idx
int64
project
string
commit_id
string
project_url
string
commit_url
string
commit_message
string
target
int64
func
string
func_hash
float64
file_name
string
file_hash
float64
cwe
list
cve
string
cve_desc
string
nvd_url
string
302,810
linux
c0a333d842ef67ac04adc72ff79dc1ccc3dca4ed
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c0a333d842ef67ac04adc72ff79dc1ccc3dca4ed
ASoC: SOF: Fix memory leak in sof_dfsentry_write In the implementation of sof_dfsentry_write() memory allocated for string is leaked in case of an error. Go to error handling path if the d_name.name is not valid. Fixes: 091c12e1f50c ("ASoC: SOF: debug: add new debugfs entries for IPC flood test") Signed-off-by: Navid...
0
static ssize_t sof_dfsentry_write(struct file *file, const char __user *buffer, size_t count, loff_t *ppos) { #if IS_ENABLED(CONFIG_SND_SOC_SOF_DEBUG_IPC_FLOOD_TEST) struct snd_sof_dfsentry *dfse = file->private_data; struct snd_sof_dev *sdev = dfse->sdev; unsigned long ipc_duration_ms = 0; bool flood_duratio...
40,316,414,760,353,984,000,000,000,000,000,000,000
debug.c
208,434,843,858,604,060,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2019-18812
A memory leak in the sof_dfsentry_write() function in sound/soc/sof/debug.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-c0a333d842ef.
https://nvd.nist.gov/vuln/detail/CVE-2019-18812
200,414
php-src
c1224573c773b6845e83505f717fbf820fc18415
https://github.com/php/php-src
http://git.php.net/?p=php-src.git;a=commit;h=c1224573c773b6845e83505f717fbf820fc18415
Fix CVE-2013-6420 - memory corruption in openssl_x509_parse
1
static time_t asn1_time_to_time_t(ASN1_UTCTIME * timestr TSRMLS_DC) /* {{{ */ { /* This is how the time string is formatted: snprintf(p, sizeof(p), "%02d%02d%02d%02d%02d%02dZ",ts->tm_year%100, ts->tm_mon+1,ts->tm_mday,ts->tm_hour,ts->tm_min,ts->tm_sec); */ time_t ret; struct tm thetime; char * strbuf; c...
302,182,818,264,291,600,000,000,000,000,000,000,000
openssl.c
255,045,393,970,716,820,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6420
The asn1_time_to_time_t function in ext/openssl/openssl.c in PHP before 5.3.28, 5.4.x before 5.4.23, and 5.5.x before 5.5.7 does not properly parse (1) notBefore and (2) notAfter timestamps in X.509 certificates, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) vi...
https://nvd.nist.gov/vuln/detail/CVE-2013-6420
302,840
php-src
c1224573c773b6845e83505f717fbf820fc18415
https://github.com/php/php-src
http://git.php.net/?p=php-src.git;a=commit;h=c1224573c773b6845e83505f717fbf820fc18415
Fix CVE-2013-6420 - memory corruption in openssl_x509_parse
0
static time_t asn1_time_to_time_t(ASN1_UTCTIME * timestr TSRMLS_DC) /* {{{ */ { /* This is how the time string is formatted: snprintf(p, sizeof(p), "%02d%02d%02d%02d%02d%02dZ",ts->tm_year%100, ts->tm_mon+1,ts->tm_mday,ts->tm_hour,ts->tm_min,ts->tm_sec); */ time_t ret; struct tm thetime; char * strbuf; c...
322,768,390,973,332,200,000,000,000,000,000,000,000
openssl.c
94,426,697,188,971,560,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2013-6420
The asn1_time_to_time_t function in ext/openssl/openssl.c in PHP before 5.3.28, 5.4.x before 5.4.23, and 5.5.x before 5.5.7 does not properly parse (1) notBefore and (2) notAfter timestamps in X.509 certificates, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) vi...
https://nvd.nist.gov/vuln/detail/CVE-2013-6420
200,452
polarssl
5d8618539f8e186c1b2c1b5a548d6f85936fe41f
https://github.com/polarssl/polarssl
https://github.com/polarssl/polarssl/commit/5d8618539f8e186c1b2c1b5a548d6f85936fe41f
Fix memory leak while parsing some X.509 certs
1
int x509_get_name( unsigned char **p, const unsigned char *end, x509_name *cur ) { int ret; size_t len; const unsigned char *end2; x509_name *use; if( ( ret = asn1_get_tag( p, end, &len, ASN1_CONSTRUCTED | ASN1_SET ) ) != 0 ) return( POLARSSL_ERR_X509_INVALID_...
153,018,608,462,889,670,000,000,000,000,000,000,000
x509.c
203,792,724,555,770,300,000,000,000,000,000,000,000
[ "CWE-310" ]
CVE-2014-8627
PolarSSL 1.3.8 does not properly negotiate the signature algorithm to use, which allows remote attackers to conduct downgrade attacks via unspecified vectors.
https://nvd.nist.gov/vuln/detail/CVE-2014-8627
303,148
polarssl
5d8618539f8e186c1b2c1b5a548d6f85936fe41f
https://github.com/polarssl/polarssl
https://github.com/polarssl/polarssl/commit/5d8618539f8e186c1b2c1b5a548d6f85936fe41f
Fix memory leak while parsing some X.509 certs
0
int x509_get_name( unsigned char **p, const unsigned char *end, x509_name *cur ) { int ret; size_t set_len; const unsigned char *end_set; /* * parse first SET, restricted to 1 element */ if( ( ret = asn1_get_tag( p, end, &set_len, ASN1_CONSTRUCTED | ASN1_SET...
95,574,681,973,007,650,000,000,000,000,000,000,000
x509.c
319,151,821,923,225,300,000,000,000,000,000,000,000
[ "CWE-310" ]
CVE-2014-8627
PolarSSL 1.3.8 does not properly negotiate the signature algorithm to use, which allows remote attackers to conduct downgrade attacks via unspecified vectors.
https://nvd.nist.gov/vuln/detail/CVE-2014-8627
200,453
linux
2287a51ba822384834dafc1c798453375d1107c7
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/2287a51ba822384834dafc1c798453375d1107c7
vt_kdsetmode: extend console locking As per the long-suffering comment. Reported-by: Minh Yuan <yuanmingbuaa@gmail.com> Cc: Greg Kroah-Hartman <gregkh@linuxfoundation.org> Cc: Jiri Slaby <jirislaby@kernel.org> Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
1
static int vt_k_ioctl(struct tty_struct *tty, unsigned int cmd, unsigned long arg, bool perm) { struct vc_data *vc = tty->driver_data; void __user *up = (void __user *)arg; unsigned int console = vc->vc_num; int ret; switch (cmd) { case KIOCSOUND: if (!perm) return -EPERM; /* * The use of PIT_TICK_RA...
221,654,635,171,197,970,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2021-3753
A race problem was seen in the vt_k_ioctl in drivers/tty/vt/vt_ioctl.c in the Linux kernel, which may cause an out of bounds read in vt as the write access to vc_mode is not protected by lock-in vt_ioctl (KDSETMDE). The highest threat from this vulnerability is to data confidentiality.
https://nvd.nist.gov/vuln/detail/CVE-2021-3753
303,184
linux
2287a51ba822384834dafc1c798453375d1107c7
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/2287a51ba822384834dafc1c798453375d1107c7
vt_kdsetmode: extend console locking As per the long-suffering comment. Reported-by: Minh Yuan <yuanmingbuaa@gmail.com> Cc: Greg Kroah-Hartman <gregkh@linuxfoundation.org> Cc: Jiri Slaby <jirislaby@kernel.org> Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
0
static int vt_k_ioctl(struct tty_struct *tty, unsigned int cmd, unsigned long arg, bool perm) { struct vc_data *vc = tty->driver_data; void __user *up = (void __user *)arg; unsigned int console = vc->vc_num; int ret; switch (cmd) { case KIOCSOUND: if (!perm) return -EPERM; /* * The use of PIT_TICK_RA...
163,625,463,143,641,240,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2021-3753
A race problem was seen in the vt_k_ioctl in drivers/tty/vt/vt_ioctl.c in the Linux kernel, which may cause an out of bounds read in vt as the write access to vc_mode is not protected by lock-in vt_ioctl (KDSETMDE). The highest threat from this vulnerability is to data confidentiality.
https://nvd.nist.gov/vuln/detail/CVE-2021-3753
200,458
openexr
8b5370c688a7362673c3a5256d93695617a4cd9a
https://github.com/AcademySoftwareFoundation/openexr
https://github.com/AcademySoftwareFoundation/openexr/commit/8b5370c688a7362673c3a5256d93695617a4cd9a
Fix #491, issue with part number range check reconstructing chunk offset table The chunk offset was incorrectly testing for a part number that was the same size (i.e. an invalid index) Signed-off-by: Kimball Thurston <kdt3rd@gmail.com>
1
MultiPartInputFile::Data::chunkOffsetReconstruction(OPENEXR_IMF_INTERNAL_NAMESPACE::IStream& is, const vector<InputPartData*>& parts) { // // Reconstruct broken chunk offset tables. Stop once we received any exception. // Int64 position = is.tellg(); // // check we understand all the part...
140,980,474,558,435,340,000,000,000,000,000,000,000
ImfMultiPartInputFile.cpp
253,113,448,920,027,200,000,000,000,000,000,000,000
[ "CWE-94" ]
CVE-2020-16587
A heap-based buffer overflow vulnerability exists in Academy Software Foundation OpenEXR 2.3.0 in chunkOffsetReconstruction in ImfMultiPartInputFile.cpp that can cause a denial of service via a crafted EXR file.
https://nvd.nist.gov/vuln/detail/CVE-2020-16587
303,388
openexr
8b5370c688a7362673c3a5256d93695617a4cd9a
https://github.com/AcademySoftwareFoundation/openexr
https://github.com/AcademySoftwareFoundation/openexr/commit/8b5370c688a7362673c3a5256d93695617a4cd9a
Fix #491, issue with part number range check reconstructing chunk offset table The chunk offset was incorrectly testing for a part number that was the same size (i.e. an invalid index) Signed-off-by: Kimball Thurston <kdt3rd@gmail.com>
0
MultiPartInputFile::Data::chunkOffsetReconstruction(OPENEXR_IMF_INTERNAL_NAMESPACE::IStream& is, const vector<InputPartData*>& parts) { // // Reconstruct broken chunk offset tables. Stop once we received any exception. // Int64 position = is.tellg(); // // check we understand all the part...
51,710,242,056,051,940,000,000,000,000,000,000,000
ImfMultiPartInputFile.cpp
313,831,710,917,129,640,000,000,000,000,000,000,000
[ "CWE-94" ]
CVE-2020-16587
A heap-based buffer overflow vulnerability exists in Academy Software Foundation OpenEXR 2.3.0 in chunkOffsetReconstruction in ImfMultiPartInputFile.cpp that can cause a denial of service via a crafted EXR file.
https://nvd.nist.gov/vuln/detail/CVE-2020-16587
200,463
linux
39675f7a7c7e7702f7d5341f1e0d01db746543a0
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=39675f7a7c7e7702f7d5341f1e0d01db746543a0
ALSA: rawmidi: Change resized buffers atomically The SNDRV_RAWMIDI_IOCTL_PARAMS ioctl may resize the buffers and the current code is racy. For example, the sequencer client may write to buffer while it being resized. As a simple workaround, let's switch to the resized buffer inside the stream runtime lock. Reported...
1
int snd_rawmidi_input_params(struct snd_rawmidi_substream *substream, struct snd_rawmidi_params * params) { char *newbuf; struct snd_rawmidi_runtime *runtime = substream->runtime; snd_rawmidi_drain_input(substream); if (params->buffer_size < 32 || params->buffer_size > 1024L * 1024L) { return -EINVAL; }...
49,349,572,251,225,560,000,000,000,000,000,000,000
rawmidi.c
240,571,701,301,896,800,000,000,000,000,000,000,000
[ "CWE-415" ]
CVE-2018-10902
It was found that the raw midi kernel driver does not protect against concurrent access which leads to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status() which are part of snd_rawmidi_ioctl() handler in rawmidi.c file. A malicious local attacker could possibly use this for priv...
https://nvd.nist.gov/vuln/detail/CVE-2018-10902
303,564
linux
39675f7a7c7e7702f7d5341f1e0d01db746543a0
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=39675f7a7c7e7702f7d5341f1e0d01db746543a0
ALSA: rawmidi: Change resized buffers atomically The SNDRV_RAWMIDI_IOCTL_PARAMS ioctl may resize the buffers and the current code is racy. For example, the sequencer client may write to buffer while it being resized. As a simple workaround, let's switch to the resized buffer inside the stream runtime lock. Reported...
0
int snd_rawmidi_input_params(struct snd_rawmidi_substream *substream, struct snd_rawmidi_params * params) { char *newbuf, *oldbuf; struct snd_rawmidi_runtime *runtime = substream->runtime; snd_rawmidi_drain_input(substream); if (params->buffer_size < 32 || params->buffer_size > 1024L * 1024L) { return -E...
274,667,552,906,261,050,000,000,000,000,000,000,000
rawmidi.c
302,437,345,415,378,500,000,000,000,000,000,000,000
[ "CWE-415" ]
CVE-2018-10902
It was found that the raw midi kernel driver does not protect against concurrent access which leads to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status() which are part of snd_rawmidi_ioctl() handler in rawmidi.c file. A malicious local attacker could possibly use this for priv...
https://nvd.nist.gov/vuln/detail/CVE-2018-10902
200,468
qemu
6d4b9e55fc625514a38d27cff4b9933f617fa7dc
https://github.com/bonzini/qemu
http://git.qemu.org/?p=qemu.git;a=commit;h=6d4b9e55fc625514a38d27cff4b9933f617fa7dc
curl: check data size before memcpy to local buffer. (CVE-2014-0144) curl_read_cb is callback function for libcurl when data arrives. The data size passed in here is not guaranteed to be within the range of request we submitted, so we may overflow the guest IO buffer. Check the real size we have before memcpy to buffe...
1
static size_t curl_read_cb(void *ptr, size_t size, size_t nmemb, void *opaque) { CURLState *s = ((CURLState*)opaque); size_t realsize = size * nmemb; int i; DPRINTF("CURL: Just reading %zd bytes\n", realsize); if (!s || !s->orig_buf) goto read_end; memcpy(s->orig_buf + s->buf_off, ptr...
168,989,870,398,485,960,000,000,000,000,000,000,000
curl.c
34,660,891,499,852,330,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2014-0144
QEMU before 2.0.0 block drivers for CLOOP, QCOW2 version 2 and various other image formats are vulnerable to potential memory corruptions, integer/buffer overflows or crash caused by missing input validations which could allow a remote user to execute arbitrary code on the host with the privileges of the QEMU process.
https://nvd.nist.gov/vuln/detail/CVE-2014-0144
303,693
qemu
6d4b9e55fc625514a38d27cff4b9933f617fa7dc
https://github.com/bonzini/qemu
http://git.qemu.org/?p=qemu.git;a=commit;h=6d4b9e55fc625514a38d27cff4b9933f617fa7dc
curl: check data size before memcpy to local buffer. (CVE-2014-0144) curl_read_cb is callback function for libcurl when data arrives. The data size passed in here is not guaranteed to be within the range of request we submitted, so we may overflow the guest IO buffer. Check the real size we have before memcpy to buffe...
