idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
332,426 | ImageMagick | 986b5dff173413fa712db27eb677cdef15f0bab6 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/986b5dff173413fa712db27eb677cdef15f0bab6 | https://github.com/ImageMagick/ImageMagick/issues/1748 | 0 | static void TIFFGetProfiles(TIFF *tiff,Image *image,ExceptionInfo *exception)
{
uint32
length;
unsigned char
*profile;
length=0;
#if defined(TIFFTAG_ICCPROFILE)
if ((TIFFGetField(tiff,TIFFTAG_ICCPROFILE,&length,&profile) == 1) &&
(profile != (unsigned char *) NULL))
(void) ReadProfile(image,... | 288,915,792,061,345,400,000,000,000,000,000,000,000 | tiff.c | 119,020,272,324,364,410,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2020-25667 | TIFFGetProfiles() in /coders/tiff.c calls strstr() which causes a large out-of-bounds read when it searches for `"dc:format=\"image/dng\"` within `profile` due to improper string handling, when a crafted input file is provided to ImageMagick. The patch uses a StringInfo type instead of a raw C string to remedy this. Th... | https://nvd.nist.gov/vuln/detail/CVE-2020-25667 |
202,284 | ImageMagick | ec9c8944af2bfc65c697ca44f93a727a99b405f1 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/ec9c8944af2bfc65c697ca44f93a727a99b405f1 | [FG-VD-19-136] ImageMagick Convert SVG MacOS Denial Of Service | 1 | static Image *ReadSVGImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
char
filename[MagickPathExtent];
FILE
*file;
Image
*image,
*next;
int
status,
unique_file;
ssize_t
n;
SVGInfo
*svg_info;
unsigned char
message[MagickPathExtent];
xmlSAXHandler
... | 144,759,316,345,644,960,000,000,000,000,000,000,000 | svg.c | 31,367,518,227,867,702,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2019-18853 | ImageMagick before 7.0.9-0 allows remote attackers to cause a denial of service because XML_PARSE_HUGE is not properly restricted in coders/svg.c, related to SVG and libxml2. | https://nvd.nist.gov/vuln/detail/CVE-2019-18853 |
332,511 | ImageMagick | ec9c8944af2bfc65c697ca44f93a727a99b405f1 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/ec9c8944af2bfc65c697ca44f93a727a99b405f1 | [FG-VD-19-136] ImageMagick Convert SVG MacOS Denial Of Service | 0 | static Image *ReadSVGImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
char
filename[MagickPathExtent];
FILE
*file;
Image
*image,
*next;
int
status,
unique_file;
ssize_t
n;
SVGInfo
*svg_info;
unsigned char
message[MagickPathExtent];
xmlSAXHandler
... | 181,206,223,454,476,360,000,000,000,000,000,000,000 | svg.c | 207,488,516,249,466,650,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2019-18853 | ImageMagick before 7.0.9-0 allows remote attackers to cause a denial of service because XML_PARSE_HUGE is not properly restricted in coders/svg.c, related to SVG and libxml2. | https://nvd.nist.gov/vuln/detail/CVE-2019-18853 |
202,285 | LibRaw | d7c3d2cb460be10a3ea7b32e9443a83c243b2251 | https://github.com/LibRaw/LibRaw | https://github.com/LibRaw/LibRaw/commit/d7c3d2cb460be10a3ea7b32e9443a83c243b2251 | Secunia SA75000 advisory: several buffer overruns | 1 | int CLASS parse_tiff_ifd(int base)
{
unsigned entries, tag, type, len, plen = 16, save;
int ifd, use_cm = 0, cfa, i, j, c, ima_len = 0;
char *cbuf, *cp;
uchar cfa_pat[16], cfa_pc[] = {0, 1, 2, 3}, tab[256];
double fm[3][4], cc[4][4], cm[4][3], cam_xyz[4][3], num;
double ab[] = {1, 1, 1, 1}, asn[] = {0, 0, 0... | 118,968,640,676,209,570,000,000,000,000,000,000,000 | dcraw.c | 284,434,708,767,368,270,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2017-6887 | A boundary error within the "parse_tiff_ifd()" function (internal/dcraw_common.cpp) in LibRaw versions before 0.18.2 can be exploited to cause a memory corruption via e.g. a specially crafted KDC file with model set to "DSLR-A100" and containing multiple sequences of 0x100 and 0x14A TAGs. | https://nvd.nist.gov/vuln/detail/CVE-2017-6887 |
332,541 | LibRaw | d7c3d2cb460be10a3ea7b32e9443a83c243b2251 | https://github.com/LibRaw/LibRaw | https://github.com/LibRaw/LibRaw/commit/d7c3d2cb460be10a3ea7b32e9443a83c243b2251 | Secunia SA75000 advisory: several buffer overruns | 0 | int CLASS parse_tiff_ifd(int base)
{
unsigned entries, tag, type, len, plen = 16, save;
int ifd, use_cm = 0, cfa, i, j, c, ima_len = 0;
char *cbuf, *cp;
uchar cfa_pat[16], cfa_pc[] = {0, 1, 2, 3}, tab[256];
double fm[3][4], cc[4][4], cm[4][3], cam_xyz[4][3], num;
double ab[] = {1, 1, 1, 1}, asn[] = {0, 0, 0... | 39,648,393,938,825,720,000,000,000,000,000,000,000 | dcraw.c | 285,367,537,398,910,200,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2017-6887 | A boundary error within the "parse_tiff_ifd()" function (internal/dcraw_common.cpp) in LibRaw versions before 0.18.2 can be exploited to cause a memory corruption via e.g. a specially crafted KDC file with model set to "DSLR-A100" and containing multiple sequences of 0x100 and 0x14A TAGs. | https://nvd.nist.gov/vuln/detail/CVE-2017-6887 |
202,293 | gsasl | 796e4197f696261c1f872d7576371232330bcc30 | https://gitlab.com/gsasl/gsasl | https://gitlab.com/gsasl/gsasl/-/commit/796e4197f696261c1f872d7576371232330bcc30 | GSSAPI server: Boundary check gss_wrap token (read OOB). | 1 | _gsasl_gssapi_server_step (Gsasl_session * sctx,
void *mech_data,
const char *input, size_t input_len,
char **output, size_t *output_len)
{
_Gsasl_gssapi_server_state *state = mech_data;
gss_buffer_desc bufdesc1, bufdesc2;
OM_uint32 maj_stat, min_stat;
gss_buffer_desc client_name;
gss_OID me... | 115,734,198,567,060,880,000,000,000,000,000,000,000 | server.c | 161,394,644,553,251,140,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2022-2469 | GNU SASL libgsasl server-side read-out-of-bounds with malicious authenticated GSS-API client | https://nvd.nist.gov/vuln/detail/CVE-2022-2469 |
332,612 | gsasl | 796e4197f696261c1f872d7576371232330bcc30 | https://gitlab.com/gsasl/gsasl | https://gitlab.com/gsasl/gsasl/-/commit/796e4197f696261c1f872d7576371232330bcc30 | GSSAPI server: Boundary check gss_wrap token (read OOB). | 0 | _gsasl_gssapi_server_step (Gsasl_session * sctx,
void *mech_data,
const char *input, size_t input_len,
char **output, size_t *output_len)
{
_Gsasl_gssapi_server_state *state = mech_data;
gss_buffer_desc bufdesc1, bufdesc2;
OM_uint32 maj_stat, min_stat;
gss_buffer_desc client_name;
gss_OID me... | 214,326,085,585,339,450,000,000,000,000,000,000,000 | server.c | 19,690,466,273,325,705,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2022-2469 | GNU SASL libgsasl server-side read-out-of-bounds with malicious authenticated GSS-API client | https://nvd.nist.gov/vuln/detail/CVE-2022-2469 |
202,393 | linux | 128c66429247add5128c03dc1e144ca56f05a4e2 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/128c66429247add5128c03dc1e144ca56f05a4e2 | crypto: ccp - Release all allocated memory if sha type is invalid
Release all allocated memory if sha type is invalid:
In ccp_run_sha_cmd, if the type of sha is invalid, the allocated
hmac_buf should be released.
v2: fix the goto.
Signed-off-by: Navid Emamdoost <navid.emamdoost@gmail.com>
Acked-by: Gary R Hook <gary... | 1 | ccp_run_sha_cmd(struct ccp_cmd_queue *cmd_q, struct ccp_cmd *cmd)
{
struct ccp_sha_engine *sha = &cmd->u.sha;
struct ccp_dm_workarea ctx;
struct ccp_data src;
struct ccp_op op;
unsigned int ioffset, ooffset;
unsigned int digest_size;
int sb_count;
const void *init;
u64 block_size;
int ctx_size;
int ret;
sw... | 50,090,079,932,274,030,000,000,000,000,000,000,000 | ccp-ops.c | 10,822,245,767,038,662,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2019-18808 | A memory leak in the ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-128c66429247. | https://nvd.nist.gov/vuln/detail/CVE-2019-18808 |
333,561 | linux | 128c66429247add5128c03dc1e144ca56f05a4e2 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/128c66429247add5128c03dc1e144ca56f05a4e2 | crypto: ccp - Release all allocated memory if sha type is invalid
Release all allocated memory if sha type is invalid:
In ccp_run_sha_cmd, if the type of sha is invalid, the allocated
hmac_buf should be released.
v2: fix the goto.
Signed-off-by: Navid Emamdoost <navid.emamdoost@gmail.com>
Acked-by: Gary R Hook <gary... | 0 | ccp_run_sha_cmd(struct ccp_cmd_queue *cmd_q, struct ccp_cmd *cmd)
{
struct ccp_sha_engine *sha = &cmd->u.sha;
struct ccp_dm_workarea ctx;
struct ccp_data src;
struct ccp_op op;
unsigned int ioffset, ooffset;
unsigned int digest_size;
int sb_count;
const void *init;
u64 block_size;
int ctx_size;
int ret;
sw... | 321,672,982,073,349,330,000,000,000,000,000,000,000 | ccp-ops.c | 159,542,505,151,090,120,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2019-18808 | A memory leak in the ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-128c66429247. | https://nvd.nist.gov/vuln/detail/CVE-2019-18808 |
202,395 | gst-plugins-bad | 11353b3f6e2f047cc37483d21e6a37ae558896bc | https://github.com/GStreamer/gst-plugins-bad | https://gitlab.freedesktop.org/gstreamer/gst-plugins-bad/-/commit/11353b3f6e2f047cc37483d21e6a37ae558896bc | codecparsers: h264parser: guard against ref_pic_markings overflow
Part-of: <https://gitlab.freedesktop.org/gstreamer/gst-plugins-bad/-/merge_requests/1703> | 1 | gst_h264_slice_parse_dec_ref_pic_marking (GstH264SliceHdr * slice,
GstH264NalUnit * nalu, NalReader * nr)
{
GstH264DecRefPicMarking *dec_ref_pic_m;
guint start_pos;
GST_DEBUG ("parsing \"Decoded reference picture marking\"");
start_pos = nal_reader_get_pos (nr);
dec_ref_pic_m = &slice->dec_ref_pic_mark... | 221,181,476,304,749,900,000,000,000,000,000,000,000 | gsth264parser.c | 329,037,044,820,659,200,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2021-3185 | A flaw was found in the gstreamer h264 component of gst-plugins-bad before v1.18.1 where when parsing a h264 header, an attacker could cause the stack to be smashed, memory corruption and possibly code execution. | https://nvd.nist.gov/vuln/detail/CVE-2021-3185 |
333,608 | gst-plugins-bad | 11353b3f6e2f047cc37483d21e6a37ae558896bc | https://github.com/GStreamer/gst-plugins-bad | https://gitlab.freedesktop.org/gstreamer/gst-plugins-bad/-/commit/11353b3f6e2f047cc37483d21e6a37ae558896bc | codecparsers: h264parser: guard against ref_pic_markings overflow
Part-of: <https://gitlab.freedesktop.org/gstreamer/gst-plugins-bad/-/merge_requests/1703> | 0 | gst_h264_slice_parse_dec_ref_pic_marking (GstH264SliceHdr * slice,
GstH264NalUnit * nalu, NalReader * nr)
{
GstH264DecRefPicMarking *dec_ref_pic_m;
guint start_pos;
GST_DEBUG ("parsing \"Decoded reference picture marking\"");
start_pos = nal_reader_get_pos (nr);
dec_ref_pic_m = &slice->dec_ref_pic_mark... | 152,728,298,469,239,240,000,000,000,000,000,000,000 | gsth264parser.c | 96,061,780,272,416,210,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2021-3185 | A flaw was found in the gstreamer h264 component of gst-plugins-bad before v1.18.1 where when parsing a h264 header, an attacker could cause the stack to be smashed, memory corruption and possibly code execution. | https://nvd.nist.gov/vuln/detail/CVE-2021-3185 |
202,559 | php-src | a33759fd275b32ed0bbe89796fe2953b3cb0b41f | https://github.com/php/php-src | http://git.php.net/?p=php-src.git;a=commitdiff;h=a33759fd275b32ed0bbe89796fe2953b3cb0b41f | Fixed Bug #66820 out-of-bounds memory access in fileinfo
Upstream fix:
https://github.com/glensc/file/commit/447558595a3650db2886cd2f416ad0beba965801
Notice, test changed, with upstream agreement:
-define OFFSET_OOB(n, o, i) ((n) < (o) || (i) >= ((n) - (o)))
+define OFFSET_OOB(n, o, i) ((n) < (o) || (i) > ((n) - (o)... | 1 |
private int
mget(struct magic_set *ms, const unsigned char *s, struct magic *m,
size_t nbytes, size_t o, unsigned int cont_level, int mode, int text,
int flip, int recursion_level, int *printed_something,
int *need_separator, int *returnval)
{
uint32_t soffset, offset = ms->offset;
uint32_t count = m->st... | 23,594,315,334,891,064,000,000,000,000,000,000,000 | softmagic.c | 248,603,902,273,269,000,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2014-2270 | softmagic.c in file before 5.17 and libmagic allows context-dependent attackers to cause a denial of service (out-of-bounds memory access and crash) via crafted offsets in the softmagic of a PE executable. | https://nvd.nist.gov/vuln/detail/CVE-2014-2270 |
334,528 | php-src | a33759fd275b32ed0bbe89796fe2953b3cb0b41f | https://github.com/php/php-src | http://git.php.net/?p=php-src.git;a=commitdiff;h=a33759fd275b32ed0bbe89796fe2953b3cb0b41f | Fixed Bug #66820 out-of-bounds memory access in fileinfo
Upstream fix:
https://github.com/glensc/file/commit/447558595a3650db2886cd2f416ad0beba965801
Notice, test changed, with upstream agreement:
-define OFFSET_OOB(n, o, i) ((n) < (o) || (i) >= ((n) - (o)))
+define OFFSET_OOB(n, o, i) ((n) < (o) || (i) > ((n) - (o)... | 0 |
private int
mget(struct magic_set *ms, const unsigned char *s, struct magic *m,
size_t nbytes, size_t o, unsigned int cont_level, int mode, int text,
int flip, int recursion_level, int *printed_something,
int *need_separator, int *returnval)
{
uint32_t soffset, offset = ms->offset;
uint32_t count = m->st... | 331,182,048,060,659,100,000,000,000,000,000,000,000 | softmagic.c | 238,093,449,838,880,020,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2014-2270 | softmagic.c in file before 5.17 and libmagic allows context-dependent attackers to cause a denial of service (out-of-bounds memory access and crash) via crafted offsets in the softmagic of a PE executable. | https://nvd.nist.gov/vuln/detail/CVE-2014-2270 |
202,564 | linux | f5449e74802c1112dea984aec8af7a33c4516af1 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f5449e74802c1112dea984aec8af7a33c4516af1 | RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy
ucma_destroy_id() assumes that all things accessing the ctx will do so via
the xarray. This assumption violated only in the case the FD is being
closed, then the ctx is reached via the ctx_list. Normally this is OK
since ucma_destroy_id() cannot run concu... | 1 | static ssize_t ucma_migrate_id(struct ucma_file *new_file,
const char __user *inbuf,
int in_len, int out_len)
{
struct rdma_ucm_migrate_id cmd;
struct rdma_ucm_migrate_resp resp;
struct ucma_context *ctx;
struct fd f;
struct ucma_file *cur_file;
int ret = 0;
if (copy_from_user(&cmd, inbuf, s... | 38,772,179,023,536,740,000,000,000,000,000,000,000 | ucma.c | 260,728,566,417,634,200,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2020-36385 | An issue was discovered in the Linux kernel before 5.10. drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c. | https://nvd.nist.gov/vuln/detail/CVE-2020-36385 |
334,589 | linux | f5449e74802c1112dea984aec8af7a33c4516af1 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f5449e74802c1112dea984aec8af7a33c4516af1 | RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy
ucma_destroy_id() assumes that all things accessing the ctx will do so via
the xarray. This assumption violated only in the case the FD is being
closed, then the ctx is reached via the ctx_list. Normally this is OK
since ucma_destroy_id() cannot run concu... | 0 | static ssize_t ucma_migrate_id(struct ucma_file *new_file,
const char __user *inbuf,
int in_len, int out_len)
{
struct rdma_ucm_migrate_id cmd;
struct rdma_ucm_migrate_resp resp;
struct ucma_event *uevent, *tmp;
struct ucma_context *ctx;
LIST_HEAD(event_list);
struct fd f;
struct ucma_file *c... | 88,339,149,708,390,080,000,000,000,000,000,000,000 | ucma.c | 19,789,728,225,973,280,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2020-36385 | An issue was discovered in the Linux kernel before 5.10. drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c. | https://nvd.nist.gov/vuln/detail/CVE-2020-36385 |
202,577 | rsync | 47a63d90e71d3e19e0e96052bb8c6b9cb140ecc1 | https://github.com/WayneD/rsync | https://git.samba.org/rsync.git/?p=rsync.git;a=commit;h=47a63d90e71d3e19e0e96052bb8c6b9cb140ecc1 | Enforce trailing \0 when receiving xattr name values.
