idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
355,609 | php-src | 4e3f55c36272a5f29b50e1924b78e9db1b23f214 | https://github.com/php/php-src | http://git.php.net/?p=php-src.git;a=commit;h=4e3f55c36272a5f29b50e1924b78e9db1b23f214 | Fix bug #74782: remove file name from output to avoid XSS
(cherry picked from commit 73ca9b37731dd9690ffd9706333b17eaf90ea091) | 0 | static inline zend_string* phar_get_stub(const char *index_php, const char *web, const int name_len, const int web_len)
{
static const char newstub0[] = "<?php\n\n$web = '";
static const char newstub1_0[] = "';\n\nif (in_array('phar', stream_get_wrappers()) && class_exists('Phar', 0)) {\nPhar::interceptFileFuncs();\n... | 104,816,228,716,268,190,000,000,000,000,000,000,000 | stub.h | 323,806,704,335,969,200,000,000,000,000,000,000,000 | [
"CWE-79"
] | CVE-2018-5712 | An issue was discovered in PHP before 5.6.33, 7.0.x before 7.0.27, 7.1.x before 7.1.13, and 7.2.x before 7.2.1. There is Reflected XSS on the PHAR 404 error page via the URI of a request for a .phar file. | https://nvd.nist.gov/vuln/detail/CVE-2018-5712 |
204,242 | yubico-pam | 4712da70cac159d5ca9579c1e4fac0645b674043 | https://github.com/Yubico/yubico-pam | https://github.com/Yubico/yubico-pam/commit/4712da70cac159d5ca9579c1e4fac0645b674043 | Fix big security hole: Authentication succeeded when no password
was given, unless use_first_pass was being used.
This is fatal if pam_yubico is considered 'sufficient' in the PAM
configuration.
Signed-off-by: Nanakos Chrysostomos <nanakos@wired-net.gr> | 1 | pam_sm_authenticate (pam_handle_t * pamh,
int flags, int argc, const char **argv)
{
int retval, rc;
const char *user = NULL;
const char *password = NULL;
char otp[MAX_TOKEN_ID_LEN + TOKEN_OTP_LEN + 1] = { 0 };
char otp_id[MAX_TOKEN_ID_LEN + 1] = { 0 };
int password_len = 0;
int skip_bytes = 0;
in... | 138,529,777,757,121,140,000,000,000,000,000,000,000 | pam_yubico.c | 74,605,852,225,679,310,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-4120 | Yubico PAM Module before 2.10 performed user authentication when 'use_first_pass' PAM configuration option was not used and the module was configured as 'sufficient' in the PAM configuration. A remote attacker could use this flaw to circumvent common authentication process and obtain access to the account in question b... | https://nvd.nist.gov/vuln/detail/CVE-2011-4120 |
355,614 | yubico-pam | 4712da70cac159d5ca9579c1e4fac0645b674043 | https://github.com/Yubico/yubico-pam | https://github.com/Yubico/yubico-pam/commit/4712da70cac159d5ca9579c1e4fac0645b674043 | Fix big security hole: Authentication succeeded when no password
was given, unless use_first_pass was being used.
This is fatal if pam_yubico is considered 'sufficient' in the PAM
configuration.
Signed-off-by: Nanakos Chrysostomos <nanakos@wired-net.gr> | 0 | pam_sm_authenticate (pam_handle_t * pamh,
int flags, int argc, const char **argv)
{
int retval, rc;
const char *user = NULL;
const char *password = NULL;
char otp[MAX_TOKEN_ID_LEN + TOKEN_OTP_LEN + 1] = { 0 };
char otp_id[MAX_TOKEN_ID_LEN + 1] = { 0 };
int password_len = 0;
int skip_bytes = 0;
in... | 208,567,745,080,423,880,000,000,000,000,000,000,000 | pam_yubico.c | 19,322,281,424,988,952,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2011-4120 | Yubico PAM Module before 2.10 performed user authentication when 'use_first_pass' PAM configuration option was not used and the module was configured as 'sufficient' in the PAM configuration. A remote attacker could use this flaw to circumvent common authentication process and obtain access to the account in question b... | https://nvd.nist.gov/vuln/detail/CVE-2011-4120 |
204,244 | php-src | a5b5743d71fbd5ae944469a1ca443a1cdb30663a | https://github.com/php/php-src | https://github.com/php/php-src/commit/a5b5743d71fbd5ae944469a1ca443a1cdb30663a | full_special_chars filter from trunk - approved by johannes | 1 | PHP_MINIT_FUNCTION(filter)
{
ZEND_INIT_MODULE_GLOBALS(filter, php_filter_init_globals, NULL);
REGISTER_INI_ENTRIES();
REGISTER_LONG_CONSTANT("INPUT_POST", PARSE_POST, CONST_CS | CONST_PERSISTENT);
REGISTER_LONG_CONSTANT("INPUT_GET", PARSE_GET, CONST_CS | CONST_PERSISTENT);
REGISTER_LONG_CONSTANT("INPUT_COOKIE... | 332,502,161,493,279,800,000,000,000,000,000,000,000 | filter.c | 210,305,300,128,755,620,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2016-5095 | Integer overflow in the php_escape_html_entities_ex function in ext/standard/html.c in PHP before 5.5.36 and 5.6.x before 5.6.22 allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering a large output string from a FILTER_SANITIZE_FULL_SPECIAL_CHARS filter_var call. ... | https://nvd.nist.gov/vuln/detail/CVE-2016-5095 |
355,672 | php-src | a5b5743d71fbd5ae944469a1ca443a1cdb30663a | https://github.com/php/php-src | https://github.com/php/php-src/commit/a5b5743d71fbd5ae944469a1ca443a1cdb30663a | full_special_chars filter from trunk - approved by johannes | 0 | PHP_MINIT_FUNCTION(filter)
{
ZEND_INIT_MODULE_GLOBALS(filter, php_filter_init_globals, NULL);
REGISTER_INI_ENTRIES();
REGISTER_LONG_CONSTANT("INPUT_POST", PARSE_POST, CONST_CS | CONST_PERSISTENT);
REGISTER_LONG_CONSTANT("INPUT_GET", PARSE_GET, CONST_CS | CONST_PERSISTENT);
REGISTER_LONG_CONSTANT("INPUT_COOKIE... | 226,197,242,815,115,700,000,000,000,000,000,000,000 | filter.c | 196,276,222,118,802,440,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2016-5095 | Integer overflow in the php_escape_html_entities_ex function in ext/standard/html.c in PHP before 5.5.36 and 5.6.x before 5.6.22 allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering a large output string from a FILTER_SANITIZE_FULL_SPECIAL_CHARS filter_var call. ... | https://nvd.nist.gov/vuln/detail/CVE-2016-5095 |
204,282 | exim | 478effbfd9c3cc5a627fc671d4bf94d13670d65f | https://github.com/Exim/exim | https://git.exim.org/exim.git/commitdiff/478effbfd9c3cc5a627fc671d4bf94d13670d65f | Fix buffer overflow in string_vformat. Bug 2449 | 1 | string_vformat(gstring * g, BOOL extend, const char *format, va_list ap)
{
enum ltypes { L_NORMAL=1, L_SHORT=2, L_LONG=3, L_LONGLONG=4, L_LONGDOUBLE=5, L_SIZE=6 };
int width, precision, off, lim;
const char * fp = format; /* Deliberately not unsigned */
string_datestamp_offset = -1; /* Datestamp not inserted */
strin... | 23,015,707,062,253,570,000,000,000,000,000,000,000 | string.c | 78,398,434,850,568,140,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2019-16928 | Exim 4.92 through 4.92.2 allows remote code execution, a different vulnerability than CVE-2019-15846. There is a heap-based buffer overflow in string_vformat in string.c involving a long EHLO command. | https://nvd.nist.gov/vuln/detail/CVE-2019-16928 |
356,293 | exim | 478effbfd9c3cc5a627fc671d4bf94d13670d65f | https://github.com/Exim/exim | https://git.exim.org/exim.git/commitdiff/478effbfd9c3cc5a627fc671d4bf94d13670d65f | Fix buffer overflow in string_vformat. Bug 2449 | 0 | string_vformat(gstring * g, BOOL extend, const char *format, va_list ap)
{
enum ltypes { L_NORMAL=1, L_SHORT=2, L_LONG=3, L_LONGLONG=4, L_LONGDOUBLE=5, L_SIZE=6 };
int width, precision, off, lim;
const char * fp = format; /* Deliberately not unsigned */
string_datestamp_offset = -1; /* Datestamp not inserted */
strin... | 90,140,313,913,360,130,000,000,000,000,000,000,000 | string.c | 106,566,145,984,384,730,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2019-16928 | Exim 4.92 through 4.92.2 allows remote code execution, a different vulnerability than CVE-2019-15846. There is a heap-based buffer overflow in string_vformat in string.c involving a long EHLO command. | https://nvd.nist.gov/vuln/detail/CVE-2019-16928 |
204,286 | ImageMagick6 | 0812674565df667b1b3e4122ad259096de311c6c | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/0812674565df667b1b3e4122ad259096de311c6c | https://github.com/ImageMagick/ImageMagick/issues/1190 | 1 | static ssize_t parse8BIM(Image *ifile, Image *ofile)
{
char
brkused,
quoted,
*line,
*token,
*newstr,
*name;
int
state,
next;
unsigned char
dataset;
unsigned int
recnum;
int
inputlen = MaxTextExtent;
MagickOffsetType
savedpos,
currentpos;
ssize_t
... | 159,938,636,425,570,140,000,000,000,000,000,000,000 | meta.c | 44,549,602,892,344,090,000,000,000,000,000,000,000 | [
"CWE-772"
] | CVE-2018-14437 | ImageMagick 7.0.8-4 has a memory leak in parse8BIM in coders/meta.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-14437 |
356,324 | ImageMagick6 | 0812674565df667b1b3e4122ad259096de311c6c | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/0812674565df667b1b3e4122ad259096de311c6c | https://github.com/ImageMagick/ImageMagick/issues/1190 | 0 | static ssize_t parse8BIMW(Image *ifile, Image *ofile)
{
char
brkused,
quoted,
*line,
*token,
*newstr,
*name;
int
state,
next;
unsigned char
dataset;
unsigned int
recnum;
int
inputlen = MaxTextExtent;
ssize_t
savedolen = 0L,
outputlen = 0L;
MagickOf... | 50,459,191,930,161,260,000,000,000,000,000,000,000 | meta.c | 44,549,602,892,344,090,000,000,000,000,000,000,000 | [
"CWE-772"
] | CVE-2018-14437 | ImageMagick 7.0.8-4 has a memory leak in parse8BIM in coders/meta.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-14437 |
204,289 | radvd | 7de1b9abf87b747ee2611c0d2a94dfeee79878b4 | https://github.com/reubenhwk/radvd | https://github.com/reubenhwk/radvd/commit/7de1b9abf87b747ee2611c0d2a94dfeee79878b4 | process_ra() has numerous missed len checks. It leads to buffer
overreads. | 1 | process_ra(struct Interface *iface, unsigned char *msg, int len,
struct sockaddr_in6 *addr)
{
struct nd_router_advert *radvert;
char addr_str[INET6_ADDRSTRLEN];
uint8_t *opt_str;
print_addr(&addr->sin6_addr, addr_str);
radvert = (struct nd_router_advert *) msg;
if ((radvert->nd_ra_curhoplimit && iface->AdvCur... | 221,012,692,832,975,600,000,000,000,000,000,000,000 | process.c | 37,915,199,634,422,154,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3604 | The process_ra function in the router advertisement daemon (radvd) before 1.8.2 allows remote attackers to cause a denial of service (stack-based buffer over-read and crash) via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2011-3604 |
356,431 | radvd | 7de1b9abf87b747ee2611c0d2a94dfeee79878b4 | https://github.com/reubenhwk/radvd | https://github.com/reubenhwk/radvd/commit/7de1b9abf87b747ee2611c0d2a94dfeee79878b4 | process_ra() has numerous missed len checks. It leads to buffer
overreads. | 0 | process_ra(struct Interface *iface, unsigned char *msg, int len,
struct sockaddr_in6 *addr)
{
struct nd_router_advert *radvert;
char addr_str[INET6_ADDRSTRLEN];
uint8_t *opt_str;
print_addr(&addr->sin6_addr, addr_str);
radvert = (struct nd_router_advert *) msg;
if ((radvert->nd_ra_curhoplimit && iface->AdvCur... | 188,497,618,965,088,480,000,000,000,000,000,000,000 | process.c | 254,179,838,743,628,070,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2011-3604 | The process_ra function in the router advertisement daemon (radvd) before 1.8.2 allows remote attackers to cause a denial of service (stack-based buffer over-read and crash) via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2011-3604 |
204,290 | hivex | 4bbdf555f88baeae0fa804a369a81a83908bd705 | https://github.com/libguestfs/hivex | https://github.com/libguestfs/hivex/commit/4bbdf555f88baeae0fa804a369a81a83908bd705 | handle: Check that pages do not extend beyond the end of the file.
Thanks: Mahmoud Al-Qudsi | 1 | hivex_open (const char *filename, int flags)
{
hive_h *h = NULL;
assert (sizeof (struct ntreg_header) == 0x1000);
assert (offsetof (struct ntreg_header, csum) == 0x1fc);
h = calloc (1, sizeof *h);
if (h == NULL)
goto error;
h->msglvl = flags & HIVEX_OPEN_MSGLVL_MASK;
const char *debug = getenv ("H... | 252,459,450,726,671,750,000,000,000,000,000,000,000 | handle.c | 187,703,003,512,499,230,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2014-9273 | lib/handle.c in Hivex before 1.3.11 allows local users to execute arbitrary code and gain privileges via a small hive files, which triggers an out-of-bounds read or write. | https://nvd.nist.gov/vuln/detail/CVE-2014-9273 |
356,435 | hivex | 4bbdf555f88baeae0fa804a369a81a83908bd705 | https://github.com/libguestfs/hivex | https://github.com/libguestfs/hivex/commit/4bbdf555f88baeae0fa804a369a81a83908bd705 | handle: Check that pages do not extend beyond the end of the file.
