idx
int64
project
string
commit_id
string
project_url
string
commit_url
string
commit_message
string
target
int64
func
string
func_hash
float64
file_name
string
file_hash
float64
cwe
list
cve
string
cve_desc
string
nvd_url
string
292,527
upx
ef336dbcc6dc8344482f8cf6c909ae96c3286317
https://github.com/upx/upx
https://github.com/upx/upx/commit/ef336dbcc6dc8344482f8cf6c909ae96c3286317
Protect against bad crafted input. https://github.com/upx/upx/issues/128 modified: p_lx_elf.cpp
0
void PackLinuxElf64::unpack(OutputFile *fo) { if (e_phoff != sizeof(Elf64_Ehdr)) {// Phdrs not contiguous with Ehdr throwCantUnpack("bad e_phoff"); } unsigned const c_phnum = get_te16(&ehdri.e_phnum); upx_uint64_t old_data_off = 0; upx_uint64_t old_data_len = 0; upx_uint64_t old_dtinit =...
284,508,010,398,343,950,000,000,000,000,000,000,000
p_lx_elf.cpp
73,223,301,389,849,510,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2017-15056
p_lx_elf.cpp in UPX 3.94 mishandles ELF headers, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by an Invalid Pointer Read in PackLinuxElf64::unpack().
https://nvd.nist.gov/vuln/detail/CVE-2017-15056
199,775
upx
ef336dbcc6dc8344482f8cf6c909ae96c3286317
https://github.com/upx/upx
https://github.com/upx/upx/commit/ef336dbcc6dc8344482f8cf6c909ae96c3286317
Protect against bad crafted input. https://github.com/upx/upx/issues/128 modified: p_lx_elf.cpp
1
void PackLinuxElf32::unpack(OutputFile *fo) { unsigned const c_phnum = get_te16(&ehdri.e_phnum); unsigned old_data_off = 0; unsigned old_data_len = 0; unsigned old_dtinit = 0; unsigned szb_info = sizeof(b_info); { if (get_te32(&ehdri.e_entry) < 0x401180 && Elf32_Ehdr::EM_386 ==...
269,169,780,002,602,600,000,000,000,000,000,000,000
p_lx_elf.cpp
201,133,125,951,494,360,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2017-15056
p_lx_elf.cpp in UPX 3.94 mishandles ELF headers, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by an Invalid Pointer Read in PackLinuxElf64::unpack().
https://nvd.nist.gov/vuln/detail/CVE-2017-15056
292,507
upx
ef336dbcc6dc8344482f8cf6c909ae96c3286317
https://github.com/upx/upx
https://github.com/upx/upx/commit/ef336dbcc6dc8344482f8cf6c909ae96c3286317
Protect against bad crafted input. https://github.com/upx/upx/issues/128 modified: p_lx_elf.cpp
0
void PackLinuxElf32::unpack(OutputFile *fo) { if (e_phoff != sizeof(Elf32_Ehdr)) {// Phdrs not contiguous with Ehdr throwCantUnpack("bad e_phoff"); } unsigned const c_phnum = get_te16(&ehdri.e_phnum); unsigned old_data_off = 0; unsigned old_data_len = 0; unsigned old_dtinit = 0; uns...
39,547,117,445,938,715,000,000,000,000,000,000,000
p_lx_elf.cpp
73,223,301,389,849,510,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2017-15056
p_lx_elf.cpp in UPX 3.94 mishandles ELF headers, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by an Invalid Pointer Read in PackLinuxElf64::unpack().
https://nvd.nist.gov/vuln/detail/CVE-2017-15056
199,777
libsndfile
aaea680337267bfb6d2544da878890ee7f1c5077
https://github.com/erikd/libsndfile
https://github.com/erikd/libsndfile/commit/aaea680337267bfb6d2544da878890ee7f1c5077
Check MAX_CHANNELS in sndfile-deinterleave Allocated buffer has space for only 16 channels. Verify that input file meets this limit. Fixes #397
1
main (int argc, char **argv) { STATE state ; SF_INFO sfinfo ; char pathname [512], ext [32], *cptr ; int ch, double_split ; if (argc != 2) { if (argc != 1) puts ("\nError : need a single input file.\n") ; usage_exit () ; } ; memset (&state, 0, sizeof (state)) ; memset (&sfinfo, 0, sizeof (sfinfo)) ; i...
185,290,033,106,488,580,000,000,000,000,000,000,000
sndfile-deinterleave.c
271,399,014,135,583,170,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2018-19432
An issue was discovered in libsndfile 1.0.28. There is a NULL pointer dereference in the function sf_write_int in sndfile.c, which will lead to a denial of service.
https://nvd.nist.gov/vuln/detail/CVE-2018-19432
292,601
libsndfile
aaea680337267bfb6d2544da878890ee7f1c5077
https://github.com/erikd/libsndfile
https://github.com/erikd/libsndfile/commit/aaea680337267bfb6d2544da878890ee7f1c5077
Check MAX_CHANNELS in sndfile-deinterleave Allocated buffer has space for only 16 channels. Verify that input file meets this limit. Fixes #397
0
main (int argc, char **argv) { STATE state ; SF_INFO sfinfo ; char pathname [512], ext [32], *cptr ; int ch, double_split ; if (argc != 2) { if (argc != 1) puts ("\nError : need a single input file.\n") ; usage_exit () ; } ; memset (&state, 0, sizeof (state)) ; memset (&sfinfo, 0, sizeof (sfinfo)) ; i...
214,934,442,328,700,830,000,000,000,000,000,000,000
sndfile-deinterleave.c
245,269,637,836,946,950,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2018-19432
An issue was discovered in libsndfile 1.0.28. There is a NULL pointer dereference in the function sf_write_int in sndfile.c, which will lead to a denial of service.
https://nvd.nist.gov/vuln/detail/CVE-2018-19432
199,784
linux
83f1b4ba917db5dc5a061a44b3403ddb6e783494
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/83f1b4ba917db5dc5a061a44b3403ddb6e783494
net: fix incorrect credentials passing Commit 257b5358b32f ("scm: Capture the full credentials of the scm sender") changed the credentials passing code to pass in the effective uid/gid instead of the real uid/gid. Obviously this doesn't matter most of the time (since normally they are the same), but it results in dif...
1
static __inline__ void scm_set_cred(struct scm_cookie *scm, struct pid *pid, const struct cred *cred) { scm->pid = get_pid(pid); scm->cred = cred ? get_cred(cred) : NULL; scm->creds.pid = pid_vnr(pid); scm->creds.uid = cred ? cred->euid : INVALID_UID; scm->creds.gid = cred ? cred->egid : INVALID_GID; }
131,269,229,816,038,690,000,000,000,000,000,000,000
scm.h
221,494,680,009,258,900,000,000,000,000,000,000,000
[ "CWE-284" ]
CVE-2013-1979
The scm_set_cred function in include/net/scm.h in the Linux kernel before 3.8.11 uses incorrect uid and gid values during credentials passing, which allows local users to gain privileges via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-1979
292,689
linux
83f1b4ba917db5dc5a061a44b3403ddb6e783494
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/83f1b4ba917db5dc5a061a44b3403ddb6e783494
net: fix incorrect credentials passing Commit 257b5358b32f ("scm: Capture the full credentials of the scm sender") changed the credentials passing code to pass in the effective uid/gid instead of the real uid/gid. Obviously this doesn't matter most of the time (since normally they are the same), but it results in dif...
0
static __inline__ void scm_set_cred(struct scm_cookie *scm, struct pid *pid, const struct cred *cred) { scm->pid = get_pid(pid); scm->cred = cred ? get_cred(cred) : NULL; scm->creds.pid = pid_vnr(pid); scm->creds.uid = cred ? cred->uid : INVALID_UID; scm->creds.gid = cred ? cred->gid : INVALID_GID; }
19,600,063,016,870,249,000,000,000,000,000,000,000
scm.h
275,165,060,088,837,360,000,000,000,000,000,000,000
[ "CWE-284" ]
CVE-2013-1979
The scm_set_cred function in include/net/scm.h in the Linux kernel before 3.8.11 uses incorrect uid and gid values during credentials passing, which allows local users to gain privileges via a crafted application.
https://nvd.nist.gov/vuln/detail/CVE-2013-1979
199,786
weechat
6f4f147d8e86adf9ad34a8ffd7e7f1f23a7e74da
https://github.com/weechat/weechat
https://github.com/weechat/weechat/commit/6f4f147d8e86adf9ad34a8ffd7e7f1f23a7e74da
irc: fix crash when receiving a malformed message 324 (channel mode) Thanks to Stuart Nevans Locke for reporting the issue.
1
irc_mode_channel_update (struct t_irc_server *server, struct t_irc_channel *channel, char set_flag, char chanmode, const char *argument) { char *pos_args, *str_modes, **argv, *pos, *ptr_arg; char *new_modes, *new...
188,177,756,673,106,500,000,000,000,000,000,000,000
irc-mode.c
292,817,717,604,208,200,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2020-8955
irc_mode_channel_update in plugins/irc/irc-mode.c in WeeChat through 2.7 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a malformed IRC message 324 (channel mode).
https://nvd.nist.gov/vuln/detail/CVE-2020-8955
292,789
weechat
6f4f147d8e86adf9ad34a8ffd7e7f1f23a7e74da
https://github.com/weechat/weechat
https://github.com/weechat/weechat/commit/6f4f147d8e86adf9ad34a8ffd7e7f1f23a7e74da
irc: fix crash when receiving a malformed message 324 (channel mode) Thanks to Stuart Nevans Locke for reporting the issue.
0
irc_mode_channel_update (struct t_irc_server *server, struct t_irc_channel *channel, char set_flag, char chanmode, const char *argument) { char *pos_args, *str_modes, **argv, *pos, *ptr_arg; char *new_modes, *new...
116,074,854,913,510,830,000,000,000,000,000,000,000
irc-mode.c
199,656,443,808,802,470,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2020-8955
irc_mode_channel_update in plugins/irc/irc-mode.c in WeeChat through 2.7 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a malformed IRC message 324 (channel mode).
https://nvd.nist.gov/vuln/detail/CVE-2020-8955
199,788
exim
a04174dc2a84ae1008c23b6a7109e7fa3fb7b8b0
https://github.com/Exim/exim
https://git.exim.org/exim.git/commit/a04174dc2a84ae1008c23b6a7109e7fa3fb7b8b0
Rework SPA fix to avoid overflows. Bug 2571 Amends: 57aa14b216
1
auth_spa_server(auth_instance *ablock, uschar *data) { auth_spa_options_block *ob = (auth_spa_options_block *)(ablock->options_block); uint8x lmRespData[24]; uint8x ntRespData[24]; SPAAuthRequest request; SPAAuthChallenge challenge; SPAAuthResponse response; SPAAuthResponse *responseptr = &response; uschar msgbuf[204...
184,116,674,678,987,700,000,000,000,000,000,000,000
spa.c
292,387,672,206,916,360,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2020-12783
Exim through 4.93 has an out-of-bounds read in the SPA authenticator that could result in SPA/NTLM authentication bypass in auths/spa.c and auths/auth-spa.c.
https://nvd.nist.gov/vuln/detail/CVE-2020-12783
292,791
exim
a04174dc2a84ae1008c23b6a7109e7fa3fb7b8b0
https://github.com/Exim/exim
https://git.exim.org/exim.git/commit/a04174dc2a84ae1008c23b6a7109e7fa3fb7b8b0
Rework SPA fix to avoid overflows. Bug 2571 Amends: 57aa14b216
0
auth_spa_server(auth_instance *ablock, uschar *data) { auth_spa_options_block *ob = (auth_spa_options_block *)(ablock->options_block); uint8x lmRespData[24]; uint8x ntRespData[24]; SPAAuthRequest request; SPAAuthChallenge challenge; SPAAuthResponse response; SPAAuthResponse *responseptr = &response; uschar msgbuf[204...
286,917,894,428,868,160,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2020-12783
Exim through 4.93 has an out-of-bounds read in the SPA authenticator that could result in SPA/NTLM authentication bypass in auths/spa.c and auths/auth-spa.c.
https://nvd.nist.gov/vuln/detail/CVE-2020-12783
199,789
FreeRDP
d6cd14059b257318f176c0ba3ee0a348826a9ef8
https://github.com/FreeRDP/FreeRDP
https://github.com/FreeRDP/FreeRDP/commit/d6cd14059b257318f176c0ba3ee0a348826a9ef8
Fixed GHSL-2020-101 missing NULL check (cherry picked from commit b207dbba35c505bbc3ad5aadc10b34980c6b7e8e)
1
BOOL security_fips_decrypt(BYTE* data, size_t length, rdpRdp* rdp) { size_t olen; if (!winpr_Cipher_Update(rdp->fips_decrypt, data, length, data, &olen)) return FALSE; return TRUE; }
8,054,079,088,470,202,000,000,000,000,000,000,000
security.c
305,925,616,334,524,900,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2020-13397
An issue was discovered in FreeRDP before 2.1.1. An out-of-bounds (OOB) read vulnerability has been detected in security_fips_decrypt in libfreerdp/core/security.c due to an uninitialized value.
https://nvd.nist.gov/vuln/detail/CVE-2020-13397
292,809
FreeRDP
d6cd14059b257318f176c0ba3ee0a348826a9ef8
https://github.com/FreeRDP/FreeRDP
https://github.com/FreeRDP/FreeRDP/commit/d6cd14059b257318f176c0ba3ee0a348826a9ef8
Fixed GHSL-2020-101 missing NULL check (cherry picked from commit b207dbba35c505bbc3ad5aadc10b34980c6b7e8e)
0
BOOL security_fips_decrypt(BYTE* data, size_t length, rdpRdp* rdp) { size_t olen; if (!rdp || !rdp->fips_decrypt) return FALSE; if (!winpr_Cipher_Update(rdp->fips_decrypt, data, length, data, &olen)) return FALSE; return TRUE; }
19,897,350,297,675,680,000,000,000,000,000,000,000
security.c
206,625,793,047,677,300,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2020-13397
An issue was discovered in FreeRDP before 2.1.1. An out-of-bounds (OOB) read vulnerability has been detected in security_fips_decrypt in libfreerdp/core/security.c due to an uninitialized value.
https://nvd.nist.gov/vuln/detail/CVE-2020-13397
199,798
poco
bb7e5feece68ccfd8660caee93da25c5c39a4707
https://github.com/pocoproject/poco
https://github.com/pocoproject/poco/commit/bb7e5feece68ccfd8660caee93da25c5c39a4707
merge zip entry absolute path vulnerability fix (#1968) from develop
1
bool ZipCommon::isValidPath(const std::string& path) { if (path == "..") return false; if (path.compare(0, 3, "../") == 0) return false; if (path.compare(0, 3, "..\\") == 0) return false; if (path.find("/..") != std::string::npos) return false; if (path.find("\\..") != std::string::npos) return false; r...