Fixes bug 13112. | 1 | void receive_xattr(int f, struct file_struct *file)
{
static item_list temp_xattr = EMPTY_ITEM_LIST;
int count, num;
#ifdef HAVE_LINUX_XATTRS
int need_sort = 0;
#else
int need_sort = 1;
#endif
int ndx = read_varint(f);
if (ndx < 0 || (size_t)ndx > rsync_xal_l.count) {
rprintf(FERROR, "receive_xattr: xa index %... | 243,623,024,391,574,070,000,000,000,000,000,000,000 | xattrs.c | 217,588,258,695,223,800,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-16548 | The receive_xattr function in xattrs.c in rsync 3.1.2 and 3.1.3-development does not check for a trailing '\0' character in an xattr name, which allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact by sending crafted data to t... | https://nvd.nist.gov/vuln/detail/CVE-2017-16548 |
335,138 | rsync | 47a63d90e71d3e19e0e96052bb8c6b9cb140ecc1 | https://github.com/WayneD/rsync | https://git.samba.org/rsync.git/?p=rsync.git;a=commit;h=47a63d90e71d3e19e0e96052bb8c6b9cb140ecc1 | Enforce trailing \0 when receiving xattr name values.
Fixes bug 13112. | 0 | void receive_xattr(int f, struct file_struct *file)
{
static item_list temp_xattr = EMPTY_ITEM_LIST;
int count, num;
#ifdef HAVE_LINUX_XATTRS
int need_sort = 0;
#else
int need_sort = 1;
#endif
int ndx = read_varint(f);
if (ndx < 0 || (size_t)ndx > rsync_xal_l.count) {
rprintf(FERROR, "receive_xattr: xa index %... | 255,134,904,863,333,060,000,000,000,000,000,000,000 | xattrs.c | 327,517,846,050,383,840,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-16548 | The receive_xattr function in xattrs.c in rsync 3.1.2 and 3.1.3-development does not check for a trailing '\0' character in an xattr name, which allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact by sending crafted data to t... | https://nvd.nist.gov/vuln/detail/CVE-2017-16548 |
202,585 | radare2 | a5aafb99c3965259c84ddcf45a91144bf7eb4cf1 | https://github.com/radare/radare2 | https://github.com/radareorg/radare2/commit/a5aafb99c3965259c84ddcf45a91144bf7eb4cf1 | Fix null deref in macho parser ##crash
* Reported by Han0nly via huntrdev
* BountyID: c07e4918-cf86-4d2e-8969-5fb63575b449
* Reproducer: machonull | 1 | void MACH0_(iterate_chained_fixups)(struct MACH0_(obj_t) *bin, ut64 limit_start, ut64 limit_end, ut32 event_mask, RFixupCallback callback, void * context) {
int i = 0;
for (; i < bin->nsegs && i < bin->segs_count; i++) {
if (!bin->chained_starts[i]) {
continue;
}
int page_size = bin->chained_starts[i]->page_... | 193,240,874,041,910,470,000,000,000,000,000,000,000 | mach0.c | 192,907,863,915,294,270,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2022-1649 | Null pointer dereference in libr/bin/format/mach0/mach0.c in radareorg/radare2 in GitHub repository radareorg/radare2 prior to 5.7.0. It is likely to be exploitable. For more general description of heap buffer overflow, see [CWE](https://cwe.mitre.org/data/definitions/476.html). | https://nvd.nist.gov/vuln/detail/CVE-2022-1649 |
335,239 | radare2 | a5aafb99c3965259c84ddcf45a91144bf7eb4cf1 | https://github.com/radare/radare2 | https://github.com/radareorg/radare2/commit/a5aafb99c3965259c84ddcf45a91144bf7eb4cf1 | Fix null deref in macho parser ##crash
* Reported by Han0nly via huntrdev
* BountyID: c07e4918-cf86-4d2e-8969-5fb63575b449
* Reproducer: machonull | 0 | void MACH0_(iterate_chained_fixups)(struct MACH0_(obj_t) *bin, ut64 limit_start, ut64 limit_end, ut32 event_mask, RFixupCallback callback, void * context) {
int i = 0;
for (; i < bin->nsegs && i < bin->segs_count; i++) {
if (!bin->chained_starts[i]) {
continue;
}
int page_size = bin->chained_starts[i]->page_... | 271,044,673,647,208,800,000,000,000,000,000,000,000 | mach0.c | 256,621,041,784,698,250,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2022-1649 | Null pointer dereference in libr/bin/format/mach0/mach0.c in radareorg/radare2 in GitHub repository radareorg/radare2 prior to 5.7.0. It is likely to be exploitable. For more general description of heap buffer overflow, see [CWE](https://cwe.mitre.org/data/definitions/476.html). | https://nvd.nist.gov/vuln/detail/CVE-2022-1649 |
202,606 | gnutls | 15beb4b193b2714d88107e7dffca781798684e7e | http://git.savannah.gnu.org/cgit/gnutls | https://gitlab.com/gnutls/gnutls/-/commit/15beb4b193b2714d88107e7dffca781798684e7e | key_share: avoid use-after-free around realloc
Signed-off-by: Daiki Ueno <ueno@gnu.org> | 1 | key_share_send_params(gnutls_session_t session,
gnutls_buffer_st * extdata)
{
unsigned i;
int ret;
unsigned char *lengthp;
unsigned int cur_length;
unsigned int generated = 0;
const gnutls_group_entry_st *group;
const version_entry_st *ver;
/* this extension is only being sent on client side */
if (se... | 49,209,943,683,478,870,000,000,000,000,000,000,000 | key_share.c | 85,745,036,328,654,640,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2021-20231 | A flaw was found in gnutls. A use after free issue in client sending key_share extension may lead to memory corruption and other consequences. | https://nvd.nist.gov/vuln/detail/CVE-2021-20231 |
335,473 | gnutls | 15beb4b193b2714d88107e7dffca781798684e7e | http://git.savannah.gnu.org/cgit/gnutls | https://gitlab.com/gnutls/gnutls/-/commit/15beb4b193b2714d88107e7dffca781798684e7e | key_share: avoid use-after-free around realloc
Signed-off-by: Daiki Ueno <ueno@gnu.org> | 0 | key_share_send_params(gnutls_session_t session,
gnutls_buffer_st * extdata)
{
unsigned i;
int ret;
unsigned int generated = 0;
const gnutls_group_entry_st *group;
const version_entry_st *ver;
/* this extension is only being sent on client side */
if (session->security_parameters.entity == GNUTLS_CLIENT)... | 273,562,830,079,185,900,000,000,000,000,000,000,000 | key_share.c | 3,029,754,136,649,504,500,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2021-20231 | A flaw was found in gnutls. A use after free issue in client sending key_share extension may lead to memory corruption and other consequences. | https://nvd.nist.gov/vuln/detail/CVE-2021-20231 |
202,607 | ImageMagick6 | 9c31c956a1b2d65d0be0636d2eab3cd787897d35 | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/9c31c956a1b2d65d0be0636d2eab3cd787897d35 | https://github.com/ImageMagick/ImageMagick/issues/664 | 1 | static Image *ReadTIFFImage(const ImageInfo *image_info,
ExceptionInfo *exception)
{
const char
*option;
float
*chromaticity,
x_position,
y_position,
x_resolution,
y_resolution;
Image
*image;
int
tiff_status;
MagickBooleanType
status;
MagickSizeType
number_pixe... | 221,284,412,906,942,740,000,000,000,000,000,000,000 | tiff.c | 37,480,667,358,246,354,000,000,000,000,000,000,000 | [
"CWE-400"
] | CVE-2017-12805 | In ImageMagick 7.0.6-6, a memory exhaustion vulnerability was found in the function ReadTIFFImage, which allows attackers to cause a denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2017-12805 |
335,480 | ImageMagick6 | 9c31c956a1b2d65d0be0636d2eab3cd787897d35 | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/9c31c956a1b2d65d0be0636d2eab3cd787897d35 | https://github.com/ImageMagick/ImageMagick/issues/664 | 0 | static Image *ReadTIFFImage(const ImageInfo *image_info,
ExceptionInfo *exception)
{
const char
*option;
float
*chromaticity,
x_position,
y_position,
x_resolution,
y_resolution;
Image
*image;
int
tiff_status;
MagickBooleanType
status;
MagickSizeType
number_pixe... | 60,573,215,780,146,840,000,000,000,000,000,000,000 | tiff.c | 312,936,306,932,734,400,000,000,000,000,000,000,000 | [
"CWE-400"
] | CVE-2017-12805 | In ImageMagick 7.0.6-6, a memory exhaustion vulnerability was found in the function ReadTIFFImage, which allows attackers to cause a denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2017-12805 |
202,608 | lldpd | a8d3c90feca548fc0656d95b5d278713db86ff61 | https://github.com/vincentbernat/lldpd | https://github.com/lldpd/lldpd/commit/a8d3c90feca548fc0656d95b5d278713db86ff61 | lldp: avoid memory leak from bad packets
A packet that contains multiple instances of certain TLVs will cause
lldpd to continually allocate memory and leak the old memory. As an
example, multiple instances of system name TLV will cause old values
to be dropped by the decoding routine.
Reported-at: https://github.com... | 1 | lldp_decode(struct lldpd *cfg, char *frame, int s,
struct lldpd_hardware *hardware,
struct lldpd_chassis **newchassis, struct lldpd_port **newport)
{
struct lldpd_chassis *chassis;
struct lldpd_port *port;
char lldpaddr[ETHER_ADDR_LEN];
const char dot1[] = LLDP_TLV_ORG_DOT1;
const char dot3[] = LLDP_TLV_OR... | 334,246,557,583,225,300,000,000,000,000,000,000,000 | lldp.c | 338,594,752,845,422,840,000,000,000,000,000,000,000 | [
"CWE-400"
] | CVE-2020-27827 | A flaw was found in multiple versions of OpenvSwitch. Specially crafted LLDP packets can cause memory to be lost when allocating data to handle specific optional TLVs, potentially causing a denial of service. The highest threat from this vulnerability is to system availability. | https://nvd.nist.gov/vuln/detail/CVE-2020-27827 |
335,494 | lldpd | a8d3c90feca548fc0656d95b5d278713db86ff61 | https://github.com/vincentbernat/lldpd | https://github.com/lldpd/lldpd/commit/a8d3c90feca548fc0656d95b5d278713db86ff61 | lldp: avoid memory leak from bad packets
A packet that contains multiple instances of certain TLVs will cause
lldpd to continually allocate memory and leak the old memory. As an
example, multiple instances of system name TLV will cause old values
to be dropped by the decoding routine.
