idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
323,586 | irssi | 5a4e7ab659aba2855895c9f43e9a7a131f4e89b3 | https://github.com/irssi/irssi | https://github.com/irssi/irssi/commit/5a4e7ab659aba2855895c9f43e9a7a131f4e89b3 | fix use after free receiving caps
fixes GL#34 | 0 | static void event_cap (IRC_SERVER_REC *server, char *args, char *nick, char *address)
{
GSList *tmp;
GString *cmd;
char *params, *evt, *list, *star, **caps;
int i, caps_length, disable, avail_caps, multiline;
params = event_get_params(args, 4, NULL, &evt, &star, &list);
if (params == NULL)
return;
/* Multili... | 158,265,490,066,745,200,000,000,000,000,000,000,000 | irc-cap.c | 13,648,292,510,778,973,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2019-15717 | Irssi 1.2.x before 1.2.2 has a use-after-free if the IRC server sends a double CAP. | https://nvd.nist.gov/vuln/detail/CVE-2019-15717 |
201,871 | CImg | ac8003393569aba51048c9d67e1491559877b1d1 | https://github.com/dtschump/CImg | https://github.com/dtschump/CImg/commit/ac8003393569aba51048c9d67e1491559877b1d1 | . | 1 |
CImg<T>& _load_bmp(std::FILE *const file, const char *const filename) {
if (!file && !filename)
throw CImgArgumentException(_cimg_instance
"load_bmp(): Specified filename is (null).",
cimg_instance);
std::FILE *const nfile... | 30,591,227,777,993,066,000,000,000,000,000,000,000 | CImg.h | 278,941,056,383,166,750,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2019-13568 | CImg through 2.6.7 has a heap-based buffer overflow in _load_bmp in CImg.h because of erroneous memory allocation for a malformed BMP image. | https://nvd.nist.gov/vuln/detail/CVE-2019-13568 |
323,626 | CImg | ac8003393569aba51048c9d67e1491559877b1d1 | https://github.com/dtschump/CImg | https://github.com/dtschump/CImg/commit/ac8003393569aba51048c9d67e1491559877b1d1 | . | 0 |
CImg<T>& _load_bmp(std::FILE *const file, const char *const filename) {
if (!file && !filename)
throw CImgArgumentException(_cimg_instance
"load_bmp(): Specified filename is (null).",
cimg_instance);
std::FILE *const nfile... | 285,910,285,559,177,830,000,000,000,000,000,000,000 | CImg.h | 238,850,456,658,257,940,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2019-13568 | CImg through 2.6.7 has a heap-based buffer overflow in _load_bmp in CImg.h because of erroneous memory allocation for a malformed BMP image. | https://nvd.nist.gov/vuln/detail/CVE-2019-13568 |
201,895 | aspell | 80fa26c74279fced8d778351cff19d1d8f44fe4e | https://github.com/GNUAspell/aspell | https://github.com/GNUAspell/aspell/commit/80fa26c74279fced8d778351cff19d1d8f44fe4e | Fix various bugs found by OSS-Fuze. | 1 | char * unescape(char * dest, const char * src)
{
while (*src) {
if (*src == '\\') {
++src;
switch (*src) {
case 'n': *dest = '\n'; break;
case 'r': *dest = '\r'; break;
case 't': *dest = '\t'; break;
case 'f': *dest = '\f'; break;
case 'v': *dest = '\v'; break;
default: *dest = *src;
}
} el... | 260,987,866,133,806,100,000,000,000,000,000,000,000 | getdata.cpp | 280,558,339,002,823,380,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-17544 | libaspell.a in GNU Aspell before 0.60.8 has a stack-based buffer over-read in acommon::unescape in common/getdata.cpp via an isolated \ character. | https://nvd.nist.gov/vuln/detail/CVE-2019-17544 |
326,153 | aspell | 80fa26c74279fced8d778351cff19d1d8f44fe4e | https://github.com/GNUAspell/aspell | https://github.com/GNUAspell/aspell/commit/80fa26c74279fced8d778351cff19d1d8f44fe4e | Fix various bugs found by OSS-Fuze. | 0 | char * unescape(char * dest, const char * src)
{
while (*src) {
if (*src == '\\' && src[1]) {
++src;
switch (*src) {
case 'n': *dest = '\n'; break;
case 'r': *dest = '\r'; break;
case 't': *dest = '\t'; break;
case 'f': *dest = '\f'; break;
case 'v': *dest = '\v'; break;
default: *dest = *src;
}
... | 255,044,876,040,201,560,000,000,000,000,000,000,000 | getdata.cpp | 78,796,340,509,680,230,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-17544 | libaspell.a in GNU Aspell before 0.60.8 has a stack-based buffer over-read in acommon::unescape in common/getdata.cpp via an isolated \ character. | https://nvd.nist.gov/vuln/detail/CVE-2019-17544 |
201,897 | openjpeg | 0afbdcf3e6d0d2bd2e16a0c4d513ee3cf86e460d | https://github.com/uclouvain/openjpeg | https://github.com/uclouvain/openjpeg/commit/0afbdcf3e6d0d2bd2e16a0c4d513ee3cf86e460d | Fix segfault in src/bin/jp2/opj_decompress.c due to uninitialized pointer (fixes #1368) (#1369) | 1 | int main(int argc, char **argv)
{
opj_decompress_parameters parameters; /* decompression parameters */
OPJ_INT32 num_images, imageno;
img_fol_t img_fol;
dircnt_t *dirptr = NULL;
int failed = 0;
OPJ_FLOAT64 t, tCumulative = 0;
OPJ_UINT32 numDecompressedImages = 0;
OPJ_UINT32 cp... | 283,286,800,609,187,080,000,000,000,000,000,000,000 | opj_decompress.c | 190,084,510,069,847,180,000,000,000,000,000,000,000 | [
"CWE-824"
] | CVE-2022-1122 | A flaw was found in the opj2_decompress program in openjpeg2 2.4.0 in the way it handles an input directory with a large number of files. When it fails to allocate a buffer to store the filenames of the input directory, it calls free() on an uninitialized pointer, leading to a segmentation fault and a denial of service... | https://nvd.nist.gov/vuln/detail/CVE-2022-1122 |
326,244 | openjpeg | 0afbdcf3e6d0d2bd2e16a0c4d513ee3cf86e460d | https://github.com/uclouvain/openjpeg | https://github.com/uclouvain/openjpeg/commit/0afbdcf3e6d0d2bd2e16a0c4d513ee3cf86e460d | Fix segfault in src/bin/jp2/opj_decompress.c due to uninitialized pointer (fixes #1368) (#1369) | 0 | int main(int argc, char **argv)
{
opj_decompress_parameters parameters; /* decompression parameters */
OPJ_INT32 num_images, imageno;
img_fol_t img_fol;
dircnt_t *dirptr = NULL;
int failed = 0;
OPJ_FLOAT64 t, tCumulative = 0;
OPJ_UINT32 numDecompressedImages = 0;
OPJ_UINT32 cp... | 92,210,036,055,932,840,000,000,000,000,000,000,000 | opj_decompress.c | 282,803,346,063,813,280,000,000,000,000,000,000,000 | [
"CWE-824"
] | CVE-2022-1122 | A flaw was found in the opj2_decompress program in openjpeg2 2.4.0 in the way it handles an input directory with a large number of files. When it fails to allocate a buffer to store the filenames of the input directory, it calls free() on an uninitialized pointer, leading to a segmentation fault and a denial of service... | https://nvd.nist.gov/vuln/detail/CVE-2022-1122 |
201,905 | ImageMagick6 | 11d9dac3d991c62289d1ef7a097670166480e76c | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/11d9dac3d991c62289d1ef7a097670166480e76c | https://github.com/ImageMagick/ImageMagick/issues/1199 | 1 | static Image *ReadPWPImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
char
filename[MaxTextExtent];
FILE
*file;
Image
*image,
*next_image,
*pwp_image;
ImageInfo
*read_info;
int
c,
unique_file;
MagickBooleanType
status;
register Image
*p;
regist... | 325,789,922,914,662,600,000,000,000,000,000,000,000 | pwp.c | 44,811,988,825,196,200,000,000,000,000,000,000,000 | [
"CWE-252"
] | CVE-2018-16643 | The functions ReadDCMImage in coders/dcm.c, ReadPWPImage in coders/pwp.c, ReadCALSImage in coders/cals.c, and ReadPICTImage in coders/pict.c in ImageMagick 7.0.8-4 do not check the return value of the fputc function, which allows remote attackers to cause a denial of service via a crafted image file. | https://nvd.nist.gov/vuln/detail/CVE-2018-16643 |
326,352 | ImageMagick6 | 11d9dac3d991c62289d1ef7a097670166480e76c | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/11d9dac3d991c62289d1ef7a097670166480e76c | https://github.com/ImageMagick/ImageMagick/issues/1199 | 0 | static Image *ReadPWPImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
char
filename[MaxTextExtent];
FILE
*file;
Image
*image,
*next_image,
*pwp_image;
ImageInfo
*read_info;
int
c,
unique_file;
MagickBooleanType
status;
register Image
*p;
regist... | 282,508,022,381,471,900,000,000,000,000,000,000,000 | pwp.c | 85,278,332,569,801,830,000,000,000,000,000,000,000 | [
"CWE-252"
] | CVE-2018-16643 | The functions ReadDCMImage in coders/dcm.c, ReadPWPImage in coders/pwp.c, ReadCALSImage in coders/cals.c, and ReadPICTImage in coders/pict.c in ImageMagick 7.0.8-4 do not check the return value of the fputc function, which allows remote attackers to cause a denial of service via a crafted image file. | https://nvd.nist.gov/vuln/detail/CVE-2018-16643 |
201,906 | ImageMagick6 | 11d9dac3d991c62289d1ef7a097670166480e76c | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/11d9dac3d991c62289d1ef7a097670166480e76c | https://github.com/ImageMagick/ImageMagick/issues/1199 | 1 | static Image *ReadCALSImage(const ImageInfo *image_info,
ExceptionInfo *exception)
{
char
filename[MaxTextExtent],
header[129],
message[MaxTextExtent];
FILE
*file;
Image
*image;
ImageInfo
*read_info;
int
c,
unique_file;
MagickBooleanType
status;
register ssize_t... | 88,862,266,690,127,740,000,000,000,000,000,000,000 | cals.c | 83,374,509,173,668,140,000,000,000,000,000,000,000 | [
"CWE-252"
] | CVE-2018-16643 | The functions ReadDCMImage in coders/dcm.c, ReadPWPImage in coders/pwp.c, ReadCALSImage in coders/cals.c, and ReadPICTImage in coders/pict.c in ImageMagick 7.0.8-4 do not check the return value of the fputc function, which allows remote attackers to cause a denial of service via a crafted image file. | https://nvd.nist.gov/vuln/detail/CVE-2018-16643 |
326,366 | ImageMagick6 | 11d9dac3d991c62289d1ef7a097670166480e76c | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/11d9dac3d991c62289d1ef7a097670166480e76c | https://github.com/ImageMagick/ImageMagick/issues/1199 | 0 | static Image *ReadCALSImage(const ImageInfo *image_info,
ExceptionInfo *exception)
{
char
filename[MaxTextExtent],
header[129],
message[MaxTextExtent];
FILE
*file;
Image
*image;
ImageInfo
*read_info;
int
c,
unique_file;
MagickBooleanType
status;
register ssize_t... | 261,025,155,049,216,660,000,000,000,000,000,000,000 | cals.c | 295,650,115,268,340,100,000,000,000,000,000,000,000 | [
"CWE-252"
] | CVE-2018-16643 | The functions ReadDCMImage in coders/dcm.c, ReadPWPImage in coders/pwp.c, ReadCALSImage in coders/cals.c, and ReadPICTImage in coders/pict.c in ImageMagick 7.0.8-4 do not check the return value of the fputc function, which allows remote attackers to cause a denial of service via a crafted image file. | https://nvd.nist.gov/vuln/detail/CVE-2018-16643 |
201,907 | ImageMagick6 | 11d9dac3d991c62289d1ef7a097670166480e76c | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/11d9dac3d991c62289d1ef7a097670166480e76c | https://github.com/ImageMagick/ImageMagick/issues/1199 | 1 | static Image *ReadPICTImage(const ImageInfo *image_info,
ExceptionInfo *exception)
{
#define ThrowPICTException(exception,message) \
{ \
if (tile_image != (Image *) NULL) \
tile_image=DestroyImage(tile_image); \
if (read_info != (ImageInfo *) NULL) \
read_info=DestroyImageInfo(read_info); \
ThrowReaderE... | 136,150,762,693,099,100,000,000,000,000,000,000,000 | pict.c | 56,243,960,726,721,140,000,000,000,000,000,000,000 | [
"CWE-252"
] | CVE-2018-16643 | The functions ReadDCMImage in coders/dcm.c, ReadPWPImage in coders/pwp.c, ReadCALSImage in coders/cals.c, and ReadPICTImage in coders/pict.c in ImageMagick 7.0.8-4 do not check the return value of the fputc function, which allows remote attackers to cause a denial of service via a crafted image file. | https://nvd.nist.gov/vuln/detail/CVE-2018-16643 |
326,360 | ImageMagick6 | 11d9dac3d991c62289d1ef7a097670166480e76c | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/11d9dac3d991c62289d1ef7a097670166480e76c | https://github.com/ImageMagick/ImageMagick/issues/1199 | 0 | static Image *ReadPICTImage(const ImageInfo *image_info,
ExceptionInfo *exception)
{
#define ThrowPICTException(exception,message) \
{ \
if (tile_image != (Image *) NULL) \
tile_image=DestroyImage(tile_image); \
if (read_info != (ImageInfo *) NULL) \
read_info=DestroyImageInfo(read_info); \
ThrowReaderE... | 276,484,041,744,721,000,000,000,000,000,000,000,000 | pict.c | 264,659,002,301,770,000,000,000,000,000,000,000,000 | [
"CWE-252"
] | CVE-2018-16643 | The functions ReadDCMImage in coders/dcm.c, ReadPWPImage in coders/pwp.c, ReadCALSImage in coders/cals.c, and ReadPICTImage in coders/pict.c in ImageMagick 7.0.8-4 do not check the return value of the fputc function, which allows remote attackers to cause a denial of service via a crafted image file. | https://nvd.nist.gov/vuln/detail/CVE-2018-16643 |
201,908 | ImageMagick6 | 11d9dac3d991c62289d1ef7a097670166480e76c | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/11d9dac3d991c62289d1ef7a097670166480e76c | https://github.com/ImageMagick/ImageMagick/issues/1199 | 1 | static Image *ReadDCMImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
#define ThrowDCMException(exception,message) \
{ \
if (info.scale != (Quantum *) NULL) \
info.scale=(Quantum *) RelinquishMagickMemory(info.scale); \
if (data != (unsigned char *) NULL) \
data=(unsigned char *) RelinquishMagi... | 328,030,665,310,374,000,000,000,000,000,000,000,000 | dcm.c | 58,926,966,675,451,650,000,000,000,000,000,000,000 | [
"CWE-252"
] | CVE-2018-16643 | The functions ReadDCMImage in coders/dcm.c, ReadPWPImage in coders/pwp.c, ReadCALSImage in coders/cals.c, and ReadPICTImage in coders/pict.c in ImageMagick 7.0.8-4 do not check the return value of the fputc function, which allows remote attackers to cause a denial of service via a crafted image file. | https://nvd.nist.gov/vuln/detail/CVE-2018-16643 |
326,355 | ImageMagick6 | 11d9dac3d991c62289d1ef7a097670166480e76c | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/11d9dac3d991c62289d1ef7a097670166480e76c | https://github.com/ImageMagick/ImageMagick/issues/1199 | 0 | static Image *ReadDCMImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
#define ThrowDCMException(exception,message) \
{ \
if (info.scale != (Quantum *) NULL) \
info.scale=(Quantum *) RelinquishMagickMemory(info.scale); \
if (data != (unsigned char *) NULL) \
data=(unsigned char *) RelinquishMagi... | 17,128,993,642,105,949,000,000,000,000,000,000,000 | dcm.c | 10,615,344,167,687,603,000,000,000,000,000,000,000 | [
"CWE-252"
] | CVE-2018-16643 | The functions ReadDCMImage in coders/dcm.c, ReadPWPImage in coders/pwp.c, ReadCALSImage in coders/cals.c, and ReadPICTImage in coders/pict.c in ImageMagick 7.0.8-4 do not check the return value of the fputc function, which allows remote attackers to cause a denial of service via a crafted image file. | https://nvd.nist.gov/vuln/detail/CVE-2018-16643 |
201,923 | exiv2 | ae20c30805b330275b2aa0303a42e1f2bbd53661 | https://github.com/Exiv2/exiv2 | https://github.com/Exiv2/exiv2/commit/ae20c30805b330275b2aa0303a42e1f2bbd53661 | Avoid null pointer exception due to NULL return value from strchr.