789,213,769,138,701,100,000,000,000,000,000,000
ZipCommon.cpp
17,915,437,497,623,443,000,000,000,000,000,000,000
[ "CWE-22" ]
CVE-2017-1000472
The ZipCommon::isValidPath() function in Zip/src/ZipCommon.cpp in POCO C++ Libraries before 1.8 does not properly restrict the filename value in the ZIP header, which allows attackers to conduct absolute path traversal attacks during the ZIP decompression, and possibly create or overwrite arbitrary files, via a crafted...
https://nvd.nist.gov/vuln/detail/CVE-2017-1000472
292,846
poco
bb7e5feece68ccfd8660caee93da25c5c39a4707
https://github.com/pocoproject/poco
https://github.com/pocoproject/poco/commit/bb7e5feece68ccfd8660caee93da25c5c39a4707
merge zip entry absolute path vulnerability fix (#1968) from develop
0
bool ZipCommon::isValidPath(const std::string& path) { try { if (Path(path, Path::PATH_UNIX).isAbsolute() || Path(path, Path::PATH_WINDOWS).isAbsolute()) return false; } catch (...) { return false; } if (path == "..") return false; if ((path.size() >= 3) && path.compare(0, 3, "../") == 0) return fal...
155,335,598,961,505,950,000,000,000,000,000,000,000
ZipCommon.cpp
237,586,829,736,796,230,000,000,000,000,000,000,000
[ "CWE-22" ]
CVE-2017-1000472
The ZipCommon::isValidPath() function in Zip/src/ZipCommon.cpp in POCO C++ Libraries before 1.8 does not properly restrict the filename value in the ZIP header, which allows attackers to conduct absolute path traversal attacks during the ZIP decompression, and possibly create or overwrite arbitrary files, via a crafted...
https://nvd.nist.gov/vuln/detail/CVE-2017-1000472
199,812
ImageMagick
9cf2f738f714eba6d47be1127ed255acd2b51750
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/9cf2f738f714eba6d47be1127ed255acd2b51750
https://github.com/ImageMagick/ImageMagick/issues/1453
1
static MagickBooleanType WriteDIBImage(const ImageInfo *image_info,Image *image, ExceptionInfo *exception) { DIBInfo dib_info; MagickBooleanType status; register const Quantum *p; register ssize_t i, x; register unsigned char *q; size_t bytes_per_line; ssize_t y; ...
185,954,394,330,689,500,000,000,000,000,000,000,000
dib.c
53,349,621,889,029,420,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2019-7398
In ImageMagick before 7.0.8-25, a memory leak exists in WriteDIBImage in coders/dib.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-7398
292,931
ImageMagick
9cf2f738f714eba6d47be1127ed255acd2b51750
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/9cf2f738f714eba6d47be1127ed255acd2b51750
https://github.com/ImageMagick/ImageMagick/issues/1453
0
static MagickBooleanType WriteDIBImage(const ImageInfo *image_info,Image *image, ExceptionInfo *exception) { DIBInfo dib_info; MagickBooleanType status; register const Quantum *p; register ssize_t i, x; register unsigned char *q; size_t bytes_per_line; ssize_t y; ...
97,482,229,688,337,220,000,000,000,000,000,000,000
dib.c
276,756,533,291,690,040,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2019-7398
In ImageMagick before 7.0.8-25, a memory leak exists in WriteDIBImage in coders/dib.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-7398
199,821
linux
ac795161c93699d600db16c1a8cc23a65a1eceaf
https://github.com/torvalds/linux
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ac795161c93699d600db16c1a8cc23a65a1eceaf
NFSv4: Handle case where the lookup of a directory fails If the application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() will punt to doing a regular lookup. If the server then returns a regular file, we will happily return a file descriptor with uninitialised open state. The fix is ...
1
int nfs_atomic_open(struct inode *dir, struct dentry *dentry, struct file *file, unsigned open_flags, umode_t mode) { DECLARE_WAIT_QUEUE_HEAD_ONSTACK(wq); struct nfs_open_context *ctx; struct dentry *res; struct iattr attr = { .ia_valid = ATTR_OPEN }; struct inode *inode; unsigned int lookup_flags = 0...
121,284,279,749,402,280,000,000,000,000,000,000,000
dir.c
72,899,618,380,248,340,000,000,000,000,000,000,000
[ "CWE-909" ]
CVE-2022-24448
An issue was discovered in fs/nfs/dir.c in the Linux kernel before 5.16.5. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should occur, but the server instead returns uninitialized data in the file descripto...
https://nvd.nist.gov/vuln/detail/CVE-2022-24448
293,078
linux
ac795161c93699d600db16c1a8cc23a65a1eceaf
https://github.com/torvalds/linux
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ac795161c93699d600db16c1a8cc23a65a1eceaf
NFSv4: Handle case where the lookup of a directory fails If the application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() will punt to doing a regular lookup. If the server then returns a regular file, we will happily return a file descriptor with uninitialised open state. The fix is ...
0
int nfs_atomic_open(struct inode *dir, struct dentry *dentry, struct file *file, unsigned open_flags, umode_t mode) { DECLARE_WAIT_QUEUE_HEAD_ONSTACK(wq); struct nfs_open_context *ctx; struct dentry *res; struct iattr attr = { .ia_valid = ATTR_OPEN }; struct inode *inode; unsigned int lookup_flags = 0...
298,536,409,859,562,370,000,000,000,000,000,000,000
dir.c
53,601,207,712,078,500,000,000,000,000,000,000,000
[ "CWE-909" ]
CVE-2022-24448
An issue was discovered in fs/nfs/dir.c in the Linux kernel before 5.16.5. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should occur, but the server instead returns uninitialized data in the file descripto...
https://nvd.nist.gov/vuln/detail/CVE-2022-24448
199,823
w3m
a25fd09f74fb83499396935a96d63bb7cb8e2c58
https://github.com/tats/w3m
https://github.com/tats/w3m/commit/a25fd09f74fb83499396935a96d63bb7cb8e2c58
Prevent negative array index for selectnumber and textareanumber Bug-Debian: https://github.com/tats/w3m/issues/12
1
formList_addInput(struct form_list *fl, struct parsed_tag *tag) { struct form_item_list *item; char *p; int i; /* if not in <form>..</form> environment, just ignore <input> tag */ if (fl == NULL) return NULL; item = New(struct form_item_list); item->type = FORM_UNKNOWN; item->size = -...
114,137,860,407,776,880,000,000,000,000,000,000,000
form.c
158,086,739,093,364,400,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-9424
An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. w3m doesn't properly validate the value of tag attribute, which allows remote attackers to cause a denial of service (heap buffer overflow crash) and possibly execute arbitrary code via a crafted HTML page.
https://nvd.nist.gov/vuln/detail/CVE-2016-9424
77,460
w3m
7fdc83b0364005a0b5ed869230dd81752ba022e8
https://github.com/tats/w3m
https://github.com/tats/w3m/commit/7fdc83b0364005a0b5ed869230dd81752ba022e8
Prevent invalid columnPos() call in formUpdateBuffer() Bug-Debian: https://github.com/tats/w3m/issues/89
0
formList_addInput(struct form_list *fl, struct parsed_tag *tag) { struct form_item_list *item; char *p; int i; /* if not in <form>..</form> environment, just ignore <input> tag */ if (fl == NULL) return NULL; item = New(struct form_item_list); item->type = FORM_UNKNOWN; item->size = -...
69,104,510,322,303,205,000,000,000,000,000,000,000
form.c
209,643,273,982,878,620,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2018-6197
w3m through 0.5.3 is prone to a NULL pointer dereference flaw in formUpdateBuffer in form.c.
https://nvd.nist.gov/vuln/detail/CVE-2018-6197
199,824
linux
dad5ab0db8deac535d03e3fe3d8f2892173fa6a4
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dad5ab0db8deac535d03e3fe3d8f2892173fa6a4
x86/acpi: Prevent out of bound access caused by broken ACPI tables The bus_irq argument of mp_override_legacy_irq() is used as the index into the isa_irq_to_gsi[] array. The bus_irq argument originates from ACPI_MADT_TYPE_IO_APIC and ACPI_MADT_TYPE_INTERRUPT items in the ACPI tables, but is nowhere sanity checked. Th...
1
static void __init mp_override_legacy_irq(u8 bus_irq, u8 polarity, u8 trigger, u32 gsi) { int ioapic; int pin; struct mpc_intsrc mp_irq; /* * Convert 'gsi' to 'ioapic.pin'. */ ioapic = mp_find_ioapic(gsi); if (ioapic < 0) return; pin = mp_find_ioapic_pin(ioapic, gsi); /* * TBD: This check is fo...
222,394,401,587,201,600,000,000,000,000,000,000,000
boot.c
265,602,114,283,354,460,000,000,000,000,000,000,000
[ "CWE-120" ]
CVE-2017-11473
Buffer overflow in the mp_override_legacy_irq() function in arch/x86/kernel/acpi/boot.c in the Linux kernel through 3.2 allows local users to gain privileges via a crafted ACPI table.
https://nvd.nist.gov/vuln/detail/CVE-2017-11473
293,220
linux
dad5ab0db8deac535d03e3fe3d8f2892173fa6a4
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dad5ab0db8deac535d03e3fe3d8f2892173fa6a4
x86/acpi: Prevent out of bound access caused by broken ACPI tables The bus_irq argument of mp_override_legacy_irq() is used as the index into the isa_irq_to_gsi[] array. The bus_irq argument originates from ACPI_MADT_TYPE_IO_APIC and ACPI_MADT_TYPE_INTERRUPT items in the ACPI tables, but is nowhere sanity checked. Th...
0
static void __init mp_override_legacy_irq(u8 bus_irq, u8 polarity, u8 trigger, u32 gsi) { int ioapic; int pin; struct mpc_intsrc mp_irq; /* * Check bus_irq boundary. */ if (bus_irq >= NR_IRQS_LEGACY) { pr_warn("Invalid bus_irq %u for legacy override\n", bus_irq); return; } /* * Convert 'gsi' t...
119,128,203,013,338,030,000,000,000,000,000,000,000
boot.c
223,148,726,855,874,430,000,000,000,000,000,000,000
[ "CWE-120" ]
CVE-2017-11473
Buffer overflow in the mp_override_legacy_irq() function in arch/x86/kernel/acpi/boot.c in the Linux kernel through 3.2 allows local users to gain privileges via a crafted ACPI table.
https://nvd.nist.gov/vuln/detail/CVE-2017-11473
199,839
libgcrypt
8725c99ffa41778f382ca97233183bcd687bb0ce
https://github.com/gpg/libgcrypt
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=8725c99ffa41778f382ca97233183bcd687bb0ce
rsa: Add exponent blinding. * cipher/rsa.c (secret_core_crt): Blind secret D with randomized nonce R for mpi_powm computation. -- Co-authored-by: Werner Koch <wk@gnupg.org> Signed-off-by: NIIBE Yutaka <gniibe@fsij.org> The paper describing attack: https://eprint.iacr.org/2017/627 Sliding right into disaster: Left-...
1
secret_core_crt (gcry_mpi_t M, gcry_mpi_t C, gcry_mpi_t D, unsigned int Nlimbs, gcry_mpi_t P, gcry_mpi_t Q, gcry_mpi_t U) { gcry_mpi_t m1 = mpi_alloc_secure ( Nlimbs + 1 ); gcry_mpi_t m2 = mpi_alloc_secure ( Nlimbs + 1 ); gcry_mpi_t h = mpi_alloc_secure ( Nlimbs + 1 ); /* m1 ...
64,521,901,183,118,710,000,000,000,000,000,000,000
rsa.c
198,849,560,603,613,900,000,000,000,000,000,000,000
[ "CWE-310" ]
CVE-2017-7526
libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attac...
https://nvd.nist.gov/vuln/detail/CVE-2017-7526
293,610
libgcrypt
8725c99ffa41778f382ca97233183bcd687bb0ce
https://github.com/gpg/libgcrypt
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=8725c99ffa41778f382ca97233183bcd687bb0ce
rsa: Add exponent blinding. * cipher/rsa.c (secret_core_crt): Blind secret D with randomized nonce R for mpi_powm computation. -- Co-authored-by: Werner Koch <wk@gnupg.org> Signed-off-by: NIIBE Yutaka <gniibe@fsij.org> The paper describing attack: https://eprint.iacr.org/2017/627 Sliding right into disaster: Left-...
0
secret_core_crt (gcry_mpi_t M, gcry_mpi_t C, gcry_mpi_t D, unsigned int Nlimbs, gcry_mpi_t P, gcry_mpi_t Q, gcry_mpi_t U) { gcry_mpi_t m1 = mpi_alloc_secure ( Nlimbs + 1 ); gcry_mpi_t m2 = mpi_alloc_secure ( Nlimbs + 1 ); gcry_mpi_t h = mpi_alloc_secure ( Nlimbs + 1 ); gcry_mp...
191,367,156,524,628,400,000,000,000,000,000,000,000
rsa.c
138,966,268,077,037,850,000,000,000,000,000,000,000
[ "CWE-310" ]
CVE-2017-7526
libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attac...
https://nvd.nist.gov/vuln/detail/CVE-2017-7526
199,842
ImageMagick
ee5b9c56b9ca18ed0750f8a15e0d1a6da92a6e99
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/ee5b9c56b9ca18ed0750f8a15e0d1a6da92a6e99
https://github.com/ImageMagick/ImageMagick/issues/1517
1
static MagickBooleanType WriteDPXImage(const ImageInfo *image_info,Image *image, ExceptionInfo *exception) { const char *value; const StringInfo *profile; DPXInfo dpx; GeometryInfo geometry_info; MagickBooleanType status; MagickOffsetType offset; MagickStatusType flags;...
