idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
161,135 | WavPack | 33a0025d1d63ccd05d9dbaa6923d52b1446a62fe | https://github.com/dbry/WavPack | https://github.com/dbry/WavPack/commit/33a0025d1d63ccd05d9dbaa6923d52b1446a62fe | issue #68: clear WaveHeader at start to prevent uninitialized read | 0 | int ParseWave64HeaderConfig (FILE *infile, char *infilename, char *fourcc, WavpackContext *wpc, WavpackConfig *config)
{
int64_t total_samples = 0, infilesize;
Wave64ChunkHeader chunk_header;
Wave64FileHeader filehdr;
WaveHeader WaveHeader;
int format_chunk = 0;
uint32_t bcount;
CLEAR (W... | 335,786,734,766,402,340,000,000,000,000,000,000,000 | None | null | [
"CWE-665"
] | CVE-2019-1010319 | WavPack 5.1.0 and earlier is affected by: CWE-457: Use of Uninitialized Variable. The impact is: Unexpected control flow, crashes, and segfaults. The component is: ParseWave64HeaderConfig (wave64.c:211). The attack vector is: Maliciously crafted .wav file. The fixed version is: After commit https://github.com/dbry/WavP... | https://nvd.nist.gov/vuln/detail/CVE-2019-1010319 |
10,728 | radare2 | bbb4af56003c1afdad67af0c4339267ca38b1017 | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/bbb4af56003c1afdad67af0c4339267ca38b1017 | Fix #10294 - crash in r2_hoobr__6502_op | 1 | static int _6502_op(RAnal *anal, RAnalOp *op, ut64 addr, const ut8 *data, int len) {
char addrbuf[64];
const int buffsize = sizeof (addrbuf) - 1;
memset (op, '\0', sizeof (RAnalOp));
op->size = snes_op_get_size (1, 1, &snes_op[data[0]]); //snes-arch is similiar to nes/6502
op->addr = addr;
op->type = R_ANAL_OP_T... | 55,851,122,861,549,740,000,000,000,000,000,000,000 | anal_6502.c | 13,243,688,809,806,383,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-12322 | There is a heap out of bounds read in radare2 2.6.0 in _6502_op() in libr/anal/p/anal_6502.c via a crafted iNES ROM binary file. | https://nvd.nist.gov/vuln/detail/CVE-2018-12322 |
160,946 | radare2 | bbb4af56003c1afdad67af0c4339267ca38b1017 | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/bbb4af56003c1afdad67af0c4339267ca38b1017 | Fix #10294 - crash in r2_hoobr__6502_op | 0 | static int _6502_op(RAnal *anal, RAnalOp *op, ut64 addr, const ut8 *data, int len) {
char addrbuf[64];
const int buffsize = sizeof (addrbuf) - 1;
memset (op, '\0', sizeof (RAnalOp));
op->size = snes_op_get_size (1, 1, &snes_op[data[0]]); //snes-arch is similiar to nes/6502
op->addr = addr;
op->type = R_ANAL_OP_T... | 165,312,155,751,615,160,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2018-12322 | There is a heap out of bounds read in radare2 2.6.0 in _6502_op() in libr/anal/p/anal_6502.c via a crafted iNES ROM binary file. | https://nvd.nist.gov/vuln/detail/CVE-2018-12322 |
10,729 | yara | 992480c30f75943e9cd6245bb2015c7737f9b661 | https://github.com/VirusTotal/yara | https://github.com/VirusTotal/yara/commit/992480c30f75943e9cd6245bb2015c7737f9b661 | Fix buffer overrun (issue #678). Add assert for detecting this kind of issues earlier. | 1 | int yr_re_fast_exec(
uint8_t* code,
uint8_t* input_data,
size_t input_forwards_size,
size_t input_backwards_size,
int flags,
RE_MATCH_CALLBACK_FUNC callback,
void* callback_args,
int* matches)
{
RE_REPEAT_ANY_ARGS* repeat_any_args;
uint8_t* code_stack[MAX_FAST_RE_STACK];
uint8_t* ... | 21,370,740,863,343,675,000,000,000,000,000,000,000 | re.c | 76,461,095,669,381,760,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9465 | The yr_arena_write_data function in YARA 3.6.1 allows remote attackers to cause a denial of service (buffer over-read and application crash) or obtain sensitive information from process memory via a crafted file that is mishandled in the yr_re_fast_exec function in libyara/re.c and the _yr_scan_match_callback function ... | https://nvd.nist.gov/vuln/detail/CVE-2017-9465 |
160,146 | yara | 992480c30f75943e9cd6245bb2015c7737f9b661 | https://github.com/VirusTotal/yara | https://github.com/VirusTotal/yara/commit/992480c30f75943e9cd6245bb2015c7737f9b661 | Fix buffer overrun (issue #678). Add assert for detecting this kind of issues earlier. | 0 | int yr_re_fast_exec(
uint8_t* code,
uint8_t* input_data,
size_t input_forwards_size,
size_t input_backwards_size,
int flags,
RE_MATCH_CALLBACK_FUNC callback,
void* callback_args,
int* matches)
{
RE_REPEAT_ANY_ARGS* repeat_any_args;
uint8_t* code_stack[MAX_FAST_RE_STACK];
uint8_t* ... | 113,366,999,609,919,650,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2017-9465 | The yr_arena_write_data function in YARA 3.6.1 allows remote attackers to cause a denial of service (buffer over-read and application crash) or obtain sensitive information from process memory via a crafted file that is mishandled in the yr_re_fast_exec function in libyara/re.c and the _yr_scan_match_callback function ... | https://nvd.nist.gov/vuln/detail/CVE-2017-9465 |
10,730 | yara | 992480c30f75943e9cd6245bb2015c7737f9b661 | https://github.com/VirusTotal/yara | https://github.com/VirusTotal/yara/commit/992480c30f75943e9cd6245bb2015c7737f9b661 | Fix buffer overrun (issue #678). Add assert for detecting this kind of issues earlier. | 1 | int _yr_scan_match_callback(
uint8_t* match_data,
int32_t match_length,
int flags,
void* args)
{
CALLBACK_ARGS* callback_args = (CALLBACK_ARGS*) args;
YR_STRING* string = callback_args->string;
YR_MATCH* new_match;
int result = ERROR_SUCCESS;
int tidx = callback_args->context->tidx;
size_... | 24,636,487,109,590,925,000,000,000,000,000,000,000 | scan.c | 278,173,131,600,320,600,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9465 | The yr_arena_write_data function in YARA 3.6.1 allows remote attackers to cause a denial of service (buffer over-read and application crash) or obtain sensitive information from process memory via a crafted file that is mishandled in the yr_re_fast_exec function in libyara/re.c and the _yr_scan_match_callback function ... | https://nvd.nist.gov/vuln/detail/CVE-2017-9465 |
160,147 | yara | 992480c30f75943e9cd6245bb2015c7737f9b661 | https://github.com/VirusTotal/yara | https://github.com/VirusTotal/yara/commit/992480c30f75943e9cd6245bb2015c7737f9b661 | Fix buffer overrun (issue #678). Add assert for detecting this kind of issues earlier. | 0 | int _yr_scan_match_callback(
uint8_t* match_data,
int32_t match_length,
int flags,
void* args)
{
CALLBACK_ARGS* callback_args = (CALLBACK_ARGS*) args;
YR_STRING* string = callback_args->string;
YR_MATCH* new_match;
int result = ERROR_SUCCESS;
int tidx = callback_args->context->tidx;
size_... | 218,232,809,221,316,560,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2017-9465 | The yr_arena_write_data function in YARA 3.6.1 allows remote attackers to cause a denial of service (buffer over-read and application crash) or obtain sensitive information from process memory via a crafted file that is mishandled in the yr_re_fast_exec function in libyara/re.c and the _yr_scan_match_callback function ... | https://nvd.nist.gov/vuln/detail/CVE-2017-9465 |
10,734 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc → gmallocn | 1 | SplashBitmap::SplashBitmap(int widthA, int heightA, int rowPad,
SplashColorMode modeA, GBool alphaA,
GBool topDown) {
width = widthA;
height = heightA;
mode = modeA;
switch (mode) {
case splashModeMono1:
rowSize = (width + 7) >> 3;
break;
case splashModeMono8:
rowSize = width;
br... | 291,686,055,334,142,570,000,000,000,000,000,000,000 | SplashBitmap.cc | 211,881,515,219,105,400,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu... | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
157,896 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc → gmallocn | 0 | SplashBitmap::SplashBitmap(int widthA, int heightA, int rowPad,
SplashColorMode modeA, GBool alphaA,
GBool topDown) {
width = widthA;
height = heightA;
mode = modeA;
switch (mode) {
case splashModeMono1:
rowSize = (width + 7) >> 3;
break;
case splashModeMono8:
rowSize = width;
br... | 289,196,234,666,330,000,000,000,000,000,000,000,000 | SplashBitmap.cc | 237,844,712,823,874,840,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu... | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
10,735 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc → gmallocn | 1 | GBool SplashFTFont::makeGlyph(int c, int xFrac, int yFrac,
SplashGlyphBitmap *bitmap, int x0, int y0, SplashClip *clip, SplashClipResult *clipRes) {
SplashFTFontFile *ff;
FT_Vector offset;
FT_GlyphSlot slot;
FT_UInt gid;
int rowSize;
Guchar *p, *q;
int i;
ff = (SplashFTFontFile *)fontFile;
... | 320,507,127,576,760,400,000,000,000,000,000,000,000 | SplashFTFont.cc | 137,915,116,313,860,120,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu... | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
157,897 | poppler | 9cf2325fb22f812b31858e519411f57747d39bd8 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=9cf2325fb22f812b31858e519411f57747d39bd8 | More gmalloc → gmallocn | 0 | GBool SplashFTFont::makeGlyph(int c, int xFrac, int yFrac,
SplashGlyphBitmap *bitmap, int x0, int y0, SplashClip *clip, SplashClipResult *clipRes) {
SplashFTFontFile *ff;
FT_Vector offset;
FT_GlyphSlot slot;
FT_UInt gid;
int rowSize;
Guchar *p, *q;
int i;
ff = (SplashFTFontFile *)fontFile;
... | 268,803,326,177,223,870,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2009-3605 | Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutpu... | https://nvd.nist.gov/vuln/detail/CVE-2009-3605 |
10,737 | qemu | 93060258ae748573ca7197204125a2670047896d | https://github.com/bonzini/qemu | https://git.qemu.org/?p=qemu.git;a=commit;h=93060258ae748573ca7197204125a2670047896d | net: vmxnet: check IP header length
Vmxnet3 device emulator when parsing packet headers does not check
for IP header length. It could lead to a OOB access when reading
further packet data. Add check to avoid it.
Reported-by: Li Qiang <liqiang6-s@360.cn>
Signed-off-by: Prasad J Pandit <pjp@fedoraproject.org>
Reviewed-... | 1 | static bool vmxnet_tx_pkt_parse_headers(struct VmxnetTxPkt *pkt)
{
struct iovec *l2_hdr, *l3_hdr;
size_t bytes_read;
size_t full_ip6hdr_len;
uint16_t l3_proto;
assert(pkt);
l2_hdr = &pkt->vec[VMXNET_TX_PKT_L2HDR_FRAG];
l3_hdr = &pkt->vec[VMXNET_TX_PKT_L3HDR_FRAG];
bytes_read = iov_to_... | 279,902,556,539,940,040,000,000,000,000,000,000,000 | vmxnet_tx_pkt.c | 137,783,482,756,033,040,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2016-6835 | The vmxnet_tx_pkt_parse_headers function in hw/net/vmxnet_tx_pkt.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (buffer over-read) by leveraging failure to check IP header length. | https://nvd.nist.gov/vuln/detail/CVE-2016-6835 |
194,674 | qemu | 93060258ae748573ca7197204125a2670047896d | https://github.com/bonzini/qemu | https://git.qemu.org/?p=qemu.git;a=commit;h=93060258ae748573ca7197204125a2670047896d | net: vmxnet: check IP header length
Vmxnet3 device emulator when parsing packet headers does not check
for IP header length. It could lead to a OOB access when reading
further packet data. Add check to avoid it.
Reported-by: Li Qiang <liqiang6-s@360.cn>
Signed-off-by: Prasad J Pandit <pjp@fedoraproject.org>
Reviewed-... | 0 | static bool vmxnet_tx_pkt_parse_headers(struct VmxnetTxPkt *pkt)
{
struct iovec *l2_hdr, *l3_hdr;
size_t bytes_read;
size_t full_ip6hdr_len;
uint16_t l3_proto;
assert(pkt);
l2_hdr = &pkt->vec[VMXNET_TX_PKT_L2HDR_FRAG];
l3_hdr = &pkt->vec[VMXNET_TX_PKT_L3HDR_FRAG];
bytes_read = iov_to_... | 22,843,371,891,704,183,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-6835 | The vmxnet_tx_pkt_parse_headers function in hw/net/vmxnet_tx_pkt.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (buffer over-read) by leveraging failure to check IP header length. | https://nvd.nist.gov/vuln/detail/CVE-2016-6835 |
10,738 | qemu | 167d97a3def77ee2dbf6e908b0ecbfe2103977db | https://github.com/bonzini/qemu | https://git.qemu.org/?p=qemu.git;a=commit;h=167d97a3def77ee2dbf6e908b0ecbfe2103977db | vmsvga: correct bitmap and pixmap size checks
When processing svga command DEFINE_CURSOR in vmsvga_fifo_run,
the computed BITMAP and PIXMAP size are checked against the
'cursor.mask[]' and 'cursor.image[]' array sizes in bytes.
Correct these checks to avoid OOB memory access.
Reported-by: Qinghao Tang <luodalongde@gm... | 1 | static void vmsvga_fifo_run(struct vmsvga_state_s *s)
{
uint32_t cmd, colour;
int args, len, maxloop = 1024;
int x, y, dx, dy, width, height;
struct vmsvga_cursor_definition_s cursor;
uint32_t cmd_start;
len = vmsvga_fifo_length(s);
while (len > 0 && --maxloop > 0) {
/* May need to ... | 133,450,826,690,414,800,000,000,000,000,000,000,000 | vmware_vga.c | 157,911,327,208,299,070,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2016-7170 | The vmsvga_fifo_run function in hw/display/vmware_vga.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to cursor.mask[] and cursor.image[] array sizes when processing a DEFINE_CURSOR svga command. | https://nvd.nist.gov/vuln/detail/CVE-2016-7170 |
194,665 | qemu | 167d97a3def77ee2dbf6e908b0ecbfe2103977db | https://github.com/bonzini/qemu | https://git.qemu.org/?p=qemu.git;a=commit;h=167d97a3def77ee2dbf6e908b0ecbfe2103977db | vmsvga: correct bitmap and pixmap size checks
When processing svga command DEFINE_CURSOR in vmsvga_fifo_run,
the computed BITMAP and PIXMAP size are checked against the
'cursor.mask[]' and 'cursor.image[]' array sizes in bytes.
