idx
int64
project
string
commit_id
string
project_url
string
commit_url
string
commit_message
string
target
int64
func
string
func_hash
float64
file_name
string
file_hash
float64
cwe
list
cve
string
cve_desc
string
nvd_url
string
476,860
vim
5f25c3855071bd7e26255c68bf458b1b5cf92f39
https://github.com/vim/vim
https://github.com/vim/vim/commit/5f25c3855071bd7e26255c68bf458b1b5cf92f39
patch 8.2.4049: Vim9: reading before the start of the line with "$" Problem: Vim9: reading before the start of the line with "$" by itself. Solution: Do not subtract one when reporting the error.
0
compile_get_env(char_u **arg, cctx_T *cctx) { char_u *start = *arg; int len; int ret; char_u *name; ++*arg; len = get_env_len(arg); if (len == 0) { semsg(_(e_syntax_error_at_str), start); return FAIL; } // include the '$' in the name, eval_env_var() expects it. name = v...
257,209,108,678,565,370,000,000,000,000,000,000,000
vim9expr.c
164,048,437,069,047,300,000,000,000,000,000,000,000
[ "CWE-200" ]
CVE-2022-0158
vim is vulnerable to Heap-based Buffer Overflow
https://nvd.nist.gov/vuln/detail/CVE-2022-0158
214,259
zziplib
596d9dfce2624e849417d4301e8d67935608aa5e
https://github.com/gdraheim/zziplib
https://github.com/gdraheim/zziplib/commit/596d9dfce2624e849417d4301e8d67935608aa5e
memdisk (.)
1
zzip_disk_entry_fopen (ZZIP_DISK* disk, ZZIP_DISK_ENTRY* entry) { ZZIP_DISK_FILE* file = malloc(sizeof(ZZIP_DISK_FILE)); if (! file) return file; file->buffer = disk->buffer; file->endbuf = disk->endbuf; file->header = zzip_disk_entry_to_file_header (disk, entry); if (! file->header) { free (fil...
53,190,543,793,020,170,000,000,000,000,000,000,000
mmapped.c
236,406,340,417,407,500,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-7725
An issue was discovered in ZZIPlib 0.13.68. An invalid memory address dereference was discovered in zzip_disk_fread in mmapped.c. The vulnerability causes an application crash, which leads to denial of service.
https://nvd.nist.gov/vuln/detail/CVE-2018-7725
476,914
zziplib
596d9dfce2624e849417d4301e8d67935608aa5e
https://github.com/gdraheim/zziplib
https://github.com/gdraheim/zziplib/commit/596d9dfce2624e849417d4301e8d67935608aa5e
memdisk (.)
0
zzip_disk_entry_fopen (ZZIP_DISK* disk, ZZIP_DISK_ENTRY* entry) { /* keep this in sync with zzip_mem_entry_fopen */ struct zzip_file_header* header = zzip_disk_entry_to_file_header (disk, entry); if (! header) return 0; ___ ZZIP_DISK_FILE* file = malloc(sizeof(ZZIP_DISK_FILE)); if (! file) return ...
20,504,559,051,998,193,000,000,000,000,000,000,000
mmapped.c
310,734,656,886,128,960,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-7725
An issue was discovered in ZZIPlib 0.13.68. An invalid memory address dereference was discovered in zzip_disk_fread in mmapped.c. The vulnerability causes an application crash, which leads to denial of service.
https://nvd.nist.gov/vuln/detail/CVE-2018-7725
214,275
linux
34fad54c2537f7c99d07375e50cb30aa3c23bd83
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=34fad54c2537f7c99d07375e50cb30aa3c23bd83
net: __skb_flow_dissect() must cap its return value After Tom patch, thoff field could point past the end of the buffer, this could fool some callers. If an skb was provided, skb->len should be the upper limit. If not, hlen is supposed to be the upper limit. Fixes: a6e544b0a88b ("flow_dissector: Jump to exit code in...
1
bool __skb_flow_dissect(const struct sk_buff *skb, struct flow_dissector *flow_dissector, void *target_container, void *data, __be16 proto, int nhoff, int hlen, unsigned int flags) { struct flow_dissector_key_control *key_control; struct flow_dissector_key_basic *key_basic; struct flow_dissector_key_addr...
212,438,893,538,075,500,000,000,000,000,000,000,000
flow_dissector.c
63,968,026,408,982,840,000,000,000,000,000,000,000
[ "CWE-665" ]
CVE-2017-13715
The __skb_flow_dissect function in net/core/flow_dissector.c in the Linux kernel before 4.3 does not ensure that n_proto, ip_proto, and thoff are initialized, which allows remote attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a single crafted MPLS packet.
https://nvd.nist.gov/vuln/detail/CVE-2017-13715
477,258
linux
34fad54c2537f7c99d07375e50cb30aa3c23bd83
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=34fad54c2537f7c99d07375e50cb30aa3c23bd83
net: __skb_flow_dissect() must cap its return value After Tom patch, thoff field could point past the end of the buffer, this could fool some callers. If an skb was provided, skb->len should be the upper limit. If not, hlen is supposed to be the upper limit. Fixes: a6e544b0a88b ("flow_dissector: Jump to exit code in...
0
bool __skb_flow_dissect(const struct sk_buff *skb, struct flow_dissector *flow_dissector, void *target_container, void *data, __be16 proto, int nhoff, int hlen, unsigned int flags) { struct flow_dissector_key_control *key_control; struct flow_dissector_key_basic *key_basic; struct flow_dissector_key_addr...
92,244,027,390,944,100,000,000,000,000,000,000,000
flow_dissector.c
313,500,628,847,460,800,000,000,000,000,000,000,000
[ "CWE-665" ]
CVE-2017-13715
The __skb_flow_dissect function in net/core/flow_dissector.c in the Linux kernel before 4.3 does not ensure that n_proto, ip_proto, and thoff are initialized, which allows remote attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a single crafted MPLS packet.
https://nvd.nist.gov/vuln/detail/CVE-2017-13715
214,277
mosh
9791768705528e911bfca6c4d8aa88139035060e
https://github.com/keithw/mosh
https://github.com/keithw/mosh/commit/9791768705528e911bfca6c4d8aa88139035060e
Cap escape sequence parameters to prevent long loops. Fixes #271 github issue.
1
int Dispatcher::getparam( size_t N, int defaultval ) { int ret = defaultval; if ( !parsed ) { parse_params(); } if ( parsed_params.size() > N ) { ret = parsed_params[ N ]; } if ( ret < 1 ) ret = defaultval; return ret; }
182,978,152,915,417,700,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2012-2385
The terminal dispatcher in mosh before 1.2.1 allows remote authenticated users to cause a denial of service (long loop and CPU consumption) via an escape sequence with a large repeat count value.
https://nvd.nist.gov/vuln/detail/CVE-2012-2385
477,320
mosh
9791768705528e911bfca6c4d8aa88139035060e
https://github.com/keithw/mosh
https://github.com/keithw/mosh/commit/9791768705528e911bfca6c4d8aa88139035060e
Cap escape sequence parameters to prevent long loops. Fixes #271 github issue.
0
int Dispatcher::getparam( size_t N, int defaultval ) { int ret = defaultval; if ( !parsed ) { parse_params(); } if ( parsed_params.size() > N ) { ret = parsed_params[ N ]; } if ( ret > PARAM_MAX ) { ret = defaultval; } if ( ret < 1 ) ret = defaultval; return ret; }
20,480,810,486,890,422,000,000,000,000,000,000,000
None
null
[ "CWE-399" ]
CVE-2012-2385
The terminal dispatcher in mosh before 1.2.1 allows remote authenticated users to cause a denial of service (long loop and CPU consumption) via an escape sequence with a large repeat count value.
https://nvd.nist.gov/vuln/detail/CVE-2012-2385
214,314
linux
29cd13cfd7624726d9e6becbae9aa419ef35af7f
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/29cd13cfd7624726d9e6becbae9aa419ef35af7f
drm/v3d: Fix memory leak in v3d_submit_cl_ioctl In the impelementation of v3d_submit_cl_ioctl() there are two memory leaks. One is when allocation for bin fails, and the other is when bin initialization fails. If kcalloc fails to allocate memory for bin then render->base should be put. Also, if v3d_job_init() fails to...
1
v3d_submit_cl_ioctl(struct drm_device *dev, void *data, struct drm_file *file_priv) { struct v3d_dev *v3d = to_v3d_dev(dev); struct v3d_file_priv *v3d_priv = file_priv->driver_priv; struct drm_v3d_submit_cl *args = data; struct v3d_bin_job *bin = NULL; struct v3d_render_job *render; struct ww_acquire_ctx ac...
329,604,591,900,702,600,000,000,000,000,000,000,000
v3d_gem.c
41,664,191,997,744,506,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2019-19044
Two memory leaks in the v3d_submit_cl_ioctl() function in drivers/gpu/drm/v3d/v3d_gem.c in the Linux kernel before 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering kcalloc() or v3d_job_init() failures, aka CID-29cd13cfd762.
https://nvd.nist.gov/vuln/detail/CVE-2019-19044
477,551
linux
29cd13cfd7624726d9e6becbae9aa419ef35af7f
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/29cd13cfd7624726d9e6becbae9aa419ef35af7f
drm/v3d: Fix memory leak in v3d_submit_cl_ioctl In the impelementation of v3d_submit_cl_ioctl() there are two memory leaks. One is when allocation for bin fails, and the other is when bin initialization fails. If kcalloc fails to allocate memory for bin then render->base should be put. Also, if v3d_job_init() fails to...
0
v3d_submit_cl_ioctl(struct drm_device *dev, void *data, struct drm_file *file_priv) { struct v3d_dev *v3d = to_v3d_dev(dev); struct v3d_file_priv *v3d_priv = file_priv->driver_priv; struct drm_v3d_submit_cl *args = data; struct v3d_bin_job *bin = NULL; struct v3d_render_job *render; struct ww_acquire_ctx ac...
142,008,884,716,908,150,000,000,000,000,000,000,000
v3d_gem.c
183,402,124,914,399,230,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2019-19044
Two memory leaks in the v3d_submit_cl_ioctl() function in drivers/gpu/drm/v3d/v3d_gem.c in the Linux kernel before 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering kcalloc() or v3d_job_init() failures, aka CID-29cd13cfd762.
https://nvd.nist.gov/vuln/detail/CVE-2019-19044
214,315
libxml2
1358d157d0bd83be1dfe356a69213df9fac0b539
https://github.com/GNOME/libxml2
https://gitlab.gnome.org/GNOME/libxml2/-/commit/1358d157d0bd83be1dfe356a69213df9fac0b539
Fix use-after-free with `xmllint --html --push` Call htmlCtxtUseOptions to make sure that names aren't stored in dictionaries. Note that this issue only affects xmllint using the HTML push parser. Fixes #230.
1
static void parseAndPrintFile(char *filename, xmlParserCtxtPtr rectxt) { xmlDocPtr doc = NULL; #ifdef LIBXML_TREE_ENABLED xmlDocPtr tmp; #endif /* LIBXML_TREE_ENABLED */ if ((timing) && (!repeat)) startTimer(); #ifdef LIBXML_TREE_ENABLED if (filename == NULL) { if (generate) { xmlNodePtr n; ...
192,030,719,533,557,420,000,000,000,000,000,000,000
xmllint.c
321,593,828,740,296,540,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2021-3516
There's a flaw in libxml2's xmllint in versions before 2.9.11. An attacker who is able to submit a crafted file to be processed by xmllint could trigger a use-after-free. The greatest impact of this flaw is to confidentiality, integrity, and availability.
https://nvd.nist.gov/vuln/detail/CVE-2021-3516
477,576
libxml2
1358d157d0bd83be1dfe356a69213df9fac0b539
https://github.com/GNOME/libxml2
https://gitlab.gnome.org/GNOME/libxml2/-/commit/1358d157d0bd83be1dfe356a69213df9fac0b539
Fix use-after-free with `xmllint --html --push` Call htmlCtxtUseOptions to make sure that names aren't stored in dictionaries. Note that this issue only affects xmllint using the HTML push parser. Fixes #230.
0
static void parseAndPrintFile(char *filename, xmlParserCtxtPtr rectxt) { xmlDocPtr doc = NULL; #ifdef LIBXML_TREE_ENABLED xmlDocPtr tmp; #endif /* LIBXML_TREE_ENABLED */ if ((timing) && (!repeat)) startTimer(); #ifdef LIBXML_TREE_ENABLED if (filename == NULL) { if (generate) { xmlNodePtr n; ...
269,729,599,999,895,800,000,000,000,000,000,000,000
xmllint.c
279,047,775,947,551,670,000,000,000,000,000,000,000
[ "CWE-416" ]
CVE-2021-3516
There's a flaw in libxml2's xmllint in versions before 2.9.11. An attacker who is able to submit a crafted file to be processed by xmllint could trigger a use-after-free. The greatest impact of this flaw is to confidentiality, integrity, and availability.
https://nvd.nist.gov/vuln/detail/CVE-2021-3516
214,367
linux
c70222752228a62135cee3409dccefd494a24646
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c70222752228a62135cee3409dccefd494a24646
can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path There is no need to call dev_kfree_skb() when usb_submit_urb() fails beacause can_put_echo_skb() deletes the original skb and can_free_echo_skb() deletes the cloned skb. Link: https://lore.kernel.org/all/20220228083639.38183-1-hbh25y@gmail.c...
1
static netdev_tx_t ems_usb_start_xmit(struct sk_buff *skb, struct net_device *netdev) { struct ems_usb *dev = netdev_priv(netdev); struct ems_tx_urb_context *context = NULL; struct net_device_stats *stats = &netdev->stats; struct can_frame *cf = (struct can_frame *)skb->data; struct ems_cpc_msg *msg; struct urb *...
330,583,357,871,776,270,000,000,000,000,000,000,000
None
null
[ "CWE-415" ]
CVE-2022-28390
ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c in the Linux kernel through 5.17.1 has a double free.
https://nvd.nist.gov/vuln/detail/CVE-2022-28390
478,054
linux
c70222752228a62135cee3409dccefd494a24646
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/c70222752228a62135cee3409dccefd494a24646
can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path There is no need to call dev_kfree_skb() when usb_submit_urb() fails beacause can_put_echo_skb() deletes the original skb and can_free_echo_skb() deletes the cloned skb. Link: https://lore.kernel.org/all/20220228083639.38183-1-hbh25y@gmail.c...