1,378,234,600,095,752,000,000,000,000,000,000,000
dpx.c
242,348,207,868,873,100,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2019-12975
ImageMagick 7.0.8-34 has a memory leak vulnerability in the WriteDPXImage function in coders/dpx.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-12975
293,790
ImageMagick
ee5b9c56b9ca18ed0750f8a15e0d1a6da92a6e99
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/ee5b9c56b9ca18ed0750f8a15e0d1a6da92a6e99
https://github.com/ImageMagick/ImageMagick/issues/1517
0
static MagickBooleanType WriteDPXImage(const ImageInfo *image_info,Image *image, ExceptionInfo *exception) { const char *value; const StringInfo *profile; DPXInfo dpx; GeometryInfo geometry_info; MagickBooleanType status; MagickOffsetType offset; MagickStatusType flags;...
321,605,399,547,815,180,000,000,000,000,000,000,000
dpx.c
148,279,576,596,785,700,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2019-12975
ImageMagick 7.0.8-34 has a memory leak vulnerability in the WriteDPXImage function in coders/dpx.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-12975
199,850
capnproto
52bc956459a5e83d7c31be95763ff6399e064ae4
https://github.com/capnproto/capnproto
https://github.com/sandstorm-io/capnproto/commit/52bc956459a5e83d7c31be95763ff6399e064ae4
SECURITY: Prevent compiler from eliding bounds checks. Details: https://github.com/sandstorm-io/capnproto/blob/master/security-advisories/2017-04-17-0-apple-32bit-elides-bounds-check.md
1
inline bool SegmentReader::containsInterval(const void* from, const void* to) { return from >= this->ptr.begin() && to <= this->ptr.end() && from <= to && readLimiter->canRead( intervalLength(reinterpret_cast<const byte*>(from), reinterpret_cast<const byte*>(to), ...
336,574,734,078,768,540,000,000,000,000,000,000,000
arena.h
194,835,903,770,639,500,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2017-7892
Sandstorm Cap'n Proto before 0.5.3.1 allows remote crashes related to a compiler optimization. A remote attacker can trigger a segfault in a 32-bit libcapnp application because Cap'n Proto relies on pointer arithmetic calculations that overflow. An example compiler with optimization that elides a bounds check in such c...
https://nvd.nist.gov/vuln/detail/CVE-2017-7892
293,934
capnproto
52bc956459a5e83d7c31be95763ff6399e064ae4
https://github.com/capnproto/capnproto
https://github.com/sandstorm-io/capnproto/commit/52bc956459a5e83d7c31be95763ff6399e064ae4
SECURITY: Prevent compiler from eliding bounds checks. Details: https://github.com/sandstorm-io/capnproto/blob/master/security-advisories/2017-04-17-0-apple-32bit-elides-bounds-check.md
0
inline bool SegmentReader::containsInterval(const void* from, const void* to) { uintptr_t start = reinterpret_cast<uintptr_t>(from) - reinterpret_cast<uintptr_t>(ptr.begin()); uintptr_t end = reinterpret_cast<uintptr_t>(to) - reinterpret_cast<uintptr_t>(ptr.begin()); uintptr_t bound = ptr.size() * sizeof(capnp::w...
248,798,622,971,580,200,000,000,000,000,000,000,000
arena.h
248,728,536,083,470,200,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2017-7892
Sandstorm Cap'n Proto before 0.5.3.1 allows remote crashes related to a compiler optimization. A remote attacker can trigger a segfault in a 32-bit libcapnp application because Cap'n Proto relies on pointer arithmetic calculations that overflow. An example compiler with optimization that elides a bounds check in such c...
https://nvd.nist.gov/vuln/detail/CVE-2017-7892
199,876
libx11
8d2e02ae650f00c4a53deb625211a0527126c605
https://gitlab.freedesktop.org/xorg/lib/libx11
https://gitlab.freedesktop.org/xorg/lib/libx11/-/commit/8d2e02ae650f00c4a53deb625211a0527126c605
Reject string longer than USHRT_MAX before sending them on the wire The X protocol uses CARD16 values to represent the length so this would overflow. CVE-2021-31535 Signed-off-by: Matthieu Herrb <matthieu@herrb.eu>
1
XLookupColor ( register Display *dpy, Colormap cmap, _Xconst char *spec, XColor *def, XColor *scr) { register int n; xLookupColorReply reply; register xLookupColorReq *req; XcmsCCC ccc; XcmsColor cmsColor_exact; #ifdef XCMS /* * Let's Attempt to use Xcms and i18n approach to Parse Color */ if ((...
78,580,651,049,327,750,000,000,000,000,000,000,000
LookupCol.c
83,074,443,382,407,210,000,000,000,000,000,000,000
[ "CWE-120" ]
CVE-2021-31535
LookupCol.c in X.Org X through X11R7.7 and libX11 before 1.7.1 might allow remote attackers to execute arbitrary code. The libX11 XLookupColor request (intended for server-side color lookup) contains a flaw allowing a client to send color-name requests with a name longer than the maximum size allowed by the protocol (a...
https://nvd.nist.gov/vuln/detail/CVE-2021-31535
294,269
libx11
8d2e02ae650f00c4a53deb625211a0527126c605
https://gitlab.freedesktop.org/xorg/lib/libx11
https://gitlab.freedesktop.org/xorg/lib/libx11/-/commit/8d2e02ae650f00c4a53deb625211a0527126c605
Reject string longer than USHRT_MAX before sending them on the wire The X protocol uses CARD16 values to represent the length so this would overflow. CVE-2021-31535 Signed-off-by: Matthieu Herrb <matthieu@herrb.eu>
0
XLookupColor ( register Display *dpy, Colormap cmap, _Xconst char *spec, XColor *def, XColor *scr) { register int n; xLookupColorReply reply; register xLookupColorReq *req; XcmsCCC ccc; XcmsColor cmsColor_exact; n = (int) strlen (spec); if (n >= USHRT_MAX) return 0; #ifdef XCMS /* * L...
105,366,235,125,736,960,000,000,000,000,000,000,000
LookupCol.c
268,581,929,491,905,220,000,000,000,000,000,000,000
[ "CWE-120" ]
CVE-2021-31535
LookupCol.c in X.Org X through X11R7.7 and libX11 before 1.7.1 might allow remote attackers to execute arbitrary code. The libX11 XLookupColor request (intended for server-side color lookup) contains a flaw allowing a client to send color-name requests with a name longer than the maximum size allowed by the protocol (a...
https://nvd.nist.gov/vuln/detail/CVE-2021-31535
199,886
ekiga
02654fc949722a78d41fcffac8687d73d8574647
http://git.gnome.org/browse/ekiga
https://gitlab.gnome.org/GNOME/ekiga/commit/02654fc949722a78d41fcffac8687d73d8574647
Fixed plugin load I have no idea when I broke this...
1
plugin_init (Ekiga::KickStart& kickstart) { #ifdef DEBUG // should make it easier to test ekiga without installing gchar* path = g_build_path (G_DIR_SEPARATOR_S, g_get_tmp_dir (), "ekiga_debug_plugins", NULL); plugin_parse_directory (kickstart, path); g_free (path); #else plugin_parse_directory (kick...
167,849,742,301,188,280,000,000,000,000,000,000,000
plugin-core.cpp
87,337,891,896,463,660,000,000,000,000,000,000,000
[ "CWE-94" ]
CVE-2011-1830
Ekiga versions before 3.3.0 attempted to load a module from /tmp/ekiga_test.so.
https://nvd.nist.gov/vuln/detail/CVE-2011-1830
294,725
ekiga
02654fc949722a78d41fcffac8687d73d8574647
http://git.gnome.org/browse/ekiga
https://gitlab.gnome.org/GNOME/ekiga/commit/02654fc949722a78d41fcffac8687d73d8574647
Fixed plugin load I have no idea when I broke this...
0
plugin_init (Ekiga::KickStart& kickstart) { #if DEBUG // should make it easier to test ekiga without installing gchar* path = g_build_path (G_DIR_SEPARATOR_S, g_get_tmp_dir (), "ekiga_debug_plugins", NULL); plugin_parse_directory (kickstart, path); g_free (path); #else plugin_parse_directory (kicksta...
81,442,528,602,613,970,000,000,000,000,000,000,000
plugin-core.cpp
126,235,430,132,269,000,000,000,000,000,000,000,000
[ "CWE-94" ]
CVE-2011-1830
Ekiga versions before 3.3.0 attempted to load a module from /tmp/ekiga_test.so.
https://nvd.nist.gov/vuln/detail/CVE-2011-1830
199,902
linux
45c1380358b12bf2d1db20a5874e9544f56b34ab
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/45c1380358b12bf2d1db20a5874e9544f56b34ab
ASoC: SOF: ipc: Fix memory leak in sof_set_get_large_ctrl_data In the implementation of sof_set_get_large_ctrl_data() there is a memory leak in case an error. Release partdata if sof_get_ctrl_copy_params() fails. Fixes: 54d198d5019d ("ASoC: SOF: Propagate sof_get_ctrl_copy_params() error properly") Signed-off-by: Nav...
1
static int sof_set_get_large_ctrl_data(struct snd_sof_dev *sdev, struct sof_ipc_ctrl_data *cdata, struct sof_ipc_ctrl_data_params *sparams, bool send) { struct sof_ipc_ctrl_data *partdata; size_t send_bytes; size_t offset = 0; size_t msg_bytes; size_t pl_size; int err; int i; /...
221,687,980,612,193,100,000,000,000,000,000,000,000
ipc.c
104,438,201,781,529,450,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2019-18811
A memory leak in the sof_set_get_large_ctrl_data() function in sound/soc/sof/ipc.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering sof_get_ctrl_copy_params() failures, aka CID-45c1380358b1.
https://nvd.nist.gov/vuln/detail/CVE-2019-18811
295,202
linux
45c1380358b12bf2d1db20a5874e9544f56b34ab
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/45c1380358b12bf2d1db20a5874e9544f56b34ab
ASoC: SOF: ipc: Fix memory leak in sof_set_get_large_ctrl_data In the implementation of sof_set_get_large_ctrl_data() there is a memory leak in case an error. Release partdata if sof_get_ctrl_copy_params() fails. Fixes: 54d198d5019d ("ASoC: SOF: Propagate sof_get_ctrl_copy_params() error properly") Signed-off-by: Nav...
0
static int sof_set_get_large_ctrl_data(struct snd_sof_dev *sdev, struct sof_ipc_ctrl_data *cdata, struct sof_ipc_ctrl_data_params *sparams, bool send) { struct sof_ipc_ctrl_data *partdata; size_t send_bytes; size_t offset = 0; size_t msg_bytes; size_t pl_size; int err; int i; /...
223,281,861,925,640,300,000,000,000,000,000,000,000
ipc.c
145,799,524,276,053,830,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2019-18811
A memory leak in the sof_set_get_large_ctrl_data() function in sound/soc/sof/ipc.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering sof_get_ctrl_copy_params() failures, aka CID-45c1380358b1.
https://nvd.nist.gov/vuln/detail/CVE-2019-18811
199,923
ImageMagick
e50f19fd73c792ebe912df8ab83aa51a243a3da7
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/e50f19fd73c792ebe912df8ab83aa51a243a3da7
https://github.com/ImageMagick/ImageMagick/issues/4729
1
static MagickBooleanType WritePICONImage(const ImageInfo *image_info, Image *image,ExceptionInfo *exception) { #define ColormapExtent 155 #define GraymapExtent 95 #define PiconGeometry "48x48>" static unsigned char Colormap[]= { 0x47, 0x49, 0x46, 0x38, 0x37, 0x61, 0x06, 0x00, 0x05, 0x00, 0xf4, 0x0...
69,464,302,106,632,760,000,000,000,000,000,000,000
xpm.c
150,955,926,509,418,970,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2022-0284
A heap-based-buffer-over-read flaw was found in ImageMagick's GetPixelAlpha() function of 'pixel-accessor.h'. This vulnerability is triggered when an attacker passes a specially crafted Tagged Image File Format (TIFF) image to convert it into a PICON file format. This issue can potentially lead to a denial of service a...
https://nvd.nist.gov/vuln/detail/CVE-2022-0284
295,504
ImageMagick
e50f19fd73c792ebe912df8ab83aa51a243a3da7
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/e50f19fd73c792ebe912df8ab83aa51a243a3da7
https://github.com/ImageMagick/ImageMagick/issues/4729
0
static MagickBooleanType WritePICONImage(const ImageInfo *image_info, Image *image,ExceptionInfo *exception) { #define ColormapExtent 155 #define GraymapExtent 95 #define PiconGeometry "48x48>" static unsigned char Colormap[]= { 0x47, 0x49, 0x46, 0x38, 0x37, 0x61, 0x06, 0x00, 0x05, 0x00, 0xf4, 0x0...
54,207,706,989,993,220,000,000,000,000,000,000,000
xpm.c
134,681,841,142,269,400,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2022-0284
A heap-based-buffer-over-read flaw was found in ImageMagick's GetPixelAlpha() function of 'pixel-accessor.h'. This vulnerability is triggered when an attacker passes a specially crafted Tagged Image File Format (TIFF) image to convert it into a PICON file format. This issue can potentially lead to a denial of service a...
https://nvd.nist.gov/vuln/detail/CVE-2022-0284
199,927
ntp
c4cd4aaf418f57f7225708a93bf48afb2bc9c1da
https://github.com/ntp-project/ntp
https://github.com/ntp-project/ntp/commit/c4cd4aaf418f57f7225708a93bf48afb2bc9c1da
CVE-2014-9297
1
crypto_recv( struct peer *peer, /* peer structure pointer */ struct recvbuf *rbufp /* packet buffer pointer */ ) { const EVP_MD *dp; /* message digest algorithm */ u_int32 *pkt; /* receive packet pointer */ struct autokey *ap, *bp; /* autokey pointer */ struct exten *ep, *fp; /* extension pointers */ struct ce...