Correct these checks to avoid OOB memory access.
Reported-by: Qinghao Tang <luodalongde@gm... | 0 | static void vmsvga_fifo_run(struct vmsvga_state_s *s)
{
uint32_t cmd, colour;
int args, len, maxloop = 1024;
int x, y, dx, dy, width, height;
struct vmsvga_cursor_definition_s cursor;
uint32_t cmd_start;
len = vmsvga_fifo_length(s);
while (len > 0 && --maxloop > 0) {
/* May need to ... | 274,038,032,035,691,670,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2016-7170 | The vmsvga_fifo_run function in hw/display/vmware_vga.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to cursor.mask[] and cursor.image[] array sizes when processing a DEFINE_CURSOR svga command. | https://nvd.nist.gov/vuln/detail/CVE-2016-7170 |
10,739 | php-src | 523f230c831d7b33353203fa34aee4e92ac12bba | https://github.com/php/php-src | https://github.com/php/php-src/commit/523f230c831d7b33353203fa34aee4e92ac12bba | Fix bug #75981: prevent reading beyond buffer start | 1 | php_stream *php_stream_url_wrap_http_ex(php_stream_wrapper *wrapper,
const char *path, const char *mode, int options, char **opened_path,
php_stream_context *context, int redirect_max, int flags STREAMS_DC TSRMLS_DC) /* {{{ */
{
php_stream *stream = NULL;
php_url *resource = NULL;
int use_ssl;
int use_proxy =... | 79,315,660,875,678,490,000,000,000,000,000,000,000 | http_fopen_wrapper.c | 108,329,095,691,693,000,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-7584 | In PHP through 5.6.33, 7.0.x before 7.0.28, 7.1.x through 7.1.14, and 7.2.x through 7.2.2, there is a stack-based buffer under-read while parsing an HTTP response in the php_stream_url_wrap_http_ex function in ext/standard/http_fopen_wrapper.c. This subsequently results in copying a large string. | https://nvd.nist.gov/vuln/detail/CVE-2018-7584 |
161,022 | php-src | 523f230c831d7b33353203fa34aee4e92ac12bba | https://github.com/php/php-src | https://github.com/php/php-src/commit/523f230c831d7b33353203fa34aee4e92ac12bba | Fix bug #75981: prevent reading beyond buffer start | 0 | php_stream *php_stream_url_wrap_http_ex(php_stream_wrapper *wrapper,
const char *path, const char *mode, int options, char **opened_path,
php_stream_context *context, int redirect_max, int flags STREAMS_DC TSRMLS_DC) /* {{{ */
{
php_stream *stream = NULL;
php_url *resource = NULL;
int use_ssl;
int use_proxy =... | 225,912,203,938,825,950,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2018-7584 | In PHP through 5.6.33, 7.0.x before 7.0.28, 7.1.x through 7.1.14, and 7.2.x through 7.2.2, there is a stack-based buffer under-read while parsing an HTTP response in the php_stream_url_wrap_http_ex function in ext/standard/http_fopen_wrapper.c. This subsequently results in copying a large string. | https://nvd.nist.gov/vuln/detail/CVE-2018-7584 |
10,740 | qemu | dd248ed7e204ee8a1873914e02b8b526e8f1b80d | https://github.com/bonzini/qemu | http://git.qemu.org/?p=qemu.git;a=commitdiff;h=dd248ed7e204ee8a1873914e02b8b526e8f1b80d | virtio-gpu: fix memory leak in set scanout
In virtio_gpu_set_scanout function, when creating the 'rect'
its refcount is set to 2, by pixman_image_create_bits and
qemu_create_displaysurface_pixman function. This can lead
a memory leak issues. This patch avoid this issue.
Signed-off-by: Li Qiang <liqiang6-s@360.cn>
Rev... | 1 | static void virtio_gpu_set_scanout(VirtIOGPU *g,
struct virtio_gpu_ctrl_command *cmd)
{
struct virtio_gpu_simple_resource *res;
struct virtio_gpu_scanout *scanout;
pixman_format_code_t format;
uint32_t offset;
int bpp;
struct virtio_gpu_set_scanout ss;
VIR... | 280,786,379,160,405,420,000,000,000,000,000,000,000 | virtio-gpu.c | 35,023,000,979,426,380,000,000,000,000,000,000,000 | [
"CWE-772"
] | CVE-2017-9060 | Memory leak in the virtio_gpu_set_scanout function in hw/display/virtio-gpu.c in QEMU (aka Quick Emulator) allows local guest OS users to cause a denial of service (memory consumption) via a large number of "VIRTIO_GPU_CMD_SET_SCANOUT:" commands. | https://nvd.nist.gov/vuln/detail/CVE-2017-9060 |
194,632 | qemu | dd248ed7e204ee8a1873914e02b8b526e8f1b80d | https://github.com/bonzini/qemu | http://git.qemu.org/?p=qemu.git;a=commitdiff;h=dd248ed7e204ee8a1873914e02b8b526e8f1b80d | virtio-gpu: fix memory leak in set scanout
In virtio_gpu_set_scanout function, when creating the 'rect'
its refcount is set to 2, by pixman_image_create_bits and
qemu_create_displaysurface_pixman function. This can lead
a memory leak issues. This patch avoid this issue.
Signed-off-by: Li Qiang <liqiang6-s@360.cn>
Rev... | 0 | static void virtio_gpu_set_scanout(VirtIOGPU *g,
struct virtio_gpu_ctrl_command *cmd)
{
struct virtio_gpu_simple_resource *res;
struct virtio_gpu_scanout *scanout;
pixman_format_code_t format;
uint32_t offset;
int bpp;
struct virtio_gpu_set_scanout ss;
VIR... | 329,496,203,014,603,550,000,000,000,000,000,000,000 | None | null | [
"CWE-772"
] | CVE-2017-9060 | Memory leak in the virtio_gpu_set_scanout function in hw/display/virtio-gpu.c in QEMU (aka Quick Emulator) allows local guest OS users to cause a denial of service (memory consumption) via a large number of "VIRTIO_GPU_CMD_SET_SCANOUT:" commands. | https://nvd.nist.gov/vuln/detail/CVE-2017-9060 |
10,741 | pngquant | b7c217680cda02dddced245d237ebe8c383be285 | https://github.com/pornel/pngquant | https://github.com/pornel/pngquant/commit/b7c217680cda02dddced245d237ebe8c383be285 | Fix integer overflow in rwpng.h (CVE-2016-5735)
Reported by Choi Jaeseung
Found with Sparrow (http://ropas.snu.ac.kr/sparrow) | 1 | static pngquant_error rwpng_read_image24_libpng(FILE *infile, png24_image *mainprog_ptr, int verbose)
{
png_structp png_ptr = NULL;
png_infop info_ptr = NULL;
png_size_t rowbytes;
int color_type, bit_depth;
png_ptr = png_create_read_struct(PNG_LIBPNG_VER_STRING, mainprog_ptr,
r... | 205,294,190,601,256,360,000,000,000,000,000,000,000 | rwpng.c | 147,508,917,339,336,730,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2016-5735 | Integer overflow in the rwpng_read_image24_libpng function in rwpng.c in pngquant 2.7.0 allows remote attackers to have unspecified impact via a crafted PNG file, which triggers a buffer overflow. | https://nvd.nist.gov/vuln/detail/CVE-2016-5735 |
160,687 | pngquant | b7c217680cda02dddced245d237ebe8c383be285 | https://github.com/pornel/pngquant | https://github.com/pornel/pngquant/commit/b7c217680cda02dddced245d237ebe8c383be285 | Fix integer overflow in rwpng.h (CVE-2016-5735)
Reported by Choi Jaeseung
Found with Sparrow (http://ropas.snu.ac.kr/sparrow) | 0 | static pngquant_error rwpng_read_image24_libpng(FILE *infile, png24_image *mainprog_ptr, int verbose)
{
png_structp png_ptr = NULL;
png_infop info_ptr = NULL;
png_size_t rowbytes;
int color_type, bit_depth;
png_ptr = png_create_read_struct(PNG_LIBPNG_VER_STRING, mainprog_ptr,
r... | 304,548,683,007,422,300,000,000,000,000,000,000,000 | rwpng.c | 80,565,221,315,673,240,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2016-5735 | Integer overflow in the rwpng_read_image24_libpng function in rwpng.c in pngquant 2.7.0 allows remote attackers to have unspecified impact via a crafted PNG file, which triggers a buffer overflow. | https://nvd.nist.gov/vuln/detail/CVE-2016-5735 |
10,742 | libav | 0a49a62f998747cfa564d98d36a459fe70d3299b | https://github.com/libav/libav | https://git.libav.org/?p=libav.git;a=commitdiff;h=0a49a62f998747cfa564d98d36a459fe70d3299b | h263: Always check both dimensions
CC: libav-stable@libav.org
Found-By: ago@gentoo.org | 1 | int ff_h263_decode_picture_header(MpegEncContext *s)
{
int format, width, height, i;
uint32_t startcode;
align_get_bits(&s->gb);
startcode= get_bits(&s->gb, 22-8);
for(i= get_bits_left(&s->gb); i>24; i-=8) {
startcode = ((startcode << 8) | get_bits(&s->gb, 8)) & 0x003FFFFF;
if(st... | 197,626,158,404,532,300,000,000,000,000,000,000,000 | ituh263dec.c | 237,581,302,495,997,000,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2015-5479 | The ff_h263_decode_mba function in libavcodec/ituh263dec.c in Libav before 11.5 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a file with crafted dimensions. | https://nvd.nist.gov/vuln/detail/CVE-2015-5479 |
158,299 | libav | 0a49a62f998747cfa564d98d36a459fe70d3299b | https://github.com/libav/libav | https://git.libav.org/?p=libav.git;a=commitdiff;h=0a49a62f998747cfa564d98d36a459fe70d3299b | h263: Always check both dimensions
CC: libav-stable@libav.org
Found-By: ago@gentoo.org | 0 | int ff_h263_decode_picture_header(MpegEncContext *s)
{
int format, width, height, i, ret;
uint32_t startcode;
align_get_bits(&s->gb);
startcode= get_bits(&s->gb, 22-8);
for(i= get_bits_left(&s->gb); i>24; i-=8) {
startcode = ((startcode << 8) | get_bits(&s->gb, 8)) & 0x003FFFFF;
... | 9,714,376,432,014,589,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2015-5479 | The ff_h263_decode_mba function in libavcodec/ituh263dec.c in Libav before 11.5 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a file with crafted dimensions. | https://nvd.nist.gov/vuln/detail/CVE-2015-5479 |
10,743 | qemu | 3a15cc0e1ee7168db0782133d2607a6bfa422d66 | https://github.com/bonzini/qemu | https://git.qemu.org/?p=qemu.git;a=commit;h=3a15cc0e1ee7168db0782133d2607a6bfa422d66 | net: stellaris_enet: check packet length against receive buffer
When receiving packets over Stellaris ethernet controller, it
uses receive buffer of size 2048 bytes. In case the controller
accepts large(MTU) packets, it could lead to memory corruption.
Add check to avoid it.
Reported-by: Oleksandr Bazhaniuk <oleksand... | 1 | static ssize_t stellaris_enet_receive(NetClientState *nc, const uint8_t *buf, size_t size)
{
stellaris_enet_state *s = qemu_get_nic_opaque(nc);
int n;
uint8_t *p;
uint32_t crc;
if ((s->rctl & SE_RCTL_RXEN) == 0)
return -1;
if (s->np >= 31) {
return 0;
}
DPRINTF("Receive... | 96,844,957,878,192,260,000,000,000,000,000,000,000 | stellaris_enet.c | 222,717,703,653,803,500,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2016-4001 | Buffer overflow in the stellaris_enet_receive function in hw/net/stellaris_enet.c in QEMU, when the Stellaris ethernet controller is configured to accept large packets, allows remote attackers to cause a denial of service (QEMU crash) via a large packet. | https://nvd.nist.gov/vuln/detail/CVE-2016-4001 |
194,723 | qemu | 3a15cc0e1ee7168db0782133d2607a6bfa422d66 | https://github.com/bonzini/qemu | https://git.qemu.org/?p=qemu.git;a=commit;h=3a15cc0e1ee7168db0782133d2607a6bfa422d66 | net: stellaris_enet: check packet length against receive buffer
When receiving packets over Stellaris ethernet controller, it
uses receive buffer of size 2048 bytes. In case the controller
accepts large(MTU) packets, it could lead to memory corruption.
Add check to avoid it.
Reported-by: Oleksandr Bazhaniuk <oleksand... | 0 | static ssize_t stellaris_enet_receive(NetClientState *nc, const uint8_t *buf, size_t size)
{
stellaris_enet_state *s = qemu_get_nic_opaque(nc);
int n;
uint8_t *p;
uint32_t crc;
if ((s->rctl & SE_RCTL_RXEN) == 0)
return -1;
if (s->np >= 31) {
return 0;
}
DPRINTF("Receive... | 257,007,314,246,181,070,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2016-4001 | Buffer overflow in the stellaris_enet_receive function in hw/net/stellaris_enet.c in QEMU, when the Stellaris ethernet controller is configured to accept large packets, allows remote attackers to cause a denial of service (QEMU crash) via a large packet. | https://nvd.nist.gov/vuln/detail/CVE-2016-4001 |
10,744 | qemu | a6b3167fa0e825aebb5a7cd8b437b6d41584a196 | https://github.com/bonzini/qemu | https://git.qemu.org/?p=qemu.git;a=commit;h=a6b3167fa0e825aebb5a7cd8b437b6d41584a196 | block/iscsi: avoid potential overflow of acb->task->cdb
at least in the path via virtio-blk the maximum size is not
restricted.
