idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
370,724 | tip | 4e78921ba4dd0aca1cc89168f45039add4183f8e | http://git.kernel.org/cgit/linux/kernel/git/tip/tip | https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=4e78921ba4dd0aca1cc89168f45039add4183f8e | efi/x86/Add missing error handling to old_memmap 1:1 mapping code
The old_memmap flow in efi_call_phys_prolog() performs numerous memory
allocations, and either does not check for failure at all, or it does
but fails to propagate it back to the caller, which may end up calling
into the firmware with an incomplete 1:1 ... | 0 | pgd_t * __init efi_call_phys_prolog(void)
{
unsigned long vaddr, addr_pgd, addr_p4d, addr_pud;
pgd_t *save_pgd, *pgd_k, *pgd_efi;
p4d_t *p4d, *p4d_k, *p4d_efi;
pud_t *pud;
int pgd;
int n_pgds, i, j;
if (!efi_enabled(EFI_OLD_MEMMAP)) {
efi_switch_mm(&efi_mm);
return efi_mm.pgd;
}
early_code_mapping_set_e... | 329,825,272,145,040,840,000,000,000,000,000,000,000 | None | null | [
"CWE-388"
] | CVE-2019-12380 | **DISPUTED** An issue was discovered in the efi subsystem in the Linux kernel through 5.1.5. phys_efi_set_virtual_address_map in arch/x86/platform/efi/efi.c and efi_call_phys_prolog in arch/x86/platform/efi/efi_64.c mishandle memory allocation failures. NOTE: This id is disputed as not being an issue because “All the c... | https://nvd.nist.gov/vuln/detail/CVE-2019-12380 |
205,719 | libebml | 88409e2a94dd3b40ff81d08bf6d92f486d036b24 | https://github.com/Matroska-Org/libebml | https://github.com/Matroska-Org/libebml/commit/88409e2a94dd3b40ff81d08bf6d92f486d036b24 | EbmlMaster: propagate upper level element after infinite sized one correctly
When the parser encountered a deeply nested element with an infinite
size then a following element of an upper level was not propagated
correctly. Instead the element with the infinite size was added into the
EBML element tree a second time r... | 1 | void EbmlMaster::Read(EbmlStream & inDataStream, const EbmlSemanticContext & sContext, int & UpperEltFound, EbmlElement * & FoundElt, bool AllowDummyElt, ScopeMode ReadFully)
{
if (ReadFully == SCOPE_NO_DATA)
return;
EbmlElement * ElementLevelA;
// remove all existing elements, including the mandatory ones..... | 6,414,099,527,910,853,000,000,000,000,000,000,000 | EbmlMaster.cpp | 185,529,239,083,850,600,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2015-8789 | Use-after-free vulnerability in the EbmlMaster::Read function in libEBML before 1.3.3 allows context-dependent attackers to have unspecified impact via a "deeply nested element with infinite size" followed by another element of an upper level in an EBML document. | https://nvd.nist.gov/vuln/detail/CVE-2015-8789 |
370,793 | libebml | 88409e2a94dd3b40ff81d08bf6d92f486d036b24 | https://github.com/Matroska-Org/libebml | https://github.com/Matroska-Org/libebml/commit/88409e2a94dd3b40ff81d08bf6d92f486d036b24 | EbmlMaster: propagate upper level element after infinite sized one correctly
When the parser encountered a deeply nested element with an infinite
size then a following element of an upper level was not propagated
correctly. Instead the element with the infinite size was added into the
EBML element tree a second time r... | 0 | void EbmlMaster::Read(EbmlStream & inDataStream, const EbmlSemanticContext & sContext, int & UpperEltFound, EbmlElement * & FoundElt, bool AllowDummyElt, ScopeMode ReadFully)
{
if (ReadFully == SCOPE_NO_DATA)
return;
EbmlElement * ElementLevelA;
// remove all existing elements, including the mandatory ones..... | 267,143,589,191,996,740,000,000,000,000,000,000,000 | EbmlMaster.cpp | 69,472,703,838,393,550,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2015-8789 | Use-after-free vulnerability in the EbmlMaster::Read function in libEBML before 1.3.3 allows context-dependent attackers to have unspecified impact via a "deeply nested element with infinite size" followed by another element of an upper level in an EBML document. | https://nvd.nist.gov/vuln/detail/CVE-2015-8789 |
205,721 | net | 4dd2b82d5adfbe0b1587ccad7a8f76d826120f37 | https://git.kernel.org/cgit/linux/kernel/git/davem/net | https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=4dd2b82d5adfbe0b1587ccad7a8f76d826120f37 | udp: fix GRO packet of death
syzbot was able to crash host by sending UDP packets with a 0 payload.
TCP does not have this issue since we do not aggregate packets without
payload.
Since dev_gro_receive() sets gso_size based on skb_gro_len(skb)
it seems not worth trying to cope with padded packets.
BUG: KASAN: slab-... | 1 | static struct sk_buff *udp_gro_receive_segment(struct list_head *head,
struct sk_buff *skb)
{
struct udphdr *uh = udp_hdr(skb);
struct sk_buff *pp = NULL;
struct udphdr *uh2;
struct sk_buff *p;
/* requires non zero csum, for symmetry with GSO */
if (!uh->check) {
NAPI_GRO_CB(skb)->flush = 1;
retu... | 305,377,531,447,737,500,000,000,000,000,000,000,000 | udp_offload.c | 218,157,144,490,844,900,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2019-11683 | udp_gro_receive_segment in net/ipv4/udp_offload.c in the Linux kernel 5.x before 5.0.13 allows remote attackers to cause a denial of service (slab-out-of-bounds memory corruption) or possibly have unspecified other impact via UDP packets with a 0 payload, because of mishandling of padded packets, aka the "GRO packet of... | https://nvd.nist.gov/vuln/detail/CVE-2019-11683 |
370,830 | net | 4dd2b82d5adfbe0b1587ccad7a8f76d826120f37 | https://git.kernel.org/cgit/linux/kernel/git/davem/net | https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=4dd2b82d5adfbe0b1587ccad7a8f76d826120f37 | udp: fix GRO packet of death
syzbot was able to crash host by sending UDP packets with a 0 payload.
TCP does not have this issue since we do not aggregate packets without
payload.
Since dev_gro_receive() sets gso_size based on skb_gro_len(skb)
it seems not worth trying to cope with padded packets.
BUG: KASAN: slab-... | 0 | static struct sk_buff *udp_gro_receive_segment(struct list_head *head,
struct sk_buff *skb)
{
struct udphdr *uh = udp_hdr(skb);
struct sk_buff *pp = NULL;
struct udphdr *uh2;
struct sk_buff *p;
unsigned int ulen;
/* requires non zero csum, for symmetry with GSO */
if (!uh->check) {
NAPI_GRO_CB(skb... | 64,903,180,007,246,395,000,000,000,000,000,000,000 | udp_offload.c | 302,140,363,612,087,320,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2019-11683 | udp_gro_receive_segment in net/ipv4/udp_offload.c in the Linux kernel 5.x before 5.0.13 allows remote attackers to cause a denial of service (slab-out-of-bounds memory corruption) or possibly have unspecified other impact via UDP packets with a 0 payload, because of mishandling of padded packets, aka the "GRO packet of... | https://nvd.nist.gov/vuln/detail/CVE-2019-11683 |
205,722 | php-src | 8f4a5373bb71590352fd934028d6dde5bc18530b | https://github.com/php/php-src | http://git.php.net/?p=php-src.git;a=commitdiff;h=8f4a5373bb71590352fd934028d6dde5bc18530b | Fixed bug #66356 (Heap Overflow Vulnerability in imagecrop())
Initial fix was PHP stuff
This one is libgd fix.
- filter invalid crop size
- dont try to copy on invalid position
- fix crop size when out of src image
- fix possible NULL deref
- fix possible integer overfloow | 1 | gdImagePtr gdImageCrop(gdImagePtr src, const gdRectPtr crop)
{
gdImagePtr dst;
if (src->trueColor) {
dst = gdImageCreateTrueColor(crop->width, crop->height);
gdImageSaveAlpha(dst, 1);
} else {
dst = gdImageCreate(crop->width, crop->height);
gdImagePaletteCopy(dst, src);
}
dst->transparent = src->transpare... | 337,268,930,905,379,440,000,000,000,000,000,000,000 | gd_crop.c | 12,295,057,091,284,550,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-7226 | Integer overflow in the gdImageCrop function in ext/gd/gd.c in PHP 5.5.x before 5.5.9 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via an imagecrop function call with a large x dimension value, leading to a heap-based buffer overflow. | https://nvd.nist.gov/vuln/detail/CVE-2013-7226 |
370,832 | php-src | 8f4a5373bb71590352fd934028d6dde5bc18530b | https://github.com/php/php-src | http://git.php.net/?p=php-src.git;a=commitdiff;h=8f4a5373bb71590352fd934028d6dde5bc18530b | Fixed bug #66356 (Heap Overflow Vulnerability in imagecrop())
Initial fix was PHP stuff
This one is libgd fix.
- filter invalid crop size
- dont try to copy on invalid position
- fix crop size when out of src image
- fix possible NULL deref
- fix possible integer overfloow | 0 | gdImagePtr gdImageCrop(gdImagePtr src, const gdRectPtr crop)
{
gdImagePtr dst;
/* check size */
if (crop->width<=0 || crop->height<=0) {
return NULL;
}
/* allocate the requested size (could be only partially filled) */
if (src->trueColor) {
dst = gdImageCreateTrueColor(crop->width, crop->height);
gdImageS... | 132,089,268,009,027,230,000,000,000,000,000,000,000 | gd_crop.c | 114,302,224,163,599,920,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2013-7226 | Integer overflow in the gdImageCrop function in ext/gd/gd.c in PHP 5.5.x before 5.5.9 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via an imagecrop function call with a large x dimension value, leading to a heap-based buffer overflow. | https://nvd.nist.gov/vuln/detail/CVE-2013-7226 |
205,723 | systemd | 4dac5eaba4e419b29c97da38a8b1f82336c2c892 | https://github.com/systemd/systemd | https://github.com/systemd/systemd/commit/4dac5eaba4e419b29c97da38a8b1f82336c2c892 | dhcp6: make sure we have enough space for the DHCP6 option header
Fixes a vulnerability originally discovered by Felix Wilhelm from
Google.
CVE-2018-15688
LP: #1795921
https://bugzilla.redhat.com/show_bug.cgi?id=1639067 | 1 | int dhcp6_option_append_ia(uint8_t **buf, size_t *buflen, const DHCP6IA *ia) {
uint16_t len;
uint8_t *ia_hdr;
size_t iaid_offset, ia_buflen, ia_addrlen = 0;
DHCP6Address *addr;
int r;
assert_return(buf, -EINVAL);
assert_return(*buf, -EINVAL);
assert_retur... | 85,128,664,190,676,620,000,000,000,000,000,000,000 | dhcp6-option.c | 269,567,682,951,194,970,000,000,000,000,000,000,000 | [
"CWE-120"
] | CVE-2018-15688 | A buffer overflow vulnerability in the dhcp6 client of systemd allows a malicious dhcp6 server to overwrite heap memory in systemd-networkd. Affected releases are systemd: versions up to and including 239. | https://nvd.nist.gov/vuln/detail/CVE-2018-15688 |
370,847 | systemd | 4dac5eaba4e419b29c97da38a8b1f82336c2c892 | https://github.com/systemd/systemd | https://github.com/systemd/systemd/commit/4dac5eaba4e419b29c97da38a8b1f82336c2c892 | dhcp6: make sure we have enough space for the DHCP6 option header
Fixes a vulnerability originally discovered by Felix Wilhelm from
Google.