Reported-at: https://github.com... | 0 | lldp_decode(struct lldpd *cfg, char *frame, int s,
struct lldpd_hardware *hardware,
struct lldpd_chassis **newchassis, struct lldpd_port **newport)
{
struct lldpd_chassis *chassis;
struct lldpd_port *port;
char lldpaddr[ETHER_ADDR_LEN];
const char dot1[] = LLDP_TLV_ORG_DOT1;
const char dot3[] = LLDP_TLV_OR... | 5,466,741,183,457,960,000,000,000,000,000,000,000 | lldp.c | 223,793,138,512,356,470,000,000,000,000,000,000,000 | [
"CWE-400"
] | CVE-2020-27827 | A flaw was found in multiple versions of OpenvSwitch. Specially crafted LLDP packets can cause memory to be lost when allocating data to handle specific optional TLVs, potentially causing a denial of service. The highest threat from this vulnerability is to system availability. | https://nvd.nist.gov/vuln/detail/CVE-2020-27827 |
202,617 | yajl-ruby | a8ca8f476655adaa187eedc60bdc770fff3c51ce | https://github.com/brianmario/yajl-ruby | https://github.com/brianmario/yajl-ruby/commit/a8ca8f476655adaa187eedc60bdc770fff3c51ce | Don't advance our end pointer until we've checked we have enough
buffer left and have peeked ahead to see that a unicode escape
is approaching.
Thanks @kivikakk for helping me track down the actual bug here! | 1 | void yajl_string_decode(yajl_buf buf, const unsigned char * str,
unsigned int len)
{
unsigned int beg = 0;
unsigned int end = 0;
while (end < len) {
if (str[end] == '\\') {
char utf8Buf[5];
const char * unescaped = "?";
yajl_buf_append... | 181,307,126,597,938,260,000,000,000,000,000,000,000 | yajl_encode.c | 265,661,678,914,309,680,000,000,000,000,000,000,000 | [
"CWE-134"
] | CVE-2017-16516 | In the yajl-ruby gem 1.3.0 for Ruby, when a crafted JSON file is supplied to Yajl::Parser.new.parse, the whole ruby process crashes with a SIGABRT in the yajl_string_decode function in yajl_encode.c. This results in the whole ruby process terminating and potentially a denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2017-16516 |
335,518 | yajl-ruby | a8ca8f476655adaa187eedc60bdc770fff3c51ce | https://github.com/brianmario/yajl-ruby | https://github.com/brianmario/yajl-ruby/commit/a8ca8f476655adaa187eedc60bdc770fff3c51ce | Don't advance our end pointer until we've checked we have enough
buffer left and have peeked ahead to see that a unicode escape
is approaching.
Thanks @kivikakk for helping me track down the actual bug here! | 0 | void yajl_string_decode(yajl_buf buf, const unsigned char * str,
unsigned int len)
{
unsigned int beg = 0;
unsigned int end = 0;
while (end < len) {
if (str[end] == '\\') {
char utf8Buf[5];
const char * unescaped = "?";
yajl_buf_append... | 81,198,163,520,215,920,000,000,000,000,000,000,000 | yajl_encode.c | 197,486,582,965,095,000,000,000,000,000,000,000,000 | [
"CWE-134"
] | CVE-2017-16516 | In the yajl-ruby gem 1.3.0 for Ruby, when a crafted JSON file is supplied to Yajl::Parser.new.parse, the whole ruby process crashes with a SIGABRT in the yajl_string_decode function in yajl_encode.c. This results in the whole ruby process terminating and potentially a denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2017-16516 |
202,627 | ruby | c7d7ff45f1e0d6fad28e53c02108d4b067e843c3 | https://github.com/ruby/ruby | https://github.com/ruby/ruby/commit/c7d7ff45f1e0d6fad28e53c02108d4b067e843c3 | * ext/dl/lib/dl/func.rb (DL::Function#call): check tainted when
$SAFE > 0.
* ext/fiddle/function.c (function_call): check tainted when $SAFE > 0.
* test/fiddle/test_func.rb (module Fiddle): add test for above.
git-svn-id: svn+ssh://ci.ruby-lang.org/ruby/trunk@40728 b2dd03c8-39d4-4d8f-98ff-823fe69b080e | 1 | function_call(int argc, VALUE argv[], VALUE self)
{
ffi_cif * cif;
fiddle_generic retval;
fiddle_generic *generic_args;
void **values;
VALUE cfunc, types, cPointer;
int i;
cfunc = rb_iv_get(self, "@ptr");
types = rb_iv_get(self, "@args");
cPointer = rb_const_get(mFiddle, rb_in... | 206,873,134,629,291,320,000,000,000,000,000,000,000 | function.c | 195,617,434,498,371,100,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2013-2065 | (1) DL and (2) Fiddle in Ruby 1.9 before 1.9.3 patchlevel 426, and 2.0 before 2.0.0 patchlevel 195, do not perform taint checking for native functions, which allows context-dependent attackers to bypass intended $SAFE level restrictions. | https://nvd.nist.gov/vuln/detail/CVE-2013-2065 |
335,735 | ruby | c7d7ff45f1e0d6fad28e53c02108d4b067e843c3 | https://github.com/ruby/ruby | https://github.com/ruby/ruby/commit/c7d7ff45f1e0d6fad28e53c02108d4b067e843c3 | * ext/dl/lib/dl/func.rb (DL::Function#call): check tainted when
$SAFE > 0.
* ext/fiddle/function.c (function_call): check tainted when $SAFE > 0.
* test/fiddle/test_func.rb (module Fiddle): add test for above.
git-svn-id: svn+ssh://ci.ruby-lang.org/ruby/trunk@40728 b2dd03c8-39d4-4d8f-98ff-823fe69b080e | 0 | function_call(int argc, VALUE argv[], VALUE self)
{
ffi_cif * cif;
fiddle_generic retval;
fiddle_generic *generic_args;
void **values;
VALUE cfunc, types, cPointer;
int i;
cfunc = rb_iv_get(self, "@ptr");
types = rb_iv_get(self, "@args");
cPointer = rb_const_get(mFiddle, rb_in... | 216,224,853,251,678,570,000,000,000,000,000,000,000 | function.c | 224,240,350,581,390,100,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2013-2065 | (1) DL and (2) Fiddle in Ruby 1.9 before 1.9.3 patchlevel 426, and 2.0 before 2.0.0 patchlevel 195, do not perform taint checking for native functions, which allows context-dependent attackers to bypass intended $SAFE level restrictions. | https://nvd.nist.gov/vuln/detail/CVE-2013-2065 |
202,637 | mumble | d3be3d7b96a5130e4b20f23e327b040ea4d0b079 | https://github.com/mumble-voip/mumble | https://github.com/mumble-voip/mumble/commit/d3be3d7b96a5130e4b20f23e327b040ea4d0b079 | mumble: fix Mumble-SA-2014-002 (CVE-2014-0045). | 1 | bool AudioOutputSpeech::needSamples(unsigned int snum) {
for (unsigned int i=iLastConsume;i<iBufferFilled;++i)
pfBuffer[i-iLastConsume]=pfBuffer[i];
iBufferFilled -= iLastConsume;
iLastConsume = snum;
if (iBufferFilled >= snum)
return bLastAlive;
float *pOut;
bool nextalive = bLastAlive;
while (iBufferFi... | 215,357,927,557,034,220,000,000,000,000,000,000,000 | AudioOutputSpeech.cpp | 267,424,787,523,206,800,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2014-0045 | The needSamples method in AudioOutputSpeech.cpp in the client in Mumble 1.2.4 and the 1.2.3 pre-release snapshots, Mumble for iOS 1.1 through 1.2.2, and MumbleKit before commit fd190328a9b24d37382b269a5674b0c0c7a7e36d does not check the return value of the opus_decode_float function, which allows remote attackers to ca... | https://nvd.nist.gov/vuln/detail/CVE-2014-0045 |
335,782 | mumble | d3be3d7b96a5130e4b20f23e327b040ea4d0b079 | https://github.com/mumble-voip/mumble | https://github.com/mumble-voip/mumble/commit/d3be3d7b96a5130e4b20f23e327b040ea4d0b079 | mumble: fix Mumble-SA-2014-002 (CVE-2014-0045). | 0 | bool AudioOutputSpeech::needSamples(unsigned int snum) {
for (unsigned int i=iLastConsume;i<iBufferFilled;++i)
pfBuffer[i-iLastConsume]=pfBuffer[i];
iBufferFilled -= iLastConsume;
iLastConsume = snum;
if (iBufferFilled >= snum)
return bLastAlive;
float *pOut;
bool nextalive = bLastAlive;
while (iBufferFi... | 318,177,891,352,209,840,000,000,000,000,000,000,000 | None | null | [
"CWE-189"
] | CVE-2014-0045 | The needSamples method in AudioOutputSpeech.cpp in the client in Mumble 1.2.4 and the 1.2.3 pre-release snapshots, Mumble for iOS 1.1 through 1.2.2, and MumbleKit before commit fd190328a9b24d37382b269a5674b0c0c7a7e36d does not check the return value of the opus_decode_float function, which allows remote attackers to ca... | https://nvd.nist.gov/vuln/detail/CVE-2014-0045 |
202,639 | xserver | 7aaf54a1884f71dc363f0b884e57bcb67407a6cd | http://gitweb.freedesktop.org/?p=xorg/xserver | https://gitlab.freedesktop.org/xorg/xserver/-/commit/7aaf54a1884f71dc363f0b884e57bcb67407a6cd | Fix XChangeFeedbackControl() request underflow
CVE-2021-3472 / ZDI-CAN-1259
This vulnerability was discovered by:
Jan-Niklas Sohn working with Trend Micro Zero Day Initiative
Signed-off-by: Matthieu Herrb <matthieu@herrb.eu> | 1 | ProcXChangeFeedbackControl(ClientPtr client)
{
unsigned len;
DeviceIntPtr dev;
KbdFeedbackPtr k;
PtrFeedbackPtr p;
IntegerFeedbackPtr i;
StringFeedbackPtr s;
BellFeedbackPtr b;
LedFeedbackPtr l;
int rc;
REQUEST(xChangeFeedbackControlReq);
REQUEST_AT_LEAST_SIZE(xChangeFeedbac... | 25,902,079,671,328,110,000,000,000,000,000,000,000 | chgfctl.c | 165,947,780,592,021,760,000,000,000,000,000,000,000 | [
"CWE-191"
] | CVE-2021-3472 | A flaw was found in xorg-x11-server in versions before 1.20.11. An integer underflow can occur in xserver which can lead to a local privilege escalation. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. | https://nvd.nist.gov/vuln/detail/CVE-2021-3472 |
335,787 | xserver | 7aaf54a1884f71dc363f0b884e57bcb67407a6cd | http://gitweb.freedesktop.org/?p=xorg/xserver | https://gitlab.freedesktop.org/xorg/xserver/-/commit/7aaf54a1884f71dc363f0b884e57bcb67407a6cd | Fix XChangeFeedbackControl() request underflow
CVE-2021-3472 / ZDI-CAN-1259
This vulnerability was discovered by:
Jan-Niklas Sohn working with Trend Micro Zero Day Initiative
Signed-off-by: Matthieu Herrb <matthieu@herrb.eu> | 0 | ProcXChangeFeedbackControl(ClientPtr client)
{
unsigned len;
DeviceIntPtr dev;
KbdFeedbackPtr k;
PtrFeedbackPtr p;
IntegerFeedbackPtr i;
StringFeedbackPtr s;
BellFeedbackPtr b;
LedFeedbackPtr l;
int rc;
REQUEST(xChangeFeedbackControlReq);
REQUEST_AT_LEAST_SIZE(xChangeFeedbac... | 303,637,264,499,287,500,000,000,000,000,000,000,000 | chgfctl.c | 197,769,370,898,863,100,000,000,000,000,000,000,000 | [
"CWE-191"
] | CVE-2021-3472 | A flaw was found in xorg-x11-server in versions before 1.20.11. An integer underflow can occur in xserver which can lead to a local privilege escalation. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. | https://nvd.nist.gov/vuln/detail/CVE-2021-3472 |
202,648 | qemu | b2eb849d4b1fdb6f35d5c46958c7f703cf64cfef | https://github.com/bonzini/qemu | http://git.kernel.dk/?p=qemu.git;a=commitdiff;h=b2eb849d4b1fdb6f35d5c46958c7f703cf64cfef | CVE-2007-1320 - Cirrus LGD-54XX "bitblt" heap overflow
I have just noticed that patch for CVE-2007-1320 has never been applied
to the QEMU CVS. Please find it below.
| Multiple heap-based buffer overflows in the cirrus_invalidate_region
| function in the Cirrus VGA extension in QEMU 0.8.2, as used in Xen and
| possib... | 1 | static void cirrus_invalidate_region(CirrusVGAState * s, int off_begin,
int off_pitch, int bytesperline,
int lines)
{
int y;
int off_cur;
int off_cur_end;
for (y = 0; y < lines; y++) {
off_cur = off_begin;
off_cur_end = off_cur + bytesperline;
off_cur &= TARGET_PAGE_MASK;
while (o... | 150,631,720,864,651,670,000,000,000,000,000,000,000 | cirrus_vga.c | 309,015,525,745,059,660,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2007-1320 | Multiple heap-based buffer overflows in the cirrus_invalidate_region function in the Cirrus VGA extension in QEMU 0.8.2, as used in Xen and possibly other products, might allow local users to execute arbitrary code via unspecified vectors related to "attempting to mark non-existent regions as dirty," aka the "bitblt" h... | https://nvd.nist.gov/vuln/detail/CVE-2007-1320 |
335,838 | qemu | b2eb849d4b1fdb6f35d5c46958c7f703cf64cfef | https://github.com/bonzini/qemu | http://git.kernel.dk/?p=qemu.git;a=commitdiff;h=b2eb849d4b1fdb6f35d5c46958c7f703cf64cfef | CVE-2007-1320 - Cirrus LGD-54XX "bitblt" heap overflow
I have just noticed that patch for CVE-2007-1320 has never been applied
to the QEMU CVS. Please find it below.
| Multiple heap-based buffer overflows in the cirrus_invalidate_region
| function in the Cirrus VGA extension in QEMU 0.8.2, as used in Xen and
| possib... | 0 | static void cirrus_invalidate_region(CirrusVGAState * s, int off_begin,
int off_pitch, int bytesperline,
int lines)
{
int y;
int off_cur;
int off_cur_end;
for (y = 0; y < lines; y++) {
off_cur = off_begin;
off_cur_end = (off_cur + bytesperline) & s->cirrus_addr_mask;
off_cur &= TAR... | 203,752,949,771,965,140,000,000,000,000,000,000,000 | cirrus_vga.c | 127,568,660,777,291,270,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2007-1320 | Multiple heap-based buffer overflows in the cirrus_invalidate_region function in the Cirrus VGA extension in QEMU 0.8.2, as used in Xen and possibly other products, might allow local users to execute arbitrary code via unspecified vectors related to "attempting to mark non-existent regions as dirty," aka the "bitblt" h... | https://nvd.nist.gov/vuln/detail/CVE-2007-1320 |
202,650 | ImageMagick | df8a62fe4938aa41a39e815937c58bc0ed21b664 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/df8a62fe4938aa41a39e815937c58bc0ed21b664 | https://github.com/ImageMagick/ImageMagick/issues/1049 | 1 | static MagickBooleanType WritePCXImage(const ImageInfo *image_info,Image *image,
ExceptionInfo *exception)
{
MagickBooleanType
status;
MagickOffsetType
offset,
*page_table,
scene;
MemoryInfo
*pixel_info;
PCXInfo
pcx_info;
register const Quantum
*p;
register ssize_t
i,
... | 26,887,853,232,422,637,000,000,000,000,000,000,000 | pcx.c | 231,868,396,343,821,160,000,000,000,000,000,000,000 | [
"CWE-772"
] | CVE-2018-18016 | ImageMagick 7.0.7-28 has a memory leak vulnerability in WritePCXImage in coders/pcx.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-18016 |
335,872 | ImageMagick | df8a62fe4938aa41a39e815937c58bc0ed21b664 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/df8a62fe4938aa41a39e815937c58bc0ed21b664 | https://github.com/ImageMagick/ImageMagick/issues/1049 | 0 | static MagickBooleanType WritePCXImage(const ImageInfo *image_info,Image *image,
ExceptionInfo *exception)
{
MagickBooleanType
status;
MagickOffsetType
offset,
*page_table,
scene;
MemoryInfo
*pixel_info;
PCXInfo
pcx_info;
register const Quantum
*p;
register ssize_t
i,
... | 66,243,249,277,711,320,000,000,000,000,000,000,000 | pcx.c | 232,415,578,718,635,000,000,000,000,000,000,000,000 | [
"CWE-772"
] | CVE-2018-18016 | ImageMagick 7.0.7-28 has a memory leak vulnerability in WritePCXImage in coders/pcx.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-18016 |
202,658 | vim | e2fa213cf571041dbd04ab0329303ffdc980678a | https://github.com/vim/vim | https://github.com/vim/vim/commit/e2fa213cf571041dbd04ab0329303ffdc980678a | patch 8.2.5024: using freed memory with "]d"
Problem: Using freed memory with "]d".
