idx
int64
project
string
commit_id
string
project_url
string
commit_url
string
commit_message
string
target
int64
func
string
func_hash
float64
file_name
string
file_hash
float64
cwe
list
cve
string
cve_desc
string
nvd_url
string
389,751
ImageMagick
4b352c0be410ad900469a079e389178f878aded8
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/4b352c0be410ad900469a079e389178f878aded8
https://github.com/ImageMagick/ImageMagick/issues/1191
0
static Image *ReadMIFFImage(const ImageInfo *image_info, ExceptionInfo *exception) { #define BZipMaxExtent(x) ((x)+((x)/100)+600) #define LZMAMaxExtent(x) ((x)+((x)/3)+128) #define ThrowMIFFException(exception,message) \ { \ if (quantum_info != (QuantumInfo *) NULL) \ quantum_info=DestroyQuantumInfo(quantum_i...
35,850,894,100,470,650,000,000,000,000,000,000,000
miff.c
183,531,186,895,083,600,000,000,000,000,000,000,000
[ "CWE-772" ]
CVE-2018-14436
ImageMagick 7.0.8-4 has a memory leak in ReadMIFFImage in coders/miff.c.
https://nvd.nist.gov/vuln/detail/CVE-2018-14436
206,947
php-src
5c0455bf2c8cd3c25401407f158e820aa3b239e1
https://github.com/php/php-src
https://github.com/php/php-src/commit/5c0455bf2c8cd3c25401407f158e820aa3b239e1
Merge branch 'PHP-7.0' into PHP-7.1 * PHP-7.0: Fixed bug #75055 Out-Of-Bounds Read in timelib_meridian() Apply upstream patch for CVE-2016-1283
1
static int scan(Scanner *s, timelib_tz_get_wrapper tz_get_wrapper) { uchar *cursor = s->cur; char *str, *ptr = NULL; std: s->tok = cursor; s->len = 0; #line 965 "ext/date/lib/parse_date.re" #line 846 "<stdout>" { YYCTYPE yych; unsigned int yyaccept = 0; static const unsigned char yybm[] = { 0, 0, 0, ...
114,749,180,218,233,880,000,000,000,000,000,000,000
parse_date.c
224,475,799,902,884,000,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-16642
In PHP before 5.6.32, 7.x before 7.0.25, and 7.1.x before 7.1.11, an error in the date extension's timelib_meridian handling of 'front of' and 'back of' directives could be used by attackers able to supply date strings to leak information from the interpreter, related to ext/date/lib/parse_date.c out-of-bounds reads af...
https://nvd.nist.gov/vuln/detail/CVE-2017-16642
389,786
php-src
5c0455bf2c8cd3c25401407f158e820aa3b239e1
https://github.com/php/php-src
https://github.com/php/php-src/commit/5c0455bf2c8cd3c25401407f158e820aa3b239e1
Merge branch 'PHP-7.0' into PHP-7.1 * PHP-7.0: Fixed bug #75055 Out-Of-Bounds Read in timelib_meridian() Apply upstream patch for CVE-2016-1283
0
static int scan(Scanner *s, timelib_tz_get_wrapper tz_get_wrapper) { uchar *cursor = s->cur; char *str, *ptr = NULL; std: s->tok = cursor; s->len = 0; #line 965 "ext/date/lib/parse_date.re" #line 846 "<stdout>" { YYCTYPE yych; unsigned int yyaccept = 0; static const unsigned char yybm[] = { 0, 0, 0, ...
168,360,440,945,252,500,000,000,000,000,000,000,000
parse_date.c
139,597,511,336,969,700,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-16642
In PHP before 5.6.32, 7.x before 7.0.25, and 7.1.x before 7.1.11, an error in the date extension's timelib_meridian handling of 'front of' and 'back of' directives could be used by attackers able to supply date strings to leak information from the interpreter, related to ext/date/lib/parse_date.c out-of-bounds reads af...
https://nvd.nist.gov/vuln/detail/CVE-2017-16642
206,952
perl5
52236464559c6e410a4587d3c6da9639e75f3ec1
https://github.com/perl/perl5
https://github.com/Perl/perl5/commit/52236464559c6e410a4587d3c6da9639e75f3ec1#diff-31982a731a0996d0cc82a4ad4e70ad50
avoid invalid memory access in MapPath[AW] This issue was assigned CVE-2015-8608. [perl #126755]
1
char *VDir::MapPathA(const char *pInName) { /* * possiblities -- relative path or absolute path with or without drive letter * OR UNC name */ char szBuffer[(MAX_PATH+1)*2]; char szlBuf[MAX_PATH+1]; int length = strlen(pInName); if (!length) return (char*)pInName; if (length > MAX...
115,048,761,908,517,600,000,000,000,000,000,000,000
vdir.h
154,941,127,898,293,730,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2015-8608
The VDir::MapPathA and VDir::MapPathW functions in Perl 5.22 allow remote attackers to cause a denial of service (out-of-bounds read) and possibly execute arbitrary code via a crafted (1) drive letter or (2) pInName argument.
https://nvd.nist.gov/vuln/detail/CVE-2015-8608
389,930
perl5
52236464559c6e410a4587d3c6da9639e75f3ec1
https://github.com/perl/perl5
https://github.com/Perl/perl5/commit/52236464559c6e410a4587d3c6da9639e75f3ec1#diff-31982a731a0996d0cc82a4ad4e70ad50
avoid invalid memory access in MapPath[AW] This issue was assigned CVE-2015-8608. [perl #126755]
0
char *VDir::MapPathA(const char *pInName) { /* * possiblities -- relative path or absolute path with or without drive letter * OR UNC name */ int driveIndex; char szBuffer[(MAX_PATH+1)*2]; char szlBuf[MAX_PATH+1]; int length = strlen(pInName); if (!length) return (char*)pInName; ...
36,005,704,415,523,320,000,000,000,000,000,000,000
vdir.h
165,167,527,541,240,850,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2015-8608
The VDir::MapPathA and VDir::MapPathW functions in Perl 5.22 allow remote attackers to cause a denial of service (out-of-bounds read) and possibly execute arbitrary code via a crafted (1) drive letter or (2) pInName argument.
https://nvd.nist.gov/vuln/detail/CVE-2015-8608
206,953
perl5
52236464559c6e410a4587d3c6da9639e75f3ec1
https://github.com/perl/perl5
https://github.com/Perl/perl5/commit/52236464559c6e410a4587d3c6da9639e75f3ec1#diff-31982a731a0996d0cc82a4ad4e70ad50
avoid invalid memory access in MapPath[AW] This issue was assigned CVE-2015-8608. [perl #126755]
1
WCHAR* VDir::MapPathW(const WCHAR *pInName) { /* * possiblities -- relative path or absolute path with or without drive letter * OR UNC name */ WCHAR szBuffer[(MAX_PATH+1)*2]; WCHAR szlBuf[MAX_PATH+1]; int length = wcslen(pInName); if (!length) return (WCHAR*)pInName; if (length ...
62,589,287,880,274,420,000,000,000,000,000,000,000
vdir.h
154,941,127,898,293,730,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2015-8608
The VDir::MapPathA and VDir::MapPathW functions in Perl 5.22 allow remote attackers to cause a denial of service (out-of-bounds read) and possibly execute arbitrary code via a crafted (1) drive letter or (2) pInName argument.
https://nvd.nist.gov/vuln/detail/CVE-2015-8608
389,902
perl5
52236464559c6e410a4587d3c6da9639e75f3ec1
https://github.com/perl/perl5
https://github.com/Perl/perl5/commit/52236464559c6e410a4587d3c6da9639e75f3ec1#diff-31982a731a0996d0cc82a4ad4e70ad50
avoid invalid memory access in MapPath[AW] This issue was assigned CVE-2015-8608. [perl #126755]
0
WCHAR* VDir::MapPathW(const WCHAR *pInName) { /* * possiblities -- relative path or absolute path with or without drive letter * OR UNC name */ int driveIndex; WCHAR szBuffer[(MAX_PATH+1)*2]; WCHAR szlBuf[MAX_PATH+1]; int length = wcslen(pInName); if (!length) return (WCHAR*)pInNa...
80,550,285,067,880,080,000,000,000,000,000,000,000
vdir.h
165,167,527,541,240,850,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2015-8608
The VDir::MapPathA and VDir::MapPathW functions in Perl 5.22 allow remote attackers to cause a denial of service (out-of-bounds read) and possibly execute arbitrary code via a crafted (1) drive letter or (2) pInName argument.
https://nvd.nist.gov/vuln/detail/CVE-2015-8608
206,954
linux
979e0d74651ba5aa533277f2a6423d0f982fb6f6
https://github.com/torvalds/linux
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=979e0d74651ba5aa533277f2a6423d0f982fb6f6
KEYS: Make the keyring cycle detector ignore other keyrings of the same name This fixes CVE-2014-0102. The following command sequence produces an oops: keyctl new_session i=`keyctl newring _ses @s` keyctl link @s $i The problem is that search_nested_keyrings() sees two keyrings that have matching type and descri...
1
static int keyring_detect_cycle_iterator(const void *object, void *iterator_data) { struct keyring_search_context *ctx = iterator_data; const struct key *key = keyring_ptr_to_key(object); kenter("{%d}", key->serial); BUG_ON(key != ctx->match_data); ctx->result = ERR_PTR(-EDEADLK); return 1; }
128,482,683,513,504,870,000,000,000,000,000,000,000
keyring.c
275,480,695,098,220,680,000,000,000,000,000,000,000
[ "CWE-310" ]
CVE-2014-0102
The keyring_detect_cycle_iterator function in security/keys/keyring.c in the Linux kernel through 3.13.6 does not properly determine whether keyrings are identical, which allows local users to cause a denial of service (OOPS) via crafted keyctl commands.
https://nvd.nist.gov/vuln/detail/CVE-2014-0102
389,935
linux
979e0d74651ba5aa533277f2a6423d0f982fb6f6
https://github.com/torvalds/linux
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=979e0d74651ba5aa533277f2a6423d0f982fb6f6
KEYS: Make the keyring cycle detector ignore other keyrings of the same name This fixes CVE-2014-0102. The following command sequence produces an oops: keyctl new_session i=`keyctl newring _ses @s` keyctl link @s $i The problem is that search_nested_keyrings() sees two keyrings that have matching type and descri...
0
static int keyring_detect_cycle_iterator(const void *object, void *iterator_data) { struct keyring_search_context *ctx = iterator_data; const struct key *key = keyring_ptr_to_key(object); kenter("{%d}", key->serial); /* We might get a keyring with matching index-key that is nonetheless a * different keyri...
79,685,444,132,400,850,000,000,000,000,000,000,000
keyring.c
243,625,169,342,562,980,000,000,000,000,000,000,000
[ "CWE-310" ]
CVE-2014-0102
The keyring_detect_cycle_iterator function in security/keys/keyring.c in the Linux kernel through 3.13.6 does not properly determine whether keyrings are identical, which allows local users to cause a denial of service (OOPS) via crafted keyctl commands.
https://nvd.nist.gov/vuln/detail/CVE-2014-0102
206,967
linux
350a5c4dd2452ea999cc5e1d4a8dbf12de2f97ef
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=350a5c4dd2452ea999cc5e1d4a8dbf12de2f97ef
bpf: Dont allow vmlinux BTF to be used in map_create and prog_load. The syzbot got FD of vmlinux BTF and passed it into map_create which caused crash in btf_type_id_size() when it tried to access resolved_ids. The vmlinux BTF doesn't have 'resolved_ids' and 'resolved_sizes' initialized to save memory. To avoid such is...
1
static int map_create(union bpf_attr *attr) { int numa_node = bpf_map_attr_numa_node(attr); struct bpf_map *map; int f_flags; int err; err = CHECK_ATTR(BPF_MAP_CREATE); if (err) return -EINVAL; if (attr->btf_vmlinux_value_type_id) { if (attr->map_type != BPF_MAP_TYPE_STRUCT_OPS || attr->btf_key_type_...
90,090,292,461,044,980,000,000,000,000,000,000,000
syscall.c
151,721,738,212,127,580,000,000,000,000,000,000,000
[ "CWE-307" ]
CVE-2021-29648
An issue was discovered in the Linux kernel before 5.11.11. The BPF subsystem does not properly consider that resolved_ids and resolved_sizes are intentionally uninitialized in the vmlinux BPF Type Format (BTF), which can cause a system crash upon an unexpected access attempt (in map_create in kernel/bpf/syscall.c or c...
https://nvd.nist.gov/vuln/detail/CVE-2021-29648
390,176
linux
350a5c4dd2452ea999cc5e1d4a8dbf12de2f97ef
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=350a5c4dd2452ea999cc5e1d4a8dbf12de2f97ef
bpf: Dont allow vmlinux BTF to be used in map_create and prog_load. The syzbot got FD of vmlinux BTF and passed it into map_create which caused crash in btf_type_id_size() when it tried to access resolved_ids. The vmlinux BTF doesn't have 'resolved_ids' and 'resolved_sizes' initialized to save memory. To avoid such is...
0
static int map_create(union bpf_attr *attr) { int numa_node = bpf_map_attr_numa_node(attr); struct bpf_map *map; int f_flags; int err; err = CHECK_ATTR(BPF_MAP_CREATE); if (err) return -EINVAL; if (attr->btf_vmlinux_value_type_id) { if (attr->map_type != BPF_MAP_TYPE_STRUCT_OPS || attr->btf_key_type_...
303,953,661,978,472,140,000,000,000,000,000,000,000
syscall.c
3,667,799,853,197,745,500,000,000,000,000,000,000
[ "CWE-307" ]
CVE-2021-29648
An issue was discovered in the Linux kernel before 5.11.11. The BPF subsystem does not properly consider that resolved_ids and resolved_sizes are intentionally uninitialized in the vmlinux BPF Type Format (BTF), which can cause a system crash upon an unexpected access attempt (in map_create in kernel/bpf/syscall.c or c...
https://nvd.nist.gov/vuln/detail/CVE-2021-29648
206,974
rizin
348b1447d1452f978b69631d6de5b08dd3bdf79d
https://github.com/rizinorg/rizin
https://github.com/rizinorg/rizin/commit/348b1447d1452f978b69631d6de5b08dd3bdf79d
fix #2956 - oob write in mach0.c
1
static bool reconstruct_chained_fixup(struct MACH0_(obj_t) * bin) { if (!bin->dyld_info) { return false; } if (!bin->nsegs) { return false; } bin->nchained_starts = bin->nsegs; bin->chained_starts = RZ_NEWS0(struct rz_dyld_chained_starts_in_segment *, bin->nchained_starts); if (!bin->chained_starts) { retu...