0
static netdev_tx_t ems_usb_start_xmit(struct sk_buff *skb, struct net_device *netdev) { struct ems_usb *dev = netdev_priv(netdev); struct ems_tx_urb_context *context = NULL; struct net_device_stats *stats = &netdev->stats; struct can_frame *cf = (struct can_frame *)skb->data; struct ems_cpc_msg *msg; struct urb *...
207,614,801,499,095,950,000,000,000,000,000,000,000
None
null
[ "CWE-415" ]
CVE-2022-28390
ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c in the Linux kernel through 5.17.1 has a double free.
https://nvd.nist.gov/vuln/detail/CVE-2022-28390
214,368
libvpx
6a7c84a2449dcc70de2525df209afea908622399
https://github.com/webmproject/libvpx
https://github.com/webmproject/libvpx/commit/6a7c84a2449dcc70de2525df209afea908622399
update libwebm to libwebm-1.0.0.27-361-g81de00c 81de00c Check there is only one settings per ContentCompression 5623013 Fixes a double free in ContentEncoding 93b2ba0 mkvparser: quiet static analysis warnings Change-Id: Ieaa562ef2f10075381bd856388e6b29f97ca2746
1
long ContentEncoding::ParseContentEncodingEntry(long long start, long long size, IMkvReader* pReader) { assert(pReader); long long pos = start; const long long stop = start + size; // Count ContentCompression and ContentEncryption elements. int compression_cou...
187,632,684,320,461,700,000,000,000,000,000,000,000
mkvparser.cc
120,349,953,275,244,100,000,000,000,000,000,000,000
[ "CWE-415" ]
CVE-2019-2126
In ParseContentEncodingEntry of mkvparser.cc, there is a possible double free due to a missing reset of a freed pointer. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android. Versions: Android-7.0 Android-7.1.1 Android-7.1...
https://nvd.nist.gov/vuln/detail/CVE-2019-2126
478,061
libvpx
6a7c84a2449dcc70de2525df209afea908622399
https://github.com/webmproject/libvpx
https://github.com/webmproject/libvpx/commit/6a7c84a2449dcc70de2525df209afea908622399
update libwebm to libwebm-1.0.0.27-361-g81de00c 81de00c Check there is only one settings per ContentCompression 5623013 Fixes a double free in ContentEncoding 93b2ba0 mkvparser: quiet static analysis warnings Change-Id: Ieaa562ef2f10075381bd856388e6b29f97ca2746
0
long ContentEncoding::ParseContentEncodingEntry(long long start, long long size, IMkvReader* pReader) { assert(pReader); long long pos = start; const long long stop = start + size; // Count ContentCompression and ContentEncryption elements. int compression_cou...
335,917,546,323,438,120,000,000,000,000,000,000,000
mkvparser.cc
332,106,874,740,709,580,000,000,000,000,000,000,000
[ "CWE-415" ]
CVE-2019-2126
In ParseContentEncodingEntry of mkvparser.cc, there is a possible double free due to a missing reset of a freed pointer. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android. Versions: Android-7.0 Android-7.1.1 Android-7.1...
https://nvd.nist.gov/vuln/detail/CVE-2019-2126
214,370
libvncserver
79d938c16bf7a14b6d6ee290bcfef3c01f9c4f02
https://github.com/LibVNC/libvncserver
https://github.com/LibVNC/libvncserver/commit/79d938c16bf7a14b6d6ee290bcfef3c01f9c4f02
Avoid divide-by-zero in raw encoding (OSX RealVNC) OS X RealVNC server crashes out Remmina because the server can provoke bytesPerLine to be zero. Assume this is coding for zero lines. The condition could be checked before the calculation of bytesPerLine. I don’t understand the preconditions of this code to say one w...
1
HandleRFBServerMessage(rfbClient* client) { rfbServerToClientMsg msg; if (client->serverPort==-1) client->vncRec->readTimestamp = TRUE; if (!ReadFromRFBServer(client, (char *)&msg, 1)) return FALSE; switch (msg.type) { case rfbSetColourMapEntries: { /* TODO: int i; uint16_t rgb[3]; ...
335,126,904,730,531,500,000,000,000,000,000,000,000
rfbproto.c
53,886,405,654,962,310,000,000,000,000,000,000,000
[ "CWE-835" ]
CVE-2018-20021
LibVNC before commit c3115350eb8bb635d0fdb4dbbb0d0541f38ed19c contains a CWE-835: Infinite loop vulnerability in VNC client code. Vulnerability allows attacker to consume excessive amount of resources like CPU and RAM
https://nvd.nist.gov/vuln/detail/CVE-2018-20021
478,063
libvncserver
79d938c16bf7a14b6d6ee290bcfef3c01f9c4f02
https://github.com/LibVNC/libvncserver
https://github.com/LibVNC/libvncserver/commit/79d938c16bf7a14b6d6ee290bcfef3c01f9c4f02
Avoid divide-by-zero in raw encoding (OSX RealVNC) OS X RealVNC server crashes out Remmina because the server can provoke bytesPerLine to be zero. Assume this is coding for zero lines. The condition could be checked before the calculation of bytesPerLine. I don’t understand the preconditions of this code to say one w...
0
HandleRFBServerMessage(rfbClient* client) { rfbServerToClientMsg msg; if (client->serverPort==-1) client->vncRec->readTimestamp = TRUE; if (!ReadFromRFBServer(client, (char *)&msg, 1)) return FALSE; switch (msg.type) { case rfbSetColourMapEntries: { /* TODO: int i; uint16_t rgb[3]; ...
99,141,124,644,937,050,000,000,000,000,000,000,000
rfbproto.c
150,405,062,698,641,520,000,000,000,000,000,000,000
[ "CWE-835" ]
CVE-2018-20021
LibVNC before commit c3115350eb8bb635d0fdb4dbbb0d0541f38ed19c contains a CWE-835: Infinite loop vulnerability in VNC client code. Vulnerability allows attacker to consume excessive amount of resources like CPU and RAM
https://nvd.nist.gov/vuln/detail/CVE-2018-20021
214,404
linux
105cd17a866017b45f3c45901b394c711c97bf40
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/105cd17a866017b45f3c45901b394c711c97bf40
bonding: fix null dereference in bond_ipsec_add_sa() If bond doesn't have real device, bond->curr_active_slave is null. But bond_ipsec_add_sa() dereferences bond->curr_active_slave without null checking. So, null-ptr-deref would occur. Test commands: ip link add bond0 type bond ip link set bond0 up ip x s...
1
static int bond_ipsec_add_sa(struct xfrm_state *xs) { struct net_device *bond_dev = xs->xso.dev; struct bonding *bond; struct slave *slave; int err; if (!bond_dev) return -EINVAL; rcu_read_lock(); bond = netdev_priv(bond_dev); slave = rcu_dereference(bond->curr_active_slave); xs->xso.real_dev = slave->dev;...
190,467,436,386,782,060,000,000,000,000,000,000,000
bond_main.c
162,415,593,707,512,670,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2022-0286
A flaw was found in the Linux kernel. A null pointer dereference in bond_ipsec_add_sa() may lead to local denial of service.
https://nvd.nist.gov/vuln/detail/CVE-2022-0286
478,282
linux
105cd17a866017b45f3c45901b394c711c97bf40
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/105cd17a866017b45f3c45901b394c711c97bf40
bonding: fix null dereference in bond_ipsec_add_sa() If bond doesn't have real device, bond->curr_active_slave is null. But bond_ipsec_add_sa() dereferences bond->curr_active_slave without null checking. So, null-ptr-deref would occur. Test commands: ip link add bond0 type bond ip link set bond0 up ip x s...
0
static int bond_ipsec_add_sa(struct xfrm_state *xs) { struct net_device *bond_dev = xs->xso.dev; struct bonding *bond; struct slave *slave; int err; if (!bond_dev) return -EINVAL; rcu_read_lock(); bond = netdev_priv(bond_dev); slave = rcu_dereference(bond->curr_active_slave); if (!slave) { rcu_read_unloc...
40,295,343,353,858,340,000,000,000,000,000,000,000
bond_main.c
78,003,466,394,787,870,000,000,000,000,000,000,000
[ "CWE-703" ]
CVE-2022-0286
A flaw was found in the Linux kernel. A null pointer dereference in bond_ipsec_add_sa() may lead to local denial of service.
https://nvd.nist.gov/vuln/detail/CVE-2022-0286
214,439
qemu
2c0331f4f7d241995452b99afaf0aab00493334a
https://github.com/bonzini/qemu
http://git.qemu.org/?p=qemu.git;a=commitdiff;h=2c0331f4f7d241995452b99afaf0aab00493334a
e1000: Discard oversized packets based on SBP|LPE Discard packets longer than 16384 when !SBP to match the hardware behavior. Signed-off-by: Michael Contreras <michael@inetric.com> Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com>
1
e1000_receive(NetClientState *nc, const uint8_t *buf, size_t size) { E1000State *s = DO_UPCAST(NICState, nc, nc)->opaque; struct e1000_rx_desc desc; dma_addr_t base; unsigned int n, rdt; uint32_t rdh_start; uint16_t vlan_special = 0; uint8_t vlan_status = 0, vlan_offset = 0; uint8_t min_...
64,213,774,448,939,070,000,000,000,000,000,000,000
e1000.c
35,251,203,576,719,170,000,000,000,000,000,000,000
[ "CWE-120" ]
CVE-2012-6075
Buffer overflow in the e1000_receive function in the e1000 device driver (hw/e1000.c) in QEMU 1.3.0-rc2 and other versions, when the SBP and LPE flags are disabled, allows remote attackers to cause a denial of service (guest OS crash) and possibly execute arbitrary guest code via a large packet.
https://nvd.nist.gov/vuln/detail/CVE-2012-6075
478,692
qemu
2c0331f4f7d241995452b99afaf0aab00493334a
https://github.com/bonzini/qemu
http://git.qemu.org/?p=qemu.git;a=commitdiff;h=2c0331f4f7d241995452b99afaf0aab00493334a
e1000: Discard oversized packets based on SBP|LPE Discard packets longer than 16384 when !SBP to match the hardware behavior. Signed-off-by: Michael Contreras <michael@inetric.com> Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com>
0
e1000_receive(NetClientState *nc, const uint8_t *buf, size_t size) { E1000State *s = DO_UPCAST(NICState, nc, nc)->opaque; struct e1000_rx_desc desc; dma_addr_t base; unsigned int n, rdt; uint32_t rdh_start; uint16_t vlan_special = 0; uint8_t vlan_status = 0, vlan_offset = 0; uint8_t min_...
43,807,800,561,686,550,000,000,000,000,000,000,000
e1000.c
318,583,444,413,112,660,000,000,000,000,000,000,000
[ "CWE-120" ]
CVE-2012-6075
Buffer overflow in the e1000_receive function in the e1000 device driver (hw/e1000.c) in QEMU 1.3.0-rc2 and other versions, when the SBP and LPE flags are disabled, allows remote attackers to cause a denial of service (guest OS crash) and possibly execute arbitrary guest code via a large packet.
https://nvd.nist.gov/vuln/detail/CVE-2012-6075
214,440
FreeRDP
6d86e20e1e7caaab4f0c7f89e36d32914dbccc52
https://github.com/FreeRDP/FreeRDP
https://github.com/FreeRDP/FreeRDP/commit/6d86e20e1e7caaab4f0c7f89e36d32914dbccc52
Fixed double free
1
int shadow_server_start(rdpShadowServer* server) { BOOL ipc; BOOL status; WSADATA wsaData; if (!server) return -1; if (WSAStartup(MAKEWORD(2, 2), &wsaData) != 0) return -1; #ifndef _WIN32 signal(SIGPIPE, SIG_IGN); #endif server->screen = shadow_screen_new(server); if (!server->screen) { WLog_ERR(TAG,...
9,028,529,983,749,820,000,000,000,000,000,000,000
None
null
[ "CWE-703" ]
CVE-2020-4031
In FreeRDP before version 2.1.2, there is a use-after-free in gdi_SelectObject. All FreeRDP clients using compatibility mode with /relax-order-checks are affected. This is fixed in version 2.1.2.
https://nvd.nist.gov/vuln/detail/CVE-2020-4031
478,733
FreeRDP
6d86e20e1e7caaab4f0c7f89e36d32914dbccc52
https://github.com/FreeRDP/FreeRDP
https://github.com/FreeRDP/FreeRDP/commit/6d86e20e1e7caaab4f0c7f89e36d32914dbccc52
Fixed double free
0
int shadow_server_start(rdpShadowServer* server) { BOOL ipc; BOOL status; WSADATA wsaData; if (!server) return -1; if (WSAStartup(MAKEWORD(2, 2), &wsaData) != 0) return -1; #ifndef _WIN32 signal(SIGPIPE, SIG_IGN); #endif server->screen = shadow_screen_new(server); if (!server->screen) { WLog_ERR(TAG,...
331,463,368,657,774,570,000,000,000,000,000,000,000
None
null
[ "CWE-703" ]
CVE-2020-4031
In FreeRDP before version 2.1.2, there is a use-after-free in gdi_SelectObject. All FreeRDP clients using compatibility mode with /relax-order-checks are affected. This is fixed in version 2.1.2.
https://nvd.nist.gov/vuln/detail/CVE-2020-4031
214,449
util-linux
0377ef91270d06592a0d4dd009c29e7b1ff9c9b8
https://github.com/karelzak/util-linux
http://git.kernel.org/?p=utils/util-linux/util-linux.git;a=commit;h=0377ef91270d06592a0d4dd009c29e7b1ff9c9b8
mount: (deprecated) drop --guess-fstype The option is undocumented and unnecessary. Signed-off-by: Karel Zak <kzak@redhat.com>
1
main(int argc, char *argv[]) { int c, result = 0, specseen; char *options = NULL, *test_opts = NULL, *node; const char *spec = NULL; char *label = NULL; char *uuid = NULL; char *types = NULL; char *p; struct mntentchn *mc; int fd; sanitize_env(); setlocale(LC_ALL, ""); bindtextdomain(PACKAGE, LOCALEDIR); ...