19,060,187,373,402,055,000,000,000,000,000,000,000
ntp_crypto.c
103,988,491,639,428,570,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2015-7691
The crypto_xmit function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (crash) via crafted packets containing particular autokey operations. NOTE: This vulnerability exists due to an incomplete fix for CVE-2014-9750.
https://nvd.nist.gov/vuln/detail/CVE-2015-7691
295,549
ntp
c4cd4aaf418f57f7225708a93bf48afb2bc9c1da
https://github.com/ntp-project/ntp
https://github.com/ntp-project/ntp/commit/c4cd4aaf418f57f7225708a93bf48afb2bc9c1da
CVE-2014-9297
0
crypto_recv( struct peer *peer, /* peer structure pointer */ struct recvbuf *rbufp /* packet buffer pointer */ ) { const EVP_MD *dp; /* message digest algorithm */ u_int32 *pkt; /* receive packet pointer */ struct autokey *ap, *bp; /* autokey pointer */ struct exten *ep, *fp; /* extension pointers */ struct ce...
42,941,031,218,189,840,000,000,000,000,000,000,000
ntp_crypto.c
289,079,379,946,819,740,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2015-7691
The crypto_xmit function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (crash) via crafted packets containing particular autokey operations. NOTE: This vulnerability exists due to an incomplete fix for CVE-2014-9750.
https://nvd.nist.gov/vuln/detail/CVE-2015-7691
199,929
ntp
c4cd4aaf418f57f7225708a93bf48afb2bc9c1da
https://github.com/ntp-project/ntp
https://github.com/ntp-project/ntp/commit/c4cd4aaf418f57f7225708a93bf48afb2bc9c1da
CVE-2014-9297
1
crypto_xmit( struct peer *peer, /* peer structure pointer */ struct pkt *xpkt, /* transmit packet pointer */ struct recvbuf *rbufp, /* receive buffer pointer */ int start, /* offset to extension field */ struct exten *ep, /* extension pointer */ keyid_t cookie /* session cookie */ ) { struct exten *fp; /* ext...
207,933,166,457,933,600,000,000,000,000,000,000,000
ntp_crypto.c
103,988,491,639,428,570,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2015-7691
The crypto_xmit function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (crash) via crafted packets containing particular autokey operations. NOTE: This vulnerability exists due to an incomplete fix for CVE-2014-9750.
https://nvd.nist.gov/vuln/detail/CVE-2015-7691
295,563
ntp
c4cd4aaf418f57f7225708a93bf48afb2bc9c1da
https://github.com/ntp-project/ntp
https://github.com/ntp-project/ntp/commit/c4cd4aaf418f57f7225708a93bf48afb2bc9c1da
CVE-2014-9297
0
crypto_xmit( struct peer *peer, /* peer structure pointer */ struct pkt *xpkt, /* transmit packet pointer */ struct recvbuf *rbufp, /* receive buffer pointer */ int start, /* offset to extension field */ struct exten *ep, /* extension pointer */ keyid_t cookie /* session cookie */ ) { struct exten *fp; /* ext...
243,480,195,176,837,780,000,000,000,000,000,000,000
ntp_crypto.c
289,079,379,946,819,740,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2015-7691
The crypto_xmit function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (crash) via crafted packets containing particular autokey operations. NOTE: This vulnerability exists due to an incomplete fix for CVE-2014-9750.
https://nvd.nist.gov/vuln/detail/CVE-2015-7691
199,934
poppler
8051f678b3b43326e5fdfd7c03f39de21059f426
https://github.com/freedesktop/poppler
https://gitlab.freedesktop.org/aacid/poppler/commit/8051f678b3b43326e5fdfd7c03f39de21059f426
FontInfoScanner::scanFonts Fix infinite loop in broken files Fixes #752
1
void FontInfoScanner::scanFonts(XRef *xrefA, Dict *resDict, std::vector<FontInfo*> *fontsList) { GfxFontDict *gfxFontDict; GfxFont *font; // scan the fonts in this resource dictionary gfxFontDict = nullptr; const Object &fontObj = resDict->lookupNF("Font"); if (fontObj.isRef()) { Object obj2 = fontObj....
171,294,480,150,665,300,000,000,000,000,000,000,000
FontInfo.cc
3,119,972,755,341,979,500,000,000,000,000,000,000
[ "CWE-674" ]
CVE-2019-11026
FontInfoScanner::scanFonts in FontInfo.cc in Poppler 0.75.0 has infinite recursion, leading to a call to the error function in Error.cc.
https://nvd.nist.gov/vuln/detail/CVE-2019-11026
295,573
poppler
8051f678b3b43326e5fdfd7c03f39de21059f426
https://github.com/freedesktop/poppler
https://gitlab.freedesktop.org/aacid/poppler/commit/8051f678b3b43326e5fdfd7c03f39de21059f426
FontInfoScanner::scanFonts Fix infinite loop in broken files Fixes #752
0
void FontInfoScanner::scanFonts(XRef *xrefA, Dict *resDict, std::vector<FontInfo*> *fontsList) { GfxFontDict *gfxFontDict; GfxFont *font; // scan the fonts in this resource dictionary gfxFontDict = nullptr; const Object &fontObj = resDict->lookupNF("Font"); if (fontObj.isRef()) { Object obj2 = fontObj....
257,236,090,595,430,300,000,000,000,000,000,000,000
FontInfo.cc
263,963,231,206,152,400,000,000,000,000,000,000,000
[ "CWE-674" ]
CVE-2019-11026
FontInfoScanner::scanFonts in FontInfo.cc in Poppler 0.75.0 has infinite recursion, leading to a call to the error function in Error.cc.
https://nvd.nist.gov/vuln/detail/CVE-2019-11026
199,935
linux
68501df92d116b760777a2cfda314789f926476f
https://github.com/torvalds/linux
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=68501df92d116b760777a2cfda314789f926476f
net: dsa: sja1105: Prevent leaking memory In sja1105_static_config_upload, in two cases memory is leaked: when static_config_buf_prepare_for_upload fails and when sja1105_inhibit_tx fails. In both cases config_buf should be released. Fixes: 8aa9ebccae87 ("net: dsa: Introduce driver for NXP SJA1105 5-port L2 switch") ...
1
int sja1105_static_config_upload(struct sja1105_private *priv) { unsigned long port_bitmap = GENMASK_ULL(SJA1105_NUM_PORTS - 1, 0); struct sja1105_static_config *config = &priv->static_config; const struct sja1105_regs *regs = priv->info->regs; struct device *dev = &priv->spidev->dev; struct sja1105_status status;...
217,216,275,273,635,970,000,000,000,000,000,000,000
sja1105_spi.c
328,718,901,756,624,620,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2019-18807
Two memory leaks in the sja1105_static_config_upload() function in drivers/net/dsa/sja1105/sja1105_spi.c in the Linux kernel before 5.3.5 allow attackers to cause a denial of service (memory consumption) by triggering static_config_buf_prepare_for_upload() or sja1105_inhibit_tx() failures, aka CID-68501df92d11.
https://nvd.nist.gov/vuln/detail/CVE-2019-18807
295,589
linux
68501df92d116b760777a2cfda314789f926476f
https://github.com/torvalds/linux
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=68501df92d116b760777a2cfda314789f926476f
net: dsa: sja1105: Prevent leaking memory In sja1105_static_config_upload, in two cases memory is leaked: when static_config_buf_prepare_for_upload fails and when sja1105_inhibit_tx fails. In both cases config_buf should be released. Fixes: 8aa9ebccae87 ("net: dsa: Introduce driver for NXP SJA1105 5-port L2 switch") ...
0
int sja1105_static_config_upload(struct sja1105_private *priv) { unsigned long port_bitmap = GENMASK_ULL(SJA1105_NUM_PORTS - 1, 0); struct sja1105_static_config *config = &priv->static_config; const struct sja1105_regs *regs = priv->info->regs; struct device *dev = &priv->spidev->dev; struct sja1105_status status;...
231,898,680,734,775,570,000,000,000,000,000,000,000
sja1105_spi.c
1,013,277,188,463,385,100,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2019-18807
Two memory leaks in the sja1105_static_config_upload() function in drivers/net/dsa/sja1105/sja1105_spi.c in the Linux kernel before 5.3.5 allow attackers to cause a denial of service (memory consumption) by triggering static_config_buf_prepare_for_upload() or sja1105_inhibit_tx() failures, aka CID-68501df92d11.
https://nvd.nist.gov/vuln/detail/CVE-2019-18807
199,947
exiv2
8cd95e221889e41e9cc153e2cfb5a7b41c7bc7a4
https://github.com/Exiv2/exiv2
https://github.com/Exiv2/exiv2/commit/8cd95e221889e41e9cc153e2cfb5a7b41c7bc7a4
Avoid negative integer overflow when `chunkLength == 0`. This fixes #789.
1
void PngImage::readMetadata() { #ifdef DEBUG std::cerr << "Exiv2::PngImage::readMetadata: Reading PNG file " << io_->path() << std::endl; #endif if (io_->open() != 0) { throw Error(kerDataSourceOpenFailed, io_->path(), strError()); } IoCloser closer(*io_); ...
263,518,100,976,085,800,000,000,000,000,000,000,000
pngimage.cpp
106,013,720,895,003,030,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2019-13108
An integer overflow in Exiv2 through 0.27.1 allows an attacker to cause a denial of service (SIGSEGV) via a crafted PNG image file, because PngImage::readMetadata mishandles a zero value for iccOffset.
https://nvd.nist.gov/vuln/detail/CVE-2019-13108
295,834
exiv2
8cd95e221889e41e9cc153e2cfb5a7b41c7bc7a4
https://github.com/Exiv2/exiv2
https://github.com/Exiv2/exiv2/commit/8cd95e221889e41e9cc153e2cfb5a7b41c7bc7a4
Avoid negative integer overflow when `chunkLength == 0`. This fixes #789.
0
void PngImage::readMetadata() { #ifdef DEBUG std::cerr << "Exiv2::PngImage::readMetadata: Reading PNG file " << io_->path() << std::endl; #endif if (io_->open() != 0) { throw Error(kerDataSourceOpenFailed, io_->path(), strError()); } IoCloser closer(*io_); ...
274,068,357,431,769,030,000,000,000,000,000,000,000
pngimage.cpp
318,332,878,102,868,050,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2019-13108
An integer overflow in Exiv2 through 0.27.1 allows an attacker to cause a denial of service (SIGSEGV) via a crafted PNG image file, because PngImage::readMetadata mishandles a zero value for iccOffset.
https://nvd.nist.gov/vuln/detail/CVE-2019-13108
199,956
LibRaw
d75af00681a74dcc8b929207eb895611a6eceb68
https://github.com/LibRaw/LibRaw
https://github.com/LibRaw/LibRaw/commit/d75af00681a74dcc8b929207eb895611a6eceb68
X3F: check for data offset limit
1
static void huffman_decode_row(x3f_info_t *I, x3f_directory_entry_t *DE, int bits, int row, int offset, int *minimum) { x3f_directory_entry_header_t *DEH = &DE->header; x3f_image_data_t *ID = &DEH->data_subsection.image_data; x3f_huffman_t *HUF = ID->huffman; int16_t c[3] = {(int...
248,462,862,487,553,540,000,000,000,000,000,000,000
x3f_utils_patched.cpp
215,312,530,865,932,760,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2020-35531
In LibRaw, an out-of-bounds read vulnerability exists within the get_huffman_diff() function (libraw\src\x3f\x3f_utils_patched.cpp) when reading data from an image file.
https://nvd.nist.gov/vuln/detail/CVE-2020-35531
295,936
LibRaw
d75af00681a74dcc8b929207eb895611a6eceb68
https://github.com/LibRaw/LibRaw
https://github.com/LibRaw/LibRaw/commit/d75af00681a74dcc8b929207eb895611a6eceb68
X3F: check for data offset limit
0
static void huffman_decode_row(x3f_info_t *I, x3f_directory_entry_t *DE, int bits, int row, int offset, int *minimum) { x3f_directory_entry_header_t *DEH = &DE->header; x3f_image_data_t *ID = &DEH->data_subsection.image_data; x3f_huffman_t *HUF = ID->huffman; int16_t c[3] = {(int...
37,370,230,998,369,736,000,000,000,000,000,000,000
x3f_utils_patched.cpp
63,954,127,465,419,970,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2020-35531
In LibRaw, an out-of-bounds read vulnerability exists within the get_huffman_diff() function (libraw\src\x3f\x3f_utils_patched.cpp) when reading data from an image file.
https://nvd.nist.gov/vuln/detail/CVE-2020-35531
199,985
minetest
3693b6871eba268ecc79b3f52d00d3cefe761131
https://github.com/minetest/minetest
https://github.com/minetest/minetest/commit/3693b6871eba268ecc79b3f52d00d3cefe761131
Prevent players accessing inventories of other players (#10341)
1
void Server::handleCommand_InventoryAction(NetworkPacket* pkt) { session_t peer_id = pkt->getPeerId(); RemotePlayer *player = m_env->getPlayer(peer_id); if (player == NULL) { errorstream << "Server::ProcessData(): Canceling: No player for peer_id=" << peer_id << " disconnecting peer!" << std::endl; Discon...
139,072,847,088,127,670,000,000,000,000,000,000,000
None
null
[ "CWE-276" ]
CVE-2022-24301
In Minetest before 5.4.0, players can add or subtract items from a different player's inventory.
https://nvd.nist.gov/vuln/detail/CVE-2022-24301
296,243
minetest
3693b6871eba268ecc79b3f52d00d3cefe761131
https://github.com/minetest/minetest
https://github.com/minetest/minetest/commit/3693b6871eba268ecc79b3f52d00d3cefe761131
Prevent players accessing inventories of other players (#10341)
0
void Server::handleCommand_InventoryAction(NetworkPacket* pkt) { session_t peer_id = pkt->getPeerId(); RemotePlayer *player = m_env->getPlayer(peer_id); if (player == NULL) { errorstream << "Server::ProcessData(): Canceling: No player for peer_id=" << peer_id << " disconnecting peer!" << std::endl; Discon...
217,177,551,758,341,330,000,000,000,000,000,000,000
None
null
[ "CWE-276" ]
CVE-2022-24301
In Minetest before 5.4.0, players can add or subtract items from a different player's inventory.
https://nvd.nist.gov/vuln/detail/CVE-2022-24301
199,986
unbound
6c3a0b54ed8ace93d5b5ca7b8078dc87e75cd640
https://github.com/NLnetLabs/unbound
https://github.com/NLnetLabs/unbound/commit/6c3a0b54ed8ace93d5b5ca7b8078dc87e75cd640
- Fix Out of Bound Write Compressed Names in rdata_copy(), reported by X41 D-Sec.