41,009,788,158,222,154,000,000,000,000,000,000,000
mach0.c
86,851,559,453,540,570,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2022-36041
Rizin is a UNIX-like reverse engineering framework and command-line toolset. Versions 0.4.0 and prior are vulnerable to an out-of-bounds write when parsing Mach-O files. A user opening a malicious Mach-O file could be affected by this vulnerability, allowing an attacker to execute code on the user's machine. Commit num...
https://nvd.nist.gov/vuln/detail/CVE-2022-36041
390,336
rizin
348b1447d1452f978b69631d6de5b08dd3bdf79d
https://github.com/rizinorg/rizin
https://github.com/rizinorg/rizin/commit/348b1447d1452f978b69631d6de5b08dd3bdf79d
fix #2956 - oob write in mach0.c
0
static bool reconstruct_chained_fixup(struct MACH0_(obj_t) * bin) { if (!bin->dyld_info) { return false; } if (!bin->nsegs) { return false; } bin->nchained_starts = bin->nsegs; bin->chained_starts = RZ_NEWS0(struct rz_dyld_chained_starts_in_segment *, bin->nchained_starts); if (!bin->chained_starts) { retu...
200,945,192,732,672,400,000,000,000,000,000,000,000
mach0.c
170,161,380,557,820,270,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2022-36041
Rizin is a UNIX-like reverse engineering framework and command-line toolset. Versions 0.4.0 and prior are vulnerable to an out-of-bounds write when parsing Mach-O files. A user opening a malicious Mach-O file could be affected by this vulnerability, allowing an attacker to execute code on the user's machine. Commit num...
https://nvd.nist.gov/vuln/detail/CVE-2022-36041
206,988
php-src
e0f5d62bd6690169998474b62f92a8c5ddf0e699
https://github.com/php/php-src
http://git.php.net/?p=php-src.git;a=commitdiff;h=e0f5d62bd6690169998474b62f92a8c5ddf0e699
Fix bug #77586 - phar_tar_writeheaders_int() buffer overflow
1
static int phar_tar_writeheaders_int(phar_entry_info *entry, void *argument) /* {{{ */ { tar_header header; size_t pos; struct _phar_pass_tar_info *fp = (struct _phar_pass_tar_info *)argument; char padding[512]; if (entry->is_mounted) { return ZEND_HASH_APPLY_KEEP; } if (entry->is_deleted) { if (entry->fp_...
251,145,418,970,253,760,000,000,000,000,000,000,000
tar.c
321,458,594,172,820,750,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2019-9675
An issue was discovered in PHP 7.x before 7.1.27 and 7.3.x before 7.3.3. phar_tar_writeheaders_int in ext/phar/tar.c has a buffer overflow via a long link value. NOTE: The vendor indicates that the link value is used only when an archive contains a symlink, which currently cannot happen: "This issue allows theoretical ...
https://nvd.nist.gov/vuln/detail/CVE-2019-9675
390,506
php-src
e0f5d62bd6690169998474b62f92a8c5ddf0e699
https://github.com/php/php-src
http://git.php.net/?p=php-src.git;a=commitdiff;h=e0f5d62bd6690169998474b62f92a8c5ddf0e699
Fix bug #77586 - phar_tar_writeheaders_int() buffer overflow
0
static int phar_tar_writeheaders_int(phar_entry_info *entry, void *argument) /* {{{ */ { tar_header header; size_t pos; struct _phar_pass_tar_info *fp = (struct _phar_pass_tar_info *)argument; char padding[512]; if (entry->is_mounted) { return ZEND_HASH_APPLY_KEEP; } if (entry->is_deleted) { if (entry->fp_...
323,176,986,328,962,350,000,000,000,000,000,000,000
tar.c
94,396,328,310,616,050,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2019-9675
An issue was discovered in PHP 7.x before 7.1.27 and 7.3.x before 7.3.3. phar_tar_writeheaders_int in ext/phar/tar.c has a buffer overflow via a long link value. NOTE: The vendor indicates that the link value is used only when an archive contains a symlink, which currently cannot happen: "This issue allows theoretical ...
https://nvd.nist.gov/vuln/detail/CVE-2019-9675
206,990
mod_wsgi
d9d5fea585b23991f76532a9b07de7fcd3b649f4
https://github.com/GrahamDumpleton/mod_wsgi
https://github.com/GrahamDumpleton/mod_wsgi/commit/d9d5fea585b23991f76532a9b07de7fcd3b649f4
Local privilege escalation when using daemon mode. (CVE-2014-0240)
1
static void wsgi_setup_access(WSGIDaemonProcess *daemon) { /* Setup the umask for the effective user. */ if (daemon->group->umask != -1) umask(daemon->group->umask); /* Change to chroot environment. */ if (daemon->group->root) { if (chroot(daemon->group->root) == -1) { ap_...
254,013,892,717,063,480,000,000,000,000,000,000,000
mod_wsgi.c
3,915,718,671,020,503,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2014-0240
The mod_wsgi module before 3.5 for Apache, when daemon mode is enabled, does not properly handle error codes returned by setuid when run on certain Linux kernels, which allows local users to gain privileges via vectors related to the number of running processes.
https://nvd.nist.gov/vuln/detail/CVE-2014-0240
390,514
mod_wsgi
d9d5fea585b23991f76532a9b07de7fcd3b649f4
https://github.com/GrahamDumpleton/mod_wsgi
https://github.com/GrahamDumpleton/mod_wsgi/commit/d9d5fea585b23991f76532a9b07de7fcd3b649f4
Local privilege escalation when using daemon mode. (CVE-2014-0240)
0
static void wsgi_setup_access(WSGIDaemonProcess *daemon) { /* Setup the umask for the effective user. */ if (daemon->group->umask != -1) umask(daemon->group->umask); /* Change to chroot environment. */ if (daemon->group->root) { if (chroot(daemon->group->root) == -1) { ap_...
155,947,699,725,272,460,000,000,000,000,000,000,000
mod_wsgi.c
126,965,859,754,709,700,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2014-0240
The mod_wsgi module before 3.5 for Apache, when daemon mode is enabled, does not properly handle error codes returned by setuid when run on certain Linux kernels, which allows local users to gain privileges via vectors related to the number of running processes.
https://nvd.nist.gov/vuln/detail/CVE-2014-0240
206,991
ImageMagick6
5964475e21e7e3bdd27835b71aa17d1678c21d7c
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/5964475e21e7e3bdd27835b71aa17d1678c21d7c
...
1
static Image *ReadXWDImage(const ImageInfo *image_info,ExceptionInfo *exception) { #define CheckOverflowException(length,width,height) \ (((height) != 0) && ((length)/((size_t) height) != ((size_t) width))) char *comment; Image *image; IndexPacket index; int x_status; MagickBooleanType ...
30,591,964,066,131,930,000,000,000,000,000,000,000
None
null
[ "CWE-772" ]
CVE-2017-11166
The ReadXWDImage function in coders\xwd.c in ImageMagick 7.0.5-6 has a memory leak vulnerability that can cause memory exhaustion via a crafted length (number of color-map entries) field in the header of an XWD file.
https://nvd.nist.gov/vuln/detail/CVE-2017-11166
390,515
ImageMagick6
5964475e21e7e3bdd27835b71aa17d1678c21d7c
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/5964475e21e7e3bdd27835b71aa17d1678c21d7c
...
0
static Image *ReadXWDImage(const ImageInfo *image_info,ExceptionInfo *exception) { #define CheckOverflowException(length,width,height) \ (((height) != 0) && ((length)/((size_t) height) != ((size_t) width))) char *comment; Image *image; IndexPacket index; int x_status; MagickBooleanType ...
160,157,137,040,557,780,000,000,000,000,000,000,000
None
null
[ "CWE-772" ]
CVE-2017-11166
The ReadXWDImage function in coders\xwd.c in ImageMagick 7.0.5-6 has a memory leak vulnerability that can cause memory exhaustion via a crafted length (number of color-map entries) field in the header of an XWD file.
https://nvd.nist.gov/vuln/detail/CVE-2017-11166
207,005
cyrus-imapd
673ebd96e2efbb8895d08648983377262f35b3f7
https://github.com/cyrusimap/cyrus-imapd
https://github.com/cyrusimap/cyrus-imapd/commit/673ebd96e2efbb8895d08648983377262f35b3f7
lmtp_sieve: don't create mailbox with admin for sieve autocreate
1
static int autosieve_createfolder(const char *userid, const struct auth_state *auth_state, const char *internalname, int createsievefolder) { const char *subf ; int r = 0; int n; /* Check if internalname or userid are NULL */ if (userid == NULL || internalname == N...
267,878,132,276,888,530,000,000,000,000,000,000,000
lmtp_sieve.c
57,165,382,720,312,340,000,000,000,000,000,000,000
[ "CWE-269" ]
CVE-2019-19783
An issue was discovered in Cyrus IMAP before 2.5.15, 3.0.x before 3.0.13, and 3.1.x through 3.1.8. If sieve script uploading is allowed (3.x) or certain non-default sieve options are enabled (2.x), a user with a mail account on the service can use a sieve script containing a fileinto directive to create any mailbox wit...
https://nvd.nist.gov/vuln/detail/CVE-2019-19783
390,769
cyrus-imapd
673ebd96e2efbb8895d08648983377262f35b3f7
https://github.com/cyrusimap/cyrus-imapd
https://github.com/cyrusimap/cyrus-imapd/commit/673ebd96e2efbb8895d08648983377262f35b3f7
lmtp_sieve: don't create mailbox with admin for sieve autocreate
0
static int autosieve_createfolder(const char *userid, const struct auth_state *auth_state, const char *internalname, int createsievefolder) { const char *subf ; int r = 0; int n; /* Check if internalname or userid are NULL */ if (userid == NULL || internalname == N...
319,996,549,572,299,550,000,000,000,000,000,000,000
lmtp_sieve.c
318,699,702,142,660,900,000,000,000,000,000,000,000
[ "CWE-269" ]
CVE-2019-19783
An issue was discovered in Cyrus IMAP before 2.5.15, 3.0.x before 3.0.13, and 3.1.x through 3.1.8. If sieve script uploading is allowed (3.x) or certain non-default sieve options are enabled (2.x), a user with a mail account on the service can use a sieve script containing a fileinto directive to create any mailbox wit...
https://nvd.nist.gov/vuln/detail/CVE-2019-19783
207,034
linux
9804501fa1228048857910a6bf23e085aade37cc
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9804501fa1228048857910a6bf23e085aade37cc
appletalk: Fix potential NULL pointer dereference in unregister_snap_client register_snap_client may return NULL, all the callers check it, but only print a warning. This will result in NULL pointer dereference in unregister_snap_client and other places. It has always been used like this since v2.6 Reported-by: Dan ...
1
static int __init atalk_init(void) { int rc; rc = proto_register(&ddp_proto, 0); if (rc) goto out; rc = sock_register(&atalk_family_ops); if (rc) goto out_proto; ddp_dl = register_snap_client(ddp_snap_id, atalk_rcv); if (!ddp_dl) printk(atalk_err_snap); dev_add_pack(&ltalk_packet_type); dev_add_pack(...
122,742,628,362,577,500,000,000,000,000,000,000,000
ddp.c
131,537,965,830,474,130,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2019-19227
In the AppleTalk subsystem in the Linux kernel before 5.1, there is a potential NULL pointer dereference because register_snap_client may return NULL. This will lead to denial of service in net/appletalk/aarp.c and net/appletalk/ddp.c, as demonstrated by unregister_snap_client, aka CID-9804501fa122.
https://nvd.nist.gov/vuln/detail/CVE-2019-19227
390,974
linux
9804501fa1228048857910a6bf23e085aade37cc
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9804501fa1228048857910a6bf23e085aade37cc
appletalk: Fix potential NULL pointer dereference in unregister_snap_client register_snap_client may return NULL, all the callers check it, but only print a warning. This will result in NULL pointer dereference in unregister_snap_client and other places. It has always been used like this since v2.6 Reported-by: Dan ...
0
static int __init atalk_init(void) { int rc; rc = proto_register(&ddp_proto, 0); if (rc) goto out; rc = sock_register(&atalk_family_ops); if (rc) goto out_proto; ddp_dl = register_snap_client(ddp_snap_id, atalk_rcv); if (!ddp_dl) { pr_crit("Unable to register DDP with SNAP.\n"); goto out_sock; } de...
172,311,756,083,897,000,000,000,000,000,000,000,000
ddp.c
312,427,192,633,618,670,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2019-19227
In the AppleTalk subsystem in the Linux kernel before 5.1, there is a potential NULL pointer dereference because register_snap_client may return NULL. This will lead to denial of service in net/appletalk/aarp.c and net/appletalk/ddp.c, as demonstrated by unregister_snap_client, aka CID-9804501fa122.
https://nvd.nist.gov/vuln/detail/CVE-2019-19227
207,035
linux
9804501fa1228048857910a6bf23e085aade37cc
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9804501fa1228048857910a6bf23e085aade37cc
appletalk: Fix potential NULL pointer dereference in unregister_snap_client register_snap_client may return NULL, all the callers check it, but only print a warning. This will result in NULL pointer dereference in unregister_snap_client and other places. It has always been used like this since v2.6 Reported-by: Dan ...
1
void __init aarp_proto_init(void) { aarp_dl = register_snap_client(aarp_snap_id, aarp_rcv); if (!aarp_dl) printk(KERN_CRIT "Unable to register AARP with SNAP.\n"); timer_setup(&aarp_timer, aarp_expire_timeout, 0); aarp_timer.expires = jiffies + sysctl_aarp_expiry_time; add_timer(&aarp_timer); register_netdevic...
