idx
int64
project
string
commit_id
string
project_url
string
commit_url
string
commit_message
string
target
int64
func
string
func_hash
float64
file_name
string
file_hash
float64
cwe
list
cve
string
cve_desc
string
nvd_url
string
158,269
libav
ce7aee9b733134649a6ce2fa743e51733f33e67e
https://github.com/libav/libav
https://git.libav.org/?p=libav.git;a=commit;h=ce7aee9b733134649a6ce2fa743e51733f33e67e
dpcm: ignore extra unpaired bytes in stereo streams. Fixes: CVE-2011-3951 Found-by: Mateusz "j00ru" Jurczyk and Gynvael Coldwind
0
static int dpcm_decode_frame(AVCodecContext *avctx, void *data, int *got_frame_ptr, AVPacket *avpkt) { const uint8_t *buf = avpkt->data; int buf_size = avpkt->size; const uint8_t *buf_end = buf + buf_size; DPCMContext *s = avctx->priv_data; int out = 0, ret; int pred...
57,234,322,071,102,895,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2011-3951
The dpcm_decode_frame function in dpcm.c in libavcodec in FFmpeg before 0.10 and in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.6, and 0.8.x before 0.8.1 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted stereo stream in a media...
https://nvd.nist.gov/vuln/detail/CVE-2011-3951
10,791
linux
ea04efee7635c9120d015dcdeeeb6988130cb67a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ea04efee7635c9120d015dcdeeeb6988130cb67a
Input: ims-psu - check if CDC union descriptor is sane Before trying to use CDC union descriptor, try to validate whether that it is sane by checking that intf->altsetting->extra is big enough and that descriptor bLength is not too big and not too small. Reported-by: Andrey Konovalov <andreyknvl@google.com> Signed-of...
1
static const struct usb_cdc_union_desc * ims_pcu_get_cdc_union_desc(struct usb_interface *intf) { const void *buf = intf->altsetting->extra; size_t buflen = intf->altsetting->extralen; struct usb_cdc_union_desc *union_desc; if (!buf) { dev_err(&intf->dev, "Missing descriptor data\n"); return NULL; } if (!bu...
205,163,903,394,648,750,000,000,000,000,000,000,000
ims-pcu.c
276,473,746,066,141,500,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-16645
The ims_pcu_get_cdc_union_desc function in drivers/input/misc/ims-pcu.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (ims_pcu_parse_cdc_data out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device.
https://nvd.nist.gov/vuln/detail/CVE-2017-16645
159,866
linux
ea04efee7635c9120d015dcdeeeb6988130cb67a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ea04efee7635c9120d015dcdeeeb6988130cb67a
Input: ims-psu - check if CDC union descriptor is sane Before trying to use CDC union descriptor, try to validate whether that it is sane by checking that intf->altsetting->extra is big enough and that descriptor bLength is not too big and not too small. Reported-by: Andrey Konovalov <andreyknvl@google.com> Signed-of...
0
ims_pcu_get_cdc_union_desc(struct usb_interface *intf) { const void *buf = intf->altsetting->extra; size_t buflen = intf->altsetting->extralen; struct usb_cdc_union_desc *union_desc; if (!buf) { dev_err(&intf->dev, "Missing descriptor data\n"); return NULL; } if (!buflen) { dev_err(&intf->dev, "Zero lengt...
303,870,268,898,100,700,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2017-16645
The ims_pcu_get_cdc_union_desc function in drivers/input/misc/ims-pcu.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (ims_pcu_parse_cdc_data out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device.
https://nvd.nist.gov/vuln/detail/CVE-2017-16645
10,792
gstreamer
566583e87147f774e7fc4c78b5f7e61d427e40a9
https://github.com/GStreamer/gstreamer
https://cgit.freedesktop.org/gstreamer/gst-plugins-base/commit/?id=566583e87147f774e7fc4c78b5f7e61d427e40a9
vorbistag: Protect memory allocation calculation from overflow. Patch by: Tomas Hoger <thoger@redhat.com> Fixes CVE-2009-0586
1
gst_vorbis_tag_add_coverart (GstTagList * tags, const gchar * img_data_base64, gint base64_len) { GstBuffer *img; guchar *img_data; gsize img_len; guint save = 0; gint state = 0; if (base64_len < 2) goto not_enough_data; img_data = g_try_malloc0 (base64_len * 3 / 4); if (img_data == NULL) ...
146,313,219,496,584,400,000,000,000,000,000,000,000
gstvorbistag.c
211,094,231,011,375,400,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2009-0586
Integer overflow in the gst_vorbis_tag_add_coverart function (gst-libs/gst/tag/gstvorbistag.c) in vorbistag in gst-plugins-base (aka gstreamer-plugins-base) before 0.10.23 in GStreamer allows context-dependent attackers to execute arbitrary code via a crafted COVERART tag that is converted from a base64 representation,...
https://nvd.nist.gov/vuln/detail/CVE-2009-0586
194,617
gstreamer
566583e87147f774e7fc4c78b5f7e61d427e40a9
https://github.com/GStreamer/gstreamer
https://cgit.freedesktop.org/gstreamer/gst-plugins-base/commit/?id=566583e87147f774e7fc4c78b5f7e61d427e40a9
vorbistag: Protect memory allocation calculation from overflow. Patch by: Tomas Hoger <thoger@redhat.com> Fixes CVE-2009-0586
0
gst_vorbis_tag_add_coverart (GstTagList * tags, const gchar * img_data_base64, gst_vorbis_tag_add_coverart (GstTagList * tags, gchar * img_data_base64, gint base64_len) { GstBuffer *img; gsize img_len; guchar *out; guint save = 0; gint state = 0; if (base64_len < 2) goto not_enough_data; ...
289,066,988,325,537,200,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2009-0586
Integer overflow in the gst_vorbis_tag_add_coverart function (gst-libs/gst/tag/gstvorbistag.c) in vorbistag in gst-plugins-base (aka gstreamer-plugins-base) before 0.10.23 in GStreamer allows context-dependent attackers to execute arbitrary code via a crafted COVERART tag that is converted from a base64 representation,...
https://nvd.nist.gov/vuln/detail/CVE-2009-0586
10,793
qemu
070c4b92b8cd5390889716677a0b92444d6e087a
https://github.com/bonzini/qemu
https://git.qemu.org/?p=qemu.git;a=commit;h=070c4b92b8cd5390889716677a0b92444d6e087a
net: mcf: limit buffer descriptor count ColdFire Fast Ethernet Controller uses buffer descriptors to manage data flow to/fro receive & transmit queues. While transmitting packets, it could continue to read buffer descriptors if a buffer descriptor has length of zero and has crafted values in bd.flags. Set upper limit ...
1
static void mcf_fec_do_tx(mcf_fec_state *s) { uint32_t addr; mcf_fec_bd bd; int frame_size; int len; uint8_t frame[FEC_MAX_FRAME_SIZE]; uint8_t *ptr; DPRINTF("do_tx\n"); ptr = frame; frame_size = 0; addr = s->tx_descriptor; while (1) { mcf_fec_read_bd(&bd, addr); ...
39,214,142,760,099,140,000,000,000,000,000,000,000
mcf_fec.c
198,260,955,982,896,700,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2016-7908
The mcf_fec_do_tx function in hw/net/mcf_fec.c in QEMU (aka Quick Emulator) does not properly limit the buffer descriptor count when transmitting packets, which allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via vectors involving a buffer descriptor with a lengt...
https://nvd.nist.gov/vuln/detail/CVE-2016-7908
194,660
qemu
070c4b92b8cd5390889716677a0b92444d6e087a
https://github.com/bonzini/qemu
https://git.qemu.org/?p=qemu.git;a=commit;h=070c4b92b8cd5390889716677a0b92444d6e087a
net: mcf: limit buffer descriptor count ColdFire Fast Ethernet Controller uses buffer descriptors to manage data flow to/fro receive & transmit queues. While transmitting packets, it could continue to read buffer descriptors if a buffer descriptor has length of zero and has crafted values in bd.flags. Set upper limit ...
0
static void mcf_fec_do_tx(mcf_fec_state *s) { uint32_t addr; uint32_t addr; mcf_fec_bd bd; int frame_size; int len, descnt = 0; uint8_t frame[FEC_MAX_FRAME_SIZE]; uint8_t *ptr; ptr = frame; ptr = frame; frame_size = 0; addr = s->tx_descriptor; while (descnt++ < ...
215,806,353,963,416,540,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2016-7908
The mcf_fec_do_tx function in hw/net/mcf_fec.c in QEMU (aka Quick Emulator) does not properly limit the buffer descriptor count when transmitting packets, which allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via vectors involving a buffer descriptor with a lengt...
https://nvd.nist.gov/vuln/detail/CVE-2016-7908
10,794
xserver
5725849a1b427cd4a72b84e57f211edb35838718
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/render/render.c?id=5725849a1b427cd4a72b84e57f211edb35838718
render: Bounds check for nglyphs in ProcRenderAddGlyphs (#28801) Signed-off-by: Adam Jackson <ajax@redhat.com> Reviewed-by: Julien Cristau <jcristau@debian.org> Signed-off-by: Keith Packard <keithp@keithp.com>
1
ProcRenderAddGlyphs (ClientPtr client) { GlyphSetPtr glyphSet; REQUEST(xRenderAddGlyphsReq); GlyphNewRec glyphsLocal[NLOCALGLYPH]; GlyphNewPtr glyphsBase, glyphs, glyph_new; int remain, nglyphs; CARD32 *gids; xGlyphInfo *gi; CARD8 *bits; unsigned int s...
1,204,159,738,485,995,000,000,000,000,000,000,000
render.c
107,649,397,098,920,510,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2010-4819
The ProcRenderAddGlyphs function in the Render extension (render/render.c) in X.Org xserver 1.7.7 and earlier allows local users to read arbitrary memory and possibly cause a denial of service (server crash) via unspecified vectors related to an "input sanitization flaw."
https://nvd.nist.gov/vuln/detail/CVE-2010-4819
158,288
xserver
5725849a1b427cd4a72b84e57f211edb35838718
http://gitweb.freedesktop.org/?p=xorg/xserver
https://cgit.freedesktop.org/xorg/xserver/commit/render/render.c?id=5725849a1b427cd4a72b84e57f211edb35838718
render: Bounds check for nglyphs in ProcRenderAddGlyphs (#28801) Signed-off-by: Adam Jackson <ajax@redhat.com> Reviewed-by: Julien Cristau <jcristau@debian.org> Signed-off-by: Keith Packard <keithp@keithp.com>
0
ProcRenderAddGlyphs (ClientPtr client) { GlyphSetPtr glyphSet; REQUEST(xRenderAddGlyphsReq); GlyphNewRec glyphsLocal[NLOCALGLYPH]; GlyphNewPtr glyphsBase, glyphs, glyph_new; int remain, nglyphs; CARD32 *gids; xGlyphInfo *gi; CARD8 *bits; unsigned int s...
89,505,534,230,672,750,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2010-4819
The ProcRenderAddGlyphs function in the Render extension (render/render.c) in X.Org xserver 1.7.7 and earlier allows local users to read arbitrary memory and possibly cause a denial of service (server crash) via unspecified vectors related to an "input sanitization flaw."
https://nvd.nist.gov/vuln/detail/CVE-2010-4819
10,795
FFmpeg
2080bc33717955a0e4268e738acf8c1eeddbf8cb
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/2080bc33717955a0e4268e738acf8c1eeddbf8cb
avcodec/utils: correct align value for interplay Fixes out of array access Fixes: 452/fuzz-1-ffmpeg_VIDEO_AV_CODEC_ID_INTERPLAY_VIDEO_fuzzer Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/targets/ffmpeg Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
1
void avcodec_align_dimensions2(AVCodecContext *s, int *width, int *height, int linesize_align[AV_NUM_DATA_POINTERS]) { int i; int w_align = 1; int h_align = 1; AVPixFmtDescriptor const *desc = av_pix_fmt_desc_get(s->pix_fmt); if (desc) { w_align = 1 << desc->l...
327,181,451,425,415,020,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2017-7865
FFmpeg before 2017-01-24 has an out-of-bounds write caused by a heap-based buffer overflow related to the ipvideo_decode_block_opcode_0xA function in libavcodec/interplayvideo.c and the avcodec_align_dimensions2 function in libavcodec/utils.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-7865
184,550
FFmpeg
2080bc33717955a0e4268e738acf8c1eeddbf8cb
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/2080bc33717955a0e4268e738acf8c1eeddbf8cb
avcodec/utils: correct align value for interplay Fixes out of array access Fixes: 452/fuzz-1-ffmpeg_VIDEO_AV_CODEC_ID_INTERPLAY_VIDEO_fuzzer Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/targets/ffmpeg Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
0
void avcodec_align_dimensions2(AVCodecContext *s, int *width, int *height, int linesize_align[AV_NUM_DATA_POINTERS]) { int i; int w_align = 1; int h_align = 1; AVPixFmtDescriptor const *desc = av_pix_fmt_desc_get(s->pix_fmt); if (desc) { w_align = 1 << desc->l...
310,931,639,873,074,100,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2017-7865
FFmpeg before 2017-01-24 has an out-of-bounds write caused by a heap-based buffer overflow related to the ipvideo_decode_block_opcode_0xA function in libavcodec/interplayvideo.c and the avcodec_align_dimensions2 function in libavcodec/utils.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-7865
10,796
radare2
9b46d38dd3c4de6048a488b655c7319f845af185
https://github.com/radare/radare2
https://github.com/radare/radare2/commit/9b46d38dd3c4de6048a488b655c7319f845af185
Fix #12372 and #12373 - Crash in x86 assembler (#12380) 0 ,0,[bP-bL-bP-bL-bL-r-bL-bP-bL-bL- mov ,0,[ax+Bx-ax+Bx-ax+ax+Bx-ax+Bx-- leA ,0,[bP-bL-bL-bP-bL-bP-bL-60@bL- leA ,0,[bP-bL-r-bP-bL-bP-bL-60@bL- mov ,0,[ax+Bx-ax+Bx-ax+ax+Bx-ax+Bx--
1
static int parseOperand(RAsm *a, const char *str, Operand *op, bool isrepop) { size_t pos, nextpos = 0; x86newTokenType last_type; int size_token = 1; bool explicit_size = false; int reg_index = 0; // Reset type op->type = 0; // Consume tokens denoting the operand size while (size_token) { pos = nextpos; l...
