.com/bonzini/qemu | http://git.qemu-project.org/?p=qemu.git;a=commitdiff;h=9c6b899f7a46893ab3b671e341a2234e9c0c060e | 9pfs: local: set the path of the export root to "."
The local backend was recently converted to using "at*()" syscalls in order
to ensure all accesses happen below the shared directory. This requires that
we only pass relative paths, otherwise the dirfd argument to the "at*()"
syscalls is ignored and the path is treat... | 1 | static int local_name_to_path(FsContext *ctx, V9fsPath *dir_path,
const char *name, V9fsPath *target)
{
if (dir_path) {
v9fs_path_sprintf(target, "%s/%s", dir_path->data, name);
} else {
v9fs_path_sprintf(target, "%s", name);
}
return 0;
}
| 131,046,614,036,663,150,000,000,000,000,000,000,000 | 9p-local.c | 223,156,347,871,135,400,000,000,000,000,000,000,000 | [
"CWE-732"
] | CVE-2017-7471 | Quick Emulator (Qemu) built with the VirtFS, host directory sharing via Plan 9 File System (9pfs) support, is vulnerable to an improper access control issue. It could occur while accessing files on a shared host directory. A privileged user inside guest could use this flaw to access host file system beyond the shared f... | https://nvd.nist.gov/vuln/detail/CVE-2017-7471 |
194,805 | qemu | 9c6b899f7a46893ab3b671e341a2234e9c0c060e | https://github.com/bonzini/qemu | http://git.qemu-project.org/?p=qemu.git;a=commitdiff;h=9c6b899f7a46893ab3b671e341a2234e9c0c060e | 9pfs: local: set the path of the export root to "."
The local backend was recently converted to using "at*()" syscalls in order
to ensure all accesses happen below the shared directory. This requires that
we only pass relative paths, otherwise the dirfd argument to the "at*()"
syscalls is ignored and the path is treat... | 0 | static int local_name_to_path(FsContext *ctx, V9fsPath *dir_path,
const char *name, V9fsPath *target)
{
if (dir_path) {
v9fs_path_sprintf(target, "%s/%s", dir_path->data, name);
} else if (strcmp(name, "/")) {
v9fs_path_sprintf(target, "%s", name);
} else {
... | 242,986,198,876,199,870,000,000,000,000,000,000,000 | 9p-local.c | 105,999,566,018,773,510,000,000,000,000,000,000,000 | [
"CWE-732"
] | CVE-2017-7471 | Quick Emulator (Qemu) built with the VirtFS, host directory sharing via Plan 9 File System (9pfs) support, is vulnerable to an improper access control issue. It could occur while accessing files on a shared host directory. A privileged user inside guest could use this flaw to access host file system beyond the shared f... | https://nvd.nist.gov/vuln/detail/CVE-2017-7471 |
10,486 | qemu | bea60dd7679364493a0d7f5b54316c767cf894ef | https://github.com/bonzini/qemu | https://git.qemu.org/?p=qemu.git;a=commitdiff;h=bea60dd7679364493a0d7f5b54316c767cf894ef | ui/vnc: fix potential memory corruption issues
this patch makes the VNC server work correctly if the
server surface and the guest surface have different sizes.
Basically the server surface is adjusted to not exceed VNC_MAX_WIDTH
x VNC_MAX_HEIGHT and additionally the width is rounded up to multiple of
VNC_DIRTY_PIXELS... | 1 | static void check_pointer_type_change(Notifier *notifier, void *data)
{
VncState *vs = container_of(notifier, VncState, mouse_mode_notifier);
int absolute = qemu_input_is_absolute();
if (vnc_has_feature(vs, VNC_FEATURE_POINTER_TYPE_CHANGE) && vs->absolute != absolute) {
vnc_write_u8(vs, 0);
... | 294,365,666,750,487,830,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2017-2633 | An out-of-bounds memory access issue was found in Quick Emulator (QEMU) before 1.7.2 in the VNC display driver. This flaw could occur while refreshing the VNC display surface area in the 'vnc_refresh_server_surface'. A user inside a guest could use this flaw to crash the QEMU process. | https://nvd.nist.gov/vuln/detail/CVE-2017-2633 |
194,806 | qemu | bea60dd7679364493a0d7f5b54316c767cf894ef | https://github.com/bonzini/qemu | https://git.qemu.org/?p=qemu.git;a=commitdiff;h=bea60dd7679364493a0d7f5b54316c767cf894ef | ui/vnc: fix potential memory corruption issues
this patch makes the VNC server work correctly if the
server surface and the guest surface have different sizes.
Basically the server surface is adjusted to not exceed VNC_MAX_WIDTH
x VNC_MAX_HEIGHT and additionally the width is rounded up to multiple of
VNC_DIRTY_PIXELS... | 0 | static void check_pointer_type_change(Notifier *notifier, void *data)
{
VncState *vs = container_of(notifier, VncState, mouse_mode_notifier);
int absolute = qemu_input_is_absolute();
if (vnc_has_feature(vs, VNC_FEATURE_POINTER_TYPE_CHANGE) && vs->absolute != absolute) {
vnc_write_u8(vs, 0);
... | 213,791,673,479,261,230,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2017-2633 | An out-of-bounds memory access issue was found in Quick Emulator (QEMU) before 1.7.2 in the VNC display driver. This flaw could occur while refreshing the VNC display surface area in the 'vnc_refresh_server_surface'. A user inside a guest could use this flaw to crash the QEMU process. | https://nvd.nist.gov/vuln/detail/CVE-2017-2633 |
10,519 | webserver | fbda667221c51f0aa476a02366e0cf66cb012f88 | https://github.com/cherokee/webserver | https://github.com/cherokee/webserver/commit/fbda667221c51f0aa476a02366e0cf66cb012f88 | Prevent the LDAP validator from accepting an empty password. | 1 | cherokee_validator_ldap_check (cherokee_validator_ldap_t *ldap,
cherokee_connection_t *conn)
{
int re;
ret_t ret;
size_t size;
char *dn;
LDAPMessage *m... | 314,951,664,888,072,700,000,000,000,000,000,000,000 | validator_ldap.c | 54,143,953,091,956,420,000,000,000,000,000,000,000 | [
"CWE-287"
] | CVE-2014-4668 | The cherokee_validator_ldap_check function in validator_ldap.c in Cherokee 1.2.103 and earlier, when LDAP is used, does not properly consider unauthenticated-bind semantics, which allows remote attackers to bypass authentication via an empty password. | https://nvd.nist.gov/vuln/detail/CVE-2014-4668 |
194,828 | webserver | fbda667221c51f0aa476a02366e0cf66cb012f88 | https://github.com/cherokee/webserver | https://github.com/cherokee/webserver/commit/fbda667221c51f0aa476a02366e0cf66cb012f88 | Prevent the LDAP validator from accepting an empty password. | 0 | cherokee_validator_ldap_check (cherokee_validator_ldap_t *ldap,
cherokee_connection_t *conn)
{
int re;
ret_t ret;
size_t size;
char *dn;
LDAPMessage *m... | 309,147,633,106,261,970,000,000,000,000,000,000,000 | validator_ldap.c | 295,213,653,885,621,000,000,000,000,000,000,000,000 | [
"CWE-287"
] | CVE-2014-4668 | The cherokee_validator_ldap_check function in validator_ldap.c in Cherokee 1.2.103 and earlier, when LDAP is used, does not properly consider unauthenticated-bind semantics, which allows remote attackers to bypass authentication via an empty password. | https://nvd.nist.gov/vuln/detail/CVE-2014-4668 |
10,520 | postgres | 31400a673325147e1205326008e32135a78b4d8a | https://github.com/postgres/postgres | https://github.com/postgres/postgres/commit/31400a673325147e1205326008e32135a78b4d8a | Predict integer overflow to avoid buffer overruns.
