idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
276,136 | FreeRDP | 0d79670a28c0ab049af08613621aa0c267f977e9 | https://github.com/FreeRDP/FreeRDP | https://github.com/FreeRDP/FreeRDP/commit/0d79670a28c0ab049af08613621aa0c267f977e9 | Fixed missing input checks for file contents request
reported by Valentino Ricotta (Thalium) | 0 | wf_cliprdr_server_file_contents_request(CliprdrClientContext* context,
const CLIPRDR_FILE_CONTENTS_REQUEST* fileContentsRequest)
{
DWORD uSize = 0;
BYTE* pData = NULL;
HRESULT hRet = S_OK;
FORMATETC vFormatEtc;
LPDATAOBJECT pDataObj = NULL;
STGMEDIUM vStgMedium;
BOOL bIsSt... | 201,572,744,152,935,570,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2021-37594 | In FreeRDP before 2.4.0 on Windows, wf_cliprdr_server_file_contents_request in client/Windows/wf_cliprdr.c has missing input checks for a FILECONTENTS_SIZE File Contents Request PDU. | https://nvd.nist.gov/vuln/detail/CVE-2021-37594 |
198,507 | tensorflow | c570e2ecfc822941335ad48f6e10df4e21f11c96 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/c570e2ecfc822941335ad48f6e10df4e21f11c96 | Fix issues in Conv2DBackpropFilter.
PiperOrigin-RevId: 369772454
Change-Id: I49b465f2ae2ce91def61b56cea8000197d5177d8 | 1 | void Compute(OpKernelContext* context) override {
const Tensor& input = context->input(0);
const Tensor& filter_sizes = context->input(1);
const Tensor& out_backprop = context->input(2);
OP_REQUIRES(
context, TensorShapeUtils::IsVector(filter_sizes.shape()),
errors::InvalidArgument(
... | 214,919,909,721,310,240,000,000,000,000,000,000,000 | conv_grad_filter_ops.cc | 207,258,797,177,321,900,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2021-29540 | TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a heap buffer overflow to occur in `Conv2DBackpropFilter`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/1b0296c3b8dd9bd948f924aa8cd62f87dbb7c3da/tensorflow/core/kernels/conv_grad_filter_ops.c... | https://nvd.nist.gov/vuln/detail/CVE-2021-29540 |
276,197 | tensorflow | c570e2ecfc822941335ad48f6e10df4e21f11c96 | https://github.com/tensorflow/tensorflow | https://github.com/tensorflow/tensorflow/commit/c570e2ecfc822941335ad48f6e10df4e21f11c96 | Fix issues in Conv2DBackpropFilter.
PiperOrigin-RevId: 369772454
Change-Id: I49b465f2ae2ce91def61b56cea8000197d5177d8 | 0 | void Compute(OpKernelContext* context) override {
const Tensor& input = context->input(0);
const Tensor& filter_sizes = context->input(1);
const Tensor& out_backprop = context->input(2);
OP_REQUIRES(
context, TensorShapeUtils::IsVector(filter_sizes.shape()),
errors::InvalidArgument(
... | 52,777,380,010,291,300,000,000,000,000,000,000,000 | conv_grad_filter_ops.cc | 223,655,851,595,757,500,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2021-29540 | TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a heap buffer overflow to occur in `Conv2DBackpropFilter`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/1b0296c3b8dd9bd948f924aa8cd62f87dbb7c3da/tensorflow/core/kernels/conv_grad_filter_ops.c... | https://nvd.nist.gov/vuln/detail/CVE-2021-29540 |
198,514 | linux | cadfad870154e14f745ec845708bc17d166065f2 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/cadfad870154e14f745ec845708bc17d166065f2 | x86/ioperm: Fix io bitmap invalidation on Xen PV
tss_invalidate_io_bitmap() wasn't wired up properly through the pvop
machinery, so the TSS and Xen's io bitmap would get out of sync
whenever disabling a valid io bitmap.
Add a new pvop for tss_invalidate_io_bitmap() to fix it.
This is XSA-329.
Fixes: 22fe5b0439dd ("... | 1 | static inline void tss_invalidate_io_bitmap(struct tss_struct *tss)
{
/*
* Invalidate the I/O bitmap by moving io_bitmap_base outside the
* TSS limit so any subsequent I/O access from user space will
* trigger a #GP.
*
* This is correct even when VMEXIT rewrites the TSS limit
* to 0x67 as the only requirem... | 48,093,674,951,203,940,000,000,000,000,000,000,000 | process.c | 206,298,094,046,840,830,000,000,000,000,000,000,000 | [
"CWE-276"
] | CVE-2020-15852 | An issue was discovered in the Linux kernel 5.5 through 5.7.9, as used in Xen through 4.13.x for x86 PV guests. An attacker may be granted the I/O port permissions of an unrelated task. This occurs because tss_invalidate_io_bitmap mishandling causes a loss of synchronization between the I/O bitmaps of TSS and Xen, aka ... | https://nvd.nist.gov/vuln/detail/CVE-2020-15852 |
276,362 | linux | cadfad870154e14f745ec845708bc17d166065f2 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/cadfad870154e14f745ec845708bc17d166065f2 | x86/ioperm: Fix io bitmap invalidation on Xen PV
tss_invalidate_io_bitmap() wasn't wired up properly through the pvop
machinery, so the TSS and Xen's io bitmap would get out of sync
whenever disabling a valid io bitmap.
Add a new pvop for tss_invalidate_io_bitmap() to fix it.
This is XSA-329.
Fixes: 22fe5b0439dd ("... | 0 | static inline void native_tss_invalidate_io_bitmap(void)
{
/*
* Invalidate the I/O bitmap by moving io_bitmap_base outside the
* TSS limit so any subsequent I/O access from user space will
* trigger a #GP.
*
* This is correct even when VMEXIT rewrites the TSS limit
* to 0x67 as the only requirement is that... | 170,611,018,962,157,200,000,000,000,000,000,000,000 | io_bitmap.h | 265,293,316,003,250,270,000,000,000,000,000,000,000 | [
"CWE-276"
] | CVE-2020-15852 | An issue was discovered in the Linux kernel 5.5 through 5.7.9, as used in Xen through 4.13.x for x86 PV guests. An attacker may be granted the I/O port permissions of an unrelated task. This occurs because tss_invalidate_io_bitmap mishandling causes a loss of synchronization between the I/O bitmaps of TSS and Xen, aka ... | https://nvd.nist.gov/vuln/detail/CVE-2020-15852 |
198,518 | ntopng | f91fbe3d94c8346884271838ae3406ae633f6f15 | https://github.com/ntop/ntopng | https://github.com/ntop/ntopng/commit/f91fbe3d94c8346884271838ae3406ae633f6f15 | Check for presence of crsf in admin scripts | 1 | int Lua::handle_script_request(struct mg_connection *conn,
const struct mg_request_info *request_info,
char *script_path) {
char buf[64], key[64], ifname[MAX_INTERFACE_NAME_LEN];
char *_cookies, user[64] = { '\0' }, outbuf[FILENAME_MAX];
AddressTree ptree;
int rc;
if(!L) return(-1);
lu... | 27,471,343,408,983,460,000,000,000,000,000,000,000 | Lua.cpp | 218,273,907,463,677,640,000,000,000,000,000,000,000 | [
"CWE-284"
] | CVE-2017-5473 | Cross-site request forgery (CSRF) vulnerability in ntopng through 2.4 allows remote attackers to hijack the authentication of arbitrary users, as demonstrated by admin/add_user.lua, admin/change_user_prefs.lua, admin/delete_user.lua, and admin/password_reset.lua. | https://nvd.nist.gov/vuln/detail/CVE-2017-5473 |
276,428 | ntopng | f91fbe3d94c8346884271838ae3406ae633f6f15 | https://github.com/ntop/ntopng | https://github.com/ntop/ntopng/commit/f91fbe3d94c8346884271838ae3406ae633f6f15 | Check for presence of crsf in admin scripts | 0 | int Lua::handle_script_request(struct mg_connection *conn,
const struct mg_request_info *request_info,
char *script_path) {
char buf[64], key[64], ifname[MAX_INTERFACE_NAME_LEN];
char *_cookies, user[64] = { '\0' }, outbuf[FILENAME_MAX];
AddressTree ptree;
int rc;
bool csrf_found = false;
... | 319,670,085,656,497,740,000,000,000,000,000,000,000 | Lua.cpp | 129,001,726,801,090,760,000,000,000,000,000,000,000 | [
"CWE-284"
] | CVE-2017-5473 | Cross-site request forgery (CSRF) vulnerability in ntopng through 2.4 allows remote attackers to hijack the authentication of arbitrary users, as demonstrated by admin/add_user.lua, admin/change_user_prefs.lua, admin/delete_user.lua, and admin/password_reset.lua. | https://nvd.nist.gov/vuln/detail/CVE-2017-5473 |
198,528 | rawspeed | dbe7591e54bad5e6430d38be6bed051582da76b9 | https://github.com/darktable-org/rawspeed | https://github.com/darktable-org/rawspeed/commit/dbe7591e54bad5e6430d38be6bed051582da76b9 | TableLookUp::setTable(): do actually check that the LUT is <2^16 | 1 | void TableLookUp::setTable(int ntable, const std::vector<ushort16>& table) {
assert(!table.empty());
const int nfilled = table.size();
if (ntable > ntables) {
ThrowRDE("Table lookup with number greater than number of tables.");
}
ushort16* t = &tables[ntable * TABLE_SIZE];
if (!dither) {
for (int ... | 34,579,436,879,725,177,000,000,000,000,000,000,000 | TableLookUp.cpp | 97,008,400,419,411,380,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2018-25017 | RawSpeed (aka librawspeed) 3.1 has a heap-based buffer overflow in TableLookUp::setTable. | https://nvd.nist.gov/vuln/detail/CVE-2018-25017 |
276,582 | rawspeed | dbe7591e54bad5e6430d38be6bed051582da76b9 | https://github.com/darktable-org/rawspeed | https://github.com/darktable-org/rawspeed/commit/dbe7591e54bad5e6430d38be6bed051582da76b9 | TableLookUp::setTable(): do actually check that the LUT is <2^16 | 0 | void TableLookUp::setTable(int ntable, const std::vector<ushort16>& table) {
assert(!table.empty());
const int nfilled = table.size();
if (nfilled >= 65536)
ThrowRDE("Table lookup with %i entries is unsupported", nfilled);
if (ntable > ntables) {
ThrowRDE("Table lookup with number greater than number ... | 20,436,006,852,651,972,000,000,000,000,000,000,000 | TableLookUp.cpp | 324,238,232,149,816,900,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2018-25017 | RawSpeed (aka librawspeed) 3.1 has a heap-based buffer overflow in TableLookUp::setTable. | https://nvd.nist.gov/vuln/detail/CVE-2018-25017 |
198,530 | LibRaw | 5563e6ddc3f7cb93d98b491194ceebdee7288d36 | https://github.com/LibRaw/LibRaw | https://github.com/LibRaw/LibRaw/commit/5563e6ddc3f7cb93d98b491194ceebdee7288d36 | Secunia 76000 #2: xtrans allhex not initialized | 1 | void CLASS xtrans_interpolate(int passes)
{
int c, d, f, g, h, i, v, ng, row, col, top, left, mrow, mcol;
#ifdef LIBRAW_LIBRARY_BUILD
int cstat[4]={0,0,0,0};
#endif
int val, ndir, pass, hm[8], avg[4], color[3][8];
static const short orth[12] = {1, 0, 0, 1, -1, 0, 0, -1, 1, 0, 0, 1},
patt[... | 48,187,991,316,381,660,000,000,000,000,000,000,000 | dcraw.c | 138,515,223,629,068,750,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-16910 | An error within the "LibRaw::xtrans_interpolate()" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.6 can be exploited to cause an invalid read memory access and subsequently a Denial of Service condition. | https://nvd.nist.gov/vuln/detail/CVE-2017-16910 |
276,615 | LibRaw | 5563e6ddc3f7cb93d98b491194ceebdee7288d36 | https://github.com/LibRaw/LibRaw | https://github.com/LibRaw/LibRaw/commit/5563e6ddc3f7cb93d98b491194ceebdee7288d36 | Secunia 76000 #2: xtrans allhex not initialized | 0 | void CLASS xtrans_interpolate(int passes)
{
int c, d, f, g, h, i, v, ng, row, col, top, left, mrow, mcol;
#ifdef LIBRAW_LIBRARY_BUILD
int cstat[4]={0,0,0,0};
#endif
int val, ndir, pass, hm[8], avg[4], color[3][8];
static const short orth[12] = {1, 0, 0, 1, -1, 0, 0, -1, 1, 0, 0, 1},
patt[... | 122,758,582,596,936,420,000,000,000,000,000,000,000 | dcraw.c | 244,721,317,821,702,520,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-16910 | An error within the "LibRaw::xtrans_interpolate()" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.6 can be exploited to cause an invalid read memory access and subsequently a Denial of Service condition. | https://nvd.nist.gov/vuln/detail/CVE-2017-16910 |
198,561 | linux | 342ffc26693b528648bdc9377e51e4f2450b4860 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=342ffc26693b528648bdc9377e51e4f2450b4860 | scsi: aacraid: Don't copy uninitialized stack memory to userspace
Both aac_send_raw_srb() and aac_get_hba_info() may copy stack allocated
structs to userspace without initializing all members of these
structs. Clear out this memory to prevent information leaks.
Fixes: 423400e64d377 ("scsi: aacraid: Include HBA direct... | 1 | static int aac_send_raw_srb(struct aac_dev* dev, void __user * arg)
{
struct fib* srbfib;
int status;
struct aac_srb *srbcmd = NULL;
struct aac_hba_cmd_req *hbacmd = NULL;
struct user_aac_srb *user_srbcmd = NULL;
struct user_aac_srb __user *user_srb = arg;
struct aac_srb_reply __user *user_reply;
u32 chn;
u32 ... | 110,829,612,099,652,870,000,000,000,000,000,000,000 | commctrl.c | 146,572,137,852,866,380,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2017-18549 | An issue was discovered in drivers/scsi/aacraid/commctrl.c in the Linux kernel before 4.13. There is potential exposure of kernel stack memory because aac_send_raw_srb does not initialize the reply structure. | https://nvd.nist.gov/vuln/detail/CVE-2017-18549 |
277,073 | linux | 342ffc26693b528648bdc9377e51e4f2450b4860 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=342ffc26693b528648bdc9377e51e4f2450b4860 | scsi: aacraid: Don't copy uninitialized stack memory to userspace
Both aac_send_raw_srb() and aac_get_hba_info() may copy stack allocated
structs to userspace without initializing all members of these
structs. Clear out this memory to prevent information leaks.