Solution: Copy the pattern before searching. | 1 | nv_brackets(cmdarg_T *cap)
{
pos_T prev_pos;
pos_T *pos = NULL; // init for GCC
pos_T old_pos; // cursor position before command
int flag;
long n;
cap->oap->motion_type = MCHAR;
cap->oap->inclusive = FALSE;
old_pos = curwin->w_cursor;
curwin->w_cursor.coladd = 0; // TODO... | 311,492,303,638,563,900,000,000,000,000,000,000,000 | normal.c | 252,143,987,252,526,200,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2022-1898 | Use After Free in GitHub repository vim/vim prior to 8.2. | https://nvd.nist.gov/vuln/detail/CVE-2022-1898 |
336,105 | vim | e2fa213cf571041dbd04ab0329303ffdc980678a | https://github.com/vim/vim | https://github.com/vim/vim/commit/e2fa213cf571041dbd04ab0329303ffdc980678a | patch 8.2.5024: using freed memory with "]d"
Problem: Using freed memory with "]d".
Solution: Copy the pattern before searching. | 0 | nv_brackets(cmdarg_T *cap)
{
pos_T prev_pos;
pos_T *pos = NULL; // init for GCC
pos_T old_pos; // cursor position before command
int flag;
long n;
cap->oap->motion_type = MCHAR;
cap->oap->inclusive = FALSE;
old_pos = curwin->w_cursor;
curwin->w_cursor.coladd = 0; // TODO... | 117,058,894,084,913,720,000,000,000,000,000,000,000 | normal.c | 69,342,701,404,952,160,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2022-1898 | Use After Free in GitHub repository vim/vim prior to 8.2. | https://nvd.nist.gov/vuln/detail/CVE-2022-1898 |
202,664 | php-src | c6e34d91b88638966662caac62c4d0e90538e317 | https://github.com/php/php-src | http://git.php.net/?p=php-src.git;a=commit;h=c6e34d91b88638966662caac62c4d0e90538e317 | Fix bug #77371 (heap buffer overflow in mb regex functions - compile_string_node) | 1 | compile_string_node(Node* node, regex_t* reg)
{
int r, len, prev_len, slen, ambig;
OnigEncoding enc = reg->enc;
UChar *p, *prev, *end;
StrNode* sn;
sn = NSTR(node);
if (sn->end <= sn->s)
return 0;
end = sn->end;
ambig = NSTRING_IS_AMBIG(node);
p = prev = sn->s;
prev_len = enclen(enc, p);
p ... | 286,601,417,110,115,650,000,000,000,000,000,000,000 | regcomp.c | 334,478,564,955,981,800,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-9023 | An issue was discovered in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1. A number of heap-based buffer over-read instances are present in mbstring regular expression functions when supplied with invalid multibyte data. These occur in ext/mbstring/oniguruma/regcomp.c, ext/mbstring/on... | https://nvd.nist.gov/vuln/detail/CVE-2019-9023 |
336,218 | php-src | c6e34d91b88638966662caac62c4d0e90538e317 | https://github.com/php/php-src | http://git.php.net/?p=php-src.git;a=commit;h=c6e34d91b88638966662caac62c4d0e90538e317 | Fix bug #77371 (heap buffer overflow in mb regex functions - compile_string_node) | 0 | compile_string_node(Node* node, regex_t* reg)
{
int r, len, prev_len, slen, ambig;
OnigEncoding enc = reg->enc;
UChar *p, *prev, *end;
StrNode* sn;
sn = NSTR(node);
if (sn->end <= sn->s)
return 0;
end = sn->end;
ambig = NSTRING_IS_AMBIG(node);
p = prev = sn->s;
prev_len = enclen(enc, p);
p ... | 83,994,044,431,215,480,000,000,000,000,000,000,000 | regcomp.c | 324,322,720,593,171,400,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-9023 | An issue was discovered in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1. A number of heap-based buffer over-read instances are present in mbstring regular expression functions when supplied with invalid multibyte data. These occur in ext/mbstring/oniguruma/regcomp.c, ext/mbstring/on... | https://nvd.nist.gov/vuln/detail/CVE-2019-9023 |
202,666 | passenger | ddb8ecc4ebf260e4967f57f271d4f5761abeac3e | https://github.com/phusion/passenger | https://github.com/phusion/passenger/commit/ddb8ecc4ebf260e4967f57f271d4f5761abeac3e | Fix CVE-2015-7519 header collision vulnerability | 1 | Controller::constructHeaderForSessionProtocol(Request *req, char * restrict buffer,
unsigned int &size, const SessionProtocolWorkingState &state, string delta_monotonic)
{
char *pos = buffer;
const char *end = buffer + size;
pos += sizeof(boost::uint32_t);
pos = appendData(pos, end, P_STATIC_STRING_WITH_NULL("RE... | 237,090,291,769,915,940,000,000,000,000,000,000,000 | SendRequest.cpp | 201,534,075,635,135,300,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2015-7519 | agent/Core/Controller/SendRequest.cpp in Phusion Passenger before 4.0.60 and 5.0.x before 5.0.22, when used in Apache integration mode or in standalone mode without a filtering proxy, allows remote attackers to spoof headers passed to applications by using an _ (underscore) character instead of a - (dash) character in ... | https://nvd.nist.gov/vuln/detail/CVE-2015-7519 |
336,311 | passenger | ddb8ecc4ebf260e4967f57f271d4f5761abeac3e | https://github.com/phusion/passenger | https://github.com/phusion/passenger/commit/ddb8ecc4ebf260e4967f57f271d4f5761abeac3e | Fix CVE-2015-7519 header collision vulnerability | 0 | Controller::constructHeaderForSessionProtocol(Request *req, char * restrict buffer,
unsigned int &size, const SessionProtocolWorkingState &state, string delta_monotonic)
{
char *pos = buffer;
const char *end = buffer + size;
pos += sizeof(boost::uint32_t);
pos = appendData(pos, end, P_STATIC_STRING_WITH_NULL("RE... | 60,838,788,408,756,440,000,000,000,000,000,000,000 | SendRequest.cpp | 59,962,529,913,623,890,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2015-7519 | agent/Core/Controller/SendRequest.cpp in Phusion Passenger before 4.0.60 and 5.0.x before 5.0.22, when used in Apache integration mode or in standalone mode without a filtering proxy, allows remote attackers to spoof headers passed to applications by using an _ (underscore) character instead of a - (dash) character in ... | https://nvd.nist.gov/vuln/detail/CVE-2015-7519 |
202,667 | ImageMagick | 7b97357e7f8d6ae848a4c699fe17db6fcf4bd7a9 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/7b97357e7f8d6ae848a4c699fe17db6fcf4bd7a9 | https://github.com/ImageMagick/ImageMagick/issues/873 | 1 | static Image *ReadXPMImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
char
*grey,
key[MagickPathExtent],
target[MagickPathExtent],
*xpm_buffer;
Image
*image;
MagickBooleanType
active,
status;
register char
*next,
*p,
*q;
register ssize_t
x;
regis... | 326,559,310,483,777,100,000,000,000,000,000,000,000 | xpm.c | 180,884,855,428,845,170,000,000,000,000,000,000,000 | [
"CWE-772"
] | CVE-2017-17680 | In ImageMagick 7.0.7-12 Q16, a memory leak vulnerability was found in the function ReadXPMImage in coders/xpm.c, which allows attackers to cause a denial of service via a crafted xpm image file. | https://nvd.nist.gov/vuln/detail/CVE-2017-17680 |
336,319 | ImageMagick | 7b97357e7f8d6ae848a4c699fe17db6fcf4bd7a9 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/7b97357e7f8d6ae848a4c699fe17db6fcf4bd7a9 | https://github.com/ImageMagick/ImageMagick/issues/873 | 0 | static Image *ReadXPMImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
char
*grey,
key[MagickPathExtent],
target[MagickPathExtent],
*xpm_buffer;
Image
*image;
MagickBooleanType
active,
status;
register char
*next,
*p,
*q;
register ssize_t
x;
regis... | 49,702,364,745,596,370,000,000,000,000,000,000,000 | xpm.c | 326,748,241,143,491,070,000,000,000,000,000,000,000 | [
"CWE-772"
] | CVE-2017-17680 | In ImageMagick 7.0.7-12 Q16, a memory leak vulnerability was found in the function ReadXPMImage in coders/xpm.c, which allows attackers to cause a denial of service via a crafted xpm image file. | https://nvd.nist.gov/vuln/detail/CVE-2017-17680 |
202,668 | FreeRDP | 6b2bc41935e53b0034fe5948aeeab4f32e80f30f | https://github.com/FreeRDP/FreeRDP | https://github.com/FreeRDP/FreeRDP/commit/6b2bc41935e53b0034fe5948aeeab4f32e80f30f | Fix #6010: Check length in read_icon_info | 1 | static BOOL update_read_icon_info(wStream* s, ICON_INFO* iconInfo)
{
BYTE* newBitMask;
if (Stream_GetRemainingLength(s) < 8)
return FALSE;
Stream_Read_UINT16(s, iconInfo->cacheEntry); /* cacheEntry (2 bytes) */
Stream_Read_UINT8(s, iconInfo->cacheId); /* cacheId (1 byte) */
Stream_Read_UINT8(s, iconInfo->b... | 170,890,245,154,938,950,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2020-11042 | In FreeRDP greater than 1.1 and before 2.0.0, there is an out-of-bounds read in update_read_icon_info. It allows reading a attacker-defined amount of client memory (32bit unsigned -> 4GB) to an intermediate buffer. This can be used to crash the client or store information for later retrieval. This has been patched in 2... | https://nvd.nist.gov/vuln/detail/CVE-2020-11042 |
336,323 | FreeRDP | 6b2bc41935e53b0034fe5948aeeab4f32e80f30f | https://github.com/FreeRDP/FreeRDP | https://github.com/FreeRDP/FreeRDP/commit/6b2bc41935e53b0034fe5948aeeab4f32e80f30f | Fix #6010: Check length in read_icon_info | 0 | static BOOL update_read_icon_info(wStream* s, ICON_INFO* iconInfo)
{
BYTE* newBitMask;
if (Stream_GetRemainingLength(s) < 8)
return FALSE;
Stream_Read_UINT16(s, iconInfo->cacheEntry); /* cacheEntry (2 bytes) */
Stream_Read_UINT8(s, iconInfo->cacheId); /* cacheId (1 byte) */
Stream_Read_UINT8(s, iconInfo->b... | 305,299,603,255,605,330,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2020-11042 | In FreeRDP greater than 1.1 and before 2.0.0, there is an out-of-bounds read in update_read_icon_info. It allows reading a attacker-defined amount of client memory (32bit unsigned -> 4GB) to an intermediate buffer. This can be used to crash the client or store information for later retrieval. This has been patched in 2... | https://nvd.nist.gov/vuln/detail/CVE-2020-11042 |
202,669 | squid | 983c5c36e5f109512ed1af38a329d0b5d0967498 | https://github.com/squid-cache/squid | https://github.com/squid-cache/squid/commit/983c5c36e5f109512ed1af38a329d0b5d0967498 | Fix memory leak when parsing SNMP packet (#313)
SNMP queries denied by snmp_access rules and queries with certain
unsupported SNMPv2 commands were leaking a few hundred bytes each. Such
queries trigger "SNMP agent query DENIED from..." WARNINGs in cache.log. | 1 | snmpDecodePacket(SnmpRequest * rq)
{
struct snmp_pdu *PDU;
u_char *Community;
u_char *buf = rq->buf;
int len = rq->len;
if (!Config.accessList.snmp) {
debugs(49, DBG_IMPORTANT, "WARNING: snmp_access not configured. agent query DENIED from : " << rq->from);
return;
}
debugs(... | 295,158,858,104,753,130,000,000,000,000,000,000,000 | snmp_core.cc | 213,619,074,999,419,820,000,000,000,000,000,000,000 | [
"CWE-772"
] | CVE-2018-19132 | Squid before 4.4, when SNMP is enabled, allows a denial of service (Memory Leak) via an SNMP packet. | https://nvd.nist.gov/vuln/detail/CVE-2018-19132 |
336,342 | squid | 983c5c36e5f109512ed1af38a329d0b5d0967498 | https://github.com/squid-cache/squid | https://github.com/squid-cache/squid/commit/983c5c36e5f109512ed1af38a329d0b5d0967498 | Fix memory leak when parsing SNMP packet (#313)
SNMP queries denied by snmp_access rules and queries with certain
unsupported SNMPv2 commands were leaking a few hundred bytes each. Such
queries trigger "SNMP agent query DENIED from..." WARNINGs in cache.log. | 0 | snmpDecodePacket(SnmpRequest * rq)
{
struct snmp_pdu *PDU;
u_char *Community;
u_char *buf = rq->buf;
int len = rq->len;
if (!Config.accessList.snmp) {
debugs(49, DBG_IMPORTANT, "WARNING: snmp_access not configured. agent query DENIED from : " << rq->from);
return;
}
debugs(... | 124,468,677,242,160,090,000,000,000,000,000,000,000 | snmp_core.cc | 237,950,495,665,253,450,000,000,000,000,000,000,000 | [
"CWE-772"
] | CVE-2018-19132 | Squid before 4.4, when SNMP is enabled, allows a denial of service (Memory Leak) via an SNMP packet. | https://nvd.nist.gov/vuln/detail/CVE-2018-19132 |
202,670 | flatpak | 902fb713990a8f968ea4350c7c2a27ff46f1a6c4 | https://github.com/flatpak/flatpak | https://github.com/flatpak/flatpak/commit/902fb713990a8f968ea4350c7c2a27ff46f1a6c4 | Use seccomp to filter out TIOCSTI ioctl
This would otherwise let the sandbox add input to the controlling tty. | 1 | setup_seccomp (GPtrArray *argv_array,
GArray *fd_array,
const char *arch,
gboolean multiarch,
gboolean devel,
GError **error)