Several functions, mostly type input functions, calculated an allocation
size such that the calculation wrapped to a small positive value when
arguments implied a sufficiently-large requirement. Writes past the end
of the inadvertent small allocation followed shortly... | 1 | hstore_from_array(PG_FUNCTION_ARGS)
{
ArrayType *in_array = PG_GETARG_ARRAYTYPE_P(0);
int ndims = ARR_NDIM(in_array);
int count;
int32 buflen;
HStore *out;
Pairs *pairs;
Datum *in_datums;
bool *in_nulls;
int in_count;
int i;
Assert(ARR_ELEMTYPE(in_array) == TEXTOID);
switch (ndims)
... | 35,573,989,238,073,480,000,000,000,000,000,000,000 | hstore_io.c | 316,768,376,712,621,030,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2014-0064 | Multiple integer overflows in the path_in and other unspecified functions in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allow remote authenticated users to have unspecified impact and attack vectors, which trigger a buffer overflow. NOTE: this identif... | https://nvd.nist.gov/vuln/detail/CVE-2014-0064 |
194,829 | postgres | 31400a673325147e1205326008e32135a78b4d8a | https://github.com/postgres/postgres | https://github.com/postgres/postgres/commit/31400a673325147e1205326008e32135a78b4d8a | Predict integer overflow to avoid buffer overruns.
Several functions, mostly type input functions, calculated an allocation
size such that the calculation wrapped to a small positive value when
arguments implied a sufficiently-large requirement. Writes past the end
of the inadvertent small allocation followed shortly... | 0 | hstore_from_array(PG_FUNCTION_ARGS)
{
ArrayType *in_array = PG_GETARG_ARRAYTYPE_P(0);
int ndims = ARR_NDIM(in_array);
int count;
int32 buflen;
HStore *out;
Pairs *pairs;
Datum *in_datums;
bool *in_nulls;
int in_count;
int i;
Assert(ARR_ELEMTYPE(in_array) == TEXTOID);
switch (ndims)
... | 64,623,284,569,112,220,000,000,000,000,000,000,000 | hstore_io.c | 21,919,448,174,558,755,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2014-0064 | Multiple integer overflows in the path_in and other unspecified functions in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allow remote authenticated users to have unspecified impact and attack vectors, which trigger a buffer overflow. NOTE: this identif... | https://nvd.nist.gov/vuln/detail/CVE-2014-0064 |
10,521 | postgres | 31400a673325147e1205326008e32135a78b4d8a | https://github.com/postgres/postgres | https://github.com/postgres/postgres/commit/31400a673325147e1205326008e32135a78b4d8a | Predict integer overflow to avoid buffer overruns.
Several functions, mostly type input functions, calculated an allocation
size such that the calculation wrapped to a small positive value when
arguments implied a sufficiently-large requirement. Writes past the end
of the inadvertent small allocation followed shortly... | 1 | hstore_from_arrays(PG_FUNCTION_ARGS)
{
int32 buflen;
HStore *out;
Pairs *pairs;
Datum *key_datums;
bool *key_nulls;
int key_count;
Datum *value_datums;
bool *value_nulls;
int value_count;
ArrayType *key_array;
ArrayType *value_array;
int i;
if (PG_ARGISNULL(0))
PG_RETURN_NULL(... | 39,825,315,315,274,815,000,000,000,000,000,000,000 | hstore_io.c | 316,768,376,712,621,030,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2014-0064 | Multiple integer overflows in the path_in and other unspecified functions in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allow remote authenticated users to have unspecified impact and attack vectors, which trigger a buffer overflow. NOTE: this identif... | https://nvd.nist.gov/vuln/detail/CVE-2014-0064 |
194,830 | postgres | 31400a673325147e1205326008e32135a78b4d8a | https://github.com/postgres/postgres | https://github.com/postgres/postgres/commit/31400a673325147e1205326008e32135a78b4d8a | Predict integer overflow to avoid buffer overruns.
Several functions, mostly type input functions, calculated an allocation
size such that the calculation wrapped to a small positive value when
arguments implied a sufficiently-large requirement. Writes past the end
of the inadvertent small allocation followed shortly... | 0 | hstore_from_arrays(PG_FUNCTION_ARGS)
{
int32 buflen;
HStore *out;
Pairs *pairs;
Datum *key_datums;
bool *key_nulls;
int key_count;
Datum *value_datums;
bool *value_nulls;
int value_count;
ArrayType *key_array;
ArrayType *value_array;
int i;
if (PG_ARGISNULL(0))
PG_RETURN_NULL(... | 111,412,007,291,673,790,000,000,000,000,000,000,000 | hstore_io.c | 21,919,448,174,558,755,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2014-0064 | Multiple integer overflows in the path_in and other unspecified functions in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allow remote authenticated users to have unspecified impact and attack vectors, which trigger a buffer overflow. NOTE: this identif... | https://nvd.nist.gov/vuln/detail/CVE-2014-0064 |
10,523 | postgres | 31400a673325147e1205326008e32135a78b4d8a | https://github.com/postgres/postgres | https://github.com/postgres/postgres/commit/31400a673325147e1205326008e32135a78b4d8a | Predict integer overflow to avoid buffer overruns.
Several functions, mostly type input functions, calculated an allocation
size such that the calculation wrapped to a small positive value when
arguments implied a sufficiently-large requirement. Writes past the end
of the inadvertent small allocation followed shortly... | 1 | hstore_recv(PG_FUNCTION_ARGS)
{
int32 buflen;
HStore *out;
Pairs *pairs;
int32 i;
int32 pcount;
StringInfo buf = (StringInfo) PG_GETARG_POINTER(0);
pcount = pq_getmsgint(buf, 4);
if (pcount == 0)
{
out = hstorePairs(NULL, 0, 0);
PG_RETURN_POINTER(out);
}
pairs = palloc(pcount * sizeof(Pai... | 173,364,060,110,722,760,000,000,000,000,000,000,000 | hstore_io.c | 316,768,376,712,621,030,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2014-0064 | Multiple integer overflows in the path_in and other unspecified functions in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allow remote authenticated users to have unspecified impact and attack vectors, which trigger a buffer overflow. NOTE: this identif... | https://nvd.nist.gov/vuln/detail/CVE-2014-0064 |
194,832 | postgres | 31400a673325147e1205326008e32135a78b4d8a | https://github.com/postgres/postgres | https://github.com/postgres/postgres/commit/31400a673325147e1205326008e32135a78b4d8a | Predict integer overflow to avoid buffer overruns.
