idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
292,527 | upx | ef336dbcc6dc8344482f8cf6c909ae96c3286317 | https://github.com/upx/upx | https://github.com/upx/upx/commit/ef336dbcc6dc8344482f8cf6c909ae96c3286317 | Protect against bad crafted input.
https://github.com/upx/upx/issues/128
modified: p_lx_elf.cpp | 0 | void PackLinuxElf64::unpack(OutputFile *fo)
{
if (e_phoff != sizeof(Elf64_Ehdr)) {// Phdrs not contiguous with Ehdr
throwCantUnpack("bad e_phoff");
}
unsigned const c_phnum = get_te16(&ehdri.e_phnum);
upx_uint64_t old_data_off = 0;
upx_uint64_t old_data_len = 0;
upx_uint64_t old_dtinit =... | 284,508,010,398,343,950,000,000,000,000,000,000,000 | p_lx_elf.cpp | 73,223,301,389,849,510,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2017-15056 | p_lx_elf.cpp in UPX 3.94 mishandles ELF headers, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by an Invalid Pointer Read in PackLinuxElf64::unpack(). | https://nvd.nist.gov/vuln/detail/CVE-2017-15056 |
199,775 | upx | ef336dbcc6dc8344482f8cf6c909ae96c3286317 | https://github.com/upx/upx | https://github.com/upx/upx/commit/ef336dbcc6dc8344482f8cf6c909ae96c3286317 | Protect against bad crafted input.
https://github.com/upx/upx/issues/128
modified: p_lx_elf.cpp | 1 | void PackLinuxElf32::unpack(OutputFile *fo)
{
unsigned const c_phnum = get_te16(&ehdri.e_phnum);
unsigned old_data_off = 0;
unsigned old_data_len = 0;
unsigned old_dtinit = 0;
unsigned szb_info = sizeof(b_info);
{
if (get_te32(&ehdri.e_entry) < 0x401180
&& Elf32_Ehdr::EM_386 ==... | 269,169,780,002,602,600,000,000,000,000,000,000,000 | p_lx_elf.cpp | 201,133,125,951,494,360,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2017-15056 | p_lx_elf.cpp in UPX 3.94 mishandles ELF headers, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by an Invalid Pointer Read in PackLinuxElf64::unpack(). | https://nvd.nist.gov/vuln/detail/CVE-2017-15056 |
292,507 | upx | ef336dbcc6dc8344482f8cf6c909ae96c3286317 | https://github.com/upx/upx | https://github.com/upx/upx/commit/ef336dbcc6dc8344482f8cf6c909ae96c3286317 | Protect against bad crafted input.
https://github.com/upx/upx/issues/128
modified: p_lx_elf.cpp | 0 | void PackLinuxElf32::unpack(OutputFile *fo)
{
if (e_phoff != sizeof(Elf32_Ehdr)) {// Phdrs not contiguous with Ehdr
throwCantUnpack("bad e_phoff");
}
unsigned const c_phnum = get_te16(&ehdri.e_phnum);
unsigned old_data_off = 0;
unsigned old_data_len = 0;
unsigned old_dtinit = 0;
uns... | 39,547,117,445,938,715,000,000,000,000,000,000,000 | p_lx_elf.cpp | 73,223,301,389,849,510,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2017-15056 | p_lx_elf.cpp in UPX 3.94 mishandles ELF headers, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by an Invalid Pointer Read in PackLinuxElf64::unpack(). | https://nvd.nist.gov/vuln/detail/CVE-2017-15056 |
199,777 | libsndfile | aaea680337267bfb6d2544da878890ee7f1c5077 | https://github.com/erikd/libsndfile | https://github.com/erikd/libsndfile/commit/aaea680337267bfb6d2544da878890ee7f1c5077 | Check MAX_CHANNELS in sndfile-deinterleave
Allocated buffer has space for only 16 channels. Verify that input file
meets this limit.
Fixes #397 | 1 | main (int argc, char **argv)
{ STATE state ;
SF_INFO sfinfo ;
char pathname [512], ext [32], *cptr ;
int ch, double_split ;
if (argc != 2)
{ if (argc != 1)
puts ("\nError : need a single input file.\n") ;
usage_exit () ;
} ;
memset (&state, 0, sizeof (state)) ;
memset (&sfinfo, 0, sizeof (sfinfo)) ;
i... | 185,290,033,106,488,580,000,000,000,000,000,000,000 | sndfile-deinterleave.c | 271,399,014,135,583,170,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2018-19432 | An issue was discovered in libsndfile 1.0.28. There is a NULL pointer dereference in the function sf_write_int in sndfile.c, which will lead to a denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2018-19432 |
292,601 | libsndfile | aaea680337267bfb6d2544da878890ee7f1c5077 | https://github.com/erikd/libsndfile | https://github.com/erikd/libsndfile/commit/aaea680337267bfb6d2544da878890ee7f1c5077 | Check MAX_CHANNELS in sndfile-deinterleave
Allocated buffer has space for only 16 channels. Verify that input file
meets this limit.
Fixes #397 | 0 | main (int argc, char **argv)
{ STATE state ;
SF_INFO sfinfo ;
char pathname [512], ext [32], *cptr ;
int ch, double_split ;
if (argc != 2)
{ if (argc != 1)
puts ("\nError : need a single input file.\n") ;
usage_exit () ;
} ;
memset (&state, 0, sizeof (state)) ;
memset (&sfinfo, 0, sizeof (sfinfo)) ;
i... | 214,934,442,328,700,830,000,000,000,000,000,000,000 | sndfile-deinterleave.c | 245,269,637,836,946,950,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2018-19432 | An issue was discovered in libsndfile 1.0.28. There is a NULL pointer dereference in the function sf_write_int in sndfile.c, which will lead to a denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2018-19432 |
199,784 | linux | 83f1b4ba917db5dc5a061a44b3403ddb6e783494 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/83f1b4ba917db5dc5a061a44b3403ddb6e783494 | net: fix incorrect credentials passing
Commit 257b5358b32f ("scm: Capture the full credentials of the scm
sender") changed the credentials passing code to pass in the effective
uid/gid instead of the real uid/gid.
Obviously this doesn't matter most of the time (since normally they are
the same), but it results in dif... | 1 | static __inline__ void scm_set_cred(struct scm_cookie *scm,
struct pid *pid, const struct cred *cred)
{
scm->pid = get_pid(pid);
scm->cred = cred ? get_cred(cred) : NULL;
scm->creds.pid = pid_vnr(pid);
scm->creds.uid = cred ? cred->euid : INVALID_UID;
scm->creds.gid = cred ? cred->egid : INVALID_GID;
} | 131,269,229,816,038,690,000,000,000,000,000,000,000 | scm.h | 221,494,680,009,258,900,000,000,000,000,000,000,000 | [
"CWE-284"
] | CVE-2013-1979 | The scm_set_cred function in include/net/scm.h in the Linux kernel before 3.8.11 uses incorrect uid and gid values during credentials passing, which allows local users to gain privileges via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-1979 |
292,689 | linux | 83f1b4ba917db5dc5a061a44b3403ddb6e783494 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/83f1b4ba917db5dc5a061a44b3403ddb6e783494 | net: fix incorrect credentials passing
Commit 257b5358b32f ("scm: Capture the full credentials of the scm
sender") changed the credentials passing code to pass in the effective
uid/gid instead of the real uid/gid.
Obviously this doesn't matter most of the time (since normally they are
the same), but it results in dif... | 0 | static __inline__ void scm_set_cred(struct scm_cookie *scm,
struct pid *pid, const struct cred *cred)
{
scm->pid = get_pid(pid);
scm->cred = cred ? get_cred(cred) : NULL;
scm->creds.pid = pid_vnr(pid);
scm->creds.uid = cred ? cred->uid : INVALID_UID;
scm->creds.gid = cred ? cred->gid : INVALID_GID;
} | 19,600,063,016,870,249,000,000,000,000,000,000,000 | scm.h | 275,165,060,088,837,360,000,000,000,000,000,000,000 | [
"CWE-284"
] | CVE-2013-1979 | The scm_set_cred function in include/net/scm.h in the Linux kernel before 3.8.11 uses incorrect uid and gid values during credentials passing, which allows local users to gain privileges via a crafted application. | https://nvd.nist.gov/vuln/detail/CVE-2013-1979 |
199,786 | weechat | 6f4f147d8e86adf9ad34a8ffd7e7f1f23a7e74da | https://github.com/weechat/weechat | https://github.com/weechat/weechat/commit/6f4f147d8e86adf9ad34a8ffd7e7f1f23a7e74da | irc: fix crash when receiving a malformed message 324 (channel mode)
Thanks to Stuart Nevans Locke for reporting the issue. | 1 | irc_mode_channel_update (struct t_irc_server *server,
struct t_irc_channel *channel,
char set_flag,
char chanmode,
const char *argument)
{
char *pos_args, *str_modes, **argv, *pos, *ptr_arg;
char *new_modes, *new... | 188,177,756,673,106,500,000,000,000,000,000,000,000 | irc-mode.c | 292,817,717,604,208,200,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2020-8955 | irc_mode_channel_update in plugins/irc/irc-mode.c in WeeChat through 2.7 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a malformed IRC message 324 (channel mode). | https://nvd.nist.gov/vuln/detail/CVE-2020-8955 |
292,789 | weechat | 6f4f147d8e86adf9ad34a8ffd7e7f1f23a7e74da | https://github.com/weechat/weechat | https://github.com/weechat/weechat/commit/6f4f147d8e86adf9ad34a8ffd7e7f1f23a7e74da | irc: fix crash when receiving a malformed message 324 (channel mode)
Thanks to Stuart Nevans Locke for reporting the issue. | 0 | irc_mode_channel_update (struct t_irc_server *server,
struct t_irc_channel *channel,
char set_flag,
char chanmode,
const char *argument)
{
char *pos_args, *str_modes, **argv, *pos, *ptr_arg;
char *new_modes, *new... | 116,074,854,913,510,830,000,000,000,000,000,000,000 | irc-mode.c | 199,656,443,808,802,470,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2020-8955 | irc_mode_channel_update in plugins/irc/irc-mode.c in WeeChat through 2.7 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a malformed IRC message 324 (channel mode). | https://nvd.nist.gov/vuln/detail/CVE-2020-8955 |
199,788 | exim | a04174dc2a84ae1008c23b6a7109e7fa3fb7b8b0 | https://github.com/Exim/exim | https://git.exim.org/exim.git/commit/a04174dc2a84ae1008c23b6a7109e7fa3fb7b8b0 | Rework SPA fix to avoid overflows. Bug 2571
Amends: 57aa14b216 | 1 | auth_spa_server(auth_instance *ablock, uschar *data)
{
auth_spa_options_block *ob = (auth_spa_options_block *)(ablock->options_block);
uint8x lmRespData[24];
uint8x ntRespData[24];
SPAAuthRequest request;
SPAAuthChallenge challenge;
SPAAuthResponse response;
SPAAuthResponse *responseptr = &response;
uschar msgbuf[204... | 184,116,674,678,987,700,000,000,000,000,000,000,000 | spa.c | 292,387,672,206,916,360,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2020-12783 | Exim through 4.93 has an out-of-bounds read in the SPA authenticator that could result in SPA/NTLM authentication bypass in auths/spa.c and auths/auth-spa.c. | https://nvd.nist.gov/vuln/detail/CVE-2020-12783 |
292,791 | exim | a04174dc2a84ae1008c23b6a7109e7fa3fb7b8b0 | https://github.com/Exim/exim | https://git.exim.org/exim.git/commit/a04174dc2a84ae1008c23b6a7109e7fa3fb7b8b0 | Rework SPA fix to avoid overflows. Bug 2571
Amends: 57aa14b216 | 0 | auth_spa_server(auth_instance *ablock, uschar *data)
{
auth_spa_options_block *ob = (auth_spa_options_block *)(ablock->options_block);
uint8x lmRespData[24];
uint8x ntRespData[24];
SPAAuthRequest request;
SPAAuthChallenge challenge;
SPAAuthResponse response;
SPAAuthResponse *responseptr = &response;
uschar msgbuf[204... | 286,917,894,428,868,160,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2020-12783 | Exim through 4.93 has an out-of-bounds read in the SPA authenticator that could result in SPA/NTLM authentication bypass in auths/spa.c and auths/auth-spa.c. | https://nvd.nist.gov/vuln/detail/CVE-2020-12783 |
199,789 | FreeRDP | d6cd14059b257318f176c0ba3ee0a348826a9ef8 | https://github.com/FreeRDP/FreeRDP | https://github.com/FreeRDP/FreeRDP/commit/d6cd14059b257318f176c0ba3ee0a348826a9ef8 | Fixed GHSL-2020-101 missing NULL check
(cherry picked from commit b207dbba35c505bbc3ad5aadc10b34980c6b7e8e) | 1 | BOOL security_fips_decrypt(BYTE* data, size_t length, rdpRdp* rdp)
{
size_t olen;
if (!winpr_Cipher_Update(rdp->fips_decrypt, data, length, data, &olen))
return FALSE;
return TRUE;
} | 8,054,079,088,470,202,000,000,000,000,000,000,000 | security.c | 305,925,616,334,524,900,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2020-13397 | An issue was discovered in FreeRDP before 2.1.1. An out-of-bounds (OOB) read vulnerability has been detected in security_fips_decrypt in libfreerdp/core/security.c due to an uninitialized value. | https://nvd.nist.gov/vuln/detail/CVE-2020-13397 |
292,809 | FreeRDP | d6cd14059b257318f176c0ba3ee0a348826a9ef8 | https://github.com/FreeRDP/FreeRDP | https://github.com/FreeRDP/FreeRDP/commit/d6cd14059b257318f176c0ba3ee0a348826a9ef8 | Fixed GHSL-2020-101 missing NULL check
(cherry picked from commit b207dbba35c505bbc3ad5aadc10b34980c6b7e8e) | 0 | BOOL security_fips_decrypt(BYTE* data, size_t length, rdpRdp* rdp)
{
size_t olen;
if (!rdp || !rdp->fips_decrypt)
return FALSE;
if (!winpr_Cipher_Update(rdp->fips_decrypt, data, length, data, &olen))
return FALSE;
return TRUE;
} | 19,897,350,297,675,680,000,000,000,000,000,000,000 | security.c | 206,625,793,047,677,300,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2020-13397 | An issue was discovered in FreeRDP before 2.1.1. An out-of-bounds (OOB) read vulnerability has been detected in security_fips_decrypt in libfreerdp/core/security.c due to an uninitialized value. | https://nvd.nist.gov/vuln/detail/CVE-2020-13397 |
199,798 | poco | bb7e5feece68ccfd8660caee93da25c5c39a4707 | https://github.com/pocoproject/poco | https://github.com/pocoproject/poco/commit/bb7e5feece68ccfd8660caee93da25c5c39a4707 | merge zip entry absolute path vulnerability fix (#1968) from develop | 1 | bool ZipCommon::isValidPath(const std::string& path)
{
if (path == "..")
return false;
if (path.compare(0, 3, "../") == 0)
return false;
if (path.compare(0, 3, "..\\") == 0)
return false;
if (path.find("/..") != std::string::npos)
return false;
if (path.find("\\..") != std::string::npos)
return false;
r... | 789,213,769,138,701,100,000,000,000,000,000,000 | ZipCommon.cpp | 17,915,437,497,623,443,000,000,000,000,000,000,000 | [
"CWE-22"
] | CVE-2017-1000472 | The ZipCommon::isValidPath() function in Zip/src/ZipCommon.cpp in POCO C++ Libraries before 1.8 does not properly restrict the filename value in the ZIP header, which allows attackers to conduct absolute path traversal attacks during the ZIP decompression, and possibly create or overwrite arbitrary files, via a crafted... | https://nvd.nist.gov/vuln/detail/CVE-2017-1000472 |
292,846 | poco | bb7e5feece68ccfd8660caee93da25c5c39a4707 | https://github.com/pocoproject/poco | https://github.com/pocoproject/poco/commit/bb7e5feece68ccfd8660caee93da25c5c39a4707 | merge zip entry absolute path vulnerability fix (#1968) from develop | 0 | bool ZipCommon::isValidPath(const std::string& path)
{
try
{
if (Path(path, Path::PATH_UNIX).isAbsolute() || Path(path, Path::PATH_WINDOWS).isAbsolute())
return false;
}
catch (...)
