idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
302,810 | linux | c0a333d842ef67ac04adc72ff79dc1ccc3dca4ed | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c0a333d842ef67ac04adc72ff79dc1ccc3dca4ed | ASoC: SOF: Fix memory leak in sof_dfsentry_write
In the implementation of sof_dfsentry_write() memory allocated for
string is leaked in case of an error. Go to error handling path if the
d_name.name is not valid.
Fixes: 091c12e1f50c ("ASoC: SOF: debug: add new debugfs entries for IPC flood test")
Signed-off-by: Navid... | 0 | static ssize_t sof_dfsentry_write(struct file *file, const char __user *buffer,
size_t count, loff_t *ppos)
{
#if IS_ENABLED(CONFIG_SND_SOC_SOF_DEBUG_IPC_FLOOD_TEST)
struct snd_sof_dfsentry *dfse = file->private_data;
struct snd_sof_dev *sdev = dfse->sdev;
unsigned long ipc_duration_ms = 0;
bool flood_duratio... | 40,316,414,760,353,984,000,000,000,000,000,000,000 | debug.c | 208,434,843,858,604,060,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2019-18812 | A memory leak in the sof_dfsentry_write() function in sound/soc/sof/debug.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-c0a333d842ef. | https://nvd.nist.gov/vuln/detail/CVE-2019-18812 |
200,414 | php-src | c1224573c773b6845e83505f717fbf820fc18415 | https://github.com/php/php-src | http://git.php.net/?p=php-src.git;a=commit;h=c1224573c773b6845e83505f717fbf820fc18415 | Fix CVE-2013-6420 - memory corruption in openssl_x509_parse | 1 | static time_t asn1_time_to_time_t(ASN1_UTCTIME * timestr TSRMLS_DC) /* {{{ */
{
/*
This is how the time string is formatted:
snprintf(p, sizeof(p), "%02d%02d%02d%02d%02d%02dZ",ts->tm_year%100,
ts->tm_mon+1,ts->tm_mday,ts->tm_hour,ts->tm_min,ts->tm_sec);
*/
time_t ret;
struct tm thetime;
char * strbuf;
c... | 302,182,818,264,291,600,000,000,000,000,000,000,000 | openssl.c | 255,045,393,970,716,820,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-6420 | The asn1_time_to_time_t function in ext/openssl/openssl.c in PHP before 5.3.28, 5.4.x before 5.4.23, and 5.5.x before 5.5.7 does not properly parse (1) notBefore and (2) notAfter timestamps in X.509 certificates, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) vi... | https://nvd.nist.gov/vuln/detail/CVE-2013-6420 |
302,840 | php-src | c1224573c773b6845e83505f717fbf820fc18415 | https://github.com/php/php-src | http://git.php.net/?p=php-src.git;a=commit;h=c1224573c773b6845e83505f717fbf820fc18415 | Fix CVE-2013-6420 - memory corruption in openssl_x509_parse | 0 | static time_t asn1_time_to_time_t(ASN1_UTCTIME * timestr TSRMLS_DC) /* {{{ */
{
/*
This is how the time string is formatted:
snprintf(p, sizeof(p), "%02d%02d%02d%02d%02d%02dZ",ts->tm_year%100,
ts->tm_mon+1,ts->tm_mday,ts->tm_hour,ts->tm_min,ts->tm_sec);
*/
time_t ret;
struct tm thetime;
char * strbuf;
c... | 322,768,390,973,332,200,000,000,000,000,000,000,000 | openssl.c | 94,426,697,188,971,560,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2013-6420 | The asn1_time_to_time_t function in ext/openssl/openssl.c in PHP before 5.3.28, 5.4.x before 5.4.23, and 5.5.x before 5.5.7 does not properly parse (1) notBefore and (2) notAfter timestamps in X.509 certificates, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) vi... | https://nvd.nist.gov/vuln/detail/CVE-2013-6420 |
200,452 | polarssl | 5d8618539f8e186c1b2c1b5a548d6f85936fe41f | https://github.com/polarssl/polarssl | https://github.com/polarssl/polarssl/commit/5d8618539f8e186c1b2c1b5a548d6f85936fe41f | Fix memory leak while parsing some X.509 certs | 1 | int x509_get_name( unsigned char **p, const unsigned char *end,
x509_name *cur )
{
int ret;
size_t len;
const unsigned char *end2;
x509_name *use;
if( ( ret = asn1_get_tag( p, end, &len,
ASN1_CONSTRUCTED | ASN1_SET ) ) != 0 )
return( POLARSSL_ERR_X509_INVALID_... | 153,018,608,462,889,670,000,000,000,000,000,000,000 | x509.c | 203,792,724,555,770,300,000,000,000,000,000,000,000 | [
"CWE-310"
] | CVE-2014-8627 | PolarSSL 1.3.8 does not properly negotiate the signature algorithm to use, which allows remote attackers to conduct downgrade attacks via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2014-8627 |
303,148 | polarssl | 5d8618539f8e186c1b2c1b5a548d6f85936fe41f | https://github.com/polarssl/polarssl | https://github.com/polarssl/polarssl/commit/5d8618539f8e186c1b2c1b5a548d6f85936fe41f | Fix memory leak while parsing some X.509 certs | 0 | int x509_get_name( unsigned char **p, const unsigned char *end,
x509_name *cur )
{
int ret;
size_t set_len;
const unsigned char *end_set;
/*
* parse first SET, restricted to 1 element
*/
if( ( ret = asn1_get_tag( p, end, &set_len,
ASN1_CONSTRUCTED | ASN1_SET... | 95,574,681,973,007,650,000,000,000,000,000,000,000 | x509.c | 319,151,821,923,225,300,000,000,000,000,000,000,000 | [
"CWE-310"
] | CVE-2014-8627 | PolarSSL 1.3.8 does not properly negotiate the signature algorithm to use, which allows remote attackers to conduct downgrade attacks via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2014-8627 |
200,453 | linux | 2287a51ba822384834dafc1c798453375d1107c7 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/2287a51ba822384834dafc1c798453375d1107c7 | vt_kdsetmode: extend console locking
As per the long-suffering comment.
Reported-by: Minh Yuan <yuanmingbuaa@gmail.com>
Cc: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Cc: Jiri Slaby <jirislaby@kernel.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org> | 1 | static int vt_k_ioctl(struct tty_struct *tty, unsigned int cmd,
unsigned long arg, bool perm)
{
struct vc_data *vc = tty->driver_data;
void __user *up = (void __user *)arg;
unsigned int console = vc->vc_num;
int ret;
switch (cmd) {
case KIOCSOUND:
if (!perm)
return -EPERM;
/*
* The use of PIT_TICK_RA... | 221,654,635,171,197,970,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2021-3753 | A race problem was seen in the vt_k_ioctl in drivers/tty/vt/vt_ioctl.c in the Linux kernel, which may cause an out of bounds read in vt as the write access to vc_mode is not protected by lock-in vt_ioctl (KDSETMDE). The highest threat from this vulnerability is to data confidentiality. | https://nvd.nist.gov/vuln/detail/CVE-2021-3753 |
303,184 | linux | 2287a51ba822384834dafc1c798453375d1107c7 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/2287a51ba822384834dafc1c798453375d1107c7 | vt_kdsetmode: extend console locking
As per the long-suffering comment.
Reported-by: Minh Yuan <yuanmingbuaa@gmail.com>
Cc: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Cc: Jiri Slaby <jirislaby@kernel.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org> | 0 | static int vt_k_ioctl(struct tty_struct *tty, unsigned int cmd,
unsigned long arg, bool perm)
{
struct vc_data *vc = tty->driver_data;
void __user *up = (void __user *)arg;
unsigned int console = vc->vc_num;
int ret;
switch (cmd) {
case KIOCSOUND:
if (!perm)
return -EPERM;
/*
* The use of PIT_TICK_RA... | 163,625,463,143,641,240,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2021-3753 | A race problem was seen in the vt_k_ioctl in drivers/tty/vt/vt_ioctl.c in the Linux kernel, which may cause an out of bounds read in vt as the write access to vc_mode is not protected by lock-in vt_ioctl (KDSETMDE). The highest threat from this vulnerability is to data confidentiality. | https://nvd.nist.gov/vuln/detail/CVE-2021-3753 |
200,458 | openexr | 8b5370c688a7362673c3a5256d93695617a4cd9a | https://github.com/AcademySoftwareFoundation/openexr | https://github.com/AcademySoftwareFoundation/openexr/commit/8b5370c688a7362673c3a5256d93695617a4cd9a | Fix #491, issue with part number range check reconstructing chunk offset table
The chunk offset was incorrectly testing for a part number that was the
same size (i.e. an invalid index)
Signed-off-by: Kimball Thurston <kdt3rd@gmail.com> | 1 | MultiPartInputFile::Data::chunkOffsetReconstruction(OPENEXR_IMF_INTERNAL_NAMESPACE::IStream& is, const vector<InputPartData*>& parts)
{
//
// Reconstruct broken chunk offset tables. Stop once we received any exception.
//
Int64 position = is.tellg();
//
// check we understand all the part... | 140,980,474,558,435,340,000,000,000,000,000,000,000 | ImfMultiPartInputFile.cpp | 253,113,448,920,027,200,000,000,000,000,000,000,000 | [
"CWE-94"
] | CVE-2020-16587 | A heap-based buffer overflow vulnerability exists in Academy Software Foundation OpenEXR 2.3.0 in chunkOffsetReconstruction in ImfMultiPartInputFile.cpp that can cause a denial of service via a crafted EXR file. | https://nvd.nist.gov/vuln/detail/CVE-2020-16587 |
303,388 | openexr | 8b5370c688a7362673c3a5256d93695617a4cd9a | https://github.com/AcademySoftwareFoundation/openexr | https://github.com/AcademySoftwareFoundation/openexr/commit/8b5370c688a7362673c3a5256d93695617a4cd9a | Fix #491, issue with part number range check reconstructing chunk offset table
The chunk offset was incorrectly testing for a part number that was the
same size (i.e. an invalid index)
Signed-off-by: Kimball Thurston <kdt3rd@gmail.com> | 0 | MultiPartInputFile::Data::chunkOffsetReconstruction(OPENEXR_IMF_INTERNAL_NAMESPACE::IStream& is, const vector<InputPartData*>& parts)
{
//
// Reconstruct broken chunk offset tables. Stop once we received any exception.
//
Int64 position = is.tellg();
//
// check we understand all the part... | 51,710,242,056,051,940,000,000,000,000,000,000,000 | ImfMultiPartInputFile.cpp | 313,831,710,917,129,640,000,000,000,000,000,000,000 | [
"CWE-94"
] | CVE-2020-16587 | A heap-based buffer overflow vulnerability exists in Academy Software Foundation OpenEXR 2.3.0 in chunkOffsetReconstruction in ImfMultiPartInputFile.cpp that can cause a denial of service via a crafted EXR file. | https://nvd.nist.gov/vuln/detail/CVE-2020-16587 |
200,463 | linux | 39675f7a7c7e7702f7d5341f1e0d01db746543a0 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=39675f7a7c7e7702f7d5341f1e0d01db746543a0 | ALSA: rawmidi: Change resized buffers atomically
The SNDRV_RAWMIDI_IOCTL_PARAMS ioctl may resize the buffers and the
current code is racy. For example, the sequencer client may write to
buffer while it being resized.
As a simple workaround, let's switch to the resized buffer inside the
stream runtime lock.
Reported... | 1 | int snd_rawmidi_input_params(struct snd_rawmidi_substream *substream,
struct snd_rawmidi_params * params)
{
char *newbuf;
struct snd_rawmidi_runtime *runtime = substream->runtime;
snd_rawmidi_drain_input(substream);
if (params->buffer_size < 32 || params->buffer_size > 1024L * 1024L) {
return -EINVAL;
}... | 49,349,572,251,225,560,000,000,000,000,000,000,000 | rawmidi.c | 240,571,701,301,896,800,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2018-10902 | It was found that the raw midi kernel driver does not protect against concurrent access which leads to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status() which are part of snd_rawmidi_ioctl() handler in rawmidi.c file. A malicious local attacker could possibly use this for priv... | https://nvd.nist.gov/vuln/detail/CVE-2018-10902 |
303,564 | linux | 39675f7a7c7e7702f7d5341f1e0d01db746543a0 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=39675f7a7c7e7702f7d5341f1e0d01db746543a0 | ALSA: rawmidi: Change resized buffers atomically
The SNDRV_RAWMIDI_IOCTL_PARAMS ioctl may resize the buffers and the
current code is racy. For example, the sequencer client may write to
buffer while it being resized.
As a simple workaround, let's switch to the resized buffer inside the
stream runtime lock.
Reported... | 0 | int snd_rawmidi_input_params(struct snd_rawmidi_substream *substream,
struct snd_rawmidi_params * params)
{
char *newbuf, *oldbuf;
struct snd_rawmidi_runtime *runtime = substream->runtime;
snd_rawmidi_drain_input(substream);
if (params->buffer_size < 32 || params->buffer_size > 1024L * 1024L) {
return -E... | 274,667,552,906,261,050,000,000,000,000,000,000,000 | rawmidi.c | 302,437,345,415,378,500,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2018-10902 | It was found that the raw midi kernel driver does not protect against concurrent access which leads to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status() which are part of snd_rawmidi_ioctl() handler in rawmidi.c file. A malicious local attacker could possibly use this for priv... | https://nvd.nist.gov/vuln/detail/CVE-2018-10902 |
200,468 | qemu | 6d4b9e55fc625514a38d27cff4b9933f617fa7dc | https://github.com/bonzini/qemu | http://git.qemu.org/?p=qemu.git;a=commit;h=6d4b9e55fc625514a38d27cff4b9933f617fa7dc | curl: check data size before memcpy to local buffer. (CVE-2014-0144)
curl_read_cb is callback function for libcurl when data arrives. The
data size passed in here is not guaranteed to be within the range of
request we submitted, so we may overflow the guest IO buffer. Check the
real size we have before memcpy to buffe... | 1 | static size_t curl_read_cb(void *ptr, size_t size, size_t nmemb, void *opaque)
{
CURLState *s = ((CURLState*)opaque);
size_t realsize = size * nmemb;
int i;
DPRINTF("CURL: Just reading %zd bytes\n", realsize);
if (!s || !s->orig_buf)
goto read_end;
memcpy(s->orig_buf + s->buf_off, ptr... | 168,989,870,398,485,960,000,000,000,000,000,000,000 | curl.c | 34,660,891,499,852,330,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2014-0144 | QEMU before 2.0.0 block drivers for CLOOP, QCOW2 version 2 and various other image formats are vulnerable to potential memory corruptions, integer/buffer overflows or crash caused by missing input validations which could allow a remote user to execute arbitrary code on the host with the privileges of the QEMU process. | https://nvd.nist.gov/vuln/detail/CVE-2014-0144 |
303,693 | qemu | 6d4b9e55fc625514a38d27cff4b9933f617fa7dc | https://github.com/bonzini/qemu | http://git.qemu.org/?p=qemu.git;a=commit;h=6d4b9e55fc625514a38d27cff4b9933f617fa7dc | curl: check data size before memcpy to local buffer. (CVE-2014-0144)
curl_read_cb is callback function for libcurl when data arrives. The
data size passed in here is not guaranteed to be within the range of
request we submitted, so we may overflow the guest IO buffer. Check the
real size we have before memcpy to buffe... | 0 | static size_t curl_read_cb(void *ptr, size_t size, size_t nmemb, void *opaque)
{
CURLState *s = ((CURLState*)opaque);
size_t realsize = size * nmemb;
int i;
DPRINTF("CURL: Just reading %zd bytes\n", realsize);
if (!s || !s->orig_buf)
goto read_end;
if (s->buf_off >= s->buf_len) {
... | 30,467,177,280,682,592,000,000,000,000,000,000,000 | curl.c | 151,581,388,241,956,620,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2014-0144 | QEMU before 2.0.0 block drivers for CLOOP, QCOW2 version 2 and various other image formats are vulnerable to potential memory corruptions, integer/buffer overflows or crash caused by missing input validations which could allow a remote user to execute arbitrary code on the host with the privileges of the QEMU process. | https://nvd.nist.gov/vuln/detail/CVE-2014-0144 |
200,475 | rabbitmq-c | fc85be7123050b91b054e45b91c78d3241a5047a | https://github.com/alanxz/rabbitmq-c | https://github.com/alanxz/rabbitmq-c/commit/fc85be7123050b91b054e45b91c78d3241a5047a | lib: check frame_size is >= INT32_MAX
When parsing a frame header, validate that the frame_size is less than
or equal to INT32_MAX. Given frame_max is limited between 0 and
INT32_MAX in amqp_login and friends, this does not change the API.