Thanks: Mahmoud Al-Qudsi | 0 | hivex_open (const char *filename, int flags)
{
hive_h *h = NULL;
assert (sizeof (struct ntreg_header) == 0x1000);
assert (offsetof (struct ntreg_header, csum) == 0x1fc);
h = calloc (1, sizeof *h);
if (h == NULL)
goto error;
h->msglvl = flags & HIVEX_OPEN_MSGLVL_MASK;
const char *debug = getenv ("H... | 145,530,614,496,879,400,000,000,000,000,000,000,000 | handle.c | 25,812,685,556,390,015,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2014-9273 | lib/handle.c in Hivex before 1.3.11 allows local users to execute arbitrary code and gain privileges via a small hive files, which triggers an out-of-bounds read or write. | https://nvd.nist.gov/vuln/detail/CVE-2014-9273 |
204,321 | openldap | 4bdfffd2889c0c5cdf58bebafbdc8fce4bb2bff0 | https://github.com/openldap/openldap | https://git.openldap.org/openldap/openldap/-/commit/4bdfffd2889c0c5cdf58bebafbdc8fce4bb2bff0 | ITS#9425 add more checks to ldap_X509dn2bv | 1 | ldap_X509dn2bv( void *x509_name, struct berval *bv, LDAPDN_rewrite_func *func,
unsigned flags )
{
LDAPDN newDN;
LDAPRDN newRDN;
LDAPAVA *newAVA, *baseAVA;
BerElementBuffer berbuf;
BerElement *ber = (BerElement *)&berbuf;
char oids[8192], *oidptr = oids, *oidbuf = NULL;
void *ptrs[2048];
char *dn_end, *rdn_end;... | 322,791,425,432,409,500,000,000,000,000,000,000,000 | tls2.c | 287,745,545,526,193,000,000,000,000,000,000,000,000 | [
"CWE-843"
] | CVE-2020-36229 | A flaw was discovered in ldap_X509dn2bv in OpenLDAP before 2.4.57 leading to a slapd crash in the X.509 DN parsing in ad_keystring, resulting in denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2020-36229 |
356,675 | openldap | 4bdfffd2889c0c5cdf58bebafbdc8fce4bb2bff0 | https://github.com/openldap/openldap | https://git.openldap.org/openldap/openldap/-/commit/4bdfffd2889c0c5cdf58bebafbdc8fce4bb2bff0 | ITS#9425 add more checks to ldap_X509dn2bv | 0 | ldap_X509dn2bv( void *x509_name, struct berval *bv, LDAPDN_rewrite_func *func,
unsigned flags )
{
LDAPDN newDN;
LDAPRDN newRDN;
LDAPAVA *newAVA, *baseAVA;
BerElementBuffer berbuf;
BerElement *ber = (BerElement *)&berbuf;
char oids[8192], *oidptr = oids, *oidbuf = NULL;
void *ptrs[2048];
char *dn_end, *rdn_end;... | 1,494,522,477,159,440,000,000,000,000,000,000,000 | tls2.c | 253,910,384,234,463,820,000,000,000,000,000,000,000 | [
"CWE-843"
] | CVE-2020-36229 | A flaw was discovered in ldap_X509dn2bv in OpenLDAP before 2.4.57 leading to a slapd crash in the X.509 DN parsing in ad_keystring, resulting in denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2020-36229 |
204,325 | libtorrent | ec30a5e9ec703afb8abefba757c6d401303b53db | https://github.com/arvidn/libtorrent | https://github.com/arvidn/libtorrent/commit/ec30a5e9ec703afb8abefba757c6d401303b53db | fix out-of-bounds read in bdecode
Fixes #2099 | 1 | int bdecode(char const* start, char const* end, bdecode_node& ret
, error_code& ec, int* error_pos, int depth_limit, int token_limit)
{
ec.clear();
ret.clear();
if (end - start > bdecode_token::max_offset)
{
if (error_pos) *error_pos = 0;
ec = bdecode_errors::limit_exceeded;
return -1;
}
// t... | 77,468,811,832,898,460,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2017-9847 | The bdecode function in bdecode.cpp in libtorrent 1.1.3 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2017-9847 |
356,810 | libtorrent | ec30a5e9ec703afb8abefba757c6d401303b53db | https://github.com/arvidn/libtorrent | https://github.com/arvidn/libtorrent/commit/ec30a5e9ec703afb8abefba757c6d401303b53db | fix out-of-bounds read in bdecode
Fixes #2099 | 0 | int bdecode(char const* start, char const* end, bdecode_node& ret
, error_code& ec, int* error_pos, int depth_limit, int token_limit)
{
ec.clear();
ret.clear();
if (end - start > bdecode_token::max_offset)
{
if (error_pos) *error_pos = 0;
ec = bdecode_errors::limit_exceeded;
return -1;
}
// t... | 199,145,120,198,337,260,000,000,000,000,000,000,000 | None | null | [
"CWE-125"
] | CVE-2017-9847 | The bdecode function in bdecode.cpp in libtorrent 1.1.3 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2017-9847 |
204,346 | openexr | 25e9515b06a6bc293d871622b8cafaee7af84e0f | https://github.com/AcademySoftwareFoundation/openexr | https://github.com/AcademySoftwareFoundation/openexr/commit/25e9515b06a6bc293d871622b8cafaee7af84e0f | add sanity check for reading multipart files with no parts (#840)
Signed-off-by: Peter Hillman <peterh@wetafx.co.nz> | 1 | MultiPartInputFile::initialize()
{
readMagicNumberAndVersionField(*_data->is, _data->version);
bool multipart = isMultiPart(_data->version);
bool tiled = isTiled(_data->version);
//
// Multipart files don't have and shouldn't have the tiled bit set.
//
if (tiled && multipart)
... | 339,968,148,619,641,500,000,000,000,000,000,000,000 | ImfMultiPartInputFile.cpp | 337,585,018,066,003,300,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2021-20299 | A flaw was found in OpenEXR's Multipart input file functionality. A crafted multi-part input file with no actual parts can trigger a NULL pointer dereference. The highest threat from this vulnerability is to system availability. | https://nvd.nist.gov/vuln/detail/CVE-2021-20299 |
357,447 | openexr | 25e9515b06a6bc293d871622b8cafaee7af84e0f | https://github.com/AcademySoftwareFoundation/openexr | https://github.com/AcademySoftwareFoundation/openexr/commit/25e9515b06a6bc293d871622b8cafaee7af84e0f | add sanity check for reading multipart files with no parts (#840)
Signed-off-by: Peter Hillman <peterh@wetafx.co.nz> | 0 | MultiPartInputFile::initialize()
{
readMagicNumberAndVersionField(*_data->is, _data->version);
bool multipart = isMultiPart(_data->version);
bool tiled = isTiled(_data->version);
//
// Multipart files don't have and shouldn't have the tiled bit set.
//
if (tiled && multipart)
... | 277,975,875,434,758,650,000,000,000,000,000,000,000 | ImfMultiPartInputFile.cpp | 257,205,156,270,798,580,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2021-20299 | A flaw was found in OpenEXR's Multipart input file functionality. A crafted multi-part input file with no actual parts can trigger a NULL pointer dereference. The highest threat from this vulnerability is to system availability. | https://nvd.nist.gov/vuln/detail/CVE-2021-20299 |
204,348 | linux | d0c7feaf87678371c2c09b3709400be416b2dc62 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d0c7feaf87678371c2c09b3709400be416b2dc62 | xfs: add agf freeblocks verify in xfs_agf_verify
We recently used fuzz(hydra) to test XFS and automatically generate
tmp.img(XFS v5 format, but some metadata is wrong)
xfs_repair information(just one AG):
agf_freeblks 0, counted 3224 in ag 0
agf_longest 536874136, counted 3224 in ag 0
sb_fdblocks 613, counted 3228
T... | 1 | xfs_agf_verify(
struct xfs_buf *bp)
{
struct xfs_mount *mp = bp->b_mount;
struct xfs_agf *agf = XFS_BUF_TO_AGF(bp);
if (xfs_sb_version_hascrc(&mp->m_sb)) {
if (!uuid_equal(&agf->agf_uuid, &mp->m_sb.sb_meta_uuid))
return __this_address;
if (!xfs_log_check_lsn(mp,
be64_to_cpu(XFS_BUF_TO_AGF(bp)->agf_lsn... | 201,217,101,712,968,100,000,000,000,000,000,000,000 | xfs_alloc.c | 262,236,000,442,739,940,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2020-12655 | An issue was discovered in xfs_agf_verify in fs/xfs/libxfs/xfs_alloc.c in the Linux kernel through 5.6.10. Attackers may trigger a sync of excessive duration via an XFS v5 image with crafted metadata, aka CID-d0c7feaf8767. | https://nvd.nist.gov/vuln/detail/CVE-2020-12655 |
357,487 | linux | d0c7feaf87678371c2c09b3709400be416b2dc62 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/d0c7feaf87678371c2c09b3709400be416b2dc62 | xfs: add agf freeblocks verify in xfs_agf_verify
We recently used fuzz(hydra) to test XFS and automatically generate
tmp.img(XFS v5 format, but some metadata is wrong)
xfs_repair information(just one AG):
agf_freeblks 0, counted 3224 in ag 0
agf_longest 536874136, counted 3224 in ag 0
sb_fdblocks 613, counted 3228
T... | 0 | xfs_agf_verify(
struct xfs_buf *bp)
{
struct xfs_mount *mp = bp->b_mount;
struct xfs_agf *agf = XFS_BUF_TO_AGF(bp);
if (xfs_sb_version_hascrc(&mp->m_sb)) {
if (!uuid_equal(&agf->agf_uuid, &mp->m_sb.sb_meta_uuid))
return __this_address;
if (!xfs_log_check_lsn(mp,
be64_to_cpu(XFS_BUF_TO_AGF(bp)->agf_lsn... | 323,921,650,583,093,600,000,000,000,000,000,000,000 | xfs_alloc.c | 292,975,431,327,850,580,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2020-12655 | An issue was discovered in xfs_agf_verify in fs/xfs/libxfs/xfs_alloc.c in the Linux kernel through 5.6.10. Attackers may trigger a sync of excessive duration via an XFS v5 image with crafted metadata, aka CID-d0c7feaf8767. | https://nvd.nist.gov/vuln/detail/CVE-2020-12655 |
204,350 | linux | e97f852fd4561e77721bb9a4e0ea9d98305b1e93 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e97f852fd4561e77721bb9a4e0ea9d98305b1e93 | KVM: X86: Fix scan ioapic use-before-initialization
Reported by syzkaller:
BUG: unable to handle kernel NULL pointer dereference at 00000000000001c8
PGD 80000003ec4da067 P4D 80000003ec4da067 PUD 3f7bfa067 PMD 0
Oops: 0000 [#1] PREEMPT SMP PTI
CPU: 7 PID: 5059 Comm: debug Tainted: G OE 4.19.0-rc5 #16... | 1 | static void vcpu_scan_ioapic(struct kvm_vcpu *vcpu)
{
if (!kvm_apic_hw_enabled(vcpu->arch.apic))
return;
bitmap_zero(vcpu->arch.ioapic_handled_vectors, 256);
if (irqchip_split(vcpu->kvm))
kvm_scan_ioapic_routes(vcpu, vcpu->arch.ioapic_handled_vectors);
else {
if (vcpu->arch.apicv_active)
kvm_x86_ops->syn... | 123,097,991,003,328,840,000,000,000,000,000,000,000 | x86.c | 96,150,063,534,154,640,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2018-19407 | The vcpu_scan_ioapic function in arch/x86/kvm/x86.c in the Linux kernel through 4.19.2 allows local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where ioapic is uninitialized. | https://nvd.nist.gov/vuln/detail/CVE-2018-19407 |
357,634 | linux | e97f852fd4561e77721bb9a4e0ea9d98305b1e93 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e97f852fd4561e77721bb9a4e0ea9d98305b1e93 | KVM: X86: Fix scan ioapic use-before-initialization
Reported by syzkaller:
BUG: unable to handle kernel NULL pointer dereference at 00000000000001c8
PGD 80000003ec4da067 P4D 80000003ec4da067 PUD 3f7bfa067 PMD 0
Oops: 0000 [#1] PREEMPT SMP PTI
CPU: 7 PID: 5059 Comm: debug Tainted: G OE 4.19.0-rc5 #16... | 0 | static void vcpu_scan_ioapic(struct kvm_vcpu *vcpu)
{
if (!kvm_apic_hw_enabled(vcpu->arch.apic))
return;
bitmap_zero(vcpu->arch.ioapic_handled_vectors, 256);
if (irqchip_split(vcpu->kvm))
kvm_scan_ioapic_routes(vcpu, vcpu->arch.ioapic_handled_vectors);
else {
if (vcpu->arch.apicv_active)
kvm_x86_ops->syn... | 220,230,142,233,764,220,000,000,000,000,000,000,000 | x86.c | 25,942,829,220,065,712,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2018-19407 | The vcpu_scan_ioapic function in arch/x86/kvm/x86.c in the Linux kernel through 4.19.2 allows local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where ioapic is uninitialized. | https://nvd.nist.gov/vuln/detail/CVE-2018-19407 |
204,352 | qemu | b3af7fdf9cc537f8f0dd3e2423d83f5c99a457e8 | https://github.com/bonzini/qemu | https://gitlab.com/qemu-project/qemu/-/commit/b3af7fdf9cc537f8f0dd3e2423d83f5c99a457e8 | hw/scsi/scsi-disk: MODE_PAGE_ALLS not allowed in MODE SELECT commands
This avoids an off-by-one read of 'mode_sense_valid' buffer in
hw/scsi/scsi-disk.c:mode_sense_page().
Fixes: CVE-2021-3930
Cc: qemu-stable@nongnu.org
Reported-by: Alexander Bulekov <alxndr@bu.edu>
Fixes: a8f4bbe2900 ("scsi-disk: store valid mode pa... | 1 | static int mode_sense_page(SCSIDiskState *s, int page, uint8_t **p_outbuf,
int page_control)
{
static const int mode_sense_valid[0x3f] = {
[MODE_PAGE_HD_GEOMETRY] = (1 << TYPE_DISK),
[MODE_PAGE_FLEXIBLE_DISK_GEOMETRY] = (1 << TYPE_DISK),
[MODE_PAGE_CACHI... | 11,101,533,896,837,744,000,000,000,000,000,000,000 | scsi-disk.c | 47,481,960,435,699,690,000,000,000,000,000,000,000 | [
"CWE-193"
] | CVE-2021-3930 | An off-by-one error was found in the SCSI device emulation in QEMU. It could occur while processing MODE SELECT commands in mode_sense_page() if the 'page' argument was set to MODE_PAGE_ALLS (0x3f). A malicious guest could use this flaw to potentially crash QEMU, resulting in a denial of service condition. | https://nvd.nist.gov/vuln/detail/CVE-2021-3930 |
357,684 | qemu | b3af7fdf9cc537f8f0dd3e2423d83f5c99a457e8 | https://github.com/bonzini/qemu | https://gitlab.com/qemu-project/qemu/-/commit/b3af7fdf9cc537f8f0dd3e2423d83f5c99a457e8 | hw/scsi/scsi-disk: MODE_PAGE_ALLS not allowed in MODE SELECT commands
This avoids an off-by-one read of 'mode_sense_valid' buffer in
hw/scsi/scsi-disk.c:mode_sense_page().
Fixes: CVE-2021-3930
Cc: qemu-stable@nongnu.org
Reported-by: Alexander Bulekov <alxndr@bu.edu>
Fixes: a8f4bbe2900 ("scsi-disk: store valid mode pa... | 0 | static int mode_sense_page(SCSIDiskState *s, int page, uint8_t **p_outbuf,
int page_control)
{
static const int mode_sense_valid[0x3f] = {
[MODE_PAGE_HD_GEOMETRY] = (1 << TYPE_DISK),
[MODE_PAGE_FLEXIBLE_DISK_GEOMETRY] = (1 << TYPE_DISK),
[MODE_PAGE_CACHI... | 170,908,375,979,409,740,000,000,000,000,000,000,000 | scsi-disk.c | 128,159,733,523,949,950,000,000,000,000,000,000,000 | [
"CWE-193"
] | CVE-2021-3930 | An off-by-one error was found in the SCSI device emulation in QEMU. It could occur while processing MODE SELECT commands in mode_sense_page() if the 'page' argument was set to MODE_PAGE_ALLS (0x3f). A malicious guest could use this flaw to potentially crash QEMU, resulting in a denial of service condition. | https://nvd.nist.gov/vuln/detail/CVE-2021-3930 |
204,354 | keepalived | 17f944144b3d9c5131569b1cc988cc90fd676671 | https://github.com/acassen/keepalived | https://github.com/acassen/keepalived/commit/17f944144b3d9c5131569b1cc988cc90fd676671 | Make sure a non privileged user cannot read keepalived file output
Ensure that when a file such as /tmp/keepalived.data is wriiten,
no non privileged can have a previous version of that file already
open, thereby allowing them to read the data.