{
return false;
}
if (path == "..")
return false;
if ((path.size() >= 3) && path.compare(0, 3, "../") == 0)
return fal... | 155,335,598,961,505,950,000,000,000,000,000,000,000 | ZipCommon.cpp | 237,586,829,736,796,230,000,000,000,000,000,000,000 | [
"CWE-22"
] | CVE-2017-1000472 | The ZipCommon::isValidPath() function in Zip/src/ZipCommon.cpp in POCO C++ Libraries before 1.8 does not properly restrict the filename value in the ZIP header, which allows attackers to conduct absolute path traversal attacks during the ZIP decompression, and possibly create or overwrite arbitrary files, via a crafted... | https://nvd.nist.gov/vuln/detail/CVE-2017-1000472 |
199,812 | ImageMagick | 9cf2f738f714eba6d47be1127ed255acd2b51750 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/9cf2f738f714eba6d47be1127ed255acd2b51750 | https://github.com/ImageMagick/ImageMagick/issues/1453 | 1 | static MagickBooleanType WriteDIBImage(const ImageInfo *image_info,Image *image,
ExceptionInfo *exception)
{
DIBInfo
dib_info;
MagickBooleanType
status;
register const Quantum
*p;
register ssize_t
i,
x;
register unsigned char
*q;
size_t
bytes_per_line;
ssize_t
y;
... | 185,954,394,330,689,500,000,000,000,000,000,000,000 | dib.c | 53,349,621,889,029,420,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2019-7398 | In ImageMagick before 7.0.8-25, a memory leak exists in WriteDIBImage in coders/dib.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-7398 |
292,931 | ImageMagick | 9cf2f738f714eba6d47be1127ed255acd2b51750 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/9cf2f738f714eba6d47be1127ed255acd2b51750 | https://github.com/ImageMagick/ImageMagick/issues/1453 | 0 | static MagickBooleanType WriteDIBImage(const ImageInfo *image_info,Image *image,
ExceptionInfo *exception)
{
DIBInfo
dib_info;
MagickBooleanType
status;
register const Quantum
*p;
register ssize_t
i,
x;
register unsigned char
*q;
size_t
bytes_per_line;
ssize_t
y;
... | 97,482,229,688,337,220,000,000,000,000,000,000,000 | dib.c | 276,756,533,291,690,040,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2019-7398 | In ImageMagick before 7.0.8-25, a memory leak exists in WriteDIBImage in coders/dib.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-7398 |
199,821 | linux | ac795161c93699d600db16c1a8cc23a65a1eceaf | https://github.com/torvalds/linux | https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ac795161c93699d600db16c1a8cc23a65a1eceaf | NFSv4: Handle case where the lookup of a directory fails
If the application sets the O_DIRECTORY flag, and tries to open a
regular file, nfs_atomic_open() will punt to doing a regular lookup.
If the server then returns a regular file, we will happily return a
file descriptor with uninitialised open state.
The fix is ... | 1 | int nfs_atomic_open(struct inode *dir, struct dentry *dentry,
struct file *file, unsigned open_flags,
umode_t mode)
{
DECLARE_WAIT_QUEUE_HEAD_ONSTACK(wq);
struct nfs_open_context *ctx;
struct dentry *res;
struct iattr attr = { .ia_valid = ATTR_OPEN };
struct inode *inode;
unsigned int lookup_flags = 0... | 121,284,279,749,402,280,000,000,000,000,000,000,000 | dir.c | 72,899,618,380,248,340,000,000,000,000,000,000,000 | [
"CWE-909"
] | CVE-2022-24448 | An issue was discovered in fs/nfs/dir.c in the Linux kernel before 5.16.5. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should occur, but the server instead returns uninitialized data in the file descripto... | https://nvd.nist.gov/vuln/detail/CVE-2022-24448 |
293,078 | linux | ac795161c93699d600db16c1a8cc23a65a1eceaf | https://github.com/torvalds/linux | https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ac795161c93699d600db16c1a8cc23a65a1eceaf | NFSv4: Handle case where the lookup of a directory fails
If the application sets the O_DIRECTORY flag, and tries to open a
regular file, nfs_atomic_open() will punt to doing a regular lookup.
If the server then returns a regular file, we will happily return a
file descriptor with uninitialised open state.
The fix is ... | 0 | int nfs_atomic_open(struct inode *dir, struct dentry *dentry,
struct file *file, unsigned open_flags,
umode_t mode)
{
DECLARE_WAIT_QUEUE_HEAD_ONSTACK(wq);
struct nfs_open_context *ctx;
struct dentry *res;
struct iattr attr = { .ia_valid = ATTR_OPEN };
struct inode *inode;
unsigned int lookup_flags = 0... | 298,536,409,859,562,370,000,000,000,000,000,000,000 | dir.c | 53,601,207,712,078,500,000,000,000,000,000,000,000 | [
"CWE-909"
] | CVE-2022-24448 | An issue was discovered in fs/nfs/dir.c in the Linux kernel before 5.16.5. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should occur, but the server instead returns uninitialized data in the file descripto... | https://nvd.nist.gov/vuln/detail/CVE-2022-24448 |
199,823 | w3m | a25fd09f74fb83499396935a96d63bb7cb8e2c58 | https://github.com/tats/w3m | https://github.com/tats/w3m/commit/a25fd09f74fb83499396935a96d63bb7cb8e2c58 | Prevent negative array index for selectnumber and textareanumber
Bug-Debian: https://github.com/tats/w3m/issues/12 | 1 | formList_addInput(struct form_list *fl, struct parsed_tag *tag)
{
struct form_item_list *item;
char *p;
int i;
/* if not in <form>..</form> environment, just ignore <input> tag */
if (fl == NULL)
return NULL;
item = New(struct form_item_list);
item->type = FORM_UNKNOWN;
item->size = -... | 114,137,860,407,776,880,000,000,000,000,000,000,000 | form.c | 158,086,739,093,364,400,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2016-9424 | An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. w3m doesn't properly validate the value of tag attribute, which allows remote attackers to cause a denial of service (heap buffer overflow crash) and possibly execute arbitrary code via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2016-9424 |
77,460 | w3m | 7fdc83b0364005a0b5ed869230dd81752ba022e8 | https://github.com/tats/w3m | https://github.com/tats/w3m/commit/7fdc83b0364005a0b5ed869230dd81752ba022e8 | Prevent invalid columnPos() call in formUpdateBuffer()
Bug-Debian: https://github.com/tats/w3m/issues/89 | 0 | formList_addInput(struct form_list *fl, struct parsed_tag *tag)
{
struct form_item_list *item;
char *p;
int i;
/* if not in <form>..</form> environment, just ignore <input> tag */
if (fl == NULL)
return NULL;
item = New(struct form_item_list);
item->type = FORM_UNKNOWN;
item->size = -... | 69,104,510,322,303,205,000,000,000,000,000,000,000 | form.c | 209,643,273,982,878,620,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2018-6197 | w3m through 0.5.3 is prone to a NULL pointer dereference flaw in formUpdateBuffer in form.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-6197 |
199,824 | linux | dad5ab0db8deac535d03e3fe3d8f2892173fa6a4 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dad5ab0db8deac535d03e3fe3d8f2892173fa6a4 | x86/acpi: Prevent out of bound access caused by broken ACPI tables
The bus_irq argument of mp_override_legacy_irq() is used as the index into
the isa_irq_to_gsi[] array. The bus_irq argument originates from
ACPI_MADT_TYPE_IO_APIC and ACPI_MADT_TYPE_INTERRUPT items in the ACPI
tables, but is nowhere sanity checked.
Th... | 1 | static void __init mp_override_legacy_irq(u8 bus_irq, u8 polarity, u8 trigger,
u32 gsi)
{
int ioapic;
int pin;
struct mpc_intsrc mp_irq;
/*
* Convert 'gsi' to 'ioapic.pin'.
*/
ioapic = mp_find_ioapic(gsi);
if (ioapic < 0)
return;
pin = mp_find_ioapic_pin(ioapic, gsi);
/*
* TBD: This check is fo... | 222,394,401,587,201,600,000,000,000,000,000,000,000 | boot.c | 265,602,114,283,354,460,000,000,000,000,000,000,000 | [
"CWE-120"
] | CVE-2017-11473 | Buffer overflow in the mp_override_legacy_irq() function in arch/x86/kernel/acpi/boot.c in the Linux kernel through 3.2 allows local users to gain privileges via a crafted ACPI table. | https://nvd.nist.gov/vuln/detail/CVE-2017-11473 |
293,220 | linux | dad5ab0db8deac535d03e3fe3d8f2892173fa6a4 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dad5ab0db8deac535d03e3fe3d8f2892173fa6a4 | x86/acpi: Prevent out of bound access caused by broken ACPI tables
The bus_irq argument of mp_override_legacy_irq() is used as the index into
the isa_irq_to_gsi[] array. The bus_irq argument originates from
ACPI_MADT_TYPE_IO_APIC and ACPI_MADT_TYPE_INTERRUPT items in the ACPI
tables, but is nowhere sanity checked.
Th... | 0 | static void __init mp_override_legacy_irq(u8 bus_irq, u8 polarity, u8 trigger,
u32 gsi)
{
int ioapic;
int pin;
struct mpc_intsrc mp_irq;
/*
* Check bus_irq boundary.
*/
if (bus_irq >= NR_IRQS_LEGACY) {
pr_warn("Invalid bus_irq %u for legacy override\n", bus_irq);
return;
}
/*
* Convert 'gsi' t... | 119,128,203,013,338,030,000,000,000,000,000,000,000 | boot.c | 223,148,726,855,874,430,000,000,000,000,000,000,000 | [
"CWE-120"
] | CVE-2017-11473 | Buffer overflow in the mp_override_legacy_irq() function in arch/x86/kernel/acpi/boot.c in the Linux kernel through 3.2 allows local users to gain privileges via a crafted ACPI table. | https://nvd.nist.gov/vuln/detail/CVE-2017-11473 |
199,839 | libgcrypt | 8725c99ffa41778f382ca97233183bcd687bb0ce | https://github.com/gpg/libgcrypt | https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=8725c99ffa41778f382ca97233183bcd687bb0ce | rsa: Add exponent blinding.
* cipher/rsa.c (secret_core_crt): Blind secret D with randomized
nonce R for mpi_powm computation.
--
Co-authored-by: Werner Koch <wk@gnupg.org>
Signed-off-by: NIIBE Yutaka <gniibe@fsij.org>
The paper describing attack: https://eprint.iacr.org/2017/627
Sliding right into disaster: Left-... | 1 | secret_core_crt (gcry_mpi_t M, gcry_mpi_t C,
gcry_mpi_t D, unsigned int Nlimbs,
gcry_mpi_t P, gcry_mpi_t Q, gcry_mpi_t U)
{
gcry_mpi_t m1 = mpi_alloc_secure ( Nlimbs + 1 );
gcry_mpi_t m2 = mpi_alloc_secure ( Nlimbs + 1 );
gcry_mpi_t h = mpi_alloc_secure ( Nlimbs + 1 );
/* m1 ... | 64,521,901,183,118,710,000,000,000,000,000,000,000 | rsa.c | 198,849,560,603,613,900,000,000,000,000,000,000,000 | [
"CWE-310"
] | CVE-2017-7526 | libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attac... | https://nvd.nist.gov/vuln/detail/CVE-2017-7526 |
293,610 | libgcrypt | 8725c99ffa41778f382ca97233183bcd687bb0ce | https://github.com/gpg/libgcrypt | https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=8725c99ffa41778f382ca97233183bcd687bb0ce | rsa: Add exponent blinding.
* cipher/rsa.c (secret_core_crt): Blind secret D with randomized
nonce R for mpi_powm computation.
--
Co-authored-by: Werner Koch <wk@gnupg.org>
Signed-off-by: NIIBE Yutaka <gniibe@fsij.org>
The paper describing attack: https://eprint.iacr.org/2017/627
Sliding right into disaster: Left-... | 0 | secret_core_crt (gcry_mpi_t M, gcry_mpi_t C,
gcry_mpi_t D, unsigned int Nlimbs,
gcry_mpi_t P, gcry_mpi_t Q, gcry_mpi_t U)
{
gcry_mpi_t m1 = mpi_alloc_secure ( Nlimbs + 1 );
gcry_mpi_t m2 = mpi_alloc_secure ( Nlimbs + 1 );
gcry_mpi_t h = mpi_alloc_secure ( Nlimbs + 1 );
gcry_mp... | 191,367,156,524,628,400,000,000,000,000,000,000,000 | rsa.c | 138,966,268,077,037,850,000,000,000,000,000,000,000 | [
"CWE-310"
] | CVE-2017-7526 | libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attac... | https://nvd.nist.gov/vuln/detail/CVE-2017-7526 |
199,842 | ImageMagick | ee5b9c56b9ca18ed0750f8a15e0d1a6da92a6e99 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/ee5b9c56b9ca18ed0750f8a15e0d1a6da92a6e99 | https://github.com/ImageMagick/ImageMagick/issues/1517 | 1 | static MagickBooleanType WriteDPXImage(const ImageInfo *image_info,Image *image,
ExceptionInfo *exception)
{
const char
*value;
const StringInfo
*profile;
DPXInfo
dpx;
GeometryInfo
geometry_info;
MagickBooleanType
status;
MagickOffsetType
offset;
MagickStatusType
flags;... | 1,378,234,600,095,752,000,000,000,000,000,000,000 | dpx.c | 242,348,207,868,873,100,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2019-12975 | ImageMagick 7.0.8-34 has a memory leak vulnerability in the WriteDPXImage function in coders/dpx.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-12975 |
293,790 | ImageMagick | ee5b9c56b9ca18ed0750f8a15e0d1a6da92a6e99 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/ee5b9c56b9ca18ed0750f8a15e0d1a6da92a6e99 | https://github.com/ImageMagick/ImageMagick/issues/1517 | 0 | static MagickBooleanType WriteDPXImage(const ImageInfo *image_info,Image *image,
ExceptionInfo *exception)
{
const char
*value;
const StringInfo
*profile;
DPXInfo
dpx;
GeometryInfo
geometry_info;
MagickBooleanType
status;
MagickOffsetType
offset;
MagickStatusType
flags;... | 321,605,399,547,815,180,000,000,000,000,000,000,000 | dpx.c | 148,279,576,596,785,700,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2019-12975 | ImageMagick 7.0.8-34 has a memory leak vulnerability in the WriteDPXImage function in coders/dpx.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-12975 |
199,850 | capnproto | 52bc956459a5e83d7c31be95763ff6399e064ae4 | https://github.com/capnproto/capnproto | https://github.com/sandstorm-io/capnproto/commit/52bc956459a5e83d7c31be95763ff6399e064ae4 | SECURITY: Prevent compiler from eliding bounds checks.
