idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
389,751 | ImageMagick | 4b352c0be410ad900469a079e389178f878aded8 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/4b352c0be410ad900469a079e389178f878aded8 | https://github.com/ImageMagick/ImageMagick/issues/1191 | 0 | static Image *ReadMIFFImage(const ImageInfo *image_info,
ExceptionInfo *exception)
{
#define BZipMaxExtent(x) ((x)+((x)/100)+600)
#define LZMAMaxExtent(x) ((x)+((x)/3)+128)
#define ThrowMIFFException(exception,message) \
{ \
if (quantum_info != (QuantumInfo *) NULL) \
quantum_info=DestroyQuantumInfo(quantum_i... | 35,850,894,100,470,650,000,000,000,000,000,000,000 | miff.c | 183,531,186,895,083,600,000,000,000,000,000,000,000 | [
"CWE-772"
] | CVE-2018-14436 | ImageMagick 7.0.8-4 has a memory leak in ReadMIFFImage in coders/miff.c. | https://nvd.nist.gov/vuln/detail/CVE-2018-14436 |
206,947 | php-src | 5c0455bf2c8cd3c25401407f158e820aa3b239e1 | https://github.com/php/php-src | https://github.com/php/php-src/commit/5c0455bf2c8cd3c25401407f158e820aa3b239e1 | Merge branch 'PHP-7.0' into PHP-7.1
* PHP-7.0:
Fixed bug #75055 Out-Of-Bounds Read in timelib_meridian()
Apply upstream patch for CVE-2016-1283 | 1 | static int scan(Scanner *s, timelib_tz_get_wrapper tz_get_wrapper)
{
uchar *cursor = s->cur;
char *str, *ptr = NULL;
std:
s->tok = cursor;
s->len = 0;
#line 965 "ext/date/lib/parse_date.re"
#line 846 "<stdout>"
{
YYCTYPE yych;
unsigned int yyaccept = 0;
static const unsigned char yybm[] = {
0, 0, 0, ... | 114,749,180,218,233,880,000,000,000,000,000,000,000 | parse_date.c | 224,475,799,902,884,000,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-16642 | In PHP before 5.6.32, 7.x before 7.0.25, and 7.1.x before 7.1.11, an error in the date extension's timelib_meridian handling of 'front of' and 'back of' directives could be used by attackers able to supply date strings to leak information from the interpreter, related to ext/date/lib/parse_date.c out-of-bounds reads af... | https://nvd.nist.gov/vuln/detail/CVE-2017-16642 |
389,786 | php-src | 5c0455bf2c8cd3c25401407f158e820aa3b239e1 | https://github.com/php/php-src | https://github.com/php/php-src/commit/5c0455bf2c8cd3c25401407f158e820aa3b239e1 | Merge branch 'PHP-7.0' into PHP-7.1
* PHP-7.0:
Fixed bug #75055 Out-Of-Bounds Read in timelib_meridian()
Apply upstream patch for CVE-2016-1283 | 0 | static int scan(Scanner *s, timelib_tz_get_wrapper tz_get_wrapper)
{
uchar *cursor = s->cur;
char *str, *ptr = NULL;
std:
s->tok = cursor;
s->len = 0;
#line 965 "ext/date/lib/parse_date.re"
#line 846 "<stdout>"
{
YYCTYPE yych;
unsigned int yyaccept = 0;
static const unsigned char yybm[] = {
0, 0, 0, ... | 168,360,440,945,252,500,000,000,000,000,000,000,000 | parse_date.c | 139,597,511,336,969,700,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-16642 | In PHP before 5.6.32, 7.x before 7.0.25, and 7.1.x before 7.1.11, an error in the date extension's timelib_meridian handling of 'front of' and 'back of' directives could be used by attackers able to supply date strings to leak information from the interpreter, related to ext/date/lib/parse_date.c out-of-bounds reads af... | https://nvd.nist.gov/vuln/detail/CVE-2017-16642 |
206,952 | perl5 | 52236464559c6e410a4587d3c6da9639e75f3ec1 | https://github.com/perl/perl5 | https://github.com/Perl/perl5/commit/52236464559c6e410a4587d3c6da9639e75f3ec1#diff-31982a731a0996d0cc82a4ad4e70ad50 | avoid invalid memory access in MapPath[AW]
This issue was assigned CVE-2015-8608. [perl #126755] | 1 | char *VDir::MapPathA(const char *pInName)
{ /*
* possiblities -- relative path or absolute path with or without drive letter
* OR UNC name
*/
char szBuffer[(MAX_PATH+1)*2];
char szlBuf[MAX_PATH+1];
int length = strlen(pInName);
if (!length)
return (char*)pInName;
if (length > MAX... | 115,048,761,908,517,600,000,000,000,000,000,000,000 | vdir.h | 154,941,127,898,293,730,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2015-8608 | The VDir::MapPathA and VDir::MapPathW functions in Perl 5.22 allow remote attackers to cause a denial of service (out-of-bounds read) and possibly execute arbitrary code via a crafted (1) drive letter or (2) pInName argument. | https://nvd.nist.gov/vuln/detail/CVE-2015-8608 |
389,930 | perl5 | 52236464559c6e410a4587d3c6da9639e75f3ec1 | https://github.com/perl/perl5 | https://github.com/Perl/perl5/commit/52236464559c6e410a4587d3c6da9639e75f3ec1#diff-31982a731a0996d0cc82a4ad4e70ad50 | avoid invalid memory access in MapPath[AW]
This issue was assigned CVE-2015-8608. [perl #126755] | 0 | char *VDir::MapPathA(const char *pInName)
{ /*
* possiblities -- relative path or absolute path with or without drive letter
* OR UNC name
*/
int driveIndex;
char szBuffer[(MAX_PATH+1)*2];
char szlBuf[MAX_PATH+1];
int length = strlen(pInName);
if (!length)
return (char*)pInName;
... | 36,005,704,415,523,320,000,000,000,000,000,000,000 | vdir.h | 165,167,527,541,240,850,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2015-8608 | The VDir::MapPathA and VDir::MapPathW functions in Perl 5.22 allow remote attackers to cause a denial of service (out-of-bounds read) and possibly execute arbitrary code via a crafted (1) drive letter or (2) pInName argument. | https://nvd.nist.gov/vuln/detail/CVE-2015-8608 |
206,953 | perl5 | 52236464559c6e410a4587d3c6da9639e75f3ec1 | https://github.com/perl/perl5 | https://github.com/Perl/perl5/commit/52236464559c6e410a4587d3c6da9639e75f3ec1#diff-31982a731a0996d0cc82a4ad4e70ad50 | avoid invalid memory access in MapPath[AW]
This issue was assigned CVE-2015-8608. [perl #126755] | 1 | WCHAR* VDir::MapPathW(const WCHAR *pInName)
{ /*
* possiblities -- relative path or absolute path with or without drive letter
* OR UNC name
*/
WCHAR szBuffer[(MAX_PATH+1)*2];
WCHAR szlBuf[MAX_PATH+1];
int length = wcslen(pInName);
if (!length)
return (WCHAR*)pInName;
if (length ... | 62,589,287,880,274,420,000,000,000,000,000,000,000 | vdir.h | 154,941,127,898,293,730,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2015-8608 | The VDir::MapPathA and VDir::MapPathW functions in Perl 5.22 allow remote attackers to cause a denial of service (out-of-bounds read) and possibly execute arbitrary code via a crafted (1) drive letter or (2) pInName argument. | https://nvd.nist.gov/vuln/detail/CVE-2015-8608 |
389,902 | perl5 | 52236464559c6e410a4587d3c6da9639e75f3ec1 | https://github.com/perl/perl5 | https://github.com/Perl/perl5/commit/52236464559c6e410a4587d3c6da9639e75f3ec1#diff-31982a731a0996d0cc82a4ad4e70ad50 | avoid invalid memory access in MapPath[AW]
This issue was assigned CVE-2015-8608. [perl #126755] | 0 | WCHAR* VDir::MapPathW(const WCHAR *pInName)
{ /*
* possiblities -- relative path or absolute path with or without drive letter
* OR UNC name
*/
int driveIndex;
WCHAR szBuffer[(MAX_PATH+1)*2];
WCHAR szlBuf[MAX_PATH+1];
int length = wcslen(pInName);
if (!length)
return (WCHAR*)pInNa... | 80,550,285,067,880,080,000,000,000,000,000,000,000 | vdir.h | 165,167,527,541,240,850,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2015-8608 | The VDir::MapPathA and VDir::MapPathW functions in Perl 5.22 allow remote attackers to cause a denial of service (out-of-bounds read) and possibly execute arbitrary code via a crafted (1) drive letter or (2) pInName argument. | https://nvd.nist.gov/vuln/detail/CVE-2015-8608 |
206,954 | linux | 979e0d74651ba5aa533277f2a6423d0f982fb6f6 | https://github.com/torvalds/linux | http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=979e0d74651ba5aa533277f2a6423d0f982fb6f6 | KEYS: Make the keyring cycle detector ignore other keyrings of the same name
This fixes CVE-2014-0102.
The following command sequence produces an oops:
keyctl new_session
i=`keyctl newring _ses @s`
keyctl link @s $i
The problem is that search_nested_keyrings() sees two keyrings that have
matching type and descri... | 1 | static int keyring_detect_cycle_iterator(const void *object,
void *iterator_data)
{
struct keyring_search_context *ctx = iterator_data;
const struct key *key = keyring_ptr_to_key(object);
kenter("{%d}", key->serial);
BUG_ON(key != ctx->match_data);
ctx->result = ERR_PTR(-EDEADLK);
return 1;
} | 128,482,683,513,504,870,000,000,000,000,000,000,000 | keyring.c | 275,480,695,098,220,680,000,000,000,000,000,000,000 | [
"CWE-310"
] | CVE-2014-0102 | The keyring_detect_cycle_iterator function in security/keys/keyring.c in the Linux kernel through 3.13.6 does not properly determine whether keyrings are identical, which allows local users to cause a denial of service (OOPS) via crafted keyctl commands. | https://nvd.nist.gov/vuln/detail/CVE-2014-0102 |
389,935 | linux | 979e0d74651ba5aa533277f2a6423d0f982fb6f6 | https://github.com/torvalds/linux | http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=979e0d74651ba5aa533277f2a6423d0f982fb6f6 | KEYS: Make the keyring cycle detector ignore other keyrings of the same name
This fixes CVE-2014-0102.
The following command sequence produces an oops:
keyctl new_session
i=`keyctl newring _ses @s`
keyctl link @s $i
The problem is that search_nested_keyrings() sees two keyrings that have
matching type and descri... | 0 | static int keyring_detect_cycle_iterator(const void *object,
void *iterator_data)
{
struct keyring_search_context *ctx = iterator_data;
const struct key *key = keyring_ptr_to_key(object);
kenter("{%d}", key->serial);
/* We might get a keyring with matching index-key that is nonetheless a
* different keyri... | 79,685,444,132,400,850,000,000,000,000,000,000,000 | keyring.c | 243,625,169,342,562,980,000,000,000,000,000,000,000 | [
"CWE-310"
] | CVE-2014-0102 | The keyring_detect_cycle_iterator function in security/keys/keyring.c in the Linux kernel through 3.13.6 does not properly determine whether keyrings are identical, which allows local users to cause a denial of service (OOPS) via crafted keyctl commands. | https://nvd.nist.gov/vuln/detail/CVE-2014-0102 |
206,967 | linux | 350a5c4dd2452ea999cc5e1d4a8dbf12de2f97ef | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=350a5c4dd2452ea999cc5e1d4a8dbf12de2f97ef | bpf: Dont allow vmlinux BTF to be used in map_create and prog_load.
The syzbot got FD of vmlinux BTF and passed it into map_create which caused
crash in btf_type_id_size() when it tried to access resolved_ids. The vmlinux
BTF doesn't have 'resolved_ids' and 'resolved_sizes' initialized to save
memory. To avoid such is... | 1 | static int map_create(union bpf_attr *attr)
{
int numa_node = bpf_map_attr_numa_node(attr);
struct bpf_map *map;
int f_flags;
int err;
err = CHECK_ATTR(BPF_MAP_CREATE);
if (err)
return -EINVAL;
if (attr->btf_vmlinux_value_type_id) {
if (attr->map_type != BPF_MAP_TYPE_STRUCT_OPS ||
attr->btf_key_type_... | 90,090,292,461,044,980,000,000,000,000,000,000,000 | syscall.c | 151,721,738,212,127,580,000,000,000,000,000,000,000 | [
"CWE-307"
] | CVE-2021-29648 | An issue was discovered in the Linux kernel before 5.11.11. The BPF subsystem does not properly consider that resolved_ids and resolved_sizes are intentionally uninitialized in the vmlinux BPF Type Format (BTF), which can cause a system crash upon an unexpected access attempt (in map_create in kernel/bpf/syscall.c or c... | https://nvd.nist.gov/vuln/detail/CVE-2021-29648 |
390,176 | linux | 350a5c4dd2452ea999cc5e1d4a8dbf12de2f97ef | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=350a5c4dd2452ea999cc5e1d4a8dbf12de2f97ef | bpf: Dont allow vmlinux BTF to be used in map_create and prog_load.
