idx
int64
project
string
commit_id
string
project_url
string
commit_url
string
commit_message
string
target
int64
func
string
func_hash
float64
file_name
string
file_hash
float64
cwe
list
cve
string
cve_desc
string
nvd_url
string
355,609
php-src
4e3f55c36272a5f29b50e1924b78e9db1b23f214
https://github.com/php/php-src
http://git.php.net/?p=php-src.git;a=commit;h=4e3f55c36272a5f29b50e1924b78e9db1b23f214
Fix bug #74782: remove file name from output to avoid XSS (cherry picked from commit 73ca9b37731dd9690ffd9706333b17eaf90ea091)
0
static inline zend_string* phar_get_stub(const char *index_php, const char *web, const int name_len, const int web_len) { static const char newstub0[] = "<?php\n\n$web = '"; static const char newstub1_0[] = "';\n\nif (in_array('phar', stream_get_wrappers()) && class_exists('Phar', 0)) {\nPhar::interceptFileFuncs();\n...
104,816,228,716,268,190,000,000,000,000,000,000,000
stub.h
323,806,704,335,969,200,000,000,000,000,000,000,000
[ "CWE-79" ]
CVE-2018-5712
An issue was discovered in PHP before 5.6.33, 7.0.x before 7.0.27, 7.1.x before 7.1.13, and 7.2.x before 7.2.1. There is Reflected XSS on the PHAR 404 error page via the URI of a request for a .phar file.
https://nvd.nist.gov/vuln/detail/CVE-2018-5712
204,242
yubico-pam
4712da70cac159d5ca9579c1e4fac0645b674043
https://github.com/Yubico/yubico-pam
https://github.com/Yubico/yubico-pam/commit/4712da70cac159d5ca9579c1e4fac0645b674043
Fix big security hole: Authentication succeeded when no password was given, unless use_first_pass was being used. This is fatal if pam_yubico is considered 'sufficient' in the PAM configuration. Signed-off-by: Nanakos Chrysostomos <nanakos@wired-net.gr>
1
pam_sm_authenticate (pam_handle_t * pamh, int flags, int argc, const char **argv) { int retval, rc; const char *user = NULL; const char *password = NULL; char otp[MAX_TOKEN_ID_LEN + TOKEN_OTP_LEN + 1] = { 0 }; char otp_id[MAX_TOKEN_ID_LEN + 1] = { 0 }; int password_len = 0; int skip_bytes = 0; in...
138,529,777,757,121,140,000,000,000,000,000,000,000
pam_yubico.c
74,605,852,225,679,310,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-4120
Yubico PAM Module before 2.10 performed user authentication when 'use_first_pass' PAM configuration option was not used and the module was configured as 'sufficient' in the PAM configuration. A remote attacker could use this flaw to circumvent common authentication process and obtain access to the account in question b...
https://nvd.nist.gov/vuln/detail/CVE-2011-4120
355,614
yubico-pam
4712da70cac159d5ca9579c1e4fac0645b674043
https://github.com/Yubico/yubico-pam
https://github.com/Yubico/yubico-pam/commit/4712da70cac159d5ca9579c1e4fac0645b674043
Fix big security hole: Authentication succeeded when no password was given, unless use_first_pass was being used. This is fatal if pam_yubico is considered 'sufficient' in the PAM configuration. Signed-off-by: Nanakos Chrysostomos <nanakos@wired-net.gr>
0
pam_sm_authenticate (pam_handle_t * pamh, int flags, int argc, const char **argv) { int retval, rc; const char *user = NULL; const char *password = NULL; char otp[MAX_TOKEN_ID_LEN + TOKEN_OTP_LEN + 1] = { 0 }; char otp_id[MAX_TOKEN_ID_LEN + 1] = { 0 }; int password_len = 0; int skip_bytes = 0; in...
208,567,745,080,423,880,000,000,000,000,000,000,000
pam_yubico.c
19,322,281,424,988,952,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2011-4120
Yubico PAM Module before 2.10 performed user authentication when 'use_first_pass' PAM configuration option was not used and the module was configured as 'sufficient' in the PAM configuration. A remote attacker could use this flaw to circumvent common authentication process and obtain access to the account in question b...
https://nvd.nist.gov/vuln/detail/CVE-2011-4120
204,244
php-src
a5b5743d71fbd5ae944469a1ca443a1cdb30663a
https://github.com/php/php-src
https://github.com/php/php-src/commit/a5b5743d71fbd5ae944469a1ca443a1cdb30663a
full_special_chars filter from trunk - approved by johannes
1
PHP_MINIT_FUNCTION(filter) { ZEND_INIT_MODULE_GLOBALS(filter, php_filter_init_globals, NULL); REGISTER_INI_ENTRIES(); REGISTER_LONG_CONSTANT("INPUT_POST", PARSE_POST, CONST_CS | CONST_PERSISTENT); REGISTER_LONG_CONSTANT("INPUT_GET", PARSE_GET, CONST_CS | CONST_PERSISTENT); REGISTER_LONG_CONSTANT("INPUT_COOKIE...
332,502,161,493,279,800,000,000,000,000,000,000,000
filter.c
210,305,300,128,755,620,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2016-5095
Integer overflow in the php_escape_html_entities_ex function in ext/standard/html.c in PHP before 5.5.36 and 5.6.x before 5.6.22 allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering a large output string from a FILTER_SANITIZE_FULL_SPECIAL_CHARS filter_var call. ...
https://nvd.nist.gov/vuln/detail/CVE-2016-5095
355,672
php-src
a5b5743d71fbd5ae944469a1ca443a1cdb30663a
https://github.com/php/php-src
https://github.com/php/php-src/commit/a5b5743d71fbd5ae944469a1ca443a1cdb30663a
full_special_chars filter from trunk - approved by johannes
0
PHP_MINIT_FUNCTION(filter) { ZEND_INIT_MODULE_GLOBALS(filter, php_filter_init_globals, NULL); REGISTER_INI_ENTRIES(); REGISTER_LONG_CONSTANT("INPUT_POST", PARSE_POST, CONST_CS | CONST_PERSISTENT); REGISTER_LONG_CONSTANT("INPUT_GET", PARSE_GET, CONST_CS | CONST_PERSISTENT); REGISTER_LONG_CONSTANT("INPUT_COOKIE...
226,197,242,815,115,700,000,000,000,000,000,000,000
filter.c
196,276,222,118,802,440,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2016-5095
Integer overflow in the php_escape_html_entities_ex function in ext/standard/html.c in PHP before 5.5.36 and 5.6.x before 5.6.22 allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering a large output string from a FILTER_SANITIZE_FULL_SPECIAL_CHARS filter_var call. ...
https://nvd.nist.gov/vuln/detail/CVE-2016-5095
204,282
exim
478effbfd9c3cc5a627fc671d4bf94d13670d65f
https://github.com/Exim/exim
https://git.exim.org/exim.git/commitdiff/478effbfd9c3cc5a627fc671d4bf94d13670d65f
Fix buffer overflow in string_vformat. Bug 2449
1
string_vformat(gstring * g, BOOL extend, const char *format, va_list ap) { enum ltypes { L_NORMAL=1, L_SHORT=2, L_LONG=3, L_LONGLONG=4, L_LONGDOUBLE=5, L_SIZE=6 }; int width, precision, off, lim; const char * fp = format; /* Deliberately not unsigned */ string_datestamp_offset = -1; /* Datestamp not inserted */ strin...
23,015,707,062,253,570,000,000,000,000,000,000,000
string.c
78,398,434,850,568,140,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2019-16928
Exim 4.92 through 4.92.2 allows remote code execution, a different vulnerability than CVE-2019-15846. There is a heap-based buffer overflow in string_vformat in string.c involving a long EHLO command.
https://nvd.nist.gov/vuln/detail/CVE-2019-16928
356,293
exim
478effbfd9c3cc5a627fc671d4bf94d13670d65f
https://github.com/Exim/exim
https://git.exim.org/exim.git/commitdiff/478effbfd9c3cc5a627fc671d4bf94d13670d65f
Fix buffer overflow in string_vformat. Bug 2449
0
string_vformat(gstring * g, BOOL extend, const char *format, va_list ap) { enum ltypes { L_NORMAL=1, L_SHORT=2, L_LONG=3, L_LONGLONG=4, L_LONGDOUBLE=5, L_SIZE=6 }; int width, precision, off, lim; const char * fp = format; /* Deliberately not unsigned */ string_datestamp_offset = -1; /* Datestamp not inserted */ strin...
90,140,313,913,360,130,000,000,000,000,000,000,000
string.c
106,566,145,984,384,730,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2019-16928
Exim 4.92 through 4.92.2 allows remote code execution, a different vulnerability than CVE-2019-15846. There is a heap-based buffer overflow in string_vformat in string.c involving a long EHLO command.
https://nvd.nist.gov/vuln/detail/CVE-2019-16928
204,286
ImageMagick6
0812674565df667b1b3e4122ad259096de311c6c
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/0812674565df667b1b3e4122ad259096de311c6c
https://github.com/ImageMagick/ImageMagick/issues/1190
1
static ssize_t parse8BIM(Image *ifile, Image *ofile) { char brkused, quoted, *line, *token, *newstr, *name; int state, next; unsigned char dataset; unsigned int recnum; int inputlen = MaxTextExtent; MagickOffsetType savedpos, currentpos; ssize_t ...
159,938,636,425,570,140,000,000,000,000,000,000,000
meta.c
44,549,602,892,344,090,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2018-14437
ImageMagick 7.0.8-4 has a memory leak in parse8BIM in coders/meta.c.
https://nvd.nist.gov/vuln/detail/CVE-2018-14437
356,324
ImageMagick6
0812674565df667b1b3e4122ad259096de311c6c
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/0812674565df667b1b3e4122ad259096de311c6c
https://github.com/ImageMagick/ImageMagick/issues/1190
0
static ssize_t parse8BIMW(Image *ifile, Image *ofile) { char brkused, quoted, *line, *token, *newstr, *name; int state, next; unsigned char dataset; unsigned int recnum; int inputlen = MaxTextExtent; ssize_t savedolen = 0L, outputlen = 0L; MagickOf...
50,459,191,930,161,260,000,000,000,000,000,000,000
meta.c
44,549,602,892,344,090,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2018-14437
ImageMagick 7.0.8-4 has a memory leak in parse8BIM in coders/meta.c.
https://nvd.nist.gov/vuln/detail/CVE-2018-14437
204,289
radvd
7de1b9abf87b747ee2611c0d2a94dfeee79878b4
https://github.com/reubenhwk/radvd
https://github.com/reubenhwk/radvd/commit/7de1b9abf87b747ee2611c0d2a94dfeee79878b4
process_ra() has numerous missed len checks. It leads to buffer overreads.
1
process_ra(struct Interface *iface, unsigned char *msg, int len, struct sockaddr_in6 *addr) { struct nd_router_advert *radvert; char addr_str[INET6_ADDRSTRLEN]; uint8_t *opt_str; print_addr(&addr->sin6_addr, addr_str); radvert = (struct nd_router_advert *) msg; if ((radvert->nd_ra_curhoplimit && iface->AdvCur...
221,012,692,832,975,600,000,000,000,000,000,000,000
process.c
37,915,199,634,422,154,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2011-3604
The process_ra function in the router advertisement daemon (radvd) before 1.8.2 allows remote attackers to cause a denial of service (stack-based buffer over-read and crash) via unspecified vectors.
https://nvd.nist.gov/vuln/detail/CVE-2011-3604
356,431
radvd
7de1b9abf87b747ee2611c0d2a94dfeee79878b4
https://github.com/reubenhwk/radvd
https://github.com/reubenhwk/radvd/commit/7de1b9abf87b747ee2611c0d2a94dfeee79878b4
process_ra() has numerous missed len checks. It leads to buffer overreads.
0
process_ra(struct Interface *iface, unsigned char *msg, int len, struct sockaddr_in6 *addr) { struct nd_router_advert *radvert; char addr_str[INET6_ADDRSTRLEN]; uint8_t *opt_str; print_addr(&addr->sin6_addr, addr_str); radvert = (struct nd_router_advert *) msg; if ((radvert->nd_ra_curhoplimit && iface->AdvCur...
188,497,618,965,088,480,000,000,000,000,000,000,000
process.c
254,179,838,743,628,070,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2011-3604
The process_ra function in the router advertisement daemon (radvd) before 1.8.2 allows remote attackers to cause a denial of service (stack-based buffer over-read and crash) via unspecified vectors.
https://nvd.nist.gov/vuln/detail/CVE-2011-3604
204,290
hivex
4bbdf555f88baeae0fa804a369a81a83908bd705
https://github.com/libguestfs/hivex
https://github.com/libguestfs/hivex/commit/4bbdf555f88baeae0fa804a369a81a83908bd705
handle: Check that pages do not extend beyond the end of the file. Thanks: Mahmoud Al-Qudsi
1
hivex_open (const char *filename, int flags) { hive_h *h = NULL; assert (sizeof (struct ntreg_header) == 0x1000); assert (offsetof (struct ntreg_header, csum) == 0x1fc); h = calloc (1, sizeof *h); if (h == NULL) goto error; h->msglvl = flags & HIVEX_OPEN_MSGLVL_MASK; const char *debug = getenv ("H...
252,459,450,726,671,750,000,000,000,000,000,000,000
handle.c
187,703,003,512,499,230,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2014-9273
lib/handle.c in Hivex before 1.3.11 allows local users to execute arbitrary code and gain privileges via a small hive files, which triggers an out-of-bounds read or write.
https://nvd.nist.gov/vuln/detail/CVE-2014-9273
356,435
hivex
4bbdf555f88baeae0fa804a369a81a83908bd705
https://github.com/libguestfs/hivex
https://github.com/libguestfs/hivex/commit/4bbdf555f88baeae0fa804a369a81a83908bd705
handle: Check that pages do not extend beyond the end of the file. Thanks: Mahmoud Al-Qudsi
0
hivex_open (const char *filename, int flags) { hive_h *h = NULL; assert (sizeof (struct ntreg_header) == 0x1000); assert (offsetof (struct ntreg_header, csum) == 0x1fc); h = calloc (1, sizeof *h); if (h == NULL) goto error; h->msglvl = flags & HIVEX_OPEN_MSGLVL_MASK; const char *debug = getenv ("H...