Details: https://github.com/sandstorm-io/capnproto/blob/master/security-advisories/2017-04-17-0-apple-32bit-elides-bounds-check.md | 1 | inline bool SegmentReader::containsInterval(const void* from, const void* to) {
return from >= this->ptr.begin() && to <= this->ptr.end() && from <= to &&
readLimiter->canRead(
intervalLength(reinterpret_cast<const byte*>(from),
reinterpret_cast<const byte*>(to),
... | 336,574,734,078,768,540,000,000,000,000,000,000,000 | arena.h | 194,835,903,770,639,500,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2017-7892 | Sandstorm Cap'n Proto before 0.5.3.1 allows remote crashes related to a compiler optimization. A remote attacker can trigger a segfault in a 32-bit libcapnp application because Cap'n Proto relies on pointer arithmetic calculations that overflow. An example compiler with optimization that elides a bounds check in such c... | https://nvd.nist.gov/vuln/detail/CVE-2017-7892 |
293,934 | capnproto | 52bc956459a5e83d7c31be95763ff6399e064ae4 | https://github.com/capnproto/capnproto | https://github.com/sandstorm-io/capnproto/commit/52bc956459a5e83d7c31be95763ff6399e064ae4 | SECURITY: Prevent compiler from eliding bounds checks.
Details: https://github.com/sandstorm-io/capnproto/blob/master/security-advisories/2017-04-17-0-apple-32bit-elides-bounds-check.md | 0 | inline bool SegmentReader::containsInterval(const void* from, const void* to) {
uintptr_t start = reinterpret_cast<uintptr_t>(from) - reinterpret_cast<uintptr_t>(ptr.begin());
uintptr_t end = reinterpret_cast<uintptr_t>(to) - reinterpret_cast<uintptr_t>(ptr.begin());
uintptr_t bound = ptr.size() * sizeof(capnp::w... | 248,798,622,971,580,200,000,000,000,000,000,000,000 | arena.h | 248,728,536,083,470,200,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2017-7892 | Sandstorm Cap'n Proto before 0.5.3.1 allows remote crashes related to a compiler optimization. A remote attacker can trigger a segfault in a 32-bit libcapnp application because Cap'n Proto relies on pointer arithmetic calculations that overflow. An example compiler with optimization that elides a bounds check in such c... | https://nvd.nist.gov/vuln/detail/CVE-2017-7892 |
199,876 | libx11 | 8d2e02ae650f00c4a53deb625211a0527126c605 | https://gitlab.freedesktop.org/xorg/lib/libx11 | https://gitlab.freedesktop.org/xorg/lib/libx11/-/commit/8d2e02ae650f00c4a53deb625211a0527126c605 | Reject string longer than USHRT_MAX before sending them on the wire
The X protocol uses CARD16 values to represent the length so
this would overflow.
CVE-2021-31535
Signed-off-by: Matthieu Herrb <matthieu@herrb.eu> | 1 | XLookupColor (
register Display *dpy,
Colormap cmap,
_Xconst char *spec,
XColor *def,
XColor *scr)
{
register int n;
xLookupColorReply reply;
register xLookupColorReq *req;
XcmsCCC ccc;
XcmsColor cmsColor_exact;
#ifdef XCMS
/*
* Let's Attempt to use Xcms and i18n approach to Parse Color
*/
if ((... | 78,580,651,049,327,750,000,000,000,000,000,000,000 | LookupCol.c | 83,074,443,382,407,210,000,000,000,000,000,000,000 | [
"CWE-120"
] | CVE-2021-31535 | LookupCol.c in X.Org X through X11R7.7 and libX11 before 1.7.1 might allow remote attackers to execute arbitrary code. The libX11 XLookupColor request (intended for server-side color lookup) contains a flaw allowing a client to send color-name requests with a name longer than the maximum size allowed by the protocol (a... | https://nvd.nist.gov/vuln/detail/CVE-2021-31535 |
294,269 | libx11 | 8d2e02ae650f00c4a53deb625211a0527126c605 | https://gitlab.freedesktop.org/xorg/lib/libx11 | https://gitlab.freedesktop.org/xorg/lib/libx11/-/commit/8d2e02ae650f00c4a53deb625211a0527126c605 | Reject string longer than USHRT_MAX before sending them on the wire
The X protocol uses CARD16 values to represent the length so
this would overflow.
CVE-2021-31535
Signed-off-by: Matthieu Herrb <matthieu@herrb.eu> | 0 | XLookupColor (
register Display *dpy,
Colormap cmap,
_Xconst char *spec,
XColor *def,
XColor *scr)
{
register int n;
xLookupColorReply reply;
register xLookupColorReq *req;
XcmsCCC ccc;
XcmsColor cmsColor_exact;
n = (int) strlen (spec);
if (n >= USHRT_MAX)
return 0;
#ifdef XCMS
/*
* L... | 105,366,235,125,736,960,000,000,000,000,000,000,000 | LookupCol.c | 268,581,929,491,905,220,000,000,000,000,000,000,000 | [
"CWE-120"
] | CVE-2021-31535 | LookupCol.c in X.Org X through X11R7.7 and libX11 before 1.7.1 might allow remote attackers to execute arbitrary code. The libX11 XLookupColor request (intended for server-side color lookup) contains a flaw allowing a client to send color-name requests with a name longer than the maximum size allowed by the protocol (a... | https://nvd.nist.gov/vuln/detail/CVE-2021-31535 |
199,886 | ekiga | 02654fc949722a78d41fcffac8687d73d8574647 | http://git.gnome.org/browse/ekiga | https://gitlab.gnome.org/GNOME/ekiga/commit/02654fc949722a78d41fcffac8687d73d8574647 | Fixed plugin load
I have no idea when I broke this... | 1 | plugin_init (Ekiga::KickStart& kickstart)
{
#ifdef DEBUG
// should make it easier to test ekiga without installing
gchar* path = g_build_path (G_DIR_SEPARATOR_S,
g_get_tmp_dir (), "ekiga_debug_plugins", NULL);
plugin_parse_directory (kickstart, path);
g_free (path);
#else
plugin_parse_directory (kick... | 167,849,742,301,188,280,000,000,000,000,000,000,000 | plugin-core.cpp | 87,337,891,896,463,660,000,000,000,000,000,000,000 | [
"CWE-94"
] | CVE-2011-1830 | Ekiga versions before 3.3.0 attempted to load a module from /tmp/ekiga_test.so. | https://nvd.nist.gov/vuln/detail/CVE-2011-1830 |
294,725 | ekiga | 02654fc949722a78d41fcffac8687d73d8574647 | http://git.gnome.org/browse/ekiga | https://gitlab.gnome.org/GNOME/ekiga/commit/02654fc949722a78d41fcffac8687d73d8574647 | Fixed plugin load
I have no idea when I broke this... | 0 | plugin_init (Ekiga::KickStart& kickstart)
{
#if DEBUG
// should make it easier to test ekiga without installing
gchar* path = g_build_path (G_DIR_SEPARATOR_S,
g_get_tmp_dir (), "ekiga_debug_plugins", NULL);
plugin_parse_directory (kickstart, path);
g_free (path);
#else
plugin_parse_directory (kicksta... | 81,442,528,602,613,970,000,000,000,000,000,000,000 | plugin-core.cpp | 126,235,430,132,269,000,000,000,000,000,000,000,000 | [
"CWE-94"
] | CVE-2011-1830 | Ekiga versions before 3.3.0 attempted to load a module from /tmp/ekiga_test.so. | https://nvd.nist.gov/vuln/detail/CVE-2011-1830 |
199,902 | linux | 45c1380358b12bf2d1db20a5874e9544f56b34ab | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/45c1380358b12bf2d1db20a5874e9544f56b34ab | ASoC: SOF: ipc: Fix memory leak in sof_set_get_large_ctrl_data
In the implementation of sof_set_get_large_ctrl_data() there is a memory
leak in case an error. Release partdata if sof_get_ctrl_copy_params()
fails.
Fixes: 54d198d5019d ("ASoC: SOF: Propagate sof_get_ctrl_copy_params() error properly")
Signed-off-by: Nav... | 1 | static int sof_set_get_large_ctrl_data(struct snd_sof_dev *sdev,
struct sof_ipc_ctrl_data *cdata,
struct sof_ipc_ctrl_data_params *sparams,
bool send)
{
struct sof_ipc_ctrl_data *partdata;
size_t send_bytes;
size_t offset = 0;
size_t msg_bytes;
size_t pl_size;
int err;
int i;
/... | 221,687,980,612,193,100,000,000,000,000,000,000,000 | ipc.c | 104,438,201,781,529,450,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2019-18811 | A memory leak in the sof_set_get_large_ctrl_data() function in sound/soc/sof/ipc.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering sof_get_ctrl_copy_params() failures, aka CID-45c1380358b1. | https://nvd.nist.gov/vuln/detail/CVE-2019-18811 |
295,202 | linux | 45c1380358b12bf2d1db20a5874e9544f56b34ab | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/45c1380358b12bf2d1db20a5874e9544f56b34ab | ASoC: SOF: ipc: Fix memory leak in sof_set_get_large_ctrl_data
In the implementation of sof_set_get_large_ctrl_data() there is a memory
leak in case an error. Release partdata if sof_get_ctrl_copy_params()
fails.