6,131,296,079,931,054,000,000,000,000,000,000,000
asm_x86_nz.c
152,405,387,834,847,820,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-20456
In radare2 prior to 3.1.1, the parseOperand function inside libr/asm/p/asm_x86_nz.c may allow attackers to cause a denial of service (application crash in libr/util/strbuf.c via a stack-based buffer over-read) by crafting an input file, a related issue to CVE-2018-20455.
https://nvd.nist.gov/vuln/detail/CVE-2018-20456
160,768
radare2
9b46d38dd3c4de6048a488b655c7319f845af185
https://github.com/radare/radare2
https://github.com/radare/radare2/commit/9b46d38dd3c4de6048a488b655c7319f845af185
Fix #12372 and #12373 - Crash in x86 assembler (#12380) 0 ,0,[bP-bL-bP-bL-bL-r-bL-bP-bL-bL- mov ,0,[ax+Bx-ax+Bx-ax+ax+Bx-ax+Bx-- leA ,0,[bP-bL-bL-bP-bL-bP-bL-60@bL- leA ,0,[bP-bL-r-bP-bL-bP-bL-60@bL- mov ,0,[ax+Bx-ax+Bx-ax+ax+Bx-ax+Bx--
0
static int parseOperand(RAsm *a, const char *str, Operand *op, bool isrepop) { size_t pos, nextpos = 0; x86newTokenType last_type; int size_token = 1; bool explicit_size = false; int reg_index = 0; op->type = 0; while (size_token) { pos = nextpos; last_type = getToken (str, &pos, &nextpos); if (!r_str_nca...
132,046,508,120,228,700,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2018-20456
In radare2 prior to 3.1.1, the parseOperand function inside libr/asm/p/asm_x86_nz.c may allow attackers to cause a denial of service (application crash in libr/util/strbuf.c via a stack-based buffer over-read) by crafting an input file, a related issue to CVE-2018-20455.
https://nvd.nist.gov/vuln/detail/CVE-2018-20456
10,799
qemu
1e7aed70144b4673fc26e73062064b6724795e5f
https://github.com/bonzini/qemu
https://git.qemu.org/?p=qemu.git;a=commit;h=1e7aed70144b4673fc26e73062064b6724795e5f
virtio: check vring descriptor buffer length virtio back end uses set of buffers to facilitate I/O operations. An infinite loop unfolds in virtqueue_pop() if a buffer was of zero size. Add check to avoid it. Reported-by: Li Qiang <liqiang6-s@360.cn> Signed-off-by: Prasad J Pandit <pjp@fedoraproject.org> Reviewed-by: ...
1
static void virtqueue_map_desc(unsigned int *p_num_sg, hwaddr *addr, struct iovec *iov, unsigned int max_num_sg, bool is_write, hwaddr pa, size_t sz) { unsigned num_sg = *p_num_sg; assert(num_sg <= max_num_sg); while (sz) { hwaddr len = ...
36,317,471,279,521,866,000,000,000,000,000,000,000
virtio.c
321,252,410,795,560,630,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2016-6490
The virtqueue_map_desc function in hw/virtio/virtio.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a zero length for the descriptor buffer.
https://nvd.nist.gov/vuln/detail/CVE-2016-6490
194,676
qemu
1e7aed70144b4673fc26e73062064b6724795e5f
https://github.com/bonzini/qemu
https://git.qemu.org/?p=qemu.git;a=commit;h=1e7aed70144b4673fc26e73062064b6724795e5f
virtio: check vring descriptor buffer length virtio back end uses set of buffers to facilitate I/O operations. An infinite loop unfolds in virtqueue_pop() if a buffer was of zero size. Add check to avoid it. Reported-by: Li Qiang <liqiang6-s@360.cn> Signed-off-by: Prasad J Pandit <pjp@fedoraproject.org> Reviewed-by: ...
0
static void virtqueue_map_desc(unsigned int *p_num_sg, hwaddr *addr, struct iovec *iov, unsigned int max_num_sg, bool is_write, hwaddr pa, size_t sz) { unsigned num_sg = *p_num_sg; assert(num_sg <= max_num_sg); if (!sz) { error_report...
56,827,352,078,113,410,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2016-6490
The virtqueue_map_desc function in hw/virtio/virtio.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a zero length for the descriptor buffer.
https://nvd.nist.gov/vuln/detail/CVE-2016-6490
10,801
php-src
b101a6bbd4f2181c360bd38e7683df4a03cba83e
https://github.com/php/php-src
https://github.com/php/php-src/commit/b101a6bbd4f2181c360bd38e7683df4a03cba83e
Use format string
1
static void zend_throw_or_error(int fetch_type, zend_class_entry *exception_ce, const char *format, ...) /* {{{ */ { va_list va; char *message = NULL; va_start(va, format); zend_vspprintf(&message, 0, format, va); if (fetch_type & ZEND_FETCH_CLASS_EXCEPTION) { zend_throw_error(exception_ce, message); } else {...
274,261,182,855,572,440,000,000,000,000,000,000,000
None
null
[ "CWE-134" ]
CVE-2015-8617
Format string vulnerability in the zend_throw_or_error function in Zend/zend_execute_API.c in PHP 7.x before 7.0.1 allows remote attackers to execute arbitrary code via format string specifiers in a string that is misused as a class name, leading to incorrect error handling.
https://nvd.nist.gov/vuln/detail/CVE-2015-8617
184,499
php-src
b101a6bbd4f2181c360bd38e7683df4a03cba83e
https://github.com/php/php-src
https://github.com/php/php-src/commit/b101a6bbd4f2181c360bd38e7683df4a03cba83e
Use format string
0
static void zend_throw_or_error(int fetch_type, zend_class_entry *exception_ce, const char *format, ...) /* {{{ */ { va_list va; char *message = NULL; va_start(va, format); zend_vspprintf(&message, 0, format, va); if (fetch_type & ZEND_FETCH_CLASS_EXCEPTION) { zend_throw_error(exception_ce, "%s", message); ...
36,016,106,509,863,040,000,000,000,000,000,000,000
None
null
[ "CWE-134" ]
CVE-2015-8617
Format string vulnerability in the zend_throw_or_error function in Zend/zend_execute_API.c in PHP 7.x before 7.0.1 allows remote attackers to execute arbitrary code via format string specifiers in a string that is misused as a class name, leading to incorrect error handling.
https://nvd.nist.gov/vuln/detail/CVE-2015-8617
10,802
gnupg
014b2103fcb12f261135e3954f26e9e07b39e342
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=014b2103fcb12f261135e3954f26e9e07b39e342
gpg: Avoid infinite loop in uncompressing garbled packets. * g10/compress.c (do_uncompress): Limit the number of extra FF bytes. -- A packet like (a3 01 5b ff) leads to an infinite loop. Using --max-output won't help if it is a partial packet. This patch actually fixes a regression introduced on 1999-05-31 (c34c676...
1
do_uncompress( compress_filter_context_t *zfx, z_stream *zs, IOBUF a, size_t *ret_len ) { int zrc; int rc=0; size_t n; int nread, count; int refill = !zs->avail_in; if( DBG_FILTER ) log_debug("begin inflate: avail_in=%u, avail_out=%u, inbuf=%u\n", (unsigned)zs->avail_in, (unsigned)zs...
87,629,636,256,725,120,000,000,000,000,000,000,000
compress.c
329,533,514,336,488,180,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2014-4617
The do_uncompress function in g10/compress.c in GnuPG 1.x before 1.4.17 and 2.x before 2.0.24 allows context-dependent attackers to cause a denial of service (infinite loop) via malformed compressed packets, as demonstrated by an a3 01 5b ff byte sequence.
https://nvd.nist.gov/vuln/detail/CVE-2014-4617
158,145
gnupg
014b2103fcb12f261135e3954f26e9e07b39e342
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=014b2103fcb12f261135e3954f26e9e07b39e342
gpg: Avoid infinite loop in uncompressing garbled packets. * g10/compress.c (do_uncompress): Limit the number of extra FF bytes. -- A packet like (a3 01 5b ff) leads to an infinite loop. Using --max-output won't help if it is a partial packet. This patch actually fixes a regression introduced on 1999-05-31 (c34c676...
0
do_uncompress( compress_filter_context_t *zfx, z_stream *zs, IOBUF a, size_t *ret_len ) { int zrc; int rc = 0; int leave = 0; size_t n; int nread, count; int refill = !zs->avail_in; if( DBG_FILTER ) log_debug("begin inflate: avail_in=%u, avail_out=%u, inbuf=%u\n", (uns...
75,679,412,549,268,460,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2014-4617
The do_uncompress function in g10/compress.c in GnuPG 1.x before 1.4.17 and 2.x before 2.0.24 allows context-dependent attackers to cause a denial of service (infinite loop) via malformed compressed packets, as demonstrated by an a3 01 5b ff byte sequence.
https://nvd.nist.gov/vuln/detail/CVE-2014-4617
10,809
FFmpeg
296debd213bd6dce7647cedd34eb64e5b94cdc92
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/296debd213bd6dce7647cedd34eb64e5b94cdc92
avcodec/dnxhddec: Move mb height check out of non hr branch Fixes: out of array access Fixes: poc.dnxhd Found-by: Bingchang, Liu@VARAS of IIE Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
1
static int dnxhd_decode_header(DNXHDContext *ctx, AVFrame *frame, const uint8_t *buf, int buf_size, int first_field) { int i, cid, ret; int old_bit_depth = ctx->bit_depth, bitdepth; uint64_t header_prefix; if (buf_size < 0x280) { av_l...
177,963,056,591,493,700,000,000,000,000,000,000,000
dnxhddec.c
101,910,416,377,302,030,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-11719
The dnxhd_decode_header function in libavcodec/dnxhddec.c in FFmpeg 3.0 through 3.3.2 allows remote attackers to cause a denial of service (out-of-array access) or possibly have unspecified other impact via a crafted DNxHD file.
https://nvd.nist.gov/vuln/detail/CVE-2017-11719
160,068
FFmpeg
296debd213bd6dce7647cedd34eb64e5b94cdc92
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/296debd213bd6dce7647cedd34eb64e5b94cdc92
avcodec/dnxhddec: Move mb height check out of non hr branch Fixes: out of array access Fixes: poc.dnxhd Found-by: Bingchang, Liu@VARAS of IIE Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
0
static int dnxhd_decode_header(DNXHDContext *ctx, AVFrame *frame, const uint8_t *buf, int buf_size, int first_field) { int i, cid, ret; int old_bit_depth = ctx->bit_depth, bitdepth; uint64_t header_prefix; if (buf_size < 0x280) { av_l...
279,336,364,580,698,970,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2017-11719
The dnxhd_decode_header function in libavcodec/dnxhddec.c in FFmpeg 3.0 through 3.3.2 allows remote attackers to cause a denial of service (out-of-array access) or possibly have unspecified other impact via a crafted DNxHD file.
https://nvd.nist.gov/vuln/detail/CVE-2017-11719
10,810
FFmpeg
6b67d7f05918f7a1ee8fc6ff21355d7e8736aa10
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/6b67d7f05918f7a1ee8fc6ff21355d7e8736aa10
avformat/flvenc: Check audio packet size Fixes: Assertion failure Fixes: assert_flvenc.c:941_1.swf Found-by: #CHEN HONGXU# <HCHEN017@e.ntu.edu.sg> Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
1
static int flv_write_packet(AVFormatContext *s, AVPacket *pkt) { AVIOContext *pb = s->pb; AVCodecParameters *par = s->streams[pkt->stream_index]->codecpar; FLVContext *flv = s->priv_data; FLVStreamContext *sc = s->streams[pkt->stream_index]->priv_data; unsigned ts; int size = pkt->size...
322,148,846,991,142,300,000,000,000,000,000,000,000
None
null
[ "CWE-617" ]
CVE-2018-15822
The flv_write_packet function in libavformat/flvenc.c in FFmpeg through 2.8 does not check for an empty audio packet, leading to an assertion failure.
https://nvd.nist.gov/vuln/detail/CVE-2018-15822
160,879
FFmpeg
6b67d7f05918f7a1ee8fc6ff21355d7e8736aa10
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/6b67d7f05918f7a1ee8fc6ff21355d7e8736aa10
avformat/flvenc: Check audio packet size Fixes: Assertion failure Fixes: assert_flvenc.c:941_1.swf Found-by: #CHEN HONGXU# <HCHEN017@e.ntu.edu.sg> Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
0
static int flv_write_packet(AVFormatContext *s, AVPacket *pkt) { AVIOContext *pb = s->pb; AVCodecParameters *par = s->streams[pkt->stream_index]->codecpar; FLVContext *flv = s->priv_data; FLVStreamContext *sc = s->streams[pkt->stream_index]->priv_data; unsigned ts; int size = pkt->size...
38,285,238,960,025,090,000,000,000,000,000,000,000
None
null
[ "CWE-617" ]
CVE-2018-15822
The flv_write_packet function in libavformat/flvenc.c in FFmpeg through 2.8 does not check for an empty audio packet, leading to an assertion failure.
https://nvd.nist.gov/vuln/detail/CVE-2018-15822
10,811
FFmpeg
29ffeef5e73b8f41ff3a3f2242d356759c66f91f
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/29ffeef5e73b8f41ff3a3f2242d356759c66f91f
avcodec/h264: do not trust last_pic_droppable when marking pictures as done This simplifies the code and fixes a deadlock Fixes Ticket2927 Signed-off-by: Michael Niedermayer <michaelni@gmx.at>
1
static int decode_slice_header(H264Context *h, H264Context *h0) { unsigned int first_mb_in_slice; unsigned int pps_id; int ret; unsigned int slice_type, tmp, i, j; int last_pic_structure, last_pic_droppable; int must_reinit; int needs_reinit = 0; int field_pic_flag, bottom_field_flag; ...
236,248,743,148,359,600,000,000,000,000,000,000,000
h264.c
324,658,081,924,643,700,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2013-7008
The decode_slice_header function in libavcodec/h264.c in FFmpeg before 2.1 incorrectly relies on a certain droppable field, which allows remote attackers to cause a denial of service (deadlock) or possibly have unspecified other impact via crafted H.264 data.
https://nvd.nist.gov/vuln/detail/CVE-2013-7008
158,738
FFmpeg
29ffeef5e73b8f41ff3a3f2242d356759c66f91f
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/29ffeef5e73b8f41ff3a3f2242d356759c66f91f
avcodec/h264: do not trust last_pic_droppable when marking pictures as done This simplifies the code and fixes a deadlock Fixes Ticket2927 Signed-off-by: Michael Niedermayer <michaelni@gmx.at>
0
static int decode_slice_header(H264Context *h, H264Context *h0) { unsigned int first_mb_in_slice; unsigned int pps_id; int ret; unsigned int slice_type, tmp, i, j; int last_pic_structure, last_pic_droppable; int must_reinit; int needs_reinit = 0; int field_pic_flag, bottom_field_flag; ...