This should fully resolve CVE-2018-19046.
Signed-off-by: Quentin Armitag... | 1 | FILE *fopen_safe(const char *path, const char *mode)
{
int fd;
FILE *file;
int flags = O_NOFOLLOW | O_CREAT;
int sav_errno;
if (mode[0] == 'r')
return fopen(path, mode);
if ((mode[0] != 'a' && mode[0] != 'w') ||
(mode[1] &&
(mode[1] != '+' || mode[2]))) {
errno = EINVAL;
return NULL;
}
if (m... | 187,349,359,709,402,930,000,000,000,000,000,000,000 | utils.c | 281,549,157,409,487,320,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2018-19046 | keepalived 2.0.8 didn't check for existing plain files when writing data to a temporary file upon a call to PrintData or PrintStats. If a local attacker had previously created a file with the expected name (e.g., /tmp/keepalived.data or /tmp/keepalived.stats), with read access for the attacker and write access for the ... | https://nvd.nist.gov/vuln/detail/CVE-2018-19046 |
357,773 | keepalived | 17f944144b3d9c5131569b1cc988cc90fd676671 | https://github.com/acassen/keepalived | https://github.com/acassen/keepalived/commit/17f944144b3d9c5131569b1cc988cc90fd676671 | Make sure a non privileged user cannot read keepalived file output
Ensure that when a file such as /tmp/keepalived.data is wriiten,
no non privileged can have a previous version of that file already
open, thereby allowing them to read the data.
This should fully resolve CVE-2018-19046.
Signed-off-by: Quentin Armitag... | 0 | FILE *fopen_safe(const char *path, const char *mode)
{
int fd;
FILE *file;
int flags = O_NOFOLLOW | O_CREAT | O_CLOEXEC;
int sav_errno;
char file_tmp_name[] = "/tmp/keepalivedXXXXXX";
if (mode[0] == 'r')
return fopen(path, mode);
if ((mode[0] != 'a' && mode[0] != 'w') ||
(mode[1] &&
(mode[1] != '+... | 172,320,200,742,520,000,000,000,000,000,000,000,000 | utils.c | 172,828,364,222,606,750,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2018-19046 | keepalived 2.0.8 didn't check for existing plain files when writing data to a temporary file upon a call to PrintData or PrintStats. If a local attacker had previously created a file with the expected name (e.g., /tmp/keepalived.data or /tmp/keepalived.stats), with read access for the attacker and write access for the ... | https://nvd.nist.gov/vuln/detail/CVE-2018-19046 |
204,372 | linux | 48fb6f4db940e92cfb16cd878cddd59ea6120d06 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=48fb6f4db940e92cfb16cd878cddd59ea6120d06 | futex: Remove unnecessary warning from get_futex_key
Commit 65d8fc777f6d ("futex: Remove requirement for lock_page() in
get_futex_key()") removed an unnecessary lock_page() with the
side-effect that page->mapping needed to be treated very carefully.
Two defensive warnings were added in case any assumption was missed ... | 1 | get_futex_key(u32 __user *uaddr, int fshared, union futex_key *key, int rw)
{
unsigned long address = (unsigned long)uaddr;
struct mm_struct *mm = current->mm;
struct page *page, *tail;
struct address_space *mapping;
int err, ro = 0;
/*
* The futex address must be "naturally" aligned.
*/
key->both.offset = ... | 60,433,985,258,533,240,000,000,000,000,000,000,000 | futex.c | 178,581,105,268,759,450,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2018-9422 | In get_futex_key of futex.c, there is a use-after-free due to improper locking. This could lead to local escalation of privilege with no additional privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-74250718 References: Upstream kernel. | https://nvd.nist.gov/vuln/detail/CVE-2018-9422 |
174,120 | linux | fbe0e839d1e22d88810f3ee3e2f1479be4c0aa4a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/fbe0e839d1e22d88810f3ee3e2f1479be4c0aa4a | futex: Prevent overflow by strengthen input validation
UBSAN reports signed integer overflow in kernel/futex.c:
UBSAN: Undefined behaviour in kernel/futex.c:2041:18
signed integer overflow:
0 - -2147483648 cannot be represented in type 'int'
Add a sanity check to catch negative values of nr_wake and nr_requeue.
... | 0 | get_futex_key(u32 __user *uaddr, int fshared, union futex_key *key, int rw)
{
unsigned long address = (unsigned long)uaddr;
struct mm_struct *mm = current->mm;
struct page *page, *tail;
struct address_space *mapping;
int err, ro = 0;
/*
* The futex address must be "naturally" aligned.
*/
key->both.offset = ... | 157,548,046,890,677,830,000,000,000,000,000,000,000 | futex.c | 307,871,334,927,438,140,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2018-6927 | The futex_requeue function in kernel/futex.c in the Linux kernel before 4.14.15 might allow attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact by triggering a negative wake or requeue value. | https://nvd.nist.gov/vuln/detail/CVE-2018-6927 |
204,396 | ImageMagick6 | 1d6c036f0388d7857c725342f7212b60e39a14c1 | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/1d6c036f0388d7857c725342f7212b60e39a14c1 | https://github.com/ImageMagick/ImageMagick/issues/1555 | 1 | static MagickBooleanType WriteTIFFImage(const ImageInfo *image_info,
Image *image)
{
const char
*mode,
*option;
CompressionType
compression;
EndianType
endian_type;
MagickBooleanType
debug,
status;
MagickOffsetType
scene;
QuantumInfo
*quantum_info;
QuantumType
q... | 331,397,966,505,560,600,000,000,000,000,000,000,000 | tiff.c | 159,093,836,393,642,560,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-11597 | In ImageMagick 7.0.8-43 Q16, there is a heap-based buffer over-read in the function WriteTIFFImage of coders/tiff.c, which allows an attacker to cause a denial of service or possibly information disclosure via a crafted image file. | https://nvd.nist.gov/vuln/detail/CVE-2019-11597 |
358,299 | ImageMagick6 | 1d6c036f0388d7857c725342f7212b60e39a14c1 | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/1d6c036f0388d7857c725342f7212b60e39a14c1 | https://github.com/ImageMagick/ImageMagick/issues/1555 | 0 | static MagickBooleanType WriteTIFFImage(const ImageInfo *image_info,
Image *image)
{
const char
*mode,
*option;
CompressionType
compression;
EndianType
endian_type;
MagickBooleanType
debug,
status;
MagickOffsetType
scene;
QuantumInfo
*quantum_info;
QuantumType
q... | 217,523,783,237,182,900,000,000,000,000,000,000,000 | tiff.c | 146,494,102,391,208,100,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-11597 | In ImageMagick 7.0.8-43 Q16, there is a heap-based buffer over-read in the function WriteTIFFImage of coders/tiff.c, which allows an attacker to cause a denial of service or possibly information disclosure via a crafted image file. | https://nvd.nist.gov/vuln/detail/CVE-2019-11597 |
204,397 | libgadu | d882b15661ee94949919ebbbc43edf0db5f619cb | https://github.com/wojtekka/libgadu | https://github.com/wojtekka/libgadu/commit/d882b15661ee94949919ebbbc43edf0db5f619cb | Odkąd biblioteka weryfikuje certyfikaty ciężko testować z self-signed. | 1 | static int client_func(const test_param_t *test)
{
struct gg_session *gs;
struct gg_login_params glp;
char tmp;
gg_proxy_host = HOST_PROXY;
gg_proxy_port = 8080;
gg_proxy_enabled = test->proxy_mode;
memset(&glp, 0, sizeof(glp));
glp.uin = 1;
glp.password = "dupa.8";
glp.async = test->async_mode;
glp.resolv... | 330,732,986,248,822,830,000,000,000,000,000,000,000 | connect.c | 8,969,186,113,593,440,000,000,000,000,000,000,000 | [
"CWE-310"
] | CVE-2013-4488 | libgadu before 1.12.0 does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers. | https://nvd.nist.gov/vuln/detail/CVE-2013-4488 |
358,302 | libgadu | d882b15661ee94949919ebbbc43edf0db5f619cb | https://github.com/wojtekka/libgadu | https://github.com/wojtekka/libgadu/commit/d882b15661ee94949919ebbbc43edf0db5f619cb | Odkąd biblioteka weryfikuje certyfikaty ciężko testować z self-signed. | 0 | static int client_func(const test_param_t *test)
{
struct gg_session *gs;
struct gg_login_params glp;
char tmp;
gg_proxy_host = HOST_PROXY;
gg_proxy_port = 8080;
gg_proxy_enabled = test->proxy_mode;
memset(&glp, 0, sizeof(glp));
glp.uin = 1;
glp.password = "dupa.8";
glp.async = test->async_mode;
glp.resolv... | 232,344,123,234,453,320,000,000,000,000,000,000,000 | connect.c | 235,763,191,884,604,280,000,000,000,000,000,000,000 | [
"CWE-310"
] | CVE-2013-4488 | libgadu before 1.12.0 does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers. | https://nvd.nist.gov/vuln/detail/CVE-2013-4488 |
204,405 | ghostpdl | 849e74e5ab450dd581942192da7101e0664fa5af | https://github.com/ArtifexSoftware/ghostpdl | https://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=849e74e5ab450dd581942192da7101e0664fa5af | Bug 701799: avoid out-of-range array access in mj_color_correct().
Code is obscure, so this fix merely avoids out-of-range access in the simplest
way possible, without understanding what the code is trying to do.
Fixes:
./sanbin/gs -sOutputFile=tmp -sDEVICE=mj6000c ../bug-701799.pdf | 1 | mj_color_correct(gx_color_value *Rptr ,gx_color_value *Gptr , gx_color_value *Bptr )
/* R,G,B : 0 to 255 */
{
short R,G,B; /* R,G,B : 0 to 255 */
short C,M,Y; /* C,M,Y : 0 to 1023 */
short H,D,Wa; /* ese-HSV */
... | 7,175,173,602,366,871,000,000,000,000,000,000,000 | gdevmjc.c | 171,261,658,968,975,040,000,000,000,000,000,000,000 | [
"CWE-120"
] | CVE-2020-16298 | A buffer overflow vulnerability in mj_color_correct() in contrib/japanese/gdevmjc.c of Artifex Software GhostScript v9.50 allows a remote attacker to cause a denial of service via a crafted PDF file. This is fixed in v9.51. | https://nvd.nist.gov/vuln/detail/CVE-2020-16298 |
359,020 | ghostpdl | 849e74e5ab450dd581942192da7101e0664fa5af | https://github.com/ArtifexSoftware/ghostpdl | https://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=849e74e5ab450dd581942192da7101e0664fa5af | Bug 701799: avoid out-of-range array access in mj_color_correct().
Code is obscure, so this fix merely avoids out-of-range access in the simplest
way possible, without understanding what the code is trying to do.
Fixes:
./sanbin/gs -sOutputFile=tmp -sDEVICE=mj6000c ../bug-701799.pdf | 0 | mj_color_correct(gx_color_value *Rptr ,gx_color_value *Gptr , gx_color_value *Bptr )
/* R,G,B : 0 to 255 */
{
short R,G,B; /* R,G,B : 0 to 255 */
short C,M,Y; /* C,M,Y : 0 to 1023 */
short H,D,Wa; /* ese-HSV */
... | 262,939,380,752,148,270,000,000,000,000,000,000,000 | gdevmjc.c | 267,751,881,814,018,720,000,000,000,000,000,000,000 | [
"CWE-120"
] | CVE-2020-16298 | A buffer overflow vulnerability in mj_color_correct() in contrib/japanese/gdevmjc.c of Artifex Software GhostScript v9.50 allows a remote attacker to cause a denial of service via a crafted PDF file. This is fixed in v9.51. | https://nvd.nist.gov/vuln/detail/CVE-2020-16298 |
204,406 | linux | 104c307147ad379617472dd91a5bcb368d72bd6d | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/104c307147ad379617472dd91a5bcb368d72bd6d | drm/amd/display: prevent memory leak
In dcn*_create_resource_pool the allocated memory should be released if
construct pool fails.
Reviewed-by: Harry Wentland <harry.wentland@amd.com>
Signed-off-by: Navid Emamdoost <navid.emamdoost@gmail.com>
Signed-off-by: Alex Deucher <alexander.deucher@amd.com> | 1 | struct resource_pool *dce112_create_resource_pool(
uint8_t num_virtual_links,
struct dc *dc)
{
struct dce110_resource_pool *pool =
kzalloc(sizeof(struct dce110_resource_pool), GFP_KERNEL);
if (!pool)
return NULL;
if (construct(num_virtual_links, dc, pool))
return &pool->base;
BREAK_TO_DEBUGGER();
return... | 25,360,000,957,001,186,000,000,000,000,000,000,000 | dce112_resource.c | 134,853,350,681,990,770,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2019-19082 | Memory leaks in *create_resource_pool() functions under drivers/gpu/drm/amd/display/dc in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption). This affects the dce120_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce120/dce120_resource.c, the dce110_crea... | https://nvd.nist.gov/vuln/detail/CVE-2019-19082 |
359,059 | linux | 104c307147ad379617472dd91a5bcb368d72bd6d | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/104c307147ad379617472dd91a5bcb368d72bd6d | drm/amd/display: prevent memory leak
In dcn*_create_resource_pool the allocated memory should be released if
construct pool fails.
Reviewed-by: Harry Wentland <harry.wentland@amd.com>
Signed-off-by: Navid Emamdoost <navid.emamdoost@gmail.com>
Signed-off-by: Alex Deucher <alexander.deucher@amd.com> | 0 | struct resource_pool *dce120_create_resource_pool(
uint8_t num_virtual_links,
struct dc *dc)
{
struct dce110_resource_pool *pool =
kzalloc(sizeof(struct dce110_resource_pool), GFP_KERNEL);
if (!pool)
return NULL;
if (construct(num_virtual_links, dc, pool))
return &pool->base;
kfree(pool);
BREAK_TO_DEBUG... | 165,603,870,895,392,430,000,000,000,000,000,000,000 | dce120_resource.c | 216,019,552,500,205,900,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2019-19082 | Memory leaks in *create_resource_pool() functions under drivers/gpu/drm/amd/display/dc in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption). This affects the dce120_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce120/dce120_resource.c, the dce110_crea... | https://nvd.nist.gov/vuln/detail/CVE-2019-19082 |
204,407 | linux | 104c307147ad379617472dd91a5bcb368d72bd6d | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/104c307147ad379617472dd91a5bcb368d72bd6d | drm/amd/display: prevent memory leak
In dcn*_create_resource_pool the allocated memory should be released if
construct pool fails.
