idx
int64
project
string
commit_id
string
project_url
string
commit_url
string
commit_message
string
target
int64
func
string
func_hash
float64
file_name
string
file_hash
float64
cwe
list
cve
string
cve_desc
string
nvd_url
string
276,136
FreeRDP
0d79670a28c0ab049af08613621aa0c267f977e9
https://github.com/FreeRDP/FreeRDP
https://github.com/FreeRDP/FreeRDP/commit/0d79670a28c0ab049af08613621aa0c267f977e9
Fixed missing input checks for file contents request reported by Valentino Ricotta (Thalium)
0
wf_cliprdr_server_file_contents_request(CliprdrClientContext* context, const CLIPRDR_FILE_CONTENTS_REQUEST* fileContentsRequest) { DWORD uSize = 0; BYTE* pData = NULL; HRESULT hRet = S_OK; FORMATETC vFormatEtc; LPDATAOBJECT pDataObj = NULL; STGMEDIUM vStgMedium; BOOL bIsSt...
201,572,744,152,935,570,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2021-37594
In FreeRDP before 2.4.0 on Windows, wf_cliprdr_server_file_contents_request in client/Windows/wf_cliprdr.c has missing input checks for a FILECONTENTS_SIZE File Contents Request PDU.
https://nvd.nist.gov/vuln/detail/CVE-2021-37594
198,507
tensorflow
c570e2ecfc822941335ad48f6e10df4e21f11c96
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/c570e2ecfc822941335ad48f6e10df4e21f11c96
Fix issues in Conv2DBackpropFilter. PiperOrigin-RevId: 369772454 Change-Id: I49b465f2ae2ce91def61b56cea8000197d5177d8
1
void Compute(OpKernelContext* context) override { const Tensor& input = context->input(0); const Tensor& filter_sizes = context->input(1); const Tensor& out_backprop = context->input(2); OP_REQUIRES( context, TensorShapeUtils::IsVector(filter_sizes.shape()), errors::InvalidArgument( ...
214,919,909,721,310,240,000,000,000,000,000,000,000
conv_grad_filter_ops.cc
207,258,797,177,321,900,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2021-29540
TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a heap buffer overflow to occur in `Conv2DBackpropFilter`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/1b0296c3b8dd9bd948f924aa8cd62f87dbb7c3da/tensorflow/core/kernels/conv_grad_filter_ops.c...
https://nvd.nist.gov/vuln/detail/CVE-2021-29540
276,197
tensorflow
c570e2ecfc822941335ad48f6e10df4e21f11c96
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tensorflow/commit/c570e2ecfc822941335ad48f6e10df4e21f11c96
Fix issues in Conv2DBackpropFilter. PiperOrigin-RevId: 369772454 Change-Id: I49b465f2ae2ce91def61b56cea8000197d5177d8
0
void Compute(OpKernelContext* context) override { const Tensor& input = context->input(0); const Tensor& filter_sizes = context->input(1); const Tensor& out_backprop = context->input(2); OP_REQUIRES( context, TensorShapeUtils::IsVector(filter_sizes.shape()), errors::InvalidArgument( ...
52,777,380,010,291,300,000,000,000,000,000,000,000
conv_grad_filter_ops.cc
223,655,851,595,757,500,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2021-29540
TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a heap buffer overflow to occur in `Conv2DBackpropFilter`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/1b0296c3b8dd9bd948f924aa8cd62f87dbb7c3da/tensorflow/core/kernels/conv_grad_filter_ops.c...
https://nvd.nist.gov/vuln/detail/CVE-2021-29540
198,514
linux
cadfad870154e14f745ec845708bc17d166065f2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/cadfad870154e14f745ec845708bc17d166065f2
x86/ioperm: Fix io bitmap invalidation on Xen PV tss_invalidate_io_bitmap() wasn't wired up properly through the pvop machinery, so the TSS and Xen's io bitmap would get out of sync whenever disabling a valid io bitmap. Add a new pvop for tss_invalidate_io_bitmap() to fix it. This is XSA-329. Fixes: 22fe5b0439dd ("...
1
static inline void tss_invalidate_io_bitmap(struct tss_struct *tss) { /* * Invalidate the I/O bitmap by moving io_bitmap_base outside the * TSS limit so any subsequent I/O access from user space will * trigger a #GP. * * This is correct even when VMEXIT rewrites the TSS limit * to 0x67 as the only requirem...
48,093,674,951,203,940,000,000,000,000,000,000,000
process.c
206,298,094,046,840,830,000,000,000,000,000,000,000
[ "CWE-276" ]
CVE-2020-15852
An issue was discovered in the Linux kernel 5.5 through 5.7.9, as used in Xen through 4.13.x for x86 PV guests. An attacker may be granted the I/O port permissions of an unrelated task. This occurs because tss_invalidate_io_bitmap mishandling causes a loss of synchronization between the I/O bitmaps of TSS and Xen, aka ...
https://nvd.nist.gov/vuln/detail/CVE-2020-15852
276,362
linux
cadfad870154e14f745ec845708bc17d166065f2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/cadfad870154e14f745ec845708bc17d166065f2
x86/ioperm: Fix io bitmap invalidation on Xen PV tss_invalidate_io_bitmap() wasn't wired up properly through the pvop machinery, so the TSS and Xen's io bitmap would get out of sync whenever disabling a valid io bitmap. Add a new pvop for tss_invalidate_io_bitmap() to fix it. This is XSA-329. Fixes: 22fe5b0439dd ("...
0
static inline void native_tss_invalidate_io_bitmap(void) { /* * Invalidate the I/O bitmap by moving io_bitmap_base outside the * TSS limit so any subsequent I/O access from user space will * trigger a #GP. * * This is correct even when VMEXIT rewrites the TSS limit * to 0x67 as the only requirement is that...
170,611,018,962,157,200,000,000,000,000,000,000,000
io_bitmap.h
265,293,316,003,250,270,000,000,000,000,000,000,000
[ "CWE-276" ]
CVE-2020-15852
An issue was discovered in the Linux kernel 5.5 through 5.7.9, as used in Xen through 4.13.x for x86 PV guests. An attacker may be granted the I/O port permissions of an unrelated task. This occurs because tss_invalidate_io_bitmap mishandling causes a loss of synchronization between the I/O bitmaps of TSS and Xen, aka ...
https://nvd.nist.gov/vuln/detail/CVE-2020-15852
198,518
ntopng
f91fbe3d94c8346884271838ae3406ae633f6f15
https://github.com/ntop/ntopng
https://github.com/ntop/ntopng/commit/f91fbe3d94c8346884271838ae3406ae633f6f15
Check for presence of crsf in admin scripts
1
int Lua::handle_script_request(struct mg_connection *conn, const struct mg_request_info *request_info, char *script_path) { char buf[64], key[64], ifname[MAX_INTERFACE_NAME_LEN]; char *_cookies, user[64] = { '\0' }, outbuf[FILENAME_MAX]; AddressTree ptree; int rc; if(!L) return(-1); lu...
27,471,343,408,983,460,000,000,000,000,000,000,000
Lua.cpp
218,273,907,463,677,640,000,000,000,000,000,000,000
[ "CWE-284" ]
CVE-2017-5473
Cross-site request forgery (CSRF) vulnerability in ntopng through 2.4 allows remote attackers to hijack the authentication of arbitrary users, as demonstrated by admin/add_user.lua, admin/change_user_prefs.lua, admin/delete_user.lua, and admin/password_reset.lua.
https://nvd.nist.gov/vuln/detail/CVE-2017-5473
276,428
ntopng
f91fbe3d94c8346884271838ae3406ae633f6f15
https://github.com/ntop/ntopng
https://github.com/ntop/ntopng/commit/f91fbe3d94c8346884271838ae3406ae633f6f15
Check for presence of crsf in admin scripts
0
int Lua::handle_script_request(struct mg_connection *conn, const struct mg_request_info *request_info, char *script_path) { char buf[64], key[64], ifname[MAX_INTERFACE_NAME_LEN]; char *_cookies, user[64] = { '\0' }, outbuf[FILENAME_MAX]; AddressTree ptree; int rc; bool csrf_found = false; ...
319,670,085,656,497,740,000,000,000,000,000,000,000
Lua.cpp
129,001,726,801,090,760,000,000,000,000,000,000,000
[ "CWE-284" ]
CVE-2017-5473
Cross-site request forgery (CSRF) vulnerability in ntopng through 2.4 allows remote attackers to hijack the authentication of arbitrary users, as demonstrated by admin/add_user.lua, admin/change_user_prefs.lua, admin/delete_user.lua, and admin/password_reset.lua.
https://nvd.nist.gov/vuln/detail/CVE-2017-5473
198,528
rawspeed
dbe7591e54bad5e6430d38be6bed051582da76b9
https://github.com/darktable-org/rawspeed
https://github.com/darktable-org/rawspeed/commit/dbe7591e54bad5e6430d38be6bed051582da76b9
TableLookUp::setTable(): do actually check that the LUT is <2^16
1
void TableLookUp::setTable(int ntable, const std::vector<ushort16>& table) { assert(!table.empty()); const int nfilled = table.size(); if (ntable > ntables) { ThrowRDE("Table lookup with number greater than number of tables."); } ushort16* t = &tables[ntable * TABLE_SIZE]; if (!dither) { for (int ...
34,579,436,879,725,177,000,000,000,000,000,000,000
TableLookUp.cpp
97,008,400,419,411,380,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2018-25017
RawSpeed (aka librawspeed) 3.1 has a heap-based buffer overflow in TableLookUp::setTable.
https://nvd.nist.gov/vuln/detail/CVE-2018-25017
276,582
rawspeed
dbe7591e54bad5e6430d38be6bed051582da76b9
https://github.com/darktable-org/rawspeed
https://github.com/darktable-org/rawspeed/commit/dbe7591e54bad5e6430d38be6bed051582da76b9
TableLookUp::setTable(): do actually check that the LUT is <2^16
0
void TableLookUp::setTable(int ntable, const std::vector<ushort16>& table) { assert(!table.empty()); const int nfilled = table.size(); if (nfilled >= 65536) ThrowRDE("Table lookup with %i entries is unsupported", nfilled); if (ntable > ntables) { ThrowRDE("Table lookup with number greater than number ...
20,436,006,852,651,972,000,000,000,000,000,000,000
TableLookUp.cpp
324,238,232,149,816,900,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2018-25017
RawSpeed (aka librawspeed) 3.1 has a heap-based buffer overflow in TableLookUp::setTable.
https://nvd.nist.gov/vuln/detail/CVE-2018-25017
198,530
LibRaw
5563e6ddc3f7cb93d98b491194ceebdee7288d36
https://github.com/LibRaw/LibRaw
https://github.com/LibRaw/LibRaw/commit/5563e6ddc3f7cb93d98b491194ceebdee7288d36
Secunia 76000 #2: xtrans allhex not initialized
1
void CLASS xtrans_interpolate(int passes) { int c, d, f, g, h, i, v, ng, row, col, top, left, mrow, mcol; #ifdef LIBRAW_LIBRARY_BUILD int cstat[4]={0,0,0,0}; #endif int val, ndir, pass, hm[8], avg[4], color[3][8]; static const short orth[12] = {1, 0, 0, 1, -1, 0, 0, -1, 1, 0, 0, 1}, patt[...
48,187,991,316,381,660,000,000,000,000,000,000,000
dcraw.c
138,515,223,629,068,750,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-16910
An error within the "LibRaw::xtrans_interpolate()" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.6 can be exploited to cause an invalid read memory access and subsequently a Denial of Service condition.
https://nvd.nist.gov/vuln/detail/CVE-2017-16910
276,615
LibRaw
5563e6ddc3f7cb93d98b491194ceebdee7288d36
https://github.com/LibRaw/LibRaw
https://github.com/LibRaw/LibRaw/commit/5563e6ddc3f7cb93d98b491194ceebdee7288d36
Secunia 76000 #2: xtrans allhex not initialized
0
void CLASS xtrans_interpolate(int passes) { int c, d, f, g, h, i, v, ng, row, col, top, left, mrow, mcol; #ifdef LIBRAW_LIBRARY_BUILD int cstat[4]={0,0,0,0}; #endif int val, ndir, pass, hm[8], avg[4], color[3][8]; static const short orth[12] = {1, 0, 0, 1, -1, 0, 0, -1, 1, 0, 0, 1}, patt[...
122,758,582,596,936,420,000,000,000,000,000,000,000
dcraw.c
244,721,317,821,702,520,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-16910
An error within the "LibRaw::xtrans_interpolate()" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.6 can be exploited to cause an invalid read memory access and subsequently a Denial of Service condition.
https://nvd.nist.gov/vuln/detail/CVE-2017-16910
198,561
linux
342ffc26693b528648bdc9377e51e4f2450b4860
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=342ffc26693b528648bdc9377e51e4f2450b4860
scsi: aacraid: Don't copy uninitialized stack memory to userspace Both aac_send_raw_srb() and aac_get_hba_info() may copy stack allocated structs to userspace without initializing all members of these structs. Clear out this memory to prevent information leaks. Fixes: 423400e64d377 ("scsi: aacraid: Include HBA direct...
1
static int aac_send_raw_srb(struct aac_dev* dev, void __user * arg) { struct fib* srbfib; int status; struct aac_srb *srbcmd = NULL; struct aac_hba_cmd_req *hbacmd = NULL; struct user_aac_srb *user_srbcmd = NULL; struct user_aac_srb __user *user_srb = arg; struct aac_srb_reply __user *user_reply; u32 chn; u32 ...
110,829,612,099,652,870,000,000,000,000,000,000,000
commctrl.c
146,572,137,852,866,380,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2017-18549
An issue was discovered in drivers/scsi/aacraid/commctrl.c in the Linux kernel before 4.13. There is potential exposure of kernel stack memory because aac_send_raw_srb does not initialize the reply structure.
https://nvd.nist.gov/vuln/detail/CVE-2017-18549
277,073
linux
342ffc26693b528648bdc9377e51e4f2450b4860
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=342ffc26693b528648bdc9377e51e4f2450b4860
scsi: aacraid: Don't copy uninitialized stack memory to userspace Both aac_send_raw_srb() and aac_get_hba_info() may copy stack allocated structs to userspace without initializing all members of these structs. Clear out this memory to prevent information leaks. Fixes: 423400e64d377 ("scsi: aacraid: Include HBA direct...
