idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
158,269 | libav | ce7aee9b733134649a6ce2fa743e51733f33e67e | https://github.com/libav/libav | https://git.libav.org/?p=libav.git;a=commit;h=ce7aee9b733134649a6ce2fa743e51733f33e67e | dpcm: ignore extra unpaired bytes in stereo streams.
Fixes: CVE-2011-3951
Found-by: Mateusz "j00ru" Jurczyk and Gynvael Coldwind | 0 | static int dpcm_decode_frame(AVCodecContext *avctx, void *data,
int *got_frame_ptr, AVPacket *avpkt)
{
const uint8_t *buf = avpkt->data;
int buf_size = avpkt->size;
const uint8_t *buf_end = buf + buf_size;
DPCMContext *s = avctx->priv_data;
int out = 0, ret;
int pred... | 57,234,322,071,102,895,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2011-3951 | The dpcm_decode_frame function in dpcm.c in libavcodec in FFmpeg before 0.10 and in Libav 0.5.x before 0.5.9, 0.6.x before 0.6.6, 0.7.x before 0.7.6, and 0.8.x before 0.8.1 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted stereo stream in a media... | https://nvd.nist.gov/vuln/detail/CVE-2011-3951 |
10,791 | linux | ea04efee7635c9120d015dcdeeeb6988130cb67a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/ea04efee7635c9120d015dcdeeeb6988130cb67a | Input: ims-psu - check if CDC union descriptor is sane
Before trying to use CDC union descriptor, try to validate whether that it
is sane by checking that intf->altsetting->extra is big enough and that
descriptor bLength is not too big and not too small.
Reported-by: Andrey Konovalov <andreyknvl@google.com>
Signed-of... | 1 | static const struct usb_cdc_union_desc *
ims_pcu_get_cdc_union_desc(struct usb_interface *intf)
{
const void *buf = intf->altsetting->extra;
size_t buflen = intf->altsetting->extralen;
struct usb_cdc_union_desc *union_desc;
if (!buf) {
dev_err(&intf->dev, "Missing descriptor data\n");
return NULL;
}
if (!bu... | 205,163,903,394,648,750,000,000,000,000,000,000,000 | ims-pcu.c | 276,473,746,066,141,500,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-16645 | The ims_pcu_get_cdc_union_desc function in drivers/input/misc/ims-pcu.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (ims_pcu_parse_cdc_data out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device. | https://nvd.nist.gov/vuln/detail/CVE-2017-16645 |
159,866 | linux | ea04efee7635c9120d015dcdeeeb6988130cb67a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/ea04efee7635c9120d015dcdeeeb6988130cb67a | Input: ims-psu - check if CDC union descriptor is sane
Before trying to use CDC union descriptor, try to validate whether that it
is sane by checking that intf->altsetting->extra is big enough and that
descriptor bLength is not too big and not too small.
Reported-by: Andrey Konovalov <andreyknvl@google.com>
Signed-of... | 0 | ims_pcu_get_cdc_union_desc(struct usb_interface *intf)
{
const void *buf = intf->altsetting->extra;
size_t buflen = intf->altsetting->extralen;
struct usb_cdc_union_desc *union_desc;
if (!buf) {
dev_err(&intf->dev, "Missing descriptor data\n");
return NULL;
}
if (!buflen) {
dev_err(&intf->dev, "Zero lengt... | 303,870,268,898,100,700,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2017-16645 | The ims_pcu_get_cdc_union_desc function in drivers/input/misc/ims-pcu.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (ims_pcu_parse_cdc_data out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device. | https://nvd.nist.gov/vuln/detail/CVE-2017-16645 |
10,792 | gstreamer | 566583e87147f774e7fc4c78b5f7e61d427e40a9 | https://github.com/GStreamer/gstreamer | https://cgit.freedesktop.org/gstreamer/gst-plugins-base/commit/?id=566583e87147f774e7fc4c78b5f7e61d427e40a9 | vorbistag: Protect memory allocation calculation from overflow.
Patch by: Tomas Hoger <thoger@redhat.com> Fixes CVE-2009-0586 | 1 | gst_vorbis_tag_add_coverart (GstTagList * tags, const gchar * img_data_base64,
gint base64_len)
{
GstBuffer *img;
guchar *img_data;
gsize img_len;
guint save = 0;
gint state = 0;
if (base64_len < 2)
goto not_enough_data;
img_data = g_try_malloc0 (base64_len * 3 / 4);
if (img_data == NULL)
... | 146,313,219,496,584,400,000,000,000,000,000,000,000 | gstvorbistag.c | 211,094,231,011,375,400,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2009-0586 | Integer overflow in the gst_vorbis_tag_add_coverart function (gst-libs/gst/tag/gstvorbistag.c) in vorbistag in gst-plugins-base (aka gstreamer-plugins-base) before 0.10.23 in GStreamer allows context-dependent attackers to execute arbitrary code via a crafted COVERART tag that is converted from a base64 representation,... | https://nvd.nist.gov/vuln/detail/CVE-2009-0586 |
194,617 | gstreamer | 566583e87147f774e7fc4c78b5f7e61d427e40a9 | https://github.com/GStreamer/gstreamer | https://cgit.freedesktop.org/gstreamer/gst-plugins-base/commit/?id=566583e87147f774e7fc4c78b5f7e61d427e40a9 | vorbistag: Protect memory allocation calculation from overflow.
Patch by: Tomas Hoger <thoger@redhat.com> Fixes CVE-2009-0586 | 0 | gst_vorbis_tag_add_coverart (GstTagList * tags, const gchar * img_data_base64,
gst_vorbis_tag_add_coverart (GstTagList * tags, gchar * img_data_base64,
gint base64_len)
{
GstBuffer *img;
gsize img_len;
guchar *out;
guint save = 0;
gint state = 0;
if (base64_len < 2)
goto not_enough_data;
... | 289,066,988,325,537,200,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2009-0586 | Integer overflow in the gst_vorbis_tag_add_coverart function (gst-libs/gst/tag/gstvorbistag.c) in vorbistag in gst-plugins-base (aka gstreamer-plugins-base) before 0.10.23 in GStreamer allows context-dependent attackers to execute arbitrary code via a crafted COVERART tag that is converted from a base64 representation,... | https://nvd.nist.gov/vuln/detail/CVE-2009-0586 |
10,793 | qemu | 070c4b92b8cd5390889716677a0b92444d6e087a | https://github.com/bonzini/qemu | https://git.qemu.org/?p=qemu.git;a=commit;h=070c4b92b8cd5390889716677a0b92444d6e087a | net: mcf: limit buffer descriptor count
ColdFire Fast Ethernet Controller uses buffer descriptors to manage
data flow to/fro receive & transmit queues. While transmitting
packets, it could continue to read buffer descriptors if a buffer
descriptor has length of zero and has crafted values in bd.flags.
Set upper limit ... | 1 | static void mcf_fec_do_tx(mcf_fec_state *s)
{
uint32_t addr;
mcf_fec_bd bd;
int frame_size;
int len;
uint8_t frame[FEC_MAX_FRAME_SIZE];
uint8_t *ptr;
DPRINTF("do_tx\n");
ptr = frame;
frame_size = 0;
addr = s->tx_descriptor;
while (1) {
mcf_fec_read_bd(&bd, addr);
... | 39,214,142,760,099,140,000,000,000,000,000,000,000 | mcf_fec.c | 198,260,955,982,896,700,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2016-7908 | The mcf_fec_do_tx function in hw/net/mcf_fec.c in QEMU (aka Quick Emulator) does not properly limit the buffer descriptor count when transmitting packets, which allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via vectors involving a buffer descriptor with a lengt... | https://nvd.nist.gov/vuln/detail/CVE-2016-7908 |
194,660 | qemu | 070c4b92b8cd5390889716677a0b92444d6e087a | https://github.com/bonzini/qemu | https://git.qemu.org/?p=qemu.git;a=commit;h=070c4b92b8cd5390889716677a0b92444d6e087a | net: mcf: limit buffer descriptor count
ColdFire Fast Ethernet Controller uses buffer descriptors to manage
data flow to/fro receive & transmit queues. While transmitting
packets, it could continue to read buffer descriptors if a buffer
descriptor has length of zero and has crafted values in bd.flags.
Set upper limit ... | 0 | static void mcf_fec_do_tx(mcf_fec_state *s)
{
uint32_t addr;
uint32_t addr;
mcf_fec_bd bd;
int frame_size;
int len, descnt = 0;
uint8_t frame[FEC_MAX_FRAME_SIZE];
uint8_t *ptr;
ptr = frame;
ptr = frame;
frame_size = 0;
addr = s->tx_descriptor;
while (descnt++ < ... | 215,806,353,963,416,540,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2016-7908 | The mcf_fec_do_tx function in hw/net/mcf_fec.c in QEMU (aka Quick Emulator) does not properly limit the buffer descriptor count when transmitting packets, which allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via vectors involving a buffer descriptor with a lengt... | https://nvd.nist.gov/vuln/detail/CVE-2016-7908 |
10,794 | xserver | 5725849a1b427cd4a72b84e57f211edb35838718 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/render/render.c?id=5725849a1b427cd4a72b84e57f211edb35838718 | render: Bounds check for nglyphs in ProcRenderAddGlyphs (#28801)
Signed-off-by: Adam Jackson <ajax@redhat.com>
Reviewed-by: Julien Cristau <jcristau@debian.org>
Signed-off-by: Keith Packard <keithp@keithp.com> | 1 | ProcRenderAddGlyphs (ClientPtr client)
{
GlyphSetPtr glyphSet;
REQUEST(xRenderAddGlyphsReq);
GlyphNewRec glyphsLocal[NLOCALGLYPH];
GlyphNewPtr glyphsBase, glyphs, glyph_new;
int remain, nglyphs;
CARD32 *gids;
xGlyphInfo *gi;
CARD8 *bits;
unsigned int s... | 1,204,159,738,485,995,000,000,000,000,000,000,000 | render.c | 107,649,397,098,920,510,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2010-4819 | The ProcRenderAddGlyphs function in the Render extension (render/render.c) in X.Org xserver 1.7.7 and earlier allows local users to read arbitrary memory and possibly cause a denial of service (server crash) via unspecified vectors related to an "input sanitization flaw." | https://nvd.nist.gov/vuln/detail/CVE-2010-4819 |
158,288 | xserver | 5725849a1b427cd4a72b84e57f211edb35838718 | http://gitweb.freedesktop.org/?p=xorg/xserver | https://cgit.freedesktop.org/xorg/xserver/commit/render/render.c?id=5725849a1b427cd4a72b84e57f211edb35838718 | render: Bounds check for nglyphs in ProcRenderAddGlyphs (#28801)
Signed-off-by: Adam Jackson <ajax@redhat.com>
Reviewed-by: Julien Cristau <jcristau@debian.org>
Signed-off-by: Keith Packard <keithp@keithp.com> | 0 | ProcRenderAddGlyphs (ClientPtr client)
{
GlyphSetPtr glyphSet;
REQUEST(xRenderAddGlyphsReq);
GlyphNewRec glyphsLocal[NLOCALGLYPH];
GlyphNewPtr glyphsBase, glyphs, glyph_new;
int remain, nglyphs;
CARD32 *gids;
xGlyphInfo *gi;
CARD8 *bits;
unsigned int s... | 89,505,534,230,672,750,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2010-4819 | The ProcRenderAddGlyphs function in the Render extension (render/render.c) in X.Org xserver 1.7.7 and earlier allows local users to read arbitrary memory and possibly cause a denial of service (server crash) via unspecified vectors related to an "input sanitization flaw." | https://nvd.nist.gov/vuln/detail/CVE-2010-4819 |
10,795 | FFmpeg | 2080bc33717955a0e4268e738acf8c1eeddbf8cb | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/2080bc33717955a0e4268e738acf8c1eeddbf8cb | avcodec/utils: correct align value for interplay
Fixes out of array access
Fixes: 452/fuzz-1-ffmpeg_VIDEO_AV_CODEC_ID_INTERPLAY_VIDEO_fuzzer
Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/targets/ffmpeg
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 1 | void avcodec_align_dimensions2(AVCodecContext *s, int *width, int *height,
int linesize_align[AV_NUM_DATA_POINTERS])
{
int i;
int w_align = 1;
int h_align = 1;
AVPixFmtDescriptor const *desc = av_pix_fmt_desc_get(s->pix_fmt);
if (desc) {
w_align = 1 << desc->l... | 327,181,451,425,415,020,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2017-7865 | FFmpeg before 2017-01-24 has an out-of-bounds write caused by a heap-based buffer overflow related to the ipvideo_decode_block_opcode_0xA function in libavcodec/interplayvideo.c and the avcodec_align_dimensions2 function in libavcodec/utils.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-7865 |
184,550 | FFmpeg | 2080bc33717955a0e4268e738acf8c1eeddbf8cb | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/2080bc33717955a0e4268e738acf8c1eeddbf8cb | avcodec/utils: correct align value for interplay
Fixes out of array access
Fixes: 452/fuzz-1-ffmpeg_VIDEO_AV_CODEC_ID_INTERPLAY_VIDEO_fuzzer
Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/targets/ffmpeg
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 0 | void avcodec_align_dimensions2(AVCodecContext *s, int *width, int *height,
int linesize_align[AV_NUM_DATA_POINTERS])
{
int i;
int w_align = 1;
int h_align = 1;
AVPixFmtDescriptor const *desc = av_pix_fmt_desc_get(s->pix_fmt);
if (desc) {
w_align = 1 << desc->l... | 310,931,639,873,074,100,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2017-7865 | FFmpeg before 2017-01-24 has an out-of-bounds write caused by a heap-based buffer overflow related to the ipvideo_decode_block_opcode_0xA function in libavcodec/interplayvideo.c and the avcodec_align_dimensions2 function in libavcodec/utils.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-7865 |
10,796 | radare2 | 9b46d38dd3c4de6048a488b655c7319f845af185 | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/9b46d38dd3c4de6048a488b655c7319f845af185 | Fix #12372 and #12373 - Crash in x86 assembler (#12380)
0 ,0,[bP-bL-bP-bL-bL-r-bL-bP-bL-bL-
mov ,0,[ax+Bx-ax+Bx-ax+ax+Bx-ax+Bx--
leA ,0,[bP-bL-bL-bP-bL-bP-bL-60@bL-
leA ,0,[bP-bL-r-bP-bL-bP-bL-60@bL-
mov ,0,[ax+Bx-ax+Bx-ax+ax+Bx-ax+Bx-- | 1 | static int parseOperand(RAsm *a, const char *str, Operand *op, bool isrepop) {
size_t pos, nextpos = 0;
x86newTokenType last_type;
int size_token = 1;
bool explicit_size = false;
int reg_index = 0;
// Reset type
op->type = 0;
// Consume tokens denoting the operand size
while (size_token) {
pos = nextpos;
l... | 6,131,296,079,931,054,000,000,000,000,000,000,000 | asm_x86_nz.c | 152,405,387,834,847,820,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-20456 | In radare2 prior to 3.1.1, the parseOperand function inside libr/asm/p/asm_x86_nz.c may allow attackers to cause a denial of service (application crash in libr/util/strbuf.c via a stack-based buffer over-read) by crafting an input file, a related issue to CVE-2018-20455. | https://nvd.nist.gov/vuln/detail/CVE-2018-20456 |
160,768 | radare2 | 9b46d38dd3c4de6048a488b655c7319f845af185 | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/9b46d38dd3c4de6048a488b655c7319f845af185 | Fix #12372 and #12373 - Crash in x86 assembler (#12380)
0 ,0,[bP-bL-bP-bL-bL-r-bL-bP-bL-bL-
mov ,0,[ax+Bx-ax+Bx-ax+ax+Bx-ax+Bx--
leA ,0,[bP-bL-bL-bP-bL-bP-bL-60@bL-
leA ,0,[bP-bL-r-bP-bL-bP-bL-60@bL-
mov ,0,[ax+Bx-ax+Bx-ax+ax+Bx-ax+Bx-- | 0 | static int parseOperand(RAsm *a, const char *str, Operand *op, bool isrepop) {
size_t pos, nextpos = 0;
x86newTokenType last_type;
int size_token = 1;
bool explicit_size = false;
int reg_index = 0;
op->type = 0;
while (size_token) {
pos = nextpos;
last_type = getToken (str, &pos, &nextpos);
if (!r_str_nca... | 132,046,508,120,228,700,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2018-20456 | In radare2 prior to 3.1.1, the parseOperand function inside libr/asm/p/asm_x86_nz.c may allow attackers to cause a denial of service (application crash in libr/util/strbuf.c via a stack-based buffer over-read) by crafting an input file, a related issue to CVE-2018-20455. | https://nvd.nist.gov/vuln/detail/CVE-2018-20456 |
10,799 | qemu | 1e7aed70144b4673fc26e73062064b6724795e5f | https://github.com/bonzini/qemu | https://git.qemu.org/?p=qemu.git;a=commit;h=1e7aed70144b4673fc26e73062064b6724795e5f | virtio: check vring descriptor buffer length
virtio back end uses set of buffers to facilitate I/O operations.