Reviewed-by: Harry Wentland <harry.wentland@amd.com>
Signed-off-by: Navid Emamdoost <navid.emamdoost@gmail.com>
Signed-off-by: Alex Deucher <alexander.deucher@amd.com> | 1 | struct resource_pool *dce120_create_resource_pool(
uint8_t num_virtual_links,
struct dc *dc)
{
struct dce110_resource_pool *pool =
kzalloc(sizeof(struct dce110_resource_pool), GFP_KERNEL);
if (!pool)
return NULL;
if (construct(num_virtual_links, dc, pool))
return &pool->base;
BREAK_TO_DEBUGGER();
return... | 236,908,000,472,276,320,000,000,000,000,000,000,000 | dce120_resource.c | 326,271,154,528,491,800,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2019-19082 | Memory leaks in *create_resource_pool() functions under drivers/gpu/drm/amd/display/dc in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption). This affects the dce120_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce120/dce120_resource.c, the dce110_crea... | https://nvd.nist.gov/vuln/detail/CVE-2019-19082 |
359,059 | linux | 104c307147ad379617472dd91a5bcb368d72bd6d | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/104c307147ad379617472dd91a5bcb368d72bd6d | drm/amd/display: prevent memory leak
In dcn*_create_resource_pool the allocated memory should be released if
construct pool fails.
Reviewed-by: Harry Wentland <harry.wentland@amd.com>
Signed-off-by: Navid Emamdoost <navid.emamdoost@gmail.com>
Signed-off-by: Alex Deucher <alexander.deucher@amd.com> | 0 | struct resource_pool *dce120_create_resource_pool(
uint8_t num_virtual_links,
struct dc *dc)
{
struct dce110_resource_pool *pool =
kzalloc(sizeof(struct dce110_resource_pool), GFP_KERNEL);
if (!pool)
return NULL;
if (construct(num_virtual_links, dc, pool))
return &pool->base;
kfree(pool);
BREAK_TO_DEBUG... | 165,603,870,895,392,430,000,000,000,000,000,000,000 | dce120_resource.c | 216,019,552,500,205,900,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2019-19082 | Memory leaks in *create_resource_pool() functions under drivers/gpu/drm/amd/display/dc in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption). This affects the dce120_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce120/dce120_resource.c, the dce110_crea... | https://nvd.nist.gov/vuln/detail/CVE-2019-19082 |
204,408 | linux | 104c307147ad379617472dd91a5bcb368d72bd6d | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/104c307147ad379617472dd91a5bcb368d72bd6d | drm/amd/display: prevent memory leak
In dcn*_create_resource_pool the allocated memory should be released if
construct pool fails.
Reviewed-by: Harry Wentland <harry.wentland@amd.com>
Signed-off-by: Navid Emamdoost <navid.emamdoost@gmail.com>
Signed-off-by: Alex Deucher <alexander.deucher@amd.com> | 1 | struct resource_pool *dce110_create_resource_pool(
uint8_t num_virtual_links,
struct dc *dc,
struct hw_asic_id asic_id)
{
struct dce110_resource_pool *pool =
kzalloc(sizeof(struct dce110_resource_pool), GFP_KERNEL);
if (!pool)
return NULL;
if (construct(num_virtual_links, dc, pool, asic_id))
return &pool-... | 266,599,243,122,433,050,000,000,000,000,000,000,000 | dce110_resource.c | 128,876,647,168,981,740,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2019-19082 | Memory leaks in *create_resource_pool() functions under drivers/gpu/drm/amd/display/dc in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption). This affects the dce120_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce120/dce120_resource.c, the dce110_crea... | https://nvd.nist.gov/vuln/detail/CVE-2019-19082 |
359,140 | linux | 104c307147ad379617472dd91a5bcb368d72bd6d | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/104c307147ad379617472dd91a5bcb368d72bd6d | drm/amd/display: prevent memory leak
In dcn*_create_resource_pool the allocated memory should be released if
construct pool fails.
Reviewed-by: Harry Wentland <harry.wentland@amd.com>
Signed-off-by: Navid Emamdoost <navid.emamdoost@gmail.com>
Signed-off-by: Alex Deucher <alexander.deucher@amd.com> | 0 | struct resource_pool *dce110_create_resource_pool(
uint8_t num_virtual_links,
struct dc *dc,
struct hw_asic_id asic_id)
{
struct dce110_resource_pool *pool =
kzalloc(sizeof(struct dce110_resource_pool), GFP_KERNEL);
if (!pool)
return NULL;
if (construct(num_virtual_links, dc, pool, asic_id))
return &pool-... | 19,714,928,141,478,028,000,000,000,000,000,000,000 | dce110_resource.c | 6,696,065,726,456,224,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2019-19082 | Memory leaks in *create_resource_pool() functions under drivers/gpu/drm/amd/display/dc in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption). This affects the dce120_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce120/dce120_resource.c, the dce110_crea... | https://nvd.nist.gov/vuln/detail/CVE-2019-19082 |
204,409 | linux | 104c307147ad379617472dd91a5bcb368d72bd6d | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/104c307147ad379617472dd91a5bcb368d72bd6d | drm/amd/display: prevent memory leak
In dcn*_create_resource_pool the allocated memory should be released if
construct pool fails.
Reviewed-by: Harry Wentland <harry.wentland@amd.com>
Signed-off-by: Navid Emamdoost <navid.emamdoost@gmail.com>
Signed-off-by: Alex Deucher <alexander.deucher@amd.com> | 1 | struct resource_pool *dce100_create_resource_pool(
uint8_t num_virtual_links,
struct dc *dc)
{
struct dce110_resource_pool *pool =
kzalloc(sizeof(struct dce110_resource_pool), GFP_KERNEL);
if (!pool)
return NULL;
if (construct(num_virtual_links, dc, pool))
return &pool->base;
BREAK_TO_DEBUGGER();
retur... | 134,834,192,102,552,630,000,000,000,000,000,000,000 | dce100_resource.c | 216,239,683,289,400,530,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2019-19082 | Memory leaks in *create_resource_pool() functions under drivers/gpu/drm/amd/display/dc in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption). This affects the dce120_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce120/dce120_resource.c, the dce110_crea... | https://nvd.nist.gov/vuln/detail/CVE-2019-19082 |
359,118 | linux | 104c307147ad379617472dd91a5bcb368d72bd6d | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/104c307147ad379617472dd91a5bcb368d72bd6d | drm/amd/display: prevent memory leak
In dcn*_create_resource_pool the allocated memory should be released if
construct pool fails.
Reviewed-by: Harry Wentland <harry.wentland@amd.com>
Signed-off-by: Navid Emamdoost <navid.emamdoost@gmail.com>
Signed-off-by: Alex Deucher <alexander.deucher@amd.com> | 0 | struct resource_pool *dce100_create_resource_pool(
uint8_t num_virtual_links,
struct dc *dc)
{
struct dce110_resource_pool *pool =
kzalloc(sizeof(struct dce110_resource_pool), GFP_KERNEL);
if (!pool)
return NULL;
if (construct(num_virtual_links, dc, pool))
return &pool->base;
kfree(pool);
BREAK_TO_DEBU... | 111,105,773,927,111,020,000,000,000,000,000,000,000 | dce100_resource.c | 301,806,452,099,647,360,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2019-19082 | Memory leaks in *create_resource_pool() functions under drivers/gpu/drm/amd/display/dc in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption). This affects the dce120_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce120/dce120_resource.c, the dce110_crea... | https://nvd.nist.gov/vuln/detail/CVE-2019-19082 |
204,410 | linux | 104c307147ad379617472dd91a5bcb368d72bd6d | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/104c307147ad379617472dd91a5bcb368d72bd6d | drm/amd/display: prevent memory leak
In dcn*_create_resource_pool the allocated memory should be released if
construct pool fails.
Reviewed-by: Harry Wentland <harry.wentland@amd.com>
Signed-off-by: Navid Emamdoost <navid.emamdoost@gmail.com>
Signed-off-by: Alex Deucher <alexander.deucher@amd.com> | 1 | struct resource_pool *dcn10_create_resource_pool(
const struct dc_init_data *init_data,
struct dc *dc)
{
struct dcn10_resource_pool *pool =
kzalloc(sizeof(struct dcn10_resource_pool), GFP_KERNEL);
if (!pool)
return NULL;
if (construct(init_data->num_virtual_links, dc, pool))
return &pool->base;
BREAK_T... | 330,658,336,581,121,650,000,000,000,000,000,000,000 | dcn10_resource.c | 180,178,772,616,752,060,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2019-19082 | Memory leaks in *create_resource_pool() functions under drivers/gpu/drm/amd/display/dc in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption). This affects the dce120_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce120/dce120_resource.c, the dce110_crea... | https://nvd.nist.gov/vuln/detail/CVE-2019-19082 |
359,042 | linux | 104c307147ad379617472dd91a5bcb368d72bd6d | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/104c307147ad379617472dd91a5bcb368d72bd6d | drm/amd/display: prevent memory leak
In dcn*_create_resource_pool the allocated memory should be released if
construct pool fails.
Reviewed-by: Harry Wentland <harry.wentland@amd.com>
Signed-off-by: Navid Emamdoost <navid.emamdoost@gmail.com>
Signed-off-by: Alex Deucher <alexander.deucher@amd.com> | 0 | struct resource_pool *dcn10_create_resource_pool(
const struct dc_init_data *init_data,
struct dc *dc)
{
struct dcn10_resource_pool *pool =
kzalloc(sizeof(struct dcn10_resource_pool), GFP_KERNEL);
if (!pool)
return NULL;
if (construct(init_data->num_virtual_links, dc, pool))
return &pool->base;
kfree(p... | 33,467,104,699,066,910,000,000,000,000,000,000,000 | dcn10_resource.c | 333,510,111,353,274,900,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2019-19082 | Memory leaks in *create_resource_pool() functions under drivers/gpu/drm/amd/display/dc in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption). This affects the dce120_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce120/dce120_resource.c, the dce110_crea... | https://nvd.nist.gov/vuln/detail/CVE-2019-19082 |
204,414 | w3m | a088e0263c48ba406a7ae0932a1ae64a25be7acd | https://github.com/tats/w3m | https://github.com/tats/w3m/commit/a088e0263c48ba406a7ae0932a1ae64a25be7acd | Prevent deref null pointer in shiftAnchorPosition()
Bug-Debian: https://github.com/tats/w3m/issues/40 | 1 | shiftAnchorPosition(AnchorList *al, HmarkerList *hl, int line, int pos,
int shift)
{
Anchor *a;
size_t b, e, s = 0;
int cmp;
if (al == NULL || al->nanchor == 0)
return;
s = al->nanchor / 2;
for (b = 0, e = al->nanchor - 1; b <= e; s = (b + e + 1) / 2) {
a = &al->anchors[s];
cmp = onAn... | 219,601,932,701,999,780,000,000,000,000,000,000,000 | anchor.c | 43,978,762,407,227,080,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2016-9629 | An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2016-9629 |
359,241 | w3m | a088e0263c48ba406a7ae0932a1ae64a25be7acd | https://github.com/tats/w3m | https://github.com/tats/w3m/commit/a088e0263c48ba406a7ae0932a1ae64a25be7acd | Prevent deref null pointer in shiftAnchorPosition()
Bug-Debian: https://github.com/tats/w3m/issues/40 | 0 | shiftAnchorPosition(AnchorList *al, HmarkerList *hl, int line, int pos,
int shift)
{
Anchor *a;
size_t b, e, s = 0;
int cmp;
if (al == NULL || al->nanchor == 0)
return;
s = al->nanchor / 2;
for (b = 0, e = al->nanchor - 1; b <= e; s = (b + e + 1) / 2) {
a = &al->anchors[s];
cmp = onAn... | 269,981,388,207,880,600,000,000,000,000,000,000,000 | anchor.c | 69,432,606,966,181,620,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2016-9629 | An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2016-9629 |
204,434 | spice-vd_agent | e4bfd1b632b6c14e8411dbe3565115a78cd3d256 | https://github.com/freedesktop/spice-vd_agent | https://github.com/freedesktop/spice-vd_agent/commit/e4bfd1b632b6c14e8411dbe3565115a78cd3d256 | cleanup active_xfers when the client disconnects
Signed-off-by: Uri Lublin <uril@redhat.com>
Acked-by: Frediano Ziglio <fziglio@redhat.com> | 1 | static void do_client_disconnect(void)
{
if (client_connected) {
udscs_server_write_all(server, VDAGENTD_CLIENT_DISCONNECTED, 0, 0,
NULL, 0);
client_connected = false;
}
} | 257,464,005,733,012,200,000,000,000,000,000,000,000 | vdagentd.c | 134,875,536,789,113,300,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2020-25651 | A flaw was found in the SPICE file transfer protocol. File data from the host system can end up in full or in parts in the client connection of an illegitimate local user in the VM system. Active file transfers from other users could also be interrupted, resulting in a denial of service. The highest threat from this vu... | https://nvd.nist.gov/vuln/detail/CVE-2020-25651 |
359,777 | spice-vd_agent | e4bfd1b632b6c14e8411dbe3565115a78cd3d256 | https://github.com/freedesktop/spice-vd_agent | https://github.com/freedesktop/spice-vd_agent/commit/e4bfd1b632b6c14e8411dbe3565115a78cd3d256 | cleanup active_xfers when the client disconnects
Signed-off-by: Uri Lublin <uril@redhat.com>
Acked-by: Frediano Ziglio <fziglio@redhat.com> | 0 | static void do_client_disconnect(void)
{
g_hash_table_remove_all(active_xfers);
if (client_connected) {
udscs_server_write_all(server, VDAGENTD_CLIENT_DISCONNECTED, 0, 0,
NULL, 0);
client_connected = false;
}
} | 79,055,055,750,159,810,000,000,000,000,000,000,000 | vdagentd.c | 67,833,859,549,917,040,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2020-25651 | A flaw was found in the SPICE file transfer protocol. File data from the host system can end up in full or in parts in the client connection of an illegitimate local user in the VM system. Active file transfers from other users could also be interrupted, resulting in a denial of service. The highest threat from this vu... | https://nvd.nist.gov/vuln/detail/CVE-2020-25651 |
204,435 | mutt | 31eef6c766f47df8281942d19f76e35f475c781d | https://github.com/muttmua/mutt | https://gitlab.com/muttmua/mutt/commit/31eef6c766f47df8281942d19f76e35f475c781d | Selectively cache headers.
Thanks to NeoMutt and Jeriko One for the patch, which was slightly
modified to apply to the Mutt code. | 1 | header_cache_t* imap_hcache_open (IMAP_DATA* idata, const char* path)
{
IMAP_MBOX mx;
ciss_url_t url;
char cachepath[LONG_STRING];
char mbox[LONG_STRING];
if (path)
imap_cachepath (idata, path, mbox, sizeof (mbox));
else
{
if (!idata->ctx || imap_parse_path (idata->ctx->path, &mx) < 0)
retu... | 92,899,900,822,160,150,000,000,000,000,000,000,000 | util.c | 62,920,128,730,223,470,000,000,000,000,000,000,000 | [
"CWE-22"
] | CVE-2018-14355 | An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/util.c mishandles ".." directory traversal in a mailbox name. | https://nvd.nist.gov/vuln/detail/CVE-2018-14355 |
359,787 | mutt | 31eef6c766f47df8281942d19f76e35f475c781d | https://github.com/muttmua/mutt | https://gitlab.com/muttmua/mutt/commit/31eef6c766f47df8281942d19f76e35f475c781d | Selectively cache headers.