10,723,853,863,872,625,000,000,000,000,000,000,000
None
null
[ "CWE-703" ]
CVE-2013-7008
The decode_slice_header function in libavcodec/h264.c in FFmpeg before 2.1 incorrectly relies on a certain droppable field, which allows remote attackers to cause a denial of service (deadlock) or possibly have unspecified other impact via crafted H.264 data.
https://nvd.nist.gov/vuln/detail/CVE-2013-7008
10,812
qemu
98f93ddd84800f207889491e0b5d851386b459cf
https://github.com/bonzini/qemu
http://git.qemu.org/?p=qemu.git;a=commit;h=98f93ddd84800f207889491e0b5d851386b459cf
virtio-net: out-of-bounds buffer write on load CVE-2013-4149 QEMU 1.3.0 out-of-bounds buffer write in virtio_net_load()@hw/net/virtio-net.c > } else if (n->mac_table.in_use) { > uint8_t *buf = g_malloc0(n->mac_table.in_use); We are allocating buffer of size n->mac_table.in_use > qemu...
1
static int virtio_net_load(QEMUFile *f, void *opaque, int version_id) { VirtIONet *n = opaque; VirtIODevice *vdev = VIRTIO_DEVICE(n); int ret, i, link_down; if (version_id < 2 || version_id > VIRTIO_NET_VM_VERSION) return -EINVAL; ret = virtio_load(vdev, f); if (ret) { return r...
244,500,327,533,408,620,000,000,000,000,000,000,000
virtio-net.c
92,965,056,721,602,890,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4149
Buffer overflow in virtio_net_load function in net/virtio-net.c in QEMU 1.3.0 through 1.7.x before 1.7.2 might allow remote attackers to execute arbitrary code via a large MAC table.
https://nvd.nist.gov/vuln/detail/CVE-2013-4149
194,781
qemu
98f93ddd84800f207889491e0b5d851386b459cf
https://github.com/bonzini/qemu
http://git.qemu.org/?p=qemu.git;a=commit;h=98f93ddd84800f207889491e0b5d851386b459cf
virtio-net: out-of-bounds buffer write on load CVE-2013-4149 QEMU 1.3.0 out-of-bounds buffer write in virtio_net_load()@hw/net/virtio-net.c > } else if (n->mac_table.in_use) { > uint8_t *buf = g_malloc0(n->mac_table.in_use); We are allocating buffer of size n->mac_table.in_use > qemu...
0
static int virtio_net_load(QEMUFile *f, void *opaque, int version_id) { VirtIONet *n = opaque; VirtIODevice *vdev = VIRTIO_DEVICE(n); int ret, i, link_down; if (version_id < 2 || version_id > VIRTIO_NET_VM_VERSION) return -EINVAL; ret = virtio_load(vdev, f); if (ret) { return r...
12,460,125,624,523,790,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2013-4149
Buffer overflow in virtio_net_load function in net/virtio-net.c in QEMU 1.3.0 through 1.7.x before 1.7.2 might allow remote attackers to execute arbitrary code via a large MAC table.
https://nvd.nist.gov/vuln/detail/CVE-2013-4149
10,813
varnish-cache
176f8a075a963ffbfa56f1c460c15f6a1a6af5a7
https://github.com/varnishcache/varnish-cache
https://github.com/varnishcache/varnish-cache/commit/176f8a075a963ffbfa56f1c460c15f6a1a6af5a7
Avoid buffer read overflow on vcl_error and -sfile The file stevedore may return a buffer larger than asked for when requesting storage. Due to lack of check for this condition, the code to copy the synthetic error memory buffer from vcl_error would overrun the buffer. Patch by @shamger Fixes: #2429
1
vbf_stp_error(struct worker *wrk, struct busyobj *bo) { ssize_t l, ll, o; double now; uint8_t *ptr; struct vsb *synth_body; CHECK_OBJ_NOTNULL(wrk, WORKER_MAGIC); CHECK_OBJ_NOTNULL(bo, BUSYOBJ_MAGIC); CHECK_OBJ_NOTNULL(bo->fetch_objcore, OBJCORE_MAGIC); AN(bo->fetch_objcore->flags & OC_F_BUSY); assert(bo->dire...
38,998,115,844,148,544,000,000,000,000,000,000,000
cache_fetch.c
254,969,103,215,596,540,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2017-8807
vbf_stp_error in bin/varnishd/cache/cache_fetch.c in Varnish HTTP Cache 4.1.x before 4.1.9 and 5.x before 5.2.1 allows remote attackers to obtain sensitive information from process memory because a VFP_GetStorage buffer is larger than intended in certain circumstances involving -sfile Stevedore transient objects.
https://nvd.nist.gov/vuln/detail/CVE-2017-8807
160,230
varnish-cache
176f8a075a963ffbfa56f1c460c15f6a1a6af5a7
https://github.com/varnishcache/varnish-cache
https://github.com/varnishcache/varnish-cache/commit/176f8a075a963ffbfa56f1c460c15f6a1a6af5a7
Avoid buffer read overflow on vcl_error and -sfile The file stevedore may return a buffer larger than asked for when requesting storage. Due to lack of check for this condition, the code to copy the synthetic error memory buffer from vcl_error would overrun the buffer. Patch by @shamger Fixes: #2429
0
vbf_stp_error(struct worker *wrk, struct busyobj *bo) { ssize_t l, ll, o; double now; uint8_t *ptr; struct vsb *synth_body; CHECK_OBJ_NOTNULL(wrk, WORKER_MAGIC); CHECK_OBJ_NOTNULL(bo, BUSYOBJ_MAGIC); CHECK_OBJ_NOTNULL(bo->fetch_objcore, OBJCORE_MAGIC); AN(bo->fetch_objcore->flags & OC_F_BUSY); assert(bo->dire...
128,324,520,328,773,930,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-8807
vbf_stp_error in bin/varnishd/cache/cache_fetch.c in Varnish HTTP Cache 4.1.x before 4.1.9 and 5.x before 5.2.1 allows remote attackers to obtain sensitive information from process memory because a VFP_GetStorage buffer is larger than intended in certain circumstances involving -sfile Stevedore transient objects.
https://nvd.nist.gov/vuln/detail/CVE-2017-8807
10,814
gpac
90dc7f853d31b0a4e9441cba97feccf36d8b69a4
https://github.com/gpac/gpac
https://github.com/gpac/gpac/commit/90dc7f853d31b0a4e9441cba97feccf36d8b69a4
fix some exploitable overflows (#994, #997)
1
GF_Err gf_isom_oinf_read_entry(void *entry, GF_BitStream *bs) { GF_OperatingPointsInformation* ptr = (GF_OperatingPointsInformation *)entry; u32 i, j, count; if (!ptr) return GF_BAD_PARAM; ptr->scalability_mask = gf_bs_read_u16(bs); gf_bs_read_int(bs, 2);//reserved count = gf_bs_read_int(bs, 6); for (i = 0; i <...
45,493,324,744,899,785,000,000,000,000,000,000,000
avc_ext.c
91,426,739,831,411,360,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-7752
GPAC through 0.7.1 has a Buffer Overflow in the gf_media_avc_read_sps function in media_tools/av_parsers.c, a different vulnerability than CVE-2018-1000100.
https://nvd.nist.gov/vuln/detail/CVE-2018-7752
161,020
gpac
90dc7f853d31b0a4e9441cba97feccf36d8b69a4
https://github.com/gpac/gpac
https://github.com/gpac/gpac/commit/90dc7f853d31b0a4e9441cba97feccf36d8b69a4
fix some exploitable overflows (#994, #997)
0
GF_Err gf_isom_oinf_read_entry(void *entry, GF_BitStream *bs) { GF_OperatingPointsInformation* ptr = (GF_OperatingPointsInformation *)entry; u32 i, j, count; if (!ptr) return GF_BAD_PARAM; ptr->scalability_mask = gf_bs_read_u16(bs); gf_bs_read_int(bs, 2);//reserved count = gf_bs_read_int(bs, 6); for (i = 0; i <...
190,716,295,100,830,540,000,000,000,000,000,000,000
avc_ext.c
25,310,567,777,384,950,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-7752
GPAC through 0.7.1 has a Buffer Overflow in the gf_media_avc_read_sps function in media_tools/av_parsers.c, a different vulnerability than CVE-2018-1000100.
https://nvd.nist.gov/vuln/detail/CVE-2018-7752
10,816
FFmpeg
2960576378d17d71cc8dccc926352ce568b5eec1
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/2960576378d17d71cc8dccc926352ce568b5eec1
avcodec/g2meet: fix src pointer checks in kempf_decode_tile() Fixes Ticket2842 Signed-off-by: Michael Niedermayer <michaelni@gmx.at>
1
static int kempf_decode_tile(G2MContext *c, int tile_x, int tile_y, const uint8_t *src, int src_size) { int width, height; int hdr, zsize, npal, tidx = -1, ret; int i, j; const uint8_t *src_end = src + src_size; uint8_t pal[768], transp[3]; uLongf dlen = (c->tile_wid...
157,199,865,468,937,770,000,000,000,000,000,000,000
g2meet.c
337,666,674,445,830,870,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-4264
The kempf_decode_tile function in libavcodec/g2meet.c in FFmpeg before 2.0.1 allows remote attackers to cause a denial of service (out-of-bounds heap write) via a G2M4 encoded file.
https://nvd.nist.gov/vuln/detail/CVE-2013-4264
158,789
FFmpeg
2960576378d17d71cc8dccc926352ce568b5eec1
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/2960576378d17d71cc8dccc926352ce568b5eec1
avcodec/g2meet: fix src pointer checks in kempf_decode_tile() Fixes Ticket2842 Signed-off-by: Michael Niedermayer <michaelni@gmx.at>
0
static int kempf_decode_tile(G2MContext *c, int tile_x, int tile_y, const uint8_t *src, int src_size) { int width, height; int hdr, zsize, npal, tidx = -1, ret; int i, j; const uint8_t *src_end = src + src_size; uint8_t pal[768], transp[3]; uLongf dlen = (c->tile_wid...
77,849,915,279,508,680,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2013-4264
The kempf_decode_tile function in libavcodec/g2meet.c in FFmpeg before 2.0.1 allows remote attackers to cause a denial of service (out-of-bounds heap write) via a G2M4 encoded file.
https://nvd.nist.gov/vuln/detail/CVE-2013-4264
10,817
radare2
bd276ef2fd8ac3401e65be7c126a43175ccfbcd7
https://github.com/radare/radare2
https://github.com/radare/radare2/commit/bd276ef2fd8ac3401e65be7c126a43175ccfbcd7
Fix #9969 - Stack overflow in wasm disassembler
1
int wasm_dis(WasmOp *op, const unsigned char *buf, int buf_len) { op->len = 1; op->op = buf[0]; if (op->op > 0xbf) { return 1; } // add support for extension opcodes (SIMD + atomics) WasmOpDef *opdef = &opcodes[op->op]; switch (op->op) { case WASM_OP_TRAP: case WASM_OP_NOP: case WASM_OP_ELSE: case WASM_OP_...
6,673,601,905,180,170,000,000,000,000,000,000,000
wasm.c
128,755,337,374,787,100,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-11378
The wasm_dis() function in libr/asm/arch/wasm/wasm.c in or possibly have unspecified other impact via a crafted WASM file.
https://nvd.nist.gov/vuln/detail/CVE-2018-11378
160,973
radare2
bd276ef2fd8ac3401e65be7c126a43175ccfbcd7
https://github.com/radare/radare2
https://github.com/radare/radare2/commit/bd276ef2fd8ac3401e65be7c126a43175ccfbcd7
Fix #9969 - Stack overflow in wasm disassembler
0
int wasm_dis(WasmOp *op, const unsigned char *buf, int buf_len) { op->len = 1; op->op = buf[0]; if (op->op > 0xbf) { return 1; } WasmOpDef *opdef = &opcodes[op->op]; switch (op->op) { case WASM_OP_TRAP: case WASM_OP_NOP: case WASM_OP_ELSE: case WASM_OP_RETURN: case WASM_OP_DROP: case WASM_OP_SELECT: case...
277,342,851,802,778,970,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2018-11378
The wasm_dis() function in libr/asm/arch/wasm/wasm.c in or possibly have unspecified other impact via a crafted WASM file.
https://nvd.nist.gov/vuln/detail/CVE-2018-11378
10,818
virglrenderer
747a293ff6055203e529f083896b823e22523fe7
https://gitlab.freedesktop.org/virgl/virglrenderer
https://cgit.freedesktop.org/virglrenderer/commit/?id=747a293ff6055203e529f083896b823e22523fe7
vrend: fix a leak in context create internal Create a context more than once causes memory leak issue. Juest return if the context exists. Signed-off-by: Li Qiang <liq3ea@gmail.com> Signed-off-by: Dave Airlie <airlied@redhat.com>
1
void vrend_renderer_context_create_internal(uint32_t handle, uint32_t nlen, const char *debug_name) { struct vrend_decode_ctx *dctx; if (handle >= VREND_MAX_CTX) return; dctx = malloc(sizeof(struct vrend_decode_ctx)); if (!dctx) return; dctx->grc...
314,270,549,268,056,050,000,000,000,000,000,000,000
vrend_decode.c
312,476,336,926,305,480,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2016-10163
Memory leak in the vrend_renderer_context_create_internal function in vrend_decode.c in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (host memory consumption) by repeatedly creating a decode context.
https://nvd.nist.gov/vuln/detail/CVE-2016-10163
184,313
virglrenderer
747a293ff6055203e529f083896b823e22523fe7
https://gitlab.freedesktop.org/virgl/virglrenderer
https://cgit.freedesktop.org/virglrenderer/commit/?id=747a293ff6055203e529f083896b823e22523fe7
vrend: fix a leak in context create internal Create a context more than once causes memory leak issue. Juest return if the context exists. Signed-off-by: Li Qiang <liq3ea@gmail.com> Signed-off-by: Dave Airlie <airlied@redhat.com>
0
void vrend_renderer_context_create_internal(uint32_t handle, uint32_t nlen, const char *debug_name) { struct vrend_decode_ctx *dctx; if (handle >= VREND_MAX_CTX) return; dctx = dec_ctx[handle]; if (dctx) return; dctx = malloc(sizeof(struct vr...
