idx
int64
project
string
commit_id
string
project_url
string
commit_url
string
commit_message
string
target
int64
func
string
func_hash
float64
file_name
string
file_hash
float64
cwe
list
cve
string
cve_desc
string
nvd_url
string
223,568
gpac
5dd71c7201a3e5cf40732d585bfb21c906c171d3
https://github.com/gpac/gpac
https://github.com/gpac/gpac/commit/5dd71c7201a3e5cf40732d585bfb21c906c171d3
fixed #1901
0
void naludmx_create_avc_decoder_config(GF_NALUDmxCtx *ctx, u8 **dsi, u32 *dsi_size, u8 **dsi_enh, u32 *dsi_enh_size, u32 *max_width, u32 *max_height, u32 *max_enh_width, u32 *max_enh_height, GF_Fraction *sar) { u32 i, count; Bool first = GF_TRUE; Bool first_svc = GF_TRUE; GF_AVCConfig *cfg; GF_AVCConfig *avcc; GF...
156,110,532,668,706,100,000,000,000,000,000,000,000
reframe_nalu.c
271,274,878,878,705,300,000,000,000,000,000,000,000
[ "CWE-697" ]
CVE-2021-40562
A Segmentation fault caused by a floating point exception exists in Gpac through 1.0.1 using mp4box via the naludmx_enqueue_or_dispatch function in reframe_nalu.c, which causes a denial of service.
https://nvd.nist.gov/vuln/detail/CVE-2021-40562
195,275
linux
7e78c597c3ebfd0cb329aa09a838734147e4f117
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/7e78c597c3ebfd0cb329aa09a838734147e4f117
net: qrtr: fix another OOB Read in qrtr_endpoint_post This check was incomplete, did not consider size is 0: if (len != ALIGN(size, 4) + hdrlen) goto err; if size from qrtr_hdr is 0, the result of ALIGN(size, 4) will be 0, In case of len == hdrlen and size == 0 in header this check won't fail an...
1
int qrtr_endpoint_post(struct qrtr_endpoint *ep, const void *data, size_t len) { struct qrtr_node *node = ep->node; const struct qrtr_hdr_v1 *v1; const struct qrtr_hdr_v2 *v2; struct qrtr_sock *ipc; struct sk_buff *skb; struct qrtr_cb *cb; size_t size; unsigned int ver; size_t hdrlen; if (len == 0 || len & 3...
178,168,426,202,246,070,000,000,000,000,000,000,000
qrtr.c
334,167,332,905,484,160,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2021-3743
An out-of-bounds (OOB) memory read flaw was found in the Qualcomm IPC router protocol in the Linux kernel. A missing sanity check allows a local attacker to gain access to out-of-bounds memory, leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system av...
https://nvd.nist.gov/vuln/detail/CVE-2021-3743
223,730
linux
7e78c597c3ebfd0cb329aa09a838734147e4f117
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/7e78c597c3ebfd0cb329aa09a838734147e4f117
net: qrtr: fix another OOB Read in qrtr_endpoint_post This check was incomplete, did not consider size is 0: if (len != ALIGN(size, 4) + hdrlen) goto err; if size from qrtr_hdr is 0, the result of ALIGN(size, 4) will be 0, In case of len == hdrlen and size == 0 in header this check won't fail an...
0
int qrtr_endpoint_post(struct qrtr_endpoint *ep, const void *data, size_t len) { struct qrtr_node *node = ep->node; const struct qrtr_hdr_v1 *v1; const struct qrtr_hdr_v2 *v2; struct qrtr_sock *ipc; struct sk_buff *skb; struct qrtr_cb *cb; size_t size; unsigned int ver; size_t hdrlen; if (len == 0 || len & 3...
181,131,054,700,959,030,000,000,000,000,000,000,000
qrtr.c
275,084,536,035,822,260,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2021-3743
An out-of-bounds (OOB) memory read flaw was found in the Qualcomm IPC router protocol in the Linux kernel. A missing sanity check allows a local attacker to gain access to out-of-bounds memory, leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system av...
https://nvd.nist.gov/vuln/detail/CVE-2021-3743
195,299
tensorflow
53b0dd6dc5957652f35964af16b892ec9af4a559
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/53b0dd6dc5957652f35964af16b892ec9af4a559
Fix nullptr exception in QuantizedMaxPool op when empty list is sent to min_input or max_input parameters. PiperOrigin-RevId: 413960973 Change-Id: I9e3ded593f3c4eabf0d6d5dc356e6a19a3ad2682
1
void Compute(OpKernelContext* context) override { const float min_input = context->input(1).flat<float>()(0); const float max_input = context->input(2).flat<float>()(0); MaxPoolingOp<Device, T>::Compute(context); Tensor* output_min = nullptr; OP_REQUIRES_OK(context, context->allocate_output(1, {},...
250,376,451,673,768,600,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2022-21739
Tensorflow is an Open Source Machine Learning Framework. The implementation of `QuantizedMaxPool` has an undefined behavior where user controlled inputs can trigger a reference binding to null pointer. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6....
https://nvd.nist.gov/vuln/detail/CVE-2022-21739
224,211
tensorflow
53b0dd6dc5957652f35964af16b892ec9af4a559
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/53b0dd6dc5957652f35964af16b892ec9af4a559
Fix nullptr exception in QuantizedMaxPool op when empty list is sent to min_input or max_input parameters. PiperOrigin-RevId: 413960973 Change-Id: I9e3ded593f3c4eabf0d6d5dc356e6a19a3ad2682
0
void Compute(OpKernelContext* context) override { auto min_input_tensor = context->input(1); auto max_input_tensor = context->input(2); OP_REQUIRES( context, min_input_tensor.NumElements() == 1, errors::InvalidArgument( "min_input must be a scalar float value, got tensor with s...
20,085,953,845,069,124,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2022-21739
Tensorflow is an Open Source Machine Learning Framework. The implementation of `QuantizedMaxPool` has an undefined behavior where user controlled inputs can trigger a reference binding to null pointer. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6....
https://nvd.nist.gov/vuln/detail/CVE-2022-21739
195,307
tensorflow
23968a8bf65b009120c43b5ebcceaf52dbc9e943
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/23968a8bf65b009120c43b5ebcceaf52dbc9e943
Fix out of bound access in DequantizeOp by adding check for axis < input dimension PiperOrigin-RevId: 411214268 Change-Id: I3249d2a69ddc82f182c589a3a5bbfb71543f4b29
1
void Compute(OpKernelContext* ctx) override { const Tensor& input = ctx->input(0); const Tensor& input_min_tensor = ctx->input(1); const Tensor& input_max_tensor = ctx->input(2); int num_slices = 1; if (axis_ > -1) { num_slices = input.dim_size(axis_); } OP_REQUIRES(ctx, input_min_t...
86,357,967,950,458,980,000,000,000,000,000,000,000
dequantize_op.cc
69,135,831,713,880,660,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2022-21726
Tensorflow is an Open Source Machine Learning Framework. The implementation of `Dequantize` does not fully validate the value of `axis` and can result in heap OOB accesses. The `axis` argument can be `-1` (the default value for the optional argument) or any other positive value at most the number of dimensions of the i...
https://nvd.nist.gov/vuln/detail/CVE-2022-21726
224,271
tensorflow
23968a8bf65b009120c43b5ebcceaf52dbc9e943
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/23968a8bf65b009120c43b5ebcceaf52dbc9e943
Fix out of bound access in DequantizeOp by adding check for axis < input dimension PiperOrigin-RevId: 411214268 Change-Id: I3249d2a69ddc82f182c589a3a5bbfb71543f4b29
0
void Compute(OpKernelContext* ctx) override { const Tensor& input = ctx->input(0); const Tensor& input_min_tensor = ctx->input(1); const Tensor& input_max_tensor = ctx->input(2); OP_REQUIRES( ctx, axis_ < input.dims(), errors::InvalidArgument("Axis must be less than input dimension(",...
112,731,004,970,073,300,000,000,000,000,000,000,000
dequantize_op.cc
245,182,934,111,104,500,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2022-21726
Tensorflow is an Open Source Machine Learning Framework. The implementation of `Dequantize` does not fully validate the value of `axis` and can result in heap OOB accesses. The `axis` argument can be `-1` (the default value for the optional argument) or any other positive value at most the number of dimensions of the i...
https://nvd.nist.gov/vuln/detail/CVE-2022-21726
195,332
postgres
28e24125541545483093819efae9bca603441951
https://github.com/postgres/postgres
https://github.com/postgres/postgres/commit/28e24125541545483093819efae9bca603441951
Reject extraneous data after SSL or GSS encryption handshake. The server collects up to a bufferload of data whenever it reads data from the client socket. When SSL or GSS encryption is requested during startup, any additional data received with the initial request message remained in the buffer, and would be treated...
1
ProcessStartupPacket(Port *port, bool ssl_done, bool gss_done) { int32 len; char *buf; ProtocolVersion proto; MemoryContext oldcontext; pq_startmsgread(); /* * Grab the first byte of the length word separately, so that we can tell * whether we have no data at all or an incomplete packet. (This might ...
307,208,757,848,729,870,000,000,000,000,000,000,000
postmaster.c
159,297,942,961,047,380,000,000,000,000,000,000,000
[ "CWE-89" ]
CVE-2021-23214
When the server is configured to use trust authentication with a clientcert requirement or to use cert authentication, a man-in-the-middle attacker can inject arbitrary SQL queries when a connection is first established, despite the use of SSL certificate verification and encryption.
https://nvd.nist.gov/vuln/detail/CVE-2021-23214
224,628
postgres
28e24125541545483093819efae9bca603441951
https://github.com/postgres/postgres
https://github.com/postgres/postgres/commit/28e24125541545483093819efae9bca603441951
Reject extraneous data after SSL or GSS encryption handshake. The server collects up to a bufferload of data whenever it reads data from the client socket. When SSL or GSS encryption is requested during startup, any additional data received with the initial request message remained in the buffer, and would be treated...
0
ProcessStartupPacket(Port *port, bool ssl_done, bool gss_done) { int32 len; char *buf; ProtocolVersion proto; MemoryContext oldcontext; pq_startmsgread(); /* * Grab the first byte of the length word separately, so that we can tell * whether we have no data at all or an incomplete packet. (This might ...
115,508,550,411,717,700,000,000,000,000,000,000,000
postmaster.c
120,483,641,159,036,720,000,000,000,000,000,000,000
[ "CWE-89" ]
CVE-2021-23214
When the server is configured to use trust authentication with a clientcert requirement or to use cert authentication, a man-in-the-middle attacker can inject arbitrary SQL queries when a connection is first established, despite the use of SSL certificate verification and encryption.
https://nvd.nist.gov/vuln/detail/CVE-2021-23214
195,333
tensorflow
68422b215e618df5ad375bcdc6d2052e9fd3080a
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/68422b215e618df5ad375bcdc6d2052e9fd3080a
Add shape checks to GPU TridiagonalMatMul. When given invalid shapes, the GPU TridiagonalMatMul op could read invalid or uninitialized GPU memory. PiperOrigin-RevId: 401775483 Change-Id: Ib5500aeb8225e50d4ce790b06d2c34751f544ad8
1
void Compute(OpKernelContext* context) final { const Tensor& superdiag = context->input(0); const Tensor& maindiag = context->input(1); const Tensor& subdiag = context->input(2); const Tensor& rhs = context->input(3); const int ndims = rhs.dims(); int64 batch_size = 1; for (int i = 0; i <...
241,753,953,545,458,540,000,000,000,000,000,000,000
None
null
[ "CWE-354" ]
CVE-2021-41206
TensorFlow is an open source platform for machine learning. In affected versions several TensorFlow operations are missing validation for the shapes of the tensor arguments involved in the call. Depending on the API, this can result in undefined behavior and segfault or `CHECK`-fail related crashes but in some scenario...
https://nvd.nist.gov/vuln/detail/CVE-2021-41206
224,705
tensorflow
68422b215e618df5ad375bcdc6d2052e9fd3080a
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/68422b215e618df5ad375bcdc6d2052e9fd3080a
Add shape checks to GPU TridiagonalMatMul. When given invalid shapes, the GPU TridiagonalMatMul op could read invalid or uninitialized GPU memory. PiperOrigin-RevId: 401775483 Change-Id: Ib5500aeb8225e50d4ce790b06d2c34751f544ad8
0
void Compute(OpKernelContext* context) final { const Tensor& superdiag = context->input(0); const Tensor& maindiag = context->input(1); const Tensor& subdiag = context->input(2); const Tensor& rhs = context->input(3); const int ndims = rhs.dims(); OP_REQUIRES( context, ndims >= 2, ...
195,409,529,863,658,870,000,000,000,000,000,000,000
None
null
[ "CWE-354" ]
CVE-2021-41206
TensorFlow is an open source platform for machine learning. In affected versions several TensorFlow operations are missing validation for the shapes of the tensor arguments involved in the call. Depending on the API, this can result in undefined behavior and segfault or `CHECK`-fail related crashes but in some scenario...
https://nvd.nist.gov/vuln/detail/CVE-2021-41206
195,339
ImageMagick
02dadf116124cfba35d7ebd9ced3e5ad0be0f176
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/02dadf116124cfba35d7ebd9ced3e5ad0be0f176
Fixed SEGV reported in https://github.com/ImageMagick/ImageMagick/issues/130
1
static void WriteTo8BimProfile(Image *image,const char *name, const StringInfo *profile) { const unsigned char *datum, *q; register const unsigned char *p; size_t length; StringInfo *profile_8bim; ssize_t count; unsigned char length_byte; unsigned int value; unsi...
174,726,671,216,694,370,000,000,000,000,000,000,000
profile.c
23,945,488,281,509,553,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2016-7536
magick/profile.c in ImageMagick allows remote attackers to cause a denial of service (segmentation fault) via a crafted profile.
https://nvd.nist.gov/vuln/detail/CVE-2016-7536
224,854
ImageMagick
02dadf116124cfba35d7ebd9ced3e5ad0be0f176
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/02dadf116124cfba35d7ebd9ced3e5ad0be0f176
Fixed SEGV reported in https://github.com/ImageMagick/ImageMagick/issues/130
0
static void WriteTo8BimProfile(Image *image,const char *name, const StringInfo *profile) { const unsigned char *datum, *q; register const unsigned char *p; size_t length; StringInfo *profile_8bim; ssize_t count; unsigned char length_byte; unsigned int value; unsi...