Thanks to NeoMutt and Jeriko One for the patch, which was slightly
modified to apply to the Mutt code. | 0 | header_cache_t* imap_hcache_open (IMAP_DATA* idata, const char* path)
{
IMAP_MBOX mx;
ciss_url_t url;
char cachepath[LONG_STRING];
char mbox[LONG_STRING];
size_t len;
if (path)
imap_cachepath (idata, path, mbox, sizeof (mbox));
else
{
if (!idata->ctx || imap_parse_path (idata->ctx->path, &mx) <... | 84,185,136,930,006,980,000,000,000,000,000,000,000 | util.c | 324,603,979,447,683,900,000,000,000,000,000,000,000 | [
"CWE-22"
] | CVE-2018-14355 | An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/util.c mishandles ".." directory traversal in a mailbox name. | https://nvd.nist.gov/vuln/detail/CVE-2018-14355 |
204,442 | linux | 4a9d46a9fe14401f21df69cea97c62396d5fb053 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/4a9d46a9fe14401f21df69cea97c62396d5fb053 | RDMA: Fix goto target to release the allocated memory
In bnxt_re_create_srq(), when ib_copy_to_udata() fails allocated memory
should be released by goto fail.
Fixes: 37cb11acf1f7 ("RDMA/bnxt_re: Add SRQ support for Broadcom adapters")
Link: https://lore.kernel.org/r/20190910222120.16517-1-navid.emamdoost@gmail.com
Si... | 1 | int bnxt_re_create_srq(struct ib_srq *ib_srq,
struct ib_srq_init_attr *srq_init_attr,
struct ib_udata *udata)
{
struct ib_pd *ib_pd = ib_srq->pd;
struct bnxt_re_pd *pd = container_of(ib_pd, struct bnxt_re_pd, ib_pd);
struct bnxt_re_dev *rdev = pd->rdev;
struct bnxt_qplib_dev_attr *dev_attr = &rdev... | 302,447,471,173,419,300,000,000,000,000,000,000,000 | ib_verbs.c | 247,623,184,076,655,960,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2019-19077 | A memory leak in the bnxt_re_create_srq() function in drivers/infiniband/hw/bnxt_re/ib_verbs.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering copy to udata failures, aka CID-4a9d46a9fe14. | https://nvd.nist.gov/vuln/detail/CVE-2019-19077 |
359,891 | linux | 4a9d46a9fe14401f21df69cea97c62396d5fb053 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/4a9d46a9fe14401f21df69cea97c62396d5fb053 | RDMA: Fix goto target to release the allocated memory
In bnxt_re_create_srq(), when ib_copy_to_udata() fails allocated memory
should be released by goto fail.
Fixes: 37cb11acf1f7 ("RDMA/bnxt_re: Add SRQ support for Broadcom adapters")
Link: https://lore.kernel.org/r/20190910222120.16517-1-navid.emamdoost@gmail.com
Si... | 0 | int bnxt_re_create_srq(struct ib_srq *ib_srq,
struct ib_srq_init_attr *srq_init_attr,
struct ib_udata *udata)
{
struct ib_pd *ib_pd = ib_srq->pd;
struct bnxt_re_pd *pd = container_of(ib_pd, struct bnxt_re_pd, ib_pd);
struct bnxt_re_dev *rdev = pd->rdev;
struct bnxt_qplib_dev_attr *dev_attr = &rdev... | 331,779,862,910,464,100,000,000,000,000,000,000,000 | ib_verbs.c | 60,854,610,502,843,340,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2019-19077 | A memory leak in the bnxt_re_create_srq() function in drivers/infiniband/hw/bnxt_re/ib_verbs.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering copy to udata failures, aka CID-4a9d46a9fe14. | https://nvd.nist.gov/vuln/detail/CVE-2019-19077 |
204,443 | libvncserver | 05a9bd41a8ec0a9d580a8f420f41718bdd235446 | https://github.com/LibVNC/libvncserver | https://github.com/newsoft/libvncserver/commit/05a9bd41a8ec0a9d580a8f420f41718bdd235446 | Do not accept a scaling factor of zero on PalmVNCSetScaleFactor and SetScale client->server messages. This would cause a division by zero and crash the server. | 1 | rfbProcessClientNormalMessage(rfbClientPtr cl)
{
int n=0;
rfbClientToServerMsg msg;
char *str;
int i;
uint32_t enc=0;
uint32_t lastPreferredEncoding = -1;
char encBuf[64];
char encBuf2[64];
#ifdef LIBVNCSERVER_WITH_WEBSOCKETS
if (cl->wsctx && webSocketCheckDisconnect(cl))
retu... | 206,749,608,858,323,160,000,000,000,000,000,000,000 | rfbserver.c | 163,207,847,579,691,220,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2014-6054 | The rfbProcessClientNormalMessage function in libvncserver/rfbserver.c in LibVNCServer 0.9.9 and earlier allows remote attackers to cause a denial of service (divide-by-zero error and server crash) via a zero value in the scaling factor in a (1) PalmVNCSetScaleFactor or (2) SetScale message. | https://nvd.nist.gov/vuln/detail/CVE-2014-6054 |
359,965 | libvncserver | 05a9bd41a8ec0a9d580a8f420f41718bdd235446 | https://github.com/LibVNC/libvncserver | https://github.com/newsoft/libvncserver/commit/05a9bd41a8ec0a9d580a8f420f41718bdd235446 | Do not accept a scaling factor of zero on PalmVNCSetScaleFactor and SetScale client->server messages. This would cause a division by zero and crash the server. | 0 | rfbProcessClientNormalMessage(rfbClientPtr cl)
{
int n=0;
rfbClientToServerMsg msg;
char *str;
int i;
uint32_t enc=0;
uint32_t lastPreferredEncoding = -1;
char encBuf[64];
char encBuf2[64];
#ifdef LIBVNCSERVER_WITH_WEBSOCKETS
if (cl->wsctx && webSocketCheckDisconnect(cl))
retu... | 229,169,901,904,628,170,000,000,000,000,000,000,000 | rfbserver.c | 245,143,555,823,770,300,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2014-6054 | The rfbProcessClientNormalMessage function in libvncserver/rfbserver.c in LibVNCServer 0.9.9 and earlier allows remote attackers to cause a denial of service (divide-by-zero error and server crash) via a zero value in the scaling factor in a (1) PalmVNCSetScaleFactor or (2) SetScale message. | https://nvd.nist.gov/vuln/detail/CVE-2014-6054 |
204,444 | lxc | f547349ea7ef3a6eae6965a95cb5986cd921bd99 | https://github.com/lxc/lxc | https://github.com/lxc/lxc/commit/f547349ea7ef3a6eae6965a95cb5986cd921bd99 | CVE-2015-1331: lxclock: use /run/lxc/lock rather than /run/lock/lxc
This prevents an unprivileged user to use LXC to create arbitrary file
on the filesystem.
Signed-off-by: Serge Hallyn <serge.hallyn@ubuntu.com>
Signed-off-by: Tyler Hicks <tyhicks@canonical.com>
Acked-by: Stéphane Graber <stgraber@ubuntu.com> | 1 | static char *lxclock_name(const char *p, const char *n)
{
int ret;
int len;
char *dest;
char *rundir;
/* lockfile will be:
* "/run" + "/lock/lxc/$lxcpath/$lxcname + '\0' if root
* or
* $XDG_RUNTIME_DIR + "/lock/lxc/$lxcpath/$lxcname + '\0' if non-root
*/
/* length of "/lock/lxc/" + $lxcpath + "/" + $lxc... | 24,167,740,325,555,270,000,000,000,000,000,000,000 | lxclock.c | 100,870,178,609,157,200,000,000,000,000,000,000,000 | [
"CWE-59"
] | CVE-2015-1331 | lxclock.c in LXC 1.1.2 and earlier allows local users to create arbitrary files via a symlink attack on /run/lock/lxc/*. | https://nvd.nist.gov/vuln/detail/CVE-2015-1331 |
359,978 | lxc | f547349ea7ef3a6eae6965a95cb5986cd921bd99 | https://github.com/lxc/lxc | https://github.com/lxc/lxc/commit/f547349ea7ef3a6eae6965a95cb5986cd921bd99 | CVE-2015-1331: lxclock: use /run/lxc/lock rather than /run/lock/lxc
This prevents an unprivileged user to use LXC to create arbitrary file
on the filesystem.
Signed-off-by: Serge Hallyn <serge.hallyn@ubuntu.com>
Signed-off-by: Tyler Hicks <tyhicks@canonical.com>
Acked-by: Stéphane Graber <stgraber@ubuntu.com> | 0 | static char *lxclock_name(const char *p, const char *n)
{
int ret;
int len;
char *dest;
char *rundir;
/* lockfile will be:
* "/run" + "/lxc/lock/$lxcpath/$lxcname + '\0' if root
* or
* $XDG_RUNTIME_DIR + "/lxc/lock/$lxcpath/$lxcname + '\0' if non-root
*/
/* length of "/lxc/lock/" + $lxcpath + "/" + $lxc... | 2,191,704,654,150,311,400,000,000,000,000,000,000 | lxclock.c | 234,299,807,627,059,540,000,000,000,000,000,000,000 | [
"CWE-59"
] | CVE-2015-1331 | lxclock.c in LXC 1.1.2 and earlier allows local users to create arbitrary files via a symlink attack on /run/lock/lxc/*. | https://nvd.nist.gov/vuln/detail/CVE-2015-1331 |
204,445 | libwebm | 8e88e04b07352f2ca449278b44a2d8ec7631bdcf | https://github.com/webmproject/libwebm | https://github.com/webmproject/libwebm/commit/8e88e04b07352f2ca449278b44a2d8ec7631bdcf | webm2pes: Avoid OOB reads caused by invalid superframe index.
BUG=webm:1492
Change-Id: Ibd5781731fe8f6fcdf5f1cc6e5807d17b3b92d4d | 1 | bool ParseVP9SuperFrameIndex(const std::uint8_t* frame,
std::size_t frame_length, Ranges* frame_ranges) {
if (frame == nullptr || frame_length == 0 || frame_ranges == nullptr)
return false;
bool parse_ok = false;
const std::uint8_t marker = frame[frame_length - 1];
const std::u... | 219,581,059,272,884,470,000,000,000,000,000,000,000 | libwebm_util.cc | 138,127,343,428,068,670,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-6406 | The function ParseVP9SuperFrameIndex in common/libwebm_util.cc in libwebm through 2018-01-30 does not validate the child_frame_length data obtained from a .webm file, which allows remote attackers to cause an information leak or a denial of service (heap-based buffer over-read and later out-of-bounds write), or possibl... | https://nvd.nist.gov/vuln/detail/CVE-2018-6406 |
359,981 | libwebm | 8e88e04b07352f2ca449278b44a2d8ec7631bdcf | https://github.com/webmproject/libwebm | https://github.com/webmproject/libwebm/commit/8e88e04b07352f2ca449278b44a2d8ec7631bdcf | webm2pes: Avoid OOB reads caused by invalid superframe index.
BUG=webm:1492
Change-Id: Ibd5781731fe8f6fcdf5f1cc6e5807d17b3b92d4d | 0 | bool ParseVP9SuperFrameIndex(const std::uint8_t* frame,
std::size_t frame_length, Ranges* frame_ranges,
bool* error) {
if (frame == nullptr || frame_length == 0 || frame_ranges == nullptr ||
error == nullptr) {
return false;
}
bool parse_ok = fa... | 84,318,726,563,073,190,000,000,000,000,000,000,000 | libwebm_util.cc | 54,642,158,402,706,210,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-6406 | The function ParseVP9SuperFrameIndex in common/libwebm_util.cc in libwebm through 2018-01-30 does not validate the child_frame_length data obtained from a .webm file, which allows remote attackers to cause an information leak or a denial of service (heap-based buffer over-read and later out-of-bounds write), or possibl... | https://nvd.nist.gov/vuln/detail/CVE-2018-6406 |
204,447 | sssd | 4da27d52078497c5c095f4a4cd9975fe5c83c330 | http://git.fedorahosted.org/git/?p=sssd | https://git.fedorahosted.org/cgit/sssd.git/commit/?id=4da27d52078497c5c095f4a4cd9975fe5c83c330 | AD: process non-posix nested groups w/o tokenGroups
When initgr is performed for AD not supporting tokenGroups, do not
filter out groups without gid attribute or with gid equal to zero.
Resolves:
https://fedorahosted.org/sssd/ticket/2343
Reviewed-by: Michal Židek <mzidek@redhat.com>
(cherry picked from commit 981bf5... | 1 | static struct tevent_req *sdap_initgr_rfc2307bis_send(
TALLOC_CTX *memctx,
struct tevent_context *ev,
struct sdap_options *opts,
struct sdap_domain *sdom,
struct sdap_handle *sh,
const char *name,
const char *orig_dn)
{
errno_t ret;
struct tevent_req *req;... | 219,731,369,975,348,040,000,000,000,000,000,000,000 | sdap_async_initgroups.c | 309,295,817,825,451,720,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2014-0249 | The System Security Services Daemon (SSSD) 1.11.6 does not properly identify group membership when a non-POSIX group is in a group membership chain, which allows local users to bypass access restrictions via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2014-0249 |
360,031 | sssd | 4da27d52078497c5c095f4a4cd9975fe5c83c330 | http://git.fedorahosted.org/git/?p=sssd | https://git.fedorahosted.org/cgit/sssd.git/commit/?id=4da27d52078497c5c095f4a4cd9975fe5c83c330 | AD: process non-posix nested groups w/o tokenGroups
When initgr is performed for AD not supporting tokenGroups, do not
filter out groups without gid attribute or with gid equal to zero.