Fixes: 423400e64d377 ("scsi: aacraid: Include HBA direct... | 0 | static int aac_send_raw_srb(struct aac_dev* dev, void __user * arg)
{
struct fib* srbfib;
int status;
struct aac_srb *srbcmd = NULL;
struct aac_hba_cmd_req *hbacmd = NULL;
struct user_aac_srb *user_srbcmd = NULL;
struct user_aac_srb __user *user_srb = arg;
struct aac_srb_reply __user *user_reply;
u32 chn;
u32 ... | 48,740,376,612,584,800,000,000,000,000,000,000,000 | commctrl.c | 60,313,794,856,835,650,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2017-18549 | An issue was discovered in drivers/scsi/aacraid/commctrl.c in the Linux kernel before 4.13. There is potential exposure of kernel stack memory because aac_send_raw_srb does not initialize the reply structure. | https://nvd.nist.gov/vuln/detail/CVE-2017-18549 |
198,565 | qemu | 99ccfaa1edafd79f7a3a0ff7b58ae4da7c514928 | https://github.com/bonzini/qemu | https://git.qemu.org/?p=qemu.git;a=commit;h=99ccfaa1edafd79f7a3a0ff7b58ae4da7c514928 | pcnet: switch to use qemu_receive_packet() for loopback
This patch switches to use qemu_receive_packet() which can detect
reentrancy and return early.
This is intended to address CVE-2021-3416.
Cc: Prasad J Pandit <ppandit@redhat.com>
Cc: qemu-stable@nongnu.org
Buglink: https://bugs.launchpad.net/qemu/+bug/1917085
R... | 1 | static void pcnet_transmit(PCNetState *s)
{
hwaddr xmit_cxda = 0;
int count = CSR_XMTRL(s)-1;
int add_crc = 0;
int bcnt;
s->xmit_pos = -1;
if (!CSR_TXON(s)) {
s->csr[0] &= ~0x0008;
return;
}
s->tx_busy = 1;
txagain:
if (pcnet_tdte_poll(s)) {
struct pcnet_TM... | 139,148,100,945,581,000,000,000,000,000,000,000,000 | pcnet.c | 268,636,879,995,922,970,000,000,000,000,000,000,000 | [
"CWE-835"
] | CVE-2021-3416 | A potential stack overflow via infinite loop issue was found in various NIC emulators of QEMU in versions up to and including 5.2.0. The issue occurs in loopback mode of a NIC wherein reentrant DMA checks get bypassed. A guest user/process may use this flaw to consume CPU cycles or crash the QEMU process on the host re... | https://nvd.nist.gov/vuln/detail/CVE-2021-3416 |
277,464 | qemu | 99ccfaa1edafd79f7a3a0ff7b58ae4da7c514928 | https://github.com/bonzini/qemu | https://git.qemu.org/?p=qemu.git;a=commit;h=99ccfaa1edafd79f7a3a0ff7b58ae4da7c514928 | pcnet: switch to use qemu_receive_packet() for loopback
This patch switches to use qemu_receive_packet() which can detect
reentrancy and return early.
This is intended to address CVE-2021-3416.
Cc: Prasad J Pandit <ppandit@redhat.com>
Cc: qemu-stable@nongnu.org
Buglink: https://bugs.launchpad.net/qemu/+bug/1917085
R... | 0 | static void pcnet_transmit(PCNetState *s)
{
hwaddr xmit_cxda = 0;
int count = CSR_XMTRL(s)-1;
int add_crc = 0;
int bcnt;
s->xmit_pos = -1;
if (!CSR_TXON(s)) {
s->csr[0] &= ~0x0008;
return;
}
s->tx_busy = 1;
txagain:
if (pcnet_tdte_poll(s)) {
struct pcnet_TM... | 50,331,905,634,955,580,000,000,000,000,000,000,000 | pcnet.c | 125,366,948,590,600,870,000,000,000,000,000,000,000 | [
"CWE-835"
] | CVE-2021-3416 | A potential stack overflow via infinite loop issue was found in various NIC emulators of QEMU in versions up to and including 5.2.0. The issue occurs in loopback mode of a NIC wherein reentrant DMA checks get bypassed. A guest user/process may use this flaw to consume CPU cycles or crash the QEMU process on the host re... | https://nvd.nist.gov/vuln/detail/CVE-2021-3416 |
198,578 | torque | 64da0af7ed27284f3397081313850bba270593db | https://github.com/adaptivecomputing/torque | https://github.com/adaptivecomputing/torque/commit/64da0af7ed27284f3397081313850bba270593db | Fix CVE 2013-4495. Note: this patch has been verified as fixing this security hole but has not received other regression testing. | 1 | void svr_mailowner(
job *pjob, /* I */
int mailpoint, /* note, single character */
int force, /* if set to MAIL_FORCE, force mail delivery */
char *text) /* (optional) additional message text */
{
char *cmdbuf;
int i;
char *mailfrom;
char mailto[1024];
char *bodyfmt, *... | 170,670,393,942,047,970,000,000,000,000,000,000,000 | svr_mail.c | 107,858,544,101,674,440,000,000,000,000,000,000,000 | [
"CWE-94"
] | CVE-2013-4495 | The send_the_mail function in server/svr_mail.c in Terascale Open-Source Resource and Queue Manager (aka TORQUE Resource Manager) before 4.2.6 allows remote attackers to execute arbitrary commands via shell metacharacters in the email (-M switch) to qsub. | https://nvd.nist.gov/vuln/detail/CVE-2013-4495 |
277,678 | torque | 64da0af7ed27284f3397081313850bba270593db | https://github.com/adaptivecomputing/torque | https://github.com/adaptivecomputing/torque/commit/64da0af7ed27284f3397081313850bba270593db | Fix CVE 2013-4495. Note: this patch has been verified as fixing this security hole but has not received other regression testing. | 0 | void svr_mailowner(
job *pjob, /* I */
int mailpoint, /* note, single character */
int force, /* if set to MAIL_FORCE, force mail delivery */
char *text) /* (optional) additional message text */
{
int status = 0;
int numargs = 0;
int pipes[2];
int ... | 318,859,164,700,357,440,000,000,000,000,000,000,000 | svr_mail.c | 275,508,811,009,353,140,000,000,000,000,000,000,000 | [
"CWE-94"
] | CVE-2013-4495 | The send_the_mail function in server/svr_mail.c in Terascale Open-Source Resource and Queue Manager (aka TORQUE Resource Manager) before 4.2.6 allows remote attackers to execute arbitrary commands via shell metacharacters in the email (-M switch) to qsub. | https://nvd.nist.gov/vuln/detail/CVE-2013-4495 |
198,627 | linux | 57be09c6e8747bf48704136d9e3f92bfb93f5725 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/57be09c6e8747bf48704136d9e3f92bfb93f5725 | drm/amdgpu: fix multiple memory leaks in acp_hw_init
In acp_hw_init there are some allocations that needs to be released in
case of failure:
1- adev->acp.acp_genpd should be released if any allocation attemp for
adev->acp.acp_cell, adev->acp.acp_res or i2s_pdata fails.
2- all of those allocations should be released i... | 1 | static int acp_hw_init(void *handle)
{
int r, i;
uint64_t acp_base;
u32 val = 0;
u32 count = 0;
struct device *dev;
struct i2s_platform_data *i2s_pdata;
struct amdgpu_device *adev = (struct amdgpu_device *)handle;
const struct amdgpu_ip_block *ip_block =
amdgpu_device_ip_get_ip_block(adev, AMD_IP_BLOCK_TYPE... | 294,924,708,953,945,980,000,000,000,000,000,000,000 | amdgpu_acp.c | 144,565,265,513,438,020,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2019-19067 | Four memory leaks in the acp_hw_init() function in drivers/gpu/drm/amd/amdgpu/amdgpu_acp.c in the Linux kernel before 5.3.8 allow attackers to cause a denial of service (memory consumption) by triggering mfd_add_hotplug_devices() or pm_genpd_add_device() failures, aka CID-57be09c6e874. NOTE: third parties dispute the r... | https://nvd.nist.gov/vuln/detail/CVE-2019-19067 |
279,440 | linux | 57be09c6e8747bf48704136d9e3f92bfb93f5725 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/57be09c6e8747bf48704136d9e3f92bfb93f5725 | drm/amdgpu: fix multiple memory leaks in acp_hw_init
In acp_hw_init there are some allocations that needs to be released in
case of failure:
1- adev->acp.acp_genpd should be released if any allocation attemp for
adev->acp.acp_cell, adev->acp.acp_res or i2s_pdata fails.
2- all of those allocations should be released i... | 0 | static int acp_hw_init(void *handle)
{
int r, i;
uint64_t acp_base;
u32 val = 0;
u32 count = 0;
struct device *dev;
struct i2s_platform_data *i2s_pdata = NULL;
struct amdgpu_device *adev = (struct amdgpu_device *)handle;
const struct amdgpu_ip_block *ip_block =
amdgpu_device_ip_get_ip_block(adev, AMD_IP_BLO... | 196,934,146,480,642,600,000,000,000,000,000,000,000 | amdgpu_acp.c | 215,280,403,172,808,540,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2019-19067 | Four memory leaks in the acp_hw_init() function in drivers/gpu/drm/amd/amdgpu/amdgpu_acp.c in the Linux kernel before 5.3.8 allow attackers to cause a denial of service (memory consumption) by triggering mfd_add_hotplug_devices() or pm_genpd_add_device() failures, aka CID-57be09c6e874. NOTE: third parties dispute the r... | https://nvd.nist.gov/vuln/detail/CVE-2019-19067 |
198,628 | ghostpdl | a6f7464dddc689386668a38b92dfd03cc1b38a10 | https://github.com/ArtifexSoftware/ghostpdl | https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=a6f7464dddc689386668a38b92dfd03cc1b38a10 | Bug 701827: fixed incorrect buffer expansion in lxm5700m_print_page().
Fixes:
./sanbin/gs -dBATCH -dNOPAUSE -r425 -dFitPage -sOutputFile=tmp -sDEVICE=lxm5700m ../bug-701827.eps | 1 | /* ------ Driver procedures ------ */
/* Send the page to the printer. */
static int
lxm5700m_print_page(gx_device_printer *pdev, gp_file *prn_stream)
{
int lnum,minX, maxX, i, l, highestX, leastX, extent;
int direction = RIGHTWARD;
int lastY = 0;
int line_size = gdev_mem_bytes_per_scan_line((gx_devic... | 73,748,361,173,510,950,000,000,000,000,000,000,000 | gdevlxm.c | 153,576,846,436,215,060,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2020-16309 | A buffer overflow vulnerability in lxm5700m_print_page() in devices/gdevlxm.c of Artifex Software GhostScript v9.50 allows a remote attacker to cause a denial of service via a crafted eps file. This is fixed in v9.51. | https://nvd.nist.gov/vuln/detail/CVE-2020-16309 |
279,444 | ghostpdl | a6f7464dddc689386668a38b92dfd03cc1b38a10 | https://github.com/ArtifexSoftware/ghostpdl | https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=a6f7464dddc689386668a38b92dfd03cc1b38a10 | Bug 701827: fixed incorrect buffer expansion in lxm5700m_print_page().
Fixes:
./sanbin/gs -dBATCH -dNOPAUSE -r425 -dFitPage -sOutputFile=tmp -sDEVICE=lxm5700m ../bug-701827.eps | 0 | /* ------ Driver procedures ------ */
/* Send the page to the printer. */
static int
lxm5700m_print_page(gx_device_printer *pdev, gp_file *prn_stream)
{
int lnum,minX, maxX, i, l, highestX, leastX, extent;
int direction = RIGHTWARD;
int lastY = 0;
int line_size = gdev_mem_bytes_per_scan_line((gx_devic... | 101,994,055,001,164,850,000,000,000,000,000,000,000 | gdevlxm.c | 38,232,670,782,579,270,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2020-16309 | A buffer overflow vulnerability in lxm5700m_print_page() in devices/gdevlxm.c of Artifex Software GhostScript v9.50 allows a remote attacker to cause a denial of service via a crafted eps file. This is fixed in v9.51. | https://nvd.nist.gov/vuln/detail/CVE-2020-16309 |
198,635 | vim | 083692d598139228e101b8c521aaef7bcf256e9a | https://github.com/vim/vim | https://github.com/vim/vim/commit/083692d598139228e101b8c521aaef7bcf256e9a | patch 9.0.0009: going past the end of a menu item with only modifier
Problem: Going past the end of a menu item with only modifier.
Solution: Check for NUL. | 1 | str2special(
char_u **sp,
int from) // TRUE for lhs of mapping
{
int c;
static char_u buf[7];
char_u *str = *sp;
int modifiers = 0;
int special = FALSE;
if (has_mbyte)
{
char_u *p;
// Try to un-escape a multi-byte character. Return the un-escaped
// string if it is a mu... | 320,014,315,609,484,420,000,000,000,000,000,000,000 | message.c | 63,981,976,468,082,630,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2022-2257 | Out-of-bounds Read in GitHub repository vim/vim prior to 9.0. | https://nvd.nist.gov/vuln/detail/CVE-2022-2257 |
279,564 | vim | 083692d598139228e101b8c521aaef7bcf256e9a | https://github.com/vim/vim | https://github.com/vim/vim/commit/083692d598139228e101b8c521aaef7bcf256e9a | patch 9.0.0009: going past the end of a menu item with only modifier
Problem: Going past the end of a menu item with only modifier.
Solution: Check for NUL. | 0 | str2special(
char_u **sp,
int from) // TRUE for lhs of mapping
{
int c;
static char_u buf[7];
char_u *str = *sp;
int modifiers = 0;
int special = FALSE;
if (has_mbyte)
{
char_u *p;
// Try to un-escape a multi-byte character. Return the un-escaped
// string if it is a mu... | 9,858,792,741,574,116,000,000,000,000,000,000,000 | message.c | 320,483,359,538,749,560,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2022-2257 | Out-of-bounds Read in GitHub repository vim/vim prior to 9.0. | https://nvd.nist.gov/vuln/detail/CVE-2022-2257 |
198,669 | libbsd | 9d917aad37778a9f4a96ba358415f077f3f36f3b | https://gitlab.freedesktop.org/libbsd/libbsd | https://gitlab.freedesktop.org/libbsd/libbsd/commit/9d917aad37778a9f4a96ba358415f077f3f36f3b | nlist: Fix out-of-bounds read on strtab
When doing a string comparison for a symbol name from the string table,
we should make sure we do a bounded comparison, otherwise a non-NUL
terminated string might make the code read out-of-bounds.
Warned-by: coverity | 1 | __fdnlist(int fd, struct nlist *list)
{
struct nlist *p;
Elf_Off symoff = 0, symstroff = 0;
Elf_Word symsize = 0, symstrsize = 0;
Elf_Sword cc, i;
int nent = -1;
int errsave;
Elf_Sym sbuf[1024];
Elf_Sym *s;
Elf_Ehdr ehdr;
char *strtab = NULL;
Elf_Shdr *shdr = NULL;
Elf_Word shdr_size;
struct stat st;
/* ... | 118,100,133,344,550,690,000,000,000,000,000,000,000 | nlist.c | 121,027,983,985,129,320,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-20367 | nlist.c in libbsd before 0.10.0 has an out-of-bounds read during a comparison for a symbol name from the string table (strtab). | https://nvd.nist.gov/vuln/detail/CVE-2019-20367 |
280,284 | libbsd | 9d917aad37778a9f4a96ba358415f077f3f36f3b | https://gitlab.freedesktop.org/libbsd/libbsd | https://gitlab.freedesktop.org/libbsd/libbsd/commit/9d917aad37778a9f4a96ba358415f077f3f36f3b | nlist: Fix out-of-bounds read on strtab
When doing a string comparison for a symbol name from the string table,
we should make sure we do a bounded comparison, otherwise a non-NUL
terminated string might make the code read out-of-bounds.
