idx
int64
project
string
commit_id
string
project_url
string
commit_url
string
commit_message
string
target
int64
func
string
func_hash
float64
file_name
string
file_hash
float64
cwe
list
cve
string
cve_desc
string
nvd_url
string
323,586
irssi
5a4e7ab659aba2855895c9f43e9a7a131f4e89b3
https://github.com/irssi/irssi
https://github.com/irssi/irssi/commit/5a4e7ab659aba2855895c9f43e9a7a131f4e89b3
fix use after free receiving caps fixes GL#34
0
static void event_cap (IRC_SERVER_REC *server, char *args, char *nick, char *address) { GSList *tmp; GString *cmd; char *params, *evt, *list, *star, **caps; int i, caps_length, disable, avail_caps, multiline; params = event_get_params(args, 4, NULL, &evt, &star, &list); if (params == NULL) return; /* Multili...
158,265,490,066,745,200,000,000,000,000,000,000,000
irc-cap.c
13,648,292,510,778,973,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2019-15717
Irssi 1.2.x before 1.2.2 has a use-after-free if the IRC server sends a double CAP.
https://nvd.nist.gov/vuln/detail/CVE-2019-15717
201,871
CImg
ac8003393569aba51048c9d67e1491559877b1d1
https://github.com/dtschump/CImg
https://github.com/dtschump/CImg/commit/ac8003393569aba51048c9d67e1491559877b1d1
.
1
CImg<T>& _load_bmp(std::FILE *const file, const char *const filename) { if (!file && !filename) throw CImgArgumentException(_cimg_instance "load_bmp(): Specified filename is (null).", cimg_instance); std::FILE *const nfile...
30,591,227,777,993,066,000,000,000,000,000,000,000
CImg.h
278,941,056,383,166,750,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2019-13568
CImg through 2.6.7 has a heap-based buffer overflow in _load_bmp in CImg.h because of erroneous memory allocation for a malformed BMP image.
https://nvd.nist.gov/vuln/detail/CVE-2019-13568
323,626
CImg
ac8003393569aba51048c9d67e1491559877b1d1
https://github.com/dtschump/CImg
https://github.com/dtschump/CImg/commit/ac8003393569aba51048c9d67e1491559877b1d1
.
0
CImg<T>& _load_bmp(std::FILE *const file, const char *const filename) { if (!file && !filename) throw CImgArgumentException(_cimg_instance "load_bmp(): Specified filename is (null).", cimg_instance); std::FILE *const nfile...
285,910,285,559,177,830,000,000,000,000,000,000,000
CImg.h
238,850,456,658,257,940,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2019-13568
CImg through 2.6.7 has a heap-based buffer overflow in _load_bmp in CImg.h because of erroneous memory allocation for a malformed BMP image.
https://nvd.nist.gov/vuln/detail/CVE-2019-13568
201,895
aspell
80fa26c74279fced8d778351cff19d1d8f44fe4e
https://github.com/GNUAspell/aspell
https://github.com/GNUAspell/aspell/commit/80fa26c74279fced8d778351cff19d1d8f44fe4e
Fix various bugs found by OSS-Fuze.
1
char * unescape(char * dest, const char * src) { while (*src) { if (*src == '\\') { ++src; switch (*src) { case 'n': *dest = '\n'; break; case 'r': *dest = '\r'; break; case 't': *dest = '\t'; break; case 'f': *dest = '\f'; break; case 'v': *dest = '\v'; break; default: *dest = *src; } } el...
260,987,866,133,806,100,000,000,000,000,000,000,000
getdata.cpp
280,558,339,002,823,380,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-17544
libaspell.a in GNU Aspell before 0.60.8 has a stack-based buffer over-read in acommon::unescape in common/getdata.cpp via an isolated \ character.
https://nvd.nist.gov/vuln/detail/CVE-2019-17544
326,153
aspell
80fa26c74279fced8d778351cff19d1d8f44fe4e
https://github.com/GNUAspell/aspell
https://github.com/GNUAspell/aspell/commit/80fa26c74279fced8d778351cff19d1d8f44fe4e
Fix various bugs found by OSS-Fuze.
0
char * unescape(char * dest, const char * src) { while (*src) { if (*src == '\\' && src[1]) { ++src; switch (*src) { case 'n': *dest = '\n'; break; case 'r': *dest = '\r'; break; case 't': *dest = '\t'; break; case 'f': *dest = '\f'; break; case 'v': *dest = '\v'; break; default: *dest = *src; } ...
255,044,876,040,201,560,000,000,000,000,000,000,000
getdata.cpp
78,796,340,509,680,230,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-17544
libaspell.a in GNU Aspell before 0.60.8 has a stack-based buffer over-read in acommon::unescape in common/getdata.cpp via an isolated \ character.
https://nvd.nist.gov/vuln/detail/CVE-2019-17544
201,897
openjpeg
0afbdcf3e6d0d2bd2e16a0c4d513ee3cf86e460d
https://github.com/uclouvain/openjpeg
https://github.com/uclouvain/openjpeg/commit/0afbdcf3e6d0d2bd2e16a0c4d513ee3cf86e460d
Fix segfault in src/bin/jp2/opj_decompress.c due to uninitialized pointer (fixes #1368) (#1369)
1
int main(int argc, char **argv) { opj_decompress_parameters parameters; /* decompression parameters */ OPJ_INT32 num_images, imageno; img_fol_t img_fol; dircnt_t *dirptr = NULL; int failed = 0; OPJ_FLOAT64 t, tCumulative = 0; OPJ_UINT32 numDecompressedImages = 0; OPJ_UINT32 cp...
283,286,800,609,187,080,000,000,000,000,000,000,000
opj_decompress.c
190,084,510,069,847,180,000,000,000,000,000,000,000
[ "CWE-824" ]
CVE-2022-1122
A flaw was found in the opj2_decompress program in openjpeg2 2.4.0 in the way it handles an input directory with a large number of files. When it fails to allocate a buffer to store the filenames of the input directory, it calls free() on an uninitialized pointer, leading to a segmentation fault and a denial of service...
https://nvd.nist.gov/vuln/detail/CVE-2022-1122
326,244
openjpeg
0afbdcf3e6d0d2bd2e16a0c4d513ee3cf86e460d
https://github.com/uclouvain/openjpeg
https://github.com/uclouvain/openjpeg/commit/0afbdcf3e6d0d2bd2e16a0c4d513ee3cf86e460d
Fix segfault in src/bin/jp2/opj_decompress.c due to uninitialized pointer (fixes #1368) (#1369)
0
int main(int argc, char **argv) { opj_decompress_parameters parameters; /* decompression parameters */ OPJ_INT32 num_images, imageno; img_fol_t img_fol; dircnt_t *dirptr = NULL; int failed = 0; OPJ_FLOAT64 t, tCumulative = 0; OPJ_UINT32 numDecompressedImages = 0; OPJ_UINT32 cp...
92,210,036,055,932,840,000,000,000,000,000,000,000
opj_decompress.c
282,803,346,063,813,280,000,000,000,000,000,000,000
[ "CWE-824" ]
CVE-2022-1122
A flaw was found in the opj2_decompress program in openjpeg2 2.4.0 in the way it handles an input directory with a large number of files. When it fails to allocate a buffer to store the filenames of the input directory, it calls free() on an uninitialized pointer, leading to a segmentation fault and a denial of service...
https://nvd.nist.gov/vuln/detail/CVE-2022-1122
201,905
ImageMagick6
11d9dac3d991c62289d1ef7a097670166480e76c
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/11d9dac3d991c62289d1ef7a097670166480e76c
https://github.com/ImageMagick/ImageMagick/issues/1199
1
static Image *ReadPWPImage(const ImageInfo *image_info,ExceptionInfo *exception) { char filename[MaxTextExtent]; FILE *file; Image *image, *next_image, *pwp_image; ImageInfo *read_info; int c, unique_file; MagickBooleanType status; register Image *p; regist...
325,789,922,914,662,600,000,000,000,000,000,000,000
pwp.c
44,811,988,825,196,200,000,000,000,000,000,000,000
[ "CWE-252" ]
CVE-2018-16643
The functions ReadDCMImage in coders/dcm.c, ReadPWPImage in coders/pwp.c, ReadCALSImage in coders/cals.c, and ReadPICTImage in coders/pict.c in ImageMagick 7.0.8-4 do not check the return value of the fputc function, which allows remote attackers to cause a denial of service via a crafted image file.
https://nvd.nist.gov/vuln/detail/CVE-2018-16643
326,352
ImageMagick6
11d9dac3d991c62289d1ef7a097670166480e76c
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/11d9dac3d991c62289d1ef7a097670166480e76c
https://github.com/ImageMagick/ImageMagick/issues/1199
0
static Image *ReadPWPImage(const ImageInfo *image_info,ExceptionInfo *exception) { char filename[MaxTextExtent]; FILE *file; Image *image, *next_image, *pwp_image; ImageInfo *read_info; int c, unique_file; MagickBooleanType status; register Image *p; regist...
282,508,022,381,471,900,000,000,000,000,000,000,000
pwp.c
85,278,332,569,801,830,000,000,000,000,000,000,000
[ "CWE-252" ]
CVE-2018-16643
The functions ReadDCMImage in coders/dcm.c, ReadPWPImage in coders/pwp.c, ReadCALSImage in coders/cals.c, and ReadPICTImage in coders/pict.c in ImageMagick 7.0.8-4 do not check the return value of the fputc function, which allows remote attackers to cause a denial of service via a crafted image file.
https://nvd.nist.gov/vuln/detail/CVE-2018-16643
201,906
ImageMagick6
11d9dac3d991c62289d1ef7a097670166480e76c
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/11d9dac3d991c62289d1ef7a097670166480e76c
https://github.com/ImageMagick/ImageMagick/issues/1199
1
static Image *ReadCALSImage(const ImageInfo *image_info, ExceptionInfo *exception) { char filename[MaxTextExtent], header[129], message[MaxTextExtent]; FILE *file; Image *image; ImageInfo *read_info; int c, unique_file; MagickBooleanType status; register ssize_t...
88,862,266,690,127,740,000,000,000,000,000,000,000
cals.c
83,374,509,173,668,140,000,000,000,000,000,000,000
[ "CWE-252" ]
CVE-2018-16643
The functions ReadDCMImage in coders/dcm.c, ReadPWPImage in coders/pwp.c, ReadCALSImage in coders/cals.c, and ReadPICTImage in coders/pict.c in ImageMagick 7.0.8-4 do not check the return value of the fputc function, which allows remote attackers to cause a denial of service via a crafted image file.
https://nvd.nist.gov/vuln/detail/CVE-2018-16643
326,366
ImageMagick6
11d9dac3d991c62289d1ef7a097670166480e76c
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/11d9dac3d991c62289d1ef7a097670166480e76c
https://github.com/ImageMagick/ImageMagick/issues/1199
0
static Image *ReadCALSImage(const ImageInfo *image_info, ExceptionInfo *exception) { char filename[MaxTextExtent], header[129], message[MaxTextExtent]; FILE *file; Image *image; ImageInfo *read_info; int c, unique_file; MagickBooleanType status; register ssize_t...
261,025,155,049,216,660,000,000,000,000,000,000,000
cals.c
295,650,115,268,340,100,000,000,000,000,000,000,000
[ "CWE-252" ]
CVE-2018-16643
The functions ReadDCMImage in coders/dcm.c, ReadPWPImage in coders/pwp.c, ReadCALSImage in coders/cals.c, and ReadPICTImage in coders/pict.c in ImageMagick 7.0.8-4 do not check the return value of the fputc function, which allows remote attackers to cause a denial of service via a crafted image file.
https://nvd.nist.gov/vuln/detail/CVE-2018-16643
201,907
ImageMagick6
11d9dac3d991c62289d1ef7a097670166480e76c
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/11d9dac3d991c62289d1ef7a097670166480e76c
https://github.com/ImageMagick/ImageMagick/issues/1199
1
static Image *ReadPICTImage(const ImageInfo *image_info, ExceptionInfo *exception) { #define ThrowPICTException(exception,message) \ { \ if (tile_image != (Image *) NULL) \ tile_image=DestroyImage(tile_image); \ if (read_info != (ImageInfo *) NULL) \ read_info=DestroyImageInfo(read_info); \ ThrowReaderE...
136,150,762,693,099,100,000,000,000,000,000,000,000
pict.c
56,243,960,726,721,140,000,000,000,000,000,000,000
[ "CWE-252" ]
CVE-2018-16643
The functions ReadDCMImage in coders/dcm.c, ReadPWPImage in coders/pwp.c, ReadCALSImage in coders/cals.c, and ReadPICTImage in coders/pict.c in ImageMagick 7.0.8-4 do not check the return value of the fputc function, which allows remote attackers to cause a denial of service via a crafted image file.
https://nvd.nist.gov/vuln/detail/CVE-2018-16643
326,360
ImageMagick6
11d9dac3d991c62289d1ef7a097670166480e76c
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/11d9dac3d991c62289d1ef7a097670166480e76c
https://github.com/ImageMagick/ImageMagick/issues/1199
0
static Image *ReadPICTImage(const ImageInfo *image_info, ExceptionInfo *exception) { #define ThrowPICTException(exception,message) \ { \ if (tile_image != (Image *) NULL) \ tile_image=DestroyImage(tile_image); \ if (read_info != (ImageInfo *) NULL) \ read_info=DestroyImageInfo(read_info); \ ThrowReaderE...
276,484,041,744,721,000,000,000,000,000,000,000,000
pict.c
264,659,002,301,770,000,000,000,000,000,000,000,000
[ "CWE-252" ]
CVE-2018-16643
The functions ReadDCMImage in coders/dcm.c, ReadPWPImage in coders/pwp.c, ReadCALSImage in coders/cals.c, and ReadPICTImage in coders/pict.c in ImageMagick 7.0.8-4 do not check the return value of the fputc function, which allows remote attackers to cause a denial of service via a crafted image file.
https://nvd.nist.gov/vuln/detail/CVE-2018-16643
201,908
ImageMagick6
11d9dac3d991c62289d1ef7a097670166480e76c
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/11d9dac3d991c62289d1ef7a097670166480e76c
https://github.com/ImageMagick/ImageMagick/issues/1199
1
static Image *ReadDCMImage(const ImageInfo *image_info,ExceptionInfo *exception) { #define ThrowDCMException(exception,message) \ { \ if (info.scale != (Quantum *) NULL) \ info.scale=(Quantum *) RelinquishMagickMemory(info.scale); \ if (data != (unsigned char *) NULL) \ data=(unsigned char *) RelinquishMagi...