CVE-2018-15688
LP: #1795921
https://bugzilla.redhat.com/show_bug.cgi?id=1639067 | 0 | int dhcp6_option_append_ia(uint8_t **buf, size_t *buflen, const DHCP6IA *ia) {
uint16_t len;
uint8_t *ia_hdr;
size_t iaid_offset, ia_buflen, ia_addrlen = 0;
DHCP6Address *addr;
int r;
assert_return(buf, -EINVAL);
assert_return(*buf, -EINVAL);
assert_retur... | 232,765,771,882,532,870,000,000,000,000,000,000,000 | dhcp6-option.c | 108,792,040,261,583,300,000,000,000,000,000,000,000 | [
"CWE-120"
] | CVE-2018-15688 | A buffer overflow vulnerability in the dhcp6 client of systemd allows a malicious dhcp6 server to overwrite heap memory in systemd-networkd. Affected releases are systemd: versions up to and including 239. | https://nvd.nist.gov/vuln/detail/CVE-2018-15688 |
205,726 | mbedtls | 643a922c56b77235e88f106fb1b41c1a764cea5f | https://github.com/ARMmbed/mbedtls | https://github.com/ARMmbed/mbedtls/commit/643a922c56b77235e88f106fb1b41c1a764cea5f | Reordered extension fields and added to ChangeLog
Reordered the transmission sequence of TLS extension fields in client hello
and added to ChangeLog. | 1 | static void ssl_write_hostname_ext( ssl_context *ssl,
unsigned char *buf,
size_t *olen )
{
unsigned char *p = buf;
const unsigned char *end = ssl->out_msg + SSL_MAX_CONTENT_LEN;
*olen = 0;
if( ssl->hostname == NULL )
retur... | 196,444,406,413,350,280,000,000,000,000,000,000,000 | ssl_cli.c | 127,773,836,001,759,380,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2015-5291 | Heap-based buffer overflow in PolarSSL 1.x before 1.2.17 and ARM mbed TLS (formerly PolarSSL) 1.3.x before 1.3.14 and 2.x before 2.1.2 allows remote SSL servers to cause a denial of service (client crash) and possibly execute arbitrary code via a long hostname to the server name indication (SNI) extension, which is not... | https://nvd.nist.gov/vuln/detail/CVE-2015-5291 |
370,859 | mbedtls | 643a922c56b77235e88f106fb1b41c1a764cea5f | https://github.com/ARMmbed/mbedtls | https://github.com/ARMmbed/mbedtls/commit/643a922c56b77235e88f106fb1b41c1a764cea5f | Reordered extension fields and added to ChangeLog
Reordered the transmission sequence of TLS extension fields in client hello
and added to ChangeLog. | 0 | static void ssl_write_hostname_ext( ssl_context *ssl,
unsigned char *buf,
size_t *olen )
{
unsigned char *p = buf;
const unsigned char *end = ssl->out_msg + SSL_MAX_CONTENT_LEN;
*olen = 0;
if( ssl->hostname == NULL )
retur... | 135,925,942,712,447,900,000,000,000,000,000,000,000 | ssl_cli.c | 112,359,275,241,440,480,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2015-5291 | Heap-based buffer overflow in PolarSSL 1.x before 1.2.17 and ARM mbed TLS (formerly PolarSSL) 1.3.x before 1.3.14 and 2.x before 2.1.2 allows remote SSL servers to cause a denial of service (client crash) and possibly execute arbitrary code via a long hostname to the server name indication (SNI) extension, which is not... | https://nvd.nist.gov/vuln/detail/CVE-2015-5291 |
205,732 | libexpat | 3f0a0cb644438d4d8e3294cd0b1245d0edb0c6c6 | https://github.com/libexpat/libexpat | https://github.com/libexpat/libexpat/commit/3f0a0cb644438d4d8e3294cd0b1245d0edb0c6c6 | lib: Add missing validation of encoding (CVE-2022-25235) | 1 | PREFIX(prologTok)(const ENCODING *enc, const char *ptr, const char *end,
const char **nextTokPtr) {
int tok;
if (ptr >= end)
return XML_TOK_NONE;
if (MINBPC(enc) > 1) {
size_t n = end - ptr;
if (n & (MINBPC(enc) - 1)) {
n &= ~(MINBPC(enc) - 1);
if (n == 0)
return ... | 18,493,494,431,546,257,000,000,000,000,000,000,000 | xmltok_impl.c | 138,319,039,341,825,340,000,000,000,000,000,000,000 | [
"CWE-116"
] | CVE-2022-25235 | xmltok_impl.c in Expat (aka libexpat) before 2.4.5 lacks certain validation of encoding, such as checks for whether a UTF-8 character is valid in a certain context. | https://nvd.nist.gov/vuln/detail/CVE-2022-25235 |
371,141 | libexpat | 3f0a0cb644438d4d8e3294cd0b1245d0edb0c6c6 | https://github.com/libexpat/libexpat | https://github.com/libexpat/libexpat/commit/3f0a0cb644438d4d8e3294cd0b1245d0edb0c6c6 | lib: Add missing validation of encoding (CVE-2022-25235) | 0 | PREFIX(prologTok)(const ENCODING *enc, const char *ptr, const char *end,
const char **nextTokPtr) {
int tok;
if (ptr >= end)
return XML_TOK_NONE;
if (MINBPC(enc) > 1) {
size_t n = end - ptr;
if (n & (MINBPC(enc) - 1)) {
n &= ~(MINBPC(enc) - 1);
if (n == 0)
return ... | 124,220,015,058,529,200,000,000,000,000,000,000,000 | xmltok_impl.c | 107,477,034,938,119,300,000,000,000,000,000,000,000 | [
"CWE-116"
] | CVE-2022-25235 | xmltok_impl.c in Expat (aka libexpat) before 2.4.5 lacks certain validation of encoding, such as checks for whether a UTF-8 character is valid in a certain context. | https://nvd.nist.gov/vuln/detail/CVE-2022-25235 |
205,735 | qemu | 77b0359bf414ad666d1714dc9888f1017c08e283 | https://github.com/bonzini/qemu | https://github.com/qemu/qemu/commit/77b0359bf414ad666d1714dc9888f1017c08e283 | input: Decrement queue count on kbd delay
Delays in the input layer are special cased input events. Every input
event is accounted for in a global intput queue count. The special cased
delays however did not get removed from the queue, leading to queue overruns
and thus silent key drops after typing quite a few charac... | 1 | static void qemu_input_queue_process(void *opaque)
{
struct QemuInputEventQueueHead *queue = opaque;
QemuInputEventQueue *item;
g_assert(!QTAILQ_EMPTY(queue));
item = QTAILQ_FIRST(queue);
g_assert(item->type == QEMU_INPUT_QUEUE_DELAY);
QTAILQ_REMOVE(queue, item, node);
g_free(item);
wh... | 168,340,287,414,832,280,000,000,000,000,000,000,000 | None | null | [
"CWE-772"
] | CVE-2017-8379 | Memory leak in the keyboard input event handlers support in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption) by rapidly generating large keyboard events. | https://nvd.nist.gov/vuln/detail/CVE-2017-8379 |
371,201 | qemu | 77b0359bf414ad666d1714dc9888f1017c08e283 | https://github.com/bonzini/qemu | https://github.com/qemu/qemu/commit/77b0359bf414ad666d1714dc9888f1017c08e283 | input: Decrement queue count on kbd delay
Delays in the input layer are special cased input events. Every input
event is accounted for in a global intput queue count. The special cased
delays however did not get removed from the queue, leading to queue overruns
and thus silent key drops after typing quite a few charac... | 0 | static void qemu_input_queue_process(void *opaque)
{
struct QemuInputEventQueueHead *queue = opaque;
QemuInputEventQueue *item;
g_assert(!QTAILQ_EMPTY(queue));
item = QTAILQ_FIRST(queue);
g_assert(item->type == QEMU_INPUT_QUEUE_DELAY);
QTAILQ_REMOVE(queue, item, node);
queue_count--;
g_... | 140,166,488,061,776,510,000,000,000,000,000,000,000 | None | null | [
"CWE-772"
] | CVE-2017-8379 | Memory leak in the keyboard input event handlers support in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption) by rapidly generating large keyboard events. | https://nvd.nist.gov/vuln/detail/CVE-2017-8379 |
205,756 | linux | 485b06aadb933190f4bc44e006076bc27a23f205 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/485b06aadb933190f4bc44e006076bc27a23f205 | media: stv06xx: add missing descriptor sanity checks
Make sure to check that we have two alternate settings and at least one
endpoint before accessing the second altsetting structure and
dereferencing the endpoint arrays.
This specifically avoids dereferencing NULL-pointers or corrupting
memory when a device does not... | 1 | static int pb0100_start(struct sd *sd)
{
int err, packet_size, max_packet_size;
struct usb_host_interface *alt;
struct usb_interface *intf;
struct gspca_dev *gspca_dev = (struct gspca_dev *)sd;
struct cam *cam = &sd->gspca_dev.cam;
u32 mode = cam->cam_mode[sd->gspca_dev.curr_mode].priv;
intf = usb_ifnum_to_if(s... | 150,795,496,222,617,270,000,000,000,000,000,000,000 | stv06xx_pb0100.c | 202,042,886,361,293,180,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2020-11609 | An issue was discovered in the stv06xx subsystem in the Linux kernel before 5.6.1. drivers/media/usb/gspca/stv06xx/stv06xx.c and drivers/media/usb/gspca/stv06xx/stv06xx_pb0100.c mishandle invalid descriptors, as demonstrated by a NULL pointer dereference, aka CID-485b06aadb93. | https://nvd.nist.gov/vuln/detail/CVE-2020-11609 |
371,474 | linux | 485b06aadb933190f4bc44e006076bc27a23f205 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/485b06aadb933190f4bc44e006076bc27a23f205 | media: stv06xx: add missing descriptor sanity checks
Make sure to check that we have two alternate settings and at least one
endpoint before accessing the second altsetting structure and
dereferencing the endpoint arrays.
This specifically avoids dereferencing NULL-pointers or corrupting
memory when a device does not... | 0 | static int pb0100_start(struct sd *sd)
{
int err, packet_size, max_packet_size;
struct usb_host_interface *alt;
struct usb_interface *intf;
struct gspca_dev *gspca_dev = (struct gspca_dev *)sd;
struct cam *cam = &sd->gspca_dev.cam;
u32 mode = cam->cam_mode[sd->gspca_dev.curr_mode].priv;
intf = usb_ifnum_to_if(s... | 301,326,601,272,390,800,000,000,000,000,000,000,000 | stv06xx_pb0100.c | 164,711,029,379,843,640,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2020-11609 | An issue was discovered in the stv06xx subsystem in the Linux kernel before 5.6.1. drivers/media/usb/gspca/stv06xx/stv06xx.c and drivers/media/usb/gspca/stv06xx/stv06xx_pb0100.c mishandle invalid descriptors, as demonstrated by a NULL pointer dereference, aka CID-485b06aadb93. | https://nvd.nist.gov/vuln/detail/CVE-2020-11609 |
205,770 | linux-fbdev | bd771cf5c4254511cc4abb88f3dab3bd58bdf8e8 | https://git.kernel.org/pub/scm/linux/kernel/git/deller/linux-fbdev | https://git.kernel.org/pub/scm/linux/kernel/git/deller/linux-fbdev.git/commit/?h=for-next&id=bd771cf5c4254511cc4abb88f3dab3bd58bdf8e8 | video: fbdev: sm712fb: Fix crash in smtcfb_read()
Zheyu Ma reported this crash in the sm712fb driver when reading
three bytes from the framebuffer:
BUG: unable to handle page fault for address: ffffc90001ffffff
RIP: 0010:smtcfb_read+0x230/0x3e0
Call Trace:
vfs_read+0x198/0xa00
? do_sys_openat2+0x27d/0x350
? ... | 1 | static ssize_t smtcfb_read(struct fb_info *info, char __user *buf,
size_t count, loff_t *ppos)
{
unsigned long p = *ppos;
u32 *buffer, *dst;
u32 __iomem *src;
int c, i, cnt = 0, err = 0;
unsigned long total_size;
if (!info || !info->screen_base)
return -ENODEV;
if (info->state != FBINFO_STATE_RUNNING)... | 66,882,317,764,989,000,000,000,000,000,000,000,000 | sm712fb.c | 88,651,160,848,927,150,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2022-2380 | The Linux kernel was found vulnerable out of bounds memory access in the drivers/video/fbdev/sm712fb.c:smtcfb_read() function. The vulnerability could result in local attackers being able to crash the kernel. | https://nvd.nist.gov/vuln/detail/CVE-2022-2380 |
371,623 | linux-fbdev | bd771cf5c4254511cc4abb88f3dab3bd58bdf8e8 | https://git.kernel.org/pub/scm/linux/kernel/git/deller/linux-fbdev | https://git.kernel.org/pub/scm/linux/kernel/git/deller/linux-fbdev.git/commit/?h=for-next&id=bd771cf5c4254511cc4abb88f3dab3bd58bdf8e8 | video: fbdev: sm712fb: Fix crash in smtcfb_read()
Zheyu Ma reported this crash in the sm712fb driver when reading
three bytes from the framebuffer:
BUG: unable to handle page fault for address: ffffc90001ffffff
RIP: 0010:smtcfb_read+0x230/0x3e0
Call Trace:
vfs_read+0x198/0xa00
? do_sys_openat2+0x27d/0x350
? ... | 0 | static ssize_t smtcfb_write(struct fb_info *info, const char __user *buf,
size_t count, loff_t *ppos)
{
unsigned long p = *ppos;
u32 *buffer, *src;
u32 __iomem *dst;
int c, i, cnt = 0, err = 0;
unsigned long total_size;
if (!info || !info->screen_base)
return -ENODEV;
if (info->state != FBINFO_STATE_... | 103,805,716,200,748,250,000,000,000,000,000,000,000 | sm712fb.c | 273,746,424,427,478,970,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2022-2380 | The Linux kernel was found vulnerable out of bounds memory access in the drivers/video/fbdev/sm712fb.c:smtcfb_read() function. The vulnerability could result in local attackers being able to crash the kernel. | https://nvd.nist.gov/vuln/detail/CVE-2022-2380 |
205,771 | aircrack-ng | ff70494dd389ba570dbdbf36f217c28d4381c6b5 | https://github.com/aircrack-ng/aircrack-ng | https://github.com/aircrack-ng/aircrack-ng/commit/ff70494dd389ba570dbdbf36f217c28d4381c6b5 | Airodump-ng: Fixed GPS stack overflow (Closes #13 on GitHub).
git-svn-id: http://svn.aircrack-ng.org/trunk@2416 28c6078b-6c39-48e3-add9-af49d547ecab | 1 | void gps_tracker( void )
{
ssize_t unused;
int gpsd_sock;
char line[256], *temp;
struct sockaddr_in gpsd_addr;
int ret, is_json, pos;
fd_set read_fd;
struct timeval timeout;
/* attempt to connect to localhost, port 2947 */
pos = 0;
gpsd_sock = socket( AF_INET, SOCK_STREAM, 0 );
... | 202,218,397,048,294,560,000,000,000,000,000,000,000 | airodump-ng.c | 148,844,354,557,171,630,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2014-8321 | Stack-based buffer overflow in the gps_tracker function in airodump-ng.c in Aircrack-ng before 1.2 RC 1 allows local users to execute arbitrary code or gain privileges via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2014-8321 |
371,640 | aircrack-ng | ff70494dd389ba570dbdbf36f217c28d4381c6b5 | https://github.com/aircrack-ng/aircrack-ng | https://github.com/aircrack-ng/aircrack-ng/commit/ff70494dd389ba570dbdbf36f217c28d4381c6b5 | Airodump-ng: Fixed GPS stack overflow (Closes #13 on GitHub).
git-svn-id: http://svn.aircrack-ng.org/trunk@2416 28c6078b-6c39-48e3-add9-af49d547ecab | 0 | void gps_tracker( void )
{
ssize_t unused;
int gpsd_sock;
char line[256], *temp;
struct sockaddr_in gpsd_addr;
int ret, is_json, pos;
fd_set read_fd;
struct timeval timeout;
/* attempt to connect to localhost, port 2947 */
pos = 0;
gpsd_sock = socket( AF_INET, SOCK_STREAM, 0 );
... | 56,337,054,937,595,550,000,000,000,000,000,000,000 | airodump-ng.c | 318,594,833,329,693,900,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2014-8321 | Stack-based buffer overflow in the gps_tracker function in airodump-ng.c in Aircrack-ng before 1.2 RC 1 allows local users to execute arbitrary code or gain privileges via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2014-8321 |
205,772 | mysql-server | dc45e408250c582eb532417a42cef5b5a8e2fe77 | https://github.com/mysql/mysql-server | https://github.com/mysql/mysql-server/commit/dc45e408250c582eb532417a42cef5b5a8e2fe77 | Bug#20642505: HENRY SPENCER REGULAR EXPRESSIONS (REGEX) LIBRARY
The MySQL server uses Henry Spencer's library for regular
expressions to support the REGEXP/RLIKE string operator.
This changeset adapts a recent fix from the upstream for
better 32-bit compatiblity. (Note that we cannot simply use
the current upstream ve... | 1 | my_regcomp(preg, pattern, cflags, charset)
my_regex_t *preg;
const char *pattern;
int cflags;
CHARSET_INFO *charset;
{
struct parse pa;
register struct re_guts *g;
register struct parse *p = &pa;
register int i;
register size_t len;
#ifdef REDEBUG
# define GOODFLAGS(f) (f)
#else
# define GOODFLAGS(f) ((f)&~REG_DUM... | 271,342,147,658,101,700,000,000,000,000,000,000,000 | regcomp.c | 318,404,059,138,246,400,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2015-2305 | Integer overflow in the regcomp implementation in the Henry Spencer BSD regex library (aka rxspencer) alpha3.8.g5 on 32-bit platforms, as used in NetBSD through 6.1.5 and other products, might allow context-dependent attackers to execute arbitrary code via a large regular expression that leads to a heap-based buffer ov... | https://nvd.nist.gov/vuln/detail/CVE-2015-2305 |
371,724 | mysql-server | dc45e408250c582eb532417a42cef5b5a8e2fe77 | https://github.com/mysql/mysql-server | https://github.com/mysql/mysql-server/commit/dc45e408250c582eb532417a42cef5b5a8e2fe77 | Bug#20642505: HENRY SPENCER REGULAR EXPRESSIONS (REGEX) LIBRARY
The MySQL server uses Henry Spencer's library for regular
expressions to support the REGEXP/RLIKE string operator.
