idx
int64
project
string
commit_id
string
project_url
string
commit_url
string
commit_message
string
target
int64
func
string
func_hash
float64
file_name
string
file_hash
float64
cwe
list
cve
string
cve_desc
string
nvd_url
string
370,724
tip
4e78921ba4dd0aca1cc89168f45039add4183f8e
http://git.kernel.org/cgit/linux/kernel/git/tip/tip
https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=4e78921ba4dd0aca1cc89168f45039add4183f8e
efi/x86/Add missing error handling to old_memmap 1:1 mapping code The old_memmap flow in efi_call_phys_prolog() performs numerous memory allocations, and either does not check for failure at all, or it does but fails to propagate it back to the caller, which may end up calling into the firmware with an incomplete 1:1 ...
0
pgd_t * __init efi_call_phys_prolog(void) { unsigned long vaddr, addr_pgd, addr_p4d, addr_pud; pgd_t *save_pgd, *pgd_k, *pgd_efi; p4d_t *p4d, *p4d_k, *p4d_efi; pud_t *pud; int pgd; int n_pgds, i, j; if (!efi_enabled(EFI_OLD_MEMMAP)) { efi_switch_mm(&efi_mm); return efi_mm.pgd; } early_code_mapping_set_e...
329,825,272,145,040,840,000,000,000,000,000,000,000
None
null
[ "CWE-388" ]
CVE-2019-12380
**DISPUTED** An issue was discovered in the efi subsystem in the Linux kernel through 5.1.5. phys_efi_set_virtual_address_map in arch/x86/platform/efi/efi.c and efi_call_phys_prolog in arch/x86/platform/efi/efi_64.c mishandle memory allocation failures. NOTE: This id is disputed as not being an issue because “All the c...
https://nvd.nist.gov/vuln/detail/CVE-2019-12380
205,719
libebml
88409e2a94dd3b40ff81d08bf6d92f486d036b24
https://github.com/Matroska-Org/libebml
https://github.com/Matroska-Org/libebml/commit/88409e2a94dd3b40ff81d08bf6d92f486d036b24
EbmlMaster: propagate upper level element after infinite sized one correctly When the parser encountered a deeply nested element with an infinite size then a following element of an upper level was not propagated correctly. Instead the element with the infinite size was added into the EBML element tree a second time r...
1
void EbmlMaster::Read(EbmlStream & inDataStream, const EbmlSemanticContext & sContext, int & UpperEltFound, EbmlElement * & FoundElt, bool AllowDummyElt, ScopeMode ReadFully) { if (ReadFully == SCOPE_NO_DATA) return; EbmlElement * ElementLevelA; // remove all existing elements, including the mandatory ones.....
6,414,099,527,910,853,000,000,000,000,000,000,000
EbmlMaster.cpp
185,529,239,083,850,600,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2015-8789
Use-after-free vulnerability in the EbmlMaster::Read function in libEBML before 1.3.3 allows context-dependent attackers to have unspecified impact via a "deeply nested element with infinite size" followed by another element of an upper level in an EBML document.
https://nvd.nist.gov/vuln/detail/CVE-2015-8789
370,793
libebml
88409e2a94dd3b40ff81d08bf6d92f486d036b24
https://github.com/Matroska-Org/libebml
https://github.com/Matroska-Org/libebml/commit/88409e2a94dd3b40ff81d08bf6d92f486d036b24
EbmlMaster: propagate upper level element after infinite sized one correctly When the parser encountered a deeply nested element with an infinite size then a following element of an upper level was not propagated correctly. Instead the element with the infinite size was added into the EBML element tree a second time r...
0
void EbmlMaster::Read(EbmlStream & inDataStream, const EbmlSemanticContext & sContext, int & UpperEltFound, EbmlElement * & FoundElt, bool AllowDummyElt, ScopeMode ReadFully) { if (ReadFully == SCOPE_NO_DATA) return; EbmlElement * ElementLevelA; // remove all existing elements, including the mandatory ones.....
267,143,589,191,996,740,000,000,000,000,000,000,000
EbmlMaster.cpp
69,472,703,838,393,550,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2015-8789
Use-after-free vulnerability in the EbmlMaster::Read function in libEBML before 1.3.3 allows context-dependent attackers to have unspecified impact via a "deeply nested element with infinite size" followed by another element of an upper level in an EBML document.
https://nvd.nist.gov/vuln/detail/CVE-2015-8789
205,721
net
4dd2b82d5adfbe0b1587ccad7a8f76d826120f37
https://git.kernel.org/cgit/linux/kernel/git/davem/net
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=4dd2b82d5adfbe0b1587ccad7a8f76d826120f37
udp: fix GRO packet of death syzbot was able to crash host by sending UDP packets with a 0 payload. TCP does not have this issue since we do not aggregate packets without payload. Since dev_gro_receive() sets gso_size based on skb_gro_len(skb) it seems not worth trying to cope with padded packets. BUG: KASAN: slab-...
1
static struct sk_buff *udp_gro_receive_segment(struct list_head *head, struct sk_buff *skb) { struct udphdr *uh = udp_hdr(skb); struct sk_buff *pp = NULL; struct udphdr *uh2; struct sk_buff *p; /* requires non zero csum, for symmetry with GSO */ if (!uh->check) { NAPI_GRO_CB(skb)->flush = 1; retu...
305,377,531,447,737,500,000,000,000,000,000,000,000
udp_offload.c
218,157,144,490,844,900,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2019-11683
udp_gro_receive_segment in net/ipv4/udp_offload.c in the Linux kernel 5.x before 5.0.13 allows remote attackers to cause a denial of service (slab-out-of-bounds memory corruption) or possibly have unspecified other impact via UDP packets with a 0 payload, because of mishandling of padded packets, aka the "GRO packet of...
https://nvd.nist.gov/vuln/detail/CVE-2019-11683
370,830
net
4dd2b82d5adfbe0b1587ccad7a8f76d826120f37
https://git.kernel.org/cgit/linux/kernel/git/davem/net
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=4dd2b82d5adfbe0b1587ccad7a8f76d826120f37
udp: fix GRO packet of death syzbot was able to crash host by sending UDP packets with a 0 payload. TCP does not have this issue since we do not aggregate packets without payload. Since dev_gro_receive() sets gso_size based on skb_gro_len(skb) it seems not worth trying to cope with padded packets. BUG: KASAN: slab-...
0
static struct sk_buff *udp_gro_receive_segment(struct list_head *head, struct sk_buff *skb) { struct udphdr *uh = udp_hdr(skb); struct sk_buff *pp = NULL; struct udphdr *uh2; struct sk_buff *p; unsigned int ulen; /* requires non zero csum, for symmetry with GSO */ if (!uh->check) { NAPI_GRO_CB(skb...
64,903,180,007,246,395,000,000,000,000,000,000,000
udp_offload.c
302,140,363,612,087,320,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2019-11683
udp_gro_receive_segment in net/ipv4/udp_offload.c in the Linux kernel 5.x before 5.0.13 allows remote attackers to cause a denial of service (slab-out-of-bounds memory corruption) or possibly have unspecified other impact via UDP packets with a 0 payload, because of mishandling of padded packets, aka the "GRO packet of...
https://nvd.nist.gov/vuln/detail/CVE-2019-11683
205,722
php-src
8f4a5373bb71590352fd934028d6dde5bc18530b
https://github.com/php/php-src
http://git.php.net/?p=php-src.git;a=commitdiff;h=8f4a5373bb71590352fd934028d6dde5bc18530b
Fixed bug #66356 (Heap Overflow Vulnerability in imagecrop()) Initial fix was PHP stuff This one is libgd fix. - filter invalid crop size - dont try to copy on invalid position - fix crop size when out of src image - fix possible NULL deref - fix possible integer overfloow
1
gdImagePtr gdImageCrop(gdImagePtr src, const gdRectPtr crop) { gdImagePtr dst; if (src->trueColor) { dst = gdImageCreateTrueColor(crop->width, crop->height); gdImageSaveAlpha(dst, 1); } else { dst = gdImageCreate(crop->width, crop->height); gdImagePaletteCopy(dst, src); } dst->transparent = src->transpare...
337,268,930,905,379,440,000,000,000,000,000,000,000
gd_crop.c
12,295,057,091,284,550,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-7226
Integer overflow in the gdImageCrop function in ext/gd/gd.c in PHP 5.5.x before 5.5.9 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via an imagecrop function call with a large x dimension value, leading to a heap-based buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2013-7226
370,832
php-src
8f4a5373bb71590352fd934028d6dde5bc18530b
https://github.com/php/php-src
http://git.php.net/?p=php-src.git;a=commitdiff;h=8f4a5373bb71590352fd934028d6dde5bc18530b
Fixed bug #66356 (Heap Overflow Vulnerability in imagecrop()) Initial fix was PHP stuff This one is libgd fix. - filter invalid crop size - dont try to copy on invalid position - fix crop size when out of src image - fix possible NULL deref - fix possible integer overfloow
0
gdImagePtr gdImageCrop(gdImagePtr src, const gdRectPtr crop) { gdImagePtr dst; /* check size */ if (crop->width<=0 || crop->height<=0) { return NULL; } /* allocate the requested size (could be only partially filled) */ if (src->trueColor) { dst = gdImageCreateTrueColor(crop->width, crop->height); gdImageS...
132,089,268,009,027,230,000,000,000,000,000,000,000
gd_crop.c
114,302,224,163,599,920,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2013-7226
Integer overflow in the gdImageCrop function in ext/gd/gd.c in PHP 5.5.x before 5.5.9 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via an imagecrop function call with a large x dimension value, leading to a heap-based buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2013-7226
205,723
systemd
4dac5eaba4e419b29c97da38a8b1f82336c2c892
https://github.com/systemd/systemd
https://github.com/systemd/systemd/commit/4dac5eaba4e419b29c97da38a8b1f82336c2c892
dhcp6: make sure we have enough space for the DHCP6 option header Fixes a vulnerability originally discovered by Felix Wilhelm from Google. CVE-2018-15688 LP: #1795921 https://bugzilla.redhat.com/show_bug.cgi?id=1639067
1
int dhcp6_option_append_ia(uint8_t **buf, size_t *buflen, const DHCP6IA *ia) { uint16_t len; uint8_t *ia_hdr; size_t iaid_offset, ia_buflen, ia_addrlen = 0; DHCP6Address *addr; int r; assert_return(buf, -EINVAL); assert_return(*buf, -EINVAL); assert_retur...
85,128,664,190,676,620,000,000,000,000,000,000,000
dhcp6-option.c
269,567,682,951,194,970,000,000,000,000,000,000,000
[ "CWE-120" ]
CVE-2018-15688
A buffer overflow vulnerability in the dhcp6 client of systemd allows a malicious dhcp6 server to overwrite heap memory in systemd-networkd. Affected releases are systemd: versions up to and including 239.
https://nvd.nist.gov/vuln/detail/CVE-2018-15688
370,847
systemd
4dac5eaba4e419b29c97da38a8b1f82336c2c892
https://github.com/systemd/systemd
https://github.com/systemd/systemd/commit/4dac5eaba4e419b29c97da38a8b1f82336c2c892
dhcp6: make sure we have enough space for the DHCP6 option header Fixes a vulnerability originally discovered by Felix Wilhelm from Google. CVE-2018-15688 LP: #1795921 https://bugzilla.redhat.com/show_bug.cgi?id=1639067
0
int dhcp6_option_append_ia(uint8_t **buf, size_t *buflen, const DHCP6IA *ia) { uint16_t len; uint8_t *ia_hdr; size_t iaid_offset, ia_buflen, ia_addrlen = 0; DHCP6Address *addr; int r; assert_return(buf, -EINVAL); assert_return(*buf, -EINVAL); assert_retur...
232,765,771,882,532,870,000,000,000,000,000,000,000
dhcp6-option.c
108,792,040,261,583,300,000,000,000,000,000,000,000
[ "CWE-120" ]
CVE-2018-15688
A buffer overflow vulnerability in the dhcp6 client of systemd allows a malicious dhcp6 server to overwrite heap memory in systemd-networkd. Affected releases are systemd: versions up to and including 239.
https://nvd.nist.gov/vuln/detail/CVE-2018-15688
205,726
mbedtls
643a922c56b77235e88f106fb1b41c1a764cea5f
https://github.com/ARMmbed/mbedtls
https://github.com/ARMmbed/mbedtls/commit/643a922c56b77235e88f106fb1b41c1a764cea5f
Reordered extension fields and added to ChangeLog Reordered the transmission sequence of TLS extension fields in client hello and added to ChangeLog.
1
static void ssl_write_hostname_ext( ssl_context *ssl, unsigned char *buf, size_t *olen ) { unsigned char *p = buf; const unsigned char *end = ssl->out_msg + SSL_MAX_CONTENT_LEN; *olen = 0; if( ssl->hostname == NULL ) retur...
196,444,406,413,350,280,000,000,000,000,000,000,000
ssl_cli.c
127,773,836,001,759,380,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2015-5291
Heap-based buffer overflow in PolarSSL 1.x before 1.2.17 and ARM mbed TLS (formerly PolarSSL) 1.3.x before 1.3.14 and 2.x before 2.1.2 allows remote SSL servers to cause a denial of service (client crash) and possibly execute arbitrary code via a long hostname to the server name indication (SNI) extension, which is not...
https://nvd.nist.gov/vuln/detail/CVE-2015-5291
370,859
mbedtls
643a922c56b77235e88f106fb1b41c1a764cea5f
https://github.com/ARMmbed/mbedtls
https://github.com/ARMmbed/mbedtls/commit/643a922c56b77235e88f106fb1b41c1a764cea5f
Reordered extension fields and added to ChangeLog Reordered the transmission sequence of TLS extension fields in client hello and added to ChangeLog.
0
static void ssl_write_hostname_ext( ssl_context *ssl, unsigned char *buf, size_t *olen ) { unsigned char *p = buf; const unsigned char *end = ssl->out_msg + SSL_MAX_CONTENT_LEN; *olen = 0; if( ssl->hostname == NULL ) retur...
135,925,942,712,447,900,000,000,000,000,000,000,000
ssl_cli.c
112,359,275,241,440,480,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2015-5291
Heap-based buffer overflow in PolarSSL 1.x before 1.2.17 and ARM mbed TLS (formerly PolarSSL) 1.3.x before 1.3.14 and 2.x before 2.1.2 allows remote SSL servers to cause a denial of service (client crash) and possibly execute arbitrary code via a long hostname to the server name indication (SNI) extension, which is not...
https://nvd.nist.gov/vuln/detail/CVE-2015-5291
205,732
libexpat
3f0a0cb644438d4d8e3294cd0b1245d0edb0c6c6
https://github.com/libexpat/libexpat
https://github.com/libexpat/libexpat/commit/3f0a0cb644438d4d8e3294cd0b1245d0edb0c6c6
lib: Add missing validation of encoding (CVE-2022-25235)
1
PREFIX(prologTok)(const ENCODING *enc, const char *ptr, const char *end, const char **nextTokPtr) { int tok; if (ptr >= end) return XML_TOK_NONE; if (MINBPC(enc) > 1) { size_t n = end - ptr; if (n & (MINBPC(enc) - 1)) { n &= ~(MINBPC(enc) - 1); if (n == 0) return ...
