idx int64 | project string | commit_id string | project_url string | commit_url string | commit_message string | target int64 | func string | func_hash float64 | file_name string | file_hash float64 | cwe list | cve string | cve_desc string | nvd_url string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
476,860 | vim | 5f25c3855071bd7e26255c68bf458b1b5cf92f39 | https://github.com/vim/vim | https://github.com/vim/vim/commit/5f25c3855071bd7e26255c68bf458b1b5cf92f39 | patch 8.2.4049: Vim9: reading before the start of the line with "$"
Problem: Vim9: reading before the start of the line with "$" by itself.
Solution: Do not subtract one when reporting the error. | 0 | compile_get_env(char_u **arg, cctx_T *cctx)
{
char_u *start = *arg;
int len;
int ret;
char_u *name;
++*arg;
len = get_env_len(arg);
if (len == 0)
{
semsg(_(e_syntax_error_at_str), start);
return FAIL;
}
// include the '$' in the name, eval_env_var() expects it.
name = v... | 257,209,108,678,565,370,000,000,000,000,000,000,000 | vim9expr.c | 164,048,437,069,047,300,000,000,000,000,000,000,000 | [
"CWE-200"
] | CVE-2022-0158 | vim is vulnerable to Heap-based Buffer Overflow | https://nvd.nist.gov/vuln/detail/CVE-2022-0158 |
214,259 | zziplib | 596d9dfce2624e849417d4301e8d67935608aa5e | https://github.com/gdraheim/zziplib | https://github.com/gdraheim/zziplib/commit/596d9dfce2624e849417d4301e8d67935608aa5e | memdisk
(.) | 1 | zzip_disk_entry_fopen (ZZIP_DISK* disk, ZZIP_DISK_ENTRY* entry)
{
ZZIP_DISK_FILE* file = malloc(sizeof(ZZIP_DISK_FILE));
if (! file) return file;
file->buffer = disk->buffer;
file->endbuf = disk->endbuf;
file->header = zzip_disk_entry_to_file_header (disk, entry);
if (! file->header) { free (fil... | 53,190,543,793,020,170,000,000,000,000,000,000,000 | mmapped.c | 236,406,340,417,407,500,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-7725 | An issue was discovered in ZZIPlib 0.13.68. An invalid memory address dereference was discovered in zzip_disk_fread in mmapped.c. The vulnerability causes an application crash, which leads to denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2018-7725 |
476,914 | zziplib | 596d9dfce2624e849417d4301e8d67935608aa5e | https://github.com/gdraheim/zziplib | https://github.com/gdraheim/zziplib/commit/596d9dfce2624e849417d4301e8d67935608aa5e | memdisk
(.) | 0 | zzip_disk_entry_fopen (ZZIP_DISK* disk, ZZIP_DISK_ENTRY* entry)
{
/* keep this in sync with zzip_mem_entry_fopen */
struct zzip_file_header* header =
zzip_disk_entry_to_file_header (disk, entry);
if (! header) return 0;
___ ZZIP_DISK_FILE* file = malloc(sizeof(ZZIP_DISK_FILE));
if (! file) return ... | 20,504,559,051,998,193,000,000,000,000,000,000,000 | mmapped.c | 310,734,656,886,128,960,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-7725 | An issue was discovered in ZZIPlib 0.13.68. An invalid memory address dereference was discovered in zzip_disk_fread in mmapped.c. The vulnerability causes an application crash, which leads to denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2018-7725 |
214,275 | linux | 34fad54c2537f7c99d07375e50cb30aa3c23bd83 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=34fad54c2537f7c99d07375e50cb30aa3c23bd83 | net: __skb_flow_dissect() must cap its return value
After Tom patch, thoff field could point past the end of the buffer,
this could fool some callers.
If an skb was provided, skb->len should be the upper limit.
If not, hlen is supposed to be the upper limit.
Fixes: a6e544b0a88b ("flow_dissector: Jump to exit code in... | 1 | bool __skb_flow_dissect(const struct sk_buff *skb,
struct flow_dissector *flow_dissector,
void *target_container,
void *data, __be16 proto, int nhoff, int hlen,
unsigned int flags)
{
struct flow_dissector_key_control *key_control;
struct flow_dissector_key_basic *key_basic;
struct flow_dissector_key_addr... | 212,438,893,538,075,500,000,000,000,000,000,000,000 | flow_dissector.c | 63,968,026,408,982,840,000,000,000,000,000,000,000 | [
"CWE-665"
] | CVE-2017-13715 | The __skb_flow_dissect function in net/core/flow_dissector.c in the Linux kernel before 4.3 does not ensure that n_proto, ip_proto, and thoff are initialized, which allows remote attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a single crafted MPLS packet. | https://nvd.nist.gov/vuln/detail/CVE-2017-13715 |
477,258 | linux | 34fad54c2537f7c99d07375e50cb30aa3c23bd83 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=34fad54c2537f7c99d07375e50cb30aa3c23bd83 | net: __skb_flow_dissect() must cap its return value
After Tom patch, thoff field could point past the end of the buffer,
this could fool some callers.
If an skb was provided, skb->len should be the upper limit.
If not, hlen is supposed to be the upper limit.
Fixes: a6e544b0a88b ("flow_dissector: Jump to exit code in... | 0 | bool __skb_flow_dissect(const struct sk_buff *skb,
struct flow_dissector *flow_dissector,
void *target_container,
void *data, __be16 proto, int nhoff, int hlen,
unsigned int flags)
{
struct flow_dissector_key_control *key_control;
struct flow_dissector_key_basic *key_basic;
struct flow_dissector_key_addr... | 92,244,027,390,944,100,000,000,000,000,000,000,000 | flow_dissector.c | 313,500,628,847,460,800,000,000,000,000,000,000,000 | [
"CWE-665"
] | CVE-2017-13715 | The __skb_flow_dissect function in net/core/flow_dissector.c in the Linux kernel before 4.3 does not ensure that n_proto, ip_proto, and thoff are initialized, which allows remote attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a single crafted MPLS packet. | https://nvd.nist.gov/vuln/detail/CVE-2017-13715 |
214,277 | mosh | 9791768705528e911bfca6c4d8aa88139035060e | https://github.com/keithw/mosh | https://github.com/keithw/mosh/commit/9791768705528e911bfca6c4d8aa88139035060e | Cap escape sequence parameters to prevent long loops.
Fixes #271 github issue. | 1 | int Dispatcher::getparam( size_t N, int defaultval )
{
int ret = defaultval;
if ( !parsed ) {
parse_params();
}
if ( parsed_params.size() > N ) {
ret = parsed_params[ N ];
}
if ( ret < 1 ) ret = defaultval;
return ret;
} | 182,978,152,915,417,700,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2012-2385 | The terminal dispatcher in mosh before 1.2.1 allows remote authenticated users to cause a denial of service (long loop and CPU consumption) via an escape sequence with a large repeat count value. | https://nvd.nist.gov/vuln/detail/CVE-2012-2385 |
477,320 | mosh | 9791768705528e911bfca6c4d8aa88139035060e | https://github.com/keithw/mosh | https://github.com/keithw/mosh/commit/9791768705528e911bfca6c4d8aa88139035060e | Cap escape sequence parameters to prevent long loops.
Fixes #271 github issue. | 0 | int Dispatcher::getparam( size_t N, int defaultval )
{
int ret = defaultval;
if ( !parsed ) {
parse_params();
}
if ( parsed_params.size() > N ) {
ret = parsed_params[ N ];
}
if ( ret > PARAM_MAX ) {
ret = defaultval;
}
if ( ret < 1 ) ret = defaultval;
return ret;
} | 20,480,810,486,890,422,000,000,000,000,000,000,000 | None | null | [
"CWE-399"
] | CVE-2012-2385 | The terminal dispatcher in mosh before 1.2.1 allows remote authenticated users to cause a denial of service (long loop and CPU consumption) via an escape sequence with a large repeat count value. | https://nvd.nist.gov/vuln/detail/CVE-2012-2385 |
214,314 | linux | 29cd13cfd7624726d9e6becbae9aa419ef35af7f | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/29cd13cfd7624726d9e6becbae9aa419ef35af7f | drm/v3d: Fix memory leak in v3d_submit_cl_ioctl
In the impelementation of v3d_submit_cl_ioctl() there are two memory
leaks. One is when allocation for bin fails, and the other is when bin
initialization fails. If kcalloc fails to allocate memory for bin then
render->base should be put. Also, if v3d_job_init() fails to... | 1 | v3d_submit_cl_ioctl(struct drm_device *dev, void *data,
struct drm_file *file_priv)
{
struct v3d_dev *v3d = to_v3d_dev(dev);
struct v3d_file_priv *v3d_priv = file_priv->driver_priv;
struct drm_v3d_submit_cl *args = data;
struct v3d_bin_job *bin = NULL;
struct v3d_render_job *render;
struct ww_acquire_ctx ac... | 329,604,591,900,702,600,000,000,000,000,000,000,000 | v3d_gem.c | 41,664,191,997,744,506,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2019-19044 | Two memory leaks in the v3d_submit_cl_ioctl() function in drivers/gpu/drm/v3d/v3d_gem.c in the Linux kernel before 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering kcalloc() or v3d_job_init() failures, aka CID-29cd13cfd762. | https://nvd.nist.gov/vuln/detail/CVE-2019-19044 |
477,551 | linux | 29cd13cfd7624726d9e6becbae9aa419ef35af7f | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/29cd13cfd7624726d9e6becbae9aa419ef35af7f | drm/v3d: Fix memory leak in v3d_submit_cl_ioctl
In the impelementation of v3d_submit_cl_ioctl() there are two memory
leaks. One is when allocation for bin fails, and the other is when bin
initialization fails. If kcalloc fails to allocate memory for bin then
render->base should be put. Also, if v3d_job_init() fails to... | 0 | v3d_submit_cl_ioctl(struct drm_device *dev, void *data,
struct drm_file *file_priv)
{
struct v3d_dev *v3d = to_v3d_dev(dev);
struct v3d_file_priv *v3d_priv = file_priv->driver_priv;
struct drm_v3d_submit_cl *args = data;
struct v3d_bin_job *bin = NULL;
struct v3d_render_job *render;
struct ww_acquire_ctx ac... | 142,008,884,716,908,150,000,000,000,000,000,000,000 | v3d_gem.c | 183,402,124,914,399,230,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2019-19044 | Two memory leaks in the v3d_submit_cl_ioctl() function in drivers/gpu/drm/v3d/v3d_gem.c in the Linux kernel before 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering kcalloc() or v3d_job_init() failures, aka CID-29cd13cfd762. | https://nvd.nist.gov/vuln/detail/CVE-2019-19044 |
214,315 | libxml2 | 1358d157d0bd83be1dfe356a69213df9fac0b539 | https://github.com/GNOME/libxml2 | https://gitlab.gnome.org/GNOME/libxml2/-/commit/1358d157d0bd83be1dfe356a69213df9fac0b539 | Fix use-after-free with `xmllint --html --push`
Call htmlCtxtUseOptions to make sure that names aren't stored in
dictionaries.
Note that this issue only affects xmllint using the HTML push parser.
Fixes #230. | 1 | static void parseAndPrintFile(char *filename, xmlParserCtxtPtr rectxt) {
xmlDocPtr doc = NULL;
#ifdef LIBXML_TREE_ENABLED
xmlDocPtr tmp;
#endif /* LIBXML_TREE_ENABLED */
if ((timing) && (!repeat))
startTimer();
#ifdef LIBXML_TREE_ENABLED
if (filename == NULL) {
if (generate) {
xmlNodePtr n;
... | 192,030,719,533,557,420,000,000,000,000,000,000,000 | xmllint.c | 321,593,828,740,296,540,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2021-3516 | There's a flaw in libxml2's xmllint in versions before 2.9.11. An attacker who is able to submit a crafted file to be processed by xmllint could trigger a use-after-free. The greatest impact of this flaw is to confidentiality, integrity, and availability. | https://nvd.nist.gov/vuln/detail/CVE-2021-3516 |
477,576 | libxml2 | 1358d157d0bd83be1dfe356a69213df9fac0b539 | https://github.com/GNOME/libxml2 | https://gitlab.gnome.org/GNOME/libxml2/-/commit/1358d157d0bd83be1dfe356a69213df9fac0b539 | Fix use-after-free with `xmllint --html --push`
Call htmlCtxtUseOptions to make sure that names aren't stored in
dictionaries.
Note that this issue only affects xmllint using the HTML push parser.
Fixes #230. | 0 | static void parseAndPrintFile(char *filename, xmlParserCtxtPtr rectxt) {
xmlDocPtr doc = NULL;
#ifdef LIBXML_TREE_ENABLED
xmlDocPtr tmp;
#endif /* LIBXML_TREE_ENABLED */
if ((timing) && (!repeat))
startTimer();
#ifdef LIBXML_TREE_ENABLED
if (filename == NULL) {
if (generate) {
xmlNodePtr n;
... | 269,729,599,999,895,800,000,000,000,000,000,000,000 | xmllint.c | 279,047,775,947,551,670,000,000,000,000,000,000,000 | [
"CWE-416"
] | CVE-2021-3516 | There's a flaw in libxml2's xmllint in versions before 2.9.11. An attacker who is able to submit a crafted file to be processed by xmllint could trigger a use-after-free. The greatest impact of this flaw is to confidentiality, integrity, and availability. | https://nvd.nist.gov/vuln/detail/CVE-2021-3516 |
214,367 | linux | c70222752228a62135cee3409dccefd494a24646 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c70222752228a62135cee3409dccefd494a24646 | can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path
There is no need to call dev_kfree_skb() when usb_submit_urb() fails
beacause can_put_echo_skb() deletes the original skb and
can_free_echo_skb() deletes the cloned skb.
Link: https://lore.kernel.org/all/20220228083639.38183-1-hbh25y@gmail.c... | 1 | static netdev_tx_t ems_usb_start_xmit(struct sk_buff *skb, struct net_device *netdev)
{
struct ems_usb *dev = netdev_priv(netdev);
struct ems_tx_urb_context *context = NULL;
struct net_device_stats *stats = &netdev->stats;
struct can_frame *cf = (struct can_frame *)skb->data;
struct ems_cpc_msg *msg;
struct urb *... | 330,583,357,871,776,270,000,000,000,000,000,000,000 | None | null | [
"CWE-415"
] | CVE-2022-28390 | ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c in the Linux kernel through 5.17.1 has a double free. | https://nvd.nist.gov/vuln/detail/CVE-2022-28390 |
478,054 | linux | c70222752228a62135cee3409dccefd494a24646 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/c70222752228a62135cee3409dccefd494a24646 | can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path
There is no need to call dev_kfree_skb() when usb_submit_urb() fails
beacause can_put_echo_skb() deletes the original skb and
can_free_echo_skb() deletes the cloned skb.