338,830,975,253,692,840,000,000,000,000,000,000,000
aarp.c
196,903,643,527,461,750,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2019-19227
In the AppleTalk subsystem in the Linux kernel before 5.1, there is a potential NULL pointer dereference because register_snap_client may return NULL. This will lead to denial of service in net/appletalk/aarp.c and net/appletalk/ddp.c, as demonstrated by unregister_snap_client, aka CID-9804501fa122.
https://nvd.nist.gov/vuln/detail/CVE-2019-19227
390,982
linux
9804501fa1228048857910a6bf23e085aade37cc
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9804501fa1228048857910a6bf23e085aade37cc
appletalk: Fix potential NULL pointer dereference in unregister_snap_client register_snap_client may return NULL, all the callers check it, but only print a warning. This will result in NULL pointer dereference in unregister_snap_client and other places. It has always been used like this since v2.6 Reported-by: Dan ...
0
int __init aarp_proto_init(void) { int rc; aarp_dl = register_snap_client(aarp_snap_id, aarp_rcv); if (!aarp_dl) { printk(KERN_CRIT "Unable to register AARP with SNAP.\n"); return -ENOMEM; } timer_setup(&aarp_timer, aarp_expire_timeout, 0); aarp_timer.expires = jiffies + sysctl_aarp_expiry_time; add_timer(...
233,299,009,758,736,420,000,000,000,000,000,000,000
aarp.c
205,034,451,625,910,630,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2019-19227
In the AppleTalk subsystem in the Linux kernel before 5.1, there is a potential NULL pointer dereference because register_snap_client may return NULL. This will lead to denial of service in net/appletalk/aarp.c and net/appletalk/ddp.c, as demonstrated by unregister_snap_client, aka CID-9804501fa122.
https://nvd.nist.gov/vuln/detail/CVE-2019-19227
207,058
ghostpdl
027c546e0dd11e0526f1780a7f3c2c66acffe209
https://github.com/ArtifexSoftware/ghostpdl
http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=027c546e0dd11e0526f1780a7f3c2c66acffe209
Bug 701842: Fix misindexing in gxicolor.c We were incorrectly decrementing position per-component, rather than per-pixel (in 2 places). Also, take care of some whitespace oddities.
1
image_render_color_thresh(gx_image_enum *penum_orig, const byte *buffer, int data_x, uint w, int h, gx_device * dev) { gx_image_enum *penum = penum_orig; /* const within proc */ image_posture posture = penum->posture; int vdi; /* amounts to replicate */ fixed xrun = 0; byt...
28,360,836,000,754,110,000,000,000,000,000,000,000
gxicolor.c
271,600,152,451,303,360,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2020-16304
A buffer overflow vulnerability in image_render_color_thresh() in base/gxicolor.c of Artifex Software GhostScript v9.50 allows a remote attacker to escalate privileges via a crafted eps file. This is fixed in v9.51.
https://nvd.nist.gov/vuln/detail/CVE-2020-16304
391,443
ghostpdl
027c546e0dd11e0526f1780a7f3c2c66acffe209
https://github.com/ArtifexSoftware/ghostpdl
http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=027c546e0dd11e0526f1780a7f3c2c66acffe209
Bug 701842: Fix misindexing in gxicolor.c We were incorrectly decrementing position per-component, rather than per-pixel (in 2 places). Also, take care of some whitespace oddities.
0
image_render_color_thresh(gx_image_enum *penum_orig, const byte *buffer, int data_x, uint w, int h, gx_device * dev) { gx_image_enum *penum = penum_orig; /* const within proc */ image_posture posture = penum->posture; int vdi; /* amounts to replicate */ fixed xrun = 0; byt...
165,674,750,779,607,660,000,000,000,000,000,000,000
gxicolor.c
227,681,177,728,911,430,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2020-16304
A buffer overflow vulnerability in image_render_color_thresh() in base/gxicolor.c of Artifex Software GhostScript v9.50 allows a remote attacker to escalate privileges via a crafted eps file. This is fixed in v9.51.
https://nvd.nist.gov/vuln/detail/CVE-2020-16304
207,062
libdwarf-code
7ef09e1fc9ba07653dd078edb2408631c7969162
https://github.com/davea42/libdwarf-code
https://github.com/davea42/libdwarf-code/commit/7ef09e1fc9ba07653dd078edb2408631c7969162
Fixes old bug(which could result in Denial of Service) due to a missing check before reading the 8 bytes of a DW_FORM_ref_sig8. DW202206-001 modified: src/lib/libdwarf/dwarf_form.c
1
dwarf_global_formref_b(Dwarf_Attribute attr, Dwarf_Off * ret_offset, Dwarf_Bool * offset_is_info, Dwarf_Error * error) { Dwarf_Debug dbg = 0; Dwarf_Unsigned offset = 0; Dwarf_CU_Context cu_context = 0; Dwarf_Half context_version = 0; Dwarf_Byte_Ptr section_end = 0; Dwarf_Bool is_info...
89,795,525,620,056,720,000,000,000,000,000,000,000
dwarf_form.c
228,293,279,858,083,700,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2022-34299
There is a heap-based buffer over-read in libdwarf 0.4.0. This issue is related to dwarf_global_formref_b.
https://nvd.nist.gov/vuln/detail/CVE-2022-34299
391,582
libdwarf-code
7ef09e1fc9ba07653dd078edb2408631c7969162
https://github.com/davea42/libdwarf-code
https://github.com/davea42/libdwarf-code/commit/7ef09e1fc9ba07653dd078edb2408631c7969162
Fixes old bug(which could result in Denial of Service) due to a missing check before reading the 8 bytes of a DW_FORM_ref_sig8. DW202206-001 modified: src/lib/libdwarf/dwarf_form.c
0
dwarf_global_formref_b(Dwarf_Attribute attr, Dwarf_Off * ret_offset, Dwarf_Bool * offset_is_info, Dwarf_Error * error) { Dwarf_Debug dbg = 0; Dwarf_Unsigned offset = 0; Dwarf_CU_Context cu_context = 0; Dwarf_Half context_version = 0; Dwarf_Byte_Ptr section_end = 0; Dwarf_Bool is_info...
20,406,051,189,774,834,000,000,000,000,000,000,000
dwarf_form.c
223,310,352,218,560,900,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2022-34299
There is a heap-based buffer over-read in libdwarf 0.4.0. This issue is related to dwarf_global_formref_b.
https://nvd.nist.gov/vuln/detail/CVE-2022-34299
207,063
linux
91efafb1dd8f471177a3dddb4841d75d3df1cc46
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=91efafb1dd8f471177a3dddb4841d75d3df1cc46
lib/vsprintf: Replace space with '_' before crng is ready Before crng is ready, output of "%p" composes of "(ptrval)" and left padding spaces for alignment as no random address can be generated. This seems a little strange when default string width is larger than strlen("(ptrval)"). For example, when irq domain names...
1
static char *ptr_to_id(char *buf, char *end, void *ptr, struct printf_spec spec) { unsigned long hashval; if (unlikely(!have_filled_random_ptr_key)) { spec.field_width = 2 * sizeof(ptr); /* string length must be less than default_width */ return string(buf, end, "(ptrval)", spec); } #ifdef CONFIG_64BIT hash...
195,626,724,284,903,000,000,000,000,000,000,000,000
vsprintf.c
321,161,672,495,797,700,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2018-20449
The hidma_chan_stats function in drivers/dma/qcom/hidma_dbg.c in the Linux kernel 4.14.90 allows local users to obtain sensitive address information by reading "callback=" lines in a debugfs file.
https://nvd.nist.gov/vuln/detail/CVE-2018-20449
391,600
linux
91efafb1dd8f471177a3dddb4841d75d3df1cc46
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=91efafb1dd8f471177a3dddb4841d75d3df1cc46
lib/vsprintf: Replace space with '_' before crng is ready Before crng is ready, output of "%p" composes of "(ptrval)" and left padding spaces for alignment as no random address can be generated. This seems a little strange when default string width is larger than strlen("(ptrval)"). For example, when irq domain names...
0
static char *ptr_to_id(char *buf, char *end, void *ptr, struct printf_spec spec) { const char *str = sizeof(ptr) == 8 ? "(____ptrval____)" : "(ptrval)"; unsigned long hashval; if (unlikely(!have_filled_random_ptr_key)) { spec.field_width = 2 * sizeof(ptr); /* string length must be less than default_width */ r...
131,630,973,177,241,010,000,000,000,000,000,000,000
vsprintf.c
33,348,255,431,871,095,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2018-20449
The hidma_chan_stats function in drivers/dma/qcom/hidma_dbg.c in the Linux kernel 4.14.90 allows local users to obtain sensitive address information by reading "callback=" lines in a debugfs file.
https://nvd.nist.gov/vuln/detail/CVE-2018-20449
207,067
poppler
ae614bf8ab42c9d0c7ac57ecdfdcbcfc4ff6c639
https://github.com/freedesktop/poppler
https://gitlab.freedesktop.org/poppler/poppler/-/commit/ae614bf8ab42c9d0c7ac57ecdfdcbcfc4ff6c639
Fix DCTStream::getChars we're reading past the buffer check I wonder how this had never crashed before :S Fixes #1011
1
int DCTStream::getChars(int nChars, unsigned char *buffer) { for (int i = 0; i < nChars;) { if (current == limit) { if (!readLine()) return i; } int left = limit - current; if (nChars < left) left = nChars; memcpy(buffer + i, current, l...
124,734,274,314,785,340,000,000,000,000,000,000
DCTStream.cc
93,715,544,098,292,490,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2020-35702
DCTStream::getChars in DCTStream.cc in Poppler 20.12.1 has a heap-based buffer overflow via a crafted PDF document. NOTE: later reports indicate that this only affects builds from Poppler git clones in late December 2020, not the 20.12.1 release. In this situation, it should NOT be considered a Poppler vulnerability. H...
https://nvd.nist.gov/vuln/detail/CVE-2020-35702
391,625
poppler
ae614bf8ab42c9d0c7ac57ecdfdcbcfc4ff6c639
https://github.com/freedesktop/poppler
https://gitlab.freedesktop.org/poppler/poppler/-/commit/ae614bf8ab42c9d0c7ac57ecdfdcbcfc4ff6c639
Fix DCTStream::getChars we're reading past the buffer check I wonder how this had never crashed before :S Fixes #1011
0
int DCTStream::getChars(int nChars, unsigned char *buffer) { for (int i = 0; i < nChars;) { if (current == limit) { if (!readLine()) return i; } int left = limit - current; if (left + i > nChars) left = nChars - i; memcpy(buffer + i, cu...
298,044,836,669,523,720,000,000,000,000,000,000,000
DCTStream.cc
225,161,806,091,866,600,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2020-35702
DCTStream::getChars in DCTStream.cc in Poppler 20.12.1 has a heap-based buffer overflow via a crafted PDF document. NOTE: later reports indicate that this only affects builds from Poppler git clones in late December 2020, not the 20.12.1 release. In this situation, it should NOT be considered a Poppler vulnerability. H...
https://nvd.nist.gov/vuln/detail/CVE-2020-35702
207,076
curl
0b664ba968437715819bfe4c7ada5679d16ebbc3
https://github.com/curl/curl
https://github.com/curl/curl/commit/0b664ba968437715819bfe4c7ada5679d16ebbc3
wildcardmatch: fix heap buffer overflow in setcharset The code would previous read beyond the end of the pattern string if the match pattern ends with an open bracket when the default pattern matching function is used. Detected by OSS-Fuzz: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=4161 CVE-2017-8817 Bu...
1
static int setcharset(unsigned char **p, unsigned char *charset) { setcharset_state state = CURLFNM_SCHS_DEFAULT; unsigned char rangestart = 0; unsigned char lastchar = 0; bool something_found = FALSE; unsigned char c; for(;;) { c = **p; switch(state) { case CURLFNM_SCHS_DEFAULT: if(ISAL...
59,267,346,305,676,200,000,000,000,000,000,000,000
curl_fnmatch.c
70,545,915,287,016,530,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-8817
The FTP wildcard function in curl and libcurl before 7.57.0 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) or possibly have unspecified other impact via a string that ends with an '[' character.
https://nvd.nist.gov/vuln/detail/CVE-2017-8817
391,689
curl
0b664ba968437715819bfe4c7ada5679d16ebbc3
https://github.com/curl/curl
https://github.com/curl/curl/commit/0b664ba968437715819bfe4c7ada5679d16ebbc3
wildcardmatch: fix heap buffer overflow in setcharset The code would previous read beyond the end of the pattern string if the match pattern ends with an open bracket when the default pattern matching function is used. Detected by OSS-Fuzz: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=4161 CVE-2017-8817 Bu...
0
static int setcharset(unsigned char **p, unsigned char *charset) { setcharset_state state = CURLFNM_SCHS_DEFAULT; unsigned char rangestart = 0; unsigned char lastchar = 0; bool something_found = FALSE; unsigned char c; for(;;) { c = **p; if(!c) return SETCHARSET_FAIL; switch(state) { ...
181,294,438,558,738,200,000,000,000,000,000,000,000
curl_fnmatch.c
321,471,728,171,742,660,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-8817
The FTP wildcard function in curl and libcurl before 7.57.0 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) or possibly have unspecified other impact via a string that ends with an '[' character.
https://nvd.nist.gov/vuln/detail/CVE-2017-8817
207,080
glib
d8f8f4d637ce43f8699ba94c9b7648beda0ca174
https://gitlab.gnome.org/GNOME/glib
https://gitlab.gnome.org/GNOME/glib/commit/d8f8f4d637ce43f8699ba94c9b7648beda0ca174
gfile: Limit access to files when copying file_copy_fallback creates new files with default permissions and set the correct permissions after the operation is finished. This might cause that the files can be accessible by more users during the operation than expected. Use G_FILE_CREATE_PRIVATE for the new files to lim...
1
file_copy_fallback (GFile *source, GFile *destination, GFileCopyFlags flags, GCancellable *cancellable, GFileProgressCallback progress_callback, gpointer ...
95,538,858,328,680,170,000,000,000,000,000,000,000
gfile.c
232,282,345,857,478,900,000,000,000,000,000,000,000
[ "CWE-362" ]
CVE-2019-12450
file_copy_fallback in gio/gfile.c in GNOME GLib 2.15.0 through 2.61.1 does not properly restrict file permissions while a copy operation is in progress. Instead, default permissions are used.
https://nvd.nist.gov/vuln/detail/CVE-2019-12450
392,113
glib
d8f8f4d637ce43f8699ba94c9b7648beda0ca174
https://gitlab.gnome.org/GNOME/glib
https://gitlab.gnome.org/GNOME/glib/commit/d8f8f4d637ce43f8699ba94c9b7648beda0ca174
gfile: Limit access to files when copying file_copy_fallback creates new files with default permissions and set the correct permissions after the operation is finished. This might cause that the files can be accessible by more users during the operation than expected. Use G_FILE_CREATE_PRIVATE for the new files to lim...