This prevents a potential buffer overflow when a malicious client sends
a fram... | 1 | int amqp_handle_input(amqp_connection_state_t state, amqp_bytes_t received_data,
amqp_frame_t *decoded_frame) {
size_t bytes_consumed;
void *raw_frame;
/* Returning frame_type of zero indicates either insufficient input,
or a complete, ignored frame was read. */
decoded_frame->frame_... | 114,712,616,430,347,640,000,000,000,000,000,000,000 | amqp_connection.c | 222,546,890,245,507,700,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2019-18609 | An issue was discovered in amqp_handle_input in amqp_connection.c in rabbitmq-c 0.9.0. There is an integer overflow that leads to heap memory corruption in the handling of CONNECTION_STATE_HEADER. A rogue server could return a malicious frame header that leads to a smaller target_size value than needed. This condition ... | https://nvd.nist.gov/vuln/detail/CVE-2019-18609 |
303,796 | rabbitmq-c | fc85be7123050b91b054e45b91c78d3241a5047a | https://github.com/alanxz/rabbitmq-c | https://github.com/alanxz/rabbitmq-c/commit/fc85be7123050b91b054e45b91c78d3241a5047a | lib: check frame_size is >= INT32_MAX
When parsing a frame header, validate that the frame_size is less than
or equal to INT32_MAX. Given frame_max is limited between 0 and
INT32_MAX in amqp_login and friends, this does not change the API.
This prevents a potential buffer overflow when a malicious client sends
a fram... | 0 | int amqp_handle_input(amqp_connection_state_t state, amqp_bytes_t received_data,
amqp_frame_t *decoded_frame) {
size_t bytes_consumed;
void *raw_frame;
/* Returning frame_type of zero indicates either insufficient input,
or a complete, ignored frame was read. */
decoded_frame->frame_... | 189,015,703,983,040,720,000,000,000,000,000,000,000 | amqp_connection.c | 461,035,150,596,296,160,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2019-18609 | An issue was discovered in amqp_handle_input in amqp_connection.c in rabbitmq-c 0.9.0. There is an integer overflow that leads to heap memory corruption in the handling of CONNECTION_STATE_HEADER. A rogue server could return a malicious frame header that leads to a smaller target_size value than needed. This condition ... | https://nvd.nist.gov/vuln/detail/CVE-2019-18609 |
200,490 | ceph | 4c11203122d729c832a645c9e3f5092db4963840 | https://github.com/ceph/ceph | https://github.com/ceph/ceph/commit/4c11203122d729c832a645c9e3f5092db4963840 | msg/async/ProtocolV1: resurrect "implement cephx_*require_version options"
This was added in commit 9bcbc2a3621f ("mon,msg: implement
cephx_*_require_version options") and inadvertently dropped in
commit e6f043f7d2dc ("msgr/async: huge refactoring of protocol V1").
As a result, service daemons don't enforce cephx_requ... | 1 | CtPtr ProtocolV1::handle_connect_message_2() {
ldout(cct, 20) << __func__ << dendl;
ldout(cct, 20) << __func__ << " accept got peer connect_seq "
<< connect_msg.connect_seq << " global_seq "
<< connect_msg.global_seq << dendl;
connection->set_peer_type(connect_msg.host_type);
... | 66,222,140,007,301,820,000,000,000,000,000,000,000 | ProtocolV1.cc | 160,457,868,067,089,570,000,000,000,000,000,000,000 | [
"CWE-294"
] | CVE-2020-25660 | A flaw was found in the Cephx authentication protocol in versions before 15.2.6 and before 14.2.14, where it does not verify Ceph clients correctly and is then vulnerable to replay attacks in Nautilus. This flaw allows an attacker with access to the Ceph cluster network to authenticate with the Ceph service via a packe... | https://nvd.nist.gov/vuln/detail/CVE-2020-25660 |
304,039 | ceph | 4c11203122d729c832a645c9e3f5092db4963840 | https://github.com/ceph/ceph | https://github.com/ceph/ceph/commit/4c11203122d729c832a645c9e3f5092db4963840 | msg/async/ProtocolV1: resurrect "implement cephx_*require_version options"
This was added in commit 9bcbc2a3621f ("mon,msg: implement
cephx_*_require_version options") and inadvertently dropped in
commit e6f043f7d2dc ("msgr/async: huge refactoring of protocol V1").
As a result, service daemons don't enforce cephx_requ... | 0 | CtPtr ProtocolV1::handle_connect_message_2() {
ldout(cct, 20) << __func__ << dendl;
ldout(cct, 20) << __func__ << " accept got peer connect_seq "
<< connect_msg.connect_seq << " global_seq "
<< connect_msg.global_seq << dendl;
connection->set_peer_type(connect_msg.host_type);
... | 171,117,629,635,386,500,000,000,000,000,000,000,000 | ProtocolV1.cc | 73,953,535,862,975,220,000,000,000,000,000,000,000 | [
"CWE-294"
] | CVE-2020-25660 | A flaw was found in the Cephx authentication protocol in versions before 15.2.6 and before 14.2.14, where it does not verify Ceph clients correctly and is then vulnerable to replay attacks in Nautilus. This flaw allows an attacker with access to the Ceph cluster network to authenticate with the Ceph service via a packe... | https://nvd.nist.gov/vuln/detail/CVE-2020-25660 |
200,497 | git | fd55a19eb1d49ae54008d932a65f79cd6fda45c9 | https://github.com/git/git | http://git.kernel.org/?p=git/git.git;a=commitdiff;h=fd55a19eb1d49ae54008d932a65f79cd6fda45c9 | Fix buffer overflow in git diff
If PATH_MAX on your system is smaller than a path stored, it may cause
buffer overflow and stack corruption in diff_addremove() and diff_change()
functions when running git-diff
Signed-off-by: Dmitry Potapov <dpotapov@gmail.com>
Signed-off-by: Junio C Hamano <gitster@pobox.com> | 1 | void diff_change(struct diff_options *options,
unsigned old_mode, unsigned new_mode,
const unsigned char *old_sha1,
const unsigned char *new_sha1,
const char *base, const char *path)
{
char concatpath[PATH_MAX];
struct diff_filespec *one, *two;
if (DIFF_OPT_TST(options, IGNORE_SUBMODULES) && S_ISGITLINK... | 65,112,988,369,061,800,000,000,000,000,000,000,000 | diff.c | 679,451,702,429,954,500,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2008-3546 | Stack-based buffer overflow in the (1) diff_addremove and (2) diff_change functions in GIT before 1.5.6.4 might allow local users to execute arbitrary code via a PATH whose length is larger than the system's PATH_MAX when running GIT utilities such as git-diff or git-grep. | https://nvd.nist.gov/vuln/detail/CVE-2008-3546 |
304,221 | git | fd55a19eb1d49ae54008d932a65f79cd6fda45c9 | https://github.com/git/git | http://git.kernel.org/?p=git/git.git;a=commitdiff;h=fd55a19eb1d49ae54008d932a65f79cd6fda45c9 | Fix buffer overflow in git diff
If PATH_MAX on your system is smaller than a path stored, it may cause
buffer overflow and stack corruption in diff_addremove() and diff_change()
functions when running git-diff
Signed-off-by: Dmitry Potapov <dpotapov@gmail.com>
Signed-off-by: Junio C Hamano <gitster@pobox.com> | 0 | void diff_change(struct diff_options *options,
unsigned old_mode, unsigned new_mode,
const unsigned char *old_sha1,
const unsigned char *new_sha1,
const char *concatpath)
{
struct diff_filespec *one, *two;
if (DIFF_OPT_TST(options, IGNORE_SUBMODULES) && S_ISGITLINK(old_mode)
&& S_ISGITLINK(new_mode))
... | 161,213,636,050,647,830,000,000,000,000,000,000,000 | diff.c | 166,868,393,692,160,320,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2008-3546 | Stack-based buffer overflow in the (1) diff_addremove and (2) diff_change functions in GIT before 1.5.6.4 might allow local users to execute arbitrary code via a PATH whose length is larger than the system's PATH_MAX when running GIT utilities such as git-diff or git-grep. | https://nvd.nist.gov/vuln/detail/CVE-2008-3546 |
200,498 | git | fd55a19eb1d49ae54008d932a65f79cd6fda45c9 | https://github.com/git/git | http://git.kernel.org/?p=git/git.git;a=commitdiff;h=fd55a19eb1d49ae54008d932a65f79cd6fda45c9 | Fix buffer overflow in git diff
If PATH_MAX on your system is smaller than a path stored, it may cause
buffer overflow and stack corruption in diff_addremove() and diff_change()
functions when running git-diff
Signed-off-by: Dmitry Potapov <dpotapov@gmail.com>
Signed-off-by: Junio C Hamano <gitster@pobox.com> | 1 | void diff_addremove(struct diff_options *options,
int addremove, unsigned mode,
const unsigned char *sha1,
const char *base, const char *path)
{
char concatpath[PATH_MAX];
struct diff_filespec *one, *two;
if (DIFF_OPT_TST(options, IGNORE_SUBMODULES) && S_ISGITLINK(mode))
return;
/* This may lo... | 238,719,314,053,068,500,000,000,000,000,000,000,000 | diff.c | 679,451,702,429,954,500,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2008-3546 | Stack-based buffer overflow in the (1) diff_addremove and (2) diff_change functions in GIT before 1.5.6.4 might allow local users to execute arbitrary code via a PATH whose length is larger than the system's PATH_MAX when running GIT utilities such as git-diff or git-grep. | https://nvd.nist.gov/vuln/detail/CVE-2008-3546 |
304,218 | git | fd55a19eb1d49ae54008d932a65f79cd6fda45c9 | https://github.com/git/git | http://git.kernel.org/?p=git/git.git;a=commitdiff;h=fd55a19eb1d49ae54008d932a65f79cd6fda45c9 | Fix buffer overflow in git diff
If PATH_MAX on your system is smaller than a path stored, it may cause
buffer overflow and stack corruption in diff_addremove() and diff_change()
functions when running git-diff
Signed-off-by: Dmitry Potapov <dpotapov@gmail.com>
Signed-off-by: Junio C Hamano <gitster@pobox.com> | 0 | void diff_addremove(struct diff_options *options,
int addremove, unsigned mode,
const unsigned char *sha1,
const char *concatpath)
{
struct diff_filespec *one, *two;
if (DIFF_OPT_TST(options, IGNORE_SUBMODULES) && S_ISGITLINK(mode))
return;
/* This may look odd, but it is a preparation for
* ... | 206,919,440,643,283,570,000,000,000,000,000,000,000 | diff.c | 166,868,393,692,160,320,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2008-3546 | Stack-based buffer overflow in the (1) diff_addremove and (2) diff_change functions in GIT before 1.5.6.4 might allow local users to execute arbitrary code via a PATH whose length is larger than the system's PATH_MAX when running GIT utilities such as git-diff or git-grep. | https://nvd.nist.gov/vuln/detail/CVE-2008-3546 |
200,501 | libpng | 1bef8e97995c33123665582e57d3ed40b57d5978 | https://github.com/glennrp/libpng | https://github.com/glennrp/libpng/commit/1bef8e97995c33123665582e57d3ed40b57d5978 | [libpng16] Silently truncate over-length PLTE chunk while reading. | 1 | png_set_PLTE(png_structrp png_ptr, png_inforp info_ptr,
png_const_colorp palette, int num_palette)
{
png_uint_32 max_palette_length;
png_debug1(1, "in %s storage function", "PLTE");
if (png_ptr == NULL || info_ptr == NULL)
return;
max_palette_length = (png_ptr->color_type == PNG_COLOR_TYPE_PAL... | 205,091,847,373,842,230,000,000,000,000,000,000,000 | pngset.c | 305,265,567,473,314,370,000,000,000,000,000,000,000 | [
"CWE-120"
] | CVE-2015-8126 | Multiple buffer overflows in the (1) png_set_PLTE and (2) png_get_PLTE functions in libpng before 1.0.64, 1.1.x and 1.2.x before 1.2.54, 1.3.x and 1.4.x before 1.4.17, 1.5.x before 1.5.24, and 1.6.x before 1.6.19 allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other ... | https://nvd.nist.gov/vuln/detail/CVE-2015-8126 |
304,335 | libpng | 1bef8e97995c33123665582e57d3ed40b57d5978 | https://github.com/glennrp/libpng | https://github.com/glennrp/libpng/commit/1bef8e97995c33123665582e57d3ed40b57d5978 | [libpng16] Silently truncate over-length PLTE chunk while reading. | 0 | png_set_PLTE(png_structrp png_ptr, png_inforp info_ptr,
png_const_colorp palette, int num_palette)
{
png_uint_32 max_palette_length;
png_debug1(1, "in %s storage function", "PLTE");
if (png_ptr == NULL || info_ptr == NULL)
return;
max_palette_length = (png_ptr->color_type == PNG_COLOR_TYPE_PAL... | 164,482,765,578,923,240,000,000,000,000,000,000,000 | pngset.c | 104,810,709,411,095,940,000,000,000,000,000,000,000 | [
"CWE-120"
] | CVE-2015-8126 | Multiple buffer overflows in the (1) png_set_PLTE and (2) png_get_PLTE functions in libpng before 1.0.64, 1.1.x and 1.2.x before 1.2.54, 1.3.x and 1.4.x before 1.4.17, 1.5.x before 1.5.24, and 1.6.x before 1.6.19 allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other ... | https://nvd.nist.gov/vuln/detail/CVE-2015-8126 |
200,502 | samurai | e84b6d99c85043fa1ba54851ee500540ec206918 | https://github.com/michaelforney/samurai | https://github.com/michaelforney/samurai/commit/e84b6d99c85043fa1ba54851ee500540ec206918 | util: Check for NULL string in writefile
This check was there previously, but was removed in f549b757 with
the addition of a check during parse that every rule has rspfile
if and only if it has rspfile_content. However, this fails to
consider the possibility of those variables coming from the edge
or global environmen... | 1 | writefile(const char *name, struct string *s)
{
FILE *f;
int ret;
f = fopen(name, "w");
if (!f) {
warn("open %s:", name);
return -1;
}
ret = 0;
if (fwrite(s->s, 1, s->n, f) != s->n || fflush(f) != 0) {
warn("write %s:", name);
ret = -1;
}
fclose(f);
return ret;
} | 245,305,769,444,728,400,000,000,000,000,000,000,000 | util.c | 318,483,833,829,041,760,000,000,000,000,000,000,000 | [
"CWE-284"
] | CVE-2021-30218 | samurai 1.2 has a NULL pointer dereference in writefile() in util.c via a crafted build file. | https://nvd.nist.gov/vuln/detail/CVE-2021-30218 |