Cc: qemu-stable@nongnu.org
Signed-off-by: Peter Lieven <pl@kamp.de>
Message-Id: <1464080368-29584-1-git-send-email-pl@kamp.de>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com> | 1 | static BlockAIOCB *iscsi_aio_ioctl(BlockDriverState *bs,
unsigned long int req, void *buf,
BlockCompletionFunc *cb, void *opaque)
{
IscsiLun *iscsilun = bs->opaque;
struct iscsi_context *iscsi = iscsilun->iscsi;
struct iscsi_data data;
IscsiAIOCB *acb;
acb = qemu_aio_get(&iscsi_aioc... | 281,431,584,605,820,930,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-5126 | Heap-based buffer overflow in the iscsi_aio_ioctl function in block/iscsi.c in QEMU allows local guest OS users to cause a denial of service (QEMU process crash) or possibly execute arbitrary code via a crafted iSCSI asynchronous I/O ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2016-5126 |
194,691 | qemu | a6b3167fa0e825aebb5a7cd8b437b6d41584a196 | https://github.com/bonzini/qemu | https://git.qemu.org/?p=qemu.git;a=commit;h=a6b3167fa0e825aebb5a7cd8b437b6d41584a196 | block/iscsi: avoid potential overflow of acb->task->cdb
at least in the path via virtio-blk the maximum size is not
restricted.
Cc: qemu-stable@nongnu.org
Signed-off-by: Peter Lieven <pl@kamp.de>
Message-Id: <1464080368-29584-1-git-send-email-pl@kamp.de>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com> | 0 | static BlockAIOCB *iscsi_aio_ioctl(BlockDriverState *bs,
unsigned long int req, void *buf,
BlockCompletionFunc *cb, void *opaque)
{
IscsiLun *iscsilun = bs->opaque;
struct iscsi_context *iscsi = iscsilun->iscsi;
struct iscsi_data data;
IscsiAIOCB *acb;
acb = qemu_aio_get(&iscsi_aioc... | 270,235,304,717,933,030,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-5126 | Heap-based buffer overflow in the iscsi_aio_ioctl function in block/iscsi.c in QEMU allows local guest OS users to cause a denial of service (QEMU process crash) or possibly execute arbitrary code via a crafted iSCSI asynchronous I/O ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2016-5126 |
10,745 | FFmpeg | ed188f6dcdf0935c939ed813cf8745d50742014b | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/ed188f6dcdf0935c939ed813cf8745d50742014b | avformat/aadec: Check for scanf() failure
Fixes: use of uninitialized variables
Fixes: blank.aa
Found-by: Chamal De Silva <chamal.desilva@gmail.com>
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 1 | static int aa_read_header(AVFormatContext *s)
{
int i, j, idx, largest_idx = -1;
uint32_t nkey, nval, toc_size, npairs, header_seed = 0, start;
char key[128], val[128], codec_name[64] = {0};
uint8_t output[24], dst[8], src[8];
int64_t largest_size = -1, current_size = -1, chapter_pos;
struct toc... | 62,314,827,938,333,340,000,000,000,000,000,000,000 | aadec.c | 278,941,088,614,423,300,000,000,000,000,000,000,000 | [
"CWE-665"
] | CVE-2019-12730 | aa_read_header in libavformat/aadec.c in FFmpeg before 3.2.14 and 4.x before 4.1.4 does not check for sscanf failure and consequently allows use of uninitialized variables. | https://nvd.nist.gov/vuln/detail/CVE-2019-12730 |
161,280 | FFmpeg | ed188f6dcdf0935c939ed813cf8745d50742014b | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/ed188f6dcdf0935c939ed813cf8745d50742014b | avformat/aadec: Check for scanf() failure
Fixes: use of uninitialized variables
Fixes: blank.aa
Found-by: Chamal De Silva <chamal.desilva@gmail.com>
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 0 | static int aa_read_header(AVFormatContext *s)
{
int i, j, idx, largest_idx = -1;
uint32_t nkey, nval, toc_size, npairs, header_seed = 0, start;
char key[128], val[128], codec_name[64] = {0};
uint8_t output[24], dst[8], src[8];
int64_t largest_size = -1, current_size = -1, chapter_pos;
struct toc... | 126,790,476,459,405,540,000,000,000,000,000,000,000 | None | null | [
"CWE-665"
] | CVE-2019-12730 | aa_read_header in libavformat/aadec.c in FFmpeg before 3.2.14 and 4.x before 4.1.4 does not check for sscanf failure and consequently allows use of uninitialized variables. | https://nvd.nist.gov/vuln/detail/CVE-2019-12730 |
10,746 | samba | b000da128b5fb519d2d3f2e7fd20e4a25b7dae7d | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commit;h=b000da128b5fb519d2d3f2e7fd20e4a25b7dae7d | CVE-2015-8467: samdb: Match MS15-096 behaviour for userAccountControl
Swapping between account types is now restricted
Bug: https://bugzilla.samba.org/show_bug.cgi?id=11552
Signed-off-by: Andrew Bartlett <abartlet@samba.org>
Reviewed-by: Jeremy Allison <jra@samba.org>
Reviewed-by: Ralph Boehme <slow@samba.org> | 1 | static int samldb_check_user_account_control_acl(struct samldb_ctx *ac,
struct dom_sid *sid,
uint32_t user_account_control,
uint32_t user_account_control_old)
{
int i, ret = 0;
bool need_acl_check = false;
struct ldb_result *res;
const char * const sd_attrs[] = {"ntSecurityDescriptor", NULL};
... | 59,441,307,753,859,120,000,000,000,000,000,000,000 | samldb.c | 318,825,023,360,728,400,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2015-8467 | The samldb_check_user_account_control_acl function in dsdb/samdb/ldb_modules/samldb.c in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3 does not properly check for administrative privileges during creation of machine accounts, which allows remote authenticated users to bypass intended access restri... | https://nvd.nist.gov/vuln/detail/CVE-2015-8467 |
157,855 | samba | b000da128b5fb519d2d3f2e7fd20e4a25b7dae7d | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commit;h=b000da128b5fb519d2d3f2e7fd20e4a25b7dae7d | CVE-2015-8467: samdb: Match MS15-096 behaviour for userAccountControl
Swapping between account types is now restricted
Bug: https://bugzilla.samba.org/show_bug.cgi?id=11552
Signed-off-by: Andrew Bartlett <abartlet@samba.org>
Reviewed-by: Jeremy Allison <jra@samba.org>
Reviewed-by: Ralph Boehme <slow@samba.org> | 0 | static int samldb_check_user_account_control_acl(struct samldb_ctx *ac,
struct dom_sid *sid,
uint32_t user_account_control,
uint32_t user_account_control_old)
{
int i, ret = 0;
bool need_acl_check = false;
struct ldb_result *res;
const char * const sd_attrs[] = {"ntSecurityDescriptor", NULL};
... | 173,468,620,299,607,770,000,000,000,000,000,000,000 | None | null | [
"CWE-264"
] | CVE-2015-8467 | The samldb_check_user_account_control_acl function in dsdb/samdb/ldb_modules/samldb.c in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3 does not properly check for administrative privileges during creation of machine accounts, which allows remote authenticated users to bypass intended access restri... | https://nvd.nist.gov/vuln/detail/CVE-2015-8467 |
10,747 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 1 | static void reds_handle_ticket(void *opaque)
{
RedLinkInfo *link = (RedLinkInfo *)opaque;
char password[SPICE_MAX_PASSWORD_LENGTH];
time_t ltime;
//todo: use monotonic time
time(<ime);
RSA_private_decrypt(link->tiTicketing.rsa_size,
link->tiTicketing.encrypted_ticket.e... | 18,934,837,448,161,983,000,000,000,000,000,000,000 | reds.c | 322,336,886,463,452,100,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
157,927 | spice | 8af619009660b24e0b41ad26b30289eea288fcc2 | https://gitlab.freedesktop.org/spice/spice | https://cgit.freedesktop.org/spice/spice/commit/?id=8af619009660b24e0b41ad26b30289eea288fcc2 | Fix buffer overflow when decrypting client SPICE ticket
reds_handle_ticket uses a fixed size 'password' buffer for the decrypted
password whose size is SPICE_MAX_PASSWORD_LENGTH. However,
RSA_private_decrypt which we call for the decryption expects the
destination buffer to be at least RSA_size(link->tiTicketing.rsa)
... | 0 | static void reds_handle_ticket(void *opaque)
{
RedLinkInfo *link = (RedLinkInfo *)opaque;
char *password;
time_t ltime;
int password_size;
time(<ime);
if (RSA_size(link->tiTicketing.rsa) < SPICE_MAX_PASSWORD_LENGTH) {
spice_warning("RSA modulus size is smaller than SPICE_MAX_PAS... | 4,295,331,752,367,148,700,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2013-4282 | Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket. | https://nvd.nist.gov/vuln/detail/CVE-2013-4282 |
10,748 | qemu | eea750a5623ddac7a61982eec8f1c93481857578 | https://github.com/bonzini/qemu | http://git.qemu.org/?p=qemu.git;a=commit;h=eea750a5623ddac7a61982eec8f1c93481857578 | virtio-net: out-of-bounds buffer write on invalid state load
CVE-2013-4150 QEMU 1.5.0 out-of-bounds buffer write in
virtio_net_load()@hw/net/virtio-net.c
This code is in hw/net/virtio-net.c:
if (n->max_queues > 1) {
if (n->max_queues != qemu_get_be16(f)) {
error_report("virtio-net: different ... | 1 | static int virtio_net_load(QEMUFile *f, void *opaque, int version_id)
{
VirtIONet *n = opaque;
VirtIODevice *vdev = VIRTIO_DEVICE(n);
int ret, i, link_down;
if (version_id < 2 || version_id > VIRTIO_NET_VM_VERSION)
return -EINVAL;
ret = virtio_load(vdev, f);
if (ret) {
return r... | 279,963,136,302,441,130,000,000,000,000,000,000,000 | virtio-net.c | 191,493,264,050,525,200,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4150 | The virtio_net_load function in hw/net/virtio-net.c in QEMU 1.5.0 through 1.7.x before 1.7.2 allows remote attackers to cause a denial of service or possibly execute arbitrary code via vectors in which the value of curr_queues is greater than max_queues, which triggers an out-of-bounds write. | https://nvd.nist.gov/vuln/detail/CVE-2013-4150 |
194,780 | qemu | eea750a5623ddac7a61982eec8f1c93481857578 | https://github.com/bonzini/qemu | http://git.qemu.org/?p=qemu.git;a=commit;h=eea750a5623ddac7a61982eec8f1c93481857578 | virtio-net: out-of-bounds buffer write on invalid state load
CVE-2013-4150 QEMU 1.5.0 out-of-bounds buffer write in
virtio_net_load()@hw/net/virtio-net.c
This code is in hw/net/virtio-net.c:
if (n->max_queues > 1) {
if (n->max_queues != qemu_get_be16(f)) {
error_report("virtio-net: different ... | 0 | static int virtio_net_load(QEMUFile *f, void *opaque, int version_id)
{
VirtIONet *n = opaque;
VirtIODevice *vdev = VIRTIO_DEVICE(n);
int ret, i, link_down;
if (version_id < 2 || version_id > VIRTIO_NET_VM_VERSION)
return -EINVAL;
ret = virtio_load(vdev, f);
if (ret) {
return r... | 99,798,630,791,062,130,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2013-4150 | The virtio_net_load function in hw/net/virtio-net.c in QEMU 1.5.0 through 1.7.x before 1.7.2 allows remote attackers to cause a denial of service or possibly execute arbitrary code via vectors in which the value of curr_queues is greater than max_queues, which triggers an out-of-bounds write. | https://nvd.nist.gov/vuln/detail/CVE-2013-4150 |
10,749 | Espruino | bed844f109b6c222816740555068de2e101e8018 | https://github.com/espruino/Espruino | https://github.com/espruino/Espruino/commit/bed844f109b6c222816740555068de2e101e8018 | remove strncpy usage as it's effectively useless, replace with an assertion since fn is only used internally (fix #1426) | 1 | void jslTokenAsString(int token, char *str, size_t len) {
// see JS_ERROR_TOKEN_BUF_SIZE
if (token>32 && token<128) {
assert(len>=4);
str[0] = '\'';
str[1] = (char)token;
str[2] = '\'';
str[3] = 0;
return;
}
switch (token) {
case LEX_EOF : strncpy(str, "EOF", len); return;
case LEX_... | 335,155,697,690,853,050,000,000,000,000,000,000,000 | jslex.c | 202,131,620,748,012,570,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2018-11593 | Espruino before 1.99 allows attackers to cause a denial of service (application crash) and potential Information Disclosure with a user crafted input file via a Buffer Overflow during syntax parsing because strncpy is misused in jslex.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-11593 |
160,960 | Espruino | bed844f109b6c222816740555068de2e101e8018 | https://github.com/espruino/Espruino | https://github.com/espruino/Espruino/commit/bed844f109b6c222816740555068de2e101e8018 | remove strncpy usage as it's effectively useless, replace with an assertion since fn is only used internally (fix #1426) | 0 | void jslTokenAsString(int token, char *str, size_t len) {
assert(len>28); // size of largest string
if (token>32 && token<128) {
assert(len>=4);
str[0] = '\'';
str[1] = (char)token;
str[2] = '\'';
str[3] = 0;
return;
}
switch (token) {
case LEX_EOF : strcpy(str, "EOF"); return... | 207,472,988,325,813,640,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2018-11593 | Espruino before 1.99 allows attackers to cause a denial of service (application crash) and potential Information Disclosure with a user crafted input file via a Buffer Overflow during syntax parsing because strncpy is misused in jslex.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-11593 |
10,751 | radare2 | 52b1526443c1f433087928291d1c3d37a5600515 | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/52b1526443c1f433087928291d1c3d37a5600515 | Fix crash in wasm disassembler | 1 | int wasm_dis(WasmOp *op, const unsigned char *buf, int buf_len) {