Several functions, mostly type input functions, calculated an allocation
size such that the calculation wrapped to a small positive value when
arguments implied a sufficiently-large requirement. Writes past the end
of the inadvertent small allocation followed shortly... | 0 | hstore_recv(PG_FUNCTION_ARGS)
{
int32 buflen;
HStore *out;
Pairs *pairs;
int32 i;
int32 pcount;
StringInfo buf = (StringInfo) PG_GETARG_POINTER(0);
pcount = pq_getmsgint(buf, 4);
if (pcount == 0)
{
out = hstorePairs(NULL, 0, 0);
PG_RETURN_POINTER(out);
}
if (pcount < 0 || pcount > MaxAlloc... | 143,753,466,148,318,870,000,000,000,000,000,000,000 | hstore_io.c | 21,919,448,174,558,755,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2014-0064 | Multiple integer overflows in the path_in and other unspecified functions in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allow remote authenticated users to have unspecified impact and attack vectors, which trigger a buffer overflow. NOTE: this identif... | https://nvd.nist.gov/vuln/detail/CVE-2014-0064 |
10,524 | postgres | 31400a673325147e1205326008e32135a78b4d8a | https://github.com/postgres/postgres | https://github.com/postgres/postgres/commit/31400a673325147e1205326008e32135a78b4d8a | Predict integer overflow to avoid buffer overruns.
Several functions, mostly type input functions, calculated an allocation
size such that the calculation wrapped to a small positive value when
arguments implied a sufficiently-large requirement. Writes past the end
of the inadvertent small allocation followed shortly... | 1 | hstoreArrayToPairs(ArrayType *a, int *npairs)
{
Datum *key_datums;
bool *key_nulls;
int key_count;
Pairs *key_pairs;
int bufsiz;
int i,
j;
deconstruct_array(a,
TEXTOID, -1, false, 'i',
&key_datums, &key_nulls, &key_count);
if (key_count == 0)
{
*npairs = 0;
return NULL;
... | 9,891,750,996,379,655,000,000,000,000,000,000,000 | hstore_op.c | 36,855,987,079,836,915,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2014-0064 | Multiple integer overflows in the path_in and other unspecified functions in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allow remote authenticated users to have unspecified impact and attack vectors, which trigger a buffer overflow. NOTE: this identif... | https://nvd.nist.gov/vuln/detail/CVE-2014-0064 |
194,833 | postgres | 31400a673325147e1205326008e32135a78b4d8a | https://github.com/postgres/postgres | https://github.com/postgres/postgres/commit/31400a673325147e1205326008e32135a78b4d8a | Predict integer overflow to avoid buffer overruns.
Several functions, mostly type input functions, calculated an allocation
size such that the calculation wrapped to a small positive value when
arguments implied a sufficiently-large requirement. Writes past the end
of the inadvertent small allocation followed shortly... | 0 | hstoreArrayToPairs(ArrayType *a, int *npairs)
{
Datum *key_datums;
bool *key_nulls;
int key_count;
Pairs *key_pairs;
int bufsiz;
int i,
j;
deconstruct_array(a,
TEXTOID, -1, false, 'i',
&key_datums, &key_nulls, &key_count);
if (key_count == 0)
{
*npairs = 0;
return NULL;
... | 319,309,465,075,482,660,000,000,000,000,000,000,000 | hstore_op.c | 197,009,559,791,074,060,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2014-0064 | Multiple integer overflows in the path_in and other unspecified functions in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allow remote authenticated users to have unspecified impact and attack vectors, which trigger a buffer overflow. NOTE: this identif... | https://nvd.nist.gov/vuln/detail/CVE-2014-0064 |
10,533 | postgres | 31400a673325147e1205326008e32135a78b4d8a | https://github.com/postgres/postgres | https://github.com/postgres/postgres/commit/31400a673325147e1205326008e32135a78b4d8a | Predict integer overflow to avoid buffer overruns.
Several functions, mostly type input functions, calculated an allocation
size such that the calculation wrapped to a small positive value when
arguments implied a sufficiently-large requirement. Writes past the end
of the inadvertent small allocation followed shortly... | 1 | path_in(PG_FUNCTION_ARGS)
{
char *str = PG_GETARG_CSTRING(0);
PATH *path;
int isopen;
char *s;
int npts;
int size;
int depth = 0;
if ((npts = pair_count(str, ',')) <= 0)
ereport(ERROR,
(errcode(ERRCODE_INVALID_TEXT_REPRESENTATION),
errmsg("invalid input syntax for type path: \... | 185,822,385,736,836,400,000,000,000,000,000,000,000 | geo_ops.c | 8,157,459,893,315,236,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2014-0064 | Multiple integer overflows in the path_in and other unspecified functions in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allow remote authenticated users to have unspecified impact and attack vectors, which trigger a buffer overflow. NOTE: this identif... | https://nvd.nist.gov/vuln/detail/CVE-2014-0064 |
194,842 | postgres | 31400a673325147e1205326008e32135a78b4d8a | https://github.com/postgres/postgres | https://github.com/postgres/postgres/commit/31400a673325147e1205326008e32135a78b4d8a | Predict integer overflow to avoid buffer overruns.