18,493,494,431,546,257,000,000,000,000,000,000,000
xmltok_impl.c
138,319,039,341,825,340,000,000,000,000,000,000,000
[ "CWE-116" ]
CVE-2022-25235
xmltok_impl.c in Expat (aka libexpat) before 2.4.5 lacks certain validation of encoding, such as checks for whether a UTF-8 character is valid in a certain context.
https://nvd.nist.gov/vuln/detail/CVE-2022-25235
371,141
libexpat
3f0a0cb644438d4d8e3294cd0b1245d0edb0c6c6
https://github.com/libexpat/libexpat
https://github.com/libexpat/libexpat/commit/3f0a0cb644438d4d8e3294cd0b1245d0edb0c6c6
lib: Add missing validation of encoding (CVE-2022-25235)
0
PREFIX(prologTok)(const ENCODING *enc, const char *ptr, const char *end, const char **nextTokPtr) { int tok; if (ptr >= end) return XML_TOK_NONE; if (MINBPC(enc) > 1) { size_t n = end - ptr; if (n & (MINBPC(enc) - 1)) { n &= ~(MINBPC(enc) - 1); if (n == 0) return ...
124,220,015,058,529,200,000,000,000,000,000,000,000
xmltok_impl.c
107,477,034,938,119,300,000,000,000,000,000,000,000
[ "CWE-116" ]
CVE-2022-25235
xmltok_impl.c in Expat (aka libexpat) before 2.4.5 lacks certain validation of encoding, such as checks for whether a UTF-8 character is valid in a certain context.
https://nvd.nist.gov/vuln/detail/CVE-2022-25235
205,735
qemu
77b0359bf414ad666d1714dc9888f1017c08e283
https://github.com/bonzini/qemu
https://github.com/qemu/qemu/commit/77b0359bf414ad666d1714dc9888f1017c08e283
input: Decrement queue count on kbd delay Delays in the input layer are special cased input events. Every input event is accounted for in a global intput queue count. The special cased delays however did not get removed from the queue, leading to queue overruns and thus silent key drops after typing quite a few charac...
1
static void qemu_input_queue_process(void *opaque) { struct QemuInputEventQueueHead *queue = opaque; QemuInputEventQueue *item; g_assert(!QTAILQ_EMPTY(queue)); item = QTAILQ_FIRST(queue); g_assert(item->type == QEMU_INPUT_QUEUE_DELAY); QTAILQ_REMOVE(queue, item, node); g_free(item); wh...
168,340,287,414,832,280,000,000,000,000,000,000,000
None
null
[ "CWE-772" ]
CVE-2017-8379
Memory leak in the keyboard input event handlers support in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption) by rapidly generating large keyboard events.
https://nvd.nist.gov/vuln/detail/CVE-2017-8379
371,201
qemu
77b0359bf414ad666d1714dc9888f1017c08e283
https://github.com/bonzini/qemu
https://github.com/qemu/qemu/commit/77b0359bf414ad666d1714dc9888f1017c08e283
input: Decrement queue count on kbd delay Delays in the input layer are special cased input events. Every input event is accounted for in a global intput queue count. The special cased delays however did not get removed from the queue, leading to queue overruns and thus silent key drops after typing quite a few charac...
0
static void qemu_input_queue_process(void *opaque) { struct QemuInputEventQueueHead *queue = opaque; QemuInputEventQueue *item; g_assert(!QTAILQ_EMPTY(queue)); item = QTAILQ_FIRST(queue); g_assert(item->type == QEMU_INPUT_QUEUE_DELAY); QTAILQ_REMOVE(queue, item, node); queue_count--; g_...
140,166,488,061,776,510,000,000,000,000,000,000,000
None
null
[ "CWE-772" ]
CVE-2017-8379
Memory leak in the keyboard input event handlers support in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption) by rapidly generating large keyboard events.
https://nvd.nist.gov/vuln/detail/CVE-2017-8379
205,756
linux
485b06aadb933190f4bc44e006076bc27a23f205
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/485b06aadb933190f4bc44e006076bc27a23f205
media: stv06xx: add missing descriptor sanity checks Make sure to check that we have two alternate settings and at least one endpoint before accessing the second altsetting structure and dereferencing the endpoint arrays. This specifically avoids dereferencing NULL-pointers or corrupting memory when a device does not...
1
static int pb0100_start(struct sd *sd) { int err, packet_size, max_packet_size; struct usb_host_interface *alt; struct usb_interface *intf; struct gspca_dev *gspca_dev = (struct gspca_dev *)sd; struct cam *cam = &sd->gspca_dev.cam; u32 mode = cam->cam_mode[sd->gspca_dev.curr_mode].priv; intf = usb_ifnum_to_if(s...
150,795,496,222,617,270,000,000,000,000,000,000,000
stv06xx_pb0100.c
202,042,886,361,293,180,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2020-11609
An issue was discovered in the stv06xx subsystem in the Linux kernel before 5.6.1. drivers/media/usb/gspca/stv06xx/stv06xx.c and drivers/media/usb/gspca/stv06xx/stv06xx_pb0100.c mishandle invalid descriptors, as demonstrated by a NULL pointer dereference, aka CID-485b06aadb93.
https://nvd.nist.gov/vuln/detail/CVE-2020-11609
371,474
linux
485b06aadb933190f4bc44e006076bc27a23f205
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/485b06aadb933190f4bc44e006076bc27a23f205
media: stv06xx: add missing descriptor sanity checks Make sure to check that we have two alternate settings and at least one endpoint before accessing the second altsetting structure and dereferencing the endpoint arrays. This specifically avoids dereferencing NULL-pointers or corrupting memory when a device does not...
0
static int pb0100_start(struct sd *sd) { int err, packet_size, max_packet_size; struct usb_host_interface *alt; struct usb_interface *intf; struct gspca_dev *gspca_dev = (struct gspca_dev *)sd; struct cam *cam = &sd->gspca_dev.cam; u32 mode = cam->cam_mode[sd->gspca_dev.curr_mode].priv; intf = usb_ifnum_to_if(s...
301,326,601,272,390,800,000,000,000,000,000,000,000
stv06xx_pb0100.c
164,711,029,379,843,640,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2020-11609
An issue was discovered in the stv06xx subsystem in the Linux kernel before 5.6.1. drivers/media/usb/gspca/stv06xx/stv06xx.c and drivers/media/usb/gspca/stv06xx/stv06xx_pb0100.c mishandle invalid descriptors, as demonstrated by a NULL pointer dereference, aka CID-485b06aadb93.
https://nvd.nist.gov/vuln/detail/CVE-2020-11609
205,770
linux-fbdev
bd771cf5c4254511cc4abb88f3dab3bd58bdf8e8
https://git.kernel.org/pub/scm/linux/kernel/git/deller/linux-fbdev
https://git.kernel.org/pub/scm/linux/kernel/git/deller/linux-fbdev.git/commit/?h=for-next&id=bd771cf5c4254511cc4abb88f3dab3bd58bdf8e8
video: fbdev: sm712fb: Fix crash in smtcfb_read() Zheyu Ma reported this crash in the sm712fb driver when reading three bytes from the framebuffer: BUG: unable to handle page fault for address: ffffc90001ffffff RIP: 0010:smtcfb_read+0x230/0x3e0 Call Trace: vfs_read+0x198/0xa00 ? do_sys_openat2+0x27d/0x350 ? ...
1
static ssize_t smtcfb_read(struct fb_info *info, char __user *buf, size_t count, loff_t *ppos) { unsigned long p = *ppos; u32 *buffer, *dst; u32 __iomem *src; int c, i, cnt = 0, err = 0; unsigned long total_size; if (!info || !info->screen_base) return -ENODEV; if (info->state != FBINFO_STATE_RUNNING)...
66,882,317,764,989,000,000,000,000,000,000,000,000
sm712fb.c
88,651,160,848,927,150,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2022-2380
The Linux kernel was found vulnerable out of bounds memory access in the drivers/video/fbdev/sm712fb.c:smtcfb_read() function. The vulnerability could result in local attackers being able to crash the kernel.
https://nvd.nist.gov/vuln/detail/CVE-2022-2380
371,623
linux-fbdev
bd771cf5c4254511cc4abb88f3dab3bd58bdf8e8
https://git.kernel.org/pub/scm/linux/kernel/git/deller/linux-fbdev
https://git.kernel.org/pub/scm/linux/kernel/git/deller/linux-fbdev.git/commit/?h=for-next&id=bd771cf5c4254511cc4abb88f3dab3bd58bdf8e8
video: fbdev: sm712fb: Fix crash in smtcfb_read() Zheyu Ma reported this crash in the sm712fb driver when reading three bytes from the framebuffer: BUG: unable to handle page fault for address: ffffc90001ffffff RIP: 0010:smtcfb_read+0x230/0x3e0 Call Trace: vfs_read+0x198/0xa00 ? do_sys_openat2+0x27d/0x350 ? ...
0
static ssize_t smtcfb_write(struct fb_info *info, const char __user *buf, size_t count, loff_t *ppos) { unsigned long p = *ppos; u32 *buffer, *src; u32 __iomem *dst; int c, i, cnt = 0, err = 0; unsigned long total_size; if (!info || !info->screen_base) return -ENODEV; if (info->state != FBINFO_STATE_...
103,805,716,200,748,250,000,000,000,000,000,000,000
sm712fb.c
273,746,424,427,478,970,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2022-2380
The Linux kernel was found vulnerable out of bounds memory access in the drivers/video/fbdev/sm712fb.c:smtcfb_read() function. The vulnerability could result in local attackers being able to crash the kernel.
https://nvd.nist.gov/vuln/detail/CVE-2022-2380
205,771
aircrack-ng
ff70494dd389ba570dbdbf36f217c28d4381c6b5
https://github.com/aircrack-ng/aircrack-ng
https://github.com/aircrack-ng/aircrack-ng/commit/ff70494dd389ba570dbdbf36f217c28d4381c6b5
Airodump-ng: Fixed GPS stack overflow (Closes #13 on GitHub). git-svn-id: http://svn.aircrack-ng.org/trunk@2416 28c6078b-6c39-48e3-add9-af49d547ecab
1
void gps_tracker( void ) { ssize_t unused; int gpsd_sock; char line[256], *temp; struct sockaddr_in gpsd_addr; int ret, is_json, pos; fd_set read_fd; struct timeval timeout; /* attempt to connect to localhost, port 2947 */ pos = 0; gpsd_sock = socket( AF_INET, SOCK_STREAM, 0 ); ...
202,218,397,048,294,560,000,000,000,000,000,000,000
airodump-ng.c
148,844,354,557,171,630,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2014-8321
Stack-based buffer overflow in the gps_tracker function in airodump-ng.c in Aircrack-ng before 1.2 RC 1 allows local users to execute arbitrary code or gain privileges via unspecified vectors.
https://nvd.nist.gov/vuln/detail/CVE-2014-8321
371,640
aircrack-ng
ff70494dd389ba570dbdbf36f217c28d4381c6b5
https://github.com/aircrack-ng/aircrack-ng
https://github.com/aircrack-ng/aircrack-ng/commit/ff70494dd389ba570dbdbf36f217c28d4381c6b5
Airodump-ng: Fixed GPS stack overflow (Closes #13 on GitHub). git-svn-id: http://svn.aircrack-ng.org/trunk@2416 28c6078b-6c39-48e3-add9-af49d547ecab
0
void gps_tracker( void ) { ssize_t unused; int gpsd_sock; char line[256], *temp; struct sockaddr_in gpsd_addr; int ret, is_json, pos; fd_set read_fd; struct timeval timeout; /* attempt to connect to localhost, port 2947 */ pos = 0; gpsd_sock = socket( AF_INET, SOCK_STREAM, 0 ); ...
56,337,054,937,595,550,000,000,000,000,000,000,000
airodump-ng.c
318,594,833,329,693,900,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2014-8321
Stack-based buffer overflow in the gps_tracker function in airodump-ng.c in Aircrack-ng before 1.2 RC 1 allows local users to execute arbitrary code or gain privileges via unspecified vectors.
https://nvd.nist.gov/vuln/detail/CVE-2014-8321
205,772
mysql-server
dc45e408250c582eb532417a42cef5b5a8e2fe77
https://github.com/mysql/mysql-server
https://github.com/mysql/mysql-server/commit/dc45e408250c582eb532417a42cef5b5a8e2fe77
Bug#20642505: HENRY SPENCER REGULAR EXPRESSIONS (REGEX) LIBRARY The MySQL server uses Henry Spencer's library for regular expressions to support the REGEXP/RLIKE string operator. This changeset adapts a recent fix from the upstream for better 32-bit compatiblity. (Note that we cannot simply use the current upstream ve...
1
my_regcomp(preg, pattern, cflags, charset) my_regex_t *preg; const char *pattern; int cflags; CHARSET_INFO *charset; { struct parse pa; register struct re_guts *g; register struct parse *p = &pa; register int i; register size_t len; #ifdef REDEBUG # define GOODFLAGS(f) (f) #else # define GOODFLAGS(f) ((f)&~REG_DUM...
271,342,147,658,101,700,000,000,000,000,000,000,000
regcomp.c
318,404,059,138,246,400,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2015-2305
Integer overflow in the regcomp implementation in the Henry Spencer BSD regex library (aka rxspencer) alpha3.8.g5 on 32-bit platforms, as used in NetBSD through 6.1.5 and other products, might allow context-dependent attackers to execute arbitrary code via a large regular expression that leads to a heap-based buffer ov...
https://nvd.nist.gov/vuln/detail/CVE-2015-2305
371,724
mysql-server
dc45e408250c582eb532417a42cef5b5a8e2fe77
https://github.com/mysql/mysql-server
https://github.com/mysql/mysql-server/commit/dc45e408250c582eb532417a42cef5b5a8e2fe77
Bug#20642505: HENRY SPENCER REGULAR EXPRESSIONS (REGEX) LIBRARY The MySQL server uses Henry Spencer's library for regular expressions to support the REGEXP/RLIKE string operator. This changeset adapts a recent fix from the upstream for better 32-bit compatiblity. (Note that we cannot simply use the current upstream ve...
0
my_regcomp(preg, pattern, cflags, charset) my_regex_t *preg; const char *pattern; int cflags; CHARSET_INFO *charset; { struct parse pa; register struct re_guts *g; register struct parse *p = &pa; register int i; register size_t len; #ifdef REDEBUG # define GOODFLAGS(f) (f) #else # define GOODFLAGS(f) ((f)&~REG_DUM...