304,398 | samurai | e84b6d99c85043fa1ba54851ee500540ec206918 | https://github.com/michaelforney/samurai | https://github.com/michaelforney/samurai/commit/e84b6d99c85043fa1ba54851ee500540ec206918 | util: Check for NULL string in writefile
This check was there previously, but was removed in f549b757 with
the addition of a check during parse that every rule has rspfile
if and only if it has rspfile_content. However, this fails to
consider the possibility of those variables coming from the edge
or global environmen... | 0 | writefile(const char *name, struct string *s)
{
FILE *f;
int ret;
f = fopen(name, "w");
if (!f) {
warn("open %s:", name);
return -1;
}
ret = 0;
if (s && (fwrite(s->s, 1, s->n, f) != s->n || fflush(f) != 0)) {
warn("write %s:", name);
ret = -1;
}
fclose(f);
return ret;
} | 220,887,458,557,982,520,000,000,000,000,000,000,000 | util.c | 247,258,255,382,723,100,000,000,000,000,000,000,000 | [
"CWE-284"
] | CVE-2021-30218 | samurai 1.2 has a NULL pointer dereference in writefile() in util.c via a crafted build file. | https://nvd.nist.gov/vuln/detail/CVE-2021-30218 |
200,506 | mongo | 1411cf602a21e45a5ef42b6869c480eb420976ee | https://github.com/mongodb/mongo | https://github.com/mongodb/mongo/commit/1411cf602a21e45a5ef42b6869c480eb420976ee | SERVER-43751 Recompute compressor manager message parameters | 1 | StatusWith<Message> MessageCompressorManager::decompressMessage(const Message& msg,
MessageCompressorId* compressorId) {
auto inputHeader = msg.header();
ConstDataRangeCursor input(inputHeader.data(), inputHeader.data() + inputHeader.dataLen());
... | 188,888,673,038,981,120,000,000,000,000,000,000,000 | None | null | [
"CWE-697"
] | CVE-2019-20925 | An unauthenticated client can trigger denial of service by issuing specially crafted wire protocol messages, which cause the message decompressor to incorrectly allocate memory. This issue affects: MongoDB Inc. MongoDB Server v4.2 versions prior to 4.2.1; v4.0 versions prior to 4.0.13; v3.6 versions prior to 3.6.15; v3... | https://nvd.nist.gov/vuln/detail/CVE-2019-20925 |
304,467 | mongo | 1411cf602a21e45a5ef42b6869c480eb420976ee | https://github.com/mongodb/mongo | https://github.com/mongodb/mongo/commit/1411cf602a21e45a5ef42b6869c480eb420976ee | SERVER-43751 Recompute compressor manager message parameters | 0 | StatusWith<Message> MessageCompressorManager::decompressMessage(const Message& msg,
MessageCompressorId* compressorId) {
auto inputHeader = msg.header();
ConstDataRangeCursor input(inputHeader.data(), inputHeader.data() + inputHeader.dataLen());
... | 266,158,690,335,555,200,000,000,000,000,000,000,000 | None | null | [
"CWE-697"
] | CVE-2019-20925 | An unauthenticated client can trigger denial of service by issuing specially crafted wire protocol messages, which cause the message decompressor to incorrectly allocate memory. This issue affects: MongoDB Inc. MongoDB Server v4.2 versions prior to 4.2.1; v4.0 versions prior to 4.0.13; v3.6 versions prior to 3.6.15; v3... | https://nvd.nist.gov/vuln/detail/CVE-2019-20925 |
200,526 | linux | 8205d5d98ef7f155de211f5e2eb6ca03d95a5a60 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8205d5d98ef7f155de211f5e2eb6ca03d95a5a60 | powerpc/tm: Fix FP/VMX unavailable exceptions inside a transaction
When we take an FP unavailable exception in a transaction we have to
account for the hardware FP TM checkpointed registers being
incorrect. In this case for this process we know the current and
checkpointed FP registers must be the same (since FP wasn'... | 1 | void giveup_all(struct task_struct *tsk)
{
unsigned long usermsr;
if (!tsk->thread.regs)
return;
usermsr = tsk->thread.regs->msr;
if ((usermsr & msr_all_available) == 0)
return;
msr_check_and_set(msr_all_available);
check_if_tm_restore_required(tsk);
WARN_ON((usermsr & MSR_VSX) && !((usermsr & MSR_FP) &... | 158,033,907,090,062,380,000,000,000,000,000,000,000 | process.c | 58,487,282,007,429,130,000,000,000,000,000,000,000 | [
"CWE-862"
] | CVE-2019-15030 | In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users' processes via a Facility Unavailable exception. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers.... | https://nvd.nist.gov/vuln/detail/CVE-2019-15030 |
304,916 | linux | 8205d5d98ef7f155de211f5e2eb6ca03d95a5a60 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8205d5d98ef7f155de211f5e2eb6ca03d95a5a60 | powerpc/tm: Fix FP/VMX unavailable exceptions inside a transaction
When we take an FP unavailable exception in a transaction we have to
account for the hardware FP TM checkpointed registers being
incorrect. In this case for this process we know the current and
checkpointed FP registers must be the same (since FP wasn'... | 0 | void giveup_all(struct task_struct *tsk)
{
unsigned long usermsr;
if (!tsk->thread.regs)
return;
check_if_tm_restore_required(tsk);
usermsr = tsk->thread.regs->msr;
if ((usermsr & msr_all_available) == 0)
return;
msr_check_and_set(msr_all_available);
WARN_ON((usermsr & MSR_VSX) && !((usermsr & MSR_FP) ... | 205,484,556,932,136,720,000,000,000,000,000,000,000 | process.c | 82,519,391,866,914,660,000,000,000,000,000,000,000 | [
"CWE-862"
] | CVE-2019-15030 | In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users' processes via a Facility Unavailable exception. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers.... | https://nvd.nist.gov/vuln/detail/CVE-2019-15030 |
200,532 | linux | 501e38a5531efbd77d5c73c0ba838a889bfc1d74 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=501e38a5531efbd77d5c73c0ba838a889bfc1d74 | usb: gadget: clear related members when goto fail
dev->config and dev->hs_config and dev->dev need to be cleaned if
dev_config fails to avoid UAF.
Acked-by: Alan Stern <stern@rowland.harvard.edu>
Signed-off-by: Hangyu Hua <hbh25y@gmail.com>
Link: https://lore.kernel.org/r/20211231172138.7993-3-hbh25y@gmail.com
Signed... | 1 | dev_config (struct file *fd, const char __user *buf, size_t len, loff_t *ptr)
{
struct dev_data *dev = fd->private_data;
ssize_t value, length = len;
unsigned total;
u32 tag;
char *kbuf;
spin_lock_irq(&dev->lock);
if (dev->state > STATE_DEV_OPENED) {
value = ep0_write(fd, buf, len, ptr);
spin_unlock... | 194,820,517,650,016,100,000,000,000,000,000,000,000 | inode.c | 284,751,517,814,041,800,000,000,000,000,000,000,000 | [
"CWE-763"
] | CVE-2022-24958 | drivers/usb/gadget/legacy/inode.c in the Linux kernel through 5.16.8 mishandles dev->buf release. | https://nvd.nist.gov/vuln/detail/CVE-2022-24958 |
305,016 | linux | 501e38a5531efbd77d5c73c0ba838a889bfc1d74 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=501e38a5531efbd77d5c73c0ba838a889bfc1d74 | usb: gadget: clear related members when goto fail
dev->config and dev->hs_config and dev->dev need to be cleaned if
dev_config fails to avoid UAF.
Acked-by: Alan Stern <stern@rowland.harvard.edu>
Signed-off-by: Hangyu Hua <hbh25y@gmail.com>
Link: https://lore.kernel.org/r/20211231172138.7993-3-hbh25y@gmail.com
Signed... | 0 | dev_config (struct file *fd, const char __user *buf, size_t len, loff_t *ptr)
{
struct dev_data *dev = fd->private_data;
ssize_t value, length = len;
unsigned total;
u32 tag;
char *kbuf;
spin_lock_irq(&dev->lock);
if (dev->state > STATE_DEV_OPENED) {
value = ep0_write(fd, buf, len, ptr);
spin_unlock... | 242,044,116,473,098,500,000,000,000,000,000,000,000 | None | null | [
"CWE-763"
] | CVE-2022-24958 | drivers/usb/gadget/legacy/inode.c in the Linux kernel through 5.16.8 mishandles dev->buf release. | https://nvd.nist.gov/vuln/detail/CVE-2022-24958 |
200,534 | libgd | cfee163a5e848fc3e3fb1d05a30d7557cdd36457 | https://github.com/libgd/libgd | https://github.com/libgd/libgd/commit/cfee163a5e848fc3e3fb1d05a30d7557cdd36457 | - #18, Removed invalid gdFree call when overflow2 fails
- #17, Free im->pixels as well on error | 1 | BGD_DECLARE(gdImagePtr) gdImageCreate (int sx, int sy)
{
int i;
gdImagePtr im;
if (overflow2(sizeof (unsigned char *), sy)) {
gdFree(im);
return NULL;
}
im = (gdImage *) gdMalloc (sizeof (gdImage));
if (!im) {
return NULL;
}
memset (im, 0, sizeof (gdImage));
/* Row-major ever since gd 1.3 */
im... | 256,798,206,792,890,030,000,000,000,000,000,000,000 | gd.c | 46,449,260,265,110,780,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2016-5767 | Integer overflow in the gdImageCreate function in gd.c in the GD Graphics Library (aka libgd) before 2.0.34RC1, as used in PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8, allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified ot... | https://nvd.nist.gov/vuln/detail/CVE-2016-5767 |
305,100 | libgd | cfee163a5e848fc3e3fb1d05a30d7557cdd36457 | https://github.com/libgd/libgd | https://github.com/libgd/libgd/commit/cfee163a5e848fc3e3fb1d05a30d7557cdd36457 | - #18, Removed invalid gdFree call when overflow2 fails
- #17, Free im->pixels as well on error | 0 | BGD_DECLARE(gdImagePtr) gdImageCreate (int sx, int sy)
{
int i;
gdImagePtr im;
if (overflow2(sizeof (unsigned char *), sy)) {
return NULL;
}
if (overflow2(sizeof (unsigned char *), sx)) {
return NULL;
}
im = (gdImage *) gdMalloc (sizeof (gdImage));
if (!im) {
return NULL;
}
memset (im, 0, siz... | 159,650,139,449,059,390,000,000,000,000,000,000,000 | gd.c | 181,554,828,672,857,300,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2016-5767 | Integer overflow in the gdImageCreate function in gd.c in the GD Graphics Library (aka libgd) before 2.0.34RC1, as used in PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8, allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified ot... | https://nvd.nist.gov/vuln/detail/CVE-2016-5767 |
200,542 | mongo | 35c1b1f588f04926a958ad2fe4d9c59d79f81e8b | https://github.com/mongodb/mongo | https://github.com/mongodb/mongo/commit/35c1b1f588f04926a958ad2fe4d9c59d79f81e8b | SERVER-35636 renameCollectionForApplyOps checks for complete namespace | 1 | Status renameCollectionForApplyOps(OperationContext* opCtx,
const std::string& dbName,
const BSONElement& ui,
const BSONObj& cmd,
const repl::OpTime& renameOpTime) {
const aut... | 2,698,418,688,630,709,400,000,000,000,000,000,000 | rename_collection.cpp | 161,376,128,934,080,040,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2018-20804 | A user authorized to perform database queries may trigger denial of service by issuing specially crafted applyOps invocations. This issue affects: MongoDB Inc. MongoDB Server v4.0 versions prior to 4.0.10; v3.6 versions prior to 3.6.13. | https://nvd.nist.gov/vuln/detail/CVE-2018-20804 |
305,208 | mongo | 35c1b1f588f04926a958ad2fe4d9c59d79f81e8b | https://github.com/mongodb/mongo | https://github.com/mongodb/mongo/commit/35c1b1f588f04926a958ad2fe4d9c59d79f81e8b | SERVER-35636 renameCollectionForApplyOps checks for complete namespace | 0 | Status renameCollectionForApplyOps(OperationContext* opCtx,
const std::string& dbName,
const BSONElement& ui,
const BSONObj& cmd,
const repl::OpTime& renameOpTime) {
const aut... | 297,001,730,009,072,400,000,000,000,000,000,000,000 | rename_collection.cpp | 207,306,870,962,821,160,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2018-20804 | A user authorized to perform database queries may trigger denial of service by issuing specially crafted applyOps invocations. This issue affects: MongoDB Inc. MongoDB Server v4.0 versions prior to 4.0.10; v3.6 versions prior to 3.6.13. | https://nvd.nist.gov/vuln/detail/CVE-2018-20804 |
200,543 | ImageMagick | 17a1a6f97fd088a71931bdc422f4e96bb6ffc549 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/17a1a6f97fd088a71931bdc422f4e96bb6ffc549 | https://github.com/ImageMagick/ImageMagick/issues/1249 | 1 | static StringInfo *ParseImageResourceBlocks(Image *image,
const unsigned char *blocks,size_t length,
MagickBooleanType *has_merged_image,ExceptionInfo *exception)
{
const unsigned char
*p;
StringInfo
*profile;
unsigned char
name_length;
unsigned int
count;
unsigned short
id,
sh... | 183,372,386,126,740,970,000,000,000,000,000,000,000 | psd.c | 125,430,311,245,320,370,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-16412 | ImageMagick 7.0.8-11 Q16 has a heap-based buffer over-read in the coders/psd.c ParseImageResourceBlocks function. | https://nvd.nist.gov/vuln/detail/CVE-2018-16412 |
305,268 | ImageMagick | 17a1a6f97fd088a71931bdc422f4e96bb6ffc549 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/17a1a6f97fd088a71931bdc422f4e96bb6ffc549 | https://github.com/ImageMagick/ImageMagick/issues/1249 | 0 | static StringInfo *ParseImageResourceBlocks(Image *image,
const unsigned char *blocks,size_t length,
MagickBooleanType *has_merged_image,ExceptionInfo *exception)
{
const unsigned char
*p;
StringInfo
*profile;
unsigned char
name_length;
unsigned int
count;
unsigned short
id,
sh... | 336,089,082,422,141,030,000,000,000,000,000,000,000 | psd.c | 75,031,364,385,396,610,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-16412 | ImageMagick 7.0.8-11 Q16 has a heap-based buffer over-read in the coders/psd.c ParseImageResourceBlocks function. | https://nvd.nist.gov/vuln/detail/CVE-2018-16412 |
200,559 | linux | 77e70d351db7de07a46ac49b87a6c3c7a60fca7e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/77e70d351db7de07a46ac49b87a6c3c7a60fca7e | Input: sunkbd - avoid use-after-free in teardown paths
We need to make sure we cancel the reinit work before we tear down the
driver structures.