145,530,614,496,879,400,000,000,000,000,000,000,000
handle.c
25,812,685,556,390,015,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2014-9273
lib/handle.c in Hivex before 1.3.11 allows local users to execute arbitrary code and gain privileges via a small hive files, which triggers an out-of-bounds read or write.
https://nvd.nist.gov/vuln/detail/CVE-2014-9273
204,321
openldap
4bdfffd2889c0c5cdf58bebafbdc8fce4bb2bff0
https://github.com/openldap/openldap
https://git.openldap.org/openldap/openldap/-/commit/4bdfffd2889c0c5cdf58bebafbdc8fce4bb2bff0
ITS#9425 add more checks to ldap_X509dn2bv
1
ldap_X509dn2bv( void *x509_name, struct berval *bv, LDAPDN_rewrite_func *func, unsigned flags ) { LDAPDN newDN; LDAPRDN newRDN; LDAPAVA *newAVA, *baseAVA; BerElementBuffer berbuf; BerElement *ber = (BerElement *)&berbuf; char oids[8192], *oidptr = oids, *oidbuf = NULL; void *ptrs[2048]; char *dn_end, *rdn_end;...
322,791,425,432,409,500,000,000,000,000,000,000,000
tls2.c
287,745,545,526,193,000,000,000,000,000,000,000,000
[ "CWE-843" ]
CVE-2020-36229
A flaw was discovered in ldap_X509dn2bv in OpenLDAP before 2.4.57 leading to a slapd crash in the X.509 DN parsing in ad_keystring, resulting in denial of service.
https://nvd.nist.gov/vuln/detail/CVE-2020-36229
356,675
openldap
4bdfffd2889c0c5cdf58bebafbdc8fce4bb2bff0
https://github.com/openldap/openldap
https://git.openldap.org/openldap/openldap/-/commit/4bdfffd2889c0c5cdf58bebafbdc8fce4bb2bff0
ITS#9425 add more checks to ldap_X509dn2bv
0
ldap_X509dn2bv( void *x509_name, struct berval *bv, LDAPDN_rewrite_func *func, unsigned flags ) { LDAPDN newDN; LDAPRDN newRDN; LDAPAVA *newAVA, *baseAVA; BerElementBuffer berbuf; BerElement *ber = (BerElement *)&berbuf; char oids[8192], *oidptr = oids, *oidbuf = NULL; void *ptrs[2048]; char *dn_end, *rdn_end;...
1,494,522,477,159,440,000,000,000,000,000,000,000
tls2.c
253,910,384,234,463,820,000,000,000,000,000,000,000
[ "CWE-843" ]
CVE-2020-36229
A flaw was discovered in ldap_X509dn2bv in OpenLDAP before 2.4.57 leading to a slapd crash in the X.509 DN parsing in ad_keystring, resulting in denial of service.
https://nvd.nist.gov/vuln/detail/CVE-2020-36229
204,325
libtorrent
ec30a5e9ec703afb8abefba757c6d401303b53db
https://github.com/arvidn/libtorrent
https://github.com/arvidn/libtorrent/commit/ec30a5e9ec703afb8abefba757c6d401303b53db
fix out-of-bounds read in bdecode Fixes #2099
1
int bdecode(char const* start, char const* end, bdecode_node& ret , error_code& ec, int* error_pos, int depth_limit, int token_limit) { ec.clear(); ret.clear(); if (end - start > bdecode_token::max_offset) { if (error_pos) *error_pos = 0; ec = bdecode_errors::limit_exceeded; return -1; } // t...
77,468,811,832,898,460,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2017-9847
The bdecode function in bdecode.cpp in libtorrent 1.1.3 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2017-9847
356,810
libtorrent
ec30a5e9ec703afb8abefba757c6d401303b53db
https://github.com/arvidn/libtorrent
https://github.com/arvidn/libtorrent/commit/ec30a5e9ec703afb8abefba757c6d401303b53db
fix out-of-bounds read in bdecode Fixes #2099
0
int bdecode(char const* start, char const* end, bdecode_node& ret , error_code& ec, int* error_pos, int depth_limit, int token_limit) { ec.clear(); ret.clear(); if (end - start > bdecode_token::max_offset) { if (error_pos) *error_pos = 0; ec = bdecode_errors::limit_exceeded; return -1; } // t...
199,145,120,198,337,260,000,000,000,000,000,000,000
None
null
[ "CWE-125" ]
CVE-2017-9847
The bdecode function in bdecode.cpp in libtorrent 1.1.3 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2017-9847
204,346
openexr
25e9515b06a6bc293d871622b8cafaee7af84e0f
https://github.com/AcademySoftwareFoundation/openexr
https://github.com/AcademySoftwareFoundation/openexr/commit/25e9515b06a6bc293d871622b8cafaee7af84e0f
add sanity check for reading multipart files with no parts (#840) Signed-off-by: Peter Hillman <peterh@wetafx.co.nz>
1
MultiPartInputFile::initialize() { readMagicNumberAndVersionField(*_data->is, _data->version); bool multipart = isMultiPart(_data->version); bool tiled = isTiled(_data->version); // // Multipart files don't have and shouldn't have the tiled bit set. // if (tiled && multipart) ...
339,968,148,619,641,500,000,000,000,000,000,000,000
ImfMultiPartInputFile.cpp
337,585,018,066,003,300,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2021-20299
A flaw was found in OpenEXR's Multipart input file functionality. A crafted multi-part input file with no actual parts can trigger a NULL pointer dereference. The highest threat from this vulnerability is to system availability.
https://nvd.nist.gov/vuln/detail/CVE-2021-20299
357,447
openexr
25e9515b06a6bc293d871622b8cafaee7af84e0f
https://github.com/AcademySoftwareFoundation/openexr
https://github.com/AcademySoftwareFoundation/openexr/commit/25e9515b06a6bc293d871622b8cafaee7af84e0f
add sanity check for reading multipart files with no parts (#840) Signed-off-by: Peter Hillman <peterh@wetafx.co.nz>
0
MultiPartInputFile::initialize() { readMagicNumberAndVersionField(*_data->is, _data->version); bool multipart = isMultiPart(_data->version); bool tiled = isTiled(_data->version); // // Multipart files don't have and shouldn't have the tiled bit set. // if (tiled && multipart) ...
277,975,875,434,758,650,000,000,000,000,000,000,000
ImfMultiPartInputFile.cpp
257,205,156,270,798,580,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2021-20299
A flaw was found in OpenEXR's Multipart input file functionality. A crafted multi-part input file with no actual parts can trigger a NULL pointer dereference. The highest threat from this vulnerability is to system availability.
https://nvd.nist.gov/vuln/detail/CVE-2021-20299
204,348
linux
d0c7feaf87678371c2c09b3709400be416b2dc62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d0c7feaf87678371c2c09b3709400be416b2dc62
xfs: add agf freeblocks verify in xfs_agf_verify We recently used fuzz(hydra) to test XFS and automatically generate tmp.img(XFS v5 format, but some metadata is wrong) xfs_repair information(just one AG): agf_freeblks 0, counted 3224 in ag 0 agf_longest 536874136, counted 3224 in ag 0 sb_fdblocks 613, counted 3228 T...
1
xfs_agf_verify( struct xfs_buf *bp) { struct xfs_mount *mp = bp->b_mount; struct xfs_agf *agf = XFS_BUF_TO_AGF(bp); if (xfs_sb_version_hascrc(&mp->m_sb)) { if (!uuid_equal(&agf->agf_uuid, &mp->m_sb.sb_meta_uuid)) return __this_address; if (!xfs_log_check_lsn(mp, be64_to_cpu(XFS_BUF_TO_AGF(bp)->agf_lsn...
201,217,101,712,968,100,000,000,000,000,000,000,000
xfs_alloc.c
262,236,000,442,739,940,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2020-12655
An issue was discovered in xfs_agf_verify in fs/xfs/libxfs/xfs_alloc.c in the Linux kernel through 5.6.10. Attackers may trigger a sync of excessive duration via an XFS v5 image with crafted metadata, aka CID-d0c7feaf8767.
https://nvd.nist.gov/vuln/detail/CVE-2020-12655
357,487
linux
d0c7feaf87678371c2c09b3709400be416b2dc62
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/d0c7feaf87678371c2c09b3709400be416b2dc62
xfs: add agf freeblocks verify in xfs_agf_verify We recently used fuzz(hydra) to test XFS and automatically generate tmp.img(XFS v5 format, but some metadata is wrong) xfs_repair information(just one AG): agf_freeblks 0, counted 3224 in ag 0 agf_longest 536874136, counted 3224 in ag 0 sb_fdblocks 613, counted 3228 T...
0
xfs_agf_verify( struct xfs_buf *bp) { struct xfs_mount *mp = bp->b_mount; struct xfs_agf *agf = XFS_BUF_TO_AGF(bp); if (xfs_sb_version_hascrc(&mp->m_sb)) { if (!uuid_equal(&agf->agf_uuid, &mp->m_sb.sb_meta_uuid)) return __this_address; if (!xfs_log_check_lsn(mp, be64_to_cpu(XFS_BUF_TO_AGF(bp)->agf_lsn...
323,921,650,583,093,600,000,000,000,000,000,000,000
xfs_alloc.c
292,975,431,327,850,580,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2020-12655
An issue was discovered in xfs_agf_verify in fs/xfs/libxfs/xfs_alloc.c in the Linux kernel through 5.6.10. Attackers may trigger a sync of excessive duration via an XFS v5 image with crafted metadata, aka CID-d0c7feaf8767.
https://nvd.nist.gov/vuln/detail/CVE-2020-12655
204,350
linux
e97f852fd4561e77721bb9a4e0ea9d98305b1e93
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e97f852fd4561e77721bb9a4e0ea9d98305b1e93
KVM: X86: Fix scan ioapic use-before-initialization Reported by syzkaller: BUG: unable to handle kernel NULL pointer dereference at 00000000000001c8 PGD 80000003ec4da067 P4D 80000003ec4da067 PUD 3f7bfa067 PMD 0 Oops: 0000 [#1] PREEMPT SMP PTI CPU: 7 PID: 5059 Comm: debug Tainted: G OE 4.19.0-rc5 #16...
1
static void vcpu_scan_ioapic(struct kvm_vcpu *vcpu) { if (!kvm_apic_hw_enabled(vcpu->arch.apic)) return; bitmap_zero(vcpu->arch.ioapic_handled_vectors, 256); if (irqchip_split(vcpu->kvm)) kvm_scan_ioapic_routes(vcpu, vcpu->arch.ioapic_handled_vectors); else { if (vcpu->arch.apicv_active) kvm_x86_ops->syn...
123,097,991,003,328,840,000,000,000,000,000,000,000
x86.c
96,150,063,534,154,640,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2018-19407
The vcpu_scan_ioapic function in arch/x86/kvm/x86.c in the Linux kernel through 4.19.2 allows local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where ioapic is uninitialized.
https://nvd.nist.gov/vuln/detail/CVE-2018-19407
357,634
linux
e97f852fd4561e77721bb9a4e0ea9d98305b1e93
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e97f852fd4561e77721bb9a4e0ea9d98305b1e93
KVM: X86: Fix scan ioapic use-before-initialization Reported by syzkaller: BUG: unable to handle kernel NULL pointer dereference at 00000000000001c8 PGD 80000003ec4da067 P4D 80000003ec4da067 PUD 3f7bfa067 PMD 0 Oops: 0000 [#1] PREEMPT SMP PTI CPU: 7 PID: 5059 Comm: debug Tainted: G OE 4.19.0-rc5 #16...
0
static void vcpu_scan_ioapic(struct kvm_vcpu *vcpu) { if (!kvm_apic_hw_enabled(vcpu->arch.apic)) return; bitmap_zero(vcpu->arch.ioapic_handled_vectors, 256); if (irqchip_split(vcpu->kvm)) kvm_scan_ioapic_routes(vcpu, vcpu->arch.ioapic_handled_vectors); else { if (vcpu->arch.apicv_active) kvm_x86_ops->syn...
220,230,142,233,764,220,000,000,000,000,000,000,000
x86.c
25,942,829,220,065,712,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2018-19407
The vcpu_scan_ioapic function in arch/x86/kvm/x86.c in the Linux kernel through 4.19.2 allows local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where ioapic is uninitialized.
https://nvd.nist.gov/vuln/detail/CVE-2018-19407
204,352
qemu
b3af7fdf9cc537f8f0dd3e2423d83f5c99a457e8
https://github.com/bonzini/qemu
https://gitlab.com/qemu-project/qemu/-/commit/b3af7fdf9cc537f8f0dd3e2423d83f5c99a457e8
hw/scsi/scsi-disk: MODE_PAGE_ALLS not allowed in MODE SELECT commands This avoids an off-by-one read of 'mode_sense_valid' buffer in hw/scsi/scsi-disk.c:mode_sense_page(). Fixes: CVE-2021-3930 Cc: qemu-stable@nongnu.org Reported-by: Alexander Bulekov <alxndr@bu.edu> Fixes: a8f4bbe2900 ("scsi-disk: store valid mode pa...
1
static int mode_sense_page(SCSIDiskState *s, int page, uint8_t **p_outbuf, int page_control) { static const int mode_sense_valid[0x3f] = { [MODE_PAGE_HD_GEOMETRY] = (1 << TYPE_DISK), [MODE_PAGE_FLEXIBLE_DISK_GEOMETRY] = (1 << TYPE_DISK), [MODE_PAGE_CACHI...
11,101,533,896,837,744,000,000,000,000,000,000,000
scsi-disk.c
47,481,960,435,699,690,000,000,000,000,000,000,000
[ "CWE-193" ]
CVE-2021-3930
An off-by-one error was found in the SCSI device emulation in QEMU. It could occur while processing MODE SELECT commands in mode_sense_page() if the 'page' argument was set to MODE_PAGE_ALLS (0x3f). A malicious guest could use this flaw to potentially crash QEMU, resulting in a denial of service condition.
https://nvd.nist.gov/vuln/detail/CVE-2021-3930
357,684
qemu
b3af7fdf9cc537f8f0dd3e2423d83f5c99a457e8
https://github.com/bonzini/qemu
https://gitlab.com/qemu-project/qemu/-/commit/b3af7fdf9cc537f8f0dd3e2423d83f5c99a457e8
hw/scsi/scsi-disk: MODE_PAGE_ALLS not allowed in MODE SELECT commands This avoids an off-by-one read of 'mode_sense_valid' buffer in hw/scsi/scsi-disk.c:mode_sense_page(). Fixes: CVE-2021-3930 Cc: qemu-stable@nongnu.org Reported-by: Alexander Bulekov <alxndr@bu.edu> Fixes: a8f4bbe2900 ("scsi-disk: store valid mode pa...
0
static int mode_sense_page(SCSIDiskState *s, int page, uint8_t **p_outbuf, int page_control) { static const int mode_sense_valid[0x3f] = { [MODE_PAGE_HD_GEOMETRY] = (1 << TYPE_DISK), [MODE_PAGE_FLEXIBLE_DISK_GEOMETRY] = (1 << TYPE_DISK), [MODE_PAGE_CACHI...