Link: https://lore.kernel.org/all/20220228083639.38183-1-hbh25y@gmail.c... | 0 | static netdev_tx_t ems_usb_start_xmit(struct sk_buff *skb, struct net_device *netdev)
{
struct ems_usb *dev = netdev_priv(netdev);
struct ems_tx_urb_context *context = NULL;
struct net_device_stats *stats = &netdev->stats;
struct can_frame *cf = (struct can_frame *)skb->data;
struct ems_cpc_msg *msg;
struct urb *... | 207,614,801,499,095,950,000,000,000,000,000,000,000 | None | null | [
"CWE-415"
] | CVE-2022-28390 | ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c in the Linux kernel through 5.17.1 has a double free. | https://nvd.nist.gov/vuln/detail/CVE-2022-28390 |
214,368 | libvpx | 6a7c84a2449dcc70de2525df209afea908622399 | https://github.com/webmproject/libvpx | https://github.com/webmproject/libvpx/commit/6a7c84a2449dcc70de2525df209afea908622399 | update libwebm to libwebm-1.0.0.27-361-g81de00c
81de00c Check there is only one settings per ContentCompression
5623013 Fixes a double free in ContentEncoding
93b2ba0 mkvparser: quiet static analysis warnings
Change-Id: Ieaa562ef2f10075381bd856388e6b29f97ca2746 | 1 | long ContentEncoding::ParseContentEncodingEntry(long long start, long long size,
IMkvReader* pReader) {
assert(pReader);
long long pos = start;
const long long stop = start + size;
// Count ContentCompression and ContentEncryption elements.
int compression_cou... | 187,632,684,320,461,700,000,000,000,000,000,000,000 | mkvparser.cc | 120,349,953,275,244,100,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2019-2126 | In ParseContentEncodingEntry of mkvparser.cc, there is a possible double free due to a missing reset of a freed pointer. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android. Versions: Android-7.0 Android-7.1.1 Android-7.1... | https://nvd.nist.gov/vuln/detail/CVE-2019-2126 |
478,061 | libvpx | 6a7c84a2449dcc70de2525df209afea908622399 | https://github.com/webmproject/libvpx | https://github.com/webmproject/libvpx/commit/6a7c84a2449dcc70de2525df209afea908622399 | update libwebm to libwebm-1.0.0.27-361-g81de00c
81de00c Check there is only one settings per ContentCompression
5623013 Fixes a double free in ContentEncoding
93b2ba0 mkvparser: quiet static analysis warnings
Change-Id: Ieaa562ef2f10075381bd856388e6b29f97ca2746 | 0 | long ContentEncoding::ParseContentEncodingEntry(long long start, long long size,
IMkvReader* pReader) {
assert(pReader);
long long pos = start;
const long long stop = start + size;
// Count ContentCompression and ContentEncryption elements.
int compression_cou... | 335,917,546,323,438,120,000,000,000,000,000,000,000 | mkvparser.cc | 332,106,874,740,709,580,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2019-2126 | In ParseContentEncodingEntry of mkvparser.cc, there is a possible double free due to a missing reset of a freed pointer. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android. Versions: Android-7.0 Android-7.1.1 Android-7.1... | https://nvd.nist.gov/vuln/detail/CVE-2019-2126 |
214,370 | libvncserver | 79d938c16bf7a14b6d6ee290bcfef3c01f9c4f02 | https://github.com/LibVNC/libvncserver | https://github.com/LibVNC/libvncserver/commit/79d938c16bf7a14b6d6ee290bcfef3c01f9c4f02 | Avoid divide-by-zero in raw encoding (OSX RealVNC)
OS X RealVNC server crashes out Remmina because the server can provoke
bytesPerLine to be zero. Assume this is coding for zero lines.
The condition could be checked before the calculation of bytesPerLine.
I don’t understand the preconditions of this code to say one w... | 1 | HandleRFBServerMessage(rfbClient* client)
{
rfbServerToClientMsg msg;
if (client->serverPort==-1)
client->vncRec->readTimestamp = TRUE;
if (!ReadFromRFBServer(client, (char *)&msg, 1))
return FALSE;
switch (msg.type) {
case rfbSetColourMapEntries:
{
/* TODO:
int i;
uint16_t rgb[3];
... | 335,126,904,730,531,500,000,000,000,000,000,000,000 | rfbproto.c | 53,886,405,654,962,310,000,000,000,000,000,000,000 | [
"CWE-835"
] | CVE-2018-20021 | LibVNC before commit c3115350eb8bb635d0fdb4dbbb0d0541f38ed19c contains a CWE-835: Infinite loop vulnerability in VNC client code. Vulnerability allows attacker to consume excessive amount of resources like CPU and RAM | https://nvd.nist.gov/vuln/detail/CVE-2018-20021 |
478,063 | libvncserver | 79d938c16bf7a14b6d6ee290bcfef3c01f9c4f02 | https://github.com/LibVNC/libvncserver | https://github.com/LibVNC/libvncserver/commit/79d938c16bf7a14b6d6ee290bcfef3c01f9c4f02 | Avoid divide-by-zero in raw encoding (OSX RealVNC)
OS X RealVNC server crashes out Remmina because the server can provoke
bytesPerLine to be zero. Assume this is coding for zero lines.
The condition could be checked before the calculation of bytesPerLine.
I don’t understand the preconditions of this code to say one w... | 0 | HandleRFBServerMessage(rfbClient* client)
{
rfbServerToClientMsg msg;
if (client->serverPort==-1)
client->vncRec->readTimestamp = TRUE;
if (!ReadFromRFBServer(client, (char *)&msg, 1))
return FALSE;
switch (msg.type) {
case rfbSetColourMapEntries:
{
/* TODO:
int i;
uint16_t rgb[3];
... | 99,141,124,644,937,050,000,000,000,000,000,000,000 | rfbproto.c | 150,405,062,698,641,520,000,000,000,000,000,000,000 | [
"CWE-835"
] | CVE-2018-20021 | LibVNC before commit c3115350eb8bb635d0fdb4dbbb0d0541f38ed19c contains a CWE-835: Infinite loop vulnerability in VNC client code. Vulnerability allows attacker to consume excessive amount of resources like CPU and RAM | https://nvd.nist.gov/vuln/detail/CVE-2018-20021 |
214,404 | linux | 105cd17a866017b45f3c45901b394c711c97bf40 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/105cd17a866017b45f3c45901b394c711c97bf40 | bonding: fix null dereference in bond_ipsec_add_sa()
If bond doesn't have real device, bond->curr_active_slave is null.
But bond_ipsec_add_sa() dereferences bond->curr_active_slave without
null checking.
So, null-ptr-deref would occur.
Test commands:
ip link add bond0 type bond
ip link set bond0 up
ip x s... | 1 | static int bond_ipsec_add_sa(struct xfrm_state *xs)
{
struct net_device *bond_dev = xs->xso.dev;
struct bonding *bond;
struct slave *slave;
int err;
if (!bond_dev)
return -EINVAL;
rcu_read_lock();
bond = netdev_priv(bond_dev);
slave = rcu_dereference(bond->curr_active_slave);
xs->xso.real_dev = slave->dev;... | 190,467,436,386,782,060,000,000,000,000,000,000,000 | bond_main.c | 162,415,593,707,512,670,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2022-0286 | A flaw was found in the Linux kernel. A null pointer dereference in bond_ipsec_add_sa() may lead to local denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2022-0286 |
478,282 | linux | 105cd17a866017b45f3c45901b394c711c97bf40 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/105cd17a866017b45f3c45901b394c711c97bf40 | bonding: fix null dereference in bond_ipsec_add_sa()
If bond doesn't have real device, bond->curr_active_slave is null.
But bond_ipsec_add_sa() dereferences bond->curr_active_slave without
null checking.
So, null-ptr-deref would occur.
Test commands:
ip link add bond0 type bond
ip link set bond0 up
ip x s... | 0 | static int bond_ipsec_add_sa(struct xfrm_state *xs)
{
struct net_device *bond_dev = xs->xso.dev;
struct bonding *bond;
struct slave *slave;
int err;
if (!bond_dev)
return -EINVAL;
rcu_read_lock();
bond = netdev_priv(bond_dev);
slave = rcu_dereference(bond->curr_active_slave);
if (!slave) {
rcu_read_unloc... | 40,295,343,353,858,340,000,000,000,000,000,000,000 | bond_main.c | 78,003,466,394,787,870,000,000,000,000,000,000,000 | [
"CWE-703"
] | CVE-2022-0286 | A flaw was found in the Linux kernel. A null pointer dereference in bond_ipsec_add_sa() may lead to local denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2022-0286 |
214,439 | qemu | 2c0331f4f7d241995452b99afaf0aab00493334a | https://github.com/bonzini/qemu | http://git.qemu.org/?p=qemu.git;a=commitdiff;h=2c0331f4f7d241995452b99afaf0aab00493334a | e1000: Discard oversized packets based on SBP|LPE
Discard packets longer than 16384 when !SBP to match the hardware behavior.
Signed-off-by: Michael Contreras <michael@inetric.com>
Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com> | 1 | e1000_receive(NetClientState *nc, const uint8_t *buf, size_t size)
{
E1000State *s = DO_UPCAST(NICState, nc, nc)->opaque;
struct e1000_rx_desc desc;
dma_addr_t base;
unsigned int n, rdt;
uint32_t rdh_start;
uint16_t vlan_special = 0;
uint8_t vlan_status = 0, vlan_offset = 0;
uint8_t min_... | 64,213,774,448,939,070,000,000,000,000,000,000,000 | e1000.c | 35,251,203,576,719,170,000,000,000,000,000,000,000 | [
"CWE-120"
] | CVE-2012-6075 | Buffer overflow in the e1000_receive function in the e1000 device driver (hw/e1000.c) in QEMU 1.3.0-rc2 and other versions, when the SBP and LPE flags are disabled, allows remote attackers to cause a denial of service (guest OS crash) and possibly execute arbitrary guest code via a large packet. | https://nvd.nist.gov/vuln/detail/CVE-2012-6075 |
478,692 | qemu | 2c0331f4f7d241995452b99afaf0aab00493334a | https://github.com/bonzini/qemu | http://git.qemu.org/?p=qemu.git;a=commitdiff;h=2c0331f4f7d241995452b99afaf0aab00493334a | e1000: Discard oversized packets based on SBP|LPE
Discard packets longer than 16384 when !SBP to match the hardware behavior.
Signed-off-by: Michael Contreras <michael@inetric.com>
Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com> | 0 | e1000_receive(NetClientState *nc, const uint8_t *buf, size_t size)
{
E1000State *s = DO_UPCAST(NICState, nc, nc)->opaque;
struct e1000_rx_desc desc;
dma_addr_t base;
unsigned int n, rdt;
uint32_t rdh_start;
uint16_t vlan_special = 0;
uint8_t vlan_status = 0, vlan_offset = 0;
uint8_t min_... | 43,807,800,561,686,550,000,000,000,000,000,000,000 | e1000.c | 318,583,444,413,112,660,000,000,000,000,000,000,000 | [
"CWE-120"
] | CVE-2012-6075 | Buffer overflow in the e1000_receive function in the e1000 device driver (hw/e1000.c) in QEMU 1.3.0-rc2 and other versions, when the SBP and LPE flags are disabled, allows remote attackers to cause a denial of service (guest OS crash) and possibly execute arbitrary guest code via a large packet. | https://nvd.nist.gov/vuln/detail/CVE-2012-6075 |
214,440 | FreeRDP | 6d86e20e1e7caaab4f0c7f89e36d32914dbccc52 | https://github.com/FreeRDP/FreeRDP | https://github.com/FreeRDP/FreeRDP/commit/6d86e20e1e7caaab4f0c7f89e36d32914dbccc52 | Fixed double free | 1 | int shadow_server_start(rdpShadowServer* server)
{
BOOL ipc;
BOOL status;
WSADATA wsaData;
if (!server)
return -1;
if (WSAStartup(MAKEWORD(2, 2), &wsaData) != 0)
return -1;
#ifndef _WIN32
signal(SIGPIPE, SIG_IGN);
#endif
server->screen = shadow_screen_new(server);
if (!server->screen)
{
WLog_ERR(TAG,... | 9,028,529,983,749,820,000,000,000,000,000,000,000 | None | null | [
"CWE-703"
] | CVE-2020-4031 | In FreeRDP before version 2.1.2, there is a use-after-free in gdi_SelectObject. All FreeRDP clients using compatibility mode with /relax-order-checks are affected. This is fixed in version 2.1.2. | https://nvd.nist.gov/vuln/detail/CVE-2020-4031 |
478,733 | FreeRDP | 6d86e20e1e7caaab4f0c7f89e36d32914dbccc52 | https://github.com/FreeRDP/FreeRDP | https://github.com/FreeRDP/FreeRDP/commit/6d86e20e1e7caaab4f0c7f89e36d32914dbccc52 | Fixed double free | 0 | int shadow_server_start(rdpShadowServer* server)
{
BOOL ipc;
BOOL status;
WSADATA wsaData;
if (!server)
return -1;
if (WSAStartup(MAKEWORD(2, 2), &wsaData) != 0)
return -1;
#ifndef _WIN32
signal(SIGPIPE, SIG_IGN);
#endif
server->screen = shadow_screen_new(server);
if (!server->screen)
{
WLog_ERR(TAG,... | 331,463,368,657,774,570,000,000,000,000,000,000,000 | None | null | [
"CWE-703"
] | CVE-2020-4031 | In FreeRDP before version 2.1.2, there is a use-after-free in gdi_SelectObject. All FreeRDP clients using compatibility mode with /relax-order-checks are affected. This is fixed in version 2.1.2. | https://nvd.nist.gov/vuln/detail/CVE-2020-4031 |
214,449 | util-linux | 0377ef91270d06592a0d4dd009c29e7b1ff9c9b8 | https://github.com/karelzak/util-linux | http://git.kernel.org/?p=utils/util-linux/util-linux.git;a=commit;h=0377ef91270d06592a0d4dd009c29e7b1ff9c9b8 | mount: (deprecated) drop --guess-fstype
The option is undocumented and unnecessary.
Signed-off-by: Karel Zak <kzak@redhat.com> | 1 | main(int argc, char *argv[]) {
int c, result = 0, specseen;
char *options = NULL, *test_opts = NULL, *node;
const char *spec = NULL;
char *label = NULL;
char *uuid = NULL;
char *types = NULL;
char *p;
struct mntentchn *mc;
int fd;
sanitize_env();
setlocale(LC_ALL, "");
bindtextdomain(PACKAGE, LOCALEDIR);
... | 324,356,410,810,513,450,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2013-0157 | (a) mount and (b) umount in util-linux 2.14.1, 2.17.2, and probably other versions allow local users to determine the existence of restricted directories by (1) using the --guess-fstype command-line option or (2) attempting to mount a non-existent device, which generates different error messages depending on whether th... | https://nvd.nist.gov/vuln/detail/CVE-2013-0157 |
478,742 | util-linux | 0377ef91270d06592a0d4dd009c29e7b1ff9c9b8 | https://github.com/karelzak/util-linux | http://git.kernel.org/?p=utils/util-linux/util-linux.git;a=commit;h=0377ef91270d06592a0d4dd009c29e7b1ff9c9b8 | mount: (deprecated) drop --guess-fstype
The option is undocumented and unnecessary.