An infinite loop unfolds in virtqueue_pop() if a buffer was
of zero size. Add check to avoid it.
Reported-by: Li Qiang <liqiang6-s@360.cn>
Signed-off-by: Prasad J Pandit <pjp@fedoraproject.org>
Reviewed-by: ... | 1 | static void virtqueue_map_desc(unsigned int *p_num_sg, hwaddr *addr, struct iovec *iov,
unsigned int max_num_sg, bool is_write,
hwaddr pa, size_t sz)
{
unsigned num_sg = *p_num_sg;
assert(num_sg <= max_num_sg);
while (sz) {
hwaddr len = ... | 36,317,471,279,521,866,000,000,000,000,000,000,000 | virtio.c | 321,252,410,795,560,630,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2016-6490 | The virtqueue_map_desc function in hw/virtio/virtio.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a zero length for the descriptor buffer. | https://nvd.nist.gov/vuln/detail/CVE-2016-6490 |
194,676 | qemu | 1e7aed70144b4673fc26e73062064b6724795e5f | https://github.com/bonzini/qemu | https://git.qemu.org/?p=qemu.git;a=commit;h=1e7aed70144b4673fc26e73062064b6724795e5f | virtio: check vring descriptor buffer length
virtio back end uses set of buffers to facilitate I/O operations.
An infinite loop unfolds in virtqueue_pop() if a buffer was
of zero size. Add check to avoid it.
Reported-by: Li Qiang <liqiang6-s@360.cn>
Signed-off-by: Prasad J Pandit <pjp@fedoraproject.org>
Reviewed-by: ... | 0 | static void virtqueue_map_desc(unsigned int *p_num_sg, hwaddr *addr, struct iovec *iov,
unsigned int max_num_sg, bool is_write,
hwaddr pa, size_t sz)
{
unsigned num_sg = *p_num_sg;
assert(num_sg <= max_num_sg);
if (!sz) {
error_report... | 56,827,352,078,113,410,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2016-6490 | The virtqueue_map_desc function in hw/virtio/virtio.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a zero length for the descriptor buffer. | https://nvd.nist.gov/vuln/detail/CVE-2016-6490 |
10,801 | php-src | b101a6bbd4f2181c360bd38e7683df4a03cba83e | https://github.com/php/php-src | https://github.com/php/php-src/commit/b101a6bbd4f2181c360bd38e7683df4a03cba83e | Use format string | 1 | static void zend_throw_or_error(int fetch_type, zend_class_entry *exception_ce, const char *format, ...) /* {{{ */
{
va_list va;
char *message = NULL;
va_start(va, format);
zend_vspprintf(&message, 0, format, va);
if (fetch_type & ZEND_FETCH_CLASS_EXCEPTION) {
zend_throw_error(exception_ce, message);
} else {... | 274,261,182,855,572,440,000,000,000,000,000,000,000 | None | null | [
"CWE-134"
] | CVE-2015-8617 | Format string vulnerability in the zend_throw_or_error function in Zend/zend_execute_API.c in PHP 7.x before 7.0.1 allows remote attackers to execute arbitrary code via format string specifiers in a string that is misused as a class name, leading to incorrect error handling. | https://nvd.nist.gov/vuln/detail/CVE-2015-8617 |
184,499 | php-src | b101a6bbd4f2181c360bd38e7683df4a03cba83e | https://github.com/php/php-src | https://github.com/php/php-src/commit/b101a6bbd4f2181c360bd38e7683df4a03cba83e | Use format string | 0 | static void zend_throw_or_error(int fetch_type, zend_class_entry *exception_ce, const char *format, ...) /* {{{ */
{
va_list va;
char *message = NULL;
va_start(va, format);
zend_vspprintf(&message, 0, format, va);
if (fetch_type & ZEND_FETCH_CLASS_EXCEPTION) {
zend_throw_error(exception_ce, "%s", message);
... | 36,016,106,509,863,040,000,000,000,000,000,000,000 | None | null | [
"CWE-134"
] | CVE-2015-8617 | Format string vulnerability in the zend_throw_or_error function in Zend/zend_execute_API.c in PHP 7.x before 7.0.1 allows remote attackers to execute arbitrary code via format string specifiers in a string that is misused as a class name, leading to incorrect error handling. | https://nvd.nist.gov/vuln/detail/CVE-2015-8617 |
10,802 | gnupg | 014b2103fcb12f261135e3954f26e9e07b39e342 | http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg | http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=014b2103fcb12f261135e3954f26e9e07b39e342 | gpg: Avoid infinite loop in uncompressing garbled packets.
* g10/compress.c (do_uncompress): Limit the number of extra FF bytes.
--
A packet like (a3 01 5b ff) leads to an infinite loop. Using
--max-output won't help if it is a partial packet. This patch
actually fixes a regression introduced on 1999-05-31 (c34c676... | 1 | do_uncompress( compress_filter_context_t *zfx, z_stream *zs,
IOBUF a, size_t *ret_len )
{
int zrc;
int rc=0;
size_t n;
int nread, count;
int refill = !zs->avail_in;
if( DBG_FILTER )
log_debug("begin inflate: avail_in=%u, avail_out=%u, inbuf=%u\n",
(unsigned)zs->avail_in, (unsigned)zs... | 87,629,636,256,725,120,000,000,000,000,000,000,000 | compress.c | 329,533,514,336,488,180,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2014-4617 | The do_uncompress function in g10/compress.c in GnuPG 1.x before 1.4.17 and 2.x before 2.0.24 allows context-dependent attackers to cause a denial of service (infinite loop) via malformed compressed packets, as demonstrated by an a3 01 5b ff byte sequence. | https://nvd.nist.gov/vuln/detail/CVE-2014-4617 |
158,145 | gnupg | 014b2103fcb12f261135e3954f26e9e07b39e342 | http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg | http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=014b2103fcb12f261135e3954f26e9e07b39e342 | gpg: Avoid infinite loop in uncompressing garbled packets.
* g10/compress.c (do_uncompress): Limit the number of extra FF bytes.
--
A packet like (a3 01 5b ff) leads to an infinite loop. Using
--max-output won't help if it is a partial packet. This patch
actually fixes a regression introduced on 1999-05-31 (c34c676... | 0 | do_uncompress( compress_filter_context_t *zfx, z_stream *zs,
IOBUF a, size_t *ret_len )
{
int zrc;
int rc = 0;
int leave = 0;
size_t n;
int nread, count;
int refill = !zs->avail_in;
if( DBG_FILTER )
log_debug("begin inflate: avail_in=%u, avail_out=%u, inbuf=%u\n",
(uns... | 75,679,412,549,268,460,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2014-4617 | The do_uncompress function in g10/compress.c in GnuPG 1.x before 1.4.17 and 2.x before 2.0.24 allows context-dependent attackers to cause a denial of service (infinite loop) via malformed compressed packets, as demonstrated by an a3 01 5b ff byte sequence. | https://nvd.nist.gov/vuln/detail/CVE-2014-4617 |
10,809 | FFmpeg | 296debd213bd6dce7647cedd34eb64e5b94cdc92 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/296debd213bd6dce7647cedd34eb64e5b94cdc92 | avcodec/dnxhddec: Move mb height check out of non hr branch
Fixes: out of array access
Fixes: poc.dnxhd
Found-by: Bingchang, Liu@VARAS of IIE
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 1 | static int dnxhd_decode_header(DNXHDContext *ctx, AVFrame *frame,
const uint8_t *buf, int buf_size,
int first_field)
{
int i, cid, ret;
int old_bit_depth = ctx->bit_depth, bitdepth;
uint64_t header_prefix;
if (buf_size < 0x280) {
av_l... | 177,963,056,591,493,700,000,000,000,000,000,000,000 | dnxhddec.c | 101,910,416,377,302,030,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-11719 | The dnxhd_decode_header function in libavcodec/dnxhddec.c in FFmpeg 3.0 through 3.3.2 allows remote attackers to cause a denial of service (out-of-array access) or possibly have unspecified other impact via a crafted DNxHD file. | https://nvd.nist.gov/vuln/detail/CVE-2017-11719 |
160,068 | FFmpeg | 296debd213bd6dce7647cedd34eb64e5b94cdc92 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/296debd213bd6dce7647cedd34eb64e5b94cdc92 | avcodec/dnxhddec: Move mb height check out of non hr branch
Fixes: out of array access
Fixes: poc.dnxhd
Found-by: Bingchang, Liu@VARAS of IIE
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 0 | static int dnxhd_decode_header(DNXHDContext *ctx, AVFrame *frame,
const uint8_t *buf, int buf_size,
int first_field)
{
int i, cid, ret;
int old_bit_depth = ctx->bit_depth, bitdepth;
uint64_t header_prefix;
if (buf_size < 0x280) {
av_l... | 279,336,364,580,698,970,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2017-11719 | The dnxhd_decode_header function in libavcodec/dnxhddec.c in FFmpeg 3.0 through 3.3.2 allows remote attackers to cause a denial of service (out-of-array access) or possibly have unspecified other impact via a crafted DNxHD file. | https://nvd.nist.gov/vuln/detail/CVE-2017-11719 |
10,810 | FFmpeg | 6b67d7f05918f7a1ee8fc6ff21355d7e8736aa10 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/6b67d7f05918f7a1ee8fc6ff21355d7e8736aa10 | avformat/flvenc: Check audio packet size
Fixes: Assertion failure
Fixes: assert_flvenc.c:941_1.swf
Found-by: #CHEN HONGXU# <HCHEN017@e.ntu.edu.sg>
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 1 | static int flv_write_packet(AVFormatContext *s, AVPacket *pkt)
{
AVIOContext *pb = s->pb;
AVCodecParameters *par = s->streams[pkt->stream_index]->codecpar;
FLVContext *flv = s->priv_data;
FLVStreamContext *sc = s->streams[pkt->stream_index]->priv_data;
unsigned ts;
int size = pkt->size... | 322,148,846,991,142,300,000,000,000,000,000,000,000 | None | null | [
"CWE-617"
] | CVE-2018-15822 | The flv_write_packet function in libavformat/flvenc.c in FFmpeg through 2.8 does not check for an empty audio packet, leading to an assertion failure. | https://nvd.nist.gov/vuln/detail/CVE-2018-15822 |
160,879 | FFmpeg | 6b67d7f05918f7a1ee8fc6ff21355d7e8736aa10 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/6b67d7f05918f7a1ee8fc6ff21355d7e8736aa10 | avformat/flvenc: Check audio packet size
Fixes: Assertion failure
Fixes: assert_flvenc.c:941_1.swf
Found-by: #CHEN HONGXU# <HCHEN017@e.ntu.edu.sg>
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 0 | static int flv_write_packet(AVFormatContext *s, AVPacket *pkt)
{
AVIOContext *pb = s->pb;
AVCodecParameters *par = s->streams[pkt->stream_index]->codecpar;
FLVContext *flv = s->priv_data;
FLVStreamContext *sc = s->streams[pkt->stream_index]->priv_data;
unsigned ts;
int size = pkt->size... | 38,285,238,960,025,090,000,000,000,000,000,000,000 | None | null | [
"CWE-617"
] | CVE-2018-15822 | The flv_write_packet function in libavformat/flvenc.c in FFmpeg through 2.8 does not check for an empty audio packet, leading to an assertion failure. | https://nvd.nist.gov/vuln/detail/CVE-2018-15822 |
10,811 | FFmpeg | 29ffeef5e73b8f41ff3a3f2242d356759c66f91f | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/29ffeef5e73b8f41ff3a3f2242d356759c66f91f | avcodec/h264: do not trust last_pic_droppable when marking pictures as done
This simplifies the code and fixes a deadlock
Fixes Ticket2927
Signed-off-by: Michael Niedermayer <michaelni@gmx.at> | 1 | static int decode_slice_header(H264Context *h, H264Context *h0)
{
unsigned int first_mb_in_slice;
unsigned int pps_id;
int ret;
unsigned int slice_type, tmp, i, j;
int last_pic_structure, last_pic_droppable;
int must_reinit;
int needs_reinit = 0;
int field_pic_flag, bottom_field_flag;
... | 236,248,743,148,359,600,000,000,000,000,000,000,000 | h264.c | 324,658,081,924,643,700,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2013-7008 | The decode_slice_header function in libavcodec/h264.c in FFmpeg before 2.1 incorrectly relies on a certain droppable field, which allows remote attackers to cause a denial of service (deadlock) or possibly have unspecified other impact via crafted H.264 data. | https://nvd.nist.gov/vuln/detail/CVE-2013-7008 |
158,738 | FFmpeg | 29ffeef5e73b8f41ff3a3f2242d356759c66f91f | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/29ffeef5e73b8f41ff3a3f2242d356759c66f91f | avcodec/h264: do not trust last_pic_droppable when marking pictures as done
This simplifies the code and fixes a deadlock
Fixes Ticket2927
Signed-off-by: Michael Niedermayer <michaelni@gmx.at> | 0 | static int decode_slice_header(H264Context *h, H264Context *h0)
{
unsigned int first_mb_in_slice;
unsigned int pps_id;
int ret;
unsigned int slice_type, tmp, i, j;
int last_pic_structure, last_pic_droppable;
int must_reinit;
int needs_reinit = 0;
int field_pic_flag, bottom_field_flag;
... | 10,723,853,863,872,625,000,000,000,000,000,000,000 | None | null | [
"CWE-703"
] | CVE-2013-7008 | The decode_slice_header function in libavcodec/h264.c in FFmpeg before 2.1 incorrectly relies on a certain droppable field, which allows remote attackers to cause a denial of service (deadlock) or possibly have unspecified other impact via crafted H.264 data. | https://nvd.nist.gov/vuln/detail/CVE-2013-7008 |
10,812 | qemu | 98f93ddd84800f207889491e0b5d851386b459cf | https://github.com/bonzini/qemu | http://git.qemu.org/?p=qemu.git;a=commit;h=98f93ddd84800f207889491e0b5d851386b459cf | virtio-net: out-of-bounds buffer write on load
CVE-2013-4149 QEMU 1.3.0 out-of-bounds buffer write in
virtio_net_load()@hw/net/virtio-net.c
> } else if (n->mac_table.in_use) {
> uint8_t *buf = g_malloc0(n->mac_table.in_use);
We are allocating buffer of size n->mac_table.in_use
> qemu... | 1 | static int virtio_net_load(QEMUFile *f, void *opaque, int version_id)
{
VirtIONet *n = opaque;
VirtIODevice *vdev = VIRTIO_DEVICE(n);
int ret, i, link_down;
if (version_id < 2 || version_id > VIRTIO_NET_VM_VERSION)
return -EINVAL;
ret = virtio_load(vdev, f);
if (ret) {
return r... | 244,500,327,533,408,620,000,000,000,000,000,000,000 | virtio-net.c | 92,965,056,721,602,890,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4149 | Buffer overflow in virtio_net_load function in net/virtio-net.c in QEMU 1.3.0 through 1.7.x before 1.7.2 might allow remote attackers to execute arbitrary code via a large MAC table. | https://nvd.nist.gov/vuln/detail/CVE-2013-4149 |
194,781 | qemu | 98f93ddd84800f207889491e0b5d851386b459cf | https://github.com/bonzini/qemu | http://git.qemu.org/?p=qemu.git;a=commit;h=98f93ddd84800f207889491e0b5d851386b459cf | virtio-net: out-of-bounds buffer write on load
CVE-2013-4149 QEMU 1.3.0 out-of-bounds buffer write in
virtio_net_load()@hw/net/virtio-net.c
> } else if (n->mac_table.in_use) {
> uint8_t *buf = g_malloc0(n->mac_table.in_use);
We are allocating buffer of size n->mac_table.in_use
> qemu... | 0 | static int virtio_net_load(QEMUFile *f, void *opaque, int version_id)
{
VirtIONet *n = opaque;
VirtIODevice *vdev = VIRTIO_DEVICE(n);
int ret, i, link_down;
if (version_id < 2 || version_id > VIRTIO_NET_VM_VERSION)
return -EINVAL;
ret = virtio_load(vdev, f);
if (ret) {
return r... | 12,460,125,624,523,790,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2013-4149 | Buffer overflow in virtio_net_load function in net/virtio-net.c in QEMU 1.3.0 through 1.7.x before 1.7.2 might allow remote attackers to execute arbitrary code via a large MAC table. | https://nvd.nist.gov/vuln/detail/CVE-2013-4149 |
10,813 | varnish-cache | 176f8a075a963ffbfa56f1c460c15f6a1a6af5a7 | https://github.com/varnishcache/varnish-cache | https://github.com/varnishcache/varnish-cache/commit/176f8a075a963ffbfa56f1c460c15f6a1a6af5a7 | Avoid buffer read overflow on vcl_error and -sfile
The file stevedore may return a buffer larger than asked for when
requesting storage. Due to lack of check for this condition, the code
to copy the synthetic error memory buffer from vcl_error would overrun
the buffer.