Warned-by: coverity | 0 | __fdnlist(int fd, struct nlist *list)
{
struct nlist *p;
Elf_Off symoff = 0, symstroff = 0;
Elf_Word symsize = 0, symstrsize = 0;
Elf_Sword cc, i;
int nent = -1;
int errsave;
Elf_Sym sbuf[1024];
Elf_Sym *s;
Elf_Ehdr ehdr;
char *strtab = NULL;
Elf_Shdr *shdr = NULL;
Elf_Word shdr_size;
struct stat st;
/* ... | 90,156,776,775,514,740,000,000,000,000,000,000,000 | nlist.c | 298,242,182,717,567,550,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-20367 | nlist.c in libbsd before 0.10.0 has an out-of-bounds read during a comparison for a symbol name from the string table (strtab). | https://nvd.nist.gov/vuln/detail/CVE-2019-20367 |
198,671 | qemu | 04bf2526ce87f21b32c9acba1c5518708c243ad0 | https://github.com/bonzini/qemu | https://git.qemu.org/?p=qemu.git;a=commitdiff;h=04bf2526ce87f21b32c9acba1c5518708c243ad0 | exec: use qemu_ram_ptr_length to access guest ram
When accessing guest's ram block during DMA operation, use
'qemu_ram_ptr_length' to get ram block pointer. It ensures
that DMA operation of given length is possible; And avoids
any OOB memory access situations.
Reported-by: Alex <broscutamaker@gmail.com>
Signed-off-by... | 1 | static MemTxResult address_space_write_continue(AddressSpace *as, hwaddr addr,
MemTxAttrs attrs,
const uint8_t *buf,
int len, hwaddr addr1,
... | 114,559,029,617,645,620,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2017-11334 | The address_space_write_continue function in exec.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (out-of-bounds access and guest instance crash) by leveraging use of qemu_map_ram_ptr to access guest ram block area. | https://nvd.nist.gov/vuln/detail/CVE-2017-11334 |
280,392 | qemu | 04bf2526ce87f21b32c9acba1c5518708c243ad0 | https://github.com/bonzini/qemu | https://git.qemu.org/?p=qemu.git;a=commitdiff;h=04bf2526ce87f21b32c9acba1c5518708c243ad0 | exec: use qemu_ram_ptr_length to access guest ram
When accessing guest's ram block during DMA operation, use
'qemu_ram_ptr_length' to get ram block pointer. It ensures
that DMA operation of given length is possible; And avoids
any OOB memory access situations.
Reported-by: Alex <broscutamaker@gmail.com>
Signed-off-by... | 0 | static MemTxResult address_space_write_continue(AddressSpace *as, hwaddr addr,
MemTxAttrs attrs,
const uint8_t *buf,
int len, hwaddr addr1,
... | 136,207,157,571,170,200,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2017-11334 | The address_space_write_continue function in exec.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (out-of-bounds access and guest instance crash) by leveraging use of qemu_map_ram_ptr to access guest ram block area. | https://nvd.nist.gov/vuln/detail/CVE-2017-11334 |
198,688 | curl | facb0e4662415b5f28163e853dc6742ac5fafb3d | https://github.com/curl/curl | https://github.com/curl/curl/commit/facb0e4662415b5f28163e853dc6742ac5fafb3d | tftp: Alloc maximum blksize, and use default unless OACK is received
Fixes potential buffer overflow from 'recvfrom()', should the server
return an OACK without blksize.
Bug: https://curl.haxx.se/docs/CVE-2019-5482.html
CVE-2019-5482 | 1 | static CURLcode tftp_connect(struct connectdata *conn, bool *done)
{
tftp_state_data_t *state;
int blksize;
blksize = TFTP_BLKSIZE_DEFAULT;
state = conn->proto.tftpc = calloc(1, sizeof(tftp_state_data_t));
if(!state)
return CURLE_OUT_OF_MEMORY;
/* alloc pkt buffers based on specified blksize */
if(... | 334,474,004,361,167,550,000,000,000,000,000,000,000 | tftp.c | 153,438,150,488,022,250,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2019-5482 | Heap buffer overflow in the TFTP protocol handler in cURL 7.19.4 to 7.65.3. | https://nvd.nist.gov/vuln/detail/CVE-2019-5482 |
280,993 | curl | facb0e4662415b5f28163e853dc6742ac5fafb3d | https://github.com/curl/curl | https://github.com/curl/curl/commit/facb0e4662415b5f28163e853dc6742ac5fafb3d | tftp: Alloc maximum blksize, and use default unless OACK is received
Fixes potential buffer overflow from 'recvfrom()', should the server
return an OACK without blksize.
Bug: https://curl.haxx.se/docs/CVE-2019-5482.html
CVE-2019-5482 | 0 | static CURLcode tftp_connect(struct connectdata *conn, bool *done)
{
tftp_state_data_t *state;
int blksize;
int need_blksize;
blksize = TFTP_BLKSIZE_DEFAULT;
state = conn->proto.tftpc = calloc(1, sizeof(tftp_state_data_t));
if(!state)
return CURLE_OUT_OF_MEMORY;
/* alloc pkt buffers based on specif... | 220,634,725,961,809,700,000,000,000,000,000,000,000 | tftp.c | 37,309,379,106,874,907,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2019-5482 | Heap buffer overflow in the TFTP protocol handler in cURL 7.19.4 to 7.65.3. | https://nvd.nist.gov/vuln/detail/CVE-2019-5482 |
198,702 | radare2 | d7ea20fb2e1433ebece9f004d87ad8f2377af23d | https://github.com/radare/radare2 | https://github.com/radareorg/radare2/commit/d7ea20fb2e1433ebece9f004d87ad8f2377af23d | Fix #18923 - Fix resource exhaustion bug in LE binary (#18926) | 1 | RList *r_bin_le_get_sections(r_bin_le_obj_t *bin) {
RList *l = r_list_newf ((RListFree)r_bin_section_free);
if (!l) {
return NULL;
}
LE_image_header *h = bin->header;
ut32 pages_start_off = h->datapage;
int i;
for (i = 0; i < h->objcnt; i++) {
RBinSection *sec = R_NEW0 (RBinSection);
if (!sec) {
return ... | 180,615,110,394,324,550,000,000,000,000,000,000,000 | le.c | 277,124,640,300,376,060,000,000,000,000,000,000,000 | [
"CWE-252"
] | CVE-2021-3673 | A vulnerability was found in Radare2 in version 5.3.1. Improper input validation when reading a crafted LE binary can lead to resource exhaustion and DoS. | https://nvd.nist.gov/vuln/detail/CVE-2021-3673 |
281,603 | radare2 | d7ea20fb2e1433ebece9f004d87ad8f2377af23d | https://github.com/radare/radare2 | https://github.com/radareorg/radare2/commit/d7ea20fb2e1433ebece9f004d87ad8f2377af23d | Fix #18923 - Fix resource exhaustion bug in LE binary (#18926) | 0 | RList *r_bin_le_get_sections(r_bin_le_obj_t *bin) {
RList *l = r_list_newf ((RListFree)r_bin_section_free);
if (!l) {
return NULL;
}
LE_image_header *h = bin->header;
ut32 pages_start_off = h->datapage;
int i;
for (i = 0; i < h->objcnt; i++) {
RBinSection *sec = R_NEW0 (RBinSection);
if (!sec) {
return ... | 213,466,854,100,468,980,000,000,000,000,000,000,000 | le.c | 126,459,988,547,278,510,000,000,000,000,000,000,000 | [
"CWE-252"
] | CVE-2021-3673 | A vulnerability was found in Radare2 in version 5.3.1. Improper input validation when reading a crafted LE binary can lead to resource exhaustion and DoS. | https://nvd.nist.gov/vuln/detail/CVE-2021-3673 |
198,711 | php-src | 780ff63c377dc79de2c04d6b341913ab0102135b | https://github.com/php/php-src | http://git.php.net/?p=php-src.git;a=commit;h=780ff63c377dc79de2c04d6b341913ab0102135b | MFH: Fixed bug #46746 (xmlrpc_decode_request outputs non-suppressable error
when given bad data). | 1 | xml_element* xml_elem_parse_buf(const char* in_buf, int len, XML_ELEM_INPUT_OPTIONS options, XML_ELEM_ERROR error)
{
xml_element* xReturn = NULL;
char buf[100] = "";
static STRUCT_XML_ELEM_INPUT_OPTIONS default_opts = {encoding_utf_8};
if(!options) {
options = &default_opts;
}
if(in_buf) {
... | 78,706,985,366,586,345,000,000,000,000,000,000,000 | xml_element.c | 333,675,080,185,818,950,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-9020 | An issue was discovered in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1. Invalid input to the function xmlrpc_decode() can lead to an invalid memory access (heap out of bounds read or read after free). This is related to xml_elem_parse_buf in ext/xmlrpc/libxmlrpc/xml_element.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-9020 |
282,083 | php-src | 780ff63c377dc79de2c04d6b341913ab0102135b | https://github.com/php/php-src | http://git.php.net/?p=php-src.git;a=commit;h=780ff63c377dc79de2c04d6b341913ab0102135b | MFH: Fixed bug #46746 (xmlrpc_decode_request outputs non-suppressable error
when given bad data). | 0 | xml_element* xml_elem_parse_buf(const char* in_buf, int len, XML_ELEM_INPUT_OPTIONS options, XML_ELEM_ERROR error)
{
xml_element* xReturn = NULL;
char buf[100] = "";
static STRUCT_XML_ELEM_INPUT_OPTIONS default_opts = {encoding_utf_8};
if(!options) {
options = &default_opts;
}
if(in_buf) {
... | 104,936,085,074,506,120,000,000,000,000,000,000,000 | xml_element.c | 239,657,393,220,256,050,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-9020 | An issue was discovered in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1. Invalid input to the function xmlrpc_decode() can lead to an invalid memory access (heap out of bounds read or read after free). This is related to xml_elem_parse_buf in ext/xmlrpc/libxmlrpc/xml_element.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-9020 |
198,734 | linux | 81b1d548d00bcd028303c4f3150fa753b9b8aa71 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=81b1d548d00bcd028303c4f3150fa753b9b8aa71 | hamradio: remove needs_free_netdev to avoid UAF
The former patch "defer 6pack kfree after unregister_netdev" reorders
the kfree of two buffer after the unregister_netdev to prevent the race
condition. It also adds free_netdev() function in sixpack_close(), which
is a direct copy from the similar code in mkiss_close().... | 1 | static void sp_setup(struct net_device *dev)
{
/* Finish setting up the DEVICE info. */
dev->netdev_ops = &sp_netdev_ops;
dev->needs_free_netdev = true;
dev->mtu = SIXP_MTU;
dev->hard_header_len = AX25_MAX_HEADER_LEN;
dev->header_ops = &ax25_header_ops;
dev->addr_len = AX25_ADDR_LEN;
dev->type = ARPHRD_AX... | 191,845,120,214,579,340,000,000,000,000,000,000,000 | None | null | [
"CWE-416"
] | CVE-2022-1195 | A use-after-free vulnerability was found in the Linux kernel in drivers/net/hamradio. This flaw allows a local attacker with a user privilege to cause a denial of service (DOS) when the mkiss or sixpack device is detached and reclaim resources early. | https://nvd.nist.gov/vuln/detail/CVE-2022-1195 |
282,826 | linux | 81b1d548d00bcd028303c4f3150fa753b9b8aa71 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=81b1d548d00bcd028303c4f3150fa753b9b8aa71 | hamradio: remove needs_free_netdev to avoid UAF
The former patch "defer 6pack kfree after unregister_netdev" reorders
the kfree of two buffer after the unregister_netdev to prevent the race
condition. It also adds free_netdev() function in sixpack_close(), which
is a direct copy from the similar code in mkiss_close().... | 0 | static void sp_setup(struct net_device *dev)
{
/* Finish setting up the DEVICE info. */
dev->netdev_ops = &sp_netdev_ops;
dev->mtu = SIXP_MTU;
dev->hard_header_len = AX25_MAX_HEADER_LEN;
dev->header_ops = &ax25_header_ops;
dev->addr_len = AX25_ADDR_LEN;
dev->type = ARPHRD_AX25;
dev->tx_queue_len = 10;
/... | 40,122,625,570,750,866,000,000,000,000,000,000,000 | None | null | [
"CWE-416"
] | CVE-2022-1195 | A use-after-free vulnerability was found in the Linux kernel in drivers/net/hamradio. This flaw allows a local attacker with a user privilege to cause a denial of service (DOS) when the mkiss or sixpack device is detached and reclaim resources early. | https://nvd.nist.gov/vuln/detail/CVE-2022-1195 |
198,753 | ghostpdl | 407c98a38c3a6ac1681144ed45cc2f4fc374c91f | https://github.com/ArtifexSoftware/ghostpdl | http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=407c98a38c3a6ac1681144ed45cc2f4fc374c91f | txtwrite - guard against using GS_NO_GLYPH to retrieve Unicode values
Bug 701822 "Segmentation fault at psi/iname.c:296 in names_index_ref"
Avoid using a glyph with the value GS_NO_GLYPH to retrieve a glyph
name or Unicode code point from the glyph ID, as this is not a valid
ID. | 1 | gs_font_map_glyph_to_unicode(gs_font *font, gs_glyph glyph, int ch, ushort *u, unsigned int length)
{
font_data *pdata = pfont_data(font);
const ref *UnicodeDecoding;
uchar *unicode_return = (uchar *)u;
if (r_type(&pdata->GlyphNames2Unicode) == t_dictionary) {
int c = gs_font_map_glyph_by_dict(... | 175,680,165,182,207,670,000,000,000,000,000,000,000 | zbfont.c | 313,775,604,351,038,070,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2020-16307 | A null pointer dereference vulnerability in devices/vector/gdevtxtw.c and psi/zbfont.c of Artifex Software GhostScript v9.50 allows a remote attacker to cause a denial of service via a crafted postscript file. This is fixed in v9.51. | https://nvd.nist.gov/vuln/detail/CVE-2020-16307 |
283,088 | ghostpdl | 407c98a38c3a6ac1681144ed45cc2f4fc374c91f | https://github.com/ArtifexSoftware/ghostpdl | http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=407c98a38c3a6ac1681144ed45cc2f4fc374c91f | txtwrite - guard against using GS_NO_GLYPH to retrieve Unicode values
Bug 701822 "Segmentation fault at psi/iname.c:296 in names_index_ref"
Avoid using a glyph with the value GS_NO_GLYPH to retrieve a glyph
name or Unicode code point from the glyph ID, as this is not a valid
ID. | 0 | gs_font_map_glyph_to_unicode(gs_font *font, gs_glyph glyph, int ch, ushort *u, unsigned int length)
{
font_data *pdata = pfont_data(font);
const ref *UnicodeDecoding;
uchar *unicode_return = (uchar *)u;
if (r_type(&pdata->GlyphNames2Unicode) == t_dictionary) {
int c = gs_font_map_glyph_by_dict(... | 201,309,674,587,370,700,000,000,000,000,000,000,000 | zbfont.c | 41,158,945,251,702,383,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2020-16307 | A null pointer dereference vulnerability in devices/vector/gdevtxtw.c and psi/zbfont.c of Artifex Software GhostScript v9.50 allows a remote attacker to cause a denial of service via a crafted postscript file. This is fixed in v9.51. | https://nvd.nist.gov/vuln/detail/CVE-2020-16307 |
198,780 | linux | 3450121997ce872eb7f1248417225827ea249710 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3450121997ce872eb7f1248417225827ea249710 | ALSA: line6: Fix write on zero-sized buffer
LINE6 drivers allocate the buffers based on the value returned from
usb_maxpacket() calls. The manipulated device may return zero for
this, and this results in the kmalloc() with zero size (and it may
succeed) while the other part of the driver code writes the packet
data w... | 1 | int line6_init_pcm(struct usb_line6 *line6,
struct line6_pcm_properties *properties)
{
int i, err;
unsigned ep_read = line6->properties->ep_audio_r;
unsigned ep_write = line6->properties->ep_audio_w;
struct snd_pcm *pcm;
struct snd_line6_pcm *line6pcm;
if (!(line6->properties->capabilities & LINE6_CAP_PCM))... | 260,239,399,252,131,760,000,000,000,000,000,000,000 | pcm.c | 139,549,960,767,837,740,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2019-15221 | An issue was discovered in the Linux kernel before 5.1.17. There is a NULL pointer dereference caused by a malicious USB device in the sound/usb/line6/pcm.c driver. | https://nvd.nist.gov/vuln/detail/CVE-2019-15221 |
283,562 | linux | 3450121997ce872eb7f1248417225827ea249710 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3450121997ce872eb7f1248417225827ea249710 | ALSA: line6: Fix write on zero-sized buffer
LINE6 drivers allocate the buffers based on the value returned from
usb_maxpacket() calls. The manipulated device may return zero for
this, and this results in the kmalloc() with zero size (and it may
succeed) while the other part of the driver code writes the packet
data w... | 0 | int line6_init_pcm(struct usb_line6 *line6,
struct line6_pcm_properties *properties)
{
int i, err;
unsigned ep_read = line6->properties->ep_audio_r;
unsigned ep_write = line6->properties->ep_audio_w;
struct snd_pcm *pcm;
struct snd_line6_pcm *line6pcm;
if (!(line6->properties->capabilities & LINE6_CAP_PCM))... | 176,261,085,883,079,360,000,000,000,000,000,000,000 | pcm.c | 90,863,622,147,816,550,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2019-15221 | An issue was discovered in the Linux kernel before 5.1.17. There is a NULL pointer dereference caused by a malicious USB device in the sound/usb/line6/pcm.c driver. | https://nvd.nist.gov/vuln/detail/CVE-2019-15221 |
198,781 | cpython | 6c004b40f9d51872d848981ef1a18bb08c2dfc42 | https://github.com/python/cpython | https://github.com/python/cpython/commit/6c004b40f9d51872d848981ef1a18bb08c2dfc42 | bpo-30657: Fix CVE-2017-1000158 (#4758)
Fixes possible integer overflow in PyBytes_DecodeEscape.