36,907,692,861,313,980,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2016-10163
Memory leak in the vrend_renderer_context_create_internal function in vrend_decode.c in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (host memory consumption) by repeatedly creating a decode context.
https://nvd.nist.gov/vuln/detail/CVE-2016-10163
10,819
poppler
58e04a08afee39370283c494ee2e4e392fd3b684
https://github.com/freedesktop/poppler
https://cgit.freedesktop.org/poppler/poppler/commit/?id=58e04a08afee39370283c494ee2e4e392fd3b684
segExtraBytes is a goffset not an int so use lld Fixes KDE bug #328511
1
void JBIG2Stream::readSegments() { Guint segNum, segFlags, segType, page, segLength; Guint refFlags, nRefSegs; Guint *refSegs; Goffset segDataPos; int c1, c2, c3; Guint i; while (readULong(&segNum)) { // segment header flags if (!readUByte(&segFlags)) { goto eofError1; } segType = ...
234,137,405,656,432,350,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2013-7296
The JBIG2Stream::readSegments method in JBIG2Stream.cc in Poppler before 0.24.5 does not use the correct specifier within a format string, which allows context-dependent attackers to cause a denial of service (segmentation fault and application crash) via a crafted PDF file.
https://nvd.nist.gov/vuln/detail/CVE-2013-7296
184,321
poppler
58e04a08afee39370283c494ee2e4e392fd3b684
https://github.com/freedesktop/poppler
https://cgit.freedesktop.org/poppler/poppler/commit/?id=58e04a08afee39370283c494ee2e4e392fd3b684
segExtraBytes is a goffset not an int so use lld Fixes KDE bug #328511
0
void JBIG2Stream::readSegments() { Guint segNum, segFlags, segType, page, segLength; Guint refFlags, nRefSegs; Guint *refSegs; Goffset segDataPos; int c1, c2, c3; Guint i; while (readULong(&segNum)) { if (!readUByte(&segFlags)) { goto eofError1; } segType = segFlags & 0x3f; if (!r...
90,547,563,936,402,750,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2013-7296
The JBIG2Stream::readSegments method in JBIG2Stream.cc in Poppler before 0.24.5 does not use the correct specifier within a format string, which allows context-dependent attackers to cause a denial of service (segmentation fault and application crash) via a crafted PDF file.
https://nvd.nist.gov/vuln/detail/CVE-2013-7296
10,820
nmap
350bbe0597d37ad67abe5fef8fba984707b4e9ad
https://github.com/nmap/nmap
https://github.com/nmap/nmap/commit/350bbe0597d37ad67abe5fef8fba984707b4e9ad
Avoid a crash (double-free) when SSH connection fails
1
static int do_session_handshake (lua_State *L, int status, lua_KContext ctx) { int rc; struct ssh_userdata *sshu = NULL; assert(lua_gettop(L) == 4); sshu = (struct ssh_userdata *) nseU_checkudata(L, 3, SSH2_UDATA, "ssh2"); while ((rc = libssh2_session_handshake(sshu->session, sshu->sp[0])) == LIBS...
158,553,276,448,407,060,000,000,000,000,000,000,000
nse_libssh2.cc
198,789,152,988,758,870,000,000,000,000,000,000,000
[ "CWE-415" ]
CVE-2017-18594
nse_libssh2.cc in Nmap 7.70 is subject to a denial of service condition due to a double free when an SSH connection fails, as demonstrated by a leading \n character to ssh-brute.nse or ssh-auth-methods.nse.
https://nvd.nist.gov/vuln/detail/CVE-2017-18594
161,435
nmap
350bbe0597d37ad67abe5fef8fba984707b4e9ad
https://github.com/nmap/nmap
https://github.com/nmap/nmap/commit/350bbe0597d37ad67abe5fef8fba984707b4e9ad
Avoid a crash (double-free) when SSH connection fails
0
static int do_session_handshake (lua_State *L, int status, lua_KContext ctx) { int rc; struct ssh_userdata *sshu = NULL; assert(lua_gettop(L) == 4); sshu = (struct ssh_userdata *) nseU_checkudata(L, 3, SSH2_UDATA, "ssh2"); while ((rc = libssh2_session_handshake(sshu->session, sshu->sp[0])) == LIBS...
113,777,902,641,664,300,000,000,000,000,000,000,000
None
null
[ "CWE-415" ]
CVE-2017-18594
nse_libssh2.cc in Nmap 7.70 is subject to a denial of service condition due to a double free when an SSH connection fails, as demonstrated by a leading \n character to ssh-brute.nse or ssh-auth-methods.nse.
https://nvd.nist.gov/vuln/detail/CVE-2017-18594
10,824
linux
b4789b8e6be3151a955ade74872822f30e8cd914
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/b4789b8e6be3151a955ade74872822f30e8cd914
aacraid: prevent invalid pointer dereference It appears that driver runs into a problem here if fibsize is too small because we allocate user_srbcmd with fibsize size only but later we access it until user_srbcmd->sg.count to copy it over to srbcmd. It is not correct to test (fibsize < sizeof(*user_srbcmd)) because t...
1
static int aac_send_raw_srb(struct aac_dev* dev, void __user * arg) { struct fib* srbfib; int status; struct aac_srb *srbcmd = NULL; struct user_aac_srb *user_srbcmd = NULL; struct user_aac_srb __user *user_srb = arg; struct aac_srb_reply __user *user_reply; struct aac_srb_reply* reply; u32 fibsize = 0; u32 fl...
278,785,541,490,766,400,000,000,000,000,000,000,000
commctrl.c
11,190,411,268,765,080,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-6380
The aac_send_raw_srb function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 3.12.1 does not properly validate a certain size value, which allows local users to cause a denial of service (invalid pointer dereference) or possibly have unspecified other impact via an FSACTL_SEND_RAW_SRB ioctl call that tr...
https://nvd.nist.gov/vuln/detail/CVE-2013-6380
158,746
linux
b4789b8e6be3151a955ade74872822f30e8cd914
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/b4789b8e6be3151a955ade74872822f30e8cd914
aacraid: prevent invalid pointer dereference It appears that driver runs into a problem here if fibsize is too small because we allocate user_srbcmd with fibsize size only but later we access it until user_srbcmd->sg.count to copy it over to srbcmd. It is not correct to test (fibsize < sizeof(*user_srbcmd)) because t...
0
static int aac_send_raw_srb(struct aac_dev* dev, void __user * arg) { struct fib* srbfib; int status; struct aac_srb *srbcmd = NULL; struct user_aac_srb *user_srbcmd = NULL; struct user_aac_srb __user *user_srb = arg; struct aac_srb_reply __user *user_reply; struct aac_srb_reply* reply; u32 fibsize = 0; u32 fl...
315,418,944,065,862,000,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2013-6380
The aac_send_raw_srb function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 3.12.1 does not properly validate a certain size value, which allows local users to cause a denial of service (invalid pointer dereference) or possibly have unspecified other impact via an FSACTL_SEND_RAW_SRB ioctl call that tr...
https://nvd.nist.gov/vuln/detail/CVE-2013-6380
10,830
FFmpeg
8c2ea3030af7b40a3c4275696fb5c76cdb80950a
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/8c2ea3030af7b40a3c4275696fb5c76cdb80950a
avcodec/pictordec: Fix logic error Fixes: 559/clusterfuzz-testcase-6424225917173760 Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/targets/ffmpeg Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
1
static int decode_frame(AVCodecContext *avctx, void *data, int *got_frame, AVPacket *avpkt) { PicContext *s = avctx->priv_data; AVFrame *frame = data; uint32_t *palette; int bits_per_plane, bpp, etype, esize, npal, pos_after_pal; int i, x, y, plane, tm...
221,742,097,572,568,800,000,000,000,000,000,000,000
pictordec.c
75,293,849,504,293,415,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2017-7862
FFmpeg before 2017-02-07 has an out-of-bounds write caused by a heap-based buffer overflow related to the decode_frame function in libavcodec/pictordec.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-7862
160,268
FFmpeg
8c2ea3030af7b40a3c4275696fb5c76cdb80950a
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/8c2ea3030af7b40a3c4275696fb5c76cdb80950a
avcodec/pictordec: Fix logic error Fixes: 559/clusterfuzz-testcase-6424225917173760 Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/targets/ffmpeg Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
0
static int decode_frame(AVCodecContext *avctx, void *data, int *got_frame, AVPacket *avpkt) { PicContext *s = avctx->priv_data; AVFrame *frame = data; uint32_t *palette; int bits_per_plane, bpp, etype, esize, npal, pos_after_pal; int i, x, y, plane, tm...
336,499,449,503,801,040,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2017-7862
FFmpeg before 2017-02-07 has an out-of-bounds write caused by a heap-based buffer overflow related to the decode_frame function in libavcodec/pictordec.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-7862
10,831
radare2
f41e941341e44aa86edd4483c4487ec09a074257
https://github.com/radare/radare2
https://github.com/radare/radare2/commit/f41e941341e44aa86edd4483c4487ec09a074257
Fix #6885 - oob write in dalvik_disassemble
1
static int dalvik_disassemble (RAsm *a, RAsmOp *op, const ut8 *buf, int len) { int vA, vB, vC, payload = 0, i = (int) buf[0]; int size = dalvik_opcodes[i].len; char str[1024], *strasm; ut64 offset; const char *flag_str; op->buf_asm[0] = 0; if (buf[0] == 0x00) { /* nop */ switch (buf[1]) { case 0x01: /* pac...
15,765,353,407,801,864,000,000,000,000,000,000,000
asm_dalvik.c
278,723,867,294,495,130,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2017-6448
The dalvik_disassemble function in libr/asm/p/asm_dalvik.c in radare2 1.2.1 allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted DEX file.
https://nvd.nist.gov/vuln/detail/CVE-2017-6448
160,328
radare2
f41e941341e44aa86edd4483c4487ec09a074257
https://github.com/radare/radare2
https://github.com/radare/radare2/commit/f41e941341e44aa86edd4483c4487ec09a074257
Fix #6885 - oob write in dalvik_disassemble
0
static int dalvik_disassemble (RAsm *a, RAsmOp *op, const ut8 *buf, int len) { int vA, vB, vC, payload = 0, i = (int) buf[0]; int size = dalvik_opcodes[i].len; char str[1024], *strasm; ut64 offset; const char *flag_str; op->buf_asm[0] = 0; if (buf[0] == 0x00) { /* nop */ switch (buf[1]) { case 0x01: /* pac...
333,143,334,823,835,900,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-6448
The dalvik_disassemble function in libr/asm/p/asm_dalvik.c in radare2 1.2.1 allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted DEX file.
https://nvd.nist.gov/vuln/detail/CVE-2017-6448
10,832
radare2
f17bfd9f1da05f30f23a4dd05e9d2363e1406948
https://github.com/radare/radare2
https://github.com/radare/radare2/commit/f17bfd9f1da05f30f23a4dd05e9d2363e1406948
Fix #12242 - Crash in x86.nz assembler (#12266)
1
static int opmov(RAsm *a, ut8 *data, const Opcode *op) { int l = 0; st64 offset = 0; int mod = 0; int base = 0; int rex = 0; ut64 immediate = 0; if (op->operands[1].type & OT_CONSTANT) { if (!op->operands[1].is_good_flag) { return -1; } if (op->operands[1].immediate == -1) { return -1; } immediat...
40,973,769,706,127,207,000,000,000,000,000,000,000
asm_x86_nz.c
338,540,879,983,035,860,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-19843
opmov in libr/asm/p/asm_x86_nz.c in radare2 before 3.1.0 allows attackers to cause a denial of service (buffer over-read) via crafted x86 assembly data, as demonstrated by rasm2.
https://nvd.nist.gov/vuln/detail/CVE-2018-19843
160,778
radare2
f17bfd9f1da05f30f23a4dd05e9d2363e1406948
https://github.com/radare/radare2
https://github.com/radare/radare2/commit/f17bfd9f1da05f30f23a4dd05e9d2363e1406948
Fix #12242 - Crash in x86.nz assembler (#12266)
0
static int opmov(RAsm *a, ut8 *data, const Opcode *op) { int l = 0; st64 offset = 0; int mod = 0; int base = 0; int rex = 0; ut64 immediate = 0; if (op->operands[1].type & OT_CONSTANT) { if (!op->operands[1].is_good_flag) { return -1; } if (op->operands[1].immediate == -1) { return -1; } immediat...
245,358,561,995,234,160,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2018-19843
opmov in libr/asm/p/asm_x86_nz.c in radare2 before 3.1.0 allows attackers to cause a denial of service (buffer over-read) via crafted x86 assembly data, as demonstrated by rasm2.
https://nvd.nist.gov/vuln/detail/CVE-2018-19843
10,833
php-src
61cdd1255d5b9c8453be71aacbbf682796ac77d4
https://github.com/php/php-src
https://github.com/php/php-src/commit/61cdd1255d5b9c8453be71aacbbf682796ac77d4
Fix bug #73257 and bug #73258 - SplObjectStorage unserialize allows use of non-object as key
1
SPL_METHOD(SplObjectStorage, unserialize) { spl_SplObjectStorage *intern = Z_SPLOBJSTORAGE_P(getThis()); char *buf; size_t buf_len; const unsigned char *p, *s; php_unserialize_data_t var_hash; zval entry, inf; zval *pcount, *pmembers; spl_SplObjectStorageElement *element; zend_long count; if (zend_parse_par...
91,704,803,847,212,610,000,000,000,000,000,000,000
spl_observer.c
126,391,975,154,037,090,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-7480
The SplObjectStorage unserialize implementation in ext/spl/spl_observer.c in PHP before 7.0.12 does not verify that a key is an object, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access) via crafted serialized data.
https://nvd.nist.gov/vuln/detail/CVE-2016-7480
160,669
php-src
61cdd1255d5b9c8453be71aacbbf682796ac77d4
https://github.com/php/php-src
https://github.com/php/php-src/commit/61cdd1255d5b9c8453be71aacbbf682796ac77d4
Fix bug #73257 and bug #73258 - SplObjectStorage unserialize allows use of non-object as key
0
SPL_METHOD(SplObjectStorage, unserialize) { spl_SplObjectStorage *intern = Z_SPLOBJSTORAGE_P(getThis()); char *buf; size_t buf_len; const unsigned char *p, *s; php_unserialize_data_t var_hash; zval entry, inf; zval *pcount, *pmembers; spl_SplObjectStorageElement *element; zend_long count; if (zend_parse_par...