Patch by @shamger
Fixes: #2429 | 1 | vbf_stp_error(struct worker *wrk, struct busyobj *bo)
{
ssize_t l, ll, o;
double now;
uint8_t *ptr;
struct vsb *synth_body;
CHECK_OBJ_NOTNULL(wrk, WORKER_MAGIC);
CHECK_OBJ_NOTNULL(bo, BUSYOBJ_MAGIC);
CHECK_OBJ_NOTNULL(bo->fetch_objcore, OBJCORE_MAGIC);
AN(bo->fetch_objcore->flags & OC_F_BUSY);
assert(bo->dire... | 38,998,115,844,148,544,000,000,000,000,000,000,000 | cache_fetch.c | 254,969,103,215,596,540,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-8807 | vbf_stp_error in bin/varnishd/cache/cache_fetch.c in Varnish HTTP Cache 4.1.x before 4.1.9 and 5.x before 5.2.1 allows remote attackers to obtain sensitive information from process memory because a VFP_GetStorage buffer is larger than intended in certain circumstances involving -sfile Stevedore transient objects. | https://nvd.nist.gov/vuln/detail/CVE-2017-8807 |
160,230 | varnish-cache | 176f8a075a963ffbfa56f1c460c15f6a1a6af5a7 | https://github.com/varnishcache/varnish-cache | https://github.com/varnishcache/varnish-cache/commit/176f8a075a963ffbfa56f1c460c15f6a1a6af5a7 | Avoid buffer read overflow on vcl_error and -sfile
The file stevedore may return a buffer larger than asked for when
requesting storage. Due to lack of check for this condition, the code
to copy the synthetic error memory buffer from vcl_error would overrun
the buffer.
Patch by @shamger
Fixes: #2429 | 0 | vbf_stp_error(struct worker *wrk, struct busyobj *bo)
{
ssize_t l, ll, o;
double now;
uint8_t *ptr;
struct vsb *synth_body;
CHECK_OBJ_NOTNULL(wrk, WORKER_MAGIC);
CHECK_OBJ_NOTNULL(bo, BUSYOBJ_MAGIC);
CHECK_OBJ_NOTNULL(bo->fetch_objcore, OBJCORE_MAGIC);
AN(bo->fetch_objcore->flags & OC_F_BUSY);
assert(bo->dire... | 128,324,520,328,773,930,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2017-8807 | vbf_stp_error in bin/varnishd/cache/cache_fetch.c in Varnish HTTP Cache 4.1.x before 4.1.9 and 5.x before 5.2.1 allows remote attackers to obtain sensitive information from process memory because a VFP_GetStorage buffer is larger than intended in certain circumstances involving -sfile Stevedore transient objects. | https://nvd.nist.gov/vuln/detail/CVE-2017-8807 |
10,814 | gpac | 90dc7f853d31b0a4e9441cba97feccf36d8b69a4 | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/90dc7f853d31b0a4e9441cba97feccf36d8b69a4 | fix some exploitable overflows (#994, #997) | 1 | GF_Err gf_isom_oinf_read_entry(void *entry, GF_BitStream *bs)
{
GF_OperatingPointsInformation* ptr = (GF_OperatingPointsInformation *)entry;
u32 i, j, count;
if (!ptr) return GF_BAD_PARAM;
ptr->scalability_mask = gf_bs_read_u16(bs);
gf_bs_read_int(bs, 2);//reserved
count = gf_bs_read_int(bs, 6);
for (i = 0; i <... | 45,493,324,744,899,785,000,000,000,000,000,000,000 | avc_ext.c | 91,426,739,831,411,360,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-7752 | GPAC through 0.7.1 has a Buffer Overflow in the gf_media_avc_read_sps function in media_tools/av_parsers.c, a different vulnerability than CVE-2018-1000100. | https://nvd.nist.gov/vuln/detail/CVE-2018-7752 |
161,020 | gpac | 90dc7f853d31b0a4e9441cba97feccf36d8b69a4 | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/90dc7f853d31b0a4e9441cba97feccf36d8b69a4 | fix some exploitable overflows (#994, #997) | 0 | GF_Err gf_isom_oinf_read_entry(void *entry, GF_BitStream *bs)
{
GF_OperatingPointsInformation* ptr = (GF_OperatingPointsInformation *)entry;
u32 i, j, count;
if (!ptr) return GF_BAD_PARAM;
ptr->scalability_mask = gf_bs_read_u16(bs);
gf_bs_read_int(bs, 2);//reserved
count = gf_bs_read_int(bs, 6);
for (i = 0; i <... | 190,716,295,100,830,540,000,000,000,000,000,000,000 | avc_ext.c | 25,310,567,777,384,950,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-7752 | GPAC through 0.7.1 has a Buffer Overflow in the gf_media_avc_read_sps function in media_tools/av_parsers.c, a different vulnerability than CVE-2018-1000100. | https://nvd.nist.gov/vuln/detail/CVE-2018-7752 |
10,816 | FFmpeg | 2960576378d17d71cc8dccc926352ce568b5eec1 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/2960576378d17d71cc8dccc926352ce568b5eec1 | avcodec/g2meet: fix src pointer checks in kempf_decode_tile()
Fixes Ticket2842
Signed-off-by: Michael Niedermayer <michaelni@gmx.at> | 1 | static int kempf_decode_tile(G2MContext *c, int tile_x, int tile_y,
const uint8_t *src, int src_size)
{
int width, height;
int hdr, zsize, npal, tidx = -1, ret;
int i, j;
const uint8_t *src_end = src + src_size;
uint8_t pal[768], transp[3];
uLongf dlen = (c->tile_wid... | 157,199,865,468,937,770,000,000,000,000,000,000,000 | g2meet.c | 337,666,674,445,830,870,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-4264 | The kempf_decode_tile function in libavcodec/g2meet.c in FFmpeg before 2.0.1 allows remote attackers to cause a denial of service (out-of-bounds heap write) via a G2M4 encoded file. | https://nvd.nist.gov/vuln/detail/CVE-2013-4264 |
158,789 | FFmpeg | 2960576378d17d71cc8dccc926352ce568b5eec1 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/2960576378d17d71cc8dccc926352ce568b5eec1 | avcodec/g2meet: fix src pointer checks in kempf_decode_tile()
Fixes Ticket2842
Signed-off-by: Michael Niedermayer <michaelni@gmx.at> | 0 | static int kempf_decode_tile(G2MContext *c, int tile_x, int tile_y,
const uint8_t *src, int src_size)
{
int width, height;
int hdr, zsize, npal, tidx = -1, ret;
int i, j;
const uint8_t *src_end = src + src_size;
uint8_t pal[768], transp[3];
uLongf dlen = (c->tile_wid... | 77,849,915,279,508,680,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2013-4264 | The kempf_decode_tile function in libavcodec/g2meet.c in FFmpeg before 2.0.1 allows remote attackers to cause a denial of service (out-of-bounds heap write) via a G2M4 encoded file. | https://nvd.nist.gov/vuln/detail/CVE-2013-4264 |
10,817 | radare2 | bd276ef2fd8ac3401e65be7c126a43175ccfbcd7 | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/bd276ef2fd8ac3401e65be7c126a43175ccfbcd7 | Fix #9969 - Stack overflow in wasm disassembler | 1 | int wasm_dis(WasmOp *op, const unsigned char *buf, int buf_len) {
op->len = 1;
op->op = buf[0];
if (op->op > 0xbf) {
return 1;
}
// add support for extension opcodes (SIMD + atomics)
WasmOpDef *opdef = &opcodes[op->op];
switch (op->op) {
case WASM_OP_TRAP:
case WASM_OP_NOP:
case WASM_OP_ELSE:
case WASM_OP_... | 6,673,601,905,180,170,000,000,000,000,000,000,000 | wasm.c | 128,755,337,374,787,100,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-11378 | The wasm_dis() function in libr/asm/arch/wasm/wasm.c in or possibly have unspecified other impact via a crafted WASM file. | https://nvd.nist.gov/vuln/detail/CVE-2018-11378 |
160,973 | radare2 | bd276ef2fd8ac3401e65be7c126a43175ccfbcd7 | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/bd276ef2fd8ac3401e65be7c126a43175ccfbcd7 | Fix #9969 - Stack overflow in wasm disassembler | 0 | int wasm_dis(WasmOp *op, const unsigned char *buf, int buf_len) {
op->len = 1;
op->op = buf[0];
if (op->op > 0xbf) {
return 1;
}
WasmOpDef *opdef = &opcodes[op->op];
switch (op->op) {
case WASM_OP_TRAP:
case WASM_OP_NOP:
case WASM_OP_ELSE:
case WASM_OP_RETURN:
case WASM_OP_DROP:
case WASM_OP_SELECT:
case... | 277,342,851,802,778,970,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2018-11378 | The wasm_dis() function in libr/asm/arch/wasm/wasm.c in or possibly have unspecified other impact via a crafted WASM file. | https://nvd.nist.gov/vuln/detail/CVE-2018-11378 |
10,818 | virglrenderer | 747a293ff6055203e529f083896b823e22523fe7 | https://gitlab.freedesktop.org/virgl/virglrenderer | https://cgit.freedesktop.org/virglrenderer/commit/?id=747a293ff6055203e529f083896b823e22523fe7 | vrend: fix a leak in context create internal
Create a context more than once causes memory leak issue.
Juest return if the context exists.
Signed-off-by: Li Qiang <liq3ea@gmail.com>
Signed-off-by: Dave Airlie <airlied@redhat.com> | 1 | void vrend_renderer_context_create_internal(uint32_t handle, uint32_t nlen,
const char *debug_name)
{
struct vrend_decode_ctx *dctx;
if (handle >= VREND_MAX_CTX)
return;
dctx = malloc(sizeof(struct vrend_decode_ctx));
if (!dctx)
return;
dctx->grc... | 314,270,549,268,056,050,000,000,000,000,000,000,000 | vrend_decode.c | 312,476,336,926,305,480,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2016-10163 | Memory leak in the vrend_renderer_context_create_internal function in vrend_decode.c in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (host memory consumption) by repeatedly creating a decode context. | https://nvd.nist.gov/vuln/detail/CVE-2016-10163 |
184,313 | virglrenderer | 747a293ff6055203e529f083896b823e22523fe7 | https://gitlab.freedesktop.org/virgl/virglrenderer | https://cgit.freedesktop.org/virglrenderer/commit/?id=747a293ff6055203e529f083896b823e22523fe7 | vrend: fix a leak in context create internal
Create a context more than once causes memory leak issue.
Juest return if the context exists.