0
static int aac_send_raw_srb(struct aac_dev* dev, void __user * arg) { struct fib* srbfib; int status; struct aac_srb *srbcmd = NULL; struct aac_hba_cmd_req *hbacmd = NULL; struct user_aac_srb *user_srbcmd = NULL; struct user_aac_srb __user *user_srb = arg; struct aac_srb_reply __user *user_reply; u32 chn; u32 ...
48,740,376,612,584,800,000,000,000,000,000,000,000
commctrl.c
60,313,794,856,835,650,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2017-18549
An issue was discovered in drivers/scsi/aacraid/commctrl.c in the Linux kernel before 4.13. There is potential exposure of kernel stack memory because aac_send_raw_srb does not initialize the reply structure.
https://nvd.nist.gov/vuln/detail/CVE-2017-18549
198,565
qemu
99ccfaa1edafd79f7a3a0ff7b58ae4da7c514928
https://github.com/bonzini/qemu
https://git.qemu.org/?p=qemu.git;a=commit;h=99ccfaa1edafd79f7a3a0ff7b58ae4da7c514928
pcnet: switch to use qemu_receive_packet() for loopback This patch switches to use qemu_receive_packet() which can detect reentrancy and return early. This is intended to address CVE-2021-3416. Cc: Prasad J Pandit <ppandit@redhat.com> Cc: qemu-stable@nongnu.org Buglink: https://bugs.launchpad.net/qemu/+bug/1917085 R...
1
static void pcnet_transmit(PCNetState *s) { hwaddr xmit_cxda = 0; int count = CSR_XMTRL(s)-1; int add_crc = 0; int bcnt; s->xmit_pos = -1; if (!CSR_TXON(s)) { s->csr[0] &= ~0x0008; return; } s->tx_busy = 1; txagain: if (pcnet_tdte_poll(s)) { struct pcnet_TM...
139,148,100,945,581,000,000,000,000,000,000,000,000
pcnet.c
268,636,879,995,922,970,000,000,000,000,000,000,000
[ "CWE-835" ]
CVE-2021-3416
A potential stack overflow via infinite loop issue was found in various NIC emulators of QEMU in versions up to and including 5.2.0. The issue occurs in loopback mode of a NIC wherein reentrant DMA checks get bypassed. A guest user/process may use this flaw to consume CPU cycles or crash the QEMU process on the host re...
https://nvd.nist.gov/vuln/detail/CVE-2021-3416
277,464
qemu
99ccfaa1edafd79f7a3a0ff7b58ae4da7c514928
https://github.com/bonzini/qemu
https://git.qemu.org/?p=qemu.git;a=commit;h=99ccfaa1edafd79f7a3a0ff7b58ae4da7c514928
pcnet: switch to use qemu_receive_packet() for loopback This patch switches to use qemu_receive_packet() which can detect reentrancy and return early. This is intended to address CVE-2021-3416. Cc: Prasad J Pandit <ppandit@redhat.com> Cc: qemu-stable@nongnu.org Buglink: https://bugs.launchpad.net/qemu/+bug/1917085 R...
0
static void pcnet_transmit(PCNetState *s) { hwaddr xmit_cxda = 0; int count = CSR_XMTRL(s)-1; int add_crc = 0; int bcnt; s->xmit_pos = -1; if (!CSR_TXON(s)) { s->csr[0] &= ~0x0008; return; } s->tx_busy = 1; txagain: if (pcnet_tdte_poll(s)) { struct pcnet_TM...
50,331,905,634,955,580,000,000,000,000,000,000,000
pcnet.c
125,366,948,590,600,870,000,000,000,000,000,000,000
[ "CWE-835" ]
CVE-2021-3416
A potential stack overflow via infinite loop issue was found in various NIC emulators of QEMU in versions up to and including 5.2.0. The issue occurs in loopback mode of a NIC wherein reentrant DMA checks get bypassed. A guest user/process may use this flaw to consume CPU cycles or crash the QEMU process on the host re...
https://nvd.nist.gov/vuln/detail/CVE-2021-3416
198,578
torque
64da0af7ed27284f3397081313850bba270593db
https://github.com/adaptivecomputing/torque
https://github.com/adaptivecomputing/torque/commit/64da0af7ed27284f3397081313850bba270593db
Fix CVE 2013-4495. Note: this patch has been verified as fixing this security hole but has not received other regression testing.
1
void svr_mailowner( job *pjob, /* I */ int mailpoint, /* note, single character */ int force, /* if set to MAIL_FORCE, force mail delivery */ char *text) /* (optional) additional message text */ { char *cmdbuf; int i; char *mailfrom; char mailto[1024]; char *bodyfmt, *...
170,670,393,942,047,970,000,000,000,000,000,000,000
svr_mail.c
107,858,544,101,674,440,000,000,000,000,000,000,000
[ "CWE-94" ]
CVE-2013-4495
The send_the_mail function in server/svr_mail.c in Terascale Open-Source Resource and Queue Manager (aka TORQUE Resource Manager) before 4.2.6 allows remote attackers to execute arbitrary commands via shell metacharacters in the email (-M switch) to qsub.
https://nvd.nist.gov/vuln/detail/CVE-2013-4495
277,678
torque
64da0af7ed27284f3397081313850bba270593db
https://github.com/adaptivecomputing/torque
https://github.com/adaptivecomputing/torque/commit/64da0af7ed27284f3397081313850bba270593db
Fix CVE 2013-4495. Note: this patch has been verified as fixing this security hole but has not received other regression testing.
0
void svr_mailowner( job *pjob, /* I */ int mailpoint, /* note, single character */ int force, /* if set to MAIL_FORCE, force mail delivery */ char *text) /* (optional) additional message text */ { int status = 0; int numargs = 0; int pipes[2]; int ...
318,859,164,700,357,440,000,000,000,000,000,000,000
svr_mail.c
275,508,811,009,353,140,000,000,000,000,000,000,000
[ "CWE-94" ]
CVE-2013-4495
The send_the_mail function in server/svr_mail.c in Terascale Open-Source Resource and Queue Manager (aka TORQUE Resource Manager) before 4.2.6 allows remote attackers to execute arbitrary commands via shell metacharacters in the email (-M switch) to qsub.
https://nvd.nist.gov/vuln/detail/CVE-2013-4495
198,627
linux
57be09c6e8747bf48704136d9e3f92bfb93f5725
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/57be09c6e8747bf48704136d9e3f92bfb93f5725
drm/amdgpu: fix multiple memory leaks in acp_hw_init In acp_hw_init there are some allocations that needs to be released in case of failure: 1- adev->acp.acp_genpd should be released if any allocation attemp for adev->acp.acp_cell, adev->acp.acp_res or i2s_pdata fails. 2- all of those allocations should be released i...
1
static int acp_hw_init(void *handle) { int r, i; uint64_t acp_base; u32 val = 0; u32 count = 0; struct device *dev; struct i2s_platform_data *i2s_pdata; struct amdgpu_device *adev = (struct amdgpu_device *)handle; const struct amdgpu_ip_block *ip_block = amdgpu_device_ip_get_ip_block(adev, AMD_IP_BLOCK_TYPE...
294,924,708,953,945,980,000,000,000,000,000,000,000
amdgpu_acp.c
144,565,265,513,438,020,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2019-19067
Four memory leaks in the acp_hw_init() function in drivers/gpu/drm/amd/amdgpu/amdgpu_acp.c in the Linux kernel before 5.3.8 allow attackers to cause a denial of service (memory consumption) by triggering mfd_add_hotplug_devices() or pm_genpd_add_device() failures, aka CID-57be09c6e874. NOTE: third parties dispute the r...
https://nvd.nist.gov/vuln/detail/CVE-2019-19067
279,440
linux
57be09c6e8747bf48704136d9e3f92bfb93f5725
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/57be09c6e8747bf48704136d9e3f92bfb93f5725
drm/amdgpu: fix multiple memory leaks in acp_hw_init In acp_hw_init there are some allocations that needs to be released in case of failure: 1- adev->acp.acp_genpd should be released if any allocation attemp for adev->acp.acp_cell, adev->acp.acp_res or i2s_pdata fails. 2- all of those allocations should be released i...
0
static int acp_hw_init(void *handle) { int r, i; uint64_t acp_base; u32 val = 0; u32 count = 0; struct device *dev; struct i2s_platform_data *i2s_pdata = NULL; struct amdgpu_device *adev = (struct amdgpu_device *)handle; const struct amdgpu_ip_block *ip_block = amdgpu_device_ip_get_ip_block(adev, AMD_IP_BLO...
196,934,146,480,642,600,000,000,000,000,000,000,000
amdgpu_acp.c
215,280,403,172,808,540,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2019-19067
Four memory leaks in the acp_hw_init() function in drivers/gpu/drm/amd/amdgpu/amdgpu_acp.c in the Linux kernel before 5.3.8 allow attackers to cause a denial of service (memory consumption) by triggering mfd_add_hotplug_devices() or pm_genpd_add_device() failures, aka CID-57be09c6e874. NOTE: third parties dispute the r...
https://nvd.nist.gov/vuln/detail/CVE-2019-19067
198,628
ghostpdl
a6f7464dddc689386668a38b92dfd03cc1b38a10
https://github.com/ArtifexSoftware/ghostpdl
https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=a6f7464dddc689386668a38b92dfd03cc1b38a10
Bug 701827: fixed incorrect buffer expansion in lxm5700m_print_page(). Fixes: ./sanbin/gs -dBATCH -dNOPAUSE -r425 -dFitPage -sOutputFile=tmp -sDEVICE=lxm5700m ../bug-701827.eps
1
/* ------ Driver procedures ------ */ /* Send the page to the printer. */ static int lxm5700m_print_page(gx_device_printer *pdev, gp_file *prn_stream) { int lnum,minX, maxX, i, l, highestX, leastX, extent; int direction = RIGHTWARD; int lastY = 0; int line_size = gdev_mem_bytes_per_scan_line((gx_devic...
73,748,361,173,510,950,000,000,000,000,000,000,000
gdevlxm.c
153,576,846,436,215,060,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2020-16309
A buffer overflow vulnerability in lxm5700m_print_page() in devices/gdevlxm.c of Artifex Software GhostScript v9.50 allows a remote attacker to cause a denial of service via a crafted eps file. This is fixed in v9.51.
https://nvd.nist.gov/vuln/detail/CVE-2020-16309
279,444
ghostpdl
a6f7464dddc689386668a38b92dfd03cc1b38a10
https://github.com/ArtifexSoftware/ghostpdl
https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=a6f7464dddc689386668a38b92dfd03cc1b38a10
Bug 701827: fixed incorrect buffer expansion in lxm5700m_print_page(). Fixes: ./sanbin/gs -dBATCH -dNOPAUSE -r425 -dFitPage -sOutputFile=tmp -sDEVICE=lxm5700m ../bug-701827.eps
0
/* ------ Driver procedures ------ */ /* Send the page to the printer. */ static int lxm5700m_print_page(gx_device_printer *pdev, gp_file *prn_stream) { int lnum,minX, maxX, i, l, highestX, leastX, extent; int direction = RIGHTWARD; int lastY = 0; int line_size = gdev_mem_bytes_per_scan_line((gx_devic...
101,994,055,001,164,850,000,000,000,000,000,000,000
gdevlxm.c
38,232,670,782,579,270,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2020-16309
A buffer overflow vulnerability in lxm5700m_print_page() in devices/gdevlxm.c of Artifex Software GhostScript v9.50 allows a remote attacker to cause a denial of service via a crafted eps file. This is fixed in v9.51.
https://nvd.nist.gov/vuln/detail/CVE-2020-16309
198,635
vim
083692d598139228e101b8c521aaef7bcf256e9a
https://github.com/vim/vim
https://github.com/vim/vim/commit/083692d598139228e101b8c521aaef7bcf256e9a
patch 9.0.0009: going past the end of a menu item with only modifier Problem: Going past the end of a menu item with only modifier. Solution: Check for NUL.
1
str2special( char_u **sp, int from) // TRUE for lhs of mapping { int c; static char_u buf[7]; char_u *str = *sp; int modifiers = 0; int special = FALSE; if (has_mbyte) { char_u *p; // Try to un-escape a multi-byte character. Return the un-escaped // string if it is a mu...
320,014,315,609,484,420,000,000,000,000,000,000,000
message.c
63,981,976,468,082,630,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2022-2257
Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.
https://nvd.nist.gov/vuln/detail/CVE-2022-2257
279,564
vim
083692d598139228e101b8c521aaef7bcf256e9a
https://github.com/vim/vim
https://github.com/vim/vim/commit/083692d598139228e101b8c521aaef7bcf256e9a
patch 9.0.0009: going past the end of a menu item with only modifier Problem: Going past the end of a menu item with only modifier. Solution: Check for NUL.
0
str2special( char_u **sp, int from) // TRUE for lhs of mapping { int c; static char_u buf[7]; char_u *str = *sp; int modifiers = 0; int special = FALSE; if (has_mbyte) { char_u *p; // Try to un-escape a multi-byte character. Return the un-escaped // string if it is a mu...
9,858,792,741,574,116,000,000,000,000,000,000,000
message.c
320,483,359,538,749,560,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2022-2257
Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.
https://nvd.nist.gov/vuln/detail/CVE-2022-2257
198,669
libbsd
9d917aad37778a9f4a96ba358415f077f3f36f3b
https://gitlab.freedesktop.org/libbsd/libbsd
https://gitlab.freedesktop.org/libbsd/libbsd/commit/9d917aad37778a9f4a96ba358415f077f3f36f3b
nlist: Fix out-of-bounds read on strtab When doing a string comparison for a symbol name from the string table, we should make sure we do a bounded comparison, otherwise a non-NUL terminated string might make the code read out-of-bounds. Warned-by: coverity
1
__fdnlist(int fd, struct nlist *list) { struct nlist *p; Elf_Off symoff = 0, symstroff = 0; Elf_Word symsize = 0, symstrsize = 0; Elf_Sword cc, i; int nent = -1; int errsave; Elf_Sym sbuf[1024]; Elf_Sym *s; Elf_Ehdr ehdr; char *strtab = NULL; Elf_Shdr *shdr = NULL; Elf_Word shdr_size; struct stat st; /* ...