Fixes: 54d198d5019d ("ASoC: SOF: Propagate sof_get_ctrl_copy_params() error properly")
Signed-off-by: Nav... | 0 | static int sof_set_get_large_ctrl_data(struct snd_sof_dev *sdev,
struct sof_ipc_ctrl_data *cdata,
struct sof_ipc_ctrl_data_params *sparams,
bool send)
{
struct sof_ipc_ctrl_data *partdata;
size_t send_bytes;
size_t offset = 0;
size_t msg_bytes;
size_t pl_size;
int err;
int i;
/... | 223,281,861,925,640,300,000,000,000,000,000,000,000 | ipc.c | 145,799,524,276,053,830,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2019-18811 | A memory leak in the sof_set_get_large_ctrl_data() function in sound/soc/sof/ipc.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering sof_get_ctrl_copy_params() failures, aka CID-45c1380358b1. | https://nvd.nist.gov/vuln/detail/CVE-2019-18811 |
199,923 | ImageMagick | e50f19fd73c792ebe912df8ab83aa51a243a3da7 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/e50f19fd73c792ebe912df8ab83aa51a243a3da7 | https://github.com/ImageMagick/ImageMagick/issues/4729 | 1 | static MagickBooleanType WritePICONImage(const ImageInfo *image_info,
Image *image,ExceptionInfo *exception)
{
#define ColormapExtent 155
#define GraymapExtent 95
#define PiconGeometry "48x48>"
static unsigned char
Colormap[]=
{
0x47, 0x49, 0x46, 0x38, 0x37, 0x61, 0x06, 0x00, 0x05, 0x00, 0xf4, 0x0... | 69,464,302,106,632,760,000,000,000,000,000,000,000 | xpm.c | 150,955,926,509,418,970,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2022-0284 | A heap-based-buffer-over-read flaw was found in ImageMagick's GetPixelAlpha() function of 'pixel-accessor.h'. This vulnerability is triggered when an attacker passes a specially crafted Tagged Image File Format (TIFF) image to convert it into a PICON file format. This issue can potentially lead to a denial of service a... | https://nvd.nist.gov/vuln/detail/CVE-2022-0284 |
295,504 | ImageMagick | e50f19fd73c792ebe912df8ab83aa51a243a3da7 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/e50f19fd73c792ebe912df8ab83aa51a243a3da7 | https://github.com/ImageMagick/ImageMagick/issues/4729 | 0 | static MagickBooleanType WritePICONImage(const ImageInfo *image_info,
Image *image,ExceptionInfo *exception)
{
#define ColormapExtent 155
#define GraymapExtent 95
#define PiconGeometry "48x48>"
static unsigned char
Colormap[]=
{
0x47, 0x49, 0x46, 0x38, 0x37, 0x61, 0x06, 0x00, 0x05, 0x00, 0xf4, 0x0... | 54,207,706,989,993,220,000,000,000,000,000,000,000 | xpm.c | 134,681,841,142,269,400,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2022-0284 | A heap-based-buffer-over-read flaw was found in ImageMagick's GetPixelAlpha() function of 'pixel-accessor.h'. This vulnerability is triggered when an attacker passes a specially crafted Tagged Image File Format (TIFF) image to convert it into a PICON file format. This issue can potentially lead to a denial of service a... | https://nvd.nist.gov/vuln/detail/CVE-2022-0284 |
199,927 | ntp | c4cd4aaf418f57f7225708a93bf48afb2bc9c1da | https://github.com/ntp-project/ntp | https://github.com/ntp-project/ntp/commit/c4cd4aaf418f57f7225708a93bf48afb2bc9c1da | CVE-2014-9297 | 1 | crypto_recv(
struct peer *peer, /* peer structure pointer */
struct recvbuf *rbufp /* packet buffer pointer */
)
{
const EVP_MD *dp; /* message digest algorithm */
u_int32 *pkt; /* receive packet pointer */
struct autokey *ap, *bp; /* autokey pointer */
struct exten *ep, *fp; /* extension pointers */
struct ce... | 19,060,187,373,402,055,000,000,000,000,000,000,000 | ntp_crypto.c | 103,988,491,639,428,570,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2015-7691 | The crypto_xmit function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (crash) via crafted packets containing particular autokey operations. NOTE: This vulnerability exists due to an incomplete fix for CVE-2014-9750. | https://nvd.nist.gov/vuln/detail/CVE-2015-7691 |
295,549 | ntp | c4cd4aaf418f57f7225708a93bf48afb2bc9c1da | https://github.com/ntp-project/ntp | https://github.com/ntp-project/ntp/commit/c4cd4aaf418f57f7225708a93bf48afb2bc9c1da | CVE-2014-9297 | 0 | crypto_recv(
struct peer *peer, /* peer structure pointer */
struct recvbuf *rbufp /* packet buffer pointer */
)
{
const EVP_MD *dp; /* message digest algorithm */
u_int32 *pkt; /* receive packet pointer */
struct autokey *ap, *bp; /* autokey pointer */
struct exten *ep, *fp; /* extension pointers */
struct ce... | 42,941,031,218,189,840,000,000,000,000,000,000,000 | ntp_crypto.c | 289,079,379,946,819,740,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2015-7691 | The crypto_xmit function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (crash) via crafted packets containing particular autokey operations. NOTE: This vulnerability exists due to an incomplete fix for CVE-2014-9750. | https://nvd.nist.gov/vuln/detail/CVE-2015-7691 |
199,929 | ntp | c4cd4aaf418f57f7225708a93bf48afb2bc9c1da | https://github.com/ntp-project/ntp | https://github.com/ntp-project/ntp/commit/c4cd4aaf418f57f7225708a93bf48afb2bc9c1da | CVE-2014-9297 | 1 | crypto_xmit(
struct peer *peer, /* peer structure pointer */
struct pkt *xpkt, /* transmit packet pointer */
struct recvbuf *rbufp, /* receive buffer pointer */
int start, /* offset to extension field */
struct exten *ep, /* extension pointer */
keyid_t cookie /* session cookie */
)
{
struct exten *fp; /* ext... | 207,933,166,457,933,600,000,000,000,000,000,000,000 | ntp_crypto.c | 103,988,491,639,428,570,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2015-7691 | The crypto_xmit function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (crash) via crafted packets containing particular autokey operations. NOTE: This vulnerability exists due to an incomplete fix for CVE-2014-9750. | https://nvd.nist.gov/vuln/detail/CVE-2015-7691 |
295,563 | ntp | c4cd4aaf418f57f7225708a93bf48afb2bc9c1da | https://github.com/ntp-project/ntp | https://github.com/ntp-project/ntp/commit/c4cd4aaf418f57f7225708a93bf48afb2bc9c1da | CVE-2014-9297 | 0 | crypto_xmit(
struct peer *peer, /* peer structure pointer */
struct pkt *xpkt, /* transmit packet pointer */
struct recvbuf *rbufp, /* receive buffer pointer */
int start, /* offset to extension field */
struct exten *ep, /* extension pointer */
keyid_t cookie /* session cookie */
)
{
struct exten *fp; /* ext... | 243,480,195,176,837,780,000,000,000,000,000,000,000 | ntp_crypto.c | 289,079,379,946,819,740,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2015-7691 | The crypto_xmit function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (crash) via crafted packets containing particular autokey operations. NOTE: This vulnerability exists due to an incomplete fix for CVE-2014-9750. | https://nvd.nist.gov/vuln/detail/CVE-2015-7691 |
199,934 | poppler | 8051f678b3b43326e5fdfd7c03f39de21059f426 | https://github.com/freedesktop/poppler | https://gitlab.freedesktop.org/aacid/poppler/commit/8051f678b3b43326e5fdfd7c03f39de21059f426 | FontInfoScanner::scanFonts Fix infinite loop in broken files
Fixes #752 | 1 | void FontInfoScanner::scanFonts(XRef *xrefA, Dict *resDict, std::vector<FontInfo*> *fontsList) {
GfxFontDict *gfxFontDict;
GfxFont *font;
// scan the fonts in this resource dictionary
gfxFontDict = nullptr;
const Object &fontObj = resDict->lookupNF("Font");
if (fontObj.isRef()) {
Object obj2 = fontObj.... | 171,294,480,150,665,300,000,000,000,000,000,000,000 | FontInfo.cc | 3,119,972,755,341,979,500,000,000,000,000,000,000 | [
"CWE-674"
] | CVE-2019-11026 | FontInfoScanner::scanFonts in FontInfo.cc in Poppler 0.75.0 has infinite recursion, leading to a call to the error function in Error.cc. | https://nvd.nist.gov/vuln/detail/CVE-2019-11026 |
295,573 | poppler | 8051f678b3b43326e5fdfd7c03f39de21059f426 | https://github.com/freedesktop/poppler | https://gitlab.freedesktop.org/aacid/poppler/commit/8051f678b3b43326e5fdfd7c03f39de21059f426 | FontInfoScanner::scanFonts Fix infinite loop in broken files
Fixes #752 | 0 | void FontInfoScanner::scanFonts(XRef *xrefA, Dict *resDict, std::vector<FontInfo*> *fontsList) {
GfxFontDict *gfxFontDict;
GfxFont *font;
// scan the fonts in this resource dictionary
gfxFontDict = nullptr;
const Object &fontObj = resDict->lookupNF("Font");
if (fontObj.isRef()) {
Object obj2 = fontObj.... | 257,236,090,595,430,300,000,000,000,000,000,000,000 | FontInfo.cc | 263,963,231,206,152,400,000,000,000,000,000,000,000 | [
"CWE-674"
] | CVE-2019-11026 | FontInfoScanner::scanFonts in FontInfo.cc in Poppler 0.75.0 has infinite recursion, leading to a call to the error function in Error.cc. | https://nvd.nist.gov/vuln/detail/CVE-2019-11026 |
199,935 | linux | 68501df92d116b760777a2cfda314789f926476f | https://github.com/torvalds/linux | https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=68501df92d116b760777a2cfda314789f926476f | net: dsa: sja1105: Prevent leaking memory
In sja1105_static_config_upload, in two cases memory is leaked: when
static_config_buf_prepare_for_upload fails and when sja1105_inhibit_tx
fails. In both cases config_buf should be released.
Fixes: 8aa9ebccae87 ("net: dsa: Introduce driver for NXP SJA1105 5-port L2 switch")
... | 1 | int sja1105_static_config_upload(struct sja1105_private *priv)
{
unsigned long port_bitmap = GENMASK_ULL(SJA1105_NUM_PORTS - 1, 0);
struct sja1105_static_config *config = &priv->static_config;
const struct sja1105_regs *regs = priv->info->regs;
struct device *dev = &priv->spidev->dev;
struct sja1105_status status;... | 217,216,275,273,635,970,000,000,000,000,000,000,000 | sja1105_spi.c | 328,718,901,756,624,620,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2019-18807 | Two memory leaks in the sja1105_static_config_upload() function in drivers/net/dsa/sja1105/sja1105_spi.c in the Linux kernel before 5.3.5 allow attackers to cause a denial of service (memory consumption) by triggering static_config_buf_prepare_for_upload() or sja1105_inhibit_tx() failures, aka CID-68501df92d11. | https://nvd.nist.gov/vuln/detail/CVE-2019-18807 |
295,589 | linux | 68501df92d116b760777a2cfda314789f926476f | https://github.com/torvalds/linux | https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=68501df92d116b760777a2cfda314789f926476f | net: dsa: sja1105: Prevent leaking memory
In sja1105_static_config_upload, in two cases memory is leaked: when
static_config_buf_prepare_for_upload fails and when sja1105_inhibit_tx
fails. In both cases config_buf should be released.
Fixes: 8aa9ebccae87 ("net: dsa: Introduce driver for NXP SJA1105 5-port L2 switch")
... | 0 | int sja1105_static_config_upload(struct sja1105_private *priv)
{
unsigned long port_bitmap = GENMASK_ULL(SJA1105_NUM_PORTS - 1, 0);
struct sja1105_static_config *config = &priv->static_config;
const struct sja1105_regs *regs = priv->info->regs;
struct device *dev = &priv->spidev->dev;
struct sja1105_status status;... | 231,898,680,734,775,570,000,000,000,000,000,000,000 | sja1105_spi.c | 1,013,277,188,463,385,100,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2019-18807 | Two memory leaks in the sja1105_static_config_upload() function in drivers/net/dsa/sja1105/sja1105_spi.c in the Linux kernel before 5.3.5 allow attackers to cause a denial of service (memory consumption) by triggering static_config_buf_prepare_for_upload() or sja1105_inhibit_tx() failures, aka CID-68501df92d11. | https://nvd.nist.gov/vuln/detail/CVE-2019-18807 |
199,947 | exiv2 | 8cd95e221889e41e9cc153e2cfb5a7b41c7bc7a4 | https://github.com/Exiv2/exiv2 | https://github.com/Exiv2/exiv2/commit/8cd95e221889e41e9cc153e2cfb5a7b41c7bc7a4 | Avoid negative integer overflow when `chunkLength == 0`.
This fixes #789. | 1 | void PngImage::readMetadata()
{
#ifdef DEBUG
std::cerr << "Exiv2::PngImage::readMetadata: Reading PNG file " << io_->path() << std::endl;
#endif
if (io_->open() != 0)
{
throw Error(kerDataSourceOpenFailed, io_->path(), strError());
}
IoCloser closer(*io_);
... | 263,518,100,976,085,800,000,000,000,000,000,000,000 | pngimage.cpp | 106,013,720,895,003,030,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2019-13108 | An integer overflow in Exiv2 through 0.27.1 allows an attacker to cause a denial of service (SIGSEGV) via a crafted PNG image file, because PngImage::readMetadata mishandles a zero value for iccOffset. | https://nvd.nist.gov/vuln/detail/CVE-2019-13108 |
295,834 | exiv2 | 8cd95e221889e41e9cc153e2cfb5a7b41c7bc7a4 | https://github.com/Exiv2/exiv2 | https://github.com/Exiv2/exiv2/commit/8cd95e221889e41e9cc153e2cfb5a7b41c7bc7a4 | Avoid negative integer overflow when `chunkLength == 0`.
This fixes #789. | 0 | void PngImage::readMetadata()
{
#ifdef DEBUG
std::cerr << "Exiv2::PngImage::readMetadata: Reading PNG file " << io_->path() << std::endl;
#endif
if (io_->open() != 0)
{
throw Error(kerDataSourceOpenFailed, io_->path(), strError());
}
IoCloser closer(*io_);
... | 274,068,357,431,769,030,000,000,000,000,000,000,000 | pngimage.cpp | 318,332,878,102,868,050,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2019-13108 | An integer overflow in Exiv2 through 0.27.1 allows an attacker to cause a denial of service (SIGSEGV) via a crafted PNG image file, because PngImage::readMetadata mishandles a zero value for iccOffset. | https://nvd.nist.gov/vuln/detail/CVE-2019-13108 |