Signed-off-by: Li Qiang <liq3ea@gmail.com>
Signed-off-by: Dave Airlie <airlied@redhat.com> | 0 | void vrend_renderer_context_create_internal(uint32_t handle, uint32_t nlen,
const char *debug_name)
{
struct vrend_decode_ctx *dctx;
if (handle >= VREND_MAX_CTX)
return;
dctx = dec_ctx[handle];
if (dctx)
return;
dctx = malloc(sizeof(struct vr... | 36,907,692,861,313,980,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2016-10163 | Memory leak in the vrend_renderer_context_create_internal function in vrend_decode.c in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (host memory consumption) by repeatedly creating a decode context. | https://nvd.nist.gov/vuln/detail/CVE-2016-10163 |
10,819 | poppler | 58e04a08afee39370283c494ee2e4e392fd3b684 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=58e04a08afee39370283c494ee2e4e392fd3b684 | segExtraBytes is a goffset not an int so use lld
Fixes KDE bug #328511 | 1 | void JBIG2Stream::readSegments() {
Guint segNum, segFlags, segType, page, segLength;
Guint refFlags, nRefSegs;
Guint *refSegs;
Goffset segDataPos;
int c1, c2, c3;
Guint i;
while (readULong(&segNum)) {
// segment header flags
if (!readUByte(&segFlags)) {
goto eofError1;
}
segType = ... | 234,137,405,656,432,350,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2013-7296 | The JBIG2Stream::readSegments method in JBIG2Stream.cc in Poppler before 0.24.5 does not use the correct specifier within a format string, which allows context-dependent attackers to cause a denial of service (segmentation fault and application crash) via a crafted PDF file. | https://nvd.nist.gov/vuln/detail/CVE-2013-7296 |
184,321 | poppler | 58e04a08afee39370283c494ee2e4e392fd3b684 | https://github.com/freedesktop/poppler | https://cgit.freedesktop.org/poppler/poppler/commit/?id=58e04a08afee39370283c494ee2e4e392fd3b684 | segExtraBytes is a goffset not an int so use lld
Fixes KDE bug #328511 | 0 | void JBIG2Stream::readSegments() {
Guint segNum, segFlags, segType, page, segLength;
Guint refFlags, nRefSegs;
Guint *refSegs;
Goffset segDataPos;
int c1, c2, c3;
Guint i;
while (readULong(&segNum)) {
if (!readUByte(&segFlags)) {
goto eofError1;
}
segType = segFlags & 0x3f;
if (!r... | 90,547,563,936,402,750,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2013-7296 | The JBIG2Stream::readSegments method in JBIG2Stream.cc in Poppler before 0.24.5 does not use the correct specifier within a format string, which allows context-dependent attackers to cause a denial of service (segmentation fault and application crash) via a crafted PDF file. | https://nvd.nist.gov/vuln/detail/CVE-2013-7296 |
10,820 | nmap | 350bbe0597d37ad67abe5fef8fba984707b4e9ad | https://github.com/nmap/nmap | https://github.com/nmap/nmap/commit/350bbe0597d37ad67abe5fef8fba984707b4e9ad | Avoid a crash (double-free) when SSH connection fails | 1 | static int do_session_handshake (lua_State *L, int status, lua_KContext ctx) {
int rc;
struct ssh_userdata *sshu = NULL;
assert(lua_gettop(L) == 4);
sshu = (struct ssh_userdata *) nseU_checkudata(L, 3, SSH2_UDATA, "ssh2");
while ((rc = libssh2_session_handshake(sshu->session, sshu->sp[0])) == LIBS... | 158,553,276,448,407,060,000,000,000,000,000,000,000 | nse_libssh2.cc | 198,789,152,988,758,870,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2017-18594 | nse_libssh2.cc in Nmap 7.70 is subject to a denial of service condition due to a double free when an SSH connection fails, as demonstrated by a leading \n character to ssh-brute.nse or ssh-auth-methods.nse. | https://nvd.nist.gov/vuln/detail/CVE-2017-18594 |
161,435 | nmap | 350bbe0597d37ad67abe5fef8fba984707b4e9ad | https://github.com/nmap/nmap | https://github.com/nmap/nmap/commit/350bbe0597d37ad67abe5fef8fba984707b4e9ad | Avoid a crash (double-free) when SSH connection fails | 0 | static int do_session_handshake (lua_State *L, int status, lua_KContext ctx) {
int rc;
struct ssh_userdata *sshu = NULL;
assert(lua_gettop(L) == 4);
sshu = (struct ssh_userdata *) nseU_checkudata(L, 3, SSH2_UDATA, "ssh2");
while ((rc = libssh2_session_handshake(sshu->session, sshu->sp[0])) == LIBS... | 113,777,902,641,664,300,000,000,000,000,000,000,000 | None | null | [
"CWE-415"
] | CVE-2017-18594 | nse_libssh2.cc in Nmap 7.70 is subject to a denial of service condition due to a double free when an SSH connection fails, as demonstrated by a leading \n character to ssh-brute.nse or ssh-auth-methods.nse. | https://nvd.nist.gov/vuln/detail/CVE-2017-18594 |
10,824 | linux | b4789b8e6be3151a955ade74872822f30e8cd914 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/b4789b8e6be3151a955ade74872822f30e8cd914 | aacraid: prevent invalid pointer dereference
It appears that driver runs into a problem here if fibsize is too small
because we allocate user_srbcmd with fibsize size only but later we
access it until user_srbcmd->sg.count to copy it over to srbcmd.
It is not correct to test (fibsize < sizeof(*user_srbcmd)) because t... | 1 | static int aac_send_raw_srb(struct aac_dev* dev, void __user * arg)
{
struct fib* srbfib;
int status;
struct aac_srb *srbcmd = NULL;
struct user_aac_srb *user_srbcmd = NULL;
struct user_aac_srb __user *user_srb = arg;
struct aac_srb_reply __user *user_reply;
struct aac_srb_reply* reply;
u32 fibsize = 0;
u32 fl... | 278,785,541,490,766,400,000,000,000,000,000,000,000 | commctrl.c | 11,190,411,268,765,080,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-6380 | The aac_send_raw_srb function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 3.12.1 does not properly validate a certain size value, which allows local users to cause a denial of service (invalid pointer dereference) or possibly have unspecified other impact via an FSACTL_SEND_RAW_SRB ioctl call that tr... | https://nvd.nist.gov/vuln/detail/CVE-2013-6380 |
158,746 | linux | b4789b8e6be3151a955ade74872822f30e8cd914 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/b4789b8e6be3151a955ade74872822f30e8cd914 | aacraid: prevent invalid pointer dereference
It appears that driver runs into a problem here if fibsize is too small
because we allocate user_srbcmd with fibsize size only but later we
access it until user_srbcmd->sg.count to copy it over to srbcmd.
It is not correct to test (fibsize < sizeof(*user_srbcmd)) because t... | 0 | static int aac_send_raw_srb(struct aac_dev* dev, void __user * arg)
{
struct fib* srbfib;
int status;
struct aac_srb *srbcmd = NULL;
struct user_aac_srb *user_srbcmd = NULL;
struct user_aac_srb __user *user_srb = arg;
struct aac_srb_reply __user *user_reply;
struct aac_srb_reply* reply;
u32 fibsize = 0;
u32 fl... | 315,418,944,065,862,000,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2013-6380 | The aac_send_raw_srb function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 3.12.1 does not properly validate a certain size value, which allows local users to cause a denial of service (invalid pointer dereference) or possibly have unspecified other impact via an FSACTL_SEND_RAW_SRB ioctl call that tr... | https://nvd.nist.gov/vuln/detail/CVE-2013-6380 |
10,830 | FFmpeg | 8c2ea3030af7b40a3c4275696fb5c76cdb80950a | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/8c2ea3030af7b40a3c4275696fb5c76cdb80950a | avcodec/pictordec: Fix logic error
Fixes: 559/clusterfuzz-testcase-6424225917173760
Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/targets/ffmpeg
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 1 | static int decode_frame(AVCodecContext *avctx,
void *data, int *got_frame,
AVPacket *avpkt)
{
PicContext *s = avctx->priv_data;
AVFrame *frame = data;
uint32_t *palette;
int bits_per_plane, bpp, etype, esize, npal, pos_after_pal;
int i, x, y, plane, tm... | 221,742,097,572,568,800,000,000,000,000,000,000,000 | pictordec.c | 75,293,849,504,293,415,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2017-7862 | FFmpeg before 2017-02-07 has an out-of-bounds write caused by a heap-based buffer overflow related to the decode_frame function in libavcodec/pictordec.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-7862 |
160,268 | FFmpeg | 8c2ea3030af7b40a3c4275696fb5c76cdb80950a | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/8c2ea3030af7b40a3c4275696fb5c76cdb80950a | avcodec/pictordec: Fix logic error
Fixes: 559/clusterfuzz-testcase-6424225917173760
Found-by: continuous fuzzing process https://github.com/google/oss-fuzz/tree/master/targets/ffmpeg
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 0 | static int decode_frame(AVCodecContext *avctx,
void *data, int *got_frame,
AVPacket *avpkt)
{
PicContext *s = avctx->priv_data;
AVFrame *frame = data;
uint32_t *palette;
int bits_per_plane, bpp, etype, esize, npal, pos_after_pal;
int i, x, y, plane, tm... | 336,499,449,503,801,040,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2017-7862 | FFmpeg before 2017-02-07 has an out-of-bounds write caused by a heap-based buffer overflow related to the decode_frame function in libavcodec/pictordec.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-7862 |
10,831 | radare2 | f41e941341e44aa86edd4483c4487ec09a074257 | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/f41e941341e44aa86edd4483c4487ec09a074257 | Fix #6885 - oob write in dalvik_disassemble | 1 | static int dalvik_disassemble (RAsm *a, RAsmOp *op, const ut8 *buf, int len) {
int vA, vB, vC, payload = 0, i = (int) buf[0];
int size = dalvik_opcodes[i].len;
char str[1024], *strasm;
ut64 offset;
const char *flag_str;
op->buf_asm[0] = 0;
if (buf[0] == 0x00) { /* nop */
switch (buf[1]) {
case 0x01: /* pac... | 15,765,353,407,801,864,000,000,000,000,000,000,000 | asm_dalvik.c | 278,723,867,294,495,130,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-6448 | The dalvik_disassemble function in libr/asm/p/asm_dalvik.c in radare2 1.2.1 allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted DEX file. | https://nvd.nist.gov/vuln/detail/CVE-2017-6448 |
160,328 | radare2 | f41e941341e44aa86edd4483c4487ec09a074257 | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/f41e941341e44aa86edd4483c4487ec09a074257 | Fix #6885 - oob write in dalvik_disassemble | 0 | static int dalvik_disassemble (RAsm *a, RAsmOp *op, const ut8 *buf, int len) {
int vA, vB, vC, payload = 0, i = (int) buf[0];
int size = dalvik_opcodes[i].len;
char str[1024], *strasm;
ut64 offset;
const char *flag_str;
op->buf_asm[0] = 0;
if (buf[0] == 0x00) { /* nop */
switch (buf[1]) {
case 0x01: /* pac... | 333,143,334,823,835,900,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2017-6448 | The dalvik_disassemble function in libr/asm/p/asm_dalvik.c in radare2 1.2.1 allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted DEX file. | https://nvd.nist.gov/vuln/detail/CVE-2017-6448 |
10,832 | radare2 | f17bfd9f1da05f30f23a4dd05e9d2363e1406948 | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/f17bfd9f1da05f30f23a4dd05e9d2363e1406948 | Fix #12242 - Crash in x86.nz assembler (#12266) | 1 | static int opmov(RAsm *a, ut8 *data, const Opcode *op) {
int l = 0;
st64 offset = 0;
int mod = 0;
int base = 0;
int rex = 0;
ut64 immediate = 0;
if (op->operands[1].type & OT_CONSTANT) {
if (!op->operands[1].is_good_flag) {
return -1;
}
if (op->operands[1].immediate == -1) {
return -1;
}
immediat... | 40,973,769,706,127,207,000,000,000,000,000,000,000 | asm_x86_nz.c | 338,540,879,983,035,860,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-19843 | opmov in libr/asm/p/asm_x86_nz.c in radare2 before 3.1.0 allows attackers to cause a denial of service (buffer over-read) via crafted x86 assembly data, as demonstrated by rasm2. | https://nvd.nist.gov/vuln/detail/CVE-2018-19843 |
160,778 | radare2 | f17bfd9f1da05f30f23a4dd05e9d2363e1406948 | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/f17bfd9f1da05f30f23a4dd05e9d2363e1406948 | Fix #12242 - Crash in x86.nz assembler (#12266) | 0 | static int opmov(RAsm *a, ut8 *data, const Opcode *op) {
int l = 0;
st64 offset = 0;
int mod = 0;
int base = 0;
int rex = 0;
ut64 immediate = 0;
if (op->operands[1].type & OT_CONSTANT) {
if (!op->operands[1].is_good_flag) {
return -1;
}
if (op->operands[1].immediate == -1) {
return -1;
}
immediat... | 245,358,561,995,234,160,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2018-19843 | opmov in libr/asm/p/asm_x86_nz.c in radare2 before 3.1.0 allows attackers to cause a denial of service (buffer over-read) via crafted x86 assembly data, as demonstrated by rasm2. | https://nvd.nist.gov/vuln/detail/CVE-2018-19843 |
10,833 | php-src | 61cdd1255d5b9c8453be71aacbbf682796ac77d4 | https://github.com/php/php-src | https://github.com/php/php-src/commit/61cdd1255d5b9c8453be71aacbbf682796ac77d4 | Fix bug #73257 and bug #73258 - SplObjectStorage unserialize allows use of non-object as key | 1 | SPL_METHOD(SplObjectStorage, unserialize)
{
spl_SplObjectStorage *intern = Z_SPLOBJSTORAGE_P(getThis());
char *buf;
size_t buf_len;
const unsigned char *p, *s;
php_unserialize_data_t var_hash;
zval entry, inf;
zval *pcount, *pmembers;
spl_SplObjectStorageElement *element;
zend_long count;
if (zend_parse_par... | 91,704,803,847,212,610,000,000,000,000,000,000,000 | spl_observer.c | 126,391,975,154,037,090,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2016-7480 | The SplObjectStorage unserialize implementation in ext/spl/spl_observer.c in PHP before 7.0.12 does not verify that a key is an object, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access) via crafted serialized data. | https://nvd.nist.gov/vuln/detail/CVE-2016-7480 |
160,669 | php-src | 61cdd1255d5b9c8453be71aacbbf682796ac77d4 | https://github.com/php/php-src | https://github.com/php/php-src/commit/61cdd1255d5b9c8453be71aacbbf682796ac77d4 | Fix bug #73257 and bug #73258 - SplObjectStorage unserialize allows use of non-object as key | 0 | SPL_METHOD(SplObjectStorage, unserialize)
{
spl_SplObjectStorage *intern = Z_SPLOBJSTORAGE_P(getThis());
char *buf;
size_t buf_len;
const unsigned char *p, *s;
php_unserialize_data_t var_hash;
zval entry, inf;
zval *pcount, *pmembers;
spl_SplObjectStorageElement *element;
zend_long count;
if (zend_parse_par... | 75,817,676,681,562,030,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2016-7480 | The SplObjectStorage unserialize implementation in ext/spl/spl_observer.c in PHP before 7.0.12 does not verify that a key is an object, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access) via crafted serialized data. | https://nvd.nist.gov/vuln/detail/CVE-2016-7480 |
10,834 | libpcap | 484d60cbf7ca4ec758c3cbb8a82d68b244a78d58 | https://github.com/the-tcpdump-group/libpcap | https://github.com/the-tcpdump-group/libpcap/commit/484d60cbf7ca4ec758c3cbb8a82d68b244a78d58 | On UN*X, don't tell the client why authentication failed.