Resolves:
https://fedorahosted.org/sssd/ticket/2343
Reviewed-by: Michal Židek <mzidek@redhat.com>
(cherry picked from commit 981bf5... | 0 | static struct tevent_req *sdap_initgr_rfc2307bis_send(
TALLOC_CTX *memctx,
struct tevent_context *ev,
struct sdap_options *opts,
struct sdap_domain *sdom,
struct sdap_handle *sh,
const char *name,
const char *orig_dn)
{
errno_t ret;
struct tevent_req *req;... | 86,849,238,599,963,510,000,000,000,000,000,000,000 | sdap_async_initgroups.c | 61,434,543,464,282,480,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2014-0249 | The System Security Services Daemon (SSSD) 1.11.6 does not properly identify group membership when a non-POSIX group is in a group membership chain, which allows local users to bypass access restrictions via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2014-0249 |
204,501 | clamav-devel | dfc00cd3301a42b571454b51a6102eecf58407bc | https://github.com/vrtadmin/clamav-devel | https://github.com/vrtadmin/clamav-devel/commit/dfc00cd3301a42b571454b51a6102eecf58407bc | bb19798 - fix out of bound memory access for crafted wwunpack file. | 1 | int wwunpack(uint8_t *exe, uint32_t exesz, uint8_t *wwsect, struct cli_exe_section *sects, uint16_t scount, uint32_t pe, int desc) {
uint8_t *structs = wwsect + 0x2a1, *compd, *ccur, *unpd, *ucur, bc;
uint32_t src, srcend, szd, bt, bits;
int error=0, i;
cli_dbgmsg("in wwunpack\n");
while (1) {
if (!CLI_I... | 215,311,999,632,108,280,000,000,000,000,000,000,000 | wwunpack.c | 304,637,741,545,599,750,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2017-6420 | The wwunpack function in libclamav/wwunpack.c in ClamAV 0.99.2 allows remote attackers to cause a denial of service (use-after-free) via a crafted PE file with WWPack compression. | https://nvd.nist.gov/vuln/detail/CVE-2017-6420 |
360,962 | clamav-devel | dfc00cd3301a42b571454b51a6102eecf58407bc | https://github.com/vrtadmin/clamav-devel | https://github.com/vrtadmin/clamav-devel/commit/dfc00cd3301a42b571454b51a6102eecf58407bc | bb19798 - fix out of bound memory access for crafted wwunpack file. | 0 | int wwunpack(uint8_t *exe, uint32_t exesz, uint8_t *wwsect, struct cli_exe_section *sects, uint16_t scount, uint32_t pe, int desc) {
uint8_t *structs = wwsect + 0x2a1, *compd, *ccur, *unpd, *ucur, bc;
uint32_t src, srcend, szd, bt, bits;
int error=0, i;
cli_dbgmsg("in wwunpack\n");
while (1) {
if (!CLI_I... | 309,338,320,923,548,500,000,000,000,000,000,000,000 | wwunpack.c | 13,422,378,201,151,260,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2017-6420 | The wwunpack function in libclamav/wwunpack.c in ClamAV 0.99.2 allows remote attackers to cause a denial of service (use-after-free) via a crafted PE file with WWPack compression. | https://nvd.nist.gov/vuln/detail/CVE-2017-6420 |
204,502 | ImageMagick | 6790815c75bdea0357df5564345847856e995d6b | https://github.com/ImageMagick/ImageMagick | http://git.imagemagick.org/repos/ImageMagick/commit/6790815c75bdea0357df5564345847856e995d6b | Fixed memory leak in IsOptionMember. | 1 | MagickExport MagickBooleanType IsOptionMember(const char *option,
const char *options)
{
char
**option_list,
*string;
int
number_options;
MagickBooleanType
member;
register ssize_t
i;
/*
Is option a member of the options list?
*/
if (options == (const char *) NULL)
return... | 101,838,286,104,579,790,000,000,000,000,000,000,000 | option.c | 112,869,378,559,637,220,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2016-10252 | Memory leak in the IsOptionMember function in MagickCore/option.c in ImageMagick before 6.9.2-2, as used in ODR-PadEnc and other products, allows attackers to trigger memory consumption. | https://nvd.nist.gov/vuln/detail/CVE-2016-10252 |
360,963 | ImageMagick | 6790815c75bdea0357df5564345847856e995d6b | https://github.com/ImageMagick/ImageMagick | http://git.imagemagick.org/repos/ImageMagick/commit/6790815c75bdea0357df5564345847856e995d6b | Fixed memory leak in IsOptionMember. | 0 | MagickExport MagickBooleanType IsOptionMember(const char *option,
const char *options)
{
char
**option_list,
*string;
int
number_options;
MagickBooleanType
member;
register ssize_t
i;
/*
Is option a member of the options list?
*/
if (options == (const char *) NULL)
return... | 74,691,017,348,243,800,000,000,000,000,000,000,000 | option.c | 98,310,158,358,005,700,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2016-10252 | Memory leak in the IsOptionMember function in MagickCore/option.c in ImageMagick before 6.9.2-2, as used in ODR-PadEnc and other products, allows attackers to trigger memory consumption. | https://nvd.nist.gov/vuln/detail/CVE-2016-10252 |
204,503 | linux | ca7a03c4175366a92cee0ccc4fec0038c3266e26 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/ca7a03c4175366a92cee0ccc4fec0038c3266e26 | ipv6: do not free rt if FIB_LOOKUP_NOREF is set on suppress rule
Commit 7d9e5f422150 removed references from certain dsts, but accounting
for this never translated down into the fib6 suppression code. This bug
was triggered by WireGuard users who use wg-quick(8), which uses the
"suppress-prefix" directive to ip-rule(8... | 1 | static bool fib6_rule_suppress(struct fib_rule *rule, struct fib_lookup_arg *arg)
{
struct fib6_result *res = arg->result;
struct rt6_info *rt = res->rt6;
struct net_device *dev = NULL;
if (!rt)
return false;
if (rt->rt6i_idev)
dev = rt->rt6i_idev->dev;
/* do not accept result if the route does
* not mee... | 324,538,581,425,559,400,000,000,000,000,000,000,000 | fib6_rules.c | 143,298,823,367,322,570,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2021-3892 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2019-18198. Reason: This candidate is a reservation duplicate of CVE-2019-18198. Notes: All CVE users should reference CVE-2019-18198 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental us... | https://nvd.nist.gov/vuln/detail/CVE-2021-3892 |
360,995 | linux | ca7a03c4175366a92cee0ccc4fec0038c3266e26 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/ca7a03c4175366a92cee0ccc4fec0038c3266e26 | ipv6: do not free rt if FIB_LOOKUP_NOREF is set on suppress rule
Commit 7d9e5f422150 removed references from certain dsts, but accounting
for this never translated down into the fib6 suppression code. This bug
was triggered by WireGuard users who use wg-quick(8), which uses the
"suppress-prefix" directive to ip-rule(8... | 0 | static bool fib6_rule_suppress(struct fib_rule *rule, struct fib_lookup_arg *arg)
{
struct fib6_result *res = arg->result;
struct rt6_info *rt = res->rt6;
struct net_device *dev = NULL;
if (!rt)
return false;
if (rt->rt6i_idev)
dev = rt->rt6i_idev->dev;
/* do not accept result if the route does
* not mee... | 119,967,756,548,228,810,000,000,000,000,000,000,000 | fib6_rules.c | 303,934,418,627,799,830,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2021-3892 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2019-18198. Reason: This candidate is a reservation duplicate of CVE-2019-18198. Notes: All CVE users should reference CVE-2019-18198 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental us... | https://nvd.nist.gov/vuln/detail/CVE-2021-3892 |
204,525 | openjpeg | ad593c9e0622e0d8d87228e67e4dbd36243ffd22 | https://github.com/uclouvain/openjpeg | https://github.com/uclouvain/openjpeg/commit/ad593c9e0622e0d8d87228e67e4dbd36243ffd22 | Fix heap-buffer-overflow in color_esycc_to_rgb (#748)
When all components do not have the same dx/dy, components buffer are
read beyond their end.
Do not convert in this case.
Update uclouvain/openjpeg#725 | 1 | void color_esycc_to_rgb(opj_image_t *image)
{
int y, cb, cr, sign1, sign2, val;
unsigned int w, h, max, i;
int flip_value = (1 << (image->comps[0].prec-1));
int max_value = (1 << image->comps[0].prec) - 1;
if(image->numcomps < 3) return;
w = image->comps[0].w;
h = image->comps[0].h;
sign1 = (int)image->co... | 108,563,818,164,279,580,000,000,000,000,000,000,000 | color.c | 151,110,894,574,798,240,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2016-3182 | The color_esycc_to_rgb function in bin/common/color.c in OpenJPEG before 2.1.1 allows attackers to cause a denial of service (memory corruption) via a crafted jpeg 2000 file. | https://nvd.nist.gov/vuln/detail/CVE-2016-3182 |
68,533 | openjpeg | 162f6199c0cd3ec1c6c6dc65e41b2faab92b2d91 | https://github.com/uclouvain/openjpeg | https://github.com/uclouvain/openjpeg/commit/162f6199c0cd3ec1c6c6dc65e41b2faab92b2d91 | Fix Heap Buffer Overflow in function color_cmyk_to_rgb
Fix uclouvain/openjpeg#774 | 0 | void color_esycc_to_rgb(opj_image_t *image)
{
int y, cb, cr, sign1, sign2, val;
unsigned int w, h, max, i;
int flip_value = (1 << (image->comps[0].prec-1));
int max_value = (1 << image->comps[0].prec) - 1;
if (
(image->numcomps < 3)
|| (image->comps[0].dx != image->comps[1].dx) || (image->comps[0].dx !=... | 205,404,301,164,067,240,000,000,000,000,000,000,000 | color.c | 144,381,218,147,487,070,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2016-4796 | Heap-based buffer overflow in the color_cmyk_to_rgb in common/color.c in OpenJPEG before 2.1.1 allows remote attackers to cause a denial of service (crash) via a crafted .j2k file. | https://nvd.nist.gov/vuln/detail/CVE-2016-4796 |
204,531 | libvncserver | 045a044e8ae79db9244593fbce154cdf6e843273 | https://github.com/LibVNC/libvncserver | https://github.com/newsoft/libvncserver/commit/045a044e8ae79db9244593fbce154cdf6e843273 | Fix integer overflow in MallocFrameBuffer()
Promote integers to uint64_t to avoid integer overflow issue during
frame buffer allocation for very large screen sizes | 1 | static rfbBool MallocFrameBuffer(rfbClient* client) {
if(client->frameBuffer)
free(client->frameBuffer);
client->frameBuffer=malloc(client->width*client->height*client->format.bitsPerPixel/8);
return client->frameBuffer?TRUE:FALSE;
} | 332,958,005,458,995,000,000,000,000,000,000,000,000 | vncviewer.c | 156,923,722,532,028,200,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2014-6051 | Integer overflow in the MallocFrameBuffer function in vncviewer.c in LibVNCServer 0.9.9 and earlier allows remote VNC servers to cause a denial of service (crash) and possibly execute arbitrary code via an advertisement for a large screen size, which triggers a heap-based buffer overflow. | https://nvd.nist.gov/vuln/detail/CVE-2014-6051 |
361,255 | libvncserver | 045a044e8ae79db9244593fbce154cdf6e843273 | https://github.com/LibVNC/libvncserver | https://github.com/newsoft/libvncserver/commit/045a044e8ae79db9244593fbce154cdf6e843273 | Fix integer overflow in MallocFrameBuffer()
Promote integers to uint64_t to avoid integer overflow issue during
frame buffer allocation for very large screen sizes | 0 | static rfbBool MallocFrameBuffer(rfbClient* client) {
uint64_t allocSize;
if(client->frameBuffer)
free(client->frameBuffer);
/* SECURITY: promote 'width' into uint64_t so that the multiplication does not overflow
'width' and 'height' are 16-bit integers per RFB protocol design
SIZE_MAX is the maximu... | 46,219,224,644,773,750,000,000,000,000,000,000,000 | vncviewer.c | 59,162,983,907,888,380,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2014-6051 | Integer overflow in the MallocFrameBuffer function in vncviewer.c in LibVNCServer 0.9.9 and earlier allows remote VNC servers to cause a denial of service (crash) and possibly execute arbitrary code via an advertisement for a large screen size, which triggers a heap-based buffer overflow. | https://nvd.nist.gov/vuln/detail/CVE-2014-6051 |
204,552 | fribidi | d989590e124ad995de3598800c8835d819fadf80 | https://github.com/fribidi/fribidi | https://github.com/fribidi/fribidi/commit/d989590e124ad995de3598800c8835d819fadf80 | Reduce dynamic allocations by using arrays for all small arrays. | 1 | fribidi_get_par_embedding_levels_ex (
/* input */
const FriBidiCharType *bidi_types,
const FriBidiBracketType *bracket_types,
const FriBidiStrIndex len,
/* input and output */
FriBidiParType *pbase_dir,
/* output */
FriBidiLevel *embedding_levels
)
{
FriBidiLevel base_level, *base_level_per_iso_level ... | 336,737,162,813,018,100,000,000,000,000,000,000,000 | fribidi-bidi.c | 226,358,926,109,444,930,000,000,000,000,000,000,000 | [
"CWE-120"
] | CVE-2019-18397 | A buffer overflow in the fribidi_get_par_embedding_levels_ex() function in lib/fribidi-bidi.c of GNU FriBidi through 1.0.7 allows an attacker to cause a denial of service or possibly execute arbitrary code by delivering crafted text content to a user, when this content is then rendered by an application that uses FriBi... | https://nvd.nist.gov/vuln/detail/CVE-2019-18397 |
361,875 | fribidi | d989590e124ad995de3598800c8835d819fadf80 | https://github.com/fribidi/fribidi | https://github.com/fribidi/fribidi/commit/d989590e124ad995de3598800c8835d819fadf80 | Reduce dynamic allocations by using arrays for all small arrays. | 0 | fribidi_get_par_embedding_levels_ex (
/* input */
const FriBidiCharType *bidi_types,
const FriBidiBracketType *bracket_types,
const FriBidiStrIndex len,
/* input and output */
FriBidiParType *pbase_dir,
/* output */
FriBidiLevel *embedding_levels
)
{
FriBidiLevel base_level_per_iso_level[FRIBIDI_BIDI_... | 251,110,426,847,020,230,000,000,000,000,000,000,000 | fribidi-bidi.c | 46,178,116,312,556,790,000,000,000,000,000,000,000 | [
"CWE-120"
] | CVE-2019-18397 | A buffer overflow in the fribidi_get_par_embedding_levels_ex() function in lib/fribidi-bidi.c of GNU FriBidi through 1.0.7 allows an attacker to cause a denial of service or possibly execute arbitrary code by delivering crafted text content to a user, when this content is then rendered by an application that uses FriBi... | https://nvd.nist.gov/vuln/detail/CVE-2019-18397 |
204,560 | linux | cc16eecae687912238ee6efbff71ad31e2bc414e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/cc16eecae687912238ee6efbff71ad31e2bc414e | jbd2: fix use-after-free of transaction_t race
jbd2_journal_wait_updates() is called with j_state_lock held. But if
there is a commit in progress, then this transaction might get committed
and freed via jbd2_journal_commit_transaction() ->
jbd2_journal_free_transaction(), when we release j_state_lock.
So check for jou... | 1 | void jbd2_journal_wait_updates(journal_t *journal)
{
transaction_t *commit_transaction = journal->j_running_transaction;
if (!commit_transaction)
return;
spin_lock(&commit_transaction->t_handle_lock);
while (atomic_read(&commit_transaction->t_updates)) {
DEFINE_WAIT(wait);
prepare_to_wait(&journal->j_wait_... | 82,699,010,449,325,360,000,000,000,000,000,000,000 | transaction.c | 282,550,602,848,862,600,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2022-28796 | jbd2_journal_wait_updates in fs/jbd2/transaction.c in the Linux kernel before 5.17.1 has a use-after-free caused by a transaction_t race condition. | https://nvd.nist.gov/vuln/detail/CVE-2022-28796 |
361,958 | linux | cc16eecae687912238ee6efbff71ad31e2bc414e | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/cc16eecae687912238ee6efbff71ad31e2bc414e | jbd2: fix use-after-free of transaction_t race
jbd2_journal_wait_updates() is called with j_state_lock held. But if
there is a commit in progress, then this transaction might get committed
and freed via jbd2_journal_commit_transaction() ->
jbd2_journal_free_transaction(), when we release j_state_lock.