75,817,676,681,562,030,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2016-7480
The SplObjectStorage unserialize implementation in ext/spl/spl_observer.c in PHP before 7.0.12 does not verify that a key is an object, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access) via crafted serialized data.
https://nvd.nist.gov/vuln/detail/CVE-2016-7480
10,834
libpcap
484d60cbf7ca4ec758c3cbb8a82d68b244a78d58
https://github.com/the-tcpdump-group/libpcap
https://github.com/the-tcpdump-group/libpcap/commit/484d60cbf7ca4ec758c3cbb8a82d68b244a78d58
On UN*X, don't tell the client why authentication failed. "no such user" tells the client that the user ID isn't valid and, therefore, that it needn't bother trying to do password cracking for that user ID; just saying that the authentication failed dosn't give them that hint. This resolves the third problem in Inclu...
1
daemon_AuthUserPwd(char *username, char *password, char *errbuf) { #ifdef _WIN32 /* * Warning: the user which launches the process must have the * SE_TCB_NAME right. * This corresponds to have the "Act as part of the Operating System" * turned on (administrative tools, local security settings, local * polici...
143,271,537,862,841,350,000,000,000,000,000,000,000
daemon.c
39,444,760,337,349,555,000,000,000,000,000,000,000
[ "CWE-345" ]
CVE-2019-15162
rpcapd/daemon.c in libpcap before 1.9.1 on non-Windows platforms provides details about why authentication failed, which might make it easier for attackers to enumerate valid usernames.
https://nvd.nist.gov/vuln/detail/CVE-2019-15162
161,190
libpcap
484d60cbf7ca4ec758c3cbb8a82d68b244a78d58
https://github.com/the-tcpdump-group/libpcap
https://github.com/the-tcpdump-group/libpcap/commit/484d60cbf7ca4ec758c3cbb8a82d68b244a78d58
On UN*X, don't tell the client why authentication failed. "no such user" tells the client that the user ID isn't valid and, therefore, that it needn't bother trying to do password cracking for that user ID; just saying that the authentication failed dosn't give them that hint. This resolves the third problem in Inclu...
0
daemon_AuthUserPwd(char *username, char *password, char *errbuf) { #ifdef _WIN32 /* * Warning: the user which launches the process must have the * SE_TCB_NAME right. * This corresponds to have the "Act as part of the Operating System" * turned on (administrative tools, local security settings, local * polici...
262,746,865,674,380,200,000,000,000,000,000,000,000
None
null
[ "CWE-345" ]
CVE-2019-15162
rpcapd/daemon.c in libpcap before 1.9.1 on non-Windows platforms provides details about why authentication failed, which might make it easier for attackers to enumerate valid usernames.
https://nvd.nist.gov/vuln/detail/CVE-2019-15162
10,835
qemu
9878d173f574df74bde0ff50b2f81009fbee81bb
https://github.com/bonzini/qemu
https://git.qemu.org/?p=qemu.git;a=commit;h=9878d173f574df74bde0ff50b2f81009fbee81bb
vmxnet3: validate queues configuration coming from guest CVE-2013-4544 Signed-off-by: Dmitry Fleytman <dmitry@daynix.com> Reported-by: Michael S. Tsirkin <mst@redhat.com> Signed-off-by: Michael S. Tsirkin <mst@redhat.com> Reviewed-by: Dr. David Alan Gilbert <dgilbert@redhat.com> Message-id: 1396604722-11902-3-git-sen...
1
static void vmxnet3_activate_device(VMXNET3State *s) { int i; static const uint32_t VMXNET3_DEF_TX_THRESHOLD = 1; hwaddr qdescr_table_pa; uint64_t pa; uint32_t size; /* Verify configuration consistency */ if (!vmxnet3_verify_driver_magic(s->drv_shmem)) { VMW_ERPRN("Device configurat...
249,334,075,610,751,950,000,000,000,000,000,000,000
vmxnet3.c
216,873,920,930,645,670,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2013-4544
hw/net/vmxnet3.c in QEMU 2.0.0-rc0, 1.7.1, and earlier allows local guest users to cause a denial of service or possibly execute arbitrary code via vectors related to (1) RX or (2) TX queue numbers or (3) interrupt indices. NOTE: some of these details are obtained from third party information.
https://nvd.nist.gov/vuln/detail/CVE-2013-4544
194,775
qemu
9878d173f574df74bde0ff50b2f81009fbee81bb
https://github.com/bonzini/qemu
https://git.qemu.org/?p=qemu.git;a=commit;h=9878d173f574df74bde0ff50b2f81009fbee81bb
vmxnet3: validate queues configuration coming from guest CVE-2013-4544 Signed-off-by: Dmitry Fleytman <dmitry@daynix.com> Reported-by: Michael S. Tsirkin <mst@redhat.com> Signed-off-by: Michael S. Tsirkin <mst@redhat.com> Reviewed-by: Dr. David Alan Gilbert <dgilbert@redhat.com> Message-id: 1396604722-11902-3-git-sen...
0
static void vmxnet3_activate_device(VMXNET3State *s) { int i; VMW_CFPRN("MTU is %u", s->mtu); s->max_rx_frags = VMXNET3_READ_DRV_SHARED16(s->drv_shmem, devRead.misc.maxNumRxSG); if (s->max_rx_frags == 0) { s->max_rx_frags = 1; } VMW_CFPRN("Max RX fragments is %u", s->max_rx...
291,869,202,376,088,630,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2013-4544
hw/net/vmxnet3.c in QEMU 2.0.0-rc0, 1.7.1, and earlier allows local guest users to cause a denial of service or possibly execute arbitrary code via vectors related to (1) RX or (2) TX queue numbers or (3) interrupt indices. NOTE: some of these details are obtained from third party information.
https://nvd.nist.gov/vuln/detail/CVE-2013-4544
10,836
Little-CMS
5ca71a7bc18b6897ab21d815d15e218e204581e2
https://github.com/mm2/Little-CMS
https://github.com/mm2/Little-CMS/commit/5ca71a7bc18b6897ab21d815d15e218e204581e2
Added an extra check to MLU bounds Thanks to Ibrahim el-sayed for spotting the bug
1
void *Type_MLU_Read(struct _cms_typehandler_struct* self, cmsIOHANDLER* io, cmsUInt32Number* nItems, cmsUInt32Number SizeOfTag) { cmsMLU* mlu; cmsUInt32Number Count, RecLen, NumOfWchar; cmsUInt32Number SizeOfHeader; cmsUInt32Number Len, Offset; cmsUInt32Number i; wchar_t* Block; cm...
11,487,822,218,315,490,000,000,000,000,000,000,000
cmstypes.c
132,058,870,710,618,560,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2016-10165
The Type_MLU_Read function in cmstypes.c in Little CMS (aka lcms2) allows remote attackers to obtain sensitive information or cause a denial of service via an image with a crafted ICC profile, which triggers an out-of-bounds heap read.
https://nvd.nist.gov/vuln/detail/CVE-2016-10165
160,452
Little-CMS
5ca71a7bc18b6897ab21d815d15e218e204581e2
https://github.com/mm2/Little-CMS
https://github.com/mm2/Little-CMS/commit/5ca71a7bc18b6897ab21d815d15e218e204581e2
Added an extra check to MLU bounds Thanks to Ibrahim el-sayed for spotting the bug
0
void *Type_MLU_Read(struct _cms_typehandler_struct* self, cmsIOHANDLER* io, cmsUInt32Number* nItems, cmsUInt32Number SizeOfTag) { cmsMLU* mlu; cmsUInt32Number Count, RecLen, NumOfWchar; cmsUInt32Number SizeOfHeader; cmsUInt32Number Len, Offset; cmsUInt32Number i; wchar_t* Block; cm...
7,142,105,060,128,840,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2016-10165
The Type_MLU_Read function in cmstypes.c in Little CMS (aka lcms2) allows remote attackers to obtain sensitive information or cause a denial of service via an image with a crafted ICC profile, which triggers an out-of-bounds heap read.
https://nvd.nist.gov/vuln/detail/CVE-2016-10165
10,837
WavPack
26cb47f99d481ad9b93eeff80d26e6b63bbd7e15
https://github.com/dbry/WavPack
https://github.com/dbry/WavPack/commit/26cb47f99d481ad9b93eeff80d26e6b63bbd7e15
issue #30 issue #31 issue #32: no multiple format chunks in WAV or W64
1
int ParseWave64HeaderConfig (FILE *infile, char *infilename, char *fourcc, WavpackContext *wpc, WavpackConfig *config) { int64_t total_samples = 0, infilesize; Wave64ChunkHeader chunk_header; Wave64FileHeader filehdr; WaveHeader WaveHeader; uint32_t bcount; infilesize = DoGetFileSize (infile); ...
52,732,810,850,628,605,000,000,000,000,000,000,000
wave64.c
80,250,037,771,172,160,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-10537
An issue was discovered in WavPack 5.1.0 and earlier. The W64 parser component contains a vulnerability that allows writing to memory because ParseWave64HeaderConfig in wave64.c does not reject multiple format chunks.
https://nvd.nist.gov/vuln/detail/CVE-2018-10537
184,646
WavPack
26cb47f99d481ad9b93eeff80d26e6b63bbd7e15
https://github.com/dbry/WavPack
https://github.com/dbry/WavPack/commit/26cb47f99d481ad9b93eeff80d26e6b63bbd7e15
issue #30 issue #31 issue #32: no multiple format chunks in WAV or W64
0
int ParseWave64HeaderConfig (FILE *infile, char *infilename, char *fourcc, WavpackContext *wpc, WavpackConfig *config) { int64_t total_samples = 0, infilesize; Wave64ChunkHeader chunk_header; Wave64FileHeader filehdr; WaveHeader WaveHeader; int format_chunk = 0; uint32_t bcount; infil...
107,794,461,004,120,000,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2018-10537
An issue was discovered in WavPack 5.1.0 and earlier. The W64 parser component contains a vulnerability that allows writing to memory because ParseWave64HeaderConfig in wave64.c does not reject multiple format chunks.
https://nvd.nist.gov/vuln/detail/CVE-2018-10537
10,838
WavPack
26cb47f99d481ad9b93eeff80d26e6b63bbd7e15
https://github.com/dbry/WavPack
https://github.com/dbry/WavPack/commit/26cb47f99d481ad9b93eeff80d26e6b63bbd7e15
issue #30 issue #31 issue #32: no multiple format chunks in WAV or W64
1
int ParseRiffHeaderConfig (FILE *infile, char *infilename, char *fourcc, WavpackContext *wpc, WavpackConfig *config) { int is_rf64 = !strncmp (fourcc, "RF64", 4), got_ds64 = 0; int64_t total_samples = 0, infilesize; RiffChunkHeader riff_chunk_header; ChunkHeader chunk_header; WaveHeader WaveHeader; ...
152,045,847,845,484,900,000,000,000,000,000,000,000
riff.c
29,803,808,998,334,980,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-10537
An issue was discovered in WavPack 5.1.0 and earlier. The W64 parser component contains a vulnerability that allows writing to memory because ParseWave64HeaderConfig in wave64.c does not reject multiple format chunks.
https://nvd.nist.gov/vuln/detail/CVE-2018-10537
160,983
WavPack
26cb47f99d481ad9b93eeff80d26e6b63bbd7e15
https://github.com/dbry/WavPack
https://github.com/dbry/WavPack/commit/26cb47f99d481ad9b93eeff80d26e6b63bbd7e15
issue #30 issue #31 issue #32: no multiple format chunks in WAV or W64
0
int ParseRiffHeaderConfig (FILE *infile, char *infilename, char *fourcc, WavpackContext *wpc, WavpackConfig *config) { int is_rf64 = !strncmp (fourcc, "RF64", 4), got_ds64 = 0, format_chunk = 0; int64_t total_samples = 0, infilesize; RiffChunkHeader riff_chunk_header; ChunkHeader chunk_header; ...
21,652,987,276,390,327,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2018-10537
An issue was discovered in WavPack 5.1.0 and earlier. The W64 parser component contains a vulnerability that allows writing to memory because ParseWave64HeaderConfig in wave64.c does not reject multiple format chunks.
https://nvd.nist.gov/vuln/detail/CVE-2018-10537
10,839
FFmpeg
95556e27e2c1d56d9e18f5db34d6f756f3011148
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/95556e27e2c1d56d9e18f5db34d6f756f3011148
avformat/movenc: Do not pass AVCodecParameters in avpriv_request_sample Fixes: out of array read Fixes: ffmpeg_crash_8.avi Found-by: Thuan Pham, Marcel Böhme, Andrew Santosa and Alexandru Razvan Caciulescu with AFLSmart Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
1
static int handle_eac3(MOVMuxContext *mov, AVPacket *pkt, MOVTrack *track) { AC3HeaderInfo *hdr = NULL; struct eac3_info *info; int num_blocks, ret; if (!track->eac3_priv && !(track->eac3_priv = av_mallocz(sizeof(*info)))) return AVERROR(ENOMEM); info = track->eac3_priv; if (avpriv_ac3...
194,781,423,137,917,070,000,000,000,000,000,000,000
movenc.c
128,083,843,490,396,450,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-13300
In FFmpeg 3.2 and 4.0.1, an improper argument (AVCodecParameters) passed to the avpriv_request_sample function in the handle_eac3 function in libavformat/movenc.c may trigger an out-of-array read while converting a crafted AVI file to MPEG4, leading to a denial of service and possibly an information disclosure.
https://nvd.nist.gov/vuln/detail/CVE-2018-13300
160,919
FFmpeg
95556e27e2c1d56d9e18f5db34d6f756f3011148
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/95556e27e2c1d56d9e18f5db34d6f756f3011148
avformat/movenc: Do not pass AVCodecParameters in avpriv_request_sample Fixes: out of array read Fixes: ffmpeg_crash_8.avi Found-by: Thuan Pham, Marcel Böhme, Andrew Santosa and Alexandru Razvan Caciulescu with AFLSmart Signed-off-by: Michael Niedermayer <michael@niedermayer.cc>
0
static int handle_eac3(MOVMuxContext *mov, AVPacket *pkt, MOVTrack *track) { AC3HeaderInfo *hdr = NULL; struct eac3_info *info; int num_blocks, ret; if (!track->eac3_priv && !(track->eac3_priv = av_mallocz(sizeof(*info)))) return AVERROR(ENOMEM); info = track->eac3_priv; if (avpriv_ac3...