op->len = 1;
op->op = buf[0];
if (op->op > 0xbf) return 1;
// add support for extension opcodes (SIMD + atomics)
WasmOpDef *opdef = &opcodes[op->op];
switch (op->op) {
case WASM_OP_TRAP:
case WASM_OP_NOP:
case WASM_OP_ELSE:
case WASM_OP_RETURN:... | 197,820,120,957,265,730,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2017-15368 | The wasm_dis function in libr/asm/arch/wasm/wasm.c in radare2 2.0.0 allows remote attackers to cause a denial of service (stack-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted WASM file that triggers an incorrect r_hex_bin2str call. | https://nvd.nist.gov/vuln/detail/CVE-2017-15368 |
159,902 | radare2 | 52b1526443c1f433087928291d1c3d37a5600515 | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/52b1526443c1f433087928291d1c3d37a5600515 | Fix crash in wasm disassembler | 0 | int wasm_dis(WasmOp *op, const unsigned char *buf, int buf_len) {
op->len = 1;
op->op = buf[0];
if (op->op > 0xbf) {
return 1;
}
WasmOpDef *opdef = &opcodes[op->op];
switch (op->op) {
case WASM_OP_TRAP:
case WASM_OP_NOP:
case WASM_OP_ELSE:
case WASM_OP_RETURN:
case WASM_OP_DROP:
case WASM_OP_SELECT:
... | 172,650,735,276,038,730,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2017-15368 | The wasm_dis function in libr/asm/arch/wasm/wasm.c in radare2 2.0.0 allows remote attackers to cause a denial of service (stack-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted WASM file that triggers an incorrect r_hex_bin2str call. | https://nvd.nist.gov/vuln/detail/CVE-2017-15368 |
10,752 | poppler | b1026b5978c385328f2a15a2185c599a563edf91 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=b1026b5978c385328f2a15a2185c599a563edf91 | Initialize refLine totally
Fixes uninitialized memory read in 1004.pdf.asan.7.3 | 1 | int CCITTFaxStream::lookChar() {
int code1, code2, code3;
int b1i, blackPixels, i, bits;
GBool gotEOL;
if (buf != EOF) {
return buf;
}
// read the next row
if (outputBits == 0) {
// if at eof just return EOF
if (eof) {
return EOF;
}
err = gFalse;
// 2-D encoding
if (... | 280,129,395,979,896,770,000,000,000,000,000,000,000 | Stream.cc | 138,337,928,539,390,720,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-1790 | poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function. | https://nvd.nist.gov/vuln/detail/CVE-2013-1790 |
157,972 | poppler | b1026b5978c385328f2a15a2185c599a563edf91 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=b1026b5978c385328f2a15a2185c599a563edf91 | Initialize refLine totally
Fixes uninitialized memory read in 1004.pdf.asan.7.3 | 0 | int CCITTFaxStream::lookChar() {
int code1, code2, code3;
int b1i, blackPixels, i, bits;
GBool gotEOL;
if (buf != EOF) {
return buf;
}
if (outputBits == 0) {
if (eof) {
return EOF;
}
err = gFalse;
if (nextLine2D) {
for (i = 0; i < columns && codingLine[i] < columns; ++i... | 47,744,977,071,941,370,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2013-1790 | poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function. | https://nvd.nist.gov/vuln/detail/CVE-2013-1790 |
10,753 | radare2 | 224e6bc13fa353dd3b7f7a2334588f1c4229e58d | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/224e6bc13fa353dd3b7f7a2334588f1c4229e58d | Fix #10296 - Heap out of bounds read in java_switch_op() | 1 | static int java_switch_op(RAnal *anal, RAnalOp *op, ut64 addr, const ut8 *data, int len) {
ut8 op_byte = data[0];
ut64 offset = addr - java_get_method_start ();
ut8 pos = (offset+1)%4 ? 1 + 4 - (offset+1)%4 : 1;
if (op_byte == 0xaa) {
// handle a table switch condition
if (pos + 8 > len) {
return op->size;
... | 287,953,916,860,564,700,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2018-12321 | There is a heap out of bounds read in radare2 2.6.0 in java_switch_op() in libr/anal/p/anal_java.c via a crafted Java binary file. | https://nvd.nist.gov/vuln/detail/CVE-2018-12321 |
160,947 | radare2 | 224e6bc13fa353dd3b7f7a2334588f1c4229e58d | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/224e6bc13fa353dd3b7f7a2334588f1c4229e58d | Fix #10296 - Heap out of bounds read in java_switch_op() | 0 | static int java_switch_op(RAnal *anal, RAnalOp *op, ut64 addr, const ut8 *data, int len) {
ut8 op_byte = data[0];
ut64 offset = addr - java_get_method_start ();
ut8 pos = (offset+1)%4 ? 1 + 4 - (offset+1)%4 : 1;
if (op_byte == 0xaa) {
if (pos + 8 + 8 > len) {
return op->size;
}
const int min_val = (ut... | 274,218,593,828,270,950,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2018-12321 | There is a heap out of bounds read in radare2 2.6.0 in java_switch_op() in libr/anal/p/anal_java.c via a crafted Java binary file. | https://nvd.nist.gov/vuln/detail/CVE-2018-12321 |
10,755 | libav | 58b2e0f0f2fc96c1158e04f8aba95cbe6157a1a3 | https://github.com/libav/libav | https://git.libav.org/?p=libav.git;a=commit;h=58b2e0f0f2fc96c1158e04f8aba95cbe6157a1a3 | vqavideo: return error if image size is not a multiple of block size
The decoder assumes in various places that the image size
is a multiple of the block size, and there is no obvious
way to support odd sizes. Bailing out early if the header
specifies a bad size avoids various errors later on.
Fixes CVE-2012-0947.
... | 1 | static av_cold int vqa_decode_init(AVCodecContext *avctx)
{
VqaContext *s = avctx->priv_data;
int i, j, codebook_index;
s->avctx = avctx;
avctx->pix_fmt = PIX_FMT_PAL8;
/* make sure the extradata made it */
if (s->avctx->extradata_size != VQA_HEADER_SIZE) {
av_log(s->avctx, AV_LOG_ERRO... | 165,589,397,962,084,270,000,000,000,000,000,000,000 | vqavideo.c | 257,245,612,007,333,320,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2012-0947 | Heap-based buffer overflow in the vqa_decode_chunk function in the VQA codec (vqavideo.c) in libavcodec in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.6, and 0.8.x before 0.8.2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted VQA media fil... | https://nvd.nist.gov/vuln/detail/CVE-2012-0947 |
158,210 | libav | 58b2e0f0f2fc96c1158e04f8aba95cbe6157a1a3 | https://github.com/libav/libav | https://git.libav.org/?p=libav.git;a=commit;h=58b2e0f0f2fc96c1158e04f8aba95cbe6157a1a3 | vqavideo: return error if image size is not a multiple of block size
The decoder assumes in various places that the image size
is a multiple of the block size, and there is no obvious
way to support odd sizes. Bailing out early if the header
specifies a bad size avoids various errors later on.
Fixes CVE-2012-0947.
... | 0 | static av_cold int vqa_decode_init(AVCodecContext *avctx)
{
VqaContext *s = avctx->priv_data;
int i, j, codebook_index;
s->avctx = avctx;
avctx->pix_fmt = PIX_FMT_PAL8;
/* make sure the extradata made it */
if (s->avctx->extradata_size != VQA_HEADER_SIZE) {
av_log(s->avctx, AV_LOG_ERRO... | 208,012,088,349,588,600,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2012-0947 | Heap-based buffer overflow in the vqa_decode_chunk function in the VQA codec (vqavideo.c) in libavcodec in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.6, and 0.8.x before 0.8.2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted VQA media fil... | https://nvd.nist.gov/vuln/detail/CVE-2012-0947 |
10,756 | WavPack | 070ef6f138956d9ea9612e69586152339dbefe51 | https://github.com/dbry/WavPack | https://github.com/dbry/WavPack/commit/070ef6f138956d9ea9612e69586152339dbefe51 | issue #53: error out on zero sample rate | 1 | int WavpackSetConfiguration64 (WavpackContext *wpc, WavpackConfig *config, int64_t total_samples, const unsigned char *chan_ids)
{
uint32_t flags, bps = 0;
uint32_t chan_mask = config->channel_mask;
int num_chans = config->num_channels;
int i;
wpc->stream_version = (config->flags & CONFIG_COMPATIBL... | 37,881,151,474,472,780,000,000,000,000,000,000,000 | pack_utils.c | 140,559,045,431,218,750,000,000,000,000,000,000,000 | [
"CWE-835"
] | CVE-2018-19840 | The function WavpackPackInit in pack_utils.c in libwavpack.a in WavPack through 5.1.0 allows attackers to cause a denial-of-service (resource exhaustion caused by an infinite loop) via a crafted wav audio file because WavpackSetConfiguration64 mishandles a sample rate of zero. | https://nvd.nist.gov/vuln/detail/CVE-2018-19840 |
160,780 | WavPack | 070ef6f138956d9ea9612e69586152339dbefe51 | https://github.com/dbry/WavPack | https://github.com/dbry/WavPack/commit/070ef6f138956d9ea9612e69586152339dbefe51 | issue #53: error out on zero sample rate | 0 | int WavpackSetConfiguration64 (WavpackContext *wpc, WavpackConfig *config, int64_t total_samples, const unsigned char *chan_ids)
{
uint32_t flags, bps = 0;
uint32_t chan_mask = config->channel_mask;
int num_chans = config->num_channels;
int i;
if (!config->sample_rate) {
strcpy (wpc->err... | 225,732,781,624,200,050,000,000,000,000,000,000,000 | None | null | [
"CWE-835"
] | CVE-2018-19840 | The function WavpackPackInit in pack_utils.c in libwavpack.a in WavPack through 5.1.0 allows attackers to cause a denial-of-service (resource exhaustion caused by an infinite loop) via a crafted wav audio file because WavpackSetConfiguration64 mishandles a sample rate of zero. | https://nvd.nist.gov/vuln/detail/CVE-2018-19840 |
10,757 | FFmpeg | 8df6884832ec413cf032dfaa45c23b1c7876670c | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/8df6884832ec413cf032dfaa45c23b1c7876670c | avcodec/utils: Check close before calling it
Fixes: NULL pointer dereference
Fixes: 15733/clusterfuzz-testcase-minimized-ffmpeg_AV_CODEC_ID_IDF_fuzzer-5658616977162240
Reviewed-by: Paul B Mahol <onemda@gmail.com>
Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/projects/ffmpeg
Signe... | 1 | int attribute_align_arg avcodec_open2(AVCodecContext *avctx, const AVCodec *codec, AVDictionary **options)
{
int ret = 0;
int codec_init_ok = 0;
AVDictionary *tmp = NULL;
const AVPixFmtDescriptor *pixdesc;
if (avcodec_is_open(avctx))
return 0;
if ((!codec && !avctx->codec)) {
a... | 186,955,190,953,485,440,000,000,000,000,000,000,000 | utils.c | 36,691,661,158,649,837,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2019-17539 | In FFmpeg before 4.2, avcodec_open2 in libavcodec/utils.c allows a NULL pointer dereference and possibly unspecified other impact when there is no valid close function pointer. | https://nvd.nist.gov/vuln/detail/CVE-2019-17539 |
184,668 | FFmpeg | 8df6884832ec413cf032dfaa45c23b1c7876670c | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/8df6884832ec413cf032dfaa45c23b1c7876670c | avcodec/utils: Check close before calling it
Fixes: NULL pointer dereference
Fixes: 15733/clusterfuzz-testcase-minimized-ffmpeg_AV_CODEC_ID_IDF_fuzzer-5658616977162240
Reviewed-by: Paul B Mahol <onemda@gmail.com>
Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/projects/ffmpeg
Signe... | 0 | int attribute_align_arg avcodec_open2(AVCodecContext *avctx, const AVCodec *codec, AVDictionary **options)
{
int ret = 0;
int codec_init_ok = 0;
AVDictionary *tmp = NULL;
const AVPixFmtDescriptor *pixdesc;
if (avcodec_is_open(avctx))
return 0;
if ((!codec && !avctx->codec)) {
a... | 225,910,413,139,840,400,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2019-17539 | In FFmpeg before 4.2, avcodec_open2 in libavcodec/utils.c allows a NULL pointer dereference and possibly unspecified other impact when there is no valid close function pointer. | https://nvd.nist.gov/vuln/detail/CVE-2019-17539 |
10,758 | faad2 | 942c3e0aee748ea6fe97cb2c1aa5893225316174 | https://github.com/knik0/faad2 | https://github.com/knik0/faad2/commit/942c3e0aee748ea6fe97cb2c1aa5893225316174 | Fix a couple buffer overflows
https://hackerone.com/reports/502816
https://hackerone.com/reports/507858
https://github.com/videolan/vlc/blob/master/contrib/src/faad2/faad2-fix-overflows.patch | 1 | void faad_resetbits(bitfile *ld, int bits)
{
uint32_t tmp;
int words = bits >> 5;
int remainder = bits & 0x1F;
ld->bytes_left = ld->buffer_size - words*4;
if (ld->bytes_left >= 4)
{
tmp = getdword(&ld->start[words]);
ld->bytes_left -= 4;
} else {
tmp = getdword_n(&l... | 41,758,919,436,567,693,000,000,000,000,000,000,000 | bits.c | 144,039,870,893,866,260,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2019-15296 | An issue was discovered in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.8. The faad_resetbits function in libfaad/bits.c is affected by a buffer overflow vulnerability. The number of bits to be read is determined by ld->buffer_size - words*4, cast to uint32. If ld->buffer_size - words*4 is negative, a buffer overflow ... | https://nvd.nist.gov/vuln/detail/CVE-2019-15296 |
161,183 | faad2 | 942c3e0aee748ea6fe97cb2c1aa5893225316174 | https://github.com/knik0/faad2 | https://github.com/knik0/faad2/commit/942c3e0aee748ea6fe97cb2c1aa5893225316174 | Fix a couple buffer overflows
https://hackerone.com/reports/502816
https://hackerone.com/reports/507858
https://github.com/videolan/vlc/blob/master/contrib/src/faad2/faad2-fix-overflows.patch | 0 | void faad_resetbits(bitfile *ld, int bits)
{
uint32_t tmp;