Several functions, mostly type input functions, calculated an allocation
size such that the calculation wrapped to a small positive value when
arguments implied a sufficiently-large requirement. Writes past the end
of the inadvertent small allocation followed shortly... | 0 | path_in(PG_FUNCTION_ARGS)
{
char *str = PG_GETARG_CSTRING(0);
PATH *path;
int isopen;
char *s;
int npts;
int size;
int base_size;
int depth = 0;
if ((npts = pair_count(str, ',')) <= 0)
ereport(ERROR,
(errcode(ERRCODE_INVALID_TEXT_REPRESENTATION),
errmsg("invalid input synta... | 4,264,604,830,547,135,000,000,000,000,000,000,000 | geo_ops.c | 164,052,151,275,021,850,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2014-0064 | Multiple integer overflows in the path_in and other unspecified functions in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allow remote authenticated users to have unspecified impact and attack vectors, which trigger a buffer overflow. NOTE: this identif... | https://nvd.nist.gov/vuln/detail/CVE-2014-0064 |
10,551 | libreswan | 2899351224fe2940aec37d7656e1e392c0fe07f0 | https://github.com/libreswan/libreswan | https://github.com/libreswan/libreswan/commit/2899351224fe2940aec37d7656e1e392c0fe07f0 | SECURITY: Properly handle IKEv2 I1 notification packet without KE payload | 1 | stf_status ikev2parent_inI1outR1(struct msg_digest *md)
{
struct state *st = md->st;
lset_t policy = POLICY_IKEV2_ALLOW;
struct connection *c = find_host_connection(&md->iface->ip_addr,
md->iface->port,
&md->sender,
md->sender_port,
POLICY_IKEV2_ALLOW);
/* retrieve st->st_gi... | 38,971,431,341,179,710,000,000,000,000,000,000,000 | ikev2_parent.c | 85,811,802,628,764,420,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-7294 | The ikev2parent_inI1outR1 function in pluto/ikev2_parent.c in libreswan before 3.7 allows remote attackers to cause a denial of service (restart) via an IKEv2 I1 notification without a KE payload. | https://nvd.nist.gov/vuln/detail/CVE-2013-7294 |
194,860 | libreswan | 2899351224fe2940aec37d7656e1e392c0fe07f0 | https://github.com/libreswan/libreswan | https://github.com/libreswan/libreswan/commit/2899351224fe2940aec37d7656e1e392c0fe07f0 | SECURITY: Properly handle IKEv2 I1 notification packet without KE payload | 0 | stf_status ikev2parent_inI1outR1(struct msg_digest *md)
{
struct state *st = md->st;
lset_t policy = POLICY_IKEV2_ALLOW;
struct connection *c = find_host_connection(&md->iface->ip_addr,
md->iface->port,
&md->sender,
md->sender_port,
POLICY_IKEV2_ALLOW);
/* retrieve st->st_gi... | 278,366,992,337,661,500,000,000,000,000,000,000,000 | ikev2_parent.c | 232,643,180,800,094,300,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-7294 | The ikev2parent_inI1outR1 function in pluto/ikev2_parent.c in libreswan before 3.7 allows remote attackers to cause a denial of service (restart) via an IKEv2 I1 notification without a KE payload. | https://nvd.nist.gov/vuln/detail/CVE-2013-7294 |
10,559 | redis | fdf9d455098f54f7666c702ae464e6ea21e25411 | https://github.com/antirez/redis | https://github.com/antirez/redis/commit/fdf9d455098f54f7666c702ae464e6ea21e25411 | disable loading lua bytecode | 1 | static void f_parser (lua_State *L, void *ud) {
int i;
Proto *tf;
Closure *cl;
struct SParser *p = cast(struct SParser *, ud);
int c = luaZ_lookahead(p->z);
luaC_checkGC(L);
tf = ((c == LUA_SIGNATURE[0]) ? luaU_undump : luaY_parser)(L, p->z,
... | 299,852,641,650,757,280,000,000,000,000,000,000,000 | None | null | [
"CWE-17"
] | CVE-2015-4335 | Redis before 2.8.21 and 3.x before 3.0.2 allows remote attackers to execute arbitrary Lua bytecode via the eval command. | https://nvd.nist.gov/vuln/detail/CVE-2015-4335 |
194,868 | redis | fdf9d455098f54f7666c702ae464e6ea21e25411 | https://github.com/antirez/redis | https://github.com/antirez/redis/commit/fdf9d455098f54f7666c702ae464e6ea21e25411 | disable loading lua bytecode | 0 | static void f_parser (lua_State *L, void *ud) {
int i;
Proto *tf;
Closure *cl;
struct SParser *p = cast(struct SParser *, ud);
int c = luaZ_lookahead(p->z);
luaC_checkGC(L);
tf = (luaY_parser)(L, p->z,
&p->buff, p->name);
cl = luaF_newLcl... | 272,340,375,743,875,120,000,000,000,000,000,000,000 | None | null | [
"CWE-17"
] | CVE-2015-4335 | Redis before 2.8.21 and 3.x before 3.0.2 allows remote attackers to execute arbitrary Lua bytecode via the eval command. | https://nvd.nist.gov/vuln/detail/CVE-2015-4335 |
10,569 | libzip | 9b46957ec98d85a572e9ef98301247f39338a3b5 | https://github.com/nih-at/libzip | https://github.com/nih-at/libzip/commit/9b46957ec98d85a572e9ef98301247f39338a3b5 | Make eocd checks more consistent between zip and zip64 cases. | 1 | _zip_read_eocd64(zip_source_t *src, zip_buffer_t *buffer, zip_uint64_t buf_offset, unsigned int flags, zip_error_t *error)
{
zip_cdir_t *cd;
zip_uint64_t offset;
zip_uint8_t eocd[EOCD64LEN];
zip_uint64_t eocd_offset;
zip_uint64_t size, nentry, i, eocdloc_offset;
bool free_buffer;
zip_uint32_... | 57,474,523,618,150,935,000,000,000,000,000,000,000 | zip_open.c | 296,826,865,575,292,000,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-14107 | The _zip_read_eocd64 function in zip_open.c in libzip before 1.3.0 mishandles EOCD records, which allows remote attackers to cause a denial of service (memory allocation failure in _zip_cdir_grow in zip_dirent.c) via a crafted ZIP archive. | https://nvd.nist.gov/vuln/detail/CVE-2017-14107 |
194,878 | libzip | 9b46957ec98d85a572e9ef98301247f39338a3b5 | https://github.com/nih-at/libzip | https://github.com/nih-at/libzip/commit/9b46957ec98d85a572e9ef98301247f39338a3b5 | Make eocd checks more consistent between zip and zip64 cases. | 0 | _zip_read_eocd64(zip_source_t *src, zip_buffer_t *buffer, zip_uint64_t buf_offset, unsigned int flags, zip_error_t *error)
{
zip_cdir_t *cd;
zip_uint64_t offset;
zip_uint8_t eocd[EOCD64LEN];
zip_uint64_t eocd_offset;
zip_uint64_t size, nentry, i, eocdloc_offset;
bool free_buffer;
zip_uint32_... | 209,005,646,211,618,370,000,000,000,000,000,000,000 | zip_open.c | 218,576,890,829,076,700,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-14107 | The _zip_read_eocd64 function in zip_open.c in libzip before 1.3.0 mishandles EOCD records, which allows remote attackers to cause a denial of service (memory allocation failure in _zip_cdir_grow in zip_dirent.c) via a crafted ZIP archive. | https://nvd.nist.gov/vuln/detail/CVE-2017-14107 |
10,573 | libzip | 2217022b7d1142738656d891e00b3d2d9179b796 | https://github.com/nih-at/libzip | https://github.com/nih-at/libzip/commit/2217022b7d1142738656d891e00b3d2d9179b796 | Fix double free().
Found by Brian 'geeknik' Carpenter using AFL. | 1 | _zip_dirent_read(zip_dirent_t *zde, zip_source_t *src, zip_buffer_t *buffer, bool local, zip_error_t *error)
{
zip_uint8_t buf[CDENTRYSIZE];
zip_uint16_t dostime, dosdate;
zip_uint32_t size, variable_size;
zip_uint16_t filename_len, comment_len, ef_len;
bool from_buffer = (buffer != NULL);
siz... | 126,446,829,664,279,170,000,000,000,000,000,000,000 | zip_dirent.c | 7,431,470,097,304,342,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2017-12858 | Double free vulnerability in the _zip_dirent_read function in zip_dirent.c in libzip allows attackers to have unspecified impact via unknown vectors. | https://nvd.nist.gov/vuln/detail/CVE-2017-12858 |
194,882 | libzip | 2217022b7d1142738656d891e00b3d2d9179b796 | https://github.com/nih-at/libzip | https://github.com/nih-at/libzip/commit/2217022b7d1142738656d891e00b3d2d9179b796 | Fix double free().