Signed-off-by: Karel Zak <kzak@redhat.com> | 0 | main(int argc, char *argv[]) {
int c, result = 0, specseen;
char *options = NULL, *test_opts = NULL, *node;
const char *spec = NULL;
char *label = NULL;
char *uuid = NULL;
char *types = NULL;
char *p;
struct mntentchn *mc;
int fd;
sanitize_env();
setlocale(LC_ALL, "");
bindtextdomain(PACKAGE, LOCALEDIR);
... | 4,236,598,480,908,814,000,000,000,000,000,000,000 | None | null | [
"CWE-200"
] | CVE-2013-0157 | (a) mount and (b) umount in util-linux 2.14.1, 2.17.2, and probably other versions allow local users to determine the existence of restricted directories by (1) using the --guess-fstype command-line option or (2) attempting to mount a non-existent device, which generates different error messages depending on whether th... | https://nvd.nist.gov/vuln/detail/CVE-2013-0157 |
214,495 | libgxps | 133fe2a96e020d4ca65c6f64fb28a404050ebbfd | https://github.com/GNOME/libgxps | https://git.gnome.org/browse/libgxps/commit/?id=133fe2a96e020d4ca65c6f64fb28a404050ebbfd | gxps-archive: Handle errors returned by archive_read_data | 1 | gxps_archive_input_stream_read (GInputStream *stream,
void *buffer,
gsize count,
GCancellable *cancellable,
GError **error)
{
GXPSArchiveInputStream *istream = GXPS_ARCHIVE_INPUT_STREAM (stream);
gssize bytes_read;
if (g_cancellable_set_error_if_canc... | 185,546,597,371,139,940,000,000,000,000,000,000,000 | gxps-archive.c | 228,445,427,647,594,200,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-10733 | There is a heap-based buffer over-read in the function ft_font_face_hash of gxps-fonts.c in libgxps through 0.3.0. A crafted input will lead to a remote denial of service attack. | https://nvd.nist.gov/vuln/detail/CVE-2018-10733 |
479,417 | libgxps | 133fe2a96e020d4ca65c6f64fb28a404050ebbfd | https://github.com/GNOME/libgxps | https://git.gnome.org/browse/libgxps/commit/?id=133fe2a96e020d4ca65c6f64fb28a404050ebbfd | gxps-archive: Handle errors returned by archive_read_data | 0 | gxps_archive_input_stream_read (GInputStream *stream,
void *buffer,
gsize count,
GCancellable *cancellable,
GError **error)
{
GXPSArchiveInputStream *istream = GXPS_ARCHIVE_INPUT_STREAM (stream);
gssize bytes_read;
if (g_cancellable_set_error_if_canc... | 265,721,655,036,071,470,000,000,000,000,000,000,000 | gxps-archive.c | 240,163,413,052,202,900,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2018-10733 | There is a heap-based buffer over-read in the function ft_font_face_hash of gxps-fonts.c in libgxps through 0.3.0. A crafted input will lead to a remote denial of service attack. | https://nvd.nist.gov/vuln/detail/CVE-2018-10733 |
214,498 | linux | 8cdb5240ec5928b20490a2bb34cb87e9a5f40226 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cdb5240ec5928b20490a2bb34cb87e9a5f40226 | ext4: never move the system.data xattr out of the inode body
When expanding the extra isize space, we must never move the
system.data xattr out of the inode body. For performance reasons, it
doesn't make any sense, and the inline data implementation assumes
that system.data xattr is never in the external xattr block.... | 1 | static int ext4_xattr_make_inode_space(handle_t *handle, struct inode *inode,
struct ext4_inode *raw_inode,
int isize_diff, size_t ifree,
size_t bfree, int *total_ino)
{
struct ext4_xattr_ibody_header *header = IHDR(inode, raw_inode);
struct ext4_xattr_entry *small_entry;
struct ext4... | 284,278,976,097,378,770,000,000,000,000,000,000,000 | xattr.c | 286,039,824,774,724,880,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2018-10880 | Linux kernel is vulnerable to a stack-out-of-bounds write in the ext4 filesystem code when mounting and writing to a crafted ext4 image in ext4_update_inline_data(). An attacker could use this to cause a system crash and a denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2018-10880 |
479,425 | linux | 8cdb5240ec5928b20490a2bb34cb87e9a5f40226 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8cdb5240ec5928b20490a2bb34cb87e9a5f40226 | ext4: never move the system.data xattr out of the inode body
When expanding the extra isize space, we must never move the
system.data xattr out of the inode body. For performance reasons, it
doesn't make any sense, and the inline data implementation assumes
that system.data xattr is never in the external xattr block.... | 0 | static int ext4_xattr_make_inode_space(handle_t *handle, struct inode *inode,
struct ext4_inode *raw_inode,
int isize_diff, size_t ifree,
size_t bfree, int *total_ino)
{
struct ext4_xattr_ibody_header *header = IHDR(inode, raw_inode);
struct ext4_xattr_entry *small_entry;
struct ext4... | 334,970,164,567,658,920,000,000,000,000,000,000,000 | xattr.c | 256,578,085,620,066,300,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2018-10880 | Linux kernel is vulnerable to a stack-out-of-bounds write in the ext4 filesystem code when mounting and writing to a crafted ext4 image in ext4_update_inline_data(). An attacker could use this to cause a system crash and a denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2018-10880 |
214,499 | linux | 9d5564ddcf2a0f5ba3fa1c3a1f8a1b59ad309553 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9d5564ddcf2a0f5ba3fa1c3a1f8a1b59ad309553 | bpf: fix inner map masking to prevent oob under speculation
During review I noticed that inner meta map setup for map in
map is buggy in that it does not propagate all needed data
from the reference map which the verifier is later accessing.
In particular one such case is index masking to prevent out of
bounds access... | 1 | struct bpf_map *bpf_map_meta_alloc(int inner_map_ufd)
{
struct bpf_map *inner_map, *inner_map_meta;
struct fd f;
f = fdget(inner_map_ufd);
inner_map = __bpf_map_get(f);
if (IS_ERR(inner_map))
return inner_map;
/* prog_array->owner_prog_type and owner_jited
* is a runtime binding. Doing static check alone
... | 318,582,213,548,109,400,000,000,000,000,000,000,000 | map_in_map.c | 298,169,888,900,582,680,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2019-7308 | kernel/bpf/verifier.c in the Linux kernel before 4.20.6 performs undesirable out-of-bounds speculation on pointer arithmetic in various cases, including cases of different branches with different state or limits to sanitize, leading to side-channel attacks. | https://nvd.nist.gov/vuln/detail/CVE-2019-7308 |
479,426 | linux | 9d5564ddcf2a0f5ba3fa1c3a1f8a1b59ad309553 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9d5564ddcf2a0f5ba3fa1c3a1f8a1b59ad309553 | bpf: fix inner map masking to prevent oob under speculation
During review I noticed that inner meta map setup for map in
map is buggy in that it does not propagate all needed data
from the reference map which the verifier is later accessing.
In particular one such case is index masking to prevent out of
bounds access... | 0 | struct bpf_map *bpf_map_meta_alloc(int inner_map_ufd)
{
struct bpf_map *inner_map, *inner_map_meta;
u32 inner_map_meta_size;
struct fd f;
f = fdget(inner_map_ufd);
inner_map = __bpf_map_get(f);
if (IS_ERR(inner_map))
return inner_map;
/* prog_array->owner_prog_type and owner_jited
* is a runtime binding. ... | 295,883,215,608,576,200,000,000,000,000,000,000,000 | map_in_map.c | 172,685,935,902,656,280,000,000,000,000,000,000,000 | [
"CWE-189"
] | CVE-2019-7308 | kernel/bpf/verifier.c in the Linux kernel before 4.20.6 performs undesirable out-of-bounds speculation on pointer arithmetic in various cases, including cases of different branches with different state or limits to sanitize, leading to side-channel attacks. | https://nvd.nist.gov/vuln/detail/CVE-2019-7308 |
214,585 | ImageMagick | f391a5f4554fe47eb56d6277ac32d1f698572f0e | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/f391a5f4554fe47eb56d6277ac32d1f698572f0e#diff-cf9d65fe4015faf1a06ee963cd3166bf | https://github.com/ImageMagick/ImageMagick/issues/1531 | 1 | static Image *ReadDPSImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
const char
*client_name;
Display
*display;
float
pixels_per_point;
Image
*image;
int
sans,
status;
Pixmap
pixmap;
register ssize_t
i;
register Quantum
*q;
register size_t
... | 244,899,271,484,598,800,000,000,000,000,000,000,000 | dps.c | 154,564,406,484,208,690,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2019-16709 | ImageMagick 7.0.8-35 has a memory leak in coders/dps.c, as demonstrated by XCreateImage. | https://nvd.nist.gov/vuln/detail/CVE-2019-16709 |
479,513 | ImageMagick | f391a5f4554fe47eb56d6277ac32d1f698572f0e | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/f391a5f4554fe47eb56d6277ac32d1f698572f0e#diff-cf9d65fe4015faf1a06ee963cd3166bf | https://github.com/ImageMagick/ImageMagick/issues/1531 | 0 | static Image *ReadDPSImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
const char
*client_name;
Display
*display;
float
pixels_per_point;
Image
*image;
int
sans,
status;
Pixmap
pixmap;
register ssize_t
i;
register Quantum
*q;
register size_t
... | 126,651,454,921,426,850,000,000,000,000,000,000,000 | dps.c | 13,104,856,822,069,393,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2019-16709 | ImageMagick 7.0.8-35 has a memory leak in coders/dps.c, as demonstrated by XCreateImage. | https://nvd.nist.gov/vuln/detail/CVE-2019-16709 |
214,908 | linux | 89c6efa61f5709327ecfa24bff18e57a4e80c7fa | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=89c6efa61f5709327ecfa24bff18e57a4e80c7fa | i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA
On a I2C_SMBUS_I2C_BLOCK_DATA read request, if data->block[0] is
greater than I2C_SMBUS_BLOCK_MAX + 1, the underlying I2C driver writes
data out of the msgbuf1 array boundary.
It is possible from a user application to run into that issue by
calling the ... | 1 | static s32 i2c_smbus_xfer_emulated(struct i2c_adapter *adapter, u16 addr,
unsigned short flags,
char read_write, u8 command, int size,
union i2c_smbus_data *data)
{
/* So we need to generate a series of msgs. In the case of writing, we
need to use only one message; when reading, we need two. We... | 117,497,833,871,606,080,000,000,000,000,000,000,000 | i2c-core-smbus.c | 164,582,100,041,356,790,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2017-18551 | An issue was discovered in drivers/i2c/i2c-core-smbus.c in the Linux kernel before 4.14.15. There is an out of bounds write in the function i2c_smbus_xfer_emulated. | https://nvd.nist.gov/vuln/detail/CVE-2017-18551 |
481,252 | linux | 89c6efa61f5709327ecfa24bff18e57a4e80c7fa | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=89c6efa61f5709327ecfa24bff18e57a4e80c7fa | i2c: core-smbus: prevent stack corruption on read I2C_BLOCK_DATA
On a I2C_SMBUS_I2C_BLOCK_DATA read request, if data->block[0] is
greater than I2C_SMBUS_BLOCK_MAX + 1, the underlying I2C driver writes
data out of the msgbuf1 array boundary.