118,100,133,344,550,690,000,000,000,000,000,000,000
nlist.c
121,027,983,985,129,320,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-20367
nlist.c in libbsd before 0.10.0 has an out-of-bounds read during a comparison for a symbol name from the string table (strtab).
https://nvd.nist.gov/vuln/detail/CVE-2019-20367
280,284
libbsd
9d917aad37778a9f4a96ba358415f077f3f36f3b
https://gitlab.freedesktop.org/libbsd/libbsd
https://gitlab.freedesktop.org/libbsd/libbsd/commit/9d917aad37778a9f4a96ba358415f077f3f36f3b
nlist: Fix out-of-bounds read on strtab When doing a string comparison for a symbol name from the string table, we should make sure we do a bounded comparison, otherwise a non-NUL terminated string might make the code read out-of-bounds. Warned-by: coverity
0
__fdnlist(int fd, struct nlist *list) { struct nlist *p; Elf_Off symoff = 0, symstroff = 0; Elf_Word symsize = 0, symstrsize = 0; Elf_Sword cc, i; int nent = -1; int errsave; Elf_Sym sbuf[1024]; Elf_Sym *s; Elf_Ehdr ehdr; char *strtab = NULL; Elf_Shdr *shdr = NULL; Elf_Word shdr_size; struct stat st; /* ...
90,156,776,775,514,740,000,000,000,000,000,000,000
nlist.c
298,242,182,717,567,550,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-20367
nlist.c in libbsd before 0.10.0 has an out-of-bounds read during a comparison for a symbol name from the string table (strtab).
https://nvd.nist.gov/vuln/detail/CVE-2019-20367
198,671
qemu
04bf2526ce87f21b32c9acba1c5518708c243ad0
https://github.com/bonzini/qemu
https://git.qemu.org/?p=qemu.git;a=commitdiff;h=04bf2526ce87f21b32c9acba1c5518708c243ad0
exec: use qemu_ram_ptr_length to access guest ram When accessing guest's ram block during DMA operation, use 'qemu_ram_ptr_length' to get ram block pointer. It ensures that DMA operation of given length is possible; And avoids any OOB memory access situations. Reported-by: Alex <broscutamaker@gmail.com> Signed-off-by...
1
static MemTxResult address_space_write_continue(AddressSpace *as, hwaddr addr, MemTxAttrs attrs, const uint8_t *buf, int len, hwaddr addr1, ...
114,559,029,617,645,620,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2017-11334
The address_space_write_continue function in exec.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (out-of-bounds access and guest instance crash) by leveraging use of qemu_map_ram_ptr to access guest ram block area.
https://nvd.nist.gov/vuln/detail/CVE-2017-11334
280,392
qemu
04bf2526ce87f21b32c9acba1c5518708c243ad0
https://github.com/bonzini/qemu
https://git.qemu.org/?p=qemu.git;a=commitdiff;h=04bf2526ce87f21b32c9acba1c5518708c243ad0
exec: use qemu_ram_ptr_length to access guest ram When accessing guest's ram block during DMA operation, use 'qemu_ram_ptr_length' to get ram block pointer. It ensures that DMA operation of given length is possible; And avoids any OOB memory access situations. Reported-by: Alex <broscutamaker@gmail.com> Signed-off-by...
0
static MemTxResult address_space_write_continue(AddressSpace *as, hwaddr addr, MemTxAttrs attrs, const uint8_t *buf, int len, hwaddr addr1, ...
136,207,157,571,170,200,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2017-11334
The address_space_write_continue function in exec.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (out-of-bounds access and guest instance crash) by leveraging use of qemu_map_ram_ptr to access guest ram block area.
https://nvd.nist.gov/vuln/detail/CVE-2017-11334
198,688
curl
facb0e4662415b5f28163e853dc6742ac5fafb3d
https://github.com/curl/curl
https://github.com/curl/curl/commit/facb0e4662415b5f28163e853dc6742ac5fafb3d
tftp: Alloc maximum blksize, and use default unless OACK is received Fixes potential buffer overflow from 'recvfrom()', should the server return an OACK without blksize. Bug: https://curl.haxx.se/docs/CVE-2019-5482.html CVE-2019-5482
1
static CURLcode tftp_connect(struct connectdata *conn, bool *done) { tftp_state_data_t *state; int blksize; blksize = TFTP_BLKSIZE_DEFAULT; state = conn->proto.tftpc = calloc(1, sizeof(tftp_state_data_t)); if(!state) return CURLE_OUT_OF_MEMORY; /* alloc pkt buffers based on specified blksize */ if(...
334,474,004,361,167,550,000,000,000,000,000,000,000
tftp.c
153,438,150,488,022,250,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2019-5482
Heap buffer overflow in the TFTP protocol handler in cURL 7.19.4 to 7.65.3.
https://nvd.nist.gov/vuln/detail/CVE-2019-5482
280,993
curl
facb0e4662415b5f28163e853dc6742ac5fafb3d
https://github.com/curl/curl
https://github.com/curl/curl/commit/facb0e4662415b5f28163e853dc6742ac5fafb3d
tftp: Alloc maximum blksize, and use default unless OACK is received Fixes potential buffer overflow from 'recvfrom()', should the server return an OACK without blksize. Bug: https://curl.haxx.se/docs/CVE-2019-5482.html CVE-2019-5482
0
static CURLcode tftp_connect(struct connectdata *conn, bool *done) { tftp_state_data_t *state; int blksize; int need_blksize; blksize = TFTP_BLKSIZE_DEFAULT; state = conn->proto.tftpc = calloc(1, sizeof(tftp_state_data_t)); if(!state) return CURLE_OUT_OF_MEMORY; /* alloc pkt buffers based on specif...
220,634,725,961,809,700,000,000,000,000,000,000,000
tftp.c
37,309,379,106,874,907,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2019-5482
Heap buffer overflow in the TFTP protocol handler in cURL 7.19.4 to 7.65.3.
https://nvd.nist.gov/vuln/detail/CVE-2019-5482
198,702
radare2
d7ea20fb2e1433ebece9f004d87ad8f2377af23d
https://github.com/radare/radare2
https://github.com/radareorg/radare2/commit/d7ea20fb2e1433ebece9f004d87ad8f2377af23d
Fix #18923 - Fix resource exhaustion bug in LE binary (#18926)
1
RList *r_bin_le_get_sections(r_bin_le_obj_t *bin) { RList *l = r_list_newf ((RListFree)r_bin_section_free); if (!l) { return NULL; } LE_image_header *h = bin->header; ut32 pages_start_off = h->datapage; int i; for (i = 0; i < h->objcnt; i++) { RBinSection *sec = R_NEW0 (RBinSection); if (!sec) { return ...
180,615,110,394,324,550,000,000,000,000,000,000,000
le.c
277,124,640,300,376,060,000,000,000,000,000,000,000
[ "CWE-252" ]
CVE-2021-3673
A vulnerability was found in Radare2 in version 5.3.1. Improper input validation when reading a crafted LE binary can lead to resource exhaustion and DoS.
https://nvd.nist.gov/vuln/detail/CVE-2021-3673
281,603
radare2
d7ea20fb2e1433ebece9f004d87ad8f2377af23d
https://github.com/radare/radare2
https://github.com/radareorg/radare2/commit/d7ea20fb2e1433ebece9f004d87ad8f2377af23d
Fix #18923 - Fix resource exhaustion bug in LE binary (#18926)
0
RList *r_bin_le_get_sections(r_bin_le_obj_t *bin) { RList *l = r_list_newf ((RListFree)r_bin_section_free); if (!l) { return NULL; } LE_image_header *h = bin->header; ut32 pages_start_off = h->datapage; int i; for (i = 0; i < h->objcnt; i++) { RBinSection *sec = R_NEW0 (RBinSection); if (!sec) { return ...
213,466,854,100,468,980,000,000,000,000,000,000,000
le.c
126,459,988,547,278,510,000,000,000,000,000,000,000
[ "CWE-252" ]
CVE-2021-3673
A vulnerability was found in Radare2 in version 5.3.1. Improper input validation when reading a crafted LE binary can lead to resource exhaustion and DoS.
https://nvd.nist.gov/vuln/detail/CVE-2021-3673
198,711
php-src
780ff63c377dc79de2c04d6b341913ab0102135b
https://github.com/php/php-src
http://git.php.net/?p=php-src.git;a=commit;h=780ff63c377dc79de2c04d6b341913ab0102135b
MFH: Fixed bug #46746 (xmlrpc_decode_request outputs non-suppressable error when given bad data).
1
xml_element* xml_elem_parse_buf(const char* in_buf, int len, XML_ELEM_INPUT_OPTIONS options, XML_ELEM_ERROR error) { xml_element* xReturn = NULL; char buf[100] = ""; static STRUCT_XML_ELEM_INPUT_OPTIONS default_opts = {encoding_utf_8}; if(!options) { options = &default_opts; } if(in_buf) { ...
78,706,985,366,586,345,000,000,000,000,000,000,000
xml_element.c
333,675,080,185,818,950,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-9020
An issue was discovered in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1. Invalid input to the function xmlrpc_decode() can lead to an invalid memory access (heap out of bounds read or read after free). This is related to xml_elem_parse_buf in ext/xmlrpc/libxmlrpc/xml_element.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-9020
282,083
php-src
780ff63c377dc79de2c04d6b341913ab0102135b
https://github.com/php/php-src
http://git.php.net/?p=php-src.git;a=commit;h=780ff63c377dc79de2c04d6b341913ab0102135b
MFH: Fixed bug #46746 (xmlrpc_decode_request outputs non-suppressable error when given bad data).
0
xml_element* xml_elem_parse_buf(const char* in_buf, int len, XML_ELEM_INPUT_OPTIONS options, XML_ELEM_ERROR error) { xml_element* xReturn = NULL; char buf[100] = ""; static STRUCT_XML_ELEM_INPUT_OPTIONS default_opts = {encoding_utf_8}; if(!options) { options = &default_opts; } if(in_buf) { ...
104,936,085,074,506,120,000,000,000,000,000,000,000
xml_element.c
239,657,393,220,256,050,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-9020
An issue was discovered in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1. Invalid input to the function xmlrpc_decode() can lead to an invalid memory access (heap out of bounds read or read after free). This is related to xml_elem_parse_buf in ext/xmlrpc/libxmlrpc/xml_element.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-9020
198,734
linux
81b1d548d00bcd028303c4f3150fa753b9b8aa71
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=81b1d548d00bcd028303c4f3150fa753b9b8aa71
hamradio: remove needs_free_netdev to avoid UAF The former patch "defer 6pack kfree after unregister_netdev" reorders the kfree of two buffer after the unregister_netdev to prevent the race condition. It also adds free_netdev() function in sixpack_close(), which is a direct copy from the similar code in mkiss_close()....
1
static void sp_setup(struct net_device *dev) { /* Finish setting up the DEVICE info. */ dev->netdev_ops = &sp_netdev_ops; dev->needs_free_netdev = true; dev->mtu = SIXP_MTU; dev->hard_header_len = AX25_MAX_HEADER_LEN; dev->header_ops = &ax25_header_ops; dev->addr_len = AX25_ADDR_LEN; dev->type = ARPHRD_AX...
191,845,120,214,579,340,000,000,000,000,000,000,000
None
null
[ "CWE-416" ]
CVE-2022-1195
A use-after-free vulnerability was found in the Linux kernel in drivers/net/hamradio. This flaw allows a local attacker with a user privilege to cause a denial of service (DOS) when the mkiss or sixpack device is detached and reclaim resources early.
https://nvd.nist.gov/vuln/detail/CVE-2022-1195
282,826
linux
81b1d548d00bcd028303c4f3150fa753b9b8aa71
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=81b1d548d00bcd028303c4f3150fa753b9b8aa71
hamradio: remove needs_free_netdev to avoid UAF The former patch "defer 6pack kfree after unregister_netdev" reorders the kfree of two buffer after the unregister_netdev to prevent the race condition. It also adds free_netdev() function in sixpack_close(), which is a direct copy from the similar code in mkiss_close()....
0
static void sp_setup(struct net_device *dev) { /* Finish setting up the DEVICE info. */ dev->netdev_ops = &sp_netdev_ops; dev->mtu = SIXP_MTU; dev->hard_header_len = AX25_MAX_HEADER_LEN; dev->header_ops = &ax25_header_ops; dev->addr_len = AX25_ADDR_LEN; dev->type = ARPHRD_AX25; dev->tx_queue_len = 10; /...
40,122,625,570,750,866,000,000,000,000,000,000,000
None
null
[ "CWE-416" ]
CVE-2022-1195
A use-after-free vulnerability was found in the Linux kernel in drivers/net/hamradio. This flaw allows a local attacker with a user privilege to cause a denial of service (DOS) when the mkiss or sixpack device is detached and reclaim resources early.
https://nvd.nist.gov/vuln/detail/CVE-2022-1195
198,753
ghostpdl
407c98a38c3a6ac1681144ed45cc2f4fc374c91f
https://github.com/ArtifexSoftware/ghostpdl
http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=407c98a38c3a6ac1681144ed45cc2f4fc374c91f
txtwrite - guard against using GS_NO_GLYPH to retrieve Unicode values Bug 701822 "Segmentation fault at psi/iname.c:296 in names_index_ref" Avoid using a glyph with the value GS_NO_GLYPH to retrieve a glyph name or Unicode code point from the glyph ID, as this is not a valid ID.
1
gs_font_map_glyph_to_unicode(gs_font *font, gs_glyph glyph, int ch, ushort *u, unsigned int length) { font_data *pdata = pfont_data(font); const ref *UnicodeDecoding; uchar *unicode_return = (uchar *)u; if (r_type(&pdata->GlyphNames2Unicode) == t_dictionary) { int c = gs_font_map_glyph_by_dict(...
175,680,165,182,207,670,000,000,000,000,000,000,000
zbfont.c
313,775,604,351,038,070,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2020-16307
A null pointer dereference vulnerability in devices/vector/gdevtxtw.c and psi/zbfont.c of Artifex Software GhostScript v9.50 allows a remote attacker to cause a denial of service via a crafted postscript file. This is fixed in v9.51.
https://nvd.nist.gov/vuln/detail/CVE-2020-16307
283,088
ghostpdl
407c98a38c3a6ac1681144ed45cc2f4fc374c91f
https://github.com/ArtifexSoftware/ghostpdl
http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=407c98a38c3a6ac1681144ed45cc2f4fc374c91f
txtwrite - guard against using GS_NO_GLYPH to retrieve Unicode values Bug 701822 "Segmentation fault at psi/iname.c:296 in names_index_ref" Avoid using a glyph with the value GS_NO_GLYPH to retrieve a glyph name or Unicode code point from the glyph ID, as this is not a valid ID.