152,226,650,007,865,700,000,000,000,000,000,000,000
profile.c
111,191,593,916,868,450,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2016-7536
magick/profile.c in ImageMagick allows remote attackers to cause a denial of service (segmentation fault) via a crafted profile.
https://nvd.nist.gov/vuln/detail/CVE-2016-7536
195,342
gnutls
51464af713d71802e3c6d5ac15f1a95132a354fe
http://git.savannah.gnu.org/cgit/gnutls
None
cdk_pkt_read: enforce packet limits That ensures that there are no overflows in the subsequent calculations. Resolves the oss-fuzz found bug: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=420 Relates: #159 Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
1
cdk_error_t cdk_pkt_read(cdk_stream_t inp, cdk_packet_t pkt) { int ctb, is_newctb; int pkttype; size_t pktlen = 0, pktsize = 0, is_partial = 0; cdk_error_t rc; if (!inp || !pkt) return CDK_Inv_Value; ctb = cdk_stream_getc(inp); if (cdk_stream_eof(inp) || ctb == EOF) return CDK_EOF; else if (!ctb) return...
189,688,671,553,208,200,000,000,000,000,000,000,000
read-packet.c
21,146,640,525,433,682,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2017-7869
GnuTLS before 2017-02-20 has an out-of-bounds write caused by an integer overflow and heap-based buffer overflow related to the cdk_pkt_read function in opencdk/read-packet.c. This issue (which is a subset of the vendor's GNUTLS-SA-2017-3 report) is fixed in 3.5.10.
https://nvd.nist.gov/vuln/detail/CVE-2017-7869
224,872
gnutls
51464af713d71802e3c6d5ac15f1a95132a354fe
http://git.savannah.gnu.org/cgit/gnutls
None
cdk_pkt_read: enforce packet limits That ensures that there are no overflows in the subsequent calculations. Resolves the oss-fuzz found bug: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=420 Relates: #159 Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
0
cdk_error_t cdk_pkt_read(cdk_stream_t inp, cdk_packet_t pkt) { int ctb, is_newctb; int pkttype; size_t pktlen = 0, pktsize = 0, is_partial = 0; cdk_error_t rc; if (!inp || !pkt) return CDK_Inv_Value; ctb = cdk_stream_getc(inp); if (cdk_stream_eof(inp) || ctb == EOF) return CDK_EOF; else if (!ctb) return...
253,636,419,670,290,600,000,000,000,000,000,000,000
read-packet.c
14,248,314,301,910,845,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2017-7869
GnuTLS before 2017-02-20 has an out-of-bounds write caused by an integer overflow and heap-based buffer overflow related to the cdk_pkt_read function in opencdk/read-packet.c. This issue (which is a subset of the vendor's GNUTLS-SA-2017-3 report) is fixed in 3.5.10.
https://nvd.nist.gov/vuln/detail/CVE-2017-7869
195,390
tensorflow
6f4d3e8139ec724dbbcb40505891c81dd1052c4a
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/6f4d3e8139ec724dbbcb40505891c81dd1052c4a
Prevent crash due to integer overflow followed by allocating negative sized array. PiperOrigin-RevId: 414891322 Change-Id: I5df390e0dc1d9f115209293708950cdf9306931c
1
void Compute(OpKernelContext* context) override { const Tensor& indices = context->input(0); const Tensor& values = context->input(1); const Tensor& shape = context->input(2); const Tensor& weights = context->input(3); bool use_weights = weights.NumElements() > 0; OP_REQUIRES(context, TensorS...
46,420,925,493,068,430,000,000,000,000,000,000,000
count_ops.cc
78,129,872,428,127,460,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2022-21738
Tensorflow is an Open Source Machine Learning Framework. The implementation of `SparseCountSparseOutput` can be made to crash a TensorFlow process by an integer overflow whose result is then used in a memory allocation. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7....
https://nvd.nist.gov/vuln/detail/CVE-2022-21738
225,120
tensorflow
6f4d3e8139ec724dbbcb40505891c81dd1052c4a
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/6f4d3e8139ec724dbbcb40505891c81dd1052c4a
Prevent crash due to integer overflow followed by allocating negative sized array. PiperOrigin-RevId: 414891322 Change-Id: I5df390e0dc1d9f115209293708950cdf9306931c
0
void Compute(OpKernelContext* context) override { const Tensor& indices = context->input(0); const Tensor& values = context->input(1); const Tensor& shape = context->input(2); const Tensor& weights = context->input(3); bool use_weights = weights.NumElements() > 0; OP_REQUIRES(context, TensorS...
280,761,967,989,088,000,000,000,000,000,000,000,000
count_ops.cc
219,536,039,805,810,070,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2022-21738
Tensorflow is an Open Source Machine Learning Framework. The implementation of `SparseCountSparseOutput` can be made to crash a TensorFlow process by an integer overflow whose result is then used in a memory allocation. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7....
https://nvd.nist.gov/vuln/detail/CVE-2022-21738
195,393
tensorflow
a4e401da71458d253b05e41f28637b65baf64be4
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/a4e401da71458d253b05e41f28637b65baf64be4
Prevent segfault in `embedding_lookup_sparse.cc` Previous fixes missed one additional case. PiperOrigin-RevId: 417676944 Change-Id: I8ab412155cf9b1e897448a6611d209eaa7ca9e66
1
TfLiteStatus Eval(TfLiteContext* context, TfLiteNode* node) { auto* params = reinterpret_cast<TfLiteEmbeddingLookupSparseParams*>(node->builtin_data); TfLiteTensor* output; TF_LITE_ENSURE_OK(context, GetOutputSafe(context, node, 0, &output)); const TfLiteTensor* ids; TF_LITE_ENSURE_OK(context, GetInputS...
192,037,970,851,066,600,000,000,000,000,000,000,000
embedding_lookup_sparse.cc
81,342,173,626,284,350,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2022-23559
Tensorflow is an Open Source Machine Learning Framework. An attacker can craft a TFLite model that would cause an integer overflow in embedding lookup operations. Both `embedding_size` and `lookup_size` are products of values provided by the user. Hence, a malicious user could trigger overflows in the multiplication. I...
https://nvd.nist.gov/vuln/detail/CVE-2022-23559
225,126
tensorflow
a4e401da71458d253b05e41f28637b65baf64be4
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/a4e401da71458d253b05e41f28637b65baf64be4
Prevent segfault in `embedding_lookup_sparse.cc` Previous fixes missed one additional case. PiperOrigin-RevId: 417676944 Change-Id: I8ab412155cf9b1e897448a6611d209eaa7ca9e66
0
TfLiteStatus Eval(TfLiteContext* context, TfLiteNode* node) { auto* params = reinterpret_cast<TfLiteEmbeddingLookupSparseParams*>(node->builtin_data); TfLiteTensor* output; TF_LITE_ENSURE_OK(context, GetOutputSafe(context, node, 0, &output)); const TfLiteTensor* ids; TF_LITE_ENSURE_OK(context, GetInputS...
134,892,977,321,783,840,000,000,000,000,000,000,000
embedding_lookup_sparse.cc
171,114,382,450,185,170,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2022-23559
Tensorflow is an Open Source Machine Learning Framework. An attacker can craft a TFLite model that would cause an integer overflow in embedding lookup operations. Both `embedding_size` and `lookup_size` are products of values provided by the user. Hence, a malicious user could trigger overflows in the multiplication. I...
https://nvd.nist.gov/vuln/detail/CVE-2022-23559
195,401
libtiff
681748ec2f5ce88da5f9fa6831e1653e46af8a66
https://github.com/vadz/libtiff
https://github.com/vadz/libtiff/commit/681748ec2f5ce88da5f9fa6831e1653e46af8a66
JBIG: fix potential out-of-bounds write in JBIGDecode() JBIGDecode doesn't check if the user provided buffer is large enough to store the JBIG decoded image, which can potentially cause out-of-bounds write in the buffer. This issue was reported and analyzed by Thomas Dullien. Also fixes a (harmless) potential use of ...
1
static int JBIGDecode(TIFF* tif, uint8* buffer, tmsize_t size, uint16 s) { struct jbg_dec_state decoder; int decodeStatus = 0; unsigned char* pImage = NULL; (void) size, (void) s; if (isFillOrder(tif, tif->tif_dir.td_fillorder)) { TIFFReverseBits(tif->tif_rawdata, tif->tif_rawdatasize); } jbg_dec_init(&deco...
53,072,747,061,210,565,000,000,000,000,000,000,000
tif_jbig.c
182,490,545,234,425,660,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2018-18557
LibTIFF 3.9.3, 3.9.4, 3.9.5, 3.9.6, 3.9.7, 4.0.0alpha4, 4.0.0alpha5, 4.0.0alpha6, 4.0.0beta7, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.4beta, 4.0.5, 4.0.6, 4.0.7, 4.0.8 and 4.0.9 (with JBIG enabled) decodes arbitrarily-sized JBIG into a buffer, ignoring the buffer size, which leads to a tif_jbig.c JBIGDecode out-of-bound...
https://nvd.nist.gov/vuln/detail/CVE-2018-18557
225,523
libtiff
681748ec2f5ce88da5f9fa6831e1653e46af8a66
https://github.com/vadz/libtiff
https://github.com/vadz/libtiff/commit/681748ec2f5ce88da5f9fa6831e1653e46af8a66
JBIG: fix potential out-of-bounds write in JBIGDecode() JBIGDecode doesn't check if the user provided buffer is large enough to store the JBIG decoded image, which can potentially cause out-of-bounds write in the buffer. This issue was reported and analyzed by Thomas Dullien. Also fixes a (harmless) potential use of ...
0
static int JBIGDecode(TIFF* tif, uint8* buffer, tmsize_t size, uint16 s) { struct jbg_dec_state decoder; int decodeStatus = 0; unsigned char* pImage = NULL; unsigned long decodedSize; (void) s; if (isFillOrder(tif, tif->tif_dir.td_fillorder)) { TIFFReverseBits(tif->tif_rawcp, tif->tif_rawcc); } jbg_dec_ini...
132,110,015,283,847,350,000,000,000,000,000,000,000
tif_jbig.c
248,754,323,253,149,900,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2018-18557
LibTIFF 3.9.3, 3.9.4, 3.9.5, 3.9.6, 3.9.7, 4.0.0alpha4, 4.0.0alpha5, 4.0.0alpha6, 4.0.0beta7, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.4beta, 4.0.5, 4.0.6, 4.0.7, 4.0.8 and 4.0.9 (with JBIG enabled) decodes arbitrarily-sized JBIG into a buffer, ignoring the buffer size, which leads to a tif_jbig.c JBIGDecode out-of-bound...
https://nvd.nist.gov/vuln/detail/CVE-2018-18557
195,406
ImageMagick
90406972f108c4da71f998601b06abdc2ac6f06e
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/90406972f108c4da71f998601b06abdc2ac6f06e
https://github.com/ImageMagick/ImageMagick/issues/281
1
MagickExport MagickBooleanType SetImageType(Image *image,const ImageType type, ExceptionInfo *exception) { const char *artifact; ImageInfo *image_info; MagickBooleanType status; QuantizeInfo *quantize_info; assert(image != (Image *) NULL); if (image->debug != MagickFalse) (void) Lo...
322,995,263,176,058,330,000,000,000,000,000,000,000
attribute.c
316,284,152,010,426,450,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2016-7906
magick/attribute.c in ImageMagick 7.0.3-2 allows remote attackers to cause a denial of service (use-after-free) via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2016-7906
225,574
ImageMagick
90406972f108c4da71f998601b06abdc2ac6f06e
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/90406972f108c4da71f998601b06abdc2ac6f06e
https://github.com/ImageMagick/ImageMagick/issues/281
0
MagickExport MagickBooleanType SetImageType(Image *image,const ImageType type, ExceptionInfo *exception) { const char *artifact; ImageInfo *image_info; MagickBooleanType status; QuantizeInfo *quantize_info; assert(image != (Image *) NULL); if (image->debug != MagickFalse) (void) Lo...
318,583,879,285,649,460,000,000,000,000,000,000,000
attribute.c
298,444,983,704,141,000,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2016-7906
magick/attribute.c in ImageMagick 7.0.3-2 allows remote attackers to cause a denial of service (use-after-free) via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2016-7906
195,437
Pillow
5bdf54b5a76b54fb00bd05f2d733e0a4173eefc9
https://github.com/python-pillow/Pillow
https://github.com/python-pillow/Pillow/commit/5bdf54b5a76b54fb00bd05f2d733e0a4173eefc9#diff-8ff6909c159597e22288ad818938fd6b
PCD decoder overruns the shuffle buffer, Fixes #568
1
ImagingPcdDecode(Imaging im, ImagingCodecState state, UINT8* buf, int bytes) { int x; int chunk; UINT8* out; UINT8* ptr; ptr = buf; chunk = 3 * state->xsize; for (;;) { /* We need data for two full lines before we can do anything */ if (bytes < chunk) return ptr - buf; /* Unpack...
277,922,396,630,070,500,000,000,000,000,000,000,000
PcdDecode.c
87,085,758,316,024,080,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-2533
Buffer overflow in the ImagingPcdDecode function in PcdDecode.c in Pillow before 3.1.1 and Python Imaging Library (PIL) 1.1.7 and earlier allows remote attackers to cause a denial of service (crash) via a crafted PhotoCD file.
https://nvd.nist.gov/vuln/detail/CVE-2016-2533
226,443
Pillow
5bdf54b5a76b54fb00bd05f2d733e0a4173eefc9
https://github.com/python-pillow/Pillow
https://github.com/python-pillow/Pillow/commit/5bdf54b5a76b54fb00bd05f2d733e0a4173eefc9#diff-8ff6909c159597e22288ad818938fd6b
PCD decoder overruns the shuffle buffer, Fixes #568
0
ImagingPcdDecode(Imaging im, ImagingCodecState state, UINT8* buf, int bytes) { int x; int chunk; UINT8* out; UINT8* ptr; ptr = buf; chunk = 3 * state->xsize; for (;;) { /* We need data for two full lines before we can do anything */ if (bytes < chunk) return ptr - buf; /* Unpack...
86,638,288,498,790,120,000,000,000,000,000,000,000
PcdDecode.c
6,426,442,815,565,913,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-2533
Buffer overflow in the ImagingPcdDecode function in PcdDecode.c in Pillow before 3.1.1 and Python Imaging Library (PIL) 1.1.7 and earlier allows remote attackers to cause a denial of service (crash) via a crafted PhotoCD file.
https://nvd.nist.gov/vuln/detail/CVE-2016-2533
195,438
hhvm
4bff3bfbe90d10451e4638c2118d1ad1117bb3e3
https://github.com/facebook/hhvm
https://github.com/facebook/hhvm/commit/4bff3bfbe90d10451e4638c2118d1ad1117bb3e3
CVE-2018-6340 Fix buffer overread Summary: snprintf() returns the number of would be written bytes if the buffer had enough size, letting the original code to construct output string from arbitrary data on the stack. Fix this by properly assembling the String without trying to arbitrarily limiting the length to 30 by...
