idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
262,659 | tensorflow | ff8894044dfae5568ecbf2ed514c1a37dc394f1b | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/ff8894044dfae5568ecbf2ed514c1a37dc394f1b | Add one missing valdiation to `matrix_set_diag_op.cc`
PiperOrigin-RevId: 387923408
Change-Id: If6a97b9098c13879400f56c22f91555cdf0ce5d7 | 0 | void Compute(OpKernelContext* context) override {
const Tensor& input = context->input(0);
const Tensor& diag = context->input(1);
// MatrixSetDiag and MatrixSetDiagV2 both use this OpKernel. MatrixSetDiag
// only has two inputs, so we have to check the number of inputs before
// reading addition... | 331,353,730,489,466,700,000,000,000,000,000,000,000 | matrix_set_diag_op.cc | 225,232,759,608,931,400,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2021-37658 | TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can cause undefined behavior via binding a reference to null pointer in all operations of type `tf.raw_ops.MatrixSetDiagV*`. The [implementation](https://github.com/tensorflow/tensorflow/blob/84d053187cb80d975ef2b968... | https://nvd.nist.gov/vuln/detail/CVE-2021-37658 |
197,651 | tensorflow | 2d88f470dea2671b430884260f3626b1fe99830a | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/2d88f470dea2671b430884260f3626b1fe99830a | [tflite] Ensure `ResolveAxis` properly handles negative inputs.
In Python, a list `l` of length `n` allows indexing with negative indices, `l[i]`. The only constraint is that `n + i` becomes positive. Code in `ResolveAxis` assumes the constraints and only checks it using a `DCHECK`. But the macro is a no-op in non-deb... | 1 | inline bool ResolveAxis(const int num_dims, const int* axis,
const int64_t num_axis, int* out_axis,
int* out_num_axis) {
*out_num_axis = 0; // Just in case.
// Short-circuit axis resolution for scalars; the axis will go unused.
if (num_dims == 0) {
return true;... | 108,836,501,475,910,810,000,000,000,000,000,000,000 | reduce.h | 86,072,470,145,116,500,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2020-15207 | In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, to mimic Python's indexing with negative values, TFLite uses `ResolveAxis` to convert negative values to positive indices. However, the only check that the converted index is now valid is only present in debug builds. If the `DCHECK` does not tri... | https://nvd.nist.gov/vuln/detail/CVE-2020-15207 |
262,662 | tensorflow | 2d88f470dea2671b430884260f3626b1fe99830a | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/2d88f470dea2671b430884260f3626b1fe99830a | [tflite] Ensure `ResolveAxis` properly handles negative inputs.
In Python, a list `l` of length `n` allows indexing with negative indices, `l[i]`. The only constraint is that `n + i` becomes positive. Code in `ResolveAxis` assumes the constraints and only checks it using a `DCHECK`. But the macro is a no-op in non-deb... | 0 | inline bool ResolveAxis(const int num_dims, const int* axis,
const int64_t num_axis, int* out_axis,
int* out_num_axis) {
*out_num_axis = 0; // Just in case.
// Short-circuit axis resolution for scalars; the axis will go unused.
if (num_dims == 0) {
return true;... | 274,659,630,210,965,100,000,000,000,000,000,000,000 | reduce.h | 311,723,333,358,509,900,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2020-15207 | In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, to mimic Python's indexing with negative values, TFLite uses `ResolveAxis` to convert negative values to positive indices. However, the only check that the converted index is now valid is only present in debug builds. If the `DCHECK` does not tri... | https://nvd.nist.gov/vuln/detail/CVE-2020-15207 |
197,717 | linux | ce40cd3fc7fa40a6119e5fe6c0f2bc0eb4541009 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/ce40cd3fc7fa40a6119e5fe6c0f2bc0eb4541009 | kvm: x86: fix kvm_apic_has_events to check for NULL pointer
Malicious (or egregiously buggy) userspace can trigger it, but it
should never happen in normal operation.
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com> | 1 | static inline bool kvm_apic_has_events(struct kvm_vcpu *vcpu)
{
return vcpu->arch.apic->pending_events;
} | 304,816,238,329,090,500,000,000,000,000,000,000,000 | lapic.h | 328,029,734,494,475,900,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2015-4692 | The kvm_apic_has_events function in arch/x86/kvm/lapic.h in the Linux kernel through 4.1.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by leveraging /dev/kvm access for an ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2015-4692 |
262,785 | linux | ce40cd3fc7fa40a6119e5fe6c0f2bc0eb4541009 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/ce40cd3fc7fa40a6119e5fe6c0f2bc0eb4541009 | kvm: x86: fix kvm_apic_has_events to check for NULL pointer
Malicious (or egregiously buggy) userspace can trigger it, but it
should never happen in normal operation.
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com> | 0 | static inline bool kvm_apic_has_events(struct kvm_vcpu *vcpu)
{
return kvm_vcpu_has_lapic(vcpu) && vcpu->arch.apic->pending_events;
} | 303,930,253,695,186,800,000,000,000,000,000,000,000 | lapic.h | 4,504,020,028,775,507,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2015-4692 | The kvm_apic_has_events function in arch/x86/kvm/lapic.h in the Linux kernel through 4.1.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by leveraging /dev/kvm access for an ioctl call. | https://nvd.nist.gov/vuln/detail/CVE-2015-4692 |
197,724 | opencv | 7bbe1a53cfc097b82b1589f7915a2120de39274c | https://github.com/opencv/opencv | https://github.com/opencv/opencv/commit/7bbe1a53cfc097b82b1589f7915a2120de39274c | imgcodecs(pxm): fix memcpy size | 1 | bool PxMDecoder::readData( Mat& img )
{
int color = img.channels() > 1;
uchar* data = img.ptr();
PaletteEntry palette[256];
bool result = false;
const int bit_depth = CV_ELEM_SIZE1(m_type)*8;
const int src_pitch = divUp(m_width*m_bpp*(bit_depth/8), 8);
int nch = CV_MAT_CN(m_type);
int... | 90,021,654,730,776,400,000,000,000,000,000,000,000 | grfmt_pxm.cpp | 39,159,401,575,500,720,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2017-17760 | OpenCV 3.3.1 has a Buffer Overflow in the cv::PxMDecoder::readData function in grfmt_pxm.cpp, because an incorrect size value is used. | https://nvd.nist.gov/vuln/detail/CVE-2017-17760 |
263,026 | opencv | 7bbe1a53cfc097b82b1589f7915a2120de39274c | https://github.com/opencv/opencv | https://github.com/opencv/opencv/commit/7bbe1a53cfc097b82b1589f7915a2120de39274c | imgcodecs(pxm): fix memcpy size | 0 | bool PxMDecoder::readData( Mat& img )
{
int color = img.channels() > 1;
uchar* data = img.ptr();
PaletteEntry palette[256];
bool result = false;
const int bit_depth = CV_ELEM_SIZE1(m_type)*8;
const int src_pitch = divUp(m_width*m_bpp*(bit_depth/8), 8);
int nch = CV_MAT_CN(m_type);
int... | 66,850,547,100,001,750,000,000,000,000,000,000,000 | grfmt_pxm.cpp | 144,645,702,852,848,550,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2017-17760 | OpenCV 3.3.1 has a Buffer Overflow in the cv::PxMDecoder::readData function in grfmt_pxm.cpp, because an incorrect size value is used. | https://nvd.nist.gov/vuln/detail/CVE-2017-17760 |
197,770 | deepin-clone | e079f3e2712b4f8c28e3e63e71ba1a1f90fce1ab | https://github.com/linuxdeepin/deepin-clone | https://github.com/linuxdeepin/deepin-clone/commit/e079f3e2712b4f8c28e3e63e71ba1a1f90fce1ab | fix: Do not use the "/tmp" directory
https://github.com/linuxdeepin/deepin-clone/issues/16
https://bugzilla.opensuse.org/show_bug.cgi?id=1130388 | 1 | QString Helper::temporaryMountDevice(const QString &device, const QString &name, bool readonly)
{
QString mount_point = mountPoint(device);
if (!mount_point.isEmpty())
return mount_point;
mount_point = "%1/.%2/mount/%3";
const QStringList &tmp_paths = QStandardPaths::standardLocations(QStandar... | 229,537,522,612,288,320,000,000,000,000,000,000,000 | helper.cpp | 231,175,827,715,282,260,000,000,000,000,000,000,000 | [
"CWE-61"
] | CVE-2019-13227 | In GUI mode, deepin-clone before 1.1.3 creates a log file at the fixed path /tmp/.deepin-clone.log as root, and follows symlinks there. An unprivileged user can prepare a symlink attack there to create or overwrite files in arbitrary file system locations. The content is not attacker controlled. | https://nvd.nist.gov/vuln/detail/CVE-2019-13227 |
263,793 | deepin-clone | e079f3e2712b4f8c28e3e63e71ba1a1f90fce1ab | https://github.com/linuxdeepin/deepin-clone | https://github.com/linuxdeepin/deepin-clone/commit/e079f3e2712b4f8c28e3e63e71ba1a1f90fce1ab | fix: Do not use the "/tmp" directory
https://github.com/linuxdeepin/deepin-clone/issues/16
https://bugzilla.opensuse.org/show_bug.cgi?id=1130388 | 0 | QString Helper::temporaryMountDevice(const QString &device, const QString &name, bool readonly)
{
QString mount_point = mountPoint(device);
if (!mount_point.isEmpty())
return mount_point;
mount_point = "%1/.%2/mount/%3";
const QStringList &tmp_paths = QStandardPaths::standardLocations(QStandar... | 135,100,914,563,799,930,000,000,000,000,000,000,000 | helper.cpp | 293,129,917,170,309,270,000,000,000,000,000,000,000 | [
"CWE-61"
] | CVE-2019-13227 | In GUI mode, deepin-clone before 1.1.3 creates a log file at the fixed path /tmp/.deepin-clone.log as root, and follows symlinks there. An unprivileged user can prepare a symlink attack there to create or overwrite files in arbitrary file system locations. The content is not attacker controlled. | https://nvd.nist.gov/vuln/detail/CVE-2019-13227 |
197,771 | deepin-clone | e079f3e2712b4f8c28e3e63e71ba1a1f90fce1ab | https://github.com/linuxdeepin/deepin-clone | https://github.com/linuxdeepin/deepin-clone/commit/e079f3e2712b4f8c28e3e63e71ba1a1f90fce1ab | fix: Do not use the "/tmp" directory
https://github.com/linuxdeepin/deepin-clone/issues/16
https://bugzilla.opensuse.org/show_bug.cgi?id=1130388 | 1 | bool BootDoctor::fix(const QString &partDevice)
{
m_lastErrorString.clear();
DDevicePartInfo part_info(partDevice);
const QString part_old_uuid = part_info.uuid();
if (Helper::processExec("lsblk -s -d -n -o UUID") == 0) {
if (Helper::lastProcessStandardOutput().contains(part_old_uuid.toLatin1(... | 137,812,368,379,736,330,000,000,000,000,000,000,000 | bootdoctor.cpp | 259,336,322,687,552,260,000,000,000,000,000,000,000 | [
"CWE-61"
] | CVE-2019-13227 | In GUI mode, deepin-clone before 1.1.3 creates a log file at the fixed path /tmp/.deepin-clone.log as root, and follows symlinks there. An unprivileged user can prepare a symlink attack there to create or overwrite files in arbitrary file system locations. The content is not attacker controlled. | https://nvd.nist.gov/vuln/detail/CVE-2019-13227 |
263,811 | deepin-clone | e079f3e2712b4f8c28e3e63e71ba1a1f90fce1ab | https://github.com/linuxdeepin/deepin-clone | https://github.com/linuxdeepin/deepin-clone/commit/e079f3e2712b4f8c28e3e63e71ba1a1f90fce1ab | fix: Do not use the "/tmp" directory
https://github.com/linuxdeepin/deepin-clone/issues/16
https://bugzilla.opensuse.org/show_bug.cgi?id=1130388 | 0 | bool BootDoctor::fix(const QString &partDevice)
{
m_lastErrorString.clear();
DDevicePartInfo part_info(partDevice);
const QString part_old_uuid = part_info.uuid();
if (Helper::processExec("lsblk -s -d -n -o UUID") == 0) {
if (Helper::lastProcessStandardOutput().contains(part_old_uuid.toLatin1(... | 103,345,989,421,805,010,000,000,000,000,000,000,000 | bootdoctor.cpp | 262,993,647,621,593,150,000,000,000,000,000,000,000 | [
"CWE-61"
] | CVE-2019-13227 | In GUI mode, deepin-clone before 1.1.3 creates a log file at the fixed path /tmp/.deepin-clone.log as root, and follows symlinks there. An unprivileged user can prepare a symlink attack there to create or overwrite files in arbitrary file system locations. The content is not attacker controlled. | https://nvd.nist.gov/vuln/detail/CVE-2019-13227 |
197,772 | deepin-clone | e079f3e2712b4f8c28e3e63e71ba1a1f90fce1ab | https://github.com/linuxdeepin/deepin-clone | https://github.com/linuxdeepin/deepin-clone/commit/e079f3e2712b4f8c28e3e63e71ba1a1f90fce1ab | fix: Do not use the "/tmp" directory
https://github.com/linuxdeepin/deepin-clone/issues/16
https://bugzilla.opensuse.org/show_bug.cgi?id=1130388 | 1 | bool Helper::getPartitionSizeInfo(const QString &partDevice, qint64 *used, qint64 *free, int *blockSize)
{
QProcess process;
QStringList env_list = QProcess::systemEnvironment();
env_list.append("LANG=C");
process.setEnvironment(env_list);
if (Helper::isMounted(partDevice)) {
process.start... | 167,478,247,065,967,900,000,000,000,000,000,000,000 | helper.cpp | 231,175,827,715,282,260,000,000,000,000,000,000,000 | [
"CWE-61"
] | CVE-2019-13227 | In GUI mode, deepin-clone before 1.1.3 creates a log file at the fixed path /tmp/.deepin-clone.log as root, and follows symlinks there. An unprivileged user can prepare a symlink attack there to create or overwrite files in arbitrary file system locations. The content is not attacker controlled. | https://nvd.nist.gov/vuln/detail/CVE-2019-13227 |
263,816 | deepin-clone | e079f3e2712b4f8c28e3e63e71ba1a1f90fce1ab | https://github.com/linuxdeepin/deepin-clone | https://github.com/linuxdeepin/deepin-clone/commit/e079f3e2712b4f8c28e3e63e71ba1a1f90fce1ab | fix: Do not use the "/tmp" directory
https://github.com/linuxdeepin/deepin-clone/issues/16
https://bugzilla.opensuse.org/show_bug.cgi?id=1130388 | 0 | bool Helper::getPartitionSizeInfo(const QString &partDevice, qint64 *used, qint64 *free, int *blockSize)
{
QProcess process;
QStringList env_list = QProcess::systemEnvironment();
env_list.append("LANG=C");
process.setEnvironment(env_list);
if (Helper::isMounted(partDevice)) {
process.start... | 218,409,291,674,521,480,000,000,000,000,000,000,000 | helper.cpp | 293,129,917,170,309,270,000,000,000,000,000,000,000 | [
"CWE-61"
] | CVE-2019-13227 | In GUI mode, deepin-clone before 1.1.3 creates a log file at the fixed path /tmp/.deepin-clone.log as root, and follows symlinks there. An unprivileged user can prepare a symlink attack there to create or overwrite files in arbitrary file system locations. The content is not attacker controlled. | https://nvd.nist.gov/vuln/detail/CVE-2019-13227 |
197,780 | ntopng | 30610bda60cbfc058f90a1c0a17d0e8f4516221a | https://github.com/ntop/ntopng | https://github.com/ntop/ntopng/commit/30610bda60cbfc058f90a1c0a17d0e8f4516221a | Added code to randomize values returned by rand() | 1 | HTTPserver::HTTPserver(const char *_docs_dir, const char *_scripts_dir) {
struct mg_callbacks callbacks;
static char ports[256], ssl_cert_path[MAX_PATH] = { 0 }, access_log_path[MAX_PATH] = { 0 };
const char *http_binding_addr = ntop->getPrefs()->get_http_binding_address();
const char *https_binding_addr = ntop... | 54,193,755,925,649,510,000,000,000,000,000,000,000 | HTTPserver.cpp | 224,519,242,937,859,700,000,000,000,000,000,000,000 | [
"CWE-284"
] | CVE-2018-12520 | An issue was discovered in ntopng 3.4 before 3.4.180617. The PRNG involved in the generation of session IDs is not seeded at program startup. This results in deterministic session IDs being allocated for active user sessions. An attacker with foreknowledge of the operating system and standard library in use by the host... | https://nvd.nist.gov/vuln/detail/CVE-2018-12520 |
264,063 | ntopng | 30610bda60cbfc058f90a1c0a17d0e8f4516221a | https://github.com/ntop/ntopng | https://github.com/ntop/ntopng/commit/30610bda60cbfc058f90a1c0a17d0e8f4516221a | Added code to randomize values returned by rand() | 0 | HTTPserver::HTTPserver(const char *_docs_dir, const char *_scripts_dir) {
struct mg_callbacks callbacks;
static char ports[256], ssl_cert_path[MAX_PATH] = { 0 }, access_log_path[MAX_PATH] = { 0 };
const char *http_binding_addr = ntop->getPrefs()->get_http_binding_address();
const char *https_binding_addr = ntop... | 314,489,935,151,334,800,000,000,000,000,000,000,000 | HTTPserver.cpp | 274,350,598,770,508,740,000,000,000,000,000,000,000 | [
"CWE-284"
] | CVE-2018-12520 | An issue was discovered in ntopng 3.4 before 3.4.180617. The PRNG involved in the generation of session IDs is not seeded at program startup. This results in deterministic session IDs being allocated for active user sessions. An attacker with foreknowledge of the operating system and standard library in use by the host... | https://nvd.nist.gov/vuln/detail/CVE-2018-12520 |
197,784 | ytnef | 22f8346c8d4f0020a40d9f258fdb3bfc097359cc | https://github.com/Yeraze/ytnef | https://github.com/Yeraze/ytnef/commit/22f8346c8d4f0020a40d9f258fdb3bfc097359cc | Added safety check for Compressed RTF Streams
You could potentially overflow the input pointer.