The syzbot got FD of vmlinux BTF and passed it into map_create which caused
crash in btf_type_id_size() when it tried to access resolved_ids. The vmlinux
BTF doesn't have 'resolved_ids' and 'resolved_sizes' initialized to save
memory. To avoid such is... | 0 | static int map_create(union bpf_attr *attr)
{
int numa_node = bpf_map_attr_numa_node(attr);
struct bpf_map *map;
int f_flags;
int err;
err = CHECK_ATTR(BPF_MAP_CREATE);
if (err)
return -EINVAL;
if (attr->btf_vmlinux_value_type_id) {
if (attr->map_type != BPF_MAP_TYPE_STRUCT_OPS ||
attr->btf_key_type_... | 303,953,661,978,472,140,000,000,000,000,000,000,000 | syscall.c | 3,667,799,853,197,745,500,000,000,000,000,000,000 | [
"CWE-307"
] | CVE-2021-29648 | An issue was discovered in the Linux kernel before 5.11.11. The BPF subsystem does not properly consider that resolved_ids and resolved_sizes are intentionally uninitialized in the vmlinux BPF Type Format (BTF), which can cause a system crash upon an unexpected access attempt (in map_create in kernel/bpf/syscall.c or c... | https://nvd.nist.gov/vuln/detail/CVE-2021-29648 |
206,974 | rizin | 348b1447d1452f978b69631d6de5b08dd3bdf79d | https://github.com/rizinorg/rizin | https://github.com/rizinorg/rizin/commit/348b1447d1452f978b69631d6de5b08dd3bdf79d | fix #2956 - oob write in mach0.c | 1 | static bool reconstruct_chained_fixup(struct MACH0_(obj_t) * bin) {
if (!bin->dyld_info) {
return false;
}
if (!bin->nsegs) {
return false;
}
bin->nchained_starts = bin->nsegs;
bin->chained_starts = RZ_NEWS0(struct rz_dyld_chained_starts_in_segment *, bin->nchained_starts);
if (!bin->chained_starts) {
retu... | 41,009,788,158,222,154,000,000,000,000,000,000,000 | mach0.c | 86,851,559,453,540,570,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2022-36041 | Rizin is a UNIX-like reverse engineering framework and command-line toolset. Versions 0.4.0 and prior are vulnerable to an out-of-bounds write when parsing Mach-O files. A user opening a malicious Mach-O file could be affected by this vulnerability, allowing an attacker to execute code on the user's machine. Commit num... | https://nvd.nist.gov/vuln/detail/CVE-2022-36041 |
390,336 | rizin | 348b1447d1452f978b69631d6de5b08dd3bdf79d | https://github.com/rizinorg/rizin | https://github.com/rizinorg/rizin/commit/348b1447d1452f978b69631d6de5b08dd3bdf79d | fix #2956 - oob write in mach0.c | 0 | static bool reconstruct_chained_fixup(struct MACH0_(obj_t) * bin) {
if (!bin->dyld_info) {
return false;
}
if (!bin->nsegs) {
return false;
}
bin->nchained_starts = bin->nsegs;
bin->chained_starts = RZ_NEWS0(struct rz_dyld_chained_starts_in_segment *, bin->nchained_starts);
if (!bin->chained_starts) {
retu... | 200,945,192,732,672,400,000,000,000,000,000,000,000 | mach0.c | 170,161,380,557,820,270,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2022-36041 | Rizin is a UNIX-like reverse engineering framework and command-line toolset. Versions 0.4.0 and prior are vulnerable to an out-of-bounds write when parsing Mach-O files. A user opening a malicious Mach-O file could be affected by this vulnerability, allowing an attacker to execute code on the user's machine. Commit num... | https://nvd.nist.gov/vuln/detail/CVE-2022-36041 |
206,988 | php-src | e0f5d62bd6690169998474b62f92a8c5ddf0e699 | https://github.com/php/php-src | http://git.php.net/?p=php-src.git;a=commitdiff;h=e0f5d62bd6690169998474b62f92a8c5ddf0e699 | Fix bug #77586 - phar_tar_writeheaders_int() buffer overflow | 1 | static int phar_tar_writeheaders_int(phar_entry_info *entry, void *argument) /* {{{ */
{
tar_header header;
size_t pos;
struct _phar_pass_tar_info *fp = (struct _phar_pass_tar_info *)argument;
char padding[512];
if (entry->is_mounted) {
return ZEND_HASH_APPLY_KEEP;
}
if (entry->is_deleted) {
if (entry->fp_... | 251,145,418,970,253,760,000,000,000,000,000,000,000 | tar.c | 321,458,594,172,820,750,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2019-9675 | An issue was discovered in PHP 7.x before 7.1.27 and 7.3.x before 7.3.3. phar_tar_writeheaders_int in ext/phar/tar.c has a buffer overflow via a long link value. NOTE: The vendor indicates that the link value is used only when an archive contains a symlink, which currently cannot happen: "This issue allows theoretical ... | https://nvd.nist.gov/vuln/detail/CVE-2019-9675 |
390,506 | php-src | e0f5d62bd6690169998474b62f92a8c5ddf0e699 | https://github.com/php/php-src | http://git.php.net/?p=php-src.git;a=commitdiff;h=e0f5d62bd6690169998474b62f92a8c5ddf0e699 | Fix bug #77586 - phar_tar_writeheaders_int() buffer overflow | 0 | static int phar_tar_writeheaders_int(phar_entry_info *entry, void *argument) /* {{{ */
{
tar_header header;
size_t pos;
struct _phar_pass_tar_info *fp = (struct _phar_pass_tar_info *)argument;
char padding[512];
if (entry->is_mounted) {
return ZEND_HASH_APPLY_KEEP;
}
if (entry->is_deleted) {
if (entry->fp_... | 323,176,986,328,962,350,000,000,000,000,000,000,000 | tar.c | 94,396,328,310,616,050,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2019-9675 | An issue was discovered in PHP 7.x before 7.1.27 and 7.3.x before 7.3.3. phar_tar_writeheaders_int in ext/phar/tar.c has a buffer overflow via a long link value. NOTE: The vendor indicates that the link value is used only when an archive contains a symlink, which currently cannot happen: "This issue allows theoretical ... | https://nvd.nist.gov/vuln/detail/CVE-2019-9675 |
206,990 | mod_wsgi | d9d5fea585b23991f76532a9b07de7fcd3b649f4 | https://github.com/GrahamDumpleton/mod_wsgi | https://github.com/GrahamDumpleton/mod_wsgi/commit/d9d5fea585b23991f76532a9b07de7fcd3b649f4 | Local privilege escalation when using daemon mode. (CVE-2014-0240) | 1 | static void wsgi_setup_access(WSGIDaemonProcess *daemon)
{
/* Setup the umask for the effective user. */
if (daemon->group->umask != -1)
umask(daemon->group->umask);
/* Change to chroot environment. */
if (daemon->group->root) {
if (chroot(daemon->group->root) == -1) {
ap_... | 254,013,892,717,063,480,000,000,000,000,000,000,000 | mod_wsgi.c | 3,915,718,671,020,503,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2014-0240 | The mod_wsgi module before 3.5 for Apache, when daemon mode is enabled, does not properly handle error codes returned by setuid when run on certain Linux kernels, which allows local users to gain privileges via vectors related to the number of running processes. | https://nvd.nist.gov/vuln/detail/CVE-2014-0240 |
390,514 | mod_wsgi | d9d5fea585b23991f76532a9b07de7fcd3b649f4 | https://github.com/GrahamDumpleton/mod_wsgi | https://github.com/GrahamDumpleton/mod_wsgi/commit/d9d5fea585b23991f76532a9b07de7fcd3b649f4 | Local privilege escalation when using daemon mode. (CVE-2014-0240) | 0 | static void wsgi_setup_access(WSGIDaemonProcess *daemon)
{
/* Setup the umask for the effective user. */
if (daemon->group->umask != -1)
umask(daemon->group->umask);
/* Change to chroot environment. */
if (daemon->group->root) {
if (chroot(daemon->group->root) == -1) {
ap_... | 155,947,699,725,272,460,000,000,000,000,000,000,000 | mod_wsgi.c | 126,965,859,754,709,700,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2014-0240 | The mod_wsgi module before 3.5 for Apache, when daemon mode is enabled, does not properly handle error codes returned by setuid when run on certain Linux kernels, which allows local users to gain privileges via vectors related to the number of running processes. | https://nvd.nist.gov/vuln/detail/CVE-2014-0240 |
206,991 | ImageMagick6 | 5964475e21e7e3bdd27835b71aa17d1678c21d7c | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/5964475e21e7e3bdd27835b71aa17d1678c21d7c | ... | 1 | static Image *ReadXWDImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
#define CheckOverflowException(length,width,height) \
(((height) != 0) && ((length)/((size_t) height) != ((size_t) width)))
char
*comment;
Image
*image;
IndexPacket
index;
int
x_status;
MagickBooleanType
... | 30,591,964,066,131,930,000,000,000,000,000,000,000 | None | null | [
"CWE-772"
] | CVE-2017-11166 | The ReadXWDImage function in coders\xwd.c in ImageMagick 7.0.5-6 has a memory leak vulnerability that can cause memory exhaustion via a crafted length (number of color-map entries) field in the header of an XWD file. | https://nvd.nist.gov/vuln/detail/CVE-2017-11166 |
390,515 | ImageMagick6 | 5964475e21e7e3bdd27835b71aa17d1678c21d7c | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/5964475e21e7e3bdd27835b71aa17d1678c21d7c | ... | 0 | static Image *ReadXWDImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
#define CheckOverflowException(length,width,height) \
(((height) != 0) && ((length)/((size_t) height) != ((size_t) width)))
char
*comment;
Image
*image;
IndexPacket
index;
int
x_status;
MagickBooleanType
... | 160,157,137,040,557,780,000,000,000,000,000,000,000 | None | null | [
"CWE-772"
] | CVE-2017-11166 | The ReadXWDImage function in coders\xwd.c in ImageMagick 7.0.5-6 has a memory leak vulnerability that can cause memory exhaustion via a crafted length (number of color-map entries) field in the header of an XWD file. | https://nvd.nist.gov/vuln/detail/CVE-2017-11166 |
207,005 | cyrus-imapd | 673ebd96e2efbb8895d08648983377262f35b3f7 | https://github.com/cyrusimap/cyrus-imapd | https://github.com/cyrusimap/cyrus-imapd/commit/673ebd96e2efbb8895d08648983377262f35b3f7 | lmtp_sieve: don't create mailbox with admin for sieve autocreate | 1 | static int autosieve_createfolder(const char *userid, const struct auth_state *auth_state,
const char *internalname, int createsievefolder)
{
const char *subf ;
int r = 0;
int n;
/* Check if internalname or userid are NULL */
if (userid == NULL || internalname == N... | 267,878,132,276,888,530,000,000,000,000,000,000,000 | lmtp_sieve.c | 57,165,382,720,312,340,000,000,000,000,000,000,000 | [
"CWE-269"
] | CVE-2019-19783 | An issue was discovered in Cyrus IMAP before 2.5.15, 3.0.x before 3.0.13, and 3.1.x through 3.1.8. If sieve script uploading is allowed (3.x) or certain non-default sieve options are enabled (2.x), a user with a mail account on the service can use a sieve script containing a fileinto directive to create any mailbox wit... | https://nvd.nist.gov/vuln/detail/CVE-2019-19783 |
390,769 | cyrus-imapd | 673ebd96e2efbb8895d08648983377262f35b3f7 | https://github.com/cyrusimap/cyrus-imapd | https://github.com/cyrusimap/cyrus-imapd/commit/673ebd96e2efbb8895d08648983377262f35b3f7 | lmtp_sieve: don't create mailbox with admin for sieve autocreate | 0 | static int autosieve_createfolder(const char *userid, const struct auth_state *auth_state,
const char *internalname, int createsievefolder)
{
const char *subf ;
int r = 0;
int n;
/* Check if internalname or userid are NULL */
if (userid == NULL || internalname == N... | 319,996,549,572,299,550,000,000,000,000,000,000,000 | lmtp_sieve.c | 318,699,702,142,660,900,000,000,000,000,000,000,000 | [
"CWE-269"
] | CVE-2019-19783 | An issue was discovered in Cyrus IMAP before 2.5.15, 3.0.x before 3.0.13, and 3.1.x through 3.1.8. If sieve script uploading is allowed (3.x) or certain non-default sieve options are enabled (2.x), a user with a mail account on the service can use a sieve script containing a fileinto directive to create any mailbox wit... | https://nvd.nist.gov/vuln/detail/CVE-2019-19783 |
207,034 | linux | 9804501fa1228048857910a6bf23e085aade37cc | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9804501fa1228048857910a6bf23e085aade37cc | appletalk: Fix potential NULL pointer dereference in unregister_snap_client
register_snap_client may return NULL, all the callers
check it, but only print a warning. This will result in
NULL pointer dereference in unregister_snap_client and other
places.
It has always been used like this since v2.6
Reported-by: Dan ... | 1 | static int __init atalk_init(void)
{
int rc;
rc = proto_register(&ddp_proto, 0);
if (rc)
goto out;
rc = sock_register(&atalk_family_ops);
if (rc)
goto out_proto;
ddp_dl = register_snap_client(ddp_snap_id, atalk_rcv);
if (!ddp_dl)
printk(atalk_err_snap);
dev_add_pack(<alk_packet_type);
dev_add_pack(... | 122,742,628,362,577,500,000,000,000,000,000,000,000 | ddp.c | 131,537,965,830,474,130,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2019-19227 | In the AppleTalk subsystem in the Linux kernel before 5.1, there is a potential NULL pointer dereference because register_snap_client may return NULL. This will lead to denial of service in net/appletalk/aarp.c and net/appletalk/ddp.c, as demonstrated by unregister_snap_client, aka CID-9804501fa122. | https://nvd.nist.gov/vuln/detail/CVE-2019-19227 |
390,974 | linux | 9804501fa1228048857910a6bf23e085aade37cc | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9804501fa1228048857910a6bf23e085aade37cc | appletalk: Fix potential NULL pointer dereference in unregister_snap_client
register_snap_client may return NULL, all the callers
check it, but only print a warning. This will result in
NULL pointer dereference in unregister_snap_client and other
places.
It has always been used like this since v2.6
Reported-by: Dan ... | 0 | static int __init atalk_init(void)
{
int rc;
rc = proto_register(&ddp_proto, 0);
if (rc)
goto out;
rc = sock_register(&atalk_family_ops);
if (rc)
goto out_proto;
ddp_dl = register_snap_client(ddp_snap_id, atalk_rcv);
if (!ddp_dl) {
pr_crit("Unable to register DDP with SNAP.\n");
goto out_sock;
}
de... | 172,311,756,083,897,000,000,000,000,000,000,000,000 | ddp.c | 312,427,192,633,618,670,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2019-19227 | In the AppleTalk subsystem in the Linux kernel before 5.1, there is a potential NULL pointer dereference because register_snap_client may return NULL. This will lead to denial of service in net/appletalk/aarp.c and net/appletalk/ddp.c, as demonstrated by unregister_snap_client, aka CID-9804501fa122. | https://nvd.nist.gov/vuln/detail/CVE-2019-19227 |
207,035 | linux | 9804501fa1228048857910a6bf23e085aade37cc | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9804501fa1228048857910a6bf23e085aade37cc | appletalk: Fix potential NULL pointer dereference in unregister_snap_client
register_snap_client may return NULL, all the callers
check it, but only print a warning. This will result in
NULL pointer dereference in unregister_snap_client and other
places.
It has always been used like this since v2.6
Reported-by: Dan ... | 1 | void __init aarp_proto_init(void)
{
aarp_dl = register_snap_client(aarp_snap_id, aarp_rcv);
if (!aarp_dl)
printk(KERN_CRIT "Unable to register AARP with SNAP.\n");
timer_setup(&aarp_timer, aarp_expire_timeout, 0);
aarp_timer.expires = jiffies + sysctl_aarp_expiry_time;
add_timer(&aarp_timer);
register_netdevic... | 338,830,975,253,692,840,000,000,000,000,000,000,000 | aarp.c | 196,903,643,527,461,750,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2019-19227 | In the AppleTalk subsystem in the Linux kernel before 5.1, there is a potential NULL pointer dereference because register_snap_client may return NULL. This will lead to denial of service in net/appletalk/aarp.c and net/appletalk/ddp.c, as demonstrated by unregister_snap_client, aka CID-9804501fa122. | https://nvd.nist.gov/vuln/detail/CVE-2019-19227 |
390,982 | linux | 9804501fa1228048857910a6bf23e085aade37cc | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9804501fa1228048857910a6bf23e085aade37cc | appletalk: Fix potential NULL pointer dereference in unregister_snap_client
register_snap_client may return NULL, all the callers
check it, but only print a warning. This will result in
NULL pointer dereference in unregister_snap_client and other
places.