170,908,375,979,409,740,000,000,000,000,000,000,000
scsi-disk.c
128,159,733,523,949,950,000,000,000,000,000,000,000
[ "CWE-193" ]
CVE-2021-3930
An off-by-one error was found in the SCSI device emulation in QEMU. It could occur while processing MODE SELECT commands in mode_sense_page() if the 'page' argument was set to MODE_PAGE_ALLS (0x3f). A malicious guest could use this flaw to potentially crash QEMU, resulting in a denial of service condition.
https://nvd.nist.gov/vuln/detail/CVE-2021-3930
204,354
keepalived
17f944144b3d9c5131569b1cc988cc90fd676671
https://github.com/acassen/keepalived
https://github.com/acassen/keepalived/commit/17f944144b3d9c5131569b1cc988cc90fd676671
Make sure a non privileged user cannot read keepalived file output Ensure that when a file such as /tmp/keepalived.data is wriiten, no non privileged can have a previous version of that file already open, thereby allowing them to read the data. This should fully resolve CVE-2018-19046. Signed-off-by: Quentin Armitag...
1
FILE *fopen_safe(const char *path, const char *mode) { int fd; FILE *file; int flags = O_NOFOLLOW | O_CREAT; int sav_errno; if (mode[0] == 'r') return fopen(path, mode); if ((mode[0] != 'a' && mode[0] != 'w') || (mode[1] && (mode[1] != '+' || mode[2]))) { errno = EINVAL; return NULL; } if (m...
187,349,359,709,402,930,000,000,000,000,000,000,000
utils.c
281,549,157,409,487,320,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2018-19046
keepalived 2.0.8 didn't check for existing plain files when writing data to a temporary file upon a call to PrintData or PrintStats. If a local attacker had previously created a file with the expected name (e.g., /tmp/keepalived.data or /tmp/keepalived.stats), with read access for the attacker and write access for the ...
https://nvd.nist.gov/vuln/detail/CVE-2018-19046
357,773
keepalived
17f944144b3d9c5131569b1cc988cc90fd676671
https://github.com/acassen/keepalived
https://github.com/acassen/keepalived/commit/17f944144b3d9c5131569b1cc988cc90fd676671
Make sure a non privileged user cannot read keepalived file output Ensure that when a file such as /tmp/keepalived.data is wriiten, no non privileged can have a previous version of that file already open, thereby allowing them to read the data. This should fully resolve CVE-2018-19046. Signed-off-by: Quentin Armitag...
0
FILE *fopen_safe(const char *path, const char *mode) { int fd; FILE *file; int flags = O_NOFOLLOW | O_CREAT | O_CLOEXEC; int sav_errno; char file_tmp_name[] = "/tmp/keepalivedXXXXXX"; if (mode[0] == 'r') return fopen(path, mode); if ((mode[0] != 'a' && mode[0] != 'w') || (mode[1] && (mode[1] != '+...
172,320,200,742,520,000,000,000,000,000,000,000,000
utils.c
172,828,364,222,606,750,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2018-19046
keepalived 2.0.8 didn't check for existing plain files when writing data to a temporary file upon a call to PrintData or PrintStats. If a local attacker had previously created a file with the expected name (e.g., /tmp/keepalived.data or /tmp/keepalived.stats), with read access for the attacker and write access for the ...
https://nvd.nist.gov/vuln/detail/CVE-2018-19046
204,372
linux
48fb6f4db940e92cfb16cd878cddd59ea6120d06
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=48fb6f4db940e92cfb16cd878cddd59ea6120d06
futex: Remove unnecessary warning from get_futex_key Commit 65d8fc777f6d ("futex: Remove requirement for lock_page() in get_futex_key()") removed an unnecessary lock_page() with the side-effect that page->mapping needed to be treated very carefully. Two defensive warnings were added in case any assumption was missed ...
1
get_futex_key(u32 __user *uaddr, int fshared, union futex_key *key, int rw) { unsigned long address = (unsigned long)uaddr; struct mm_struct *mm = current->mm; struct page *page, *tail; struct address_space *mapping; int err, ro = 0; /* * The futex address must be "naturally" aligned. */ key->both.offset = ...
60,433,985,258,533,240,000,000,000,000,000,000,000
futex.c
178,581,105,268,759,450,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2018-9422
In get_futex_key of futex.c, there is a use-after-free due to improper locking. This could lead to local escalation of privilege with no additional privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-74250718 References: Upstream kernel.
https://nvd.nist.gov/vuln/detail/CVE-2018-9422
174,120
linux
fbe0e839d1e22d88810f3ee3e2f1479be4c0aa4a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/fbe0e839d1e22d88810f3ee3e2f1479be4c0aa4a
futex: Prevent overflow by strengthen input validation UBSAN reports signed integer overflow in kernel/futex.c: UBSAN: Undefined behaviour in kernel/futex.c:2041:18 signed integer overflow: 0 - -2147483648 cannot be represented in type 'int' Add a sanity check to catch negative values of nr_wake and nr_requeue. ...
0
get_futex_key(u32 __user *uaddr, int fshared, union futex_key *key, int rw) { unsigned long address = (unsigned long)uaddr; struct mm_struct *mm = current->mm; struct page *page, *tail; struct address_space *mapping; int err, ro = 0; /* * The futex address must be "naturally" aligned. */ key->both.offset = ...
157,548,046,890,677,830,000,000,000,000,000,000,000
futex.c
307,871,334,927,438,140,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2018-6927
The futex_requeue function in kernel/futex.c in the Linux kernel before 4.14.15 might allow attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact by triggering a negative wake or requeue value.
https://nvd.nist.gov/vuln/detail/CVE-2018-6927
204,396
ImageMagick6
1d6c036f0388d7857c725342f7212b60e39a14c1
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/1d6c036f0388d7857c725342f7212b60e39a14c1
https://github.com/ImageMagick/ImageMagick/issues/1555
1
static MagickBooleanType WriteTIFFImage(const ImageInfo *image_info, Image *image) { const char *mode, *option; CompressionType compression; EndianType endian_type; MagickBooleanType debug, status; MagickOffsetType scene; QuantumInfo *quantum_info; QuantumType q...
331,397,966,505,560,600,000,000,000,000,000,000,000
tiff.c
159,093,836,393,642,560,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-11597
In ImageMagick 7.0.8-43 Q16, there is a heap-based buffer over-read in the function WriteTIFFImage of coders/tiff.c, which allows an attacker to cause a denial of service or possibly information disclosure via a crafted image file.
https://nvd.nist.gov/vuln/detail/CVE-2019-11597
358,299
ImageMagick6
1d6c036f0388d7857c725342f7212b60e39a14c1
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/1d6c036f0388d7857c725342f7212b60e39a14c1
https://github.com/ImageMagick/ImageMagick/issues/1555
0
static MagickBooleanType WriteTIFFImage(const ImageInfo *image_info, Image *image) { const char *mode, *option; CompressionType compression; EndianType endian_type; MagickBooleanType debug, status; MagickOffsetType scene; QuantumInfo *quantum_info; QuantumType q...
217,523,783,237,182,900,000,000,000,000,000,000,000
tiff.c
146,494,102,391,208,100,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-11597
In ImageMagick 7.0.8-43 Q16, there is a heap-based buffer over-read in the function WriteTIFFImage of coders/tiff.c, which allows an attacker to cause a denial of service or possibly information disclosure via a crafted image file.
https://nvd.nist.gov/vuln/detail/CVE-2019-11597
204,397
libgadu
d882b15661ee94949919ebbbc43edf0db5f619cb
https://github.com/wojtekka/libgadu
https://github.com/wojtekka/libgadu/commit/d882b15661ee94949919ebbbc43edf0db5f619cb
Odkąd biblioteka weryfikuje certyfikaty ciężko testować z self-signed.
1
static int client_func(const test_param_t *test) { struct gg_session *gs; struct gg_login_params glp; char tmp; gg_proxy_host = HOST_PROXY; gg_proxy_port = 8080; gg_proxy_enabled = test->proxy_mode; memset(&glp, 0, sizeof(glp)); glp.uin = 1; glp.password = "dupa.8"; glp.async = test->async_mode; glp.resolv...
330,732,986,248,822,830,000,000,000,000,000,000,000
connect.c
8,969,186,113,593,440,000,000,000,000,000,000,000
[ "CWE-310" ]
CVE-2013-4488
libgadu before 1.12.0 does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers.
https://nvd.nist.gov/vuln/detail/CVE-2013-4488
358,302
libgadu
d882b15661ee94949919ebbbc43edf0db5f619cb
https://github.com/wojtekka/libgadu
https://github.com/wojtekka/libgadu/commit/d882b15661ee94949919ebbbc43edf0db5f619cb
Odkąd biblioteka weryfikuje certyfikaty ciężko testować z self-signed.
0
static int client_func(const test_param_t *test) { struct gg_session *gs; struct gg_login_params glp; char tmp; gg_proxy_host = HOST_PROXY; gg_proxy_port = 8080; gg_proxy_enabled = test->proxy_mode; memset(&glp, 0, sizeof(glp)); glp.uin = 1; glp.password = "dupa.8"; glp.async = test->async_mode; glp.resolv...
232,344,123,234,453,320,000,000,000,000,000,000,000
connect.c
235,763,191,884,604,280,000,000,000,000,000,000,000
[ "CWE-310" ]
CVE-2013-4488
libgadu before 1.12.0 does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers.
https://nvd.nist.gov/vuln/detail/CVE-2013-4488
204,405
ghostpdl
849e74e5ab450dd581942192da7101e0664fa5af
https://github.com/ArtifexSoftware/ghostpdl
https://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=849e74e5ab450dd581942192da7101e0664fa5af
Bug 701799: avoid out-of-range array access in mj_color_correct(). Code is obscure, so this fix merely avoids out-of-range access in the simplest way possible, without understanding what the code is trying to do. Fixes: ./sanbin/gs -sOutputFile=tmp -sDEVICE=mj6000c ../bug-701799.pdf
1
mj_color_correct(gx_color_value *Rptr ,gx_color_value *Gptr , gx_color_value *Bptr ) /* R,G,B : 0 to 255 */ { short R,G,B; /* R,G,B : 0 to 255 */ short C,M,Y; /* C,M,Y : 0 to 1023 */ short H,D,Wa; /* ese-HSV */ ...
7,175,173,602,366,871,000,000,000,000,000,000,000
gdevmjc.c
171,261,658,968,975,040,000,000,000,000,000,000,000
[ "CWE-120" ]
CVE-2020-16298
A buffer overflow vulnerability in mj_color_correct() in contrib/japanese/gdevmjc.c of Artifex Software GhostScript v9.50 allows a remote attacker to cause a denial of service via a crafted PDF file. This is fixed in v9.51.
https://nvd.nist.gov/vuln/detail/CVE-2020-16298
359,020
ghostpdl
849e74e5ab450dd581942192da7101e0664fa5af
https://github.com/ArtifexSoftware/ghostpdl
https://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=849e74e5ab450dd581942192da7101e0664fa5af
Bug 701799: avoid out-of-range array access in mj_color_correct(). Code is obscure, so this fix merely avoids out-of-range access in the simplest way possible, without understanding what the code is trying to do. Fixes: ./sanbin/gs -sOutputFile=tmp -sDEVICE=mj6000c ../bug-701799.pdf
0
mj_color_correct(gx_color_value *Rptr ,gx_color_value *Gptr , gx_color_value *Bptr ) /* R,G,B : 0 to 255 */ { short R,G,B; /* R,G,B : 0 to 255 */ short C,M,Y; /* C,M,Y : 0 to 1023 */ short H,D,Wa; /* ese-HSV */ ...
262,939,380,752,148,270,000,000,000,000,000,000,000
gdevmjc.c
267,751,881,814,018,720,000,000,000,000,000,000,000
[ "CWE-120" ]
CVE-2020-16298
A buffer overflow vulnerability in mj_color_correct() in contrib/japanese/gdevmjc.c of Artifex Software GhostScript v9.50 allows a remote attacker to cause a denial of service via a crafted PDF file. This is fixed in v9.51.
https://nvd.nist.gov/vuln/detail/CVE-2020-16298
204,406
linux
104c307147ad379617472dd91a5bcb368d72bd6d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/104c307147ad379617472dd91a5bcb368d72bd6d
drm/amd/display: prevent memory leak In dcn*_create_resource_pool the allocated memory should be released if construct pool fails. Reviewed-by: Harry Wentland <harry.wentland@amd.com> Signed-off-by: Navid Emamdoost <navid.emamdoost@gmail.com> Signed-off-by: Alex Deucher <alexander.deucher@amd.com>
1
struct resource_pool *dce112_create_resource_pool( uint8_t num_virtual_links, struct dc *dc) { struct dce110_resource_pool *pool = kzalloc(sizeof(struct dce110_resource_pool), GFP_KERNEL); if (!pool) return NULL; if (construct(num_virtual_links, dc, pool)) return &pool->base; BREAK_TO_DEBUGGER(); return...
25,360,000,957,001,186,000,000,000,000,000,000,000
dce112_resource.c
134,853,350,681,990,770,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2019-19082
Memory leaks in *create_resource_pool() functions under drivers/gpu/drm/amd/display/dc in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption). This affects the dce120_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce120/dce120_resource.c, the dce110_crea...
https://nvd.nist.gov/vuln/detail/CVE-2019-19082
359,059
linux
104c307147ad379617472dd91a5bcb368d72bd6d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/104c307147ad379617472dd91a5bcb368d72bd6d
drm/amd/display: prevent memory leak In dcn*_create_resource_pool the allocated memory should be released if construct pool fails. Reviewed-by: Harry Wentland <harry.wentland@amd.com> Signed-off-by: Navid Emamdoost <navid.emamdoost@gmail.com> Signed-off-by: Alex Deucher <alexander.deucher@amd.com>
0
struct resource_pool *dce120_create_resource_pool( uint8_t num_virtual_links, struct dc *dc) { struct dce110_resource_pool *pool = kzalloc(sizeof(struct dce110_resource_pool), GFP_KERNEL); if (!pool) return NULL; if (construct(num_virtual_links, dc, pool)) return &pool->base; kfree(pool); BREAK_TO_DEBUG...