This changeset adapts a recent fix from the upstream for
better 32-bit compatiblity. (Note that we cannot simply use
the current upstream ve... | 0 | my_regcomp(preg, pattern, cflags, charset)
my_regex_t *preg;
const char *pattern;
int cflags;
CHARSET_INFO *charset;
{
struct parse pa;
register struct re_guts *g;
register struct parse *p = &pa;
register int i;
register size_t len;
#ifdef REDEBUG
# define GOODFLAGS(f) (f)
#else
# define GOODFLAGS(f) ((f)&~REG_DUM... | 197,743,584,742,845,560,000,000,000,000,000,000,000 | regcomp.c | 154,148,424,015,460,500,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2015-2305 | Integer overflow in the regcomp implementation in the Henry Spencer BSD regex library (aka rxspencer) alpha3.8.g5 on 32-bit platforms, as used in NetBSD through 6.1.5 and other products, might allow context-dependent attackers to execute arbitrary code via a large regular expression that leads to a heap-based buffer ov... | https://nvd.nist.gov/vuln/detail/CVE-2015-2305 |
205,782 | libxml2 | 4629ee02ac649c27f9c0cf98ba017c6b5526070f | https://github.com/GNOME/libxml2 | https://git.gnome.org/browse/libxml2/commit/?id=4629ee02ac649c27f9c0cf98ba017c6b5526070f | Do not fetch external parsed entities
Unless explicietely asked for when validating or replacing entities
with their value. Problem pointed out by Tom Lane <tgl@redhat.com>
* parser.c: do not load external parsed entities unless needed
* test/errors/extparsedent.xml result/errors/extparsedent.xml*:
add a regression... | 1 | xmlParseReference(xmlParserCtxtPtr ctxt) {
xmlEntityPtr ent;
xmlChar *val;
int was_checked;
xmlNodePtr list = NULL;
xmlParserErrors ret = XML_ERR_OK;
if (RAW != '&')
return;
/*
* Simple case of a CharRef
*/
if (NXT(1) == '#') {
int i = 0;
xmlChar out[10];
int hex ... | 240,390,038,512,365,000,000,000,000,000,000,000,000 | parser.c | 259,800,609,760,836,770,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2013-0339 | libxml2 through 2.9.1 does not properly handle external entities expansion unless an application developer uses the xmlSAX2ResolveEntity or xmlSetExternalEntityLoader function, which allows remote attackers to cause a denial of service (resource consumption), send HTTP requests to intranet servers, or read arbitrary fi... | https://nvd.nist.gov/vuln/detail/CVE-2013-0339 |
371,838 | libxml2 | 4629ee02ac649c27f9c0cf98ba017c6b5526070f | https://github.com/GNOME/libxml2 | https://git.gnome.org/browse/libxml2/commit/?id=4629ee02ac649c27f9c0cf98ba017c6b5526070f | Do not fetch external parsed entities
Unless explicietely asked for when validating or replacing entities
with their value. Problem pointed out by Tom Lane <tgl@redhat.com>
* parser.c: do not load external parsed entities unless needed
* test/errors/extparsedent.xml result/errors/extparsedent.xml*:
add a regression... | 0 | xmlParseReference(xmlParserCtxtPtr ctxt) {
xmlEntityPtr ent;
xmlChar *val;
int was_checked;
xmlNodePtr list = NULL;
xmlParserErrors ret = XML_ERR_OK;
if (RAW != '&')
return;
/*
* Simple case of a CharRef
*/
if (NXT(1) == '#') {
int i = 0;
xmlChar out[10];
int hex ... | 36,731,711,250,445,860,000,000,000,000,000,000,000 | parser.c | 23,683,751,492,208,870,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2013-0339 | libxml2 through 2.9.1 does not properly handle external entities expansion unless an application developer uses the xmlSAX2ResolveEntity or xmlSetExternalEntityLoader function, which allows remote attackers to cause a denial of service (resource consumption), send HTTP requests to intranet servers, or read arbitrary fi... | https://nvd.nist.gov/vuln/detail/CVE-2013-0339 |
205,783 | libplist | 7a28a14cf6ed547dfd2e52a4db17f47242bfdef9 | https://github.com/libimobiledevice/libplist | https://github.com/libimobiledevice/libplist/commit/7a28a14cf6ed547dfd2e52a4db17f47242bfdef9 | bplist: Disallow key nodes with non-string node types
As reported in #86, the binary plist parser would force the type of the
key node to be of type PLIST_KEY while the node might be of a different
i.e. non-string type. A following plist_free() might then call free() on
an invalid pointer; e.g. if the node is of type ... | 1 | static plist_t parse_dict_node(struct bplist_data *bplist, const char** bnode, uint64_t size)
{
uint64_t j;
uint64_t str_i = 0, str_j = 0;
uint64_t index1, index2;
plist_data_t data = plist_new_plist_data();
const char *const end_data = bplist->data + bplist->size;
const char *index1_ptr = NULL;... | 164,011,794,496,726,670,000,000,000,000,000,000,000 | None | null | [
"CWE-415"
] | CVE-2017-5836 | The plist_free_data function in plist.c in libplist allows attackers to cause a denial of service (crash) via vectors involving an integer node that is treated as a PLIST_KEY and then triggers an invalid free. | https://nvd.nist.gov/vuln/detail/CVE-2017-5836 |
371,851 | libplist | 7a28a14cf6ed547dfd2e52a4db17f47242bfdef9 | https://github.com/libimobiledevice/libplist | https://github.com/libimobiledevice/libplist/commit/7a28a14cf6ed547dfd2e52a4db17f47242bfdef9 | bplist: Disallow key nodes with non-string node types
As reported in #86, the binary plist parser would force the type of the
key node to be of type PLIST_KEY while the node might be of a different
i.e. non-string type. A following plist_free() might then call free() on
an invalid pointer; e.g. if the node is of type ... | 0 | static plist_t parse_dict_node(struct bplist_data *bplist, const char** bnode, uint64_t size)
{
uint64_t j;
uint64_t str_i = 0, str_j = 0;
uint64_t index1, index2;
plist_data_t data = plist_new_plist_data();
const char *const end_data = bplist->data + bplist->size;
const char *index1_ptr = NULL;... | 237,570,615,585,492,250,000,000,000,000,000,000,000 | bplist.c | 15,292,418,469,471,425,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2017-5836 | The plist_free_data function in plist.c in libplist allows attackers to cause a denial of service (crash) via vectors involving an integer node that is treated as a PLIST_KEY and then triggers an invalid free. | https://nvd.nist.gov/vuln/detail/CVE-2017-5836 |
205,784 | ImageMagick | e9728345edd0141b4724e54832103055a94708b8 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/e9728345edd0141b4724e54832103055a94708b8 | https://github.com/ImageMagick/ImageMagick/issues/509 | 1 | static Image *ReadDPXImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
char
magick[4],
value[MagickPathExtent];
DPXInfo
dpx;
Image
*image;
MagickBooleanType
status;
MagickOffsetType
offset;
QuantumInfo
*quantum_info;
QuantumType
quantum_type;
register s... | 70,562,180,336,686,310,000,000,000,000,000,000,000 | dpx.c | 166,138,892,625,401,060,000,000,000,000,000,000,000 | [
"CWE-834"
] | CVE-2017-11188 | The ReadDPXImage function in coders\dpx.c in ImageMagick 7.0.6-0 has a large loop vulnerability that can cause CPU exhaustion via a crafted DPX file, related to lack of an EOF check. | https://nvd.nist.gov/vuln/detail/CVE-2017-11188 |
371,871 | ImageMagick | e9728345edd0141b4724e54832103055a94708b8 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/e9728345edd0141b4724e54832103055a94708b8 | https://github.com/ImageMagick/ImageMagick/issues/509 | 0 | static Image *ReadDPXImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
char
magick[4],
value[MagickPathExtent];
DPXInfo
dpx;
Image
*image;
MagickBooleanType
status;
MagickOffsetType
offset;
QuantumInfo
*quantum_info;
QuantumType
quantum_type;
register s... | 49,856,530,793,388,080,000,000,000,000,000,000,000 | dpx.c | 35,802,824,020,011,360,000,000,000,000,000,000,000 | [
"CWE-834"
] | CVE-2017-11188 | The ReadDPXImage function in coders\dpx.c in ImageMagick 7.0.6-0 has a large loop vulnerability that can cause CPU exhaustion via a crafted DPX file, related to lack of an EOF check. | https://nvd.nist.gov/vuln/detail/CVE-2017-11188 |
205,787 | haproxy | a01f45e3ced23c799f6e78b5efdbd32198a75354 | https://github.com/haproxy/haproxy | http://git.haproxy.org/?p=haproxy.git;a=commitdiff;h=a01f45e3ced23c799f6e78b5efdbd32198a75354 | BUG/CRITICAL: mux-h2: re-check the frame length when PRIORITY is used
Tim Düsterhus reported a possible crash in the H2 HEADERS frame decoder
when the PRIORITY flag is present. A check is missing to ensure the 5
extra bytes needed with this flag are actually part of the frame. As per
RFC7540#4.2, let's return a connec... | 1 | static int h2c_decode_headers(struct h2c *h2c, struct buffer *rxbuf, uint32_t *flags)
{
const uint8_t *hdrs = (uint8_t *)b_head(&h2c->dbuf);
struct buffer *tmp = get_trash_chunk();
struct http_hdr list[MAX_HTTP_HDR * 2];
struct buffer *copy = NULL;
unsigned int msgf;
struct htx *htx = NULL;
int flen; // header f... | 327,250,099,630,889,140,000,000,000,000,000,000,000 | mux_h2.c | 237,536,526,050,336,650,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-20615 | An out-of-bounds read issue was discovered in the HTTP/2 protocol decoder in HAProxy 1.8.x and 1.9.x through 1.9.0 which can result in a crash. The processing of the PRIORITY flag in a HEADERS frame requires 5 extra bytes, and while these bytes are skipped, the total frame length was not re-checked to make sure they we... | https://nvd.nist.gov/vuln/detail/CVE-2018-20615 |
372,002 | haproxy | a01f45e3ced23c799f6e78b5efdbd32198a75354 | https://github.com/haproxy/haproxy | http://git.haproxy.org/?p=haproxy.git;a=commitdiff;h=a01f45e3ced23c799f6e78b5efdbd32198a75354 | BUG/CRITICAL: mux-h2: re-check the frame length when PRIORITY is used
Tim Düsterhus reported a possible crash in the H2 HEADERS frame decoder
when the PRIORITY flag is present. A check is missing to ensure the 5
extra bytes needed with this flag are actually part of the frame. As per
RFC7540#4.2, let's return a connec... | 0 | static int h2c_decode_headers(struct h2c *h2c, struct buffer *rxbuf, uint32_t *flags)
{
const uint8_t *hdrs = (uint8_t *)b_head(&h2c->dbuf);
struct buffer *tmp = get_trash_chunk();
struct http_hdr list[MAX_HTTP_HDR * 2];
struct buffer *copy = NULL;
unsigned int msgf;
struct htx *htx = NULL;
int flen; // header f... | 1,660,705,741,839,502,500,000,000,000,000,000,000 | mux_h2.c | 319,723,784,690,050,500,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-20615 | An out-of-bounds read issue was discovered in the HTTP/2 protocol decoder in HAProxy 1.8.x and 1.9.x through 1.9.0 which can result in a crash. The processing of the PRIORITY flag in a HEADERS frame requires 5 extra bytes, and while these bytes are skipped, the total frame length was not re-checked to make sure they we... | https://nvd.nist.gov/vuln/detail/CVE-2018-20615 |
205,788 | libtasn1 | f435825c0f527a8e52e6ffbc3ad0bc60531d537e | http://git.savannah.gnu.org/cgit/libtasn1 | http://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=f435825c0f527a8e52e6ffbc3ad0bc60531d537e | _asn1_extract_der_octet: catch invalid input cases early
That is, check the calculated lengths for validity prior
to entering a loop. This avoids an infinite recursion.
Reported by Pascal Cuoq. | 1 | _asn1_extract_der_octet (asn1_node node, const unsigned char *der,
int der_len, unsigned flags)
{
int len2, len3;
int counter, counter_end;
int result;
len2 = asn1_get_length_der (der, der_len, &len3);
if (len2 < -1)
return ASN1_DER_ERROR;
counter = len3 + 1;
DECR_LEN(der_len, len3);
if (len2... | 83,992,070,643,386,045,000,000,000,000,000,000,000 | decoding.c | 146,736,947,356,669,930,000,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2016-4008 | The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.8, when used without the ASN1_DECODE_FLAG_STRICT_DER flag, allows remote attackers to cause a denial of service (infinite recursion) via a crafted certificate. | https://nvd.nist.gov/vuln/detail/CVE-2016-4008 |
372,089 | libtasn1 | f435825c0f527a8e52e6ffbc3ad0bc60531d537e | http://git.savannah.gnu.org/cgit/libtasn1 | http://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=f435825c0f527a8e52e6ffbc3ad0bc60531d537e | _asn1_extract_der_octet: catch invalid input cases early
That is, check the calculated lengths for validity prior
to entering a loop. This avoids an infinite recursion.
Reported by Pascal Cuoq. | 0 | _asn1_extract_der_octet (asn1_node node, const unsigned char *der,
int der_len, unsigned flags)
{
int len2, len3;
int counter, counter_end;
int result;
len2 = asn1_get_length_der (der, der_len, &len3);
if (len2 < -1)
return ASN1_DER_ERROR;
counter = len3 + 1;
DECR_LEN(der_len, len3);
if (len2... | 230,663,008,454,676,900,000,000,000,000,000,000,000 | decoding.c | 642,843,291,608,800,100,000,000,000,000,000,000 | [
"CWE-399"
] | CVE-2016-4008 | The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.8, when used without the ASN1_DECODE_FLAG_STRICT_DER flag, allows remote attackers to cause a denial of service (infinite recursion) via a crafted certificate. | https://nvd.nist.gov/vuln/detail/CVE-2016-4008 |
205,793 | gst-plugins-base | f672277509705c4034bc92a141eefee4524d15aa | https://github.com/GStreamer/gst-plugins-base | https://gitlab.freedesktop.org/gstreamer/gst-plugins-base/commit/f672277509705c4034bc92a141eefee4524d15aa?merge_request_iid=157 | gstrtspconnection: Security loophole making heap overflow
The former code allowed an attacker to create a heap overflow by
sending a longer than allowed session id in a response and including a
semicolon to change the maximum length. With this change, the parser
will never go beyond 512 bytes. | 1 | build_next (GstRTSPBuilder * builder, GstRTSPMessage * message,
GstRTSPConnection * conn, gboolean block)
{
GstRTSPResult res;
while (TRUE) {
switch (builder->state) {
case STATE_START:
{
guint8 c;
builder->offset = 0;
res =
read_bytes (conn, (guint8 *) buil... | 234,955,413,236,648,160,000,000,000,000,000,000,000 | gstrtspconnection.c | 303,684,532,489,066,180,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2019-9928 | GStreamer before 1.16.0 has a heap-based buffer overflow in the RTSP connection parser via a crafted response from a server, potentially allowing remote code execution. | https://nvd.nist.gov/vuln/detail/CVE-2019-9928 |
372,189 | gst-plugins-base | f672277509705c4034bc92a141eefee4524d15aa | https://github.com/GStreamer/gst-plugins-base | https://gitlab.freedesktop.org/gstreamer/gst-plugins-base/commit/f672277509705c4034bc92a141eefee4524d15aa?merge_request_iid=157 | gstrtspconnection: Security loophole making heap overflow
The former code allowed an attacker to create a heap overflow by
sending a longer than allowed session id in a response and including a
semicolon to change the maximum length. With this change, the parser
will never go beyond 512 bytes. | 0 | build_next (GstRTSPBuilder * builder, GstRTSPMessage * message,
GstRTSPConnection * conn, gboolean block)
{
GstRTSPResult res;
while (TRUE) {
switch (builder->state) {
case STATE_START:
{
guint8 c;
builder->offset = 0;
res =
read_bytes (conn, (guint8 *) buil... | 153,314,748,993,132,750,000,000,000,000,000,000,000 | gstrtspconnection.c | 200,777,985,231,255,560,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2019-9928 | GStreamer before 1.16.0 has a heap-based buffer overflow in the RTSP connection parser via a crafted response from a server, potentially allowing remote code execution. | https://nvd.nist.gov/vuln/detail/CVE-2019-9928 |
205,798 | sudo | fa8ffeb17523494f0e8bb49a25e53635f4509078 | https://github.com/sudo-project/sudo | https://github.com/sudo-project/sudo/commit/fa8ffeb17523494f0e8bb49a25e53635f4509078 | Fix a buffer overflow when pwfeedback is enabled and input is a not a tty.