199,956 | LibRaw | d75af00681a74dcc8b929207eb895611a6eceb68 | https://github.com/LibRaw/LibRaw | https://github.com/LibRaw/LibRaw/commit/d75af00681a74dcc8b929207eb895611a6eceb68 | X3F: check for data offset limit | 1 | static void huffman_decode_row(x3f_info_t *I, x3f_directory_entry_t *DE,
int bits, int row, int offset, int *minimum)
{
x3f_directory_entry_header_t *DEH = &DE->header;
x3f_image_data_t *ID = &DEH->data_subsection.image_data;
x3f_huffman_t *HUF = ID->huffman;
int16_t c[3] = {(int... | 248,462,862,487,553,540,000,000,000,000,000,000,000 | x3f_utils_patched.cpp | 215,312,530,865,932,760,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2020-35531 | In LibRaw, an out-of-bounds read vulnerability exists within the get_huffman_diff() function (libraw\src\x3f\x3f_utils_patched.cpp) when reading data from an image file. | https://nvd.nist.gov/vuln/detail/CVE-2020-35531 |
295,936 | LibRaw | d75af00681a74dcc8b929207eb895611a6eceb68 | https://github.com/LibRaw/LibRaw | https://github.com/LibRaw/LibRaw/commit/d75af00681a74dcc8b929207eb895611a6eceb68 | X3F: check for data offset limit | 0 | static void huffman_decode_row(x3f_info_t *I, x3f_directory_entry_t *DE,
int bits, int row, int offset, int *minimum)
{
x3f_directory_entry_header_t *DEH = &DE->header;
x3f_image_data_t *ID = &DEH->data_subsection.image_data;
x3f_huffman_t *HUF = ID->huffman;
int16_t c[3] = {(int... | 37,370,230,998,369,736,000,000,000,000,000,000,000 | x3f_utils_patched.cpp | 63,954,127,465,419,970,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2020-35531 | In LibRaw, an out-of-bounds read vulnerability exists within the get_huffman_diff() function (libraw\src\x3f\x3f_utils_patched.cpp) when reading data from an image file. | https://nvd.nist.gov/vuln/detail/CVE-2020-35531 |
199,985 | minetest | 3693b6871eba268ecc79b3f52d00d3cefe761131 | https://github.com/minetest/minetest | https://github.com/minetest/minetest/commit/3693b6871eba268ecc79b3f52d00d3cefe761131 | Prevent players accessing inventories of other players (#10341) | 1 | void Server::handleCommand_InventoryAction(NetworkPacket* pkt)
{
session_t peer_id = pkt->getPeerId();
RemotePlayer *player = m_env->getPlayer(peer_id);
if (player == NULL) {
errorstream <<
"Server::ProcessData(): Canceling: No player for peer_id=" <<
peer_id << " disconnecting peer!" << std::endl;
Discon... | 139,072,847,088,127,670,000,000,000,000,000,000,000 | None | null | [
"CWE-276"
] | CVE-2022-24301 | In Minetest before 5.4.0, players can add or subtract items from a different player's inventory. | https://nvd.nist.gov/vuln/detail/CVE-2022-24301 |
296,243 | minetest | 3693b6871eba268ecc79b3f52d00d3cefe761131 | https://github.com/minetest/minetest | https://github.com/minetest/minetest/commit/3693b6871eba268ecc79b3f52d00d3cefe761131 | Prevent players accessing inventories of other players (#10341) | 0 | void Server::handleCommand_InventoryAction(NetworkPacket* pkt)
{
session_t peer_id = pkt->getPeerId();
RemotePlayer *player = m_env->getPlayer(peer_id);
if (player == NULL) {
errorstream <<
"Server::ProcessData(): Canceling: No player for peer_id=" <<
peer_id << " disconnecting peer!" << std::endl;
Discon... | 217,177,551,758,341,330,000,000,000,000,000,000,000 | None | null | [
"CWE-276"
] | CVE-2022-24301 | In Minetest before 5.4.0, players can add or subtract items from a different player's inventory. | https://nvd.nist.gov/vuln/detail/CVE-2022-24301 |
199,986 | unbound | 6c3a0b54ed8ace93d5b5ca7b8078dc87e75cd640 | https://github.com/NLnetLabs/unbound | https://github.com/NLnetLabs/unbound/commit/6c3a0b54ed8ace93d5b5ca7b8078dc87e75cd640 | - Fix Out of Bound Write Compressed Names in rdata_copy(),
reported by X41 D-Sec. | 1 | rdata_copy(sldns_buffer* pkt, struct packed_rrset_data* data, uint8_t* to,
struct rr_parse* rr, time_t* rr_ttl, uint16_t type,
sldns_pkt_section section)
{
uint16_t pkt_len;
const sldns_rr_descriptor* desc;
*rr_ttl = sldns_read_uint32(rr->ttl_data);
/* RFC 2181 Section 8. if msb of ttl is set treat as if zero. ... | 225,733,226,937,555,900,000,000,000,000,000,000,000 | msgreply.c | 214,849,256,393,496,050,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2019-25042 | Unbound before 1.9.5 allows an out-of-bounds write via a compressed name in rdata_copy. NOTE: The vendor disputes that this is a vulnerability. Although the code may be vulnerable, a running Unbound installation cannot be remotely or locally exploited | https://nvd.nist.gov/vuln/detail/CVE-2019-25042 |
296,265 | unbound | 6c3a0b54ed8ace93d5b5ca7b8078dc87e75cd640 | https://github.com/NLnetLabs/unbound | https://github.com/NLnetLabs/unbound/commit/6c3a0b54ed8ace93d5b5ca7b8078dc87e75cd640 | - Fix Out of Bound Write Compressed Names in rdata_copy(),
reported by X41 D-Sec. | 0 | rdata_copy(sldns_buffer* pkt, struct packed_rrset_data* data, uint8_t* to,
struct rr_parse* rr, time_t* rr_ttl, uint16_t type,
sldns_pkt_section section)
{
uint16_t pkt_len;
const sldns_rr_descriptor* desc;
*rr_ttl = sldns_read_uint32(rr->ttl_data);
/* RFC 2181 Section 8. if msb of ttl is set treat as if zero. ... | 293,586,775,738,611,430,000,000,000,000,000,000,000 | msgreply.c | 11,463,230,551,593,550,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2019-25042 | Unbound before 1.9.5 allows an out-of-bounds write via a compressed name in rdata_copy. NOTE: The vendor disputes that this is a vulnerability. Although the code may be vulnerable, a running Unbound installation cannot be remotely or locally exploited | https://nvd.nist.gov/vuln/detail/CVE-2019-25042 |
199,988 | ImageMagick | c9c4ef4e7ca83d8a00effd16723f37946e89fbad | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/c9c4ef4e7ca83d8a00effd16723f37946e89fbad | Fixed leaking of the image when writing an MSL image (#1360). | 1 | static MagickBooleanType WriteMSLImage(const ImageInfo *image_info,Image *image,
ExceptionInfo *exception)
{
Image
*msl_image;
assert(image_info != (const ImageInfo *) NULL);
assert(image_info->signature == MagickCoreSignature);
assert(image != (Image *) NULL);
assert(image->signature == MagickCoreSign... | 325,662,881,280,661,380,000,000,000,000,000,000,000 | msl.c | 290,689,266,041,239,500,000,000,000,000,000,000,000 | [
"CWE-772"
] | CVE-2018-18544 | There is a memory leak in the function WriteMSLImage of coders/msl.c in ImageMagick 7.0.8-13 Q16, and the function ProcessMSLScript of coders/msl.c in GraphicsMagick before 1.3.31. | https://nvd.nist.gov/vuln/detail/CVE-2018-18544 |
296,362 | ImageMagick | c9c4ef4e7ca83d8a00effd16723f37946e89fbad | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/c9c4ef4e7ca83d8a00effd16723f37946e89fbad | Fixed leaking of the image when writing an MSL image (#1360). | 0 | static MagickBooleanType WriteMSLImage(const ImageInfo *image_info,Image *image,
ExceptionInfo *exception)
{
Image
*msl_image;
MagickBooleanType
status;
assert(image_info != (const ImageInfo *) NULL);
assert(image_info->signature == MagickCoreSignature);
assert(image != (Image *) NULL);
assert(i... | 132,036,712,771,961,850,000,000,000,000,000,000,000 | msl.c | 131,139,647,517,191,110,000,000,000,000,000,000,000 | [
"CWE-772"
] | CVE-2018-18544 | There is a memory leak in the function WriteMSLImage of coders/msl.c in ImageMagick 7.0.8-13 Q16, and the function ProcessMSLScript of coders/msl.c in GraphicsMagick before 1.3.31. | https://nvd.nist.gov/vuln/detail/CVE-2018-18544 |
199,990 | mutt | 3e88866dc60b5fa6aaba6fd7c1710c12c1c3cd01 | https://github.com/muttmua/mutt | https://github.com/muttmua/mutt/commit/3e88866dc60b5fa6aaba6fd7c1710c12c1c3cd01 | Prevent possible IMAP MITM via PREAUTH response.
This is similar to CVE-2014-2567 and CVE-2020-12398. STARTTLS is not
allowed in the Authenticated state, so previously Mutt would
implicitly mark the connection as authenticated and skip any
encryption checking/enabling.
No credentials are exposed, but it does allow m... | 1 | int imap_open_connection (IMAP_DATA* idata)
{
if (mutt_socket_open (idata->conn) < 0)
return -1;
idata->state = IMAP_CONNECTED;
if (imap_cmd_step (idata) != IMAP_CMD_OK)
{
imap_close_connection (idata);
return -1;
}
if (ascii_strncasecmp ("* OK", idata->buf, 4) == 0)
{
if (ascii_strncas... | 239,011,229,950,315,840,000,000,000,000,000,000,000 | imap.c | 168,104,471,985,458,160,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2020-14093 | Mutt before 1.14.3 allows an IMAP fcc/postpone man-in-the-middle attack via a PREAUTH response. | https://nvd.nist.gov/vuln/detail/CVE-2020-14093 |
296,385 | mutt | 3e88866dc60b5fa6aaba6fd7c1710c12c1c3cd01 | https://github.com/muttmua/mutt | https://github.com/muttmua/mutt/commit/3e88866dc60b5fa6aaba6fd7c1710c12c1c3cd01 | Prevent possible IMAP MITM via PREAUTH response.
This is similar to CVE-2014-2567 and CVE-2020-12398. STARTTLS is not
allowed in the Authenticated state, so previously Mutt would
implicitly mark the connection as authenticated and skip any
encryption checking/enabling.
No credentials are exposed, but it does allow m... | 0 | int imap_open_connection (IMAP_DATA* idata)
{
if (mutt_socket_open (idata->conn) < 0)
return -1;
idata->state = IMAP_CONNECTED;
if (imap_cmd_step (idata) != IMAP_CMD_OK)
{
imap_close_connection (idata);
return -1;
}
if (ascii_strncasecmp ("* OK", idata->buf, 4) == 0)
{
if (ascii_strncas... | 245,331,533,187,289,460,000,000,000,000,000,000,000 | imap.c | 129,429,986,447,982,740,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2020-14093 | Mutt before 1.14.3 allows an IMAP fcc/postpone man-in-the-middle attack via a PREAUTH response. | https://nvd.nist.gov/vuln/detail/CVE-2020-14093 |
199,991 | php-src | ddb207e7fa2e9adeba021a1303c3781efda5409b | https://github.com/php/php-src | http://git.php.net/?p=php-src.git;a=commit;h=ddb207e7fa2e9adeba021a1303c3781efda5409b | Fix bug #68113 (Heap corruption in exif_thumbnail()) | 1 | static void* exif_ifd_make_value(image_info_data *info_data, int motorola_intel TSRMLS_DC) {
size_t byte_count;
char *value_ptr, *data_ptr;
size_t i;
image_info_value *info_value;
byte_count = php_tiff_bytes_per_format[info_data->format] * info_data->length;
value_ptr = safe_emalloc(max(byte_count, 4), 1,... | 110,763,494,609,717,960,000,000,000,000,000,000,000 | exif.c | 186,615,590,368,290,900,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2014-3670 | The exif_ifd_make_value function in exif.c in the EXIF extension in PHP before 5.4.34, 5.5.x before 5.5.18, and 5.6.x before 5.6.2 operates on floating-point arrays incorrectly, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) or possibly execute arbitrary code v... | https://nvd.nist.gov/vuln/detail/CVE-2014-3670 |
296,434 | php-src | ddb207e7fa2e9adeba021a1303c3781efda5409b | https://github.com/php/php-src | http://git.php.net/?p=php-src.git;a=commit;h=ddb207e7fa2e9adeba021a1303c3781efda5409b | Fix bug #68113 (Heap corruption in exif_thumbnail()) | 0 | static void* exif_ifd_make_value(image_info_data *info_data, int motorola_intel TSRMLS_DC) {
size_t byte_count;
char *value_ptr, *data_ptr;
size_t i;
image_info_value *info_value;
byte_count = php_tiff_bytes_per_format[info_data->format] * info_data->length;
value_ptr = safe_emalloc(max(byte_count, 4), 1,... | 195,088,067,641,894,870,000,000,000,000,000,000,000 | exif.c | 234,617,860,043,523,420,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2014-3670 | The exif_ifd_make_value function in exif.c in the EXIF extension in PHP before 5.4.34, 5.5.x before 5.5.18, and 5.6.x before 5.6.2 operates on floating-point arrays incorrectly, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) or possibly execute arbitrary code v... | https://nvd.nist.gov/vuln/detail/CVE-2014-3670 |
199,992 | linux | a4270d6795b0580287453ea55974d948393e66ef | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a4270d6795b0580287453ea55974d948393e66ef | net-gro: fix use-after-free read in napi_gro_frags()
If a network driver provides to napi_gro_frags() an
skb with a page fragment of exactly 14 bytes, the call
to gro_pull_from_frag0() will 'consume' the fragment
by calling skb_frag_unref(skb, 0), and the page might
be freed and reused.
Reading eth->h_proto at the en... | 1 | */
static struct sk_buff *napi_frags_skb(struct napi_struct *napi)
{
struct sk_buff *skb = napi->skb;
const struct ethhdr *eth;
unsigned int hlen = sizeof(*eth);
napi->skb = NULL;
skb_reset_mac_header(skb);
skb_gro_reset_offset(skb);
eth = skb_gro_header_fast(skb, 0);
if (unlikely(skb_gro_header_hard(skb, h... | 86,396,011,475,118,980,000,000,000,000,000,000,000 | dev.c | 329,867,380,942,096,960,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2020-10720 | A flaw was found in the Linux kernel's implementation of GRO in versions before 5.2. This flaw allows an attacker with local access to crash the system. | https://nvd.nist.gov/vuln/detail/CVE-2020-10720 |
296,594 | linux | a4270d6795b0580287453ea55974d948393e66ef | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a4270d6795b0580287453ea55974d948393e66ef | net-gro: fix use-after-free read in napi_gro_frags()
If a network driver provides to napi_gro_frags() an
skb with a page fragment of exactly 14 bytes, the call
to gro_pull_from_frag0() will 'consume' the fragment
by calling skb_frag_unref(skb, 0), and the page might
be freed and reused.