in response to #34 | 1 | BYTE *DecompressRTF(variableLength *p, int *size) {
BYTE *dst; // destination for uncompressed bytes
BYTE *src;
unsigned int in;
unsigned int out;
variableLength comp_Prebuf;
ULONG compressedSize, uncompressedSize, magic;
comp_Prebuf.size = strlen(RTF_PREBUF);
comp_Prebuf.data = calloc(comp_Prebuf.size... | 105,271,817,086,370,740,000,000,000,000,000,000,000 | ytnef.c | 168,485,647,867,116,590,000,000,000,000,000,000,000 | [
"CWE-22"
] | CVE-2017-6802 | An issue was discovered in ytnef before 1.9.2. There is a potential heap-based buffer over-read on incoming Compressed RTF Streams, related to DecompressRTF() in libytnef. | https://nvd.nist.gov/vuln/detail/CVE-2017-6802 |
264,082 | ytnef | 22f8346c8d4f0020a40d9f258fdb3bfc097359cc | https://github.com/Yeraze/ytnef | https://github.com/Yeraze/ytnef/commit/22f8346c8d4f0020a40d9f258fdb3bfc097359cc | Added safety check for Compressed RTF Streams
You could potentially overflow the input pointer.
in response to #34 | 0 | BYTE *DecompressRTF(variableLength *p, int *size) {
BYTE *dst; // destination for uncompressed bytes
BYTE *src;
unsigned int in;
unsigned int out;
variableLength comp_Prebuf;
ULONG compressedSize, uncompressedSize, magic;
comp_Prebuf.size = strlen(RTF_PREBUF);
comp_Prebuf.data = calloc(comp_Prebuf.size... | 145,166,241,803,981,530,000,000,000,000,000,000,000 | ytnef.c | 11,697,525,817,261,679,000,000,000,000,000,000,000 | [
"CWE-22"
] | CVE-2017-6802 | An issue was discovered in ytnef before 1.9.2. There is a potential heap-based buffer over-read on incoming Compressed RTF Streams, related to DecompressRTF() in libytnef. | https://nvd.nist.gov/vuln/detail/CVE-2017-6802 |
197,790 | upx | e2f60adc95334f47e286838dac33160819c5d74d | https://github.com/upx/upx | https://github.com/upx/upx/commit/e2f60adc95334f47e286838dac33160819c5d74d | Detect 0==DT_SYMTAB in invert_pt_dynamic()
https://github.com/upx/upx/issues/333
modified: p_lx_elf.cpp | 1 | PackLinuxElf32::invert_pt_dynamic(Elf32_Dyn const *dynp)
{
if (dt_table[Elf32_Dyn::DT_NULL]) {
return; // not 1st time; do not change upx_dt_init
}
Elf32_Dyn const *const dynp0 = dynp;
unsigned ndx = 1+ 0;
if (dynp)
for (; ; ++ndx, ++dynp) {
unsigned const d_tag = get_te32(&dynp... | 168,742,274,543,458,070,000,000,000,000,000,000,000 | p_lx_elf.cpp | 80,639,365,896,673,115,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2020-27787 | A Segmentaation fault was found in UPX in invert_pt_dynamic() function in p_lx_elf.cpp. An attacker with a crafted input file allows invalid memory address access that could lead to a denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2020-27787 |
264,156 | upx | e2f60adc95334f47e286838dac33160819c5d74d | https://github.com/upx/upx | https://github.com/upx/upx/commit/e2f60adc95334f47e286838dac33160819c5d74d | Detect 0==DT_SYMTAB in invert_pt_dynamic()
https://github.com/upx/upx/issues/333
modified: p_lx_elf.cpp | 0 | PackLinuxElf32::invert_pt_dynamic(Elf32_Dyn const *dynp)
{
if (dt_table[Elf32_Dyn::DT_NULL]) {
return; // not 1st time; do not change upx_dt_init
}
Elf32_Dyn const *const dynp0 = dynp;
unsigned ndx = 1+ 0;
if (dynp)
for (; ; ++ndx, ++dynp) {
unsigned const d_tag = get_te32(&dynp... | 27,151,378,830,150,997,000,000,000,000,000,000,000 | p_lx_elf.cpp | 230,802,678,723,023,260,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2020-27787 | A Segmentaation fault was found in UPX in invert_pt_dynamic() function in p_lx_elf.cpp. An attacker with a crafted input file allows invalid memory address access that could lead to a denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2020-27787 |
197,791 | upx | e2f60adc95334f47e286838dac33160819c5d74d | https://github.com/upx/upx | https://github.com/upx/upx/commit/e2f60adc95334f47e286838dac33160819c5d74d | Detect 0==DT_SYMTAB in invert_pt_dynamic()
https://github.com/upx/upx/issues/333
modified: p_lx_elf.cpp | 1 | PackLinuxElf64::invert_pt_dynamic(Elf64_Dyn const *dynp)
{
if (dt_table[Elf64_Dyn::DT_NULL]) {
return; // not 1st time; do not change upx_dt_init
}
Elf64_Dyn const *const dynp0 = dynp;
unsigned ndx = 1+ 0;
if (dynp)
for (; ; ++ndx, ++dynp) {
upx_uint64_t const d_tag = get_te64(&... | 159,162,397,024,130,120,000,000,000,000,000,000,000 | p_lx_elf.cpp | 80,639,365,896,673,115,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2020-27787 | A Segmentaation fault was found in UPX in invert_pt_dynamic() function in p_lx_elf.cpp. An attacker with a crafted input file allows invalid memory address access that could lead to a denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2020-27787 |
264,155 | upx | e2f60adc95334f47e286838dac33160819c5d74d | https://github.com/upx/upx | https://github.com/upx/upx/commit/e2f60adc95334f47e286838dac33160819c5d74d | Detect 0==DT_SYMTAB in invert_pt_dynamic()
https://github.com/upx/upx/issues/333
modified: p_lx_elf.cpp | 0 | PackLinuxElf64::invert_pt_dynamic(Elf64_Dyn const *dynp)
{
if (dt_table[Elf64_Dyn::DT_NULL]) {
return; // not 1st time; do not change upx_dt_init
}
Elf64_Dyn const *const dynp0 = dynp;
unsigned ndx = 1+ 0;
if (dynp)
for (; ; ++ndx, ++dynp) {
upx_uint64_t const d_tag = get_te64(&... | 339,264,645,758,466,860,000,000,000,000,000,000,000 | p_lx_elf.cpp | 230,802,678,723,023,260,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2020-27787 | A Segmentaation fault was found in UPX in invert_pt_dynamic() function in p_lx_elf.cpp. An attacker with a crafted input file allows invalid memory address access that could lead to a denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2020-27787 |
197,810 | lrzip | 5faf80cd53ecfd16b636d653483144cd12004f46 | https://github.com/ckolivas/lrzip | https://github.com/ckolivas/lrzip/commit/5faf80cd53ecfd16b636d653483144cd12004f46 | Fix control->suffix being deallocated as heap memory as reported by Pietro Borrello. | 1 | bool initialise_control(rzip_control *control)
{
time_t now_t, tdiff;
char localeptr[] = "./", *eptr; /* for environment */
size_t len;
memset(control, 0, sizeof(rzip_control));
control->msgout = stderr;
control->msgerr = stderr;
register_outputfile(control, control->msgout);
control->flags = FLAG_SHOW_PROGRES... | 139,702,688,972,184,770,000,000,000,000,000,000,000 | lrzip.c | 265,004,371,865,348,300,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2022-28044 | Irzip v0.640 was discovered to contain a heap memory corruption via the component lrzip.c:initialise_control. | https://nvd.nist.gov/vuln/detail/CVE-2022-28044 |
264,528 | lrzip | 5faf80cd53ecfd16b636d653483144cd12004f46 | https://github.com/ckolivas/lrzip | https://github.com/ckolivas/lrzip/commit/5faf80cd53ecfd16b636d653483144cd12004f46 | Fix control->suffix being deallocated as heap memory as reported by Pietro Borrello. | 0 | bool initialise_control(rzip_control *control)
{
time_t now_t, tdiff;
char localeptr[] = "./", *eptr; /* for environment */
size_t len;
memset(control, 0, sizeof(rzip_control));
control->msgout = stderr;
control->msgerr = stderr;
register_outputfile(control, control->msgout);
control->flags = FLAG_SHOW_PROGRES... | 192,762,443,616,812,900,000,000,000,000,000,000,000 | lrzip.c | 332,267,380,175,190,360,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2022-28044 | Irzip v0.640 was discovered to contain a heap memory corruption via the component lrzip.c:initialise_control. | https://nvd.nist.gov/vuln/detail/CVE-2022-28044 |
197,839 | gpac | b8f8b202d4fc23eb0ab4ce71ae96536ca6f5d3f8 | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/b8f8b202d4fc23eb0ab4ce71ae96536ca6f5d3f8 | fixed #1757 | 1 |
GF_Err trak_box_size(GF_Box *s)
{
u32 pos=0;
GF_TrackBox *ptr = (GF_TrackBox *)s;
if (ptr->sample_encryption && ptr->sample_encryption->load_needed) {
GF_Err e = senc_Parse(ptr->moov->mov->movieFileMap->bs, ptr, NULL, ptr->sample_encryption);
if (e) return e;
}
gf_isom_check_position(s, (GF_Box *)ptr->Heade... | 216,523,154,065,014,800,000,000,000,000,000,000,000 | box_code_base.c | 83,734,944,677,882,145,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2021-32135 | The trak_box_size function in GPAC 1.0.1 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command. | https://nvd.nist.gov/vuln/detail/CVE-2021-32135 |
264,781 | gpac | b8f8b202d4fc23eb0ab4ce71ae96536ca6f5d3f8 | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/b8f8b202d4fc23eb0ab4ce71ae96536ca6f5d3f8 | fixed #1757 | 0 |
GF_Err trak_box_size(GF_Box *s)
{
u32 pos=0;
GF_TrackBox *ptr = (GF_TrackBox *)s;
if (ptr->sample_encryption && ptr->sample_encryption->load_needed) {
if (!ptr->moov || !!ptr->moov->mov || !ptr->moov->mov->movieFileMap)
return GF_ISOM_INVALID_FILE;
GF_Err e = senc_Parse(ptr->moov->mov->movieFileMap->bs, ptr... | 126,935,338,137,200,140,000,000,000,000,000,000,000 | box_code_base.c | 284,814,802,588,874,630,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2021-32135 | The trak_box_size function in GPAC 1.0.1 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command. | https://nvd.nist.gov/vuln/detail/CVE-2021-32135 |
197,904 | ImageMagick | a33f7498f9052b50e8fe8c8422a11ba84474cb42 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/a33f7498f9052b50e8fe8c8422a11ba84474cb42 | https://github.com/ImageMagick/ImageMagick/issues/551 | 1 | static Image *ReadDCMImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
#define ThrowDCMException(exception,message) \
{ \
if (data != (unsigned char *) NULL) \
data=(unsigned char *) RelinquishMagickMemory(data); \
if (stream_info != (DCMStreamInfo *) NULL) \
stream_info=(DCMStreamInfo *) Relinq... | 175,379,189,022,605,700,000,000,000,000,000,000,000 | dcm.c | 177,606,615,657,733,660,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2017-12644 | ImageMagick 7.0.6-1 has a memory leak vulnerability in ReadDCMImage in coders\dcm.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-12644 |
265,496 | ImageMagick | a33f7498f9052b50e8fe8c8422a11ba84474cb42 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/a33f7498f9052b50e8fe8c8422a11ba84474cb42 | https://github.com/ImageMagick/ImageMagick/issues/551 | 0 | static Image *ReadDCMImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
#define ThrowDCMException(exception,message) \
{ \
if (data != (unsigned char *) NULL) \
data=(unsigned char *) RelinquishMagickMemory(data); \
if (stream_info != (DCMStreamInfo *) NULL) \
stream_info=(DCMStreamInfo *) Relinq... | 76,022,737,936,981,620,000,000,000,000,000,000,000 | dcm.c | 28,315,763,789,189,824,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2017-12644 | ImageMagick 7.0.6-1 has a memory leak vulnerability in ReadDCMImage in coders\dcm.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-12644 |
197,911 | git | 9a6bbee8006c24b46a85d29e7b38cfa79e9ab21b | https://github.com/git/git | https://github.com/git/git/commit/9a6bbee8006c24b46a85d29e7b38cfa79e9ab21b | credential: avoid writing values with newlines
The credential protocol that we use to speak to helpers can't represent
values with newlines in them. This was an intentional design choice to
keep the protocol simple, since none of the values we pass should
generally have newlines.