It is possible from a user application to run into that issue by
calling the ... | 0 | static s32 i2c_smbus_xfer_emulated(struct i2c_adapter *adapter, u16 addr,
unsigned short flags,
char read_write, u8 command, int size,
union i2c_smbus_data *data)
{
/* So we need to generate a series of msgs. In the case of writing, we
need to use only one message; when reading, we need two. We... | 328,369,013,145,734,180,000,000,000,000,000,000,000 | i2c-core-smbus.c | 114,483,254,206,912,120,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2017-18551 | An issue was discovered in drivers/i2c/i2c-core-smbus.c in the Linux kernel before 4.14.15. There is an out of bounds write in the function i2c_smbus_xfer_emulated. | https://nvd.nist.gov/vuln/detail/CVE-2017-18551 |
214,910 | file | e96f86b5311572be1360ee0bb05d4926f8df3189 | https://github.com/file/file | https://github.com/file/file/commit/e96f86b5311572be1360ee0bb05d4926f8df3189 | Fix incorrect bounds check, from Alexander Cherepanov | 1 | file_printable(char *buf, size_t bufsiz, const char *str)
{
char *ptr, *eptr;
const unsigned char *s = (const unsigned char *)str;
for (ptr = buf, eptr = ptr + bufsiz - 1; ptr < eptr && *s; s++) {
if (isprint(*s)) {
*ptr++ = *s;
continue;
}
if (ptr >= eptr + 4)
break;
*ptr++ = '\\';
*ptr++ = ((*s... | 304,768,706,412,692,000,000,000,000,000,000,000,000 | funcs.c | 15,602,738,421,598,113,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2014-9653 | readelf.c in file before 5.22, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not consider that pread calls sometimes read only a subset of the available data, which allows remote attackers to cause a denial of service (uninitialized memory access) or possibly ... | https://nvd.nist.gov/vuln/detail/CVE-2014-9653 |
481,292 | file | e96f86b5311572be1360ee0bb05d4926f8df3189 | https://github.com/file/file | https://github.com/file/file/commit/e96f86b5311572be1360ee0bb05d4926f8df3189 | Fix incorrect bounds check, from Alexander Cherepanov | 0 | file_printable(char *buf, size_t bufsiz, const char *str)
{
char *ptr, *eptr;
const unsigned char *s = (const unsigned char *)str;
for (ptr = buf, eptr = ptr + bufsiz - 1; ptr < eptr && *s; s++) {
if (isprint(*s)) {
*ptr++ = *s;
continue;
}
if (ptr >= eptr - 3)
break;
*ptr++ = '\\';
*ptr++ = ((*s... | 29,628,692,809,084,740,000,000,000,000,000,000,000 | funcs.c | 247,884,554,659,100,300,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2014-9653 | readelf.c in file before 5.22, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not consider that pread calls sometimes read only a subset of the available data, which allows remote attackers to cause a denial of service (uninitialized memory access) or possibly ... | https://nvd.nist.gov/vuln/detail/CVE-2014-9653 |
214,927 | ImageMagick | 7d8e14899c562157c7760a77fc91625a27cb596f | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/7d8e14899c562157c7760a77fc91625a27cb596f | https://github.com/ImageMagick/ImageMagick/issues/771 | 1 | static Image *ReadCAPTIONImage(const ImageInfo *image_info,
ExceptionInfo *exception)
{
char
*caption,
geometry[MagickPathExtent],
*property,
*text;
const char
*gravity,
*option;
DrawInfo
*draw_info;
Image
*image;
MagickBooleanType
split,
status;
register ssize... | 331,933,823,204,073,200,000,000,000,000,000,000,000 | caption.c | 272,478,956,405,977,950,000,000,000,000,000,000,000 | [
"CWE-835"
] | CVE-2017-14741 | The ReadCAPTIONImage function in coders/caption.c in ImageMagick 7.0.7-3 allows remote attackers to cause a denial of service (infinite loop) via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2017-14741 |
481,507 | ImageMagick | 7d8e14899c562157c7760a77fc91625a27cb596f | https://github.com/ImageMagick/ImageMagick | https://github.com/ImageMagick/ImageMagick/commit/7d8e14899c562157c7760a77fc91625a27cb596f | https://github.com/ImageMagick/ImageMagick/issues/771 | 0 | static Image *ReadCAPTIONImage(const ImageInfo *image_info,
ExceptionInfo *exception)
{
char
*caption,
geometry[MagickPathExtent],
*property,
*text;
const char
*gravity,
*option;
DrawInfo
*draw_info;
Image
*image;
MagickBooleanType
split,
status;
register ssize... | 16,743,109,672,898,780,000,000,000,000,000,000,000 | caption.c | 314,715,677,703,200,700,000,000,000,000,000,000,000 | [
"CWE-835"
] | CVE-2017-14741 | The ReadCAPTIONImage function in coders/caption.c in ImageMagick 7.0.7-3 allows remote attackers to cause a denial of service (infinite loop) via a crafted font file. | https://nvd.nist.gov/vuln/detail/CVE-2017-14741 |
214,928 | qemu | edfe2eb4360cde4ed5d95bda7777edcb3510f76a | https://github.com/bonzini/qemu | https://gitlab.com/qemu-project/qemu/-/commit/edfe2eb4360cde4ed5d95bda7777edcb3510f76a | hw/intc/arm_gic: Fix interrupt ID in GICD_SGIR register
Per the ARM Generic Interrupt Controller Architecture specification
(document "ARM IHI 0048B.b (ID072613)"), the SGIINTID field is 4 bit,
not 10:
- 4.3 Distributor register descriptions
- 4.3.15 Software Generated Interrupt Register, GICD_SG
- Table 4-2... | 1 | static void gic_dist_writel(void *opaque, hwaddr offset,
uint32_t value, MemTxAttrs attrs)
{
GICState *s = (GICState *)opaque;
if (offset == 0xf00) {
int cpu;
int irq;
int mask;
int target_cpu;
cpu = gic_get_current_cpu(s);
irq = value... | 132,067,759,549,354,470,000,000,000,000,000,000,000 | arm_gic.c | 305,923,038,534,678,380,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2021-20221 | An out-of-bounds heap buffer access issue was found in the ARM Generic Interrupt Controller emulator of QEMU up to and including qemu 4.2.0on aarch64 platform. The issue occurs because while writing an interrupt ID to the controller memory area, it is not masked to be 4 bits wide. It may lead to the said issue while up... | https://nvd.nist.gov/vuln/detail/CVE-2021-20221 |
481,550 | qemu | edfe2eb4360cde4ed5d95bda7777edcb3510f76a | https://github.com/bonzini/qemu | https://gitlab.com/qemu-project/qemu/-/commit/edfe2eb4360cde4ed5d95bda7777edcb3510f76a | hw/intc/arm_gic: Fix interrupt ID in GICD_SGIR register
Per the ARM Generic Interrupt Controller Architecture specification
(document "ARM IHI 0048B.b (ID072613)"), the SGIINTID field is 4 bit,
not 10:
- 4.3 Distributor register descriptions
- 4.3.15 Software Generated Interrupt Register, GICD_SG
- Table 4-2... | 0 | static void gic_dist_writel(void *opaque, hwaddr offset,
uint32_t value, MemTxAttrs attrs)
{
GICState *s = (GICState *)opaque;
if (offset == 0xf00) {
int cpu;
int irq;
int mask;
int target_cpu;
cpu = gic_get_current_cpu(s);
irq = value... | 163,930,661,767,044,060,000,000,000,000,000,000,000 | arm_gic.c | 183,077,475,739,425,550,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2021-20221 | An out-of-bounds heap buffer access issue was found in the ARM Generic Interrupt Controller emulator of QEMU up to and including qemu 4.2.0on aarch64 platform. The issue occurs because while writing an interrupt ID to the controller memory area, it is not masked to be 4 bits wide. It may lead to the said issue while up... | https://nvd.nist.gov/vuln/detail/CVE-2021-20221 |
214,931 | linux | 30a8beeb3042f49d0537b7050fd21b490166a3d9 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=30a8beeb3042f49d0537b7050fd21b490166a3d9 | can: peak_usb: pcan_usb_fd: Fix info-leaks to USB devices
Uninitialized Kernel memory can leak to USB devices.
Fix by using kzalloc() instead of kmalloc() on the affected buffers.
Signed-off-by: Tomas Bortoli <tomasbortoli@gmail.com>
Reported-by: syzbot+513e4d0985298538bf9b@syzkaller.appspotmail.com
Fixes: 0a25e1f4f... | 1 | static int pcan_usb_fd_init(struct peak_usb_device *dev)
{
struct pcan_usb_fd_device *pdev =
container_of(dev, struct pcan_usb_fd_device, dev);
int i, err = -ENOMEM;
/* do this for 1st channel only */
if (!dev->prev_siblings) {
/* allocate netdevices common structure attached to first one */
pdev->usb_if = ... | 228,030,246,418,670,780,000,000,000,000,000,000,000 | pcan_usb_fd.c | 189,617,677,896,216,800,000,000,000,000,000,000,000 | [
"CWE-908"
] | CVE-2019-19535 | In the Linux kernel before 5.2.9, there is an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_fd.c driver, aka CID-30a8beeb3042. | https://nvd.nist.gov/vuln/detail/CVE-2019-19535 |
481,588 | linux | 30a8beeb3042f49d0537b7050fd21b490166a3d9 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=30a8beeb3042f49d0537b7050fd21b490166a3d9 | can: peak_usb: pcan_usb_fd: Fix info-leaks to USB devices
Uninitialized Kernel memory can leak to USB devices.
Fix by using kzalloc() instead of kmalloc() on the affected buffers.
Signed-off-by: Tomas Bortoli <tomasbortoli@gmail.com>
Reported-by: syzbot+513e4d0985298538bf9b@syzkaller.appspotmail.com
Fixes: 0a25e1f4f... | 0 | static int pcan_usb_fd_init(struct peak_usb_device *dev)
{
struct pcan_usb_fd_device *pdev =
container_of(dev, struct pcan_usb_fd_device, dev);
int i, err = -ENOMEM;
/* do this for 1st channel only */
if (!dev->prev_siblings) {
/* allocate netdevices common structure attached to first one */
pdev->usb_if = ... | 73,043,863,793,171,260,000,000,000,000,000,000,000 | pcan_usb_fd.c | 292,197,689,783,577,080,000,000,000,000,000,000,000 | [
"CWE-908"
] | CVE-2019-19535 | In the Linux kernel before 5.2.9, there is an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_fd.c driver, aka CID-30a8beeb3042. | https://nvd.nist.gov/vuln/detail/CVE-2019-19535 |
214,933 | ghostpdl | 39b1e54b2968620723bf32e96764c88797714879 | https://github.com/ArtifexSoftware/ghostpdl | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=39b1e54b2968620723bf32e96764c88797714879 | pdfwrite - Guard against trying to output an infinite number
Bug #699255 " Buffer overflow on pprintg1 due to mishandle postscript file data to pdf"
The file uses an enormous parameter to xyxhow, causing an overflow in
the calculation of text positioning (value > 1e39).
Since this is basically a nonsense value, and ... | 1 | set_text_distance(gs_point *pdist, double dx, double dy, const gs_matrix *pmat)
{
int code = gs_distance_transform_inverse(dx, dy, pmat, pdist);
double rounded;
if (code == gs_error_undefinedresult) {
/* The CTM is degenerate.
Can't know the distance in user space.
Set zero be... | 83,313,660,559,192,970,000,000,000,000,000,000,000 | gdevpdts.c | 286,364,993,590,916,840,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-10194 | The set_text_distance function in devices/vector/gdevpdts.c in the pdfwrite component in Artifex Ghostscript through 9.22 does not prevent overflows in text-positioning calculation, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted PDF... | https://nvd.nist.gov/vuln/detail/CVE-2018-10194 |
481,653 | ghostpdl | 39b1e54b2968620723bf32e96764c88797714879 | https://github.com/ArtifexSoftware/ghostpdl | http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=39b1e54b2968620723bf32e96764c88797714879 | pdfwrite - Guard against trying to output an infinite number
Bug #699255 " Buffer overflow on pprintg1 due to mishandle postscript file data to pdf"
The file uses an enormous parameter to xyxhow, causing an overflow in
the calculation of text positioning (value > 1e39).
Since this is basically a nonsense value, and ... | 0 | set_text_distance(gs_point *pdist, double dx, double dy, const gs_matrix *pmat)
{
int code;
double rounded;
if (dx > 1e38 || dy > 1e38)
code = gs_error_undefinedresult;
else
code = gs_distance_transform_inverse(dx, dy, pmat, pdist);
if (code == gs_error_undefinedresult) {
/... | 49,410,995,772,899,700,000,000,000,000,000,000,000 | gdevpdts.c | 245,421,769,076,134,180,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2018-10194 | The set_text_distance function in devices/vector/gdevpdts.c in the pdfwrite component in Artifex Ghostscript through 9.22 does not prevent overflows in text-positioning calculation, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted PDF... | https://nvd.nist.gov/vuln/detail/CVE-2018-10194 |
214,947 | linux | 0aaa81377c5a01f686bcdb8c7a6929a7bf330c68 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0aaa81377c5a01f686bcdb8c7a6929a7bf330c68 | can: gw: ensure DLC boundaries after CAN frame modification
Muyu Yu provided a POC where user root with CAP_NET_ADMIN can create a CAN
frame modification rule that makes the data length code a higher value than
the available CAN frame data size. In combination with a configured checksum
calculation where the result is... | 1 | static void can_can_gw_rcv(struct sk_buff *skb, void *data)
{
struct cgw_job *gwj = (struct cgw_job *)data;
struct can_frame *cf;
struct sk_buff *nskb;
int modidx = 0;
/*
* Do not handle CAN frames routed more than 'max_hops' times.
* In general we should never catch this delimiter which is intended
* to co... | 136,482,575,830,112,850,000,000,000,000,000,000,000 | gw.c | 204,133,792,040,740,650,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2019-3701 | An issue was discovered in can_can_gw_rcv in net/can/gw.c in the Linux kernel through 4.19.13. The CAN frame modification rules allow bitwise logical operations that can be also applied to the can_dlc field. The privileged user "root" with CAP_NET_ADMIN can create a CAN frame modification rule that makes the data lengt... | https://nvd.nist.gov/vuln/detail/CVE-2019-3701 |
481,784 | linux | 0aaa81377c5a01f686bcdb8c7a6929a7bf330c68 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0aaa81377c5a01f686bcdb8c7a6929a7bf330c68 | can: gw: ensure DLC boundaries after CAN frame modification
Muyu Yu provided a POC where user root with CAP_NET_ADMIN can create a CAN
frame modification rule that makes the data length code a higher value than
the available CAN frame data size. In combination with a configured checksum
calculation where the result is... | 0 | static void can_can_gw_rcv(struct sk_buff *skb, void *data)
{
struct cgw_job *gwj = (struct cgw_job *)data;
struct can_frame *cf;
struct sk_buff *nskb;
int modidx = 0;
/*
* Do not handle CAN frames routed more than 'max_hops' times.
* In general we should never catch this delimiter which is intended
* to co... | 175,144,692,010,009,800,000,000,000,000,000,000,000 | gw.c | 232,207,459,236,924,500,000,000,000,000,000,000,000 | [
"CWE-787"
] | CVE-2019-3701 | An issue was discovered in can_can_gw_rcv in net/can/gw.c in the Linux kernel through 4.19.13. The CAN frame modification rules allow bitwise logical operations that can be also applied to the can_dlc field. The privileged user "root" with CAP_NET_ADMIN can create a CAN frame modification rule that makes the data lengt... | https://nvd.nist.gov/vuln/detail/CVE-2019-3701 |
214,975 | abrt | 28ce40d8db91c1926a95f21ef19a980a8af88471 | https://github.com/abrt/abrt | https://github.com/abrt/abrt/commit/28ce40d8db91c1926a95f21ef19a980a8af88471 | ccpp: check for overflow in abrt coredump path creation
This issue was discovered by Florian Weimer of Red Hat Product Security.
Signed-off-by: Jakub Filak <jfilak@redhat.com> | 1 | int main(int argc, char** argv)
{
/* Kernel starts us with all fd's closed.
* But it's dangerous:
* fprintf(stderr) can dump messages into random fds, etc.
* Ensure that if any of fd 0,1,2 is closed, we open it to /dev/null.
*/
int fd = xopen("/dev/null", O_RDWR);
while (fd < 2)
fd = xd... | 60,517,800,847,633,490,000,000,000,000,000,000,000 | abrt-hook-ccpp.c | 276,185,859,868,479,300,000,000,000,000,000,000,000 | [
"CWE-59"
] | CVE-2015-3315 | Automatic Bug Reporting Tool (ABRT) allows local users to read, change the ownership of, or have other unspecified impact on arbitrary files via a symlink attack on (1) /var/tmp/abrt/*/maps, (2) /tmp/jvm-*/hs_error.log, (3) /proc/*/exe, (4) /etc/os-release in a chroot, or (5) an unspecified root directory related to li... | https://nvd.nist.gov/vuln/detail/CVE-2015-3315 |
482,033 | abrt | 28ce40d8db91c1926a95f21ef19a980a8af88471 | https://github.com/abrt/abrt | https://github.com/abrt/abrt/commit/28ce40d8db91c1926a95f21ef19a980a8af88471 | ccpp: check for overflow in abrt coredump path creation
This issue was discovered by Florian Weimer of Red Hat Product Security.
Signed-off-by: Jakub Filak <jfilak@redhat.com> | 0 | int main(int argc, char** argv)
{
/* Kernel starts us with all fd's closed.
* But it's dangerous:
* fprintf(stderr) can dump messages into random fds, etc.
* Ensure that if any of fd 0,1,2 is closed, we open it to /dev/null.
*/
int fd = xopen("/dev/null", O_RDWR);
while (fd < 2)
fd = xd... | 274,112,256,452,875,940,000,000,000,000,000,000,000 | abrt-hook-ccpp.c | 281,666,799,197,488,000,000,000,000,000,000,000,000 | [
"CWE-59"
] | CVE-2015-3315 | Automatic Bug Reporting Tool (ABRT) allows local users to read, change the ownership of, or have other unspecified impact on arbitrary files via a symlink attack on (1) /var/tmp/abrt/*/maps, (2) /tmp/jvm-*/hs_error.log, (3) /proc/*/exe, (4) /etc/os-release in a chroot, or (5) an unspecified root directory related to li... | https://nvd.nist.gov/vuln/detail/CVE-2015-3315 |
214,976 | linux | f4351a199cc120ff9d59e06d02e8657d08e6cc46 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f4351a199cc120ff9d59e06d02e8657d08e6cc46 | ALSA: usb-audio: Avoid access before bLength check in build_audio_procunit()
The parser for the processing unit reads bNrInPins field before the
bLength sanity check, which may lead to an out-of-bound access when a
malformed descriptor is given. Fix it by assignment after the bLength
check.