0
gs_font_map_glyph_to_unicode(gs_font *font, gs_glyph glyph, int ch, ushort *u, unsigned int length) { font_data *pdata = pfont_data(font); const ref *UnicodeDecoding; uchar *unicode_return = (uchar *)u; if (r_type(&pdata->GlyphNames2Unicode) == t_dictionary) { int c = gs_font_map_glyph_by_dict(...
201,309,674,587,370,700,000,000,000,000,000,000,000
zbfont.c
41,158,945,251,702,383,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2020-16307
A null pointer dereference vulnerability in devices/vector/gdevtxtw.c and psi/zbfont.c of Artifex Software GhostScript v9.50 allows a remote attacker to cause a denial of service via a crafted postscript file. This is fixed in v9.51.
https://nvd.nist.gov/vuln/detail/CVE-2020-16307
198,780
linux
3450121997ce872eb7f1248417225827ea249710
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3450121997ce872eb7f1248417225827ea249710
ALSA: line6: Fix write on zero-sized buffer LINE6 drivers allocate the buffers based on the value returned from usb_maxpacket() calls. The manipulated device may return zero for this, and this results in the kmalloc() with zero size (and it may succeed) while the other part of the driver code writes the packet data w...
1
int line6_init_pcm(struct usb_line6 *line6, struct line6_pcm_properties *properties) { int i, err; unsigned ep_read = line6->properties->ep_audio_r; unsigned ep_write = line6->properties->ep_audio_w; struct snd_pcm *pcm; struct snd_line6_pcm *line6pcm; if (!(line6->properties->capabilities & LINE6_CAP_PCM))...
260,239,399,252,131,760,000,000,000,000,000,000,000
pcm.c
139,549,960,767,837,740,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2019-15221
An issue was discovered in the Linux kernel before 5.1.17. There is a NULL pointer dereference caused by a malicious USB device in the sound/usb/line6/pcm.c driver.
https://nvd.nist.gov/vuln/detail/CVE-2019-15221
283,562
linux
3450121997ce872eb7f1248417225827ea249710
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3450121997ce872eb7f1248417225827ea249710
ALSA: line6: Fix write on zero-sized buffer LINE6 drivers allocate the buffers based on the value returned from usb_maxpacket() calls. The manipulated device may return zero for this, and this results in the kmalloc() with zero size (and it may succeed) while the other part of the driver code writes the packet data w...
0
int line6_init_pcm(struct usb_line6 *line6, struct line6_pcm_properties *properties) { int i, err; unsigned ep_read = line6->properties->ep_audio_r; unsigned ep_write = line6->properties->ep_audio_w; struct snd_pcm *pcm; struct snd_line6_pcm *line6pcm; if (!(line6->properties->capabilities & LINE6_CAP_PCM))...
176,261,085,883,079,360,000,000,000,000,000,000,000
pcm.c
90,863,622,147,816,550,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2019-15221
An issue was discovered in the Linux kernel before 5.1.17. There is a NULL pointer dereference caused by a malicious USB device in the sound/usb/line6/pcm.c driver.
https://nvd.nist.gov/vuln/detail/CVE-2019-15221
198,781
cpython
6c004b40f9d51872d848981ef1a18bb08c2dfc42
https://github.com/python/cpython
https://github.com/python/cpython/commit/6c004b40f9d51872d848981ef1a18bb08c2dfc42
bpo-30657: Fix CVE-2017-1000158 (#4758) Fixes possible integer overflow in PyBytes_DecodeEscape. Co-Authored-By: Jay Bosamiya <jaybosamiya@gmail.com>
1
PyObject *PyBytes_DecodeEscape(const char *s, Py_ssize_t len, const char *errors, Py_ssize_t unicode, const char *recode_encoding) { int c; char *p, *buf; const char *end; PyOb...
246,593,730,403,734,330,000,000,000,000,000,000,000
bytesobject.c
170,066,888,576,529,100,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2017-1000158
CPython (aka Python) up to 2.7.13 is vulnerable to an integer overflow in the PyString_DecodeEscape function in stringobject.c, resulting in heap-based buffer overflow (and possible arbitrary code execution)
https://nvd.nist.gov/vuln/detail/CVE-2017-1000158
283,599
cpython
6c004b40f9d51872d848981ef1a18bb08c2dfc42
https://github.com/python/cpython
https://github.com/python/cpython/commit/6c004b40f9d51872d848981ef1a18bb08c2dfc42
bpo-30657: Fix CVE-2017-1000158 (#4758) Fixes possible integer overflow in PyBytes_DecodeEscape. Co-Authored-By: Jay Bosamiya <jaybosamiya@gmail.com>
0
PyObject *PyBytes_DecodeEscape(const char *s, Py_ssize_t len, const char *errors, Py_ssize_t unicode, const char *recode_encoding) { int c; char *p, *buf; const char *end; PyOb...
80,273,896,648,914,235,000,000,000,000,000,000,000
bytesobject.c
117,490,261,829,986,170,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2017-1000158
CPython (aka Python) up to 2.7.13 is vulnerable to an integer overflow in the PyString_DecodeEscape function in stringobject.c, resulting in heap-based buffer overflow (and possible arbitrary code execution)
https://nvd.nist.gov/vuln/detail/CVE-2017-1000158
198,813
linux
5d2e73a5f80a5b5aff3caf1ec6d39b5b3f54b26e
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5d2e73a5f80a5b5aff3caf1ec6d39b5b3f54b26e
media: usb:zr364xx:Fix KASAN:null-ptr-deref Read in zr364xx_vidioc_querycap SyzKaller hit the null pointer deref while reading from uninitialized udev->product in zr364xx_vidioc_querycap(). ================================================================== BUG: KASAN: null-ptr-deref in read_word_at_a_time+0xe/0x20 in...
1
static int zr364xx_vidioc_querycap(struct file *file, void *priv, struct v4l2_capability *cap) { struct zr364xx_camera *cam = video_drvdata(file); strscpy(cap->driver, DRIVER_DESC, sizeof(cap->driver)); strscpy(cap->card, cam->udev->product, sizeof(cap->card)); strscpy(cap->bus_info, dev_name(&cam->udev->de...
124,923,064,994,961,590,000,000,000,000,000,000,000
zr364xx.c
268,814,773,649,650,980,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2019-15217
An issue was discovered in the Linux kernel before 5.2.3. There is a NULL pointer dereference caused by a malicious USB device in the drivers/media/usb/zr364xx/zr364xx.c driver.
https://nvd.nist.gov/vuln/detail/CVE-2019-15217
283,903
linux
5d2e73a5f80a5b5aff3caf1ec6d39b5b3f54b26e
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5d2e73a5f80a5b5aff3caf1ec6d39b5b3f54b26e
media: usb:zr364xx:Fix KASAN:null-ptr-deref Read in zr364xx_vidioc_querycap SyzKaller hit the null pointer deref while reading from uninitialized udev->product in zr364xx_vidioc_querycap(). ================================================================== BUG: KASAN: null-ptr-deref in read_word_at_a_time+0xe/0x20 in...
0
static int zr364xx_vidioc_querycap(struct file *file, void *priv, struct v4l2_capability *cap) { struct zr364xx_camera *cam = video_drvdata(file); strscpy(cap->driver, DRIVER_DESC, sizeof(cap->driver)); if (cam->udev->product) strscpy(cap->card, cam->udev->product, sizeof(cap->card)); strscpy(cap->bus_inf...
44,045,815,527,678,490,000,000,000,000,000,000,000
zr364xx.c
1,800,858,995,808,352,500,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2019-15217
An issue was discovered in the Linux kernel before 5.2.3. There is a NULL pointer dereference caused by a malicious USB device in the drivers/media/usb/zr364xx/zr364xx.c driver.
https://nvd.nist.gov/vuln/detail/CVE-2019-15217
198,838
ntp
bb928ef08eec020ef6008f3a140702ccc0536b8e
https://github.com/ntp-project/ntp
https://github.com/ntp-project/ntp/commit/bb928ef08eec020ef6008f3a140702ccc0536b8e
[TALOS-CAN-0055] Infinite loop if extended logging enabled and the logfile and keyfile are the same
1
authreadkeys( const char *file ) { FILE *fp; char *line; char *token; keyid_t keyno; int keytype; char buf[512]; /* lots of room for line */ u_char keystr[32]; /* Bug 2537 */ size_t len; size_t j; /* * Open file. Complain and return if it can't be opened. */ fp = fopen(file, "r"); if (fp == NULL) ...
40,119,267,867,184,310,000,000,000,000,000,000,000
authreadkeys.c
297,281,044,682,962,150,000,000,000,000,000,000,000
[ "CWE-835" ]
CVE-2015-7850
ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote authenticated users to cause a denial of service (infinite loop or crash) by pointing the key file at the log file.
https://nvd.nist.gov/vuln/detail/CVE-2015-7850
284,283
ntp
bb928ef08eec020ef6008f3a140702ccc0536b8e
https://github.com/ntp-project/ntp
https://github.com/ntp-project/ntp/commit/bb928ef08eec020ef6008f3a140702ccc0536b8e
[TALOS-CAN-0055] Infinite loop if extended logging enabled and the logfile and keyfile are the same
0
authreadkeys( const char *file ) { FILE *fp; char *line; char *token; keyid_t keyno; int keytype; char buf[512]; /* lots of room for line */ u_char keystr[32]; /* Bug 2537 */ size_t len; size_t j; size_t nerr; /* * Open file. Complain and return if it can't be opened. */ fp = fopen(file, "r"); if...
99,636,165,505,352,730,000,000,000,000,000,000,000
authreadkeys.c
41,959,373,580,734,960,000,000,000,000,000,000,000
[ "CWE-835" ]
CVE-2015-7850
ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote authenticated users to cause a denial of service (infinite loop or crash) by pointing the key file at the log file.
https://nvd.nist.gov/vuln/detail/CVE-2015-7850
198,839
libexif
f9bb9f263fb00f0603ecbefa8957cad24168cbff
https://github.com/libexif/libexif
https://github.com/libexif/libexif/commit/f9bb9f263fb00f0603ecbefa8957cad24168cbff
Fix a buffer read overflow in exif_entry_get_value While parsing EXIF_TAG_FOCAL_LENGTH it was possible to read 8 bytes past the end of a heap buffer. This was detected by the OSS Fuzz project. Patch from Google. Fixes https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=7344 and https://bugs.chromium.org/p/oss-fuzz/...
1
exif_entry_get_value (ExifEntry *e, char *val, unsigned int maxlen) { unsigned int i, j, k; ExifShort v_short, v_short2, v_short3, v_short4; ExifByte v_byte; ExifRational v_rat; ExifSRational v_srat; char b[64]; const char *c; ExifByteOrder o; double d; ExifEntry *entry; static const struct { char label[5]...
117,469,985,365,786,460,000,000,000,000,000,000,000
exif-entry.c
2,714,404,991,702,146,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2020-0182
In exif_entry_get_value of exif-entry.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-147140917
https://nvd.nist.gov/vuln/detail/CVE-2020-0182
284,292
libexif
f9bb9f263fb00f0603ecbefa8957cad24168cbff
https://github.com/libexif/libexif
https://github.com/libexif/libexif/commit/f9bb9f263fb00f0603ecbefa8957cad24168cbff
Fix a buffer read overflow in exif_entry_get_value While parsing EXIF_TAG_FOCAL_LENGTH it was possible to read 8 bytes past the end of a heap buffer. This was detected by the OSS Fuzz project. Patch from Google. Fixes https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=7344 and https://bugs.chromium.org/p/oss-fuzz/...
0
exif_entry_get_value (ExifEntry *e, char *val, unsigned int maxlen) { unsigned int i, j, k; ExifShort v_short, v_short2, v_short3, v_short4; ExifByte v_byte; ExifRational v_rat; ExifSRational v_srat; char b[64]; const char *c; ExifByteOrder o; double d; ExifEntry *entry; static const struct { char label[5]...
101,615,368,351,096,880,000,000,000,000,000,000,000
exif-entry.c
287,656,334,240,821,530,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2020-0182
In exif_entry_get_value of exif-entry.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-147140917
https://nvd.nist.gov/vuln/detail/CVE-2020-0182
198,929
pigeonhole
4a299840cdb51f61f8d1ebc0210b19c40dfbc1cc
https://github.com/dovecot/pigeonhole
https://github.com/dovecot/pigeonhole/commit/4a299840cdb51f61f8d1ebc0210b19c40dfbc1cc
lib-managesieve: Make sure str_unescape() won't be writing past allocated memory The previous commit should already prevent this, but this makes sure it can't become broken in the future either. It makes the performance a tiny bit worse, but that's not practically noticeable.
1
static void managesieve_parser_save_arg(struct managesieve_parser *parser, const unsigned char *data, size_t size) { struct managesieve_arg *arg; char *str; arg = managesieve_arg_create(parser); switch (parser->cur_type) { case ARG_PARSE_ATOM: /* simply save the string */ arg->type = MANAGESIEVE_ARG_ATO...
307,819,766,362,179,160,000,000,000,000,000,000,000
managesieve-parser.c
233,556,650,977,264,300,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2019-11500
In Dovecot before 2.2.36.4 and 2.3.x before 2.3.7.2 (and Pigeonhole before 0.5.7.2), protocol processing can fail for quoted strings. This occurs because '\0' characters are mishandled, and can lead to out-of-bounds writes and remote code execution.
https://nvd.nist.gov/vuln/detail/CVE-2019-11500
285,191
pigeonhole
4a299840cdb51f61f8d1ebc0210b19c40dfbc1cc
https://github.com/dovecot/pigeonhole
https://github.com/dovecot/pigeonhole/commit/4a299840cdb51f61f8d1ebc0210b19c40dfbc1cc
lib-managesieve: Make sure str_unescape() won't be writing past allocated memory The previous commit should already prevent this, but this makes sure it can't become broken in the future either. It makes the performance a tiny bit worse, but that's not practically noticeable.