"no such user" tells the client that the user ID isn't valid and,
therefore, that it needn't bother trying to do password cracking for
that user ID; just saying that the authentication failed dosn't give
them that hint.
This resolves the third problem in Inclu... | 1 | daemon_AuthUserPwd(char *username, char *password, char *errbuf)
{
#ifdef _WIN32
/*
* Warning: the user which launches the process must have the
* SE_TCB_NAME right.
* This corresponds to have the "Act as part of the Operating System"
* turned on (administrative tools, local security settings, local
* polici... | 143,271,537,862,841,350,000,000,000,000,000,000,000 | daemon.c | 39,444,760,337,349,555,000,000,000,000,000,000,000 | [
"CWE-345"
] | CVE-2019-15162 | rpcapd/daemon.c in libpcap before 1.9.1 on non-Windows platforms provides details about why authentication failed, which might make it easier for attackers to enumerate valid usernames. | https://nvd.nist.gov/vuln/detail/CVE-2019-15162 |
161,190 | libpcap | 484d60cbf7ca4ec758c3cbb8a82d68b244a78d58 | https://github.com/the-tcpdump-group/libpcap | https://github.com/the-tcpdump-group/libpcap/commit/484d60cbf7ca4ec758c3cbb8a82d68b244a78d58 | On UN*X, don't tell the client why authentication failed.
"no such user" tells the client that the user ID isn't valid and,
therefore, that it needn't bother trying to do password cracking for
that user ID; just saying that the authentication failed dosn't give
them that hint.
This resolves the third problem in Inclu... | 0 | daemon_AuthUserPwd(char *username, char *password, char *errbuf)
{
#ifdef _WIN32
/*
* Warning: the user which launches the process must have the
* SE_TCB_NAME right.
* This corresponds to have the "Act as part of the Operating System"
* turned on (administrative tools, local security settings, local
* polici... | 262,746,865,674,380,200,000,000,000,000,000,000,000 | None | null | [
"CWE-345"
] | CVE-2019-15162 | rpcapd/daemon.c in libpcap before 1.9.1 on non-Windows platforms provides details about why authentication failed, which might make it easier for attackers to enumerate valid usernames. | https://nvd.nist.gov/vuln/detail/CVE-2019-15162 |
10,835 | qemu | 9878d173f574df74bde0ff50b2f81009fbee81bb | https://github.com/bonzini/qemu | https://git.qemu.org/?p=qemu.git;a=commit;h=9878d173f574df74bde0ff50b2f81009fbee81bb | vmxnet3: validate queues configuration coming from guest
CVE-2013-4544
Signed-off-by: Dmitry Fleytman <dmitry@daynix.com>
Reported-by: Michael S. Tsirkin <mst@redhat.com>
Signed-off-by: Michael S. Tsirkin <mst@redhat.com>
Reviewed-by: Dr. David Alan Gilbert <dgilbert@redhat.com>
Message-id: 1396604722-11902-3-git-sen... | 1 | static void vmxnet3_activate_device(VMXNET3State *s)
{
int i;
static const uint32_t VMXNET3_DEF_TX_THRESHOLD = 1;
hwaddr qdescr_table_pa;
uint64_t pa;
uint32_t size;
/* Verify configuration consistency */
if (!vmxnet3_verify_driver_magic(s->drv_shmem)) {
VMW_ERPRN("Device configurat... | 249,334,075,610,751,950,000,000,000,000,000,000,000 | vmxnet3.c | 216,873,920,930,645,670,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2013-4544 | hw/net/vmxnet3.c in QEMU 2.0.0-rc0, 1.7.1, and earlier allows local guest users to cause a denial of service or possibly execute arbitrary code via vectors related to (1) RX or (2) TX queue numbers or (3) interrupt indices. NOTE: some of these details are obtained from third party information. | https://nvd.nist.gov/vuln/detail/CVE-2013-4544 |
194,775 | qemu | 9878d173f574df74bde0ff50b2f81009fbee81bb | https://github.com/bonzini/qemu | https://git.qemu.org/?p=qemu.git;a=commit;h=9878d173f574df74bde0ff50b2f81009fbee81bb | vmxnet3: validate queues configuration coming from guest
CVE-2013-4544
Signed-off-by: Dmitry Fleytman <dmitry@daynix.com>
Reported-by: Michael S. Tsirkin <mst@redhat.com>
Signed-off-by: Michael S. Tsirkin <mst@redhat.com>
Reviewed-by: Dr. David Alan Gilbert <dgilbert@redhat.com>
Message-id: 1396604722-11902-3-git-sen... | 0 | static void vmxnet3_activate_device(VMXNET3State *s)
{
int i;
VMW_CFPRN("MTU is %u", s->mtu);
s->max_rx_frags =
VMXNET3_READ_DRV_SHARED16(s->drv_shmem, devRead.misc.maxNumRxSG);
if (s->max_rx_frags == 0) {
s->max_rx_frags = 1;
}
VMW_CFPRN("Max RX fragments is %u", s->max_rx... | 291,869,202,376,088,630,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2013-4544 | hw/net/vmxnet3.c in QEMU 2.0.0-rc0, 1.7.1, and earlier allows local guest users to cause a denial of service or possibly execute arbitrary code via vectors related to (1) RX or (2) TX queue numbers or (3) interrupt indices. NOTE: some of these details are obtained from third party information. | https://nvd.nist.gov/vuln/detail/CVE-2013-4544 |
10,836 | Little-CMS | 5ca71a7bc18b6897ab21d815d15e218e204581e2 | https://github.com/mm2/Little-CMS | https://github.com/mm2/Little-CMS/commit/5ca71a7bc18b6897ab21d815d15e218e204581e2 | Added an extra check to MLU bounds
Thanks to Ibrahim el-sayed for spotting the bug | 1 | void *Type_MLU_Read(struct _cms_typehandler_struct* self, cmsIOHANDLER* io, cmsUInt32Number* nItems, cmsUInt32Number SizeOfTag)
{
cmsMLU* mlu;
cmsUInt32Number Count, RecLen, NumOfWchar;
cmsUInt32Number SizeOfHeader;
cmsUInt32Number Len, Offset;
cmsUInt32Number i;
wchar_t* Block;
cm... | 11,487,822,218,315,490,000,000,000,000,000,000,000 | cmstypes.c | 132,058,870,710,618,560,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2016-10165 | The Type_MLU_Read function in cmstypes.c in Little CMS (aka lcms2) allows remote attackers to obtain sensitive information or cause a denial of service via an image with a crafted ICC profile, which triggers an out-of-bounds heap read. | https://nvd.nist.gov/vuln/detail/CVE-2016-10165 |
160,452 | Little-CMS | 5ca71a7bc18b6897ab21d815d15e218e204581e2 | https://github.com/mm2/Little-CMS | https://github.com/mm2/Little-CMS/commit/5ca71a7bc18b6897ab21d815d15e218e204581e2 | Added an extra check to MLU bounds
Thanks to Ibrahim el-sayed for spotting the bug | 0 | void *Type_MLU_Read(struct _cms_typehandler_struct* self, cmsIOHANDLER* io, cmsUInt32Number* nItems, cmsUInt32Number SizeOfTag)
{
cmsMLU* mlu;
cmsUInt32Number Count, RecLen, NumOfWchar;
cmsUInt32Number SizeOfHeader;
cmsUInt32Number Len, Offset;
cmsUInt32Number i;
wchar_t* Block;
cm... | 7,142,105,060,128,840,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2016-10165 | The Type_MLU_Read function in cmstypes.c in Little CMS (aka lcms2) allows remote attackers to obtain sensitive information or cause a denial of service via an image with a crafted ICC profile, which triggers an out-of-bounds heap read. | https://nvd.nist.gov/vuln/detail/CVE-2016-10165 |
10,837 | WavPack | 26cb47f99d481ad9b93eeff80d26e6b63bbd7e15 | https://github.com/dbry/WavPack | https://github.com/dbry/WavPack/commit/26cb47f99d481ad9b93eeff80d26e6b63bbd7e15 | issue #30 issue #31 issue #32: no multiple format chunks in WAV or W64 | 1 | int ParseWave64HeaderConfig (FILE *infile, char *infilename, char *fourcc, WavpackContext *wpc, WavpackConfig *config)
{
int64_t total_samples = 0, infilesize;
Wave64ChunkHeader chunk_header;
Wave64FileHeader filehdr;
WaveHeader WaveHeader;
uint32_t bcount;
infilesize = DoGetFileSize (infile);
... | 52,732,810,850,628,605,000,000,000,000,000,000,000 | wave64.c | 80,250,037,771,172,160,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-10537 | An issue was discovered in WavPack 5.1.0 and earlier. The W64 parser component contains a vulnerability that allows writing to memory because ParseWave64HeaderConfig in wave64.c does not reject multiple format chunks. | https://nvd.nist.gov/vuln/detail/CVE-2018-10537 |
184,646 | WavPack | 26cb47f99d481ad9b93eeff80d26e6b63bbd7e15 | https://github.com/dbry/WavPack | https://github.com/dbry/WavPack/commit/26cb47f99d481ad9b93eeff80d26e6b63bbd7e15 | issue #30 issue #31 issue #32: no multiple format chunks in WAV or W64 | 0 | int ParseWave64HeaderConfig (FILE *infile, char *infilename, char *fourcc, WavpackContext *wpc, WavpackConfig *config)
{
int64_t total_samples = 0, infilesize;
Wave64ChunkHeader chunk_header;
Wave64FileHeader filehdr;
WaveHeader WaveHeader;
int format_chunk = 0;
uint32_t bcount;
infil... | 107,794,461,004,120,000,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2018-10537 | An issue was discovered in WavPack 5.1.0 and earlier. The W64 parser component contains a vulnerability that allows writing to memory because ParseWave64HeaderConfig in wave64.c does not reject multiple format chunks. | https://nvd.nist.gov/vuln/detail/CVE-2018-10537 |
10,838 | WavPack | 26cb47f99d481ad9b93eeff80d26e6b63bbd7e15 | https://github.com/dbry/WavPack | https://github.com/dbry/WavPack/commit/26cb47f99d481ad9b93eeff80d26e6b63bbd7e15 | issue #30 issue #31 issue #32: no multiple format chunks in WAV or W64 | 1 | int ParseRiffHeaderConfig (FILE *infile, char *infilename, char *fourcc, WavpackContext *wpc, WavpackConfig *config)
{
int is_rf64 = !strncmp (fourcc, "RF64", 4), got_ds64 = 0;
int64_t total_samples = 0, infilesize;
RiffChunkHeader riff_chunk_header;
ChunkHeader chunk_header;
WaveHeader WaveHeader;
... | 152,045,847,845,484,900,000,000,000,000,000,000,000 | riff.c | 29,803,808,998,334,980,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-10537 | An issue was discovered in WavPack 5.1.0 and earlier. The W64 parser component contains a vulnerability that allows writing to memory because ParseWave64HeaderConfig in wave64.c does not reject multiple format chunks. | https://nvd.nist.gov/vuln/detail/CVE-2018-10537 |
160,983 | WavPack | 26cb47f99d481ad9b93eeff80d26e6b63bbd7e15 | https://github.com/dbry/WavPack | https://github.com/dbry/WavPack/commit/26cb47f99d481ad9b93eeff80d26e6b63bbd7e15 | issue #30 issue #31 issue #32: no multiple format chunks in WAV or W64 | 0 | int ParseRiffHeaderConfig (FILE *infile, char *infilename, char *fourcc, WavpackContext *wpc, WavpackConfig *config)
{
int is_rf64 = !strncmp (fourcc, "RF64", 4), got_ds64 = 0, format_chunk = 0;
int64_t total_samples = 0, infilesize;
RiffChunkHeader riff_chunk_header;
ChunkHeader chunk_header;
... | 21,652,987,276,390,327,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2018-10537 | An issue was discovered in WavPack 5.1.0 and earlier. The W64 parser component contains a vulnerability that allows writing to memory because ParseWave64HeaderConfig in wave64.c does not reject multiple format chunks. | https://nvd.nist.gov/vuln/detail/CVE-2018-10537 |
10,839 | FFmpeg | 95556e27e2c1d56d9e18f5db34d6f756f3011148 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/95556e27e2c1d56d9e18f5db34d6f756f3011148 | avformat/movenc: Do not pass AVCodecParameters in avpriv_request_sample
Fixes: out of array read
Fixes: ffmpeg_crash_8.avi
Found-by: Thuan Pham, Marcel Böhme, Andrew Santosa and Alexandru Razvan Caciulescu with AFLSmart
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 1 | static int handle_eac3(MOVMuxContext *mov, AVPacket *pkt, MOVTrack *track)
{
AC3HeaderInfo *hdr = NULL;
struct eac3_info *info;
int num_blocks, ret;
if (!track->eac3_priv && !(track->eac3_priv = av_mallocz(sizeof(*info))))
return AVERROR(ENOMEM);
info = track->eac3_priv;
if (avpriv_ac3... | 194,781,423,137,917,070,000,000,000,000,000,000,000 | movenc.c | 128,083,843,490,396,450,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-13300 | In FFmpeg 3.2 and 4.0.1, an improper argument (AVCodecParameters) passed to the avpriv_request_sample function in the handle_eac3 function in libavformat/movenc.c may trigger an out-of-array read while converting a crafted AVI file to MPEG4, leading to a denial of service and possibly an information disclosure. | https://nvd.nist.gov/vuln/detail/CVE-2018-13300 |
160,919 | FFmpeg | 95556e27e2c1d56d9e18f5db34d6f756f3011148 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/95556e27e2c1d56d9e18f5db34d6f756f3011148 | avformat/movenc: Do not pass AVCodecParameters in avpriv_request_sample
Fixes: out of array read
Fixes: ffmpeg_crash_8.avi
Found-by: Thuan Pham, Marcel Böhme, Andrew Santosa and Alexandru Razvan Caciulescu with AFLSmart
Signed-off-by: Michael Niedermayer <michael@niedermayer.cc> | 0 | static int handle_eac3(MOVMuxContext *mov, AVPacket *pkt, MOVTrack *track)