1
static Array HHVM_METHOD(Memcache, getextendedstats, const String& /*type*/ /* = null_string */, int /*slabid*/ /* = 0 */, int /*limit*/ /* = 100 */) { auto data = Native::data<MemcacheData>(this_); memcached_return_t ret; memcached_stat_st *stats; stats = memc...
124,612,751,390,209,830,000,000,000,000,000,000,000
ext_memcache.cpp
21,374,122,305,291,553,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-6340
The Memcache::getextendedstats function can be used to trigger an out-of-bounds read. Exploiting this issue requires control over memcached server hostnames and/or ports. This affects all supported versions of HHVM (3.30 and 3.27.4 and below).
https://nvd.nist.gov/vuln/detail/CVE-2018-6340
226,444
hhvm
4bff3bfbe90d10451e4638c2118d1ad1117bb3e3
https://github.com/facebook/hhvm
https://github.com/facebook/hhvm/commit/4bff3bfbe90d10451e4638c2118d1ad1117bb3e3
CVE-2018-6340 Fix buffer overread Summary: snprintf() returns the number of would be written bytes if the buffer had enough size, letting the original code to construct output string from arbitrary data on the stack. Fix this by properly assembling the String without trying to arbitrarily limiting the length to 30 by...
0
static Array HHVM_METHOD(Memcache, getextendedstats, const String& /*type*/ /* = null_string */, int /*slabid*/ /* = 0 */, int /*limit*/ /* = 100 */) { auto data = Native::data<MemcacheData>(this_); memcached_return_t ret; memcached_stat_st *stats; stats = memc...
114,326,634,663,497,850,000,000,000,000,000,000,000
ext_memcache.cpp
303,271,228,397,825,000,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-6340
The Memcache::getextendedstats function can be used to trigger an out-of-bounds read. Exploiting this issue requires control over memcached server hostnames and/or ports. This affects all supported versions of HHVM (3.30 and 3.27.4 and below).
https://nvd.nist.gov/vuln/detail/CVE-2018-6340
195,445
audiofile
7d65f89defb092b63bcbc5d98349fb222ca73b3c
https://github.com/antlarr/audiofile
https://github.com/antlarr/audiofile/commit/7d65f89defb092b63bcbc5d98349fb222ca73b3c
Check for multiplication overflow in sfconvert Checks that a multiplication doesn't overflow when calculating the buffer size, and if it overflows, reduce the buffer size instead of failing. This fixes the 00192-audiofile-signintoverflow-sfconvert case in #41
1
bool copyaudiodata (AFfilehandle infile, AFfilehandle outfile, int trackid) { int frameSize = afGetVirtualFrameSize(infile, trackid, 1); const int kBufferFrameCount = 65536; void *buffer = malloc(kBufferFrameCount * frameSize); AFframecount totalFrames = afGetFrameCount(infile, AF_DEFAULT_TRACK); AFframecount to...
329,826,030,296,022,200,000,000,000,000,000,000,000
sfconvert.c
150,554,291,987,690,410,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2017-6838
Integer overflow in sfcommands/sfconvert.c in Audio File Library (aka audiofile) 0.3.6 allows remote attackers to cause a denial of service (crash) via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2017-6838
226,603
audiofile
7d65f89defb092b63bcbc5d98349fb222ca73b3c
https://github.com/antlarr/audiofile
https://github.com/antlarr/audiofile/commit/7d65f89defb092b63bcbc5d98349fb222ca73b3c
Check for multiplication overflow in sfconvert Checks that a multiplication doesn't overflow when calculating the buffer size, and if it overflows, reduce the buffer size instead of failing. This fixes the 00192-audiofile-signintoverflow-sfconvert case in #41
0
bool copyaudiodata (AFfilehandle infile, AFfilehandle outfile, int trackid) { int frameSize = afGetVirtualFrameSize(infile, trackid, 1); int kBufferFrameCount = 65536; int bufferSize; while (multiplyCheckOverflow(kBufferFrameCount, frameSize, &bufferSize)) kBufferFrameCount /= 2; void *buffer = malloc(bufferSiz...
231,969,644,079,445,680,000,000,000,000,000,000,000
sfconvert.c
89,781,109,277,876,000,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2017-6838
Integer overflow in sfcommands/sfconvert.c in Audio File Library (aka audiofile) 0.3.6 allows remote attackers to cause a denial of service (crash) via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2017-6838
195,446
audiofile
c48e4c6503f7dabd41f11d4c9c7b7f8960e7f2c0
https://github.com/antlarr/audiofile
https://github.com/antlarr/audiofile/commit/c48e4c6503f7dabd41f11d4c9c7b7f8960e7f2c0
Always check the number of coefficients When building the library with NDEBUG, asserts are eliminated so it's better to always check that the number of coefficients is inside the array range. This fixes the 00191-audiofile-indexoob issue in #41
1
status WAVEFile::parseFormat(const Tag &id, uint32_t size) { Track *track = getTrack(); uint16_t formatTag; readU16(&formatTag); uint16_t channelCount; readU16(&channelCount); uint32_t sampleRate; readU32(&sampleRate); uint32_t averageBytesPerSecond; readU32(&averageBytesPerSecond); uint16_t blockAlign; rea...
292,763,657,978,369,500,000,000,000,000,000,000,000
WAVE.cpp
123,036,620,254,353,550,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2017-6837
WAVE.cpp in Audio File Library (aka audiofile) 0.3.6 allows remote attackers to cause a denial of service (crash) via vectors related to a large number of coefficients.
https://nvd.nist.gov/vuln/detail/CVE-2017-6837
226,624
audiofile
c48e4c6503f7dabd41f11d4c9c7b7f8960e7f2c0
https://github.com/antlarr/audiofile
https://github.com/antlarr/audiofile/commit/c48e4c6503f7dabd41f11d4c9c7b7f8960e7f2c0
Always check the number of coefficients When building the library with NDEBUG, asserts are eliminated so it's better to always check that the number of coefficients is inside the array range. This fixes the 00191-audiofile-indexoob issue in #41
0
status WAVEFile::parseFormat(const Tag &id, uint32_t size) { Track *track = getTrack(); uint16_t formatTag; readU16(&formatTag); uint16_t channelCount; readU16(&channelCount); uint32_t sampleRate; readU32(&sampleRate); uint32_t averageBytesPerSecond; readU32(&averageBytesPerSecond); uint16_t blockAlign; rea...
96,805,288,724,732,450,000,000,000,000,000,000,000
WAVE.cpp
95,819,875,299,707,100,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2017-6837
WAVE.cpp in Audio File Library (aka audiofile) 0.3.6 allows remote attackers to cause a denial of service (crash) via vectors related to a large number of coefficients.
https://nvd.nist.gov/vuln/detail/CVE-2017-6837
195,447
Bento4
41cad602709436628f07b4c4f64e9ff7a611f687
https://github.com/axiomatic-systems/Bento4
https://github.com/axiomatic-systems/Bento4/commit/41cad602709436628f07b4c4f64e9ff7a611f687
fix for #184
1
AP4_DataAtom::AP4_DataAtom(AP4_UI32 size, AP4_ByteStream& stream) : AP4_Atom(AP4_ATOM_TYPE_DATA, size) { if (size < AP4_ATOM_HEADER_SIZE+8) return; AP4_UI32 i; stream.ReadUI32(i); m_DataType = (DataType)i; stream.ReadUI32(i); m_DataLang = (DataLang)i; // the stream for the data is a substream ...
131,456,672,051,657,320,000,000,000,000,000,000,000
Ap4MetaData.cpp
14,025,921,001,401,261,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2017-14641
A NULL pointer dereference was discovered in the AP4_DataAtom class in MetaData/Ap4MetaData.cpp in Bento4 version 1.5.0-617. The vulnerability causes a segmentation fault and application crash, which leads to remote denial of service.
https://nvd.nist.gov/vuln/detail/CVE-2017-14641
226,681
Bento4
41cad602709436628f07b4c4f64e9ff7a611f687
https://github.com/axiomatic-systems/Bento4
https://github.com/axiomatic-systems/Bento4/commit/41cad602709436628f07b4c4f64e9ff7a611f687
fix for #184
0
AP4_DataAtom::AP4_DataAtom(AP4_UI32 size, AP4_ByteStream& stream) : AP4_Atom(AP4_ATOM_TYPE_DATA, size), m_Source(NULL) { if (size < AP4_ATOM_HEADER_SIZE+8) return; AP4_UI32 i; stream.ReadUI32(i); m_DataType = (DataType)i; stream.ReadUI32(i); m_DataLang = (DataLang)i; // the stream for the ...
192,411,907,495,922,440,000,000,000,000,000,000,000
Ap4MetaData.cpp
23,974,099,848,983,620,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2017-14641
A NULL pointer dereference was discovered in the AP4_DataAtom class in MetaData/Ap4MetaData.cpp in Bento4 version 1.5.0-617. The vulnerability causes a segmentation fault and application crash, which leads to remote denial of service.
https://nvd.nist.gov/vuln/detail/CVE-2017-14641
195,448
Bento4
41cad602709436628f07b4c4f64e9ff7a611f687
https://github.com/axiomatic-systems/Bento4
https://github.com/axiomatic-systems/Bento4/commit/41cad602709436628f07b4c4f64e9ff7a611f687
fix for #184
1
AP4_DataAtom::AP4_DataAtom(const AP4_MetaData::Value& value) : AP4_Atom(AP4_ATOM_TYPE_DATA, AP4_ATOM_HEADER_SIZE), m_DataType(DATA_TYPE_BINARY) { AP4_MemoryByteStream* memory = new AP4_MemoryByteStream(); AP4_Size payload_size = 8; m_Source = memory; switch (value.GetType()) { case ...
336,931,089,358,740,660,000,000,000,000,000,000,000
Ap4MetaData.cpp
14,025,921,001,401,261,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2017-14641
A NULL pointer dereference was discovered in the AP4_DataAtom class in MetaData/Ap4MetaData.cpp in Bento4 version 1.5.0-617. The vulnerability causes a segmentation fault and application crash, which leads to remote denial of service.
https://nvd.nist.gov/vuln/detail/CVE-2017-14641
226,651
Bento4
41cad602709436628f07b4c4f64e9ff7a611f687
https://github.com/axiomatic-systems/Bento4
https://github.com/axiomatic-systems/Bento4/commit/41cad602709436628f07b4c4f64e9ff7a611f687
fix for #184
0
AP4_DataAtom::AP4_DataAtom(const AP4_MetaData::Value& value) : AP4_Atom(AP4_ATOM_TYPE_DATA, AP4_ATOM_HEADER_SIZE), m_DataType(DATA_TYPE_BINARY), m_Source(NULL) { AP4_MemoryByteStream* memory = new AP4_MemoryByteStream(); AP4_Size payload_size = 8; m_Source = memory; switch (value.GetTyp...
235,460,017,253,130,300,000,000,000,000,000,000,000
Ap4MetaData.cpp
23,974,099,848,983,620,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2017-14641
A NULL pointer dereference was discovered in the AP4_DataAtom class in MetaData/Ap4MetaData.cpp in Bento4 version 1.5.0-617. The vulnerability causes a segmentation fault and application crash, which leads to remote denial of service.
https://nvd.nist.gov/vuln/detail/CVE-2017-14641
195,449
hhvm
1c518555dba6ceb45d5ba61845b96e261219c3b7
https://github.com/facebook/hhvm
https://github.com/facebook/hhvm/commit/1c518555dba6ceb45d5ba61845b96e261219c3b7
Fix buffer overflow in mb_ereg_replace Summary: This diff has already been landed to release and to open-source branches. We're now landing it on master. CVE-2019-11935 Reviewed By: jjergus Differential Revision: D18177934 fbshipit-source-id: d108a59e38c67f5f5e835febd7255307605ba62c
1
static Variant _php_mb_regex_ereg_replace_exec(const Variant& pattern, const String& replacement, const String& str, const String& option, ...
150,690,663,859,486,660,000,000,000,000,000,000,000
ext_mbstring.cpp
27,162,148,208,504,263,000,000,000,000,000,000,000
[ "CWE-120" ]
CVE-2019-11935
Insufficient boundary checks when processing a string in mb_ereg_replace allows access to out-of-bounds memory. This issue affects HHVM versions prior to 3.30.12, all versions between 4.0.0 and 4.8.5, all versions between 4.9.0 and 4.23.1, as well as 4.24.0, 4.25.0, 4.26.0, 4.27.0, 4.28.0, and 4.28.1.
https://nvd.nist.gov/vuln/detail/CVE-2019-11935
226,732
hhvm
1c518555dba6ceb45d5ba61845b96e261219c3b7
https://github.com/facebook/hhvm
https://github.com/facebook/hhvm/commit/1c518555dba6ceb45d5ba61845b96e261219c3b7
Fix buffer overflow in mb_ereg_replace Summary: This diff has already been landed to release and to open-source branches. We're now landing it on master. CVE-2019-11935 Reviewed By: jjergus Differential Revision: D18177934 fbshipit-source-id: d108a59e38c67f5f5e835febd7255307605ba62c
0
static Variant _php_mb_regex_ereg_replace_exec(const Variant& pattern, const String& replacement, const String& str, const String& option, ...
278,266,252,190,934,560,000,000,000,000,000,000,000
ext_mbstring.cpp
34,536,365,220,079,264,000,000,000,000,000,000,000
[ "CWE-120" ]
CVE-2019-11935
Insufficient boundary checks when processing a string in mb_ereg_replace allows access to out-of-bounds memory. This issue affects HHVM versions prior to 3.30.12, all versions between 4.0.0 and 4.8.5, all versions between 4.9.0 and 4.23.1, as well as 4.24.0, 4.25.0, 4.26.0, 4.27.0, 4.28.0, and 4.28.1.
https://nvd.nist.gov/vuln/detail/CVE-2019-11935
195,450
Bento4
be7185faf7f52674028977dcf501c6039ff03aa5
https://github.com/axiomatic-systems/Bento4
https://github.com/axiomatic-systems/Bento4/commit/be7185faf7f52674028977dcf501c6039ff03aa5
fix for #182
1
AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream& stream, AP4_UI32 type, AP4_UI32 size_32, AP4_UI64 size_64, AP4_Atom*& atom) { bool ...