1
rdata_copy(sldns_buffer* pkt, struct packed_rrset_data* data, uint8_t* to, struct rr_parse* rr, time_t* rr_ttl, uint16_t type, sldns_pkt_section section) { uint16_t pkt_len; const sldns_rr_descriptor* desc; *rr_ttl = sldns_read_uint32(rr->ttl_data); /* RFC 2181 Section 8. if msb of ttl is set treat as if zero. ...
225,733,226,937,555,900,000,000,000,000,000,000,000
msgreply.c
214,849,256,393,496,050,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2019-25042
Unbound before 1.9.5 allows an out-of-bounds write via a compressed name in rdata_copy. NOTE: The vendor disputes that this is a vulnerability. Although the code may be vulnerable, a running Unbound installation cannot be remotely or locally exploited
https://nvd.nist.gov/vuln/detail/CVE-2019-25042
296,265
unbound
6c3a0b54ed8ace93d5b5ca7b8078dc87e75cd640
https://github.com/NLnetLabs/unbound
https://github.com/NLnetLabs/unbound/commit/6c3a0b54ed8ace93d5b5ca7b8078dc87e75cd640
- Fix Out of Bound Write Compressed Names in rdata_copy(), reported by X41 D-Sec.
0
rdata_copy(sldns_buffer* pkt, struct packed_rrset_data* data, uint8_t* to, struct rr_parse* rr, time_t* rr_ttl, uint16_t type, sldns_pkt_section section) { uint16_t pkt_len; const sldns_rr_descriptor* desc; *rr_ttl = sldns_read_uint32(rr->ttl_data); /* RFC 2181 Section 8. if msb of ttl is set treat as if zero. ...
293,586,775,738,611,430,000,000,000,000,000,000,000
msgreply.c
11,463,230,551,593,550,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2019-25042
Unbound before 1.9.5 allows an out-of-bounds write via a compressed name in rdata_copy. NOTE: The vendor disputes that this is a vulnerability. Although the code may be vulnerable, a running Unbound installation cannot be remotely or locally exploited
https://nvd.nist.gov/vuln/detail/CVE-2019-25042
199,988
ImageMagick
c9c4ef4e7ca83d8a00effd16723f37946e89fbad
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/c9c4ef4e7ca83d8a00effd16723f37946e89fbad
Fixed leaking of the image when writing an MSL image (#1360).
1
static MagickBooleanType WriteMSLImage(const ImageInfo *image_info,Image *image, ExceptionInfo *exception) { Image *msl_image; assert(image_info != (const ImageInfo *) NULL); assert(image_info->signature == MagickCoreSignature); assert(image != (Image *) NULL); assert(image->signature == MagickCoreSign...
325,662,881,280,661,380,000,000,000,000,000,000,000
msl.c
290,689,266,041,239,500,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2018-18544
There is a memory leak in the function WriteMSLImage of coders/msl.c in ImageMagick 7.0.8-13 Q16, and the function ProcessMSLScript of coders/msl.c in GraphicsMagick before 1.3.31.
https://nvd.nist.gov/vuln/detail/CVE-2018-18544
296,362
ImageMagick
c9c4ef4e7ca83d8a00effd16723f37946e89fbad
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/c9c4ef4e7ca83d8a00effd16723f37946e89fbad
Fixed leaking of the image when writing an MSL image (#1360).
0
static MagickBooleanType WriteMSLImage(const ImageInfo *image_info,Image *image, ExceptionInfo *exception) { Image *msl_image; MagickBooleanType status; assert(image_info != (const ImageInfo *) NULL); assert(image_info->signature == MagickCoreSignature); assert(image != (Image *) NULL); assert(i...
132,036,712,771,961,850,000,000,000,000,000,000,000
msl.c
131,139,647,517,191,110,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2018-18544
There is a memory leak in the function WriteMSLImage of coders/msl.c in ImageMagick 7.0.8-13 Q16, and the function ProcessMSLScript of coders/msl.c in GraphicsMagick before 1.3.31.
https://nvd.nist.gov/vuln/detail/CVE-2018-18544
199,990
mutt
3e88866dc60b5fa6aaba6fd7c1710c12c1c3cd01
https://github.com/muttmua/mutt
https://github.com/muttmua/mutt/commit/3e88866dc60b5fa6aaba6fd7c1710c12c1c3cd01
Prevent possible IMAP MITM via PREAUTH response. This is similar to CVE-2014-2567 and CVE-2020-12398. STARTTLS is not allowed in the Authenticated state, so previously Mutt would implicitly mark the connection as authenticated and skip any encryption checking/enabling. No credentials are exposed, but it does allow m...
1
int imap_open_connection (IMAP_DATA* idata) { if (mutt_socket_open (idata->conn) < 0) return -1; idata->state = IMAP_CONNECTED; if (imap_cmd_step (idata) != IMAP_CMD_OK) { imap_close_connection (idata); return -1; } if (ascii_strncasecmp ("* OK", idata->buf, 4) == 0) { if (ascii_strncas...
239,011,229,950,315,840,000,000,000,000,000,000,000
imap.c
168,104,471,985,458,160,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2020-14093
Mutt before 1.14.3 allows an IMAP fcc/postpone man-in-the-middle attack via a PREAUTH response.
https://nvd.nist.gov/vuln/detail/CVE-2020-14093
296,385
mutt
3e88866dc60b5fa6aaba6fd7c1710c12c1c3cd01
https://github.com/muttmua/mutt
https://github.com/muttmua/mutt/commit/3e88866dc60b5fa6aaba6fd7c1710c12c1c3cd01
Prevent possible IMAP MITM via PREAUTH response. This is similar to CVE-2014-2567 and CVE-2020-12398. STARTTLS is not allowed in the Authenticated state, so previously Mutt would implicitly mark the connection as authenticated and skip any encryption checking/enabling. No credentials are exposed, but it does allow m...
0
int imap_open_connection (IMAP_DATA* idata) { if (mutt_socket_open (idata->conn) < 0) return -1; idata->state = IMAP_CONNECTED; if (imap_cmd_step (idata) != IMAP_CMD_OK) { imap_close_connection (idata); return -1; } if (ascii_strncasecmp ("* OK", idata->buf, 4) == 0) { if (ascii_strncas...
245,331,533,187,289,460,000,000,000,000,000,000,000
imap.c
129,429,986,447,982,740,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2020-14093
Mutt before 1.14.3 allows an IMAP fcc/postpone man-in-the-middle attack via a PREAUTH response.
https://nvd.nist.gov/vuln/detail/CVE-2020-14093
199,991
php-src
ddb207e7fa2e9adeba021a1303c3781efda5409b
https://github.com/php/php-src
http://git.php.net/?p=php-src.git;a=commit;h=ddb207e7fa2e9adeba021a1303c3781efda5409b
Fix bug #68113 (Heap corruption in exif_thumbnail())
1
static void* exif_ifd_make_value(image_info_data *info_data, int motorola_intel TSRMLS_DC) { size_t byte_count; char *value_ptr, *data_ptr; size_t i; image_info_value *info_value; byte_count = php_tiff_bytes_per_format[info_data->format] * info_data->length; value_ptr = safe_emalloc(max(byte_count, 4), 1,...
110,763,494,609,717,960,000,000,000,000,000,000,000
exif.c
186,615,590,368,290,900,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2014-3670
The exif_ifd_make_value function in exif.c in the EXIF extension in PHP before 5.4.34, 5.5.x before 5.5.18, and 5.6.x before 5.6.2 operates on floating-point arrays incorrectly, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) or possibly execute arbitrary code v...
https://nvd.nist.gov/vuln/detail/CVE-2014-3670
296,434
php-src
ddb207e7fa2e9adeba021a1303c3781efda5409b
https://github.com/php/php-src
http://git.php.net/?p=php-src.git;a=commit;h=ddb207e7fa2e9adeba021a1303c3781efda5409b
Fix bug #68113 (Heap corruption in exif_thumbnail())
0
static void* exif_ifd_make_value(image_info_data *info_data, int motorola_intel TSRMLS_DC) { size_t byte_count; char *value_ptr, *data_ptr; size_t i; image_info_value *info_value; byte_count = php_tiff_bytes_per_format[info_data->format] * info_data->length; value_ptr = safe_emalloc(max(byte_count, 4), 1,...
195,088,067,641,894,870,000,000,000,000,000,000,000
exif.c
234,617,860,043,523,420,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2014-3670
The exif_ifd_make_value function in exif.c in the EXIF extension in PHP before 5.4.34, 5.5.x before 5.5.18, and 5.6.x before 5.6.2 operates on floating-point arrays incorrectly, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) or possibly execute arbitrary code v...
https://nvd.nist.gov/vuln/detail/CVE-2014-3670
199,992
linux
a4270d6795b0580287453ea55974d948393e66ef
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a4270d6795b0580287453ea55974d948393e66ef
net-gro: fix use-after-free read in napi_gro_frags() If a network driver provides to napi_gro_frags() an skb with a page fragment of exactly 14 bytes, the call to gro_pull_from_frag0() will 'consume' the fragment by calling skb_frag_unref(skb, 0), and the page might be freed and reused. Reading eth->h_proto at the en...
1
*/ static struct sk_buff *napi_frags_skb(struct napi_struct *napi) { struct sk_buff *skb = napi->skb; const struct ethhdr *eth; unsigned int hlen = sizeof(*eth); napi->skb = NULL; skb_reset_mac_header(skb); skb_gro_reset_offset(skb); eth = skb_gro_header_fast(skb, 0); if (unlikely(skb_gro_header_hard(skb, h...
86,396,011,475,118,980,000,000,000,000,000,000,000
dev.c
329,867,380,942,096,960,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2020-10720
A flaw was found in the Linux kernel's implementation of GRO in versions before 5.2. This flaw allows an attacker with local access to crash the system.
https://nvd.nist.gov/vuln/detail/CVE-2020-10720
296,594
linux
a4270d6795b0580287453ea55974d948393e66ef
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a4270d6795b0580287453ea55974d948393e66ef
net-gro: fix use-after-free read in napi_gro_frags() If a network driver provides to napi_gro_frags() an skb with a page fragment of exactly 14 bytes, the call to gro_pull_from_frag0() will 'consume' the fragment by calling skb_frag_unref(skb, 0), and the page might be freed and reused. Reading eth->h_proto at the en...
0
*/ static struct sk_buff *napi_frags_skb(struct napi_struct *napi) { struct sk_buff *skb = napi->skb; const struct ethhdr *eth; unsigned int hlen = sizeof(*eth); napi->skb = NULL; skb_reset_mac_header(skb); skb_gro_reset_offset(skb); if (unlikely(skb_gro_header_hard(skb, hlen))) { eth = skb_gro_header_slow...
148,249,095,754,275,350,000,000,000,000,000,000,000
dev.c
87,252,252,672,007,420,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2020-10720
A flaw was found in the Linux kernel's implementation of GRO in versions before 5.2. This flaw allows an attacker with local access to crash the system.
https://nvd.nist.gov/vuln/detail/CVE-2020-10720
200,017
FreeRDP
48361c411e50826cb602c7aab773a8a20e1da6bc
https://github.com/FreeRDP/FreeRDP
https://github.com/FreeRDP/FreeRDP/commit/48361c411e50826cb602c7aab773a8a20e1da6bc
Fixed GHSL-2020-100: oob read in ntlm_read_ChallengeMessage * Added length checks for data read from stream * Unified function resource cleanup (cherry picked from commit 8357dedbbf7213b7d0d18f1026145b9a5b92235a)
1
SECURITY_STATUS ntlm_read_ChallengeMessage(NTLM_CONTEXT* context, PSecBuffer buffer) { wStream* s; int length; PBYTE StartOffset; PBYTE PayloadOffset; NTLM_AV_PAIR* AvTimestamp; NTLM_CHALLENGE_MESSAGE* message; ntlm_generate_client_challenge(context); message = &context->CHALLENGE_MESSAGE; ZeroMemory(message, ...
284,903,934,741,011,240,000,000,000,000,000,000,000
ntlm_message.c
86,873,513,390,297,900,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2020-13396
An issue was discovered in FreeRDP before 2.1.1. An out-of-bounds (OOB) read vulnerability has been detected in ntlm_read_ChallengeMessage in winpr/libwinpr/sspi/NTLM/ntlm_message.c.
https://nvd.nist.gov/vuln/detail/CVE-2020-13396
296,973
FreeRDP
48361c411e50826cb602c7aab773a8a20e1da6bc
https://github.com/FreeRDP/FreeRDP
https://github.com/FreeRDP/FreeRDP/commit/48361c411e50826cb602c7aab773a8a20e1da6bc
Fixed GHSL-2020-100: oob read in ntlm_read_ChallengeMessage * Added length checks for data read from stream * Unified function resource cleanup (cherry picked from commit 8357dedbbf7213b7d0d18f1026145b9a5b92235a)
0
SECURITY_STATUS ntlm_read_ChallengeMessage(NTLM_CONTEXT* context, PSecBuffer buffer) { SECURITY_STATUS status = SEC_E_INVALID_TOKEN; wStream* s; size_t length; size_t StartOffset; size_t PayloadOffset; NTLM_AV_PAIR* AvTimestamp; NTLM_CHALLENGE_MESSAGE* message; if (!context || !buffer) return SEC_E_INTERNAL_E...
52,082,019,609,251,720,000,000,000,000,000,000,000
ntlm_message.c
6,852,978,945,512,420,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2020-13396
An issue was discovered in FreeRDP before 2.1.1. An out-of-bounds (OOB) read vulnerability has been detected in ntlm_read_ChallengeMessage in winpr/libwinpr/sspi/NTLM/ntlm_message.c.
https://nvd.nist.gov/vuln/detail/CVE-2020-13396
200,019
systemd
8523bf7dd514a3a2c6114b7b8fb8f308b4f09fc4
https://github.com/systemd/systemd
https://github.com/systemd/systemd/commit/8523bf7dd514a3a2c6114b7b8fb8f308b4f09fc4
pid1: process zero-length notification messages again This undoes 531ac2b234. I acked that patch without looking at the code carefully enough. There are two problems: - we want to process the fds anyway - in principle empty notification messages are valid, and we should process them as usual, including logging using...