324,356,410,810,513,450,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2013-0157
(a) mount and (b) umount in util-linux 2.14.1, 2.17.2, and probably other versions allow local users to determine the existence of restricted directories by (1) using the --guess-fstype command-line option or (2) attempting to mount a non-existent device, which generates different error messages depending on whether th...
https://nvd.nist.gov/vuln/detail/CVE-2013-0157
478,742
util-linux
0377ef91270d06592a0d4dd009c29e7b1ff9c9b8
https://github.com/karelzak/util-linux
http://git.kernel.org/?p=utils/util-linux/util-linux.git;a=commit;h=0377ef91270d06592a0d4dd009c29e7b1ff9c9b8
mount: (deprecated) drop --guess-fstype The option is undocumented and unnecessary. Signed-off-by: Karel Zak <kzak@redhat.com>
0
main(int argc, char *argv[]) { int c, result = 0, specseen; char *options = NULL, *test_opts = NULL, *node; const char *spec = NULL; char *label = NULL; char *uuid = NULL; char *types = NULL; char *p; struct mntentchn *mc; int fd; sanitize_env(); setlocale(LC_ALL, ""); bindtextdomain(PACKAGE, LOCALEDIR); ...
4,236,598,480,908,814,000,000,000,000,000,000,000
None
null
[ "CWE-200" ]
CVE-2013-0157
(a) mount and (b) umount in util-linux 2.14.1, 2.17.2, and probably other versions allow local users to determine the existence of restricted directories by (1) using the --guess-fstype command-line option or (2) attempting to mount a non-existent device, which generates different error messages depending on whether th...
https://nvd.nist.gov/vuln/detail/CVE-2013-0157
214,495
libgxps
133fe2a96e020d4ca65c6f64fb28a404050ebbfd
https://github.com/GNOME/libgxps
https://git.gnome.org/browse/libgxps/commit/?id=133fe2a96e020d4ca65c6f64fb28a404050ebbfd
gxps-archive: Handle errors returned by archive_read_data
1
gxps_archive_input_stream_read (GInputStream *stream, void *buffer, gsize count, GCancellable *cancellable, GError **error) { GXPSArchiveInputStream *istream = GXPS_ARCHIVE_INPUT_STREAM (stream); gssize bytes_read; if (g_cancellable_set_error_if_canc...
185,546,597,371,139,940,000,000,000,000,000,000,000
gxps-archive.c
228,445,427,647,594,200,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-10733
There is a heap-based buffer over-read in the function ft_font_face_hash of gxps-fonts.c in libgxps through 0.3.0. A crafted input will lead to a remote denial of service attack.
https://nvd.nist.gov/vuln/detail/CVE-2018-10733
479,417
libgxps
133fe2a96e020d4ca65c6f64fb28a404050ebbfd
https://github.com/GNOME/libgxps
https://git.gnome.org/browse/libgxps/commit/?id=133fe2a96e020d4ca65c6f64fb28a404050ebbfd
gxps-archive: Handle errors returned by archive_read_data
0
gxps_archive_input_stream_read (GInputStream *stream, void *buffer, gsize count, GCancellable *cancellable, GError **error) { GXPSArchiveInputStream *istream = GXPS_ARCHIVE_INPUT_STREAM (stream); gssize bytes_read; if (g_cancellable_set_error_if_canc...
265,721,655,036,071,470,000,000,000,000,000,000,000
gxps-archive.c
240,163,413,052,202,900,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2018-10733
There is a heap-based buffer over-read in the function ft_font_face_hash of gxps-fonts.c in libgxps through 0.3.0. A crafted input will lead to a remote denial of service attack.
https://nvd.nist.gov/vuln/detail/CVE-2018-10733
214,498
linux
8cdb5240ec5928b20490a2bb34cb87e9a5f40226
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cdb5240ec5928b20490a2bb34cb87e9a5f40226
ext4: never move the system.data xattr out of the inode body When expanding the extra isize space, we must never move the system.data xattr out of the inode body. For performance reasons, it doesn't make any sense, and the inline data implementation assumes that system.data xattr is never in the external xattr block....
1
static int ext4_xattr_make_inode_space(handle_t *handle, struct inode *inode, struct ext4_inode *raw_inode, int isize_diff, size_t ifree, size_t bfree, int *total_ino) { struct ext4_xattr_ibody_header *header = IHDR(inode, raw_inode); struct ext4_xattr_entry *small_entry; struct ext4...
284,278,976,097,378,770,000,000,000,000,000,000,000
xattr.c
286,039,824,774,724,880,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2018-10880
Linux kernel is vulnerable to a stack-out-of-bounds write in the ext4 filesystem code when mounting and writing to a crafted ext4 image in ext4_update_inline_data(). An attacker could use this to cause a system crash and a denial of service.
https://nvd.nist.gov/vuln/detail/CVE-2018-10880
479,425
linux
8cdb5240ec5928b20490a2bb34cb87e9a5f40226
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cdb5240ec5928b20490a2bb34cb87e9a5f40226
ext4: never move the system.data xattr out of the inode body When expanding the extra isize space, we must never move the system.data xattr out of the inode body. For performance reasons, it doesn't make any sense, and the inline data implementation assumes that system.data xattr is never in the external xattr block....
0
static int ext4_xattr_make_inode_space(handle_t *handle, struct inode *inode, struct ext4_inode *raw_inode, int isize_diff, size_t ifree, size_t bfree, int *total_ino) { struct ext4_xattr_ibody_header *header = IHDR(inode, raw_inode); struct ext4_xattr_entry *small_entry; struct ext4...
334,970,164,567,658,920,000,000,000,000,000,000,000
xattr.c
256,578,085,620,066,300,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2018-10880
Linux kernel is vulnerable to a stack-out-of-bounds write in the ext4 filesystem code when mounting and writing to a crafted ext4 image in ext4_update_inline_data(). An attacker could use this to cause a system crash and a denial of service.
https://nvd.nist.gov/vuln/detail/CVE-2018-10880
214,499
linux
9d5564ddcf2a0f5ba3fa1c3a1f8a1b59ad309553
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9d5564ddcf2a0f5ba3fa1c3a1f8a1b59ad309553
bpf: fix inner map masking to prevent oob under speculation During review I noticed that inner meta map setup for map in map is buggy in that it does not propagate all needed data from the reference map which the verifier is later accessing. In particular one such case is index masking to prevent out of bounds access...
1
struct bpf_map *bpf_map_meta_alloc(int inner_map_ufd) { struct bpf_map *inner_map, *inner_map_meta; struct fd f; f = fdget(inner_map_ufd); inner_map = __bpf_map_get(f); if (IS_ERR(inner_map)) return inner_map; /* prog_array->owner_prog_type and owner_jited * is a runtime binding. Doing static check alone ...
318,582,213,548,109,400,000,000,000,000,000,000,000
map_in_map.c
298,169,888,900,582,680,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2019-7308
kernel/bpf/verifier.c in the Linux kernel before 4.20.6 performs undesirable out-of-bounds speculation on pointer arithmetic in various cases, including cases of different branches with different state or limits to sanitize, leading to side-channel attacks.
https://nvd.nist.gov/vuln/detail/CVE-2019-7308
479,426
linux
9d5564ddcf2a0f5ba3fa1c3a1f8a1b59ad309553
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9d5564ddcf2a0f5ba3fa1c3a1f8a1b59ad309553
bpf: fix inner map masking to prevent oob under speculation During review I noticed that inner meta map setup for map in map is buggy in that it does not propagate all needed data from the reference map which the verifier is later accessing. In particular one such case is index masking to prevent out of bounds access...
0
struct bpf_map *bpf_map_meta_alloc(int inner_map_ufd) { struct bpf_map *inner_map, *inner_map_meta; u32 inner_map_meta_size; struct fd f; f = fdget(inner_map_ufd); inner_map = __bpf_map_get(f); if (IS_ERR(inner_map)) return inner_map; /* prog_array->owner_prog_type and owner_jited * is a runtime binding. ...
295,883,215,608,576,200,000,000,000,000,000,000,000
map_in_map.c
172,685,935,902,656,280,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2019-7308
kernel/bpf/verifier.c in the Linux kernel before 4.20.6 performs undesirable out-of-bounds speculation on pointer arithmetic in various cases, including cases of different branches with different state or limits to sanitize, leading to side-channel attacks.
https://nvd.nist.gov/vuln/detail/CVE-2019-7308
214,585
ImageMagick
f391a5f4554fe47eb56d6277ac32d1f698572f0e
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/f391a5f4554fe47eb56d6277ac32d1f698572f0e#diff-cf9d65fe4015faf1a06ee963cd3166bf
https://github.com/ImageMagick/ImageMagick/issues/1531
1
static Image *ReadDPSImage(const ImageInfo *image_info,ExceptionInfo *exception) { const char *client_name; Display *display; float pixels_per_point; Image *image; int sans, status; Pixmap pixmap; register ssize_t i; register Quantum *q; register size_t ...
244,899,271,484,598,800,000,000,000,000,000,000,000
dps.c
154,564,406,484,208,690,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2019-16709
ImageMagick 7.0.8-35 has a memory leak in coders/dps.c, as demonstrated by XCreateImage.
https://nvd.nist.gov/vuln/detail/CVE-2019-16709
479,513
ImageMagick
f391a5f4554fe47eb56d6277ac32d1f698572f0e
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/f391a5f4554fe47eb56d6277ac32d1f698572f0e#diff-cf9d65fe4015faf1a06ee963cd3166bf
https://github.com/ImageMagick/ImageMagick/issues/1531
0
static Image *ReadDPSImage(const ImageInfo *image_info,ExceptionInfo *exception) { const char *client_name; Display *display; float pixels_per_point; Image *image; int sans, status; Pixmap pixmap; register ssize_t i; register Quantum *q; register size_t ...
126,651,454,921,426,850,000,000,000,000,000,000,000
dps.c
13,104,856,822,069,393,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2019-16709
ImageMagick 7.0.8-35 has a memory leak in coders/dps.c, as demonstrated by XCreateImage.
https://nvd.nist.gov/vuln/detail/CVE-2019-16709
214,908
linux
89c6efa61f5709327ecfa24bff18e57a4e80c7fa
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=89c6efa61f5709327ecfa24bff18e57a4e80c7fa
i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA On a I2C_SMBUS_I2C_BLOCK_DATA read request, if data->block[0] is greater than I2C_SMBUS_BLOCK_MAX + 1, the underlying I2C driver writes data out of the msgbuf1 array boundary. It is possible from a user application to run into that issue by calling the ...
1
static s32 i2c_smbus_xfer_emulated(struct i2c_adapter *adapter, u16 addr, unsigned short flags, char read_write, u8 command, int size, union i2c_smbus_data *data) { /* So we need to generate a series of msgs. In the case of writing, we need to use only one message; when reading, we need two. We...
117,497,833,871,606,080,000,000,000,000,000,000,000
i2c-core-smbus.c
164,582,100,041,356,790,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2017-18551
An issue was discovered in drivers/i2c/i2c-core-smbus.c in the Linux kernel before 4.14.15. There is an out of bounds write in the function i2c_smbus_xfer_emulated.
https://nvd.nist.gov/vuln/detail/CVE-2017-18551
481,252
linux
89c6efa61f5709327ecfa24bff18e57a4e80c7fa
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=89c6efa61f5709327ecfa24bff18e57a4e80c7fa
i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA On a I2C_SMBUS_I2C_BLOCK_DATA read request, if data->block[0] is greater than I2C_SMBUS_BLOCK_MAX + 1, the underlying I2C driver writes data out of the msgbuf1 array boundary. It is possible from a user application to run into that issue by calling the ...
0
static s32 i2c_smbus_xfer_emulated(struct i2c_adapter *adapter, u16 addr, unsigned short flags, char read_write, u8 command, int size, union i2c_smbus_data *data) { /* So we need to generate a series of msgs. In the case of writing, we need to use only one message; when reading, we need two. We...
328,369,013,145,734,180,000,000,000,000,000,000,000
i2c-core-smbus.c
114,483,254,206,912,120,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2017-18551
An issue was discovered in drivers/i2c/i2c-core-smbus.c in the Linux kernel before 4.14.15. There is an out of bounds write in the function i2c_smbus_xfer_emulated.
https://nvd.nist.gov/vuln/detail/CVE-2017-18551
214,910
file
e96f86b5311572be1360ee0bb05d4926f8df3189
https://github.com/file/file
https://github.com/file/file/commit/e96f86b5311572be1360ee0bb05d4926f8df3189
Fix incorrect bounds check, from Alexander Cherepanov
1
file_printable(char *buf, size_t bufsiz, const char *str) { char *ptr, *eptr; const unsigned char *s = (const unsigned char *)str; for (ptr = buf, eptr = ptr + bufsiz - 1; ptr < eptr && *s; s++) { if (isprint(*s)) { *ptr++ = *s; continue; } if (ptr >= eptr + 4) break; *ptr++ = '\\'; *ptr++ = ((*s...
304,768,706,412,692,000,000,000,000,000,000,000,000
funcs.c
15,602,738,421,598,113,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2014-9653
readelf.c in file before 5.22, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not consider that pread calls sometimes read only a subset of the available data, which allows remote attackers to cause a denial of service (uninitialized memory access) or possibly ...
https://nvd.nist.gov/vuln/detail/CVE-2014-9653
481,292
file
e96f86b5311572be1360ee0bb05d4926f8df3189
https://github.com/file/file
https://github.com/file/file/commit/e96f86b5311572be1360ee0bb05d4926f8df3189
Fix incorrect bounds check, from Alexander Cherepanov
0
file_printable(char *buf, size_t bufsiz, const char *str) { char *ptr, *eptr; const unsigned char *s = (const unsigned char *)str; for (ptr = buf, eptr = ptr + bufsiz - 1; ptr < eptr && *s; s++) { if (isprint(*s)) { *ptr++ = *s; continue; } if (ptr >= eptr - 3) break; *ptr++ = '\\'; *ptr++ = ((*s...
29,628,692,809,084,740,000,000,000,000,000,000,000
funcs.c
247,884,554,659,100,300,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2014-9653
readelf.c in file before 5.22, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not consider that pread calls sometimes read only a subset of the available data, which allows remote attackers to cause a denial of service (uninitialized memory access) or possibly ...
https://nvd.nist.gov/vuln/detail/CVE-2014-9653
214,927
ImageMagick
7d8e14899c562157c7760a77fc91625a27cb596f
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/7d8e14899c562157c7760a77fc91625a27cb596f
https://github.com/ImageMagick/ImageMagick/issues/771
1
static Image *ReadCAPTIONImage(const ImageInfo *image_info, ExceptionInfo *exception) { char *caption, geometry[MagickPathExtent], *property, *text; const char *gravity, *option; DrawInfo *draw_info; Image *image; MagickBooleanType split, status; register ssize...