It has always been used like this since v2.6
Reported-by: Dan ... | 0 | int __init aarp_proto_init(void)
{
int rc;
aarp_dl = register_snap_client(aarp_snap_id, aarp_rcv);
if (!aarp_dl) {
printk(KERN_CRIT "Unable to register AARP with SNAP.\n");
return -ENOMEM;
}
timer_setup(&aarp_timer, aarp_expire_timeout, 0);
aarp_timer.expires = jiffies + sysctl_aarp_expiry_time;
add_timer(... | 233,299,009,758,736,420,000,000,000,000,000,000,000 | aarp.c | 205,034,451,625,910,630,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2019-19227 | In the AppleTalk subsystem in the Linux kernel before 5.1, there is a potential NULL pointer dereference because register_snap_client may return NULL. This will lead to denial of service in net/appletalk/aarp.c and net/appletalk/ddp.c, as demonstrated by unregister_snap_client, aka CID-9804501fa122. | https://nvd.nist.gov/vuln/detail/CVE-2019-19227 |
207,058 | ghostpdl | 027c546e0dd11e0526f1780a7f3c2c66acffe209 | https://github.com/ArtifexSoftware/ghostpdl | http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=027c546e0dd11e0526f1780a7f3c2c66acffe209 | Bug 701842: Fix misindexing in gxicolor.c
We were incorrectly decrementing position per-component, rather
than per-pixel (in 2 places).
Also, take care of some whitespace oddities. | 1 | image_render_color_thresh(gx_image_enum *penum_orig, const byte *buffer, int data_x,
uint w, int h, gx_device * dev)
{
gx_image_enum *penum = penum_orig; /* const within proc */
image_posture posture = penum->posture;
int vdi; /* amounts to replicate */
fixed xrun = 0;
byt... | 28,360,836,000,754,110,000,000,000,000,000,000,000 | gxicolor.c | 271,600,152,451,303,360,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2020-16304 | A buffer overflow vulnerability in image_render_color_thresh() in base/gxicolor.c of Artifex Software GhostScript v9.50 allows a remote attacker to escalate privileges via a crafted eps file. This is fixed in v9.51. | https://nvd.nist.gov/vuln/detail/CVE-2020-16304 |
391,443 | ghostpdl | 027c546e0dd11e0526f1780a7f3c2c66acffe209 | https://github.com/ArtifexSoftware/ghostpdl | http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=027c546e0dd11e0526f1780a7f3c2c66acffe209 | Bug 701842: Fix misindexing in gxicolor.c
We were incorrectly decrementing position per-component, rather
than per-pixel (in 2 places).
Also, take care of some whitespace oddities. | 0 | image_render_color_thresh(gx_image_enum *penum_orig, const byte *buffer, int data_x,
uint w, int h, gx_device * dev)
{
gx_image_enum *penum = penum_orig; /* const within proc */
image_posture posture = penum->posture;
int vdi; /* amounts to replicate */
fixed xrun = 0;
byt... | 165,674,750,779,607,660,000,000,000,000,000,000,000 | gxicolor.c | 227,681,177,728,911,430,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2020-16304 | A buffer overflow vulnerability in image_render_color_thresh() in base/gxicolor.c of Artifex Software GhostScript v9.50 allows a remote attacker to escalate privileges via a crafted eps file. This is fixed in v9.51. | https://nvd.nist.gov/vuln/detail/CVE-2020-16304 |
207,062 | libdwarf-code | 7ef09e1fc9ba07653dd078edb2408631c7969162 | https://github.com/davea42/libdwarf-code | https://github.com/davea42/libdwarf-code/commit/7ef09e1fc9ba07653dd078edb2408631c7969162 | Fixes old bug(which could result in Denial of Service)
due to a missing check before reading the 8 bytes of a DW_FORM_ref_sig8.
DW202206-001
modified: src/lib/libdwarf/dwarf_form.c | 1 | dwarf_global_formref_b(Dwarf_Attribute attr,
Dwarf_Off * ret_offset,
Dwarf_Bool * offset_is_info,
Dwarf_Error * error)
{
Dwarf_Debug dbg = 0;
Dwarf_Unsigned offset = 0;
Dwarf_CU_Context cu_context = 0;
Dwarf_Half context_version = 0;
Dwarf_Byte_Ptr section_end = 0;
Dwarf_Bool is_info... | 89,795,525,620,056,720,000,000,000,000,000,000,000 | dwarf_form.c | 228,293,279,858,083,700,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2022-34299 | There is a heap-based buffer over-read in libdwarf 0.4.0. This issue is related to dwarf_global_formref_b. | https://nvd.nist.gov/vuln/detail/CVE-2022-34299 |
391,582 | libdwarf-code | 7ef09e1fc9ba07653dd078edb2408631c7969162 | https://github.com/davea42/libdwarf-code | https://github.com/davea42/libdwarf-code/commit/7ef09e1fc9ba07653dd078edb2408631c7969162 | Fixes old bug(which could result in Denial of Service)
due to a missing check before reading the 8 bytes of a DW_FORM_ref_sig8.
DW202206-001
modified: src/lib/libdwarf/dwarf_form.c | 0 | dwarf_global_formref_b(Dwarf_Attribute attr,
Dwarf_Off * ret_offset,
Dwarf_Bool * offset_is_info,
Dwarf_Error * error)
{
Dwarf_Debug dbg = 0;
Dwarf_Unsigned offset = 0;
Dwarf_CU_Context cu_context = 0;
Dwarf_Half context_version = 0;
Dwarf_Byte_Ptr section_end = 0;
Dwarf_Bool is_info... | 20,406,051,189,774,834,000,000,000,000,000,000,000 | dwarf_form.c | 223,310,352,218,560,900,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2022-34299 | There is a heap-based buffer over-read in libdwarf 0.4.0. This issue is related to dwarf_global_formref_b. | https://nvd.nist.gov/vuln/detail/CVE-2022-34299 |
207,063 | linux | 91efafb1dd8f471177a3dddb4841d75d3df1cc46 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=91efafb1dd8f471177a3dddb4841d75d3df1cc46 | lib/vsprintf: Replace space with '_' before crng is ready
Before crng is ready, output of "%p" composes of "(ptrval)" and
left padding spaces for alignment as no random address can be
generated. This seems a little strange when default string width
is larger than strlen("(ptrval)").
For example, when irq domain names... | 1 | static char *ptr_to_id(char *buf, char *end, void *ptr, struct printf_spec spec)
{
unsigned long hashval;
if (unlikely(!have_filled_random_ptr_key)) {
spec.field_width = 2 * sizeof(ptr);
/* string length must be less than default_width */
return string(buf, end, "(ptrval)", spec);
}
#ifdef CONFIG_64BIT
hash... | 195,626,724,284,903,000,000,000,000,000,000,000,000 | vsprintf.c | 321,161,672,495,797,700,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2018-20449 | The hidma_chan_stats function in drivers/dma/qcom/hidma_dbg.c in the Linux kernel 4.14.90 allows local users to obtain sensitive address information by reading "callback=" lines in a debugfs file. | https://nvd.nist.gov/vuln/detail/CVE-2018-20449 |
391,600 | linux | 91efafb1dd8f471177a3dddb4841d75d3df1cc46 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=91efafb1dd8f471177a3dddb4841d75d3df1cc46 | lib/vsprintf: Replace space with '_' before crng is ready
Before crng is ready, output of "%p" composes of "(ptrval)" and
left padding spaces for alignment as no random address can be
generated. This seems a little strange when default string width
is larger than strlen("(ptrval)").
For example, when irq domain names... | 0 | static char *ptr_to_id(char *buf, char *end, void *ptr, struct printf_spec spec)
{
const char *str = sizeof(ptr) == 8 ? "(____ptrval____)" : "(ptrval)";
unsigned long hashval;
if (unlikely(!have_filled_random_ptr_key)) {
spec.field_width = 2 * sizeof(ptr);
/* string length must be less than default_width */
r... | 131,630,973,177,241,010,000,000,000,000,000,000,000 | vsprintf.c | 33,348,255,431,871,095,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2018-20449 | The hidma_chan_stats function in drivers/dma/qcom/hidma_dbg.c in the Linux kernel 4.14.90 allows local users to obtain sensitive address information by reading "callback=" lines in a debugfs file. | https://nvd.nist.gov/vuln/detail/CVE-2018-20449 |
207,067 | poppler | ae614bf8ab42c9d0c7ac57ecdfdcbcfc4ff6c639 | https://github.com/freedesktop/poppler | https://gitlab.freedesktop.org/poppler/poppler/-/commit/ae614bf8ab42c9d0c7ac57ecdfdcbcfc4ff6c639 | Fix DCTStream::getChars we're reading past the buffer check
I wonder how this had never crashed before :S
Fixes #1011 | 1 | int DCTStream::getChars(int nChars, unsigned char *buffer)
{
for (int i = 0; i < nChars;) {
if (current == limit) {
if (!readLine())
return i;
}
int left = limit - current;
if (nChars < left)
left = nChars;
memcpy(buffer + i, current, l... | 124,734,274,314,785,340,000,000,000,000,000,000 | DCTStream.cc | 93,715,544,098,292,490,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2020-35702 | DCTStream::getChars in DCTStream.cc in Poppler 20.12.1 has a heap-based buffer overflow via a crafted PDF document. NOTE: later reports indicate that this only affects builds from Poppler git clones in late December 2020, not the 20.12.1 release. In this situation, it should NOT be considered a Poppler vulnerability. H... | https://nvd.nist.gov/vuln/detail/CVE-2020-35702 |
391,625 | poppler | ae614bf8ab42c9d0c7ac57ecdfdcbcfc4ff6c639 | https://github.com/freedesktop/poppler | https://gitlab.freedesktop.org/poppler/poppler/-/commit/ae614bf8ab42c9d0c7ac57ecdfdcbcfc4ff6c639 | Fix DCTStream::getChars we're reading past the buffer check
I wonder how this had never crashed before :S
Fixes #1011 | 0 | int DCTStream::getChars(int nChars, unsigned char *buffer)
{
for (int i = 0; i < nChars;) {
if (current == limit) {
if (!readLine())
return i;
}
int left = limit - current;
if (left + i > nChars)
left = nChars - i;
memcpy(buffer + i, cu... | 298,044,836,669,523,720,000,000,000,000,000,000,000 | DCTStream.cc | 225,161,806,091,866,600,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2020-35702 | DCTStream::getChars in DCTStream.cc in Poppler 20.12.1 has a heap-based buffer overflow via a crafted PDF document. NOTE: later reports indicate that this only affects builds from Poppler git clones in late December 2020, not the 20.12.1 release. In this situation, it should NOT be considered a Poppler vulnerability. H... | https://nvd.nist.gov/vuln/detail/CVE-2020-35702 |
207,076 | curl | 0b664ba968437715819bfe4c7ada5679d16ebbc3 | https://github.com/curl/curl | https://github.com/curl/curl/commit/0b664ba968437715819bfe4c7ada5679d16ebbc3 | wildcardmatch: fix heap buffer overflow in setcharset
The code would previous read beyond the end of the pattern string if the
match pattern ends with an open bracket when the default pattern
matching function is used.
Detected by OSS-Fuzz:
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=4161
CVE-2017-8817
Bu... | 1 | static int setcharset(unsigned char **p, unsigned char *charset)
{
setcharset_state state = CURLFNM_SCHS_DEFAULT;
unsigned char rangestart = 0;
unsigned char lastchar = 0;
bool something_found = FALSE;
unsigned char c;
for(;;) {
c = **p;
switch(state) {
case CURLFNM_SCHS_DEFAULT:
if(ISAL... | 59,267,346,305,676,200,000,000,000,000,000,000,000 | curl_fnmatch.c | 70,545,915,287,016,530,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-8817 | The FTP wildcard function in curl and libcurl before 7.57.0 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) or possibly have unspecified other impact via a string that ends with an '[' character. | https://nvd.nist.gov/vuln/detail/CVE-2017-8817 |
391,689 | curl | 0b664ba968437715819bfe4c7ada5679d16ebbc3 | https://github.com/curl/curl | https://github.com/curl/curl/commit/0b664ba968437715819bfe4c7ada5679d16ebbc3 | wildcardmatch: fix heap buffer overflow in setcharset
The code would previous read beyond the end of the pattern string if the
match pattern ends with an open bracket when the default pattern
matching function is used.