174,561,395,751,390,480,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2017-14638
AP4_AtomFactory::CreateAtomFromStream in Core/Ap4AtomFactory.cpp in Bento4 version 1.5.0-617 has missing NULL checks, leading to a NULL pointer dereference, segmentation fault, and application crash in AP4_Atom::SetType in Core/Ap4Atom.h.
https://nvd.nist.gov/vuln/detail/CVE-2017-14638
226,802
Bento4
be7185faf7f52674028977dcf501c6039ff03aa5
https://github.com/axiomatic-systems/Bento4
https://github.com/axiomatic-systems/Bento4/commit/be7185faf7f52674028977dcf501c6039ff03aa5
fix for #182
0
AP4_AtomFactory::CreateAtomFromStream(AP4_ByteStream& stream, AP4_UI32 type, AP4_UI32 size_32, AP4_UI64 size_64, AP4_Atom*& atom) { bool ...
171,225,242,224,591,260,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2017-14638
AP4_AtomFactory::CreateAtomFromStream in Core/Ap4AtomFactory.cpp in Bento4 version 1.5.0-617 has missing NULL checks, leading to a NULL pointer dereference, segmentation fault, and application crash in AP4_Atom::SetType in Core/Ap4Atom.h.
https://nvd.nist.gov/vuln/detail/CVE-2017-14638
195,469
hhvm
423b4b719afd5ef4e6e19d8447fbf7b6bc0d0a25
https://github.com/facebook/hhvm
https://github.com/facebook/hhvm/commit/423b4b719afd5ef4e6e19d8447fbf7b6bc0d0a25
CVE-2016-1000109: Ignore Proxy HTTP header from fastcgi requests Summary: The default PHP behavior is to transform a Proxy header from requests into the HTTP_PROXY environment variable in the PHP environment running the request. Some scripts may use this env var to decide which HTTP proxy to connect to, and we don't w...
1
void FastCGITransport::onHeader(std::unique_ptr<folly::IOBuf> key_chain, std::unique_ptr<folly::IOBuf> value_chain) { Cursor keyCur(key_chain.get()); auto key = keyCur.readFixedString(key_chain->computeChainDataLength()); Cursor valCur(value_chain.get()); auto value = valCur.rea...
22,858,928,392,362,800,000,000,000,000,000,000,000
fastcgi-transport.cpp
60,897,937,304,696,425,000,000,000,000,000,000,000
[ "CWE-665" ]
CVE-2016-1000109
HHVM does not attempt to address RFC 3875 section 4.1.18 namespace conflicts and therefore does not protect CGI applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect a CGI application's outbound HTTP traffic to an arbitrary proxy s...
https://nvd.nist.gov/vuln/detail/CVE-2016-1000109
226,938
hhvm
423b4b719afd5ef4e6e19d8447fbf7b6bc0d0a25
https://github.com/facebook/hhvm
https://github.com/facebook/hhvm/commit/423b4b719afd5ef4e6e19d8447fbf7b6bc0d0a25
CVE-2016-1000109: Ignore Proxy HTTP header from fastcgi requests Summary: The default PHP behavior is to transform a Proxy header from requests into the HTTP_PROXY environment variable in the PHP environment running the request. Some scripts may use this env var to decide which HTTP proxy to connect to, and we don't w...
0
void FastCGITransport::onHeader(std::unique_ptr<folly::IOBuf> key_chain, std::unique_ptr<folly::IOBuf> value_chain) { Cursor keyCur(key_chain.get()); auto key = keyCur.readFixedString(key_chain->computeChainDataLength()); // Don't allow requests to inject an HTTP_PROXY environment...
224,116,756,568,382,630,000,000,000,000,000,000,000
fastcgi-transport.cpp
142,752,180,239,000,800,000,000,000,000,000,000,000
[ "CWE-665" ]
CVE-2016-1000109
HHVM does not attempt to address RFC 3875 section 4.1.18 namespace conflicts and therefore does not protect CGI applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect a CGI application's outbound HTTP traffic to an arbitrary proxy s...
https://nvd.nist.gov/vuln/detail/CVE-2016-1000109
195,472
hhvm
2c9a8fcc73a151608634d3e712973d192027c271
https://github.com/facebook/hhvm
https://github.com/facebook/hhvm/commit/2c9a8fcc73a151608634d3e712973d192027c271
Fix integer overflow in StringUtil::implode Reviewed By: ricklavoie Differential Revision: D3623922 fbshipit-source-id: 136d124a850c07cc6c63535afc11d36499d576fc
1
String StringUtil::Implode(const Variant& items, const String& delim, const bool checkIsContainer /* = true */) { if (checkIsContainer && !isContainer(items)) { throw_param_is_not_container(); } int size = getContainerSize(items); if (size == 0) return empty_string(); req::vect...
96,428,308,603,452,220,000,000,000,000,000,000,000
None
null
[ "CWE-190" ]
CVE-2016-6872
Integer overflow in StringUtil::implode in Facebook HHVM before 3.15.0 allows attackers to have unspecified impact via unknown vectors.
https://nvd.nist.gov/vuln/detail/CVE-2016-6872
227,040
hhvm
2c9a8fcc73a151608634d3e712973d192027c271
https://github.com/facebook/hhvm
https://github.com/facebook/hhvm/commit/2c9a8fcc73a151608634d3e712973d192027c271
Fix integer overflow in StringUtil::implode Reviewed By: ricklavoie Differential Revision: D3623922 fbshipit-source-id: 136d124a850c07cc6c63535afc11d36499d576fc
0
String StringUtil::Implode(const Variant& items, const String& delim, const bool checkIsContainer /* = true */) { if (checkIsContainer && !isContainer(items)) { throw_param_is_not_container(); } int size = getContainerSize(items); if (size == 0) return empty_string(); req::vect...
62,419,655,296,476,650,000,000,000,000,000,000,000
None
null
[ "CWE-190" ]
CVE-2016-6872
Integer overflow in StringUtil::implode in Facebook HHVM before 3.15.0 allows attackers to have unspecified impact via unknown vectors.
https://nvd.nist.gov/vuln/detail/CVE-2016-6872
195,473
src
ed8fdce754a5d8d14c09e989d8877707bd43906f
https://github.com/openbsd/src
https://github.com/openbsd/src/commit/ed8fdce754a5d8d14c09e989d8877707bd43906f
Received SACK options are managed by a linked list at the TCP socket. There is a global tunable limit net.inet.tcp.sackholelimit, default is 32768. If an attacker manages to attach all these sack holes to a few TCP connections, the lists may grow long. Traversing them might cause higher CPU consumption on the victim ...
1
tcp_sack_option(struct tcpcb *tp, struct tcphdr *th, u_char *cp, int optlen) { int tmp_olen; u_char *tmp_cp; struct sackhole *cur, *p, *temp; if (!tp->sack_enable) return; /* SACK without ACK doesn't make sense. */ if ((th->th_flags & TH_ACK) == 0) return; /* Make sure the ACK on this segment is in [s...
87,584,992,195,013,410,000,000,000,000,000,000,000
tcp_input.c
219,708,352,113,828,600,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2019-8460
OpenBSD kernel version <= 6.5 can be forced to create long chains of TCP SACK holes that causes very expensive calls to tcp_sack_option() for every incoming SACK packet which can lead to a denial of service.
https://nvd.nist.gov/vuln/detail/CVE-2019-8460
227,053
src
ed8fdce754a5d8d14c09e989d8877707bd43906f
https://github.com/openbsd/src
https://github.com/openbsd/src/commit/ed8fdce754a5d8d14c09e989d8877707bd43906f
Received SACK options are managed by a linked list at the TCP socket. There is a global tunable limit net.inet.tcp.sackholelimit, default is 32768. If an attacker manages to attach all these sack holes to a few TCP connections, the lists may grow long. Traversing them might cause higher CPU consumption on the victim ...
0
tcp_sack_option(struct tcpcb *tp, struct tcphdr *th, u_char *cp, int optlen) { int tmp_olen; u_char *tmp_cp; struct sackhole *cur, *p, *temp; if (!tp->sack_enable) return; /* SACK without ACK doesn't make sense. */ if ((th->th_flags & TH_ACK) == 0) return; /* Make sure the ACK on this segment is in [s...
219,688,727,625,701,800,000,000,000,000,000,000,000
tcp_input.c
144,010,399,748,046,970,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2019-8460
OpenBSD kernel version <= 6.5 can be forced to create long chains of TCP SACK holes that causes very expensive calls to tcp_sack_option() for every incoming SACK packet which can lead to a denial of service.
https://nvd.nist.gov/vuln/detail/CVE-2019-8460
195,474
hhvm
1f91e076a585118495b976a413c1df40f6fd3d41
https://github.com/facebook/hhvm
https://github.com/facebook/hhvm/commit/1f91e076a585118495b976a413c1df40f6fd3d41
Fix integer overflow in chunk_split Reviewed By: @ptarjan Differential Revision: D1515947
1
String string_chunk_split(const char *src, int srclen, const char *end, int endlen, int chunklen) { int chunks = srclen / chunklen; // complete chunks! int restlen = srclen - chunks * chunklen; /* srclen % chunklen */ int out_len = (chunks + 1) * endlen + srclen; String ret(out_len, R...
41,070,013,776,066,670,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6228
Integer overflow in the string_chunk_split function in hphp/runtime/base/zend-string.cpp in Facebook HipHop Virtual Machine (HHVM) before 3.3.0 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted arguments to the chunk_split function.
https://nvd.nist.gov/vuln/detail/CVE-2014-6228
227,093
hhvm
1f91e076a585118495b976a413c1df40f6fd3d41
https://github.com/facebook/hhvm
https://github.com/facebook/hhvm/commit/1f91e076a585118495b976a413c1df40f6fd3d41
Fix integer overflow in chunk_split Reviewed By: @ptarjan Differential Revision: D1515947
0
String string_chunk_split(const char *src, int srclen, const char *end, int endlen, int chunklen) { int chunks = srclen / chunklen; // complete chunks! int restlen = srclen - chunks * chunklen; /* srclen % chunklen */ String ret( safe_address( chunks + 1, endlen, s...
265,839,374,442,538,400,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6228
Integer overflow in the string_chunk_split function in hphp/runtime/base/zend-string.cpp in Facebook HipHop Virtual Machine (HHVM) before 3.3.0 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted arguments to the chunk_split function.
https://nvd.nist.gov/vuln/detail/CVE-2014-6228
195,478
hhvm
6937de5544c3eead3466b75020d8382080ed0cff
https://github.com/facebook/hhvm
https://github.com/facebook/hhvm/commit/6937de5544c3eead3466b75020d8382080ed0cff
[security][CVE-2018-6334] kill globals for file uploads in hhvm Code should look at _GET, _POST, _FILES, etc. directly to avoid security concerns. This included both `$GLOBALS` and `register_globals`-like behavior. CVE-2018-6334
1
void rfc1867PostHandler(Transport* transport, Array& post, Array& files, size_t content_length, const void*& data, size_t& size, const std::string boundary) { char *s=nullptr, *start_arr=nullptr; ...
128,636,934,470,509,620,000,000,000,000,000,000,000
upload.cpp
236,082,494,226,434,600,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2018-6334
Multipart-file uploads call variables to be improperly registered in the global scope. In cases where variables are not declared explicitly before being used this can lead to unexpected behavior. This affects all supported versions of HHVM prior to the patch (3.25.1, 3.24.5, and 3.21.9 and below).
https://nvd.nist.gov/vuln/detail/CVE-2018-6334
227,160
hhvm
6937de5544c3eead3466b75020d8382080ed0cff
https://github.com/facebook/hhvm
https://github.com/facebook/hhvm/commit/6937de5544c3eead3466b75020d8382080ed0cff
[security][CVE-2018-6334] kill globals for file uploads in hhvm Code should look at _GET, _POST, _FILES, etc. directly to avoid security concerns. This included both `$GLOBALS` and `register_globals`-like behavior. CVE-2018-6334
0
void rfc1867PostHandler(Transport* transport, Array& post, Array& files, size_t content_length, const void*& data, size_t& size, const std::string boundary) { char *s=nullptr, *start_arr=nullptr; ...
21,688,381,598,801,250,000,000,000,000,000,000,000
upload.cpp
62,953,226,843,582,260,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2018-6334
Multipart-file uploads call variables to be improperly registered in the global scope. In cases where variables are not declared explicitly before being used this can lead to unexpected behavior. This affects all supported versions of HHVM prior to the patch (3.25.1, 3.24.5, and 3.21.9 and below).
https://nvd.nist.gov/vuln/detail/CVE-2018-6334
195,479
ImageMagick
f8c318d462270b03e77f082e2a3a32867cacd3c6
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/f8c318d462270b03e77f082e2a3a32867cacd3c6
https://github.com/ImageMagick/ImageMagick/issues/96
1
static ssize_t parse8BIM(Image *ifile, Image *ofile) { char brkused, quoted, *line, *token, *newstr, *name; int state, next; unsigned char dataset; unsigned int recnum; int inputlen = MagickPathExtent; MagickOffsetType savedpos, currentpos; ssize_t...
207,045,869,905,428,560,000,000,000,000,000,000,000
meta.c
338,570,079,382,616,140,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2016-7524
coders/meta.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2016-7524
227,192
ImageMagick
f8c318d462270b03e77f082e2a3a32867cacd3c6
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/f8c318d462270b03e77f082e2a3a32867cacd3c6
https://github.com/ImageMagick/ImageMagick/issues/96
0
static ssize_t parse8BIM(Image *ifile, Image *ofile) { char brkused, quoted, *line, *token, *newstr, *name; int state, next; unsigned char dataset; unsigned int recnum; int inputlen = MagickPathExtent; MagickOffsetType savedpos, currentpos; ssize_t...
261,909,825,210,254,150,000,000,000,000,000,000,000
meta.c
1,618,187,714,745,459,400,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2016-7524
coders/meta.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2016-7524
195,480
hhvm
46003b4ab564b2abcd8470035fc324fe36aa8c75
https://github.com/facebook/hhvm
https://github.com/facebook/hhvm/commit/46003b4ab564b2abcd8470035fc324fe36aa8c75
Prevent strrpos and strripos from visiting out-of-bounds memory. Reviewed By: alexeyt Differential Revision: D14669668 fbshipit-source-id: 16bb4674bccf83ffd737e60d1fd9fd4a0093f77c
1
int string_rfind(const char *input, int len, const char *s, int s_len, int pos, bool case_sensitive) { assertx(input); assertx(s); if (!s_len || pos < -len || pos > len) { return -1; } void *ptr; if (case_sensitive) { if (pos >= 0) { ptr = bstrrstr(input + pos, len - pos, s, s...