This fixes #793. | 1 | int Exiv2::http(Exiv2::Dictionary& request,Exiv2::Dictionary& response,std::string& errors)
{
if ( !request.count("verb") ) request["verb" ] = "GET";
if ( !request.count("header") ) request["header" ] = "" ;
if ( !request.count("version")) request["version"] = "1.0";
if ( !request.count("port") ... | 145,049,442,908,546,250,000,000,000,000,000,000,000 | http.cpp | 5,346,175,185,590,357,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2019-13114 | http.c in Exiv2 through 0.27.1 allows a malicious http server to cause a denial of service (crash due to a NULL pointer dereference) by returning a crafted response that lacks a space character. | https://nvd.nist.gov/vuln/detail/CVE-2019-13114 |
326,886 | exiv2 | ae20c30805b330275b2aa0303a42e1f2bbd53661 | https://github.com/Exiv2/exiv2 | https://github.com/Exiv2/exiv2/commit/ae20c30805b330275b2aa0303a42e1f2bbd53661 | Avoid null pointer exception due to NULL return value from strchr.
This fixes #793. | 0 | int Exiv2::http(Exiv2::Dictionary& request,Exiv2::Dictionary& response,std::string& errors)
{
if ( !request.count("verb") ) request["verb" ] = "GET";
if ( !request.count("header") ) request["header" ] = "" ;
if ( !request.count("version")) request["version"] = "1.0";
if ( !request.count("port") ... | 200,212,959,186,690,400,000,000,000,000,000,000,000 | http.cpp | 299,755,116,181,587,730,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2019-13114 | http.c in Exiv2 through 0.27.1 allows a malicious http server to cause a denial of service (crash due to a NULL pointer dereference) by returning a crafted response that lacks a space character. | https://nvd.nist.gov/vuln/detail/CVE-2019-13114 |
201,924 | varnish-cache | bd7b3d6d47ccbb5e1747126f8e2a297f38e56b8c | https://github.com/varnishcache/varnish-cache | https://github.com/varnishcache/varnish-cache/commit/bd7b3d6d47ccbb5e1747126f8e2a297f38e56b8c | Clear err_code and err_reason at start of request handling
req->err_code and req->err_reason are set when going to synthetic
handling. From there the resp.reason HTTP field is set from
req->err_reason if set, or the generic code based on req->err_code is used
if it was NULL. This patch clears these members so that a v... | 1 | cnt_recv_prep(struct req *req, const char *ci)
{
const char *xff;
if (req->restarts == 0) {
/*
* This really should be done earlier, but we want to capture
* it in the VSL log.
*/
http_CollectHdr(req->http, H_X_Forwarded_For);
if (http_GetHdr(req->http, H_X_Forwarded_For, &xff)) {
http_Unset(req->h... | 72,403,172,879,027,580,000,000,000,000,000,000,000 | cache_req_fsm.c | 154,570,149,617,043,740,000,000,000,000,000,000,000 | [
"CWE-212"
] | CVE-2019-20637 | An issue was discovered in Varnish Cache before 6.0.5 LTS, 6.1.x and 6.2.x before 6.2.2, and 6.3.x before 6.3.1. It does not clear a pointer between the handling of one client request and the next request within the same connection. This sometimes causes information to be disclosed from the connection workspace, such a... | https://nvd.nist.gov/vuln/detail/CVE-2019-20637 |
326,910 | varnish-cache | bd7b3d6d47ccbb5e1747126f8e2a297f38e56b8c | https://github.com/varnishcache/varnish-cache | https://github.com/varnishcache/varnish-cache/commit/bd7b3d6d47ccbb5e1747126f8e2a297f38e56b8c | Clear err_code and err_reason at start of request handling
req->err_code and req->err_reason are set when going to synthetic
handling. From there the resp.reason HTTP field is set from
req->err_reason if set, or the generic code based on req->err_code is used
if it was NULL. This patch clears these members so that a v... | 0 | cnt_recv_prep(struct req *req, const char *ci)
{
const char *xff;
if (req->restarts == 0) {
/*
* This really should be done earlier, but we want to capture
* it in the VSL log.
*/
http_CollectHdr(req->http, H_X_Forwarded_For);
if (http_GetHdr(req->http, H_X_Forwarded_For, &xff)) {
http_Unset(req->h... | 145,169,263,497,564,720,000,000,000,000,000,000,000 | cache_req_fsm.c | 44,390,415,433,771,620,000,000,000,000,000,000,000 | [
"CWE-212"
] | CVE-2019-20637 | An issue was discovered in Varnish Cache before 6.0.5 LTS, 6.1.x and 6.2.x before 6.2.2, and 6.3.x before 6.3.1. It does not clear a pointer between the handling of one client request and the next request within the same connection. This sometimes causes information to be disclosed from the connection workspace, such a... | https://nvd.nist.gov/vuln/detail/CVE-2019-20637 |
201,926 | ntp | 12f1323d18c8d74eb14fb5ac5574183d779794c5 | https://github.com/ntp-project/ntp | https://github.com/ntp-project/ntp/commit/12f1323d18c8d74eb14fb5ac5574183d779794c5 | [Bug 2937] (NTPQ) nextvar() missing length check | 1 | nextvar(
int *datalen,
const char **datap,
char **vname,
char **vvalue
)
{
const char *cp;
const char *np;
const char *cpend;
size_t srclen;
size_t len;
static char name[MAXVARLEN];
static char value[MAXVALLEN];
cp = *datap;
cpend = cp + *datalen;
/*
* Space past commas and white space
*/
while (c... | 94,193,894,394,064,200,000,000,000,000,000,000,000 | ntpq.c | 137,449,940,942,221,470,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2015-7975 | The nextvar function in NTP before 4.2.8p6 and 4.3.x before 4.3.90 does not properly validate the length of its input, which allows an attacker to cause a denial of service (application crash). | https://nvd.nist.gov/vuln/detail/CVE-2015-7975 |
326,978 | ntp | 12f1323d18c8d74eb14fb5ac5574183d779794c5 | https://github.com/ntp-project/ntp | https://github.com/ntp-project/ntp/commit/12f1323d18c8d74eb14fb5ac5574183d779794c5 | [Bug 2937] (NTPQ) nextvar() missing length check | 0 | nextvar(
int *datalen,
const char **datap,
char **vname,
char **vvalue
)
{
const char *cp;
const char *np;
const char *cpend;
size_t srclen;
size_t len;
static char name[MAXVARLEN];
static char value[MAXVALLEN];
cp = *datap;
cpend = cp + *datalen;
/*
* Space past commas and white space
*/
while (c... | 317,886,261,342,928,300,000,000,000,000,000,000,000 | ntpq.c | 263,164,452,008,239,240,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2015-7975 | The nextvar function in NTP before 4.2.8p6 and 4.3.x before 4.3.90 does not properly validate the length of its input, which allows an attacker to cause a denial of service (application crash). | https://nvd.nist.gov/vuln/detail/CVE-2015-7975 |
201,927 | FFmpeg | 1812352d767ccf5431aa440123e2e260a4db2726 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/1812352d767ccf5431aa440123e2e260a4db2726 | avcodec/cbs_jpeg: Check length for SOS
Fixes: out of array access
Fixes: 19734/clusterfuzz-testcase-minimized-ffmpeg_BSF_TRACE_HEADERS_fuzzer-5673507031875584
Fixes: 19353/clusterfuzz-testcase-minimized-ffmpeg_BSF_TRACE_HEADERS_fuzzer-5703944462663680
Found-by: continuous fuzzing process https://github.com/google/oss... | 1 | static int cbs_jpeg_split_fragment(CodedBitstreamContext *ctx,
CodedBitstreamFragment *frag,
int header)
{
AVBufferRef *data_ref;
uint8_t *data;
size_t data_size;
int unit, start, end, marker, next_start, next_marker;
int err, i, ... | 288,785,647,865,110,100,000,000,000,000,000,000,000 | cbs_jpeg.c | 141,905,974,633,686,900,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2020-12284 | cbs_jpeg_split_fragment in libavcodec/cbs_jpeg.c in FFmpeg 4.1 and 4.2.2 has a heap-based buffer overflow during JPEG_MARKER_SOS handling because of a missing length check. | https://nvd.nist.gov/vuln/detail/CVE-2020-12284 |
326,994 | FFmpeg | 1812352d767ccf5431aa440123e2e260a4db2726 | https://github.com/FFmpeg/FFmpeg | https://github.com/FFmpeg/FFmpeg/commit/1812352d767ccf5431aa440123e2e260a4db2726 | avcodec/cbs_jpeg: Check length for SOS
Fixes: out of array access
Fixes: 19734/clusterfuzz-testcase-minimized-ffmpeg_BSF_TRACE_HEADERS_fuzzer-5673507031875584
Fixes: 19353/clusterfuzz-testcase-minimized-ffmpeg_BSF_TRACE_HEADERS_fuzzer-5703944462663680
Found-by: continuous fuzzing process https://github.com/google/oss... | 0 | static int cbs_jpeg_split_fragment(CodedBitstreamContext *ctx,
CodedBitstreamFragment *frag,
int header)
{
AVBufferRef *data_ref;
uint8_t *data;
size_t data_size;
int unit, start, end, marker, next_start, next_marker;
int err, i, ... | 91,615,084,836,431,830,000,000,000,000,000,000,000 | cbs_jpeg.c | 102,935,850,475,612,860,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2020-12284 | cbs_jpeg_split_fragment in libavcodec/cbs_jpeg.c in FFmpeg 4.1 and 4.2.2 has a heap-based buffer overflow during JPEG_MARKER_SOS handling because of a missing length check. | https://nvd.nist.gov/vuln/detail/CVE-2020-12284 |
202,075 | abrt | fdf93685d4f3fc36fe50d34a11e24662c4cb2d8c | https://github.com/abrt/abrt | https://github.com/abrt/abrt/commit/fdf93685d4f3fc36fe50d34a11e24662c4cb2d8c | a-a-save-package-data: turn off reading data from root directories
Making copies of files from arbitrary root directories is not secure.
Related: #1211835
Signed-off-by: Jakub Filak <jfilak@redhat.com> | 1 | static int SavePackageDescriptionToDebugDump(const char *dump_dir_name)
{
struct dump_dir *dd = dd_opendir(dump_dir_name, /*flags:*/ 0);
if (!dd)
return 1;
char *analyzer = dd_load_text(dd, FILENAME_ANALYZER);
if (!strcmp(analyzer, "Kerneloops"))
{
dd_save_text(dd, FILENAME_PACKAGE,... | 58,385,047,012,831,510,000,000,000,000,000,000,000 | abrt-action-save-package-data.c | 35,972,289,246,062,253,000,000,000,000,000,000,000 | [
"CWE-59"
] | CVE-2015-3315 | Automatic Bug Reporting Tool (ABRT) allows local users to read, change the ownership of, or have other unspecified impact on arbitrary files via a symlink attack on (1) /var/tmp/abrt/*/maps, (2) /tmp/jvm-*/hs_error.log, (3) /proc/*/exe, (4) /etc/os-release in a chroot, or (5) an unspecified root directory related to li... | https://nvd.nist.gov/vuln/detail/CVE-2015-3315 |
328,485 | abrt | fdf93685d4f3fc36fe50d34a11e24662c4cb2d8c | https://github.com/abrt/abrt | https://github.com/abrt/abrt/commit/fdf93685d4f3fc36fe50d34a11e24662c4cb2d8c | a-a-save-package-data: turn off reading data from root directories
Making copies of files from arbitrary root directories is not secure.
Related: #1211835
Signed-off-by: Jakub Filak <jfilak@redhat.com> | 0 | static int SavePackageDescriptionToDebugDump(const char *dump_dir_name)
{
struct dump_dir *dd = dd_opendir(dump_dir_name, /*flags:*/ 0);
if (!dd)
return 1;
char *analyzer = dd_load_text(dd, FILENAME_ANALYZER);
if (!strcmp(analyzer, "Kerneloops"))
{
dd_save_text(dd, FILENAME_PACKAGE,... | 217,413,558,696,639,170,000,000,000,000,000,000,000 | abrt-action-save-package-data.c | 132,433,950,786,723,050,000,000,000,000,000,000,000 | [
"CWE-59"
] | CVE-2015-3315 | Automatic Bug Reporting Tool (ABRT) allows local users to read, change the ownership of, or have other unspecified impact on arbitrary files via a symlink attack on (1) /var/tmp/abrt/*/maps, (2) /tmp/jvm-*/hs_error.log, (3) /proc/*/exe, (4) /etc/os-release in a chroot, or (5) an unspecified root directory related to li... | https://nvd.nist.gov/vuln/detail/CVE-2015-3315 |
202,077 | wesnoth | af61f9fdd15cd439da9e2fe5fa39d174c923eaae | https://github.com/wesnoth/wesnoth | https://github.com/wesnoth/wesnoth/commit/af61f9fdd15cd439da9e2fe5fa39d174c923eaae | fs: Use game data path to resolve ./ in the absence of a current_dir
Fixes a file content disclosure bug (#22042) affecting functionality
relying on the get_wml_location() function and not passing a non-empty
value for the current_dir parameter.
See <https://gna.org/bugs/?22042> for details.