328,030,665,310,374,000,000,000,000,000,000,000,000
dcm.c
58,926,966,675,451,650,000,000,000,000,000,000,000
[ "CWE-252" ]
CVE-2018-16643
The functions ReadDCMImage in coders/dcm.c, ReadPWPImage in coders/pwp.c, ReadCALSImage in coders/cals.c, and ReadPICTImage in coders/pict.c in ImageMagick 7.0.8-4 do not check the return value of the fputc function, which allows remote attackers to cause a denial of service via a crafted image file.
https://nvd.nist.gov/vuln/detail/CVE-2018-16643
326,355
ImageMagick6
11d9dac3d991c62289d1ef7a097670166480e76c
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/11d9dac3d991c62289d1ef7a097670166480e76c
https://github.com/ImageMagick/ImageMagick/issues/1199
0
static Image *ReadDCMImage(const ImageInfo *image_info,ExceptionInfo *exception) { #define ThrowDCMException(exception,message) \ { \ if (info.scale != (Quantum *) NULL) \ info.scale=(Quantum *) RelinquishMagickMemory(info.scale); \ if (data != (unsigned char *) NULL) \ data=(unsigned char *) RelinquishMagi...
17,128,993,642,105,949,000,000,000,000,000,000,000
dcm.c
10,615,344,167,687,603,000,000,000,000,000,000,000
[ "CWE-252" ]
CVE-2018-16643
The functions ReadDCMImage in coders/dcm.c, ReadPWPImage in coders/pwp.c, ReadCALSImage in coders/cals.c, and ReadPICTImage in coders/pict.c in ImageMagick 7.0.8-4 do not check the return value of the fputc function, which allows remote attackers to cause a denial of service via a crafted image file.
https://nvd.nist.gov/vuln/detail/CVE-2018-16643
201,923
exiv2
ae20c30805b330275b2aa0303a42e1f2bbd53661
https://github.com/Exiv2/exiv2
https://github.com/Exiv2/exiv2/commit/ae20c30805b330275b2aa0303a42e1f2bbd53661
Avoid null pointer exception due to NULL return value from strchr. This fixes #793.
1
int Exiv2::http(Exiv2::Dictionary& request,Exiv2::Dictionary& response,std::string& errors) { if ( !request.count("verb") ) request["verb" ] = "GET"; if ( !request.count("header") ) request["header" ] = "" ; if ( !request.count("version")) request["version"] = "1.0"; if ( !request.count("port") ...
145,049,442,908,546,250,000,000,000,000,000,000,000
http.cpp
5,346,175,185,590,357,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2019-13114
http.c in Exiv2 through 0.27.1 allows a malicious http server to cause a denial of service (crash due to a NULL pointer dereference) by returning a crafted response that lacks a space character.
https://nvd.nist.gov/vuln/detail/CVE-2019-13114
326,886
exiv2
ae20c30805b330275b2aa0303a42e1f2bbd53661
https://github.com/Exiv2/exiv2
https://github.com/Exiv2/exiv2/commit/ae20c30805b330275b2aa0303a42e1f2bbd53661
Avoid null pointer exception due to NULL return value from strchr. This fixes #793.
0
int Exiv2::http(Exiv2::Dictionary& request,Exiv2::Dictionary& response,std::string& errors) { if ( !request.count("verb") ) request["verb" ] = "GET"; if ( !request.count("header") ) request["header" ] = "" ; if ( !request.count("version")) request["version"] = "1.0"; if ( !request.count("port") ...
200,212,959,186,690,400,000,000,000,000,000,000,000
http.cpp
299,755,116,181,587,730,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2019-13114
http.c in Exiv2 through 0.27.1 allows a malicious http server to cause a denial of service (crash due to a NULL pointer dereference) by returning a crafted response that lacks a space character.
https://nvd.nist.gov/vuln/detail/CVE-2019-13114
201,924
varnish-cache
bd7b3d6d47ccbb5e1747126f8e2a297f38e56b8c
https://github.com/varnishcache/varnish-cache
https://github.com/varnishcache/varnish-cache/commit/bd7b3d6d47ccbb5e1747126f8e2a297f38e56b8c
Clear err_code and err_reason at start of request handling req->err_code and req->err_reason are set when going to synthetic handling. From there the resp.reason HTTP field is set from req->err_reason if set, or the generic code based on req->err_code is used if it was NULL. This patch clears these members so that a v...
1
cnt_recv_prep(struct req *req, const char *ci) { const char *xff; if (req->restarts == 0) { /* * This really should be done earlier, but we want to capture * it in the VSL log. */ http_CollectHdr(req->http, H_X_Forwarded_For); if (http_GetHdr(req->http, H_X_Forwarded_For, &xff)) { http_Unset(req->h...
72,403,172,879,027,580,000,000,000,000,000,000,000
cache_req_fsm.c
154,570,149,617,043,740,000,000,000,000,000,000,000
[ "CWE-212" ]
CVE-2019-20637
An issue was discovered in Varnish Cache before 6.0.5 LTS, 6.1.x and 6.2.x before 6.2.2, and 6.3.x before 6.3.1. It does not clear a pointer between the handling of one client request and the next request within the same connection. This sometimes causes information to be disclosed from the connection workspace, such a...
https://nvd.nist.gov/vuln/detail/CVE-2019-20637
326,910
varnish-cache
bd7b3d6d47ccbb5e1747126f8e2a297f38e56b8c
https://github.com/varnishcache/varnish-cache
https://github.com/varnishcache/varnish-cache/commit/bd7b3d6d47ccbb5e1747126f8e2a297f38e56b8c
Clear err_code and err_reason at start of request handling req->err_code and req->err_reason are set when going to synthetic handling. From there the resp.reason HTTP field is set from req->err_reason if set, or the generic code based on req->err_code is used if it was NULL. This patch clears these members so that a v...
0
cnt_recv_prep(struct req *req, const char *ci) { const char *xff; if (req->restarts == 0) { /* * This really should be done earlier, but we want to capture * it in the VSL log. */ http_CollectHdr(req->http, H_X_Forwarded_For); if (http_GetHdr(req->http, H_X_Forwarded_For, &xff)) { http_Unset(req->h...
145,169,263,497,564,720,000,000,000,000,000,000,000
cache_req_fsm.c
44,390,415,433,771,620,000,000,000,000,000,000,000
[ "CWE-212" ]
CVE-2019-20637
An issue was discovered in Varnish Cache before 6.0.5 LTS, 6.1.x and 6.2.x before 6.2.2, and 6.3.x before 6.3.1. It does not clear a pointer between the handling of one client request and the next request within the same connection. This sometimes causes information to be disclosed from the connection workspace, such a...
https://nvd.nist.gov/vuln/detail/CVE-2019-20637
201,926
ntp
12f1323d18c8d74eb14fb5ac5574183d779794c5
https://github.com/ntp-project/ntp
https://github.com/ntp-project/ntp/commit/12f1323d18c8d74eb14fb5ac5574183d779794c5
[Bug 2937] (NTPQ) nextvar() missing length check
1
nextvar( int *datalen, const char **datap, char **vname, char **vvalue ) { const char *cp; const char *np; const char *cpend; size_t srclen; size_t len; static char name[MAXVARLEN]; static char value[MAXVALLEN]; cp = *datap; cpend = cp + *datalen; /* * Space past commas and white space */ while (c...
94,193,894,394,064,200,000,000,000,000,000,000,000
ntpq.c
137,449,940,942,221,470,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2015-7975
The nextvar function in NTP before 4.2.8p6 and 4.3.x before 4.3.90 does not properly validate the length of its input, which allows an attacker to cause a denial of service (application crash).
https://nvd.nist.gov/vuln/detail/CVE-2015-7975
326,978
ntp
12f1323d18c8d74eb14fb5ac5574183d779794c5
https://github.com/ntp-project/ntp
https://github.com/ntp-project/ntp/commit/12f1323d18c8d74eb14fb5ac5574183d779794c5
[Bug 2937] (NTPQ) nextvar() missing length check
0
nextvar( int *datalen, const char **datap, char **vname, char **vvalue ) { const char *cp; const char *np; const char *cpend; size_t srclen; size_t len; static char name[MAXVARLEN]; static char value[MAXVALLEN]; cp = *datap; cpend = cp + *datalen; /* * Space past commas and white space */ while (c...
317,886,261,342,928,300,000,000,000,000,000,000,000
ntpq.c
263,164,452,008,239,240,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2015-7975
The nextvar function in NTP before 4.2.8p6 and 4.3.x before 4.3.90 does not properly validate the length of its input, which allows an attacker to cause a denial of service (application crash).
https://nvd.nist.gov/vuln/detail/CVE-2015-7975
201,927
FFmpeg
1812352d767ccf5431aa440123e2e260a4db2726
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/1812352d767ccf5431aa440123e2e260a4db2726
avcodec/cbs_jpeg: Check length for SOS Fixes: out of array access Fixes: 19734/clusterfuzz-testcase-minimized-ffmpeg_BSF_TRACE_HEADERS_fuzzer-5673507031875584 Fixes: 19353/clusterfuzz-testcase-minimized-ffmpeg_BSF_TRACE_HEADERS_fuzzer-5703944462663680 Found-by: continuous fuzzing process https://github.com/google/oss...
1
static int cbs_jpeg_split_fragment(CodedBitstreamContext *ctx, CodedBitstreamFragment *frag, int header) { AVBufferRef *data_ref; uint8_t *data; size_t data_size; int unit, start, end, marker, next_start, next_marker; int err, i, ...
288,785,647,865,110,100,000,000,000,000,000,000,000
cbs_jpeg.c
141,905,974,633,686,900,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2020-12284
cbs_jpeg_split_fragment in libavcodec/cbs_jpeg.c in FFmpeg 4.1 and 4.2.2 has a heap-based buffer overflow during JPEG_MARKER_SOS handling because of a missing length check.
https://nvd.nist.gov/vuln/detail/CVE-2020-12284
326,994
FFmpeg
1812352d767ccf5431aa440123e2e260a4db2726
https://github.com/FFmpeg/FFmpeg
https://github.com/FFmpeg/FFmpeg/commit/1812352d767ccf5431aa440123e2e260a4db2726
avcodec/cbs_jpeg: Check length for SOS Fixes: out of array access Fixes: 19734/clusterfuzz-testcase-minimized-ffmpeg_BSF_TRACE_HEADERS_fuzzer-5673507031875584 Fixes: 19353/clusterfuzz-testcase-minimized-ffmpeg_BSF_TRACE_HEADERS_fuzzer-5703944462663680 Found-by: continuous fuzzing process https://github.com/google/oss...
0
static int cbs_jpeg_split_fragment(CodedBitstreamContext *ctx, CodedBitstreamFragment *frag, int header) { AVBufferRef *data_ref; uint8_t *data; size_t data_size; int unit, start, end, marker, next_start, next_marker; int err, i, ...
91,615,084,836,431,830,000,000,000,000,000,000,000
cbs_jpeg.c
102,935,850,475,612,860,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2020-12284
cbs_jpeg_split_fragment in libavcodec/cbs_jpeg.c in FFmpeg 4.1 and 4.2.2 has a heap-based buffer overflow during JPEG_MARKER_SOS handling because of a missing length check.
https://nvd.nist.gov/vuln/detail/CVE-2020-12284
202,075
abrt
fdf93685d4f3fc36fe50d34a11e24662c4cb2d8c
https://github.com/abrt/abrt
https://github.com/abrt/abrt/commit/fdf93685d4f3fc36fe50d34a11e24662c4cb2d8c
a-a-save-package-data: turn off reading data from root directories Making copies of files from arbitrary root directories is not secure. Related: #1211835 Signed-off-by: Jakub Filak <jfilak@redhat.com>
1
static int SavePackageDescriptionToDebugDump(const char *dump_dir_name) { struct dump_dir *dd = dd_opendir(dump_dir_name, /*flags:*/ 0); if (!dd) return 1; char *analyzer = dd_load_text(dd, FILENAME_ANALYZER); if (!strcmp(analyzer, "Kerneloops")) { dd_save_text(dd, FILENAME_PACKAGE,...
58,385,047,012,831,510,000,000,000,000,000,000,000
abrt-action-save-package-data.c
35,972,289,246,062,253,000,000,000,000,000,000,000
[ "CWE-59" ]
CVE-2015-3315
Automatic Bug Reporting Tool (ABRT) allows local users to read, change the ownership of, or have other unspecified impact on arbitrary files via a symlink attack on (1) /var/tmp/abrt/*/maps, (2) /tmp/jvm-*/hs_error.log, (3) /proc/*/exe, (4) /etc/os-release in a chroot, or (5) an unspecified root directory related to li...
https://nvd.nist.gov/vuln/detail/CVE-2015-3315
328,485
abrt
fdf93685d4f3fc36fe50d34a11e24662c4cb2d8c
https://github.com/abrt/abrt
https://github.com/abrt/abrt/commit/fdf93685d4f3fc36fe50d34a11e24662c4cb2d8c
a-a-save-package-data: turn off reading data from root directories Making copies of files from arbitrary root directories is not secure. Related: #1211835 Signed-off-by: Jakub Filak <jfilak@redhat.com>
0
static int SavePackageDescriptionToDebugDump(const char *dump_dir_name) { struct dump_dir *dd = dd_opendir(dump_dir_name, /*flags:*/ 0); if (!dd) return 1; char *analyzer = dd_load_text(dd, FILENAME_ANALYZER); if (!strcmp(analyzer, "Kerneloops")) { dd_save_text(dd, FILENAME_PACKAGE,...
217,413,558,696,639,170,000,000,000,000,000,000,000
abrt-action-save-package-data.c
132,433,950,786,723,050,000,000,000,000,000,000,000
[ "CWE-59" ]
CVE-2015-3315
Automatic Bug Reporting Tool (ABRT) allows local users to read, change the ownership of, or have other unspecified impact on arbitrary files via a symlink attack on (1) /var/tmp/abrt/*/maps, (2) /tmp/jvm-*/hs_error.log, (3) /proc/*/exe, (4) /etc/os-release in a chroot, or (5) an unspecified root directory related to li...
https://nvd.nist.gov/vuln/detail/CVE-2015-3315
202,077
wesnoth
af61f9fdd15cd439da9e2fe5fa39d174c923eaae
https://github.com/wesnoth/wesnoth
https://github.com/wesnoth/wesnoth/commit/af61f9fdd15cd439da9e2fe5fa39d174c923eaae
fs: Use game data path to resolve ./ in the absence of a current_dir Fixes a file content disclosure bug (#22042) affecting functionality relying on the get_wml_location() function and not passing a non-empty value for the current_dir parameter. See <https://gna.org/bugs/?22042> for details. This is a candidate for ...