Reported-by: Bodong Zhao <nopitydays@gmail.com>
Tested-by: Bodong Zhao <nopitydays@gmail.com>
Cc: stable@vger.kernel.org
Signed-off-by: Dmitry Torokhov <dmitry.torokhov@gmai... | 1 | static void sunkbd_reinit(struct work_struct *work)
{
struct sunkbd *sunkbd = container_of(work, struct sunkbd, tq);
wait_event_interruptible_timeout(sunkbd->wait, sunkbd->reset >= 0, HZ);
serio_write(sunkbd->serio, SUNKBD_CMD_SETLED);
serio_write(sunkbd->serio,
(!!test_bit(LED_CAPSL, sunkbd->dev->led) << 3) ... | 312,755,301,801,403,600,000,000,000,000,000,000,000 | sunkbd.c | 249,779,570,168,083,900,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2020-25669 | A vulnerability was found in the Linux Kernel where the function sunkbd_reinit having been scheduled by sunkbd_interrupt before sunkbd being freed. Though the dangling pointer is set to NULL in sunkbd_disconnect, there is still an alias in sunkbd_reinit causing Use After Free. | https://nvd.nist.gov/vuln/detail/CVE-2020-25669 |
305,349 | linux | 77e70d351db7de07a46ac49b87a6c3c7a60fca7e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/77e70d351db7de07a46ac49b87a6c3c7a60fca7e | Input: sunkbd - avoid use-after-free in teardown paths
We need to make sure we cancel the reinit work before we tear down the
driver structures.
Reported-by: Bodong Zhao <nopitydays@gmail.com>
Tested-by: Bodong Zhao <nopitydays@gmail.com>
Cc: stable@vger.kernel.org
Signed-off-by: Dmitry Torokhov <dmitry.torokhov@gmai... | 0 | static void sunkbd_set_leds_beeps(struct sunkbd *sunkbd)
{
serio_write(sunkbd->serio, SUNKBD_CMD_SETLED);
serio_write(sunkbd->serio,
(!!test_bit(LED_CAPSL, sunkbd->dev->led) << 3) |
(!!test_bit(LED_SCROLLL, sunkbd->dev->led) << 2) |
(!!test_bit(LED_COMPOSE, sunkbd->dev->led) << 1) |
!!test_bit(LED_NUML, ... | 201,768,629,834,983,540,000,000,000,000,000,000,000 | sunkbd.c | 75,792,111,114,833,040,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2020-25669 | A vulnerability was found in the Linux Kernel where the function sunkbd_reinit having been scheduled by sunkbd_interrupt before sunkbd being freed. Though the dangling pointer is set to NULL in sunkbd_disconnect, there is still an alias in sunkbd_reinit causing Use After Free. | https://nvd.nist.gov/vuln/detail/CVE-2020-25669 |
200,560 | linux | 77e70d351db7de07a46ac49b87a6c3c7a60fca7e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/77e70d351db7de07a46ac49b87a6c3c7a60fca7e | Input: sunkbd - avoid use-after-free in teardown paths
We need to make sure we cancel the reinit work before we tear down the
driver structures.
Reported-by: Bodong Zhao <nopitydays@gmail.com>
Tested-by: Bodong Zhao <nopitydays@gmail.com>
Cc: stable@vger.kernel.org
Signed-off-by: Dmitry Torokhov <dmitry.torokhov@gmai... | 1 | static irqreturn_t sunkbd_interrupt(struct serio *serio,
unsigned char data, unsigned int flags)
{
struct sunkbd *sunkbd = serio_get_drvdata(serio);
if (sunkbd->reset <= -1) {
/*
* If cp[i] is 0xff, sunkbd->reset will stay -1.
* The keyboard sends 0xff 0xff 0xID on powerup.
*/
sunkbd->reset = data;
... | 265,130,201,845,161,900,000,000,000,000,000,000,000 | sunkbd.c | 249,779,570,168,083,900,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2020-25669 | A vulnerability was found in the Linux Kernel where the function sunkbd_reinit having been scheduled by sunkbd_interrupt before sunkbd being freed. Though the dangling pointer is set to NULL in sunkbd_disconnect, there is still an alias in sunkbd_reinit causing Use After Free. | https://nvd.nist.gov/vuln/detail/CVE-2020-25669 |
305,354 | linux | 77e70d351db7de07a46ac49b87a6c3c7a60fca7e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/77e70d351db7de07a46ac49b87a6c3c7a60fca7e | Input: sunkbd - avoid use-after-free in teardown paths
We need to make sure we cancel the reinit work before we tear down the
driver structures.
Reported-by: Bodong Zhao <nopitydays@gmail.com>
Tested-by: Bodong Zhao <nopitydays@gmail.com>
Cc: stable@vger.kernel.org
Signed-off-by: Dmitry Torokhov <dmitry.torokhov@gmai... | 0 | static irqreturn_t sunkbd_interrupt(struct serio *serio,
unsigned char data, unsigned int flags)
{
struct sunkbd *sunkbd = serio_get_drvdata(serio);
if (sunkbd->reset <= -1) {
/*
* If cp[i] is 0xff, sunkbd->reset will stay -1.
* The keyboard sends 0xff 0xff 0xID on powerup.
*/
sunkbd->reset = data;
... | 68,967,450,280,763,020,000,000,000,000,000,000,000 | sunkbd.c | 75,792,111,114,833,040,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2020-25669 | A vulnerability was found in the Linux Kernel where the function sunkbd_reinit having been scheduled by sunkbd_interrupt before sunkbd being freed. Though the dangling pointer is set to NULL in sunkbd_disconnect, there is still an alias in sunkbd_reinit causing Use After Free. | https://nvd.nist.gov/vuln/detail/CVE-2020-25669 |
200,568 | libreswan | 9b31deafbdbf0c2206358dfbf2d4e343e365f23f | https://github.com/libreswan/libreswan | https://github.com/libreswan/libreswan/commit/9b31deafbdbf0c2206358dfbf2d4e343e365f23f | SECURITY: Do not inspect or continue on very short packets
Code introduced in Openswan to ensure the IKEv2 minor was ignored
introduced a vulnerability that caused mangled short IKE packets to
be processed as valid IKE packets despite in_struct() returning a
failure, resulting in pluto crashing and restarting.
Report... | 1 | void process_packet(struct msg_digest **mdp)
{
struct msg_digest *md = *mdp;
struct state *st = NULL;
int maj, min;
enum state_kind from_state = STATE_UNDEFINED; /* state we started in */
struct isakmp_hdr *hdr;
#define SEND_NOTIFICATION(t) { \
if (st) \
send_notification_from_state(st, from_state, t); \
... | 134,270,365,742,178,900,000,000,000,000,000,000,000 | demux.c | 337,063,778,717,034,250,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4564 | Libreswan 3.6 allows remote attackers to cause a denial of service (crash) via a small length value and (1) no version or (2) an invalid major number in an IKE packet. | https://nvd.nist.gov/vuln/detail/CVE-2013-4564 |
305,522 | libreswan | 9b31deafbdbf0c2206358dfbf2d4e343e365f23f | https://github.com/libreswan/libreswan | https://github.com/libreswan/libreswan/commit/9b31deafbdbf0c2206358dfbf2d4e343e365f23f | SECURITY: Do not inspect or continue on very short packets
Code introduced in Openswan to ensure the IKEv2 minor was ignored
introduced a vulnerability that caused mangled short IKE packets to
be processed as valid IKE packets despite in_struct() returning a
failure, resulting in pluto crashing and restarting.
Report... | 0 | void process_packet(struct msg_digest **mdp)
{
struct msg_digest *md = *mdp;
struct state *st = NULL;
int vmaj, vmin;
enum state_kind from_state = STATE_UNDEFINED; /* state we started in */
#define SEND_NOTIFICATION(t) { \
if (st) \
send_notification_from_state(st, from_state, t); \
else \
send_notific... | 101,988,141,771,400,330,000,000,000,000,000,000,000 | demux.c | 115,007,169,366,432,070,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-4564 | Libreswan 3.6 allows remote attackers to cause a denial of service (crash) via a small length value and (1) no version or (2) an invalid major number in an IKE packet. | https://nvd.nist.gov/vuln/detail/CVE-2013-4564 |
200,571 | lxc | 5eb45428b312e978fb9e294dde16efb14dd9fa4d | https://github.com/lxc/lxc | https://github.com/lxc/lxc/commit/5eb45428b312e978fb9e294dde16efb14dd9fa4d | CVE 2018-6556: verify netns fd in lxc-user-nic
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> | 1 | int main(int argc, char *argv[])
{
int fd, n, pid, request, ret;
char *me, *newname;
struct user_nic_args args;
int container_veth_ifidx = -1, host_veth_ifidx = -1, netns_fd = -1;
char *cnic = NULL, *nicname = NULL;
struct alloted_s *alloted = NULL;
if (argc < 7 || argc > 8) {
usage(argv[0], true);
exit(EXI... | 107,076,507,013,076,860,000,000,000,000,000,000,000 | None | null | [
"CWE-417"
] | CVE-2018-6556 | lxc-user-nic when asked to delete a network interface will unconditionally open a user provided path. This code path may be used by an unprivileged user to check for the existence of a path which they wouldn't otherwise be able to reach. It may also be used to trigger side effects by causing a (read-only) open of speci... | https://nvd.nist.gov/vuln/detail/CVE-2018-6556 |
305,591 | lxc | 5eb45428b312e978fb9e294dde16efb14dd9fa4d | https://github.com/lxc/lxc | https://github.com/lxc/lxc/commit/5eb45428b312e978fb9e294dde16efb14dd9fa4d | CVE 2018-6556: verify netns fd in lxc-user-nic
Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com> | 0 | int main(int argc, char *argv[])
{
int fd, n, pid, request, ret;
char *me, *newname;
struct user_nic_args args;
int container_veth_ifidx = -1, host_veth_ifidx = -1, netns_fd = -1;
char *cnic = NULL, *nicname = NULL;
struct alloted_s *alloted = NULL;
if (argc < 7 || argc > 8) {
usage(argv[0], true);
exit(EXI... | 137,298,647,947,402,950,000,000,000,000,000,000,000 | None | null | [
"CWE-417"
] | CVE-2018-6556 | lxc-user-nic when asked to delete a network interface will unconditionally open a user provided path. This code path may be used by an unprivileged user to check for the existence of a path which they wouldn't otherwise be able to reach. It may also be used to trigger side effects by causing a (read-only) open of speci... | https://nvd.nist.gov/vuln/detail/CVE-2018-6556 |
200,609 | php-src | 158d8a6b088662ce9d31e0c777c6ebe90efdc854 | https://github.com/php/php-src | http://git.php.net/?p=php-src.git;a=commitdiff;h=158d8a6b088662ce9d31e0c777c6ebe90efdc854 | fix unchecked emalloc | 1 | static int phar_tar_process_metadata(phar_entry_info *entry, php_stream *fp TSRMLS_DC) /* {{{ */
{
char *metadata;
size_t save = php_stream_tell(fp), read;
phar_entry_info *mentry;
metadata = (char *) emalloc(entry->uncompressed_filesize + 1);
read = php_stream_read(fp, metadata, entry->uncompressed_filesize);
... | 65,364,156,517,998,690,000,000,000,000,000,000,000 | tar.c | 149,503,072,447,606,830,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2386 | Integer overflow in the phar_parse_tarfile function in tar.c in the phar extension in PHP before 5.3.14 and 5.4.x before 5.4.4 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted tar file that triggers a heap-based buffer overflow. | https://nvd.nist.gov/vuln/detail/CVE-2012-2386 |
305,741 | php-src | 158d8a6b088662ce9d31e0c777c6ebe90efdc854 | https://github.com/php/php-src | http://git.php.net/?p=php-src.git;a=commitdiff;h=158d8a6b088662ce9d31e0c777c6ebe90efdc854 | fix unchecked emalloc | 0 | static int phar_tar_process_metadata(phar_entry_info *entry, php_stream *fp TSRMLS_DC) /* {{{ */
{
char *metadata;
size_t save = php_stream_tell(fp), read;
phar_entry_info *mentry;
metadata = (char *) safe_emalloc(1, entry->uncompressed_filesize, 1);
read = php_stream_read(fp, metadata, entry->uncompressed_files... | 233,449,039,787,058,470,000,000,000,000,000,000,000 | tar.c | 121,940,513,997,505,800,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2012-2386 | Integer overflow in the phar_parse_tarfile function in tar.c in the phar extension in PHP before 5.3.14 and 5.4.x before 5.4.4 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted tar file that triggers a heap-based buffer overflow. | https://nvd.nist.gov/vuln/detail/CVE-2012-2386 |
200,610 | ImageMagick | f0a8d407b2801174fd8923941a9e7822f7f9a506 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/f0a8d407b2801174fd8923941a9e7822f7f9a506 | https://github.com/ImageMagick/ImageMagick/issues/1719 | 1 | static Image *ReadTXTImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
char
colorspace[MagickPathExtent],
text[MagickPathExtent];
double
max_value,
x_offset,
y_offset;
Image
*image;
PixelInfo
pixel;
MagickBooleanType
status;
QuantumAny
range;
register ... | 145,033,988,022,512,470,000,000,000,000,000,000,000 | txt.c | 240,615,627,853,878,400,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2020-27758 | A flaw was found in ImageMagick in coders/txt.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned long long`. This would most likely lead to an impact to application availability, but could potentially caus... | https://nvd.nist.gov/vuln/detail/CVE-2020-27758 |
305,749 | ImageMagick | f0a8d407b2801174fd8923941a9e7822f7f9a506 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/f0a8d407b2801174fd8923941a9e7822f7f9a506 | https://github.com/ImageMagick/ImageMagick/issues/1719 | 0 | static Image *ReadTXTImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
char
colorspace[MagickPathExtent],
text[MagickPathExtent];
double
max_value,
x_offset,
y_offset;
Image
*image;
PixelInfo
pixel;
MagickBooleanType
status;
QuantumAny
range;