{
__attribute__((cleanup (cleanup_seccomp))) scmp_filter_ctx seccomp = NULL;
/**** BEGIN NOTE ON COD... | 126,201,198,414,475,670,000,000,000,000,000,000,000 | flatpak-run.c | 116,110,354,022,810,410,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2019-10063 | Flatpak before 1.0.8, 1.1.x and 1.2.x before 1.2.4, and 1.3.x before 1.3.1 allows a sandbox bypass. Flatpak versions since 0.8.1 address CVE-2017-5226 by using a seccomp filter to prevent sandboxed apps from using the TIOCSTI ioctl, which could otherwise be used to inject commands into the controlling terminal so that ... | https://nvd.nist.gov/vuln/detail/CVE-2019-10063 |
336,364 | flatpak | 902fb713990a8f968ea4350c7c2a27ff46f1a6c4 | https://github.com/flatpak/flatpak | https://github.com/flatpak/flatpak/commit/902fb713990a8f968ea4350c7c2a27ff46f1a6c4 | Use seccomp to filter out TIOCSTI ioctl
This would otherwise let the sandbox add input to the controlling tty. | 0 | setup_seccomp (GPtrArray *argv_array,
GArray *fd_array,
const char *arch,
gboolean multiarch,
gboolean devel,
GError **error)
{
__attribute__((cleanup (cleanup_seccomp))) scmp_filter_ctx seccomp = NULL;
/**** BEGIN NOTE ON COD... | 210,146,810,537,379,230,000,000,000,000,000,000,000 | flatpak-run.c | 51,821,770,144,244,430,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2019-10063 | Flatpak before 1.0.8, 1.1.x and 1.2.x before 1.2.4, and 1.3.x before 1.3.1 allows a sandbox bypass. Flatpak versions since 0.8.1 address CVE-2017-5226 by using a seccomp filter to prevent sandboxed apps from using the TIOCSTI ioctl, which could otherwise be used to inject commands into the controlling terminal so that ... | https://nvd.nist.gov/vuln/detail/CVE-2019-10063 |
202,671 | leptonica | 8d6e1755518cfb98536d6c3daf0601f226d16842 | https://github.com/DanBloomberg/leptonica | https://github.com/DanBloomberg/leptonica/commit/8d6e1755518cfb98536d6c3daf0601f226d16842 | Issue 23433 in oss-fuzz: Heap-buffer-overflow in findNextBorderPixel()
* Check pix boundary when looking for the next pixel. | 1 | findNextBorderPixel(l_int32 w,
l_int32 h,
l_uint32 *data,
l_int32 wpl,
l_int32 px,
l_int32 py,
l_int32 *pqpos,
l_int32 *pnpx,
l_int32 *pnp... | 172,879,270,821,373,000,000,000,000,000,000,000,000 | ccbord.c | 107,849,461,100,282,100,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2020-36278 | Leptonica before 1.80.0 allows a heap-based buffer over-read in findNextBorderPixel in ccbord.c. | https://nvd.nist.gov/vuln/detail/CVE-2020-36278 |
336,425 | leptonica | 8d6e1755518cfb98536d6c3daf0601f226d16842 | https://github.com/DanBloomberg/leptonica | https://github.com/DanBloomberg/leptonica/commit/8d6e1755518cfb98536d6c3daf0601f226d16842 | Issue 23433 in oss-fuzz: Heap-buffer-overflow in findNextBorderPixel()
* Check pix boundary when looking for the next pixel. | 0 | findNextBorderPixel(l_int32 w,
l_int32 h,
l_uint32 *data,
l_int32 wpl,
l_int32 px,
l_int32 py,
l_int32 *pqpos,
l_int32 *pnpx,
l_int32 *pnp... | 11,574,903,189,996,028,000,000,000,000,000,000,000 | ccbord.c | 209,192,668,763,824,270,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2020-36278 | Leptonica before 1.80.0 allows a heap-based buffer over-read in findNextBorderPixel in ccbord.c. | https://nvd.nist.gov/vuln/detail/CVE-2020-36278 |
202,673 | libsass | 0bc35e3d26922229d5a3e3308860cf0fcee5d1cf | https://github.com/sass/libsass | https://github.com/sass/libsass/commit/0bc35e3d26922229d5a3e3308860cf0fcee5d1cf | Fix segfault on empty custom properties
Originally reported in sass/sassc#225
Fixes sass/sassc#225
Spec sass/sass-spec#1249 | 1 | Statement_Ptr Expand::operator()(Declaration_Ptr d)
{
Block_Obj ab = d->block();
String_Obj old_p = d->property();
Expression_Obj prop = old_p->perform(&eval);
String_Obj new_p = Cast<String>(prop);
// we might get a color back
if (!new_p) {
std::string str(prop->to_string(ctx.c_option... | 5,288,536,904,599,497,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2018-11695 | An issue was discovered in LibSass <3.5.3. A NULL pointer dereference was found in the function Sass::Expand::operator which could be leveraged by an attacker to cause a denial of service (application crash) or possibly have unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2018-11695 |
336,456 | libsass | 0bc35e3d26922229d5a3e3308860cf0fcee5d1cf | https://github.com/sass/libsass | https://github.com/sass/libsass/commit/0bc35e3d26922229d5a3e3308860cf0fcee5d1cf | Fix segfault on empty custom properties
Originally reported in sass/sassc#225
Fixes sass/sassc#225
Spec sass/sass-spec#1249 | 0 | Statement_Ptr Expand::operator()(Declaration_Ptr d)
{
Block_Obj ab = d->block();
String_Obj old_p = d->property();
Expression_Obj prop = old_p->perform(&eval);
String_Obj new_p = Cast<String>(prop);
// we might get a color back
if (!new_p) {
std::string str(prop->to_string(ctx.c_option... | 127,883,527,826,979,700,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2018-11695 | An issue was discovered in LibSass <3.5.3. A NULL pointer dereference was found in the function Sass::Expand::operator which could be leveraged by an attacker to cause a denial of service (application crash) or possibly have unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2018-11695 |
202,676 | ImageMagick | d4145e664aea3752ca6d3bf1ee825352b595dab5 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/d4145e664aea3752ca6d3bf1ee825352b595dab5 | https://github.com/ImageMagick/ImageMagick/issues/682 | 1 | static Image *ReadSFWImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
static unsigned char
HuffmanTable[] =
{
0xFF, 0xC4, 0x01, 0xA2, 0x00, 0x00, 0x01, 0x05, 0x01, 0x01, 0x01,
0x01, 0x01, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0... | 244,939,699,971,169,320,000,000,000,000,000,000,000 | sfw.c | 95,046,131,770,927,390,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-12983 | Heap-based buffer overflow in the ReadSFWImage function in coders/sfw.c in ImageMagick 7.0.6-8 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2017-12983 |
336,478 | ImageMagick | d4145e664aea3752ca6d3bf1ee825352b595dab5 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/d4145e664aea3752ca6d3bf1ee825352b595dab5 | https://github.com/ImageMagick/ImageMagick/issues/682 | 0 | static Image *ReadSFWImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
static unsigned char
HuffmanTable[] =
{
0xFF, 0xC4, 0x01, 0xA2, 0x00, 0x00, 0x01, 0x05, 0x01, 0x01, 0x01,
0x01, 0x01, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0... | 27,675,606,765,677,550,000,000,000,000,000,000,000 | sfw.c | 64,214,199,085,540,595,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2017-12983 | Heap-based buffer overflow in the ReadSFWImage function in coders/sfw.c in ImageMagick 7.0.6-8 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2017-12983 |
202,679 | sysstat | a5c8abd4a481ee6e27a3acf00e6d9b0f023e20ed | https://github.com/sysstat/sysstat | https://github.com/sysstat/sysstat/commit/a5c8abd4a481ee6e27a3acf00e6d9b0f023e20ed | Fix #242: Double free in check_file_actlst()
Avoid freeing buffer() twice.
Signed-off-by: Sebastien GODARD <sysstat@users.noreply.github.com> | 1 | void check_file_actlst(int *ifd, char *dfile, struct activity *act[], uint64_t flags,
struct file_magic *file_magic, struct file_header *file_hdr,
struct file_activity **file_actlst, unsigned int id_seq[],
int ignore, int *endian_mismatch, int *arch_64)
{
int i, j, k, p;
struct file_activit... | 173,264,044,164,024,700,000,000,000,000,000,000,000 | sa_common.c | 43,739,889,268,322,440,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2019-19725 | sysstat through 12.2.0 has a double free in check_file_actlst in sa_common.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-19725 |
336,699 | sysstat | a5c8abd4a481ee6e27a3acf00e6d9b0f023e20ed | https://github.com/sysstat/sysstat | https://github.com/sysstat/sysstat/commit/a5c8abd4a481ee6e27a3acf00e6d9b0f023e20ed | Fix #242: Double free in check_file_actlst()
Avoid freeing buffer() twice.
Signed-off-by: Sebastien GODARD <sysstat@users.noreply.github.com> | 0 | void check_file_actlst(int *ifd, char *dfile, struct activity *act[], uint64_t flags,
struct file_magic *file_magic, struct file_header *file_hdr,
struct file_activity **file_actlst, unsigned int id_seq[],
int ignore, int *endian_mismatch, int *arch_64)
{
int i, j, k, p;
struct file_activit... | 53,197,963,354,301,790,000,000,000,000,000,000,000 | sa_common.c | 331,634,466,050,993,950,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2019-19725 | sysstat through 12.2.0 has a double free in check_file_actlst in sa_common.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-19725 |
202,718 | exiv2 | 783b3a6ff15ed6f82a8f8e6c8a6f3b84a9b04d4b | https://github.com/Exiv2/exiv2 | https://github.com/Exiv2/exiv2/commit/783b3a6ff15ed6f82a8f8e6c8a6f3b84a9b04d4b | Improve bound checking in WebPImage::doWriteMetadata() | 1 | void WebPImage::doWriteMetadata(BasicIo& outIo)
{
if (!io_->isopen()) throw Error(kerInputDataReadFailed);
if (!outIo.isopen()) throw Error(kerImageWriteFailed);
#ifdef EXIV2_DEBUG_MESSAGES
std::cout << "Writing metadata" << std::endl;
#endif
byte data [WEBP_TAG_SIZE*3];
... | 92,778,462,470,457,700,000,000,000,000,000,000,000 | webpimage.cpp | 124,403,017,614,491,700,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2021-29463 | Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentia... | https://nvd.nist.gov/vuln/detail/CVE-2021-29463 |
337,774 | exiv2 | 783b3a6ff15ed6f82a8f8e6c8a6f3b84a9b04d4b | https://github.com/Exiv2/exiv2 | https://github.com/Exiv2/exiv2/commit/783b3a6ff15ed6f82a8f8e6c8a6f3b84a9b04d4b | Improve bound checking in WebPImage::doWriteMetadata() | 0 | void WebPImage::doWriteMetadata(BasicIo& outIo)
{
if (!io_->isopen()) throw Error(kerInputDataReadFailed);
if (!outIo.isopen()) throw Error(kerImageWriteFailed);
#ifdef EXIV2_DEBUG_MESSAGES
std::cout << "Writing metadata" << std::endl;
#endif
byte data [WEBP_TAG_SIZE*3];
... | 48,051,940,479,489,540,000,000,000,000,000,000,000 | webpimage.cpp | 37,303,076,579,972,948,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2021-29463 | Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentia... | https://nvd.nist.gov/vuln/detail/CVE-2021-29463 |
202,720 | ImageMagick6 | ae3eecad2f59e27123c1a6c891be75d06fc03656 | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/ae3eecad2f59e27123c1a6c891be75d06fc03656 | https://github.com/ImageMagick/ImageMagick/issues/1191 | 1 | static MagickBooleanType WriteMIFFImage(const ImageInfo *image_info,
Image *image)
{
#if defined(MAGICKCORE_BZLIB_DELEGATE)
bz_stream
bzip_info;
#endif
char
buffer[MaxTextExtent];
CompressionType
compression;
const char
*property,
*value;
IndexPacket
index;
#if defined(MAGICKCOR... | 149,196,027,850,495,320,000,000,000,000,000,000,000 | miff.c | 7,651,543,122,002,567,000,000,000,000,000,000,000 | [
"CWE-772"
] | CVE-2018-14436 | ImageMagick 7.0.8-4 has a memory leak in ReadMIFFImage in coders/miff.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-14436 |
337,863 | ImageMagick6 | ae3eecad2f59e27123c1a6c891be75d06fc03656 | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/ae3eecad2f59e27123c1a6c891be75d06fc03656 | https://github.com/ImageMagick/ImageMagick/issues/1191 | 0 | static MagickBooleanType WriteMIFFImage(const ImageInfo *image_info,
Image *image)
{
#if defined(MAGICKCORE_BZLIB_DELEGATE)
bz_stream
bzip_info;
#endif
char
buffer[MaxTextExtent];
CompressionType
compression;
const char
*property,
*value;
IndexPacket
index;
#if defined(MAGICKCOR... | 179,959,574,243,725,370,000,000,000,000,000,000,000 | None | null | [
"CWE-772"
] | CVE-2018-14436 | ImageMagick 7.0.8-4 has a memory leak in ReadMIFFImage in coders/miff.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-14436 |
202,737 | qemu | 2d51c32c4b511db8bb9e58208f1e2c25e4c06c85 | https://github.com/bonzini/qemu | http://git.qemu.org/?p=qemu.git;a=commit;h=2d51c32c4b511db8bb9e58208f1e2c25e4c06c85 | qcow2: Validate active L1 table offset and size (CVE-2014-0144)
This avoids an unbounded allocation.