0
static size_t curl_read_cb(void *ptr, size_t size, size_t nmemb, void *opaque) { CURLState *s = ((CURLState*)opaque); size_t realsize = size * nmemb; int i; DPRINTF("CURL: Just reading %zd bytes\n", realsize); if (!s || !s->orig_buf) goto read_end; if (s->buf_off >= s->buf_len) { ...
30,467,177,280,682,592,000,000,000,000,000,000,000
curl.c
151,581,388,241,956,620,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2014-0144
QEMU before 2.0.0 block drivers for CLOOP, QCOW2 version 2 and various other image formats are vulnerable to potential memory corruptions, integer/buffer overflows or crash caused by missing input validations which could allow a remote user to execute arbitrary code on the host with the privileges of the QEMU process.
https://nvd.nist.gov/vuln/detail/CVE-2014-0144
200,475
rabbitmq-c
fc85be7123050b91b054e45b91c78d3241a5047a
https://github.com/alanxz/rabbitmq-c
https://github.com/alanxz/rabbitmq-c/commit/fc85be7123050b91b054e45b91c78d3241a5047a
lib: check frame_size is >= INT32_MAX When parsing a frame header, validate that the frame_size is less than or equal to INT32_MAX. Given frame_max is limited between 0 and INT32_MAX in amqp_login and friends, this does not change the API. This prevents a potential buffer overflow when a malicious client sends a fram...
1
int amqp_handle_input(amqp_connection_state_t state, amqp_bytes_t received_data, amqp_frame_t *decoded_frame) { size_t bytes_consumed; void *raw_frame; /* Returning frame_type of zero indicates either insufficient input, or a complete, ignored frame was read. */ decoded_frame->frame_...
114,712,616,430,347,640,000,000,000,000,000,000,000
amqp_connection.c
222,546,890,245,507,700,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2019-18609
An issue was discovered in amqp_handle_input in amqp_connection.c in rabbitmq-c 0.9.0. There is an integer overflow that leads to heap memory corruption in the handling of CONNECTION_STATE_HEADER. A rogue server could return a malicious frame header that leads to a smaller target_size value than needed. This condition ...
https://nvd.nist.gov/vuln/detail/CVE-2019-18609
303,796
rabbitmq-c
fc85be7123050b91b054e45b91c78d3241a5047a
https://github.com/alanxz/rabbitmq-c
https://github.com/alanxz/rabbitmq-c/commit/fc85be7123050b91b054e45b91c78d3241a5047a
lib: check frame_size is >= INT32_MAX When parsing a frame header, validate that the frame_size is less than or equal to INT32_MAX. Given frame_max is limited between 0 and INT32_MAX in amqp_login and friends, this does not change the API. This prevents a potential buffer overflow when a malicious client sends a fram...
0
int amqp_handle_input(amqp_connection_state_t state, amqp_bytes_t received_data, amqp_frame_t *decoded_frame) { size_t bytes_consumed; void *raw_frame; /* Returning frame_type of zero indicates either insufficient input, or a complete, ignored frame was read. */ decoded_frame->frame_...
189,015,703,983,040,720,000,000,000,000,000,000,000
amqp_connection.c
461,035,150,596,296,160,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2019-18609
An issue was discovered in amqp_handle_input in amqp_connection.c in rabbitmq-c 0.9.0. There is an integer overflow that leads to heap memory corruption in the handling of CONNECTION_STATE_HEADER. A rogue server could return a malicious frame header that leads to a smaller target_size value than needed. This condition ...
https://nvd.nist.gov/vuln/detail/CVE-2019-18609
200,490
ceph
4c11203122d729c832a645c9e3f5092db4963840
https://github.com/ceph/ceph
https://github.com/ceph/ceph/commit/4c11203122d729c832a645c9e3f5092db4963840
msg/async/ProtocolV1: resurrect "implement cephx_*require_version options" This was added in commit 9bcbc2a3621f ("mon,msg: implement cephx_*_require_version options") and inadvertently dropped in commit e6f043f7d2dc ("msgr/async: huge refactoring of protocol V1"). As a result, service daemons don't enforce cephx_requ...
1
CtPtr ProtocolV1::handle_connect_message_2() { ldout(cct, 20) << __func__ << dendl; ldout(cct, 20) << __func__ << " accept got peer connect_seq " << connect_msg.connect_seq << " global_seq " << connect_msg.global_seq << dendl; connection->set_peer_type(connect_msg.host_type); ...
66,222,140,007,301,820,000,000,000,000,000,000,000
ProtocolV1.cc
160,457,868,067,089,570,000,000,000,000,000,000,000
[ "CWE-294" ]
CVE-2020-25660
A flaw was found in the Cephx authentication protocol in versions before 15.2.6 and before 14.2.14, where it does not verify Ceph clients correctly and is then vulnerable to replay attacks in Nautilus. This flaw allows an attacker with access to the Ceph cluster network to authenticate with the Ceph service via a packe...
https://nvd.nist.gov/vuln/detail/CVE-2020-25660
304,039
ceph
4c11203122d729c832a645c9e3f5092db4963840
https://github.com/ceph/ceph
https://github.com/ceph/ceph/commit/4c11203122d729c832a645c9e3f5092db4963840
msg/async/ProtocolV1: resurrect "implement cephx_*require_version options" This was added in commit 9bcbc2a3621f ("mon,msg: implement cephx_*_require_version options") and inadvertently dropped in commit e6f043f7d2dc ("msgr/async: huge refactoring of protocol V1"). As a result, service daemons don't enforce cephx_requ...
0
CtPtr ProtocolV1::handle_connect_message_2() { ldout(cct, 20) << __func__ << dendl; ldout(cct, 20) << __func__ << " accept got peer connect_seq " << connect_msg.connect_seq << " global_seq " << connect_msg.global_seq << dendl; connection->set_peer_type(connect_msg.host_type); ...
171,117,629,635,386,500,000,000,000,000,000,000,000
ProtocolV1.cc
73,953,535,862,975,220,000,000,000,000,000,000,000
[ "CWE-294" ]
CVE-2020-25660
A flaw was found in the Cephx authentication protocol in versions before 15.2.6 and before 14.2.14, where it does not verify Ceph clients correctly and is then vulnerable to replay attacks in Nautilus. This flaw allows an attacker with access to the Ceph cluster network to authenticate with the Ceph service via a packe...
https://nvd.nist.gov/vuln/detail/CVE-2020-25660
200,497
git
fd55a19eb1d49ae54008d932a65f79cd6fda45c9
https://github.com/git/git
http://git.kernel.org/?p=git/git.git;a=commitdiff;h=fd55a19eb1d49ae54008d932a65f79cd6fda45c9
Fix buffer overflow in git diff If PATH_MAX on your system is smaller than a path stored, it may cause buffer overflow and stack corruption in diff_addremove() and diff_change() functions when running git-diff Signed-off-by: Dmitry Potapov <dpotapov@gmail.com> Signed-off-by: Junio C Hamano <gitster@pobox.com>
1
void diff_change(struct diff_options *options, unsigned old_mode, unsigned new_mode, const unsigned char *old_sha1, const unsigned char *new_sha1, const char *base, const char *path) { char concatpath[PATH_MAX]; struct diff_filespec *one, *two; if (DIFF_OPT_TST(options, IGNORE_SUBMODULES) && S_ISGITLINK...
65,112,988,369,061,800,000,000,000,000,000,000,000
diff.c
679,451,702,429,954,500,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2008-3546
Stack-based buffer overflow in the (1) diff_addremove and (2) diff_change functions in GIT before 1.5.6.4 might allow local users to execute arbitrary code via a PATH whose length is larger than the system's PATH_MAX when running GIT utilities such as git-diff or git-grep.
https://nvd.nist.gov/vuln/detail/CVE-2008-3546
304,221
git
fd55a19eb1d49ae54008d932a65f79cd6fda45c9
https://github.com/git/git
http://git.kernel.org/?p=git/git.git;a=commitdiff;h=fd55a19eb1d49ae54008d932a65f79cd6fda45c9
Fix buffer overflow in git diff If PATH_MAX on your system is smaller than a path stored, it may cause buffer overflow and stack corruption in diff_addremove() and diff_change() functions when running git-diff Signed-off-by: Dmitry Potapov <dpotapov@gmail.com> Signed-off-by: Junio C Hamano <gitster@pobox.com>
0
void diff_change(struct diff_options *options, unsigned old_mode, unsigned new_mode, const unsigned char *old_sha1, const unsigned char *new_sha1, const char *concatpath) { struct diff_filespec *one, *two; if (DIFF_OPT_TST(options, IGNORE_SUBMODULES) && S_ISGITLINK(old_mode) && S_ISGITLINK(new_mode)) ...
161,213,636,050,647,830,000,000,000,000,000,000,000
diff.c
166,868,393,692,160,320,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2008-3546
Stack-based buffer overflow in the (1) diff_addremove and (2) diff_change functions in GIT before 1.5.6.4 might allow local users to execute arbitrary code via a PATH whose length is larger than the system's PATH_MAX when running GIT utilities such as git-diff or git-grep.
https://nvd.nist.gov/vuln/detail/CVE-2008-3546
200,498
git
fd55a19eb1d49ae54008d932a65f79cd6fda45c9
https://github.com/git/git
http://git.kernel.org/?p=git/git.git;a=commitdiff;h=fd55a19eb1d49ae54008d932a65f79cd6fda45c9
Fix buffer overflow in git diff If PATH_MAX on your system is smaller than a path stored, it may cause buffer overflow and stack corruption in diff_addremove() and diff_change() functions when running git-diff Signed-off-by: Dmitry Potapov <dpotapov@gmail.com> Signed-off-by: Junio C Hamano <gitster@pobox.com>
1
void diff_addremove(struct diff_options *options, int addremove, unsigned mode, const unsigned char *sha1, const char *base, const char *path) { char concatpath[PATH_MAX]; struct diff_filespec *one, *two; if (DIFF_OPT_TST(options, IGNORE_SUBMODULES) && S_ISGITLINK(mode)) return; /* This may lo...
238,719,314,053,068,500,000,000,000,000,000,000,000
diff.c
679,451,702,429,954,500,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2008-3546
Stack-based buffer overflow in the (1) diff_addremove and (2) diff_change functions in GIT before 1.5.6.4 might allow local users to execute arbitrary code via a PATH whose length is larger than the system's PATH_MAX when running GIT utilities such as git-diff or git-grep.
https://nvd.nist.gov/vuln/detail/CVE-2008-3546
304,218
git
fd55a19eb1d49ae54008d932a65f79cd6fda45c9
https://github.com/git/git
http://git.kernel.org/?p=git/git.git;a=commitdiff;h=fd55a19eb1d49ae54008d932a65f79cd6fda45c9
Fix buffer overflow in git diff If PATH_MAX on your system is smaller than a path stored, it may cause buffer overflow and stack corruption in diff_addremove() and diff_change() functions when running git-diff Signed-off-by: Dmitry Potapov <dpotapov@gmail.com> Signed-off-by: Junio C Hamano <gitster@pobox.com>
0
void diff_addremove(struct diff_options *options, int addremove, unsigned mode, const unsigned char *sha1, const char *concatpath) { struct diff_filespec *one, *two; if (DIFF_OPT_TST(options, IGNORE_SUBMODULES) && S_ISGITLINK(mode)) return; /* This may look odd, but it is a preparation for * ...
206,919,440,643,283,570,000,000,000,000,000,000,000
diff.c
166,868,393,692,160,320,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2008-3546
Stack-based buffer overflow in the (1) diff_addremove and (2) diff_change functions in GIT before 1.5.6.4 might allow local users to execute arbitrary code via a PATH whose length is larger than the system's PATH_MAX when running GIT utilities such as git-diff or git-grep.
https://nvd.nist.gov/vuln/detail/CVE-2008-3546
200,501
libpng
1bef8e97995c33123665582e57d3ed40b57d5978
https://github.com/glennrp/libpng
https://github.com/glennrp/libpng/commit/1bef8e97995c33123665582e57d3ed40b57d5978
[libpng16] Silently truncate over-length PLTE chunk while reading.
1
png_set_PLTE(png_structrp png_ptr, png_inforp info_ptr, png_const_colorp palette, int num_palette) { png_uint_32 max_palette_length; png_debug1(1, "in %s storage function", "PLTE"); if (png_ptr == NULL || info_ptr == NULL) return; max_palette_length = (png_ptr->color_type == PNG_COLOR_TYPE_PAL...
205,091,847,373,842,230,000,000,000,000,000,000,000
pngset.c
305,265,567,473,314,370,000,000,000,000,000,000,000
[ "CWE-120" ]
CVE-2015-8126
Multiple buffer overflows in the (1) png_set_PLTE and (2) png_get_PLTE functions in libpng before 1.0.64, 1.1.x and 1.2.x before 1.2.54, 1.3.x and 1.4.x before 1.4.17, 1.5.x before 1.5.24, and 1.6.x before 1.6.19 allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other ...
https://nvd.nist.gov/vuln/detail/CVE-2015-8126
304,335
libpng
1bef8e97995c33123665582e57d3ed40b57d5978
https://github.com/glennrp/libpng
https://github.com/glennrp/libpng/commit/1bef8e97995c33123665582e57d3ed40b57d5978
[libpng16] Silently truncate over-length PLTE chunk while reading.
0
png_set_PLTE(png_structrp png_ptr, png_inforp info_ptr, png_const_colorp palette, int num_palette) { png_uint_32 max_palette_length; png_debug1(1, "in %s storage function", "PLTE"); if (png_ptr == NULL || info_ptr == NULL) return; max_palette_length = (png_ptr->color_type == PNG_COLOR_TYPE_PAL...
164,482,765,578,923,240,000,000,000,000,000,000,000
pngset.c
104,810,709,411,095,940,000,000,000,000,000,000,000
[ "CWE-120" ]
CVE-2015-8126
Multiple buffer overflows in the (1) png_set_PLTE and (2) png_get_PLTE functions in libpng before 1.0.64, 1.1.x and 1.2.x before 1.2.54, 1.3.x and 1.4.x before 1.4.17, 1.5.x before 1.5.24, and 1.6.x before 1.6.19 allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other ...
https://nvd.nist.gov/vuln/detail/CVE-2015-8126
200,502
samurai
e84b6d99c85043fa1ba54851ee500540ec206918
https://github.com/michaelforney/samurai
https://github.com/michaelforney/samurai/commit/e84b6d99c85043fa1ba54851ee500540ec206918
util: Check for NULL string in writefile This check was there previously, but was removed in f549b757 with the addition of a check during parse that every rule has rspfile if and only if it has rspfile_content. However, this fails to consider the possibility of those variables coming from the edge or global environmen...