register ... | 62,057,344,466,366,940,000,000,000,000,000,000,000 | txt.c | 188,533,965,387,956,480,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2020-27758 | A flaw was found in ImageMagick in coders/txt.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned long long`. This would most likely lead to an impact to application availability, but could potentially caus... | https://nvd.nist.gov/vuln/detail/CVE-2020-27758 |
200,620 | weechat | 9453e81baa7935db82a0b765a47cba772aba730d | https://github.com/weechat/weechat | http://git.savannah.gnu.org/gitweb/?p=weechat.git;a=commitdiff;h=9453e81baa7935db82a0b765a47cba772aba730d | irc: fix crash when decoding IRC colors in strings (bug #37704) | 1 | irc_color_decode (const char *string, int keep_colors)
{
unsigned char *out, *ptr_string;
int out_length, length, out_pos;
char str_fg[3], str_bg[3], str_color[128], str_key[128];
const char *remapped_color;
int fg, bg, bold, reverse, italic, underline, rc;
out_length = (strlen (string) * 2) + ... | 223,681,771,460,116,220,000,000,000,000,000,000,000 | irc-color.c | 89,422,887,636,174,310,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2012-5854 | Heap-based buffer overflow in WeeChat 0.3.6 through 0.3.9 allows remote attackers to cause a denial of service (crash or hang) and possibly execute arbitrary code via crafted IRC colors that are not properly decoded. | https://nvd.nist.gov/vuln/detail/CVE-2012-5854 |
306,278 | weechat | 9453e81baa7935db82a0b765a47cba772aba730d | https://github.com/weechat/weechat | http://git.savannah.gnu.org/gitweb/?p=weechat.git;a=commitdiff;h=9453e81baa7935db82a0b765a47cba772aba730d | irc: fix crash when decoding IRC colors in strings (bug #37704) | 0 | irc_color_decode (const char *string, int keep_colors)
{
unsigned char *out, *out2, *ptr_string;
int out_length, length, out_pos, length_to_add;
char str_fg[3], str_bg[3], str_color[128], str_key[128], str_to_add[128];
const char *remapped_color;
int fg, bg, bold, reverse, italic, underline, rc;
... | 114,733,310,755,086,330,000,000,000,000,000,000,000 | irc-color.c | 250,038,329,146,825,260,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2012-5854 | Heap-based buffer overflow in WeeChat 0.3.6 through 0.3.9 allows remote attackers to cause a denial of service (crash or hang) and possibly execute arbitrary code via crafted IRC colors that are not properly decoded. | https://nvd.nist.gov/vuln/detail/CVE-2012-5854 |
200,623 | libexpat | ba0f9c3b40c264b8dd392e02a7a060a8fa54f032 | https://github.com/libexpat/libexpat | https://github.com/libexpat/libexpat/commit/ba0f9c3b40c264b8dd392e02a7a060a8fa54f032 | CVE-2015-1283 Sanity check size calculations. r=peterv, a=abillings
https://sourceforge.net/p/expat/bugs/528/ | 1 | XML_GetBuffer(XML_Parser parser, int len)
{
switch (ps_parsing) {
case XML_SUSPENDED:
errorCode = XML_ERROR_SUSPENDED;
return NULL;
case XML_FINISHED:
errorCode = XML_ERROR_FINISHED;
return NULL;
default: ;
}
if (len > bufferLim - bufferEnd) {
/* FIXME avoid integer overflow */
int ... | 162,587,282,358,463,120,000,000,000,000,000,000,000 | xmlparse.c | 313,837,865,050,894,300,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2015-2716 | Buffer overflow in the XML parser in Mozilla Firefox before 38.0, Firefox ESR 31.x before 31.7, and Thunderbird before 31.7 allows remote attackers to execute arbitrary code by providing a large amount of compressed XML data, a related issue to CVE-2015-1283. | https://nvd.nist.gov/vuln/detail/CVE-2015-2716 |
306,400 | libexpat | ba0f9c3b40c264b8dd392e02a7a060a8fa54f032 | https://github.com/libexpat/libexpat | https://github.com/libexpat/libexpat/commit/ba0f9c3b40c264b8dd392e02a7a060a8fa54f032 | CVE-2015-1283 Sanity check size calculations. r=peterv, a=abillings
https://sourceforge.net/p/expat/bugs/528/ | 0 | XML_GetBuffer(XML_Parser parser, int len)
{
if (len < 0) {
errorCode = XML_ERROR_NO_MEMORY;
return NULL;
}
switch (ps_parsing) {
case XML_SUSPENDED:
errorCode = XML_ERROR_SUSPENDED;
return NULL;
case XML_FINISHED:
errorCode = XML_ERROR_FINISHED;
return NULL;
default: ;
}
if (len... | 108,033,387,776,295,410,000,000,000,000,000,000,000 | xmlparse.c | 74,933,495,793,135,120,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2015-2716 | Buffer overflow in the XML parser in Mozilla Firefox before 38.0, Firefox ESR 31.x before 31.7, and Thunderbird before 31.7 allows remote attackers to execute arbitrary code by providing a large amount of compressed XML data, a related issue to CVE-2015-1283. | https://nvd.nist.gov/vuln/detail/CVE-2015-2716 |
200,631 | php-src | e5c95234d87fcb8f6b7569a96a89d1e1544749a6 | https://github.com/php/php-src | http://git.php.net/?p=php-src.git;a=commit;h=e5c95234d87fcb8f6b7569a96a89d1e1544749a6 | Fix bug #79082 - Files added to tar with Phar::buildFromIterator have all-access permissions | 1 | static int phar_build(zend_object_iterator *iter, void *puser) /* {{{ */
{
zval *value;
zend_bool close_fp = 1;
struct _phar_t *p_obj = (struct _phar_t*) puser;
uint32_t str_key_len, base_len = p_obj->l;
phar_entry_data *data;
php_stream *fp;
size_t fname_len;
size_t contents_len;
char *fname, *error = NULL, *... | 142,381,912,986,497,900,000,000,000,000,000,000,000 | phar_object.c | 143,675,667,435,652,180,000,000,000,000,000,000,000 | [
"CWE-281"
] | CVE-2020-7063 | In PHP versions 7.2.x below 7.2.28, 7.3.x below 7.3.15 and 7.4.x below 7.4.3, when creating PHAR archive using PharData::buildFromIterator() function, the files are added with default permissions (0666, or all access) even if the original files on the filesystem were with more restrictive permissions. This may result i... | https://nvd.nist.gov/vuln/detail/CVE-2020-7063 |
306,695 | php-src | e5c95234d87fcb8f6b7569a96a89d1e1544749a6 | https://github.com/php/php-src | http://git.php.net/?p=php-src.git;a=commit;h=e5c95234d87fcb8f6b7569a96a89d1e1544749a6 | Fix bug #79082 - Files added to tar with Phar::buildFromIterator have all-access permissions | 0 | static int phar_build(zend_object_iterator *iter, void *puser) /* {{{ */
{
zval *value;
zend_bool close_fp = 1;
struct _phar_t *p_obj = (struct _phar_t*) puser;
uint32_t str_key_len, base_len = p_obj->l;
phar_entry_data *data;
php_stream *fp;
size_t fname_len;
size_t contents_len;
char *fname, *error = NULL, *... | 252,328,092,355,793,480,000,000,000,000,000,000,000 | phar_object.c | 30,122,531,312,198,340,000,000,000,000,000,000,000 | [
"CWE-281"
] | CVE-2020-7063 | In PHP versions 7.2.x below 7.2.28, 7.3.x below 7.3.15 and 7.4.x below 7.4.3, when creating PHAR archive using PharData::buildFromIterator() function, the files are added with default permissions (0666, or all access) even if the original files on the filesystem were with more restrictive permissions. This may result i... | https://nvd.nist.gov/vuln/detail/CVE-2020-7063 |
200,634 | xserver | 446ff2d3177087b8173fa779fa5b77a2a128988b | http://gitweb.freedesktop.org/?p=xorg/xserver | https://gitlab.freedesktop.org/xorg/xserver/-/commit/446ff2d3177087b8173fa779fa5b77a2a128988b | Check SetMap request length carefully.
Avoid out of bounds memory accesses on too short request.
ZDI-CAN 11572 / CVE-2020-14360
This vulnerability was discovered by:
Jan-Niklas Sohn working with Trend Micro Zero Day Initiative
Signed-off-by: Matthieu Herrb <matthieu@herrb.eu> | 1 | ProcXkbSetMap(ClientPtr client)
{
DeviceIntPtr dev;
char *tmp;
int rc;
REQUEST(xkbSetMapReq);
REQUEST_AT_LEAST_SIZE(xkbSetMapReq);
if (!(client->xkbClientFlags & _XkbClientInitialized))
return BadAccess;
CHK_KBD_DEVICE(dev, stuff->deviceSpec, client, DixManageAccess);
CHK_MASK... | 270,061,835,713,047,150,000,000,000,000,000,000,000 | xkb.c | 166,733,717,349,972,270,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2020-14360 | A flaw was found in the X.Org Server before version 1.20.10. An out-of-bounds access in the XkbSetMap function may lead to a privilege escalation vulnerability. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. | https://nvd.nist.gov/vuln/detail/CVE-2020-14360 |
306,868 | xserver | 446ff2d3177087b8173fa779fa5b77a2a128988b | http://gitweb.freedesktop.org/?p=xorg/xserver | https://gitlab.freedesktop.org/xorg/xserver/-/commit/446ff2d3177087b8173fa779fa5b77a2a128988b | Check SetMap request length carefully.
Avoid out of bounds memory accesses on too short request.
ZDI-CAN 11572 / CVE-2020-14360
This vulnerability was discovered by:
Jan-Niklas Sohn working with Trend Micro Zero Day Initiative
Signed-off-by: Matthieu Herrb <matthieu@herrb.eu> | 0 | ProcXkbSetMap(ClientPtr client)
{
DeviceIntPtr dev;
char *tmp;
int rc;
REQUEST(xkbSetMapReq);
REQUEST_AT_LEAST_SIZE(xkbSetMapReq);
if (!(client->xkbClientFlags & _XkbClientInitialized))
return BadAccess;
CHK_KBD_DEVICE(dev, stuff->deviceSpec, client, DixManageAccess);
CHK_MASK... | 65,916,553,124,724,060,000,000,000,000,000,000,000 | xkb.c | 158,236,170,569,627,880,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2020-14360 | A flaw was found in the X.Org Server before version 1.20.10. An out-of-bounds access in the XkbSetMap function may lead to a privilege escalation vulnerability. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. | https://nvd.nist.gov/vuln/detail/CVE-2020-14360 |
200,635 | mbedtls | c988f32adde62a169ba340fee0da15aecd40e76e | https://github.com/ARMmbed/mbedtls | https://github.com/ARMmbed/mbedtls/commit/c988f32adde62a169ba340fee0da15aecd40e76e | Added max length checking of hostname | 1 | int ssl_set_hostname( ssl_context *ssl, const char *hostname )
{
if( hostname == NULL )
return( POLARSSL_ERR_SSL_BAD_INPUT_DATA );
ssl->hostname_len = strlen( hostname );
if( ssl->hostname_len + 1 == 0 )
return( POLARSSL_ERR_SSL_BAD_INPUT_DATA );
ssl->hostname = polarssl_malloc( ssl->... | 247,537,879,168,285,730,000,000,000,000,000,000,000 | ssl_tls.c | 133,655,392,987,534,970,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2015-5291 | Heap-based buffer overflow in PolarSSL 1.x before 1.2.17 and ARM mbed TLS (formerly PolarSSL) 1.3.x before 1.3.14 and 2.x before 2.1.2 allows remote SSL servers to cause a denial of service (client crash) and possibly execute arbitrary code via a long hostname to the server name indication (SNI) extension, which is not... | https://nvd.nist.gov/vuln/detail/CVE-2015-5291 |
306,897 | mbedtls | c988f32adde62a169ba340fee0da15aecd40e76e | https://github.com/ARMmbed/mbedtls | https://github.com/ARMmbed/mbedtls/commit/c988f32adde62a169ba340fee0da15aecd40e76e | Added max length checking of hostname | 0 | int ssl_set_hostname( ssl_context *ssl, const char *hostname )
{
if( hostname == NULL )
return( POLARSSL_ERR_SSL_BAD_INPUT_DATA );
ssl->hostname_len = strlen( hostname );
if( ssl->hostname_len + 1 == 0 )
return( POLARSSL_ERR_SSL_BAD_INPUT_DATA );
if( ssl->hostname_len > SSL_MAX_HOST_N... | 205,428,076,848,854,880,000,000,000,000,000,000,000 | ssl_tls.c | 41,989,934,499,373,270,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2015-5291 | Heap-based buffer overflow in PolarSSL 1.x before 1.2.17 and ARM mbed TLS (formerly PolarSSL) 1.3.x before 1.3.14 and 2.x before 2.1.2 allows remote SSL servers to cause a denial of service (client crash) and possibly execute arbitrary code via a long hostname to the server name indication (SNI) extension, which is not... | https://nvd.nist.gov/vuln/detail/CVE-2015-5291 |
200,638 | linux | 050fad7c4534c13c8eb1d9c2ba66012e014773cb | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=050fad7c4534c13c8eb1d9c2ba66012e014773cb | bpf: fix truncated jump targets on heavy expansions
Recently during testing, I ran into the following panic:
[ 207.892422] Internal error: Accessing user space memory outside uaccess.h routines: 96000004 [#1] SMP
[ 207.901637] Modules linked in: binfmt_misc [...]
[ 207.966530] CPU: 45 PID: 2256 Comm: test_ve... | 1 | static int bpf_convert_filter(struct sock_filter *prog, int len,
struct bpf_prog *new_prog, int *new_len)
{
int new_flen = 0, pass = 0, target, i, stack_off;
struct bpf_insn *new_insn, *first_insn = NULL;
struct sock_filter *fp;
int *addrs = NULL;
u8 bpf_src;
BUILD_BUG_ON(BPF_MEMWORDS * sizeof(u32) > MA... | 298,825,752,604,361,460,000,000,000,000,000,000,000 | filter.c | 236,062,132,936,816,500,000,000,000,000,000,000,000 | [
"CWE-120"
] | CVE-2018-25020 | The BPF subsystem in the Linux kernel before 4.17 mishandles situations with a long jump over an instruction sequence where inner instructions require substantial expansions into multiple BPF instructions, leading to an overflow. This affects kernel/bpf/core.c and net/core/filter.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-25020 |
307,147 | linux | 050fad7c4534c13c8eb1d9c2ba66012e014773cb | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=050fad7c4534c13c8eb1d9c2ba66012e014773cb | bpf: fix truncated jump targets on heavy expansions
Recently during testing, I ran into the following panic:
[ 207.892422] Internal error: Accessing user space memory outside uaccess.h routines: 96000004 [#1] SMP
[ 207.901637] Modules linked in: binfmt_misc [...]