0
file_copy_fallback (GFile *source, GFile *destination, GFileCopyFlags flags, GCancellable *cancellable, GFileProgressCallback progress_callback, gpointer ...
10,010,926,976,249,910,000,000,000,000,000,000,000
gfile.c
245,006,577,661,034,730,000,000,000,000,000,000,000
[ "CWE-362" ]
CVE-2019-12450
file_copy_fallback in gio/gfile.c in GNOME GLib 2.15.0 through 2.61.1 does not properly restrict file permissions while a copy operation is in progress. Instead, default permissions are used.
https://nvd.nist.gov/vuln/detail/CVE-2019-12450
207,081
gstreamer
9398b7f1a75b38844ae7050b5a7967e4cdebe24f
https://github.com/GStreamer/gstreamer
https://github.com/GStreamer/gstreamer/commit/9398b7f1a75b38844ae7050b5a7967e4cdebe24f
datetime: fix potential out-of-bound read on malformed datetime string https://bugzilla.gnome.org/show_bug.cgi?id=777263
1
gst_date_time_new_from_iso8601_string (const gchar * string) { gint year = -1, month = -1, day = -1, hour = -1, minute = -1; gint gmt_offset_hour = -99, gmt_offset_min = -99; gdouble second = -1.0; gfloat tzoffset = 0.0; guint64 usecs; gint len, ret; g_return_val_if_fail (string != NULL, NULL); GST_DE...
260,351,361,235,967,850,000,000,000,000,000,000,000
gstdatetime.c
104,242,030,389,358,220,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-5838
The gst_date_time_new_from_iso8601_string function in gst/gstdatetime.c in GStreamer before 1.10.3 allows remote attackers to cause a denial of service (out-of-bounds heap read) via a malformed datetime string.
https://nvd.nist.gov/vuln/detail/CVE-2017-5838
392,156
gstreamer
9398b7f1a75b38844ae7050b5a7967e4cdebe24f
https://github.com/GStreamer/gstreamer
https://github.com/GStreamer/gstreamer/commit/9398b7f1a75b38844ae7050b5a7967e4cdebe24f
datetime: fix potential out-of-bound read on malformed datetime string https://bugzilla.gnome.org/show_bug.cgi?id=777263
0
gst_date_time_new_from_iso8601_string (const gchar * string) { gint year = -1, month = -1, day = -1, hour = -1, minute = -1; gint gmt_offset_hour = -99, gmt_offset_min = -99; gdouble second = -1.0; gfloat tzoffset = 0.0; guint64 usecs; gint len, ret; g_return_val_if_fail (string != NULL, NULL); GST_DE...
114,425,864,831,581,950,000,000,000,000,000,000,000
gstdatetime.c
166,779,981,257,063,190,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2017-5838
The gst_date_time_new_from_iso8601_string function in gst/gstdatetime.c in GStreamer before 1.10.3 allows remote attackers to cause a denial of service (out-of-bounds heap read) via a malformed datetime string.
https://nvd.nist.gov/vuln/detail/CVE-2017-5838
207,102
linux
1acb8f2a7a9f10543868ddd737e37424d5c36cf4
https://github.com/torvalds/linux
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1acb8f2a7a9f10543868ddd737e37424d5c36cf4
net: qlogic: Fix memory leak in ql_alloc_large_buffers In ql_alloc_large_buffers, a new skb is allocated via netdev_alloc_skb. This skb should be released if pci_dma_mapping_error fails. Fixes: 0f8ab89e825f ("qla3xxx: Check return code from pci_map_single() in ql_release_to_lrg_buf_free_list(), ql_populate_free_queue...
1
static int ql_alloc_large_buffers(struct ql3_adapter *qdev) { int i; struct ql_rcv_buf_cb *lrg_buf_cb; struct sk_buff *skb; dma_addr_t map; int err; for (i = 0; i < qdev->num_large_buffers; i++) { skb = netdev_alloc_skb(qdev->ndev, qdev->lrg_buffer_len); if (unlikely(!skb)) { /* Better luck ne...
164,113,418,536,327,850,000,000,000,000,000,000,000
None
null
[ "CWE-401" ]
CVE-2019-18806
A memory leak in the ql_alloc_large_buffers() function in drivers/net/ethernet/qlogic/qla3xxx.c in the Linux kernel before 5.3.5 allows local users to cause a denial of service (memory consumption) by triggering pci_dma_mapping_error() failures, aka CID-1acb8f2a7a9f.
https://nvd.nist.gov/vuln/detail/CVE-2019-18806
392,530
linux
1acb8f2a7a9f10543868ddd737e37424d5c36cf4
https://github.com/torvalds/linux
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1acb8f2a7a9f10543868ddd737e37424d5c36cf4
net: qlogic: Fix memory leak in ql_alloc_large_buffers In ql_alloc_large_buffers, a new skb is allocated via netdev_alloc_skb. This skb should be released if pci_dma_mapping_error fails. Fixes: 0f8ab89e825f ("qla3xxx: Check return code from pci_map_single() in ql_release_to_lrg_buf_free_list(), ql_populate_free_queue...
0
static int ql_alloc_large_buffers(struct ql3_adapter *qdev) { int i; struct ql_rcv_buf_cb *lrg_buf_cb; struct sk_buff *skb; dma_addr_t map; int err; for (i = 0; i < qdev->num_large_buffers; i++) { skb = netdev_alloc_skb(qdev->ndev, qdev->lrg_buffer_len); if (unlikely(!skb)) { /* Better luck ne...
319,131,137,887,923,550,000,000,000,000,000,000,000
None
null
[ "CWE-401" ]
CVE-2019-18806
A memory leak in the ql_alloc_large_buffers() function in drivers/net/ethernet/qlogic/qla3xxx.c in the Linux kernel before 5.3.5 allows local users to cause a denial of service (memory consumption) by triggering pci_dma_mapping_error() failures, aka CID-1acb8f2a7a9f.
https://nvd.nist.gov/vuln/detail/CVE-2019-18806
207,103
gnutls
6e76e9b9fa845b76b0b9a45f05f4b54a052578ff
http://git.savannah.gnu.org/cgit/gnutls
https://gitlab.com/gnutls/gnutls/commit/6e76e9b9fa845b76b0b9a45f05f4b54a052578ff
on certificate import check whether the two signature algorithms match
1
gnutls_x509_crt_import(gnutls_x509_crt_t cert, const gnutls_datum_t * data, gnutls_x509_crt_fmt_t format) { int result = 0; int version; if (cert == NULL) { gnutls_assert(); return GNUTLS_E_INVALID_REQUEST; } if (cert->der.data) { gnutls_free(cert->der.data); cert->der.data = NULL; } ...
183,164,973,415,819,150,000,000,000,000,000,000,000
None
null
[ "CWE-295" ]
CVE-2015-0294
GnuTLS before 3.3.13 does not validate that the signature algorithms match when importing a certificate.
https://nvd.nist.gov/vuln/detail/CVE-2015-0294
392,616
gnutls
6e76e9b9fa845b76b0b9a45f05f4b54a052578ff
http://git.savannah.gnu.org/cgit/gnutls
https://gitlab.com/gnutls/gnutls/commit/6e76e9b9fa845b76b0b9a45f05f4b54a052578ff
on certificate import check whether the two signature algorithms match
0
gnutls_x509_crt_import(gnutls_x509_crt_t cert, const gnutls_datum_t * data, gnutls_x509_crt_fmt_t format) { int result = 0; int version, s2; if (cert == NULL) { gnutls_assert(); return GNUTLS_E_INVALID_REQUEST; } if (cert->der.data) { gnutls_free(cert->der.data); cert->der.data = NULL; ...
324,205,378,820,005,460,000,000,000,000,000,000,000
None
null
[ "CWE-295" ]
CVE-2015-0294
GnuTLS before 3.3.13 does not validate that the signature algorithms match when importing a certificate.
https://nvd.nist.gov/vuln/detail/CVE-2015-0294
207,140
ImageMagick
216d117f05bff87b9dc4db55a1b1fadb38bcb786
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/216d117f05bff87b9dc4db55a1b1fadb38bcb786
XBM coder leaves the hex image data uninitialized if hex value of the pixel is negative
1
static Image *ReadXBMImage(const ImageInfo *image_info,ExceptionInfo *exception) { char buffer[MagickPathExtent], name[MagickPathExtent]; Image *image; int c; MagickBooleanType status; register ssize_t i, x; register Quantum *q; register unsigned char *p; short...
256,699,559,025,187,470,000,000,000,000,000,000,000
None
null
[ "CWE-703" ]
CVE-2018-16323
ReadXBMImage in coders/xbm.c in ImageMagick before 7.0.8-9 leaves data uninitialized when processing an XBM file that has a negative pixel value. If the affected code is used as a library loaded into a process that includes sensitive information, that information sometimes can be leaked via the image data.
https://nvd.nist.gov/vuln/detail/CVE-2018-16323
393,352
ImageMagick
216d117f05bff87b9dc4db55a1b1fadb38bcb786
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/216d117f05bff87b9dc4db55a1b1fadb38bcb786
XBM coder leaves the hex image data uninitialized if hex value of the pixel is negative
0
static Image *ReadXBMImage(const ImageInfo *image_info,ExceptionInfo *exception) { char buffer[MagickPathExtent], name[MagickPathExtent]; Image *image; int c; MagickBooleanType status; register ssize_t i, x; register Quantum *q; register unsigned char *p; short...
252,164,396,504,909,130,000,000,000,000,000,000,000
None
null
[ "CWE-703" ]
CVE-2018-16323
ReadXBMImage in coders/xbm.c in ImageMagick before 7.0.8-9 leaves data uninitialized when processing an XBM file that has a negative pixel value. If the affected code is used as a library loaded into a process that includes sensitive information, that information sometimes can be leaked via the image data.
https://nvd.nist.gov/vuln/detail/CVE-2018-16323
207,149
linux
9d538fa60bad4f7b23193c89e843797a1cf71ef3
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9d538fa60bad4f7b23193c89e843797a1cf71ef3
net: Set sk_prot_creator when cloning sockets to the right proto sk->sk_prot and sk->sk_prot_creator can differ when the app uses IPV6_ADDRFORM (transforming an IPv6-socket to an IPv4-one). Which is why sk_prot_creator is there to make sure that sk_prot_free() does the kmem_cache_free() on the right kmem_cache slab. ...
1
struct sock *sk_clone_lock(const struct sock *sk, const gfp_t priority) { struct sock *newsk; bool is_charged = true; newsk = sk_prot_alloc(sk->sk_prot, priority, sk->sk_family); if (newsk != NULL) { struct sk_filter *filter; sock_copy(newsk, sk); /* SANITY */ if (likely(newsk->sk_net_refcnt)) get_net...
237,789,181,741,003,840,000,000,000,000,000,000,000
sock.c
80,948,183,003,052,040,000,000,000,000,000,000,000
[ "CWE-704" ]
CVE-2018-9568
In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-113509306. References: Upst...
https://nvd.nist.gov/vuln/detail/CVE-2018-9568
393,425
linux
9d538fa60bad4f7b23193c89e843797a1cf71ef3
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9d538fa60bad4f7b23193c89e843797a1cf71ef3
net: Set sk_prot_creator when cloning sockets to the right proto sk->sk_prot and sk->sk_prot_creator can differ when the app uses IPV6_ADDRFORM (transforming an IPv6-socket to an IPv4-one). Which is why sk_prot_creator is there to make sure that sk_prot_free() does the kmem_cache_free() on the right kmem_cache slab. ...
0
struct sock *sk_clone_lock(const struct sock *sk, const gfp_t priority) { struct sock *newsk; bool is_charged = true; newsk = sk_prot_alloc(sk->sk_prot, priority, sk->sk_family); if (newsk != NULL) { struct sk_filter *filter; sock_copy(newsk, sk); newsk->sk_prot_creator = sk->sk_prot; /* SANITY */ if ...
160,894,355,119,491,430,000,000,000,000,000,000,000
sock.c
92,137,101,248,922,770,000,000,000,000,000,000,000
[ "CWE-704" ]
CVE-2018-9568
In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-113509306. References: Upst...
https://nvd.nist.gov/vuln/detail/CVE-2018-9568
207,155
ghostpdl
eaba1d97b62831b42c51840cc8ee2bc4576c942e
https://github.com/ArtifexSoftware/ghostpdl
https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=eaba1d97b62831b42c51840cc8ee2bc4576c942e
Bug 701828: make dot24_print_page() return error instead of divide by zero. Fixes: ./sanbin/gs -dBATCH -dNOPAUSE -dSAFER -r2 -sOutputFile=tmp -sDEVICE=necp6 ../bug-701828.pdf
1
dot24_print_page (gx_device_printer *pdev, gp_file *prn_stream, char *init_string, int init_len) { int xres = (int)pdev->x_pixels_per_inch; int yres = (int)pdev->y_pixels_per_inch; int x_high = (xres == 360); int y_high = (yres == 360); int bits_per_column = (y_high ? 48 : 24); uint line_size = gdev_prn_ras...
45,783,720,502,370,160,000,000,000,000,000,000,000
gdevdm24.c
104,054,192,628,023,980,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2020-16310
A division by zero vulnerability in dot24_print_page() in devices/gdevdm24.c of Artifex Software GhostScript v9.50 allows a remote attacker to cause a denial of service via a crafted PDF file. This is fixed in v9.51.
https://nvd.nist.gov/vuln/detail/CVE-2020-16310
393,588
ghostpdl
eaba1d97b62831b42c51840cc8ee2bc4576c942e
https://github.com/ArtifexSoftware/ghostpdl
https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=eaba1d97b62831b42c51840cc8ee2bc4576c942e
Bug 701828: make dot24_print_page() return error instead of divide by zero. Fixes: ./sanbin/gs -dBATCH -dNOPAUSE -dSAFER -r2 -sOutputFile=tmp -sDEVICE=necp6 ../bug-701828.pdf
0
dot24_print_page (gx_device_printer *pdev, gp_file *prn_stream, char *init_string, int init_len) { int xres; int yres; int x_high; int y_high; int bits_per_column; uint line_size; uint in_size; byte *in; uint out_size; byte *out; int y_passes; int dots_per_space; int bytes_per_space; int ski...