1
writefile(const char *name, struct string *s) { FILE *f; int ret; f = fopen(name, "w"); if (!f) { warn("open %s:", name); return -1; } ret = 0; if (fwrite(s->s, 1, s->n, f) != s->n || fflush(f) != 0) { warn("write %s:", name); ret = -1; } fclose(f); return ret; }
245,305,769,444,728,400,000,000,000,000,000,000,000
util.c
318,483,833,829,041,760,000,000,000,000,000,000,000
[ "CWE-284" ]
CVE-2021-30218
samurai 1.2 has a NULL pointer dereference in writefile() in util.c via a crafted build file.
https://nvd.nist.gov/vuln/detail/CVE-2021-30218
304,398
samurai
e84b6d99c85043fa1ba54851ee500540ec206918
https://github.com/michaelforney/samurai
https://github.com/michaelforney/samurai/commit/e84b6d99c85043fa1ba54851ee500540ec206918
util: Check for NULL string in writefile This check was there previously, but was removed in f549b757 with the addition of a check during parse that every rule has rspfile if and only if it has rspfile_content. However, this fails to consider the possibility of those variables coming from the edge or global environmen...
0
writefile(const char *name, struct string *s) { FILE *f; int ret; f = fopen(name, "w"); if (!f) { warn("open %s:", name); return -1; } ret = 0; if (s && (fwrite(s->s, 1, s->n, f) != s->n || fflush(f) != 0)) { warn("write %s:", name); ret = -1; } fclose(f); return ret; }
220,887,458,557,982,520,000,000,000,000,000,000,000
util.c
247,258,255,382,723,100,000,000,000,000,000,000,000
[ "CWE-284" ]
CVE-2021-30218
samurai 1.2 has a NULL pointer dereference in writefile() in util.c via a crafted build file.
https://nvd.nist.gov/vuln/detail/CVE-2021-30218
200,506
mongo
1411cf602a21e45a5ef42b6869c480eb420976ee
https://github.com/mongodb/mongo
https://github.com/mongodb/mongo/commit/1411cf602a21e45a5ef42b6869c480eb420976ee
SERVER-43751 Recompute compressor manager message parameters
1
StatusWith<Message> MessageCompressorManager::decompressMessage(const Message& msg, MessageCompressorId* compressorId) { auto inputHeader = msg.header(); ConstDataRangeCursor input(inputHeader.data(), inputHeader.data() + inputHeader.dataLen()); ...
188,888,673,038,981,120,000,000,000,000,000,000,000
None
null
[ "CWE-697" ]
CVE-2019-20925
An unauthenticated client can trigger denial of service by issuing specially crafted wire protocol messages, which cause the message decompressor to incorrectly allocate memory. This issue affects: MongoDB Inc. MongoDB Server v4.2 versions prior to 4.2.1; v4.0 versions prior to 4.0.13; v3.6 versions prior to 3.6.15; v3...
https://nvd.nist.gov/vuln/detail/CVE-2019-20925
304,467
mongo
1411cf602a21e45a5ef42b6869c480eb420976ee
https://github.com/mongodb/mongo
https://github.com/mongodb/mongo/commit/1411cf602a21e45a5ef42b6869c480eb420976ee
SERVER-43751 Recompute compressor manager message parameters
0
StatusWith<Message> MessageCompressorManager::decompressMessage(const Message& msg, MessageCompressorId* compressorId) { auto inputHeader = msg.header(); ConstDataRangeCursor input(inputHeader.data(), inputHeader.data() + inputHeader.dataLen()); ...
266,158,690,335,555,200,000,000,000,000,000,000,000
None
null
[ "CWE-697" ]
CVE-2019-20925
An unauthenticated client can trigger denial of service by issuing specially crafted wire protocol messages, which cause the message decompressor to incorrectly allocate memory. This issue affects: MongoDB Inc. MongoDB Server v4.2 versions prior to 4.2.1; v4.0 versions prior to 4.0.13; v3.6 versions prior to 3.6.15; v3...
https://nvd.nist.gov/vuln/detail/CVE-2019-20925
200,526
linux
8205d5d98ef7f155de211f5e2eb6ca03d95a5a60
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8205d5d98ef7f155de211f5e2eb6ca03d95a5a60
powerpc/tm: Fix FP/VMX unavailable exceptions inside a transaction When we take an FP unavailable exception in a transaction we have to account for the hardware FP TM checkpointed registers being incorrect. In this case for this process we know the current and checkpointed FP registers must be the same (since FP wasn'...
1
void giveup_all(struct task_struct *tsk) { unsigned long usermsr; if (!tsk->thread.regs) return; usermsr = tsk->thread.regs->msr; if ((usermsr & msr_all_available) == 0) return; msr_check_and_set(msr_all_available); check_if_tm_restore_required(tsk); WARN_ON((usermsr & MSR_VSX) && !((usermsr & MSR_FP) &...
158,033,907,090,062,380,000,000,000,000,000,000,000
process.c
58,487,282,007,429,130,000,000,000,000,000,000,000
[ "CWE-862" ]
CVE-2019-15030
In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users' processes via a Facility Unavailable exception. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers....
https://nvd.nist.gov/vuln/detail/CVE-2019-15030
304,916
linux
8205d5d98ef7f155de211f5e2eb6ca03d95a5a60
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8205d5d98ef7f155de211f5e2eb6ca03d95a5a60
powerpc/tm: Fix FP/VMX unavailable exceptions inside a transaction When we take an FP unavailable exception in a transaction we have to account for the hardware FP TM checkpointed registers being incorrect. In this case for this process we know the current and checkpointed FP registers must be the same (since FP wasn'...
0
void giveup_all(struct task_struct *tsk) { unsigned long usermsr; if (!tsk->thread.regs) return; check_if_tm_restore_required(tsk); usermsr = tsk->thread.regs->msr; if ((usermsr & msr_all_available) == 0) return; msr_check_and_set(msr_all_available); WARN_ON((usermsr & MSR_VSX) && !((usermsr & MSR_FP) ...
205,484,556,932,136,720,000,000,000,000,000,000,000
process.c
82,519,391,866,914,660,000,000,000,000,000,000,000
[ "CWE-862" ]
CVE-2019-15030
In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users' processes via a Facility Unavailable exception. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers....
https://nvd.nist.gov/vuln/detail/CVE-2019-15030
200,532
linux
501e38a5531efbd77d5c73c0ba838a889bfc1d74
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=501e38a5531efbd77d5c73c0ba838a889bfc1d74
usb: gadget: clear related members when goto fail dev->config and dev->hs_config and dev->dev need to be cleaned if dev_config fails to avoid UAF. Acked-by: Alan Stern <stern@rowland.harvard.edu> Signed-off-by: Hangyu Hua <hbh25y@gmail.com> Link: https://lore.kernel.org/r/20211231172138.7993-3-hbh25y@gmail.com Signed...
1
dev_config (struct file *fd, const char __user *buf, size_t len, loff_t *ptr) { struct dev_data *dev = fd->private_data; ssize_t value, length = len; unsigned total; u32 tag; char *kbuf; spin_lock_irq(&dev->lock); if (dev->state > STATE_DEV_OPENED) { value = ep0_write(fd, buf, len, ptr); spin_unlock...
194,820,517,650,016,100,000,000,000,000,000,000,000
inode.c
284,751,517,814,041,800,000,000,000,000,000,000,000
[ "CWE-763" ]
CVE-2022-24958
drivers/usb/gadget/legacy/inode.c in the Linux kernel through 5.16.8 mishandles dev->buf release.
https://nvd.nist.gov/vuln/detail/CVE-2022-24958
305,016
linux
501e38a5531efbd77d5c73c0ba838a889bfc1d74
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=501e38a5531efbd77d5c73c0ba838a889bfc1d74
usb: gadget: clear related members when goto fail dev->config and dev->hs_config and dev->dev need to be cleaned if dev_config fails to avoid UAF. Acked-by: Alan Stern <stern@rowland.harvard.edu> Signed-off-by: Hangyu Hua <hbh25y@gmail.com> Link: https://lore.kernel.org/r/20211231172138.7993-3-hbh25y@gmail.com Signed...
0
dev_config (struct file *fd, const char __user *buf, size_t len, loff_t *ptr) { struct dev_data *dev = fd->private_data; ssize_t value, length = len; unsigned total; u32 tag; char *kbuf; spin_lock_irq(&dev->lock); if (dev->state > STATE_DEV_OPENED) { value = ep0_write(fd, buf, len, ptr); spin_unlock...
242,044,116,473,098,500,000,000,000,000,000,000,000
None
null
[ "CWE-763" ]
CVE-2022-24958
drivers/usb/gadget/legacy/inode.c in the Linux kernel through 5.16.8 mishandles dev->buf release.
https://nvd.nist.gov/vuln/detail/CVE-2022-24958
200,534
libgd
cfee163a5e848fc3e3fb1d05a30d7557cdd36457
https://github.com/libgd/libgd
https://github.com/libgd/libgd/commit/cfee163a5e848fc3e3fb1d05a30d7557cdd36457
- #18, Removed invalid gdFree call when overflow2 fails - #17, Free im->pixels as well on error
1
BGD_DECLARE(gdImagePtr) gdImageCreate (int sx, int sy) { int i; gdImagePtr im; if (overflow2(sizeof (unsigned char *), sy)) { gdFree(im); return NULL; } im = (gdImage *) gdMalloc (sizeof (gdImage)); if (!im) { return NULL; } memset (im, 0, sizeof (gdImage)); /* Row-major ever since gd 1.3 */ im...
256,798,206,792,890,030,000,000,000,000,000,000,000
gd.c
46,449,260,265,110,780,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2016-5767
Integer overflow in the gdImageCreate function in gd.c in the GD Graphics Library (aka libgd) before 2.0.34RC1, as used in PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8, allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified ot...
https://nvd.nist.gov/vuln/detail/CVE-2016-5767
305,100
libgd
cfee163a5e848fc3e3fb1d05a30d7557cdd36457
https://github.com/libgd/libgd
https://github.com/libgd/libgd/commit/cfee163a5e848fc3e3fb1d05a30d7557cdd36457
- #18, Removed invalid gdFree call when overflow2 fails - #17, Free im->pixels as well on error
0
BGD_DECLARE(gdImagePtr) gdImageCreate (int sx, int sy) { int i; gdImagePtr im; if (overflow2(sizeof (unsigned char *), sy)) { return NULL; } if (overflow2(sizeof (unsigned char *), sx)) { return NULL; } im = (gdImage *) gdMalloc (sizeof (gdImage)); if (!im) { return NULL; } memset (im, 0, siz...
159,650,139,449,059,390,000,000,000,000,000,000,000
gd.c
181,554,828,672,857,300,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2016-5767
Integer overflow in the gdImageCreate function in gd.c in the GD Graphics Library (aka libgd) before 2.0.34RC1, as used in PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8, allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified ot...
https://nvd.nist.gov/vuln/detail/CVE-2016-5767
200,542
mongo
35c1b1f588f04926a958ad2fe4d9c59d79f81e8b
https://github.com/mongodb/mongo
https://github.com/mongodb/mongo/commit/35c1b1f588f04926a958ad2fe4d9c59d79f81e8b
SERVER-35636 renameCollectionForApplyOps checks for complete namespace
1
Status renameCollectionForApplyOps(OperationContext* opCtx, const std::string& dbName, const BSONElement& ui, const BSONObj& cmd, const repl::OpTime& renameOpTime) { const aut...
2,698,418,688,630,709,400,000,000,000,000,000,000
rename_collection.cpp
161,376,128,934,080,040,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2018-20804
A user authorized to perform database queries may trigger denial of service by issuing specially crafted applyOps invocations. This issue affects: MongoDB Inc. MongoDB Server v4.0 versions prior to 4.0.10; v3.6 versions prior to 3.6.13.
https://nvd.nist.gov/vuln/detail/CVE-2018-20804
305,208
mongo
35c1b1f588f04926a958ad2fe4d9c59d79f81e8b
https://github.com/mongodb/mongo
https://github.com/mongodb/mongo/commit/35c1b1f588f04926a958ad2fe4d9c59d79f81e8b
SERVER-35636 renameCollectionForApplyOps checks for complete namespace
0
Status renameCollectionForApplyOps(OperationContext* opCtx, const std::string& dbName, const BSONElement& ui, const BSONObj& cmd, const repl::OpTime& renameOpTime) { const aut...
297,001,730,009,072,400,000,000,000,000,000,000,000
rename_collection.cpp
207,306,870,962,821,160,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2018-20804
A user authorized to perform database queries may trigger denial of service by issuing specially crafted applyOps invocations. This issue affects: MongoDB Inc. MongoDB Server v4.0 versions prior to 4.0.10; v3.6 versions prior to 3.6.13.
https://nvd.nist.gov/vuln/detail/CVE-2018-20804
200,543
ImageMagick
17a1a6f97fd088a71931bdc422f4e96bb6ffc549
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/17a1a6f97fd088a71931bdc422f4e96bb6ffc549
https://github.com/ImageMagick/ImageMagick/issues/1249
1
static StringInfo *ParseImageResourceBlocks(Image *image, const unsigned char *blocks,size_t length, MagickBooleanType *has_merged_image,ExceptionInfo *exception) { const unsigned char *p; StringInfo *profile; unsigned char name_length; unsigned int count; unsigned short id, sh...
183,372,386,126,740,970,000,000,000,000,000,000,000
psd.c
125,430,311,245,320,370,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-16412
ImageMagick 7.0.8-11 Q16 has a heap-based buffer over-read in the coders/psd.c ParseImageResourceBlocks function.
https://nvd.nist.gov/vuln/detail/CVE-2018-16412
305,268
ImageMagick
17a1a6f97fd088a71931bdc422f4e96bb6ffc549
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/17a1a6f97fd088a71931bdc422f4e96bb6ffc549
https://github.com/ImageMagick/ImageMagick/issues/1249
0
static StringInfo *ParseImageResourceBlocks(Image *image, const unsigned char *blocks,size_t length, MagickBooleanType *has_merged_image,ExceptionInfo *exception) { const unsigned char *p; StringInfo *profile; unsigned char name_length; unsigned int count; unsigned short id, sh...
336,089,082,422,141,030,000,000,000,000,000,000,000
psd.c
75,031,364,385,396,610,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-16412
ImageMagick 7.0.8-11 Q16 has a heap-based buffer over-read in the coders/psd.c ParseImageResourceBlocks function.
https://nvd.nist.gov/vuln/detail/CVE-2018-16412
200,559
linux
77e70d351db7de07a46ac49b87a6c3c7a60fca7e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/77e70d351db7de07a46ac49b87a6c3c7a60fca7e
Input: sunkbd - avoid use-after-free in teardown paths We need to make sure we cancel the reinit work before we tear down the driver structures. Reported-by: Bodong Zhao <nopitydays@gmail.com> Tested-by: Bodong Zhao <nopitydays@gmail.com> Cc: stable@vger.kernel.org Signed-off-by: Dmitry Torokhov <dmitry.torokhov@gmai...