This is a candidate for ... | 1 | std::string get_wml_location(const std::string &filename, const std::string ¤t_dir)
{
DBG_FS << "Looking for '" << filename << "'.\n";
std::string result;
if (filename.empty()) {
LOG_FS << " invalid filename\n";
return result;
}
if (filename.find("..") != std::string::npos) {
ERR_FS << "Illegal pat... | 218,991,621,760,989,600,000,000,000,000,000,000,000 | filesystem.cpp | 99,676,955,234,952,020,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2015-0844 | The WML/Lua API in Battle for Wesnoth 1.7.x through 1.11.x and 1.12.x before 1.12.2 allows remote attackers to read arbitrary files via a crafted (1) campaign or (2) map file. | https://nvd.nist.gov/vuln/detail/CVE-2015-0844 |
328,565 | wesnoth | af61f9fdd15cd439da9e2fe5fa39d174c923eaae | https://github.com/wesnoth/wesnoth | https://github.com/wesnoth/wesnoth/commit/af61f9fdd15cd439da9e2fe5fa39d174c923eaae | fs: Use game data path to resolve ./ in the absence of a current_dir
Fixes a file content disclosure bug (#22042) affecting functionality
relying on the get_wml_location() function and not passing a non-empty
value for the current_dir parameter.
See <https://gna.org/bugs/?22042> for details.
This is a candidate for ... | 0 | std::string get_wml_location(const std::string &filename, const std::string ¤t_dir)
{
DBG_FS << "Looking for '" << filename << "'.\n";
std::string result;
if (filename.empty()) {
LOG_FS << " invalid filename\n";
return result;
}
if (filename.find("..") != std::string::npos) {
ERR_FS << "Illegal pat... | 15,547,603,443,512,982,000,000,000,000,000,000,000 | filesystem.cpp | 308,985,517,584,582,380,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2015-0844 | The WML/Lua API in Battle for Wesnoth 1.7.x through 1.11.x and 1.12.x before 1.12.2 allows remote attackers to read arbitrary files via a crafted (1) campaign or (2) map file. | https://nvd.nist.gov/vuln/detail/CVE-2015-0844 |
202,078 | ImageMagick6 | a5db4873626f702d2ddd8bc293573493e0a412c0 | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/a5db4873626f702d2ddd8bc293573493e0a412c0 | https://github.com/ImageMagick/ImageMagick/issues/1336 | 1 | static void SVGStripString(const MagickBooleanType trim,char *message)
{
register char
*p,
*q;
size_t
length;
assert(message != (char *) NULL);
if (*message == '\0')
return;
/*
Remove comment.
*/
q=message;
for (p=message; *p != '\0'; p++)
{
if ((*p == '/') && (*(p+1) == '*')... | 149,593,995,387,637,380,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2018-18023 | In ImageMagick 7.0.8-13 Q16, there is a heap-based buffer over-read in the SVGStripString function of coders/svg.c, which allows attackers to cause a denial of service via a crafted SVG image file. | https://nvd.nist.gov/vuln/detail/CVE-2018-18023 |
328,620 | ImageMagick6 | a5db4873626f702d2ddd8bc293573493e0a412c0 | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/a5db4873626f702d2ddd8bc293573493e0a412c0 | https://github.com/ImageMagick/ImageMagick/issues/1336 | 0 | static void SVGStripString(const MagickBooleanType trim,char *message)
{
register char
*p,
*q;
size_t
length;
assert(message != (char *) NULL);
if (*message == '\0')
return;
/*
Remove comment.
*/
q=message;
for (p=message; *p != '\0'; p++)
{
if ((*p == '/') && (*(p+1) == '*')... | 155,878,558,045,591,710,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2018-18023 | In ImageMagick 7.0.8-13 Q16, there is a heap-based buffer over-read in the SVGStripString function of coders/svg.c, which allows attackers to cause a denial of service via a crafted SVG image file. | https://nvd.nist.gov/vuln/detail/CVE-2018-18023 |
202,087 | libxml2 | 2240fbf5912054af025fb6e01e26375100275e74 | https://github.com/GNOME/libxml2 | https://gitlab.gnome.org/GNOME/libxml2/commit/2240fbf5912054af025fb6e01e26375100275e74 | Fix infinite loop in LZMA decompression
Check the liblzma error code more thoroughly to avoid infinite loops.
Closes: https://gitlab.gnome.org/GNOME/libxml2/issues/13
Closes: https://bugzilla.gnome.org/show_bug.cgi?id=794914
This is CVE-2018-9251 and CVE-2018-14567.
Thanks to Dongliang Mu and Simon Wörner for the r... | 1 | xz_decomp(xz_statep state)
{
int ret;
unsigned had;
unsigned long crc, len;
lzma_stream *strm = &(state->strm);
lzma_action action = LZMA_RUN;
/* fill output buffer up to end of deflate stream */
had = strm->avail_out;
do {
/* get more input for inflate() */
if (strm->a... | 21,182,978,878,793,282,000,000,000,000,000,000,000 | xzlib.c | 26,095,256,663,937,606,000,000,000,000,000,000,000 | [
"CWE-835"
] | CVE-2018-9251 | The xz_decomp function in xzlib.c in libxml2 2.9.8, if --with-lzma is used, allows remote attackers to cause a denial of service (infinite loop) via a crafted XML file that triggers LZMA_MEMLIMIT_ERROR, as demonstrated by xmllint, a different vulnerability than CVE-2015-8035. | https://nvd.nist.gov/vuln/detail/CVE-2018-9251 |
329,039 | libxml2 | 2240fbf5912054af025fb6e01e26375100275e74 | https://github.com/GNOME/libxml2 | https://gitlab.gnome.org/GNOME/libxml2/commit/2240fbf5912054af025fb6e01e26375100275e74 | Fix infinite loop in LZMA decompression
Check the liblzma error code more thoroughly to avoid infinite loops.
Closes: https://gitlab.gnome.org/GNOME/libxml2/issues/13
Closes: https://bugzilla.gnome.org/show_bug.cgi?id=794914
This is CVE-2018-9251 and CVE-2018-14567.
Thanks to Dongliang Mu and Simon Wörner for the r... | 0 | xz_decomp(xz_statep state)
{
int ret;
unsigned had;
unsigned long crc, len;
lzma_stream *strm = &(state->strm);
lzma_action action = LZMA_RUN;
/* fill output buffer up to end of deflate stream */
had = strm->avail_out;
do {
/* get more input for inflate() */
if (strm->a... | 286,325,907,304,440,370,000,000,000,000,000,000,000 | xzlib.c | 92,190,223,885,988,240,000,000,000,000,000,000,000 | [
"CWE-835"
] | CVE-2018-9251 | The xz_decomp function in xzlib.c in libxml2 2.9.8, if --with-lzma is used, allows remote attackers to cause a denial of service (infinite loop) via a crafted XML file that triggers LZMA_MEMLIMIT_ERROR, as demonstrated by xmllint, a different vulnerability than CVE-2015-8035. | https://nvd.nist.gov/vuln/detail/CVE-2018-9251 |
202,088 | radare2 | 14189710859c27981adb4c2c2aed2863c1859ec5 | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/14189710859c27981adb4c2c2aed2863c1859ec5 | Redo minor cleanup in new_rbtree | 1 | R_API bool r_crbtree_insert(RRBTree *tree, void *data, RRBComparator cmp, void *user) {
r_return_val_if_fail (tree && data && cmp, false);
bool inserted = false;
if (tree->root == NULL) {
tree->root = _node_new (data, NULL);
if (tree->root == NULL) {
return false;
}
inserted = true;
goto out_exit;
}
... | 217,289,004,718,776,930,000,000,000,000,000,000,000 | new_rbtree.c | 218,837,589,526,560,800,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2022-1444 | heap-use-after-free in GitHub repository radareorg/radare2 prior to 5.7.0. This vulnerability is capable of inducing denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2022-1444 |
329,066 | radare2 | 14189710859c27981adb4c2c2aed2863c1859ec5 | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/14189710859c27981adb4c2c2aed2863c1859ec5 | Redo minor cleanup in new_rbtree | 0 | R_API bool r_crbtree_insert(RRBTree *tree, void *data, RRBComparator cmp, void *user) {
r_return_val_if_fail (tree && data && cmp, false);
bool inserted = false;
if (!tree->root) {
tree->root = _node_new (data, NULL);
if (!tree->root) {
return false;
}
inserted = true;
goto out_exit;
}
RRBNode head;... | 151,669,261,544,495,560,000,000,000,000,000,000,000 | new_rbtree.c | 107,376,252,458,321,480,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2022-1444 | heap-use-after-free in GitHub repository radareorg/radare2 prior to 5.7.0. This vulnerability is capable of inducing denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2022-1444 |
202,089 | freeipa | 73f33569c8893610e246b2f44a7aeaec872b37e6 | https://git.fedorahosted.org/cgit/freeipa | https://git.fedorahosted.org/cgit/freeipa.git/commit/?id=73f33569c8893610e246b2f44a7aeaec872b37e6 | ipa-kdb: search for password policies globally
With the CoS templates now used to create additional password policies
per object type that are placed under the object subtrees, DAL driver
needs to search for the policies in the whole tree.
Individual policies referenced by the krbPwdPolicyReference attribute
are alwa... | 1 | krb5_error_code ipadb_get_pwd_policy(krb5_context kcontext, char *name,
osa_policy_ent_t *policy)
{
struct ipadb_context *ipactx;
char *esc_name = NULL;
char *src_filter = NULL;
krb5_error_code kerr;
LDAPMessage *res = NULL;
LDAPMessage *lentry;
osa_polic... | 11,225,011,208,166,388,000,000,000,000,000,000,000 | ipa_kdb_pwdpolicy.c | 33,175,929,332,922,685,000,000,000,000,000,000,000 | [
"CWE-255"
] | CVE-2016-7030 | FreeIPA uses a default password policy that locks an account after 5 unsuccessful authentication attempts, which allows remote attackers to cause a denial of service by locking out the account in which system services run on. | https://nvd.nist.gov/vuln/detail/CVE-2016-7030 |
329,077 | freeipa | 73f33569c8893610e246b2f44a7aeaec872b37e6 | https://git.fedorahosted.org/cgit/freeipa | https://git.fedorahosted.org/cgit/freeipa.git/commit/?id=73f33569c8893610e246b2f44a7aeaec872b37e6 | ipa-kdb: search for password policies globally
With the CoS templates now used to create additional password policies
per object type that are placed under the object subtrees, DAL driver
needs to search for the policies in the whole tree.
Individual policies referenced by the krbPwdPolicyReference attribute
are alwa... | 0 | krb5_error_code ipadb_get_pwd_policy(krb5_context kcontext, char *name,
osa_policy_ent_t *policy)
{
struct ipadb_context *ipactx;
char *esc_name = NULL;
char *src_filter = NULL;
krb5_error_code kerr;
LDAPMessage *res = NULL;
LDAPMessage *lentry;
osa_polic... | 288,979,861,602,927,100,000,000,000,000,000,000,000 | ipa_kdb_pwdpolicy.c | 55,046,826,374,263,590,000,000,000,000,000,000,000 | [
"CWE-255"
] | CVE-2016-7030 | FreeIPA uses a default password policy that locks an account after 5 unsuccessful authentication attempts, which allows remote attackers to cause a denial of service by locking out the account in which system services run on. | https://nvd.nist.gov/vuln/detail/CVE-2016-7030 |
202,097 | linux | 43cdd1b716b26f6af16da4e145b6578f98798bf6 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=43cdd1b716b26f6af16da4e145b6578f98798bf6 | ACPI: sbshc: remove raw pointer from printk() message
There's no need to be printing a raw kernel pointer to the kernel log at
every boot. So just remove it, and change the whole message to use the
correct dev_info() call at the same time.
Reported-by: Wang Qize <wang_qize@venustech.com.cn>
Cc: All applicable <stabl... | 1 | static int acpi_smbus_hc_add(struct acpi_device *device)
{
int status;
unsigned long long val;
struct acpi_smb_hc *hc;
if (!device)
return -EINVAL;
status = acpi_evaluate_integer(device->handle, "_EC", NULL, &val);
if (ACPI_FAILURE(status)) {
printk(KERN_ERR PREFIX "error obtaining _EC.\n");
return -EIO;
... | 320,133,584,997,789,170,000,000,000,000,000,000,000 | sbshc.c | 159,180,292,634,752,810,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2018-5750 | The acpi_smbus_hc_add function in drivers/acpi/sbshc.c in the Linux kernel through 4.14.15 allows local users to obtain sensitive address information by reading dmesg data from an SBS HC printk call. | https://nvd.nist.gov/vuln/detail/CVE-2018-5750 |
329,247 | linux | 43cdd1b716b26f6af16da4e145b6578f98798bf6 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=43cdd1b716b26f6af16da4e145b6578f98798bf6 | ACPI: sbshc: remove raw pointer from printk() message
There's no need to be printing a raw kernel pointer to the kernel log at
every boot. So just remove it, and change the whole message to use the
correct dev_info() call at the same time.