1
static void manager_invoke_notify_message(Manager *m, Unit *u, pid_t pid, const char *buf, size_t n, FDSet *fds) { _cleanup_strv_free_ char **tags = NULL; assert(m); assert(u); assert(buf); assert(n > 0); tags = strv_split(buf, "\n\r"); if (!tags) { ...
64,035,163,648,495,220,000,000,000,000,000,000,000
manager.c
12,985,016,660,429,998,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2016-7795
The manager_invoke_notify_message function in systemd 231 and earlier allows local users to cause a denial of service (assertion failure and PID 1 hang) via a zero-length message received over a notify socket.
https://nvd.nist.gov/vuln/detail/CVE-2016-7795
297,048
systemd
8523bf7dd514a3a2c6114b7b8fb8f308b4f09fc4
https://github.com/systemd/systemd
https://github.com/systemd/systemd/commit/8523bf7dd514a3a2c6114b7b8fb8f308b4f09fc4
pid1: process zero-length notification messages again This undoes 531ac2b234. I acked that patch without looking at the code carefully enough. There are two problems: - we want to process the fds anyway - in principle empty notification messages are valid, and we should process them as usual, including logging using...
0
static void manager_invoke_notify_message(Manager *m, Unit *u, pid_t pid, const char *buf, FDSet *fds) { _cleanup_strv_free_ char **tags = NULL; assert(m); assert(u); assert(buf); tags = strv_split(buf, "\n\r"); if (!tags) { log_oom(); re...
178,950,737,878,593,330,000,000,000,000,000,000,000
manager.c
45,947,417,525,311,640,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2016-7795
The manager_invoke_notify_message function in systemd 231 and earlier allows local users to cause a denial of service (assertion failure and PID 1 hang) via a zero-length message received over a notify socket.
https://nvd.nist.gov/vuln/detail/CVE-2016-7795
200,110
freeradius-server
78e5aed56c36a9231bc91ea5f55b3edf88a9d2a4
https://github.com/alandekok/freeradius-server
https://github.com/alandekok/freeradius-server/commit/78e5aed56c36a9231bc91ea5f55b3edf88a9d2a4
Fix CVE-2012-3547. Found by Timo Warns
1
static int cbtls_verify(int ok, X509_STORE_CTX *ctx) { char subject[1024]; /* Used for the subject name */ char issuer[1024]; /* Used for the issuer name */ char common_name[1024]; char cn_str[1024]; char buf[64]; EAP_HANDLER *handler = NULL; X509 *client_cert; X509 *issuer_cert; SSL *ssl; int err, depth, loo...
298,638,951,137,610,500,000,000,000,000,000,000,000
rlm_eap_tls.c
182,605,369,891,692,850,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2012-3547
Stack-based buffer overflow in the cbtls_verify function in FreeRADIUS 2.1.10 through 2.1.12, when using TLS-based EAP methods, allows remote attackers to cause a denial of service (server crash) and possibly execute arbitrary code via a long "not after" timestamp in a client certificate.
https://nvd.nist.gov/vuln/detail/CVE-2012-3547
299,225
freeradius-server
78e5aed56c36a9231bc91ea5f55b3edf88a9d2a4
https://github.com/alandekok/freeradius-server
https://github.com/alandekok/freeradius-server/commit/78e5aed56c36a9231bc91ea5f55b3edf88a9d2a4
Fix CVE-2012-3547. Found by Timo Warns
0
static int cbtls_verify(int ok, X509_STORE_CTX *ctx) { char subject[1024]; /* Used for the subject name */ char issuer[1024]; /* Used for the issuer name */ char common_name[1024]; char cn_str[1024]; char buf[64]; EAP_HANDLER *handler = NULL; X509 *client_cert; X509 *issuer_cert; SSL *ssl; int err, depth, loo...
100,986,151,700,807,820,000,000,000,000,000,000,000
rlm_eap_tls.c
135,251,734,557,730,480,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2012-3547
Stack-based buffer overflow in the cbtls_verify function in FreeRADIUS 2.1.10 through 2.1.12, when using TLS-based EAP methods, allows remote attackers to cause a denial of service (server crash) and possibly execute arbitrary code via a long "not after" timestamp in a client certificate.
https://nvd.nist.gov/vuln/detail/CVE-2012-3547
200,111
rizin
e645e5827327d945307ddfde4f617ae4c36561fd
https://github.com/rizinorg/rizin
https://github.com/rizinorg/rizin/commit/e645e5827327d945307ddfde4f617ae4c36561fd
Fix the crash caused by get_long_object() #2739 from PeiweiHu/Peiwei_0625
1
static pyc_object *get_long_object(RzBuffer *buffer) { pyc_object *ret = NULL; bool error = false; bool neg = false; ut32 tmp = 0; size_t size; size_t i, j = 0, left = 0; ut32 n; char *hexstr; char digist2hex[] = "0123456789abcdef"; st32 ndigits = get_st32(buffer, &error); if (error) { return NULL; } re...
15,412,980,705,336,662,000,000,000,000,000,000,000
marshal.c
111,062,423,485,631,560,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2022-34612
Rizin v0.4.0 and below was discovered to contain an integer overflow via the function get_long_object(). This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted binary.
https://nvd.nist.gov/vuln/detail/CVE-2022-34612
299,267
rizin
e645e5827327d945307ddfde4f617ae4c36561fd
https://github.com/rizinorg/rizin
https://github.com/rizinorg/rizin/commit/e645e5827327d945307ddfde4f617ae4c36561fd
Fix the crash caused by get_long_object() #2739 from PeiweiHu/Peiwei_0625
0
static pyc_object *get_long_object(RzBuffer *buffer) { pyc_object *ret = NULL; bool error = false; bool neg = false; ut32 tmp = 0; size_t size; size_t i, j = 0, left = 0; ut32 n; char *hexstr; char digist2hex[] = "0123456789abcdef"; st32 ndigits = get_st32(buffer, &error); if (error) { return NULL; } re...
33,665,691,511,049,725,000,000,000,000,000,000,000
marshal.c
90,927,857,235,340,200,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2022-34612
Rizin v0.4.0 and below was discovered to contain an integer overflow via the function get_long_object(). This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted binary.
https://nvd.nist.gov/vuln/detail/CVE-2022-34612
200,137
samba
0998f2f1bced019db4000ef4b55887abcb65f6d2
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=0998f2f1bced019db4000ef4b55887abcb65f6d2
CVE-2018-1140 Add NULL check for ldb_dn_get_casefold() in ltdb_index_dn_attr() Signed-off-by: Andrej Gessel <Andrej.Gessel@janztec.com> Reviewed-by: Douglas Bagnall <douglas.bagnall@catalyst.net.nz> Reviewed-by: Andrew Bartlett <abartlet@samba.org> BUG: https://bugzilla.samba.org/show_bug.cgi?id=13374
1
static int ldb_kv_index_dn_attr(struct ldb_module *module, struct ldb_kv_private *ldb_kv, const char *attr, struct ldb_dn *dn, struct dn_list *list, enum key_truncation *truncation) { struct ldb_context *ldb; struct ldb_dn *key; struct ldb_val val; int ret; ldb = ldb_module_get_ctx(module); ...
220,384,429,459,751,030,000,000,000,000,000,000,000
ldb_kv_index.c
320,610,539,628,386,840,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2018-1140
A missing input sanitization flaw was found in the implementation of LDP database used for the LDAP server. An attacker could use this flaw to cause a denial of service against a samba server, used as a Active Directory Domain Controller. All versions of Samba from 4.8.0 onwards are vulnerable
https://nvd.nist.gov/vuln/detail/CVE-2018-1140
299,570
samba
0998f2f1bced019db4000ef4b55887abcb65f6d2
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=0998f2f1bced019db4000ef4b55887abcb65f6d2
CVE-2018-1140 Add NULL check for ldb_dn_get_casefold() in ltdb_index_dn_attr() Signed-off-by: Andrej Gessel <Andrej.Gessel@janztec.com> Reviewed-by: Douglas Bagnall <douglas.bagnall@catalyst.net.nz> Reviewed-by: Andrew Bartlett <abartlet@samba.org> BUG: https://bugzilla.samba.org/show_bug.cgi?id=13374
0
static int ldb_kv_index_dn_attr(struct ldb_module *module, struct ldb_kv_private *ldb_kv, const char *attr, struct ldb_dn *dn, struct dn_list *list, enum key_truncation *truncation) { struct ldb_context *ldb; struct ldb_dn *key; struct ldb_val val; int ret; ldb = ldb_module_get_ctx(module); ...
283,558,677,924,519,300,000,000,000,000,000,000,000
ldb_kv_index.c
48,785,706,462,409,100,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2018-1140
A missing input sanitization flaw was found in the implementation of LDP database used for the LDAP server. An attacker could use this flaw to cause a denial of service against a samba server, used as a Active Directory Domain Controller. All versions of Samba from 4.8.0 onwards are vulnerable
https://nvd.nist.gov/vuln/detail/CVE-2018-1140
200,162
ImageMagick
ece953bbe14e8514afc23e05e4030eea872e29da
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/ece953bbe14e8514afc23e05e4030eea872e29da
https://github.com/ImageMagick/ImageMagick/issues/878
1
static Image *ReadMATImage(const ImageInfo *image_info,ExceptionInfo *exception) { Image *image, *image2=NULL, *rotated_image; register Quantum *q; unsigned int status; MATHeader MATLAB_HDR; size_t size; size_t CellType; QuantumInfo *quantum_info; ImageInfo *clone_info; int i; ssize_t ldblk; u...
308,573,039,927,801,320,000,000,000,000,000,000,000
mat.c
307,733,982,001,228,800,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2017-17881
In ImageMagick 7.0.7-12 Q16, a memory leak vulnerability was found in the function ReadMATImage in coders/mat.c, which allows attackers to cause a denial of service via a crafted MAT image file.
https://nvd.nist.gov/vuln/detail/CVE-2017-17881
299,974
ImageMagick
ece953bbe14e8514afc23e05e4030eea872e29da
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/ece953bbe14e8514afc23e05e4030eea872e29da
https://github.com/ImageMagick/ImageMagick/issues/878
0
static Image *ReadMATImage(const ImageInfo *image_info,ExceptionInfo *exception) { Image *image, *image2=NULL, *rotated_image; register Quantum *q; unsigned int status; MATHeader MATLAB_HDR; size_t size; size_t CellType; QuantumInfo *quantum_info; ImageInfo *clone_info; int i; ssize_t ldblk; u...
269,268,569,034,054,750,000,000,000,000,000,000,000
mat.c
45,932,851,287,531,940,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2017-17881
In ImageMagick 7.0.7-12 Q16, a memory leak vulnerability was found in the function ReadMATImage in coders/mat.c, which allows attackers to cause a denial of service via a crafted MAT image file.
https://nvd.nist.gov/vuln/detail/CVE-2017-17881
200,164
iproute2
9bf2c538a0eb10d66e2365a655bf6c52f5ba3d10
https://git.kernel.org/pub/scm/network/iproute2/iproute2
https://git.kernel.org/pub/scm/network/iproute2/iproute2.git/commit/?id=9bf2c538a0eb10d66e2365a655bf6c52f5ba3d10
ipnetns: use-after-free problem in get_netnsid_from_name func Follow the following steps: # ip netns add net1 # export MALLOC_MMAP_THRESHOLD_=0 # ip netns list then Segmentation fault (core dumped) will occur. In get_netnsid_from_name func, answer is freed before rta_getattr_u32(tb[NETNSA_NSID]), where tb[] refers...
1
int get_netnsid_from_name(const char *name) { struct { struct nlmsghdr n; struct rtgenmsg g; char buf[1024]; } req = { .n.nlmsg_len = NLMSG_LENGTH(sizeof(struct rtgenmsg)), .n.nlmsg_flags = NLM_F_REQUEST, .n.nlmsg_type = RTM_GETNSID, .g.rtgen_family = AF_UNSPEC, }; struct nlmsghdr *answer; ...
259,273,742,590,236,300,000,000,000,000,000,000,000
ipnetns.c
303,745,654,516,366,900,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2019-20795
iproute2 before 5.1.0 has a use-after-free in get_netnsid_from_name in ip/ipnetns.c. NOTE: security relevance may be limited to certain uses of setuid that, although not a default, are sometimes a configuration option offered to end users. Even when setuid is used, other factors (such as C library configuration) may bl...
https://nvd.nist.gov/vuln/detail/CVE-2019-20795
299,998
iproute2
9bf2c538a0eb10d66e2365a655bf6c52f5ba3d10
https://git.kernel.org/pub/scm/network/iproute2/iproute2
https://git.kernel.org/pub/scm/network/iproute2/iproute2.git/commit/?id=9bf2c538a0eb10d66e2365a655bf6c52f5ba3d10
ipnetns: use-after-free problem in get_netnsid_from_name func Follow the following steps: # ip netns add net1 # export MALLOC_MMAP_THRESHOLD_=0 # ip netns list then Segmentation fault (core dumped) will occur. In get_netnsid_from_name func, answer is freed before rta_getattr_u32(tb[NETNSA_NSID]), where tb[] refers...
0
int get_netnsid_from_name(const char *name) { struct { struct nlmsghdr n; struct rtgenmsg g; char buf[1024]; } req = { .n.nlmsg_len = NLMSG_LENGTH(sizeof(struct rtgenmsg)), .n.nlmsg_flags = NLM_F_REQUEST, .n.nlmsg_type = RTM_GETNSID, .g.rtgen_family = AF_UNSPEC, }; struct nlmsghdr *answer; ...
115,794,200,926,041,220,000,000,000,000,000,000,000
ipnetns.c
322,488,372,658,257,760,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2019-20795
iproute2 before 5.1.0 has a use-after-free in get_netnsid_from_name in ip/ipnetns.c. NOTE: security relevance may be limited to certain uses of setuid that, although not a default, are sometimes a configuration option offered to end users. Even when setuid is used, other factors (such as C library configuration) may bl...
https://nvd.nist.gov/vuln/detail/CVE-2019-20795
200,257
linux
84c4e1f89fefe70554da0ab33be72c9be7994379
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=84c4e1f89fefe70554da0ab33be72c9be7994379
aio: simplify - and fix - fget/fput for io_submit() Al Viro root-caused a race where the IOCB_CMD_POLL handling of fget/fput() could cause us to access the file pointer after it had already been freed: "In more details - normally IOCB_CMD_POLL handling looks so: 1) io_submit(2) allocates aio_kiocb instance and p...