1
std::string get_wml_location(const std::string &filename, const std::string &current_dir) { DBG_FS << "Looking for '" << filename << "'.\n"; std::string result; if (filename.empty()) { LOG_FS << " invalid filename\n"; return result; } if (filename.find("..") != std::string::npos) { ERR_FS << "Illegal pat...
218,991,621,760,989,600,000,000,000,000,000,000,000
filesystem.cpp
99,676,955,234,952,020,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2015-0844
The WML/Lua API in Battle for Wesnoth 1.7.x through 1.11.x and 1.12.x before 1.12.2 allows remote attackers to read arbitrary files via a crafted (1) campaign or (2) map file.
https://nvd.nist.gov/vuln/detail/CVE-2015-0844
328,565
wesnoth
af61f9fdd15cd439da9e2fe5fa39d174c923eaae
https://github.com/wesnoth/wesnoth
https://github.com/wesnoth/wesnoth/commit/af61f9fdd15cd439da9e2fe5fa39d174c923eaae
fs: Use game data path to resolve ./ in the absence of a current_dir Fixes a file content disclosure bug (#22042) affecting functionality relying on the get_wml_location() function and not passing a non-empty value for the current_dir parameter. See <https://gna.org/bugs/?22042> for details. This is a candidate for ...
0
std::string get_wml_location(const std::string &filename, const std::string &current_dir) { DBG_FS << "Looking for '" << filename << "'.\n"; std::string result; if (filename.empty()) { LOG_FS << " invalid filename\n"; return result; } if (filename.find("..") != std::string::npos) { ERR_FS << "Illegal pat...
15,547,603,443,512,982,000,000,000,000,000,000,000
filesystem.cpp
308,985,517,584,582,380,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2015-0844
The WML/Lua API in Battle for Wesnoth 1.7.x through 1.11.x and 1.12.x before 1.12.2 allows remote attackers to read arbitrary files via a crafted (1) campaign or (2) map file.
https://nvd.nist.gov/vuln/detail/CVE-2015-0844
202,078
ImageMagick6
a5db4873626f702d2ddd8bc293573493e0a412c0
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/a5db4873626f702d2ddd8bc293573493e0a412c0
https://github.com/ImageMagick/ImageMagick/issues/1336
1
static void SVGStripString(const MagickBooleanType trim,char *message) { register char *p, *q; size_t length; assert(message != (char *) NULL); if (*message == '\0') return; /* Remove comment. */ q=message; for (p=message; *p != '\0'; p++) { if ((*p == '/') && (*(p+1) == '*')...
149,593,995,387,637,380,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2018-18023
In ImageMagick 7.0.8-13 Q16, there is a heap-based buffer over-read in the SVGStripString function of coders/svg.c, which allows attackers to cause a denial of service via a crafted SVG image file.
https://nvd.nist.gov/vuln/detail/CVE-2018-18023
328,620
ImageMagick6
a5db4873626f702d2ddd8bc293573493e0a412c0
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/a5db4873626f702d2ddd8bc293573493e0a412c0
https://github.com/ImageMagick/ImageMagick/issues/1336
0
static void SVGStripString(const MagickBooleanType trim,char *message) { register char *p, *q; size_t length; assert(message != (char *) NULL); if (*message == '\0') return; /* Remove comment. */ q=message; for (p=message; *p != '\0'; p++) { if ((*p == '/') && (*(p+1) == '*')...
155,878,558,045,591,710,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2018-18023
In ImageMagick 7.0.8-13 Q16, there is a heap-based buffer over-read in the SVGStripString function of coders/svg.c, which allows attackers to cause a denial of service via a crafted SVG image file.
https://nvd.nist.gov/vuln/detail/CVE-2018-18023
202,087
libxml2
2240fbf5912054af025fb6e01e26375100275e74
https://github.com/GNOME/libxml2
https://gitlab.gnome.org/GNOME/libxml2/commit/2240fbf5912054af025fb6e01e26375100275e74
Fix infinite loop in LZMA decompression Check the liblzma error code more thoroughly to avoid infinite loops. Closes: https://gitlab.gnome.org/GNOME/libxml2/issues/13 Closes: https://bugzilla.gnome.org/show_bug.cgi?id=794914 This is CVE-2018-9251 and CVE-2018-14567. Thanks to Dongliang Mu and Simon Wörner for the r...
1
xz_decomp(xz_statep state) { int ret; unsigned had; unsigned long crc, len; lzma_stream *strm = &(state->strm); lzma_action action = LZMA_RUN; /* fill output buffer up to end of deflate stream */ had = strm->avail_out; do { /* get more input for inflate() */ if (strm->a...
21,182,978,878,793,282,000,000,000,000,000,000,000
xzlib.c
26,095,256,663,937,606,000,000,000,000,000,000,000
[ "CWE-835" ]
CVE-2018-9251
The xz_decomp function in xzlib.c in libxml2 2.9.8, if --with-lzma is used, allows remote attackers to cause a denial of service (infinite loop) via a crafted XML file that triggers LZMA_MEMLIMIT_ERROR, as demonstrated by xmllint, a different vulnerability than CVE-2015-8035.
https://nvd.nist.gov/vuln/detail/CVE-2018-9251
329,039
libxml2
2240fbf5912054af025fb6e01e26375100275e74
https://github.com/GNOME/libxml2
https://gitlab.gnome.org/GNOME/libxml2/commit/2240fbf5912054af025fb6e01e26375100275e74
Fix infinite loop in LZMA decompression Check the liblzma error code more thoroughly to avoid infinite loops. Closes: https://gitlab.gnome.org/GNOME/libxml2/issues/13 Closes: https://bugzilla.gnome.org/show_bug.cgi?id=794914 This is CVE-2018-9251 and CVE-2018-14567. Thanks to Dongliang Mu and Simon Wörner for the r...
0
xz_decomp(xz_statep state) { int ret; unsigned had; unsigned long crc, len; lzma_stream *strm = &(state->strm); lzma_action action = LZMA_RUN; /* fill output buffer up to end of deflate stream */ had = strm->avail_out; do { /* get more input for inflate() */ if (strm->a...
286,325,907,304,440,370,000,000,000,000,000,000,000
xzlib.c
92,190,223,885,988,240,000,000,000,000,000,000,000
[ "CWE-835" ]
CVE-2018-9251
The xz_decomp function in xzlib.c in libxml2 2.9.8, if --with-lzma is used, allows remote attackers to cause a denial of service (infinite loop) via a crafted XML file that triggers LZMA_MEMLIMIT_ERROR, as demonstrated by xmllint, a different vulnerability than CVE-2015-8035.
https://nvd.nist.gov/vuln/detail/CVE-2018-9251
202,088
radare2
14189710859c27981adb4c2c2aed2863c1859ec5
https://github.com/radare/radare2
https://github.com/radare/radare2/commit/14189710859c27981adb4c2c2aed2863c1859ec5
Redo minor cleanup in new_rbtree
1
R_API bool r_crbtree_insert(RRBTree *tree, void *data, RRBComparator cmp, void *user) { r_return_val_if_fail (tree && data && cmp, false); bool inserted = false; if (tree->root == NULL) { tree->root = _node_new (data, NULL); if (tree->root == NULL) { return false; } inserted = true; goto out_exit; } ...
217,289,004,718,776,930,000,000,000,000,000,000,000
new_rbtree.c
218,837,589,526,560,800,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2022-1444
heap-use-after-free in GitHub repository radareorg/radare2 prior to 5.7.0. This vulnerability is capable of inducing denial of service.
https://nvd.nist.gov/vuln/detail/CVE-2022-1444
329,066
radare2
14189710859c27981adb4c2c2aed2863c1859ec5
https://github.com/radare/radare2
https://github.com/radare/radare2/commit/14189710859c27981adb4c2c2aed2863c1859ec5
Redo minor cleanup in new_rbtree
0
R_API bool r_crbtree_insert(RRBTree *tree, void *data, RRBComparator cmp, void *user) { r_return_val_if_fail (tree && data && cmp, false); bool inserted = false; if (!tree->root) { tree->root = _node_new (data, NULL); if (!tree->root) { return false; } inserted = true; goto out_exit; } RRBNode head;...
151,669,261,544,495,560,000,000,000,000,000,000,000
new_rbtree.c
107,376,252,458,321,480,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2022-1444
heap-use-after-free in GitHub repository radareorg/radare2 prior to 5.7.0. This vulnerability is capable of inducing denial of service.
https://nvd.nist.gov/vuln/detail/CVE-2022-1444
202,089
freeipa
73f33569c8893610e246b2f44a7aeaec872b37e6
https://git.fedorahosted.org/cgit/freeipa
https://git.fedorahosted.org/cgit/freeipa.git/commit/?id=73f33569c8893610e246b2f44a7aeaec872b37e6
ipa-kdb: search for password policies globally With the CoS templates now used to create additional password policies per object type that are placed under the object subtrees, DAL driver needs to search for the policies in the whole tree. Individual policies referenced by the krbPwdPolicyReference attribute are alwa...
1
krb5_error_code ipadb_get_pwd_policy(krb5_context kcontext, char *name, osa_policy_ent_t *policy) { struct ipadb_context *ipactx; char *esc_name = NULL; char *src_filter = NULL; krb5_error_code kerr; LDAPMessage *res = NULL; LDAPMessage *lentry; osa_polic...
11,225,011,208,166,388,000,000,000,000,000,000,000
ipa_kdb_pwdpolicy.c
33,175,929,332,922,685,000,000,000,000,000,000,000
[ "CWE-255" ]
CVE-2016-7030
FreeIPA uses a default password policy that locks an account after 5 unsuccessful authentication attempts, which allows remote attackers to cause a denial of service by locking out the account in which system services run on.
https://nvd.nist.gov/vuln/detail/CVE-2016-7030
329,077
freeipa
73f33569c8893610e246b2f44a7aeaec872b37e6
https://git.fedorahosted.org/cgit/freeipa
https://git.fedorahosted.org/cgit/freeipa.git/commit/?id=73f33569c8893610e246b2f44a7aeaec872b37e6
ipa-kdb: search for password policies globally With the CoS templates now used to create additional password policies per object type that are placed under the object subtrees, DAL driver needs to search for the policies in the whole tree. Individual policies referenced by the krbPwdPolicyReference attribute are alwa...
0
krb5_error_code ipadb_get_pwd_policy(krb5_context kcontext, char *name, osa_policy_ent_t *policy) { struct ipadb_context *ipactx; char *esc_name = NULL; char *src_filter = NULL; krb5_error_code kerr; LDAPMessage *res = NULL; LDAPMessage *lentry; osa_polic...
288,979,861,602,927,100,000,000,000,000,000,000,000
ipa_kdb_pwdpolicy.c
55,046,826,374,263,590,000,000,000,000,000,000,000
[ "CWE-255" ]
CVE-2016-7030
FreeIPA uses a default password policy that locks an account after 5 unsuccessful authentication attempts, which allows remote attackers to cause a denial of service by locking out the account in which system services run on.
https://nvd.nist.gov/vuln/detail/CVE-2016-7030
202,097
linux
43cdd1b716b26f6af16da4e145b6578f98798bf6
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=43cdd1b716b26f6af16da4e145b6578f98798bf6
ACPI: sbshc: remove raw pointer from printk() message There's no need to be printing a raw kernel pointer to the kernel log at every boot. So just remove it, and change the whole message to use the correct dev_info() call at the same time. Reported-by: Wang Qize <wang_qize@venustech.com.cn> Cc: All applicable <stabl...
1
static int acpi_smbus_hc_add(struct acpi_device *device) { int status; unsigned long long val; struct acpi_smb_hc *hc; if (!device) return -EINVAL; status = acpi_evaluate_integer(device->handle, "_EC", NULL, &val); if (ACPI_FAILURE(status)) { printk(KERN_ERR PREFIX "error obtaining _EC.\n"); return -EIO; ...
320,133,584,997,789,170,000,000,000,000,000,000,000
sbshc.c
159,180,292,634,752,810,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2018-5750
The acpi_smbus_hc_add function in drivers/acpi/sbshc.c in the Linux kernel through 4.14.15 allows local users to obtain sensitive address information by reading dmesg data from an SBS HC printk call.
https://nvd.nist.gov/vuln/detail/CVE-2018-5750
329,247
linux
43cdd1b716b26f6af16da4e145b6578f98798bf6
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=43cdd1b716b26f6af16da4e145b6578f98798bf6
ACPI: sbshc: remove raw pointer from printk() message There's no need to be printing a raw kernel pointer to the kernel log at every boot. So just remove it, and change the whole message to use the correct dev_info() call at the same time. Reported-by: Wang Qize <wang_qize@venustech.com.cn> Cc: All applicable <stabl...
0
static int acpi_smbus_hc_add(struct acpi_device *device) { int status; unsigned long long val; struct acpi_smb_hc *hc; if (!device) return -EINVAL; status = acpi_evaluate_integer(device->handle, "_EC", NULL, &val); if (ACPI_FAILURE(status)) { printk(KERN_ERR PREFIX "error obtaining _EC.\n"); return -EIO; ...
221,190,895,648,758,000,000,000,000,000,000,000,000
sbshc.c
328,254,937,109,485,450,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2018-5750
The acpi_smbus_hc_add function in drivers/acpi/sbshc.c in the Linux kernel through 4.14.15 allows local users to obtain sensitive address information by reading dmesg data from an SBS HC printk call.
https://nvd.nist.gov/vuln/detail/CVE-2018-5750
202,100
w3m
ba9d78faeba9024c3e8840579c3b0e959ae2cb0f
https://github.com/tats/w3m
https://github.com/tats/w3m/commit/ba9d78faeba9024c3e8840579c3b0e959ae2cb0f
Prevent global-buffer-overflow in parseURL() Bug-Debian: https://github.com/tats/w3m/issues/41
1
parseURL(char *url, ParsedURL *p_url, ParsedURL *current) { char *p, *q, *qq; Str tmp; url = url_quote(url); /* quote 0x01-0x20, 0x7F-0xFF */ p = url; copyParsedURL(p_url, NULL); p_url->scheme = SCM_MISSING; /* RFC1808: Relative Uniform Resource Locators * 4. Resolving Relative URLs...