In getln() if the user enters ^U (erase line) and the write(2) fails,
the remaining buffer size is reset but the current pointer is not.
While here, fix an incorrect break for erase when write(2) fails.
Also disable pwfeedback when input is not ... | 1 | getln(int fd, char *buf, size_t bufsiz, int feedback,
enum tgetpass_errval *errval)
{
size_t left = bufsiz;
ssize_t nr = -1;
char *cp = buf;
char c = '\0';
debug_decl(getln, SUDO_DEBUG_CONV);
*errval = TGP_ERRVAL_NOERROR;
if (left == 0) {
*errval = TGP_ERRVAL_READERROR;
errno = EINVA... | 298,906,421,827,537,300,000,000,000,000,000,000,000 | tgetpass.c | 91,079,444,981,528,370,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2019-18634 | In Sudo before 1.8.26, if pwfeedback is enabled in /etc/sudoers, users can trigger a stack-based buffer overflow in the privileged sudo process. (pwfeedback is a default setting in Linux Mint and elementary OS; however, it is NOT the default for upstream and many other packages, and would exist only if enabled by an ad... | https://nvd.nist.gov/vuln/detail/CVE-2019-18634 |
372,244 | sudo | fa8ffeb17523494f0e8bb49a25e53635f4509078 | https://github.com/sudo-project/sudo | https://github.com/sudo-project/sudo/commit/fa8ffeb17523494f0e8bb49a25e53635f4509078 | Fix a buffer overflow when pwfeedback is enabled and input is a not a tty.
In getln() if the user enters ^U (erase line) and the write(2) fails,
the remaining buffer size is reset but the current pointer is not.
While here, fix an incorrect break for erase when write(2) fails.
Also disable pwfeedback when input is not ... | 0 | getln(int fd, char *buf, size_t bufsiz, bool feedback,
enum tgetpass_errval *errval)
{
size_t left = bufsiz;
ssize_t nr = -1;
char *cp = buf;
char c = '\0';
debug_decl(getln, SUDO_DEBUG_CONV);
*errval = TGP_ERRVAL_NOERROR;
if (left == 0) {
*errval = TGP_ERRVAL_READERROR;
errno = EINV... | 245,069,222,954,781,500,000,000,000,000,000,000,000 | tgetpass.c | 311,494,711,987,599,600,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2019-18634 | In Sudo before 1.8.26, if pwfeedback is enabled in /etc/sudoers, users can trigger a stack-based buffer overflow in the privileged sudo process. (pwfeedback is a default setting in Linux Mint and elementary OS; however, it is NOT the default for upstream and many other packages, and would exist only if enabled by an ad... | https://nvd.nist.gov/vuln/detail/CVE-2019-18634 |
205,811 | qemu | 5519724a13664b43e225ca05351c60b4468e4555 | https://github.com/bonzini/qemu | https://git.qemu.org/?p=qemu.git;a=commit;h=5519724a13664b43e225ca05351c60b4468e4555 | hw/net/xgmac: Fix buffer overflow in xgmac_enet_send()
A buffer overflow issue was reported by Mr. Ziming Zhang, CC'd here. It
occurs while sending an Ethernet frame due to missing break statements
and improper checking of the buffer size.
Reported-by: Ziming Zhang <ezrakiez@gmail.com>
Signed-off-by: Mauro Matteo Cas... | 1 | static void xgmac_enet_send(XgmacState *s)
{
struct desc bd;
int frame_size;
int len;
uint8_t frame[8192];
uint8_t *ptr;
ptr = frame;
frame_size = 0;
while (1) {
xgmac_read_desc(s, &bd, 0);
if ((bd.ctl_stat & 0x80000000) == 0) {
/* Run out of descriptors to t... | 274,308,486,310,435,840,000,000,000,000,000,000,000 | xgmac.c | 99,663,438,431,288,850,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2020-15863 | hw/net/xgmac.c in the XGMAC Ethernet controller in QEMU before 07-20-2020 has a buffer overflow. This occurs during packet transmission and affects the highbank and midway emulated machines. A guest user or process could use this flaw to crash the QEMU process on the host, resulting in a denial of service or potential ... | https://nvd.nist.gov/vuln/detail/CVE-2020-15863 |
372,394 | qemu | 5519724a13664b43e225ca05351c60b4468e4555 | https://github.com/bonzini/qemu | https://git.qemu.org/?p=qemu.git;a=commit;h=5519724a13664b43e225ca05351c60b4468e4555 | hw/net/xgmac: Fix buffer overflow in xgmac_enet_send()
A buffer overflow issue was reported by Mr. Ziming Zhang, CC'd here. It
occurs while sending an Ethernet frame due to missing break statements
and improper checking of the buffer size.
Reported-by: Ziming Zhang <ezrakiez@gmail.com>
Signed-off-by: Mauro Matteo Cas... | 0 | static void xgmac_enet_send(XgmacState *s)
{
struct desc bd;
int frame_size;
int len;
uint8_t frame[8192];
uint8_t *ptr;
ptr = frame;
frame_size = 0;
while (1) {
xgmac_read_desc(s, &bd, 0);
if ((bd.ctl_stat & 0x80000000) == 0) {
/* Run out of descriptors to t... | 46,896,911,751,921,480,000,000,000,000,000,000,000 | xgmac.c | 325,502,324,424,407,000,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2020-15863 | hw/net/xgmac.c in the XGMAC Ethernet controller in QEMU before 07-20-2020 has a buffer overflow. This occurs during packet transmission and affects the highbank and midway emulated machines. A guest user or process could use this flaw to crash the QEMU process on the host, resulting in a denial of service or potential ... | https://nvd.nist.gov/vuln/detail/CVE-2020-15863 |
205,813 | mod_wsgi | 545354a80b9cc20d8b6916ca30542eab36c3b8bd | https://github.com/GrahamDumpleton/mod_wsgi | https://github.com/GrahamDumpleton/mod_wsgi/commit/545354a80b9cc20d8b6916ca30542eab36c3b8bd | When there is any sort of error in setting up daemon process group, kill the process rather than risk running in an unexpected state. | 1 | static void wsgi_setup_access(WSGIDaemonProcess *daemon)
{
/* Setup the umask for the effective user. */
if (daemon->group->umask != -1)
umask(daemon->group->umask);
/* Change to chroot environment. */
if (daemon->group->root) {
if (chroot(daemon->group->root) == -1) {
ap_... | 167,499,648,619,876,900,000,000,000,000,000,000,000 | mod_wsgi.c | 252,634,260,704,158,170,000,000,000,000,000,000,000 | [
"CWE-254"
] | CVE-2014-8583 | mod_wsgi before 4.2.4 for Apache, when creating a daemon process group, does not properly handle when group privileges cannot be dropped, which might allow attackers to gain privileges via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2014-8583 |
372,432 | mod_wsgi | 545354a80b9cc20d8b6916ca30542eab36c3b8bd | https://github.com/GrahamDumpleton/mod_wsgi | https://github.com/GrahamDumpleton/mod_wsgi/commit/545354a80b9cc20d8b6916ca30542eab36c3b8bd | When there is any sort of error in setting up daemon process group, kill the process rather than risk running in an unexpected state. | 0 | static int wsgi_setup_access(WSGIDaemonProcess *daemon)
{
/* Setup the umask for the effective user. */
if (daemon->group->umask != -1)
umask(daemon->group->umask);
/* Change to chroot environment. */
if (daemon->group->root) {
if (chroot(daemon->group->root) == -1) {
ap_l... | 68,970,984,043,743,250,000,000,000,000,000,000,000 | mod_wsgi.c | 249,655,714,175,357,800,000,000,000,000,000,000,000 | [
"CWE-254"
] | CVE-2014-8583 | mod_wsgi before 4.2.4 for Apache, when creating a daemon process group, does not properly handle when group privileges cannot be dropped, which might allow attackers to gain privileges via unspecified vectors. | https://nvd.nist.gov/vuln/detail/CVE-2014-8583 |
205,822 | mongo | 0a076417d1d7fba3632b73349a1fd29a83e68816 | https://github.com/mongodb/mongo | https://github.com/mongodb/mongo/commit/0a076417d1d7fba3632b73349a1fd29a83e68816 | SERVER-38070 fix infinite loop in agg expression | 1 | Value ExpressionPow::evaluate(const Document& root) const {
Value baseVal = vpOperand[0]->evaluate(root);
Value expVal = vpOperand[1]->evaluate(root);
if (baseVal.nullish() || expVal.nullish())
return Value(BSONNULL);
BSONType baseType = baseVal.getType();
BSONType expType = expVal.getType(... | 218,138,970,405,592,700,000,000,000,000,000,000,000 | expression.cpp | 91,260,312,861,857,760,000,000,000,000,000,000,000 | [
"CWE-835"
] | CVE-2018-20803 | A user authorized to perform database queries may trigger denial of service by issuing specially crafted queries, which loop indefinitely in mathematics processing while retaining locks. This issue affects: MongoDB Inc. MongoDB Server v4.0 versions prior to 4.0.5; v3.6 versions prior to 3.6.10; v3.4 versions prior to 3... | https://nvd.nist.gov/vuln/detail/CVE-2018-20803 |
373,433 | mongo | 0a076417d1d7fba3632b73349a1fd29a83e68816 | https://github.com/mongodb/mongo | https://github.com/mongodb/mongo/commit/0a076417d1d7fba3632b73349a1fd29a83e68816 | SERVER-38070 fix infinite loop in agg expression | 0 | Value ExpressionPow::evaluate(const Document& root) const {
Value baseVal = vpOperand[0]->evaluate(root);
Value expVal = vpOperand[1]->evaluate(root);
if (baseVal.nullish() || expVal.nullish())
return Value(BSONNULL);
BSONType baseType = baseVal.getType();
BSONType expType = expVal.getType(... | 288,510,958,743,947,600,000,000,000,000,000,000,000 | expression.cpp | 120,927,771,818,432,500,000,000,000,000,000,000,000 | [
"CWE-835"
] | CVE-2018-20803 | A user authorized to perform database queries may trigger denial of service by issuing specially crafted queries, which loop indefinitely in mathematics processing while retaining locks. This issue affects: MongoDB Inc. MongoDB Server v4.0 versions prior to 4.0.5; v3.6 versions prior to 3.6.10; v3.4 versions prior to 3... | https://nvd.nist.gov/vuln/detail/CVE-2018-20803 |
205,825 | dpdk | e7debf602633feb26227cdc8cc7fdd1b1b40946a | https://github.com/DPDK/dpdk | https://git.dpdk.org/dpdk/commit/?id=e7debf602633feb26227cdc8cc7fdd1b1b40946a | vhost: fix potential fd leak
Vhost will create temporary file when receiving VHOST_USER_GET_INFLIGHT_FD
message. Malicious guest can send endless this message to drain out the
resource of host.
When receiving VHOST_USER_GET_INFLIGHT_FD message repeatedly, closing the
file created during the last handling of this mess... | 1 | vhost_user_get_inflight_fd(struct virtio_net **pdev,
VhostUserMsg *msg,
int main_fd __rte_unused)
{
struct rte_vhost_inflight_info_packed *inflight_packed;
uint64_t pervq_inflight_size, mmap_size;
uint16_t num_queues, queue_size;
struct virtio_net *dev = *pdev;
int fd, i, j;
void *addr;
if (msg->siz... | 9,937,991,711,344,693,000,000,000,000,000,000,000 | vhost_user.c | 74,743,393,242,077,020,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2020-10726 | A vulnerability was found in DPDK versions 19.11 and above. A malicious container that has direct access to the vhost-user socket can keep sending VHOST_USER_GET_INFLIGHT_FD messages, causing a resource leak (file descriptors and virtual memory), which may result in a denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2020-10726 |
373,555 | dpdk | e7debf602633feb26227cdc8cc7fdd1b1b40946a | https://github.com/DPDK/dpdk | https://git.dpdk.org/dpdk/commit/?id=e7debf602633feb26227cdc8cc7fdd1b1b40946a | vhost: fix potential fd leak
Vhost will create temporary file when receiving VHOST_USER_GET_INFLIGHT_FD
message. Malicious guest can send endless this message to drain out the
resource of host.
When receiving VHOST_USER_GET_INFLIGHT_FD message repeatedly, closing the
file created during the last handling of this mess... | 0 | vhost_user_get_inflight_fd(struct virtio_net **pdev,
VhostUserMsg *msg,
int main_fd __rte_unused)
{
struct rte_vhost_inflight_info_packed *inflight_packed;
uint64_t pervq_inflight_size, mmap_size;
uint16_t num_queues, queue_size;
struct virtio_net *dev = *pdev;
int fd, i, j;
void *addr;
if (msg->siz... | 123,719,389,486,087,480,000,000,000,000,000,000,000 | vhost_user.c | 322,692,183,180,595,140,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2020-10726 | A vulnerability was found in DPDK versions 19.11 and above. A malicious container that has direct access to the vhost-user socket can keep sending VHOST_USER_GET_INFLIGHT_FD messages, causing a resource leak (file descriptors and virtual memory), which may result in a denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2020-10726 |
205,827 | libsolv | 0077ef29eb46d2e1df2f230fc95a1d9748d49dec | https://github.com/openSUSE/libsolv | https://github.com/openSUSE/libsolv/commit/0077ef29eb46d2e1df2f230fc95a1d9748d49dec | testcase_read: error out if repos are added or the system is changed too late
We must not add new solvables after the considered map was created, the solver
was created, or jobs were added. We may not changed the system after jobs have
been added.
(Jobs may point inside the whatproviedes array, so we must not invalid... | 1 | testcase_read(Pool *pool, FILE *fp, const char *testcase, Queue *job, char **resultp, int *resultflagsp)
{
Solver *solv;
char *buf, *bufp;
int bufl;
char *testcasedir, *s;
int l;
char **pieces = 0;
int npieces = 0;
int prepared = 0;
int closefp = !fp;
int poolflagsreset = 0;
int missing_features =... | 110,818,304,829,644,260,000,000,000,000,000,000,000 | testcase.c | 283,870,309,322,585,280,000,000,000,000,000,000,000 | [
"CWE-120"
] | CVE-2021-3200 | Buffer overflow vulnerability in libsolv 2020-12-13 via the Solver * testcase_read(Pool *pool, FILE *fp, const char *testcase, Queue *job, char **resultp, int *resultflagsp function at src/testcase.c: line 2334, which could cause a denial of service | https://nvd.nist.gov/vuln/detail/CVE-2021-3200 |
373,567 | libsolv | 0077ef29eb46d2e1df2f230fc95a1d9748d49dec | https://github.com/openSUSE/libsolv | https://github.com/openSUSE/libsolv/commit/0077ef29eb46d2e1df2f230fc95a1d9748d49dec | testcase_read: error out if repos are added or the system is changed too late
We must not add new solvables after the considered map was created, the solver
was created, or jobs were added. We may not changed the system after jobs have
been added.
(Jobs may point inside the whatproviedes array, so we must not invalid... | 0 | testcase_read(Pool *pool, FILE *fp, const char *testcase, Queue *job, char **resultp, int *resultflagsp)
{
Solver *solv;
char *buf, *bufp;
int bufl;
char *testcasedir, *s;
int l;
char **pieces = 0;
int npieces = 0;
int prepared = 0;
int closefp = !fp;
int poolflagsreset = 0;
int missing_features =... | 80,059,157,395,528,610,000,000,000,000,000,000,000 | testcase.c | 181,490,925,734,484,600,000,000,000,000,000,000,000 | [
"CWE-120"
] | CVE-2021-3200 | Buffer overflow vulnerability in libsolv 2020-12-13 via the Solver * testcase_read(Pool *pool, FILE *fp, const char *testcase, Queue *job, char **resultp, int *resultflagsp function at src/testcase.c: line 2334, which could cause a denial of service | https://nvd.nist.gov/vuln/detail/CVE-2021-3200 |
205,859 | libsndfile | 6d7ce94c020cc720a6b28719d1a7879181790008 | https://github.com/erikd/libsndfile | https://github.com/erikd/libsndfile/commit/6d7ce94c020cc720a6b28719d1a7879181790008 | wav_write_header: don't read past the array end
If loop_count is bigger than the array, truncate it to the array
length (and not to 32k).