56,370,364,015,549,390,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2018-13300
In FFmpeg 3.2 and 4.0.1, an improper argument (AVCodecParameters) passed to the avpriv_request_sample function in the handle_eac3 function in libavformat/movenc.c may trigger an out-of-array read while converting a crafted AVI file to MPEG4, leading to a denial of service and possibly an information disclosure.
https://nvd.nist.gov/vuln/detail/CVE-2018-13300
194,974
gpac
7bb1b4a4dd23c885f9db9f577dfe79ecc5433109
https://github.com/gpac/gpac
https://github.com/gpac/gpac/commit/7bb1b4a4dd23c885f9db9f577dfe79ecc5433109
fixed #1893
1
void gf_av1_reset_state(AV1State *state, Bool is_destroy) { GF_List *l1, *l2; if (state->frame_state.header_obus) { while (gf_list_count(state->frame_state.header_obus)) { GF_AV1_OBUArrayEntry *a = (GF_AV1_OBUArrayEntry*)gf_list_pop_back(state->frame_state.header_obus); if (a->obu) gf_free(a->obu); gf_fre...
91,743,208,610,685,760,000,000,000,000,000,000,000
av_parsers.c
168,517,587,328,341,010,000,000,000,000,000,000,000
[ "CWE-415" ]
CVE-2021-40572
The binary MP4Box in Gpac 1.0.1 has a double-free bug in the av1dmx_finalize function in reframe_av1.c, which allows attackers to cause a denial of service.
https://nvd.nist.gov/vuln/detail/CVE-2021-40572
217,933
gpac
7bb1b4a4dd23c885f9db9f577dfe79ecc5433109
https://github.com/gpac/gpac
https://github.com/gpac/gpac/commit/7bb1b4a4dd23c885f9db9f577dfe79ecc5433109
fixed #1893
0
void gf_av1_reset_state(AV1State *state, Bool is_destroy) { GF_List *l1, *l2; if (state->frame_state.header_obus) { while (gf_list_count(state->frame_state.header_obus)) { GF_AV1_OBUArrayEntry *a = (GF_AV1_OBUArrayEntry*)gf_list_pop_back(state->frame_state.header_obus); if (a->obu) gf_free(a->obu); gf_fre...
92,170,410,639,891,570,000,000,000,000,000,000,000
av_parsers.c
305,161,361,238,382,900,000,000,000,000,000,000,000
[ "CWE-415" ]
CVE-2021-40572
The binary MP4Box in Gpac 1.0.1 has a double-free bug in the av1dmx_finalize function in reframe_av1.c, which allows attackers to cause a denial of service.
https://nvd.nist.gov/vuln/detail/CVE-2021-40572
194,975
gpac
04dbf08bff4d61948bab80c3f9096ecc60c7f302
https://github.com/gpac/gpac
https://github.com/gpac/gpac/commit/04dbf08bff4d61948bab80c3f9096ecc60c7f302
fixed #1899
1
static s32 gf_avc_read_sps_bs_internal(GF_BitStream *bs, AVCState *avc, u32 subseq_sps, u32 *vui_flag_pos, u32 nal_hdr) { AVC_SPS *sps; s32 mb_width, mb_height, sps_id = -1; u32 profile_idc, level_idc, pcomp, i, chroma_format_idc, cl = 0, cr = 0, ct = 0, cb = 0, luma_bd, chroma_bd; u8 separate_colour_plane_flag = 0...
293,516,869,958,372,470,000,000,000,000,000,000,000
av_parsers.c
168,517,587,328,341,010,000,000,000,000,000,000,000
[ "CWE-415" ]
CVE-2021-40570
The binary MP4Box in Gpac 1.0.1 has a double-free vulnerability in the avc_compute_poc function in av_parsers.c, which allows attackers to cause a denial of service, even code execution and escalation of privileges.
https://nvd.nist.gov/vuln/detail/CVE-2021-40570
218,016
gpac
04dbf08bff4d61948bab80c3f9096ecc60c7f302
https://github.com/gpac/gpac
https://github.com/gpac/gpac/commit/04dbf08bff4d61948bab80c3f9096ecc60c7f302
fixed #1899
0
static s32 gf_avc_read_sps_bs_internal(GF_BitStream *bs, AVCState *avc, u32 subseq_sps, u32 *vui_flag_pos, u32 nal_hdr) { AVC_SPS *sps; s32 mb_width, mb_height, sps_id = -1; u32 profile_idc, level_idc, pcomp, i, chroma_format_idc, cl = 0, cr = 0, ct = 0, cb = 0, luma_bd, chroma_bd; u8 separate_colour_plane_flag = 0...
99,363,752,764,399,010,000,000,000,000,000,000,000
av_parsers.c
102,768,772,056,027,780,000,000,000,000,000,000,000
[ "CWE-415" ]
CVE-2021-40570
The binary MP4Box in Gpac 1.0.1 has a double-free vulnerability in the avc_compute_poc function in av_parsers.c, which allows attackers to cause a denial of service, even code execution and escalation of privileges.
https://nvd.nist.gov/vuln/detail/CVE-2021-40570
194,997
tensorflow
a7c02f1a9bbc35473969618a09ee5f9f5d3e52d9
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/a7c02f1a9bbc35473969618a09ee5f9f5d3e52d9
Validate real and expected type of arguments to cwise ops. Without this validation, it is possible to trigger a `CHECK`-fail denial of service. This is a rollforward of a previous commit which was rolled back as it was relying on RTTI. This time we don't use RTTI, we replace `typeid(Tin).name()` with a double functio...
1
void Compute(OpKernelContext* ctx) override { const Tensor& input_0 = ctx->input(0); const Tensor& input_1 = ctx->input(1); const Device& eigen_device = ctx->eigen_device<Device>(); bool error = false; bool* const error_ptr = Functor::has_errors ? &error : nullptr; // NOTE: Handle three simpl...
213,136,115,552,976,740,000,000,000,000,000,000,000
cwise_ops_common.h
248,686,552,355,126,300,000,000,000,000,000,000,000
[ "CWE-617" ]
CVE-2022-23583
Tensorflow is an Open Source Machine Learning Framework. A malicious user can cause a denial of service by altering a `SavedModel` such that any binary op would trigger `CHECK` failures. This occurs when the protobuf part corresponding to the tensor arguments is modified such that the `dtype` no longer matches the `dty...
https://nvd.nist.gov/vuln/detail/CVE-2022-23583
218,940
tensorflow
a7c02f1a9bbc35473969618a09ee5f9f5d3e52d9
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/a7c02f1a9bbc35473969618a09ee5f9f5d3e52d9
Validate real and expected type of arguments to cwise ops. Without this validation, it is possible to trigger a `CHECK`-fail denial of service. This is a rollforward of a previous commit which was rolled back as it was relying on RTTI. This time we don't use RTTI, we replace `typeid(Tin).name()` with a double functio...
0
void Compute(OpKernelContext* ctx) override { const Tensor& input_0 = ctx->input(0); OP_REQUIRES(ctx, input_0.dtype() == DataTypeToEnum<Tin>::v(), errors::InvalidArgument( "Expected tensor of type ", DataTypeString(DataTypeToEnum<Tin>::v()), " but got ty...
113,133,731,875,387,430,000,000,000,000,000,000,000
cwise_ops_common.h
254,915,476,689,776,730,000,000,000,000,000,000,000
[ "CWE-617" ]
CVE-2022-23583
Tensorflow is an Open Source Machine Learning Framework. A malicious user can cause a denial of service by altering a `SavedModel` such that any binary op would trigger `CHECK` failures. This occurs when the protobuf part corresponding to the tensor arguments is modified such that the `dtype` no longer matches the `dty...
https://nvd.nist.gov/vuln/detail/CVE-2022-23583
195,018
ImageMagick
548701354191a3dda5cffc6d415374b35b01d0b9
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/548701354191a3dda5cffc6d415374b35b01d0b9
Prevent memory use after free
1
static Image *ReadPWPImage(const ImageInfo *image_info,ExceptionInfo *exception) { FILE *file; Image *image, *next_image, *pwp_image; ImageInfo *read_info; int c, unique_file; MagickBooleanType status; register Image *p; register ssize_t i; size_t files...
214,504,104,515,772,660,000,000,000,000,000,000,000
None
null
[ "CWE-416" ]
CVE-2016-10051
Use-after-free vulnerability in the ReadPWPImage function in coders/pwp.c in ImageMagick 6.9.5-5 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2016-10051
219,929
ImageMagick
548701354191a3dda5cffc6d415374b35b01d0b9
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/548701354191a3dda5cffc6d415374b35b01d0b9
Prevent memory use after free
0
static Image *ReadPWPImage(const ImageInfo *image_info,ExceptionInfo *exception) { FILE *file; Image *image, *next_image, *pwp_image; ImageInfo *read_info; int c, unique_file; MagickBooleanType status; register Image *p; register ssize_t i; size_t files...
183,179,493,347,682,440,000,000,000,000,000,000,000
None
null
[ "CWE-416" ]
CVE-2016-10051
Use-after-free vulnerability in the ReadPWPImage function in coders/pwp.c in ImageMagick 6.9.5-5 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2016-10051
195,024
libtiff
0c74a9f49b8d7a36b17b54a7428b3526d20f88a8
https://github.com/vadz/libtiff
https://github.com/vadz/libtiff/commit/0c74a9f49b8d7a36b17b54a7428b3526d20f88a8
Fix for simple memory leak that was assigned CVE-2019-6128. pal2rgb failed to free memory on a few errors. This was reported here: http://bugzilla.maptools.org/show_bug.cgi?id=2836.
1
main(int argc, char* argv[]) { uint16 bitspersample, shortv; uint32 imagewidth, imagelength; uint16 config = PLANARCONFIG_CONTIG; uint32 rowsperstrip = (uint32) -1; uint16 photometric = PHOTOMETRIC_RGB; uint16 *rmap, *gmap, *bmap; uint32 row; int cmap = -1; TIFF *in, *out; int c; #if !HAVE_DECL_OPTARG exter...
273,958,700,931,991,270,000,000,000,000,000,000,000
pal2rgb.c
258,209,594,937,280,700,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2019-6128
The TIFFFdOpen function in tif_unix.c in LibTIFF 4.0.10 has a memory leak, as demonstrated by pal2rgb.
https://nvd.nist.gov/vuln/detail/CVE-2019-6128
220,035
libtiff
0c74a9f49b8d7a36b17b54a7428b3526d20f88a8
https://github.com/vadz/libtiff
https://github.com/vadz/libtiff/commit/0c74a9f49b8d7a36b17b54a7428b3526d20f88a8
Fix for simple memory leak that was assigned CVE-2019-6128. pal2rgb failed to free memory on a few errors. This was reported here: http://bugzilla.maptools.org/show_bug.cgi?id=2836.
0
main(int argc, char* argv[]) { uint16 bitspersample, shortv; uint32 imagewidth, imagelength; uint16 config = PLANARCONFIG_CONTIG; uint32 rowsperstrip = (uint32) -1; uint16 photometric = PHOTOMETRIC_RGB; uint16 *rmap, *gmap, *bmap; uint32 row; int cmap = -1; TIFF *in, *out; int c; #if !HAVE_DECL_OPTARG exter...
5,288,936,921,581,789,500,000,000,000,000,000,000
pal2rgb.c
102,626,899,026,335,350,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2019-6128
The TIFFFdOpen function in tif_unix.c in LibTIFF 4.0.10 has a memory leak, as demonstrated by pal2rgb.
https://nvd.nist.gov/vuln/detail/CVE-2019-6128
195,025
tensorflow
e8dc63704c88007ee4713076605c90188d66f3d2
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/e8dc63704c88007ee4713076605c90188d66f3d2
Add BuildTensorSlice for building from unvalidated TensorSliceProtos. This avoids several sources of crashes and undefined behavior when loading invalid checkpoints. PiperOrigin-RevId: 392785704 Change-Id: Icd9713c768b882f3b58b427eddac376060696833
1
void TensorSliceReader::LoadShard(int shard) const { CHECK_LT(shard, sss_.size()); if (sss_[shard] || !status_.ok()) { return; // Already loaded, or invalid. } string value; SavedTensorSlices sts; const string fname = fnames_[shard]; VLOG(1) << "Reading meta data from file " << fname << "..."; Tabl...
2,325,999,890,524,082,200,000,000,000,000,000,000
tensor_slice_reader.cc
308,115,881,652,480,900,000,000,000,000,000,000,000
[ "CWE-345" ]
CVE-2021-41203
TensorFlow is an open source platform for machine learning. In affected versions an attacker can trigger undefined behavior, integer overflows, segfaults and `CHECK`-fail crashes if they can change saved checkpoints from outside of TensorFlow. This is because the checkpoints loading infrastructure is missing validation...
https://nvd.nist.gov/vuln/detail/CVE-2021-41203
220,080
tensorflow
e8dc63704c88007ee4713076605c90188d66f3d2
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/e8dc63704c88007ee4713076605c90188d66f3d2
Add BuildTensorSlice for building from unvalidated TensorSliceProtos. This avoids several sources of crashes and undefined behavior when loading invalid checkpoints. PiperOrigin-RevId: 392785704 Change-Id: Icd9713c768b882f3b58b427eddac376060696833
0
void TensorSliceReader::LoadShard(int shard) const { CHECK_LT(shard, sss_.size()); if (sss_[shard] || !status_.ok()) { return; // Already loaded, or invalid. } string value; SavedTensorSlices sts; const string fname = fnames_[shard]; VLOG(1) << "Reading meta data from file " << fname << "..."; Tabl...
72,309,604,699,517,570,000,000,000,000,000,000,000
tensor_slice_reader.cc
114,858,728,581,993,820,000,000,000,000,000,000,000
[ "CWE-345" ]
CVE-2021-41203
TensorFlow is an open source platform for machine learning. In affected versions an attacker can trigger undefined behavior, integer overflows, segfaults and `CHECK`-fail crashes if they can change saved checkpoints from outside of TensorFlow. This is because the checkpoints loading infrastructure is missing validation...
https://nvd.nist.gov/vuln/detail/CVE-2021-41203
195,036
openexr
11cad77da87c4fa2aab7d58dd5339e254db7937e
https://github.com/AcademySoftwareFoundation/openexr
https://github.com/AcademySoftwareFoundation/openexr/commit/11cad77da87c4fa2aab7d58dd5339e254db7937e
enforce xSampling/ySampling==1 in CompositeDeepScanLine (#1209) Signed-off-by: Peter Hillman <peterh@wetafx.co.nz>
1
CompositeDeepScanLine::setFrameBuffer(const FrameBuffer& fr) { // // count channels; build map between channels in frame buffer // and channels in internal buffers // _Data->_channels.resize(3); _Data->_channels[0]="Z"; _Data->_channels[1]=_Data->_zback ? "ZBack" : "Z"; _Data->...