However, if we _do_ encounter a newli... | 1 | static void credential_write_item(FILE *fp, const char *key, const char *value)
{
if (!value)
return;
fprintf(fp, "%s=%s\n", key, value);
} | 166,618,074,518,075,750,000,000,000,000,000,000,000 | credential.c | 224,003,697,457,701,130,000,000,000,000,000,000,000 | [
"CWE-61"
] | CVE-2020-5260 | Affected versions of Git have a vulnerability whereby Git can be tricked into sending private credentials to a host controlled by an attacker. Git uses external "credential helper" programs to store and retrieve passwords or other credentials from secure storage provided by the operating system. Specially-crafted URLs ... | https://nvd.nist.gov/vuln/detail/CVE-2020-5260 |
265,534 | git | 9a6bbee8006c24b46a85d29e7b38cfa79e9ab21b | https://github.com/git/git | https://github.com/git/git/commit/9a6bbee8006c24b46a85d29e7b38cfa79e9ab21b | credential: avoid writing values with newlines
The credential protocol that we use to speak to helpers can't represent
values with newlines in them. This was an intentional design choice to
keep the protocol simple, since none of the values we pass should
generally have newlines.
However, if we _do_ encounter a newli... | 0 | static void credential_write_item(FILE *fp, const char *key, const char *value)
{
if (!value)
return;
if (strchr(value, '\n'))
die("credential value for %s contains newline", key);
fprintf(fp, "%s=%s\n", key, value);
} | 150,285,164,564,301,070,000,000,000,000,000,000,000 | credential.c | 171,015,203,136,278,500,000,000,000,000,000,000,000 | [
"CWE-61"
] | CVE-2020-5260 | Affected versions of Git have a vulnerability whereby Git can be tricked into sending private credentials to a host controlled by an attacker. Git uses external "credential helper" programs to store and retrieve passwords or other credentials from secure storage provided by the operating system. Specially-crafted URLs ... | https://nvd.nist.gov/vuln/detail/CVE-2020-5260 |
197,917 | nDPI | b69177be2fbe01c2442239a61832c44e40136c05 | https://github.com/ntop/nDPI | https://github.com/ntop/nDPI/commit/b69177be2fbe01c2442239a61832c44e40136c05 | Adds bound check in oracle protocol
Found by oss-fuzz
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=21780 | 1 | void ndpi_search_oracle(struct ndpi_detection_module_struct *ndpi_struct, struct ndpi_flow_struct *flow)
{
struct ndpi_packet_struct *packet = &flow->packet;
u_int16_t dport = 0, sport = 0;
NDPI_LOG_DBG(ndpi_struct, "search ORACLE\n");
if(packet->tcp != NULL) {
sport = ntohs(packet->tcp->source), dport = ... | 281,684,134,061,809,580,000,000,000,000,000,000,000 | oracle.c | 165,027,917,166,327,220,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2020-15476 | In nDPI through 3.2, the Oracle protocol dissector has a heap-based buffer over-read in ndpi_search_oracle in lib/protocols/oracle.c. | https://nvd.nist.gov/vuln/detail/CVE-2020-15476 |
265,603 | nDPI | b69177be2fbe01c2442239a61832c44e40136c05 | https://github.com/ntop/nDPI | https://github.com/ntop/nDPI/commit/b69177be2fbe01c2442239a61832c44e40136c05 | Adds bound check in oracle protocol
Found by oss-fuzz
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=21780 | 0 | void ndpi_search_oracle(struct ndpi_detection_module_struct *ndpi_struct, struct ndpi_flow_struct *flow)
{
struct ndpi_packet_struct *packet = &flow->packet;
u_int16_t dport = 0, sport = 0;
NDPI_LOG_DBG(ndpi_struct, "search ORACLE\n");
if(packet->tcp != NULL) {
sport = ntohs(packet->tcp->source), dport = ... | 79,839,375,878,257,920,000,000,000,000,000,000,000 | oracle.c | 9,130,836,932,672,496,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2020-15476 | In nDPI through 3.2, the Oracle protocol dissector has a heap-based buffer over-read in ndpi_search_oracle in lib/protocols/oracle.c. | https://nvd.nist.gov/vuln/detail/CVE-2020-15476 |
197,947 | ImageMagick | 8c35502217c1879cb8257c617007282eee3fe1cc | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/8c35502217c1879cb8257c617007282eee3fe1cc | Added missing return to avoid use after free. | 1 | void Magick::Image::read(MagickCore::Image *image,
MagickCore::ExceptionInfo *exceptionInfo)
{
// Ensure that multiple image frames were not read.
if (image != (MagickCore::Image *) NULL &&
image->next != (MagickCore::Image *) NULL)
{
MagickCore::Image
*next;
// Destroy any extra im... | 128,385,256,042,772,350,000,000,000,000,000,000,000 | Image.cpp | 59,346,041,863,091,020,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2017-17499 | ImageMagick before 6.9.9-24 and 7.x before 7.0.7-12 has a use-after-free in Magick::Image::read in Magick++/lib/Image.cpp. | https://nvd.nist.gov/vuln/detail/CVE-2017-17499 |
266,361 | ImageMagick | 8c35502217c1879cb8257c617007282eee3fe1cc | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/8c35502217c1879cb8257c617007282eee3fe1cc | Added missing return to avoid use after free. | 0 | void Magick::Image::read(MagickCore::Image *image,
MagickCore::ExceptionInfo *exceptionInfo)
{
// Ensure that multiple image frames were not read.
if (image != (MagickCore::Image *) NULL &&
image->next != (MagickCore::Image *) NULL)
{
MagickCore::Image
*next;
// Destroy any extra im... | 240,767,525,039,625,000,000,000,000,000,000,000,000 | Image.cpp | 150,845,168,494,242,220,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2017-17499 | ImageMagick before 6.9.9-24 and 7.x before 7.0.7-12 has a use-after-free in Magick::Image::read in Magick++/lib/Image.cpp. | https://nvd.nist.gov/vuln/detail/CVE-2017-17499 |
197,961 | xrootd | befa2e627a5a33a38c92db3e57c07d8246a24acf | https://github.com/xrootd/xrootd | https://github.com/xrootd/xrootd/commit/befa2e627a5a33a38c92db3e57c07d8246a24acf | secgsi: do not build/package libXrdSecgsiGMAPLDAP-4.so
The way the LDAP query is implemented may represent a security threat.
Any related building and packaging reference is removed.
The code is left in place (for the time being) to remind its functionality
in the case a sanitized version is required. | 1 | void DefaultEnv::Initialize()
{
sLog = new Log();
SetUpLog();
sEnv = new DefaultEnv();
sForkHandler = new ForkHandler();
sFileTimer = new FileTimer();
sPlugInManager = new PlugInManager();
sPlugInManager->ProcessEnvironmentSettings();
sForkHandler->Registe... | 271,962,138,013,995,260,000,000,000,000,000,000,000 | XrdClDefaultEnv.cc | 257,734,601,399,227,400,000,000,000,000,000,000,000 | [
"CWE-78"
] | CVE-2017-1000215 | ROOT xrootd version 4.6.0 and below is vulnerable to an unauthenticated shell command injection resulting in remote code execution | https://nvd.nist.gov/vuln/detail/CVE-2017-1000215 |
266,951 | xrootd | befa2e627a5a33a38c92db3e57c07d8246a24acf | https://github.com/xrootd/xrootd | https://github.com/xrootd/xrootd/commit/befa2e627a5a33a38c92db3e57c07d8246a24acf | secgsi: do not build/package libXrdSecgsiGMAPLDAP-4.so
The way the LDAP query is implemented may represent a security threat.
Any related building and packaging reference is removed.
The code is left in place (for the time being) to remind its functionality
in the case a sanitized version is required. | 0 | void DefaultEnv::Initialize()
{
sLog = new Log();
SetUpLog();
sEnv = new DefaultEnv();
sForkHandler = new ForkHandler();
sFileTimer = new FileTimer();
sPlugInManager = new PlugInManager();
sPlugInManager->ProcessEnvironmentSettings();
sForkHandler->Registe... | 248,223,613,231,227,360,000,000,000,000,000,000,000 | XrdClDefaultEnv.cc | 27,527,107,028,920,280,000,000,000,000,000,000,000 | [
"CWE-78"
] | CVE-2017-1000215 | ROOT xrootd version 4.6.0 and below is vulnerable to an unauthenticated shell command injection resulting in remote code execution | https://nvd.nist.gov/vuln/detail/CVE-2017-1000215 |
197,991 | GameNetworkingSockets | bea84e2844b647532a9b7fbc3a6a8989d66e49e3 | https://github.com/ValveSoftware/GameNetworkingSockets | https://github.com/ValveSoftware/GameNetworkingSockets/commit/bea84e2844b647532a9b7fbc3a6a8989d66e49e3 | Check if output buffer is too small.
It really seems like libsodium (whose entire purpose is to make crypto
idiot-proof) making me mess with these details is a flaw in the API design.
Also, correct Hungarian. | 1 | bool AES_GCM_DecryptContext::Decrypt(
const void *pEncryptedDataAndTag, size_t cbEncryptedDataAndTag,
const void *pIV,
void *pPlaintextData, uint32 *pcbPlaintextData,
const void *pAdditionalAuthenticationData, size_t cbAuthenticationData
) {
unsigned long long pcbPlaintextData_longlong;
const int nDecryptR... | 78,921,504,189,247,940,000,000,000,000,000,000,000 | crypto_libsodium.cpp | 68,020,576,512,198,760,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2020-6018 | Valve's Game Networking Sockets prior to version v1.2.0 improperly handles long encrypted messages in function AES_GCM_DecryptContext::Decrypt() when compiled using libsodium, leading to a Stack-Based Buffer Overflow and resulting in a memory corruption and possibly even a remote code execution. | https://nvd.nist.gov/vuln/detail/CVE-2020-6018 |
267,850 | GameNetworkingSockets | bea84e2844b647532a9b7fbc3a6a8989d66e49e3 | https://github.com/ValveSoftware/GameNetworkingSockets | https://github.com/ValveSoftware/GameNetworkingSockets/commit/bea84e2844b647532a9b7fbc3a6a8989d66e49e3 | Check if output buffer is too small.
It really seems like libsodium (whose entire purpose is to make crypto
idiot-proof) making me mess with these details is a flaw in the API design.
Also, correct Hungarian. | 0 | bool AES_GCM_DecryptContext::Decrypt(
const void *pEncryptedDataAndTag, size_t cbEncryptedDataAndTag,
const void *pIV,
void *pPlaintextData, uint32 *pcbPlaintextData,
const void *pAdditionalAuthenticationData, size_t cbAuthenticationData
) {
// Make sure caller's buffer is big enough to hold the result
if ( cbEnc... | 331,949,284,797,609,460,000,000,000,000,000,000,000 | crypto_libsodium.cpp | 234,023,748,272,473,240,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2020-6018 | Valve's Game Networking Sockets prior to version v1.2.0 improperly handles long encrypted messages in function AES_GCM_DecryptContext::Decrypt() when compiled using libsodium, leading to a Stack-Based Buffer Overflow and resulting in a memory corruption and possibly even a remote code execution. | https://nvd.nist.gov/vuln/detail/CVE-2020-6018 |
198,008 | tensorflow | 8b5b9dc96666a3a5d27fad7179ff215e3b74b67c | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/8b5b9dc96666a3a5d27fad7179ff215e3b74b67c | Completely rewrite `GetMatchingPaths`.
The current parallel implementation is too complex (lambda inside lambda, two levels of parallelism) and has a read outside of bounds issue.
The new implementation cleans up artifacts from the previous implementations that were left in the code as it evolves. We add multiple hel... | 1 | Status GetMatchingPaths(FileSystem* fs, Env* env, const string& pattern,
std::vector<string>* results) {
results->clear();
if (pattern.empty()) {
return Status::OK();
}
string fixed_prefix = pattern.substr(0, pattern.find_first_of("*?[\\"));
string eval_pattern = pattern;
string... | 220,271,922,948,681,900,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2020-26269 | In TensorFlow release candidate versions 2.4.0rc*, the general implementation for matching filesystem paths to globbing pattern is vulnerable to an access out of bounds of the array holding the directories. There are multiple invariants and preconditions that are assumed by the parallel implementation of GetMatchingPat... | https://nvd.nist.gov/vuln/detail/CVE-2020-26269 |
267,944 | tensorflow | 8b5b9dc96666a3a5d27fad7179ff215e3b74b67c | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/8b5b9dc96666a3a5d27fad7179ff215e3b74b67c | Completely rewrite `GetMatchingPaths`.