Signed-off-by: Kevin Wolf <kwolf@redhat.com>
Reviewed-by: Max Reitz <mreitz@redhat.com>
Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com> | 1 | static int qcow2_open(BlockDriverState *bs, QDict *options, int flags,
Error **errp)
{
BDRVQcowState *s = bs->opaque;
int len, i, ret = 0;
QCowHeader header;
QemuOpts *opts;
Error *local_err = NULL;
uint64_t ext_end;
uint64_t l1_vm_state_index;
const char *opt_overl... | 181,458,126,158,566,800,000,000,000,000,000,000,000 | qcow2.c | 221,937,655,733,254,050,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2014-0144 | QEMU before 2.0.0 block drivers for CLOOP, QCOW2 version 2 and various other image formats are vulnerable to potential memory corruptions, integer/buffer overflows or crash caused by missing input validations which could allow a remote user to execute arbitrary code on the host with the privileges of the QEMU process. | https://nvd.nist.gov/vuln/detail/CVE-2014-0144 |
338,452 | qemu | 2d51c32c4b511db8bb9e58208f1e2c25e4c06c85 | https://github.com/bonzini/qemu | http://git.qemu.org/?p=qemu.git;a=commit;h=2d51c32c4b511db8bb9e58208f1e2c25e4c06c85 | qcow2: Validate active L1 table offset and size (CVE-2014-0144)
This avoids an unbounded allocation.
Signed-off-by: Kevin Wolf <kwolf@redhat.com>
Reviewed-by: Max Reitz <mreitz@redhat.com>
Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com> | 0 | static int qcow2_open(BlockDriverState *bs, QDict *options, int flags,
Error **errp)
{
BDRVQcowState *s = bs->opaque;
int len, i, ret = 0;
QCowHeader header;
QemuOpts *opts;
Error *local_err = NULL;
uint64_t ext_end;
uint64_t l1_vm_state_index;
const char *opt_overl... | 283,629,623,680,026,030,000,000,000,000,000,000,000 | qcow2.c | 294,111,040,411,264,500,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2014-0144 | QEMU before 2.0.0 block drivers for CLOOP, QCOW2 version 2 and various other image formats are vulnerable to potential memory corruptions, integer/buffer overflows or crash caused by missing input validations which could allow a remote user to execute arbitrary code on the host with the privileges of the QEMU process. | https://nvd.nist.gov/vuln/detail/CVE-2014-0144 |
202,743 | libevent | 7b21c4eabf1f3946d3f63cce1319c490caab8ecf | https://github.com/libevent/libevent | https://github.com/libevent/libevent/commit/7b21c4eabf1f3946d3f63cce1319c490caab8ecf | Fix CVE-2014-6272 in Libevent 1.4
For this fix, we need to make sure that passing too-large inputs to
the evbuffer functions can't make us do bad things with the heap. | 1 | evbuffer_expand(struct evbuffer *buf, size_t datlen)
{
size_t need = buf->misalign + buf->off + datlen;
/* If we can fit all the data, then we don't have to do anything */
if (buf->totallen >= need)
return (0);
/*
* If the misalignment fulfills our data needs, we just force an
* alignment to happen. Afterw... | 258,002,302,375,317,420,000,000,000,000,000,000,000 | buffer.c | 249,511,286,500,344,070,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2014-6272 | Multiple integer overflows in the evbuffer API in Libevent 1.4.x before 1.4.15, 2.0.x before 2.0.22, and 2.1.x before 2.1.5-beta allow context-dependent attackers to cause a denial of service or possibly have other unspecified impact via "insanely large inputs" to the (1) evbuffer_add, (2) evbuffer_expand, or (3) buffe... | https://nvd.nist.gov/vuln/detail/CVE-2014-6272 |
338,737 | libevent | 7b21c4eabf1f3946d3f63cce1319c490caab8ecf | https://github.com/libevent/libevent | https://github.com/libevent/libevent/commit/7b21c4eabf1f3946d3f63cce1319c490caab8ecf | Fix CVE-2014-6272 in Libevent 1.4
For this fix, we need to make sure that passing too-large inputs to
the evbuffer functions can't make us do bad things with the heap. | 0 | evbuffer_expand(struct evbuffer *buf, size_t datlen)
{
size_t used = buf->misalign + buf->off;
size_t need;
assert(buf->totallen >= used);
/* If we can fit all the data, then we don't have to do anything */
if (buf->totallen - used >= datlen)
return (0);
/* If we would need to overflow to fit this much data, ... | 268,520,221,436,341,230,000,000,000,000,000,000,000 | buffer.c | 95,787,474,149,316,780,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2014-6272 | Multiple integer overflows in the evbuffer API in Libevent 1.4.x before 1.4.15, 2.0.x before 2.0.22, and 2.1.x before 2.1.5-beta allow context-dependent attackers to cause a denial of service or possibly have other unspecified impact via "insanely large inputs" to the (1) evbuffer_add, (2) evbuffer_expand, or (3) buffe... | https://nvd.nist.gov/vuln/detail/CVE-2014-6272 |
202,744 | libevent | 7b21c4eabf1f3946d3f63cce1319c490caab8ecf | https://github.com/libevent/libevent | https://github.com/libevent/libevent/commit/7b21c4eabf1f3946d3f63cce1319c490caab8ecf | Fix CVE-2014-6272 in Libevent 1.4
For this fix, we need to make sure that passing too-large inputs to
the evbuffer functions can't make us do bad things with the heap. | 1 | evbuffer_add(struct evbuffer *buf, const void *data, size_t datlen)
{
size_t need = buf->misalign + buf->off + datlen;
size_t oldoff = buf->off;
if (buf->totallen < need) {
if (evbuffer_expand(buf, datlen) == -1)
return (-1);
}
memcpy(buf->buffer + buf->off, data, datlen);
buf->off += datlen;
if (datlen ... | 5,736,669,242,917,229,000,000,000,000,000,000,000 | buffer.c | 249,511,286,500,344,070,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2014-6272 | Multiple integer overflows in the evbuffer API in Libevent 1.4.x before 1.4.15, 2.0.x before 2.0.22, and 2.1.x before 2.1.5-beta allow context-dependent attackers to cause a denial of service or possibly have other unspecified impact via "insanely large inputs" to the (1) evbuffer_add, (2) evbuffer_expand, or (3) buffe... | https://nvd.nist.gov/vuln/detail/CVE-2014-6272 |
338,735 | libevent | 7b21c4eabf1f3946d3f63cce1319c490caab8ecf | https://github.com/libevent/libevent | https://github.com/libevent/libevent/commit/7b21c4eabf1f3946d3f63cce1319c490caab8ecf | Fix CVE-2014-6272 in Libevent 1.4
For this fix, we need to make sure that passing too-large inputs to
the evbuffer functions can't make us do bad things with the heap. | 0 | evbuffer_add(struct evbuffer *buf, const void *data, size_t datlen)
{
size_t used = buf->misalign + buf->off;
size_t oldoff = buf->off;
if (buf->totallen - used < datlen) {
if (evbuffer_expand(buf, datlen) == -1)
return (-1);
}
memcpy(buf->buffer + buf->off, data, datlen);
buf->off += datlen;
if (datlen ... | 207,201,496,878,315,000,000,000,000,000,000,000,000 | buffer.c | 95,787,474,149,316,780,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2014-6272 | Multiple integer overflows in the evbuffer API in Libevent 1.4.x before 1.4.15, 2.0.x before 2.0.22, and 2.1.x before 2.1.5-beta allow context-dependent attackers to cause a denial of service or possibly have other unspecified impact via "insanely large inputs" to the (1) evbuffer_add, (2) evbuffer_expand, or (3) buffe... | https://nvd.nist.gov/vuln/detail/CVE-2014-6272 |
202,749 | ntp | aa44b5835d69d8ee031736bb8ee2730a514edb7d | https://github.com/ntp-project/ntp | https://github.com/ntp-project/ntp/commit/aa44b5835d69d8ee031736bb8ee2730a514edb7d | [Bug 2941] NAK to the Future: Symmetric association authentication bypass via crypto-NAK | 1 | receive(
struct recvbuf *rbufp
)
{
register struct peer *peer; /* peer structure pointer */
register struct pkt *pkt; /* receive packet pointer */
u_char hisversion; /* packet version */
u_char hisleap; /* packet leap indicator */
u_char hismode; /* packet mode */
u_char hisstratum; /* packet stratum */
u_... | 207,583,480,244,479,900,000,000,000,000,000,000,000 | ntp_proto.c | 222,291,288,462,871,040,000,000,000,000,000,000,000 | [
"CWE-287"
] | CVE-2015-7871 | Crypto-NAK packets in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to bypass authentication. | https://nvd.nist.gov/vuln/detail/CVE-2015-7871 |
338,758 | ntp | aa44b5835d69d8ee031736bb8ee2730a514edb7d | https://github.com/ntp-project/ntp | https://github.com/ntp-project/ntp/commit/aa44b5835d69d8ee031736bb8ee2730a514edb7d | [Bug 2941] NAK to the Future: Symmetric association authentication bypass via crypto-NAK | 0 | receive(
struct recvbuf *rbufp
)
{
register struct peer *peer; /* peer structure pointer */
register struct pkt *pkt; /* receive packet pointer */
u_char hisversion; /* packet version */
u_char hisleap; /* packet leap indicator */
u_char hismode; /* packet mode */
u_char hisstratum; /* packet stratum */
u_... | 106,546,781,098,312,270,000,000,000,000,000,000,000 | ntp_proto.c | 221,627,888,879,819,700,000,000,000,000,000,000,000 | [
"CWE-287"
] | CVE-2015-7871 | Crypto-NAK packets in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to bypass authentication. | https://nvd.nist.gov/vuln/detail/CVE-2015-7871 |
202,750 | php-src | f59b67ae50064560d7bfcdb0d6a8ab284179053c | https://github.com/php/php-src | http://git.php.net/?p=php-src.git;a=commitdiff;h=f59b67ae50064560d7bfcdb0d6a8ab284179053c | Fix bug #69441 (Buffer Overflow when parsing tar/zip/phar in phar_set_inode) | 1 | static inline void phar_set_inode(phar_entry_info *entry TSRMLS_DC) /* {{{ */
{
char tmp[MAXPATHLEN];
int tmp_len;
tmp_len = entry->filename_len + entry->phar->fname_len;
memcpy(tmp, entry->phar->fname, entry->phar->fname_len);
memcpy(tmp + entry->phar->fname_len, entry->filename, entry->filename_len);
entry->in... | 219,335,175,601,115,100,000,000,000,000,000,000,000 | phar_internal.h | 114,870,493,938,035,640,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2015-3329 | Multiple stack-based buffer overflows in the phar_set_inode function in phar_internal.h in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allow remote attackers to execute arbitrary code via a crafted length value in a (1) tar, (2) phar, or (3) ZIP archive. | https://nvd.nist.gov/vuln/detail/CVE-2015-3329 |
338,768 | php-src | f59b67ae50064560d7bfcdb0d6a8ab284179053c | https://github.com/php/php-src | http://git.php.net/?p=php-src.git;a=commitdiff;h=f59b67ae50064560d7bfcdb0d6a8ab284179053c | Fix bug #69441 (Buffer Overflow when parsing tar/zip/phar in phar_set_inode) | 0 | static inline void phar_set_inode(phar_entry_info *entry TSRMLS_DC) /* {{{ */
{
char tmp[MAXPATHLEN];
int tmp_len;
size_t len;
tmp_len = MIN(MAXPATHLEN, entry->filename_len + entry->phar->fname_len);
len = MIN(entry->phar->fname_len, tmp_len);
memcpy(tmp, entry->phar->fname, len);
len = MIN(tmp_len - len, entry... | 117,243,625,454,876,130,000,000,000,000,000,000,000 | phar_internal.h | 132,409,715,055,506,560,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2015-3329 | Multiple stack-based buffer overflows in the phar_set_inode function in phar_internal.h in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allow remote attackers to execute arbitrary code via a crafted length value in a (1) tar, (2) phar, or (3) ZIP archive. | https://nvd.nist.gov/vuln/detail/CVE-2015-3329 |
202,753 | ImageMagick | e9438e2a82d35b6657e908ff38ec0303f432b655 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/e9438e2a82d35b6657e908ff38ec0303f432b655 | 1 | MagickExport MagickBooleanType SetImageProfile(Image *image,const char *name,
const StringInfo *profile,ExceptionInfo *exception)
{
char
key[MaxTextExtent],
property[MaxTextExtent];
MagickBooleanType
status;
assert(image != (Image *) NULL);
assert(image->signature == MagickSignature);
if (imag... | 174,791,167,146,507,160,000,000,000,000,000,000,000 | profile.c | 152,454,561,839,162,220,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2016-5841 | Integer overflow in MagickCore/profile.c in ImageMagick before 7.0.2-1 allows remote attackers to cause a denial of service (segmentation fault) or possibly execute arbitrary code via vectors involving the offset variable. | https://nvd.nist.gov/vuln/detail/CVE-2016-5841 | |