0
static void managesieve_parser_save_arg(struct managesieve_parser *parser, const unsigned char *data, size_t size) { struct managesieve_arg *arg; char *str; arg = managesieve_arg_create(parser); switch (parser->cur_type) { case ARG_PARSE_ATOM: /* simply save the string */ arg->type = MANAGESIEVE_ARG_ATO...
66,093,015,258,022,050,000,000,000,000,000,000,000
managesieve-parser.c
244,269,589,179,924,800,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2019-11500
In Dovecot before 2.2.36.4 and 2.3.x before 2.3.7.2 (and Pigeonhole before 0.5.7.2), protocol processing can fail for quoted strings. This occurs because '\0' characters are mishandled, and can lead to out-of-bounds writes and remote code execution.
https://nvd.nist.gov/vuln/detail/CVE-2019-11500
198,945
virglrenderer
8c9cfb4e425542e96f0717189fe4658555baaf08
https://gitlab.freedesktop.org/virgl/virglrenderer
https://gitlab.freedesktop.org/virgl/virglrenderer/merge_requests/314/diffs?commit_id=8c9cfb4e425542e96f0717189fe4658555baaf08
tests: Add trigger for overflow in texture data upload Related #140 Signed-off-by: Gert Wollny <gert.wollny@collabora.com> Acked-by: Emil Velikov <emil.velikov@collabora.com>
1
int main() { initialize_environment(); test_format_wrong_size(); test_blit_info_format_check(); test_blit_info_format_check_null_format(); test_format_is_plain_nullptr_deref_trigger(); test_format_util_format_is_rgb_nullptr_deref_trigger_illegal_resource(); test_format_util_format_is_rgb_nullptr_d...
284,991,185,695,099,700,000,000,000,000,000,000,000
test_fuzzer_formats.c
271,934,328,997,786,700,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2019-18391
A heap-based buffer overflow in the vrend_renderer_transfer_write_iov function in vrend_renderer.c in virglrenderer through 0.8.0 allows guest OS users to cause a denial of service via VIRGL_CCMD_RESOURCE_INLINE_WRITE commands.
https://nvd.nist.gov/vuln/detail/CVE-2019-18391
285,610
virglrenderer
8c9cfb4e425542e96f0717189fe4658555baaf08
https://gitlab.freedesktop.org/virgl/virglrenderer
https://gitlab.freedesktop.org/virgl/virglrenderer/merge_requests/314/diffs?commit_id=8c9cfb4e425542e96f0717189fe4658555baaf08
tests: Add trigger for overflow in texture data upload Related #140 Signed-off-by: Gert Wollny <gert.wollny@collabora.com> Acked-by: Emil Velikov <emil.velikov@collabora.com>
0
int main() { initialize_environment(); test_format_wrong_size(); test_blit_info_format_check(); test_blit_info_format_check_null_format(); test_format_is_plain_nullptr_deref_trigger(); test_format_util_format_is_rgb_nullptr_deref_trigger_illegal_resource(); test_format_util_format_is_rgb_nullptr_d...
241,258,366,640,535,500,000,000,000,000,000,000,000
test_fuzzer_formats.c
129,883,083,291,494,740,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2019-18391
A heap-based buffer overflow in the vrend_renderer_transfer_write_iov function in vrend_renderer.c in virglrenderer through 0.8.0 allows guest OS users to cause a denial of service via VIRGL_CCMD_RESOURCE_INLINE_WRITE commands.
https://nvd.nist.gov/vuln/detail/CVE-2019-18391
198,947
mono
65292a69c837b8a5f7a392d34db63de592153358
https://github.com/mono/mono
https://github.com/mono/mono/commit/65292a69c837b8a5f7a392d34db63de592153358
Handle invalid instantiation of generic methods. * verify.c: Add new function to internal verifier API to check method instantiations. * reflection.c (mono_reflection_bind_generic_method_parameters): Check the instantiation before returning it. Fixes #655847
1
MonoReflectionMethod* mono_reflection_bind_generic_method_parameters (MonoReflectionMethod *rmethod, MonoArray *types) { MonoClass *klass; MonoMethod *method, *inflated; MonoMethodInflated *imethod; MonoGenericContext tmp_context; MonoGenericInst *ginst; MonoType **type_argv; int count, i; MONO_ARCH_SAVE_REGS;...
277,938,576,201,629,240,000,000,000,000,000,000,000
reflection.c
228,389,372,334,721,080,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2010-4254
Mono, when Moonlight before 2.3.0.1 or 2.99.x before 2.99.0.10 is used, does not properly validate arguments to generic methods, which allows remote attackers to bypass generic constraints, and possibly execute arbitrary code, via a crafted method call.
https://nvd.nist.gov/vuln/detail/CVE-2010-4254
285,867
mono
65292a69c837b8a5f7a392d34db63de592153358
https://github.com/mono/mono
https://github.com/mono/mono/commit/65292a69c837b8a5f7a392d34db63de592153358
Handle invalid instantiation of generic methods. * verify.c: Add new function to internal verifier API to check method instantiations. * reflection.c (mono_reflection_bind_generic_method_parameters): Check the instantiation before returning it. Fixes #655847
0
MonoReflectionMethod* mono_reflection_bind_generic_method_parameters (MonoReflectionMethod *rmethod, MonoArray *types) { MonoClass *klass; MonoMethod *method, *inflated; MonoMethodInflated *imethod; MonoGenericContext tmp_context; MonoGenericInst *ginst; MonoType **type_argv; int count, i; MONO_ARCH_SAVE_REGS;...
196,110,369,610,035,930,000,000,000,000,000,000,000
reflection.c
78,309,779,713,780,540,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2010-4254
Mono, when Moonlight before 2.3.0.1 or 2.99.x before 2.99.0.10 is used, does not properly validate arguments to generic methods, which allows remote attackers to bypass generic constraints, and possibly execute arbitrary code, via a crafted method call.
https://nvd.nist.gov/vuln/detail/CVE-2010-4254
198,982
nasm
3144e84add8b152cc7a71e44617ce6f21daa4ba3
https://github.com/netwide-assembler/nasm
https://github.com/cyrillos/nasm/commit/3144e84add8b152cc7a71e44617ce6f21daa4ba3
preproc: Don't access offsting byte on unterminated strings https://bugzilla.nasm.us/show_bug.cgi?id=3392446 Signed-off-by: Cyrill Gorcunov <gorcunov@gmail.com>
1
static Token *tokenize(char *line) { char c, *p = line; enum pp_token_type type; Token *list = NULL; Token *t, **tail = &list; while (*line) { p = line; if (*p == '%') { p++; if (*p == '+' && !nasm_isdigit(p[1])) { p++; type = ...
240,530,469,158,704,230,000,000,000,000,000,000,000
preproc.c
202,803,296,197,073,000,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-8881
Netwide Assembler (NASM) 2.13.02rc2 has a heap-based buffer over-read in the function tokenize in asm/preproc.c, related to an unterminated string.
https://nvd.nist.gov/vuln/detail/CVE-2018-8881
286,669
nasm
3144e84add8b152cc7a71e44617ce6f21daa4ba3
https://github.com/netwide-assembler/nasm
https://github.com/cyrillos/nasm/commit/3144e84add8b152cc7a71e44617ce6f21daa4ba3
preproc: Don't access offsting byte on unterminated strings https://bugzilla.nasm.us/show_bug.cgi?id=3392446 Signed-off-by: Cyrill Gorcunov <gorcunov@gmail.com>
0
static Token *tokenize(char *line) { char c, *p = line; enum pp_token_type type; Token *list = NULL; Token *t, **tail = &list; while (*line) { p = line; if (*p == '%') { p++; if (*p == '+' && !nasm_isdigit(p[1])) { p++; type = ...
154,407,503,799,453,250,000,000,000,000,000,000,000
preproc.c
13,957,557,623,149,516,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-8881
Netwide Assembler (NASM) 2.13.02rc2 has a heap-based buffer over-read in the function tokenize in asm/preproc.c, related to an unterminated string.
https://nvd.nist.gov/vuln/detail/CVE-2018-8881
199,158
jasper
d678ccd27b8a062e3bfd4c80d8ce2676a8166a27
https://github.com/mdadams/jasper
https://github.com/mdadams/jasper/commit/d678ccd27b8a062e3bfd4c80d8ce2676a8166a27
CVE-2008-3522
1
int jas_stream_printf(jas_stream_t *stream, const char *fmt, ...) { va_list ap; char buf[4096]; int ret; va_start(ap, fmt); ret = vsprintf(buf, fmt, ap); jas_stream_puts(stream, buf); va_end(ap); return ret; }
134,497,282,431,965,470,000,000,000,000,000,000,000
jas_stream.c
177,410,078,778,385,120,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2008-3522
Buffer overflow in the jas_stream_printf function in libjasper/base/jas_stream.c in JasPer 1.900.1 might allow context-dependent attackers to have an unknown impact via vectors related to the mif_hdr_put function and use of vsprintf.
https://nvd.nist.gov/vuln/detail/CVE-2008-3522
289,193
jasper
d678ccd27b8a062e3bfd4c80d8ce2676a8166a27
https://github.com/mdadams/jasper
https://github.com/mdadams/jasper/commit/d678ccd27b8a062e3bfd4c80d8ce2676a8166a27
CVE-2008-3522
0
int jas_stream_printf(jas_stream_t *stream, const char *fmt, ...) { va_list ap; char buf[4096]; int ret; va_start(ap, fmt); ret = vsnprintf(buf, sizeof buf, fmt, ap); jas_stream_puts(stream, buf); va_end(ap); return ret; }
291,158,841,205,138,300,000,000,000,000,000,000,000
jas_stream.c
15,709,599,950,391,988,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2008-3522
Buffer overflow in the jas_stream_printf function in libjasper/base/jas_stream.c in JasPer 1.900.1 might allow context-dependent attackers to have an unknown impact via vectors related to the mif_hdr_put function and use of vsprintf.
https://nvd.nist.gov/vuln/detail/CVE-2008-3522
199,167
qpdf
ad527a64f93dca12f6aabab2ca99ae5eb352ab4b
https://github.com/qpdf/qpdf
https://github.com/qpdf/qpdf/commit/ad527a64f93dca12f6aabab2ca99ae5eb352ab4b
Parse iteratively to avoid stack overflow (fixes #146)
1
QPDFObjectHandle::parseInternal(PointerHolder<InputSource> input, std::string const& object_description, QPDFTokenizer& tokenizer, bool& empty, StringDecrypter* decrypter, QPDF* context, bool ...
176,934,177,834,361,300,000,000,000,000,000,000,000
QPDFObjectHandle.cc
319,269,573,744,409,420,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2017-12595
The tokenizer in QPDF 6.0.0 and 7.0.b1 is recursive for arrays and dictionaries, which allows remote attackers to cause a denial of service (stack consumption and segmentation fault) or possibly have unspecified other impact via a PDF document with a deep data structure, as demonstrated by a crash in QPDFObjectHandle::...
https://nvd.nist.gov/vuln/detail/CVE-2017-12595
289,876
qpdf
ad527a64f93dca12f6aabab2ca99ae5eb352ab4b
https://github.com/qpdf/qpdf
https://github.com/qpdf/qpdf/commit/ad527a64f93dca12f6aabab2ca99ae5eb352ab4b
Parse iteratively to avoid stack overflow (fixes #146)
0
QPDFObjectHandle::parseInternal(PointerHolder<InputSource> input, std::string const& object_description, QPDFTokenizer& tokenizer, bool& empty, StringDecrypter* decrypter, QPDF* context, bool ...
75,742,363,081,598,910,000,000,000,000,000,000,000
QPDFObjectHandle.cc
215,630,367,614,297,780,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2017-12595
The tokenizer in QPDF 6.0.0 and 7.0.b1 is recursive for arrays and dictionaries, which allows remote attackers to cause a denial of service (stack consumption and segmentation fault) or possibly have unspecified other impact via a PDF document with a deep data structure, as demonstrated by a crash in QPDFObjectHandle::...
https://nvd.nist.gov/vuln/detail/CVE-2017-12595
199,208
ncurses
b025434573f466efe27862656a6a9d41dd2bd609
https://github.com/mirror/ncurses
https://github.com/mirror/ncurses/commit/b025434573f466efe27862656a6a9d41dd2bd609
ncurses 6.1 - patch 20191012 + amend recent changes to ncurses*-config and pc-files to filter out Debian linker-flags (report by Sven Joachim, cf: 20150516). + clarify relationship between tic, infocmp and captoinfo in manpage. + check for invalid hashcode in _nc_find_type_entry and _nc_find_name_entry. > fix seve...
1
fmt_entry(TERMTYPE2 *tterm, PredFunc pred, int content_only, int suppress_untranslatable, int infodump, int numbers) { PredIdx i, j; char buffer[MAX_TERMINFO_LENGTH + EXTRA_CAP]; char *capability; NCURSES_CONST char *name; int predval, len; PredIdx num_bools = 0; PredIdx num_v...
159,215,531,902,805,400,000,000,000,000,000,000,000
dump_entry.c
293,551,541,110,611,730,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-17595
There is a heap-based buffer over-read in the fmt_entry function in tinfo/comp_hash.c in the terminfo library in ncurses before 6.1-20191012.
https://nvd.nist.gov/vuln/detail/CVE-2019-17595
290,180
ncurses
b025434573f466efe27862656a6a9d41dd2bd609
https://github.com/mirror/ncurses
https://github.com/mirror/ncurses/commit/b025434573f466efe27862656a6a9d41dd2bd609
ncurses 6.1 - patch 20191012 + amend recent changes to ncurses*-config and pc-files to filter out Debian linker-flags (report by Sven Joachim, cf: 20150516). + clarify relationship between tic, infocmp and captoinfo in manpage. + check for invalid hashcode in _nc_find_type_entry and _nc_find_name_entry. > fix seve...
0
fmt_entry(TERMTYPE2 *tterm, PredFunc pred, int content_only, int suppress_untranslatable, int infodump, int numbers) { PredIdx i, j; char buffer[MAX_TERMINFO_LENGTH + EXTRA_CAP]; char *capability; NCURSES_CONST char *name; int predval, len; PredIdx num_bools = 0; PredIdx num_v...