1
static void sunkbd_reinit(struct work_struct *work) { struct sunkbd *sunkbd = container_of(work, struct sunkbd, tq); wait_event_interruptible_timeout(sunkbd->wait, sunkbd->reset >= 0, HZ); serio_write(sunkbd->serio, SUNKBD_CMD_SETLED); serio_write(sunkbd->serio, (!!test_bit(LED_CAPSL, sunkbd->dev->led) << 3) ...
312,755,301,801,403,600,000,000,000,000,000,000,000
sunkbd.c
249,779,570,168,083,900,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2020-25669
A vulnerability was found in the Linux Kernel where the function sunkbd_reinit having been scheduled by sunkbd_interrupt before sunkbd being freed. Though the dangling pointer is set to NULL in sunkbd_disconnect, there is still an alias in sunkbd_reinit causing Use After Free.
https://nvd.nist.gov/vuln/detail/CVE-2020-25669
305,349
linux
77e70d351db7de07a46ac49b87a6c3c7a60fca7e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/77e70d351db7de07a46ac49b87a6c3c7a60fca7e
Input: sunkbd - avoid use-after-free in teardown paths We need to make sure we cancel the reinit work before we tear down the driver structures. Reported-by: Bodong Zhao <nopitydays@gmail.com> Tested-by: Bodong Zhao <nopitydays@gmail.com> Cc: stable@vger.kernel.org Signed-off-by: Dmitry Torokhov <dmitry.torokhov@gmai...
0
static void sunkbd_set_leds_beeps(struct sunkbd *sunkbd) { serio_write(sunkbd->serio, SUNKBD_CMD_SETLED); serio_write(sunkbd->serio, (!!test_bit(LED_CAPSL, sunkbd->dev->led) << 3) | (!!test_bit(LED_SCROLLL, sunkbd->dev->led) << 2) | (!!test_bit(LED_COMPOSE, sunkbd->dev->led) << 1) | !!test_bit(LED_NUML, ...
201,768,629,834,983,540,000,000,000,000,000,000,000
sunkbd.c
75,792,111,114,833,040,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2020-25669
A vulnerability was found in the Linux Kernel where the function sunkbd_reinit having been scheduled by sunkbd_interrupt before sunkbd being freed. Though the dangling pointer is set to NULL in sunkbd_disconnect, there is still an alias in sunkbd_reinit causing Use After Free.
https://nvd.nist.gov/vuln/detail/CVE-2020-25669
200,560
linux
77e70d351db7de07a46ac49b87a6c3c7a60fca7e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/77e70d351db7de07a46ac49b87a6c3c7a60fca7e
Input: sunkbd - avoid use-after-free in teardown paths We need to make sure we cancel the reinit work before we tear down the driver structures. Reported-by: Bodong Zhao <nopitydays@gmail.com> Tested-by: Bodong Zhao <nopitydays@gmail.com> Cc: stable@vger.kernel.org Signed-off-by: Dmitry Torokhov <dmitry.torokhov@gmai...
1
static irqreturn_t sunkbd_interrupt(struct serio *serio, unsigned char data, unsigned int flags) { struct sunkbd *sunkbd = serio_get_drvdata(serio); if (sunkbd->reset <= -1) { /* * If cp[i] is 0xff, sunkbd->reset will stay -1. * The keyboard sends 0xff 0xff 0xID on powerup. */ sunkbd->reset = data; ...
265,130,201,845,161,900,000,000,000,000,000,000,000
sunkbd.c
249,779,570,168,083,900,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2020-25669
A vulnerability was found in the Linux Kernel where the function sunkbd_reinit having been scheduled by sunkbd_interrupt before sunkbd being freed. Though the dangling pointer is set to NULL in sunkbd_disconnect, there is still an alias in sunkbd_reinit causing Use After Free.
https://nvd.nist.gov/vuln/detail/CVE-2020-25669
305,354
linux
77e70d351db7de07a46ac49b87a6c3c7a60fca7e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/77e70d351db7de07a46ac49b87a6c3c7a60fca7e
Input: sunkbd - avoid use-after-free in teardown paths We need to make sure we cancel the reinit work before we tear down the driver structures. Reported-by: Bodong Zhao <nopitydays@gmail.com> Tested-by: Bodong Zhao <nopitydays@gmail.com> Cc: stable@vger.kernel.org Signed-off-by: Dmitry Torokhov <dmitry.torokhov@gmai...
0
static irqreturn_t sunkbd_interrupt(struct serio *serio, unsigned char data, unsigned int flags) { struct sunkbd *sunkbd = serio_get_drvdata(serio); if (sunkbd->reset <= -1) { /* * If cp[i] is 0xff, sunkbd->reset will stay -1. * The keyboard sends 0xff 0xff 0xID on powerup. */ sunkbd->reset = data; ...
68,967,450,280,763,020,000,000,000,000,000,000,000
sunkbd.c
75,792,111,114,833,040,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2020-25669
A vulnerability was found in the Linux Kernel where the function sunkbd_reinit having been scheduled by sunkbd_interrupt before sunkbd being freed. Though the dangling pointer is set to NULL in sunkbd_disconnect, there is still an alias in sunkbd_reinit causing Use After Free.
https://nvd.nist.gov/vuln/detail/CVE-2020-25669
200,568
libreswan
9b31deafbdbf0c2206358dfbf2d4e343e365f23f
https://github.com/libreswan/libreswan
https://github.com/libreswan/libreswan/commit/9b31deafbdbf0c2206358dfbf2d4e343e365f23f
SECURITY: Do not inspect or continue on very short packets Code introduced in Openswan to ensure the IKEv2 minor was ignored introduced a vulnerability that caused mangled short IKE packets to be processed as valid IKE packets despite in_struct() returning a failure, resulting in pluto crashing and restarting. Report...
1
void process_packet(struct msg_digest **mdp) { struct msg_digest *md = *mdp; struct state *st = NULL; int maj, min; enum state_kind from_state = STATE_UNDEFINED; /* state we started in */ struct isakmp_hdr *hdr; #define SEND_NOTIFICATION(t) { \ if (st) \ send_notification_from_state(st, from_state, t); \ ...
134,270,365,742,178,900,000,000,000,000,000,000,000
demux.c
337,063,778,717,034,250,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4564
Libreswan 3.6 allows remote attackers to cause a denial of service (crash) via a small length value and (1) no version or (2) an invalid major number in an IKE packet.
https://nvd.nist.gov/vuln/detail/CVE-2013-4564
305,522
libreswan
9b31deafbdbf0c2206358dfbf2d4e343e365f23f
https://github.com/libreswan/libreswan
https://github.com/libreswan/libreswan/commit/9b31deafbdbf0c2206358dfbf2d4e343e365f23f
SECURITY: Do not inspect or continue on very short packets Code introduced in Openswan to ensure the IKEv2 minor was ignored introduced a vulnerability that caused mangled short IKE packets to be processed as valid IKE packets despite in_struct() returning a failure, resulting in pluto crashing and restarting. Report...
0
void process_packet(struct msg_digest **mdp) { struct msg_digest *md = *mdp; struct state *st = NULL; int vmaj, vmin; enum state_kind from_state = STATE_UNDEFINED; /* state we started in */ #define SEND_NOTIFICATION(t) { \ if (st) \ send_notification_from_state(st, from_state, t); \ else \ send_notific...
101,988,141,771,400,330,000,000,000,000,000,000,000
demux.c
115,007,169,366,432,070,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-4564
Libreswan 3.6 allows remote attackers to cause a denial of service (crash) via a small length value and (1) no version or (2) an invalid major number in an IKE packet.
https://nvd.nist.gov/vuln/detail/CVE-2013-4564
200,571
lxc
5eb45428b312e978fb9e294dde16efb14dd9fa4d
https://github.com/lxc/lxc
https://github.com/lxc/lxc/commit/5eb45428b312e978fb9e294dde16efb14dd9fa4d
CVE 2018-6556: verify netns fd in lxc-user-nic Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
1
int main(int argc, char *argv[]) { int fd, n, pid, request, ret; char *me, *newname; struct user_nic_args args; int container_veth_ifidx = -1, host_veth_ifidx = -1, netns_fd = -1; char *cnic = NULL, *nicname = NULL; struct alloted_s *alloted = NULL; if (argc < 7 || argc > 8) { usage(argv[0], true); exit(EXI...
107,076,507,013,076,860,000,000,000,000,000,000,000
None
null
[ "CWE-417" ]
CVE-2018-6556
lxc-user-nic when asked to delete a network interface will unconditionally open a user provided path. This code path may be used by an unprivileged user to check for the existence of a path which they wouldn't otherwise be able to reach. It may also be used to trigger side effects by causing a (read-only) open of speci...
https://nvd.nist.gov/vuln/detail/CVE-2018-6556
305,591
lxc
5eb45428b312e978fb9e294dde16efb14dd9fa4d
https://github.com/lxc/lxc
https://github.com/lxc/lxc/commit/5eb45428b312e978fb9e294dde16efb14dd9fa4d
CVE 2018-6556: verify netns fd in lxc-user-nic Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
0
int main(int argc, char *argv[]) { int fd, n, pid, request, ret; char *me, *newname; struct user_nic_args args; int container_veth_ifidx = -1, host_veth_ifidx = -1, netns_fd = -1; char *cnic = NULL, *nicname = NULL; struct alloted_s *alloted = NULL; if (argc < 7 || argc > 8) { usage(argv[0], true); exit(EXI...
137,298,647,947,402,950,000,000,000,000,000,000,000
None
null
[ "CWE-417" ]
CVE-2018-6556
lxc-user-nic when asked to delete a network interface will unconditionally open a user provided path. This code path may be used by an unprivileged user to check for the existence of a path which they wouldn't otherwise be able to reach. It may also be used to trigger side effects by causing a (read-only) open of speci...
https://nvd.nist.gov/vuln/detail/CVE-2018-6556
200,609
php-src
158d8a6b088662ce9d31e0c777c6ebe90efdc854
https://github.com/php/php-src
http://git.php.net/?p=php-src.git;a=commitdiff;h=158d8a6b088662ce9d31e0c777c6ebe90efdc854
fix unchecked emalloc
1
static int phar_tar_process_metadata(phar_entry_info *entry, php_stream *fp TSRMLS_DC) /* {{{ */ { char *metadata; size_t save = php_stream_tell(fp), read; phar_entry_info *mentry; metadata = (char *) emalloc(entry->uncompressed_filesize + 1); read = php_stream_read(fp, metadata, entry->uncompressed_filesize); ...
65,364,156,517,998,690,000,000,000,000,000,000,000
tar.c
149,503,072,447,606,830,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2386
Integer overflow in the phar_parse_tarfile function in tar.c in the phar extension in PHP before 5.3.14 and 5.4.x before 5.4.4 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted tar file that triggers a heap-based buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2012-2386
305,741
php-src
158d8a6b088662ce9d31e0c777c6ebe90efdc854
https://github.com/php/php-src
http://git.php.net/?p=php-src.git;a=commitdiff;h=158d8a6b088662ce9d31e0c777c6ebe90efdc854
fix unchecked emalloc
0
static int phar_tar_process_metadata(phar_entry_info *entry, php_stream *fp TSRMLS_DC) /* {{{ */ { char *metadata; size_t save = php_stream_tell(fp), read; phar_entry_info *mentry; metadata = (char *) safe_emalloc(1, entry->uncompressed_filesize, 1); read = php_stream_read(fp, metadata, entry->uncompressed_files...
233,449,039,787,058,470,000,000,000,000,000,000,000
tar.c
121,940,513,997,505,800,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2012-2386
Integer overflow in the phar_parse_tarfile function in tar.c in the phar extension in PHP before 5.3.14 and 5.4.x before 5.4.4 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted tar file that triggers a heap-based buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2012-2386
200,610
ImageMagick
f0a8d407b2801174fd8923941a9e7822f7f9a506
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/f0a8d407b2801174fd8923941a9e7822f7f9a506
https://github.com/ImageMagick/ImageMagick/issues/1719
1
static Image *ReadTXTImage(const ImageInfo *image_info,ExceptionInfo *exception) { char colorspace[MagickPathExtent], text[MagickPathExtent]; double max_value, x_offset, y_offset; Image *image; PixelInfo pixel; MagickBooleanType status; QuantumAny range; register ...
145,033,988,022,512,470,000,000,000,000,000,000,000
txt.c
240,615,627,853,878,400,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2020-27758
A flaw was found in ImageMagick in coders/txt.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned long long`. This would most likely lead to an impact to application availability, but could potentially caus...
https://nvd.nist.gov/vuln/detail/CVE-2020-27758
305,749
ImageMagick
f0a8d407b2801174fd8923941a9e7822f7f9a506
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/f0a8d407b2801174fd8923941a9e7822f7f9a506
https://github.com/ImageMagick/ImageMagick/issues/1719
0
static Image *ReadTXTImage(const ImageInfo *image_info,ExceptionInfo *exception) { char colorspace[MagickPathExtent], text[MagickPathExtent]; double max_value, x_offset, y_offset; Image *image; PixelInfo pixel; MagickBooleanType status; QuantumAny range; register ...
62,057,344,466,366,940,000,000,000,000,000,000,000
txt.c
188,533,965,387,956,480,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2020-27758
A flaw was found in ImageMagick in coders/txt.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned long long`. This would most likely lead to an impact to application availability, but could potentially caus...
https://nvd.nist.gov/vuln/detail/CVE-2020-27758
200,620
weechat
9453e81baa7935db82a0b765a47cba772aba730d
https://github.com/weechat/weechat
http://git.savannah.gnu.org/gitweb/?p=weechat.git;a=commitdiff;h=9453e81baa7935db82a0b765a47cba772aba730d
irc: fix crash when decoding IRC colors in strings (bug #37704)
1
irc_color_decode (const char *string, int keep_colors) { unsigned char *out, *ptr_string; int out_length, length, out_pos; char str_fg[3], str_bg[3], str_color[128], str_key[128]; const char *remapped_color; int fg, bg, bold, reverse, italic, underline, rc; out_length = (strlen (string) * 2) + ...