256,601,524,006,595,680,000,000,000,000,000,000,000
url.c
116,551,459,812,714,360,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-9630
An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (global buffer overflow and crash) via a crafted HTML page.
https://nvd.nist.gov/vuln/detail/CVE-2016-9630
329,292
w3m
ba9d78faeba9024c3e8840579c3b0e959ae2cb0f
https://github.com/tats/w3m
https://github.com/tats/w3m/commit/ba9d78faeba9024c3e8840579c3b0e959ae2cb0f
Prevent global-buffer-overflow in parseURL() Bug-Debian: https://github.com/tats/w3m/issues/41
0
parseURL(char *url, ParsedURL *p_url, ParsedURL *current) { char *p, *q, *qq; Str tmp; url = url_quote(url); /* quote 0x01-0x20, 0x7F-0xFF */ p = url; copyParsedURL(p_url, NULL); p_url->scheme = SCM_MISSING; /* RFC1808: Relative Uniform Resource Locators * 4. Resolving Relative URLs...
278,001,834,510,167,730,000,000,000,000,000,000,000
url.c
135,061,753,225,544,220,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-9630
An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (global buffer overflow and crash) via a crafted HTML page.
https://nvd.nist.gov/vuln/detail/CVE-2016-9630
202,101
w3m
4e464819dd360ffd3d58fa2a89216fe413cfcc74
https://github.com/tats/w3m
https://github.com/tats/w3m/commit/4e464819dd360ffd3d58fa2a89216fe413cfcc74
Prevent segfault due to buffer overflows in addMultirowsForm Bug-Debian: https://github.com/tats/w3m/issues/21 Bug-Debian: https://github.com/tats/w3m/issues/26
1
addMultirowsForm(Buffer *buf, AnchorList *al) { int i, j, k, col, ecol, pos; Anchor a_form, *a; Line *l, *ls; if (al == NULL || al->nanchor == 0) return; for (i = 0; i < al->nanchor; i++) { a_form = al->anchors[i]; al->anchors[i].rows = 1; if (a_form.hseq < 0 || a_form.rows <= 1) continue;...
870,317,461,032,444,000,000,000,000,000,000,000
anchor.c
315,835,909,194,517,400,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-9425
An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. Heap-based buffer overflow in the addMultirowsForm function in w3m allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted HTML page.
https://nvd.nist.gov/vuln/detail/CVE-2016-9425
329,331
w3m
4e464819dd360ffd3d58fa2a89216fe413cfcc74
https://github.com/tats/w3m
https://github.com/tats/w3m/commit/4e464819dd360ffd3d58fa2a89216fe413cfcc74
Prevent segfault due to buffer overflows in addMultirowsForm Bug-Debian: https://github.com/tats/w3m/issues/21 Bug-Debian: https://github.com/tats/w3m/issues/26
0
addMultirowsForm(Buffer *buf, AnchorList *al) { int i, j, k, col, ecol, pos; Anchor a_form, *a; Line *l, *ls; if (al == NULL || al->nanchor == 0) return; for (i = 0; i < al->nanchor; i++) { a_form = al->anchors[i]; al->anchors[i].rows = 1; if (a_form.hseq < 0 || a_form.rows <= 1) continue;...
200,393,183,453,381,030,000,000,000,000,000,000,000
anchor.c
69,432,606,966,181,620,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-9425
An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. Heap-based buffer overflow in the addMultirowsForm function in w3m allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted HTML page.
https://nvd.nist.gov/vuln/detail/CVE-2016-9425
202,102
libvncserver
54220248886b5001fbbb9fa73c4e1a2cb9413fed
https://github.com/LibVNC/libvncserver
https://github.com/LibVNC/libvncserver/commit/54220248886b5001fbbb9fa73c4e1a2cb9413fed
libvncclient/cursor: limit width/height input values Avoids a possible heap overflow reported by Pavel Cheremushkin <Pavel.Cheremushkin@kaspersky.com>. re #275
1
rfbBool HandleCursorShape(rfbClient* client,int xhot, int yhot, int width, int height, uint32_t enc) { int bytesPerPixel; size_t bytesPerRow, bytesMaskData; rfbXCursorColors rgb; uint32_t colors[2]; char *buf; uint8_t *ptr; int x, y, b; bytesPerPixel = client->format.bitsPerPixel / 8; bytesPerRow = (...
39,577,060,366,477,863,000,000,000,000,000,000,000
cursor.c
120,462,937,858,052,550,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2019-20788
libvncclient/cursor.c in LibVNCServer through 0.9.12 has a HandleCursorShape integer overflow and heap-based buffer overflow via a large height or width value. NOTE: this may overlap CVE-2019-15690.
https://nvd.nist.gov/vuln/detail/CVE-2019-20788
329,340
libvncserver
54220248886b5001fbbb9fa73c4e1a2cb9413fed
https://github.com/LibVNC/libvncserver
https://github.com/LibVNC/libvncserver/commit/54220248886b5001fbbb9fa73c4e1a2cb9413fed
libvncclient/cursor: limit width/height input values Avoids a possible heap overflow reported by Pavel Cheremushkin <Pavel.Cheremushkin@kaspersky.com>. re #275
0
rfbBool HandleCursorShape(rfbClient* client,int xhot, int yhot, int width, int height, uint32_t enc) { int bytesPerPixel; size_t bytesPerRow, bytesMaskData; rfbXCursorColors rgb; uint32_t colors[2]; char *buf; uint8_t *ptr; int x, y, b; bytesPerPixel = client->format.bitsPerPixel / 8; bytesPerRow = (...
107,932,542,597,500,300,000,000,000,000,000,000,000
cursor.c
87,727,908,196,640,740,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2019-20788
libvncclient/cursor.c in LibVNCServer through 0.9.12 has a HandleCursorShape integer overflow and heap-based buffer overflow via a large height or width value. NOTE: this may overlap CVE-2019-15690.
https://nvd.nist.gov/vuln/detail/CVE-2019-20788
202,106
systemd
5ba6985b6c8ef85a8bcfeb1b65239c863436e75b
https://github.com/systemd/systemd
https://github.com/systemd/systemd/commit/5ba6985b6c8ef85a8bcfeb1b65239c863436e75b#diff-ab78220e12703ee63fa1e6a2caa16bebR1319
core: allow PIDs to be watched by two units at the same time In some cases it is interesting to map a PID to two units at the same time. For example, when a user logs in via a getty, which is reexeced to /sbin/login that binary will be explicitly referenced as main pid of the getty service, as well as implicitly refer...
1
static int manager_dispatch_notify_fd(sd_event_source *source, int fd, uint32_t revents, void *userdata) { Manager *m = userdata; ssize_t n; assert(m); assert(m->notify_fd == fd); if (revents != EPOLLIN) { log_warning("Got unexpected poll event for notify fd.");...
173,752,175,347,809,900,000,000,000,000,000,000,000
manager.c
5,670,024,753,497,447,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2016-7796
The manager_dispatch_notify_fd function in systemd allows local users to cause a denial of service (system hang) via a zero-length message received over a notify socket, which causes an error to be returned and the notification handler to be disabled.
https://nvd.nist.gov/vuln/detail/CVE-2016-7796
329,424
systemd
5ba6985b6c8ef85a8bcfeb1b65239c863436e75b
https://github.com/systemd/systemd
https://github.com/systemd/systemd/commit/5ba6985b6c8ef85a8bcfeb1b65239c863436e75b#diff-ab78220e12703ee63fa1e6a2caa16bebR1319
core: allow PIDs to be watched by two units at the same time In some cases it is interesting to map a PID to two units at the same time. For example, when a user logs in via a getty, which is reexeced to /sbin/login that binary will be explicitly referenced as main pid of the getty service, as well as implicitly refer...
0
static int manager_dispatch_notify_fd(sd_event_source *source, int fd, uint32_t revents, void *userdata) { Manager *m = userdata; ssize_t n; assert(m); assert(m->notify_fd == fd); if (revents != EPOLLIN) { log_warning("Got unexpected poll event for notify fd.");...
294,712,827,854,744,740,000,000,000,000,000,000,000
manager.c
301,752,339,566,170,350,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2016-7796
The manager_dispatch_notify_fd function in systemd allows local users to cause a denial of service (system hang) via a zero-length message received over a notify socket, which causes an error to be returned and the notification handler to be disabled.
https://nvd.nist.gov/vuln/detail/CVE-2016-7796
202,123
libvirt
1ac703a7d0789e46833f4013a3876c2e3af18ec7
https://github.com/libvirt/libvirt
https://github.com/libvirt/libvirt/commit/1ac703a7d0789e46833f4013a3876c2e3af18ec7
qemu: Add missing lock in qemuProcessHandleMonitorEOF qemuMonitorUnregister will be called in multiple threads (e.g. threads in rpc worker pool and the vm event thread). In some cases, it isn't protected by the monitor lock, which may lead to call g_source_unref more than one time and a use-after-free problem eventua...
1
qemuProcessHandleMonitorEOF(qemuMonitorPtr mon, virDomainObjPtr vm, void *opaque) { virQEMUDriverPtr driver = opaque; qemuDomainObjPrivatePtr priv; struct qemuProcessEvent *processEvent; virObjectLock(vm); VIR_DEBUG("Received EOF on %p '%s'",...
296,375,151,272,918,900,000,000,000,000,000,000,000
qemu_process.c
126,512,858,476,313,650,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2021-3975
A use-after-free flaw was found in libvirt. The qemuMonitorUnregister() function in qemuProcessHandleMonitorEOF is called using multiple threads without being adequately protected by a monitor lock. This flaw could be triggered by the virConnectGetAllDomainStats API when the guest is shutting down. An unprivileged clie...
https://nvd.nist.gov/vuln/detail/CVE-2021-3975
329,834
libvirt
1ac703a7d0789e46833f4013a3876c2e3af18ec7
https://github.com/libvirt/libvirt
https://github.com/libvirt/libvirt/commit/1ac703a7d0789e46833f4013a3876c2e3af18ec7
qemu: Add missing lock in qemuProcessHandleMonitorEOF qemuMonitorUnregister will be called in multiple threads (e.g. threads in rpc worker pool and the vm event thread). In some cases, it isn't protected by the monitor lock, which may lead to call g_source_unref more than one time and a use-after-free problem eventua...
0
qemuProcessHandleMonitorEOF(qemuMonitorPtr mon, virDomainObjPtr vm, void *opaque) { virQEMUDriverPtr driver = opaque; qemuDomainObjPrivatePtr priv; struct qemuProcessEvent *processEvent; virObjectLock(vm); VIR_DEBUG("Received EOF on %p '%s'",...
319,210,677,625,955,070,000,000,000,000,000,000,000
qemu_process.c
40,436,527,909,853,784,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2021-3975
A use-after-free flaw was found in libvirt. The qemuMonitorUnregister() function in qemuProcessHandleMonitorEOF is called using multiple threads without being adequately protected by a monitor lock. This flaw could be triggered by the virConnectGetAllDomainStats API when the guest is shutting down. An unprivileged clie...
https://nvd.nist.gov/vuln/detail/CVE-2021-3975
202,126
libnbd
fb4440de9cc76e9c14bd3ddf3333e78621f40ad0
https://github.com/libguestfs/libnbd
https://gitlab.com/nbdkit/libnbd/-/commit/fb4440de9cc76e9c14bd3ddf3333e78621f40ad0
opt_go: Tolerate unplanned server death While debugging some experimental nbdkit code that was triggering an assertion failure in nbdkit, I noticed a secondary failure of nbdsh also dying from an assertion: libnbd: debug: nbdsh: nbd_opt_go: transition: NEWSTYLE.OPT_GO.SEND -> DEAD libnbd: debug: nbdsh: nbd_opt_go: op...
1
nbd_unlocked_opt_go (struct nbd_handle *h) { int err; nbd_completion_callback c = { .callback = go_complete, .user_data = &err }; int r = nbd_unlocked_aio_opt_go (h, &c); if (r == -1) return r; r = wait_for_option (h); if (r == 0 && err) { assert (nbd_internal_is_state_negotiating (get_next_state ...
47,615,101,633,989,830,000,000,000,000,000,000,000
opt.c
71,024,660,452,033,230,000,000,000,000,000,000,000
[ "CWE-617" ]
CVE-2021-20286
A flaw was found in libnbd 1.7.3. An assertion failure in nbd_unlocked_opt_go in ilb/opt.c may lead to denial of service.
https://nvd.nist.gov/vuln/detail/CVE-2021-20286
329,964
libnbd
fb4440de9cc76e9c14bd3ddf3333e78621f40ad0
https://github.com/libguestfs/libnbd
https://gitlab.com/nbdkit/libnbd/-/commit/fb4440de9cc76e9c14bd3ddf3333e78621f40ad0
opt_go: Tolerate unplanned server death While debugging some experimental nbdkit code that was triggering an assertion failure in nbdkit, I noticed a secondary failure of nbdsh also dying from an assertion: libnbd: debug: nbdsh: nbd_opt_go: transition: NEWSTYLE.OPT_GO.SEND -> DEAD libnbd: debug: nbdsh: nbd_opt_go: op...
0
nbd_unlocked_opt_go (struct nbd_handle *h) { int err; nbd_completion_callback c = { .callback = go_complete, .user_data = &err }; int r = nbd_unlocked_aio_opt_go (h, &c); if (r == -1) return r; r = wait_for_option (h); if (r == 0 && err) { assert (nbd_internal_is_state_negotiating (get_next_state ...
129,936,324,755,808,880,000,000,000,000,000,000,000
opt.c
127,494,546,611,368,130,000,000,000,000,000,000,000
[ "CWE-617" ]
CVE-2021-20286
A flaw was found in libnbd 1.7.3. An assertion failure in nbd_unlocked_opt_go in ilb/opt.c may lead to denial of service.
https://nvd.nist.gov/vuln/detail/CVE-2021-20286
202,128
gnutls
5140422e0d7319a8e2fe07f02cbcafc4d6538732
http://git.savannah.gnu.org/cgit/gnutls
https://gitlab.com/gnutls/gnutls/commit/5140422e0d7319a8e2fe07f02cbcafc4d6538732
opencdk: cdk_pk_get_keyid: fix stack overflow Issue found using oss-fuzz: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=340 Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
1
u32 cdk_pk_get_keyid(cdk_pubkey_t pk, u32 * keyid) { u32 lowbits = 0; byte buf[24]; if (pk && (!pk->keyid[0] || !pk->keyid[1])) { if (pk->version < 4 && is_RSA(pk->pubkey_algo)) { byte p[MAX_MPI_BYTES]; size_t n; n = MAX_MPI_BYTES; _gnutls_mpi_print(pk->mpi[0], p, &n); pk->keyid[0] = p[n - ...