106,928,644,112,382,330,000,000,000,000,000,000,000
ImfCompositeDeepScanLine.cpp
297,117,260,678,292,240,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2021-45942
OpenEXR 3.1.x before 3.1.4 has a heap-based buffer overflow in Imf_3_1::LineCompositeTask::execute (called from IlmThread_3_1::NullThreadPoolProvider::addTask and IlmThread_3_1::ThreadPool::addGlobalTask). NOTE: db217f2 may be inapplicable.
https://nvd.nist.gov/vuln/detail/CVE-2021-45942
220,379
openexr
11cad77da87c4fa2aab7d58dd5339e254db7937e
https://github.com/AcademySoftwareFoundation/openexr
https://github.com/AcademySoftwareFoundation/openexr/commit/11cad77da87c4fa2aab7d58dd5339e254db7937e
enforce xSampling/ySampling==1 in CompositeDeepScanLine (#1209) Signed-off-by: Peter Hillman <peterh@wetafx.co.nz>
0
CompositeDeepScanLine::setFrameBuffer(const FrameBuffer& fr) { // // count channels; build map between channels in frame buffer // and channels in internal buffers // _Data->_channels.resize(3); _Data->_channels[0]="Z"; _Data->_channels[1]=_Data->_zback ? "ZBack" : "Z"; _Data->...
43,275,924,463,396,740,000,000,000,000,000,000,000
ImfCompositeDeepScanLine.cpp
242,287,697,630,984,150,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2021-45942
OpenEXR 3.1.x before 3.1.4 has a heap-based buffer overflow in Imf_3_1::LineCompositeTask::execute (called from IlmThread_3_1::NullThreadPoolProvider::addTask and IlmThread_3_1::ThreadPool::addGlobalTask). NOTE: db217f2 may be inapplicable.
https://nvd.nist.gov/vuln/detail/CVE-2021-45942
195,041
ImageMagick
139d4323c40d7363bfdd2382c3821a6f76d69430
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/139d4323c40d7363bfdd2382c3821a6f76d69430
RLE check for pixel offset less than 0 (heap overflow report from Craig Young)
1
static Image *ReadRLEImage(const ImageInfo *image_info,ExceptionInfo *exception) { #define SkipLinesOp 0x01 #define SetColorOp 0x02 #define SkipPixelsOp 0x03 #define ByteDataOp 0x05 #define RunDataOp 0x06 #define EOFOp 0x07 char magick[12]; Image *image; int opcode, operand, status; ...
103,316,004,124,519,400,000,000,000,000,000,000,000
rle.c
129,418,496,808,109,920,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-10050
Heap-based buffer overflow in the ReadRLEImage function in coders/rle.c in ImageMagick 6.9.4-8 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted RLE file.
https://nvd.nist.gov/vuln/detail/CVE-2016-10050
220,467
ImageMagick
139d4323c40d7363bfdd2382c3821a6f76d69430
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/139d4323c40d7363bfdd2382c3821a6f76d69430
RLE check for pixel offset less than 0 (heap overflow report from Craig Young)
0
static Image *ReadRLEImage(const ImageInfo *image_info,ExceptionInfo *exception) { #define SkipLinesOp 0x01 #define SetColorOp 0x02 #define SkipPixelsOp 0x03 #define ByteDataOp 0x05 #define RunDataOp 0x06 #define EOFOp 0x07 char magick[12]; Image *image; int opcode, operand, status; ...
62,132,515,838,777,290,000,000,000,000,000,000,000
rle.c
79,939,741,749,934,050,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-10050
Heap-based buffer overflow in the ReadRLEImage function in coders/rle.c in ImageMagick 6.9.4-8 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted RLE file.
https://nvd.nist.gov/vuln/detail/CVE-2016-10050
195,043
libtiff
be4c85b16e8801a16eec25e80eb9f3dd6a96731b
https://github.com/vadz/libtiff
https://github.com/vadz/libtiff/commit/be4c85b16e8801a16eec25e80eb9f3dd6a96731b
Fix NULL pointer dereference in TIFFPrintDirectory The TIFFPrintDirectory function relies on the following assumptions, supposed to be guaranteed by the specification: (a) A Transfer Function field is only present if the TIFF file has photometric type < 3. (b) If SamplesPerPixel > Color Channels, then the ExtraS...
1
TIFFPrintDirectory(TIFF* tif, FILE* fd, long flags) { TIFFDirectory *td = &tif->tif_dir; char *sep; long l, n; #if defined(__WIN32__) && (defined(_MSC_VER) || defined(__MINGW32__)) fprintf(fd, "TIFF Directory at offset 0x%I64x (%I64u)\n", (unsigned __int64) tif->tif_diroff, (unsigned __int64) tif->tif_diroff);...
41,890,862,415,543,167,000,000,000,000,000,000,000
tif_print.c
173,688,956,736,061,900,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2018-7456
A NULL Pointer Dereference occurs in the function TIFFPrintDirectory in tif_print.c in LibTIFF 3.9.3, 3.9.4, 3.9.5, 3.9.6, 3.9.7, 4.0.0alpha4, 4.0.0alpha5, 4.0.0alpha6, 4.0.0beta7, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.4beta, 4.0.5, 4.0.6, 4.0.7, 4.0.8 and 4.0.9 when using the tiffinfo tool to print crafted TIFF infor...
https://nvd.nist.gov/vuln/detail/CVE-2018-7456
220,554
libtiff
be4c85b16e8801a16eec25e80eb9f3dd6a96731b
https://github.com/vadz/libtiff
https://github.com/vadz/libtiff/commit/be4c85b16e8801a16eec25e80eb9f3dd6a96731b
Fix NULL pointer dereference in TIFFPrintDirectory The TIFFPrintDirectory function relies on the following assumptions, supposed to be guaranteed by the specification: (a) A Transfer Function field is only present if the TIFF file has photometric type < 3. (b) If SamplesPerPixel > Color Channels, then the ExtraS...
0
TIFFPrintDirectory(TIFF* tif, FILE* fd, long flags) { TIFFDirectory *td = &tif->tif_dir; char *sep; long l, n; #if defined(__WIN32__) && (defined(_MSC_VER) || defined(__MINGW32__)) fprintf(fd, "TIFF Directory at offset 0x%I64x (%I64u)\n", (unsigned __int64) tif->tif_diroff, (unsigned __int64) tif->tif_diroff);...
111,100,651,816,090,560,000,000,000,000,000,000,000
tif_print.c
170,535,908,478,173,840,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2018-7456
A NULL Pointer Dereference occurs in the function TIFFPrintDirectory in tif_print.c in LibTIFF 3.9.3, 3.9.4, 3.9.5, 3.9.6, 3.9.7, 4.0.0alpha4, 4.0.0alpha5, 4.0.0alpha6, 4.0.0beta7, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.4beta, 4.0.5, 4.0.6, 4.0.7, 4.0.8 and 4.0.9 when using the tiffinfo tool to print crafted TIFF infor...
https://nvd.nist.gov/vuln/detail/CVE-2018-7456
195,065
unicorn
c733bbada356b0373fa8aa72c044574bb855fd24
https://github.com/unicorn-engine/unicorn
https://github.com/unicorn-engine/unicorn/commit/c733bbada356b0373fa8aa72c044574bb855fd24
Fix wrong offset used in split_region
1
static bool split_region(struct uc_struct *uc, MemoryRegion *mr, uint64_t address, size_t size, bool do_delete) { uint8_t *backup; uint32_t perms; uint64_t begin, end, chunk_end; size_t l_size, m_size, r_size; RAMBlock *block = NULL; bool prealloc = false; chunk_end...
245,216,537,662,050,600,000,000,000,000,000,000,000
uc.c
200,672,098,826,650,160,000,000,000,000,000,000,000
[ "CWE-697" ]
CVE-2021-44078
An issue was discovered in split_region in uc.c in Unicorn Engine before 2.0.0-rc5. It allows local attackers to escape the sandbox. An attacker must first obtain the ability to execute crafted code in the target sandbox in order to exploit this vulnerability. The specific flaw exists within the virtual memory manager....
https://nvd.nist.gov/vuln/detail/CVE-2021-44078
220,950
unicorn
c733bbada356b0373fa8aa72c044574bb855fd24
https://github.com/unicorn-engine/unicorn
https://github.com/unicorn-engine/unicorn/commit/c733bbada356b0373fa8aa72c044574bb855fd24
Fix wrong offset used in split_region
0
static bool split_region(struct uc_struct *uc, MemoryRegion *mr, uint64_t address, size_t size, bool do_delete) { uint8_t *backup; uint32_t perms; uint64_t begin, end, chunk_end; size_t l_size, m_size, r_size; RAMBlock *block = NULL; bool prealloc = false; chunk_end...
40,500,248,184,233,647,000,000,000,000,000,000,000
uc.c
7,579,714,166,145,243,000,000,000,000,000,000,000
[ "CWE-697" ]
CVE-2021-44078
An issue was discovered in split_region in uc.c in Unicorn Engine before 2.0.0-rc5. It allows local attackers to escape the sandbox. An attacker must first obtain the ability to execute crafted code in the target sandbox in order to exploit this vulnerability. The specific flaw exists within the virtual memory manager....
https://nvd.nist.gov/vuln/detail/CVE-2021-44078
195,070
tensorflow
448a16182065bd08a202d9057dd8ca541e67996c
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/448a16182065bd08a202d9057dd8ca541e67996c
Prevent stack overflow when FunctionLib in GraphDef has a self-recursive function. It is likely that no recursivity is supported, but we should handle this separately. PiperOrigin-RevId: 414860329 Change-Id: I02a2270e86282b37362ddd485eeef16fb986a9e0
1
static Status ValidateSavedTensors(const GraphDef& graph_def) { for (const auto& node : graph_def.node()) { TF_RETURN_IF_ERROR(ValidateNode(node)); } if (graph_def.has_library()) { const FunctionDefLibrary& library = graph_def.library(); for (const auto& function : library.function()) { for (co...
82,095,244,889,161,240,000,000,000,000,000,000,000
loader.cc
163,875,138,317,357,770,000,000,000,000,000,000,000
[ "CWE-400" ]
CVE-2022-23591
Tensorflow is an Open Source Machine Learning Framework. The `GraphDef` format in TensorFlow does not allow self recursive functions. The runtime assumes that this invariant is satisfied. However, a `GraphDef` containing a fragment such as the following can be consumed when loading a `SavedModel`. This would result in ...
https://nvd.nist.gov/vuln/detail/CVE-2022-23591
221,109
tensorflow
448a16182065bd08a202d9057dd8ca541e67996c
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/448a16182065bd08a202d9057dd8ca541e67996c
Prevent stack overflow when FunctionLib in GraphDef has a self-recursive function. It is likely that no recursivity is supported, but we should handle this separately. PiperOrigin-RevId: 414860329 Change-Id: I02a2270e86282b37362ddd485eeef16fb986a9e0
0
static Status ValidateSavedTensors(const GraphDef& graph_def) { for (const auto& node : graph_def.node()) { TF_RETURN_IF_ERROR(ValidateNode(node)); } if (graph_def.has_library()) { const FunctionDefLibrary& library = graph_def.library(); for (const auto& function : library.function()) { for (co...
61,611,172,031,557,740,000,000,000,000,000,000,000
loader.cc
109,035,991,591,774,980,000,000,000,000,000,000,000
[ "CWE-400" ]
CVE-2022-23591
Tensorflow is an Open Source Machine Learning Framework. The `GraphDef` format in TensorFlow does not allow self recursive functions. The runtime assumes that this invariant is satisfied. However, a `GraphDef` containing a fragment such as the following can be consumed when loading a `SavedModel`. This would result in ...
https://nvd.nist.gov/vuln/detail/CVE-2022-23591
195,072
ImageMagick
3b0fe05cddd8910f84e51b4d50099702ea45ba4a
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/3b0fe05cddd8910f84e51b4d50099702ea45ba4a
Fixed memory leak reported in #456.
1
static Image *ReadARTImage(const ImageInfo *image_info,ExceptionInfo *exception) { const unsigned char *pixels; Image *image; QuantumInfo *quantum_info; MagickBooleanType status; size_t length; ssize_t count, y; /* Open image file. */ assert(image_info != (const I...
293,507,322,430,629,180,000,000,000,000,000,000,000
art.c
127,793,943,860,368,180,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2017-9143
In ImageMagick 7.0.5-5, the ReadARTImage function in coders/art.c allows attackers to cause a denial of service (memory leak) via a crafted .art file.
https://nvd.nist.gov/vuln/detail/CVE-2017-9143
221,122
ImageMagick
3b0fe05cddd8910f84e51b4d50099702ea45ba4a
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/3b0fe05cddd8910f84e51b4d50099702ea45ba4a
Fixed memory leak reported in #456.
0
static Image *ReadARTImage(const ImageInfo *image_info,ExceptionInfo *exception) { const unsigned char *pixels; Image *image; QuantumInfo *quantum_info; MagickBooleanType status; size_t length; ssize_t count, y; /* Open image file. */ assert(image_info != (const I...
177,360,541,747,278,200,000,000,000,000,000,000,000
art.c
159,893,501,427,053,520,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2017-9143
In ImageMagick 7.0.5-5, the ReadARTImage function in coders/art.c allows attackers to cause a denial of service (memory leak) via a crafted .art file.
https://nvd.nist.gov/vuln/detail/CVE-2017-9143
195,086
openexr
db217f29dfb24f6b4b5100c24ac5e7490e1c57d0
https://github.com/AcademySoftwareFoundation/openexr
https://github.com/AcademySoftwareFoundation/openexr/commit/db217f29dfb24f6b4b5100c24ac5e7490e1c57d0
DeepScanlineInputFile now uses chunk size test from DeepTiledInputFile (#1205) Signed-off-by: Peter Hillman <peterh@wetafx.co.nz>
1
readSampleCountForLineBlock(InputStreamMutex* streamData, DeepScanLineInputFile::Data* data, int lineBlockId) { streamData->is->seekg(data->lineOffsets[lineBlockId]); if (isMultiPart(data->version)) { int partNumber; OPENEXR_IMF_INTERN...