Reported-by: Wang Qize <wang_qize@venustech.com.cn>
Cc: All applicable <stabl... | 0 | static int acpi_smbus_hc_add(struct acpi_device *device)
{
int status;
unsigned long long val;
struct acpi_smb_hc *hc;
if (!device)
return -EINVAL;
status = acpi_evaluate_integer(device->handle, "_EC", NULL, &val);
if (ACPI_FAILURE(status)) {
printk(KERN_ERR PREFIX "error obtaining _EC.\n");
return -EIO;
... | 221,190,895,648,758,000,000,000,000,000,000,000,000 | sbshc.c | 328,254,937,109,485,450,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2018-5750 | The acpi_smbus_hc_add function in drivers/acpi/sbshc.c in the Linux kernel through 4.14.15 allows local users to obtain sensitive address information by reading dmesg data from an SBS HC printk call. | https://nvd.nist.gov/vuln/detail/CVE-2018-5750 |
202,100 | w3m | ba9d78faeba9024c3e8840579c3b0e959ae2cb0f | https://github.com/tats/w3m | https://github.com/tats/w3m/commit/ba9d78faeba9024c3e8840579c3b0e959ae2cb0f | Prevent global-buffer-overflow in parseURL()
Bug-Debian: https://github.com/tats/w3m/issues/41 | 1 | parseURL(char *url, ParsedURL *p_url, ParsedURL *current)
{
char *p, *q, *qq;
Str tmp;
url = url_quote(url); /* quote 0x01-0x20, 0x7F-0xFF */
p = url;
copyParsedURL(p_url, NULL);
p_url->scheme = SCM_MISSING;
/* RFC1808: Relative Uniform Resource Locators
* 4. Resolving Relative URLs... | 256,601,524,006,595,680,000,000,000,000,000,000,000 | url.c | 116,551,459,812,714,360,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2016-9630 | An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (global buffer overflow and crash) via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2016-9630 |
329,292 | w3m | ba9d78faeba9024c3e8840579c3b0e959ae2cb0f | https://github.com/tats/w3m | https://github.com/tats/w3m/commit/ba9d78faeba9024c3e8840579c3b0e959ae2cb0f | Prevent global-buffer-overflow in parseURL()
Bug-Debian: https://github.com/tats/w3m/issues/41 | 0 | parseURL(char *url, ParsedURL *p_url, ParsedURL *current)
{
char *p, *q, *qq;
Str tmp;
url = url_quote(url); /* quote 0x01-0x20, 0x7F-0xFF */
p = url;
copyParsedURL(p_url, NULL);
p_url->scheme = SCM_MISSING;
/* RFC1808: Relative Uniform Resource Locators
* 4. Resolving Relative URLs... | 278,001,834,510,167,730,000,000,000,000,000,000,000 | url.c | 135,061,753,225,544,220,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2016-9630 | An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (global buffer overflow and crash) via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2016-9630 |
202,101 | w3m | 4e464819dd360ffd3d58fa2a89216fe413cfcc74 | https://github.com/tats/w3m | https://github.com/tats/w3m/commit/4e464819dd360ffd3d58fa2a89216fe413cfcc74 | Prevent segfault due to buffer overflows in addMultirowsForm
Bug-Debian: https://github.com/tats/w3m/issues/21
Bug-Debian: https://github.com/tats/w3m/issues/26 | 1 | addMultirowsForm(Buffer *buf, AnchorList *al)
{
int i, j, k, col, ecol, pos;
Anchor a_form, *a;
Line *l, *ls;
if (al == NULL || al->nanchor == 0)
return;
for (i = 0; i < al->nanchor; i++) {
a_form = al->anchors[i];
al->anchors[i].rows = 1;
if (a_form.hseq < 0 || a_form.rows <= 1)
continue;... | 870,317,461,032,444,000,000,000,000,000,000,000 | anchor.c | 315,835,909,194,517,400,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2016-9425 | An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. Heap-based buffer overflow in the addMultirowsForm function in w3m allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2016-9425 |
329,331 | w3m | 4e464819dd360ffd3d58fa2a89216fe413cfcc74 | https://github.com/tats/w3m | https://github.com/tats/w3m/commit/4e464819dd360ffd3d58fa2a89216fe413cfcc74 | Prevent segfault due to buffer overflows in addMultirowsForm
Bug-Debian: https://github.com/tats/w3m/issues/21
Bug-Debian: https://github.com/tats/w3m/issues/26 | 0 | addMultirowsForm(Buffer *buf, AnchorList *al)
{
int i, j, k, col, ecol, pos;
Anchor a_form, *a;
Line *l, *ls;
if (al == NULL || al->nanchor == 0)
return;
for (i = 0; i < al->nanchor; i++) {
a_form = al->anchors[i];
al->anchors[i].rows = 1;
if (a_form.hseq < 0 || a_form.rows <= 1)
continue;... | 200,393,183,453,381,030,000,000,000,000,000,000,000 | anchor.c | 69,432,606,966,181,620,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2016-9425 | An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. Heap-based buffer overflow in the addMultirowsForm function in w3m allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2016-9425 |
202,102 | libvncserver | 54220248886b5001fbbb9fa73c4e1a2cb9413fed | https://github.com/LibVNC/libvncserver | https://github.com/LibVNC/libvncserver/commit/54220248886b5001fbbb9fa73c4e1a2cb9413fed | libvncclient/cursor: limit width/height input values
Avoids a possible heap overflow reported by Pavel Cheremushkin
<Pavel.Cheremushkin@kaspersky.com>.
re #275 | 1 | rfbBool HandleCursorShape(rfbClient* client,int xhot, int yhot, int width, int height, uint32_t enc)
{
int bytesPerPixel;
size_t bytesPerRow, bytesMaskData;
rfbXCursorColors rgb;
uint32_t colors[2];
char *buf;
uint8_t *ptr;
int x, y, b;
bytesPerPixel = client->format.bitsPerPixel / 8;
bytesPerRow = (... | 39,577,060,366,477,863,000,000,000,000,000,000,000 | cursor.c | 120,462,937,858,052,550,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2019-20788 | libvncclient/cursor.c in LibVNCServer through 0.9.12 has a HandleCursorShape integer overflow and heap-based buffer overflow via a large height or width value. NOTE: this may overlap CVE-2019-15690. | https://nvd.nist.gov/vuln/detail/CVE-2019-20788 |
329,340 | libvncserver | 54220248886b5001fbbb9fa73c4e1a2cb9413fed | https://github.com/LibVNC/libvncserver | https://github.com/LibVNC/libvncserver/commit/54220248886b5001fbbb9fa73c4e1a2cb9413fed | libvncclient/cursor: limit width/height input values
Avoids a possible heap overflow reported by Pavel Cheremushkin
<Pavel.Cheremushkin@kaspersky.com>.
re #275 | 0 | rfbBool HandleCursorShape(rfbClient* client,int xhot, int yhot, int width, int height, uint32_t enc)
{
int bytesPerPixel;
size_t bytesPerRow, bytesMaskData;
rfbXCursorColors rgb;
uint32_t colors[2];
char *buf;
uint8_t *ptr;
int x, y, b;
bytesPerPixel = client->format.bitsPerPixel / 8;
bytesPerRow = (... | 107,932,542,597,500,300,000,000,000,000,000,000,000 | cursor.c | 87,727,908,196,640,740,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2019-20788 | libvncclient/cursor.c in LibVNCServer through 0.9.12 has a HandleCursorShape integer overflow and heap-based buffer overflow via a large height or width value. NOTE: this may overlap CVE-2019-15690. | https://nvd.nist.gov/vuln/detail/CVE-2019-20788 |
202,106 | systemd | 5ba6985b6c8ef85a8bcfeb1b65239c863436e75b | https://github.com/systemd/systemd | https://github.com/systemd/systemd/commit/5ba6985b6c8ef85a8bcfeb1b65239c863436e75b#diff-ab78220e12703ee63fa1e6a2caa16bebR1319 | core: allow PIDs to be watched by two units at the same time
In some cases it is interesting to map a PID to two units at the same
time. For example, when a user logs in via a getty, which is reexeced to
/sbin/login that binary will be explicitly referenced as main pid of the
getty service, as well as implicitly refer... | 1 | static int manager_dispatch_notify_fd(sd_event_source *source, int fd, uint32_t revents, void *userdata) {
Manager *m = userdata;
ssize_t n;
assert(m);
assert(m->notify_fd == fd);
if (revents != EPOLLIN) {
log_warning("Got unexpected poll event for notify fd.");... | 173,752,175,347,809,900,000,000,000,000,000,000,000 | manager.c | 5,670,024,753,497,447,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2016-7796 | The manager_dispatch_notify_fd function in systemd allows local users to cause a denial of service (system hang) via a zero-length message received over a notify socket, which causes an error to be returned and the notification handler to be disabled. | https://nvd.nist.gov/vuln/detail/CVE-2016-7796 |
329,424 | systemd | 5ba6985b6c8ef85a8bcfeb1b65239c863436e75b | https://github.com/systemd/systemd | https://github.com/systemd/systemd/commit/5ba6985b6c8ef85a8bcfeb1b65239c863436e75b#diff-ab78220e12703ee63fa1e6a2caa16bebR1319 | core: allow PIDs to be watched by two units at the same time
In some cases it is interesting to map a PID to two units at the same
time. For example, when a user logs in via a getty, which is reexeced to
/sbin/login that binary will be explicitly referenced as main pid of the
getty service, as well as implicitly refer... | 0 | static int manager_dispatch_notify_fd(sd_event_source *source, int fd, uint32_t revents, void *userdata) {
Manager *m = userdata;
ssize_t n;
assert(m);
assert(m->notify_fd == fd);
if (revents != EPOLLIN) {
log_warning("Got unexpected poll event for notify fd.");... | 294,712,827,854,744,740,000,000,000,000,000,000,000 | manager.c | 301,752,339,566,170,350,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2016-7796 | The manager_dispatch_notify_fd function in systemd allows local users to cause a denial of service (system hang) via a zero-length message received over a notify socket, which causes an error to be returned and the notification handler to be disabled. | https://nvd.nist.gov/vuln/detail/CVE-2016-7796 |
202,123 | libvirt | 1ac703a7d0789e46833f4013a3876c2e3af18ec7 | https://github.com/libvirt/libvirt | https://github.com/libvirt/libvirt/commit/1ac703a7d0789e46833f4013a3876c2e3af18ec7 | qemu: Add missing lock in qemuProcessHandleMonitorEOF
qemuMonitorUnregister will be called in multiple threads (e.g. threads
in rpc worker pool and the vm event thread). In some cases, it isn't
protected by the monitor lock, which may lead to call g_source_unref
more than one time and a use-after-free problem eventua... | 1 | qemuProcessHandleMonitorEOF(qemuMonitorPtr mon,
virDomainObjPtr vm,
void *opaque)
{
virQEMUDriverPtr driver = opaque;
qemuDomainObjPrivatePtr priv;
struct qemuProcessEvent *processEvent;
virObjectLock(vm);
VIR_DEBUG("Received EOF on %p '%s'",... | 296,375,151,272,918,900,000,000,000,000,000,000,000 | qemu_process.c | 126,512,858,476,313,650,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2021-3975 | A use-after-free flaw was found in libvirt. The qemuMonitorUnregister() function in qemuProcessHandleMonitorEOF is called using multiple threads without being adequately protected by a monitor lock. This flaw could be triggered by the virConnectGetAllDomainStats API when the guest is shutting down. An unprivileged clie... | https://nvd.nist.gov/vuln/detail/CVE-2021-3975 |
329,834 | libvirt | 1ac703a7d0789e46833f4013a3876c2e3af18ec7 | https://github.com/libvirt/libvirt | https://github.com/libvirt/libvirt/commit/1ac703a7d0789e46833f4013a3876c2e3af18ec7 | qemu: Add missing lock in qemuProcessHandleMonitorEOF
qemuMonitorUnregister will be called in multiple threads (e.g. threads
in rpc worker pool and the vm event thread). In some cases, it isn't
protected by the monitor lock, which may lead to call g_source_unref
more than one time and a use-after-free problem eventua... | 0 | qemuProcessHandleMonitorEOF(qemuMonitorPtr mon,
virDomainObjPtr vm,
void *opaque)
{
virQEMUDriverPtr driver = opaque;
qemuDomainObjPrivatePtr priv;
struct qemuProcessEvent *processEvent;
virObjectLock(vm);
VIR_DEBUG("Received EOF on %p '%s'",... | 319,210,677,625,955,070,000,000,000,000,000,000,000 | qemu_process.c | 40,436,527,909,853,784,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2021-3975 | A use-after-free flaw was found in libvirt. The qemuMonitorUnregister() function in qemuProcessHandleMonitorEOF is called using multiple threads without being adequately protected by a monitor lock. This flaw could be triggered by the virConnectGetAllDomainStats API when the guest is shutting down. An unprivileged clie... | https://nvd.nist.gov/vuln/detail/CVE-2021-3975 |
202,126 | libnbd | fb4440de9cc76e9c14bd3ddf3333e78621f40ad0 | https://github.com/libguestfs/libnbd | https://gitlab.com/nbdkit/libnbd/-/commit/fb4440de9cc76e9c14bd3ddf3333e78621f40ad0 | opt_go: Tolerate unplanned server death
While debugging some experimental nbdkit code that was triggering an
assertion failure in nbdkit, I noticed a secondary failure of nbdsh
also dying from an assertion:
libnbd: debug: nbdsh: nbd_opt_go: transition: NEWSTYLE.OPT_GO.SEND -> DEAD
libnbd: debug: nbdsh: nbd_opt_go: op... | 1 | nbd_unlocked_opt_go (struct nbd_handle *h)
{
int err;
nbd_completion_callback c = { .callback = go_complete, .user_data = &err };
int r = nbd_unlocked_aio_opt_go (h, &c);
if (r == -1)
return r;
r = wait_for_option (h);
if (r == 0 && err) {
assert (nbd_internal_is_state_negotiating (get_next_state ... | 47,615,101,633,989,830,000,000,000,000,000,000,000 | opt.c | 71,024,660,452,033,230,000,000,000,000,000,000,000 | [
"CWE-617"
] | CVE-2021-20286 | A flaw was found in libnbd 1.7.3. An assertion failure in nbd_unlocked_opt_go in ilb/opt.c may lead to denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2021-20286 |
329,964 | libnbd | fb4440de9cc76e9c14bd3ddf3333e78621f40ad0 | https://github.com/libguestfs/libnbd | https://gitlab.com/nbdkit/libnbd/-/commit/fb4440de9cc76e9c14bd3ddf3333e78621f40ad0 | opt_go: Tolerate unplanned server death
While debugging some experimental nbdkit code that was triggering an
assertion failure in nbdkit, I noticed a secondary failure of nbdsh
also dying from an assertion:
libnbd: debug: nbdsh: nbd_opt_go: transition: NEWSTYLE.OPT_GO.SEND -> DEAD
libnbd: debug: nbdsh: nbd_opt_go: op... | 0 | nbd_unlocked_opt_go (struct nbd_handle *h)
{
int err;
nbd_completion_callback c = { .callback = go_complete, .user_data = &err };
int r = nbd_unlocked_aio_opt_go (h, &c);
if (r == -1)
return r;
r = wait_for_option (h);
if (r == 0 && err) {
assert (nbd_internal_is_state_negotiating (get_next_state ... | 129,936,324,755,808,880,000,000,000,000,000,000,000 | opt.c | 127,494,546,611,368,130,000,000,000,000,000,000,000 | [
"CWE-617"
] | CVE-2021-20286 | A flaw was found in libnbd 1.7.3. An assertion failure in nbd_unlocked_opt_go in ilb/opt.c may lead to denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2021-20286 |
202,128 | gnutls | 5140422e0d7319a8e2fe07f02cbcafc4d6538732 | http://git.savannah.gnu.org/cgit/gnutls | https://gitlab.com/gnutls/gnutls/commit/5140422e0d7319a8e2fe07f02cbcafc4d6538732 | opencdk: cdk_pk_get_keyid: fix stack overflow
Issue found using oss-fuzz:
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=340
Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com> | 1 | u32 cdk_pk_get_keyid(cdk_pubkey_t pk, u32 * keyid)
{
u32 lowbits = 0;
byte buf[24];
if (pk && (!pk->keyid[0] || !pk->keyid[1])) {
if (pk->version < 4 && is_RSA(pk->pubkey_algo)) {
byte p[MAX_MPI_BYTES];
size_t n;
n = MAX_MPI_BYTES;
_gnutls_mpi_print(pk->mpi[0], p, &n);
pk->keyid[0] =
p[n - ... | 320,353,488,162,610,840,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2017-5336 | Stack-based buffer overflow in the cdk_pk_get_keyid function in lib/opencdk/pubkey.c in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allows remote attackers to have unspecified impact via a crafted OpenPGP certificate. | https://nvd.nist.gov/vuln/detail/CVE-2017-5336 |
329,986 | gnutls | 5140422e0d7319a8e2fe07f02cbcafc4d6538732 | http://git.savannah.gnu.org/cgit/gnutls | https://gitlab.com/gnutls/gnutls/commit/5140422e0d7319a8e2fe07f02cbcafc4d6538732 | opencdk: cdk_pk_get_keyid: fix stack overflow
Issue found using oss-fuzz:
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=340
Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com> | 0 | u32 cdk_pk_get_keyid(cdk_pubkey_t pk, u32 * keyid)
{
u32 lowbits = 0;
byte buf[24];
int rc;
if (pk && (!pk->keyid[0] || !pk->keyid[1])) {
if (pk->version < 4 && is_RSA(pk->pubkey_algo)) {
byte p[MAX_MPI_BYTES];
size_t n;
n = MAX_MPI_BYTES;
rc = _gnutls_mpi_print(pk->mpi[0], p, &n);
if (rc < 0 || ... | 304,871,630,503,536,520,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2017-5336 | Stack-based buffer overflow in the cdk_pk_get_keyid function in lib/opencdk/pubkey.c in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allows remote attackers to have unspecified impact via a crafted OpenPGP certificate. | https://nvd.nist.gov/vuln/detail/CVE-2017-5336 |
202,134 | libbson | 42900956dc461dfe7fb91d93361d10737c1602b3 | https://github.com/mongodb/libbson | https://github.com/mongodb/libbson/commit/42900956dc461dfe7fb91d93361d10737c1602b3 | CDRIVER-2269 Check for zero string length in codewscope | 1 | bson_iter_codewscope (const bson_iter_t *iter, /* IN */
uint32_t *length, /* OUT */
uint32_t *scope_len, /* OUT */
const uint8_t **scope) /* OUT */
{
uint32_t len;
BSON_ASSERT (iter);
if (ITER_TYPE (iter) == BSON_TYPE_CODEWSCOPE) ... | 275,073,406,154,073,070,000,000,000,000,000,000,000 | bson-iter.c | 89,081,523,405,938,720,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-14227 | In MongoDB libbson 1.7.0, the bson_iter_codewscope function in bson-iter.c miscalculates a bson_utf8_validate length argument, which allows remote attackers to cause a denial of service (heap-based buffer over-read in the bson_utf8_validate function in bson-utf8.c), as demonstrated by bson-to-json.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-14227 |
173,474 | mongo-c-driver | 0d9a4d98bfdf4acd2c0138d4aaeb4e2e0934bd84 | https://github.com/mongodb/mongo-c-driver | https://github.com/mongodb/mongo-c-driver/commit/0d9a4d98bfdf4acd2c0138d4aaeb4e2e0934bd84 | Fix for CVE-2018-16790 -- Verify bounds before binary length read.