244,382,529,298,460,100,000,000,000,000,000,000,000
dump_entry.c
18,317,216,777,212,705,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-17595
There is a heap-based buffer over-read in the fmt_entry function in tinfo/comp_hash.c in the terminfo library in ncurses before 6.1-20191012.
https://nvd.nist.gov/vuln/detail/CVE-2019-17595
199,217
linux
f70267f379b5e5e11bdc5d72a56bf17e5feed01f
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f70267f379b5e5e11bdc5d72a56bf17e5feed01f
scsi: libsas: stop discovering if oob mode is disconnected The discovering of sas port is driven by workqueue in libsas. When libsas is processing port events or phy events in workqueue, new events may rise up and change the state of some structures such as asd_sas_phy. This may cause some problems such as follows: ...
1
static int sas_get_port_device(struct asd_sas_port *port) { struct asd_sas_phy *phy; struct sas_rphy *rphy; struct domain_device *dev; int rc = -ENODEV; dev = sas_alloc_device(); if (!dev) return -ENOMEM; spin_lock_irq(&port->phy_list_lock); if (list_empty(&port->phy_list)) { spin_unlock_irq(&port->phy_li...
266,424,577,682,669,450,000,000,000,000,000,000,000
sas_discover.c
139,818,591,624,188,770,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2019-19965
In the Linux kernel through 5.4.6, there is a NULL pointer dereference in drivers/scsi/libsas/sas_discover.c because of mishandling of port disconnection during discovery, related to a PHY down race condition, aka CID-f70267f379b5.
https://nvd.nist.gov/vuln/detail/CVE-2019-19965
290,275
linux
f70267f379b5e5e11bdc5d72a56bf17e5feed01f
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f70267f379b5e5e11bdc5d72a56bf17e5feed01f
scsi: libsas: stop discovering if oob mode is disconnected The discovering of sas port is driven by workqueue in libsas. When libsas is processing port events or phy events in workqueue, new events may rise up and change the state of some structures such as asd_sas_phy. This may cause some problems such as follows: ...
0
static int sas_get_port_device(struct asd_sas_port *port) { struct asd_sas_phy *phy; struct sas_rphy *rphy; struct domain_device *dev; int rc = -ENODEV; dev = sas_alloc_device(); if (!dev) return -ENOMEM; spin_lock_irq(&port->phy_list_lock); if (list_empty(&port->phy_list)) { spin_unlock_irq(&port->phy_li...
233,666,620,838,896,500,000,000,000,000,000,000,000
sas_discover.c
140,244,239,592,245,460,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2019-19965
In the Linux kernel through 5.4.6, there is a NULL pointer dereference in drivers/scsi/libsas/sas_discover.c because of mishandling of port disconnection during discovery, related to a PHY down race condition, aka CID-f70267f379b5.
https://nvd.nist.gov/vuln/detail/CVE-2019-19965
199,221
ghostpdl
3c2aebbedd37fab054e80f2e315de07d7e9b5bdb
https://github.com/ArtifexSoftware/ghostpdl
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=3c2aebbedd37fab054e80f2e315de07d7e9b5bdb
Bug 698044: restrict font name length to the buffer size.
1
xps_load_sfnt_name(xps_font_t *font, char *namep) { byte *namedata; int offset, length; /*int format;*/ int count, stringoffset; int found; int i, k; found = 0; strcpy(namep, "Unknown"); offset = xps_find_sfnt_table(font, "name", &length); if (offset < 0 || length < 6) { ...
125,420,559,281,172,280,000,000,000,000,000,000,000
xpsfont.c
339,548,247,002,019,140,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2017-9618
The xps_load_sfnt_name function in xps/xpsfont.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9618
14,398
ghostscript
961b10cdd71403072fb99401a45f3bef6ce53626
http://git.ghostscript.com/?p=mupdf
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=961b10cdd71403072fb99401a45f3bef6ce53626
None
0
xps_load_sfnt_name(xps_font_t *font, char *namep, const int buflen) { byte *namedata; int offset, length; /*int format;*/ int count, stringoffset; int found; int i, k; found = 0; strcpy(namep, "Unknown"); offset = xps_find_sfnt_table(font, "name", &length); if (offset < 0 || le...
325,261,375,591,148,470,000,000,000,000,000,000,000
xpsfont.c
237,740,818,077,512,970,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9740
The xps_decode_font_char_imp function in xps/xpsfont.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9740
199,228
mysql-server
5ac61b2af0cf37eeed5050a91819d6d273f037a5
https://github.com/mysql/mysql-server
https://github.com/mysql/mysql-server/commit/5ac61b2af0cf37eeed5050a91819d6d273f037a5
Bug#26372491 - RCE THROUGH THE MISHANDLE OF BACKSLASH DESCRIPTION: =========== The bug is related to incorrect parsing of SQL queries when typed in on the CLI. The incorrect parsing can result in unexpected results. ANALYSIS: ======== The scenarios mainly happens for identifier names with a typical combination of bac...
1
static bool add_line(String &buffer,char *line,char *in_string, bool *ml_comment, bool truncated) { uchar inchar; char buff[80], *pos, *out; COMMANDS *com; bool need_space= 0; bool ss_comment= 0; DBUG_ENTER("add_line"); if (!line[0] && buffer.is_empty()) DBUG_RETURN(0); #ifdef HA...
230,766,678,704,317,370,000,000,000,000,000,000,000
mysql.cc
313,128,637,392,514,100,000,000,000,000,000,000,000
[ "CWE-863" ]
CVE-2017-10379
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.57 and earlier, 5.6.37 and earlier and 5.7.19 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise My...
https://nvd.nist.gov/vuln/detail/CVE-2017-10379
290,672
mysql-server
5ac61b2af0cf37eeed5050a91819d6d273f037a5
https://github.com/mysql/mysql-server
https://github.com/mysql/mysql-server/commit/5ac61b2af0cf37eeed5050a91819d6d273f037a5
Bug#26372491 - RCE THROUGH THE MISHANDLE OF BACKSLASH DESCRIPTION: =========== The bug is related to incorrect parsing of SQL queries when typed in on the CLI. The incorrect parsing can result in unexpected results. ANALYSIS: ======== The scenarios mainly happens for identifier names with a typical combination of bac...
0
static bool add_line(String &buffer,char *line,char *in_string, bool *ml_comment, bool truncated) { uchar inchar; char buff[80], *pos, *out; COMMANDS *com; bool need_space= 0; bool ss_comment= 0; DBUG_ENTER("add_line"); if (!line[0] && buffer.is_empty()) DBUG_RETURN(0); #ifdef HA...
165,787,320,333,381,770,000,000,000,000,000,000,000
mysql.cc
241,199,272,712,564,900,000,000,000,000,000,000,000
[ "CWE-863" ]
CVE-2017-10379
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.57 and earlier, 5.6.37 and earlier and 5.7.19 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise My...
https://nvd.nist.gov/vuln/detail/CVE-2017-10379
199,230
linux
9a5729f68d3a82786aea110b1bfe610be318f80a
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9a5729f68d3a82786aea110b1bfe610be318f80a
USB: sisusbvga: fix oops in error path of sisusb_probe The pointer used to log a failure of usb_register_dev() must be set before the error is logged. v2: fix that minor is not available before registration Signed-off-by: oliver Neukum <oneukum@suse.com> Reported-by: syzbot+a0cbdbd6d169020c8959@syzkaller.appspotmail...
1
static int sisusb_probe(struct usb_interface *intf, const struct usb_device_id *id) { struct usb_device *dev = interface_to_usbdev(intf); struct sisusb_usb_data *sisusb; int retval = 0, i; dev_info(&dev->dev, "USB2VGA dongle found at address %d\n", dev->devnum); /* Allocate memory for our private */ sisusb...
231,930,253,852,391,840,000,000,000,000,000,000,000
sisusb.c
151,043,463,933,022,340,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2019-15219
An issue was discovered in the Linux kernel before 5.1.8. There is a NULL pointer dereference caused by a malicious USB device in the drivers/usb/misc/sisusbvga/sisusb.c driver.
https://nvd.nist.gov/vuln/detail/CVE-2019-15219
290,706
linux
9a5729f68d3a82786aea110b1bfe610be318f80a
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9a5729f68d3a82786aea110b1bfe610be318f80a
USB: sisusbvga: fix oops in error path of sisusb_probe The pointer used to log a failure of usb_register_dev() must be set before the error is logged. v2: fix that minor is not available before registration Signed-off-by: oliver Neukum <oneukum@suse.com> Reported-by: syzbot+a0cbdbd6d169020c8959@syzkaller.appspotmail...
0
static int sisusb_probe(struct usb_interface *intf, const struct usb_device_id *id) { struct usb_device *dev = interface_to_usbdev(intf); struct sisusb_usb_data *sisusb; int retval = 0, i; dev_info(&dev->dev, "USB2VGA dongle found at address %d\n", dev->devnum); /* Allocate memory for our private */ sisusb...
166,524,368,456,627,470,000,000,000,000,000,000,000
sisusb.c
236,511,791,586,031,400,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2019-15219
An issue was discovered in the Linux kernel before 5.1.8. There is a NULL pointer dereference caused by a malicious USB device in the drivers/usb/misc/sisusbvga/sisusb.c driver.
https://nvd.nist.gov/vuln/detail/CVE-2019-15219
199,234
samba
3cc0f1eeda5f133532dda31eef9fc1b394127e50
https://github.com/samba-team/samba
https://github.com/samba-team/samba/commit/3cc0f1eeda5f133532dda31eef9fc1b394127e50
CVE-2020-14303: s4 nbt: fix busy loop on empty UDP packet An empty UDP packet put the nbt server into a busy loop that consumes 100% of a cpu. BUG: https://bugzilla.samba.org/show_bug.cgi?id=14417 Signed-off-by: Gary Lockyer <gary@catalyst.net.nz> Autobuild-User(master): Karolin Seeger <kseeger@samba.org> Autobuild...
1
static void nbt_name_socket_recv(struct nbt_name_socket *nbtsock) { TALLOC_CTX *tmp_ctx = talloc_new(nbtsock); NTSTATUS status; enum ndr_err_code ndr_err; struct socket_address *src; DATA_BLOB blob; size_t nread, dsize; struct nbt_name_packet *packet; struct nbt_name_request *req; status = socket_pending(nbts...
142,264,031,308,545,020,000,000,000,000,000,000,000
None
null
[ "CWE-834" ]
CVE-2020-14303
A flaw was found in the AD DC NBT server in all Samba versions before 4.10.17, before 4.11.11 and before 4.12.4. A samba user could send an empty UDP packet to cause the samba server to crash.
https://nvd.nist.gov/vuln/detail/CVE-2020-14303
290,920
samba
3cc0f1eeda5f133532dda31eef9fc1b394127e50
https://github.com/samba-team/samba
https://github.com/samba-team/samba/commit/3cc0f1eeda5f133532dda31eef9fc1b394127e50
CVE-2020-14303: s4 nbt: fix busy loop on empty UDP packet An empty UDP packet put the nbt server into a busy loop that consumes 100% of a cpu. BUG: https://bugzilla.samba.org/show_bug.cgi?id=14417 Signed-off-by: Gary Lockyer <gary@catalyst.net.nz> Autobuild-User(master): Karolin Seeger <kseeger@samba.org> Autobuild...
0
static void nbt_name_socket_recv(struct nbt_name_socket *nbtsock) { TALLOC_CTX *tmp_ctx = talloc_new(nbtsock); NTSTATUS status; enum ndr_err_code ndr_err; struct socket_address *src; DATA_BLOB blob; size_t nread, dsize; struct nbt_name_packet *packet; struct nbt_name_request *req; status = socket_pending(nbts...
260,725,290,672,898,950,000,000,000,000,000,000,000
None
null
[ "CWE-834" ]
CVE-2020-14303
A flaw was found in the AD DC NBT server in all Samba versions before 4.10.17, before 4.11.11 and before 4.12.4. A samba user could send an empty UDP packet to cause the samba server to crash.
https://nvd.nist.gov/vuln/detail/CVE-2020-14303
199,672
vim
e2bd8600b873d2cd1f9d667c28cba8b1dba18839
https://github.com/vim/vim
https://github.com/vim/vim/commit/e2bd8600b873d2cd1f9d667c28cba8b1dba18839
patch 8.2.4977: memory access error when substitute expression changes window Problem: Memory access error when substitute expression changes window. Solution: Disallow changing window in substitute expression.
1
ex_substitute(exarg_T *eap) { linenr_T lnum; long i = 0; regmmatch_T regmatch; static subflags_T subflags = {FALSE, FALSE, FALSE, TRUE, FALSE, FALSE, FALSE, 0}; #ifdef FEAT_EVAL subflags_T subflags_save; #endif int save_do_all; // remember user specified 'g' flag int save_do_...
256,338,705,445,780,230,000,000,000,000,000,000,000
ex_cmds.c
220,202,383,493,337,000,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2022-1785
Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.4977.
https://nvd.nist.gov/vuln/detail/CVE-2022-1785
291,019
vim
e2bd8600b873d2cd1f9d667c28cba8b1dba18839
https://github.com/vim/vim
https://github.com/vim/vim/commit/e2bd8600b873d2cd1f9d667c28cba8b1dba18839
patch 8.2.4977: memory access error when substitute expression changes window Problem: Memory access error when substitute expression changes window. Solution: Disallow changing window in substitute expression.
0
ex_substitute(exarg_T *eap) { linenr_T lnum; long i = 0; regmmatch_T regmatch; static subflags_T subflags = {FALSE, FALSE, FALSE, TRUE, FALSE, FALSE, FALSE, 0}; #ifdef FEAT_EVAL subflags_T subflags_save; #endif int save_do_all; // remember user specified 'g' flag int save_do_...