Detected by OSS-Fuzz:
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=4161
CVE-2017-8817
Bu... | 0 | static int setcharset(unsigned char **p, unsigned char *charset)
{
setcharset_state state = CURLFNM_SCHS_DEFAULT;
unsigned char rangestart = 0;
unsigned char lastchar = 0;
bool something_found = FALSE;
unsigned char c;
for(;;) {
c = **p;
if(!c)
return SETCHARSET_FAIL;
switch(state) {
... | 181,294,438,558,738,200,000,000,000,000,000,000,000 | curl_fnmatch.c | 321,471,728,171,742,660,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-8817 | The FTP wildcard function in curl and libcurl before 7.57.0 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) or possibly have unspecified other impact via a string that ends with an '[' character. | https://nvd.nist.gov/vuln/detail/CVE-2017-8817 |
207,080 | glib | d8f8f4d637ce43f8699ba94c9b7648beda0ca174 | https://gitlab.gnome.org/GNOME/glib | https://gitlab.gnome.org/GNOME/glib/commit/d8f8f4d637ce43f8699ba94c9b7648beda0ca174 | gfile: Limit access to files when copying
file_copy_fallback creates new files with default permissions and
set the correct permissions after the operation is finished. This
might cause that the files can be accessible by more users during
the operation than expected. Use G_FILE_CREATE_PRIVATE for the new
files to lim... | 1 | file_copy_fallback (GFile *source,
GFile *destination,
GFileCopyFlags flags,
GCancellable *cancellable,
GFileProgressCallback progress_callback,
gpointer ... | 95,538,858,328,680,170,000,000,000,000,000,000,000 | gfile.c | 232,282,345,857,478,900,000,000,000,000,000,000,000 | [
"CWE-362"
] | CVE-2019-12450 | file_copy_fallback in gio/gfile.c in GNOME GLib 2.15.0 through 2.61.1 does not properly restrict file permissions while a copy operation is in progress. Instead, default permissions are used. | https://nvd.nist.gov/vuln/detail/CVE-2019-12450 |
392,113 | glib | d8f8f4d637ce43f8699ba94c9b7648beda0ca174 | https://gitlab.gnome.org/GNOME/glib | https://gitlab.gnome.org/GNOME/glib/commit/d8f8f4d637ce43f8699ba94c9b7648beda0ca174 | gfile: Limit access to files when copying
file_copy_fallback creates new files with default permissions and
set the correct permissions after the operation is finished. This
might cause that the files can be accessible by more users during
the operation than expected. Use G_FILE_CREATE_PRIVATE for the new
files to lim... | 0 | file_copy_fallback (GFile *source,
GFile *destination,
GFileCopyFlags flags,
GCancellable *cancellable,
GFileProgressCallback progress_callback,
gpointer ... | 10,010,926,976,249,910,000,000,000,000,000,000,000 | gfile.c | 245,006,577,661,034,730,000,000,000,000,000,000,000 | [
"CWE-362"
] | CVE-2019-12450 | file_copy_fallback in gio/gfile.c in GNOME GLib 2.15.0 through 2.61.1 does not properly restrict file permissions while a copy operation is in progress. Instead, default permissions are used. | https://nvd.nist.gov/vuln/detail/CVE-2019-12450 |
207,081 | gstreamer | 9398b7f1a75b38844ae7050b5a7967e4cdebe24f | https://github.com/GStreamer/gstreamer | https://github.com/GStreamer/gstreamer/commit/9398b7f1a75b38844ae7050b5a7967e4cdebe24f | datetime: fix potential out-of-bound read on malformed datetime string
https://bugzilla.gnome.org/show_bug.cgi?id=777263 | 1 | gst_date_time_new_from_iso8601_string (const gchar * string)
{
gint year = -1, month = -1, day = -1, hour = -1, minute = -1;
gint gmt_offset_hour = -99, gmt_offset_min = -99;
gdouble second = -1.0;
gfloat tzoffset = 0.0;
guint64 usecs;
gint len, ret;
g_return_val_if_fail (string != NULL, NULL);
GST_DE... | 260,351,361,235,967,850,000,000,000,000,000,000,000 | gstdatetime.c | 104,242,030,389,358,220,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-5838 | The gst_date_time_new_from_iso8601_string function in gst/gstdatetime.c in GStreamer before 1.10.3 allows remote attackers to cause a denial of service (out-of-bounds heap read) via a malformed datetime string. | https://nvd.nist.gov/vuln/detail/CVE-2017-5838 |
392,156 | gstreamer | 9398b7f1a75b38844ae7050b5a7967e4cdebe24f | https://github.com/GStreamer/gstreamer | https://github.com/GStreamer/gstreamer/commit/9398b7f1a75b38844ae7050b5a7967e4cdebe24f | datetime: fix potential out-of-bound read on malformed datetime string
https://bugzilla.gnome.org/show_bug.cgi?id=777263 | 0 | gst_date_time_new_from_iso8601_string (const gchar * string)
{
gint year = -1, month = -1, day = -1, hour = -1, minute = -1;
gint gmt_offset_hour = -99, gmt_offset_min = -99;
gdouble second = -1.0;
gfloat tzoffset = 0.0;
guint64 usecs;
gint len, ret;
g_return_val_if_fail (string != NULL, NULL);
GST_DE... | 114,425,864,831,581,950,000,000,000,000,000,000,000 | gstdatetime.c | 166,779,981,257,063,190,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2017-5838 | The gst_date_time_new_from_iso8601_string function in gst/gstdatetime.c in GStreamer before 1.10.3 allows remote attackers to cause a denial of service (out-of-bounds heap read) via a malformed datetime string. | https://nvd.nist.gov/vuln/detail/CVE-2017-5838 |
207,102 | linux | 1acb8f2a7a9f10543868ddd737e37424d5c36cf4 | https://github.com/torvalds/linux | https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1acb8f2a7a9f10543868ddd737e37424d5c36cf4 | net: qlogic: Fix memory leak in ql_alloc_large_buffers
In ql_alloc_large_buffers, a new skb is allocated via netdev_alloc_skb.
This skb should be released if pci_dma_mapping_error fails.
Fixes: 0f8ab89e825f ("qla3xxx: Check return code from pci_map_single() in ql_release_to_lrg_buf_free_list(), ql_populate_free_queue... | 1 |
static int ql_alloc_large_buffers(struct ql3_adapter *qdev)
{
int i;
struct ql_rcv_buf_cb *lrg_buf_cb;
struct sk_buff *skb;
dma_addr_t map;
int err;
for (i = 0; i < qdev->num_large_buffers; i++) {
skb = netdev_alloc_skb(qdev->ndev,
qdev->lrg_buffer_len);
if (unlikely(!skb)) {
/* Better luck ne... | 164,113,418,536,327,850,000,000,000,000,000,000,000 | None | null | [
"CWE-401"
] | CVE-2019-18806 | A memory leak in the ql_alloc_large_buffers() function in drivers/net/ethernet/qlogic/qla3xxx.c in the Linux kernel before 5.3.5 allows local users to cause a denial of service (memory consumption) by triggering pci_dma_mapping_error() failures, aka CID-1acb8f2a7a9f. | https://nvd.nist.gov/vuln/detail/CVE-2019-18806 |
392,530 | linux | 1acb8f2a7a9f10543868ddd737e37424d5c36cf4 | https://github.com/torvalds/linux | https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1acb8f2a7a9f10543868ddd737e37424d5c36cf4 | net: qlogic: Fix memory leak in ql_alloc_large_buffers
In ql_alloc_large_buffers, a new skb is allocated via netdev_alloc_skb.
This skb should be released if pci_dma_mapping_error fails.
Fixes: 0f8ab89e825f ("qla3xxx: Check return code from pci_map_single() in ql_release_to_lrg_buf_free_list(), ql_populate_free_queue... | 0 |
static int ql_alloc_large_buffers(struct ql3_adapter *qdev)
{
int i;
struct ql_rcv_buf_cb *lrg_buf_cb;
struct sk_buff *skb;
dma_addr_t map;
int err;
for (i = 0; i < qdev->num_large_buffers; i++) {
skb = netdev_alloc_skb(qdev->ndev,
qdev->lrg_buffer_len);
if (unlikely(!skb)) {
/* Better luck ne... | 319,131,137,887,923,550,000,000,000,000,000,000,000 | None | null | [
"CWE-401"
] | CVE-2019-18806 | A memory leak in the ql_alloc_large_buffers() function in drivers/net/ethernet/qlogic/qla3xxx.c in the Linux kernel before 5.3.5 allows local users to cause a denial of service (memory consumption) by triggering pci_dma_mapping_error() failures, aka CID-1acb8f2a7a9f. | https://nvd.nist.gov/vuln/detail/CVE-2019-18806 |
207,103 | gnutls | 6e76e9b9fa845b76b0b9a45f05f4b54a052578ff | http://git.savannah.gnu.org/cgit/gnutls | https://gitlab.com/gnutls/gnutls/commit/6e76e9b9fa845b76b0b9a45f05f4b54a052578ff | on certificate import check whether the two signature algorithms match | 1 | gnutls_x509_crt_import(gnutls_x509_crt_t cert,
const gnutls_datum_t * data,
gnutls_x509_crt_fmt_t format)
{
int result = 0;
int version;
if (cert == NULL) {
gnutls_assert();
return GNUTLS_E_INVALID_REQUEST;
}
if (cert->der.data) {
gnutls_free(cert->der.data);
cert->der.data = NULL;
}
... | 183,164,973,415,819,150,000,000,000,000,000,000,000 | None | null | [
"CWE-295"
] | CVE-2015-0294 | GnuTLS before 3.3.13 does not validate that the signature algorithms match when importing a certificate. | https://nvd.nist.gov/vuln/detail/CVE-2015-0294 |
392,616 | gnutls | 6e76e9b9fa845b76b0b9a45f05f4b54a052578ff | http://git.savannah.gnu.org/cgit/gnutls | https://gitlab.com/gnutls/gnutls/commit/6e76e9b9fa845b76b0b9a45f05f4b54a052578ff | on certificate import check whether the two signature algorithms match | 0 | gnutls_x509_crt_import(gnutls_x509_crt_t cert,
const gnutls_datum_t * data,
gnutls_x509_crt_fmt_t format)
{
int result = 0;
int version, s2;
if (cert == NULL) {
gnutls_assert();
return GNUTLS_E_INVALID_REQUEST;
}
if (cert->der.data) {
gnutls_free(cert->der.data);
cert->der.data = NULL;
... | 324,205,378,820,005,460,000,000,000,000,000,000,000 | None | null | [
"CWE-295"
] | CVE-2015-0294 | GnuTLS before 3.3.13 does not validate that the signature algorithms match when importing a certificate. | https://nvd.nist.gov/vuln/detail/CVE-2015-0294 |
207,140 | ImageMagick | 216d117f05bff87b9dc4db55a1b1fadb38bcb786 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/216d117f05bff87b9dc4db55a1b1fadb38bcb786 | XBM coder leaves the hex image data uninitialized if hex value of the pixel is negative | 1 | static Image *ReadXBMImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
char
buffer[MagickPathExtent],
name[MagickPathExtent];
Image
*image;
int
c;
MagickBooleanType
status;
register ssize_t
i,
x;
register Quantum
*q;
register unsigned char
*p;
short... | 256,699,559,025,187,470,000,000,000,000,000,000,000 | None | null | [
"CWE-703"
] | CVE-2018-16323 | ReadXBMImage in coders/xbm.c in ImageMagick before 7.0.8-9 leaves data uninitialized when processing an XBM file that has a negative pixel value. If the affected code is used as a library loaded into a process that includes sensitive information, that information sometimes can be leaked via the image data. | https://nvd.nist.gov/vuln/detail/CVE-2018-16323 |
393,352 | ImageMagick | 216d117f05bff87b9dc4db55a1b1fadb38bcb786 | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/216d117f05bff87b9dc4db55a1b1fadb38bcb786 | XBM coder leaves the hex image data uninitialized if hex value of the pixel is negative | 0 | static Image *ReadXBMImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
char
buffer[MagickPathExtent],
name[MagickPathExtent];
Image
*image;
int
c;
MagickBooleanType
status;
register ssize_t
i,
x;
register Quantum
*q;
register unsigned char
*p;
short... | 252,164,396,504,909,130,000,000,000,000,000,000,000 | None | null | [
"CWE-703"
] | CVE-2018-16323 | ReadXBMImage in coders/xbm.c in ImageMagick before 7.0.8-9 leaves data uninitialized when processing an XBM file that has a negative pixel value. If the affected code is used as a library loaded into a process that includes sensitive information, that information sometimes can be leaked via the image data. | https://nvd.nist.gov/vuln/detail/CVE-2018-16323 |
207,149 | linux | 9d538fa60bad4f7b23193c89e843797a1cf71ef3 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9d538fa60bad4f7b23193c89e843797a1cf71ef3 | net: Set sk_prot_creator when cloning sockets to the right proto
sk->sk_prot and sk->sk_prot_creator can differ when the app uses
IPV6_ADDRFORM (transforming an IPv6-socket to an IPv4-one).
Which is why sk_prot_creator is there to make sure that sk_prot_free()
does the kmem_cache_free() on the right kmem_cache slab.
... | 1 | struct sock *sk_clone_lock(const struct sock *sk, const gfp_t priority)
{
struct sock *newsk;
bool is_charged = true;
newsk = sk_prot_alloc(sk->sk_prot, priority, sk->sk_family);
if (newsk != NULL) {
struct sk_filter *filter;
sock_copy(newsk, sk);
/* SANITY */
if (likely(newsk->sk_net_refcnt))
get_net... | 237,789,181,741,003,840,000,000,000,000,000,000,000 | sock.c | 80,948,183,003,052,040,000,000,000,000,000,000,000 | [
"CWE-704"
] | CVE-2018-9568 | In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-113509306. References: Upst... | https://nvd.nist.gov/vuln/detail/CVE-2018-9568 |
393,425 | linux | 9d538fa60bad4f7b23193c89e843797a1cf71ef3 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9d538fa60bad4f7b23193c89e843797a1cf71ef3 | net: Set sk_prot_creator when cloning sockets to the right proto
sk->sk_prot and sk->sk_prot_creator can differ when the app uses
IPV6_ADDRFORM (transforming an IPv6-socket to an IPv4-one).
Which is why sk_prot_creator is there to make sure that sk_prot_free()
does the kmem_cache_free() on the right kmem_cache slab.
... | 0 | struct sock *sk_clone_lock(const struct sock *sk, const gfp_t priority)
{
struct sock *newsk;
bool is_charged = true;
newsk = sk_prot_alloc(sk->sk_prot, priority, sk->sk_family);
if (newsk != NULL) {
struct sk_filter *filter;
sock_copy(newsk, sk);
newsk->sk_prot_creator = sk->sk_prot;
/* SANITY */
if ... | 160,894,355,119,491,430,000,000,000,000,000,000,000 | sock.c | 92,137,101,248,922,770,000,000,000,000,000,000,000 | [
"CWE-704"
] | CVE-2018-9568 | In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-113509306. References: Upst... | https://nvd.nist.gov/vuln/detail/CVE-2018-9568 |
207,155 | ghostpdl | eaba1d97b62831b42c51840cc8ee2bc4576c942e | https://github.com/ArtifexSoftware/ghostpdl | https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=eaba1d97b62831b42c51840cc8ee2bc4576c942e | Bug 701828: make dot24_print_page() return error instead of divide by zero.
Fixes:
./sanbin/gs -dBATCH -dNOPAUSE -dSAFER -r2 -sOutputFile=tmp -sDEVICE=necp6 ../bug-701828.pdf | 1 | dot24_print_page (gx_device_printer *pdev, gp_file *prn_stream, char *init_string, int init_len)
{
int xres = (int)pdev->x_pixels_per_inch;
int yres = (int)pdev->y_pixels_per_inch;
int x_high = (xres == 360);
int y_high = (yres == 360);
int bits_per_column = (y_high ? 48 : 24);
uint line_size = gdev_prn_ras... | 45,783,720,502,370,160,000,000,000,000,000,000,000 | gdevdm24.c | 104,054,192,628,023,980,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2020-16310 | A division by zero vulnerability in dot24_print_page() in devices/gdevdm24.c of Artifex Software GhostScript v9.50 allows a remote attacker to cause a denial of service via a crafted PDF file. This is fixed in v9.51. | https://nvd.nist.gov/vuln/detail/CVE-2020-16310 |
393,588 | ghostpdl | eaba1d97b62831b42c51840cc8ee2bc4576c942e | https://github.com/ArtifexSoftware/ghostpdl | https://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=eaba1d97b62831b42c51840cc8ee2bc4576c942e | Bug 701828: make dot24_print_page() return error instead of divide by zero.