Found by Brian 'geeknik' Carpenter using AFL. | 0 | _zip_dirent_read(zip_dirent_t *zde, zip_source_t *src, zip_buffer_t *buffer, bool local, zip_error_t *error)
{
zip_uint8_t buf[CDENTRYSIZE];
zip_uint16_t dostime, dosdate;
zip_uint32_t size, variable_size;
zip_uint16_t filename_len, comment_len, ef_len;
bool from_buffer = (buffer != NULL);
siz... | 65,773,928,560,600,800,000,000,000,000,000,000,000 | zip_dirent.c | 140,713,310,577,075,630,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2017-12858 | Double free vulnerability in the _zip_dirent_read function in zip_dirent.c in libzip allows attackers to have unspecified impact via unknown vectors. | https://nvd.nist.gov/vuln/detail/CVE-2017-12858 |
10,574 | nagioscore | 1b197346d490df2e2d3b1dcce5ac6134ad0c8752 | https://github.com/NagiosEnterprises/nagioscore | https://github.com/NagiosEnterprises/nagioscore/commit/1b197346d490df2e2d3b1dcce5ac6134ad0c8752 | halfway revert hack/configure changes - switch order of daemon_init/drop_privileges | 1 | int main(int argc, char **argv) {
int result;
int error = FALSE;
int display_license = FALSE;
int display_help = FALSE;
int c = 0;
struct tm *tm, tm_s;
time_t now;
char datestring[256];
nagios_macros *mac;
const char *worker_socket = NULL;
int i;
#ifdef HAVE_SIGACTION
struct sigaction sig_action;
#endif
#i... | 182,984,082,189,353,020,000,000,000,000,000,000,000 | nagios.c | 106,459,785,303,224,300,000,000,000,000,000,000,000 | [
"CWE-665"
] | CVE-2017-12847 | Nagios Core before 4.3.3 creates a nagios.lock PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for nagios.lock modification before a root script executes a "kill `cat /pathname/nagios.lock`" command. | https://nvd.nist.gov/vuln/detail/CVE-2017-12847 |
194,883 | nagioscore | 1b197346d490df2e2d3b1dcce5ac6134ad0c8752 | https://github.com/NagiosEnterprises/nagioscore | https://github.com/NagiosEnterprises/nagioscore/commit/1b197346d490df2e2d3b1dcce5ac6134ad0c8752 | halfway revert hack/configure changes - switch order of daemon_init/drop_privileges | 0 | int main(int argc, char **argv) {
int result;
int error = FALSE;
int display_license = FALSE;
int display_help = FALSE;
int c = 0;
struct tm *tm, tm_s;
time_t now;
char datestring[256];
nagios_macros *mac;
const char *worker_socket = NULL;
int i;
#ifdef HAVE_SIGACTION
struct sigaction sig_action;
#endif
#i... | 331,311,194,711,063,930,000,000,000,000,000,000,000 | nagios.c | 203,220,281,016,309,880,000,000,000,000,000,000,000 | [
"CWE-665"
] | CVE-2017-12847 | Nagios Core before 4.3.3 creates a nagios.lock PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for nagios.lock modification before a root script executes a "kill `cat /pathname/nagios.lock`" command. | https://nvd.nist.gov/vuln/detail/CVE-2017-12847 |
10,578 | qemu | 30663fd26c0307e414622c7a8607fbc04f92ec14 | https://github.com/bonzini/qemu | https://github.com/qemu/qemu/commit/30663fd26c0307e414622c7a8607fbc04f92ec14 | tcg/i386: Check the size of instruction being translated
This fixes the bug: 'user-to-root privesc inside VM via bad translation
caching' reported by Jann Horn here:
https://bugs.chromium.org/p/project-zero/issues/detail?id=1122
Reviewed-by: Richard Henderson <rth@twiddle.net>
CC: Peter Maydell <peter.maydell@linaro.... | 1 | static target_ulong disas_insn(CPUX86State *env, DisasContext *s,
target_ulong pc_start)
{
int b, prefixes;
int shift;
TCGMemOp ot, aflag, dflag;
int modrm, reg, rm, mod, op, opreg, val;
target_ulong next_eip, tval;
int rex_w, rex_r;
s->pc_start = s->pc = pc_s... | 221,784,271,832,947,280,000,000,000,000,000,000,000 | translate.c | 237,269,157,204,909,700,000,000,000,000,000,000,000 | [
"CWE-94"
] | CVE-2017-8284 | The disas_insn function in target/i386/translate.c in QEMU before 2.9.0, when TCG mode without hardware acceleration is used, does not limit the instruction size, which allows local users to gain privileges by creating a modified basic block that injects code into a setuid program, as demonstrated by procmail. NOTE: th... | https://nvd.nist.gov/vuln/detail/CVE-2017-8284 |
194,887 | qemu | 30663fd26c0307e414622c7a8607fbc04f92ec14 | https://github.com/bonzini/qemu | https://github.com/qemu/qemu/commit/30663fd26c0307e414622c7a8607fbc04f92ec14 | tcg/i386: Check the size of instruction being translated
This fixes the bug: 'user-to-root privesc inside VM via bad translation
caching' reported by Jann Horn here:
https://bugs.chromium.org/p/project-zero/issues/detail?id=1122
Reviewed-by: Richard Henderson <rth@twiddle.net>
CC: Peter Maydell <peter.maydell@linaro.... | 0 | static target_ulong disas_insn(CPUX86State *env, DisasContext *s,
target_ulong pc_start)
{
int b, prefixes;
int shift;
TCGMemOp ot, aflag, dflag;
int modrm, reg, rm, mod, op, opreg, val;
target_ulong next_eip, tval;
int rex_w, rex_r;
s->pc_start = s->pc = pc_s... | 201,126,311,294,079,900,000,000,000,000,000,000,000 | translate.c | 71,100,563,148,307,140,000,000,000,000,000,000,000 | [
"CWE-94"
] | CVE-2017-8284 | The disas_insn function in target/i386/translate.c in QEMU before 2.9.0, when TCG mode without hardware acceleration is used, does not limit the instruction size, which allows local users to gain privileges by creating a modified basic block that injects code into a setuid program, as demonstrated by procmail. NOTE: th... | https://nvd.nist.gov/vuln/detail/CVE-2017-8284 |
10,586 | redis | 874804da0c014a7d704b3d285aa500098a931f50 | https://github.com/antirez/redis | https://github.com/antirez/redis/commit/874804da0c014a7d704b3d285aa500098a931f50 | Security: Cross Protocol Scripting protection.
This is an attempt at mitigating problems due to cross protocol
scripting, an attack targeting services using line oriented protocols
like Redis that can accept HTTP requests as valid protocol, by
discarding the invalid parts and accepting the payloads sent, for
example, ... | 1 | void processInputBuffer(client *c) {
server.current_client = c;
/* Keep processing while there is something in the input buffer */
while(sdslen(c->querybuf)) {
/* Return if clients are paused. */
if (!(c->flags & CLIENT_SLAVE) && clientsArePaused()) break;
/* Immediately abort if th... | 23,874,964,081,148,540,000,000,000,000,000,000,000 | networking.c | 48,401,747,573,780,290,000,000,000,000,000,000,000 | [
"CWE-254"
] | CVE-2016-10517 | networking.c in Redis before 3.2.7 allows "Cross Protocol Scripting" because it lacks a check for POST and Host: strings, which are not valid in the Redis protocol (but commonly occur when an attack triggers an HTTP request to the Redis TCP port). | https://nvd.nist.gov/vuln/detail/CVE-2016-10517 |
194,893 | redis | 874804da0c014a7d704b3d285aa500098a931f50 | https://github.com/antirez/redis | https://github.com/antirez/redis/commit/874804da0c014a7d704b3d285aa500098a931f50 | Security: Cross Protocol Scripting protection.