197,743,584,742,845,560,000,000,000,000,000,000,000
regcomp.c
154,148,424,015,460,500,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2015-2305
Integer overflow in the regcomp implementation in the Henry Spencer BSD regex library (aka rxspencer) alpha3.8.g5 on 32-bit platforms, as used in NetBSD through 6.1.5 and other products, might allow context-dependent attackers to execute arbitrary code via a large regular expression that leads to a heap-based buffer ov...
https://nvd.nist.gov/vuln/detail/CVE-2015-2305
205,782
libxml2
4629ee02ac649c27f9c0cf98ba017c6b5526070f
https://github.com/GNOME/libxml2
https://git.gnome.org/browse/libxml2/commit/?id=4629ee02ac649c27f9c0cf98ba017c6b5526070f
Do not fetch external parsed entities Unless explicietely asked for when validating or replacing entities with their value. Problem pointed out by Tom Lane <tgl@redhat.com> * parser.c: do not load external parsed entities unless needed * test/errors/extparsedent.xml result/errors/extparsedent.xml*: add a regression...
1
xmlParseReference(xmlParserCtxtPtr ctxt) { xmlEntityPtr ent; xmlChar *val; int was_checked; xmlNodePtr list = NULL; xmlParserErrors ret = XML_ERR_OK; if (RAW != '&') return; /* * Simple case of a CharRef */ if (NXT(1) == '#') { int i = 0; xmlChar out[10]; int hex ...
240,390,038,512,365,000,000,000,000,000,000,000,000
parser.c
259,800,609,760,836,770,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-0339
libxml2 through 2.9.1 does not properly handle external entities expansion unless an application developer uses the xmlSAX2ResolveEntity or xmlSetExternalEntityLoader function, which allows remote attackers to cause a denial of service (resource consumption), send HTTP requests to intranet servers, or read arbitrary fi...
https://nvd.nist.gov/vuln/detail/CVE-2013-0339
371,838
libxml2
4629ee02ac649c27f9c0cf98ba017c6b5526070f
https://github.com/GNOME/libxml2
https://git.gnome.org/browse/libxml2/commit/?id=4629ee02ac649c27f9c0cf98ba017c6b5526070f
Do not fetch external parsed entities Unless explicietely asked for when validating or replacing entities with their value. Problem pointed out by Tom Lane <tgl@redhat.com> * parser.c: do not load external parsed entities unless needed * test/errors/extparsedent.xml result/errors/extparsedent.xml*: add a regression...
0
xmlParseReference(xmlParserCtxtPtr ctxt) { xmlEntityPtr ent; xmlChar *val; int was_checked; xmlNodePtr list = NULL; xmlParserErrors ret = XML_ERR_OK; if (RAW != '&') return; /* * Simple case of a CharRef */ if (NXT(1) == '#') { int i = 0; xmlChar out[10]; int hex ...
36,731,711,250,445,860,000,000,000,000,000,000,000
parser.c
23,683,751,492,208,870,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2013-0339
libxml2 through 2.9.1 does not properly handle external entities expansion unless an application developer uses the xmlSAX2ResolveEntity or xmlSetExternalEntityLoader function, which allows remote attackers to cause a denial of service (resource consumption), send HTTP requests to intranet servers, or read arbitrary fi...
https://nvd.nist.gov/vuln/detail/CVE-2013-0339
205,783
libplist
7a28a14cf6ed547dfd2e52a4db17f47242bfdef9
https://github.com/libimobiledevice/libplist
https://github.com/libimobiledevice/libplist/commit/7a28a14cf6ed547dfd2e52a4db17f47242bfdef9
bplist: Disallow key nodes with non-string node types As reported in #86, the binary plist parser would force the type of the key node to be of type PLIST_KEY while the node might be of a different i.e. non-string type. A following plist_free() might then call free() on an invalid pointer; e.g. if the node is of type ...
1
static plist_t parse_dict_node(struct bplist_data *bplist, const char** bnode, uint64_t size) { uint64_t j; uint64_t str_i = 0, str_j = 0; uint64_t index1, index2; plist_data_t data = plist_new_plist_data(); const char *const end_data = bplist->data + bplist->size; const char *index1_ptr = NULL;...
164,011,794,496,726,670,000,000,000,000,000,000,000
None
null
[ "CWE-415" ]
CVE-2017-5836
The plist_free_data function in plist.c in libplist allows attackers to cause a denial of service (crash) via vectors involving an integer node that is treated as a PLIST_KEY and then triggers an invalid free.
https://nvd.nist.gov/vuln/detail/CVE-2017-5836
371,851
libplist
7a28a14cf6ed547dfd2e52a4db17f47242bfdef9
https://github.com/libimobiledevice/libplist
https://github.com/libimobiledevice/libplist/commit/7a28a14cf6ed547dfd2e52a4db17f47242bfdef9
bplist: Disallow key nodes with non-string node types As reported in #86, the binary plist parser would force the type of the key node to be of type PLIST_KEY while the node might be of a different i.e. non-string type. A following plist_free() might then call free() on an invalid pointer; e.g. if the node is of type ...
0
static plist_t parse_dict_node(struct bplist_data *bplist, const char** bnode, uint64_t size) { uint64_t j; uint64_t str_i = 0, str_j = 0; uint64_t index1, index2; plist_data_t data = plist_new_plist_data(); const char *const end_data = bplist->data + bplist->size; const char *index1_ptr = NULL;...
237,570,615,585,492,250,000,000,000,000,000,000,000
bplist.c
15,292,418,469,471,425,000,000,000,000,000,000,000
[ "CWE-415" ]
CVE-2017-5836
The plist_free_data function in plist.c in libplist allows attackers to cause a denial of service (crash) via vectors involving an integer node that is treated as a PLIST_KEY and then triggers an invalid free.
https://nvd.nist.gov/vuln/detail/CVE-2017-5836
205,784
ImageMagick
e9728345edd0141b4724e54832103055a94708b8
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/e9728345edd0141b4724e54832103055a94708b8
https://github.com/ImageMagick/ImageMagick/issues/509
1
static Image *ReadDPXImage(const ImageInfo *image_info,ExceptionInfo *exception) { char magick[4], value[MagickPathExtent]; DPXInfo dpx; Image *image; MagickBooleanType status; MagickOffsetType offset; QuantumInfo *quantum_info; QuantumType quantum_type; register s...
70,562,180,336,686,310,000,000,000,000,000,000,000
dpx.c
166,138,892,625,401,060,000,000,000,000,000,000,000
[ "CWE-834" ]
CVE-2017-11188
The ReadDPXImage function in coders\dpx.c in ImageMagick 7.0.6-0 has a large loop vulnerability that can cause CPU exhaustion via a crafted DPX file, related to lack of an EOF check.
https://nvd.nist.gov/vuln/detail/CVE-2017-11188
371,871
ImageMagick
e9728345edd0141b4724e54832103055a94708b8
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/e9728345edd0141b4724e54832103055a94708b8
https://github.com/ImageMagick/ImageMagick/issues/509
0
static Image *ReadDPXImage(const ImageInfo *image_info,ExceptionInfo *exception) { char magick[4], value[MagickPathExtent]; DPXInfo dpx; Image *image; MagickBooleanType status; MagickOffsetType offset; QuantumInfo *quantum_info; QuantumType quantum_type; register s...
49,856,530,793,388,080,000,000,000,000,000,000,000
dpx.c
35,802,824,020,011,360,000,000,000,000,000,000,000
[ "CWE-834" ]
CVE-2017-11188
The ReadDPXImage function in coders\dpx.c in ImageMagick 7.0.6-0 has a large loop vulnerability that can cause CPU exhaustion via a crafted DPX file, related to lack of an EOF check.
https://nvd.nist.gov/vuln/detail/CVE-2017-11188
205,787
haproxy
a01f45e3ced23c799f6e78b5efdbd32198a75354
https://github.com/haproxy/haproxy
http://git.haproxy.org/?p=haproxy.git;a=commitdiff;h=a01f45e3ced23c799f6e78b5efdbd32198a75354
BUG/CRITICAL: mux-h2: re-check the frame length when PRIORITY is used Tim Düsterhus reported a possible crash in the H2 HEADERS frame decoder when the PRIORITY flag is present. A check is missing to ensure the 5 extra bytes needed with this flag are actually part of the frame. As per RFC7540#4.2, let's return a connec...
1
static int h2c_decode_headers(struct h2c *h2c, struct buffer *rxbuf, uint32_t *flags) { const uint8_t *hdrs = (uint8_t *)b_head(&h2c->dbuf); struct buffer *tmp = get_trash_chunk(); struct http_hdr list[MAX_HTTP_HDR * 2]; struct buffer *copy = NULL; unsigned int msgf; struct htx *htx = NULL; int flen; // header f...
327,250,099,630,889,140,000,000,000,000,000,000,000
mux_h2.c
237,536,526,050,336,650,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-20615
An out-of-bounds read issue was discovered in the HTTP/2 protocol decoder in HAProxy 1.8.x and 1.9.x through 1.9.0 which can result in a crash. The processing of the PRIORITY flag in a HEADERS frame requires 5 extra bytes, and while these bytes are skipped, the total frame length was not re-checked to make sure they we...
https://nvd.nist.gov/vuln/detail/CVE-2018-20615
372,002
haproxy
a01f45e3ced23c799f6e78b5efdbd32198a75354
https://github.com/haproxy/haproxy
http://git.haproxy.org/?p=haproxy.git;a=commitdiff;h=a01f45e3ced23c799f6e78b5efdbd32198a75354
BUG/CRITICAL: mux-h2: re-check the frame length when PRIORITY is used Tim Düsterhus reported a possible crash in the H2 HEADERS frame decoder when the PRIORITY flag is present. A check is missing to ensure the 5 extra bytes needed with this flag are actually part of the frame. As per RFC7540#4.2, let's return a connec...
0
static int h2c_decode_headers(struct h2c *h2c, struct buffer *rxbuf, uint32_t *flags) { const uint8_t *hdrs = (uint8_t *)b_head(&h2c->dbuf); struct buffer *tmp = get_trash_chunk(); struct http_hdr list[MAX_HTTP_HDR * 2]; struct buffer *copy = NULL; unsigned int msgf; struct htx *htx = NULL; int flen; // header f...
1,660,705,741,839,502,500,000,000,000,000,000,000
mux_h2.c
319,723,784,690,050,500,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-20615
An out-of-bounds read issue was discovered in the HTTP/2 protocol decoder in HAProxy 1.8.x and 1.9.x through 1.9.0 which can result in a crash. The processing of the PRIORITY flag in a HEADERS frame requires 5 extra bytes, and while these bytes are skipped, the total frame length was not re-checked to make sure they we...
https://nvd.nist.gov/vuln/detail/CVE-2018-20615
205,788
libtasn1
f435825c0f527a8e52e6ffbc3ad0bc60531d537e
http://git.savannah.gnu.org/cgit/libtasn1
http://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=f435825c0f527a8e52e6ffbc3ad0bc60531d537e
_asn1_extract_der_octet: catch invalid input cases early That is, check the calculated lengths for validity prior to entering a loop. This avoids an infinite recursion. Reported by Pascal Cuoq.
1
_asn1_extract_der_octet (asn1_node node, const unsigned char *der, int der_len, unsigned flags) { int len2, len3; int counter, counter_end; int result; len2 = asn1_get_length_der (der, der_len, &len3); if (len2 < -1) return ASN1_DER_ERROR; counter = len3 + 1; DECR_LEN(der_len, len3); if (len2...
83,992,070,643,386,045,000,000,000,000,000,000,000
decoding.c
146,736,947,356,669,930,000,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2016-4008
The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.8, when used without the ASN1_DECODE_FLAG_STRICT_DER flag, allows remote attackers to cause a denial of service (infinite recursion) via a crafted certificate.
https://nvd.nist.gov/vuln/detail/CVE-2016-4008
372,089
libtasn1
f435825c0f527a8e52e6ffbc3ad0bc60531d537e
http://git.savannah.gnu.org/cgit/libtasn1
http://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=f435825c0f527a8e52e6ffbc3ad0bc60531d537e
_asn1_extract_der_octet: catch invalid input cases early That is, check the calculated lengths for validity prior to entering a loop. This avoids an infinite recursion. Reported by Pascal Cuoq.
0
_asn1_extract_der_octet (asn1_node node, const unsigned char *der, int der_len, unsigned flags) { int len2, len3; int counter, counter_end; int result; len2 = asn1_get_length_der (der, der_len, &len3); if (len2 < -1) return ASN1_DER_ERROR; counter = len3 + 1; DECR_LEN(der_len, len3); if (len2...
230,663,008,454,676,900,000,000,000,000,000,000,000
decoding.c
642,843,291,608,800,100,000,000,000,000,000,000
[ "CWE-399" ]
CVE-2016-4008
The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.8, when used without the ASN1_DECODE_FLAG_STRICT_DER flag, allows remote attackers to cause a denial of service (infinite recursion) via a crafted certificate.
https://nvd.nist.gov/vuln/detail/CVE-2016-4008
205,793
gst-plugins-base
f672277509705c4034bc92a141eefee4524d15aa
https://github.com/GStreamer/gst-plugins-base
https://gitlab.freedesktop.org/gstreamer/gst-plugins-base/commit/f672277509705c4034bc92a141eefee4524d15aa?merge_request_iid=157
gstrtspconnection: Security loophole making heap overflow The former code allowed an attacker to create a heap overflow by sending a longer than allowed session id in a response and including a semicolon to change the maximum length. With this change, the parser will never go beyond 512 bytes.
1
build_next (GstRTSPBuilder * builder, GstRTSPMessage * message, GstRTSPConnection * conn, gboolean block) { GstRTSPResult res; while (TRUE) { switch (builder->state) { case STATE_START: { guint8 c; builder->offset = 0; res = read_bytes (conn, (guint8 *) buil...
234,955,413,236,648,160,000,000,000,000,000,000,000
gstrtspconnection.c
303,684,532,489,066,180,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2019-9928
GStreamer before 1.16.0 has a heap-based buffer overflow in the RTSP connection parser via a crafted response from a server, potentially allowing remote code execution.
https://nvd.nist.gov/vuln/detail/CVE-2019-9928
372,189
gst-plugins-base
f672277509705c4034bc92a141eefee4524d15aa
https://github.com/GStreamer/gst-plugins-base
https://gitlab.freedesktop.org/gstreamer/gst-plugins-base/commit/f672277509705c4034bc92a141eefee4524d15aa?merge_request_iid=157
gstrtspconnection: Security loophole making heap overflow The former code allowed an attacker to create a heap overflow by sending a longer than allowed session id in a response and including a semicolon to change the maximum length. With this change, the parser will never go beyond 512 bytes.
0
build_next (GstRTSPBuilder * builder, GstRTSPMessage * message, GstRTSPConnection * conn, gboolean block) { GstRTSPResult res; while (TRUE) { switch (builder->state) { case STATE_START: { guint8 c; builder->offset = 0; res = read_bytes (conn, (guint8 *) buil...
153,314,748,993,132,750,000,000,000,000,000,000,000
gstrtspconnection.c
200,777,985,231,255,560,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2019-9928
GStreamer before 1.16.0 has a heap-based buffer overflow in the RTSP connection parser via a crafted response from a server, potentially allowing remote code execution.
https://nvd.nist.gov/vuln/detail/CVE-2019-9928
205,798
sudo
fa8ffeb17523494f0e8bb49a25e53635f4509078
https://github.com/sudo-project/sudo
https://github.com/sudo-project/sudo/commit/fa8ffeb17523494f0e8bb49a25e53635f4509078
Fix a buffer overflow when pwfeedback is enabled and input is a not a tty. In getln() if the user enters ^U (erase line) and the write(2) fails, the remaining buffer size is reset but the current pointer is not. While here, fix an incorrect break for erase when write(2) fails. Also disable pwfeedback when input is not ...