165,603,870,895,392,430,000,000,000,000,000,000,000
dce120_resource.c
216,019,552,500,205,900,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2019-19082
Memory leaks in *create_resource_pool() functions under drivers/gpu/drm/amd/display/dc in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption). This affects the dce120_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce120/dce120_resource.c, the dce110_crea...
https://nvd.nist.gov/vuln/detail/CVE-2019-19082
204,407
linux
104c307147ad379617472dd91a5bcb368d72bd6d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/104c307147ad379617472dd91a5bcb368d72bd6d
drm/amd/display: prevent memory leak In dcn*_create_resource_pool the allocated memory should be released if construct pool fails. Reviewed-by: Harry Wentland <harry.wentland@amd.com> Signed-off-by: Navid Emamdoost <navid.emamdoost@gmail.com> Signed-off-by: Alex Deucher <alexander.deucher@amd.com>
1
struct resource_pool *dce120_create_resource_pool( uint8_t num_virtual_links, struct dc *dc) { struct dce110_resource_pool *pool = kzalloc(sizeof(struct dce110_resource_pool), GFP_KERNEL); if (!pool) return NULL; if (construct(num_virtual_links, dc, pool)) return &pool->base; BREAK_TO_DEBUGGER(); return...
236,908,000,472,276,320,000,000,000,000,000,000,000
dce120_resource.c
326,271,154,528,491,800,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2019-19082
Memory leaks in *create_resource_pool() functions under drivers/gpu/drm/amd/display/dc in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption). This affects the dce120_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce120/dce120_resource.c, the dce110_crea...
https://nvd.nist.gov/vuln/detail/CVE-2019-19082
359,059
linux
104c307147ad379617472dd91a5bcb368d72bd6d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/104c307147ad379617472dd91a5bcb368d72bd6d
drm/amd/display: prevent memory leak In dcn*_create_resource_pool the allocated memory should be released if construct pool fails. Reviewed-by: Harry Wentland <harry.wentland@amd.com> Signed-off-by: Navid Emamdoost <navid.emamdoost@gmail.com> Signed-off-by: Alex Deucher <alexander.deucher@amd.com>
0
struct resource_pool *dce120_create_resource_pool( uint8_t num_virtual_links, struct dc *dc) { struct dce110_resource_pool *pool = kzalloc(sizeof(struct dce110_resource_pool), GFP_KERNEL); if (!pool) return NULL; if (construct(num_virtual_links, dc, pool)) return &pool->base; kfree(pool); BREAK_TO_DEBUG...
165,603,870,895,392,430,000,000,000,000,000,000,000
dce120_resource.c
216,019,552,500,205,900,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2019-19082
Memory leaks in *create_resource_pool() functions under drivers/gpu/drm/amd/display/dc in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption). This affects the dce120_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce120/dce120_resource.c, the dce110_crea...
https://nvd.nist.gov/vuln/detail/CVE-2019-19082
204,408
linux
104c307147ad379617472dd91a5bcb368d72bd6d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/104c307147ad379617472dd91a5bcb368d72bd6d
drm/amd/display: prevent memory leak In dcn*_create_resource_pool the allocated memory should be released if construct pool fails. Reviewed-by: Harry Wentland <harry.wentland@amd.com> Signed-off-by: Navid Emamdoost <navid.emamdoost@gmail.com> Signed-off-by: Alex Deucher <alexander.deucher@amd.com>
1
struct resource_pool *dce110_create_resource_pool( uint8_t num_virtual_links, struct dc *dc, struct hw_asic_id asic_id) { struct dce110_resource_pool *pool = kzalloc(sizeof(struct dce110_resource_pool), GFP_KERNEL); if (!pool) return NULL; if (construct(num_virtual_links, dc, pool, asic_id)) return &pool-...
266,599,243,122,433,050,000,000,000,000,000,000,000
dce110_resource.c
128,876,647,168,981,740,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2019-19082
Memory leaks in *create_resource_pool() functions under drivers/gpu/drm/amd/display/dc in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption). This affects the dce120_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce120/dce120_resource.c, the dce110_crea...
https://nvd.nist.gov/vuln/detail/CVE-2019-19082
359,140
linux
104c307147ad379617472dd91a5bcb368d72bd6d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/104c307147ad379617472dd91a5bcb368d72bd6d
drm/amd/display: prevent memory leak In dcn*_create_resource_pool the allocated memory should be released if construct pool fails. Reviewed-by: Harry Wentland <harry.wentland@amd.com> Signed-off-by: Navid Emamdoost <navid.emamdoost@gmail.com> Signed-off-by: Alex Deucher <alexander.deucher@amd.com>
0
struct resource_pool *dce110_create_resource_pool( uint8_t num_virtual_links, struct dc *dc, struct hw_asic_id asic_id) { struct dce110_resource_pool *pool = kzalloc(sizeof(struct dce110_resource_pool), GFP_KERNEL); if (!pool) return NULL; if (construct(num_virtual_links, dc, pool, asic_id)) return &pool-...
19,714,928,141,478,028,000,000,000,000,000,000,000
dce110_resource.c
6,696,065,726,456,224,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2019-19082
Memory leaks in *create_resource_pool() functions under drivers/gpu/drm/amd/display/dc in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption). This affects the dce120_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce120/dce120_resource.c, the dce110_crea...
https://nvd.nist.gov/vuln/detail/CVE-2019-19082
204,409
linux
104c307147ad379617472dd91a5bcb368d72bd6d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/104c307147ad379617472dd91a5bcb368d72bd6d
drm/amd/display: prevent memory leak In dcn*_create_resource_pool the allocated memory should be released if construct pool fails. Reviewed-by: Harry Wentland <harry.wentland@amd.com> Signed-off-by: Navid Emamdoost <navid.emamdoost@gmail.com> Signed-off-by: Alex Deucher <alexander.deucher@amd.com>
1
struct resource_pool *dce100_create_resource_pool( uint8_t num_virtual_links, struct dc *dc) { struct dce110_resource_pool *pool = kzalloc(sizeof(struct dce110_resource_pool), GFP_KERNEL); if (!pool) return NULL; if (construct(num_virtual_links, dc, pool)) return &pool->base; BREAK_TO_DEBUGGER(); retur...
134,834,192,102,552,630,000,000,000,000,000,000,000
dce100_resource.c
216,239,683,289,400,530,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2019-19082
Memory leaks in *create_resource_pool() functions under drivers/gpu/drm/amd/display/dc in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption). This affects the dce120_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce120/dce120_resource.c, the dce110_crea...
https://nvd.nist.gov/vuln/detail/CVE-2019-19082
359,118
linux
104c307147ad379617472dd91a5bcb368d72bd6d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/104c307147ad379617472dd91a5bcb368d72bd6d
drm/amd/display: prevent memory leak In dcn*_create_resource_pool the allocated memory should be released if construct pool fails. Reviewed-by: Harry Wentland <harry.wentland@amd.com> Signed-off-by: Navid Emamdoost <navid.emamdoost@gmail.com> Signed-off-by: Alex Deucher <alexander.deucher@amd.com>
0
struct resource_pool *dce100_create_resource_pool( uint8_t num_virtual_links, struct dc *dc) { struct dce110_resource_pool *pool = kzalloc(sizeof(struct dce110_resource_pool), GFP_KERNEL); if (!pool) return NULL; if (construct(num_virtual_links, dc, pool)) return &pool->base; kfree(pool); BREAK_TO_DEBU...
111,105,773,927,111,020,000,000,000,000,000,000,000
dce100_resource.c
301,806,452,099,647,360,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2019-19082
Memory leaks in *create_resource_pool() functions under drivers/gpu/drm/amd/display/dc in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption). This affects the dce120_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce120/dce120_resource.c, the dce110_crea...
https://nvd.nist.gov/vuln/detail/CVE-2019-19082
204,410
linux
104c307147ad379617472dd91a5bcb368d72bd6d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/104c307147ad379617472dd91a5bcb368d72bd6d
drm/amd/display: prevent memory leak In dcn*_create_resource_pool the allocated memory should be released if construct pool fails. Reviewed-by: Harry Wentland <harry.wentland@amd.com> Signed-off-by: Navid Emamdoost <navid.emamdoost@gmail.com> Signed-off-by: Alex Deucher <alexander.deucher@amd.com>
1
struct resource_pool *dcn10_create_resource_pool( const struct dc_init_data *init_data, struct dc *dc) { struct dcn10_resource_pool *pool = kzalloc(sizeof(struct dcn10_resource_pool), GFP_KERNEL); if (!pool) return NULL; if (construct(init_data->num_virtual_links, dc, pool)) return &pool->base; BREAK_T...
330,658,336,581,121,650,000,000,000,000,000,000,000
dcn10_resource.c
180,178,772,616,752,060,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2019-19082
Memory leaks in *create_resource_pool() functions under drivers/gpu/drm/amd/display/dc in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption). This affects the dce120_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce120/dce120_resource.c, the dce110_crea...
https://nvd.nist.gov/vuln/detail/CVE-2019-19082
359,042
linux
104c307147ad379617472dd91a5bcb368d72bd6d
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/104c307147ad379617472dd91a5bcb368d72bd6d
drm/amd/display: prevent memory leak In dcn*_create_resource_pool the allocated memory should be released if construct pool fails. Reviewed-by: Harry Wentland <harry.wentland@amd.com> Signed-off-by: Navid Emamdoost <navid.emamdoost@gmail.com> Signed-off-by: Alex Deucher <alexander.deucher@amd.com>
0
struct resource_pool *dcn10_create_resource_pool( const struct dc_init_data *init_data, struct dc *dc) { struct dcn10_resource_pool *pool = kzalloc(sizeof(struct dcn10_resource_pool), GFP_KERNEL); if (!pool) return NULL; if (construct(init_data->num_virtual_links, dc, pool)) return &pool->base; kfree(p...
33,467,104,699,066,910,000,000,000,000,000,000,000
dcn10_resource.c
333,510,111,353,274,900,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2019-19082
Memory leaks in *create_resource_pool() functions under drivers/gpu/drm/amd/display/dc in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption). This affects the dce120_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce120/dce120_resource.c, the dce110_crea...
https://nvd.nist.gov/vuln/detail/CVE-2019-19082
204,414
w3m
a088e0263c48ba406a7ae0932a1ae64a25be7acd
https://github.com/tats/w3m
https://github.com/tats/w3m/commit/a088e0263c48ba406a7ae0932a1ae64a25be7acd
Prevent deref null pointer in shiftAnchorPosition() Bug-Debian: https://github.com/tats/w3m/issues/40
1
shiftAnchorPosition(AnchorList *al, HmarkerList *hl, int line, int pos, int shift) { Anchor *a; size_t b, e, s = 0; int cmp; if (al == NULL || al->nanchor == 0) return; s = al->nanchor / 2; for (b = 0, e = al->nanchor - 1; b <= e; s = (b + e + 1) / 2) { a = &al->anchors[s]; cmp = onAn...
219,601,932,701,999,780,000,000,000,000,000,000,000
anchor.c
43,978,762,407,227,080,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2016-9629
An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page.
https://nvd.nist.gov/vuln/detail/CVE-2016-9629
359,241
w3m
a088e0263c48ba406a7ae0932a1ae64a25be7acd
https://github.com/tats/w3m
https://github.com/tats/w3m/commit/a088e0263c48ba406a7ae0932a1ae64a25be7acd
Prevent deref null pointer in shiftAnchorPosition() Bug-Debian: https://github.com/tats/w3m/issues/40
0
shiftAnchorPosition(AnchorList *al, HmarkerList *hl, int line, int pos, int shift) { Anchor *a; size_t b, e, s = 0; int cmp; if (al == NULL || al->nanchor == 0) return; s = al->nanchor / 2; for (b = 0, e = al->nanchor - 1; b <= e; s = (b + e + 1) / 2) { a = &al->anchors[s]; cmp = onAn...
269,981,388,207,880,600,000,000,000,000,000,000,000
anchor.c
69,432,606,966,181,620,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2016-9629
An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-33. w3m allows remote attackers to cause a denial of service (segmentation fault and crash) via a crafted HTML page.
https://nvd.nist.gov/vuln/detail/CVE-2016-9629
204,434
spice-vd_agent
e4bfd1b632b6c14e8411dbe3565115a78cd3d256
https://github.com/freedesktop/spice-vd_agent
https://github.com/freedesktop/spice-vd_agent/commit/e4bfd1b632b6c14e8411dbe3565115a78cd3d256
cleanup active_xfers when the client disconnects Signed-off-by: Uri Lublin <uril@redhat.com> Acked-by: Frediano Ziglio <fziglio@redhat.com>
1
static void do_client_disconnect(void) { if (client_connected) { udscs_server_write_all(server, VDAGENTD_CLIENT_DISCONNECTED, 0, 0, NULL, 0); client_connected = false; } }
257,464,005,733,012,200,000,000,000,000,000,000,000
vdagentd.c
134,875,536,789,113,300,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2020-25651
A flaw was found in the SPICE file transfer protocol. File data from the host system can end up in full or in parts in the client connection of an illegitimate local user in the VM system. Active file transfers from other users could also be interrupted, resulting in a denial of service. The highest threat from this vu...
https://nvd.nist.gov/vuln/detail/CVE-2020-25651
359,777
spice-vd_agent
e4bfd1b632b6c14e8411dbe3565115a78cd3d256
https://github.com/freedesktop/spice-vd_agent
https://github.com/freedesktop/spice-vd_agent/commit/e4bfd1b632b6c14e8411dbe3565115a78cd3d256
cleanup active_xfers when the client disconnects Signed-off-by: Uri Lublin <uril@redhat.com> Acked-by: Frediano Ziglio <fziglio@redhat.com>
0
static void do_client_disconnect(void) { g_hash_table_remove_all(active_xfers); if (client_connected) { udscs_server_write_all(server, VDAGENTD_CLIENT_DISCONNECTED, 0, 0, NULL, 0); client_connected = false; } }
79,055,055,750,159,810,000,000,000,000,000,000,000
vdagentd.c
67,833,859,549,917,040,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2020-25651
A flaw was found in the SPICE file transfer protocol. File data from the host system can end up in full or in parts in the client connection of an illegitimate local user in the VM system. Active file transfers from other users could also be interrupted, resulting in a denial of service. The highest threat from this vu...
https://nvd.nist.gov/vuln/detail/CVE-2020-25651
204,435
mutt
31eef6c766f47df8281942d19f76e35f475c781d
https://github.com/muttmua/mutt
https://gitlab.com/muttmua/mutt/commit/31eef6c766f47df8281942d19f76e35f475c781d
Selectively cache headers. Thanks to NeoMutt and Jeriko One for the patch, which was slightly modified to apply to the Mutt code.
1
header_cache_t* imap_hcache_open (IMAP_DATA* idata, const char* path) { IMAP_MBOX mx; ciss_url_t url; char cachepath[LONG_STRING]; char mbox[LONG_STRING]; if (path) imap_cachepath (idata, path, mbox, sizeof (mbox)); else { if (!idata->ctx || imap_parse_path (idata->ctx->path, &mx) < 0) retu...