93,314,297,151,024,460,000,000,000,000,000,000,000
zend-string.cpp
157,727,558,891,612,040,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-3561
Insufficient boundary checks for the strrpos and strripos functions allow access to out-of-bounds memory. This affects all supported versions of HHVM (4.0.3, 3.30.4, and 3.27.7 and below).
https://nvd.nist.gov/vuln/detail/CVE-2019-3561
227,223
hhvm
46003b4ab564b2abcd8470035fc324fe36aa8c75
https://github.com/facebook/hhvm
https://github.com/facebook/hhvm/commit/46003b4ab564b2abcd8470035fc324fe36aa8c75
Prevent strrpos and strripos from visiting out-of-bounds memory. Reviewed By: alexeyt Differential Revision: D14669668 fbshipit-source-id: 16bb4674bccf83ffd737e60d1fd9fd4a0093f77c
0
int string_rfind(const char *input, int len, const char *s, int s_len, int pos, bool case_sensitive) { assertx(input); assertx(s); if (!s_len || pos < -len || pos > len) { return -1; } void *ptr; if (case_sensitive) { if (pos >= 0) { ptr = bstrrstr(input + pos, len - pos, s, s...
74,978,037,068,485,980,000,000,000,000,000,000,000
zend-string.cpp
48,155,053,696,740,280,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-3561
Insufficient boundary checks for the strrpos and strripos functions allow access to out-of-bounds memory. This affects all supported versions of HHVM (4.0.3, 3.30.4, and 3.27.7 and below).
https://nvd.nist.gov/vuln/detail/CVE-2019-3561
195,481
hhvm
97ef580ec2cca9a54da6f9bd9fdd9a455f6d74ed
https://github.com/facebook/hhvm
https://github.com/facebook/hhvm/commit/97ef580ec2cca9a54da6f9bd9fdd9a455f6d74ed
Fix default FastCGI interface Reviewed By: alexeyt Differential Revision: D15567393 fbshipit-source-id: ffab228f689d4ddca9ea4835c70aecf16da2aa9f
1
FastCGIServer::FastCGIServer(const std::string &address, int port, int workers, bool useFileSocket) : Server(address, port), m_worker(&m_eventBaseManager), m_dispatcher(workers, workers, RuntimeOption::Serv...
27,698,960,967,847,704,000,000,000,000,000,000,000
fastcgi-server.cpp
182,286,601,505,163,500,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2019-3569
HHVM, when used with FastCGI, would bind by default to all available interfaces. This behavior could allow a malicious individual unintended direct access to the application, which could result in information disclosure. This issue affects versions 4.3.0, 4.4.0, 4.5.0, 4.6.0, 4.7.0, 4.8.0, versions 3.30.5 and below, an...
https://nvd.nist.gov/vuln/detail/CVE-2019-3569
227,233
hhvm
97ef580ec2cca9a54da6f9bd9fdd9a455f6d74ed
https://github.com/facebook/hhvm
https://github.com/facebook/hhvm/commit/97ef580ec2cca9a54da6f9bd9fdd9a455f6d74ed
Fix default FastCGI interface Reviewed By: alexeyt Differential Revision: D15567393 fbshipit-source-id: ffab228f689d4ddca9ea4835c70aecf16da2aa9f
0
FastCGIServer::FastCGIServer(const std::string &address, int port, int workers, bool useFileSocket) : Server(address, port), m_worker(&m_eventBaseManager), m_dispatcher(workers, workers, RuntimeOption::Serv...
29,669,343,257,428,630,000,000,000,000,000,000,000
fastcgi-server.cpp
7,595,977,892,686,557,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2019-3569
HHVM, when used with FastCGI, would bind by default to all available interfaces. This behavior could allow a malicious individual unintended direct access to the application, which could result in information disclosure. This issue affects versions 4.3.0, 4.4.0, 4.5.0, 4.6.0, 4.7.0, 4.8.0, versions 3.30.5 and below, an...
https://nvd.nist.gov/vuln/detail/CVE-2019-3569
195,482
hhvm
324701c9fd31beb4f070f1b7ef78b115fbdfec34
https://github.com/facebook/hhvm
https://github.com/facebook/hhvm/commit/324701c9fd31beb4f070f1b7ef78b115fbdfec34
HTMLEncode strings in wddx_serialize_value() Summary: Strings returned through wddx_serialize_value should be HTMLEncode()'d during serialization. Fixes #4283 {sync, type="child", parent="internal", parentrevid="1691695", parentrevfbid="1537976659780590", parentdiffid="5726084"} Reviewed By: @JoelMarcey Differenti...
1
bool WddxPacket::recursiveAddVar(const String& varName, const Variant& varVariant, bool hasVarTag) { bool isArray = varVariant.isArray(); bool isObject = varVariant.isObject(); if (isArray || isObject) { if (hasVarTag) { m_packetString ...
233,010,274,338,692,160,000,000,000,000,000,000,000
ext_wddx.cpp
282,173,662,128,018,200,000,000,000,000,000,000,000
[ "CWE-79" ]
CVE-2014-9714
Cross-site scripting (XSS) vulnerability in the WddxPacket::recursiveAddVar function in HHVM (aka the HipHop Virtual Machine) before 3.5.0 allows remote attackers to inject arbitrary web script or HTML via a crafted string to the wddx_serialize_value function.
https://nvd.nist.gov/vuln/detail/CVE-2014-9714
227,244
hhvm
324701c9fd31beb4f070f1b7ef78b115fbdfec34
https://github.com/facebook/hhvm
https://github.com/facebook/hhvm/commit/324701c9fd31beb4f070f1b7ef78b115fbdfec34
HTMLEncode strings in wddx_serialize_value() Summary: Strings returned through wddx_serialize_value should be HTMLEncode()'d during serialization. Fixes #4283 {sync, type="child", parent="internal", parentrevid="1691695", parentrevfbid="1537976659780590", parentdiffid="5726084"} Reviewed By: @JoelMarcey Differenti...
0
bool WddxPacket::recursiveAddVar(const String& varName, const Variant& varVariant, bool hasVarTag) { bool isArray = varVariant.isArray(); bool isObject = varVariant.isObject(); if (isArray || isObject) { if (hasVarTag) { m_packetString ...
50,491,605,162,683,820,000,000,000,000,000,000,000
ext_wddx.cpp
308,422,966,656,733,080,000,000,000,000,000,000,000
[ "CWE-79" ]
CVE-2014-9714
Cross-site scripting (XSS) vulnerability in the WddxPacket::recursiveAddVar function in HHVM (aka the HipHop Virtual Machine) before 3.5.0 allows remote attackers to inject arbitrary web script or HTML via a crafted string to the wddx_serialize_value function.
https://nvd.nist.gov/vuln/detail/CVE-2014-9714
195,487
hhvm
7135ec229882370a00411aa50030eada6034cc1b
https://github.com/facebook/hhvm
https://github.com/facebook/hhvm/commit/7135ec229882370a00411aa50030eada6034cc1b
Fix potential security leak in HashContext Summary: CVE-2014-6229 This is not a NUL-terminated string, it's a fixed-size block of data. The risks were key truncation (if there happens to be a NUL byte in the key) or over-reading (which would be information leakage). Reviewed By: @ptarjan Differential Revision: D153...
1
explicit HashContext(const HashContext* ctx) { assert(ctx->ops); assert(ctx->ops->context_size >= 0); ops = ctx->ops; context = malloc(ops->context_size); ops->hash_copy(context, ctx->context); options = ctx->options; key = ctx->key ? strdup(ctx->key) : nullptr; }
214,231,899,432,368,370,000,000,000,000,000,000,000
ext_hash.cpp
309,558,397,349,101,870,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2014-6229
The HashContext class in hphp/runtime/ext/ext_hash.cpp in Facebook HipHop Virtual Machine (HHVM) before 3.3.0 incorrectly expects that a certain key string uses '\0' for termination, which allows remote attackers to obtain sensitive information by leveraging read access beyond the end of the string, and makes it easier...
https://nvd.nist.gov/vuln/detail/CVE-2014-6229
227,349
hhvm
7135ec229882370a00411aa50030eada6034cc1b
https://github.com/facebook/hhvm
https://github.com/facebook/hhvm/commit/7135ec229882370a00411aa50030eada6034cc1b
Fix potential security leak in HashContext Summary: CVE-2014-6229 This is not a NUL-terminated string, it's a fixed-size block of data. The risks were key truncation (if there happens to be a NUL byte in the key) or over-reading (which would be information leakage). Reviewed By: @ptarjan Differential Revision: D153...
0
explicit HashContext(const HashContext* ctx) { assert(ctx->ops); assert(ctx->ops->context_size >= 0); ops = ctx->ops; context = malloc(ops->context_size); ops->hash_copy(context, ctx->context); options = ctx->options; if (ctx->key) { key = static_cast<char*>(malloc(ops->block_size));...
207,240,633,761,840,370,000,000,000,000,000,000,000
ext_hash.cpp
323,289,236,110,819,230,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2014-6229
The HashContext class in hphp/runtime/ext/ext_hash.cpp in Facebook HipHop Virtual Machine (HHVM) before 3.3.0 incorrectly expects that a certain key string uses '\0' for termination, which allows remote attackers to obtain sensitive information by leveraging read access beyond the end of the string, and makes it easier...
https://nvd.nist.gov/vuln/detail/CVE-2014-6229
195,492
proxygen
52cf331743ebd74194d6343a6c2ec52bb917c982
https://github.com/facebook/proxygen
https://github.com/facebook/proxygen/commit/52cf331743ebd74194d6343a6c2ec52bb917c982
Fix h2 codec state after bad priority header. Summary: It's possible for the http2 codec to enter an invalid state after processing a http2 header with invalid priorities. CVE-2018-6346 Reviewed By: maxgeorg Differential Revision: D13510025 fbshipit-source-id: 7c4e42daf1cd2b912454d13a66ab8488d1863263
1
folly::Optional<ErrorCode> HTTP2Codec::parseHeadersDecodeFrames( const folly::Optional<http2::PriorityUpdate>& priority, const folly::Optional<uint32_t>& promisedStream, const folly::Optional<ExAttributes>& exAttributes, std::unique_ptr<HTTPMessage>& msg) { // decompress headers Cursor headerCursor(...
14,091,148,304,699,886,000,000,000,000,000,000,000
None
null
[ "CWE-388" ]
CVE-2018-6346
A potential denial-of-service issue in the Proxygen handling of invalid HTTP2 priority settings (specifically a circular dependency). This affects Proxygen prior to v2018.12.31.00.
https://nvd.nist.gov/vuln/detail/CVE-2018-6346
227,580
proxygen
52cf331743ebd74194d6343a6c2ec52bb917c982
https://github.com/facebook/proxygen
https://github.com/facebook/proxygen/commit/52cf331743ebd74194d6343a6c2ec52bb917c982
Fix h2 codec state after bad priority header. Summary: It's possible for the http2 codec to enter an invalid state after processing a http2 header with invalid priorities. CVE-2018-6346 Reviewed By: maxgeorg Differential Revision: D13510025 fbshipit-source-id: 7c4e42daf1cd2b912454d13a66ab8488d1863263
0
folly::Optional<ErrorCode> HTTP2Codec::parseHeadersDecodeFrames( const folly::Optional<http2::PriorityUpdate>& priority, const folly::Optional<uint32_t>& promisedStream, const folly::Optional<ExAttributes>& exAttributes, std::unique_ptr<HTTPMessage>& msg) { // decompress headers Cursor headerCursor(...
179,487,345,148,118,030,000,000,000,000,000,000,000
None
null
[ "CWE-388" ]
CVE-2018-6346
A potential denial-of-service issue in the Proxygen handling of invalid HTTP2 priority settings (specifically a circular dependency). This affects Proxygen prior to v2018.12.31.00.
https://nvd.nist.gov/vuln/detail/CVE-2018-6346
195,493
hhvm
524d2e60cfe910406ec6109e4286d7edd545ab36
https://github.com/facebook/hhvm
https://github.com/facebook/hhvm/commit/524d2e60cfe910406ec6109e4286d7edd545ab36
ext_mbstring: Fix invalid free() in php_mb_parse_encoding Summary: A chunk of memory allocated by 'req::calloc_noptrs' was being freed by 'free'. The former internally calls 'calloc' and returns a pointer at an index sizeof(MallocNode) inside the allocated buffer. This led to freeing invalid memory. CVE-2019-11930 R...
1
static bool php_mb_parse_encoding(const Variant& encoding, mbfl_encoding ***return_list, int *return_size, bool persistent) { bool ret; if (encoding.isArray()) { ret = php_mb_parse_encoding_array(encoding.toArray(), ...
251,344,227,985,335,080,000,000,000,000,000,000,000
ext_mbstring.cpp
34,536,365,220,079,264,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2019-11930
An invalid free in mb_detect_order can cause the application to crash or potentially result in remote code execution. This issue affects HHVM versions prior to 3.30.12, all versions between 4.0.0 and 4.8.5, all versions between 4.9.0 and 4.23.1, as well as 4.24.0, 4.25.0, 4.26.0, 4.27.0, 4.28.0, and 4.28.1.
https://nvd.nist.gov/vuln/detail/CVE-2019-11930
227,595
hhvm
524d2e60cfe910406ec6109e4286d7edd545ab36
https://github.com/facebook/hhvm
https://github.com/facebook/hhvm/commit/524d2e60cfe910406ec6109e4286d7edd545ab36
ext_mbstring: Fix invalid free() in php_mb_parse_encoding Summary: A chunk of memory allocated by 'req::calloc_noptrs' was being freed by 'free'. The former internally calls 'calloc' and returns a pointer at an index sizeof(MallocNode) inside the allocated buffer. This led to freeing invalid memory. CVE-2019-11930 R...
0
static bool php_mb_parse_encoding(const Variant& encoding, mbfl_encoding ***return_list, int *return_size, bool persistent) { bool ret; if (encoding.isArray()) { ret = php_mb_parse_encoding_array(encoding.toArray(), ...
9,077,306,852,533,246,000,000,000,000,000,000,000
ext_mbstring.cpp
166,648,600,061,547,450,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2019-11930
An invalid free in mb_detect_order can cause the application to crash or potentially result in remote code execution. This issue affects HHVM versions prior to 3.30.12, all versions between 4.0.0 and 4.8.5, all versions between 4.9.0 and 4.23.1, as well as 4.24.0, 4.25.0, 4.26.0, 4.27.0, 4.28.0, and 4.28.1.
https://nvd.nist.gov/vuln/detail/CVE-2019-11930
195,494
src
7afb2d41c6d373cf965285840b85c45011357115
https://github.com/openbsd/src
https://github.com/openbsd/src/commit/7afb2d41c6d373cf965285840b85c45011357115
Fix return value check for openssl API used during pubkey validation. Found thanks to bug report by Michael Scheibel <m.Scheibel (at) tuvit (dot) de> ok patrick@, markus@, tb@
1
ca_validate_pubkey(struct iked *env, struct iked_static_id *id, void *data, size_t len, struct iked_id *out) { BIO *rawcert = NULL; RSA *peerrsa = NULL, *localrsa = NULL; EC_KEY *peerec = NULL; EVP_PKEY *peerkey = NULL, *localkey = NULL; int ret = -1; FILE *fp = NULL; char idstr[IKED_ID_SIZE]; char ...