Co-Authored-By: Jay Bosamiya <jaybosamiya@gmail.com> | 1 | PyObject *PyBytes_DecodeEscape(const char *s,
Py_ssize_t len,
const char *errors,
Py_ssize_t unicode,
const char *recode_encoding)
{
int c;
char *p, *buf;
const char *end;
PyOb... | 246,593,730,403,734,330,000,000,000,000,000,000,000 | bytesobject.c | 170,066,888,576,529,100,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2017-1000158 | CPython (aka Python) up to 2.7.13 is vulnerable to an integer overflow in the PyString_DecodeEscape function in stringobject.c, resulting in heap-based buffer overflow (and possible arbitrary code execution) | https://nvd.nist.gov/vuln/detail/CVE-2017-1000158 |
283,599 | cpython | 6c004b40f9d51872d848981ef1a18bb08c2dfc42 | https://github.com/python/cpython | https://github.com/python/cpython/commit/6c004b40f9d51872d848981ef1a18bb08c2dfc42 | bpo-30657: Fix CVE-2017-1000158 (#4758)
Fixes possible integer overflow in PyBytes_DecodeEscape.
Co-Authored-By: Jay Bosamiya <jaybosamiya@gmail.com> | 0 | PyObject *PyBytes_DecodeEscape(const char *s,
Py_ssize_t len,
const char *errors,
Py_ssize_t unicode,
const char *recode_encoding)
{
int c;
char *p, *buf;
const char *end;
PyOb... | 80,273,896,648,914,235,000,000,000,000,000,000,000 | bytesobject.c | 117,490,261,829,986,170,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2017-1000158 | CPython (aka Python) up to 2.7.13 is vulnerable to an integer overflow in the PyString_DecodeEscape function in stringobject.c, resulting in heap-based buffer overflow (and possible arbitrary code execution) | https://nvd.nist.gov/vuln/detail/CVE-2017-1000158 |
198,813 | linux | 5d2e73a5f80a5b5aff3caf1ec6d39b5b3f54b26e | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5d2e73a5f80a5b5aff3caf1ec6d39b5b3f54b26e | media: usb:zr364xx:Fix KASAN:null-ptr-deref Read in zr364xx_vidioc_querycap
SyzKaller hit the null pointer deref while reading from uninitialized
udev->product in zr364xx_vidioc_querycap().
==================================================================
BUG: KASAN: null-ptr-deref in read_word_at_a_time+0xe/0x20
in... | 1 | static int zr364xx_vidioc_querycap(struct file *file, void *priv,
struct v4l2_capability *cap)
{
struct zr364xx_camera *cam = video_drvdata(file);
strscpy(cap->driver, DRIVER_DESC, sizeof(cap->driver));
strscpy(cap->card, cam->udev->product, sizeof(cap->card));
strscpy(cap->bus_info, dev_name(&cam->udev->de... | 124,923,064,994,961,590,000,000,000,000,000,000,000 | zr364xx.c | 268,814,773,649,650,980,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2019-15217 | An issue was discovered in the Linux kernel before 5.2.3. There is a NULL pointer dereference caused by a malicious USB device in the drivers/media/usb/zr364xx/zr364xx.c driver. | https://nvd.nist.gov/vuln/detail/CVE-2019-15217 |
283,903 | linux | 5d2e73a5f80a5b5aff3caf1ec6d39b5b3f54b26e | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5d2e73a5f80a5b5aff3caf1ec6d39b5b3f54b26e | media: usb:zr364xx:Fix KASAN:null-ptr-deref Read in zr364xx_vidioc_querycap
SyzKaller hit the null pointer deref while reading from uninitialized
udev->product in zr364xx_vidioc_querycap().
==================================================================
BUG: KASAN: null-ptr-deref in read_word_at_a_time+0xe/0x20
in... | 0 | static int zr364xx_vidioc_querycap(struct file *file, void *priv,
struct v4l2_capability *cap)
{
struct zr364xx_camera *cam = video_drvdata(file);
strscpy(cap->driver, DRIVER_DESC, sizeof(cap->driver));
if (cam->udev->product)
strscpy(cap->card, cam->udev->product, sizeof(cap->card));
strscpy(cap->bus_inf... | 44,045,815,527,678,490,000,000,000,000,000,000,000 | zr364xx.c | 1,800,858,995,808,352,500,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2019-15217 | An issue was discovered in the Linux kernel before 5.2.3. There is a NULL pointer dereference caused by a malicious USB device in the drivers/media/usb/zr364xx/zr364xx.c driver. | https://nvd.nist.gov/vuln/detail/CVE-2019-15217 |
198,838 | ntp | bb928ef08eec020ef6008f3a140702ccc0536b8e | https://github.com/ntp-project/ntp | https://github.com/ntp-project/ntp/commit/bb928ef08eec020ef6008f3a140702ccc0536b8e | [TALOS-CAN-0055] Infinite loop if extended logging enabled and the logfile and keyfile are the same | 1 | authreadkeys(
const char *file
)
{
FILE *fp;
char *line;
char *token;
keyid_t keyno;
int keytype;
char buf[512]; /* lots of room for line */
u_char keystr[32]; /* Bug 2537 */
size_t len;
size_t j;
/*
* Open file. Complain and return if it can't be opened.
*/
fp = fopen(file, "r");
if (fp == NULL) ... | 40,119,267,867,184,310,000,000,000,000,000,000,000 | authreadkeys.c | 297,281,044,682,962,150,000,000,000,000,000,000,000 | [
"CWE-835"
] | CVE-2015-7850 | ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote authenticated users to cause a denial of service (infinite loop or crash) by pointing the key file at the log file. | https://nvd.nist.gov/vuln/detail/CVE-2015-7850 |
284,283 | ntp | bb928ef08eec020ef6008f3a140702ccc0536b8e | https://github.com/ntp-project/ntp | https://github.com/ntp-project/ntp/commit/bb928ef08eec020ef6008f3a140702ccc0536b8e | [TALOS-CAN-0055] Infinite loop if extended logging enabled and the logfile and keyfile are the same | 0 | authreadkeys(
const char *file
)
{
FILE *fp;
char *line;
char *token;
keyid_t keyno;
int keytype;
char buf[512]; /* lots of room for line */
u_char keystr[32]; /* Bug 2537 */
size_t len;
size_t j;
size_t nerr;
/*
* Open file. Complain and return if it can't be opened.
*/
fp = fopen(file, "r");
if... | 99,636,165,505,352,730,000,000,000,000,000,000,000 | authreadkeys.c | 41,959,373,580,734,960,000,000,000,000,000,000,000 | [
"CWE-835"
] | CVE-2015-7850 | ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote authenticated users to cause a denial of service (infinite loop or crash) by pointing the key file at the log file. | https://nvd.nist.gov/vuln/detail/CVE-2015-7850 |
198,839 | libexif | f9bb9f263fb00f0603ecbefa8957cad24168cbff | https://github.com/libexif/libexif | https://github.com/libexif/libexif/commit/f9bb9f263fb00f0603ecbefa8957cad24168cbff | Fix a buffer read overflow in exif_entry_get_value
While parsing EXIF_TAG_FOCAL_LENGTH it was possible to read 8 bytes past
the end of a heap buffer. This was detected by the OSS Fuzz project.
Patch from Google.
Fixes https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=7344 and
https://bugs.chromium.org/p/oss-fuzz/... | 1 | exif_entry_get_value (ExifEntry *e, char *val, unsigned int maxlen)
{
unsigned int i, j, k;
ExifShort v_short, v_short2, v_short3, v_short4;
ExifByte v_byte;
ExifRational v_rat;
ExifSRational v_srat;
char b[64];
const char *c;
ExifByteOrder o;
double d;
ExifEntry *entry;
static const struct {
char label[5]... | 117,469,985,365,786,460,000,000,000,000,000,000,000 | exif-entry.c | 2,714,404,991,702,146,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2020-0182 | In exif_entry_get_value of exif-entry.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-147140917 | https://nvd.nist.gov/vuln/detail/CVE-2020-0182 |
284,292 | libexif | f9bb9f263fb00f0603ecbefa8957cad24168cbff | https://github.com/libexif/libexif | https://github.com/libexif/libexif/commit/f9bb9f263fb00f0603ecbefa8957cad24168cbff | Fix a buffer read overflow in exif_entry_get_value
While parsing EXIF_TAG_FOCAL_LENGTH it was possible to read 8 bytes past
the end of a heap buffer. This was detected by the OSS Fuzz project.
Patch from Google.