338,813 | ImageMagick | e9438e2a82d35b6657e908ff38ec0303f432b655 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/e9438e2a82d35b6657e908ff38ec0303f432b655 | 0 | MagickExport MagickBooleanType SetImageProfile(Image *image,const char *name,
const StringInfo *profile,ExceptionInfo *exception)
{
char
key[MaxTextExtent],
property[MaxTextExtent];
MagickBooleanType
status;
assert(image != (Image *) NULL);
assert(image->signature == MagickSignature);
if (imag... | 15,343,324,730,894,308,000,000,000,000,000,000,000 | profile.c | 81,897,102,697,449,440,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2016-5841 | Integer overflow in MagickCore/profile.c in ImageMagick before 7.0.2-1 allows remote attackers to cause a denial of service (segmentation fault) or possibly execute arbitrary code via vectors involving the offset variable. | https://nvd.nist.gov/vuln/detail/CVE-2016-5841 | |
202,754 | php-src | 8d6e9588671136837533fe3785657c31c5b52767 | https://github.com/php/php-src | http://git.php.net/?p=php-src.git;a=commitdiff;h=8d6e9588671136837533fe3785657c31c5b52767 | Fixed bug #75571: Potential infinite loop in gdImageCreateFromGifCtx
Due to a signedness confusion in `GetCode_` a corrupt GIF file can
trigger an infinite loop. Furthermore we make sure that a GIF without
any palette entries is treated as invalid *after* open palette entries
have been removed. | 1 | GetCode_(gdIOCtx *fd, CODE_STATIC_DATA *scd, int code_size, int flag, int *ZeroDataBlockP)
{
int i, j, ret;
unsigned char count;
if (flag) {
scd->curbit = 0;
scd->lastbit = 0;
scd->last_byte = 0;
scd->done = FALSE;
return 0;
}
if ( (scd->curbit + code_size) >= scd->lastbit) {
if (scd->done)... | 138,763,629,742,682,900,000,000,000,000,000,000,000 | gd_gif_in.c | 241,141,288,263,991,960,000,000,000,000,000,000,000 | [
"CWE-681"
] | CVE-2018-5711 | gd_gif_in.c in the GD Graphics Library (aka libgd), as used in PHP before 5.6.33, 7.0.x before 7.0.27, 7.1.x before 7.1.13, and 7.2.x before 7.2.1, has an integer signedness error that leads to an infinite loop via a crafted GIF file, as demonstrated by a call to the imagecreatefromgif or imagecreatefromstring PHP func... | https://nvd.nist.gov/vuln/detail/CVE-2018-5711 |
338,820 | php-src | 8d6e9588671136837533fe3785657c31c5b52767 | https://github.com/php/php-src | http://git.php.net/?p=php-src.git;a=commitdiff;h=8d6e9588671136837533fe3785657c31c5b52767 | Fixed bug #75571: Potential infinite loop in gdImageCreateFromGifCtx
Due to a signedness confusion in `GetCode_` a corrupt GIF file can
trigger an infinite loop. Furthermore we make sure that a GIF without
any palette entries is treated as invalid *after* open palette entries
have been removed. | 0 | GetCode_(gdIOCtx *fd, CODE_STATIC_DATA *scd, int code_size, int flag, int *ZeroDataBlockP)
{
int i, j, ret;
int count;
if (flag) {
scd->curbit = 0;
scd->lastbit = 0;
scd->last_byte = 0;
scd->done = FALSE;
return 0;
}
if ( (scd->curbit + code_size) >= scd->lastbit) {
if (scd->done)... | 161,543,679,821,867,840,000,000,000,000,000,000,000 | gd_gif_in.c | 287,685,970,223,625,050,000,000,000,000,000,000,000 | [
"CWE-681"
] | CVE-2018-5711 | gd_gif_in.c in the GD Graphics Library (aka libgd), as used in PHP before 5.6.33, 7.0.x before 7.0.27, 7.1.x before 7.1.13, and 7.2.x before 7.2.1, has an integer signedness error that leads to an infinite loop via a crafted GIF file, as demonstrated by a call to the imagecreatefromgif or imagecreatefromstring PHP func... | https://nvd.nist.gov/vuln/detail/CVE-2018-5711 |
202,755 | php-src | 8d6e9588671136837533fe3785657c31c5b52767 | https://github.com/php/php-src | http://git.php.net/?p=php-src.git;a=commitdiff;h=8d6e9588671136837533fe3785657c31c5b52767 | Fixed bug #75571: Potential infinite loop in gdImageCreateFromGifCtx
Due to a signedness confusion in `GetCode_` a corrupt GIF file can
trigger an infinite loop. Furthermore we make sure that a GIF without
any palette entries is treated as invalid *after* open palette entries
have been removed. | 1 | gdImagePtr gdImageCreateFromGifCtx(gdIOCtxPtr fd) /* {{{ */
{
int BitPixel;
#if 0
int ColorResolution;
int Background;
int AspectRatio;
#endif
int Transparent = (-1);
unsigned char buf[16];
unsigned char c;
unsigned char ColorMap[3][MAXCOLORMAPSIZE];
unsigned char localColorMap[3][MAXCOLORMAPSIZE];
in... | 313,802,163,547,854,540,000,000,000,000,000,000,000 | gd_gif_in.c | 241,141,288,263,991,960,000,000,000,000,000,000,000 | [
"CWE-681"
] | CVE-2018-5711 | gd_gif_in.c in the GD Graphics Library (aka libgd), as used in PHP before 5.6.33, 7.0.x before 7.0.27, 7.1.x before 7.1.13, and 7.2.x before 7.2.1, has an integer signedness error that leads to an infinite loop via a crafted GIF file, as demonstrated by a call to the imagecreatefromgif or imagecreatefromstring PHP func... | https://nvd.nist.gov/vuln/detail/CVE-2018-5711 |
338,830 | php-src | 8d6e9588671136837533fe3785657c31c5b52767 | https://github.com/php/php-src | http://git.php.net/?p=php-src.git;a=commitdiff;h=8d6e9588671136837533fe3785657c31c5b52767 | Fixed bug #75571: Potential infinite loop in gdImageCreateFromGifCtx
Due to a signedness confusion in `GetCode_` a corrupt GIF file can
trigger an infinite loop. Furthermore we make sure that a GIF without
any palette entries is treated as invalid *after* open palette entries
have been removed. | 0 | gdImagePtr gdImageCreateFromGifCtx(gdIOCtxPtr fd) /* {{{ */
{
int BitPixel;
#if 0
int ColorResolution;
int Background;
int AspectRatio;
#endif
int Transparent = (-1);
unsigned char buf[16];
unsigned char c;
unsigned char ColorMap[3][MAXCOLORMAPSIZE];
unsigned char localColorMap[3][MAXCOLORMAPSIZE];
in... | 153,204,163,225,487,950,000,000,000,000,000,000,000 | gd_gif_in.c | 287,685,970,223,625,050,000,000,000,000,000,000,000 | [
"CWE-681"
] | CVE-2018-5711 | gd_gif_in.c in the GD Graphics Library (aka libgd), as used in PHP before 5.6.33, 7.0.x before 7.0.27, 7.1.x before 7.1.13, and 7.2.x before 7.2.1, has an integer signedness error that leads to an infinite loop via a crafted GIF file, as demonstrated by a call to the imagecreatefromgif or imagecreatefromstring PHP func... | https://nvd.nist.gov/vuln/detail/CVE-2018-5711 |
202,756 | samba | 42f0f57eb819ce6b68a8c5b3b53123b83ec917e3 | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commit;h=42f0f57eb819ce6b68a8c5b3b53123b83ec917e3 | CVE-2019-3824 ldb: wildcard_match end of data check
ldb_handler_copy and ldb_val_dup over allocate by one and add a trailing '\0'
to the data, to make them safe to use the C string functions on.
However testing for the trailing '\0' is not the correct way to test for
the end of a value, the length should be checked i... | 1 | static int ldb_wildcard_compare(struct ldb_context *ldb,
const struct ldb_parse_tree *tree,
const struct ldb_val value, bool *matched)
{
const struct ldb_schema_attribute *a;
struct ldb_val val;
struct ldb_val cnk;
struct ldb_val *chunk;
uint8_t *save_p = NULL;
unsigned int c = 0;
if (tree->operation !=... | 56,469,481,359,652,000,000,000,000,000,000,000,000 | ldb_match.c | 49,898,241,021,989,480,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-3824 | A flaw was found in the way an LDAP search expression could crash the shared LDAP server process of a samba AD DC in samba before version 4.10. An authenticated user, having read permissions on the LDAP server, could use this flaw to cause denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2019-3824 |
338,831 | samba | 42f0f57eb819ce6b68a8c5b3b53123b83ec917e3 | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commit;h=42f0f57eb819ce6b68a8c5b3b53123b83ec917e3 | CVE-2019-3824 ldb: wildcard_match end of data check
ldb_handler_copy and ldb_val_dup over allocate by one and add a trailing '\0'
to the data, to make them safe to use the C string functions on.
However testing for the trailing '\0' is not the correct way to test for
the end of a value, the length should be checked i... | 0 | static int ldb_wildcard_compare(struct ldb_context *ldb,
const struct ldb_parse_tree *tree,
const struct ldb_val value, bool *matched)
{
const struct ldb_schema_attribute *a;
struct ldb_val val;
struct ldb_val cnk;
struct ldb_val *chunk;
uint8_t *save_p = NULL;
unsigned int c = 0;
if (tree->operation !=... | 247,268,373,891,928,130,000,000,000,000,000,000,000 | ldb_match.c | 16,539,850,727,413,788,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-3824 | A flaw was found in the way an LDAP search expression could crash the shared LDAP server process of a samba AD DC in samba before version 4.10. An authenticated user, having read permissions on the LDAP server, could use this flaw to cause denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2019-3824 |
202,802 | libyang | 4e610ccd87a2ba9413819777d508f71163fcc237 | https://github.com/CESNET/libyang | https://github.com/CESNET/libyang/commit/4e610ccd87a2ba9413819777d508f71163fcc237 | resovle BUGFIX handle cyclic typedefs with unions
Fixes #724 | 1 | resolve_superior_type(const char *name, const char *mod_name, const struct lys_module *module,
const struct lys_node *parent, struct lys_tpdf **ret)
{
int i, j;
struct lys_tpdf *tpdf, *match;
int tpdf_size;
if (!mod_name) {
/* no prefix, try built-in types */
for (... | 62,652,768,450,615,000,000,000,000,000,000,000,000 | resolve.c | 313,540,992,145,494,900,000,000,000,000,000,000,000 | [
"CWE-674"
] | CVE-2019-20395 | A stack consumption issue is present in libyang before v1.0-r1 due to the self-referential union type containing leafrefs. Applications that use libyang to parse untrusted input yang files may crash. | https://nvd.nist.gov/vuln/detail/CVE-2019-20395 |
340,010 | libyang | 4e610ccd87a2ba9413819777d508f71163fcc237 | https://github.com/CESNET/libyang | https://github.com/CESNET/libyang/commit/4e610ccd87a2ba9413819777d508f71163fcc237 | resovle BUGFIX handle cyclic typedefs with unions
Fixes #724 | 0 | resolve_superior_type(const char *name, const char *mod_name, const struct lys_module *module,
const struct lys_node *parent, struct lys_tpdf **ret)
{
int i, j;
struct lys_tpdf *tpdf, *match;
int tpdf_size;
if (!mod_name) {
/* no prefix, try built-in types */
for (... | 292,323,429,525,372,080,000,000,000,000,000,000,000 | resolve.c | 182,290,416,952,737,500,000,000,000,000,000,000,000 | [
"CWE-674"
] | CVE-2019-20395 | A stack consumption issue is present in libyang before v1.0-r1 due to the self-referential union type containing leafrefs. Applications that use libyang to parse untrusted input yang files may crash. | https://nvd.nist.gov/vuln/detail/CVE-2019-20395 |
202,807 | exiv2 | ccde30afa8ca787a3fe17388a15977f107a53b72 | https://github.com/Exiv2/exiv2 | https://github.com/Exiv2/exiv2/commit/ccde30afa8ca787a3fe17388a15977f107a53b72 | Avoid null pointer exception due to NULL return value from strchr.
This fixes #793.
(cherry picked from commit ae20c30805b330275b2aa0303a42e1f2bbd53661) | 1 | int Exiv2::http(Exiv2::Dictionary& request, Exiv2::Dictionary& response, std::string& errors)
{
if (!request.count("verb"))
request["verb"] = "GET";
if (!request.count("header"))
request["header"] = "";
if (!request.count("version"))
request["version"] = "1.0";
if (!request.count... | 135,866,303,970,236,680,000,000,000,000,000,000,000 | http.cpp | 94,030,703,909,831,260,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2019-13114 | http.c in Exiv2 through 0.27.1 allows a malicious http server to cause a denial of service (crash due to a NULL pointer dereference) by returning a crafted response that lacks a space character. | https://nvd.nist.gov/vuln/detail/CVE-2019-13114 |
340,164 | exiv2 | ccde30afa8ca787a3fe17388a15977f107a53b72 | https://github.com/Exiv2/exiv2 | https://github.com/Exiv2/exiv2/commit/ccde30afa8ca787a3fe17388a15977f107a53b72 | Avoid null pointer exception due to NULL return value from strchr.
This fixes #793.