268,032,354,561,063,430,000,000,000,000,000,000,000
ImfDeepScanLineInputFile.cpp
296,888,461,175,287,170,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2021-45942
OpenEXR 3.1.x before 3.1.4 has a heap-based buffer overflow in Imf_3_1::LineCompositeTask::execute (called from IlmThread_3_1::NullThreadPoolProvider::addTask and IlmThread_3_1::ThreadPool::addGlobalTask). NOTE: db217f2 may be inapplicable.
https://nvd.nist.gov/vuln/detail/CVE-2021-45942
221,557
openexr
db217f29dfb24f6b4b5100c24ac5e7490e1c57d0
https://github.com/AcademySoftwareFoundation/openexr
https://github.com/AcademySoftwareFoundation/openexr/commit/db217f29dfb24f6b4b5100c24ac5e7490e1c57d0
DeepScanlineInputFile now uses chunk size test from DeepTiledInputFile (#1205) Signed-off-by: Peter Hillman <peterh@wetafx.co.nz>
0
readSampleCountForLineBlock(InputStreamMutex* streamData, DeepScanLineInputFile::Data* data, int lineBlockId) { streamData->is->seekg(data->lineOffsets[lineBlockId]); if (isMultiPart(data->version)) { int partNumber; OPENEXR_IMF_INTERN...
125,719,970,870,006,760,000,000,000,000,000,000,000
ImfDeepScanLineInputFile.cpp
244,903,926,827,325,830,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2021-45942
OpenEXR 3.1.x before 3.1.4 has a heap-based buffer overflow in Imf_3_1::LineCompositeTask::execute (called from IlmThread_3_1::NullThreadPoolProvider::addTask and IlmThread_3_1::ThreadPool::addGlobalTask). NOTE: db217f2 may be inapplicable.
https://nvd.nist.gov/vuln/detail/CVE-2021-45942
195,089
radare2
a07dedb804a82bc01c07072861942dd80c6b6d62
https://github.com/radare/radare2
https://github.com/radare/radare2/commit/a07dedb804a82bc01c07072861942dd80c6b6d62
Fix #18667 - division by zero in the macho parser ##bin
1
static void rebase_buffer(struct MACH0_(obj_t) *obj, ut64 off, RIODesc *fd, ut8 *buf, int count) { if (obj->rebasing_buffer) { return; } obj->rebasing_buffer = true; ut64 eob = off + count; int i = 0; for (; i < obj->nsegs; i++) { if (!obj->chained_starts[i]) { continue; } ut64 page_size = obj->chained...
289,447,408,840,365,700,000,000,000,000,000,000,000
bin_mach0.c
273,182,220,740,970,240,000,000,000,000,000,000,000
[ "CWE-415" ]
CVE-2021-32613
In radare2 through 5.3.0 there is a double free vulnerability in the pyc parse via a crafted file which can lead to DoS.
https://nvd.nist.gov/vuln/detail/CVE-2021-32613
221,619
radare2
a07dedb804a82bc01c07072861942dd80c6b6d62
https://github.com/radare/radare2
https://github.com/radare/radare2/commit/a07dedb804a82bc01c07072861942dd80c6b6d62
Fix #18667 - division by zero in the macho parser ##bin
0
static void rebase_buffer(struct MACH0_(obj_t) *obj, ut64 off, RIODesc *fd, ut8 *buf, int count) { if (obj->rebasing_buffer) { return; } obj->rebasing_buffer = true; ut64 eob = off + count; int i = 0; for (; i < obj->nsegs; i++) { if (!obj->chained_starts[i]) { continue; } int page_size = obj->chained_...
207,568,537,214,620,600,000,000,000,000,000,000,000
bin_mach0.c
45,796,997,256,051,670,000,000,000,000,000,000,000
[ "CWE-415" ]
CVE-2021-32613
In radare2 through 5.3.0 there is a double free vulnerability in the pyc parse via a crafted file which can lead to DoS.
https://nvd.nist.gov/vuln/detail/CVE-2021-32613
195,219
tensorflow
1361fb7e29449629e1df94d44e0427ebec8c83c7
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/1361fb7e29449629e1df94d44e0427ebec8c83c7
Fix abort caused by allocating a too large vector. We need to make sure that the number of dimensions in a shape is within limits. PiperOrigin-RevId: 408997911 Change-Id: If59e1c23f2ec9c2d4ff4d8632fd62b2a7773a4eb
1
Status InferenceContext::InternalMakeShapeFromTensor( bool treat_unknown_scalar_tensor_as_unknown_shape, const Tensor* t, ShapeHandle tensor_shape, ShapeHandle* out) { // Only callers who have set if (!treat_unknown_scalar_tensor_as_unknown_shape) { TF_RETURN_IF_ERROR(WithRank(tensor_shape, 1, &tensor_s...
237,311,730,790,925,800,000,000,000,000,000,000,000
shape_inference.cc
153,888,615,473,057,040,000,000,000,000,000,000,000
[ "CWE-400" ]
CVE-2022-23580
Tensorflow is an Open Source Machine Learning Framework. During shape inference, TensorFlow can allocate a large vector based on a value from a tensor controlled by the user. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as...
https://nvd.nist.gov/vuln/detail/CVE-2022-23580
222,610
tensorflow
1361fb7e29449629e1df94d44e0427ebec8c83c7
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/1361fb7e29449629e1df94d44e0427ebec8c83c7
Fix abort caused by allocating a too large vector. We need to make sure that the number of dimensions in a shape is within limits. PiperOrigin-RevId: 408997911 Change-Id: If59e1c23f2ec9c2d4ff4d8632fd62b2a7773a4eb
0
Status InferenceContext::InternalMakeShapeFromTensor( bool treat_unknown_scalar_tensor_as_unknown_shape, const Tensor* t, ShapeHandle tensor_shape, ShapeHandle* out) { // Only callers who have set if (!treat_unknown_scalar_tensor_as_unknown_shape) { TF_RETURN_IF_ERROR(WithRank(tensor_shape, 1, &tensor_s...
45,252,590,481,459,420,000,000,000,000,000,000,000
shape_inference.cc
78,443,107,754,275,295,000,000,000,000,000,000,000
[ "CWE-400" ]
CVE-2022-23580
Tensorflow is an Open Source Machine Learning Framework. During shape inference, TensorFlow can allocate a large vector based on a value from a tensor controlled by the user. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as...
https://nvd.nist.gov/vuln/detail/CVE-2022-23580
195,232
flatpak
445bddeee657fdc8d2a0a1f0de12975400d4fc1a
https://github.com/flatpak/flatpak
https://github.com/flatpak/flatpak/commit/445bddeee657fdc8d2a0a1f0de12975400d4fc1a
Make --nofilesystem=host/home remove access to subdirs of those Previously --nofilesystem=host only removed specifically access to the `host` permissions, and not necessarily other filesystems (like `home` or `/some/path`). This isn't very useful to limit access because you don't know what other filesystems the app ma...
1
flatpak_context_merge (FlatpakContext *context, FlatpakContext *other) { GHashTableIter iter; gpointer key, value; context->shares &= ~other->shares_valid; context->shares |= other->shares; context->shares_valid |= other->shares_valid; context->sockets &= ~other->sockets_valid; con...
120,286,214,034,948,050,000,000,000,000,000,000,000
flatpak-context.c
326,647,572,026,353,200,000,000,000,000,000,000,000
[ "CWE-22" ]
CVE-2022-21682
Flatpak is a Linux application sandboxing and distribution framework. A path traversal vulnerability affects versions of Flatpak prior to 1.12.3 and 1.10.6. flatpak-builder applies `finish-args` last in the build. At this point the build directory will have the full access that is specified in the manifest, so running ...
https://nvd.nist.gov/vuln/detail/CVE-2022-21682
222,771
flatpak
445bddeee657fdc8d2a0a1f0de12975400d4fc1a
https://github.com/flatpak/flatpak
https://github.com/flatpak/flatpak/commit/445bddeee657fdc8d2a0a1f0de12975400d4fc1a
Make --nofilesystem=host/home remove access to subdirs of those Previously --nofilesystem=host only removed specifically access to the `host` permissions, and not necessarily other filesystems (like `home` or `/some/path`). This isn't very useful to limit access because you don't know what other filesystems the app ma...
0
flatpak_context_merge (FlatpakContext *context, FlatpakContext *other) { GHashTableIter iter; gpointer key, value; gboolean no_home = FALSE; gboolean no_host = FALSE; context->shares &= ~other->shares_valid; context->shares |= other->shares; context->shares_valid |= other->shares_v...
310,154,835,461,227,000,000,000,000,000,000,000,000
flatpak-context.c
25,742,465,989,604,863,000,000,000,000,000,000,000
[ "CWE-22" ]
CVE-2022-21682
Flatpak is a Linux application sandboxing and distribution framework. A path traversal vulnerability affects versions of Flatpak prior to 1.12.3 and 1.10.6. flatpak-builder applies `finish-args` last in the build. At this point the build directory will have the full access that is specified in the manifest, so running ...
https://nvd.nist.gov/vuln/detail/CVE-2022-21682
195,248
ImageMagick
9c9a84cec4ab28ee0b57c2b9266d6fbe68183512
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/9c9a84cec4ab28ee0b57c2b9266d6fbe68183512
fix issue: outside the range of representable values of type 'unsigned int' at coders/psd.c:1025 (#4963) * fix Division by zero in XMenuWidget() of MagickCore/widget.c * Fix memory leak in AnimateImageCommand() of MagickWand/animate.c and DisplayImageCommand() of MagickWand/display.c * fix Division by zero in ReadEn...
1
static MagickBooleanType ReadPSDChannelPixels(Image *image,const ssize_t row, const PixelChannel channel,const unsigned char *pixels, ExceptionInfo *exception) { Quantum pixel; const unsigned char *p; Quantum *q; ssize_t x; size_t packet_size; p=pixels; q=GetAuthenticPixels(im...
78,370,691,228,984,510,000,000,000,000,000,000,000
psd.c
161,913,187,484,263,500,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2022-32545
A vulnerability was found in ImageMagick, causing an outside the range of representable values of type 'unsigned char' at coders/psd.c, when crafted or untrusted input is processed. This leads to a negative impact to application availability or other problems related to undefined behavior.
https://nvd.nist.gov/vuln/detail/CVE-2022-32545
223,203
ImageMagick
9c9a84cec4ab28ee0b57c2b9266d6fbe68183512
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/9c9a84cec4ab28ee0b57c2b9266d6fbe68183512
fix issue: outside the range of representable values of type 'unsigned int' at coders/psd.c:1025 (#4963) * fix Division by zero in XMenuWidget() of MagickCore/widget.c * Fix memory leak in AnimateImageCommand() of MagickWand/animate.c and DisplayImageCommand() of MagickWand/display.c * fix Division by zero in ReadEn...
0
static MagickBooleanType ReadPSDChannelPixels(Image *image,const ssize_t row, const PixelChannel channel,const unsigned char *pixels, ExceptionInfo *exception) { Quantum pixel; const unsigned char *p; Quantum *q; ssize_t x; size_t packet_size; p=pixels; q=GetAuthenticPixels(im...
46,966,122,390,366,470,000,000,000,000,000,000,000
psd.c
288,504,131,922,116,250,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2022-32545
A vulnerability was found in ImageMagick, causing an outside the range of representable values of type 'unsigned char' at coders/psd.c, when crafted or untrusted input is processed. This leads to a negative impact to application availability or other problems related to undefined behavior.
https://nvd.nist.gov/vuln/detail/CVE-2022-32545
195,268
tensorflow
0657c83d08845cc434175934c642299de2c0f042
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/0657c83d08845cc434175934c642299de2c0f042
Fix heap OOB read/write due to incorrect indexing. PiperOrigin-RevId: 408578046 Change-Id: Ifc9ffea49e5890f55fcb2c27568611052c3ddcfa
1
StatusOr<FullTypeDef> SpecializeType(const AttrSlice& attrs, const OpDef& op_def) { FullTypeDef ft; ft.set_type_id(TFT_PRODUCT); for (int i = 0; i < op_def.output_arg_size(); i++) { auto* t = ft.add_args(); *t = op_def.output_arg(i).experimental_full_type(); // ...
1,779,476,434,608,858,000,000,000,000,000,000,000
full_type_util.cc
314,176,305,959,180,500,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2022-23574
Tensorflow is an Open Source Machine Learning Framework. There is a typo in TensorFlow's `SpecializeType` which results in heap OOB read/write. Due to a typo, `arg` is initialized to the `i`th mutable argument in a loop where the loop index is `j`. Hence it is possible to assign to `arg` from outside the vector of argu...
https://nvd.nist.gov/vuln/detail/CVE-2022-23574
223,535
tensorflow
0657c83d08845cc434175934c642299de2c0f042
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/0657c83d08845cc434175934c642299de2c0f042
Fix heap OOB read/write due to incorrect indexing. PiperOrigin-RevId: 408578046 Change-Id: Ifc9ffea49e5890f55fcb2c27568611052c3ddcfa
0
StatusOr<FullTypeDef> SpecializeType(const AttrSlice& attrs, const OpDef& op_def) { FullTypeDef ft; ft.set_type_id(TFT_PRODUCT); for (int i = 0; i < op_def.output_arg_size(); i++) { auto* t = ft.add_args(); *t = op_def.output_arg(i).experimental_full_type(); // ...
251,313,658,553,166,780,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2022-23574
Tensorflow is an Open Source Machine Learning Framework. There is a typo in TensorFlow's `SpecializeType` which results in heap OOB read/write. Due to a typo, `arg` is initialized to the `i`th mutable argument in a loop where the loop index is `j`. Hence it is possible to assign to `arg` from outside the vector of argu...
https://nvd.nist.gov/vuln/detail/CVE-2022-23574
195,269
gpac
5dd71c7201a3e5cf40732d585bfb21c906c171d3
https://github.com/gpac/gpac
https://github.com/gpac/gpac/commit/5dd71c7201a3e5cf40732d585bfb21c906c171d3
fixed #1901
1
void naludmx_create_avc_decoder_config(GF_NALUDmxCtx *ctx, u8 **dsi, u32 *dsi_size, u8 **dsi_enh, u32 *dsi_enh_size, u32 *max_width, u32 *max_height, u32 *max_enh_width, u32 *max_enh_height, GF_Fraction *sar) { u32 i, count; Bool first = GF_TRUE; Bool first_svc = GF_TRUE; GF_AVCConfig *cfg; GF_AVCConfig *avcc; GF...
116,251,717,258,867,500,000,000,000,000,000,000,000
reframe_nalu.c
261,113,698,868,455,370,000,000,000,000,000,000,000
[ "CWE-697" ]
CVE-2021-40562
A Segmentation fault caused by a floating point exception exists in Gpac through 1.0.1 using mp4box via the naludmx_enqueue_or_dispatch function in reframe_nalu.c, which causes a denial of service.
https://nvd.nist.gov/vuln/detail/CVE-2021-40562