So check for jou... | 0 | void jbd2_journal_wait_updates(journal_t *journal)
{
DEFINE_WAIT(wait);
while (1) {
/*
* Note that the running transaction can get freed under us if
* this transaction is getting committed in
* jbd2_journal_commit_transaction() ->
* jbd2_journal_free_transaction(). This can only happen when we
* rel... | 8,887,012,106,075,676,000,000,000,000,000,000,000 | transaction.c | 230,170,887,751,092,620,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2022-28796 | jbd2_journal_wait_updates in fs/jbd2/transaction.c in the Linux kernel before 5.17.1 has a use-after-free caused by a transaction_t race condition. | https://nvd.nist.gov/vuln/detail/CVE-2022-28796 |
204,572 | gimp | eb2980683e6472aff35a3117587c4f814515c74d | https://github.com/GNOME/gimp | https://git.gnome.org/browse/gimp/commit/?id=eb2980683e6472aff35a3117587c4f814515c74d | Bug 790853 - (CVE-2017-17787) heap overread in psp importer.
As any external data, we have to check that strings being read at fixed
length are properly nul-terminated. | 1 | read_creator_block (FILE *f,
gint image_ID,
guint total_len,
PSPimage *ia)
{
long data_start;
guchar buf[4];
guint16 keyword;
guint32 length;
gchar *string;
gchar *title = NULL, *artist = NULL,... | 162,156,423,216,684,250,000,000,000,000,000,000,000 | file-psp.c | 130,121,853,822,943,490,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-17787 | In GIMP 2.8.22, there is a heap-based buffer over-read in read_creator_block in plug-ins/common/file-psp.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-17787 |
362,049 | gimp | eb2980683e6472aff35a3117587c4f814515c74d | https://github.com/GNOME/gimp | https://git.gnome.org/browse/gimp/commit/?id=eb2980683e6472aff35a3117587c4f814515c74d | Bug 790853 - (CVE-2017-17787) heap overread in psp importer.
As any external data, we have to check that strings being read at fixed
length are properly nul-terminated. | 0 | read_creator_block (FILE *f,
gint image_ID,
guint total_len,
PSPimage *ia)
{
long data_start;
guchar buf[4];
guint16 keyword;
guint32 length;
gchar *string;
gchar *title = NULL, *artist = NULL,... | 327,840,264,535,573,300,000,000,000,000,000,000,000 | file-psp.c | 264,892,542,288,040,270,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-17787 | In GIMP 2.8.22, there is a heap-based buffer over-read in read_creator_block in plug-ins/common/file-psp.c. | https://nvd.nist.gov/vuln/detail/CVE-2017-17787 |
204,573 | libgadu | 6516e57766b4fa39d1c5b37379ea72a330598a13 | https://github.com/wojtekka/libgadu | https://github.com/wojtekka/libgadu/commit/6516e57766b4fa39d1c5b37379ea72a330598a13 | Poprawna weryfikacja certyfikatu za pomocą GnuTLS. | 1 | static gg_action_t gg_handle_tls_negotiation(struct gg_session *sess, struct gg_event *e, enum gg_state_t next_state, enum gg_state_t alt_state, enum gg_state_t alt2_state)
{
int valid_hostname = 0;
#ifdef GG_CONFIG_HAVE_GNUTLS
unsigned int status;
int res;
gg_debug_session(sess, GG_DEBUG_MISC, "// gg_watch_fd() ... | 292,990,818,534,513,080,000,000,000,000,000,000,000 | events.c | 283,377,934,380,487,020,000,000,000,000,000,000,000 | [
"CWE-310"
] | CVE-2013-4488 | libgadu before 1.12.0 does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers. | https://nvd.nist.gov/vuln/detail/CVE-2013-4488 |
362,058 | libgadu | 6516e57766b4fa39d1c5b37379ea72a330598a13 | https://github.com/wojtekka/libgadu | https://github.com/wojtekka/libgadu/commit/6516e57766b4fa39d1c5b37379ea72a330598a13 | Poprawna weryfikacja certyfikatu za pomocą GnuTLS. | 0 | static gg_action_t gg_handle_tls_negotiation(struct gg_session *sess, struct gg_event *e, enum gg_state_t next_state, enum gg_state_t alt_state, enum gg_state_t alt2_state)
{
int valid_hostname = 0;
#ifdef GG_CONFIG_HAVE_GNUTLS
unsigned int status;
int res;
gg_debug_session(sess, GG_DEBUG_MISC, "// gg_watch_fd() ... | 337,809,500,543,936,400,000,000,000,000,000,000,000 | events.c | 157,258,061,940,359,740,000,000,000,000,000,000,000 | [
"CWE-310"
] | CVE-2013-4488 | libgadu before 1.12.0 does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers. | https://nvd.nist.gov/vuln/detail/CVE-2013-4488 |
204,605 | cpython | dcfcd146f8e6fc5c2fc16a4c192a0c5f5ca8c53c | https://github.com/python/cpython | https://github.com/python/cpython/commit/dcfcd146f8e6fc5c2fc16a4c192a0c5f5ca8c53c | bpo-35766: Merge typed_ast back into CPython (GH-11645) | 1 | ast_for_arguments(struct compiling *c, const node *n)
{
/* This function handles both typedargslist (function definition)
and varargslist (lambda definition).
parameters: '(' [typedargslist] ')'
typedargslist: (tfpdef ['=' test] (',' tfpdef ['=' test])* [',' [
'*' [tfpdef] (',' ... | 97,374,446,448,889,440,000,000,000,000,000,000,000 | ast.c | 65,549,193,664,576,065,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-19275 | typed_ast 1.3.0 and 1.3.1 has an ast_for_arguments out-of-bounds read. An attacker with the ability to cause a Python interpreter to parse Python source (but not necessarily execute it) may be able to crash the interpreter process. This could be a concern, for example, in a web-based service that parses (but does not e... | https://nvd.nist.gov/vuln/detail/CVE-2019-19275 |
362,554 | cpython | dcfcd146f8e6fc5c2fc16a4c192a0c5f5ca8c53c | https://github.com/python/cpython | https://github.com/python/cpython/commit/dcfcd146f8e6fc5c2fc16a4c192a0c5f5ca8c53c | bpo-35766: Merge typed_ast back into CPython (GH-11645) | 0 | ast_for_arguments(struct compiling *c, const node *n)
{
/* This function handles both typedargslist (function definition)
and varargslist (lambda definition).
parameters: '(' [typedargslist] ')'
typedargslist: (tfpdef ['=' test] (',' tfpdef ['=' test])* [',' [
'*' [tfpdef] (',' ... | 167,259,170,410,004,540,000,000,000,000,000,000,000 | ast.c | 16,141,127,940,571,282,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-19275 | typed_ast 1.3.0 and 1.3.1 has an ast_for_arguments out-of-bounds read. An attacker with the ability to cause a Python interpreter to parse Python source (but not necessarily execute it) may be able to crash the interpreter process. This could be a concern, for example, in a web-based service that parses (but does not e... | https://nvd.nist.gov/vuln/detail/CVE-2019-19275 |
204,606 | cpython | dcfcd146f8e6fc5c2fc16a4c192a0c5f5ca8c53c | https://github.com/python/cpython | https://github.com/python/cpython/commit/dcfcd146f8e6fc5c2fc16a4c192a0c5f5ca8c53c | bpo-35766: Merge typed_ast back into CPython (GH-11645) | 1 | handle_keywordonly_args(struct compiling *c, const node *n, int start,
asdl_seq *kwonlyargs, asdl_seq *kwdefaults)
{
PyObject *argname;
node *ch;
expr_ty expression, annotation;
arg_ty arg;
int i = start;
int j = 0; /* index for kwdefaults and kwonlyargs */
if (kwonl... | 235,541,165,412,339,950,000,000,000,000,000,000,000 | ast.c | 65,549,193,664,576,065,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-19275 | typed_ast 1.3.0 and 1.3.1 has an ast_for_arguments out-of-bounds read. An attacker with the ability to cause a Python interpreter to parse Python source (but not necessarily execute it) may be able to crash the interpreter process. This could be a concern, for example, in a web-based service that parses (but does not e... | https://nvd.nist.gov/vuln/detail/CVE-2019-19275 |
362,759 | cpython | dcfcd146f8e6fc5c2fc16a4c192a0c5f5ca8c53c | https://github.com/python/cpython | https://github.com/python/cpython/commit/dcfcd146f8e6fc5c2fc16a4c192a0c5f5ca8c53c | bpo-35766: Merge typed_ast back into CPython (GH-11645) | 0 | handle_keywordonly_args(struct compiling *c, const node *n, int start,
asdl_seq *kwonlyargs, asdl_seq *kwdefaults)
{
PyObject *argname;
node *ch;
expr_ty expression, annotation;
arg_ty arg;
int i = start;
int j = 0; /* index for kwdefaults and kwonlyargs */
if (kwonl... | 185,173,257,932,842,560,000,000,000,000,000,000,000 | ast.c | 16,141,127,940,571,282,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-19275 | typed_ast 1.3.0 and 1.3.1 has an ast_for_arguments out-of-bounds read. An attacker with the ability to cause a Python interpreter to parse Python source (but not necessarily execute it) may be able to crash the interpreter process. This could be a concern, for example, in a web-based service that parses (but does not e... | https://nvd.nist.gov/vuln/detail/CVE-2019-19275 |
204,640 | ovs | 78e712c0b1dacc2f12d2a03d98f083d8672867f0 | https://github.com/openvswitch/ovs | https://github.com/openvswitch/ovs/commit/78e712c0b1dacc2f12d2a03d98f083d8672867f0 | lldp: do not leak memory on multiple instances of TLVs
Upstream commit:
commit a8d3c90feca548fc0656d95b5d278713db86ff61
Date: Tue, 17 Nov 2020 09:28:17 -0500
lldp: avoid memory leak from bad packets
A packet that contains multiple instances of certain TLVs will cause
lldpd to continually allocate... | 1 | lldp_decode(struct lldpd *cfg OVS_UNUSED, char *frame, int s,
struct lldpd_hardware *hardware, struct lldpd_chassis **newchassis,
struct lldpd_port **newport)
{
struct lldpd_chassis *chassis;
struct lldpd_port *port;
const struct eth_addr lldpaddr = LLDP_MULTICAST_ADDR;
const cha... | 242,615,569,337,244,400,000,000,000,000,000,000,000 | lldp.c | 246,107,048,674,418,260,000,000,000,000,000,000,000 | [
"CWE-400"
] | CVE-2020-27827 | A flaw was found in multiple versions of OpenvSwitch. Specially crafted LLDP packets can cause memory to be lost when allocating data to handle specific optional TLVs, potentially causing a denial of service. The highest threat from this vulnerability is to system availability. | https://nvd.nist.gov/vuln/detail/CVE-2020-27827 |
362,864 | ovs | 78e712c0b1dacc2f12d2a03d98f083d8672867f0 | https://github.com/openvswitch/ovs | https://github.com/openvswitch/ovs/commit/78e712c0b1dacc2f12d2a03d98f083d8672867f0 | lldp: do not leak memory on multiple instances of TLVs
Upstream commit:
commit a8d3c90feca548fc0656d95b5d278713db86ff61
Date: Tue, 17 Nov 2020 09:28:17 -0500
lldp: avoid memory leak from bad packets
A packet that contains multiple instances of certain TLVs will cause
lldpd to continually allocate... | 0 | lldp_decode(struct lldpd *cfg OVS_UNUSED, char *frame, int s,
struct lldpd_hardware *hardware, struct lldpd_chassis **newchassis,
struct lldpd_port **newport)
{
struct lldpd_chassis *chassis;
struct lldpd_port *port;
const struct eth_addr lldpaddr = LLDP_MULTICAST_ADDR;
const cha... | 36,570,509,236,460,337,000,000,000,000,000,000,000 | lldp.c | 31,128,373,072,676,173,000,000,000,000,000,000,000 | [
"CWE-400"
] | CVE-2020-27827 | A flaw was found in multiple versions of OpenvSwitch. Specially crafted LLDP packets can cause memory to be lost when allocating data to handle specific optional TLVs, potentially causing a denial of service. The highest threat from this vulnerability is to system availability. | https://nvd.nist.gov/vuln/detail/CVE-2020-27827 |
204,650 | squid | dfd818595b54942cb1adc45f6aed95c9b706e3a8 | https://github.com/squid-cache/squid | https://github.com/squid-cache/squid/commit/dfd818595b54942cb1adc45f6aed95c9b706e3a8 | Merge pull request from GHSA-jvf6-h9gj-pmj6
* Add slash prefix to path-rootless or path-noscheme URLs
* Update src/anyp/Uri.cc
Co-authored-by: Alex Rousskov <rousskov@measurement-factory.com>
* restore file trailer GH auto-removes
* Remove redundant path-empty check
* Removed stale comment left behind by b2ab59a
... | 1 | AnyP::Uri::parse(const HttpRequestMethod& method, const SBuf &rawUrl)
{
try {
LOCAL_ARRAY(char, login, MAX_URL);
LOCAL_ARRAY(char, foundHost, MAX_URL);
LOCAL_ARRAY(char, urlpath, MAX_URL);
char *t = NULL;
char *q = NULL;
int foundPort;
int l;
int i;
... | 193,190,235,646,939,130,000,000,000,000,000,000,000 | Uri.cc | 197,215,166,910,062,160,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2020-25097 | An issue was discovered in Squid through 4.13 and 5.x through 5.0.4. Due to improper input validation, it allows a trusted client to perform HTTP Request Smuggling and access services otherwise forbidden by the security controls. This occurs for certain uri_whitespace configuration settings. | https://nvd.nist.gov/vuln/detail/CVE-2020-25097 |
362,946 | squid | dfd818595b54942cb1adc45f6aed95c9b706e3a8 | https://github.com/squid-cache/squid | https://github.com/squid-cache/squid/commit/dfd818595b54942cb1adc45f6aed95c9b706e3a8 | Merge pull request from GHSA-jvf6-h9gj-pmj6
* Add slash prefix to path-rootless or path-noscheme URLs
* Update src/anyp/Uri.cc
Co-authored-by: Alex Rousskov <rousskov@measurement-factory.com>
* restore file trailer GH auto-removes
* Remove redundant path-empty check
* Removed stale comment left behind by b2ab59a
... | 0 | AnyP::Uri::parse(const HttpRequestMethod& method, const SBuf &rawUrl)
{
try {
LOCAL_ARRAY(char, login, MAX_URL);
LOCAL_ARRAY(char, foundHost, MAX_URL);
LOCAL_ARRAY(char, urlpath, MAX_URL);
char *t = NULL;
char *q = NULL;
int foundPort;
int l;
int i;
... | 291,676,000,631,490,700,000,000,000,000,000,000,000 | Uri.cc | 67,809,856,326,610,510,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2020-25097 | An issue was discovered in Squid through 4.13 and 5.x through 5.0.4. Due to improper input validation, it allows a trusted client to perform HTTP Request Smuggling and access services otherwise forbidden by the security controls. This occurs for certain uri_whitespace configuration settings. | https://nvd.nist.gov/vuln/detail/CVE-2020-25097 |
204,653 | systemd | bf65b7e0c9fc215897b676ab9a7c9d1c688143ba | https://github.com/systemd/systemd | https://github.com/systemd/systemd/commit/bf65b7e0c9fc215897b676ab9a7c9d1c688143ba | core: imply NNP and SUID/SGID restriction for DynamicUser=yes service
Let's be safe, rather than sorry. This way DynamicUser=yes services can
neither take benefit of, nor create SUID/SGID binaries.