320,353,488,162,610,840,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-5336
Stack-based buffer overflow in the cdk_pk_get_keyid function in lib/opencdk/pubkey.c in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allows remote attackers to have unspecified impact via a crafted OpenPGP certificate.
https://nvd.nist.gov/vuln/detail/CVE-2017-5336
329,986
gnutls
5140422e0d7319a8e2fe07f02cbcafc4d6538732
http://git.savannah.gnu.org/cgit/gnutls
https://gitlab.com/gnutls/gnutls/commit/5140422e0d7319a8e2fe07f02cbcafc4d6538732
opencdk: cdk_pk_get_keyid: fix stack overflow Issue found using oss-fuzz: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=340 Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
0
u32 cdk_pk_get_keyid(cdk_pubkey_t pk, u32 * keyid) { u32 lowbits = 0; byte buf[24]; int rc; if (pk && (!pk->keyid[0] || !pk->keyid[1])) { if (pk->version < 4 && is_RSA(pk->pubkey_algo)) { byte p[MAX_MPI_BYTES]; size_t n; n = MAX_MPI_BYTES; rc = _gnutls_mpi_print(pk->mpi[0], p, &n); if (rc < 0 || ...
304,871,630,503,536,520,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2017-5336
Stack-based buffer overflow in the cdk_pk_get_keyid function in lib/opencdk/pubkey.c in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allows remote attackers to have unspecified impact via a crafted OpenPGP certificate.
https://nvd.nist.gov/vuln/detail/CVE-2017-5336
202,134
libbson
42900956dc461dfe7fb91d93361d10737c1602b3
https://github.com/mongodb/libbson
https://github.com/mongodb/libbson/commit/42900956dc461dfe7fb91d93361d10737c1602b3
CDRIVER-2269 Check for zero string length in codewscope
1
bson_iter_codewscope (const bson_iter_t *iter, /* IN */ uint32_t *length, /* OUT */ uint32_t *scope_len, /* OUT */ const uint8_t **scope) /* OUT */ { uint32_t len; BSON_ASSERT (iter); if (ITER_TYPE (iter) == BSON_TYPE_CODEWSCOPE) ...
275,073,406,154,073,070,000,000,000,000,000,000,000
bson-iter.c
89,081,523,405,938,720,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-14227
In MongoDB libbson 1.7.0, the bson_iter_codewscope function in bson-iter.c miscalculates a bson_utf8_validate length argument, which allows remote attackers to cause a denial of service (heap-based buffer over-read in the bson_utf8_validate function in bson-utf8.c), as demonstrated by bson-to-json.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-14227
173,474
mongo-c-driver
0d9a4d98bfdf4acd2c0138d4aaeb4e2e0934bd84
https://github.com/mongodb/mongo-c-driver
https://github.com/mongodb/mongo-c-driver/commit/0d9a4d98bfdf4acd2c0138d4aaeb4e2e0934bd84
Fix for CVE-2018-16790 -- Verify bounds before binary length read. As reported here: https://jira.mongodb.org/browse/CDRIVER-2819, a heap overread occurs due a failure to correctly verify data bounds. In the original check, len - o returns the data left including the sizeof(l) we just read. Instead, the comparison sh...
0
bson_iter_codewscope (const bson_iter_t *iter, /* IN */ uint32_t *length, /* OUT */ uint32_t *scope_len, /* OUT */ const uint8_t **scope) /* OUT */ { uint32_t len; BSON_ASSERT (iter); if (ITER_TYPE (iter) == BSON_TYPE_CODEWSCOPE) ...
106,364,726,993,804,840,000,000,000,000,000,000,000
bson-iter.c
108,063,000,104,905,270,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-16790
_bson_iter_next_internal in bson-iter.c in libbson 1.12.0, as used in MongoDB mongo-c-driver and other products, has a heap-based buffer over-read via a crafted bson buffer.
https://nvd.nist.gov/vuln/detail/CVE-2018-16790
202,137
kvm
c73f4c998e1fd4249b9edfa39e23f4fda2b9b041
http://git.kernel.org/?p=linux/kernel/git/avi/kvm
https://git.kernel.org/pub/scm/virt/kvm/kvm.git/commit/?id=c73f4c998e1fd4249b9edfa39e23f4fda2b9b041
KVM: x86: nVMX: fix x2APIC VTPR read intercept Referring to the "VIRTUALIZING MSR-BASED APIC ACCESSES" chapter of the SDM, when "virtualize x2APIC mode" is 1 and "APIC-register virtualization" is 0, a RDMSR of 808H should return the VTPR from the virtual APIC page. However, for nested, KVM currently fails to disable ...
1
static inline bool nested_vmx_prepare_msr_bitmap(struct kvm_vcpu *vcpu, struct vmcs12 *vmcs12) { int msr; struct page *page; unsigned long *msr_bitmap_l1; unsigned long *msr_bitmap_l0 = to_vmx(vcpu)->nested.vmcs02.msr_bitmap; /* * pred_cmd & spec_ctrl are trying to verify two things: * * 1. L0 gave a ...
83,250,227,838,054,760,000,000,000,000,000,000,000
nested.c
85,075,074,444,242,950,000,000,000,000,000,000,000
[ "CWE-863" ]
CVE-2019-3887
A flaw was found in the way KVM hypervisor handled x2APIC Machine Specific Rregister (MSR) access with nested(=1) virtualization enabled. In that, L1 guest could access L0's APIC register values via L2 guest, when 'virtualize x2APIC mode' is enabled. A guest could use this flaw to potentially crash the host kernel resu...
https://nvd.nist.gov/vuln/detail/CVE-2019-3887
330,058
kvm
c73f4c998e1fd4249b9edfa39e23f4fda2b9b041
http://git.kernel.org/?p=linux/kernel/git/avi/kvm
https://git.kernel.org/pub/scm/virt/kvm/kvm.git/commit/?id=c73f4c998e1fd4249b9edfa39e23f4fda2b9b041
KVM: x86: nVMX: fix x2APIC VTPR read intercept Referring to the "VIRTUALIZING MSR-BASED APIC ACCESSES" chapter of the SDM, when "virtualize x2APIC mode" is 1 and "APIC-register virtualization" is 0, a RDMSR of 808H should return the VTPR from the virtual APIC page. However, for nested, KVM currently fails to disable ...
0
static inline bool nested_vmx_prepare_msr_bitmap(struct kvm_vcpu *vcpu, struct vmcs12 *vmcs12) { int msr; struct page *page; unsigned long *msr_bitmap_l1; unsigned long *msr_bitmap_l0 = to_vmx(vcpu)->nested.vmcs02.msr_bitmap; /* * pred_cmd & spec_ctrl are trying to verify two things: * * 1. L0 gave a ...
270,136,478,091,988,850,000,000,000,000,000,000,000
nested.c
205,519,902,988,124,440,000,000,000,000,000,000,000
[ "CWE-863" ]
CVE-2019-3887
A flaw was found in the way KVM hypervisor handled x2APIC Machine Specific Rregister (MSR) access with nested(=1) virtualization enabled. In that, L1 guest could access L0's APIC register values via L2 guest, when 'virtualize x2APIC mode' is enabled. A guest could use this flaw to potentially crash the host kernel resu...
https://nvd.nist.gov/vuln/detail/CVE-2019-3887
202,138
ImageMagick
be90a5395695f0d19479a5d46b06c678be7f7927
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/be90a5395695f0d19479a5d46b06c678be7f7927
https://github.com/ImageMagick/ImageMagick/issues/1721
1
MagickExport MagickBooleanType SubstituteString(char **string, const char *search,const char *replace) { MagickBooleanType status; register char *p; size_t extent, replace_extent, search_extent; ssize_t offset; status=MagickFalse; search_extent=0, replace_extent=0; for (p=s...
247,015,584,148,195,800,000,000,000,000,000,000,000
string.c
148,311,678,202,187,430,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2020-27770
Due to a missing check for 0 value of `replace_extent`, it is possible for offset `p` to overflow in SubstituteString(), causing potential impact to application availability. This could be triggered by a crafted input file that is processed by ImageMagick. This flaw affects ImageMagick versions prior to 7.0.8-68.
https://nvd.nist.gov/vuln/detail/CVE-2020-27770
330,211
ImageMagick
be90a5395695f0d19479a5d46b06c678be7f7927
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/be90a5395695f0d19479a5d46b06c678be7f7927
https://github.com/ImageMagick/ImageMagick/issues/1721
0
MagickExport MagickBooleanType SubstituteString(char **string, const char *search,const char *replace) { MagickBooleanType status; register char *p; size_t extent, replace_extent, search_extent; ssize_t offset; status=MagickFalse; search_extent=0, replace_extent=0; for (p=s...
63,558,597,364,294,190,000,000,000,000,000,000,000
string.c
150,784,112,848,810,580,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2020-27770
Due to a missing check for 0 value of `replace_extent`, it is possible for offset `p` to overflow in SubstituteString(), causing potential impact to application availability. This could be triggered by a crafted input file that is processed by ImageMagick. This flaw affects ImageMagick versions prior to 7.0.8-68.
https://nvd.nist.gov/vuln/detail/CVE-2020-27770
202,142
flac
5b3033a2b355068c11fe637e14ac742d273f076e
https://github.com/xiph/flac
https://git.xiph.org/?p=flac.git;a=commitdiff;h=5b3033a2b355068c11fe637e14ac742d273f076e
src/libFLAC/stream_decoder.c : Fix buffer read overflow. This is CVE-2014-8962. Reported-by: Michele Spagnuolo, Google Security Team <mikispag@google.com>
1
FLAC__bool find_metadata_(FLAC__StreamDecoder *decoder) { FLAC__uint32 x; unsigned i, id; FLAC__bool first = true; FLAC__ASSERT(FLAC__bitreader_is_consumed_byte_aligned(decoder->private_->input)); for(i = id = 0; i < 4; ) { if(decoder->private_->cached) { x = (FLAC__uint32)decoder->private_->lookahead; d...
180,429,322,722,676,660,000,000,000,000,000,000,000
stream_decoder.c
115,711,489,701,705,800,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2014-8962
Stack-based buffer overflow in stream_decoder.c in libFLAC before 1.3.1 allows remote attackers to execute arbitrary code via a crafted .flac file.
https://nvd.nist.gov/vuln/detail/CVE-2014-8962
155,111
Android
b499389da21d89d32deff500376c5ee4f8f0b04c
None
https://android.googlesource.com/platform/external/flac/+/b499389da21d89d32deff500376c5ee4f8f0b04c
None
0
FLAC__bool find_metadata_(FLAC__StreamDecoder *decoder) { FLAC__uint32 x; unsigned i, id; FLAC__bool first = true; FLAC__ASSERT(FLAC__bitreader_is_consumed_byte_aligned(decoder->private_->input)); for(i = id = 0; i < 4; ) { if(decoder->private_->cached) { x = (FLAC__uint32)decoder->private_->lookahead; de...
23,178,345,795,516,820,000,000,000,000,000,000,000
stream_decoder.c
331,429,774,554,564,650,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-2429
libFLAC/stream_decoder.c in mediaserver in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-05-01 does not prevent free operations on uninitialized memory, which allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted med...
https://nvd.nist.gov/vuln/detail/CVE-2016-2429
202,147
squid
bc9786119f058a76ddf0625424bc33d36460b9a2
https://github.com/squid-cache/squid
https://github.com/squid-cache/squid/commit/bc9786119f058a76ddf0625424bc33d36460b9a2
Fix memory leak when parsing SNMP packet (#313) SNMP queries denied by snmp_access rules and queries with certain unsupported SNMPv2 commands were leaking a few hundred bytes each. Such queries trigger "SNMP agent query DENIED from..." WARNINGs in cache.log.
1
snmpDecodePacket(SnmpRequest * rq) { struct snmp_pdu *PDU; u_char *Community; u_char *buf = rq->buf; int len = rq->len; allow_t allow = ACCESS_DENIED; if (!Config.accessList.snmp) { debugs(49, DBG_IMPORTANT, "WARNING: snmp_access not configured. agent query DENIED from : " << rq->from);...
229,305,215,408,163,860,000,000,000,000,000,000,000
snmp_core.cc
145,255,345,217,990,060,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2018-19132
Squid before 4.4, when SNMP is enabled, allows a denial of service (Memory Leak) via an SNMP packet.
https://nvd.nist.gov/vuln/detail/CVE-2018-19132
330,586
squid
bc9786119f058a76ddf0625424bc33d36460b9a2
https://github.com/squid-cache/squid
https://github.com/squid-cache/squid/commit/bc9786119f058a76ddf0625424bc33d36460b9a2
Fix memory leak when parsing SNMP packet (#313) SNMP queries denied by snmp_access rules and queries with certain unsupported SNMPv2 commands were leaking a few hundred bytes each. Such queries trigger "SNMP agent query DENIED from..." WARNINGs in cache.log.
0
snmpDecodePacket(SnmpRequest * rq) { struct snmp_pdu *PDU; u_char *Community; u_char *buf = rq->buf; int len = rq->len; allow_t allow = ACCESS_DENIED; if (!Config.accessList.snmp) { debugs(49, DBG_IMPORTANT, "WARNING: snmp_access not configured. agent query DENIED from : " << rq->from);...
335,564,517,486,763,000,000,000,000,000,000,000,000
snmp_core.cc
76,694,978,994,968,035,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2018-19132
Squid before 4.4, when SNMP is enabled, allows a denial of service (Memory Leak) via an SNMP packet.
https://nvd.nist.gov/vuln/detail/CVE-2018-19132
202,164
php-src
1cc2182bcc81e185c14837e659d12b268cb99d63
https://github.com/php/php-src
http://git.php.net/?p=php-src.git;a=commit;h=1cc2182bcc81e185c14837e659d12b268cb99d63
Fix bug #77380 (Global out of bounds read in xmlrpc base64 code)
1
void base64_decode_xmlrpc(struct buffer_st *bfr, const char *source, int length) { int i; int offset = 0; int endoffile; int count; buffer_new(bfr); for (i = 0; i < 255; i++) { dtable[i] = 0x80; } for (i = 'A'; i <= 'Z'; i++) { dtable[i] = 0 + (i - 'A'); } for (i = 'a'...
177,601,521,839,748,800,000,000,000,000,000,000,000
base64.c
203,306,527,348,640,560,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-9024
An issue was discovered in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1. xmlrpc_decode() can allow a hostile XMLRPC server to cause PHP to read memory outside of allocated areas in base64_decode_xmlrpc in ext/xmlrpc/libxmlrpc/base64.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-9024
330,596
php-src
1cc2182bcc81e185c14837e659d12b268cb99d63
https://github.com/php/php-src
http://git.php.net/?p=php-src.git;a=commit;h=1cc2182bcc81e185c14837e659d12b268cb99d63
Fix bug #77380 (Global out of bounds read in xmlrpc base64 code)
0
void base64_decode_xmlrpc(struct buffer_st *bfr, const char *source, int length) { int i; int offset = 0; int endoffile; int count; buffer_new(bfr); for (i = 0; i < 255; i++) { dtable[i] = 0x80; } for (i = 'A'; i <= 'Z'; i++) { dtable[i] = 0 + (i - 'A'); } for (i = 'a'...