Fixes https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=7344 and
https://bugs.chromium.org/p/oss-fuzz/... | 0 | exif_entry_get_value (ExifEntry *e, char *val, unsigned int maxlen)
{
unsigned int i, j, k;
ExifShort v_short, v_short2, v_short3, v_short4;
ExifByte v_byte;
ExifRational v_rat;
ExifSRational v_srat;
char b[64];
const char *c;
ExifByteOrder o;
double d;
ExifEntry *entry;
static const struct {
char label[5]... | 101,615,368,351,096,880,000,000,000,000,000,000,000 | exif-entry.c | 287,656,334,240,821,530,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2020-0182 | In exif_entry_get_value of exif-entry.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-147140917 | https://nvd.nist.gov/vuln/detail/CVE-2020-0182 |
198,929 | pigeonhole | 4a299840cdb51f61f8d1ebc0210b19c40dfbc1cc | https://github.com/dovecot/pigeonhole | https://github.com/dovecot/pigeonhole/commit/4a299840cdb51f61f8d1ebc0210b19c40dfbc1cc | lib-managesieve: Make sure str_unescape() won't be writing past allocated memory
The previous commit should already prevent this, but this makes sure it
can't become broken in the future either. It makes the performance a tiny
bit worse, but that's not practically noticeable. | 1 | static void managesieve_parser_save_arg(struct managesieve_parser *parser,
const unsigned char *data, size_t size)
{
struct managesieve_arg *arg;
char *str;
arg = managesieve_arg_create(parser);
switch (parser->cur_type) {
case ARG_PARSE_ATOM:
/* simply save the string */
arg->type = MANAGESIEVE_ARG_ATO... | 307,819,766,362,179,160,000,000,000,000,000,000,000 | managesieve-parser.c | 233,556,650,977,264,300,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2019-11500 | In Dovecot before 2.2.36.4 and 2.3.x before 2.3.7.2 (and Pigeonhole before 0.5.7.2), protocol processing can fail for quoted strings. This occurs because '\0' characters are mishandled, and can lead to out-of-bounds writes and remote code execution. | https://nvd.nist.gov/vuln/detail/CVE-2019-11500 |
285,191 | pigeonhole | 4a299840cdb51f61f8d1ebc0210b19c40dfbc1cc | https://github.com/dovecot/pigeonhole | https://github.com/dovecot/pigeonhole/commit/4a299840cdb51f61f8d1ebc0210b19c40dfbc1cc | lib-managesieve: Make sure str_unescape() won't be writing past allocated memory
The previous commit should already prevent this, but this makes sure it
can't become broken in the future either. It makes the performance a tiny
bit worse, but that's not practically noticeable. | 0 | static void managesieve_parser_save_arg(struct managesieve_parser *parser,
const unsigned char *data, size_t size)
{
struct managesieve_arg *arg;
char *str;
arg = managesieve_arg_create(parser);
switch (parser->cur_type) {
case ARG_PARSE_ATOM:
/* simply save the string */
arg->type = MANAGESIEVE_ARG_ATO... | 66,093,015,258,022,050,000,000,000,000,000,000,000 | managesieve-parser.c | 244,269,589,179,924,800,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2019-11500 | In Dovecot before 2.2.36.4 and 2.3.x before 2.3.7.2 (and Pigeonhole before 0.5.7.2), protocol processing can fail for quoted strings. This occurs because '\0' characters are mishandled, and can lead to out-of-bounds writes and remote code execution. | https://nvd.nist.gov/vuln/detail/CVE-2019-11500 |
198,945 | virglrenderer | 8c9cfb4e425542e96f0717189fe4658555baaf08 | https://gitlab.freedesktop.org/virgl/virglrenderer | https://gitlab.freedesktop.org/virgl/virglrenderer/merge_requests/314/diffs?commit_id=8c9cfb4e425542e96f0717189fe4658555baaf08 | tests: Add trigger for overflow in texture data upload
Related #140
Signed-off-by: Gert Wollny <gert.wollny@collabora.com>
Acked-by: Emil Velikov <emil.velikov@collabora.com> | 1 | int main()
{
initialize_environment();
test_format_wrong_size();
test_blit_info_format_check();
test_blit_info_format_check_null_format();
test_format_is_plain_nullptr_deref_trigger();
test_format_util_format_is_rgb_nullptr_deref_trigger_illegal_resource();
test_format_util_format_is_rgb_nullptr_d... | 284,991,185,695,099,700,000,000,000,000,000,000,000 | test_fuzzer_formats.c | 271,934,328,997,786,700,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2019-18391 | A heap-based buffer overflow in the vrend_renderer_transfer_write_iov function in vrend_renderer.c in virglrenderer through 0.8.0 allows guest OS users to cause a denial of service via VIRGL_CCMD_RESOURCE_INLINE_WRITE commands. | https://nvd.nist.gov/vuln/detail/CVE-2019-18391 |
285,610 | virglrenderer | 8c9cfb4e425542e96f0717189fe4658555baaf08 | https://gitlab.freedesktop.org/virgl/virglrenderer | https://gitlab.freedesktop.org/virgl/virglrenderer/merge_requests/314/diffs?commit_id=8c9cfb4e425542e96f0717189fe4658555baaf08 | tests: Add trigger for overflow in texture data upload
Related #140
Signed-off-by: Gert Wollny <gert.wollny@collabora.com>
Acked-by: Emil Velikov <emil.velikov@collabora.com> | 0 | int main()
{
initialize_environment();
test_format_wrong_size();
test_blit_info_format_check();
test_blit_info_format_check_null_format();
test_format_is_plain_nullptr_deref_trigger();
test_format_util_format_is_rgb_nullptr_deref_trigger_illegal_resource();
test_format_util_format_is_rgb_nullptr_d... | 241,258,366,640,535,500,000,000,000,000,000,000,000 | test_fuzzer_formats.c | 129,883,083,291,494,740,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2019-18391 | A heap-based buffer overflow in the vrend_renderer_transfer_write_iov function in vrend_renderer.c in virglrenderer through 0.8.0 allows guest OS users to cause a denial of service via VIRGL_CCMD_RESOURCE_INLINE_WRITE commands. | https://nvd.nist.gov/vuln/detail/CVE-2019-18391 |
198,947 | mono | 65292a69c837b8a5f7a392d34db63de592153358 | https://github.com/mono/mono | https://github.com/mono/mono/commit/65292a69c837b8a5f7a392d34db63de592153358 | Handle invalid instantiation of generic methods.
* verify.c: Add new function to internal verifier API to check
method instantiations.
* reflection.c (mono_reflection_bind_generic_method_parameters):
Check the instantiation before returning it.
Fixes #655847 | 1 | MonoReflectionMethod*
mono_reflection_bind_generic_method_parameters (MonoReflectionMethod *rmethod, MonoArray *types)
{
MonoClass *klass;
MonoMethod *method, *inflated;
MonoMethodInflated *imethod;
MonoGenericContext tmp_context;
MonoGenericInst *ginst;
MonoType **type_argv;
int count, i;
MONO_ARCH_SAVE_REGS;... | 277,938,576,201,629,240,000,000,000,000,000,000,000 | reflection.c | 228,389,372,334,721,080,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2010-4254 | Mono, when Moonlight before 2.3.0.1 or 2.99.x before 2.99.0.10 is used, does not properly validate arguments to generic methods, which allows remote attackers to bypass generic constraints, and possibly execute arbitrary code, via a crafted method call. | https://nvd.nist.gov/vuln/detail/CVE-2010-4254 |
285,867 | mono | 65292a69c837b8a5f7a392d34db63de592153358 | https://github.com/mono/mono | https://github.com/mono/mono/commit/65292a69c837b8a5f7a392d34db63de592153358 | Handle invalid instantiation of generic methods.
* verify.c: Add new function to internal verifier API to check
method instantiations.
* reflection.c (mono_reflection_bind_generic_method_parameters):
Check the instantiation before returning it.
Fixes #655847 | 0 | MonoReflectionMethod*
mono_reflection_bind_generic_method_parameters (MonoReflectionMethod *rmethod, MonoArray *types)
{
MonoClass *klass;
MonoMethod *method, *inflated;
MonoMethodInflated *imethod;
MonoGenericContext tmp_context;
MonoGenericInst *ginst;
MonoType **type_argv;
int count, i;
MONO_ARCH_SAVE_REGS;... | 196,110,369,610,035,930,000,000,000,000,000,000,000 | reflection.c | 78,309,779,713,780,540,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2010-4254 | Mono, when Moonlight before 2.3.0.1 or 2.99.x before 2.99.0.10 is used, does not properly validate arguments to generic methods, which allows remote attackers to bypass generic constraints, and possibly execute arbitrary code, via a crafted method call. | https://nvd.nist.gov/vuln/detail/CVE-2010-4254 |
198,982 | nasm | 3144e84add8b152cc7a71e44617ce6f21daa4ba3 | https://github.com/netwide-assembler/nasm | https://github.com/cyrillos/nasm/commit/3144e84add8b152cc7a71e44617ce6f21daa4ba3 | preproc: Don't access offsting byte on unterminated strings
https://bugzilla.nasm.us/show_bug.cgi?id=3392446
Signed-off-by: Cyrill Gorcunov <gorcunov@gmail.com> | 1 | static Token *tokenize(char *line)
{
char c, *p = line;
enum pp_token_type type;
Token *list = NULL;
Token *t, **tail = &list;
while (*line) {
p = line;
if (*p == '%') {
p++;
if (*p == '+' && !nasm_isdigit(p[1])) {
p++;
type = ... | 240,530,469,158,704,230,000,000,000,000,000,000,000 | preproc.c | 202,803,296,197,073,000,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-8881 | Netwide Assembler (NASM) 2.13.02rc2 has a heap-based buffer over-read in the function tokenize in asm/preproc.c, related to an unterminated string. | https://nvd.nist.gov/vuln/detail/CVE-2018-8881 |
286,669 | nasm | 3144e84add8b152cc7a71e44617ce6f21daa4ba3 | https://github.com/netwide-assembler/nasm | https://github.com/cyrillos/nasm/commit/3144e84add8b152cc7a71e44617ce6f21daa4ba3 | preproc: Don't access offsting byte on unterminated strings
https://bugzilla.nasm.us/show_bug.cgi?id=3392446
Signed-off-by: Cyrill Gorcunov <gorcunov@gmail.com> | 0 | static Token *tokenize(char *line)
{
char c, *p = line;
enum pp_token_type type;
Token *list = NULL;
Token *t, **tail = &list;
while (*line) {
p = line;
if (*p == '%') {
p++;
if (*p == '+' && !nasm_isdigit(p[1])) {
p++;
type = ... | 154,407,503,799,453,250,000,000,000,000,000,000,000 | preproc.c | 13,957,557,623,149,516,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-8881 | Netwide Assembler (NASM) 2.13.02rc2 has a heap-based buffer over-read in the function tokenize in asm/preproc.c, related to an unterminated string. | https://nvd.nist.gov/vuln/detail/CVE-2018-8881 |
199,158 | jasper | d678ccd27b8a062e3bfd4c80d8ce2676a8166a27 | https://github.com/mdadams/jasper | https://github.com/mdadams/jasper/commit/d678ccd27b8a062e3bfd4c80d8ce2676a8166a27 | CVE-2008-3522 | 1 | int jas_stream_printf(jas_stream_t *stream, const char *fmt, ...)
{
va_list ap;
char buf[4096];
int ret;
va_start(ap, fmt);
ret = vsprintf(buf, fmt, ap);
jas_stream_puts(stream, buf);
va_end(ap);
return ret;
} | 134,497,282,431,965,470,000,000,000,000,000,000,000 | jas_stream.c | 177,410,078,778,385,120,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2008-3522 | Buffer overflow in the jas_stream_printf function in libjasper/base/jas_stream.c in JasPer 1.900.1 might allow context-dependent attackers to have an unknown impact via vectors related to the mif_hdr_put function and use of vsprintf. | https://nvd.nist.gov/vuln/detail/CVE-2008-3522 |
289,193 | jasper | d678ccd27b8a062e3bfd4c80d8ce2676a8166a27 | https://github.com/mdadams/jasper | https://github.com/mdadams/jasper/commit/d678ccd27b8a062e3bfd4c80d8ce2676a8166a27 | CVE-2008-3522 | 0 | int jas_stream_printf(jas_stream_t *stream, const char *fmt, ...)
{
va_list ap;
char buf[4096];
int ret;
va_start(ap, fmt);
ret = vsnprintf(buf, sizeof buf, fmt, ap);
jas_stream_puts(stream, buf);
va_end(ap);
return ret;
} | 291,158,841,205,138,300,000,000,000,000,000,000,000 | jas_stream.c | 15,709,599,950,391,988,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2008-3522 | Buffer overflow in the jas_stream_printf function in libjasper/base/jas_stream.c in JasPer 1.900.1 might allow context-dependent attackers to have an unknown impact via vectors related to the mif_hdr_put function and use of vsprintf. | https://nvd.nist.gov/vuln/detail/CVE-2008-3522 |
199,167 | qpdf | ad527a64f93dca12f6aabab2ca99ae5eb352ab4b | https://github.com/qpdf/qpdf | https://github.com/qpdf/qpdf/commit/ad527a64f93dca12f6aabab2ca99ae5eb352ab4b | Parse iteratively to avoid stack overflow (fixes #146) | 1 | QPDFObjectHandle::parseInternal(PointerHolder<InputSource> input,
std::string const& object_description,
QPDFTokenizer& tokenizer, bool& empty,
StringDecrypter* decrypter, QPDF* context,
bool ... | 176,934,177,834,361,300,000,000,000,000,000,000,000 | QPDFObjectHandle.cc | 319,269,573,744,409,420,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2017-12595 | The tokenizer in QPDF 6.0.0 and 7.0.b1 is recursive for arrays and dictionaries, which allows remote attackers to cause a denial of service (stack consumption and segmentation fault) or possibly have unspecified other impact via a PDF document with a deep data structure, as demonstrated by a crash in QPDFObjectHandle::... | https://nvd.nist.gov/vuln/detail/CVE-2017-12595 |
289,876 | qpdf | ad527a64f93dca12f6aabab2ca99ae5eb352ab4b | https://github.com/qpdf/qpdf | https://github.com/qpdf/qpdf/commit/ad527a64f93dca12f6aabab2ca99ae5eb352ab4b | Parse iteratively to avoid stack overflow (fixes #146) | 0 | QPDFObjectHandle::parseInternal(PointerHolder<InputSource> input,
std::string const& object_description,
QPDFTokenizer& tokenizer, bool& empty,
StringDecrypter* decrypter, QPDF* context,
bool ... | 75,742,363,081,598,910,000,000,000,000,000,000,000 | QPDFObjectHandle.cc | 215,630,367,614,297,780,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2017-12595 | The tokenizer in QPDF 6.0.0 and 7.0.b1 is recursive for arrays and dictionaries, which allows remote attackers to cause a denial of service (stack consumption and segmentation fault) or possibly have unspecified other impact via a PDF document with a deep data structure, as demonstrated by a crash in QPDFObjectHandle::... | https://nvd.nist.gov/vuln/detail/CVE-2017-12595 |
199,208 | ncurses | b025434573f466efe27862656a6a9d41dd2bd609 | https://github.com/mirror/ncurses | https://github.com/mirror/ncurses/commit/b025434573f466efe27862656a6a9d41dd2bd609 | ncurses 6.1 - patch 20191012
+ amend recent changes to ncurses*-config and pc-files to filter out
Debian linker-flags (report by Sven Joachim, cf: 20150516).
+ clarify relationship between tic, infocmp and captoinfo in manpage.
+ check for invalid hashcode in _nc_find_type_entry and
_nc_find_name_entry.
> fix seve... | 1 | fmt_entry(TERMTYPE2 *tterm,
PredFunc pred,
int content_only,
int suppress_untranslatable,
int infodump,
int numbers)
{
PredIdx i, j;
char buffer[MAX_TERMINFO_LENGTH + EXTRA_CAP];
char *capability;
NCURSES_CONST char *name;
int predval, len;
PredIdx num_bools = 0;
PredIdx num_v... | 159,215,531,902,805,400,000,000,000,000,000,000,000 | dump_entry.c | 293,551,541,110,611,730,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-17595 | There is a heap-based buffer over-read in the fmt_entry function in tinfo/comp_hash.c in the terminfo library in ncurses before 6.1-20191012. | https://nvd.nist.gov/vuln/detail/CVE-2019-17595 |
290,180 | ncurses | b025434573f466efe27862656a6a9d41dd2bd609 | https://github.com/mirror/ncurses | https://github.com/mirror/ncurses/commit/b025434573f466efe27862656a6a9d41dd2bd609 | ncurses 6.1 - patch 20191012
+ amend recent changes to ncurses*-config and pc-files to filter out
Debian linker-flags (report by Sven Joachim, cf: 20150516).
+ clarify relationship between tic, infocmp and captoinfo in manpage.
+ check for invalid hashcode in _nc_find_type_entry and
_nc_find_name_entry.