CVE-2019-3832 | 1 | wav_write_header (SF_PRIVATE *psf, int calc_length)
{ sf_count_t current ;
int error, has_data = SF_FALSE ;
current = psf_ftell (psf) ;
if (current > psf->dataoffset)
has_data = SF_TRUE ;
if (calc_length)
{ psf->filelength = psf_get_filelen (psf) ;
psf->datalength = psf->filelength - psf->dataoffset ;
... | 307,030,784,621,943,580,000,000,000,000,000,000,000 | wav.c | 263,462,844,010,598,130,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-3832 | It was discovered the fix for CVE-2018-19758 (libsndfile) was not complete and still allows a read beyond the limits of a buffer in wav_write_header() function in wav.c. A local attacker may use this flaw to make the application crash. | https://nvd.nist.gov/vuln/detail/CVE-2019-3832 |
373,912 | libsndfile | 6d7ce94c020cc720a6b28719d1a7879181790008 | https://github.com/erikd/libsndfile | https://github.com/erikd/libsndfile/commit/6d7ce94c020cc720a6b28719d1a7879181790008 | wav_write_header: don't read past the array end
If loop_count is bigger than the array, truncate it to the array
length (and not to 32k).
CVE-2019-3832 | 0 | wav_write_header (SF_PRIVATE *psf, int calc_length)
{ sf_count_t current ;
int error, has_data = SF_FALSE ;
current = psf_ftell (psf) ;
if (current > psf->dataoffset)
has_data = SF_TRUE ;
if (calc_length)
{ psf->filelength = psf_get_filelen (psf) ;
psf->datalength = psf->filelength - psf->dataoffset ;
... | 317,378,024,173,199,100,000,000,000,000,000,000,000 | wav.c | 150,435,830,079,666,900,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-3832 | It was discovered the fix for CVE-2018-19758 (libsndfile) was not complete and still allows a read beyond the limits of a buffer in wav_write_header() function in wav.c. A local attacker may use this flaw to make the application crash. | https://nvd.nist.gov/vuln/detail/CVE-2019-3832 |
205,867 | git | e1d911dd4c7b76a5a8cec0f5c8de15981e34da83 | https://github.com/git/git | https://git.kernel.org/pub/scm/git/git.git/commit/?id=e1d911dd4c7b76a5a8cec0f5c8de15981e34da83) | mingw: disallow backslash characters in tree objects' file names
The backslash character is not a valid part of a file name on Windows.
Hence it is dangerous to allow writing files that were unpacked from
tree objects, when the stored file name contains a backslash character:
it will be misinterpreted as directory sep... | 1 | static int decode_tree_entry(struct tree_desc *desc, const char *buf, unsigned long size, struct strbuf *err)
{
const char *path;
unsigned int mode, len;
if (size < 23 || buf[size - 21]) {
strbuf_addstr(err, _("too-short tree object"));
return -1;
}
path = get_mode(buf, &mode);
if (!path) {
strbuf_addstr(... | 197,024,350,829,496,530,000,000,000,000,000,000,000 | tree-walk.c | 77,833,037,235,769,770,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2019-1354 | A remote code execution vulnerability exists when Git for Visual Studio improperly sanitizes input, aka 'Git for Visual Studio Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1349, CVE-2019-1350, CVE-2019-1352, CVE-2019-1387. | https://nvd.nist.gov/vuln/detail/CVE-2019-1354 |
373,979 | git | e1d911dd4c7b76a5a8cec0f5c8de15981e34da83 | https://github.com/git/git | https://git.kernel.org/pub/scm/git/git.git/commit/?id=e1d911dd4c7b76a5a8cec0f5c8de15981e34da83) | mingw: disallow backslash characters in tree objects' file names
The backslash character is not a valid part of a file name on Windows.
Hence it is dangerous to allow writing files that were unpacked from
tree objects, when the stored file name contains a backslash character:
it will be misinterpreted as directory sep... | 0 | static int decode_tree_entry(struct tree_desc *desc, const char *buf, unsigned long size, struct strbuf *err)
{
const char *path;
unsigned int mode, len;
if (size < 23 || buf[size - 21]) {
strbuf_addstr(err, _("too-short tree object"));
return -1;
}
path = get_mode(buf, &mode);
if (!path) {
strbuf_addstr(... | 9,656,789,494,072,155,000,000,000,000,000,000,000 | tree-walk.c | 186,396,254,938,891,800,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2019-1354 | A remote code execution vulnerability exists when Git for Visual Studio improperly sanitizes input, aka 'Git for Visual Studio Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1349, CVE-2019-1350, CVE-2019-1352, CVE-2019-1387. | https://nvd.nist.gov/vuln/detail/CVE-2019-1354 |
205,868 | php-src | 1daa4c0090b7cd8178dcaa96287234c69ac6ca18 | https://github.com/php/php-src | http://git.php.net/?p=php-src.git;a=commitdiff;h=1daa4c0090b7cd8178dcaa96287234c69ac6ca18 | Fix bug #67730 - Null byte injection possible with imagexxx functions | 1 | static void _php_image_output_ctx(INTERNAL_FUNCTION_PARAMETERS, int image_type, char *tn, void (*func_p)())
{
zval *imgind;
char *file = NULL;
int file_len = 0;
long quality, basefilter;
gdImagePtr im;
int argc = ZEND_NUM_ARGS();
int q = -1, i;
int f = -1;
gdIOCtx *ctx = NULL;
zval *to_zval = NULL;
php_strea... | 202,240,992,367,983,040,000,000,000,000,000,000,000 | gd_ctx.c | 90,642,184,989,616,730,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2014-5120 | gd_ctx.c in the GD component in PHP 5.4.x before 5.4.32 and 5.5.x before 5.5.16 does not ensure that pathnames lack %00 sequences, which might allow remote attackers to overwrite arbitrary files via crafted input to an application that calls the (1) imagegd, (2) imagegd2, (3) imagegif, (4) imagejpeg, (5) imagepng, (6) ... | https://nvd.nist.gov/vuln/detail/CVE-2014-5120 |
374,001 | php-src | 1daa4c0090b7cd8178dcaa96287234c69ac6ca18 | https://github.com/php/php-src | http://git.php.net/?p=php-src.git;a=commitdiff;h=1daa4c0090b7cd8178dcaa96287234c69ac6ca18 | Fix bug #67730 - Null byte injection possible with imagexxx functions | 0 | static void _php_image_output_ctx(INTERNAL_FUNCTION_PARAMETERS, int image_type, char *tn, void (*func_p)())
{
zval *imgind;
char *file = NULL;
int file_len = 0;
long quality, basefilter;
gdImagePtr im;
int argc = ZEND_NUM_ARGS();
int q = -1, i;
int f = -1;
gdIOCtx *ctx = NULL;
zval *to_zval = NULL;
php_strea... | 330,837,835,703,881,900,000,000,000,000,000,000,000 | gd_ctx.c | 173,775,709,906,657,700,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2014-5120 | gd_ctx.c in the GD component in PHP 5.4.x before 5.4.32 and 5.5.x before 5.5.16 does not ensure that pathnames lack %00 sequences, which might allow remote attackers to overwrite arbitrary files via crafted input to an application that calls the (1) imagegd, (2) imagegd2, (3) imagegif, (4) imagejpeg, (5) imagepng, (6) ... | https://nvd.nist.gov/vuln/detail/CVE-2014-5120 |
205,873 | sqlite | e59c562b3f6894f84c715772c4b116d7b5c01348 | https://github.com/sqlite/sqlite | https://github.com/sqlite/sqlite/commit/e59c562b3f6894f84c715772c4b116d7b5c01348 | Fix a crash that could occur if a sub-select that uses both DISTINCT and window functions also used an ORDER BY that is the same as its select list.
FossilOrigin-Name: bcdd66c1691955c697f3d756c2b035acfe98f6aad72e90b0021bab6e9023b3ba | 1 | int sqlite3Select(
Parse *pParse, /* The parser context */
Select *p, /* The SELECT statement being coded. */
SelectDest *pDest /* What to do with the query results */
){
int i, j; /* Loop counters */
WhereInfo *pWInfo; /* Return from sqlite3WhereBegin() */
Vdbe *v;... | 281,793,309,687,163,280,000,000,000,000,000,000,000 | select.c | 289,917,653,864,511,600,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2019-19244 | sqlite3Select in select.c in SQLite 3.30.1 allows a crash if a sub-select uses both DISTINCT and window functions, and also has certain ORDER BY usage. | https://nvd.nist.gov/vuln/detail/CVE-2019-19244 |
374,069 | sqlite | e59c562b3f6894f84c715772c4b116d7b5c01348 | https://github.com/sqlite/sqlite | https://github.com/sqlite/sqlite/commit/e59c562b3f6894f84c715772c4b116d7b5c01348 | Fix a crash that could occur if a sub-select that uses both DISTINCT and window functions also used an ORDER BY that is the same as its select list.
FossilOrigin-Name: bcdd66c1691955c697f3d756c2b035acfe98f6aad72e90b0021bab6e9023b3ba | 0 | int sqlite3Select(
Parse *pParse, /* The parser context */
Select *p, /* The SELECT statement being coded. */
SelectDest *pDest /* What to do with the query results */
){
int i, j; /* Loop counters */
WhereInfo *pWInfo; /* Return from sqlite3WhereBegin() */
Vdbe *v;... | 94,835,362,524,234,910,000,000,000,000,000,000,000 | select.c | 42,625,367,024,214,725,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2019-19244 | sqlite3Select in select.c in SQLite 3.30.1 allows a crash if a sub-select uses both DISTINCT and window functions, and also has certain ORDER BY usage. | https://nvd.nist.gov/vuln/detail/CVE-2019-19244 |
205,904 | linux | f4020438fab05364018c91f7e02ebdd192085933 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f4020438fab05364018c91f7e02ebdd192085933 | xfs: fix boundary test in xfs_attr_shortform_verify
The boundary test for the fixed-offset parts of xfs_attr_sf_entry in
xfs_attr_shortform_verify is off by one, because the variable array
at the end is defined as nameval[1] not nameval[].
Hence we need to subtract 1 from the calculation.
This can be shown by:
# tou... | 1 | xfs_attr_shortform_verify(
struct xfs_inode *ip)
{
struct xfs_attr_shortform *sfp;
struct xfs_attr_sf_entry *sfep;
struct xfs_attr_sf_entry *next_sfep;
char *endp;
struct xfs_ifork *ifp;
int i;
int64_t size;
ASSERT(ip->i_afp->if_format == XFS_DINODE_FMT_LOCAL);
ifp = XFS_IFORK_PTR(ip, XFS_ATTR_FOR... | 261,778,295,806,627,580,000,000,000,000,000,000,000 | xfs_attr_leaf.c | 229,947,142,831,447,800,000,000,000,000,000,000,000 | [
"CWE-131"
] | CVE-2020-14385 | A flaw was found in the Linux kernel before 5.9-rc4. A failure of the file system metadata validator in XFS can cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt. This can lead to the filesystem being shutdown, or otherwise rendered inaccessible until it is remounted, leading to a ... | https://nvd.nist.gov/vuln/detail/CVE-2020-14385 |
374,781 | linux | f4020438fab05364018c91f7e02ebdd192085933 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f4020438fab05364018c91f7e02ebdd192085933 | xfs: fix boundary test in xfs_attr_shortform_verify
The boundary test for the fixed-offset parts of xfs_attr_sf_entry in
xfs_attr_shortform_verify is off by one, because the variable array
at the end is defined as nameval[1] not nameval[].
Hence we need to subtract 1 from the calculation.
This can be shown by:
# tou... | 0 | xfs_attr_shortform_verify(
struct xfs_inode *ip)
{
struct xfs_attr_shortform *sfp;
struct xfs_attr_sf_entry *sfep;
struct xfs_attr_sf_entry *next_sfep;
char *endp;
struct xfs_ifork *ifp;
int i;
int64_t size;
ASSERT(ip->i_afp->if_format == XFS_DINODE_FMT_LOCAL);
ifp = XFS_IFORK_PTR(ip, XFS_ATTR_FOR... | 163,883,788,507,495,350,000,000,000,000,000,000,000 | xfs_attr_leaf.c | 250,859,355,885,981,360,000,000,000,000,000,000,000 | [
"CWE-131"
] | CVE-2020-14385 | A flaw was found in the Linux kernel before 5.9-rc4. A failure of the file system metadata validator in XFS can cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt. This can lead to the filesystem being shutdown, or otherwise rendered inaccessible until it is remounted, leading to a ... | https://nvd.nist.gov/vuln/detail/CVE-2020-14385 |
205,951 | libxml2 | e724879d964d774df9b7969fc846605aa1bac54c | https://github.com/GNOME/libxml2 | https://git.gnome.org/browse/libxml2/commit/?id=e724879d964d774df9b7969fc846605aa1bac54c | Fix parsing short unclosed comment uninitialized access
For https://bugzilla.gnome.org/show_bug.cgi?id=746048
The HTML parser was too optimistic when processing comments and
didn't check for the end of the stream on the first 2 characters | 1 | htmlParseComment(htmlParserCtxtPtr ctxt) {
xmlChar *buf = NULL;
int len;
int size = HTML_PARSER_BUFFER_SIZE;
int q, ql;
int r, rl;
int cur, l;
xmlParserInputState state;
/*
* Check that there is a comment right here.
*/
if ((RAW != '<') || (NXT(1) != '!') ||
(NXT(2... | 34,772,845,417,716,600,000,000,000,000,000,000,000 | HTMLparser.c | 9,441,315,323,547,340,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2015-8710 | The htmlParseComment function in HTMLparser.c in libxml2 allows attackers to obtain sensitive information, cause a denial of service (out-of-bounds heap memory access and application crash), or possibly have unspecified other impact via an unclosed HTML comment. | https://nvd.nist.gov/vuln/detail/CVE-2015-8710 |
375,046 | libxml2 | e724879d964d774df9b7969fc846605aa1bac54c | https://github.com/GNOME/libxml2 | https://git.gnome.org/browse/libxml2/commit/?id=e724879d964d774df9b7969fc846605aa1bac54c | Fix parsing short unclosed comment uninitialized access
For https://bugzilla.gnome.org/show_bug.cgi?id=746048
The HTML parser was too optimistic when processing comments and
didn't check for the end of the stream on the first 2 characters | 0 | htmlParseComment(htmlParserCtxtPtr ctxt) {
xmlChar *buf = NULL;
int len;
int size = HTML_PARSER_BUFFER_SIZE;
int q, ql;
int r, rl;
int cur, l;
xmlParserInputState state;
/*
* Check that there is a comment right here.
*/
if ((RAW != '<') || (NXT(1) != '!') ||
(NXT(2... | 142,467,006,327,603,920,000,000,000,000,000,000,000 | HTMLparser.c | 9,346,300,951,361,166,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2015-8710 | The htmlParseComment function in HTMLparser.c in libxml2 allows attackers to obtain sensitive information, cause a denial of service (out-of-bounds heap memory access and application crash), or possibly have unspecified other impact via an unclosed HTML comment. | https://nvd.nist.gov/vuln/detail/CVE-2015-8710 |
205,957 | ImageMagick | f35eca82b0c294ff9d0ccad104a881c3ae2ba913 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/f35eca82b0c294ff9d0ccad104a881c3ae2ba913 | https://github.com/ImageMagick/ImageMagick/issues/1725 | 1 | MagickExport MagickStatusType ParseMetaGeometry(const char *geometry,ssize_t *x,
ssize_t *y,size_t *width,size_t *height)
{
GeometryInfo
geometry_info;
MagickStatusType
flags;
size_t
former_height,
former_width;
/*
Ensure the image geometry is valid.