int words = bits >> 5;
int remainder = bits & 0x1F;
if (ld->buffer_size < words * 4)
ld->bytes_left = 0;
else
ld->bytes_left = ld->buffer_size - words*4;
if (ld->bytes_left >= 4)
{
tmp = getdword(&ld->... | 242,192,643,825,881,640,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2019-15296 | An issue was discovered in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.8. The faad_resetbits function in libfaad/bits.c is affected by a buffer overflow vulnerability. The number of bits to be read is determined by ld->buffer_size - words*4, cast to uint32. If ld->buffer_size - words*4 is negative, a buffer overflow ... | https://nvd.nist.gov/vuln/detail/CVE-2019-15296 |
10,760 | poppler | 8b6dc55e530b2f5ede6b9dfb64aafdd1d5836492 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=8b6dc55e530b2f5ede6b9dfb64aafdd1d5836492 | Fix invalid memory access in 1150.pdf.asan.8.69 | 1 | SplashPath *Splash::makeDashedPath(SplashPath *path) {
SplashPath *dPath;
SplashCoord lineDashTotal;
SplashCoord lineDashStartPhase, lineDashDist, segLen;
SplashCoord x0, y0, x1, y1, xa, ya;
GBool lineDashStartOn, lineDashOn, newPath;
int lineDashStartIdx, lineDashIdx;
int i, j, k;
lineDashTotal = 0;
... | 112,288,227,865,298,480,000,000,000,000,000,000,000 | Splash.cc | 318,374,184,463,754,600,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-1788 | poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors that trigger an "invalid memory access" in (1) splash/Splash.cc, (2) poppler/Function.cc, and (3) poppler/Stream.cc. | https://nvd.nist.gov/vuln/detail/CVE-2013-1788 |
157,975 | poppler | 8b6dc55e530b2f5ede6b9dfb64aafdd1d5836492 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=8b6dc55e530b2f5ede6b9dfb64aafdd1d5836492 | Fix invalid memory access in 1150.pdf.asan.8.69 | 0 | SplashPath *Splash::makeDashedPath(SplashPath *path) {
SplashPath *dPath;
SplashCoord lineDashTotal;
SplashCoord lineDashStartPhase, lineDashDist, segLen;
SplashCoord x0, y0, x1, y1, xa, ya;
GBool lineDashStartOn, lineDashOn, newPath;
int lineDashStartIdx, lineDashIdx;
int i, j, k;
lineDashTotal = 0;
... | 212,193,506,840,492,430,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2013-1788 | poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors that trigger an "invalid memory access" in (1) splash/Splash.cc, (2) poppler/Function.cc, and (3) poppler/Stream.cc. | https://nvd.nist.gov/vuln/detail/CVE-2013-1788 |
10,761 | capstone | 87a25bb543c8e4c09b48d4b4a6c7db31ce58df06 | https://github.com/aquynh/capstone | https://github.com/aquynh/capstone/commit/87a25bb543c8e4c09b48d4b4a6c7db31ce58df06 | x86: fast path checking for X86_insn_reg_intel() | 1 | x86_reg X86_insn_reg_intel(unsigned int id, enum cs_ac_type *access)
{
unsigned int first = 0;
unsigned int last = ARR_SIZE(insn_regs_intel) - 1;
unsigned int mid = ARR_SIZE(insn_regs_intel) / 2;
if (!intel_regs_sorted) {
memcpy(insn_regs_intel_sorted, insn_regs_intel,
sizeof(insn_regs_intel_sorted));
qsor... | 314,014,179,055,219,480,000,000,000,000,000,000,000 | X86Mapping.c | 223,710,474,603,118,000,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2016-7151 | Capstone 3.0.4 has an out-of-bounds vulnerability (SEGV caused by a read memory access) in X86_insn_reg_intel in arch/X86/X86Mapping.c. | https://nvd.nist.gov/vuln/detail/CVE-2016-7151 |
161,443 | capstone | 87a25bb543c8e4c09b48d4b4a6c7db31ce58df06 | https://github.com/aquynh/capstone | https://github.com/aquynh/capstone/commit/87a25bb543c8e4c09b48d4b4a6c7db31ce58df06 | x86: fast path checking for X86_insn_reg_intel() | 0 | x86_reg X86_insn_reg_intel(unsigned int id, enum cs_ac_type *access)
{
static bool intel_regs_sorted = false;
unsigned int first = 0;
unsigned int last = ARR_SIZE(insn_regs_intel) - 1;
unsigned int mid;
if (!intel_regs_sorted) {
memcpy(insn_regs_intel_sorted, insn_regs_intel,
sizeof(insn_regs_intel_s... | 4,783,084,083,365,967,500,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2016-7151 | Capstone 3.0.4 has an out-of-bounds vulnerability (SEGV caused by a read memory access) in X86_insn_reg_intel in arch/X86/X86Mapping.c. | https://nvd.nist.gov/vuln/detail/CVE-2016-7151 |
10,762 | FFmpeg | ed22dc22216f74c75ee7901f82649e1ff725ba50 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/ed22dc22216f74c75ee7901f82649e1ff725ba50 | avformat/movenc: Check that frame_types other than EAC3_FRAME_TYPE_INDEPENDENT have a supported substream id
Fixes: out of array access
Fixes: ffmpeg_bof_1.avi
Found-by: Thuan Pham, Marcel Böhme, Andrew Santosa and Alexandru Razvan Caciulescu with AFLSmart
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 1 | static int handle_eac3(MOVMuxContext *mov, AVPacket *pkt, MOVTrack *track)
{
AC3HeaderInfo *hdr = NULL;
struct eac3_info *info;
int num_blocks, ret;
if (!track->eac3_priv && !(track->eac3_priv = av_mallocz(sizeof(*info))))
return AVERROR(ENOMEM);
info = track->eac3_priv;
if (avpriv_ac3... | 94,813,621,897,229,420,000,000,000,000,000,000,000 | movenc.c | 10,914,575,145,131,144,000,000,000,000,000,000,000 | [
"CWE-129"
] | CVE-2018-13302 | In FFmpeg 4.0.1, improper handling of frame types (other than EAC3_FRAME_TYPE_INDEPENDENT) that have multiple independent substreams in the handle_eac3 function in libavformat/movenc.c may trigger an out-of-array access while converting a crafted AVI file to MPEG4, leading to a denial of service or possibly unspecified... | https://nvd.nist.gov/vuln/detail/CVE-2018-13302 |
160,916 | FFmpeg | ed22dc22216f74c75ee7901f82649e1ff725ba50 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/ed22dc22216f74c75ee7901f82649e1ff725ba50 | avformat/movenc: Check that frame_types other than EAC3_FRAME_TYPE_INDEPENDENT have a supported substream id
Fixes: out of array access
Fixes: ffmpeg_bof_1.avi
Found-by: Thuan Pham, Marcel Böhme, Andrew Santosa and Alexandru Razvan Caciulescu with AFLSmart
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 0 | static int handle_eac3(MOVMuxContext *mov, AVPacket *pkt, MOVTrack *track)
{
AC3HeaderInfo *hdr = NULL;
struct eac3_info *info;
int num_blocks, ret;
if (!track->eac3_priv && !(track->eac3_priv = av_mallocz(sizeof(*info))))
return AVERROR(ENOMEM);
info = track->eac3_priv;
if (avpriv_ac3... | 222,443,309,436,041,480,000,000,000,000,000,000,000 | None | null | [
"CWE-129"
] | CVE-2018-13302 | In FFmpeg 4.0.1, improper handling of frame types (other than EAC3_FRAME_TYPE_INDEPENDENT) that have multiple independent substreams in the handle_eac3 function in libavformat/movenc.c may trigger an out-of-array access while converting a crafted AVI file to MPEG4, leading to a denial of service or possibly unspecified... | https://nvd.nist.gov/vuln/detail/CVE-2018-13302 |
10,763 | virglrenderer | 6eb13f7a2dcf391ec9e19b4c2a79e68305f63c22 | https://gitlab.freedesktop.org/virgl/virglrenderer | https://cgit.freedesktop.org/virglrenderer/commit/?id=6eb13f7a2dcf391ec9e19b4c2a79e68305f63c22 | vrend: fix memory leak in int blit context
The 'blit_ctx->initialised' is not setted to true.
Every time init blit context, it will create a new
'blit_ctx->gl_context' thus causing a memory leak.
This patch avoid this.
Signed-off-by: Li Qiang <liq3ea@gmail.com>
Signed-off-by: Dave Airlie <airlied@redhat.com> | 1 | static void vrend_renderer_init_blit_ctx(struct vrend_blitter_ctx *blit_ctx)
{
struct virgl_gl_ctx_param ctx_params;
int i;
if (blit_ctx->initialised) {
vrend_clicbs->make_current(0, blit_ctx->gl_context);
return;
}
ctx_params.shared = true;
ctx_params.major_ver = VREND_GL_VER_MAJOR;
c... | 81,858,904,308,721,850,000,000,000,000,000,000,000 | vrend_blitter.c | 269,551,575,942,070,470,000,000,000,000,000,000,000 | [
"CWE-772"
] | CVE-2017-5993 | Memory leak in the vrend_renderer_init_blit_ctx function in vrend_blitter.c in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (host memory consumption) via a large number of VIRGL_CCMD_BLIT commands. | https://nvd.nist.gov/vuln/detail/CVE-2017-5993 |
158,103 | virglrenderer | 6eb13f7a2dcf391ec9e19b4c2a79e68305f63c22 | https://gitlab.freedesktop.org/virgl/virglrenderer | https://cgit.freedesktop.org/virglrenderer/commit/?id=6eb13f7a2dcf391ec9e19b4c2a79e68305f63c22 | vrend: fix memory leak in int blit context
The 'blit_ctx->initialised' is not setted to true.
Every time init blit context, it will create a new
'blit_ctx->gl_context' thus causing a memory leak.
This patch avoid this.
Signed-off-by: Li Qiang <liq3ea@gmail.com>
Signed-off-by: Dave Airlie <airlied@redhat.com> | 0 | static void vrend_renderer_init_blit_ctx(struct vrend_blitter_ctx *blit_ctx)
{
struct virgl_gl_ctx_param ctx_params;
int i;
if (blit_ctx->initialised) {
vrend_clicbs->make_current(0, blit_ctx->gl_context);
return;
}
blit_ctx->initialised = true;
ctx_params.shared = true;
ctx_param... | 8,018,440,495,939,810,000,000,000,000,000,000,000 | None | null | [
"CWE-772"
] | CVE-2017-5993 | Memory leak in the vrend_renderer_init_blit_ctx function in vrend_blitter.c in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (host memory consumption) via a large number of VIRGL_CCMD_BLIT commands. | https://nvd.nist.gov/vuln/detail/CVE-2017-5993 |
10,765 | qemu | 0be839a2701369f669532ea5884c15bead1c6e08 | https://github.com/bonzini/qemu | http://git.qemu.org/?p=qemu.git;a=commit;h=0be839a2701369f669532ea5884c15bead1c6e08 | migration: fix parameter validation on ram load
During migration, the values read from migration stream during ram load
are not validated. Especially offset in host_from_stream_offset() and
also the length of the writes in the callers of said function.
To fix this, we need to make sure that the [offset, offset + leng... | 1 | static inline void *host_from_stream_offset(QEMUFile *f,
ram_addr_t offset,
int flags)
{
static RAMBlock *block = NULL;
char id[256];
uint8_t len;
if (flags & RAM_SAVE_FLAG_CONTINUE) {
if (!block) {
... | 210,208,517,146,366,460,000,000,000,000,000,000,000 | arch_init.c | 288,153,132,893,003,240,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2014-7840 | The host_from_stream_offset function in arch_init.c in QEMU, when loading RAM during migration, allows remote attackers to execute arbitrary code via a crafted (1) offset or (2) length value in savevm data. | https://nvd.nist.gov/vuln/detail/CVE-2014-7840 |
194,650 | qemu | 0be839a2701369f669532ea5884c15bead1c6e08 | https://github.com/bonzini/qemu | http://git.qemu.org/?p=qemu.git;a=commit;h=0be839a2701369f669532ea5884c15bead1c6e08 | migration: fix parameter validation on ram load
During migration, the values read from migration stream during ram load
are not validated. Especially offset in host_from_stream_offset() and
also the length of the writes in the callers of said function.
To fix this, we need to make sure that the [offset, offset + leng... | 0 | static inline void *host_from_stream_offset(QEMUFile *f,
ram_addr_t offset,
int flags)
{
static RAMBlock *block = NULL;
char id[256];
uint8_t len;
if (flags & RAM_SAVE_FLAG_CONTINUE) {
if (!block || block... | 83,155,593,729,931,200,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2014-7840 | The host_from_stream_offset function in arch_init.c in QEMU, when loading RAM during migration, allows remote attackers to execute arbitrary code via a crafted (1) offset or (2) length value in savevm data. | https://nvd.nist.gov/vuln/detail/CVE-2014-7840 |
10,766 | qemu | 362786f14a753d8a5256ef97d7c10ed576d6572b | https://github.com/bonzini/qemu | https://git.qemu.org/?p=qemu.git;a=commitdiff;h=362786f14a753d8a5256ef97d7c10ed576d6572b | net: check packet payload length
While computing IP checksum, 'net_checksum_calculate' reads
payload length from the packet. It could exceed the given 'data'
buffer size. Add a check to avoid it.
Reported-by: Liu Ling <liuling-it@360.cn>
Signed-off-by: Prasad J Pandit <pjp@fedoraproject.org>
Signed-off-by: Jason Wang... | 1 | void net_checksum_calculate(uint8_t *data, int length)
{
int hlen, plen, proto, csum_offset;
uint16_t csum;
if ((data[14] & 0xf0) != 0x40)
return; /* not IPv4 */
hlen = (data[14] & 0x0f) * 4;
plen = (data[16] << 8 | data[17]) - hlen;
proto = data[23];
switch (proto) {
case PROTO_TCP... | 8,961,402,814,564,434,000,000,000,000,000,000,000 | checksum.c | 322,468,048,645,822,800,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2016-2857 | The net_checksum_calculate function in net/checksum.c in QEMU allows local guest OS users to cause a denial of service (out-of-bounds heap read and crash) via the payload length in a crafted packet. | https://nvd.nist.gov/vuln/detail/CVE-2016-2857 |
194,735 | qemu | 362786f14a753d8a5256ef97d7c10ed576d6572b | https://github.com/bonzini/qemu | https://git.qemu.org/?p=qemu.git;a=commitdiff;h=362786f14a753d8a5256ef97d7c10ed576d6572b | net: check packet payload length
While computing IP checksum, 'net_checksum_calculate' reads
payload length from the packet. It could exceed the given 'data'
buffer size. Add a check to avoid it.