92,899,900,822,160,150,000,000,000,000,000,000,000
util.c
62,920,128,730,223,470,000,000,000,000,000,000,000
[ "CWE-22" ]
CVE-2018-14355
An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/util.c mishandles ".." directory traversal in a mailbox name.
https://nvd.nist.gov/vuln/detail/CVE-2018-14355
359,787
mutt
31eef6c766f47df8281942d19f76e35f475c781d
https://github.com/muttmua/mutt
https://gitlab.com/muttmua/mutt/commit/31eef6c766f47df8281942d19f76e35f475c781d
Selectively cache headers. Thanks to NeoMutt and Jeriko One for the patch, which was slightly modified to apply to the Mutt code.
0
header_cache_t* imap_hcache_open (IMAP_DATA* idata, const char* path) { IMAP_MBOX mx; ciss_url_t url; char cachepath[LONG_STRING]; char mbox[LONG_STRING]; size_t len; if (path) imap_cachepath (idata, path, mbox, sizeof (mbox)); else { if (!idata->ctx || imap_parse_path (idata->ctx->path, &mx) <...
84,185,136,930,006,980,000,000,000,000,000,000,000
util.c
324,603,979,447,683,900,000,000,000,000,000,000,000
[ "CWE-22" ]
CVE-2018-14355
An issue was discovered in Mutt before 1.10.1 and NeoMutt before 2018-07-16. imap/util.c mishandles ".." directory traversal in a mailbox name.
https://nvd.nist.gov/vuln/detail/CVE-2018-14355
204,442
linux
4a9d46a9fe14401f21df69cea97c62396d5fb053
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/4a9d46a9fe14401f21df69cea97c62396d5fb053
RDMA: Fix goto target to release the allocated memory In bnxt_re_create_srq(), when ib_copy_to_udata() fails allocated memory should be released by goto fail. Fixes: 37cb11acf1f7 ("RDMA/bnxt_re: Add SRQ support for Broadcom adapters") Link: https://lore.kernel.org/r/20190910222120.16517-1-navid.emamdoost@gmail.com Si...
1
int bnxt_re_create_srq(struct ib_srq *ib_srq, struct ib_srq_init_attr *srq_init_attr, struct ib_udata *udata) { struct ib_pd *ib_pd = ib_srq->pd; struct bnxt_re_pd *pd = container_of(ib_pd, struct bnxt_re_pd, ib_pd); struct bnxt_re_dev *rdev = pd->rdev; struct bnxt_qplib_dev_attr *dev_attr = &rdev...
302,447,471,173,419,300,000,000,000,000,000,000,000
ib_verbs.c
247,623,184,076,655,960,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2019-19077
A memory leak in the bnxt_re_create_srq() function in drivers/infiniband/hw/bnxt_re/ib_verbs.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering copy to udata failures, aka CID-4a9d46a9fe14.
https://nvd.nist.gov/vuln/detail/CVE-2019-19077
359,891
linux
4a9d46a9fe14401f21df69cea97c62396d5fb053
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/4a9d46a9fe14401f21df69cea97c62396d5fb053
RDMA: Fix goto target to release the allocated memory In bnxt_re_create_srq(), when ib_copy_to_udata() fails allocated memory should be released by goto fail. Fixes: 37cb11acf1f7 ("RDMA/bnxt_re: Add SRQ support for Broadcom adapters") Link: https://lore.kernel.org/r/20190910222120.16517-1-navid.emamdoost@gmail.com Si...
0
int bnxt_re_create_srq(struct ib_srq *ib_srq, struct ib_srq_init_attr *srq_init_attr, struct ib_udata *udata) { struct ib_pd *ib_pd = ib_srq->pd; struct bnxt_re_pd *pd = container_of(ib_pd, struct bnxt_re_pd, ib_pd); struct bnxt_re_dev *rdev = pd->rdev; struct bnxt_qplib_dev_attr *dev_attr = &rdev...
331,779,862,910,464,100,000,000,000,000,000,000,000
ib_verbs.c
60,854,610,502,843,340,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2019-19077
A memory leak in the bnxt_re_create_srq() function in drivers/infiniband/hw/bnxt_re/ib_verbs.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering copy to udata failures, aka CID-4a9d46a9fe14.
https://nvd.nist.gov/vuln/detail/CVE-2019-19077
204,443
libvncserver
05a9bd41a8ec0a9d580a8f420f41718bdd235446
https://github.com/LibVNC/libvncserver
https://github.com/newsoft/libvncserver/commit/05a9bd41a8ec0a9d580a8f420f41718bdd235446
Do not accept a scaling factor of zero on PalmVNCSetScaleFactor and SetScale client->server messages. This would cause a division by zero and crash the server.
1
rfbProcessClientNormalMessage(rfbClientPtr cl) { int n=0; rfbClientToServerMsg msg; char *str; int i; uint32_t enc=0; uint32_t lastPreferredEncoding = -1; char encBuf[64]; char encBuf2[64]; #ifdef LIBVNCSERVER_WITH_WEBSOCKETS if (cl->wsctx && webSocketCheckDisconnect(cl)) retu...
206,749,608,858,323,160,000,000,000,000,000,000,000
rfbserver.c
163,207,847,579,691,220,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2014-6054
The rfbProcessClientNormalMessage function in libvncserver/rfbserver.c in LibVNCServer 0.9.9 and earlier allows remote attackers to cause a denial of service (divide-by-zero error and server crash) via a zero value in the scaling factor in a (1) PalmVNCSetScaleFactor or (2) SetScale message.
https://nvd.nist.gov/vuln/detail/CVE-2014-6054
359,965
libvncserver
05a9bd41a8ec0a9d580a8f420f41718bdd235446
https://github.com/LibVNC/libvncserver
https://github.com/newsoft/libvncserver/commit/05a9bd41a8ec0a9d580a8f420f41718bdd235446
Do not accept a scaling factor of zero on PalmVNCSetScaleFactor and SetScale client->server messages. This would cause a division by zero and crash the server.
0
rfbProcessClientNormalMessage(rfbClientPtr cl) { int n=0; rfbClientToServerMsg msg; char *str; int i; uint32_t enc=0; uint32_t lastPreferredEncoding = -1; char encBuf[64]; char encBuf2[64]; #ifdef LIBVNCSERVER_WITH_WEBSOCKETS if (cl->wsctx && webSocketCheckDisconnect(cl)) retu...
229,169,901,904,628,170,000,000,000,000,000,000,000
rfbserver.c
245,143,555,823,770,300,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2014-6054
The rfbProcessClientNormalMessage function in libvncserver/rfbserver.c in LibVNCServer 0.9.9 and earlier allows remote attackers to cause a denial of service (divide-by-zero error and server crash) via a zero value in the scaling factor in a (1) PalmVNCSetScaleFactor or (2) SetScale message.
https://nvd.nist.gov/vuln/detail/CVE-2014-6054
204,444
lxc
f547349ea7ef3a6eae6965a95cb5986cd921bd99
https://github.com/lxc/lxc
https://github.com/lxc/lxc/commit/f547349ea7ef3a6eae6965a95cb5986cd921bd99
CVE-2015-1331: lxclock: use /run/lxc/lock rather than /run/lock/lxc This prevents an unprivileged user to use LXC to create arbitrary file on the filesystem. Signed-off-by: Serge Hallyn <serge.hallyn@ubuntu.com> Signed-off-by: Tyler Hicks <tyhicks@canonical.com> Acked-by: Stéphane Graber <stgraber@ubuntu.com>
1
static char *lxclock_name(const char *p, const char *n) { int ret; int len; char *dest; char *rundir; /* lockfile will be: * "/run" + "/lock/lxc/$lxcpath/$lxcname + '\0' if root * or * $XDG_RUNTIME_DIR + "/lock/lxc/$lxcpath/$lxcname + '\0' if non-root */ /* length of "/lock/lxc/" + $lxcpath + "/" + $lxc...
24,167,740,325,555,270,000,000,000,000,000,000,000
lxclock.c
100,870,178,609,157,200,000,000,000,000,000,000,000
[ "CWE-59" ]
CVE-2015-1331
lxclock.c in LXC 1.1.2 and earlier allows local users to create arbitrary files via a symlink attack on /run/lock/lxc/*.
https://nvd.nist.gov/vuln/detail/CVE-2015-1331
359,978
lxc
f547349ea7ef3a6eae6965a95cb5986cd921bd99
https://github.com/lxc/lxc
https://github.com/lxc/lxc/commit/f547349ea7ef3a6eae6965a95cb5986cd921bd99
CVE-2015-1331: lxclock: use /run/lxc/lock rather than /run/lock/lxc This prevents an unprivileged user to use LXC to create arbitrary file on the filesystem. Signed-off-by: Serge Hallyn <serge.hallyn@ubuntu.com> Signed-off-by: Tyler Hicks <tyhicks@canonical.com> Acked-by: Stéphane Graber <stgraber@ubuntu.com>
0
static char *lxclock_name(const char *p, const char *n) { int ret; int len; char *dest; char *rundir; /* lockfile will be: * "/run" + "/lxc/lock/$lxcpath/$lxcname + '\0' if root * or * $XDG_RUNTIME_DIR + "/lxc/lock/$lxcpath/$lxcname + '\0' if non-root */ /* length of "/lxc/lock/" + $lxcpath + "/" + $lxc...
2,191,704,654,150,311,400,000,000,000,000,000,000
lxclock.c
234,299,807,627,059,540,000,000,000,000,000,000,000
[ "CWE-59" ]
CVE-2015-1331
lxclock.c in LXC 1.1.2 and earlier allows local users to create arbitrary files via a symlink attack on /run/lock/lxc/*.
https://nvd.nist.gov/vuln/detail/CVE-2015-1331
204,445
libwebm
8e88e04b07352f2ca449278b44a2d8ec7631bdcf
https://github.com/webmproject/libwebm
https://github.com/webmproject/libwebm/commit/8e88e04b07352f2ca449278b44a2d8ec7631bdcf
webm2pes: Avoid OOB reads caused by invalid superframe index. BUG=webm:1492 Change-Id: Ibd5781731fe8f6fcdf5f1cc6e5807d17b3b92d4d
1
bool ParseVP9SuperFrameIndex(const std::uint8_t* frame, std::size_t frame_length, Ranges* frame_ranges) { if (frame == nullptr || frame_length == 0 || frame_ranges == nullptr) return false; bool parse_ok = false; const std::uint8_t marker = frame[frame_length - 1]; const std::u...
219,581,059,272,884,470,000,000,000,000,000,000,000
libwebm_util.cc
138,127,343,428,068,670,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-6406
The function ParseVP9SuperFrameIndex in common/libwebm_util.cc in libwebm through 2018-01-30 does not validate the child_frame_length data obtained from a .webm file, which allows remote attackers to cause an information leak or a denial of service (heap-based buffer over-read and later out-of-bounds write), or possibl...
https://nvd.nist.gov/vuln/detail/CVE-2018-6406
359,981
libwebm
8e88e04b07352f2ca449278b44a2d8ec7631bdcf
https://github.com/webmproject/libwebm
https://github.com/webmproject/libwebm/commit/8e88e04b07352f2ca449278b44a2d8ec7631bdcf
webm2pes: Avoid OOB reads caused by invalid superframe index. BUG=webm:1492 Change-Id: Ibd5781731fe8f6fcdf5f1cc6e5807d17b3b92d4d
0
bool ParseVP9SuperFrameIndex(const std::uint8_t* frame, std::size_t frame_length, Ranges* frame_ranges, bool* error) { if (frame == nullptr || frame_length == 0 || frame_ranges == nullptr || error == nullptr) { return false; } bool parse_ok = fa...
84,318,726,563,073,190,000,000,000,000,000,000,000
libwebm_util.cc
54,642,158,402,706,210,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-6406
The function ParseVP9SuperFrameIndex in common/libwebm_util.cc in libwebm through 2018-01-30 does not validate the child_frame_length data obtained from a .webm file, which allows remote attackers to cause an information leak or a denial of service (heap-based buffer over-read and later out-of-bounds write), or possibl...
https://nvd.nist.gov/vuln/detail/CVE-2018-6406
204,447
sssd
4da27d52078497c5c095f4a4cd9975fe5c83c330
http://git.fedorahosted.org/git/?p=sssd
https://git.fedorahosted.org/cgit/sssd.git/commit/?id=4da27d52078497c5c095f4a4cd9975fe5c83c330
AD: process non-posix nested groups w/o tokenGroups When initgr is performed for AD not supporting tokenGroups, do not filter out groups without gid attribute or with gid equal to zero. Resolves: https://fedorahosted.org/sssd/ticket/2343 Reviewed-by: Michal Židek <mzidek@redhat.com> (cherry picked from commit 981bf5...
1
static struct tevent_req *sdap_initgr_rfc2307bis_send( TALLOC_CTX *memctx, struct tevent_context *ev, struct sdap_options *opts, struct sdap_domain *sdom, struct sdap_handle *sh, const char *name, const char *orig_dn) { errno_t ret; struct tevent_req *req;...
219,731,369,975,348,040,000,000,000,000,000,000,000
sdap_async_initgroups.c
309,295,817,825,451,720,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2014-0249
The System Security Services Daemon (SSSD) 1.11.6 does not properly identify group membership when a non-POSIX group is in a group membership chain, which allows local users to bypass access restrictions via unspecified vectors.
https://nvd.nist.gov/vuln/detail/CVE-2014-0249
360,031
sssd
4da27d52078497c5c095f4a4cd9975fe5c83c330
http://git.fedorahosted.org/git/?p=sssd
https://git.fedorahosted.org/cgit/sssd.git/commit/?id=4da27d52078497c5c095f4a4cd9975fe5c83c330
AD: process non-posix nested groups w/o tokenGroups When initgr is performed for AD not supporting tokenGroups, do not filter out groups without gid attribute or with gid equal to zero. Resolves: https://fedorahosted.org/sssd/ticket/2343 Reviewed-by: Michal Židek <mzidek@redhat.com> (cherry picked from commit 981bf5...
0
static struct tevent_req *sdap_initgr_rfc2307bis_send( TALLOC_CTX *memctx, struct tevent_context *ev, struct sdap_options *opts, struct sdap_domain *sdom, struct sdap_handle *sh, const char *name, const char *orig_dn) { errno_t ret; struct tevent_req *req;...
86,849,238,599,963,510,000,000,000,000,000,000,000
sdap_async_initgroups.c
61,434,543,464,282,480,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2014-0249
The System Security Services Daemon (SSSD) 1.11.6 does not properly identify group membership when a non-POSIX group is in a group membership chain, which allows local users to bypass access restrictions via unspecified vectors.
https://nvd.nist.gov/vuln/detail/CVE-2014-0249
204,501
clamav-devel
dfc00cd3301a42b571454b51a6102eecf58407bc
https://github.com/vrtadmin/clamav-devel
https://github.com/vrtadmin/clamav-devel/commit/dfc00cd3301a42b571454b51a6102eecf58407bc
bb19798 - fix out of bound memory access for crafted wwunpack file.