This is an attempt at mitigating problems due to cross protocol
scripting, an attack targeting services using line oriented protocols
like Redis that can accept HTTP requests as valid protocol, by
discarding the invalid parts and accepting the payloads sent, for
example, ... | 0 | void processInputBuffer(client *c) {
server.current_client = c;
/* Keep processing while there is something in the input buffer */
while(sdslen(c->querybuf)) {
/* Return if clients are paused. */
if (!(c->flags & CLIENT_SLAVE) && clientsArePaused()) break;
/* Immediately abort if th... | 137,699,253,496,000,250,000,000,000,000,000,000,000 | networking.c | 52,478,033,759,258,980,000,000,000,000,000,000,000 | [
"CWE-254"
] | CVE-2016-10517 | networking.c in Redis before 3.2.7 allows "Cross Protocol Scripting" because it lacks a check for POST and Host: strings, which are not valid in the Redis protocol (but commonly occur when an attack triggers an HTTP request to the Redis TCP port). | https://nvd.nist.gov/vuln/detail/CVE-2016-10517 |
10,589 | quagga | cfb1fae25f8c092e0d17073eaf7bd428ce1cd546 | https://github.com/Quagga/quagga | https://github.com/Quagga/quagga/commit/cfb1fae25f8c092e0d17073eaf7bd428ce1cd546 | zebra: stack overrun in IPv6 RA receive code (CVE-2016-1245)
The IPv6 RA code also receives ICMPv6 RS and RA messages.
Unfortunately, by bad coding practice, the buffer size specified on
receiving such messages mixed up 2 constants that in fact have
different values.
The code itself has:
#define RTADV_MSG_SIZE 4096
... | 1 | rtadv_read (struct thread *thread)
{
int sock;
int len;
u_char buf[RTADV_MSG_SIZE];
struct sockaddr_in6 from;
ifindex_t ifindex = 0;
int hoplimit = -1;
struct zebra_vrf *zvrf = THREAD_ARG (thread);
sock = THREAD_FD (thread);
zvrf->rtadv.ra_read = NULL;
/* Register myself. */
rtadv_event (zvrf,... | 147,071,443,723,396,080,000,000,000,000,000,000,000 | rtadv.c | 30,739,729,205,235,150,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2016-1245 | It was discovered that the zebra daemon in Quagga before 1.0.20161017 suffered from a stack-based buffer overflow when processing IPv6 Neighbor Discovery messages. The root cause was relying on BUFSIZ to be compatible with a message size; however, BUFSIZ is system-dependent. | https://nvd.nist.gov/vuln/detail/CVE-2016-1245 |
194,896 | quagga | cfb1fae25f8c092e0d17073eaf7bd428ce1cd546 | https://github.com/Quagga/quagga | https://github.com/Quagga/quagga/commit/cfb1fae25f8c092e0d17073eaf7bd428ce1cd546 | zebra: stack overrun in IPv6 RA receive code (CVE-2016-1245)
The IPv6 RA code also receives ICMPv6 RS and RA messages.
Unfortunately, by bad coding practice, the buffer size specified on
receiving such messages mixed up 2 constants that in fact have
different values.
The code itself has:
#define RTADV_MSG_SIZE 4096
... | 0 | rtadv_read (struct thread *thread)
{
int sock;
int len;
u_char buf[RTADV_MSG_SIZE];
struct sockaddr_in6 from;
ifindex_t ifindex = 0;
int hoplimit = -1;
struct zebra_vrf *zvrf = THREAD_ARG (thread);
sock = THREAD_FD (thread);
zvrf->rtadv.ra_read = NULL;
/* Register myself. */
rtadv_event (zvrf,... | 304,624,913,548,361,670,000,000,000,000,000,000,000 | rtadv.c | 275,936,381,462,236,070,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2016-1245 | It was discovered that the zebra daemon in Quagga before 1.0.20161017 suffered from a stack-based buffer overflow when processing IPv6 Neighbor Discovery messages. The root cause was relying on BUFSIZ to be compatible with a message size; however, BUFSIZ is system-dependent. | https://nvd.nist.gov/vuln/detail/CVE-2016-1245 |
10,592 | ntp | 553f2fa65865c31c5e3c48812cfd46176cffdd27 | https://github.com/ntp-project/ntp | https://github.com/ntp-project/ntp/commit/553f2fa65865c31c5e3c48812cfd46176cffdd27 | [Bug 1593] ntpd abort in free() with logconfig syntax error. | 1 | yyparse (void *YYPARSE_PARAM)
#else
int
yyparse (YYPARSE_PARAM)
void *YYPARSE_PARAM;
#endif
#else /* ! YYPARSE_PARAM */
#if (defined __STDC__ || defined __C99__FUNC__ \
|| defined __cplusplus || defined _MSC_VER)
int
yyparse (void)
#else
int
yyparse ()
#endif
#endif
{
int yystate;
/* Number of token... | 257,701,482,880,795,130,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2015-5194 | The log_config_command function in ntp_parser.y in ntpd in NTP before 4.2.7p42 allows remote attackers to cause a denial of service (ntpd crash) via crafted logconfig commands. | https://nvd.nist.gov/vuln/detail/CVE-2015-5194 |
194,899 | ntp | 553f2fa65865c31c5e3c48812cfd46176cffdd27 | https://github.com/ntp-project/ntp | https://github.com/ntp-project/ntp/commit/553f2fa65865c31c5e3c48812cfd46176cffdd27 | [Bug 1593] ntpd abort in free() with logconfig syntax error. | 0 | yyparse (void *YYPARSE_PARAM)
#else
int
yyparse (YYPARSE_PARAM)
void *YYPARSE_PARAM;
#endif
#else /* ! YYPARSE_PARAM */
#if (defined __STDC__ || defined __C99__FUNC__ \
|| defined __cplusplus || defined _MSC_VER)
int
yyparse (void)
#else
int
yyparse ()
#endif
#endif
{
int yystate;
/* Number of token... | 60,074,456,867,934,770,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2015-5194 | The log_config_command function in ntp_parser.y in ntpd in NTP before 4.2.7p42 allows remote attackers to cause a denial of service (ntpd crash) via crafted logconfig commands. | https://nvd.nist.gov/vuln/detail/CVE-2015-5194 |
10,593 | libinfinity | c97f870f5ae13112988d9f8ad464b4f679903706 | https://github.com/gobby/libinfinity | https://github.com/gobby/libinfinity/commit/c97f870f5ae13112988d9f8ad464b4f679903706 | Fix expired certificate validation (gobby #61) | 1 | inf_gtk_certificate_manager_certificate_func(InfXmppConnection* connection,
gnutls_session_t session,
InfCertificateChain* chain,
gpointer user_data)
{
InfGtkCertificateManager* manag... | 235,055,126,631,798,940,000,000,000,000,000,000,000 | None | null | [
"CWE-295"
] | CVE-2015-3886 | libinfinity before 0.6.6-1 does not validate expired SSL certificates, which allows remote attackers to have unspecified impact via unknown vectors. | https://nvd.nist.gov/vuln/detail/CVE-2015-3886 |
194,900 | libinfinity | c97f870f5ae13112988d9f8ad464b4f679903706 | https://github.com/gobby/libinfinity | https://github.com/gobby/libinfinity/commit/c97f870f5ae13112988d9f8ad464b4f679903706 | Fix expired certificate validation (gobby #61) | 0 | inf_gtk_certificate_manager_certificate_func(InfXmppConnection* connection,
gnutls_session_t session,
InfCertificateChain* chain,
gpointer user_data)
{
InfGtkCertificateManager* manag... | 21,151,374,238,125,958,000,000,000,000,000,000,000 | None | null | [
"CWE-295"
] | CVE-2015-3886 | libinfinity before 0.6.6-1 does not validate expired SSL certificates, which allows remote attackers to have unspecified impact via unknown vectors. | https://nvd.nist.gov/vuln/detail/CVE-2015-3886 |
10,594 | aircrack-ng | 88702a3ce4c28a973bf69023cd0312f412f6193e | https://github.com/aircrack-ng/aircrack-ng | https://github.com/aircrack-ng/aircrack-ng/commit/88702a3ce4c28a973bf69023cd0312f412f6193e | OSdep: Fixed segmentation fault that happens with a malicious server sending a negative length (Closes #16 on GitHub).