Reading eth->h_proto at the en... | 0 | */
static struct sk_buff *napi_frags_skb(struct napi_struct *napi)
{
struct sk_buff *skb = napi->skb;
const struct ethhdr *eth;
unsigned int hlen = sizeof(*eth);
napi->skb = NULL;
skb_reset_mac_header(skb);
skb_gro_reset_offset(skb);
if (unlikely(skb_gro_header_hard(skb, hlen))) {
eth = skb_gro_header_slow... | 148,249,095,754,275,350,000,000,000,000,000,000,000 | dev.c | 87,252,252,672,007,420,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2020-10720 | A flaw was found in the Linux kernel's implementation of GRO in versions before 5.2. This flaw allows an attacker with local access to crash the system. | https://nvd.nist.gov/vuln/detail/CVE-2020-10720 |
200,017 | FreeRDP | 48361c411e50826cb602c7aab773a8a20e1da6bc | https://github.com/FreeRDP/FreeRDP | https://github.com/FreeRDP/FreeRDP/commit/48361c411e50826cb602c7aab773a8a20e1da6bc | Fixed GHSL-2020-100: oob read in ntlm_read_ChallengeMessage
* Added length checks for data read from stream
* Unified function resource cleanup
(cherry picked from commit 8357dedbbf7213b7d0d18f1026145b9a5b92235a) | 1 | SECURITY_STATUS ntlm_read_ChallengeMessage(NTLM_CONTEXT* context, PSecBuffer buffer)
{
wStream* s;
int length;
PBYTE StartOffset;
PBYTE PayloadOffset;
NTLM_AV_PAIR* AvTimestamp;
NTLM_CHALLENGE_MESSAGE* message;
ntlm_generate_client_challenge(context);
message = &context->CHALLENGE_MESSAGE;
ZeroMemory(message, ... | 284,903,934,741,011,240,000,000,000,000,000,000,000 | ntlm_message.c | 86,873,513,390,297,900,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2020-13396 | An issue was discovered in FreeRDP before 2.1.1. An out-of-bounds (OOB) read vulnerability has been detected in ntlm_read_ChallengeMessage in winpr/libwinpr/sspi/NTLM/ntlm_message.c. | https://nvd.nist.gov/vuln/detail/CVE-2020-13396 |
296,973 | FreeRDP | 48361c411e50826cb602c7aab773a8a20e1da6bc | https://github.com/FreeRDP/FreeRDP | https://github.com/FreeRDP/FreeRDP/commit/48361c411e50826cb602c7aab773a8a20e1da6bc | Fixed GHSL-2020-100: oob read in ntlm_read_ChallengeMessage
* Added length checks for data read from stream
* Unified function resource cleanup
(cherry picked from commit 8357dedbbf7213b7d0d18f1026145b9a5b92235a) | 0 | SECURITY_STATUS ntlm_read_ChallengeMessage(NTLM_CONTEXT* context, PSecBuffer buffer)
{
SECURITY_STATUS status = SEC_E_INVALID_TOKEN;
wStream* s;
size_t length;
size_t StartOffset;
size_t PayloadOffset;
NTLM_AV_PAIR* AvTimestamp;
NTLM_CHALLENGE_MESSAGE* message;
if (!context || !buffer)
return SEC_E_INTERNAL_E... | 52,082,019,609,251,720,000,000,000,000,000,000,000 | ntlm_message.c | 6,852,978,945,512,420,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2020-13396 | An issue was discovered in FreeRDP before 2.1.1. An out-of-bounds (OOB) read vulnerability has been detected in ntlm_read_ChallengeMessage in winpr/libwinpr/sspi/NTLM/ntlm_message.c. | https://nvd.nist.gov/vuln/detail/CVE-2020-13396 |
200,019 | systemd | 8523bf7dd514a3a2c6114b7b8fb8f308b4f09fc4 | https://github.com/systemd/systemd | https://github.com/systemd/systemd/commit/8523bf7dd514a3a2c6114b7b8fb8f308b4f09fc4 | pid1: process zero-length notification messages again
This undoes 531ac2b234. I acked that patch without looking at the code
carefully enough. There are two problems:
- we want to process the fds anyway
- in principle empty notification messages are valid, and we should
process them as usual, including logging using... | 1 | static void manager_invoke_notify_message(Manager *m, Unit *u, pid_t pid, const char *buf, size_t n, FDSet *fds) {
_cleanup_strv_free_ char **tags = NULL;
assert(m);
assert(u);
assert(buf);
assert(n > 0);
tags = strv_split(buf, "\n\r");
if (!tags) {
... | 64,035,163,648,495,220,000,000,000,000,000,000,000 | manager.c | 12,985,016,660,429,998,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2016-7795 | The manager_invoke_notify_message function in systemd 231 and earlier allows local users to cause a denial of service (assertion failure and PID 1 hang) via a zero-length message received over a notify socket. | https://nvd.nist.gov/vuln/detail/CVE-2016-7795 |
297,048 | systemd | 8523bf7dd514a3a2c6114b7b8fb8f308b4f09fc4 | https://github.com/systemd/systemd | https://github.com/systemd/systemd/commit/8523bf7dd514a3a2c6114b7b8fb8f308b4f09fc4 | pid1: process zero-length notification messages again
This undoes 531ac2b234. I acked that patch without looking at the code
carefully enough. There are two problems:
- we want to process the fds anyway
- in principle empty notification messages are valid, and we should
process them as usual, including logging using... | 0 | static void manager_invoke_notify_message(Manager *m, Unit *u, pid_t pid, const char *buf, FDSet *fds) {
_cleanup_strv_free_ char **tags = NULL;
assert(m);
assert(u);
assert(buf);
tags = strv_split(buf, "\n\r");
if (!tags) {
log_oom();
re... | 178,950,737,878,593,330,000,000,000,000,000,000,000 | manager.c | 45,947,417,525,311,640,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2016-7795 | The manager_invoke_notify_message function in systemd 231 and earlier allows local users to cause a denial of service (assertion failure and PID 1 hang) via a zero-length message received over a notify socket. | https://nvd.nist.gov/vuln/detail/CVE-2016-7795 |
200,110 | freeradius-server | 78e5aed56c36a9231bc91ea5f55b3edf88a9d2a4 | https://github.com/alandekok/freeradius-server | https://github.com/alandekok/freeradius-server/commit/78e5aed56c36a9231bc91ea5f55b3edf88a9d2a4 | Fix CVE-2012-3547. Found by Timo Warns | 1 | static int cbtls_verify(int ok, X509_STORE_CTX *ctx)
{
char subject[1024]; /* Used for the subject name */
char issuer[1024]; /* Used for the issuer name */
char common_name[1024];
char cn_str[1024];
char buf[64];
EAP_HANDLER *handler = NULL;
X509 *client_cert;
X509 *issuer_cert;
SSL *ssl;
int err, depth, loo... | 298,638,951,137,610,500,000,000,000,000,000,000,000 | rlm_eap_tls.c | 182,605,369,891,692,850,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2012-3547 | Stack-based buffer overflow in the cbtls_verify function in FreeRADIUS 2.1.10 through 2.1.12, when using TLS-based EAP methods, allows remote attackers to cause a denial of service (server crash) and possibly execute arbitrary code via a long "not after" timestamp in a client certificate. | https://nvd.nist.gov/vuln/detail/CVE-2012-3547 |
299,225 | freeradius-server | 78e5aed56c36a9231bc91ea5f55b3edf88a9d2a4 | https://github.com/alandekok/freeradius-server | https://github.com/alandekok/freeradius-server/commit/78e5aed56c36a9231bc91ea5f55b3edf88a9d2a4 | Fix CVE-2012-3547. Found by Timo Warns | 0 | static int cbtls_verify(int ok, X509_STORE_CTX *ctx)
{
char subject[1024]; /* Used for the subject name */
char issuer[1024]; /* Used for the issuer name */
char common_name[1024];
char cn_str[1024];
char buf[64];
EAP_HANDLER *handler = NULL;
X509 *client_cert;
X509 *issuer_cert;
SSL *ssl;
int err, depth, loo... | 100,986,151,700,807,820,000,000,000,000,000,000,000 | rlm_eap_tls.c | 135,251,734,557,730,480,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2012-3547 | Stack-based buffer overflow in the cbtls_verify function in FreeRADIUS 2.1.10 through 2.1.12, when using TLS-based EAP methods, allows remote attackers to cause a denial of service (server crash) and possibly execute arbitrary code via a long "not after" timestamp in a client certificate. | https://nvd.nist.gov/vuln/detail/CVE-2012-3547 |
200,111 | rizin | e645e5827327d945307ddfde4f617ae4c36561fd | https://github.com/rizinorg/rizin | https://github.com/rizinorg/rizin/commit/e645e5827327d945307ddfde4f617ae4c36561fd | Fix the crash caused by get_long_object() #2739 from PeiweiHu/Peiwei_0625 | 1 | static pyc_object *get_long_object(RzBuffer *buffer) {
pyc_object *ret = NULL;
bool error = false;
bool neg = false;
ut32 tmp = 0;
size_t size;
size_t i, j = 0, left = 0;
ut32 n;
char *hexstr;
char digist2hex[] = "0123456789abcdef";
st32 ndigits = get_st32(buffer, &error);
if (error) {
return NULL;
}
re... | 15,412,980,705,336,662,000,000,000,000,000,000,000 | marshal.c | 111,062,423,485,631,560,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2022-34612 | Rizin v0.4.0 and below was discovered to contain an integer overflow via the function get_long_object(). This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted binary. | https://nvd.nist.gov/vuln/detail/CVE-2022-34612 |
299,267 | rizin | e645e5827327d945307ddfde4f617ae4c36561fd | https://github.com/rizinorg/rizin | https://github.com/rizinorg/rizin/commit/e645e5827327d945307ddfde4f617ae4c36561fd | Fix the crash caused by get_long_object() #2739 from PeiweiHu/Peiwei_0625 | 0 | static pyc_object *get_long_object(RzBuffer *buffer) {
pyc_object *ret = NULL;
bool error = false;
bool neg = false;
ut32 tmp = 0;
size_t size;
size_t i, j = 0, left = 0;
ut32 n;
char *hexstr;
char digist2hex[] = "0123456789abcdef";
st32 ndigits = get_st32(buffer, &error);
if (error) {
return NULL;
}
re... | 33,665,691,511,049,725,000,000,000,000,000,000,000 | marshal.c | 90,927,857,235,340,200,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2022-34612 | Rizin v0.4.0 and below was discovered to contain an integer overflow via the function get_long_object(). This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted binary. | https://nvd.nist.gov/vuln/detail/CVE-2022-34612 |
200,137 | samba | 0998f2f1bced019db4000ef4b55887abcb65f6d2 | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commitdiff;h=0998f2f1bced019db4000ef4b55887abcb65f6d2 | CVE-2018-1140 Add NULL check for ldb_dn_get_casefold() in ltdb_index_dn_attr()
Signed-off-by: Andrej Gessel <Andrej.Gessel@janztec.com>
Reviewed-by: Douglas Bagnall <douglas.bagnall@catalyst.net.nz>
Reviewed-by: Andrew Bartlett <abartlet@samba.org>
BUG: https://bugzilla.samba.org/show_bug.cgi?id=13374 | 1 | static int ldb_kv_index_dn_attr(struct ldb_module *module,
struct ldb_kv_private *ldb_kv,
const char *attr,
struct ldb_dn *dn,
struct dn_list *list,
enum key_truncation *truncation)
{
struct ldb_context *ldb;
struct ldb_dn *key;
struct ldb_val val;
int ret;
ldb = ldb_module_get_ctx(module);
... | 220,384,429,459,751,030,000,000,000,000,000,000,000 | ldb_kv_index.c | 320,610,539,628,386,840,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2018-1140 | A missing input sanitization flaw was found in the implementation of LDP database used for the LDAP server. An attacker could use this flaw to cause a denial of service against a samba server, used as a Active Directory Domain Controller. All versions of Samba from 4.8.0 onwards are vulnerable | https://nvd.nist.gov/vuln/detail/CVE-2018-1140 |
299,570 | samba | 0998f2f1bced019db4000ef4b55887abcb65f6d2 | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commitdiff;h=0998f2f1bced019db4000ef4b55887abcb65f6d2 | CVE-2018-1140 Add NULL check for ldb_dn_get_casefold() in ltdb_index_dn_attr()
Signed-off-by: Andrej Gessel <Andrej.Gessel@janztec.com>
Reviewed-by: Douglas Bagnall <douglas.bagnall@catalyst.net.nz>
Reviewed-by: Andrew Bartlett <abartlet@samba.org>
BUG: https://bugzilla.samba.org/show_bug.cgi?id=13374 | 0 | static int ldb_kv_index_dn_attr(struct ldb_module *module,
struct ldb_kv_private *ldb_kv,
const char *attr,
struct ldb_dn *dn,
struct dn_list *list,
enum key_truncation *truncation)
{
struct ldb_context *ldb;
struct ldb_dn *key;
struct ldb_val val;
int ret;
ldb = ldb_module_get_ctx(module);
... | 283,558,677,924,519,300,000,000,000,000,000,000,000 | ldb_kv_index.c | 48,785,706,462,409,100,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2018-1140 | A missing input sanitization flaw was found in the implementation of LDP database used for the LDAP server. An attacker could use this flaw to cause a denial of service against a samba server, used as a Active Directory Domain Controller. All versions of Samba from 4.8.0 onwards are vulnerable | https://nvd.nist.gov/vuln/detail/CVE-2018-1140 |
200,162 | ImageMagick | ece953bbe14e8514afc23e05e4030eea872e29da | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/ece953bbe14e8514afc23e05e4030eea872e29da | https://github.com/ImageMagick/ImageMagick/issues/878 | 1 | static Image *ReadMATImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
Image *image, *image2=NULL,
*rotated_image;
register Quantum *q;
unsigned int status;
MATHeader MATLAB_HDR;
size_t size;
size_t CellType;
QuantumInfo *quantum_info;
ImageInfo *clone_info;
int i;
ssize_t ldblk;
u... | 308,573,039,927,801,320,000,000,000,000,000,000,000 | mat.c | 307,733,982,001,228,800,000,000,000,000,000,000,000 | [
"CWE-772"
] | CVE-2017-17881 | In ImageMagick 7.0.7-12 Q16, a memory leak vulnerability was found in the function ReadMATImage in coders/mat.c, which allows attackers to cause a denial of service via a crafted MAT image file. | https://nvd.nist.gov/vuln/detail/CVE-2017-17881 |
299,974 | ImageMagick | ece953bbe14e8514afc23e05e4030eea872e29da | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/ece953bbe14e8514afc23e05e4030eea872e29da | https://github.com/ImageMagick/ImageMagick/issues/878 | 0 | static Image *ReadMATImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
Image *image, *image2=NULL,
*rotated_image;
register Quantum *q;
unsigned int status;
MATHeader MATLAB_HDR;
size_t size;
size_t CellType;
QuantumInfo *quantum_info;
ImageInfo *clone_info;
int i;
ssize_t ldblk;
u... | 269,268,569,034,054,750,000,000,000,000,000,000,000 | mat.c | 45,932,851,287,531,940,000,000,000,000,000,000,000 | [
"CWE-772"
] | CVE-2017-17881 | In ImageMagick 7.0.7-12 Q16, a memory leak vulnerability was found in the function ReadMATImage in coders/mat.c, which allows attackers to cause a denial of service via a crafted MAT image file. | https://nvd.nist.gov/vuln/detail/CVE-2017-17881 |
200,164 | iproute2 | 9bf2c538a0eb10d66e2365a655bf6c52f5ba3d10 | https://git.kernel.org/pub/scm/network/iproute2/iproute2 | https://git.kernel.org/pub/scm/network/iproute2/iproute2.git/commit/?id=9bf2c538a0eb10d66e2365a655bf6c52f5ba3d10 | ipnetns: use-after-free problem in get_netnsid_from_name func
Follow the following steps:
# ip netns add net1
# export MALLOC_MMAP_THRESHOLD_=0
# ip netns list
then Segmentation fault (core dumped) will occur.
In get_netnsid_from_name func, answer is freed before
rta_getattr_u32(tb[NETNSA_NSID]), where tb[] refers... | 1 | int get_netnsid_from_name(const char *name)
{
struct {
struct nlmsghdr n;
struct rtgenmsg g;
char buf[1024];
} req = {
.n.nlmsg_len = NLMSG_LENGTH(sizeof(struct rtgenmsg)),
.n.nlmsg_flags = NLM_F_REQUEST,
.n.nlmsg_type = RTM_GETNSID,
.g.rtgen_family = AF_UNSPEC,
};
struct nlmsghdr *answer;
... | 259,273,742,590,236,300,000,000,000,000,000,000,000 | ipnetns.c | 303,745,654,516,366,900,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2019-20795 | iproute2 before 5.1.0 has a use-after-free in get_netnsid_from_name in ip/ipnetns.c. NOTE: security relevance may be limited to certain uses of setuid that, although not a default, are sometimes a configuration option offered to end users. Even when setuid is used, other factors (such as C library configuration) may bl... | https://nvd.nist.gov/vuln/detail/CVE-2019-20795 |
299,998 | iproute2 | 9bf2c538a0eb10d66e2365a655bf6c52f5ba3d10 | https://git.kernel.org/pub/scm/network/iproute2/iproute2 | https://git.kernel.org/pub/scm/network/iproute2/iproute2.git/commit/?id=9bf2c538a0eb10d66e2365a655bf6c52f5ba3d10 | ipnetns: use-after-free problem in get_netnsid_from_name func
Follow the following steps:
# ip netns add net1
# export MALLOC_MMAP_THRESHOLD_=0
# ip netns list
then Segmentation fault (core dumped) will occur.