{
AC3HeaderInfo *hdr = NULL;
struct eac3_info *info;
int num_blocks, ret;
if (!track->eac3_priv && !(track->eac3_priv = av_mallocz(sizeof(*info))))
return AVERROR(ENOMEM);
info = track->eac3_priv;
if (avpriv_ac3... | 56,370,364,015,549,390,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2018-13300 | In FFmpeg 3.2 and 4.0.1, an improper argument (AVCodecParameters) passed to the avpriv_request_sample function in the handle_eac3 function in libavformat/movenc.c may trigger an out-of-array read while converting a crafted AVI file to MPEG4, leading to a denial of service and possibly an information disclosure. | https://nvd.nist.gov/vuln/detail/CVE-2018-13300 |
194,974 | gpac | 7bb1b4a4dd23c885f9db9f577dfe79ecc5433109 | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/7bb1b4a4dd23c885f9db9f577dfe79ecc5433109 | fixed #1893 | 1 | void gf_av1_reset_state(AV1State *state, Bool is_destroy)
{
GF_List *l1, *l2;
if (state->frame_state.header_obus) {
while (gf_list_count(state->frame_state.header_obus)) {
GF_AV1_OBUArrayEntry *a = (GF_AV1_OBUArrayEntry*)gf_list_pop_back(state->frame_state.header_obus);
if (a->obu) gf_free(a->obu);
gf_fre... | 91,743,208,610,685,760,000,000,000,000,000,000,000 | av_parsers.c | 168,517,587,328,341,010,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2021-40572 | The binary MP4Box in Gpac 1.0.1 has a double-free bug in the av1dmx_finalize function in reframe_av1.c, which allows attackers to cause a denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2021-40572 |
217,933 | gpac | 7bb1b4a4dd23c885f9db9f577dfe79ecc5433109 | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/7bb1b4a4dd23c885f9db9f577dfe79ecc5433109 | fixed #1893 | 0 | void gf_av1_reset_state(AV1State *state, Bool is_destroy)
{
GF_List *l1, *l2;
if (state->frame_state.header_obus) {
while (gf_list_count(state->frame_state.header_obus)) {
GF_AV1_OBUArrayEntry *a = (GF_AV1_OBUArrayEntry*)gf_list_pop_back(state->frame_state.header_obus);
if (a->obu) gf_free(a->obu);
gf_fre... | 92,170,410,639,891,570,000,000,000,000,000,000,000 | av_parsers.c | 305,161,361,238,382,900,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2021-40572 | The binary MP4Box in Gpac 1.0.1 has a double-free bug in the av1dmx_finalize function in reframe_av1.c, which allows attackers to cause a denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2021-40572 |
194,975 | gpac | 04dbf08bff4d61948bab80c3f9096ecc60c7f302 | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/04dbf08bff4d61948bab80c3f9096ecc60c7f302 | fixed #1899 | 1 | static s32 gf_avc_read_sps_bs_internal(GF_BitStream *bs, AVCState *avc, u32 subseq_sps, u32 *vui_flag_pos, u32 nal_hdr)
{
AVC_SPS *sps;
s32 mb_width, mb_height, sps_id = -1;
u32 profile_idc, level_idc, pcomp, i, chroma_format_idc, cl = 0, cr = 0, ct = 0, cb = 0, luma_bd, chroma_bd;
u8 separate_colour_plane_flag = 0... | 293,516,869,958,372,470,000,000,000,000,000,000,000 | av_parsers.c | 168,517,587,328,341,010,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2021-40570 | The binary MP4Box in Gpac 1.0.1 has a double-free vulnerability in the avc_compute_poc function in av_parsers.c, which allows attackers to cause a denial of service, even code execution and escalation of privileges. | https://nvd.nist.gov/vuln/detail/CVE-2021-40570 |
218,016 | gpac | 04dbf08bff4d61948bab80c3f9096ecc60c7f302 | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/04dbf08bff4d61948bab80c3f9096ecc60c7f302 | fixed #1899 | 0 | static s32 gf_avc_read_sps_bs_internal(GF_BitStream *bs, AVCState *avc, u32 subseq_sps, u32 *vui_flag_pos, u32 nal_hdr)
{
AVC_SPS *sps;
s32 mb_width, mb_height, sps_id = -1;
u32 profile_idc, level_idc, pcomp, i, chroma_format_idc, cl = 0, cr = 0, ct = 0, cb = 0, luma_bd, chroma_bd;
u8 separate_colour_plane_flag = 0... | 99,363,752,764,399,010,000,000,000,000,000,000,000 | av_parsers.c | 102,768,772,056,027,780,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2021-40570 | The binary MP4Box in Gpac 1.0.1 has a double-free vulnerability in the avc_compute_poc function in av_parsers.c, which allows attackers to cause a denial of service, even code execution and escalation of privileges. | https://nvd.nist.gov/vuln/detail/CVE-2021-40570 |
194,997 | tensorflow | a7c02f1a9bbc35473969618a09ee5f9f5d3e52d9 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/a7c02f1a9bbc35473969618a09ee5f9f5d3e52d9 | Validate real and expected type of arguments to cwise ops.
Without this validation, it is possible to trigger a `CHECK`-fail denial of service.
This is a rollforward of a previous commit which was rolled back as it was relying on RTTI. This time we don't use RTTI, we replace `typeid(Tin).name()` with a double functio... | 1 | void Compute(OpKernelContext* ctx) override {
const Tensor& input_0 = ctx->input(0);
const Tensor& input_1 = ctx->input(1);
const Device& eigen_device = ctx->eigen_device<Device>();
bool error = false;
bool* const error_ptr = Functor::has_errors ? &error : nullptr;
// NOTE: Handle three simpl... | 213,136,115,552,976,740,000,000,000,000,000,000,000 | cwise_ops_common.h | 248,686,552,355,126,300,000,000,000,000,000,000,000 | [
"CWE-617"
] | CVE-2022-23583 | Tensorflow is an Open Source Machine Learning Framework. A malicious user can cause a denial of service by altering a `SavedModel` such that any binary op would trigger `CHECK` failures. This occurs when the protobuf part corresponding to the tensor arguments is modified such that the `dtype` no longer matches the `dty... | https://nvd.nist.gov/vuln/detail/CVE-2022-23583 |
218,940 | tensorflow | a7c02f1a9bbc35473969618a09ee5f9f5d3e52d9 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/a7c02f1a9bbc35473969618a09ee5f9f5d3e52d9 | Validate real and expected type of arguments to cwise ops.
Without this validation, it is possible to trigger a `CHECK`-fail denial of service.
This is a rollforward of a previous commit which was rolled back as it was relying on RTTI. This time we don't use RTTI, we replace `typeid(Tin).name()` with a double functio... | 0 | void Compute(OpKernelContext* ctx) override {
const Tensor& input_0 = ctx->input(0);
OP_REQUIRES(ctx, input_0.dtype() == DataTypeToEnum<Tin>::v(),
errors::InvalidArgument(
"Expected tensor of type ",
DataTypeString(DataTypeToEnum<Tin>::v()), " but got ty... | 113,133,731,875,387,430,000,000,000,000,000,000,000 | cwise_ops_common.h | 254,915,476,689,776,730,000,000,000,000,000,000,000 | [
"CWE-617"
] | CVE-2022-23583 | Tensorflow is an Open Source Machine Learning Framework. A malicious user can cause a denial of service by altering a `SavedModel` such that any binary op would trigger `CHECK` failures. This occurs when the protobuf part corresponding to the tensor arguments is modified such that the `dtype` no longer matches the `dty... | https://nvd.nist.gov/vuln/detail/CVE-2022-23583 |
195,018 | ImageMagick | 548701354191a3dda5cffc6d415374b35b01d0b9 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/548701354191a3dda5cffc6d415374b35b01d0b9 | Prevent memory use after free | 1 | static Image *ReadPWPImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
FILE
*file;
Image
*image,
*next_image,
*pwp_image;
ImageInfo
*read_info;
int
c,
unique_file;
MagickBooleanType
status;
register Image
*p;
register ssize_t
i;
size_t
files... | 214,504,104,515,772,660,000,000,000,000,000,000,000 | None | null | [
"CWE-416"
] | CVE-2016-10051 | Use-after-free vulnerability in the ReadPWPImage function in coders/pwp.c in ImageMagick 6.9.5-5 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2016-10051 |
219,929 | ImageMagick | 548701354191a3dda5cffc6d415374b35b01d0b9 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/548701354191a3dda5cffc6d415374b35b01d0b9 | Prevent memory use after free | 0 | static Image *ReadPWPImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
FILE
*file;
Image
*image,
*next_image,
*pwp_image;
ImageInfo
*read_info;
int
c,
unique_file;
MagickBooleanType
status;
register Image
*p;
register ssize_t
i;
size_t
files... | 183,179,493,347,682,440,000,000,000,000,000,000,000 | None | null | [
"CWE-416"
] | CVE-2016-10051 | Use-after-free vulnerability in the ReadPWPImage function in coders/pwp.c in ImageMagick 6.9.5-5 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2016-10051 |
195,024 | libtiff | 0c74a9f49b8d7a36b17b54a7428b3526d20f88a8 | https://github.com/vadz/libtiff | https://github.com/vadz/libtiff/commit/0c74a9f49b8d7a36b17b54a7428b3526d20f88a8 | Fix for simple memory leak that was assigned CVE-2019-6128.
pal2rgb failed to free memory on a few errors. This was reported
here: http://bugzilla.maptools.org/show_bug.cgi?id=2836. | 1 | main(int argc, char* argv[])
{
uint16 bitspersample, shortv;
uint32 imagewidth, imagelength;
uint16 config = PLANARCONFIG_CONTIG;
uint32 rowsperstrip = (uint32) -1;
uint16 photometric = PHOTOMETRIC_RGB;
uint16 *rmap, *gmap, *bmap;
uint32 row;
int cmap = -1;
TIFF *in, *out;
int c;
#if !HAVE_DECL_OPTARG
exter... | 273,958,700,931,991,270,000,000,000,000,000,000,000 | pal2rgb.c | 258,209,594,937,280,700,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2019-6128 | The TIFFFdOpen function in tif_unix.c in LibTIFF 4.0.10 has a memory leak, as demonstrated by pal2rgb. | https://nvd.nist.gov/vuln/detail/CVE-2019-6128 |
220,035 | libtiff | 0c74a9f49b8d7a36b17b54a7428b3526d20f88a8 | https://github.com/vadz/libtiff | https://github.com/vadz/libtiff/commit/0c74a9f49b8d7a36b17b54a7428b3526d20f88a8 | Fix for simple memory leak that was assigned CVE-2019-6128.
pal2rgb failed to free memory on a few errors. This was reported
here: http://bugzilla.maptools.org/show_bug.cgi?id=2836. | 0 | main(int argc, char* argv[])
{
uint16 bitspersample, shortv;
uint32 imagewidth, imagelength;
uint16 config = PLANARCONFIG_CONTIG;
uint32 rowsperstrip = (uint32) -1;
uint16 photometric = PHOTOMETRIC_RGB;
uint16 *rmap, *gmap, *bmap;
uint32 row;
int cmap = -1;
TIFF *in, *out;
int c;
#if !HAVE_DECL_OPTARG
exter... | 5,288,936,921,581,789,500,000,000,000,000,000,000 | pal2rgb.c | 102,626,899,026,335,350,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2019-6128 | The TIFFFdOpen function in tif_unix.c in LibTIFF 4.0.10 has a memory leak, as demonstrated by pal2rgb. | https://nvd.nist.gov/vuln/detail/CVE-2019-6128 |
195,025 | tensorflow | e8dc63704c88007ee4713076605c90188d66f3d2 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/e8dc63704c88007ee4713076605c90188d66f3d2 | Add BuildTensorSlice for building from unvalidated TensorSliceProtos.
This avoids several sources of crashes and undefined behavior when loading
invalid checkpoints.
PiperOrigin-RevId: 392785704
Change-Id: Icd9713c768b882f3b58b427eddac376060696833 | 1 | void TensorSliceReader::LoadShard(int shard) const {
CHECK_LT(shard, sss_.size());
if (sss_[shard] || !status_.ok()) {
return; // Already loaded, or invalid.
}
string value;
SavedTensorSlices sts;
const string fname = fnames_[shard];
VLOG(1) << "Reading meta data from file " << fname << "...";
Tabl... | 2,325,999,890,524,082,200,000,000,000,000,000,000 | tensor_slice_reader.cc | 308,115,881,652,480,900,000,000,000,000,000,000,000 | [
"CWE-345"
] | CVE-2021-41203 | TensorFlow is an open source platform for machine learning. In affected versions an attacker can trigger undefined behavior, integer overflows, segfaults and `CHECK`-fail crashes if they can change saved checkpoints from outside of TensorFlow. This is because the checkpoints loading infrastructure is missing validation... | https://nvd.nist.gov/vuln/detail/CVE-2021-41203 |
220,080 | tensorflow | e8dc63704c88007ee4713076605c90188d66f3d2 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/e8dc63704c88007ee4713076605c90188d66f3d2 | Add BuildTensorSlice for building from unvalidated TensorSliceProtos.
This avoids several sources of crashes and undefined behavior when loading
invalid checkpoints.
PiperOrigin-RevId: 392785704
Change-Id: Icd9713c768b882f3b58b427eddac376060696833 | 0 | void TensorSliceReader::LoadShard(int shard) const {
CHECK_LT(shard, sss_.size());
if (sss_[shard] || !status_.ok()) {
return; // Already loaded, or invalid.