*/
assert(x != (ssize_t *) NULL)... | 204,539,914,174,226,220,000,000,000,000,000,000,000 | geometry.c | 209,723,012,059,881,570,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2020-27756 | In ParseMetaGeometry() of MagickCore/geometry.c, image height and width calculations can lead to divide-by-zero conditions which also lead to undefined behavior. This flaw can be triggered by a crafted input file processed by ImageMagick and could impact application availability. The patch uses multiplication in additi... | https://nvd.nist.gov/vuln/detail/CVE-2020-27756 |
375,327 | ImageMagick | f35eca82b0c294ff9d0ccad104a881c3ae2ba913 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/f35eca82b0c294ff9d0ccad104a881c3ae2ba913 | https://github.com/ImageMagick/ImageMagick/issues/1725 | 0 | MagickExport MagickStatusType ParseMetaGeometry(const char *geometry,ssize_t *x,
ssize_t *y,size_t *width,size_t *height)
{
GeometryInfo
geometry_info;
MagickStatusType
flags;
size_t
former_height,
former_width;
/*
Ensure the image geometry is valid.
*/
assert(x != (ssize_t *) NULL)... | 297,745,758,699,617,450,000,000,000,000,000,000,000 | geometry.c | 121,769,609,834,337,320,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2020-27756 | In ParseMetaGeometry() of MagickCore/geometry.c, image height and width calculations can lead to divide-by-zero conditions which also lead to undefined behavior. This flaw can be triggered by a crafted input file processed by ImageMagick and could impact application availability. The patch uses multiplication in additi... | https://nvd.nist.gov/vuln/detail/CVE-2020-27756 |
205,958 | sddm | 4cfed6b0a625593fb43876f04badc4dd99799d86 | https://github.com/sddm/sddm | https://github.com/sddm/sddm/commit/4cfed6b0a625593fb43876f04badc4dd99799d86 | Disable greeters from loading KDE's debug hander
Some themes may use KDE components which will automatically load KDE's
crash handler.
If the greeter were to then somehow crash, that would leave a crash
handler allowing other actions, albeit as the locked down SDDM user.
Only SDDM users using the breeze theme from p... | 1 | bool Greeter::start() {
// check flag
if (m_started)
return false;
if (daemonApp->testing()) {
// create process
m_process = new QProcess(this);
// delete process on finish
connect(m_process, SIGNAL(finished(int,QProcess::ExitStat... | 136,734,524,702,089,630,000,000,000,000,000,000,000 | Greeter.cpp | 284,865,748,290,187,100,000,000,000,000,000,000,000 | [
"CWE-284"
] | CVE-2015-0856 | daemon/Greeter.cpp in sddm before 0.13.0 does not properly disable the KDE crash handler, which allows local users to gain privileges by crashing a greeter when using certain themes, as demonstrated by the plasma-workspace breeze theme. | https://nvd.nist.gov/vuln/detail/CVE-2015-0856 |
375,351 | sddm | 4cfed6b0a625593fb43876f04badc4dd99799d86 | https://github.com/sddm/sddm | https://github.com/sddm/sddm/commit/4cfed6b0a625593fb43876f04badc4dd99799d86 | Disable greeters from loading KDE's debug hander
Some themes may use KDE components which will automatically load KDE's
crash handler.
If the greeter were to then somehow crash, that would leave a crash
handler allowing other actions, albeit as the locked down SDDM user.
Only SDDM users using the breeze theme from p... | 0 | bool Greeter::start() {
// check flag
if (m_started)
return false;
if (daemonApp->testing()) {
// create process
m_process = new QProcess(this);
// delete process on finish
connect(m_process, SIGNAL(finished(int,QProcess::ExitStat... | 310,970,802,071,142,330,000,000,000,000,000,000,000 | Greeter.cpp | 203,579,720,940,883,100,000,000,000,000,000,000,000 | [
"CWE-284"
] | CVE-2015-0856 | daemon/Greeter.cpp in sddm before 0.13.0 does not properly disable the KDE crash handler, which allows local users to gain privileges by crashing a greeter when using certain themes, as demonstrated by the plasma-workspace breeze theme. | https://nvd.nist.gov/vuln/detail/CVE-2015-0856 |
205,960 | linux | 6cc03e8aa36c51f3b26a0d21a3c4ce2809c842ac | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6cc03e8aa36c51f3b26a0d21a3c4ce2809c842ac | appletalk: enforce CAP_NET_RAW for raw sockets
When creating a raw AF_APPLETALK socket, CAP_NET_RAW needs to be checked
first.
Signed-off-by: Ori Nimron <orinimron123@gmail.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Signed-off-by: David S. Miller <davem@davemloft.net> | 1 | static int atalk_create(struct net *net, struct socket *sock, int protocol,
int kern)
{
struct sock *sk;
int rc = -ESOCKTNOSUPPORT;
if (!net_eq(net, &init_net))
return -EAFNOSUPPORT;
/*
* We permit SOCK_DGRAM and RAW is an extension. It is trivial to do
* and gives you the full ELAP frame. Should be hand... | 236,867,284,261,386,080,000,000,000,000,000,000,000 | ddp.c | 312,427,192,633,618,670,000,000,000,000,000,000,000 | [
"CWE-276"
] | CVE-2019-17054 | atalk_create in net/appletalk/ddp.c in the AF_APPLETALK network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-6cc03e8aa36c. | https://nvd.nist.gov/vuln/detail/CVE-2019-17054 |
375,366 | linux | 6cc03e8aa36c51f3b26a0d21a3c4ce2809c842ac | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6cc03e8aa36c51f3b26a0d21a3c4ce2809c842ac | appletalk: enforce CAP_NET_RAW for raw sockets
When creating a raw AF_APPLETALK socket, CAP_NET_RAW needs to be checked
first.
Signed-off-by: Ori Nimron <orinimron123@gmail.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Signed-off-by: David S. Miller <davem@davemloft.net> | 0 | static int atalk_create(struct net *net, struct socket *sock, int protocol,
int kern)
{
struct sock *sk;
int rc = -ESOCKTNOSUPPORT;
if (!net_eq(net, &init_net))
return -EAFNOSUPPORT;
/*
* We permit SOCK_DGRAM and RAW is an extension. It is trivial to do
* and gives you the full ELAP frame. Should be hand... | 169,198,780,719,899,480,000,000,000,000,000,000,000 | ddp.c | 31,304,209,268,614,356,000,000,000,000,000,000,000 | [
"CWE-276"
] | CVE-2019-17054 | atalk_create in net/appletalk/ddp.c in the AF_APPLETALK network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-6cc03e8aa36c. | https://nvd.nist.gov/vuln/detail/CVE-2019-17054 |
205,977 | linux | 2a3f7221acddfe1caa9ff09b3a8158c39b2fdeac | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2a3f7221acddfe1caa9ff09b3a8158c39b2fdeac | ALSA: core: Fix card races between register and disconnect
There is a small race window in the card disconnection code that
allows the registration of another card with the very same card id.
This leads to a warning in procfs creation as caught by syzkaller.
The problem is that we delete snd_cards and snd_cards_lock ... | 1 | int snd_card_disconnect(struct snd_card *card)
{
struct snd_monitor_file *mfile;
if (!card)
return -EINVAL;
spin_lock(&card->files_lock);
if (card->shutdown) {
spin_unlock(&card->files_lock);
return 0;
}
card->shutdown = 1;
spin_unlock(&card->files_lock);
/* phase 1: disable fops (user space) operation... | 184,924,465,020,594,060,000,000,000,000,000,000,000 | init.c | 138,916,092,914,308,330,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2019-15214 | An issue was discovered in the Linux kernel before 5.0.10. There is a use-after-free in the sound subsystem because card disconnection causes certain data structures to be deleted too early. This is related to sound/core/init.c and sound/core/info.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-15214 |
375,708 | linux | 2a3f7221acddfe1caa9ff09b3a8158c39b2fdeac | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2a3f7221acddfe1caa9ff09b3a8158c39b2fdeac | ALSA: core: Fix card races between register and disconnect
There is a small race window in the card disconnection code that
allows the registration of another card with the very same card id.
This leads to a warning in procfs creation as caught by syzkaller.
The problem is that we delete snd_cards and snd_cards_lock ... | 0 | int snd_card_disconnect(struct snd_card *card)
{
struct snd_monitor_file *mfile;
if (!card)
return -EINVAL;
spin_lock(&card->files_lock);
if (card->shutdown) {
spin_unlock(&card->files_lock);
return 0;
}
card->shutdown = 1;
spin_unlock(&card->files_lock);
/* replace file->f_op with special dummy operat... | 304,164,675,700,568,940,000,000,000,000,000,000,000 | init.c | 82,975,296,573,960,280,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2019-15214 | An issue was discovered in the Linux kernel before 5.0.10. There is a use-after-free in the sound subsystem because card disconnection causes certain data structures to be deleted too early. This is related to sound/core/init.c and sound/core/info.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-15214 |
206,004 | php-src | 64f42c73efc58e88671ad76b6b6bc8e2b62713e1 | https://github.com/php/php-src | https://git.php.net/?p=php-src.git;a=commit;h=64f42c73efc58e88671ad76b6b6bc8e2b62713e1 | Fixed bug #71906: AddressSanitizer: negative-size-param (-1) in mbfl_strcut | 1 | mbfl_strcut(
mbfl_string *string,
mbfl_string *result,
int from,
int length)
{
const mbfl_encoding *encoding;
mbfl_memory_device device;
/* validate the parameters */
if (string == NULL || string->val == NULL || result == NULL) {
return NULL;
}
if (from < 0 || length < 0) {
return NULL;
}
... | 296,075,455,592,815,920,000,000,000,000,000,000,000 | mbfilter.c | 124,195,375,871,815,610,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2016-4073 | Multiple integer overflows in the mbfl_strcut function in ext/mbstring/libmbfl/mbfl/mbfilter.c in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted mb_strcut call. | https://nvd.nist.gov/vuln/detail/CVE-2016-4073 |
376,164 | php-src | 64f42c73efc58e88671ad76b6b6bc8e2b62713e1 | https://github.com/php/php-src | https://git.php.net/?p=php-src.git;a=commit;h=64f42c73efc58e88671ad76b6b6bc8e2b62713e1 | Fixed bug #71906: AddressSanitizer: negative-size-param (-1) in mbfl_strcut | 0 | mbfl_strcut(
mbfl_string *string,
mbfl_string *result,
int from,
int length)
{
const mbfl_encoding *encoding;
mbfl_memory_device device;
/* validate the parameters */
if (string == NULL || string->val == NULL || result == NULL) {
return NULL;
}
if (from < 0 || length < 0) {
return NULL;
}
... | 228,644,579,123,085,800,000,000,000,000,000,000,000 | mbfilter.c | 304,058,524,278,478,520,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2016-4073 | Multiple integer overflows in the mbfl_strcut function in ext/mbstring/libmbfl/mbfl/mbfilter.c in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted mb_strcut call. | https://nvd.nist.gov/vuln/detail/CVE-2016-4073 |
206,020 | libplist | 26061aac4ec75e7a4469a9aab9a424716223e5c4 | https://github.com/libimobiledevice/libplist | https://github.com/libimobiledevice/libplist/commit/26061aac4ec75e7a4469a9aab9a424716223e5c4 | bplist: Check for invalid offset_size in bplist trailer | 1 | PLIST_API void plist_from_bin(const char *plist_bin, uint32_t length, plist_t * plist)
{
char *trailer = NULL;
uint8_t offset_size = 0;
uint8_t dict_size = 0;
uint64_t num_objects = 0;
uint64_t root_object = 0;
uint64_t offset_table_index = 0;
char *offset_table = NULL;
//first check w... | 56,290,100,615,574,790,000,000,000,000,000,000,000 | bplist.c | 222,663,397,554,014,500,000,000,000,000,000,000,000 | [
"CWE-770"
] | CVE-2017-5835 | libplist allows attackers to cause a denial of service (large memory allocation and crash) via vectors involving an offset size of zero. | https://nvd.nist.gov/vuln/detail/CVE-2017-5835 |
376,201 | libplist | 26061aac4ec75e7a4469a9aab9a424716223e5c4 | https://github.com/libimobiledevice/libplist | https://github.com/libimobiledevice/libplist/commit/26061aac4ec75e7a4469a9aab9a424716223e5c4 | bplist: Check for invalid offset_size in bplist trailer | 0 | PLIST_API void plist_from_bin(const char *plist_bin, uint32_t length, plist_t * plist)
{
char *trailer = NULL;
uint8_t offset_size = 0;
uint8_t dict_size = 0;
uint64_t num_objects = 0;
uint64_t root_object = 0;
uint64_t offset_table_index = 0;
char *offset_table = NULL;
//first check w... | 68,485,699,772,734,940,000,000,000,000,000,000,000 | bplist.c | 15,292,418,469,471,425,000,000,000,000,000,000,000 | [
"CWE-770"
] | CVE-2017-5835 | libplist allows attackers to cause a denial of service (large memory allocation and crash) via vectors involving an offset size of zero. | https://nvd.nist.gov/vuln/detail/CVE-2017-5835 |
206,024 | linux | 8572cea1461a006bce1d06c0c4b0575869125fa4 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/8572cea1461a006bce1d06c0c4b0575869125fa4 | nfp: flower: prevent memory leak in nfp_flower_spawn_phy_reprs
In nfp_flower_spawn_phy_reprs, in the for loop over eth_tbl if any of
intermediate allocations or initializations fail memory is leaked.
requiered releases are added.
Fixes: b94524529741 ("nfp: flower: add per repr private data for LAG offload")
Signed-of... | 1 | nfp_flower_spawn_phy_reprs(struct nfp_app *app, struct nfp_flower_priv *priv)
{
struct nfp_eth_table *eth_tbl = app->pf->eth_tbl;
atomic_t *replies = &priv->reify_replies;
struct nfp_flower_repr_priv *repr_priv;
struct nfp_repr *nfp_repr;
struct sk_buff *ctrl_skb;
struct nfp_reprs *reprs;
int err, reify_cnt;
un... | 195,353,204,371,252,450,000,000,000,000,000,000,000 | main.c | 326,858,579,041,313,300,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2019-19080 | Four memory leaks in the nfp_flower_spawn_phy_reprs() function in drivers/net/ethernet/netronome/nfp/flower/main.c in the Linux kernel before 5.3.4 allow attackers to cause a denial of service (memory consumption), aka CID-8572cea1461a. | https://nvd.nist.gov/vuln/detail/CVE-2019-19080 |
376,306 | linux | 8572cea1461a006bce1d06c0c4b0575869125fa4 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/8572cea1461a006bce1d06c0c4b0575869125fa4 | nfp: flower: prevent memory leak in nfp_flower_spawn_phy_reprs
In nfp_flower_spawn_phy_reprs, in the for loop over eth_tbl if any of
intermediate allocations or initializations fail memory is leaked.
requiered releases are added.