In get_netnsid_from_name func, answer is freed before
rta_getattr_u32(tb[NETNSA_NSID]), where tb[] refers... | 0 | int get_netnsid_from_name(const char *name)
{
struct {
struct nlmsghdr n;
struct rtgenmsg g;
char buf[1024];
} req = {
.n.nlmsg_len = NLMSG_LENGTH(sizeof(struct rtgenmsg)),
.n.nlmsg_flags = NLM_F_REQUEST,
.n.nlmsg_type = RTM_GETNSID,
.g.rtgen_family = AF_UNSPEC,
};
struct nlmsghdr *answer;
... | 115,794,200,926,041,220,000,000,000,000,000,000,000 | ipnetns.c | 322,488,372,658,257,760,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2019-20795 | iproute2 before 5.1.0 has a use-after-free in get_netnsid_from_name in ip/ipnetns.c. NOTE: security relevance may be limited to certain uses of setuid that, although not a default, are sometimes a configuration option offered to end users. Even when setuid is used, other factors (such as C library configuration) may bl... | https://nvd.nist.gov/vuln/detail/CVE-2019-20795 |
200,257 | linux | 84c4e1f89fefe70554da0ab33be72c9be7994379 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=84c4e1f89fefe70554da0ab33be72c9be7994379 | aio: simplify - and fix - fget/fput for io_submit()
Al Viro root-caused a race where the IOCB_CMD_POLL handling of
fget/fput() could cause us to access the file pointer after it had
already been freed:
"In more details - normally IOCB_CMD_POLL handling looks so:
1) io_submit(2) allocates aio_kiocb instance and p... | 1 | static ssize_t aio_poll(struct aio_kiocb *aiocb, const struct iocb *iocb)
{
struct kioctx *ctx = aiocb->ki_ctx;
struct poll_iocb *req = &aiocb->poll;
struct aio_poll_table apt;
__poll_t mask;
/* reject any unknown events outside the normal event mask. */
if ((u16)iocb->aio_buf != iocb->aio_buf)
return -EINVAL;... | 52,789,249,231,058,420,000,000,000,000,000,000,000 | aio.c | 67,431,265,602,198,260,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2019-10125 | An issue was discovered in aio_poll() in fs/aio.c in the Linux kernel through 5.0.4. A file may be released by aio_poll_wake() if an expected event is triggered immediately (e.g., by the close of a pair of pipes) after the return of vfs_poll(), and this will cause a use-after-free. | https://nvd.nist.gov/vuln/detail/CVE-2019-10125 |
300,696 | linux | 84c4e1f89fefe70554da0ab33be72c9be7994379 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=84c4e1f89fefe70554da0ab33be72c9be7994379 | aio: simplify - and fix - fget/fput for io_submit()
Al Viro root-caused a race where the IOCB_CMD_POLL handling of
fget/fput() could cause us to access the file pointer after it had
already been freed:
"In more details - normally IOCB_CMD_POLL handling looks so:
1) io_submit(2) allocates aio_kiocb instance and p... | 0 | static ssize_t aio_poll(struct aio_kiocb *aiocb, const struct iocb *iocb)
{
struct kioctx *ctx = aiocb->ki_ctx;
struct poll_iocb *req = &aiocb->poll;
struct aio_poll_table apt;
__poll_t mask;
/* reject any unknown events outside the normal event mask. */
if ((u16)iocb->aio_buf != iocb->aio_buf)
return -EINVAL;... | 112,027,450,340,998,470,000,000,000,000,000,000,000 | aio.c | 255,263,946,414,536,040,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2019-10125 | An issue was discovered in aio_poll() in fs/aio.c in the Linux kernel through 5.0.4. A file may be released by aio_poll_wake() if an expected event is triggered immediately (e.g., by the close of a pair of pipes) after the return of vfs_poll(), and this will cause a use-after-free. | https://nvd.nist.gov/vuln/detail/CVE-2019-10125 |
200,284 | libtorrent | debf3c6e3688aab8394fe5c47737625faffe6f9e | https://github.com/arvidn/libtorrent | https://github.com/arvidn/libtorrent/commit/debf3c6e3688aab8394fe5c47737625faffe6f9e | update puff.c for gzip inflation (#1022)
update puff.c for gzip inflation | 1 | local int construct(struct huffman *h, boost::int16_t *length, int n)
{
int symbol; /* current symbol when stepping through length[] */
int len; /* current length when stepping through h->count[] */
int left; /* number of possible codes left of current length */
boost::int16_t... | 194,923,232,573,407,100,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2016-7164 | The construct function in puff.cpp in Libtorrent 1.1.0 allows remote torrent trackers to cause a denial of service (segmentation fault and crash) via a crafted GZIP response. | https://nvd.nist.gov/vuln/detail/CVE-2016-7164 |
300,724 | libtorrent | debf3c6e3688aab8394fe5c47737625faffe6f9e | https://github.com/arvidn/libtorrent | https://github.com/arvidn/libtorrent/commit/debf3c6e3688aab8394fe5c47737625faffe6f9e | update puff.c for gzip inflation (#1022)
update puff.c for gzip inflation | 0 | local int construct(struct huffman *h, const short *length, int n)
{
int symbol; /* current symbol when stepping through length[] */
int len; /* current length when stepping through h->count[] */
int left; /* number of possible codes left of current length */
short offs[MAXB... | 332,996,753,655,560,400,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2016-7164 | The construct function in puff.cpp in Libtorrent 1.1.0 allows remote torrent trackers to cause a denial of service (segmentation fault and crash) via a crafted GZIP response. | https://nvd.nist.gov/vuln/detail/CVE-2016-7164 |
200,298 | poppler | fada09a2ccc11a3a1d308e810f1336d8df6011fd | https://github.com/freedesktop/poppler | https://gitlab.freedesktop.org/poppler/poppler/commit/fada09a2ccc11a3a1d308e810f1336d8df6011fd | pdfunite: Fix stack overflow on broken file
Fixes issue #741 | 1 | void PDFDoc::markObject (Object* obj, XRef *xRef, XRef *countRef, unsigned int numOffset, int oldRefNum, int newRefNum, std::set<Dict*> *alreadyMarkedDicts)
{
Array *array;
switch (obj->getType()) {
case objArray:
array = obj->getArray();
for (int i=0; i<array->getLength(); i++) {
Object ob... | 254,448,505,263,979,950,000,000,000,000,000,000,000 | PDFDoc.cc | 75,877,226,484,140,360,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2019-9903 | PDFDoc::markObject in PDFDoc.cc in Poppler 0.74.0 mishandles dict marking, leading to stack consumption in the function Dict::find() located at Dict.cc, which can (for example) be triggered by passing a crafted pdf file to the pdfunite binary. | https://nvd.nist.gov/vuln/detail/CVE-2019-9903 |
300,917 | poppler | fada09a2ccc11a3a1d308e810f1336d8df6011fd | https://github.com/freedesktop/poppler | https://gitlab.freedesktop.org/poppler/poppler/commit/fada09a2ccc11a3a1d308e810f1336d8df6011fd | pdfunite: Fix stack overflow on broken file
Fixes issue #741 | 0 | void PDFDoc::markObject (Object* obj, XRef *xRef, XRef *countRef, unsigned int numOffset, int oldRefNum, int newRefNum, std::set<Dict*> *alreadyMarkedDicts)
{
Array *array;
switch (obj->getType()) {
case objArray:
array = obj->getArray();
for (int i=0; i<array->getLength(); i++) {
Object ob... | 241,662,039,262,682,230,000,000,000,000,000,000,000 | PDFDoc.cc | 150,861,618,593,089,140,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2019-9903 | PDFDoc::markObject in PDFDoc.cc in Poppler 0.74.0 mishandles dict marking, leading to stack consumption in the function Dict::find() located at Dict.cc, which can (for example) be triggered by passing a crafted pdf file to the pdfunite binary. | https://nvd.nist.gov/vuln/detail/CVE-2019-9903 |
200,313 | ImageMagick | ee3dae8624e69261760754442827aea4d0254a6f | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/ee3dae8624e69261760754442827aea4d0254a6f | https://github.com/ImageMagick/ImageMagick/issues/1522 | 1 | MagickExport Image *AcquireImage(const ImageInfo *image_info,
ExceptionInfo *exception)
{
const char
*option;
Image
*image;
MagickStatusType
flags;
/*
Allocate image structure.
*/
(void) LogMagickEvent(TraceEvent,GetMagickModule(),"...");
image=(Image *) AcquireCriticalMemory(sizeof(*... | 96,392,906,066,319,790,000,000,000,000,000,000,000 | image.c | 84,376,712,040,828,030,000,000,000,000,000,000,000 | [
"CWE-665"
] | CVE-2019-12979 | ImageMagick 7.0.8-34 has a "use of uninitialized value" vulnerability in the SyncImageSettings function in MagickCore/image.c. This is related to AcquireImage in magick/image.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-12979 |
301,194 | ImageMagick | ee3dae8624e69261760754442827aea4d0254a6f | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/ee3dae8624e69261760754442827aea4d0254a6f | https://github.com/ImageMagick/ImageMagick/issues/1522 | 0 | MagickExport Image *AcquireImage(const ImageInfo *image_info,
ExceptionInfo *exception)
{
const char
*option;
Image
*image;
MagickStatusType
flags;
/*
Allocate image structure.
*/
(void) LogMagickEvent(TraceEvent,GetMagickModule(),"...");
image=(Image *) AcquireCriticalMemory(sizeof(*... | 319,960,257,132,066,500,000,000,000,000,000,000,000 | image.c | 32,404,354,403,244,286,000,000,000,000,000,000,000 | [
"CWE-665"
] | CVE-2019-12979 | ImageMagick 7.0.8-34 has a "use of uninitialized value" vulnerability in the SyncImageSettings function in MagickCore/image.c. This is related to AcquireImage in magick/image.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-12979 |
200,314 | linux | 44efc269db7929f6275a1fa927ef082e533ecde0 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=44efc269db7929f6275a1fa927ef082e533ecde0 | USB: adutux: fix use-after-free on disconnect
The driver was clearing its struct usb_device pointer, which it used as
an inverted disconnected flag, before deregistering the character device
and without serialising against racing release().
This could lead to a use-after-free if a racing release() callback
observes t... | 1 | static void adu_disconnect(struct usb_interface *interface)
{
struct adu_device *dev;
dev = usb_get_intfdata(interface);
mutex_lock(&dev->mtx); /* not interruptible */
dev->udev = NULL; /* poison */
usb_deregister_dev(interface, &adu_class);
mutex_unlock(&dev->mtx);
mutex_lock(&adutux_mutex);
usb_set_intfdat... | 207,316,202,012,655,220,000,000,000,000,000,000,000 | None | null | [
"CWE-416"
] | CVE-2019-19523 | In the Linux kernel before 5.3.7, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/adutux.c driver, aka CID-44efc269db79. | https://nvd.nist.gov/vuln/detail/CVE-2019-19523 |
301,205 | linux | 44efc269db7929f6275a1fa927ef082e533ecde0 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=44efc269db7929f6275a1fa927ef082e533ecde0 | USB: adutux: fix use-after-free on disconnect
The driver was clearing its struct usb_device pointer, which it used as
an inverted disconnected flag, before deregistering the character device
and without serialising against racing release().
This could lead to a use-after-free if a racing release() callback
observes t... | 0 | static void adu_disconnect(struct usb_interface *interface)
{
struct adu_device *dev;
dev = usb_get_intfdata(interface);
usb_deregister_dev(interface, &adu_class);
mutex_lock(&adutux_mutex);
usb_set_intfdata(interface, NULL);
mutex_lock(&dev->mtx); /* not interruptible */
dev->udev = NULL; /* poison */
mute... | 317,465,483,549,762,100,000,000,000,000,000,000,000 | None | null | [
"CWE-416"
] | CVE-2019-19523 | In the Linux kernel before 5.3.7, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/adutux.c driver, aka CID-44efc269db79. | https://nvd.nist.gov/vuln/detail/CVE-2019-19523 |
200,319 | net | 425aa0e1d01513437668fa3d4a971168bbaa8515 | https://git.kernel.org/cgit/linux/kernel/git/davem/net | https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=425aa0e1d01513437668fa3d4a971168bbaa8515 | ip_sockglue: Fix missing-check bug in ip_ra_control()
In function ip_ra_control(), the pointer new_ra is allocated a memory
space via kmalloc(). And it is used in the following codes. However,
when there is a memory allocation error, kmalloc() fails. Thus null
pointer dereference may happen. And it will cause the ker... | 1 | int ip_ra_control(struct sock *sk, unsigned char on,
void (*destructor)(struct sock *))
{
struct ip_ra_chain *ra, *new_ra;
struct ip_ra_chain __rcu **rap;
struct net *net = sock_net(sk);
if (sk->sk_type != SOCK_RAW || inet_sk(sk)->inet_num == IPPROTO_RAW)
return -EINVAL;
new_ra = on ? kmalloc(sizeof(*new_r... | 186,977,643,023,068,020,000,000,000,000,000,000,000 | ip_sockglue.c | 267,466,980,647,864,520,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2019-12381 | An issue was discovered in ip_ra_control in net/ipv4/ip_sockglue.c in the Linux kernel through 5.1.5. There is an unchecked kmalloc of new_ra, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash). NOTE: this is disputed because new_ra is never used if it is NULL | https://nvd.nist.gov/vuln/detail/CVE-2019-12381 |
301,320 | net | 425aa0e1d01513437668fa3d4a971168bbaa8515 | https://git.kernel.org/cgit/linux/kernel/git/davem/net | https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=425aa0e1d01513437668fa3d4a971168bbaa8515 | ip_sockglue: Fix missing-check bug in ip_ra_control()
In function ip_ra_control(), the pointer new_ra is allocated a memory
space via kmalloc(). And it is used in the following codes. However,
when there is a memory allocation error, kmalloc() fails. Thus null
pointer dereference may happen. And it will cause the ker... | 0 | int ip_ra_control(struct sock *sk, unsigned char on,
void (*destructor)(struct sock *))
{
struct ip_ra_chain *ra, *new_ra;
struct ip_ra_chain __rcu **rap;
struct net *net = sock_net(sk);
if (sk->sk_type != SOCK_RAW || inet_sk(sk)->inet_num == IPPROTO_RAW)
return -EINVAL;
new_ra = on ? kmalloc(sizeof(*new_r... | 191,145,499,404,838,560,000,000,000,000,000,000,000 | ip_sockglue.c | 330,575,274,490,289,900,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2019-12381 | An issue was discovered in ip_ra_control in net/ipv4/ip_sockglue.c in the Linux kernel through 5.1.5. There is an unchecked kmalloc of new_ra, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash). NOTE: this is disputed because new_ra is never used if it is NULL | https://nvd.nist.gov/vuln/detail/CVE-2019-12381 |
200,370 | grub | ac8cac1dac50daaf1c390d701cca3b55e16ee768 | http://git.savannah.gnu.org/cgit/grub | https://git.savannah.gnu.org/cgit/grub.git/commit/grub-core/fs/ext2.c?id=ac8cac1dac50daaf1c390d701cca3b55e16ee768 | * grub-core/fs/ext2.c: Remove variable length arrays. | 1 | grub_ext2_read_block (grub_fshelp_node_t node, grub_disk_addr_t fileblock)
{