Cc: <stable@vger.kernel.o... | 1 | static int build_audio_procunit(struct mixer_build *state, int unitid,
void *raw_desc, struct procunit_info *list,
char *name)
{
struct uac_processing_unit_descriptor *desc = raw_desc;
int num_ins = desc->bNrInPins;
struct usb_mixer_elem_info *cval;
struct snd_kcontrol *kctl;
int i, err, nameid, type, len;... | 12,215,826,483,691,914,000,000,000,000,000,000,000 | mixer.c | 66,640,194,003,274,085,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-15927 | An issue was discovered in the Linux kernel before 4.20.2. An out-of-bounds access exists in the function build_audio_procunit in the file sound/usb/mixer.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-15927 |
482,039 | linux | f4351a199cc120ff9d59e06d02e8657d08e6cc46 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f4351a199cc120ff9d59e06d02e8657d08e6cc46 | ALSA: usb-audio: Avoid access before bLength check in build_audio_procunit()
The parser for the processing unit reads bNrInPins field before the
bLength sanity check, which may lead to an out-of-bound access when a
malformed descriptor is given. Fix it by assignment after the bLength
check.
Cc: <stable@vger.kernel.o... | 0 | static int build_audio_procunit(struct mixer_build *state, int unitid,
void *raw_desc, struct procunit_info *list,
char *name)
{
struct uac_processing_unit_descriptor *desc = raw_desc;
int num_ins;
struct usb_mixer_elem_info *cval;
struct snd_kcontrol *kctl;
int i, err, nameid, type, len;
struct procunit_... | 40,637,239,867,549,550,000,000,000,000,000,000,000 | mixer.c | 281,704,089,268,021,350,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2019-15927 | An issue was discovered in the Linux kernel before 4.20.2. An out-of-bounds access exists in the function build_audio_procunit in the file sound/usb/mixer.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-15927 |
214,991 | mongo | 3a7e85ea1f672f702660e5472566234b1d19038e | https://github.com/mongodb/mongo | https://github.com/mongodb/mongo/commit/3a7e85ea1f672f702660e5472566234b1d19038e | SERVER-17264: improve bson validation for utf-8 strings
(cherry picked from commit 394a8569ff14a215c0691aa34440227b2e62a4de)
Conflicts:
src/mongo/bson/bson_validate_test.cpp | 1 | Status readUTF8String( StringData* out ) {
int sz;
if ( !readNumber<int>( &sz ) )
return Status( ErrorCodes::InvalidBSON, "invalid bson" );
if ( out ) {
*out = StringData( _buffer + _position, sz );
}
... | 176,983,854,668,946,200,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2015-1609 | MongoDB before 2.4.13 and 2.6.x before 2.6.8 allows remote attackers to cause a denial of service via a crafted UTF-8 string in a BSON request. | https://nvd.nist.gov/vuln/detail/CVE-2015-1609 |
482,366 | mongo | 3a7e85ea1f672f702660e5472566234b1d19038e | https://github.com/mongodb/mongo | https://github.com/mongodb/mongo/commit/3a7e85ea1f672f702660e5472566234b1d19038e | SERVER-17264: improve bson validation for utf-8 strings
(cherry picked from commit 394a8569ff14a215c0691aa34440227b2e62a4de)
Conflicts:
src/mongo/bson/bson_validate_test.cpp | 0 | Status readUTF8String( StringData* out ) {
int sz;
if ( !readNumber<int>( &sz ) )
return Status( ErrorCodes::InvalidBSON, "invalid bson" );
if ( sz <= 0 ) {
// must have NULL at the very least
return... | 92,175,759,094,154,350,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2015-1609 | MongoDB before 2.4.13 and 2.6.x before 2.6.8 allows remote attackers to cause a denial of service via a crafted UTF-8 string in a BSON request. | https://nvd.nist.gov/vuln/detail/CVE-2015-1609 |
215,036 | mupdf | 22c47acbd52949421f8c7cb46ea1556827d0fcbf | https://github.com/ArtifexSoftware/mupdf | https://github.com/ArtifexSoftware/mupdf/commit/22c47acbd52949421f8c7cb46ea1556827d0fcbf | Bug 704834: Fix division by zero for zero width pages in muraster. | 1 | initialise_banding(fz_context *ctx, render_details *render, int color)
{
size_t min_band_mem;
int bpp, h, w, reps;
render->colorspace = output_cs;
render->format = output_format;
#if GREY_FALLBACK != 0
if (color == 0)
{
if (render->colorspace == CS_RGB)
{
/* Fallback from PPM to PGM */
render->colorspa... | 8,516,083,646,536,877,000,000,000,000,000,000,000 | None | null | [
"CWE-22"
] | CVE-2021-4216 | A Floating point exception (division-by-zero) flaw was found in Mupdf for zero width pages in muraster.c. It is fixed in Mupdf-1.20.0-rc1 upstream. | https://nvd.nist.gov/vuln/detail/CVE-2021-4216 |
482,656 | mupdf | 22c47acbd52949421f8c7cb46ea1556827d0fcbf | https://github.com/ArtifexSoftware/mupdf | https://github.com/ArtifexSoftware/mupdf/commit/22c47acbd52949421f8c7cb46ea1556827d0fcbf | Bug 704834: Fix division by zero for zero width pages in muraster. | 0 | initialise_banding(fz_context *ctx, render_details *render, int color)
{
size_t min_band_mem;
int bpp, h, w, reps;
render->colorspace = output_cs;
render->format = output_format;
#if GREY_FALLBACK != 0
if (color == 0)
{
if (render->colorspace == CS_RGB)
{
/* Fallback from PPM to PGM */
render->colorspa... | 4,961,210,047,777,575,500,000,000,000,000,000,000 | None | null | [
"CWE-22"
] | CVE-2021-4216 | A Floating point exception (division-by-zero) flaw was found in Mupdf for zero width pages in muraster.c. It is fixed in Mupdf-1.20.0-rc1 upstream. | https://nvd.nist.gov/vuln/detail/CVE-2021-4216 |
215,037 | file-roller | f70be1f41688859ec8dbe266df35a1839ceb96c5 | https://git.gnome.org/browse/file-roller | https://git.gnome.org/browse/file-roller/commit/?id=f70be1f41688859ec8dbe266df35a1839ceb96c5 | do not follow symlinks when deleting a folder recursively
[bug #698554] | 1 | _g_file_remove_directory (GFile *directory,
GCancellable *cancellable,
GError **error)
{
GFileEnumerator *enumerator;
GFileInfo *info;
gboolean error_occurred = FALSE;
if (directory == NULL)
return TRUE;
enumerator = g_file_enumerate_children (directory,
G_FI... | 305,380,695,481,958,370,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2016-7162 | The _g_file_remove_directory function in file-utils.c in File Roller 3.5.4 through 3.20.2 allows remote attackers to delete arbitrary files via a symlink attack on a folder in an archive. | https://nvd.nist.gov/vuln/detail/CVE-2016-7162 |
482,678 | file-roller | f70be1f41688859ec8dbe266df35a1839ceb96c5 | https://git.gnome.org/browse/file-roller | https://git.gnome.org/browse/file-roller/commit/?id=f70be1f41688859ec8dbe266df35a1839ceb96c5 | do not follow symlinks when deleting a folder recursively
[bug #698554] | 0 | _g_file_remove_directory (GFile *directory,
GCancellable *cancellable,
GError **error)
{
GFileEnumerator *enumerator;
GFileInfo *info;
gboolean error_occurred = FALSE;
if (directory == NULL)
return TRUE;
enumerator = g_file_enumerate_children (directory,
G_FI... | 46,373,685,789,515,300,000,000,000,000,000,000,000 | None | null | [
"CWE-20"
] | CVE-2016-7162 | The _g_file_remove_directory function in file-utils.c in File Roller 3.5.4 through 3.20.2 allows remote attackers to delete arbitrary files via a symlink attack on a folder in an archive. | https://nvd.nist.gov/vuln/detail/CVE-2016-7162 |
215,066 | ImageMagick6 | 6954a3f7f1bf1dad417260c5965f2c30a64fa25e | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/6954a3f7f1bf1dad417260c5965f2c30a64fa25e | Fixed memory leak reported in #1558 and fixed other leak. | 1 | static Image *ReadDOTImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
char
command[MaxTextExtent];
const char
*option;
graph_t
*graph;
Image
*image;
ImageInfo
*read_info;
MagickBooleanType
status;
/*
Open image file.
*/
assert(image_info != (const ImageIn... | 327,074,136,711,311,330,000,000,000,000,000,000,000 | dot.c | 329,884,814,729,668,330,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2019-16713 | ImageMagick 7.0.8-43 has a memory leak in coders/dot.c, as demonstrated by PingImage in MagickCore/constitute.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-16713 |
483,036 | ImageMagick6 | 6954a3f7f1bf1dad417260c5965f2c30a64fa25e | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/6954a3f7f1bf1dad417260c5965f2c30a64fa25e | Fixed memory leak reported in #1558 and fixed other leak. | 0 | static Image *ReadDOTImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
char
command[MaxTextExtent];
const char
*option;
graph_t
*graph;
Image
*image;
ImageInfo
*read_info;
MagickBooleanType
status;
/*
Open image file.
*/
assert(image_info != (const ImageIn... | 114,110,501,110,929,240,000,000,000,000,000,000,000 | dot.c | 9,846,172,263,488,283,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2019-16713 | ImageMagick 7.0.8-43 has a memory leak in coders/dot.c, as demonstrated by PingImage in MagickCore/constitute.c. | https://nvd.nist.gov/vuln/detail/CVE-2019-16713 |
215,071 | linux | 9453264ef58638ce8976121ac44c07a3ef375983 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9453264ef58638ce8976121ac44c07a3ef375983 | media: go7007: fix a miss of snd_card_free
go7007_snd_init() misses a snd_card_free() in an error path.
Add the missed call to fix it.
Signed-off-by: Chuhong Yuan <hslester96@gmail.com>
Signed-off-by: Hans Verkuil <hverkuil-cisco@xs4all.nl>
Signed-off-by: Mauro Carvalho Chehab <mchehab+huawei@kernel.org> | 1 | int go7007_snd_init(struct go7007 *go)
{
static int dev;
struct go7007_snd *gosnd;
int ret;
if (dev >= SNDRV_CARDS)
return -ENODEV;
if (!enable[dev]) {
dev++;
return -ENOENT;
}
gosnd = kmalloc(sizeof(struct go7007_snd), GFP_KERNEL);
if (gosnd == NULL)
return -ENOMEM;
spin_lock_init(&gosnd->lock);
gos... | 138,447,749,818,297,090,000,000,000,000,000,000,000 | snd-go7007.c | 74,081,838,898,783,200,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2019-20810 | go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c in the Linux kernel before 5.6 does not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586. | https://nvd.nist.gov/vuln/detail/CVE-2019-20810 |
483,042 | linux | 9453264ef58638ce8976121ac44c07a3ef375983 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9453264ef58638ce8976121ac44c07a3ef375983 | media: go7007: fix a miss of snd_card_free
go7007_snd_init() misses a snd_card_free() in an error path.
Add the missed call to fix it.