223,681,771,460,116,220,000,000,000,000,000,000,000
irc-color.c
89,422,887,636,174,310,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2012-5854
Heap-based buffer overflow in WeeChat 0.3.6 through 0.3.9 allows remote attackers to cause a denial of service (crash or hang) and possibly execute arbitrary code via crafted IRC colors that are not properly decoded.
https://nvd.nist.gov/vuln/detail/CVE-2012-5854
306,278
weechat
9453e81baa7935db82a0b765a47cba772aba730d
https://github.com/weechat/weechat
http://git.savannah.gnu.org/gitweb/?p=weechat.git;a=commitdiff;h=9453e81baa7935db82a0b765a47cba772aba730d
irc: fix crash when decoding IRC colors in strings (bug #37704)
0
irc_color_decode (const char *string, int keep_colors) { unsigned char *out, *out2, *ptr_string; int out_length, length, out_pos, length_to_add; char str_fg[3], str_bg[3], str_color[128], str_key[128], str_to_add[128]; const char *remapped_color; int fg, bg, bold, reverse, italic, underline, rc; ...
114,733,310,755,086,330,000,000,000,000,000,000,000
irc-color.c
250,038,329,146,825,260,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2012-5854
Heap-based buffer overflow in WeeChat 0.3.6 through 0.3.9 allows remote attackers to cause a denial of service (crash or hang) and possibly execute arbitrary code via crafted IRC colors that are not properly decoded.
https://nvd.nist.gov/vuln/detail/CVE-2012-5854
200,623
libexpat
ba0f9c3b40c264b8dd392e02a7a060a8fa54f032
https://github.com/libexpat/libexpat
https://github.com/libexpat/libexpat/commit/ba0f9c3b40c264b8dd392e02a7a060a8fa54f032
CVE-2015-1283 Sanity check size calculations. r=peterv, a=abillings https://sourceforge.net/p/expat/bugs/528/
1
XML_GetBuffer(XML_Parser parser, int len) { switch (ps_parsing) { case XML_SUSPENDED: errorCode = XML_ERROR_SUSPENDED; return NULL; case XML_FINISHED: errorCode = XML_ERROR_FINISHED; return NULL; default: ; } if (len > bufferLim - bufferEnd) { /* FIXME avoid integer overflow */ int ...
162,587,282,358,463,120,000,000,000,000,000,000,000
xmlparse.c
313,837,865,050,894,300,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2015-2716
Buffer overflow in the XML parser in Mozilla Firefox before 38.0, Firefox ESR 31.x before 31.7, and Thunderbird before 31.7 allows remote attackers to execute arbitrary code by providing a large amount of compressed XML data, a related issue to CVE-2015-1283.
https://nvd.nist.gov/vuln/detail/CVE-2015-2716
306,400
libexpat
ba0f9c3b40c264b8dd392e02a7a060a8fa54f032
https://github.com/libexpat/libexpat
https://github.com/libexpat/libexpat/commit/ba0f9c3b40c264b8dd392e02a7a060a8fa54f032
CVE-2015-1283 Sanity check size calculations. r=peterv, a=abillings https://sourceforge.net/p/expat/bugs/528/
0
XML_GetBuffer(XML_Parser parser, int len) { if (len < 0) { errorCode = XML_ERROR_NO_MEMORY; return NULL; } switch (ps_parsing) { case XML_SUSPENDED: errorCode = XML_ERROR_SUSPENDED; return NULL; case XML_FINISHED: errorCode = XML_ERROR_FINISHED; return NULL; default: ; } if (len...
108,033,387,776,295,410,000,000,000,000,000,000,000
xmlparse.c
74,933,495,793,135,120,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2015-2716
Buffer overflow in the XML parser in Mozilla Firefox before 38.0, Firefox ESR 31.x before 31.7, and Thunderbird before 31.7 allows remote attackers to execute arbitrary code by providing a large amount of compressed XML data, a related issue to CVE-2015-1283.
https://nvd.nist.gov/vuln/detail/CVE-2015-2716
200,631
php-src
e5c95234d87fcb8f6b7569a96a89d1e1544749a6
https://github.com/php/php-src
http://git.php.net/?p=php-src.git;a=commit;h=e5c95234d87fcb8f6b7569a96a89d1e1544749a6
Fix bug #79082 - Files added to tar with Phar::buildFromIterator have all-access permissions
1
static int phar_build(zend_object_iterator *iter, void *puser) /* {{{ */ { zval *value; zend_bool close_fp = 1; struct _phar_t *p_obj = (struct _phar_t*) puser; uint32_t str_key_len, base_len = p_obj->l; phar_entry_data *data; php_stream *fp; size_t fname_len; size_t contents_len; char *fname, *error = NULL, *...
142,381,912,986,497,900,000,000,000,000,000,000,000
phar_object.c
143,675,667,435,652,180,000,000,000,000,000,000,000
[ "CWE-281" ]
CVE-2020-7063
In PHP versions 7.2.x below 7.2.28, 7.3.x below 7.3.15 and 7.4.x below 7.4.3, when creating PHAR archive using PharData::buildFromIterator() function, the files are added with default permissions (0666, or all access) even if the original files on the filesystem were with more restrictive permissions. This may result i...
https://nvd.nist.gov/vuln/detail/CVE-2020-7063
306,695
php-src
e5c95234d87fcb8f6b7569a96a89d1e1544749a6
https://github.com/php/php-src
http://git.php.net/?p=php-src.git;a=commit;h=e5c95234d87fcb8f6b7569a96a89d1e1544749a6
Fix bug #79082 - Files added to tar with Phar::buildFromIterator have all-access permissions
0
static int phar_build(zend_object_iterator *iter, void *puser) /* {{{ */ { zval *value; zend_bool close_fp = 1; struct _phar_t *p_obj = (struct _phar_t*) puser; uint32_t str_key_len, base_len = p_obj->l; phar_entry_data *data; php_stream *fp; size_t fname_len; size_t contents_len; char *fname, *error = NULL, *...
252,328,092,355,793,480,000,000,000,000,000,000,000
phar_object.c
30,122,531,312,198,340,000,000,000,000,000,000,000
[ "CWE-281" ]
CVE-2020-7063
In PHP versions 7.2.x below 7.2.28, 7.3.x below 7.3.15 and 7.4.x below 7.4.3, when creating PHAR archive using PharData::buildFromIterator() function, the files are added with default permissions (0666, or all access) even if the original files on the filesystem were with more restrictive permissions. This may result i...
https://nvd.nist.gov/vuln/detail/CVE-2020-7063
200,634
xserver
446ff2d3177087b8173fa779fa5b77a2a128988b
http://gitweb.freedesktop.org/?p=xorg/xserver
https://gitlab.freedesktop.org/xorg/xserver/-/commit/446ff2d3177087b8173fa779fa5b77a2a128988b
Check SetMap request length carefully. Avoid out of bounds memory accesses on too short request. ZDI-CAN 11572 / CVE-2020-14360 This vulnerability was discovered by: Jan-Niklas Sohn working with Trend Micro Zero Day Initiative Signed-off-by: Matthieu Herrb <matthieu@herrb.eu>
1
ProcXkbSetMap(ClientPtr client) { DeviceIntPtr dev; char *tmp; int rc; REQUEST(xkbSetMapReq); REQUEST_AT_LEAST_SIZE(xkbSetMapReq); if (!(client->xkbClientFlags & _XkbClientInitialized)) return BadAccess; CHK_KBD_DEVICE(dev, stuff->deviceSpec, client, DixManageAccess); CHK_MASK...
270,061,835,713,047,150,000,000,000,000,000,000,000
xkb.c
166,733,717,349,972,270,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2020-14360
A flaw was found in the X.Org Server before version 1.20.10. An out-of-bounds access in the XkbSetMap function may lead to a privilege escalation vulnerability. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
https://nvd.nist.gov/vuln/detail/CVE-2020-14360
306,868
xserver
446ff2d3177087b8173fa779fa5b77a2a128988b
http://gitweb.freedesktop.org/?p=xorg/xserver
https://gitlab.freedesktop.org/xorg/xserver/-/commit/446ff2d3177087b8173fa779fa5b77a2a128988b
Check SetMap request length carefully. Avoid out of bounds memory accesses on too short request. ZDI-CAN 11572 / CVE-2020-14360 This vulnerability was discovered by: Jan-Niklas Sohn working with Trend Micro Zero Day Initiative Signed-off-by: Matthieu Herrb <matthieu@herrb.eu>
0
ProcXkbSetMap(ClientPtr client) { DeviceIntPtr dev; char *tmp; int rc; REQUEST(xkbSetMapReq); REQUEST_AT_LEAST_SIZE(xkbSetMapReq); if (!(client->xkbClientFlags & _XkbClientInitialized)) return BadAccess; CHK_KBD_DEVICE(dev, stuff->deviceSpec, client, DixManageAccess); CHK_MASK...
65,916,553,124,724,060,000,000,000,000,000,000,000
xkb.c
158,236,170,569,627,880,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2020-14360
A flaw was found in the X.Org Server before version 1.20.10. An out-of-bounds access in the XkbSetMap function may lead to a privilege escalation vulnerability. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
https://nvd.nist.gov/vuln/detail/CVE-2020-14360
200,635
mbedtls
c988f32adde62a169ba340fee0da15aecd40e76e
https://github.com/ARMmbed/mbedtls
https://github.com/ARMmbed/mbedtls/commit/c988f32adde62a169ba340fee0da15aecd40e76e
Added max length checking of hostname
1
int ssl_set_hostname( ssl_context *ssl, const char *hostname ) { if( hostname == NULL ) return( POLARSSL_ERR_SSL_BAD_INPUT_DATA ); ssl->hostname_len = strlen( hostname ); if( ssl->hostname_len + 1 == 0 ) return( POLARSSL_ERR_SSL_BAD_INPUT_DATA ); ssl->hostname = polarssl_malloc( ssl->...
247,537,879,168,285,730,000,000,000,000,000,000,000
ssl_tls.c
133,655,392,987,534,970,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2015-5291
Heap-based buffer overflow in PolarSSL 1.x before 1.2.17 and ARM mbed TLS (formerly PolarSSL) 1.3.x before 1.3.14 and 2.x before 2.1.2 allows remote SSL servers to cause a denial of service (client crash) and possibly execute arbitrary code via a long hostname to the server name indication (SNI) extension, which is not...
https://nvd.nist.gov/vuln/detail/CVE-2015-5291
306,897
mbedtls
c988f32adde62a169ba340fee0da15aecd40e76e
https://github.com/ARMmbed/mbedtls
https://github.com/ARMmbed/mbedtls/commit/c988f32adde62a169ba340fee0da15aecd40e76e
Added max length checking of hostname
0
int ssl_set_hostname( ssl_context *ssl, const char *hostname ) { if( hostname == NULL ) return( POLARSSL_ERR_SSL_BAD_INPUT_DATA ); ssl->hostname_len = strlen( hostname ); if( ssl->hostname_len + 1 == 0 ) return( POLARSSL_ERR_SSL_BAD_INPUT_DATA ); if( ssl->hostname_len > SSL_MAX_HOST_N...
205,428,076,848,854,880,000,000,000,000,000,000,000
ssl_tls.c
41,989,934,499,373,270,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2015-5291
Heap-based buffer overflow in PolarSSL 1.x before 1.2.17 and ARM mbed TLS (formerly PolarSSL) 1.3.x before 1.3.14 and 2.x before 2.1.2 allows remote SSL servers to cause a denial of service (client crash) and possibly execute arbitrary code via a long hostname to the server name indication (SNI) extension, which is not...
https://nvd.nist.gov/vuln/detail/CVE-2015-5291
200,638
linux
050fad7c4534c13c8eb1d9c2ba66012e014773cb
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=050fad7c4534c13c8eb1d9c2ba66012e014773cb
bpf: fix truncated jump targets on heavy expansions Recently during testing, I ran into the following panic: [ 207.892422] Internal error: Accessing user space memory outside uaccess.h routines: 96000004 [#1] SMP [ 207.901637] Modules linked in: binfmt_misc [...] [ 207.966530] CPU: 45 PID: 2256 Comm: test_ve...
1
static int bpf_convert_filter(struct sock_filter *prog, int len, struct bpf_prog *new_prog, int *new_len) { int new_flen = 0, pass = 0, target, i, stack_off; struct bpf_insn *new_insn, *first_insn = NULL; struct sock_filter *fp; int *addrs = NULL; u8 bpf_src; BUILD_BUG_ON(BPF_MEMWORDS * sizeof(u32) > MA...
298,825,752,604,361,460,000,000,000,000,000,000,000
filter.c
236,062,132,936,816,500,000,000,000,000,000,000,000
[ "CWE-120" ]
CVE-2018-25020
The BPF subsystem in the Linux kernel before 4.17 mishandles situations with a long jump over an instruction sequence where inner instructions require substantial expansions into multiple BPF instructions, leading to an overflow. This affects kernel/bpf/core.c and net/core/filter.c.
https://nvd.nist.gov/vuln/detail/CVE-2018-25020
307,147
linux
050fad7c4534c13c8eb1d9c2ba66012e014773cb
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=050fad7c4534c13c8eb1d9c2ba66012e014773cb
bpf: fix truncated jump targets on heavy expansions Recently during testing, I ran into the following panic: [ 207.892422] Internal error: Accessing user space memory outside uaccess.h routines: 96000004 [#1] SMP [ 207.901637] Modules linked in: binfmt_misc [...] [ 207.966530] CPU: 45 PID: 2256 Comm: test_ve...
0
static int bpf_convert_filter(struct sock_filter *prog, int len, struct bpf_prog *new_prog, int *new_len) { int new_flen = 0, pass = 0, target, i, stack_off; struct bpf_insn *new_insn, *first_insn = NULL; struct sock_filter *fp; int *addrs = NULL; u8 bpf_src; BUILD_BUG_ON(BPF_MEMWORDS * sizeof(u32) > MA...
222,095,009,470,104,620,000,000,000,000,000,000,000
filter.c
87,774,074,568,579,580,000,000,000,000,000,000,000
[ "CWE-120" ]
CVE-2018-25020
The BPF subsystem in the Linux kernel before 4.17 mishandles situations with a long jump over an instruction sequence where inner instructions require substantial expansions into multiple BPF instructions, leading to an overflow. This affects kernel/bpf/core.c and net/core/filter.c.
https://nvd.nist.gov/vuln/detail/CVE-2018-25020
200,641
php-src
330f1716df49c0d3474c18b6dcd370a9dcf57422
https://github.com/php/php-src
http://git.php.net/?p=php-src.git;a=commit;h=330f1716df49c0d3474c18b6dcd370a9dcf57422
Fixed bug #77831 - Heap-buffer-overflow in exif_iif_add_value in EXIF
1
static void exif_iif_add_value(image_info_type *image_info, int section_index, char *name, int tag, int format, int length, void* value, int motorola_intel) { size_t idex; void *vptr; image_info_value *info_value; image_info_data *info_data; image_info_data *list; if (length < 0) { return; } list = safe_e...