Given that DynamicUser= is a recent addition only we should be able to
get away with turning this on, even though this i... | 1 | int unit_patch_contexts(Unit *u) {
CGroupContext *cc;
ExecContext *ec;
unsigned i;
int r;
assert(u);
/* Patch in the manager defaults into the exec and cgroup
* contexts, _after_ the rest of the settings have been
* initialized */
ec = unit_ge... | 280,700,732,805,838,780,000,000,000,000,000,000,000 | unit.c | 310,790,837,500,255,400,000,000,000,000,000,000,000 | [
"CWE-269"
] | CVE-2019-3843 | It was discovered that a systemd service that uses DynamicUser property can create a SUID/SGID binary that would be allowed to run as the transient service UID/GID even after the service is terminated. A local attacker may use this flaw to access resources that will be owned by a potentially different service in the fu... | https://nvd.nist.gov/vuln/detail/CVE-2019-3843 |
363,147 | systemd | bf65b7e0c9fc215897b676ab9a7c9d1c688143ba | https://github.com/systemd/systemd | https://github.com/systemd/systemd/commit/bf65b7e0c9fc215897b676ab9a7c9d1c688143ba | core: imply NNP and SUID/SGID restriction for DynamicUser=yes service
Let's be safe, rather than sorry. This way DynamicUser=yes services can
neither take benefit of, nor create SUID/SGID binaries.
Given that DynamicUser= is a recent addition only we should be able to
get away with turning this on, even though this i... | 0 | int unit_patch_contexts(Unit *u) {
CGroupContext *cc;
ExecContext *ec;
unsigned i;
int r;
assert(u);
/* Patch in the manager defaults into the exec and cgroup
* contexts, _after_ the rest of the settings have been
* initialized */
ec = unit_ge... | 259,827,188,005,672,400,000,000,000,000,000,000,000 | unit.c | 154,625,650,264,828,200,000,000,000,000,000,000,000 | [
"CWE-269"
] | CVE-2019-3843 | It was discovered that a systemd service that uses DynamicUser property can create a SUID/SGID binary that would be allowed to run as the transient service UID/GID even after the service is terminated. A local attacker may use this flaw to access resources that will be owned by a potentially different service in the fu... | https://nvd.nist.gov/vuln/detail/CVE-2019-3843 |
204,656 | linux | 6d4472d7bec39917b54e4e80245784ea5d60ce49 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6d4472d7bec39917b54e4e80245784ea5d60ce49 | HID: hiddev: do cleanup in failure of opening a device
Undo what we did for opening before releasing the memory slice.
Reported-by: syzbot <syzbot+62a1e04fd3ec2abf099e@syzkaller.appspotmail.com>
Cc: Andrey Konovalov <andreyknvl@google.com>
Signed-off-by: Hillf Danton <hdanton@sina.com>
Signed-off-by: Jiri Kosina <jko... | 1 | static int hiddev_open(struct inode *inode, struct file *file)
{
struct hiddev_list *list;
struct usb_interface *intf;
struct hid_device *hid;
struct hiddev *hiddev;
int res;
intf = usbhid_find_interface(iminor(inode));
if (!intf)
return -ENODEV;
hid = usb_get_intfdata(intf);
hiddev = hid->hiddev;
if (!(l... | 91,471,645,827,445,030,000,000,000,000,000,000,000 | hiddev.c | 287,820,702,768,880,070,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2019-19527 | In the Linux kernel before 5.2.10, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver, aka CID-9c09b214f30e. | https://nvd.nist.gov/vuln/detail/CVE-2019-19527 |
363,234 | linux | 6d4472d7bec39917b54e4e80245784ea5d60ce49 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6d4472d7bec39917b54e4e80245784ea5d60ce49 | HID: hiddev: do cleanup in failure of opening a device
Undo what we did for opening before releasing the memory slice.
Reported-by: syzbot <syzbot+62a1e04fd3ec2abf099e@syzkaller.appspotmail.com>
Cc: Andrey Konovalov <andreyknvl@google.com>
Signed-off-by: Hillf Danton <hdanton@sina.com>
Signed-off-by: Jiri Kosina <jko... | 0 | static int hiddev_open(struct inode *inode, struct file *file)
{
struct hiddev_list *list;
struct usb_interface *intf;
struct hid_device *hid;
struct hiddev *hiddev;
int res;
intf = usbhid_find_interface(iminor(inode));
if (!intf)
return -ENODEV;
hid = usb_get_intfdata(intf);
hiddev = hid->hiddev;
if (!(l... | 302,185,486,399,060,830,000,000,000,000,000,000,000 | hiddev.c | 195,514,613,196,533,500,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2019-19527 | In the Linux kernel before 5.2.10, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver, aka CID-9c09b214f30e. | https://nvd.nist.gov/vuln/detail/CVE-2019-19527 |
204,658 | php-src | 055ecbc62878e86287d742c7246c21606cee8183 | https://github.com/php/php-src | http://git.php.net/?p=php-src.git;a=commit;h=055ecbc62878e86287d742c7246c21606cee8183 | Improve check for :memory: pseudo-filename in SQlite | 1 | static char *make_filename_safe(const char *filename TSRMLS_DC)
{
if (*filename && strncmp(filename, ":memory:", sizeof(":memory:")-1)) {
char *fullpath = expand_filepath(filename, NULL TSRMLS_CC);
if (!fullpath) {
return NULL;
}
if (PG(safe_mode) && (!php_checkuid(fullpath, NULL, CHECKUID_CHECK_FILE_AND_... | 324,775,140,844,881,860,000,000,000,000,000,000,000 | sqlite_driver.c | 176,008,426,583,328,480,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2012-3365 | The SQLite functionality in PHP before 5.3.15 allows remote attackers to bypass the open_basedir protection mechanism via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2012-3365 |
363,249 | php-src | 055ecbc62878e86287d742c7246c21606cee8183 | https://github.com/php/php-src | http://git.php.net/?p=php-src.git;a=commit;h=055ecbc62878e86287d742c7246c21606cee8183 | Improve check for :memory: pseudo-filename in SQlite | 0 | static char *make_filename_safe(const char *filename TSRMLS_DC)
{
if (*filename && memcmp(filename, ":memory:", sizeof(":memory:"))) {
char *fullpath = expand_filepath(filename, NULL TSRMLS_CC);
if (!fullpath) {
return NULL;
}
if (PG(safe_mode) && (!php_checkuid(fullpath, NULL, CHECKUID_CHECK_FILE_AND_DIR... | 268,189,260,133,363,730,000,000,000,000,000,000,000 | sqlite_driver.c | 11,079,402,582,408,056,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2012-3365 | The SQLite functionality in PHP before 5.3.15 allows remote attackers to bypass the open_basedir protection mechanism via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2012-3365 |
204,673 | openldap | 67670f4544e28fb09eb7319c39f404e1d3229e65 | https://github.com/openldap/openldap | https://git.openldap.org/openldap/openldap/-/commit/67670f4544e28fb09eb7319c39f404e1d3229e65 | ITS#9383 remove assert in certificateListValidate | 1 | certificateListValidate( Syntax *syntax, struct berval *in )
{
BerElementBuffer berbuf;
BerElement *ber = (BerElement *)&berbuf;
ber_tag_t tag;
ber_len_t len, wrapper_len;
char *wrapper_start;
int wrapper_ok = 0;
ber_int_t version = SLAP_X509_V1;
struct berval bvdn, bvtu;
ber_init2( ber, in, LBER_USE_DER );
... | 141,392,942,817,050,540,000,000,000,000,000,000,000 | schema_init.c | 324,889,549,138,247,480,000,000,000,000,000,000,000 | [
"CWE-617"
] | CVE-2020-25709 | A flaw was found in OpenLDAP. This flaw allows an attacker who can send a malicious packet to be processed by OpenLDAP’s slapd server, to trigger an assertion failure. The highest threat from this vulnerability is to system availability. | https://nvd.nist.gov/vuln/detail/CVE-2020-25709 |
363,447 | openldap | 67670f4544e28fb09eb7319c39f404e1d3229e65 | https://github.com/openldap/openldap | https://git.openldap.org/openldap/openldap/-/commit/67670f4544e28fb09eb7319c39f404e1d3229e65 | ITS#9383 remove assert in certificateListValidate | 0 | certificateListValidate( Syntax *syntax, struct berval *in )
{
BerElementBuffer berbuf;
BerElement *ber = (BerElement *)&berbuf;
ber_tag_t tag;
ber_len_t len, wrapper_len;
char *wrapper_start;
int wrapper_ok = 0;
ber_int_t version = SLAP_X509_V1;
struct berval bvdn, bvtu;
ber_init2( ber, in, LBER_USE_DER );
... | 163,411,005,984,478,810,000,000,000,000,000,000,000 | schema_init.c | 178,853,289,235,310,460,000,000,000,000,000,000,000 | [
"CWE-617"
] | CVE-2020-25709 | A flaw was found in OpenLDAP. This flaw allows an attacker who can send a malicious packet to be processed by OpenLDAP’s slapd server, to trigger an assertion failure. The highest threat from this vulnerability is to system availability. | https://nvd.nist.gov/vuln/detail/CVE-2020-25709 |
204,674 | pam-u2f | aab0c31a3bfed8912a271685d6ec909f61380155 | https://github.com/Yubico/pam-u2f | https://github.com/Yubico/pam-u2f/commit/aab0c31a3bfed8912a271685d6ec909f61380155 | Fix out-of-bound accesses | 1 | int get_devices_from_authfile(const char *authfile, const char *username,
unsigned max_devs, int verbose, FILE *debug_file,
device_t *devices, unsigned *n_devs) {
char *buf = NULL;
char *s_user, *s_token;
int retval = 0;
int fd = -1;
struct stat st;... | 249,374,239,051,246,100,000,000,000,000,000,000,000 | util.c | 220,179,366,542,057,640,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2019-1221 | A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka 'Scripting Engine Memory Corruption Vulnerability'. | https://nvd.nist.gov/vuln/detail/CVE-2019-1221 |
363,467 | pam-u2f | aab0c31a3bfed8912a271685d6ec909f61380155 | https://github.com/Yubico/pam-u2f | https://github.com/Yubico/pam-u2f/commit/aab0c31a3bfed8912a271685d6ec909f61380155 | Fix out-of-bound accesses | 0 | int get_devices_from_authfile(const char *authfile, const char *username,
unsigned max_devs, int verbose, FILE *debug_file,
device_t *devices, unsigned *n_devs) {
char *buf = NULL;
char *s_user, *s_token;
int retval = 0;
int fd = -1;
struct stat st;... | 177,981,443,034,127,860,000,000,000,000,000,000,000 | util.c | 52,295,953,408,258,680,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2019-1221 | A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka 'Scripting Engine Memory Corruption Vulnerability'. | https://nvd.nist.gov/vuln/detail/CVE-2019-1221 |
204,675 | openjpeg | 8f9cc62b3f9a1da9712329ddcedb9750d585505c | https://github.com/uclouvain/openjpeg | https://github.com/uclouvain/openjpeg/commit/8f9cc62b3f9a1da9712329ddcedb9750d585505c | Fix division by zero
Fix uclouvain/openjpeg#733 | 1 | static INLINE OPJ_BOOL opj_tcd_init_tile(opj_tcd_t *p_tcd, OPJ_UINT32 p_tile_no, OPJ_BOOL isEncoder, OPJ_FLOAT32 fraction, OPJ_SIZE_T sizeof_block, opj_event_mgr_t* manager)
{
OPJ_UINT32 (*l_gain_ptr)(OPJ_UINT32) = 00;
OPJ_UINT32 compno, resno, bandno, precno, cblkno;
opj_tcp_t * l_tcp = 00;
opj_cp_t * l_cp = 00;
... | 246,090,537,600,594,740,000,000,000,000,000,000,000 | tcd.c | 322,377,989,703,889,840,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2016-4797 | Divide-by-zero vulnerability in the opj_tcd_init_tile function in tcd.c in OpenJPEG before 2.1.1 allows remote attackers to cause a denial of service (application crash) via a crafted jp2 file. NOTE: this issue exists because of an incorrect fix for CVE-2014-7947. | https://nvd.nist.gov/vuln/detail/CVE-2016-4797 |
363,473 | openjpeg | 8f9cc62b3f9a1da9712329ddcedb9750d585505c | https://github.com/uclouvain/openjpeg | https://github.com/uclouvain/openjpeg/commit/8f9cc62b3f9a1da9712329ddcedb9750d585505c | Fix division by zero
Fix uclouvain/openjpeg#733 | 0 | static INLINE OPJ_BOOL opj_tcd_init_tile(opj_tcd_t *p_tcd, OPJ_UINT32 p_tile_no, OPJ_BOOL isEncoder, OPJ_FLOAT32 fraction, OPJ_SIZE_T sizeof_block, opj_event_mgr_t* manager)
{
OPJ_UINT32 (*l_gain_ptr)(OPJ_UINT32) = 00;
OPJ_UINT32 compno, resno, bandno, precno, cblkno;
opj_tcp_t * l_tcp = 00;
opj_cp_t * l_cp = 00;
... | 313,450,423,511,780,500,000,000,000,000,000,000,000 | tcd.c | 109,967,869,699,096,820,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2016-4797 | Divide-by-zero vulnerability in the opj_tcd_init_tile function in tcd.c in OpenJPEG before 2.1.1 allows remote attackers to cause a denial of service (application crash) via a crafted jp2 file. NOTE: this issue exists because of an incorrect fix for CVE-2014-7947. | https://nvd.nist.gov/vuln/detail/CVE-2016-4797 |
204,707 | linux | 56cd26b618855c9af48c8301aa6754ced8dd0beb | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=56cd26b618855c9af48c8301aa6754ced8dd0beb | media: serial_ir: Fix use-after-free in serial_ir_init_module
Syzkaller report this:
BUG: KASAN: use-after-free in sysfs_remove_file_ns+0x5f/0x70 fs/sysfs/file.c:468
Read of size 8 at addr ffff8881dc7ae030 by task syz-executor.0/6249
CPU: 1 PID: 6249 Comm: syz-executor.0 Not tainted 5.0.0-rc8+ #3
Hardware name: QEMU... | 1 | static int __init serial_ir_init_module(void)
{
int result;
switch (type) {
case IR_HOMEBREW:
case IR_IRDEO:
case IR_IRDEO_REMOTE:
case IR_ANIMAX:
case IR_IGOR:
/* if nothing specified, use ttyS0/com1 and irq 4 */
io = io ? io : 0x3f8;
irq = irq ? irq : 4;
break;
default:
return -EINVAL;
}
if (!sof... | 277,875,762,275,747,300,000,000,000,000,000,000,000 | serial_ir.c | 90,841,396,646,188,770,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2019-19543 | In the Linux kernel before 5.1.6, there is a use-after-free in serial_ir_init_module() in drivers/media/rc/serial_ir.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-19543 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.