1
static ssize_t aio_poll(struct aio_kiocb *aiocb, const struct iocb *iocb) { struct kioctx *ctx = aiocb->ki_ctx; struct poll_iocb *req = &aiocb->poll; struct aio_poll_table apt; __poll_t mask; /* reject any unknown events outside the normal event mask. */ if ((u16)iocb->aio_buf != iocb->aio_buf) return -EINVAL;...
52,789,249,231,058,420,000,000,000,000,000,000,000
aio.c
67,431,265,602,198,260,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2019-10125
An issue was discovered in aio_poll() in fs/aio.c in the Linux kernel through 5.0.4. A file may be released by aio_poll_wake() if an expected event is triggered immediately (e.g., by the close of a pair of pipes) after the return of vfs_poll(), and this will cause a use-after-free.
https://nvd.nist.gov/vuln/detail/CVE-2019-10125
300,696
linux
84c4e1f89fefe70554da0ab33be72c9be7994379
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=84c4e1f89fefe70554da0ab33be72c9be7994379
aio: simplify - and fix - fget/fput for io_submit() Al Viro root-caused a race where the IOCB_CMD_POLL handling of fget/fput() could cause us to access the file pointer after it had already been freed: "In more details - normally IOCB_CMD_POLL handling looks so: 1) io_submit(2) allocates aio_kiocb instance and p...
0
static ssize_t aio_poll(struct aio_kiocb *aiocb, const struct iocb *iocb) { struct kioctx *ctx = aiocb->ki_ctx; struct poll_iocb *req = &aiocb->poll; struct aio_poll_table apt; __poll_t mask; /* reject any unknown events outside the normal event mask. */ if ((u16)iocb->aio_buf != iocb->aio_buf) return -EINVAL;...
112,027,450,340,998,470,000,000,000,000,000,000,000
aio.c
255,263,946,414,536,040,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2019-10125
An issue was discovered in aio_poll() in fs/aio.c in the Linux kernel through 5.0.4. A file may be released by aio_poll_wake() if an expected event is triggered immediately (e.g., by the close of a pair of pipes) after the return of vfs_poll(), and this will cause a use-after-free.
https://nvd.nist.gov/vuln/detail/CVE-2019-10125
200,284
libtorrent
debf3c6e3688aab8394fe5c47737625faffe6f9e
https://github.com/arvidn/libtorrent
https://github.com/arvidn/libtorrent/commit/debf3c6e3688aab8394fe5c47737625faffe6f9e
update puff.c for gzip inflation (#1022) update puff.c for gzip inflation
1
local int construct(struct huffman *h, boost::int16_t *length, int n) { int symbol; /* current symbol when stepping through length[] */ int len; /* current length when stepping through h->count[] */ int left; /* number of possible codes left of current length */ boost::int16_t...
194,923,232,573,407,100,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2016-7164
The construct function in puff.cpp in Libtorrent 1.1.0 allows remote torrent trackers to cause a denial of service (segmentation fault and crash) via a crafted GZIP response.
https://nvd.nist.gov/vuln/detail/CVE-2016-7164
300,724
libtorrent
debf3c6e3688aab8394fe5c47737625faffe6f9e
https://github.com/arvidn/libtorrent
https://github.com/arvidn/libtorrent/commit/debf3c6e3688aab8394fe5c47737625faffe6f9e
update puff.c for gzip inflation (#1022) update puff.c for gzip inflation
0
local int construct(struct huffman *h, const short *length, int n) { int symbol; /* current symbol when stepping through length[] */ int len; /* current length when stepping through h->count[] */ int left; /* number of possible codes left of current length */ short offs[MAXB...
332,996,753,655,560,400,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2016-7164
The construct function in puff.cpp in Libtorrent 1.1.0 allows remote torrent trackers to cause a denial of service (segmentation fault and crash) via a crafted GZIP response.
https://nvd.nist.gov/vuln/detail/CVE-2016-7164
200,298
poppler
fada09a2ccc11a3a1d308e810f1336d8df6011fd
https://github.com/freedesktop/poppler
https://gitlab.freedesktop.org/poppler/poppler/commit/fada09a2ccc11a3a1d308e810f1336d8df6011fd
pdfunite: Fix stack overflow on broken file Fixes issue #741
1
void PDFDoc::markObject (Object* obj, XRef *xRef, XRef *countRef, unsigned int numOffset, int oldRefNum, int newRefNum, std::set<Dict*> *alreadyMarkedDicts) { Array *array; switch (obj->getType()) { case objArray: array = obj->getArray(); for (int i=0; i<array->getLength(); i++) { Object ob...
254,448,505,263,979,950,000,000,000,000,000,000,000
PDFDoc.cc
75,877,226,484,140,360,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2019-9903
PDFDoc::markObject in PDFDoc.cc in Poppler 0.74.0 mishandles dict marking, leading to stack consumption in the function Dict::find() located at Dict.cc, which can (for example) be triggered by passing a crafted pdf file to the pdfunite binary.
https://nvd.nist.gov/vuln/detail/CVE-2019-9903
300,917
poppler
fada09a2ccc11a3a1d308e810f1336d8df6011fd
https://github.com/freedesktop/poppler
https://gitlab.freedesktop.org/poppler/poppler/commit/fada09a2ccc11a3a1d308e810f1336d8df6011fd
pdfunite: Fix stack overflow on broken file Fixes issue #741
0
void PDFDoc::markObject (Object* obj, XRef *xRef, XRef *countRef, unsigned int numOffset, int oldRefNum, int newRefNum, std::set<Dict*> *alreadyMarkedDicts) { Array *array; switch (obj->getType()) { case objArray: array = obj->getArray(); for (int i=0; i<array->getLength(); i++) { Object ob...
241,662,039,262,682,230,000,000,000,000,000,000,000
PDFDoc.cc
150,861,618,593,089,140,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2019-9903
PDFDoc::markObject in PDFDoc.cc in Poppler 0.74.0 mishandles dict marking, leading to stack consumption in the function Dict::find() located at Dict.cc, which can (for example) be triggered by passing a crafted pdf file to the pdfunite binary.
https://nvd.nist.gov/vuln/detail/CVE-2019-9903
200,313
ImageMagick
ee3dae8624e69261760754442827aea4d0254a6f
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/ee3dae8624e69261760754442827aea4d0254a6f
https://github.com/ImageMagick/ImageMagick/issues/1522
1
MagickExport Image *AcquireImage(const ImageInfo *image_info, ExceptionInfo *exception) { const char *option; Image *image; MagickStatusType flags; /* Allocate image structure. */ (void) LogMagickEvent(TraceEvent,GetMagickModule(),"..."); image=(Image *) AcquireCriticalMemory(sizeof(*...
96,392,906,066,319,790,000,000,000,000,000,000,000
image.c
84,376,712,040,828,030,000,000,000,000,000,000,000
[ "CWE-665" ]
CVE-2019-12979
ImageMagick 7.0.8-34 has a "use of uninitialized value" vulnerability in the SyncImageSettings function in MagickCore/image.c. This is related to AcquireImage in magick/image.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-12979
301,194
ImageMagick
ee3dae8624e69261760754442827aea4d0254a6f
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/ee3dae8624e69261760754442827aea4d0254a6f
https://github.com/ImageMagick/ImageMagick/issues/1522
0
MagickExport Image *AcquireImage(const ImageInfo *image_info, ExceptionInfo *exception) { const char *option; Image *image; MagickStatusType flags; /* Allocate image structure. */ (void) LogMagickEvent(TraceEvent,GetMagickModule(),"..."); image=(Image *) AcquireCriticalMemory(sizeof(*...
319,960,257,132,066,500,000,000,000,000,000,000,000
image.c
32,404,354,403,244,286,000,000,000,000,000,000,000
[ "CWE-665" ]
CVE-2019-12979
ImageMagick 7.0.8-34 has a "use of uninitialized value" vulnerability in the SyncImageSettings function in MagickCore/image.c. This is related to AcquireImage in magick/image.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-12979
200,314
linux
44efc269db7929f6275a1fa927ef082e533ecde0
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=44efc269db7929f6275a1fa927ef082e533ecde0
USB: adutux: fix use-after-free on disconnect The driver was clearing its struct usb_device pointer, which it used as an inverted disconnected flag, before deregistering the character device and without serialising against racing release(). This could lead to a use-after-free if a racing release() callback observes t...
1
static void adu_disconnect(struct usb_interface *interface) { struct adu_device *dev; dev = usb_get_intfdata(interface); mutex_lock(&dev->mtx); /* not interruptible */ dev->udev = NULL; /* poison */ usb_deregister_dev(interface, &adu_class); mutex_unlock(&dev->mtx); mutex_lock(&adutux_mutex); usb_set_intfdat...
207,316,202,012,655,220,000,000,000,000,000,000,000
None
null
[ "CWE-416" ]
CVE-2019-19523
In the Linux kernel before 5.3.7, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/adutux.c driver, aka CID-44efc269db79.
https://nvd.nist.gov/vuln/detail/CVE-2019-19523
301,205
linux
44efc269db7929f6275a1fa927ef082e533ecde0
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=44efc269db7929f6275a1fa927ef082e533ecde0
USB: adutux: fix use-after-free on disconnect The driver was clearing its struct usb_device pointer, which it used as an inverted disconnected flag, before deregistering the character device and without serialising against racing release(). This could lead to a use-after-free if a racing release() callback observes t...
0
static void adu_disconnect(struct usb_interface *interface) { struct adu_device *dev; dev = usb_get_intfdata(interface); usb_deregister_dev(interface, &adu_class); mutex_lock(&adutux_mutex); usb_set_intfdata(interface, NULL); mutex_lock(&dev->mtx); /* not interruptible */ dev->udev = NULL; /* poison */ mute...
317,465,483,549,762,100,000,000,000,000,000,000,000
None
null
[ "CWE-416" ]
CVE-2019-19523
In the Linux kernel before 5.3.7, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/adutux.c driver, aka CID-44efc269db79.
https://nvd.nist.gov/vuln/detail/CVE-2019-19523
200,319
net
425aa0e1d01513437668fa3d4a971168bbaa8515
https://git.kernel.org/cgit/linux/kernel/git/davem/net
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=425aa0e1d01513437668fa3d4a971168bbaa8515
ip_sockglue: Fix missing-check bug in ip_ra_control() In function ip_ra_control(), the pointer new_ra is allocated a memory space via kmalloc(). And it is used in the following codes. However, when there is a memory allocation error, kmalloc() fails. Thus null pointer dereference may happen. And it will cause the ker...
1
int ip_ra_control(struct sock *sk, unsigned char on, void (*destructor)(struct sock *)) { struct ip_ra_chain *ra, *new_ra; struct ip_ra_chain __rcu **rap; struct net *net = sock_net(sk); if (sk->sk_type != SOCK_RAW || inet_sk(sk)->inet_num == IPPROTO_RAW) return -EINVAL; new_ra = on ? kmalloc(sizeof(*new_r...
186,977,643,023,068,020,000,000,000,000,000,000,000
ip_sockglue.c
267,466,980,647,864,520,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2019-12381
An issue was discovered in ip_ra_control in net/ipv4/ip_sockglue.c in the Linux kernel through 5.1.5. There is an unchecked kmalloc of new_ra, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash). NOTE: this is disputed because new_ra is never used if it is NULL
https://nvd.nist.gov/vuln/detail/CVE-2019-12381
301,320
net
425aa0e1d01513437668fa3d4a971168bbaa8515
https://git.kernel.org/cgit/linux/kernel/git/davem/net
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=425aa0e1d01513437668fa3d4a971168bbaa8515
ip_sockglue: Fix missing-check bug in ip_ra_control() In function ip_ra_control(), the pointer new_ra is allocated a memory space via kmalloc(). And it is used in the following codes. However, when there is a memory allocation error, kmalloc() fails. Thus null pointer dereference may happen. And it will cause the ker...
0
int ip_ra_control(struct sock *sk, unsigned char on, void (*destructor)(struct sock *)) { struct ip_ra_chain *ra, *new_ra; struct ip_ra_chain __rcu **rap; struct net *net = sock_net(sk); if (sk->sk_type != SOCK_RAW || inet_sk(sk)->inet_num == IPPROTO_RAW) return -EINVAL; new_ra = on ? kmalloc(sizeof(*new_r...
191,145,499,404,838,560,000,000,000,000,000,000,000
ip_sockglue.c
330,575,274,490,289,900,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2019-12381
An issue was discovered in ip_ra_control in net/ipv4/ip_sockglue.c in the Linux kernel through 5.1.5. There is an unchecked kmalloc of new_ra, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash). NOTE: this is disputed because new_ra is never used if it is NULL
https://nvd.nist.gov/vuln/detail/CVE-2019-12381
200,370
grub
ac8cac1dac50daaf1c390d701cca3b55e16ee768
http://git.savannah.gnu.org/cgit/grub
https://git.savannah.gnu.org/cgit/grub.git/commit/grub-core/fs/ext2.c?id=ac8cac1dac50daaf1c390d701cca3b55e16ee768
* grub-core/fs/ext2.c: Remove variable length arrays.
1
grub_ext2_read_block (grub_fshelp_node_t node, grub_disk_addr_t fileblock) { struct grub_ext2_data *data = node->data; struct grub_ext2_inode *inode = &node->inode; grub_disk_addr_t blknr = -1; unsigned int blksz = EXT2_BLOCK_SIZE (data); int log2_blksz = LOG2_EXT2_BLOCK_SIZE (data); if (inode->flags & gru...
336,126,367,902,330,660,000,000,000,000,000,000,000
ext2.c
329,149,131,028,531,700,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2017-9763
The grub_ext2_read_block function in fs/ext2.c in GNU GRUB before 2013-11-12, as used in shlr/grub/fs/ext2.c in radare2 1.5.0, allows remote attackers to cause a denial of service (excessive stack use and application crash) via a crafted binary file, related to use of a variable-size stack array.
https://nvd.nist.gov/vuln/detail/CVE-2017-9763
301,811
grub
ac8cac1dac50daaf1c390d701cca3b55e16ee768
http://git.savannah.gnu.org/cgit/grub
https://git.savannah.gnu.org/cgit/grub.git/commit/grub-core/fs/ext2.c?id=ac8cac1dac50daaf1c390d701cca3b55e16ee768
* grub-core/fs/ext2.c: Remove variable length arrays.