172,746,989,155,196,970,000,000,000,000,000,000,000
exif.c
253,954,302,449,788,160,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-11035
When processing certain files, PHP EXIF extension in versions 7.1.x below 7.1.28, 7.2.x below 7.2.17 and 7.3.x below 7.3.4 can be caused to read past allocated buffer in exif_iif_add_value function. This may lead to information disclosure or crash.
https://nvd.nist.gov/vuln/detail/CVE-2019-11035
307,189
php-src
330f1716df49c0d3474c18b6dcd370a9dcf57422
https://github.com/php/php-src
http://git.php.net/?p=php-src.git;a=commit;h=330f1716df49c0d3474c18b6dcd370a9dcf57422
Fixed bug #77831 - Heap-buffer-overflow in exif_iif_add_value in EXIF
0
static void exif_iif_add_value(image_info_type *image_info, int section_index, char *name, int tag, int format, int length, void* value, size_t value_len, int motorola_intel) { size_t idex; void *vptr, *vptr_end; image_info_value *info_value; image_info_data *info_data; image_info_data *list; if (length < 0) {...
276,555,751,330,914,300,000,000,000,000,000,000,000
exif.c
167,654,970,243,950,450,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-11035
When processing certain files, PHP EXIF extension in versions 7.1.x below 7.1.28, 7.2.x below 7.2.17 and 7.3.x below 7.3.4 can be caused to read past allocated buffer in exif_iif_add_value function. This may lead to information disclosure or crash.
https://nvd.nist.gov/vuln/detail/CVE-2019-11035
200,653
linux
c6688ef9f29762e65bce325ef4acd6c675806366
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c6688ef9f29762e65bce325ef4acd6c675806366
usbip: fix stub_rx: harden CMD_SUBMIT path to handle malicious input Harden CMD_SUBMIT path to handle malicious input that could trigger large memory allocations. Add checks to validate transfer_buffer_length and number_of_packets to protect against bad input requesting for unbounded memory allocations. Validate early...
1
static void stub_recv_cmd_submit(struct stub_device *sdev, struct usbip_header *pdu) { int ret; struct stub_priv *priv; struct usbip_device *ud = &sdev->ud; struct usb_device *udev = sdev->udev; int pipe = get_pipe(sdev, pdu->base.ep, pdu->base.direction); if (pipe == -1) return; priv = stub_priv_alloc(...
26,313,967,580,838,830,000,000,000,000,000,000,000
stub_rx.c
14,624,339,429,164,412,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2017-16913
The "stub_recv_cmd_submit()" function (drivers/usb/usbip/stub_rx.c) in the Linux Kernel before version 4.14.8, 4.9.71, and 4.4.114 when handling CMD_SUBMIT packets allows attackers to cause a denial of service (arbitrary memory allocation) via a specially crafted USB over IP packet.
https://nvd.nist.gov/vuln/detail/CVE-2017-16913
307,318
linux
c6688ef9f29762e65bce325ef4acd6c675806366
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c6688ef9f29762e65bce325ef4acd6c675806366
usbip: fix stub_rx: harden CMD_SUBMIT path to handle malicious input Harden CMD_SUBMIT path to handle malicious input that could trigger large memory allocations. Add checks to validate transfer_buffer_length and number_of_packets to protect against bad input requesting for unbounded memory allocations. Validate early...
0
static void stub_recv_cmd_submit(struct stub_device *sdev, struct usbip_header *pdu) { int ret; struct stub_priv *priv; struct usbip_device *ud = &sdev->ud; struct usb_device *udev = sdev->udev; int pipe = get_pipe(sdev, pdu); if (pipe == -1) return; priv = stub_priv_alloc(sdev, pdu); if (!priv) retu...
264,094,243,959,702,600,000,000,000,000,000,000,000
stub_rx.c
287,813,356,241,454,560,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2017-16913
The "stub_recv_cmd_submit()" function (drivers/usb/usbip/stub_rx.c) in the Linux Kernel before version 4.14.8, 4.9.71, and 4.4.114 when handling CMD_SUBMIT packets allows attackers to cause a denial of service (arbitrary memory allocation) via a specially crafted USB over IP packet.
https://nvd.nist.gov/vuln/detail/CVE-2017-16913
200,657
qemu
940973ae0b45c9b6817bab8e4cf4df99a9ef83d7
https://github.com/bonzini/qemu
http://git.qemu.org/?p=qemu.git;a=commit;h=940973ae0b45c9b6817bab8e4cf4df99a9ef83d7
ide: Correct improper smart self test counter reset in ide core. The SMART self test counter was incorrectly being reset to zero, not 1. This had the effect that on every 21st SMART EXECUTE OFFLINE: * We would write off the beginning of a dynamically allocated buffer * We forgot the SMART history Fix this. Signed-o...
1
static bool cmd_smart(IDEState *s, uint8_t cmd) { int n; if (s->hcyl != 0xc2 || s->lcyl != 0x4f) { goto abort_cmd; } if (!s->smart_enabled && s->feature != SMART_ENABLE) { goto abort_cmd; } switch (s->feature) { case SMART_DISABLE: s->smart_enabled = 0; ret...
317,507,375,239,169,250,000,000,000,000,000,000,000
core.c
238,980,910,314,922,300,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2014-2894
Off-by-one error in the cmd_smart function in the smart self test in hw/ide/core.c in QEMU before 2.0 allows local users to have unspecified impact via a SMART EXECUTE OFFLINE command that triggers a buffer underflow and memory corruption.
https://nvd.nist.gov/vuln/detail/CVE-2014-2894
187,226
qemu
3251bdcf1c67427d964517053c3d185b46e618e8
https://github.com/bonzini/qemu
http://git.qemu.org/?p=qemu.git;a=commitdiff;h=3251bdcf1c67427d964517053c3d185b46e618e8
ide: Correct handling of malformed/short PRDTs This impacts both BMDMA and AHCI HBA interfaces for IDE. Currently, we confuse the difference between a PRDT having "0 bytes" and a PRDT having "0 complete sectors." When we receive an incomplete sector, inconsistent error checking leads to an infinite loop wherein the c...
0
static bool cmd_smart(IDEState *s, uint8_t cmd) { int n; if (s->hcyl != 0xc2 || s->lcyl != 0x4f) { goto abort_cmd; } if (!s->smart_enabled && s->feature != SMART_ENABLE) { goto abort_cmd; } switch (s->feature) { case SMART_DISABLE: s->smart_enabled = 0; ret...
16,020,944,557,851,401,000,000,000,000,000,000,000
core.c
326,290,854,927,273,170,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2014-9718
The (1) BMDMA and (2) AHCI HBA interfaces in the IDE functionality in QEMU 1.0 through 2.1.3 have multiple interpretations of a function's return value, which allows guest OS users to cause a host OS denial of service (memory consumption or infinite loop, and system crash) via a PRDT with zero complete sectors, related...
https://nvd.nist.gov/vuln/detail/CVE-2014-9718
200,658
freeradius-server
3ea2a5a026e73d81cd9a3e9bbd4300c433004bfa
https://github.com/alandekok/freeradius-server
https://github.com/FreeRADIUS/freeradius-server/commit/3ea2a5a026e73d81cd9a3e9bbd4300c433004bfa
EAP-pwd: fix side-channel leak where 1 in 2018 handshakes fail Previously the Hunting and Pecking algorithm of EAP-pwd aborted when more than 10 iterations are needed. Every iteration has a 50% chance of finding the password element. This means one in every 2048 handshakes will fail, in which case an error frame is se...
1
int compute_password_element (pwd_session_t *session, uint16_t grp_num, char const *password, int password_len, char const *id_server, int id_server_len, char const *id_peer, int id_peer_len, uint32_t *token) { BIGNUM *x_candidate = NULL, *rnd = NULL, *cofactor = NULL; HMAC_CTX *ct...
235,662,784,488,864,240,000,000,000,000,000,000,000
eap_pwd.c
215,994,526,581,755,800,000,000,000,000,000,000,000
[ "CWE-284" ]
CVE-2019-13456
In FreeRADIUS 3.0 through 3.0.19, on average 1 in every 2048 EAP-pwd handshakes fails because the password element cannot be found within 10 iterations of the hunting and pecking loop. This leaks information that an attacker can use to recover the password of any user. This information leakage is similar to the "Dragon...
https://nvd.nist.gov/vuln/detail/CVE-2019-13456
307,563
freeradius-server
3ea2a5a026e73d81cd9a3e9bbd4300c433004bfa
https://github.com/alandekok/freeradius-server
https://github.com/FreeRADIUS/freeradius-server/commit/3ea2a5a026e73d81cd9a3e9bbd4300c433004bfa
EAP-pwd: fix side-channel leak where 1 in 2018 handshakes fail Previously the Hunting and Pecking algorithm of EAP-pwd aborted when more than 10 iterations are needed. Every iteration has a 50% chance of finding the password element. This means one in every 2048 handshakes will fail, in which case an error frame is se...
0
int compute_password_element (pwd_session_t *session, uint16_t grp_num, char const *password, int password_len, char const *id_server, int id_server_len, char const *id_peer, int id_peer_len, uint32_t *token) { BIGNUM *x_candidate = NULL, *rnd = NULL, *cofactor = NULL; HMAC_CTX *ct...
186,598,040,797,616,970,000,000,000,000,000,000,000
eap_pwd.c
82,884,293,596,424,980,000,000,000,000,000,000,000
[ "CWE-284" ]
CVE-2019-13456
In FreeRADIUS 3.0 through 3.0.19, on average 1 in every 2048 EAP-pwd handshakes fails because the password element cannot be found within 10 iterations of the hunting and pecking loop. This leaks information that an attacker can use to recover the password of any user. This information leakage is similar to the "Dragon...
https://nvd.nist.gov/vuln/detail/CVE-2019-13456
200,671
ImageMagick
98a2cceae0dceccbfe54051167c2c80be1f13c3f
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/98a2cceae0dceccbfe54051167c2c80be1f13c3f
https://github.com/ImageMagick/ImageMagick/issues/1192
1
static MagickBooleanType WriteMPCImage(const ImageInfo *image_info,Image *image, ExceptionInfo *exception) { char buffer[MagickPathExtent], cache_filename[MagickPathExtent]; const char *property, *value; MagickBooleanType status; MagickOffsetType offset, scene; register ssize...
305,801,557,166,372,200,000,000,000,000,000,000,000
mpc.c
63,857,671,062,948,640,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2018-14434
ImageMagick 7.0.8-4 has a memory leak for a colormap in WriteMPCImage in coders/mpc.c.
https://nvd.nist.gov/vuln/detail/CVE-2018-14434
307,679
ImageMagick
98a2cceae0dceccbfe54051167c2c80be1f13c3f
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/98a2cceae0dceccbfe54051167c2c80be1f13c3f
https://github.com/ImageMagick/ImageMagick/issues/1192
0
static MagickBooleanType WriteMPCImage(const ImageInfo *image_info,Image *image, ExceptionInfo *exception) { char buffer[MagickPathExtent], cache_filename[MagickPathExtent]; const char *property, *value; MagickBooleanType status; MagickOffsetType offset, scene; register ssize...
123,712,236,307,250,680,000,000,000,000,000,000,000
mpc.c
92,901,861,736,205,260,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2018-14434
ImageMagick 7.0.8-4 has a memory leak for a colormap in WriteMPCImage in coders/mpc.c.
https://nvd.nist.gov/vuln/detail/CVE-2018-14434
200,673
linux
8039d87d9e473aeb740d4fdbd59b9d2f89b2ced9
https://github.com/torvalds/linux
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8039d87d9e473aeb740d4fdbd59b9d2f89b2ced9
Btrfs: fix file corruption and data loss after cloning inline extents Currently the clone ioctl allows to clone an inline extent from one file to another that already has other (non-inlined) extents. This is a problem because btrfs is not designed to deal with files having inline and regular extents, if a file has an ...
1
static int btrfs_clone(struct inode *src, struct inode *inode, const u64 off, const u64 olen, const u64 olen_aligned, const u64 destoff, int no_time_update) { struct btrfs_root *root = BTRFS_I(inode)->root; struct btrfs_path *path = NULL; struct extent_buffer *leaf; struct btrfs_trans_handle *tran...
277,549,481,996,229,600,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2015-8374
fs/btrfs/inode.c in the Linux kernel before 4.3.3 mishandles compressed inline extents, which allows local users to obtain sensitive pre-truncation information from a file via a clone action.
https://nvd.nist.gov/vuln/detail/CVE-2015-8374
307,692
linux
8039d87d9e473aeb740d4fdbd59b9d2f89b2ced9
https://github.com/torvalds/linux
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8039d87d9e473aeb740d4fdbd59b9d2f89b2ced9
Btrfs: fix file corruption and data loss after cloning inline extents Currently the clone ioctl allows to clone an inline extent from one file to another that already has other (non-inlined) extents. This is a problem because btrfs is not designed to deal with files having inline and regular extents, if a file has an ...
0
static int btrfs_clone(struct inode *src, struct inode *inode, const u64 off, const u64 olen, const u64 olen_aligned, const u64 destoff, int no_time_update) { struct btrfs_root *root = BTRFS_I(inode)->root; struct btrfs_path *path = NULL; struct extent_buffer *leaf; struct btrfs_trans_handle *tran...
74,452,362,293,949,550,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2015-8374
fs/btrfs/inode.c in the Linux kernel before 4.3.3 mishandles compressed inline extents, which allows local users to obtain sensitive pre-truncation information from a file via a clone action.
https://nvd.nist.gov/vuln/detail/CVE-2015-8374
200,679
libidn2
3284eb342cd0ed1a18786e3fcdf0cdd7e76676bd
https://github.com/libidn/libidn2
http://git.savannah.gnu.org/cgit/libidn/libidn2.git/commit/?h=libidn2-2.0.4&id=3284eb342cd0ed1a18786e3fcdf0cdd7e76676bd
lib/puny_decode: Fix integer overflow (found by fuzzing)
1
static punycode_uint decode_digit(punycode_uint cp) { return cp - 48 < 10 ? cp - 22 : cp - 65 < 26 ? cp - 65 : cp - 97 < 26 ? cp - 97 : base; }
150,041,454,101,909,630,000,000,000,000,000,000,000
puny_decode.c
53,725,914,218,420,610,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2017-14062
Integer overflow in the decode_digit function in puny_decode.c in Libidn2 before 2.0.4 allows remote attackers to cause a denial of service or possibly have unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2017-14062
307,829
libidn2
3284eb342cd0ed1a18786e3fcdf0cdd7e76676bd
https://github.com/libidn/libidn2
http://git.savannah.gnu.org/cgit/libidn/libidn2.git/commit/?h=libidn2-2.0.4&id=3284eb342cd0ed1a18786e3fcdf0cdd7e76676bd
lib/puny_decode: Fix integer overflow (found by fuzzing)
0
static unsigned decode_digit(int cp) { return (unsigned) (cp - 48 < 10 ? cp - 22 : cp - 65 < 26 ? cp - 65 : cp - 97 < 26 ? cp - 97 : base); }
63,287,449,681,523,280,000,000,000,000,000,000,000
puny_decode.c
205,027,283,457,970,700,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2017-14062
Integer overflow in the decode_digit function in puny_decode.c in Libidn2 before 2.0.4 allows remote attackers to cause a denial of service or possibly have unspecified other impact.
https://nvd.nist.gov/vuln/detail/CVE-2017-14062
200,681
qemu
c165f7758009a4f793c1fc19ebb69cf55313450b
https://github.com/bonzini/qemu
http://git.qemu.org/?p=qemu.git;a=commit;h=c165f7758009a4f793c1fc19ebb69cf55313450b
dmg: sanitize chunk length and sectorcount (CVE-2014-0145) Chunk length and sectorcount are used for decompression buffers as well as the bdrv_pread() count argument. Ensure that they have reasonable values so neither memory allocation nor conversion from uint64_t to int will cause problems. Signed-off-by: Stefan Ha...