Signed-off-by: Chuhong Yuan <hslester96@gmail.com>
Signed-off-by: Hans Verkuil <hverkuil-cisco@xs4all.nl>
Signed-off-by: Mauro Carvalho Chehab <mchehab+huawei@kernel.org> | 0 | int go7007_snd_init(struct go7007 *go)
{
static int dev;
struct go7007_snd *gosnd;
int ret;
if (dev >= SNDRV_CARDS)
return -ENODEV;
if (!enable[dev]) {
dev++;
return -ENOENT;
}
gosnd = kmalloc(sizeof(struct go7007_snd), GFP_KERNEL);
if (gosnd == NULL)
return -ENOMEM;
spin_lock_init(&gosnd->lock);
gos... | 295,418,551,355,484,800,000,000,000,000,000,000,000 | snd-go7007.c | 195,381,447,138,725,400,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2019-20810 | go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c in the Linux kernel before 5.6 does not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586. | https://nvd.nist.gov/vuln/detail/CVE-2019-20810 |
215,074 | soundtouch | 107f2c5d201a4dfea1b7f15c5957ff2ac9e5f260 | https://gitlab.com/soundtouch/soundtouch | https://gitlab.com/soundtouch/soundtouch/commit/107f2c5d201a4dfea1b7f15c5957ff2ac9e5f260 | Replaced illegal-number-of-channel assertions with run-time exception | 1 | void SoundTouch::setChannels(uint numChannels)
{
/*if (numChannels != 1 && numChannels != 2)
{
//ST_THROW_RT_ERROR("Illegal number of channels");
return;
}*/
channels = numChannels;
pRateTransposer->setChannels((int)numChannels);
pTDStretch->setChannels((int)numChannels... | 100,900,752,757,923,100,000,000,000,000,000,000,000 | SoundTouch.cpp | 31,973,557,176,655,380,000,000,000,000,000,000,000 | [
"CWE-617"
] | CVE-2018-14044 | The RateTransposer::setChannels function in RateTransposer.cpp in libSoundTouch.a in Olli Parviainen SoundTouch 2.0 allows remote attackers to cause a denial of service (assertion failure and application exit), as demonstrated by SoundStretch. | https://nvd.nist.gov/vuln/detail/CVE-2018-14044 |
483,120 | soundtouch | 107f2c5d201a4dfea1b7f15c5957ff2ac9e5f260 | https://gitlab.com/soundtouch/soundtouch | https://gitlab.com/soundtouch/soundtouch/commit/107f2c5d201a4dfea1b7f15c5957ff2ac9e5f260 | Replaced illegal-number-of-channel assertions with run-time exception | 0 | void SoundTouch::setChannels(uint numChannels)
{
if (!verifyNumberOfChannels(numChannels)) return;
channels = numChannels;
pRateTransposer->setChannels((int)numChannels);
pTDStretch->setChannels((int)numChannels);
}
| 36,956,141,438,746,836,000,000,000,000,000,000,000 | SoundTouch.cpp | 208,448,012,861,588,100,000,000,000,000,000,000,000 | [
"CWE-617"
] | CVE-2018-14044 | The RateTransposer::setChannels function in RateTransposer.cpp in libSoundTouch.a in Olli Parviainen SoundTouch 2.0 allows remote attackers to cause a denial of service (assertion failure and application exit), as demonstrated by SoundStretch. | https://nvd.nist.gov/vuln/detail/CVE-2018-14044 |
215,075 | soundtouch | 107f2c5d201a4dfea1b7f15c5957ff2ac9e5f260 | https://gitlab.com/soundtouch/soundtouch | https://gitlab.com/soundtouch/soundtouch/commit/107f2c5d201a4dfea1b7f15c5957ff2ac9e5f260 | Replaced illegal-number-of-channel assertions with run-time exception | 1 | void RateTransposer::setChannels(int nChannels)
{
assert(nChannels > 0);
if (pTransposer->numChannels == nChannels) return;
pTransposer->setChannels(nChannels);
inputBuffer.setChannels(nChannels);
midBuffer.setChannels(nChannels);
outputBuffer.setChannels(nChannels);
}
| 44,220,962,992,982,150,000,000,000,000,000,000,000 | RateTransposer.cpp | 255,975,912,595,403,370,000,000,000,000,000,000,000 | [
"CWE-617"
] | CVE-2018-14044 | The RateTransposer::setChannels function in RateTransposer.cpp in libSoundTouch.a in Olli Parviainen SoundTouch 2.0 allows remote attackers to cause a denial of service (assertion failure and application exit), as demonstrated by SoundStretch. | https://nvd.nist.gov/vuln/detail/CVE-2018-14044 |
483,124 | soundtouch | 107f2c5d201a4dfea1b7f15c5957ff2ac9e5f260 | https://gitlab.com/soundtouch/soundtouch | https://gitlab.com/soundtouch/soundtouch/commit/107f2c5d201a4dfea1b7f15c5957ff2ac9e5f260 | Replaced illegal-number-of-channel assertions with run-time exception | 0 | void RateTransposer::setChannels(int nChannels)
{
if (!verifyNumberOfChannels(nChannels) ||
(pTransposer->numChannels == nChannels)) return;
pTransposer->setChannels(nChannels);
inputBuffer.setChannels(nChannels);
midBuffer.setChannels(nChannels);
outputBuffer.setChannels(nChannels)... | 82,186,769,698,541,670,000,000,000,000,000,000,000 | RateTransposer.cpp | 278,200,497,163,101,000,000,000,000,000,000,000,000 | [
"CWE-617"
] | CVE-2018-14044 | The RateTransposer::setChannels function in RateTransposer.cpp in libSoundTouch.a in Olli Parviainen SoundTouch 2.0 allows remote attackers to cause a denial of service (assertion failure and application exit), as demonstrated by SoundStretch. | https://nvd.nist.gov/vuln/detail/CVE-2018-14044 |
215,076 | soundtouch | 107f2c5d201a4dfea1b7f15c5957ff2ac9e5f260 | https://gitlab.com/soundtouch/soundtouch | https://gitlab.com/soundtouch/soundtouch/commit/107f2c5d201a4dfea1b7f15c5957ff2ac9e5f260 | Replaced illegal-number-of-channel assertions with run-time exception | 1 | void FIFOSampleBuffer::setChannels(int numChannels)
{
uint usedBytes;
assert(numChannels > 0);
usedBytes = channels * samplesInBuffer;
channels = (uint)numChannels;
samplesInBuffer = usedBytes / channels;
}
| 164,034,081,006,483,630,000,000,000,000,000,000,000 | FIFOSampleBuffer.cpp | 181,203,205,514,363,670,000,000,000,000,000,000,000 | [
"CWE-617"
] | CVE-2018-14044 | The RateTransposer::setChannels function in RateTransposer.cpp in libSoundTouch.a in Olli Parviainen SoundTouch 2.0 allows remote attackers to cause a denial of service (assertion failure and application exit), as demonstrated by SoundStretch. | https://nvd.nist.gov/vuln/detail/CVE-2018-14044 |
483,158 | soundtouch | 107f2c5d201a4dfea1b7f15c5957ff2ac9e5f260 | https://gitlab.com/soundtouch/soundtouch | https://gitlab.com/soundtouch/soundtouch/commit/107f2c5d201a4dfea1b7f15c5957ff2ac9e5f260 | Replaced illegal-number-of-channel assertions with run-time exception | 0 | void FIFOSampleBuffer::setChannels(int numChannels)
{
uint usedBytes;
if (!verifyNumberOfChannels(numChannels)) return;
usedBytes = channels * samplesInBuffer;
channels = (uint)numChannels;
samplesInBuffer = usedBytes / channels;
}
| 314,363,400,218,475,040,000,000,000,000,000,000,000 | FIFOSampleBuffer.cpp | 28,843,565,167,114,076,000,000,000,000,000,000,000 | [
"CWE-617"
] | CVE-2018-14044 | The RateTransposer::setChannels function in RateTransposer.cpp in libSoundTouch.a in Olli Parviainen SoundTouch 2.0 allows remote attackers to cause a denial of service (assertion failure and application exit), as demonstrated by SoundStretch. | https://nvd.nist.gov/vuln/detail/CVE-2018-14044 |
215,077 | soundtouch | 107f2c5d201a4dfea1b7f15c5957ff2ac9e5f260 | https://gitlab.com/soundtouch/soundtouch | https://gitlab.com/soundtouch/soundtouch/commit/107f2c5d201a4dfea1b7f15c5957ff2ac9e5f260 | Replaced illegal-number-of-channel assertions with run-time exception | 1 | void TDStretch::setChannels(int numChannels)
{
assert(numChannels > 0);
if (channels == numChannels) return;
// assert(numChannels == 1 || numChannels == 2);
channels = numChannels;
inputBuffer.setChannels(channels);
outputBuffer.setChannels(channels);
// re-init overlap/buffer
... | 24,111,647,658,584,840,000,000,000,000,000,000,000 | TDStretch.cpp | 79,010,079,540,429,460,000,000,000,000,000,000,000 | [
"CWE-617"
] | CVE-2018-14044 | The RateTransposer::setChannels function in RateTransposer.cpp in libSoundTouch.a in Olli Parviainen SoundTouch 2.0 allows remote attackers to cause a denial of service (assertion failure and application exit), as demonstrated by SoundStretch. | https://nvd.nist.gov/vuln/detail/CVE-2018-14044 |
483,114 | soundtouch | 107f2c5d201a4dfea1b7f15c5957ff2ac9e5f260 | https://gitlab.com/soundtouch/soundtouch | https://gitlab.com/soundtouch/soundtouch/commit/107f2c5d201a4dfea1b7f15c5957ff2ac9e5f260 | Replaced illegal-number-of-channel assertions with run-time exception | 0 | void TDStretch::setChannels(int numChannels)
{
if (!verifyNumberOfChannels(numChannels) ||
(channels == numChannels)) return;
channels = numChannels;
inputBuffer.setChannels(channels);
outputBuffer.setChannels(channels);
// re-init overlap/buffer
overlapLength=0;
setPara... | 228,113,203,474,812,570,000,000,000,000,000,000,000 | TDStretch.cpp | 252,965,583,043,166,150,000,000,000,000,000,000,000 | [
"CWE-617"
] | CVE-2018-14044 | The RateTransposer::setChannels function in RateTransposer.cpp in libSoundTouch.a in Olli Parviainen SoundTouch 2.0 allows remote attackers to cause a denial of service (assertion failure and application exit), as demonstrated by SoundStretch. | https://nvd.nist.gov/vuln/detail/CVE-2018-14044 |
215,078 | libxml2 | cbb271655cadeb8dbb258a64701d9a3a0c4835b4 | https://github.com/GNOME/libxml2 | https://git.gnome.org/browse/libxml2/commit/?id=cbb271655cadeb8dbb258a64701d9a3a0c4835b4 | Bug 757711: heap-buffer-overflow in xmlFAParsePosCharGroup <https://bugzilla.gnome.org/show_bug.cgi?id=757711>
* xmlregexp.c:
(xmlFAParseCharRange): Only advance to the next character if
there is no error. Advancing to the next character in case of
an error while parsing regexp leads to an out of bounds access. | 1 | xmlFAParseCharRange(xmlRegParserCtxtPtr ctxt) {
int cur, len;
int start = -1;
int end = -1;
if (CUR == '\0') {
ERROR("Expecting ']'");
return;
}
cur = CUR;
if (cur == '\\') {
NEXT;
cur = CUR;
switch (cur) {
case 'n': start = 0xA; break;
case 'r': start = 0xD; break;
... | 124,166,455,534,811,980,000,000,000,000,000,000,000 | xmlregexp.c | 219,556,499,222,637,380,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2016-1840 | Heap-based buffer overflow in the xmlFAParsePosCharGroup function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XML document. | https://nvd.nist.gov/vuln/detail/CVE-2016-1840 |
483,191 | libxml2 | cbb271655cadeb8dbb258a64701d9a3a0c4835b4 | https://github.com/GNOME/libxml2 | https://git.gnome.org/browse/libxml2/commit/?id=cbb271655cadeb8dbb258a64701d9a3a0c4835b4 | Bug 757711: heap-buffer-overflow in xmlFAParsePosCharGroup <https://bugzilla.gnome.org/show_bug.cgi?id=757711>
* xmlregexp.c:
(xmlFAParseCharRange): Only advance to the next character if
there is no error. Advancing to the next character in case of
an error while parsing regexp leads to an out of bounds access. | 0 | xmlFAParseCharRange(xmlRegParserCtxtPtr ctxt) {
int cur, len;
int start = -1;
int end = -1;
if (CUR == '\0') {
ERROR("Expecting ']'");
return;
}
cur = CUR;
if (cur == '\\') {
NEXT;
cur = CUR;
switch (cur) {
case 'n': start = 0xA; break;
case 'r': start = 0xD; break;
... | 65,202,227,703,000,110,000,000,000,000,000,000,000 | xmlregexp.c | 260,942,153,090,602,760,000,000,000,000,000,000,000 | [
"CWE-119"
] | CVE-2016-1840 | Heap-based buffer overflow in the xmlFAParsePosCharGroup function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XML document. | https://nvd.nist.gov/vuln/detail/CVE-2016-1840 |
215,080 | linux | fcdf445ff42f036d22178b49cf64e92d527c1330 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/sunxi/linux.git/commit/?h=sunxi/clk-for-5.3&id=fcdf445ff42f036d22178b49cf64e92d527c1330 | clk-sunxi: fix a missing-check bug in sunxi_divs_clk_setup()
In sunxi_divs_clk_setup(), 'derived_name' is allocated by kstrndup().
It returns NULL when fails. 'derived_name' should be checked.
Signed-off-by: Gen Zhang <blackgod016574@gmail.com>
Signed-off-by: Maxime Ripard <maxime.ripard@bootlin.com> | 1 | static struct clk ** __init sunxi_divs_clk_setup(struct device_node *node,
const struct divs_data *data)
{
struct clk_onecell_data *clk_data;
const char *parent;
const char *clk_name;
struct clk **clks, *pclk;
struct clk_hw *gate_hw, *rate_hw;
const struct clk_ops *rate_ops;
struct clk_gate *gate = NULL;
... | 208,117,506,152,676,000,000,000,000,000,000,000,000 | clk-sunxi.c | 308,455,542,395,242,660,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2019-12455 | An issue was discovered in sunxi_divs_clk_setup in drivers/clk/sunxi/clk-sunxi.c in the Linux kernel through 5.1.5. There is an unchecked kstrndup of derived_name, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash). NOTE: This id is disputed as not being an issue beca... | https://nvd.nist.gov/vuln/detail/CVE-2019-12455 |
483,312 | linux | fcdf445ff42f036d22178b49cf64e92d527c1330 | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/sunxi/linux.git/commit/?h=sunxi/clk-for-5.3&id=fcdf445ff42f036d22178b49cf64e92d527c1330 | clk-sunxi: fix a missing-check bug in sunxi_divs_clk_setup()
In sunxi_divs_clk_setup(), 'derived_name' is allocated by kstrndup().
It returns NULL when fails. 'derived_name' should be checked.