1
int wwunpack(uint8_t *exe, uint32_t exesz, uint8_t *wwsect, struct cli_exe_section *sects, uint16_t scount, uint32_t pe, int desc) { uint8_t *structs = wwsect + 0x2a1, *compd, *ccur, *unpd, *ucur, bc; uint32_t src, srcend, szd, bt, bits; int error=0, i; cli_dbgmsg("in wwunpack\n"); while (1) { if (!CLI_I...
215,311,999,632,108,280,000,000,000,000,000,000,000
wwunpack.c
304,637,741,545,599,750,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2017-6420
The wwunpack function in libclamav/wwunpack.c in ClamAV 0.99.2 allows remote attackers to cause a denial of service (use-after-free) via a crafted PE file with WWPack compression.
https://nvd.nist.gov/vuln/detail/CVE-2017-6420
360,962
clamav-devel
dfc00cd3301a42b571454b51a6102eecf58407bc
https://github.com/vrtadmin/clamav-devel
https://github.com/vrtadmin/clamav-devel/commit/dfc00cd3301a42b571454b51a6102eecf58407bc
bb19798 - fix out of bound memory access for crafted wwunpack file.
0
int wwunpack(uint8_t *exe, uint32_t exesz, uint8_t *wwsect, struct cli_exe_section *sects, uint16_t scount, uint32_t pe, int desc) { uint8_t *structs = wwsect + 0x2a1, *compd, *ccur, *unpd, *ucur, bc; uint32_t src, srcend, szd, bt, bits; int error=0, i; cli_dbgmsg("in wwunpack\n"); while (1) { if (!CLI_I...
309,338,320,923,548,500,000,000,000,000,000,000,000
wwunpack.c
13,422,378,201,151,260,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2017-6420
The wwunpack function in libclamav/wwunpack.c in ClamAV 0.99.2 allows remote attackers to cause a denial of service (use-after-free) via a crafted PE file with WWPack compression.
https://nvd.nist.gov/vuln/detail/CVE-2017-6420
204,502
ImageMagick
6790815c75bdea0357df5564345847856e995d6b
https://github.com/ImageMagick/ImageMagick
http://git.imagemagick.org/repos/ImageMagick/commit/6790815c75bdea0357df5564345847856e995d6b
Fixed memory leak in IsOptionMember.
1
MagickExport MagickBooleanType IsOptionMember(const char *option, const char *options) { char **option_list, *string; int number_options; MagickBooleanType member; register ssize_t i; /* Is option a member of the options list? */ if (options == (const char *) NULL) return...
101,838,286,104,579,790,000,000,000,000,000,000,000
option.c
112,869,378,559,637,220,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2016-10252
Memory leak in the IsOptionMember function in MagickCore/option.c in ImageMagick before 6.9.2-2, as used in ODR-PadEnc and other products, allows attackers to trigger memory consumption.
https://nvd.nist.gov/vuln/detail/CVE-2016-10252
360,963
ImageMagick
6790815c75bdea0357df5564345847856e995d6b
https://github.com/ImageMagick/ImageMagick
http://git.imagemagick.org/repos/ImageMagick/commit/6790815c75bdea0357df5564345847856e995d6b
Fixed memory leak in IsOptionMember.
0
MagickExport MagickBooleanType IsOptionMember(const char *option, const char *options) { char **option_list, *string; int number_options; MagickBooleanType member; register ssize_t i; /* Is option a member of the options list? */ if (options == (const char *) NULL) return...
74,691,017,348,243,800,000,000,000,000,000,000,000
option.c
98,310,158,358,005,700,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2016-10252
Memory leak in the IsOptionMember function in MagickCore/option.c in ImageMagick before 6.9.2-2, as used in ODR-PadEnc and other products, allows attackers to trigger memory consumption.
https://nvd.nist.gov/vuln/detail/CVE-2016-10252
204,503
linux
ca7a03c4175366a92cee0ccc4fec0038c3266e26
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ca7a03c4175366a92cee0ccc4fec0038c3266e26
ipv6: do not free rt if FIB_LOOKUP_NOREF is set on suppress rule Commit 7d9e5f422150 removed references from certain dsts, but accounting for this never translated down into the fib6 suppression code. This bug was triggered by WireGuard users who use wg-quick(8), which uses the "suppress-prefix" directive to ip-rule(8...
1
static bool fib6_rule_suppress(struct fib_rule *rule, struct fib_lookup_arg *arg) { struct fib6_result *res = arg->result; struct rt6_info *rt = res->rt6; struct net_device *dev = NULL; if (!rt) return false; if (rt->rt6i_idev) dev = rt->rt6i_idev->dev; /* do not accept result if the route does * not mee...
324,538,581,425,559,400,000,000,000,000,000,000,000
fib6_rules.c
143,298,823,367,322,570,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2021-3892
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2019-18198. Reason: This candidate is a reservation duplicate of CVE-2019-18198. Notes: All CVE users should reference CVE-2019-18198 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental us...
https://nvd.nist.gov/vuln/detail/CVE-2021-3892
360,995
linux
ca7a03c4175366a92cee0ccc4fec0038c3266e26
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/ca7a03c4175366a92cee0ccc4fec0038c3266e26
ipv6: do not free rt if FIB_LOOKUP_NOREF is set on suppress rule Commit 7d9e5f422150 removed references from certain dsts, but accounting for this never translated down into the fib6 suppression code. This bug was triggered by WireGuard users who use wg-quick(8), which uses the "suppress-prefix" directive to ip-rule(8...
0
static bool fib6_rule_suppress(struct fib_rule *rule, struct fib_lookup_arg *arg) { struct fib6_result *res = arg->result; struct rt6_info *rt = res->rt6; struct net_device *dev = NULL; if (!rt) return false; if (rt->rt6i_idev) dev = rt->rt6i_idev->dev; /* do not accept result if the route does * not mee...
119,967,756,548,228,810,000,000,000,000,000,000,000
fib6_rules.c
303,934,418,627,799,830,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2021-3892
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2019-18198. Reason: This candidate is a reservation duplicate of CVE-2019-18198. Notes: All CVE users should reference CVE-2019-18198 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental us...
https://nvd.nist.gov/vuln/detail/CVE-2021-3892
204,525
openjpeg
ad593c9e0622e0d8d87228e67e4dbd36243ffd22
https://github.com/uclouvain/openjpeg
https://github.com/uclouvain/openjpeg/commit/ad593c9e0622e0d8d87228e67e4dbd36243ffd22
Fix heap-buffer-overflow in color_esycc_to_rgb (#748) When all components do not have the same dx/dy, components buffer are read beyond their end. Do not convert in this case. Update uclouvain/openjpeg#725
1
void color_esycc_to_rgb(opj_image_t *image) { int y, cb, cr, sign1, sign2, val; unsigned int w, h, max, i; int flip_value = (1 << (image->comps[0].prec-1)); int max_value = (1 << image->comps[0].prec) - 1; if(image->numcomps < 3) return; w = image->comps[0].w; h = image->comps[0].h; sign1 = (int)image->co...
108,563,818,164,279,580,000,000,000,000,000,000,000
color.c
151,110,894,574,798,240,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-3182
The color_esycc_to_rgb function in bin/common/color.c in OpenJPEG before 2.1.1 allows attackers to cause a denial of service (memory corruption) via a crafted jpeg 2000 file.
https://nvd.nist.gov/vuln/detail/CVE-2016-3182
68,533
openjpeg
162f6199c0cd3ec1c6c6dc65e41b2faab92b2d91
https://github.com/uclouvain/openjpeg
https://github.com/uclouvain/openjpeg/commit/162f6199c0cd3ec1c6c6dc65e41b2faab92b2d91
Fix Heap Buffer Overflow in function color_cmyk_to_rgb Fix uclouvain/openjpeg#774
0
void color_esycc_to_rgb(opj_image_t *image) { int y, cb, cr, sign1, sign2, val; unsigned int w, h, max, i; int flip_value = (1 << (image->comps[0].prec-1)); int max_value = (1 << image->comps[0].prec) - 1; if ( (image->numcomps < 3) || (image->comps[0].dx != image->comps[1].dx) || (image->comps[0].dx !=...
205,404,301,164,067,240,000,000,000,000,000,000,000
color.c
144,381,218,147,487,070,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-4796
Heap-based buffer overflow in the color_cmyk_to_rgb in common/color.c in OpenJPEG before 2.1.1 allows remote attackers to cause a denial of service (crash) via a crafted .j2k file.
https://nvd.nist.gov/vuln/detail/CVE-2016-4796
204,531
libvncserver
045a044e8ae79db9244593fbce154cdf6e843273
https://github.com/LibVNC/libvncserver
https://github.com/newsoft/libvncserver/commit/045a044e8ae79db9244593fbce154cdf6e843273
Fix integer overflow in MallocFrameBuffer() Promote integers to uint64_t to avoid integer overflow issue during frame buffer allocation for very large screen sizes
1
static rfbBool MallocFrameBuffer(rfbClient* client) { if(client->frameBuffer) free(client->frameBuffer); client->frameBuffer=malloc(client->width*client->height*client->format.bitsPerPixel/8); return client->frameBuffer?TRUE:FALSE; }
332,958,005,458,995,000,000,000,000,000,000,000,000
vncviewer.c
156,923,722,532,028,200,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2014-6051
Integer overflow in the MallocFrameBuffer function in vncviewer.c in LibVNCServer 0.9.9 and earlier allows remote VNC servers to cause a denial of service (crash) and possibly execute arbitrary code via an advertisement for a large screen size, which triggers a heap-based buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2014-6051
361,255
libvncserver
045a044e8ae79db9244593fbce154cdf6e843273
https://github.com/LibVNC/libvncserver
https://github.com/newsoft/libvncserver/commit/045a044e8ae79db9244593fbce154cdf6e843273
Fix integer overflow in MallocFrameBuffer() Promote integers to uint64_t to avoid integer overflow issue during frame buffer allocation for very large screen sizes
0
static rfbBool MallocFrameBuffer(rfbClient* client) { uint64_t allocSize; if(client->frameBuffer) free(client->frameBuffer); /* SECURITY: promote 'width' into uint64_t so that the multiplication does not overflow 'width' and 'height' are 16-bit integers per RFB protocol design SIZE_MAX is the maximu...
46,219,224,644,773,750,000,000,000,000,000,000,000
vncviewer.c
59,162,983,907,888,380,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2014-6051
Integer overflow in the MallocFrameBuffer function in vncviewer.c in LibVNCServer 0.9.9 and earlier allows remote VNC servers to cause a denial of service (crash) and possibly execute arbitrary code via an advertisement for a large screen size, which triggers a heap-based buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2014-6051
204,552
fribidi
d989590e124ad995de3598800c8835d819fadf80
https://github.com/fribidi/fribidi
https://github.com/fribidi/fribidi/commit/d989590e124ad995de3598800c8835d819fadf80
Reduce dynamic allocations by using arrays for all small arrays.
1
fribidi_get_par_embedding_levels_ex ( /* input */ const FriBidiCharType *bidi_types, const FriBidiBracketType *bracket_types, const FriBidiStrIndex len, /* input and output */ FriBidiParType *pbase_dir, /* output */ FriBidiLevel *embedding_levels ) { FriBidiLevel base_level, *base_level_per_iso_level ...
336,737,162,813,018,100,000,000,000,000,000,000,000
fribidi-bidi.c
226,358,926,109,444,930,000,000,000,000,000,000,000
[ "CWE-120" ]
CVE-2019-18397
A buffer overflow in the fribidi_get_par_embedding_levels_ex() function in lib/fribidi-bidi.c of GNU FriBidi through 1.0.7 allows an attacker to cause a denial of service or possibly execute arbitrary code by delivering crafted text content to a user, when this content is then rendered by an application that uses FriBi...
https://nvd.nist.gov/vuln/detail/CVE-2019-18397
361,875
fribidi
d989590e124ad995de3598800c8835d819fadf80
https://github.com/fribidi/fribidi
https://github.com/fribidi/fribidi/commit/d989590e124ad995de3598800c8835d819fadf80
Reduce dynamic allocations by using arrays for all small arrays.
0
fribidi_get_par_embedding_levels_ex ( /* input */ const FriBidiCharType *bidi_types, const FriBidiBracketType *bracket_types, const FriBidiStrIndex len, /* input and output */ FriBidiParType *pbase_dir, /* output */ FriBidiLevel *embedding_levels ) { FriBidiLevel base_level_per_iso_level[FRIBIDI_BIDI_...
251,110,426,847,020,230,000,000,000,000,000,000,000
fribidi-bidi.c
46,178,116,312,556,790,000,000,000,000,000,000,000
[ "CWE-120" ]
CVE-2019-18397
A buffer overflow in the fribidi_get_par_embedding_levels_ex() function in lib/fribidi-bidi.c of GNU FriBidi through 1.0.7 allows an attacker to cause a denial of service or possibly execute arbitrary code by delivering crafted text content to a user, when this content is then rendered by an application that uses FriBi...
https://nvd.nist.gov/vuln/detail/CVE-2019-18397
204,560
linux
cc16eecae687912238ee6efbff71ad31e2bc414e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/cc16eecae687912238ee6efbff71ad31e2bc414e
jbd2: fix use-after-free of transaction_t race jbd2_journal_wait_updates() is called with j_state_lock held. But if there is a commit in progress, then this transaction might get committed and freed via jbd2_journal_commit_transaction() -> jbd2_journal_free_transaction(), when we release j_state_lock. So check for jou...
1
void jbd2_journal_wait_updates(journal_t *journal) { transaction_t *commit_transaction = journal->j_running_transaction; if (!commit_transaction) return; spin_lock(&commit_transaction->t_handle_lock); while (atomic_read(&commit_transaction->t_updates)) { DEFINE_WAIT(wait); prepare_to_wait(&journal->j_wait_...
82,699,010,449,325,360,000,000,000,000,000,000,000
transaction.c
282,550,602,848,862,600,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2022-28796
jbd2_journal_wait_updates in fs/jbd2/transaction.c in the Linux kernel before 5.17.1 has a use-after-free caused by a transaction_t race condition.
https://nvd.nist.gov/vuln/detail/CVE-2022-28796
361,958
linux
cc16eecae687912238ee6efbff71ad31e2bc414e
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/cc16eecae687912238ee6efbff71ad31e2bc414e
jbd2: fix use-after-free of transaction_t race jbd2_journal_wait_updates() is called with j_state_lock held. But if there is a commit in progress, then this transaction might get committed and freed via jbd2_journal_commit_transaction() -> jbd2_journal_free_transaction(), when we release j_state_lock. So check for jou...