The current parallel implementation is too complex (lambda inside lambda, two levels of parallelism) and has a read outside of bounds issue.
The new implementation cleans up artifacts from the previous implementations that were left in the code as it evolves. We add multiple hel... | 0 | Status GetMatchingPaths(FileSystem* fs, Env* env, const string& pattern,
std::vector<string>* results) {
// Check that `fs`, `env` and `results` are non-null.
if (fs == nullptr || env == nullptr || results == nullptr) {
return Status(tensorflow::error::INVALID_ARGUMENT,
... | 170,027,147,149,985,960,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2020-26269 | In TensorFlow release candidate versions 2.4.0rc*, the general implementation for matching filesystem paths to globbing pattern is vulnerable to an access out of bounds of the array holding the directories. There are multiple invariants and preconditions that are assumed by the parallel implementation of GetMatchingPat... | https://nvd.nist.gov/vuln/detail/CVE-2020-26269 |
198,120 | php-src | 28022c9b1fd937436ab67bb3d61f652c108baf96 | https://github.com/php/php-src | https://github.com/php/php-src/commit/28022c9b1fd937436ab67bb3d61f652c108baf96 | Fix bug#72697 - select_colors write out-of-bounds
(cherry picked from commit b6f13a5ef9d6280cf984826a5de012a32c396cd4)
Conflicts:
ext/gd/gd.c | 1 | PHP_FUNCTION(imagetruecolortopalette)
{
zval *IM;
zend_bool dither;
zend_long ncolors;
gdImagePtr im;
if (zend_parse_parameters(ZEND_NUM_ARGS(), "rbl", &IM, &dither, &ncolors) == FAILURE) {
return;
}
if ((im = (gdImagePtr)zend_fetch_resource(Z_RES_P(IM), "Image", le_gd)) == NULL) {
RETURN_FALSE;
}
if (... | 282,053,410,692,908,480,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2016-7126 | The imagetruecolortopalette function in ext/gd/gd.c in PHP before 5.6.25 and 7.x before 7.0.10 does not properly validate the number of colors, which allows remote attackers to cause a denial of service (select_colors allocation error and out-of-bounds write) or possibly have unspecified other impact via a large value ... | https://nvd.nist.gov/vuln/detail/CVE-2016-7126 |
269,481 | php-src | 28022c9b1fd937436ab67bb3d61f652c108baf96 | https://github.com/php/php-src | https://github.com/php/php-src/commit/28022c9b1fd937436ab67bb3d61f652c108baf96 | Fix bug#72697 - select_colors write out-of-bounds
(cherry picked from commit b6f13a5ef9d6280cf984826a5de012a32c396cd4)
Conflicts:
ext/gd/gd.c | 0 | PHP_FUNCTION(imagetruecolortopalette)
{
zval *IM;
zend_bool dither;
zend_long ncolors;
gdImagePtr im;
if (zend_parse_parameters(ZEND_NUM_ARGS(), "rbl", &IM, &dither, &ncolors) == FAILURE) {
return;
}
if ((im = (gdImagePtr)zend_fetch_resource(Z_RES_P(IM), "Image", le_gd)) == NULL) {
RETURN_FALSE;
}
if (... | 91,091,358,277,684,000,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2016-7126 | The imagetruecolortopalette function in ext/gd/gd.c in PHP before 5.6.25 and 7.x before 7.0.10 does not properly validate the number of colors, which allows remote attackers to cause a denial of service (select_colors allocation error and out-of-bounds write) or possibly have unspecified other impact via a large value ... | https://nvd.nist.gov/vuln/detail/CVE-2016-7126 |
198,129 | tensorflow | 2c74674348a4708ced58ad6eb1b23354df8ee044 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/2c74674348a4708ced58ad6eb1b23354df8ee044 | Prevent division by 0
PiperOrigin-RevId: 370979352
Change-Id: Ic79191c316d986fc6072ecaebfec9d5f2b924d00 | 1 | TfLiteStatus ResizeOutputTensor(TfLiteContext* context,
BatchToSpaceNDContext* op_context) {
TfLiteIntArray* input_size = op_context->input->dims;
const int* block_shape = GetTensorData<int32>(op_context->block_shape);
const int* crops = GetTensorData<int32>(op_context->crops);
... | 20,578,090,947,293,235,000,000,000,000,000,000,000 | batch_to_space_nd.cc | 15,177,301,722,452,372,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2021-29593 | TensorFlow is an end-to-end open source platform for machine learning. The implementation of the `BatchToSpaceNd` TFLite operator is vulnerable to a division by zero error(https://github.com/tensorflow/tensorflow/blob/b5ed552fe55895aee8bd8b191f744a069957d18d/tensorflow/lite/kernels/batch_to_space_nd.cc#L81-L82). An att... | https://nvd.nist.gov/vuln/detail/CVE-2021-29593 |
269,641 | tensorflow | 2c74674348a4708ced58ad6eb1b23354df8ee044 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/2c74674348a4708ced58ad6eb1b23354df8ee044 | Prevent division by 0
PiperOrigin-RevId: 370979352
Change-Id: Ic79191c316d986fc6072ecaebfec9d5f2b924d00 | 0 | TfLiteStatus ResizeOutputTensor(TfLiteContext* context,
BatchToSpaceNDContext* op_context) {
TfLiteIntArray* input_size = op_context->input->dims;
const int* block_shape = GetTensorData<int32>(op_context->block_shape);
const int* crops = GetTensorData<int32>(op_context->crops);
... | 268,627,781,829,132,800,000,000,000,000,000,000,000 | batch_to_space_nd.cc | 253,283,157,447,018,300,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2021-29593 | TensorFlow is an end-to-end open source platform for machine learning. The implementation of the `BatchToSpaceNd` TFLite operator is vulnerable to a division by zero error(https://github.com/tensorflow/tensorflow/blob/b5ed552fe55895aee8bd8b191f744a069957d18d/tensorflow/lite/kernels/batch_to_space_nd.cc#L81-L82). An att... | https://nvd.nist.gov/vuln/detail/CVE-2021-29593 |
198,156 | wangle | 3b17ba10a82c71e7808760e027ac6af687e06074 | https://github.com/facebook/wangle | https://github.com/facebook/wangle/commit/3b17ba10a82c71e7808760e027ac6af687e06074 | AcceptRoutingHandler should not assume a folly::AsyncSocket
Summary:
There is no reason to perform a cast to folly::AsyncSocket, when all of the
required behavior is in folly::AsyncTransportWrapper.
CVE-2019-3554
Reviewed By: avasylev
Differential Revision: D13599212
fbshipit-source-id: 3bb5475fe464c04cf5c04115f34... | 1 | void AcceptRoutingHandler<Pipeline, R>::onRoutingData(
uint64_t connId,
typename RoutingDataHandler<R>::RoutingData& routingData) {
// Get the routing pipeline corresponding to this connection
auto routingPipelineIter = routingPipelines_.find(connId);
if (routingPipelineIter == routingPipelines_.end()) {
... | 322,217,713,708,264,300,000,000,000,000,000,000,000 | AcceptRoutingHandler-inl.h | 279,450,957,089,156,860,000,000,000,000,000,000,000 | [
"CWE-241"
] | CVE-2019-3554 | Wangle's AcceptRoutingHandler incorrectly casts a socket when accepting a TLS 1.3 connection, leading to a potential denial of service attack against systems accepting such connections. This affects versions of Wangle prior to v2019.01.14.00 | https://nvd.nist.gov/vuln/detail/CVE-2019-3554 |
269,922 | wangle | 3b17ba10a82c71e7808760e027ac6af687e06074 | https://github.com/facebook/wangle | https://github.com/facebook/wangle/commit/3b17ba10a82c71e7808760e027ac6af687e06074 | AcceptRoutingHandler should not assume a folly::AsyncSocket
Summary:
There is no reason to perform a cast to folly::AsyncSocket, when all of the
required behavior is in folly::AsyncTransportWrapper.
CVE-2019-3554
Reviewed By: avasylev
Differential Revision: D13599212
fbshipit-source-id: 3bb5475fe464c04cf5c04115f34... | 0 | void AcceptRoutingHandler<Pipeline, R>::onRoutingData(
uint64_t connId,
typename RoutingDataHandler<R>::RoutingData& routingData) {
// Get the routing pipeline corresponding to this connection
auto routingPipelineIter = routingPipelines_.find(connId);
if (routingPipelineIter == routingPipelines_.end()) {
... | 117,774,277,179,739,760,000,000,000,000,000,000,000 | AcceptRoutingHandler-inl.h | 189,275,649,960,254,400,000,000,000,000,000,000,000 | [
"CWE-241"
] | CVE-2019-3554 | Wangle's AcceptRoutingHandler incorrectly casts a socket when accepting a TLS 1.3 connection, leading to a potential denial of service attack against systems accepting such connections. This affects versions of Wangle prior to v2019.01.14.00 | https://nvd.nist.gov/vuln/detail/CVE-2019-3554 |
198,157 | hermes | 2c7af7ec481ceffd0d14ce2d7c045e475fd71dc6 | https://github.com/facebook/hermes | https://github.com/facebook/hermes/commit/2c7af7ec481ceffd0d14ce2d7c045e475fd71dc6 | Fix backward branching in SwitchImm.
Summary:
`SwitchImm` can subtract from `ip`, but it was reading the offset
from a `uint32_t *` instead of `int32_t *`.
Change the type to the correct one.
Reviewed By: dulinriley
Differential Revision: D23114516
fbshipit-source-id: d4ddab94eb16dc1ce479590851eeb1ab428bd5d6 | 1 | CallResult<HermesValue> Interpreter::interpretFunction(
Runtime *runtime,
InterpreterState &state) {
// The interepter is re-entrant and also saves/restores its IP via the runtime
// whenever a call out is made (see the CAPTURE_IP_* macros). As such, failure
// to preserve the IP across calls to interpete... | 266,263,493,984,566,930,000,000,000,000,000,000,000 | Interpreter.cpp | 201,366,886,066,805,300,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2020-1913 | An Integer signedness error in the JavaScript Interpreter in Facebook Hermes prior to commit 2c7af7ec481ceffd0d14ce2d7c045e475fd71dc6 allows attackers to cause a denial of service attack or a potential RCE via crafted JavaScript. Note that this is only exploitable if the application using Hermes permits evaluation of u... | https://nvd.nist.gov/vuln/detail/CVE-2020-1913 |
269,925 | hermes | 2c7af7ec481ceffd0d14ce2d7c045e475fd71dc6 | https://github.com/facebook/hermes | https://github.com/facebook/hermes/commit/2c7af7ec481ceffd0d14ce2d7c045e475fd71dc6 | Fix backward branching in SwitchImm.
Summary:
`SwitchImm` can subtract from `ip`, but it was reading the offset
from a `uint32_t *` instead of `int32_t *`.
Change the type to the correct one.
Reviewed By: dulinriley
Differential Revision: D23114516
fbshipit-source-id: d4ddab94eb16dc1ce479590851eeb1ab428bd5d6 | 0 | CallResult<HermesValue> Interpreter::interpretFunction(
Runtime *runtime,
InterpreterState &state) {
// The interepter is re-entrant and also saves/restores its IP via the runtime
// whenever a call out is made (see the CAPTURE_IP_* macros). As such, failure
// to preserve the IP across calls to interpete... | 100,150,909,611,015,570,000,000,000,000,000,000,000 | Interpreter.cpp | 9,808,759,682,428,678,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2020-1913 | An Integer signedness error in the JavaScript Interpreter in Facebook Hermes prior to commit 2c7af7ec481ceffd0d14ce2d7c045e475fd71dc6 allows attackers to cause a denial of service attack or a potential RCE via crafted JavaScript. Note that this is only exploitable if the application using Hermes permits evaluation of u... | https://nvd.nist.gov/vuln/detail/CVE-2020-1913 |
198,167 | mongo | 035cf2afc04988b22cb67f4ebfd77e9b344cb6e0 | https://github.com/mongodb/mongo | https://github.com/mongodb/mongo/commit/035cf2afc04988b22cb67f4ebfd77e9b344cb6e0 | SERVER-25335 avoid group and other permissions when creating .dbshell history file | 1 | int linenoiseHistorySave(const char* filename) {
FILE* fp = fopen(filename, "wt");
if (fp == NULL) {
return -1;
}
for (int j = 0; j < historyLen; ++j) {
if (history[j][0] != '\0') {
fprintf(fp, "%s\n", history[j]);
}
}
fclose(fp);
return 0;
} | 210,282,334,155,301,120,000,000,000,000,000,000,000 | linenoise.cpp | 224,200,173,107,286,300,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2016-6494 | The client in MongoDB uses world-readable permissions on .dbshell history files, which might allow local users to obtain sensitive information by reading these files. | https://nvd.nist.gov/vuln/detail/CVE-2016-6494 |
270,107 | mongo | 035cf2afc04988b22cb67f4ebfd77e9b344cb6e0 | https://github.com/mongodb/mongo | https://github.com/mongodb/mongo/commit/035cf2afc04988b22cb67f4ebfd77e9b344cb6e0 | SERVER-25335 avoid group and other permissions when creating .dbshell history file | 0 | int linenoiseHistorySave(const char* filename) {
FILE* fp;
#if _POSIX_C_SOURCE >= 1 || _XOPEN_SOURCE || _POSIX_SOURCE
int fd = open(filename, O_CREAT, S_IRUSR | S_IWUSR);
if (fd == -1) {
// report errno somehow?