1
static int dmg_open(BlockDriverState *bs, QDict *options, int flags, Error **errp) { BDRVDMGState *s = bs->opaque; uint64_t info_begin, info_end, last_in_offset, last_out_offset; uint32_t count, tmp; uint32_t max_compressed_size = 1, max_sectors_per_chunk = 1, i; int64_t offset; ...
258,911,778,338,911,570,000,000,000,000,000,000,000
dmg.c
6,786,379,141,571,461,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2014-0145
Multiple buffer overflows in QEMU before 1.7.2 and 2.x before 2.0.0, allow local users to cause a denial of service (crash) or possibly execute arbitrary code via a large (1) L1 table in the qcow2_snapshot_load_tmp in the QCOW 2 block driver (block/qcow2-snapshot.c) or (2) uncompressed chunk, (3) chunk length, or (4) n...
https://nvd.nist.gov/vuln/detail/CVE-2014-0145
307,878
qemu
c165f7758009a4f793c1fc19ebb69cf55313450b
https://github.com/bonzini/qemu
http://git.qemu.org/?p=qemu.git;a=commit;h=c165f7758009a4f793c1fc19ebb69cf55313450b
dmg: sanitize chunk length and sectorcount (CVE-2014-0145) Chunk length and sectorcount are used for decompression buffers as well as the bdrv_pread() count argument. Ensure that they have reasonable values so neither memory allocation nor conversion from uint64_t to int will cause problems. Signed-off-by: Stefan Ha...
0
static int dmg_open(BlockDriverState *bs, QDict *options, int flags, Error **errp) { BDRVDMGState *s = bs->opaque; uint64_t info_begin, info_end, last_in_offset, last_out_offset; uint32_t count, tmp; uint32_t max_compressed_size = 1, max_sectors_per_chunk = 1, i; int64_t offset; ...
157,218,551,350,323,710,000,000,000,000,000,000,000
dmg.c
38,379,598,711,020,183,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2014-0145
Multiple buffer overflows in QEMU before 1.7.2 and 2.x before 2.0.0, allow local users to cause a denial of service (crash) or possibly execute arbitrary code via a large (1) L1 table in the qcow2_snapshot_load_tmp in the QCOW 2 block driver (block/qcow2-snapshot.c) or (2) uncompressed chunk, (3) chunk length, or (4) n...
https://nvd.nist.gov/vuln/detail/CVE-2014-0145
200,682
php-src
d144590d38fa321b46b8e199c754006318985c84
https://github.com/php/php-src
http://git.php.net/?p=php-src.git;a=commitdiff;h=d144590d38fa321b46b8e199c754006318985c84
Fix bug #72321 - use efree() for emalloc allocation
1
static int phar_extract_file(zend_bool overwrite, phar_entry_info *entry, char *dest, int dest_len, char **error TSRMLS_DC) /* {{{ */ { php_stream_statbuf ssb; int len; php_stream *fp; char *fullpath; const char *slash; mode_t mode; cwd_state new_state; char *filename; size_t filename_len; if (entry->is_moun...
284,510,265,225,595,480,000,000,000,000,000,000,000
phar_object.c
118,148,046,968,973,700,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2016-4473
/ext/phar/phar_object.c in PHP 7.0.7 and 5.6.x allows remote attackers to execute arbitrary code. NOTE: Introduced as part of an incomplete fix to CVE-2015-6833.
https://nvd.nist.gov/vuln/detail/CVE-2016-4473
307,956
php-src
d144590d38fa321b46b8e199c754006318985c84
https://github.com/php/php-src
http://git.php.net/?p=php-src.git;a=commitdiff;h=d144590d38fa321b46b8e199c754006318985c84
Fix bug #72321 - use efree() for emalloc allocation
0
static int phar_extract_file(zend_bool overwrite, phar_entry_info *entry, char *dest, int dest_len, char **error TSRMLS_DC) /* {{{ */ { php_stream_statbuf ssb; int len; php_stream *fp; char *fullpath; const char *slash; mode_t mode; cwd_state new_state; char *filename; size_t filename_len; if (entry->is_moun...
91,569,658,015,074,430,000,000,000,000,000,000,000
phar_object.c
8,455,331,882,827,020,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2016-4473
/ext/phar/phar_object.c in PHP 7.0.7 and 5.6.x allows remote attackers to execute arbitrary code. NOTE: Introduced as part of an incomplete fix to CVE-2015-6833.
https://nvd.nist.gov/vuln/detail/CVE-2016-4473
200,683
mesos
2c282f19755ea7518caf6f43e729524b1c6bdb23
https://github.com/apache/mesos
https://github.com/apache/mesos/commit/2c282f19755ea7518caf6f43e729524b1c6bdb23
Added constant time comparison of JWT signatures. A vulnerability in our JWT implementation allows an unauthenticated remote attacker to execute to execute timing attacks [1]. This patch removes the vulnerability by adding a constant time comparison of hashes, where the whole message is visited during the comparison ...
1
Try<JWT, JWTError> JWT::parse(const string& token, const string& secret) { const vector<string> components = strings::split(token, "."); if (components.size() != 3) { return JWTError( "Expected 3 components in token, got " + stringify(components.size()), JWTError::Type::INVALID_TOKEN); } T...
100,257,360,484,393,140,000,000,000,000,000,000,000
jwt.cpp
1,073,281,799,049,030,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2018-8023
Apache Mesos can be configured to require authentication to call the Executor HTTP API using JSON Web Token (JWT). In Apache Mesos versions pre-1.4.2, 1.5.0, 1.5.1, 1.6.0 the comparison of the generated HMAC value against the provided signature in the JWT implementation used is vulnerable to a timing attack because ins...
https://nvd.nist.gov/vuln/detail/CVE-2018-8023
307,988
mesos
2c282f19755ea7518caf6f43e729524b1c6bdb23
https://github.com/apache/mesos
https://github.com/apache/mesos/commit/2c282f19755ea7518caf6f43e729524b1c6bdb23
Added constant time comparison of JWT signatures. A vulnerability in our JWT implementation allows an unauthenticated remote attacker to execute to execute timing attacks [1]. This patch removes the vulnerability by adding a constant time comparison of hashes, where the whole message is visited during the comparison ...
0
Try<JWT, JWTError> JWT::parse(const string& token, const string& secret) { const vector<string> components = strings::split(token, "."); if (components.size() != 3) { return JWTError( "Expected 3 components in token, got " + stringify(components.size()), JWTError::Type::INVALID_TOKEN); } T...
20,014,084,358,490,062,000,000,000,000,000,000,000
jwt.cpp
336,751,365,211,682,400,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2018-8023
Apache Mesos can be configured to require authentication to call the Executor HTTP API using JSON Web Token (JWT). In Apache Mesos versions pre-1.4.2, 1.5.0, 1.5.1, 1.6.0 the comparison of the generated HMAC value against the provided signature in the JWT implementation used is vulnerable to a timing attack because ins...
https://nvd.nist.gov/vuln/detail/CVE-2018-8023
200,696
libxslt
8b90c9a699e0eaa98bbeec63a473ddc73aaa238c
http://git.gnome.org/browse/libxslt
https://git.gnome.org/browse/libxslt/commit/?id=8b90c9a699e0eaa98bbeec63a473ddc73aaa238c
Fix saxon:line-number with namespace nodes exsltSaxonLineNumberFunction must make sure not to pass namespace "nodes" to xmlGetLineNo. Otherwise, an OOB heap read results which typically leads to a segfault. Found with afl-fuzz and ASan.
1
exsltSaxonLineNumberFunction(xmlXPathParserContextPtr ctxt, int nargs) { xmlNodePtr cur = NULL; if (nargs == 0) { cur = ctxt->context->node; } else if (nargs == 1) { xmlXPathObjectPtr obj; xmlNodeSetPtr nodelist; int i; if ((ctxt->value == NULL) || (ctxt->value->type != XPATH_NODESET)) { xsltTra...
278,266,607,377,269,530,000,000,000,000,000,000,000
saxon.c
154,409,196,950,753,940,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-4609
libxslt in Apple iOS before 9.3.3, OS X before 10.11.6, iTunes before 12.4.2 on Windows, iCloud before 5.2.1 on Windows, tvOS before 9.2.2, and watchOS before 2.2.2 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors, a different vulnera...
https://nvd.nist.gov/vuln/detail/CVE-2016-4609
308,213
libxslt
8b90c9a699e0eaa98bbeec63a473ddc73aaa238c
http://git.gnome.org/browse/libxslt
https://git.gnome.org/browse/libxslt/commit/?id=8b90c9a699e0eaa98bbeec63a473ddc73aaa238c
Fix saxon:line-number with namespace nodes exsltSaxonLineNumberFunction must make sure not to pass namespace "nodes" to xmlGetLineNo. Otherwise, an OOB heap read results which typically leads to a segfault. Found with afl-fuzz and ASan.
0
exsltSaxonLineNumberFunction(xmlXPathParserContextPtr ctxt, int nargs) { xmlNodePtr cur = NULL; xmlXPathObjectPtr obj = NULL; long lineNo = -1; if (nargs == 0) { cur = ctxt->context->node; } else if (nargs == 1) { xmlNodeSetPtr nodelist; int i; if ((ctxt->value == NULL) || (ctxt->value->type !...
115,391,023,361,542,160,000,000,000,000,000,000,000
saxon.c
81,985,819,170,915,530,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-4609
libxslt in Apple iOS before 9.3.3, OS X before 10.11.6, iTunes before 12.4.2 on Windows, iCloud before 5.2.1 on Windows, tvOS before 9.2.2, and watchOS before 2.2.2 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors, a different vulnera...
https://nvd.nist.gov/vuln/detail/CVE-2016-4609
200,712
php-src
2721a0148649e07ed74468f097a28899741eb58f
https://github.com/php/php-src
http://github.com/php/php-src/commit/2721a0148649e07ed74468f097a28899741eb58f?w=1
Fixed bug #70755: fpm_log.c memory leak and buffer overflow
1
int fpm_log_write(char *log_format) /* {{{ */ { char *s, *b; char buffer[FPM_LOG_BUFFER+1]; int token, test; size_t len, len2; struct fpm_scoreboard_proc_s proc, *proc_p; struct fpm_scoreboard_s *scoreboard; char tmp[129]; char format[129]; time_t now_epoch; #ifdef HAVE_TIMES clock_t tms_total; #endif if (!...
141,523,331,713,955,660,000,000,000,000,000,000,000
fpm_log.c
194,222,751,043,797,670,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-5114
sapi/fpm/fpm/fpm_log.c in PHP before 5.5.31, 5.6.x before 5.6.17, and 7.x before 7.0.2 misinterprets the semantics of the snprintf return value, which allows attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read and buffer overflow) via a long string, as demonstr...
https://nvd.nist.gov/vuln/detail/CVE-2016-5114
308,353
php-src
2721a0148649e07ed74468f097a28899741eb58f
https://github.com/php/php-src
http://github.com/php/php-src/commit/2721a0148649e07ed74468f097a28899741eb58f?w=1
Fixed bug #70755: fpm_log.c memory leak and buffer overflow
0
int fpm_log_write(char *log_format) /* {{{ */ { char *s, *b; char buffer[FPM_LOG_BUFFER+1]; int token, test; size_t len, len2; struct fpm_scoreboard_proc_s proc, *proc_p; struct fpm_scoreboard_s *scoreboard; char tmp[129]; char format[129]; time_t now_epoch; #ifdef HAVE_TIMES clock_t tms_total; #endif if (!...
4,215,623,157,966,535,000,000,000,000,000,000,000
fpm_log.c
95,224,238,032,874,440,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-5114
sapi/fpm/fpm/fpm_log.c in PHP before 5.5.31, 5.6.x before 5.6.17, and 7.x before 7.0.2 misinterprets the semantics of the snprintf return value, which allows attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read and buffer overflow) via a long string, as demonstr...
https://nvd.nist.gov/vuln/detail/CVE-2016-5114
200,716
vim
06f15416bb8d5636200a10776f1752c4d6e49f31
https://github.com/vim/vim
https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31
patch 8.2.4247: stack corruption when looking for spell suggestions Problem: Stack corruption when looking for spell suggestions. Solution: Prevent the depth increased too much. Add a five second time limit to finding suggestions.
1
suggest_trie_walk( suginfo_T *su, langp_T *lp, char_u *fword, int soundfold) { char_u tword[MAXWLEN]; // good word collected so far trystate_T stack[MAXWLEN]; char_u preword[MAXWLEN * 3]; // word found with proper case; // concatenation of prefix compound // words an...
299,691,384,951,085,050,000,000,000,000,000,000,000
spellsuggest.c
62,160,617,719,244,070,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2022-0408
Stack-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.
https://nvd.nist.gov/vuln/detail/CVE-2022-0408
308,578
vim
06f15416bb8d5636200a10776f1752c4d6e49f31
https://github.com/vim/vim
https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31
patch 8.2.4247: stack corruption when looking for spell suggestions Problem: Stack corruption when looking for spell suggestions. Solution: Prevent the depth increased too much. Add a five second time limit to finding suggestions.
0
suggest_trie_walk( suginfo_T *su, langp_T *lp, char_u *fword, int soundfold) { char_u tword[MAXWLEN]; // good word collected so far trystate_T stack[MAXWLEN]; char_u preword[MAXWLEN * 3]; // word found with proper case; // concatenation of prefix compound // words an...
184,174,209,159,150,670,000,000,000,000,000,000,000
spellsuggest.c
284,064,000,006,918,260,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2022-0408
Stack-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.
https://nvd.nist.gov/vuln/detail/CVE-2022-0408
200,725
file-roller
57268e51e59b61c9e3125eb0f65551c7084297e2
https://git.gnome.org/browse/file-roller
https://gitlab.gnome.org/GNOME/file-roller/commit/57268e51e59b61c9e3125eb0f65551c7084297e2
Path traversal vulnerability Do not extract files with relative paths. [bug #794337]
1
sanitize_filename (const char *file_name) { size_t prefix_len; char const *p; if (file_name == NULL) return NULL; prefix_len = 0; for (p = file_name; *p; ) { if (ISDOT (p[0]) && ISDOT (p[1]) && (ISSLASH (p[2]) || !p[2])) prefix_len = p + 2 - file_name; do { char c = *p++; if (ISSLASH (c)) ...