As reported here: https://jira.mongodb.org/browse/CDRIVER-2819,
a heap overread occurs due a failure to correctly verify data
bounds.
In the original check, len - o returns the data left including the
sizeof(l) we just read. Instead, the comparison sh... | 0 | bson_iter_codewscope (const bson_iter_t *iter, /* IN */
uint32_t *length, /* OUT */
uint32_t *scope_len, /* OUT */
const uint8_t **scope) /* OUT */
{
uint32_t len;
BSON_ASSERT (iter);
if (ITER_TYPE (iter) == BSON_TYPE_CODEWSCOPE) ... | 106,364,726,993,804,840,000,000,000,000,000,000,000 | bson-iter.c | 108,063,000,104,905,270,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-16790 | _bson_iter_next_internal in bson-iter.c in libbson 1.12.0, as used in MongoDB mongo-c-driver and other products, has a heap-based buffer over-read via a crafted bson buffer. | https://nvd.nist.gov/vuln/detail/CVE-2018-16790 |
202,137 | kvm | c73f4c998e1fd4249b9edfa39e23f4fda2b9b041 | http://git.kernel.org/?p=linux/kernel/git/avi/kvm | https://git.kernel.org/pub/scm/virt/kvm/kvm.git/commit/?id=c73f4c998e1fd4249b9edfa39e23f4fda2b9b041 | KVM: x86: nVMX: fix x2APIC VTPR read intercept
Referring to the "VIRTUALIZING MSR-BASED APIC ACCESSES" chapter of the
SDM, when "virtualize x2APIC mode" is 1 and "APIC-register
virtualization" is 0, a RDMSR of 808H should return the VTPR from the
virtual APIC page.
However, for nested, KVM currently fails to disable ... | 1 | static inline bool nested_vmx_prepare_msr_bitmap(struct kvm_vcpu *vcpu,
struct vmcs12 *vmcs12)
{
int msr;
struct page *page;
unsigned long *msr_bitmap_l1;
unsigned long *msr_bitmap_l0 = to_vmx(vcpu)->nested.vmcs02.msr_bitmap;
/*
* pred_cmd & spec_ctrl are trying to verify two things:
*
* 1. L0 gave a ... | 83,250,227,838,054,760,000,000,000,000,000,000,000 | nested.c | 85,075,074,444,242,950,000,000,000,000,000,000,000 | [
"CWE-863"
] | CVE-2019-3887 | A flaw was found in the way KVM hypervisor handled x2APIC Machine Specific Rregister (MSR) access with nested(=1) virtualization enabled. In that, L1 guest could access L0's APIC register values via L2 guest, when 'virtualize x2APIC mode' is enabled. A guest could use this flaw to potentially crash the host kernel resu... | https://nvd.nist.gov/vuln/detail/CVE-2019-3887 |
330,058 | kvm | c73f4c998e1fd4249b9edfa39e23f4fda2b9b041 | http://git.kernel.org/?p=linux/kernel/git/avi/kvm | https://git.kernel.org/pub/scm/virt/kvm/kvm.git/commit/?id=c73f4c998e1fd4249b9edfa39e23f4fda2b9b041 | KVM: x86: nVMX: fix x2APIC VTPR read intercept
Referring to the "VIRTUALIZING MSR-BASED APIC ACCESSES" chapter of the
SDM, when "virtualize x2APIC mode" is 1 and "APIC-register
virtualization" is 0, a RDMSR of 808H should return the VTPR from the
virtual APIC page.
However, for nested, KVM currently fails to disable ... | 0 | static inline bool nested_vmx_prepare_msr_bitmap(struct kvm_vcpu *vcpu,
struct vmcs12 *vmcs12)
{
int msr;
struct page *page;
unsigned long *msr_bitmap_l1;
unsigned long *msr_bitmap_l0 = to_vmx(vcpu)->nested.vmcs02.msr_bitmap;
/*
* pred_cmd & spec_ctrl are trying to verify two things:
*
* 1. L0 gave a ... | 270,136,478,091,988,850,000,000,000,000,000,000,000 | nested.c | 205,519,902,988,124,440,000,000,000,000,000,000,000 | [
"CWE-863"
] | CVE-2019-3887 | A flaw was found in the way KVM hypervisor handled x2APIC Machine Specific Rregister (MSR) access with nested(=1) virtualization enabled. In that, L1 guest could access L0's APIC register values via L2 guest, when 'virtualize x2APIC mode' is enabled. A guest could use this flaw to potentially crash the host kernel resu... | https://nvd.nist.gov/vuln/detail/CVE-2019-3887 |
202,138 | ImageMagick | be90a5395695f0d19479a5d46b06c678be7f7927 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/be90a5395695f0d19479a5d46b06c678be7f7927 | https://github.com/ImageMagick/ImageMagick/issues/1721 | 1 | MagickExport MagickBooleanType SubstituteString(char **string,
const char *search,const char *replace)
{
MagickBooleanType
status;
register char
*p;
size_t
extent,
replace_extent,
search_extent;
ssize_t
offset;
status=MagickFalse;
search_extent=0,
replace_extent=0;
for (p=s... | 247,015,584,148,195,800,000,000,000,000,000,000,000 | string.c | 148,311,678,202,187,430,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2020-27770 | Due to a missing check for 0 value of `replace_extent`, it is possible for offset `p` to overflow in SubstituteString(), causing potential impact to application availability. This could be triggered by a crafted input file that is processed by ImageMagick. This flaw affects ImageMagick versions prior to 7.0.8-68. | https://nvd.nist.gov/vuln/detail/CVE-2020-27770 |
330,211 | ImageMagick | be90a5395695f0d19479a5d46b06c678be7f7927 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/be90a5395695f0d19479a5d46b06c678be7f7927 | https://github.com/ImageMagick/ImageMagick/issues/1721 | 0 | MagickExport MagickBooleanType SubstituteString(char **string,
const char *search,const char *replace)
{
MagickBooleanType
status;
register char
*p;
size_t
extent,
replace_extent,
search_extent;
ssize_t
offset;
status=MagickFalse;
search_extent=0,
replace_extent=0;
for (p=s... | 63,558,597,364,294,190,000,000,000,000,000,000,000 | string.c | 150,784,112,848,810,580,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2020-27770 | Due to a missing check for 0 value of `replace_extent`, it is possible for offset `p` to overflow in SubstituteString(), causing potential impact to application availability. This could be triggered by a crafted input file that is processed by ImageMagick. This flaw affects ImageMagick versions prior to 7.0.8-68. | https://nvd.nist.gov/vuln/detail/CVE-2020-27770 |
202,142 | flac | 5b3033a2b355068c11fe637e14ac742d273f076e | https://github.com/xiph/flac | https://git.xiph.org/?p=flac.git;a=commitdiff;h=5b3033a2b355068c11fe637e14ac742d273f076e | src/libFLAC/stream_decoder.c : Fix buffer read overflow.
This is CVE-2014-8962.
Reported-by: Michele Spagnuolo,
Google Security Team <mikispag@google.com> | 1 | FLAC__bool find_metadata_(FLAC__StreamDecoder *decoder)
{
FLAC__uint32 x;
unsigned i, id;
FLAC__bool first = true;
FLAC__ASSERT(FLAC__bitreader_is_consumed_byte_aligned(decoder->private_->input));
for(i = id = 0; i < 4; ) {
if(decoder->private_->cached) {
x = (FLAC__uint32)decoder->private_->lookahead;
d... | 180,429,322,722,676,660,000,000,000,000,000,000,000 | stream_decoder.c | 115,711,489,701,705,800,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2014-8962 | Stack-based buffer overflow in stream_decoder.c in libFLAC before 1.3.1 allows remote attackers to execute arbitrary code via a crafted .flac file. | https://nvd.nist.gov/vuln/detail/CVE-2014-8962 |
155,111 | Android | b499389da21d89d32deff500376c5ee4f8f0b04c | None | https://android.googlesource.com/platform/external/flac/+/b499389da21d89d32deff500376c5ee4f8f0b04c | None | 0 | FLAC__bool find_metadata_(FLAC__StreamDecoder *decoder)
{
FLAC__uint32 x;
unsigned i, id;
FLAC__bool first = true;
FLAC__ASSERT(FLAC__bitreader_is_consumed_byte_aligned(decoder->private_->input));
for(i = id = 0; i < 4; ) {
if(decoder->private_->cached) {
x = (FLAC__uint32)decoder->private_->lookahead;
de... | 23,178,345,795,516,820,000,000,000,000,000,000,000 | stream_decoder.c | 331,429,774,554,564,650,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2016-2429 | libFLAC/stream_decoder.c in mediaserver in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-05-01 does not prevent free operations on uninitialized memory, which allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted med... | https://nvd.nist.gov/vuln/detail/CVE-2016-2429 |
202,147 | squid | bc9786119f058a76ddf0625424bc33d36460b9a2 | https://github.com/squid-cache/squid | https://github.com/squid-cache/squid/commit/bc9786119f058a76ddf0625424bc33d36460b9a2 | Fix memory leak when parsing SNMP packet (#313)
SNMP queries denied by snmp_access rules and queries with certain
unsupported SNMPv2 commands were leaking a few hundred bytes each. Such
queries trigger "SNMP agent query DENIED from..." WARNINGs in cache.log. | 1 | snmpDecodePacket(SnmpRequest * rq)
{
struct snmp_pdu *PDU;
u_char *Community;
u_char *buf = rq->buf;
int len = rq->len;
allow_t allow = ACCESS_DENIED;
if (!Config.accessList.snmp) {
debugs(49, DBG_IMPORTANT, "WARNING: snmp_access not configured. agent query DENIED from : " << rq->from);... | 229,305,215,408,163,860,000,000,000,000,000,000,000 | snmp_core.cc | 145,255,345,217,990,060,000,000,000,000,000,000,000 | [
"CWE-772"
] | CVE-2018-19132 | Squid before 4.4, when SNMP is enabled, allows a denial of service (Memory Leak) via an SNMP packet. | https://nvd.nist.gov/vuln/detail/CVE-2018-19132 |
330,586 | squid | bc9786119f058a76ddf0625424bc33d36460b9a2 | https://github.com/squid-cache/squid | https://github.com/squid-cache/squid/commit/bc9786119f058a76ddf0625424bc33d36460b9a2 | Fix memory leak when parsing SNMP packet (#313)
SNMP queries denied by snmp_access rules and queries with certain
unsupported SNMPv2 commands were leaking a few hundred bytes each. Such
queries trigger "SNMP agent query DENIED from..." WARNINGs in cache.log. | 0 | snmpDecodePacket(SnmpRequest * rq)
{
struct snmp_pdu *PDU;
u_char *Community;
u_char *buf = rq->buf;
int len = rq->len;
allow_t allow = ACCESS_DENIED;
if (!Config.accessList.snmp) {
debugs(49, DBG_IMPORTANT, "WARNING: snmp_access not configured. agent query DENIED from : " << rq->from);... | 335,564,517,486,763,000,000,000,000,000,000,000,000 | snmp_core.cc | 76,694,978,994,968,035,000,000,000,000,000,000,000 | [
"CWE-772"
] | CVE-2018-19132 | Squid before 4.4, when SNMP is enabled, allows a denial of service (Memory Leak) via an SNMP packet. | https://nvd.nist.gov/vuln/detail/CVE-2018-19132 |
202,164 | php-src | 1cc2182bcc81e185c14837e659d12b268cb99d63 | https://github.com/php/php-src | http://git.php.net/?p=php-src.git;a=commit;h=1cc2182bcc81e185c14837e659d12b268cb99d63 | Fix bug #77380 (Global out of bounds read in xmlrpc base64 code) | 1 | void base64_decode_xmlrpc(struct buffer_st *bfr, const char *source, int length)
{
int i;
int offset = 0;
int endoffile;
int count;
buffer_new(bfr);
for (i = 0; i < 255; i++) {
dtable[i] = 0x80;
}
for (i = 'A'; i <= 'Z'; i++) {
dtable[i] = 0 + (i - 'A');
}
for (i = 'a'... | 177,601,521,839,748,800,000,000,000,000,000,000,000 | base64.c | 203,306,527,348,640,560,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-9024 | An issue was discovered in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1. xmlrpc_decode() can allow a hostile XMLRPC server to cause PHP to read memory outside of allocated areas in base64_decode_xmlrpc in ext/xmlrpc/libxmlrpc/base64.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-9024 |
330,596 | php-src | 1cc2182bcc81e185c14837e659d12b268cb99d63 | https://github.com/php/php-src | http://git.php.net/?p=php-src.git;a=commit;h=1cc2182bcc81e185c14837e659d12b268cb99d63 | Fix bug #77380 (Global out of bounds read in xmlrpc base64 code) | 0 | void base64_decode_xmlrpc(struct buffer_st *bfr, const char *source, int length)
{
int i;
int offset = 0;
int endoffile;
int count;
buffer_new(bfr);
for (i = 0; i < 255; i++) {
dtable[i] = 0x80;
}
for (i = 'A'; i <= 'Z'; i++) {
dtable[i] = 0 + (i - 'A');
}
for (i = 'a'... | 215,161,175,076,392,330,000,000,000,000,000,000,000 | base64.c | 336,539,182,073,183,360,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-9024 | An issue was discovered in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1. xmlrpc_decode() can allow a hostile XMLRPC server to cause PHP to read memory outside of allocated areas in base64_decode_xmlrpc in ext/xmlrpc/libxmlrpc/base64.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-9024 |
202,170 | ghostpdl | 863ada11f9a942a622a581312e2be022d9e2a6f7 | https://github.com/ArtifexSoftware/ghostpdl | https://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=863ada11f9a942a622a581312e2be022d9e2a6f7 | Bug 701793: check we are within buffer before comparing buffer contents.