git-svn-id: http://svn.aircrack-ng.org/trunk@2419 28c6078b-6c39-48e3-add9-af49d547ecab | 1 | int net_get(int s, void *arg, int *len)
{
struct net_hdr nh;
int plen;
if (net_read_exact(s, &nh, sizeof(nh)) == -1)
{
return -1;
}
plen = ntohl(nh.nh_len);
if (!(plen <= *len))
printf("PLEN %d type %d len %d\n",
plen, nh.nh_type, *len);
assert(plen <= *len); /* XXX */
*len = plen;... | 279,652,316,899,343,600,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2014-8321 | Stack-based buffer overflow in the gps_tracker function in airodump-ng.c in Aircrack-ng before 1.2 RC 1 allows local users to execute arbitrary code or gain privileges via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2014-8321 |
194,901 | aircrack-ng | 88702a3ce4c28a973bf69023cd0312f412f6193e | https://github.com/aircrack-ng/aircrack-ng | https://github.com/aircrack-ng/aircrack-ng/commit/88702a3ce4c28a973bf69023cd0312f412f6193e | OSdep: Fixed segmentation fault that happens with a malicious server sending a negative length (Closes #16 on GitHub).
git-svn-id: http://svn.aircrack-ng.org/trunk@2419 28c6078b-6c39-48e3-add9-af49d547ecab | 0 | int net_get(int s, void *arg, int *len)
{
struct net_hdr nh;
int plen;
if (net_read_exact(s, &nh, sizeof(nh)) == -1)
{
return -1;
}
plen = ntohl(nh.nh_len);
if (!(plen <= *len))
printf("PLEN %d type %d len %d\n",
plen, nh.nh_type, *len);
assert(plen <= *len && plen > 0); /* XXX */
... | 327,731,427,717,946,180,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2014-8321 | Stack-based buffer overflow in the gps_tracker function in airodump-ng.c in Aircrack-ng before 1.2 RC 1 allows local users to execute arbitrary code or gain privileges via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2014-8321 |
10,595 | aircrack-ng | da087238963c1239fdabd47dc1b65279605aca70 | https://github.com/aircrack-ng/aircrack-ng | https://github.com/aircrack-ng/aircrack-ng/commit/da087238963c1239fdabd47dc1b65279605aca70 | Buddy-ng: Fixed segmentation fault (Closes #15 on GitHub).
git-svn-id: http://svn.aircrack-ng.org/trunk@2418 28c6078b-6c39-48e3-add9-af49d547ecab | 1 | int handle(int s, unsigned char* data, int len, struct sockaddr_in *s_in)
{
char buf[2048];
unsigned short *cmd = (unsigned short *)buf;
int plen;
struct in_addr *addr = &s_in->sin_addr;
unsigned short *pid = (unsigned short*) data;
/* inet check */
if (len == S_HELLO_LEN && memcmp(data, "sorbo", 5) == 0) {
u... | 25,249,288,086,872,368,000,000,000,000,000,000,000 | buddy-ng.c | 301,965,276,755,639,600,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2014-8321 | Stack-based buffer overflow in the gps_tracker function in airodump-ng.c in Aircrack-ng before 1.2 RC 1 allows local users to execute arbitrary code or gain privileges via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2014-8321 |
194,902 | aircrack-ng | da087238963c1239fdabd47dc1b65279605aca70 | https://github.com/aircrack-ng/aircrack-ng | https://github.com/aircrack-ng/aircrack-ng/commit/da087238963c1239fdabd47dc1b65279605aca70 | Buddy-ng: Fixed segmentation fault (Closes #15 on GitHub).
git-svn-id: http://svn.aircrack-ng.org/trunk@2418 28c6078b-6c39-48e3-add9-af49d547ecab | 0 | int handle(int s, unsigned char* data, int len, struct sockaddr_in *s_in)
{
char buf[2048];
unsigned short *cmd = (unsigned short *)buf;
int plen;
struct in_addr *addr = &s_in->sin_addr;
unsigned short *pid = (unsigned short*) data;
/* inet check */
if (len == S_HELLO_LEN && memcmp(data, "sorbo", 5) == 0) {
u... | 308,649,306,488,424,420,000,000,000,000,000,000,000 | buddy-ng.c | 74,851,829,317,201,250,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2014-8321 | Stack-based buffer overflow in the gps_tracker function in airodump-ng.c in Aircrack-ng before 1.2 RC 1 allows local users to execute arbitrary code or gain privileges via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2014-8321 |
10,596 | liblouis | 5e4089659bb49b3095fa541fa6387b4c40d7396e | https://github.com/liblouis/liblouis | https://github.com/liblouis/liblouis/commit/5e4089659bb49b3095fa541fa6387b4c40d7396e | Fix a buffer overflow
Fixes #635
Thanks to HongxuChen for reporting it | 1 | matchCurrentInput(
const InString *input, int pos, const widechar *passInstructions, int passIC) {
int k;
int kk = pos;
for (k = passIC + 2; k < passIC + 2 + passInstructions[passIC + 1]; k++)
if (input->chars[kk] == ENDSEGMENT || passInstructions[k] != input->chars[kk++])
return 0;
return 1;
}
| 186,673,007,973,266,360,000,000,000,000,000,000,000 | lou_translateString.c | 70,752,525,751,776,170,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-17294 | The matchCurrentInput function inside lou_translateString.c of Liblouis prior to 3.7 does not check the input string's length, allowing attackers to cause a denial of service (application crash via out-of-bounds read) by crafting an input file with certain translation dictionaries. | https://nvd.nist.gov/vuln/detail/CVE-2018-17294 |
194,903 | liblouis | 5e4089659bb49b3095fa541fa6387b4c40d7396e | https://github.com/liblouis/liblouis | https://github.com/liblouis/liblouis/commit/5e4089659bb49b3095fa541fa6387b4c40d7396e | Fix a buffer overflow
Fixes #635
Thanks to HongxuChen for reporting it | 0 | matchCurrentInput(
const InString *input, int pos, const widechar *passInstructions, int passIC) {
int k;
int kk = pos;
for (k = passIC + 2;
((k < passIC + 2 + passInstructions[passIC + 1]) && (kk < input->length));
k++)
if (input->chars[kk] == ENDSEGMENT || passInstructions[k] != input->chars[kk++])
... | 88,030,999,733,589,070,000,000,000,000,000,000,000 | lou_translateString.c | 295,712,235,489,473,440,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-17294 | The matchCurrentInput function inside lou_translateString.c of Liblouis prior to 3.7 does not check the input string's length, allowing attackers to cause a denial of service (application crash via out-of-bounds read) by crafting an input file with certain translation dictionaries. | https://nvd.nist.gov/vuln/detail/CVE-2018-17294 |
10,597 | gimp | c21eff4b031acb04fb4dfce8bd5fdfecc2b6524f | https://github.com/GNOME/gimp | https://github.com/GNOME/gimp/commit/c21eff4b031acb04fb4dfce8bd5fdfecc2b6524f | Issue #1689: create unique temporary file with g_file_open_tmp().