(cherry picked from commit ae20c30805b330275b2aa0303a42e1f2bbd53661) | 0 | int Exiv2::http(Exiv2::Dictionary& request, Exiv2::Dictionary& response, std::string& errors)
{
if (!request.count("verb"))
request["verb"] = "GET";
if (!request.count("header"))
request["header"] = "";
if (!request.count("version"))
request["version"] = "1.0";
if (!request.count... | 109,959,079,745,263,880,000,000,000,000,000,000,000 | http.cpp | 152,943,462,568,779,240,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2019-13114 | http.c in Exiv2 through 0.27.1 allows a malicious http server to cause a denial of service (crash due to a NULL pointer dereference) by returning a crafted response that lacks a space character. | https://nvd.nist.gov/vuln/detail/CVE-2019-13114 |
202,809 | Little-CMS | d41071eb8cfea7aa10a9262c12bd95d5d9d81c8f | https://github.com/mm2/Little-CMS | https://github.com/mm2/Little-CMS/commit/d41071eb8cfea7aa10a9262c12bd95d5d9d81c8f | Contributed fixes from Oracle
Two minor glitches | 1 | void *Type_MLU_Read(struct _cms_typehandler_struct* self, cmsIOHANDLER* io, cmsUInt32Number* nItems, cmsUInt32Number SizeOfTag)
{
cmsMLU* mlu;
cmsUInt32Number Count, RecLen, NumOfWchar;
cmsUInt32Number SizeOfHeader;
cmsUInt32Number Len, Offset;
cmsUInt32Number i;
wchar_t* Block;
cm... | 67,941,377,606,327,030,000,000,000,000,000,000,000 | cmstypes.c | 27,306,885,815,607,413,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2016-10165 | The Type_MLU_Read function in cmstypes.c in Little CMS (aka lcms2) allows remote attackers to obtain sensitive information or cause a denial of service via an image with a crafted ICC profile, which triggers an out-of-bounds heap read. | https://nvd.nist.gov/vuln/detail/CVE-2016-10165 |
340,285 | Little-CMS | d41071eb8cfea7aa10a9262c12bd95d5d9d81c8f | https://github.com/mm2/Little-CMS | https://github.com/mm2/Little-CMS/commit/d41071eb8cfea7aa10a9262c12bd95d5d9d81c8f | Contributed fixes from Oracle
Two minor glitches | 0 | void *Type_MLU_Read(struct _cms_typehandler_struct* self, cmsIOHANDLER* io, cmsUInt32Number* nItems, cmsUInt32Number SizeOfTag)
{
cmsMLU* mlu;
cmsUInt32Number Count, RecLen, NumOfWchar;
cmsUInt32Number SizeOfHeader;
cmsUInt32Number Len, Offset;
cmsUInt32Number i;
wchar_t* Block;
cm... | 177,716,566,585,391,640,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2016-10165 | The Type_MLU_Read function in cmstypes.c in Little CMS (aka lcms2) allows remote attackers to obtain sensitive information or cause a denial of service via an image with a crafted ICC profile, which triggers an out-of-bounds heap read. | https://nvd.nist.gov/vuln/detail/CVE-2016-10165 |
202,820 | gdal | 27b9bf644bcf1208f7d6594bdd104cc8a8bb0646 | https://github.com/OSGeo/gdal | https://github.com/OSGeo/gdal/commit/27b9bf644bcf1208f7d6594bdd104cc8a8bb0646 | KML: set OAMS_TRADITIONAL_GIS_ORDER for SRS returned on returned layers | 1 | OGRKMLLayer::OGRKMLLayer( const char * pszName,
OGRSpatialReference *poSRSIn, bool bWriterIn,
OGRwkbGeometryType eReqType,
OGRKMLDataSource *poDSIn ) :
poDS_(poDSIn),
poSRS_(poSRSIn ? new OGRSpatialReference(nullptr) : nullptr),
p... | 177,036,789,674,555,420,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2019-25050 | netCDF in GDAL 2.4.2 through 3.0.4 has a stack-based buffer overflow in nc4_get_att (called from nc4_get_att_tc and nc_get_att_text) and in uffd_cleanup (called from netCDFDataset::~netCDFDataset and netCDFDataset::~netCDFDataset). | https://nvd.nist.gov/vuln/detail/CVE-2019-25050 |
341,806 | gdal | 27b9bf644bcf1208f7d6594bdd104cc8a8bb0646 | https://github.com/OSGeo/gdal | https://github.com/OSGeo/gdal/commit/27b9bf644bcf1208f7d6594bdd104cc8a8bb0646 | KML: set OAMS_TRADITIONAL_GIS_ORDER for SRS returned on returned layers | 0 | OGRKMLLayer::OGRKMLLayer( const char * pszName,
OGRSpatialReference *poSRSIn, bool bWriterIn,
OGRwkbGeometryType eReqType,
OGRKMLDataSource *poDSIn ) :
poDS_(poDSIn),
poSRS_(poSRSIn ? new OGRSpatialReference(nullptr) : nullptr),
p... | 156,707,627,039,653,970,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2019-25050 | netCDF in GDAL 2.4.2 through 3.0.4 has a stack-based buffer overflow in nc4_get_att (called from nc4_get_att_tc and nc_get_att_text) and in uffd_cleanup (called from netCDFDataset::~netCDFDataset and netCDFDataset::~netCDFDataset). | https://nvd.nist.gov/vuln/detail/CVE-2019-25050 |
202,821 | LibRaw | fbf60377c006eaea8d3eca3f5e4c654909dcdfd2 | https://github.com/LibRaw/LibRaw | https://github.com/LibRaw/LibRaw/commit/fbf60377c006eaea8d3eca3f5e4c654909dcdfd2 | possible buffer overrun in Fuji makernotes parser | 1 | void CLASS parse_makernote(int base, int uptag)
{
unsigned offset = 0, entries, tag, type, len, save, c;
unsigned ver97 = 0, serial = 0, i, wbi = 0, wb[4] = {0, 0, 0, 0};
uchar buf97[324], ci, cj, ck;
short morder, sorder = order;
char buf[10];
unsigned SamsungKey[11];
uchar NikonKey;
#ifdef LIBRAW_LIBRA... | 245,099,950,230,763,780,000,000,000,000,000,000,000 | dcraw.c | 229,640,459,242,852,870,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2018-20337 | There is a stack-based buffer overflow in the parse_makernote function of dcraw_common.cpp in LibRaw 0.19.1. Crafted input will lead to a denial of service or possibly unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2018-20337 |
341,815 | LibRaw | fbf60377c006eaea8d3eca3f5e4c654909dcdfd2 | https://github.com/LibRaw/LibRaw | https://github.com/LibRaw/LibRaw/commit/fbf60377c006eaea8d3eca3f5e4c654909dcdfd2 | possible buffer overrun in Fuji makernotes parser | 0 | void CLASS parse_makernote(int base, int uptag)
{
unsigned offset = 0, entries, tag, type, len, save, c;
unsigned ver97 = 0, serial = 0, i, wbi = 0, wb[4] = {0, 0, 0, 0};
uchar buf97[324], ci, cj, ck;
short morder, sorder = order;
char buf[10];
unsigned SamsungKey[11];
uchar NikonKey;
#ifdef LIBRAW_LIBRA... | 13,687,180,071,373,584,000,000,000,000,000,000,000 | dcraw.c | 222,400,528,597,494,960,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2018-20337 | There is a stack-based buffer overflow in the parse_makernote function of dcraw_common.cpp in LibRaw 0.19.1. Crafted input will lead to a denial of service or possibly unspecified other impact. | https://nvd.nist.gov/vuln/detail/CVE-2018-20337 |
202,859 | unzip | 41beb477c5744bc396fa1162ee0c14218ec12213 | https://github.com/madler/unzip | https://github.com/madler/unzip/commit/41beb477c5744bc396fa1162ee0c14218ec12213 | Fix bug in undefer_input() that misplaced the input state. | 1 | void undefer_input(__G)
__GDEF
{
if (G.incnt > 0)
G.csize += G.incnt;
if (G.incnt_leftover > 0) {
/* We know that "(G.csize < MAXINT)" so we can cast G.csize to int:
* This condition was checked when G.incnt_leftover was set > 0 in
* defer_leftover_input(), and it is NOT al... | 201,548,250,008,552,570,000,000,000,000,000,000,000 | fileio.c | 104,350,303,231,404,350,000,000,000,000,000,000,000 | [
"CWE-400"
] | CVE-2019-13232 | Info-ZIP UnZip 6.0 mishandles the overlapping of files inside a ZIP container, leading to denial of service (resource consumption), aka a "better zip bomb" issue. | https://nvd.nist.gov/vuln/detail/CVE-2019-13232 |
342,220 | unzip | 41beb477c5744bc396fa1162ee0c14218ec12213 | https://github.com/madler/unzip | https://github.com/madler/unzip/commit/41beb477c5744bc396fa1162ee0c14218ec12213 | Fix bug in undefer_input() that misplaced the input state. | 0 | void undefer_input(__G)
__GDEF
{
if (G.incnt > 0)
G.csize += G.incnt;
if (G.incnt_leftover > 0) {
/* We know that "(G.csize < MAXINT)" so we can cast G.csize to int:
* This condition was checked when G.incnt_leftover was set > 0 in
* defer_leftover_input(), and it is NOT al... | 19,245,495,331,780,902,000,000,000,000,000,000,000 | fileio.c | 68,302,145,772,017,100,000,000,000,000,000,000,000 | [
"CWE-400"
] | CVE-2019-13232 | Info-ZIP UnZip 6.0 mishandles the overlapping of files inside a ZIP container, leading to denial of service (resource consumption), aka a "better zip bomb" issue. | https://nvd.nist.gov/vuln/detail/CVE-2019-13232 |
202,872 | php-src | 16023f3e3b9c06cf677c3c980e8d574e4c162827 | https://github.com/php/php-src | https://git.php.net/?p=php-src.git;a=commit;h=16023f3e3b9c06cf677c3c980e8d574e4c162827 | Fix bug #70014 - use RAND_bytes instead of deprecated RAND_pseudo_bytes | 1 | PHP_FUNCTION(openssl_random_pseudo_bytes)
{
long buffer_length;
unsigned char *buffer = NULL;
zval *zstrong_result_returned = NULL;
int strong_result = 0;
if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "l|z", &buffer_length, &zstrong_result_returned) == FAILURE) {
return;
}
if (buffer_length <= 0) {
... | 228,946,703,246,556,400,000,000,000,000,000,000,000 | openssl.c | 163,815,054,224,334,570,000,000,000,000,000,000,000 | [
"CWE-310"
] | CVE-2015-8867 | The openssl_random_pseudo_bytes function in ext/openssl/openssl.c in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 incorrectly relies on the deprecated RAND_pseudo_bytes function, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2015-8867 |
342,657 | php-src | 16023f3e3b9c06cf677c3c980e8d574e4c162827 | https://github.com/php/php-src | https://git.php.net/?p=php-src.git;a=commit;h=16023f3e3b9c06cf677c3c980e8d574e4c162827 | Fix bug #70014 - use RAND_bytes instead of deprecated RAND_pseudo_bytes | 0 | PHP_FUNCTION(openssl_random_pseudo_bytes)
{
long buffer_length;
unsigned char *buffer = NULL;
zval *zstrong_result_returned = NULL;
if (zend_parse_parameters(ZEND_NUM_ARGS() TSRMLS_CC, "l|z", &buffer_length, &zstrong_result_returned) == FAILURE) {
return;
}
if (buffer_length <= 0) {
RETURN_FALSE;
}
if (z... | 83,921,683,825,600,060,000,000,000,000,000,000,000 | openssl.c | 102,206,558,694,905,060,000,000,000,000,000,000,000 | [
"CWE-310"
] | CVE-2015-8867 | The openssl_random_pseudo_bytes function in ext/openssl/openssl.c in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 incorrectly relies on the deprecated RAND_pseudo_bytes function, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2015-8867 |
202,883 | openldap | 21981053a1195ae1555e23df4d9ac68d34ede9dd | https://github.com/openldap/openldap | https://git.openldap.org/openldap/openldap/-/commit/21981053a1195ae1555e23df4d9ac68d34ede9dd | ITS#9408 fix vrfilter double-free | 1 | static int parseValuesReturnFilter (
Operation *op,
SlapReply *rs,
LDAPControl *ctrl )
{
BerElement *ber;
struct berval fstr = BER_BVNULL;
if ( op->o_valuesreturnfilter != SLAP_CONTROL_NONE ) {
rs->sr_text = "valuesReturnFilter control specified multiple times";
return LDAP_PROTOCOL_ERROR;
}
if ( BER_BVIS... | 184,920,899,360,584,040,000,000,000,000,000,000,000 | controls.c | 101,078,862,250,692,510,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2020-36223 | A flaw was discovered in OpenLDAP before 2.4.57 leading to a slapd crash in the Values Return Filter control handling, resulting in denial of service (double free and out-of-bounds read). | https://nvd.nist.gov/vuln/detail/CVE-2020-36223 |
342,671 | openldap | 21981053a1195ae1555e23df4d9ac68d34ede9dd | https://github.com/openldap/openldap | https://git.openldap.org/openldap/openldap/-/commit/21981053a1195ae1555e23df4d9ac68d34ede9dd | ITS#9408 fix vrfilter double-free | 0 | static int parseValuesReturnFilter (
Operation *op,
SlapReply *rs,
LDAPControl *ctrl )
{
BerElement *ber;
struct berval fstr = BER_BVNULL;
if ( op->o_valuesreturnfilter != SLAP_CONTROL_NONE ) {
rs->sr_text = "valuesReturnFilter control specified multiple times";
return LDAP_PROTOCOL_ERROR;
}
if ( BER_BVIS... | 64,228,264,464,227,220,000,000,000,000,000,000,000 | controls.c | 95,237,790,161,033,520,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2020-36223 | A flaw was discovered in OpenLDAP before 2.4.57 leading to a slapd crash in the Values Return Filter control handling, resulting in denial of service (double free and out-of-bounds read). | https://nvd.nist.gov/vuln/detail/CVE-2020-36223 |
202,887 | php-src | 57b997ebf99e0eb9a073e0dafd2ab100bd4a112d | https://github.com/php/php-src | http://git.php.net/?p=php-src.git;a=commit;h=57b997ebf99e0eb9a073e0dafd2ab100bd4a112d | Fix bug #71637: Multiple Heap Overflow due to integer overflows | 1 | PHP_XML_API zend_string *xml_utf8_encode(const char *s, size_t len, const XML_Char *encoding)
{
size_t pos = len;
zend_string *str;
unsigned int c;
unsigned short (*encoder)(unsigned char) = NULL;
xml_encoding *enc = xml_get_encoding(encoding);
if (enc) {
encoder = enc->encoding_function;
} else {
/* If the... | 289,950,792,986,275,400,000,000,000,000,000,000,000 | xml.c | 326,784,863,109,640,340,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2016-4344 | Integer overflow in the xml_utf8_encode function in ext/xml/xml.c in PHP before 7.0.4 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a long argument to the utf8_encode function, leading to a heap-based buffer overflow. | https://nvd.nist.gov/vuln/detail/CVE-2016-4344 |
343,062 | php-src | 57b997ebf99e0eb9a073e0dafd2ab100bd4a112d | https://github.com/php/php-src | http://git.php.net/?p=php-src.git;a=commit;h=57b997ebf99e0eb9a073e0dafd2ab100bd4a112d | Fix bug #71637: Multiple Heap Overflow due to integer overflows | 0 | PHP_XML_API zend_string *xml_utf8_encode(const char *s, size_t len, const XML_Char *encoding)
{
size_t pos = len;
zend_string *str;
unsigned int c;
unsigned short (*encoder)(unsigned char) = NULL;
xml_encoding *enc = xml_get_encoding(encoding);
if (enc) {
encoder = enc->encoding_function;
} else {
/* If the... | 294,439,925,128,511,730,000,000,000,000,000,000,000 | xml.c | 136,056,318,812,614,570,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2016-4344 | Integer overflow in the xml_utf8_encode function in ext/xml/xml.c in PHP before 7.0.4 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a long argument to the utf8_encode function, leading to a heap-based buffer overflow. | https://nvd.nist.gov/vuln/detail/CVE-2016-4344 |
202,891 | ImageMagick6 | 4745eb1047617330141e9abfd5ae01236a71ae12 | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/4745eb1047617330141e9abfd5ae01236a71ae12 | https://github.com/ImageMagick/ImageMagick/issues/1249 | 1 | static StringInfo *ParseImageResourceBlocks(Image *image,
const unsigned char *blocks,size_t length,
MagickBooleanType *has_merged_image)
{
const unsigned char
*p;
StringInfo
*profile;
unsigned char
name_length;
unsigned int
count;
unsigned short
id,
short_sans;
if (length <... | 172,661,296,687,898,700,000,000,000,000,000,000,000 | psd.c | 54,127,472,608,036,960,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-16412 | ImageMagick 7.0.8-11 Q16 has a heap-based buffer over-read in the coders/psd.c ParseImageResourceBlocks function. | https://nvd.nist.gov/vuln/detail/CVE-2018-16412 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.