331,933,823,204,073,200,000,000,000,000,000,000,000
caption.c
272,478,956,405,977,950,000,000,000,000,000,000,000
[ "CWE-835" ]
CVE-2017-14741
The ReadCAPTIONImage function in coders/caption.c in ImageMagick 7.0.7-3 allows remote attackers to cause a denial of service (infinite loop) via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2017-14741
481,507
ImageMagick
7d8e14899c562157c7760a77fc91625a27cb596f
https://github.com/ImageMagick/ImageMagick
https://github.com/ImageMagick/ImageMagick/commit/7d8e14899c562157c7760a77fc91625a27cb596f
https://github.com/ImageMagick/ImageMagick/issues/771
0
static Image *ReadCAPTIONImage(const ImageInfo *image_info, ExceptionInfo *exception) { char *caption, geometry[MagickPathExtent], *property, *text; const char *gravity, *option; DrawInfo *draw_info; Image *image; MagickBooleanType split, status; register ssize...
16,743,109,672,898,780,000,000,000,000,000,000,000
caption.c
314,715,677,703,200,700,000,000,000,000,000,000,000
[ "CWE-835" ]
CVE-2017-14741
The ReadCAPTIONImage function in coders/caption.c in ImageMagick 7.0.7-3 allows remote attackers to cause a denial of service (infinite loop) via a crafted font file.
https://nvd.nist.gov/vuln/detail/CVE-2017-14741
214,928
qemu
edfe2eb4360cde4ed5d95bda7777edcb3510f76a
https://github.com/bonzini/qemu
https://gitlab.com/qemu-project/qemu/-/commit/edfe2eb4360cde4ed5d95bda7777edcb3510f76a
hw/intc/arm_gic: Fix interrupt ID in GICD_SGIR register Per the ARM Generic Interrupt Controller Architecture specification (document "ARM IHI 0048B.b (ID072613)"), the SGIINTID field is 4 bit, not 10: - 4.3 Distributor register descriptions - 4.3.15 Software Generated Interrupt Register, GICD_SG - Table 4-2...
1
static void gic_dist_writel(void *opaque, hwaddr offset, uint32_t value, MemTxAttrs attrs) { GICState *s = (GICState *)opaque; if (offset == 0xf00) { int cpu; int irq; int mask; int target_cpu; cpu = gic_get_current_cpu(s); irq = value...
132,067,759,549,354,470,000,000,000,000,000,000,000
arm_gic.c
305,923,038,534,678,380,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2021-20221
An out-of-bounds heap buffer access issue was found in the ARM Generic Interrupt Controller emulator of QEMU up to and including qemu 4.2.0on aarch64 platform. The issue occurs because while writing an interrupt ID to the controller memory area, it is not masked to be 4 bits wide. It may lead to the said issue while up...
https://nvd.nist.gov/vuln/detail/CVE-2021-20221
481,550
qemu
edfe2eb4360cde4ed5d95bda7777edcb3510f76a
https://github.com/bonzini/qemu
https://gitlab.com/qemu-project/qemu/-/commit/edfe2eb4360cde4ed5d95bda7777edcb3510f76a
hw/intc/arm_gic: Fix interrupt ID in GICD_SGIR register Per the ARM Generic Interrupt Controller Architecture specification (document "ARM IHI 0048B.b (ID072613)"), the SGIINTID field is 4 bit, not 10: - 4.3 Distributor register descriptions - 4.3.15 Software Generated Interrupt Register, GICD_SG - Table 4-2...
0
static void gic_dist_writel(void *opaque, hwaddr offset, uint32_t value, MemTxAttrs attrs) { GICState *s = (GICState *)opaque; if (offset == 0xf00) { int cpu; int irq; int mask; int target_cpu; cpu = gic_get_current_cpu(s); irq = value...
163,930,661,767,044,060,000,000,000,000,000,000,000
arm_gic.c
183,077,475,739,425,550,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2021-20221
An out-of-bounds heap buffer access issue was found in the ARM Generic Interrupt Controller emulator of QEMU up to and including qemu 4.2.0on aarch64 platform. The issue occurs because while writing an interrupt ID to the controller memory area, it is not masked to be 4 bits wide. It may lead to the said issue while up...
https://nvd.nist.gov/vuln/detail/CVE-2021-20221
214,931
linux
30a8beeb3042f49d0537b7050fd21b490166a3d9
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=30a8beeb3042f49d0537b7050fd21b490166a3d9
can: peak_usb: pcan_usb_fd: Fix info-leaks to USB devices Uninitialized Kernel memory can leak to USB devices. Fix by using kzalloc() instead of kmalloc() on the affected buffers. Signed-off-by: Tomas Bortoli <tomasbortoli@gmail.com> Reported-by: syzbot+513e4d0985298538bf9b@syzkaller.appspotmail.com Fixes: 0a25e1f4f...
1
static int pcan_usb_fd_init(struct peak_usb_device *dev) { struct pcan_usb_fd_device *pdev = container_of(dev, struct pcan_usb_fd_device, dev); int i, err = -ENOMEM; /* do this for 1st channel only */ if (!dev->prev_siblings) { /* allocate netdevices common structure attached to first one */ pdev->usb_if = ...
228,030,246,418,670,780,000,000,000,000,000,000,000
pcan_usb_fd.c
189,617,677,896,216,800,000,000,000,000,000,000,000
[ "CWE-908" ]
CVE-2019-19535
In the Linux kernel before 5.2.9, there is an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_fd.c driver, aka CID-30a8beeb3042.
https://nvd.nist.gov/vuln/detail/CVE-2019-19535
481,588
linux
30a8beeb3042f49d0537b7050fd21b490166a3d9
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=30a8beeb3042f49d0537b7050fd21b490166a3d9
can: peak_usb: pcan_usb_fd: Fix info-leaks to USB devices Uninitialized Kernel memory can leak to USB devices. Fix by using kzalloc() instead of kmalloc() on the affected buffers. Signed-off-by: Tomas Bortoli <tomasbortoli@gmail.com> Reported-by: syzbot+513e4d0985298538bf9b@syzkaller.appspotmail.com Fixes: 0a25e1f4f...
0
static int pcan_usb_fd_init(struct peak_usb_device *dev) { struct pcan_usb_fd_device *pdev = container_of(dev, struct pcan_usb_fd_device, dev); int i, err = -ENOMEM; /* do this for 1st channel only */ if (!dev->prev_siblings) { /* allocate netdevices common structure attached to first one */ pdev->usb_if = ...
73,043,863,793,171,260,000,000,000,000,000,000,000
pcan_usb_fd.c
292,197,689,783,577,080,000,000,000,000,000,000,000
[ "CWE-908" ]
CVE-2019-19535
In the Linux kernel before 5.2.9, there is an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_fd.c driver, aka CID-30a8beeb3042.
https://nvd.nist.gov/vuln/detail/CVE-2019-19535
214,933
ghostpdl
39b1e54b2968620723bf32e96764c88797714879
https://github.com/ArtifexSoftware/ghostpdl
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=39b1e54b2968620723bf32e96764c88797714879
pdfwrite - Guard against trying to output an infinite number Bug #699255 " Buffer overflow on pprintg1 due to mishandle postscript file data to pdf" The file uses an enormous parameter to xyxhow, causing an overflow in the calculation of text positioning (value > 1e39). Since this is basically a nonsense value, and ...
1
set_text_distance(gs_point *pdist, double dx, double dy, const gs_matrix *pmat) { int code = gs_distance_transform_inverse(dx, dy, pmat, pdist); double rounded; if (code == gs_error_undefinedresult) { /* The CTM is degenerate. Can't know the distance in user space. Set zero be...
83,313,660,559,192,970,000,000,000,000,000,000,000
gdevpdts.c
286,364,993,590,916,840,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-10194
The set_text_distance function in devices/vector/gdevpdts.c in the pdfwrite component in Artifex Ghostscript through 9.22 does not prevent overflows in text-positioning calculation, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted PDF...
https://nvd.nist.gov/vuln/detail/CVE-2018-10194
481,653
ghostpdl
39b1e54b2968620723bf32e96764c88797714879
https://github.com/ArtifexSoftware/ghostpdl
http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=39b1e54b2968620723bf32e96764c88797714879
pdfwrite - Guard against trying to output an infinite number Bug #699255 " Buffer overflow on pprintg1 due to mishandle postscript file data to pdf" The file uses an enormous parameter to xyxhow, causing an overflow in the calculation of text positioning (value > 1e39). Since this is basically a nonsense value, and ...
0
set_text_distance(gs_point *pdist, double dx, double dy, const gs_matrix *pmat) { int code; double rounded; if (dx > 1e38 || dy > 1e38) code = gs_error_undefinedresult; else code = gs_distance_transform_inverse(dx, dy, pmat, pdist); if (code == gs_error_undefinedresult) { /...
49,410,995,772,899,700,000,000,000,000,000,000,000
gdevpdts.c
245,421,769,076,134,180,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2018-10194
The set_text_distance function in devices/vector/gdevpdts.c in the pdfwrite component in Artifex Ghostscript through 9.22 does not prevent overflows in text-positioning calculation, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted PDF...
https://nvd.nist.gov/vuln/detail/CVE-2018-10194
214,947
linux
0aaa81377c5a01f686bcdb8c7a6929a7bf330c68
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0aaa81377c5a01f686bcdb8c7a6929a7bf330c68
can: gw: ensure DLC boundaries after CAN frame modification Muyu Yu provided a POC where user root with CAP_NET_ADMIN can create a CAN frame modification rule that makes the data length code a higher value than the available CAN frame data size. In combination with a configured checksum calculation where the result is...
1
static void can_can_gw_rcv(struct sk_buff *skb, void *data) { struct cgw_job *gwj = (struct cgw_job *)data; struct can_frame *cf; struct sk_buff *nskb; int modidx = 0; /* * Do not handle CAN frames routed more than 'max_hops' times. * In general we should never catch this delimiter which is intended * to co...
136,482,575,830,112,850,000,000,000,000,000,000,000
gw.c
204,133,792,040,740,650,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2019-3701
An issue was discovered in can_can_gw_rcv in net/can/gw.c in the Linux kernel through 4.19.13. The CAN frame modification rules allow bitwise logical operations that can be also applied to the can_dlc field. The privileged user "root" with CAP_NET_ADMIN can create a CAN frame modification rule that makes the data lengt...
https://nvd.nist.gov/vuln/detail/CVE-2019-3701
481,784
linux
0aaa81377c5a01f686bcdb8c7a6929a7bf330c68
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0aaa81377c5a01f686bcdb8c7a6929a7bf330c68
can: gw: ensure DLC boundaries after CAN frame modification Muyu Yu provided a POC where user root with CAP_NET_ADMIN can create a CAN frame modification rule that makes the data length code a higher value than the available CAN frame data size. In combination with a configured checksum calculation where the result is...
0
static void can_can_gw_rcv(struct sk_buff *skb, void *data) { struct cgw_job *gwj = (struct cgw_job *)data; struct can_frame *cf; struct sk_buff *nskb; int modidx = 0; /* * Do not handle CAN frames routed more than 'max_hops' times. * In general we should never catch this delimiter which is intended * to co...
175,144,692,010,009,800,000,000,000,000,000,000,000
gw.c
232,207,459,236,924,500,000,000,000,000,000,000,000
[ "CWE-787" ]
CVE-2019-3701
An issue was discovered in can_can_gw_rcv in net/can/gw.c in the Linux kernel through 4.19.13. The CAN frame modification rules allow bitwise logical operations that can be also applied to the can_dlc field. The privileged user "root" with CAP_NET_ADMIN can create a CAN frame modification rule that makes the data lengt...
https://nvd.nist.gov/vuln/detail/CVE-2019-3701
214,975
abrt
28ce40d8db91c1926a95f21ef19a980a8af88471
https://github.com/abrt/abrt
https://github.com/abrt/abrt/commit/28ce40d8db91c1926a95f21ef19a980a8af88471
ccpp: check for overflow in abrt coredump path creation This issue was discovered by Florian Weimer of Red Hat Product Security. Signed-off-by: Jakub Filak <jfilak@redhat.com>
1
int main(int argc, char** argv) { /* Kernel starts us with all fd's closed. * But it's dangerous: * fprintf(stderr) can dump messages into random fds, etc. * Ensure that if any of fd 0,1,2 is closed, we open it to /dev/null. */ int fd = xopen("/dev/null", O_RDWR); while (fd < 2) fd = xd...
60,517,800,847,633,490,000,000,000,000,000,000,000
abrt-hook-ccpp.c
276,185,859,868,479,300,000,000,000,000,000,000,000
[ "CWE-59" ]
CVE-2015-3315
Automatic Bug Reporting Tool (ABRT) allows local users to read, change the ownership of, or have other unspecified impact on arbitrary files via a symlink attack on (1) /var/tmp/abrt/*/maps, (2) /tmp/jvm-*/hs_error.log, (3) /proc/*/exe, (4) /etc/os-release in a chroot, or (5) an unspecified root directory related to li...
https://nvd.nist.gov/vuln/detail/CVE-2015-3315
482,033
abrt
28ce40d8db91c1926a95f21ef19a980a8af88471
https://github.com/abrt/abrt
https://github.com/abrt/abrt/commit/28ce40d8db91c1926a95f21ef19a980a8af88471
ccpp: check for overflow in abrt coredump path creation This issue was discovered by Florian Weimer of Red Hat Product Security. Signed-off-by: Jakub Filak <jfilak@redhat.com>
0
int main(int argc, char** argv) { /* Kernel starts us with all fd's closed. * But it's dangerous: * fprintf(stderr) can dump messages into random fds, etc. * Ensure that if any of fd 0,1,2 is closed, we open it to /dev/null. */ int fd = xopen("/dev/null", O_RDWR); while (fd < 2) fd = xd...
274,112,256,452,875,940,000,000,000,000,000,000,000
abrt-hook-ccpp.c
281,666,799,197,488,000,000,000,000,000,000,000,000
[ "CWE-59" ]
CVE-2015-3315
Automatic Bug Reporting Tool (ABRT) allows local users to read, change the ownership of, or have other unspecified impact on arbitrary files via a symlink attack on (1) /var/tmp/abrt/*/maps, (2) /tmp/jvm-*/hs_error.log, (3) /proc/*/exe, (4) /etc/os-release in a chroot, or (5) an unspecified root directory related to li...
https://nvd.nist.gov/vuln/detail/CVE-2015-3315
214,976
linux
f4351a199cc120ff9d59e06d02e8657d08e6cc46
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f4351a199cc120ff9d59e06d02e8657d08e6cc46
ALSA: usb-audio: Avoid access before bLength check in build_audio_procunit() The parser for the processing unit reads bNrInPins field before the bLength sanity check, which may lead to an out-of-bound access when a malformed descriptor is given. Fix it by assignment after the bLength check. Cc: <stable@vger.kernel.o...