Reported-by: Liu Ling <liuling-it@360.cn>
Signed-off-by: Prasad J Pandit <pjp@fedoraproject.org>
Signed-off-by: Jason Wang... | 0 | void net_checksum_calculate(uint8_t *data, int length)
{
int hlen, plen, proto, csum_offset;
uint16_t csum;
/* Ensure data has complete L2 & L3 headers. */
if (length < 14 + 20) {
return;
}
if ((data[14] & 0xf0) != 0x40)
return; /* not IPv4 */
hlen = (data[14] & 0x0f)... | 36,528,162,709,466,384,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-2857 | The net_checksum_calculate function in net/checksum.c in QEMU allows local guest OS users to cause a denial of service (out-of-bounds heap read and crash) via the payload length in a crafted packet. | https://nvd.nist.gov/vuln/detail/CVE-2016-2857 |
10,768 | capstone | 6fe86eef621b9849f51a5e1e5d73258a93440403 | https://github.com/aquynh/capstone | https://github.com/aquynh/capstone/commit/6fe86eef621b9849f51a5e1e5d73258a93440403 | provide a validity check to prevent against Integer overflow conditions (#870)
* provide a validity check to prevent against Integer overflow conditions
* fix some style issues. | 1 | void * CAPSTONE_API cs_winkernel_malloc(size_t size)
{
// Disallow zero length allocation because they waste pool header space and,
// in many cases, indicate a potential validation issue in the calling code.
NT_ASSERT(size);
// FP; a use of NonPagedPool is required for Windows 7 support
#pragma prefast(suppress :... | 132,932,202,241,765,970,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2017-6952 | Integer overflow in the cs_winkernel_malloc function in winkernel_mm.c in Capstone 3.0.4 and earlier allows attackers to cause a denial of service (heap-based buffer overflow in a kernel driver) or possibly have unspecified other impact via a large value. | https://nvd.nist.gov/vuln/detail/CVE-2017-6952 |
160,309 | capstone | 6fe86eef621b9849f51a5e1e5d73258a93440403 | https://github.com/aquynh/capstone | https://github.com/aquynh/capstone/commit/6fe86eef621b9849f51a5e1e5d73258a93440403 | provide a validity check to prevent against Integer overflow conditions (#870)
* provide a validity check to prevent against Integer overflow conditions
* fix some style issues. | 0 | void * CAPSTONE_API cs_winkernel_malloc(size_t size)
{
NT_ASSERT(size);
#pragma prefast(suppress : 30030) // Allocating executable POOL_TYPE memory
size_t number_of_bytes = 0;
CS_WINKERNEL_MEMBLOCK *block = NULL;
// A specially crafted size value can trigger the overflow.
// If the sum in a value that overflow... | 173,840,461,677,835,900,000,000,000,000,000,000,000 | None | null | [
"CWE-190"
] | CVE-2017-6952 | Integer overflow in the cs_winkernel_malloc function in winkernel_mm.c in Capstone 3.0.4 and earlier allows attackers to cause a denial of service (heap-based buffer overflow in a kernel driver) or possibly have unspecified other impact via a large value. | https://nvd.nist.gov/vuln/detail/CVE-2017-6952 |
10,769 | netdata | 92327c9ec211bd1616315abcb255861b130b97ca | https://github.com/netdata/netdata | https://github.com/netdata/netdata/commit/92327c9ec211bd1616315abcb255861b130b97ca | fixed vulnerabilities identified by red4sec.com (#4521) | 1 | inline int web_client_api_request_v1_data(RRDHOST *host, struct web_client *w, char *url) {
debug(D_WEB_CLIENT, "%llu: API v1 data with URL '%s'", w->id, url);
int ret = 400;
BUFFER *dimensions = NULL;
buffer_flush(w->response.data);
char *google_version = "0.6",
*google_reqId = "0... | 53,029,324,079,806,850,000,000,000,000,000,000,000 | web_api_v1.c | 63,923,686,889,514,750,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2018-18839 | An issue was discovered in Netdata 1.10.0. Full Path Disclosure (FPD) exists via api/v1/alarms. NOTE: the vendor says "is intentional. | https://nvd.nist.gov/vuln/detail/CVE-2018-18839 |
194,943 | netdata | 92327c9ec211bd1616315abcb255861b130b97ca | https://github.com/netdata/netdata | https://github.com/netdata/netdata/commit/92327c9ec211bd1616315abcb255861b130b97ca | fixed vulnerabilities identified by red4sec.com (#4521) | 0 | inline int web_client_api_request_v1_data(RRDHOST *host, struct web_client *w, char *url) {
debug(D_WEB_CLIENT, "%llu: API v1 data with URL '%s'", w->id, url);
int ret = 400;
BUFFER *dimensions = NULL;
buffer_flush(w->response.data);
char *google_version = "0.6",
*google_reqId = ... | 246,523,767,572,139,340,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2018-18839 | An issue was discovered in Netdata 1.10.0. Full Path Disclosure (FPD) exists via api/v1/alarms. NOTE: the vendor says "is intentional. | https://nvd.nist.gov/vuln/detail/CVE-2018-18839 |
10,771 | Espruino | c36d30529118aa049797db43f111ddad468aad29 | https://github.com/espruino/Espruino | https://github.com/espruino/Espruino/commit/c36d30529118aa049797db43f111ddad468aad29 | Fix stack overflow if void void void... is repeated many times (fix #1434) | 1 | NO_INLINE JsVar *jspeFactor() {
if (lex->tk==LEX_ID) {
JsVar *a = jspGetNamedVariable(jslGetTokenValueAsString(lex));
JSP_ASSERT_MATCH(LEX_ID);
#ifndef SAVE_ON_FLASH
if (lex->tk==LEX_TEMPLATE_LITERAL)
jsExceptionHere(JSET_SYNTAXERROR, "Tagged template literals not supported");
else if (lex->tk==... | 59,713,758,321,053,350,000,000,000,000,000,000,000 | jsparse.c | 60,267,210,341,651,270,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-11594 | Espruino before 1.99 allows attackers to cause a denial of service (application crash) with a user crafted input file via a Buffer Overflow during syntax parsing of "VOID" tokens in jsparse.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-11594 |
160,959 | Espruino | c36d30529118aa049797db43f111ddad468aad29 | https://github.com/espruino/Espruino | https://github.com/espruino/Espruino/commit/c36d30529118aa049797db43f111ddad468aad29 | Fix stack overflow if void void void... is repeated many times (fix #1434) | 0 | NO_INLINE JsVar *jspeFactor() {
if (lex->tk==LEX_ID) {
JsVar *a = jspGetNamedVariable(jslGetTokenValueAsString(lex));
JSP_ASSERT_MATCH(LEX_ID);
#ifndef SAVE_ON_FLASH
if (lex->tk==LEX_TEMPLATE_LITERAL)
jsExceptionHere(JSET_SYNTAXERROR, "Tagged template literals not supported");
else if (lex->tk==... | 160,975,042,004,994,760,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2018-11594 | Espruino before 1.99 allows attackers to cause a denial of service (application crash) with a user crafted input file via a Buffer Overflow during syntax parsing of "VOID" tokens in jsparse.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-11594 |
10,772 | poppler | 39d140bfc0b8239bdd96d6a55842034ae5c05473 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=39d140bfc0b8239bdd96d6a55842034ae5c05473 | Fix crash in broken pdf (code < 0)
Found thanks to PDF provided by Joel Voss of Leviathan Security Group | 1 | void FoFiType1::parse() {
char *line, *line1, *p, *p2;
char buf[256];
char c;
int n, code, i, j;
char *tokptr;
for (i = 1, line = (char *)file;
i <= 100 && line && (!name || !encoding);
++i) {
// get font name
if (!name && !strncmp(line, "/FontName", 9)) {
strncpy(buf, line, 25... | 212,676,828,599,961,000,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2010-3704 | The FoFiType1::parse function in fofi/FoFiType1.cc in the PDF parser in xpdf before 3.02pl5, poppler 0.8.7 and possibly other versions up to 0.15.1, kdegraphics, and possibly other products allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a PDF file with a ... | https://nvd.nist.gov/vuln/detail/CVE-2010-3704 |
184,291 | poppler | 39d140bfc0b8239bdd96d6a55842034ae5c05473 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=39d140bfc0b8239bdd96d6a55842034ae5c05473 | Fix crash in broken pdf (code < 0)
Found thanks to PDF provided by Joel Voss of Leviathan Security Group | 0 | void FoFiType1::parse() {
char *line, *line1, *p, *p2;
char buf[256];
char c;
int n, code, i, j;
char *tokptr;
for (i = 1, line = (char *)file;
i <= 100 && line && (!name || !encoding);
++i) {
if (!name && !strncmp(line, "/FontName", 9)) {
strncpy(buf, line, 255);
buf[255] = ... | 68,253,478,481,293,290,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2010-3704 | The FoFiType1::parse function in fofi/FoFiType1.cc in the PDF parser in xpdf before 3.02pl5, poppler 0.8.7 and possibly other versions up to 0.15.1, kdegraphics, and possibly other products allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a PDF file with a ... | https://nvd.nist.gov/vuln/detail/CVE-2010-3704 |
10,773 | qemu | bf25983345ca44aec3dd92c57142be45452bd38a | https://github.com/bonzini/qemu | https://git.qemu.org/?p=qemu.git;a=commit;h=bf25983345ca44aec3dd92c57142be45452bd38a | cirrus: don't overflow CirrusVGAState->cirrus_bltbuf
This is CVE-2014-8106.
Signed-off-by: Gerd Hoffmann <kraxel@redhat.com> | 1 | static bool blit_is_unsafe(struct CirrusVGAState *s)
{
/* should be the case, see cirrus_bitblt_start */
assert(s->cirrus_blt_width > 0);
assert(s->cirrus_blt_height > 0);
if (blit_region_is_unsafe(s, s->cirrus_blt_dstpitch,
s->cirrus_blt_dstaddr & s->cirrus_addr_mask)) {
... | 24,989,570,285,750,455,000,000,000,000,000,000,000 | cirrus_vga.c | 74,911,260,684,549,020,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2014-8106 | Heap-based buffer overflow in the Cirrus VGA emulator (hw/display/cirrus_vga.c) in QEMU before 2.2.0 allows local guest users to execute arbitrary code via vectors related to blit regions. NOTE: this vulnerability exists because an incomplete fix for CVE-2007-1320. | https://nvd.nist.gov/vuln/detail/CVE-2014-8106 |
194,647 | qemu | bf25983345ca44aec3dd92c57142be45452bd38a | https://github.com/bonzini/qemu | https://git.qemu.org/?p=qemu.git;a=commit;h=bf25983345ca44aec3dd92c57142be45452bd38a | cirrus: don't overflow CirrusVGAState->cirrus_bltbuf
This is CVE-2014-8106.
Signed-off-by: Gerd Hoffmann <kraxel@redhat.com> | 0 | static bool blit_is_unsafe(struct CirrusVGAState *s)
{
/* should be the case, see cirrus_bitblt_start */
assert(s->cirrus_blt_width > 0);
assert(s->cirrus_blt_height > 0);
if (s->cirrus_blt_width > CIRRUS_BLTBUFSIZE) {
return true;
}
if (blit_region_is_unsafe(s, s->cirrus_blt_dstpi... | 92,948,116,602,980,800,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2014-8106 | Heap-based buffer overflow in the Cirrus VGA emulator (hw/display/cirrus_vga.c) in QEMU before 2.2.0 allows local guest users to execute arbitrary code via vectors related to blit regions. NOTE: this vulnerability exists because an incomplete fix for CVE-2007-1320. | https://nvd.nist.gov/vuln/detail/CVE-2014-8106 |
10,774 | poppler | 957aa252912cde85d76c41e9710b33425a82b696 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=957aa252912cde85d76c41e9710b33425a82b696 | Fix invalid memory accesses in 1091.pdf.asan.72.42 | 1 | void Splash::scaleMaskYdXu(SplashImageMaskSource src, void *srcData,
int srcWidth, int srcHeight,
int scaledWidth, int scaledHeight,
SplashBitmap *dest) {
Guchar *lineBuf;
Guint *pixBuf;
Guint pix;
Guchar *destPtr;
int yp, yq, xp, xq, yt, y, yStep, xt, x, xStep, d;
int i, j;
// Bresenha... | 313,979,367,089,057,100,000,000,000,000,000,000,000 | Splash.cc | 186,046,208,096,924,120,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-1788 | poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors that trigger an "invalid memory access" in (1) splash/Splash.cc, (2) poppler/Function.cc, and (3) poppler/Stream.cc. | https://nvd.nist.gov/vuln/detail/CVE-2013-1788 |
157,978 | poppler | 957aa252912cde85d76c41e9710b33425a82b696 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?h=poppler-0.22&id=957aa252912cde85d76c41e9710b33425a82b696 | Fix invalid memory accesses in 1091.pdf.asan.72.42 | 0 | void Splash::scaleMaskYdXu(SplashImageMaskSource src, void *srcData,
int srcWidth, int srcHeight,
int scaledWidth, int scaledHeight,
SplashBitmap *dest) {
Guchar *lineBuf;
Guint *pixBuf;
Guint pix;
Guchar *destPtr;
int yp, yq, xp, xq, yt, y, yStep, xt, x, xStep, d;
int i, j;
destPt... | 134,750,274,006,378,340,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2013-1788 | poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors that trigger an "invalid memory access" in (1) splash/Splash.cc, (2) poppler/Function.cc, and (3) poppler/Stream.cc. | https://nvd.nist.gov/vuln/detail/CVE-2013-1788 |
10,775 | file | 6f737ddfadb596d7d4a993f7ed2141ffd664a81c | https://github.com/file/file | https://github.com/file/file/commit/6f737ddfadb596d7d4a993f7ed2141ffd664a81c | - reduce recursion level from 20 to 10 and make a symbolic constant for it.
- pull out the guts of saving and restoring the output buffer into functions
and take care not to overwrite the error message if an error happened. | 1 |
private int
mget(struct magic_set *ms, const unsigned char *s, struct magic *m,
size_t nbytes, size_t o, unsigned int cont_level, int mode, int text,
int flip, int recursion_level, int *printed_something,
int *need_separator, int *returnval)
{
uint32_t soffset, offset = ms->offset;
uint32_t lhs;
int rv,... | 260,682,246,970,550,750,000,000,000,000,000,000,000 | softmagic.c | 241,208,425,722,088,000,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2014-8117 | softmagic.c in file before 5.21 does not properly limit recursion, which allows remote attackers to cause a denial of service (CPU consumption or crash) via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2014-8117 |
184,397 | file | 6f737ddfadb596d7d4a993f7ed2141ffd664a81c | https://github.com/file/file | https://github.com/file/file/commit/6f737ddfadb596d7d4a993f7ed2141ffd664a81c | - reduce recursion level from 20 to 10 and make a symbolic constant for it.