Signed-off-by: Gen Zhang <blackgod016574@gmail.com>
Signed-off-by: Maxime Ripard <maxime.ripard@bootlin.com> | 0 | static struct clk ** __init sunxi_divs_clk_setup(struct device_node *node,
const struct divs_data *data)
{
struct clk_onecell_data *clk_data;
const char *parent;
const char *clk_name;
struct clk **clks, *pclk;
struct clk_hw *gate_hw, *rate_hw;
const struct clk_ops *rate_ops;
struct clk_gate *gate = NULL;
... | 142,443,518,399,993,520,000,000,000,000,000,000,000 | clk-sunxi.c | 268,454,985,948,884,840,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2019-12455 | An issue was discovered in sunxi_divs_clk_setup in drivers/clk/sunxi/clk-sunxi.c in the Linux kernel through 5.1.5. There is an unchecked kstrndup of derived_name, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash). NOTE: This id is disputed as not being an issue beca... | https://nvd.nist.gov/vuln/detail/CVE-2019-12455 |
215,086 | poppler | de0c0b8324e776f0b851485e0fc9622fc35695b7 | https://github.com/freedesktop/poppler | https://gitlab.freedesktop.org/poppler/poppler/commit/de0c0b8324e776f0b851485e0fc9622fc35695b7 | FileSpec: Move the fileSpec.dictLookup call inside fileSpec.isDict if
Fixes #704 | 1 | FileSpec::FileSpec(const Object *fileSpecA)
{
ok = true;
fileName = nullptr;
platformFileName = nullptr;
embFile = nullptr;
desc = nullptr;
fileSpec = fileSpecA->copy();
Object obj1 = getFileSpecName(fileSpecA);
if (!obj1.isString()) {
ok = false;
error(errSyntaxError, -1, "Invalid FileSpec");
... | 157,741,892,590,712,320,000,000,000,000,000,000,000 | FileSpec.cc | 252,608,428,506,705,800,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2018-20650 | A reachable Object::dictLookup assertion in Poppler 0.72.0 allows attackers to cause a denial of service due to the lack of a check for the dict data type, as demonstrated by use of the FileSpec class (in FileSpec.cc) in pdfdetach. | https://nvd.nist.gov/vuln/detail/CVE-2018-20650 |
483,354 | poppler | de0c0b8324e776f0b851485e0fc9622fc35695b7 | https://github.com/freedesktop/poppler | https://gitlab.freedesktop.org/poppler/poppler/commit/de0c0b8324e776f0b851485e0fc9622fc35695b7 | FileSpec: Move the fileSpec.dictLookup call inside fileSpec.isDict if
Fixes #704 | 0 | FileSpec::FileSpec(const Object *fileSpecA)
{
ok = true;
fileName = nullptr;
platformFileName = nullptr;
embFile = nullptr;
desc = nullptr;
fileSpec = fileSpecA->copy();
Object obj1 = getFileSpecName(fileSpecA);
if (!obj1.isString()) {
ok = false;
error(errSyntaxError, -1, "Invalid FileSpec");
... | 94,655,079,616,036,550,000,000,000,000,000,000,000 | FileSpec.cc | 290,602,914,846,621,700,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2018-20650 | A reachable Object::dictLookup assertion in Poppler 0.72.0 allows attackers to cause a denial of service due to the lack of a check for the dict data type, as demonstrated by use of the FileSpec class (in FileSpec.cc) in pdfdetach. | https://nvd.nist.gov/vuln/detail/CVE-2018-20650 |
215,091 | ImageMagick6 | ae71c12bbaa34d942e036824ff389c22b7dacade | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/ae71c12bbaa34d942e036824ff389c22b7dacade | https://github.com/ImageMagick/ImageMagick/issues/1178 | 1 | static Image *ReadDIBImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
DIBInfo
dib_info;
Image
*image;
IndexPacket
index;
ssize_t
bit,
y;
MagickBooleanType
status;
MemoryInfo
*pixel_info;
register IndexPacket
*indexes;
register ssize_t
x;
registe... | 145,832,176,005,584,440,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2018-12600 | In ImageMagick 7.0.8-3 Q16, ReadDIBImage and WriteDIBImage in coders/dib.c allow attackers to cause an out of bounds write via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2018-12600 |
483,381 | ImageMagick6 | ae71c12bbaa34d942e036824ff389c22b7dacade | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/ae71c12bbaa34d942e036824ff389c22b7dacade | https://github.com/ImageMagick/ImageMagick/issues/1178 | 0 | static Image *ReadDIBImage(const ImageInfo *image_info,ExceptionInfo *exception)
{
DIBInfo
dib_info;
Image
*image;
IndexPacket
index;
ssize_t
bit,
y;
MagickBooleanType
status;
MemoryInfo
*pixel_info;
register IndexPacket
*indexes;
register ssize_t
x;
registe... | 229,514,710,107,608,630,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2018-12600 | In ImageMagick 7.0.8-3 Q16, ReadDIBImage and WriteDIBImage in coders/dib.c allow attackers to cause an out of bounds write via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2018-12600 |
215,092 | ImageMagick6 | ae71c12bbaa34d942e036824ff389c22b7dacade | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/ae71c12bbaa34d942e036824ff389c22b7dacade | https://github.com/ImageMagick/ImageMagick/issues/1178 | 1 | static MagickBooleanType WriteDIBImage(const ImageInfo *image_info,Image *image)
{
DIBInfo
dib_info;
MagickBooleanType
status;
register const IndexPacket
*indexes;
register const PixelPacket
*p;
register ssize_t
i,
x;
register unsigned char
*q;
size_t
bytes_per_line;
... | 326,438,810,160,561,700,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2018-12600 | In ImageMagick 7.0.8-3 Q16, ReadDIBImage and WriteDIBImage in coders/dib.c allow attackers to cause an out of bounds write via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2018-12600 |
483,382 | ImageMagick6 | ae71c12bbaa34d942e036824ff389c22b7dacade | https://github.com/ImageMagick/ImageMagick6 | https://github.com/ImageMagick/ImageMagick6/commit/ae71c12bbaa34d942e036824ff389c22b7dacade | https://github.com/ImageMagick/ImageMagick/issues/1178 | 0 | static MagickBooleanType WriteDIBImage(const ImageInfo *image_info,Image *image)
{
DIBInfo
dib_info;
MagickBooleanType
status;
register const IndexPacket
*indexes;
register const PixelPacket
*p;
register ssize_t
i,
x;
register unsigned char
*q;
size_t
bytes_per_line;
... | 84,405,334,593,838,990,000,000,000,000,000,000,000 | None | null | [
"CWE-787"
] | CVE-2018-12600 | In ImageMagick 7.0.8-3 Q16, ReadDIBImage and WriteDIBImage in coders/dib.c allow attackers to cause an out of bounds write via a crafted file. | https://nvd.nist.gov/vuln/detail/CVE-2018-12600 |
215,093 | matio | 5fa49ef9fc4368fe3d19b5fdaa36d8fa5e7f4606 | https://github.com/tbeu/matio | https://github.com/tbeu/matio/commit/5fa49ef9fc4368fe3d19b5fdaa36d8fa5e7f4606 | Fix integer addition overflow
As reported by https://github.com/tbeu/matio/issues/121 | 1 | ReadNextCell( mat_t *mat, matvar_t *matvar )
{
size_t bytesread = 0, i;
int err;
matvar_t **cells = NULL;
size_t nelems = 1;
err = SafeMulDims(matvar, &nelems);
if ( err ) {
Mat_Critical("Integer multiplication overflow");
return bytesread;
}
matvar->data_size = sizeof(m... | 320,473,313,246,009,480,000,000,000,000,000,000,000 | None | null | [
"CWE-401"
] | CVE-2020-19497 | Integer overflow vulnerability in Mat_VarReadNextInfo5 in mat5.c in tbeu matio (aka MAT File I/O Library) 1.5.17, allows attackers to cause a Denial of Service or possibly other unspecified impacts. | https://nvd.nist.gov/vuln/detail/CVE-2020-19497 |
483,405 | matio | 5fa49ef9fc4368fe3d19b5fdaa36d8fa5e7f4606 | https://github.com/tbeu/matio | https://github.com/tbeu/matio/commit/5fa49ef9fc4368fe3d19b5fdaa36d8fa5e7f4606 | Fix integer addition overflow
As reported by https://github.com/tbeu/matio/issues/121 | 0 | ReadNextCell( mat_t *mat, matvar_t *matvar )
{
size_t bytesread = 0, i;
int err;
matvar_t **cells = NULL;
size_t nelems = 1;
err = SafeMulDims(matvar, &nelems);
if ( err ) {
Mat_Critical("Integer multiplication overflow");
return bytesread;
}
matvar->data_size = sizeof(m... | 203,012,958,733,544,800,000,000,000,000,000,000,000 | None | null | [
"CWE-401"
] | CVE-2020-19497 | Integer overflow vulnerability in Mat_VarReadNextInfo5 in mat5.c in tbeu matio (aka MAT File I/O Library) 1.5.17, allows attackers to cause a Denial of Service or possibly other unspecified impacts. | https://nvd.nist.gov/vuln/detail/CVE-2020-19497 |
215,102 | mutt | e5ed080c00e59701ca62ef9b2a6d2612ebf765a5 | https://github.com/muttmua/mutt | https://gitlab.com/muttmua/mutt/-/commit/e5ed080c00e59701ca62ef9b2a6d2612ebf765a5 | Fix uudecode buffer overflow.
mutt_decode_uuencoded() used each line's initial "length character"
without any validation. It would happily read past the end of the
input line, and with a suitable value even past the length of the
input buffer.
As I noted in ticket 404, there are several other changes that could
be a... | 1 | static void mutt_decode_uuencoded (STATE *s, LOFF_T len, int istext, iconv_t cd)
{
char tmps[SHORT_STRING];
char linelen, c, l, out;
char *pt;
char bufi[BUFI_SIZE];
size_t k = 0;
if (istext)
state_set_prefix(s);
while (len > 0)
{
if ((fgets(tmps, sizeof(tmps), s->fpin)) == NULL)
return;
... | 232,974,963,633,672,270,000,000,000,000,000,000,000 | handler.c | 333,354,146,505,193,840,000,000,000,000,000,000,000 | [
"CWE-120"
] | CVE-2022-1328 | Buffer Overflow in uudecoder in Mutt affecting all versions starting from 0.94.13 before 2.2.3 allows read past end of input line | https://nvd.nist.gov/vuln/detail/CVE-2022-1328 |
483,448 | mutt | e5ed080c00e59701ca62ef9b2a6d2612ebf765a5 | https://github.com/muttmua/mutt | https://gitlab.com/muttmua/mutt/-/commit/e5ed080c00e59701ca62ef9b2a6d2612ebf765a5 | Fix uudecode buffer overflow.
mutt_decode_uuencoded() used each line's initial "length character"
without any validation. It would happily read past the end of the
input line, and with a suitable value even past the length of the
input buffer.
As I noted in ticket 404, there are several other changes that could
be a... | 0 | static void mutt_decode_uuencoded (STATE *s, LOFF_T len, int istext, iconv_t cd)
{
char tmps[SHORT_STRING];
char linelen, c, l, out;
char *pt;
char bufi[BUFI_SIZE];
size_t k = 0;
if (istext)
state_set_prefix(s);
while (len > 0)
{
if ((fgets(tmps, sizeof(tmps), s->fpin)) == NULL)
return;
... | 1,283,166,859,153,750,400,000,000,000,000,000,000 | handler.c | 206,374,361,492,276,470,000,000,000,000,000,000,000 | [
"CWE-120"
] | CVE-2022-1328 | Buffer Overflow in uudecoder in Mutt affecting all versions starting from 0.94.13 before 2.2.3 allows read past end of input line | https://nvd.nist.gov/vuln/detail/CVE-2022-1328 |
215,110 | gnutls | 1ffb827e45721ef56982d0ffd5c5de52376c428e | http://git.savannah.gnu.org/cgit/gnutls | https://gitlab.com/gnutls/gnutls/commit/1ffb827e45721ef56982d0ffd5c5de52376c428e | handshake: set a maximum number of warning messages that can be received per handshake
That is to avoid DoS due to the assymetry of cost of sending an alert vs the cost
of processing. | 1 | static void _gnutls_handshake_internal_state_init(gnutls_session_t session)
{
/* by default no selected certificate */
session->internals.adv_version_major = 0;
session->internals.adv_version_minor = 0;
session->internals.direction = 0;
/* use out of band data for the last
* handshake messages received.
*/
s... | 103,871,125,033,811,470,000,000,000,000,000,000,000 | state.c | 15,224,094,478,379,342,000,000,000,000,000,000,000 | [
"CWE-400"
] | CVE-2016-8610 | A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections ... | https://nvd.nist.gov/vuln/detail/CVE-2016-8610 |
483,540 | gnutls | 1ffb827e45721ef56982d0ffd5c5de52376c428e | http://git.savannah.gnu.org/cgit/gnutls | https://gitlab.com/gnutls/gnutls/commit/1ffb827e45721ef56982d0ffd5c5de52376c428e | handshake: set a maximum number of warning messages that can be received per handshake
That is to avoid DoS due to the assymetry of cost of sending an alert vs the cost
of processing. | 0 | static void _gnutls_handshake_internal_state_init(gnutls_session_t session)
{
/* by default no selected certificate */
session->internals.adv_version_major = 0;
session->internals.adv_version_minor = 0;
session->internals.direction = 0;
/* use out of band data for the last
* handshake messages received.
*/
s... | 119,013,547,627,522,470,000,000,000,000,000,000,000 | state.c | 120,336,938,162,589,420,000,000,000,000,000,000,000 | [
"CWE-400"
] | CVE-2016-8610 | A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections ... | https://nvd.nist.gov/vuln/detail/CVE-2016-8610 |
215,121 | varnish-cache | 406b583fe54634afd029e7a41e35b3cf9ccac28a | https://github.com/varnishcache/varnish-cache | https://github.com/varnishcache/varnish-cache/commit/406b583fe54634afd029e7a41e35b3cf9ccac28a | Avoid some code duplication
Apply some adjustments to recent patches based off of review by Nils
Goroll at UPLEX (@nigoroll) | 1 | http1_dissect_hdrs(struct http *hp, char *p, struct http_conn *htc,
unsigned maxhdr)
{
char *q, *r, *s;
int i;
assert(p > htc->rxbuf_b);
assert(p <= htc->rxbuf_e);
hp->nhd = HTTP_HDR_FIRST;
r = NULL; /* For FlexeLint */
for (; p < htc->rxbuf_e; p = r) {
/* Find end of next header */
q = r = p;
if (v... | 3,543,734,317,563,929,600,000,000,000,000,000,000 | cache_http1_proto.c | 188,772,840,119,904,900,000,000,000,000,000,000,000 | [
"CWE-617"
] | CVE-2019-15892 | An issue was discovered in Varnish Cache before 6.0.4 LTS, and 6.1.x and 6.2.x before 6.2.1. An HTTP/1 parsing failure allows a remote attacker to trigger an assert by sending crafted HTTP/1 requests. The assert will cause an automatic restart with a clean cache, which makes it a Denial of Service attack. | https://nvd.nist.gov/vuln/detail/CVE-2019-15892 |
483,628 | varnish-cache | 406b583fe54634afd029e7a41e35b3cf9ccac28a | https://github.com/varnishcache/varnish-cache | https://github.com/varnishcache/varnish-cache/commit/406b583fe54634afd029e7a41e35b3cf9ccac28a | Avoid some code duplication
Apply some adjustments to recent patches based off of review by Nils
Goroll at UPLEX (@nigoroll) | 0 | http1_dissect_hdrs(struct http *hp, char *p, struct http_conn *htc,
unsigned maxhdr)
{
char *q, *r, *s;
int i;
assert(p > htc->rxbuf_b);
assert(p <= htc->rxbuf_e);
hp->nhd = HTTP_HDR_FIRST;
r = NULL; /* For FlexeLint */
for (; p < htc->rxbuf_e; p = r) {
/* Find end of next header */
q = r = p;
if (v... | 40,183,141,729,507,527,000,000,000,000,000,000,000 | cache_http1_proto.c | 170,310,027,646,771,900,000,000,000,000,000,000,000 | [
"CWE-617"
] | CVE-2019-15892 | An issue was discovered in Varnish Cache before 6.0.4 LTS, and 6.1.x and 6.2.x before 6.2.1. An HTTP/1 parsing failure allows a remote attacker to trigger an assert by sending crafted HTTP/1 requests. The assert will cause an automatic restart with a clean cache, which makes it a Denial of Service attack. | https://nvd.nist.gov/vuln/detail/CVE-2019-15892 |
215,123 | vim | 4bf1006cae7e87259ccd5219128c3dba75774441 | https://github.com/vim/vim | https://github.com/vim/vim/commit/4bf1006cae7e87259ccd5219128c3dba75774441 | patch 8.2.3923: Vim9: double free with split argument list in nested function
Problem: Vim9: double free if a nested function has a line break in the
argument list.
Solution: Set cmdlinep when freeing the previous line. | 1 | get_function_args(
char_u **argp,
char_u endchar,
garray_T *newargs,
garray_T *argtypes, // NULL unless using :def
int types_optional, // types optional if "argtypes" is not NULL
evalarg_T *evalarg, // context or NULL
int *varargs,
garray_T *default_args,
int skip,
exarg_T *ea... | 202,508,356,734,573,500,000,000,000,000,000,000,000 | userfunc.c | 43,575,424,613,321,730,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2021-4187 | vim is vulnerable to Use After Free | https://nvd.nist.gov/vuln/detail/CVE-2021-4187 |
483,643 | vim | 4bf1006cae7e87259ccd5219128c3dba75774441 | https://github.com/vim/vim | https://github.com/vim/vim/commit/4bf1006cae7e87259ccd5219128c3dba75774441 | patch 8.2.3923: Vim9: double free with split argument list in nested function
Problem: Vim9: double free if a nested function has a line break in the
argument list.
Solution: Set cmdlinep when freeing the previous line. | 0 | get_function_args(
char_u **argp,
char_u endchar,
garray_T *newargs,
garray_T *argtypes, // NULL unless using :def
int types_optional, // types optional if "argtypes" is not NULL
evalarg_T *evalarg, // context or NULL
int *varargs,
garray_T *default_args,
int skip,
exarg_T *ea... | 45,032,406,596,684,400,000,000,000,000,000,000,000 | userfunc.c | 9,771,549,235,022,593,000,000,000,000,000,000,000 | [
"CWE-415"
] | CVE-2021-4187 | vim is vulnerable to Use After Free | https://nvd.nist.gov/vuln/detail/CVE-2021-4187 |
215,141 | linux | 2e7682ebfc750177a4944eeb56e97a3f05734528 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/2e7682ebfc750177a4944eeb56e97a3f05734528 | media: tw5864: Fix possible NULL pointer dereference in tw5864_handle_frame
'vb' null check should be done before dereferencing it in
tw5864_handle_frame, otherwise a NULL pointer dereference
may occur.