1
getln(int fd, char *buf, size_t bufsiz, int feedback, enum tgetpass_errval *errval) { size_t left = bufsiz; ssize_t nr = -1; char *cp = buf; char c = '\0'; debug_decl(getln, SUDO_DEBUG_CONV); *errval = TGP_ERRVAL_NOERROR; if (left == 0) { *errval = TGP_ERRVAL_READERROR; errno = EINVA...
298,906,421,827,537,300,000,000,000,000,000,000,000
tgetpass.c
91,079,444,981,528,370,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2019-18634
In Sudo before 1.8.26, if pwfeedback is enabled in /etc/sudoers, users can trigger a stack-based buffer overflow in the privileged sudo process. (pwfeedback is a default setting in Linux Mint and elementary OS; however, it is NOT the default for upstream and many other packages, and would exist only if enabled by an ad...
https://nvd.nist.gov/vuln/detail/CVE-2019-18634
372,244
sudo
fa8ffeb17523494f0e8bb49a25e53635f4509078
https://github.com/sudo-project/sudo
https://github.com/sudo-project/sudo/commit/fa8ffeb17523494f0e8bb49a25e53635f4509078
Fix a buffer overflow when pwfeedback is enabled and input is a not a tty. In getln() if the user enters ^U (erase line) and the write(2) fails, the remaining buffer size is reset but the current pointer is not. While here, fix an incorrect break for erase when write(2) fails. Also disable pwfeedback when input is not ...
0
getln(int fd, char *buf, size_t bufsiz, bool feedback, enum tgetpass_errval *errval) { size_t left = bufsiz; ssize_t nr = -1; char *cp = buf; char c = '\0'; debug_decl(getln, SUDO_DEBUG_CONV); *errval = TGP_ERRVAL_NOERROR; if (left == 0) { *errval = TGP_ERRVAL_READERROR; errno = EINV...
245,069,222,954,781,500,000,000,000,000,000,000,000
tgetpass.c
311,494,711,987,599,600,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2019-18634
In Sudo before 1.8.26, if pwfeedback is enabled in /etc/sudoers, users can trigger a stack-based buffer overflow in the privileged sudo process. (pwfeedback is a default setting in Linux Mint and elementary OS; however, it is NOT the default for upstream and many other packages, and would exist only if enabled by an ad...
https://nvd.nist.gov/vuln/detail/CVE-2019-18634
205,811
qemu
5519724a13664b43e225ca05351c60b4468e4555
https://github.com/bonzini/qemu
https://git.qemu.org/?p=qemu.git;a=commit;h=5519724a13664b43e225ca05351c60b4468e4555
hw/net/xgmac: Fix buffer overflow in xgmac_enet_send() A buffer overflow issue was reported by Mr. Ziming Zhang, CC'd here. It occurs while sending an Ethernet frame due to missing break statements and improper checking of the buffer size. Reported-by: Ziming Zhang <ezrakiez@gmail.com> Signed-off-by: Mauro Matteo Cas...
1
static void xgmac_enet_send(XgmacState *s) { struct desc bd; int frame_size; int len; uint8_t frame[8192]; uint8_t *ptr; ptr = frame; frame_size = 0; while (1) { xgmac_read_desc(s, &bd, 0); if ((bd.ctl_stat & 0x80000000) == 0) { /* Run out of descriptors to t...
274,308,486,310,435,840,000,000,000,000,000,000,000
xgmac.c
99,663,438,431,288,850,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2020-15863
hw/net/xgmac.c in the XGMAC Ethernet controller in QEMU before 07-20-2020 has a buffer overflow. This occurs during packet transmission and affects the highbank and midway emulated machines. A guest user or process could use this flaw to crash the QEMU process on the host, resulting in a denial of service or potential ...
https://nvd.nist.gov/vuln/detail/CVE-2020-15863
372,394
qemu
5519724a13664b43e225ca05351c60b4468e4555
https://github.com/bonzini/qemu
https://git.qemu.org/?p=qemu.git;a=commit;h=5519724a13664b43e225ca05351c60b4468e4555
hw/net/xgmac: Fix buffer overflow in xgmac_enet_send() A buffer overflow issue was reported by Mr. Ziming Zhang, CC'd here. It occurs while sending an Ethernet frame due to missing break statements and improper checking of the buffer size. Reported-by: Ziming Zhang <ezrakiez@gmail.com> Signed-off-by: Mauro Matteo Cas...
0
static void xgmac_enet_send(XgmacState *s) { struct desc bd; int frame_size; int len; uint8_t frame[8192]; uint8_t *ptr; ptr = frame; frame_size = 0; while (1) { xgmac_read_desc(s, &bd, 0); if ((bd.ctl_stat & 0x80000000) == 0) { /* Run out of descriptors to t...
46,896,911,751,921,480,000,000,000,000,000,000,000
xgmac.c
325,502,324,424,407,000,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2020-15863
hw/net/xgmac.c in the XGMAC Ethernet controller in QEMU before 07-20-2020 has a buffer overflow. This occurs during packet transmission and affects the highbank and midway emulated machines. A guest user or process could use this flaw to crash the QEMU process on the host, resulting in a denial of service or potential ...
https://nvd.nist.gov/vuln/detail/CVE-2020-15863
205,813
mod_wsgi
545354a80b9cc20d8b6916ca30542eab36c3b8bd
https://github.com/GrahamDumpleton/mod_wsgi
https://github.com/GrahamDumpleton/mod_wsgi/commit/545354a80b9cc20d8b6916ca30542eab36c3b8bd
When there is any sort of error in setting up daemon process group, kill the process rather than risk running in an unexpected state.
1
static void wsgi_setup_access(WSGIDaemonProcess *daemon) { /* Setup the umask for the effective user. */ if (daemon->group->umask != -1) umask(daemon->group->umask); /* Change to chroot environment. */ if (daemon->group->root) { if (chroot(daemon->group->root) == -1) { ap_...
167,499,648,619,876,900,000,000,000,000,000,000,000
mod_wsgi.c
252,634,260,704,158,170,000,000,000,000,000,000,000
[ "CWE-254" ]
CVE-2014-8583
mod_wsgi before 4.2.4 for Apache, when creating a daemon process group, does not properly handle when group privileges cannot be dropped, which might allow attackers to gain privileges via unspecified vectors.
https://nvd.nist.gov/vuln/detail/CVE-2014-8583
372,432
mod_wsgi
545354a80b9cc20d8b6916ca30542eab36c3b8bd
https://github.com/GrahamDumpleton/mod_wsgi
https://github.com/GrahamDumpleton/mod_wsgi/commit/545354a80b9cc20d8b6916ca30542eab36c3b8bd
When there is any sort of error in setting up daemon process group, kill the process rather than risk running in an unexpected state.
0
static int wsgi_setup_access(WSGIDaemonProcess *daemon) { /* Setup the umask for the effective user. */ if (daemon->group->umask != -1) umask(daemon->group->umask); /* Change to chroot environment. */ if (daemon->group->root) { if (chroot(daemon->group->root) == -1) { ap_l...
68,970,984,043,743,250,000,000,000,000,000,000,000
mod_wsgi.c
249,655,714,175,357,800,000,000,000,000,000,000,000
[ "CWE-254" ]
CVE-2014-8583
mod_wsgi before 4.2.4 for Apache, when creating a daemon process group, does not properly handle when group privileges cannot be dropped, which might allow attackers to gain privileges via unspecified vectors.
https://nvd.nist.gov/vuln/detail/CVE-2014-8583
205,822
mongo
0a076417d1d7fba3632b73349a1fd29a83e68816
https://github.com/mongodb/mongo
https://github.com/mongodb/mongo/commit/0a076417d1d7fba3632b73349a1fd29a83e68816
SERVER-38070 fix infinite loop in agg expression
1
Value ExpressionPow::evaluate(const Document& root) const { Value baseVal = vpOperand[0]->evaluate(root); Value expVal = vpOperand[1]->evaluate(root); if (baseVal.nullish() || expVal.nullish()) return Value(BSONNULL); BSONType baseType = baseVal.getType(); BSONType expType = expVal.getType(...
218,138,970,405,592,700,000,000,000,000,000,000,000
expression.cpp
91,260,312,861,857,760,000,000,000,000,000,000,000
[ "CWE-835" ]
CVE-2018-20803
A user authorized to perform database queries may trigger denial of service by issuing specially crafted queries, which loop indefinitely in mathematics processing while retaining locks. This issue affects: MongoDB Inc. MongoDB Server v4.0 versions prior to 4.0.5; v3.6 versions prior to 3.6.10; v3.4 versions prior to 3...
https://nvd.nist.gov/vuln/detail/CVE-2018-20803
373,433
mongo
0a076417d1d7fba3632b73349a1fd29a83e68816
https://github.com/mongodb/mongo
https://github.com/mongodb/mongo/commit/0a076417d1d7fba3632b73349a1fd29a83e68816
SERVER-38070 fix infinite loop in agg expression
0
Value ExpressionPow::evaluate(const Document& root) const { Value baseVal = vpOperand[0]->evaluate(root); Value expVal = vpOperand[1]->evaluate(root); if (baseVal.nullish() || expVal.nullish()) return Value(BSONNULL); BSONType baseType = baseVal.getType(); BSONType expType = expVal.getType(...
288,510,958,743,947,600,000,000,000,000,000,000,000
expression.cpp
120,927,771,818,432,500,000,000,000,000,000,000,000
[ "CWE-835" ]
CVE-2018-20803
A user authorized to perform database queries may trigger denial of service by issuing specially crafted queries, which loop indefinitely in mathematics processing while retaining locks. This issue affects: MongoDB Inc. MongoDB Server v4.0 versions prior to 4.0.5; v3.6 versions prior to 3.6.10; v3.4 versions prior to 3...
https://nvd.nist.gov/vuln/detail/CVE-2018-20803
205,825
dpdk
e7debf602633feb26227cdc8cc7fdd1b1b40946a
https://github.com/DPDK/dpdk
https://git.dpdk.org/dpdk/commit/?id=e7debf602633feb26227cdc8cc7fdd1b1b40946a
vhost: fix potential fd leak Vhost will create temporary file when receiving VHOST_USER_GET_INFLIGHT_FD message. Malicious guest can send endless this message to drain out the resource of host. When receiving VHOST_USER_GET_INFLIGHT_FD message repeatedly, closing the file created during the last handling of this mess...
1
vhost_user_get_inflight_fd(struct virtio_net **pdev, VhostUserMsg *msg, int main_fd __rte_unused) { struct rte_vhost_inflight_info_packed *inflight_packed; uint64_t pervq_inflight_size, mmap_size; uint16_t num_queues, queue_size; struct virtio_net *dev = *pdev; int fd, i, j; void *addr; if (msg->siz...
9,937,991,711,344,693,000,000,000,000,000,000,000
vhost_user.c
74,743,393,242,077,020,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2020-10726
A vulnerability was found in DPDK versions 19.11 and above. A malicious container that has direct access to the vhost-user socket can keep sending VHOST_USER_GET_INFLIGHT_FD messages, causing a resource leak (file descriptors and virtual memory), which may result in a denial of service.
https://nvd.nist.gov/vuln/detail/CVE-2020-10726
373,555
dpdk
e7debf602633feb26227cdc8cc7fdd1b1b40946a
https://github.com/DPDK/dpdk
https://git.dpdk.org/dpdk/commit/?id=e7debf602633feb26227cdc8cc7fdd1b1b40946a
vhost: fix potential fd leak Vhost will create temporary file when receiving VHOST_USER_GET_INFLIGHT_FD message. Malicious guest can send endless this message to drain out the resource of host. When receiving VHOST_USER_GET_INFLIGHT_FD message repeatedly, closing the file created during the last handling of this mess...
0
vhost_user_get_inflight_fd(struct virtio_net **pdev, VhostUserMsg *msg, int main_fd __rte_unused) { struct rte_vhost_inflight_info_packed *inflight_packed; uint64_t pervq_inflight_size, mmap_size; uint16_t num_queues, queue_size; struct virtio_net *dev = *pdev; int fd, i, j; void *addr; if (msg->siz...
123,719,389,486,087,480,000,000,000,000,000,000,000
vhost_user.c
322,692,183,180,595,140,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2020-10726
A vulnerability was found in DPDK versions 19.11 and above. A malicious container that has direct access to the vhost-user socket can keep sending VHOST_USER_GET_INFLIGHT_FD messages, causing a resource leak (file descriptors and virtual memory), which may result in a denial of service.
https://nvd.nist.gov/vuln/detail/CVE-2020-10726
205,827
libsolv
0077ef29eb46d2e1df2f230fc95a1d9748d49dec
https://github.com/openSUSE/libsolv
https://github.com/openSUSE/libsolv/commit/0077ef29eb46d2e1df2f230fc95a1d9748d49dec
testcase_read: error out if repos are added or the system is changed too late We must not add new solvables after the considered map was created, the solver was created, or jobs were added. We may not changed the system after jobs have been added. (Jobs may point inside the whatproviedes array, so we must not invalid...
1
testcase_read(Pool *pool, FILE *fp, const char *testcase, Queue *job, char **resultp, int *resultflagsp) { Solver *solv; char *buf, *bufp; int bufl; char *testcasedir, *s; int l; char **pieces = 0; int npieces = 0; int prepared = 0; int closefp = !fp; int poolflagsreset = 0; int missing_features =...
110,818,304,829,644,260,000,000,000,000,000,000,000
testcase.c
283,870,309,322,585,280,000,000,000,000,000,000,000
[ "CWE-120" ]
CVE-2021-3200
Buffer overflow vulnerability in libsolv 2020-12-13 via the Solver * testcase_read(Pool *pool, FILE *fp, const char *testcase, Queue *job, char **resultp, int *resultflagsp function at src/testcase.c: line 2334, which could cause a denial of service
https://nvd.nist.gov/vuln/detail/CVE-2021-3200
373,567
libsolv
0077ef29eb46d2e1df2f230fc95a1d9748d49dec
https://github.com/openSUSE/libsolv
https://github.com/openSUSE/libsolv/commit/0077ef29eb46d2e1df2f230fc95a1d9748d49dec
testcase_read: error out if repos are added or the system is changed too late We must not add new solvables after the considered map was created, the solver was created, or jobs were added. We may not changed the system after jobs have been added. (Jobs may point inside the whatproviedes array, so we must not invalid...
0
testcase_read(Pool *pool, FILE *fp, const char *testcase, Queue *job, char **resultp, int *resultflagsp) { Solver *solv; char *buf, *bufp; int bufl; char *testcasedir, *s; int l; char **pieces = 0; int npieces = 0; int prepared = 0; int closefp = !fp; int poolflagsreset = 0; int missing_features =...