- pull out the guts of saving and restoring the output buffer into functions
and take care not to overwrite the error message if an error happened. | 0 | mget(struct magic_set *ms, const unsigned char *s, struct magic *m,
size_t nbytes, size_t o, unsigned int cont_level, int mode, int text,
int flip, int recursion_level, int *printed_something,
int *need_separator, int *returnval)
{
uint32_t offset = ms->offset;
uint32_t lhs;
file_pushbuf_t *pb;
int... | 237,341,446,924,405,170,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2014-8117 | softmagic.c in file before 5.21 does not properly limit recursion, which allows remote attackers to cause a denial of service (CPU consumption or crash) via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2014-8117 |
10,778 | linux | 8605330aac5a5785630aec8f64378a54891937cc | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/8605330aac5a5785630aec8f64378a54891937cc | tcp: fix SCM_TIMESTAMPING_OPT_STATS for normal skbs
__sock_recv_timestamp can be called for both normal skbs (for
receive timestamps) and for skbs on the error queue (for transmit
timestamps).
Commit 1c885808e456
(tcp: SOF_TIMESTAMPING_OPT_STATS option for SO_TIMESTAMPING)
assumes any skb passed to __sock_recv_timest... | 1 | */
int sock_queue_err_skb(struct sock *sk, struct sk_buff *skb)
{
if (atomic_read(&sk->sk_rmem_alloc) + skb->truesize >=
(unsigned int)sk->sk_rcvbuf)
return -ENOMEM;
skb_orphan(skb);
skb->sk = sk;
skb->destructor = sock_rmem_free;
atomic_add(skb->truesize, &sk->sk_rmem_alloc);
/* before exiting rcu sect... | 339,241,323,239,055,800,000,000,000,000,000,000,000 | skbuff.c | 201,914,970,725,584,370,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-7277 | The TCP stack in the Linux kernel through 4.10.6 mishandles the SCM_TIMESTAMPING_OPT_STATS feature, which allows local users to obtain sensitive information from the kernel's internal socket data structures or cause a denial of service (out-of-bounds read) via crafted system calls, related to net/core/skbuff.c and net/... | https://nvd.nist.gov/vuln/detail/CVE-2017-7277 |
160,292 | linux | 8605330aac5a5785630aec8f64378a54891937cc | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/8605330aac5a5785630aec8f64378a54891937cc | tcp: fix SCM_TIMESTAMPING_OPT_STATS for normal skbs
__sock_recv_timestamp can be called for both normal skbs (for
receive timestamps) and for skbs on the error queue (for transmit
timestamps).
Commit 1c885808e456
(tcp: SOF_TIMESTAMPING_OPT_STATS option for SO_TIMESTAMPING)
assumes any skb passed to __sock_recv_timest... | 0 | int sock_queue_err_skb(struct sock *sk, struct sk_buff *skb)
{
if (atomic_read(&sk->sk_rmem_alloc) + skb->truesize >=
(unsigned int)sk->sk_rcvbuf)
return -ENOMEM;
skb_orphan(skb);
skb->sk = sk;
skb->destructor = sock_rmem_free;
atomic_add(skb->truesize, &sk->sk_rmem_alloc);
skb_set_err_queue(skb);
... | 61,427,991,401,802,320,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2017-7277 | The TCP stack in the Linux kernel through 4.10.6 mishandles the SCM_TIMESTAMPING_OPT_STATS feature, which allows local users to obtain sensitive information from the kernel's internal socket data structures or cause a denial of service (out-of-bounds read) via crafted system calls, related to net/core/skbuff.c and net/... | https://nvd.nist.gov/vuln/detail/CVE-2017-7277 |
10,780 | radare2 | 9d348bcc2c4bbd3805e7eec97b594be9febbdf9a | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/9d348bcc2c4bbd3805e7eec97b594be9febbdf9a | Fix #9943 - Invalid free on RAnal.avr | 1 | INST_HANDLER (cpse) { // CPSE Rd, Rr
int r = (buf[0] & 0xf) | ((buf[1] & 0x2) << 3);
int d = ((buf[0] >> 4) & 0xf) | ((buf[1] & 0x1) << 4);
RAnalOp next_op;
// calculate next instruction size (call recursively avr_op_analyze)
// and free next_op's esil string (we dont need it now)
avr_op_analyze (anal,
&next_... | 109,446,500,842,023,420,000,000,000,000,000,000,000 | anal_avr.c | 49,931,515,066,285,090,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2018-11383 | The r_strbuf_fini() function in radare2 2.5.0 allows remote attackers to cause a denial of service (invalid free and application crash) via a crafted ELF file because of an uninitialized variable in the CPSE handler in libr/anal/p/anal_avr.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-11383 |
76,073 | radare2 | 9d348bcc2c4bbd3805e7eec97b594be9febbdf9a | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/9d348bcc2c4bbd3805e7eec97b594be9febbdf9a | Fix #9943 - Invalid free on RAnal.avr | 0 | INST_HANDLER (sbrx) { // SBRC Rr, b
int b = buf[0] & 0x7;
int r = ((buf[0] >> 4) & 0xf) | ((buf[1] & 0x01) << 4);
RAnalOp next_op = {0};
avr_op_analyze (anal,
&next_op,
op->addr + op->size, buf + op->size, len - op->size,
cpu);
r_strbuf_fini (&next_op.esil);
op->jump = op->addr + next_op.size + 2;
op-... | 266,629,917,975,835,260,000,000,000,000,000,000,000 | None | null | [
"CWE-416"
] | CVE-2018-11383 | The r_strbuf_fini() function in radare2 2.5.0 allows remote attackers to cause a denial of service (invalid free and application crash) via a crafted ELF file because of an uninitialized variable in the CPSE handler in libr/anal/p/anal_avr.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-11383 |
10,781 | exim | 5b7a7c051c9ab9ee7c924a611f90ef2be03e0ad0 | https://github.com/Exim/exim | https://git.exim.org/exim.git/commitdiff/5b7a7c051c9ab9ee7c924a611f90ef2be03e0ad0 | SECURITY: DMARC uses From header untrusted data
CVE-2014-2957
To find the sending domain, expand_string() was used to directly parse
the contents of the From header. This passes untrusted data directly
into an internal function. Convert to use standard internal parsing
functions. | 1 | int dmarc_process() {
int sr, origin; /* used in SPF section */
int dmarc_spf_result = 0; /* stores spf into dmarc conn ctx */
pdkim_signature *sig = NULL;
BOOL has_dmarc_record = TRUE;
u_char **ruf; /* forensic report addressees, if called for */
/* ACLs have "control=dmarc_disabl... | 164,959,432,179,770,350,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2014-2957 | The dmarc_process function in dmarc.c in Exim before 4.82.1, when EXPERIMENTAL_DMARC is enabled, allows remote attackers to execute arbitrary code via the From header in an email, which is passed to the expand_string function. | https://nvd.nist.gov/vuln/detail/CVE-2014-2957 |
184,306 | exim | 5b7a7c051c9ab9ee7c924a611f90ef2be03e0ad0 | https://github.com/Exim/exim | https://git.exim.org/exim.git/commitdiff/5b7a7c051c9ab9ee7c924a611f90ef2be03e0ad0 | SECURITY: DMARC uses From header untrusted data
CVE-2014-2957
To find the sending domain, expand_string() was used to directly parse
the contents of the From header. This passes untrusted data directly
into an internal function. Convert to use standard internal parsing
functions. | 0 | int dmarc_process() {
int sr, origin; /* used in SPF section */
int dmarc_spf_result = 0; /* stores spf into dmarc conn ctx */
pdkim_signature *sig = NULL;
BOOL has_dmarc_record = TRUE;
u_char **ruf; /* forensic report addressees, if called for */
/* ACLs have "control=dmarc_disabl... | 63,245,483,966,724,650,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2014-2957 | The dmarc_process function in dmarc.c in Exim before 4.82.1, when EXPERIMENTAL_DMARC is enabled, allows remote attackers to execute arbitrary code via the From header in an email, which is passed to the expand_string function. | https://nvd.nist.gov/vuln/detail/CVE-2014-2957 |
10,782 | qemu | e95c9a493a5a8d6f969e86c9f19f80ffe6587e19 | https://github.com/bonzini/qemu | http://git.qemu.org/?p=qemu.git;a=commit;h=e95c9a493a5a8d6f969e86c9f19f80ffe6587e19 | 9pfs: fix potential host memory leak in v9fs_read
In 9pfs read dispatch function, it doesn't free two QEMUIOVector
object thus causing potential memory leak. This patch avoid this.
Signed-off-by: Li Qiang <liqiang6-s@360.cn>
Signed-off-by: Greg Kurz <groug@kaod.org> | 1 | static void v9fs_read(void *opaque)
{
int32_t fid;
uint64_t off;
ssize_t err = 0;
int32_t count = 0;
size_t offset = 7;
uint32_t max_count;
V9fsFidState *fidp;
V9fsPDU *pdu = opaque;
V9fsState *s = pdu->s;
err = pdu_unmarshal(pdu, offset, "dqd", &fid, &off, &max_count);
if (... | 163,413,897,778,522,470,000,000,000,000,000,000,000 | 9p.c | 169,354,661,467,446,540,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2016-8577 | Memory leak in the v9fs_read function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) via vectors related to an I/O read operation. | https://nvd.nist.gov/vuln/detail/CVE-2016-8577 |
194,656 | qemu | e95c9a493a5a8d6f969e86c9f19f80ffe6587e19 | https://github.com/bonzini/qemu | http://git.qemu.org/?p=qemu.git;a=commit;h=e95c9a493a5a8d6f969e86c9f19f80ffe6587e19 | 9pfs: fix potential host memory leak in v9fs_read
In 9pfs read dispatch function, it doesn't free two QEMUIOVector
object thus causing potential memory leak. This patch avoid this.
Signed-off-by: Li Qiang <liqiang6-s@360.cn>
Signed-off-by: Greg Kurz <groug@kaod.org> | 0 | static void v9fs_read(void *opaque)
{
int32_t fid;
uint64_t off;
ssize_t err = 0;
int32_t count = 0;
size_t offset = 7;
uint32_t max_count;
V9fsFidState *fidp;
V9fsPDU *pdu = opaque;
V9fsState *s = pdu->s;
err = pdu_unmarshal(pdu, offset, "dqd", &fid, &off, &max_count);
if (... | 172,889,655,398,676,270,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2016-8577 | Memory leak in the v9fs_read function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) via vectors related to an I/O read operation. | https://nvd.nist.gov/vuln/detail/CVE-2016-8577 |
10,783 | WavPack | f68a9555b548306c5b1ee45199ccdc4a16a6101b | https://github.com/dbry/WavPack | https://github.com/dbry/WavPack/commit/f68a9555b548306c5b1ee45199ccdc4a16a6101b | issue #66: make sure CAF files have a "desc" chunk | 1 | int ParseCaffHeaderConfig (FILE *infile, char *infilename, char *fourcc, WavpackContext *wpc, WavpackConfig *config)
{
uint32_t chan_chunk = 0, channel_layout = 0, bcount;
unsigned char *channel_identities = NULL;
unsigned char *channel_reorder = NULL;
int64_t total_samples = 0, infilesize;
CAFFileH... | 118,572,273,366,970,060,000,000,000,000,000,000,000 | caff.c | 128,333,408,347,865,570,000,000,000,000,000,000,000 | [
"CWE-665"
] | CVE-2019-1010317 | WavPack 5.1.0 and earlier is affected by: CWE-457: Use of Uninitialized Variable. The impact is: Unexpected control flow, crashes, and segfaults. The component is: ParseCaffHeaderConfig (caff.c:486). The attack vector is: Maliciously crafted .wav file. The fixed version is: After commit https://github.com/dbry/WavPack/... | https://nvd.nist.gov/vuln/detail/CVE-2019-1010317 |
161,136 | WavPack | f68a9555b548306c5b1ee45199ccdc4a16a6101b | https://github.com/dbry/WavPack | https://github.com/dbry/WavPack/commit/f68a9555b548306c5b1ee45199ccdc4a16a6101b | issue #66: make sure CAF files have a "desc" chunk | 0 | int ParseCaffHeaderConfig (FILE *infile, char *infilename, char *fourcc, WavpackContext *wpc, WavpackConfig *config)
{
uint32_t chan_chunk = 0, desc_chunk = 0, channel_layout = 0, bcount;
unsigned char *channel_identities = NULL;
unsigned char *channel_reorder = NULL;
int64_t total_samples = 0, inf... | 245,375,542,166,030,040,000,000,000,000,000,000,000 | None | null | [
"CWE-665"
] | CVE-2019-1010317 | WavPack 5.1.0 and earlier is affected by: CWE-457: Use of Uninitialized Variable. The impact is: Unexpected control flow, crashes, and segfaults. The component is: ParseCaffHeaderConfig (caff.c:486). The attack vector is: Maliciously crafted .wav file. The fixed version is: After commit https://github.com/dbry/WavPack/... | https://nvd.nist.gov/vuln/detail/CVE-2019-1010317 |
10,784 | linux | a0ad220c96692eda76b2e3fd7279f3dcd1d8a8ff | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a0ad220c96692eda76b2e3fd7279f3dcd1d8a8ff | Input: ims-pcu - sanity check against missing interfaces
A malicious device missing interface can make the driver oops.
Add sanity checking.
Signed-off-by: Oliver Neukum <ONeukum@suse.com>
CC: stable@vger.kernel.org
Signed-off-by: Dmitry Torokhov <dmitry.torokhov@gmail.com> | 1 |
static int ims_pcu_parse_cdc_data(struct usb_interface *intf, struct ims_pcu *pcu)
{
const struct usb_cdc_union_desc *union_desc;
struct usb_host_interface *alt;
union_desc = ims_pcu_get_cdc_union_desc(intf);
if (!union_desc)
return -EINVAL;
pcu->ctrl_intf = usb_ifnum_to_if(pcu->udev,
union_desc->bMaste... | 77,222,324,192,872,990,000,000,000,000,000,000,000 | ims-pcu.c | 301,299,678,614,062,960,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2016-3689 | The ims_pcu_parse_cdc_data function in drivers/input/misc/ims-pcu.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (system crash) via a USB device without both a master and a slave interface. | https://nvd.nist.gov/vuln/detail/CVE-2016-3689 |
159,606 | linux | a0ad220c96692eda76b2e3fd7279f3dcd1d8a8ff | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/a0ad220c96692eda76b2e3fd7279f3dcd1d8a8ff | Input: ims-pcu - sanity check against missing interfaces
A malicious device missing interface can make the driver oops.