0
void jbd2_journal_wait_updates(journal_t *journal) { DEFINE_WAIT(wait); while (1) { /* * Note that the running transaction can get freed under us if * this transaction is getting committed in * jbd2_journal_commit_transaction() -> * jbd2_journal_free_transaction(). This can only happen when we * rel...
8,887,012,106,075,676,000,000,000,000,000,000,000
transaction.c
230,170,887,751,092,620,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2022-28796
jbd2_journal_wait_updates in fs/jbd2/transaction.c in the Linux kernel before 5.17.1 has a use-after-free caused by a transaction_t race condition.
https://nvd.nist.gov/vuln/detail/CVE-2022-28796
204,572
gimp
eb2980683e6472aff35a3117587c4f814515c74d
https://github.com/GNOME/gimp
https://git.gnome.org/browse/gimp/commit/?id=eb2980683e6472aff35a3117587c4f814515c74d
Bug 790853 - (CVE-2017-17787) heap overread in psp importer. As any external data, we have to check that strings being read at fixed length are properly nul-terminated.
1
read_creator_block (FILE *f, gint image_ID, guint total_len, PSPimage *ia) { long data_start; guchar buf[4]; guint16 keyword; guint32 length; gchar *string; gchar *title = NULL, *artist = NULL,...
162,156,423,216,684,250,000,000,000,000,000,000,000
file-psp.c
130,121,853,822,943,490,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-17787
In GIMP 2.8.22, there is a heap-based buffer over-read in read_creator_block in plug-ins/common/file-psp.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-17787
362,049
gimp
eb2980683e6472aff35a3117587c4f814515c74d
https://github.com/GNOME/gimp
https://git.gnome.org/browse/gimp/commit/?id=eb2980683e6472aff35a3117587c4f814515c74d
Bug 790853 - (CVE-2017-17787) heap overread in psp importer. As any external data, we have to check that strings being read at fixed length are properly nul-terminated.
0
read_creator_block (FILE *f, gint image_ID, guint total_len, PSPimage *ia) { long data_start; guchar buf[4]; guint16 keyword; guint32 length; gchar *string; gchar *title = NULL, *artist = NULL,...
327,840,264,535,573,300,000,000,000,000,000,000,000
file-psp.c
264,892,542,288,040,270,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-17787
In GIMP 2.8.22, there is a heap-based buffer over-read in read_creator_block in plug-ins/common/file-psp.c.
https://nvd.nist.gov/vuln/detail/CVE-2017-17787
204,573
libgadu
6516e57766b4fa39d1c5b37379ea72a330598a13
https://github.com/wojtekka/libgadu
https://github.com/wojtekka/libgadu/commit/6516e57766b4fa39d1c5b37379ea72a330598a13
Poprawna weryfikacja certyfikatu za pomocą GnuTLS.
1
static gg_action_t gg_handle_tls_negotiation(struct gg_session *sess, struct gg_event *e, enum gg_state_t next_state, enum gg_state_t alt_state, enum gg_state_t alt2_state) { int valid_hostname = 0; #ifdef GG_CONFIG_HAVE_GNUTLS unsigned int status; int res; gg_debug_session(sess, GG_DEBUG_MISC, "// gg_watch_fd() ...
292,990,818,534,513,080,000,000,000,000,000,000,000
events.c
283,377,934,380,487,020,000,000,000,000,000,000,000
[ "CWE-310" ]
CVE-2013-4488
libgadu before 1.12.0 does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers.
https://nvd.nist.gov/vuln/detail/CVE-2013-4488
362,058
libgadu
6516e57766b4fa39d1c5b37379ea72a330598a13
https://github.com/wojtekka/libgadu
https://github.com/wojtekka/libgadu/commit/6516e57766b4fa39d1c5b37379ea72a330598a13
Poprawna weryfikacja certyfikatu za pomocą GnuTLS.
0
static gg_action_t gg_handle_tls_negotiation(struct gg_session *sess, struct gg_event *e, enum gg_state_t next_state, enum gg_state_t alt_state, enum gg_state_t alt2_state) { int valid_hostname = 0; #ifdef GG_CONFIG_HAVE_GNUTLS unsigned int status; int res; gg_debug_session(sess, GG_DEBUG_MISC, "// gg_watch_fd() ...
337,809,500,543,936,400,000,000,000,000,000,000,000
events.c
157,258,061,940,359,740,000,000,000,000,000,000,000
[ "CWE-310" ]
CVE-2013-4488
libgadu before 1.12.0 does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers.
https://nvd.nist.gov/vuln/detail/CVE-2013-4488
204,605
cpython
dcfcd146f8e6fc5c2fc16a4c192a0c5f5ca8c53c
https://github.com/python/cpython
https://github.com/python/cpython/commit/dcfcd146f8e6fc5c2fc16a4c192a0c5f5ca8c53c
bpo-35766: Merge typed_ast back into CPython (GH-11645)
1
ast_for_arguments(struct compiling *c, const node *n) { /* This function handles both typedargslist (function definition) and varargslist (lambda definition). parameters: '(' [typedargslist] ')' typedargslist: (tfpdef ['=' test] (',' tfpdef ['=' test])* [',' [ '*' [tfpdef] (',' ...
97,374,446,448,889,440,000,000,000,000,000,000,000
ast.c
65,549,193,664,576,065,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-19275
typed_ast 1.3.0 and 1.3.1 has an ast_for_arguments out-of-bounds read. An attacker with the ability to cause a Python interpreter to parse Python source (but not necessarily execute it) may be able to crash the interpreter process. This could be a concern, for example, in a web-based service that parses (but does not e...
https://nvd.nist.gov/vuln/detail/CVE-2019-19275
362,554
cpython
dcfcd146f8e6fc5c2fc16a4c192a0c5f5ca8c53c
https://github.com/python/cpython
https://github.com/python/cpython/commit/dcfcd146f8e6fc5c2fc16a4c192a0c5f5ca8c53c
bpo-35766: Merge typed_ast back into CPython (GH-11645)
0
ast_for_arguments(struct compiling *c, const node *n) { /* This function handles both typedargslist (function definition) and varargslist (lambda definition). parameters: '(' [typedargslist] ')' typedargslist: (tfpdef ['=' test] (',' tfpdef ['=' test])* [',' [ '*' [tfpdef] (',' ...
167,259,170,410,004,540,000,000,000,000,000,000,000
ast.c
16,141,127,940,571,282,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-19275
typed_ast 1.3.0 and 1.3.1 has an ast_for_arguments out-of-bounds read. An attacker with the ability to cause a Python interpreter to parse Python source (but not necessarily execute it) may be able to crash the interpreter process. This could be a concern, for example, in a web-based service that parses (but does not e...
https://nvd.nist.gov/vuln/detail/CVE-2019-19275
204,606
cpython
dcfcd146f8e6fc5c2fc16a4c192a0c5f5ca8c53c
https://github.com/python/cpython
https://github.com/python/cpython/commit/dcfcd146f8e6fc5c2fc16a4c192a0c5f5ca8c53c
bpo-35766: Merge typed_ast back into CPython (GH-11645)
1
handle_keywordonly_args(struct compiling *c, const node *n, int start, asdl_seq *kwonlyargs, asdl_seq *kwdefaults) { PyObject *argname; node *ch; expr_ty expression, annotation; arg_ty arg; int i = start; int j = 0; /* index for kwdefaults and kwonlyargs */ if (kwonl...
235,541,165,412,339,950,000,000,000,000,000,000,000
ast.c
65,549,193,664,576,065,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-19275
typed_ast 1.3.0 and 1.3.1 has an ast_for_arguments out-of-bounds read. An attacker with the ability to cause a Python interpreter to parse Python source (but not necessarily execute it) may be able to crash the interpreter process. This could be a concern, for example, in a web-based service that parses (but does not e...
https://nvd.nist.gov/vuln/detail/CVE-2019-19275
362,759
cpython
dcfcd146f8e6fc5c2fc16a4c192a0c5f5ca8c53c
https://github.com/python/cpython
https://github.com/python/cpython/commit/dcfcd146f8e6fc5c2fc16a4c192a0c5f5ca8c53c
bpo-35766: Merge typed_ast back into CPython (GH-11645)
0
handle_keywordonly_args(struct compiling *c, const node *n, int start, asdl_seq *kwonlyargs, asdl_seq *kwdefaults) { PyObject *argname; node *ch; expr_ty expression, annotation; arg_ty arg; int i = start; int j = 0; /* index for kwdefaults and kwonlyargs */ if (kwonl...
185,173,257,932,842,560,000,000,000,000,000,000,000
ast.c
16,141,127,940,571,282,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-19275
typed_ast 1.3.0 and 1.3.1 has an ast_for_arguments out-of-bounds read. An attacker with the ability to cause a Python interpreter to parse Python source (but not necessarily execute it) may be able to crash the interpreter process. This could be a concern, for example, in a web-based service that parses (but does not e...
https://nvd.nist.gov/vuln/detail/CVE-2019-19275
204,640
ovs
78e712c0b1dacc2f12d2a03d98f083d8672867f0
https://github.com/openvswitch/ovs
https://github.com/openvswitch/ovs/commit/78e712c0b1dacc2f12d2a03d98f083d8672867f0
lldp: do not leak memory on multiple instances of TLVs Upstream commit: commit a8d3c90feca548fc0656d95b5d278713db86ff61 Date: Tue, 17 Nov 2020 09:28:17 -0500 lldp: avoid memory leak from bad packets A packet that contains multiple instances of certain TLVs will cause lldpd to continually allocate...
1
lldp_decode(struct lldpd *cfg OVS_UNUSED, char *frame, int s, struct lldpd_hardware *hardware, struct lldpd_chassis **newchassis, struct lldpd_port **newport) { struct lldpd_chassis *chassis; struct lldpd_port *port; const struct eth_addr lldpaddr = LLDP_MULTICAST_ADDR; const cha...
242,615,569,337,244,400,000,000,000,000,000,000,000
lldp.c
246,107,048,674,418,260,000,000,000,000,000,000,000
[ "CWE-400" ]
CVE-2020-27827
A flaw was found in multiple versions of OpenvSwitch. Specially crafted LLDP packets can cause memory to be lost when allocating data to handle specific optional TLVs, potentially causing a denial of service. The highest threat from this vulnerability is to system availability.
https://nvd.nist.gov/vuln/detail/CVE-2020-27827
362,864
ovs
78e712c0b1dacc2f12d2a03d98f083d8672867f0
https://github.com/openvswitch/ovs
https://github.com/openvswitch/ovs/commit/78e712c0b1dacc2f12d2a03d98f083d8672867f0
lldp: do not leak memory on multiple instances of TLVs Upstream commit: commit a8d3c90feca548fc0656d95b5d278713db86ff61 Date: Tue, 17 Nov 2020 09:28:17 -0500 lldp: avoid memory leak from bad packets A packet that contains multiple instances of certain TLVs will cause lldpd to continually allocate...
0
lldp_decode(struct lldpd *cfg OVS_UNUSED, char *frame, int s, struct lldpd_hardware *hardware, struct lldpd_chassis **newchassis, struct lldpd_port **newport) { struct lldpd_chassis *chassis; struct lldpd_port *port; const struct eth_addr lldpaddr = LLDP_MULTICAST_ADDR; const cha...
36,570,509,236,460,337,000,000,000,000,000,000,000
lldp.c
31,128,373,072,676,173,000,000,000,000,000,000,000
[ "CWE-400" ]
CVE-2020-27827
A flaw was found in multiple versions of OpenvSwitch. Specially crafted LLDP packets can cause memory to be lost when allocating data to handle specific optional TLVs, potentially causing a denial of service. The highest threat from this vulnerability is to system availability.
https://nvd.nist.gov/vuln/detail/CVE-2020-27827
204,650
squid
dfd818595b54942cb1adc45f6aed95c9b706e3a8
https://github.com/squid-cache/squid
https://github.com/squid-cache/squid/commit/dfd818595b54942cb1adc45f6aed95c9b706e3a8
Merge pull request from GHSA-jvf6-h9gj-pmj6 * Add slash prefix to path-rootless or path-noscheme URLs * Update src/anyp/Uri.cc Co-authored-by: Alex Rousskov <rousskov@measurement-factory.com> * restore file trailer GH auto-removes * Remove redundant path-empty check * Removed stale comment left behind by b2ab59a ...
1
AnyP::Uri::parse(const HttpRequestMethod& method, const SBuf &rawUrl) { try { LOCAL_ARRAY(char, login, MAX_URL); LOCAL_ARRAY(char, foundHost, MAX_URL); LOCAL_ARRAY(char, urlpath, MAX_URL); char *t = NULL; char *q = NULL; int foundPort; int l; int i; ...
193,190,235,646,939,130,000,000,000,000,000,000,000
Uri.cc
197,215,166,910,062,160,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2020-25097
An issue was discovered in Squid through 4.13 and 5.x through 5.0.4. Due to improper input validation, it allows a trusted client to perform HTTP Request Smuggling and access services otherwise forbidden by the security controls. This occurs for certain uri_whitespace configuration settings.
https://nvd.nist.gov/vuln/detail/CVE-2020-25097
362,946
squid
dfd818595b54942cb1adc45f6aed95c9b706e3a8
https://github.com/squid-cache/squid
https://github.com/squid-cache/squid/commit/dfd818595b54942cb1adc45f6aed95c9b706e3a8
Merge pull request from GHSA-jvf6-h9gj-pmj6 * Add slash prefix to path-rootless or path-noscheme URLs * Update src/anyp/Uri.cc Co-authored-by: Alex Rousskov <rousskov@measurement-factory.com> * restore file trailer GH auto-removes * Remove redundant path-empty check * Removed stale comment left behind by b2ab59a ...
0
AnyP::Uri::parse(const HttpRequestMethod& method, const SBuf &rawUrl) { try { LOCAL_ARRAY(char, login, MAX_URL); LOCAL_ARRAY(char, foundHost, MAX_URL); LOCAL_ARRAY(char, urlpath, MAX_URL); char *t = NULL; char *q = NULL; int foundPort; int l; int i; ...
291,676,000,631,490,700,000,000,000,000,000,000,000
Uri.cc
67,809,856,326,610,510,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2020-25097
An issue was discovered in Squid through 4.13 and 5.x through 5.0.4. Due to improper input validation, it allows a trusted client to perform HTTP Request Smuggling and access services otherwise forbidden by the security controls. This occurs for certain uri_whitespace configuration settings.
https://nvd.nist.gov/vuln/detail/CVE-2020-25097
204,653
systemd
bf65b7e0c9fc215897b676ab9a7c9d1c688143ba
https://github.com/systemd/systemd
https://github.com/systemd/systemd/commit/bf65b7e0c9fc215897b676ab9a7c9d1c688143ba
core: imply NNP and SUID/SGID restriction for DynamicUser=yes service Let's be safe, rather than sorry. This way DynamicUser=yes services can neither take benefit of, nor create SUID/SGID binaries. Given that DynamicUser= is a recent addition only we should be able to get away with turning this on, even though this i...