Fixes:
./sanbin/gs -dBATCH -dNOPAUSE -dSAFER -r2 -sOutputFile=tmp -sDEVICE=necp6 ../bug-701828.pdf | 0 | dot24_print_page (gx_device_printer *pdev, gp_file *prn_stream, char *init_string, int init_len)
{
int xres;
int yres;
int x_high;
int y_high;
int bits_per_column;
uint line_size;
uint in_size;
byte *in;
uint out_size;
byte *out;
int y_passes;
int dots_per_space;
int bytes_per_space;
int ski... | 279,538,896,050,443,500,000,000,000,000,000,000,000 | gdevdm24.c | 310,514,458,205,069,550,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2020-16310 | A division by zero vulnerability in dot24_print_page() in devices/gdevdm24.c of Artifex Software GhostScript v9.50 allows a remote attacker to cause a denial of service via a crafted PDF file. This is fixed in v9.51. | https://nvd.nist.gov/vuln/detail/CVE-2020-16310 |
207,159 | linux | 9060cb719e61b685ec0102574e10337fa5f445ea | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9060cb719e61b685ec0102574e10337fa5f445ea | net: crypto set sk to NULL when af_alg_release.
KASAN has found use-after-free in sockfs_setattr.
The existed commit 6d8c50dcb029 ("socket: close race condition between sock_close()
and sockfs_setattr()") is to fix this simillar issue, but it seems to ignore
that crypto module forgets to set the sk to NULL after af_al... | 1 | int af_alg_release(struct socket *sock)
{
if (sock->sk)
sock_put(sock->sk);
return 0;
} | 133,239,235,791,001,380,000,000,000,000,000,000,000 | af_alg.c | 332,442,507,905,829,500,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2019-8912 | In the Linux kernel through 4.20.11, af_alg_release() in crypto/af_alg.c neglects to set a NULL value for a certain structure member, which leads to a use-after-free in sockfs_setattr. | https://nvd.nist.gov/vuln/detail/CVE-2019-8912 |
393,666 | linux | 9060cb719e61b685ec0102574e10337fa5f445ea | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9060cb719e61b685ec0102574e10337fa5f445ea | net: crypto set sk to NULL when af_alg_release.
KASAN has found use-after-free in sockfs_setattr.
The existed commit 6d8c50dcb029 ("socket: close race condition between sock_close()
and sockfs_setattr()") is to fix this simillar issue, but it seems to ignore
that crypto module forgets to set the sk to NULL after af_al... | 0 | int af_alg_release(struct socket *sock)
{
if (sock->sk) {
sock_put(sock->sk);
sock->sk = NULL;
}
return 0;
} | 29,719,766,617,545,070,000,000,000,000,000,000,000 | af_alg.c | 139,259,866,897,556,600,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2019-8912 | In the Linux kernel through 4.20.11, af_alg_release() in crypto/af_alg.c neglects to set a NULL value for a certain structure member, which leads to a use-after-free in sockfs_setattr. | https://nvd.nist.gov/vuln/detail/CVE-2019-8912 |
207,164 | ImageMagick6 | ffedc1feed46ae5dfad2aeaf4bd9c42174ec0ad1 | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/ffedc1feed46ae5dfad2aeaf4bd9c42174ec0ad1 | https://github.com/ImageMagick/ImageMagick/issues/1450 | 1 | static MagickBooleanType DecodeImage(Image *image,unsigned char *luma,
unsigned char *chroma1,unsigned char *chroma2)
{
#define IsSync(sum) ((sum & 0xffffff00UL) == 0xfffffe00UL)
#define PCDGetBits(n) \
{ \
sum=(sum << n) & 0xffffffff; \
bits-=n; \
while (bits <= 24) \
{ \
if (p >= (buffer+0x800)) \
... | 5,425,458,434,953,525,000,000,000,000,000,000,000 | None | null | [
"CWE-401"
] | CVE-2019-7175 | In ImageMagick before 7.0.8-25, some memory leaks exist in DecodeImage in coders/pcd.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-7175 |
393,688 | ImageMagick6 | ffedc1feed46ae5dfad2aeaf4bd9c42174ec0ad1 | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/ffedc1feed46ae5dfad2aeaf4bd9c42174ec0ad1 | https://github.com/ImageMagick/ImageMagick/issues/1450 | 0 | static MagickBooleanType DecodeImage(Image *image,unsigned char *luma,
unsigned char *chroma1,unsigned char *chroma2)
{
#define IsSync(sum) ((sum & 0xffffff00UL) == 0xfffffe00UL)
#define PCDGetBits(n) \
{ \
sum=(sum << n) & 0xffffffff; \
bits-=n; \
while (bits <= 24) \
{ \
if (p >= (buffer+0x800)) \
... | 8,569,007,305,254,730,000,000,000,000,000,000,000 | None | null | [
"CWE-401"
] | CVE-2019-7175 | In ImageMagick before 7.0.8-25, some memory leaks exist in DecodeImage in coders/pcd.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-7175 |
207,165 | krb5 | 5d2d9a1abe46a2c1a8614d4672d08d9d30a5f8bf | https://github.com/krb5/krb5 | https://github.com/krb5/krb5/commit/5d2d9a1abe46a2c1a8614d4672d08d9d30a5f8bf | Multi-realm KDC null deref [CVE-2013-1418]
If a KDC serves multiple realms, certain requests can cause
setup_server_realm() to dereference a null pointer, crashing the KDC.
CVSSv2: AV:N/AC:M/Au:N/C:N/I:N/A:P/E:POC/RL:OF/RC:C
A related but more minor vulnerability requires authentication to
exploit, and is only prese... | 1 | setup_server_realm(struct server_handle *handle, krb5_principal sprinc)
{
kdc_realm_t *newrealm;
kdc_realm_t **kdc_realmlist = handle->kdc_realmlist;
int kdc_numrealms = handle->kdc_numrealms;
if (kdc_numrealms > 1) {
if (!(newrealm = find_realm_data(handle, sprinc->realm.data,
... | 131,857,710,981,162,380,000,000,000,000,000,000,000 | main.c | 120,090,461,959,797,000,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2013-1418 | The setup_server_realm function in main.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.10.7, when multiple realms are configured, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted request. | https://nvd.nist.gov/vuln/detail/CVE-2013-1418 |
393,701 | krb5 | 5d2d9a1abe46a2c1a8614d4672d08d9d30a5f8bf | https://github.com/krb5/krb5 | https://github.com/krb5/krb5/commit/5d2d9a1abe46a2c1a8614d4672d08d9d30a5f8bf | Multi-realm KDC null deref [CVE-2013-1418]
If a KDC serves multiple realms, certain requests can cause
setup_server_realm() to dereference a null pointer, crashing the KDC.
CVSSv2: AV:N/AC:M/Au:N/C:N/I:N/A:P/E:POC/RL:OF/RC:C
A related but more minor vulnerability requires authentication to
exploit, and is only prese... | 0 | setup_server_realm(struct server_handle *handle, krb5_principal sprinc)
{
kdc_realm_t *newrealm;
kdc_realm_t **kdc_realmlist = handle->kdc_realmlist;
int kdc_numrealms = handle->kdc_numrealms;
if (sprinc == NULL)
return NULL;
if (kdc_numrealms > 1) {
if (!(newrealm = find_r... | 26,328,549,791,124,000,000,000,000,000,000,000,000 | main.c | 225,719,892,728,491,440,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2013-1418 | The setup_server_realm function in main.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.10.7, when multiple realms are configured, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted request. | https://nvd.nist.gov/vuln/detail/CVE-2013-1418 |
207,173 | mongo-c-driver-legacy | 1a1f5e26a4309480d88598913f9eebf9e9cba8ca | https://github.com/10gen-archive/mongo-c-driver-legacy | https://github.com/10gen-archive/mongo-c-driver-legacy/commit/1a1f5e26a4309480d88598913f9eebf9e9cba8ca#diff-f7d29a680148f52d6601f59ed787f577 | don't mix up int and size_t (first pass to fix that) | 1 | int bson_ensure_space( bson *b, const int bytesNeeded ) {
int pos = b->cur - b->data;
char *orig = b->data;
int new_size;
if ( pos + bytesNeeded <= b->dataSize )
return BSON_OK;
new_size = 1.5 * ( b->dataSize + bytesNeeded );
if( new_size < b->dataSize ) {
if( ( b->dataSize + ... | 26,984,707,463,491,613,000,000,000,000,000,000,000 | bson.c | 168,153,828,348,961,270,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2020-12135 | bson before 0.8 incorrectly uses int rather than size_t for many variables, parameters, and return values. In particular, the bson_ensure_space() parameter bytesNeeded could have an integer overflow via properly constructed bson input. | https://nvd.nist.gov/vuln/detail/CVE-2020-12135 |
393,917 | mongo-c-driver-legacy | 1a1f5e26a4309480d88598913f9eebf9e9cba8ca | https://github.com/10gen-archive/mongo-c-driver-legacy | https://github.com/10gen-archive/mongo-c-driver-legacy/commit/1a1f5e26a4309480d88598913f9eebf9e9cba8ca#diff-f7d29a680148f52d6601f59ed787f577 | don't mix up int and size_t (first pass to fix that) | 0 | int bson_ensure_space( bson *b, const size_t bytesNeeded ) {
int pos = b->cur - b->data;
char *orig = b->data;
int new_size;
if ( pos + bytesNeeded <= b->dataSize )
return BSON_OK;
new_size = 1.5 * ( b->dataSize + bytesNeeded );
if( new_size < b->dataSize ) {
if( ( b->dataSize... | 296,360,099,655,615,200,000,000,000,000,000,000,000 | bson.c | 174,709,361,587,383,760,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2020-12135 | bson before 0.8 incorrectly uses int rather than size_t for many variables, parameters, and return values. In particular, the bson_ensure_space() parameter bytesNeeded could have an integer overflow via properly constructed bson input. | https://nvd.nist.gov/vuln/detail/CVE-2020-12135 |
207,211 | olm | ccc0d122ee1b4d5e5ca4ec1432086be17d5f901b | https://gitlab.matrix.org/matrix-org/olm | https://gitlab.matrix.org/matrix-org/olm/-/commit/ccc0d122ee1b4d5e5ca4ec1432086be17d5f901b | olm_pk_decrypt: Ensure inputs are of correct length. | 1 | size_t olm_pk_decrypt(
OlmPkDecryption * decryption,
void const * ephemeral_key, size_t ephemeral_key_length,
void const * mac, size_t mac_length,
void * ciphertext, size_t ciphertext_length,
void * plaintext, size_t max_plaintext_length
) {
if (max_plaintext_length
< olm_pk_max_plai... | 57,444,470,558,801,210,000,000,000,000,000,000,000 | pk.cpp | 10,873,334,401,014,816,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2021-34813 | Matrix libolm before 3.2.3 allows a malicious Matrix homeserver to crash a client (while it is attempting to retrieve an Olm encrypted room key backup from the homeserver) because olm_pk_decrypt has a stack-based buffer overflow. Remote code execution might be possible for some nonstandard build configurations. | https://nvd.nist.gov/vuln/detail/CVE-2021-34813 |
394,056 | olm | ccc0d122ee1b4d5e5ca4ec1432086be17d5f901b | https://gitlab.matrix.org/matrix-org/olm | https://gitlab.matrix.org/matrix-org/olm/-/commit/ccc0d122ee1b4d5e5ca4ec1432086be17d5f901b | olm_pk_decrypt: Ensure inputs are of correct length. | 0 | size_t olm_pk_decrypt(
OlmPkDecryption * decryption,
void const * ephemeral_key, size_t ephemeral_key_length,
void const * mac, size_t mac_length,
void * ciphertext, size_t ciphertext_length,
void * plaintext, size_t max_plaintext_length
) {
if (max_plaintext_length
< olm_pk_max_plai... | 170,468,364,788,344,300,000,000,000,000,000,000,000 | pk.cpp | 192,591,163,221,088,300,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2021-34813 | Matrix libolm before 3.2.3 allows a malicious Matrix homeserver to crash a client (while it is attempting to retrieve an Olm encrypted room key backup from the homeserver) because olm_pk_decrypt has a stack-based buffer overflow. Remote code execution might be possible for some nonstandard build configurations. | https://nvd.nist.gov/vuln/detail/CVE-2021-34813 |
207,214 | linux | 6a7228d90d42bcacfe38786756ba62762b91c20a | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6a7228d90d42bcacfe38786756ba62762b91c20a | ARM: amba: Fix race condition with driver_override
The driver_override implementation is susceptible to a race condition
when different threads are reading vs storing a different driver
override. Add locking to avoid this race condition.
Cfr. commits 6265539776a0810b ("driver core: platform: fix race
condition with ... | 1 | static ssize_t driver_override_show(struct device *_dev,
struct device_attribute *attr, char *buf)
{
struct amba_device *dev = to_amba_device(_dev);
return sprintf(buf, "%s\n", dev->driver_override);
} | 288,295,345,624,891,250,000,000,000,000,000,000,000 | bus.c | 331,978,394,107,989,460,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2018-9415 | In driver_override_store and driver_override_show of bus.c, there is a possible double free due to improper locking. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-69129004... | https://nvd.nist.gov/vuln/detail/CVE-2018-9415 |
394,088 | linux | 6a7228d90d42bcacfe38786756ba62762b91c20a | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6a7228d90d42bcacfe38786756ba62762b91c20a | ARM: amba: Fix race condition with driver_override
The driver_override implementation is susceptible to a race condition
when different threads are reading vs storing a different driver
override. Add locking to avoid this race condition.
Cfr. commits 6265539776a0810b ("driver core: platform: fix race
condition with ... | 0 | static ssize_t driver_override_show(struct device *_dev,
struct device_attribute *attr, char *buf)
{
struct amba_device *dev = to_amba_device(_dev);
ssize_t len;
device_lock(_dev);
len = sprintf(buf, "%s\n", dev->driver_override);
device_unlock(_dev);
return len;
} | 249,078,860,988,429,400,000,000,000,000,000,000,000 | bus.c | 103,542,112,784,818,840,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2018-9415 | In driver_override_store and driver_override_show of bus.c, there is a possible double free due to improper locking. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-69129004... | https://nvd.nist.gov/vuln/detail/CVE-2018-9415 |
207,216 | sysstat | edbf507678bf10914e9804ff8a06737fdcb2e781 | https://github.com/sysstat/sysstat | https://github.com/sysstat/sysstat/commit/edbf507678bf10914e9804ff8a06737fdcb2e781 | Fix #230: Memory corruption bug due to Integer Overflow in remap_struct()
(See problem description in issue #230.)
Check that the number of fields (long long integers, long integers or
integers) as read from a system activity binary datafile multiplied by
its alignment width doesn't overflow, i.e. the result must not ... | 1 | int remap_struct(unsigned int gtypes_nr[], unsigned int ftypes_nr[],
void *ps, unsigned int f_size, unsigned int g_size, size_t b_size)
{
int d;
size_t n;
/* Sanity check */
if (MAP_SIZE(ftypes_nr) > f_size)
return -1;
/* Remap [unsigned] long fields */
d = gtypes_nr[0] - ftypes_nr[0];
if (d) {
n = MINI... | 276,486,057,262,227,200,000,000,000,000,000,000,000 | sa_common.c | 289,435,921,588,230,000,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2019-16167 | sysstat before 12.1.6 has memory corruption due to an Integer Overflow in remap_struct() in sa_common.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-16167 |
394,089 | sysstat | edbf507678bf10914e9804ff8a06737fdcb2e781 | https://github.com/sysstat/sysstat | https://github.com/sysstat/sysstat/commit/edbf507678bf10914e9804ff8a06737fdcb2e781 | Fix #230: Memory corruption bug due to Integer Overflow in remap_struct()
(See problem description in issue #230.)