268,610,061,955,623,200,000,000,000,000,000,000,000
ex_cmds.c
117,720,515,718,574,180,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2022-1785
Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.4977.
https://nvd.nist.gov/vuln/detail/CVE-2022-1785
199,684
thrift
2007783e874d524a46b818598a45078448ecc53e
https://github.com/apache/thrift
https://github.com/apache/thrift/commit/2007783e874d524a46b818598a45078448ecc53e
THRIFT-3893 Command injection in format_go_output Client: Go Patch: Jens Geyer
1
bool format_go_output(const string& file_path) { const string command = "gofmt -w " + file_path; if (system(command.c_str()) == 0) { return true; } fprintf(stderr, "WARNING - Running '%s' failed.\n", command.c_str()); return false; }
189,436,529,147,219,640,000,000,000,000,000,000,000
t_go_generator.cc
283,976,431,937,198,730,000,000,000,000,000,000,000
[ "CWE-77" ]
CVE-2016-5397
The Apache Thrift Go client library exposed the potential during code generation for command injection due to using an external formatting tool. Affected Apache Thrift 0.9.3 and older, Fixed in Apache Thrift 0.10.0.
https://nvd.nist.gov/vuln/detail/CVE-2016-5397
291,177
thrift
2007783e874d524a46b818598a45078448ecc53e
https://github.com/apache/thrift
https://github.com/apache/thrift/commit/2007783e874d524a46b818598a45078448ecc53e
THRIFT-3893 Command injection in format_go_output Client: Go Patch: Jens Geyer
0
bool format_go_output(const string& file_path) { // formatting via gofmt deactivated due to THRIFT-3893 // Please look at the ticket and make sure you fully understand all the implications // before submitting a patch that enables this feature again. Thank you. (void) file_path; return false; /* const...
121,454,227,917,710,530,000,000,000,000,000,000,000
t_go_generator.cc
141,950,591,575,700,600,000,000,000,000,000,000,000
[ "CWE-77" ]
CVE-2016-5397
The Apache Thrift Go client library exposed the potential during code generation for command injection due to using an external formatting tool. Affected Apache Thrift 0.9.3 and older, Fixed in Apache Thrift 0.10.0.
https://nvd.nist.gov/vuln/detail/CVE-2016-5397
199,693
php-src
863bf294feb9ad425eadb94f288bc7f18673089d
https://github.com/php/php-src
http://git.php.net/?p=php-src.git;a=commit;h=863bf294feb9ad425eadb94f288bc7f18673089d
Fixed bug #70169 (Use After Free Vulnerability in unserialize() with SplDoublyLinkedList)
1
SPL_METHOD(SplDoublyLinkedList, unserialize) { spl_dllist_object *intern = (spl_dllist_object*)zend_object_store_get_object(getThis() TSRMLS_CC); zval *flags, *elem; char *buf; int buf_len; const unsigned char *p, *s; php_unserialize_data_t var_hash; if (zend_parse_parameters(ZEND_NUM_AR...
50,520,203,015,762,615,000,000,000,000,000,000,000
spl_dllist.c
43,827,658,000,596,080,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2015-6831
Multiple use-after-free vulnerabilities in SPL in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 allow remote attackers to execute arbitrary code via vectors involving (1) ArrayObject, (2) SplObjectStorage, and (3) SplDoublyLinkedList, which are mishandled during unserialization.
https://nvd.nist.gov/vuln/detail/CVE-2015-6831
291,252
php-src
863bf294feb9ad425eadb94f288bc7f18673089d
https://github.com/php/php-src
http://git.php.net/?p=php-src.git;a=commit;h=863bf294feb9ad425eadb94f288bc7f18673089d
Fixed bug #70169 (Use After Free Vulnerability in unserialize() with SplDoublyLinkedList)
0
SPL_METHOD(SplDoublyLinkedList, serialize) { spl_dllist_object *intern = (spl_dllist_object*)zend_object_store_get_object(getThis() TSRMLS_CC); smart_str buf = {0}; spl_ptr_llist_element *current = intern->llist->head, *next; zval *flags; php_serialize_data_t var_has...
52,119,022,334,505,670,000,000,000,000,000,000,000
spl_dllist.c
43,827,658,000,596,080,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2015-6831
Multiple use-after-free vulnerabilities in SPL in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 allow remote attackers to execute arbitrary code via vectors involving (1) ArrayObject, (2) SplObjectStorage, and (3) SplDoublyLinkedList, which are mishandled during unserialization.
https://nvd.nist.gov/vuln/detail/CVE-2015-6831
199,697
curl
31be461c6b659312100c47be6ddd5f0f569290f6
https://github.com/curl/curl
https://github.com/bagder/curl/commit/31be461c6b659312100c47be6ddd5f0f569290f6
ConnectionExists: for NTLM re-use, require credentials to match CVE-2015-3143 Bug: http://curl.haxx.se/docs/adv_20150422A.html Reported-by: Paras Sethia
1
ConnectionExists(struct SessionHandle *data, struct connectdata *needle, struct connectdata **usethis, bool *force_reuse) { struct connectdata *check; struct connectdata *chosen = 0; bool canPipeline = IsPipeliningPossible(data, needle); bool wantNTLMhttp = ((d...
10,423,208,688,221,915,000,000,000,000,000,000,000
url.c
97,743,442,363,977,710,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2015-3143
cURL and libcurl 7.10.6 through 7.41.0 does not properly re-use NTLM connections, which allows remote attackers to connect as other users via an unauthenticated request, a similar issue to CVE-2014-0015.
https://nvd.nist.gov/vuln/detail/CVE-2015-3143
291,300
curl
31be461c6b659312100c47be6ddd5f0f569290f6
https://github.com/curl/curl
https://github.com/bagder/curl/commit/31be461c6b659312100c47be6ddd5f0f569290f6
ConnectionExists: for NTLM re-use, require credentials to match CVE-2015-3143 Bug: http://curl.haxx.se/docs/adv_20150422A.html Reported-by: Paras Sethia
0
ConnectionExists(struct SessionHandle *data, struct connectdata *needle, struct connectdata **usethis, bool *force_reuse) { struct connectdata *check; struct connectdata *chosen = 0; bool canPipeline = IsPipeliningPossible(data, needle); bool wantNTLMhttp = ((d...
306,844,860,231,129,900,000,000,000,000,000,000,000
url.c
89,772,642,171,184,000,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2015-3143
cURL and libcurl 7.10.6 through 7.41.0 does not properly re-use NTLM connections, which allows remote attackers to connect as other users via an unauthenticated request, a similar issue to CVE-2014-0015.
https://nvd.nist.gov/vuln/detail/CVE-2015-3143
199,704
vim
54e5fed6d27b747ff152cdb6edfb72ff60e70939
https://github.com/vim/vim
https://github.com/vim/vim/commit/54e5fed6d27b747ff152cdb6edfb72ff60e70939
patch 9.0.0035: spell dump may go beyond end of an array Problem: Spell dump may go beyond end of an array. Solution: Limit the word length.
1
spell_dump_compl( char_u *pat, // leading part of the word int ic, // ignore case int *dir, // direction for adding matches int dumpflags_arg) // DUMPFLAG_* { langp_T *lp; slang_T *slang; idx_T arridx[MAXWLEN]; int curi[MAXWLEN]; char_u word[MAXWLEN]; int c; ...
136,680,842,269,152,400,000,000,000,000,000,000,000
spell.c
199,888,238,601,938,700,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2022-2304
Stack-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.
https://nvd.nist.gov/vuln/detail/CVE-2022-2304
291,548
vim
54e5fed6d27b747ff152cdb6edfb72ff60e70939
https://github.com/vim/vim
https://github.com/vim/vim/commit/54e5fed6d27b747ff152cdb6edfb72ff60e70939
patch 9.0.0035: spell dump may go beyond end of an array Problem: Spell dump may go beyond end of an array. Solution: Limit the word length.
0
spell_dump_compl( char_u *pat, // leading part of the word int ic, // ignore case int *dir, // direction for adding matches int dumpflags_arg) // DUMPFLAG_* { langp_T *lp; slang_T *slang; idx_T arridx[MAXWLEN]; int curi[MAXWLEN]; char_u word[MAXWLEN]; int c; ...
237,821,358,087,234,370,000,000,000,000,000,000,000
spell.c
115,809,493,484,369,100,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2022-2304
Stack-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.
https://nvd.nist.gov/vuln/detail/CVE-2022-2304
199,705
linux
b1728ff617f88a1f7a5d8c8f21fe17a2f6af5d16
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b1728ff617f88a1f7a5d8c8f21fe17a2f6af5d16
media: dvb_frontend: fix ifnullfree.cocci warnings drivers/media/dvb-core/dvb_frontend.c:154:2-7: WARNING: NULL check before freeing functions like kfree, debugfs_remove, debugfs_remove_recursive or usb_free_urb is not needed. Maybe consider reorganizing relevant code to avoid passing NULL values. NULL check before ...
1
static void __dvb_frontend_free(struct dvb_frontend *fe) { struct dvb_frontend_private *fepriv = fe->frontend_priv; if (fepriv) dvb_free_device(fepriv->dvbdev); dvb_frontend_invoke_release(fe, fe->ops.release); if (fepriv) kfree(fepriv); }
148,500,864,758,102,270,000,000,000,000,000,000,000
dvb_frontend.c
89,564,543,835,876,150,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2017-16648
The dvb_frontend_free function in drivers/media/dvb-core/dvb_frontend.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via a crafted USB device. NOTE: the function was later renamed __dvb_frontend_free.
https://nvd.nist.gov/vuln/detail/CVE-2017-16648
291,555
linux
b1728ff617f88a1f7a5d8c8f21fe17a2f6af5d16
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b1728ff617f88a1f7a5d8c8f21fe17a2f6af5d16
media: dvb_frontend: fix ifnullfree.cocci warnings drivers/media/dvb-core/dvb_frontend.c:154:2-7: WARNING: NULL check before freeing functions like kfree, debugfs_remove, debugfs_remove_recursive or usb_free_urb is not needed. Maybe consider reorganizing relevant code to avoid passing NULL values. NULL check before ...
0
static void __dvb_frontend_free(struct dvb_frontend *fe) { struct dvb_frontend_private *fepriv = fe->frontend_priv; if (fepriv) dvb_free_device(fepriv->dvbdev); dvb_frontend_invoke_release(fe, fe->ops.release); kfree(fepriv); }
183,928,511,216,045,540,000,000,000,000,000,000,000
dvb_frontend.c
27,555,465,551,478,280,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2017-16648
The dvb_frontend_free function in drivers/media/dvb-core/dvb_frontend.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via a crafted USB device. NOTE: the function was later renamed __dvb_frontend_free.
https://nvd.nist.gov/vuln/detail/CVE-2017-16648
199,707
cpython
c3c9db89273fabc62ea1b48389d9a3000c1c03ae
https://github.com/python/cpython
https://github.com/python/cpython/commit/c3c9db89273fabc62ea1b48389d9a3000c1c03ae
[2.7] bpo-30657: Check & prevent integer overflow in PyString_DecodeEscape (#2174)
1
PyObject *PyString_DecodeEscape(const char *s, Py_ssize_t len, const char *errors, Py_ssize_t unicode, const char *recode_encoding) { int c; char *p, *buf; const char *end; PyO...
21,727,633,413,715,120,000,000,000,000,000,000,000
stringobject.c
283,892,388,416,421,570,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2017-1000158
CPython (aka Python) up to 2.7.13 is vulnerable to an integer overflow in the PyString_DecodeEscape function in stringobject.c, resulting in heap-based buffer overflow (and possible arbitrary code execution)
https://nvd.nist.gov/vuln/detail/CVE-2017-1000158
291,663
cpython
c3c9db89273fabc62ea1b48389d9a3000c1c03ae
https://github.com/python/cpython
https://github.com/python/cpython/commit/c3c9db89273fabc62ea1b48389d9a3000c1c03ae
[2.7] bpo-30657: Check & prevent integer overflow in PyString_DecodeEscape (#2174)
0
PyObject *PyString_DecodeEscape(const char *s, Py_ssize_t len, const char *errors, Py_ssize_t unicode, const char *recode_encoding) { int c; char *p, *buf; const char *end; PyO...
119,915,304,247,584,350,000,000,000,000,000,000,000
stringobject.c
33,415,377,762,331,090,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2017-1000158
CPython (aka Python) up to 2.7.13 is vulnerable to an integer overflow in the PyString_DecodeEscape function in stringobject.c, resulting in heap-based buffer overflow (and possible arbitrary code execution)
https://nvd.nist.gov/vuln/detail/CVE-2017-1000158
199,708
php-src
a5538c62293fa782fcc382d0635cfc0c8b9190e3
https://github.com/php/php-src
https://github.com/php/php-src/commit/a5538c62293fa782fcc382d0635cfc0c8b9190e3
Fix #81122: SSRF bypass in FILTER_VALIDATE_URL We need to ensure that the password detected by parse_url() is actually a valid password; we can re-use is_userinfo_valid() for that.
1
void php_filter_validate_url(PHP_INPUT_FILTER_PARAM_DECL) /* {{{ */ { php_url *url; size_t old_len = Z_STRLEN_P(value); if (flags & (FILTER_FLAG_SCHEME_REQUIRED | FILTER_FLAG_HOST_REQUIRED)) { php_error_docref(NULL, E_DEPRECATED, "explicit use of FILTER_FLAG_SCHEME_REQUIRED and FILTER_FLAG_HOST_REQUIRED is dep...
154,868,420,137,462,290,000,000,000,000,000,000,000
logical_filters.c
125,913,028,542,076,850,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2021-21705
In PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below 8.0.8, when using URL validation functionality via filter_var() function with FILTER_VALIDATE_URL parameter, an URL with invalid password field can be accepted as valid. This can lead to the code incorrectly parsing the URL and potentially leading t...
https://nvd.nist.gov/vuln/detail/CVE-2021-21705
291,733
php-src
a5538c62293fa782fcc382d0635cfc0c8b9190e3
https://github.com/php/php-src
https://github.com/php/php-src/commit/a5538c62293fa782fcc382d0635cfc0c8b9190e3
Fix #81122: SSRF bypass in FILTER_VALIDATE_URL We need to ensure that the password detected by parse_url() is actually a valid password; we can re-use is_userinfo_valid() for that.
0
void php_filter_validate_url(PHP_INPUT_FILTER_PARAM_DECL) /* {{{ */ { php_url *url; size_t old_len = Z_STRLEN_P(value); if (flags & (FILTER_FLAG_SCHEME_REQUIRED | FILTER_FLAG_HOST_REQUIRED)) { php_error_docref(NULL, E_DEPRECATED, "explicit use of FILTER_FLAG_SCHEME_REQUIRED and FILTER_FLAG_HOST_REQUIRED is dep...