279,538,896,050,443,500,000,000,000,000,000,000,000
gdevdm24.c
310,514,458,205,069,550,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2020-16310
A division by zero vulnerability in dot24_print_page() in devices/gdevdm24.c of Artifex Software GhostScript v9.50 allows a remote attacker to cause a denial of service via a crafted PDF file. This is fixed in v9.51.
https://nvd.nist.gov/vuln/detail/CVE-2020-16310
207,159
linux
9060cb719e61b685ec0102574e10337fa5f445ea
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9060cb719e61b685ec0102574e10337fa5f445ea
net: crypto set sk to NULL when af_alg_release. KASAN has found use-after-free in sockfs_setattr. The existed commit 6d8c50dcb029 ("socket: close race condition between sock_close() and sockfs_setattr()") is to fix this simillar issue, but it seems to ignore that crypto module forgets to set the sk to NULL after af_al...
1
int af_alg_release(struct socket *sock) { if (sock->sk) sock_put(sock->sk); return 0; }
133,239,235,791,001,380,000,000,000,000,000,000,000
af_alg.c
332,442,507,905,829,500,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2019-8912
In the Linux kernel through 4.20.11, af_alg_release() in crypto/af_alg.c neglects to set a NULL value for a certain structure member, which leads to a use-after-free in sockfs_setattr.
https://nvd.nist.gov/vuln/detail/CVE-2019-8912
393,666
linux
9060cb719e61b685ec0102574e10337fa5f445ea
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9060cb719e61b685ec0102574e10337fa5f445ea
net: crypto set sk to NULL when af_alg_release. KASAN has found use-after-free in sockfs_setattr. The existed commit 6d8c50dcb029 ("socket: close race condition between sock_close() and sockfs_setattr()") is to fix this simillar issue, but it seems to ignore that crypto module forgets to set the sk to NULL after af_al...
0
int af_alg_release(struct socket *sock) { if (sock->sk) { sock_put(sock->sk); sock->sk = NULL; } return 0; }
29,719,766,617,545,070,000,000,000,000,000,000,000
af_alg.c
139,259,866,897,556,600,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2019-8912
In the Linux kernel through 4.20.11, af_alg_release() in crypto/af_alg.c neglects to set a NULL value for a certain structure member, which leads to a use-after-free in sockfs_setattr.
https://nvd.nist.gov/vuln/detail/CVE-2019-8912
207,164
ImageMagick6
ffedc1feed46ae5dfad2aeaf4bd9c42174ec0ad1
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/ffedc1feed46ae5dfad2aeaf4bd9c42174ec0ad1
https://github.com/ImageMagick/ImageMagick/issues/1450
1
static MagickBooleanType DecodeImage(Image *image,unsigned char *luma, unsigned char *chroma1,unsigned char *chroma2) { #define IsSync(sum) ((sum & 0xffffff00UL) == 0xfffffe00UL) #define PCDGetBits(n) \ { \ sum=(sum << n) & 0xffffffff; \ bits-=n; \ while (bits <= 24) \ { \ if (p >= (buffer+0x800)) \ ...
5,425,458,434,953,525,000,000,000,000,000,000,000
None
null
[ "CWE-401" ]
CVE-2019-7175
In ImageMagick before 7.0.8-25, some memory leaks exist in DecodeImage in coders/pcd.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-7175
393,688
ImageMagick6
ffedc1feed46ae5dfad2aeaf4bd9c42174ec0ad1
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/ffedc1feed46ae5dfad2aeaf4bd9c42174ec0ad1
https://github.com/ImageMagick/ImageMagick/issues/1450
0
static MagickBooleanType DecodeImage(Image *image,unsigned char *luma, unsigned char *chroma1,unsigned char *chroma2) { #define IsSync(sum) ((sum & 0xffffff00UL) == 0xfffffe00UL) #define PCDGetBits(n) \ { \ sum=(sum << n) & 0xffffffff; \ bits-=n; \ while (bits <= 24) \ { \ if (p >= (buffer+0x800)) \ ...
8,569,007,305,254,730,000,000,000,000,000,000,000
None
null
[ "CWE-401" ]
CVE-2019-7175
In ImageMagick before 7.0.8-25, some memory leaks exist in DecodeImage in coders/pcd.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-7175
207,165
krb5
5d2d9a1abe46a2c1a8614d4672d08d9d30a5f8bf
https://github.com/krb5/krb5
https://github.com/krb5/krb5/commit/5d2d9a1abe46a2c1a8614d4672d08d9d30a5f8bf
Multi-realm KDC null deref [CVE-2013-1418] If a KDC serves multiple realms, certain requests can cause setup_server_realm() to dereference a null pointer, crashing the KDC. CVSSv2: AV:N/AC:M/Au:N/C:N/I:N/A:P/E:POC/RL:OF/RC:C A related but more minor vulnerability requires authentication to exploit, and is only prese...
1
setup_server_realm(struct server_handle *handle, krb5_principal sprinc) { kdc_realm_t *newrealm; kdc_realm_t **kdc_realmlist = handle->kdc_realmlist; int kdc_numrealms = handle->kdc_numrealms; if (kdc_numrealms > 1) { if (!(newrealm = find_realm_data(handle, sprinc->realm.data, ...
131,857,710,981,162,380,000,000,000,000,000,000,000
main.c
120,090,461,959,797,000,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2013-1418
The setup_server_realm function in main.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.10.7, when multiple realms are configured, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted request.
https://nvd.nist.gov/vuln/detail/CVE-2013-1418
393,701
krb5
5d2d9a1abe46a2c1a8614d4672d08d9d30a5f8bf
https://github.com/krb5/krb5
https://github.com/krb5/krb5/commit/5d2d9a1abe46a2c1a8614d4672d08d9d30a5f8bf
Multi-realm KDC null deref [CVE-2013-1418] If a KDC serves multiple realms, certain requests can cause setup_server_realm() to dereference a null pointer, crashing the KDC. CVSSv2: AV:N/AC:M/Au:N/C:N/I:N/A:P/E:POC/RL:OF/RC:C A related but more minor vulnerability requires authentication to exploit, and is only prese...
0
setup_server_realm(struct server_handle *handle, krb5_principal sprinc) { kdc_realm_t *newrealm; kdc_realm_t **kdc_realmlist = handle->kdc_realmlist; int kdc_numrealms = handle->kdc_numrealms; if (sprinc == NULL) return NULL; if (kdc_numrealms > 1) { if (!(newrealm = find_r...
26,328,549,791,124,000,000,000,000,000,000,000,000
main.c
225,719,892,728,491,440,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2013-1418
The setup_server_realm function in main.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.10.7, when multiple realms are configured, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted request.
https://nvd.nist.gov/vuln/detail/CVE-2013-1418
207,173
mongo-c-driver-legacy
1a1f5e26a4309480d88598913f9eebf9e9cba8ca
https://github.com/10gen-archive/mongo-c-driver-legacy
https://github.com/10gen-archive/mongo-c-driver-legacy/commit/1a1f5e26a4309480d88598913f9eebf9e9cba8ca#diff-f7d29a680148f52d6601f59ed787f577
don't mix up int and size_t (first pass to fix that)
1
int bson_ensure_space( bson *b, const int bytesNeeded ) { int pos = b->cur - b->data; char *orig = b->data; int new_size; if ( pos + bytesNeeded <= b->dataSize ) return BSON_OK; new_size = 1.5 * ( b->dataSize + bytesNeeded ); if( new_size < b->dataSize ) { if( ( b->dataSize + ...
26,984,707,463,491,613,000,000,000,000,000,000,000
bson.c
168,153,828,348,961,270,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2020-12135
bson before 0.8 incorrectly uses int rather than size_t for many variables, parameters, and return values. In particular, the bson_ensure_space() parameter bytesNeeded could have an integer overflow via properly constructed bson input.
https://nvd.nist.gov/vuln/detail/CVE-2020-12135
393,917
mongo-c-driver-legacy
1a1f5e26a4309480d88598913f9eebf9e9cba8ca
https://github.com/10gen-archive/mongo-c-driver-legacy
https://github.com/10gen-archive/mongo-c-driver-legacy/commit/1a1f5e26a4309480d88598913f9eebf9e9cba8ca#diff-f7d29a680148f52d6601f59ed787f577
don't mix up int and size_t (first pass to fix that)
0
int bson_ensure_space( bson *b, const size_t bytesNeeded ) { int pos = b->cur - b->data; char *orig = b->data; int new_size; if ( pos + bytesNeeded <= b->dataSize ) return BSON_OK; new_size = 1.5 * ( b->dataSize + bytesNeeded ); if( new_size < b->dataSize ) { if( ( b->dataSize...
296,360,099,655,615,200,000,000,000,000,000,000,000
bson.c
174,709,361,587,383,760,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2020-12135
bson before 0.8 incorrectly uses int rather than size_t for many variables, parameters, and return values. In particular, the bson_ensure_space() parameter bytesNeeded could have an integer overflow via properly constructed bson input.
https://nvd.nist.gov/vuln/detail/CVE-2020-12135
207,211
olm
ccc0d122ee1b4d5e5ca4ec1432086be17d5f901b
https://gitlab.matrix.org/matrix-org/olm
https://gitlab.matrix.org/matrix-org/olm/-/commit/ccc0d122ee1b4d5e5ca4ec1432086be17d5f901b
olm_pk_decrypt: Ensure inputs are of correct length.
1
size_t olm_pk_decrypt( OlmPkDecryption * decryption, void const * ephemeral_key, size_t ephemeral_key_length, void const * mac, size_t mac_length, void * ciphertext, size_t ciphertext_length, void * plaintext, size_t max_plaintext_length ) { if (max_plaintext_length < olm_pk_max_plai...
57,444,470,558,801,210,000,000,000,000,000,000,000
pk.cpp
10,873,334,401,014,816,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2021-34813
Matrix libolm before 3.2.3 allows a malicious Matrix homeserver to crash a client (while it is attempting to retrieve an Olm encrypted room key backup from the homeserver) because olm_pk_decrypt has a stack-based buffer overflow. Remote code execution might be possible for some nonstandard build configurations.
https://nvd.nist.gov/vuln/detail/CVE-2021-34813
394,056
olm
ccc0d122ee1b4d5e5ca4ec1432086be17d5f901b
https://gitlab.matrix.org/matrix-org/olm
https://gitlab.matrix.org/matrix-org/olm/-/commit/ccc0d122ee1b4d5e5ca4ec1432086be17d5f901b
olm_pk_decrypt: Ensure inputs are of correct length.
0
size_t olm_pk_decrypt( OlmPkDecryption * decryption, void const * ephemeral_key, size_t ephemeral_key_length, void const * mac, size_t mac_length, void * ciphertext, size_t ciphertext_length, void * plaintext, size_t max_plaintext_length ) { if (max_plaintext_length < olm_pk_max_plai...
170,468,364,788,344,300,000,000,000,000,000,000,000
pk.cpp
192,591,163,221,088,300,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2021-34813
Matrix libolm before 3.2.3 allows a malicious Matrix homeserver to crash a client (while it is attempting to retrieve an Olm encrypted room key backup from the homeserver) because olm_pk_decrypt has a stack-based buffer overflow. Remote code execution might be possible for some nonstandard build configurations.
https://nvd.nist.gov/vuln/detail/CVE-2021-34813
207,214
linux
6a7228d90d42bcacfe38786756ba62762b91c20a
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6a7228d90d42bcacfe38786756ba62762b91c20a
ARM: amba: Fix race condition with driver_override The driver_override implementation is susceptible to a race condition when different threads are reading vs storing a different driver override. Add locking to avoid this race condition. Cfr. commits 6265539776a0810b ("driver core: platform: fix race condition with ...
1
static ssize_t driver_override_show(struct device *_dev, struct device_attribute *attr, char *buf) { struct amba_device *dev = to_amba_device(_dev); return sprintf(buf, "%s\n", dev->driver_override); }
288,295,345,624,891,250,000,000,000,000,000,000,000
bus.c
331,978,394,107,989,460,000,000,000,000,000,000,000
[ "CWE-415" ]
CVE-2018-9415
In driver_override_store and driver_override_show of bus.c, there is a possible double free due to improper locking. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-69129004...
https://nvd.nist.gov/vuln/detail/CVE-2018-9415
394,088
linux
6a7228d90d42bcacfe38786756ba62762b91c20a
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6a7228d90d42bcacfe38786756ba62762b91c20a
ARM: amba: Fix race condition with driver_override The driver_override implementation is susceptible to a race condition when different threads are reading vs storing a different driver override. Add locking to avoid this race condition. Cfr. commits 6265539776a0810b ("driver core: platform: fix race condition with ...
0
static ssize_t driver_override_show(struct device *_dev, struct device_attribute *attr, char *buf) { struct amba_device *dev = to_amba_device(_dev); ssize_t len; device_lock(_dev); len = sprintf(buf, "%s\n", dev->driver_override); device_unlock(_dev); return len; }
249,078,860,988,429,400,000,000,000,000,000,000,000
bus.c
103,542,112,784,818,840,000,000,000,000,000,000,000
[ "CWE-415" ]
CVE-2018-9415
In driver_override_store and driver_override_show of bus.c, there is a possible double free due to improper locking. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-69129004...
https://nvd.nist.gov/vuln/detail/CVE-2018-9415
207,216
sysstat
edbf507678bf10914e9804ff8a06737fdcb2e781
https://github.com/sysstat/sysstat
https://github.com/sysstat/sysstat/commit/edbf507678bf10914e9804ff8a06737fdcb2e781
Fix #230: Memory corruption bug due to Integer Overflow in remap_struct() (See problem description in issue #230.) Check that the number of fields (long long integers, long integers or integers) as read from a system activity binary datafile multiplied by its alignment width doesn't overflow, i.e. the result must not ...
1
int remap_struct(unsigned int gtypes_nr[], unsigned int ftypes_nr[], void *ps, unsigned int f_size, unsigned int g_size, size_t b_size) { int d; size_t n; /* Sanity check */ if (MAP_SIZE(ftypes_nr) > f_size) return -1; /* Remap [unsigned] long fields */ d = gtypes_nr[0] - ftypes_nr[0]; if (d) { n = MINI...