Fixes:
./sanbin/gs -sOutputFile=tmp -sDEVICE=mj700v2c ../bug-701793.pdf | 1 | mj_raster_cmd(int c_id, int in_size, byte* in, byte* buf2,
gx_device_printer* pdev, gp_file* prn_stream)
{
int band_size = 1; /* 1, 8, or 24 */
byte *out = buf2;
int width = in_size;
int count;
byte* in_end = in + in_size;
static char colour_number[] = "\004\001\002\000"; /* color ID for M... | 295,676,707,606,288,170,000,000,000,000,000,000,000 | gdevmjc.c | 297,006,271,957,475,500,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2020-16292 | A buffer overflow vulnerability in mj_raster_cmd() in contrib/japanese/gdevmjc.c of Artifex Software GhostScript v9.50 allows a remote attacker to cause a denial of service via a crafted PDF file. This is fixed in v9.51. | https://nvd.nist.gov/vuln/detail/CVE-2020-16292 |
330,751 | ghostpdl | 863ada11f9a942a622a581312e2be022d9e2a6f7 | https://github.com/ArtifexSoftware/ghostpdl | https://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=863ada11f9a942a622a581312e2be022d9e2a6f7 | Bug 701793: check we are within buffer before comparing buffer contents.
Fixes:
./sanbin/gs -sOutputFile=tmp -sDEVICE=mj700v2c ../bug-701793.pdf | 0 | mj_raster_cmd(int c_id, int in_size, byte* in, byte* buf2,
gx_device_printer* pdev, gp_file* prn_stream)
{
int band_size = 1; /* 1, 8, or 24 */
byte *out = buf2;
int width = in_size;
int count;
byte* in_end = in + in_size;
static char colour_number[] = "\004\001\002\000"; /* color ID for M... | 96,413,807,475,260,330,000,000,000,000,000,000,000 | gdevmjc.c | 171,261,658,968,975,040,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2020-16292 | A buffer overflow vulnerability in mj_raster_cmd() in contrib/japanese/gdevmjc.c of Artifex Software GhostScript v9.50 allows a remote attacker to cause a denial of service via a crafted PDF file. This is fixed in v9.51. | https://nvd.nist.gov/vuln/detail/CVE-2020-16292 |
202,173 | mod_wsgi | b0a149c1f5e569932325972e2e20176a42e43517 | https://github.com/GrahamDumpleton/mod_wsgi | https://github.com/GrahamDumpleton/mod_wsgi/commit/b0a149c1f5e569932325972e2e20176a42e43517 | Fix bug where content type returned for response could be corrupted when using embedded mode. | 1 | static int Adapter_output(AdapterObject *self, const char *data, int length,
int exception_when_aborted)
{
int i = 0;
int n = 0;
apr_status_t rv;
request_rec *r;
#if defined(MOD_WSGI_WITH_DAEMONS)
if (wsgi_inactivity_timeout) {
apr_thread_mutex_lock(wsgi_shutdown_l... | 256,893,926,997,418,600,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2014-0242 | mod_wsgi module before 3.4 for Apache, when used in embedded mode, might allow remote attackers to obtain sensitive information via the Content-Type header which is generated from memory that may have been freed and then overwritten by a separate thread. | https://nvd.nist.gov/vuln/detail/CVE-2014-0242 |
330,929 | mod_wsgi | b0a149c1f5e569932325972e2e20176a42e43517 | https://github.com/GrahamDumpleton/mod_wsgi | https://github.com/GrahamDumpleton/mod_wsgi/commit/b0a149c1f5e569932325972e2e20176a42e43517 | Fix bug where content type returned for response could be corrupted when using embedded mode. | 0 | static int Adapter_output(AdapterObject *self, const char *data, int length,
int exception_when_aborted)
{
int i = 0;
int n = 0;
apr_status_t rv;
request_rec *r;
#if defined(MOD_WSGI_WITH_DAEMONS)
if (wsgi_inactivity_timeout) {
apr_thread_mutex_lock(wsgi_shutdown_l... | 319,800,051,204,699,860,000,000,000,000,000,000,000 | mod_wsgi.c | 126,965,859,754,709,700,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2014-0242 | mod_wsgi module before 3.4 for Apache, when used in embedded mode, might allow remote attackers to obtain sensitive information via the Content-Type header which is generated from memory that may have been freed and then overwritten by a separate thread. | https://nvd.nist.gov/vuln/detail/CVE-2014-0242 |
202,175 | libjpeg-turbo | 3d9c64e9f8aa1ee954d1d0bb3390fc894bb84da3 | https://github.com/libjpeg-turbo/libjpeg-turbo | https://github.com/libjpeg-turbo/libjpeg-turbo/commit/3d9c64e9f8aa1ee954d1d0bb3390fc894bb84da3 | tjLoadImage(): Fix int overflow/segfault w/big BMP
Fixes #304 | 1 | DLLEXPORT unsigned char *tjLoadImage(const char *filename, int *width,
int align, int *height, int *pixelFormat,
int flags)
{
int retval = 0, tempc, pitch;
tjhandle handle = NULL;
tjinstance *this;
j_compress_ptr cinfo = NULL;
cjpeg_sou... | 90,431,479,952,001,210,000,000,000,000,000,000,000 | turbojpeg.c | 172,113,581,112,298,570,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2018-20330 | The tjLoadImage function in libjpeg-turbo 2.0.1 has an integer overflow with a resultant heap-based buffer overflow via a BMP image because multiplication of pitch and height is mishandled, as demonstrated by tjbench. | https://nvd.nist.gov/vuln/detail/CVE-2018-20330 |
331,065 | libjpeg-turbo | 3d9c64e9f8aa1ee954d1d0bb3390fc894bb84da3 | https://github.com/libjpeg-turbo/libjpeg-turbo | https://github.com/libjpeg-turbo/libjpeg-turbo/commit/3d9c64e9f8aa1ee954d1d0bb3390fc894bb84da3 | tjLoadImage(): Fix int overflow/segfault w/big BMP
Fixes #304 | 0 | DLLEXPORT unsigned char *tjLoadImage(const char *filename, int *width,
int align, int *height, int *pixelFormat,
int flags)
{
int retval = 0, tempc;
size_t pitch;
tjhandle handle = NULL;
tjinstance *this;
j_compress_ptr cinfo = NULL;
... | 163,974,517,268,169,150,000,000,000,000,000,000,000 | turbojpeg.c | 125,871,081,058,006,600,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2018-20330 | The tjLoadImage function in libjpeg-turbo 2.0.1 has an integer overflow with a resultant heap-based buffer overflow via a BMP image because multiplication of pitch and height is mishandled, as demonstrated by tjbench. | https://nvd.nist.gov/vuln/detail/CVE-2018-20330 |
202,213 | mutt | 04b06aaa3e0cc0022b9b01dbca2863756ebbf59a | https://github.com/muttmua/mutt | https://gitlab.com/muttmua/mutt/-/commit/04b06aaa3e0cc0022b9b01dbca2863756ebbf59a | Ensure IMAP connection is closed after a connection error.
During connection, if the server provided an illegal initial response,
Mutt "bailed", but did not actually close the connection. The calling
code unfortunately relied on the connection status to decide to
continue with authentication, instead of checking the ... | 1 | int imap_open_connection (IMAP_DATA* idata)
{
if (mutt_socket_open (idata->conn) < 0)
return -1;
idata->state = IMAP_CONNECTED;
if (imap_cmd_step (idata) != IMAP_CMD_OK)
{
imap_close_connection (idata);
return -1;
}
if (ascii_strncasecmp ("* OK", idata->buf, 4) == 0)
{
if (ascii_strncas... | 174,178,878,428,139,360,000,000,000,000,000,000,000 | None | null | [
"CWE-287"
] | CVE-2020-28896 | Mutt before 2.0.2 and NeoMutt before 2020-11-20 did not ensure that $ssl_force_tls was processed if an IMAP server's initial server response was invalid. The connection was not properly closed, and the code could continue attempting to authenticate. This could result in authentication credentials being exposed on an un... | https://nvd.nist.gov/vuln/detail/CVE-2020-28896 |
331,259 | mutt | 04b06aaa3e0cc0022b9b01dbca2863756ebbf59a | https://github.com/muttmua/mutt | https://gitlab.com/muttmua/mutt/-/commit/04b06aaa3e0cc0022b9b01dbca2863756ebbf59a | Ensure IMAP connection is closed after a connection error.
During connection, if the server provided an illegal initial response,
Mutt "bailed", but did not actually close the connection. The calling
code unfortunately relied on the connection status to decide to
continue with authentication, instead of checking the ... | 0 | int imap_open_connection (IMAP_DATA* idata)
{
if (mutt_socket_open (idata->conn) < 0)
return -1;
idata->state = IMAP_CONNECTED;
if (imap_cmd_step (idata) != IMAP_CMD_OK)
{
imap_close_connection (idata);
return -1;
}
if (ascii_strncasecmp ("* OK", idata->buf, 4) == 0)
{
if (ascii_strncas... | 189,886,521,713,593,770,000,000,000,000,000,000,000 | None | null | [
"CWE-287"
] | CVE-2020-28896 | Mutt before 2.0.2 and NeoMutt before 2020-11-20 did not ensure that $ssl_force_tls was processed if an IMAP server's initial server response was invalid. The connection was not properly closed, and the code could continue attempting to authenticate. This could result in authentication credentials being exposed on an un... | https://nvd.nist.gov/vuln/detail/CVE-2020-28896 |
202,221 | linux | 0771cbb3b97d3c1d68eecd7f00055f599954c34e | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/bluetooth/sco.c?h=v5.16&id=0771cbb3b97d3c1d68eecd7f00055f599954c34e | Bluetooth: SCO: Replace use of memcpy_from_msg with bt_skb_sendmsg
This makes use of bt_skb_sendmsg instead of allocating a different
buffer to be used with memcpy_from_msg which cause one extra copy.
Signed-off-by: Luiz Augusto von Dentz <luiz.von.dentz@intel.com>
Signed-off-by: Marcel Holtmann <marcel@holtmann.org> | 1 | static int sco_sock_sendmsg(struct socket *sock, struct msghdr *msg,
size_t len)
{
struct sock *sk = sock->sk;
void *buf;
int err;
BT_DBG("sock %p, sk %p", sock, sk);
err = sock_error(sk);
if (err)
return err;
if (msg->msg_flags & MSG_OOB)
return -EOPNOTSUPP;
buf = kmalloc(len, GFP_KERNEL);
if (... | 216,798,976,516,931,300,000,000,000,000,000,000,000 | sco.c | 45,873,663,657,047,450,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2021-3640 | A flaw use-after-free in function sco_sock_sendmsg() of the Linux kernel HCI subsystem was found in the way user calls ioct UFFDIO_REGISTER or other way triggers race condition of the call sco_conn_del() together with the call sco_sock_sendmsg() with the expected controllable faulting memory page. A privileged local us... | https://nvd.nist.gov/vuln/detail/CVE-2021-3640 |
331,459 | linux | 0771cbb3b97d3c1d68eecd7f00055f599954c34e | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/bluetooth/sco.c?h=v5.16&id=0771cbb3b97d3c1d68eecd7f00055f599954c34e | Bluetooth: SCO: Replace use of memcpy_from_msg with bt_skb_sendmsg
This makes use of bt_skb_sendmsg instead of allocating a different
buffer to be used with memcpy_from_msg which cause one extra copy.
Signed-off-by: Luiz Augusto von Dentz <luiz.von.dentz@intel.com>
Signed-off-by: Marcel Holtmann <marcel@holtmann.org> | 0 | static int sco_sock_sendmsg(struct socket *sock, struct msghdr *msg,
size_t len)
{
struct sock *sk = sock->sk;
struct sk_buff *skb;
int err;
BT_DBG("sock %p, sk %p", sock, sk);
err = sock_error(sk);
if (err)
return err;
if (msg->msg_flags & MSG_OOB)
return -EOPNOTSUPP;
skb = bt_skb_sendmsg(sk, ms... | 153,915,987,707,769,190,000,000,000,000,000,000,000 | sco.c | 83,743,780,750,720,340,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2021-3640 | A flaw use-after-free in function sco_sock_sendmsg() of the Linux kernel HCI subsystem was found in the way user calls ioct UFFDIO_REGISTER or other way triggers race condition of the call sco_conn_del() together with the call sco_sock_sendmsg() with the expected controllable faulting memory page. A privileged local us... | https://nvd.nist.gov/vuln/detail/CVE-2021-3640 |
202,222 | unbound | 34e52a4313d59b9d57e928c44300fd81e1a48910 | https://github.com/NLnetLabs/unbound | https://github.com/NLnetLabs/unbound/commit/34e52a4313d59b9d57e928c44300fd81e1a48910 | Fix CVE-2019-18934, shell execution in ipsecmod. | 1 | call_hook(struct module_qstate* qstate, struct ipsecmod_qstate* iq,
struct ipsecmod_env* ATTR_UNUSED(ie))
{
size_t slen, tempdata_len, tempstring_len, i;
char str[65535], *s, *tempstring;
int w;
struct ub_packed_rrset_key* rrset_key;
struct packed_rrset_data* rrset_data;
uint8_t *tempdata;
/* Check if a shell ... | 110,105,752,634,307,020,000,000,000,000,000,000,000 | ipsecmod.c | 305,184,166,617,009,700,000,000,000,000,000,000,000 | [
"CWE-78"
] | CVE-2019-18934 | Unbound 1.6.4 through 1.9.4 contain a vulnerability in the ipsec module that can cause shell code execution after receiving a specially crafted answer. This issue can only be triggered if unbound was compiled with `--enable-ipsecmod` support, and ipsecmod is enabled and used in the configuration. | https://nvd.nist.gov/vuln/detail/CVE-2019-18934 |
331,467 | unbound | 34e52a4313d59b9d57e928c44300fd81e1a48910 | https://github.com/NLnetLabs/unbound | https://github.com/NLnetLabs/unbound/commit/34e52a4313d59b9d57e928c44300fd81e1a48910 | Fix CVE-2019-18934, shell execution in ipsecmod. | 0 | call_hook(struct module_qstate* qstate, struct ipsecmod_qstate* iq,
struct ipsecmod_env* ATTR_UNUSED(ie))
{
size_t slen, tempdata_len, tempstring_len, i;
char str[65535], *s, *tempstring;
int w = 0, w_temp, qtype;
struct ub_packed_rrset_key* rrset_key;
struct packed_rrset_data* rrset_data;
uint8_t *tempdata;
/... | 326,752,930,817,361,400,000,000,000,000,000,000,000 | ipsecmod.c | 56,594,633,517,206,720,000,000,000,000,000,000,000 | [
"CWE-78"
] | CVE-2019-18934 | Unbound 1.6.4 through 1.9.4 contain a vulnerability in the ipsec module that can cause shell code execution after receiving a specially crafted answer. This issue can only be triggered if unbound was compiled with `--enable-ipsecmod` support, and ipsecmod is enabled and used in the configuration. | https://nvd.nist.gov/vuln/detail/CVE-2019-18934 |
202,225 | sssd | ed90a20a0f0e936eb00d268080716c0384ffb01d | http://git.fedorahosted.org/git/?p=sssd | https://github.com/SSSD/sssd/commit/ed90a20a0f0e936eb00d268080716c0384ffb01d | SUDO: Create the socket with stricter permissions
This patch switches the sudo responder from being created as a public
responder where the permissions are open and not checked by the sssd
deaamon to a private socket. In this case, sssd creates the pipes with
strict permissions (see the umask in the call to create_pip... | 1 | int sudo_process_init(TALLOC_CTX *mem_ctx,
struct tevent_context *ev,
struct confdb_ctx *cdb)
{
struct resp_ctx *rctx;
struct sss_cmd_table *sudo_cmds;
struct sudo_ctx *sudo_ctx;
struct be_conn *iter;
int ret;
int max_retries;
sudo_cmds = get_sudo... | 327,340,968,884,057,570,000,000,000,000,000,000,000 | sudosrv.c | 213,093,642,579,786,900,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2018-10852 | The UNIX pipe which sudo uses to contact SSSD and read the available sudo rules from SSSD has too wide permissions, which means that anyone who can send a message using the same raw protocol that sudo and SSSD use can read the sudo rules available for any user. This affects versions of SSSD before 1.16.3. | https://nvd.nist.gov/vuln/detail/CVE-2018-10852 |
331,479 | sssd | ed90a20a0f0e936eb00d268080716c0384ffb01d | http://git.fedorahosted.org/git/?p=sssd | https://github.com/SSSD/sssd/commit/ed90a20a0f0e936eb00d268080716c0384ffb01d | SUDO: Create the socket with stricter permissions
This patch switches the sudo responder from being created as a public
responder where the permissions are open and not checked by the sssd
deaamon to a private socket. In this case, sssd creates the pipes with
strict permissions (see the umask in the call to create_pip... | 0 | int sudo_process_init(TALLOC_CTX *mem_ctx,
struct tevent_context *ev,
struct confdb_ctx *cdb)
{
struct resp_ctx *rctx;
struct sss_cmd_table *sudo_cmds;
struct sudo_ctx *sudo_ctx;
struct be_conn *iter;
int ret;
int max_retries;
sudo_cmds = get_sudo... | 330,031,065,258,789,200,000,000,000,000,000,000,000 | sudosrv.c | 24,116,243,365,830,457,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2018-10852 | The UNIX pipe which sudo uses to contact SSSD and read the available sudo rules from SSSD has too wide permissions, which means that anyone who can send a message using the same raw protocol that sudo and SSSD use can read the sudo rules available for any user. This affects versions of SSSD before 1.16.3. | https://nvd.nist.gov/vuln/detail/CVE-2018-10852 |
202,260 | PackageKit | 7e8a7905ea9abbd1f384f05f36a4458682cd4697 | https://github.com/hughsie/PackageKit | https://github.com/hughsie/PackageKit/commit/7e8a7905ea9abbd1f384f05f36a4458682cd4697 | Do not set JUST_REINSTALL on any kind of auth failure
If we try to continue the auth queue when it has been cancelled (or failed)
then we fall upon the obscure JUST_REINSTALL transaction flag which only the
DNF backend actually verifies.