44,678,367,820,527,340,000,000,000,000,000,000,000
ca.c
99,489,708,618,331,940,000,000,000,000,000,000,000
[ "CWE-639" ]
CVE-2020-16088
iked in OpenIKED, as used in OpenBSD through 6.7, allows authentication bypass because ca.c has the wrong logic for checking whether a public key matches.
https://nvd.nist.gov/vuln/detail/CVE-2020-16088
227,602
src
7afb2d41c6d373cf965285840b85c45011357115
https://github.com/openbsd/src
https://github.com/openbsd/src/commit/7afb2d41c6d373cf965285840b85c45011357115
Fix return value check for openssl API used during pubkey validation. Found thanks to bug report by Michael Scheibel <m.Scheibel (at) tuvit (dot) de> ok patrick@, markus@, tb@
0
ca_validate_pubkey(struct iked *env, struct iked_static_id *id, void *data, size_t len, struct iked_id *out) { BIO *rawcert = NULL; RSA *peerrsa = NULL, *localrsa = NULL; EC_KEY *peerec = NULL; EVP_PKEY *peerkey = NULL, *localkey = NULL; int ret = -1; FILE *fp = NULL; char idstr[IKED_ID_SIZE]; char ...
178,347,449,510,880,130,000,000,000,000,000,000,000
ca.c
317,673,040,972,141,270,000,000,000,000,000,000,000
[ "CWE-639" ]
CVE-2020-16088
iked in OpenIKED, as used in OpenBSD through 6.7, allows authentication bypass because ca.c has the wrong logic for checking whether a public key matches.
https://nvd.nist.gov/vuln/detail/CVE-2020-16088
195,495
linux
f958d7b528b1b40c44cfda5eabe2d82760d868c3
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/f958d7b528b1b40c44cfda5eabe2d82760d868c3
mm: make page ref count overflow check tighter and more explicit We have a VM_BUG_ON() to check that the page reference count doesn't underflow (or get close to overflow) by checking the sign of the count. That's all fine, but we actually want to allow people to use a "get page ref unless it's already very high" help...
1
static inline void get_page(struct page *page) { page = compound_head(page); /* * Getting a normal page or the head of a compound page * requires to already have an elevated page->_refcount. */ VM_BUG_ON_PAGE(page_ref_count(page) <= 0, page); page_ref_inc(page); }
205,759,811,558,459,150,000,000,000,000,000,000,000
mm.h
186,130,907,500,487,770,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2019-11487
The Linux kernel before 5.1-rc5 allows page->_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur w...
https://nvd.nist.gov/vuln/detail/CVE-2019-11487
227,668
linux
f958d7b528b1b40c44cfda5eabe2d82760d868c3
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/f958d7b528b1b40c44cfda5eabe2d82760d868c3
mm: make page ref count overflow check tighter and more explicit We have a VM_BUG_ON() to check that the page reference count doesn't underflow (or get close to overflow) by checking the sign of the count. That's all fine, but we actually want to allow people to use a "get page ref unless it's already very high" help...
0
static inline void get_page(struct page *page) { page = compound_head(page); /* * Getting a normal page or the head of a compound page * requires to already have an elevated page->_refcount. */ VM_BUG_ON_PAGE(page_ref_zero_or_close_to_overflow(page), page); page_ref_inc(page); }
272,612,905,804,825,670,000,000,000,000,000,000,000
mm.h
271,828,639,087,441,930,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2019-11487
The Linux kernel before 5.1-rc5 allows page->_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur w...
https://nvd.nist.gov/vuln/detail/CVE-2019-11487
195,499
ioq3
f61fe5f6a0419ef4a88d46a128052f2e8352e85d
https://github.com/ioquake/ioq3
https://github.com/ioquake/ioq3/commit/f61fe5f6a0419ef4a88d46a128052f2e8352e85d
Don't open .pk3 files as OpenAL drivers.
1
qboolean S_AL_Init( soundInterface_t *si ) { #ifdef USE_OPENAL const char* device = NULL; const char* inputdevice = NULL; int i; if( !si ) { return qfalse; } for (i = 0; i < MAX_RAW_STREAMS; i++) { streamSourceHandles[i] = -1; streamPlaying[i] = qfalse; streamSources[i] = 0; streamNumBuffers[i] = 0; ...
285,376,067,674,533,300,000,000,000,000,000,000,000
snd_openal.c
263,036,232,976,126,770,000,000,000,000,000,000,000
[ "CWE-269" ]
CVE-2017-6903
In ioquake3 before 2017-03-14, the auto-downloading feature has insufficient content restrictions. This also affects Quake III Arena, OpenArena, OpenJK, iortcw, and other id Tech 3 (aka Quake 3 engine) forks. A malicious auto-downloaded file can trigger loading of crafted auto-downloaded files as native code DLLs. A ma...
https://nvd.nist.gov/vuln/detail/CVE-2017-6903
227,933
ioq3
f61fe5f6a0419ef4a88d46a128052f2e8352e85d
https://github.com/ioquake/ioq3
https://github.com/ioquake/ioq3/commit/f61fe5f6a0419ef4a88d46a128052f2e8352e85d
Don't open .pk3 files as OpenAL drivers.
0
qboolean S_AL_Init( soundInterface_t *si ) { #ifdef USE_OPENAL const char* device = NULL; const char* inputdevice = NULL; int i; if( !si ) { return qfalse; } for (i = 0; i < MAX_RAW_STREAMS; i++) { streamSourceHandles[i] = -1; streamPlaying[i] = qfalse; streamSources[i] = 0; streamNumBuffers[i] = 0; ...
292,949,543,489,260,260,000,000,000,000,000,000,000
snd_openal.c
265,865,512,864,732,080,000,000,000,000,000,000,000
[ "CWE-269" ]
CVE-2017-6903
In ioquake3 before 2017-03-14, the auto-downloading feature has insufficient content restrictions. This also affects Quake III Arena, OpenArena, OpenJK, iortcw, and other id Tech 3 (aka Quake 3 engine) forks. A malicious auto-downloaded file can trigger loading of crafted auto-downloaded files as native code DLLs. A ma...
https://nvd.nist.gov/vuln/detail/CVE-2017-6903
195,548
Bento4
2f267f89f957088197f4b1fc254632d1645b415d
https://github.com/axiomatic-systems/Bento4
https://github.com/axiomatic-systems/Bento4/commit/2f267f89f957088197f4b1fc254632d1645b415d
fix for #183
1
AP4_AtomSampleTable::GetSample(AP4_Ordinal index, AP4_Sample& sample) { AP4_Result result; // check that we have an stsc atom if (!m_StscAtom) { return AP4_ERROR_INVALID_FORMAT; } // check that we have a chunk offset table if (m_StcoAtom == NULL && m...
273,959,235,933,699,700,000,000,000,000,000,000,000
Ap4AtomSampleTable.cpp
244,943,401,588,861,740,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2017-14640
A NULL pointer dereference was discovered in AP4_AtomSampleTable::GetSample in Core/Ap4AtomSampleTable.cpp in Bento4 version 1.5.0-617. The vulnerability causes a segmentation fault and application crash, which leads to remote denial of service.
https://nvd.nist.gov/vuln/detail/CVE-2017-14640
228,406
Bento4
2f267f89f957088197f4b1fc254632d1645b415d
https://github.com/axiomatic-systems/Bento4
https://github.com/axiomatic-systems/Bento4/commit/2f267f89f957088197f4b1fc254632d1645b415d
fix for #183
0
AP4_AtomSampleTable::GetSample(AP4_Ordinal index, AP4_Sample& sample) { AP4_Result result; // check that we have an stsc atom if (!m_StscAtom) { return AP4_ERROR_INVALID_FORMAT; } // check that we have a chunk offset table if (m_StcoAtom == NULL && m...
21,987,022,557,370,318,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2017-14640
A NULL pointer dereference was discovered in AP4_AtomSampleTable::GetSample in Core/Ap4AtomSampleTable.cpp in Bento4 version 1.5.0-617. The vulnerability causes a segmentation fault and application crash, which leads to remote denial of service.
https://nvd.nist.gov/vuln/detail/CVE-2017-14640
195,550
ioq3
b173ac05993f634a42be3d3535e1b158de0c3372
https://github.com/ioquake/ioq3
https://github.com/ioquake/ioq3/commit/b173ac05993f634a42be3d3535e1b158de0c3372
Merge some file writing extension checks from OpenJK. Thanks Ensiform. https://github.com/JACoders/OpenJK/commit/05928a57f9e4aae15a3bd0 https://github.com/JACoders/OpenJK/commit/ef124fd0fc48af164581176
1
void Con_Dump_f (void) { int l, x, i; short *line; fileHandle_t f; int bufferlen; char *buffer; char filename[MAX_QPATH]; if (Cmd_Argc() != 2) { Com_Printf ("usage: condump <filename>\n"); return; } Q_strncpyz( filename, Cmd_Argv( 1 ), sizeof( filename ) ); COM_DefaultExtension( filename, sizeof( fil...
298,648,795,184,875,400,000,000,000,000,000,000,000
cl_console.c
141,523,712,533,740,970,000,000,000,000,000,000,000
[ "CWE-269" ]
CVE-2017-6903
In ioquake3 before 2017-03-14, the auto-downloading feature has insufficient content restrictions. This also affects Quake III Arena, OpenArena, OpenJK, iortcw, and other id Tech 3 (aka Quake 3 engine) forks. A malicious auto-downloaded file can trigger loading of crafted auto-downloaded files as native code DLLs. A ma...
https://nvd.nist.gov/vuln/detail/CVE-2017-6903
228,410
ioq3
b173ac05993f634a42be3d3535e1b158de0c3372
https://github.com/ioquake/ioq3
https://github.com/ioquake/ioq3/commit/b173ac05993f634a42be3d3535e1b158de0c3372
Merge some file writing extension checks from OpenJK. Thanks Ensiform. https://github.com/JACoders/OpenJK/commit/05928a57f9e4aae15a3bd0 https://github.com/JACoders/OpenJK/commit/ef124fd0fc48af164581176
0
void Con_Dump_f (void) { int l, x, i; short *line; fileHandle_t f; int bufferlen; char *buffer; char filename[MAX_QPATH]; if (Cmd_Argc() != 2) { Com_Printf ("usage: condump <filename>\n"); return; } Q_strncpyz( filename, Cmd_Argv( 1 ), sizeof( filename ) ); COM_DefaultExtension( filename, sizeof( fil...
56,996,131,935,974,910,000,000,000,000,000,000,000
cl_console.c
105,723,350,746,074,650,000,000,000,000,000,000,000
[ "CWE-269" ]
CVE-2017-6903
In ioquake3 before 2017-03-14, the auto-downloading feature has insufficient content restrictions. This also affects Quake III Arena, OpenArena, OpenJK, iortcw, and other id Tech 3 (aka Quake 3 engine) forks. A malicious auto-downloaded file can trigger loading of crafted auto-downloaded files as native code DLLs. A ma...
https://nvd.nist.gov/vuln/detail/CVE-2017-6903
195,553
Bento4
03d1222ab9c2ce779cdf01bdb96cdd69cbdcfeda
https://github.com/axiomatic-systems/Bento4
https://github.com/axiomatic-systems/Bento4/commit/03d1222ab9c2ce779cdf01bdb96cdd69cbdcfeda
fix for #190
1
AP4_VisualSampleEntry::ReadFields(AP4_ByteStream& stream) { // sample entry AP4_Result result = AP4_SampleEntry::ReadFields(stream); if (result < 0) return result; // read fields from this class stream.ReadUI16(m_Predefined1); stream.ReadUI16(m_Reserved2); stream.Read(m_Predefined2, sizeof(...
291,858,126,646,171,140,000,000,000,000,000,000,000
Ap4SampleEntry.cpp
150,692,137,233,250,730,000,000,000,000,000,000,000
[ "CWE-843" ]
CVE-2017-14639
AP4_VisualSampleEntry::ReadFields in Core/Ap4SampleEntry.cpp in Bento4 1.5.0-617 uses incorrect character data types, which causes a stack-based buffer underflow and out-of-bounds write, leading to denial of service (application crash) or possibly unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2017-14639
228,526
Bento4
03d1222ab9c2ce779cdf01bdb96cdd69cbdcfeda
https://github.com/axiomatic-systems/Bento4
https://github.com/axiomatic-systems/Bento4/commit/03d1222ab9c2ce779cdf01bdb96cdd69cbdcfeda
fix for #190
0
AP4_VisualSampleEntry::ReadFields(AP4_ByteStream& stream) { // sample entry AP4_Result result = AP4_SampleEntry::ReadFields(stream); if (result < 0) return result; // read fields from this class stream.ReadUI16(m_Predefined1); stream.ReadUI16(m_Reserved2); stream.Read(m_Predefined2, sizeof(...
143,158,700,757,899,990,000,000,000,000,000,000,000
Ap4SampleEntry.cpp
12,062,684,135,760,506,000,000,000,000,000,000,000
[ "CWE-843" ]
CVE-2017-14639
AP4_VisualSampleEntry::ReadFields in Core/Ap4SampleEntry.cpp in Bento4 1.5.0-617 uses incorrect character data types, which causes a stack-based buffer underflow and out-of-bounds write, leading to denial of service (application crash) or possibly unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2017-14639
195,567
Bento4
5eb8cf89d724ccb0b4ce5f24171ec7c11f0a7647
https://github.com/axiomatic-systems/Bento4
https://github.com/axiomatic-systems/Bento4/commit/5eb8cf89d724ccb0b4ce5f24171ec7c11f0a7647
fix for #187
1
AP4_HdlrAtom::AP4_HdlrAtom(AP4_UI32 size, AP4_UI08 version, AP4_UI32 flags, AP4_ByteStream& stream) : AP4_Atom(AP4_ATOM_TYPE_HDLR, size, version, flags) { AP4_UI32 predefined; stream.ReadUI32(predefined); ...