215,161,175,076,392,330,000,000,000,000,000,000,000
base64.c
336,539,182,073,183,360,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-9024
An issue was discovered in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1. xmlrpc_decode() can allow a hostile XMLRPC server to cause PHP to read memory outside of allocated areas in base64_decode_xmlrpc in ext/xmlrpc/libxmlrpc/base64.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-9024
202,170
ghostpdl
863ada11f9a942a622a581312e2be022d9e2a6f7
https://github.com/ArtifexSoftware/ghostpdl
https://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=863ada11f9a942a622a581312e2be022d9e2a6f7
Bug 701793: check we are within buffer before comparing buffer contents. Fixes: ./sanbin/gs -sOutputFile=tmp -sDEVICE=mj700v2c ../bug-701793.pdf
1
mj_raster_cmd(int c_id, int in_size, byte* in, byte* buf2, gx_device_printer* pdev, gp_file* prn_stream) { int band_size = 1; /* 1, 8, or 24 */ byte *out = buf2; int width = in_size; int count; byte* in_end = in + in_size; static char colour_number[] = "\004\001\002\000"; /* color ID for M...
295,676,707,606,288,170,000,000,000,000,000,000,000
gdevmjc.c
297,006,271,957,475,500,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2020-16292
A buffer overflow vulnerability in mj_raster_cmd() in contrib/japanese/gdevmjc.c of Artifex Software GhostScript v9.50 allows a remote attacker to cause a denial of service via a crafted PDF file. This is fixed in v9.51.
https://nvd.nist.gov/vuln/detail/CVE-2020-16292
330,751
ghostpdl
863ada11f9a942a622a581312e2be022d9e2a6f7
https://github.com/ArtifexSoftware/ghostpdl
https://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=863ada11f9a942a622a581312e2be022d9e2a6f7
Bug 701793: check we are within buffer before comparing buffer contents. Fixes: ./sanbin/gs -sOutputFile=tmp -sDEVICE=mj700v2c ../bug-701793.pdf
0
mj_raster_cmd(int c_id, int in_size, byte* in, byte* buf2, gx_device_printer* pdev, gp_file* prn_stream) { int band_size = 1; /* 1, 8, or 24 */ byte *out = buf2; int width = in_size; int count; byte* in_end = in + in_size; static char colour_number[] = "\004\001\002\000"; /* color ID for M...
96,413,807,475,260,330,000,000,000,000,000,000,000
gdevmjc.c
171,261,658,968,975,040,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2020-16292
A buffer overflow vulnerability in mj_raster_cmd() in contrib/japanese/gdevmjc.c of Artifex Software GhostScript v9.50 allows a remote attacker to cause a denial of service via a crafted PDF file. This is fixed in v9.51.
https://nvd.nist.gov/vuln/detail/CVE-2020-16292
202,173
mod_wsgi
b0a149c1f5e569932325972e2e20176a42e43517
https://github.com/GrahamDumpleton/mod_wsgi
https://github.com/GrahamDumpleton/mod_wsgi/commit/b0a149c1f5e569932325972e2e20176a42e43517
Fix bug where content type returned for response could be corrupted when using embedded mode.
1
static int Adapter_output(AdapterObject *self, const char *data, int length, int exception_when_aborted) { int i = 0; int n = 0; apr_status_t rv; request_rec *r; #if defined(MOD_WSGI_WITH_DAEMONS) if (wsgi_inactivity_timeout) { apr_thread_mutex_lock(wsgi_shutdown_l...
256,893,926,997,418,600,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2014-0242
mod_wsgi module before 3.4 for Apache, when used in embedded mode, might allow remote attackers to obtain sensitive information via the Content-Type header which is generated from memory that may have been freed and then overwritten by a separate thread.
https://nvd.nist.gov/vuln/detail/CVE-2014-0242
330,929
mod_wsgi
b0a149c1f5e569932325972e2e20176a42e43517
https://github.com/GrahamDumpleton/mod_wsgi
https://github.com/GrahamDumpleton/mod_wsgi/commit/b0a149c1f5e569932325972e2e20176a42e43517
Fix bug where content type returned for response could be corrupted when using embedded mode.
0
static int Adapter_output(AdapterObject *self, const char *data, int length, int exception_when_aborted) { int i = 0; int n = 0; apr_status_t rv; request_rec *r; #if defined(MOD_WSGI_WITH_DAEMONS) if (wsgi_inactivity_timeout) { apr_thread_mutex_lock(wsgi_shutdown_l...
319,800,051,204,699,860,000,000,000,000,000,000,000
mod_wsgi.c
126,965,859,754,709,700,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2014-0242
mod_wsgi module before 3.4 for Apache, when used in embedded mode, might allow remote attackers to obtain sensitive information via the Content-Type header which is generated from memory that may have been freed and then overwritten by a separate thread.
https://nvd.nist.gov/vuln/detail/CVE-2014-0242
202,175
libjpeg-turbo
3d9c64e9f8aa1ee954d1d0bb3390fc894bb84da3
https://github.com/libjpeg-turbo/libjpeg-turbo
https://github.com/libjpeg-turbo/libjpeg-turbo/commit/3d9c64e9f8aa1ee954d1d0bb3390fc894bb84da3
tjLoadImage(): Fix int overflow/segfault w/big BMP Fixes #304
1
DLLEXPORT unsigned char *tjLoadImage(const char *filename, int *width, int align, int *height, int *pixelFormat, int flags) { int retval = 0, tempc, pitch; tjhandle handle = NULL; tjinstance *this; j_compress_ptr cinfo = NULL; cjpeg_sou...
90,431,479,952,001,210,000,000,000,000,000,000,000
turbojpeg.c
172,113,581,112,298,570,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2018-20330
The tjLoadImage function in libjpeg-turbo 2.0.1 has an integer overflow with a resultant heap-based buffer overflow via a BMP image because multiplication of pitch and height is mishandled, as demonstrated by tjbench.
https://nvd.nist.gov/vuln/detail/CVE-2018-20330
331,065
libjpeg-turbo
3d9c64e9f8aa1ee954d1d0bb3390fc894bb84da3
https://github.com/libjpeg-turbo/libjpeg-turbo
https://github.com/libjpeg-turbo/libjpeg-turbo/commit/3d9c64e9f8aa1ee954d1d0bb3390fc894bb84da3
tjLoadImage(): Fix int overflow/segfault w/big BMP Fixes #304
0
DLLEXPORT unsigned char *tjLoadImage(const char *filename, int *width, int align, int *height, int *pixelFormat, int flags) { int retval = 0, tempc; size_t pitch; tjhandle handle = NULL; tjinstance *this; j_compress_ptr cinfo = NULL; ...
163,974,517,268,169,150,000,000,000,000,000,000,000
turbojpeg.c
125,871,081,058,006,600,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2018-20330
The tjLoadImage function in libjpeg-turbo 2.0.1 has an integer overflow with a resultant heap-based buffer overflow via a BMP image because multiplication of pitch and height is mishandled, as demonstrated by tjbench.
https://nvd.nist.gov/vuln/detail/CVE-2018-20330
202,213
mutt
04b06aaa3e0cc0022b9b01dbca2863756ebbf59a
https://github.com/muttmua/mutt
https://gitlab.com/muttmua/mutt/-/commit/04b06aaa3e0cc0022b9b01dbca2863756ebbf59a
Ensure IMAP connection is closed after a connection error. During connection, if the server provided an illegal initial response, Mutt "bailed", but did not actually close the connection. The calling code unfortunately relied on the connection status to decide to continue with authentication, instead of checking the ...
1
int imap_open_connection (IMAP_DATA* idata) { if (mutt_socket_open (idata->conn) < 0) return -1; idata->state = IMAP_CONNECTED; if (imap_cmd_step (idata) != IMAP_CMD_OK) { imap_close_connection (idata); return -1; } if (ascii_strncasecmp ("* OK", idata->buf, 4) == 0) { if (ascii_strncas...
174,178,878,428,139,360,000,000,000,000,000,000,000
None
null
[ "CWE-287" ]
CVE-2020-28896
Mutt before 2.0.2 and NeoMutt before 2020-11-20 did not ensure that $ssl_force_tls was processed if an IMAP server's initial server response was invalid. The connection was not properly closed, and the code could continue attempting to authenticate. This could result in authentication credentials being exposed on an un...
https://nvd.nist.gov/vuln/detail/CVE-2020-28896
331,259
mutt
04b06aaa3e0cc0022b9b01dbca2863756ebbf59a
https://github.com/muttmua/mutt
https://gitlab.com/muttmua/mutt/-/commit/04b06aaa3e0cc0022b9b01dbca2863756ebbf59a
Ensure IMAP connection is closed after a connection error. During connection, if the server provided an illegal initial response, Mutt "bailed", but did not actually close the connection. The calling code unfortunately relied on the connection status to decide to continue with authentication, instead of checking the ...
0
int imap_open_connection (IMAP_DATA* idata) { if (mutt_socket_open (idata->conn) < 0) return -1; idata->state = IMAP_CONNECTED; if (imap_cmd_step (idata) != IMAP_CMD_OK) { imap_close_connection (idata); return -1; } if (ascii_strncasecmp ("* OK", idata->buf, 4) == 0) { if (ascii_strncas...
189,886,521,713,593,770,000,000,000,000,000,000,000
None
null
[ "CWE-287" ]
CVE-2020-28896
Mutt before 2.0.2 and NeoMutt before 2020-11-20 did not ensure that $ssl_force_tls was processed if an IMAP server's initial server response was invalid. The connection was not properly closed, and the code could continue attempting to authenticate. This could result in authentication credentials being exposed on an un...
https://nvd.nist.gov/vuln/detail/CVE-2020-28896
202,221
linux
0771cbb3b97d3c1d68eecd7f00055f599954c34e
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/bluetooth/sco.c?h=v5.16&id=0771cbb3b97d3c1d68eecd7f00055f599954c34e
Bluetooth: SCO: Replace use of memcpy_from_msg with bt_skb_sendmsg This makes use of bt_skb_sendmsg instead of allocating a different buffer to be used with memcpy_from_msg which cause one extra copy. Signed-off-by: Luiz Augusto von Dentz <luiz.von.dentz@intel.com> Signed-off-by: Marcel Holtmann <marcel@holtmann.org>
1
static int sco_sock_sendmsg(struct socket *sock, struct msghdr *msg, size_t len) { struct sock *sk = sock->sk; void *buf; int err; BT_DBG("sock %p, sk %p", sock, sk); err = sock_error(sk); if (err) return err; if (msg->msg_flags & MSG_OOB) return -EOPNOTSUPP; buf = kmalloc(len, GFP_KERNEL); if (...
216,798,976,516,931,300,000,000,000,000,000,000,000
sco.c
45,873,663,657,047,450,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2021-3640
A flaw use-after-free in function sco_sock_sendmsg() of the Linux kernel HCI subsystem was found in the way user calls ioct UFFDIO_REGISTER or other way triggers race condition of the call sco_conn_del() together with the call sco_sock_sendmsg() with the expected controllable faulting memory page. A privileged local us...
https://nvd.nist.gov/vuln/detail/CVE-2021-3640
331,459
linux
0771cbb3b97d3c1d68eecd7f00055f599954c34e
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/bluetooth/sco.c?h=v5.16&id=0771cbb3b97d3c1d68eecd7f00055f599954c34e
Bluetooth: SCO: Replace use of memcpy_from_msg with bt_skb_sendmsg This makes use of bt_skb_sendmsg instead of allocating a different buffer to be used with memcpy_from_msg which cause one extra copy. Signed-off-by: Luiz Augusto von Dentz <luiz.von.dentz@intel.com> Signed-off-by: Marcel Holtmann <marcel@holtmann.org>
0
static int sco_sock_sendmsg(struct socket *sock, struct msghdr *msg, size_t len) { struct sock *sk = sock->sk; struct sk_buff *skb; int err; BT_DBG("sock %p, sk %p", sock, sk); err = sock_error(sk); if (err) return err; if (msg->msg_flags & MSG_OOB) return -EOPNOTSUPP; skb = bt_skb_sendmsg(sk, ms...
153,915,987,707,769,190,000,000,000,000,000,000,000
sco.c
83,743,780,750,720,340,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2021-3640
A flaw use-after-free in function sco_sock_sendmsg() of the Linux kernel HCI subsystem was found in the way user calls ioct UFFDIO_REGISTER or other way triggers race condition of the call sco_conn_del() together with the call sco_sock_sendmsg() with the expected controllable faulting memory page. A privileged local us...
https://nvd.nist.gov/vuln/detail/CVE-2021-3640
202,222
unbound
34e52a4313d59b9d57e928c44300fd81e1a48910
https://github.com/NLnetLabs/unbound
https://github.com/NLnetLabs/unbound/commit/34e52a4313d59b9d57e928c44300fd81e1a48910
Fix CVE-2019-18934, shell execution in ipsecmod.
1
call_hook(struct module_qstate* qstate, struct ipsecmod_qstate* iq, struct ipsecmod_env* ATTR_UNUSED(ie)) { size_t slen, tempdata_len, tempstring_len, i; char str[65535], *s, *tempstring; int w; struct ub_packed_rrset_key* rrset_key; struct packed_rrset_data* rrset_data; uint8_t *tempdata; /* Check if a shell ...
110,105,752,634,307,020,000,000,000,000,000,000,000
ipsecmod.c
305,184,166,617,009,700,000,000,000,000,000,000,000
[ "CWE-78" ]
CVE-2019-18934
Unbound 1.6.4 through 1.9.4 contain a vulnerability in the ipsec module that can cause shell code execution after receiving a specially crafted answer. This issue can only be triggered if unbound was compiled with `--enable-ipsecmod` support, and ipsecmod is enabled and used in the configuration.
https://nvd.nist.gov/vuln/detail/CVE-2019-18934
331,467
unbound
34e52a4313d59b9d57e928c44300fd81e1a48910
https://github.com/NLnetLabs/unbound
https://github.com/NLnetLabs/unbound/commit/34e52a4313d59b9d57e928c44300fd81e1a48910
Fix CVE-2019-18934, shell execution in ipsecmod.
0
call_hook(struct module_qstate* qstate, struct ipsecmod_qstate* iq, struct ipsecmod_env* ATTR_UNUSED(ie)) { size_t slen, tempdata_len, tempstring_len, i; char str[65535], *s, *tempstring; int w = 0, w_temp, qtype; struct ub_packed_rrset_key* rrset_key; struct packed_rrset_data* rrset_data; uint8_t *tempdata; /...