Fixes: b94524529741 ("nfp: flower: add per repr private data for LAG offload")
Signed-of... | 0 | nfp_flower_spawn_phy_reprs(struct nfp_app *app, struct nfp_flower_priv *priv)
{
struct nfp_eth_table *eth_tbl = app->pf->eth_tbl;
atomic_t *replies = &priv->reify_replies;
struct nfp_flower_repr_priv *repr_priv;
struct nfp_repr *nfp_repr;
struct sk_buff *ctrl_skb;
struct nfp_reprs *reprs;
int err, reify_cnt;
un... | 204,870,543,410,190,730,000,000,000,000,000,000,000 | main.c | 83,701,049,146,303,390,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2019-19080 | Four memory leaks in the nfp_flower_spawn_phy_reprs() function in drivers/net/ethernet/netronome/nfp/flower/main.c in the Linux kernel before 5.3.4 allow attackers to cause a denial of service (memory consumption), aka CID-8572cea1461a. | https://nvd.nist.gov/vuln/detail/CVE-2019-19080 |
206,028 | vim | c249913edc35c0e666d783bfc21595cf9f7d9e0d | https://github.com/vim/vim | https://github.com/vim/vim/commit/c249913edc35c0e666d783bfc21595cf9f7d9e0d | patch 9.0.0483: illegal memory access when replacing in virtualedit mode
Problem: Illegal memory access when replacing in virtualedit mode.
Solution: Check for replacing NUL after Tab. | 1 | op_replace(oparg_T *oap, int c)
{
int n, numc;
int num_chars;
char_u *newp, *oldp;
size_t oldlen;
struct block_def bd;
char_u *after_p = NULL;
int had_ctrl_v_cr = FALSE;
if ((curbuf->b_ml.ml_flags & ML_EMPTY ) || oap->empty)
return OK; // nothing to do
if (c == REPLAC... | 13,818,243,420,621,576,000,000,000,000,000,000,000 | ops.c | 255,351,967,624,652,800,000,000,000,000,000,000,000 | [
"CWE-122"
] | CVE-2022-3234 | Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0483. | https://nvd.nist.gov/vuln/detail/CVE-2022-3234 |
376,585 | vim | c249913edc35c0e666d783bfc21595cf9f7d9e0d | https://github.com/vim/vim | https://github.com/vim/vim/commit/c249913edc35c0e666d783bfc21595cf9f7d9e0d | patch 9.0.0483: illegal memory access when replacing in virtualedit mode
Problem: Illegal memory access when replacing in virtualedit mode.
Solution: Check for replacing NUL after Tab. | 0 | op_replace(oparg_T *oap, int c)
{
int n, numc;
int num_chars;
char_u *newp, *oldp;
size_t oldlen;
struct block_def bd;
char_u *after_p = NULL;
int had_ctrl_v_cr = FALSE;
if ((curbuf->b_ml.ml_flags & ML_EMPTY ) || oap->empty)
return OK; // nothing to do
if (c == REPLAC... | 126,595,847,857,181,400,000,000,000,000,000,000,000 | ops.c | 270,732,469,250,202,670,000,000,000,000,000,000,000 | [
"CWE-122"
] | CVE-2022-3234 | Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0483. | https://nvd.nist.gov/vuln/detail/CVE-2022-3234 |
206,048 | ImageMagick | cb63560ba25e4a6c51ab282538c24877fff7d471 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/cb63560ba25e4a6c51ab282538c24877fff7d471 | https://github.com/ImageMagick/ImageMagick/issues/641 | 1 | static Image *ReadWEBPImage(const ImageInfo *image_info,
ExceptionInfo *exception)
{
Image
*image;
int
webp_status;
MagickBooleanType
status;
register unsigned char
*p;
size_t
length;
ssize_t
count,
y;
unsigned char
header[12],
*stream;
WebPDecoderConfig
... | 56,989,148,306,657,540,000,000,000,000,000,000,000 | webp.c | 304,411,139,792,896,430,000,000,000,000,000,000,000 | [
"CWE-400"
] | CVE-2017-14137 | ReadWEBPImage in coders/webp.c in ImageMagick 7.0.6-5 has an issue where memory allocation is excessive because it depends only on a length field in a header. | https://nvd.nist.gov/vuln/detail/CVE-2017-14137 |
376,707 | ImageMagick | cb63560ba25e4a6c51ab282538c24877fff7d471 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/cb63560ba25e4a6c51ab282538c24877fff7d471 | https://github.com/ImageMagick/ImageMagick/issues/641 | 0 | static Image *ReadWEBPImage(const ImageInfo *image_info,
ExceptionInfo *exception)
{
#define ThrowWEBPException(severity,tag) \
{ \
if (stream != (unsigned char *) NULL) \
stream=(unsigned char*) RelinquishMagickMemory(stream); \
if (webp_image != (WebPDecBuffer *) NULL) \
WebPFreeDecBuffer(webp_image); \... | 190,103,786,433,566,130,000,000,000,000,000,000,000 | webp.c | 23,890,474,412,933,410,000,000,000,000,000,000,000 | [
"CWE-400"
] | CVE-2017-14137 | ReadWEBPImage in coders/webp.c in ImageMagick 7.0.6-5 has an issue where memory allocation is excessive because it depends only on a length field in a header. | https://nvd.nist.gov/vuln/detail/CVE-2017-14137 |
206,082 | linux | 3d3925ff6433f98992685a9679613a2cc97f3ce2 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/3d3925ff6433f98992685a9679613a2cc97f3ce2 | can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path
There is no need to call dev_kfree_skb() when usb_submit_urb() fails
because can_put_echo_skb() deletes original skb and
can_free_echo_skb() deletes the cloned skb.
Fixes: 0024d8ad1639 ("can: usb_8dev: Add support for USB2CAN interface fro... | 1 | static netdev_tx_t usb_8dev_start_xmit(struct sk_buff *skb,
struct net_device *netdev)
{
struct usb_8dev_priv *priv = netdev_priv(netdev);
struct net_device_stats *stats = &netdev->stats;
struct can_frame *cf = (struct can_frame *) skb->data;
struct usb_8dev_tx_msg *msg;
struct urb *urb;
struct usb_8dev... | 116,437,045,836,256,950,000,000,000,000,000,000,000 | usb_8dev.c | 244,846,640,243,829,170,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2022-28388 | usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c in the Linux kernel through 5.17.1 has a double free. | https://nvd.nist.gov/vuln/detail/CVE-2022-28388 |
377,105 | linux | 3d3925ff6433f98992685a9679613a2cc97f3ce2 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/3d3925ff6433f98992685a9679613a2cc97f3ce2 | can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path
There is no need to call dev_kfree_skb() when usb_submit_urb() fails
because can_put_echo_skb() deletes original skb and
can_free_echo_skb() deletes the cloned skb.
Fixes: 0024d8ad1639 ("can: usb_8dev: Add support for USB2CAN interface fro... | 0 | static netdev_tx_t usb_8dev_start_xmit(struct sk_buff *skb,
struct net_device *netdev)
{
struct usb_8dev_priv *priv = netdev_priv(netdev);
struct net_device_stats *stats = &netdev->stats;
struct can_frame *cf = (struct can_frame *) skb->data;
struct usb_8dev_tx_msg *msg;
struct urb *urb;
struct usb_8dev... | 109,363,242,785,617,400,000,000,000,000,000,000,000 | usb_8dev.c | 117,925,841,962,805,740,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2022-28388 | usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c in the Linux kernel through 5.17.1 has a double free. | https://nvd.nist.gov/vuln/detail/CVE-2022-28388 |
206,087 | httpd | 3b6431eb9c9dba603385f70a2131ab4a01bf0d3b | https://github.com/apache/httpd | https://github.com/apache/httpd/commit/3b6431eb9c9dba603385f70a2131ab4a01bf0d3b | Merge r1885659 from trunk:
mod_auth_digest: Fast validation of the nonce's base64 to fail early if
the format can't match anyway.
Submitted by: ylavic
Reviewed by: ylavic, covener, jailletc36
git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/branches/2.4.x@1885666 13f79535-47bb-0310-9956-ffa... | 1 | static int check_nonce(request_rec *r, digest_header_rec *resp,
const digest_config_rec *conf)
{
apr_time_t dt;
time_rec nonce_time;
char tmp, hash[NONCE_HASH_LEN+1];
if (strlen(resp->nonce) != NONCE_LEN) {
ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(01775)
... | 53,272,688,762,799,760,000,000,000,000,000,000,000 | mod_auth_digest.c | 168,625,451,022,706,740,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2020-35452 | Apache HTTP Server versions 2.4.0 to 2.4.46 A specially crafted Digest nonce can cause a stack overflow in mod_auth_digest. There is no report of this overflow being exploitable, nor the Apache HTTP Server team could create one, though some particular compiler and/or compilation option might make it possible, with limi... | https://nvd.nist.gov/vuln/detail/CVE-2020-35452 |
377,170 | httpd | 3b6431eb9c9dba603385f70a2131ab4a01bf0d3b | https://github.com/apache/httpd | https://github.com/apache/httpd/commit/3b6431eb9c9dba603385f70a2131ab4a01bf0d3b | Merge r1885659 from trunk:
mod_auth_digest: Fast validation of the nonce's base64 to fail early if
the format can't match anyway.
Submitted by: ylavic
Reviewed by: ylavic, covener, jailletc36
git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/branches/2.4.x@1885666 13f79535-47bb-0310-9956-ffa... | 0 | static int check_nonce(request_rec *r, digest_header_rec *resp,
const digest_config_rec *conf)
{
apr_time_t dt;
time_rec nonce_time;
char tmp, hash[NONCE_HASH_LEN+1];
/* Since the time part of the nonce is a base64 encoding of an
* apr_time_t (8 bytes), it should end with a ... | 15,099,181,510,498,865,000,000,000,000,000,000,000 | mod_auth_digest.c | 270,655,216,103,044,620,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2020-35452 | Apache HTTP Server versions 2.4.0 to 2.4.46 A specially crafted Digest nonce can cause a stack overflow in mod_auth_digest. There is no report of this overflow being exploitable, nor the Apache HTTP Server team could create one, though some particular compiler and/or compilation option might make it possible, with limi... | https://nvd.nist.gov/vuln/detail/CVE-2020-35452 |
206,108 | git | e904deb89d9a9669a76a426182506a084d3f6308 | https://github.com/git/git | https://github.com/git/git/commit/e904deb89d9a9669a76a426182506a084d3f6308 | submodule: reject submodule.update = !command in .gitmodules
Since ac1fbbda2013 (submodule: do not copy unknown update mode from
.gitmodules, 2013-12-02), Git has been careful to avoid copying
[submodule "foo"]
update = !run an arbitrary scary command
from .gitmodules to a repository's local config, copying in th... | 1 | static int parse_config(const char *var, const char *value, void *data)
{
struct parse_config_parameter *me = data;
struct submodule *submodule;
struct strbuf name = STRBUF_INIT, item = STRBUF_INIT;
int ret = 0;
/* this also ensures that we only parse submodule entries */
if (!name_and_item_from_var(var, &name, ... | 109,766,985,234,622,280,000,000,000,000,000,000,000 | submodule-config.c | 300,518,344,266,712,130,000,000,000,000,000,000,000 | [
"CWE-78"
] | CVE-2019-19604 | Arbitrary command execution is possible in Git before 2.20.2, 2.21.x before 2.21.1, 2.22.x before 2.22.2, 2.23.x before 2.23.1, and 2.24.x before 2.24.1 because a "git submodule update" operation can run commands found in the .gitmodules file of a malicious repository. | https://nvd.nist.gov/vuln/detail/CVE-2019-19604 |
377,319 | git | e904deb89d9a9669a76a426182506a084d3f6308 | https://github.com/git/git | https://github.com/git/git/commit/e904deb89d9a9669a76a426182506a084d3f6308 | submodule: reject submodule.update = !command in .gitmodules
Since ac1fbbda2013 (submodule: do not copy unknown update mode from
.gitmodules, 2013-12-02), Git has been careful to avoid copying
[submodule "foo"]
update = !run an arbitrary scary command
from .gitmodules to a repository's local config, copying in th... | 0 | static int parse_config(const char *var, const char *value, void *data)
{
struct parse_config_parameter *me = data;
struct submodule *submodule;
struct strbuf name = STRBUF_INIT, item = STRBUF_INIT;
int ret = 0;
/* this also ensures that we only parse submodule entries */
if (!name_and_item_from_var(var, &name, ... | 150,493,603,339,734,990,000,000,000,000,000,000,000 | submodule-config.c | 282,243,715,960,098,050,000,000,000,000,000,000,000 | [
"CWE-78"
] | CVE-2019-19604 | Arbitrary command execution is possible in Git before 2.20.2, 2.21.x before 2.21.1, 2.22.x before 2.22.2, 2.23.x before 2.23.1, and 2.24.x before 2.24.1 because a "git submodule update" operation can run commands found in the .gitmodules file of a malicious repository. | https://nvd.nist.gov/vuln/detail/CVE-2019-19604 |
206,121 | linux | 89189557b47b35683a27c80ee78aef18248eefb4 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=89189557b47b35683a27c80ee78aef18248eefb4 | fs/proc/proc_sysctl.c: Fix a NULL pointer dereference
Syzkaller report this:
sysctl could not get directory: /net//bridge -12
kasan: CONFIG_KASAN_INLINE enabled
kasan: GPF could be caused by NULL-ptr deref or user memory access
general protection fault: 0000 [#1] SMP KASAN PTI
CPU: 1 PID: 7027 Comm: syz-exe... | 1 | static void drop_sysctl_table(struct ctl_table_header *header)
{
struct ctl_dir *parent = header->parent;
if (--header->nreg)
return;
if (parent)
put_links(header);
start_unregistering(header);
if (!--header->count)
kfree_rcu(header, rcu);
if (parent)
drop_sysctl_table(&parent->header);
} | 129,426,444,515,663,800,000,000,000,000,000,000,000 | proc_sysctl.c | 167,876,789,808,674,400,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2019-20054 | In the Linux kernel before 5.0.6, there is a NULL pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c, related to put_links, aka CID-23da9588037e. | https://nvd.nist.gov/vuln/detail/CVE-2019-20054 |
377,430 | linux | 89189557b47b35683a27c80ee78aef18248eefb4 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=89189557b47b35683a27c80ee78aef18248eefb4 | fs/proc/proc_sysctl.c: Fix a NULL pointer dereference
Syzkaller report this:
sysctl could not get directory: /net//bridge -12
kasan: CONFIG_KASAN_INLINE enabled
kasan: GPF could be caused by NULL-ptr deref or user memory access
general protection fault: 0000 [#1] SMP KASAN PTI
CPU: 1 PID: 7027 Comm: syz-exe... | 0 | static void drop_sysctl_table(struct ctl_table_header *header)
{
struct ctl_dir *parent = header->parent;
if (--header->nreg)
return;
if (parent) {
put_links(header);
start_unregistering(header);
}
if (!--header->count)
kfree_rcu(header, rcu);
if (parent)
drop_sysctl_table(&parent->header);
} | 75,062,216,562,513,050,000,000,000,000,000,000,000 | proc_sysctl.c | 141,610,585,483,774,730,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2019-20054 | In the Linux kernel before 5.0.6, there is a NULL pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c, related to put_links, aka CID-23da9588037e. | https://nvd.nist.gov/vuln/detail/CVE-2019-20054 |
206,122 | php-src | 0765623d6991b62ffcd93ddb6be8a5203a2fa7e2 | https://github.com/php/php-src | http://git.php.net/?p=php-src.git;a=commitdiff;h=0765623d6991b62ffcd93ddb6be8a5203a2fa7e2 | improve fix for Bug #69545 | 1 | ftp_genlist(ftpbuf_t *ftp, const char *cmd, const char *path TSRMLS_DC)
{
php_stream *tmpstream = NULL;
databuf_t *data = NULL;
char *ptr;
int ch, lastch;
size_t size, rcvd;
size_t lines;
char **ret = NULL;
char **entry;
char *text;