139,780,581,548,442,280,000,000,000,000,000,000,000
Ap4HdlrAtom.cpp
185,668,344,662,796,100,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-14643
The AP4_HdlrAtom class in Core/Ap4HdlrAtom.cpp in Bento4 version 1.5.0-617 uses an incorrect character data type, leading to a heap-based buffer over-read and application crash in AP4_BytesToUInt32BE in Core/Ap4Utils.h.
https://nvd.nist.gov/vuln/detail/CVE-2017-14643
228,566
Bento4
5eb8cf89d724ccb0b4ce5f24171ec7c11f0a7647
https://github.com/axiomatic-systems/Bento4
https://github.com/axiomatic-systems/Bento4/commit/5eb8cf89d724ccb0b4ce5f24171ec7c11f0a7647
fix for #187
0
AP4_HdlrAtom::AP4_HdlrAtom(AP4_UI32 size, AP4_UI08 version, AP4_UI32 flags, AP4_ByteStream& stream) : AP4_Atom(AP4_ATOM_TYPE_HDLR, size, version, flags) { AP4_UI32 predefined; stream.ReadUI32(predefined); ...
125,108,718,056,462,480,000,000,000,000,000,000,000
Ap4HdlrAtom.cpp
27,669,121,668,231,960,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-14643
The AP4_HdlrAtom class in Core/Ap4HdlrAtom.cpp in Bento4 version 1.5.0-617 uses an incorrect character data type, leading to a heap-based buffer over-read and application crash in AP4_BytesToUInt32BE in Core/Ap4Utils.h.
https://nvd.nist.gov/vuln/detail/CVE-2017-14643
195,568
kdeconnect-kde
ce0f00fc2d3eccb51d0af4eba61a4f60de086a59
https://github.com/KDE/kdeconnect-kde
https://github.com/KDE/kdeconnect-kde/commit/ce0f00fc2d3eccb51d0af4eba61a4f60de086a59
Limit the ports we try to connect to to the port range of KDE Connect So we can't trigger connections to other services. Thanks Matthias Gerstner <mgerstner@suse.de> for reporting this.
1
void LanLinkProvider::udpBroadcastReceived() { while (m_udpSocket.hasPendingDatagrams()) { QByteArray datagram; datagram.resize(m_udpSocket.pendingDatagramSize()); QHostAddress sender; m_udpSocket.readDatagram(datagram.data(), datagram.size(), &sender); if (sender.isLoopba...
151,001,223,268,024,100,000,000,000,000,000,000,000
lanlinkprovider.cpp
10,768,406,022,709,875,000,000,000,000,000,000,000
[ "CWE-400" ]
CVE-2020-26164
In kdeconnect-kde (aka KDE Connect) before 20.08.2, an attacker on the local network could send crafted packets that trigger use of large amounts of CPU, memory, or network connection slots, aka a Denial of Service attack.
https://nvd.nist.gov/vuln/detail/CVE-2020-26164
228,574
kdeconnect-kde
ce0f00fc2d3eccb51d0af4eba61a4f60de086a59
https://github.com/KDE/kdeconnect-kde
https://github.com/KDE/kdeconnect-kde/commit/ce0f00fc2d3eccb51d0af4eba61a4f60de086a59
Limit the ports we try to connect to to the port range of KDE Connect So we can't trigger connections to other services. Thanks Matthias Gerstner <mgerstner@suse.de> for reporting this.
0
void LanLinkProvider::udpBroadcastReceived() { while (m_udpSocket.hasPendingDatagrams()) { QByteArray datagram; datagram.resize(m_udpSocket.pendingDatagramSize()); QHostAddress sender; m_udpSocket.readDatagram(datagram.data(), datagram.size(), &sender); if (sender.isLoopba...
233,962,280,599,683,340,000,000,000,000,000,000,000
lanlinkprovider.cpp
122,426,479,794,157,680,000,000,000,000,000,000,000
[ "CWE-400" ]
CVE-2020-26164
In kdeconnect-kde (aka KDE Connect) before 20.08.2, an attacker on the local network could send crafted packets that trigger use of large amounts of CPU, memory, or network connection slots, aka a Denial of Service attack.
https://nvd.nist.gov/vuln/detail/CVE-2020-26164
195,572
hhvm
8e7266fef1f329b805b37f32c9ad0090215ab269
https://github.com/facebook/hhvm
https://github.com/facebook/hhvm/commit/8e7266fef1f329b805b37f32c9ad0090215ab269
Type safety in simplexml import routines Reviewed By: Orvid Differential Revision: D3447275 fbshipit-source-id: d859c97f9d85c520b0e371cef6dcb19bb2ef7dbf
1
xmlNodePtr SimpleXMLElement_exportNode(const Object& sxe) { assert(sxe->instanceof(SimpleXMLElement_classof())); auto data = Native::data<SimpleXMLElement>(sxe.get()); return php_sxe_get_first_node(data, data->nodep()); }
191,864,301,088,947,100,000,000,000,000,000,000,000
ext_simplexml.cpp
256,254,425,784,196,880,000,000,000,000,000,000,000
[ "CWE-345" ]
CVE-2016-1000004
Insufficient type checks were employed prior to casting input data in SimpleXMLElement_exportNode and simplexml_import_dom. This issue affects HHVM versions prior to 3.9.5, all versions between 3.10.0 and 3.12.3 (inclusive), and all versions between 3.13.0 and 3.14.1 (inclusive).
https://nvd.nist.gov/vuln/detail/CVE-2016-1000004
228,820
hhvm
8e7266fef1f329b805b37f32c9ad0090215ab269
https://github.com/facebook/hhvm
https://github.com/facebook/hhvm/commit/8e7266fef1f329b805b37f32c9ad0090215ab269
Type safety in simplexml import routines Reviewed By: Orvid Differential Revision: D3447275 fbshipit-source-id: d859c97f9d85c520b0e371cef6dcb19bb2ef7dbf
0
xmlNodePtr SimpleXMLElement_exportNode(const Object& sxe) { if (!sxe->instanceof(SimpleXMLElement_classof())) return nullptr; auto data = Native::data<SimpleXMLElement>(sxe.get()); return php_sxe_get_first_node(data, data->nodep()); }
199,698,879,063,053,850,000,000,000,000,000,000,000
ext_simplexml.cpp
197,253,127,696,964,920,000,000,000,000,000,000,000
[ "CWE-345" ]
CVE-2016-1000004
Insufficient type checks were employed prior to casting input data in SimpleXMLElement_exportNode and simplexml_import_dom. This issue affects HHVM versions prior to 3.9.5, all versions between 3.10.0 and 3.12.3 (inclusive), and all versions between 3.13.0 and 3.14.1 (inclusive).
https://nvd.nist.gov/vuln/detail/CVE-2016-1000004
195,574
hhvm
ab6fdeb84fb090b48606b6f7933028cfe7bf3a5e
https://github.com/facebook/hhvm
https://github.com/facebook/hhvm/commit/ab6fdeb84fb090b48606b6f7933028cfe7bf3a5e
Fix mcrypt_create_iv(..., MCRYPT_RAND) to auto-seed RNG Summary: Without seeding the random number generator, we'll always get the same IV, and that reduces the security of this function. Fortunately, f_rand() has all of that logic for auto-seeding and selection of a suitable initial seed built-in. Realistically, us...
1
Variant HHVM_FUNCTION(mcrypt_create_iv, int size, int source /* = 0 */) { if (size <= 0 || size >= INT_MAX) { raise_warning("Can not create an IV with a size of less than 1 or " "greater than %d", INT_MAX); return false; } int n = 0; char *iv = (char*)calloc(size + 1, 1); if (sour...
122,930,791,493,003,970,000,000,000,000,000,000,000
ext_mcrypt.cpp
12,007,436,905,327,050,000,000,000,000,000,000,000
[ "CWE-310" ]
CVE-2014-5386
The mcrypt_create_iv function in hphp/runtime/ext/mcrypt/ext_mcrypt.cpp in Facebook HipHop Virtual Machine (HHVM) before 3.3.0 does not seed the random number generator, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging the use of a single initialization vector.
https://nvd.nist.gov/vuln/detail/CVE-2014-5386
228,848
hhvm
ab6fdeb84fb090b48606b6f7933028cfe7bf3a5e
https://github.com/facebook/hhvm
https://github.com/facebook/hhvm/commit/ab6fdeb84fb090b48606b6f7933028cfe7bf3a5e
Fix mcrypt_create_iv(..., MCRYPT_RAND) to auto-seed RNG Summary: Without seeding the random number generator, we'll always get the same IV, and that reduces the security of this function. Fortunately, f_rand() has all of that logic for auto-seeding and selection of a suitable initial seed built-in. Realistically, us...
0
Variant HHVM_FUNCTION(mcrypt_create_iv, int size, int source /* = 0 */) { if (size <= 0 || size >= INT_MAX) { raise_warning("Can not create an IV with a size of less than 1 or " "greater than %d", INT_MAX); return false; } int n = 0; char *iv = (char*)calloc(size + 1, 1); if (sour...
23,541,377,156,896,640,000,000,000,000,000,000,000
ext_mcrypt.cpp
310,969,514,556,034,770,000,000,000,000,000,000,000
[ "CWE-310" ]
CVE-2014-5386
The mcrypt_create_iv function in hphp/runtime/ext/mcrypt/ext_mcrypt.cpp in Facebook HipHop Virtual Machine (HHVM) before 3.3.0 does not seed the random number generator, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging the use of a single initialization vector.
https://nvd.nist.gov/vuln/detail/CVE-2014-5386
195,608
hhvm
851fff90a9b7461df2393af32239ba217bc25946
https://github.com/facebook/hhvm
https://github.com/facebook/hhvm/commit/851fff90a9b7461df2393af32239ba217bc25946
Drop supplementary groups when changing to non-root Summary: When running HHVM as a non-root user, UID and GID are updated correctly but supplementary groups are not dropped properly. This runs initgroups inside main thread and lightprocess threads to reset groups to those of the specified non-root user. Reviewed By:...
1
bool Capability::ChangeUnixUser(uid_t uid) { if (setInitialCapabilities()) { struct passwd *pw; if ((pw = getpwuid(uid)) == nullptr) { Logger::Error("unable to getpwuid(%d): %s", uid, folly::errnoStr(errno).c_str()); return false; } if (pw->pw_gid == 0 || setgid(pw->p...
204,378,463,174,552,160,000,000,000,000,000,000,000
capability.cpp
11,716,426,207,720,806,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2014-2209
Facebook HipHop Virtual Machine (HHVM) before 3.1.0 does not drop supplemental group memberships within hphp/util/capability.cpp and hphp/util/light-process.cpp, which allows remote attackers to bypass intended access restrictions by leveraging group permissions for a file or directory.
https://nvd.nist.gov/vuln/detail/CVE-2014-2209
229,042
hhvm
851fff90a9b7461df2393af32239ba217bc25946
https://github.com/facebook/hhvm
https://github.com/facebook/hhvm/commit/851fff90a9b7461df2393af32239ba217bc25946
Drop supplementary groups when changing to non-root Summary: When running HHVM as a non-root user, UID and GID are updated correctly but supplementary groups are not dropped properly. This runs initgroups inside main thread and lightprocess threads to reset groups to those of the specified non-root user. Reviewed By:...
0
bool Capability::ChangeUnixUser(uid_t uid) { if (setInitialCapabilities()) { struct passwd *pw; if ((pw = getpwuid(uid)) == nullptr) { Logger::Error("unable to getpwuid(%d): %s", uid, folly::errnoStr(errno).c_str()); return false; } if (initgroups(pw->pw_name, pw->pw_...
56,845,751,146,719,340,000,000,000,000,000,000,000
capability.cpp
35,283,005,336,875,270,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2014-2209
Facebook HipHop Virtual Machine (HHVM) before 3.1.0 does not drop supplemental group memberships within hphp/util/capability.cpp and hphp/util/light-process.cpp, which allows remote attackers to bypass intended access restrictions by leveraging group permissions for a file or directory.
https://nvd.nist.gov/vuln/detail/CVE-2014-2209
195,609
hhvm
851fff90a9b7461df2393af32239ba217bc25946
https://github.com/facebook/hhvm
https://github.com/facebook/hhvm/commit/851fff90a9b7461df2393af32239ba217bc25946
Drop supplementary groups when changing to non-root Summary: When running HHVM as a non-root user, UID and GID are updated correctly but supplementary groups are not dropped properly. This runs initgroups inside main thread and lightprocess threads to reset groups to those of the specified non-root user. Reviewed By:...
1
static void do_change_user(FILE *fin, FILE *fout) { std::string uname; lwp_read(fin, uname); if (uname.length() > 0) { struct passwd *pw = getpwnam(uname.c_str()); if (pw) { if (pw->pw_gid) { setgid(pw->pw_gid); } if (pw->pw_uid) { setuid(pw->pw_uid); } } } }
61,372,006,412,745,630,000,000,000,000,000,000,000
light-process.cpp
152,028,194,502,348,390,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2014-2209
Facebook HipHop Virtual Machine (HHVM) before 3.1.0 does not drop supplemental group memberships within hphp/util/capability.cpp and hphp/util/light-process.cpp, which allows remote attackers to bypass intended access restrictions by leveraging group permissions for a file or directory.
https://nvd.nist.gov/vuln/detail/CVE-2014-2209
229,075
hhvm
851fff90a9b7461df2393af32239ba217bc25946
https://github.com/facebook/hhvm
https://github.com/facebook/hhvm/commit/851fff90a9b7461df2393af32239ba217bc25946
Drop supplementary groups when changing to non-root Summary: When running HHVM as a non-root user, UID and GID are updated correctly but supplementary groups are not dropped properly. This runs initgroups inside main thread and lightprocess threads to reset groups to those of the specified non-root user. Reviewed By:...
0
static void do_change_user(FILE *fin, FILE *fout) { std::string uname; lwp_read(fin, uname); if (uname.length() > 0) { struct passwd *pw = getpwnam(uname.c_str()); if (pw) { if (pw->pw_gid) { initgroups(pw->pw_name, pw->pw_gid); setgid(pw->pw_gid); } if (pw->pw_uid) { ...
54,948,825,547,458,770,000,000,000,000,000,000,000
light-process.cpp
79,993,282,835,522,970,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2014-2209
Facebook HipHop Virtual Machine (HHVM) before 3.1.0 does not drop supplemental group memberships within hphp/util/capability.cpp and hphp/util/light-process.cpp, which allows remote attackers to bypass intended access restrictions by leveraging group permissions for a file or directory.
https://nvd.nist.gov/vuln/detail/CVE-2014-2209
195,610
hhvm
6e4dd9ec3f14b48170fc45dc9d13a3261765f994
https://github.com/facebook/hhvm
https://github.com/facebook/hhvm/commit/6e4dd9ec3f14b48170fc45dc9d13a3261765f994
CVE-2019-3557: Fix OOB read in readRecord on BZ2Files/OutputFiles Summary: These File subclasses return -1 on read errors which is not what is expected for readImpl--this made File::readRecord behave unusually if the read fails, causing it to read (size_t)(-1) bytes from its stream buffer; which, unsurprisingly produc...