1
static int build_audio_procunit(struct mixer_build *state, int unitid, void *raw_desc, struct procunit_info *list, char *name) { struct uac_processing_unit_descriptor *desc = raw_desc; int num_ins = desc->bNrInPins; struct usb_mixer_elem_info *cval; struct snd_kcontrol *kctl; int i, err, nameid, type, len;...
12,215,826,483,691,914,000,000,000,000,000,000,000
mixer.c
66,640,194,003,274,085,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-15927
An issue was discovered in the Linux kernel before 4.20.2. An out-of-bounds access exists in the function build_audio_procunit in the file sound/usb/mixer.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-15927
482,039
linux
f4351a199cc120ff9d59e06d02e8657d08e6cc46
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f4351a199cc120ff9d59e06d02e8657d08e6cc46
ALSA: usb-audio: Avoid access before bLength check in build_audio_procunit() The parser for the processing unit reads bNrInPins field before the bLength sanity check, which may lead to an out-of-bound access when a malformed descriptor is given. Fix it by assignment after the bLength check. Cc: <stable@vger.kernel.o...
0
static int build_audio_procunit(struct mixer_build *state, int unitid, void *raw_desc, struct procunit_info *list, char *name) { struct uac_processing_unit_descriptor *desc = raw_desc; int num_ins; struct usb_mixer_elem_info *cval; struct snd_kcontrol *kctl; int i, err, nameid, type, len; struct procunit_...
40,637,239,867,549,550,000,000,000,000,000,000,000
mixer.c
281,704,089,268,021,350,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2019-15927
An issue was discovered in the Linux kernel before 4.20.2. An out-of-bounds access exists in the function build_audio_procunit in the file sound/usb/mixer.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-15927
214,991
mongo
3a7e85ea1f672f702660e5472566234b1d19038e
https://github.com/mongodb/mongo
https://github.com/mongodb/mongo/commit/3a7e85ea1f672f702660e5472566234b1d19038e
SERVER-17264: improve bson validation for utf-8 strings (cherry picked from commit 394a8569ff14a215c0691aa34440227b2e62a4de) Conflicts: src/mongo/bson/bson_validate_test.cpp
1
Status readUTF8String( StringData* out ) { int sz; if ( !readNumber<int>( &sz ) ) return Status( ErrorCodes::InvalidBSON, "invalid bson" ); if ( out ) { *out = StringData( _buffer + _position, sz ); } ...
176,983,854,668,946,200,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2015-1609
MongoDB before 2.4.13 and 2.6.x before 2.6.8 allows remote attackers to cause a denial of service via a crafted UTF-8 string in a BSON request.
https://nvd.nist.gov/vuln/detail/CVE-2015-1609
482,366
mongo
3a7e85ea1f672f702660e5472566234b1d19038e
https://github.com/mongodb/mongo
https://github.com/mongodb/mongo/commit/3a7e85ea1f672f702660e5472566234b1d19038e
SERVER-17264: improve bson validation for utf-8 strings (cherry picked from commit 394a8569ff14a215c0691aa34440227b2e62a4de) Conflicts: src/mongo/bson/bson_validate_test.cpp
0
Status readUTF8String( StringData* out ) { int sz; if ( !readNumber<int>( &sz ) ) return Status( ErrorCodes::InvalidBSON, "invalid bson" ); if ( sz <= 0 ) { // must have NULL at the very least return...
92,175,759,094,154,350,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2015-1609
MongoDB before 2.4.13 and 2.6.x before 2.6.8 allows remote attackers to cause a denial of service via a crafted UTF-8 string in a BSON request.
https://nvd.nist.gov/vuln/detail/CVE-2015-1609
215,036
mupdf
22c47acbd52949421f8c7cb46ea1556827d0fcbf
https://github.com/ArtifexSoftware/mupdf
https://github.com/ArtifexSoftware/mupdf/commit/22c47acbd52949421f8c7cb46ea1556827d0fcbf
Bug 704834: Fix division by zero for zero width pages in muraster.
1
initialise_banding(fz_context *ctx, render_details *render, int color) { size_t min_band_mem; int bpp, h, w, reps; render->colorspace = output_cs; render->format = output_format; #if GREY_FALLBACK != 0 if (color == 0) { if (render->colorspace == CS_RGB) { /* Fallback from PPM to PGM */ render->colorspa...
8,516,083,646,536,877,000,000,000,000,000,000,000
None
null
[ "CWE-22" ]
CVE-2021-4216
A Floating point exception (division-by-zero) flaw was found in Mupdf for zero width pages in muraster.c. It is fixed in Mupdf-1.20.0-rc1 upstream.
https://nvd.nist.gov/vuln/detail/CVE-2021-4216
482,656
mupdf
22c47acbd52949421f8c7cb46ea1556827d0fcbf
https://github.com/ArtifexSoftware/mupdf
https://github.com/ArtifexSoftware/mupdf/commit/22c47acbd52949421f8c7cb46ea1556827d0fcbf
Bug 704834: Fix division by zero for zero width pages in muraster.
0
initialise_banding(fz_context *ctx, render_details *render, int color) { size_t min_band_mem; int bpp, h, w, reps; render->colorspace = output_cs; render->format = output_format; #if GREY_FALLBACK != 0 if (color == 0) { if (render->colorspace == CS_RGB) { /* Fallback from PPM to PGM */ render->colorspa...
4,961,210,047,777,575,500,000,000,000,000,000,000
None
null
[ "CWE-22" ]
CVE-2021-4216
A Floating point exception (division-by-zero) flaw was found in Mupdf for zero width pages in muraster.c. It is fixed in Mupdf-1.20.0-rc1 upstream.
https://nvd.nist.gov/vuln/detail/CVE-2021-4216
215,037
file-roller
f70be1f41688859ec8dbe266df35a1839ceb96c5
https://git.gnome.org/browse/file-roller
https://git.gnome.org/browse/file-roller/commit/?id=f70be1f41688859ec8dbe266df35a1839ceb96c5
do not follow symlinks when deleting a folder recursively [bug #698554]
1
_g_file_remove_directory (GFile *directory, GCancellable *cancellable, GError **error) { GFileEnumerator *enumerator; GFileInfo *info; gboolean error_occurred = FALSE; if (directory == NULL) return TRUE; enumerator = g_file_enumerate_children (directory, G_FI...
305,380,695,481,958,370,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2016-7162
The _g_file_remove_directory function in file-utils.c in File Roller 3.5.4 through 3.20.2 allows remote attackers to delete arbitrary files via a symlink attack on a folder in an archive.
https://nvd.nist.gov/vuln/detail/CVE-2016-7162
482,678
file-roller
f70be1f41688859ec8dbe266df35a1839ceb96c5
https://git.gnome.org/browse/file-roller
https://git.gnome.org/browse/file-roller/commit/?id=f70be1f41688859ec8dbe266df35a1839ceb96c5
do not follow symlinks when deleting a folder recursively [bug #698554]
0
_g_file_remove_directory (GFile *directory, GCancellable *cancellable, GError **error) { GFileEnumerator *enumerator; GFileInfo *info; gboolean error_occurred = FALSE; if (directory == NULL) return TRUE; enumerator = g_file_enumerate_children (directory, G_FI...
46,373,685,789,515,300,000,000,000,000,000,000,000
None
null
[ "CWE-20" ]
CVE-2016-7162
The _g_file_remove_directory function in file-utils.c in File Roller 3.5.4 through 3.20.2 allows remote attackers to delete arbitrary files via a symlink attack on a folder in an archive.
https://nvd.nist.gov/vuln/detail/CVE-2016-7162
215,066
ImageMagick6
6954a3f7f1bf1dad417260c5965f2c30a64fa25e
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/6954a3f7f1bf1dad417260c5965f2c30a64fa25e
Fixed memory leak reported in #1558 and fixed other leak.
1
static Image *ReadDOTImage(const ImageInfo *image_info,ExceptionInfo *exception) { char command[MaxTextExtent]; const char *option; graph_t *graph; Image *image; ImageInfo *read_info; MagickBooleanType status; /* Open image file. */ assert(image_info != (const ImageIn...
327,074,136,711,311,330,000,000,000,000,000,000,000
dot.c
329,884,814,729,668,330,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2019-16713
ImageMagick 7.0.8-43 has a memory leak in coders/dot.c, as demonstrated by PingImage in MagickCore/constitute.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-16713
483,036
ImageMagick6
6954a3f7f1bf1dad417260c5965f2c30a64fa25e
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/6954a3f7f1bf1dad417260c5965f2c30a64fa25e
Fixed memory leak reported in #1558 and fixed other leak.
0
static Image *ReadDOTImage(const ImageInfo *image_info,ExceptionInfo *exception) { char command[MaxTextExtent]; const char *option; graph_t *graph; Image *image; ImageInfo *read_info; MagickBooleanType status; /* Open image file. */ assert(image_info != (const ImageIn...
114,110,501,110,929,240,000,000,000,000,000,000,000
dot.c
9,846,172,263,488,283,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2019-16713
ImageMagick 7.0.8-43 has a memory leak in coders/dot.c, as demonstrated by PingImage in MagickCore/constitute.c.
https://nvd.nist.gov/vuln/detail/CVE-2019-16713
215,071
linux
9453264ef58638ce8976121ac44c07a3ef375983
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9453264ef58638ce8976121ac44c07a3ef375983
media: go7007: fix a miss of snd_card_free go7007_snd_init() misses a snd_card_free() in an error path. Add the missed call to fix it. Signed-off-by: Chuhong Yuan <hslester96@gmail.com> Signed-off-by: Hans Verkuil <hverkuil-cisco@xs4all.nl> Signed-off-by: Mauro Carvalho Chehab <mchehab+huawei@kernel.org>
1
int go7007_snd_init(struct go7007 *go) { static int dev; struct go7007_snd *gosnd; int ret; if (dev >= SNDRV_CARDS) return -ENODEV; if (!enable[dev]) { dev++; return -ENOENT; } gosnd = kmalloc(sizeof(struct go7007_snd), GFP_KERNEL); if (gosnd == NULL) return -ENOMEM; spin_lock_init(&gosnd->lock); gos...
138,447,749,818,297,090,000,000,000,000,000,000,000
snd-go7007.c
74,081,838,898,783,200,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2019-20810
go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c in the Linux kernel before 5.6 does not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586.
https://nvd.nist.gov/vuln/detail/CVE-2019-20810
483,042
linux
9453264ef58638ce8976121ac44c07a3ef375983
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9453264ef58638ce8976121ac44c07a3ef375983
media: go7007: fix a miss of snd_card_free go7007_snd_init() misses a snd_card_free() in an error path. Add the missed call to fix it. Signed-off-by: Chuhong Yuan <hslester96@gmail.com> Signed-off-by: Hans Verkuil <hverkuil-cisco@xs4all.nl> Signed-off-by: Mauro Carvalho Chehab <mchehab+huawei@kernel.org>
0
int go7007_snd_init(struct go7007 *go) { static int dev; struct go7007_snd *gosnd; int ret; if (dev >= SNDRV_CARDS) return -ENODEV; if (!enable[dev]) { dev++; return -ENOENT; } gosnd = kmalloc(sizeof(struct go7007_snd), GFP_KERNEL); if (gosnd == NULL) return -ENOMEM; spin_lock_init(&gosnd->lock); gos...
295,418,551,355,484,800,000,000,000,000,000,000,000
snd-go7007.c
195,381,447,138,725,400,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2019-20810
go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c in the Linux kernel before 5.6 does not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586.
https://nvd.nist.gov/vuln/detail/CVE-2019-20810
215,074
soundtouch
107f2c5d201a4dfea1b7f15c5957ff2ac9e5f260
https://gitlab.com/soundtouch/soundtouch
https://gitlab.com/soundtouch/soundtouch/commit/107f2c5d201a4dfea1b7f15c5957ff2ac9e5f260
Replaced illegal-number-of-channel assertions with run-time exception
1
void SoundTouch::setChannels(uint numChannels) { /*if (numChannels != 1 && numChannels != 2) { //ST_THROW_RT_ERROR("Illegal number of channels"); return; }*/ channels = numChannels; pRateTransposer->setChannels((int)numChannels); pTDStretch->setChannels((int)numChannels...
100,900,752,757,923,100,000,000,000,000,000,000,000
SoundTouch.cpp
31,973,557,176,655,380,000,000,000,000,000,000,000
[ "CWE-617" ]
CVE-2018-14044
The RateTransposer::setChannels function in RateTransposer.cpp in libSoundTouch.a in Olli Parviainen SoundTouch 2.0 allows remote attackers to cause a denial of service (assertion failure and application exit), as demonstrated by SoundStretch.
https://nvd.nist.gov/vuln/detail/CVE-2018-14044
483,120
soundtouch
107f2c5d201a4dfea1b7f15c5957ff2ac9e5f260
https://gitlab.com/soundtouch/soundtouch
https://gitlab.com/soundtouch/soundtouch/commit/107f2c5d201a4dfea1b7f15c5957ff2ac9e5f260
Replaced illegal-number-of-channel assertions with run-time exception
0
void SoundTouch::setChannels(uint numChannels) { if (!verifyNumberOfChannels(numChannels)) return; channels = numChannels; pRateTransposer->setChannels((int)numChannels); pTDStretch->setChannels((int)numChannels); }
36,956,141,438,746,836,000,000,000,000,000,000,000
SoundTouch.cpp
208,448,012,861,588,100,000,000,000,000,000,000,000
[ "CWE-617" ]
CVE-2018-14044
The RateTransposer::setChannels function in RateTransposer.cpp in libSoundTouch.a in Olli Parviainen SoundTouch 2.0 allows remote attackers to cause a denial of service (assertion failure and application exit), as demonstrated by SoundStretch.
https://nvd.nist.gov/vuln/detail/CVE-2018-14044
215,075
soundtouch
107f2c5d201a4dfea1b7f15c5957ff2ac9e5f260
https://gitlab.com/soundtouch/soundtouch
https://gitlab.com/soundtouch/soundtouch/commit/107f2c5d201a4dfea1b7f15c5957ff2ac9e5f260
Replaced illegal-number-of-channel assertions with run-time exception
1
void RateTransposer::setChannels(int nChannels) { assert(nChannels > 0); if (pTransposer->numChannels == nChannels) return; pTransposer->setChannels(nChannels); inputBuffer.setChannels(nChannels); midBuffer.setChannels(nChannels); outputBuffer.setChannels(nChannels); }
44,220,962,992,982,150,000,000,000,000,000,000,000
RateTransposer.cpp
255,975,912,595,403,370,000,000,000,000,000,000,000
[ "CWE-617" ]
CVE-2018-14044
The RateTransposer::setChannels function in RateTransposer.cpp in libSoundTouch.a in Olli Parviainen SoundTouch 2.0 allows remote attackers to cause a denial of service (assertion failure and application exit), as demonstrated by SoundStretch.
https://nvd.nist.gov/vuln/detail/CVE-2018-14044
483,124
soundtouch
107f2c5d201a4dfea1b7f15c5957ff2ac9e5f260
https://gitlab.com/soundtouch/soundtouch
https://gitlab.com/soundtouch/soundtouch/commit/107f2c5d201a4dfea1b7f15c5957ff2ac9e5f260
Replaced illegal-number-of-channel assertions with run-time exception
0
void RateTransposer::setChannels(int nChannels) { if (!verifyNumberOfChannels(nChannels) || (pTransposer->numChannels == nChannels)) return; pTransposer->setChannels(nChannels); inputBuffer.setChannels(nChannels); midBuffer.setChannels(nChannels); outputBuffer.setChannels(nChannels)...