Check that the number of fields (long long integers, long integers or
integers) as read from a system activity binary datafile multiplied by
its alignment width doesn't overflow, i.e. the result must not ... | 0 | int remap_struct(unsigned int gtypes_nr[], unsigned int ftypes_nr[],
void *ps, unsigned int f_size, unsigned int g_size, size_t b_size)
{
int d;
size_t n;
/* Sanity check */
if (MAP_SIZE(ftypes_nr) > f_size)
return -1;
/* Remap [unsigned] long fields */
d = gtypes_nr[0] - ftypes_nr[0];
if (d) {
if (ftyp... | 248,559,371,617,561,000,000,000,000,000,000,000,000 | sa_common.c | 186,153,788,445,625,500,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2019-16167 | sysstat before 12.1.6 has memory corruption due to an Integer Overflow in remap_struct() in sa_common.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-16167 |
207,217 | php-src | da3886de6dc8edab3da14331227816d6ca8e9b96 | https://github.com/php/php-src | https://github.com/php/php-src/commit/da3886de6dc8edab3da14331227816d6ca8e9b96 | Wrong value for FILTER_SANITIZE_FULL_SPECIAL_CHARS in REGISTER_LONG_CONSTANT | 1 | PHP_MINIT_FUNCTION(filter)
{
ZEND_INIT_MODULE_GLOBALS(filter, php_filter_init_globals, NULL);
REGISTER_INI_ENTRIES();
REGISTER_LONG_CONSTANT("INPUT_POST", PARSE_POST, CONST_CS | CONST_PERSISTENT);
REGISTER_LONG_CONSTANT("INPUT_GET", PARSE_GET, CONST_CS | CONST_PERSISTENT);
REGISTER_LONG_CONSTANT("INPUT_COOKIE... | 55,852,433,307,906,130,000,000,000,000,000,000,000 | filter.c | 323,093,258,235,591,950,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2016-5095 | Integer overflow in the php_escape_html_entities_ex function in ext/standard/html.c in PHP before 5.5.36 and 5.6.x before 5.6.22 allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering a large output string from a FILTER_SANITIZE_FULL_SPECIAL_CHARS filter_var call. ... | https://nvd.nist.gov/vuln/detail/CVE-2016-5095 |
394,094 | php-src | da3886de6dc8edab3da14331227816d6ca8e9b96 | https://github.com/php/php-src | https://github.com/php/php-src/commit/da3886de6dc8edab3da14331227816d6ca8e9b96 | Wrong value for FILTER_SANITIZE_FULL_SPECIAL_CHARS in REGISTER_LONG_CONSTANT | 0 | PHP_MINIT_FUNCTION(filter)
{
ZEND_INIT_MODULE_GLOBALS(filter, php_filter_init_globals, NULL);
REGISTER_INI_ENTRIES();
REGISTER_LONG_CONSTANT("INPUT_POST", PARSE_POST, CONST_CS | CONST_PERSISTENT);
REGISTER_LONG_CONSTANT("INPUT_GET", PARSE_GET, CONST_CS | CONST_PERSISTENT);
REGISTER_LONG_CONSTANT("INPUT_COOKIE... | 147,941,771,078,906,300,000,000,000,000,000,000,000 | filter.c | 146,400,871,451,695,050,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2016-5095 | Integer overflow in the php_escape_html_entities_ex function in ext/standard/html.c in PHP before 5.5.36 and 5.6.x before 5.6.22 allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering a large output string from a FILTER_SANITIZE_FULL_SPECIAL_CHARS filter_var call. ... | https://nvd.nist.gov/vuln/detail/CVE-2016-5095 |
207,222 | mbedtls | f3e6e4badb35760c9a543ee69b7449cb0cd9784b | https://github.com/ARMmbed/mbedtls | https://github.com/ARMmbed/mbedtls/commit/f3e6e4badb35760c9a543ee69b7449cb0cd9784b | Add extra check before integer conversion
end < p should never happen, but just be extra sure | 1 | static void ssl_write_renegotiation_ext( ssl_context *ssl,
unsigned char *buf,
size_t *olen )
{
unsigned char *p = buf;
const unsigned char *end = ssl->out_msg + SSL_MAX_CONTENT_LEN;
*olen = 0;
if( ssl->renegotiation != ... | 321,737,913,181,482,580,000,000,000,000,000,000,000 | ssl_cli.c | 129,309,215,498,586,130,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2015-5291 | Heap-based buffer overflow in PolarSSL 1.x before 1.2.17 and ARM mbed TLS (formerly PolarSSL) 1.3.x before 1.3.14 and 2.x before 2.1.2 allows remote SSL servers to cause a denial of service (client crash) and possibly execute arbitrary code via a long hostname to the server name indication (SNI) extension, which is not... | https://nvd.nist.gov/vuln/detail/CVE-2015-5291 |
394,151 | mbedtls | f3e6e4badb35760c9a543ee69b7449cb0cd9784b | https://github.com/ARMmbed/mbedtls | https://github.com/ARMmbed/mbedtls/commit/f3e6e4badb35760c9a543ee69b7449cb0cd9784b | Add extra check before integer conversion
end < p should never happen, but just be extra sure | 0 | static void ssl_write_renegotiation_ext( ssl_context *ssl,
unsigned char *buf,
size_t *olen )
{
unsigned char *p = buf;
const unsigned char *end = ssl->out_msg + SSL_MAX_CONTENT_LEN;
*olen = 0;
if( ssl->renegotiation != ... | 96,048,559,709,866,290,000,000,000,000,000,000,000 | ssl_cli.c | 112,359,275,241,440,480,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2015-5291 | Heap-based buffer overflow in PolarSSL 1.x before 1.2.17 and ARM mbed TLS (formerly PolarSSL) 1.3.x before 1.3.14 and 2.x before 2.1.2 allows remote SSL servers to cause a denial of service (client crash) and possibly execute arbitrary code via a long hostname to the server name indication (SNI) extension, which is not... | https://nvd.nist.gov/vuln/detail/CVE-2015-5291 |
207,224 | oniguruma | 850bd9b0d8186eb1637722b46b12656814ab4ad2 | https://github.com/kkos/oniguruma | https://github.com/kkos/oniguruma/commit/850bd9b0d8186eb1637722b46b12656814ab4ad2 | fix #87: Read unknown address in onig_error_code_to_str() | 1 | fetch_token(OnigToken* tok, UChar** src, UChar* end, ScanEnv* env)
{
int r, num;
OnigCodePoint c;
OnigEncoding enc = env->enc;
OnigSyntaxType* syn = env->syntax;
UChar* prev;
UChar* p = *src;
PFETCH_READY;
start:
if (PEND) {
tok->type = TK_EOT;
return tok->type;
}
tok->type = TK_STRING;
... | 116,328,786,709,694,980,000,000,000,000,000,000,000 | regparse.c | 198,992,564,584,171,540,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2019-16161 | Onigmo through 6.2.0 has a NULL pointer dereference in onig_error_code_to_str because of fetch_token in regparse.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-16161 |
394,289 | oniguruma | 850bd9b0d8186eb1637722b46b12656814ab4ad2 | https://github.com/kkos/oniguruma | https://github.com/kkos/oniguruma/commit/850bd9b0d8186eb1637722b46b12656814ab4ad2 | fix #87: Read unknown address in onig_error_code_to_str() | 0 | fetch_token(OnigToken* tok, UChar** src, UChar* end, ScanEnv* env)
{
int r, num;
OnigCodePoint c;
OnigEncoding enc = env->enc;
OnigSyntaxType* syn = env->syntax;
UChar* prev;
UChar* p = *src;
PFETCH_READY;
start:
if (PEND) {
tok->type = TK_EOT;
return tok->type;
}
tok->type = TK_STRING;
... | 55,997,329,703,203,020,000,000,000,000,000,000,000 | regparse.c | 188,284,245,300,384,340,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2019-16161 | Onigmo through 6.2.0 has a NULL pointer dereference in onig_error_code_to_str because of fetch_token in regparse.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-16161 |
207,243 | linux | 7992c18810e568b95c869b227137a2215702a805 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7992c18810e568b95c869b227137a2215702a805 | Bluetooth: hidp: buffer overflow in hidp_process_report
CVE-2018-9363
The buffer length is unsigned at all layers, but gets cast to int and
checked in hidp_process_report and can lead to a buffer overflow.
Switch len parameter to unsigned int to resolve issue.
This affects 3.18 and newer kernels.
Signed-off-by: Mar... | 1 | static void hidp_process_report(struct hidp_session *session,
int type, const u8 *data, int len, int intr)
{
if (len > HID_MAX_BUFFER_SIZE)
len = HID_MAX_BUFFER_SIZE;
memcpy(session->input_buf, data, len);
hid_input_report(session->hid, type, session->input_buf, len, intr);
} | 53,450,536,096,821,770,000,000,000,000,000,000,000 | core.c | 196,906,956,097,269,300,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2018-9363 | In the hidp_process_report in bluetooth, there is an integer overflow. This could lead to an out of bounds write with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-65853588 References: Upstream kernel. | https://nvd.nist.gov/vuln/detail/CVE-2018-9363 |
394,495 | linux | 7992c18810e568b95c869b227137a2215702a805 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7992c18810e568b95c869b227137a2215702a805 | Bluetooth: hidp: buffer overflow in hidp_process_report
CVE-2018-9363
The buffer length is unsigned at all layers, but gets cast to int and
checked in hidp_process_report and can lead to a buffer overflow.
Switch len parameter to unsigned int to resolve issue.
This affects 3.18 and newer kernels.
Signed-off-by: Mar... | 0 | static void hidp_process_report(struct hidp_session *session, int type,
const u8 *data, unsigned int len, int intr)
{
if (len > HID_MAX_BUFFER_SIZE)
len = HID_MAX_BUFFER_SIZE;
memcpy(session->input_buf, data, len);
hid_input_report(session->hid, type, session->input_buf, len, intr);
} | 149,375,421,233,190,700,000,000,000,000,000,000,000 | core.c | 318,996,442,502,171,970,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2018-9363 | In the hidp_process_report in bluetooth, there is an integer overflow. This could lead to an out of bounds write with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-65853588 References: Upstream kernel. | https://nvd.nist.gov/vuln/detail/CVE-2018-9363 |
207,245 | htcondor | 2f3c393feb819cf6c6d06fb0a2e9c4e171f3c26d | https://github.com/htcondor/htcondor | https://github.com/htcondor/htcondor/commit/2f3c393feb819cf6c6d06fb0a2e9c4e171f3c26d | (#6455) Fix issue validating VOMS proxies | 1 | extract_VOMS_info( globus_gsi_cred_handle_t cred_handle, int verify_type, char **voname, char **firstfqan, char **quoted_DN_and_FQAN)
{
#if !defined(HAVE_EXT_VOMS)
return 1;
#else
int ret;
struct vomsdata *voms_data = NULL;
struct voms *voms_cert = NULL;
char *subject_name = NULL;
char **fqan = NULL;
int voms... | 338,558,006,054,512,780,000,000,000,000,000,000,000 | globus_utils.cpp | 50,141,023,623,948,200,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2017-16816 | The condor_schedd component in HTCondor before 8.6.8 and 8.7.x before 8.7.5 allows remote authenticated users to cause a denial of service (daemon crash) by leveraging use of GSI and VOMS extensions. | https://nvd.nist.gov/vuln/detail/CVE-2017-16816 |
394,551 | htcondor | 2f3c393feb819cf6c6d06fb0a2e9c4e171f3c26d | https://github.com/htcondor/htcondor | https://github.com/htcondor/htcondor/commit/2f3c393feb819cf6c6d06fb0a2e9c4e171f3c26d | (#6455) Fix issue validating VOMS proxies | 0 | extract_VOMS_info( globus_gsi_cred_handle_t cred_handle, int verify_type, char **voname, char **firstfqan, char **quoted_DN_and_FQAN)
{
#if !defined(HAVE_EXT_VOMS)
return 1;
#else
int ret;
struct vomsdata *voms_data = NULL;
struct voms *voms_cert = NULL;
char *subject_name = NULL;
char **fqan = NULL;
int voms... | 188,459,363,802,988,700,000,000,000,000,000,000,000 | globus_utils.cpp | 102,259,328,925,338,900,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2017-16816 | The condor_schedd component in HTCondor before 8.6.8 and 8.7.x before 8.7.5 allows remote authenticated users to cause a denial of service (daemon crash) by leveraging use of GSI and VOMS extensions. | https://nvd.nist.gov/vuln/detail/CVE-2017-16816 |
207,247 | linux | 77f4689de17c0887775bb77896f4cc11a39bf848 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=77f4689de17c0887775bb77896f4cc11a39bf848 | fix regression in "epoll: Keep a reference on files added to the check list"
epoll_loop_check_proc() can run into a file already committed to destruction;
we can't grab a reference on those and don't need to add them to the set for
reverse path check anyway.
Tested-by: Marc Zyngier <maz@kernel.org>
Fixes: a9ed4a6560b... | 1 | static int ep_loop_check_proc(void *priv, void *cookie, int call_nests)
{
int error = 0;
struct file *file = priv;
struct eventpoll *ep = file->private_data;
struct eventpoll *ep_tovisit;
struct rb_node *rbp;
struct epitem *epi;
mutex_lock_nested(&ep->mtx, call_nests + 1);
ep->visited = 1;
list_add(&ep->visit... | 269,320,456,324,245,060,000,000,000,000,000,000,000 | eventpoll.c | 116,824,817,354,272,950,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2021-1048 | In ep_loop_check_proc of eventpoll.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-204573007Referen... | https://nvd.nist.gov/vuln/detail/CVE-2021-1048 |
394,553 | linux | 77f4689de17c0887775bb77896f4cc11a39bf848 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=77f4689de17c0887775bb77896f4cc11a39bf848 | fix regression in "epoll: Keep a reference on files added to the check list"
epoll_loop_check_proc() can run into a file already committed to destruction;
we can't grab a reference on those and don't need to add them to the set for
reverse path check anyway.