276,486,057,262,227,200,000,000,000,000,000,000,000
sa_common.c
289,435,921,588,230,000,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2019-16167
sysstat before 12.1.6 has memory corruption due to an Integer Overflow in remap_struct() in sa_common.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-16167
394,089
sysstat
edbf507678bf10914e9804ff8a06737fdcb2e781
https://github.com/sysstat/sysstat
https://github.com/sysstat/sysstat/commit/edbf507678bf10914e9804ff8a06737fdcb2e781
Fix #230: Memory corruption bug due to Integer Overflow in remap_struct() (See problem description in issue #230.) Check that the number of fields (long long integers, long integers or integers) as read from a system activity binary datafile multiplied by its alignment width doesn't overflow, i.e. the result must not ...
0
int remap_struct(unsigned int gtypes_nr[], unsigned int ftypes_nr[], void *ps, unsigned int f_size, unsigned int g_size, size_t b_size) { int d; size_t n; /* Sanity check */ if (MAP_SIZE(ftypes_nr) > f_size) return -1; /* Remap [unsigned] long fields */ d = gtypes_nr[0] - ftypes_nr[0]; if (d) { if (ftyp...
248,559,371,617,561,000,000,000,000,000,000,000,000
sa_common.c
186,153,788,445,625,500,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2019-16167
sysstat before 12.1.6 has memory corruption due to an Integer Overflow in remap_struct() in sa_common.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-16167
207,217
php-src
da3886de6dc8edab3da14331227816d6ca8e9b96
https://github.com/php/php-src
https://github.com/php/php-src/commit/da3886de6dc8edab3da14331227816d6ca8e9b96
Wrong value for FILTER_SANITIZE_FULL_SPECIAL_CHARS in REGISTER_LONG_CONSTANT
1
PHP_MINIT_FUNCTION(filter) { ZEND_INIT_MODULE_GLOBALS(filter, php_filter_init_globals, NULL); REGISTER_INI_ENTRIES(); REGISTER_LONG_CONSTANT("INPUT_POST", PARSE_POST, CONST_CS | CONST_PERSISTENT); REGISTER_LONG_CONSTANT("INPUT_GET", PARSE_GET, CONST_CS | CONST_PERSISTENT); REGISTER_LONG_CONSTANT("INPUT_COOKIE...
55,852,433,307,906,130,000,000,000,000,000,000,000
filter.c
323,093,258,235,591,950,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2016-5095
Integer overflow in the php_escape_html_entities_ex function in ext/standard/html.c in PHP before 5.5.36 and 5.6.x before 5.6.22 allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering a large output string from a FILTER_SANITIZE_FULL_SPECIAL_CHARS filter_var call. ...
https://nvd.nist.gov/vuln/detail/CVE-2016-5095
394,094
php-src
da3886de6dc8edab3da14331227816d6ca8e9b96
https://github.com/php/php-src
https://github.com/php/php-src/commit/da3886de6dc8edab3da14331227816d6ca8e9b96
Wrong value for FILTER_SANITIZE_FULL_SPECIAL_CHARS in REGISTER_LONG_CONSTANT
0
PHP_MINIT_FUNCTION(filter) { ZEND_INIT_MODULE_GLOBALS(filter, php_filter_init_globals, NULL); REGISTER_INI_ENTRIES(); REGISTER_LONG_CONSTANT("INPUT_POST", PARSE_POST, CONST_CS | CONST_PERSISTENT); REGISTER_LONG_CONSTANT("INPUT_GET", PARSE_GET, CONST_CS | CONST_PERSISTENT); REGISTER_LONG_CONSTANT("INPUT_COOKIE...
147,941,771,078,906,300,000,000,000,000,000,000,000
filter.c
146,400,871,451,695,050,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2016-5095
Integer overflow in the php_escape_html_entities_ex function in ext/standard/html.c in PHP before 5.5.36 and 5.6.x before 5.6.22 allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering a large output string from a FILTER_SANITIZE_FULL_SPECIAL_CHARS filter_var call. ...
https://nvd.nist.gov/vuln/detail/CVE-2016-5095
207,222
mbedtls
f3e6e4badb35760c9a543ee69b7449cb0cd9784b
https://github.com/ARMmbed/mbedtls
https://github.com/ARMmbed/mbedtls/commit/f3e6e4badb35760c9a543ee69b7449cb0cd9784b
Add extra check before integer conversion end < p should never happen, but just be extra sure
1
static void ssl_write_renegotiation_ext( ssl_context *ssl, unsigned char *buf, size_t *olen ) { unsigned char *p = buf; const unsigned char *end = ssl->out_msg + SSL_MAX_CONTENT_LEN; *olen = 0; if( ssl->renegotiation != ...
321,737,913,181,482,580,000,000,000,000,000,000,000
ssl_cli.c
129,309,215,498,586,130,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2015-5291
Heap-based buffer overflow in PolarSSL 1.x before 1.2.17 and ARM mbed TLS (formerly PolarSSL) 1.3.x before 1.3.14 and 2.x before 2.1.2 allows remote SSL servers to cause a denial of service (client crash) and possibly execute arbitrary code via a long hostname to the server name indication (SNI) extension, which is not...
https://nvd.nist.gov/vuln/detail/CVE-2015-5291
394,151
mbedtls
f3e6e4badb35760c9a543ee69b7449cb0cd9784b
https://github.com/ARMmbed/mbedtls
https://github.com/ARMmbed/mbedtls/commit/f3e6e4badb35760c9a543ee69b7449cb0cd9784b
Add extra check before integer conversion end < p should never happen, but just be extra sure
0
static void ssl_write_renegotiation_ext( ssl_context *ssl, unsigned char *buf, size_t *olen ) { unsigned char *p = buf; const unsigned char *end = ssl->out_msg + SSL_MAX_CONTENT_LEN; *olen = 0; if( ssl->renegotiation != ...
96,048,559,709,866,290,000,000,000,000,000,000,000
ssl_cli.c
112,359,275,241,440,480,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2015-5291
Heap-based buffer overflow in PolarSSL 1.x before 1.2.17 and ARM mbed TLS (formerly PolarSSL) 1.3.x before 1.3.14 and 2.x before 2.1.2 allows remote SSL servers to cause a denial of service (client crash) and possibly execute arbitrary code via a long hostname to the server name indication (SNI) extension, which is not...
https://nvd.nist.gov/vuln/detail/CVE-2015-5291
207,224
oniguruma
850bd9b0d8186eb1637722b46b12656814ab4ad2
https://github.com/kkos/oniguruma
https://github.com/kkos/oniguruma/commit/850bd9b0d8186eb1637722b46b12656814ab4ad2
fix #87: Read unknown address in onig_error_code_to_str()
1
fetch_token(OnigToken* tok, UChar** src, UChar* end, ScanEnv* env) { int r, num; OnigCodePoint c; OnigEncoding enc = env->enc; OnigSyntaxType* syn = env->syntax; UChar* prev; UChar* p = *src; PFETCH_READY; start: if (PEND) { tok->type = TK_EOT; return tok->type; } tok->type = TK_STRING; ...
116,328,786,709,694,980,000,000,000,000,000,000,000
regparse.c
198,992,564,584,171,540,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2019-16161
Onigmo through 6.2.0 has a NULL pointer dereference in onig_error_code_to_str because of fetch_token in regparse.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-16161
394,289
oniguruma
850bd9b0d8186eb1637722b46b12656814ab4ad2
https://github.com/kkos/oniguruma
https://github.com/kkos/oniguruma/commit/850bd9b0d8186eb1637722b46b12656814ab4ad2
fix #87: Read unknown address in onig_error_code_to_str()
0
fetch_token(OnigToken* tok, UChar** src, UChar* end, ScanEnv* env) { int r, num; OnigCodePoint c; OnigEncoding enc = env->enc; OnigSyntaxType* syn = env->syntax; UChar* prev; UChar* p = *src; PFETCH_READY; start: if (PEND) { tok->type = TK_EOT; return tok->type; } tok->type = TK_STRING; ...
55,997,329,703,203,020,000,000,000,000,000,000,000
regparse.c
188,284,245,300,384,340,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2019-16161
Onigmo through 6.2.0 has a NULL pointer dereference in onig_error_code_to_str because of fetch_token in regparse.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-16161
207,243
linux
7992c18810e568b95c869b227137a2215702a805
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7992c18810e568b95c869b227137a2215702a805
Bluetooth: hidp: buffer overflow in hidp_process_report CVE-2018-9363 The buffer length is unsigned at all layers, but gets cast to int and checked in hidp_process_report and can lead to a buffer overflow. Switch len parameter to unsigned int to resolve issue. This affects 3.18 and newer kernels. Signed-off-by: Mar...
1
static void hidp_process_report(struct hidp_session *session, int type, const u8 *data, int len, int intr) { if (len > HID_MAX_BUFFER_SIZE) len = HID_MAX_BUFFER_SIZE; memcpy(session->input_buf, data, len); hid_input_report(session->hid, type, session->input_buf, len, intr); }
53,450,536,096,821,770,000,000,000,000,000,000,000
core.c
196,906,956,097,269,300,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2018-9363
In the hidp_process_report in bluetooth, there is an integer overflow. This could lead to an out of bounds write with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-65853588 References: Upstream kernel.
https://nvd.nist.gov/vuln/detail/CVE-2018-9363
394,495
linux
7992c18810e568b95c869b227137a2215702a805
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7992c18810e568b95c869b227137a2215702a805
Bluetooth: hidp: buffer overflow in hidp_process_report CVE-2018-9363 The buffer length is unsigned at all layers, but gets cast to int and checked in hidp_process_report and can lead to a buffer overflow. Switch len parameter to unsigned int to resolve issue. This affects 3.18 and newer kernels. Signed-off-by: Mar...
0
static void hidp_process_report(struct hidp_session *session, int type, const u8 *data, unsigned int len, int intr) { if (len > HID_MAX_BUFFER_SIZE) len = HID_MAX_BUFFER_SIZE; memcpy(session->input_buf, data, len); hid_input_report(session->hid, type, session->input_buf, len, intr); }
149,375,421,233,190,700,000,000,000,000,000,000,000
core.c
318,996,442,502,171,970,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2018-9363
In the hidp_process_report in bluetooth, there is an integer overflow. This could lead to an out of bounds write with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-65853588 References: Upstream kernel.
https://nvd.nist.gov/vuln/detail/CVE-2018-9363
207,245
htcondor
2f3c393feb819cf6c6d06fb0a2e9c4e171f3c26d
https://github.com/htcondor/htcondor
https://github.com/htcondor/htcondor/commit/2f3c393feb819cf6c6d06fb0a2e9c4e171f3c26d
(#6455) Fix issue validating VOMS proxies
1
extract_VOMS_info( globus_gsi_cred_handle_t cred_handle, int verify_type, char **voname, char **firstfqan, char **quoted_DN_and_FQAN) { #if !defined(HAVE_EXT_VOMS) return 1; #else int ret; struct vomsdata *voms_data = NULL; struct voms *voms_cert = NULL; char *subject_name = NULL; char **fqan = NULL; int voms...
338,558,006,054,512,780,000,000,000,000,000,000,000
globus_utils.cpp
50,141,023,623,948,200,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2017-16816
The condor_schedd component in HTCondor before 8.6.8 and 8.7.x before 8.7.5 allows remote authenticated users to cause a denial of service (daemon crash) by leveraging use of GSI and VOMS extensions.
https://nvd.nist.gov/vuln/detail/CVE-2017-16816
394,551
htcondor
2f3c393feb819cf6c6d06fb0a2e9c4e171f3c26d
https://github.com/htcondor/htcondor
https://github.com/htcondor/htcondor/commit/2f3c393feb819cf6c6d06fb0a2e9c4e171f3c26d
(#6455) Fix issue validating VOMS proxies
0
extract_VOMS_info( globus_gsi_cred_handle_t cred_handle, int verify_type, char **voname, char **firstfqan, char **quoted_DN_and_FQAN) { #if !defined(HAVE_EXT_VOMS) return 1; #else int ret; struct vomsdata *voms_data = NULL; struct voms *voms_cert = NULL; char *subject_name = NULL; char **fqan = NULL; int voms...
188,459,363,802,988,700,000,000,000,000,000,000,000
globus_utils.cpp
102,259,328,925,338,900,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2017-16816
The condor_schedd component in HTCondor before 8.6.8 and 8.7.x before 8.7.5 allows remote authenticated users to cause a denial of service (daemon crash) by leveraging use of GSI and VOMS extensions.
https://nvd.nist.gov/vuln/detail/CVE-2017-16816
207,247
linux
77f4689de17c0887775bb77896f4cc11a39bf848
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=77f4689de17c0887775bb77896f4cc11a39bf848
fix regression in "epoll: Keep a reference on files added to the check list" epoll_loop_check_proc() can run into a file already committed to destruction; we can't grab a reference on those and don't need to add them to the set for reverse path check anyway. Tested-by: Marc Zyngier <maz@kernel.org> Fixes: a9ed4a6560b...
1
static int ep_loop_check_proc(void *priv, void *cookie, int call_nests) { int error = 0; struct file *file = priv; struct eventpoll *ep = file->private_data; struct eventpoll *ep_tovisit; struct rb_node *rbp; struct epitem *epi; mutex_lock_nested(&ep->mtx, call_nests + 1); ep->visited = 1; list_add(&ep->visit...
269,320,456,324,245,060,000,000,000,000,000,000,000
eventpoll.c
116,824,817,354,272,950,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2021-1048
In ep_loop_check_proc of eventpoll.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-204573007Referen...
https://nvd.nist.gov/vuln/detail/CVE-2021-1048
394,553
linux
77f4689de17c0887775bb77896f4cc11a39bf848
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=77f4689de17c0887775bb77896f4cc11a39bf848
fix regression in "epoll: Keep a reference on files added to the check list" epoll_loop_check_proc() can run into a file already committed to destruction; we can't grab a reference on those and don't need to add them to the set for reverse path check anyway. Tested-by: Marc Zyngier <maz@kernel.org> Fixes: a9ed4a6560b...
0
static int ep_loop_check_proc(void *priv, void *cookie, int call_nests) { int error = 0; struct file *file = priv; struct eventpoll *ep = file->private_data; struct eventpoll *ep_tovisit; struct rb_node *rbp; struct epitem *epi; mutex_lock_nested(&ep->mtx, call_nests + 1); ep->visited = 1; list_add(&ep->visit...