return -1;
}
fp = fdopen(fd, "wt");
#else
fp = fopen(filename, "wt")... | 114,344,261,318,973,140,000,000,000,000,000,000,000 | linenoise.cpp | 103,075,011,137,531,020,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2016-6494 | The client in MongoDB uses world-readable permissions on .dbshell history files, which might allow local users to obtain sensitive information by reading these files. | https://nvd.nist.gov/vuln/detail/CVE-2016-6494 |
198,171 | gpac | 1ab4860609f2e7a35634930571e7d0531297e090 | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/1ab4860609f2e7a35634930571e7d0531297e090 | fixed potential crash on PMT IOD parse - cf #1268 #1269 | 1 | static void gf_m2ts_process_pmt(GF_M2TS_Demuxer *ts, GF_M2TS_SECTION_ES *pmt, GF_List *sections, u8 table_id, u16 ex_table_id, u8 version_number, u8 last_section_number, u32 status)
{
u32 info_length, pos, desc_len, evt_type, nb_es,i;
u32 nb_sections;
u32 data_size;
u32 nb_hevc, nb_hevc_temp, nb_shvc, nb_shvc_temp,... | 153,347,248,677,185,840,000,000,000,000,000,000,000 | mpegts.c | 70,942,582,638,372,800,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-20630 | An issue was discovered in libgpac.a in GPAC before 0.8.0, as demonstrated by MP4Box. It contains a heap-based buffer over-read in BS_ReadByte (called from gf_bs_read_bit) in utils/bitstream.c that can cause a denial of service via a crafted MP4 file. | https://nvd.nist.gov/vuln/detail/CVE-2019-20630 |
270,121 | gpac | 1ab4860609f2e7a35634930571e7d0531297e090 | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/1ab4860609f2e7a35634930571e7d0531297e090 | fixed potential crash on PMT IOD parse - cf #1268 #1269 | 0 | static void gf_m2ts_process_pmt(GF_M2TS_Demuxer *ts, GF_M2TS_SECTION_ES *pmt, GF_List *sections, u8 table_id, u16 ex_table_id, u8 version_number, u8 last_section_number, u32 status)
{
u32 info_length, pos, desc_len, evt_type, nb_es,i;
u32 nb_sections;
u32 data_size;
u32 nb_hevc, nb_hevc_temp, nb_shvc, nb_shvc_temp,... | 270,393,825,434,997,100,000,000,000,000,000,000,000 | mpegts.c | 236,951,061,127,109,280,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-20630 | An issue was discovered in libgpac.a in GPAC before 0.8.0, as demonstrated by MP4Box. It contains a heap-based buffer over-read in BS_ReadByte (called from gf_bs_read_bit) in utils/bitstream.c that can cause a denial of service via a crafted MP4 file. | https://nvd.nist.gov/vuln/detail/CVE-2019-20630 |
198,179 | mongo | c151e0660b9736fe66b224f1129a16871165251b | https://github.com/mongodb/mongo | https://github.com/mongodb/mongo/commit/c151e0660b9736fe66b224f1129a16871165251b | SERVER-13573 Fix x.509 auth exception | 1 | Status CmdAuthenticate::_authenticateX509(const UserName& user, const BSONObj& cmdObj) {
if (!getSSLManager()) {
return Status(ErrorCodes::ProtocolError,
"SSL support is required for the MONGODB-X509 mechanism.");
}
if(user.getDB() != "$external") {
... | 50,722,082,310,142,280,000,000,000,000,000,000,000 | authentication_commands.cpp | 226,851,357,293,916,840,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2014-3971 | The CmdAuthenticate::_authenticateX509 function in db/commands/authentication_commands.cpp in mongod in MongoDB 2.6.x before 2.6.2 allows remote attackers to cause a denial of service (daemon crash) by attempting authentication with an invalid X.509 client certificate. | https://nvd.nist.gov/vuln/detail/CVE-2014-3971 |
270,168 | mongo | c151e0660b9736fe66b224f1129a16871165251b | https://github.com/mongodb/mongo | https://github.com/mongodb/mongo/commit/c151e0660b9736fe66b224f1129a16871165251b | SERVER-13573 Fix x.509 auth exception | 0 | Status CmdAuthenticate::_authenticateX509(const UserName& user, const BSONObj& cmdObj) {
if (!getSSLManager()) {
return Status(ErrorCodes::ProtocolError,
"SSL support is required for the MONGODB-X509 mechanism.");
}
if(user.getDB() != "$external") {
... | 113,012,449,931,941,130,000,000,000,000,000,000,000 | authentication_commands.cpp | 164,163,648,107,738,230,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2014-3971 | The CmdAuthenticate::_authenticateX509 function in db/commands/authentication_commands.cpp in mongod in MongoDB 2.6.x before 2.6.2 allows remote attackers to cause a denial of service (daemon crash) by attempting authentication with an invalid X.509 client certificate. | https://nvd.nist.gov/vuln/detail/CVE-2014-3971 |
198,190 | redis | 4a7a4e42db8ff757cdf3f4a824f66426036034ef | https://github.com/antirez/redis | https://github.com/redis/redis/commit/4a7a4e42db8ff757cdf3f4a824f66426036034ef | Fix memory leak in streamGetEdgeID (#10753)
si is initialized by streamIteratorStart(), we should call
streamIteratorStop() on it when done.
regression introduced in #9127 (redis 7.0) | 1 | void streamGetEdgeID(stream *s, int first, int skip_tombstones, streamID *edge_id)
{
streamIterator si;
int64_t numfields;
streamIteratorStart(&si,s,NULL,NULL,!first);
si.skip_tombstones = skip_tombstones;
int found = streamIteratorGetID(&si,edge_id,&numfields);
if (!found) {
streamID mi... | 171,611,497,197,052,700,000,000,000,000,000,000,000 | None | null | [
"CWE-703"
] | CVE-2022-33105 | Redis v7.0 was discovered to contain a memory leak via the component streamGetEdgeID. | https://nvd.nist.gov/vuln/detail/CVE-2022-33105 |
270,253 | redis | 4a7a4e42db8ff757cdf3f4a824f66426036034ef | https://github.com/antirez/redis | https://github.com/redis/redis/commit/4a7a4e42db8ff757cdf3f4a824f66426036034ef | Fix memory leak in streamGetEdgeID (#10753)
si is initialized by streamIteratorStart(), we should call
streamIteratorStop() on it when done.
regression introduced in #9127 (redis 7.0) | 0 | void streamGetEdgeID(stream *s, int first, int skip_tombstones, streamID *edge_id)
{
streamIterator si;
int64_t numfields;
streamIteratorStart(&si,s,NULL,NULL,!first);
si.skip_tombstones = skip_tombstones;
int found = streamIteratorGetID(&si,edge_id,&numfields);
if (!found) {
streamID mi... | 188,082,569,445,356,330,000,000,000,000,000,000,000 | None | null | [
"CWE-703"
] | CVE-2022-33105 | Redis v7.0 was discovered to contain a memory leak via the component streamGetEdgeID. | https://nvd.nist.gov/vuln/detail/CVE-2022-33105 |
198,199 | curl | 1890d59905414ab84a35892b2e45833654aa5c13 | https://github.com/curl/curl | https://github.com/curl/curl/commit/1890d59905414ab84a35892b2e45833654aa5c13 | tool_writeout: fixed a buffer read overrun on --write-out
If a % ended the statement, the string's trailing NUL would be skipped
and memory past the end of the buffer would be accessed and potentially
displayed as part of the --write-out output. Added tests 1440 and 1441
to check for this kind of condition.
Reported-... | 1 | void ourWriteOut(CURL *curl, struct OutStruct *outs, const char *writeinfo)
{
FILE *stream = stdout;
const char *ptr = writeinfo;
char *stringp = NULL;
long longinfo;
double doubleinfo;
while(ptr && *ptr) {
if('%' == *ptr) {
if('%' == ptr[1]) {
/* an escaped %-letter */
fputc('%',... | 65,553,640,115,917,050,000,000,000,000,000,000,000 | tool_writeout.c | 121,122,283,820,249,180,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2017-7407 | The ourWriteOut function in tool_writeout.c in curl 7.53.1 might allow physically proximate attackers to obtain sensitive information from process memory in opportunistic circumstances by reading a workstation screen during use of a --write-out argument ending in a '%' character, which leads to a heap-based buffer over... | https://nvd.nist.gov/vuln/detail/CVE-2017-7407 |
270,333 | curl | 1890d59905414ab84a35892b2e45833654aa5c13 | https://github.com/curl/curl | https://github.com/curl/curl/commit/1890d59905414ab84a35892b2e45833654aa5c13 | tool_writeout: fixed a buffer read overrun on --write-out
If a % ended the statement, the string's trailing NUL would be skipped
and memory past the end of the buffer would be accessed and potentially
displayed as part of the --write-out output. Added tests 1440 and 1441
to check for this kind of condition.
Reported-... | 0 | void ourWriteOut(CURL *curl, struct OutStruct *outs, const char *writeinfo)
{
FILE *stream = stdout;
const char *ptr = writeinfo;
char *stringp = NULL;
long longinfo;
double doubleinfo;
while(ptr && *ptr) {
if('%' == *ptr && ptr[1]) {
if('%' == ptr[1]) {
/* an escaped %-letter */
... | 81,918,067,402,325,030,000,000,000,000,000,000,000 | tool_writeout.c | 52,475,688,733,979,850,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2017-7407 | The ourWriteOut function in tool_writeout.c in curl 7.53.1 might allow physically proximate attackers to obtain sensitive information from process memory in opportunistic circumstances by reading a workstation screen during use of a --write-out argument ending in a '%' character, which leads to a heap-based buffer over... | https://nvd.nist.gov/vuln/detail/CVE-2017-7407 |
198,207 | FFmpeg | b97a4b658814b2de8b9f2a3bce491c002d34de31 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/b97a4b658814b2de8b9f2a3bce491c002d34de31#diff-cd7e24986650014d67f484f3ffceef3f | cbs_av1: Fix reading of overlong uvlc codes
The specification allows 2^32-1 to be encoded as any number of zeroes
greater than 31, followed by a one. This previously failed because the
trace code would overflow the array containing the string representation
of the bits if there were more than 63 zeroes. Fix that by ... | 1 | static int cbs_av1_read_uvlc(CodedBitstreamContext *ctx, GetBitContext *gbc,
const char *name, uint32_t *write_to,
uint32_t range_min, uint32_t range_max)
{
uint32_t value;
int position, zeroes, i, j;
char bits[65];
if (ctx->trace_enable)
... | 319,514,254,426,156,800,000,000,000,000,000,000,000 | cbs_av1.c | 243,594,783,328,038,650,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2019-1000016 | FFMPEG version 4.1 contains a CWE-129: Improper Validation of Array Index vulnerability in libavcodec/cbs_av1.c that can result in Denial of service. This attack appears to be exploitable via specially crafted AV1 file has to be provided as input. This vulnerability appears to have been fixed in after commit b97a4b6588... | https://nvd.nist.gov/vuln/detail/CVE-2019-1000016 |
270,434 | FFmpeg | b97a4b658814b2de8b9f2a3bce491c002d34de31 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/b97a4b658814b2de8b9f2a3bce491c002d34de31#diff-cd7e24986650014d67f484f3ffceef3f | cbs_av1: Fix reading of overlong uvlc codes
The specification allows 2^32-1 to be encoded as any number of zeroes
greater than 31, followed by a one. This previously failed because the
trace code would overflow the array containing the string representation
of the bits if there were more than 63 zeroes. Fix that by ... | 0 | static int cbs_av1_read_uvlc(CodedBitstreamContext *ctx, GetBitContext *gbc,
const char *name, uint32_t *write_to,
uint32_t range_min, uint32_t range_max)
{
uint32_t zeroes, bits_value, value;
int position;
if (ctx->trace_enable)
position = ... | 336,620,724,718,153,200,000,000,000,000,000,000,000 | cbs_av1.c | 83,269,188,888,168,300,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2019-1000016 | FFMPEG version 4.1 contains a CWE-129: Improper Validation of Array Index vulnerability in libavcodec/cbs_av1.c that can result in Denial of service. This attack appears to be exploitable via specially crafted AV1 file has to be provided as input. This vulnerability appears to have been fixed in after commit b97a4b6588... | https://nvd.nist.gov/vuln/detail/CVE-2019-1000016 |
198,228 | ImageMagick | 1dc0ac5016f1c4d50b100a086526d6a2453a5444 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/1dc0ac5016f1c4d50b100a086526d6a2453a5444 | https://github.com/ImageMagick/ImageMagick/issues/573 | 1 | static MagickBooleanType WriteMAPImage(const ImageInfo *image_info,Image *image,
ExceptionInfo *exception)
{
MagickBooleanType
status;
register const Quantum
*p;
register ssize_t
i,
x;
register unsigned char
*q;
size_t
depth,
packet_size;
ssize_t
y;
unsigned char
... | 302,892,734,733,764,150,000,000,000,000,000,000,000 | map.c | 214,304,303,287,443,300,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2017-12663 | ImageMagick 7.0.6-2 has a memory leak vulnerability in WriteMAPImage in coders/map.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-12663 |
270,602 | ImageMagick | 1dc0ac5016f1c4d50b100a086526d6a2453a5444 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/1dc0ac5016f1c4d50b100a086526d6a2453a5444 | https://github.com/ImageMagick/ImageMagick/issues/573 | 0 | static MagickBooleanType WriteMAPImage(const ImageInfo *image_info,Image *image,
ExceptionInfo *exception)
{
MagickBooleanType
status;
register const Quantum
*p;
register ssize_t
i,
x;
register unsigned char
*q;
size_t
depth,
packet_size;
ssize_t
y;
unsigned char
... | 4,233,668,202,309,117,000,000,000,000,000,000,000 | None | null | [
"CWE-401"
] | CVE-2017-12663 | ImageMagick 7.0.6-2 has a memory leak vulnerability in WriteMAPImage in coders/map.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-12663 |
198,230 | pam_tacplus | 4a9852c31c2fd0c0e72fbb689a586aabcfb11cb0 | https://github.com/kravietz/pam_tacplus | https://github.com/kravietz/pam_tacplus/commit/4a9852c31c2fd0c0e72fbb689a586aabcfb11cb0 | pam: don't leak TACACS+ secret to journald
If journald for syslog is used, the journal is going to store everything,
even DEBUG loglevel messages. Pre-journald logging of system-wide DEBUG
loglevel could be avoided and is not affected in all cases.