82,186,769,698,541,670,000,000,000,000,000,000,000
RateTransposer.cpp
278,200,497,163,101,000,000,000,000,000,000,000,000
[ "CWE-617" ]
CVE-2018-14044
The RateTransposer::setChannels function in RateTransposer.cpp in libSoundTouch.a in Olli Parviainen SoundTouch 2.0 allows remote attackers to cause a denial of service (assertion failure and application exit), as demonstrated by SoundStretch.
https://nvd.nist.gov/vuln/detail/CVE-2018-14044
215,076
soundtouch
107f2c5d201a4dfea1b7f15c5957ff2ac9e5f260
https://gitlab.com/soundtouch/soundtouch
https://gitlab.com/soundtouch/soundtouch/commit/107f2c5d201a4dfea1b7f15c5957ff2ac9e5f260
Replaced illegal-number-of-channel assertions with run-time exception
1
void FIFOSampleBuffer::setChannels(int numChannels) { uint usedBytes; assert(numChannels > 0); usedBytes = channels * samplesInBuffer; channels = (uint)numChannels; samplesInBuffer = usedBytes / channels; }
164,034,081,006,483,630,000,000,000,000,000,000,000
FIFOSampleBuffer.cpp
181,203,205,514,363,670,000,000,000,000,000,000,000
[ "CWE-617" ]
CVE-2018-14044
The RateTransposer::setChannels function in RateTransposer.cpp in libSoundTouch.a in Olli Parviainen SoundTouch 2.0 allows remote attackers to cause a denial of service (assertion failure and application exit), as demonstrated by SoundStretch.
https://nvd.nist.gov/vuln/detail/CVE-2018-14044
483,158
soundtouch
107f2c5d201a4dfea1b7f15c5957ff2ac9e5f260
https://gitlab.com/soundtouch/soundtouch
https://gitlab.com/soundtouch/soundtouch/commit/107f2c5d201a4dfea1b7f15c5957ff2ac9e5f260
Replaced illegal-number-of-channel assertions with run-time exception
0
void FIFOSampleBuffer::setChannels(int numChannels) { uint usedBytes; if (!verifyNumberOfChannels(numChannels)) return; usedBytes = channels * samplesInBuffer; channels = (uint)numChannels; samplesInBuffer = usedBytes / channels; }
314,363,400,218,475,040,000,000,000,000,000,000,000
FIFOSampleBuffer.cpp
28,843,565,167,114,076,000,000,000,000,000,000,000
[ "CWE-617" ]
CVE-2018-14044
The RateTransposer::setChannels function in RateTransposer.cpp in libSoundTouch.a in Olli Parviainen SoundTouch 2.0 allows remote attackers to cause a denial of service (assertion failure and application exit), as demonstrated by SoundStretch.
https://nvd.nist.gov/vuln/detail/CVE-2018-14044
215,077
soundtouch
107f2c5d201a4dfea1b7f15c5957ff2ac9e5f260
https://gitlab.com/soundtouch/soundtouch
https://gitlab.com/soundtouch/soundtouch/commit/107f2c5d201a4dfea1b7f15c5957ff2ac9e5f260
Replaced illegal-number-of-channel assertions with run-time exception
1
void TDStretch::setChannels(int numChannels) { assert(numChannels > 0); if (channels == numChannels) return; // assert(numChannels == 1 || numChannels == 2); channels = numChannels; inputBuffer.setChannels(channels); outputBuffer.setChannels(channels); // re-init overlap/buffer ...
24,111,647,658,584,840,000,000,000,000,000,000,000
TDStretch.cpp
79,010,079,540,429,460,000,000,000,000,000,000,000
[ "CWE-617" ]
CVE-2018-14044
The RateTransposer::setChannels function in RateTransposer.cpp in libSoundTouch.a in Olli Parviainen SoundTouch 2.0 allows remote attackers to cause a denial of service (assertion failure and application exit), as demonstrated by SoundStretch.
https://nvd.nist.gov/vuln/detail/CVE-2018-14044
483,114
soundtouch
107f2c5d201a4dfea1b7f15c5957ff2ac9e5f260
https://gitlab.com/soundtouch/soundtouch
https://gitlab.com/soundtouch/soundtouch/commit/107f2c5d201a4dfea1b7f15c5957ff2ac9e5f260
Replaced illegal-number-of-channel assertions with run-time exception
0
void TDStretch::setChannels(int numChannels) { if (!verifyNumberOfChannels(numChannels) || (channels == numChannels)) return; channels = numChannels; inputBuffer.setChannels(channels); outputBuffer.setChannels(channels); // re-init overlap/buffer overlapLength=0; setPara...
228,113,203,474,812,570,000,000,000,000,000,000,000
TDStretch.cpp
252,965,583,043,166,150,000,000,000,000,000,000,000
[ "CWE-617" ]
CVE-2018-14044
The RateTransposer::setChannels function in RateTransposer.cpp in libSoundTouch.a in Olli Parviainen SoundTouch 2.0 allows remote attackers to cause a denial of service (assertion failure and application exit), as demonstrated by SoundStretch.
https://nvd.nist.gov/vuln/detail/CVE-2018-14044
215,078
libxml2
cbb271655cadeb8dbb258a64701d9a3a0c4835b4
https://github.com/GNOME/libxml2
https://git.gnome.org/browse/libxml2/commit/?id=cbb271655cadeb8dbb258a64701d9a3a0c4835b4
Bug 757711: heap-buffer-overflow in xmlFAParsePosCharGroup <https://bugzilla.gnome.org/show_bug.cgi?id=757711> * xmlregexp.c: (xmlFAParseCharRange): Only advance to the next character if there is no error. Advancing to the next character in case of an error while parsing regexp leads to an out of bounds access.
1
xmlFAParseCharRange(xmlRegParserCtxtPtr ctxt) { int cur, len; int start = -1; int end = -1; if (CUR == '\0') { ERROR("Expecting ']'"); return; } cur = CUR; if (cur == '\\') { NEXT; cur = CUR; switch (cur) { case 'n': start = 0xA; break; case 'r': start = 0xD; break; ...
124,166,455,534,811,980,000,000,000,000,000,000,000
xmlregexp.c
219,556,499,222,637,380,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-1840
Heap-based buffer overflow in the xmlFAParsePosCharGroup function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XML document.
https://nvd.nist.gov/vuln/detail/CVE-2016-1840
483,191
libxml2
cbb271655cadeb8dbb258a64701d9a3a0c4835b4
https://github.com/GNOME/libxml2
https://git.gnome.org/browse/libxml2/commit/?id=cbb271655cadeb8dbb258a64701d9a3a0c4835b4
Bug 757711: heap-buffer-overflow in xmlFAParsePosCharGroup <https://bugzilla.gnome.org/show_bug.cgi?id=757711> * xmlregexp.c: (xmlFAParseCharRange): Only advance to the next character if there is no error. Advancing to the next character in case of an error while parsing regexp leads to an out of bounds access.
0
xmlFAParseCharRange(xmlRegParserCtxtPtr ctxt) { int cur, len; int start = -1; int end = -1; if (CUR == '\0') { ERROR("Expecting ']'"); return; } cur = CUR; if (cur == '\\') { NEXT; cur = CUR; switch (cur) { case 'n': start = 0xA; break; case 'r': start = 0xD; break; ...
65,202,227,703,000,110,000,000,000,000,000,000,000
xmlregexp.c
260,942,153,090,602,760,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2016-1840
Heap-based buffer overflow in the xmlFAParsePosCharGroup function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XML document.
https://nvd.nist.gov/vuln/detail/CVE-2016-1840
215,080
linux
fcdf445ff42f036d22178b49cf64e92d527c1330
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/sunxi/linux.git/commit/?h=sunxi/clk-for-5.3&id=fcdf445ff42f036d22178b49cf64e92d527c1330
clk-sunxi: fix a missing-check bug in sunxi_divs_clk_setup() In sunxi_divs_clk_setup(), 'derived_name' is allocated by kstrndup(). It returns NULL when fails. 'derived_name' should be checked. Signed-off-by: Gen Zhang <blackgod016574@gmail.com> Signed-off-by: Maxime Ripard <maxime.ripard@bootlin.com>
1
static struct clk ** __init sunxi_divs_clk_setup(struct device_node *node, const struct divs_data *data) { struct clk_onecell_data *clk_data; const char *parent; const char *clk_name; struct clk **clks, *pclk; struct clk_hw *gate_hw, *rate_hw; const struct clk_ops *rate_ops; struct clk_gate *gate = NULL; ...
208,117,506,152,676,000,000,000,000,000,000,000,000
clk-sunxi.c
308,455,542,395,242,660,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2019-12455
An issue was discovered in sunxi_divs_clk_setup in drivers/clk/sunxi/clk-sunxi.c in the Linux kernel through 5.1.5. There is an unchecked kstrndup of derived_name, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash). NOTE: This id is disputed as not being an issue beca...
https://nvd.nist.gov/vuln/detail/CVE-2019-12455
483,312
linux
fcdf445ff42f036d22178b49cf64e92d527c1330
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/sunxi/linux.git/commit/?h=sunxi/clk-for-5.3&id=fcdf445ff42f036d22178b49cf64e92d527c1330
clk-sunxi: fix a missing-check bug in sunxi_divs_clk_setup() In sunxi_divs_clk_setup(), 'derived_name' is allocated by kstrndup(). It returns NULL when fails. 'derived_name' should be checked. Signed-off-by: Gen Zhang <blackgod016574@gmail.com> Signed-off-by: Maxime Ripard <maxime.ripard@bootlin.com>
0
static struct clk ** __init sunxi_divs_clk_setup(struct device_node *node, const struct divs_data *data) { struct clk_onecell_data *clk_data; const char *parent; const char *clk_name; struct clk **clks, *pclk; struct clk_hw *gate_hw, *rate_hw; const struct clk_ops *rate_ops; struct clk_gate *gate = NULL; ...
142,443,518,399,993,520,000,000,000,000,000,000,000
clk-sunxi.c
268,454,985,948,884,840,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2019-12455
An issue was discovered in sunxi_divs_clk_setup in drivers/clk/sunxi/clk-sunxi.c in the Linux kernel through 5.1.5. There is an unchecked kstrndup of derived_name, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash). NOTE: This id is disputed as not being an issue beca...
https://nvd.nist.gov/vuln/detail/CVE-2019-12455
215,086
poppler
de0c0b8324e776f0b851485e0fc9622fc35695b7
https://github.com/freedesktop/poppler
https://gitlab.freedesktop.org/poppler/poppler/commit/de0c0b8324e776f0b851485e0fc9622fc35695b7
FileSpec: Move the fileSpec.dictLookup call inside fileSpec.isDict if Fixes #704
1
FileSpec::FileSpec(const Object *fileSpecA) { ok = true; fileName = nullptr; platformFileName = nullptr; embFile = nullptr; desc = nullptr; fileSpec = fileSpecA->copy(); Object obj1 = getFileSpecName(fileSpecA); if (!obj1.isString()) { ok = false; error(errSyntaxError, -1, "Invalid FileSpec"); ...
157,741,892,590,712,320,000,000,000,000,000,000,000
FileSpec.cc
252,608,428,506,705,800,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2018-20650
A reachable Object::dictLookup assertion in Poppler 0.72.0 allows attackers to cause a denial of service due to the lack of a check for the dict data type, as demonstrated by use of the FileSpec class (in FileSpec.cc) in pdfdetach.
https://nvd.nist.gov/vuln/detail/CVE-2018-20650
483,354
poppler
de0c0b8324e776f0b851485e0fc9622fc35695b7
https://github.com/freedesktop/poppler
https://gitlab.freedesktop.org/poppler/poppler/commit/de0c0b8324e776f0b851485e0fc9622fc35695b7
FileSpec: Move the fileSpec.dictLookup call inside fileSpec.isDict if Fixes #704
0
FileSpec::FileSpec(const Object *fileSpecA) { ok = true; fileName = nullptr; platformFileName = nullptr; embFile = nullptr; desc = nullptr; fileSpec = fileSpecA->copy(); Object obj1 = getFileSpecName(fileSpecA); if (!obj1.isString()) { ok = false; error(errSyntaxError, -1, "Invalid FileSpec"); ...
94,655,079,616,036,550,000,000,000,000,000,000,000
FileSpec.cc
290,602,914,846,621,700,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2018-20650
A reachable Object::dictLookup assertion in Poppler 0.72.0 allows attackers to cause a denial of service due to the lack of a check for the dict data type, as demonstrated by use of the FileSpec class (in FileSpec.cc) in pdfdetach.
https://nvd.nist.gov/vuln/detail/CVE-2018-20650
215,091
ImageMagick6
ae71c12bbaa34d942e036824ff389c22b7dacade
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/ae71c12bbaa34d942e036824ff389c22b7dacade
https://github.com/ImageMagick/ImageMagick/issues/1178
1
static Image *ReadDIBImage(const ImageInfo *image_info,ExceptionInfo *exception) { DIBInfo dib_info; Image *image; IndexPacket index; ssize_t bit, y; MagickBooleanType status; MemoryInfo *pixel_info; register IndexPacket *indexes; register ssize_t x; registe...