}
string value;
SavedTensorSlices sts;
const string fname = fnames_[shard];
VLOG(1) << "Reading meta data from file " << fname << "...";
Tabl... | 72,309,604,699,517,570,000,000,000,000,000,000,000 | tensor_slice_reader.cc | 114,858,728,581,993,820,000,000,000,000,000,000,000 | [
"CWE-345"
] | CVE-2021-41203 | TensorFlow is an open source platform for machine learning. In affected versions an attacker can trigger undefined behavior, integer overflows, segfaults and `CHECK`-fail crashes if they can change saved checkpoints from outside of TensorFlow. This is because the checkpoints loading infrastructure is missing validation... | https://nvd.nist.gov/vuln/detail/CVE-2021-41203 |
195,036 | openexr | 11cad77da87c4fa2aab7d58dd5339e254db7937e | https://github.com/AcademySoftwareFoundation/openexr | https://github.com/AcademySoftwareFoundation/openexr/commit/11cad77da87c4fa2aab7d58dd5339e254db7937e | enforce xSampling/ySampling==1 in CompositeDeepScanLine (#1209)
Signed-off-by: Peter Hillman <peterh@wetafx.co.nz> | 1 | CompositeDeepScanLine::setFrameBuffer(const FrameBuffer& fr)
{
//
// count channels; build map between channels in frame buffer
// and channels in internal buffers
//
_Data->_channels.resize(3);
_Data->_channels[0]="Z";
_Data->_channels[1]=_Data->_zback ? "ZBack" : "Z";
_Data->... | 106,928,644,112,382,330,000,000,000,000,000,000,000 | ImfCompositeDeepScanLine.cpp | 297,117,260,678,292,240,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2021-45942 | OpenEXR 3.1.x before 3.1.4 has a heap-based buffer overflow in Imf_3_1::LineCompositeTask::execute (called from IlmThread_3_1::NullThreadPoolProvider::addTask and IlmThread_3_1::ThreadPool::addGlobalTask). NOTE: db217f2 may be inapplicable. | https://nvd.nist.gov/vuln/detail/CVE-2021-45942 |
220,379 | openexr | 11cad77da87c4fa2aab7d58dd5339e254db7937e | https://github.com/AcademySoftwareFoundation/openexr | https://github.com/AcademySoftwareFoundation/openexr/commit/11cad77da87c4fa2aab7d58dd5339e254db7937e | enforce xSampling/ySampling==1 in CompositeDeepScanLine (#1209)
Signed-off-by: Peter Hillman <peterh@wetafx.co.nz> | 0 | CompositeDeepScanLine::setFrameBuffer(const FrameBuffer& fr)
{
//
// count channels; build map between channels in frame buffer
// and channels in internal buffers
//
_Data->_channels.resize(3);
_Data->_channels[0]="Z";
_Data->_channels[1]=_Data->_zback ? "ZBack" : "Z";
_Data->... | 43,275,924,463,396,740,000,000,000,000,000,000,000 | ImfCompositeDeepScanLine.cpp | 242,287,697,630,984,150,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2021-45942 | OpenEXR 3.1.x before 3.1.4 has a heap-based buffer overflow in Imf_3_1::LineCompositeTask::execute (called from IlmThread_3_1::NullThreadPoolProvider::addTask and IlmThread_3_1::ThreadPool::addGlobalTask). NOTE: db217f2 may be inapplicable. | https://nvd.nist.gov/vuln/detail/CVE-2021-45942 |
195,041 | ImageMagick | 139d4323c40d7363bfdd2382c3821a6f76d69430 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/139d4323c40d7363bfdd2382c3821a6f76d69430 | RLE check for pixel offset less than 0 (heap overflow report from Craig Young) | 1 | static Image *ReadRLEImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
#define SkipLinesOp 0x01
#define SetColorOp 0x02
#define SkipPixelsOp 0x03
#define ByteDataOp 0x05
#define RunDataOp 0x06
#define EOFOp 0x07
char
magick[12];
Image
*image;
int
opcode,
operand,
status;
... | 103,316,004,124,519,400,000,000,000,000,000,000,000 | rle.c | 129,418,496,808,109,920,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2016-10050 | Heap-based buffer overflow in the ReadRLEImage function in coders/rle.c in ImageMagick 6.9.4-8 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted RLE file. | https://nvd.nist.gov/vuln/detail/CVE-2016-10050 |
220,467 | ImageMagick | 139d4323c40d7363bfdd2382c3821a6f76d69430 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/139d4323c40d7363bfdd2382c3821a6f76d69430 | RLE check for pixel offset less than 0 (heap overflow report from Craig Young) | 0 | static Image *ReadRLEImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
#define SkipLinesOp 0x01
#define SetColorOp 0x02
#define SkipPixelsOp 0x03
#define ByteDataOp 0x05
#define RunDataOp 0x06
#define EOFOp 0x07
char
magick[12];
Image
*image;
int
opcode,
operand,
status;
... | 62,132,515,838,777,290,000,000,000,000,000,000,000 | rle.c | 79,939,741,749,934,050,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2016-10050 | Heap-based buffer overflow in the ReadRLEImage function in coders/rle.c in ImageMagick 6.9.4-8 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted RLE file. | https://nvd.nist.gov/vuln/detail/CVE-2016-10050 |
195,043 | libtiff | be4c85b16e8801a16eec25e80eb9f3dd6a96731b | https://github.com/vadz/libtiff | https://github.com/vadz/libtiff/commit/be4c85b16e8801a16eec25e80eb9f3dd6a96731b | Fix NULL pointer dereference in TIFFPrintDirectory
The TIFFPrintDirectory function relies on the following assumptions,
supposed to be guaranteed by the specification:
(a) A Transfer Function field is only present if the TIFF file has
photometric type < 3.
(b) If SamplesPerPixel > Color Channels, then the ExtraS... | 1 | TIFFPrintDirectory(TIFF* tif, FILE* fd, long flags)
{
TIFFDirectory *td = &tif->tif_dir;
char *sep;
long l, n;
#if defined(__WIN32__) && (defined(_MSC_VER) || defined(__MINGW32__))
fprintf(fd, "TIFF Directory at offset 0x%I64x (%I64u)\n",
(unsigned __int64) tif->tif_diroff,
(unsigned __int64) tif->tif_diroff);... | 41,890,862,415,543,167,000,000,000,000,000,000,000 | tif_print.c | 173,688,956,736,061,900,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2018-7456 | A NULL Pointer Dereference occurs in the function TIFFPrintDirectory in tif_print.c in LibTIFF 3.9.3, 3.9.4, 3.9.5, 3.9.6, 3.9.7, 4.0.0alpha4, 4.0.0alpha5, 4.0.0alpha6, 4.0.0beta7, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.4beta, 4.0.5, 4.0.6, 4.0.7, 4.0.8 and 4.0.9 when using the tiffinfo tool to print crafted TIFF infor... | https://nvd.nist.gov/vuln/detail/CVE-2018-7456 |
220,554 | libtiff | be4c85b16e8801a16eec25e80eb9f3dd6a96731b | https://github.com/vadz/libtiff | https://github.com/vadz/libtiff/commit/be4c85b16e8801a16eec25e80eb9f3dd6a96731b | Fix NULL pointer dereference in TIFFPrintDirectory
The TIFFPrintDirectory function relies on the following assumptions,
supposed to be guaranteed by the specification:
(a) A Transfer Function field is only present if the TIFF file has
photometric type < 3.
(b) If SamplesPerPixel > Color Channels, then the ExtraS... | 0 | TIFFPrintDirectory(TIFF* tif, FILE* fd, long flags)
{
TIFFDirectory *td = &tif->tif_dir;
char *sep;
long l, n;
#if defined(__WIN32__) && (defined(_MSC_VER) || defined(__MINGW32__))
fprintf(fd, "TIFF Directory at offset 0x%I64x (%I64u)\n",
(unsigned __int64) tif->tif_diroff,
(unsigned __int64) tif->tif_diroff);... | 111,100,651,816,090,560,000,000,000,000,000,000,000 | tif_print.c | 170,535,908,478,173,840,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2018-7456 | A NULL Pointer Dereference occurs in the function TIFFPrintDirectory in tif_print.c in LibTIFF 3.9.3, 3.9.4, 3.9.5, 3.9.6, 3.9.7, 4.0.0alpha4, 4.0.0alpha5, 4.0.0alpha6, 4.0.0beta7, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.4beta, 4.0.5, 4.0.6, 4.0.7, 4.0.8 and 4.0.9 when using the tiffinfo tool to print crafted TIFF infor... | https://nvd.nist.gov/vuln/detail/CVE-2018-7456 |
195,065 | unicorn | c733bbada356b0373fa8aa72c044574bb855fd24 | https://github.com/unicorn-engine/unicorn | https://github.com/unicorn-engine/unicorn/commit/c733bbada356b0373fa8aa72c044574bb855fd24 | Fix wrong offset used in split_region | 1 | static bool split_region(struct uc_struct *uc, MemoryRegion *mr,
uint64_t address, size_t size, bool do_delete)
{
uint8_t *backup;
uint32_t perms;
uint64_t begin, end, chunk_end;
size_t l_size, m_size, r_size;
RAMBlock *block = NULL;
bool prealloc = false;
chunk_end... | 245,216,537,662,050,600,000,000,000,000,000,000,000 | uc.c | 200,672,098,826,650,160,000,000,000,000,000,000,000 | [
"CWE-697"
] | CVE-2021-44078 | An issue was discovered in split_region in uc.c in Unicorn Engine before 2.0.0-rc5. It allows local attackers to escape the sandbox. An attacker must first obtain the ability to execute crafted code in the target sandbox in order to exploit this vulnerability. The specific flaw exists within the virtual memory manager.... | https://nvd.nist.gov/vuln/detail/CVE-2021-44078 |
220,950 | unicorn | c733bbada356b0373fa8aa72c044574bb855fd24 | https://github.com/unicorn-engine/unicorn | https://github.com/unicorn-engine/unicorn/commit/c733bbada356b0373fa8aa72c044574bb855fd24 | Fix wrong offset used in split_region | 0 | static bool split_region(struct uc_struct *uc, MemoryRegion *mr,
uint64_t address, size_t size, bool do_delete)
{
uint8_t *backup;
uint32_t perms;
uint64_t begin, end, chunk_end;
size_t l_size, m_size, r_size;
RAMBlock *block = NULL;
bool prealloc = false;
chunk_end... | 40,500,248,184,233,647,000,000,000,000,000,000,000 | uc.c | 7,579,714,166,145,243,000,000,000,000,000,000,000 | [
"CWE-697"
] | CVE-2021-44078 | An issue was discovered in split_region in uc.c in Unicorn Engine before 2.0.0-rc5. It allows local attackers to escape the sandbox. An attacker must first obtain the ability to execute crafted code in the target sandbox in order to exploit this vulnerability. The specific flaw exists within the virtual memory manager.... | https://nvd.nist.gov/vuln/detail/CVE-2021-44078 |
195,070 | tensorflow | 448a16182065bd08a202d9057dd8ca541e67996c | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/448a16182065bd08a202d9057dd8ca541e67996c | Prevent stack overflow when FunctionLib in GraphDef has a self-recursive function.
It is likely that no recursivity is supported, but we should handle this separately.
PiperOrigin-RevId: 414860329
Change-Id: I02a2270e86282b37362ddd485eeef16fb986a9e0 | 1 | static Status ValidateSavedTensors(const GraphDef& graph_def) {
for (const auto& node : graph_def.node()) {
TF_RETURN_IF_ERROR(ValidateNode(node));
}
if (graph_def.has_library()) {
const FunctionDefLibrary& library = graph_def.library();
for (const auto& function : library.function()) {
for (co... | 82,095,244,889,161,240,000,000,000,000,000,000,000 | loader.cc | 163,875,138,317,357,770,000,000,000,000,000,000,000 | [
"CWE-400"
] | CVE-2022-23591 | Tensorflow is an Open Source Machine Learning Framework. The `GraphDef` format in TensorFlow does not allow self recursive functions. The runtime assumes that this invariant is satisfied. However, a `GraphDef` containing a fragment such as the following can be consumed when loading a `SavedModel`. This would result in ... | https://nvd.nist.gov/vuln/detail/CVE-2022-23591 |
221,109 | tensorflow | 448a16182065bd08a202d9057dd8ca541e67996c | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/448a16182065bd08a202d9057dd8ca541e67996c | Prevent stack overflow when FunctionLib in GraphDef has a self-recursive function.
It is likely that no recursivity is supported, but we should handle this separately.
PiperOrigin-RevId: 414860329
Change-Id: I02a2270e86282b37362ddd485eeef16fb986a9e0 | 0 | static Status ValidateSavedTensors(const GraphDef& graph_def) {
for (const auto& node : graph_def.node()) {
TF_RETURN_IF_ERROR(ValidateNode(node));
}
if (graph_def.has_library()) {
const FunctionDefLibrary& library = graph_def.library();
for (const auto& function : library.function()) {
for (co... | 61,611,172,031,557,740,000,000,000,000,000,000,000 | loader.cc | 109,035,991,591,774,980,000,000,000,000,000,000,000 | [
"CWE-400"
] | CVE-2022-23591 | Tensorflow is an Open Source Machine Learning Framework. The `GraphDef` format in TensorFlow does not allow self recursive functions. The runtime assumes that this invariant is satisfied. However, a `GraphDef` containing a fragment such as the following can be consumed when loading a `SavedModel`. This would result in ... | https://nvd.nist.gov/vuln/detail/CVE-2022-23591 |
195,072 | ImageMagick | 3b0fe05cddd8910f84e51b4d50099702ea45ba4a | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/3b0fe05cddd8910f84e51b4d50099702ea45ba4a | Fixed memory leak reported in #456. | 1 | static Image *ReadARTImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
const unsigned char
*pixels;
Image
*image;
QuantumInfo
*quantum_info;
MagickBooleanType
status;
size_t
length;
ssize_t
count,
y;
/*
Open image file.
*/
assert(image_info != (const I... | 293,507,322,430,629,180,000,000,000,000,000,000,000 | art.c | 127,793,943,860,368,180,000,000,000,000,000,000,000 | [
"CWE-772"
] | CVE-2017-9143 | In ImageMagick 7.0.5-5, the ReadARTImage function in coders/art.c allows attackers to cause a denial of service (memory leak) via a crafted .art file. | https://nvd.nist.gov/vuln/detail/CVE-2017-9143 |
221,122 | ImageMagick | 3b0fe05cddd8910f84e51b4d50099702ea45ba4a | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/3b0fe05cddd8910f84e51b4d50099702ea45ba4a | Fixed memory leak reported in #456. | 0 | static Image *ReadARTImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
const unsigned char
*pixels;
Image
*image;
QuantumInfo
*quantum_info;
MagickBooleanType
status;
size_t
length;
ssize_t
count,
y;
/*
Open image file.