[ 207.966530] CPU: 45 PID: 2256 Comm: test_ve... | 0 | static int bpf_convert_filter(struct sock_filter *prog, int len,
struct bpf_prog *new_prog, int *new_len)
{
int new_flen = 0, pass = 0, target, i, stack_off;
struct bpf_insn *new_insn, *first_insn = NULL;
struct sock_filter *fp;
int *addrs = NULL;
u8 bpf_src;
BUILD_BUG_ON(BPF_MEMWORDS * sizeof(u32) > MA... | 222,095,009,470,104,620,000,000,000,000,000,000,000 | filter.c | 87,774,074,568,579,580,000,000,000,000,000,000,000 | [
"CWE-120"
] | CVE-2018-25020 | The BPF subsystem in the Linux kernel before 4.17 mishandles situations with a long jump over an instruction sequence where inner instructions require substantial expansions into multiple BPF instructions, leading to an overflow. This affects kernel/bpf/core.c and net/core/filter.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-25020 |
200,641 | php-src | 330f1716df49c0d3474c18b6dcd370a9dcf57422 | https://github.com/php/php-src | http://git.php.net/?p=php-src.git;a=commit;h=330f1716df49c0d3474c18b6dcd370a9dcf57422 | Fixed bug #77831 - Heap-buffer-overflow in exif_iif_add_value in EXIF | 1 | static void exif_iif_add_value(image_info_type *image_info, int section_index, char *name, int tag, int format, int length, void* value, int motorola_intel)
{
size_t idex;
void *vptr;
image_info_value *info_value;
image_info_data *info_data;
image_info_data *list;
if (length < 0) {
return;
}
list = safe_e... | 172,746,989,155,196,970,000,000,000,000,000,000,000 | exif.c | 253,954,302,449,788,160,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-11035 | When processing certain files, PHP EXIF extension in versions 7.1.x below 7.1.28, 7.2.x below 7.2.17 and 7.3.x below 7.3.4 can be caused to read past allocated buffer in exif_iif_add_value function. This may lead to information disclosure or crash. | https://nvd.nist.gov/vuln/detail/CVE-2019-11035 |
307,189 | php-src | 330f1716df49c0d3474c18b6dcd370a9dcf57422 | https://github.com/php/php-src | http://git.php.net/?p=php-src.git;a=commit;h=330f1716df49c0d3474c18b6dcd370a9dcf57422 | Fixed bug #77831 - Heap-buffer-overflow in exif_iif_add_value in EXIF | 0 | static void exif_iif_add_value(image_info_type *image_info, int section_index, char *name, int tag, int format, int length, void* value, size_t value_len, int motorola_intel)
{
size_t idex;
void *vptr, *vptr_end;
image_info_value *info_value;
image_info_data *info_data;
image_info_data *list;
if (length < 0) {... | 276,555,751,330,914,300,000,000,000,000,000,000,000 | exif.c | 167,654,970,243,950,450,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-11035 | When processing certain files, PHP EXIF extension in versions 7.1.x below 7.1.28, 7.2.x below 7.2.17 and 7.3.x below 7.3.4 can be caused to read past allocated buffer in exif_iif_add_value function. This may lead to information disclosure or crash. | https://nvd.nist.gov/vuln/detail/CVE-2019-11035 |
200,653 | linux | c6688ef9f29762e65bce325ef4acd6c675806366 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c6688ef9f29762e65bce325ef4acd6c675806366 | usbip: fix stub_rx: harden CMD_SUBMIT path to handle malicious input
Harden CMD_SUBMIT path to handle malicious input that could trigger
large memory allocations. Add checks to validate transfer_buffer_length
and number_of_packets to protect against bad input requesting for
unbounded memory allocations. Validate early... | 1 | static void stub_recv_cmd_submit(struct stub_device *sdev,
struct usbip_header *pdu)
{
int ret;
struct stub_priv *priv;
struct usbip_device *ud = &sdev->ud;
struct usb_device *udev = sdev->udev;
int pipe = get_pipe(sdev, pdu->base.ep, pdu->base.direction);
if (pipe == -1)
return;
priv = stub_priv_alloc(... | 26,313,967,580,838,830,000,000,000,000,000,000,000 | stub_rx.c | 14,624,339,429,164,412,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-16913 | The "stub_recv_cmd_submit()" function (drivers/usb/usbip/stub_rx.c) in the Linux Kernel before version 4.14.8, 4.9.71, and 4.4.114 when handling CMD_SUBMIT packets allows attackers to cause a denial of service (arbitrary memory allocation) via a specially crafted USB over IP packet. | https://nvd.nist.gov/vuln/detail/CVE-2017-16913 |
307,318 | linux | c6688ef9f29762e65bce325ef4acd6c675806366 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c6688ef9f29762e65bce325ef4acd6c675806366 | usbip: fix stub_rx: harden CMD_SUBMIT path to handle malicious input
Harden CMD_SUBMIT path to handle malicious input that could trigger
large memory allocations. Add checks to validate transfer_buffer_length
and number_of_packets to protect against bad input requesting for
unbounded memory allocations. Validate early... | 0 | static void stub_recv_cmd_submit(struct stub_device *sdev,
struct usbip_header *pdu)
{
int ret;
struct stub_priv *priv;
struct usbip_device *ud = &sdev->ud;
struct usb_device *udev = sdev->udev;
int pipe = get_pipe(sdev, pdu);
if (pipe == -1)
return;
priv = stub_priv_alloc(sdev, pdu);
if (!priv)
retu... | 264,094,243,959,702,600,000,000,000,000,000,000,000 | stub_rx.c | 287,813,356,241,454,560,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-16913 | The "stub_recv_cmd_submit()" function (drivers/usb/usbip/stub_rx.c) in the Linux Kernel before version 4.14.8, 4.9.71, and 4.4.114 when handling CMD_SUBMIT packets allows attackers to cause a denial of service (arbitrary memory allocation) via a specially crafted USB over IP packet. | https://nvd.nist.gov/vuln/detail/CVE-2017-16913 |
200,657 | qemu | 940973ae0b45c9b6817bab8e4cf4df99a9ef83d7 | https://github.com/bonzini/qemu | http://git.qemu.org/?p=qemu.git;a=commit;h=940973ae0b45c9b6817bab8e4cf4df99a9ef83d7 | ide: Correct improper smart self test counter reset in ide core.
The SMART self test counter was incorrectly being reset to zero,
not 1. This had the effect that on every 21st SMART EXECUTE OFFLINE:
* We would write off the beginning of a dynamically allocated buffer
* We forgot the SMART history
Fix this.
Signed-o... | 1 | static bool cmd_smart(IDEState *s, uint8_t cmd)
{
int n;
if (s->hcyl != 0xc2 || s->lcyl != 0x4f) {
goto abort_cmd;
}
if (!s->smart_enabled && s->feature != SMART_ENABLE) {
goto abort_cmd;
}
switch (s->feature) {
case SMART_DISABLE:
s->smart_enabled = 0;
ret... | 317,507,375,239,169,250,000,000,000,000,000,000,000 | core.c | 238,980,910,314,922,300,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2014-2894 | Off-by-one error in the cmd_smart function in the smart self test in hw/ide/core.c in QEMU before 2.0 allows local users to have unspecified impact via a SMART EXECUTE OFFLINE command that triggers a buffer underflow and memory corruption. | https://nvd.nist.gov/vuln/detail/CVE-2014-2894 |
187,226 | qemu | 3251bdcf1c67427d964517053c3d185b46e618e8 | https://github.com/bonzini/qemu | http://git.qemu.org/?p=qemu.git;a=commitdiff;h=3251bdcf1c67427d964517053c3d185b46e618e8 | ide: Correct handling of malformed/short PRDTs
This impacts both BMDMA and AHCI HBA interfaces for IDE.
Currently, we confuse the difference between a PRDT having
"0 bytes" and a PRDT having "0 complete sectors."
When we receive an incomplete sector, inconsistent error checking
leads to an infinite loop wherein the c... | 0 | static bool cmd_smart(IDEState *s, uint8_t cmd)
{
int n;
if (s->hcyl != 0xc2 || s->lcyl != 0x4f) {
goto abort_cmd;
}
if (!s->smart_enabled && s->feature != SMART_ENABLE) {
goto abort_cmd;
}
switch (s->feature) {
case SMART_DISABLE:
s->smart_enabled = 0;
ret... | 16,020,944,557,851,401,000,000,000,000,000,000,000 | core.c | 326,290,854,927,273,170,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2014-9718 | The (1) BMDMA and (2) AHCI HBA interfaces in the IDE functionality in QEMU 1.0 through 2.1.3 have multiple interpretations of a function's return value, which allows guest OS users to cause a host OS denial of service (memory consumption or infinite loop, and system crash) via a PRDT with zero complete sectors, related... | https://nvd.nist.gov/vuln/detail/CVE-2014-9718 |
200,658 | freeradius-server | 3ea2a5a026e73d81cd9a3e9bbd4300c433004bfa | https://github.com/alandekok/freeradius-server | https://github.com/FreeRADIUS/freeradius-server/commit/3ea2a5a026e73d81cd9a3e9bbd4300c433004bfa | EAP-pwd: fix side-channel leak where 1 in 2018 handshakes fail
Previously the Hunting and Pecking algorithm of EAP-pwd aborted when
more than 10 iterations are needed. Every iteration has a 50% chance
of finding the password element. This means one in every 2048 handshakes
will fail, in which case an error frame is se... | 1 | int compute_password_element (pwd_session_t *session, uint16_t grp_num,
char const *password, int password_len,
char const *id_server, int id_server_len,
char const *id_peer, int id_peer_len,
uint32_t *token)
{
BIGNUM *x_candidate = NULL, *rnd = NULL, *cofactor = NULL;
HMAC_CTX *ct... | 235,662,784,488,864,240,000,000,000,000,000,000,000 | eap_pwd.c | 215,994,526,581,755,800,000,000,000,000,000,000,000 | [
"CWE-284"
] | CVE-2019-13456 | In FreeRADIUS 3.0 through 3.0.19, on average 1 in every 2048 EAP-pwd handshakes fails because the password element cannot be found within 10 iterations of the hunting and pecking loop. This leaks information that an attacker can use to recover the password of any user. This information leakage is similar to the "Dragon... | https://nvd.nist.gov/vuln/detail/CVE-2019-13456 |
307,563 | freeradius-server | 3ea2a5a026e73d81cd9a3e9bbd4300c433004bfa | https://github.com/alandekok/freeradius-server | https://github.com/FreeRADIUS/freeradius-server/commit/3ea2a5a026e73d81cd9a3e9bbd4300c433004bfa | EAP-pwd: fix side-channel leak where 1 in 2018 handshakes fail
Previously the Hunting and Pecking algorithm of EAP-pwd aborted when
more than 10 iterations are needed. Every iteration has a 50% chance
of finding the password element. This means one in every 2048 handshakes
will fail, in which case an error frame is se... | 0 | int compute_password_element (pwd_session_t *session, uint16_t grp_num,
char const *password, int password_len,
char const *id_server, int id_server_len,
char const *id_peer, int id_peer_len,
uint32_t *token)
{
BIGNUM *x_candidate = NULL, *rnd = NULL, *cofactor = NULL;
HMAC_CTX *ct... | 186,598,040,797,616,970,000,000,000,000,000,000,000 | eap_pwd.c | 82,884,293,596,424,980,000,000,000,000,000,000,000 | [
"CWE-284"
] | CVE-2019-13456 | In FreeRADIUS 3.0 through 3.0.19, on average 1 in every 2048 EAP-pwd handshakes fails because the password element cannot be found within 10 iterations of the hunting and pecking loop. This leaks information that an attacker can use to recover the password of any user. This information leakage is similar to the "Dragon... | https://nvd.nist.gov/vuln/detail/CVE-2019-13456 |
200,671 | ImageMagick | 98a2cceae0dceccbfe54051167c2c80be1f13c3f | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/98a2cceae0dceccbfe54051167c2c80be1f13c3f | https://github.com/ImageMagick/ImageMagick/issues/1192 | 1 | static MagickBooleanType WriteMPCImage(const ImageInfo *image_info,Image *image,
ExceptionInfo *exception)
{
char
buffer[MagickPathExtent],
cache_filename[MagickPathExtent];
const char
*property,
*value;
MagickBooleanType
status;
MagickOffsetType
offset,
scene;
register ssize... | 305,801,557,166,372,200,000,000,000,000,000,000,000 | mpc.c | 63,857,671,062,948,640,000,000,000,000,000,000,000 | [
"CWE-772"
] | CVE-2018-14434 | ImageMagick 7.0.8-4 has a memory leak for a colormap in WriteMPCImage in coders/mpc.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-14434 |
307,679 | ImageMagick | 98a2cceae0dceccbfe54051167c2c80be1f13c3f | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/98a2cceae0dceccbfe54051167c2c80be1f13c3f | https://github.com/ImageMagick/ImageMagick/issues/1192 | 0 | static MagickBooleanType WriteMPCImage(const ImageInfo *image_info,Image *image,
ExceptionInfo *exception)
{
char
buffer[MagickPathExtent],
cache_filename[MagickPathExtent];
const char
*property,
*value;
MagickBooleanType
status;
MagickOffsetType
offset,
scene;
register ssize... | 123,712,236,307,250,680,000,000,000,000,000,000,000 | mpc.c | 92,901,861,736,205,260,000,000,000,000,000,000,000 | [
"CWE-772"
] | CVE-2018-14434 | ImageMagick 7.0.8-4 has a memory leak for a colormap in WriteMPCImage in coders/mpc.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-14434 |
200,673 | linux | 8039d87d9e473aeb740d4fdbd59b9d2f89b2ced9 | https://github.com/torvalds/linux | https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8039d87d9e473aeb740d4fdbd59b9d2f89b2ced9 | Btrfs: fix file corruption and data loss after cloning inline extents
Currently the clone ioctl allows to clone an inline extent from one file
to another that already has other (non-inlined) extents. This is a problem
because btrfs is not designed to deal with files having inline and regular
extents, if a file has an ... | 1 | static int btrfs_clone(struct inode *src, struct inode *inode,
const u64 off, const u64 olen, const u64 olen_aligned,
const u64 destoff, int no_time_update)
{
struct btrfs_root *root = BTRFS_I(inode)->root;
struct btrfs_path *path = NULL;
struct extent_buffer *leaf;
struct btrfs_trans_handle *tran... | 277,549,481,996,229,600,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2015-8374 | fs/btrfs/inode.c in the Linux kernel before 4.3.3 mishandles compressed inline extents, which allows local users to obtain sensitive pre-truncation information from a file via a clone action. | https://nvd.nist.gov/vuln/detail/CVE-2015-8374 |
307,692 | linux | 8039d87d9e473aeb740d4fdbd59b9d2f89b2ced9 | https://github.com/torvalds/linux | https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8039d87d9e473aeb740d4fdbd59b9d2f89b2ced9 | Btrfs: fix file corruption and data loss after cloning inline extents
Currently the clone ioctl allows to clone an inline extent from one file
to another that already has other (non-inlined) extents. This is a problem
because btrfs is not designed to deal with files having inline and regular
extents, if a file has an ... | 0 | static int btrfs_clone(struct inode *src, struct inode *inode,
const u64 off, const u64 olen, const u64 olen_aligned,
const u64 destoff, int no_time_update)
{
struct btrfs_root *root = BTRFS_I(inode)->root;
struct btrfs_path *path = NULL;
struct extent_buffer *leaf;
struct btrfs_trans_handle *tran... | 74,452,362,293,949,550,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2015-8374 | fs/btrfs/inode.c in the Linux kernel before 4.3.3 mishandles compressed inline extents, which allows local users to obtain sensitive pre-truncation information from a file via a clone action. | https://nvd.nist.gov/vuln/detail/CVE-2015-8374 |
200,679 | libidn2 | 3284eb342cd0ed1a18786e3fcdf0cdd7e76676bd | https://github.com/libidn/libidn2 | http://git.savannah.gnu.org/cgit/libidn/libidn2.git/commit/?h=libidn2-2.0.4&id=3284eb342cd0ed1a18786e3fcdf0cdd7e76676bd | lib/puny_decode: Fix integer overflow (found by fuzzing) | 1 | static punycode_uint decode_digit(punycode_uint cp)
{
return cp - 48 < 10 ? cp - 22 : cp - 65 < 26 ? cp - 65 :
cp - 97 < 26 ? cp - 97 : base;
} | 150,041,454,101,909,630,000,000,000,000,000,000,000 | puny_decode.c | 53,725,914,218,420,610,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2017-14062 | Integer overflow in the decode_digit function in puny_decode.c in Libidn2 before 2.0.4 allows remote attackers to cause a denial of service or possibly have unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2017-14062 |
307,829 | libidn2 | 3284eb342cd0ed1a18786e3fcdf0cdd7e76676bd | https://github.com/libidn/libidn2 | http://git.savannah.gnu.org/cgit/libidn/libidn2.git/commit/?h=libidn2-2.0.4&id=3284eb342cd0ed1a18786e3fcdf0cdd7e76676bd | lib/puny_decode: Fix integer overflow (found by fuzzing) | 0 | static unsigned decode_digit(int cp)
{
return (unsigned) (cp - 48 < 10 ? cp - 22 : cp - 65 < 26 ? cp - 65 :
cp - 97 < 26 ? cp - 97 : base);
} | 63,287,449,681,523,280,000,000,000,000,000,000,000 | puny_decode.c | 205,027,283,457,970,700,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2017-14062 | Integer overflow in the decode_digit function in puny_decode.c in Libidn2 before 2.0.4 allows remote attackers to cause a denial of service or possibly have unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2017-14062 |
200,681 | qemu | c165f7758009a4f793c1fc19ebb69cf55313450b | https://github.com/bonzini/qemu | http://git.qemu.org/?p=qemu.git;a=commit;h=c165f7758009a4f793c1fc19ebb69cf55313450b | dmg: sanitize chunk length and sectorcount (CVE-2014-0145)
Chunk length and sectorcount are used for decompression buffers as well
as the bdrv_pread() count argument. Ensure that they have reasonable
values so neither memory allocation nor conversion from uint64_t to int
will cause problems.