52,509,983,194,461,180,000,000,000,000,000,000,000
logical_filters.c
39,877,530,416,217,100,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2021-21705
In PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below 8.0.8, when using URL validation functionality via filter_var() function with FILTER_VALIDATE_URL parameter, an URL with invalid password field can be accepted as valid. This can lead to the code incorrectly parsing the URL and potentially leading t...
https://nvd.nist.gov/vuln/detail/CVE-2021-21705
199,709
ImageMagick
db5e12e24f1378ce8c93a5c35991dcdd23a67bb0
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/db5e12e24f1378ce8c93a5c35991dcdd23a67bb0
https://github.com/ImageMagick/ImageMagick/issues/1726
1
static MagickBooleanType WritePALMImage(const ImageInfo *image_info, Image *image,ExceptionInfo *exception) { MagickBooleanType status; MagickOffsetType currentOffset, offset, scene; MagickSizeType cc; PixelInfo transpix; QuantizeInfo *quantize_info; register ssize_t x...
64,675,320,107,609,210,000,000,000,000,000,000,000
palm.c
7,628,018,621,299,670,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2020-27761
WritePALMImage() in /coders/palm.c used size_t casts in several areas of a calculation which could lead to values outside the range of representable type `unsigned long` undefined behavior when a crafted input file was processed by ImageMagick. The patch casts to `ssize_t` instead to avoid this issue. Red Hat Product S...
https://nvd.nist.gov/vuln/detail/CVE-2020-27761
291,745
ImageMagick
db5e12e24f1378ce8c93a5c35991dcdd23a67bb0
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/db5e12e24f1378ce8c93a5c35991dcdd23a67bb0
https://github.com/ImageMagick/ImageMagick/issues/1726
0
static MagickBooleanType WritePALMImage(const ImageInfo *image_info, Image *image,ExceptionInfo *exception) { MagickBooleanType status; MagickOffsetType currentOffset, offset, scene; MagickSizeType cc; PixelInfo transpix; QuantizeInfo *quantize_info; register ssize_t x...
267,079,839,814,655,800,000,000,000,000,000,000,000
palm.c
60,936,004,001,448,250,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2020-27761
WritePALMImage() in /coders/palm.c used size_t casts in several areas of a calculation which could lead to values outside the range of representable type `unsigned long` undefined behavior when a crafted input file was processed by ImageMagick. The patch casts to `ssize_t` instead to avoid this issue. Red Hat Product S...
https://nvd.nist.gov/vuln/detail/CVE-2020-27761
199,710
ModSecurity
0840b13612a0b7ef1ce7441cf811dcfc6b463fba
https://github.com/SpiderLabs/ModSecurity
https://github.com/SpiderLabs/ModSecurity/commit/0840b13612a0b7ef1ce7441cf811dcfc6b463fba
Fixed: chuck null pointer when unknown CT is sent and over in-memory limit
1
static apr_status_t modsecurity_request_body_store_memory(modsec_rec *msr, const char *data, apr_size_t length, char **error_msg) { *error_msg = NULL; /* Would storing this chunk mean going over the limit? */ if ((msr->msc_reqbody_spilltodisk) && (msr->msc_reqbody_length + length > (apr_size_t)...
46,572,576,200,724,530,000,000,000,000,000,000,000
msc_reqbody.c
281,743,696,438,437,560,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2013-2765
The ModSecurity module before 2.7.4 for the Apache HTTP Server allows remote attackers to cause a denial of service (NULL pointer dereference, process crash, and disk consumption) via a POST request with a large body and a crafted Content-Type header.
https://nvd.nist.gov/vuln/detail/CVE-2013-2765
291,748
ModSecurity
0840b13612a0b7ef1ce7441cf811dcfc6b463fba
https://github.com/SpiderLabs/ModSecurity
https://github.com/SpiderLabs/ModSecurity/commit/0840b13612a0b7ef1ce7441cf811dcfc6b463fba
Fixed: chuck null pointer when unknown CT is sent and over in-memory limit
0
static apr_status_t modsecurity_request_body_store_memory(modsec_rec *msr, const char *data, apr_size_t length, char **error_msg) { *error_msg = NULL; /* Would storing this chunk mean going over the limit? */ if ((msr->msc_reqbody_spilltodisk) && (msr->txcfg->reqbody_buffering != REQUEST_BODY_F...
230,588,638,379,883,170,000,000,000,000,000,000,000
msc_reqbody.c
99,172,905,554,349,360,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2013-2765
The ModSecurity module before 2.7.4 for the Apache HTTP Server allows remote attackers to cause a denial of service (NULL pointer dereference, process crash, and disk consumption) via a POST request with a large body and a crafted Content-Type header.
https://nvd.nist.gov/vuln/detail/CVE-2013-2765
199,749
php-src
eaf4e77190d402ea014207e9a7d5da1a4f3727ba
https://github.com/php/php-src
https://git.php.net/?p=php-src.git;a=commit;h=eaf4e77190d402ea014207e9a7d5da1a4f3727ba
Fix bug #71610: Type Confusion Vulnerability - SOAP / make_http_soap_request()
1
int make_http_soap_request(zval *this_ptr, zend_string *buf, char *location, char *soapaction, int soap_version, zval *return_value) { zend_string ...
77,866,418,827,808,110,000,000,000,000,000,000,000
php_http.c
72,369,828,773,664,050,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2016-3185
The make_http_soap_request function in ext/soap/php_http.c in PHP before 5.4.44, 5.5.x before 5.5.28, 5.6.x before 5.6.12, and 7.x before 7.0.4 allows remote attackers to obtain sensitive information from process memory or cause a denial of service (type confusion and application crash) via crafted serialized _cookies ...
https://nvd.nist.gov/vuln/detail/CVE-2016-3185
291,982
php-src
eaf4e77190d402ea014207e9a7d5da1a4f3727ba
https://github.com/php/php-src
https://git.php.net/?p=php-src.git;a=commit;h=eaf4e77190d402ea014207e9a7d5da1a4f3727ba
Fix bug #71610: Type Confusion Vulnerability - SOAP / make_http_soap_request()
0
int make_http_soap_request(zval *this_ptr, zend_string *buf, char *location, char *soapaction, int soap_version, zval *return_value) { zend_string ...
98,152,607,717,245,000,000,000,000,000,000,000,000
php_http.c
229,500,067,081,263,700,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2016-3185
The make_http_soap_request function in ext/soap/php_http.c in PHP before 5.4.44, 5.5.x before 5.5.28, 5.6.x before 5.6.12, and 7.x before 7.0.4 allows remote attackers to obtain sensitive information from process memory or cause a denial of service (type confusion and application crash) via crafted serialized _cookies ...
https://nvd.nist.gov/vuln/detail/CVE-2016-3185
199,752
samba
d6c28913f3109d1327a3d1369b6eafd3874b2dca
https://github.com/samba-team/samba
http://git.samba.org/?p=samba.git;a=commitdiff;h=d6c28913f3109d1327a3d1369b6eafd3874b2dca
Bug 6488: acl_group_override() call in posix acls references an uninitialized variable. (cherry picked from commit f92195e3a1baaddda47a5d496f9488c8445b41ad)
1
static bool acl_group_override(connection_struct *conn, gid_t prim_gid, const char *fname) { SMB_STRUCT_STAT sbuf; if ((errno != EPERM) && (errno != EACCES)) { return false; } /* file primary group == user primary or supplementary group */ if (lp_acl_group_control(SNUM(conn)) && current_user_in_grou...
3,053,031,308,927,266,000,000,000,000,000,000,000
posix_acls.c
177,653,535,708,007,400,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2009-1888
The acl_group_override function in smbd/posix_acls.c in smbd in Samba 3.0.x before 3.0.35, 3.1.x and 3.2.x before 3.2.13, and 3.3.x before 3.3.6, when dos filemode is enabled, allows remote attackers to modify access control lists for files via vectors related to read access to uninitialized memory.
https://nvd.nist.gov/vuln/detail/CVE-2009-1888
291,999
samba
d6c28913f3109d1327a3d1369b6eafd3874b2dca
https://github.com/samba-team/samba
http://git.samba.org/?p=samba.git;a=commitdiff;h=d6c28913f3109d1327a3d1369b6eafd3874b2dca
Bug 6488: acl_group_override() call in posix acls references an uninitialized variable. (cherry picked from commit f92195e3a1baaddda47a5d496f9488c8445b41ad)
0
static bool acl_group_override(connection_struct *conn, SMB_STRUCT_STAT *psbuf, const char *fname) { if ((errno != EPERM) && (errno != EACCES)) { return false; } /* file primary group == user primary or supplementary group */ if (lp_acl_group_control(SNUM(conn)) && current_user_in_group(psbuf->st_gid)...
172,602,061,259,793,000,000,000,000,000,000,000,000
posix_acls.c
252,409,568,123,051,230,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2009-1888
The acl_group_override function in smbd/posix_acls.c in smbd in Samba 3.0.x before 3.0.35, 3.1.x and 3.2.x before 3.2.13, and 3.3.x before 3.3.6, when dos filemode is enabled, allows remote attackers to modify access control lists for files via vectors related to read access to uninitialized memory.
https://nvd.nist.gov/vuln/detail/CVE-2009-1888
199,758
ceph
375d926a4f2720a29b079c216bafb884eef985c3
https://github.com/ceph/ceph
https://github.com/ceph/ceph/commit/375d926a4f2720a29b079c216bafb884eef985c3
rgw: check for tagging element in POST Obj requests Check for null element when reading the tagging field from POST obj XML Fixes: https://tracker.ceph.com/issues/44967 Signed-off-by: Abhishek Lekshmanan <abhishek@suse.com>
1
int RGWPostObj_ObjStore_S3::get_tags() { string tags_str; if (part_str(parts, "tagging", &tags_str)) { RGWObjTagsXMLParser parser; if (!parser.init()){ ldout(s->cct, 0) << "Couldn't init RGWObjTags XML parser" << dendl; err_msg = "Server couldn't process the request"; return -EINVAL; // TO...
104,383,316,393,684,460,000,000,000,000,000,000,000
rgw_rest_s3.cc
214,234,698,213,291,060,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2020-12059
An issue was discovered in Ceph through 13.2.9. A POST request with an invalid tagging XML can crash the RGW process by triggering a NULL pointer exception.
https://nvd.nist.gov/vuln/detail/CVE-2020-12059
292,102
ceph
375d926a4f2720a29b079c216bafb884eef985c3
https://github.com/ceph/ceph
https://github.com/ceph/ceph/commit/375d926a4f2720a29b079c216bafb884eef985c3
rgw: check for tagging element in POST Obj requests Check for null element when reading the tagging field from POST obj XML Fixes: https://tracker.ceph.com/issues/44967 Signed-off-by: Abhishek Lekshmanan <abhishek@suse.com>
0
int RGWPostObj_ObjStore_S3::get_tags() { string tags_str; if (part_str(parts, "tagging", &tags_str)) { RGWObjTagsXMLParser parser; if (!parser.init()){ ldout(s->cct, 0) << "Couldn't init RGWObjTags XML parser" << dendl; err_msg = "Server couldn't process the request"; return -EINVAL; // TO...
262,521,396,749,722,740,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2020-12059
An issue was discovered in Ceph through 13.2.9. A POST request with an invalid tagging XML can crash the RGW process by triggering a NULL pointer exception.
https://nvd.nist.gov/vuln/detail/CVE-2020-12059
199,769
quassel
8b5ecd226f9208af3074b33d3b7cf5e14f55b138
https://github.com/quassel/quassel
https://github.com/quassel/quassel/commit/8b5ecd226f9208af3074b33d3b7cf5e14f55b138
Check for invalid input in encrypted buffers The ECB Blowfish decryption function assumed that encrypted input would always come in blocks of 12 characters, as specified. However, buggy clients or annoying people may not adhere to that assumption, causing the core to crash while trying to process the invalid base64 in...
1
QByteArray Cipher::blowfishECB(QByteArray cipherText, bool direction) { QCA::Initializer init; QByteArray temp = cipherText; //do padding ourselves if (direction) { while ((temp.length() % 8) != 0) temp.append('\0'); } else { temp = b64ToByte(temp); while ((temp....
209,047,146,554,164,900,000,000,000,000,000,000,000
cipher.cpp
34,882,956,456,750,540,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2014-8483
The blowfishECB function in core/cipher.cpp in Quassel IRC 0.10.0 allows remote attackers to cause a denial of service (out-of-bounds read) via a malformed string.
https://nvd.nist.gov/vuln/detail/CVE-2014-8483
292,388
quassel
8b5ecd226f9208af3074b33d3b7cf5e14f55b138
https://github.com/quassel/quassel
https://github.com/quassel/quassel/commit/8b5ecd226f9208af3074b33d3b7cf5e14f55b138
Check for invalid input in encrypted buffers The ECB Blowfish decryption function assumed that encrypted input would always come in blocks of 12 characters, as specified. However, buggy clients or annoying people may not adhere to that assumption, causing the core to crash while trying to process the invalid base64 in...
0
QByteArray Cipher::blowfishECB(QByteArray cipherText, bool direction) { QCA::Initializer init; QByteArray temp = cipherText; //do padding ourselves if (direction) { while ((temp.length() % 8) != 0) temp.append('\0'); } else { // ECB Blowfish encodes in blocks of 12 chars...
22,263,619,940,289,437,000,000,000,000,000,000,000
cipher.cpp
14,208,552,185,856,785,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2014-8483
The blowfishECB function in core/cipher.cpp in Quassel IRC 0.10.0 allows remote attackers to cause a denial of service (out-of-bounds read) via a malformed string.
https://nvd.nist.gov/vuln/detail/CVE-2014-8483
199,772
upx
ef336dbcc6dc8344482f8cf6c909ae96c3286317
https://github.com/upx/upx
https://github.com/upx/upx/commit/ef336dbcc6dc8344482f8cf6c909ae96c3286317
Protect against bad crafted input. https://github.com/upx/upx/issues/128 modified: p_lx_elf.cpp
1
void PackLinuxElf64::unpack(OutputFile *fo) { unsigned const c_phnum = get_te16(&ehdri.e_phnum); upx_uint64_t old_data_off = 0; upx_uint64_t old_data_len = 0; upx_uint64_t old_dtinit = 0; unsigned szb_info = sizeof(b_info); { upx_uint64_t const e_entry = get_te64(&ehdri.e_entry); ...
224,886,921,534,825,040,000,000,000,000,000,000,000
p_lx_elf.cpp
201,133,125,951,494,360,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2017-15056
p_lx_elf.cpp in UPX 3.94 mishandles ELF headers, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by an Invalid Pointer Read in PackLinuxElf64::unpack().
https://nvd.nist.gov/vuln/detail/CVE-2017-15056