> fix seve... | 0 | fmt_entry(TERMTYPE2 *tterm,
PredFunc pred,
int content_only,
int suppress_untranslatable,
int infodump,
int numbers)
{
PredIdx i, j;
char buffer[MAX_TERMINFO_LENGTH + EXTRA_CAP];
char *capability;
NCURSES_CONST char *name;
int predval, len;
PredIdx num_bools = 0;
PredIdx num_v... | 244,382,529,298,460,100,000,000,000,000,000,000,000 | dump_entry.c | 18,317,216,777,212,705,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-17595 | There is a heap-based buffer over-read in the fmt_entry function in tinfo/comp_hash.c in the terminfo library in ncurses before 6.1-20191012. | https://nvd.nist.gov/vuln/detail/CVE-2019-17595 |
199,217 | linux | f70267f379b5e5e11bdc5d72a56bf17e5feed01f | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f70267f379b5e5e11bdc5d72a56bf17e5feed01f | scsi: libsas: stop discovering if oob mode is disconnected
The discovering of sas port is driven by workqueue in libsas. When libsas
is processing port events or phy events in workqueue, new events may rise
up and change the state of some structures such as asd_sas_phy. This may
cause some problems such as follows:
... | 1 | static int sas_get_port_device(struct asd_sas_port *port)
{
struct asd_sas_phy *phy;
struct sas_rphy *rphy;
struct domain_device *dev;
int rc = -ENODEV;
dev = sas_alloc_device();
if (!dev)
return -ENOMEM;
spin_lock_irq(&port->phy_list_lock);
if (list_empty(&port->phy_list)) {
spin_unlock_irq(&port->phy_li... | 266,424,577,682,669,450,000,000,000,000,000,000,000 | sas_discover.c | 139,818,591,624,188,770,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2019-19965 | In the Linux kernel through 5.4.6, there is a NULL pointer dereference in drivers/scsi/libsas/sas_discover.c because of mishandling of port disconnection during discovery, related to a PHY down race condition, aka CID-f70267f379b5. | https://nvd.nist.gov/vuln/detail/CVE-2019-19965 |
290,275 | linux | f70267f379b5e5e11bdc5d72a56bf17e5feed01f | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f70267f379b5e5e11bdc5d72a56bf17e5feed01f | scsi: libsas: stop discovering if oob mode is disconnected
The discovering of sas port is driven by workqueue in libsas. When libsas
is processing port events or phy events in workqueue, new events may rise
up and change the state of some structures such as asd_sas_phy. This may
cause some problems such as follows:
... | 0 | static int sas_get_port_device(struct asd_sas_port *port)
{
struct asd_sas_phy *phy;
struct sas_rphy *rphy;
struct domain_device *dev;
int rc = -ENODEV;
dev = sas_alloc_device();
if (!dev)
return -ENOMEM;
spin_lock_irq(&port->phy_list_lock);
if (list_empty(&port->phy_list)) {
spin_unlock_irq(&port->phy_li... | 233,666,620,838,896,500,000,000,000,000,000,000,000 | sas_discover.c | 140,244,239,592,245,460,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2019-19965 | In the Linux kernel through 5.4.6, there is a NULL pointer dereference in drivers/scsi/libsas/sas_discover.c because of mishandling of port disconnection during discovery, related to a PHY down race condition, aka CID-f70267f379b5. | https://nvd.nist.gov/vuln/detail/CVE-2019-19965 |
199,221 | ghostpdl | 3c2aebbedd37fab054e80f2e315de07d7e9b5bdb | https://github.com/ArtifexSoftware/ghostpdl | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=3c2aebbedd37fab054e80f2e315de07d7e9b5bdb | Bug 698044: restrict font name length to the buffer size. | 1 | xps_load_sfnt_name(xps_font_t *font, char *namep)
{
byte *namedata;
int offset, length;
/*int format;*/
int count, stringoffset;
int found;
int i, k;
found = 0;
strcpy(namep, "Unknown");
offset = xps_find_sfnt_table(font, "name", &length);
if (offset < 0 || length < 6)
{
... | 125,420,559,281,172,280,000,000,000,000,000,000,000 | xpsfont.c | 339,548,247,002,019,140,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-9618 | The xps_load_sfnt_name function in xps/xpsfont.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9618 |
14,398 | ghostscript | 961b10cdd71403072fb99401a45f3bef6ce53626 | http://git.ghostscript.com/?p=mupdf | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=961b10cdd71403072fb99401a45f3bef6ce53626 | None | 0 | xps_load_sfnt_name(xps_font_t *font, char *namep, const int buflen)
{
byte *namedata;
int offset, length;
/*int format;*/
int count, stringoffset;
int found;
int i, k;
found = 0;
strcpy(namep, "Unknown");
offset = xps_find_sfnt_table(font, "name", &length);
if (offset < 0 || le... | 325,261,375,591,148,470,000,000,000,000,000,000,000 | xpsfont.c | 237,740,818,077,512,970,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9740 | The xps_decode_font_char_imp function in xps/xpsfont.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9740 |
199,228 | mysql-server | 5ac61b2af0cf37eeed5050a91819d6d273f037a5 | https://github.com/mysql/mysql-server | https://github.com/mysql/mysql-server/commit/5ac61b2af0cf37eeed5050a91819d6d273f037a5 | Bug#26372491 - RCE THROUGH THE MISHANDLE OF BACKSLASH
DESCRIPTION:
===========
The bug is related to incorrect parsing of SQL queries
when typed in on the CLI. The incorrect parsing can
result in unexpected results.
ANALYSIS:
========
The scenarios mainly happens for identifier names
with a typical combination of bac... | 1 | static bool add_line(String &buffer,char *line,char *in_string,
bool *ml_comment, bool truncated)
{
uchar inchar;
char buff[80], *pos, *out;
COMMANDS *com;
bool need_space= 0;
bool ss_comment= 0;
DBUG_ENTER("add_line");
if (!line[0] && buffer.is_empty())
DBUG_RETURN(0);
#ifdef HA... | 230,766,678,704,317,370,000,000,000,000,000,000,000 | mysql.cc | 313,128,637,392,514,100,000,000,000,000,000,000,000 | [
"CWE-863"
] | CVE-2017-10379 | Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.57 and earlier, 5.6.37 and earlier and 5.7.19 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise My... | https://nvd.nist.gov/vuln/detail/CVE-2017-10379 |
290,672 | mysql-server | 5ac61b2af0cf37eeed5050a91819d6d273f037a5 | https://github.com/mysql/mysql-server | https://github.com/mysql/mysql-server/commit/5ac61b2af0cf37eeed5050a91819d6d273f037a5 | Bug#26372491 - RCE THROUGH THE MISHANDLE OF BACKSLASH
DESCRIPTION:
===========
The bug is related to incorrect parsing of SQL queries
when typed in on the CLI. The incorrect parsing can
result in unexpected results.
ANALYSIS:
========
The scenarios mainly happens for identifier names
with a typical combination of bac... | 0 | static bool add_line(String &buffer,char *line,char *in_string,
bool *ml_comment, bool truncated)
{
uchar inchar;
char buff[80], *pos, *out;
COMMANDS *com;
bool need_space= 0;
bool ss_comment= 0;
DBUG_ENTER("add_line");
if (!line[0] && buffer.is_empty())
DBUG_RETURN(0);
#ifdef HA... | 165,787,320,333,381,770,000,000,000,000,000,000,000 | mysql.cc | 241,199,272,712,564,900,000,000,000,000,000,000,000 | [
"CWE-863"
] | CVE-2017-10379 | Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.57 and earlier, 5.6.37 and earlier and 5.7.19 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise My... | https://nvd.nist.gov/vuln/detail/CVE-2017-10379 |
199,230 | linux | 9a5729f68d3a82786aea110b1bfe610be318f80a | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9a5729f68d3a82786aea110b1bfe610be318f80a | USB: sisusbvga: fix oops in error path of sisusb_probe
The pointer used to log a failure of usb_register_dev() must
be set before the error is logged.
v2: fix that minor is not available before registration
Signed-off-by: oliver Neukum <oneukum@suse.com>
Reported-by: syzbot+a0cbdbd6d169020c8959@syzkaller.appspotmail... | 1 | static int sisusb_probe(struct usb_interface *intf,
const struct usb_device_id *id)
{
struct usb_device *dev = interface_to_usbdev(intf);
struct sisusb_usb_data *sisusb;
int retval = 0, i;
dev_info(&dev->dev, "USB2VGA dongle found at address %d\n",
dev->devnum);
/* Allocate memory for our private */
sisusb... | 231,930,253,852,391,840,000,000,000,000,000,000,000 | sisusb.c | 151,043,463,933,022,340,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2019-15219 | An issue was discovered in the Linux kernel before 5.1.8. There is a NULL pointer dereference caused by a malicious USB device in the drivers/usb/misc/sisusbvga/sisusb.c driver. | https://nvd.nist.gov/vuln/detail/CVE-2019-15219 |
290,706 | linux | 9a5729f68d3a82786aea110b1bfe610be318f80a | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9a5729f68d3a82786aea110b1bfe610be318f80a | USB: sisusbvga: fix oops in error path of sisusb_probe
The pointer used to log a failure of usb_register_dev() must
be set before the error is logged.
v2: fix that minor is not available before registration
Signed-off-by: oliver Neukum <oneukum@suse.com>
Reported-by: syzbot+a0cbdbd6d169020c8959@syzkaller.appspotmail... | 0 | static int sisusb_probe(struct usb_interface *intf,
const struct usb_device_id *id)
{
struct usb_device *dev = interface_to_usbdev(intf);
struct sisusb_usb_data *sisusb;
int retval = 0, i;
dev_info(&dev->dev, "USB2VGA dongle found at address %d\n",
dev->devnum);
/* Allocate memory for our private */
sisusb... | 166,524,368,456,627,470,000,000,000,000,000,000,000 | sisusb.c | 236,511,791,586,031,400,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2019-15219 | An issue was discovered in the Linux kernel before 5.1.8. There is a NULL pointer dereference caused by a malicious USB device in the drivers/usb/misc/sisusbvga/sisusb.c driver. | https://nvd.nist.gov/vuln/detail/CVE-2019-15219 |
199,234 | samba | 3cc0f1eeda5f133532dda31eef9fc1b394127e50 | https://github.com/samba-team/samba | https://github.com/samba-team/samba/commit/3cc0f1eeda5f133532dda31eef9fc1b394127e50 | CVE-2020-14303: s4 nbt: fix busy loop on empty UDP packet
An empty UDP packet put the nbt server into a busy loop that consumes
100% of a cpu.
BUG: https://bugzilla.samba.org/show_bug.cgi?id=14417
Signed-off-by: Gary Lockyer <gary@catalyst.net.nz>
Autobuild-User(master): Karolin Seeger <kseeger@samba.org>
Autobuild... | 1 | static void nbt_name_socket_recv(struct nbt_name_socket *nbtsock)
{
TALLOC_CTX *tmp_ctx = talloc_new(nbtsock);
NTSTATUS status;
enum ndr_err_code ndr_err;
struct socket_address *src;
DATA_BLOB blob;
size_t nread, dsize;
struct nbt_name_packet *packet;
struct nbt_name_request *req;
status = socket_pending(nbts... | 142,264,031,308,545,020,000,000,000,000,000,000,000 | None | null | [
"CWE-834"
] | CVE-2020-14303 | A flaw was found in the AD DC NBT server in all Samba versions before 4.10.17, before 4.11.11 and before 4.12.4. A samba user could send an empty UDP packet to cause the samba server to crash. | https://nvd.nist.gov/vuln/detail/CVE-2020-14303 |
290,920 | samba | 3cc0f1eeda5f133532dda31eef9fc1b394127e50 | https://github.com/samba-team/samba | https://github.com/samba-team/samba/commit/3cc0f1eeda5f133532dda31eef9fc1b394127e50 | CVE-2020-14303: s4 nbt: fix busy loop on empty UDP packet
An empty UDP packet put the nbt server into a busy loop that consumes
100% of a cpu.
BUG: https://bugzilla.samba.org/show_bug.cgi?id=14417
Signed-off-by: Gary Lockyer <gary@catalyst.net.nz>
Autobuild-User(master): Karolin Seeger <kseeger@samba.org>
Autobuild... | 0 | static void nbt_name_socket_recv(struct nbt_name_socket *nbtsock)
{
TALLOC_CTX *tmp_ctx = talloc_new(nbtsock);
NTSTATUS status;
enum ndr_err_code ndr_err;
struct socket_address *src;
DATA_BLOB blob;
size_t nread, dsize;
struct nbt_name_packet *packet;
struct nbt_name_request *req;
status = socket_pending(nbts... | 260,725,290,672,898,950,000,000,000,000,000,000,000 | None | null | [
"CWE-834"
] | CVE-2020-14303 | A flaw was found in the AD DC NBT server in all Samba versions before 4.10.17, before 4.11.11 and before 4.12.4. A samba user could send an empty UDP packet to cause the samba server to crash. | https://nvd.nist.gov/vuln/detail/CVE-2020-14303 |
199,672 | vim | e2bd8600b873d2cd1f9d667c28cba8b1dba18839 | https://github.com/vim/vim | https://github.com/vim/vim/commit/e2bd8600b873d2cd1f9d667c28cba8b1dba18839 | patch 8.2.4977: memory access error when substitute expression changes window
Problem: Memory access error when substitute expression changes window.
Solution: Disallow changing window in substitute expression. | 1 | ex_substitute(exarg_T *eap)
{
linenr_T lnum;
long i = 0;
regmmatch_T regmatch;
static subflags_T subflags = {FALSE, FALSE, FALSE, TRUE, FALSE,
FALSE, FALSE, 0};
#ifdef FEAT_EVAL
subflags_T subflags_save;
#endif
int save_do_all; // remember user specified 'g' flag
int save_do_... | 256,338,705,445,780,230,000,000,000,000,000,000,000 | ex_cmds.c | 220,202,383,493,337,000,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2022-1785 | Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.4977. | https://nvd.nist.gov/vuln/detail/CVE-2022-1785 |
291,019 | vim | e2bd8600b873d2cd1f9d667c28cba8b1dba18839 | https://github.com/vim/vim | https://github.com/vim/vim/commit/e2bd8600b873d2cd1f9d667c28cba8b1dba18839 | patch 8.2.4977: memory access error when substitute expression changes window
Problem: Memory access error when substitute expression changes window.
Solution: Disallow changing window in substitute expression. | 0 | ex_substitute(exarg_T *eap)
{
linenr_T lnum;
long i = 0;
regmmatch_T regmatch;
static subflags_T subflags = {FALSE, FALSE, FALSE, TRUE, FALSE,
FALSE, FALSE, 0};
#ifdef FEAT_EVAL
subflags_T subflags_save;
#endif
int save_do_all; // remember user specified 'g' flag
int save_do_... | 268,610,061,955,623,200,000,000,000,000,000,000,000 | ex_cmds.c | 117,720,515,718,574,180,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2022-1785 | Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.4977. | https://nvd.nist.gov/vuln/detail/CVE-2022-1785 |
199,684 | thrift | 2007783e874d524a46b818598a45078448ecc53e | https://github.com/apache/thrift | https://github.com/apache/thrift/commit/2007783e874d524a46b818598a45078448ecc53e | THRIFT-3893 Command injection in format_go_output
Client: Go
Patch: Jens Geyer | 1 | bool format_go_output(const string& file_path) {
const string command = "gofmt -w " + file_path;
if (system(command.c_str()) == 0) {
return true;
}
fprintf(stderr, "WARNING - Running '%s' failed.\n", command.c_str());
return false;
} | 189,436,529,147,219,640,000,000,000,000,000,000,000 | t_go_generator.cc | 283,976,431,937,198,730,000,000,000,000,000,000,000 | [
"CWE-77"
] | CVE-2016-5397 | The Apache Thrift Go client library exposed the potential during code generation for command injection due to using an external formatting tool. Affected Apache Thrift 0.9.3 and older, Fixed in Apache Thrift 0.10.0. | https://nvd.nist.gov/vuln/detail/CVE-2016-5397 |
291,177 | thrift | 2007783e874d524a46b818598a45078448ecc53e | https://github.com/apache/thrift | https://github.com/apache/thrift/commit/2007783e874d524a46b818598a45078448ecc53e | THRIFT-3893 Command injection in format_go_output
Client: Go
Patch: Jens Geyer | 0 | bool format_go_output(const string& file_path) {
// formatting via gofmt deactivated due to THRIFT-3893
// Please look at the ticket and make sure you fully understand all the implications
// before submitting a patch that enables this feature again. Thank you.