With journald presence it's probably safe to no longer log sensitive
... | 1 | int _pam_parse(int argc, const char **argv) {
int ctrl = 0;
const char *current_secret = NULL;
/* otherwise the list will grow with each call */
memset(tac_srv, 0, sizeof(tacplus_server_t) * TAC_PLUS_MAXSERVERS);
memset(&tac_srv_addr, 0, sizeof(struct addrinfo) * TAC_PLUS_MAXSERVERS);
memset(&t... | 140,020,108,721,729,510,000,000,000,000,000,000,000 | support.c | 81,058,205,765,163,040,000,000,000,000,000,000,000 | [
"CWE-532"
] | CVE-2020-13881 | In support.c in pam_tacplus 1.3.8 through 1.5.1, the TACACS+ shared secret gets logged via syslog if the DEBUG loglevel and journald are used. | https://nvd.nist.gov/vuln/detail/CVE-2020-13881 |
270,626 | pam_tacplus | 4a9852c31c2fd0c0e72fbb689a586aabcfb11cb0 | https://github.com/kravietz/pam_tacplus | https://github.com/kravietz/pam_tacplus/commit/4a9852c31c2fd0c0e72fbb689a586aabcfb11cb0 | pam: don't leak TACACS+ secret to journald
If journald for syslog is used, the journal is going to store everything,
even DEBUG loglevel messages. Pre-journald logging of system-wide DEBUG
loglevel could be avoided and is not affected in all cases.
With journald presence it's probably safe to no longer log sensitive
... | 0 | int _pam_parse(int argc, const char **argv) {
int ctrl = 0;
const char *current_secret = NULL;
/* otherwise the list will grow with each call */
memset(tac_srv, 0, sizeof(tacplus_server_t) * TAC_PLUS_MAXSERVERS);
memset(&tac_srv_addr, 0, sizeof(struct addrinfo) * TAC_PLUS_MAXSERVERS);
memset(&t... | 113,020,933,102,283,480,000,000,000,000,000,000,000 | support.c | 256,270,767,389,570,060,000,000,000,000,000,000,000 | [
"CWE-532"
] | CVE-2020-13881 | In support.c in pam_tacplus 1.3.8 through 1.5.1, the TACACS+ shared secret gets logged via syslog if the DEBUG loglevel and journald are used. | https://nvd.nist.gov/vuln/detail/CVE-2020-13881 |
198,238 | asylo | b1d120a2c7d7446d2cc58d517e20a1b184b82200 | https://github.com/google/asylo | https://github.com/google/asylo/commit/b1d120a2c7d7446d2cc58d517e20a1b184b82200 | Check for return size in enc_untrusted_read
Check return size does not exceed requested. The returned result and
content still cannot be trusted, but it's expected behavior when not
using a secure file system.
PiperOrigin-RevId: 333827386
Change-Id: I0bdec0aec9356ea333dc8c647eba5d2772875f29 | 1 | ssize_t enc_untrusted_read(int fd, void *buf, size_t count) {
return static_cast<ssize_t>(EnsureInitializedAndDispatchSyscall(
asylo::system_call::kSYS_read, fd, buf, count));
} | 157,997,923,020,753,940,000,000,000,000,000,000,000 | host_calls.cc | 83,935,641,637,319,770,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2020-8942 | An arbitrary memory read vulnerability in Asylo versions up to 0.6.0 allows an untrusted attacker to make a call to enc_untrusted_read whose return size was not validated against the requrested size. The parameter size is unchecked allowing the attacker to read memory locations outside of the intended buffer size inclu... | https://nvd.nist.gov/vuln/detail/CVE-2020-8942 |
270,763 | asylo | b1d120a2c7d7446d2cc58d517e20a1b184b82200 | https://github.com/google/asylo | https://github.com/google/asylo/commit/b1d120a2c7d7446d2cc58d517e20a1b184b82200 | Check for return size in enc_untrusted_read
Check return size does not exceed requested. The returned result and
content still cannot be trusted, but it's expected behavior when not
using a secure file system.
PiperOrigin-RevId: 333827386
Change-Id: I0bdec0aec9356ea333dc8c647eba5d2772875f29 | 0 | ssize_t enc_untrusted_read(int fd, void *buf, size_t count) {
ssize_t ret = static_cast<ssize_t>(EnsureInitializedAndDispatchSyscall(
asylo::system_call::kSYS_read, fd, buf, count));
if (ret != -1 && ret > count) {
::asylo::primitives::TrustedPrimitives::BestEffortAbort(
"enc_untrusted_read: read ... | 241,091,290,419,272,580,000,000,000,000,000,000,000 | host_calls.cc | 3,167,262,574,095,635,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2020-8942 | An arbitrary memory read vulnerability in Asylo versions up to 0.6.0 allows an untrusted attacker to make a call to enc_untrusted_read whose return size was not validated against the requrested size. The parameter size is unchecked allowing the attacker to read memory locations outside of the intended buffer size inclu... | https://nvd.nist.gov/vuln/detail/CVE-2020-8942 |
198,243 | ImageMagick | c9aa9f80828594eacbe3affe16c43d623562e5d8 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/c9aa9f80828594eacbe3affe16c43d623562e5d8 | https://github.com/ImageMagick/ImageMagick/issues/550 | 1 | static Image *ReadOneJNGImage(MngInfo *mng_info,
const ImageInfo *image_info, ExceptionInfo *exception)
{
Image
*alpha_image,
*color_image,
*image,
*jng_image;
ImageInfo
*alpha_image_info,
*color_image_info;
MagickBooleanType
logging;
ssize_t
y;
MagickBooleanType
st... | 337,755,438,894,179,520,000,000,000,000,000,000,000 | png.c | 228,171,685,898,256,920,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2017-12641 | ImageMagick 7.0.6-1 has a memory leak vulnerability in ReadOneJNGImage in coders\png.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-12641 |
270,778 | ImageMagick | c9aa9f80828594eacbe3affe16c43d623562e5d8 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/c9aa9f80828594eacbe3affe16c43d623562e5d8 | https://github.com/ImageMagick/ImageMagick/issues/550 | 0 | static Image *ReadOneJNGImage(MngInfo *mng_info,
const ImageInfo *image_info, ExceptionInfo *exception)
{
Image
*alpha_image,
*color_image,
*image,
*jng_image;
ImageInfo
*alpha_image_info,
*color_image_info;
MagickBooleanType
logging;
ssize_t
y;
MagickBooleanType
st... | 183,059,740,976,871,170,000,000,000,000,000,000,000 | png.c | 290,682,910,480,858,150,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2017-12641 | ImageMagick 7.0.6-1 has a memory leak vulnerability in ReadOneJNGImage in coders\png.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-12641 |
198,245 | png2webp | 8f21ad79b0cd98fc22d5b49734543101946abbff | https://github.com/landfillbaby/png2webp | https://github.com/landfillbaby/png2webp/commit/8f21ad79b0cd98fc22d5b49734543101946abbff | v1.0.5: fix buffer overrun when reading bad WebPs | 1 | static bool w2p(char *ip, char *op) {
FILE *fp = openr(ip);
if(!fp) return 1;
bool openwdone = 0;
uint8_t *x = 0, *b = 0;
png_struct *p = 0;
png_info *n = 0;
uint8_t i[12];
char *k[] = {"Out of memory", "Broken config, file a bug report",
"Invalid WebP", "???", "???", "???", "I/O error"};
// unsup... | 100,090,985,547,595,910,000,000,000,000,000,000,000 | png2webp.c | 276,030,132,035,029,200,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2022-36752 | png2webp v1.0.4 was discovered to contain an out-of-bounds write via the function w2p. This vulnerability is exploitable via a crafted png file. | https://nvd.nist.gov/vuln/detail/CVE-2022-36752 |
270,782 | png2webp | 8f21ad79b0cd98fc22d5b49734543101946abbff | https://github.com/landfillbaby/png2webp | https://github.com/landfillbaby/png2webp/commit/8f21ad79b0cd98fc22d5b49734543101946abbff | v1.0.5: fix buffer overrun when reading bad WebPs | 0 | static bool w2p(char *ip, char *op) {
FILE *fp = openr(ip);
if(!fp) return 1;
bool openwdone = 0;
uint8_t *x = 0, *b = 0;
png_struct *p = 0;
png_info *n = 0;
uint8_t i[12];
char *k[] = {"Out of memory", "Broken config, file a bug report",
"Invalid WebP", "???", "???", "???", "I/O error"};
// unsup... | 87,093,683,829,054,530,000,000,000,000,000,000,000 | png2webp.c | 90,517,462,464,857,550,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2022-36752 | png2webp v1.0.4 was discovered to contain an out-of-bounds write via the function w2p. This vulnerability is exploitable via a crafted png file. | https://nvd.nist.gov/vuln/detail/CVE-2022-36752 |
198,318 | vlc | 2e7c7091a61aa5d07e7997b393d821e91f593c39 | https://github.com/videolan/vlc | https://github.com/videolan/vlc/commit/2e7c7091a61aa5d07e7997b393d821e91f593c39 | demux: mp4: fix buffer overflow in parsing of string boxes.
We ensure that pbox->i_size is never smaller than 8 to avoid an
integer underflow in the third argument of the subsequent call to
memcpy. We also make sure no truncation occurs when passing values
derived from the 64 bit integer p_box->i_size to arguments of ... | 1 | static int MP4_ReadBox_String( stream_t *p_stream, MP4_Box_t *p_box )
{
MP4_READBOX_ENTER( MP4_Box_data_string_t );
p_box->data.p_string->psz_text = malloc( p_box->i_size + 1 - 8 ); /* +\0, -name, -size */
if( p_box->data.p_string->psz_text == NULL )
MP4_READBOX_EXIT( 0 );
memcpy( p_box->data.... | 100,810,936,632,355,560,000,000,000,000,000,000,000 | libmp4.c | 187,976,638,914,246,420,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2014-9627 | The MP4_ReadBox_String function in modules/demux/mp4/libmp4.c in VideoLAN VLC media player before 2.1.6 performs an incorrect cast operation from a 64-bit integer to a 32-bit integer, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a large box size. | https://nvd.nist.gov/vuln/detail/CVE-2014-9627 |
272,404 | vlc | 2e7c7091a61aa5d07e7997b393d821e91f593c39 | https://github.com/videolan/vlc | https://github.com/videolan/vlc/commit/2e7c7091a61aa5d07e7997b393d821e91f593c39 | demux: mp4: fix buffer overflow in parsing of string boxes.
We ensure that pbox->i_size is never smaller than 8 to avoid an
integer underflow in the third argument of the subsequent call to
memcpy. We also make sure no truncation occurs when passing values
derived from the 64 bit integer p_box->i_size to arguments of ... | 0 | static int MP4_ReadBox_String( stream_t *p_stream, MP4_Box_t *p_box )
{
MP4_READBOX_ENTER( MP4_Box_data_string_t );
if( p_box->i_size < 8 || p_box->i_size > SIZE_MAX )
MP4_READBOX_EXIT( 0 );
p_box->data.p_string->psz_text = malloc( p_box->i_size + 1 - 8 ); /* +\0, -name, -size */
if( p_box->da... | 300,150,811,172,855,570,000,000,000,000,000,000,000 | libmp4.c | 306,379,992,770,123,940,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2014-9627 | The MP4_ReadBox_String function in modules/demux/mp4/libmp4.c in VideoLAN VLC media player before 2.1.6 performs an incorrect cast operation from a 64-bit integer to a 32-bit integer, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a large box size. | https://nvd.nist.gov/vuln/detail/CVE-2014-9627 |
198,330 | ImageMagick | eac8ce4d873f28bb6a46aa3a662fb196b49b95d0 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/eac8ce4d873f28bb6a46aa3a662fb196b49b95d0 | fix #5033: runtime error: load of misaligned address (#5034)
* fix Division by zero in XMenuWidget() of MagickCore/widget.c
* Fix memory leak in AnimateImageCommand() of MagickWand/animate.c and DisplayImageCommand() of MagickWand/display.c
* fix Division by zero in ReadEnhMetaFile() of coders/emf.c
* Resolve confl... | 1 | static MagickBooleanType GetEXIFProperty(const Image *image,
const char *property,ExceptionInfo *exception)
{
#define MaxDirectoryStack 16
#define EXIF_DELIMITER "\n"
#define EXIF_NUM_FORMATS 12
#define EXIF_FMT_BYTE 1
#define EXIF_FMT_STRING 2
#define EXIF_FMT_USHORT 3
#define EXIF_FMT_ULONG 4
#define EXIF_FM... | 32,208,848,236,178,600,000,000,000,000,000,000,000 | property.c | 82,190,644,811,326,830,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2022-32547 | In ImageMagick, there is load of misaligned address for type 'double', which requires 8 byte alignment and for type 'float', which requires 4 byte alignment at MagickCore/property.c. Whenever crafted or untrusted input is processed by ImageMagick, this causes a negative impact to application availability or other probl... | https://nvd.nist.gov/vuln/detail/CVE-2022-32547 |
272,906 | ImageMagick | eac8ce4d873f28bb6a46aa3a662fb196b49b95d0 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/eac8ce4d873f28bb6a46aa3a662fb196b49b95d0 | fix #5033: runtime error: load of misaligned address (#5034)
* fix Division by zero in XMenuWidget() of MagickCore/widget.c
* Fix memory leak in AnimateImageCommand() of MagickWand/animate.c and DisplayImageCommand() of MagickWand/display.c
* fix Division by zero in ReadEnhMetaFile() of coders/emf.c
* Resolve confl... | 0 | static MagickBooleanType GetEXIFProperty(const Image *image,
const char *property,ExceptionInfo *exception)
{
#define MaxDirectoryStack 16
#define EXIF_DELIMITER "\n"
#define EXIF_NUM_FORMATS 12
#define EXIF_FMT_BYTE 1
#define EXIF_FMT_STRING 2
#define EXIF_FMT_USHORT 3
#define EXIF_FMT_ULONG 4
#define EXIF_FM... | 46,887,717,838,165,560,000,000,000,000,000,000,000 | property.c | 63,096,947,796,879,110,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2022-32547 | In ImageMagick, there is load of misaligned address for type 'double', which requires 8 byte alignment and for type 'float', which requires 4 byte alignment at MagickCore/property.c. Whenever crafted or untrusted input is processed by ImageMagick, this causes a negative impact to application availability or other probl... | https://nvd.nist.gov/vuln/detail/CVE-2022-32547 |
198,343 | tensorflow | 9728c60e136912a12d99ca56e106b7cce7af5986 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/9728c60e136912a12d99ca56e106b7cce7af5986 | Ensure validation sticks in `save_restore_v2_ops.cc`