struct grub_ext2_data *data = node->data;
struct grub_ext2_inode *inode = &node->inode;
grub_disk_addr_t blknr = -1;
unsigned int blksz = EXT2_BLOCK_SIZE (data);
int log2_blksz = LOG2_EXT2_BLOCK_SIZE (data);
if (inode->flags & gru... | 336,126,367,902,330,660,000,000,000,000,000,000,000 | ext2.c | 329,149,131,028,531,700,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-9763 | The grub_ext2_read_block function in fs/ext2.c in GNU GRUB before 2013-11-12, as used in shlr/grub/fs/ext2.c in radare2 1.5.0, allows remote attackers to cause a denial of service (excessive stack use and application crash) via a crafted binary file, related to use of a variable-size stack array. | https://nvd.nist.gov/vuln/detail/CVE-2017-9763 |
301,811 | grub | ac8cac1dac50daaf1c390d701cca3b55e16ee768 | http://git.savannah.gnu.org/cgit/grub | https://git.savannah.gnu.org/cgit/grub.git/commit/grub-core/fs/ext2.c?id=ac8cac1dac50daaf1c390d701cca3b55e16ee768 | * grub-core/fs/ext2.c: Remove variable length arrays. | 0 | grub_ext2_read_block (grub_fshelp_node_t node, grub_disk_addr_t fileblock)
{
struct grub_ext2_data *data = node->data;
struct grub_ext2_inode *inode = &node->inode;
grub_disk_addr_t blknr = -1;
unsigned int blksz = EXT2_BLOCK_SIZE (data);
int log2_blksz = LOG2_EXT2_BLOCK_SIZE (data);
if (inode->flags & gru... | 201,726,576,636,651,750,000,000,000,000,000,000,000 | ext2.c | 193,620,740,563,021,640,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-9763 | The grub_ext2_read_block function in fs/ext2.c in GNU GRUB before 2013-11-12, as used in shlr/grub/fs/ext2.c in radare2 1.5.0, allows remote attackers to cause a denial of service (excessive stack use and application crash) via a crafted binary file, related to use of a variable-size stack array. | https://nvd.nist.gov/vuln/detail/CVE-2017-9763 |
200,371 | ipmitool | 840fb1cbb4fb365cb9797300e3374d4faefcdb10 | https://github.com/ipmitool/ipmitool | https://github.com/ipmitool/ipmitool/commit/840fb1cbb4fb365cb9797300e3374d4faefcdb10 | fru: Fix buffer overflow in ipmi_spd_print_fru
Partial fix for CVE-2020-5208, see
https://github.com/ipmitool/ipmitool/security/advisories/GHSA-g659-9qxw-p7cp
The `ipmi_spd_print_fru` function has a similar issue as the one fixed
by the previous commit in `read_fru_area_section`. An initial request is
made to get the... | 1 | ipmi_spd_print_fru(struct ipmi_intf * intf, uint8_t id)
{
struct ipmi_rs * rsp;
struct ipmi_rq req;
struct fru_info fru;
uint8_t *spd_data, msg_data[4];
int len, offset;
msg_data[0] = id;
memset(&req, 0, sizeof(req));
req.msg.netfn = IPMI_NETFN_STORAGE;
req.msg.cmd = GET_FRU_INFO;
req.msg.data = msg_data;
... | 111,696,673,379,626,610,000,000,000,000,000,000,000 | dimm_spd.c | 220,411,030,797,792,900,000,000,000,000,000,000,000 | [
"CWE-120"
] | CVE-2020-5208 | It's been found that multiple functions in ipmitool before 1.8.19 neglect proper checking of the data received from a remote LAN party, which may lead to buffer overflows and potentially to remote code execution on the ipmitool side. This is especially dangerous if ipmitool is run as a privileged user. This problem is ... | https://nvd.nist.gov/vuln/detail/CVE-2020-5208 |
301,823 | ipmitool | 840fb1cbb4fb365cb9797300e3374d4faefcdb10 | https://github.com/ipmitool/ipmitool | https://github.com/ipmitool/ipmitool/commit/840fb1cbb4fb365cb9797300e3374d4faefcdb10 | fru: Fix buffer overflow in ipmi_spd_print_fru
Partial fix for CVE-2020-5208, see
https://github.com/ipmitool/ipmitool/security/advisories/GHSA-g659-9qxw-p7cp
The `ipmi_spd_print_fru` function has a similar issue as the one fixed
by the previous commit in `read_fru_area_section`. An initial request is
made to get the... | 0 | ipmi_spd_print_fru(struct ipmi_intf * intf, uint8_t id)
{
struct ipmi_rs * rsp;
struct ipmi_rq req;
struct fru_info fru;
uint8_t *spd_data, msg_data[4];
uint32_t len, offset;
msg_data[0] = id;
memset(&req, 0, sizeof(req));
req.msg.netfn = IPMI_NETFN_STORAGE;
req.msg.cmd = GET_FRU_INFO;
req.msg.data = msg_da... | 108,258,473,967,829,100,000,000,000,000,000,000,000 | dimm_spd.c | 333,577,251,218,215,400,000,000,000,000,000,000,000 | [
"CWE-120"
] | CVE-2020-5208 | It's been found that multiple functions in ipmitool before 1.8.19 neglect proper checking of the data received from a remote LAN party, which may lead to buffer overflows and potentially to remote code execution on the ipmitool side. This is especially dangerous if ipmitool is run as a privileged user. This problem is ... | https://nvd.nist.gov/vuln/detail/CVE-2020-5208 |
200,382 | ImageMagick | c1cf4802653970c050d175a6496fa1f11b7c089e | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/c1cf4802653970c050d175a6496fa1f11b7c089e | Earlier check for EOF | 1 | static Image *ReadPNMImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
char
format;
double
quantum_scale;
Image
*image;
MagickBooleanType
status;
QuantumAny
max_value;
QuantumInfo
*quantum_info;
QuantumType
quantum_type;
size_t
depth,
extent,
pa... | 297,210,173,749,444,300,000,000,000,000,000,000,000 | pnm.c | 152,375,642,383,776,630,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2016-6823 | Integer overflow in the BMP coder in ImageMagick before 7.0.2-10 allows remote attackers to cause a denial of service (crash) via crafted height and width values, which triggers an out-of-bounds write. | https://nvd.nist.gov/vuln/detail/CVE-2016-6823 |
302,179 | ImageMagick | c1cf4802653970c050d175a6496fa1f11b7c089e | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/c1cf4802653970c050d175a6496fa1f11b7c089e | Earlier check for EOF | 0 | static Image *ReadPNMImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
char
format;
double
quantum_scale;
Image
*image;
MagickBooleanType
status;
QuantumAny
max_value;
QuantumInfo
*quantum_info;
QuantumType
quantum_type;
size_t
depth,
extent,
pa... | 150,077,777,919,925,130,000,000,000,000,000,000,000 | pnm.c | 138,720,437,907,657,010,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2016-6823 | Integer overflow in the BMP coder in ImageMagick before 7.0.2-10 allows remote attackers to cause a denial of service (crash) via crafted height and width values, which triggers an out-of-bounds write. | https://nvd.nist.gov/vuln/detail/CVE-2016-6823 |
200,395 | libbson | e10059393466f667b031077229cfa98504ce34f3 | https://github.com/mongodb/libbson | https://github.com/mongodb/libbson/commit/e10059393466f667b031077229cfa98504ce34f3 | CDRIVER-2269 Fix codewscope test | 1 | test_bson_append_code_with_scope (void)
{
const uint8_t *scope_buf = NULL;
uint32_t scopelen = 0;
uint32_t len = 0;
bson_iter_t iter;
bool r;
const char *code = NULL;
bson_t *b;
bson_t *b2;
bson_t *scope;
/* Test with NULL bson, which converts to just CODE type. */
b = bson_new ();
... | 281,302,826,999,216,350,000,000,000,000,000,000,000 | test-bson.c | 178,434,807,486,041,700,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-14227 | In MongoDB libbson 1.7.0, the bson_iter_codewscope function in bson-iter.c miscalculates a bson_utf8_validate length argument, which allows remote attackers to cause a denial of service (heap-based buffer over-read in the bson_utf8_validate function in bson-utf8.c), as demonstrated by bson-to-json.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-14227 |
302,269 | libbson | e10059393466f667b031077229cfa98504ce34f3 | https://github.com/mongodb/libbson | https://github.com/mongodb/libbson/commit/e10059393466f667b031077229cfa98504ce34f3 | CDRIVER-2269 Fix codewscope test | 0 | test_bson_append_code_with_scope (void)
{
const uint8_t *scope_buf = NULL;
uint32_t scopelen = 0;
uint32_t len = 0;
bson_iter_t iter;
bool r;
const char *code = NULL;
bson_t *b;
bson_t *b2;
bson_t *scope;
bson_error_t err;
bool eof;
bson_reader_t *reader;
const bson_t *ticket_bson... | 274,895,206,233,151,340,000,000,000,000,000,000,000 | test-bson.c | 106,082,292,663,455,330,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-14227 | In MongoDB libbson 1.7.0, the bson_iter_codewscope function in bson-iter.c miscalculates a bson_utf8_validate length argument, which allows remote attackers to cause a denial of service (heap-based buffer over-read in the bson_utf8_validate function in bson-utf8.c), as demonstrated by bson-to-json.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-14227 |
200,398 | linux | 4f134b89a24b965991e7c345b9a4591821f7c2a6 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4f134b89a24b965991e7c345b9a4591821f7c2a6 | lib/syscall: fix syscall registers retrieval on 32-bit platforms
Lilith >_> and Claudio Bozzato of Cisco Talos security team reported
that collect_syscall() improperly casts the syscall registers to 64-bit
values leaking the uninitialized last 24 bytes on 32-bit platforms, that
are visible in /proc/self/syscall.
The ... | 1 | static int collect_syscall(struct task_struct *target, struct syscall_info *info)
{
struct pt_regs *regs;
if (!try_get_task_stack(target)) {
/* Task has no stack, so the task isn't in a syscall. */
memset(info, 0, sizeof(*info));
info->data.nr = -1;
return 0;
}
regs = task_pt_regs(target);
if (unlikely(!... | 71,532,311,692,146,140,000,000,000,000,000,000,000 | syscall.c | 107,719,311,275,545,550,000,000,000,000,000,000,000 | [
"CWE-681"
] | CVE-2020-28588 | An information disclosure vulnerability exists in the /proc/pid/syscall functionality of Linux Kernel 5.1 Stable and 5.4.66. More specifically, this issue has been introduced in v5.1-rc4 (commit 631b7abacd02b88f4b0795c08b54ad4fc3e7c7c0) and is still present in v5.10-rc4, so it’s likely that all versions in between are ... | https://nvd.nist.gov/vuln/detail/CVE-2020-28588 |
302,313 | linux | 4f134b89a24b965991e7c345b9a4591821f7c2a6 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4f134b89a24b965991e7c345b9a4591821f7c2a6 | lib/syscall: fix syscall registers retrieval on 32-bit platforms
Lilith >_> and Claudio Bozzato of Cisco Talos security team reported
that collect_syscall() improperly casts the syscall registers to 64-bit
values leaking the uninitialized last 24 bytes on 32-bit platforms, that
are visible in /proc/self/syscall.
The ... | 0 | static int collect_syscall(struct task_struct *target, struct syscall_info *info)
{
unsigned long args[6] = { };
struct pt_regs *regs;
if (!try_get_task_stack(target)) {
/* Task has no stack, so the task isn't in a syscall. */
memset(info, 0, sizeof(*info));
info->data.nr = -1;
return 0;
}
regs = task_pt... | 336,539,674,319,666,300,000,000,000,000,000,000,000 | syscall.c | 7,563,541,240,842,955,000,000,000,000,000,000,000 | [
"CWE-681"
] | CVE-2020-28588 | An information disclosure vulnerability exists in the /proc/pid/syscall functionality of Linux Kernel 5.1 Stable and 5.4.66. More specifically, this issue has been introduced in v5.1-rc4 (commit 631b7abacd02b88f4b0795c08b54ad4fc3e7c7c0) and is still present in v5.10-rc4, so it’s likely that all versions in between are ... | https://nvd.nist.gov/vuln/detail/CVE-2020-28588 |
200,411 | lftp | a27e07d90a4608ceaf928b1babb27d4d803e1992 | https://github.com/lavv17/lftp | https://github.com/lavv17/lftp/commit/a27e07d90a4608ceaf928b1babb27d4d803e1992 | mirror: prepend ./ to rm and chmod arguments to avoid URL recognition (fix #452) | 1 | int MirrorJob::Do()
{
int res;
int m=STALL;
FileInfo *file;
Job *j;
switch(state)
{
case(INITIAL_STATE):
remove_this_source_dir=(remove_source_dirs && source_dir.last_char()!='/');
if(!strcmp(target_dir,".") || !strcmp(target_dir,"..") || (FlagSet(SCAN_ALL_FIRST) && parent_mirror)... | 335,045,401,269,657,430,000,000,000,000,000,000,000 | MirrorJob.cc | 202,382,672,693,832,600,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2018-10916 | It has been discovered that lftp up to and including version 4.8.3 does not properly sanitize remote file names, leading to a loss of integrity on the local system when reverse mirroring is used. A remote attacker may trick a user to use reverse mirroring on an attacker controlled FTP server, resulting in the removal o... | https://nvd.nist.gov/vuln/detail/CVE-2018-10916 |
302,803 | lftp | a27e07d90a4608ceaf928b1babb27d4d803e1992 | https://github.com/lavv17/lftp | https://github.com/lavv17/lftp/commit/a27e07d90a4608ceaf928b1babb27d4d803e1992 | mirror: prepend ./ to rm and chmod arguments to avoid URL recognition (fix #452) | 0 | int MirrorJob::Do()
{
int res;
int m=STALL;
FileInfo *file;
Job *j;
switch(state)
{
case(INITIAL_STATE):
remove_this_source_dir=(remove_source_dirs && source_dir.last_char()!='/');
if(!strcmp(target_dir,".") || !strcmp(target_dir,"..") || (FlagSet(SCAN_ALL_FIRST) && parent_mirror)... | 122,572,215,167,977,500,000,000,000,000,000,000,000 | MirrorJob.cc | 293,430,357,076,912,540,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2018-10916 | It has been discovered that lftp up to and including version 4.8.3 does not properly sanitize remote file names, leading to a loss of integrity on the local system when reverse mirroring is used. A remote attacker may trick a user to use reverse mirroring on an attacker controlled FTP server, resulting in the removal o... | https://nvd.nist.gov/vuln/detail/CVE-2018-10916 |
200,412 | linux | c0a333d842ef67ac04adc72ff79dc1ccc3dca4ed | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c0a333d842ef67ac04adc72ff79dc1ccc3dca4ed | ASoC: SOF: Fix memory leak in sof_dfsentry_write
In the implementation of sof_dfsentry_write() memory allocated for
string is leaked in case of an error. Go to error handling path if the
d_name.name is not valid.
Fixes: 091c12e1f50c ("ASoC: SOF: debug: add new debugfs entries for IPC flood test")
Signed-off-by: Navid... | 1 | static ssize_t sof_dfsentry_write(struct file *file, const char __user *buffer,
size_t count, loff_t *ppos)
{
#if IS_ENABLED(CONFIG_SND_SOC_SOF_DEBUG_IPC_FLOOD_TEST)
struct snd_sof_dfsentry *dfse = file->private_data;
struct snd_sof_dev *sdev = dfse->sdev;
unsigned long ipc_duration_ms = 0;
bool flood_duratio... | 43,405,185,039,542,960,000,000,000,000,000,000,000 | debug.c | 96,437,858,430,803,440,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2019-18812 | A memory leak in the sof_dfsentry_write() function in sound/soc/sof/debug.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-c0a333d842ef. | https://nvd.nist.gov/vuln/detail/CVE-2019-18812 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.