0
grub_ext2_read_block (grub_fshelp_node_t node, grub_disk_addr_t fileblock) { struct grub_ext2_data *data = node->data; struct grub_ext2_inode *inode = &node->inode; grub_disk_addr_t blknr = -1; unsigned int blksz = EXT2_BLOCK_SIZE (data); int log2_blksz = LOG2_EXT2_BLOCK_SIZE (data); if (inode->flags & gru...
201,726,576,636,651,750,000,000,000,000,000,000,000
ext2.c
193,620,740,563,021,640,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2017-9763
The grub_ext2_read_block function in fs/ext2.c in GNU GRUB before 2013-11-12, as used in shlr/grub/fs/ext2.c in radare2 1.5.0, allows remote attackers to cause a denial of service (excessive stack use and application crash) via a crafted binary file, related to use of a variable-size stack array.
https://nvd.nist.gov/vuln/detail/CVE-2017-9763
200,371
ipmitool
840fb1cbb4fb365cb9797300e3374d4faefcdb10
https://github.com/ipmitool/ipmitool
https://github.com/ipmitool/ipmitool/commit/840fb1cbb4fb365cb9797300e3374d4faefcdb10
fru: Fix buffer overflow in ipmi_spd_print_fru Partial fix for CVE-2020-5208, see https://github.com/ipmitool/ipmitool/security/advisories/GHSA-g659-9qxw-p7cp The `ipmi_spd_print_fru` function has a similar issue as the one fixed by the previous commit in `read_fru_area_section`. An initial request is made to get the...
1
ipmi_spd_print_fru(struct ipmi_intf * intf, uint8_t id) { struct ipmi_rs * rsp; struct ipmi_rq req; struct fru_info fru; uint8_t *spd_data, msg_data[4]; int len, offset; msg_data[0] = id; memset(&req, 0, sizeof(req)); req.msg.netfn = IPMI_NETFN_STORAGE; req.msg.cmd = GET_FRU_INFO; req.msg.data = msg_data; ...
111,696,673,379,626,610,000,000,000,000,000,000,000
dimm_spd.c
220,411,030,797,792,900,000,000,000,000,000,000,000
[ "CWE-120" ]
CVE-2020-5208
It's been found that multiple functions in ipmitool before 1.8.19 neglect proper checking of the data received from a remote LAN party, which may lead to buffer overflows and potentially to remote code execution on the ipmitool side. This is especially dangerous if ipmitool is run as a privileged user. This problem is ...
https://nvd.nist.gov/vuln/detail/CVE-2020-5208
301,823
ipmitool
840fb1cbb4fb365cb9797300e3374d4faefcdb10
https://github.com/ipmitool/ipmitool
https://github.com/ipmitool/ipmitool/commit/840fb1cbb4fb365cb9797300e3374d4faefcdb10
fru: Fix buffer overflow in ipmi_spd_print_fru Partial fix for CVE-2020-5208, see https://github.com/ipmitool/ipmitool/security/advisories/GHSA-g659-9qxw-p7cp The `ipmi_spd_print_fru` function has a similar issue as the one fixed by the previous commit in `read_fru_area_section`. An initial request is made to get the...
0
ipmi_spd_print_fru(struct ipmi_intf * intf, uint8_t id) { struct ipmi_rs * rsp; struct ipmi_rq req; struct fru_info fru; uint8_t *spd_data, msg_data[4]; uint32_t len, offset; msg_data[0] = id; memset(&req, 0, sizeof(req)); req.msg.netfn = IPMI_NETFN_STORAGE; req.msg.cmd = GET_FRU_INFO; req.msg.data = msg_da...
108,258,473,967,829,100,000,000,000,000,000,000,000
dimm_spd.c
333,577,251,218,215,400,000,000,000,000,000,000,000
[ "CWE-120" ]
CVE-2020-5208
It's been found that multiple functions in ipmitool before 1.8.19 neglect proper checking of the data received from a remote LAN party, which may lead to buffer overflows and potentially to remote code execution on the ipmitool side. This is especially dangerous if ipmitool is run as a privileged user. This problem is ...
https://nvd.nist.gov/vuln/detail/CVE-2020-5208
200,382
ImageMagick
c1cf4802653970c050d175a6496fa1f11b7c089e
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/c1cf4802653970c050d175a6496fa1f11b7c089e
Earlier check for EOF
1
static Image *ReadPNMImage(const ImageInfo *image_info,ExceptionInfo *exception) { char format; double quantum_scale; Image *image; MagickBooleanType status; QuantumAny max_value; QuantumInfo *quantum_info; QuantumType quantum_type; size_t depth, extent, pa...
297,210,173,749,444,300,000,000,000,000,000,000,000
pnm.c
152,375,642,383,776,630,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2016-6823
Integer overflow in the BMP coder in ImageMagick before 7.0.2-10 allows remote attackers to cause a denial of service (crash) via crafted height and width values, which triggers an out-of-bounds write.
https://nvd.nist.gov/vuln/detail/CVE-2016-6823
302,179
ImageMagick
c1cf4802653970c050d175a6496fa1f11b7c089e
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/c1cf4802653970c050d175a6496fa1f11b7c089e
Earlier check for EOF
0
static Image *ReadPNMImage(const ImageInfo *image_info,ExceptionInfo *exception) { char format; double quantum_scale; Image *image; MagickBooleanType status; QuantumAny max_value; QuantumInfo *quantum_info; QuantumType quantum_type; size_t depth, extent, pa...
150,077,777,919,925,130,000,000,000,000,000,000,000
pnm.c
138,720,437,907,657,010,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2016-6823
Integer overflow in the BMP coder in ImageMagick before 7.0.2-10 allows remote attackers to cause a denial of service (crash) via crafted height and width values, which triggers an out-of-bounds write.
https://nvd.nist.gov/vuln/detail/CVE-2016-6823
200,395
libbson
e10059393466f667b031077229cfa98504ce34f3
https://github.com/mongodb/libbson
https://github.com/mongodb/libbson/commit/e10059393466f667b031077229cfa98504ce34f3
CDRIVER-2269 Fix codewscope test
1
test_bson_append_code_with_scope (void) { const uint8_t *scope_buf = NULL; uint32_t scopelen = 0; uint32_t len = 0; bson_iter_t iter; bool r; const char *code = NULL; bson_t *b; bson_t *b2; bson_t *scope; /* Test with NULL bson, which converts to just CODE type. */ b = bson_new (); ...
281,302,826,999,216,350,000,000,000,000,000,000,000
test-bson.c
178,434,807,486,041,700,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-14227
In MongoDB libbson 1.7.0, the bson_iter_codewscope function in bson-iter.c miscalculates a bson_utf8_validate length argument, which allows remote attackers to cause a denial of service (heap-based buffer over-read in the bson_utf8_validate function in bson-utf8.c), as demonstrated by bson-to-json.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-14227
302,269
libbson
e10059393466f667b031077229cfa98504ce34f3
https://github.com/mongodb/libbson
https://github.com/mongodb/libbson/commit/e10059393466f667b031077229cfa98504ce34f3
CDRIVER-2269 Fix codewscope test
0
test_bson_append_code_with_scope (void) { const uint8_t *scope_buf = NULL; uint32_t scopelen = 0; uint32_t len = 0; bson_iter_t iter; bool r; const char *code = NULL; bson_t *b; bson_t *b2; bson_t *scope; bson_error_t err; bool eof; bson_reader_t *reader; const bson_t *ticket_bson...
274,895,206,233,151,340,000,000,000,000,000,000,000
test-bson.c
106,082,292,663,455,330,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-14227
In MongoDB libbson 1.7.0, the bson_iter_codewscope function in bson-iter.c miscalculates a bson_utf8_validate length argument, which allows remote attackers to cause a denial of service (heap-based buffer over-read in the bson_utf8_validate function in bson-utf8.c), as demonstrated by bson-to-json.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-14227
200,398
linux
4f134b89a24b965991e7c345b9a4591821f7c2a6
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4f134b89a24b965991e7c345b9a4591821f7c2a6
lib/syscall: fix syscall registers retrieval on 32-bit platforms Lilith >_> and Claudio Bozzato of Cisco Talos security team reported that collect_syscall() improperly casts the syscall registers to 64-bit values leaking the uninitialized last 24 bytes on 32-bit platforms, that are visible in /proc/self/syscall. The ...
1
static int collect_syscall(struct task_struct *target, struct syscall_info *info) { struct pt_regs *regs; if (!try_get_task_stack(target)) { /* Task has no stack, so the task isn't in a syscall. */ memset(info, 0, sizeof(*info)); info->data.nr = -1; return 0; } regs = task_pt_regs(target); if (unlikely(!...
71,532,311,692,146,140,000,000,000,000,000,000,000
syscall.c
107,719,311,275,545,550,000,000,000,000,000,000,000
[ "CWE-681" ]
CVE-2020-28588
An information disclosure vulnerability exists in the /proc/pid/syscall functionality of Linux Kernel 5.1 Stable and 5.4.66. More specifically, this issue has been introduced in v5.1-rc4 (commit 631b7abacd02b88f4b0795c08b54ad4fc3e7c7c0) and is still present in v5.10-rc4, so it’s likely that all versions in between are ...
https://nvd.nist.gov/vuln/detail/CVE-2020-28588
302,313
linux
4f134b89a24b965991e7c345b9a4591821f7c2a6
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4f134b89a24b965991e7c345b9a4591821f7c2a6
lib/syscall: fix syscall registers retrieval on 32-bit platforms Lilith >_> and Claudio Bozzato of Cisco Talos security team reported that collect_syscall() improperly casts the syscall registers to 64-bit values leaking the uninitialized last 24 bytes on 32-bit platforms, that are visible in /proc/self/syscall. The ...
0
static int collect_syscall(struct task_struct *target, struct syscall_info *info) { unsigned long args[6] = { }; struct pt_regs *regs; if (!try_get_task_stack(target)) { /* Task has no stack, so the task isn't in a syscall. */ memset(info, 0, sizeof(*info)); info->data.nr = -1; return 0; } regs = task_pt...
336,539,674,319,666,300,000,000,000,000,000,000,000
syscall.c
7,563,541,240,842,955,000,000,000,000,000,000,000
[ "CWE-681" ]
CVE-2020-28588
An information disclosure vulnerability exists in the /proc/pid/syscall functionality of Linux Kernel 5.1 Stable and 5.4.66. More specifically, this issue has been introduced in v5.1-rc4 (commit 631b7abacd02b88f4b0795c08b54ad4fc3e7c7c0) and is still present in v5.10-rc4, so it’s likely that all versions in between are ...
https://nvd.nist.gov/vuln/detail/CVE-2020-28588
200,411
lftp
a27e07d90a4608ceaf928b1babb27d4d803e1992
https://github.com/lavv17/lftp
https://github.com/lavv17/lftp/commit/a27e07d90a4608ceaf928b1babb27d4d803e1992
mirror: prepend ./ to rm and chmod arguments to avoid URL recognition (fix #452)
1
int MirrorJob::Do() { int res; int m=STALL; FileInfo *file; Job *j; switch(state) { case(INITIAL_STATE): remove_this_source_dir=(remove_source_dirs && source_dir.last_char()!='/'); if(!strcmp(target_dir,".") || !strcmp(target_dir,"..") || (FlagSet(SCAN_ALL_FIRST) && parent_mirror)...
335,045,401,269,657,430,000,000,000,000,000,000,000
MirrorJob.cc
202,382,672,693,832,600,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2018-10916
It has been discovered that lftp up to and including version 4.8.3 does not properly sanitize remote file names, leading to a loss of integrity on the local system when reverse mirroring is used. A remote attacker may trick a user to use reverse mirroring on an attacker controlled FTP server, resulting in the removal o...
https://nvd.nist.gov/vuln/detail/CVE-2018-10916
302,803
lftp
a27e07d90a4608ceaf928b1babb27d4d803e1992
https://github.com/lavv17/lftp
https://github.com/lavv17/lftp/commit/a27e07d90a4608ceaf928b1babb27d4d803e1992
mirror: prepend ./ to rm and chmod arguments to avoid URL recognition (fix #452)
0
int MirrorJob::Do() { int res; int m=STALL; FileInfo *file; Job *j; switch(state) { case(INITIAL_STATE): remove_this_source_dir=(remove_source_dirs && source_dir.last_char()!='/'); if(!strcmp(target_dir,".") || !strcmp(target_dir,"..") || (FlagSet(SCAN_ALL_FIRST) && parent_mirror)...
122,572,215,167,977,500,000,000,000,000,000,000,000
MirrorJob.cc
293,430,357,076,912,540,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2018-10916
It has been discovered that lftp up to and including version 4.8.3 does not properly sanitize remote file names, leading to a loss of integrity on the local system when reverse mirroring is used. A remote attacker may trick a user to use reverse mirroring on an attacker controlled FTP server, resulting in the removal o...
https://nvd.nist.gov/vuln/detail/CVE-2018-10916
200,412
linux
c0a333d842ef67ac04adc72ff79dc1ccc3dca4ed
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c0a333d842ef67ac04adc72ff79dc1ccc3dca4ed
ASoC: SOF: Fix memory leak in sof_dfsentry_write In the implementation of sof_dfsentry_write() memory allocated for string is leaked in case of an error. Go to error handling path if the d_name.name is not valid. Fixes: 091c12e1f50c ("ASoC: SOF: debug: add new debugfs entries for IPC flood test") Signed-off-by: Navid...
1
static ssize_t sof_dfsentry_write(struct file *file, const char __user *buffer, size_t count, loff_t *ppos) { #if IS_ENABLED(CONFIG_SND_SOC_SOF_DEBUG_IPC_FLOOD_TEST) struct snd_sof_dfsentry *dfse = file->private_data; struct snd_sof_dev *sdev = dfse->sdev; unsigned long ipc_duration_ms = 0; bool flood_duratio...
43,405,185,039,542,960,000,000,000,000,000,000,000
debug.c
96,437,858,430,803,440,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2019-18812
A memory leak in the sof_dfsentry_write() function in sound/soc/sof/debug.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-c0a333d842ef.
https://nvd.nist.gov/vuln/detail/CVE-2019-18812