326,752,930,817,361,400,000,000,000,000,000,000,000
ipsecmod.c
56,594,633,517,206,720,000,000,000,000,000,000,000
[ "CWE-78" ]
CVE-2019-18934
Unbound 1.6.4 through 1.9.4 contain a vulnerability in the ipsec module that can cause shell code execution after receiving a specially crafted answer. This issue can only be triggered if unbound was compiled with `--enable-ipsecmod` support, and ipsecmod is enabled and used in the configuration.
https://nvd.nist.gov/vuln/detail/CVE-2019-18934
202,225
sssd
ed90a20a0f0e936eb00d268080716c0384ffb01d
http://git.fedorahosted.org/git/?p=sssd
https://github.com/SSSD/sssd/commit/ed90a20a0f0e936eb00d268080716c0384ffb01d
SUDO: Create the socket with stricter permissions This patch switches the sudo responder from being created as a public responder where the permissions are open and not checked by the sssd deaamon to a private socket. In this case, sssd creates the pipes with strict permissions (see the umask in the call to create_pip...
1
int sudo_process_init(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct confdb_ctx *cdb) { struct resp_ctx *rctx; struct sss_cmd_table *sudo_cmds; struct sudo_ctx *sudo_ctx; struct be_conn *iter; int ret; int max_retries; sudo_cmds = get_sudo...
327,340,968,884,057,570,000,000,000,000,000,000,000
sudosrv.c
213,093,642,579,786,900,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2018-10852
The UNIX pipe which sudo uses to contact SSSD and read the available sudo rules from SSSD has too wide permissions, which means that anyone who can send a message using the same raw protocol that sudo and SSSD use can read the sudo rules available for any user. This affects versions of SSSD before 1.16.3.
https://nvd.nist.gov/vuln/detail/CVE-2018-10852
331,479
sssd
ed90a20a0f0e936eb00d268080716c0384ffb01d
http://git.fedorahosted.org/git/?p=sssd
https://github.com/SSSD/sssd/commit/ed90a20a0f0e936eb00d268080716c0384ffb01d
SUDO: Create the socket with stricter permissions This patch switches the sudo responder from being created as a public responder where the permissions are open and not checked by the sssd deaamon to a private socket. In this case, sssd creates the pipes with strict permissions (see the umask in the call to create_pip...
0
int sudo_process_init(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct confdb_ctx *cdb) { struct resp_ctx *rctx; struct sss_cmd_table *sudo_cmds; struct sudo_ctx *sudo_ctx; struct be_conn *iter; int ret; int max_retries; sudo_cmds = get_sudo...
330,031,065,258,789,200,000,000,000,000,000,000,000
sudosrv.c
24,116,243,365,830,457,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2018-10852
The UNIX pipe which sudo uses to contact SSSD and read the available sudo rules from SSSD has too wide permissions, which means that anyone who can send a message using the same raw protocol that sudo and SSSD use can read the sudo rules available for any user. This affects versions of SSSD before 1.16.3.
https://nvd.nist.gov/vuln/detail/CVE-2018-10852
202,260
PackageKit
7e8a7905ea9abbd1f384f05f36a4458682cd4697
https://github.com/hughsie/PackageKit
https://github.com/hughsie/PackageKit/commit/7e8a7905ea9abbd1f384f05f36a4458682cd4697
Do not set JUST_REINSTALL on any kind of auth failure If we try to continue the auth queue when it has been cancelled (or failed) then we fall upon the obscure JUST_REINSTALL transaction flag which only the DNF backend actually verifies. Many thanks to Matthias Gerstner <mgerstner@suse.de> for spotting the problem.
1
pk_transaction_authorize_actions_finished_cb (GObject *source_object, GAsyncResult *res, struct AuthorizeActionsData *data) { const gchar *action_id = NULL; PkTransactionPrivate *priv = data->transaction->priv; g_autoptr(GError) error = NULL; g_autoptr(PolkitAuthorizationResult) result = NULL;...
60,746,594,312,356,130,000,000,000,000,000,000,000
pk-transaction.c
104,377,437,017,936,000,000,000,000,000,000,000,000
[ "CWE-287" ]
CVE-2018-1106
An authentication bypass flaw has been found in PackageKit before 1.1.10 that allows users without administrator privileges to install signed packages. A local attacker can use this vulnerability to install vulnerable packages to further compromise a system.
https://nvd.nist.gov/vuln/detail/CVE-2018-1106
332,019
PackageKit
7e8a7905ea9abbd1f384f05f36a4458682cd4697
https://github.com/hughsie/PackageKit
https://github.com/hughsie/PackageKit/commit/7e8a7905ea9abbd1f384f05f36a4458682cd4697
Do not set JUST_REINSTALL on any kind of auth failure If we try to continue the auth queue when it has been cancelled (or failed) then we fall upon the obscure JUST_REINSTALL transaction flag which only the DNF backend actually verifies. Many thanks to Matthias Gerstner <mgerstner@suse.de> for spotting the problem.
0
pk_transaction_authorize_actions_finished_cb (GObject *source_object, GAsyncResult *res, struct AuthorizeActionsData *data) { const gchar *action_id = NULL; PkTransactionPrivate *priv = data->transaction->priv; g_autoptr(GError) error = NULL; g_autoptr(PolkitAuthorizationResult) result = NULL;...
149,381,010,979,509,420,000,000,000,000,000,000,000
pk-transaction.c
30,382,453,265,029,820,000,000,000,000,000,000,000
[ "CWE-287" ]
CVE-2018-1106
An authentication bypass flaw has been found in PackageKit before 1.1.10 that allows users without administrator privileges to install signed packages. A local attacker can use this vulnerability to install vulnerable packages to further compromise a system.
https://nvd.nist.gov/vuln/detail/CVE-2018-1106
202,262
libtasn1
1c3ccb3e040bf13e342ee60bc23b21b97b11923f
http://git.savannah.gnu.org/cgit/libtasn1
http://git.savannah.gnu.org/cgit/libtasn1.git/commit/?id=1c3ccb3e040bf13e342ee60bc23b21b97b11923f
Do not return illegal values in asn1_get_bit_der().
1
asn1_get_bit_der (const unsigned char *der, int der_len, int *ret_len, unsigned char *str, int str_size, int *bit_len) { int len_len, len_byte; if (der_len <= 0) return ASN1_GENERIC_ERROR; len_byte = asn1_get_length_der (der, der_len, &len_len) - 1; if (len_byte < 0) return ASN1_DER_ERROR; *...
290,542,336,623,151,250,000,000,000,000,000,000,000
decoding.c
331,599,435,441,657,880,000,000,000,000,000,000,000
[ "CWE-131" ]
CVE-2014-3468
The asn1_get_bit_der function in GNU Libtasn1 before 3.6 does not properly report an error when a negative bit length is identified, which allows context-dependent attackers to cause out-of-bounds access via crafted ASN.1 data.
https://nvd.nist.gov/vuln/detail/CVE-2014-3468
332,023
libtasn1
1c3ccb3e040bf13e342ee60bc23b21b97b11923f
http://git.savannah.gnu.org/cgit/libtasn1
http://git.savannah.gnu.org/cgit/libtasn1.git/commit/?id=1c3ccb3e040bf13e342ee60bc23b21b97b11923f
Do not return illegal values in asn1_get_bit_der().
0
asn1_get_bit_der (const unsigned char *der, int der_len, int *ret_len, unsigned char *str, int str_size, int *bit_len) { int len_len = 0, len_byte; if (der_len <= 0) return ASN1_GENERIC_ERROR; len_byte = asn1_get_length_der (der, der_len, &len_len) - 1; if (len_byte < 0) return ASN1_DER_ERROR; ...
25,812,587,339,534,590,000,000,000,000,000,000,000
decoding.c
303,930,639,416,837,250,000,000,000,000,000,000,000
[ "CWE-131" ]
CVE-2014-3468
The asn1_get_bit_der function in GNU Libtasn1 before 3.6 does not properly report an error when a negative bit length is identified, which allows context-dependent attackers to cause out-of-bounds access via crafted ASN.1 data.
https://nvd.nist.gov/vuln/detail/CVE-2014-3468
202,263
sddm
147cec383892d143b5e02daa70f1e7def50f5d98
https://github.com/sddm/sddm
https://github.com/sddm/sddm/commit/147cec383892d143b5e02daa70f1e7def50f5d98
Fix authentication when reusing an existing session - Check the success value before unlocking the session - Don't attempt to use the nonexistant "sddm-check" PAM service
1
bool PamBackend::start(const QString &user) { bool result; QString service = QStringLiteral("sddm"); if (user == QStringLiteral("sddm") && m_greeter) service = QStringLiteral("sddm-greeter"); else if (m_app->session()->path().isEmpty()) service = QStringLite...
88,219,923,637,363,900,000,000,000,000,000,000,000
PamBackend.cpp
90,720,448,102,591,840,000,000,000,000,000,000,000
[ "CWE-284" ]
CVE-2018-14345
An issue was discovered in SDDM through 0.17.0. If configured with ReuseSession=true, the password is not checked for users with an already existing session. Any user with access to the system D-Bus can therefore unlock any graphical session. This is related to daemon/Display.cpp and helper/backend/PamBackend.cpp.
https://nvd.nist.gov/vuln/detail/CVE-2018-14345
332,059
sddm
147cec383892d143b5e02daa70f1e7def50f5d98
https://github.com/sddm/sddm
https://github.com/sddm/sddm/commit/147cec383892d143b5e02daa70f1e7def50f5d98
Fix authentication when reusing an existing session - Check the success value before unlocking the session - Don't attempt to use the nonexistant "sddm-check" PAM service
0
bool PamBackend::start(const QString &user) { bool result; QString service = QStringLiteral("sddm"); if (user == QStringLiteral("sddm") && m_greeter) service = QStringLiteral("sddm-greeter"); else if (m_autologin) service = QStringLiteral("sddm-autologin"); ...
137,647,895,560,702,280,000,000,000,000,000,000,000
PamBackend.cpp
133,685,894,619,428,090,000,000,000,000,000,000,000
[ "CWE-284" ]
CVE-2018-14345
An issue was discovered in SDDM through 0.17.0. If configured with ReuseSession=true, the password is not checked for users with an already existing session. Any user with access to the system D-Bus can therefore unlock any graphical session. This is related to daemon/Display.cpp and helper/backend/PamBackend.cpp.
https://nvd.nist.gov/vuln/detail/CVE-2018-14345
202,264
sddm
147cec383892d143b5e02daa70f1e7def50f5d98
https://github.com/sddm/sddm
https://github.com/sddm/sddm/commit/147cec383892d143b5e02daa70f1e7def50f5d98
Fix authentication when reusing an existing session - Check the success value before unlocking the session - Don't attempt to use the nonexistant "sddm-check" PAM service
1
void Display::startAuth(const QString &user, const QString &password, const Session &session) { m_passPhrase = password; // sanity check if (!session.isValid()) { qCritical() << "Invalid session" << session.fileName(); return; } if (session.xdgSession...
327,396,237,864,777,600,000,000,000,000,000,000,000
Display.cpp
72,356,549,567,103,510,000,000,000,000,000,000,000
[ "CWE-284" ]
CVE-2018-14345
An issue was discovered in SDDM through 0.17.0. If configured with ReuseSession=true, the password is not checked for users with an already existing session. Any user with access to the system D-Bus can therefore unlock any graphical session. This is related to daemon/Display.cpp and helper/backend/PamBackend.cpp.
https://nvd.nist.gov/vuln/detail/CVE-2018-14345
332,048
sddm
147cec383892d143b5e02daa70f1e7def50f5d98
https://github.com/sddm/sddm
https://github.com/sddm/sddm/commit/147cec383892d143b5e02daa70f1e7def50f5d98
Fix authentication when reusing an existing session - Check the success value before unlocking the session - Don't attempt to use the nonexistant "sddm-check" PAM service
0
void Display::startAuth(const QString &user, const QString &password, const Session &session) { m_passPhrase = password; // sanity check if (!session.isValid()) { qCritical() << "Invalid session" << session.fileName(); return; } if (session.xdgSession...
117,919,120,489,007,140,000,000,000,000,000,000,000
Display.cpp
235,927,318,994,122,430,000,000,000,000,000,000,000
[ "CWE-284" ]
CVE-2018-14345
An issue was discovered in SDDM through 0.17.0. If configured with ReuseSession=true, the password is not checked for users with an already existing session. Any user with access to the system D-Bus can therefore unlock any graphical session. This is related to daemon/Display.cpp and helper/backend/PamBackend.cpp.
https://nvd.nist.gov/vuln/detail/CVE-2018-14345
202,265
util-linux
11b51a46bfd3c340df251b2d20fe9d04d077a88e
https://github.com/karelzak/util-linux
http://git.kernel.org/?p=utils/util-linux/util-linux.git;a=commit;h=11b51a46bfd3c340df251b2d20fe9d04d077a88e
umount: block signals when umounting and updating mtab (CVE-2011-1676, CVE-2011-1677) http://thread.gmane.org/gmane.comp.security.oss.general/4374 Based on CVE-2011-1089. Signed-off-by: Karel Zak <kzak@redhat.com>
1
umount_one (const char *spec, const char *node, const char *type, const char *opts, struct mntentchn *mc) { int umnt_err = 0; int isroot; int res = 0; int status; int extra_flags = 0; const char *loopdev, *target = node; char *targetbuf = NULL; int myloop = 0; /* Special case for root. As of 0.99pl10 we...
212,945,960,903,410,320,000,000,000,000,000,000,000
umount.c
63,731,062,625,061,980,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2011-1675
mount in util-linux 2.19 and earlier attempts to append to the /etc/mtab.tmp file without first checking whether resource limits would interfere, which allows local users to trigger corruption of the /etc/mtab file via a process with a small RLIMIT_FSIZE value, a related issue to CVE-2011-1089.
https://nvd.nist.gov/vuln/detail/CVE-2011-1675
332,072
util-linux
11b51a46bfd3c340df251b2d20fe9d04d077a88e
https://github.com/karelzak/util-linux
http://git.kernel.org/?p=utils/util-linux/util-linux.git;a=commit;h=11b51a46bfd3c340df251b2d20fe9d04d077a88e
umount: block signals when umounting and updating mtab (CVE-2011-1676, CVE-2011-1677) http://thread.gmane.org/gmane.comp.security.oss.general/4374 Based on CVE-2011-1089. Signed-off-by: Karel Zak <kzak@redhat.com>
0
umount_one (const char *spec, const char *node, const char *type, const char *opts, struct mntentchn *mc) { int umnt_err = 0; int isroot; int res = 0; int status; int extra_flags = 0; const char *loopdev, *target = node; char *targetbuf = NULL; int myloop = 0; /* Special case for root. As of 0.99pl10 we...