PiperOrigin-RevId: 387924206
Change-Id: I6156842eb3230076b5812c0815f3e66bd5241454 | 1 | void Compute(OpKernelContext* context) override {
const Tensor& prefix = context->input(0);
const Tensor& tensor_names = context->input(1);
const Tensor& shape_and_slices = context->input(2);
ValidateInputs(true /* is save op */, context, prefix, tensor_names,
shape_and_slices);
... | 254,461,778,286,763,430,000,000,000,000,000,000,000 | save_restore_v2_ops.cc | 174,819,196,505,645,780,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2021-37648 | TensorFlow is an end-to-end open source platform for machine learning. In affected versions the code for `tf.raw_ops.SaveV2` does not properly validate the inputs and an attacker can trigger a null pointer dereference. The [implementation](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5... | https://nvd.nist.gov/vuln/detail/CVE-2021-37648 |
273,027 | tensorflow | 9728c60e136912a12d99ca56e106b7cce7af5986 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/9728c60e136912a12d99ca56e106b7cce7af5986 | Ensure validation sticks in `save_restore_v2_ops.cc`
PiperOrigin-RevId: 387924206
Change-Id: I6156842eb3230076b5812c0815f3e66bd5241454 | 0 | void Compute(OpKernelContext* context) override {
const Tensor& prefix = context->input(0);
const Tensor& tensor_names = context->input(1);
const Tensor& shape_and_slices = context->input(2);
ValidateInputs(true /* is save op */, context, prefix, tensor_names,
shape_and_slices);
... | 168,394,260,644,962,120,000,000,000,000,000,000,000 | save_restore_v2_ops.cc | 175,844,667,481,404,750,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2021-37648 | TensorFlow is an end-to-end open source platform for machine learning. In affected versions the code for `tf.raw_ops.SaveV2` does not properly validate the inputs and an attacker can trigger a null pointer dereference. The [implementation](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5... | https://nvd.nist.gov/vuln/detail/CVE-2021-37648 |
198,344 | tensorflow | 9728c60e136912a12d99ca56e106b7cce7af5986 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/9728c60e136912a12d99ca56e106b7cce7af5986 | Ensure validation sticks in `save_restore_v2_ops.cc`
PiperOrigin-RevId: 387924206
Change-Id: I6156842eb3230076b5812c0815f3e66bd5241454 | 1 | void Compute(OpKernelContext* context) override {
const Tensor& prefix = context->input(0);
const Tensor& tensor_names = context->input(1);
const Tensor& shape_and_slices = context->input(2);
OP_REQUIRES(context, tensor_names.NumElements() == dtypes_.size(),
errors::InvalidArgument("Go... | 150,693,900,930,779,220,000,000,000,000,000,000,000 | save_restore_v2_ops.cc | 174,819,196,505,645,780,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2021-37648 | TensorFlow is an end-to-end open source platform for machine learning. In affected versions the code for `tf.raw_ops.SaveV2` does not properly validate the inputs and an attacker can trigger a null pointer dereference. The [implementation](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5... | https://nvd.nist.gov/vuln/detail/CVE-2021-37648 |
273,031 | tensorflow | 9728c60e136912a12d99ca56e106b7cce7af5986 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/9728c60e136912a12d99ca56e106b7cce7af5986 | Ensure validation sticks in `save_restore_v2_ops.cc`
PiperOrigin-RevId: 387924206
Change-Id: I6156842eb3230076b5812c0815f3e66bd5241454 | 0 | void Compute(OpKernelContext* context) override {
const Tensor& prefix = context->input(0);
const Tensor& tensor_names = context->input(1);
const Tensor& shape_and_slices = context->input(2);
OP_REQUIRES(context, tensor_names.NumElements() == dtypes_.size(),
errors::InvalidArgument("Go... | 315,398,120,898,678,300,000,000,000,000,000,000,000 | save_restore_v2_ops.cc | 175,844,667,481,404,750,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2021-37648 | TensorFlow is an end-to-end open source platform for machine learning. In affected versions the code for `tf.raw_ops.SaveV2` does not properly validate the inputs and an attacker can trigger a null pointer dereference. The [implementation](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5... | https://nvd.nist.gov/vuln/detail/CVE-2021-37648 |
198,348 | libsixel | 7808a06b88c11dbc502318cdd51fa374f8cd47ee | https://github.com/saitoha/libsixel | https://github.com/saitoha/libsixel/commit/7808a06b88c11dbc502318cdd51fa374f8cd47ee | gif loader: check LZW code size (Issue #75) | 1 | gif_process_raster(
gif_context_t /* in */ *s,
gif_t /* in */ *g
)
{
SIXELSTATUS status = SIXEL_FALSE;
unsigned char lzw_cs;
signed int len, code;
unsigned int first;
signed int codesize, codemask, avail, oldcode, bits, valid_bits, clear;
gif_lzw *p;
lzw_cs = gif_get8(s);
... | 255,989,561,143,238,160,000,000,000,000,000,000,000 | fromgif.c | 300,708,157,559,881,100,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2020-21050 | Libsixel prior to v1.8.3 contains a stack buffer overflow in the function gif_process_raster at fromgif.c. | https://nvd.nist.gov/vuln/detail/CVE-2020-21050 |
273,042 | libsixel | 7808a06b88c11dbc502318cdd51fa374f8cd47ee | https://github.com/saitoha/libsixel | https://github.com/saitoha/libsixel/commit/7808a06b88c11dbc502318cdd51fa374f8cd47ee | gif loader: check LZW code size (Issue #75) | 0 | gif_process_raster(
gif_context_t /* in */ *s,
gif_t /* in */ *g
)
{
SIXELSTATUS status = SIXEL_FALSE;
unsigned char lzw_cs;
signed int len, code;
unsigned int first;
signed int codesize, codemask, avail, oldcode, bits, valid_bits, clear;
gif_lzw *p;
/* LZW Minimum Code Size... | 263,006,748,068,721,100,000,000,000,000,000,000,000 | fromgif.c | 38,689,493,416,035,583,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2020-21050 | Libsixel prior to v1.8.3 contains a stack buffer overflow in the function gif_process_raster at fromgif.c. | https://nvd.nist.gov/vuln/detail/CVE-2020-21050 |
198,351 | gpac | 98b727637e32d1d4824101d8947e2dbd573d4fc8 | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/98b727637e32d1d4824101d8947e2dbd573d4fc8 | be stricter in PAT processing - cf #1269 | 1 | static void gf_m2ts_process_pat(GF_M2TS_Demuxer *ts, GF_M2TS_SECTION_ES *ses, GF_List *sections, u8 table_id, u16 ex_table_id, u8 version_number, u8 last_section_number, u32 status)
{
GF_M2TS_Program *prog;
GF_M2TS_SECTION_ES *pmt;
u32 i, nb_progs, evt_type;
u32 nb_sections;
u32 data_size;
unsigned char *data;
G... | 288,554,605,512,424,770,000,000,000,000,000,000,000 | mpegts.c | 95,224,966,645,898,480,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2019-20628 | An issue was discovered in libgpac.a in GPAC before 0.8.0, as demonstrated by MP4Box. It contains a Use-After-Free vulnerability in gf_m2ts_process_pmt in media_tools/mpegts.c that can cause a denial of service via a crafted MP4 file. | https://nvd.nist.gov/vuln/detail/CVE-2019-20628 |
273,110 | gpac | 98b727637e32d1d4824101d8947e2dbd573d4fc8 | https://github.com/gpac/gpac | https://github.com/gpac/gpac/commit/98b727637e32d1d4824101d8947e2dbd573d4fc8 | be stricter in PAT processing - cf #1269 | 0 | static void gf_m2ts_process_pat(GF_M2TS_Demuxer *ts, GF_M2TS_SECTION_ES *ses, GF_List *sections, u8 table_id, u16 ex_table_id, u8 version_number, u8 last_section_number, u32 status)
{
GF_M2TS_Program *prog;
GF_M2TS_SECTION_ES *pmt;
u32 i, nb_progs, evt_type;
u32 nb_sections;
u32 data_size;
unsigned char *data;
G... | 295,182,302,544,603,900,000,000,000,000,000,000,000 | mpegts.c | 236,951,061,127,109,280,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2019-20628 | An issue was discovered in libgpac.a in GPAC before 0.8.0, as demonstrated by MP4Box. It contains a Use-After-Free vulnerability in gf_m2ts_process_pmt in media_tools/mpegts.c that can cause a denial of service via a crafted MP4 file. | https://nvd.nist.gov/vuln/detail/CVE-2019-20628 |
198,397 | tensorflow | 7cf73a2274732c9d82af51c2bc2cf90d13cd7e6d | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/7cf73a2274732c9d82af51c2bc2cf90d13cd7e6d | Address QuantizeAndDequantizeV* heap oob. Added additional checks for the 'axis' attribute.
PiperOrigin-RevId: 402446942
Change-Id: Id2f6b82e4e740d0550329be02621c46466b5a5b9 | 1 | TEST(ArrayOpsTest, QuantizeAndDequantizeV2_ShapeFn) {
ShapeInferenceTestOp op("QuantizeAndDequantizeV2");
op.input_tensors.resize(3);
TF_ASSERT_OK(NodeDefBuilder("test", "QuantizeAndDequantizeV2")
.Input("input", 0, DT_FLOAT)
.Input("input_min", 1, DT_FLOAT)
... | 57,723,305,468,956,070,000,000,000,000,000,000,000 | array_ops_test.cc | 295,306,346,367,017,900,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2021-41205 | TensorFlow is an open source platform for machine learning. In affected versions the shape inference functions for the `QuantizeAndDequantizeV*` operations can trigger a read outside of bounds of heap allocated array. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1,... | https://nvd.nist.gov/vuln/detail/CVE-2021-41205 |
273,801 | tensorflow | 7cf73a2274732c9d82af51c2bc2cf90d13cd7e6d | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/7cf73a2274732c9d82af51c2bc2cf90d13cd7e6d | Address QuantizeAndDequantizeV* heap oob. Added additional checks for the 'axis' attribute.
PiperOrigin-RevId: 402446942
Change-Id: Id2f6b82e4e740d0550329be02621c46466b5a5b9 | 0 | TEST(ArrayOpsTest, QuantizeAndDequantizeV2_ShapeFn) {
ShapeInferenceTestOp op("QuantizeAndDequantizeV2");
op.input_tensors.resize(3);
TF_ASSERT_OK(NodeDefBuilder("test", "QuantizeAndDequantizeV2")
.Input("input", 0, DT_FLOAT)
.Input("input_min", 1, DT_FLOAT)
... | 6,570,683,595,018,333,000,000,000,000,000,000,000 | array_ops_test.cc | 303,479,682,034,495,700,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2021-41205 | TensorFlow is an open source platform for machine learning. In affected versions the shape inference functions for the `QuantizeAndDequantizeV*` operations can trigger a read outside of bounds of heap allocated array. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1,... | https://nvd.nist.gov/vuln/detail/CVE-2021-41205 |
198,408 | LibRaw | 1334647862b0c90b2e8cb2f668e66627d9517b17 | https://github.com/LibRaw/LibRaw | https://github.com/LibRaw/LibRaw/commit/1334647862b0c90b2e8cb2f668e66627d9517b17 | parse_qt: possible integer overflow | 1 | void CLASS parse_qt (int end)
{
unsigned save, size;
char tag[4];
order = 0x4d4d;
while (ftell(ifp)+7 < end) {
save = ftell(ifp);
if ((size = get4()) < 8) return;
fread (tag, 4, 1, ifp);
if (!memcmp(tag,"moov",4) ||
!memcmp(tag,"udta",4) ||
!memcmp(tag,"CNTH",4))
parse_qt (save+size);
... | 214,849,665,339,367,260,000,000,000,000,000,000,000 | dcraw.c | 244,721,317,821,702,520,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2018-5815 | An integer overflow error within the "parse_qt()" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.12 can be exploited to trigger an infinite loop via a specially crafted Apple QuickTime file. | https://nvd.nist.gov/vuln/detail/CVE-2018-5815 |
274,061 | LibRaw | 1334647862b0c90b2e8cb2f668e66627d9517b17 | https://github.com/LibRaw/LibRaw | https://github.com/LibRaw/LibRaw/commit/1334647862b0c90b2e8cb2f668e66627d9517b17 | parse_qt: possible integer overflow | 0 | void CLASS parse_qt (int end)
{
unsigned save, size;
char tag[4];
order = 0x4d4d;
while (ftell(ifp)+7 < end) {
save = ftell(ifp);
if ((size = get4()) < 8) return;
if ((int)size < 0) return; // 2+GB is too much
if (save + size < save) return; // 32bit overflow
fread (tag, 4, 1, ifp);
if ... | 80,438,067,894,781,925,000,000,000,000,000,000,000 | dcraw.c | 215,082,004,711,907,140,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2018-5815 | An integer overflow error within the "parse_qt()" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.12 can be exploited to trigger an infinite loop via a specially crafted Apple QuickTime file. | https://nvd.nist.gov/vuln/detail/CVE-2018-5815 |
198,410 | ImageMagick | c1b09bbec148f6ae11d0b686fdb89ac6dc0ab14e | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/c1b09bbec148f6ae11d0b686fdb89ac6dc0ab14e | https://github.com/ImageMagick/ImageMagick/issues/577 | 1 | static MagickBooleanType WritePICTImage(const ImageInfo *image_info,
Image *image,ExceptionInfo *exception)
{
#define MaxCount 128
#define PictCropRegionOp 0x01
#define PictEndOfPictureOp 0xff
#define PictJPEGOp 0x8200
#define PictInfoOp 0x0C00
#define PictInfoSize 512
#define PictPixmapOp 0x9A
#define PictPIC... | 170,906,067,123,033,920,000,000,000,000,000,000,000 | pict.c | 161,357,167,936,244,980,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2017-12665 | ImageMagick 7.0.6-2 has a memory leak vulnerability in WritePICTImage in coders/pict.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-12665 |
274,069 | ImageMagick | c1b09bbec148f6ae11d0b686fdb89ac6dc0ab14e | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/c1b09bbec148f6ae11d0b686fdb89ac6dc0ab14e | https://github.com/ImageMagick/ImageMagick/issues/577 | 0 | static MagickBooleanType WritePICTImage(const ImageInfo *image_info,
Image *image,ExceptionInfo *exception)
{
#define MaxCount 128
#define PictCropRegionOp 0x01
#define PictEndOfPictureOp 0xff
#define PictJPEGOp 0x8200