Signed-off-by: Stefan Ha... | 1 | static int dmg_open(BlockDriverState *bs, QDict *options, int flags,
Error **errp)
{
BDRVDMGState *s = bs->opaque;
uint64_t info_begin, info_end, last_in_offset, last_out_offset;
uint32_t count, tmp;
uint32_t max_compressed_size = 1, max_sectors_per_chunk = 1, i;
int64_t offset;
... | 258,911,778,338,911,570,000,000,000,000,000,000,000 | dmg.c | 6,786,379,141,571,461,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2014-0145 | Multiple buffer overflows in QEMU before 1.7.2 and 2.x before 2.0.0, allow local users to cause a denial of service (crash) or possibly execute arbitrary code via a large (1) L1 table in the qcow2_snapshot_load_tmp in the QCOW 2 block driver (block/qcow2-snapshot.c) or (2) uncompressed chunk, (3) chunk length, or (4) n... | https://nvd.nist.gov/vuln/detail/CVE-2014-0145 |
307,878 | qemu | c165f7758009a4f793c1fc19ebb69cf55313450b | https://github.com/bonzini/qemu | http://git.qemu.org/?p=qemu.git;a=commit;h=c165f7758009a4f793c1fc19ebb69cf55313450b | dmg: sanitize chunk length and sectorcount (CVE-2014-0145)
Chunk length and sectorcount are used for decompression buffers as well
as the bdrv_pread() count argument. Ensure that they have reasonable
values so neither memory allocation nor conversion from uint64_t to int
will cause problems.
Signed-off-by: Stefan Ha... | 0 | static int dmg_open(BlockDriverState *bs, QDict *options, int flags,
Error **errp)
{
BDRVDMGState *s = bs->opaque;
uint64_t info_begin, info_end, last_in_offset, last_out_offset;
uint32_t count, tmp;
uint32_t max_compressed_size = 1, max_sectors_per_chunk = 1, i;
int64_t offset;
... | 157,218,551,350,323,710,000,000,000,000,000,000,000 | dmg.c | 38,379,598,711,020,183,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2014-0145 | Multiple buffer overflows in QEMU before 1.7.2 and 2.x before 2.0.0, allow local users to cause a denial of service (crash) or possibly execute arbitrary code via a large (1) L1 table in the qcow2_snapshot_load_tmp in the QCOW 2 block driver (block/qcow2-snapshot.c) or (2) uncompressed chunk, (3) chunk length, or (4) n... | https://nvd.nist.gov/vuln/detail/CVE-2014-0145 |
200,682 | php-src | d144590d38fa321b46b8e199c754006318985c84 | https://github.com/php/php-src | http://git.php.net/?p=php-src.git;a=commitdiff;h=d144590d38fa321b46b8e199c754006318985c84 | Fix bug #72321 - use efree() for emalloc allocation | 1 | static int phar_extract_file(zend_bool overwrite, phar_entry_info *entry, char *dest, int dest_len, char **error TSRMLS_DC) /* {{{ */
{
php_stream_statbuf ssb;
int len;
php_stream *fp;
char *fullpath;
const char *slash;
mode_t mode;
cwd_state new_state;
char *filename;
size_t filename_len;
if (entry->is_moun... | 284,510,265,225,595,480,000,000,000,000,000,000,000 | phar_object.c | 118,148,046,968,973,700,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2016-4473 | /ext/phar/phar_object.c in PHP 7.0.7 and 5.6.x allows remote attackers to execute arbitrary code. NOTE: Introduced as part of an incomplete fix to CVE-2015-6833. | https://nvd.nist.gov/vuln/detail/CVE-2016-4473 |
307,956 | php-src | d144590d38fa321b46b8e199c754006318985c84 | https://github.com/php/php-src | http://git.php.net/?p=php-src.git;a=commitdiff;h=d144590d38fa321b46b8e199c754006318985c84 | Fix bug #72321 - use efree() for emalloc allocation | 0 | static int phar_extract_file(zend_bool overwrite, phar_entry_info *entry, char *dest, int dest_len, char **error TSRMLS_DC) /* {{{ */
{
php_stream_statbuf ssb;
int len;
php_stream *fp;
char *fullpath;
const char *slash;
mode_t mode;
cwd_state new_state;
char *filename;
size_t filename_len;
if (entry->is_moun... | 91,569,658,015,074,430,000,000,000,000,000,000,000 | phar_object.c | 8,455,331,882,827,020,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2016-4473 | /ext/phar/phar_object.c in PHP 7.0.7 and 5.6.x allows remote attackers to execute arbitrary code. NOTE: Introduced as part of an incomplete fix to CVE-2015-6833. | https://nvd.nist.gov/vuln/detail/CVE-2016-4473 |
200,683 | mesos | 2c282f19755ea7518caf6f43e729524b1c6bdb23 | https://github.com/apache/mesos | https://github.com/apache/mesos/commit/2c282f19755ea7518caf6f43e729524b1c6bdb23 | Added constant time comparison of JWT signatures.
A vulnerability in our JWT implementation allows an unauthenticated
remote attacker to execute to execute timing attacks [1].
This patch removes the vulnerability by adding a constant time
comparison of hashes, where the whole message is visited during
the comparison ... | 1 | Try<JWT, JWTError> JWT::parse(const string& token, const string& secret)
{
const vector<string> components = strings::split(token, ".");
if (components.size() != 3) {
return JWTError(
"Expected 3 components in token, got " + stringify(components.size()),
JWTError::Type::INVALID_TOKEN);
}
T... | 100,257,360,484,393,140,000,000,000,000,000,000,000 | jwt.cpp | 1,073,281,799,049,030,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2018-8023 | Apache Mesos can be configured to require authentication to call the Executor HTTP API using JSON Web Token (JWT). In Apache Mesos versions pre-1.4.2, 1.5.0, 1.5.1, 1.6.0 the comparison of the generated HMAC value against the provided signature in the JWT implementation used is vulnerable to a timing attack because ins... | https://nvd.nist.gov/vuln/detail/CVE-2018-8023 |
307,988 | mesos | 2c282f19755ea7518caf6f43e729524b1c6bdb23 | https://github.com/apache/mesos | https://github.com/apache/mesos/commit/2c282f19755ea7518caf6f43e729524b1c6bdb23 | Added constant time comparison of JWT signatures.
A vulnerability in our JWT implementation allows an unauthenticated
remote attacker to execute to execute timing attacks [1].
This patch removes the vulnerability by adding a constant time
comparison of hashes, where the whole message is visited during
the comparison ... | 0 | Try<JWT, JWTError> JWT::parse(const string& token, const string& secret)
{
const vector<string> components = strings::split(token, ".");
if (components.size() != 3) {
return JWTError(
"Expected 3 components in token, got " + stringify(components.size()),
JWTError::Type::INVALID_TOKEN);
}
T... | 20,014,084,358,490,062,000,000,000,000,000,000,000 | jwt.cpp | 336,751,365,211,682,400,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2018-8023 | Apache Mesos can be configured to require authentication to call the Executor HTTP API using JSON Web Token (JWT). In Apache Mesos versions pre-1.4.2, 1.5.0, 1.5.1, 1.6.0 the comparison of the generated HMAC value against the provided signature in the JWT implementation used is vulnerable to a timing attack because ins... | https://nvd.nist.gov/vuln/detail/CVE-2018-8023 |
200,696 | libxslt | 8b90c9a699e0eaa98bbeec63a473ddc73aaa238c | http://git.gnome.org/browse/libxslt | https://git.gnome.org/browse/libxslt/commit/?id=8b90c9a699e0eaa98bbeec63a473ddc73aaa238c | Fix saxon:line-number with namespace nodes
exsltSaxonLineNumberFunction must make sure not to pass namespace
"nodes" to xmlGetLineNo. Otherwise, an OOB heap read results which
typically leads to a segfault.
Found with afl-fuzz and ASan. | 1 | exsltSaxonLineNumberFunction(xmlXPathParserContextPtr ctxt, int nargs) {
xmlNodePtr cur = NULL;
if (nargs == 0) {
cur = ctxt->context->node;
} else if (nargs == 1) {
xmlXPathObjectPtr obj;
xmlNodeSetPtr nodelist;
int i;
if ((ctxt->value == NULL) || (ctxt->value->type != XPATH_NODESET)) {
xsltTra... | 278,266,607,377,269,530,000,000,000,000,000,000,000 | saxon.c | 154,409,196,950,753,940,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2016-4609 | libxslt in Apple iOS before 9.3.3, OS X before 10.11.6, iTunes before 12.4.2 on Windows, iCloud before 5.2.1 on Windows, tvOS before 9.2.2, and watchOS before 2.2.2 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors, a different vulnera... | https://nvd.nist.gov/vuln/detail/CVE-2016-4609 |
308,213 | libxslt | 8b90c9a699e0eaa98bbeec63a473ddc73aaa238c | http://git.gnome.org/browse/libxslt | https://git.gnome.org/browse/libxslt/commit/?id=8b90c9a699e0eaa98bbeec63a473ddc73aaa238c | Fix saxon:line-number with namespace nodes
exsltSaxonLineNumberFunction must make sure not to pass namespace
"nodes" to xmlGetLineNo. Otherwise, an OOB heap read results which
typically leads to a segfault.
Found with afl-fuzz and ASan. | 0 | exsltSaxonLineNumberFunction(xmlXPathParserContextPtr ctxt, int nargs) {
xmlNodePtr cur = NULL;
xmlXPathObjectPtr obj = NULL;
long lineNo = -1;
if (nargs == 0) {
cur = ctxt->context->node;
} else if (nargs == 1) {
xmlNodeSetPtr nodelist;
int i;
if ((ctxt->value == NULL) || (ctxt->value->type !... | 115,391,023,361,542,160,000,000,000,000,000,000,000 | saxon.c | 81,985,819,170,915,530,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2016-4609 | libxslt in Apple iOS before 9.3.3, OS X before 10.11.6, iTunes before 12.4.2 on Windows, iCloud before 5.2.1 on Windows, tvOS before 9.2.2, and watchOS before 2.2.2 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors, a different vulnera... | https://nvd.nist.gov/vuln/detail/CVE-2016-4609 |
200,712 | php-src | 2721a0148649e07ed74468f097a28899741eb58f | https://github.com/php/php-src | http://github.com/php/php-src/commit/2721a0148649e07ed74468f097a28899741eb58f?w=1 | Fixed bug #70755: fpm_log.c memory leak and buffer overflow | 1 | int fpm_log_write(char *log_format) /* {{{ */
{
char *s, *b;
char buffer[FPM_LOG_BUFFER+1];
int token, test;
size_t len, len2;
struct fpm_scoreboard_proc_s proc, *proc_p;
struct fpm_scoreboard_s *scoreboard;
char tmp[129];
char format[129];
time_t now_epoch;
#ifdef HAVE_TIMES
clock_t tms_total;
#endif
if (!... | 141,523,331,713,955,660,000,000,000,000,000,000,000 | fpm_log.c | 194,222,751,043,797,670,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2016-5114 | sapi/fpm/fpm/fpm_log.c in PHP before 5.5.31, 5.6.x before 5.6.17, and 7.x before 7.0.2 misinterprets the semantics of the snprintf return value, which allows attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read and buffer overflow) via a long string, as demonstr... | https://nvd.nist.gov/vuln/detail/CVE-2016-5114 |
308,353 | php-src | 2721a0148649e07ed74468f097a28899741eb58f | https://github.com/php/php-src | http://github.com/php/php-src/commit/2721a0148649e07ed74468f097a28899741eb58f?w=1 | Fixed bug #70755: fpm_log.c memory leak and buffer overflow | 0 | int fpm_log_write(char *log_format) /* {{{ */
{
char *s, *b;
char buffer[FPM_LOG_BUFFER+1];
int token, test;
size_t len, len2;
struct fpm_scoreboard_proc_s proc, *proc_p;
struct fpm_scoreboard_s *scoreboard;
char tmp[129];
char format[129];
time_t now_epoch;
#ifdef HAVE_TIMES
clock_t tms_total;
#endif
if (!... | 4,215,623,157,966,535,000,000,000,000,000,000,000 | fpm_log.c | 95,224,238,032,874,440,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2016-5114 | sapi/fpm/fpm/fpm_log.c in PHP before 5.5.31, 5.6.x before 5.6.17, and 7.x before 7.0.2 misinterprets the semantics of the snprintf return value, which allows attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read and buffer overflow) via a long string, as demonstr... | https://nvd.nist.gov/vuln/detail/CVE-2016-5114 |
200,716 | vim | 06f15416bb8d5636200a10776f1752c4d6e49f31 | https://github.com/vim/vim | https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31 | patch 8.2.4247: stack corruption when looking for spell suggestions
Problem: Stack corruption when looking for spell suggestions.
Solution: Prevent the depth increased too much. Add a five second time
limit to finding suggestions. | 1 | suggest_trie_walk(
suginfo_T *su,
langp_T *lp,
char_u *fword,
int soundfold)
{
char_u tword[MAXWLEN]; // good word collected so far
trystate_T stack[MAXWLEN];
char_u preword[MAXWLEN * 3]; // word found with proper case;
// concatenation of prefix compound
// words an... | 299,691,384,951,085,050,000,000,000,000,000,000,000 | spellsuggest.c | 62,160,617,719,244,070,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2022-0408 | Stack-based Buffer Overflow in GitHub repository vim/vim prior to 8.2. | https://nvd.nist.gov/vuln/detail/CVE-2022-0408 |
308,578 | vim | 06f15416bb8d5636200a10776f1752c4d6e49f31 | https://github.com/vim/vim | https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31 | patch 8.2.4247: stack corruption when looking for spell suggestions
Problem: Stack corruption when looking for spell suggestions.
Solution: Prevent the depth increased too much. Add a five second time
limit to finding suggestions. | 0 | suggest_trie_walk(
suginfo_T *su,
langp_T *lp,
char_u *fword,
int soundfold)
{
char_u tword[MAXWLEN]; // good word collected so far
trystate_T stack[MAXWLEN];
char_u preword[MAXWLEN * 3]; // word found with proper case;
// concatenation of prefix compound
// words an... | 184,174,209,159,150,670,000,000,000,000,000,000,000 | spellsuggest.c | 284,064,000,006,918,260,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2022-0408 | Stack-based Buffer Overflow in GitHub repository vim/vim prior to 8.2. | https://nvd.nist.gov/vuln/detail/CVE-2022-0408 |
200,725 | file-roller | 57268e51e59b61c9e3125eb0f65551c7084297e2 | https://git.gnome.org/browse/file-roller | https://gitlab.gnome.org/GNOME/file-roller/commit/57268e51e59b61c9e3125eb0f65551c7084297e2 | Path traversal vulnerability
Do not extract files with relative paths.