Tested-by: Marc Zyngier <maz@kernel.org>
Fixes: a9ed4a6560b... | 0 | static int ep_loop_check_proc(void *priv, void *cookie, int call_nests)
{
int error = 0;
struct file *file = priv;
struct eventpoll *ep = file->private_data;
struct eventpoll *ep_tovisit;
struct rb_node *rbp;
struct epitem *epi;
mutex_lock_nested(&ep->mtx, call_nests + 1);
ep->visited = 1;
list_add(&ep->visit... | 10,096,205,933,568,207,000,000,000,000,000,000,000 | eventpoll.c | 266,582,852,403,808,170,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2021-1048 | In ep_loop_check_proc of eventpoll.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-204573007Referen... | https://nvd.nist.gov/vuln/detail/CVE-2021-1048 |
207,249 | exiv2 | caa4e6745a76a23bb80127cf54c0d65096ae684c | https://github.com/Exiv2/exiv2 | https://github.com/Exiv2/exiv2/commit/caa4e6745a76a23bb80127cf54c0d65096ae684c | Avoid negative integer overflow when `filesize < io_->tell()`.
This fixes #791. | 1 | void WebPImage::decodeChunks(uint64_t filesize)
{
DataBuf chunkId(5);
byte size_buff[WEBP_TAG_SIZE];
bool has_canvas_data = false;
#ifdef DEBUG
std::cout << "Reading metadata" << std::endl;
#endif
chunkId.pData_[4] = '\0' ;
while ( !io_->eof() && (ui... | 231,236,293,605,628,900,000,000,000,000,000,000,000 | webpimage.cpp | 305,106,210,680,990,130,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2019-13111 | A WebPImage::decodeChunks integer overflow in Exiv2 through 0.27.1 allows an attacker to cause a denial of service (large heap allocation followed by a very long running loop) via a crafted WEBP image file. | https://nvd.nist.gov/vuln/detail/CVE-2019-13111 |
394,555 | exiv2 | caa4e6745a76a23bb80127cf54c0d65096ae684c | https://github.com/Exiv2/exiv2 | https://github.com/Exiv2/exiv2/commit/caa4e6745a76a23bb80127cf54c0d65096ae684c | Avoid negative integer overflow when `filesize < io_->tell()`.
This fixes #791. | 0 | void WebPImage::decodeChunks(uint32_t filesize)
{
DataBuf chunkId(5);
byte size_buff[WEBP_TAG_SIZE];
bool has_canvas_data = false;
#ifdef DEBUG
std::cout << "Reading metadata" << std::endl;
#endif
chunkId.pData_[4] = '\0' ;
while ( !io_->eof() && (ui... | 225,198,859,804,843,230,000,000,000,000,000,000,000 | webpimage.cpp | 44,714,239,638,409,130,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2019-13111 | A WebPImage::decodeChunks integer overflow in Exiv2 through 0.27.1 allows an attacker to cause a denial of service (large heap allocation followed by a very long running loop) via a crafted WEBP image file. | https://nvd.nist.gov/vuln/detail/CVE-2019-13111 |
207,252 | torque | 967cdc80150690459a47a35a658abeee0ca6e5cb | https://github.com/adaptivecomputing/torque | https://github.com/adaptivecomputing/torque/commit/967cdc80150690459a47a35a658abeee0ca6e5cb | TRQ-2885 - clean up unit test so it passes when run as root | 1 | START_TEST(test_tm_adopt_ispidowner)
{
/* we are the owner of this pid so should return true */
fail_unless(TRUE == ispidowner(getpid()));
/* assuming the unit test is not run as root, owner */
/* owner of this pid is not the owner of pid 1 (init) */
fail_unless(FALSE == ispidowner(1));
} | 292,466,840,972,508,520,000,000,000,000,000,000,000 | test_tm.c | 58,258,652,824,343,200,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2014-3684 | The tm_adopt function in lib/Libifl/tm.c in Terascale Open-Source Resource and Queue Manager (aka TORQUE Resource Manager) 5.0.x, 4.5.x, 4.2.x, and earlier does not validate that the owner of the process also owns the adopted session id, which allows remote authenticated users to kill arbitrary processes via a crafted ... | https://nvd.nist.gov/vuln/detail/CVE-2014-3684 |
394,568 | torque | 967cdc80150690459a47a35a658abeee0ca6e5cb | https://github.com/adaptivecomputing/torque | https://github.com/adaptivecomputing/torque/commit/967cdc80150690459a47a35a658abeee0ca6e5cb | TRQ-2885 - clean up unit test so it passes when run as root | 0 | START_TEST(test_tm_adopt_ispidowner)
{
/* we are the owner of this pid so should return true */
fail_unless(TRUE == ispidowner(getpid()));
/* when unit test run as non-root user, owner of this pid is not the owner of pid 1 (init) */
if (getuid() != 0)
fail_unless(FALSE == ispidowner(1));
} | 244,775,165,947,568,130,000,000,000,000,000,000,000 | test_tm.c | 68,008,110,922,675,660,000,000,000,000,000,000,000 | [
"CWE-264"
] | CVE-2014-3684 | The tm_adopt function in lib/Libifl/tm.c in Terascale Open-Source Resource and Queue Manager (aka TORQUE Resource Manager) 5.0.x, 4.5.x, 4.2.x, and earlier does not validate that the owner of the process also owns the adopted session id, which allows remote authenticated users to kill arbitrary processes via a crafted ... | https://nvd.nist.gov/vuln/detail/CVE-2014-3684 |
207,255 | samba | 3f95957d6de321c803a66f3ec67a8ff09befd16d | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commitdiff;h=3f95957d6de321c803a66f3ec67a8ff09befd16d | CVE-2018-1140 ldb: Check for ldb_dn_get_casefold() failure in ldb_sqlite
Signed-off-by: Andrew Bartlett <abartlet@samba.org>
Reviewed-by: Douglas Bagnall <douglas.bagnall@catalyst.net.nz>
BUG: https://bugzilla.samba.org/show_bug.cgi?id=13374 | 1 | static char *parsetree_to_sql(struct ldb_module *module,
void *mem_ctx,
const struct ldb_parse_tree *t)
{
struct ldb_context *ldb;
const struct ldb_schema_attribute *a;
struct ldb_val value, subval;
char *wild_card_string;
char *child, *tmp;
char *ret = NULL;
char *attr;
unsigned int i;
ldb ... | 37,865,353,384,205,217,000,000,000,000,000,000,000 | ldb_sqlite3.c | 87,093,287,982,792,280,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2018-1140 | A missing input sanitization flaw was found in the implementation of LDP database used for the LDAP server. An attacker could use this flaw to cause a denial of service against a samba server, used as a Active Directory Domain Controller. All versions of Samba from 4.8.0 onwards are vulnerable | https://nvd.nist.gov/vuln/detail/CVE-2018-1140 |
394,594 | samba | 3f95957d6de321c803a66f3ec67a8ff09befd16d | https://github.com/samba-team/samba | https://git.samba.org/?p=samba.git;a=commitdiff;h=3f95957d6de321c803a66f3ec67a8ff09befd16d | CVE-2018-1140 ldb: Check for ldb_dn_get_casefold() failure in ldb_sqlite
Signed-off-by: Andrew Bartlett <abartlet@samba.org>
Reviewed-by: Douglas Bagnall <douglas.bagnall@catalyst.net.nz>
BUG: https://bugzilla.samba.org/show_bug.cgi?id=13374 | 0 | static char *parsetree_to_sql(struct ldb_module *module,
void *mem_ctx,
const struct ldb_parse_tree *t)
{
struct ldb_context *ldb;
const struct ldb_schema_attribute *a;
struct ldb_val value, subval;
char *wild_card_string;
char *child, *tmp;
char *ret = NULL;
char *attr;
unsigned int i;
ldb ... | 37,108,773,767,574,765,000,000,000,000,000,000,000 | ldb_sqlite3.c | 211,222,835,828,856,300,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2018-1140 | A missing input sanitization flaw was found in the implementation of LDP database used for the LDAP server. An attacker could use this flaw to cause a denial of service against a samba server, used as a Active Directory Domain Controller. All versions of Samba from 4.8.0 onwards are vulnerable | https://nvd.nist.gov/vuln/detail/CVE-2018-1140 |
207,258 | qemu | d65f97a82c4ed48374a764c769d4ba1ea9724e97 | https://github.com/bonzini/qemu | http://git.qemu.org/?p=qemu.git;a=commit;h=d65f97a82c4ed48374a764c769d4ba1ea9724e97 | block/cloop: validate block_size header field (CVE-2014-0144)
Avoid unbounded s->uncompressed_block memory allocation by checking that
the block_size header field has a reasonable value. Also enforce the
assumption that the value is a non-zero multiple of 512.
These constraints conform to cloop 2.639's code so we ac... | 1 | static int cloop_open(BlockDriverState *bs, QDict *options, int flags,
Error **errp)
{
BDRVCloopState *s = bs->opaque;
uint32_t offsets_size, max_compressed_block_size = 1, i;
int ret;
bs->read_only = 1;
/* read header */
ret = bdrv_pread(bs->file, 128, &s->block_size, 4)... | 118,560,612,454,968,390,000,000,000,000,000,000,000 | cloop.c | 145,244,406,701,030,840,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2014-0144 | QEMU before 2.0.0 block drivers for CLOOP, QCOW2 version 2 and various other image formats are vulnerable to potential memory corruptions, integer/buffer overflows or crash caused by missing input validations which could allow a remote user to execute arbitrary code on the host with the privileges of the QEMU process. | https://nvd.nist.gov/vuln/detail/CVE-2014-0144 |
394,608 | qemu | d65f97a82c4ed48374a764c769d4ba1ea9724e97 | https://github.com/bonzini/qemu | http://git.qemu.org/?p=qemu.git;a=commit;h=d65f97a82c4ed48374a764c769d4ba1ea9724e97 | block/cloop: validate block_size header field (CVE-2014-0144)
Avoid unbounded s->uncompressed_block memory allocation by checking that
the block_size header field has a reasonable value. Also enforce the
assumption that the value is a non-zero multiple of 512.
These constraints conform to cloop 2.639's code so we ac... | 0 | static int cloop_open(BlockDriverState *bs, QDict *options, int flags,
Error **errp)
{
BDRVCloopState *s = bs->opaque;
uint32_t offsets_size, max_compressed_block_size = 1, i;
int ret;
bs->read_only = 1;
/* read header */
ret = bdrv_pread(bs->file, 128, &s->block_size, 4)... | 4,717,328,555,151,275,300,000,000,000,000,000,000 | cloop.c | 137,112,007,839,148,700,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2014-0144 | QEMU before 2.0.0 block drivers for CLOOP, QCOW2 version 2 and various other image formats are vulnerable to potential memory corruptions, integer/buffer overflows or crash caused by missing input validations which could allow a remote user to execute arbitrary code on the host with the privileges of the QEMU process. | https://nvd.nist.gov/vuln/detail/CVE-2014-0144 |
207,259 | OpenSC | ed55fcd2996930bf58b9bb57e9ba7b1f3a753c43 | https://github.com/OpenSC/OpenSC | https://github.com/OpenSC/OpenSC/commit/ed55fcd2996930bf58b9bb57e9ba7b1f3a753c43 | fixed invalid read
fixes https://oss-fuzz.com/testcase-detail/5765246676631552 | 1 | static int sc_pkcs15emu_gemsafeGPK_init(sc_pkcs15_card_t *p15card)
{
const cdata certs[] = {
{"User certificate",0, "","1", 0},
{NULL, 0, NULL, NULL, 0}
};
const pindata pins[] = {
{ "01", "pin", "3F000200", 0x00,
SC_PKCS15_PIN_TYPE_ASCII_NUMERIC,
8, 4, 8, SC_PKCS15_PIN_FLAG_NEEDS_PADDING |
SC_PKC... | 162,632,063,420,417,000,000,000,000,000,000,000,000 | pkcs15-gemsafeGPK.c | 196,094,862,869,646,100,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2020-26571 | The gemsafe GPK smart card software driver in OpenSC before 0.21.0-rc1 has a stack-based buffer overflow in sc_pkcs15emu_gemsafeGPK_init. | https://nvd.nist.gov/vuln/detail/CVE-2020-26571 |
394,610 | OpenSC | ed55fcd2996930bf58b9bb57e9ba7b1f3a753c43 | https://github.com/OpenSC/OpenSC | https://github.com/OpenSC/OpenSC/commit/ed55fcd2996930bf58b9bb57e9ba7b1f3a753c43 | fixed invalid read
fixes https://oss-fuzz.com/testcase-detail/5765246676631552 | 0 | static int sc_pkcs15emu_gemsafeGPK_init(sc_pkcs15_card_t *p15card)
{
const cdata certs[] = {
{"User certificate",0, "","1", 0},
{NULL, 0, NULL, NULL, 0}
};
const pindata pins[] = {
{ "01", "pin", "3F000200", 0x00,
SC_PKCS15_PIN_TYPE_ASCII_NUMERIC,
8, 4, 8, SC_PKCS15_PIN_FLAG_NEEDS_PADDING |
SC_PKC... | 121,204,768,831,747,600,000,000,000,000,000,000,000 | pkcs15-gemsafeGPK.c | 13,662,145,575,641,276,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2020-26571 | The gemsafe GPK smart card software driver in OpenSC before 0.21.0-rc1 has a stack-based buffer overflow in sc_pkcs15emu_gemsafeGPK_init. | https://nvd.nist.gov/vuln/detail/CVE-2020-26571 |
207,264 | w3m | f393faf55975a94217df479e1bd06ee4403c6958 | https://github.com/tats/w3m | https://github.com/tats/w3m/commit/f393faf55975a94217df479e1bd06ee4403c6958 | Prevent infinite recursion with nested table and textarea
Bug-Debian: https://github.com/tats/w3m/issues/20 | 1 | renderCoTable(struct table *tbl, int maxlimit)
{
struct readbuffer obuf;
struct html_feed_environ h_env;
struct environment envs[MAX_ENV_LEVEL];
struct table *t;
int i, col, row;
int indent, maxwidth;
for (i = 0; i < tbl->ntable; i++) {
t = tbl->tables[i].ptr;
col = tbl->tables[i].col;
r... | 228,900,195,984,917,600,000,000,000,000,000,000,000 | table.c | 158,588,767,759,841,830,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2016-9439 | An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. Infinite recursion vulnerability in w3m allows remote attackers to cause a denial of service via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2016-9439 |
394,673 | w3m | f393faf55975a94217df479e1bd06ee4403c6958 | https://github.com/tats/w3m | https://github.com/tats/w3m/commit/f393faf55975a94217df479e1bd06ee4403c6958 | Prevent infinite recursion with nested table and textarea
Bug-Debian: https://github.com/tats/w3m/issues/20 | 0 | renderCoTable(struct table *tbl, int maxlimit)
{
struct readbuffer obuf;
struct html_feed_environ h_env;
struct environment envs[MAX_ENV_LEVEL];
struct table *t;
int i, col, row;
int indent, maxwidth;
static struct table *tbl_prev = NULL;
static int cotbl_count;
#define MAX_COTABLE 100
... | 329,711,185,251,798,880,000,000,000,000,000,000,000 | table.c | 48,265,608,758,374,150,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2016-9439 | An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. Infinite recursion vulnerability in w3m allows remote attackers to cause a denial of service via a crafted HTML page. | https://nvd.nist.gov/vuln/detail/CVE-2016-9439 |