#define PictInfoOp 0x0C00
#define PictInfoSize 512
#define PictPixmapOp 0x9A
#define PictPIC... | 107,249,901,361,924,630,000,000,000,000,000,000,000 | pict.c | 138,795,199,755,002,620,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2017-12665 | ImageMagick 7.0.6-2 has a memory leak vulnerability in WritePICTImage in coders/pict.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-12665 |
198,427 | mongoose | c65c8fdaaa257e0487ab0aaae9e8f6b439335945 | https://github.com/cesanta/mongoose | https://github.com/cesanta/mongoose/commit/c65c8fdaaa257e0487ab0aaae9e8f6b439335945 | Protect against the directory traversal in mg_upload() | 1 | int mg_http_upload(struct mg_connection *c, struct mg_http_message *hm,
const char *dir) {
char offset[40] = "", name[200] = "", path[256];
mg_http_get_var(&hm->query, "offset", offset, sizeof(offset));
mg_http_get_var(&hm->query, "name", name, sizeof(name));
if (name[0] == '\0') {
mg_htt... | 12,954,600,658,581,306,000,000,000,000,000,000,000 | mongoose.c | 325,284,919,560,067,950,000,000,000,000,000,000,000 | [
"CWE-552"
] | CVE-2022-25299 | This affects the package cesanta/mongoose before 7.6. The unsafe handling of file names during upload using mg_http_upload() method may enable attackers to write files to arbitrary locations outside the designated target folder. | https://nvd.nist.gov/vuln/detail/CVE-2022-25299 |
274,398 | mongoose | c65c8fdaaa257e0487ab0aaae9e8f6b439335945 | https://github.com/cesanta/mongoose | https://github.com/cesanta/mongoose/commit/c65c8fdaaa257e0487ab0aaae9e8f6b439335945 | Protect against the directory traversal in mg_upload() | 0 | int mg_http_upload(struct mg_connection *c, struct mg_http_message *hm,
const char *dir) {
char offset[40] = "", name[200] = "", path[256];
mg_http_get_var(&hm->query, "offset", offset, sizeof(offset));
mg_http_get_var(&hm->query, "name", name, sizeof(name));
if (name[0] == '\0') {
mg_htt... | 143,871,410,773,104,650,000,000,000,000,000,000,000 | mongoose.c | 44,693,956,672,582,490,000,000,000,000,000,000,000 | [
"CWE-552"
] | CVE-2022-25299 | This affects the package cesanta/mongoose before 7.6. The unsafe handling of file names during upload using mg_http_upload() method may enable attackers to write files to arbitrary locations outside the designated target folder. | https://nvd.nist.gov/vuln/detail/CVE-2022-25299 |
198,432 | ImageMagick | 72a50e400d98d7a2fd610caedfeb9af043dc5582 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/72a50e400d98d7a2fd610caedfeb9af043dc5582 | Fixed potential memory leak. | 1 | static Image *ReadSCREENSHOTImage(const ImageInfo *image_info,
ExceptionInfo *exception)
{
Image
*image;
assert(image_info->signature == MagickCoreSignature);
if (image_info->debug != MagickFalse)
(void) LogMagickEvent(TraceEvent,GetMagickModule(),"%s",
image_info->filename);
assert(exception !... | 7,002,244,531,704,570,000,000,000,000,000,000,000 | screenshot.c | 137,058,891,405,669,530,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2017-11447 | The ReadSCREENSHOTImage function in coders/screenshot.c in ImageMagick before 7.0.6-1 has memory leaks, causing denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2017-11447 |
274,626 | ImageMagick | 72a50e400d98d7a2fd610caedfeb9af043dc5582 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/72a50e400d98d7a2fd610caedfeb9af043dc5582 | Fixed potential memory leak. | 0 | static Image *ReadSCREENSHOTImage(const ImageInfo *image_info,
ExceptionInfo *exception)
{
Image
*image;
assert(image_info->signature == MagickCoreSignature);
if (image_info->debug != MagickFalse)
(void) LogMagickEvent(TraceEvent,GetMagickModule(),"%s",
image_info->filename);
assert(exception !... | 195,195,812,353,012,080,000,000,000,000,000,000,000 | screenshot.c | 147,139,327,551,068,630,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2017-11447 | The ReadSCREENSHOTImage function in coders/screenshot.c in ImageMagick before 7.0.6-1 has memory leaks, causing denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2017-11447 |
198,434 | ImageMagick | 73b6c35cede48ccb2e29dbe62c2d77488e5e70b7 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/73b6c35cede48ccb2e29dbe62c2d77488e5e70b7 | https://github.com/ImageMagick/ImageMagick/issues/571 | 1 | static MagickBooleanType WriteCALSImage(const ImageInfo *image_info,
Image *image,ExceptionInfo *exception)
{
char
header[129];
Image
*group4_image;
ImageInfo
*write_info;
MagickBooleanType
status;
register ssize_t
i;
size_t
density,
length,
orient_x,
orient_y;
... | 138,610,425,073,862,160,000,000,000,000,000,000,000 | cals.c | 181,202,913,145,730,670,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2017-12669 | ImageMagick 7.0.6-2 has a memory leak vulnerability in WriteCALSImage in coders/cals.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-12669 |
274,638 | ImageMagick | 73b6c35cede48ccb2e29dbe62c2d77488e5e70b7 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/73b6c35cede48ccb2e29dbe62c2d77488e5e70b7 | https://github.com/ImageMagick/ImageMagick/issues/571 | 0 | static MagickBooleanType WriteCALSImage(const ImageInfo *image_info,
Image *image,ExceptionInfo *exception)
{
char
header[129];
Image
*group4_image;
ImageInfo
*write_info;
MagickBooleanType
status;
register ssize_t
i;
size_t
density,
length,
orient_x,
orient_y;
... | 163,371,586,791,865,260,000,000,000,000,000,000,000 | cals.c | 272,257,818,720,102,930,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2017-12669 | ImageMagick 7.0.6-2 has a memory leak vulnerability in WriteCALSImage in coders/cals.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-12669 |
198,464 | ntopng | 01f47e04fd7c8d54399c9e465f823f0017069f8f | https://github.com/ntop/ntopng | https://github.com/ntop/ntopng/commit/01f47e04fd7c8d54399c9e465f823f0017069f8f | Security fix: prevents empty host from being used | 1 | void Lua::setParamsTable(lua_State* vm, const char* table_name,
const char* query) const {
char outbuf[FILENAME_MAX];
char *where;
char *tok;
char *query_string = query ? strdup(query) : NULL;
lua_newtable(L);
if (query_string) {
// ntop->getTrace()->traceEvent(TRACE_WARNING, "[HTTP] %s", query_s... | 269,432,345,770,926,100,000,000,000,000,000,000,000 | Lua.cpp | 203,107,689,470,583,940,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2017-7458 | The NetworkInterface::getHost function in NetworkInterface.cpp in ntopng before 3.0 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an empty field that should have contained a hostname or IP address. | https://nvd.nist.gov/vuln/detail/CVE-2017-7458 |
275,376 | ntopng | 01f47e04fd7c8d54399c9e465f823f0017069f8f | https://github.com/ntop/ntopng | https://github.com/ntop/ntopng/commit/01f47e04fd7c8d54399c9e465f823f0017069f8f | Security fix: prevents empty host from being used | 0 | void Lua::setParamsTable(lua_State* vm, const char* table_name,
const char* query) const {
char outbuf[FILENAME_MAX];
char *where;
char *tok;
char *query_string = query ? strdup(query) : NULL;
lua_newtable(L);
if (query_string) {
// ntop->getTrace()->traceEvent(TRACE_WARNING, "[HTTP] %s", query_s... | 131,726,899,184,721,740,000,000,000,000,000,000,000 | Lua.cpp | 181,103,551,699,667,720,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2017-7458 | The NetworkInterface::getHost function in NetworkInterface.cpp in ntopng before 3.0 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an empty field that should have contained a hostname or IP address. | https://nvd.nist.gov/vuln/detail/CVE-2017-7458 |
198,479 | trojita | 25fffa3e25cbad85bbca804193ad336b090a9ce1 | https://github.com/jktjkt/trojita | https://github.com/jktjkt/trojita/commit/25fffa3e25cbad85bbca804193ad336b090a9ce1 | IMAP: refuse to work when STARTTLS is required but server sends PREAUTH
Oops, we cannot send STARTTLS when the connection is already authenticated.
This is serious enough to warrant an error; an attacker might be going after a
plaintext of a message we're going to APPEND, etc.
Thanks to Arnt Gulbrandsen on the imap-p... | 1 | bool OpenConnectionTask::handleStateHelper(const Imap::Responses::State *const resp)
{
if (_dead) {
_failed("Asked to die");
return true;
}
using namespace Imap::Responses;
if (model->accessParser(parser).connState == CONN_STATE_CONNECTED_PRETLS_PRECAPS) {
if (!resp->tag.isEmpty... | 98,540,961,767,259,130,000,000,000,000,000,000,000 | OpenConnectionTask.cpp | 95,886,561,980,343,760,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2014-2567 | The OpenConnectionTask::handleStateHelper function in Imap/Tasks/OpenConnectionTask.cpp in Trojita before 0.4.1 allows man-in-the-middle attackers to trigger use of cleartext for saving a message into a (1) sent or (2) draft folder via a PREAUTH response that prevents later use of the STARTTLS command. | https://nvd.nist.gov/vuln/detail/CVE-2014-2567 |
275,540 | trojita | 25fffa3e25cbad85bbca804193ad336b090a9ce1 | https://github.com/jktjkt/trojita | https://github.com/jktjkt/trojita/commit/25fffa3e25cbad85bbca804193ad336b090a9ce1 | IMAP: refuse to work when STARTTLS is required but server sends PREAUTH
Oops, we cannot send STARTTLS when the connection is already authenticated.
This is serious enough to warrant an error; an attacker might be going after a
plaintext of a message we're going to APPEND, etc.
Thanks to Arnt Gulbrandsen on the imap-p... | 0 | bool OpenConnectionTask::handleStateHelper(const Imap::Responses::State *const resp)
{
if (_dead) {
_failed("Asked to die");
return true;
}
using namespace Imap::Responses;
if (model->accessParser(parser).connState == CONN_STATE_CONNECTED_PRETLS_PRECAPS) {
if (!resp->tag.isEmpty... | 254,236,322,733,180,330,000,000,000,000,000,000,000 | OpenConnectionTask.cpp | 238,932,083,935,346,280,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2014-2567 | The OpenConnectionTask::handleStateHelper function in Imap/Tasks/OpenConnectionTask.cpp in Trojita before 0.4.1 allows man-in-the-middle attackers to trigger use of cleartext for saving a message into a (1) sent or (2) draft folder via a PREAUTH response that prevents later use of the STARTTLS command. | https://nvd.nist.gov/vuln/detail/CVE-2014-2567 |
198,487 | radare2 | d37d2b858ac47f2f108034be0bcecadaddfbc8b3 | https://github.com/radare/radare2 | https://github.com/radareorg/radare2/commit/d37d2b858ac47f2f108034be0bcecadaddfbc8b3 | Fix #10465 - Avoid string on low addresses (workaround) for corrupted dwarf (#10478) | 1 | static const ut8 *r_bin_dwarf_parse_comp_unit(Sdb *s, const ut8 *obuf,
RBinDwarfCompUnit *cu, const RBinDwarfDebugAbbrev *da,
size_t offset, const ut8 *debug_str, size_t debug_str_len) {
const ut8 *buf = obuf, *buf_end = obuf + (cu->hdr.length - 7);
ut64 abbr_code;
size_t i;
if (cu->hdr.length > debug_str_len... | 129,458,135,297,085,340,000,000,000,000,000,000,000 | dwarf.c | 233,268,709,250,246,400,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-14015 | The sdb_set_internal function in sdb.c in radare2 2.7.0 allows remote attackers to cause a denial of service (invalid read and application crash) via a crafted ELF file because of missing input validation in r_bin_dwarf_parse_comp_unit in libr/bin/dwarf.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-14015 |
275,720 | radare2 | d37d2b858ac47f2f108034be0bcecadaddfbc8b3 | https://github.com/radare/radare2 | https://github.com/radareorg/radare2/commit/d37d2b858ac47f2f108034be0bcecadaddfbc8b3 | Fix #10465 - Avoid string on low addresses (workaround) for corrupted dwarf (#10478) | 0 | static const ut8 *r_bin_dwarf_parse_comp_unit(Sdb *s, const ut8 *obuf,
RBinDwarfCompUnit *cu, const RBinDwarfDebugAbbrev *da,
size_t offset, const ut8 *debug_str, size_t debug_str_len) {
const ut8 *buf = obuf, *buf_end = obuf + (cu->hdr.length - 7);
ut64 abbr_code;
size_t i;
if (cu->hdr.length > debug_str_len... | 151,549,062,093,841,920,000,000,000,000,000,000,000 | dwarf.c | 175,783,324,447,862,600,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-14015 | The sdb_set_internal function in sdb.c in radare2 2.7.0 allows remote attackers to cause a denial of service (invalid read and application crash) via a crafted ELF file because of missing input validation in r_bin_dwarf_parse_comp_unit in libr/bin/dwarf.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-14015 |
198,506 | FreeRDP | 0d79670a28c0ab049af08613621aa0c267f977e9 | https://github.com/FreeRDP/FreeRDP | https://github.com/FreeRDP/FreeRDP/commit/0d79670a28c0ab049af08613621aa0c267f977e9 | Fixed missing input checks for file contents request
reported by Valentino Ricotta (Thalium) | 1 | wf_cliprdr_server_file_contents_request(CliprdrClientContext* context,
const CLIPRDR_FILE_CONTENTS_REQUEST* fileContentsRequest)
{
DWORD uSize = 0;
BYTE* pData = NULL;
HRESULT hRet = S_OK;
FORMATETC vFormatEtc;
LPDATAOBJECT pDataObj = NULL;
STGMEDIUM vStgMedium;
BOOL bIsSt... | 134,611,210,485,978,080,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2021-37594 | In FreeRDP before 2.4.0 on Windows, wf_cliprdr_server_file_contents_request in client/Windows/wf_cliprdr.c has missing input checks for a FILECONTENTS_SIZE File Contents Request PDU. | https://nvd.nist.gov/vuln/detail/CVE-2021-37594 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.