80,059,157,395,528,610,000,000,000,000,000,000,000
testcase.c
181,490,925,734,484,600,000,000,000,000,000,000,000
[ "CWE-120" ]
CVE-2021-3200
Buffer overflow vulnerability in libsolv 2020-12-13 via the Solver * testcase_read(Pool *pool, FILE *fp, const char *testcase, Queue *job, char **resultp, int *resultflagsp function at src/testcase.c: line 2334, which could cause a denial of service
https://nvd.nist.gov/vuln/detail/CVE-2021-3200
205,859
libsndfile
6d7ce94c020cc720a6b28719d1a7879181790008
https://github.com/erikd/libsndfile
https://github.com/erikd/libsndfile/commit/6d7ce94c020cc720a6b28719d1a7879181790008
wav_write_header: don't read past the array end If loop_count is bigger than the array, truncate it to the array length (and not to 32k). CVE-2019-3832
1
wav_write_header (SF_PRIVATE *psf, int calc_length) { sf_count_t current ; int error, has_data = SF_FALSE ; current = psf_ftell (psf) ; if (current > psf->dataoffset) has_data = SF_TRUE ; if (calc_length) { psf->filelength = psf_get_filelen (psf) ; psf->datalength = psf->filelength - psf->dataoffset ; ...
307,030,784,621,943,580,000,000,000,000,000,000,000
wav.c
263,462,844,010,598,130,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-3832
It was discovered the fix for CVE-2018-19758 (libsndfile) was not complete and still allows a read beyond the limits of a buffer in wav_write_header() function in wav.c. A local attacker may use this flaw to make the application crash.
https://nvd.nist.gov/vuln/detail/CVE-2019-3832
373,912
libsndfile
6d7ce94c020cc720a6b28719d1a7879181790008
https://github.com/erikd/libsndfile
https://github.com/erikd/libsndfile/commit/6d7ce94c020cc720a6b28719d1a7879181790008
wav_write_header: don't read past the array end If loop_count is bigger than the array, truncate it to the array length (and not to 32k). CVE-2019-3832
0
wav_write_header (SF_PRIVATE *psf, int calc_length) { sf_count_t current ; int error, has_data = SF_FALSE ; current = psf_ftell (psf) ; if (current > psf->dataoffset) has_data = SF_TRUE ; if (calc_length) { psf->filelength = psf_get_filelen (psf) ; psf->datalength = psf->filelength - psf->dataoffset ; ...
317,378,024,173,199,100,000,000,000,000,000,000,000
wav.c
150,435,830,079,666,900,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-3832
It was discovered the fix for CVE-2018-19758 (libsndfile) was not complete and still allows a read beyond the limits of a buffer in wav_write_header() function in wav.c. A local attacker may use this flaw to make the application crash.
https://nvd.nist.gov/vuln/detail/CVE-2019-3832
205,867
git
e1d911dd4c7b76a5a8cec0f5c8de15981e34da83
https://github.com/git/git
https://git.kernel.org/pub/scm/git/git.git/commit/?id=e1d911dd4c7b76a5a8cec0f5c8de15981e34da83)
mingw: disallow backslash characters in tree objects' file names The backslash character is not a valid part of a file name on Windows. Hence it is dangerous to allow writing files that were unpacked from tree objects, when the stored file name contains a backslash character: it will be misinterpreted as directory sep...
1
static int decode_tree_entry(struct tree_desc *desc, const char *buf, unsigned long size, struct strbuf *err) { const char *path; unsigned int mode, len; if (size < 23 || buf[size - 21]) { strbuf_addstr(err, _("too-short tree object")); return -1; } path = get_mode(buf, &mode); if (!path) { strbuf_addstr(...
197,024,350,829,496,530,000,000,000,000,000,000,000
tree-walk.c
77,833,037,235,769,770,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2019-1354
A remote code execution vulnerability exists when Git for Visual Studio improperly sanitizes input, aka 'Git for Visual Studio Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1349, CVE-2019-1350, CVE-2019-1352, CVE-2019-1387.
https://nvd.nist.gov/vuln/detail/CVE-2019-1354
373,979
git
e1d911dd4c7b76a5a8cec0f5c8de15981e34da83
https://github.com/git/git
https://git.kernel.org/pub/scm/git/git.git/commit/?id=e1d911dd4c7b76a5a8cec0f5c8de15981e34da83)
mingw: disallow backslash characters in tree objects' file names The backslash character is not a valid part of a file name on Windows. Hence it is dangerous to allow writing files that were unpacked from tree objects, when the stored file name contains a backslash character: it will be misinterpreted as directory sep...
0
static int decode_tree_entry(struct tree_desc *desc, const char *buf, unsigned long size, struct strbuf *err) { const char *path; unsigned int mode, len; if (size < 23 || buf[size - 21]) { strbuf_addstr(err, _("too-short tree object")); return -1; } path = get_mode(buf, &mode); if (!path) { strbuf_addstr(...
9,656,789,494,072,155,000,000,000,000,000,000,000
tree-walk.c
186,396,254,938,891,800,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2019-1354
A remote code execution vulnerability exists when Git for Visual Studio improperly sanitizes input, aka 'Git for Visual Studio Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1349, CVE-2019-1350, CVE-2019-1352, CVE-2019-1387.
https://nvd.nist.gov/vuln/detail/CVE-2019-1354
205,868
php-src
1daa4c0090b7cd8178dcaa96287234c69ac6ca18
https://github.com/php/php-src
http://git.php.net/?p=php-src.git;a=commitdiff;h=1daa4c0090b7cd8178dcaa96287234c69ac6ca18
Fix bug #67730 - Null byte injection possible with imagexxx functions
1
static void _php_image_output_ctx(INTERNAL_FUNCTION_PARAMETERS, int image_type, char *tn, void (*func_p)()) { zval *imgind; char *file = NULL; int file_len = 0; long quality, basefilter; gdImagePtr im; int argc = ZEND_NUM_ARGS(); int q = -1, i; int f = -1; gdIOCtx *ctx = NULL; zval *to_zval = NULL; php_strea...
202,240,992,367,983,040,000,000,000,000,000,000,000
gd_ctx.c
90,642,184,989,616,730,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2014-5120
gd_ctx.c in the GD component in PHP 5.4.x before 5.4.32 and 5.5.x before 5.5.16 does not ensure that pathnames lack %00 sequences, which might allow remote attackers to overwrite arbitrary files via crafted input to an application that calls the (1) imagegd, (2) imagegd2, (3) imagegif, (4) imagejpeg, (5) imagepng, (6) ...
https://nvd.nist.gov/vuln/detail/CVE-2014-5120
374,001
php-src
1daa4c0090b7cd8178dcaa96287234c69ac6ca18
https://github.com/php/php-src
http://git.php.net/?p=php-src.git;a=commitdiff;h=1daa4c0090b7cd8178dcaa96287234c69ac6ca18
Fix bug #67730 - Null byte injection possible with imagexxx functions
0
static void _php_image_output_ctx(INTERNAL_FUNCTION_PARAMETERS, int image_type, char *tn, void (*func_p)()) { zval *imgind; char *file = NULL; int file_len = 0; long quality, basefilter; gdImagePtr im; int argc = ZEND_NUM_ARGS(); int q = -1, i; int f = -1; gdIOCtx *ctx = NULL; zval *to_zval = NULL; php_strea...
330,837,835,703,881,900,000,000,000,000,000,000,000
gd_ctx.c
173,775,709,906,657,700,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2014-5120
gd_ctx.c in the GD component in PHP 5.4.x before 5.4.32 and 5.5.x before 5.5.16 does not ensure that pathnames lack %00 sequences, which might allow remote attackers to overwrite arbitrary files via crafted input to an application that calls the (1) imagegd, (2) imagegd2, (3) imagegif, (4) imagejpeg, (5) imagepng, (6) ...
https://nvd.nist.gov/vuln/detail/CVE-2014-5120
205,873
sqlite
e59c562b3f6894f84c715772c4b116d7b5c01348
https://github.com/sqlite/sqlite
https://github.com/sqlite/sqlite/commit/e59c562b3f6894f84c715772c4b116d7b5c01348
Fix a crash that could occur if a sub-select that uses both DISTINCT and window functions also used an ORDER BY that is the same as its select list. FossilOrigin-Name: bcdd66c1691955c697f3d756c2b035acfe98f6aad72e90b0021bab6e9023b3ba
1
int sqlite3Select( Parse *pParse, /* The parser context */ Select *p, /* The SELECT statement being coded. */ SelectDest *pDest /* What to do with the query results */ ){ int i, j; /* Loop counters */ WhereInfo *pWInfo; /* Return from sqlite3WhereBegin() */ Vdbe *v;...
281,793,309,687,163,280,000,000,000,000,000,000,000
select.c
289,917,653,864,511,600,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2019-19244
sqlite3Select in select.c in SQLite 3.30.1 allows a crash if a sub-select uses both DISTINCT and window functions, and also has certain ORDER BY usage.
https://nvd.nist.gov/vuln/detail/CVE-2019-19244
374,069
sqlite
e59c562b3f6894f84c715772c4b116d7b5c01348
https://github.com/sqlite/sqlite
https://github.com/sqlite/sqlite/commit/e59c562b3f6894f84c715772c4b116d7b5c01348
Fix a crash that could occur if a sub-select that uses both DISTINCT and window functions also used an ORDER BY that is the same as its select list. FossilOrigin-Name: bcdd66c1691955c697f3d756c2b035acfe98f6aad72e90b0021bab6e9023b3ba
0
int sqlite3Select( Parse *pParse, /* The parser context */ Select *p, /* The SELECT statement being coded. */ SelectDest *pDest /* What to do with the query results */ ){ int i, j; /* Loop counters */ WhereInfo *pWInfo; /* Return from sqlite3WhereBegin() */ Vdbe *v;...
94,835,362,524,234,910,000,000,000,000,000,000,000
select.c
42,625,367,024,214,725,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2019-19244
sqlite3Select in select.c in SQLite 3.30.1 allows a crash if a sub-select uses both DISTINCT and window functions, and also has certain ORDER BY usage.
https://nvd.nist.gov/vuln/detail/CVE-2019-19244
205,904
linux
f4020438fab05364018c91f7e02ebdd192085933
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f4020438fab05364018c91f7e02ebdd192085933
xfs: fix boundary test in xfs_attr_shortform_verify The boundary test for the fixed-offset parts of xfs_attr_sf_entry in xfs_attr_shortform_verify is off by one, because the variable array at the end is defined as nameval[1] not nameval[]. Hence we need to subtract 1 from the calculation. This can be shown by: # tou...
1
xfs_attr_shortform_verify( struct xfs_inode *ip) { struct xfs_attr_shortform *sfp; struct xfs_attr_sf_entry *sfep; struct xfs_attr_sf_entry *next_sfep; char *endp; struct xfs_ifork *ifp; int i; int64_t size; ASSERT(ip->i_afp->if_format == XFS_DINODE_FMT_LOCAL); ifp = XFS_IFORK_PTR(ip, XFS_ATTR_FOR...
261,778,295,806,627,580,000,000,000,000,000,000,000
xfs_attr_leaf.c
229,947,142,831,447,800,000,000,000,000,000,000,000
[ "CWE-131" ]
CVE-2020-14385
A flaw was found in the Linux kernel before 5.9-rc4. A failure of the file system metadata validator in XFS can cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt. This can lead to the filesystem being shutdown, or otherwise rendered inaccessible until it is remounted, leading to a ...
https://nvd.nist.gov/vuln/detail/CVE-2020-14385
374,781
linux
f4020438fab05364018c91f7e02ebdd192085933
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f4020438fab05364018c91f7e02ebdd192085933
xfs: fix boundary test in xfs_attr_shortform_verify The boundary test for the fixed-offset parts of xfs_attr_sf_entry in xfs_attr_shortform_verify is off by one, because the variable array at the end is defined as nameval[1] not nameval[]. Hence we need to subtract 1 from the calculation. This can be shown by: # tou...
0
xfs_attr_shortform_verify( struct xfs_inode *ip) { struct xfs_attr_shortform *sfp; struct xfs_attr_sf_entry *sfep; struct xfs_attr_sf_entry *next_sfep; char *endp; struct xfs_ifork *ifp; int i; int64_t size; ASSERT(ip->i_afp->if_format == XFS_DINODE_FMT_LOCAL); ifp = XFS_IFORK_PTR(ip, XFS_ATTR_FOR...
163,883,788,507,495,350,000,000,000,000,000,000,000
xfs_attr_leaf.c
250,859,355,885,981,360,000,000,000,000,000,000,000
[ "CWE-131" ]
CVE-2020-14385
A flaw was found in the Linux kernel before 5.9-rc4. A failure of the file system metadata validator in XFS can cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt. This can lead to the filesystem being shutdown, or otherwise rendered inaccessible until it is remounted, leading to a ...
https://nvd.nist.gov/vuln/detail/CVE-2020-14385
205,951
libxml2
e724879d964d774df9b7969fc846605aa1bac54c
https://github.com/GNOME/libxml2
https://git.gnome.org/browse/libxml2/commit/?id=e724879d964d774df9b7969fc846605aa1bac54c
Fix parsing short unclosed comment uninitialized access For https://bugzilla.gnome.org/show_bug.cgi?id=746048 The HTML parser was too optimistic when processing comments and didn't check for the end of the stream on the first 2 characters
1
htmlParseComment(htmlParserCtxtPtr ctxt) { xmlChar *buf = NULL; int len; int size = HTML_PARSER_BUFFER_SIZE; int q, ql; int r, rl; int cur, l; xmlParserInputState state; /* * Check that there is a comment right here. */ if ((RAW != '<') || (NXT(1) != '!') || (NXT(2...
34,772,845,417,716,600,000,000,000,000,000,000,000
HTMLparser.c
9,441,315,323,547,340,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2015-8710
The htmlParseComment function in HTMLparser.c in libxml2 allows attackers to obtain sensitive information, cause a denial of service (out-of-bounds heap memory access and application crash), or possibly have unspecified other impact via an unclosed HTML comment.
https://nvd.nist.gov/vuln/detail/CVE-2015-8710
375,046
libxml2
e724879d964d774df9b7969fc846605aa1bac54c
https://github.com/GNOME/libxml2
https://git.gnome.org/browse/libxml2/commit/?id=e724879d964d774df9b7969fc846605aa1bac54c
Fix parsing short unclosed comment uninitialized access For https://bugzilla.gnome.org/show_bug.cgi?id=746048 The HTML parser was too optimistic when processing comments and didn't check for the end of the stream on the first 2 characters
0
htmlParseComment(htmlParserCtxtPtr ctxt) { xmlChar *buf = NULL; int len; int size = HTML_PARSER_BUFFER_SIZE; int q, ql; int r, rl; int cur, l; xmlParserInputState state; /* * Check that there is a comment right here. */ if ((RAW != '<') || (NXT(1) != '!') || (NXT(2...