207,271 | evolution-data-server | 2cc39592b532cf0dc994fd3694b8e6bf924c9ab5 | https://git.gnome.org/browse/evolution-data-server | https://gitlab.gnome.org/GNOME/evolution-data-server/-/commit/2cc39592b532cf0dc994fd3694b8e6bf924c9ab5 | I#189 - Crash on malformed server response with minimal capabilities
Closes https://gitlab.gnome.org/GNOME/evolution-data-server/issues/189 | 1 | imapx_connect_to_server (CamelIMAPXServer *is,
GCancellable *cancellable,
GError **error)
{
CamelNetworkSettings *network_settings;
CamelNetworkSecurityMethod method;
CamelIMAPXStore *store;
CamelSettings *settings;
GIOStream *connection = NULL;
GIOStream *tls_str... | 293,605,127,232,695,100,000,000,000,000,000,000,000 | camel-imapx-server.c | 301,951,671,787,338,300,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2020-16117 | In GNOME evolution-data-server before 3.35.91, a malicious server can crash the mail client with a NULL pointer dereference by sending an invalid (e.g., minimal) CAPABILITY line on a connection attempt. This is related to imapx_free_capability and imapx_connect_to_server. | https://nvd.nist.gov/vuln/detail/CVE-2020-16117 |
394,765 | evolution-data-server | 2cc39592b532cf0dc994fd3694b8e6bf924c9ab5 | https://git.gnome.org/browse/evolution-data-server | https://gitlab.gnome.org/GNOME/evolution-data-server/-/commit/2cc39592b532cf0dc994fd3694b8e6bf924c9ab5 | I#189 - Crash on malformed server response with minimal capabilities
Closes https://gitlab.gnome.org/GNOME/evolution-data-server/issues/189 | 0 | imapx_connect_to_server (CamelIMAPXServer *is,
GCancellable *cancellable,
GError **error)
{
CamelNetworkSettings *network_settings;
CamelNetworkSecurityMethod method;
CamelIMAPXStore *store;
CamelSettings *settings;
GIOStream *connection = NULL;
GIOStream *tls_str... | 312,000,368,046,954,000,000,000,000,000,000,000,000 | None | null | [
"CWE-476"
] | CVE-2020-16117 | In GNOME evolution-data-server before 3.35.91, a malicious server can crash the mail client with a NULL pointer dereference by sending an invalid (e.g., minimal) CAPABILITY line on a connection attempt. This is related to imapx_free_capability and imapx_connect_to_server. | https://nvd.nist.gov/vuln/detail/CVE-2020-16117 |
207,311 | libyang | bdb596ddc07596fa212f231135b87d0b9178f6f8 | https://github.com/CESNET/libyang | https://github.com/CESNET/libyang/commit/bdb596ddc07596fa212f231135b87d0b9178f6f8 | resolve BUGFIX handle yet unresolved if-features
Fixes #772 | 1 | resolve_iffeature(struct lys_iffeature *expr)
{
int index_e = 0, index_f = 0;
if (expr->expr) {
return resolve_iffeature_recursive(expr, &index_e, &index_f);
}
return 0;
} | 141,101,688,461,853,970,000,000,000,000,000,000,000 | resolve.c | 182,290,416,952,737,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2019-20391 | An invalid memory access flaw is present in libyang before v1.0-r3 in the function resolve_feature_value() when an if-feature statement is used inside a bit. Applications that use libyang to parse untrusted input yang files may crash. | https://nvd.nist.gov/vuln/detail/CVE-2019-20391 |
395,541 | libyang | bdb596ddc07596fa212f231135b87d0b9178f6f8 | https://github.com/CESNET/libyang | https://github.com/CESNET/libyang/commit/bdb596ddc07596fa212f231135b87d0b9178f6f8 | resolve BUGFIX handle yet unresolved if-features
Fixes #772 | 0 | resolve_iffeature(struct lys_iffeature *expr)
{
int index_e = 0, index_f = 0;
if (expr->expr && expr->features[0]) {
return resolve_iffeature_recursive(expr, &index_e, &index_f);
}
return 0;
} | 202,428,266,120,216,750,000,000,000,000,000,000,000 | None | null | [
"CWE-119"
] | CVE-2019-20391 | An invalid memory access flaw is present in libyang before v1.0-r3 in the function resolve_feature_value() when an if-feature statement is used inside a bit. Applications that use libyang to parse untrusted input yang files may crash. | https://nvd.nist.gov/vuln/detail/CVE-2019-20391 |
207,315 | linux | 4ea99936a1630f51fc3a2d61a58ec4a1c4b7d55a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/4ea99936a1630f51fc3a2d61a58ec4a1c4b7d55a | ext4: add more paranoia checking in ext4_expand_extra_isize handling
It's possible to specify a non-zero s_want_extra_isize via debugging
option, and this can cause bad things(tm) to happen when using a file
system with an inode size of 128 bytes.
Add better checking when the file system is mounted, as well as when
w... | 1 | static void ext4_clamp_want_extra_isize(struct super_block *sb)
{
struct ext4_sb_info *sbi = EXT4_SB(sb);
struct ext4_super_block *es = sbi->s_es;
/* determine the minimum size of new large inodes, if present */
if (sbi->s_inode_size > EXT4_GOOD_OLD_INODE_SIZE &&
sbi->s_want_extra_isize == 0) {
sbi->s_want_... | 230,118,461,242,736,580,000,000,000,000,000,000,000 | None | null | [
"CWE-401"
] | CVE-2019-19767 | The Linux kernel before 5.4.2 mishandles ext4_expand_extra_isize, as demonstrated by use-after-free errors in __ext4_expand_extra_isize and ext4_xattr_set_entry, related to fs/ext4/inode.c and fs/ext4/super.c, aka CID-4ea99936a163. | https://nvd.nist.gov/vuln/detail/CVE-2019-19767 |
395,614 | linux | 4ea99936a1630f51fc3a2d61a58ec4a1c4b7d55a | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/4ea99936a1630f51fc3a2d61a58ec4a1c4b7d55a | ext4: add more paranoia checking in ext4_expand_extra_isize handling
It's possible to specify a non-zero s_want_extra_isize via debugging
option, and this can cause bad things(tm) to happen when using a file
system with an inode size of 128 bytes.
Add better checking when the file system is mounted, as well as when
w... | 0 | static void ext4_clamp_want_extra_isize(struct super_block *sb)
{
struct ext4_sb_info *sbi = EXT4_SB(sb);
struct ext4_super_block *es = sbi->s_es;
unsigned def_extra_isize = sizeof(struct ext4_inode) -
EXT4_GOOD_OLD_INODE_SIZE;
if (sbi->s_inode_size == EXT4_GOOD_OLD_INODE_SIZE) {
sbi->s_want_extra_isize = ... | 28,984,852,527,187,694,000,000,000,000,000,000,000 | None | null | [
"CWE-401"
] | CVE-2019-19767 | The Linux kernel before 5.4.2 mishandles ext4_expand_extra_isize, as demonstrated by use-after-free errors in __ext4_expand_extra_isize and ext4_xattr_set_entry, related to fs/ext4/inode.c and fs/ext4/super.c, aka CID-4ea99936a163. | https://nvd.nist.gov/vuln/detail/CVE-2019-19767 |
207,317 | ImageMagick | 329dd528ab79531d884c0ba131e97d43f872ab5d | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/329dd528ab79531d884c0ba131e97d43f872ab5d | uses the PerceptibleReciprocal() to prevent the divide-by-zero from occurring (#3194)
Co-authored-by: Zhang Xiaohui <ruc_zhangxiaohui@163.com> | 1 | MagickExport Image *ImplodeImage(const Image *image,const double amount,
const PixelInterpolateMethod method,ExceptionInfo *exception)
{
#define ImplodeImageTag "Implode/Image"
CacheView
*canvas_view,
*implode_view,
*interpolate_view;
double
radius;
Image
*canvas_image,
*implode_imag... | 295,923,173,575,149,460,000,000,000,000,000,000,000 | visual-effects.c | 33,101,083,552,853,350,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2021-20244 | A flaw was found in ImageMagick in MagickCore/visual-effects.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability. | https://nvd.nist.gov/vuln/detail/CVE-2021-20244 |
395,615 | ImageMagick | 329dd528ab79531d884c0ba131e97d43f872ab5d | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/329dd528ab79531d884c0ba131e97d43f872ab5d | uses the PerceptibleReciprocal() to prevent the divide-by-zero from occurring (#3194)
Co-authored-by: Zhang Xiaohui <ruc_zhangxiaohui@163.com> | 0 | MagickExport Image *ImplodeImage(const Image *image,const double amount,
const PixelInterpolateMethod method,ExceptionInfo *exception)
{
#define ImplodeImageTag "Implode/Image"
CacheView
*canvas_view,
*implode_view,
*interpolate_view;
double
radius;
Image
*canvas_image,
*implode_imag... | 102,751,070,264,031,010,000,000,000,000,000,000,000 | visual-effects.c | 35,069,357,116,713,020,000,000,000,000,000,000,000 | [
"CWE-369"
] | CVE-2021-20244 | A flaw was found in ImageMagick in MagickCore/visual-effects.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability. | https://nvd.nist.gov/vuln/detail/CVE-2021-20244 |
207,416 | php-src | c14eb8de974fc8a4d74f3515424c293bc7a40fba | https://github.com/php/php-src | http://git.php.net/?p=php-src.git;a=commit;h=c14eb8de974fc8a4d74f3515424c293bc7a40fba | Fix bug #78793 | 1 | static int exif_process_IFD_in_MAKERNOTE(image_info_type *ImageInfo, char * value_ptr, int value_len, char *offset_base, size_t IFDlength, size_t displacement)
{
size_t i;
int de, section_index = SECTION_MAKERNOTE;
int NumDirEntries, old_motorola_intel;
#ifdef KALLE_0
int offset_diff;
#endif
const maker_note_type ... | 211,670,069,281,718,540,000,000,000,000,000,000,000 | exif.c | 161,570,432,724,482,320,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-11050 | When PHP EXIF extension is parsing EXIF information from an image, e.g. via exif_read_data() function, in PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0 it is possible to supply it with data what will cause it to read past the allocated buffer. This may lead to information disclosure or crash. | https://nvd.nist.gov/vuln/detail/CVE-2019-11050 |
397,410 | php-src | c14eb8de974fc8a4d74f3515424c293bc7a40fba | https://github.com/php/php-src | http://git.php.net/?p=php-src.git;a=commit;h=c14eb8de974fc8a4d74f3515424c293bc7a40fba | Fix bug #78793 | 0 | static int exif_process_IFD_in_MAKERNOTE(image_info_type *ImageInfo, char * value_ptr, int value_len, char *offset_base, size_t IFDlength, size_t displacement)
{
size_t i;
int de, section_index = SECTION_MAKERNOTE;
int NumDirEntries, old_motorola_intel;
#ifdef KALLE_0
int offset_diff;
#endif
const maker_note_type ... | 288,627,583,490,784,530,000,000,000,000,000,000,000 | exif.c | 303,717,196,926,702,730,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-11050 | When PHP EXIF extension is parsing EXIF information from an image, e.g. via exif_read_data() function, in PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0 it is possible to supply it with data what will cause it to read past the allocated buffer. This may lead to information disclosure or crash. | https://nvd.nist.gov/vuln/detail/CVE-2019-11050 |
207,417 | radare2 | 93af319e0af787ede96537d46210369f5c24240c | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/93af319e0af787ede96537d46210369f5c24240c | Fix #14296 - Segfault in ragg2 (#14308) | 1 | R_API int r_egg_lang_parsechar(REgg *egg, char c) {
REggEmit *e = egg->remit;
char *ptr, str[64], *tmp_ptr = NULL;
int i, j;
if (c == '\n') {
egg->lang.line++;
egg->lang.elem_n = 0;
}
/* comments */
if (egg->lang.skipline) {
if (c != '\n') {
egg->lang.oc = c;
return 0;
}
egg->lang.skipline = 0;
... | 274,650,313,343,136,000,000,000,000,000,000,000,000 | egg_lang.c | 62,949,087,027,357,360,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2019-12802 | In radare2 through 3.5.1, the rcc_context function of libr/egg/egg_lang.c mishandles changing context. This allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact (invalid memory access in r_egg_lang_parsechar; invalid free in rcc_pusharg). | https://nvd.nist.gov/vuln/detail/CVE-2019-12802 |
397,413 | radare2 | 93af319e0af787ede96537d46210369f5c24240c | https://github.com/radare/radare2 | https://github.com/radare/radare2/commit/93af319e0af787ede96537d46210369f5c24240c | Fix #14296 - Segfault in ragg2 (#14308) | 0 | R_API int r_egg_lang_parsechar(REgg *egg, char c) {
REggEmit *e = egg->remit;
char *ptr, str[64], *tmp_ptr = NULL;
int i, j;
if (c == '\n') {
egg->lang.line++;
egg->lang.elem_n = 0;
}
/* comments */
if (egg->lang.skipline) {
if (c != '\n') {
egg->lang.oc = c;
return 0;
}
egg->lang.skipline = 0;
... | 42,473,032,305,180,877,000,000,000,000,000,000,000 | egg_lang.c | 2,825,655,628,066,743,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2019-12802 | In radare2 through 3.5.1, the rcc_context function of libr/egg/egg_lang.c mishandles changing context. This allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact (invalid memory access in r_egg_lang_parsechar; invalid free in rcc_pusharg). | https://nvd.nist.gov/vuln/detail/CVE-2019-12802 |
207,457 | ghostpdl | d621292fb2c8157d9899dcd83fd04dd250e30fe4 | https://github.com/ArtifexSoftware/ghostpdl | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=d621292fb2c8157d9899dcd83fd04dd250e30fe4 | Bug 697444 Unmatched transparency group pop
This issue can only occur if there is an unmatched group pop.
If the interpreter is doing that, then the interpreter is
broken. With this bug the user is intentionally doing it.
We now throw and error when it occurs. | 1 | pdf14_pop_transparency_group(gs_gstate *pgs, pdf14_ctx *ctx,
const pdf14_nonseparable_blending_procs_t * pblend_procs,
int tos_num_color_comp, cmm_profile_t *curr_icc_profile, gx_device *dev)
{
pdf14_buf *tos = ctx->stack;
pdf14_buf *nos = tos->saved;
pdf14_mask_t *mask_stack = tos->mask_stack;
... | 225,365,510,364,829,160,000,000,000,000,000,000,000 | gdevp14.c | 271,569,190,112,009,170,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2016-10218 | The pdf14_pop_transparency_group function in base/gdevp14.c in the PDF Transparency module in Artifex Software, Inc. Ghostscript 9.20 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2016-10218 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.