145,832,176,005,584,440,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2018-12600
In ImageMagick 7.0.8-3 Q16, ReadDIBImage and WriteDIBImage in coders/dib.c allow attackers to cause an out of bounds write via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2018-12600
483,381
ImageMagick6
ae71c12bbaa34d942e036824ff389c22b7dacade
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/ae71c12bbaa34d942e036824ff389c22b7dacade
https://github.com/ImageMagick/ImageMagick/issues/1178
0
static Image *ReadDIBImage(const ImageInfo *image_info,ExceptionInfo *exception) { DIBInfo dib_info; Image *image; IndexPacket index; ssize_t bit, y; MagickBooleanType status; MemoryInfo *pixel_info; register IndexPacket *indexes; register ssize_t x; registe...
229,514,710,107,608,630,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2018-12600
In ImageMagick 7.0.8-3 Q16, ReadDIBImage and WriteDIBImage in coders/dib.c allow attackers to cause an out of bounds write via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2018-12600
215,092
ImageMagick6
ae71c12bbaa34d942e036824ff389c22b7dacade
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/ae71c12bbaa34d942e036824ff389c22b7dacade
https://github.com/ImageMagick/ImageMagick/issues/1178
1
static MagickBooleanType WriteDIBImage(const ImageInfo *image_info,Image *image) { DIBInfo dib_info; MagickBooleanType status; register const IndexPacket *indexes; register const PixelPacket *p; register ssize_t i, x; register unsigned char *q; size_t bytes_per_line; ...
326,438,810,160,561,700,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2018-12600
In ImageMagick 7.0.8-3 Q16, ReadDIBImage and WriteDIBImage in coders/dib.c allow attackers to cause an out of bounds write via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2018-12600
483,382
ImageMagick6
ae71c12bbaa34d942e036824ff389c22b7dacade
https://github.com/ImageMagick/ImageMagick6
https://github.com/ImageMagick/ImageMagick6/commit/ae71c12bbaa34d942e036824ff389c22b7dacade
https://github.com/ImageMagick/ImageMagick/issues/1178
0
static MagickBooleanType WriteDIBImage(const ImageInfo *image_info,Image *image) { DIBInfo dib_info; MagickBooleanType status; register const IndexPacket *indexes; register const PixelPacket *p; register ssize_t i, x; register unsigned char *q; size_t bytes_per_line; ...
84,405,334,593,838,990,000,000,000,000,000,000,000
None
null
[ "CWE-787" ]
CVE-2018-12600
In ImageMagick 7.0.8-3 Q16, ReadDIBImage and WriteDIBImage in coders/dib.c allow attackers to cause an out of bounds write via a crafted file.
https://nvd.nist.gov/vuln/detail/CVE-2018-12600
215,093
matio
5fa49ef9fc4368fe3d19b5fdaa36d8fa5e7f4606
https://github.com/tbeu/matio
https://github.com/tbeu/matio/commit/5fa49ef9fc4368fe3d19b5fdaa36d8fa5e7f4606
Fix integer addition overflow As reported by https://github.com/tbeu/matio/issues/121
1
ReadNextCell( mat_t *mat, matvar_t *matvar ) { size_t bytesread = 0, i; int err; matvar_t **cells = NULL; size_t nelems = 1; err = SafeMulDims(matvar, &nelems); if ( err ) { Mat_Critical("Integer multiplication overflow"); return bytesread; } matvar->data_size = sizeof(m...
320,473,313,246,009,480,000,000,000,000,000,000,000
None
null
[ "CWE-401" ]
CVE-2020-19497
Integer overflow vulnerability in Mat_VarReadNextInfo5 in mat5.c in tbeu matio (aka MAT File I/O Library) 1.5.17, allows attackers to cause a Denial of Service or possibly other unspecified impacts.
https://nvd.nist.gov/vuln/detail/CVE-2020-19497
483,405
matio
5fa49ef9fc4368fe3d19b5fdaa36d8fa5e7f4606
https://github.com/tbeu/matio
https://github.com/tbeu/matio/commit/5fa49ef9fc4368fe3d19b5fdaa36d8fa5e7f4606
Fix integer addition overflow As reported by https://github.com/tbeu/matio/issues/121
0
ReadNextCell( mat_t *mat, matvar_t *matvar ) { size_t bytesread = 0, i; int err; matvar_t **cells = NULL; size_t nelems = 1; err = SafeMulDims(matvar, &nelems); if ( err ) { Mat_Critical("Integer multiplication overflow"); return bytesread; } matvar->data_size = sizeof(m...
203,012,958,733,544,800,000,000,000,000,000,000,000
None
null
[ "CWE-401" ]
CVE-2020-19497
Integer overflow vulnerability in Mat_VarReadNextInfo5 in mat5.c in tbeu matio (aka MAT File I/O Library) 1.5.17, allows attackers to cause a Denial of Service or possibly other unspecified impacts.
https://nvd.nist.gov/vuln/detail/CVE-2020-19497
215,102
mutt
e5ed080c00e59701ca62ef9b2a6d2612ebf765a5
https://github.com/muttmua/mutt
https://gitlab.com/muttmua/mutt/-/commit/e5ed080c00e59701ca62ef9b2a6d2612ebf765a5
Fix uudecode buffer overflow. mutt_decode_uuencoded() used each line's initial "length character" without any validation. It would happily read past the end of the input line, and with a suitable value even past the length of the input buffer. As I noted in ticket 404, there are several other changes that could be a...
1
static void mutt_decode_uuencoded (STATE *s, LOFF_T len, int istext, iconv_t cd) { char tmps[SHORT_STRING]; char linelen, c, l, out; char *pt; char bufi[BUFI_SIZE]; size_t k = 0; if (istext) state_set_prefix(s); while (len > 0) { if ((fgets(tmps, sizeof(tmps), s->fpin)) == NULL) return; ...
232,974,963,633,672,270,000,000,000,000,000,000,000
handler.c
333,354,146,505,193,840,000,000,000,000,000,000,000
[ "CWE-120" ]
CVE-2022-1328
Buffer Overflow in uudecoder in Mutt affecting all versions starting from 0.94.13 before 2.2.3 allows read past end of input line
https://nvd.nist.gov/vuln/detail/CVE-2022-1328
483,448
mutt
e5ed080c00e59701ca62ef9b2a6d2612ebf765a5
https://github.com/muttmua/mutt
https://gitlab.com/muttmua/mutt/-/commit/e5ed080c00e59701ca62ef9b2a6d2612ebf765a5
Fix uudecode buffer overflow. mutt_decode_uuencoded() used each line's initial "length character" without any validation. It would happily read past the end of the input line, and with a suitable value even past the length of the input buffer. As I noted in ticket 404, there are several other changes that could be a...
0
static void mutt_decode_uuencoded (STATE *s, LOFF_T len, int istext, iconv_t cd) { char tmps[SHORT_STRING]; char linelen, c, l, out; char *pt; char bufi[BUFI_SIZE]; size_t k = 0; if (istext) state_set_prefix(s); while (len > 0) { if ((fgets(tmps, sizeof(tmps), s->fpin)) == NULL) return; ...
1,283,166,859,153,750,400,000,000,000,000,000,000
handler.c
206,374,361,492,276,470,000,000,000,000,000,000,000
[ "CWE-120" ]
CVE-2022-1328
Buffer Overflow in uudecoder in Mutt affecting all versions starting from 0.94.13 before 2.2.3 allows read past end of input line
https://nvd.nist.gov/vuln/detail/CVE-2022-1328
215,110
gnutls
1ffb827e45721ef56982d0ffd5c5de52376c428e
http://git.savannah.gnu.org/cgit/gnutls
https://gitlab.com/gnutls/gnutls/commit/1ffb827e45721ef56982d0ffd5c5de52376c428e
handshake: set a maximum number of warning messages that can be received per handshake That is to avoid DoS due to the assymetry of cost of sending an alert vs the cost of processing.
1
static void _gnutls_handshake_internal_state_init(gnutls_session_t session) { /* by default no selected certificate */ session->internals.adv_version_major = 0; session->internals.adv_version_minor = 0; session->internals.direction = 0; /* use out of band data for the last * handshake messages received. */ s...
103,871,125,033,811,470,000,000,000,000,000,000,000
state.c
15,224,094,478,379,342,000,000,000,000,000,000,000
[ "CWE-400" ]
CVE-2016-8610
A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections ...
https://nvd.nist.gov/vuln/detail/CVE-2016-8610
483,540
gnutls
1ffb827e45721ef56982d0ffd5c5de52376c428e
http://git.savannah.gnu.org/cgit/gnutls
https://gitlab.com/gnutls/gnutls/commit/1ffb827e45721ef56982d0ffd5c5de52376c428e
handshake: set a maximum number of warning messages that can be received per handshake That is to avoid DoS due to the assymetry of cost of sending an alert vs the cost of processing.
0
static void _gnutls_handshake_internal_state_init(gnutls_session_t session) { /* by default no selected certificate */ session->internals.adv_version_major = 0; session->internals.adv_version_minor = 0; session->internals.direction = 0; /* use out of band data for the last * handshake messages received. */ s...
119,013,547,627,522,470,000,000,000,000,000,000,000
state.c
120,336,938,162,589,420,000,000,000,000,000,000,000
[ "CWE-400" ]
CVE-2016-8610
A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections ...
https://nvd.nist.gov/vuln/detail/CVE-2016-8610
215,121
varnish-cache
406b583fe54634afd029e7a41e35b3cf9ccac28a
https://github.com/varnishcache/varnish-cache
https://github.com/varnishcache/varnish-cache/commit/406b583fe54634afd029e7a41e35b3cf9ccac28a
Avoid some code duplication Apply some adjustments to recent patches based off of review by Nils Goroll at UPLEX (@nigoroll)
1
http1_dissect_hdrs(struct http *hp, char *p, struct http_conn *htc, unsigned maxhdr) { char *q, *r, *s; int i; assert(p > htc->rxbuf_b); assert(p <= htc->rxbuf_e); hp->nhd = HTTP_HDR_FIRST; r = NULL; /* For FlexeLint */ for (; p < htc->rxbuf_e; p = r) { /* Find end of next header */ q = r = p; if (v...
3,543,734,317,563,929,600,000,000,000,000,000,000
cache_http1_proto.c
188,772,840,119,904,900,000,000,000,000,000,000,000
[ "CWE-617" ]
CVE-2019-15892
An issue was discovered in Varnish Cache before 6.0.4 LTS, and 6.1.x and 6.2.x before 6.2.1. An HTTP/1 parsing failure allows a remote attacker to trigger an assert by sending crafted HTTP/1 requests. The assert will cause an automatic restart with a clean cache, which makes it a Denial of Service attack.
https://nvd.nist.gov/vuln/detail/CVE-2019-15892
483,628
varnish-cache
406b583fe54634afd029e7a41e35b3cf9ccac28a
https://github.com/varnishcache/varnish-cache
https://github.com/varnishcache/varnish-cache/commit/406b583fe54634afd029e7a41e35b3cf9ccac28a
Avoid some code duplication Apply some adjustments to recent patches based off of review by Nils Goroll at UPLEX (@nigoroll)
0
http1_dissect_hdrs(struct http *hp, char *p, struct http_conn *htc, unsigned maxhdr) { char *q, *r, *s; int i; assert(p > htc->rxbuf_b); assert(p <= htc->rxbuf_e); hp->nhd = HTTP_HDR_FIRST; r = NULL; /* For FlexeLint */ for (; p < htc->rxbuf_e; p = r) { /* Find end of next header */ q = r = p; if (v...
40,183,141,729,507,527,000,000,000,000,000,000,000
cache_http1_proto.c
170,310,027,646,771,900,000,000,000,000,000,000,000
[ "CWE-617" ]
CVE-2019-15892
An issue was discovered in Varnish Cache before 6.0.4 LTS, and 6.1.x and 6.2.x before 6.2.1. An HTTP/1 parsing failure allows a remote attacker to trigger an assert by sending crafted HTTP/1 requests. The assert will cause an automatic restart with a clean cache, which makes it a Denial of Service attack.
https://nvd.nist.gov/vuln/detail/CVE-2019-15892
215,123
vim
4bf1006cae7e87259ccd5219128c3dba75774441
https://github.com/vim/vim
https://github.com/vim/vim/commit/4bf1006cae7e87259ccd5219128c3dba75774441
patch 8.2.3923: Vim9: double free with split argument list in nested function Problem: Vim9: double free if a nested function has a line break in the argument list. Solution: Set cmdlinep when freeing the previous line.
1
get_function_args( char_u **argp, char_u endchar, garray_T *newargs, garray_T *argtypes, // NULL unless using :def int types_optional, // types optional if "argtypes" is not NULL evalarg_T *evalarg, // context or NULL int *varargs, garray_T *default_args, int skip, exarg_T *ea...
202,508,356,734,573,500,000,000,000,000,000,000,000
userfunc.c
43,575,424,613,321,730,000,000,000,000,000,000,000
[ "CWE-415" ]
CVE-2021-4187
vim is vulnerable to Use After Free
https://nvd.nist.gov/vuln/detail/CVE-2021-4187
483,643
vim
4bf1006cae7e87259ccd5219128c3dba75774441
https://github.com/vim/vim
https://github.com/vim/vim/commit/4bf1006cae7e87259ccd5219128c3dba75774441
patch 8.2.3923: Vim9: double free with split argument list in nested function Problem: Vim9: double free if a nested function has a line break in the argument list. Solution: Set cmdlinep when freeing the previous line.
0
get_function_args( char_u **argp, char_u endchar, garray_T *newargs, garray_T *argtypes, // NULL unless using :def int types_optional, // types optional if "argtypes" is not NULL evalarg_T *evalarg, // context or NULL int *varargs, garray_T *default_args, int skip, exarg_T *ea...
45,032,406,596,684,400,000,000,000,000,000,000,000
userfunc.c
9,771,549,235,022,593,000,000,000,000,000,000,000
[ "CWE-415" ]
CVE-2021-4187
vim is vulnerable to Use After Free
https://nvd.nist.gov/vuln/detail/CVE-2021-4187
215,141
linux
2e7682ebfc750177a4944eeb56e97a3f05734528
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/2e7682ebfc750177a4944eeb56e97a3f05734528
media: tw5864: Fix possible NULL pointer dereference in tw5864_handle_frame 'vb' null check should be done before dereferencing it in tw5864_handle_frame, otherwise a NULL pointer dereference may occur. Fixes: 34d1324edd31 ("[media] pci: Add tw5864 driver") Signed-off-by: YueHaibing <yuehaibing@huawei.com> Signed-of...