10,096,205,933,568,207,000,000,000,000,000,000,000
eventpoll.c
266,582,852,403,808,170,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2021-1048
In ep_loop_check_proc of eventpoll.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-204573007Referen...
https://nvd.nist.gov/vuln/detail/CVE-2021-1048
207,249
exiv2
caa4e6745a76a23bb80127cf54c0d65096ae684c
https://github.com/Exiv2/exiv2
https://github.com/Exiv2/exiv2/commit/caa4e6745a76a23bb80127cf54c0d65096ae684c
Avoid negative integer overflow when `filesize < io_->tell()`. This fixes #791.
1
void WebPImage::decodeChunks(uint64_t filesize) { DataBuf chunkId(5); byte size_buff[WEBP_TAG_SIZE]; bool has_canvas_data = false; #ifdef DEBUG std::cout << "Reading metadata" << std::endl; #endif chunkId.pData_[4] = '\0' ; while ( !io_->eof() && (ui...
231,236,293,605,628,900,000,000,000,000,000,000,000
webpimage.cpp
305,106,210,680,990,130,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2019-13111
A WebPImage::decodeChunks integer overflow in Exiv2 through 0.27.1 allows an attacker to cause a denial of service (large heap allocation followed by a very long running loop) via a crafted WEBP image file.
https://nvd.nist.gov/vuln/detail/CVE-2019-13111
394,555
exiv2
caa4e6745a76a23bb80127cf54c0d65096ae684c
https://github.com/Exiv2/exiv2
https://github.com/Exiv2/exiv2/commit/caa4e6745a76a23bb80127cf54c0d65096ae684c
Avoid negative integer overflow when `filesize < io_->tell()`. This fixes #791.
0
void WebPImage::decodeChunks(uint32_t filesize) { DataBuf chunkId(5); byte size_buff[WEBP_TAG_SIZE]; bool has_canvas_data = false; #ifdef DEBUG std::cout << "Reading metadata" << std::endl; #endif chunkId.pData_[4] = '\0' ; while ( !io_->eof() && (ui...
225,198,859,804,843,230,000,000,000,000,000,000,000
webpimage.cpp
44,714,239,638,409,130,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2019-13111
A WebPImage::decodeChunks integer overflow in Exiv2 through 0.27.1 allows an attacker to cause a denial of service (large heap allocation followed by a very long running loop) via a crafted WEBP image file.
https://nvd.nist.gov/vuln/detail/CVE-2019-13111
207,252
torque
967cdc80150690459a47a35a658abeee0ca6e5cb
https://github.com/adaptivecomputing/torque
https://github.com/adaptivecomputing/torque/commit/967cdc80150690459a47a35a658abeee0ca6e5cb
TRQ-2885 - clean up unit test so it passes when run as root
1
START_TEST(test_tm_adopt_ispidowner) { /* we are the owner of this pid so should return true */ fail_unless(TRUE == ispidowner(getpid())); /* assuming the unit test is not run as root, owner */ /* owner of this pid is not the owner of pid 1 (init) */ fail_unless(FALSE == ispidowner(1)); }
292,466,840,972,508,520,000,000,000,000,000,000,000
test_tm.c
58,258,652,824,343,200,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2014-3684
The tm_adopt function in lib/Libifl/tm.c in Terascale Open-Source Resource and Queue Manager (aka TORQUE Resource Manager) 5.0.x, 4.5.x, 4.2.x, and earlier does not validate that the owner of the process also owns the adopted session id, which allows remote authenticated users to kill arbitrary processes via a crafted ...
https://nvd.nist.gov/vuln/detail/CVE-2014-3684
394,568
torque
967cdc80150690459a47a35a658abeee0ca6e5cb
https://github.com/adaptivecomputing/torque
https://github.com/adaptivecomputing/torque/commit/967cdc80150690459a47a35a658abeee0ca6e5cb
TRQ-2885 - clean up unit test so it passes when run as root
0
START_TEST(test_tm_adopt_ispidowner) { /* we are the owner of this pid so should return true */ fail_unless(TRUE == ispidowner(getpid())); /* when unit test run as non-root user, owner of this pid is not the owner of pid 1 (init) */ if (getuid() != 0) fail_unless(FALSE == ispidowner(1)); }
244,775,165,947,568,130,000,000,000,000,000,000,000
test_tm.c
68,008,110,922,675,660,000,000,000,000,000,000,000
[ "CWE-264" ]
CVE-2014-3684
The tm_adopt function in lib/Libifl/tm.c in Terascale Open-Source Resource and Queue Manager (aka TORQUE Resource Manager) 5.0.x, 4.5.x, 4.2.x, and earlier does not validate that the owner of the process also owns the adopted session id, which allows remote authenticated users to kill arbitrary processes via a crafted ...
https://nvd.nist.gov/vuln/detail/CVE-2014-3684
207,255
samba
3f95957d6de321c803a66f3ec67a8ff09befd16d
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=3f95957d6de321c803a66f3ec67a8ff09befd16d
CVE-2018-1140 ldb: Check for ldb_dn_get_casefold() failure in ldb_sqlite Signed-off-by: Andrew Bartlett <abartlet@samba.org> Reviewed-by: Douglas Bagnall <douglas.bagnall@catalyst.net.nz> BUG: https://bugzilla.samba.org/show_bug.cgi?id=13374
1
static char *parsetree_to_sql(struct ldb_module *module, void *mem_ctx, const struct ldb_parse_tree *t) { struct ldb_context *ldb; const struct ldb_schema_attribute *a; struct ldb_val value, subval; char *wild_card_string; char *child, *tmp; char *ret = NULL; char *attr; unsigned int i; ldb ...
37,865,353,384,205,217,000,000,000,000,000,000,000
ldb_sqlite3.c
87,093,287,982,792,280,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2018-1140
A missing input sanitization flaw was found in the implementation of LDP database used for the LDAP server. An attacker could use this flaw to cause a denial of service against a samba server, used as a Active Directory Domain Controller. All versions of Samba from 4.8.0 onwards are vulnerable
https://nvd.nist.gov/vuln/detail/CVE-2018-1140
394,594
samba
3f95957d6de321c803a66f3ec67a8ff09befd16d
https://github.com/samba-team/samba
https://git.samba.org/?p=samba.git;a=commitdiff;h=3f95957d6de321c803a66f3ec67a8ff09befd16d
CVE-2018-1140 ldb: Check for ldb_dn_get_casefold() failure in ldb_sqlite Signed-off-by: Andrew Bartlett <abartlet@samba.org> Reviewed-by: Douglas Bagnall <douglas.bagnall@catalyst.net.nz> BUG: https://bugzilla.samba.org/show_bug.cgi?id=13374
0
static char *parsetree_to_sql(struct ldb_module *module, void *mem_ctx, const struct ldb_parse_tree *t) { struct ldb_context *ldb; const struct ldb_schema_attribute *a; struct ldb_val value, subval; char *wild_card_string; char *child, *tmp; char *ret = NULL; char *attr; unsigned int i; ldb ...
37,108,773,767,574,765,000,000,000,000,000,000,000
ldb_sqlite3.c
211,222,835,828,856,300,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2018-1140
A missing input sanitization flaw was found in the implementation of LDP database used for the LDAP server. An attacker could use this flaw to cause a denial of service against a samba server, used as a Active Directory Domain Controller. All versions of Samba from 4.8.0 onwards are vulnerable
https://nvd.nist.gov/vuln/detail/CVE-2018-1140
207,258
qemu
d65f97a82c4ed48374a764c769d4ba1ea9724e97
https://github.com/bonzini/qemu
http://git.qemu.org/?p=qemu.git;a=commit;h=d65f97a82c4ed48374a764c769d4ba1ea9724e97
block/cloop: validate block_size header field (CVE-2014-0144) Avoid unbounded s->uncompressed_block memory allocation by checking that the block_size header field has a reasonable value. Also enforce the assumption that the value is a non-zero multiple of 512. These constraints conform to cloop 2.639's code so we ac...
1
static int cloop_open(BlockDriverState *bs, QDict *options, int flags, Error **errp) { BDRVCloopState *s = bs->opaque; uint32_t offsets_size, max_compressed_block_size = 1, i; int ret; bs->read_only = 1; /* read header */ ret = bdrv_pread(bs->file, 128, &s->block_size, 4)...
118,560,612,454,968,390,000,000,000,000,000,000,000
cloop.c
145,244,406,701,030,840,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2014-0144
QEMU before 2.0.0 block drivers for CLOOP, QCOW2 version 2 and various other image formats are vulnerable to potential memory corruptions, integer/buffer overflows or crash caused by missing input validations which could allow a remote user to execute arbitrary code on the host with the privileges of the QEMU process.
https://nvd.nist.gov/vuln/detail/CVE-2014-0144
394,608
qemu
d65f97a82c4ed48374a764c769d4ba1ea9724e97
https://github.com/bonzini/qemu
http://git.qemu.org/?p=qemu.git;a=commit;h=d65f97a82c4ed48374a764c769d4ba1ea9724e97
block/cloop: validate block_size header field (CVE-2014-0144) Avoid unbounded s->uncompressed_block memory allocation by checking that the block_size header field has a reasonable value. Also enforce the assumption that the value is a non-zero multiple of 512. These constraints conform to cloop 2.639's code so we ac...
0
static int cloop_open(BlockDriverState *bs, QDict *options, int flags, Error **errp) { BDRVCloopState *s = bs->opaque; uint32_t offsets_size, max_compressed_block_size = 1, i; int ret; bs->read_only = 1; /* read header */ ret = bdrv_pread(bs->file, 128, &s->block_size, 4)...
4,717,328,555,151,275,300,000,000,000,000,000,000
cloop.c
137,112,007,839,148,700,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2014-0144
QEMU before 2.0.0 block drivers for CLOOP, QCOW2 version 2 and various other image formats are vulnerable to potential memory corruptions, integer/buffer overflows or crash caused by missing input validations which could allow a remote user to execute arbitrary code on the host with the privileges of the QEMU process.
https://nvd.nist.gov/vuln/detail/CVE-2014-0144
207,259
OpenSC
ed55fcd2996930bf58b9bb57e9ba7b1f3a753c43
https://github.com/OpenSC/OpenSC
https://github.com/OpenSC/OpenSC/commit/ed55fcd2996930bf58b9bb57e9ba7b1f3a753c43
fixed invalid read fixes https://oss-fuzz.com/testcase-detail/5765246676631552
1
static int sc_pkcs15emu_gemsafeGPK_init(sc_pkcs15_card_t *p15card) { const cdata certs[] = { {"User certificate",0, "","1", 0}, {NULL, 0, NULL, NULL, 0} }; const pindata pins[] = { { "01", "pin", "3F000200", 0x00, SC_PKCS15_PIN_TYPE_ASCII_NUMERIC, 8, 4, 8, SC_PKCS15_PIN_FLAG_NEEDS_PADDING | SC_PKC...
162,632,063,420,417,000,000,000,000,000,000,000,000
pkcs15-gemsafeGPK.c
196,094,862,869,646,100,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2020-26571
The gemsafe GPK smart card software driver in OpenSC before 0.21.0-rc1 has a stack-based buffer overflow in sc_pkcs15emu_gemsafeGPK_init.
https://nvd.nist.gov/vuln/detail/CVE-2020-26571
394,610
OpenSC
ed55fcd2996930bf58b9bb57e9ba7b1f3a753c43
https://github.com/OpenSC/OpenSC
https://github.com/OpenSC/OpenSC/commit/ed55fcd2996930bf58b9bb57e9ba7b1f3a753c43
fixed invalid read fixes https://oss-fuzz.com/testcase-detail/5765246676631552
0
static int sc_pkcs15emu_gemsafeGPK_init(sc_pkcs15_card_t *p15card) { const cdata certs[] = { {"User certificate",0, "","1", 0}, {NULL, 0, NULL, NULL, 0} }; const pindata pins[] = { { "01", "pin", "3F000200", 0x00, SC_PKCS15_PIN_TYPE_ASCII_NUMERIC, 8, 4, 8, SC_PKCS15_PIN_FLAG_NEEDS_PADDING | SC_PKC...
121,204,768,831,747,600,000,000,000,000,000,000,000
pkcs15-gemsafeGPK.c
13,662,145,575,641,276,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2020-26571
The gemsafe GPK smart card software driver in OpenSC before 0.21.0-rc1 has a stack-based buffer overflow in sc_pkcs15emu_gemsafeGPK_init.
https://nvd.nist.gov/vuln/detail/CVE-2020-26571
207,264
w3m
f393faf55975a94217df479e1bd06ee4403c6958
https://github.com/tats/w3m
https://github.com/tats/w3m/commit/f393faf55975a94217df479e1bd06ee4403c6958
Prevent infinite recursion with nested table and textarea Bug-Debian: https://github.com/tats/w3m/issues/20
1
renderCoTable(struct table *tbl, int maxlimit) { struct readbuffer obuf; struct html_feed_environ h_env; struct environment envs[MAX_ENV_LEVEL]; struct table *t; int i, col, row; int indent, maxwidth; for (i = 0; i < tbl->ntable; i++) { t = tbl->tables[i].ptr; col = tbl->tables[i].col; r...
228,900,195,984,917,600,000,000,000,000,000,000,000
table.c
158,588,767,759,841,830,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-9439
An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. Infinite recursion vulnerability in w3m allows remote attackers to cause a denial of service via a crafted HTML page.
https://nvd.nist.gov/vuln/detail/CVE-2016-9439
394,673
w3m
f393faf55975a94217df479e1bd06ee4403c6958
https://github.com/tats/w3m
https://github.com/tats/w3m/commit/f393faf55975a94217df479e1bd06ee4403c6958
Prevent infinite recursion with nested table and textarea Bug-Debian: https://github.com/tats/w3m/issues/20
0
renderCoTable(struct table *tbl, int maxlimit) { struct readbuffer obuf; struct html_feed_environ h_env; struct environment envs[MAX_ENV_LEVEL]; struct table *t; int i, col, row; int indent, maxwidth; static struct table *tbl_prev = NULL; static int cotbl_count; #define MAX_COTABLE 100 ...