(void) file_path;
return false;
/*
const... | 121,454,227,917,710,530,000,000,000,000,000,000,000 | t_go_generator.cc | 141,950,591,575,700,600,000,000,000,000,000,000,000 | [
"CWE-77"
] | CVE-2016-5397 | The Apache Thrift Go client library exposed the potential during code generation for command injection due to using an external formatting tool. Affected Apache Thrift 0.9.3 and older, Fixed in Apache Thrift 0.10.0. | https://nvd.nist.gov/vuln/detail/CVE-2016-5397 |
199,693 | php-src | 863bf294feb9ad425eadb94f288bc7f18673089d | https://github.com/php/php-src | http://git.php.net/?p=php-src.git;a=commit;h=863bf294feb9ad425eadb94f288bc7f18673089d | Fixed bug #70169 (Use After Free Vulnerability in unserialize() with SplDoublyLinkedList) | 1 | SPL_METHOD(SplDoublyLinkedList, unserialize)
{
spl_dllist_object *intern = (spl_dllist_object*)zend_object_store_get_object(getThis() TSRMLS_CC);
zval *flags, *elem;
char *buf;
int buf_len;
const unsigned char *p, *s;
php_unserialize_data_t var_hash;
if (zend_parse_parameters(ZEND_NUM_AR... | 50,520,203,015,762,615,000,000,000,000,000,000,000 | spl_dllist.c | 43,827,658,000,596,080,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2015-6831 | Multiple use-after-free vulnerabilities in SPL in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 allow remote attackers to execute arbitrary code via vectors involving (1) ArrayObject, (2) SplObjectStorage, and (3) SplDoublyLinkedList, which are mishandled during unserialization. | https://nvd.nist.gov/vuln/detail/CVE-2015-6831 |
291,252 | php-src | 863bf294feb9ad425eadb94f288bc7f18673089d | https://github.com/php/php-src | http://git.php.net/?p=php-src.git;a=commit;h=863bf294feb9ad425eadb94f288bc7f18673089d | Fixed bug #70169 (Use After Free Vulnerability in unserialize() with SplDoublyLinkedList) | 0 | SPL_METHOD(SplDoublyLinkedList, serialize)
{
spl_dllist_object *intern = (spl_dllist_object*)zend_object_store_get_object(getThis() TSRMLS_CC);
smart_str buf = {0};
spl_ptr_llist_element *current = intern->llist->head, *next;
zval *flags;
php_serialize_data_t var_has... | 52,119,022,334,505,670,000,000,000,000,000,000,000 | spl_dllist.c | 43,827,658,000,596,080,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2015-6831 | Multiple use-after-free vulnerabilities in SPL in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 allow remote attackers to execute arbitrary code via vectors involving (1) ArrayObject, (2) SplObjectStorage, and (3) SplDoublyLinkedList, which are mishandled during unserialization. | https://nvd.nist.gov/vuln/detail/CVE-2015-6831 |
199,697 | curl | 31be461c6b659312100c47be6ddd5f0f569290f6 | https://github.com/curl/curl | https://github.com/bagder/curl/commit/31be461c6b659312100c47be6ddd5f0f569290f6 | ConnectionExists: for NTLM re-use, require credentials to match
CVE-2015-3143
Bug: http://curl.haxx.se/docs/adv_20150422A.html
Reported-by: Paras Sethia | 1 | ConnectionExists(struct SessionHandle *data,
struct connectdata *needle,
struct connectdata **usethis,
bool *force_reuse)
{
struct connectdata *check;
struct connectdata *chosen = 0;
bool canPipeline = IsPipeliningPossible(data, needle);
bool wantNTLMhttp = ((d... | 10,423,208,688,221,915,000,000,000,000,000,000,000 | url.c | 97,743,442,363,977,710,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2015-3143 | cURL and libcurl 7.10.6 through 7.41.0 does not properly re-use NTLM connections, which allows remote attackers to connect as other users via an unauthenticated request, a similar issue to CVE-2014-0015. | https://nvd.nist.gov/vuln/detail/CVE-2015-3143 |
291,300 | curl | 31be461c6b659312100c47be6ddd5f0f569290f6 | https://github.com/curl/curl | https://github.com/bagder/curl/commit/31be461c6b659312100c47be6ddd5f0f569290f6 | ConnectionExists: for NTLM re-use, require credentials to match
CVE-2015-3143
Bug: http://curl.haxx.se/docs/adv_20150422A.html
Reported-by: Paras Sethia | 0 | ConnectionExists(struct SessionHandle *data,
struct connectdata *needle,
struct connectdata **usethis,
bool *force_reuse)
{
struct connectdata *check;
struct connectdata *chosen = 0;
bool canPipeline = IsPipeliningPossible(data, needle);
bool wantNTLMhttp = ((d... | 306,844,860,231,129,900,000,000,000,000,000,000,000 | url.c | 89,772,642,171,184,000,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2015-3143 | cURL and libcurl 7.10.6 through 7.41.0 does not properly re-use NTLM connections, which allows remote attackers to connect as other users via an unauthenticated request, a similar issue to CVE-2014-0015. | https://nvd.nist.gov/vuln/detail/CVE-2015-3143 |
199,704 | vim | 54e5fed6d27b747ff152cdb6edfb72ff60e70939 | https://github.com/vim/vim | https://github.com/vim/vim/commit/54e5fed6d27b747ff152cdb6edfb72ff60e70939 | patch 9.0.0035: spell dump may go beyond end of an array
Problem: Spell dump may go beyond end of an array.
Solution: Limit the word length. | 1 | spell_dump_compl(
char_u *pat, // leading part of the word
int ic, // ignore case
int *dir, // direction for adding matches
int dumpflags_arg) // DUMPFLAG_*
{
langp_T *lp;
slang_T *slang;
idx_T arridx[MAXWLEN];
int curi[MAXWLEN];
char_u word[MAXWLEN];
int c;
... | 136,680,842,269,152,400,000,000,000,000,000,000,000 | spell.c | 199,888,238,601,938,700,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2022-2304 | Stack-based Buffer Overflow in GitHub repository vim/vim prior to 9.0. | https://nvd.nist.gov/vuln/detail/CVE-2022-2304 |
291,548 | vim | 54e5fed6d27b747ff152cdb6edfb72ff60e70939 | https://github.com/vim/vim | https://github.com/vim/vim/commit/54e5fed6d27b747ff152cdb6edfb72ff60e70939 | patch 9.0.0035: spell dump may go beyond end of an array
Problem: Spell dump may go beyond end of an array.
Solution: Limit the word length. | 0 | spell_dump_compl(
char_u *pat, // leading part of the word
int ic, // ignore case
int *dir, // direction for adding matches
int dumpflags_arg) // DUMPFLAG_*
{
langp_T *lp;
slang_T *slang;
idx_T arridx[MAXWLEN];
int curi[MAXWLEN];
char_u word[MAXWLEN];
int c;
... | 237,821,358,087,234,370,000,000,000,000,000,000,000 | spell.c | 115,809,493,484,369,100,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2022-2304 | Stack-based Buffer Overflow in GitHub repository vim/vim prior to 9.0. | https://nvd.nist.gov/vuln/detail/CVE-2022-2304 |
199,705 | linux | b1728ff617f88a1f7a5d8c8f21fe17a2f6af5d16 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b1728ff617f88a1f7a5d8c8f21fe17a2f6af5d16 | media: dvb_frontend: fix ifnullfree.cocci warnings
drivers/media/dvb-core/dvb_frontend.c:154:2-7: WARNING: NULL check before freeing functions like kfree, debugfs_remove, debugfs_remove_recursive or usb_free_urb is not needed. Maybe consider reorganizing relevant code to avoid passing NULL values.
NULL check before ... | 1 | static void __dvb_frontend_free(struct dvb_frontend *fe)
{
struct dvb_frontend_private *fepriv = fe->frontend_priv;
if (fepriv)
dvb_free_device(fepriv->dvbdev);
dvb_frontend_invoke_release(fe, fe->ops.release);
if (fepriv)
kfree(fepriv);
} | 148,500,864,758,102,270,000,000,000,000,000,000,000 | dvb_frontend.c | 89,564,543,835,876,150,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2017-16648 | The dvb_frontend_free function in drivers/media/dvb-core/dvb_frontend.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via a crafted USB device. NOTE: the function was later renamed __dvb_frontend_free. | https://nvd.nist.gov/vuln/detail/CVE-2017-16648 |
291,555 | linux | b1728ff617f88a1f7a5d8c8f21fe17a2f6af5d16 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b1728ff617f88a1f7a5d8c8f21fe17a2f6af5d16 | media: dvb_frontend: fix ifnullfree.cocci warnings
drivers/media/dvb-core/dvb_frontend.c:154:2-7: WARNING: NULL check before freeing functions like kfree, debugfs_remove, debugfs_remove_recursive or usb_free_urb is not needed. Maybe consider reorganizing relevant code to avoid passing NULL values.
NULL check before ... | 0 | static void __dvb_frontend_free(struct dvb_frontend *fe)
{
struct dvb_frontend_private *fepriv = fe->frontend_priv;
if (fepriv)
dvb_free_device(fepriv->dvbdev);
dvb_frontend_invoke_release(fe, fe->ops.release);
kfree(fepriv);
} | 183,928,511,216,045,540,000,000,000,000,000,000,000 | dvb_frontend.c | 27,555,465,551,478,280,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2017-16648 | The dvb_frontend_free function in drivers/media/dvb-core/dvb_frontend.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via a crafted USB device. NOTE: the function was later renamed __dvb_frontend_free. | https://nvd.nist.gov/vuln/detail/CVE-2017-16648 |
199,707 | cpython | c3c9db89273fabc62ea1b48389d9a3000c1c03ae | https://github.com/python/cpython | https://github.com/python/cpython/commit/c3c9db89273fabc62ea1b48389d9a3000c1c03ae | [2.7] bpo-30657: Check & prevent integer overflow in PyString_DecodeEscape (#2174) | 1 | PyObject *PyString_DecodeEscape(const char *s,
Py_ssize_t len,
const char *errors,
Py_ssize_t unicode,
const char *recode_encoding)
{
int c;
char *p, *buf;
const char *end;
PyO... | 21,727,633,413,715,120,000,000,000,000,000,000,000 | stringobject.c | 283,892,388,416,421,570,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2017-1000158 | CPython (aka Python) up to 2.7.13 is vulnerable to an integer overflow in the PyString_DecodeEscape function in stringobject.c, resulting in heap-based buffer overflow (and possible arbitrary code execution) | https://nvd.nist.gov/vuln/detail/CVE-2017-1000158 |
291,663 | cpython | c3c9db89273fabc62ea1b48389d9a3000c1c03ae | https://github.com/python/cpython | https://github.com/python/cpython/commit/c3c9db89273fabc62ea1b48389d9a3000c1c03ae | [2.7] bpo-30657: Check & prevent integer overflow in PyString_DecodeEscape (#2174) | 0 | PyObject *PyString_DecodeEscape(const char *s,
Py_ssize_t len,
const char *errors,
Py_ssize_t unicode,
const char *recode_encoding)
{
int c;
char *p, *buf;
const char *end;
PyO... | 119,915,304,247,584,350,000,000,000,000,000,000,000 | stringobject.c | 33,415,377,762,331,090,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2017-1000158 | CPython (aka Python) up to 2.7.13 is vulnerable to an integer overflow in the PyString_DecodeEscape function in stringobject.c, resulting in heap-based buffer overflow (and possible arbitrary code execution) | https://nvd.nist.gov/vuln/detail/CVE-2017-1000158 |
199,708 | php-src | a5538c62293fa782fcc382d0635cfc0c8b9190e3 | https://github.com/php/php-src | https://github.com/php/php-src/commit/a5538c62293fa782fcc382d0635cfc0c8b9190e3 | Fix #81122: SSRF bypass in FILTER_VALIDATE_URL
We need to ensure that the password detected by parse_url() is actually
a valid password; we can re-use is_userinfo_valid() for that. | 1 | void php_filter_validate_url(PHP_INPUT_FILTER_PARAM_DECL) /* {{{ */
{
php_url *url;
size_t old_len = Z_STRLEN_P(value);
if (flags & (FILTER_FLAG_SCHEME_REQUIRED | FILTER_FLAG_HOST_REQUIRED)) {
php_error_docref(NULL, E_DEPRECATED,
"explicit use of FILTER_FLAG_SCHEME_REQUIRED and FILTER_FLAG_HOST_REQUIRED is dep... | 154,868,420,137,462,290,000,000,000,000,000,000,000 | logical_filters.c | 125,913,028,542,076,850,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2021-21705 | In PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below 8.0.8, when using URL validation functionality via filter_var() function with FILTER_VALIDATE_URL parameter, an URL with invalid password field can be accepted as valid. This can lead to the code incorrectly parsing the URL and potentially leading t... | https://nvd.nist.gov/vuln/detail/CVE-2021-21705 |
291,733 | php-src | a5538c62293fa782fcc382d0635cfc0c8b9190e3 | https://github.com/php/php-src | https://github.com/php/php-src/commit/a5538c62293fa782fcc382d0635cfc0c8b9190e3 | Fix #81122: SSRF bypass in FILTER_VALIDATE_URL
We need to ensure that the password detected by parse_url() is actually
a valid password; we can re-use is_userinfo_valid() for that. | 0 | void php_filter_validate_url(PHP_INPUT_FILTER_PARAM_DECL) /* {{{ */
{
php_url *url;
size_t old_len = Z_STRLEN_P(value);
if (flags & (FILTER_FLAG_SCHEME_REQUIRED | FILTER_FLAG_HOST_REQUIRED)) {
php_error_docref(NULL, E_DEPRECATED,
"explicit use of FILTER_FLAG_SCHEME_REQUIRED and FILTER_FLAG_HOST_REQUIRED is dep... | 52,509,983,194,461,180,000,000,000,000,000,000,000 | logical_filters.c | 39,877,530,416,217,100,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2021-21705 | In PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below 8.0.8, when using URL validation functionality via filter_var() function with FILTER_VALIDATE_URL parameter, an URL with invalid password field can be accepted as valid. This can lead to the code incorrectly parsing the URL and potentially leading t... | https://nvd.nist.gov/vuln/detail/CVE-2021-21705 |
199,709 | ImageMagick | db5e12e24f1378ce8c93a5c35991dcdd23a67bb0 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/db5e12e24f1378ce8c93a5c35991dcdd23a67bb0 | https://github.com/ImageMagick/ImageMagick/issues/1726 | 1 | static MagickBooleanType WritePALMImage(const ImageInfo *image_info,
Image *image,ExceptionInfo *exception)
{
MagickBooleanType
status;
MagickOffsetType
currentOffset,
offset,
scene;
MagickSizeType
cc;
PixelInfo
transpix;
QuantizeInfo
*quantize_info;
register ssize_t