[bug #794337] | 1 | sanitize_filename (const char *file_name)
{
size_t prefix_len;
char const *p;
if (file_name == NULL)
return NULL;
prefix_len = 0;
for (p = file_name; *p; ) {
if (ISDOT (p[0]) && ISDOT (p[1]) && (ISSLASH (p[2]) || !p[2]))
prefix_len = p + 2 - file_name;
do {
char c = *p++;
if (ISSLASH (c))
... | 243,419,980,189,133,600,000,000,000,000,000,000,000 | glib-utils.c | 67,367,338,727,767,010,000,000,000,000,000,000,000 | [
"CWE-22"
] | CVE-2019-16680 | An issue was discovered in GNOME file-roller before 3.29.91. It allows a single ./../ path traversal via a filename contained in a TAR archive, possibly overwriting a file during extraction. | https://nvd.nist.gov/vuln/detail/CVE-2019-16680 |
309,002 | file-roller | 57268e51e59b61c9e3125eb0f65551c7084297e2 | https://git.gnome.org/browse/file-roller | https://gitlab.gnome.org/GNOME/file-roller/commit/57268e51e59b61c9e3125eb0f65551c7084297e2 | Path traversal vulnerability
Do not extract files with relative paths.
[bug #794337] | 0 | sanitize_filename (const char *file_name)
{
size_t prefix_len;
char const *p;
if (file_name == NULL)
return NULL;
prefix_len = 0;
for (p = file_name; *p; ) {
if (ISDOT (p[0]) && ISDOT (p[1]) && (ISSLASH (p[2]) || !p[2]))
return NULL;
do {
char c = *p++;
if (ISSLASH (c))
break;
}
whil... | 150,564,407,549,851,770,000,000,000,000,000,000,000 | glib-utils.c | 272,935,717,366,759,200,000,000,000,000,000,000,000 | [
"CWE-22"
] | CVE-2019-16680 | An issue was discovered in GNOME file-roller before 3.29.91. It allows a single ./../ path traversal via a filename contained in a TAR archive, possibly overwriting a file during extraction. | https://nvd.nist.gov/vuln/detail/CVE-2019-16680 |
200,727 | ark | 8bf8c5ef07b0ac5e914d752681e470dea403a5bd | https://github.com/KDE/ark | https://github.com/KDE/ark/commit/8bf8c5ef07b0ac5e914d752681e470dea403a5bd | Pass the ARCHIVE_EXTRACT_SECURE_SYMLINKS flag to libarchive
There are archive types which allow to first create a symlink and then
later on dereference it. If the symlink points outside of the archive,
this results in writing outside of the destination directory.
With the ARCHIVE_EXTRACT_SECURE_SYMLINKS option set, l... | 1 | int LibarchivePlugin::extractionFlags() const
{
int result = ARCHIVE_EXTRACT_TIME;
result |= ARCHIVE_EXTRACT_SECURE_NODOTDOT;
// TODO: Don't use arksettings here
/*if ( ArkSettings::preservePerms() )
{
result &= ARCHIVE_EXTRACT_PERM;
}
if ( !ArkSettings::extractOverwrite() )
{
... | 227,182,265,551,961,000,000,000,000,000,000,000,000 | libarchiveplugin.cpp | 16,589,588,714,422,323,000,000,000,000,000,000,000 | [
"CWE-61"
] | CVE-2020-24654 | In KDE Ark before 20.08.1, a crafted TAR archive with symlinks can install files outside the extraction directory, as demonstrated by a write operation to a user's home directory. | https://nvd.nist.gov/vuln/detail/CVE-2020-24654 |
309,109 | ark | 8bf8c5ef07b0ac5e914d752681e470dea403a5bd | https://github.com/KDE/ark | https://github.com/KDE/ark/commit/8bf8c5ef07b0ac5e914d752681e470dea403a5bd | Pass the ARCHIVE_EXTRACT_SECURE_SYMLINKS flag to libarchive
There are archive types which allow to first create a symlink and then
later on dereference it. If the symlink points outside of the archive,
this results in writing outside of the destination directory.
With the ARCHIVE_EXTRACT_SECURE_SYMLINKS option set, l... | 0 | int LibarchivePlugin::extractionFlags() const
{
return ARCHIVE_EXTRACT_TIME
| ARCHIVE_EXTRACT_SECURE_NODOTDOT
| ARCHIVE_EXTRACT_SECURE_SYMLINKS;
} | 90,065,560,457,366,010,000,000,000,000,000,000,000 | libarchiveplugin.cpp | 142,504,631,679,147,150,000,000,000,000,000,000,000 | [
"CWE-61"
] | CVE-2020-24654 | In KDE Ark before 20.08.1, a crafted TAR archive with symlinks can install files outside the extraction directory, as demonstrated by a write operation to a user's home directory. | https://nvd.nist.gov/vuln/detail/CVE-2020-24654 |
200,728 | php-src | 28a6ed9f9a36b9c517e4a8a429baf4dd382fc5d5 | https://github.com/php/php-src | http://github.com/php/php-src/commit/28a6ed9f9a36b9c517e4a8a429baf4dd382fc5d5?w=1 | Fix bug #71735: Double-free in SplDoublyLinkedList::offsetSet | 1 | SPL_METHOD(SplDoublyLinkedList, offsetSet)
{
zval *zindex, *value;
spl_dllist_object *intern;
if (zend_parse_parameters(ZEND_NUM_ARGS(), "zz", &zindex, &value) == FAILURE) {
return;
}
intern = Z_SPLDLLIST_P(getThis());
if (Z_TYPE_P(zindex) == IS_NULL) {
/* $obj[] = ... */
spl_ptr_lli... | 87,001,137,626,382,980,000,000,000,000,000,000,000 | spl_dllist.c | 108,921,632,915,058,800,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2016-3132 | Double free vulnerability in the SplDoublyLinkedList::offsetSet function in ext/spl/spl_dllist.c in PHP 7.x before 7.0.6 allows remote attackers to execute arbitrary code via a crafted index. | https://nvd.nist.gov/vuln/detail/CVE-2016-3132 |
309,155 | php-src | 28a6ed9f9a36b9c517e4a8a429baf4dd382fc5d5 | https://github.com/php/php-src | http://github.com/php/php-src/commit/28a6ed9f9a36b9c517e4a8a429baf4dd382fc5d5?w=1 | Fix bug #71735: Double-free in SplDoublyLinkedList::offsetSet | 0 | SPL_METHOD(SplDoublyLinkedList, offsetSet)
{
zval *zindex, *value;
spl_dllist_object *intern;
if (zend_parse_parameters(ZEND_NUM_ARGS(), "zz", &zindex, &value) == FAILURE) {
return;
}
intern = Z_SPLDLLIST_P(getThis());
if (Z_TYPE_P(zindex) == IS_NULL) {
/* $obj[] = ... */
spl_ptr_lli... | 194,720,548,825,374,980,000,000,000,000,000,000,000 | spl_dllist.c | 168,087,476,867,475,340,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2016-3132 | Double free vulnerability in the SplDoublyLinkedList::offsetSet function in ext/spl/spl_dllist.c in PHP 7.x before 7.0.6 allows remote attackers to execute arbitrary code via a crafted index. | https://nvd.nist.gov/vuln/detail/CVE-2016-3132 |
200,746 | qemu | fbc6510e3379fa8f8370bf71198f0ce733bf07f9 | https://github.com/bonzini/qemu | https://git.qemu.org/?p=qemu.git;a=commit;h=fbc6510e3379fa8f8370bf71198f0ce733bf07f9 | esp: don't overflow cmdfifo in get_cmd()
If the guest tries to read a CDB using DMA and cmdfifo is not empty then it is
possible to overflow cmdfifo.
Since this can only occur by issuing deliberately incorrect instruction
sequences, ensure that the maximum length of the CDB transferred to cmdfifo is
limited to the av... | 1 | static uint32_t get_cmd(ESPState *s, uint32_t maxlen)
{
uint8_t buf[ESP_CMDFIFO_SZ];
uint32_t dmalen, n;
int target;
target = s->wregs[ESP_WBUSID] & BUSID_DID;
if (s->dma) {
dmalen = MIN(esp_get_tc(s), maxlen);
if (dmalen == 0) {
return 0;
}
if (s->dma_me... | 170,485,928,065,488,420,000,000,000,000,000,000,000 | esp.c | 74,525,397,774,186,170,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2020-35504 | A NULL pointer dereference flaw was found in the SCSI emulation support of QEMU in versions before 6.0.0. This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability. | https://nvd.nist.gov/vuln/detail/CVE-2020-35504 |
309,469 | qemu | fbc6510e3379fa8f8370bf71198f0ce733bf07f9 | https://github.com/bonzini/qemu | https://git.qemu.org/?p=qemu.git;a=commit;h=fbc6510e3379fa8f8370bf71198f0ce733bf07f9 | esp: don't overflow cmdfifo in get_cmd()
If the guest tries to read a CDB using DMA and cmdfifo is not empty then it is
possible to overflow cmdfifo.
Since this can only occur by issuing deliberately incorrect instruction
sequences, ensure that the maximum length of the CDB transferred to cmdfifo is
limited to the av... | 0 | static uint32_t get_cmd(ESPState *s, uint32_t maxlen)
{
uint8_t buf[ESP_CMDFIFO_SZ];
uint32_t dmalen, n;
int target;
target = s->wregs[ESP_WBUSID] & BUSID_DID;
if (s->dma) {
dmalen = MIN(esp_get_tc(s), maxlen);
if (dmalen == 0) {
return 0;
}
if (s->dma_me... | 265,016,947,876,669,900,000,000,000,000,000,000,000 | esp.c | 289,418,033,979,179,020,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2020-35504 | A NULL pointer dereference flaw was found in the SCSI emulation support of QEMU in versions before 6.0.0. This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability. | https://nvd.nist.gov/vuln/detail/CVE-2020-35504 |
200,766 | gimp | 376ad788c1a1c31d40f18494889c383f6909ebfc | https://github.com/GNOME/gimp | http://git.gnome.org/browse/gimp/commit/plug-ins/common/file-gif-load.c?id=376ad788c1a1c31d40f18494889c383f6909ebfc | file-gif-load: fix heap corruption and buffer overflow (CVE-2011-2896) | 1 | LZWReadByte (FILE *fd,
gint just_reset_LZW,
gint input_code_size)
{
static gint fresh = FALSE;
gint code, incode;
static gint code_size, set_code_size;
static gint max_code, max_code_size;
static gint firstcode, oldcode;
static gint clear_code, end_code;
static gint tabl... | 40,662,875,577,092,700,000,000,000,000,000,000,000 | file-gif-load.c | 120,686,547,662,931,210,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2011-2896 | The LZW decompressor in the LWZReadByte function in giftoppm.c in the David Koblas GIF decoder in PBMPLUS, as used in the gif_read_lzw function in filter/image-gif.c in CUPS before 1.4.7, the LZWReadByte function in plug-ins/common/file-gif-load.c in GIMP 2.6.11 and earlier, the LZWReadByte function in img/gifread.c in... | https://nvd.nist.gov/vuln/detail/CVE-2011-2896 |
309,691 | gimp | 376ad788c1a1c31d40f18494889c383f6909ebfc | https://github.com/GNOME/gimp | http://git.gnome.org/browse/gimp/commit/plug-ins/common/file-gif-load.c?id=376ad788c1a1c31d40f18494889c383f6909ebfc | file-gif-load: fix heap corruption and buffer overflow (CVE-2011-2896) | 0 | LZWReadByte (FILE *fd,
gint just_reset_LZW,
gint input_code_size)
{
static gint fresh = FALSE;
gint code, incode;
static gint code_size, set_code_size;
static gint max_code, max_code_size;
static gint firstcode, oldcode;
static gint clear_code, end_code;
static gint tabl... | 87,783,849,921,078,560,000,000,000,000,000,000,000 | file-gif-load.c | 6,526,107,628,734,846,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2011-2896 | The LZW decompressor in the LWZReadByte function in giftoppm.c in the David Koblas GIF decoder in PBMPLUS, as used in the gif_read_lzw function in filter/image-gif.c in CUPS before 1.4.7, the LZWReadByte function in plug-ins/common/file-gif-load.c in GIMP 2.6.11 and earlier, the LZWReadByte function in img/gifread.c in... | https://nvd.nist.gov/vuln/detail/CVE-2011-2896 |
200,768 | samba | 392ec4d241eb19c812cd49ff73bd32b2b09d8533 | https://github.com/samba-team/samba | http://git.samba.org/?p=samba.git;a=commitdiff;h=392ec4d241eb19c812cd49ff73bd32b2b09d8533 | bug #10609: CVE-2014-0239 Don't reply to replies
Due to insufficient input checking, the DNS server will reply to a packet that
has the "reply" bit set. Over UDP, this allows to send a packet with a spoofed
sender address and have two servers DOS each other with circular replies.
This patch fixes bug #10609 and adds ... | 1 | static struct tevent_req *dns_process_send(TALLOC_CTX *mem_ctx,
struct tevent_context *ev,
struct dns_server *dns,
DATA_BLOB *in)
{
struct tevent_req *req, *subreq;
struct dns_process_state *state;
enum ndr_err_code ndr_err;
WERROR ret;
const char *forwarder = lpcfg_dns_forwarder(dns->task-... | 273,847,730,362,531,000,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2014-0239 | The internal DNS server in Samba 4.x before 4.0.18 does not check the QR field in the header section of an incoming DNS message before sending a response, which allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged response packet that triggers a communication loop, a related... | https://nvd.nist.gov/vuln/detail/CVE-2014-0239 |
309,720 | samba | 392ec4d241eb19c812cd49ff73bd32b2b09d8533 | https://github.com/samba-team/samba | http://git.samba.org/?p=samba.git;a=commitdiff;h=392ec4d241eb19c812cd49ff73bd32b2b09d8533 | bug #10609: CVE-2014-0239 Don't reply to replies
Due to insufficient input checking, the DNS server will reply to a packet that
has the "reply" bit set. Over UDP, this allows to send a packet with a spoofed
sender address and have two servers DOS each other with circular replies.
This patch fixes bug #10609 and adds ... | 0 | static struct tevent_req *dns_process_send(TALLOC_CTX *mem_ctx,
struct tevent_context *ev,
struct dns_server *dns,
DATA_BLOB *in)
{
struct tevent_req *req, *subreq;
struct dns_process_state *state;
enum ndr_err_code ndr_err;
WERROR ret;
const char *forwarder = lpcfg_dns_forwarder(dns->task-... | 77,348,194,044,145,320,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2014-0239 | The internal DNS server in Samba 4.x before 4.0.18 does not check the QR field in the header section of an incoming DNS message before sending a response, which allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged response packet that triggers a communication loop, a related... | https://nvd.nist.gov/vuln/detail/CVE-2014-0239 |
200,772 | radvd | 074816cd0b37aac7b3209987e6e998f0a847b275 | https://github.com/reubenhwk/radvd | https://github.com/reubenhwk/radvd/commit/074816cd0b37aac7b3209987e6e998f0a847b275 | privsep_read_loop() should return on unprivileged daemon death /
socket close(), not loop forever with polling read() getting -1. | 1 | privsep_read_loop(void)
{
struct privsep_command cmd;
int ret;
while (1) {
ret = readn(pfd, &cmd, sizeof(cmd));
if (ret <= 0) {
/* Error or EOF, give up */
if (ret < 0) {
flog(LOG_ERR, "Exiting, privsep_read_loop had readn error: %s\n",
strerror(errno));
} else {
flog(LOG_ERR, "Exiting... | 191,947,920,091,927,370,000,000,000,000,000,000,000 | privsep-linux.c | 311,407,994,076,337,100,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-3603 | The router advertisement daemon (radvd) before 1.8.2 does not properly handle errors in the privsep_init function, which causes the radvd daemon to run as root and has an unspecified impact. | https://nvd.nist.gov/vuln/detail/CVE-2011-3603 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.