142,467,006,327,603,920,000,000,000,000,000,000,000
HTMLparser.c
9,346,300,951,361,166,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2015-8710
The htmlParseComment function in HTMLparser.c in libxml2 allows attackers to obtain sensitive information, cause a denial of service (out-of-bounds heap memory access and application crash), or possibly have unspecified other impact via an unclosed HTML comment.
https://nvd.nist.gov/vuln/detail/CVE-2015-8710
205,957
ImageMagick
f35eca82b0c294ff9d0ccad104a881c3ae2ba913
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/f35eca82b0c294ff9d0ccad104a881c3ae2ba913
https://github.com/ImageMagick/ImageMagick/issues/1725
1
MagickExport MagickStatusType ParseMetaGeometry(const char *geometry,ssize_t *x, ssize_t *y,size_t *width,size_t *height) { GeometryInfo geometry_info; MagickStatusType flags; size_t former_height, former_width; /* Ensure the image geometry is valid. */ assert(x != (ssize_t *) NULL)...
204,539,914,174,226,220,000,000,000,000,000,000,000
geometry.c
209,723,012,059,881,570,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2020-27756
In ParseMetaGeometry() of MagickCore/geometry.c, image height and width calculations can lead to divide-by-zero conditions which also lead to undefined behavior. This flaw can be triggered by a crafted input file processed by ImageMagick and could impact application availability. The patch uses multiplication in additi...
https://nvd.nist.gov/vuln/detail/CVE-2020-27756
375,327
ImageMagick
f35eca82b0c294ff9d0ccad104a881c3ae2ba913
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/f35eca82b0c294ff9d0ccad104a881c3ae2ba913
https://github.com/ImageMagick/ImageMagick/issues/1725
0
MagickExport MagickStatusType ParseMetaGeometry(const char *geometry,ssize_t *x, ssize_t *y,size_t *width,size_t *height) { GeometryInfo geometry_info; MagickStatusType flags; size_t former_height, former_width; /* Ensure the image geometry is valid. */ assert(x != (ssize_t *) NULL)...
297,745,758,699,617,450,000,000,000,000,000,000,000
geometry.c
121,769,609,834,337,320,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2020-27756
In ParseMetaGeometry() of MagickCore/geometry.c, image height and width calculations can lead to divide-by-zero conditions which also lead to undefined behavior. This flaw can be triggered by a crafted input file processed by ImageMagick and could impact application availability. The patch uses multiplication in additi...
https://nvd.nist.gov/vuln/detail/CVE-2020-27756
205,958
sddm
4cfed6b0a625593fb43876f04badc4dd99799d86
https://github.com/sddm/sddm
https://github.com/sddm/sddm/commit/4cfed6b0a625593fb43876f04badc4dd99799d86
Disable greeters from loading KDE's debug hander Some themes may use KDE components which will automatically load KDE's crash handler. If the greeter were to then somehow crash, that would leave a crash handler allowing other actions, albeit as the locked down SDDM user. Only SDDM users using the breeze theme from p...
1
bool Greeter::start() { // check flag if (m_started) return false; if (daemonApp->testing()) { // create process m_process = new QProcess(this); // delete process on finish connect(m_process, SIGNAL(finished(int,QProcess::ExitStat...
136,734,524,702,089,630,000,000,000,000,000,000,000
Greeter.cpp
284,865,748,290,187,100,000,000,000,000,000,000,000
[ "CWE-284" ]
CVE-2015-0856
daemon/Greeter.cpp in sddm before 0.13.0 does not properly disable the KDE crash handler, which allows local users to gain privileges by crashing a greeter when using certain themes, as demonstrated by the plasma-workspace breeze theme.
https://nvd.nist.gov/vuln/detail/CVE-2015-0856
375,351
sddm
4cfed6b0a625593fb43876f04badc4dd99799d86
https://github.com/sddm/sddm
https://github.com/sddm/sddm/commit/4cfed6b0a625593fb43876f04badc4dd99799d86
Disable greeters from loading KDE's debug hander Some themes may use KDE components which will automatically load KDE's crash handler. If the greeter were to then somehow crash, that would leave a crash handler allowing other actions, albeit as the locked down SDDM user. Only SDDM users using the breeze theme from p...
0
bool Greeter::start() { // check flag if (m_started) return false; if (daemonApp->testing()) { // create process m_process = new QProcess(this); // delete process on finish connect(m_process, SIGNAL(finished(int,QProcess::ExitStat...
310,970,802,071,142,330,000,000,000,000,000,000,000
Greeter.cpp
203,579,720,940,883,100,000,000,000,000,000,000,000
[ "CWE-284" ]
CVE-2015-0856
daemon/Greeter.cpp in sddm before 0.13.0 does not properly disable the KDE crash handler, which allows local users to gain privileges by crashing a greeter when using certain themes, as demonstrated by the plasma-workspace breeze theme.
https://nvd.nist.gov/vuln/detail/CVE-2015-0856
205,960
linux
6cc03e8aa36c51f3b26a0d21a3c4ce2809c842ac
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6cc03e8aa36c51f3b26a0d21a3c4ce2809c842ac
appletalk: enforce CAP_NET_RAW for raw sockets When creating a raw AF_APPLETALK socket, CAP_NET_RAW needs to be checked first. Signed-off-by: Ori Nimron <orinimron123@gmail.com> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org> Signed-off-by: David S. Miller <davem@davemloft.net>
1
static int atalk_create(struct net *net, struct socket *sock, int protocol, int kern) { struct sock *sk; int rc = -ESOCKTNOSUPPORT; if (!net_eq(net, &init_net)) return -EAFNOSUPPORT; /* * We permit SOCK_DGRAM and RAW is an extension. It is trivial to do * and gives you the full ELAP frame. Should be hand...
236,867,284,261,386,080,000,000,000,000,000,000,000
ddp.c
312,427,192,633,618,670,000,000,000,000,000,000,000
[ "CWE-276" ]
CVE-2019-17054
atalk_create in net/appletalk/ddp.c in the AF_APPLETALK network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-6cc03e8aa36c.
https://nvd.nist.gov/vuln/detail/CVE-2019-17054
375,366
linux
6cc03e8aa36c51f3b26a0d21a3c4ce2809c842ac
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6cc03e8aa36c51f3b26a0d21a3c4ce2809c842ac
appletalk: enforce CAP_NET_RAW for raw sockets When creating a raw AF_APPLETALK socket, CAP_NET_RAW needs to be checked first. Signed-off-by: Ori Nimron <orinimron123@gmail.com> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org> Signed-off-by: David S. Miller <davem@davemloft.net>
0
static int atalk_create(struct net *net, struct socket *sock, int protocol, int kern) { struct sock *sk; int rc = -ESOCKTNOSUPPORT; if (!net_eq(net, &init_net)) return -EAFNOSUPPORT; /* * We permit SOCK_DGRAM and RAW is an extension. It is trivial to do * and gives you the full ELAP frame. Should be hand...
169,198,780,719,899,480,000,000,000,000,000,000,000
ddp.c
31,304,209,268,614,356,000,000,000,000,000,000,000
[ "CWE-276" ]
CVE-2019-17054
atalk_create in net/appletalk/ddp.c in the AF_APPLETALK network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-6cc03e8aa36c.
https://nvd.nist.gov/vuln/detail/CVE-2019-17054
205,977
linux
2a3f7221acddfe1caa9ff09b3a8158c39b2fdeac
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2a3f7221acddfe1caa9ff09b3a8158c39b2fdeac
ALSA: core: Fix card races between register and disconnect There is a small race window in the card disconnection code that allows the registration of another card with the very same card id. This leads to a warning in procfs creation as caught by syzkaller. The problem is that we delete snd_cards and snd_cards_lock ...
1
int snd_card_disconnect(struct snd_card *card) { struct snd_monitor_file *mfile; if (!card) return -EINVAL; spin_lock(&card->files_lock); if (card->shutdown) { spin_unlock(&card->files_lock); return 0; } card->shutdown = 1; spin_unlock(&card->files_lock); /* phase 1: disable fops (user space) operation...
184,924,465,020,594,060,000,000,000,000,000,000,000
init.c
138,916,092,914,308,330,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2019-15214
An issue was discovered in the Linux kernel before 5.0.10. There is a use-after-free in the sound subsystem because card disconnection causes certain data structures to be deleted too early. This is related to sound/core/init.c and sound/core/info.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-15214
375,708
linux
2a3f7221acddfe1caa9ff09b3a8158c39b2fdeac
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2a3f7221acddfe1caa9ff09b3a8158c39b2fdeac
ALSA: core: Fix card races between register and disconnect There is a small race window in the card disconnection code that allows the registration of another card with the very same card id. This leads to a warning in procfs creation as caught by syzkaller. The problem is that we delete snd_cards and snd_cards_lock ...
0
int snd_card_disconnect(struct snd_card *card) { struct snd_monitor_file *mfile; if (!card) return -EINVAL; spin_lock(&card->files_lock); if (card->shutdown) { spin_unlock(&card->files_lock); return 0; } card->shutdown = 1; spin_unlock(&card->files_lock); /* replace file->f_op with special dummy operat...
304,164,675,700,568,940,000,000,000,000,000,000,000
init.c
82,975,296,573,960,280,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2019-15214
An issue was discovered in the Linux kernel before 5.0.10. There is a use-after-free in the sound subsystem because card disconnection causes certain data structures to be deleted too early. This is related to sound/core/init.c and sound/core/info.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-15214
206,004
php-src
64f42c73efc58e88671ad76b6b6bc8e2b62713e1
https://github.com/php/php-src
https://git.php.net/?p=php-src.git;a=commit;h=64f42c73efc58e88671ad76b6b6bc8e2b62713e1
Fixed bug #71906: AddressSanitizer: negative-size-param (-1) in mbfl_strcut
1
mbfl_strcut( mbfl_string *string, mbfl_string *result, int from, int length) { const mbfl_encoding *encoding; mbfl_memory_device device; /* validate the parameters */ if (string == NULL || string->val == NULL || result == NULL) { return NULL; } if (from < 0 || length < 0) { return NULL; } ...
296,075,455,592,815,920,000,000,000,000,000,000,000
mbfilter.c
124,195,375,871,815,610,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-4073
Multiple integer overflows in the mbfl_strcut function in ext/mbstring/libmbfl/mbfl/mbfilter.c in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted mb_strcut call.
https://nvd.nist.gov/vuln/detail/CVE-2016-4073
376,164
php-src
64f42c73efc58e88671ad76b6b6bc8e2b62713e1
https://github.com/php/php-src
https://git.php.net/?p=php-src.git;a=commit;h=64f42c73efc58e88671ad76b6b6bc8e2b62713e1
Fixed bug #71906: AddressSanitizer: negative-size-param (-1) in mbfl_strcut
0
mbfl_strcut( mbfl_string *string, mbfl_string *result, int from, int length) { const mbfl_encoding *encoding; mbfl_memory_device device; /* validate the parameters */ if (string == NULL || string->val == NULL || result == NULL) { return NULL; } if (from < 0 || length < 0) { return NULL; } ...
228,644,579,123,085,800,000,000,000,000,000,000,000
mbfilter.c
304,058,524,278,478,520,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-4073
Multiple integer overflows in the mbfl_strcut function in ext/mbstring/libmbfl/mbfl/mbfilter.c in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted mb_strcut call.
https://nvd.nist.gov/vuln/detail/CVE-2016-4073
206,020
libplist
26061aac4ec75e7a4469a9aab9a424716223e5c4
https://github.com/libimobiledevice/libplist
https://github.com/libimobiledevice/libplist/commit/26061aac4ec75e7a4469a9aab9a424716223e5c4
bplist: Check for invalid offset_size in bplist trailer
1
PLIST_API void plist_from_bin(const char *plist_bin, uint32_t length, plist_t * plist) { char *trailer = NULL; uint8_t offset_size = 0; uint8_t dict_size = 0; uint64_t num_objects = 0; uint64_t root_object = 0; uint64_t offset_table_index = 0; char *offset_table = NULL; //first check w...
56,290,100,615,574,790,000,000,000,000,000,000,000
bplist.c
222,663,397,554,014,500,000,000,000,000,000,000,000
[ "CWE-770" ]
CVE-2017-5835
libplist allows attackers to cause a denial of service (large memory allocation and crash) via vectors involving an offset size of zero.
https://nvd.nist.gov/vuln/detail/CVE-2017-5835
376,201
libplist
26061aac4ec75e7a4469a9aab9a424716223e5c4
https://github.com/libimobiledevice/libplist
https://github.com/libimobiledevice/libplist/commit/26061aac4ec75e7a4469a9aab9a424716223e5c4
bplist: Check for invalid offset_size in bplist trailer
0
PLIST_API void plist_from_bin(const char *plist_bin, uint32_t length, plist_t * plist) { char *trailer = NULL; uint8_t offset_size = 0; uint8_t dict_size = 0; uint64_t num_objects = 0; uint64_t root_object = 0; uint64_t offset_table_index = 0; char *offset_table = NULL; //first check w...
68,485,699,772,734,940,000,000,000,000,000,000,000
bplist.c
15,292,418,469,471,425,000,000,000,000,000,000,000
[ "CWE-770" ]
CVE-2017-5835
libplist allows attackers to cause a denial of service (large memory allocation and crash) via vectors involving an offset size of zero.
https://nvd.nist.gov/vuln/detail/CVE-2017-5835
206,024
linux
8572cea1461a006bce1d06c0c4b0575869125fa4
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/8572cea1461a006bce1d06c0c4b0575869125fa4
nfp: flower: prevent memory leak in nfp_flower_spawn_phy_reprs In nfp_flower_spawn_phy_reprs, in the for loop over eth_tbl if any of intermediate allocations or initializations fail memory is leaked. requiered releases are added. Fixes: b94524529741 ("nfp: flower: add per repr private data for LAG offload") Signed-of...
1
nfp_flower_spawn_phy_reprs(struct nfp_app *app, struct nfp_flower_priv *priv) { struct nfp_eth_table *eth_tbl = app->pf->eth_tbl; atomic_t *replies = &priv->reify_replies; struct nfp_flower_repr_priv *repr_priv; struct nfp_repr *nfp_repr; struct sk_buff *ctrl_skb; struct nfp_reprs *reprs; int err, reify_cnt; un...
195,353,204,371,252,450,000,000,000,000,000,000,000
main.c
326,858,579,041,313,300,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2019-19080
Four memory leaks in the nfp_flower_spawn_phy_reprs() function in drivers/net/ethernet/netronome/nfp/flower/main.c in the Linux kernel before 5.3.4 allow attackers to cause a denial of service (memory consumption), aka CID-8572cea1461a.
https://nvd.nist.gov/vuln/detail/CVE-2019-19080
376,306
linux
8572cea1461a006bce1d06c0c4b0575869125fa4
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/8572cea1461a006bce1d06c0c4b0575869125fa4
nfp: flower: prevent memory leak in nfp_flower_spawn_phy_reprs In nfp_flower_spawn_phy_reprs, in the for loop over eth_tbl if any of intermediate allocations or initializations fail memory is leaked. requiered releases are added. Fixes: b94524529741 ("nfp: flower: add per repr private data for LAG offload") Signed-of...