1
int64_t OutputFile::readImpl(char* /*buffer*/, int64_t /*length*/) { raise_warning("cannot read from a php://output stream"); return -1; }
337,322,187,543,142,100,000,000,000,000,000,000,000
output-file.cpp
9,794,863,746,011,051,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-3557
The implementations of streams for bz2 and php://output improperly implemented their readImpl functions, returning -1 consistently. This behavior caused some stream functions, such as stream_get_line, to trigger an out-of-bounds read when operating on such malformed streams. The implementations were updated to return v...
https://nvd.nist.gov/vuln/detail/CVE-2019-3557
229,097
hhvm
6e4dd9ec3f14b48170fc45dc9d13a3261765f994
https://github.com/facebook/hhvm
https://github.com/facebook/hhvm/commit/6e4dd9ec3f14b48170fc45dc9d13a3261765f994
CVE-2019-3557: Fix OOB read in readRecord on BZ2Files/OutputFiles Summary: These File subclasses return -1 on read errors which is not what is expected for readImpl--this made File::readRecord behave unusually if the read fails, causing it to read (size_t)(-1) bytes from its stream buffer; which, unsurprisingly produc...
0
int64_t OutputFile::readImpl(char* /*buffer*/, int64_t /*length*/) { raise_warning("cannot read from a php://output stream"); return 0; }
11,936,769,161,372,925,000,000,000,000,000,000,000
output-file.cpp
134,179,565,871,971,400,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-3557
The implementations of streams for bz2 and php://output improperly implemented their readImpl functions, returning -1 consistently. This behavior caused some stream functions, such as stream_get_line, to trigger an out-of-bounds read when operating on such malformed streams. The implementations were updated to return v...
https://nvd.nist.gov/vuln/detail/CVE-2019-3557
195,611
hhvm
6e4dd9ec3f14b48170fc45dc9d13a3261765f994
https://github.com/facebook/hhvm
https://github.com/facebook/hhvm/commit/6e4dd9ec3f14b48170fc45dc9d13a3261765f994
CVE-2019-3557: Fix OOB read in readRecord on BZ2Files/OutputFiles Summary: These File subclasses return -1 on read errors which is not what is expected for readImpl--this made File::readRecord behave unusually if the read fails, causing it to read (size_t)(-1) bytes from its stream buffer; which, unsurprisingly produc...
1
int64_t BZ2File::readImpl(char * buf, int64_t length) { if (length == 0) { return 0; } assertx(m_bzFile); int len = BZ2_bzread(m_bzFile, buf, length); /* Sometimes libbz2 will return fewer bytes than requested, and set bzerror * to BZ_STREAM_END, but it's not actually EOF, and you can keep reading from...
338,038,434,053,643,400,000,000,000,000,000,000,000
bz2-file.cpp
68,927,935,171,536,810,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-3557
The implementations of streams for bz2 and php://output improperly implemented their readImpl functions, returning -1 consistently. This behavior caused some stream functions, such as stream_get_line, to trigger an out-of-bounds read when operating on such malformed streams. The implementations were updated to return v...
https://nvd.nist.gov/vuln/detail/CVE-2019-3557
229,096
hhvm
6e4dd9ec3f14b48170fc45dc9d13a3261765f994
https://github.com/facebook/hhvm
https://github.com/facebook/hhvm/commit/6e4dd9ec3f14b48170fc45dc9d13a3261765f994
CVE-2019-3557: Fix OOB read in readRecord on BZ2Files/OutputFiles Summary: These File subclasses return -1 on read errors which is not what is expected for readImpl--this made File::readRecord behave unusually if the read fails, causing it to read (size_t)(-1) bytes from its stream buffer; which, unsurprisingly produc...
0
int64_t BZ2File::readImpl(char * buf, int64_t length) { if (length == 0) { return 0; } assertx(m_bzFile); int len = BZ2_bzread(m_bzFile, buf, length); /* Sometimes libbz2 will return fewer bytes than requested, and set bzerror * to BZ_STREAM_END, but it's not actually EOF, and you can keep reading from...
201,114,122,229,752,200,000,000,000,000,000,000,000
bz2-file.cpp
37,884,756,135,230,520,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-3557
The implementations of streams for bz2 and php://output improperly implemented their readImpl functions, returning -1 consistently. This behavior caused some stream functions, such as stream_get_line, to trigger an out-of-bounds read when operating on such malformed streams. The implementations were updated to return v...
https://nvd.nist.gov/vuln/detail/CVE-2019-3557
195,630
electron
ce361a12e355f9e1e99c989f1ea056c9e502dbe7
https://github.com/electron/electron
https://github.com/electron/electron/commit/ce361a12e355f9e1e99c989f1ea056c9e502dbe7
Use case-insensitive switch comparisons
1
bool IsBlacklistedArg(const base::CommandLine::CharType* arg) { #if defined(OS_WIN) const auto converted = base::WideToUTF8(arg); const char* a = converted.c_str(); #else const char* a = arg; #endif static const char* prefixes[] = {"--", "-", "/"}; int prefix_length = 0; for (auto& prefix : prefixes) { ...
337,018,550,088,046,860,000,000,000,000,000,000,000
command_line_args.cc
198,356,772,242,024,040,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2018-1000118
Github Electron version Electron 1.8.2-beta.4 and earlier contains a Command Injection vulnerability in Protocol Handler that can result in command execute. This attack appear to be exploitable via the victim opening an electron protocol handler in their browser. This vulnerability appears to have been fixed in Electro...
https://nvd.nist.gov/vuln/detail/CVE-2018-1000118
229,354
electron
ce361a12e355f9e1e99c989f1ea056c9e502dbe7
https://github.com/electron/electron
https://github.com/electron/electron/commit/ce361a12e355f9e1e99c989f1ea056c9e502dbe7
Use case-insensitive switch comparisons
0
bool IsBlacklistedArg(const base::CommandLine::CharType* arg) { #if defined(OS_WIN) const auto converted = base::WideToUTF8(arg); const char* a = converted.c_str(); #else const char* a = arg; #endif static const char* prefixes[] = {"--", "-", "/"}; int prefix_length = 0; for (auto& prefix : prefixes) { ...
142,984,060,109,921,260,000,000,000,000,000,000,000
command_line_args.cc
286,126,598,103,602,100,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2018-1000118
Github Electron version Electron 1.8.2-beta.4 and earlier contains a Command Injection vulnerability in Protocol Handler that can result in command execute. This attack appear to be exploitable via the victim opening an electron protocol handler in their browser. This vulnerability appears to have been fixed in Electro...
https://nvd.nist.gov/vuln/detail/CVE-2018-1000118
195,646
tensorflow
e0b6e58c328059829c3eb968136f17aa72b6c876
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/e0b6e58c328059829c3eb968136f17aa72b6c876
Fix segfault/heap buffer overflow in `{Experimental,}DatasetToTFRecord` where dataset is numeric. Code assumes only strings inputs and then interprets numbers as valid `tstring`s. Then, when trying to compute the CRC of the record this results in heap buffer overflow. PiperOrigin-RevId: 387675909 Change-Id: I7396b9b8...
1
Status DoCompute(OpKernelContext* ctx) { tensorflow::ResourceTagger tag(kTFDataResourceTag, ctx->op_kernel().type_string()); tstring filename; TF_RETURN_IF_ERROR( ParseScalarArgument<tstring>(ctx, "filename", &filename)); tstring compression_type; TF_RETU...
292,166,234,781,191,280,000,000,000,000,000,000,000
to_tf_record_op.cc
36,822,953,656,946,894,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2021-37650
TensorFlow is an end-to-end open source platform for machine learning. In affected versions the implementation for `tf.raw_ops.ExperimentalDatasetToTFRecord` and `tf.raw_ops.DatasetToTFRecord` can trigger heap buffer overflow and segmentation fault. The [implementation](https://github.com/tensorflow/tensorflow/blob/f24...
https://nvd.nist.gov/vuln/detail/CVE-2021-37650
229,847
tensorflow
e0b6e58c328059829c3eb968136f17aa72b6c876
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/e0b6e58c328059829c3eb968136f17aa72b6c876
Fix segfault/heap buffer overflow in `{Experimental,}DatasetToTFRecord` where dataset is numeric. Code assumes only strings inputs and then interprets numbers as valid `tstring`s. Then, when trying to compute the CRC of the record this results in heap buffer overflow. PiperOrigin-RevId: 387675909 Change-Id: I7396b9b8...
0
Status DoCompute(OpKernelContext* ctx) { tensorflow::ResourceTagger tag(kTFDataResourceTag, ctx->op_kernel().type_string()); tstring filename; TF_RETURN_IF_ERROR( ParseScalarArgument<tstring>(ctx, "filename", &filename)); tstring compression_type; TF_RETU...
222,055,149,982,737,140,000,000,000,000,000,000,000
to_tf_record_op.cc
46,043,404,800,283,230,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2021-37650
TensorFlow is an end-to-end open source platform for machine learning. In affected versions the implementation for `tf.raw_ops.ExperimentalDatasetToTFRecord` and `tf.raw_ops.DatasetToTFRecord` can trigger heap buffer overflow and segmentation fault. The [implementation](https://github.com/tensorflow/tensorflow/blob/f24...
https://nvd.nist.gov/vuln/detail/CVE-2021-37650
195,658
oniguruma
b4bf968ad52afe14e60a2dc8a95d3555c543353a
https://github.com/kkos/oniguruma
https://github.com/kkos/oniguruma/commit/b4bf968ad52afe14e60a2dc8a95d3555c543353a
fix #55 : check too big code point value for single byte value in next_state_val()
1
next_state_val(CClassNode* cc, OnigCodePoint *vs, OnigCodePoint v, int* vs_israw, int v_israw, enum CCVALTYPE intype, enum CCVALTYPE* type, enum CCSTATE* state, ScanEnv* env) { int r; switch (*state) { case CCS_VALUE: if (*type == CCV_SB) { BITSET_SET_BIT(cc->bs, (int )(*vs)); ...
140,805,157,103,947,400,000,000,000,000,000,000,000
regparse.c
305,266,319,944,342,200,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2017-9226
An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A heap out-of-bounds write or read occurs in next_state_val() during regular expression compilation. Octal numbers larger than 0xff are not handled correctly in fetch_token() and fetch_token_in_...
https://nvd.nist.gov/vuln/detail/CVE-2017-9226
230,000
oniguruma
b4bf968ad52afe14e60a2dc8a95d3555c543353a
https://github.com/kkos/oniguruma
https://github.com/kkos/oniguruma/commit/b4bf968ad52afe14e60a2dc8a95d3555c543353a
fix #55 : check too big code point value for single byte value in next_state_val()
0
next_state_val(CClassNode* cc, OnigCodePoint *vs, OnigCodePoint v, int* vs_israw, int v_israw, enum CCVALTYPE intype, enum CCVALTYPE* type, enum CCSTATE* state, ScanEnv* env) { int r; switch (*state) { case CCS_VALUE: if (*type == CCV_SB) { if (*vs > 0xff) return ONIGE...
57,764,420,093,491,890,000,000,000,000,000,000,000
regparse.c
205,767,443,219,914,600,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2017-9226
An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A heap out-of-bounds write or read occurs in next_state_val() during regular expression compilation. Octal numbers larger than 0xff are not handled correctly in fetch_token() and fetch_token_in_...
https://nvd.nist.gov/vuln/detail/CVE-2017-9226
195,666
ImageMagick
f13c6b54a879aaa771ec64b5a066b939e8f8e7f0
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/f13c6b54a879aaa771ec64b5a066b939e8f8e7f0
https://github.com/ImageMagick/ImageMagick/issues/501
1
static Image *ReadJP2Image(const ImageInfo *image_info,ExceptionInfo *exception) { const char *option; Image *image; int jp2_status; MagickBooleanType status; opj_codec_t *jp2_codec; opj_codestream_index_t *codestream_index = (opj_codestream_index_t *) NULL; opj_dparameters_t...
227,607,753,646,632,050,000,000,000,000,000,000,000
jp2.c
35,911,165,762,958,540,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2017-13145
In ImageMagick before 6.9.8-8 and 7.x before 7.0.5-9, the ReadJP2Image function in coders/jp2.c does not properly validate the channel geometry, leading to a crash.
https://nvd.nist.gov/vuln/detail/CVE-2017-13145
230,319
ImageMagick
f13c6b54a879aaa771ec64b5a066b939e8f8e7f0
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/f13c6b54a879aaa771ec64b5a066b939e8f8e7f0
https://github.com/ImageMagick/ImageMagick/issues/501
0
static Image *ReadJP2Image(const ImageInfo *image_info,ExceptionInfo *exception) { const char *option; Image *image; int jp2_status; MagickBooleanType status; opj_codec_t *jp2_codec; opj_codestream_index_t *codestream_index = (opj_codestream_index_t *) NULL; opj_dparameters_t...
211,048,824,504,751,460,000,000,000,000,000,000,000
jp2.c
299,186,446,646,628,600,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2017-13145
In ImageMagick before 6.9.8-8 and 7.x before 7.0.5-9, the ReadJP2Image function in coders/jp2.c does not properly validate the channel geometry, leading to a crash.
https://nvd.nist.gov/vuln/detail/CVE-2017-13145
195,681
tensorflow
13d38a07ce9143e044aa737cfd7bb759d0e9b400
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/13d38a07ce9143e044aa737cfd7bb759d0e9b400
Fix tf.raw_ops.UnsortedSegmentJoin vulnerability with invalid num_segments. Check that input is actually a scalar before treating it as such. PiperOrigin-RevId: 445206880
1
void Compute(OpKernelContext* context) override { const Tensor& input = context->input(0); const TensorShape& input_shape = input.shape(); const int32_t input_dims = input_shape.dims(); const Tensor& segment_id = context->input(1); const TensorShape& segment_id_shape = segment_id.shape(); con...
282,038,238,333,656,560,000,000,000,000,000,000,000
unsorted_segment_join_op.cc
146,876,308,978,777,240,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2022-29197
TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.UnsortedSegmentJoin` does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of service attack. The code assumes `n...
https://nvd.nist.gov/vuln/detail/CVE-2022-29197