Fixes: 34d1324edd31 ("[media] pci: Add tw5864 driver")
Signed-off-by: YueHaibing <yuehaibing@huawei.com>
Signed-of... | 1 | static void tw5864_handle_frame(struct tw5864_h264_frame *frame)
{
#define SKIP_VLCBUF_BYTES 3
struct tw5864_input *input = frame->input;
struct tw5864_dev *dev = input->root;
struct tw5864_buf *vb;
struct vb2_v4l2_buffer *v4l2_buf;
int frame_len = frame->vlc_len - SKIP_VLCBUF_BYTES;
u8 *dst = input->buf_cur_ptr;... | 60,259,603,741,341,280,000,000,000,000,000,000,000 | tw5864-video.c | 267,462,176,924,897,800,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2019-20806 | An issue was discovered in the Linux kernel before 5.2. There is a NULL pointer dereference in tw5864_handle_frame() in drivers/media/pci/tw5864/tw5864-video.c, which may cause denial of service, aka CID-2e7682ebfc75. | https://nvd.nist.gov/vuln/detail/CVE-2019-20806 |
484,026 | linux | 2e7682ebfc750177a4944eeb56e97a3f05734528 | https://github.com/torvalds/linux | https://github.com/torvalds/linux/commit/2e7682ebfc750177a4944eeb56e97a3f05734528 | media: tw5864: Fix possible NULL pointer dereference in tw5864_handle_frame
'vb' null check should be done before dereferencing it in
tw5864_handle_frame, otherwise a NULL pointer dereference
may occur.
Fixes: 34d1324edd31 ("[media] pci: Add tw5864 driver")
Signed-off-by: YueHaibing <yuehaibing@huawei.com>
Signed-of... | 0 | static void tw5864_handle_frame(struct tw5864_h264_frame *frame)
{
#define SKIP_VLCBUF_BYTES 3
struct tw5864_input *input = frame->input;
struct tw5864_dev *dev = input->root;
struct tw5864_buf *vb;
struct vb2_v4l2_buffer *v4l2_buf;
int frame_len = frame->vlc_len - SKIP_VLCBUF_BYTES;
u8 *dst = input->buf_cur_ptr;... | 237,292,289,469,471,800,000,000,000,000,000,000,000 | tw5864-video.c | 280,087,043,525,067,180,000,000,000,000,000,000,000 | [
"CWE-476"
] | CVE-2019-20806 | An issue was discovered in the Linux kernel before 5.2. There is a NULL pointer dereference in tw5864_handle_frame() in drivers/media/pci/tw5864/tw5864-video.c, which may cause denial of service, aka CID-2e7682ebfc75. | https://nvd.nist.gov/vuln/detail/CVE-2019-20806 |
215,150 | flatpak | a9107feeb4b8275b78965b36bf21b92d5724699e | https://github.com/flatpak/flatpak | https://github.com/flatpak/flatpak/commit/a9107feeb4b8275b78965b36bf21b92d5724699e | run: Only compare the lowest 32 ioctl arg bits for TIOCSTI
Closes #2782.
Closes: #2783
Approved by: alexlarsson | 1 | setup_seccomp (FlatpakBwrap *bwrap,
const char *arch,
gulong allowed_personality,
FlatpakRunFlags run_flags,
GError **error)
{
gboolean multiarch = (run_flags & FLATPAK_RUN_FLAG_MULTIARCH) != 0;
gboolean devel = (run_flags & FLATPAK_R... | 311,084,961,612,950,050,000,000,000,000,000,000,000 | flatpak-run.c | 206,797,236,890,961,600,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2019-10063 | Flatpak before 1.0.8, 1.1.x and 1.2.x before 1.2.4, and 1.3.x before 1.3.1 allows a sandbox bypass. Flatpak versions since 0.8.1 address CVE-2017-5226 by using a seccomp filter to prevent sandboxed apps from using the TIOCSTI ioctl, which could otherwise be used to inject commands into the controlling terminal so that ... | https://nvd.nist.gov/vuln/detail/CVE-2019-10063 |
484,093 | flatpak | a9107feeb4b8275b78965b36bf21b92d5724699e | https://github.com/flatpak/flatpak | https://github.com/flatpak/flatpak/commit/a9107feeb4b8275b78965b36bf21b92d5724699e | run: Only compare the lowest 32 ioctl arg bits for TIOCSTI
Closes #2782.
Closes: #2783
Approved by: alexlarsson | 0 | setup_seccomp (FlatpakBwrap *bwrap,
const char *arch,
gulong allowed_personality,
FlatpakRunFlags run_flags,
GError **error)
{
gboolean multiarch = (run_flags & FLATPAK_RUN_FLAG_MULTIARCH) != 0;
gboolean devel = (run_flags & FLATPAK_R... | 239,763,651,511,658,000,000,000,000,000,000,000,000 | flatpak-run.c | 125,169,058,813,264,820,000,000,000,000,000,000,000 | [
"CWE-20"
] | CVE-2019-10063 | Flatpak before 1.0.8, 1.1.x and 1.2.x before 1.2.4, and 1.3.x before 1.3.1 allows a sandbox bypass. Flatpak versions since 0.8.1 address CVE-2017-5226 by using a seccomp filter to prevent sandboxed apps from using the TIOCSTI ioctl, which could otherwise be used to inject commands into the controlling terminal so that ... | https://nvd.nist.gov/vuln/detail/CVE-2019-10063 |
215,161 | linux | 15753588bcd4bbffae1cca33c8ced5722477fe1f | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=15753588bcd4bbffae1cca33c8ced5722477fe1f | USB: gadget: fix illegal array access in binding with UDC
FuzzUSB (a variant of syzkaller) found an illegal array access
using an incorrect index while binding a gadget with UDC.
Reference: https://www.spinics.net/lists/linux-usb/msg194331.html
This bug occurs when a size variable used for a buffer
is misused to acc... | 1 | static ssize_t gadget_dev_desc_UDC_store(struct config_item *item,
const char *page, size_t len)
{
struct gadget_info *gi = to_gadget_info(item);
char *name;
int ret;
name = kstrdup(page, GFP_KERNEL);
if (!name)
return -ENOMEM;
if (name[len - 1] == '\n')
name[len - 1] = '\0';
mutex_lock(&gi->lock);
if ... | 302,528,775,302,411,330,000,000,000,000,000,000,000 | configfs.c | 82,932,539,943,823,750,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2020-13143 | gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c in the Linux kernel 3.16 through 5.6.13 relies on kstrdup without considering the possibility of an internal '\0' value, which allows attackers to trigger an out-of-bounds read, aka CID-15753588bcd4. | https://nvd.nist.gov/vuln/detail/CVE-2020-13143 |
484,293 | linux | 15753588bcd4bbffae1cca33c8ced5722477fe1f | https://github.com/torvalds/linux | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=15753588bcd4bbffae1cca33c8ced5722477fe1f | USB: gadget: fix illegal array access in binding with UDC
FuzzUSB (a variant of syzkaller) found an illegal array access
using an incorrect index while binding a gadget with UDC.
Reference: https://www.spinics.net/lists/linux-usb/msg194331.html
This bug occurs when a size variable used for a buffer
is misused to acc... | 0 | static ssize_t gadget_dev_desc_UDC_store(struct config_item *item,
const char *page, size_t len)
{
struct gadget_info *gi = to_gadget_info(item);
char *name;
int ret;
if (strlen(page) < len)
return -EOVERFLOW;
name = kstrdup(page, GFP_KERNEL);
if (!name)
return -ENOMEM;
if (name[len - 1] == '\n')
name[... | 187,017,406,438,343,360,000,000,000,000,000,000,000 | configfs.c | 11,055,741,175,899,895,000,000,000,000,000,000,000 | [
"CWE-125"
] | CVE-2020-13143 | gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c in the Linux kernel 3.16 through 5.6.13 relies on kstrdup without considering the possibility of an internal '\0' value, which allows attackers to trigger an out-of-bounds read, aka CID-15753588bcd4. | https://nvd.nist.gov/vuln/detail/CVE-2020-13143 |
215,163 | mutt | 4a2becbdb4422aaffe3ce314991b9d670b7adf17 | https://github.com/muttmua/mutt | https://gitlab.com/muttmua/mutt/-/commit/4a2becbdb4422aaffe3ce314991b9d670b7adf17 | Fix memory leak parsing group addresses without a display name.
When there was a group address terminator with no previous
addresses (including the group display-name), an address would be
allocated but not attached to the address list.
Change this to only allocate when last exists.
It would be more correct to not a... | 1 | ADDRESS *rfc822_parse_adrlist (ADDRESS *top, const char *s)
{
int ws_pending, nl;
#ifdef EXACT_ADDRESS
const char *begin;
#endif
const char *ps;
char comment[LONG_STRING], phrase[LONG_STRING];
size_t phraselen = 0, commentlen = 0;
ADDRESS *cur, *last = NULL;
RFC822Error = 0;
last = top;
while (last ... | 49,064,898,484,247,990,000,000,000,000,000,000,000 | rfc822.c | 213,011,706,027,217,450,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2021-3181 | rfc822.c in Mutt through 2.0.4 allows remote attackers to cause a denial of service (mailbox unavailability) by sending email messages with sequences of semicolon characters in RFC822 address fields (aka terminators of empty groups). A small email message from the attacker can cause large memory consumption, and the vi... | https://nvd.nist.gov/vuln/detail/CVE-2021-3181 |
484,319 | mutt | 4a2becbdb4422aaffe3ce314991b9d670b7adf17 | https://github.com/muttmua/mutt | https://gitlab.com/muttmua/mutt/-/commit/4a2becbdb4422aaffe3ce314991b9d670b7adf17 | Fix memory leak parsing group addresses without a display name.
When there was a group address terminator with no previous
addresses (including the group display-name), an address would be
allocated but not attached to the address list.
Change this to only allocate when last exists.
It would be more correct to not a... | 0 | ADDRESS *rfc822_parse_adrlist (ADDRESS *top, const char *s)
{
int ws_pending, nl;
#ifdef EXACT_ADDRESS
const char *begin;
#endif
const char *ps;
char comment[LONG_STRING], phrase[LONG_STRING];
size_t phraselen = 0, commentlen = 0;
ADDRESS *cur, *last = NULL;
RFC822Error = 0;
last = top;
while (last ... | 38,537,979,631,427,800,000,000,000,000,000,000,000 | rfc822.c | 332,383,259,336,621,130,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2021-3181 | rfc822.c in Mutt through 2.0.4 allows remote attackers to cause a denial of service (mailbox unavailability) by sending email messages with sequences of semicolon characters in RFC822 address fields (aka terminators of empty groups). A small email message from the attacker can cause large memory consumption, and the vi... | https://nvd.nist.gov/vuln/detail/CVE-2021-3181 |
215,178 | linux-fs | 62c9d2674b31d4c8a674bee86b7edc6da2803aea | https://git.kernel.org/pub/scm/linux/kernel/git/jack/linux-fs | https://git.kernel.org/pub/scm/linux/kernel/git/jack/linux-fs.git/commit/?h=fsnotify&id=62c9d2674b31d4c8a674bee86b7edc6da2803aea | inotify: Fix fsnotify_mark refcount leak in inotify_update_existing_watch()
Commit 4d97f7d53da7dc83 ("inotify: Add flag IN_MASK_CREATE for
inotify_add_watch()") forgot to call fsnotify_put_mark() with
IN_MASK_CREATE after fsnotify_find_mark()
Fixes: 4d97f7d53da7dc83 ("inotify: Add flag IN_MASK_CREATE for inotify_add_... | 1 | static int inotify_update_existing_watch(struct fsnotify_group *group,
struct inode *inode,
u32 arg)
{
struct fsnotify_mark *fsn_mark;
struct inotify_inode_mark *i_mark;
__u32 old_mask, new_mask;
__u32 mask;
int add = (arg & IN_MASK_ADD);
int create = (arg & IN_MASK_CREATE);
int ret;
mask = inotify... | 250,609,986,488,927,340,000,000,000,000,000,000,000 | inotify_user.c | 186,772,428,727,350,550,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2019-9857 | In the Linux kernel through 5.0.2, the function inotify_update_existing_watch() in fs/notify/inotify/inotify_user.c neglects to call fsnotify_put_mark() with IN_MASK_CREATE after fsnotify_find_mark(), which will cause a memory leak (aka refcount leak). Finally, this will cause a denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2019-9857 |
484,448 | linux-fs | 62c9d2674b31d4c8a674bee86b7edc6da2803aea | https://git.kernel.org/pub/scm/linux/kernel/git/jack/linux-fs | https://git.kernel.org/pub/scm/linux/kernel/git/jack/linux-fs.git/commit/?h=fsnotify&id=62c9d2674b31d4c8a674bee86b7edc6da2803aea | inotify: Fix fsnotify_mark refcount leak in inotify_update_existing_watch()
Commit 4d97f7d53da7dc83 ("inotify: Add flag IN_MASK_CREATE for
inotify_add_watch()") forgot to call fsnotify_put_mark() with
IN_MASK_CREATE after fsnotify_find_mark()
Fixes: 4d97f7d53da7dc83 ("inotify: Add flag IN_MASK_CREATE for inotify_add_... | 0 | static int inotify_update_existing_watch(struct fsnotify_group *group,
struct inode *inode,
u32 arg)
{
struct fsnotify_mark *fsn_mark;
struct inotify_inode_mark *i_mark;
__u32 old_mask, new_mask;
__u32 mask;
int add = (arg & IN_MASK_ADD);
int create = (arg & IN_MASK_CREATE);
int ret;
mask = inotify... | 175,866,897,815,871,200,000,000,000,000,000,000,000 | inotify_user.c | 306,836,280,845,659,140,000,000,000,000,000,000,000 | [
"CWE-401"
] | CVE-2019-9857 | In the Linux kernel through 5.0.2, the function inotify_update_existing_watch() in fs/notify/inotify/inotify_user.c neglects to call fsnotify_put_mark() with IN_MASK_CREATE after fsnotify_find_mark(), which will cause a memory leak (aka refcount leak). Finally, this will cause a denial of service. | https://nvd.nist.gov/vuln/detail/CVE-2019-9857 |
215,189 | poppler | 68ef84e5968a4249c2162b839ca6d7975048a557 | https://github.com/freedesktop/poppler | https://gitlab.freedesktop.org/poppler/poppler/commit/68ef84e5968a4249c2162b839ca6d7975048a557 | JPXStream::init: ignore dict Length if clearly broken
Fixes issue #805 | 1 | void JPXStream::init()
{
Object oLen, cspace, smaskInData;
if (getDict()) {
oLen = getDict()->lookup("Length");
cspace = getDict()->lookup("ColorSpace");
smaskInData = getDict()->lookup("SMaskInData");
}
int bufSize = BUFFER_INITIAL_SIZE;
if (oLen.isInt()) bufSize = oLen.getInt();
bool indexed... | 72,380,917,231,821,780,000,000,000,000,000,000,000 | JPEG2000Stream.cc | 333,136,246,002,796,200,000,000,000,000,000,000,000 | [
"CWE-190"
] | CVE-2019-9959 | The JPXStream::init function in Poppler 0.78.0 and earlier doesn't check for negative values of stream length, leading to an Integer Overflow, thereby making it possible to allocate a large memory chunk on the heap, with a size controlled by an attacker, as demonstrated by pdftocairo. | https://nvd.nist.gov/vuln/detail/CVE-2019-9959 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.