Many thanks to Matthias Gerstner <mgerstner@suse.de> for spotting the problem. | 1 | pk_transaction_authorize_actions_finished_cb (GObject *source_object,
GAsyncResult *res,
struct AuthorizeActionsData *data)
{
const gchar *action_id = NULL;
PkTransactionPrivate *priv = data->transaction->priv;
g_autoptr(GError) error = NULL;
g_autoptr(PolkitAuthorizationResult) result = NULL;... | 60,746,594,312,356,130,000,000,000,000,000,000,000 | pk-transaction.c | 104,377,437,017,936,000,000,000,000,000,000,000,000 | [
"CWE-287"
] | CVE-2018-1106 | An authentication bypass flaw has been found in PackageKit before 1.1.10 that allows users without administrator privileges to install signed packages. A local attacker can use this vulnerability to install vulnerable packages to further compromise a system. | https://nvd.nist.gov/vuln/detail/CVE-2018-1106 |
332,019 | PackageKit | 7e8a7905ea9abbd1f384f05f36a4458682cd4697 | https://github.com/hughsie/PackageKit | https://github.com/hughsie/PackageKit/commit/7e8a7905ea9abbd1f384f05f36a4458682cd4697 | Do not set JUST_REINSTALL on any kind of auth failure
If we try to continue the auth queue when it has been cancelled (or failed)
then we fall upon the obscure JUST_REINSTALL transaction flag which only the
DNF backend actually verifies.
Many thanks to Matthias Gerstner <mgerstner@suse.de> for spotting the problem. | 0 | pk_transaction_authorize_actions_finished_cb (GObject *source_object,
GAsyncResult *res,
struct AuthorizeActionsData *data)
{
const gchar *action_id = NULL;
PkTransactionPrivate *priv = data->transaction->priv;
g_autoptr(GError) error = NULL;
g_autoptr(PolkitAuthorizationResult) result = NULL;... | 149,381,010,979,509,420,000,000,000,000,000,000,000 | pk-transaction.c | 30,382,453,265,029,820,000,000,000,000,000,000,000 | [
"CWE-287"
] | CVE-2018-1106 | An authentication bypass flaw has been found in PackageKit before 1.1.10 that allows users without administrator privileges to install signed packages. A local attacker can use this vulnerability to install vulnerable packages to further compromise a system. | https://nvd.nist.gov/vuln/detail/CVE-2018-1106 |
202,262 | libtasn1 | 1c3ccb3e040bf13e342ee60bc23b21b97b11923f | http://git.savannah.gnu.org/cgit/libtasn1 | http://git.savannah.gnu.org/cgit/libtasn1.git/commit/?id=1c3ccb3e040bf13e342ee60bc23b21b97b11923f | Do not return illegal values in asn1_get_bit_der(). | 1 | asn1_get_bit_der (const unsigned char *der, int der_len,
int *ret_len, unsigned char *str, int str_size,
int *bit_len)
{
int len_len, len_byte;
if (der_len <= 0)
return ASN1_GENERIC_ERROR;
len_byte = asn1_get_length_der (der, der_len, &len_len) - 1;
if (len_byte < 0)
return ASN1_DER_ERROR;
*... | 290,542,336,623,151,250,000,000,000,000,000,000,000 | decoding.c | 331,599,435,441,657,880,000,000,000,000,000,000,000 | [
"CWE-131"
] | CVE-2014-3468 | The asn1_get_bit_der function in GNU Libtasn1 before 3.6 does not properly report an error when a negative bit length is identified, which allows context-dependent attackers to cause out-of-bounds access via crafted ASN.1 data. | https://nvd.nist.gov/vuln/detail/CVE-2014-3468 |
332,023 | libtasn1 | 1c3ccb3e040bf13e342ee60bc23b21b97b11923f | http://git.savannah.gnu.org/cgit/libtasn1 | http://git.savannah.gnu.org/cgit/libtasn1.git/commit/?id=1c3ccb3e040bf13e342ee60bc23b21b97b11923f | Do not return illegal values in asn1_get_bit_der(). | 0 | asn1_get_bit_der (const unsigned char *der, int der_len,
int *ret_len, unsigned char *str, int str_size,
int *bit_len)
{
int len_len = 0, len_byte;
if (der_len <= 0)
return ASN1_GENERIC_ERROR;
len_byte = asn1_get_length_der (der, der_len, &len_len) - 1;
if (len_byte < 0)
return ASN1_DER_ERROR;
... | 25,812,587,339,534,590,000,000,000,000,000,000,000 | decoding.c | 303,930,639,416,837,250,000,000,000,000,000,000,000 | [
"CWE-131"
] | CVE-2014-3468 | The asn1_get_bit_der function in GNU Libtasn1 before 3.6 does not properly report an error when a negative bit length is identified, which allows context-dependent attackers to cause out-of-bounds access via crafted ASN.1 data. | https://nvd.nist.gov/vuln/detail/CVE-2014-3468 |
202,263 | sddm | 147cec383892d143b5e02daa70f1e7def50f5d98 | https://github.com/sddm/sddm | https://github.com/sddm/sddm/commit/147cec383892d143b5e02daa70f1e7def50f5d98 | Fix authentication when reusing an existing session
- Check the success value before unlocking the session
- Don't attempt to use the nonexistant "sddm-check" PAM service | 1 | bool PamBackend::start(const QString &user) {
bool result;
QString service = QStringLiteral("sddm");
if (user == QStringLiteral("sddm") && m_greeter)
service = QStringLiteral("sddm-greeter");
else if (m_app->session()->path().isEmpty())
service = QStringLite... | 88,219,923,637,363,900,000,000,000,000,000,000,000 | PamBackend.cpp | 90,720,448,102,591,840,000,000,000,000,000,000,000 | [
"CWE-284"
] | CVE-2018-14345 | An issue was discovered in SDDM through 0.17.0. If configured with ReuseSession=true, the password is not checked for users with an already existing session. Any user with access to the system D-Bus can therefore unlock any graphical session. This is related to daemon/Display.cpp and helper/backend/PamBackend.cpp. | https://nvd.nist.gov/vuln/detail/CVE-2018-14345 |
332,059 | sddm | 147cec383892d143b5e02daa70f1e7def50f5d98 | https://github.com/sddm/sddm | https://github.com/sddm/sddm/commit/147cec383892d143b5e02daa70f1e7def50f5d98 | Fix authentication when reusing an existing session
- Check the success value before unlocking the session
- Don't attempt to use the nonexistant "sddm-check" PAM service | 0 | bool PamBackend::start(const QString &user) {
bool result;
QString service = QStringLiteral("sddm");
if (user == QStringLiteral("sddm") && m_greeter)
service = QStringLiteral("sddm-greeter");
else if (m_autologin)
service = QStringLiteral("sddm-autologin");
... | 137,647,895,560,702,280,000,000,000,000,000,000,000 | PamBackend.cpp | 133,685,894,619,428,090,000,000,000,000,000,000,000 | [
"CWE-284"
] | CVE-2018-14345 | An issue was discovered in SDDM through 0.17.0. If configured with ReuseSession=true, the password is not checked for users with an already existing session. Any user with access to the system D-Bus can therefore unlock any graphical session. This is related to daemon/Display.cpp and helper/backend/PamBackend.cpp. | https://nvd.nist.gov/vuln/detail/CVE-2018-14345 |
202,264 | sddm | 147cec383892d143b5e02daa70f1e7def50f5d98 | https://github.com/sddm/sddm | https://github.com/sddm/sddm/commit/147cec383892d143b5e02daa70f1e7def50f5d98 | Fix authentication when reusing an existing session
- Check the success value before unlocking the session
- Don't attempt to use the nonexistant "sddm-check" PAM service | 1 | void Display::startAuth(const QString &user, const QString &password, const Session &session) {
m_passPhrase = password;
// sanity check
if (!session.isValid()) {
qCritical() << "Invalid session" << session.fileName();
return;
}
if (session.xdgSession... | 327,396,237,864,777,600,000,000,000,000,000,000,000 | Display.cpp | 72,356,549,567,103,510,000,000,000,000,000,000,000 | [
"CWE-284"
] | CVE-2018-14345 | An issue was discovered in SDDM through 0.17.0. If configured with ReuseSession=true, the password is not checked for users with an already existing session. Any user with access to the system D-Bus can therefore unlock any graphical session. This is related to daemon/Display.cpp and helper/backend/PamBackend.cpp. | https://nvd.nist.gov/vuln/detail/CVE-2018-14345 |
332,048 | sddm | 147cec383892d143b5e02daa70f1e7def50f5d98 | https://github.com/sddm/sddm | https://github.com/sddm/sddm/commit/147cec383892d143b5e02daa70f1e7def50f5d98 | Fix authentication when reusing an existing session
- Check the success value before unlocking the session
- Don't attempt to use the nonexistant "sddm-check" PAM service | 0 | void Display::startAuth(const QString &user, const QString &password, const Session &session) {
m_passPhrase = password;
// sanity check
if (!session.isValid()) {
qCritical() << "Invalid session" << session.fileName();
return;
}
if (session.xdgSession... | 117,919,120,489,007,140,000,000,000,000,000,000,000 | Display.cpp | 235,927,318,994,122,430,000,000,000,000,000,000,000 | [
"CWE-284"
] | CVE-2018-14345 | An issue was discovered in SDDM through 0.17.0. If configured with ReuseSession=true, the password is not checked for users with an already existing session. Any user with access to the system D-Bus can therefore unlock any graphical session. This is related to daemon/Display.cpp and helper/backend/PamBackend.cpp. | https://nvd.nist.gov/vuln/detail/CVE-2018-14345 |
202,265 | util-linux | 11b51a46bfd3c340df251b2d20fe9d04d077a88e | https://github.com/karelzak/util-linux | http://git.kernel.org/?p=utils/util-linux/util-linux.git;a=commit;h=11b51a46bfd3c340df251b2d20fe9d04d077a88e | umount: block signals when umounting and updating mtab (CVE-2011-1676, CVE-2011-1677)
http://thread.gmane.org/gmane.comp.security.oss.general/4374
Based on CVE-2011-1089.
Signed-off-by: Karel Zak <kzak@redhat.com> | 1 | umount_one (const char *spec, const char *node, const char *type,
const char *opts, struct mntentchn *mc) {
int umnt_err = 0;
int isroot;
int res = 0;
int status;
int extra_flags = 0;
const char *loopdev, *target = node;
char *targetbuf = NULL;
int myloop = 0;
/* Special case for root. As of 0.99pl10 we... | 212,945,960,903,410,320,000,000,000,000,000,000,000 | umount.c | 63,731,062,625,061,980,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-1675 | mount in util-linux 2.19 and earlier attempts to append to the /etc/mtab.tmp file without first checking whether resource limits would interfere, which allows local users to trigger corruption of the /etc/mtab file via a process with a small RLIMIT_FSIZE value, a related issue to CVE-2011-1089. | https://nvd.nist.gov/vuln/detail/CVE-2011-1675 |
332,072 | util-linux | 11b51a46bfd3c340df251b2d20fe9d04d077a88e | https://github.com/karelzak/util-linux | http://git.kernel.org/?p=utils/util-linux/util-linux.git;a=commit;h=11b51a46bfd3c340df251b2d20fe9d04d077a88e | umount: block signals when umounting and updating mtab (CVE-2011-1676, CVE-2011-1677)
http://thread.gmane.org/gmane.comp.security.oss.general/4374
Based on CVE-2011-1089.