1
static void tw5864_handle_frame(struct tw5864_h264_frame *frame) { #define SKIP_VLCBUF_BYTES 3 struct tw5864_input *input = frame->input; struct tw5864_dev *dev = input->root; struct tw5864_buf *vb; struct vb2_v4l2_buffer *v4l2_buf; int frame_len = frame->vlc_len - SKIP_VLCBUF_BYTES; u8 *dst = input->buf_cur_ptr;...
60,259,603,741,341,280,000,000,000,000,000,000,000
tw5864-video.c
267,462,176,924,897,800,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2019-20806
An issue was discovered in the Linux kernel before 5.2. There is a NULL pointer dereference in tw5864_handle_frame() in drivers/media/pci/tw5864/tw5864-video.c, which may cause denial of service, aka CID-2e7682ebfc75.
https://nvd.nist.gov/vuln/detail/CVE-2019-20806
484,026
linux
2e7682ebfc750177a4944eeb56e97a3f05734528
https://github.com/torvalds/linux
https://github.com/torvalds/linux/commit/2e7682ebfc750177a4944eeb56e97a3f05734528
media: tw5864: Fix possible NULL pointer dereference in tw5864_handle_frame 'vb' null check should be done before dereferencing it in tw5864_handle_frame, otherwise a NULL pointer dereference may occur. Fixes: 34d1324edd31 ("[media] pci: Add tw5864 driver") Signed-off-by: YueHaibing <yuehaibing@huawei.com> Signed-of...
0
static void tw5864_handle_frame(struct tw5864_h264_frame *frame) { #define SKIP_VLCBUF_BYTES 3 struct tw5864_input *input = frame->input; struct tw5864_dev *dev = input->root; struct tw5864_buf *vb; struct vb2_v4l2_buffer *v4l2_buf; int frame_len = frame->vlc_len - SKIP_VLCBUF_BYTES; u8 *dst = input->buf_cur_ptr;...
237,292,289,469,471,800,000,000,000,000,000,000,000
tw5864-video.c
280,087,043,525,067,180,000,000,000,000,000,000,000
[ "CWE-476" ]
CVE-2019-20806
An issue was discovered in the Linux kernel before 5.2. There is a NULL pointer dereference in tw5864_handle_frame() in drivers/media/pci/tw5864/tw5864-video.c, which may cause denial of service, aka CID-2e7682ebfc75.
https://nvd.nist.gov/vuln/detail/CVE-2019-20806
215,150
flatpak
a9107feeb4b8275b78965b36bf21b92d5724699e
https://github.com/flatpak/flatpak
https://github.com/flatpak/flatpak/commit/a9107feeb4b8275b78965b36bf21b92d5724699e
run: Only compare the lowest 32 ioctl arg bits for TIOCSTI Closes #2782. Closes: #2783 Approved by: alexlarsson
1
setup_seccomp (FlatpakBwrap *bwrap, const char *arch, gulong allowed_personality, FlatpakRunFlags run_flags, GError **error) { gboolean multiarch = (run_flags & FLATPAK_RUN_FLAG_MULTIARCH) != 0; gboolean devel = (run_flags & FLATPAK_R...
311,084,961,612,950,050,000,000,000,000,000,000,000
flatpak-run.c
206,797,236,890,961,600,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2019-10063
Flatpak before 1.0.8, 1.1.x and 1.2.x before 1.2.4, and 1.3.x before 1.3.1 allows a sandbox bypass. Flatpak versions since 0.8.1 address CVE-2017-5226 by using a seccomp filter to prevent sandboxed apps from using the TIOCSTI ioctl, which could otherwise be used to inject commands into the controlling terminal so that ...
https://nvd.nist.gov/vuln/detail/CVE-2019-10063
484,093
flatpak
a9107feeb4b8275b78965b36bf21b92d5724699e
https://github.com/flatpak/flatpak
https://github.com/flatpak/flatpak/commit/a9107feeb4b8275b78965b36bf21b92d5724699e
run: Only compare the lowest 32 ioctl arg bits for TIOCSTI Closes #2782. Closes: #2783 Approved by: alexlarsson
0
setup_seccomp (FlatpakBwrap *bwrap, const char *arch, gulong allowed_personality, FlatpakRunFlags run_flags, GError **error) { gboolean multiarch = (run_flags & FLATPAK_RUN_FLAG_MULTIARCH) != 0; gboolean devel = (run_flags & FLATPAK_R...
239,763,651,511,658,000,000,000,000,000,000,000,000
flatpak-run.c
125,169,058,813,264,820,000,000,000,000,000,000,000
[ "CWE-20" ]
CVE-2019-10063
Flatpak before 1.0.8, 1.1.x and 1.2.x before 1.2.4, and 1.3.x before 1.3.1 allows a sandbox bypass. Flatpak versions since 0.8.1 address CVE-2017-5226 by using a seccomp filter to prevent sandboxed apps from using the TIOCSTI ioctl, which could otherwise be used to inject commands into the controlling terminal so that ...
https://nvd.nist.gov/vuln/detail/CVE-2019-10063
215,161
linux
15753588bcd4bbffae1cca33c8ced5722477fe1f
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=15753588bcd4bbffae1cca33c8ced5722477fe1f
USB: gadget: fix illegal array access in binding with UDC FuzzUSB (a variant of syzkaller) found an illegal array access using an incorrect index while binding a gadget with UDC. Reference: https://www.spinics.net/lists/linux-usb/msg194331.html This bug occurs when a size variable used for a buffer is misused to acc...
1
static ssize_t gadget_dev_desc_UDC_store(struct config_item *item, const char *page, size_t len) { struct gadget_info *gi = to_gadget_info(item); char *name; int ret; name = kstrdup(page, GFP_KERNEL); if (!name) return -ENOMEM; if (name[len - 1] == '\n') name[len - 1] = '\0'; mutex_lock(&gi->lock); if ...
302,528,775,302,411,330,000,000,000,000,000,000,000
configfs.c
82,932,539,943,823,750,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2020-13143
gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c in the Linux kernel 3.16 through 5.6.13 relies on kstrdup without considering the possibility of an internal '\0' value, which allows attackers to trigger an out-of-bounds read, aka CID-15753588bcd4.
https://nvd.nist.gov/vuln/detail/CVE-2020-13143
484,293
linux
15753588bcd4bbffae1cca33c8ced5722477fe1f
https://github.com/torvalds/linux
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=15753588bcd4bbffae1cca33c8ced5722477fe1f
USB: gadget: fix illegal array access in binding with UDC FuzzUSB (a variant of syzkaller) found an illegal array access using an incorrect index while binding a gadget with UDC. Reference: https://www.spinics.net/lists/linux-usb/msg194331.html This bug occurs when a size variable used for a buffer is misused to acc...
0
static ssize_t gadget_dev_desc_UDC_store(struct config_item *item, const char *page, size_t len) { struct gadget_info *gi = to_gadget_info(item); char *name; int ret; if (strlen(page) < len) return -EOVERFLOW; name = kstrdup(page, GFP_KERNEL); if (!name) return -ENOMEM; if (name[len - 1] == '\n') name[...
187,017,406,438,343,360,000,000,000,000,000,000,000
configfs.c
11,055,741,175,899,895,000,000,000,000,000,000,000
[ "CWE-125" ]
CVE-2020-13143
gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c in the Linux kernel 3.16 through 5.6.13 relies on kstrdup without considering the possibility of an internal '\0' value, which allows attackers to trigger an out-of-bounds read, aka CID-15753588bcd4.
https://nvd.nist.gov/vuln/detail/CVE-2020-13143
215,163
mutt
4a2becbdb4422aaffe3ce314991b9d670b7adf17
https://github.com/muttmua/mutt
https://gitlab.com/muttmua/mutt/-/commit/4a2becbdb4422aaffe3ce314991b9d670b7adf17
Fix memory leak parsing group addresses without a display name. When there was a group address terminator with no previous addresses (including the group display-name), an address would be allocated but not attached to the address list. Change this to only allocate when last exists. It would be more correct to not a...
1
ADDRESS *rfc822_parse_adrlist (ADDRESS *top, const char *s) { int ws_pending, nl; #ifdef EXACT_ADDRESS const char *begin; #endif const char *ps; char comment[LONG_STRING], phrase[LONG_STRING]; size_t phraselen = 0, commentlen = 0; ADDRESS *cur, *last = NULL; RFC822Error = 0; last = top; while (last ...
49,064,898,484,247,990,000,000,000,000,000,000,000
rfc822.c
213,011,706,027,217,450,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2021-3181
rfc822.c in Mutt through 2.0.4 allows remote attackers to cause a denial of service (mailbox unavailability) by sending email messages with sequences of semicolon characters in RFC822 address fields (aka terminators of empty groups). A small email message from the attacker can cause large memory consumption, and the vi...
https://nvd.nist.gov/vuln/detail/CVE-2021-3181
484,319
mutt
4a2becbdb4422aaffe3ce314991b9d670b7adf17
https://github.com/muttmua/mutt
https://gitlab.com/muttmua/mutt/-/commit/4a2becbdb4422aaffe3ce314991b9d670b7adf17
Fix memory leak parsing group addresses without a display name. When there was a group address terminator with no previous addresses (including the group display-name), an address would be allocated but not attached to the address list. Change this to only allocate when last exists. It would be more correct to not a...
0
ADDRESS *rfc822_parse_adrlist (ADDRESS *top, const char *s) { int ws_pending, nl; #ifdef EXACT_ADDRESS const char *begin; #endif const char *ps; char comment[LONG_STRING], phrase[LONG_STRING]; size_t phraselen = 0, commentlen = 0; ADDRESS *cur, *last = NULL; RFC822Error = 0; last = top; while (last ...
38,537,979,631,427,800,000,000,000,000,000,000,000
rfc822.c
332,383,259,336,621,130,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2021-3181
rfc822.c in Mutt through 2.0.4 allows remote attackers to cause a denial of service (mailbox unavailability) by sending email messages with sequences of semicolon characters in RFC822 address fields (aka terminators of empty groups). A small email message from the attacker can cause large memory consumption, and the vi...
https://nvd.nist.gov/vuln/detail/CVE-2021-3181
215,178
linux-fs
62c9d2674b31d4c8a674bee86b7edc6da2803aea
https://git.kernel.org/pub/scm/linux/kernel/git/jack/linux-fs
https://git.kernel.org/pub/scm/linux/kernel/git/jack/linux-fs.git/commit/?h=fsnotify&id=62c9d2674b31d4c8a674bee86b7edc6da2803aea
inotify: Fix fsnotify_mark refcount leak in inotify_update_existing_watch() Commit 4d97f7d53da7dc83 ("inotify: Add flag IN_MASK_CREATE for inotify_add_watch()") forgot to call fsnotify_put_mark() with IN_MASK_CREATE after fsnotify_find_mark() Fixes: 4d97f7d53da7dc83 ("inotify: Add flag IN_MASK_CREATE for inotify_add_...
1
static int inotify_update_existing_watch(struct fsnotify_group *group, struct inode *inode, u32 arg) { struct fsnotify_mark *fsn_mark; struct inotify_inode_mark *i_mark; __u32 old_mask, new_mask; __u32 mask; int add = (arg & IN_MASK_ADD); int create = (arg & IN_MASK_CREATE); int ret; mask = inotify...
250,609,986,488,927,340,000,000,000,000,000,000,000
inotify_user.c
186,772,428,727,350,550,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2019-9857
In the Linux kernel through 5.0.2, the function inotify_update_existing_watch() in fs/notify/inotify/inotify_user.c neglects to call fsnotify_put_mark() with IN_MASK_CREATE after fsnotify_find_mark(), which will cause a memory leak (aka refcount leak). Finally, this will cause a denial of service.
https://nvd.nist.gov/vuln/detail/CVE-2019-9857
484,448
linux-fs
62c9d2674b31d4c8a674bee86b7edc6da2803aea
https://git.kernel.org/pub/scm/linux/kernel/git/jack/linux-fs
https://git.kernel.org/pub/scm/linux/kernel/git/jack/linux-fs.git/commit/?h=fsnotify&id=62c9d2674b31d4c8a674bee86b7edc6da2803aea
inotify: Fix fsnotify_mark refcount leak in inotify_update_existing_watch() Commit 4d97f7d53da7dc83 ("inotify: Add flag IN_MASK_CREATE for inotify_add_watch()") forgot to call fsnotify_put_mark() with IN_MASK_CREATE after fsnotify_find_mark() Fixes: 4d97f7d53da7dc83 ("inotify: Add flag IN_MASK_CREATE for inotify_add_...
0
static int inotify_update_existing_watch(struct fsnotify_group *group, struct inode *inode, u32 arg) { struct fsnotify_mark *fsn_mark; struct inotify_inode_mark *i_mark; __u32 old_mask, new_mask; __u32 mask; int add = (arg & IN_MASK_ADD); int create = (arg & IN_MASK_CREATE); int ret; mask = inotify...
175,866,897,815,871,200,000,000,000,000,000,000,000
inotify_user.c
306,836,280,845,659,140,000,000,000,000,000,000,000
[ "CWE-401" ]
CVE-2019-9857
In the Linux kernel through 5.0.2, the function inotify_update_existing_watch() in fs/notify/inotify/inotify_user.c neglects to call fsnotify_put_mark() with IN_MASK_CREATE after fsnotify_find_mark(), which will cause a memory leak (aka refcount leak). Finally, this will cause a denial of service.
https://nvd.nist.gov/vuln/detail/CVE-2019-9857
215,189
poppler
68ef84e5968a4249c2162b839ca6d7975048a557
https://github.com/freedesktop/poppler
https://gitlab.freedesktop.org/poppler/poppler/commit/68ef84e5968a4249c2162b839ca6d7975048a557
JPXStream::init: ignore dict Length if clearly broken Fixes issue #805
1
void JPXStream::init() { Object oLen, cspace, smaskInData; if (getDict()) { oLen = getDict()->lookup("Length"); cspace = getDict()->lookup("ColorSpace"); smaskInData = getDict()->lookup("SMaskInData"); } int bufSize = BUFFER_INITIAL_SIZE; if (oLen.isInt()) bufSize = oLen.getInt(); bool indexed...
72,380,917,231,821,780,000,000,000,000,000,000,000
JPEG2000Stream.cc
333,136,246,002,796,200,000,000,000,000,000,000,000
[ "CWE-190" ]
CVE-2019-9959
The JPXStream::init function in Poppler 0.78.0 and earlier doesn't check for negative values of stream length, leading to an Integer Overflow, thereby making it possible to allocate a large memory chunk on the heap, with a size controlled by an attacker, as demonstrated by pdftocairo.
https://nvd.nist.gov/vuln/detail/CVE-2019-9959