1
int unit_patch_contexts(Unit *u) { CGroupContext *cc; ExecContext *ec; unsigned i; int r; assert(u); /* Patch in the manager defaults into the exec and cgroup * contexts, _after_ the rest of the settings have been * initialized */ ec = unit_ge...
280,700,732,805,838,780,000,000,000,000,000,000,000
unit.c
310,790,837,500,255,400,000,000,000,000,000,000,000
[ "CWE-269" ]
CVE-2019-3843
It was discovered that a systemd service that uses DynamicUser property can create a SUID/SGID binary that would be allowed to run as the transient service UID/GID even after the service is terminated. A local attacker may use this flaw to access resources that will be owned by a potentially different service in the fu...
https://nvd.nist.gov/vuln/detail/CVE-2019-3843
363,147
systemd
bf65b7e0c9fc215897b676ab9a7c9d1c688143ba
https://github.com/systemd/systemd
https://github.com/systemd/systemd/commit/bf65b7e0c9fc215897b676ab9a7c9d1c688143ba
core: imply NNP and SUID/SGID restriction for DynamicUser=yes service Let's be safe, rather than sorry. This way DynamicUser=yes services can neither take benefit of, nor create SUID/SGID binaries. Given that DynamicUser= is a recent addition only we should be able to get away with turning this on, even though this i...
0
int unit_patch_contexts(Unit *u) { CGroupContext *cc; ExecContext *ec; unsigned i; int r; assert(u); /* Patch in the manager defaults into the exec and cgroup * contexts, _after_ the rest of the settings have been * initialized */ ec = unit_ge...
259,827,188,005,672,400,000,000,000,000,000,000,000
unit.c
154,625,650,264,828,200,000,000,000,000,000,000,000
[ "CWE-269" ]
CVE-2019-3843
It was discovered that a systemd service that uses DynamicUser property can create a SUID/SGID binary that would be allowed to run as the transient service UID/GID even after the service is terminated. A local attacker may use this flaw to access resources that will be owned by a potentially different service in the fu...
https://nvd.nist.gov/vuln/detail/CVE-2019-3843
204,656
linux
6d4472d7bec39917b54e4e80245784ea5d60ce49
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6d4472d7bec39917b54e4e80245784ea5d60ce49
HID: hiddev: do cleanup in failure of opening a device Undo what we did for opening before releasing the memory slice. Reported-by: syzbot <syzbot+62a1e04fd3ec2abf099e@syzkaller.appspotmail.com> Cc: Andrey Konovalov <andreyknvl@google.com> Signed-off-by: Hillf Danton <hdanton@sina.com> Signed-off-by: Jiri Kosina <jko...
1
static int hiddev_open(struct inode *inode, struct file *file) { struct hiddev_list *list; struct usb_interface *intf; struct hid_device *hid; struct hiddev *hiddev; int res; intf = usbhid_find_interface(iminor(inode)); if (!intf) return -ENODEV; hid = usb_get_intfdata(intf); hiddev = hid->hiddev; if (!(l...
91,471,645,827,445,030,000,000,000,000,000,000,000
hiddev.c
287,820,702,768,880,070,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2019-19527
In the Linux kernel before 5.2.10, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver, aka CID-9c09b214f30e.
https://nvd.nist.gov/vuln/detail/CVE-2019-19527
363,234
linux
6d4472d7bec39917b54e4e80245784ea5d60ce49
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6d4472d7bec39917b54e4e80245784ea5d60ce49
HID: hiddev: do cleanup in failure of opening a device Undo what we did for opening before releasing the memory slice. Reported-by: syzbot <syzbot+62a1e04fd3ec2abf099e@syzkaller.appspotmail.com> Cc: Andrey Konovalov <andreyknvl@google.com> Signed-off-by: Hillf Danton <hdanton@sina.com> Signed-off-by: Jiri Kosina <jko...
0
static int hiddev_open(struct inode *inode, struct file *file) { struct hiddev_list *list; struct usb_interface *intf; struct hid_device *hid; struct hiddev *hiddev; int res; intf = usbhid_find_interface(iminor(inode)); if (!intf) return -ENODEV; hid = usb_get_intfdata(intf); hiddev = hid->hiddev; if (!(l...
302,185,486,399,060,830,000,000,000,000,000,000,000
hiddev.c
195,514,613,196,533,500,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2019-19527
In the Linux kernel before 5.2.10, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver, aka CID-9c09b214f30e.
https://nvd.nist.gov/vuln/detail/CVE-2019-19527
204,658
php-src
055ecbc62878e86287d742c7246c21606cee8183
https://github.com/php/php-src
http://git.php.net/?p=php-src.git;a=commit;h=055ecbc62878e86287d742c7246c21606cee8183
Improve check for :memory: pseudo-filename in SQlite
1
static char *make_filename_safe(const char *filename TSRMLS_DC) { if (*filename && strncmp(filename, ":memory:", sizeof(":memory:")-1)) { char *fullpath = expand_filepath(filename, NULL TSRMLS_CC); if (!fullpath) { return NULL; } if (PG(safe_mode) && (!php_checkuid(fullpath, NULL, CHECKUID_CHECK_FILE_AND_...
324,775,140,844,881,860,000,000,000,000,000,000,000
sqlite_driver.c
176,008,426,583,328,480,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2012-3365
The SQLite functionality in PHP before 5.3.15 allows remote attackers to bypass the open_basedir protection mechanism via unspecified vectors.
https://nvd.nist.gov/vuln/detail/CVE-2012-3365
363,249
php-src
055ecbc62878e86287d742c7246c21606cee8183
https://github.com/php/php-src
http://git.php.net/?p=php-src.git;a=commit;h=055ecbc62878e86287d742c7246c21606cee8183
Improve check for :memory: pseudo-filename in SQlite
0
static char *make_filename_safe(const char *filename TSRMLS_DC) { if (*filename && memcmp(filename, ":memory:", sizeof(":memory:"))) { char *fullpath = expand_filepath(filename, NULL TSRMLS_CC); if (!fullpath) { return NULL; } if (PG(safe_mode) && (!php_checkuid(fullpath, NULL, CHECKUID_CHECK_FILE_AND_DIR...
268,189,260,133,363,730,000,000,000,000,000,000,000
sqlite_driver.c
11,079,402,582,408,056,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2012-3365
The SQLite functionality in PHP before 5.3.15 allows remote attackers to bypass the open_basedir protection mechanism via unspecified vectors.
https://nvd.nist.gov/vuln/detail/CVE-2012-3365
204,673
openldap
67670f4544e28fb09eb7319c39f404e1d3229e65
https://github.com/openldap/openldap
https://git.openldap.org/openldap/openldap/-/commit/67670f4544e28fb09eb7319c39f404e1d3229e65
ITS#9383 remove assert in certificateListValidate
1
certificateListValidate( Syntax *syntax, struct berval *in ) { BerElementBuffer berbuf; BerElement *ber = (BerElement *)&berbuf; ber_tag_t tag; ber_len_t len, wrapper_len; char *wrapper_start; int wrapper_ok = 0; ber_int_t version = SLAP_X509_V1; struct berval bvdn, bvtu; ber_init2( ber, in, LBER_USE_DER ); ...
141,392,942,817,050,540,000,000,000,000,000,000,000
schema_init.c
324,889,549,138,247,480,000,000,000,000,000,000,000
[ "CWE-617" ]
CVE-2020-25709
A flaw was found in OpenLDAP. This flaw allows an attacker who can send a malicious packet to be processed by OpenLDAP’s slapd server, to trigger an assertion failure. The highest threat from this vulnerability is to system availability.
https://nvd.nist.gov/vuln/detail/CVE-2020-25709
363,447
openldap
67670f4544e28fb09eb7319c39f404e1d3229e65
https://github.com/openldap/openldap
https://git.openldap.org/openldap/openldap/-/commit/67670f4544e28fb09eb7319c39f404e1d3229e65
ITS#9383 remove assert in certificateListValidate
0
certificateListValidate( Syntax *syntax, struct berval *in ) { BerElementBuffer berbuf; BerElement *ber = (BerElement *)&berbuf; ber_tag_t tag; ber_len_t len, wrapper_len; char *wrapper_start; int wrapper_ok = 0; ber_int_t version = SLAP_X509_V1; struct berval bvdn, bvtu; ber_init2( ber, in, LBER_USE_DER ); ...
163,411,005,984,478,810,000,000,000,000,000,000,000
schema_init.c
178,853,289,235,310,460,000,000,000,000,000,000,000
[ "CWE-617" ]
CVE-2020-25709
A flaw was found in OpenLDAP. This flaw allows an attacker who can send a malicious packet to be processed by OpenLDAP’s slapd server, to trigger an assertion failure. The highest threat from this vulnerability is to system availability.
https://nvd.nist.gov/vuln/detail/CVE-2020-25709
204,674
pam-u2f
aab0c31a3bfed8912a271685d6ec909f61380155
https://github.com/Yubico/pam-u2f
https://github.com/Yubico/pam-u2f/commit/aab0c31a3bfed8912a271685d6ec909f61380155
Fix out-of-bound accesses
1
int get_devices_from_authfile(const char *authfile, const char *username, unsigned max_devs, int verbose, FILE *debug_file, device_t *devices, unsigned *n_devs) { char *buf = NULL; char *s_user, *s_token; int retval = 0; int fd = -1; struct stat st;...
249,374,239,051,246,100,000,000,000,000,000,000,000
util.c
220,179,366,542,057,640,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2019-1221
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka 'Scripting Engine Memory Corruption Vulnerability'.
https://nvd.nist.gov/vuln/detail/CVE-2019-1221
363,467
pam-u2f
aab0c31a3bfed8912a271685d6ec909f61380155
https://github.com/Yubico/pam-u2f
https://github.com/Yubico/pam-u2f/commit/aab0c31a3bfed8912a271685d6ec909f61380155
Fix out-of-bound accesses
0
int get_devices_from_authfile(const char *authfile, const char *username, unsigned max_devs, int verbose, FILE *debug_file, device_t *devices, unsigned *n_devs) { char *buf = NULL; char *s_user, *s_token; int retval = 0; int fd = -1; struct stat st;...
177,981,443,034,127,860,000,000,000,000,000,000,000
util.c
52,295,953,408,258,680,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2019-1221
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka 'Scripting Engine Memory Corruption Vulnerability'.
https://nvd.nist.gov/vuln/detail/CVE-2019-1221
204,675
openjpeg
8f9cc62b3f9a1da9712329ddcedb9750d585505c
https://github.com/uclouvain/openjpeg
https://github.com/uclouvain/openjpeg/commit/8f9cc62b3f9a1da9712329ddcedb9750d585505c
Fix division by zero Fix uclouvain/openjpeg#733
1
static INLINE OPJ_BOOL opj_tcd_init_tile(opj_tcd_t *p_tcd, OPJ_UINT32 p_tile_no, OPJ_BOOL isEncoder, OPJ_FLOAT32 fraction, OPJ_SIZE_T sizeof_block, opj_event_mgr_t* manager) { OPJ_UINT32 (*l_gain_ptr)(OPJ_UINT32) = 00; OPJ_UINT32 compno, resno, bandno, precno, cblkno; opj_tcp_t * l_tcp = 00; opj_cp_t * l_cp = 00; ...
246,090,537,600,594,740,000,000,000,000,000,000,000
tcd.c
322,377,989,703,889,840,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2016-4797
Divide-by-zero vulnerability in the opj_tcd_init_tile function in tcd.c in OpenJPEG before 2.1.1 allows remote attackers to cause a denial of service (application crash) via a crafted jp2 file. NOTE: this issue exists because of an incorrect fix for CVE-2014-7947.
https://nvd.nist.gov/vuln/detail/CVE-2016-4797
363,473
openjpeg
8f9cc62b3f9a1da9712329ddcedb9750d585505c
https://github.com/uclouvain/openjpeg
https://github.com/uclouvain/openjpeg/commit/8f9cc62b3f9a1da9712329ddcedb9750d585505c
Fix division by zero Fix uclouvain/openjpeg#733
0
static INLINE OPJ_BOOL opj_tcd_init_tile(opj_tcd_t *p_tcd, OPJ_UINT32 p_tile_no, OPJ_BOOL isEncoder, OPJ_FLOAT32 fraction, OPJ_SIZE_T sizeof_block, opj_event_mgr_t* manager) { OPJ_UINT32 (*l_gain_ptr)(OPJ_UINT32) = 00; OPJ_UINT32 compno, resno, bandno, precno, cblkno; opj_tcp_t * l_tcp = 00; opj_cp_t * l_cp = 00; ...
313,450,423,511,780,500,000,000,000,000,000,000,000
tcd.c
109,967,869,699,096,820,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2016-4797
Divide-by-zero vulnerability in the opj_tcd_init_tile function in tcd.c in OpenJPEG before 2.1.1 allows remote attackers to cause a denial of service (application crash) via a crafted jp2 file. NOTE: this issue exists because of an incorrect fix for CVE-2014-7947.
https://nvd.nist.gov/vuln/detail/CVE-2016-4797
204,707
linux
56cd26b618855c9af48c8301aa6754ced8dd0beb
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=56cd26b618855c9af48c8301aa6754ced8dd0beb
media: serial_ir: Fix use-after-free in serial_ir_init_module Syzkaller report this: BUG: KASAN: use-after-free in sysfs_remove_file_ns+0x5f/0x70 fs/sysfs/file.c:468 Read of size 8 at addr ffff8881dc7ae030 by task syz-executor.0/6249 CPU: 1 PID: 6249 Comm: syz-executor.0 Not tainted 5.0.0-rc8+ #3 Hardware name: QEMU...
1
static int __init serial_ir_init_module(void) { int result; switch (type) { case IR_HOMEBREW: case IR_IRDEO: case IR_IRDEO_REMOTE: case IR_ANIMAX: case IR_IGOR: /* if nothing specified, use ttyS0/com1 and irq 4 */ io = io ? io : 0x3f8; irq = irq ? irq : 4; break; default: return -EINVAL; } if (!sof...
277,875,762,275,747,300,000,000,000,000,000,000,000
serial_ir.c
90,841,396,646,188,770,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2019-19543
In the Linux kernel before 5.1.6, there is a use-after-free in serial_ir_init_module() in drivers/media/rc/serial_ir.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-19543