Not sure this is really solving the issue reported, which is that
`g_get_tmp_dir()` uses environment variables (yet as g_file_open_tmp()
uses g_get_tmp_dir()…). But at least g_file_open_tmp() should create
unique temporary files, which prevents overridi... | 1 | gimp_write_and_read_file (Gimp *gimp,
gboolean with_unusual_stuff,
gboolean compat_paths,
gboolean use_gimp_2_8_features)
{
GimpImage *image;
GimpImage *loaded_image;
GimpPlugInProcedure *proc;
gchar ... | 123,602,888,792,994,790,000,000,000,000,000,000,000 | test-xcf.c | 105,916,755,942,525,880,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2018-12713 | GIMP through 2.10.2 makes g_get_tmp_dir calls to establish temporary filenames, which may result in a filename that already exists, as demonstrated by the gimp_write_and_read_file function in app/tests/test-xcf.c. This might be leveraged by attackers to overwrite files or read file content that was intended to be priva... | https://nvd.nist.gov/vuln/detail/CVE-2018-12713 |
194,904 | gimp | c21eff4b031acb04fb4dfce8bd5fdfecc2b6524f | https://github.com/GNOME/gimp | https://github.com/GNOME/gimp/commit/c21eff4b031acb04fb4dfce8bd5fdfecc2b6524f | Issue #1689: create unique temporary file with g_file_open_tmp().
Not sure this is really solving the issue reported, which is that
`g_get_tmp_dir()` uses environment variables (yet as g_file_open_tmp()
uses g_get_tmp_dir()…). But at least g_file_open_tmp() should create
unique temporary files, which prevents overridi... | 0 | gimp_write_and_read_file (Gimp *gimp,
gboolean with_unusual_stuff,
gboolean compat_paths,
gboolean use_gimp_2_8_features)
{
GimpImage *image;
GimpImage *loaded_image;
GimpPlugInProcedure *proc;
gchar ... | 246,333,080,672,737,400,000,000,000,000,000,000,000 | test-xcf.c | 137,701,291,799,568,010,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2018-12713 | GIMP through 2.10.2 makes g_get_tmp_dir calls to establish temporary filenames, which may result in a filename that already exists, as demonstrated by the gimp_write_and_read_file function in app/tests/test-xcf.c. This might be leveraged by attackers to overwrite files or read file content that was intended to be priva... | https://nvd.nist.gov/vuln/detail/CVE-2018-12713 |
10,598 | redis | c04082cf138f1f51cedf05ee9ad36fb6763cafc6 | https://github.com/antirez/redis | https://github.com/antirez/redis/commit/c04082cf138f1f51cedf05ee9ad36fb6763cafc6 | Abort in XGROUP if the key is not a stream | 1 | void xgroupCommand(client *c) {
const char *help[] = {
"CREATE <key> <groupname> <id or $> -- Create a new consumer group.",
"SETID <key> <groupname> <id or $> -- Set the current group ID.",
"DELGROUP <key> <groupname> -- Remove the specified group.",
"DELCONSUMER <key> <groupname> <consu... | 81,308,784,981,755,860,000,000,000,000,000,000,000 | t_stream.c | 78,741,619,913,869,620,000,000,000,000,000,000,000 | [
"CWE-704"
] | CVE-2018-12453 | Type confusion in the xgroupCommand function in t_stream.c in redis-server in Redis before 5.0 allows remote attackers to cause denial-of-service via an XGROUP command in which the key is not a stream. | https://nvd.nist.gov/vuln/detail/CVE-2018-12453 |
194,905 | redis | c04082cf138f1f51cedf05ee9ad36fb6763cafc6 | https://github.com/antirez/redis | https://github.com/antirez/redis/commit/c04082cf138f1f51cedf05ee9ad36fb6763cafc6 | Abort in XGROUP if the key is not a stream | 0 | void xgroupCommand(client *c) {
const char *help[] = {
"CREATE <key> <groupname> <id or $> -- Create a new consumer group.",
"SETID <key> <groupname> <id or $> -- Set the current group ID.",
"DELGROUP <key> <groupname> -- Remove the specified group.",
"DELCONSUMER <key> <groupname> <consu... | 202,455,732,200,579,030,000,000,000,000,000,000,000 | t_stream.c | 244,518,585,700,327,700,000,000,000,000,000,000,000 | [
"CWE-704"
] | CVE-2018-12453 | Type confusion in the xgroupCommand function in t_stream.c in redis-server in Redis before 5.0 allows remote attackers to cause denial-of-service via an XGROUP command in which the key is not a stream. | https://nvd.nist.gov/vuln/detail/CVE-2018-12453 |
10,599 | redis | 9fdcc15962f9ff4baebe6fdd947816f43f730d50 | https://github.com/antirez/redis | https://github.com/antirez/redis/commit/9fdcc15962f9ff4baebe6fdd947816f43f730d50 | Security: fix redis-cli buffer overflow.
Thanks to Fakhri Zulkifli for reporting it.
The fix switched to dynamic allocation, copying the final prompt in the
static buffer only at the end. | 1 | static void cliRefreshPrompt(void) {
int len;
if (config.eval_ldb) return;
if (config.hostsocket != NULL)
len = snprintf(config.prompt,sizeof(config.prompt),"redis %s",
config.hostsocket);
else
len = anetFormatAddr(config.prompt, sizeof(config.prompt),
... | 178,423,737,865,105,360,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2018-12326 | Buffer overflow in redis-cli of Redis before 4.0.10 and 5.x before 5.0 RC3 allows an attacker to achieve code execution and escalate to higher privileges via a crafted command line. NOTE: It is unclear whether there are any common situations in which redis-cli is used with, for example, a -h (aka hostname) argument fro... | https://nvd.nist.gov/vuln/detail/CVE-2018-12326 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.