x... | 64,675,320,107,609,210,000,000,000,000,000,000,000 | palm.c | 7,628,018,621,299,670,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2020-27761 | WritePALMImage() in /coders/palm.c used size_t casts in several areas of a calculation which could lead to values outside the range of representable type `unsigned long` undefined behavior when a crafted input file was processed by ImageMagick. The patch casts to `ssize_t` instead to avoid this issue. Red Hat Product S... | https://nvd.nist.gov/vuln/detail/CVE-2020-27761 |
291,745 | ImageMagick | db5e12e24f1378ce8c93a5c35991dcdd23a67bb0 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/db5e12e24f1378ce8c93a5c35991dcdd23a67bb0 | https://github.com/ImageMagick/ImageMagick/issues/1726 | 0 | static MagickBooleanType WritePALMImage(const ImageInfo *image_info,
Image *image,ExceptionInfo *exception)
{
MagickBooleanType
status;
MagickOffsetType
currentOffset,
offset,
scene;
MagickSizeType
cc;
PixelInfo
transpix;
QuantizeInfo
*quantize_info;
register ssize_t
x... | 267,079,839,814,655,800,000,000,000,000,000,000,000 | palm.c | 60,936,004,001,448,250,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2020-27761 | WritePALMImage() in /coders/palm.c used size_t casts in several areas of a calculation which could lead to values outside the range of representable type `unsigned long` undefined behavior when a crafted input file was processed by ImageMagick. The patch casts to `ssize_t` instead to avoid this issue. Red Hat Product S... | https://nvd.nist.gov/vuln/detail/CVE-2020-27761 |
199,710 | ModSecurity | 0840b13612a0b7ef1ce7441cf811dcfc6b463fba | https://github.com/SpiderLabs/ModSecurity | https://github.com/SpiderLabs/ModSecurity/commit/0840b13612a0b7ef1ce7441cf811dcfc6b463fba | Fixed: chuck null pointer when unknown CT is sent and over in-memory limit | 1 | static apr_status_t modsecurity_request_body_store_memory(modsec_rec *msr,
const char *data, apr_size_t length, char **error_msg)
{
*error_msg = NULL;
/* Would storing this chunk mean going over the limit? */
if ((msr->msc_reqbody_spilltodisk)
&& (msr->msc_reqbody_length + length > (apr_size_t)... | 46,572,576,200,724,530,000,000,000,000,000,000,000 | msc_reqbody.c | 281,743,696,438,437,560,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2013-2765 | The ModSecurity module before 2.7.4 for the Apache HTTP Server allows remote attackers to cause a denial of service (NULL pointer dereference, process crash, and disk consumption) via a POST request with a large body and a crafted Content-Type header. | https://nvd.nist.gov/vuln/detail/CVE-2013-2765 |
291,748 | ModSecurity | 0840b13612a0b7ef1ce7441cf811dcfc6b463fba | https://github.com/SpiderLabs/ModSecurity | https://github.com/SpiderLabs/ModSecurity/commit/0840b13612a0b7ef1ce7441cf811dcfc6b463fba | Fixed: chuck null pointer when unknown CT is sent and over in-memory limit | 0 | static apr_status_t modsecurity_request_body_store_memory(modsec_rec *msr,
const char *data, apr_size_t length, char **error_msg)
{
*error_msg = NULL;
/* Would storing this chunk mean going over the limit? */
if ((msr->msc_reqbody_spilltodisk)
&& (msr->txcfg->reqbody_buffering != REQUEST_BODY_F... | 230,588,638,379,883,170,000,000,000,000,000,000,000 | msc_reqbody.c | 99,172,905,554,349,360,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2013-2765 | The ModSecurity module before 2.7.4 for the Apache HTTP Server allows remote attackers to cause a denial of service (NULL pointer dereference, process crash, and disk consumption) via a POST request with a large body and a crafted Content-Type header. | https://nvd.nist.gov/vuln/detail/CVE-2013-2765 |
199,749 | php-src | eaf4e77190d402ea014207e9a7d5da1a4f3727ba | https://github.com/php/php-src | https://git.php.net/?p=php-src.git;a=commit;h=eaf4e77190d402ea014207e9a7d5da1a4f3727ba | Fix bug #71610: Type Confusion Vulnerability - SOAP / make_http_soap_request() | 1 | int make_http_soap_request(zval *this_ptr,
zend_string *buf,
char *location,
char *soapaction,
int soap_version,
zval *return_value)
{
zend_string ... | 77,866,418,827,808,110,000,000,000,000,000,000,000 | php_http.c | 72,369,828,773,664,050,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2016-3185 | The make_http_soap_request function in ext/soap/php_http.c in PHP before 5.4.44, 5.5.x before 5.5.28, 5.6.x before 5.6.12, and 7.x before 7.0.4 allows remote attackers to obtain sensitive information from process memory or cause a denial of service (type confusion and application crash) via crafted serialized _cookies ... | https://nvd.nist.gov/vuln/detail/CVE-2016-3185 |
291,982 | php-src | eaf4e77190d402ea014207e9a7d5da1a4f3727ba | https://github.com/php/php-src | https://git.php.net/?p=php-src.git;a=commit;h=eaf4e77190d402ea014207e9a7d5da1a4f3727ba | Fix bug #71610: Type Confusion Vulnerability - SOAP / make_http_soap_request() | 0 | int make_http_soap_request(zval *this_ptr,
zend_string *buf,
char *location,
char *soapaction,
int soap_version,
zval *return_value)
{
zend_string ... | 98,152,607,717,245,000,000,000,000,000,000,000,000 | php_http.c | 229,500,067,081,263,700,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2016-3185 | The make_http_soap_request function in ext/soap/php_http.c in PHP before 5.4.44, 5.5.x before 5.5.28, 5.6.x before 5.6.12, and 7.x before 7.0.4 allows remote attackers to obtain sensitive information from process memory or cause a denial of service (type confusion and application crash) via crafted serialized _cookies ... | https://nvd.nist.gov/vuln/detail/CVE-2016-3185 |
199,752 | samba | d6c28913f3109d1327a3d1369b6eafd3874b2dca | https://github.com/samba-team/samba | http://git.samba.org/?p=samba.git;a=commitdiff;h=d6c28913f3109d1327a3d1369b6eafd3874b2dca | Bug 6488: acl_group_override() call in posix acls references an uninitialized variable.
(cherry picked from commit f92195e3a1baaddda47a5d496f9488c8445b41ad) | 1 | static bool acl_group_override(connection_struct *conn,
gid_t prim_gid,
const char *fname)
{
SMB_STRUCT_STAT sbuf;
if ((errno != EPERM) && (errno != EACCES)) {
return false;
}
/* file primary group == user primary or supplementary group */
if (lp_acl_group_control(SNUM(conn)) &&
current_user_in_grou... | 3,053,031,308,927,266,000,000,000,000,000,000,000 | posix_acls.c | 177,653,535,708,007,400,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2009-1888 | The acl_group_override function in smbd/posix_acls.c in smbd in Samba 3.0.x before 3.0.35, 3.1.x and 3.2.x before 3.2.13, and 3.3.x before 3.3.6, when dos filemode is enabled, allows remote attackers to modify access control lists for files via vectors related to read access to uninitialized memory. | https://nvd.nist.gov/vuln/detail/CVE-2009-1888 |
291,999 | samba | d6c28913f3109d1327a3d1369b6eafd3874b2dca | https://github.com/samba-team/samba | http://git.samba.org/?p=samba.git;a=commitdiff;h=d6c28913f3109d1327a3d1369b6eafd3874b2dca | Bug 6488: acl_group_override() call in posix acls references an uninitialized variable.
(cherry picked from commit f92195e3a1baaddda47a5d496f9488c8445b41ad) | 0 | static bool acl_group_override(connection_struct *conn,
SMB_STRUCT_STAT *psbuf,
const char *fname)
{
if ((errno != EPERM) && (errno != EACCES)) {
return false;
}
/* file primary group == user primary or supplementary group */
if (lp_acl_group_control(SNUM(conn)) &&
current_user_in_group(psbuf->st_gid)... | 172,602,061,259,793,000,000,000,000,000,000,000,000 | posix_acls.c | 252,409,568,123,051,230,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2009-1888 | The acl_group_override function in smbd/posix_acls.c in smbd in Samba 3.0.x before 3.0.35, 3.1.x and 3.2.x before 3.2.13, and 3.3.x before 3.3.6, when dos filemode is enabled, allows remote attackers to modify access control lists for files via vectors related to read access to uninitialized memory. | https://nvd.nist.gov/vuln/detail/CVE-2009-1888 |
199,758 | ceph | 375d926a4f2720a29b079c216bafb884eef985c3 | https://github.com/ceph/ceph | https://github.com/ceph/ceph/commit/375d926a4f2720a29b079c216bafb884eef985c3 | rgw: check for tagging element in POST Obj requests
Check for null element when reading the tagging field from POST obj XML
Fixes: https://tracker.ceph.com/issues/44967
Signed-off-by: Abhishek Lekshmanan <abhishek@suse.com> | 1 | int RGWPostObj_ObjStore_S3::get_tags()
{
string tags_str;
if (part_str(parts, "tagging", &tags_str)) {
RGWObjTagsXMLParser parser;
if (!parser.init()){
ldout(s->cct, 0) << "Couldn't init RGWObjTags XML parser" << dendl;
err_msg = "Server couldn't process the request";
return -EINVAL; // TO... | 104,383,316,393,684,460,000,000,000,000,000,000,000 | rgw_rest_s3.cc | 214,234,698,213,291,060,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2020-12059 | An issue was discovered in Ceph through 13.2.9. A POST request with an invalid tagging XML can crash the RGW process by triggering a NULL pointer exception. | https://nvd.nist.gov/vuln/detail/CVE-2020-12059 |
292,102 | ceph | 375d926a4f2720a29b079c216bafb884eef985c3 | https://github.com/ceph/ceph | https://github.com/ceph/ceph/commit/375d926a4f2720a29b079c216bafb884eef985c3 | rgw: check for tagging element in POST Obj requests
Check for null element when reading the tagging field from POST obj XML
Fixes: https://tracker.ceph.com/issues/44967
Signed-off-by: Abhishek Lekshmanan <abhishek@suse.com> | 0 | int RGWPostObj_ObjStore_S3::get_tags()
{
string tags_str;
if (part_str(parts, "tagging", &tags_str)) {
RGWObjTagsXMLParser parser;
if (!parser.init()){
ldout(s->cct, 0) << "Couldn't init RGWObjTags XML parser" << dendl;
err_msg = "Server couldn't process the request";
return -EINVAL; // TO... | 262,521,396,749,722,740,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2020-12059 | An issue was discovered in Ceph through 13.2.9. A POST request with an invalid tagging XML can crash the RGW process by triggering a NULL pointer exception. | https://nvd.nist.gov/vuln/detail/CVE-2020-12059 |
199,769 | quassel | 8b5ecd226f9208af3074b33d3b7cf5e14f55b138 | https://github.com/quassel/quassel | https://github.com/quassel/quassel/commit/8b5ecd226f9208af3074b33d3b7cf5e14f55b138 | Check for invalid input in encrypted buffers
The ECB Blowfish decryption function assumed that encrypted input would
always come in blocks of 12 characters, as specified. However, buggy
clients or annoying people may not adhere to that assumption, causing
the core to crash while trying to process the invalid base64 in... | 1 | QByteArray Cipher::blowfishECB(QByteArray cipherText, bool direction)
{
QCA::Initializer init;
QByteArray temp = cipherText;
//do padding ourselves
if (direction)
{
while ((temp.length() % 8) != 0) temp.append('\0');
}
else
{
temp = b64ToByte(temp);
while ((temp.... | 209,047,146,554,164,900,000,000,000,000,000,000,000 | cipher.cpp | 34,882,956,456,750,540,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2014-8483 | The blowfishECB function in core/cipher.cpp in Quassel IRC 0.10.0 allows remote attackers to cause a denial of service (out-of-bounds read) via a malformed string. | https://nvd.nist.gov/vuln/detail/CVE-2014-8483 |
292,388 | quassel | 8b5ecd226f9208af3074b33d3b7cf5e14f55b138 | https://github.com/quassel/quassel | https://github.com/quassel/quassel/commit/8b5ecd226f9208af3074b33d3b7cf5e14f55b138 | Check for invalid input in encrypted buffers
The ECB Blowfish decryption function assumed that encrypted input would
always come in blocks of 12 characters, as specified. However, buggy
clients or annoying people may not adhere to that assumption, causing
the core to crash while trying to process the invalid base64 in... | 0 | QByteArray Cipher::blowfishECB(QByteArray cipherText, bool direction)
{
QCA::Initializer init;
QByteArray temp = cipherText;
//do padding ourselves
if (direction)
{
while ((temp.length() % 8) != 0) temp.append('\0');
}
else
{
// ECB Blowfish encodes in blocks of 12 chars... | 22,263,619,940,289,437,000,000,000,000,000,000,000 | cipher.cpp | 14,208,552,185,856,785,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2014-8483 | The blowfishECB function in core/cipher.cpp in Quassel IRC 0.10.0 allows remote attackers to cause a denial of service (out-of-bounds read) via a malformed string. | https://nvd.nist.gov/vuln/detail/CVE-2014-8483 |
199,772 | upx | ef336dbcc6dc8344482f8cf6c909ae96c3286317 | https://github.com/upx/upx | https://github.com/upx/upx/commit/ef336dbcc6dc8344482f8cf6c909ae96c3286317 | Protect against bad crafted input.
https://github.com/upx/upx/issues/128
modified: p_lx_elf.cpp | 1 | void PackLinuxElf64::unpack(OutputFile *fo)
{
unsigned const c_phnum = get_te16(&ehdri.e_phnum);
upx_uint64_t old_data_off = 0;
upx_uint64_t old_data_len = 0;
upx_uint64_t old_dtinit = 0;
unsigned szb_info = sizeof(b_info);
{
upx_uint64_t const e_entry = get_te64(&ehdri.e_entry);
... | 224,886,921,534,825,040,000,000,000,000,000,000,000 | p_lx_elf.cpp | 201,133,125,951,494,360,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2017-15056 | p_lx_elf.cpp in UPX 3.94 mishandles ELF headers, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by an Invalid Pointer Read in PackLinuxElf64::unpack(). | https://nvd.nist.gov/vuln/detail/CVE-2017-15056 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.