243,419,980,189,133,600,000,000,000,000,000,000,000
glib-utils.c
67,367,338,727,767,010,000,000,000,000,000,000,000
[ "CWE-22" ]
CVE-2019-16680
An issue was discovered in GNOME file-roller before 3.29.91. It allows a single ./../ path traversal via a filename contained in a TAR archive, possibly overwriting a file during extraction.
https://nvd.nist.gov/vuln/detail/CVE-2019-16680
309,002
file-roller
57268e51e59b61c9e3125eb0f65551c7084297e2
https://git.gnome.org/browse/file-roller
https://gitlab.gnome.org/GNOME/file-roller/commit/57268e51e59b61c9e3125eb0f65551c7084297e2
Path traversal vulnerability Do not extract files with relative paths. [bug #794337]
0
sanitize_filename (const char *file_name) { size_t prefix_len; char const *p; if (file_name == NULL) return NULL; prefix_len = 0; for (p = file_name; *p; ) { if (ISDOT (p[0]) && ISDOT (p[1]) && (ISSLASH (p[2]) || !p[2])) return NULL; do { char c = *p++; if (ISSLASH (c)) break; } whil...
150,564,407,549,851,770,000,000,000,000,000,000,000
glib-utils.c
272,935,717,366,759,200,000,000,000,000,000,000,000
[ "CWE-22" ]
CVE-2019-16680
An issue was discovered in GNOME file-roller before 3.29.91. It allows a single ./../ path traversal via a filename contained in a TAR archive, possibly overwriting a file during extraction.
https://nvd.nist.gov/vuln/detail/CVE-2019-16680
200,727
ark
8bf8c5ef07b0ac5e914d752681e470dea403a5bd
https://github.com/KDE/ark
https://github.com/KDE/ark/commit/8bf8c5ef07b0ac5e914d752681e470dea403a5bd
Pass the ARCHIVE_EXTRACT_SECURE_SYMLINKS flag to libarchive There are archive types which allow to first create a symlink and then later on dereference it. If the symlink points outside of the archive, this results in writing outside of the destination directory. With the ARCHIVE_EXTRACT_SECURE_SYMLINKS option set, l...
1
int LibarchivePlugin::extractionFlags() const { int result = ARCHIVE_EXTRACT_TIME; result |= ARCHIVE_EXTRACT_SECURE_NODOTDOT; // TODO: Don't use arksettings here /*if ( ArkSettings::preservePerms() ) { result &= ARCHIVE_EXTRACT_PERM; } if ( !ArkSettings::extractOverwrite() ) { ...
227,182,265,551,961,000,000,000,000,000,000,000,000
libarchiveplugin.cpp
16,589,588,714,422,323,000,000,000,000,000,000,000
[ "CWE-61" ]
CVE-2020-24654
In KDE Ark before 20.08.1, a crafted TAR archive with symlinks can install files outside the extraction directory, as demonstrated by a write operation to a user's home directory.
https://nvd.nist.gov/vuln/detail/CVE-2020-24654
309,109
ark
8bf8c5ef07b0ac5e914d752681e470dea403a5bd
https://github.com/KDE/ark
https://github.com/KDE/ark/commit/8bf8c5ef07b0ac5e914d752681e470dea403a5bd
Pass the ARCHIVE_EXTRACT_SECURE_SYMLINKS flag to libarchive There are archive types which allow to first create a symlink and then later on dereference it. If the symlink points outside of the archive, this results in writing outside of the destination directory. With the ARCHIVE_EXTRACT_SECURE_SYMLINKS option set, l...
0
int LibarchivePlugin::extractionFlags() const { return ARCHIVE_EXTRACT_TIME | ARCHIVE_EXTRACT_SECURE_NODOTDOT | ARCHIVE_EXTRACT_SECURE_SYMLINKS; }
90,065,560,457,366,010,000,000,000,000,000,000,000
libarchiveplugin.cpp
142,504,631,679,147,150,000,000,000,000,000,000,000
[ "CWE-61" ]
CVE-2020-24654
In KDE Ark before 20.08.1, a crafted TAR archive with symlinks can install files outside the extraction directory, as demonstrated by a write operation to a user's home directory.
https://nvd.nist.gov/vuln/detail/CVE-2020-24654
200,728
php-src
28a6ed9f9a36b9c517e4a8a429baf4dd382fc5d5
https://github.com/php/php-src
http://github.com/php/php-src/commit/28a6ed9f9a36b9c517e4a8a429baf4dd382fc5d5?w=1
Fix bug #71735: Double-free in SplDoublyLinkedList::offsetSet
1
SPL_METHOD(SplDoublyLinkedList, offsetSet) { zval *zindex, *value; spl_dllist_object *intern; if (zend_parse_parameters(ZEND_NUM_ARGS(), "zz", &zindex, &value) == FAILURE) { return; } intern = Z_SPLDLLIST_P(getThis()); if (Z_TYPE_P(zindex) == IS_NULL) { /* $obj[] = ... */ spl_ptr_lli...
87,001,137,626,382,980,000,000,000,000,000,000,000
spl_dllist.c
108,921,632,915,058,800,000,000,000,000,000,000,000
[ "CWE-415" ]
CVE-2016-3132
Double free vulnerability in the SplDoublyLinkedList::offsetSet function in ext/spl/spl_dllist.c in PHP 7.x before 7.0.6 allows remote attackers to execute arbitrary code via a crafted index.
https://nvd.nist.gov/vuln/detail/CVE-2016-3132
309,155
php-src
28a6ed9f9a36b9c517e4a8a429baf4dd382fc5d5
https://github.com/php/php-src
http://github.com/php/php-src/commit/28a6ed9f9a36b9c517e4a8a429baf4dd382fc5d5?w=1
Fix bug #71735: Double-free in SplDoublyLinkedList::offsetSet
0
SPL_METHOD(SplDoublyLinkedList, offsetSet) { zval *zindex, *value; spl_dllist_object *intern; if (zend_parse_parameters(ZEND_NUM_ARGS(), "zz", &zindex, &value) == FAILURE) { return; } intern = Z_SPLDLLIST_P(getThis()); if (Z_TYPE_P(zindex) == IS_NULL) { /* $obj[] = ... */ spl_ptr_lli...
194,720,548,825,374,980,000,000,000,000,000,000,000
spl_dllist.c
168,087,476,867,475,340,000,000,000,000,000,000,000
[ "CWE-415" ]
CVE-2016-3132
Double free vulnerability in the SplDoublyLinkedList::offsetSet function in ext/spl/spl_dllist.c in PHP 7.x before 7.0.6 allows remote attackers to execute arbitrary code via a crafted index.
https://nvd.nist.gov/vuln/detail/CVE-2016-3132
200,746
qemu
fbc6510e3379fa8f8370bf71198f0ce733bf07f9
https://github.com/bonzini/qemu
https://git.qemu.org/?p=qemu.git;a=commit;h=fbc6510e3379fa8f8370bf71198f0ce733bf07f9
esp: don't overflow cmdfifo in get_cmd() If the guest tries to read a CDB using DMA and cmdfifo is not empty then it is possible to overflow cmdfifo. Since this can only occur by issuing deliberately incorrect instruction sequences, ensure that the maximum length of the CDB transferred to cmdfifo is limited to the av...
1
static uint32_t get_cmd(ESPState *s, uint32_t maxlen) { uint8_t buf[ESP_CMDFIFO_SZ]; uint32_t dmalen, n; int target; target = s->wregs[ESP_WBUSID] & BUSID_DID; if (s->dma) { dmalen = MIN(esp_get_tc(s), maxlen); if (dmalen == 0) { return 0; } if (s->dma_me...
170,485,928,065,488,420,000,000,000,000,000,000,000
esp.c
74,525,397,774,186,170,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2020-35504
A NULL pointer dereference flaw was found in the SCSI emulation support of QEMU in versions before 6.0.0. This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.
https://nvd.nist.gov/vuln/detail/CVE-2020-35504
309,469
qemu
fbc6510e3379fa8f8370bf71198f0ce733bf07f9
https://github.com/bonzini/qemu
https://git.qemu.org/?p=qemu.git;a=commit;h=fbc6510e3379fa8f8370bf71198f0ce733bf07f9
esp: don't overflow cmdfifo in get_cmd() If the guest tries to read a CDB using DMA and cmdfifo is not empty then it is possible to overflow cmdfifo. Since this can only occur by issuing deliberately incorrect instruction sequences, ensure that the maximum length of the CDB transferred to cmdfifo is limited to the av...
0
static uint32_t get_cmd(ESPState *s, uint32_t maxlen) { uint8_t buf[ESP_CMDFIFO_SZ]; uint32_t dmalen, n; int target; target = s->wregs[ESP_WBUSID] & BUSID_DID; if (s->dma) { dmalen = MIN(esp_get_tc(s), maxlen); if (dmalen == 0) { return 0; } if (s->dma_me...
265,016,947,876,669,900,000,000,000,000,000,000,000
esp.c
289,418,033,979,179,020,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2020-35504
A NULL pointer dereference flaw was found in the SCSI emulation support of QEMU in versions before 6.0.0. This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.
https://nvd.nist.gov/vuln/detail/CVE-2020-35504
200,766
gimp
376ad788c1a1c31d40f18494889c383f6909ebfc
https://github.com/GNOME/gimp
http://git.gnome.org/browse/gimp/commit/plug-ins/common/file-gif-load.c?id=376ad788c1a1c31d40f18494889c383f6909ebfc
file-gif-load: fix heap corruption and buffer overflow (CVE-2011-2896)
1
LZWReadByte (FILE *fd, gint just_reset_LZW, gint input_code_size) { static gint fresh = FALSE; gint code, incode; static gint code_size, set_code_size; static gint max_code, max_code_size; static gint firstcode, oldcode; static gint clear_code, end_code; static gint tabl...
40,662,875,577,092,700,000,000,000,000,000,000,000
file-gif-load.c
120,686,547,662,931,210,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2011-2896
The LZW decompressor in the LWZReadByte function in giftoppm.c in the David Koblas GIF decoder in PBMPLUS, as used in the gif_read_lzw function in filter/image-gif.c in CUPS before 1.4.7, the LZWReadByte function in plug-ins/common/file-gif-load.c in GIMP 2.6.11 and earlier, the LZWReadByte function in img/gifread.c in...
https://nvd.nist.gov/vuln/detail/CVE-2011-2896
309,691
gimp
376ad788c1a1c31d40f18494889c383f6909ebfc
https://github.com/GNOME/gimp
http://git.gnome.org/browse/gimp/commit/plug-ins/common/file-gif-load.c?id=376ad788c1a1c31d40f18494889c383f6909ebfc
file-gif-load: fix heap corruption and buffer overflow (CVE-2011-2896)
0
LZWReadByte (FILE *fd, gint just_reset_LZW, gint input_code_size) { static gint fresh = FALSE; gint code, incode; static gint code_size, set_code_size; static gint max_code, max_code_size; static gint firstcode, oldcode; static gint clear_code, end_code; static gint tabl...
87,783,849,921,078,560,000,000,000,000,000,000,000
file-gif-load.c
6,526,107,628,734,846,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2011-2896
The LZW decompressor in the LWZReadByte function in giftoppm.c in the David Koblas GIF decoder in PBMPLUS, as used in the gif_read_lzw function in filter/image-gif.c in CUPS before 1.4.7, the LZWReadByte function in plug-ins/common/file-gif-load.c in GIMP 2.6.11 and earlier, the LZWReadByte function in img/gifread.c in...
https://nvd.nist.gov/vuln/detail/CVE-2011-2896
200,768
samba
392ec4d241eb19c812cd49ff73bd32b2b09d8533
https://github.com/samba-team/samba
http://git.samba.org/?p=samba.git;a=commitdiff;h=392ec4d241eb19c812cd49ff73bd32b2b09d8533
bug #10609: CVE-2014-0239 Don't reply to replies Due to insufficient input checking, the DNS server will reply to a packet that has the "reply" bit set. Over UDP, this allows to send a packet with a spoofed sender address and have two servers DOS each other with circular replies. This patch fixes bug #10609 and adds ...
1
static struct tevent_req *dns_process_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct dns_server *dns, DATA_BLOB *in) { struct tevent_req *req, *subreq; struct dns_process_state *state; enum ndr_err_code ndr_err; WERROR ret; const char *forwarder = lpcfg_dns_forwarder(dns->task-...
273,847,730,362,531,000,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2014-0239
The internal DNS server in Samba 4.x before 4.0.18 does not check the QR field in the header section of an incoming DNS message before sending a response, which allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged response packet that triggers a communication loop, a related...
https://nvd.nist.gov/vuln/detail/CVE-2014-0239
309,720
samba
392ec4d241eb19c812cd49ff73bd32b2b09d8533
https://github.com/samba-team/samba
http://git.samba.org/?p=samba.git;a=commitdiff;h=392ec4d241eb19c812cd49ff73bd32b2b09d8533
bug #10609: CVE-2014-0239 Don't reply to replies Due to insufficient input checking, the DNS server will reply to a packet that has the "reply" bit set. Over UDP, this allows to send a packet with a spoofed sender address and have two servers DOS each other with circular replies. This patch fixes bug #10609 and adds ...
0
static struct tevent_req *dns_process_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct dns_server *dns, DATA_BLOB *in) { struct tevent_req *req, *subreq; struct dns_process_state *state; enum ndr_err_code ndr_err; WERROR ret; const char *forwarder = lpcfg_dns_forwarder(dns->task-...
77,348,194,044,145,320,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2014-0239
The internal DNS server in Samba 4.x before 4.0.18 does not check the QR field in the header section of an incoming DNS message before sending a response, which allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged response packet that triggers a communication loop, a related...
https://nvd.nist.gov/vuln/detail/CVE-2014-0239
200,772
radvd
074816cd0b37aac7b3209987e6e998f0a847b275
https://github.com/reubenhwk/radvd
https://github.com/reubenhwk/radvd/commit/074816cd0b37aac7b3209987e6e998f0a847b275
privsep_read_loop() should return on unprivileged daemon death / socket close(), not loop forever with polling read() getting -1.
1
privsep_read_loop(void) { struct privsep_command cmd; int ret; while (1) { ret = readn(pfd, &cmd, sizeof(cmd)); if (ret <= 0) { /* Error or EOF, give up */ if (ret < 0) { flog(LOG_ERR, "Exiting, privsep_read_loop had readn error: %s\n", strerror(errno)); } else { flog(LOG_ERR, "Exiting...
191,947,920,091,927,370,000,000,000,000,000,000,000
privsep-linux.c
311,407,994,076,337,100,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-3603
The router advertisement daemon (radvd) before 1.8.2 does not properly handle errors in the privsep_init function, which causes the radvd daemon to run as root and has an unspecified impact.
https://nvd.nist.gov/vuln/detail/CVE-2011-3603