0
nfp_flower_spawn_phy_reprs(struct nfp_app *app, struct nfp_flower_priv *priv) { struct nfp_eth_table *eth_tbl = app->pf->eth_tbl; atomic_t *replies = &priv->reify_replies; struct nfp_flower_repr_priv *repr_priv; struct nfp_repr *nfp_repr; struct sk_buff *ctrl_skb; struct nfp_reprs *reprs; int err, reify_cnt; un...
204,870,543,410,190,730,000,000,000,000,000,000,000
main.c
83,701,049,146,303,390,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2019-19080
Four memory leaks in the nfp_flower_spawn_phy_reprs() function in drivers/net/ethernet/netronome/nfp/flower/main.c in the Linux kernel before 5.3.4 allow attackers to cause a denial of service (memory consumption), aka CID-8572cea1461a.
https://nvd.nist.gov/vuln/detail/CVE-2019-19080
206,028
vim
c249913edc35c0e666d783bfc21595cf9f7d9e0d
https://github.com/vim/vim
https://github.com/vim/vim/commit/c249913edc35c0e666d783bfc21595cf9f7d9e0d
patch 9.0.0483: illegal memory access when replacing in virtualedit mode Problem: Illegal memory access when replacing in virtualedit mode. Solution: Check for replacing NUL after Tab.
1
op_replace(oparg_T *oap, int c) { int n, numc; int num_chars; char_u *newp, *oldp; size_t oldlen; struct block_def bd; char_u *after_p = NULL; int had_ctrl_v_cr = FALSE; if ((curbuf->b_ml.ml_flags & ML_EMPTY ) || oap->empty) return OK; // nothing to do if (c == REPLAC...
13,818,243,420,621,576,000,000,000,000,000,000,000
ops.c
255,351,967,624,652,800,000,000,000,000,000,000,000
[ "CWE-122" ]
CVE-2022-3234
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0483.
https://nvd.nist.gov/vuln/detail/CVE-2022-3234
376,585
vim
c249913edc35c0e666d783bfc21595cf9f7d9e0d
https://github.com/vim/vim
https://github.com/vim/vim/commit/c249913edc35c0e666d783bfc21595cf9f7d9e0d
patch 9.0.0483: illegal memory access when replacing in virtualedit mode Problem: Illegal memory access when replacing in virtualedit mode. Solution: Check for replacing NUL after Tab.
0
op_replace(oparg_T *oap, int c) { int n, numc; int num_chars; char_u *newp, *oldp; size_t oldlen; struct block_def bd; char_u *after_p = NULL; int had_ctrl_v_cr = FALSE; if ((curbuf->b_ml.ml_flags & ML_EMPTY ) || oap->empty) return OK; // nothing to do if (c == REPLAC...
126,595,847,857,181,400,000,000,000,000,000,000,000
ops.c
270,732,469,250,202,670,000,000,000,000,000,000,000
[ "CWE-122" ]
CVE-2022-3234
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0483.
https://nvd.nist.gov/vuln/detail/CVE-2022-3234
206,048
ImageMagick
cb63560ba25e4a6c51ab282538c24877fff7d471
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/cb63560ba25e4a6c51ab282538c24877fff7d471
https://github.com/ImageMagick/ImageMagick/issues/641
1
static Image *ReadWEBPImage(const ImageInfo *image_info, ExceptionInfo *exception) { Image *image; int webp_status; MagickBooleanType status; register unsigned char *p; size_t length; ssize_t count, y; unsigned char header[12], *stream; WebPDecoderConfig ...
56,989,148,306,657,540,000,000,000,000,000,000,000
webp.c
304,411,139,792,896,430,000,000,000,000,000,000,000
[ "CWE-400" ]
CVE-2017-14137
ReadWEBPImage in coders/webp.c in ImageMagick 7.0.6-5 has an issue where memory allocation is excessive because it depends only on a length field in a header.
https://nvd.nist.gov/vuln/detail/CVE-2017-14137
376,707
ImageMagick
cb63560ba25e4a6c51ab282538c24877fff7d471
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/cb63560ba25e4a6c51ab282538c24877fff7d471
https://github.com/ImageMagick/ImageMagick/issues/641
0
static Image *ReadWEBPImage(const ImageInfo *image_info, ExceptionInfo *exception) { #define ThrowWEBPException(severity,tag) \ { \ if (stream != (unsigned char *) NULL) \ stream=(unsigned char*) RelinquishMagickMemory(stream); \ if (webp_image != (WebPDecBuffer *) NULL) \ WebPFreeDecBuffer(webp_image); \...
190,103,786,433,566,130,000,000,000,000,000,000,000
webp.c
23,890,474,412,933,410,000,000,000,000,000,000,000
[ "CWE-400" ]
CVE-2017-14137
ReadWEBPImage in coders/webp.c in ImageMagick 7.0.6-5 has an issue where memory allocation is excessive because it depends only on a length field in a header.
https://nvd.nist.gov/vuln/detail/CVE-2017-14137
206,082
linux
3d3925ff6433f98992685a9679613a2cc97f3ce2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/3d3925ff6433f98992685a9679613a2cc97f3ce2
can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path There is no need to call dev_kfree_skb() when usb_submit_urb() fails because can_put_echo_skb() deletes original skb and can_free_echo_skb() deletes the cloned skb. Fixes: 0024d8ad1639 ("can: usb_8dev: Add support for USB2CAN interface fro...
1
static netdev_tx_t usb_8dev_start_xmit(struct sk_buff *skb, struct net_device *netdev) { struct usb_8dev_priv *priv = netdev_priv(netdev); struct net_device_stats *stats = &netdev->stats; struct can_frame *cf = (struct can_frame *) skb->data; struct usb_8dev_tx_msg *msg; struct urb *urb; struct usb_8dev...
116,437,045,836,256,950,000,000,000,000,000,000,000
usb_8dev.c
244,846,640,243,829,170,000,000,000,000,000,000,000
[ "CWE-415" ]
CVE-2022-28388
usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c in the Linux kernel through 5.17.1 has a double free.
https://nvd.nist.gov/vuln/detail/CVE-2022-28388
377,105
linux
3d3925ff6433f98992685a9679613a2cc97f3ce2
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/3d3925ff6433f98992685a9679613a2cc97f3ce2
can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path There is no need to call dev_kfree_skb() when usb_submit_urb() fails because can_put_echo_skb() deletes original skb and can_free_echo_skb() deletes the cloned skb. Fixes: 0024d8ad1639 ("can: usb_8dev: Add support for USB2CAN interface fro...
0
static netdev_tx_t usb_8dev_start_xmit(struct sk_buff *skb, struct net_device *netdev) { struct usb_8dev_priv *priv = netdev_priv(netdev); struct net_device_stats *stats = &netdev->stats; struct can_frame *cf = (struct can_frame *) skb->data; struct usb_8dev_tx_msg *msg; struct urb *urb; struct usb_8dev...
109,363,242,785,617,400,000,000,000,000,000,000,000
usb_8dev.c
117,925,841,962,805,740,000,000,000,000,000,000,000
[ "CWE-415" ]
CVE-2022-28388
usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c in the Linux kernel through 5.17.1 has a double free.
https://nvd.nist.gov/vuln/detail/CVE-2022-28388
206,087
httpd
3b6431eb9c9dba603385f70a2131ab4a01bf0d3b
https://github.com/apache/httpd
https://github.com/apache/httpd/commit/3b6431eb9c9dba603385f70a2131ab4a01bf0d3b
Merge r1885659 from trunk: mod_auth_digest: Fast validation of the nonce's base64 to fail early if the format can't match anyway. Submitted by: ylavic Reviewed by: ylavic, covener, jailletc36 git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/branches/2.4.x@1885666 13f79535-47bb-0310-9956-ffa...
1
static int check_nonce(request_rec *r, digest_header_rec *resp, const digest_config_rec *conf) { apr_time_t dt; time_rec nonce_time; char tmp, hash[NONCE_HASH_LEN+1]; if (strlen(resp->nonce) != NONCE_LEN) { ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(01775) ...
53,272,688,762,799,760,000,000,000,000,000,000,000
mod_auth_digest.c
168,625,451,022,706,740,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2020-35452
Apache HTTP Server versions 2.4.0 to 2.4.46 A specially crafted Digest nonce can cause a stack overflow in mod_auth_digest. There is no report of this overflow being exploitable, nor the Apache HTTP Server team could create one, though some particular compiler and/or compilation option might make it possible, with limi...
https://nvd.nist.gov/vuln/detail/CVE-2020-35452
377,170
httpd
3b6431eb9c9dba603385f70a2131ab4a01bf0d3b
https://github.com/apache/httpd
https://github.com/apache/httpd/commit/3b6431eb9c9dba603385f70a2131ab4a01bf0d3b
Merge r1885659 from trunk: mod_auth_digest: Fast validation of the nonce's base64 to fail early if the format can't match anyway. Submitted by: ylavic Reviewed by: ylavic, covener, jailletc36 git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/branches/2.4.x@1885666 13f79535-47bb-0310-9956-ffa...
0
static int check_nonce(request_rec *r, digest_header_rec *resp, const digest_config_rec *conf) { apr_time_t dt; time_rec nonce_time; char tmp, hash[NONCE_HASH_LEN+1]; /* Since the time part of the nonce is a base64 encoding of an * apr_time_t (8 bytes), it should end with a ...
15,099,181,510,498,865,000,000,000,000,000,000,000
mod_auth_digest.c
270,655,216,103,044,620,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2020-35452
Apache HTTP Server versions 2.4.0 to 2.4.46 A specially crafted Digest nonce can cause a stack overflow in mod_auth_digest. There is no report of this overflow being exploitable, nor the Apache HTTP Server team could create one, though some particular compiler and/or compilation option might make it possible, with limi...
https://nvd.nist.gov/vuln/detail/CVE-2020-35452
206,108
git
e904deb89d9a9669a76a426182506a084d3f6308
https://github.com/git/git
https://github.com/git/git/commit/e904deb89d9a9669a76a426182506a084d3f6308
submodule: reject submodule.update = !command in .gitmodules Since ac1fbbda2013 (submodule: do not copy unknown update mode from .gitmodules, 2013-12-02), Git has been careful to avoid copying [submodule "foo"] update = !run an arbitrary scary command from .gitmodules to a repository's local config, copying in th...
1
static int parse_config(const char *var, const char *value, void *data) { struct parse_config_parameter *me = data; struct submodule *submodule; struct strbuf name = STRBUF_INIT, item = STRBUF_INIT; int ret = 0; /* this also ensures that we only parse submodule entries */ if (!name_and_item_from_var(var, &name, ...
109,766,985,234,622,280,000,000,000,000,000,000,000
submodule-config.c
300,518,344,266,712,130,000,000,000,000,000,000,000
[ "CWE-78" ]
CVE-2019-19604
Arbitrary command execution is possible in Git before 2.20.2, 2.21.x before 2.21.1, 2.22.x before 2.22.2, 2.23.x before 2.23.1, and 2.24.x before 2.24.1 because a "git submodule update" operation can run commands found in the .gitmodules file of a malicious repository.
https://nvd.nist.gov/vuln/detail/CVE-2019-19604
377,319
git
e904deb89d9a9669a76a426182506a084d3f6308
https://github.com/git/git
https://github.com/git/git/commit/e904deb89d9a9669a76a426182506a084d3f6308
submodule: reject submodule.update = !command in .gitmodules Since ac1fbbda2013 (submodule: do not copy unknown update mode from .gitmodules, 2013-12-02), Git has been careful to avoid copying [submodule "foo"] update = !run an arbitrary scary command from .gitmodules to a repository's local config, copying in th...
0
static int parse_config(const char *var, const char *value, void *data) { struct parse_config_parameter *me = data; struct submodule *submodule; struct strbuf name = STRBUF_INIT, item = STRBUF_INIT; int ret = 0; /* this also ensures that we only parse submodule entries */ if (!name_and_item_from_var(var, &name, ...
150,493,603,339,734,990,000,000,000,000,000,000,000
submodule-config.c
282,243,715,960,098,050,000,000,000,000,000,000,000
[ "CWE-78" ]
CVE-2019-19604
Arbitrary command execution is possible in Git before 2.20.2, 2.21.x before 2.21.1, 2.22.x before 2.22.2, 2.23.x before 2.23.1, and 2.24.x before 2.24.1 because a "git submodule update" operation can run commands found in the .gitmodules file of a malicious repository.
https://nvd.nist.gov/vuln/detail/CVE-2019-19604
206,121
linux
89189557b47b35683a27c80ee78aef18248eefb4
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=89189557b47b35683a27c80ee78aef18248eefb4
fs/proc/proc_sysctl.c: Fix a NULL pointer dereference Syzkaller report this: sysctl could not get directory: /net//bridge -12 kasan: CONFIG_KASAN_INLINE enabled kasan: GPF could be caused by NULL-ptr deref or user memory access general protection fault: 0000 [#1] SMP KASAN PTI CPU: 1 PID: 7027 Comm: syz-exe...
1
static void drop_sysctl_table(struct ctl_table_header *header) { struct ctl_dir *parent = header->parent; if (--header->nreg) return; if (parent) put_links(header); start_unregistering(header); if (!--header->count) kfree_rcu(header, rcu); if (parent) drop_sysctl_table(&parent->header); }
129,426,444,515,663,800,000,000,000,000,000,000,000
proc_sysctl.c
167,876,789,808,674,400,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2019-20054
In the Linux kernel before 5.0.6, there is a NULL pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c, related to put_links, aka CID-23da9588037e.
https://nvd.nist.gov/vuln/detail/CVE-2019-20054
377,430
linux
89189557b47b35683a27c80ee78aef18248eefb4
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=89189557b47b35683a27c80ee78aef18248eefb4
fs/proc/proc_sysctl.c: Fix a NULL pointer dereference Syzkaller report this: sysctl could not get directory: /net//bridge -12 kasan: CONFIG_KASAN_INLINE enabled kasan: GPF could be caused by NULL-ptr deref or user memory access general protection fault: 0000 [#1] SMP KASAN PTI CPU: 1 PID: 7027 Comm: syz-exe...
0
static void drop_sysctl_table(struct ctl_table_header *header) { struct ctl_dir *parent = header->parent; if (--header->nreg) return; if (parent) { put_links(header); start_unregistering(header); } if (!--header->count) kfree_rcu(header, rcu); if (parent) drop_sysctl_table(&parent->header); }
75,062,216,562,513,050,000,000,000,000,000,000,000
proc_sysctl.c
141,610,585,483,774,730,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2019-20054
In the Linux kernel before 5.0.6, there is a NULL pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c, related to put_links, aka CID-23da9588037e.
https://nvd.nist.gov/vuln/detail/CVE-2019-20054
206,122
php-src
0765623d6991b62ffcd93ddb6be8a5203a2fa7e2
https://github.com/php/php-src
http://git.php.net/?p=php-src.git;a=commitdiff;h=0765623d6991b62ffcd93ddb6be8a5203a2fa7e2
improve fix for Bug #69545
1
ftp_genlist(ftpbuf_t *ftp, const char *cmd, const char *path TSRMLS_DC) { php_stream *tmpstream = NULL; databuf_t *data = NULL; char *ptr; int ch, lastch; size_t size, rcvd; size_t lines; char **ret = NULL; char **entry; char *text; if ((tmpstream = php_stream_fopen_tmpfile()) == NULL) { php_error_...