329,711,185,251,798,880,000,000,000,000,000,000,000
table.c
48,265,608,758,374,150,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-9439
An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. Infinite recursion vulnerability in w3m allows remote attackers to cause a denial of service via a crafted HTML page.
https://nvd.nist.gov/vuln/detail/CVE-2016-9439
207,271
evolution-data-server
2cc39592b532cf0dc994fd3694b8e6bf924c9ab5
https://git.gnome.org/browse/evolution-data-server
https://gitlab.gnome.org/GNOME/evolution-data-server/-/commit/2cc39592b532cf0dc994fd3694b8e6bf924c9ab5
I#189 - Crash on malformed server response with minimal capabilities Closes https://gitlab.gnome.org/GNOME/evolution-data-server/issues/189
1
imapx_connect_to_server (CamelIMAPXServer *is, GCancellable *cancellable, GError **error) { CamelNetworkSettings *network_settings; CamelNetworkSecurityMethod method; CamelIMAPXStore *store; CamelSettings *settings; GIOStream *connection = NULL; GIOStream *tls_str...
293,605,127,232,695,100,000,000,000,000,000,000,000
camel-imapx-server.c
301,951,671,787,338,300,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2020-16117
In GNOME evolution-data-server before 3.35.91, a malicious server can crash the mail client with a NULL pointer dereference by sending an invalid (e.g., minimal) CAPABILITY line on a connection attempt. This is related to imapx_free_capability and imapx_connect_to_server.
https://nvd.nist.gov/vuln/detail/CVE-2020-16117
394,765
evolution-data-server
2cc39592b532cf0dc994fd3694b8e6bf924c9ab5
https://git.gnome.org/browse/evolution-data-server
https://gitlab.gnome.org/GNOME/evolution-data-server/-/commit/2cc39592b532cf0dc994fd3694b8e6bf924c9ab5
I#189 - Crash on malformed server response with minimal capabilities Closes https://gitlab.gnome.org/GNOME/evolution-data-server/issues/189
0
imapx_connect_to_server (CamelIMAPXServer *is, GCancellable *cancellable, GError **error) { CamelNetworkSettings *network_settings; CamelNetworkSecurityMethod method; CamelIMAPXStore *store; CamelSettings *settings; GIOStream *connection = NULL; GIOStream *tls_str...
312,000,368,046,954,000,000,000,000,000,000,000,000
None
null
[ "CWE-476" ]
CVE-2020-16117
In GNOME evolution-data-server before 3.35.91, a malicious server can crash the mail client with a NULL pointer dereference by sending an invalid (e.g., minimal) CAPABILITY line on a connection attempt. This is related to imapx_free_capability and imapx_connect_to_server.
https://nvd.nist.gov/vuln/detail/CVE-2020-16117
207,311
libyang
bdb596ddc07596fa212f231135b87d0b9178f6f8
https://github.com/CESNET/libyang
https://github.com/CESNET/libyang/commit/bdb596ddc07596fa212f231135b87d0b9178f6f8
resolve BUGFIX handle yet unresolved if-features Fixes #772
1
resolve_iffeature(struct lys_iffeature *expr) { int index_e = 0, index_f = 0; if (expr->expr) { return resolve_iffeature_recursive(expr, &index_e, &index_f); } return 0; }
141,101,688,461,853,970,000,000,000,000,000,000,000
resolve.c
182,290,416,952,737,500,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2019-20391
An invalid memory access flaw is present in libyang before v1.0-r3 in the function resolve_feature_value() when an if-feature statement is used inside a bit. Applications that use libyang to parse untrusted input yang files may crash.
https://nvd.nist.gov/vuln/detail/CVE-2019-20391
395,541
libyang
bdb596ddc07596fa212f231135b87d0b9178f6f8
https://github.com/CESNET/libyang
https://github.com/CESNET/libyang/commit/bdb596ddc07596fa212f231135b87d0b9178f6f8
resolve BUGFIX handle yet unresolved if-features Fixes #772
0
resolve_iffeature(struct lys_iffeature *expr) { int index_e = 0, index_f = 0; if (expr->expr && expr->features[0]) { return resolve_iffeature_recursive(expr, &index_e, &index_f); } return 0; }
202,428,266,120,216,750,000,000,000,000,000,000,000
None
null
[ "CWE-119" ]
CVE-2019-20391
An invalid memory access flaw is present in libyang before v1.0-r3 in the function resolve_feature_value() when an if-feature statement is used inside a bit. Applications that use libyang to parse untrusted input yang files may crash.
https://nvd.nist.gov/vuln/detail/CVE-2019-20391
207,315
linux
4ea99936a1630f51fc3a2d61a58ec4a1c4b7d55a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/4ea99936a1630f51fc3a2d61a58ec4a1c4b7d55a
ext4: add more paranoia checking in ext4_expand_extra_isize handling It's possible to specify a non-zero s_want_extra_isize via debugging option, and this can cause bad things(tm) to happen when using a file system with an inode size of 128 bytes. Add better checking when the file system is mounted, as well as when w...
1
static void ext4_clamp_want_extra_isize(struct super_block *sb) { struct ext4_sb_info *sbi = EXT4_SB(sb); struct ext4_super_block *es = sbi->s_es; /* determine the minimum size of new large inodes, if present */ if (sbi->s_inode_size > EXT4_GOOD_OLD_INODE_SIZE && sbi->s_want_extra_isize == 0) { sbi->s_want_...
230,118,461,242,736,580,000,000,000,000,000,000,000
None
null
[ "CWE-401" ]
CVE-2019-19767
The Linux kernel before 5.4.2 mishandles ext4_expand_extra_isize, as demonstrated by use-after-free errors in __ext4_expand_extra_isize and ext4_xattr_set_entry, related to fs/ext4/inode.c and fs/ext4/super.c, aka CID-4ea99936a163.
https://nvd.nist.gov/vuln/detail/CVE-2019-19767
395,614
linux
4ea99936a1630f51fc3a2d61a58ec4a1c4b7d55a
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/4ea99936a1630f51fc3a2d61a58ec4a1c4b7d55a
ext4: add more paranoia checking in ext4_expand_extra_isize handling It's possible to specify a non-zero s_want_extra_isize via debugging option, and this can cause bad things(tm) to happen when using a file system with an inode size of 128 bytes. Add better checking when the file system is mounted, as well as when w...
0
static void ext4_clamp_want_extra_isize(struct super_block *sb) { struct ext4_sb_info *sbi = EXT4_SB(sb); struct ext4_super_block *es = sbi->s_es; unsigned def_extra_isize = sizeof(struct ext4_inode) - EXT4_GOOD_OLD_INODE_SIZE; if (sbi->s_inode_size == EXT4_GOOD_OLD_INODE_SIZE) { sbi->s_want_extra_isize = ...
28,984,852,527,187,694,000,000,000,000,000,000,000
None
null
[ "CWE-401" ]
CVE-2019-19767
The Linux kernel before 5.4.2 mishandles ext4_expand_extra_isize, as demonstrated by use-after-free errors in __ext4_expand_extra_isize and ext4_xattr_set_entry, related to fs/ext4/inode.c and fs/ext4/super.c, aka CID-4ea99936a163.
https://nvd.nist.gov/vuln/detail/CVE-2019-19767
207,317
ImageMagick
329dd528ab79531d884c0ba131e97d43f872ab5d
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/329dd528ab79531d884c0ba131e97d43f872ab5d
uses the PerceptibleReciprocal() to prevent the divide-by-zero from occurring (#3194) Co-authored-by: Zhang Xiaohui <ruc_zhangxiaohui@163.com>
1
MagickExport Image *ImplodeImage(const Image *image,const double amount, const PixelInterpolateMethod method,ExceptionInfo *exception) { #define ImplodeImageTag "Implode/Image" CacheView *canvas_view, *implode_view, *interpolate_view; double radius; Image *canvas_image, *implode_imag...
295,923,173,575,149,460,000,000,000,000,000,000,000
visual-effects.c
33,101,083,552,853,350,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2021-20244
A flaw was found in ImageMagick in MagickCore/visual-effects.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.
https://nvd.nist.gov/vuln/detail/CVE-2021-20244
395,615
ImageMagick
329dd528ab79531d884c0ba131e97d43f872ab5d
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/329dd528ab79531d884c0ba131e97d43f872ab5d
uses the PerceptibleReciprocal() to prevent the divide-by-zero from occurring (#3194) Co-authored-by: Zhang Xiaohui <ruc_zhangxiaohui@163.com>
0
MagickExport Image *ImplodeImage(const Image *image,const double amount, const PixelInterpolateMethod method,ExceptionInfo *exception) { #define ImplodeImageTag "Implode/Image" CacheView *canvas_view, *implode_view, *interpolate_view; double radius; Image *canvas_image, *implode_imag...
102,751,070,264,031,010,000,000,000,000,000,000,000
visual-effects.c
35,069,357,116,713,020,000,000,000,000,000,000,000
[ "CWE-369" ]
CVE-2021-20244
A flaw was found in ImageMagick in MagickCore/visual-effects.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability.
https://nvd.nist.gov/vuln/detail/CVE-2021-20244
207,416
php-src
c14eb8de974fc8a4d74f3515424c293bc7a40fba
https://github.com/php/php-src
http://git.php.net/?p=php-src.git;a=commit;h=c14eb8de974fc8a4d74f3515424c293bc7a40fba
Fix bug #78793
1
static int exif_process_IFD_in_MAKERNOTE(image_info_type *ImageInfo, char * value_ptr, int value_len, char *offset_base, size_t IFDlength, size_t displacement) { size_t i; int de, section_index = SECTION_MAKERNOTE; int NumDirEntries, old_motorola_intel; #ifdef KALLE_0 int offset_diff; #endif const maker_note_type ...
211,670,069,281,718,540,000,000,000,000,000,000,000
exif.c
161,570,432,724,482,320,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-11050
When PHP EXIF extension is parsing EXIF information from an image, e.g. via exif_read_data() function, in PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0 it is possible to supply it with data what will cause it to read past the allocated buffer. This may lead to information disclosure or crash.
https://nvd.nist.gov/vuln/detail/CVE-2019-11050
397,410
php-src
c14eb8de974fc8a4d74f3515424c293bc7a40fba
https://github.com/php/php-src
http://git.php.net/?p=php-src.git;a=commit;h=c14eb8de974fc8a4d74f3515424c293bc7a40fba
Fix bug #78793
0
static int exif_process_IFD_in_MAKERNOTE(image_info_type *ImageInfo, char * value_ptr, int value_len, char *offset_base, size_t IFDlength, size_t displacement) { size_t i; int de, section_index = SECTION_MAKERNOTE; int NumDirEntries, old_motorola_intel; #ifdef KALLE_0 int offset_diff; #endif const maker_note_type ...
288,627,583,490,784,530,000,000,000,000,000,000,000
exif.c
303,717,196,926,702,730,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-11050
When PHP EXIF extension is parsing EXIF information from an image, e.g. via exif_read_data() function, in PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0 it is possible to supply it with data what will cause it to read past the allocated buffer. This may lead to information disclosure or crash.
https://nvd.nist.gov/vuln/detail/CVE-2019-11050
207,417
radare2
93af319e0af787ede96537d46210369f5c24240c
https://github.com/radare/radare2
https://github.com/radare/radare2/commit/93af319e0af787ede96537d46210369f5c24240c
Fix #14296 - Segfault in ragg2 (#14308)
1
R_API int r_egg_lang_parsechar(REgg *egg, char c) { REggEmit *e = egg->remit; char *ptr, str[64], *tmp_ptr = NULL; int i, j; if (c == '\n') { egg->lang.line++; egg->lang.elem_n = 0; } /* comments */ if (egg->lang.skipline) { if (c != '\n') { egg->lang.oc = c; return 0; } egg->lang.skipline = 0; ...
274,650,313,343,136,000,000,000,000,000,000,000,000
egg_lang.c
62,949,087,027,357,360,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2019-12802
In radare2 through 3.5.1, the rcc_context function of libr/egg/egg_lang.c mishandles changing context. This allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact (invalid memory access in r_egg_lang_parsechar; invalid free in rcc_pusharg).
https://nvd.nist.gov/vuln/detail/CVE-2019-12802
397,413
radare2
93af319e0af787ede96537d46210369f5c24240c
https://github.com/radare/radare2
https://github.com/radare/radare2/commit/93af319e0af787ede96537d46210369f5c24240c
Fix #14296 - Segfault in ragg2 (#14308)
0
R_API int r_egg_lang_parsechar(REgg *egg, char c) { REggEmit *e = egg->remit; char *ptr, str[64], *tmp_ptr = NULL; int i, j; if (c == '\n') { egg->lang.line++; egg->lang.elem_n = 0; } /* comments */ if (egg->lang.skipline) { if (c != '\n') { egg->lang.oc = c; return 0; } egg->lang.skipline = 0; ...
42,473,032,305,180,877,000,000,000,000,000,000,000
egg_lang.c
2,825,655,628,066,743,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2019-12802
In radare2 through 3.5.1, the rcc_context function of libr/egg/egg_lang.c mishandles changing context. This allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact (invalid memory access in r_egg_lang_parsechar; invalid free in rcc_pusharg).
https://nvd.nist.gov/vuln/detail/CVE-2019-12802
207,457
ghostpdl
d621292fb2c8157d9899dcd83fd04dd250e30fe4
https://github.com/ArtifexSoftware/ghostpdl
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=d621292fb2c8157d9899dcd83fd04dd250e30fe4
Bug 697444 Unmatched transparency group pop This issue can only occur if there is an unmatched group pop. If the interpreter is doing that, then the interpreter is broken. With this bug the user is intentionally doing it. We now throw and error when it occurs.
1
pdf14_pop_transparency_group(gs_gstate *pgs, pdf14_ctx *ctx, const pdf14_nonseparable_blending_procs_t * pblend_procs, int tos_num_color_comp, cmm_profile_t *curr_icc_profile, gx_device *dev) { pdf14_buf *tos = ctx->stack; pdf14_buf *nos = tos->saved; pdf14_mask_t *mask_stack = tos->mask_stack; ...
225,365,510,364,829,160,000,000,000,000,000,000,000
gdevp14.c
271,569,190,112,009,170,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2016-10218
The pdf14_pop_transparency_group function in base/gdevp14.c in the PDF Transparency module in Artifex Software, Inc. Ghostscript 9.20 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2016-10218