Signed-off-by: Karel Zak <kzak@redhat.com> | 0 | umount_one (const char *spec, const char *node, const char *type,
const char *opts, struct mntentchn *mc) {
int umnt_err = 0;
int isroot;
int res = 0;
int status;
int extra_flags = 0;
const char *loopdev, *target = node;
char *targetbuf = NULL;
int myloop = 0;
/* Special case for root. As of 0.99pl10 we... | 315,955,011,724,478,400,000,000,000,000,000,000,000 | umount.c | 156,929,308,149,473,540,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2011-1675 | mount in util-linux 2.19 and earlier attempts to append to the /etc/mtab.tmp file without first checking whether resource limits would interfere, which allows local users to trigger corruption of the /etc/mtab file via a process with a small RLIMIT_FSIZE value, a related issue to CVE-2011-1089. | https://nvd.nist.gov/vuln/detail/CVE-2011-1675 |
202,266 | ghostpdl | 937ccd17ac65935633b2ebc06cb7089b91e17e6b | https://github.com/ArtifexSoftware/ghostpdl | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=937ccd17ac65935633b2ebc06cb7089b91e17e6b | Bug 698056: make bounds check in gx_ttfReader__Read more robust | 1 | static void gx_ttfReader__Read(ttfReader *self, void *p, int n)
{
gx_ttfReader *r = (gx_ttfReader *)self;
const byte *q;
if (!r->error) {
if (r->extra_glyph_index != -1) {
q = r->glyph_data.bits.data + r->pos;
r->error = (r->glyph_data.bits.size - r->pos < n ?
... | 53,614,086,865,622,810,000,000,000,000,000,000,000 | gxttfb.c | 325,786,125,664,490,050,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9727 | The gx_ttfReader__Read function in base/gxttfb.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9727 |
332,081 | ghostpdl | 937ccd17ac65935633b2ebc06cb7089b91e17e6b | https://github.com/ArtifexSoftware/ghostpdl | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=937ccd17ac65935633b2ebc06cb7089b91e17e6b | Bug 698056: make bounds check in gx_ttfReader__Read more robust | 0 | static void gx_ttfReader__Read(ttfReader *self, void *p, int n)
{
gx_ttfReader *r = (gx_ttfReader *)self;
const byte *q;
if (!r->error) {
if (r->extra_glyph_index != -1) {
q = r->glyph_data.bits.data + r->pos;
r->error = ((r->pos >= r->glyph_data.bits.size ||
... | 237,306,429,716,437,430,000,000,000,000,000,000,000 | gxttfb.c | 309,540,741,173,195,800,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-9727 | The gx_ttfReader__Read function in base/gxttfb.c in Artifex Ghostscript GhostXPS 9.21 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact via a crafted document. | https://nvd.nist.gov/vuln/detail/CVE-2017-9727 |
202,268 | ImageMagick | 46382526a3f09cebf9f2af680fc55b2a668fcbef | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/46382526a3f09cebf9f2af680fc55b2a668fcbef | https://github.com/ImageMagick/ImageMagick/issues/643 | 1 | static int format8BIM(Image *ifile, Image *ofile)
{
char
temp[MagickPathExtent];
unsigned int
foundOSType;
int
ID,
resCount,
i,
c;
ssize_t
count;
unsigned char
*PString,
*str;
resCount=0;
foundOSType=0; /* found the OSType */
(void) foundOSType;
c=ReadBlobByte(... | 258,914,500,696,047,380,000,000,000,000,000,000,000 | meta.c | 259,921,314,011,829,520,000,000,000,000,000,000,000 | [
"CWE-772"
] | CVE-2017-12418 | ImageMagick 7.0.6-5 has memory leaks in the parse8BIMW and format8BIM functions in coders/meta.c, related to the WriteImage function in MagickCore/constitute.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-12418 |
332,114 | ImageMagick | 46382526a3f09cebf9f2af680fc55b2a668fcbef | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/46382526a3f09cebf9f2af680fc55b2a668fcbef | https://github.com/ImageMagick/ImageMagick/issues/643 | 0 | static int format8BIM(Image *ifile, Image *ofile)
{
char
temp[MagickPathExtent];
unsigned int
foundOSType;
int
ID,
resCount,
i,
c;
ssize_t
count;
unsigned char
*PString,
*str;
resCount=0;
foundOSType=0; /* found the OSType */
(void) foundOSType;
c=ReadBlobByte(... | 143,916,915,672,820,940,000,000,000,000,000,000,000 | meta.c | 6,511,663,712,268,946,000,000,000,000,000,000,000 | [
"CWE-772"
] | CVE-2017-12418 | ImageMagick 7.0.6-5 has memory leaks in the parse8BIMW and format8BIM functions in coders/meta.c, related to the WriteImage function in MagickCore/constitute.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-12418 |
202,272 | exim | 337e3505b0e6cd4309db6bf6062b33fa56e06cf8 | https://github.com/Exim/exim | http://git.exim.org/exim.git/commitdiff/337e3505b0e6cd4309db6bf6062b33fa56e06cf8 | Bugzilla #1106: Don't pass DKIM compound log line as format string | 1 | void dkim_exim_verify_finish(void) {
pdkim_signature *sig = NULL;
int dkim_signers_size = 0;
int dkim_signers_ptr = 0;
dkim_signers = NULL;
/* Delete eventual previous signature chain */
dkim_signatures = NULL;
/* If we have arrived here with dkim_collect_input == FALSE, it
means there was a proces... | 327,143,074,544,927,500,000,000,000,000,000,000,000 | dkim.c | 57,938,827,124,194,340,000,000,000,000,000,000,000 | [
"CWE-134"
] | CVE-2011-1764 | Format string vulnerability in the dkim_exim_verify_finish function in src/dkim.c in Exim before 4.76 might allow remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via format string specifiers in data used in DKIM logging, as demonstrated by an identity field containing a % (percent... | https://nvd.nist.gov/vuln/detail/CVE-2011-1764 |
332,127 | exim | 337e3505b0e6cd4309db6bf6062b33fa56e06cf8 | https://github.com/Exim/exim | http://git.exim.org/exim.git/commitdiff/337e3505b0e6cd4309db6bf6062b33fa56e06cf8 | Bugzilla #1106: Don't pass DKIM compound log line as format string | 0 | void dkim_exim_verify_finish(void) {
pdkim_signature *sig = NULL;
int dkim_signers_size = 0;
int dkim_signers_ptr = 0;
dkim_signers = NULL;
/* Delete eventual previous signature chain */
dkim_signatures = NULL;
/* If we have arrived here with dkim_collect_input == FALSE, it
means there was a proces... | 28,465,584,823,195,040,000,000,000,000,000,000,000 | dkim.c | 203,493,889,332,488,900,000,000,000,000,000,000,000 | [
"CWE-134"
] | CVE-2011-1764 | Format string vulnerability in the dkim_exim_verify_finish function in src/dkim.c in Exim before 4.76 might allow remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via format string specifiers in data used in DKIM logging, as demonstrated by an identity field containing a % (percent... | https://nvd.nist.gov/vuln/detail/CVE-2011-1764 |
202,273 | linux | 5eeb2ca02a2f6084fc57ae5c244a38baab07033a | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5eeb2ca02a2f6084fc57ae5c244a38baab07033a | ANDROID: binder: synchronize_rcu() when using POLLFREE.
To prevent races with ep_remove_waitqueue() removing the
waitqueue at the same time.
Reported-by: syzbot+a2a3c4909716e271487e@syzkaller.appspotmail.com
Signed-off-by: Martijn Coenen <maco@android.com>
Cc: stable <stable@vger.kernel.org> # 4.14+
Signed-off-by: Gr... | 1 | static int binder_thread_release(struct binder_proc *proc,
struct binder_thread *thread)
{
struct binder_transaction *t;
struct binder_transaction *send_reply = NULL;
int active_transactions = 0;
struct binder_transaction *last_t = NULL;
binder_inner_proc_lock(thread->proc);
/*
* take a ref on the proc so... | 244,138,562,804,293,000,000,000,000,000,000,000,000 | binder.c | 52,829,893,250,882,870,000,000,000,000,000,000,000 | [
"CWE-362"
] | CVE-2020-0030 | In binder_thread_release of binder.c, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-145286050References: Up... | https://nvd.nist.gov/vuln/detail/CVE-2020-0030 |
332,209 | linux | 5eeb2ca02a2f6084fc57ae5c244a38baab07033a | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5eeb2ca02a2f6084fc57ae5c244a38baab07033a | ANDROID: binder: synchronize_rcu() when using POLLFREE.
To prevent races with ep_remove_waitqueue() removing the
waitqueue at the same time.
Reported-by: syzbot+a2a3c4909716e271487e@syzkaller.appspotmail.com
Signed-off-by: Martijn Coenen <maco@android.com>
Cc: stable <stable@vger.kernel.org> # 4.14+
Signed-off-by: Gr... | 0 | static int binder_thread_release(struct binder_proc *proc,
struct binder_thread *thread)
{
struct binder_transaction *t;
struct binder_transaction *send_reply = NULL;
int active_transactions = 0;
struct binder_transaction *last_t = NULL;
binder_inner_proc_lock(thread->proc);
/*
* take a ref on the proc so... | 219,469,807,570,191,500,000,000,000,000,000,000,000 | binder.c | 37,346,793,542,892,680,000,000,000,000,000,000,000 | [
"CWE-362"
] | CVE-2020-0030 | In binder_thread_release of binder.c, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-145286050References: Up... | https://nvd.nist.gov/vuln/detail/CVE-2020-0030 |
202,274 | typed_ast | dc317ac9cff859aa84eeabe03fb5004982545b3b | https://github.com/python/typed_ast | https://github.com/python/typed_ast/commit/dc317ac9cff859aa84eeabe03fb5004982545b3b | Fix two out-of-bounds array reads (#99)
The patch is taken from a commit to the CPython repo with the message:
bpo-36495: Fix two out-of-bounds array reads (GH-12641)
Research and fix by @bradlarsen. | 1 | ast_for_arguments(struct compiling *c, const node *n)
{
/* This function handles both typedargslist (function definition)
and varargslist (lambda definition).
parameters: '(' [typedargslist] ')'
typedargslist: (tfpdef ['=' test] (',' tfpdef ['=' test])* [',' [
'*' [tfpdef] (',' ... | 119,498,224,871,260,400,000,000,000,000,000,000,000 | ast.c | 78,181,478,250,227,530,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-19275 | typed_ast 1.3.0 and 1.3.1 has an ast_for_arguments out-of-bounds read. An attacker with the ability to cause a Python interpreter to parse Python source (but not necessarily execute it) may be able to crash the interpreter process. This could be a concern, for example, in a web-based service that parses (but does not e... | https://nvd.nist.gov/vuln/detail/CVE-2019-19275 |
332,268 | typed_ast | dc317ac9cff859aa84eeabe03fb5004982545b3b | https://github.com/python/typed_ast | https://github.com/python/typed_ast/commit/dc317ac9cff859aa84eeabe03fb5004982545b3b | Fix two out-of-bounds array reads (#99)
The patch is taken from a commit to the CPython repo with the message:
bpo-36495: Fix two out-of-bounds array reads (GH-12641)
Research and fix by @bradlarsen. | 0 | ast_for_arguments(struct compiling *c, const node *n)
{
/* This function handles both typedargslist (function definition)
and varargslist (lambda definition).
parameters: '(' [typedargslist] ')'
typedargslist: (tfpdef ['=' test] (',' tfpdef ['=' test])* [',' [
'*' [tfpdef] (',' ... | 19,905,893,145,020,255,000,000,000,000,000,000,000 | ast.c | 105,001,989,275,359,520,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-19275 | typed_ast 1.3.0 and 1.3.1 has an ast_for_arguments out-of-bounds read. An attacker with the ability to cause a Python interpreter to parse Python source (but not necessarily execute it) may be able to crash the interpreter process. This could be a concern, for example, in a web-based service that parses (but does not e... | https://nvd.nist.gov/vuln/detail/CVE-2019-19275 |
202,275 | typed_ast | dc317ac9cff859aa84eeabe03fb5004982545b3b | https://github.com/python/typed_ast | https://github.com/python/typed_ast/commit/dc317ac9cff859aa84eeabe03fb5004982545b3b | Fix two out-of-bounds array reads (#99)
The patch is taken from a commit to the CPython repo with the message:
bpo-36495: Fix two out-of-bounds array reads (GH-12641)
Research and fix by @bradlarsen. | 1 | handle_keywordonly_args(struct compiling *c, const node *n, int start,
asdl_seq *kwonlyargs, asdl_seq *kwdefaults)
{
PyObject *argname;
node *ch;
expr_ty expression, annotation;
arg_ty arg = NULL;
int i = start;
int j = 0; /* index for kwdefaults and kwonlyargs */
if... | 287,438,225,445,565,940,000,000,000,000,000,000,000 | ast.c | 78,181,478,250,227,530,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-19275 | typed_ast 1.3.0 and 1.3.1 has an ast_for_arguments out-of-bounds read. An attacker with the ability to cause a Python interpreter to parse Python source (but not necessarily execute it) may be able to crash the interpreter process. This could be a concern, for example, in a web-based service that parses (but does not e... | https://nvd.nist.gov/vuln/detail/CVE-2019-19275 |
332,297 | typed_ast | dc317ac9cff859aa84eeabe03fb5004982545b3b | https://github.com/python/typed_ast | https://github.com/python/typed_ast/commit/dc317ac9cff859aa84eeabe03fb5004982545b3b | Fix two out-of-bounds array reads (#99)
The patch is taken from a commit to the CPython repo with the message:
bpo-36495: Fix two out-of-bounds array reads (GH-12641)
Research and fix by @bradlarsen. | 0 | handle_keywordonly_args(struct compiling *c, const node *n, int start,
asdl_seq *kwonlyargs, asdl_seq *kwdefaults)
{
PyObject *argname;
node *ch;
expr_ty expression, annotation;
arg_ty arg = NULL;
int i = start;
int j = 0; /* index for kwdefaults and kwonlyargs */
if... | 213,469,144,606,807,280,000,000,000,000,000,000,000 | ast.c | 105,001,989,275,359,520,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-19275 | typed_ast 1.3.0 and 1.3.1 has an ast_for_arguments out-of-bounds read. An attacker with the ability to cause a Python interpreter to parse Python source (but not necessarily execute it) may be able to crash the interpreter process. This could be a concern, for example, in a web-based service that parses (but does not e... | https://nvd.nist.gov/vuln/detail/CVE-2019-19275 |
202,280 | ImageMagick | 986b5dff173413fa712db27eb677cdef15f0bab6 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/986b5dff173413fa712db27eb677cdef15f0bab6 | https://github.com/ImageMagick/ImageMagick/issues/1748 | 1 | static void TIFFGetProfiles(TIFF *tiff,Image *image,ExceptionInfo *exception)
{
uint32
length;
unsigned char
*profile;
length=0;
#if defined(TIFFTAG_ICCPROFILE)
if ((TIFFGetField(tiff,TIFFTAG_ICCPROFILE,&length,&profile) == 1) &&
(profile != (unsigned char *) NULL))
(void) ReadProfile(image,... | 292,547,592,480,065,770,000,000,000,000,000,000,000 | tiff.c | 65,878,411,794,743,970,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2020-25667 | TIFFGetProfiles() in /coders/tiff.c calls strstr() which causes a large out-of-bounds read when it searches for `"dc:format=\"image/dng\"` within `profile` due to improper string handling, when a crafted input file is provided to ImageMagick. The patch uses a StringInfo type instead of a raw C string to remedy this. Th... | https://nvd.nist.gov/vuln/detail/CVE-2020-25667 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.