if ((tmpstream = php_stream_fopen_tmpfile()) == NULL) {
php_error_... | 318,225,239,746,599,400,000,000,000,000,000,000,000 | ftp.c | 297,476,459,306,613,060,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2015-4022 | Integer overflow in the ftp_genlist function in ext/ftp/ftp.c in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 allows remote FTP servers to execute arbitrary code via a long reply to a LIST command, leading to a heap-based buffer overflow. | https://nvd.nist.gov/vuln/detail/CVE-2015-4022 |
377,459 | php-src | 0765623d6991b62ffcd93ddb6be8a5203a2fa7e2 | https://github.com/php/php-src | http://git.php.net/?p=php-src.git;a=commitdiff;h=0765623d6991b62ffcd93ddb6be8a5203a2fa7e2 | improve fix for Bug #69545 | 0 | ftp_genlist(ftpbuf_t *ftp, const char *cmd, const char *path TSRMLS_DC)
{
php_stream *tmpstream = NULL;
databuf_t *data = NULL;
char *ptr;
int ch, lastch;
size_t size, rcvd;
size_t lines;
char **ret = NULL;
char **entry;
char *text;
if ((tmpstream = php_stream_fopen_tmpfile()) == NULL) {
php_error_... | 147,167,252,106,652,520,000,000,000,000,000,000,000 | ftp.c | 338,209,734,081,345,650,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2015-4022 | Integer overflow in the ftp_genlist function in ext/ftp/ftp.c in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 allows remote FTP servers to execute arbitrary code via a long reply to a LIST command, leading to a heap-based buffer overflow. | https://nvd.nist.gov/vuln/detail/CVE-2015-4022 |
206,126 | clamav-devel | 4842733eb3f09be61caeed83778bb6679141dbc5 | https://github.com/vrtadmin/clamav-devel | http://git.clamav.net/gitweb?p=clamav-devel.git;a=commit;h=4842733eb3f09be61caeed83778bb6679141dbc5 | bb#2818 | 1 | int cli_hm_scan(const unsigned char *digest, uint32_t size, const char **virname, const struct cli_matcher *root, enum CLI_HASH_TYPE type) {
const struct cli_htu32_element *item;
unsigned int keylen;
struct cli_sz_hash *szh;
size_t l, r;
if(!digest || !size || size == 0xffffffff || !root || !root->... | 116,516,251,163,308,170,000,000,000,000,000,000,000 | matcher-hash.c | 213,945,621,856,830,600,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2011-2721 | Off-by-one error in the cli_hm_scan function in matcher-hash.c in libclamav in ClamAV before 0.97.2 allows remote attackers to cause a denial of service (daemon crash) via an e-mail message that is not properly handled during certain hash calculations. | https://nvd.nist.gov/vuln/detail/CVE-2011-2721 |
377,495 | clamav-devel | 4842733eb3f09be61caeed83778bb6679141dbc5 | https://github.com/vrtadmin/clamav-devel | http://git.clamav.net/gitweb?p=clamav-devel.git;a=commit;h=4842733eb3f09be61caeed83778bb6679141dbc5 | bb#2818 | 0 | int cli_hm_scan(const unsigned char *digest, uint32_t size, const char **virname, const struct cli_matcher *root, enum CLI_HASH_TYPE type) {
const struct cli_htu32_element *item;
unsigned int keylen;
struct cli_sz_hash *szh;
size_t l, r;
if(!digest || !size || size == 0xffffffff || !root || !root->... | 334,362,423,903,036,740,000,000,000,000,000,000,000 | matcher-hash.c | 259,657,226,011,056,030,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2011-2721 | Off-by-one error in the cli_hm_scan function in matcher-hash.c in libclamav in ClamAV before 0.97.2 allows remote attackers to cause a denial of service (daemon crash) via an e-mail message that is not properly handled during certain hash calculations. | https://nvd.nist.gov/vuln/detail/CVE-2011-2721 |
206,127 | libtiff | 99b10edde9a0fc28cc0e7b7757aa18ac4c8c225f | https://github.com/vadz/libtiff | https://gitlab.com/libtiff/libtiff/commit/99b10edde9a0fc28cc0e7b7757aa18ac4c8c225f | tiff2bw: avoid null pointer dereference in case of out of memory situation. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2819 / CVE-2018-18661 | 1 | main(int argc, char* argv[])
{
uint32 rowsperstrip = (uint32) -1;
TIFF *in, *out;
uint32 w, h;
uint16 samplesperpixel;
uint16 bitspersample;
uint16 config;
uint16 photometric;
uint16* red;
uint16* green;
uint16* blue;
tsize_t rowsize;
register uint32 row;
register tsample_t s;
unsigned char *inbuf, *outbu... | 57,911,071,887,547,450,000,000,000,000,000,000,000 | tiff2bw.c | 189,500,255,933,107,200,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2018-18661 | An issue was discovered in LibTIFF 4.0.9. There is a NULL pointer dereference in the function LZWDecode in the file tif_lzw.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-18661 |
377,501 | libtiff | 99b10edde9a0fc28cc0e7b7757aa18ac4c8c225f | https://github.com/vadz/libtiff | https://gitlab.com/libtiff/libtiff/commit/99b10edde9a0fc28cc0e7b7757aa18ac4c8c225f | tiff2bw: avoid null pointer dereference in case of out of memory situation. Fixes http://bugzilla.maptools.org/show_bug.cgi?id=2819 / CVE-2018-18661 | 0 | main(int argc, char* argv[])
{
uint32 rowsperstrip = (uint32) -1;
TIFF *in, *out;
uint32 w, h;
uint16 samplesperpixel;
uint16 bitspersample;
uint16 config;
uint16 photometric;
uint16* red;
uint16* green;
uint16* blue;
tsize_t rowsize;
register uint32 row;
register tsample_t s;
unsigned char *inbuf, *outbu... | 250,318,405,281,686,200,000,000,000,000,000,000,000 | tiff2bw.c | 210,326,292,647,667,700,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2018-18661 | An issue was discovered in LibTIFF 4.0.9. There is a NULL pointer dereference in the function LZWDecode in the file tif_lzw.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-18661 |
206,132 | tor | 80c404c4b79f3bcba3fc4585d4c62a62a04f3ed9 | https://github.com/torproject/tor | https://gitlab.torproject.org/tpo/core/tor/-/commit/80c404c4b79f3bcba3fc4585d4c62a62a04f3ed9 | Log warning when connecting to soon-to-be-deprecated v2 onions. | 1 | connection_ap_handshake_rewrite_and_attach(entry_connection_t *conn,
origin_circuit_t *circ,
crypt_path_t *cpath)
{
socks_request_t *socks = conn->socks_request;
const or_options_t *options = get_options();
connection_t *base_co... | 189,125,265,574,271,300,000,000,000,000,000,000,000 | connection_edge.c | 212,384,958,512,676,300,000,000,000,000,000,000,000 | [
"CWE-532"
] | CVE-2021-39246 | Tor Browser through 10.5.6 and 11.x through 11.0a4 allows a correlation attack that can compromise the privacy of visits to v2 onion addresses. Exact timestamps of these onion-service visits are logged locally, and an attacker might be able to compare them to timestamp data collected by the destination server (or colle... | https://nvd.nist.gov/vuln/detail/CVE-2021-39246 |
377,569 | tor | 80c404c4b79f3bcba3fc4585d4c62a62a04f3ed9 | https://github.com/torproject/tor | https://gitlab.torproject.org/tpo/core/tor/-/commit/80c404c4b79f3bcba3fc4585d4c62a62a04f3ed9 | Log warning when connecting to soon-to-be-deprecated v2 onions. | 0 | connection_ap_handshake_rewrite_and_attach(entry_connection_t *conn,
origin_circuit_t *circ,
crypt_path_t *cpath)
{
socks_request_t *socks = conn->socks_request;
const or_options_t *options = get_options();
connection_t *base_co... | 239,196,952,238,474,400,000,000,000,000,000,000,000 | connection_edge.c | 322,431,415,235,685,750,000,000,000,000,000,000,000 | [
"CWE-532"
] | CVE-2021-39246 | Tor Browser through 10.5.6 and 11.x through 11.0a4 allows a correlation attack that can compromise the privacy of visits to v2 onion addresses. Exact timestamps of these onion-service visits are logged locally, and an attacker might be able to compare them to timestamp data collected by the destination server (or colle... | https://nvd.nist.gov/vuln/detail/CVE-2021-39246 |
206,207 | ImageMagick | 9dd1c7e1f8f6c137bfd3293be2554f59456c7b62 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/9dd1c7e1f8f6c137bfd3293be2554f59456c7b62 | https://github.com/ImageMagick/ImageMagick/issues/1753 | 1 | static MagickBooleanType WritePDFImage(const ImageInfo *image_info,Image *image,
ExceptionInfo *exception)
{
#define CFormat "/Filter [ /%s ]\n"
#define ObjectsPerImage 14
#define ThrowPDFException(exception,message) \
{ \
if (xref != (MagickOffsetType *) NULL) \
xref=(MagickOffsetType *) RelinquishMagickMemo... | 20,758,126,336,189,803,000,000,000,000,000,000,000 | pdf.c | 132,808,098,468,469,560,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2020-27771 | In RestoreMSCWarning() of /coders/pdf.c there are several areas where calls to GetPixelIndex() could result in values outside the range of representable for the unsigned char type. The patch casts the return value of GetPixelIndex() to ssize_t type to avoid this bug. This undefined behavior could be triggered when Imag... | https://nvd.nist.gov/vuln/detail/CVE-2020-27771 |
377,933 | ImageMagick | 9dd1c7e1f8f6c137bfd3293be2554f59456c7b62 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/9dd1c7e1f8f6c137bfd3293be2554f59456c7b62 | https://github.com/ImageMagick/ImageMagick/issues/1753 | 0 | static MagickBooleanType WritePDFImage(const ImageInfo *image_info,Image *image,
ExceptionInfo *exception)
{
#define CFormat "/Filter [ /%s ]\n"
#define ObjectsPerImage 14
#define ThrowPDFException(exception,message) \
{ \
if (xref != (MagickOffsetType *) NULL) \
xref=(MagickOffsetType *) RelinquishMagickMemo... | 239,707,070,423,046,950,000,000,000,000,000,000,000 | pdf.c | 131,126,882,590,292,450,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2020-27771 | In RestoreMSCWarning() of /coders/pdf.c there are several areas where calls to GetPixelIndex() could result in values outside the range of representable for the unsigned char type. The patch casts the return value of GetPixelIndex() to ssize_t type to avoid this bug. This undefined behavior could be triggered when Imag... | https://nvd.nist.gov/vuln/detail/CVE-2020-27771 |
206,208 | ImageMagick | de5deab202c340162b65f65bafbbe17b1eda2c1a | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/de5deab202c340162b65f65bafbbe17b1eda2c1a | https://github.com/ImageMagick/ImageMagick/issues/794 | 1 | static void LoadOpenCLDevices(MagickCLEnv clEnv)
{
cl_context_properties
properties[3];
cl_device_id
*devices;
cl_int
status;
cl_platform_id
*platforms;
cl_uint
i,
j,
next,
number_devices,
number_platforms;
size_t
length;
number_platforms=0;
if (openCL_libra... | 203,233,477,377,707,560,000,000,000,000,000,000,000 | opencl.c | 27,776,408,866,912,014,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2017-18253 | An issue was discovered in ImageMagick 7.0.7. A NULL pointer dereference vulnerability was found in the function LoadOpenCLDevices in MagickCore/opencl.c, which allows attackers to cause a denial of service via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2017-18253 |
378,009 | ImageMagick | de5deab202c340162b65f65bafbbe17b1eda2c1a | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/de5deab202c340162b65f65bafbbe17b1eda2c1a | https://github.com/ImageMagick/ImageMagick/issues/794 | 0 | static void LoadOpenCLDevices(MagickCLEnv clEnv)
{
cl_context_properties
properties[3];
cl_device_id
*devices;
cl_int
status;
cl_platform_id
*platforms;
cl_uint
i,
j,
next,
number_devices,
number_platforms;
size_t
length;
number_platforms=0;
if (openCL_libra... | 240,153,617,697,343,800,000,000,000,000,000,000,000 | opencl.c | 14,443,734,427,931,294,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2017-18253 | An issue was discovered in ImageMagick 7.0.7. A NULL pointer dereference vulnerability was found in the function LoadOpenCLDevices in MagickCore/opencl.c, which allows attackers to cause a denial of service via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2017-18253 |
206,217 | cinnamon-screensaver | da7af55f1fa966c52e15cc288d4f8928eca8cc9f | https://github.com/mtwebster/cinnamon-screensaver | https://github.com/mtwebster/cinnamon-screensaver/commit/da7af55f1fa966c52e15cc288d4f8928eca8cc9f | Workaround gtk3 bug, don't allow GtkWindow to handle popup_menu. | 1 | gs_window_class_init (GSWindowClass *klass)
{
GObjectClass *object_class = G_OBJECT_CLASS (klass);
GtkWidgetClass *widget_class = GTK_WIDGET_CLASS (klass);
object_class->finalize = gs_window_finalize;
object_class->get_property = gs_window_get_property;
object_class->set_p... | 44,154,590,121,117,700,000,000,000,000,000,000,000 | gs-window-x11.c | 44,288,002,596,828,660,000,000,000,000,000,000,000 | [
"CWE-284"
] | CVE-2014-1949 | GTK+ 3.10.9 and earlier, as used in cinnamon-screensaver, gnome-screensaver, and other applications, allows physically proximate attackers to bypass the lock screen by pressing the menu button. | https://nvd.nist.gov/vuln/detail/CVE-2014-1949 |
378,165 | cinnamon-screensaver | da7af55f1fa966c52e15cc288d4f8928eca8cc9f | https://github.com/mtwebster/cinnamon-screensaver | https://github.com/mtwebster/cinnamon-screensaver/commit/da7af55f1fa966c52e15cc288d4f8928eca8cc9f | Workaround gtk3 bug, don't allow GtkWindow to handle popup_menu. | 0 | gs_window_class_init (GSWindowClass *klass)
{
GObjectClass *object_class = G_OBJECT_CLASS (klass);
GtkWidgetClass *widget_class = GTK_WIDGET_CLASS (klass);
object_class->finalize = gs_window_finalize;
object_class->get_property = gs_window_get_property;
object_class->set_p... | 212,548,625,905,084,000,000,000,000,000,000,000,000 | gs-window-x11.c | 152,220,240,473,019,100,000,000,000,000,000,000,000 | [
"CWE-284"
] | CVE-2014-1949 | GTK+ 3.10.9 and earlier, as used in cinnamon-screensaver, gnome-screensaver, and other applications, allows physically proximate attackers to bypass the lock screen by pressing the menu button. | https://nvd.nist.gov/vuln/detail/CVE-2014-1949 |
206,248 | ImageMagick | 43539e67a47d2f8de832d33a5b26dc2a7a12294f | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/43539e67a47d2f8de832d33a5b26dc2a7a12294f | https://github.com/ImageMagick/ImageMagick/issues/1718 | 1 | MagickPrivate ResizeFilter *AcquireResizeFilter(const Image *image,
const FilterType filter,const MagickBooleanType cylindrical,
ExceptionInfo *exception)
{
const char
*artifact;
FilterType
filter_type,
window_type;
double
B,
C,
value;
register ResizeFilter
*resize_filter;
... | 2,256,423,509,877,445,800,000,000,000,000,000,000 | resize.c | 333,768,715,355,806,430,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2020-27763 | A flaw was found in ImageMagick in MagickCore/resize.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. This would most likely lead to an impact to application availability, but could potentially cause other problems related ... | https://nvd.nist.gov/vuln/detail/CVE-2020-27763 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.