318,225,239,746,599,400,000,000,000,000,000,000,000
ftp.c
297,476,459,306,613,060,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2015-4022
Integer overflow in the ftp_genlist function in ext/ftp/ftp.c in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 allows remote FTP servers to execute arbitrary code via a long reply to a LIST command, leading to a heap-based buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2015-4022
377,459
php-src
0765623d6991b62ffcd93ddb6be8a5203a2fa7e2
https://github.com/php/php-src
http://git.php.net/?p=php-src.git;a=commitdiff;h=0765623d6991b62ffcd93ddb6be8a5203a2fa7e2
improve fix for Bug #69545
0
ftp_genlist(ftpbuf_t *ftp, const char *cmd, const char *path TSRMLS_DC) { php_stream *tmpstream = NULL; databuf_t *data = NULL; char *ptr; int ch, lastch; size_t size, rcvd; size_t lines; char **ret = NULL; char **entry; char *text; if ((tmpstream = php_stream_fopen_tmpfile()) == NULL) { php_error_...
147,167,252,106,652,520,000,000,000,000,000,000,000
ftp.c
338,209,734,081,345,650,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2015-4022
Integer overflow in the ftp_genlist function in ext/ftp/ftp.c in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 allows remote FTP servers to execute arbitrary code via a long reply to a LIST command, leading to a heap-based buffer overflow.
https://nvd.nist.gov/vuln/detail/CVE-2015-4022
206,126
clamav-devel
4842733eb3f09be61caeed83778bb6679141dbc5
https://github.com/vrtadmin/clamav-devel
http://git.clamav.net/gitweb?p=clamav-devel.git;a=commit;h=4842733eb3f09be61caeed83778bb6679141dbc5
bb#2818
1
int cli_hm_scan(const unsigned char *digest, uint32_t size, const char **virname, const struct cli_matcher *root, enum CLI_HASH_TYPE type) { const struct cli_htu32_element *item; unsigned int keylen; struct cli_sz_hash *szh; size_t l, r; if(!digest || !size || size == 0xffffffff || !root || !root->...
116,516,251,163,308,170,000,000,000,000,000,000,000
matcher-hash.c
213,945,621,856,830,600,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2011-2721
Off-by-one error in the cli_hm_scan function in matcher-hash.c in libclamav in ClamAV before 0.97.2 allows remote attackers to cause a denial of service (daemon crash) via an e-mail message that is not properly handled during certain hash calculations.
https://nvd.nist.gov/vuln/detail/CVE-2011-2721
377,495
clamav-devel
4842733eb3f09be61caeed83778bb6679141dbc5
https://github.com/vrtadmin/clamav-devel
http://git.clamav.net/gitweb?p=clamav-devel.git;a=commit;h=4842733eb3f09be61caeed83778bb6679141dbc5
bb#2818
0
int cli_hm_scan(const unsigned char *digest, uint32_t size, const char **virname, const struct cli_matcher *root, enum CLI_HASH_TYPE type) { const struct cli_htu32_element *item; unsigned int keylen; struct cli_sz_hash *szh; size_t l, r; if(!digest || !size || size == 0xffffffff || !root || !root->...
334,362,423,903,036,740,000,000,000,000,000,000,000
matcher-hash.c
259,657,226,011,056,030,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2011-2721
Off-by-one error in the cli_hm_scan function in matcher-hash.c in libclamav in ClamAV before 0.97.2 allows remote attackers to cause a denial of service (daemon crash) via an e-mail message that is not properly handled during certain hash calculations.
https://nvd.nist.gov/vuln/detail/CVE-2011-2721
206,127
libtiff
99b10edde9a0fc28cc0e7b7757aa18ac4c8c225f
https://github.com/vadz/libtiff
https://gitlab.com/libtiff/libtiff/commit/99b10edde9a0fc28cc0e7b7757aa18ac4c8c225f
tiff2bw: avoid null pointer dereference in case of out of memory situation. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2819 / CVE-2018-18661
1
main(int argc, char* argv[]) { uint32 rowsperstrip = (uint32) -1; TIFF *in, *out; uint32 w, h; uint16 samplesperpixel; uint16 bitspersample; uint16 config; uint16 photometric; uint16* red; uint16* green; uint16* blue; tsize_t rowsize; register uint32 row; register tsample_t s; unsigned char *inbuf, *outbu...
57,911,071,887,547,450,000,000,000,000,000,000,000
tiff2bw.c
189,500,255,933,107,200,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2018-18661
An issue was discovered in LibTIFF 4.0.9. There is a NULL pointer dereference in the function LZWDecode in the file tif_lzw.c.
https://nvd.nist.gov/vuln/detail/CVE-2018-18661
377,501
libtiff
99b10edde9a0fc28cc0e7b7757aa18ac4c8c225f
https://github.com/vadz/libtiff
https://gitlab.com/libtiff/libtiff/commit/99b10edde9a0fc28cc0e7b7757aa18ac4c8c225f
tiff2bw: avoid null pointer dereference in case of out of memory situation. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2819 / CVE-2018-18661
0
main(int argc, char* argv[]) { uint32 rowsperstrip = (uint32) -1; TIFF *in, *out; uint32 w, h; uint16 samplesperpixel; uint16 bitspersample; uint16 config; uint16 photometric; uint16* red; uint16* green; uint16* blue; tsize_t rowsize; register uint32 row; register tsample_t s; unsigned char *inbuf, *outbu...
250,318,405,281,686,200,000,000,000,000,000,000,000
tiff2bw.c
210,326,292,647,667,700,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2018-18661
An issue was discovered in LibTIFF 4.0.9. There is a NULL pointer dereference in the function LZWDecode in the file tif_lzw.c.
https://nvd.nist.gov/vuln/detail/CVE-2018-18661
206,132
tor
80c404c4b79f3bcba3fc4585d4c62a62a04f3ed9
https://github.com/torproject/tor
https://gitlab.torproject.org/tpo/core/tor/-/commit/80c404c4b79f3bcba3fc4585d4c62a62a04f3ed9
Log warning when connecting to soon-to-be-deprecated v2 onions.
1
connection_ap_handshake_rewrite_and_attach(entry_connection_t *conn, origin_circuit_t *circ, crypt_path_t *cpath) { socks_request_t *socks = conn->socks_request; const or_options_t *options = get_options(); connection_t *base_co...
189,125,265,574,271,300,000,000,000,000,000,000,000
connection_edge.c
212,384,958,512,676,300,000,000,000,000,000,000,000
[ "CWE-532" ]
CVE-2021-39246
Tor Browser through 10.5.6 and 11.x through 11.0a4 allows a correlation attack that can compromise the privacy of visits to v2 onion addresses. Exact timestamps of these onion-service visits are logged locally, and an attacker might be able to compare them to timestamp data collected by the destination server (or colle...
https://nvd.nist.gov/vuln/detail/CVE-2021-39246
377,569
tor
80c404c4b79f3bcba3fc4585d4c62a62a04f3ed9
https://github.com/torproject/tor
https://gitlab.torproject.org/tpo/core/tor/-/commit/80c404c4b79f3bcba3fc4585d4c62a62a04f3ed9
Log warning when connecting to soon-to-be-deprecated v2 onions.
0
connection_ap_handshake_rewrite_and_attach(entry_connection_t *conn, origin_circuit_t *circ, crypt_path_t *cpath) { socks_request_t *socks = conn->socks_request; const or_options_t *options = get_options(); connection_t *base_co...
239,196,952,238,474,400,000,000,000,000,000,000,000
connection_edge.c
322,431,415,235,685,750,000,000,000,000,000,000,000
[ "CWE-532" ]
CVE-2021-39246
Tor Browser through 10.5.6 and 11.x through 11.0a4 allows a correlation attack that can compromise the privacy of visits to v2 onion addresses. Exact timestamps of these onion-service visits are logged locally, and an attacker might be able to compare them to timestamp data collected by the destination server (or colle...
https://nvd.nist.gov/vuln/detail/CVE-2021-39246
206,207
ImageMagick
9dd1c7e1f8f6c137bfd3293be2554f59456c7b62
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/9dd1c7e1f8f6c137bfd3293be2554f59456c7b62
https://github.com/ImageMagick/ImageMagick/issues/1753
1
static MagickBooleanType WritePDFImage(const ImageInfo *image_info,Image *image, ExceptionInfo *exception) { #define CFormat "/Filter [ /%s ]\n" #define ObjectsPerImage 14 #define ThrowPDFException(exception,message) \ { \ if (xref != (MagickOffsetType *) NULL) \ xref=(MagickOffsetType *) RelinquishMagickMemo...
20,758,126,336,189,803,000,000,000,000,000,000,000
pdf.c
132,808,098,468,469,560,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2020-27771
In RestoreMSCWarning() of /coders/pdf.c there are several areas where calls to GetPixelIndex() could result in values outside the range of representable for the unsigned char type. The patch casts the return value of GetPixelIndex() to ssize_t type to avoid this bug. This undefined behavior could be triggered when Imag...
https://nvd.nist.gov/vuln/detail/CVE-2020-27771
377,933
ImageMagick
9dd1c7e1f8f6c137bfd3293be2554f59456c7b62
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/9dd1c7e1f8f6c137bfd3293be2554f59456c7b62
https://github.com/ImageMagick/ImageMagick/issues/1753
0
static MagickBooleanType WritePDFImage(const ImageInfo *image_info,Image *image, ExceptionInfo *exception) { #define CFormat "/Filter [ /%s ]\n" #define ObjectsPerImage 14 #define ThrowPDFException(exception,message) \ { \ if (xref != (MagickOffsetType *) NULL) \ xref=(MagickOffsetType *) RelinquishMagickMemo...
239,707,070,423,046,950,000,000,000,000,000,000,000
pdf.c
131,126,882,590,292,450,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2020-27771
In RestoreMSCWarning() of /coders/pdf.c there are several areas where calls to GetPixelIndex() could result in values outside the range of representable for the unsigned char type. The patch casts the return value of GetPixelIndex() to ssize_t type to avoid this bug. This undefined behavior could be triggered when Imag...
https://nvd.nist.gov/vuln/detail/CVE-2020-27771
206,208
ImageMagick
de5deab202c340162b65f65bafbbe17b1eda2c1a
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/de5deab202c340162b65f65bafbbe17b1eda2c1a
https://github.com/ImageMagick/ImageMagick/issues/794
1
static void LoadOpenCLDevices(MagickCLEnv clEnv) { cl_context_properties properties[3]; cl_device_id *devices; cl_int status; cl_platform_id *platforms; cl_uint i, j, next, number_devices, number_platforms; size_t length; number_platforms=0; if (openCL_libra...
203,233,477,377,707,560,000,000,000,000,000,000,000
opencl.c
27,776,408,866,912,014,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2017-18253
An issue was discovered in ImageMagick 7.0.7. A NULL pointer dereference vulnerability was found in the function LoadOpenCLDevices in MagickCore/opencl.c, which allows attackers to cause a denial of service via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2017-18253
378,009
ImageMagick
de5deab202c340162b65f65bafbbe17b1eda2c1a
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/de5deab202c340162b65f65bafbbe17b1eda2c1a
https://github.com/ImageMagick/ImageMagick/issues/794
0
static void LoadOpenCLDevices(MagickCLEnv clEnv) { cl_context_properties properties[3]; cl_device_id *devices; cl_int status; cl_platform_id *platforms; cl_uint i, j, next, number_devices, number_platforms; size_t length; number_platforms=0; if (openCL_libra...
240,153,617,697,343,800,000,000,000,000,000,000,000
opencl.c
14,443,734,427,931,294,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2017-18253
An issue was discovered in ImageMagick 7.0.7. A NULL pointer dereference vulnerability was found in the function LoadOpenCLDevices in MagickCore/opencl.c, which allows attackers to cause a denial of service via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2017-18253
206,217
cinnamon-screensaver
da7af55f1fa966c52e15cc288d4f8928eca8cc9f
https://github.com/mtwebster/cinnamon-screensaver
https://github.com/mtwebster/cinnamon-screensaver/commit/da7af55f1fa966c52e15cc288d4f8928eca8cc9f
Workaround gtk3 bug, don't allow GtkWindow to handle popup_menu.
1
gs_window_class_init (GSWindowClass *klass) { GObjectClass *object_class = G_OBJECT_CLASS (klass); GtkWidgetClass *widget_class = GTK_WIDGET_CLASS (klass); object_class->finalize = gs_window_finalize; object_class->get_property = gs_window_get_property; object_class->set_p...
44,154,590,121,117,700,000,000,000,000,000,000,000
gs-window-x11.c
44,288,002,596,828,660,000,000,000,000,000,000,000
[ "CWE-284" ]
CVE-2014-1949
GTK+ 3.10.9 and earlier, as used in cinnamon-screensaver, gnome-screensaver, and other applications, allows physically proximate attackers to bypass the lock screen by pressing the menu button.
https://nvd.nist.gov/vuln/detail/CVE-2014-1949
378,165
cinnamon-screensaver
da7af55f1fa966c52e15cc288d4f8928eca8cc9f
https://github.com/mtwebster/cinnamon-screensaver
https://github.com/mtwebster/cinnamon-screensaver/commit/da7af55f1fa966c52e15cc288d4f8928eca8cc9f
Workaround gtk3 bug, don't allow GtkWindow to handle popup_menu.
0
gs_window_class_init (GSWindowClass *klass) { GObjectClass *object_class = G_OBJECT_CLASS (klass); GtkWidgetClass *widget_class = GTK_WIDGET_CLASS (klass); object_class->finalize = gs_window_finalize; object_class->get_property = gs_window_get_property; object_class->set_p...
212,548,625,905,084,000,000,000,000,000,000,000,000
gs-window-x11.c
152,220,240,473,019,100,000,000,000,000,000,000,000
[ "CWE-284" ]
CVE-2014-1949
GTK+ 3.10.9 and earlier, as used in cinnamon-screensaver, gnome-screensaver, and other applications, allows physically proximate attackers to bypass the lock screen by pressing the menu button.
https://nvd.nist.gov/vuln/detail/CVE-2014-1949
206,248
ImageMagick
43539e67a47d2f8de832d33a5b26dc2a7a12294f
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/43539e67a47d2f8de832d33a5b26dc2a7a12294f
https://github.com/ImageMagick/ImageMagick/issues/1718
1
MagickPrivate ResizeFilter *AcquireResizeFilter(const Image *image, const FilterType filter,const MagickBooleanType cylindrical, ExceptionInfo *exception) { const char *artifact; FilterType filter_type, window_type; double B, C, value; register ResizeFilter *resize_filter; ...
2,256,423,509,877,445,800,000,000,000,000,000,000
resize.c
333,768,715,355,806,430,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2020-27763
A flaw was found in ImageMagick in MagickCore/resize.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. This would most likely lead to an impact to application availability, but could potentially cause other problems related ...
https://nvd.nist.gov/vuln/detail/CVE-2020-27763