315,955,011,724,478,400,000,000,000,000,000,000,000
umount.c
156,929,308,149,473,540,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2011-1675
mount in util-linux 2.19 and earlier attempts to append to the /etc/mtab.tmp file without first checking whether resource limits would interfere, which allows local users to trigger corruption of the /etc/mtab file via a process with a small RLIMIT_FSIZE value, a related issue to CVE-2011-1089.
https://nvd.nist.gov/vuln/detail/CVE-2011-1675
202,266
ghostpdl
937ccd17ac65935633b2ebc06cb7089b91e17e6b
https://github.com/ArtifexSoftware/ghostpdl
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=937ccd17ac65935633b2ebc06cb7089b91e17e6b
Bug 698056: make bounds check in gx_ttfReader__Read more robust
1
static void gx_ttfReader__Read(ttfReader *self, void *p, int n) { gx_ttfReader *r = (gx_ttfReader *)self; const byte *q; if (!r->error) { if (r->extra_glyph_index != -1) { q = r->glyph_data.bits.data + r->pos; r->error = (r->glyph_data.bits.size - r->pos < n ? ...
53,614,086,865,622,810,000,000,000,000,000,000,000
gxttfb.c
325,786,125,664,490,050,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9727
The gx_ttfReader__Read function in base/gxttfb.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9727
332,081
ghostpdl
937ccd17ac65935633b2ebc06cb7089b91e17e6b
https://github.com/ArtifexSoftware/ghostpdl
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=937ccd17ac65935633b2ebc06cb7089b91e17e6b
Bug 698056: make bounds check in gx_ttfReader__Read more robust
0
static void gx_ttfReader__Read(ttfReader *self, void *p, int n) { gx_ttfReader *r = (gx_ttfReader *)self; const byte *q; if (!r->error) { if (r->extra_glyph_index != -1) { q = r->glyph_data.bits.data + r->pos; r->error = ((r->pos >= r->glyph_data.bits.size || ...
237,306,429,716,437,430,000,000,000,000,000,000,000
gxttfb.c
309,540,741,173,195,800,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-9727
The gx_ttfReader__Read function in base/gxttfb.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document.
https://nvd.nist.gov/vuln/detail/CVE-2017-9727
202,268
ImageMagick
46382526a3f09cebf9f2af680fc55b2a668fcbef
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/46382526a3f09cebf9f2af680fc55b2a668fcbef
https://github.com/ImageMagick/ImageMagick/issues/643
1
static int format8BIM(Image *ifile, Image *ofile) { char temp[MagickPathExtent]; unsigned int foundOSType; int ID, resCount, i, c; ssize_t count; unsigned char *PString, *str; resCount=0; foundOSType=0; /* found the OSType */ (void) foundOSType; c=ReadBlobByte(...
258,914,500,696,047,380,000,000,000,000,000,000,000
meta.c
259,921,314,011,829,520,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2017-12418
ImageMagick 7.0.6-5 has memory leaks in the parse8BIMW and format8BIM functions in coders/meta.c, related to the WriteImage function in MagickCore/constitute.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-12418
332,114
ImageMagick
46382526a3f09cebf9f2af680fc55b2a668fcbef
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/46382526a3f09cebf9f2af680fc55b2a668fcbef
https://github.com/ImageMagick/ImageMagick/issues/643
0
static int format8BIM(Image *ifile, Image *ofile) { char temp[MagickPathExtent]; unsigned int foundOSType; int ID, resCount, i, c; ssize_t count; unsigned char *PString, *str; resCount=0; foundOSType=0; /* found the OSType */ (void) foundOSType; c=ReadBlobByte(...
143,916,915,672,820,940,000,000,000,000,000,000,000
meta.c
6,511,663,712,268,946,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2017-12418
ImageMagick 7.0.6-5 has memory leaks in the parse8BIMW and format8BIM functions in coders/meta.c, related to the WriteImage function in MagickCore/constitute.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-12418
202,272
exim
337e3505b0e6cd4309db6bf6062b33fa56e06cf8
https://github.com/Exim/exim
http://git.exim.org/exim.git/commitdiff/337e3505b0e6cd4309db6bf6062b33fa56e06cf8
Bugzilla #1106: Don't pass DKIM compound log line as format string
1
void dkim_exim_verify_finish(void) { pdkim_signature *sig = NULL; int dkim_signers_size = 0; int dkim_signers_ptr = 0; dkim_signers = NULL; /* Delete eventual previous signature chain */ dkim_signatures = NULL; /* If we have arrived here with dkim_collect_input == FALSE, it means there was a proces...
327,143,074,544,927,500,000,000,000,000,000,000,000
dkim.c
57,938,827,124,194,340,000,000,000,000,000,000,000
[ "CWE-134" ]
CVE-2011-1764
Format string vulnerability in the dkim_exim_verify_finish function in src/dkim.c in Exim before 4.76 might allow remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via format string specifiers in data used in DKIM logging, as demonstrated by an identity field containing a % (percent...
https://nvd.nist.gov/vuln/detail/CVE-2011-1764
332,127
exim
337e3505b0e6cd4309db6bf6062b33fa56e06cf8
https://github.com/Exim/exim
http://git.exim.org/exim.git/commitdiff/337e3505b0e6cd4309db6bf6062b33fa56e06cf8
Bugzilla #1106: Don't pass DKIM compound log line as format string
0
void dkim_exim_verify_finish(void) { pdkim_signature *sig = NULL; int dkim_signers_size = 0; int dkim_signers_ptr = 0; dkim_signers = NULL; /* Delete eventual previous signature chain */ dkim_signatures = NULL; /* If we have arrived here with dkim_collect_input == FALSE, it means there was a proces...
28,465,584,823,195,040,000,000,000,000,000,000,000
dkim.c
203,493,889,332,488,900,000,000,000,000,000,000,000
[ "CWE-134" ]
CVE-2011-1764
Format string vulnerability in the dkim_exim_verify_finish function in src/dkim.c in Exim before 4.76 might allow remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via format string specifiers in data used in DKIM logging, as demonstrated by an identity field containing a % (percent...
https://nvd.nist.gov/vuln/detail/CVE-2011-1764
202,273
linux
5eeb2ca02a2f6084fc57ae5c244a38baab07033a
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5eeb2ca02a2f6084fc57ae5c244a38baab07033a
ANDROID: binder: synchronize_rcu() when using POLLFREE. To prevent races with ep_remove_waitqueue() removing the waitqueue at the same time. Reported-by: syzbot+a2a3c4909716e271487e@syzkaller.appspotmail.com Signed-off-by: Martijn Coenen <maco@android.com> Cc: stable <stable@vger.kernel.org> # 4.14+ Signed-off-by: Gr...
1
static int binder_thread_release(struct binder_proc *proc, struct binder_thread *thread) { struct binder_transaction *t; struct binder_transaction *send_reply = NULL; int active_transactions = 0; struct binder_transaction *last_t = NULL; binder_inner_proc_lock(thread->proc); /* * take a ref on the proc so...
244,138,562,804,293,000,000,000,000,000,000,000,000
binder.c
52,829,893,250,882,870,000,000,000,000,000,000,000
[ "CWE-362" ]
CVE-2020-0030
In binder_thread_release of binder.c, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-145286050References: Up...
https://nvd.nist.gov/vuln/detail/CVE-2020-0030
332,209
linux
5eeb2ca02a2f6084fc57ae5c244a38baab07033a
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5eeb2ca02a2f6084fc57ae5c244a38baab07033a
ANDROID: binder: synchronize_rcu() when using POLLFREE. To prevent races with ep_remove_waitqueue() removing the waitqueue at the same time. Reported-by: syzbot+a2a3c4909716e271487e@syzkaller.appspotmail.com Signed-off-by: Martijn Coenen <maco@android.com> Cc: stable <stable@vger.kernel.org> # 4.14+ Signed-off-by: Gr...
0
static int binder_thread_release(struct binder_proc *proc, struct binder_thread *thread) { struct binder_transaction *t; struct binder_transaction *send_reply = NULL; int active_transactions = 0; struct binder_transaction *last_t = NULL; binder_inner_proc_lock(thread->proc); /* * take a ref on the proc so...
219,469,807,570,191,500,000,000,000,000,000,000,000
binder.c
37,346,793,542,892,680,000,000,000,000,000,000,000
[ "CWE-362" ]
CVE-2020-0030
In binder_thread_release of binder.c, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-145286050References: Up...
https://nvd.nist.gov/vuln/detail/CVE-2020-0030
202,274
typed_ast
dc317ac9cff859aa84eeabe03fb5004982545b3b
https://github.com/python/typed_ast
https://github.com/python/typed_ast/commit/dc317ac9cff859aa84eeabe03fb5004982545b3b
Fix two out-of-bounds array reads (#99) The patch is taken from a commit to the CPython repo with the message: bpo-36495: Fix two out-of-bounds array reads (GH-12641) Research and fix by @bradlarsen.
1
ast_for_arguments(struct compiling *c, const node *n) { /* This function handles both typedargslist (function definition) and varargslist (lambda definition). parameters: '(' [typedargslist] ')' typedargslist: (tfpdef ['=' test] (',' tfpdef ['=' test])* [',' [ '*' [tfpdef] (',' ...
119,498,224,871,260,400,000,000,000,000,000,000,000
ast.c
78,181,478,250,227,530,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-19275
typed_ast 1.3.0 and 1.3.1 has an ast_for_arguments out-of-bounds read. An attacker with the ability to cause a Python interpreter to parse Python source (but not necessarily execute it) may be able to crash the interpreter process. This could be a concern, for example, in a web-based service that parses (but does not e...
https://nvd.nist.gov/vuln/detail/CVE-2019-19275
332,268
typed_ast
dc317ac9cff859aa84eeabe03fb5004982545b3b
https://github.com/python/typed_ast
https://github.com/python/typed_ast/commit/dc317ac9cff859aa84eeabe03fb5004982545b3b
Fix two out-of-bounds array reads (#99) The patch is taken from a commit to the CPython repo with the message: bpo-36495: Fix two out-of-bounds array reads (GH-12641) Research and fix by @bradlarsen.
0
ast_for_arguments(struct compiling *c, const node *n) { /* This function handles both typedargslist (function definition) and varargslist (lambda definition). parameters: '(' [typedargslist] ')' typedargslist: (tfpdef ['=' test] (',' tfpdef ['=' test])* [',' [ '*' [tfpdef] (',' ...
19,905,893,145,020,255,000,000,000,000,000,000,000
ast.c
105,001,989,275,359,520,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-19275
typed_ast 1.3.0 and 1.3.1 has an ast_for_arguments out-of-bounds read. An attacker with the ability to cause a Python interpreter to parse Python source (but not necessarily execute it) may be able to crash the interpreter process. This could be a concern, for example, in a web-based service that parses (but does not e...
https://nvd.nist.gov/vuln/detail/CVE-2019-19275
202,275
typed_ast
dc317ac9cff859aa84eeabe03fb5004982545b3b
https://github.com/python/typed_ast
https://github.com/python/typed_ast/commit/dc317ac9cff859aa84eeabe03fb5004982545b3b
Fix two out-of-bounds array reads (#99) The patch is taken from a commit to the CPython repo with the message: bpo-36495: Fix two out-of-bounds array reads (GH-12641) Research and fix by @bradlarsen.
1
handle_keywordonly_args(struct compiling *c, const node *n, int start, asdl_seq *kwonlyargs, asdl_seq *kwdefaults) { PyObject *argname; node *ch; expr_ty expression, annotation; arg_ty arg = NULL; int i = start; int j = 0; /* index for kwdefaults and kwonlyargs */ if...
287,438,225,445,565,940,000,000,000,000,000,000,000
ast.c
78,181,478,250,227,530,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-19275
typed_ast 1.3.0 and 1.3.1 has an ast_for_arguments out-of-bounds read. An attacker with the ability to cause a Python interpreter to parse Python source (but not necessarily execute it) may be able to crash the interpreter process. This could be a concern, for example, in a web-based service that parses (but does not e...
https://nvd.nist.gov/vuln/detail/CVE-2019-19275
332,297
typed_ast
dc317ac9cff859aa84eeabe03fb5004982545b3b
https://github.com/python/typed_ast
https://github.com/python/typed_ast/commit/dc317ac9cff859aa84eeabe03fb5004982545b3b
Fix two out-of-bounds array reads (#99) The patch is taken from a commit to the CPython repo with the message: bpo-36495: Fix two out-of-bounds array reads (GH-12641) Research and fix by @bradlarsen.
0
handle_keywordonly_args(struct compiling *c, const node *n, int start, asdl_seq *kwonlyargs, asdl_seq *kwdefaults) { PyObject *argname; node *ch; expr_ty expression, annotation; arg_ty arg = NULL; int i = start; int j = 0; /* index for kwdefaults and kwonlyargs */ if...
213,469,144,606,807,280,000,000,000,000,000,000,000
ast.c
105,001,989,275,359,520,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-19275
typed_ast 1.3.0 and 1.3.1 has an ast_for_arguments out-of-bounds read. An attacker with the ability to cause a Python interpreter to parse Python source (but not necessarily execute it) may be able to crash the interpreter process. This could be a concern, for example, in a web-based service that parses (but does not e...
https://nvd.nist.gov/vuln/detail/CVE-2019-19275
202,280
ImageMagick
986b5dff173413fa712db27eb677cdef15f0bab6
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/986b5dff173413fa712db27eb677cdef15f0bab6
https://github.com/ImageMagick/ImageMagick/issues/1748
1
static void TIFFGetProfiles(TIFF *tiff,Image *image,ExceptionInfo *exception) { uint32 length; unsigned char *profile; length=0; #if defined(TIFFTAG_ICCPROFILE) if ((TIFFGetField(tiff,TIFFTAG_ICCPROFILE,&length,&profile) == 1) && (profile != (unsigned char *) NULL)) (void) ReadProfile(image,...
292,547,592,480,065,770,000,000,000,000,000,000,000
tiff.c
65,878,411,794,743,970,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2020-25667
TIFFGetProfiles() in /coders/tiff.c calls strstr() which causes a large out-of-bounds read when it searches for `"dc:format=\"image/dng\"` within `profile` due to improper string handling, when a crafted input file is provided to ImageMagick. The patch uses a StringInfo type instead of a raw C string to remedy this. Th...
https://nvd.nist.gov/vuln/detail/CVE-2020-25667