Add sanity checking.
Signed-off-by: Oliver Neukum <ONeukum@suse.com>
CC: stable@vger.kernel.org
Signed-off-by: Dmitry Torokhov <dmitry.torokhov@gmail.com> | 0 | static int ims_pcu_parse_cdc_data(struct usb_interface *intf, struct ims_pcu *pcu)
{
const struct usb_cdc_union_desc *union_desc;
struct usb_host_interface *alt;
union_desc = ims_pcu_get_cdc_union_desc(intf);
if (!union_desc)
return -EINVAL;
pcu->ctrl_intf = usb_ifnum_to_if(pcu->udev,
union_desc->bMas... | 292,958,888,267,487,130,000,000,000,000,000,000,000 | None | null | [
"CWE-703"
] | CVE-2016-3689 | The ims_pcu_parse_cdc_data function in drivers/input/misc/ims-pcu.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (system crash) via a USB device without both a master and a slave interface. | https://nvd.nist.gov/vuln/detail/CVE-2016-3689 |
10,785 | WavPack | 4bc05fc490b66ef2d45b1de26abf1455b486b0dc | https://github.com/dbry/WavPack | https://github.com/dbry/WavPack/commit/4bc05fc490b66ef2d45b1de26abf1455b486b0dc | fixes for 4 fuzz failures posted to SourceForge mailing list | 1 | static int read_new_config_info (WavpackContext *wpc, WavpackMetadata *wpmd)
{
int bytecnt = wpmd->byte_length;
unsigned char *byteptr = wpmd->data;
wpc->version_five = 1; // just having this block signals version 5.0
wpc->file_format = wpc->config.qmode = wpc->channel_layout = 0;
if (wpc->c... | 84,954,385,767,670,320,000,000,000,000,000,000,000 | open_utils.c | 316,363,060,510,470,100,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2016-10171 | The unreorder_channels function in cli/wvunpack.c in Wavpack before 5.1.0 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted WV file. | https://nvd.nist.gov/vuln/detail/CVE-2016-10171 |
160,449 | WavPack | 4bc05fc490b66ef2d45b1de26abf1455b486b0dc | https://github.com/dbry/WavPack | https://github.com/dbry/WavPack/commit/4bc05fc490b66ef2d45b1de26abf1455b486b0dc | fixes for 4 fuzz failures posted to SourceForge mailing list | 0 | static int read_new_config_info (WavpackContext *wpc, WavpackMetadata *wpmd)
{
int bytecnt = wpmd->byte_length;
unsigned char *byteptr = wpmd->data;
wpc->version_five = 1; // just having this block signals version 5.0
wpc->file_format = wpc->config.qmode = wpc->channel_layout = 0;
if (wpc->c... | 95,398,227,988,648,460,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2016-10171 | The unreorder_channels function in cli/wvunpack.c in Wavpack before 5.1.0 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted WV file. | https://nvd.nist.gov/vuln/detail/CVE-2016-10171 |
10,786 | WavPack | 4bc05fc490b66ef2d45b1de26abf1455b486b0dc | https://github.com/dbry/WavPack | https://github.com/dbry/WavPack/commit/4bc05fc490b66ef2d45b1de26abf1455b486b0dc | fixes for 4 fuzz failures posted to SourceForge mailing list | 1 | int32_t FASTCALL get_word (WavpackStream *wps, int chan, int32_t *correction)
{
register struct entropy_data *c = wps->w.c + chan;
uint32_t ones_count, low, mid, high;
int32_t value;
int sign;
if (!wps->wvbits.ptr)
return WORD_EOF;
if (correction)
*correction = 0;
if (!(wp... | 189,954,028,957,454,100,000,000,000,000,000,000,000 | read_words.c | 32,055,560,853,634,266,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2016-10171 | The unreorder_channels function in cli/wvunpack.c in Wavpack before 5.1.0 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted WV file. | https://nvd.nist.gov/vuln/detail/CVE-2016-10171 |
160,450 | WavPack | 4bc05fc490b66ef2d45b1de26abf1455b486b0dc | https://github.com/dbry/WavPack | https://github.com/dbry/WavPack/commit/4bc05fc490b66ef2d45b1de26abf1455b486b0dc | fixes for 4 fuzz failures posted to SourceForge mailing list | 0 | int32_t FASTCALL get_word (WavpackStream *wps, int chan, int32_t *correction)
{
register struct entropy_data *c = wps->w.c + chan;
uint32_t ones_count, low, mid, high;
int32_t value;
int sign;
if (!wps->wvbits.ptr)
return WORD_EOF;
if (correction)
*correction = 0;
if (!(wp... | 301,198,992,641,473,780,000,000,000,000,000,000,000 | read_words.c | 27,196,367,315,086,574,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2016-10171 | The unreorder_channels function in cli/wvunpack.c in Wavpack before 5.1.0 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted WV file. | https://nvd.nist.gov/vuln/detail/CVE-2016-10171 |
10,787 | qemu | b53dd4495ced2432a0b652ea895e651d07336f7e | https://github.com/bonzini/qemu | https://git.qemu.org/?p=qemu.git;a=commit;h=b53dd4495ced2432a0b652ea895e651d07336f7e | usb:xhci:fix memory leak in usb_xhci_exit
If the xhci uses msix, it doesn't free the corresponding
memory, thus leading a memory leak. This patch avoid this.
Signed-off-by: Li Qiang <liqiang6-s@360.cn>
Message-id: 57d7d2e0.d4301c0a.d13e9.9a55@mx.google.com
Signed-off-by: Gerd Hoffmann <kraxel@redhat.com> | 1 | static void usb_xhci_exit(PCIDevice *dev)
{
int i;
XHCIState *xhci = XHCI(dev);
trace_usb_xhci_exit();
for (i = 0; i < xhci->numslots; i++) {
xhci_disable_slot(xhci, i + 1);
}
if (xhci->mfwrap_timer) {
timer_del(xhci->mfwrap_timer);
timer_free(xhci->mfwrap_timer);
... | 261,890,516,668,008,700,000,000,000,000,000,000,000 | hcd-xhci.c | 300,866,919,474,701,800,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2016-7466 | Memory leak in the usb_xhci_exit function in hw/usb/hcd-xhci.c in QEMU (aka Quick Emulator), when the xhci uses msix, allows local guest OS administrators to cause a denial of service (memory consumption and possibly QEMU process crash) by repeatedly unplugging a USB device. | https://nvd.nist.gov/vuln/detail/CVE-2016-7466 |
194,661 | qemu | b53dd4495ced2432a0b652ea895e651d07336f7e | https://github.com/bonzini/qemu | https://git.qemu.org/?p=qemu.git;a=commit;h=b53dd4495ced2432a0b652ea895e651d07336f7e | usb:xhci:fix memory leak in usb_xhci_exit
If the xhci uses msix, it doesn't free the corresponding
memory, thus leading a memory leak. This patch avoid this.
Signed-off-by: Li Qiang <liqiang6-s@360.cn>
Message-id: 57d7d2e0.d4301c0a.d13e9.9a55@mx.google.com
Signed-off-by: Gerd Hoffmann <kraxel@redhat.com> | 0 | static void usb_xhci_exit(PCIDevice *dev)
{
int i;
XHCIState *xhci = XHCI(dev);
trace_usb_xhci_exit();
for (i = 0; i < xhci->numslots; i++) {
xhci_disable_slot(xhci, i + 1);
}
if (xhci->mfwrap_timer) {
timer_del(xhci->mfwrap_timer);
timer_free(xhci->mfwrap_timer);
... | 235,326,587,837,571,600,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2016-7466 | Memory leak in the usb_xhci_exit function in hw/usb/hcd-xhci.c in QEMU (aka Quick Emulator), when the xhci uses msix, allows local guest OS administrators to cause a denial of service (memory consumption and possibly QEMU process crash) by repeatedly unplugging a USB device. | https://nvd.nist.gov/vuln/detail/CVE-2016-7466 |
10,788 | libpcap | 617b12c0339db4891d117b661982126c495439ea | https://github.com/the-tcpdump-group/libpcap | https://github.com/the-tcpdump-group/libpcap/commit/617b12c0339db4891d117b661982126c495439ea | Calculate the reply payload length in a local variable.
Using the same variable for the remaining request length and the reply
length is confusing at best and can cause errors at worst (if the
request had extra stuff at the end, so that the variable is non-zero).
This addresses Include Security issue I8: [libpcap] Re... | 1 | daemon_msg_findallif_req(uint8 ver, struct daemon_slpars *pars, uint32 plen)
{
char errbuf[PCAP_ERRBUF_SIZE]; // buffer for network errors
char errmsgbuf[PCAP_ERRBUF_SIZE]; // buffer for errors to send to the client
char sendbuf[RPCAP_NETBUF_SIZE]; // temporary buffer in which data to be sent is buffered
int sendb... | 300,816,215,695,720,580,000,000,000,000,000,000,000 | daemon.c | 30,742,645,121,715,390,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2019-15161 | rpcapd/daemon.c in libpcap before 1.9.1 mishandles certain length values because of reuse of a variable. This may open up an attack vector involving extra data at the end of a request. | https://nvd.nist.gov/vuln/detail/CVE-2019-15161 |
161,191 | libpcap | 617b12c0339db4891d117b661982126c495439ea | https://github.com/the-tcpdump-group/libpcap | https://github.com/the-tcpdump-group/libpcap/commit/617b12c0339db4891d117b661982126c495439ea | Calculate the reply payload length in a local variable.
Using the same variable for the remaining request length and the reply
length is confusing at best and can cause errors at worst (if the
request had extra stuff at the end, so that the variable is non-zero).
This addresses Include Security issue I8: [libpcap] Re... | 0 | daemon_msg_findallif_req(uint8 ver, struct daemon_slpars *pars, uint32 plen)
{
char errbuf[PCAP_ERRBUF_SIZE]; // buffer for network errors
char errmsgbuf[PCAP_ERRBUF_SIZE]; // buffer for errors to send to the client
char sendbuf[RPCAP_NETBUF_SIZE]; // temporary buffer in which data to be sent is buffered
int sendb... | 109,267,409,105,655,520,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2019-15161 | rpcapd/daemon.c in libpcap before 1.9.1 mishandles certain length values because of reuse of a variable. This may open up an attack vector involving extra data at the end of a request. | https://nvd.nist.gov/vuln/detail/CVE-2019-15161 |
10,789 | qemu | 4ffcdef4277a91af15a3c09f7d16af072c29f3f2 | https://github.com/bonzini/qemu | http://git.qemu.org/?p=qemu.git;a=commit;h=4ffcdef4277a91af15a3c09f7d16af072c29f3f2 | 9pfs: xattr: fix memory leak in v9fs_list_xattr
Free 'orig_value' in error path.
Signed-off-by: Li Qiang <liqiang6-s@360.cn>
Signed-off-by: Greg Kurz <groug@kaod.org> | 1 | ssize_t v9fs_list_xattr(FsContext *ctx, const char *path,
void *value, size_t vsize)
{
ssize_t size = 0;
void *ovalue = value;
XattrOperations *xops;
char *orig_value, *orig_value_start;
ssize_t xattr_len, parsed_len = 0, attr_len;
char *dirpath, *name;
int dirfd;
... | 296,947,472,346,732,770,000,000,000,000,000,000,000 | 9p-xattr.c | 228,116,327,888,906,060,000,000,000,000,000,000,000 | [
"CWE-772"
] | CVE-2017-8086 | Memory leak in the v9fs_list_xattr function in hw/9pfs/9p-xattr.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (memory consumption) via vectors involving the orig_value variable. | https://nvd.nist.gov/vuln/detail/CVE-2017-8086 |
194,643 | qemu | 4ffcdef4277a91af15a3c09f7d16af072c29f3f2 | https://github.com/bonzini/qemu | http://git.qemu.org/?p=qemu.git;a=commit;h=4ffcdef4277a91af15a3c09f7d16af072c29f3f2 | 9pfs: xattr: fix memory leak in v9fs_list_xattr
Free 'orig_value' in error path.
Signed-off-by: Li Qiang <liqiang6-s@360.cn>
Signed-off-by: Greg Kurz <groug@kaod.org> | 0 | ssize_t v9fs_list_xattr(FsContext *ctx, const char *path,
void *value, size_t vsize)
{
ssize_t size = 0;
void *ovalue = value;
XattrOperations *xops;
char *orig_value, *orig_value_start;
ssize_t xattr_len, parsed_len = 0, attr_len;
char *dirpath, *name;
int dirfd;
... | 273,917,095,759,747,800,000,000,000,000,000,000,000 | None | null | [
"CWE-772"
] | CVE-2017-8086 | Memory leak in the v9fs_list_xattr function in hw/9pfs/9p-xattr.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (memory consumption) via vectors involving the orig_value variable. | https://nvd.nist.gov/vuln/detail/CVE-2017-8086 |
10,790 | libav | ce7aee9b733134649a6ce2fa743e51733f33e67e | https://github.com/libav/libav | https://git.libav.org/?p=libav.git;a=commit;h=ce7aee9b733134649a6ce2fa743e51733f33e67e | dpcm: ignore extra unpaired bytes in stereo streams.
Fixes: CVE-2011-3951
Found-by: Mateusz "j00ru" Jurczyk and Gynvael Coldwind | 1 | static int dpcm_decode_frame(AVCodecContext *avctx, void *data,
int *got_frame_ptr, AVPacket *avpkt)
{
const uint8_t *buf = avpkt->data;
int buf_size = avpkt->size;
const uint8_t *buf_end = buf + buf_size;
DPCMContext *s = avctx->priv_data;
int out = 0, ret;
int pred... | 37,165,043,090,743,030,000,000,000,000,000,000,000 | dpcm.c | 233,708,027,832,503,570,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3951 | The dpcm_decode_frame function in dpcm.c in libavcodec in FFmpeg before 0.10 and in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.6, and 0.8.x before 0.8.1 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted stereo stream in a media... | https://nvd.nist.gov/vuln/detail/CVE-2011-3951 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.