*/
assert(image_info != (const I... | 177,360,541,747,278,200,000,000,000,000,000,000,000 | art.c | 159,893,501,427,053,520,000,000,000,000,000,000,000 | [
"CWE-772"
] | CVE-2017-9143 | In ImageMagick 7.0.5-5, the ReadARTImage function in coders/art.c allows attackers to cause a denial of service (memory leak) via a crafted .art file. | https://nvd.nist.gov/vuln/detail/CVE-2017-9143 |
195,086 | openexr | db217f29dfb24f6b4b5100c24ac5e7490e1c57d0 | https://github.com/AcademySoftwareFoundation/openexr | https://github.com/AcademySoftwareFoundation/openexr/commit/db217f29dfb24f6b4b5100c24ac5e7490e1c57d0 | DeepScanlineInputFile now uses chunk size test from DeepTiledInputFile (#1205)
Signed-off-by: Peter Hillman <peterh@wetafx.co.nz> | 1 | readSampleCountForLineBlock(InputStreamMutex* streamData,
DeepScanLineInputFile::Data* data,
int lineBlockId)
{
streamData->is->seekg(data->lineOffsets[lineBlockId]);
if (isMultiPart(data->version))
{
int partNumber;
OPENEXR_IMF_INTERN... | 268,032,354,561,063,430,000,000,000,000,000,000,000 | ImfDeepScanLineInputFile.cpp | 296,888,461,175,287,170,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2021-45942 | OpenEXR 3.1.x before 3.1.4 has a heap-based buffer overflow in Imf_3_1::LineCompositeTask::execute (called from IlmThread_3_1::NullThreadPoolProvider::addTask and IlmThread_3_1::ThreadPool::addGlobalTask). NOTE: db217f2 may be inapplicable. | https://nvd.nist.gov/vuln/detail/CVE-2021-45942 |
221,557 | openexr | db217f29dfb24f6b4b5100c24ac5e7490e1c57d0 | https://github.com/AcademySoftwareFoundation/openexr | https://github.com/AcademySoftwareFoundation/openexr/commit/db217f29dfb24f6b4b5100c24ac5e7490e1c57d0 | DeepScanlineInputFile now uses chunk size test from DeepTiledInputFile (#1205)
Signed-off-by: Peter Hillman <peterh@wetafx.co.nz> | 0 | readSampleCountForLineBlock(InputStreamMutex* streamData,
DeepScanLineInputFile::Data* data,
int lineBlockId)
{
streamData->is->seekg(data->lineOffsets[lineBlockId]);
if (isMultiPart(data->version))
{
int partNumber;
OPENEXR_IMF_INTERN... | 125,719,970,870,006,760,000,000,000,000,000,000,000 | ImfDeepScanLineInputFile.cpp | 244,903,926,827,325,830,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2021-45942 | OpenEXR 3.1.x before 3.1.4 has a heap-based buffer overflow in Imf_3_1::LineCompositeTask::execute (called from IlmThread_3_1::NullThreadPoolProvider::addTask and IlmThread_3_1::ThreadPool::addGlobalTask). NOTE: db217f2 may be inapplicable. | https://nvd.nist.gov/vuln/detail/CVE-2021-45942 |
195,089 | radare2 | a07dedb804a82bc01c07072861942dd80c6b6d62 | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/a07dedb804a82bc01c07072861942dd80c6b6d62 | Fix #18667 - division by zero in the macho parser ##bin | 1 | static void rebase_buffer(struct MACH0_(obj_t) *obj, ut64 off, RIODesc *fd, ut8 *buf, int count) {
if (obj->rebasing_buffer) {
return;
}
obj->rebasing_buffer = true;
ut64 eob = off + count;
int i = 0;
for (; i < obj->nsegs; i++) {
if (!obj->chained_starts[i]) {
continue;
}
ut64 page_size = obj->chained... | 289,447,408,840,365,700,000,000,000,000,000,000,000 | bin_mach0.c | 273,182,220,740,970,240,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2021-32613 | In radare2 through 5.3.0 there is a double free vulnerability in the pyc parse via a crafted file which can lead to DoS. | https://nvd.nist.gov/vuln/detail/CVE-2021-32613 |
221,619 | radare2 | a07dedb804a82bc01c07072861942dd80c6b6d62 | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/a07dedb804a82bc01c07072861942dd80c6b6d62 | Fix #18667 - division by zero in the macho parser ##bin | 0 | static void rebase_buffer(struct MACH0_(obj_t) *obj, ut64 off, RIODesc *fd, ut8 *buf, int count) {
if (obj->rebasing_buffer) {
return;
}
obj->rebasing_buffer = true;
ut64 eob = off + count;
int i = 0;
for (; i < obj->nsegs; i++) {
if (!obj->chained_starts[i]) {
continue;
}
int page_size = obj->chained_... | 207,568,537,214,620,600,000,000,000,000,000,000,000 | bin_mach0.c | 45,796,997,256,051,670,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2021-32613 | In radare2 through 5.3.0 there is a double free vulnerability in the pyc parse via a crafted file which can lead to DoS. | https://nvd.nist.gov/vuln/detail/CVE-2021-32613 |
195,219 | tensorflow | 1361fb7e29449629e1df94d44e0427ebec8c83c7 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/1361fb7e29449629e1df94d44e0427ebec8c83c7 | Fix abort caused by allocating a too large vector.
We need to make sure that the number of dimensions in a shape is within limits.
PiperOrigin-RevId: 408997911
Change-Id: If59e1c23f2ec9c2d4ff4d8632fd62b2a7773a4eb | 1 | Status InferenceContext::InternalMakeShapeFromTensor(
bool treat_unknown_scalar_tensor_as_unknown_shape, const Tensor* t,
ShapeHandle tensor_shape, ShapeHandle* out) {
// Only callers who have set
if (!treat_unknown_scalar_tensor_as_unknown_shape) {
TF_RETURN_IF_ERROR(WithRank(tensor_shape, 1, &tensor_s... | 237,311,730,790,925,800,000,000,000,000,000,000,000 | shape_inference.cc | 153,888,615,473,057,040,000,000,000,000,000,000,000 | [
"CWE-400"
] | CVE-2022-23580 | Tensorflow is an Open Source Machine Learning Framework. During shape inference, TensorFlow can allocate a large vector based on a value from a tensor controlled by the user. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as... | https://nvd.nist.gov/vuln/detail/CVE-2022-23580 |
222,610 | tensorflow | 1361fb7e29449629e1df94d44e0427ebec8c83c7 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/1361fb7e29449629e1df94d44e0427ebec8c83c7 | Fix abort caused by allocating a too large vector.
We need to make sure that the number of dimensions in a shape is within limits.
PiperOrigin-RevId: 408997911
Change-Id: If59e1c23f2ec9c2d4ff4d8632fd62b2a7773a4eb | 0 | Status InferenceContext::InternalMakeShapeFromTensor(
bool treat_unknown_scalar_tensor_as_unknown_shape, const Tensor* t,
ShapeHandle tensor_shape, ShapeHandle* out) {
// Only callers who have set
if (!treat_unknown_scalar_tensor_as_unknown_shape) {
TF_RETURN_IF_ERROR(WithRank(tensor_shape, 1, &tensor_s... | 45,252,590,481,459,420,000,000,000,000,000,000,000 | shape_inference.cc | 78,443,107,754,275,295,000,000,000,000,000,000,000 | [
"CWE-400"
] | CVE-2022-23580 | Tensorflow is an Open Source Machine Learning Framework. During shape inference, TensorFlow can allocate a large vector based on a value from a tensor controlled by the user. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as... | https://nvd.nist.gov/vuln/detail/CVE-2022-23580 |
195,232 | flatpak | 445bddeee657fdc8d2a0a1f0de12975400d4fc1a | https://github.com/flatpak/flatpak | https://github.com/flatpak/flatpak/commit/445bddeee657fdc8d2a0a1f0de12975400d4fc1a | Make --nofilesystem=host/home remove access to subdirs of those
Previously --nofilesystem=host only removed specifically access to the
`host` permissions, and not necessarily other filesystems (like `home`
or `/some/path`). This isn't very useful to limit access because you
don't know what other filesystems the app ma... | 1 | flatpak_context_merge (FlatpakContext *context,
FlatpakContext *other)
{
GHashTableIter iter;
gpointer key, value;
context->shares &= ~other->shares_valid;
context->shares |= other->shares;
context->shares_valid |= other->shares_valid;
context->sockets &= ~other->sockets_valid;
con... | 120,286,214,034,948,050,000,000,000,000,000,000,000 | flatpak-context.c | 326,647,572,026,353,200,000,000,000,000,000,000,000 | [
"CWE-22"
] | CVE-2022-21682 | Flatpak is a Linux application sandboxing and distribution framework. A path traversal vulnerability affects versions of Flatpak prior to 1.12.3 and 1.10.6. flatpak-builder applies `finish-args` last in the build. At this point the build directory will have the full access that is specified in the manifest, so running ... | https://nvd.nist.gov/vuln/detail/CVE-2022-21682 |
222,771 | flatpak | 445bddeee657fdc8d2a0a1f0de12975400d4fc1a | https://github.com/flatpak/flatpak | https://github.com/flatpak/flatpak/commit/445bddeee657fdc8d2a0a1f0de12975400d4fc1a | Make --nofilesystem=host/home remove access to subdirs of those
Previously --nofilesystem=host only removed specifically access to the
`host` permissions, and not necessarily other filesystems (like `home`
or `/some/path`). This isn't very useful to limit access because you
don't know what other filesystems the app ma... | 0 | flatpak_context_merge (FlatpakContext *context,
FlatpakContext *other)
{
GHashTableIter iter;
gpointer key, value;
gboolean no_home = FALSE;
gboolean no_host = FALSE;
context->shares &= ~other->shares_valid;
context->shares |= other->shares;
context->shares_valid |= other->shares_v... | 310,154,835,461,227,000,000,000,000,000,000,000,000 | flatpak-context.c | 25,742,465,989,604,863,000,000,000,000,000,000,000 | [
"CWE-22"
] | CVE-2022-21682 | Flatpak is a Linux application sandboxing and distribution framework. A path traversal vulnerability affects versions of Flatpak prior to 1.12.3 and 1.10.6. flatpak-builder applies `finish-args` last in the build. At this point the build directory will have the full access that is specified in the manifest, so running ... | https://nvd.nist.gov/vuln/detail/CVE-2022-21682 |
195,248 | ImageMagick | 9c9a84cec4ab28ee0b57c2b9266d6fbe68183512 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/9c9a84cec4ab28ee0b57c2b9266d6fbe68183512 | fix issue: outside the range of representable values of type 'unsigned int' at coders/psd.c:1025 (#4963)
* fix Division by zero in XMenuWidget() of MagickCore/widget.c
* Fix memory leak in AnimateImageCommand() of MagickWand/animate.c and DisplayImageCommand() of MagickWand/display.c
* fix Division by zero in ReadEn... | 1 | static MagickBooleanType ReadPSDChannelPixels(Image *image,const ssize_t row,
const PixelChannel channel,const unsigned char *pixels,
ExceptionInfo *exception)
{
Quantum
pixel;
const unsigned char
*p;
Quantum
*q;
ssize_t
x;
size_t
packet_size;
p=pixels;
q=GetAuthenticPixels(im... | 78,370,691,228,984,510,000,000,000,000,000,000,000 | psd.c | 161,913,187,484,263,500,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2022-32545 | A vulnerability was found in ImageMagick, causing an outside the range of representable values of type 'unsigned char' at coders/psd.c, when crafted or untrusted input is processed. This leads to a negative impact to application availability or other problems related to undefined behavior. | https://nvd.nist.gov/vuln/detail/CVE-2022-32545 |
223,203 | ImageMagick | 9c9a84cec4ab28ee0b57c2b9266d6fbe68183512 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/9c9a84cec4ab28ee0b57c2b9266d6fbe68183512 | fix issue: outside the range of representable values of type 'unsigned int' at coders/psd.c:1025 (#4963)
* fix Division by zero in XMenuWidget() of MagickCore/widget.c
* Fix memory leak in AnimateImageCommand() of MagickWand/animate.c and DisplayImageCommand() of MagickWand/display.c
* fix Division by zero in ReadEn... | 0 | static MagickBooleanType ReadPSDChannelPixels(Image *image,const ssize_t row,
const PixelChannel channel,const unsigned char *pixels,
ExceptionInfo *exception)
{
Quantum
pixel;
const unsigned char
*p;
Quantum
*q;
ssize_t
x;
size_t
packet_size;
p=pixels;
q=GetAuthenticPixels(im... | 46,966,122,390,366,470,000,000,000,000,000,000,000 | psd.c | 288,504,131,922,116,250,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2022-32545 | A vulnerability was found in ImageMagick, causing an outside the range of representable values of type 'unsigned char' at coders/psd.c, when crafted or untrusted input is processed. This leads to a negative impact to application availability or other problems related to undefined behavior. | https://nvd.nist.gov/vuln/detail/CVE-2022-32545 |
195,268 | tensorflow | 0657c83d08845cc434175934c642299de2c0f042 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/0657c83d08845cc434175934c642299de2c0f042 | Fix heap OOB read/write due to incorrect indexing.
PiperOrigin-RevId: 408578046
Change-Id: Ifc9ffea49e5890f55fcb2c27568611052c3ddcfa | 1 | StatusOr<FullTypeDef> SpecializeType(const AttrSlice& attrs,
const OpDef& op_def) {
FullTypeDef ft;
ft.set_type_id(TFT_PRODUCT);
for (int i = 0; i < op_def.output_arg_size(); i++) {
auto* t = ft.add_args();
*t = op_def.output_arg(i).experimental_full_type();
// ... | 1,779,476,434,608,858,000,000,000,000,000,000,000 | full_type_util.cc | 314,176,305,959,180,500,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2022-23574 | Tensorflow is an Open Source Machine Learning Framework. There is a typo in TensorFlow's `SpecializeType` which results in heap OOB read/write. Due to a typo, `arg` is initialized to the `i`th mutable argument in a loop where the loop index is `j`. Hence it is possible to assign to `arg` from outside the vector of argu... | https://nvd.nist.gov/vuln/detail/CVE-2022-23574 |
223,535 | tensorflow | 0657c83d08845cc434175934c642299de2c0f042 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/0657c83d08845cc434175934c642299de2c0f042 | Fix heap OOB read/write due to incorrect indexing.
PiperOrigin-RevId: 408578046
Change-Id: Ifc9ffea49e5890f55fcb2c27568611052c3ddcfa | 0 | StatusOr<FullTypeDef> SpecializeType(const AttrSlice& attrs,
const OpDef& op_def) {
FullTypeDef ft;
ft.set_type_id(TFT_PRODUCT);
for (int i = 0; i < op_def.output_arg_size(); i++) {
auto* t = ft.add_args();
*t = op_def.output_arg(i).experimental_full_type();
// ... | 251,313,658,553,166,780,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2022-23574 | Tensorflow is an Open Source Machine Learning Framework. There is a typo in TensorFlow's `SpecializeType` which results in heap OOB read/write. Due to a typo, `arg` is initialized to the `i`th mutable argument in a loop where the loop index is `j`. Hence it is possible to assign to `arg` from outside the vector of argu... | https://nvd.nist.gov/vuln/detail/CVE-2022-23574 |
195,269 | gpac | 5dd71c7201a3e5cf40732d585bfb21c906c171d3 | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/5dd71c7201a3e5cf40732d585bfb21c906c171d3 | fixed #1901 | 1 | void naludmx_create_avc_decoder_config(GF_NALUDmxCtx *ctx, u8 **dsi, u32 *dsi_size, u8 **dsi_enh, u32 *dsi_enh_size, u32 *max_width, u32 *max_height, u32 *max_enh_width, u32 *max_enh_height, GF_Fraction *sar)
{
u32 i, count;
Bool first = GF_TRUE;
Bool first_svc = GF_TRUE;
GF_AVCConfig *cfg;
GF_AVCConfig *avcc;
GF... | 116,251,717,258,867,500,000,000,000,000,000,000,000 | reframe_nalu.c | 261,113,698,868,455,370,000,000,000,000,000,000,000 | [
"CWE-697"
] | CVE-2021-40562 | A Segmentation fault caused by a floating point exception exists in Gpac through 1.0.1 using mp4box via the naludmx_enqueue_or_dispatch function in reframe_nalu.c, which causes a denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2021-40562 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.